Analysis
-
max time kernel
24s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe
-
Size
24KB
-
MD5
16e64b83933c0ea42ec9de131c4d2527
-
SHA1
2d608bd9a248701068c50b8d6f9ca2d4150d8261
-
SHA256
b32781dffffaddc2ccab6f76dd0044894c2e3db8346bfc5e4e0d09624fee14c9
-
SHA512
927403fd454f786d1f91673fd32a0812e43700065699ef139443ebe03e3a3fbb8e159f5324cbce42de5f7141ac302e38a944d85ebdf62b9825d48553b6996f87
-
SSDEEP
192:oVAexK8tq37U5AlT0TwiyY9xGd46fA1F1/+oSGRPzR/QdmIcybcx:oVe7pSy2xGd4oQF1/rNRPzR/QD1k
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1784 knqt766.exe 2680 ilord7e.exe 2592 hknqcbe.exe 2556 cfile6e.exe 1664 hknqd3f.exe 1424 ilor7e7.exe 1692 nqtwf3e.exe 596 cfilf2e.exe 1208 cfil72f.exe 1572 adgjffe.exe 1912 adgj527.exe 1188 cmd.exe 2496 hknq4a7.exe 3052 jmpsfbe.exe 2728 hknqd6f.exe 2732 cmd.exe 2868 gjmpd77.exe 2040 ehkne76.exe 2900 hknqdae.exe 1592 conhost.exe 2116 ehkn477.exe 2100 gjmpda6.exe 1656 loru56f.exe 1016 conhost.exe 296 conhost.exe 836 conhost.exe 1848 conhost.exe 1096 cmd.exe 3048 knqt5f6.exe 2940 conhost.exe 1536 adgjcae.exe 1140 conhost.exe 2032 conhost.exe 1628 conhost.exe 2176 lorudef.exe 1424 nqtwe3e.exe 1760 behk67f.exe 1080 loru66e.exe 2160 conhost.exe 300 loruef7.exe 908 conhost.exe 2456 nqtw766.exe 1768 ilor6b6.exe 2668 ehknd2e.exe 2804 conhost.exe 2296 cmd.exe 2916 conhost.exe 1464 cmd.exe 1648 cfil73f.exe 1716 cmd.exe 1692 loru53e.exe 2072 cmd.exe 2964 conhost.exe 1036 knqtef6.exe 876 knqt76e.exe 1552 hknq43e.exe 908 conhost.exe 2988 cmd.exe 2016 nqtwf26.exe 2608 cmd.exe 2776 loru57e.exe 2596 conhost.exe 2280 jmpsc6e.exe 1664 conhost.exe -
Loads dropped DLL 64 IoCs
pid Process 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe 1784 knqt766.exe 1784 knqt766.exe 2680 cmd.exe 2680 cmd.exe 2592 hknqcbe.exe 2592 hknqcbe.exe 2556 cfile6e.exe 2556 cfile6e.exe 1664 hknqd3f.exe 1664 hknqd3f.exe 1424 nqtwe3e.exe 1424 nqtwe3e.exe 1692 nqtwf3e.exe 1692 nqtwf3e.exe 596 cfilf2e.exe 596 cfilf2e.exe 1208 cfil72f.exe 1208 cfil72f.exe 1572 adgjffe.exe 1572 adgjffe.exe 1912 adgj527.exe 1912 adgj527.exe 1188 cmd.exe 1188 cmd.exe 2496 hknq4a7.exe 2496 hknq4a7.exe 3052 jmpsfbe.exe 3052 jmpsfbe.exe 2728 hknqd6f.exe 2728 hknqd6f.exe 2732 cmd.exe 2732 cmd.exe 2868 gjmpd77.exe 2868 gjmpd77.exe 2040 ehkne76.exe 2040 ehkne76.exe 2900 hknqdae.exe 2900 hknqdae.exe 1592 conhost.exe 1592 conhost.exe 2116 ehkn477.exe 2116 ehkn477.exe 2100 gjmpda6.exe 2100 gjmpda6.exe 1656 loru56f.exe 1656 loru56f.exe 1016 conhost.exe 1016 conhost.exe 296 conhost.exe 296 conhost.exe 836 conhost.exe 836 conhost.exe 1848 conhost.exe 1848 conhost.exe 1096 cmd.exe 1096 cmd.exe 3048 knqt5f6.exe 3048 knqt5f6.exe 2940 conhost.exe 2940 conhost.exe 1536 adgjcae.exe 1536 adgjcae.