Analysis
-
max time kernel
30s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230712-es -
resource tags
arch:x64arch:x86image:win7-20230712-eslocale:es-esos:windows7-x64systemwindows -
submitted
22-07-2023 12:29
Behavioral task
behavioral1
Sample
Servidor [TecnoHack].exe
Resource
win7-20230712-es
windows7-x64
11 signatures
300 seconds
General
-
Target
Servidor [TecnoHack].exe
-
Size
420KB
-
MD5
b8ca6a24abb8d86569eac23d16f50400
-
SHA1
0507162b2c4cbb0897e536936919849e48cf1231
-
SHA256
935222956dbc43b0be39f98ae9e85924ef7ca15cf5bbeacd0a59db5760542926
-
SHA512
0b229d295cdad23e8c050e38a329dc477819a0ad1967c958e47b6183510083c1fb9faf0b87f016ea088042ebc116c8fca93b2e53d210c94693436c3bdfdf6213
-
SSDEEP
12288:Qkw6VLOrPw0a/s8+2YnRR6NvQVr74D6AxAIG+nQWi4PGP3JF:73LOrPor+28iNvQyFbnFi4eP
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\xdy Servidor [TecnoHack].exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\xdy\StubPath = "C:\\Windows\\system32\\xdy.exe" Servidor [TecnoHack].exe -
Executes dropped EXE 64 IoCs
pid Process 2056 XANDER.EXE 2832 XANDER.EXE 2856 XANDER.EXE 3012 XANDER.EXE 1688 XANDER.EXE 2932 XANDER.EXE 2744 XANDER.EXE 2664 XANDER.EXE 556 XANDER.EXE 2368 XANDER.EXE 1132 XANDER.EXE 2804 XANDER.EXE 1520 XANDER.EXE 2952 XANDER.EXE 2284 XANDER.EXE 1804 XANDER.EXE 1068 XANDER.EXE 2352 XANDER.EXE 2400 XANDER.EXE 564 XANDER.EXE 2164 XANDER.EXE 1680 XANDER.EXE 2540 XANDER.EXE 2228 XANDER.EXE 268 XANDER.EXE 2004 XANDER.EXE 1584 XANDER.EXE 1560 XANDER.EXE 284 XANDER.EXE 1532 XANDER.EXE 696 XANDER.EXE 1816 XANDER.EXE 1760 XANDER.EXE 1628 XANDER.EXE 2404 XANDER.EXE 2424 XANDER.EXE 1896 XANDER.EXE 828 XANDER.EXE 2496 XANDER.EXE 1548 XANDER.EXE 2068 XANDER.EXE 1080 XANDER.EXE 584 XANDER.EXE 2292 XANDER.EXE 864 XANDER.EXE 2788 XANDER.EXE 764 XANDER.EXE 2536 XANDER.EXE 1708 XANDER.EXE 2304 XANDER.EXE 2240 XANDER.EXE 2556 XANDER.EXE 780 XANDER.EXE 980 XANDER.EXE 1504 XANDER.EXE 1160 XANDER.EXE 2908 XANDER.EXE 2808 XANDER.EXE 2976 XANDER.EXE 924 XANDER.EXE 2012 XANDER.EXE 2964 XANDER.EXE 2824 XANDER.EXE 1992 XANDER.EXE -
Loads dropped DLL 64 IoCs
pid Process 1948 Servidor [TecnoHack].exe 1948 Servidor [TecnoHack].exe 2056 XANDER.EXE 2056 XANDER.EXE 2056 XANDER.EXE 2832 XANDER.EXE 2832 XANDER.EXE 2832 XANDER.EXE 2856 XANDER.EXE 2856 XANDER.EXE 2856 XANDER.EXE 3012 XANDER.EXE 3012 XANDER.EXE 3012 XANDER.EXE 1688 XANDER.EXE 1688 XANDER.EXE 1688 XANDER.EXE 2932 XANDER.EXE 2932 XANDER.EXE 2932 XANDER.EXE 2744 XANDER.EXE 2744 XANDER.EXE 2744 XANDER.EXE 2664 XANDER.EXE 2664 XANDER.EXE 2664 XANDER.EXE 556 XANDER.EXE 556 XANDER.EXE 556 XANDER.EXE 2368 XANDER.EXE 2368 XANDER.EXE 2368 XANDER.EXE 1132 XANDER.EXE 1132 XANDER.EXE 1132 XANDER.EXE 2804 XANDER.EXE 2804 XANDER.EXE 2804 XANDER.EXE 1520 XANDER.EXE 1520 XANDER.EXE 1520 XANDER.EXE 2952 XANDER.EXE 2952 XANDER.EXE 2952 XANDER.EXE 2284 XANDER.EXE 2284 XANDER.EXE 2284 XANDER.EXE 1804 XANDER.EXE 1804 XANDER.EXE 1804 XANDER.EXE 1068 XANDER.EXE 1068 XANDER.EXE 1068 XANDER.EXE 2352 XANDER.EXE 2352 XANDER.EXE 2352 XANDER.EXE 2400 XANDER.EXE 2400 XANDER.EXE 2400 XANDER.EXE 564 XANDER.EXE 564 XANDER.EXE 564 XANDER.EXE 2164 XANDER.EXE 2164 XANDER.EXE -
resource yara_rule behavioral1/memory/1948-54-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x000f000000012260-60.dat upx behavioral1/memory/1948-61-0x0000000003270000-0x000000000333A000-memory.dmp upx behavioral1/files/0x000f000000012260-65.dat upx behavioral1/files/0x000f000000012260-67.dat upx behavioral1/files/0x000f000000012260-63.dat upx behavioral1/memory/1948-68-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x000f000000012260-71.dat upx behavioral1/memory/2832-77-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x000f000000012260-76.dat upx behavioral1/files/0x000f000000012260-75.dat upx behavioral1/files/0x000f000000012260-73.dat upx behavioral1/files/0x000f000000012260-72.dat upx behavioral1/files/0x000f000000012260-81.dat upx behavioral1/files/0x000f000000012260-79.dat upx behavioral1/files/0x000f000000012260-80.dat upx behavioral1/files/0x000f000000012260-83.dat upx behavioral1/memory/2856-85-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x000f000000012260-90.dat upx behavioral1/files/0x000f000000012260-87.dat upx behavioral1/files/0x000f000000012260-91.dat upx behavioral1/files/0x000f000000012260-93.dat upx behavioral1/files/0x000f000000012260-94.dat