Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 07:57
Static task
static1
Behavioral task
behavioral1
Sample
28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe
Resource
win10v2004-20220812-en
General
-
Target
28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe
-
Size
456KB
-
MD5
1868ddcb27c554fb6d2b3c7a74beb6b0
-
SHA1
7dd423a01d06ac9fe998afe76a3b9efa3cfe936e
-
SHA256
28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
-
SHA512
721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
SSDEEP
12288:M7+0MXILpzpF3485Q8v3KPynplSTCJql6wnn3af:M7GXApn5QyUe4CJql6InU
Malware Config
Signatures
-
Executes dropped EXE 37 IoCs
Processes:
fvo.exefvo.exezgn.exezgn.exekow.exekow.exewnf.exewnf.exewnf.exewnf.exepmo.exepmo.exepmo.exebmp.exebmp.exevlz.exevlz.exegki.exegki.exeskr.exeskr.exemjs.exemjs.exexjb.exexjb.exexjb.exexjb.exerez.exerez.exegsn.exegsn.exewlr.exewlr.exelyf.exelyf.exexyg.exexyg.exepid process 764 fvo.exe 1920 fvo.exe 1752 zgn.exe 972 zgn.exe 1888 kow.exe 840 kow.exe 1200 wnf.exe 1560 wnf.exe 1976 wnf.exe 984 wnf.exe 1236 pmo.exe 1996 pmo.exe 1912 pmo.exe 1312 bmp.exe 2040 bmp.exe 1148 vlz.exe 1488 vlz.exe 1816 gki.exe 1604 gki.exe 544 skr.exe 1944 skr.exe 880 mjs.exe 1796 mjs.exe 1328 xjb.exe 876 xjb.exe 1948 xjb.exe 1616 xjb.exe 2024 rez.exe 592 rez.exe 1644 gsn.exe 584 gsn.exe 1624 wlr.exe 1296 wlr.exe 1676 lyf.exe 1160 lyf.exe 972 xyg.exe 1796 xyg.exe -
Loads dropped DLL 32 IoCs
Processes:
28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exefvo.exezgn.exekow.exewnf.exepmo.exebmp.exevlz.exegki.exeskr.exemjs.exexjb.exerez.exegsn.exewlr.exelyf.exepid process 1300 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 1300 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 1920 fvo.exe 1920 fvo.exe 972 zgn.exe 972 zgn.exe 840 kow.exe 840 kow.exe 984 wnf.exe 984 wnf.exe 1912 pmo.exe 1912 pmo.exe 2040 bmp.exe 2040 bmp.exe 1488 vlz.exe 1488 vlz.exe 1604 gki.exe 1604 gki.exe 1944 skr.exe 1944 skr.exe 1796 mjs.exe 1796 mjs.exe 1616 xjb.exe 1616 xjb.exe 592 rez.exe 592 rez.exe 584 gsn.exe 584 gsn.exe 1296 wlr.exe 1296 wlr.exe 1160 lyf.exe 1160 lyf.exe -
Drops file in System32 directory 32 IoCs
Processes:
gsn.exeskr.exemjs.exerez.exevlz.exewlr.exelyf.exexjb.exefvo.exezgn.exebmp.exekow.exewnf.exe28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exepmo.exegki.exedescription ioc process File opened for modification C:\Windows\SysWOW64\wlr.exe gsn.exe File created C:\Windows\SysWOW64\mjs.exe skr.exe File opened for modification C:\Windows\SysWOW64\xjb.exe mjs.exe File created C:\Windows\SysWOW64\gsn.exe rez.exe File created C:\Windows\SysWOW64\gki.exe vlz.exe File opened for modification C:\Windows\SysWOW64\lyf.exe wlr.exe File created C:\Windows\SysWOW64\xyg.exe lyf.exe File opened for modification C:\Windows\SysWOW64\rez.exe xjb.exe File opened for modification C:\Windows\SysWOW64\zgn.exe fvo.exe File opened for modification C:\Windows\SysWOW64\kow.exe zgn.exe File created C:\Windows\SysWOW64\vlz.exe bmp.exe File opened for modification C:\Windows\SysWOW64\vlz.exe bmp.exe File created C:\Windows\SysWOW64\rez.exe xjb.exe File created C:\Windows\SysWOW64\zgn.exe fvo.exe File opened for modification C:\Windows\SysWOW64\wnf.exe kow.exe File opened for modification C:\Windows\SysWOW64\pmo.exe wnf.exe File created C:\Windows\SysWOW64\lyf.exe wlr.exe File opened for modification C:\Windows\SysWOW64\xyg.exe lyf.exe File created C:\Windows\SysWOW64\fvo.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe File opened for modification C:\Windows\SysWOW64\bmp.exe pmo.exe File created C:\Windows\SysWOW64\xjb.exe mjs.exe File created C:\Windows\SysWOW64\pmo.exe wnf.exe File opened for modification C:\Windows\SysWOW64\gki.exe vlz.exe File created C:\Windows\SysWOW64\bmp.exe pmo.exe File created C:\Windows\SysWOW64\skr.exe gki.exe File opened for modification C:\Windows\SysWOW64\gsn.exe rez.exe File opened for modification C:\Windows\SysWOW64\skr.exe gki.exe File opened for modification C:\Windows\SysWOW64\mjs.exe skr.exe File created C:\Windows\SysWOW64\wlr.exe gsn.exe File opened for modification C:\Windows\SysWOW64\fvo.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe File created C:\Windows\SysWOW64\kow.exe zgn.exe File created C:\Windows\SysWOW64\wnf.exe kow.exe -