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\dgjmcfe.exe conhost.exe File created C:\Windows\SysWOW64\gjmp5fe.exe conhost.exe File created C:\Windows\SysWOW64\ilor6b6.exe nqtw766.exe File opened for modification C:\Windows\SysWOW64\knqt766.exe VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe File created C:\Windows\SysWOW64\nqtwf3e.exe ilor7e7.exe File created C:\Windows\SysWOW64\behkee6.exe cmd.exe File opened for modification C:\Windows\SysWOW64\ilor6bf.exe hknq43e.exe File opened for modification C:\Windows\SysWOW64\loru5bf.exe jmpsc6e.exe File opened for modification C:\Windows\SysWOW64\loru777.exe conhost.exe File opened for modification C:\Windows\SysWOW64\jmps767.exe loru66e.exe File opened for modification C:\Windows\SysWOW64\lorufb6.exe ehknd2e.exe File opened for modification C:\Windows\SysWOW64\jmps57e.exe conhost.exe File opened for modification C:\Windows\SysWOW64\cfile6e.exe hknqcbe.exe File created C:\Windows\SysWOW64\adgjffe.exe cfil72f.exe File created C:\Windows\SysWOW64\iloreb7.exe adgj527.exe File created C:\Windows\SysWOW64\behk67f.exe nqtwe3e.exe File created C:\Windows\SysWOW64\adgj6f7.exe loruef7.exe File opened for modification C:\Windows\SysWOW64\gjmpdf6.exe cmd.exe File created C:\Windows\SysWOW64\ilor4ae.exe conhost.exe File opened for modification C:\Windows\SysWOW64\ilor7e7.exe hknqd3f.exe File opened for modification C:\Windows\SysWOW64\adgj527.exe adgjffe.exe File created C:\Windows\SysWOW64\behkeee.exe conhost.exe File created C:\Windows\SysWOW64\filo7fe.exe knqtef6.exe File created C:\Windows\SysWOW64\nqtw627.exe cmd.exe File opened for modification C:\Windows\SysWOW64\hknqdae.exe ehkne76.exe File opened for modification C:\Windows\SysWOW64\mpsvf2f.exe cmd.exe File opened for modification C:\Windows\SysWOW64\jmps47f.exe knqt5f6.exe File created C:\Windows\SysWOW64\hknq4a7.exe cmd.exe File opened for modification C:\Windows\SysWOW64\mpsve37.exe hknq4a7.exe File created C:\Windows\SysWOW64\dgjmdef.exe hknqdae.exe File created C:\Windows\SysWOW64\jmps767.exe loru66e.exe File opened for modification C:\Windows\SysWOW64\adgjf66.exe conhost.exe File opened for modification C:\Windows\SysWOW64\ilord67.exe conhost.exe File opened for modification C:\Windows\SysWOW64\loruef7.exe conhost.exe File opened for modification C:\Windows\SysWOW64\hknq7bf.exe conhost.exe File created C:\Windows\SysWOW64\cfilcfe.exe conhost.exe File created C:\Windows\SysWOW64\adgj76f.exe knqt76e.exe File opened for modification C:\Windows\SysWOW64\ilord7e.exe knqt766.exe File opened for modification C:\Windows\SysWOW64\hknqcbe.exe ilord7e.exe File created C:\Windows\SysWOW64\hknqd3f.exe cfile6e.exe File opened for modification C:\Windows\SysWOW64\gjmp627.exe cmd.exe File created C:\Windows\SysWOW64\loru5bf.exe jmpsc6e.exe File opened for modification C:\Windows\SysWOW64\nqtwf3e.exe ilor7e7.exe File opened for modification C:\Windows\SysWOW64\gjmpda6.exe ehkn477.exe File opened for modification C:\Windows\SysWOW64\filo5a6.exe conhost.exe File created C:\Windows\SysWOW64\lorufb6.exe ehknd2e.exe File opened for modification C:\Windows\SysWOW64\iloreb7.exe adgj527.exe File created C:\Windows\SysWOW64\mpsve37.exe hknq4a7.exe File created C:\Windows\SysWOW64\mpsvf2f.exe cmd.exe File created C:\Windows\SysWOW64\cfil73f.exe cmd.exe File opened for modification C:\Windows\SysWOW64\nqtwd2f.exe loru53e.exe File created C:\Windows\SysWOW64\knqtf2f.exe conhost.exe File created C:\Windows\SysWOW64\cfile6e.exe hknqcbe.exe File created C:\Windows\SysWOW64\ehkn477.exe conhost.exe File created C:\Windows\SysWOW64\loru56f.exe gjmpda6.exe File opened for