Analysis
-
max time kernel
151s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 12:27
Static task
static1
Behavioral task
behavioral1
Sample
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe
Resource
win10v2004-20220414-en
General
-
Target
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe
-
Size
498KB
-
MD5
88d16eafa3d80cbc183085f120475998
-
SHA1
d9898f4b77ed203106fdb6eaf9b83afec20b6022
-
SHA256
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6
-
SHA512
b2d97d022d6738a08333bbf5b652c9f96ed5198b189b86912689b5a6a1169f7a4444f947e3c286973cd43643617206051d2da07070d72a1b14f2e22a78ad862a
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
Processes:
ujvcbwj.exeujvcbwj.exeirnfkwe.exeirnfkwe.exehgzvpob.exehgzvpob.exeqyvvwmc.exeqyvvwmc.exezijdutd.exezijdutd.exebazigky.exebazigky.exennpbndw.exennpbndw.exegwqrynp.exegwqrynp.exevbwowil.exevbwowil.exezzrzlrk.exezzrzlrk.exexccutlo.exexccutlo.exewrwkydk.exewrwkydk.exeejhuefb.exeejhuefb.exeeurxaev.exeeurxaev.exeazwvngv.exeazwvngv.exervlqjlp.exervlqjlp.exettydskp.exettydskp.exeuwzvgor.exeuwzvgor.exevgxosry.exevgxosry.execjyrugo.execjyrugo.exegazwfwt.exegazwfwt.exesjdbjds.exesjdbjds.exeewtujpq.exeewtujpq.exevsipftl.exevsipftl.exeecexlse.exeecexlse.exelrqnrki.exelrqnrki.exeawxcwff.exeawxcwff.exeetaneod.exeetaneod.exekjmdjha.exekjmdjha.exeogpnqqg.exeogpnqqg.exeygpvpyz.exeygpvpyz.exehyddvwa.exehyddvwa.exepid process 1116 ujvcbwj.exe 984 ujvcbwj.exe 324 irnfkwe.exe 1980 irnfkwe.exe 1220 hgzvpob.exe 1776 hgzvpob.exe 1504 qyvvwmc.exe 1212 qyvvwmc.exe 1732 zijdutd.exe 1904 zijdutd.exe 2008 bazigky.exe 520 bazigky.exe 796 nnpbndw.exe 1884 nnpbndw.exe 1368 gwqrynp.exe 1220 gwqrynp.exe 952 vbwowil.exe 1544 vbwowil.exe 1988 zzrzlrk.exe 692 zzrzlrk.exe 1592 xccutlo.exe 1784 xccutlo.exe 1268 wrwkydk.exe 816 wrwkydk.exe 1940 ejhuefb.exe 1484 ejhuefb.exe 1192 eurxaev.exe 1016 eurxaev.exe 1732 azwvngv.exe 2040 azwvngv.exe 1948 rvlqjlp.exe 648 rvlqjlp.exe 676 ttydskp.exe 1724 ttydskp.exe 1708 uwzvgor.exe 1356 uwzvgor.exe 1940 vgxosry.exe 1796 vgxosry.exe 1284 cjyrugo.exe 860 cjyrugo.exe 556 gazwfwt.exe 1808 gazwfwt.exe 592 sjdbjds.exe 1560 sjdbjds.exe 656 ewtujpq.exe 2012 ewtujpq.exe 1888 vsipftl.exe 560 vsipftl.exe 1300 ecexlse.exe 1456 ecexlse.exe 1336 lrqnrki.exe 1688 lrqnrki.exe 2020 awxcwff.exe 1056 awxcwff.exe 996 etaneod.exe 580 etaneod.exe 1040 kjmdjha.exe 1880 kjmdjha.exe 1576 ogpnqqg.exe 1300 ogpnqqg.exe 1948 ygpvpyz.exe 796 ygpvpyz.exe 1692 hyddvwa.exe 1280 hyddvwa.exe -
Loads dropped DLL 64 IoCs
Processes:
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exeujvcbwj.exeirnfkwe.exehgzvpob.exeqyvvwmc.exezijdutd.exebazigky.exennpbndw.exegwqrynp.exevbwowil.exezzrzlrk.exexccutlo.exewrwkydk.exeejhuefb.exeeurxaev.exeazwvngv.exervlqjlp.exettydskp.exeuwzvgor.exevgxosry.execjyrugo.exegazwfwt.exesjdbjds.exeewtujpq.exevsipftl.exeecexlse.exelrqnrki.exeawxcwff.exeetaneod.exekjmdjha.exeogpnqqg.exeygpvpyz.exepid process 112 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 112 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 984 ujvcbwj.exe 984 ujvcbwj.exe 1980 irnfkwe.exe 1980 irnfkwe.exe 1776 hgzvpob.exe 1776 hgzvpob.exe 1212 qyvvwmc.exe 1212 qyvvwmc.exe 1904 zijdutd.exe 1904 zijdutd.exe 520 bazigky.exe 520 bazigky.exe 1884 nnpbndw.exe 1884 nnpbndw.exe 1220 gwqrynp.exe 1220 gwqrynp.exe 1544 vbwowil.exe 1544 vbwowil.exe 692 zzrzlrk.exe 692 zzrzlrk.exe 1784 xccutlo.exe 1784 xccutlo.exe 816 wrwkydk.exe 816 wrwkydk.exe 1484 ejhuefb.exe 1484 ejhuefb.exe 1016 eurxaev.exe 1016 eurxaev.exe 2040 azwvngv.exe 2040 azwvngv.exe 648 rvlqjlp.exe 648 rvlqjlp.exe 1724 ttydskp.exe 1724 ttydskp.exe 1356 uwzvgor.exe 1356 uwzvgor.exe 1796 vgxosry.exe 1796 vgxosry.exe 860 cjyrugo.exe 860 cjyrugo.exe 1808 gazwfwt.exe 1808 gazwfwt.exe 1560 sjdbjds.exe 1560 sjdbjds.exe 2012 ewtujpq.exe 2012 ewtujpq.exe 560 vsipftl.exe 560 vsipftl.exe 1456 ecexlse.exe 1456 ecexlse.exe 1688 lrqnrki.exe 1688 lrqnrki.exe 1056 awxcwff.exe 1056 awxcwff.exe 580 etaneod.exe 580 etaneod.exe 1880 kjmdjha.exe 1880 kjmdjha.exe 1300 ogpnqqg.exe 1300 ogpnqqg.exe 796 ygpvpyz.exe 796 ygpvpyz.exe -
Drops file in System32 directory 64 IoCs
Processes:
nnpbndw.exexccutlo.exezufjsdf.exehgzvpob.exezijdutd.exeuwzvgor.exekjmdjha.exelnlaenl.exenuidxai.exegazwfwt.exezxuczoa.exeiwrybje.exeqlkyrbe.exevwrmany.exevccpdqu.exeanwxtwe.exeanwxtwe.exemmhixzs.exedhvcaod.exeweefmez.exejsisoul.exebcaxxnq.exepmvmrpx.exehitpnmr.exeujvcbwj.exebazigky.exesqssjzp.exekiohnla.exeetaneod.exekiohnla.exegrsyjdr.exejbrndgh.exefjecgro.exeyotyaxy.exelgddgzk.exemuqxgyy.exelxvxbdm.exe1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exeirnfkwe.exeazwvngv.exevsipftl.exeivptsly.exeipdingd.exettydskp.exejsisoul.exedocupee.exeuviaowg.exezlexdxc.exeasybweb.exelfotvqz.exesdioamn.exeqvgkbvt.exefqbkijj.exedxpmbno.exemaitimk.exeaflsnhu.exevwrmany.exeogpnqqg.exeasybweb.execrerlnx.exekcqyavd.exedescription ioc process File opened for modification C:\Windows\SysWOW64\nnpbndw.exe nnpbndw.exe File opened for modification C:\Windows\SysWOW64\xccutlo.exe xccutlo.exe File created C:\Windows\SysWOW64\dhvcaod.exe zufjsdf.exe File opened for modification C:\Windows\SysWOW64\qyvvwmc.exe hgzvpob.exe File opened for modification C:\Windows\SysWOW64\zijdutd.exe zijdutd.exe File opened for modification C:\Windows\SysWOW64\uwzvgor.exe uwzvgor.exe File opened for modification C:\Windows\SysWOW64\kjmdjha.exe kjmdjha.exe File opened for modification C:\Windows\SysWOW64\vfzaklm.exe lnlaenl.exe File opened for modification C:\Windows\SysWOW64\khfjppy.exe nuidxai.exe File created C:\Windows\SysWOW64\sjdbjds.exe gazwfwt.exe File opened for modification C:\Windows\SysWOW64\fbdjkpc.exe zxuczoa.exe File opened for modification C:\Windows\SysWOW64\iwrybje.exe iwrybje.exe File opened for modification C:\Windows\SysWOW64\qlkyrbe.exe qlkyrbe.exe File opened for modification C:\Windows\SysWOW64\vwrmany.exe vwrmany.exe File opened for modification C:\Windows\SysWOW64\fjecgro.exe vccpdqu.exe File opened for modification C:\Windows\SysWOW64\anwxtwe.exe anwxtwe.exe File opened for modification C:\Windows\SysWOW64\vwcudjk.exe anwxtwe.exe File created C:\Windows\SysWOW64\gzvqrfk.exe mmhixzs.exe File opened for modification