Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 13:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9741f9e35cbe514f567145965153760d.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
9741f9e35cbe514f567145965153760d.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
9741f9e35cbe514f567145965153760d.exe
-
Size
319KB
-
MD5
9741f9e35cbe514f567145965153760d
-
SHA1
e63230e00932182937f86e89e37cc3bb9c99f732
-
SHA256
44e037ff3d9e67877b82e508cc9de913518a267aa8cbaa4280b3b47bc066cac3
-
SHA512
fd9740abddc6b3bbe0f859801611e1a35c21b49d8455230d718011ca75c3c6dfbd515c6b1fbb3476507c41e8007eb7e057b9cb2dc350f715cca5f877647fd956
-
SSDEEP
6144:JgQYzzwMpNUKFddw96lwv30tk3SqDnqnVWR7jguSOF63GUKy:JgQENUKFzw96lwvkt+SqDqnVWR7j9vy
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2156 egycro.exe 3796 oczmyi.exe 2768 bxjcem.exe 4560 pypnhe.exe 4752 zftkad.exe 2028 jefikb.exe 116 womsnb.exe 1156 jegvwj.exe 1928 wrylbn.exe 404 gcnvxi.exe 4660 upxlcm.exe 4536 zcobiq.exe 3096 mpgqot.exe 1904 wzvbbx.exe 4600 jmfqhs.exe 784 wzwgnw.exe 2452 jmoeba.exe 60 txdgod.exe 2316 gkneuz.exe 464 txfuzd.exe 4852 hkwjfh.exe 2888 rvlusk.exe 3548 bqeeie.exe 3200 odwcoi.exe 956 bqnsue.exe 1728 mmgcbz.exe 3500 yomsnl.exe 4032 lbehsp.exe 4456 wwfsij.exe 972 jnaurr.exe 3900 wluxzs.exe 4508 jymnfv.exe 3272 txqspu.exe 924 jynarv.exe 4236 tjcley.exe 4416 gwuasc.exe 4324 tjlqxg.exe 4540 hwvgdk.exe 608 qhkqqf.exe 1196 eucgwj.exe 5032 rhuwcn.exe 5020 eudtiq.exe 2688 oesedu.exe 3436 bozggl.exe 4568 lqorto.exe 2700 ydghzs.exe 1632 lyxwfw.exe 4520 zlhmla.exe 3692 iowwgv.exe 3360 wxchju.exe 4476 jwfksd.exe 3148 wjpzxg.exe 3160 gleklj.exe 720 wmbsmk.exe 3576 gicctf.exe 3528 qsrnpi.exe 628 efjcum.exe 2912 jstaaq.exe 516 wfkqgl.exe 1664 gqzatp.exe 1916 tdrqzs.exe 4380 gumtib.exe 4652 tdsvla.exe 1124 dohggv.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\ukttuy.exe hanrry.exe File opened for modification C:\Windows\SysWOW64\zlkazs.exe lytcto.exe File opened for modification C:\Windows\SysWOW64\bsqjfm.exe ocngxe.exe File opened for modification C:\Windows\SysWOW64\phoikq.exe cmxtem.exe File created C:\Windows\SysWOW64\vmefuo.exe hrmpok.exe File opened for modification C:\Windows\SysWOW64\bvtrjf.exe lrswns.exe File opened for modification C:\Windows\SysWOW64\xluxtw.exe kychos.exe File opened for modification C:\Windows\SysWOW64\clcxof.exe smqswh.exe File created C:\Windows\SysWOW64\uxgxhk.exe hcohbg.exe File created C:\Windows\SysWOW64\rtcezs.exe euhcqs.exe File created C:\Windows\SysWOW64\eandbh.exe rndowd.exe File created C:\Windows\SysWOW64\gnokyo.exe tawvlk.exe File opened for modification C:\Windows\SysWOW64\blrzwk.exe nckwtk.exe File opened for modification C:\Windows\SysWOW64\yvkzhy.exe okvpuv.exe File created C:\Windows\SysWOW64\byjopk.exe npceml.exe File opened for modification C:\Windows\SysWOW64\vstsfn.exe ifjczj.exe File created C:\Windows\SysWOW64\wanyjt.exe jjsvbk.exe File opened for modification C:\Windows\SysWOW64\sawozu.exe fffruq.exe File created C:\Windows\SysWOW64\pxttjz.exe ccjeev.exe File opened for modification C:\Windows\SysWOW64\pxttjz.exe ccjeev.exe File