Analysis
-
max time kernel
24s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 14:17
Behavioral task
behavioral1
Sample
249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe
Resource
win10v2004-20220812-en
General
-
Target
249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe
-
Size
185KB
-
MD5
7829202c10534ed9cb942848c39e77f0
-
SHA1
2fc3ee5883a920108ec1f49c3f3c1ee94339dc80
-
SHA256
249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec
-
SHA512
653d6489fd9836e9e4108f8df9a6972fd098c209e6a991c55311a823b72e5e371c9fac06afbb64582498111085606570c9a1ab7372ad99a84abdbbb2a1ef01c1
-
SSDEEP
3072:iQJfOxnw+v364WUDKQJfOxnw+v364WUD/:iQJfQw+C4WZQJfQw+C4Ww
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1696 zoJlhCx.exe 1760 zoJlhCx.exe 1764 zoJlhCx.exe 2008 zoJlhCx.exe 1784 zoJlhCx.exe 368 zoJlhCx.exe 1844 zoJlhCx.exe 1608 zoJlhCx.exe 1836 zoJlhCx.exe 1480 zoJlhCx.exe 472 zoJlhCx.exe 1652 zoJlhCx.exe 1384 zoJlhCx.exe 2044 zoJlhCx.exe 840 zoJlhCx.exe 1304 zoJlhCx.exe 1752 zoJlhCx.exe 820 zoJlhCx.exe 1632 zoJlhCx.exe 612 zoJlhCx.exe 1316 zoJlhCx.exe 1004 zoJlhCx.exe 1572 zoJlhCx.exe 1284 zoJlhCx.exe 1540 zoJlhCx.exe 876 zoJlhCx.exe 1704 zoJlhCx.exe 1840 zoJlhCx.exe 1580 zoJlhCx.exe 1260 zoJlhCx.exe 744 zoJlhCx.exe 1476 zoJlhCx.exe 1068 zoJlhCx.exe 620 zoJlhCx.exe 956 zoJlhCx.exe 1968 zoJlhCx.exe 1424 zoJlhCx.exe 1768 zoJlhCx.exe 1392 zoJlhCx.exe 980 zoJlhCx.exe 948 zoJlhCx.exe 624 zoJlhCx.exe 1708 zoJlhCx.exe 1800 zoJlhCx.exe 1792 zoJlhCx.exe 1568 zoJlhCx.exe 1344 zoJlhCx.exe 360 zoJlhCx.exe 772 zoJlhCx.exe 1636 zoJlhCx.exe 1728 zoJlhCx.exe 1712 zoJlhCx.exe 2072 zoJlhCx.exe 2116 zoJlhCx.exe 2148 zoJlhCx.exe 2192 zoJlhCx.exe 2236 zoJlhCx.exe 2268 zoJlhCx.exe 2316 zoJlhCx.exe 2348 zoJlhCx.exe 2380 zoJlhCx.exe 2428 zoJlhCx.exe 2464 zoJlhCx.exe 2504 zoJlhCx.exe -
resource yara_rule behavioral1/memory/540-55-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/files/0x00070000000146a2-56.dat upx behavioral1/files/0x00070000000146a2-57.dat upx behavioral1/files/0x00070000000146a2-59.dat upx behavioral1/files/0x00070000000146a2-62.dat upx behavioral1/files/0x00070000000146a2-61.dat upx behavioral1/files/0x00070000000146a2-65.dat upx behavioral1/files/0x00070000000146a2-63.dat upx behavioral1/files/0x00070000000146a2-67.dat upx behavioral1/files/0x00070000000146a2-68.dat upx behavioral1/files/0x00070000000146a2-70.dat upx behavioral1/files/0x00070000000146a2-75.dat upx behavioral1/files/0x00070000000146a2-78.dat upx behavioral1/files/0x00070000000146a2-80.dat upx behavioral1/files/0x00070000000146a2-77.dat upx behavioral1/files/0x00070000000146a2-85.dat upx behavioral1/memory/1764-95-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/1784-97-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/files/0x00070000000146a2-102.dat upx behavioral1/files/0x00070000000146a2-107.dat upx behavioral1/files/0x00070000000146a2-109.dat upx behavioral1/files/0x00070000000146a2-110.dat upx behavioral1/files/0x00070000000146a2-112.dat upx behavioral1/files/0x00070000000146a2-114.dat upx behavioral1/files/0x00070000000146a2-117.dat upx behavioral1/files/0x00070000000146a2-115.dat upx behavioral1/files/0x00070000000146a2-125.dat upx behavioral1/files/0x00070000000146a2-127.dat upx behavioral1/files/0x00070000000146a2-124.dat upx behavioral1/files/0x00070000000146a2-122.dat upx behavioral1/files/0x00070000000146a2-120.dat upx behavioral1/files/0x00070000000146a2-119.dat upx behavioral1/files/0x00070000000146a2-132.dat upx behavioral1/files/0x00070000000146a2-135.dat upx behavioral1/files/0x00070000000146a2-137.dat upx behavioral1/files/0x00070000000146a2-139.dat upx behavioral1/files/0x00070000000146a2-140.dat upx behavioral1/files/0x00070000000146a2-144.dat upx behavioral1/files/0x00070000000146a2-142.dat upx behavioral1/files/0x00070000000146a2-147.dat upx behavioral1/files/0x00070000000146a2-150.dat upx behavioral1/files/0x00070000000146a2-152.dat upx behavioral1/files/0x00070000000146a2-157.dat upx behavioral1/files/0x00070000000146a2-164.dat upx behavioral1/files/0x00070000000146a2-167.dat upx behavioral1/files/0x00070000000146a2-165.dat upx behavioral1/files/0x00070000000146a2-162.dat