Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
ab236f72d954d59740bc0e8385648363.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab236f72d954d59740bc0e8385648363.exe
Resource
win10v2004-20240226-en
General
-
Target
ab236f72d954d59740bc0e8385648363.exe
-
Size
102KB
-
MD5
ab236f72d954d59740bc0e8385648363
-
SHA1
7d029fdb435ff74c7741e4530e71fc48542e5461
-
SHA256
7f13e384f8471ee8a3fb31e09ecb312e273fe57cd825a27bf67a4f7360ffa35d
-
SHA512
f8741b8ee458575a010a76d33d92ac1051aec23d422900f5b79c2aaf38a5c630b486d59978428ac49e812ca626ea4ecdda5d3a4f3936234209d6b850e6d12ee2
-
SSDEEP
3072:W5NngL4hq/bl2MO2ZJcicS+9p6q61CVmpEm9A:Qjhq/1O2ZEzGB+my
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
Detect Lumma Stealer payload V4 64 IoCs
resource yara_rule behavioral1/memory/2952-15-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1968-17-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2952-30-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1992-40-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2644-45-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2440-53-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1992-57-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2440-69-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1976-81-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1220-92-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1480-102-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/776-105-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1480-119-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2308-127-0x0000000002940000-0x0000000002A20000-memory.dmp family_lumma_v4 behavioral1/memory/2880-128-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2308-131-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2716-141-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/268-154-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2880-145-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2716-157-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2792-166-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/268-170-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2792-181-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1164-191-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/3036-195-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1164-206-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/628-212-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/832-214-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2000-220-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/628-221-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2124-228-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2000-230-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2124-239-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1280-248-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/3060-254-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2516-261-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2592-262-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2516-271-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2648-277-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2632-278-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1524-285-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2648-288-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1256-293-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1524-294-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2692-301-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1256-304-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1532-309-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2692-312-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1532-317-0x00000000027A0000-0x0000000002880000-memory.dmp