C:\Windows\SysWOW64\dhvcaod.exe dhvcaod.exe File opened for modification C:\Windows\SysWOW64\ltodeqq.exe weefmez.exe File opened for modification C:\Windows\SysWOW64\jsisoul.exe jsisoul.exe File created C:\Windows\SysWOW64\aflsnhu.exe bcaxxnq.exe File opened for modification C:\Windows\SysWOW64\pmvmrpx.exe pmvmrpx.exe File opened for modification C:\Windows\SysWOW64\tvaamxp.exe hitpnmr.exe File created C:\Windows\SysWOW64\irnfkwe.exe ujvcbwj.exe File opened for modification C:\Windows\SysWOW64\bazigky.exe bazigky.exe File opened for modification C:\Windows\SysWOW64\sqssjzp.exe sqssjzp.exe File opened for modification C:\Windows\SysWOW64\kiohnla.exe kiohnla.exe File created C:\Windows\SysWOW64\kjmdjha.exe etaneod.exe File opened for modification C:\Windows\SysWOW64\docupee.exe kiohnla.exe File created C:\Windows\SysWOW64\nvaamrg.exe grsyjdr.exe File opened for modification C:\Windows\SysWOW64\nvaamrg.exe grsyjdr.exe File opened for modification C:\Windows\SysWOW64\vohgdrf.exe jbrndgh.exe File created C:\Windows\SysWOW64\lnlaenl.exe fjecgro.exe File opened for modification C:\Windows\SysWOW64\znfejfz.exe yotyaxy.exe File created C:\Windows\SysWOW64\vohgdrf.exe jbrndgh.exe File opened for modification C:\Windows\SysWOW64\lgddgzk.exe lgddgzk.exe File opened for modification C:\Windows\SysWOW64\weefmez.exe muqxgyy.exe File opened for modification C:\Windows\SysWOW64\lxvxbdm.exe lxvxbdm.exe File created C:\Windows\SysWOW64\ujvcbwj.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe File opened for modification C:\Windows\SysWOW64\hgzvpob.exe irnfkwe.exe File opened for modification C:\Windows\SysWOW64\azwvngv.exe azwvngv.exe File opened for modification C:\Windows\SysWOW64\vsipftl.exe vsipftl.exe File opened for modification C:\Windows\SysWOW64\zvparur.exe ivptsly.exe File created C:\Windows\SysWOW64\xqysipb.exe ipdingd.exe File created C:\Windows\SysWOW64\uwzvgor.exe ttydskp.exe File opened for modification C:\Windows\SysWOW64\ipdingd.exe jsisoul.exe File created C:\Windows\SysWOW64\pmvmrpx.exe docupee.exe File created C:\Windows\SysWOW64\dnwiudh.exe uviaowg.exe File opened for modification C:\Windows\SysWOW64\zlexdxc.exe zlexdxc.exe File opened for modification C:\Windows\SysWOW64\asybweb.exe asybweb.exe File opened for modification C:\Windows\SysWOW64\lfotvqz.exe lfotvqz.exe File opened for modification C:\Windows\SysWOW64\yefqijr.exe sdioamn.exe File opened for modification C:\Windows\SysWOW64\fobvwmj.exe qvgkbvt.exe File opened for modification C:\Windows\SysWOW64\fqbkijj.exe fqbkijj.exe File opened for modification C:\Windows\SysWOW64\irnfkwe.exe ujvcbwj.exe File opened for modification C:\Windows\SysWOW64\voecznf.exe dxpmbno.exe File opened for modification C:\Windows\SysWOW64\maitimk.exe maitimk.exe File opened for modification C:\Windows\SysWOW64\thnsnvr.exe aflsnhu.exe File created C:\Windows\SysWOW64\hyvrxcy.exe vwrmany.exe File opened for modification C:\Windows\SysWOW64\ygpvpyz.exe ogpnqqg.exe File created C:\Windows\SysWOW64\lfotvqz.exe asybweb.exe File opened for modification C:\Windows\SysWOW64\crerlnx.exe crerlnx.exe File created C:\Windows\SysWOW64\wpgizhc.exe kcqyavd.exe -
Suspicious use of SetThreadContext 64 IoCs
Processes:
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exeujvcbwj.exeirnfkwe.exehgzvpob.exeqyvvwmc.exezijdutd.exebazigky.exennpbndw.exegwqrynp.exevbwowil.exezzrzlrk.exexccutlo.exewrwkydk.exeejhuefb.exeeurxaev.exeazwvngv.exervlqjlp.exettydskp.exeuwzvgor.exevgxosry.execjyrugo.exegazwfwt.exesjdbjds.exeewtujpq.exevsipftl.exeecexlse.exelrqnrki.exeawxcwff.exeetaneod.exekjmdjha.exeogpnqqg.exeygpvpyz.exehyddvwa.exetzqjaes.exefjuoxtr.exeowtbgwr.exedxpmbno.exevoecznf.exefuhpdhz.exelvmsldd.exedumakee.exeexmilcr.exeivptsly.exezvparur.exejndjxss.exevoiouzr.exeensogoq.exeqxxtkvq.exehwxbjwj.exewlpzbjh.exeanwxtwe.exevwcudjk.exepnbhacj.exejsisoul.exeipdingd.exexqysipb.exeolvvetv.exeanabibm.exemaitimk.exeaizwqmn.exekwcrmoi.exenndowen.execyzrthm.exezlexdxc.exedescription pid process target process PID 1964 set thread context of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 1116 set thread context of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 324 set thread context of 1980 324 irnfkwe.exe irnfkwe.exe PID 1220 set thread context of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1504 set thread context of 1212 1504 qyvvwmc.exe qyvvwmc.exe PID 1732 set thread context of 1904 1732 zijdutd.exe zijdutd.exe PID 2008 set thread context of 520 2008 bazigky.exe bazigky.exe PID 796 set thread context of 1884 796 nnpbndw.exe nnpbndw.exe PID 1368 set thread context of 1220 1368 gwqrynp.exe gwqrynp.exe PID 952 set thread context of 1544 952 vbwowil.exe vbwowil.exe PID 1988 set thread context of 692 1988 zzrzlrk.exe zzrzlrk.exe PID 1592 set thread context of 1784 1592 xccutlo.exe xccutlo.exe PID 1268 set thread context of 816 1268 wrwkydk.exe wrwkydk.exe PID 1940 set thread context of 1484 1940 ejhuefb.exe ejhuefb.exe PID 1192 set thread context of 1016 1192 eurxaev.exe eurxaev.exe PID 1732 set thread context of 2040 1732 azwvngv.exe azwvngv.exe PID 1948 set thread context of 648 1948 rvlqjlp.exe rvlqjlp.exe PID 676 set thread context of 1724 676 ttydskp.exe ttydskp.exe PID 1708 set thread context of 1356 1708 uwzvgor.exe uwzvgor.exe PID 1940 set thread context of 1796 1940 vgxosry.exe vgxosry.exe PID 1284 set thread context of 860 1284 cjyrugo.exe cjyrugo.exe PID 556 set thread context of 1808 556 gazwfwt.exe gazwfwt.exe PID 592 set thread context of 1560 592 sjdbjds.exe sjdbjds.exe PID 656 set thread context of 2012 656 ewtujpq.exe ewtujpq.exe PID 1888 set thread context of 560 1888 vsipftl.exe vsipftl.exe PID 1300 set thread context of 1456 1300 ecexlse.exe ecexlse.exe PID 1336 set thread context of 1688 1336 lrqnrki.exe lrqnrki.exe PID 2020 set thread context of 1056 2020 awxcwff.exe awxcwff.exe PID 996 set thread context of 580 996 etaneod.exe etaneod.exe PID 1040 set thread context of 1880 1040 kjmdjha.exe kjmdjha.exe PID 1576 set thread context of 1300 1576 ogpnqqg.exe ogpnqqg.exe PID 1948 set thread context of 796 1948 ygpvpyz.exe ygpvpyz.exe PID 1692 set thread context of 1280 1692 hyddvwa.exe hyddvwa.exe PID 1816 set