Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
39927b40478fb42bf73f909b1e3cbe18.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39927b40478fb42bf73f909b1e3cbe18.exe
Resource
win10v2004-20231215-en
General
-
Target
39927b40478fb42bf73f909b1e3cbe18.exe
-
Size
440KB
-
MD5
39927b40478fb42bf73f909b1e3cbe18
-
SHA1
15d8cb53c2b5bf4e4e430d27a9c09584a0c741e6
-
SHA256
7f15f65eff5f4776a7a19cb5cc922f9e2e8c4cf5b066741fc0ea5190954a682f
-
SHA512
14ce0e8cb5e52a36531f45146302a0c6a965742673dde7207e7576df37a921ac6b284390bad59e9a6c03f87b33e6d9a255e052a124c34e87339adc449b75e8eb
-
SSDEEP
12288:dq3eTRLQp1cWhLb2LYGRfFWh9BQkgIGK+nN/a+LBaiKRqE:o3+RLQp15B2Lkh9WKQfBa1D
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2784 felehjr.exe 2692 felehjr.exe 2352 whzgitj.exe 2788 whzgitj.exe 2488 eljtsem.exe 2880 eljtsem.exe 1660 gkyjqjz.exe 1988 gkyjqjz.exe 700 pijxbnr.exe 1108 nslbkyj.exe 628 hbxesey.exe 2336 xrxyuxi.exe 2664 yegakhq.exe 560 cehwabp.exe 1812 kxnbxvx.exe 1488 kxnbxvx.exe 1656 uhdzclz.exe 1504 uhdzclz.exe 2392 zjlhbdj.exe 884 zjlhbdj.exe 2652 bfaccng.exe 2828 gckhpkn.exe 2736 zczcwre.exe 2612 okfzczx.exe 2856 norwyqg.exe 2128 norwyqg.exe 1748 quyhoqp.exe 1692 quyhoqp.exe 1644 crshnzy.exe 1524 xfwmlkx.exe 628 hbxesey.exe 1684 hbxesey.exe 1052 ehtcjot.exe 2036 rdnpohe.exe 2468 wndkwfk.exe 2272 wndkwfk.exe 1628 hstvlbx.exe 1700 gpsuriy.exe 1764 rzzdemu.exe 2820 otvzbtb.exe 3008 osicngw.exe 2592 bgmphxa.exe 3024 iohpbmj.exe 2912 iohpbmj.exe 528 vcxhbkp.exe 2216 qwvhvkt.exe 1936 adhffia.exe 2248 adhffia.exe 1952 hlufsyc.exe 2112 hlufsyc.exe 960 ghkorjx.exe 1208 rkhckxj.exe 2496 cbgpsgs.exe 2164 zruuwmt.exe 2416 bvdudtc.exe 1628 hstvlbx.exe 2284 tmzkwfb.exe 2588 tmzkwfb.exe 2908 nitmkfa.exe 2684 buucqvl.exe 1736 yroomft.exe 2988 lpnvypm.exe 440 otsdvla.exe 1780 tuyahio.exe -
Loads dropped DLL 64 IoCs
pid Process 2648 39927b40478fb42bf73f909b1e3cbe18.exe 2648 39927b40478fb42bf73f909b1e3cbe18.exe 2784 felehjr.exe 2692 felehjr.exe 2692 felehjr.exe 2352 whzgitj.exe 2788 whzgitj.exe 2788 whzgitj.exe 2488 eljtsem.exe 2880 eljtsem.exe 2880 eljtsem.exe 1660 gkyjqjz.exe 1988 gkyjqjz.exe 1988 gkyjqjz.exe 1108 nslbkyj.exe 1108 nslbkyj.exe 2336 xrxyuxi.exe 2336 xrxyuxi.exe 560 cehwabp.exe 560 cehwabp.exe 1488 kxnbxvx.exe 1488 kxnbxvx.exe 1504 uhdzclz.exe 1504 uhdzclz.exe 884 zjlhbdj.exe 884 zjlhbdj.exe 2828 gckhpkn.exe 2828 gckhpkn.exe 2612 okfzczx.exe 2612 okfzczx.exe 2128 norwyqg.exe 2128 norwyqg.exe 1692 quyhoqp.exe 1692 quyhoqp.exe 1524 xfwmlkx.exe 1524 xfwmlkx.exe 1684 hbxesey.exe 1684 hbxesey.exe 2036 rdnpohe.exe 2036 rdnpohe.exe 2272 wndkwfk.exe 2272 wndkwfk.exe 1700 gpsuriy.exe 1700 gpsuriy.exe 2820 otvzbtb.exe 2820 otvzbtb.exe 2592 bgmphxa.exe 2592 bgmphxa.exe 2912 iohpbmj.exe 2912 iohpbmj.exe 2216 qwvhvkt.exe 2216 qwvhvkt.exe 2248 adhffia.exe 2248 adhffia.exe 2112 hlufsyc.exe 2112 hlufsyc.exe 1208 rkhckxj.exe 1208 rkhckxj.exe 2164 zruuwmt.exe 2164 zruuwmt.exe 1628 hstvlbx.exe 1628 hstvlbx.exe 2588 tmzkwfb.exe 2588 tmzkwfb.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\myixopz.exe qxqkkdn.exe File created C:\Windows\SysWOW64\fsqnymj.exe abtacyy.exe File created C:\Windows\SysWOW64\ipjvkkx.exe ldoimir.exe File created C:\Windows\SysWOW64\hvefipx.exe npquuxv.exe File opened for modification C:\Windows\SysWOW64\qxjcdps.exe oydmfke.exe File opened for modification C:\Windows\SysWOW64\jmvvqjg.exe utyagnv.exe File created C:\Windows\SysWOW64\rygoqtw.exe dxmrhkw.exe File created C:\Windows\SysWOW64\wndkwfk.exe rdnpohe.exe File opened for modification C:\Windows\SysWOW64\lvrqujv.exe bwftbkn.exe File created C:\Windows\SysWOW64\cfkucdi.exe cbzhlrf.exe File created C:\Windows\SysWOW64\qoapmhe.exe bvdudtc.exe File created C:\Windows\SysWOW64\lhpnxqm.exe bfaccng.exe File opened for modification C:\Windows\SysWOW64\erszbqk.exe tiqbxgd.exe File opened for modification C:\Windows\SysWOW64\kbrkggj.exe dqlfjmb.exe File opened for modification C:\Windows\SysWOW64\welkjit.exe zspxton.exe File opened for modification C:\Windows\SysWOW64\yhlserl.exe nlkioxc.exe File created C:\Windows\SysWOW64\kkuytqj.exe aptoewj.exe File opened for modification C:\Windows\SysWOW64\yegakhq.exe qlhavsm.exe File opened for modification C:\Windows\SysWOW64\zspxton.exe xxmvyny.exe File opened for modification C:\Windows\SysWOW64\ccckdfi.exe ucdkwze.exe File opened for modification C:\Windows\SysWOW64\dbesmzr.exe olvigmy.exe File created C:\Windows\SysWOW64\scejgye.exe lvrqujv.exe File created C:\Windows\SysWOW64\rdilpyn.exe xtgesez.exe