Suspicious use of SetThreadContext 17 IoCs
Processes:
28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exefvo.exezgn.exekow.exewnf.exepmo.exebmp.exevlz.exegki.exeskr.exemjs.exexjb.exerez.exegsn.exewlr.exelyf.exexyg.exedescription pid process target process PID 992 set thread context of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 764 set thread context of 1920 764 fvo.exe fvo.exe PID 1752 set thread context of 972 1752 zgn.exe zgn.exe PID 1888 set thread context of 840 1888 kow.exe kow.exe PID 1200 set thread context of 984 1200 wnf.exe wnf.exe PID 1236 set thread context of 1912 1236 pmo.exe pmo.exe PID 1312 set thread context of 2040 1312 bmp.exe bmp.exe PID 1148 set thread context of 1488 1148 vlz.exe vlz.exe PID 1816 set thread context of 1604 1816 gki.exe gki.exe PID 544 set thread context of 1944 544 skr.exe skr.exe PID 880 set thread context of 1796 880 mjs.exe mjs.exe PID 1328 set thread context of 1616 1328 xjb.exe xjb.exe PID 2024 set thread context of 592 2024 rez.exe rez.exe PID 1644 set thread context of 584 1644 gsn.exe gsn.exe PID 1624 set thread context of 1296 1624 wlr.exe wlr.exe PID 1676 set thread context of 1160 1676 lyf.exe lyf.exe PID 972 set thread context of 1796 972 xyg.exe xyg.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
wnf.exepmo.exexjb.exepid process 1200 wnf.exe 1200 wnf.exe 1236 pmo.exe 1328 xjb.exe 1328 xjb.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exefvo.exezgn.exekow.exewnf.exepmo.exebmp.exevlz.exegki.exeskr.exemjs.exexjb.exerez.exegsn.exewlr.exelyf.exexyg.exedescription pid process Token: SeDebugPrivilege 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe Token: SeDebugPrivilege 764 fvo.exe Token: SeDebugPrivilege 1752 zgn.exe Token: SeDebugPrivilege 1888 kow.exe Token: SeDebugPrivilege 1200 wnf.exe Token: SeDebugPrivilege 1236 pmo.exe Token: SeDebugPrivilege 1312 bmp.exe Token: SeDebugPrivilege 1148 vlz.exe Token: SeDebugPrivilege 1816 gki.exe Token: SeDebugPrivilege 544 skr.exe Token: SeDebugPrivilege 880 mjs.exe Token: SeDebugPrivilege 1328 xjb.exe Token: SeDebugPrivilege 2024 rez.exe Token: SeDebugPrivilege 1644 gsn.exe Token: SeDebugPrivilege 1624 wlr.exe Token: SeDebugPrivilege 1676 lyf.exe Token: SeDebugPrivilege 972 xyg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exefvo.exefvo.exezgn.exezgn.exekow.exedescription pid process target process PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 992 wrote to memory of 1300 992 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe PID 1300 wrote to memory of 764 1300 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe fvo.exe PID 1300 wrote to memory of 764 1300 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe fvo.exe PID 1300 wrote to memory of 764 1300 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe fvo.exe PID 1300 wrote to memory of 764 1300 28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 764 wrote to memory of 1920 764 fvo.exe fvo.exe PID 1920 wrote to memory of 1752 1920 fvo.exe zgn.exe PID 1920 wrote to memory of 1752 1920 fvo.exe zgn.exe PID 1920 wrote to memory of 1752 1920 fvo.exe zgn.exe PID 1920 wrote to memory of 1752 1920 fvo.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 1752 wrote to memory of 972 1752 zgn.exe zgn.exe PID 972 wrote to memory of 1888 972 zgn.exe kow.exe PID 972 wrote to memory of 1888 972 zgn.exe kow.exe PID 972 wrote to memory of 1888 972 zgn.exe kow.exe PID 972 wrote to memory of 1888 972 zgn.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe PID 1888 wrote to memory of 840 1888 kow.exe kow.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe"C:\Users\Admin\AppData\Local\Temp\28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe"C:\Users\Admin\AppData\Local\Temp\28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\fvo.exeC:\Windows\system32\fvo.exe 768 "C:\Users\Admin\AppData\Local\Temp\28f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\fvo.exe"C:\Windows\SysWOW64\fvo.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\zgn.exeC:\Windows\system32\zgn.exe 480 "C:\Windows\SysWOW64\fvo.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\zgn.exe"C:\Windows\SysWOW64\zgn.