modification C:\Windows\SysWOW64\ilor4ae.exe conhost.exe File created C:\Windows\SysWOW64\jmpsebe.exe cmd.exe File created C:\Windows\SysWOW64\ehkne76.exe gjmpd77.exe File created C:\Windows\SysWOW64\filo5a6.exe conhost.exe File opened for modification C:\Windows\SysWOW64\jmpsebe.exe cmd.exe File created C:\Windows\SysWOW64\hknq4ae.exe loru57e.exe File opened for modification C:\Windows\SysWOW64\cfil72f.exe cfilf2e.exe File opened for modification C:\Windows\SysWOW64\loru56f.exe gjmpda6.exe File created C:\Windows\SysWOW64\adgj527.exe adgjffe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe 1784 knqt766.exe 2680 ilord7e.exe 2592 hknqcbe.exe 2556 cfile6e.exe 1664 hknqd3f.exe 1424 ilor7e7.exe 1692 nqtwf3e.exe 596 cfilf2e.exe 1208 cfil72f.exe 1572 adgjffe.exe 1912 adgj527.exe 1188 cmd.exe 2496 hknq4a7.exe 3052 jmpsfbe.exe 2728 hknqd6f.exe 2732 cmd.exe 2868 gjmpd77.exe 2040 ehkne76.exe 2900 hknqdae.exe 1592 conhost.exe 2116 ehkn477.exe 2100 gjmpda6.exe 1656 loru56f.exe 1016 conhost.exe 296 conhost.exe 836 conhost.exe 1848 conhost.exe 1096 cmd.exe 3048 knqt5f6.exe 2940 conhost.exe 1536 adgjcae.exe 1140 conhost.exe 2032 conhost.exe 1628 conhost.exe 2176 lorudef.exe 1424 nqtwe3e.exe 1760 behk67f.exe 1080 loru66e.exe 2160 conhost.exe 300 loruef7.exe 908 conhost.exe 2456 nqtw766.exe 1768 ilor6b6.exe 2668 ehknd2e.exe 2804 conhost.exe 2296 cmd.exe 2916 conhost.exe 1464 cmd.exe 1648 cfil73f.exe 1716 cmd.exe 1692 loru53e.exe 2072 cmd.exe 2964 conhost.exe 1036 knqtef6.exe 876 knqt76e.exe 1552 hknq43e.exe 908 conhost.exe 2988 cmd.exe 2016 nqtwf26.exe 2608 cmd.exe 2776 loru57e.exe 2596 conhost.exe 2280 jmpsc6e.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe Token: SeIncBasePriorityPrivilege 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe Token: SeDebugPrivilege 1784 knqt766.exe Token: SeIncBasePriorityPrivilege 1784 knqt766.exe Token: SeDebugPrivilege 2680 ilord7e.exe Token: SeDebugPrivilege 2592 hknqcbe.exe Token: SeIncBasePriorityPrivilege 2680 cmd.exe Token: SeDebugPrivilege 2556 cfile6e.exe Token: SeIncBasePriorityPrivilege 2592 hknqcbe.exe Token: SeIncBasePriorityPrivilege 2556 cfile6e.exe Token: SeDebugPrivilege 1664 hknqd3f.exe Token: SeDebugPrivilege 1424 ilor7e7.exe Token: SeIncBasePriorityPrivilege 1664 hknqd3f.exe Token: SeIncBasePriorityPrivilege 1424 nqtwe3e.exe Token: SeDebugPrivilege 1692 nqtwf3e.exe Token: SeIncBasePriorityPrivilege 1692 nqtwf3e.exe Token: SeDebugPrivilege 596 cfilf2e.exe Token: SeIncBasePriorityPrivilege 596 cfilf2e.exe Token: SeDebugPrivilege 1208 cfil72f.exe Token: SeIncBasePriorityPrivilege 1208 cfil72f.exe Token: SeDebugPrivilege 1572 adgjffe.exe Token: SeIncBasePriorityPrivilege 1572 adgjffe.exe Token: SeDebugPrivilege 1912 adgj527.exe Token: SeIncBasePriorityPrivilege 1912 adgj527.exe Token: SeDebugPrivilege 1188 cmd.exe Token: SeDebugPrivilege 2496 hknq4a7.exe Token: SeIncBasePriorityPrivilege 1188 cmd.exe Token: SeDebugPrivilege 3052 jmpsfbe.exe Token: SeIncBasePriorityPrivilege 2496 hknq4a7.exe Token: SeIncBasePriorityPrivilege 3052 jmpsfbe.exe Token: SeDebugPrivilege 2728 hknqd6f.exe Token: SeDebugPrivilege 2732 cmd.exe Token: SeIncBasePriorityPrivilege 2728 