family_lumma_v4 behavioral1/memory/2200-318-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/1532-320-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2200-327-0x00000000027F0000-0x00000000028D0000-memory.dmp family_lumma_v4 behavioral1/memory/2276-328-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2200-331-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2564-337-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2276-336-0x00000000026A0000-0x0000000002780000-memory.dmp family_lumma_v4 behavioral1/memory/2276-338-0x00000000026A0000-0x0000000002780000-memory.dmp family_lumma_v4 behavioral1/memory/2276-339-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2564-346-0x00000000026D0000-0x00000000027B0000-memory.dmp family_lumma_v4 behavioral1/memory/2008-347-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2564-348-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2008-357-0x0000000002510000-0x00000000025F0000-memory.dmp family_lumma_v4 behavioral1/memory/1940-356-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral1/memory/2008-355-0x0000000002510000-0x00000000025F0000-memory.dmp family_lumma_v4 -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2952 idmiwjrpl.exe 2644 aozaehsns.exe 1992 mqfqplexg.exe 2440 adxgvpdcm.exe 1976 brydlwqyt.exe 1220 oehtzaplz.exe 776 bukwhausa.exe 1480 muotszusa.exe 2308 ywubdmgto.exe 2880 igjlypnva.exe 2716 vtbjetlap.exe 268 fsfgortap.exe 2792 pggwergwo.exe 3036 cxjynzdmp.exe 1164 pksotdkqv.exe 832 zytlrkpnc.exe 628 moooakvuv.exe 2000 znqritabw.exe 2124 jmuotribw.exe 1280 wdprjagix.exe 3060 jbstsalxy.exe 2592 tawrcztxy.exe 2516 coxosggtx.exe 2632 pfsrjodby.exe 2648 csjhpkcfe.exe 1524 mgkefrpce.exe 1256 ztbukvwps.exe 2692 mrwwtdtwt.exe 1532 wumhohiqf.exe 2200 jsgjxhffg.exe 2276 tvemkkuzt.exe 2564 ginkqosmz.exe 2008 qwozgvgig.exe 1940 djgpurenn.exe 1424 qiarczcun.exe 856 akqcqcqxa.exe 704 njkeykoeb.exe 2344 wliptfcyo.exe 3024 jcdscoanp.exe 1676 tmscprohb.exe 2060 gzksvvnuh.exe 3004 qkzciytoc.exe 2088 ajdzbwboc.exe 896 nagcjxgvv.exe 2568 xkvnwamxq.exe 2536 kxfccelcw.exe 2768 vwravctbw.exe 2532 hcicjlefw.exe 376 uadfstbvx.exe 1248 hryiachcy.exe 2576 uhbkjcnjr.exe 1132 wofitaujr.exe 2084 grusoeadl.exe 1336 temiuhzqs.exe 1032 ggsygudrf.exe 2724 qfwvqtlrf.exe 2424 cknqmcwdf.exe 2120 pbisvkckg.exe 576 ziuqfibkg.exe 3012 mzpsojhrz.exe 1736 zxkvwrmya.exe 1728 jwwspquya.exe 1692 tzldctasn.exe 2964 gxgglbgzn.exe -
Loads dropped DLL 64 IoCs
pid Process 1968 ab236f72d954d59740bc0e8385648363.exe 1968 ab236f72d954d59740bc0e8385648363.exe 2952 idmiwjrpl.exe 2952 idmiwjrpl.exe 2644 aozaehsns.exe 2644 aozaehsns.exe 1992 mqfqplexg.exe 1992 mqfqplexg.exe 2440 adxgvpdcm.exe 2440 adxgvpdcm.exe 1976 brydlwqyt.exe 1976 brydlwqyt.exe 1220 oehtzaplz.exe 1220 oehtzaplz.exe 776 bukwhausa.exe 776 bukwhausa.exe 1480 muotszusa.exe 1480 muotszusa.exe 2308 ywubdmgto.exe 2308 ywubdmgto.exe 2880 igjlypnva.exe 2880 igjlypnva.exe 2716 vtbjetlap.exe 2716 vtbjetlap.exe 268 fsfgortap.exe 268 fsfgortap.exe 2792 pggwergwo.exe 2792 pggwergwo.exe 3036 cxjynzdmp.exe 3036 cxjynzdmp.exe 1164 pksotdkqv.exe 1164 pksotdkqv.exe 832 zytlrkpnc.exe 832 zytlrkpnc.exe 628 moooakvuv.exe 628 moooakvuv.exe 2000 znqritabw.exe 2000 znqritabw.exe 2124 jmuotribw.exe 2124 jmuotribw.exe 1280 wdprjagix.exe 1280 wdprjagix.exe 3060 jbstsalxy.exe 3060 jbstsalxy.exe 2592 tawrcztxy.exe 2592 tawrcztxy.exe 2516 coxosggtx.exe 2516 coxosggtx.exe 2632 pfsrjodby.exe 2632 pfsrjodby.exe 2648 csjhpkcfe.exe 2648 csjhpkcfe.exe 1524 mgkefrpce.exe 1524 mgkefrpce.exe 1256 ztbukvwps.exe 1256 ztbukvwps.exe 2692 mrwwtdtwt.exe 2692 mrwwtdtwt.exe 1532 wumhohiqf.exe 1532 wumhohiqf.exe 2200 jsgjxhffg.exe 2200 jsgjxhffg.exe 2276 tvemkkuzt.exe 2276 tvemkkuzt.