File opened for modification C:\Windows\SysWOW64\cwhskcs.exe qymxctn.exe File created C:\Windows\SysWOW64\zczcwre.exe nitmkfa.exe File created C:\Windows\SysWOW64\guivwpw.exe rblimtt.exe File opened for modification C:\Windows\SysWOW64\cotowyi.exe gkqgkbs.exe File created C:\Windows\SysWOW64\abtacyy.exe tuyahio.exe File created C:\Windows\SysWOW64\abrasxh.exe tteayhf.exe File opened for modification C:\Windows\SysWOW64\bhegbep.exe chgvbja.exe File opened for modification C:\Windows\SysWOW64\cexxnfq.exe sxszdgj.exe File created C:\Windows\SysWOW64\wuokkpp.exe rqccrfc.exe File created C:\Windows\SysWOW64\eucwzqb.exe zdhtiiv.exe File opened for modification C:\Windows\SysWOW64\jdypwxa.exe zpfagqn.exe File created C:\Windows\SysWOW64\euqkcxy.exe ugquept.exe File created C:\Windows\SysWOW64\vxnuegq.exe euqkcxy.exe File opened for modification C:\Windows\SysWOW64\zzlovwt.exe qxwwvdq.exe File opened for modification C:\Windows\SysWOW64\vhrdkxh.exe txrnsbz.exe File opened for modification C:\Windows\SysWOW64\rdnpohe.exe hbxesey.exe File created C:\Windows\SysWOW64\kbgqojp.exe fsqnymj.exe File created C:\Windows\SysWOW64\xxmvyny.exe myixopz.exe File created C:\Windows\SysWOW64\ncmqkyg.exe apvbfui.exe File opened for modification C:\Windows\SysWOW64\pomicae.exe kbsajqz.exe File created C:\Windows\SysWOW64\ihjgsyr.exe yeuwfvl.exe File created C:\Windows\SysWOW64\crcoysf.exe ihjgsyr.exe File opened for modification C:\Windows\SysWOW64\uhdzclz.exe kxnbxvx.exe File created C:\Windows\SysWOW64\zruuwmt.exe rkhckxj.exe File opened for modification C:\Windows\SysWOW64\yfegmel.exe oyaibfe.exe File created C:\Windows\SysWOW64\tsyjvyk.exe mhzeget.exe File opened for modification C:\Windows\SysWOW64\vttxgrj.exe qoapmhe.exe File opened for modification C:\Windows\SysWOW64\eljtsem.exe whzgitj.exe File created C:\Windows\SysWOW64\udhppqb.exe pnkutcq.exe File created C:\Windows\SysWOW64\pdaqqyz.exe hzqkznw.exe File created C:\Windows\SysWOW64\qfjsaku.exe dsacuon.exe File created C:\Windows\SysWOW64\fhmkeol.exe agdpwif.exe File opened for modification C:\Windows\SysWOW64\dqlfjmb.exe xbcfxsl.exe File opened for modification C:\Windows\SysWOW64\sprqwty.exe hqmteuq.exe File opened for modification C:\Windows\SysWOW64\vstgywb.exe kwavrba.exe File opened for modification C:\Windows\SysWOW64\ezqzght.exe xorujnl.exe File created C:\Windows\SysWOW64\jbdzgqm.exe zczcwre.exe File created C:\Windows\SysWOW64\fakfttt.exe yhlserl.exe File opened for modification C:\Windows\SysWOW64\ujqsgsp.exe ccqvbeg.exe File opened for modification C:\Windows\SysWOW64\buucqvl.exe tmzkwfb.exe File opened for modification C:\Windows\SysWOW64\kbgqojp.exe fsqnymj.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2652 set thread context of 2648 2652 gckhpkn.exe 28 PID 2784 set thread context of 2692 2784 felehjr.exe 29 PID 2352 set thread context of 2788 2352 whzgitj.exe 30 PID 2488 set thread context of 2880 2488 eljtsem.exe 31 PID 1660 set thread context of 1988 1660 gkyjqjz.exe 32 PID 700 set thread context of 1108 700 pijxbnr.exe 33 PID 628 set thread context of 2336 628 hbxesey.exe 35 PID 2664 set thread context of 560 2664 yegakhq.exe 36 PID 1812 set thread context of 1488 1812 kxnbxvx.exe 37 PID 1656 set thread context of 1504 1656 uhdzclz.exe 38 PID 2392 set thread context of 884 2392 zjlhbdj.exe 111 PID 2652 set thread context of 2828 2652 bfaccng.exe 99 PID 2736 set thread context of 2612 2736 zczcwre.exe 39 PID 2856 set thread context of 2128 2856 norwyqg.exe 41 PID 1748 set thread context of 1692 1748 quyhoqp.exe 44 PID 1644 set thread context of 1524 1644 crshnzy.exe 46 PID 628 set thread context of 1684 628 hbxesey.exe 47 PID 1052 set thread context of 2036 1052 ehtcjot.exe 50 PID 2468 set thread context of 2272 2468 wndkwfk.exe 52 PID 1628 set thread context of 1700 1628 hstvlbx.exe 54 PID 1764 set thread context of 2820 1764 rzzdemu.exe 55 PID 3008 set thread context of 2592 3008 osicngw.exe 58 PID 3024 set thread context of 2912 3024 iohpbmj.exe 60 PID 528 set thread context of 2216 528 vcxhbkp.exe 62 PID 1936 set thread context of 2248 1936 adhffia.exe 64 PID 1952 set thread context of 2112 1952 hlufsyc.exe 66 PID 960 set thread context of 1208 960 ghkorjx.exe 68 PID 2496 set thread context of 2164 2496 cbgpsgs.exe 70 PID 2416 set thread context of 1628 2416 bvdudtc.exe 71 PID 2284 set thread context of 2588 2284 tmzkwfb.exe 72 PID 2908 set thread context of 2684 2908 nitmkfa.exe 74 PID 1736 set thread context of 2988 1736 