thread context of 1696 1816 tzqjaes.exe tzqjaes.exe PID 896 set thread context of 1040 896 fjuoxtr.exe fjuoxtr.exe PID 1960 set thread context of 428 1960 owtbgwr.exe owtbgwr.exe PID 1032 set thread context of 1376 1032 dxpmbno.exe dxpmbno.exe PID 1600 set thread context of 568 1600 voecznf.exe voecznf.exe PID 888 set thread context of 1816 888 fuhpdhz.exe fuhpdhz.exe PID 1460 set thread context of 1296 1460 lvmsldd.exe lvmsldd.exe PID 1504 set thread context of 844 1504 dumakee.exe dumakee.exe PID 892 set thread context of 944 892 exmilcr.exe exmilcr.exe PID 956 set thread context of 1732 956 ivptsly.exe ivptsly.exe PID 656 set thread context of 772 656 zvparur.exe zvparur.exe PID 2004 set thread context of 1888 2004 jndjxss.exe jndjxss.exe PID 1736 set thread context of 896 1736 voiouzr.exe voiouzr.exe PID 940 set thread context of 820 940 ensogoq.exe ensogoq.exe PID 1892 set thread context of 1476 1892 qxxtkvq.exe qxxtkvq.exe PID 1480 set thread context of 268 1480 hwxbjwj.exe hwxbjwj.exe PID 1176 set thread context of 1804 1176 wlpzbjh.exe wlpzbjh.exe PID 1032 set thread context of 676 1032 anwxtwe.exe anwxtwe.exe PID 2008 set thread context of 888 2008 vwcudjk.exe vwcudjk.exe PID 1900 set thread context of 1988 1900 pnbhacj.exe pnbhacj.exe PID 1848 set thread context of 240 1848 jsisoul.exe jsisoul.exe PID 1664 set thread context of 324 1664 ipdingd.exe ipdingd.exe PID 1740 set thread context of 956 1740 xqysipb.exe xqysipb.exe PID 1656 set thread context of 1632 1656 olvvetv.exe olvvetv.exe PID 1100 set thread context of 1576 1100 anabibm.exe anabibm.exe PID 1928 set thread context of 2000 1928 maitimk.exe maitimk.exe PID 1736 set thread context of 1448 1736 aizwqmn.exe aizwqmn.exe PID 1760 set thread context of 1968 1760 kwcrmoi.exe kwcrmoi.exe PID 912 set thread context of 2016 912 nndowen.exe nndowen.exe PID 384 set thread context of 1948 384 cyzrthm.exe cyzrthm.exe PID 1964 set thread context of 612 1964 zlexdxc.exe zlexdxc.exe -
Modifies registry class 64 IoCs
Processes:
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ = "_Class1" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\TypeLib 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\Implemented Categories 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adadadada.Class2\Clsid\ = "{F7814234-0237-4DFC-9D71-0F36D48D09D0}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\TypeLib\ = "{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\ProxyStubClsid32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\Programmable 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ = "Class1" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\ = "Class1" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}\1.0 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\VERSION\ = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\adadadada.Class1 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\ProxyStubClsid 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adadadada.mdsaaaaad\ = "adadadada.mdsaaaaad" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\ProgID\ = "adadadada.Class1" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ = "_Class1" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406}\TypeLib\ = "{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\TypeLib 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\ = "adadadada.mdsaaaaad" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\ = "adadadada.Class2" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}\1.0\FLAGS\ = "0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ProxyStubClsid32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406}\ProxyStubClsid32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\TypeLib 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\ = "__Class1" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\TypeLib 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\TypeLib\Version = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\adadadada.Class2 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}\1.0\0 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\VERSION 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\ProgID 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\VERSION\ = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ProxyStubClsid 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406}\ = "_Class2" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\ProxyStubClsid 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\TypeLib\ = "{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\TypeLib\Version = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\ProgID\ = "adadadada.Class2" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\TypeLib\ = "{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\ProxyStubClsid32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}\1.0\HELPDIR 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\TypeLib\Version = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\TypeLib 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406}\TypeLib\Version = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adadadada.Class2\ = "adadadada.Class2" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\Implemented Categories 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\ProgID 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\Implemented Categories 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\Programmable 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exeujvcbwj.exeirnfkwe.exehgzvpob.exeqyvvwmc.exezijdutd.exebazigky.exennpbndw.exegwqrynp.exevbwowil.exezzrzlrk.exexccutlo.exewrwkydk.exeejhuefb.exeeurxaev.exeazwvngv.exervlqjlp.exettydskp.exeuwzvgor.exevgxosry.execjyrugo.exegazwfwt.exesjdbjds.exeewtujpq.exevsipftl.exeecexlse.exelrqnrki.exeawxcwff.exeetaneod.exekjmdjha.exeogpnqqg.exeygpvpyz.exehyddvwa.exetzqjaes.exefjuoxtr.exeowtbgwr.exedxpmbno.exevoecznf.exefuhpdhz.exelvmsldd.exedumakee.exeexmilcr.exeivptsly.exezvparur.exejndjxss.exevoiouzr.exeensogoq.exeqxxtkvq.exehwxbjwj.exewlpzbjh.exeanwxtwe.exevwcudjk.exepnbhacj.exejsisoul.exeipdingd.exexqysipb.exeolvvetv.exeanabibm.exemaitimk.exeaizwqmn.exekwcrmoi.exenndowen.execyzrthm.exezlexdxc.exepid