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fshtbborz.exe yoxojqdte.exe File created C:\Windows\SysWOW64\vlbslnulm.exe rrtsmckgt.exe File opened for modification C:\Windows\SysWOW64\rbehlswkw.exe hyofypiij.exe File created C:\Windows\SysWOW64\iuiwwinqe.exe yyhdoomtq.exe File opened for modification C:\Windows\SysWOW64\mjfpzkpmy.exe fmmronvfx.exe File opened for modification C:\Windows\SysWOW64\dvhqhhvrj.exe gioinfqjp.exe File opened for modification C:\Windows\SysWOW64\tgstvkaqx.exe ppwgzwooz.exe File created C:\Windows\SysWOW64\fshtbborz.exe yoxojqdte.exe File opened for modification C:\Windows\SysWOW64\xcjnoitoq.exe kidycvofd.exe File created C:\Windows\SysWOW64\bvojeuwpj.exe mrhlhzzrj.exe File opened for modification C:\Windows\SysWOW64\weqggettm.exe konexwnml.exe File opened for modification C:\Windows\SysWOW64\vhlcphcbj.exe lxwsumwhw.exe File opened for modification C:\Windows\SysWOW64\lhtstfafk.exe bweigcudy.exe File opened for modification C:\Windows\SysWOW64\svbmbevxr.exe fegstwqqq.exe File created C:\Windows\SysWOW64\kygxdckgp.exe dqlfjmboh.exe File opened for modification C:\Windows\SysWOW64\jxqgpfdht.exe fhlltzrfm.exe File created C:\Windows\SysWOW64\vbutcftwh.exe ntgtpqkez.exe File opened for modification C:\Windows\SysWOW64\kxlvgiqeg.exe yhisyalxf.exe File opened for modification C:\Windows\SysWOW64\xeaiewvgq.exe kfffwwpyx.exe File created C:\Windows\SysWOW64\nhtnmajbo.exe etsqotwfh.exe File opened for modification C:\Windows\SysWOW64\ftaqpsnim.exe xatqbljne.exe File opened for modification C:\Windows\SysWOW64\yvymakdcy.exe hsmsywdzy.exe File created C:\Windows\SysWOW64\yfgubejxl.exe oguxqfbxl.exe File opened for modification C:\Windows\SysWOW64\mkpxhytvf.exe iusdtkhky.exe File created C:\Windows\SysWOW64\mmpkjlcfw.exe efcsxosnx.exe File created C:\Windows\SysWOW64\tojitbdoo.exe gxgglbgzn.exe File created C:\Windows\SysWOW64\vewagvldz.exe ifbyxnfvz.exe File opened for modification C:\Windows\SysWOW64\ntgwvyrkq.exe gahryeiye.exe File created C:\Windows\SysWOW64\ypphwrilj.exe wbmebrbsp.exe File created C:\Windows\SysWOW64\ejhzuvalk.exe xfwmlkxvp.exe File opened for modification C:\Windows\SysWOW64\pijxbnrjh.exe ocgcmaaza.exe File opened for modification C:\Windows\SysWOW64\vmpvmysde.exe zdkqwxxkj.exe File opened for modification C:\Windows\SysWOW64\uvbqybbbd.exe qbtqzjqwk.exe File created C:\Windows\SysWOW64\ggsygudrf.exe temiuhzqs.exe File created C:\Windows\SysWOW64\nygtckqpe.exe ahlrtcthd.exe File opened for modification C:\Windows\SysWOW64\ktsxwzfgn.exe casfngrty.exe File opened for modification C:\Windows\SysWOW64\uaerwxjaw.exe hnmbqccnh.exe File opened for modification C:\Windows\SysWOW64\qmzzphyvn.exe mkrrqxoqu.exe File opened for modification C:\Windows\SysWOW64\dfnjoaolg.exe qhthfsref.exe File opened for modification C:\Windows\SysWOW64\ajdzbwboc.exe qkzciytoc.exe File created C:\Windows\SysWOW64\mtydzeqqm.exe zddbqetjl.exe File created C:\Windows\SysWOW64\rpzhclipf.exe mcgzjcehl.exe File opened for modification C:\Windows\SysWOW64\hxsulhhgq.exe yjzxvhcji.exe File created C:\Windows\SysWOW64\bmaheogfh.exe tiquudepu.exe File opened for modification C:\Windows\SysWOW64\qlkdhzler.exe gjvtlwfcf.exe File created C:\Windows\SysWOW64\yswqsrhpg.exe omvsurush.exe File created C:\Windows\SysWOW64\ygobbiqbv.exe rnpbmbmgv.exe File created C:\Windows\SysWOW64\wtshwfrzg.exe rlnmarfpz.exe File created C:\Windows\SysWOW64\tgstvkaqx.exe ppwgzwooz.exe File created C:\Windows\SysWOW64\moooakvuv.exe zytlrkpnc.exe File created C:\Windows\SysWOW64\ftepketej.exe svbmbevxr.exe File opened for modification C:\Windows\SysWOW64\umivszcaz.exe honajrwtg.exe File opened for modification C:\Windows\SysWOW64\lxwsumwhw.exe ygbpldqzv.exe File