yroomft.exe 76 PID 440 set thread context of 1780 440 otsdvla.exe 79 PID 1640 set thread context of 1020 1640 abtacyy.exe 81 PID 2452 set thread context of 2544 2452 pqtuwrg.exe 83 PID 460 set thread context of 2412 460 jdypwxa.exe 86 PID 2332 set thread context of 1332 2332 uaknzix.exe 87 PID 2176 set thread context of 2900 2176 ezoljhw.exe 90 PID 2624 set thread context of 2680 2624 zczcwre.exe 92 PID 1664 set thread context of 1928 1664 yfegmel.exe 94 PID 1308 set thread context of 2960 1308 bwftbkn.exe 96 PID 832 set thread context of 2944 832 lvrqujv.exe 98 PID 1968 set thread context of 2556 1968 aptoewj.exe 102 PID 2732 set thread context of 1616 2732 kkuytqj.exe 104 PID 1356 set thread context of 2968 1356 ssqqfft.exe 106 PID 1460 set thread context of 2760 1460 asaniyd.exe 107 PID 1224 set thread context of 2840 1224 dylfwrj.exe 110 PID 1944 set thread context of 1932 1944 ctmejud.exe 112 PID 2432 set thread context of 1308 2432 hpnrvgq.exe 116 PID 1960 set thread context of 832 1960 cwjgzbq.exe 118 PID 700 set thread context of 2940 700 pijxbnr.exe 120 PID 2396 set thread context of 1384 2396 vcxhbkp.exe 121 PID 2736 set thread context of 1732 2736 zczcwre.exe 124 PID 1976 set thread context of 2644 1976 vkekaqe.exe 126 PID 1224 set thread context of 1080 1224 dylfwrj.exe 129 PID 1944 set thread context of 2740 1944 ctmejud.exe 132 PID 2432 set thread context of 1808 2432 hpnrvgq.exe 134 PID 1568 set thread context of 2704 1568 fpnyboi.exe 136 PID 1440 set thread context of 960 1440 hfnfauo.exe 139 PID 2068 set thread context of 2572 2068 nfqyuue.exe 141 PID 2564 set thread context of 2584 2564 rgibkwo.exe 143 PID 1728 set thread context of 2156 1728 kmnpefm.exe 144 PID 1224 set thread context of 2608 1224 dylfwrj.exe 147 PID 1944 set thread context of 1092 1944 ctmejud.exe 149 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2648 2652 gckhpkn.exe 28 PID 2652 wrote to memory of 2648 2652 gckhpkn.exe 28 PID 2652 wrote to memory of 2648 2652 gckhpkn.exe 28 PID 2652 wrote to memory of 2648 2652 gckhpkn.exe 28 PID 2652 wrote to memory of 2648 2652 gckhpkn.exe 28 PID 2652 wrote to memory of 2648 2652 gckhpkn.exe 28 PID 2652 wrote to memory of 2648 2652 gckhpkn.exe 28 PID 2652 wrote to memory of 2648 2652 gckhpkn.exe 28 PID 2652 wrote to memory of 2648 2652 gckhpkn.exe 28 PID 2652 wrote to memory of 2648 2652 gckhpkn.exe 28 PID 2648 wrote to memory of 2784 2648 39927b40478fb42bf73f909b1e3cbe18.exe 180 PID 2648 wrote to memory of 2784 2648 39927b40478fb42bf73f909b1e3cbe18.exe 180 PID 2648 wrote to memory of 2784 2648 39927b40478fb42bf73f909b1e3cbe18.exe 180 PID 2648 wrote to memory of 2784 2648 39927b40478fb42bf73f909b1e3cbe18.exe 180 PID 2784 wrote to memory of 2692 2784 felehjr.exe 29 PID 2784 wrote to memory of 2692 2784 felehjr.exe 29 PID 2784 wrote to memory of 2692 2784 felehjr.exe 29 PID 2784 wrote to memory of 2692 2784 felehjr.exe 29 PID 2784 wrote to memory of 2692 2784 felehjr.exe 29 PID 2784 wrote to memory of 2692 2784 felehjr.exe 29 PID 2784 wrote to memory of 2692 2784 felehjr.exe 29 PID 2784 wrote to memory of 2692 2784 felehjr.exe 29 PID 2784 wrote to memory of 2692 2784 felehjr.exe 29 PID 2784 wrote to memory of 2692 2784 felehjr.exe 29 PID 2692 wrote to memory of 2352 2692 felehjr.exe 179 PID 2692 wrote to memory of 2352 2692 felehjr.exe 179 PID 2692 wrote to memory of 2352 2692 felehjr.exe 179 PID 2692 wrote to memory of 2352 2692 felehjr.exe 179 PID 2352 wrote to memory of 2788 2352 whzgitj.exe 30 PID 2352 wrote to memory of 2788 2352 whzgitj.exe 30 PID 2352 wrote to memory of 2788 2352 whzgitj.exe 30 PID 2352 wrote to memory of 2788 2352 whzgitj.exe 30 PID 2352 wrote to memory of 2788 2352 whzgitj.exe 30 PID 2352 wrote to memory of 2788 2352 whzgitj.exe 30 PID 2352 wrote to memory of 2788 2352 whzgitj.exe 30 PID 2352 wrote to memory of 2788 2352 whzgitj.exe 30 PID 2352 wrote to memory of 2788 2352 whzgitj.exe 30 PID 2352 wrote to memory of 2788 2352 whzgitj.exe 30 PID 2788 wrote to memory of 2488 2788 whzgitj.exe 178 PID 2788 wrote to memory of 2488 2788 whzgitj.exe 178 PID 2788 wrote to memory of 2488 2788 whzgitj.exe 178 PID 2788 wrote to memory of 2488 2788 whzgitj.exe 178 PID 2488 wrote to memory of 2880 2488 eljtsem.exe 31 PID 2488 wrote to memory of 2880 2488 eljtsem.exe 31 PID 2488 wrote to memory of 2880 2488 eljtsem.exe 31 PID 2488 wrote to memory of 2880 2488 eljtsem.exe 31 PID 2488 wrote to memory of 2880 2488 eljtsem.exe 31 PID 2488 wrote to memory