Analysis
-
max time kernel
188s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-06-2022 12:27
Static task
static1
Behavioral task
behavioral1
Sample
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe
Resource
win10v2004-20220414-en
General
-
Target
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe
-
Size
498KB
-
MD5
88d16eafa3d80cbc183085f120475998
-
SHA1
d9898f4b77ed203106fdb6eaf9b83afec20b6022
-
SHA256
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6
-
SHA512
b2d97d022d6738a08333bbf5b652c9f96ed5198b189b86912689b5a6a1169f7a4444f947e3c286973cd43643617206051d2da07070d72a1b14f2e22a78ad862a
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
Processes:
hcivseh.exehcivseh.exefgfgwtc.exefgfgwtc.exerjvlnao.exerjvlnao.exemlbwfgs.exemlbwfgs.exehggexza.exehggexza.exeofocahw.exeofocahw.exewtorhwf.exewtorhwf.exewfajvik.exewfajvik.exeogtvgkp.exeogtvgkp.exelmnmuqm.exelmnmuqm.exeayrzkks.exeayrzkks.exefppasyb.exefppasyb.exevfknkpd.exevfknkpd.exeiwninks.exeiwninks.exeqazbqda.exeqazbqda.exevbibsie.exevbibsie.exeqscehxf.exeqscehxf.exeidyojpx.exeidyojpx.exeasqzfqc.exeasqzfqc.exessbxewg.exessbxewg.exeihnkxnh.exeihnkxnh.exenuixbwr.exenuixbwr.exeqeivusz.exeqeivusz.exeyfgvahd.exeyfgvahd.exealnyqze.exealnyqze.exeiemyegi.exeiemyegi.exeiltbbib.exeiltbbib.exefdmcoke.exefdmcoke.exexdlsixa.exexdlsixa.exeheuwand.exeheuwand.exekeakjnb.exekeakjnb.exewxbsnhk.exewxbsnhk.exepid process 2684 hcivseh.exe 3240 hcivseh.exe 3932 fgfgwtc.exe 3176 fgfgwtc.exe 4620 rjvlnao.exe 4584 rjvlnao.exe 3160 mlbwfgs.exe 5068 mlbwfgs.exe 1420 hggexza.exe 2080 hggexza.exe 2044 ofocahw.exe 344 ofocahw.exe 3104 wtorhwf.exe 2980 wtorhwf.exe 4924 wfajvik.exe 2692 wfajvik.exe 2348 ogtvgkp.exe 5088 ogtvgkp.exe 4448 lmnmuqm.exe 3888 lmnmuqm.exe 1660 ayrzkks.exe 4432 ayrzkks.exe 4416 fppasyb.exe 2272 fppasyb.exe 816 vfknkpd.exe 1112 vfknkpd.exe 1204 iwninks.exe 3328 iwninks.exe 4380 qazbqda.exe 1276 qazbqda.exe 1384 vbibsie.exe 3000 vbibsie.exe 5072 qscehxf.exe 4984 qscehxf.exe 1072 idyojpx.exe 3592 idyojpx.exe 4612 asqzfqc.exe 4576 asqzfqc.exe 4948 ssbxewg.exe 652 ssbxewg.exe 4116 ihnkxnh.exe 3960 ihnkxnh.exe 2156 nuixbwr.exe 3288 nuixbwr.exe 1120 qeivusz.exe 2752 qeivusz.exe 640 yfgvahd.exe 2084 yfgvahd.exe 3500 alnyqze.exe 1608 alnyqze.exe 4684 iemyegi.exe 2600 iemyegi.exe 4536 iltbbib.exe 3772 iltbbib.exe 2460 fdmcoke.exe 988 fdmcoke.exe 2248 xdlsixa.exe 3092 xdlsixa.exe 4460 heuwand.exe 4388 heuwand.exe 392 keakjnb.exe 1676 keakjnb.exe 1848 wxbsnhk.exe 1968 wxbsnhk.exe -
Drops file in System32 directory 64 IoCs
Processes:
ckqknqg.exeiknmjiw.exehxzoedj.exerefziko.exeasqzfqc.exewwlenhh.exefimmkob.exeumoiupl.exezpdqgou.exeqscehxf.exeyluyfff.exeyogoxua.exescyqink.exeplrsupv.exemlbwfgs.exeayrzkks.exetgalqgk.exelqtuwxw.exexmjftca.exerzwregg.exewcozcae.exedcyfnln.exehxzoedj.exeenkwzci.exezdlrctv.exercopthh.exeomqotdz.exebzjjkhw.exeqzkaukd.exeyogoxua.exehcivseh.exeqazbqda.exedmriwqx.exennfhbds.exercnfrtx.exeeizshpx.exewolnxxr.exejmasfia.exeewkecwl.exelvbogbz.exednxxxbp.exethwiujh.exetpgoqof.execkqknqg.exeqeivusz.exedfddpxm.exeomxuuxq.exeougagfn.exetjkthcm.exesvdcqsi.exezlbeohv.exeblioakn.exettdskba.exejmasfia.exehrioizb.exeptcyqut.exejoahpll.exejwgxzgb.exedescription ioc process File opened for modification C:\Windows\SysWOW64\quxnqpg.exe ckqknqg.exe File created C:\Windows\SysWOW64\fimmkob.exe iknmjiw.exe File opened for modification C:\Windows\SysWOW64\hxzoedj.exe hxzoedj.exe File opened for modification C:\Windows\SysWOW64\refziko.exe refziko.exe File created C:\Windows\SysWOW64\ssbxewg.exe asqzfqc.exe File created C:\Windows\SysWOW64\ewkecwl.exe wwlenhh.exe File opened for modification C:\Windows\SysWOW64\fimmkob.exe fimmkob.exe File created C:\Windows\SysWOW64\etsgfns.exe umoiupl.exe File created C:\Windows\SysWOW64\jssttri.exe zpdqgou.exe File opened for modification C:\Windows\SysWOW64\idyojpx.exe qscehxf.exe File created C:\Windows\SysWOW64\lcptnnc.exe yluyfff.exe File opened for modification C:\Windows\SysWOW64\dqwocfo.exe yogoxua.exe File created C:\Windows\SysWOW64\cyzbxhl.exe scyqink.exe File created C:\Windows\SysWOW64\eizshpx.exe plrsupv.exe File opened for modification C:\Windows\SysWOW64\mlbwfgs.exe mlbwfgs.exe File created C:\Windows\SysWOW64\fppasyb.exe ayrzkks.exe File created C:\Windows\SysWOW64\dnerbes.exe tgalqgk.exe File opened for modification C:\Windows\SysWOW64\lqtuwxw.exe lqtuwxw.exe File opened for modification C:\Windows\SysWOW64\vgfskfg.exe xmjftca.exe File opened for modification C:\Windows\SysWOW64\rzwregg.exe rzwregg.exe File created C:\Windows\SysWOW64\gbswvzm.exe wcozcae.exe File opened for modification C:\Windows\SysWOW64\dcyfnln.exe dcyfnln.exe File opened for modification C:\Windows\SysWOW64\rssgtgk.exe hxzoedj.exe File opened for modification C:\Windows\SysWOW64\refziko.exe enkwzci.exe File created C:\Windows\SysWOW64\jydckwe.exe zdlrctv.exe File opened for modification C:\Windows\SysWOW64\jydckwe.exe zdlrctv.exe File created C:\Windows\SysWOW64\ywkcdvj.exe rcopthh.exe File opened for modification C:\Windows\SysWOW64\omqotdz.exe omqotdz.exe File opened for modification C:\Windows\SysWOW64\lgnpvfd.exe bzjjkhw.exe File opened for modification C:\Windows\SysWOW64\yogoxua.exe qzkaukd.exe File opened for modification C:\Windows\SysWOW64\yogoxua.exe yogoxua.exe File created C:\Windows\SysWOW64\dqwocfo.exe yogoxua.exe File created C:\Windows\SysWOW64\fgfgwtc.exe hcivseh.exe File opened for modification C:\Windows\SysWOW64\vbibsie.exe qazbqda.exe File created C:\Windows\SysWOW64\oisalky.exe dmriwqx.exe File created C:\Windows\SysWOW64\xmjftca.exe nnfhbds.exe File created C:\Windows\SysWOW64\cbzlbsf.exe rcnfrtx.exe File created C:\Windows\SysWOW64\oapxlfz.exe eizshpx.exe File created C:\Windows\SysWOW64\jyryaxr.exe wolnxxr.exe File opened for modification C:\Windows\SysWOW64\jmasfia.exe jmasfia.exe File opened for modification C:\Windows\SysWOW64\cbzlbsf.exe rcnfrtx.exe File opened for modification C:\Windows\SysWOW64\fppasyb.exe ayrzkks.exe File created