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\kow.exeC:\Windows\system32\kow.exe 496 "C:\Windows\SysWOW64\zgn.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\kow.exe"C:\Windows\SysWOW64\kow.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wnf.exeC:\Windows\system32\wnf.exe 496 "C:\Windows\SysWOW64\kow.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wnf.exe"C:\Windows\SysWOW64\wnf.exe"10⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\wnf.exe"C:\Windows\SysWOW64\wnf.exe"10⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\wnf.exe"C:\Windows\SysWOW64\wnf.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\pmo.exeC:\Windows\system32\pmo.exe 480 "C:\Windows\SysWOW64\wnf.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\pmo.exe"C:\Windows\SysWOW64\pmo.exe"12⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\pmo.exe"C:\Windows\SysWOW64\pmo.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\bmp.exeC:\Windows\system32\bmp.exe 472 "C:\Windows\SysWOW64\pmo.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\bmp.exe"C:\Windows\SysWOW64\bmp.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\vlz.exeC:\Windows\system32\vlz.exe 484 "C:\Windows\SysWOW64\bmp.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\vlz.exe"C:\Windows\SysWOW64\vlz.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\gki.exeC:\Windows\system32\gki.exe 488 "C:\Windows\SysWOW64\vlz.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\gki.exe"C:\Windows\SysWOW64\gki.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\skr.exeC:\Windows\system32\skr.exe 536 "C:\Windows\SysWOW64\gki.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\skr.exe"C:\Windows\SysWOW64\skr.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\mjs.exeC:\Windows\system32\mjs.exe 540 "C:\Windows\SysWOW64\skr.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\mjs.exe"C:\Windows\SysWOW64\mjs.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\xjb.exeC:\Windows\system32\xjb.exe 536 "C:\Windows\SysWOW64\mjs.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\xjb.exe"C:\Windows\SysWOW64\xjb.exe"24⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\xjb.exe"C:\Windows\SysWOW64\xjb.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\rez.exeC:\Windows\system32\rez.exe 468 "C:\Windows\SysWOW64\xjb.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rez.exe"C:\Windows\SysWOW64\rez.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\gsn.exeC:\Windows\system32\gsn.exe 500 "C:\Windows\SysWOW64\rez.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\gsn.exe"C:\Windows\SysWOW64\gsn.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\wlr.exeC:\Windows\system32\wlr.exe 476 "C:\Windows\SysWOW64\gsn.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wlr.exe"C:\Windows\SysWOW64\wlr.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\lyf.exeC:\Windows\system32\lyf.exe 468 "C:\Windows\SysWOW64\wlr.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\lyf.exe"C:\Windows\SysWOW64\lyf.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\xyg.exeC:\Windows\system32\xyg.exe 500 "C:\Windows\SysWOW64\lyf.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\xyg.exe"C:\Windows\SysWOW64\xyg.exe"34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\xjb.exe"C:\Windows\SysWOW64\xjb.exe"24⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\bmp.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\bmp.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\bmp.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\fvo.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\fvo.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\fvo.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\gki.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\gki.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\gki.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\kow.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\kow.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\kow.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\mjs.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\mjs.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\mjs.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\pmo.