Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 19:56
Behavioral task
behavioral1
Sample
5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe
Resource
win7-20240221-en
General
-
Target
5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe
-
Size
1.8MB
-
MD5
4d9ee15d4578cb9e80961e9924c2bae6
-
SHA1
37054cb0de898bfbb2d0ee6c3e59f181760786af
-
SHA256
5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf
-
SHA512
d5bbec6ec34274cf6578945881359d543518168849092a10b4a84705c4815e804a58e5860c2852e36a2a2070e8b66f51b83ae9d4a4fc55d2b930020fd5027c12
-
SSDEEP
49152:BezaTF8FcNkNdfE0pZ9ozt4wIXxeHNEXYG:BemTLkNdfE0pZrr
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/3656-0-0x00007FF7AE190000-0x00007FF7AE4E4000-memory.dmp UPX behavioral2/files/0x000d000000023152-5.dat UPX behavioral2/files/0x000d000000023152-10.dat UPX behavioral2/files/0x000a0000000231ff-23.dat UPX behavioral2/memory/3848-19-0x00007FF7490C0000-0x00007FF749414000-memory.dmp UPX behavioral2/files/0x000700000002320a-17.dat UPX behavioral2/files/0x000700000002320b-22.dat UPX behavioral2/files/0x000700000002320b-29.dat UPX behavioral2/files/0x000700000002320e-34.dat UPX behavioral2/files/0x0007000000023210-53.dat UPX behavioral2/memory/556-58-0x00007FF7335D0000-0x00007FF733924000-memory.dmp UPX behavioral2/files/0x0007000000023212-70.dat UPX behavioral2/files/0x0007000000023213-73.dat UPX behavioral2/files/0x0007000000023215-89.dat UPX behavioral2/memory/1692-95-0x00007FF68C7B0000-0x00007FF68CB04000-memory.dmp UPX behavioral2/files/0x0007000000023219-107.dat UPX behavioral2/memory/3164-109-0x00007FF6FABB0000-0x00007FF6FAF04000-memory.dmp UPX behavioral2/memory/2628-111-0x00007FF6611C0000-0x00007FF661514000-memory.dmp UPX behavioral2/memory/4552-113-0x00007FF665A50000-0x00007FF665DA4000-memory.dmp UPX behavioral2/memory/4100-112-0x00007FF7D1BF0000-0x00007FF7D1F44000-memory.dmp UPX behavioral2/memory/2620-110-0x00007FF6E25F0000-0x00007FF6E2944000-memory.dmp UPX behavioral2/memory/4212-108-0x00007FF6DFEE0000-0x00007FF6E0234000-memory.dmp UPX behavioral2/memory/3364-106-0x00007FF65AE10000-0x00007FF65B164000-memory.dmp UPX behavioral2/files/0x0007000000023218-105.dat UPX behavioral2/memory/1752-104-0x00007FF795A90000-0x00007FF795DE4000-memory.dmp UPX behavioral2/memory/672-102-0x00007FF703810000-0x00007FF703B64000-memory.dmp UPX behavioral2/files/0x0009000000023207-91.dat UPX behavioral2/files/0x0007000000023216-85.dat UPX behavioral2/files/0x0007000000023214-75.dat UPX behavioral2/memory/116-72-0x00007FF767D70000-0x00007FF7680C4000-memory.dmp UPX behavioral2/memory/2636-69-0x00007FF775760000-0x00007FF775AB4000-memory.dmp UPX behavioral2/files/0x0007000000023213-67.dat UPX behavioral2/memory/2244-66-0x00007FF621840000-0x00007FF621B94000-memory.dmp UPX behavioral2/files/0x0007000000023212-59.dat UPX behavioral2/memory/1432-55-0x00007FF7E5A30000-0x00007FF7E5D84000-memory.dmp UPX behavioral2/files/0x0007000000023211-52.dat UPX behavioral2/files/0x000700000002320f-50.dat UPX behavioral2/files/0x0007000000023210-47.dat UPX behavioral2/memory/3984-41-0x00007FF79E830000-0x00007FF79EB84000-memory.dmp UPX behavioral2/files/0x000700000002320d-37.dat UPX behavioral2/files/0x000700000002320c-35.dat UPX behavioral2/memory/380-28-0x00007FF640310000-0x00007FF640664000-memory.dmp UPX behavioral2/files/0x000a0000000231ff-8.dat UPX behavioral2/memory/1896-9-0x00007FF636F60000-0x00007FF6372B4000-memory.dmp UPX behavioral2/files/0x000700000002320a-7.dat UPX behavioral2/memory/544-133-0x00007FF787810000-0x00007FF787B64000-memory.dmp UPX behavioral2/files/0x000700000002321a-122.dat UPX behavioral2/files/0x000700000002321a-119.dat UPX behavioral2/memory/4372-158-0x00007FF6BE490000-0x00007FF6BE7E4000-memory.dmp UPX behavioral2/files/0x000700000002322d-201.dat UPX behavioral2/memory/2952-228-0x00007FF792480000-0x00007FF7927D4000-memory.dmp UPX behavioral2/memory/4716-245-0x00007FF6BB160000-0x00007FF6BB4B4000-memory.dmp UPX behavioral2/memory/4396-206-0x00007FF6F4280000-0x00007FF6F45D4000-memory.dmp UPX behavioral2/files/0x000700000002321e-191.dat UPX behavioral2/memory/3720-187-0x00007FF63A7A0000-0x00007FF63AAF4000-memory.dmp UPX behavioral2/files/0x0007000000023223-174.dat UPX behavioral2/files/0x000700000002321b-144.dat UPX behavioral2/files/0x0007000000023221-143.dat UPX behavioral2/files/0x0007000000023220-140.dat UPX behavioral2/files/0x000700000002321f-139.dat UPX behavioral2/files/0x000700000002321e-138.dat UPX behavioral2/files/0x000700000002321c-137.dat UPX behavioral2/memory/4472-254-0x00007FF6B5FE0000-0x00007FF6B6334000-memory.dmp UPX behavioral2/memory/2400-285-0x00007FF64A840000-0x00007FF64AB94000-memory.dmp UPX -
XMRig Miner payload 64 IoCs
resource yara_rule behavioral2/memory/3656-0-0x00007FF7AE190000-0x00007FF7AE4E4000-memory.dmp xmrig behavioral2/files/0x000d000000023152-5.dat xmrig behavioral2/files/0x000d000000023152-10.dat xmrig behavioral2/files/0x000a0000000231ff-23.dat xmrig behavioral2/memory/3848-19-0x00007FF7490C0000-0x00007FF749414000-memory.dmp xmrig behavioral2/files/0x000700000002320a-17.dat xmrig behavioral2/files/0x000700000002320b-22.dat xmrig behavioral2/files/0x000700000002320b-29.dat xmrig behavioral2/files/0x000700000002320e-34.dat xmrig behavioral2/files/0x0007000000023210-53.dat xmrig behavioral2/memory/556-58-0x00007FF7335D0000-0x00007FF733924000-memory.dmp xmrig behavioral2/files/0x0007000000023212-70.dat xmrig behavioral2/files/0x0007000000023213-73.dat xmrig behavioral2/files/0x0007000000023215-89.dat xmrig behavioral2/memory/1692-95-0x00007FF68C7B0000-0x00007FF68CB04000-memory.dmp xmrig behavioral2/files/0x0007000000023219-107.dat xmrig behavioral2/memory/3164-109-0x00007FF6FABB0000-0x00007FF6FAF04000-memory.dmp xmrig behavioral2/memory/2628-111-0x00007FF6611C0000-0x00007FF661514000-memory.dmp xmrig behavioral2/memory/4552-113-0x00007FF665A50000-0x00007FF665DA4000-memory.dmp xmrig behavioral2/memory/4100-112-0x00007FF7D1BF0000-0x00007FF7D1F44000-memory.dmp xmrig behavioral2/memory/2620-110-0x00007FF6E25F0000-0x00007FF6E2944000-memory.dmp xmrig behavioral2/memory/4212-108-0x00007FF6DFEE0000-0x00007FF6E0234000-memory.dmp xmrig behavioral2/memory/3364-106-0x00007FF65AE10000-0x00007FF65B164000-memory.dmp xmrig behavioral2/files/0x0007000000023218-105.dat xmrig behavioral2/memory/1752-104-0x00007FF795A90000-0x00007FF795DE4000-memory.dmp xmrig behavioral2/memory/672-102-0x00007FF703810000-0x00007FF703B64000-memory.dmp xmrig behavioral2/files/0x0009000000023207-91.dat xmrig behavioral2/files/0x0007000000023216-85.dat xmrig behavioral2/files/0x0007000000023214-75.dat xmrig behavioral2/memory/116-72-0x00007FF767D70000-0x00007FF7680C4000-memory.dmp xmrig behavioral2/memory/2636-69-0x00007FF775760000-0x00007FF775AB4000-memory.dmp xmrig behavioral2/files/0x0007000000023213-67.dat xmrig behavioral2/memory/2244-66-0x00007FF621840000-0x00007FF621B94000-memory.dmp xmrig behavioral2/files/0x0007000000023212-59.dat xmrig behavioral2/memory/1432-55-0x00007FF7E5A30000-0x00007FF7E5D84000-memory.dmp xmrig behavioral2/files/0x0007000000023211-52.dat xmrig behavioral2/files/0x000700000002320f-50.dat xmrig behavioral2/files/0x0007000000023210-47.dat xmrig behavioral2/memory/3984-41-0x00007FF79E830000-0x00007FF79EB84000-memory.dmp xmrig behavioral2/files/0x000700000002320d-37.dat xmrig behavioral2/files/0x000700000002320c-35.dat xmrig behavioral2/memory/380-28-0x00007FF640310000-0x00007FF640664000-memory.dmp xmrig behavioral2/files/0x000a0000000231ff-8.dat xmrig behavioral2/memory/1896-9-0x00007FF636F60000-0x00007FF6372B4000-memory.dmp xmrig behavioral2/files/0x000700000002320a-7.dat xmrig behavioral2/memory/544-133-0x00007FF787810000-0x00007FF787B64000-memory.dmp xmrig behavioral2/files/0x000700000002321a-122.dat xmrig behavioral2/files/0x000700000002321a-119.dat xmrig behavioral2/memory/4372-158-0x00007FF6BE490000-0x00007FF6BE7E4000-memory.dmp xmrig behavioral2/files/0x000700000002322d-201.dat xmrig behavioral2/memory/2952-228-0x00007FF792480000-0x00007FF7927D4000-memory.dmp xmrig behavioral2/memory/4716-245-0x00007FF6BB160000-0x00007FF6BB4B4000-memory.dmp xmrig behavioral2/memory/4396-206-0x00007FF6F4280000-0x00007FF6F45D4000-memory.dmp xmrig behavioral2/files/0x000700000002321e-191.dat xmrig behavioral2/memory/3720-187-0x00007FF63A7A0000-0x00007FF63AAF4000-memory.dmp xmrig behavioral2/files/0x0007000000023223-174.dat xmrig behavioral2/files/0x000700000002321b-144.dat xmrig behavioral2/files/0x0007000000023221-143.dat xmrig behavioral2/files/0x0007000000023220-140.dat xmrig behavioral2/files/0x000700000002321f-139.dat xmrig behavioral2/files/0x000700000002321e-138.dat xmrig behavioral2/files/0x000700000002321c-137.dat xmrig behavioral2/memory/4472-254-0x00007FF6B5FE0000-0x00007FF6B6334000-memory.dmp xmrig behavioral2/memory/2400-285-0x00007FF64A840000-0x00007FF64AB94000-memory.dmp xmrig -