C:\Windows\SysWOW64\oslokrm.exe ewkecwl.exe File created C:\Windows\SysWOW64\bzjjkhw.exe lvbogbz.exe File opened for modification C:\Windows\SysWOW64\jwfsngv.exe dnxxxbp.exe File opened for modification C:\Windows\SysWOW64\enaawvc.exe thwiujh.exe File created C:\Windows\SysWOW64\dkhgyin.exe tpgoqof.exe File opened for modification C:\Windows\SysWOW64\ckqknqg.exe ckqknqg.exe File opened for modification C:\Windows\SysWOW64\qeivusz.exe qeivusz.exe File opened for modification C:\Windows\SysWOW64\ywkcdvj.exe rcopthh.exe File opened for modification C:\Windows\SysWOW64\dfddpxm.exe dfddpxm.exe File opened for modification C:\Windows\SysWOW64\bhpkabp.exe omxuuxq.exe File opened for modification C:\Windows\SysWOW64\zqzsnzw.exe ougagfn.exe File created C:\Windows\SysWOW64\dfddpxm.exe tjkthcm.exe File opened for modification C:\Windows\SysWOW64\fivrwoh.exe svdcqsi.exe File opened for modification C:\Windows\SysWOW64\zlbeohv.exe zlbeohv.exe File opened for modification C:\Windows\SysWOW64\nqzixsy.exe blioakn.exe File opened for modification C:\Windows\SysWOW64\dthpvzh.exe ttdskba.exe File created C:\Windows\SysWOW64\rcnfrtx.exe jmasfia.exe File created C:\Windows\SysWOW64\ubprlzb.exe hrioizb.exe File opened for modification C:\Windows\SysWOW64\ptcyqut.exe ptcyqut.exe File created C:\Windows\SysWOW64\tyqfubf.exe joahpll.exe File opened for modification C:\Windows\SysWOW64\gbswvzm.exe wcozcae.exe File opened for modification C:\Windows\SysWOW64\thwiujh.exe jwgxzgb.exe -
Suspicious use of SetThreadContext 64 IoCs
Processes:
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exehcivseh.exefgfgwtc.exerjvlnao.exemlbwfgs.exehggexza.exeofocahw.exewtorhwf.exewfajvik.exeogtvgkp.exelmnmuqm.exeayrzkks.exefppasyb.exevfknkpd.exeiwninks.exeqazbqda.exevbibsie.exeqscehxf.exeidyojpx.exeasqzfqc.exessbxewg.exeihnkxnh.exenuixbwr.exeqeivusz.exeyfgvahd.exealnyqze.exeiemyegi.exeiltbbib.exefdmcoke.exexdlsixa.exeheuwand.exekeakjnb.exewxbsnhk.exethcggod.exemhojqcm.exehnezlmp.exebtucgkw.exelpnmvew.exewkoxdzf.exettzfqxf.exeonmvqqn.exewolnxxr.exejyryaxr.exerqqyoln.exebbficob.exeokllfgt.exezkqixfb.exejcfocdd.exewwlenhh.exeewkecwl.exeoslokrm.exeeiwwqap.exeosmuvqr.exebusjhdw.exelqtuwxw.exezdlrctv.exejydckwe.exercopthh.exeywkcdvj.exejoahpll.exetyqfubf.exedifphet.exerslakdl.exedmriwqx.exedescription pid process target process PID 2384 set thread context of 3676 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 2684 set thread context of 3240 2684 hcivseh.exe hcivseh.exe PID 3932 set thread context of 3176 3932 fgfgwtc.exe fgfgwtc.exe PID 4620 set thread context of 4584 4620 rjvlnao.exe rjvlnao.exe PID 3160 set thread context of 5068 3160 mlbwfgs.exe mlbwfgs.exe PID 1420 set thread context of 2080 1420 hggexza.exe hggexza.exe PID 2044 set thread context of 344 2044 ofocahw.exe ofocahw.exe PID 3104 set thread context of 2980 3104 wtorhwf.exe wtorhwf.exe PID 4924 set thread context of 2692 4924 wfajvik.exe wfajvik.exe PID 2348 set thread context of 5088 2348 ogtvgkp.exe ogtvgkp.exe PID 4448 set thread context of 3888 4448 lmnmuqm.exe lmnmuqm.exe PID 1660 set thread context of 4432 1660 ayrzkks.exe ayrzkks.exe PID 4416 set thread context of 2272 4416 fppasyb.exe fppasyb.exe PID 816 set thread context of 1112 816 vfknkpd.exe vfknkpd.exe PID 1204 set thread context of 3328 1204 iwninks.exe iwninks.exe PID 4380 set thread context of 1276 4380 qazbqda.exe qazbqda.exe PID 1384 set thread context of 3000 1384 vbibsie.exe vbibsie.exe PID 5072 set thread context of 4984 5072 qscehxf.exe qscehxf.exe PID 1072 set thread context of 3592 1072 idyojpx.exe idyojpx.exe PID 4612 set thread context of 4576 4612 asqzfqc.exe asqzfqc.exe PID 4948 set thread context of 652 4948 ssbxewg.exe ssbxewg.exe PID 4116 set thread context of 3960 4116 ihnkxnh.exe ihnkxnh.exe PID 2156 set thread context of 3288 2156 nuixbwr.exe nuixbwr.exe PID 1120 set thread context of 2752 1120 qeivusz.exe qeivusz.exe PID 640 set thread context of 2084 640 yfgvahd.exe yfgvahd.exe PID 3500 set thread context of 1608 3500 alnyqze.exe alnyqze.exe PID 4684 set thread context of 2600 4684 iemyegi.exe iemyegi.exe PID 4536 set thread context of 3772 4536 iltbbib.exe iltbbib.exe PID 2460 set thread context of 988 2460 fdmcoke.exe fdmcoke.exe PID 2248 set thread context of 3092 2248 xdlsixa.exe xdlsixa.exe PID 4460 set thread context of 4388 4460 heuwand.exe heuwand.exe PID 392 set thread context of 1676 392 keakjnb.exe keakjnb.exe PID 1848 set thread context of 1968 1848 wxbsnhk.exe wxbsnhk.exe PID 4744 set thread context of 2244 4744 thcggod.exe thcggod.exe PID 1768 set thread context of 1828 1768 mhojqcm.exe mhojqcm.exe PID 3616 set thread context of 2488 3616 hnezlmp.exe hnezlmp.exe PID 4540 set thread context of 2536 4540 btucgkw.exe btucgkw.exe PID 4064 set thread context of 4500 4064 lpnmvew.exe lpnmvew.exe PID 4592 set thread context of 3932 4592 wkoxdzf.exe wkoxdzf.exe PID 2148 set thread context of 2024 2148 ttzfqxf.exe ttzfqxf.exe PID 2004 set thread context of 8 2004 onmvqqn.exe onmvqqn.exe PID 1420 set thread context of 1720 1420 wolnxxr.exe wolnxxr.exe PID 4668 set thread context of 5016 4668 jyryaxr.exe jyryaxr.exe PID 2044 set thread context of 4524 2044 rqqyoln.exe rqqyoln.exe PID 2132 set thread context of 3348 2132 bbficob.exe bbficob.exe PID 1552 set thread context of 4952 1552 okllfgt.exe okllfgt.exe PID 3724 set thread context of 2320 3724 zkqixfb.exe zkqixfb.exe PID 2348 set thread context of 2968 2348 jcfocdd.exe jcfocdd.exe PID 4448 set thread context of 664 4448 wwlenhh.exe wwlenhh.exe PID 4872 set thread context of 4452 4872 ewkecwl.exe ewkecwl.exe PID 3780 set thread context of 4112 3780 oslokrm.exe oslokrm.exe PID 2748 set thread context of 1660 2748 eiwwqap.exe eiwwqap.exe PID 1912 set thread context of 1140 1912 osmuvqr.exe osmuvqr.exe PID 2520 set thread context of 4332 2520 busjhdw.exe busjhdw.exe PID 4868 set thread context of 3364 4868 lqtuwxw.exe lqtuwxw.exe PID 3628 set thread context of 5040 3628 zdlrctv.exe zdlrctv.exe PID 2256 set thread context of 5044 2256 jydckwe.exe jydckwe.exe PID 3540 set thread context of 2280 3540 rcopthh.exe rcopthh.exe PID 2996 set thread context of 2360 2996 ywkcdvj.exe ywkcdvj.exe PID 4920 set thread context of 2500 4920 joahpll.exe joahpll.exe PID 1832 set thread context of 4268 1832 tyqfubf.exe tyqfubf.exe PID 1620 set thread context of 4420 1620 difphet.exe difphet.exe PID 4284 set thread context of 368 4284 rslakdl.exe rslakdl.exe PID 2904 set thread context of 1084 2904 dmriwqx.exe dmriwqx.exe -