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\pmo.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\pmo.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\pmo.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\rez.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\rez.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\skr.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\skr.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\skr.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\vlz.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\vlz.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\vlz.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\wnf.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\wnf.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\wnf.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\wnf.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\wnf.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\xjb.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\xjb.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\xjb.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\xjb.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\xjb.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\zgn.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\zgn.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
C:\Windows\SysWOW64\zgn.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\bmp.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\bmp.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\fvo.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\fvo.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\gki.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\gki.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\kow.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\kow.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\mjs.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\mjs.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\pmo.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\pmo.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\rez.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\rez.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\skr.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\skr.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\vlz.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\vlz.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\wnf.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\wnf.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\xjb.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\xjb.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\zgn.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
\Windows\SysWOW64\zgn.exeFilesize
456KB
MD51868ddcb27c554fb6d2b3c7a74beb6b0
SHA17dd423a01d06ac9fe998afe76a3b9efa3cfe936e
SHA25628f09d44b198849e6423f43f8a4cb5c70db6c14eccfb6fcb7db453b471e9fc90
SHA512721bb0ea002909723b810490e052fcdcebe7634bc65b57ba660ff2c8bf373c9c92a52f2c5c9d08c7eb1829c8b0aba6c9eeba8e5c6b31fa5dbde942b82908a1aa
-
memory/544-313-0x00000000746D0000-0x0000000074C7B000-memory.dmpFilesize
5.7MB
-
memory/544-293-0x0000000000000000-mapping.dmp
-
memory/584-412-0x00000000005054C8-mapping.dmp
-
memory/584-437-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/592-391-0x00000000005054C8-mapping.dmp
-
memory/592-416-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/764-99-0x00000000743B0000-0x000000007495B000-memory.dmpFilesize
5.7MB
-
memory/764-86-0x00000000743B0000-0x000000007495B000-memory.dmpFilesize
5.7MB
-
memory/764-83-0x00000000743B0000-0x000000007495B000-memory.dmpFilesize
5.7MB
-
memory/764-77-0x0000000000000000-mapping.dmp
-
memory/840-183-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/840-150-0x00000000005054C8-mapping.dmp
-
memory/880-339-0x0000000074650000-0x0000000074BFB000-memory.dmpFilesize
5.7MB
-
memory/880-319-0x0000000000000000-mapping.dmp
-
memory/972-155-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/972-478-0x0000000074650000-0x0000000074BFB000-memory.dmpFilesize
5.7MB
-
memory/972-461-0x0000000000000000-mapping.dmp
-
memory/972-124-0x00000000005054C8-mapping.dmp
-
