Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 19:44
Behavioral task
behavioral1
Sample
2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe
Resource
win7-20240221-en
General
-
Target
2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe
-
Size
3.0MB
-
MD5
56861f5746650ac966ef44b9fcbca314
-
SHA1
845efca9facc0d69105080f46121ed44d3d40634
-
SHA256
2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc
-
SHA512
e89b68ee55fd69fb8f3dfe330a58778545f664e2226120b5186b713a366781b399f91cb6c0e883536683a445ba30bc60288b64c5de7246ec8231468b52688f82
-
SSDEEP
49152:71G1NtyBwTI3ySZbrkXV1etEKLlWUTOfeiRA2R76zHrWax9hMkHC0INFWEWBN4t:71ONtyBeSFkXV1etEKLlWUTOfeiRA2RR
Malware Config
Signatures
-
Detects executables containing URLs to raw contents of a Github gist 64 IoCs
resource yara_rule behavioral2/memory/1696-0-0x00007FF721780000-0x00007FF721B76000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023433-7.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x000900000002342e-5.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023437-35.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x000700000002343b-56.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x000700000002343d-68.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x000700000002343c-82.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023443-102.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3316-119-0x00007FF79C370000-0x00007FF79C766000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2520-122-0x00007FF7A2C60000-0x00007FF7A3056000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x000700000002344a-139.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3964-158-0x00007FF619B20000-0x00007FF619F16000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3152-162-0x00007FF75DE80000-0x00007FF75E276000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4988-167-0x00007FF7FBD30000-0x00007FF7FC126000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/408-169-0x00007FF73A2F0000-0x00007FF73A6E6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4972-168-0x00007FF7992A0000-0x00007FF799696000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4780-166-0x00007FF755F10000-0x00007FF756306000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1908-165-0x00007FF6C3630000-0x00007FF6C3A26000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2196-164-0x00007FF7B1F50000-0x00007FF7B2346000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4492-163-0x00007FF7F5690000-0x00007FF7F5A86000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4568-161-0x00007FF7A7750000-0x00007FF7A7B46000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1852-160-0x00007FF77E0F0000-0x00007FF77E4E6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/400-159-0x00007FF7CD8C0000-0x00007FF7CDCB6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2284-157-0x00007FF694C40000-0x00007FF695036000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/452-156-0x00007FF65EB90000-0x00007FF65EF86000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3796-155-0x00007FF65E810000-0x00007FF65EC06000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023449-151.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0008000000023447-149.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x000900000002342f-147.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023448-145.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4960-144-0x00007FF6409B0000-0x00007FF640DA6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3756-143-0x00007FF7B2ED0000-0x00007FF7B32C6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023445-141.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2572-140-0x00007FF6C0F30000-0x00007FF6C1326000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1452-138-0x00007FF7B21E0000-0x00007FF7B25D6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023444-107.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x000700000002343f-105.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2060-104-0x00007FF63EE70000-0x00007FF63F266000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023442-100.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023441-98.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023440-96.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x000700000002343e-94.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x000700000002343a-63.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023439-59.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023434-50.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023436-47.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023438-45.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023432-38.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x0007000000023435-32.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4916-27-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3584-13-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x000700000002344b-383.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x000700000002349d-389.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x00070000000234a2-395.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x00070000000234a6-405.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x00070000000234a3-406.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/files/0x00070000000234a7-414.dat INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3584-2140-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4916-2141-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1908-2144-0x00007FF6C3630000-0x00007FF6C3A26000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3584-2145-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3316-2151-0x00007FF79C370000-0x00007FF79C766000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4916-2150-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2520-2149-0x00007FF7A2C60000-0x00007FF7A3056000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/memory/1696-0-0x00007FF721780000-0x00007FF721B76000-memory.dmp UPX behavioral2/files/0x0007000000023433-7.dat UPX behavioral2/files/0x000900000002342e-5.dat UPX behavioral2/files/0x0007000000023437-35.dat UPX behavioral2/files/0x000700000002343b-56.dat UPX behavioral2/files/0x000700000002343d-68.dat UPX behavioral2/files/0x000700000002343c-82.dat UPX behavioral2/files/0x0007000000023443-102.dat UPX behavioral2/memory/3316-119-0x00007FF79C370000-0x00007FF79C766000-memory.dmp UPX behavioral2/memory/2520-122-0x00007FF7A2C60000-0x00007FF7A3056000-memory.dmp UPX behavioral2/files/0x000700000002344a-139.dat UPX behavioral2/memory/3964-158-0x00007FF619B20000-0x00007FF619F16000-memory.dmp UPX behavioral2/memory/3152-162-0x00007FF75DE80000-0x00007FF75E276000-memory.dmp UPX behavioral2/memory/4988-167-0x00007FF7FBD30000-0x00007FF7FC126000-memory.dmp UPX behavioral2/memory/408-169-0x00007FF73A2F0000-0x00007FF73A6E6000-memory.dmp UPX behavioral2/memory/4972-168-0x00007FF7992A0000-0x00007FF799696000-memory.dmp UPX behavioral2/memory/4780-166-0x00007FF755F10000-0x00007FF756306000-memory.dmp UPX behavioral2/memory/1908-165-0x00007FF6C3630000-0x00007FF6C3A26000-memory.dmp UPX behavioral2/memory/2196-164-0x00007FF7B1F50000-0x00007FF7B2346000-memory.dmp UPX behavioral2/memory/4492-163-0x00007FF7F5690000-0x00007FF7F5A86000-memory.dmp UPX behavioral2/memory/4568-161-0x00007FF7A7750000-0x00007FF7A7B46000-memory.dmp UPX behavioral2/memory/1852-160-0x00007FF77E0F0000-0x00007FF77E4E6000-memory.dmp UPX behavioral2/memory/400-159-0x00007FF7CD8C0000-0x00007FF7CDCB6000-memory.dmp UPX behavioral2/memory/2284-157-0x00007FF694C40000-0x00007FF695036000-memory.dmp UPX behavioral2/memory/452-156-0x00007FF65EB90000-0x00007FF65EF86000-memory.dmp UPX behavioral2/memory/3796-155-0x00007FF65E810000-0x00007FF65EC06000-memory.dmp UPX behavioral2/files/0x0007000000023449-151.dat UPX behavioral2/files/0x0008000000023447-149.dat UPX behavioral2/files/0x000900000002342f-147.dat UPX behavioral2/files/0x0007000000023448-145.dat UPX behavioral2/memory/4960-144-0x00007FF6409B0000-0x00007FF640DA6000-memory.dmp UPX behavioral2/memory/3756-143-0x00007FF7B2ED0000-0x00007FF7B32C6000-memory.dmp UPX behavioral2/files/0x0007000000023445-141.dat UPX behavioral2/memory/2572-140-0x00007FF6C0F30000-0x00007FF6C1326000-memory.dmp UPX behavioral2/memory/1452-138-0x00007FF7B21E0000-0x00007FF7B25D6000-memory.dmp UPX behavioral2/files/0x0007000000023444-107.dat UPX behavioral2/files/0x000700000002343f-105.dat UPX behavioral2/memory/2060-104-0x00007FF63EE70000-0x00007FF63F266000-memory.dmp UPX behavioral2/files/0x0007000000023442-100.dat UPX behavioral2/files/0x0007000000023441-98.dat UPX behavioral2/files/0x0007000000023440-96.dat UPX behavioral2/files/0x000700000002343e-94.dat UPX behavioral2/files/0x000700000002343a-63.dat UPX behavioral2/files/0x0007000000023439-59.dat UPX behavioral2/files/0x0007000000023434-50.dat UPX behavioral2/files/0x0007000000023436-47.dat UPX behavioral2/files/0x0007000000023438-45.dat UPX behavioral2/files/0x0007000000023432-38.dat UPX behavioral2/files/0x0007000000023435-32.dat UPX behavioral2/memory/4916-27-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp UPX behavioral2/memory/3584-13-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp UPX behavioral2/files/0x000700000002344b-383.dat UPX behavioral2/files/0x000700000002349d-389.dat UPX behavioral2/files/0x00070000000234a2-395.dat UPX behavioral2/files/0x00070000000234a6-405.dat UPX behavioral2/files/0x00070000000234a3-406.dat UPX behavioral2/files/0x00070000000234a7-414.dat UPX behavioral2/memory/3584-2140-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp UPX behavioral2/memory/4916-2141-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp UPX behavioral2/memory/1908-2144-0x00007FF6C3630000-0x00007FF6C3A26000-memory.dmp UPX behavioral2/memory/3584-2145-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp UPX behavioral2/memory/3316-2151-0x00007FF79C370000-0x00007FF79C766000-memory.dmp UPX behavioral2/memory/4916-2150-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp UPX behavioral2/memory/2520-2149-0x00007FF7A2C60000-0x00007FF7A3056000-memory.dmp UPX -
XMRig Miner payload 64 IoCs