upx behavioral1/files/0x00070000000146a2-160.dat upx behavioral1/memory/1608-229-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/1844-228-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/1836-231-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/1480-234-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/1652-236-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/472-235-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/1384-238-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/1304-246-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/820-252-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/1752-249-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/1632-256-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/612-260-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/1316-264-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/840-242-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/2044-240-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/files/0x00070000000146a2-159.dat upx -
Loads dropped DLL 64 IoCs
pid Process 540 249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe 540 249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe 1696 zoJlhCx.exe 1696 zoJlhCx.exe 1760 zoJlhCx.exe 1760 zoJlhCx.exe 1764 zoJlhCx.exe 1764 zoJlhCx.exe 2008 zoJlhCx.exe 2008 zoJlhCx.exe 1784 zoJlhCx.exe 1784 zoJlhCx.exe 368 zoJlhCx.exe 368 zoJlhCx.exe 1844 zoJlhCx.exe 1844 zoJlhCx.exe 1608 zoJlhCx.exe 1608 zoJlhCx.exe 1836 zoJlhCx.exe 1836 zoJlhCx.exe 1480 zoJlhCx.exe 1480 zoJlhCx.exe 472 zoJlhCx.exe 472 zoJlhCx.exe 1652 zoJlhCx.exe 1652 zoJlhCx.exe 1384 zoJlhCx.exe 1384 zoJlhCx.exe 2044 zoJlhCx.exe 2044 zoJlhCx.exe 840 zoJlhCx.exe 840 zoJlhCx.exe 1304 zoJlhCx.exe 1304 zoJlhCx.exe 1752 zoJlhCx.exe 1752 zoJlhCx.exe 820 zoJlhCx.exe 820 zoJlhCx.exe 1632 zoJlhCx.exe 1632 zoJlhCx.exe 612 zoJlhCx.exe 612 zoJlhCx.exe 1316 zoJlhCx.exe 1316 zoJlhCx.exe 1004 zoJlhCx.exe 1004 zoJlhCx.exe 1572 zoJlhCx.exe 1572 zoJlhCx.exe 1284 zoJlhCx.exe 1284 zoJlhCx.exe 1540 zoJlhCx.exe 1540 zoJlhCx.exe 876 zoJlhCx.exe 876 zoJlhCx.exe 1704 zoJlhCx.exe 1704 zoJlhCx.exe 1840 zoJlhCx.exe 1840 zoJlhCx.exe 1580 zoJlhCx.exe 1580 zoJlhCx.exe 1260 zoJlhCx.exe 1260 zoJlhCx.exe 744 zoJlhCx.exe 744 zoJlhCx.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: zoJlhCx.exe File opened (read-only) \??\r: zoJlhCx.exe File opened (read-only) \??\g: zoJlhCx.exe File opened (read-only) \??\q: zoJlhCx.exe File opened (read-only) \??\y: zoJlhCx.exe File opened (read-only) \??\q: zoJlhCx.exe File opened (read-only) \??\p: zoJlhCx.exe File opened (read-only) \??\o: zoJlhCx.exe File opened (read-only) \??\n: zoJlhCx.exe File opened (read-only) \??\i: zoJlhCx.exe File opened (read-only) \??\o: zoJlhCx.exe File opened (read-only) \??\z: zoJlhCx.exe File opened (read-only) \??\f: zoJlhCx.exe File opened (read-only) \??\h: zoJlhCx.exe File opened (read-only) \??\l: zoJlhCx.exe File opened (read-only) \??\t: zoJlhCx.exe File opened (read-only) \??\j: zoJlhCx.exe File opened (read-only) \??\f: zoJlhCx.exe File opened (read-only) \??\p: zoJlhCx.exe File opened (read-only) \??\s: zoJlhCx.exe File opened (read-only) \??\l: zoJlhCx.exe File opened (read-only) \??\z: zoJlhCx.exe File opened (read-only) \??\o: zoJlhCx.exe File opened (read-only) \??\g: zoJlhCx.exe File opened (read-only) \??\j: zoJlhCx.exe File opened (read-only) \??\j: zoJlhCx.exe File opened (read-only) \??\p: zoJlhCx.exe File opened (read-only) \??\i: zoJlhCx.exe File opened (read-only) \??\m: zoJlhCx.exe File opened (read-only) \??\n: zoJlhCx.exe File opened (read-only) \??\s: zoJlhCx.exe File opened (read-only) \??\k: zoJlhCx.exe File opened (read-only) \??\z: zoJlhCx.exe File opened (read-only) \??\h: zoJlhCx.exe File opened (read-only) \??\e: zoJlhCx.exe File opened (read-only) \??\f: zoJlhCx.exe File opened (read-only) \??\r: zoJlhCx.exe File opened (read-only) \??\w: zoJlhCx.exe File opened (read-only) \??\z: zoJlhCx.exe File opened (read-only) \??\o: zoJlhCx.exe File opened (read-only) \??\e: zoJlhCx.exe File opened (read-only) \??\k: zoJlhCx.exe File opened (read-only) \??\o: zoJlhCx.exe File opened (read-only) \??