Analysis
-
max time kernel
77s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 14:31
Behavioral task
behavioral1
Sample
75c59b11f7a166bb4e20023a621b4bac.exe
Resource
win7-20231129-en
General
-
Target
75c59b11f7a166bb4e20023a621b4bac.exe
-
Size
1.3MB
-
MD5
75c59b11f7a166bb4e20023a621b4bac
-
SHA1
f568b4deb151131bcc38f9e759505d7511a0941e
-
SHA256
ac8464357a272c7c31a9c02f7e104eab60a95c95c28a7a0bbb32ffde434a7ec8
-
SHA512
0019807e329d1f0631b68979e3a07e2ca28188dcdd7a1c229f92812715b4b7805b2f5f9964c257d4779844c54fc93e70245c59069424888463993d4c4907b4ab
-
SSDEEP
24576:RVIl/WDGCi7/qkat6Q5aILMCfmARvKYYwdy2VlmNCQgIT0rKiwnotfohd:ROdWCCi7/raZ5aIwC+Ax4ErWThi7JId
Malware Config
Signatures
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/1384-442-0x00007FF73AFD0000-0x00007FF73B321000-memory.dmp xmrig behavioral2/memory/2900-605-0x00007FF7E52F0000-0x00007FF7E5641000-memory.dmp xmrig behavioral2/memory/4236-827-0x00007FF7F9C60000-0x00007FF7F9FB1000-memory.dmp xmrig behavioral2/memory/2664-829-0x00007FF74A720000-0x00007FF74AA71000-memory.dmp xmrig behavioral2/memory/888-1156-0x00007FF69F290000-0x00007FF69F5E1000-memory.dmp xmrig behavioral2/memory/15392-2563-0x00007FF6C0EA0000-0x00007FF6C11F1000-memory.dmp xmrig behavioral2/memory/9816-2562-0x00007FF739130000-0x00007FF739481000-memory.dmp xmrig behavioral2/memory/9700-2561-0x00007FF6D5C40000-0x00007FF6D5F91000-memory.dmp xmrig behavioral2/memory/9712-2560-0x00007FF785840000-0x00007FF785B91000-memory.dmp xmrig behavioral2/memory/9960-2202-0x00007FF628620000-0x00007FF628971000-memory.dmp xmrig behavioral2/memory/1700-2125-0x00007FF758B50000-0x00007FF758EA1000-memory.dmp xmrig behavioral2/memory/15236-2085-0x00007FF7B1B80000-0x00007FF7B1ED1000-memory.dmp xmrig -
Executes dropped EXE 1 IoCs
pid Process 2104 CbKmUsq.exe -
resource yara_rule behavioral2/memory/1560-0-0x00007FF73C1D0000-0x00007FF73C521000-memory.dmp upx behavioral2/files/0x000d00000002315a-5.dat upx behavioral2/files/0x000300000001e982-46.dat upx behavioral2/memory/1384-442-0x00007FF73AFD0000-0x00007FF73B321000-memory.dmp upx behavioral2/memory/2900-605-0x00007FF7E52F0000-0x00007FF7E5641000-memory.dmp upx behavioral2/memory/4236-827-0x00007FF7F9C60000-0x00007FF7F9FB1000-memory.dmp upx behavioral2/memory/2664-829-0x00007FF74A720000-0x00007FF74AA71000-memory.dmp upx behavioral2/memory/888-1156-0x00007FF69F290000-0x00007FF69F5E1000-memory.dmp upx behavioral2/memory/10468-1933-0x00007FF638F60000-0x00007FF6392B1000-memory.dmp upx behavioral2/memory/7844-1960-0x00007FF7B68C0000-0x00007FF7B6C11000-memory.dmp upx behavioral2/memory/3472-2429-0x00007FF6048B0000-0x00007FF604C01000-memory.dmp upx behavioral2/memory/8328-2467-0x00007FF7FC450000-0x00007FF7FC7A1000-memory.dmp