Analysis
-
max time kernel
45s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe
Resource
win10v2004-20221111-en
General
-
Target
92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe
-
Size
183KB
-
MD5
35261d26c9363da97d429ff1dcb4b195
-
SHA1
3bc8acfe911de0c0d146bee4111ecb8a723d0876
-
SHA256
92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2
-
SHA512
ac4a000367a9da88b5031ce0ef5a667b012292a2dd948e7cbc5129b1dc44ac8c929c2be82934a2ea8d9b6579b411879f7f51c3d41e622ed4304eaeeb2e4451c3
-
SSDEEP
3072:FWMFx/ZIItATGcBhNZAxdJIeQ7hqrw1o98PsMBv3MCmJpTpj9B0tq:F5Fx/ZIfhfKx/8GcsMBvMCmJp58tq
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1828 taskmrg.exe 976 taskmrg.exe 2004 taskmrg.exe 744 taskmrg.exe 1736 taskmrg.exe 1172 taskmrg.exe 852 taskmrg.exe 1840 taskmrg.exe 1940 taskmrg.exe 1756 taskmrg.exe 808 taskmrg.exe 1388 taskmrg.exe 1248 taskmrg.exe 332 taskmrg.exe 272 taskmrg.exe 2040 taskmrg.exe 1768 taskmrg.exe 2020 taskmrg.exe 1208 taskmrg.exe 960 taskmrg.exe 520 taskmrg.exe 584 taskmrg.exe 1736 taskmrg.exe 1168 taskmrg.exe 1952 taskmrg.exe 1508 taskmrg.exe 1936 taskmrg.exe 1916 taskmrg.exe 320 taskmrg.exe 1656 taskmrg.exe 1964 taskmrg.exe 1396 taskmrg.exe 1460 taskmrg.exe 880 taskmrg.exe 1552 taskmrg.exe 552 taskmrg.exe 2044 taskmrg.exe 1136 taskmrg.exe 2040 taskmrg.exe 1580 taskmrg.exe 2032 taskmrg.exe 2020 taskmrg.exe 568 taskmrg.exe 916 taskmrg.exe 908 taskmrg.exe 1124 taskmrg.exe 584 taskmrg.exe 1736 taskmrg.exe 544 taskmrg.exe 1280 taskmrg.exe 1068 taskmrg.exe 1356 taskmrg.exe 1412 taskmrg.exe 1444 taskmrg.exe 808 taskmrg.exe 1648 taskmrg.exe 1996 taskmrg.exe 1664 taskmrg.exe 796 taskmrg.exe 1968 taskmrg.exe 1556 taskmrg.exe 1408 taskmrg.exe 2008 taskmrg.exe 1612 taskmrg.exe -
Loads dropped DLL 64 IoCs
pid Process 1016 92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe 1016 92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe 1828 taskmrg.exe 1828 taskmrg.exe 976 taskmrg.exe 976 taskmrg.exe 2004 taskmrg.exe 2004 taskmrg.exe 744 taskmrg.exe 744 taskmrg.exe 1736 taskmrg.exe 1736 taskmrg.exe 1172 taskmrg.exe 1172 taskmrg.exe 852 taskmrg.exe 852 taskmrg.exe 1840 taskmrg.exe 1840 taskmrg.exe 1940 taskmrg.exe 1940 taskmrg.exe 1756 taskmrg.exe 1756 taskmrg.exe 808 taskmrg.exe 808 taskmrg.exe 1388 taskmrg.exe 1388 taskmrg.exe 1248 taskmrg.exe 1248 taskmrg.exe 332 taskmrg.exe 332 taskmrg.exe 272 taskmrg.exe 272 taskmrg.exe 2040 taskmrg.exe 2040 taskmrg.exe 1768 taskmrg.exe 1768 taskmrg.exe 2020 taskmrg.exe 2020 taskmrg.exe 1208 taskmrg.exe 1208 taskmrg.exe 960 taskmrg.exe 960 taskmrg.exe 520 taskmrg.exe 520 taskmrg.exe 584 taskmrg.exe 584 taskmrg.exe 1736 taskmrg.exe 1736 taskmrg.exe 1168 taskmrg.exe 1168 taskmrg.exe 1952 taskmrg.exe 1952 taskmrg.exe 1508 taskmrg.exe 1508 taskmrg.exe 1936 taskmrg.exe 1936 taskmrg.exe 1916 taskmrg.exe 1916 taskmrg.exe 320 taskmrg.exe 320 taskmrg.exe 1656 taskmrg.exe 1656 taskmrg.exe 1964 taskmrg.exe 1964 taskmrg.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 64 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini taskmrg.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 taskmrg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmrg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 taskmrg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1828 1016 92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe 27 PID 1016 wrote to memory of 1828 1016 92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe 27 PID 1016 wrote to memory of 1828 1016 92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe 27 PID 1016 wrote to memory of 1828 1016 92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe 27 PID 1828 wrote to memory of 976 1828 taskmrg.exe 28 PID 1828 wrote to memory of 976 1828 taskmrg.exe 28 PID 1828 wrote to memory of 976 1828 taskmrg.exe 28 PID 1828 wrote to memory of 976 1828 taskmrg.exe 28 PID 976 wrote to memory of 2004 976 taskmrg.exe 29 PID 976 wrote to memory of 2004 976 taskmrg.exe 29 PID 976 wrote to memory of 2004 976 taskmrg.exe 29 PID 976 wrote to memory of 2004 976 taskmrg.exe 29 PID 2004 wrote to memory of 744 2004 taskmrg.exe 30 PID 2004 wrote to memory of 744 2004 taskmrg.exe 30 PID 2004 wrote to memory of 744 2004 taskmrg.exe 30 PID 2004 wrote to memory of 744 2004 taskmrg.exe 30 PID 744 wrote to memory of 1736 744 taskmrg.exe 31 PID 744 wrote to memory of 1736 744 taskmrg.exe 31 PID 744 wrote to memory of 1736 744 taskmrg.exe 31 PID 744 wrote to memory of 1736 744 taskmrg.exe 31 PID 1736 wrote to memory of 1172 1736 taskmrg.exe 32 PID 1736 wrote to memory of 1172 1736 taskmrg.exe 32 PID 1736 wrote to memory of 1172 1736 taskmrg.exe 32 PID 1736 wrote to memory of 1172 1736 taskmrg.exe 32 PID 1172 wrote to memory of 852 1172 taskmrg.exe 33 PID 1172 wrote to memory of 852 1172 taskmrg.exe 33 PID 1172 wrote to memory of 852 1172 taskmrg.exe 33 PID 1172 wrote to memory of 852 1172 taskmrg.exe 33 PID 852 wrote to memory of 1840 852 taskmrg.exe 34 PID 852 wrote to memory of 1840 852 taskmrg.exe 34 PID 852 wrote to memory of 1840 852 taskmrg.exe 34 PID 852 wrote to memory of 1840 852 taskmrg.exe 34 PID 1840 wrote to memory of 1940 1840 taskmrg.exe 35 PID 1840 wrote to memory of 1940 1840 taskmrg.exe 35 PID 1840 wrote to memory of 1940 1840 taskmrg.exe 35 PID 1840 wrote to memory of 1940 1840 taskmrg.exe 35 PID 1940 wrote to memory of 1756 1940 taskmrg.exe 36 PID 1940 wrote to memory of 1756 1940 taskmrg.exe 36 PID 1940 