\o: zoJlhCx.exe File opened (read-only) \??\f: zoJlhCx.exe File opened (read-only) \??\t: zoJlhCx.exe File opened (read-only) \??\h: zoJlhCx.exe File opened (read-only) \??\q: zoJlhCx.exe File opened (read-only) \??\w: zoJlhCx.exe File opened (read-only) \??\q: zoJlhCx.exe File opened (read-only) \??\p: zoJlhCx.exe File opened (read-only) \??\o: zoJlhCx.exe File opened (read-only) \??\l: zoJlhCx.exe File opened (read-only) \??\r: zoJlhCx.exe File opened (read-only) \??\e: zoJlhCx.exe File opened (read-only) \??\s: zoJlhCx.exe File opened (read-only) \??\z: zoJlhCx.exe File opened (read-only) \??\j: zoJlhCx.exe File opened (read-only) \??\l: zoJlhCx.exe File opened (read-only) \??\f: zoJlhCx.exe File opened (read-only) \??\t: zoJlhCx.exe File opened (read-only) \??\t: zoJlhCx.exe File opened (read-only) \??\g: zoJlhCx.exe File opened (read-only) \??\v: zoJlhCx.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exe zoJlhCx.exe File created C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exe zoJlhCx.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeLoadDriverPrivilege 540 249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe Token: SeLoadDriverPrivilege 1696 zoJlhCx.exe Token: SeLoadDriverPrivilege 1760 zoJlhCx.exe Token: SeLoadDriverPrivilege 1764 zoJlhCx.exe Token: SeLoadDriverPrivilege 2008 zoJlhCx.exe Token: SeLoadDriverPrivilege 1784 zoJlhCx.exe Token: SeLoadDriverPrivilege 368 zoJlhCx.exe Token: SeLoadDriverPrivilege 1844 zoJlhCx.exe Token: SeLoadDriverPrivilege 1608 zoJlhCx.exe Token: SeLoadDriverPrivilege 1836 zoJlhCx.exe Token: SeLoadDriverPrivilege 1480 zoJlhCx.exe Token: SeLoadDriverPrivilege 472 zoJlhCx.exe Token: SeLoadDriverPrivilege 1652 zoJlhCx.exe Token: SeLoadDriverPrivilege 1384 zoJlhCx.exe Token: SeLoadDriverPrivilege 2044 zoJlhCx.exe Token: SeLoadDriverPrivilege 840 zoJlhCx.exe Token: SeLoadDriverPrivilege 1304 zoJlhCx.exe Token: SeLoadDriverPrivilege 1752 zoJlhCx.exe Token: SeLoadDriverPrivilege 820 zoJlhCx.exe Token: SeLoadDriverPrivilege 1632 zoJlhCx.exe Token: SeLoadDriverPrivilege 612 zoJlhCx.exe Token: SeLoadDriverPrivilege 1316 zoJlhCx.exe Token: SeLoadDriverPrivilege 1004 zoJlhCx.exe Token: SeLoadDriverPrivilege 1572 zoJlhCx.exe Token: SeLoadDriverPrivilege 1284 zoJlhCx.exe Token: SeLoadDriverPrivilege 1540 zoJlhCx.exe Token: SeLoadDriverPrivilege 876 zoJlhCx.exe Token: SeLoadDriverPrivilege 1704 zoJlhCx.exe Token: SeLoadDriverPrivilege 1840 zoJlhCx.exe Token: SeLoadDriverPrivilege 1580 zoJlhCx.exe Token: SeLoadDriverPrivilege 1260 zoJlhCx.exe Token: SeLoadDriverPrivilege 744 zoJlhCx.exe Token: SeLoadDriverPrivilege 1476 zoJlhCx.exe Token: SeLoadDriverPrivilege 1068 zoJlhCx.exe Token: SeLoadDriverPrivilege 620 zoJlhCx.exe Token: SeLoadDriverPrivilege 956 zoJlhCx.exe Token: SeLoadDriverPrivilege 1968 zoJlhCx.exe Token: SeLoadDriverPrivilege 1424 zoJlhCx.exe Token: SeLoadDriverPrivilege 1768 zoJlhCx.exe Token: SeLoadDriverPrivilege 1392 zoJlhCx.exe Token: SeLoadDriverPrivilege 980 zoJlhCx.exe Token: SeLoadDriverPrivilege 948 zoJlhCx.exe Token: SeLoadDriverPrivilege 624 zoJlhCx.exe Token: SeLoadDriverPrivilege 1708 zoJlhCx.exe Token: SeLoadDriverPrivilege 1800 zoJlhCx.exe Token: SeLoadDriverPrivilege 1792 zoJlhCx.exe Token: SeLoadDriverPrivilege 1568 zoJlhCx.exe Token: SeLoadDriverPrivilege 1344 zoJlhCx.exe Token: SeLoadDriverPrivilege 360 zoJlhCx.exe Token: SeLoadDriverPrivilege 772 zoJlhCx.exe Token: SeLoadDriverPrivilege 1636 zoJlhCx.exe Token: SeLoadDriverPrivilege 1728 zoJlhCx.exe Token: SeLoadDriverPrivilege 1712 zoJlhCx.exe Token: SeLoadDriverPrivilege 2072 zoJlhCx.exe Token: SeLoadDriverPrivilege 2116 zoJlhCx.exe Token: SeLoadDriverPrivilege 2148 zoJlhCx.exe Token: SeLoadDriverPrivilege 2192 zoJlhCx.exe Token: SeLoadDriverPrivilege 2236 zoJlhCx.exe Token: SeLoadDriverPrivilege 2268 zoJlhCx.exe Token: SeLoadDriverPrivilege 2316 zoJlhCx.exe Token: SeLoadDriverPrivilege 2348 zoJlhCx.exe Token: SeLoadDriverPrivilege 2380 zoJlhCx.exe Token: SeLoadDriverPrivilege 2428 zoJlhCx.exe Token: SeLoadDriverPrivilege 2464 zoJlhCx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 540 wrote to memory of 1696 540 