Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 10:42
Static task
static1
Behavioral task
behavioral1
Sample
d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe
Resource
win10v2004-20241007-en
General
-
Target
d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe
-
Size
220KB
-
MD5
30e73f871d7eea01c3b848e2c89142b4
-
SHA1
81a18f8c3df46c501af7f555b6a42f55f9601c7d
-
SHA256
d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7
-
SHA512
4b505debb845bd6196cac0e29bc4b0b806f2ea47109c2b1ad8bf8456ef1993ca6bb78db167426ea88dc57c6773056af0f69acce51531d5f250a489082e0cdf90
-
SSDEEP
6144:t1JIfielipuGOMlliO1DmWIgff9aGzde4qz7:t1JKi8ciYq0fZzqz7
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2796 wmirpcf.exe -
Executes dropped EXE 64 IoCs
pid Process 2428 wmirpcf.exe 2796 wmirpcf.exe 2756 wmirpcf.exe 2588 wmirpcf.exe 2640 wmirpcf.exe 2020 wmirpcf.exe 800 wmirpcf.exe 1660 wmirpcf.exe 1724 wmirpcf.exe 2920 wmirpcf.exe 2952 wmirpcf.exe 2044 wmirpcf.exe 1840 wmirpcf.exe 1536 wmirpcf.exe 936 wmirpcf.exe 1592 wmirpcf.exe 2100 wmirpcf.exe 2132 wmirpcf.exe 1632 wmirpcf.exe 1636 wmirpcf.exe 2292 wmirpcf.exe 1668 wmirpcf.exe 2716 wmirpcf.exe 2656 wmirpcf.exe 2608 wmirpcf.exe 1248 wmirpcf.exe 1996 wmirpcf.exe 868 wmirpcf.exe 1440 wmirpcf.exe 616 wmirpcf.exe 1724 wmirpcf.exe 2988 wmirpcf.exe 3036 wmirpcf.exe 1300 wmirpcf.exe 1404 wmirpcf.exe 900 wmirpcf.exe 936 wmirpcf.exe 488 wmirpcf.exe 1620 wmirpcf.exe 272 wmirpcf.exe 2188 wmirpcf.exe 2672 wmirpcf.exe 2104 wmirpcf.exe 2260 wmirpcf.exe 2744 wmirpcf.exe 2460 wmirpcf.exe 2088 wmirpcf.exe 2312 wmirpcf.exe 1340 wmirpcf.exe 2000 wmirpcf.exe 1992 wmirpcf.exe 2984 wmirpcf.exe 1912 wmirpcf.exe 800 wmirpcf.exe 2632 wmirpcf.exe 408 wmirpcf.exe 2176 wmirpcf.exe 944 wmirpcf.exe 532 wmirpcf.exe 1208 wmirpcf.exe 2936 wmirpcf.exe 2528 wmirpcf.exe 2008 wmirpcf.exe 1532 wmirpcf.exe -
Loads dropped DLL 64 IoCs
pid Process 2504 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 2504 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 2428 wmirpcf.exe 2796 wmirpcf.exe 2796 wmirpcf.exe 2588 wmirpcf.exe 2588 wmirpcf.exe 2020 wmirpcf.exe 2020 wmirpcf.exe 1660 wmirpcf.exe 1660 wmirpcf.exe 2920 wmirpcf.exe 2920 wmirpcf.exe 2044 wmirpcf.exe 2044 wmirpcf.exe 1536 wmirpcf.exe 1536 wmirpcf.exe 1592 wmirpcf.exe 1592 wmirpcf.exe 2132 wmirpcf.exe 2132 wmirpcf.exe 1636 wmirpcf.exe 1636 wmirpcf.exe 1668 wmirpcf.exe 1668 wmirpcf.exe 2656 wmirpcf.exe 2656 wmirpcf.exe 1248 wmirpcf.exe 1248 wmirpcf.exe 868 wmirpcf.exe 868 wmirpcf.exe 616 wmirpcf.exe 616 wmirpcf.exe 2988 wmirpcf.exe 2988 wmirpcf.exe 1300 wmirpcf.exe 1300 wmirpcf.exe 900 wmirpcf.exe 900 wmirpcf.exe 488 wmirpcf.exe 488 wmirpcf.exe 272 wmirpcf.exe 272 wmirpcf.exe 2672 wmirpcf.exe 2672 wmirpcf.exe 2260 wmirpcf.exe 2260 wmirpcf.exe 2460 wmirpcf.exe 2460 wmirpcf.exe 2312 wmirpcf.exe 2312 wmirpcf.exe 2000 wmirpcf.exe 2000 wmirpcf.exe 2984 wmirpcf.exe 2984 wmirpcf.exe 800 wmirpcf.exe 800 wmirpcf.exe 408 wmirpcf.exe 408 wmirpcf.exe 944 wmirpcf.exe 944 wmirpcf.exe 1208 wmirpcf.exe 1208 wmirpcf.exe 2528 wmirpcf.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File opened for modification C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe File created C:\Windows\SysWOW64\wmirpcf.exe wmirpcf.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2268 set thread context of 2504 2268 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 30 PID 2428 set thread context of 2796 2428 wmirpcf.exe 32 PID 2756 set thread context of 2588 2756 wmirpcf.exe 34 PID 2640 set thread context of 2020 2640 wmirpcf.exe 36 PID 800 set thread context of 1660 800 wmirpcf.exe 38 PID 1724 set thread context of 2920 1724 wmirpcf.exe 40 PID 2952 set thread context of 2044 2952 wmirpcf.exe 43 PID 1840 set thread context of 1536 1840 wmirpcf.exe 45 PID 936 set thread context of 1592 936 wmirpcf.exe 47 PID 2100 set thread context of 2132 2100 wmirpcf.exe 49 PID 1632 set thread context of 1636 1632 wmirpcf.exe 51 PID 2292 set thread context of 1668 2292 wmirpcf.exe 53 PID 2716 set thread context of 2656 2716 wmirpcf.exe 55 PID 2608 set thread context of 1248 2608 wmirpcf.exe 57 PID 1996 set thread context of 868 1996 wmirpcf.exe 59 PID 1440 set thread context of 616 1440 wmirpcf.exe 61 PID 1724 set thread context of 2988 1724 wmirpcf.exe 63 PID 3036 set thread context of 1300 3036 wmirpcf.exe 65 PID 1404 set thread context of 900 1404 wmirpcf.exe 67 PID 936 set thread context of 488 936 wmirpcf.exe 69 PID 1620 set thread context of 272 1620 wmirpcf.exe 71 PID 2188 set thread context of 2672 2188 wmirpcf.exe 73 PID 2104 set thread