resource yara_rule behavioral2/memory/1696-0-0x00007FF721780000-0x00007FF721B76000-memory.dmp xmrig behavioral2/files/0x0007000000023433-7.dat xmrig behavioral2/files/0x000900000002342e-5.dat xmrig behavioral2/files/0x0007000000023437-35.dat xmrig behavioral2/files/0x000700000002343b-56.dat xmrig behavioral2/files/0x000700000002343d-68.dat xmrig behavioral2/files/0x000700000002343c-82.dat xmrig behavioral2/files/0x0007000000023443-102.dat xmrig behavioral2/memory/3316-119-0x00007FF79C370000-0x00007FF79C766000-memory.dmp xmrig behavioral2/memory/2520-122-0x00007FF7A2C60000-0x00007FF7A3056000-memory.dmp xmrig behavioral2/files/0x000700000002344a-139.dat xmrig behavioral2/memory/3964-158-0x00007FF619B20000-0x00007FF619F16000-memory.dmp xmrig behavioral2/memory/3152-162-0x00007FF75DE80000-0x00007FF75E276000-memory.dmp xmrig behavioral2/memory/4988-167-0x00007FF7FBD30000-0x00007FF7FC126000-memory.dmp xmrig behavioral2/memory/408-169-0x00007FF73A2F0000-0x00007FF73A6E6000-memory.dmp xmrig behavioral2/memory/4972-168-0x00007FF7992A0000-0x00007FF799696000-memory.dmp xmrig behavioral2/memory/4780-166-0x00007FF755F10000-0x00007FF756306000-memory.dmp xmrig behavioral2/memory/1908-165-0x00007FF6C3630000-0x00007FF6C3A26000-memory.dmp xmrig behavioral2/memory/2196-164-0x00007FF7B1F50000-0x00007FF7B2346000-memory.dmp xmrig behavioral2/memory/4492-163-0x00007FF7F5690000-0x00007FF7F5A86000-memory.dmp xmrig behavioral2/memory/4568-161-0x00007FF7A7750000-0x00007FF7A7B46000-memory.dmp xmrig behavioral2/memory/1852-160-0x00007FF77E0F0000-0x00007FF77E4E6000-memory.dmp xmrig behavioral2/memory/400-159-0x00007FF7CD8C0000-0x00007FF7CDCB6000-memory.dmp xmrig behavioral2/memory/2284-157-0x00007FF694C40000-0x00007FF695036000-memory.dmp xmrig behavioral2/memory/452-156-0x00007FF65EB90000-0x00007FF65EF86000-memory.dmp xmrig behavioral2/memory/3796-155-0x00007FF65E810000-0x00007FF65EC06000-memory.dmp xmrig behavioral2/files/0x0007000000023449-151.dat xmrig behavioral2/files/0x0008000000023447-149.dat xmrig behavioral2/files/0x000900000002342f-147.dat xmrig behavioral2/files/0x0007000000023448-145.dat xmrig behavioral2/memory/4960-144-0x00007FF6409B0000-0x00007FF640DA6000-memory.dmp xmrig behavioral2/memory/3756-143-0x00007FF7B2ED0000-0x00007FF7B32C6000-memory.dmp xmrig behavioral2/files/0x0007000000023445-141.dat xmrig behavioral2/memory/2572-140-0x00007FF6C0F30000-0x00007FF6C1326000-memory.dmp xmrig behavioral2/memory/1452-138-0x00007FF7B21E0000-0x00007FF7B25D6000-memory.dmp xmrig behavioral2/files/0x0007000000023444-107.dat xmrig behavioral2/files/0x000700000002343f-105.dat xmrig behavioral2/memory/2060-104-0x00007FF63EE70000-0x00007FF63F266000-memory.dmp xmrig behavioral2/files/0x0007000000023442-100.dat xmrig behavioral2/files/0x0007000000023441-98.dat xmrig behavioral2/files/0x0007000000023440-96.dat xmrig behavioral2/files/0x000700000002343e-94.dat xmrig behavioral2/files/0x000700000002343a-63.dat xmrig behavioral2/files/0x0007000000023439-59.dat xmrig behavioral2/files/0x0007000000023434-50.dat xmrig behavioral2/files/0x0007000000023436-47.dat xmrig behavioral2/files/0x0007000000023438-45.dat xmrig behavioral2/files/0x0007000000023432-38.dat xmrig behavioral2/files/0x0007000000023435-32.dat xmrig behavioral2/memory/4916-27-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp xmrig behavioral2/memory/3584-13-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp xmrig behavioral2/files/0x000700000002344b-383.dat xmrig behavioral2/files/0x000700000002349d-389.dat xmrig behavioral2/files/0x00070000000234a2-395.dat xmrig behavioral2/files/0x00070000000234a6-405.dat xmrig behavioral2/files/0x00070000000234a3-406.dat xmrig behavioral2/files/0x00070000000234a7-414.dat xmrig behavioral2/memory/3584-2140-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp xmrig behavioral2/memory/4916-2141-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp xmrig behavioral2/memory/1908-2144-0x00007FF6C3630000-0x00007FF6C3A26000-memory.dmp xmrig behavioral2/memory/3584-2145-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp xmrig behavioral2/memory/3316-2151-0x00007FF79C370000-0x00007FF79C766000-memory.dmp xmrig behavioral2/memory/4916-2150-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp xmrig behavioral2/memory/2520-2149-0x00007FF7A2C60000-0x00007FF7A3056000-memory.dmp xmrig -
Blocklisted process makes network request 7 IoCs
flow pid Process 9 3980 powershell.exe 11 3980 powershell.exe 13 3980 powershell.exe 14 3980 powershell.exe 16 3980 powershell.exe 17 3980 powershell.exe 18 3980 powershell.exe -
pid Process 3980 powershell.exe -
Executes dropped EXE 64 IoCs
pid Process 3584 aCkbrOg.exe 4916 LNEnrfE.exe 1908 NOPATWP.exe 2060 RKfXkhE.exe 3316 wbuoubM.exe 4780 nxifSJg.exe 2520 urqCtTJ.exe 1452 RdANJnX.exe 2572 fReAUhl.exe 3756 cyqvlzJ.exe 4960 dfkDzqP.exe 3796 ZVJkPqA.exe 452 gSxeHbq.exe 2284 fbYblGX.exe 4988 tnsEtkT.exe 3964 bbsfxuq.exe 400 kfrFXBB.exe 1852 MjwXxUo.exe 4568 GnGDhkX.exe 3152 FtnDWgn.exe 4972 gVNtVGC.exe 408 sluuXWH.exe 4492 FCfOJYA.exe 2196 HUZYoCT.exe 4832 pOasppt.exe 976 ZoAQMme.exe 3000 fhDfchT.exe 1628 TXGBbbp.exe 1236 UPJBgwH.exe 224 OGVPWcn.exe 4556 BpvYWwR.exe 5000 AgrlDcz.exe 4376 XWyTxKw.exe 2392 POvrucS.exe 2744 yPaDRWP.exe 2804 Auryrya.exe 5076 QKGVJEN.exe 920 zCGnNka.exe 4328 tJNVfIX.exe 1140 KguYmpG.exe 1588 NqMLYrf.exe 4552 iQkzWob.exe 3504 WBIsMRt.exe 4632 DwBXJZA.exe 3620 sZAfmuZ.exe 4984 mxFGgnU.exe 1656 ccnDQFC.exe 2288 bEieCBN.exe 1316 VDPPeMb.exe 4084 DOMbUdu.exe 1440 ubyAtQX.exe 4056 LfeSiMg.exe 2772 cSkgzeD.exe 3156 EabhBMP.exe 3248 BxSMRUT.exe 2128 DslWTHD.exe 4876 RqytRcN.exe 456 aDIdXpS.exe 4020 cgKYnKo.exe 5088 nmoSOCX.exe 756 UbdAIqh.exe 4692 YBedSbp.exe 3836 MaKKgIB.exe 1836 fVAhoxI.exe -
resource yara_rule behavioral2/memory/1696-0-0x00007FF721780000-0x00007FF721B76000-memory.dmp upx behavioral2/files/0x0007000000023433-7.dat upx behavioral2/files/0x000900000002342e-5.dat upx behavioral2/files/0x0007000000023437-35.dat upx behavioral2/files/0x000700000002343b-56.dat upx behavioral2/files/0x000700000002343d-68.dat upx behavioral2/files/0x000700000002343c-82.dat upx behavioral2/files/0x0007000000023443-102.dat upx behavioral2/memory/3316-119-0x00007FF79C370000-0x00007FF79C766000-memory.dmp upx behavioral2/memory/2520-122-0x00007FF7A2C60000-0x00007FF7A3056000-memory.dmp upx behavioral2/files/0x000700000002344a-139.dat upx behavioral2/memory/3964-158-0x00007FF619B20000-0x00007FF619F16000-memory.dmp upx behavioral2/memory/3152-162-0x00007FF75DE80000-0x00007FF75E276000-memory.dmp upx behavioral2/memory/4988-167-0x00007FF7FBD30000-0x00007FF7FC126000-memory.dmp upx behavioral2/memory/408-169-0x00007FF73A2F0000-0x00007FF73A6E6000-memory.dmp upx behavioral2/memory/4972-168-0x00007FF7992A0000-0x00007FF799696000-memory.dmp upx behavioral2/memory/4780-166-0x00007FF755F10000-0x00007FF756306000-memory.dmp upx behavioral2/memory/1908-165-0x00007FF6C3630000-0x00007FF6C3A26000-memory.dmp upx behavioral2/memory/2196-164-0x00007FF7B1F50000-0x00007FF7B2346000-memory.dmp upx behavioral2/memory/4492-163-0x00007FF7F5690000-0x00007FF7F5A86000-memory.dmp upx behavioral2/memory/4568-161-0x00007FF7A7750000-0x00007FF7A7B46000-memory.dmp upx behavioral2/memory/1852-160-0x00007FF77E0F0000-0x00007FF77E4E6000-memory.dmp upx behavioral2/memory/400-159-0x00007FF7CD8C0000-0x00007FF7CDCB6000-memory.dmp upx behavioral2/memory/2284-157-0x00007FF694C40000-0x00007FF695036000-memory.dmp upx behavioral2/memory/452-156-0x00007FF65EB90000-0x00007FF65EF86000-memory.dmp upx behavioral2/memory/3796-155-0x00007FF65E810000-0x00007FF65EC06000-memory.dmp upx behavioral2/files/0x0007000000023449-151.dat upx behavioral2/files/0x0008000000023447-149.dat upx behavioral2/files/0x000900000002342f-147.dat upx behavioral2/files/0x0007000000023448-145.dat upx behavioral2/memory/4960-144-0x00007FF6409B0000-0x00007FF640DA6000-memory.dmp upx behavioral2/memory/3756-143-0x00007FF7B2ED0000-0x00007FF7B32C6000-memory.dmp upx behavioral2/files/0x0007000000023445-141.dat upx behavioral2/memory/2572-140-0x00007FF6C0F30000-0x00007FF6C1326000-memory.dmp upx behavioral2/memory/1452-138-0x00007FF7B21E0000-0x00007FF7B25D6000-memory.dmp upx behavioral2/files/0x0007000000023444-107.dat upx behavioral2/files/0x000700000002343f-105.dat upx behavioral2/memory/2060-104-0x00007FF63EE70000-0x00007FF63F266000-memory.dmp upx behavioral2/files/0x0007000000023442-100.dat upx behavioral2/files/0x0007000000023441-98.dat upx behavioral2/files/0x0007000000023440-96.dat upx behavioral2/files/0x000700000002343e-94.dat upx behavioral2/files/0x000700000002343a-63.dat upx behavioral2/files/0x0007000000023439-59.dat upx behavioral2/files/0x0007000000023434-50.dat upx behavioral2/files/0x0007000000023436-47.dat upx behavioral2/files/0x0007000000023438-45.dat upx behavioral2/files/0x0007000000023432-38.dat upx behavioral2/files/0x0007000000023435-32.dat upx behavioral2/memory/4916-27-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp upx behavioral2/memory/3584-13-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp upx behavioral2/files/0x000700000002344b-383.dat upx behavioral2/files/0x000700000002349d-389.dat upx behavioral2/files/0x00070000000234a2-395.dat upx behavioral2/files/0x00070000000234a6-405.dat upx behavioral2/files/0x00070000000234a3-406.dat upx behavioral2/files/0x00070000000234a7-414.dat upx behavioral2/memory/3584-2140-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp upx behavioral2/memory/4916-2141-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp upx behavioral2/memory/1908-2144-0x00007FF6C3630000-0x00007FF6C3A26000-memory.dmp upx behavioral2/memory/3584-2145-0x00007FF78F790000-0x00007FF78FB86000-memory.dmp upx behavioral2/memory/3316-2151-0x00007FF79C370000-0x00007FF79C766000-memory.dmp upx behavioral2/memory/4916-2150-0x00007FF7610E0000-0x00007FF7614D6000-memory.dmp upx behavioral2/memory/2520-2149-0x00007FF7A2C60000-0x00007FF7A3056000-memory.dmp upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 raw.githubusercontent.com 9 raw.githubusercontent.com -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\System\ABXfgGX.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\oHBRoDv.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\yKPibNE.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\RsSfhVo.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\kRPbpIw.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\buRGzkB.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\YYwZMiH.