process 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1116 ujvcbwj.exe 324 irnfkwe.exe 1220 hgzvpob.exe 1504 qyvvwmc.exe 1732 zijdutd.exe 2008 bazigky.exe 796 nnpbndw.exe 1368 gwqrynp.exe 952 vbwowil.exe 1988 zzrzlrk.exe 1592 xccutlo.exe 1268 wrwkydk.exe 1940 ejhuefb.exe 1192 eurxaev.exe 1732 azwvngv.exe 1948 rvlqjlp.exe 676 ttydskp.exe 1708 uwzvgor.exe 1940 vgxosry.exe 1284 cjyrugo.exe 556 gazwfwt.exe 592 sjdbjds.exe 656 ewtujpq.exe 1888 vsipftl.exe 1300 ecexlse.exe 1336 lrqnrki.exe 2020 awxcwff.exe 996 etaneod.exe 1040 kjmdjha.exe 1576 ogpnqqg.exe 1948 ygpvpyz.exe 1692 hyddvwa.exe 1816 tzqjaes.exe 896 fjuoxtr.exe 1960 owtbgwr.exe 1032 dxpmbno.exe 1600 voecznf.exe 888 fuhpdhz.exe 1460 lvmsldd.exe 1504 dumakee.exe 892 exmilcr.exe 956 ivptsly.exe 656 zvparur.exe 2004 jndjxss.exe 1736 voiouzr.exe 940 ensogoq.exe 1892 qxxtkvq.exe 1480 hwxbjwj.exe 1176 wlpzbjh.exe 1032 anwxtwe.exe 2008 vwcudjk.exe 1900 pnbhacj.exe 1848 jsisoul.exe 1664 ipdingd.exe 1740 xqysipb.exe 1656 olvvetv.exe 1100 anabibm.exe 1928 maitimk.exe 1736 aizwqmn.exe 1760 kwcrmoi.exe 912 nndowen.exe 384 cyzrthm.exe 1964 zlexdxc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exeujvcbwj.exeujvcbwj.exeirnfkwe.exeirnfkwe.exehgzvpob.exehgzvpob.exeqyvvwmc.exedescription pid process target process PID 1964 wrote to memory of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 1964 wrote to memory of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 1964 wrote to memory of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 1964 wrote to memory of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 1964 wrote to memory of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 1964 wrote to memory of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 1964 wrote to memory of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 1964 wrote to memory of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 1964 wrote to memory of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 1964 wrote to memory of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 1964 wrote to memory of 112 1964 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 112 wrote to memory of 1116 112 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe ujvcbwj.exe PID 112 wrote to memory of 1116 112 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe ujvcbwj.exe PID 112 wrote to memory of 1116 112 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe ujvcbwj.exe PID 112 wrote to memory of 1116 112 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe ujvcbwj.exe PID 1116 wrote to memory of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 1116 wrote to memory of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 1116 wrote to memory of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 1116 wrote to memory of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 1116 wrote to memory of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 1116 wrote to memory of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 1116 wrote to memory of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 1116 wrote to memory of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 1116 wrote to memory of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 1116 wrote to memory of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 1116 wrote to memory of 984 1116 ujvcbwj.exe ujvcbwj.exe PID 984 wrote to memory of 324 984 ujvcbwj.exe irnfkwe.exe PID 984 wrote to memory of 324 984 ujvcbwj.exe irnfkwe.exe PID 984 wrote to memory of 324 984 ujvcbwj.exe irnfkwe.exe PID 984 wrote to memory of 324 984 ujvcbwj.exe irnfkwe.exe PID 324 wrote to memory of 1980 324 irnfkwe.exe irnfkwe.exe PID 324 wrote to memory of 1980 324 irnfkwe.exe irnfkwe.exe PID 324 wrote to memory of 1980 324 irnfkwe.exe irnfkwe.exe PID 324 wrote to memory of 1980 324 irnfkwe.exe irnfkwe.exe PID 324 wrote to memory of 1980 324 irnfkwe.exe irnfkwe.exe PID 324 wrote to memory of 1980 324 irnfkwe.exe irnfkwe.exe PID 324 wrote to memory of 1980 324 irnfkwe.exe irnfkwe.exe PID 324 wrote to memory of 1980 324 irnfkwe.exe irnfkwe.exe PID 324 wrote to memory of 1980 324 irnfkwe.exe irnfkwe.exe PID 324 wrote to memory of 1980 324 irnfkwe.exe irnfkwe.exe PID 324 wrote to memory of 1980 324 irnfkwe.exe irnfkwe.exe PID 1980 wrote to memory of 1220 1980 irnfkwe.exe hgzvpob.exe PID 1980 wrote to memory of 1220 1980 irnfkwe.exe hgzvpob.exe PID 1980 wrote to memory of 1220 1980 irnfkwe.exe hgzvpob.exe PID 1980 wrote to memory of 1220 1980 irnfkwe.exe hgzvpob.exe PID 1220 wrote to memory of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1220 wrote to memory of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1220 wrote to memory of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1220 wrote to memory of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1220 wrote to memory of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1220 wrote to memory of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1220 wrote to memory of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1220 wrote to memory of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1220 wrote to memory of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1220 wrote to memory of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1220 wrote to memory of 1776 1220 hgzvpob.exe hgzvpob.exe PID 1776 wrote to memory of 1504 1776 hgzvpob.exe qyvvwmc.exe PID 1776 wrote to memory of 1504 1776 hgzvpob.exe qyvvwmc.exe PID 1776 wrote to memory of 1504 1776 hgzvpob.exe qyvvwmc.exe PID 1776 wrote to memory of 1504 1776 hgzvpob.exe qyvvwmc.exe PID 1504 wrote to memory of 1212 1504 qyvvwmc.exe qyvvwmc.exe PID 1504 wrote to memory of 1212 1504 qyvvwmc.exe qyvvwmc.exe PID 1504 wrote to memory of 1212 1504 qyvvwmc.exe qyvvwmc.exe PID 1504 wrote to memory of 1212 1504 qyvvwmc.exe qyvvwmc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe"C:\Users\Admin\AppData\Local\Temp\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe"C:\Users\Admin\AppData\Local\Temp\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ujvcbwj.exeC:\Windows\system32\ujvcbwj.exe 496 "C:\Users\Admin\AppData\Local\Temp\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ujvcbwj.exe"C:\Windows\SysWOW64\ujvcbwj.