created C:\Windows\SysWOW64\bqeeie.exe rvlusk.exe File created C:\Windows\SysWOW64\cugyqu.exe phoikq.exe File opened for modification C:\Windows\SysWOW64\uxgxhk.exe hcohbg.exe File created C:\Windows\SysWOW64\mizclz.exe yvpnfe.exe File opened for modification C:\Windows\SysWOW64\rhuwcn.exe eucgwj.exe File opened for modification C:\Windows\SysWOW64\itjdvw.exe vgaoqs.exe File created C:\Windows\SysWOW64\bpdqra.exe rqrtzc.exe File created C:\Windows\SysWOW64\lvqhwc.exe xiysry.exe File created C:\Windows\SysWOW64\olrmcb.exe cuwjta.exe File opened for modification C:\Windows\SysWOW64\dohggv.exe tdsvla.exe File opened for modification C:\Windows\SysWOW64\ozfqrz.exe bmnblv.exe File opened for modification C:\Windows\SysWOW64\ioknsz.exe vxqkkz.exe File opened for modification C:\Windows\SysWOW64\japqaq.exe wnfaum.exe File opened for modification C:\Windows\SysWOW64\lyxwfw.exe ydghzs.exe File created C:\Windows\SysWOW64\ccjeev.exe ppsoys.exe File created C:\Windows\SysWOW64\zbknwj.exe mosxqn.exe File created C:\Windows\SysWOW64\ahemqf.exe nuuwkj.exe File opened for modification C:\Windows\SysWOW64\pkkuon.exe fhvjss.exe File opened for modification C:\Windows\SysWOW64\njppiu.exe zwfrcy.exe File created C:\Windows\SysWOW64\egpjkv.exe rtxtwr.exe File opened for modification C:\Windows\SysWOW64\aijbqy.exe nvsllu.exe File created C:\Windows\SysWOW64\gnfxfh.exe wcpmsd.exe File created C:\Windows\SysWOW64\mcgpgx.exe cduroz.exe File opened for modification C:\Windows\SysWOW64\gwuing.exe tgzgfy.exe File opened for modification C:\Windows\SysWOW64\qssfap.exe dbxdrp.exe File opened for modification C:\Windows\SysWOW64\epasuo.exe uuzimt.exe File created C:\Windows\SysWOW64\rwohsa.exe ejxrmw.exe File opened for modification C:\Windows\SysWOW64\egpjkv.exe rtxtwr.exe File created C:\Windows\SysWOW64\lrswns.exe akoyvt.exe File opened for modification C:\Windows\SysWOW64\bexxob.exe orfhjy.exe File opened for modification C:\Windows\SysWOW64\mbjvmq.exe zosfhm.exe File opened for modification C:\Windows\SysWOW64\ighkau.exe vtquuy.exe File created C:\Windows\SysWOW64\nvsllu.exe aaiofr.exe File opened for modification C:\Windows\SysWOW64\umqgaj.exe hzgquf.exe File opened for modification C:\Windows\SysWOW64\jnaurr.exe wwfsij.exe File created C:\Windows\SysWOW64\fhmehl.exe smcgbh.exe File created C:\Windows\SysWOW64\ygxfpk.exe lidcgc.exe File opened for modification C:\Windows\SysWOW64\hzgquf.exe wdfgnl.exe File created C:\Windows\SysWOW64\nytkeb.exe alkvyf.exe File created C:\Windows\SysWOW64\myhqbb.exe czvtqc.exe File created C:\Windows\SysWOW64\qyldkn.exe dlbnes.exe File opened for modification C:\Windows\SysWOW64\wmattb.exe jzqvnx.exe File created C:\Windows\SysWOW64\eguufw.exe rtcezs.exe File created C:\Windows\SysWOW64\fvnzri.exe savklm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2156 3048 9741f9e35cbe514f567145965153760d.exe 85 PID 3048 wrote to memory of 2156 3048 9741f9e35cbe514f567145965153760d.exe 85 PID 3048 wrote to memory of 2156 3048 9741f9e35cbe514f567145965153760d.exe 85 PID 2156 wrote to memory of 3796 2156 egycro.exe 86 PID 2156 wrote