hknqd6f.exe Token: SeIncBasePriorityPrivilege 2732 cmd.exe Token: SeDebugPrivilege 2868 gjmpd77.exe Token: SeDebugPrivilege 2040 ehkne76.exe Token: SeIncBasePriorityPrivilege 2868 gjmpd77.exe Token: SeIncBasePriorityPrivilege 2040 ehkne76.exe Token: SeDebugPrivilege 2900 hknqdae.exe Token: SeDebugPrivilege 1592 conhost.exe Token: SeIncBasePriorityPrivilege 2900 hknqdae.exe Token: SeIncBasePriorityPrivilege 1592 conhost.exe Token: SeDebugPrivilege 2116 ehkn477.exe Token: SeIncBasePriorityPrivilege 2116 ehkn477.exe Token: SeDebugPrivilege 2100 gjmpda6.exe Token: SeIncBasePriorityPrivilege 2100 gjmpda6.exe Token: SeDebugPrivilege 1656 loru56f.exe Token: SeIncBasePriorityPrivilege 1656 loru56f.exe Token: SeDebugPrivilege 1016 conhost.exe Token: SeIncBasePriorityPrivilege 1016 conhost.exe Token: SeDebugPrivilege 296 conhost.exe Token: SeIncBasePriorityPrivilege 296 conhost.exe Token: SeDebugPrivilege 836 conhost.exe Token: SeIncBasePriorityPrivilege 836 conhost.exe Token: SeDebugPrivilege 1848 conhost.exe Token: SeIncBasePriorityPrivilege 1848 conhost.exe Token: SeDebugPrivilege 1096 cmd.exe Token: SeIncBasePriorityPrivilege 1096 cmd.exe Token: SeDebugPrivilege 3048 knqt5f6.exe Token: SeIncBasePriorityPrivilege 3048 knqt5f6.exe Token: SeDebugPrivilege 2940 conhost.exe Token: SeIncBasePriorityPrivilege 2940 conhost.exe Token: SeDebugPrivilege 1536 adgjcae.exe Token: SeIncBasePriorityPrivilege 1536 adgjcae.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1784 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe 28 PID 3032 wrote to memory of 1784 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe 28 PID 3032 wrote to memory of 1784 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe 28 PID 3032 wrote to memory of 1784 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe 28 PID 3032 wrote to memory of 2316 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe 29 PID 3032 wrote to memory of 2316 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe 29 PID 3032 wrote to memory of 2316 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe 29 PID 3032 wrote to memory of 2316 3032 VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe 29 PID 1784 wrote to memory of 2680 1784 knqt766.exe 32 PID 1784 wrote to memory of 2680 1784 knqt766.exe 32 PID 1784 wrote to memory of 2680 1784 knqt766.exe 32 PID 1784 wrote to memory of 2680 1784 knqt766.exe 32 PID 1784 wrote to memory of 2856 1784 knqt766.exe 31 PID 1784 wrote to memory of 2856 1784 knqt766.exe 31 PID 1784 wrote to memory of 2856 1784 knqt766.exe 31 PID 1784 wrote to memory of 2856 1784 knqt766.exe 31 PID 2680 wrote to memory of 2592 2680 cmd.exe 34 PID 2680 wrote to memory of 2592 2680 cmd.exe 34 PID 2680 wrote to memory of 2592 2680 cmd.exe 34 PID 2680 wrote to memory of 2592 2680 cmd.exe 34 PID 2680 wrote to memory of 3020 2680 cmd.exe 36 PID 2680 wrote to memory of 3020 2680 cmd.exe 36 PID 2680 wrote to memory of 3020 2680 cmd.exe 36 PID 2680 wrote to memory of 3020 2680 cmd.exe 36 PID 2592 wrote to memory of 2556 2592 hknqcbe.exe 37 PID 2592 wrote to memory of 2556 2592 hknqcbe.exe 37 PID 2592 wrote to memory of 2556 2592 hknqcbe.exe 37 PID 