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\irnfkwe.exeC:\Windows\system32\irnfkwe.exe 528 "C:\Windows\SysWOW64\ujvcbwj.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\irnfkwe.exe"C:\Windows\SysWOW64\irnfkwe.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\hgzvpob.exeC:\Windows\system32\hgzvpob.exe 536 "C:\Windows\SysWOW64\irnfkwe.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\hgzvpob.exe"C:\Windows\SysWOW64\hgzvpob.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\qyvvwmc.exeC:\Windows\system32\qyvvwmc.exe 528 "C:\Windows\SysWOW64\hgzvpob.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\qyvvwmc.exe"C:\Windows\SysWOW64\qyvvwmc.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\zijdutd.exeC:\Windows\system32\zijdutd.exe 536 "C:\Windows\SysWOW64\qyvvwmc.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\zijdutd.exe"C:\Windows\SysWOW64\zijdutd.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\bazigky.exeC:\Windows\system32\bazigky.exe 528 "C:\Windows\SysWOW64\zijdutd.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\bazigky.exe"C:\Windows\SysWOW64\bazigky.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\nnpbndw.exeC:\Windows\system32\nnpbndw.exe 536 "C:\Windows\SysWOW64\bazigky.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\nnpbndw.exe"C:\Windows\SysWOW64\nnpbndw.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\gwqrynp.exeC:\Windows\system32\gwqrynp.exe 528 "C:\Windows\SysWOW64\nnpbndw.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\gwqrynp.exe"C:\Windows\SysWOW64\gwqrynp.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\vbwowil.exeC:\Windows\system32\vbwowil.exe 532 "C:\Windows\SysWOW64\gwqrynp.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\vbwowil.exe"C:\Windows\SysWOW64\vbwowil.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\zzrzlrk.exeC:\Windows\system32\zzrzlrk.exe 536 "C:\Windows\SysWOW64\vbwowil.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\zzrzlrk.exe"C:\Windows\SysWOW64\zzrzlrk.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\xccutlo.exeC:\Windows\system32\xccutlo.exe 528 "C:\Windows\SysWOW64\zzrzlrk.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\xccutlo.exe"C:\Windows\SysWOW64\xccutlo.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\wrwkydk.exeC:\Windows\system32\wrwkydk.exe 536 "C:\Windows\SysWOW64\xccutlo.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wrwkydk.exe"C:\Windows\SysWOW64\wrwkydk.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\ejhuefb.exeC:\Windows\system32\ejhuefb.exe 540 "C:\Windows\SysWOW64\wrwkydk.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ejhuefb.exe"C:\Windows\SysWOW64\ejhuefb.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\eurxaev.exeC:\Windows\system32\eurxaev.exe 540 "C:\Windows\SysWOW64\ejhuefb.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\eurxaev.exe"C:\Windows\SysWOW64\eurxaev.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\azwvngv.exeC:\Windows\system32\azwvngv.exe 544 "C:\Windows\SysWOW64\eurxaev.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\azwvngv.exe"C:\Windows\SysWOW64\azwvngv.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\rvlqjlp.exeC:\Windows\system32\rvlqjlp.exe 528 "C:\Windows\SysWOW64\azwvngv.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rvlqjlp.exe"C:\Windows\SysWOW64\rvlqjlp.exe"34⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\ttydskp.exeC:\Windows\system32\ttydskp.exe 532 "C:\Windows\SysWOW64\rvlqjlp.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ttydskp.exe"C:\Windows\SysWOW64\ttydskp.exe"36⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\uwzvgor.exeC:\Windows\system32\uwzvgor.exe 528 "C:\Windows\SysWOW64\ttydskp.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\uwzvgor.exe"C:\Windows\SysWOW64\uwzvgor.exe"38⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\vgxosry.exeC:\Windows\system32\vgxosry.exe 528 "C:\Windows\SysWOW64\uwzvgor.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\vgxosry.exe"C:\Windows\SysWOW64\vgxosry.exe"40⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cjyrugo.exeC:\Windows\system32\cjyrugo.exe 528 "C:\Windows\SysWOW64\vgxosry.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cjyrugo.exe"C:\Windows\SysWOW64\cjyrugo.exe"42⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\gazwfwt.exeC:\Windows\system32\gazwfwt.exe 536 "C:\Windows\SysWOW64\cjyrugo.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\gazwfwt.exe"C:\Windows\SysWOW64\gazwfwt.exe"44⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\sjdbjds.exeC:\Windows\system32\sjdbjds.exe 532 "C:\Windows\SysWOW64\gazwfwt.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\sjdbjds.exe"C:\Windows\SysWOW64\sjdbjds.exe"46⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\ewtujpq.exeC:\Windows\system32\ewtujpq.exe 536 "C:\Windows\SysWOW64\sjdbjds.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ewtujpq.exe"C:\Windows\SysWOW64\ewtujpq.exe"48⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\vsipftl.exeC:\Windows\system32\vsipftl.exe 540 "C:\Windows\SysWOW64\ewtujpq.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\vsipftl.exe"C:\Windows\SysWOW64\vsipftl.exe"50⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\ecexlse.exeC:\Windows\system32\ecexlse.exe 536 "C:\Windows\SysWOW64\vsipftl.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ecexlse.exe"C:\Windows\SysWOW64\ecexlse.exe"52⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\lrqnrki.exeC:\Windows\system32\lrqnrki.exe 532 "C:\Windows\SysWOW64\ecexlse.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\lrqnrki.exe"C:\Windows\SysWOW64\lrqnrki.exe"54⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\awxcwff.exeC:\Windows\system32\awxcwff.exe 540 "C:\Windows\SysWOW64\lrqnrki.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\awxcwff.exe"C:\Windows\SysWOW64\awxcwff.exe"56⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\etaneod.exeC:\Windows\system32\etaneod.exe 532 "C:\Windows\SysWOW64\awxcwff.