upx behavioral2/memory/4800-2505-0x00007FF642A00000-0x00007FF642D51000-memory.dmp upx behavioral2/memory/15392-2563-0x00007FF6C0EA0000-0x00007FF6C11F1000-memory.dmp upx behavioral2/memory/9816-2562-0x00007FF739130000-0x00007FF739481000-memory.dmp upx behavioral2/memory/9700-2561-0x00007FF6D5C40000-0x00007FF6D5F91000-memory.dmp upx behavioral2/memory/9712-2560-0x00007FF785840000-0x00007FF785B91000-memory.dmp upx behavioral2/memory/14200-2539-0x00007FF65A5C0000-0x00007FF65A911000-memory.dmp upx behavioral2/memory/16248-2537-0x00007FF73FEE0000-0x00007FF740231000-memory.dmp upx behavioral2/memory/3828-2535-0x00007FF61A4D0000-0x00007FF61A821000-memory.dmp upx behavioral2/memory/10760-2534-0x00007FF77C720000-0x00007FF77CA71000-memory.dmp upx behavioral2/memory/15256-2536-0x00007FF7A8A50000-0x00007FF7A8DA1000-memory.dmp upx behavioral2/memory/9856-2532-0x00007FF7B9250000-0x00007FF7B95A1000-memory.dmp upx behavioral2/memory/14504-2529-0x00007FF7C3200000-0x00007FF7C3551000-memory.dmp upx behavioral2/memory/13124-2506-0x00007FF7B54C0000-0x00007FF7B5811000-memory.dmp upx behavioral2/memory/14404-2528-0x00007FF6216A0000-0x00007FF6219F1000-memory.dmp upx behavioral2/memory/14528-2527-0x00007FF73FDD0000-0x00007FF740121000-memory.dmp upx behavioral2/memory/3352-2492-0x00007FF722180000-0x00007FF7224D1000-memory.dmp upx behavioral2/memory/16132-2491-0x00007FF7FE4C0000-0x00007FF7FE811000-memory.dmp upx behavioral2/memory/14736-2490-0x00007FF6E4C20000-0x00007FF6E4F71000-memory.dmp upx behavioral2/memory/3540-2489-0x00007FF68DDA0000-0x00007FF68E0F1000-memory.dmp upx behavioral2/memory/448-2488-0x00007FF6BF230000-0x00007FF6BF581000-memory.dmp upx behavioral2/memory/6584-2494-0x00007FF7512C0000-0x00007FF751611000-memory.dmp upx behavioral2/memory/16160-2493-0x00007FF712F50000-0x00007FF7132A1000-memory.dmp upx behavioral2/memory/8120-2472-0x00007FF6B4DF0000-0x00007FF6B5141000-memory.dmp upx behavioral2/memory/8808-2487-0x00007FF74E920000-0x00007FF74EC71000-memory.dmp upx behavioral2/memory/15116-2466-0x00007FF7276C0000-0x00007FF727A11000-memory.dmp upx behavioral2/memory/10016-2463-0x00007FF75F4B0000-0x00007FF75F801000-memory.dmp upx behavioral2/memory/10812-2438-0x00007FF6A4C40000-0x00007FF6A4F91000-memory.dmp upx behavioral2/memory/5684-2430-0x00007FF686EA0000-0x00007FF6871F1000-memory.dmp upx behavioral2/memory/9960-2202-0x00007FF628620000-0x00007FF628971000-memory.dmp upx behavioral2/memory/1700-2125-0x00007FF758B50000-0x00007FF758EA1000-memory.dmp upx behavioral2/memory/15236-2085-0x00007FF7B1B80000-0x00007FF7B1ED1000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\System\CbKmUsq.exe 75c59b11f7a166bb4e20023a621b4bac.exe File created C:\Windows\System\jBnTXpX.exe 75c59b11f7a166bb4e20023a621b4bac.