opened for modification C:\Windows\SysWOW64\xtuzovmji.exe shjrvlabo.exe File created C:\Windows\SysWOW64\ifbyxnfvz.exe vpgvpnioy.exe File created C:\Windows\SysWOW64\vprsujojo.exe vlhflydtb.exe File created C:\Windows\SysWOW64\tiquudepu.exe llnodktzh.exe File created C:\Windows\SysWOW64\xxtbpvifk.exe nndztscdy.exe File created C:\Windows\SysWOW64\jfwdblfrl.exe bjmpjaubq.exe File created C:\Windows\SysWOW64\kwrxsolum.exe yxovkfgml.exe File opened for modification C:\Windows\SysWOW64\txejjcyge.exe ohhwnonef.exe File opened for modification C:\Windows\SysWOW64\xaufduuuo.exe kjrlulwnn.exe File opened for modification C:\Windows\SysWOW64\ysbkcfxkf.exe tnhcrescl.exe File created C:\Windows\SysWOW64\kkomulbbz.exe nujzyfqrs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2952 1968 ab236f72d954d59740bc0e8385648363.exe 28 PID 1968 wrote to memory of 2952 1968 ab236f72d954d59740bc0e8385648363.exe 28 PID 1968 wrote to memory of 2952 1968 ab236f72d954d59740bc0e8385648363.exe 28 PID 1968 wrote to memory of 2952 1968 ab236f72d954d59740bc0e8385648363.exe 28 PID 2952 wrote to memory of 2644 2952 idmiwjrpl.exe 29 PID 2952 wrote to memory of 2644 2952 idmiwjrpl.exe 29 PID 2952 wrote to memory of 2644 2952 idmiwjrpl.exe 29 PID 2952 wrote to memory of 2644 2952 idmiwjrpl.exe 29 PID 2644 wrote to memory of 1992 2644 aozaehsns.exe 30 PID 2644 wrote to memory of 1992 2644 aozaehsns.exe 30 PID 2644 wrote to memory of 1992 2644 aozaehsns.exe 30 PID 2644 wrote to memory of 1992 2644 aozaehsns.exe 30 PID 1992 wrote to memory of 2440 1992 mqfqplexg.exe 31 PID 1992 wrote to memory of 2440 1992 mqfqplexg.exe 31 PID 1992 wrote to memory of 2440 1992 mqfqplexg.exe 31 PID 1992 wrote to memory of 2440 1992 mqfqplexg.exe 31 PID 2440 wrote to memory of 1976 2440 adxgvpdcm.exe 32 PID 2440 wrote to memory of 1976 2440 adxgvpdcm.exe 32 PID 2440 wrote to memory of 1976 2440 adxgvpdcm.exe 32 PID 2440 wrote to memory of 1976 2440 adxgvpdcm.exe 32 PID 1976 wrote to memory of 1220 1976 brydlwqyt.exe 33 PID 1976 wrote to memory of 1220 1976 brydlwqyt.exe 33 PID 1976 wrote to memory of 1220 1976 brydlwqyt.exe 33 PID 1976 wrote to memory of 1220 1976 brydlwqyt.exe 33 PID 1220 wrote to memory of 776 1220 oehtzaplz.exe 34 PID 1220 wrote to memory of 776 1220 oehtzaplz.exe 34 PID 1220 wrote to memory of 776 1220 oehtzaplz.exe 34 PID 1220 wrote to memory of 776 1220 oehtzaplz.exe 34 PID 776 wrote to memory of 1480 776 bukwhausa.exe 35 PID 776 wrote to memory of 1480 776 bukwhausa.exe 35 PID 776 wrote to memory of 1480 776 bukwhausa.exe 35 PID 776 wrote to memory of 1480 776 bukwhausa.exe 35 PID 1480 wrote to memory of 2308 1480 muotszusa.exe 36 PID 1480 wrote to memory of 2308 1480 muotszusa.exe 36 PID 1480 wrote to memory of 2308 1480 muotszusa.exe 36 PID 1480 wrote to memory of 2308 1480 muotszusa.exe 36 PID 2308 wrote to memory of 2880 2308 ywubdmgto.exe 37 PID 2308 wrote to memory of 2880 2308 ywubdmgto.exe 37 PID 2308 wrote to memory of 2880 2308 ywubdmgto.exe 37 PID 2308 wrote to memory of 2880 2308 ywubdmgto.exe 37 PID 2880 wrote to memory of 2716 2880 igjlypnva.exe 38 PID 2880 wrote to memory of 2716 2880 igjlypnva.exe 38 PID 2880 wrote to memory of 2716 2880 igjlypnva.exe 38 PID 2880 wrote to memory of 2716 2880 igjlypnva.exe 38 PID 2716 wrote to memory of 268 2716 vtbjetlap.exe 39 PID 2716 wrote to memory of 268 2716 vtbjetlap.exe 39 PID 2716 wrote to memory of 268 2716 vtbjetlap.exe 39 PID 2716 wrote to memory of 268 2716 vtbjetlap.exe 39 PID 268 wrote to memory of 2792 268 fsfgortap.exe 40 PID 268 wrote to memory of 2792 268 fsfgortap.exe 40 PID 268 wrote to memory of 2792 268 fsfgortap.exe 40 PID 268 wrote to memory of 2792 268 fsfgortap.exe 40 PID 2792 wrote to memory of 3036 2792 pggwergwo.exe 41 PID 2792 