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\etaneod.exe"C:\Windows\SysWOW64\etaneod.exe"58⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\kjmdjha.exeC:\Windows\system32\kjmdjha.exe 536 "C:\Windows\SysWOW64\etaneod.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\kjmdjha.exe"C:\Windows\SysWOW64\kjmdjha.exe"60⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\ogpnqqg.exeC:\Windows\system32\ogpnqqg.exe 540 "C:\Windows\SysWOW64\kjmdjha.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ogpnqqg.exe"C:\Windows\SysWOW64\ogpnqqg.exe"62⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\ygpvpyz.exeC:\Windows\system32\ygpvpyz.exe 528 "C:\Windows\SysWOW64\ogpnqqg.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ygpvpyz.exe"C:\Windows\SysWOW64\ygpvpyz.exe"64⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\hyddvwa.exeC:\Windows\system32\hyddvwa.exe 544 "C:\Windows\SysWOW64\ygpvpyz.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\hyddvwa.exe"C:\Windows\SysWOW64\hyddvwa.exe"66⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\tzqjaes.exeC:\Windows\system32\tzqjaes.exe 536 "C:\Windows\SysWOW64\hyddvwa.exe"67⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\tzqjaes.exe"C:\Windows\SysWOW64\tzqjaes.exe"68⤵
-
C:\Windows\SysWOW64\fjuoxtr.exeC:\Windows\system32\fjuoxtr.exe 532 "C:\Windows\SysWOW64\tzqjaes.exe"69⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\fjuoxtr.exe"C:\Windows\SysWOW64\fjuoxtr.exe"70⤵
-
C:\Windows\SysWOW64\owtbgwr.exeC:\Windows\system32\owtbgwr.exe 540 "C:\Windows\SysWOW64\fjuoxtr.exe"71⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\owtbgwr.exe"C:\Windows\SysWOW64\owtbgwr.exe"72⤵
-
C:\Windows\SysWOW64\dxpmbno.exeC:\Windows\system32\dxpmbno.exe 536 "C:\Windows\SysWOW64\owtbgwr.exe"73⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\dxpmbno.exe"C:\Windows\SysWOW64\dxpmbno.exe"74⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\voecznf.exeC:\Windows\system32\voecznf.exe 532 "C:\Windows\SysWOW64\dxpmbno.exe"75⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\voecznf.exe"C:\Windows\SysWOW64\voecznf.exe"76⤵
-
C:\Windows\SysWOW64\fuhpdhz.exeC:\Windows\system32\fuhpdhz.exe 532 "C:\Windows\SysWOW64\voecznf.exe"77⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\fuhpdhz.exe"C:\Windows\SysWOW64\fuhpdhz.exe"78⤵
-
C:\Windows\SysWOW64\lvmsldd.exeC:\Windows\system32\lvmsldd.exe 540 "C:\Windows\SysWOW64\fuhpdhz.exe"79⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\lvmsldd.exe"C:\Windows\SysWOW64\lvmsldd.exe"80⤵
-
C:\Windows\SysWOW64\dumakee.exeC:\Windows\system32\dumakee.exe 544 "C:\Windows\SysWOW64\lvmsldd.exe"81⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\dumakee.exe"C:\Windows\SysWOW64\dumakee.exe"82⤵
-
C:\Windows\SysWOW64\exmilcr.exeC:\Windows\system32\exmilcr.exe 544 "C:\Windows\SysWOW64\dumakee.exe"83⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\exmilcr.exe"C:\Windows\SysWOW64\exmilcr.exe"84⤵
-
C:\Windows\SysWOW64\ivptsly.exeC:\Windows\system32\ivptsly.exe 536 "C:\Windows\SysWOW64\exmilcr.exe"85⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ivptsly.exe"C:\Windows\SysWOW64\ivptsly.exe"86⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\zvparur.exeC:\Windows\system32\zvparur.exe 532 "C:\Windows\SysWOW64\ivptsly.exe"87⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\zvparur.exe"C:\Windows\SysWOW64\zvparur.exe"88⤵
-
C:\Windows\SysWOW64\jndjxss.exeC:\Windows\system32\jndjxss.exe 536 "C:\Windows\SysWOW64\zvparur.exe"89⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\jndjxss.exe"C:\Windows\SysWOW64\jndjxss.exe"90⤵
-
C:\Windows\SysWOW64\voiouzr.exeC:\Windows\system32\voiouzr.exe 532 "C:\Windows\SysWOW64\jndjxss.exe"91⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\voiouzr.exe"C:\Windows\SysWOW64\voiouzr.exe"92⤵
-
C:\Windows\SysWOW64\ensogoq.exeC:\Windows\system32\ensogoq.exe 540 "C:\Windows\SysWOW64\voiouzr.exe"93⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ensogoq.exe"C:\Windows\SysWOW64\ensogoq.exe"94⤵
-
C:\Windows\SysWOW64\qxxtkvq.exeC:\Windows\system32\qxxtkvq.exe 532 "C:\Windows\SysWOW64\ensogoq.exe"95⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\qxxtkvq.exe"C:\Windows\SysWOW64\qxxtkvq.exe"96⤵
-
C:\Windows\SysWOW64\hwxbjwj.exeC:\Windows\system32\hwxbjwj.exe 540 "C:\Windows\SysWOW64\qxxtkvq.exe"97⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\hwxbjwj.exe"C:\Windows\SysWOW64\hwxbjwj.exe"98⤵
-
C:\Windows\SysWOW64\wlpzbjh.exeC:\Windows\system32\wlpzbjh.exe 532 "C:\Windows\SysWOW64\hwxbjwj.exe"99⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wlpzbjh.exe"C:\Windows\SysWOW64\wlpzbjh.exe"100⤵
-
C:\Windows\SysWOW64\anwxtwe.exeC:\Windows\system32\anwxtwe.exe 536 "C:\Windows\SysWOW64\wlpzbjh.exe"101⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\anwxtwe.exe"C:\Windows\SysWOW64\anwxtwe.exe"102⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\vwcudjk.exeC:\Windows\system32\vwcudjk.exe 528 "C:\Windows\SysWOW64\anwxtwe.exe"103⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\vwcudjk.exe"C:\Windows\SysWOW64\vwcudjk.exe"104⤵
-
C:\Windows\SysWOW64\pnbhacj.exeC:\Windows\system32\pnbhacj.exe 532 "C:\Windows\SysWOW64\vwcudjk.exe"105⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\pnbhacj.exe"C:\Windows\SysWOW64\pnbhacj.exe"106⤵
-
C:\Windows\SysWOW64\jsisoul.exeC:\Windows\system32\jsisoul.exe 532 "C:\Windows\SysWOW64\pnbhacj.exe"107⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\jsisoul.exe"C:\Windows\SysWOW64\jsisoul.exe"108⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\ipdingd.exeC:\Windows\system32\ipdingd.exe 528 "C:\Windows\SysWOW64\jsisoul.exe"109⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ipdingd.exe"C:\Windows\SysWOW64\ipdingd.exe"110⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\xqysipb.exeC:\Windows\system32\xqysipb.exe 548 "C:\Windows\SysWOW64\ipdingd.exe"111⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\xqysipb.exe"C:\Windows\SysWOW64\xqysipb.exe"112⤵
-
C:\Windows\SysWOW64\olvvetv.exeC:\Windows\system32\olvvetv.exe 532 "C:\Windows\SysWOW64\xqysipb.exe"113⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\olvvetv.exe"C:\Windows\SysWOW64\olvvetv.exe"114⤵