249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe 27 PID 540 wrote to memory of 1696 540 249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe 27 PID 540 wrote to memory of 1696 540 249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe 27 PID 540 wrote to memory of 1696 540 249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe 27 PID 1696 wrote to memory of 1760 1696 zoJlhCx.exe 28 PID 1696 wrote to memory of 1760 1696 zoJlhCx.exe 28 PID 1696 wrote to memory of 1760 1696 zoJlhCx.exe 28 PID 1696 wrote to memory of 1760 1696 zoJlhCx.exe 28 PID 1760 wrote to memory of 1764 1760 zoJlhCx.exe 29 PID 1760 wrote to memory of 1764 1760 zoJlhCx.exe 29 PID 1760 wrote to memory of 1764 1760 zoJlhCx.exe 29 PID 1760 wrote to memory of 1764 1760 zoJlhCx.exe 29 PID 1764 wrote to memory of 2008 1764 zoJlhCx.exe 83 PID 1764 wrote to memory of 2008 1764 zoJlhCx.exe 83 PID 1764 wrote to memory of 2008 1764 zoJlhCx.exe 83 PID 1764 wrote to memory of 2008 1764 zoJlhCx.exe 83 PID 2008 wrote to memory of 1784 2008 zoJlhCx.exe 82 PID 2008 wrote to memory of 1784 2008 zoJlhCx.exe 82 PID 2008 wrote to memory of 1784 2008 zoJlhCx.exe 82 PID 2008 wrote to memory of 1784 2008 zoJlhCx.exe 82 PID 1784 wrote to memory of 368 1784 zoJlhCx.exe 81 PID 1784 wrote to memory of 368 1784 zoJlhCx.exe 81 PID 1784 wrote to memory of 368 1784 zoJlhCx.exe 81 PID 1784 wrote to memory of 368 1784 zoJlhCx.exe 81 PID 368 wrote to memory of 1844 368 zoJlhCx.exe 80 PID 368 wrote to memory of 1844 368 zoJlhCx.exe 80 PID 368 wrote to memory of 1844 368 zoJlhCx.exe 80 PID 368 wrote to memory of 1844 368 zoJlhCx.exe 80 PID 1844 wrote to memory of 1608 1844 zoJlhCx.exe 30 PID 1844 wrote to memory of 1608 1844 zoJlhCx.exe 30 PID 1844 wrote to memory of 1608 1844 zoJlhCx.exe 30 PID 1844 wrote to memory of 1608 1844 zoJlhCx.exe 30 PID 1608 wrote to memory of 1836 1608 zoJlhCx.exe 79 PID 1608 wrote to memory of 1836 1608 zoJlhCx.exe 79 PID 1608 wrote to memory of 1836 1608 zoJlhCx.exe 79 PID 1608 wrote to memory of 1836 1608 zoJlhCx.exe 79 PID 1836 wrote to memory of 1480 1836 zoJlhCx.exe 32 PID 1836 wrote to memory of 1480 1836 zoJlhCx.exe 32 PID 1836 wrote to memory of 1480 1836 zoJlhCx.exe 32 PID 1836 wrote to memory of 1480 1836 zoJlhCx.exe 32 PID 1480 wrote to memory of 472 1480 zoJlhCx.exe 31 PID 1480 wrote to memory of 472 1480 zoJlhCx.exe 31 PID 1480 wrote to memory of 472 1480 zoJlhCx.exe 31 PID 1480 wrote to memory of 472 1480 zoJlhCx.exe 31 PID 472 wrote to memory of 1652 472 zoJlhCx.exe 78 PID 472 wrote to memory of 1652 472 zoJlhCx.exe 78 PID 472 wrote to memory of 1652 472 zoJlhCx.exe 78 PID 472 wrote to memory of 1652 472 zoJlhCx.exe 78 PID 1652 wrote to memory of 1384 1652 zoJlhCx.exe 33 PID 1652 wrote to memory of 1384 1652 zoJlhCx.exe 33 PID 1652 wrote to memory of 1384 1652 zoJlhCx.exe 33 PID 1652 wrote to memory of 1384 1652 zoJlhCx.exe 33 PID 1384 wrote to memory of 2044 1384 zoJlhCx.exe 77 PID 1384 wrote to memory of 2044 1384 zoJlhCx.exe 77 PID 1384 wrote to memory of 2044 1384 zoJlhCx.exe 77 PID 1384 wrote to memory of 2044 1384 zoJlhCx.exe 77 PID 2044 wrote to memory of 840 2044 zoJlhCx.exe 76 PID 2044 wrote to memory of 840 2044 zoJlhCx.exe 76 PID 2044 wrote to memory of 840 2044 zoJlhCx.exe 76 PID 2044 wrote to memory of 840 2044 zoJlhCx.exe 76 PID 840 wrote to memory of 1304 840 zoJlhCx.exe 34 PID 840 wrote to memory of 1304 840 zoJlhCx.exe 34 PID 840 wrote to memory of 1304 840 zoJlhCx.exe 34 PID 840 wrote to memory of 1304 840 zoJlhCx.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe"C:\Users\Admin\AppData\Local\Temp\249352108713894f9b6b0dd6c99e5cccfb1b3f6a7d863d32acca9eaa51b81cec.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe6⤵PID:7960
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe7⤵PID:8136
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe8⤵PID:8700
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe9⤵PID:9436
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe10⤵PID:10140
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe11⤵PID:11988
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe12⤵PID:14804
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe13⤵PID:14976