Modifies registry class 64 IoCs
Processes:
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}\1.0\0\win32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406}\TypeLib\Version = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\TypeLib\Version = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\ProxyStubClsid32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\TypeLib\ = "{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\LocalServer32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\ProxyStubClsid32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\TypeLib\ = "{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ProxyStubClsid32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\TypeLib\ = "{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406}\TypeLib\Version = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adadadada.Class2\ = "adadadada.Class2" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\VERSION\ = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\Programmable 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\TypeLib\Version = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\TypeLib\ = "{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\adadadada.mdsaaaaad 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adadadada.Class2\Clsid\ = "{F7814234-0237-4DFC-9D71-0F36D48D09D0}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ProxyStubClsid32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9D41FAEC-CD03-4685-9B52-229FB3DDF406}\ProxyStubClsid32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\ProgID\ = "adadadada.Class2" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\Programmable 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\VERSION 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD} 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}\1.0\ = "Proyecto1" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ = "_Class1" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\VERSION 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\LocalServer32 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\TypeLib 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\ = "mdsaaaaad" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ = "Class1" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\TypeLib 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adadadada.mdsaaaaad\ = "adadadada.mdsaaaaad" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\ProgID 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}\1.0\HELPDIR 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\TypeLib\Version = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\TypeLib 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\adadadada.Class1\ = "adadadada.Class1" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}\1.0\FLAGS 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\Implemented Categories 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\VERSION\ = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A175F7B-0C86-4EFA-A235-F498F2892A89}\ProxyStubClsid 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\ = "Class1" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BD5643A-9D25-4CF4-ACF7-B643A7DFF8B7}\TypeLib\ = "{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\TypeLib 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9C3BE5F8-0CAF-4464-9BBD-B9FD25B15E00}\TypeLib 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D34601CE-E784-4328-9E28-A65E6F1D2BCD}\VERSION\ = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}\1.0 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0AEC2553-4818-4756-A2CB-D0D38FEBDEE1}\TypeLib\Version = "1.0" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7814234-0237-4DFC-9D71-0F36D48D09D0}\TypeLib\ = "{A0F0FD66-5D37-4959-8B3E-7F76ABAE04CD}" 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exehcivseh.exefgfgwtc.exerjvlnao.exemlbwfgs.exehggexza.exeofocahw.exewtorhwf.exewfajvik.exeogtvgkp.exelmnmuqm.exeayrzkks.exefppasyb.exevfknkpd.exeiwninks.exeqazbqda.exevbibsie.exeqscehxf.exeidyojpx.exeasqzfqc.exessbxewg.exeihnkxnh.exenuixbwr.exeqeivusz.exeyfgvahd.exealnyqze.exeiemyegi.exeiltbbib.exefdmcoke.exexdlsixa.exeheuwand.exekeakjnb.exewxbsnhk.exethcggod.exemhojqcm.exehnezlmp.exebtucgkw.exelpnmvew.exewkoxdzf.exettzfqxf.exeonmvqqn.exewolnxxr.exejyryaxr.exerqqyoln.exebbficob.exeokllfgt.exezkqixfb.exejcfocdd.exewwlenhh.exeewkecwl.exeoslokrm.exeeiwwqap.exeosmuvqr.exebusjhdw.exelqtuwxw.exezdlrctv.exejydckwe.exercopthh.exeywkcdvj.exejoahpll.exetyqfubf.exedifphet.exerslakdl.exedmriwqx.exepid process 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 2684 hcivseh.exe 3932 fgfgwtc.exe 4620 rjvlnao.exe 3160 mlbwfgs.exe 1420 hggexza.exe 2044 ofocahw.exe 3104 wtorhwf.exe 4924 wfajvik.exe 2348 ogtvgkp.exe 4448 lmnmuqm.exe 1660 ayrzkks.exe 4416 fppasyb.exe 816 vfknkpd.exe 1204 iwninks.exe 4380 qazbqda.exe 1384 vbibsie.exe 5072 qscehxf.exe 1072 idyojpx.exe 4612 asqzfqc.exe 4948 ssbxewg.exe 4116 ihnkxnh.exe 2156 nuixbwr.exe 1120 qeivusz.exe 640 yfgvahd.exe 3500 alnyqze.exe 4684 iemyegi.exe 4536 iltbbib.exe 2460 fdmcoke.exe 2248 xdlsixa.exe 4460 heuwand.exe 392 keakjnb.exe 1848 wxbsnhk.exe 4744 thcggod.exe 1768 mhojqcm.exe 3616 hnezlmp.exe 4540 btucgkw.exe 4064 lpnmvew.exe 4592 wkoxdzf.exe 2148 ttzfqxf.exe 2004 onmvqqn.exe 1420 wolnxxr.exe 4668 jyryaxr.exe 2044 rqqyoln.exe 2132 bbficob.exe 1552 okllfgt.exe 3724 zkqixfb.exe 