-
C:\Windows\SysWOW64\anabibm.exeC:\Windows\system32\anabibm.exe 540 "C:\Windows\SysWOW64\olvvetv.exe"115⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\anabibm.exe"C:\Windows\SysWOW64\anabibm.exe"116⤵
-
C:\Windows\SysWOW64\maitimk.exeC:\Windows\system32\maitimk.exe 532 "C:\Windows\SysWOW64\anabibm.exe"117⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\maitimk.exe"C:\Windows\SysWOW64\maitimk.exe"118⤵
-
C:\Windows\SysWOW64\aizwqmn.exeC:\Windows\system32\aizwqmn.exe 536 "C:\Windows\SysWOW64\maitimk.exe"119⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\aizwqmn.exe"C:\Windows\SysWOW64\aizwqmn.exe"120⤵
-
C:\Windows\SysWOW64\kwcrmoi.exeC:\Windows\system32\kwcrmoi.exe 532 "C:\Windows\SysWOW64\aizwqmn.exe"121⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\kwcrmoi.exe"C:\Windows\SysWOW64\kwcrmoi.exe"122⤵
-
C:\Windows\SysWOW64\nndowen.exeC:\Windows\system32\nndowen.exe 544 "C:\Windows\SysWOW64\kwcrmoi.exe"123⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\nndowen.exe"C:\Windows\SysWOW64\nndowen.exe"124⤵
-
C:\Windows\SysWOW64\cyzrthm.exeC:\Windows\system32\cyzrthm.exe 528 "C:\Windows\SysWOW64\nndowen.exe"125⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cyzrthm.exe"C:\Windows\SysWOW64\cyzrthm.exe"126⤵
-
C:\Windows\SysWOW64\zlexdxc.exeC:\Windows\system32\zlexdxc.exe 524 "C:\Windows\SysWOW64\cyzrthm.exe"127⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\zlexdxc.exe"C:\Windows\SysWOW64\zlexdxc.exe"128⤵
-
C:\Windows\SysWOW64\sngpdla.exeC:\Windows\system32\sngpdla.exe 540 "C:\Windows\SysWOW64\zlexdxc.exe"129⤵
-
C:\Windows\SysWOW64\sngpdla.exe"C:\Windows\SysWOW64\sngpdla.exe"130⤵
-
C:\Windows\SysWOW64\hrfnjgw.exeC:\Windows\system32\hrfnjgw.exe 536 "C:\Windows\SysWOW64\sngpdla.exe"131⤵
-
C:\Windows\SysWOW64\hrfnjgw.exe"C:\Windows\SysWOW64\hrfnjgw.exe"132⤵
-
C:\Windows\SysWOW64\besnvmo.exeC:\Windows\system32\besnvmo.exe 544 "C:\Windows\SysWOW64\hrfnjgw.exe"133⤵
-
C:\Windows\SysWOW64\besnvmo.exe"C:\Windows\SysWOW64\besnvmo.exe"134⤵
-
C:\Windows\SysWOW64\nrifcyu.exeC:\Windows\system32\nrifcyu.exe 532 "C:\Windows\SysWOW64\besnvmo.exe"135⤵
-
C:\Windows\SysWOW64\nrifcyu.exe"C:\Windows\SysWOW64\nrifcyu.exe"136⤵
-
C:\Windows\SysWOW64\dnvsgye.exeC:\Windows\system32\dnvsgye.exe 532 "C:\Windows\SysWOW64\nrifcyu.exe"137⤵
-
C:\Windows\SysWOW64\dnvsgye.exe"C:\Windows\SysWOW64\dnvsgye.exe"138⤵
-
C:\Windows\SysWOW64\lgddgzk.exeC:\Windows\system32\lgddgzk.exe 532 "C:\Windows\SysWOW64\dnvsgye.exe"139⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\lgddgzk.exe"C:\Windows\SysWOW64\lgddgzk.exe"140⤵
-
C:\Windows\SysWOW64\mmhixzs.exeC:\Windows\system32\mmhixzs.exe 528 "C:\Windows\SysWOW64\lgddgzk.exe"141⤵
-
C:\Windows\SysWOW64\mmhixzs.exe"C:\Windows\SysWOW64\mmhixzs.exe"142⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\gzvqrfk.exeC:\Windows\system32\gzvqrfk.exe 536 "C:\Windows\SysWOW64\mmhixzs.exe"143⤵
-
C:\Windows\SysWOW64\gzvqrfk.exe"C:\Windows\SysWOW64\gzvqrfk.exe"144⤵
-
C:\Windows\SysWOW64\hvuebpk.exeC:\Windows\system32\hvuebpk.exe 532 "C:\Windows\SysWOW64\gzvqrfk.exe"145⤵
-
C:\Windows\SysWOW64\hvuebpk.exe"C:\Windows\SysWOW64\hvuebpk.exe"146⤵
-
C:\Windows\SysWOW64\yuvlzqd.exeC:\Windows\system32\yuvlzqd.exe 532 "C:\Windows\SysWOW64\hvuebpk.exe"147⤵
-
C:\Windows\SysWOW64\yuvlzqd.exe"C:\Windows\SysWOW64\yuvlzqd.exe"148⤵
-
C:\Windows\SysWOW64\fgdoceb.exeC:\Windows\system32\fgdoceb.exe 536 "C:\Windows\SysWOW64\yuvlzqd.exe"149⤵
-
C:\Windows\SysWOW64\fgdoceb.exe"C:\Windows\SysWOW64\fgdoceb.exe"150⤵
-
C:\Windows\SysWOW64\zxuczoa.exeC:\Windows\system32\zxuczoa.exe 532 "C:\Windows\SysWOW64\fgdoceb.exe"151⤵
-
C:\Windows\SysWOW64\zxuczoa.exe"C:\Windows\SysWOW64\zxuczoa.exe"152⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\fbdjkpc.exeC:\Windows\system32\fbdjkpc.exe 532 "C:\Windows\SysWOW64\zxuczoa.exe"153⤵
-
C:\Windows\SysWOW64\fbdjkpc.exe"C:\Windows\SysWOW64\fbdjkpc.exe"154⤵
-
C:\Windows\SysWOW64\xtpzdqq.exeC:\Windows\system32\xtpzdqq.exe 532 "C:\Windows\SysWOW64\fbdjkpc.exe"155⤵
-
C:\Windows\SysWOW64\xtpzdqq.exe"C:\Windows\SysWOW64\xtpzdqq.exe"156⤵
-
C:\Windows\SysWOW64\lxvxbdm.exeC:\Windows\system32\lxvxbdm.exe 536 "C:\Windows\SysWOW64\xtpzdqq.exe"157⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\lxvxbdm.exe"C:\Windows\SysWOW64\lxvxbdm.exe"158⤵
-
C:\Windows\SysWOW64\sqssjzp.exeC:\Windows\system32\sqssjzp.exe 544 "C:\Windows\SysWOW64\lxvxbdm.exe"159⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\sqssjzp.exe"C:\Windows\SysWOW64\sqssjzp.exe"160⤵
-
C:\Windows\SysWOW64\jpbahiq.exeC:\Windows\system32\jpbahiq.exe 536 "C:\Windows\SysWOW64\sqssjzp.exe"161⤵
-
C:\Windows\SysWOW64\jpbahiq.exe"C:\Windows\SysWOW64\jpbahiq.exe"162⤵
-
C:\Windows\SysWOW64\yqwkkzf.exeC:\Windows\system32\yqwkkzf.exe 540 "C:\Windows\SysWOW64\jpbahiq.exe"163⤵
-
C:\Windows\SysWOW64\yqwkkzf.exe"C:\Windows\SysWOW64\yqwkkzf.exe"164⤵
-
C:\Windows\SysWOW64\chpqnpk.exeC:\Windows\system32\chpqnpk.exe 528 "C:\Windows\SysWOW64\yqwkkzf.exe"165⤵
-
C:\Windows\SysWOW64\chpqnpk.exe"C:\Windows\SysWOW64\chpqnpk.exe"166⤵
-
C:\Windows\SysWOW64\oquvrxk.exeC:\Windows\system32\oquvrxk.exe 536 "C:\Windows\SysWOW64\chpqnpk.exe"167⤵
-
C:\Windows\SysWOW64\oquvrxk.exe"C:\Windows\SysWOW64\oquvrxk.exe"168⤵
-
C:\Windows\SysWOW64\asybweb.exeC:\Windows\system32\asybweb.exe 540 "C:\Windows\SysWOW64\oquvrxk.exe"169⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\asybweb.exe"C:\Windows\SysWOW64\asybweb.exe"170⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\lfotvqz.exeC:\Windows\system32\lfotvqz.exe 536 "C:\Windows\SysWOW64\asybweb.exe"171⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\lfotvqz.exe"C:\Windows\SysWOW64\lfotvqz.exe"172⤵
-
C:\Windows\SysWOW64\yotyaxy.exeC:\Windows\system32\yotyaxy.exe 532 "C:\Windows\SysWOW64\lfotvqz.exe"173⤵
-
C:\Windows\SysWOW64\yotyaxy.exe"C:\Windows\SysWOW64\yotyaxy.exe"174⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\znfejfz.exeC:\Windows\system32\znfejfz.exe 528 "C:\Windows\SysWOW64\yotyaxy.exe"175⤵
-
C:\Windows\SysWOW64\znfejfz.exe"C:\Windows\SysWOW64\znfejfz.exe"176⤵
-
C:\Windows\SysWOW64\sphejux.exeC:\Windows\system32\sphejux.exe 532 "C:\Windows\SysWOW64\znfejfz.exe"177⤵