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe14⤵PID:15040
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe15⤵PID:15204
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe5⤵PID:7996
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe6⤵PID:8172
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe7⤵PID:8212
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe8⤵PID:9372
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe9⤵PID:10072
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe10⤵PID:11768
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe11⤵PID:14740
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe12⤵PID:14948
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe13⤵PID:15048
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe14⤵PID:14480
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe4⤵PID:7940
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe5⤵PID:8096
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe6⤵PID:7820
-
-
-
-
-
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe3⤵PID:7904
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe4⤵PID:8084
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe5⤵PID:8220
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe6⤵PID:9260
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe7⤵PID:9772
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe8⤵PID:11024
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe9⤵PID:14056
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe10⤵PID:14932
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe11⤵PID:15024
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe12⤵PID:15100
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe13⤵PID:7664
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe2⤵PID:7968
-
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe3⤵PID:8252
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe4⤵PID:15344
-
-
-
-
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe2⤵PID:7212
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe3⤵PID:15084
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe4⤵PID:1292
-
-
-
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe3⤵PID:8364
-
-
-
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe2⤵PID:8352
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe3⤵PID:15220
-
-
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe2⤵PID:8204
-
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe3⤵PID:8308
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe4⤵PID:7420
-
-
-
-
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe2⤵PID:8424
-
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1304 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:820 -
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe4⤵PID:8508
-
-
-
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe3⤵PID:8492
-
-
-
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe2⤵PID:8532
-
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1316 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1004 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1572 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:876 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe7⤵PID:8580
-
-
-
-
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe5⤵PID:8560
-
-
-
-
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1580 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:744 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:620 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:956 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
-
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1392 -
C:\Windows\SysWOW64\zoJlhCx\ryKbBTd.exeC:\Windows\system32\zoJlhCx\ryKbBTd.exe4⤵PID:15212
-
-
-