2592 wrote to memory of 2556 2592 hknqcbe.exe 37 PID 2592 wrote to memory of 2884 2592 hknqcbe.exe 38 PID 2592 wrote to memory of 2884 2592 hknqcbe.exe 38 PID 2592 wrote to memory of 2884 2592 hknqcbe.exe 38 PID 2592 wrote to memory of 2884 2592 hknqcbe.exe 38 PID 2556 wrote to memory of 1664 2556 cfile6e.exe 40 PID 2556 wrote to memory of 1664 2556 cfile6e.exe 40 PID 2556 wrote to memory of 1664 2556 cfile6e.exe 40 PID 2556 wrote to memory of 1664 2556 cfile6e.exe 40 PID 2556 wrote to memory of 2552 2556 cfile6e.exe 41 PID 2556 wrote to memory of 2552 2556 cfile6e.exe 41 PID 2556 wrote to memory of 2552 2556 cfile6e.exe 41 PID 2556 wrote to memory of 2552 2556 cfile6e.exe 41 PID 1664 wrote to memory of 1424 1664 hknqd3f.exe 43 PID 1664 wrote to memory of 1424 1664 hknqd3f.exe 43 PID 1664 wrote to memory of 1424 1664 hknqd3f.exe 43 PID 1664 wrote to memory of 1424 1664 hknqd3f.exe 43 PID 1664 wrote to memory of 1916 1664 hknqd3f.exe 44 PID 1664 wrote to memory of 1916 1664 hknqd3f.exe 44 PID 1664 wrote to memory of 1916 1664 hknqd3f.exe 44 PID 1664 wrote to memory of 1916 1664 hknqd3f.exe 44 PID 1424 wrote to memory of 1692 1424 nqtwe3e.exe 46 PID 1424 wrote to memory of 1692 1424 nqtwe3e.exe 46 PID 1424 wrote to memory of 1692 1424 nqtwe3e.exe 46 PID 1424 wrote to memory of 1692 1424 nqtwe3e.exe 46 PID 1424 wrote to memory of 1596 1424 nqtwe3e.exe 47 PID 1424 wrote to memory of 1596 1424 nqtwe3e.exe 47 PID 1424 wrote to memory of 1596 1424 nqtwe3e.exe 47 PID 1424 wrote to memory of 1596 1424 nqtwe3e.exe 47 PID 1692 wrote to memory of 596 1692 nqtwf3e.exe 49 PID 1692 wrote to memory of 596 1692 nqtwf3e.exe 49 PID 1692 wrote to memory of 596 1692 nqtwf3e.exe 49 PID 1692 wrote to memory of 596 1692 nqtwf3e.exe 49 PID 1692 wrote to memory of 876 1692 nqtwf3e.exe 50 PID 1692 wrote to memory of 876 1692 nqtwf3e.exe 50 PID 1692 wrote to memory of 876 1692 nqtwf3e.exe 50 PID 1692 wrote to memory of 876 1692 nqtwf3e.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_16e64b83933c0ea42ec9de131c4d2527.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\knqt766.exe"C:\Windows\system32\knqt766.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c delC:\Windows\SysWOW64\knqt766.exe > nul3⤵PID:2856
-
-
C:\Windows\SysWOW64\ilord7e.exe"C:\Windows\system32\ilord7e.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680 -
C:\Windows\SysWOW64\hknqcbe.exe"C:\Windows\system32\hknqcbe.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\cfile6e.exe"C:\Windows\system32\cfile6e.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\hknqd3f.exe"C:\Windows\system32\hknqd3f.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\ilor7e7.exe"C:\Windows\system32\ilor7e7.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\SysWOW64\nqtwf3e.exe"C:\Windows\system32\nqtwf3e.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\cfilf2e.exe"C:\Windows\system32\cfilf2e.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:596 -
C:\Windows\SysWOW64\cfil72f.exe"C:\Windows\system32\cfil72f.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208 -
C:\Windows\SysWOW64\adgjffe.exe"C:\Windows\system32\adgjffe.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572 -