2348 jcfocdd.exe 4448 wwlenhh.exe 4872 ewkecwl.exe 3780 oslokrm.exe 2748 eiwwqap.exe 1912 osmuvqr.exe 2520 busjhdw.exe 4868 lqtuwxw.exe 3628 zdlrctv.exe 2256 jydckwe.exe 3540 rcopthh.exe 2996 ywkcdvj.exe 4920 joahpll.exe 1832 tyqfubf.exe 1620 difphet.exe 4284 rslakdl.exe 2904 dmriwqx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exehcivseh.exehcivseh.exefgfgwtc.exefgfgwtc.exerjvlnao.exerjvlnao.exemlbwfgs.exemlbwfgs.exedescription pid process target process PID 2384 wrote to memory of 3676 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 2384 wrote to memory of 3676 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 2384 wrote to memory of 3676 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 2384 wrote to memory of 3676 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 2384 wrote to memory of 3676 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 2384 wrote to memory of 3676 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 2384 wrote to memory of 3676 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 2384 wrote to memory of 3676 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 2384 wrote to memory of 3676 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 2384 wrote to memory of 3676 2384 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe PID 3676 wrote to memory of 2684 3676 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe hcivseh.exe PID 3676 wrote to memory of 2684 3676 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe hcivseh.exe PID 3676 wrote to memory of 2684 3676 1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe hcivseh.exe PID 2684 wrote to memory of 3240 2684 hcivseh.exe hcivseh.exe PID 2684 wrote to memory of 3240 2684 hcivseh.exe hcivseh.exe PID 2684 wrote to memory of 3240 2684 hcivseh.exe hcivseh.exe PID 2684 wrote to memory of 3240 2684 hcivseh.exe hcivseh.exe PID 2684 wrote to memory of 3240 2684 hcivseh.exe hcivseh.exe PID 2684 wrote to memory of 3240 2684 hcivseh.exe hcivseh.exe PID 2684 wrote to memory of 3240 2684 hcivseh.exe hcivseh.exe PID 2684 wrote to memory of 3240 2684 hcivseh.exe hcivseh.exe PID 2684 wrote to memory of 3240 2684 hcivseh.exe hcivseh.exe PID 2684 wrote to memory of 3240 2684 hcivseh.exe hcivseh.exe PID 3240 wrote to memory of 3932 3240 hcivseh.exe fgfgwtc.exe PID 3240 wrote to memory of 3932 3240 hcivseh.exe fgfgwtc.exe PID 3240 wrote to memory of 3932 3240 hcivseh.exe fgfgwtc.exe PID 3932 wrote to memory of 3176 3932 fgfgwtc.exe fgfgwtc.exe PID 3932 wrote to memory of 3176 3932 fgfgwtc.exe fgfgwtc.exe PID 3932 wrote to memory of 3176 3932 fgfgwtc.exe fgfgwtc.exe PID 3932 wrote to memory of 3176 3932 fgfgwtc.exe fgfgwtc.exe PID 3932 wrote to memory of 3176 3932 fgfgwtc.exe fgfgwtc.exe PID 3932 wrote to memory of 3176 3932 fgfgwtc.exe fgfgwtc.exe PID 3932 wrote to memory of 3176 3932 fgfgwtc.exe fgfgwtc.exe PID 3932 wrote to memory of 3176 3932 fgfgwtc.exe fgfgwtc.exe PID 3932 wrote to memory of 3176 3932 fgfgwtc.exe fgfgwtc.exe PID 3932 wrote to memory of 3176 3932 fgfgwtc.exe fgfgwtc.exe PID 3176 wrote to memory of 4620 3176 fgfgwtc.exe rjvlnao.exe PID 3176 wrote to memory of 4620 3176 fgfgwtc.exe rjvlnao.exe PID 3176 wrote to memory of 4620 3176 fgfgwtc.exe rjvlnao.exe PID 4620 wrote to memory of 4584 4620 rjvlnao.exe rjvlnao.exe PID 4620 wrote to memory of 4584 4620 rjvlnao.exe rjvlnao.exe PID 4620 wrote to memory of 4584 4620 rjvlnao.exe rjvlnao.exe PID 4620 wrote to memory of 4584 4620 rjvlnao.exe rjvlnao.exe PID 4620 wrote to memory of 4584 4620 rjvlnao.exe rjvlnao.exe PID 4620 wrote to memory of 4584 4620 rjvlnao.exe rjvlnao.exe PID 4620 wrote to memory of 4584 4620 rjvlnao.exe rjvlnao.exe PID 4620 wrote to memory of 4584 4620 rjvlnao.exe rjvlnao.exe PID 4620 wrote to memory of 4584 4620 rjvlnao.exe rjvlnao.exe PID 4620 wrote to memory of 4584 4620 rjvlnao.exe rjvlnao.exe PID 4584 wrote to memory of 3160 4584 rjvlnao.exe mlbwfgs.exe PID 4584 wrote to memory of 3160 4584 rjvlnao.exe mlbwfgs.exe PID 4584 wrote to memory of 3160 4584 rjvlnao.exe mlbwfgs.exe PID 3160 wrote to memory of 5068 3160 mlbwfgs.exe mlbwfgs.exe PID 3160 wrote to memory of 5068 3160 mlbwfgs.exe mlbwfgs.exe PID 3160 wrote to memory of 5068 3160 mlbwfgs.exe mlbwfgs.exe PID 3160 wrote to memory of 5068 3160 mlbwfgs.exe mlbwfgs.exe PID 3160 wrote to memory of 5068 3160 mlbwfgs.exe mlbwfgs.exe PID 3160 wrote to memory of 5068 3160 mlbwfgs.exe mlbwfgs.exe PID 3160 wrote to memory of 5068 3160 mlbwfgs.exe mlbwfgs.exe PID 3160 wrote to memory of 5068 3160 mlbwfgs.exe mlbwfgs.exe PID 3160 wrote to memory of 5068 3160 mlbwfgs.exe mlbwfgs.exe PID 3160 wrote to memory of 5068 3160 mlbwfgs.exe mlbwfgs.exe PID 5068 wrote to memory of 1420 5068 mlbwfgs.exe hggexza.exe PID 5068 wrote to memory of 1420 5068 mlbwfgs.exe hggexza.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe"C:\Users\Admin\AppData\Local\Temp\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe"C:\Users\Admin\AppData\Local\Temp\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\hcivseh.exeC:\Windows\system32\hcivseh.exe 1128 "C:\Users\Admin\AppData\Local\Temp\1069d2ad83c0264ebf61b490d6385fa9eb678f93dedf165b6863177ea4ac38f6.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\hcivseh.exe"C:\Windows\SysWOW64\hcivseh.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\fgfgwtc.exeC:\Windows\system32\fgfgwtc.exe 1032 "C:\Windows\SysWOW64\hcivseh.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\fgfgwtc.exe"C:\Windows\SysWOW64\fgfgwtc.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rjvlnao.exeC:\Windows\system32\rjvlnao.exe 1044 "C:\Windows\SysWOW64\fgfgwtc.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rjvlnao.exe"C:\Windows\SysWOW64\rjvlnao.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\mlbwfgs.exeC:\Windows\system32\mlbwfgs.exe 1016 "C:\Windows\SysWOW64\rjvlnao.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\mlbwfgs.exe"C:\Windows\SysWOW64\mlbwfgs.