memory/984-210-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/984-178-0x00000000005054C8-mapping.dmp
-
memory/992-55-0x0000000074AA0000-0x000000007504B000-memory.dmpFilesize
5.7MB
-
memory/992-72-0x0000000074AA0000-0x000000007504B000-memory.dmpFilesize
5.7MB
-
memory/992-54-0x0000000076561000-0x0000000076563000-memory.dmpFilesize
8KB
-
memory/1148-240-0x0000000000000000-mapping.dmp
-
memory/1148-261-0x00000000746D0000-0x0000000074C7B000-memory.dmpFilesize
5.7MB
-
memory/1148-245-0x00000000746D0000-0x0000000074C7B000-memory.dmpFilesize
5.7MB
-
memory/1160-455-0x00000000005054C8-mapping.dmp
-
memory/1160-480-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1200-159-0x0000000000000000-mapping.dmp
-
memory/1200-181-0x0000000074690000-0x0000000074C3B000-memory.dmpFilesize
5.7MB
-
memory/1236-187-0x0000000000000000-mapping.dmp
-
memory/1236-208-0x00000000746D0000-0x0000000074C7B000-memory.dmpFilesize
5.7MB
-
memory/1296-459-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1296-433-0x00000000005054C8-mapping.dmp
-
memory/1300-63-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1300-61-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1300-64-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1300-100-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1300-66-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1300-69-0x00000000005054C8-mapping.dmp
-
memory/1300-71-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1300-67-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1300-56-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1300-68-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1300-74-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1300-59-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1300-57-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1312-214-0x0000000000000000-mapping.dmp
-
memory/1312-234-0x00000000746C0000-0x0000000074C6B000-memory.dmpFilesize
5.7MB
-
memory/1328-345-0x0000000000000000-mapping.dmp
-
memory/1328-367-0x00000000746D0000-0x0000000074C7B000-memory.dmpFilesize
5.7MB
-
memory/1488-289-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1488-258-0x00000000005054C8-mapping.dmp
-
memory/1604-284-0x00000000005054C8-mapping.dmp
-
memory/1604-315-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1616-395-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1616-364-0x00000000005054C8-mapping.dmp
-
memory/1624-435-0x0000000074650000-0x0000000074BFB000-memory.dmpFilesize
5.7MB
-
memory/1624-418-0x0000000000000000-mapping.dmp
-
memory/1644-397-0x0000000000000000-mapping.dmp
-
memory/1644-414-0x00000000746D0000-0x0000000074C7B000-memory.dmpFilesize
5.7MB
-
memory/1676-457-0x00000000746D0000-0x0000000074C7B000-memory.dmpFilesize
5.7MB
-
memory/1676-442-0x00000000746D0000-0x0000000074C7B000-memory.dmpFilesize
5.7MB
-
memory/1676-439-0x0000000000000000-mapping.dmp
-
memory/1752-106-0x0000000000000000-mapping.dmp
-
memory/1752-127-0x00000000746D0000-0x0000000074C7B000-memory.dmpFilesize
5.7MB
-
memory/1752-111-0x00000000746D0000-0x0000000074C7B000-memory.dmpFilesize
5.7MB
-
memory/1796-476-0x00000000005054C8-mapping.dmp
-
memory/1796-369-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1796-336-0x00000000005054C8-mapping.dmp
-
memory/1816-267-0x0000000000000000-mapping.dmp
-
memory/1816-287-0x00000000746C0000-0x0000000074C6B000-memory.dmpFilesize
5.7MB
-
memory/1888-154-0x0000000074650000-0x0000000074BFB000-memory.dmpFilesize
5.7MB
-
memory/1888-133-0x0000000000000000-mapping.dmp
-
memory/1912-236-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1912-205-0x00000000005054C8-mapping.dmp
-
memory/1920-129-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1920-96-0x00000000005054C8-mapping.dmp
-
memory/1920-102-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1944-341-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/1944-310-0x00000000005054C8-mapping.dmp
-
memory/2024-373-0x0000000000000000-mapping.dmp
-
memory/2024-388-0x0000000074650000-0x0000000074BFB000-memory.dmpFilesize
5.7MB
-
memory/2024-393-0x0000000074650000-0x0000000074BFB000-memory.dmpFilesize
5.7MB
-
memory/2040-263-0x0000000000400000-0x0000000000506000-memory.dmpFilesize
1.0MB
-
memory/2040-231-0x00000000005054C8-mapping.dmp