C:\Windows\SysWOW64\adgj527.exe"C:\Windows\system32\adgj527.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912 -
C:\Windows\SysWOW64\iloreb7.exe"C:\Windows\system32\iloreb7.exe"13⤵PID:1188
-
C:\Windows\SysWOW64\hknq4a7.exe"C:\Windows\system32\hknq4a7.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496 -
C:\Windows\SysWOW64\mpsve37.exe"C:\Windows\system32\mpsve37.exe"15⤵PID:3052
-
C:\Windows\SysWOW64\hknqd6f.exe"C:\Windows\system32\hknqd6f.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\SysWOW64\behk626.exe"C:\Windows\system32\behk626.exe"17⤵PID:2732
-
C:\Windows\SysWOW64\gjmpd77.exe"C:\Windows\system32\gjmpd77.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Windows\SysWOW64\ehkne76.exe"C:\Windows\system32\ehkne76.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\hknqdae.exe"C:\Windows\system32\hknqdae.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\dgjmdef.exe"C:\Windows\system32\dgjmdef.exe"21⤵PID:1592
-
C:\Windows\SysWOW64\ehkn477.exe"C:\Windows\system32\ehkn477.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\SysWOW64\gjmpda6.exe"C:\Windows\system32\gjmpda6.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Windows\SysWOW64\loru56f.exe"C:\Windows\system32\loru56f.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656 -
C:\Windows\SysWOW64\knqt6f6.exe"C:\Windows\system32\knqt6f6.exe"25⤵PID:1016
-
C:\Windows\SysWOW64\hknq7bf.exe"C:\Windows\system32\hknq7bf.exe"26⤵PID:296
-
C:\Windows\SysWOW64\behkeee.exe"C:\Windows\system32\behkeee.exe"27⤵PID:836
-
C:\Windows\SysWOW64\filo5a6.exe"C:\Windows\system32\filo5a6.exe"28⤵PID:1848
-
C:\Windows\SysWOW64\ilord67.exe"C:\Windows\system32\ilord67.exe"29⤵PID:1096
-
C:\Windows\SysWOW64\mpsvf2f.exe"C:\Windows\system32\mpsvf2f.exe"30⤵PID:3048
-
C:\Windows\SysWOW64\jmps47f.exe"C:\Windows\system32\jmps47f.exe"31⤵PID:2940
-
C:\Windows\SysWOW64\knqtff7.exe"C:\Windows\system32\knqtff7.exe"32⤵PID:1536
-
C:\Windows\SysWOW64\ilorea6.exe"C:\Windows\system32\ilorea6.exe"33⤵PID:1140
-
C:\Windows\SysWOW64\dgjmcfe.exe"C:\Windows\system32\dgjmcfe.exe"34⤵PID:2032
-
C:\Windows\SysWOW64\filoeb6.exe"C:\Windows\system32\filoeb6.exe"35⤵PID:1628
-
C:\Windows\SysWOW64\lorudef.exe"C:\Windows\system32\lorudef.exe"36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\nqtwe3e.exe"C:\Windows\system32\nqtwe3e.exe"37⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\behk67f.exe"C:\Windows\system32\behk67f.exe"38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1760 -
C:\Windows\SysWOW64\loru66e.exe"C:\Windows\system32\loru66e.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1080 -
C:\Windows\SysWOW64\jmps767.exe"C:\Windows\system32\jmps767.exe"40⤵PID:2160
-
C:\Windows\SysWOW64\loruef7.exe"C:\Windows\system32\loruef7.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:300 -
C:\Windows\SysWOW64\adgj6f7.exe"C:\Windows\system32\adgj6f7.exe"42⤵PID:908
-
C:\Windows\SysWOW64\gjmp5fe.exe"C:\Windows\system32\gjmp5fe.exe"43⤵PID:2456
-
C:\Windows\SysWOW64\ilor6b6.exe"C:\Windows\system32\ilor6b6.exe"44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\SysWOW64\ehknd2e.exe"C:\Windows\system32\ehknd2e.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\lorufb6.exe"C:\Windows\system32\lorufb6.exe"46⤵PID:2804