of 2880 2488 eljtsem.exe 31 PID 2488 wrote to memory of 2880 2488 eljtsem.exe 31 PID 2488 wrote to memory of 2880 2488 eljtsem.exe 31 PID 2488 wrote to memory of 2880 2488 eljtsem.exe 31 PID 2488 wrote to memory of 2880 2488 eljtsem.exe 31 PID 2880 wrote to memory of 1660 2880 eljtsem.exe 169 PID 2880 wrote to memory of 1660 2880 eljtsem.exe 169 PID 2880 wrote to memory of 1660 2880 eljtsem.exe 169 PID 2880 wrote to memory of 1660 2880 eljtsem.exe 169 PID 1660 wrote to memory of 1988 1660 gkyjqjz.exe 32 PID 1660 wrote to memory of 1988 1660 gkyjqjz.exe 32 PID 1660 wrote to memory of 1988 1660 gkyjqjz.exe 32 PID 1660 wrote to memory of 1988 1660 gkyjqjz.exe 32 PID 1660 wrote to memory of 1988 1660 gkyjqjz.exe 32 PID 1660 wrote to memory of 1988 1660 gkyjqjz.exe 32 PID 1660 wrote to memory of 1988 1660 gkyjqjz.exe 32 PID 1660 wrote to memory of 1988 1660 gkyjqjz.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\39927b40478fb42bf73f909b1e3cbe18.exe"C:\Users\Admin\AppData\Local\Temp\39927b40478fb42bf73f909b1e3cbe18.exe"1⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\39927b40478fb42bf73f909b1e3cbe18.exe"C:\Users\Admin\AppData\Local\Temp\39927b40478fb42bf73f909b1e3cbe18.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\felehjr.exeC:\Windows\system32\felehjr.exe 532 "C:\Users\Admin\AppData\Local\Temp\39927b40478fb42bf73f909b1e3cbe18.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2784
-
-
-
C:\Windows\SysWOW64\gckhpkn.exeC:\Windows\system32\gckhpkn.exe 464 "C:\Windows\SysWOW64\zjlhbdj.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2828
-
-
C:\Windows\SysWOW64\felehjr.exeC:\Windows\system32\felehjr.exe 532 "C:\Users\Admin\AppData\Local\Temp\39927b40478fb42bf73f909b1e3cbe18.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\whzgitj.exeC:\Windows\system32\whzgitj.exe 452 "C:\Windows\SysWOW64\felehjr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2352
-
-
C:\Windows\SysWOW64\whzgitj.exeC:\Windows\system32\whzgitj.exe 452 "C:\Windows\SysWOW64\felehjr.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\eljtsem.exeC:\Windows\system32\eljtsem.exe 452 "C:\Windows\SysWOW64\whzgitj.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2488
-
-
C:\Windows\SysWOW64\eljtsem.exeC:\Windows\system32\eljtsem.exe 452 "C:\Windows\SysWOW64\whzgitj.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\gkyjqjz.exeC:\Windows\system32\gkyjqjz.exe 528 "C:\Windows\SysWOW64\eljtsem.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660
-
-
C:\Windows\SysWOW64\gkyjqjz.exeC:\Windows\system32\gkyjqjz.exe 528 "C:\Windows\SysWOW64\eljtsem.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Windows\SysWOW64\nslbkyj.exeC:\Windows\system32\nslbkyj.exe 520 "C:\Windows\SysWOW64\gkyjqjz.exe"2⤵PID:700
-
-
C:\Windows\SysWOW64\nslbkyj.exeC:\Windows\system32\nslbkyj.exe 520 "C:\Windows\SysWOW64\gkyjqjz.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1108 -
C:\Windows\SysWOW64\xrxyuxi.exeC:\Windows\system32\xrxyuxi.exe 540 "C:\Windows\SysWOW64\nslbkyj.exe"2⤵PID:628
-
C:\Windows\SysWOW64\xrxyuxi.exeC:\Windows\system32\xrxyuxi.exe 540 "C:\Windows\SysWOW64\nslbkyj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2336 -
C:\Windows\SysWOW64\cehwabp.exeC:\Windows\system32\cehwabp.exe 536 "C:\Windows\SysWOW64\xrxyuxi.exe"4⤵PID:2664
-
-
-
C:\Windows\SysWOW64\hbxesey.exeC:\Windows\system32\hbxesey.exe 528 "C:\Windows\SysWOW64\xfwmlkx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1684 -
C:\Windows\SysWOW64\rdnpohe.exeC:\Windows\system32\rdnpohe.exe 528 "C:\Windows\SysWOW64\hbxesey.exe"4⤵PID:1052
-
C:\Windows\SysWOW64\rdnpohe.exeC:\Windows\system32\rdnpohe.exe 528 "C:\Windows\SysWOW64\hbxesey.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2036 -
C:\Windows\SysWOW64\wndkwfk.exeC:\Windows\system32\wndkwfk.exe 536 "C:\Windows\SysWOW64\rdnpohe.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2468 -
C:\Windows\SysWOW64\wndkwfk.exeC:\Windows\system32\wndkwfk.exe 536 "C:\Windows\SysWOW64\rdnpohe.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272 -
C:\Windows\SysWOW64\gpsuriy.exeC:\Windows\system32\gpsuriy.exe 528 "C:\Windows\SysWOW64\wndkwfk.exe"8⤵PID:1628
-
C:\Windows\SysWOW64\gpsuriy.exeC:\Windows\system32\gpsuriy.exe 528 "C:\Windows\SysWOW64\wndkwfk.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700 -
C:\Windows\SysWOW64\otvzbtb.exeC:\Windows\system32\otvzbtb.exe 536 "C:\Windows\SysWOW64\gpsuriy.exe"10⤵PID:1764