Executes dropped EXE 64 IoCs
pid Process 1896 zAplGnS.exe 3848 waLCBPG.exe 116 VWeOECB.exe 380 nWTdmKD.exe 1692 IPVMsIR.exe 3984 sIWVEpd.exe 672 oJhFhwZ.exe 1432 hHgdghr.exe 556 TmYmkpx.exe 2244 yISSRrO.exe 1752 XUAxFxF.exe 3364 rFLerqA.exe 2636 KYkXVnL.exe 2628 uylEgJN.exe 4212 pSFjNuB.exe 3164 iVBQtsC.exe 2620 mIMqgxg.exe 4100 FRkaXHQ.exe 4552 wOEzkaD.exe 544 ZKkdvvL.exe 2348 QLiiWTK.exe 4104 EiEEfqS.exe 4372 gwFLWph.exe 3720 QSqlZrU.exe 4396 CEvDpmW.exe 2952 mnxvIUx.exe 2364 RJFWjeE.exe 4716 fcfbrcU.exe 4472 NAVZCey.exe 316 zwOBmRK.exe 3108 NrDDets.exe 2400 hiGpFwP.exe 1608 IyFlXAs.exe 5028 iGOROZi.exe 1740 miwQnLN.exe 4336 qeCLCfr.exe 4424 GFRrIdo.exe 2100 jOQQRCN.exe 2392 NuBENgP.exe 2088 HzZTCnh.exe 5012 dlvgJlu.exe 1016 tuLGQkg.exe 4912 wzVHjjQ.exe 4672 GPhqwAu.exe 2320 HuMWZki.exe 2336 ZbPZIEV.exe 2648 SkPiuGi.exe 1976 LYxdbTc.exe 3360 ZaNcChG.exe 3560 AHAFKjK.exe 1096 fkIrBbW.exe 4568 ljvFwmW.exe 1552 HsKazfq.exe 2904 SWDvfye.exe 3668 iRvMoKG.exe 3220 ihCNcaG.exe 4060 ULPONTM.exe 668 XnUdlok.exe 2396 oJAPfZE.exe 3652 VVMAQij.exe 1616 ZnGXfuY.exe 2860 ZHyTFWd.exe 4544 iAZYDDF.exe 4736 GrccnCq.exe -
resource yara_rule behavioral2/memory/3656-0-0x00007FF7AE190000-0x00007FF7AE4E4000-memory.dmp upx behavioral2/files/0x000d000000023152-5.dat upx behavioral2/files/0x000d000000023152-10.dat upx behavioral2/files/0x000a0000000231ff-23.dat upx behavioral2/memory/3848-19-0x00007FF7490C0000-0x00007FF749414000-memory.dmp upx behavioral2/files/0x000700000002320a-17.dat upx behavioral2/files/0x000700000002320b-22.dat upx behavioral2/files/0x000700000002320b-29.dat upx behavioral2/files/0x000700000002320e-34.dat upx behavioral2/files/0x0007000000023210-53.dat upx behavioral2/memory/556-58-0x00007FF7335D0000-0x00007FF733924000-memory.dmp upx behavioral2/files/0x0007000000023212-70.dat upx behavioral2/files/0x0007000000023213-73.dat upx behavioral2/files/0x0007000000023215-89.dat upx behavioral2/memory/1692-95-0x00007FF68C7B0000-0x00007FF68CB04000-memory.dmp upx behavioral2/files/0x0007000000023219-107.dat upx behavioral2/memory/3164-109-0x00007FF6FABB0000-0x00007FF6FAF04000-memory.dmp upx behavioral2/memory/2628-111-0x00007FF6611C0000-0x00007FF661514000-memory.dmp upx behavioral2/memory/4552-113-0x00007FF665A50000-0x00007FF665DA4000-memory.dmp upx behavioral2/memory/4100-112-0x00007FF7D1BF0000-0x00007FF7D1F44000-memory.dmp upx behavioral2/memory/2620-110-0x00007FF6E25F0000-0x00007FF6E2944000-memory.dmp upx behavioral2/memory/4212-108-0x00007FF6DFEE0000-0x00007FF6E0234000-memory.dmp upx behavioral2/memory/3364-106-0x00007FF65AE10000-0x00007FF65B164000-memory.dmp upx behavioral2/files/0x0007000000023218-105.dat upx behavioral2/memory/1752-104-0x00007FF795A90000-0x00007FF795DE4000-memory.dmp upx behavioral2/memory/672-102-0x00007FF703810000-0x00007FF703B64000-memory.dmp upx behavioral2/files/0x0009000000023207-91.dat upx behavioral2/files/0x0007000000023216-85.dat upx behavioral2/files/0x0007000000023214-75.dat upx behavioral2/memory/116-72-0x00007FF767D70000-0x00007FF7680C4000-memory.dmp upx behavioral2/memory/2636-69-0x00007FF775760000-0x00007FF775AB4000-memory.dmp upx behavioral2/files/0x0007000000023213-67.dat upx behavioral2/memory/2244-66-0x00007FF621840000-0x00007FF621B94000-memory.dmp upx behavioral2/files/0x0007000000023212-59.dat upx behavioral2/memory/1432-55-0x00007FF7E5A30000-0x00007FF7E5D84000-memory.dmp upx behavioral2/files/0x0007000000023211-52.dat upx behavioral2/files/0x000700000002320f-50.dat upx behavioral2/files/0x0007000000023210-47.dat upx behavioral2/memory/3984-41-0x00007FF79E830000-0x00007FF79EB84000-memory.dmp upx behavioral2/files/0x000700000002320d-37.dat upx behavioral2/files/0x000700000002320c-35.dat upx behavioral2/memory/380-28-0x00007FF640310000-0x00007FF640664000-memory.dmp upx behavioral2/files/0x000a0000000231ff-8.dat upx behavioral2/memory/1896-9-0x00007FF636F60000-0x00007FF6372B4000-memory.dmp upx behavioral2/files/0x000700000002320a-7.dat upx behavioral2/memory/544-133-0x00007FF787810000-0x00007FF787B64000-memory.dmp upx behavioral2/files/0x000700000002321a-122.dat upx behavioral2/files/0x000700000002321a-119.dat upx behavioral2/memory/4372-158-0x00007FF6BE490000-0x00007FF6BE7E4000-memory.dmp upx behavioral2/files/0x000700000002322d-201.dat upx behavioral2/memory/2952-228-0x00007FF792480000-0x00007FF7927D4000-memory.dmp upx behavioral2/memory/4716-245-0x00007FF6BB160000-0x00007FF6BB4B4000-memory.dmp upx behavioral2/memory/4396-206-0x00007FF6F4280000-0x00007FF6F45D4000-memory.dmp upx behavioral2/files/0x000700000002321e-191.dat upx behavioral2/memory/3720-187-0x00007FF63A7A0000-0x00007FF63AAF4000-memory.dmp upx behavioral2/files/0x0007000000023223-174.dat upx behavioral2/files/0x000700000002321b-144.dat upx behavioral2/files/0x0007000000023221-143.dat upx behavioral2/files/0x0007000000023220-140.dat upx behavioral2/files/0x000700000002321f-139.dat upx behavioral2/files/0x000700000002321e-138.dat upx behavioral2/files/0x000700000002321c-137.dat upx behavioral2/memory/4472-254-0x00007FF6B5FE0000-0x00007FF6B6334000-memory.dmp upx behavioral2/memory/2400-285-0x00007FF64A840000-0x00007FF64AB94000-memory.dmp upx -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\System\VhBcTRi.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\szdeLCC.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\kUpUbYs.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\wbnwVqM.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\euWKJyB.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\FIIWmmE.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\FBAMgiO.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\IkPHJhs.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\klYEAZT.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\wAPzRbo.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\BTqMStQ.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\MSAKCgF.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\XtFccot.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\rjbrmXH.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\QGgiNXO.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\RUKgoVV.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\WJAXRlo.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\asNiQBX.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\YXPSVDt.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\bmrLntu.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\hBHoTfe.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\XzwMJrY.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\VWeOECB.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\GPhqwAu.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\JptyKsR.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\fwhszqq.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\UfLWYjc.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\mqkAycC.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\HsKazfq.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\vJWedaL.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\sdUBoEx.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\KqAVfVF.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\SKNLsoG.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\ENlrEFX.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\IekbciK.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\iBfMBAR.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\oJAPfZE.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\qObQqRu.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\EDwELRH.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\JHfXXwA.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\zTpGmXr.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\zpNjbrF.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\jEtQROw.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\ZKkdvvL.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\zwOBmRK.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\tZdZUmK.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\FFiFqpp.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\bYWIWGL.