-
C:\Windows\SysWOW64\ilor4ae.exe"C:\Windows\system32\ilor4ae.exe"47⤵PID:2296
-
C:\Windows\SysWOW64\gjmp627.exe"C:\Windows\system32\gjmp627.exe"48⤵PID:2916
-
C:\Windows\SysWOW64\cfilcfe.exe"C:\Windows\system32\cfilcfe.exe"49⤵PID:1464
-
C:\Windows\SysWOW64\cfil73f.exe"C:\Windows\system32\cfil73f.exe"50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\SysWOW64\knqt7bf.exe"C:\Windows\system32\knqt7bf.exe"51⤵PID:1716
-
C:\Windows\SysWOW64\gjmpdf6.exe"C:\Windows\system32\gjmpdf6.exe"52⤵PID:1692
-
C:\Windows\SysWOW64\nqtwd2f.exe"C:\Windows\system32\nqtwd2f.exe"53⤵PID:2072
-
C:\Windows\SysWOW64\behkee6.exe"C:\Windows\system32\behkee6.exe"54⤵PID:2964
-
C:\Windows\SysWOW64\adgjf66.exe"C:\Windows\system32\adgjf66.exe"55⤵PID:1036
-
C:\Windows\SysWOW64\filo7fe.exe"C:\Windows\system32\filo7fe.exe"56⤵PID:876
-
C:\Windows\SysWOW64\adgj76f.exe"C:\Windows\system32\adgj76f.exe"57⤵PID:1552
-
C:\Windows\SysWOW64\ilor6bf.exe"C:\Windows\system32\ilor6bf.exe"58⤵PID:908
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c delC:\Windows\SysWOW64\ilor6bf.exe > nul59⤵PID:2844
-
-
C:\Windows\SysWOW64\knqtf2f.exe"C:\Windows\system32\knqtf2f.exe"59⤵PID:2988
-
C:\Windows\SysWOW64\nqtw627.exe"C:\Windows\system32\nqtw627.exe"60⤵PID:2016
-
C:\Windows\SysWOW64\filo437.exe"C:\Windows\system32\filo437.exe"61⤵PID:2608
-
C:\Windows\SysWOW64\jmpsebe.exe"C:\Windows\system32\jmpsebe.exe"62⤵PID:2776
-
C:\Windows\SysWOW64\hknq4ae.exe"C:\Windows\system32\hknq4ae.exe"63⤵PID:2596
-
C:\Windows\SysWOW64\jmps57e.exe"C:\Windows\system32\jmps57e.exe"64⤵PID:2280
-
C:\Windows\SysWOW64\loru5bf.exe"C:\Windows\system32\loru5bf.exe"65⤵PID:1664
-
C:\Windows\SysWOW64\loru777.exe"C:\Windows\system32\loru777.exe"66⤵PID:1516
-
C:\Windows\SysWOW64\adgj42e.exe"C:\Windows\system32\adgj42e.exe"67⤵PID:1368
-
C:\Windows\SysWOW64\jmps4ef.exe"C:\Windows\system32\jmps4ef.exe"68⤵PID:2080
-
C:\Windows\SysWOW64\loruf6e.exe"C:\Windows\system32\loruf6e.exe"69⤵PID:2952
-
C:\Windows\SysWOW64\filo677.exe"C:\Windows\system32\filo677.exe"70⤵PID:708
-
C:\Windows\SysWOW64\ilordfe.exe"C:\Windows\system32\ilordfe.exe"71⤵PID:2188
-
C:\Windows\SysWOW64\adgj6be.exe"C:\Windows\system32\adgj6be.exe"72⤵PID:296
-
C:\Windows\SysWOW64\behk4f7.exe"C:\Windows\system32\behk4f7.exe"73⤵PID:2192
-
C:\Windows\SysWOW64\adgj4a7.exe"C:\Windows\system32\adgj4a7.exe"74⤵PID:2724
-
C:\Windows\SysWOW64\gjmp7fe.exe"C:\Windows\system32\gjmp7fe.exe"75⤵PID:1584
-
C:\Windows\SysWOW64\filoeb6.exe"C:\Windows\system32\filoeb6.exe"76⤵PID:2492
-
C:\Windows\SysWOW64\mpsv5ef.exe"C:\Windows\system32\mpsv5ef.exe"77⤵PID:2368
-
C:\Windows\SysWOW64\ilore3f.exe"C:\Windows\system32\ilore3f.exe"78⤵PID:2504
-
C:\Windows\SysWOW64\ehknf67.exe"C:\Windows\system32\ehknf67.exe"79⤵PID:268
-
C:\Windows\SysWOW64\filo5b6.exe"C:\Windows\system32\filo5b6.exe"80⤵PID:1744
-
C:\Windows\SysWOW64\cfilde7.exe"C:\Windows\system32\cfilde7.exe"81⤵PID:952
-
C:\Windows\SysWOW64\ilord2f.exe"C:\Windows\system32\ilord2f.exe"82⤵PID:2500
-
C:\Windows\SysWOW64\adgj4af.exe"C:\Windows\system32\adgj4af.exe"83⤵PID:592
-
C:\Windows\SysWOW64\ilor47f.exe"C:\Windows\system32\ilor47f.exe"84⤵PID:556