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cehwabp.exeC:\Windows\system32\cehwabp.exe 536 "C:\Windows\SysWOW64\xrxyuxi.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560 -
C:\Windows\SysWOW64\kxnbxvx.exeC:\Windows\system32\kxnbxvx.exe 528 "C:\Windows\SysWOW64\cehwabp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1812
-
-
C:\Windows\SysWOW64\kxnbxvx.exeC:\Windows\system32\kxnbxvx.exe 528 "C:\Windows\SysWOW64\cehwabp.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1488 -
C:\Windows\SysWOW64\uhdzclz.exeC:\Windows\system32\uhdzclz.exe 528 "C:\Windows\SysWOW64\kxnbxvx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1656
-
-
C:\Windows\SysWOW64\uhdzclz.exeC:\Windows\system32\uhdzclz.exe 528 "C:\Windows\SysWOW64\kxnbxvx.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1504 -
C:\Windows\SysWOW64\zjlhbdj.exeC:\Windows\system32\zjlhbdj.exe 476 "C:\Windows\SysWOW64\uhdzclz.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2392
-
-
C:\Windows\SysWOW64\okfzczx.exeC:\Windows\system32\okfzczx.exe 528 "C:\Windows\SysWOW64\gckhpkn.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2612 -
C:\Windows\SysWOW64\norwyqg.exeC:\Windows\system32\norwyqg.exe 528 "C:\Windows\SysWOW64\okfzczx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2856 -
C:\Windows\SysWOW64\norwyqg.exeC:\Windows\system32\norwyqg.exe 528 "C:\Windows\SysWOW64\okfzczx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2128 -
C:\Windows\SysWOW64\quyhoqp.exeC:\Windows\system32\quyhoqp.exe 540 "C:\Windows\SysWOW64\norwyqg.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1748 -
C:\Windows\SysWOW64\quyhoqp.exeC:\Windows\system32\quyhoqp.exe 540 "C:\Windows\SysWOW64\norwyqg.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Windows\SysWOW64\xfwmlkx.exeC:\Windows\system32\xfwmlkx.exe 528 "C:\Windows\SysWOW64\quyhoqp.exe"6⤵PID:1644
-
C:\Windows\SysWOW64\xfwmlkx.exeC:\Windows\system32\xfwmlkx.exe 528 "C:\Windows\SysWOW64\quyhoqp.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524 -
C:\Windows\SysWOW64\hbxesey.exeC:\Windows\system32\hbxesey.exe 528 "C:\Windows\SysWOW64\xfwmlkx.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:628
-
-
-
C:\Windows\SysWOW64\pijxbnr.exeC:\Windows\system32\pijxbnr.exe 528 "C:\Windows\SysWOW64\iaoxhyh.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:700 -
C:\Windows\SysWOW64\ahnvlmz.exeC:\Windows\system32\ahnvlmz.exe 528 "C:\Windows\SysWOW64\pijxbnr.exe"8⤵PID:1904
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\okfzczx.exeC:\Windows\system32\okfzczx.exe 528 "C:\Windows\SysWOW64\gckhpkn.exe"1⤵PID:2736
-
C:\Windows\SysWOW64\otvzbtb.exeC:\Windows\system32\otvzbtb.exe 536 "C:\Windows\SysWOW64\gpsuriy.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2820 -
C:\Windows\SysWOW64\bgmphxa.exeC:\Windows\system32\bgmphxa.exe 532 "C:\Windows\SysWOW64\otvzbtb.exe"2⤵PID:3008
-
C:\Windows\SysWOW64\bgmphxa.exeC:\Windows\system32\bgmphxa.exe 532 "C:\Windows\SysWOW64\otvzbtb.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2592 -
C:\Windows\SysWOW64\iohpbmj.exeC:\Windows\system32\iohpbmj.exe 528 "C:\Windows\SysWOW64\bgmphxa.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3024 -
C:\Windows\SysWOW64\iohpbmj.exeC:\Windows\system32\iohpbmj.exe 528 "C:\Windows\SysWOW64\bgmphxa.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2912 -
C:\Windows\SysWOW64\qwvhvkt.exeC:\Windows\system32\qwvhvkt.exe 532 "C:\Windows\SysWOW64\iohpbmj.exe"6⤵PID:528
-
C:\Windows\SysWOW64\qwvhvkt.exeC:\Windows\system32\qwvhvkt.exe 532 "C:\Windows\SysWOW64\iohpbmj.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2216 -
C:\Windows\SysWOW64\adhffia.exeC:\Windows\system32\adhffia.exe 484 "C:\Windows\SysWOW64\qwvhvkt.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1936 -
C:\Windows\SysWOW64\adhffia.exeC:\Windows\system32\adhffia.exe 484 "C:\Windows\SysWOW64\qwvhvkt.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2248 -
C:\Windows\SysWOW64\hlufsyc.exeC:\Windows\system32\hlufsyc.exe 528 "C:\Windows\SysWOW64\adhffia.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1952 -
C:\Windows\SysWOW64\hlufsyc.exeC:\Windows\system32\hlufsyc.exe 528 "C:\Windows\SysWOW64\adhffia.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2112 -
C:\Windows\SysWOW64\rkhckxj.exeC:\Windows\system32\rkhckxj.exe 528 "C:\Windows\SysWOW64\hlufsyc.exe"12⤵PID:960
-
C:\Windows\SysWOW64\rkhckxj.exeC:\Windows\system32\rkhckxj.exe 528 "C:\Windows\SysWOW64\hlufsyc.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1208 -