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\GTxqTUb.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\aVLDdpr.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\NQICgpW.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\kTgjhXP.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\yiLwrAv.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\HladlbF.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\KzREsVg.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\HpXbNce.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\JoZNLtm.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\aKAsSOz.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\KnVtnXO.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\MZpGWiy.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\kTSeAiX.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\yVbAnJu.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\JWqDAQX.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\fJEoJFx.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\EkDINcN.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\WSqbwYE.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\IJBLRjS.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\UJFsrTx.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\ByhwQFZ.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\pFAzHNN.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\hohDLDg.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\OhJJQNY.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\NpdfxjE.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\JMmQkJy.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\dJcokme.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\lPAYVPi.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\tvlGQHA.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\MTxMlxU.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\dLOXgro.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\OmjOWir.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\BBCbciM.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\BAHqFry.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\qCnzjER.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\EccfWox.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\lyhWkGz.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\zncOwHb.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\vWGamKH.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\qkiZmYM.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\BzPqOVm.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\ngwsiYy.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\NSBcJiK.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\BdyvJmz.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\drWUXWv.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\PIuXScf.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\KLfhilX.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\RwZwfRm.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\PKsFGUW.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\wvAApln.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\gDuOMkK.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\HLTnoaV.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\JGIqcxX.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\uONcGZq.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\RijENWt.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\DmqeJeH.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe File created C:\Windows\System\fuEBtpO.exe 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3980 powershell.exe 3980 powershell.exe 3980 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeLockMemoryPrivilege 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe Token: SeLockMemoryPrivilege 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe Token: SeDebugPrivilege 3980 powershell.exe Token: SeCreateGlobalPrivilege 11672 dwm.exe Token: SeChangeNotifyPrivilege 11672 dwm.exe Token: 33 11672 dwm.exe Token: SeIncBasePriorityPrivilege 11672 dwm.exe Token: SeShutdownPrivilege 11672 dwm.exe Token: SeCreatePagefilePrivilege 11672 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3980 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 83 PID 1696 wrote to memory of 3980 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 83 PID 1696 wrote to memory of 3584 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 84 PID 1696 wrote to memory of 3584 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 84 PID 1696 wrote to memory of 4916 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 85 PID 1696 wrote to memory of 4916 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 85 PID 1696 wrote to memory of 1908 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 86 PID 1696 wrote to memory of 1908 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 86 PID 1696 wrote to memory of 2060 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 87 PID 1696 wrote to memory of 2060 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 87 PID 1696 wrote to memory of 3316 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 88 PID 1696 wrote to memory of 3316 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 88 PID 1696 wrote to memory of 4780 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 89 PID 1696 wrote to memory of 4780 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 89 PID 1696 wrote to memory of 2520 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 90 PID 1696 wrote to memory of 2520 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 90 PID 1696 wrote to memory of 1452 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 91 PID 1696 wrote to memory of 1452 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 91 PID 1696 wrote to memory of 2572 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 92 PID 1696 wrote to memory of 2572 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 92 PID 1696 wrote to memory of 3756 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 93 PID 1696 wrote to memory of 3756 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 93 PID 1696 wrote to memory of 4960 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 94 PID 1696 wrote to memory of 4960 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 94 PID 1696 wrote to memory of 3796 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 95 PID 1696 wrote to memory of 3796 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 95 PID 1696 wrote to memory of 452 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 96 PID 1696 wrote to memory of 452 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 96 PID 1696 wrote to memory of 2284 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 97 PID 1696 wrote to memory of 2284 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 97 PID 1696 wrote to memory of 4568 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 98 PID 1696 wrote to memory of 4568 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 98 PID 1696 wrote to memory of 4988 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 99 PID 1696 wrote to memory of 4988 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 99 PID 1696 wrote to memory of 3964 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 100 PID 1696 wrote to memory of 3964 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 100 PID 1696 wrote to memory of 400 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 101 PID 1696 wrote to memory of 400 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 101 PID 1696 wrote to memory of 1852 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 102 PID 1696 wrote to memory of 1852 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 102 PID 1696 wrote to memory of 3152 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 103 PID 1696 wrote to memory of 3152 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 103 PID 1696 wrote to memory of 4972 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 104 PID 1696 wrote to memory of 4972 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 104 PID 1696 wrote to memory of 408 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 105 PID 1696 wrote to memory of 408 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 105 PID 1696 wrote to memory of 4492 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 106 PID 1696 wrote to memory of 4492 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 106 PID 1696 wrote to memory of 2196 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 107 PID 1696 wrote to memory of 2196 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 107 PID 1696 wrote to memory of 4832 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 108 PID 1696 wrote to memory of 4832 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 108 PID 1696 wrote to memory of 976 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 109 PID 1696 wrote to memory of 976 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 109 PID 1696 wrote to memory of 3000 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 110 PID 1696 wrote to memory of 3000 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 110 PID 1696 wrote to memory of 1628 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 111 PID 1696 wrote to memory of 1628 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 111 PID 1696 wrote to memory of 1236 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 112 PID 1696 wrote to memory of 1236 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 112 PID 1696 wrote to memory of 224 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 113 PID 1696 wrote to memory of 224 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 113 PID 1696 wrote to memory of 4556 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 114 PID 1696 wrote to memory of 4556 1696 2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe"C:\Users\Admin\AppData\Local\Temp\2579a9ccecddaa24caab396acd79808249b01418650698fa9cd49655b886bafc.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Invoke-WebRequest "https://raw.githubusercontent.com/" "2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Windows\System\aCkbrOg.exeC:\Windows\System\aCkbrOg.exe2⤵