to memory of 3796 2156 egycro.exe 86 PID 2156 wrote to memory of 3796 2156 egycro.exe 86 PID 3796 wrote to memory of 2768 3796 oczmyi.exe 87 PID 3796 wrote to memory of 2768 3796 oczmyi.exe 87 PID 3796 wrote to memory of 2768 3796 oczmyi.exe 87 PID 2768 wrote to memory of 4560 2768 bxjcem.exe 88 PID 2768 wrote to memory of 4560 2768 bxjcem.exe 88 PID 2768 wrote to memory of 4560 2768 bxjcem.exe 88 PID 4560 wrote to memory of 4752 4560 pypnhe.exe 89 PID 4560 wrote to memory of 4752 4560 pypnhe.exe 89 PID 4560 wrote to memory of 4752 4560 pypnhe.exe 89 PID 4752 wrote to memory of 2028 4752 zftkad.exe 90 PID 4752 wrote to memory of 2028 4752 zftkad.exe 90 PID 4752 wrote to memory of 2028 4752 zftkad.exe 90 PID 2028 wrote to memory of 116 2028 jefikb.exe 91 PID 2028 wrote to memory of 116 2028 jefikb.exe 91 PID 2028 wrote to memory of 116 2028 jefikb.exe 91 PID 116 wrote to memory of 1156 116 womsnb.exe 92 PID 116 wrote to memory of 1156 116 womsnb.exe 92 PID 116 wrote to memory of 1156 116 womsnb.exe 92 PID 1156 wrote to memory of 1928 1156 jegvwj.exe 93 PID 1156 wrote to memory of 1928 1156 jegvwj.exe 93 PID 1156 wrote to memory of 1928 1156 jegvwj.exe 93 PID 1928 wrote to memory of 404 1928 wrylbn.exe 94 PID 1928 wrote to memory of 404 1928 wrylbn.exe 94 PID 1928 wrote to memory of 404 1928 wrylbn.exe 94 PID 404 wrote to memory of 4660 404 gcnvxi.exe 95 PID 404 wrote to memory of 4660 404 gcnvxi.exe 95 PID 404 wrote to memory of 4660 404 gcnvxi.exe 95 PID 4660 wrote to memory of 4536 4660 upxlcm.exe 96 PID 4660 wrote to memory of 4536 4660 upxlcm.exe 96 PID 4660 wrote to memory of 4536 4660 upxlcm.exe 96 PID 4536 wrote to memory of 3096 4536 zcobiq.exe 97 PID 4536 wrote to memory of 3096 4536 zcobiq.exe 97 PID 4536 wrote to memory of 3096 4536 zcobiq.exe 97 PID 3096 wrote to memory of 1904 3096 mpgqot.exe 98 PID 3096 wrote to memory of 1904 3096 mpgqot.exe 98 PID 3096 wrote to memory of 1904 3096 mpgqot.exe 98 PID 1904 wrote to memory of 4600 1904 wzvbbx.exe 99 PID 1904 wrote to memory of 4600 1904 wzvbbx.exe 99 PID 1904 wrote to memory of 4600 1904 wzvbbx.exe 99 PID 4600 wrote to memory of 784 4600 jmfqhs.exe 100 PID 4600 wrote to memory of 784 4600 jmfqhs.exe 100 PID 4600 wrote to memory of 784 4600 jmfqhs.exe 100 PID 784 wrote to memory of 2452 784 wzwgnw.exe 101 PID 784 wrote to memory of 2452 784 wzwgnw.exe 101 PID 784 wrote to memory of 2452 784 wzwgnw.exe 101 PID 2452 wrote to memory of 60 2452 jmoeba.exe 102 PID 2452 wrote to memory of 60 2452 jmoeba.exe 102 PID 2452 wrote to memory of 60 2452 jmoeba.exe 102 PID 60 wrote to memory of 2316 60 txdgod.exe 103 PID 60 wrote to memory of 2316 60 txdgod.exe 103 PID 60 wrote to memory of 2316 60 txdgod.exe 103 PID 2316 wrote to memory of 464 2316 gkneuz.exe 104 PID 2316 wrote to memory of 464 2316 gkneuz.exe 104 PID 2316 wrote to memory of 464 2316 gkneuz.exe 104 PID 464 wrote to memory of 4852 464 txfuzd.exe 105 PID 464 wrote to memory of 4852 464 txfuzd.exe 105 PID 464 wrote to memory of 4852 464 txfuzd.exe 105 PID 4852 wrote to memory of 2888 4852 hkwjfh.