C:\Windows\SysWOW64\zruuwmt.exeC:\Windows\system32\zruuwmt.exe 536 "C:\Windows\SysWOW64\rkhckxj.exe"14⤵PID:2496
-
C:\Windows\SysWOW64\zruuwmt.exeC:\Windows\system32\zruuwmt.exe 536 "C:\Windows\SysWOW64\rkhckxj.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2164 -
C:\Windows\SysWOW64\hstvlbx.exeC:\Windows\system32\hstvlbx.exe 528 "C:\Windows\SysWOW64\zruuwmt.exe"16⤵PID:2416
-
C:\Windows\SysWOW64\kzgruhd.exeC:\Windows\system32\kzgruhd.exe 532 "C:\Windows\SysWOW64\dgimffu.exe"17⤵PID:1768
-
C:\Windows\SysWOW64\xqbuchi.exeC:\Windows\system32\xqbuchi.exe 532 "C:\Windows\SysWOW64\kzgruhd.exe"18⤵PID:1052
-
C:\Windows\SysWOW64\xqbuchi.exeC:\Windows\system32\xqbuchi.exe 532 "C:\Windows\SysWOW64\kzgruhd.exe"19⤵PID:2676
-
C:\Windows\SysWOW64\hpnrvgq.exeC:\Windows\system32\hpnrvgq.exe 528 "C:\Windows\SysWOW64\xqbuchi.exe"20⤵PID:2916
-
C:\Windows\SysWOW64\hpnrvgq.exeC:\Windows\system32\hpnrvgq.exe 528 "C:\Windows\SysWOW64\xqbuchi.exe"21⤵
- Suspicious use of SetThreadContext
PID:2432 -
C:\Windows\SysWOW64\vcxhbkp.exeC:\Windows\system32\vcxhbkp.exe 528 "C:\Windows\SysWOW64\hpnrvgq.exe"22⤵
- Suspicious use of SetThreadContext
PID:2396 -
C:\Windows\SysWOW64\vcxhbkp.exeC:\Windows\system32\vcxhbkp.exe 528 "C:\Windows\SysWOW64\hpnrvgq.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:528 -
C:\Windows\SysWOW64\crshnzy.exeC:\Windows\system32\crshnzy.exe 536 "C:\Windows\SysWOW64\vcxhbkp.exe"24⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1644 -
C:\Windows\SysWOW64\crshnzy.exeC:\Windows\system32\crshnzy.exe 536 "C:\Windows\SysWOW64\vcxhbkp.exe"25⤵PID:2848
-
C:\Windows\SysWOW64\pinkdhe.exeC:\Windows\system32\pinkdhe.exe 536 "C:\Windows\SysWOW64\crshnzy.exe"26⤵PID:340
-
C:\Windows\SysWOW64\pinkdhe.exeC:\Windows\system32\pinkdhe.exe 536 "C:\Windows\SysWOW64\crshnzy.exe"27⤵PID:1196
-
C:\Windows\SysWOW64\uvgjpri.exeC:\Windows\system32\uvgjpri.exe 460 "C:\Windows\SysWOW64\pinkdhe.exe"28⤵PID:2324
-
C:\Windows\SysWOW64\uvgjpri.exeC:\Windows\system32\uvgjpri.exe 460 "C:\Windows\SysWOW64\pinkdhe.exe"29⤵PID:1636
-
C:\Windows\SysWOW64\exwukmp.exeC:\Windows\system32\exwukmp.exe 540 "C:\Windows\SysWOW64\uvgjpri.exe"30⤵PID:1180
-
C:\Windows\SysWOW64\exwukmp.exeC:\Windows\system32\exwukmp.exe 540 "C:\Windows\SysWOW64\uvgjpri.exe"31⤵PID:2136
-
C:\Windows\SysWOW64\bvdudtc.exeC:\Windows\system32\bvdudtc.exe 452 "C:\Windows\SysWOW64\exwukmp.exe"32⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2416 -
C:\Windows\SysWOW64\bvdudtc.exeC:\Windows\system32\bvdudtc.exe 452 "C:\Windows\SysWOW64\exwukmp.exe"33⤵
- Drops file in System32 directory
PID:380 -
C:\Windows\SysWOW64\qoapmhe.exeC:\Windows\system32\qoapmhe.exe 532 "C:\Windows\SysWOW64\bvdudtc.exe"34⤵PID:1564
-
C:\Windows\SysWOW64\qoapmhe.exeC:\Windows\system32\qoapmhe.exe 532 "C:\Windows\SysWOW64\bvdudtc.exe"35⤵
- Drops file in System32 directory
PID:876 -
C:\Windows\SysWOW64\vttxgrj.exeC:\Windows\system32\vttxgrj.exe 472 "C:\Windows\SysWOW64\qoapmhe.exe"36⤵PID:1892
-
C:\Windows\SysWOW64\vttxgrj.exeC:\Windows\system32\vttxgrj.exe 472 "C:\Windows\SysWOW64\qoapmhe.exe"37⤵PID:2072
-
C:\Windows\SysWOW64\cbgpsgs.exeC:\Windows\system32\cbgpsgs.exe 476 "C:\Windows\SysWOW64\vttxgrj.exe"38⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2496 -
C:\Windows\SysWOW64\cbgpsgs.exeC:\Windows\system32\cbgpsgs.exe 476 "C:\Windows\SysWOW64\vttxgrj.exe"39⤵PID:2404
-
C:\Windows\SysWOW64\nitmkfa.exeC:\Windows\system32\nitmkfa.exe 528 "C:\Windows\SysWOW64\cbgpsgs.exe"40⤵PID:848
-
C:\Windows\SysWOW64\nitmkfa.exeC:\Windows\system32\nitmkfa.exe 528 "C:\Windows\SysWOW64\cbgpsgs.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:2908 -
C:\Windows\SysWOW64\zczcwre.exeC:\Windows\system32\zczcwre.exe 528 "C:\Windows\SysWOW64\nitmkfa.exe"42⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2736 -
C:\Windows\SysWOW64\zczcwre.exeC:\Windows\system32\zczcwre.exe 528 "C:\Windows\SysWOW64\nitmkfa.exe"43⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:2624 -
C:\Windows\SysWOW64\jbdzgqm.exeC:\Windows\system32\jbdzgqm.exe 528 "C:\Windows\SysWOW64\zczcwre.exe"44⤵PID:1864
-
C:\Windows\SysWOW64\jbdzgqm.exeC:\Windows\system32\jbdzgqm.exe 528 "C:\Windows\SysWOW64\zczcwre.exe"45⤵PID:2816
-
C:\Windows\SysWOW64\xwupmmk.exeC:\Windows\system32\xwupmmk.exe 528 "C:\Windows\SysWOW64\jbdzgqm.exe"46⤵PID:1180
-
C:\Windows\SysWOW64\xwupmmk.exeC:\Windows\system32\xwupmmk.exe 528 "C:\Windows\SysWOW64\jbdzgqm.exe"47⤵PID:1344
-
C:\Windows\SysWOW64\ehtcjot.exeC:\Windows\system32\ehtcjot.exe 512 "C:\Windows\SysWOW64\xwupmmk.exe"48⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1052 -