- Executes dropped EXE
PID:3584
-
-
C:\Windows\System\LNEnrfE.exeC:\Windows\System\LNEnrfE.exe2⤵
- Executes dropped EXE
PID:4916
-
-
C:\Windows\System\NOPATWP.exeC:\Windows\System\NOPATWP.exe2⤵
- Executes dropped EXE
PID:1908
-
-
C:\Windows\System\RKfXkhE.exeC:\Windows\System\RKfXkhE.exe2⤵
- Executes dropped EXE
PID:2060
-
-
C:\Windows\System\wbuoubM.exeC:\Windows\System\wbuoubM.exe2⤵
- Executes dropped EXE
PID:3316
-
-
C:\Windows\System\nxifSJg.exeC:\Windows\System\nxifSJg.exe2⤵
- Executes dropped EXE
PID:4780
-
-
C:\Windows\System\urqCtTJ.exeC:\Windows\System\urqCtTJ.exe2⤵
- Executes dropped EXE
PID:2520
-
-
C:\Windows\System\RdANJnX.exeC:\Windows\System\RdANJnX.exe2⤵
- Executes dropped EXE
PID:1452
-
-
C:\Windows\System\fReAUhl.exeC:\Windows\System\fReAUhl.exe2⤵
- Executes dropped EXE
PID:2572
-
-
C:\Windows\System\cyqvlzJ.exeC:\Windows\System\cyqvlzJ.exe2⤵
- Executes dropped EXE
PID:3756
-
-
C:\Windows\System\dfkDzqP.exeC:\Windows\System\dfkDzqP.exe2⤵
- Executes dropped EXE
PID:4960
-
-
C:\Windows\System\ZVJkPqA.exeC:\Windows\System\ZVJkPqA.exe2⤵
- Executes dropped EXE
PID:3796
-
-
C:\Windows\System\gSxeHbq.exeC:\Windows\System\gSxeHbq.exe2⤵
- Executes dropped EXE
PID:452
-
-
C:\Windows\System\fbYblGX.exeC:\Windows\System\fbYblGX.exe2⤵
- Executes dropped EXE
PID:2284
-
-
C:\Windows\System\GnGDhkX.exeC:\Windows\System\GnGDhkX.exe2⤵
- Executes dropped EXE
PID:4568
-
-
C:\Windows\System\tnsEtkT.exeC:\Windows\System\tnsEtkT.exe2⤵
- Executes dropped EXE
PID:4988
-
-
C:\Windows\System\bbsfxuq.exeC:\Windows\System\bbsfxuq.exe2⤵
- Executes dropped EXE
PID:3964
-
-
C:\Windows\System\kfrFXBB.exeC:\Windows\System\kfrFXBB.exe2⤵
- Executes dropped EXE
PID:400
-
-
C:\Windows\System\MjwXxUo.exeC:\Windows\System\MjwXxUo.exe2⤵
- Executes dropped EXE
PID:1852
-
-
C:\Windows\System\FtnDWgn.exeC:\Windows\System\FtnDWgn.exe2⤵
- Executes dropped EXE
PID:3152
-
-
C:\Windows\System\gVNtVGC.exeC:\Windows\System\gVNtVGC.exe2⤵
- Executes dropped EXE
PID:4972
-
-
C:\Windows\System\sluuXWH.exeC:\Windows\System\sluuXWH.exe2⤵
- Executes dropped EXE
PID:408
-
-
C:\Windows\System\FCfOJYA.exeC:\Windows\System\FCfOJYA.exe2⤵
- Executes dropped EXE
PID:4492
-
-
C:\Windows\System\HUZYoCT.exeC:\Windows\System\HUZYoCT.exe2⤵
- Executes dropped EXE
PID:2196
-
-
C:\Windows\System\pOasppt.exeC:\Windows\System\pOasppt.exe2⤵
- Executes dropped EXE
PID:4832
-
-
C:\Windows\System\ZoAQMme.exeC:\Windows\System\ZoAQMme.exe2⤵
- Executes dropped EXE
PID:976
-
-
C:\Windows\System\fhDfchT.exeC:\Windows\System\fhDfchT.exe2⤵
- Executes dropped EXE
PID:3000
-
-
C:\Windows\System\TXGBbbp.exeC:\Windows\System\TXGBbbp.exe2⤵
- Executes dropped EXE
PID:1628
-
-
C:\Windows\System\UPJBgwH.exeC:\Windows\System\UPJBgwH.exe2⤵
- Executes dropped EXE
PID:1236
-
-
C:\Windows\System\OGVPWcn.exeC:\Windows\System\OGVPWcn.exe2⤵
- Executes dropped EXE
PID:224
-
-
C:\Windows\System\BpvYWwR.exeC:\Windows\System\BpvYWwR.exe2⤵
- Executes dropped EXE
PID:4556
-
-
C:\Windows\System\AgrlDcz.exeC:\Windows\System\AgrlDcz.exe2⤵
- Executes dropped EXE
PID:5000
-
-
C:\Windows\System\XWyTxKw.exeC:\Windows\System\XWyTxKw.exe2⤵
- Executes dropped EXE
PID:4376
-
-
C:\Windows\System\POvrucS.exeC:\Windows\System\POvrucS.exe2⤵
- Executes dropped EXE
PID:2392
-
-
C:\Windows\System\yPaDRWP.exeC:\Windows\System\yPaDRWP.exe2⤵
- Executes dropped EXE
PID:2744
-
-
C:\Windows\System\Auryrya.exeC:\Windows\System\Auryrya.exe2⤵
- Executes dropped EXE
PID:2804
-
-
C:\Windows\System\QKGVJEN.exeC:\Windows\System\QKGVJEN.exe2⤵
- Executes dropped EXE
PID:5076
-
-
C:\Windows\System\zCGnNka.exeC:\Windows\System\zCGnNka.exe2⤵
- Executes dropped EXE
PID:920
-
-
C:\Windows\System\tJNVfIX.exeC:\Windows\System\tJNVfIX.exe2⤵
- Executes dropped EXE
PID:4328
-
-
C:\Windows\System\KguYmpG.exeC:\Windows\System\KguYmpG.exe2⤵
- Executes dropped EXE
PID:1140
-
-
C:\Windows\System\NqMLYrf.exeC:\Windows\System\NqMLYrf.exe2⤵
- Executes dropped EXE
PID:1588
-
-
C:\Windows\System\iQkzWob.exeC:\Windows\System\iQkzWob.exe2⤵
- Executes dropped EXE
PID:4552
-
-
C:\Windows\System\WBIsMRt.exeC:\Windows\System\WBIsMRt.exe2⤵
- Executes dropped EXE
PID:3504
-
-
C:\Windows\System\DwBXJZA.exeC:\Windows\System\DwBXJZA.exe2⤵
- Executes dropped EXE
PID:4632
-
-
C:\Windows\System\sZAfmuZ.exeC:\Windows\System\sZAfmuZ.exe2⤵
- Executes dropped EXE
PID:3620
-
-
C:\Windows\System\mxFGgnU.exeC:\Windows\System\mxFGgnU.exe2⤵
- Executes dropped EXE
PID:4984
-
-
C:\Windows\System\ccnDQFC.exeC:\Windows\System\ccnDQFC.exe2⤵
- Executes dropped EXE
PID:1656
-
-
C:\Windows\System\bEieCBN.exeC:\Windows\System\bEieCBN.exe2⤵
- Executes dropped EXE
PID:2288
-
-
C:\Windows\System\VDPPeMb.exeC:\Windows\System\VDPPeMb.exe2⤵
- Executes dropped EXE
PID:1316
-
-
C:\Windows\System\DOMbUdu.exeC:\Windows\System\DOMbUdu.exe2⤵
- Executes dropped EXE
PID:4084
-
-
C:\Windows\System\ubyAtQX.exeC:\Windows\System\ubyAtQX.exe2⤵
- Executes dropped EXE
PID:1440
-
-
C:\Windows\System\LfeSiMg.exeC:\Windows\System\LfeSiMg.exe2⤵
- Executes dropped EXE
PID:4056
-
-
C:\Windows\System\cSkgzeD.exeC:\Windows\System\cSkgzeD.exe2⤵
- Executes dropped EXE
PID:2772
-
-
C:\Windows\System\EabhBMP.exeC:\Windows\System\EabhBMP.exe2⤵
- Executes dropped EXE
PID:3156
-
-
C:\Windows\System\BxSMRUT.exeC:\Windows\System\BxSMRUT.exe2⤵
- Executes dropped EXE
PID:3248
-
-
C:\Windows\System\DslWTHD.exeC:\Windows\System\DslWTHD.exe2⤵
- Executes dropped EXE
PID:2128
-
-
C:\Windows\System\RqytRcN.exeC:\Windows\System\RqytRcN.exe2⤵
- Executes dropped EXE
PID:4876
-
-
C:\Windows\System\aDIdXpS.exeC:\Windows\System\aDIdXpS.exe2⤵
- Executes dropped EXE
PID:456
-
-
C:\Windows\System\cgKYnKo.exeC:\Windows\System\cgKYnKo.exe2⤵
- Executes dropped EXE
PID:4020
-
-
C:\Windows\System\nmoSOCX.exeC:\Windows\System\nmoSOCX.exe2⤵
- Executes dropped EXE
PID:5088
-
-
C:\Windows\System\UbdAIqh.exeC:\Windows\System\UbdAIqh.exe2⤵
- Executes dropped EXE
PID:756
-
-
C:\Windows\System\YBedSbp.exeC:\Windows\System\YBedSbp.exe2⤵
- Executes dropped EXE
PID:4692
-
-
C:\Windows\System\MaKKgIB.exeC:\Windows\System\MaKKgIB.exe2⤵
- Executes dropped EXE
PID:3836
-
-
C:\Windows\System\fVAhoxI.exeC:\Windows\System\fVAhoxI.exe2⤵
- Executes dropped EXE
PID:1836
-
-
C:\Windows\System\XwbeXUt.exeC:\Windows\System\XwbeXUt.exe2⤵PID:1564
-
-
C:\Windows\System\DLToWMq.exeC:\Windows\System\DLToWMq.exe2⤵PID:1928
-
-
C:\Windows\System\uqJfSxA.exeC:\Windows\System\uqJfSxA.exe2⤵PID:4620
-
-
C:\Windows\System\fQkUdtN.exeC:\Windows\System\fQkUdtN.exe2⤵PID:3784
-
-
C:\Windows\System\qZBvDpm.exeC:\Windows\System\qZBvDpm.exe2⤵PID:4028
-
-
C:\Windows\System\ydNivVh.exeC:\Windows\System\ydNivVh.exe2⤵PID:2008
-
-
C:\Windows\System\zgLpIua.exeC:\Windows\System\zgLpIua.exe2⤵PID:612
-
-
C:\Windows\System\ZSkDWUT.exeC:\Windows\System\ZSkDWUT.exe2⤵PID:4828
-
-
C:\Windows\System\nPfXgcb.exeC:\Windows\System\nPfXgcb.exe2⤵PID:5080
-
-
C:\Windows\System\lhLKkee.exeC:\Windows\System\lhLKkee.exe2⤵PID:5040
-
-
C:\Windows\System\RbVYrHj.exeC:\Windows\System\RbVYrHj.exe2⤵PID:4076
-
-
C:\Windows\System\PdZpSDU.exeC:\Windows\System\PdZpSDU.exe2⤵PID:2944
-
-
C:\Windows\System\AoHaEJK.exeC:\Windows\System\AoHaEJK.exe2⤵PID:1796
-
-
C:\Windows\System\AtngLyI.exeC:\Windows\System\AtngLyI.exe2⤵PID:3208
-
-
C:\Windows\System\QVevTSv.exeC:\Windows\System\QVevTSv.exe2⤵PID:1364
-
-
C:\Windows\System\tqKzoAR.exeC:\Windows\System\tqKzoAR.exe2⤵PID:3904
-
-
C:\Windows\System\YphDZeI.exeC:\Windows\System\YphDZeI.exe2⤵PID:2712
-
-
C:\Windows\System\AnEkMSq.exeC:\Windows\System\AnEkMSq.exe2⤵PID:2308
-
-
C:\Windows\System\JvCVzhl.exeC:\Windows\System\JvCVzhl.exe2⤵PID:2604
-
-
C:\Windows\System\ucfWOkA.exeC:\Windows\System\ucfWOkA.exe2⤵PID:4820
-
-
C:\Windows\System\JklRWLK.exeC:\Windows\System\JklRWLK.exe2⤵PID:2908
-
-
C:\Windows\System\ewOBFJa.exeC:\Windows\System\ewOBFJa.exe2⤵PID:936
-
-
C:\Windows\System\kTWFGyo.exeC:\Windows\System\kTWFGyo.exe2⤵PID:5136
-
-
C:\Windows\System\HyXuKnB.exeC:\Windows\System\HyXuKnB.exe2⤵PID:5156
-
-
C:\Windows\System\SRZQXjy.exeC:\Windows\System\SRZQXjy.exe2⤵PID:5184
-
-
C:\Windows\System\fKUHxDu.exeC:\Windows\System\fKUHxDu.exe2⤵PID:5200
-
-
C:\Windows\System\BRvHibb.exeC:\Windows\System\BRvHibb.exe2⤵PID:5216
-
-
C:\Windows\System\XNYHBLw.exeC:\Windows\System\XNYHBLw.exe2⤵PID:5264
-
-
C:\Windows\System\duEvWmW.exeC:\Windows\System\duEvWmW.exe2⤵PID:5304
-
-
C:\Windows\System\zdDtJzf.exeC:\Windows\System\zdDtJzf.exe2⤵PID:5324
-
-
C:\Windows\System\LadEhYv.exeC:\Windows\System\LadEhYv.exe2⤵PID:5352
-
-
C:\Windows\System\YDlBTwC.exeC:\Windows\System\YDlBTwC.exe2⤵PID:5392
-
-
C:\Windows\System\mNhcUKD.exeC:\Windows\System\mNhcUKD.exe2⤵PID:5412
-
-
C:\Windows\System\uChKeQE.exeC:\Windows\System\uChKeQE.exe2⤵PID:5448
-
-
C:\Windows\System\CNaYkIT.exeC:\Windows\System\CNaYkIT.exe2⤵PID:5472
-
-
C:\Windows\System\ZwthbRN.exeC:\Windows\System\ZwthbRN.exe2⤵PID:5516
-
-
C:\Windows\System\PFtxsvb.exeC:\Windows\System\PFtxsvb.exe2⤵PID:5556
-
-
C:\Windows\System\kuFkpKB.exeC:\Windows\System\kuFkpKB.exe2⤵PID:5592
-
-
C:\Windows\System\bsErIbA.exeC:\Windows\System\bsErIbA.exe2⤵PID:5624
-
-
C:\Windows\System\FapSogk.exeC:\Windows\System\FapSogk.exe2⤵PID:5652
-
-
C:\Windows\System\tHfaRyF.exeC:\Windows\System\tHfaRyF.exe2⤵PID:5668
-
-
C:\Windows\System\UjZzXMQ.exeC:\Windows\System\UjZzXMQ.exe2⤵PID:5692
-
-
C:\Windows\System\rlxBaDO.exeC:\Windows\System\rlxBaDO.exe2⤵PID:5716
-
-
C:\Windows\System\KoLEmhY.exeC:\Windows\System\KoLEmhY.exe2⤵PID:5744
-
-
C:\Windows\System\LUXLzAg.exeC:\Windows\System\LUXLzAg.exe2⤵PID:5784
-
-
C:\Windows\System\mKfXOvO.exeC:\Windows\System\mKfXOvO.exe2⤵PID:5824
-
-
C:\Windows\System\FzUYZBA.exeC:\Windows\System\FzUYZBA.exe2⤵PID:5860
-
-
C:\Windows\System\onnmofn.exeC:\Windows\System\onnmofn.exe2⤵PID:5880
-
-
C:\Windows\System\UCEECyc.exeC:\Windows\System\UCEECyc.exe2⤵PID:5908
-
-
C:\Windows\System\SEzhlhG.exeC:\Windows\System\SEzhlhG.exe2⤵PID:5936
-
-
C:\Windows\System\ZFievgL.exeC:\Windows\System\ZFievgL.exe2⤵PID:5964
-
-
C:\Windows\System\ZLXDVrO.exeC:\Windows\System\ZLXDVrO.exe2⤵PID:5988
-
-
C:\Windows\System\ztMBKMT.exeC:\Windows\System\ztMBKMT.exe2⤵PID:6024
-
-
C:\Windows\System\KCYZycw.exeC:\Windows\System\KCYZycw.exe2⤵PID:6048
-
-
C:\Windows\System\nlQvDbm.exeC:\Windows\System\nlQvDbm.exe2⤵PID:6080
-
-
C:\Windows\System\HRVSGPY.exeC:\Windows\System\HRVSGPY.exe2⤵PID:6112
-
-
C:\Windows\System\KMglhmy.exeC:\Windows\System\KMglhmy.exe2⤵PID:1600