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\dfUzjwn.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\TJsMLQa.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\zwUsdCl.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\sIWVEpd.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\SWDvfye.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\yirDdkw.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\ZoQokXs.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\sincDzR.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\lIlwIoZ.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\ysdYGNJ.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\DlkjmPr.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\DWPrbcG.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\CIYQLoh.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\CNDnZNF.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\LfDSXxp.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe File created C:\Windows\System\GYVWKAo.exe 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 10352 dwm.exe Token: SeChangeNotifyPrivilege 10352 dwm.exe Token: 33 10352 dwm.exe Token: SeIncBasePriorityPrivilege 10352 dwm.exe Token: SeShutdownPrivilege 10352 dwm.exe Token: SeCreatePagefilePrivilege 10352 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3656 wrote to memory of 1896 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 90 PID 3656 wrote to memory of 1896 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 90 PID 3656 wrote to memory of 3848 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 91 PID 3656 wrote to memory of 3848 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 91 PID 3656 wrote to memory of 116 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 92 PID 3656 wrote to memory of 116 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 92 PID 3656 wrote to memory of 380 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 93 PID 3656 wrote to memory of 380 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 93 PID 3656 wrote to memory of 1692 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 94 PID 3656 wrote to memory of 1692 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 94 PID 3656 wrote to memory of 3984 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 95 PID 3656 wrote to memory of 3984 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 95 PID 3656 wrote to memory of 672 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 96 PID 3656 wrote to memory of 672 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 96 PID 3656 wrote to memory of 1432 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 97 PID 3656 wrote to memory of 1432 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 97 PID 3656 wrote to memory of 556 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 98 PID 3656 wrote to memory of 556 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 98 PID 3656 wrote to memory of 2244 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 99 PID 3656 wrote to memory of 2244 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 99 PID 3656 wrote to memory of 1752 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 100 PID 3656 wrote to memory of 1752 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 100 PID 3656 wrote to memory of 3364 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 101 PID 3656 wrote to memory of 3364 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 101 PID 3656 wrote to memory of 2636 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 102 PID 3656 wrote to memory of 2636 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 102 PID 3656 wrote to memory of 2628 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 103 PID 3656 wrote to memory of 2628 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 103 PID 3656 wrote to memory of 4212 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 104 PID 3656 wrote to memory of 4212 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 104 PID 3656 wrote to memory of 3164 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 105 PID 3656 wrote to memory of 3164 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 105 PID 3656 wrote to memory of 2620 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 106 PID 3656 wrote to memory of 2620 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 106 PID 3656 wrote to memory of 4100 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 107 PID 3656 wrote to memory of 4100 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 107 PID 3656 wrote to memory of 4552 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 108 PID 3656 wrote to memory of 4552 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 108 PID 3656 wrote to memory of 544 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 109 PID 3656 wrote to memory of 544 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 109 PID 3656 wrote to memory of 2348 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 110 PID 3656 wrote to memory of 2348 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 110 PID 3656 wrote to memory of 4372 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 111 PID 3656 wrote to memory of 4372 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 111 PID 3656 wrote to memory of 4104 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 112 PID 3656 wrote to memory of 4104 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 112 PID 3656 wrote to memory of 3720 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 113 PID 3656 wrote to memory of 3720 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 113 PID 3656 wrote to memory of 4396 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 114 PID 3656 wrote to memory of 4396 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 114 PID 3656 wrote to memory of 2952 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 115 PID 3656 wrote to memory of 2952 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 115 PID 3656 wrote to memory of 2364 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 116 PID 3656 wrote to memory of 2364 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 116 PID 3656 wrote to memory of 4716 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 117 PID 3656 wrote to memory of 4716 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 117 PID 3656 wrote to memory of 4472 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 118 PID 3656 wrote to memory of 4472 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 118 PID 3656 wrote to memory of 316 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 119 PID 3656 wrote to memory of 316 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 119 PID 3656 wrote to memory of 3108 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 120 PID 3656 wrote to memory of 3108 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 120 PID 3656 wrote to memory of 2400 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 121 PID 3656 wrote to memory of 2400 3656 5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe"C:\Users\Admin\AppData\Local\Temp\5ecda646b23931514e91d13275605c00a1c4b0bc776d2bd00ff73b80275e3fbf.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\System\zAplGnS.exeC:\Windows\System\zAplGnS.exe2⤵
- Executes dropped EXE
PID:1896
-
-
C:\Windows\System\waLCBPG.exeC:\Windows\System\waLCBPG.exe2⤵
- Executes dropped EXE
PID:3848
-
-
C:\Windows\System\VWeOECB.exeC:\Windows\System\VWeOECB.exe2⤵
- Executes dropped EXE
PID:116
-
-
C:\Windows\System\nWTdmKD.exeC:\Windows\System\nWTdmKD.exe2⤵
- Executes dropped EXE
PID:380
-
-
C:\Windows\System\IPVMsIR.exeC:\Windows\System\IPVMsIR.exe2⤵
- Executes dropped EXE
PID:1692
-
-
C:\Windows\System\sIWVEpd.exeC:\Windows\System\sIWVEpd.exe2⤵
- Executes dropped EXE
PID:3984
-
-
C:\Windows\System\oJhFhwZ.exeC:\Windows\System\oJhFhwZ.exe2⤵
- Executes dropped EXE
PID:672
-
-
C:\Windows\System\hHgdghr.exeC:\Windows\System\hHgdghr.exe2⤵
- Executes dropped EXE
PID:1432
-
-
C:\Windows\System\TmYmkpx.exeC:\Windows\System\TmYmkpx.exe2⤵
- Executes dropped EXE
PID:556
-
-
C:\Windows\System\yISSRrO.exeC:\Windows\System\yISSRrO.exe2⤵
- Executes dropped EXE
PID:2244
-
-
C:\Windows\System\XUAxFxF.exeC:\Windows\System\XUAxFxF.exe2⤵
- Executes dropped EXE
PID:1752
-
-
C:\Windows\System\rFLerqA.exeC:\Windows\System\rFLerqA.exe2⤵
- Executes dropped EXE
PID:3364
-
-
C:\Windows\System\KYkXVnL.exeC:\Windows\System\KYkXVnL.exe2⤵