C:\Windows\SysWOW64\ehtcjot.exeC:\Windows\system32\ehtcjot.exe 512 "C:\Windows\SysWOW64\xwupmmk.exe"49⤵PID:1048
-
C:\Windows\SysWOW64\ryoxsoy.exeC:\Windows\system32\ryoxsoy.exe 504 "C:\Windows\SysWOW64\ehtcjot.exe"50⤵PID:1476
-
C:\Windows\SysWOW64\ryoxsoy.exeC:\Windows\system32\ryoxsoy.exe 504 "C:\Windows\SysWOW64\ehtcjot.exe"51⤵PID:2244
-
C:\Windows\SysWOW64\bfaccng.exeC:\Windows\system32\bfaccng.exe 528 "C:\Windows\SysWOW64\ryoxsoy.exe"52⤵PID:2800
-
C:\Windows\SysWOW64\bfaccng.exeC:\Windows\system32\bfaccng.exe 528 "C:\Windows\SysWOW64\ryoxsoy.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:2652 -
C:\Windows\SysWOW64\lhpnxqm.exeC:\Windows\system32\lhpnxqm.exe 536 "C:\Windows\SysWOW64\bfaccng.exe"54⤵PID:644
-
C:\Windows\SysWOW64\lhpnxqm.exeC:\Windows\system32\lhpnxqm.exe 536 "C:\Windows\SysWOW64\bfaccng.exe"55⤵PID:1584
-
C:\Windows\SysWOW64\quhcdul.exeC:\Windows\system32\quhcdul.exe 528 "C:\Windows\SysWOW64\lhpnxqm.exe"56⤵PID:340
-
C:\Windows\SysWOW64\quhcdul.exeC:\Windows\system32\quhcdul.exe 528 "C:\Windows\SysWOW64\lhpnxqm.exe"57⤵PID:2228
-
C:\Windows\SysWOW64\pninxgv.exeC:\Windows\system32\pninxgv.exe 456 "C:\Windows\SysWOW64\quhcdul.exe"58⤵PID:2240
-
C:\Windows\SysWOW64\pninxgv.exeC:\Windows\system32\pninxgv.exe 456 "C:\Windows\SysWOW64\quhcdul.exe"59⤵PID:2480
-
C:\Windows\SysWOW64\hqwxzqf.exeC:\Windows\system32\hqwxzqf.exe 452 "C:\Windows\SysWOW64\pninxgv.exe"60⤵PID:2384
-
C:\Windows\SysWOW64\hqwxzqf.exeC:\Windows\system32\hqwxzqf.exe 452 "C:\Windows\SysWOW64\pninxgv.exe"61⤵PID:2764
-
C:\Windows\SysWOW64\rblimtt.exeC:\Windows\system32\rblimtt.exe 492 "C:\Windows\SysWOW64\hqwxzqf.exe"62⤵PID:2488
-
C:\Windows\SysWOW64\rblimtt.exeC:\Windows\system32\rblimtt.exe 492 "C:\Windows\SysWOW64\hqwxzqf.exe"63⤵
- Drops file in System32 directory
PID:2744 -
C:\Windows\SysWOW64\guivwpw.exeC:\Windows\system32\guivwpw.exe 528 "C:\Windows\SysWOW64\rblimtt.exe"64⤵PID:1760
-
C:\Windows\SysWOW64\guivwpw.exeC:\Windows\system32\guivwpw.exe 528 "C:\Windows\SysWOW64\rblimtt.exe"65⤵PID:672
-
C:\Windows\SysWOW64\lknqsvh.exeC:\Windows\system32\lknqsvh.exe 456 "C:\Windows\SysWOW64\guivwpw.exe"66⤵PID:1648
-
C:\Windows\SysWOW64\lknqsvh.exeC:\Windows\system32\lknqsvh.exe 456 "C:\Windows\SysWOW64\guivwpw.exe"67⤵PID:1564
-
C:\Windows\SysWOW64\ldoimir.exeC:\Windows\system32\ldoimir.exe 528 "C:\Windows\SysWOW64\lknqsvh.exe"68⤵PID:2952
-
C:\Windows\SysWOW64\ldoimir.exeC:\Windows\system32\ldoimir.exe 528 "C:\Windows\SysWOW64\lknqsvh.exe"69⤵
- Drops file in System32 directory
PID:1200 -
C:\Windows\SysWOW64\ipjvkkx.exeC:\Windows\system32\ipjvkkx.exe 452 "C:\Windows\SysWOW64\ldoimir.exe"70⤵PID:2472
-
C:\Windows\SysWOW64\ipjvkkx.exeC:\Windows\system32\ipjvkkx.exe 452 "C:\Windows\SysWOW64\ldoimir.exe"71⤵PID:2456
-
C:\Windows\SysWOW64\iisnexh.exeC:\Windows\system32\iisnexh.exe 464 "C:\Windows\SysWOW64\ipjvkkx.exe"72⤵PID:1872
-
C:\Windows\SysWOW64\iisnexh.exeC:\Windows\system32\iisnexh.exe 464 "C:\Windows\SysWOW64\ipjvkkx.exe"73⤵PID:2628
-
C:\Windows\SysWOW64\ppggyuj.exeC:\Windows\system32\ppggyuj.exe 452 "C:\Windows\SysWOW64\iisnexh.exe"74⤵PID:2688
-
C:\Windows\SysWOW64\ppggyuj.exeC:\Windows\system32\ppggyuj.exe 452 "C:\Windows\SysWOW64\iisnexh.exe"75⤵PID:2956
-
C:\Windows\SysWOW64\otsdvla.exeC:\Windows\system32\otsdvla.exe 480 "C:\Windows\SysWOW64\ppggyuj.exe"76⤵PID:1820
-
C:\Windows\SysWOW64\otsdvla.exeC:\Windows\system32\otsdvla.exe 480 "C:\Windows\SysWOW64\ppggyuj.exe"77⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:440 -
C:\Windows\SysWOW64\gldaurd.exeC:\Windows\system32\gldaurd.exe 452 "C:\Windows\SysWOW64\otsdvla.exe"78⤵PID:2292
-
C:\Windows\SysWOW64\gldaurd.exeC:\Windows\system32\gldaurd.exe 452 "C:\Windows\SysWOW64\otsdvla.exe"79⤵PID:3004
-
C:\Windows\SysWOW64\gkqgkbs.exeC:\Windows\system32\gkqgkbs.exe 452 "C:\Windows\SysWOW64\gldaurd.exe"80⤵PID:2972
-
C:\Windows\SysWOW64\gkqgkbs.exeC:\Windows\system32\gkqgkbs.exe 452 "C:\Windows\SysWOW64\gldaurd.exe"81⤵
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\cotowyi.exeC:\Windows\system32\cotowyi.exe 536 "C:\Windows\SysWOW64\gkqgkbs.exe"82⤵PID:2732
-
C:\Windows\SysWOW64\cotowyi.exeC:\Windows\system32\cotowyi.exe 536 "C:\Windows\SysWOW64\gkqgkbs.exe"83⤵PID:848
-
C:\Windows\SysWOW64\vmtksnl.exeC:\Windows\system32\vmtksnl.exe 452 "C:\Windows\SysWOW64\cotowyi.exe"84⤵PID:2472
-
C:\Windows\SysWOW64\vmtksnl.exeC:\Windows\system32\vmtksnl.exe 452 "C:\Windows\SysWOW64\cotowyi.exe"85⤵PID:2896
-