-
-
C:\Windows\System\WRMJfjn.exeC:\Windows\System\WRMJfjn.exe2⤵PID:5192
-
-
C:\Windows\System\fMmhrht.exeC:\Windows\System\fMmhrht.exe2⤵PID:5252
-
-
C:\Windows\System\DWdTUKq.exeC:\Windows\System\DWdTUKq.exe2⤵PID:5316
-
-
C:\Windows\System\zROGCka.exeC:\Windows\System\zROGCka.exe2⤵PID:5404
-
-
C:\Windows\System\dKzbqOt.exeC:\Windows\System\dKzbqOt.exe2⤵PID:5460
-
-
C:\Windows\System\lBQUuyZ.exeC:\Windows\System\lBQUuyZ.exe2⤵PID:5524
-
-
C:\Windows\System\opSWydf.exeC:\Windows\System\opSWydf.exe2⤵PID:5616
-
-
C:\Windows\System\ENUxliN.exeC:\Windows\System\ENUxliN.exe2⤵PID:5660
-
-
C:\Windows\System\UijNybf.exeC:\Windows\System\UijNybf.exe2⤵PID:5728
-
-
C:\Windows\System\uGHKeSX.exeC:\Windows\System\uGHKeSX.exe2⤵PID:5816
-
-
C:\Windows\System\FbeBtxK.exeC:\Windows\System\FbeBtxK.exe2⤵PID:5868
-
-
C:\Windows\System\XgUzxoZ.exeC:\Windows\System\XgUzxoZ.exe2⤵PID:5948
-
-
C:\Windows\System\BqukPxu.exeC:\Windows\System\BqukPxu.exe2⤵PID:6036
-
-
C:\Windows\System\FGJeCJK.exeC:\Windows\System\FGJeCJK.exe2⤵PID:6100
-
-
C:\Windows\System\TuAfQOc.exeC:\Windows\System\TuAfQOc.exe2⤵PID:5176
-
-
C:\Windows\System\THNhXDl.exeC:\Windows\System\THNhXDl.exe2⤵PID:5424
-
-
C:\Windows\System\rzIzXTU.exeC:\Windows\System\rzIzXTU.exe2⤵PID:5712
-
-
C:\Windows\System\UjyiYWZ.exeC:\Windows\System\UjyiYWZ.exe2⤵PID:4672
-
-
C:\Windows\System\uEaoBvY.exeC:\Windows\System\uEaoBvY.exe2⤵PID:6032
-
-
C:\Windows\System\uWAMCpg.exeC:\Windows\System\uWAMCpg.exe2⤵PID:5384
-
-
C:\Windows\System\dacNSmi.exeC:\Windows\System\dacNSmi.exe2⤵PID:5972
-
-
C:\Windows\System\Plwuwcj.exeC:\Windows\System\Plwuwcj.exe2⤵PID:5740
-
-
C:\Windows\System\QFzbNyT.exeC:\Windows\System\QFzbNyT.exe2⤵PID:6164
-
-
C:\Windows\System\hlHFAeS.exeC:\Windows\System\hlHFAeS.exe2⤵PID:6224
-
-
C:\Windows\System\CnVEtWp.exeC:\Windows\System\CnVEtWp.exe2⤵PID:6252
-
-
C:\Windows\System\TTgdypE.exeC:\Windows\System\TTgdypE.exe2⤵PID:6276
-
-
C:\Windows\System\iGNFtYI.exeC:\Windows\System\iGNFtYI.exe2⤵PID:6316
-
-
C:\Windows\System\OktXUKD.exeC:\Windows\System\OktXUKD.exe2⤵PID:6380
-
-
C:\Windows\System\CBwiZro.exeC:\Windows\System\CBwiZro.exe2⤵PID:6412
-
-
C:\Windows\System\jiXItBf.exeC:\Windows\System\jiXItBf.exe2⤵PID:6428
-
-
C:\Windows\System\ihcQNDx.exeC:\Windows\System\ihcQNDx.exe2⤵PID:6476
-
-
C:\Windows\System\HRhwoBX.exeC:\Windows\System\HRhwoBX.exe2⤵PID:6492
-
-
C:\Windows\System\DAYTbKk.exeC:\Windows\System\DAYTbKk.exe2⤵PID:6532
-
-
C:\Windows\System\RQTZJQp.exeC:\Windows\System\RQTZJQp.exe2⤵PID:6548
-
-
C:\Windows\System\jEIHpmj.exeC:\Windows\System\jEIHpmj.exe2⤵PID:6580
-
-
C:\Windows\System\HqfvdPG.exeC:\Windows\System\HqfvdPG.exe2⤵PID:6620
-
-
C:\Windows\System\CuOfWCf.exeC:\Windows\System\CuOfWCf.exe2⤵PID:6656
-
-
C:\Windows\System\CKALfUF.exeC:\Windows\System\CKALfUF.exe2⤵PID:6684
-
-
C:\Windows\System\rXXTsuC.exeC:\Windows\System\rXXTsuC.exe2⤵PID:6700
-
-
C:\Windows\System\mnHNSvV.exeC:\Windows\System\mnHNSvV.exe2⤵PID:6716
-
-
C:\Windows\System\reSGLOP.exeC:\Windows\System\reSGLOP.exe2⤵PID:6764
-
-
C:\Windows\System\ScdaEMM.exeC:\Windows\System\ScdaEMM.exe2⤵PID:6812
-
-
C:\Windows\System\xRUHqXb.exeC:\Windows\System\xRUHqXb.exe2⤵PID:6844
-
-
C:\Windows\System\NLnmQYc.exeC:\Windows\System\NLnmQYc.exe2⤵PID:6860
-
-
C:\Windows\System\dpPzMpb.exeC:\Windows\System\dpPzMpb.exe2⤵PID:6892
-
-
C:\Windows\System\JKJIvnA.exeC:\Windows\System\JKJIvnA.exe2⤵PID:6920
-
-
C:\Windows\System\ztigKqk.exeC:\Windows\System\ztigKqk.exe2⤵PID:6940
-
-
C:\Windows\System\RHgEydH.exeC:\Windows\System\RHgEydH.exe2⤵PID:6980
-
-
C:\Windows\System\gSKVVTv.exeC:\Windows\System\gSKVVTv.exe2⤵PID:7020
-
-
C:\Windows\System\faOUJbx.exeC:\Windows\System\faOUJbx.exe2⤵PID:7036
-
-
C:\Windows\System\hyUTCCE.exeC:\Windows\System\hyUTCCE.exe2⤵PID:7072
-
-
C:\Windows\System\sEyfdLx.exeC:\Windows\System\sEyfdLx.exe2⤵PID:7096
-
-
C:\Windows\System\AdTfLDP.exeC:\Windows\System\AdTfLDP.exe2⤵PID:7120
-
-
C:\Windows\System\qwPNJBq.exeC:\Windows\System\qwPNJBq.exe2⤵PID:7148
-
-
C:\Windows\System\ABEDzei.exeC:\Windows\System\ABEDzei.exe2⤵PID:6240
-
-
C:\Windows\System\QkbwIhI.exeC:\Windows\System\QkbwIhI.exe2⤵PID:6308
-
-
C:\Windows\System\MCqvTsv.exeC:\Windows\System\MCqvTsv.exe2⤵PID:6424
-
-
C:\Windows\System\bwNsLzd.exeC:\Windows\System\bwNsLzd.exe2⤵PID:6460
-
-
C:\Windows\System\QxZXyht.exeC:\Windows\System\QxZXyht.exe2⤵PID:6516
-
-
C:\Windows\System\lVQraox.exeC:\Windows\System\lVQraox.exe2⤵PID:6560
-
-
C:\Windows\System\joHUWBA.exeC:\Windows\System\joHUWBA.exe2⤵PID:6640
-
-
C:\Windows\System\HLQJMNR.exeC:\Windows\System\HLQJMNR.exe2⤵PID:6736
-
-
C:\Windows\System\JNdLROf.exeC:\Windows\System\JNdLROf.exe2⤵PID:6820
-
-
C:\Windows\System\LMzcPkv.exeC:\Windows\System\LMzcPkv.exe2⤵PID:6880
-
-
C:\Windows\System\czcpaLh.exeC:\Windows\System\czcpaLh.exe2⤵PID:6988
-
-
C:\Windows\System\oLtzkrz.exeC:\Windows\System\oLtzkrz.exe2⤵PID:7028
-
-
C:\Windows\System\fdvrSFp.exeC:\Windows\System\fdvrSFp.exe2⤵PID:7088
-
-
C:\Windows\System\RDDAZwV.exeC:\Windows\System\RDDAZwV.exe2⤵PID:6264
-
-
C:\Windows\System\YWtAddd.exeC:\Windows\System\YWtAddd.exe2⤵PID:3752
-
-
C:\Windows\System\mGoQHgB.exeC:\Windows\System\mGoQHgB.exe2⤵PID:6524
-
-
C:\Windows\System\gdoUZcM.exeC:\Windows\System\gdoUZcM.exe2⤵PID:6672
-
-
C:\Windows\System\ScSTyIR.exeC:\Windows\System\ScSTyIR.exe2⤵PID:6840
-
-
C:\Windows\System\FoGwPcQ.exeC:\Windows\System\FoGwPcQ.exe2⤵PID:7056
-
-
C:\Windows\System\luQHCGH.exeC:\Windows\System\luQHCGH.exe2⤵PID:6304
-
-
C:\Windows\System\RxaELCq.exeC:\Windows\System\RxaELCq.exe2⤵PID:6596
-
-
C:\Windows\System\SDKVreq.exeC:\Windows\System\SDKVreq.exe2⤵PID:6796
-
-
C:\Windows\System\ZKgNZle.exeC:\Windows\System\ZKgNZle.exe2⤵PID:7000
-
-
C:\Windows\System\jnxXeRG.exeC:\Windows\System\jnxXeRG.exe2⤵PID:6908
-
-
C:\Windows\System\Unjpqzj.exeC:\Windows\System\Unjpqzj.exe2⤵PID:7200
-
-
C:\Windows\System\AtprRKa.exeC:\Windows\System\AtprRKa.exe2⤵PID:7236
-
-
C:\Windows\System\FKJNnuU.exeC:\Windows\System\FKJNnuU.exe2⤵PID:7256
-
-
C:\Windows\System\RgeRRKx.exeC:\Windows\System\RgeRRKx.exe2⤵PID:7284
-
-
C:\Windows\System\CtBXasj.exeC:\Windows\System\CtBXasj.exe2⤵PID:7312
-
-
C:\Windows\System\HAkrQYA.exeC:\Windows\System\HAkrQYA.exe2⤵PID:7340
-
-
C:\Windows\System\jkvERWz.exeC:\Windows\System\jkvERWz.exe2⤵PID:7380
-
-
C:\Windows\System\qQHtwGn.exeC:\Windows\System\qQHtwGn.exe2⤵PID:7400
-
-
C:\Windows\System\psDhKOs.exeC:\Windows\System\psDhKOs.exe2⤵PID:7428
-
-
C:\Windows\System\XHibWaU.exeC:\Windows\System\XHibWaU.exe2⤵PID:7456
-
-
C:\Windows\System\nomabwR.exeC:\Windows\System\nomabwR.exe2⤵PID:7492
-
-
C:\Windows\System\tfZWFLh.exeC:\Windows\System\tfZWFLh.exe2⤵PID:7512
-
-
C:\Windows\System\ItECCNs.exeC:\Windows\System\ItECCNs.exe2⤵PID:7540
-
-
C:\Windows\System\NgIBGnl.exeC:\Windows\System\NgIBGnl.exe2⤵PID:7568
-
-
C:\Windows\System\WEQXUBi.exeC:\Windows\System\WEQXUBi.exe2⤵PID:7596
-
-
C:\Windows\System\nMdVfPe.exeC:\Windows\System\nMdVfPe.exe2⤵PID:7624
-
-
C:\Windows\System\oTCbgQq.exeC:\Windows\System\oTCbgQq.exe2⤵PID:7656
-
-
C:\Windows\System\lgkOEvz.exeC:\Windows\System\lgkOEvz.exe2⤵PID:7680
-
-
C:\Windows\System\OCPIRCb.exeC:\Windows\System\OCPIRCb.exe2⤵PID:7712
-
-
C:\Windows\System\MAunYmI.exeC:\Windows\System\MAunYmI.exe2⤵PID:7756
-
-
C:\Windows\System\HBJjvih.exeC:\Windows\System\HBJjvih.exe2⤵PID:7780
-
-
C:\Windows\System\luqNcaI.exeC:\Windows\System\luqNcaI.exe2⤵PID:7816
-
-
C:\Windows\System\ZYLbfZL.exeC:\Windows\System\ZYLbfZL.exe2⤵PID:7840
-
-
C:\Windows\System\xEgZbdj.exeC:\Windows\System\xEgZbdj.exe2⤵PID:7868
-
-
C:\Windows\System\kDZexeE.exeC:\Windows\System\kDZexeE.exe2⤵PID:7896
-
-
C:\Windows\System\SPCkaTG.exeC:\Windows\System\SPCkaTG.exe2⤵PID:7932
-
-
C:\Windows\System\XSiwQSo.exeC:\Windows\System\XSiwQSo.exe2⤵PID:7972
-
-
C:\Windows\System\EKgVhbr.exeC:\Windows\System\EKgVhbr.exe2⤵PID:8020
-
-
C:\Windows\System\nUBYcpl.exeC:\Windows\System\nUBYcpl.exe2⤵PID:8048
-
-
C:\Windows\System\NGNIRHC.exeC:\Windows\System\NGNIRHC.exe2⤵PID:8084
-
-
C:\Windows\System\zKOOeHy.exeC:\Windows\System\zKOOeHy.exe2⤵PID:8112
-
-
C:\Windows\System\gigIJuk.exeC:\Windows\System\gigIJuk.exe2⤵PID:8136
-
-
C:\Windows\System\bczIkqm.exeC:\Windows\System\bczIkqm.exe2⤵PID:8168
-
-
C:\Windows\System\GsqBFwY.exeC:\Windows\System\GsqBFwY.exe2⤵PID:7140
-
-
C:\Windows\System\bhuvzDk.exeC:\Windows\System\bhuvzDk.exe2⤵PID:7220
-
-
C:\Windows\System\KvCXwpt.exeC:\Windows\System\KvCXwpt.exe2⤵PID:7280
-
-
C:\Windows\System\deJVQyr.exeC:\Windows\System\deJVQyr.exe2⤵PID:7364
-
-
C:\Windows\System\FYYcHkY.exeC:\Windows\System\FYYcHkY.exe2⤵PID:7424
-
-
C:\Windows\System\CGYGzvg.exeC:\Windows\System\CGYGzvg.exe2⤵PID:7500
-
-
C:\Windows\System\XsTJgKH.exeC:\Windows\System\XsTJgKH.exe2⤵PID:7552
-
-
C:\Windows\System\nMNxuzH.exeC:\Windows\System\nMNxuzH.exe2⤵PID:7616
-
-
C:\Windows\System\kTgjhXP.exeC:\Windows\System\kTgjhXP.exe2⤵PID:7676
-
-
C:\Windows\System\Mkxbhlu.exeC:\Windows\System\Mkxbhlu.exe2⤵PID:7764
-
-
C:\Windows\System\EKMIqUY.exeC:\Windows\System\EKMIqUY.exe2⤵PID:7836
-
-
C:\Windows\System\IhhGXfn.exeC:\Windows\System\IhhGXfn.exe2⤵PID:7892
-
-
C:\Windows\System\FFDirnk.exeC:\Windows\System\FFDirnk.exe2⤵PID:8028
-
-
C:\Windows\System\CJvnYto.exeC:\Windows\System\CJvnYto.exe2⤵PID:8076
-
-
C:\Windows\System\PANKbko.exeC:\Windows\System\PANKbko.exe2⤵PID:8148
-
-
C:\Windows\System\uGEZMqT.exeC:\Windows\System\uGEZMqT.exe2⤵PID:7196
-
-
C:\Windows\System\tOsqgKX.exeC:\Windows\System\tOsqgKX.exe2⤵PID:7336
-
-
C:\Windows\System\EtLPzFR.exeC:\Windows\System\EtLPzFR.exe2⤵PID:7508
-
-
C:\Windows\System\pzgmOmf.exeC:\Windows\System\pzgmOmf.exe2⤵PID:7648
-
-
C:\Windows\System\ARYuCBj.exeC:\Windows\System\ARYuCBj.exe2⤵PID:7824
-
-
C:\Windows\System\GlHotZi.exeC:\Windows\System\GlHotZi.exe2⤵PID:8040
-
-
C:\Windows\System\bUlULsN.exeC:\Windows\System\bUlULsN.exe2⤵PID:8188
-
-
C:\Windows\System\sVekaep.exeC:\Windows\System\sVekaep.exe2⤵PID:7476
-
-
C:\Windows\System\fxWzdlr.exeC:\Windows\System\fxWzdlr.exe2⤵PID:7792
-
-
C:\Windows\System\ZUuIFfB.exeC:\Windows\System\ZUuIFfB.exe2⤵PID:7468
-
-
C:\Windows\System\UywUpcA.exeC:\Windows\System\UywUpcA.exe2⤵PID:8104
-
-
C:\Windows\System\ufNtXbl.exeC:\Windows\System\ufNtXbl.exe2⤵PID:8212
-
-
C:\Windows\System\tNorAeG.exeC:\Windows\System\tNorAeG.exe2⤵PID:8240
-
-
C:\Windows\System\siYPWWR.exeC:\Windows\System\siYPWWR.exe2⤵PID:8268
-
-
C:\Windows\System\FIQtqCq.exeC:\Windows\System\FIQtqCq.exe2⤵PID:8296