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2104 1560 75c59b11f7a166bb4e20023a621b4bac.exe 89 PID 1560 wrote to memory of 2104 1560 75c59b11f7a166bb4e20023a621b4bac.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\75c59b11f7a166bb4e20023a621b4bac.exe"C:\Users\Admin\AppData\Local\Temp\75c59b11f7a166bb4e20023a621b4bac.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\System\CbKmUsq.exeC:\Windows\System\CbKmUsq.exe2⤵
- Executes dropped EXE
PID:2104
-
-
C:\Windows\System\jBnTXpX.exeC:\Windows\System\jBnTXpX.exe2⤵PID:4464
-
-
C:\Windows\System\NHKoXVc.exeC:\Windows\System\NHKoXVc.exe2⤵PID:3012
-
-
C:\Windows\System\eITozSI.exeC:\Windows\System\eITozSI.exe2⤵PID:2004
-
-
C:\Windows\System\FrkoYLc.exeC:\Windows\System\FrkoYLc.exe2⤵PID:4964
-
-
C:\Windows\System\LIxHZRD.exeC:\Windows\System\LIxHZRD.exe2⤵PID:228
-
-
C:\Windows\System\NkeGZtM.exeC:\Windows\System\NkeGZtM.exe2⤵PID:4184
-
-
C:\Windows\System\gbpGCCG.exeC:\Windows\System\gbpGCCG.exe2⤵PID:4808
-
-
C:\Windows\System\rWOrCyv.exeC:\Windows\System\rWOrCyv.exe2⤵PID:2900
-
-
C:\Windows\System\FJKlhAv.exeC:\Windows\System\FJKlhAv.exe2⤵PID:4236
-
-
C:\Windows\System\KXQzHZp.exeC:\Windows\System\KXQzHZp.exe2⤵PID:916
-
-
C:\Windows\System\HeXvlsw.exeC:\Windows\System\HeXvlsw.exe2⤵PID:5600
-
-
C:\Windows\System\gBbUamX.exeC:\Windows\System\gBbUamX.exe2⤵PID:6164
-
-
C:\Windows\System\TbGPYbL.exeC:\Windows\System\TbGPYbL.exe2⤵PID:6148
-
-
C:\Windows\System\XioPbKj.exeC:\Windows\System\XioPbKj.exe2⤵PID:7228
-
-
C:\Windows\System\ADCCMTl.exeC:\Windows\System\ADCCMTl.exe2⤵PID:9096
-
-
C:\Windows\System\GLxGWpV.exeC:\Windows\System\GLxGWpV.exe2⤵PID:10612
-
-
C:\Windows\System\EMWQlgT.exeC:\Windows\System\EMWQlgT.exe2⤵PID:13024
-
-
C:\Windows\System\mglwOFx.exeC:\Windows\System\mglwOFx.exe2⤵PID:1700
-
-
C:\Windows\System\ULfHqKp.exeC:\Windows\System\ULfHqKp.exe2⤵PID:8464
-
-
C:\Windows\System\bfIgwKR.exeC:\Windows\System\bfIgwKR.exe2⤵PID:12964
-
-
C:\Windows\System\yNLoSSk.exeC:\Windows\System\yNLoSSk.exe2⤵PID:6944
-
-
C:\Windows\System\ettGFWq.exeC:\Windows\System\ettGFWq.exe2⤵PID:10808
-
-
C:\Windows\System\IEbZnjQ.exeC:\Windows\System\IEbZnjQ.exe2⤵PID:5684
-
-
C:\Windows\System\ySIETOs.exeC:\Windows\System\ySIETOs.exe2⤵PID:14948
-
-
C:\Windows\System\KxgKxIm.exeC:\Windows\System\KxgKxIm.exe2⤵PID:10760
-
-
C:\Windows\System\PkLBreZ.exeC:\Windows\System\PkLBreZ.exe2⤵PID:3828
-
-
C:\Windows\System\XTNFCTi.exeC:\Windows\System\XTNFCTi.exe2⤵PID:9856
-
-
C:\Windows\System\DJdLtID.exeC:\Windows\System\DJdLtID.exe2⤵PID:14504
-
-
C:\Windows\System\cdWPTsi.exeC:\Windows\System\cdWPTsi.exe2⤵PID:14528