wrote to memory of 1756 1940 taskmrg.exe 36 PID 1940 wrote to memory of 1756 1940 taskmrg.exe 36 PID 1756 wrote to memory of 808 1756 taskmrg.exe 37 PID 1756 wrote to memory of 808 1756 taskmrg.exe 37 PID 1756 wrote to memory of 808 1756 taskmrg.exe 37 PID 1756 wrote to memory of 808 1756 taskmrg.exe 37 PID 808 wrote to memory of 1388 808 taskmrg.exe 38 PID 808 wrote to memory of 1388 808 taskmrg.exe 38 PID 808 wrote to memory of 1388 808 taskmrg.exe 38 PID 808 wrote to memory of 1388 808 taskmrg.exe 38 PID 1388 wrote to memory of 1248 1388 taskmrg.exe 39 PID 1388 wrote to memory of 1248 1388 taskmrg.exe 39 PID 1388 wrote to memory of 1248 1388 taskmrg.exe 39 PID 1388 wrote to memory of 1248 1388 taskmrg.exe 39 PID 1248 wrote to memory of 332 1248 taskmrg.exe 40 PID 1248 wrote to memory of 332 1248 taskmrg.exe 40 PID 1248 wrote to memory of 332 1248 taskmrg.exe 40 PID 1248 wrote to memory of 332 1248 taskmrg.exe 40 PID 332 wrote to memory of 272 332 taskmrg.exe 41 PID 332 wrote to memory of 272 332 taskmrg.exe 41 PID 332 wrote to memory of 272 332 taskmrg.exe 41 PID 332 wrote to memory of 272 332 taskmrg.exe 41 PID 272 wrote to memory of 2040 272 taskmrg.exe 42 PID 272 wrote to memory of 2040 272 taskmrg.exe 42 PID 272 wrote to memory of 2040 272 taskmrg.exe 42 PID 272 wrote to memory of 2040 272 taskmrg.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe"C:\Users\Admin\AppData\Local\Temp\92ad00c6c1e5e20c8eb989d97ab7548fcd65e8e134e1c1215c5c14b820a321a2.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:2040 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:1768 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:2020 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1208 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:960 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:520 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:584 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1736 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1168 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1952 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
PID:1916 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
PID:320 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
PID:1656 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Checks processor information in registry
PID:1964 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe33⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1396 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe34⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1460 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe35⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
PID:880 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe36⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe37⤵
- Executes dropped EXE
- Checks processor information in registry
PID:552 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe38⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2044 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1136 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe40⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2040 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe41⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2032 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe43⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe44⤵
- Executes dropped EXE
- Checks processor information in registry
PID:568 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe45⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:916 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe46⤵
- Executes dropped EXE
- Checks processor information in registry
PID:908 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe47⤵
- Executes dropped EXE
PID:1124 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe48⤵
- Executes dropped EXE
PID:584 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe49⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1736 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe50⤵
- Executes dropped EXE
PID:544 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1280 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe52⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1068 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe53⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
PID:1356 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe54⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1412 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
PID:1444 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:808 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe57⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1648 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1996 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe59⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1664 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe60⤵
- Executes dropped EXE
PID:796 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe61⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe62⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1556 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1408 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe64⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2008 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe65⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe66⤵