wrote to memory of 3036 2792 pggwergwo.exe 41 PID 2792 wrote to memory of 3036 2792 pggwergwo.exe 41 PID 2792 wrote to memory of 3036 2792 pggwergwo.exe 41 PID 3036 wrote to memory of 1164 3036 cxjynzdmp.exe 42 PID 3036 wrote to memory of 1164 3036 cxjynzdmp.exe 42 PID 3036 wrote to memory of 1164 3036 cxjynzdmp.exe 42 PID 3036 wrote to memory of 1164 3036 cxjynzdmp.exe 42 PID 1164 wrote to memory of 832 1164 pksotdkqv.exe 43 PID 1164 wrote to memory of 832 1164 pksotdkqv.exe 43 PID 1164 wrote to memory of 832 1164 pksotdkqv.exe 43 PID 1164 wrote to memory of 832 1164 pksotdkqv.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab236f72d954d59740bc0e8385648363.exe"C:\Users\Admin\AppData\Local\Temp\ab236f72d954d59740bc0e8385648363.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\idmiwjrpl.exeC:\Windows\system32\idmiwjrpl.exe 456 "C:\Users\Admin\AppData\Local\Temp\ab236f72d954d59740bc0e8385648363.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\aozaehsns.exeC:\Windows\system32\aozaehsns.exe 512 "C:\Windows\SysWOW64\idmiwjrpl.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\mqfqplexg.exeC:\Windows\system32\mqfqplexg.exe 516 "C:\Windows\SysWOW64\aozaehsns.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\adxgvpdcm.exeC:\Windows\system32\adxgvpdcm.exe 520 "C:\Windows\SysWOW64\mqfqplexg.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\brydlwqyt.exeC:\Windows\system32\brydlwqyt.exe 528 "C:\Windows\SysWOW64\adxgvpdcm.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\oehtzaplz.exeC:\Windows\system32\oehtzaplz.exe 524 "C:\Windows\SysWOW64\brydlwqyt.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\bukwhausa.exeC:\Windows\system32\bukwhausa.exe 548 "C:\Windows\SysWOW64\oehtzaplz.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\muotszusa.exeC:\Windows\system32\muotszusa.exe 532 "C:\Windows\SysWOW64\bukwhausa.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\ywubdmgto.exeC:\Windows\system32\ywubdmgto.exe 536 "C:\Windows\SysWOW64\muotszusa.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\igjlypnva.exeC:\Windows\system32\igjlypnva.exe 540 "C:\Windows\SysWOW64\ywubdmgto.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\vtbjetlap.exeC:\Windows\system32\vtbjetlap.exe 544 "C:\Windows\SysWOW64\igjlypnva.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\fsfgortap.exeC:\Windows\system32\fsfgortap.exe 552 "C:\Windows\SysWOW64\vtbjetlap.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\pggwergwo.exeC:\Windows\system32\pggwergwo.exe 564 "C:\Windows\SysWOW64\fsfgortap.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cxjynzdmp.exeC:\Windows\system32\cxjynzdmp.exe 556 "C:\Windows\SysWOW64\pggwergwo.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\pksotdkqv.exeC:\Windows\system32\pksotdkqv.exe 560 "C:\Windows\SysWOW64\cxjynzdmp.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\zytlrkpnc.exeC:\Windows\system32\zytlrkpnc.exe 568 "C:\Windows\SysWOW64\pksotdkqv.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:832 -
C:\Windows\SysWOW64\moooakvuv.exeC:\Windows\system32\moooakvuv.exe 592 "C:\Windows\SysWOW64\zytlrkpnc.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:628 -
C:\Windows\SysWOW64\znqritabw.exeC:\Windows\system32\znqritabw.exe 572 "C:\Windows\SysWOW64\moooakvuv.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2000 -
C:\Windows\SysWOW64\jmuotribw.exeC:\Windows\system32\jmuotribw.exe 580 "C:\Windows\SysWOW64\znqritabw.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2124 -
C:\Windows\SysWOW64\wdprjagix.exeC:\Windows\system32\wdprjagix.exe 576 "C:\Windows\SysWOW64\jmuotribw.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1280 -
C:\Windows\SysWOW64\jbstsalxy.exeC:\Windows\system32\jbstsalxy.exe 584 "C:\Windows\SysWOW64\wdprjagix.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3060 -