-
-
C:\Windows\System\lWFMtLX.exeC:\Windows\System\lWFMtLX.exe2⤵PID:14404
-
-
C:\Windows\System\mRUYEnY.exeC:\Windows\System\mRUYEnY.exe2⤵PID:3472
-
-
C:\Windows\System\RagwCmt.exeC:\Windows\System\RagwCmt.exe2⤵PID:4900
-
-
C:\Windows\System\XRfeIlC.exeC:\Windows\System\XRfeIlC.exe2⤵PID:9268
-
-
C:\Windows\System\lWQFXiW.exeC:\Windows\System\lWQFXiW.exe2⤵PID:4876
-
-
C:\Windows\System\MZZDsOQ.exeC:\Windows\System\MZZDsOQ.exe2⤵PID:4572
-
-
C:\Windows\System\DHGaZLY.exeC:\Windows\System\DHGaZLY.exe2⤵PID:11168
-
-
C:\Windows\System\aXomEoY.exeC:\Windows\System\aXomEoY.exe2⤵PID:14200
-
-
C:\Windows\System\qprOMUq.exeC:\Windows\System\qprOMUq.exe2⤵PID:6108
-
-
C:\Windows\System\LBAfZeM.exeC:\Windows\System\LBAfZeM.exe2⤵PID:5536
-
-
C:\Windows\System\PGCukYO.exeC:\Windows\System\PGCukYO.exe2⤵PID:10876
-
-
C:\Windows\System\IAmNKGg.exeC:\Windows\System\IAmNKGg.exe2⤵PID:12812
-
-
C:\Windows\System\IPhDzGf.exeC:\Windows\System\IPhDzGf.exe2⤵PID:12568
-
-
C:\Windows\System\dgMStzM.exeC:\Windows\System\dgMStzM.exe2⤵PID:14132
-
-
C:\Windows\System\oFRChWL.exeC:\Windows\System\oFRChWL.exe2⤵PID:15700
-
-
C:\Windows\System\YINkWLI.exeC:\Windows\System\YINkWLI.exe2⤵PID:2892
-
-
C:\Windows\System\OQfOqcf.exeC:\Windows\System\OQfOqcf.exe2⤵PID:448
-
-
C:\Windows\System\CWXXsvf.exeC:\Windows\System\CWXXsvf.exe2⤵PID:13640
-
-
C:\Windows\System\MqNRGwu.exeC:\Windows\System\MqNRGwu.exe2⤵PID:6524
-
-
C:\Windows\System\PYkuUYk.exeC:\Windows\System\PYkuUYk.exe2⤵PID:13472
-
-
C:\Windows\System\tFIwqFC.exeC:\Windows\System\tFIwqFC.exe2⤵PID:13392
-
-
C:\Windows\System\PnmvrfA.exeC:\Windows\System\PnmvrfA.exe2⤵PID:12716
-
-
C:\Windows\System\qkRyfoI.exeC:\Windows\System\qkRyfoI.exe2⤵PID:2672
-
-
C:\Windows\System\SZgYZWr.exeC:\Windows\System\SZgYZWr.exe2⤵PID:6732
-
-
C:\Windows\System\SgCpmkJ.exeC:\Windows\System\SgCpmkJ.exe2⤵PID:10632
-
-
C:\Windows\System\VRzalmC.exeC:\Windows\System\VRzalmC.exe2⤵PID:12548
-
-
C:\Windows\System\GnCYygl.exeC:\Windows\System\GnCYygl.exe2⤵PID:8808
-
-
C:\Windows\System\yVOAwQx.exeC:\Windows\System\yVOAwQx.exe2⤵PID:16108
-
-
C:\Windows\System\EveeQhF.exeC:\Windows\System\EveeQhF.exe2⤵PID:9016
-
-
C:\Windows\System\qXtpmZi.exeC:\Windows\System\qXtpmZi.exe2⤵PID:8096
-
-
C:\Windows\System\FtYimyF.exeC:\Windows\System\FtYimyF.exe2⤵PID:7972
-
-
C:\Windows\System\CiDbwyO.exeC:\Windows\System\CiDbwyO.exe2⤵PID:10276
-
-
C:\Windows\System\UpHThRL.exeC:\Windows\System\UpHThRL.exe2⤵PID:7876
-
-
C:\Windows\System\nSZLfAi.exeC:\Windows\System\nSZLfAi.exe2⤵PID:7796
-
-
C:\Windows\System\uwEyyAz.exeC:\Windows\System\uwEyyAz.exe2⤵PID:11416
-
-
C:\Windows\System\NsJxwbU.exeC:\Windows\System\NsJxwbU.exe2⤵PID:1164
-
-