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\hggexza.exeC:\Windows\system32\hggexza.exe 1016 "C:\Windows\SysWOW64\mlbwfgs.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\hggexza.exe"C:\Windows\SysWOW64\hggexza.exe"12⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\ofocahw.exeC:\Windows\system32\ofocahw.exe 1016 "C:\Windows\SysWOW64\hggexza.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ofocahw.exe"C:\Windows\SysWOW64\ofocahw.exe"14⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\wtorhwf.exeC:\Windows\system32\wtorhwf.exe 1016 "C:\Windows\SysWOW64\ofocahw.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wtorhwf.exe"C:\Windows\SysWOW64\wtorhwf.exe"16⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\wfajvik.exeC:\Windows\system32\wfajvik.exe 1016 "C:\Windows\SysWOW64\wtorhwf.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wfajvik.exe"C:\Windows\SysWOW64\wfajvik.exe"18⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\ogtvgkp.exeC:\Windows\system32\ogtvgkp.exe 1016 "C:\Windows\SysWOW64\wfajvik.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ogtvgkp.exe"C:\Windows\SysWOW64\ogtvgkp.exe"20⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\lmnmuqm.exeC:\Windows\system32\lmnmuqm.exe 1016 "C:\Windows\SysWOW64\ogtvgkp.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\lmnmuqm.exe"C:\Windows\SysWOW64\lmnmuqm.exe"22⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\ayrzkks.exeC:\Windows\system32\ayrzkks.exe 1044 "C:\Windows\SysWOW64\lmnmuqm.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ayrzkks.exe"C:\Windows\SysWOW64\ayrzkks.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\fppasyb.exeC:\Windows\system32\fppasyb.exe 1148 "C:\Windows\SysWOW64\ayrzkks.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\fppasyb.exe"C:\Windows\SysWOW64\fppasyb.exe"26⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\vfknkpd.exeC:\Windows\system32\vfknkpd.exe 1044 "C:\Windows\SysWOW64\fppasyb.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\vfknkpd.exe"C:\Windows\SysWOW64\vfknkpd.exe"28⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\iwninks.exeC:\Windows\system32\iwninks.exe 1044 "C:\Windows\SysWOW64\vfknkpd.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\iwninks.exe"C:\Windows\SysWOW64\iwninks.exe"30⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\qazbqda.exeC:\Windows\system32\qazbqda.exe 1148 "C:\Windows\SysWOW64\iwninks.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\qazbqda.exe"C:\Windows\SysWOW64\qazbqda.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\vbibsie.exeC:\Windows\system32\vbibsie.exe 1044 "C:\Windows\SysWOW64\qazbqda.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\vbibsie.exe"C:\Windows\SysWOW64\vbibsie.exe"34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\qscehxf.exeC:\Windows\system32\qscehxf.exe 1148 "C:\Windows\SysWOW64\vbibsie.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\qscehxf.exe"C:\Windows\SysWOW64\qscehxf.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\idyojpx.exeC:\Windows\system32\idyojpx.exe 1044 "C:\Windows\SysWOW64\qscehxf.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\idyojpx.exe"C:\Windows\SysWOW64\idyojpx.exe"38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\asqzfqc.exeC:\Windows\system32\asqzfqc.exe 1148 "C:\Windows\SysWOW64\idyojpx.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\asqzfqc.exe"C:\Windows\SysWOW64\asqzfqc.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\ssbxewg.exeC:\Windows\system32\ssbxewg.exe 1016 "C:\Windows\SysWOW64\asqzfqc.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ssbxewg.exe"C:\Windows\SysWOW64\ssbxewg.exe"42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\ihnkxnh.exeC:\Windows\system32\ihnkxnh.exe 1016 "C:\Windows\SysWOW64\ssbxewg.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ihnkxnh.exe"C:\Windows\SysWOW64\ihnkxnh.exe"44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\nuixbwr.exeC:\Windows\system32\nuixbwr.exe 1156 "C:\Windows\SysWOW64\ihnkxnh.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\nuixbwr.exe"C:\Windows\SysWOW64\nuixbwr.exe"46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\qeivusz.exeC:\Windows\system32\qeivusz.exe 1044 "C:\Windows\SysWOW64\nuixbwr.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\qeivusz.exe"C:\Windows\SysWOW64\qeivusz.exe"48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\yfgvahd.exeC:\Windows\system32\yfgvahd.exe 1196 "C:\Windows\SysWOW64\qeivusz.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\yfgvahd.exe"C:\Windows\SysWOW64\yfgvahd.exe"50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\alnyqze.exeC:\Windows\system32\alnyqze.exe 1156 "C:\Windows\SysWOW64\yfgvahd.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\alnyqze.exe"C:\Windows\SysWOW64\alnyqze.exe"52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\iemyegi.exeC:\Windows\system32\iemyegi.exe 1016 "C:\Windows\SysWOW64\alnyqze.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\iemyegi.exe"C:\Windows\SysWOW64\iemyegi.exe"54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\iltbbib.exeC:\Windows\system32\iltbbib.exe 1148 "C:\Windows\SysWOW64\iemyegi.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\iltbbib.exe"C:\Windows\SysWOW64\iltbbib.exe"56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\fdmcoke.exeC:\Windows\system32\fdmcoke.exe 1156 "C:\Windows\SysWOW64\iltbbib.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\fdmcoke.exe"C:\Windows\SysWOW64\fdmcoke.exe"58⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\xdlsixa.exeC:\Windows\system32\xdlsixa.exe 1016 "C:\Windows\SysWOW64\fdmcoke.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\xdlsixa.exe"C:\Windows\SysWOW64\xdlsixa.exe"60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\heuwand.exeC:\Windows\system32\heuwand.exe 1016 "C:\Windows\SysWOW64\xdlsixa.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\heuwand.exe"C:\Windows\SysWOW64\heuwand.exe"62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\keakjnb.exeC:\Windows\system32\keakjnb.exe 1156 "C:\Windows\SysWOW64\heuwand.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\keakjnb.exe"C:\Windows\SysWOW64\keakjnb.exe"64⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\wxbsnhk.exeC:\Windows\system32\wxbsnhk.exe 1148 "C:\Windows\SysWOW64\keakjnb.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wxbsnhk.exe"C:\Windows\SysWOW64\wxbsnhk.exe"66⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\thcggod.exeC:\Windows\system32\thcggod.exe 1016 "C:\Windows\SysWOW64\wxbsnhk.exe"67⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\thcggod.exe"C:\Windows\SysWOW64\thcggod.exe"68⤵