- Executes dropped EXE
PID:2636
-
-
C:\Windows\System\uylEgJN.exeC:\Windows\System\uylEgJN.exe2⤵
- Executes dropped EXE
PID:2628
-
-
C:\Windows\System\pSFjNuB.exeC:\Windows\System\pSFjNuB.exe2⤵
- Executes dropped EXE
PID:4212
-
-
C:\Windows\System\iVBQtsC.exeC:\Windows\System\iVBQtsC.exe2⤵
- Executes dropped EXE
PID:3164
-
-
C:\Windows\System\mIMqgxg.exeC:\Windows\System\mIMqgxg.exe2⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\System\FRkaXHQ.exeC:\Windows\System\FRkaXHQ.exe2⤵
- Executes dropped EXE
PID:4100
-
-
C:\Windows\System\wOEzkaD.exeC:\Windows\System\wOEzkaD.exe2⤵
- Executes dropped EXE
PID:4552
-
-
C:\Windows\System\ZKkdvvL.exeC:\Windows\System\ZKkdvvL.exe2⤵
- Executes dropped EXE
PID:544
-
-
C:\Windows\System\QLiiWTK.exeC:\Windows\System\QLiiWTK.exe2⤵
- Executes dropped EXE
PID:2348
-
-
C:\Windows\System\gwFLWph.exeC:\Windows\System\gwFLWph.exe2⤵
- Executes dropped EXE
PID:4372
-
-
C:\Windows\System\EiEEfqS.exeC:\Windows\System\EiEEfqS.exe2⤵
- Executes dropped EXE
PID:4104
-
-
C:\Windows\System\QSqlZrU.exeC:\Windows\System\QSqlZrU.exe2⤵
- Executes dropped EXE
PID:3720
-
-
C:\Windows\System\CEvDpmW.exeC:\Windows\System\CEvDpmW.exe2⤵
- Executes dropped EXE
PID:4396
-
-
C:\Windows\System\mnxvIUx.exeC:\Windows\System\mnxvIUx.exe2⤵
- Executes dropped EXE
PID:2952
-
-
C:\Windows\System\RJFWjeE.exeC:\Windows\System\RJFWjeE.exe2⤵
- Executes dropped EXE
PID:2364
-
-
C:\Windows\System\fcfbrcU.exeC:\Windows\System\fcfbrcU.exe2⤵
- Executes dropped EXE
PID:4716
-
-
C:\Windows\System\NAVZCey.exeC:\Windows\System\NAVZCey.exe2⤵
- Executes dropped EXE
PID:4472
-
-
C:\Windows\System\zwOBmRK.exeC:\Windows\System\zwOBmRK.exe2⤵
- Executes dropped EXE
PID:316
-
-
C:\Windows\System\NrDDets.exeC:\Windows\System\NrDDets.exe2⤵
- Executes dropped EXE
PID:3108
-
-
C:\Windows\System\hiGpFwP.exeC:\Windows\System\hiGpFwP.exe2⤵
- Executes dropped EXE
PID:2400
-
-
C:\Windows\System\IyFlXAs.exeC:\Windows\System\IyFlXAs.exe2⤵
- Executes dropped EXE
PID:1608
-
-
C:\Windows\System\iGOROZi.exeC:\Windows\System\iGOROZi.exe2⤵
- Executes dropped EXE
PID:5028
-
-
C:\Windows\System\miwQnLN.exeC:\Windows\System\miwQnLN.exe2⤵
- Executes dropped EXE
PID:1740
-
-
C:\Windows\System\GPhqwAu.exeC:\Windows\System\GPhqwAu.exe2⤵
- Executes dropped EXE
PID:4672
-
-
C:\Windows\System\qeCLCfr.exeC:\Windows\System\qeCLCfr.exe2⤵
- Executes dropped EXE
PID:4336
-
-
C:\Windows\System\GFRrIdo.exeC:\Windows\System\GFRrIdo.exe2⤵
- Executes dropped EXE
PID:4424
-
-
C:\Windows\System\jOQQRCN.exeC:\Windows\System\jOQQRCN.exe2⤵
- Executes dropped EXE
PID:2100
-
-
C:\Windows\System\NuBENgP.exeC:\Windows\System\NuBENgP.exe2⤵
- Executes dropped EXE
PID:2392
-
-
C:\Windows\System\HzZTCnh.exeC:\Windows\System\HzZTCnh.exe2⤵
- Executes dropped EXE
PID:2088
-
-
C:\Windows\System\dlvgJlu.exeC:\Windows\System\dlvgJlu.exe2⤵
- Executes dropped EXE
PID:5012
-
-
C:\Windows\System\tuLGQkg.exeC:\Windows\System\tuLGQkg.exe2⤵
- Executes dropped EXE
PID:1016
-
-
C:\Windows\System\wzVHjjQ.exeC:\Windows\System\wzVHjjQ.exe2⤵
- Executes dropped EXE
PID:4912
-
-
C:\Windows\System\HuMWZki.exeC:\Windows\System\HuMWZki.exe2⤵
- Executes dropped EXE
PID:2320
-
-
C:\Windows\System\ZbPZIEV.exeC:\Windows\System\ZbPZIEV.exe2⤵
- Executes dropped EXE
PID:2336
-
-
C:\Windows\System\HsKazfq.exeC:\Windows\System\HsKazfq.exe2⤵
- Executes dropped EXE
PID:1552
-
-
C:\Windows\System\SkPiuGi.exeC:\Windows\System\SkPiuGi.exe2⤵
- Executes dropped EXE
PID:2648
-
-
C:\Windows\System\LYxdbTc.exeC:\Windows\System\LYxdbTc.exe2⤵
- Executes dropped EXE
PID:1976
-
-
C:\Windows\System\ZaNcChG.exeC:\Windows\System\ZaNcChG.exe2⤵
- Executes dropped EXE
PID:3360
-
-
C:\Windows\System\AHAFKjK.exeC:\Windows\System\AHAFKjK.exe2⤵
- Executes dropped EXE
PID:3560
-
-
C:\Windows\System\ULPONTM.exeC:\Windows\System\ULPONTM.exe2⤵
- Executes dropped EXE
PID:4060
-
-
C:\Windows\System\fkIrBbW.exeC:\Windows\System\fkIrBbW.exe2⤵
- Executes dropped EXE
PID:1096
-
-
C:\Windows\System\ljvFwmW.exeC:\Windows\System\ljvFwmW.exe2⤵
- Executes dropped EXE
PID:4568
-
-
C:\Windows\System\XnUdlok.exeC:\Windows\System\XnUdlok.exe2⤵
- Executes dropped EXE
PID:668
-
-
C:\Windows\System\SWDvfye.exeC:\Windows\System\SWDvfye.exe2⤵
- Executes dropped EXE
PID:2904
-
-
C:\Windows\System\iRvMoKG.exeC:\Windows\System\iRvMoKG.exe2⤵
- Executes dropped EXE
PID:3668
-
-
C:\Windows\System\ihCNcaG.exeC:\Windows\System\ihCNcaG.exe2⤵
- Executes dropped EXE
PID:3220
-
-
C:\Windows\System\oJAPfZE.exeC:\Windows\System\oJAPfZE.exe2⤵
- Executes dropped EXE
PID:2396
-
-
C:\Windows\System\VVMAQij.exeC:\Windows\System\VVMAQij.exe2⤵
- Executes dropped EXE
PID:3652
-
-
C:\Windows\System\ZnGXfuY.exeC:\Windows\System\ZnGXfuY.exe2⤵
- Executes dropped EXE
PID:1616
-
-
C:\Windows\System\ZHyTFWd.exeC:\Windows\System\ZHyTFWd.exe2⤵
- Executes dropped EXE
PID:2860
-
-
C:\Windows\System\iAZYDDF.exeC:\Windows\System\iAZYDDF.exe2⤵
- Executes dropped EXE
PID:4544
-
-
C:\Windows\System\GrccnCq.exeC:\Windows\System\GrccnCq.exe2⤵
- Executes dropped EXE
PID:4736
-
-
C:\Windows\System\VOPxRgd.exeC:\Windows\System\VOPxRgd.exe2⤵PID:5016
-
-
C:\Windows\System\mplHInY.exeC:\Windows\System\mplHInY.exe2⤵PID:3908
-
-
C:\Windows\System\UkKuwEb.exeC:\Windows\System\UkKuwEb.exe2⤵PID:764
-
-
C:\Windows\System\kWJWEdd.exeC:\Windows\System\kWJWEdd.exe2⤵PID:3404
-
-
C:\Windows\System\EHyqiAe.exeC:\Windows\System\EHyqiAe.exe2⤵PID:2696
-
-
C:\Windows\System\XkIVlQo.exeC:\Windows\System\XkIVlQo.exe2⤵PID:4356
-
-
C:\Windows\System\YXPSVDt.exeC:\Windows\System\YXPSVDt.exe2⤵PID:396
-
-
C:\Windows\System\ZOXgzwL.exeC:\Windows\System\ZOXgzwL.exe2⤵PID:1244
-
-
C:\Windows\System\ysdYGNJ.exeC:\Windows\System\ysdYGNJ.exe2⤵PID:2900
-
-
C:\Windows\System\HxJiDcJ.exeC:\Windows\System\HxJiDcJ.exe2⤵PID:1864
-
-
C:\Windows\System\IGcGPaA.exeC:\Windows\System\IGcGPaA.exe2⤵PID:4032
-
-
C:\Windows\System\DvLmLVi.exeC:\Windows\System\DvLmLVi.exe2⤵PID:4836
-
-
C:\Windows\System\jXzlQgU.exeC:\Windows\System\jXzlQgU.exe2⤵PID:4788
-
-
C:\Windows\System\dQBibqH.exeC:\Windows\System\dQBibqH.exe2⤵PID:5148
-
-
C:\Windows\System\fGTmOVs.exeC:\Windows\System\fGTmOVs.exe2⤵PID:5176
-
-
C:\Windows\System\MKpGckp.exeC:\Windows\System\MKpGckp.exe2⤵PID:5196
-
-
C:\Windows\System\VpNKayx.exeC:\Windows\System\VpNKayx.exe2⤵PID:5240
-
-
C:\Windows\System\CIYQLoh.exeC:\Windows\System\CIYQLoh.exe2⤵PID:5268
-
-
C:\Windows\System\jFainOn.exeC:\Windows\System\jFainOn.exe2⤵PID:5288
-
-
C:\Windows\System\grukuwM.exeC:\Windows\System\grukuwM.exe2⤵PID:5340
-
-
C:\Windows\System\tayQZSK.exeC:\Windows\System\tayQZSK.exe2⤵PID:5396
-
-
C:\Windows\System\HvqbqPJ.exeC:\Windows\System\HvqbqPJ.exe2⤵PID:5412
-
-
C:\Windows\System\NIOzumk.exeC:\Windows\System\NIOzumk.exe2⤵PID:5444
-
-
C:\Windows\System\bRBpKns.exeC:\Windows\System\bRBpKns.exe2⤵PID:5488
-
-
C:\Windows\System\irYzzbA.exeC:\Windows\System\irYzzbA.exe2⤵PID:5508
-
-
C:\Windows\System\zVCubOd.exeC:\Windows\System\zVCubOd.exe2⤵PID:5572
-
-
C:\Windows\System\moPpsEA.exeC:\Windows\System\moPpsEA.exe2⤵PID:5604
-
-
C:\Windows\System\cmHBgYA.exeC:\Windows\System\cmHBgYA.exe2⤵PID:5620
-
-
C:\Windows\System\hyZDPXK.exeC:\Windows\System\hyZDPXK.exe2⤵PID:5640
-
-
C:\Windows\System\SvKgJqG.exeC:\Windows\System\SvKgJqG.exe2⤵PID:5664
-
-
C:\Windows\System\HfUpWoH.exeC:\Windows\System\HfUpWoH.exe2⤵PID:5692
-
-
C:\Windows\System\EpWOkDm.exeC:\Windows\System\EpWOkDm.exe2⤵PID:5732
-
-
C:\Windows\System\ewCDVfr.exeC:\Windows\System\ewCDVfr.exe2⤵PID:5752
-
-
C:\Windows\System\wCRGVEV.exeC:\Windows\System\wCRGVEV.exe2⤵PID:5780
-
-
C:\Windows\System\oZkIMwo.exeC:\Windows\System\oZkIMwo.exe2⤵PID:5804
-
-
C:\Windows\System\lQKxqtx.exeC:\Windows\System\lQKxqtx.exe2⤵PID:5820
-
-
C:\Windows\System\DlkjmPr.exeC:\Windows\System\DlkjmPr.exe2⤵PID:5836
-
-
C:\Windows\System\cAKJQRz.exeC:\Windows\System\cAKJQRz.exe2⤵PID:5884
-
-
C:\Windows\System\oqubmpD.exeC:\Windows\System\oqubmpD.exe2⤵PID:5904
-
-
C:\Windows\System\FrLGcSh.exeC:\Windows\System\FrLGcSh.exe2⤵PID:5960
-
-
C:\Windows\System\qIkmyGn.exeC:\Windows\System\qIkmyGn.exe2⤵PID:5980
-
-
C:\Windows\System\EuMGhXk.exeC:\Windows\System\EuMGhXk.exe2⤵PID:6032
-
-
C:\Windows\System\ILkFxVi.exeC:\Windows\System\ILkFxVi.exe2⤵PID:6076
-
-
C:\Windows\System\QICgJFo.exeC:\Windows\System\QICgJFo.exe2⤵PID:6096
-
-
C:\Windows\System\oqbTgvQ.exeC:\Windows\System\oqbTgvQ.exe2⤵PID:6120
-
-
C:\Windows\System\ksEvJvN.exeC:\Windows\System\ksEvJvN.exe2⤵PID:5164
-
-
C:\Windows\System\cRAPsgA.exeC:\Windows\System\cRAPsgA.exe2⤵PID:5052
-
-
C:\Windows\System\loFCkyA.exeC:\Windows\System\loFCkyA.exe2⤵PID:3644