C:\Windows\SysWOW64\npquuxv.exeC:\Windows\system32\npquuxv.exe 528 "C:\Windows\SysWOW64\vmtksnl.exe"86⤵PID:2928
-
C:\Windows\SysWOW64\npquuxv.exeC:\Windows\system32\npquuxv.exe 528 "C:\Windows\SysWOW64\vmtksnl.exe"87⤵
- Drops file in System32 directory
PID:1888 -
C:\Windows\SysWOW64\hvefipx.exeC:\Windows\system32\hvefipx.exe 532 "C:\Windows\SysWOW64\npquuxv.exe"88⤵PID:2964
-
C:\Windows\SysWOW64\hvefipx.exeC:\Windows\system32\hvefipx.exe 532 "C:\Windows\SysWOW64\npquuxv.exe"89⤵PID:1556
-
C:\Windows\SysWOW64\tzinnip.exeC:\Windows\system32\tzinnip.exe 452 "C:\Windows\SysWOW64\hvefipx.exe"90⤵PID:2332
-
C:\Windows\SysWOW64\tzinnip.exeC:\Windows\system32\tzinnip.exe 452 "C:\Windows\SysWOW64\hvefipx.exe"91⤵PID:2416
-
C:\Windows\SysWOW64\betaebs.exeC:\Windows\system32\betaebs.exe 528 "C:\Windows\SysWOW64\tzinnip.exe"92⤵PID:2540
-
C:\Windows\SysWOW64\betaebs.exeC:\Windows\system32\betaebs.exe 528 "C:\Windows\SysWOW64\tzinnip.exe"93⤵PID:2844
-
C:\Windows\SysWOW64\vcjvhzh.exeC:\Windows\system32\vcjvhzh.exe 528 "C:\Windows\SysWOW64\betaebs.exe"94⤵PID:1656
-
C:\Windows\SysWOW64\vcjvhzh.exeC:\Windows\system32\vcjvhzh.exe 528 "C:\Windows\SysWOW64\betaebs.exe"95⤵PID:2800
-
C:\Windows\SysWOW64\tiqbxgd.exeC:\Windows\system32\tiqbxgd.exe 528 "C:\Windows\SysWOW64\vcjvhzh.exe"96⤵PID:1612
-
C:\Windows\SysWOW64\tiqbxgd.exeC:\Windows\system32\tiqbxgd.exe 528 "C:\Windows\SysWOW64\vcjvhzh.exe"97⤵
- Drops file in System32 directory
PID:2256 -
C:\Windows\SysWOW64\erszbqk.exeC:\Windows\system32\erszbqk.exe 536 "C:\Windows\SysWOW64\tiqbxgd.exe"98⤵PID:2052
-
C:\Windows\SysWOW64\erszbqk.exeC:\Windows\system32\erszbqk.exe 536 "C:\Windows\SysWOW64\tiqbxgd.exe"99⤵PID:2580
-
C:\Windows\SysWOW64\bwpxuga.exeC:\Windows\system32\bwpxuga.exe 476 "C:\Windows\SysWOW64\erszbqk.exe"100⤵PID:2688
-
C:\Windows\SysWOW64\bwpxuga.exeC:\Windows\system32\bwpxuga.exe 476 "C:\Windows\SysWOW64\erszbqk.exe"101⤵PID:2032
-
C:\Windows\SysWOW64\oydmfke.exeC:\Windows\system32\oydmfke.exe 528 "C:\Windows\SysWOW64\bwpxuga.exe"102⤵PID:2352
-
C:\Windows\SysWOW64\oydmfke.exeC:\Windows\system32\oydmfke.exe 528 "C:\Windows\SysWOW64\bwpxuga.exe"103⤵
- Drops file in System32 directory
PID:2152 -
C:\Windows\SysWOW64\qxjcdps.exeC:\Windows\system32\qxjcdps.exe 528 "C:\Windows\SysWOW64\oydmfke.exe"104⤵PID:1248
-
C:\Windows\SysWOW64\qxjcdps.exeC:\Windows\system32\qxjcdps.exe 528 "C:\Windows\SysWOW64\oydmfke.exe"105⤵PID:3048
-
C:\Windows\SysWOW64\ucdkwze.exeC:\Windows\system32\ucdkwze.exe 484 "C:\Windows\SysWOW64\qxjcdps.exe"106⤵PID:1376
-
C:\Windows\SysWOW64\ucdkwze.exeC:\Windows\system32\ucdkwze.exe 484 "C:\Windows\SysWOW64\qxjcdps.exe"107⤵
- Drops file in System32 directory
PID:2028 -
C:\Windows\SysWOW64\ccckdfi.exeC:\Windows\system32\ccckdfi.exe 484 "C:\Windows\SysWOW64\ucdkwze.exe"108⤵PID:1952
-
C:\Windows\SysWOW64\ccckdfi.exeC:\Windows\system32\ccckdfi.exe 484 "C:\Windows\SysWOW64\ucdkwze.exe"109⤵PID:2284
-
C:\Windows\SysWOW64\ugquept.exeC:\Windows\system32\ugquept.exe 476 "C:\Windows\SysWOW64\ccckdfi.exe"110⤵PID:1812
-
C:\Windows\SysWOW64\ugquept.exeC:\Windows\system32\ugquept.exe 476 "C:\Windows\SysWOW64\ccckdfi.exe"111⤵
- Drops file in System32 directory
PID:1120 -
C:\Windows\SysWOW64\euqkcxy.exeC:\Windows\system32\euqkcxy.exe 540 "C:\Windows\SysWOW64\ugquept.exe"112⤵PID:2856
-
C:\Windows\SysWOW64\euqkcxy.exeC:\Windows\system32\euqkcxy.exe 540 "C:\Windows\SysWOW64\ugquept.exe"113⤵
- Drops file in System32 directory
PID:1644 -
C:\Windows\SysWOW64\vxnuegq.exeC:\Windows\system32\vxnuegq.exe 464 "C:\Windows\SysWOW64\euqkcxy.exe"114⤵PID:2056
-
C:\Windows\SysWOW64\vxnuegq.exeC:\Windows\system32\vxnuegq.exe 464 "C:\Windows\SysWOW64\euqkcxy.exe"115⤵PID:2724
-
C:\Windows\SysWOW64\dbpioat.exeC:\Windows\system32\dbpioat.exe 452 "C:\Windows\SysWOW64\vxnuegq.exe"116⤵PID:2488
-
C:\Windows\SysWOW64\dbpioat.exeC:\Windows\system32\dbpioat.exe 452 "C:\Windows\SysWOW64\vxnuegq.exe"117⤵PID:1752
-
C:\Windows\SysWOW64\xdqptbg.exeC:\Windows\system32\xdqptbg.exe 528 "C:\Windows\SysWOW64\dbpioat.exe"118⤵PID:1220
-
C:\Windows\SysWOW64\xdqptbg.exeC:\Windows\system32\xdqptbg.exe 528 "C:\Windows\SysWOW64\dbpioat.exe"119⤵PID:2208
-
C:\Windows\SysWOW64\rjhkoro.exeC:\Windows\system32\rjhkoro.exe 464 "C:\Windows\SysWOW64\xdqptbg.exe"120⤵PID:1060
-
C:\Windows\SysWOW64\rjhkoro.exeC:\Windows\system32\rjhkoro.exe 464 "C:\Windows\SysWOW64\xdqptbg.exe"121⤵PID:1192
-
C:\Windows\SysWOW64\utyagnv.exeC:\Windows\system32\utyagnv.exe 452 "C:\Windows\SysWOW64\rjhkoro.exe"122⤵PID:1096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-