-
C:\Windows\SysWOW64\mhojqcm.exeC:\Windows\system32\mhojqcm.exe 1148 "C:\Windows\SysWOW64\thcggod.exe"69⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\mhojqcm.exe"C:\Windows\SysWOW64\mhojqcm.exe"70⤵
-
C:\Windows\SysWOW64\hnezlmp.exeC:\Windows\system32\hnezlmp.exe 1156 "C:\Windows\SysWOW64\mhojqcm.exe"71⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\hnezlmp.exe"C:\Windows\SysWOW64\hnezlmp.exe"72⤵
-
C:\Windows\SysWOW64\btucgkw.exeC:\Windows\system32\btucgkw.exe 1016 "C:\Windows\SysWOW64\hnezlmp.exe"73⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\btucgkw.exe"C:\Windows\SysWOW64\btucgkw.exe"74⤵
-
C:\Windows\SysWOW64\lpnmvew.exeC:\Windows\system32\lpnmvew.exe 1044 "C:\Windows\SysWOW64\btucgkw.exe"75⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\lpnmvew.exe"C:\Windows\SysWOW64\lpnmvew.exe"76⤵
-
C:\Windows\SysWOW64\wkoxdzf.exeC:\Windows\system32\wkoxdzf.exe 1156 "C:\Windows\SysWOW64\lpnmvew.exe"77⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wkoxdzf.exe"C:\Windows\SysWOW64\wkoxdzf.exe"78⤵
-
C:\Windows\SysWOW64\ttzfqxf.exeC:\Windows\system32\ttzfqxf.exe 1044 "C:\Windows\SysWOW64\wkoxdzf.exe"79⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ttzfqxf.exe"C:\Windows\SysWOW64\ttzfqxf.exe"80⤵
-
C:\Windows\SysWOW64\onmvqqn.exeC:\Windows\system32\onmvqqn.exe 1140 "C:\Windows\SysWOW64\ttzfqxf.exe"81⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\onmvqqn.exe"C:\Windows\SysWOW64\onmvqqn.exe"82⤵
-
C:\Windows\SysWOW64\wolnxxr.exeC:\Windows\system32\wolnxxr.exe 1016 "C:\Windows\SysWOW64\onmvqqn.exe"83⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wolnxxr.exe"C:\Windows\SysWOW64\wolnxxr.exe"84⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\jyryaxr.exeC:\Windows\system32\jyryaxr.exe 1124 "C:\Windows\SysWOW64\wolnxxr.exe"85⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\jyryaxr.exe"C:\Windows\SysWOW64\jyryaxr.exe"86⤵
-
C:\Windows\SysWOW64\rqqyoln.exeC:\Windows\system32\rqqyoln.exe 1152 "C:\Windows\SysWOW64\jyryaxr.exe"87⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rqqyoln.exe"C:\Windows\SysWOW64\rqqyoln.exe"88⤵
-
C:\Windows\SysWOW64\bbficob.exeC:\Windows\system32\bbficob.exe 1148 "C:\Windows\SysWOW64\rqqyoln.exe"89⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\bbficob.exe"C:\Windows\SysWOW64\bbficob.exe"90⤵
-
C:\Windows\SysWOW64\okllfgt.exeC:\Windows\system32\okllfgt.exe 1056 "C:\Windows\SysWOW64\bbficob.exe"91⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\okllfgt.exe"C:\Windows\SysWOW64\okllfgt.exe"92⤵
-
C:\Windows\SysWOW64\zkqixfb.exeC:\Windows\system32\zkqixfb.exe 1148 "C:\Windows\SysWOW64\okllfgt.exe"93⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\zkqixfb.exe"C:\Windows\SysWOW64\zkqixfb.exe"94⤵
-
C:\Windows\SysWOW64\jcfocdd.exeC:\Windows\system32\jcfocdd.exe 1044 "C:\Windows\SysWOW64\zkqixfb.exe"95⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\jcfocdd.exe"C:\Windows\SysWOW64\jcfocdd.exe"96⤵
-
C:\Windows\SysWOW64\wwlenhh.exeC:\Windows\system32\wwlenhh.exe 1148 "C:\Windows\SysWOW64\jcfocdd.exe"97⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\wwlenhh.exe"C:\Windows\SysWOW64\wwlenhh.exe"98⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\ewkecwl.exeC:\Windows\system32\ewkecwl.exe 1044 "C:\Windows\SysWOW64\wwlenhh.exe"99⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ewkecwl.exe"C:\Windows\SysWOW64\ewkecwl.exe"100⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\oslokrm.exeC:\Windows\system32\oslokrm.exe 684 "C:\Windows\SysWOW64\ewkecwl.exe"101⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\oslokrm.exe"C:\Windows\SysWOW64\oslokrm.exe"102⤵
-
C:\Windows\SysWOW64\eiwwqap.exeC:\Windows\system32\eiwwqap.exe 1124 "C:\Windows\SysWOW64\oslokrm.exe"103⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\eiwwqap.exe"C:\Windows\SysWOW64\eiwwqap.exe"104⤵
-
C:\Windows\SysWOW64\osmuvqr.exeC:\Windows\system32\osmuvqr.exe 1052 "C:\Windows\SysWOW64\eiwwqap.exe"105⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\osmuvqr.exe"C:\Windows\SysWOW64\osmuvqr.exe"106⤵
-
C:\Windows\SysWOW64\busjhdw.exeC:\Windows\system32\busjhdw.exe 1140 "C:\Windows\SysWOW64\osmuvqr.exe"107⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\busjhdw.exe"C:\Windows\SysWOW64\busjhdw.exe"108⤵
-
C:\Windows\SysWOW64\lqtuwxw.exeC:\Windows\system32\lqtuwxw.exe 1012 "C:\Windows\SysWOW64\busjhdw.exe"109⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\lqtuwxw.exe"C:\Windows\SysWOW64\lqtuwxw.exe"110⤵
-
C:\Windows\SysWOW64\zdlrctv.exeC:\Windows\system32\zdlrctv.exe 1016 "C:\Windows\SysWOW64\lqtuwxw.exe"111⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\zdlrctv.exe"C:\Windows\SysWOW64\zdlrctv.exe"112⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\jydckwe.exeC:\Windows\system32\jydckwe.exe 1156 "C:\Windows\SysWOW64\zdlrctv.exe"113⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\jydckwe.exe"C:\Windows\SysWOW64\jydckwe.exe"114⤵
-
C:\Windows\SysWOW64\rcopthh.exeC:\Windows\system32\rcopthh.exe 1148 "C:\Windows\SysWOW64\jydckwe.exe"115⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rcopthh.exe"C:\Windows\SysWOW64\rcopthh.exe"116⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\ywkcdvj.exeC:\Windows\system32\ywkcdvj.exe 1124 "C:\Windows\SysWOW64\rcopthh.exe"117⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\ywkcdvj.exe"C:\Windows\SysWOW64\ywkcdvj.exe"118⤵