-
-
C:\Windows\System\oyZsUOw.exeC:\Windows\System\oyZsUOw.exe2⤵PID:692
-
-
C:\Windows\System\aOJPLUN.exeC:\Windows\System\aOJPLUN.exe2⤵PID:5252
-
-
C:\Windows\System\bYWIWGL.exeC:\Windows\System\bYWIWGL.exe2⤵PID:5308
-
-
C:\Windows\System\ZpgnPNG.exeC:\Windows\System\ZpgnPNG.exe2⤵PID:5356
-
-
C:\Windows\System\yGyDSud.exeC:\Windows\System\yGyDSud.exe2⤵PID:5388
-
-
C:\Windows\System\bmrLntu.exeC:\Windows\System\bmrLntu.exe2⤵PID:5372
-
-
C:\Windows\System\AsKBejA.exeC:\Windows\System\AsKBejA.exe2⤵PID:944
-
-
C:\Windows\System\yirDdkw.exeC:\Windows\System\yirDdkw.exe2⤵PID:5452
-
-
C:\Windows\System\DyRMvea.exeC:\Windows\System\DyRMvea.exe2⤵PID:5496
-
-
C:\Windows\System\wqhmGFd.exeC:\Windows\System\wqhmGFd.exe2⤵PID:224
-
-
C:\Windows\System\rjbrmXH.exeC:\Windows\System\rjbrmXH.exe2⤵PID:5552
-
-
C:\Windows\System\XGNrKOK.exeC:\Windows\System\XGNrKOK.exe2⤵PID:5580
-
-
C:\Windows\System\JDGxkyt.exeC:\Windows\System\JDGxkyt.exe2⤵PID:968
-
-
C:\Windows\System\VMfLxDD.exeC:\Windows\System\VMfLxDD.exe2⤵PID:5856
-
-
C:\Windows\System\DYVKugV.exeC:\Windows\System\DYVKugV.exe2⤵PID:5744
-
-
C:\Windows\System\fmLjhCj.exeC:\Windows\System\fmLjhCj.exe2⤵PID:5852
-
-
C:\Windows\System\tVUVnxl.exeC:\Windows\System\tVUVnxl.exe2⤵PID:5816
-
-
C:\Windows\System\wjEJgoM.exeC:\Windows\System\wjEJgoM.exe2⤵PID:4496
-
-
C:\Windows\System\eUWGlbQ.exeC:\Windows\System\eUWGlbQ.exe2⤵PID:5880
-
-
C:\Windows\System\lrVMOjI.exeC:\Windows\System\lrVMOjI.exe2⤵PID:5916
-
-
C:\Windows\System\qBSISIt.exeC:\Windows\System\qBSISIt.exe2⤵PID:5956
-
-
C:\Windows\System\EngOZdX.exeC:\Windows\System\EngOZdX.exe2⤵PID:4628
-
-
C:\Windows\System\lOqSUUR.exeC:\Windows\System\lOqSUUR.exe2⤵PID:3692
-
-
C:\Windows\System\tApSoYK.exeC:\Windows\System\tApSoYK.exe2⤵PID:2960
-
-
C:\Windows\System\iPRgYgx.exeC:\Windows\System\iPRgYgx.exe2⤵PID:5160
-
-
C:\Windows\System\cucbtuv.exeC:\Windows\System\cucbtuv.exe2⤵PID:1668
-
-
C:\Windows\System\hHbSmjB.exeC:\Windows\System\hHbSmjB.exe2⤵PID:5348
-
-
C:\Windows\System\oWiRPDl.exeC:\Windows\System\oWiRPDl.exe2⤵PID:5460
-
-
C:\Windows\System\vJWedaL.exeC:\Windows\System\vJWedaL.exe2⤵PID:3900
-
-
C:\Windows\System\onLJtBh.exeC:\Windows\System\onLJtBh.exe2⤵PID:5500
-
-
C:\Windows\System\ugcSifG.exeC:\Windows\System\ugcSifG.exe2⤵PID:5792
-
-
C:\Windows\System\kyhDspP.exeC:\Windows\System\kyhDspP.exe2⤵PID:5424
-
-
C:\Windows\System\tzIriGW.exeC:\Windows\System\tzIriGW.exe2⤵PID:4792
-
-
C:\Windows\System\CNDnZNF.exeC:\Windows\System\CNDnZNF.exe2⤵PID:5600
-
-
C:\Windows\System\irpAAfs.exeC:\Windows\System\irpAAfs.exe2⤵PID:1820
-
-
C:\Windows\System\IGSkAri.exeC:\Windows\System\IGSkAri.exe2⤵PID:3936
-
-
C:\Windows\System\ybqKEOn.exeC:\Windows\System\ybqKEOn.exe2⤵PID:6188
-
-
C:\Windows\System\sdUBoEx.exeC:\Windows\System\sdUBoEx.exe2⤵PID:6204
-
-
C:\Windows\System\MPVcRwi.exeC:\Windows\System\MPVcRwi.exe2⤵PID:6232
-
-
C:\Windows\System\WKIEoXK.exeC:\Windows\System\WKIEoXK.exe2⤵PID:6248
-
-
C:\Windows\System\zmPkgeS.exeC:\Windows\System\zmPkgeS.exe2⤵PID:6268
-
-
C:\Windows\System\fWXYYhP.exeC:\Windows\System\fWXYYhP.exe2⤵PID:6292
-
-
C:\Windows\System\KtkjBit.exeC:\Windows\System\KtkjBit.exe2⤵PID:6348
-
-
C:\Windows\System\iuRBInQ.exeC:\Windows\System\iuRBInQ.exe2⤵PID:6372
-
-
C:\Windows\System\IktiYtB.exeC:\Windows\System\IktiYtB.exe2⤵PID:6448
-
-
C:\Windows\System\zusVTRi.exeC:\Windows\System\zusVTRi.exe2⤵PID:6512
-
-
C:\Windows\System\yDXuVqu.exeC:\Windows\System\yDXuVqu.exe2⤵PID:6632
-
-
C:\Windows\System\yYGXRrS.exeC:\Windows\System\yYGXRrS.exe2⤵PID:6648
-
-
C:\Windows\System\gXePbhD.exeC:\Windows\System\gXePbhD.exe2⤵PID:6672
-
-
C:\Windows\System\BRrTKom.exeC:\Windows\System\BRrTKom.exe2⤵PID:6692
-
-
C:\Windows\System\qObQqRu.exeC:\Windows\System\qObQqRu.exe2⤵PID:6716
-
-
C:\Windows\System\tdlivUb.exeC:\Windows\System\tdlivUb.exe2⤵PID:6736
-
-
C:\Windows\System\fzuvEkp.exeC:\Windows\System\fzuvEkp.exe2⤵PID:6756
-
-
C:\Windows\System\PlVBkIO.exeC:\Windows\System\PlVBkIO.exe2⤵PID:6772
-
-
C:\Windows\System\RDTDzRp.exeC:\Windows\System\RDTDzRp.exe2⤵PID:6792
-
-
C:\Windows\System\tmlQVoE.exeC:\Windows\System\tmlQVoE.exe2⤵PID:6808
-
-
C:\Windows\System\iFcfgNx.exeC:\Windows\System\iFcfgNx.exe2⤵PID:6832
-
-
C:\Windows\System\yVxMuxh.exeC:\Windows\System\yVxMuxh.exe2⤵PID:6848
-
-
C:\Windows\System\znhjyCG.exeC:\Windows\System\znhjyCG.exe2⤵PID:6864
-
-
C:\Windows\System\xCuEims.exeC:\Windows\System\xCuEims.exe2⤵PID:6884
-
-
C:\Windows\System\sRqxBQs.exeC:\Windows\System\sRqxBQs.exe2⤵PID:6904
-
-
C:\Windows\System\IekbciK.exeC:\Windows\System\IekbciK.exe2⤵PID:6956
-
-
C:\Windows\System\BqsOIHK.exeC:\Windows\System\BqsOIHK.exe2⤵PID:6980
-
-
C:\Windows\System\znfZfvF.exeC:\Windows\System\znfZfvF.exe2⤵PID:7060
-
-
C:\Windows\System\rsPopnF.exeC:\Windows\System\rsPopnF.exe2⤵PID:7080
-
-
C:\Windows\System\dtkgNDx.exeC:\Windows\System\dtkgNDx.exe2⤵PID:7104
-
-
C:\Windows\System\VHFSjFu.exeC:\Windows\System\VHFSjFu.exe2⤵PID:6084
-
-
C:\Windows\System\ErUnFSM.exeC:\Windows\System\ErUnFSM.exe2⤵PID:5296
-
-
C:\Windows\System\MbUKMmp.exeC:\Windows\System\MbUKMmp.exe2⤵PID:3228
-
-
C:\Windows\System\vlZouwy.exeC:\Windows\System\vlZouwy.exe2⤵PID:6176
-
-
C:\Windows\System\PumiLwp.exeC:\Windows\System\PumiLwp.exe2⤵PID:6216
-
-
C:\Windows\System\stuybSn.exeC:\Windows\System\stuybSn.exe2⤵PID:6364
-
-
C:\Windows\System\NDleyxy.exeC:\Windows\System\NDleyxy.exe2⤵PID:6200
-
-
C:\Windows\System\CvUiFsq.exeC:\Windows\System\CvUiFsq.exe2⤵PID:6256
-
-
C:\Windows\System\BTqMStQ.exeC:\Windows\System\BTqMStQ.exe2⤵PID:6340
-
-
C:\Windows\System\loLPgvE.exeC:\Windows\System\loLPgvE.exe2⤵PID:6556
-
-
C:\Windows\System\DqOAyOR.exeC:\Windows\System\DqOAyOR.exe2⤵PID:6580
-
-
C:\Windows\System\HKdNRah.exeC:\Windows\System\HKdNRah.exe2⤵PID:6480
-
-
C:\Windows\System\ZhHJNXw.exeC:\Windows\System\ZhHJNXw.exe2⤵PID:6712
-
-
C:\Windows\System\PwVyUaf.exeC:\Windows\System\PwVyUaf.exe2⤵PID:4368
-
-
C:\Windows\System\OwuAwTx.exeC:\Windows\System\OwuAwTx.exe2⤵PID:6824
-
-
C:\Windows\System\QLvVRar.exeC:\Windows\System\QLvVRar.exe2⤵PID:6860
-
-
C:\Windows\System\szdeLCC.exeC:\Windows\System\szdeLCC.exe2⤵PID:7028
-
-
C:\Windows\System\QBzAWvP.exeC:\Windows\System\QBzAWvP.exe2⤵PID:7040
-
-
C:\Windows\System\UrWROhK.exeC:\Windows\System\UrWROhK.exe2⤵PID:5248
-
-
C:\Windows\System\pAzpwFG.exeC:\Windows\System\pAzpwFG.exe2⤵PID:5520
-
-
C:\Windows\System\MSAKCgF.exeC:\Windows\System\MSAKCgF.exe2⤵PID:5900
-
-
C:\Windows\System\oMQYBBf.exeC:\Windows\System\oMQYBBf.exe2⤵PID:6244
-
-
C:\Windows\System\zTqqQZN.exeC:\Windows\System\zTqqQZN.exe2⤵PID:6316
-
-
C:\Windows\System\TEPDhdv.exeC:\Windows\System\TEPDhdv.exe2⤵PID:6500
-
-
C:\Windows\System\VKvSmUl.exeC:\Windows\System\VKvSmUl.exe2⤵PID:6656
-
-
C:\Windows\System\xmmpqvP.exeC:\Windows\System\xmmpqvP.exe2⤵PID:6820
-
-
C:\Windows\System\mdVDqAk.exeC:\Windows\System\mdVDqAk.exe2⤵PID:6844
-
-
C:\Windows\System\VDDWiyP.exeC:\Windows\System\VDDWiyP.exe2⤵PID:6856
-
-
C:\Windows\System\iBfMBAR.exeC:\Windows\System\iBfMBAR.exe2⤵PID:6972
-
-
C:\Windows\System\wQZTayH.exeC:\Windows\System\wQZTayH.exe2⤵PID:7120
-
-
C:\Windows\System\PhJSmhP.exeC:\Windows\System\PhJSmhP.exe2⤵PID:6344
-
-
C:\Windows\System\hBHoTfe.exeC:\Windows\System\hBHoTfe.exe2⤵PID:6624
-
-
C:\Windows\System\IkPHJhs.exeC:\Windows\System\IkPHJhs.exe2⤵PID:6504
-
-
C:\Windows\System\RhRiFtY.exeC:\Windows\System\RhRiFtY.exe2⤵PID:7180
-
-
C:\Windows\System\BzvbRCX.exeC:\Windows\System\BzvbRCX.exe2⤵PID:7200
-
-
C:\Windows\System\mBlQSUV.exeC:\Windows\System\mBlQSUV.exe2⤵PID:7224
-
-
C:\Windows\System\XTOqPMc.exeC:\Windows\System\XTOqPMc.exe2⤵PID:7244
-
-
C:\Windows\System\cysjaAD.exeC:\Windows\System\cysjaAD.exe2⤵PID:7264
-
-
C:\Windows\System\RCMbgRE.exeC:\Windows\System\RCMbgRE.exe2⤵PID:7316
-
-
C:\Windows\System\qxpqaJf.exeC:\Windows\System\qxpqaJf.exe2⤵PID:7340
-
-
C:\Windows\System\WteNoht.exeC:\Windows\System\WteNoht.exe2⤵PID:7356
-
-
C:\Windows\System\JptyKsR.exeC:\Windows\System\JptyKsR.exe2⤵PID:7408
-
-
C:\Windows\System\KkRMjwh.exeC:\Windows\System\KkRMjwh.exe2⤵PID:7436
-
-
C:\Windows\System\ZGTHocf.exeC:\Windows\System\ZGTHocf.exe2⤵PID:7456
-
-
C:\Windows\System\fwhszqq.exeC:\Windows\System\fwhszqq.exe2⤵PID:7472
-
-
C:\Windows\System\gRqkyHl.exeC:\Windows\System\gRqkyHl.exe2⤵PID:7496
-
-
C:\Windows\System\EDwELRH.exeC:\Windows\System\EDwELRH.exe2⤵PID:7572
-
-
C:\Windows\System\FHSkYsJ.exeC:\Windows\System\FHSkYsJ.exe2⤵PID:7592
-
-
C:\Windows\System\DWHbByl.exeC:\Windows\System\DWHbByl.exe2⤵PID:7608
-
-
C:\Windows\System\CnSZXBe.exeC:\Windows\System\CnSZXBe.exe2⤵PID:7684
-
-