context of 2260 2104 wmirpcf.exe 75 PID 2744 set thread context of 2460 2744 wmirpcf.exe 77 PID 2088 set thread context of 2312 2088 wmirpcf.exe 79 PID 1340 set thread context of 2000 1340 wmirpcf.exe 81 PID 1992 set thread context of 2984 1992 wmirpcf.exe 83 PID 1912 set thread context of 800 1912 wmirpcf.exe 85 PID 2632 set thread context of 408 2632 wmirpcf.exe 87 PID 2176 set thread context of 944 2176 wmirpcf.exe 89 PID 532 set thread context of 1208 532 wmirpcf.exe 91 PID 2936 set thread context of 2528 2936 wmirpcf.exe 93 PID 2008 set thread context of 1532 2008 wmirpcf.exe 95 PID 1884 set thread context of 2300 1884 wmirpcf.exe 97 PID 2600 set thread context of 2292 2600 wmirpcf.exe 99 PID 2668 set thread context of 2116 2668 wmirpcf.exe 101 PID 1484 set thread context of 1716 1484 wmirpcf.exe 103 PID 2012 set thread context of 2688 2012 wmirpcf.exe 105 PID 2768 set thread context of 2776 2768 wmirpcf.exe 107 PID 2096 set thread context of 872 2096 wmirpcf.exe 109 PID 3036 set thread context of 2144 3036 wmirpcf.exe 111 PID 1892 set thread context of 532 1892 wmirpcf.exe 113 PID 1448 set thread context of 988 1448 wmirpcf.exe 115 PID 880 set thread context of 1516 880 wmirpcf.exe 117 PID 1884 set thread context of 2304 1884 wmirpcf.exe 119 PID 2748 set thread context of 2616 2748 wmirpcf.exe 121 PID 2664 set thread context of 2608 2664 wmirpcf.exe 123 PID 1484 set thread context of 112 1484 wmirpcf.exe 125 PID 1000 set thread context of 1200 1000 wmirpcf.exe 127 PID 2964 set thread context of 2992 2964 wmirpcf.exe 129 PID 3024 set thread context of 1020 3024 wmirpcf.exe 131 PID 1928 set thread context of 1404 1928 wmirpcf.exe 133 PID 1952 set thread context of 1136 1952 wmirpcf.exe 135 PID 1672 set thread context of 1616 1672 wmirpcf.exe 137 PID 2288 set thread context of 2328 2288 wmirpcf.exe 139 PID 932 set thread context of 1348 932 wmirpcf.exe 141 PID 2444 set thread context of 2872 2444 wmirpcf.exe 143 PID 2636 set thread context of 2652 2636 wmirpcf.exe 145 PID 2604 set thread context of 2184 2604 wmirpcf.exe 147 PID 1428 set thread context of 1344 1428 wmirpcf.exe 149 PID 2828 set thread context of 2680 2828 wmirpcf.exe 151 PID 2096 set thread context of 2928 2096 wmirpcf.exe 153 PID 948 set thread context of 1540 948 wmirpcf.exe 155 PID 2224 set thread context of 2076 2224 wmirpcf.exe 157 -
resource yara_rule behavioral1/memory/2504-5-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2504-7-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2504-9-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2504-15-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2504-17-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2504-18-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2504-16-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2504-14-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2504-32-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2796-47-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2796-48-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2796-49-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2796-54-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2588-71-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2588-70-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2588-68-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2588-69-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2588-77-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2020-99-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1660-120-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2920-141-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2044-165-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1536-184-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1592-205-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2132-229-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1636-248-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1668-269-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2656-290-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1248-310-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/868-322-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/868-328-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/616-345-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2988-362-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1300-379-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/900-396-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/488-413-