- Drops file in System32 directory
- Checks processor information in registry
PID:1616 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe67⤵
- Writes to the Master Boot Record (MBR)
PID:588 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe68⤵PID:1768
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe69⤵
- Writes to the Master Boot Record (MBR)
PID:2020 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe70⤵PID:960
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe71⤵PID:1200
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe72⤵
- Drops file in System32 directory
PID:1084 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe73⤵PID:432
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe74⤵
- Drops file in System32 directory
PID:1104 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe75⤵
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe76⤵
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
PID:1532 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe77⤵
- Drops file in System32 directory
PID:1512 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe78⤵PID:1836
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe79⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe80⤵
- Drops file in System32 directory
PID:1344 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe81⤵PID:592
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe82⤵
- Checks processor information in registry
PID:1916 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe83⤵
- Writes to the Master Boot Record (MBR)
PID:1444 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe84⤵
- Drops file in System32 directory
PID:1312 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe85⤵
- Writes to the Master Boot Record (MBR)
PID:1648 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe86⤵
- Writes to the Master Boot Record (MBR)
PID:1248 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe87⤵
- Checks processor information in registry
PID:1996 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe88⤵
- Writes to the Master Boot Record (MBR)
PID:900 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe89⤵
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
PID:296 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe90⤵
- Drops file in System32 directory
PID:332 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe91⤵
- Drops file in System32 directory
- Checks processor information in registry
PID:1120 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe92⤵
- Drops file in System32 directory
- Checks processor information in registry
PID:1752 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe93⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
PID:1016 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe94⤵PID:976
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe95⤵
- Drops file in System32 directory
- Checks processor information in registry
PID:1724 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe96⤵
- Writes to the Master Boot Record (MBR)
PID:1616 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe97⤵
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
PID:636 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe98⤵
- Drops file in System32 directory
PID:2004 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe99⤵PID:1984
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe100⤵
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe101⤵PID:844
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe102⤵PID:524
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe103⤵
- Writes to the Master Boot Record (MBR)
PID:612 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe104⤵PID:1736
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe105⤵
- Drops file in System32 directory
- Checks processor information in registry
PID:544 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe106⤵PID:1532
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe107⤵PID:1004
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe108⤵PID:1936
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe109⤵
- Drops file in System32 directory
PID:772 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe110⤵PID:1756
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe111⤵
- Checks processor information in registry
PID:564 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe112⤵
- Drops file in System32 directory
PID:1444 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe113⤵PID:1312
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe114⤵PID:1648
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe115⤵PID:756
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe116⤵
- Drops file in System32 directory
PID:304 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe117⤵PID:1552
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe118⤵
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
PID:1992 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe119⤵PID:1976
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe120⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Checks processor information in registry
PID:332 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe121⤵PID:1608
-
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe122⤵PID:1752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-