-
C:\Windows\SysWOW64\joahpll.exeC:\Windows\system32\joahpll.exe 1084 "C:\Windows\SysWOW64\ywkcdvj.exe"119⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\joahpll.exe"C:\Windows\SysWOW64\joahpll.exe"120⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\tyqfubf.exeC:\Windows\system32\tyqfubf.exe 1016 "C:\Windows\SysWOW64\joahpll.exe"121⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\tyqfubf.exe"C:\Windows\SysWOW64\tyqfubf.exe"122⤵
-
C:\Windows\SysWOW64\difphet.exeC:\Windows\system32\difphet.exe 1148 "C:\Windows\SysWOW64\tyqfubf.exe"123⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\difphet.exe"C:\Windows\SysWOW64\difphet.exe"124⤵
-
C:\Windows\SysWOW64\rslakdl.exeC:\Windows\system32\rslakdl.exe 1044 "C:\Windows\SysWOW64\difphet.exe"125⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rslakdl.exe"C:\Windows\SysWOW64\rslakdl.exe"126⤵
-
C:\Windows\SysWOW64\dmriwqx.exeC:\Windows\system32\dmriwqx.exe 1156 "C:\Windows\SysWOW64\rslakdl.exe"127⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\dmriwqx.exe"C:\Windows\SysWOW64\dmriwqx.exe"128⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\oisalky.exeC:\Windows\system32\oisalky.exe 1120 "C:\Windows\SysWOW64\dmriwqx.exe"129⤵
-
C:\Windows\SysWOW64\oisalky.exe"C:\Windows\SysWOW64\oisalky.exe"130⤵
-
C:\Windows\SysWOW64\wirasrc.exeC:\Windows\system32\wirasrc.exe 1148 "C:\Windows\SysWOW64\oisalky.exe"131⤵
-
C:\Windows\SysWOW64\wirasrc.exe"C:\Windows\SysWOW64\wirasrc.exe"132⤵
-
C:\Windows\SysWOW64\jzmdbza.exeC:\Windows\system32\jzmdbza.exe 1152 "C:\Windows\SysWOW64\wirasrc.exe"133⤵
-
C:\Windows\SysWOW64\jzmdbza.exe"C:\Windows\SysWOW64\jzmdbza.exe"134⤵
-
C:\Windows\SysWOW64\yluyfff.exeC:\Windows\system32\yluyfff.exe 1148 "C:\Windows\SysWOW64\jzmdbza.exe"135⤵
-
C:\Windows\SysWOW64\yluyfff.exe"C:\Windows\SysWOW64\yluyfff.exe"136⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\lcptnnc.exeC:\Windows\system32\lcptnnc.exe 1012 "C:\Windows\SysWOW64\yluyfff.exe"137⤵
-
C:\Windows\SysWOW64\lcptnnc.exe"C:\Windows\SysWOW64\lcptnnc.exe"138⤵
-
C:\Windows\SysWOW64\tjkthcm.exeC:\Windows\system32\tjkthcm.exe 1148 "C:\Windows\SysWOW64\lcptnnc.exe"139⤵
-
C:\Windows\SysWOW64\tjkthcm.exe"C:\Windows\SysWOW64\tjkthcm.exe"140⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\dfddpxm.exeC:\Windows\system32\dfddpxm.exe 1148 "C:\Windows\SysWOW64\tjkthcm.exe"141⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\dfddpxm.exe"C:\Windows\SysWOW64\dfddpxm.exe"142⤵
-
C:\Windows\SysWOW64\tgalqgk.exeC:\Windows\system32\tgalqgk.exe 1156 "C:\Windows\SysWOW64\dfddpxm.exe"143⤵
-
C:\Windows\SysWOW64\tgalqgk.exe"C:\Windows\SysWOW64\tgalqgk.exe"144⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\dnerbes.exeC:\Windows\system32\dnerbes.exe 1044 "C:\Windows\SysWOW64\tgalqgk.exe"145⤵
-
C:\Windows\SysWOW64\dnerbes.exe"C:\Windows\SysWOW64\dnerbes.exe"146⤵
-
C:\Windows\SysWOW64\omqotdz.exeC:\Windows\system32\omqotdz.exe 1148 "C:\Windows\SysWOW64\dnerbes.exe"147⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\omqotdz.exe"C:\Windows\SysWOW64\omqotdz.exe"148⤵
-
C:\Windows\SysWOW64\eqrjpiw.exeC:\Windows\system32\eqrjpiw.exe 1164 "C:\Windows\SysWOW64\omqotdz.exe"149⤵
-
C:\Windows\SysWOW64\eqrjpiw.exe"C:\Windows\SysWOW64\eqrjpiw.exe"150⤵
-
C:\Windows\SysWOW64\lvbogbz.exeC:\Windows\system32\lvbogbz.exe 1148 "C:\Windows\SysWOW64\eqrjpiw.exe"151⤵
-
C:\Windows\SysWOW64\lvbogbz.exe"C:\Windows\SysWOW64\lvbogbz.exe"152⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\bzjjkhw.exeC:\Windows\system32\bzjjkhw.exe 1148 "C:\Windows\SysWOW64\lvbogbz.exe"153⤵
-
C:\Windows\SysWOW64\bzjjkhw.exe"C:\Windows\SysWOW64\bzjjkhw.exe"154⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\lgnpvfd.exeC:\Windows\system32\lgnpvfd.exe 1044 "C:\Windows\SysWOW64\bzjjkhw.exe"155⤵
-
C:\Windows\SysWOW64\lgnpvfd.exe"C:\Windows\SysWOW64\lgnpvfd.exe"156⤵
-
C:\Windows\SysWOW64\wcozcae.exeC:\Windows\system32\wcozcae.exe 1044 "C:\Windows\SysWOW64\lgnpvfd.exe"157⤵
-
C:\Windows\SysWOW64\wcozcae.exe"C:\Windows\SysWOW64\wcozcae.exe"158⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\gbswvzm.exeC:\Windows\system32\gbswvzm.exe 1112 "C:\Windows\SysWOW64\wcozcae.exe"159⤵
-
C:\Windows\SysWOW64\gbswvzm.exe"C:\Windows\SysWOW64\gbswvzm.exe"160⤵
-
C:\Windows\SysWOW64\tkzhyym.exeC:\Windows\system32\tkzhyym.exe 1156 "C:\Windows\SysWOW64\gbswvzm.exe"161⤵
-
C:\Windows\SysWOW64\tkzhyym.exe"C:\Windows\SysWOW64\tkzhyym.exe"162⤵
-
C:\Windows\SysWOW64\dnoklbs.exeC:\Windows\system32\dnoklbs.exe 1148 "C:\Windows\SysWOW64\tkzhyym.exe"163⤵
-
C:\Windows\SysWOW64\dnoklbs.exe"C:\Windows\SysWOW64\dnoklbs.exe"164⤵
-
C:\Windows\SysWOW64\rwuuobs.exeC:\Windows\system32\rwuuobs.exe 1044 "C:\Windows\SysWOW64\dnoklbs.exe"165⤵
-
C:\Windows\SysWOW64\rwuuobs.exe"C:\Windows\SysWOW64\rwuuobs.exe"166⤵
-
C:\Windows\SysWOW64\dnxxxbp.exeC:\Windows\system32\dnxxxbp.exe 1148 "C:\Windows\SysWOW64\rwuuobs.exe"167⤵
-
C:\Windows\SysWOW64\dnxxxbp.exe"C:\Windows\SysWOW64\dnxxxbp.exe"168⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\jwfsngv.exeC:\Windows\system32\jwfsngv.exe 1156 "C:\Windows\SysWOW64\dnxxxbp.exe"169⤵
-
C:\Windows\SysWOW64\jwfsngv.exe"C:\Windows\SysWOW64\jwfsngv.exe"170⤵
-
C:\Windows\SysWOW64\vnavwpb.exeC:\Windows\system32\vnavwpb.exe 1156 "C:\Windows\SysWOW64\jwfsngv.exe"171⤵
-
C:\Windows\SysWOW64\vnavwpb.exe"C:\Windows\SysWOW64\vnavwpb.exe"172⤵
-
C:\Windows\SysWOW64\jwgxzgb.exeC:\Windows\system32\jwgxzgb.exe 1148 "C:\Windows\SysWOW64\vnavwpb.exe"173⤵
-
C:\Windows\SysWOW64\jwgxzgb.exe"C:\Windows\SysWOW64\jwgxzgb.exe"174⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\thwiujh.exeC:\Windows\system32\thwiujh.exe 1152 "C:\Windows\SysWOW64\jwgxzgb.exe"175⤵
-
C:\Windows\SysWOW64\thwiujh.exe"C:\Windows\SysWOW64\thwiujh.exe"176⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\enaawvc.exeC:\Windows\system32\enaawvc.exe 1152 "C:\Windows\SysWOW64\thwiujh.exe"177⤵