C:\Windows\System\GzAgbyN.exeC:\Windows\System\GzAgbyN.exe2⤵PID:16136
-
-
C:\Windows\System\vvdksoF.exeC:\Windows\System\vvdksoF.exe2⤵PID:5088
-
-
C:\Windows\System\KyHPcDI.exeC:\Windows\System\KyHPcDI.exe2⤵PID:3540
-
-
C:\Windows\System\eiXZvuB.exeC:\Windows\System\eiXZvuB.exe2⤵PID:3352
-
-
C:\Windows\System\Qobwqei.exeC:\Windows\System\Qobwqei.exe2⤵PID:16232
-
-
C:\Windows\System\szSbINE.exeC:\Windows\System\szSbINE.exe2⤵PID:16132
-
-
C:\Windows\System\PrMzZvs.exeC:\Windows\System\PrMzZvs.exe2⤵PID:16160
-
-
C:\Windows\System\OhQzbot.exeC:\Windows\System\OhQzbot.exe2⤵PID:16176
-
-
C:\Windows\System\oKvGtmz.exeC:\Windows\System\oKvGtmz.exe2⤵PID:16192
-
-
C:\Windows\System\NKUyYBp.exeC:\Windows\System\NKUyYBp.exe2⤵PID:16208
-
-
C:\Windows\System\RYeoJoN.exeC:\Windows\System\RYeoJoN.exe2⤵PID:4800
-
-
C:\Windows\System\cASOihl.exeC:\Windows\System\cASOihl.exe2⤵PID:16344
-
-
C:\Windows\System\XvWzYKN.exeC:\Windows\System\XvWzYKN.exe2⤵PID:16300
-
-
C:\Windows\System\JboitSA.exeC:\Windows\System\JboitSA.exe2⤵PID:16276
-
-
C:\Windows\System\irSxlWE.exeC:\Windows\System\irSxlWE.exe2⤵PID:15644
-
-
C:\Windows\System\iPRWkoN.exeC:\Windows\System\iPRWkoN.exe2⤵PID:15620
-
-
C:\Windows\System\WPjSSdd.exeC:\Windows\System\WPjSSdd.exe2⤵PID:15596
-
-
C:\Windows\System\kHbfLLC.exeC:\Windows\System\kHbfLLC.exe2⤵PID:15472
-
-
C:\Windows\System\MTBRuTx.exeC:\Windows\System\MTBRuTx.exe2⤵PID:10016
-
-
C:\Windows\System\GFvHfee.exeC:\Windows\System\GFvHfee.exe2⤵PID:15344
-
-
C:\Windows\System\fSLPRRs.exeC:\Windows\System\fSLPRRs.exe2⤵PID:15288
-
-
C:\Windows\System\BZyizqB.exeC:\Windows\System\BZyizqB.exe2⤵PID:15256
-
-
C:\Windows\System\gYdnQbI.exeC:\Windows\System\gYdnQbI.exe2⤵PID:15116
-
-
C:\Windows\System\pDovmWQ.exeC:\Windows\System\pDovmWQ.exe2⤵PID:15004
-
-
C:\Windows\System\xKmhmBT.exeC:\Windows\System\xKmhmBT.exe2⤵PID:16248
-
-
C:\Windows\System\OohnAcO.exeC:\Windows\System\OohnAcO.exe2⤵PID:14788
-
-
C:\Windows\System\AbxpirY.exeC:\Windows\System\AbxpirY.exe2⤵PID:14736
-
-
C:\Windows\System\NkmLZNK.exeC:\Windows\System\NkmLZNK.exe2⤵PID:14580
-
-
C:\Windows\System\nIxVrZb.exeC:\Windows\System\nIxVrZb.exe2⤵PID:7276
-
-
C:\Windows\System\IVUOuaJ.exeC:\Windows\System\IVUOuaJ.exe2⤵PID:7220
-
-
C:\Windows\System\coronrd.exeC:\Windows\System\coronrd.exe2⤵PID:7184
-
-
C:\Windows\System\vQJjnPD.exeC:\Windows\System\vQJjnPD.exe2⤵PID:8328
-
-
C:\Windows\System\SMkCgic.exeC:\Windows\System\SMkCgic.exe2⤵PID:14236
-
-
C:\Windows\System\NjcPizL.exeC:\Windows\System\NjcPizL.exe2⤵PID:14096
-
-
C:\Windows\System\jLWBQTL.exeC:\Windows\System\jLWBQTL.exe2⤵PID:13964
-
-
C:\Windows\System\MjMErIA.exeC:\Windows\System\MjMErIA.exe2⤵PID:13848
-
-
C:\Windows\System\YuxTBrB.exeC:\Windows\System\YuxTBrB.exe2⤵PID:13236