-
C:\Windows\SysWOW64\ehkn426.exe"C:\Windows\system32\ehkn426.exe"85⤵PID:1900
-
C:\Windows\SysWOW64\jmps77f.exe"C:\Windows\system32\jmps77f.exe"86⤵PID:2456
-
C:\Windows\SysWOW64\nqtw526.exe"C:\Windows\system32\nqtw526.exe"87⤵PID:2152
-
C:\Windows\SysWOW64\loruda6.exe"C:\Windows\system32\loruda6.exe"88⤵PID:2228
-
C:\Windows\SysWOW64\filoee7.exe"C:\Windows\system32\filoee7.exe"89⤵PID:3048
-
C:\Windows\SysWOW64\jmpsfbe.exe"C:\Windows\system32\jmpsfbe.exe"90⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052 -
C:\Windows\SysWOW64\hknq6e6.exe"C:\Windows\system32\hknq6e6.exe"91⤵PID:2720
-
C:\Windows\SysWOW64\jmpsd27.exe"C:\Windows\system32\jmpsd27.exe"92⤵PID:1976
-
C:\Windows\SysWOW64\dgjm636.exe"C:\Windows\system32\dgjm636.exe"93⤵PID:1536
-
C:\Windows\SysWOW64\nqtw637.exe"C:\Windows\system32\nqtw637.exe"94⤵PID:2864
-
C:\Windows\SysWOW64\dgjm7ff.exe"C:\Windows\system32\dgjm7ff.exe"95⤵PID:1628
-
C:\Windows\SysWOW64\hknqe67.exe"C:\Windows\system32\hknqe67.exe"96⤵PID:2180
-
C:\Windows\SysWOW64\ehkn7b6.exe"C:\Windows\system32\ehkn7b6.exe"97⤵PID:2968
-
C:\Windows\SysWOW64\hknqfee.exe"C:\Windows\system32\hknqfee.exe"98⤵PID:1820
-
C:\Windows\SysWOW64\jmps7bf.exe"C:\Windows\system32\jmps7bf.exe"99⤵PID:2148
-
C:\Windows\SysWOW64\filo4ef.exe"C:\Windows\system32\filo4ef.exe"100⤵PID:2484
-
C:\Windows\SysWOW64\gjmp7ff.exe"C:\Windows\system32\gjmp7ff.exe"101⤵PID:2224
-
C:\Windows\SysWOW64\knqt5ff.exe"C:\Windows\system32\knqt5ff.exe"102⤵PID:2456
-
C:\Windows\SysWOW64\lorudbf.exe"C:\Windows\system32\lorudbf.exe"103⤵PID:1572
-
C:\Windows\SysWOW64\filoef7.exe"C:\Windows\system32\filoef7.exe"104⤵PID:2256
-
C:\Windows\SysWOW64\gjmpce6.exe"C:\Windows\system32\gjmpce6.exe"105⤵PID:1784
-
C:\Windows\SysWOW64\hknqcff.exe"C:\Windows\system32\hknqcff.exe"106⤵PID:3052
-
C:\Windows\SysWOW64\cfild77.exe"C:\Windows\system32\cfild77.exe"107⤵PID:2384
-
C:\Windows\SysWOW64\knqt5be.exe"C:\Windows\system32\knqt5be.exe"108⤵PID:812
-
C:\Windows\SysWOW64\hknq77e.exe"C:\Windows\system32\hknq77e.exe"109⤵PID:1764
-
C:\Windows\SysWOW64\nqtw566.exe"C:\Windows\system32\nqtw566.exe"110⤵PID:1756
-
C:\Windows\SysWOW64\jmps727.exe"C:\Windows\system32\jmps727.exe"111⤵PID:2060
-
C:\Windows\SysWOW64\knqtdf6.exe"C:\Windows\system32\knqtdf6.exe"112⤵PID:2088
-
C:\Windows\SysWOW64\behke36.exe"C:\Windows\system32\behke36.exe"113⤵PID:1052
-
C:\Windows\SysWOW64\filodff.exe"C:\Windows\system32\filodff.exe"114⤵PID:1820
-
C:\Windows\SysWOW64\hknqf2e.exe"C:\Windows\system32\hknqf2e.exe"115⤵PID:1388
-
C:\Windows\SysWOW64\knqt677.exe"C:\Windows\system32\knqt677.exe"116⤵PID:2248
-
C:\Windows\SysWOW64\mpsvc3e.exe"C:\Windows\system32\mpsvc3e.exe"117⤵PID:2224
-
C:\Windows\SysWOW64\jmps62e.exe"C:\Windows\system32\jmps62e.exe"118⤵PID:2780
-
C:\Windows\SysWOW64\ilor57f.exe"C:\Windows\system32\ilor57f.exe"119⤵PID:2348
-
C:\Windows\SysWOW64\knqt5f6.exe"C:\Windows\system32\knqt5f6.exe"120⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048 -
C:\Windows\SysWOW64\mpsv6ae.exe"C:\Windows\system32\mpsv6ae.exe"121⤵PID:3016
-
C:\Windows\SysWOW64\filofbe.exe"C:\Windows\system32\filofbe.exe"122⤵PID:844
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-