-
-
C:\Windows\System\jeXXRMe.exeC:\Windows\System\jeXXRMe.exe2⤵PID:8324
-
-
C:\Windows\System\IwSrpCo.exeC:\Windows\System\IwSrpCo.exe2⤵PID:8352
-
-
C:\Windows\System\BCSgSZM.exeC:\Windows\System\BCSgSZM.exe2⤵PID:8380
-
-
C:\Windows\System\JBdwUQm.exeC:\Windows\System\JBdwUQm.exe2⤵PID:8412
-
-
C:\Windows\System\lJmebSK.exeC:\Windows\System\lJmebSK.exe2⤵PID:8444
-
-
C:\Windows\System\GohlRFC.exeC:\Windows\System\GohlRFC.exe2⤵PID:8472
-
-
C:\Windows\System\aOIPOwd.exeC:\Windows\System\aOIPOwd.exe2⤵PID:8500
-
-
C:\Windows\System\BIHbmfj.exeC:\Windows\System\BIHbmfj.exe2⤵PID:8528
-
-
C:\Windows\System\KAUyuYi.exeC:\Windows\System\KAUyuYi.exe2⤵PID:8556
-
-
C:\Windows\System\ePYfYpa.exeC:\Windows\System\ePYfYpa.exe2⤵PID:8584
-
-
C:\Windows\System\erbYKnF.exeC:\Windows\System\erbYKnF.exe2⤵PID:8612
-
-
C:\Windows\System\XsusBbP.exeC:\Windows\System\XsusBbP.exe2⤵PID:8640
-
-
C:\Windows\System\ZUCoqLD.exeC:\Windows\System\ZUCoqLD.exe2⤵PID:8668
-
-
C:\Windows\System\ivtHxdo.exeC:\Windows\System\ivtHxdo.exe2⤵PID:8696
-
-
C:\Windows\System\SMztRnV.exeC:\Windows\System\SMztRnV.exe2⤵PID:8724
-
-
C:\Windows\System\XudzCEk.exeC:\Windows\System\XudzCEk.exe2⤵PID:8756
-
-
C:\Windows\System\jvFKTuw.exeC:\Windows\System\jvFKTuw.exe2⤵PID:8784
-
-
C:\Windows\System\MiPUEwZ.exeC:\Windows\System\MiPUEwZ.exe2⤵PID:8816
-
-
C:\Windows\System\gxzrqNL.exeC:\Windows\System\gxzrqNL.exe2⤵PID:8844
-
-
C:\Windows\System\ggzuMtI.exeC:\Windows\System\ggzuMtI.exe2⤵PID:8860
-
-
C:\Windows\System\ygJLcfU.exeC:\Windows\System\ygJLcfU.exe2⤵PID:8884
-
-
C:\Windows\System\NRYCJeH.exeC:\Windows\System\NRYCJeH.exe2⤵PID:8920
-
-
C:\Windows\System\BSobQPw.exeC:\Windows\System\BSobQPw.exe2⤵PID:8948
-
-
C:\Windows\System\AxSvZAX.exeC:\Windows\System\AxSvZAX.exe2⤵PID:8984
-
-
C:\Windows\System\tQLWlRY.exeC:\Windows\System\tQLWlRY.exe2⤵PID:9012
-
-
C:\Windows\System\oTCGrIT.exeC:\Windows\System\oTCGrIT.exe2⤵PID:9040
-
-
C:\Windows\System\zdiXkvw.exeC:\Windows\System\zdiXkvw.exe2⤵PID:9068
-
-
C:\Windows\System\BzPqOVm.exeC:\Windows\System\BzPqOVm.exe2⤵PID:9096
-
-
C:\Windows\System\AhTyCDs.exeC:\Windows\System\AhTyCDs.exe2⤵PID:9128
-
-
C:\Windows\System\xZvZsIX.exeC:\Windows\System\xZvZsIX.exe2⤵PID:9156
-
-
C:\Windows\System\hNfzSkp.exeC:\Windows\System\hNfzSkp.exe2⤵PID:9184
-
-
C:\Windows\System\ypafmCb.exeC:\Windows\System\ypafmCb.exe2⤵PID:9212
-
-
C:\Windows\System\LoZYROH.exeC:\Windows\System\LoZYROH.exe2⤵PID:8236
-
-
C:\Windows\System\WLIJboB.exeC:\Windows\System\WLIJboB.exe2⤵PID:8308
-
-
C:\Windows\System\IjPWrLN.exeC:\Windows\System\IjPWrLN.exe2⤵PID:8372
-
-
C:\Windows\System\YYyGmVG.exeC:\Windows\System\YYyGmVG.exe2⤵PID:8440
-
-
C:\Windows\System\PvGsQpb.exeC:\Windows\System\PvGsQpb.exe2⤵PID:8512
-
-
C:\Windows\System\dElrdDG.exeC:\Windows\System\dElrdDG.exe2⤵PID:8576
-
-
C:\Windows\System\XhWfGQg.exeC:\Windows\System\XhWfGQg.exe2⤵PID:8636
-
-
C:\Windows\System\Zabstsc.exeC:\Windows\System\Zabstsc.exe2⤵PID:8716
-
-
C:\Windows\System\WFVwZSs.exeC:\Windows\System\WFVwZSs.exe2⤵PID:8752
-
-
C:\Windows\System\dkhsOLW.exeC:\Windows\System\dkhsOLW.exe2⤵PID:8836
-
-
C:\Windows\System\dECNQxm.exeC:\Windows\System\dECNQxm.exe2⤵PID:8904
-
-
C:\Windows\System\XLjkMcX.exeC:\Windows\System\XLjkMcX.exe2⤵PID:8968
-
-
C:\Windows\System\vRGAHzJ.exeC:\Windows\System\vRGAHzJ.exe2⤵PID:9064
-
-
C:\Windows\System\QoLQSWM.exeC:\Windows\System\QoLQSWM.exe2⤵PID:9120
-
-
C:\Windows\System\opZWQjR.exeC:\Windows\System\opZWQjR.exe2⤵PID:9176
-
-
C:\Windows\System\ZrBAZKM.exeC:\Windows\System\ZrBAZKM.exe2⤵PID:8252
-
-
C:\Windows\System\fKQmNWf.exeC:\Windows\System\fKQmNWf.exe2⤵PID:8424
-
-
C:\Windows\System\qDjMZFt.exeC:\Windows\System\qDjMZFt.exe2⤵PID:8540
-
-
C:\Windows\System\MmmzLMn.exeC:\Windows\System\MmmzLMn.exe2⤵PID:8688
-
-
C:\Windows\System\HXKuYgD.exeC:\Windows\System\HXKuYgD.exe2⤵PID:8780
-
-
C:\Windows\System\zLvWskw.exeC:\Windows\System\zLvWskw.exe2⤵PID:9004
-
-
C:\Windows\System\ugJlkpZ.exeC:\Windows\System\ugJlkpZ.exe2⤵PID:9168
-
-
C:\Windows\System\KrnxxVV.exeC:\Windows\System\KrnxxVV.exe2⤵PID:8404
-
-
C:\Windows\System\vYqvPUB.exeC:\Windows\System\vYqvPUB.exe2⤵PID:8812
-
-
C:\Windows\System\yKVPgdw.exeC:\Windows\System\yKVPgdw.exe2⤵PID:8804
-
-
C:\Windows\System\wRXIhcD.exeC:\Windows\System\wRXIhcD.exe2⤵PID:8692
-
-
C:\Windows\System\sLHYLVY.exeC:\Windows\System\sLHYLVY.exe2⤵PID:8976
-
-
C:\Windows\System\qdGyrRV.exeC:\Windows\System\qdGyrRV.exe2⤵PID:9244
-
-
C:\Windows\System\OcOYZjN.exeC:\Windows\System\OcOYZjN.exe2⤵PID:9272
-
-
C:\Windows\System\hLvtYHJ.exeC:\Windows\System\hLvtYHJ.exe2⤵PID:9300
-
-
C:\Windows\System\EdinhMO.exeC:\Windows\System\EdinhMO.exe2⤵PID:9328
-
-
C:\Windows\System\WMlsyXa.exeC:\Windows\System\WMlsyXa.exe2⤵PID:9356
-
-
C:\Windows\System\mDCSDod.exeC:\Windows\System\mDCSDod.exe2⤵PID:9400
-
-
C:\Windows\System\ypVSAbq.exeC:\Windows\System\ypVSAbq.exe2⤵PID:9440
-
-
C:\Windows\System\fYhTdgk.exeC:\Windows\System\fYhTdgk.exe2⤵PID:9468
-
-
C:\Windows\System\oNdYhvJ.exeC:\Windows\System\oNdYhvJ.exe2⤵PID:9512
-
-
C:\Windows\System\kiazRXR.exeC:\Windows\System\kiazRXR.exe2⤵PID:9544
-
-
C:\Windows\System\HdvSTGZ.exeC:\Windows\System\HdvSTGZ.exe2⤵PID:9580
-
-
C:\Windows\System\QQIkSXc.exeC:\Windows\System\QQIkSXc.exe2⤵PID:9608
-
-
C:\Windows\System\AzRlWPk.exeC:\Windows\System\AzRlWPk.exe2⤵PID:9628
-
-
C:\Windows\System\DbTjObN.exeC:\Windows\System\DbTjObN.exe2⤵PID:9660
-
-
C:\Windows\System\kyYDmBd.exeC:\Windows\System\kyYDmBd.exe2⤵PID:9700
-
-
C:\Windows\System\ZSaUkXm.exeC:\Windows\System\ZSaUkXm.exe2⤵PID:9744
-
-
C:\Windows\System\VxirUtD.exeC:\Windows\System\VxirUtD.exe2⤵PID:9772
-
-
C:\Windows\System\DBGwONr.exeC:\Windows\System\DBGwONr.exe2⤵PID:9804
-
-
C:\Windows\System\oCgLUWI.exeC:\Windows\System\oCgLUWI.exe2⤵PID:9844
-
-
C:\Windows\System\CgeypMj.exeC:\Windows\System\CgeypMj.exe2⤵PID:9880
-
-
C:\Windows\System\kFziWbW.exeC:\Windows\System\kFziWbW.exe2⤵PID:9916
-
-
C:\Windows\System\AxbOvpf.exeC:\Windows\System\AxbOvpf.exe2⤵PID:9932
-
-
C:\Windows\System\DRzRpFW.exeC:\Windows\System\DRzRpFW.exe2⤵PID:9972
-
-
C:\Windows\System\zQtEvrP.exeC:\Windows\System\zQtEvrP.exe2⤵PID:9992
-
-
C:\Windows\System\BKxZouG.exeC:\Windows\System\BKxZouG.exe2⤵PID:10008
-
-
C:\Windows\System\KAjvhdj.exeC:\Windows\System\KAjvhdj.exe2⤵PID:10024
-
-
C:\Windows\System\HmwLUSl.exeC:\Windows\System\HmwLUSl.exe2⤵PID:10052
-
-
C:\Windows\System\UvKqQeh.exeC:\Windows\System\UvKqQeh.exe2⤵PID:10080
-
-
C:\Windows\System\MIaNvIe.exeC:\Windows\System\MIaNvIe.exe2⤵PID:10120
-
-
C:\Windows\System\GmbePSp.exeC:\Windows\System\GmbePSp.exe2⤵PID:10148
-
-
C:\Windows\System\WTbjdow.exeC:\Windows\System\WTbjdow.exe2⤵PID:10180
-
-
C:\Windows\System\YZdtOgd.exeC:\Windows\System\YZdtOgd.exe2⤵PID:10212
-
-
C:\Windows\System\KrLCgNK.exeC:\Windows\System\KrLCgNK.exe2⤵PID:8548
-
-
C:\Windows\System\okVHAqS.exeC:\Windows\System\okVHAqS.exe2⤵PID:9292
-
-
C:\Windows\System\ggXAjrA.exeC:\Windows\System\ggXAjrA.exe2⤵PID:9376
-
-
C:\Windows\System\CsZfEDC.exeC:\Windows\System\CsZfEDC.exe2⤵PID:9504
-
-
C:\Windows\System\WGAMlEB.exeC:\Windows\System\WGAMlEB.exe2⤵PID:9588
-
-
C:\Windows\System\PgbeMeP.exeC:\Windows\System\PgbeMeP.exe2⤵PID:9648
-
-
C:\Windows\System\YONLPIi.exeC:\Windows\System\YONLPIi.exe2⤵PID:9732
-
-
C:\Windows\System\SNYtrPC.exeC:\Windows\System\SNYtrPC.exe2⤵PID:9832
-
-
C:\Windows\System\QnSLSGG.exeC:\Windows\System\QnSLSGG.exe2⤵PID:9868
-
-
C:\Windows\System\nIyuBLX.exeC:\Windows\System\nIyuBLX.exe2⤵PID:9952
-
-
C:\Windows\System\nsWUZAA.exeC:\Windows\System\nsWUZAA.exe2⤵PID:9980
-
-
C:\Windows\System\thEKWtl.exeC:\Windows\System\thEKWtl.exe2⤵PID:10076
-
-
C:\Windows\System\cLAyigF.exeC:\Windows\System\cLAyigF.exe2⤵PID:10132
-
-
C:\Windows\System\BFQmtLR.exeC:\Windows\System\BFQmtLR.exe2⤵PID:10204
-
-
C:\Windows\System\tboAPFv.exeC:\Windows\System\tboAPFv.exe2⤵PID:9256
-
-
C:\Windows\System\DElLqEt.exeC:\Windows\System\DElLqEt.exe2⤵PID:9568
-
-
C:\Windows\System\NdxKzpR.exeC:\Windows\System\NdxKzpR.exe2⤵PID:9616
-
-
C:\Windows\System\pINSMVk.exeC:\Windows\System\pINSMVk.exe2⤵PID:9828
-
-
C:\Windows\System\ldKiDBa.exeC:\Windows\System\ldKiDBa.exe2⤵PID:9988
-
-
C:\Windows\System\BRUgayc.exeC:\Windows\System\BRUgayc.exe2⤵PID:10200
-
-
C:\Windows\System\IQlZNGP.exeC:\Windows\System\IQlZNGP.exe2⤵PID:9424
-
-
C:\Windows\System\xzEVxpw.exeC:\Windows\System\xzEVxpw.exe2⤵PID:9796
-
-
C:\Windows\System\cwRYuNo.exeC:\Windows\System\cwRYuNo.exe2⤵PID:9268
-
-
C:\Windows\System\UoSbRWj.exeC:\Windows\System\UoSbRWj.exe2⤵PID:10092
-
-
C:\Windows\System\FZZteva.exeC:\Windows\System\FZZteva.exe2⤵PID:10260
-
-
C:\Windows\System\pveTLHQ.exeC:\Windows\System\pveTLHQ.exe2⤵PID:10292
-
-
C:\Windows\System\AZJeBhO.exeC:\Windows\System\AZJeBhO.exe2⤵PID:10316
-
-
C:\Windows\System\QZfXeUd.exeC:\Windows\System\QZfXeUd.exe2⤵PID:10332
-
-
C:\Windows\System\sOudFTg.exeC:\Windows\System\sOudFTg.exe2⤵PID:10356
-
-
C:\Windows\System\RtyltLf.exeC:\Windows\System\RtyltLf.exe2⤵PID:10376
-
-
C:\Windows\System\rqnBBmx.exeC:\Windows\System\rqnBBmx.exe2⤵PID:10400
-
-
C:\Windows\System\gBKosIK.exeC:\Windows\System\gBKosIK.exe2⤵PID:10452
-
-
C:\Windows\System\WrIAxxM.exeC:\Windows\System\WrIAxxM.exe2⤵PID:10492
-
-
C:\Windows\System\twGArhS.exeC:\Windows\System\twGArhS.exe2⤵PID:10516
-
-
C:\Windows\System\SkQGeIE.exeC:\Windows\System\SkQGeIE.exe2⤵PID:10540
-
-
C:\Windows\System\nQTYxwA.exeC:\Windows\System\nQTYxwA.exe2⤵PID:10568
-
-
C:\Windows\System\gKUzEHl.exeC:\Windows\System\gKUzEHl.exe2⤵PID:10596
-
-
C:\Windows\System\rnLsPIw.exeC:\Windows\System\rnLsPIw.exe2⤵PID:10624
-
-
C:\Windows\System\TmTPgbW.exeC:\Windows\System\TmTPgbW.exe2⤵PID:10664
-
-
C:\Windows\System\mVterrJ.exeC:\Windows\System\mVterrJ.exe2⤵PID:10692
-
-
C:\Windows\System\VMAtzZF.exeC:\Windows\System\VMAtzZF.exe2⤵PID:10720
-
-
C:\Windows\System\xjtNUqS.exeC:\Windows\System\xjtNUqS.exe2⤵PID:10748
-
-
C:\Windows\System\woLrEHf.exeC:\Windows\System\woLrEHf.exe2⤵PID:10776
-
-
C:\Windows\System\NLMuqPw.exeC:\Windows\System\NLMuqPw.exe2⤵PID:10796
-
-
C:\Windows\System\IooOkjD.exeC:\Windows\System\IooOkjD.exe2⤵PID:10832
-
-
C:\Windows\System\UQnDSdo.exeC:\Windows\System\UQnDSdo.exe2⤵PID:10852
-
-
C:\Windows\System\SpzshcX.exeC:\Windows\System\SpzshcX.exe2⤵PID:10880
-
-
C:\Windows\System\JzbPaIf.exeC:\Windows\System\JzbPaIf.exe2⤵PID:10908
-
-
C:\Windows\System\qdOIYeI.exeC:\Windows\System\qdOIYeI.exe2⤵PID:10932
-
-