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:980 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:948 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:624 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe6⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1568 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1344 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:360 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:772 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe12⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1728 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1712 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2148 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2192 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2236 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2268 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe20⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2316 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe24⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2464 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe25⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe26⤵PID:2532
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe27⤵
- Drops file in System32 directory
PID:2556 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe28⤵
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe29⤵PID:2608
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe30⤵
- Enumerates connected drives
PID:2640 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe31⤵
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe32⤵PID:2692
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe33⤵
- Enumerates connected drives
PID:2716 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe34⤵PID:2748
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe35⤵PID:2776
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe36⤵
- Drops file in System32 directory
PID:2800 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe37⤵
- Enumerates connected drives
PID:2824 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe38⤵
- Enumerates connected drives
PID:2848 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe39⤵
- Drops file in System32 directory
PID:2872 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe40⤵
- Enumerates connected drives
PID:2900 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe41⤵
- Enumerates connected drives
PID:2924 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe42⤵PID:2944
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe43⤵PID:2972
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe44⤵PID:3008
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe45⤵PID:3032
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe46⤵PID:3056
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe47⤵PID:1724
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe48⤵PID:2060
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe49⤵PID:2108
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe50⤵PID:2188
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe51⤵PID:2200
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe52⤵PID:2252
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe53⤵PID:2296
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe54⤵PID:2328
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe55⤵PID:2364
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe56⤵PID:2408
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe57⤵PID:2440
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe58⤵PID:2476
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe59⤵PID:2528
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe60⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2572 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe61⤵PID:2620
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe62⤵
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe63⤵PID:2724
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe64⤵PID:2764
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe65⤵
- Enumerates connected drives
PID:2816 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe66⤵PID:2864
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe67⤵PID:2908
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe68⤵PID:2936
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe69⤵PID:2964
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe70⤵PID:2992
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe71⤵PID:3020