upx behavioral1/files/0x000f000000012260-92.dat upx behavioral1/files/0x000f000000012260-89.dat upx behavioral1/files/0x000f000000012260-88.dat upx behavioral1/files/0x000f000000012260-95.dat upx behavioral1/memory/3012-98-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x000f000000012260-97.dat upx behavioral1/files/0x000f000000012260-96.dat upx behavioral1/files/0x000f000000012260-99.dat upx behavioral1/memory/1688-101-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x000f000000012260-107.dat upx behavioral1/files/0x000f000000012260-106.dat upx behavioral1/files/0x000f000000012260-105.dat upx behavioral1/files/0x000f000000012260-104.dat upx behavioral1/memory/2932-108-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x000f000000012260-111.dat upx behavioral1/files/0x000f000000012260-113.dat upx behavioral1/files/0x000f000000012260-112.dat upx behavioral1/memory/2664-116-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x000f000000012260-114.dat upx behavioral1/files/0x000f000000012260-124.dat upx behavioral1/files/0x000f000000012260-122.dat upx behavioral1/files/0x000f000000012260-121.dat upx behavioral1/files/0x000f000000012260-120.dat upx behavioral1/memory/2744-127-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x000f000000012260-132.dat upx behavioral1/files/0x000f000000012260-128.dat upx behavioral1/files/0x000f000000012260-130.dat upx behavioral1/files/0x000f000000012260-129.dat upx behavioral1/memory/2368-135-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/memory/556-134-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x000f000000012260-140.dat upx behavioral1/files/0x000f000000012260-139.dat upx behavioral1/files/0x000f000000012260-138.dat upx behavioral1/files/0x000f000000012260-141.dat upx behavioral1/files/0x000f000000012260-145.dat upx behavioral1/files/0x000f000000012260-144.dat upx behavioral1/files/0x000f000000012260-148.dat upx behavioral1/files/0x000f000000012260-147.dat upx behavioral1/memory/1132-152-0x0000000000400000-0x00000000004CA000-memory.dmp upx behavioral1/files/0x000f000000012260-155.dat upx behavioral1/files/0x000f000000012260-158.dat upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\xdy.exe Servidor [TecnoHack].exe File opened for modification C:\Windows\SysWOW64\xdy.exe Servidor [TecnoHack].exe File created C:\Windows\SysWOW64\XANDER.EXE Servidor [TecnoHack].exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4088 taskmgr.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe 4088 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2056 1948 Servidor [TecnoHack].exe 28 PID 1948 wrote to memory of 2056 1948 Servidor [TecnoHack].exe 28 PID 1948 wrote to memory of 2056 1948 Servidor [TecnoHack].exe 28 PID 1948 wrote to memory of 2056 1948 Servidor [TecnoHack].exe 28 PID 2056 wrote to memory of 2832 2056 XANDER.EXE 29 PID 2056 wrote to memory of 2832 2056 XANDER.EXE 29 PID 2056 wrote to memory of 2832 2056 XANDER.EXE 29 PID 2056 wrote to memory of 2832 2056 XANDER.EXE 29 PID 2832 wrote to memory of 2856 2832 XANDER.EXE 30 PID 2832 wrote to memory of 2856 2832 XANDER.EXE 30 PID 2832 wrote to memory of 2856 2832 XANDER.EXE 30 PID 2832 wrote to memory of 2856 2832 XANDER.EXE 30 PID 2856 wrote to memory of 3012 2856 XANDER.EXE 31 PID 2856 wrote to memory of 3012 2856 XANDER.EXE 31 PID 2856 wrote to memory of 3012 2856 XANDER.EXE 31 PID 2856 wrote to memory of 3012 2856 XANDER.EXE 31 PID 3012 wrote to memory of 1688 3012 XANDER.EXE 32 PID 3012 wrote to memory of 1688 3012 XANDER.EXE 32 PID 3012 wrote to memory of 1688 3012 XANDER.EXE 32 PID 3012 wrote to memory of 1688 3012 XANDER.EXE 32 PID 1688 wrote to memory of 2932 1688 XANDER.EXE 33 PID 1688 wrote to memory of 2932 1688 XANDER.EXE 33 PID 1688 wrote to memory of 2932 1688 XANDER.EXE 33 PID 1688 wrote to memory of 2932 1688 XANDER.EXE 33 PID 2932 wrote to memory of 2744 2932 XANDER.EXE 34 PID 2932 wrote to memory of 2744 2932 XANDER.EXE 34 PID 2932 wrote to memory of 2744 2932 XANDER.EXE 34 PID 2932 wrote to memory of 2744 2932 XANDER.EXE 34 PID 2744 wrote to memory of 2664 2744 XANDER.EXE 35 PID 2744 wrote to memory of 2664 2744 XANDER.EXE 35 PID 2744 wrote to memory of 2664 2744 XANDER.EXE 35 PID 2744 wrote to memory of 2664 2744 XANDER.EXE 35 PID 2664 wrote to memory of 556 2664 XANDER.EXE 36 PID 2664 wrote to memory of 556 2664 XANDER.EXE 