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/272-432-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2672-447-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2260-464-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2460-481-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2312-498-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2000-515-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2984-532-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/800-549-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/408-566-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/944-583-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1208-600-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2528-617-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1532-635-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2300-652-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2292-669-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2116-686-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1716-703-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2688-720-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2776-737-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/872-754-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2144-771-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/532-788-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/988-805-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/1516-822-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2304-839-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2616-856-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/2608-873-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral1/memory/112-890-0x0000000000400000-0x0000000000460000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmirpcf.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command wmirpcf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2504 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 2796 wmirpcf.exe 2588 wmirpcf.exe 2020 wmirpcf.exe 1660 wmirpcf.exe 2920 wmirpcf.exe 2044 wmirpcf.exe 1536 wmirpcf.exe 1592 wmirpcf.exe 2132 wmirpcf.exe 1636 wmirpcf.exe 1668 wmirpcf.exe 2656 wmirpcf.exe 1248 wmirpcf.exe 868 wmirpcf.exe 616 wmirpcf.exe 2988 wmirpcf.exe 1300 wmirpcf.exe 900 wmirpcf.exe 488 wmirpcf.exe 272 wmirpcf.exe 2672 wmirpcf.exe 2260 wmirpcf.exe 2460 wmirpcf.exe 2312 wmirpcf.exe 2000 wmirpcf.exe 2984 wmirpcf.exe 800 wmirpcf.exe 408 wmirpcf.exe 944 wmirpcf.exe 1208 wmirpcf.exe 2528 wmirpcf.exe 2300 wmirpcf.exe 2292 wmirpcf.exe 2116 wmirpcf.exe 1716 wmirpcf.exe 2688 wmirpcf.exe 2776 wmirpcf.exe 872 wmirpcf.exe 2144 wmirpcf.exe 532 wmirpcf.exe 988 wmirpcf.exe 1516 wmirpcf.exe 2304 wmirpcf.exe 2616 wmirpcf.exe 2608 wmirpcf.exe 112 wmirpcf.exe 1200 wmirpcf.exe 2992 wmirpcf.exe 1020 wmirpcf.exe 1404 wmirpcf.exe 1136 wmirpcf.exe 1616 wmirpcf.exe 2328 wmirpcf.exe 1348 wmirpcf.exe 2872 wmirpcf.exe 2652 wmirpcf.exe 2184 wmirpcf.exe 1344 wmirpcf.exe 2680 wmirpcf.exe 2928 wmirpcf.exe 1540 wmirpcf.exe 2076 wmirpcf.exe 1684 wmirpcf.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2268 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 2428 wmirpcf.exe 2756 wmirpcf.exe 2640 wmirpcf.exe 800 wmirpcf.exe 1724 wmirpcf.exe 2952 wmirpcf.exe 1840 wmirpcf.exe 936 wmirpcf.exe 2100 wmirpcf.exe 1632 wmirpcf.exe 2292 wmirpcf.exe 2716 wmirpcf.exe 2608 wmirpcf.exe 1996 wmirpcf.exe 1440 wmirpcf.exe 1724 wmirpcf.exe 3036 wmirpcf.exe 1404 wmirpcf.exe 936 wmirpcf.exe 1620 wmirpcf.exe 2188 wmirpcf.exe 2104 wmirpcf.exe 2744 wmirpcf.exe 2088 wmirpcf.exe 1340 wmirpcf.exe 1992 wmirpcf.exe 1912 wmirpcf.exe 2632 wmirpcf.exe 2176 wmirpcf.exe 532 wmirpcf.exe 2936 wmirpcf.exe 2008 wmirpcf.exe 1884 wmirpcf.exe 2600 wmirpcf.exe 2668 wmirpcf.exe 1484 wmirpcf.exe 2012 wmirpcf.exe 2768 wmirpcf.exe 2096 wmirpcf.exe 3036 wmirpcf.exe 1892 wmirpcf.exe 1448 wmirpcf.exe 880 wmirpcf.exe 1884 wmirpcf.exe 2748 wmirpcf.exe 2664 wmirpcf.exe 1484 wmirpcf.exe 1000 wmirpcf.exe 2964 wmirpcf.exe 3024 wmirpcf.exe 1928 wmirpcf.exe 1952 wmirpcf.exe 1672 wmirpcf.exe 2288 wmirpcf.exe 932 wmirpcf.exe 2444 wmirpcf.exe 2636 wmirpcf.exe 2604 wmirpcf.exe 1428 wmirpcf.exe 2828 wmirpcf.exe 2096 wmirpcf.exe 948 wmirpcf.exe 2224 wmirpcf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2504 2268 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 30 PID 2268 wrote to memory of 2504 2268 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 30 PID 2268 wrote to memory of 2504 2268 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 