C:\Windows\System\yEVSXdl.exeC:\Windows\System\yEVSXdl.exe2⤵PID:7700
-
-
C:\Windows\System\vZyLmli.exeC:\Windows\System\vZyLmli.exe2⤵PID:7716
-
-
C:\Windows\System\QZOMHhw.exeC:\Windows\System\QZOMHhw.exe2⤵PID:7732
-
-
C:\Windows\System\kXIKQTO.exeC:\Windows\System\kXIKQTO.exe2⤵PID:7760
-
-
C:\Windows\System\sTXRaBv.exeC:\Windows\System\sTXRaBv.exe2⤵PID:7800
-
-
C:\Windows\System\vHKaZIk.exeC:\Windows\System\vHKaZIk.exe2⤵PID:7816
-
-
C:\Windows\System\QWrFdIN.exeC:\Windows\System\QWrFdIN.exe2⤵PID:7832
-
-
C:\Windows\System\MEzlDmh.exeC:\Windows\System\MEzlDmh.exe2⤵PID:7904
-
-
C:\Windows\System\jrJNvAb.exeC:\Windows\System\jrJNvAb.exe2⤵PID:7948
-
-
C:\Windows\System\hgBNXrG.exeC:\Windows\System\hgBNXrG.exe2⤵PID:8004
-
-
C:\Windows\System\IxOTuJZ.exeC:\Windows\System\IxOTuJZ.exe2⤵PID:8020
-
-
C:\Windows\System\khhPnVE.exeC:\Windows\System\khhPnVE.exe2⤵PID:8040
-
-
C:\Windows\System\bTjZorO.exeC:\Windows\System\bTjZorO.exe2⤵PID:8056
-
-
C:\Windows\System\wOAuwLY.exeC:\Windows\System\wOAuwLY.exe2⤵PID:8092
-
-
C:\Windows\System\bRoNKhj.exeC:\Windows\System\bRoNKhj.exe2⤵PID:8120
-
-
C:\Windows\System\LjBAuFS.exeC:\Windows\System\LjBAuFS.exe2⤵PID:8136
-
-
C:\Windows\System\xWLlDPE.exeC:\Windows\System\xWLlDPE.exe2⤵PID:8160
-
-
C:\Windows\System\rpVWDNu.exeC:\Windows\System\rpVWDNu.exe2⤵PID:2096
-
-
C:\Windows\System\IYFVWgJ.exeC:\Windows\System\IYFVWgJ.exe2⤵PID:6688
-
-
C:\Windows\System\tyOsSeZ.exeC:\Windows\System\tyOsSeZ.exe2⤵PID:7196
-
-
C:\Windows\System\INkKjaS.exeC:\Windows\System\INkKjaS.exe2⤵PID:7240
-
-
C:\Windows\System\rRwVWUB.exeC:\Windows\System\rRwVWUB.exe2⤵PID:7372
-
-
C:\Windows\System\iiWzzZr.exeC:\Windows\System\iiWzzZr.exe2⤵PID:3004
-
-
C:\Windows\System\FmRSoUn.exeC:\Windows\System\FmRSoUn.exe2⤵PID:7400
-
-
C:\Windows\System\tPKNtXr.exeC:\Windows\System\tPKNtXr.exe2⤵PID:7464
-
-
C:\Windows\System\psGTzwg.exeC:\Windows\System\psGTzwg.exe2⤵PID:7600
-
-
C:\Windows\System\weMSGsc.exeC:\Windows\System\weMSGsc.exe2⤵PID:7488
-
-
C:\Windows\System\uwrsIqE.exeC:\Windows\System\uwrsIqE.exe2⤵PID:7520
-
-
C:\Windows\System\dUXkxNJ.exeC:\Windows\System\dUXkxNJ.exe2⤵PID:7648
-
-
C:\Windows\System\EayyLFv.exeC:\Windows\System\EayyLFv.exe2⤵PID:3752
-
-
C:\Windows\System\cglZfmL.exeC:\Windows\System\cglZfmL.exe2⤵PID:3648
-
-
C:\Windows\System\TYPptiK.exeC:\Windows\System\TYPptiK.exe2⤵PID:7728
-
-
C:\Windows\System\dLfOoHO.exeC:\Windows\System\dLfOoHO.exe2⤵PID:7944
-
-
C:\Windows\System\AhDlmEV.exeC:\Windows\System\AhDlmEV.exe2⤵PID:4952
-
-
C:\Windows\System\becVoLi.exeC:\Windows\System\becVoLi.exe2⤵PID:7932
-
-
C:\Windows\System\afeyoDS.exeC:\Windows\System\afeyoDS.exe2⤵PID:7968
-
-
C:\Windows\System\lzCtrxK.exeC:\Windows\System\lzCtrxK.exe2⤵PID:8012
-
-
C:\Windows\System\eeCuCcE.exeC:\Windows\System\eeCuCcE.exe2⤵PID:8068
-
-
C:\Windows\System\kTWCAHS.exeC:\Windows\System\kTWCAHS.exe2⤵PID:7404
-
-
C:\Windows\System\FmZrNWe.exeC:\Windows\System\FmZrNWe.exe2⤵PID:4184
-
-
C:\Windows\System\ZoQokXs.exeC:\Windows\System\ZoQokXs.exe2⤵PID:8016
-
-
C:\Windows\System\efNADnm.exeC:\Windows\System\efNADnm.exe2⤵PID:8048
-
-
C:\Windows\System\gcELgjH.exeC:\Windows\System\gcELgjH.exe2⤵PID:1368
-
-
C:\Windows\System\jxyokYZ.exeC:\Windows\System\jxyokYZ.exe2⤵PID:8116
-
-
C:\Windows\System\FIIWmmE.exeC:\Windows\System\FIIWmmE.exe2⤵PID:3268
-
-
C:\Windows\System\DUYRPRi.exeC:\Windows\System\DUYRPRi.exe2⤵PID:7092
-
-
C:\Windows\System\dLCIYnb.exeC:\Windows\System\dLCIYnb.exe2⤵PID:7696
-
-
C:\Windows\System\DtRKaut.exeC:\Windows\System\DtRKaut.exe2⤵PID:7644
-
-
C:\Windows\System\sincDzR.exeC:\Windows\System\sincDzR.exe2⤵PID:7604
-
-
C:\Windows\System\ppsJLLF.exeC:\Windows\System\ppsJLLF.exe2⤵PID:7872
-
-
C:\Windows\System\ALOWoQb.exeC:\Windows\System\ALOWoQb.exe2⤵PID:7668
-
-
C:\Windows\System\BdvGKul.exeC:\Windows\System\BdvGKul.exe2⤵PID:8200
-
-
C:\Windows\System\seMPfFH.exeC:\Windows\System\seMPfFH.exe2⤵PID:8224
-
-
C:\Windows\System\NXGsNeN.exeC:\Windows\System\NXGsNeN.exe2⤵PID:8300
-
-
C:\Windows\System\JHfXXwA.exeC:\Windows\System\JHfXXwA.exe2⤵PID:8316
-
-
C:\Windows\System\RqjWsrq.exeC:\Windows\System\RqjWsrq.exe2⤵PID:8376
-
-
C:\Windows\System\oLShmvI.exeC:\Windows\System\oLShmvI.exe2⤵PID:8416
-
-
C:\Windows\System\cfRLYZv.exeC:\Windows\System\cfRLYZv.exe2⤵PID:8440
-
-
C:\Windows\System\oasUcxS.exeC:\Windows\System\oasUcxS.exe2⤵PID:8456
-
-
C:\Windows\System\wZfsFAZ.exeC:\Windows\System\wZfsFAZ.exe2⤵PID:8472
-
-
C:\Windows\System\dfUzjwn.exeC:\Windows\System\dfUzjwn.exe2⤵PID:8496
-
-
C:\Windows\System\UXCofIf.exeC:\Windows\System\UXCofIf.exe2⤵PID:8516
-
-
C:\Windows\System\XBbihpX.exeC:\Windows\System\XBbihpX.exe2⤵PID:8532
-
-
C:\Windows\System\sSBRaNF.exeC:\Windows\System\sSBRaNF.exe2⤵PID:8552
-
-
C:\Windows\System\gLjBwDA.exeC:\Windows\System\gLjBwDA.exe2⤵PID:8572
-
-
C:\Windows\System\FzdGsph.exeC:\Windows\System\FzdGsph.exe2⤵PID:8588
-
-
C:\Windows\System\IALMdbC.exeC:\Windows\System\IALMdbC.exe2⤵PID:8688
-
-
C:\Windows\System\RoHDfPL.exeC:\Windows\System\RoHDfPL.exe2⤵PID:8744
-
-
C:\Windows\System\KqAVfVF.exeC:\Windows\System\KqAVfVF.exe2⤵PID:8764
-
-
C:\Windows\System\gwnEgcl.exeC:\Windows\System\gwnEgcl.exe2⤵PID:8792
-
-
C:\Windows\System\QGgiNXO.exeC:\Windows\System\QGgiNXO.exe2⤵PID:8808
-
-
C:\Windows\System\DWPrbcG.exeC:\Windows\System\DWPrbcG.exe2⤵PID:8828
-
-
C:\Windows\System\JcsGeeD.exeC:\Windows\System\JcsGeeD.exe2⤵PID:8848
-
-
C:\Windows\System\sycUJCT.exeC:\Windows\System\sycUJCT.exe2⤵PID:8872
-
-
C:\Windows\System\MTalEyY.exeC:\Windows\System\MTalEyY.exe2⤵PID:8916
-
-
C:\Windows\System\kpodkXx.exeC:\Windows\System\kpodkXx.exe2⤵PID:8960
-
-
C:\Windows\System\IKRdfNf.exeC:\Windows\System\IKRdfNf.exe2⤵PID:8976
-
-
C:\Windows\System\SaNXccJ.exeC:\Windows\System\SaNXccJ.exe2⤵PID:9064
-
-
C:\Windows\System\UhjOtFi.exeC:\Windows\System\UhjOtFi.exe2⤵PID:9080
-
-
C:\Windows\System\zTpGmXr.exeC:\Windows\System\zTpGmXr.exe2⤵PID:9116
-
-
C:\Windows\System\lIlwIoZ.exeC:\Windows\System\lIlwIoZ.exe2⤵PID:9140
-
-
C:\Windows\System\pCbdUhq.exeC:\Windows\System\pCbdUhq.exe2⤵PID:9160
-
-
C:\Windows\System\NeWmxLm.exeC:\Windows\System\NeWmxLm.exe2⤵PID:9176
-
-
C:\Windows\System\iiNfbqQ.exeC:\Windows\System\iiNfbqQ.exe2⤵PID:9204
-
-
C:\Windows\System\zQQjAOW.exeC:\Windows\System\zQQjAOW.exe2⤵PID:7492
-
-
C:\Windows\System\bPfZrRD.exeC:\Windows\System\bPfZrRD.exe2⤵PID:2492
-
-
C:\Windows\System\GDKXFow.exeC:\Windows\System\GDKXFow.exe2⤵PID:7900
-
-
C:\Windows\System\udwOfCR.exeC:\Windows\System\udwOfCR.exe2⤵PID:5156
-
-
C:\Windows\System\SLjDaQL.exeC:\Windows\System\SLjDaQL.exe2⤵PID:8236
-
-
C:\Windows\System\tjVkloi.exeC:\Windows\System\tjVkloi.exe2⤵PID:1948
-
-
C:\Windows\System\QArtHZf.exeC:\Windows\System\QArtHZf.exe2⤵PID:8296
-
-
C:\Windows\System\kbKfSos.exeC:\Windows\System\kbKfSos.exe2⤵PID:8384
-
-
C:\Windows\System\IwCGARV.exeC:\Windows\System\IwCGARV.exe2⤵PID:8464
-
-
C:\Windows\System\qXhyHUR.exeC:\Windows\System\qXhyHUR.exe2⤵PID:8696
-
-
C:\Windows\System\zpNjbrF.exeC:\Windows\System\zpNjbrF.exe2⤵PID:8684
-
-
C:\Windows\System\UfhcYEI.exeC:\Windows\System\UfhcYEI.exe2⤵PID:4308
-
-
C:\Windows\System\BxbqnFX.exeC:\Windows\System\BxbqnFX.exe2⤵PID:8908
-
-
C:\Windows\System\kHqbUBh.exeC:\Windows\System\kHqbUBh.exe2⤵PID:8888
-
-
C:\Windows\System\oLzxEUq.exeC:\Windows\System\oLzxEUq.exe2⤵PID:9004
-
-
C:\Windows\System\YxNHgxj.exeC:\Windows\System\YxNHgxj.exe2⤵PID:9024
-
-
C:\Windows\System\wwwBSUe.exeC:\Windows\System\wwwBSUe.exe2⤵PID:880
-
-
C:\Windows\System\ImWusMs.exeC:\Windows\System\ImWusMs.exe2⤵PID:9088
-
-
C:\Windows\System\qfqxCaO.exeC:\Windows\System\qfqxCaO.exe2⤵PID:9128
-
-
C:\Windows\System\RXxqCUU.exeC:\Windows\System\RXxqCUU.exe2⤵PID:7216
-
-
C:\Windows\System\qiwIEvp.exeC:\Windows\System\qiwIEvp.exe2⤵PID:9196
-
-
C:\Windows\System\xkuEqSw.exeC:\Windows\System\xkuEqSw.exe2⤵PID:8468
-
-
C:\Windows\System\CLfcxtG.exeC:\Windows\System\CLfcxtG.exe2⤵PID:8564
-
-
C:\Windows\System\ppiMIKR.exeC:\Windows\System\ppiMIKR.exe2⤵PID:8760
-
-
C:\Windows\System\RUKgoVV.exeC:\Windows\System\RUKgoVV.exe2⤵PID:8884
-
-
C:\Windows\System\hFsGAtk.exeC:\Windows\System\hFsGAtk.exe2⤵PID:9072
-
-
C:\Windows\System\GZhmUpD.exeC:\Windows\System\GZhmUpD.exe2⤵PID:9112
-
-
C:\Windows\System\WJAXRlo.exeC:\Windows\System\WJAXRlo.exe2⤵PID:9148
-
-
C:\Windows\System\mjwxKpR.exeC:\Windows\System\mjwxKpR.exe2⤵PID:4776
-
-
C:\Windows\System\SKNLsoG.exeC:\Windows\System\SKNLsoG.exe2⤵PID:8452
-
-
C:\Windows\System\qsorgih.exeC:\Windows\System\qsorgih.exe2⤵PID:8636
-
-
C:\Windows\System\xuTcPMK.exeC:\Windows\System\xuTcPMK.exe2⤵PID:6388
-
-