-
-
C:\Windows\System\sTdByhV.exeC:\Windows\System\sTdByhV.exe2⤵PID:13200
-
-
C:\Windows\System\UTERYwb.exeC:\Windows\System\UTERYwb.exe2⤵PID:13164
-
-
C:\Windows\System\gTkhFRE.exeC:\Windows\System\gTkhFRE.exe2⤵PID:15764
-
-
C:\Windows\System\keqzjdu.exeC:\Windows\System\keqzjdu.exe2⤵PID:15968
-
-
C:\Windows\System\MQJQuAc.exeC:\Windows\System\MQJQuAc.exe2⤵PID:13124
-
-
C:\Windows\System\moFiAGg.exeC:\Windows\System\moFiAGg.exe2⤵PID:13040
-
-
C:\Windows\System\OIcUbJT.exeC:\Windows\System\OIcUbJT.exe2⤵PID:13004
-
-
C:\Windows\System\ydWFVqJ.exeC:\Windows\System\ydWFVqJ.exe2⤵PID:12932
-
-
C:\Windows\System\AZLsjSb.exeC:\Windows\System\AZLsjSb.exe2⤵PID:15880
-
-
C:\Windows\System\BrhtHZA.exeC:\Windows\System\BrhtHZA.exe2⤵PID:11976
-
-
C:\Windows\System\dhCDreN.exeC:\Windows\System\dhCDreN.exe2⤵PID:15760
-
-
C:\Windows\System\LQSDDiW.exeC:\Windows\System\LQSDDiW.exe2⤵PID:3468
-
-
C:\Windows\System\KftqCNF.exeC:\Windows\System\KftqCNF.exe2⤵PID:7616
-
-
C:\Windows\System\gLQowVE.exeC:\Windows\System\gLQowVE.exe2⤵PID:6560
-
-
C:\Windows\System\CUKlGhh.exeC:\Windows\System\CUKlGhh.exe2⤵PID:8712
-
-
C:\Windows\System\yetDPKF.exeC:\Windows\System\yetDPKF.exe2⤵PID:8344
-
-
C:\Windows\System\XdQpdDM.exeC:\Windows\System\XdQpdDM.exe2⤵PID:6584
-
-
C:\Windows\System\PfgXbli.exeC:\Windows\System\PfgXbli.exe2⤵PID:8120
-
-
C:\Windows\System\EkEKGXL.exeC:\Windows\System\EkEKGXL.exe2⤵PID:16052
-
-
C:\Windows\System\SsJbfoa.exeC:\Windows\System\SsJbfoa.exe2⤵PID:11136
-
-
C:\Windows\System\EyXfMoI.exeC:\Windows\System\EyXfMoI.exe2⤵PID:11008
-
-
C:\Windows\System\lEiuEoA.exeC:\Windows\System\lEiuEoA.exe2⤵PID:12764
-
-
C:\Windows\System\XvBoUcY.exeC:\Windows\System\XvBoUcY.exe2⤵PID:12460
-
-
C:\Windows\System\uXjKYSy.exeC:\Windows\System\uXjKYSy.exe2⤵PID:12268
-
-
C:\Windows\System\lRgunhq.exeC:\Windows\System\lRgunhq.exe2⤵PID:12236
-
-
C:\Windows\System\YgFJRLR.exeC:\Windows\System\YgFJRLR.exe2⤵PID:12200
-
-
C:\Windows\System\gapYwwp.exeC:\Windows\System\gapYwwp.exe2⤵PID:12160
-
-
C:\Windows\System\AvVlKAz.exeC:\Windows\System\AvVlKAz.exe2⤵PID:12108
-
-
C:\Windows\System\XWqwNcq.exeC:\Windows\System\XWqwNcq.exe2⤵PID:12072
-
-
C:\Windows\System\LWZigGn.exeC:\Windows\System\LWZigGn.exe2⤵PID:12028
-
-
C:\Windows\System\hzDvENP.exeC:\Windows\System\hzDvENP.exe2⤵PID:11964
-
-
C:\Windows\System\LWypBiM.exeC:\Windows\System\LWypBiM.exe2⤵PID:10812
-
-
C:\Windows\System\lOnzuti.exeC:\Windows\System\lOnzuti.exe2⤵PID:15808
-
-
C:\Windows\System\ZwoFlkA.exeC:\Windows\System\ZwoFlkA.exe2⤵PID:11776
-
-
C:\Windows\System\RmlnygK.exeC:\Windows\System\RmlnygK.exe2⤵PID:11720
-
-
C:\Windows\System\GXoqTSR.exeC:\Windows\System\GXoqTSR.exe2⤵PID:11684