-
C:\Windows\SysWOW64\enaawvc.exe"C:\Windows\SysWOW64\enaawvc.exe"178⤵
-
C:\Windows\SysWOW64\oyxljyj.exeC:\Windows\system32\oyxljyj.exe 1128 "C:\Windows\SysWOW64\enaawvc.exe"179⤵
-
C:\Windows\SysWOW64\oyxljyj.exe"C:\Windows\SysWOW64\oyxljyj.exe"180⤵
-
C:\Windows\SysWOW64\dcyfnln.exeC:\Windows\system32\dcyfnln.exe 1140 "C:\Windows\SysWOW64\oyxljyj.exe"181⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\dcyfnln.exe"C:\Windows\SysWOW64\dcyfnln.exe"182⤵
-
C:\Windows\SysWOW64\oyzqvgo.exeC:\Windows\system32\oyzqvgo.exe 1056 "C:\Windows\SysWOW64\dcyfnln.exe"183⤵
-
C:\Windows\SysWOW64\oyzqvgo.exe"C:\Windows\SysWOW64\oyzqvgo.exe"184⤵
-
C:\Windows\SysWOW64\blioakn.exeC:\Windows\system32\blioakn.exe 1156 "C:\Windows\SysWOW64\oyzqvgo.exe"185⤵
-
C:\Windows\SysWOW64\blioakn.exe"C:\Windows\SysWOW64\blioakn.exe"186⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\nqzixsy.exeC:\Windows\system32\nqzixsy.exe 1148 "C:\Windows\SysWOW64\blioakn.exe"187⤵
-
C:\Windows\SysWOW64\nqzixsy.exe"C:\Windows\SysWOW64\nqzixsy.exe"188⤵
-
C:\Windows\SysWOW64\yfebzet.exeC:\Windows\system32\yfebzet.exe 1028 "C:\Windows\SysWOW64\nqzixsy.exe"189⤵
-
C:\Windows\SysWOW64\yfebzet.exe"C:\Windows\SysWOW64\yfebzet.exe"190⤵
-
C:\Windows\SysWOW64\lwhdhmz.exeC:\Windows\system32\lwhdhmz.exe 1156 "C:\Windows\SysWOW64\yfebzet.exe"191⤵
-
C:\Windows\SysWOW64\lwhdhmz.exe"C:\Windows\SysWOW64\lwhdhmz.exe"192⤵
-
C:\Windows\SysWOW64\yjqtnqy.exeC:\Windows\system32\yjqtnqy.exe 1148 "C:\Windows\SysWOW64\lwhdhmz.exe"193⤵
-
C:\Windows\SysWOW64\yjqtnqy.exe"C:\Windows\SysWOW64\yjqtnqy.exe"194⤵
-
C:\Windows\SysWOW64\jerevly.exeC:\Windows\system32\jerevly.exe 1044 "C:\Windows\SysWOW64\yjqtnqy.exe"195⤵
-
C:\Windows\SysWOW64\jerevly.exe"C:\Windows\SysWOW64\jerevly.exe"196⤵
-
C:\Windows\SysWOW64\tpgoqof.exeC:\Windows\system32\tpgoqof.exe 1144 "C:\Windows\SysWOW64\jerevly.exe"197⤵
-
C:\Windows\SysWOW64\tpgoqof.exe"C:\Windows\SysWOW64\tpgoqof.exe"198⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\dkhgyin.exeC:\Windows\system32\dkhgyin.exe 1148 "C:\Windows\SysWOW64\tpgoqof.exe"199⤵
-
C:\Windows\SysWOW64\dkhgyin.exe"C:\Windows\SysWOW64\dkhgyin.exe"200⤵
-
C:\Windows\SysWOW64\ormzauj.exeC:\Windows\system32\ormzauj.exe 1148 "C:\Windows\SysWOW64\dkhgyin.exe"201⤵
-
C:\Windows\SysWOW64\ormzauj.exe"C:\Windows\SysWOW64\ormzauj.exe"202⤵
-
C:\Windows\SysWOW64\swduodu.exeC:\Windows\system32\swduodu.exe 1120 "C:\Windows\SysWOW64\ormzauj.exe"203⤵
-
C:\Windows\SysWOW64\swduodu.exe"C:\Windows\SysWOW64\swduodu.exe"204⤵
-
C:\Windows\SysWOW64\binuxjk.exeC:\Windows\system32\binuxjk.exe 1148 "C:\Windows\SysWOW64\swduodu.exe"205⤵
-
C:\Windows\SysWOW64\binuxjk.exe"C:\Windows\SysWOW64\binuxjk.exe"206⤵
-
C:\Windows\SysWOW64\lhrzhis.exeC:\Windows\system32\lhrzhis.exe 1148 "C:\Windows\SysWOW64\binuxjk.exe"207⤵
-
C:\Windows\SysWOW64\lhrzhis.exe"C:\Windows\SysWOW64\lhrzhis.exe"208⤵
-
C:\Windows\SysWOW64\vdskpcs.exeC:\Windows\system32\vdskpcs.exe 1044 "C:\Windows\SysWOW64\lhrzhis.exe"209⤵
-
C:\Windows\SysWOW64\vdskpcs.exe"C:\Windows\SysWOW64\vdskpcs.exe"210⤵
-
C:\Windows\SysWOW64\ibnmfly.exeC:\Windows\system32\ibnmfly.exe 1156 "C:\Windows\SysWOW64\vdskpcs.exe"211⤵
-
C:\Windows\SysWOW64\ibnmfly.exe"C:\Windows\SysWOW64\ibnmfly.exe"212⤵
-
C:\Windows\SysWOW64\ttdskba.exeC:\Windows\system32\ttdskba.exe 1044 "C:\Windows\SysWOW64\ibnmfly.exe"213⤵
-
C:\Windows\SysWOW64\ttdskba.exe"C:\Windows\SysWOW64\ttdskba.exe"214⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\dthpvzh.exeC:\Windows\system32\dthpvzh.exe 1044 "C:\Windows\SysWOW64\ttdskba.exe"215⤵
-
C:\Windows\SysWOW64\dthpvzh.exe"C:\Windows\SysWOW64\dthpvzh.exe"216⤵
-
C:\Windows\SysWOW64\qjksdaf.exeC:\Windows\system32\qjksdaf.exe 1148 "C:\Windows\SysWOW64\dthpvzh.exe"217⤵
-
C:\Windows\SysWOW64\qjksdaf.exe"C:\Windows\SysWOW64\qjksdaf.exe"218⤵
-
C:\Windows\SysWOW64\dievmil.exeC:\Windows\system32\dievmil.exe 1148 "C:\Windows\SysWOW64\qjksdaf.exe"219⤵
-
C:\Windows\SysWOW64\dievmil.exe"C:\Windows\SysWOW64\dievmil.exe"220⤵
-
C:\Windows\SysWOW64\ifjczjk.exeC:\Windows\system32\ifjczjk.exe 560 "C:\Windows\SysWOW64\dievmil.exe"221⤵
-
C:\Windows\SysWOW64\ifjczjk.exe"C:\Windows\SysWOW64\ifjczjk.exe"222⤵
-
C:\Windows\SysWOW64\vstsfnr.exeC:\Windows\system32\vstsfnr.exe 1044 "C:\Windows\SysWOW64\ifjczjk.exe"223⤵
-
C:\Windows\SysWOW64\vstsfnr.exe"C:\Windows\SysWOW64\vstsfnr.exe"224⤵
-
C:\Windows\SysWOW64\veflurv.exeC:\Windows\system32\veflurv.exe 1044 "C:\Windows\SysWOW64\vstsfnr.exe"225⤵
-
C:\Windows\SysWOW64\veflurv.exe"C:\Windows\SysWOW64\veflurv.exe"226⤵
-
C:\Windows\SysWOW64\iylafdz.exeC:\Windows\system32\iylafdz.exe 1156 "C:\Windows\SysWOW64\veflurv.exe"227⤵
-
C:\Windows\SysWOW64\iylafdz.exe"C:\Windows\SysWOW64\iylafdz.exe"228⤵
-
C:\Windows\SysWOW64\qzkaukd.exeC:\Windows\system32\qzkaukd.exe 1148 "C:\Windows\SysWOW64\iylafdz.exe"229⤵
-
C:\Windows\SysWOW64\qzkaukd.exe"C:\Windows\SysWOW64\qzkaukd.exe"230⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\yogoxua.exeC:\Windows\system32\yogoxua.exe 1148 "C:\Windows\SysWOW64\qzkaukd.exe"231⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\yogoxua.exe"C:\Windows\SysWOW64\yogoxua.exe"232⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\dqwocfo.exeC:\Windows\system32\dqwocfo.exe 1016 "C:\Windows\SysWOW64\yogoxua.exe"233⤵
-
C:\Windows\SysWOW64\dqwocfo.exe"C:\Windows\SysWOW64\dqwocfo.exe"234⤵
-
C:\Windows\SysWOW64\njjjhfg.exeC:\Windows\system32\njjjhfg.exe 1148 "C:\Windows\SysWOW64\dqwocfo.exe"235⤵
-
C:\Windows\SysWOW64\njjjhfg.exe"C:\Windows\SysWOW64\njjjhfg.exe"236⤵
-
C:\Windows\SysWOW64\dzuropc.exeC:\Windows\system32\dzuropc.exe 1008 "C:\Windows\SysWOW64\njjjhfg.exe"237⤵
-
C:\Windows\SysWOW64\dzuropc.exe"C:\Windows\SysWOW64\dzuropc.exe"238⤵
-
C:\Windows\SysWOW64\nyhoynk.exeC:\Windows\system32\nyhoynk.exe 1112 "C:\Windows\SysWOW64\dzuropc.exe"239⤵
-
C:\Windows\SysWOW64\nyhoynk.exe"C:\Windows\SysWOW64\nyhoynk.exe"240⤵
-
C:\Windows\SysWOW64\vcjbizm.exeC:\Windows\system32\vcjbizm.exe 1148 "C:\Windows\SysWOW64\nyhoynk.exe"241⤵