C:\Windows\System\IuSkYOZ.exeC:\Windows\System\IuSkYOZ.exe2⤵PID:10968
-
-
C:\Windows\System\wUsGwLn.exeC:\Windows\System\wUsGwLn.exe2⤵PID:11000
-
-
C:\Windows\System\tUoghwb.exeC:\Windows\System\tUoghwb.exe2⤵PID:11036
-
-
C:\Windows\System\uzoRpFL.exeC:\Windows\System\uzoRpFL.exe2⤵PID:11056
-
-
C:\Windows\System\JxOsxAQ.exeC:\Windows\System\JxOsxAQ.exe2⤵PID:11092
-
-
C:\Windows\System\QcYwmxU.exeC:\Windows\System\QcYwmxU.exe2⤵PID:11108
-
-
C:\Windows\System\HJPIeOm.exeC:\Windows\System\HJPIeOm.exe2⤵PID:11148
-
-
C:\Windows\System\skoGAFW.exeC:\Windows\System\skoGAFW.exe2⤵PID:11176
-
-
C:\Windows\System\BoatWCP.exeC:\Windows\System\BoatWCP.exe2⤵PID:11200
-
-
C:\Windows\System\hSWcPyG.exeC:\Windows\System\hSWcPyG.exe2⤵PID:11232
-
-
C:\Windows\System\BvvzWrg.exeC:\Windows\System\BvvzWrg.exe2⤵PID:9676
-
-
C:\Windows\System\tasDzbR.exeC:\Windows\System\tasDzbR.exe2⤵PID:10256
-
-
C:\Windows\System\gWJqLeR.exeC:\Windows\System\gWJqLeR.exe2⤵PID:10308
-
-
C:\Windows\System\PMvlFWf.exeC:\Windows\System\PMvlFWf.exe2⤵PID:10352
-
-
C:\Windows\System\qnhlGIZ.exeC:\Windows\System\qnhlGIZ.exe2⤵PID:10412
-
-
C:\Windows\System\pQGfXEb.exeC:\Windows\System\pQGfXEb.exe2⤵PID:10508
-
-
C:\Windows\System\GaPqvHu.exeC:\Windows\System\GaPqvHu.exe2⤵PID:10552
-
-
C:\Windows\System\fJVfwWZ.exeC:\Windows\System\fJVfwWZ.exe2⤵PID:10636
-
-
C:\Windows\System\fbeQeQR.exeC:\Windows\System\fbeQeQR.exe2⤵PID:10704
-
-
C:\Windows\System\CpoAHrS.exeC:\Windows\System\CpoAHrS.exe2⤵PID:10760
-
-
C:\Windows\System\wjiMFmB.exeC:\Windows\System\wjiMFmB.exe2⤵PID:10844
-
-
C:\Windows\System\oVNCAyp.exeC:\Windows\System\oVNCAyp.exe2⤵PID:10896
-
-
C:\Windows\System\dFEPiOe.exeC:\Windows\System\dFEPiOe.exe2⤵PID:10980
-
-
C:\Windows\System\XDVtuIz.exeC:\Windows\System\XDVtuIz.exe2⤵PID:11048
-
-
C:\Windows\System\dWxFGnE.exeC:\Windows\System\dWxFGnE.exe2⤵PID:11104
-
-
C:\Windows\System\IeIbrdr.exeC:\Windows\System\IeIbrdr.exe2⤵PID:11172
-
-
C:\Windows\System\xNFXKxB.exeC:\Windows\System\xNFXKxB.exe2⤵PID:11228
-
-
C:\Windows\System\kjiSiFM.exeC:\Windows\System\kjiSiFM.exe2⤵PID:10272
-
-
C:\Windows\System\QHtEQbG.exeC:\Windows\System\QHtEQbG.exe2⤵PID:10384
-
-
C:\Windows\System\jmceQAF.exeC:\Windows\System\jmceQAF.exe2⤵PID:10608
-
-
C:\Windows\System\FCrYvTE.exeC:\Windows\System\FCrYvTE.exe2⤵PID:10716
-
-
C:\Windows\System\tkuJvUh.exeC:\Windows\System\tkuJvUh.exe2⤵PID:10928
-
-
C:\Windows\System\SHrZCso.exeC:\Windows\System\SHrZCso.exe2⤵PID:10952
-
-
C:\Windows\System\XgbeLge.exeC:\Windows\System\XgbeLge.exe2⤵PID:11224
-
-
C:\Windows\System\xNizRzY.exeC:\Windows\System\xNizRzY.exe2⤵PID:10372
-
-
C:\Windows\System\JTuFHLi.exeC:\Windows\System\JTuFHLi.exe2⤵PID:10676
-
-
C:\Windows\System\LWeopAa.exeC:\Windows\System\LWeopAa.exe2⤵PID:10684
-
-
C:\Windows\System\xlTFzYp.exeC:\Windows\System\xlTFzYp.exe2⤵PID:11292
-
-
C:\Windows\System\AgsWSRm.exeC:\Windows\System\AgsWSRm.exe2⤵PID:11312
-
-
C:\Windows\System\dwbOQbX.exeC:\Windows\System\dwbOQbX.exe2⤵PID:11328
-
-
C:\Windows\System\NbUdbJw.exeC:\Windows\System\NbUdbJw.exe2⤵PID:11360
-
-
C:\Windows\System\vnKbJFb.exeC:\Windows\System\vnKbJFb.exe2⤵PID:11388
-
-
C:\Windows\System\gMGiXED.exeC:\Windows\System\gMGiXED.exe2⤵PID:11424
-
-
C:\Windows\System\JzKjnPO.exeC:\Windows\System\JzKjnPO.exe2⤵PID:11456
-
-
C:\Windows\System\dCEKsKZ.exeC:\Windows\System\dCEKsKZ.exe2⤵PID:11492
-
-
C:\Windows\System\aOHUrVp.exeC:\Windows\System\aOHUrVp.exe2⤵PID:11536
-
-
C:\Windows\System\wIrmjyR.exeC:\Windows\System\wIrmjyR.exe2⤵PID:11556
-
-
C:\Windows\System\JWBnFyo.exeC:\Windows\System\JWBnFyo.exe2⤵PID:11572
-
-
C:\Windows\System\uBqZCFo.exeC:\Windows\System\uBqZCFo.exe2⤵PID:11616
-
-
C:\Windows\System\syGubBj.exeC:\Windows\System\syGubBj.exe2⤵PID:11644
-
-
C:\Windows\System\JfkJCyD.exeC:\Windows\System\JfkJCyD.exe2⤵PID:11676
-
-
C:\Windows\System\DiNsdYE.exeC:\Windows\System\DiNsdYE.exe2⤵PID:11700
-
-
C:\Windows\System\YklhSYS.exeC:\Windows\System\YklhSYS.exe2⤵PID:11728
-
-
C:\Windows\System\OXFEhMj.exeC:\Windows\System\OXFEhMj.exe2⤵PID:11756
-
-
C:\Windows\System\ZcTAPjF.exeC:\Windows\System\ZcTAPjF.exe2⤵PID:11792
-
-
C:\Windows\System\hkzLmNQ.exeC:\Windows\System\hkzLmNQ.exe2⤵PID:11812
-
-
C:\Windows\System\RIwpsrI.exeC:\Windows\System\RIwpsrI.exe2⤵PID:11836
-
-
C:\Windows\System\GKsWEsV.exeC:\Windows\System\GKsWEsV.exe2⤵PID:11872
-
-
C:\Windows\System\cdvhSOu.exeC:\Windows\System\cdvhSOu.exe2⤵PID:11900
-
-
C:\Windows\System\MKpyNoX.exeC:\Windows\System\MKpyNoX.exe2⤵PID:11932
-
-
C:\Windows\System\arFSEsm.exeC:\Windows\System\arFSEsm.exe2⤵PID:11956
-
-
C:\Windows\System\adyWYlN.exeC:\Windows\System\adyWYlN.exe2⤵PID:11972
-
-
C:\Windows\System\CNVRlcj.exeC:\Windows\System\CNVRlcj.exe2⤵PID:12000
-
-
C:\Windows\System\ieZWpka.exeC:\Windows\System\ieZWpka.exe2⤵PID:12016
-
-
C:\Windows\System\QTeBOIQ.exeC:\Windows\System\QTeBOIQ.exe2⤵PID:12044
-
-
C:\Windows\System\HgCEQoV.exeC:\Windows\System\HgCEQoV.exe2⤵PID:12080
-
-
C:\Windows\System\uIlbemc.exeC:\Windows\System\uIlbemc.exe2⤵PID:12104
-
-
C:\Windows\System\QXCqqIA.exeC:\Windows\System\QXCqqIA.exe2⤵PID:12144
-
-
C:\Windows\System\onbCRfu.exeC:\Windows\System\onbCRfu.exe2⤵PID:12184
-
-
C:\Windows\System\EHQQcbQ.exeC:\Windows\System\EHQQcbQ.exe2⤵PID:12224
-
-
C:\Windows\System\zVkLcQZ.exeC:\Windows\System\zVkLcQZ.exe2⤵PID:12248
-
-
C:\Windows\System\dLOXgro.exeC:\Windows\System\dLOXgro.exe2⤵PID:12268
-
-
C:\Windows\System\iEwoAhw.exeC:\Windows\System\iEwoAhw.exe2⤵PID:10956
-
-
C:\Windows\System\kYSlAqj.exeC:\Windows\System\kYSlAqj.exe2⤵PID:11304
-
-
C:\Windows\System\JYUUjys.exeC:\Windows\System\JYUUjys.exe2⤵PID:11376
-
-
C:\Windows\System\SdMYBHj.exeC:\Windows\System\SdMYBHj.exe2⤵PID:11320
-
-
C:\Windows\System\CtocVfN.exeC:\Windows\System\CtocVfN.exe2⤵PID:11508
-
-
C:\Windows\System\boTYMqz.exeC:\Windows\System\boTYMqz.exe2⤵PID:11520
-
-
C:\Windows\System\ZzSFAZN.exeC:\Windows\System\ZzSFAZN.exe2⤵PID:11632
-
-
C:\Windows\System\sltRyhf.exeC:\Windows\System\sltRyhf.exe2⤵PID:11684
-
-
C:\Windows\System\SdRWOuw.exeC:\Windows\System\SdRWOuw.exe2⤵PID:11740
-
-
C:\Windows\System\ntoxBhy.exeC:\Windows\System\ntoxBhy.exe2⤵PID:11804
-
-
C:\Windows\System\ueKTRvi.exeC:\Windows\System\ueKTRvi.exe2⤵PID:11896
-
-
C:\Windows\System\fiGLjSG.exeC:\Windows\System\fiGLjSG.exe2⤵PID:11924
-
-
C:\Windows\System\WfbNhKs.exeC:\Windows\System\WfbNhKs.exe2⤵PID:11992
-
-
C:\Windows\System\ukJCJDV.exeC:\Windows\System\ukJCJDV.exe2⤵PID:12116
-
-
C:\Windows\System\RbJJweK.exeC:\Windows\System\RbJJweK.exe2⤵PID:12156
-
-
C:\Windows\System\USgAntb.exeC:\Windows\System\USgAntb.exe2⤵PID:12240
-
-
C:\Windows\System\HvkVImb.exeC:\Windows\System\HvkVImb.exe2⤵PID:12280
-
-
C:\Windows\System\bbAmTHo.exeC:\Windows\System\bbAmTHo.exe2⤵PID:11484
-
-
C:\Windows\System\TGSpjLB.exeC:\Windows\System\TGSpjLB.exe2⤵PID:11564
-
-
C:\Windows\System\sRaGgqc.exeC:\Windows\System\sRaGgqc.exe2⤵PID:11660
-
-
C:\Windows\System\gDMUdYO.exeC:\Windows\System\gDMUdYO.exe2⤵PID:11748
-
-
C:\Windows\System\dSToeCR.exeC:\Windows\System\dSToeCR.exe2⤵PID:4596
-
-
C:\Windows\System\gCJnaNy.exeC:\Windows\System\gCJnaNy.exe2⤵PID:11948
-
-
C:\Windows\System\MTHBMdj.exeC:\Windows\System\MTHBMdj.exe2⤵PID:12064
-
-
C:\Windows\System\tmANYeO.exeC:\Windows\System\tmANYeO.exe2⤵PID:12264
-
-
C:\Windows\System\RtiuyHP.exeC:\Windows\System\RtiuyHP.exe2⤵PID:11448
-
-
C:\Windows\System\gNjiwhu.exeC:\Windows\System\gNjiwhu.exe2⤵PID:3892
-
-
C:\Windows\System\JYhwoUM.exeC:\Windows\System\JYhwoUM.exe2⤵PID:11984
-
-
C:\Windows\System\NHGJijz.exeC:\Windows\System\NHGJijz.exe2⤵PID:10556
-
-
C:\Windows\System\kHlAVVM.exeC:\Windows\System\kHlAVVM.exe2⤵PID:11784
-
-
C:\Windows\System\FOblFjF.exeC:\Windows\System\FOblFjF.exe2⤵PID:11356
-
-
C:\Windows\System\gOAZIJm.exeC:\Windows\System\gOAZIJm.exe2⤵PID:12324
-
-
C:\Windows\System\YjlFvBj.exeC:\Windows\System\YjlFvBj.exe2⤵PID:12356
-
-
C:\Windows\System\OoMKgFU.exeC:\Windows\System\OoMKgFU.exe2⤵PID:12392
-
-
C:\Windows\System\sOhuZue.exeC:\Windows\System\sOhuZue.exe2⤵PID:12420
-
-
C:\Windows\System\qpJrTjY.exeC:\Windows\System\qpJrTjY.exe2⤵PID:12444
-
-
C:\Windows\System\tuAOqZX.exeC:\Windows\System\tuAOqZX.exe2⤵PID:12464
-
-
C:\Windows\System\nrzwxWK.exeC:\Windows\System\nrzwxWK.exe2⤵PID:12496
-
-
C:\Windows\System\VRtcRVP.exeC:\Windows\System\VRtcRVP.exe2⤵PID:12520
-
-
C:\Windows\System\OtKUYKm.exeC:\Windows\System\OtKUYKm.exe2⤵PID:12560
-
-
C:\Windows\System\maNfKDd.exeC:\Windows\System\maNfKDd.exe2⤵PID:12576
-
-
C:\Windows\System\GeSqumi.exeC:\Windows\System\GeSqumi.exe2⤵PID:12592
-
-
C:\Windows\System\yyJgzPF.exeC:\Windows\System\yyJgzPF.exe2⤵PID:12612
-
-
C:\Windows\System\mBLBNNK.exeC:\Windows\System\mBLBNNK.exe2⤵PID:12664
-
-
C:\Windows\System\ObRKncV.exeC:\Windows\System\ObRKncV.exe2⤵PID:12688
-
-
C:\Windows\System\ksDbiXG.exeC:\Windows\System\ksDbiXG.exe2⤵PID:12716
-
-
C:\Windows\System\pZzGGKR.exeC:\Windows\System\pZzGGKR.exe2⤵PID:12732
-
-
C:\Windows\System\kfKPJmA.exeC:\Windows\System\kfKPJmA.exe2⤵PID:12764
-
-
C:\Windows\System\LpTKAfQ.exeC:\Windows\System\LpTKAfQ.exe2⤵PID:12824
-
-
C:\Windows\System\htrwOZP.exeC:\Windows\System\htrwOZP.exe2⤵PID:12840
-
-
C:\Windows\System\isZiTzC.exeC:\Windows\System\isZiTzC.exe2⤵PID:12868
-
-
C:\Windows\System\xjkKMZu.exeC:\Windows\System\xjkKMZu.exe2⤵PID:12884
-
-
C:\Windows\System\MQxEkfM.exeC:\Windows\System\MQxEkfM.exe2⤵PID:12920
-
-
C:\Windows\System\wYxRpoK.exeC:\Windows\System\wYxRpoK.exe2⤵PID:12952
-
-
C:\Windows\System\zSlCcdv.exeC:\Windows\System\zSlCcdv.exe2⤵PID:12980
-
-
C:\Windows\System\oPMxmgj.exeC:\Windows\System\oPMxmgj.exe2⤵PID:13016
-
-
C:\Windows\System\DINMgxV.exeC:\Windows\System\DINMgxV.exe2⤵PID:13052
-
-
C:\Windows\System\QSpxuBU.exeC:\Windows\System\QSpxuBU.exe2⤵PID:13092
-
-
C:\Windows\System\vUDsbmS.exeC:\Windows\System\vUDsbmS.exe2⤵PID:13120
-
-
C:\Windows\System\UZSeXLI.exeC:\Windows\System\UZSeXLI.exe2⤵PID:13144
-
-
C:\Windows\System\vfGAcuv.exeC:\Windows\System\vfGAcuv.exe2⤵PID:13180
-
-
C:\Windows\System\LbHtjfl.exeC:\Windows\System\LbHtjfl.exe2⤵PID:13208
-
-
C:\Windows\System\gGiExzs.exeC:\Windows\System\gGiExzs.exe2⤵PID:13224
-
-
C:\Windows\System\OmjOWir.exeC:\Windows\System\OmjOWir.exe2⤵PID:13252
-
-
C:\Windows\System\CRlceaM.exeC:\Windows\System\CRlceaM.exe2⤵PID:13276
-
-
C:\Windows\System\wIQcYCv.exeC:\Windows\System\wIQcYCv.exe2⤵PID:12168
-
-
C:\Windows\System\AoUfeIH.exeC:\Windows\System\AoUfeIH.exe2⤵PID:12384
-
-
C:\Windows\System\wiRUmTJ.exeC:\Windows\System\wiRUmTJ.exe2⤵PID:12436