C:\Windows\SysWOW64\tawrcztxy.exeC:\Windows\system32\tawrcztxy.exe 588 "C:\Windows\SysWOW64\jbstsalxy.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2592 -
C:\Windows\SysWOW64\coxosggtx.exeC:\Windows\system32\coxosggtx.exe 596 "C:\Windows\SysWOW64\tawrcztxy.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2516 -
C:\Windows\SysWOW64\pfsrjodby.exeC:\Windows\system32\pfsrjodby.exe 600 "C:\Windows\SysWOW64\coxosggtx.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2632 -
C:\Windows\SysWOW64\csjhpkcfe.exeC:\Windows\system32\csjhpkcfe.exe 604 "C:\Windows\SysWOW64\pfsrjodby.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2648 -
C:\Windows\SysWOW64\mgkefrpce.exeC:\Windows\system32\mgkefrpce.exe 608 "C:\Windows\SysWOW64\csjhpkcfe.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524 -
C:\Windows\SysWOW64\ztbukvwps.exeC:\Windows\system32\ztbukvwps.exe 612 "C:\Windows\SysWOW64\mgkefrpce.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1256 -
C:\Windows\SysWOW64\mrwwtdtwt.exeC:\Windows\system32\mrwwtdtwt.exe 616 "C:\Windows\SysWOW64\ztbukvwps.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2692 -
C:\Windows\SysWOW64\wumhohiqf.exeC:\Windows\system32\wumhohiqf.exe 620 "C:\Windows\SysWOW64\mrwwtdtwt.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1532 -
C:\Windows\SysWOW64\jsgjxhffg.exeC:\Windows\system32\jsgjxhffg.exe 624 "C:\Windows\SysWOW64\wumhohiqf.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2200 -
C:\Windows\SysWOW64\tvemkkuzt.exeC:\Windows\system32\tvemkkuzt.exe 628 "C:\Windows\SysWOW64\jsgjxhffg.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2276 -
C:\Windows\SysWOW64\ginkqosmz.exeC:\Windows\system32\ginkqosmz.exe 632 "C:\Windows\SysWOW64\tvemkkuzt.exe"33⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\qwozgvgig.exeC:\Windows\system32\qwozgvgig.exe 636 "C:\Windows\SysWOW64\ginkqosmz.exe"34⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\djgpurenn.exeC:\Windows\system32\djgpurenn.exe 640 "C:\Windows\SysWOW64\qwozgvgig.exe"35⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\SysWOW64\qiarczcun.exeC:\Windows\system32\qiarczcun.exe 648 "C:\Windows\SysWOW64\djgpurenn.exe"36⤵
- Executes dropped EXE
PID:1424 -
C:\Windows\SysWOW64\akqcqcqxa.exeC:\Windows\system32\akqcqcqxa.exe 644 "C:\Windows\SysWOW64\qiarczcun.exe"37⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\njkeykoeb.exeC:\Windows\system32\njkeykoeb.exe 652 "C:\Windows\SysWOW64\akqcqcqxa.exe"38⤵
- Executes dropped EXE
PID:704 -
C:\Windows\SysWOW64\wliptfcyo.exeC:\Windows\system32\wliptfcyo.exe 660 "C:\Windows\SysWOW64\njkeykoeb.exe"39⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\SysWOW64\jcdscoanp.exeC:\Windows\system32\jcdscoanp.exe 656 "C:\Windows\SysWOW64\wliptfcyo.exe"40⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\tmscprohb.exeC:\Windows\system32\tmscprohb.exe 664 "C:\Windows\SysWOW64\jcdscoanp.exe"41⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\SysWOW64\gzksvvnuh.exeC:\Windows\system32\gzksvvnuh.exe 676 "C:\Windows\SysWOW64\tmscprohb.exe"42⤵
- Executes dropped EXE
PID:2060 -
C:\Windows\SysWOW64\qkzciytoc.exeC:\Windows\system32\qkzciytoc.exe 668 "C:\Windows\SysWOW64\gzksvvnuh.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3004 -
C:\Windows\SysWOW64\ajdzbwboc.exeC:\Windows\system32\ajdzbwboc.exe 672 "C:\Windows\SysWOW64\qkzciytoc.exe"44⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\nagcjxgvv.exeC:\Windows\system32\nagcjxgvv.exe 680 "C:\Windows\SysWOW64\ajdzbwboc.exe"45⤵
- Executes dropped EXE
PID:896 -