C:\Windows\System\VThNaxp.exeC:\Windows\System\VThNaxp.exe2⤵PID:8708
-
-
C:\Windows\System\eMjlBby.exeC:\Windows\System\eMjlBby.exe2⤵PID:9108
-
-
C:\Windows\System\fMpEcks.exeC:\Windows\System\fMpEcks.exe2⤵PID:8128
-
-
C:\Windows\System\DzPWBFW.exeC:\Windows\System\DzPWBFW.exe2⤵PID:9224
-
-
C:\Windows\System\UkaSXTR.exeC:\Windows\System\UkaSXTR.exe2⤵PID:9280
-
-
C:\Windows\System\kUpUbYs.exeC:\Windows\System\kUpUbYs.exe2⤵PID:9300
-
-
C:\Windows\System\XAGBgvZ.exeC:\Windows\System\XAGBgvZ.exe2⤵PID:9316
-
-
C:\Windows\System\wbnwVqM.exeC:\Windows\System\wbnwVqM.exe2⤵PID:9404
-
-
C:\Windows\System\jcSQmdD.exeC:\Windows\System\jcSQmdD.exe2⤵PID:9420
-
-
C:\Windows\System\iyZwbmG.exeC:\Windows\System\iyZwbmG.exe2⤵PID:9468
-
-
C:\Windows\System\WXPIOAG.exeC:\Windows\System\WXPIOAG.exe2⤵PID:9488
-
-
C:\Windows\System\nyuasQc.exeC:\Windows\System\nyuasQc.exe2⤵PID:9516
-
-
C:\Windows\System\StuHlWI.exeC:\Windows\System\StuHlWI.exe2⤵PID:9556
-
-
C:\Windows\System\jtjnFUQ.exeC:\Windows\System\jtjnFUQ.exe2⤵PID:9584
-
-
C:\Windows\System\lfCIzvd.exeC:\Windows\System\lfCIzvd.exe2⤵PID:9616
-
-
C:\Windows\System\yeNdfoB.exeC:\Windows\System\yeNdfoB.exe2⤵PID:9644
-
-
C:\Windows\System\uVfiTDo.exeC:\Windows\System\uVfiTDo.exe2⤵PID:9664
-
-
C:\Windows\System\jPdRocI.exeC:\Windows\System\jPdRocI.exe2⤵PID:9736
-
-
C:\Windows\System\gqWPqOk.exeC:\Windows\System\gqWPqOk.exe2⤵PID:9780
-
-
C:\Windows\System\kJAYSdS.exeC:\Windows\System\kJAYSdS.exe2⤵PID:9796
-
-
C:\Windows\System\KfoOyMW.exeC:\Windows\System\KfoOyMW.exe2⤵PID:9812
-
-
C:\Windows\System\XGONydf.exeC:\Windows\System\XGONydf.exe2⤵PID:9836
-
-
C:\Windows\System\dfANihH.exeC:\Windows\System\dfANihH.exe2⤵PID:9856
-
-
C:\Windows\System\cQyTeWt.exeC:\Windows\System\cQyTeWt.exe2⤵PID:9872
-
-
C:\Windows\System\euWKJyB.exeC:\Windows\System\euWKJyB.exe2⤵PID:9892
-
-
C:\Windows\System\jEtQROw.exeC:\Windows\System\jEtQROw.exe2⤵PID:9908
-
-
C:\Windows\System\PxSktSM.exeC:\Windows\System\PxSktSM.exe2⤵PID:9928
-
-
C:\Windows\System\RPjadfC.exeC:\Windows\System\RPjadfC.exe2⤵PID:9944
-
-
C:\Windows\System\xlUutSE.exeC:\Windows\System\xlUutSE.exe2⤵PID:9996
-
-
C:\Windows\System\MXzvbPv.exeC:\Windows\System\MXzvbPv.exe2⤵PID:10020
-
-
C:\Windows\System\TJsMLQa.exeC:\Windows\System\TJsMLQa.exe2⤵PID:10040
-
-
C:\Windows\System\tZdZUmK.exeC:\Windows\System\tZdZUmK.exe2⤵PID:10064
-
-
C:\Windows\System\dffmMFf.exeC:\Windows\System\dffmMFf.exe2⤵PID:10144
-
-
C:\Windows\System\mvrcCGa.exeC:\Windows\System\mvrcCGa.exe2⤵PID:10164
-
-
C:\Windows\System\asNiQBX.exeC:\Windows\System\asNiQBX.exe2⤵PID:10180
-
-
C:\Windows\System\EEBvmYw.exeC:\Windows\System\EEBvmYw.exe2⤵PID:10200
-
-
C:\Windows\System\KqzIXWZ.exeC:\Windows\System\KqzIXWZ.exe2⤵PID:8524
-
-
C:\Windows\System\NCWOSvt.exeC:\Windows\System\NCWOSvt.exe2⤵PID:9312
-
-
C:\Windows\System\taDZfQD.exeC:\Windows\System\taDZfQD.exe2⤵PID:9412
-
-
C:\Windows\System\FBAMgiO.exeC:\Windows\System\FBAMgiO.exe2⤵PID:9484
-
-
C:\Windows\System\kJrlvkV.exeC:\Windows\System\kJrlvkV.exe2⤵PID:9612
-
-
C:\Windows\System\Qjotfbu.exeC:\Windows\System\Qjotfbu.exe2⤵PID:9692
-
-
C:\Windows\System\aXlVxMq.exeC:\Windows\System\aXlVxMq.exe2⤵PID:9776
-
-
C:\Windows\System\aLlwCIQ.exeC:\Windows\System\aLlwCIQ.exe2⤵PID:9852
-
-
C:\Windows\System\UTYzKIP.exeC:\Windows\System\UTYzKIP.exe2⤵PID:9804
-
-
C:\Windows\System\RVGjYxY.exeC:\Windows\System\RVGjYxY.exe2⤵PID:9920
-
-
C:\Windows\System\dsnGsgH.exeC:\Windows\System\dsnGsgH.exe2⤵PID:9916
-
-
C:\Windows\System\wRowNor.exeC:\Windows\System\wRowNor.exe2⤵PID:10004
-
-
C:\Windows\System\klYEAZT.exeC:\Windows\System\klYEAZT.exe2⤵PID:10028
-
-
C:\Windows\System\ZchgDAW.exeC:\Windows\System\ZchgDAW.exe2⤵PID:3008
-
-
C:\Windows\System\XaucCxU.exeC:\Windows\System\XaucCxU.exe2⤵PID:10172
-
-
C:\Windows\System\SlkDSAn.exeC:\Windows\System\SlkDSAn.exe2⤵PID:836
-
-
C:\Windows\System\DGHoFHx.exeC:\Windows\System\DGHoFHx.exe2⤵PID:9096
-
-
C:\Windows\System\VOlOtjX.exeC:\Windows\System\VOlOtjX.exe2⤵PID:7448
-
-
C:\Windows\System\mDZvmSV.exeC:\Windows\System\mDZvmSV.exe2⤵PID:9464
-
-
C:\Windows\System\WXLTZtc.exeC:\Windows\System\WXLTZtc.exe2⤵PID:9268
-
-
C:\Windows\System\pIyUtsq.exeC:\Windows\System\pIyUtsq.exe2⤵PID:9608
-
-
C:\Windows\System\tosfxUs.exeC:\Windows\System\tosfxUs.exe2⤵PID:712
-
-
C:\Windows\System\pdkrlRt.exeC:\Windows\System\pdkrlRt.exe2⤵PID:3080
-
-
C:\Windows\System\KyJaIjC.exeC:\Windows\System\KyJaIjC.exe2⤵PID:9660
-
-
C:\Windows\System\GnZBOTb.exeC:\Windows\System\GnZBOTb.exe2⤵PID:9788
-
-
C:\Windows\System\fwovrfC.exeC:\Windows\System\fwovrfC.exe2⤵PID:9956
-
-
C:\Windows\System\lSLqgus.exeC:\Windows\System\lSLqgus.exe2⤵PID:10036
-
-
C:\Windows\System\QyTGeHh.exeC:\Windows\System\QyTGeHh.exe2⤵PID:9152
-
-
C:\Windows\System\ytNdfHA.exeC:\Windows\System\ytNdfHA.exe2⤵PID:9276
-
-
C:\Windows\System\bHRJKME.exeC:\Windows\System\bHRJKME.exe2⤵PID:9480
-
-
C:\Windows\System\MDnxulS.exeC:\Windows\System\MDnxulS.exe2⤵PID:9848
-
-
C:\Windows\System\WVRhaqr.exeC:\Windows\System\WVRhaqr.exe2⤵PID:10260
-
-
C:\Windows\System\wAPzRbo.exeC:\Windows\System\wAPzRbo.exe2⤵PID:10276
-
-
C:\Windows\System\xSMfqfJ.exeC:\Windows\System\xSMfqfJ.exe2⤵PID:10296
-
-
C:\Windows\System\rnGAMbx.exeC:\Windows\System\rnGAMbx.exe2⤵PID:10320
-
-
C:\Windows\System\DAwjKgZ.exeC:\Windows\System\DAwjKgZ.exe2⤵PID:10372
-
-
C:\Windows\System\uZSadNQ.exeC:\Windows\System\uZSadNQ.exe2⤵PID:10388
-
-
C:\Windows\System\wTgbwcU.exeC:\Windows\System\wTgbwcU.exe2⤵PID:10508
-
-
C:\Windows\System\UfLWYjc.exeC:\Windows\System\UfLWYjc.exe2⤵PID:10548
-
-
C:\Windows\System\EiWueuf.exeC:\Windows\System\EiWueuf.exe2⤵PID:10572
-
-
C:\Windows\System\fCZhPBf.exeC:\Windows\System\fCZhPBf.exe2⤵PID:10592
-
-
C:\Windows\System\XvnCRhs.exeC:\Windows\System\XvnCRhs.exe2⤵PID:10616
-
-
C:\Windows\System\MSIDUTc.exeC:\Windows\System\MSIDUTc.exe2⤵PID:10632
-
-
C:\Windows\System\uYsddNt.exeC:\Windows\System\uYsddNt.exe2⤵PID:10656
-
-
C:\Windows\System\fxUZjrC.exeC:\Windows\System\fxUZjrC.exe2⤵PID:10724
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:10352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5139ece035bd203a7c882d7a71231bfad
SHA1227e354b734b91b792d54c141242a529342c46fa
SHA2567d44bef4a10148f0394712f389de9dd3deb60707163491a791dcdc665b48f645
SHA5123abc3d493c5fba22864d386c6eb1dc20139944c175a27a2512305c629c9921ebf7f5e7de46c64309f776a7af68fc80558fc45c336d20bfc077e1539968c3f9fa
-
Filesize
1024KB
MD5b2ad855639c2b8f4bb10c3fa9e5e0e9a
SHA163a4a138146af5e173502df54e615e87862cd1a7
SHA256cd53f3c3dd2c1bd95105a3edb1ec4cb3264e45baa2409fc2350b91725a8bf544
SHA5123529025d3e0f67cb320696d9895c3861afb6e90b20da8d36532718eee7a4a8cbc519616d746669732421d515893f7df7d8c074a583a7d45ba03bc909082ec6ba
-
Filesize
1.8MB
MD59b58b743a1259e2e53dcc0caf5da0c59
SHA124cbb94ed7d12339538176c3f0db11d84b8a51cd
SHA256367cc026a3896c177d2ff6d48184f2a0ca6692daabd104abe1e950c72f6a19cd
SHA512905c9c2f570c6290a9bd106193bc6c3f14612a91daa9de5f65f740aa2a4e2bbf65bde06486fbddf4d4908e7cf70e6ad2b320200ea90f5768055307f0c607b79e
-
Filesize
1.8MB
MD54346679367451d7345cb864b478c9a58
SHA1166599a32cfacb8336aa5902515f64bcc03cf62e
SHA256d611eb3fc818ec253e7e6a498c898efdaffb8db2d80d92293650f5098dfe6b1f
SHA5120a7f5209718f97df5b6fd9aaae8e988cb0677d94d9a98d8515ae5b82f56843f6c13c9c623eeddf544a6d25a502ff6eb3ac4eacdc40cd7ee20a1d751a00070887
-
Filesize
1.4MB
MD5b1d42e752fa166fce9f7b317b4fd8533
SHA106e18686465fd43f32a335d33ead2c9c270d8b3b
SHA256f02ebb5bdc51079997a13fb267937555bf74bc187796833e49c1fb020e49a496
SHA512fbbace52e1b407cfbb80d4d50ca40e190618d4d9fc444053cabae2886bbd3f34491b9f2effbb1fce3aa735e97114616f2b575b55bb4671bb8c6898a34978d99e
-
Filesize
1.8MB
MD5ff18e024ef898d92fcc297c6e581c479
SHA131440cf7934d46c95800c6f17b365a1d81461683
SHA256f6ae2a2ae3680c62cf83eb00b7c2faf6bc2c97992b38cd0b013a4561bf014460
SHA5127bcf3fccfababea0d72699ff92df8541dbff9710c95164f4e843948b0fcd069cc879411bb8f40fb7018ee4da986c5e2c8886bc7dc7f5f210c7e6509d6bede667
-
Filesize
1.8MB
MD5491c92711b4138c107800a49a8bca7f3
SHA1edb25ac805b139319084e0e378c5a8b1a2b010d2
SHA2568086841fe310a8d78bbb44fbd5aea8afe5490452293f045c355dc0c58d36b75e
SHA5124611c2c974b97d98fbb0244de0a6347410b7ea24512e55dbfc6de95ff5d651338174a266a506ad5318ef1b7b46f7e4113ebbd04342b9e3e0d03edcc84d049eb2
-
Filesize
1.6MB
MD5ba641165f6b949ad2a793d37eb6d3722
SHA12cb0c00047eae4c395d1295e869d1be58b311ef7
SHA2569dd940bd94efbc6a5332347e88f4290aad8bba3634ef9a63df947aedd62a9f28
SHA51251f3569e7658567737ebbcb6c09f878372fdbed12a7445ce97bf1cf61e55fe2cda36d2c0212c1741b9015b65f862245628e4ce37aa3f0f79e10d64b857f932a1
-
Filesize
1.8MB