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe72⤵PID:3048
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe73⤵
- Enumerates connected drives
PID:2088 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe74⤵PID:2104
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe75⤵PID:2112
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe76⤵
- Enumerates connected drives
PID:2180 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe77⤵PID:2128
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe78⤵PID:2224
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe79⤵PID:2292
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe80⤵PID:2304
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe81⤵PID:2360
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe82⤵
- Enumerates connected drives
PID:2396 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe83⤵
- Enumerates connected drives
PID:2444 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe84⤵
- Enumerates connected drives
PID:2500 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe85⤵PID:2592
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe86⤵
- Drops file in System32 directory
PID:2652 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe87⤵
- Drops file in System32 directory
PID:2760 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe88⤵
- Drops file in System32 directory
PID:2860 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe89⤵PID:3004
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe90⤵PID:2300
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe91⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe92⤵
- Drops file in System32 directory
PID:2700 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe93⤵PID:2916
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe94⤵PID:2260
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe95⤵
- Enumerates connected drives
PID:2616 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe96⤵PID:2844
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe97⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe98⤵PID:2064
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe99⤵PID:2744
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe100⤵
- Drops file in System32 directory
PID:3076 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe101⤵
- Drops file in System32 directory
PID:3100 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe102⤵
- Enumerates connected drives
PID:3124 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe103⤵PID:3156
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe104⤵PID:3184
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe105⤵
- Enumerates connected drives
PID:3208 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe106⤵
- Drops file in System32 directory
PID:3232 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe107⤵PID:3256
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe108⤵
- Enumerates connected drives
PID:3288 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe109⤵PID:3320
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe110⤵PID:3344
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe111⤵PID:3376
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe112⤵PID:3404
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe113⤵PID:3436
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe114⤵
- Drops file in System32 directory
PID:3460 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe115⤵PID:3484
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe116⤵PID:3512
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe117⤵
- Drops file in System32 directory
PID:3540 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe118⤵
- Drops file in System32 directory
PID:3568 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe119⤵PID:3608
-
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe120⤵
- Drops file in System32 directory
PID:3632 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe121⤵
- Enumerates connected drives
PID:3656 -
C:\Windows\SysWOW64\ryKbBTd\zoJlhCx.exeC:\Windows\system32\ryKbBTd\zoJlhCx.exe122⤵PID:3684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-