C:\Windows\SysWOW64\xkvnwamxq.exeC:\Windows\system32\xkvnwamxq.exe 684 "C:\Windows\SysWOW64\nagcjxgvv.exe"46⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\kxfccelcw.exeC:\Windows\system32\kxfccelcw.exe 688 "C:\Windows\SysWOW64\xkvnwamxq.exe"47⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\vwravctbw.exeC:\Windows\system32\vwravctbw.exe 700 "C:\Windows\SysWOW64\kxfccelcw.exe"48⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\hcicjlefw.exeC:\Windows\system32\hcicjlefw.exe 696 "C:\Windows\SysWOW64\vwravctbw.exe"49⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\uadfstbvx.exeC:\Windows\system32\uadfstbvx.exe 704 "C:\Windows\SysWOW64\hcicjlefw.exe"50⤵
- Executes dropped EXE
PID:376 -
C:\Windows\SysWOW64\hryiachcy.exeC:\Windows\system32\hryiachcy.exe 708 "C:\Windows\SysWOW64\uadfstbvx.exe"51⤵
- Executes dropped EXE
PID:1248 -
C:\Windows\SysWOW64\uhbkjcnjr.exeC:\Windows\system32\uhbkjcnjr.exe 692 "C:\Windows\SysWOW64\hryiachcy.exe"52⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\wofitaujr.exeC:\Windows\system32\wofitaujr.exe 712 "C:\Windows\SysWOW64\uhbkjcnjr.exe"53⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\grusoeadl.exeC:\Windows\system32\grusoeadl.exe 716 "C:\Windows\SysWOW64\wofitaujr.exe"54⤵
- Executes dropped EXE
PID:2084 -
C:\Windows\SysWOW64\temiuhzqs.exeC:\Windows\system32\temiuhzqs.exe 720 "C:\Windows\SysWOW64\grusoeadl.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1336 -
C:\Windows\SysWOW64\ggsygudrf.exeC:\Windows\system32\ggsygudrf.exe 724 "C:\Windows\SysWOW64\temiuhzqs.exe"56⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\SysWOW64\qfwvqtlrf.exeC:\Windows\system32\qfwvqtlrf.exe 728 "C:\Windows\SysWOW64\ggsygudrf.exe"57⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\cknqmcwdf.exeC:\Windows\system32\cknqmcwdf.exe 732 "C:\Windows\SysWOW64\qfwvqtlrf.exe"58⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\pbisvkckg.exeC:\Windows\system32\pbisvkckg.exe 736 "C:\Windows\SysWOW64\cknqmcwdf.exe"59⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\ziuqfibkg.exeC:\Windows\system32\ziuqfibkg.exe 740 "C:\Windows\SysWOW64\pbisvkckg.exe"60⤵
- Executes dropped EXE
PID:576 -
C:\Windows\SysWOW64\mzpsojhrz.exeC:\Windows\system32\mzpsojhrz.exe 744 "C:\Windows\SysWOW64\ziuqfibkg.exe"61⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\zxkvwrmya.exeC:\Windows\system32\zxkvwrmya.exe 748 "C:\Windows\SysWOW64\mzpsojhrz.exe"62⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\jwwspquya.exeC:\Windows\system32\jwwspquya.exe 752 "C:\Windows\SysWOW64\zxkvwrmya.exe"63⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\tzldctasn.exeC:\Windows\system32\tzldctasn.exe 756 "C:\Windows\SysWOW64\jwwspquya.exe"64⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\gxgglbgzn.exeC:\Windows\system32\gxgglbgzn.exe 764 "C:\Windows\SysWOW64\tzldctasn.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2964 -
C:\Windows\SysWOW64\tojitbdoo.exeC:\Windows\system32\tojitbdoo.exe 760 "C:\Windows\SysWOW64\gxgglbgzn.exe"66⤵PID:2820
-
C:\Windows\SysWOW64\gqpyfoqqc.exeC:\Windows\system32\gqpyfoqqc.exe 768 "C:\Windows\SysWOW64\tojitbdoo.exe"67⤵PID:2332
-
C:\Windows\SysWOW64\sgkbnonxu.exeC:\Windows\system32\sgkbnonxu.exe 772 "C:\Windows\SysWOW64\gqpyfoqqc.exe"68⤵PID:2908
-
C:\Windows\SysWOW64\fffdwwtmv.exeC:\Windows\system32\fffdwwtmv.exe 776 "C:\Windows\SysWOW64\sgkbnonxu.exe"69⤵PID:1688
-
C:\Windows\SysWOW64\plftudgjv.exeC:\Windows\system32\plftudgjv.exe 780 "C:\Windows\SysWOW64\fffdwwtmv.exe"70⤵PID:1628
-
C:\Windows\SysWOW64\cjivdllqv.exeC:\Windows\system32\cjivdllqv.exe 784 "C:\Windows\SysWOW64\plftudgjv.exe"71⤵PID:2684
-
C:\Windows\SysWOW64\padylmjxw.exeC:\Windows\system32\padylmjxw.exe 788 "C:\Windows\SysWOW64\cjivdllqv.exe"72⤵PID:2844
-
C:\Windows\SysWOW64\cyybuupep.exeC:\Windows\system32\cyybuupep.exe 800 "C:\Windows\SysWOW64\padylmjxw.exe"73⤵PID:2556
-