MD5c49cafdc6f0adbee2bf2643121d5b1af
SHA1c9a3fcafc268549ec479cb5b2422d89265f9afb8
SHA256e9ef954a7e87de5be866d06d870e7209e3dfe944aabb54d94b7b37654cd6024d
SHA5120aa1eb8bb5fca8201c1c34d3e0f78c5f5787ea7e51d2262e57f73ba440cd810c219ba5da46b924e9fdb1da15cfed3e58452b93232c826eb40de3eb2be19096b2
-
Filesize
1.8MB
MD567fb913d43d056e42aaf58994e051852
SHA170110bc3dbb6a92bbd160080fa667e7a202ec950
SHA256b356ea4d3b6963070fc1bd2855d648024aeede4639cc40273f90d0eea7ea8a15
SHA512d23a17e10a6388ef7407b20bfd653f28e9c780a1804d6010b09b75081fa92ea07f137261c0358eda6a84d8088bb2fbca46ad2c0536071492c759dc29ffb34ab5
-
Filesize
768KB
MD5096410221e55421e5c4c4275c7d21513
SHA1a9a3350bb5b616aee4d0c922dc225694f8027702
SHA2561162e04ab5acff6cf895e753ad87619013ecfffc06f47ed477cf1c201c040e66
SHA512b442b0d589e49e95f8c072f6f97ae946c91e082ea0e6557eeef4f55282d6675cb325a5ba42eb1799fb9bff049919d0eef469abfd200cb35fe59f78974905588c
-
Filesize
1.1MB
MD51241ba867453897ac081cd65f8362e09
SHA1c06f20c8fe988e04887b1928c0d398e1278d1f63
SHA2564da6a57bd18d845b9eb05ddd095ba49a9a1364f0f89dcc72e16f38ee06b3ecf2
SHA5127035d20636296fc99797ebe12bb98dd381bedda6aae785250256cdbea17ca2a91777be59420c826d8c0a97d52e35f2dbc43b95df90b931416103881e71aafc54
-
Filesize
1.8MB
MD5c22fa631ea30aa00f8850ca53dded43c
SHA1f45db88ba07496b696e74991a2292c079a7997a7
SHA256626dade8faddc9e9c27106d9387ad643b7f5ff3f7627a0dd08491f2c37526afa
SHA512c6ea4dc5dedf66692adb71f929846bfc753defa60b976f989c65ae17fe3aa75cecf2e8fc9aee1c79cd098c93826fa86fe716b8e68be0ab61039ab1442b68d61d
-
Filesize
1.8MB
MD521bf4bda44398f08ad5f26a7440c9594
SHA14d067a39264f13fef5216b1fdced734c9fbb36ab
SHA256e5a929ab1065d001570ff3f2eaa9d0e7cb9436cf9ecf0e233bc72f7fd7324c4d
SHA512aa160a8271b9ea422d085c57973451523b3fefec4f03efae065ae5b3f49819269bc3c56ce551dd148eebed3aad1597c832840540ad8e84716ad71c5d06578aa0
-
Filesize
640KB
MD5469aca0e2abc33bcc5100f89b3196890
SHA1b77c2be76b0bcd5c1640c82143bf4ae8abf6ed35
SHA2568e4d419e754f89fae1d30741df9483d06709f6d20541cbce976b97c6b74f264f
SHA512bb8f27156094a7b200e5c1844466de9827240ad5c62598ca983899918fcfddc76480438ab7ff457f4059655d26f5dee65f9d3ba57dc850a7e0c1c267d7e2bdae
-
Filesize
1.3MB
MD54f91c11e96840f7afb88e012dcdfd12a
SHA1a7b38f1b43b954817ccea978482b1fec1dbe1dc1
SHA25618bcdf3d562bd384933c2e7e47fc3ad94c3012f2dc4ed4e22c9bc72ab0482299
SHA51211f123bc159f1435c534cbff0a228bf2fe1b4231a81c5bd797101651f889f0b41be6c18f90bd56645dbd1f24858d02bd4a477b2e0999d35c8f254aee08f90aaf
-
Filesize
704KB
MD527f1ae58c0e7ea96c463a8f0329d13e3
SHA1a5352f33f2a7ec676e07aa36bd587f2a910b1502
SHA256570ef729e78067f9e824a09ee84a0b44c24671dfe07947eaca970f453f235334
SHA51251c2e61154a9cf7b8c51728bee23d084e40467a64fc74544ed07917de5c42cd2c4f093dc4dba57e475be140334b7f9d2f8c2784d353f9bec4fe5fc6098f5ad70
-
Filesize
1.8MB
MD5126fffe804eb9880b5f59edcd4e9702c
SHA1773cdb56f1a74c729a3695c2fa6434ca4b8f7532
SHA256e83c87da7ddd156aec41c21fbfc0727e7f9e9f57d27be39c91dfa569539be1a8
SHA512f74ae718c19c2b282af3d17c78870163bb7bf4fd936584e7ea410c78f8632bc4d74c43ddd2b484033b46249fa61a980e6bd070a7f0324f36ef5c881683f65ff0
-
Filesize
1.8MB
MD5f91777d17fcc173cb36597de8cdc7f23
SHA14df3f256bb910dc037e8644ed1c69dcb7c31eaf3
SHA256f088f16ecab6780a5c7ac9c9653b2e16e944462f0fa939e50fe6f6c3bd02778a
SHA512133d9cd7c4fa3746552f17f1baf1ca0fa243f00ccdd0fad91a3745e0c46bce46275285e4fc9ea5d45999ca9f2a65cc72eb13f5142e7d554ebb4477f8ca85000b
-
Filesize
1.4MB
MD573c54f37ee1fd94779d03fbe76e04feb
SHA1f16e3daa32b20c0e3693b2c94434d47c466fb56a
SHA2566181e457adf301556ae3192d955ba7b2bdf3d8a3b17d7f2b1bd0c63bc6ee7282
SHA512612f4ae13e73488d73a33d0ebda0c0adb46afdfe622260bc58e778b2696a3d7987b3676b630ed2ea3b1bb5f0c44c29cd4ecce541e8d65360916cff3ce342c111
-
Filesize
1.8MB
MD5706d62c51630947cd2a8cff2926a17d2
SHA13da3725acd1cdfaf06c6a37aaac1da8ed30b8b4b
SHA25602c9c8e8dc26c47e9dd5eba5d7002186af34e8e30bc6839d9309eee38e7cda0e
SHA512ee62ca161fd6d005d2120cd6ca777ec4347617888da03ce99237563d1b1ac26823fcd56f023a51bf6b671137ae683cb47e3e49c5c19066cacb5e3fda6fb77903
-
Filesize
1.7MB
MD5bf8c149b1fdef4e36cf2c55cc31ec010
SHA16bcff7856d15e031716720a4392bf9552eb02685
SHA25603adb6bdb17c289e372abb3cc3ef2a3fa991dab1f8138f7722353654c6bafa4a
SHA512f94b648402ed4d791c0ab4f376095dc5857b75fe0c706520031ddab2afd1d3887b3341a199fc5b204b5ab29af06ff3bf7bd157e2955004107c741c65397b0aa5
-
Filesize
1.8MB
MD585493306739d34e4e638bcc17c92df1b
SHA1ca848d1e774ce96873378318a714e4fa974985bc
SHA2560e1c97914605abb017d01ade38d583a287da938c7a38c7babbb00b9fd29ac7fb
SHA5128a2f32e781cbeee31e2896eccbd487fc12e570e22ab8828070d624a8880e8600bbdebda2833eed2102a4eced073fd0e9a49f8c93ad961d4ae99ab57a475b41c2
-
Filesize
896KB
MD5d8061570a3d685a09a8726d2e2043dcd
SHA15784ed9099dd4b61b63fc8ab2f585fc9e4456099
SHA2562858747fe15b825bca2004f1fb5434e70a8f8952f994cb7850f53fc69e794e72
SHA512491823d9b7c3d0e919d65b711645bd0839fa6e3b7a404dd101f61c497b50d40cc12658380d09032bb5d5d2ac84e5d2791f8235e5d4c6f54ca1090b042d3a4b7a
-
Filesize
960KB
MD5180ec18cff675908ea09fb02b8edeae7
SHA1908a0fde6e66598e819044f800d2fb12a2c2d5e4
SHA25635e0571c2720559fc2e392ef1ac01a4890a7f5a52de790fe0560ba1ddb8b0978
SHA512f4efca4f8c80307ac309f06271cca1b553bd93330b442aaa71749f3ce5f3d47dab778dbee66162c088762bb8f4726a65ed8e5313f9bd8da09d951b910b9f8e49
-
Filesize
1.2MB
MD5e8415a48a8394edebe9859f31669a119
SHA188123503cb3806d920c5045882df8f6e0c3e74f8
SHA256673a3a64e33ae96b71ad45f327ba5052f5e8d5cbd59b937265f227e4717ceec2
SHA512b2dfacf6cc8cf3e310bca2ae7a8803f8dcfb79cc05a7ec4334a574e352e214b4be25aed17bf7154e32fdba8bb62a4a408a3a5aac88c5c402cbfc37c40a3b1a1b
-
Filesize
1.8MB
MD52b25d255f05266dd3b6ea064d6ebbcbb
SHA13d69c2026a514237926ab872ad64e2e4fb4e95b0
SHA25694c4cb92e33306442b599f6a2e7a9cf34a28122375374dd46f8d9f41838beeb5
SHA51234c3dea713f418123e87305f1e6a172667f2ec5355bc53458f465567d76eed46824ae0c618c62e8ff4ab17dbc1658d3490f1ec9c295bfd76dddbf648bc4027eb
-
Filesize
512KB
MD56b5887af4274a78686a788865765637c
SHA15afc15e6fcbc11377bbabbda47ff43f6ebedd369
SHA256ecdfed9bc02368fefbebe0d02090e93826b7e5cc1043e339dd245299c8b23006
SHA5124f563e539f8ec68bbc27d4cc59c42ea4897bb131085e08433f745cc558ab7a030701a601ddb711cda19dfa6cd9086b458fb74762092be15aaa4190c05134d077
-
Filesize
1.8MB
MD5124dd7ea02fb95d8a9e4197993db1672
SHA19f477378cbf48edfb9f8d12842520144ed7bb90d
SHA2566d755ad3b820292d16bf6abec3ff893281035d56c0d9ecc30e2c8f43a663fef7
SHA512f6624830bba8cdcc4fb87d2bed8f4442425b4680e623aaf4c035fc630d27cca8457a0df131cb8c1b805d4d69d7614d0dd511a54941f1394fd427acd5c321f21c
-
Filesize
320KB
MD5d21590ae8170aaccbcd19e7067ab6994
SHA110f350169749c21440531509a3e7295f89c18083
SHA25646a31c66a5e2b5dc524bccbbcd87f163f058b2fedffe048e3850fee93fbd703a
SHA5120a218e8b4f06e2867073755e2a8ca9407d373ed70a6cdd1433032aeda4491ab35054bde1767383405cb6459bec67b81063efb85a1f210d8040c877770e4e047f
-
Filesize
128KB
MD57ce4ba1725e83a50f64ba525f8815dcf
SHA1b1714a2d23cfc42c18c37e1546ac0908d8252c04
SHA2569f7e171000696500dfb6a966f2c3ddf12dc1a77b8276ef660f14f7b7188d2908
SHA5122dff777f276295d96892e5749316e2e8892ba50f8398f9972ecc2f6e5378213e3cdd31c7c6ab8360d3490d1ec9e77be4e73ac137e108b2eddff2feaaf600be19
-
Filesize
1.2MB
MD57ec2d634f6f96feb5806b4fc3784da11
SHA105dc19262d5acb8a00de16f3ac9097c06f274d24
SHA256732ce9c3e8c98b7a230c923281783d8a7bc127ef452e88138ce52363554d6dcd
SHA512f369cefd8871bedeb2e2d8e1d05b2bc35652d344eeaefb092b7288c2025b5774f0f68abcf66b3244b77acac15c7c7a3da4e1e8085229461472aab47a681555f1
-
Filesize
1.8MB
MD53878610201d12b17dd0a4c36b320ca17
SHA106397dc667ae61417765c11ffc4a79ade2b0d642
SHA256760de8b6371d8f407dc9ed42dbb8d03086d42fdc7375d4bd429c5d5e280b8694
SHA5120288b835ba9d268a2c9d8de5d1ca541862855f0fb16871263db5e718b48ef376c029b41ea052ba0ff38bb9ddb2c6a035b799188f66f392163a7315ed78630db4
-
Filesize
1.8MB
MD5ad5d1730989dfd1e39ceaa23f1c1b577
SHA17bdb9c0b30327cfdc03498df52edb062175533d5
SHA256d4a9585d2e3e23fb7040a46fe063c16e3162444fd76d8fe5e9b399f15bff45f6
SHA512b20355da311b60663ec3e8ff9316a3a61e4a27d20ff7e7b8008a3d0b4ea3337325236cbb45dd1f01562c98473aaca60255526e3171433df23b12f96ac9d162c0
-
Filesize
1.1MB
MD5bfd680643e8c5232951a448f19b01113
SHA19f10d4cf7414617ef9b7557edb7986c28f3dd17e
SHA2562950296ce6957997a133b4771ba61774af013e57d57da9988a3fe1ec4bf8875b
SHA512dd7d1c5dc6991953d3adf0ea63b3ca9b54da3f04388898a72d085192409c6142733ffbf7c4a4fef867d1f178ceef76eae2524b35a09b35f1d4bcc8168e3840d5
-
Filesize
192KB
MD54a486a2a371d8db348dc0ad03e9fd9f0
SHA1edd912c5d606628022dc3216eaf2db7c93554ff7
SHA25693ebf2ea35e05e71e9c9884bcb76799c1b9f2b81bf8decfe1ec83807b911916b
SHA512deb1d7cb48c961fa18e748db8dfc9769c6fcedd4b7a26b044181e535fbdb31d7ead7b8ae69fab463473bcf0bbda0affdeecb9deffc51a89c74001f68a98bf60b