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\9741f9e35cbe514f567145965153760d.exe"C:\Users\Admin\AppData\Local\Temp\9741f9e35cbe514f567145965153760d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\egycro.exeC:\Windows\system32\egycro.exe 1032 "C:\Users\Admin\AppData\Local\Temp\9741f9e35cbe514f567145965153760d.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\oczmyi.exeC:\Windows\system32\oczmyi.exe 1152 "C:\Windows\SysWOW64\egycro.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\bxjcem.exeC:\Windows\system32\bxjcem.exe 1132 "C:\Windows\SysWOW64\oczmyi.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\pypnhe.exeC:\Windows\system32\pypnhe.exe 1164 "C:\Windows\SysWOW64\bxjcem.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\zftkad.exeC:\Windows\system32\zftkad.exe 1168 "C:\Windows\SysWOW64\pypnhe.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\jefikb.exeC:\Windows\system32\jefikb.exe 1172 "C:\Windows\SysWOW64\zftkad.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\womsnb.exeC:\Windows\system32\womsnb.exe 1176 "C:\Windows\SysWOW64\jefikb.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\jegvwj.exeC:\Windows\system32\jegvwj.exe 1160 "C:\Windows\SysWOW64\womsnb.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\wrylbn.exeC:\Windows\system32\wrylbn.exe 1184 "C:\Windows\SysWOW64\jegvwj.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\gcnvxi.exeC:\Windows\system32\gcnvxi.exe 1148 "C:\Windows\SysWOW64\wrylbn.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\upxlcm.exeC:\Windows\system32\upxlcm.exe 1192 "C:\Windows\SysWOW64\gcnvxi.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\zcobiq.exeC:\Windows\system32\zcobiq.exe 1188 "C:\Windows\SysWOW64\upxlcm.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\mpgqot.exeC:\Windows\system32\mpgqot.exe 1200 "C:\Windows\SysWOW64\zcobiq.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\wzvbbx.exeC:\Windows\system32\wzvbbx.exe 1204 "C:\Windows\SysWOW64\mpgqot.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\jmfqhs.exeC:\Windows\system32\jmfqhs.exe 1196 "C:\Windows\SysWOW64\wzvbbx.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\wzwgnw.exeC:\Windows\system32\wzwgnw.exe 1156 "C:\Windows\SysWOW64\jmfqhs.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\jmoeba.exeC:\Windows\system32\jmoeba.exe 1220 "C:\Windows\SysWOW64\wzwgnw.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\txdgod.exeC:\Windows\system32\txdgod.exe 1208 "C:\Windows\SysWOW64\jmoeba.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\gkneuz.exeC:\Windows\system32\gkneuz.exe 1216 "C:\Windows\SysWOW64\txdgod.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\txfuzd.exeC:\Windows\system32\txfuzd.exe 1228 "C:\Windows\SysWOW64\gkneuz.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\hkwjfh.exeC:\Windows\system32\hkwjfh.exe 1232 "C:\Windows\SysWOW64\txfuzd.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\rvlusk.exeC:\Windows\system32\rvlusk.exe 1236 "C:\Windows\SysWOW64\hkwjfh.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2888 -