-
-
C:\Windows\System\OrbaGiN.exeC:\Windows\System\OrbaGiN.exe2⤵PID:15796
-
-
C:\Windows\System\IsJsscM.exeC:\Windows\System\IsJsscM.exe2⤵PID:15776
-
-
C:\Windows\System\yhwZffx.exeC:\Windows\System\yhwZffx.exe2⤵PID:11612
-
-
C:\Windows\System\eHcmJSX.exeC:\Windows\System\eHcmJSX.exe2⤵PID:10740
-
-
C:\Windows\System\bFklKzS.exeC:\Windows\System\bFklKzS.exe2⤵PID:11396
-
-
C:\Windows\System\XmmorPn.exeC:\Windows\System\XmmorPn.exe2⤵PID:11356
-
-
C:\Windows\System\QHUqMqx.exeC:\Windows\System\QHUqMqx.exe2⤵PID:11320
-
-
C:\Windows\System\CfQELyy.exeC:\Windows\System\CfQELyy.exe2⤵PID:11276
-
-
C:\Windows\System\KxMSYFx.exeC:\Windows\System\KxMSYFx.exe2⤵PID:8188
-
-
C:\Windows\System\cmCqGok.exeC:\Windows\System\cmCqGok.exe2⤵PID:7776
-
-
C:\Windows\System\UYRnpaZ.exeC:\Windows\System\UYRnpaZ.exe2⤵PID:7612
-
-
C:\Windows\System\DOAQvuC.exeC:\Windows\System\DOAQvuC.exe2⤵PID:6816
-
-
C:\Windows\System\QVzaYfz.exeC:\Windows\System\QVzaYfz.exe2⤵PID:10636
-
-
C:\Windows\System\eqHIGqi.exeC:\Windows\System\eqHIGqi.exe2⤵PID:10588
-
-
C:\Windows\System\uvwfCRK.exeC:\Windows\System\uvwfCRK.exe2⤵PID:10532
-
-
C:\Windows\System\wuZBnlF.exeC:\Windows\System\wuZBnlF.exe2⤵PID:10464
-
-
C:\Windows\System\YXQnCRz.exeC:\Windows\System\YXQnCRz.exe2⤵PID:10408
-
-
C:\Windows\System\cyBqKdC.exeC:\Windows\System\cyBqKdC.exe2⤵PID:10364
-
-
C:\Windows\System\uqEuAGF.exeC:\Windows\System\uqEuAGF.exe2⤵PID:7816
-
-
C:\Windows\System\zGfmyOZ.exeC:\Windows\System\zGfmyOZ.exe2⤵PID:7476
-
-
C:\Windows\System\jpkmmGp.exeC:\Windows\System\jpkmmGp.exe2⤵PID:10184
-
-
C:\Windows\System\nDXLGOv.exeC:\Windows\System\nDXLGOv.exe2⤵PID:10056
-
-
C:\Windows\System\cuZJTTE.exeC:\Windows\System\cuZJTTE.exe2⤵PID:15532
-
-
C:\Windows\System\IkECxWw.exeC:\Windows\System\IkECxWw.exe2⤵PID:15516
-
-
C:\Windows\System\GWWLfkc.exeC:\Windows\System\GWWLfkc.exe2⤵PID:15496
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:15432
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:7524
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:6924
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449KB
MD59b1c97486eebeab43048bc2aec9aae1c
SHA14bf1c3294b3d7cba30de14356b6b5ca16e67331f
SHA25679aef7bf45f644105d7db3783bbf13041e43af0a08ff65ad7c4b6d07d1d06568
SHA5123ab2c651d53e3a865d01d409195eaaf8a6f5d1934db1e3b1c1d8fae9352000ab25f0d3b4f46741f9ccfb8793f97846ac3ec45f106c70f908544615a5e5d30592
-
Filesize
64KB
MD5990857d2b61cee085cf72ce6c8c7e46a
SHA1a136ecea2aaba10562bf1d8189d9c2777159d971
SHA2568edfb8d06bf599bef40497a1cfe0da6d9256e3b8c9619315be56bd2761cb5511
SHA512719bbf375652bffd6ae76238414df170479a8cbf7761efd15600ad91bbbc5fd228ed7522c7fba049cc3f7b460fd15326ccd67d752cd58b5f4b7705a4a3de6e6c