30 PID 2268 wrote to memory of 2504 2268 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 30 PID 2268 wrote to memory of 2504 2268 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 30 PID 2268 wrote to memory of 2504 2268 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 30 PID 2268 wrote to memory of 2504 2268 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 30 PID 2268 wrote to memory of 2504 2268 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 30 PID 2504 wrote to memory of 2428 2504 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 31 PID 2504 wrote to memory of 2428 2504 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 31 PID 2504 wrote to memory of 2428 2504 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 31 PID 2504 wrote to memory of 2428 2504 d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe 31 PID 2428 wrote to memory of 2796 2428 wmirpcf.exe 32 PID 2428 wrote to memory of 2796 2428 wmirpcf.exe 32 PID 2428 wrote to memory of 2796 2428 wmirpcf.exe 32 PID 2428 wrote to memory of 2796 2428 wmirpcf.exe 32 PID 2428 wrote to memory of 2796 2428 wmirpcf.exe 32 PID 2428 wrote to memory of 2796 2428 wmirpcf.exe 32 PID 2428 wrote to memory of 2796 2428 wmirpcf.exe 32 PID 2428 wrote to memory of 2796 2428 wmirpcf.exe 32 PID 2796 wrote to memory of 2756 2796 wmirpcf.exe 33 PID 2796 wrote to memory of 2756 2796 wmirpcf.exe 33 PID 2796 wrote to memory of 2756 2796 wmirpcf.exe 33 PID 2796 wrote to memory of 2756 2796 wmirpcf.exe 33 PID 2756 wrote to memory of 2588 2756 wmirpcf.exe 34 PID 2756 wrote to memory of 2588 2756 wmirpcf.exe 34 PID 2756 wrote to memory of 2588 2756 wmirpcf.exe 34 PID 2756 wrote to memory of 2588 2756 wmirpcf.exe 34 PID 2756 wrote to memory of 2588 2756 wmirpcf.exe 34 PID 2756 wrote to memory of 2588 2756 wmirpcf.exe 34 PID 2756 wrote to memory of 2588 2756 wmirpcf.exe 34 PID 2756 wrote to memory of 2588 2756 wmirpcf.exe 34 PID 2588 wrote to memory of 2640 2588 wmirpcf.exe 35 PID 2588 wrote to memory of 2640 2588 wmirpcf.exe 35 PID 2588 wrote to memory of 2640 2588 wmirpcf.exe 35 PID 2588 wrote to memory of 2640 2588 wmirpcf.exe 35 PID 2640 wrote to memory of 2020 2640 wmirpcf.exe 36 PID 2640 wrote to memory of 2020 2640 wmirpcf.exe 36 PID 2640 wrote to memory of 2020 2640 wmirpcf.exe 36 PID 2640 wrote to memory of 2020 2640 wmirpcf.exe 36 PID 2640 wrote to memory of 2020 2640 wmirpcf.exe 36 PID 2640 wrote to memory of 2020 2640 wmirpcf.exe 36 PID 2640 wrote to memory of 2020 2640 wmirpcf.exe 36 PID 2640 wrote to memory of 2020 2640 wmirpcf.exe 36 PID 2020 wrote to memory of 800 2020 wmirpcf.exe 37 PID 2020 wrote to memory of 800 2020 wmirpcf.exe 37 PID 2020 wrote to memory of 800 2020 wmirpcf.exe 37 PID 2020 wrote to memory of 800 2020 wmirpcf.exe 37 PID 800 wrote to memory of 1660 800 wmirpcf.exe 38 PID 800 wrote to memory of 1660 800 wmirpcf.exe 38 PID 800 wrote to memory of 1660 800 wmirpcf.exe 38 PID 800 wrote to memory of 1660 800 wmirpcf.exe 38 PID 800 wrote to memory of 1660 800 wmirpcf.exe 38 PID 800 wrote to memory of 1660 800 wmirpcf.exe 38 PID 800 wrote to memory of 1660 800 wmirpcf.exe 38 PID 800 wrote to memory of 1660 800 wmirpcf.exe 38 PID 1660 wrote to memory of 1724 1660 wmirpcf.exe 39 PID 1660 wrote to memory of 1724 1660 wmirpcf.exe 39 PID 1660 wrote to memory of 1724 1660 wmirpcf.exe 39 PID 1660 wrote to memory of 1724 1660 wmirpcf.exe 39 PID 1724 wrote to memory of 2920 1724 wmirpcf.exe 40 PID 1724 wrote to memory of 2920 1724 wmirpcf.exe 40 PID 1724 wrote to memory of 2920 1724 wmirpcf.exe 40 PID 1724 wrote to memory of 2920 1724 wmirpcf.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe"C:\Users\Admin\AppData\Local\Temp\d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exeC:\Users\Admin\AppData\Local\Temp\d2336f1b087906acf7687031caa9b17d9bbe44d14abec76039e45112ac2f92a7.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Users\Admin\AppData\Local\Temp\D2336F~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Users\Admin\AppData\Local\Temp\D2336F~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1536 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2292 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2716 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1248 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:868 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1440 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:616 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1404 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:900 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:488 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:272 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2744 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2000 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1992 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:800 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:408 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:944 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:532 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1208 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2936 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe66⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe67⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe70⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe71⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe73⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe75⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe76⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe77⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe78⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe79⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe80⤵
- Suspicious behavior: EnumeratesProcesses
PID:872 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe81⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe82⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe84⤵
- Suspicious behavior: EnumeratesProcesses
PID:532 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe85⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1448 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe86⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe87⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:880 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe88⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1516 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe89⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe90⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe92⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe93⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe94⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe95⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe96⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:112 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe97⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1000 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe98⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1200 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe99⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe100⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe101⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe102⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe103⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe104⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1404 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe105⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe106⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1136 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe107⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe108⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe109⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe110⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe111⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:932 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe112⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1348 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe113⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe114⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe115⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe116⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe117⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe118⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe119⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1428 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe120⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1344 -
C:\Windows\SysWOW64\wmirpcf.exe"C:\Windows\system32\wmirpcf.exe" C:\Windows\SysWOW64\wmirpcf.exe121⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Windows\SysWOW64\wmirpcf.exeC:\Windows\SysWOW64\wmirpcf.exe C:\Windows\SysWOW64\wmirpcf.exe122⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-