C:\Windows\SysWOW64\bqeeie.exeC:\Windows\system32\bqeeie.exe 1240 "C:\Windows\SysWOW64\rvlusk.exe"24⤵
- Executes dropped EXE
PID:3548 -
C:\Windows\SysWOW64\odwcoi.exeC:\Windows\system32\odwcoi.exe 1248 "C:\Windows\SysWOW64\bqeeie.exe"25⤵
- Executes dropped EXE
PID:3200 -
C:\Windows\SysWOW64\bqnsue.exeC:\Windows\system32\bqnsue.exe 1244 "C:\Windows\SysWOW64\odwcoi.exe"26⤵
- Executes dropped EXE
PID:956 -
C:\Windows\SysWOW64\mmgcbz.exeC:\Windows\system32\mmgcbz.exe 1252 "C:\Windows\SysWOW64\bqnsue.exe"27⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\yomsnl.exeC:\Windows\system32\yomsnl.exe 1048 "C:\Windows\SysWOW64\mmgcbz.exe"28⤵
- Executes dropped EXE
PID:3500 -
C:\Windows\SysWOW64\lbehsp.exeC:\Windows\system32\lbehsp.exe 1224 "C:\Windows\SysWOW64\yomsnl.exe"29⤵
- Executes dropped EXE
PID:4032 -
C:\Windows\SysWOW64\wwfsij.exeC:\Windows\system32\wwfsij.exe 1264 "C:\Windows\SysWOW64\lbehsp.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4456 -
C:\Windows\SysWOW64\jnaurr.exeC:\Windows\system32\jnaurr.exe 1268 "C:\Windows\SysWOW64\wwfsij.exe"31⤵
- Executes dropped EXE
PID:972 -
C:\Windows\SysWOW64\wluxzs.exeC:\Windows\system32\wluxzs.exe 1260 "C:\Windows\SysWOW64\jnaurr.exe"32⤵
- Executes dropped EXE
PID:3900 -
C:\Windows\SysWOW64\jymnfv.exeC:\Windows\system32\jymnfv.exe 1212 "C:\Windows\SysWOW64\wluxzs.exe"33⤵
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\txqspu.exeC:\Windows\system32\txqspu.exe 1272 "C:\Windows\SysWOW64\jymnfv.exe"34⤵
- Executes dropped EXE
PID:3272 -
C:\Windows\SysWOW64\jynarv.exeC:\Windows\system32\jynarv.exe 1284 "C:\Windows\SysWOW64\txqspu.exe"35⤵
- Executes dropped EXE
PID:924 -
C:\Windows\SysWOW64\tjcley.exeC:\Windows\system32\tjcley.exe 1288 "C:\Windows\SysWOW64\jynarv.exe"36⤵
- Executes dropped EXE
PID:4236 -
C:\Windows\SysWOW64\gwuasc.exeC:\Windows\system32\gwuasc.exe 1292 "C:\Windows\SysWOW64\tjcley.exe"37⤵
- Executes dropped EXE
PID:4416 -
C:\Windows\SysWOW64\tjlqxg.exeC:\Windows\system32\tjlqxg.exe 1296 "C:\Windows\SysWOW64\gwuasc.exe"38⤵
- Executes dropped EXE
PID:4324 -
C:\Windows\SysWOW64\hwvgdk.exeC:\Windows\system32\hwvgdk.exe 1280 "C:\Windows\SysWOW64\tjlqxg.exe"39⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\SysWOW64\qhkqqf.exeC:\Windows\system32\qhkqqf.exe 1120 "C:\Windows\SysWOW64\hwvgdk.exe"40⤵
- Executes dropped EXE
PID:608 -
C:\Windows\SysWOW64\eucgwj.exeC:\Windows\system32\eucgwj.exe 1304 "C:\Windows\SysWOW64\qhkqqf.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1196 -
C:\Windows\SysWOW64\rhuwcn.exeC:\Windows\system32\rhuwcn.exe 1312 "C:\Windows\SysWOW64\eucgwj.exe"42⤵
- Executes dropped EXE
PID:5032 -
C:\Windows\SysWOW64\eudtiq.exeC:\Windows\system32\eudtiq.exe 1308 "C:\Windows\SysWOW64\rhuwcn.exe"43⤵
- Executes dropped EXE
PID:5020 -
C:\Windows\SysWOW64\oesedu.exeC:\Windows\system32\oesedu.exe 1320 "C:\Windows\SysWOW64\eudtiq.exe"44⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\bozggl.exeC:\Windows\system32\bozggl.exe 1140 "C:\Windows\SysWOW64\oesedu.exe"45⤵
- Executes dropped EXE
PID:3436 -