36 PID 2664 wrote to memory of 556 2664 XANDER.EXE 36 PID 2664 wrote to memory of 556 2664 XANDER.EXE 36 PID 556 wrote to memory of 2368 556 XANDER.EXE 37 PID 556 wrote to memory of 2368 556 XANDER.EXE 37 PID 556 wrote to memory of 2368 556 XANDER.EXE 37 PID 556 wrote to memory of 2368 556 XANDER.EXE 37 PID 2368 wrote to memory of 1132 2368 XANDER.EXE 38 PID 2368 wrote to memory of 1132 2368 XANDER.EXE 38 PID 2368 wrote to memory of 1132 2368 XANDER.EXE 38 PID 2368 wrote to memory of 1132 2368 XANDER.EXE 38 PID 1132 wrote to memory of 2804 1132 XANDER.EXE 39 PID 1132 wrote to memory of 2804 1132 XANDER.EXE 39 PID 1132 wrote to memory of 2804 1132 XANDER.EXE 39 PID 1132 wrote to memory of 2804 1132 XANDER.EXE 39 PID 2804 wrote to memory of 1520 2804 XANDER.EXE 40 PID 2804 wrote to memory of 1520 2804 XANDER.EXE 40 PID 2804 wrote to memory of 1520 2804 XANDER.EXE 40 PID 2804 wrote to memory of 1520 2804 XANDER.EXE 40 PID 1520 wrote to memory of 2952 1520 XANDER.EXE 41 PID 1520 wrote to memory of 2952 1520 XANDER.EXE 41 PID 1520 wrote to memory of 2952 1520 XANDER.EXE 41 PID 1520 wrote to memory of 2952 1520 XANDER.EXE 41 PID 2952 wrote to memory of 2284 2952 XANDER.EXE 42 PID 2952 wrote to memory of 2284 2952 XANDER.EXE 42 PID 2952 wrote to memory of 2284 2952 XANDER.EXE 42 PID 2952 wrote to memory of 2284 2952 XANDER.EXE 42 PID 2284 wrote to memory of 1804 2284 XANDER.EXE 43 PID 2284 wrote to memory of 1804 2284 XANDER.EXE 43 PID 2284 wrote to memory of 1804 2284 XANDER.EXE 43 PID 2284 wrote to memory of 1804 2284 XANDER.EXE 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\Servidor [TecnoHack].exe"C:\Users\Admin\AppData\Local\Temp\Servidor [TecnoHack].exe"1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1068 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2352 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:564 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2164 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"23⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"24⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"25⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"26⤵
- Executes dropped EXE
PID:268 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"27⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"28⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"29⤵
- Executes dropped EXE
PID:1560 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"30⤵
- Executes dropped EXE
PID:284 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"31⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"32⤵
- Executes dropped EXE
PID:696 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"33⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"34⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"35⤵
- Executes dropped EXE
PID:1628 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"36⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"37⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"38⤵
- Executes dropped EXE
PID:1896 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"39⤵
- Executes dropped EXE
PID:828 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"40⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"41⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"42⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"43⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"44⤵
- Executes dropped EXE
PID:584 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"45⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"46⤵
- Executes dropped EXE
PID:864 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"47⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"48⤵
- Executes dropped EXE
PID:764 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"49⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"50⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"51⤵
- Executes dropped EXE
PID:2304 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"52⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"53⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"54⤵
- Executes dropped EXE
PID:780 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"55⤵
- Executes dropped EXE
PID:980 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"56⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"57⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"58⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"59⤵