-
-
C:\Windows\System\QtpmXsx.exeC:\Windows\System\QtpmXsx.exe2⤵PID:12484
-
-
C:\Windows\System\RBbMVxB.exeC:\Windows\System\RBbMVxB.exe2⤵PID:12512
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:11672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.0MB
MD5d5102bec5239e191350c3945bb53fce1
SHA17f481c3225622678b3681c054d5aab62147d0532
SHA25625bd45139a1332d9ed3cc484673f764acc81cabc85425c010aa4f65dd4d287fb
SHA51229ebdbbbb34e55aa8ee976b2109b4aee1571fa4fc6e646512fbbc89b6b2d080b3af9eec975540c98421e77aa0e536656bb2efdfe84f401420e024a114ea179c2
-
Filesize
3.0MB
MD522b821f44b852bc0190b05c059b38615
SHA199505ae2e2fa4539d7b42ed6cf57d68e507a9dd0
SHA25684dfbe9d28109c9585368f260fb1ec27aa5eb7cb9128e07b9e218500a0a05aa3
SHA51225615215dc9f11848055dc76b52137e769ecd989ecd86a39016d397e7dbd2022e2abb0a10341a47d164db56a23d4be069dd267af0d812efce189a76c0beed446
-
Filesize
3.0MB
MD5e3d6d407516e07006589e2792edaba0e
SHA1bda1327aea2ebe2568b988813c886a8fa37b2366
SHA2567307676001b522a1fc78d9defc2a90e0cfb8fca245190e42ea6c33e247bf63f7
SHA512284ec07080039075ec2f8853b2420d33e9ca6bb562d2002e449c9f0b2f89068882a94f16ff6ec76e7baaba68e45b1a3e7ff98dbf2d9a881552794d97a6c50011
-
Filesize
3.0MB
MD5092a0d31dd8efbe42f9f0df137e82ccb
SHA1fc46ea072d7fb2b300fb6779c01a818563a2f456
SHA25658a18e4b56e56c26cb315442485c788c5841e0b3a51ccd1bbd657a67a7b0528a
SHA51208c86d0d08d11099bd9f552c1d8ae42680f37cc856e9fe3a77e37789147e6a4da4fd2a5052621142eb0fd164c943eb5ff38a3010eb3175d45b36ae7708481f47
-
Filesize
3.0MB
MD562acbbf393f5f20eaab8df0fcbb8fcf1
SHA1365eb36daa89bb276a901d37424e28c128ede3e8
SHA256fac405d7e37dfd989bf7f05efdf913085300e35fc8427a3ce9f4b81e6a7d21a9
SHA512dd301f53339e61ee991a1b3c3e5e7b559e7e9e52b1e501290093a2c695f59c6b750f0c057b7b113dac15c308be47f81e9fea804b8bdad86c261ceec03c3f6a36
-
Filesize
3.0MB
MD57ba6fe61ad74d4d7896bcb326491960f
SHA1903ff7abb781bb1a5d5ddfd0a713dbcc8531973d
SHA256a2a799ed195485334d1209cedf5da136b7b140bcccf370499245d3c05fb23751
SHA5121a0655cf76b535650239c6f4815e3ba1f1a038aabb5dc2e172a75ca9d971626430b3500abbd2b81461e05ec44b0aab95c36ceb58d379bbe637f7c10b82c8432b
-
Filesize
3.0MB
MD5f908ca518db661ec8b0daa6cb793e76d
SHA16300aee7fb3d83cdad091634f1d62cba7eccfdc5
SHA256a2bb69346b96ba632e2c75e29e7b8f3dd823c7cbaac905d58c32b3c716271455
SHA5125f17a063e3ea33490895dd00ed8587c86de1ca974f335b93177d58aad390aa2a6b24f1c3eede5f6229265c89a6f78af3b7565cbadae48817384442a34ece5c1f
-
Filesize
3.0MB
MD597674ebe027f5d4ff2a86e4195147187
SHA145da11b0db961d658879774614b3fd6ea0dfd42a
SHA25609a4e7f832cca03948102ce9169b9fcff4418f97edfcf190f5d5115c5d6e1772
SHA512a7f5a3752c85ce50e563b3928b9906683864abedb18b7e9a172765fa968a412da4d941548487b1ac52cbdd5403ff18a518f9ac04c7fd17c16c1f09014122dccb
-
Filesize
3.0MB
MD5db7a137141ce8b0883c662f7ec47efc5
SHA1b190d11e4798ed3dcb867b87a78dd95caf4d3c38
SHA25606989180656f6b9f3cecc947880cca003d794d5c7636a1a107c5afa33a1b742e
SHA512fc444577a666e564e90ec6bb1a1783db5abb00aa22f0bae833073dc5d3bd701f359f53b7ab7cf5dc1fe1e4010cc71792ce3c276d90ea9c4a4c907cfa54122281
-
Filesize
3.0MB
MD58fb923d32afa3ab60e9fdfe15540475c
SHA1523193880f2ed157da67a0143b0a7af0e91d014f
SHA256f7088ac8209054b08ccf7ba56b0495ce113cc9b99a0aa206de02173f450de44b
SHA512b35eea0c8d4cc887e870360d86acf4c73e6cbda017b434ac1877d4ed34be704243f9bb52add61a7cec8c91088cd3c9e4b933011cadd0b392de7dbba9633383c4
-
Filesize
3.0MB
MD52658d8f4d9841b2618785b3aef87023a
SHA1fd5378af8917d07a1a694947f7dbb34876813d86
SHA25672de4f2baf837fe94f8d9c1b7185761462cebdfb10a10c17f4075bb4bc4507e3
SHA512989a90b83041ea781e1417c1862c7dcaa205befacdac9707d0b87e7426568a93e86a94c3e1d8f67a02ab18c39c7f77e227d02de7df4c65667d8f660ae30805f3
-
Filesize
3.0MB
MD5ddabb17b213fb7773e946407dcee711f
SHA1f9b5cedb2692d4221636af82054971f92a855656
SHA2565d586369efbe9b525194e7299e203ab1f5426799e94d2bf1ebda57d72c9526c7
SHA51250c06a9f593e01b801bc687cd9d066e235770732909a5b7391f2f64973e4add26cf9ab7f622bfc53e9d934e0471bd80854ce833544dacc0965184cbf023058a1
-
Filesize
3.0MB
MD57e792d957fca02068468f956495c468a
SHA17c6a2033d4694129d491df510080111de37d1dd0
SHA2568a8c324516b00617a3d9ec863daca2e72bab026b8c9379be8435be33d3112e44
SHA51201abe4f8bff3c2e7d35f556d2964135de091a55057abe5ac52c6ef0595a3183fa562e5dbd8e97de1c6cd24b1e96c4c4d6d1c765d651e1db238724d2749b1d747
-
Filesize
3.0MB
MD5f759cb0fbd0f92bf8a53ff60ca1aaf84
SHA1683ec1f4db9868aeb715b551db8814c2a636c9c5
SHA2565dc9e32aabba1626b578620dc76dcecc80968b8b3470b4560b2aef05d1d0079d
SHA512bc445de1165d4911e59f8486f9b3d8dea1fbee180bede6fdb654a8d7ac16bb663f364e2019edb90549cf85a57836d953f10a00ad486ea96a74fa00e67161a601
-
Filesize
8B
MD567d893d1a2095d39d451d08ee1cc05e9
SHA1dad7ef4487e41ff3c3e600250e691ed16832dc94
SHA256cc871666e89dd430f5e3dc9cc361cd1a4ecf7214b4b8daeb86cca2257079f3ce
SHA5127799e4db272ac6c136cb55f2e50c1582a5027767dc6d148dbf159fdb6f776a047cf2ac573fbb2f2ca5a994173cf0465c93ef3f6e6c86e8981136e854def9801d
-
Filesize
3.0MB
MD5d988ceb28fe54da1bf5d443cd49aef4f
SHA1f485aa5d8837d184fdf66659b54facdfd355e8bc
SHA25655c988356fae2ac349099fbe22c37e82c65f9aff15eda1e0c8fb516c2767f5d4
SHA51280a6b8f25a4b468a9dca942c53e40d91d8fa293ba09d9b0d7e8db54991fc5bd980350b4539850e5cf338dcae1c5e95a3fef37236590ac48f893bac659a3c49b7
-
Filesize
3.0MB
MD5d51cd63325d716b8519c199e91906bd4
SHA1d86841b483c1ce2e719a50dce41d72b04f4fca02
SHA256bbb53bea3bcade97dad09f57c0cb16cb714ec40d033614c52a830dc3b118d10e
SHA512d0c5c1ff5f2ddb7d451f3927f72f995e841a4118b30d48d4695ab1b819cda6fca7ab7558784da4aeb5b5900548a6a551bec2563d9fffdbfc21e0bb66133fee8c
-
Filesize
3.0MB
MD5b9c4864131ccaf6aff526226836f19e5
SHA18b94a1e11184238bc2512312a4bb0bcdd2606fd7
SHA25648df071d73d508eaf32da8459096506bff1217f4ab2a26f443afb7c9fd11226d
SHA512132bf93be2f117142fac2c40e34b1fb30a19f6f457625cd377c2f69d02d64080a2e5489fea80a8c23e93bbb86c8fed8bea03f1c99d2f7e0e1dc9efa1edc50b5c
-
Filesize
3.0MB
MD58fc37ed69206571ed509fd67bc62d194
SHA1d88414e3bc98f009497dbf572b6306b2af8b06c9
SHA25625b9b6167b96487942d730ac4ad9e236a1a4c1b94a2b4e46d9498ba070f4780e
SHA5127adcbda8f605bfffda803dd3837c38c1da5433a97c35e098ed7de5d3c9246a348c6f6ce038585708a2542cbab865dc4d0b80b579ec90e5314fc6baedd238cf57
-
Filesize
3.0MB
MD56a60b9ffe2e398aa5e2d4ca89f919782
SHA181649f8ba90c0d1a4431a7b527c01df540526fb6
SHA2563c6887d556371ffdf4068548d5a3d8daba79993a9c691d703d699048ec209c00
SHA512a1bc440129ce556f287b4f297ff4d739d01d691b995fb1d50af696291cc820416b9a34873099eea3cee4a8949279e4e10c72ef00e9a2cb24e1b916a95fbb092a
-
Filesize
3.0MB
MD5277c88f8ccbc01bb6ff82f1fdc809b5c
SHA152db9a3baa18c3a1ac33215a5d96d8e08b20fac6
SHA2567028946d7726438f2c18b36aa8bcdaf942cb578b09652c2e48b55e7b98bff872
SHA512bd3c08fc3cbe4912a59f2a41ebd3c4b9979b65200482dc7cea3913b3163a55d3be0a47ef65566dc142d2f0b0a2a5e06163fa25ef67bee8c1f824f07e3b193ab5
-
Filesize
3.0MB
MD52542cfad7267d2458d2e203283908023
SHA15ea91e3cbd4ce6adf981ab7ff09fdbca386e8a35
SHA25606217e28da4944b50fc4c26289b8cb374f1bd6210450100a25a3c27b341aaae0
SHA51220596693e05d92ba8282804077c6d1c1b7ea715b9d731f4a38ca471a7348026d4e3c8bce054008c4282fee94d8ecbbd44f876088d041a10a1af09232dc2f0cc7
-
Filesize
3.0MB
MD5fa5b80ed2b0c6b087ea9b8ca58b8acde
SHA1cdf37e40d451556f4ef7e824d67b466e85d33dcf
SHA256b439e4df39099aa9e14c00da81f630c55ccb02bfc5a67c4bd4356ee9ade6d5b3
SHA512faa7c9bf47d81ce74a973e3160546353bf4b907fe284cb84f9e0a8a203c92d1ef7381f5c0530582eddfbb7937d5492282febfaac79a9f115bbfef99bff4c561a
-
Filesize
3.0MB
MD515867538fb23d3846861ed7b47bcf678
SHA1614bf45acefbb99cc826b3fab55e554123181658
SHA256e4765b6f66d579a8ed2749aeed7aada3633dee704ac7fadf68938b0ff0ed57e8
SHA512047bdf51b9a9eb22eed8f0aa0f54ed6e31951a00b24eaa32ad7cc2e9b6809a68207d114f2c157cb358a9e9bbe5cb628cbed6b0acf82de9d207bdb1cb461bc9be
-
Filesize
3.0MB
MD5a459b614d0bf02daaba0b3babd8aae2c
SHA121fa1a783ce5bb0257130f079650d080d11db765
SHA2563f66c47e15ae6bcf33b4f304d2fa34b940695437825c4b2574b48beef3ef0dc1
SHA512406eb69fdd50ac145b26bb58d4a5852045b2ce3e38ed3e3fb68fa988b846f099afb3c8bdc9760e441569b25a5469ae79d4837ce75aa41218e3c28c468afaf474
-
Filesize
3.0MB
MD530f5b9c93618338748cbc679d9f6b42f
SHA1a76c1d27a0b507091f1e73fcbaba464a73af2336
SHA2565614cdcb4c6ab5bf0dfb54cec62b310161502b36c26ae1f93a8921c700be59fb
SHA512fd605f8f01efcb5839a71b925ee3f87ab6a4dfbe3fb777f06b80547a2dc3c42cea3f44eef4fb5bdd9eff631e0095428f7b8424151ddb8e8ada120188d644ee5d
-
Filesize
3.0MB
MD5e0e2a41b0ad3720cb849e2cd79b091a7
SHA15b85dc03253f49a435b47aeef4b5c1504971339c
SHA256427f5ae1ab62ef08ca0a0d2df2de920fe6a9350f8e596800d6c879d0f9c65583
SHA5123e734aa52db032f30de4c58eb1b78c2ad05bff8982a14865c9efc19bae29c78868fe5442b3a2a58104e4d987f831d3a99eed66ac37ce5e143e24bfba47b9eda6
-
Filesize
3.0MB
MD517c055a44bfa7e09cf20c4e3353ec19d
SHA17b4835a6cad8c0885109e3c9ad70100f00c306fc
SHA256717bd4588fb8406bd48cba5592e25a6bbd34b45f3ad133867b08b12d21d4621f
SHA5128d9a33012051a69a9d0679f08d5b03036439cf70f7d14e8304604a6b8efec06029b6ba001b650dd6f0949eb628b2b0c93b94be52d54a77ba87f7867cf8794ce6
-
Filesize
3.0MB
MD5ccca3fe7c3aaf25d60198bdcb8278819
SHA114f7a56fccf854ac24d6b3780830f202e3ef3855
SHA256cf95066b3274ef730a92500aef7057411ad2df489e181b3153d7299baf96e405
SHA5121822eead3a4c058d72d023c3e45df7bbc314a2eb3f5c4337337aa8b6779e32431fff98203c67ea517fcf52af6983492d128ed7e4bed7ed5739828c46511ea214
-
Filesize
3.0MB
MD5ab2a1a41ff6ab1e33fd9e319bf52e19e
SHA19245c5463de6d70f53b6aa77ded20bd45a84b76c
SHA25670e091fb12e4fe21e594e9d0d7b4a46ab0b2993368c9b6404a83cff6b18cf505
SHA5129c3bdfa9c58b2632fbde9588c90bb3a7fedc97107275035a264216e40bbafcef1aabb38f9a22fb8263b261bb8d147041770bcd9a1ae3d710087c60e622510713
-
Filesize
3.0MB
MD53b259ea5deb8cff06bb61071dc49d240
SHA1bf565871be37b359ca2cb350047870776fb38d6b
SHA25618e2ba414e06632b6adfe7c027e7049d501473096cb1aa5a9b386abea46af303
SHA512ee0777fe410f36ff22b15ea3a8388455f0d87a1bf9426b138114656d1a04626be9e9fd864937133089fb6d2eddead9b2ded56260ab40edb45953966fa3f98e83
-
Filesize
3.0MB
MD5c65d46fcaa6014cc302f762dfb3611d4
SHA153d7037158b9a950a131f8180f1f840fa2f5f7a8
SHA256b7d5fd0f79cc4bf6d75e8baeefff4fa8b78cf6895262762ed318769d25e8f0af
SHA5129149f06d4eb1bd70dd0ab2d228be131c5a23b25ffa98a9cb64503b83ea311edba596af05527d94b612f6d1294a4b455ec7bd1f4f400517a57255570f516cab2b
-
Filesize
3.0MB
MD54a8dd8c2f21678b56ac678ac1a565dbb
SHA12ae0998cb5d576cbfd5753d913e3eae35e326154
SHA256730aaae1edb2dcd70cc165072a98aa725746a33d738ee2473b285fb90dea3327
SHA51249398e3b73a6f2f6eea52c475f364207a463365d1af8805efee47f692b736dc50d3ff63b422b885c492a0b920499e5207b26f9ae3f3981a375840e1467eced48