C:\Windows\SysWOW64\lqorto.exeC:\Windows\system32\lqorto.exe 1324 "C:\Windows\SysWOW64\bozggl.exe"46⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\ydghzs.exeC:\Windows\system32\ydghzs.exe 1332 "C:\Windows\SysWOW64\lqorto.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2700 -
C:\Windows\SysWOW64\lyxwfw.exeC:\Windows\system32\lyxwfw.exe 1300 "C:\Windows\SysWOW64\ydghzs.exe"48⤵
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\zlhmla.exeC:\Windows\system32\zlhmla.exe 1336 "C:\Windows\SysWOW64\lyxwfw.exe"49⤵
- Executes dropped EXE
PID:4520 -
C:\Windows\SysWOW64\iowwgv.exeC:\Windows\system32\iowwgv.exe 1344 "C:\Windows\SysWOW64\zlhmla.exe"50⤵
- Executes dropped EXE
PID:3692 -
C:\Windows\SysWOW64\wxchju.exeC:\Windows\system32\wxchju.exe 1352 "C:\Windows\SysWOW64\iowwgv.exe"51⤵
- Executes dropped EXE
PID:3360 -
C:\Windows\SysWOW64\jwfksd.exeC:\Windows\system32\jwfksd.exe 1348 "C:\Windows\SysWOW64\wxchju.exe"52⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\SysWOW64\wjpzxg.exeC:\Windows\system32\wjpzxg.exe 1340 "C:\Windows\SysWOW64\jwfksd.exe"53⤵
- Executes dropped EXE
PID:3148 -
C:\Windows\SysWOW64\gleklj.exeC:\Windows\system32\gleklj.exe 1360 "C:\Windows\SysWOW64\wjpzxg.exe"54⤵
- Executes dropped EXE
PID:3160 -
C:\Windows\SysWOW64\wmbsmk.exeC:\Windows\system32\wmbsmk.exe 1368 "C:\Windows\SysWOW64\gleklj.exe"55⤵
- Executes dropped EXE
PID:720 -
C:\Windows\SysWOW64\gicctf.exeC:\Windows\system32\gicctf.exe 1364 "C:\Windows\SysWOW64\wmbsmk.exe"56⤵
- Executes dropped EXE
PID:3576 -
C:\Windows\SysWOW64\qsrnpi.exeC:\Windows\system32\qsrnpi.exe 1372 "C:\Windows\SysWOW64\gicctf.exe"57⤵
- Executes dropped EXE
PID:3528 -
C:\Windows\SysWOW64\efjcum.exeC:\Windows\system32\efjcum.exe 1376 "C:\Windows\SysWOW64\qsrnpi.exe"58⤵
- Executes dropped EXE
PID:628 -
C:\Windows\SysWOW64\jstaaq.exeC:\Windows\system32\jstaaq.exe 1380 "C:\Windows\SysWOW64\efjcum.exe"59⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\wfkqgl.exeC:\Windows\system32\wfkqgl.exe 1388 "C:\Windows\SysWOW64\jstaaq.exe"60⤵
- Executes dropped EXE
PID:516 -
C:\Windows\SysWOW64\gqzatp.exeC:\Windows\system32\gqzatp.exe 1356 "C:\Windows\SysWOW64\wfkqgl.exe"61⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\tdrqzs.exeC:\Windows\system32\tdrqzs.exe 1396 "C:\Windows\SysWOW64\gqzatp.exe"62⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\SysWOW64\gumtib.exeC:\Windows\system32\gumtib.exe 1392 "C:\Windows\SysWOW64\tdrqzs.exe"63⤵
- Executes dropped EXE
PID:4380 -
C:\Windows\SysWOW64\tdsvla.exeC:\Windows\system32\tdsvla.exe 1400 "C:\Windows\SysWOW64\gumtib.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4652 -
C:\Windows\SysWOW64\dohggv.exeC:\Windows\system32\dohggv.exe 1384 "C:\Windows\SysWOW64\tdsvla.exe"65⤵
- Executes dropped EXE
PID:1124 -
C:\Windows\SysWOW64\qbzvmz.exeC:\Windows\system32\qbzvmz.exe 1412 "C:\Windows\SysWOW64\dohggv.exe"66⤵PID:2108
-
C:\Windows\SysWOW64\dojlrd.exeC:\Windows\system32\dojlrd.exe 1404 "C:\Windows\SysWOW64\qbzvmz.exe"67⤵PID:4912
-
C:\Windows\SysWOW64\rbajxh.exeC:\Windows\system32\rbajxh.exe 1408 "C:\Windows\SysWOW64\dojlrd.exe"68⤵PID:3512
-
C:\Windows\SysWOW64\alptkk.exeC:\Windows\system32\alptkk.exe 1432 "C:\Windows\SysWOW64\rbajxh.exe"69⤵PID:1008