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"60⤵
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"61⤵
- Executes dropped EXE
PID:924 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"62⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"63⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"64⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"65⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"66⤵PID:1476
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"67⤵PID:1480
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"68⤵PID:2064
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"69⤵PID:2800
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"70⤵PID:2436
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"71⤵PID:2920
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"72⤵PID:1952
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"73⤵PID:2672
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"74⤵PID:3040
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"75⤵PID:3048
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"76⤵PID:1516
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"77⤵PID:1820
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"78⤵PID:3084
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"79⤵PID:3112
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"80⤵PID:3132
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"81⤵PID:3152
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"82⤵PID:3180
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"83⤵PID:3200
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"84⤵PID:3220
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"85⤵PID:3240
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"86⤵PID:3268
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"87⤵PID:3292
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"88⤵PID:3316
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"89⤵PID:3336
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"90⤵PID:3356
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"91⤵PID:3372
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"92⤵PID:3404
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"93⤵PID:3428
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"94⤵PID:3448
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"95⤵PID:3468
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"96⤵PID:3496
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"97⤵PID:3516
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"98⤵PID:3536
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"99⤵PID:3556
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"100⤵PID:3576
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"101⤵PID:3596
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"102⤵PID:3616
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"103⤵PID:3636
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"104⤵PID:3660
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"105⤵PID:3684
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"106⤵PID:3704
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"107⤵PID:3728
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"108⤵PID:3756
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"109⤵PID:3776
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"110⤵PID:3796
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"111⤵PID:3820
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"112⤵PID:3840
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"113⤵PID:3864
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"114⤵PID:3888
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"115⤵PID:3908
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"116⤵PID:3928
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"117⤵PID:3956
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"118⤵PID:3976
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"119⤵PID:3996
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"120⤵PID:4016
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"121⤵PID:4036
-
C:\Windows\SysWOW64\XANDER.EXE"C:\Windows\system32\XANDER.EXE"122⤵PID:4056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-