-
C:\Windows\SysWOW64\sphejux.exe"C:\Windows\SysWOW64\sphejux.exe"178⤵
-
C:\Windows\SysWOW64\wnloqdd.exeC:\Windows\system32\wnloqdd.exe 540 "C:\Windows\SysWOW64\sphejux.exe"179⤵
-
C:\Windows\SysWOW64\wnloqdd.exe"C:\Windows\SysWOW64\wnloqdd.exe"180⤵
-
C:\Windows\SysWOW64\lcvmqpu.exeC:\Windows\system32\lcvmqpu.exe 536 "C:\Windows\SysWOW64\wnloqdd.exe"181⤵
-
C:\Windows\SysWOW64\lcvmqpu.exe"C:\Windows\SysWOW64\lcvmqpu.exe"182⤵
-
C:\Windows\SysWOW64\sgdcbqw.exeC:\Windows\system32\sgdcbqw.exe 528 "C:\Windows\SysWOW64\lcvmqpu.exe"183⤵
-
C:\Windows\SysWOW64\sgdcbqw.exe"C:\Windows\SysWOW64\sgdcbqw.exe"184⤵
-
C:\Windows\SysWOW64\bcaxxnq.exeC:\Windows\system32\bcaxxnq.exe 532 "C:\Windows\SysWOW64\sgdcbqw.exe"185⤵
-
C:\Windows\SysWOW64\bcaxxnq.exe"C:\Windows\SysWOW64\bcaxxnq.exe"186⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\aflsnhu.exeC:\Windows\system32\aflsnhu.exe 536 "C:\Windows\SysWOW64\bcaxxnq.exe"187⤵
-
C:\Windows\SysWOW64\aflsnhu.exe"C:\Windows\SysWOW64\aflsnhu.exe"188⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\thnsnvr.exeC:\Windows\system32\thnsnvr.exe 540 "C:\Windows\SysWOW64\aflsnhu.exe"189⤵
-
C:\Windows\SysWOW64\thnsnvr.exe"C:\Windows\SysWOW64\thnsnvr.exe"190⤵
-
C:\Windows\SysWOW64\grsyjdr.exeC:\Windows\system32\grsyjdr.exe 528 "C:\Windows\SysWOW64\thnsnvr.exe"191⤵
-
C:\Windows\SysWOW64\grsyjdr.exe"C:\Windows\SysWOW64\grsyjdr.exe"192⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\nvaamrg.exeC:\Windows\system32\nvaamrg.exe 536 "C:\Windows\SysWOW64\grsyjdr.exe"193⤵
-
C:\Windows\SysWOW64\nvaamrg.exe"C:\Windows\SysWOW64\nvaamrg.exe"194⤵
-
C:\Windows\SysWOW64\gxdtmfe.exeC:\Windows\system32\gxdtmfe.exe 536 "C:\Windows\SysWOW64\nvaamrg.exe"195⤵
-
C:\Windows\SysWOW64\gxdtmfe.exe"C:\Windows\SysWOW64\gxdtmfe.exe"196⤵
-
C:\Windows\SysWOW64\njeeotc.exeC:\Windows\system32\njeeotc.exe 540 "C:\Windows\SysWOW64\gxdtmfe.exe"197⤵
-
C:\Windows\SysWOW64\njeeotc.exe"C:\Windows\SysWOW64\njeeotc.exe"198⤵
-
C:\Windows\SysWOW64\wtzevad.exeC:\Windows\system32\wtzevad.exe 536 "C:\Windows\SysWOW64\njeeotc.exe"199⤵
-
C:\Windows\SysWOW64\wtzevad.exe"C:\Windows\SysWOW64\wtzevad.exe"200⤵
-
C:\Windows\SysWOW64\kevmaqp.exeC:\Windows\system32\kevmaqp.exe 540 "C:\Windows\SysWOW64\wtzevad.exe"201⤵
-
C:\Windows\SysWOW64\kevmaqp.exe"C:\Windows\SysWOW64\kevmaqp.exe"202⤵
-
C:\Windows\SysWOW64\zufjsdf.exeC:\Windows\system32\zufjsdf.exe 536 "C:\Windows\SysWOW64\kevmaqp.exe"203⤵
-
C:\Windows\SysWOW64\zufjsdf.exe"C:\Windows\SysWOW64\zufjsdf.exe"204⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\dhvcaod.exeC:\Windows\system32\dhvcaod.exe 532 "C:\Windows\SysWOW64\zufjsdf.exe"205⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\dhvcaod.exe"C:\Windows\SysWOW64\dhvcaod.exe"206⤵
-
C:\Windows\SysWOW64\pqahwwd.exeC:\Windows\system32\pqahwwd.exe 536 "C:\Windows\SysWOW64\dhvcaod.exe"207⤵
-
C:\Windows\SysWOW64\pqahwwd.exe"C:\Windows\SysWOW64\pqahwwd.exe"208⤵
-
C:\Windows\SysWOW64\bhbegma.exeC:\Windows\system32\bhbegma.exe 532 "C:\Windows\SysWOW64\pqahwwd.exe"209⤵
-
C:\Windows\SysWOW64\bhbegma.exe"C:\Windows\SysWOW64\bhbegma.exe"210⤵
-
C:\Windows\SysWOW64\muqxgyy.exeC:\Windows\system32\muqxgyy.exe 536 "C:\Windows\SysWOW64\bhbegma.exe"211⤵
-
C:\Windows\SysWOW64\muqxgyy.exe"C:\Windows\SysWOW64\muqxgyy.exe"212⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\weefmez.exeC:\Windows\system32\weefmez.exe 536 "C:\Windows\SysWOW64\muqxgyy.exe"213⤵
-
C:\Windows\SysWOW64\weefmez.exe"C:\Windows\SysWOW64\weefmez.exe"214⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\ltodeqq.exeC:\Windows\system32\ltodeqq.exe 540 "C:\Windows\SysWOW64\weefmez.exe"215⤵
-
C:\Windows\SysWOW64\ltodeqq.exe"C:\Windows\SysWOW64\ltodeqq.exe"216⤵
-
C:\Windows\SysWOW64\uszdrxx.exeC:\Windows\system32\uszdrxx.exe 532 "C:\Windows\SysWOW64\ltodeqq.exe"217⤵
-
C:\Windows\SysWOW64\uszdrxx.exe"C:\Windows\SysWOW64\uszdrxx.exe"218⤵
-
C:\Windows\SysWOW64\behgtlu.exeC:\Windows\system32\behgtlu.exe 532 "C:\Windows\SysWOW64\uszdrxx.exe"219⤵
-
C:\Windows\SysWOW64\behgtlu.exe"C:\Windows\SysWOW64\behgtlu.exe"220⤵
-
C:\Windows\SysWOW64\sdioamn.exeC:\Windows\system32\sdioamn.exe 540 "C:\Windows\SysWOW64\behgtlu.exe"221⤵
-
C:\Windows\SysWOW64\sdioamn.exe"C:\Windows\SysWOW64\sdioamn.exe"222⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\yefqijr.exeC:\Windows\system32\yefqijr.exe 532 "C:\Windows\SysWOW64\sdioamn.exe"223⤵
-
C:\Windows\SysWOW64\yefqijr.exe"C:\Windows\SysWOW64\yefqijr.exe"224⤵
-
C:\Windows\SysWOW64\iwrybje.exeC:\Windows\system32\iwrybje.exe 536 "C:\Windows\SysWOW64\yefqijr.exe"225⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\iwrybje.exe"C:\Windows\SysWOW64\iwrybje.exe"226⤵
-
C:\Windows\SysWOW64\rkqmklm.exeC:\Windows\system32\rkqmklm.exe 544 "C:\Windows\SysWOW64\iwrybje.exe"227⤵
-
C:\Windows\SysWOW64\rkqmklm.exe"C:\Windows\SysWOW64\rkqmklm.exe"228⤵
-
C:\Windows\SysWOW64\dtvzhtd.exeC:\Windows\system32\dtvzhtd.exe 544 "C:\Windows\SysWOW64\rkqmklm.exe"229⤵
-
C:\Windows\SysWOW64\dtvzhtd.exe"C:\Windows\SysWOW64\dtvzhtd.exe"230⤵
-
C:\Windows\SysWOW64\kiohnla.exeC:\Windows\system32\kiohnla.exe 544 "C:\Windows\SysWOW64\dtvzhtd.exe"231⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\kiohnla.exe"C:\Windows\SysWOW64\kiohnla.exe"232⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\docupee.exeC:\Windows\system32\docupee.exe 532 "C:\Windows\SysWOW64\kiohnla.exe"233⤵
-
C:\Windows\SysWOW64\docupee.exe"C:\Windows\SysWOW64\docupee.exe"234⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\pmvmrpx.exeC:\Windows\system32\pmvmrpx.exe 532 "C:\Windows\SysWOW64\docupee.exe"235⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\pmvmrpx.exe"C:\Windows\SysWOW64\pmvmrpx.exe"236⤵
-
C:\Windows\SysWOW64\hitpnmr.exeC:\Windows\system32\hitpnmr.exe 544 "C:\Windows\SysWOW64\pmvmrpx.exe"237⤵
-
C:\Windows\SysWOW64\hitpnmr.exe"C:\Windows\SysWOW64\hitpnmr.exe"238⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\tvaamxp.exeC:\Windows\system32\tvaamxp.exe 536 "C:\Windows\SysWOW64\hitpnmr.exe"239⤵
-
C:\Windows\SysWOW64\tvaamxp.exe"C:\Windows\SysWOW64\tvaamxp.exe"240⤵
-
C:\Windows\SysWOW64\eiqsujn.exeC:\Windows\system32\eiqsujn.exe 532 "C:\Windows\SysWOW64\tvaamxp.exe"241⤵