-
C:\Windows\SysWOW64\nckwtk.exeC:\Windows\system32\nckwtk.exe 1416 "C:\Windows\SysWOW64\alptkk.exe"70⤵
- Drops file in System32 directory
PID:2460 -
C:\Windows\SysWOW64\blrzwk.exeC:\Windows\system32\blrzwk.exe 1424 "C:\Windows\SysWOW64\nckwtk.exe"71⤵PID:1592
-
C:\Windows\SysWOW64\oyiokn.exeC:\Windows\system32\oyiokn.exe 1420 "C:\Windows\SysWOW64\blrzwk.exe"72⤵PID:1936
-
C:\Windows\SysWOW64\yjyzxq.exeC:\Windows\system32\yjyzxq.exe 1440 "C:\Windows\SysWOW64\oyiokn.exe"73⤵PID:564
-
C:\Windows\SysWOW64\lzsbgr.exeC:\Windows\system32\lzsbgr.exe 1256 "C:\Windows\SysWOW64\yjyzxq.exe"74⤵PID:4596
-
C:\Windows\SysWOW64\yjzejq.exeC:\Windows\system32\yjzejq.exe 1444 "C:\Windows\SysWOW64\lzsbgr.exe"75⤵PID:2388
-
C:\Windows\SysWOW64\lwqcou.exeC:\Windows\system32\lwqcou.exe 1448 "C:\Windows\SysWOW64\yjzejq.exe"76⤵PID:3036
-
C:\Windows\SysWOW64\vggecx.exeC:\Windows\system32\vggecx.exe 1452 "C:\Windows\SysWOW64\lwqcou.exe"77⤵PID:2708
-
C:\Windows\SysWOW64\itpcpb.exeC:\Windows\system32\itpcpb.exe 1456 "C:\Windows\SysWOW64\vggecx.exe"78⤵PID:4936
-
C:\Windows\SysWOW64\vksfyb.exeC:\Windows\system32\vksfyb.exe 1464 "C:\Windows\SysWOW64\itpcpb.exe"79⤵PID:1700
-
C:\Windows\SysWOW64\jtyhbb.exeC:\Windows\system32\jtyhbb.exe 1460 "C:\Windows\SysWOW64\vksfyb.exe"80⤵PID:788
-
C:\Windows\SysWOW64\teosoe.exeC:\Windows\system32\teosoe.exe 1436 "C:\Windows\SysWOW64\jtyhbb.exe"81⤵PID:2320
-
C:\Windows\SysWOW64\grxhui.exeC:\Windows\system32\grxhui.exe 1472 "C:\Windows\SysWOW64\teosoe.exe"82⤵PID:4544
-
C:\Windows\SysWOW64\tepxad.exeC:\Windows\system32\tepxad.exe 1468 "C:\Windows\SysWOW64\grxhui.exe"83⤵PID:4480
-
C:\Windows\SysWOW64\grgngh.exeC:\Windows\system32\grgngh.exe 1480 "C:\Windows\SysWOW64\tepxad.exe"84⤵PID:3844
-
C:\Windows\SysWOW64\tpbqop.exeC:\Windows\system32\tpbqop.exe 1484 "C:\Windows\SysWOW64\grgngh.exe"85⤵PID:3596
-
C:\Windows\SysWOW64\dpfvho.exeC:\Windows\system32\dpfvho.exe 1488 "C:\Windows\SysWOW64\tpbqop.exe"86⤵PID:4964
-
C:\Windows\SysWOW64\qcxlms.exeC:\Windows\system32\qcxlms.exe 1476 "C:\Windows\SysWOW64\dpfvho.exe"87⤵PID:2928
-
C:\Windows\SysWOW64\epoaso.exeC:\Windows\system32\epoaso.exe 1496 "C:\Windows\SysWOW64\qcxlms.exe"88⤵PID:4800
-
C:\Windows\SysWOW64\nzelfr.exeC:\Windows\system32\nzelfr.exe 1500 "C:\Windows\SysWOW64\epoaso.exe"89⤵PID:4780
-
C:\Windows\SysWOW64\bmnblv.exeC:\Windows\system32\bmnblv.exe 1492 "C:\Windows\SysWOW64\nzelfr.exe"90⤵
- Drops file in System32 directory
PID:4332 -
C:\Windows\SysWOW64\ozfqrz.exeC:\Windows\system32\ozfqrz.exe 1508 "C:\Windows\SysWOW64\bmnblv.exe"91⤵PID:3484
-
C:\Windows\SysWOW64\bmwgxd.exeC:\Windows\system32\bmwgxd.exe 1004 "C:\Windows\SysWOW64\ozfqrz.exe"92⤵PID:64
-
C:\Windows\SysWOW64\lxmqsy.exeC:\Windows\system32\lxmqsy.exe 1512 "C:\Windows\SysWOW64\bmwgxd.exe"93⤵PID:2240
-
C:\Windows\SysWOW64\ykvgyc.exeC:\Windows\system32\ykvgyc.exe 1520 "C:\Windows\SysWOW64\lxmqsy.exe"94⤵PID:3524
-
C:\Windows\SysWOW64\lxneef.exeC:\Windows\system32\lxneef.exe 1528 "C:\Windows\SysWOW64\ykvgyc.exe"95⤵PID:3052
-
C:\Windows\SysWOW64\yketjj.exeC:\Windows\system32\yketjj.exe 1524 "C:\Windows\SysWOW64\lxneef.exe"96⤵PID:3852
-
C:\Windows\SysWOW64\iuuexm.exeC:\Windows\system32\iuuexm.exe 1516 "C:\Windows\SysWOW64\yketjj.exe"97⤵PID:4148
-
C:\Windows\SysWOW64\vhduci.exeC:\Windows\system32\vhduci.exe 1536 "C:\Windows\SysWOW64\iuuexm.exe"98⤵PID:876
-
C:\Windows\SysWOW64\iuvjim.exeC:\Windows\system32\iuvjim.exe 1552 "C:\Windows\SysWOW64\vhduci.exe"99⤵PID:2072
-
C:\Windows\SysWOW64\whmzwq.exeC:\Windows\system32\whmzwq.exe 1540 "C:\Windows\SysWOW64\iuvjim.exe"100⤵PID:2468
-
C:\Windows\SysWOW64\gscjjt.exeC:\Windows\system32\gscjjt.exe 1544 "C:\Windows\SysWOW64\whmzwq.exe"101⤵PID:4056
-
C:\Windows\SysWOW64\tflzpp.exeC:\Windows\system32\tflzpp.exe 1560 "C:\Windows\SysWOW64\gscjjt.exe"102⤵PID:1324
-
C:\Windows\SysWOW64\gsdpvt.exeC:\Windows\system32\gsdpvt.exe 1548 "C:\Windows\SysWOW64\tflzpp.exe"103⤵PID:392
-
C:\Windows\SysWOW64\tfunbw.exeC:\Windows\system32\tfunbw.exe 1532 "C:\Windows\SysWOW64\gsdpvt.exe"104⤵PID:4040
-
C:\Windows\SysWOW64\vqkxoa.exeC:\Windows\system32\vqkxoa.exe 1556 "C:\Windows\SysWOW64\tfunbw.exe"105⤵PID:5028
-
C:\Windows\SysWOW64\idtncd.exeC:\Windows\system32\idtncd.exe 1568 "C:\Windows\SysWOW64\vqkxoa.exe"106⤵PID:1504
-
C:\Windows\SysWOW64\vqlciz.exeC:\Windows\system32\vqlciz.exe 1572 "C:\Windows\SysWOW64\idtncd.exe"107⤵PID:2952
-
C:\Windows\SysWOW64\idcsnd.exeC:\Windows\system32\idcsnd.exe 1588 "C:\Windows\SysWOW64\vqlciz.exe"108⤵PID:3680
-
C:\Windows\SysWOW64\vbxvwl.exeC:\Windows\system32\vbxvwl.exe 1564 "C:\Windows\SysWOW64\idcsnd.exe"109⤵PID:1276
-
C:\Windows\SysWOW64\fabsgk.exeC:\Windows\system32\fabsgk.exe 1584 "C:\Windows\SysWOW64\vbxvwl.exe"110⤵PID:3980
-
C:\Windows\SysWOW64\tntimg.exeC:\Windows\system32\tntimg.exe 1576 "C:\Windows\SysWOW64\fabsgk.exe"111⤵PID:2884
-
C:\Windows\SysWOW64\dmxnff.exeC:\Windows\system32\dmxnff.exe 1592 "C:\Windows\SysWOW64\tntimg.exe"112⤵PID:3608
-
C:\Windows\SysWOW64\qlainn.exeC:\Windows\system32\qlainn.exe 1596 "C:\Windows\SysWOW64\dmxnff.exe"113⤵PID:3756
-
C:\Windows\SysWOW64\dmgtqm.exeC:\Windows\system32\dmgtqm.exe 1580 "C:\Windows\SysWOW64\qlainn.exe"114⤵PID:2036
-
C:\Windows\SysWOW64\nxwddq.exeC:\Windows\system32\nxwddq.exe 1600 "C:\Windows\SysWOW64\dmgtqm.exe"115⤵PID:4360
-
C:\Windows\SysWOW64\akftjt.exeC:\Windows\system32\akftjt.exe 936 "C:\Windows\SysWOW64\nxwddq.exe"116⤵PID:448
-
C:\Windows\SysWOW64\nxxipp.exeC:\Windows\system32\nxxipp.exe 1608 "C:\Windows\SysWOW64\akftjt.exe"117⤵PID:3256
-
C:\Windows\SysWOW64\akoyvt.exeC:\Windows\system32\akoyvt.exe 1616 "C:\Windows\SysWOW64\nxxipp.exe"118⤵
- Drops file in System32 directory
PID:2976 -
C:\Windows\SysWOW64\lrswns.exeC:\Windows\system32\lrswns.exe 1620 "C:\Windows\SysWOW64\akoyvt.exe"119⤵
- Drops file in System32 directory
PID:3224 -
C:\Windows\SysWOW64\bvtrjf.exeC:\Windows\system32\bvtrjf.exe 1612 "C:\Windows\SysWOW64\lrswns.exe"120⤵PID:4736
-
C:\Windows\SysWOW64\lufwcw.exeC:\Windows\system32\lufwcw.exe 1624 "C:\Windows\SysWOW64\bvtrjf.exe"121⤵PID:3348
-
C:\Windows\SysWOW64\yhomha.exeC:\Windows\system32\yhomha.exe 1504 "C:\Windows\SysWOW64\lufwcw.exe"122⤵PID:896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-