C:\Windows\SysWOW64\ppadcculq.exeC:\Windows\system32\ppadcculq.exe 804 "C:\Windows\SysWOW64\cyybuupep.exe"74⤵PID:2384
-
C:\Windows\SysWOW64\ydtbabhip.exeC:\Windows\system32\ydtbabhip.exe 808 "C:\Windows\SysWOW64\ppadcculq.exe"75⤵PID:1908
-
C:\Windows\SysWOW64\ltwwjkfpq.exeC:\Windows\system32\ltwwjkfpq.exe 792 "C:\Windows\SysWOW64\ydtbabhip.exe"76⤵PID:1192
-
C:\Windows\SysWOW64\ysrysskwr.exeC:\Windows\system32\ysrysskwr.exe 796 "C:\Windows\SysWOW64\ltwwjkfpq.exe"77⤵PID:708
-
C:\Windows\SysWOW64\limbasqmk.exeC:\Windows\system32\limbasqmk.exe 812 "C:\Windows\SysWOW64\ysrysskwr.exe"78⤵PID:2224
-
C:\Windows\SysWOW64\yzoejantk.exeC:\Windows\system32\yzoejantk.exe 816 "C:\Windows\SysWOW64\limbasqmk.exe"79⤵PID:604
-
C:\Windows\SysWOW64\inpbhhapk.exeC:\Windows\system32\inpbhhapk.exe 828 "C:\Windows\SysWOW64\yzoejantk.exe"80⤵PID:688
-
C:\Windows\SysWOW64\vlkepqgwk.exeC:\Windows\system32\vlkepqgwk.exe 820 "C:\Windows\SysWOW64\inpbhhapk.exe"81⤵PID:272
-
C:\Windows\SysWOW64\hcfgyqmel.exeC:\Windows\system32\hcfgyqmel.exe 824 "C:\Windows\SysWOW64\vlkepqgwk.exe"82⤵PID:2072
-
C:\Windows\SysWOW64\ushjhyjle.exeC:\Windows\system32\ushjhyjle.exe 832 "C:\Windows\SysWOW64\hcfgyqmel.exe"83⤵PID:2112
-
C:\Windows\SysWOW64\hrcmpgpsf.exeC:\Windows\system32\hrcmpgpsf.exe 836 "C:\Windows\SysWOW64\ushjhyjle.exe"84⤵PID:1712
-
C:\Windows\SysWOW64\rxdbfgcoe.exeC:\Windows\system32\rxdbfgcoe.exe 840 "C:\Windows\SysWOW64\hrcmpgpsf.exe"85⤵PID:2832
-
C:\Windows\SysWOW64\ewyeoohwf.exeC:\Windows\system32\ewyeoohwf.exe 844 "C:\Windows\SysWOW64\rxdbfgcoe.exe"86⤵PID:2796
-
C:\Windows\SysWOW64\rmsgfwflg.exeC:\Windows\system32\rmsgfwflg.exe 848 "C:\Windows\SysWOW64\ewyeoohwf.exe"87⤵PID:468
-
C:\Windows\SysWOW64\elvjnwksz.exeC:\Windows\system32\elvjnwksz.exe 852 "C:\Windows\SysWOW64\rmsgfwflg.exe"88⤵PID:1988
-
C:\Windows\SysWOW64\onluazrmt.exeC:\Windows\system32\onluazrmt.exe 856 "C:\Windows\SysWOW64\elvjnwksz.exe"89⤵PID:1272
-
C:\Windows\SysWOW64\amfwjhwtm.exeC:\Windows\system32\amfwjhwtm.exe 860 "C:\Windows\SysWOW64\onluazrmt.exe"90⤵PID:2608
-
C:\Windows\SysWOW64\kovhekdvz.exeC:\Windows\system32\kovhekdvz.exe 864 "C:\Windows\SysWOW64\amfwjhwtm.exe"91⤵PID:1444
-
C:\Windows\SysWOW64\ybmwkojan.exeC:\Windows\system32\ybmwkojan.exe 868 "C:\Windows\SysWOW64\kovhekdvz.exe"92⤵PID:2460
-
C:\Windows\SysWOW64\kahztohpo.exeC:\Windows\system32\kahztohpo.exe 872 "C:\Windows\SysWOW64\ybmwkojan.exe"93⤵PID:2356
-
C:\Windows\SysWOW64\ucfjgsvkb.exeC:\Windows\system32\ucfjgsvkb.exe 876 "C:\Windows\SysWOW64\kahztohpo.exe"94⤵PID:2444
-
C:\Windows\SysWOW64\hbzmoatrb.exeC:\Windows\system32\hbzmoatrb.exe 880 "C:\Windows\SysWOW64\ucfjgsvkb.exe"95⤵PID:1604
-
C:\Windows\SysWOW64\radkzzaqc.exeC:\Windows\system32\radkzzaqc.exe 892 "C:\Windows\SysWOW64\hbzmoatrb.exe"96⤵PID:2864
-
C:\Windows\SysWOW64\hixrgiefv.exeC:\Windows\system32\hixrgiefv.exe 884 "C:\Windows\SysWOW64\radkzzaqc.exe"97⤵PID:1384
-
C:\Windows\SysWOW64\rwqheprcu.exeC:\Windows\system32\rwqheprcu.exe 888 "C:\Windows\SysWOW64\hixrgiefv.exe"98⤵PID:1464
-
C:\Windows\SysWOW64\euskmyprv.exeC:\Windows\system32\euskmyprv.exe 896 "C:\Windows\SysWOW64\rwqheprcu.exe"99⤵PID:1916
-
C:\Windows\SysWOW64\rlnmvyuyw.exeC:\Windows\system32\rlnmvyuyw.exe 900 "C:\Windows\SysWOW64\euskmyprv.exe"100⤵PID:2888
-
C:\Windows\SysWOW64\dbipegafp.exeC:\Windows\system32\dbipegafp.exe 904 "C:\Windows\SysWOW64\rlnmvyuyw.exe"101⤵PID:1320
-
C:\Windows\SysWOW64\ialsmoxmq.exeC:\Windows\system32\ialsmoxmq.exe 916 "C:\Windows\SysWOW64\dbipegafp.exe"102⤵PID:1168
-
C:\Windows\SysWOW64\solpkokjp.exeC:\Windows\system32\solpkokjp.exe 912 "C:\Windows\SysWOW64\ialsmoxmq.exe"103⤵PID:1640
-
C:\Windows\SysWOW64\fegstwqqq.exeC:\Windows\system32\fegstwqqq.exe 924 "C:\Windows\SysWOW64\solpkokjp.exe"104⤵
- Drops file in System32 directory
PID:2208 -
C:\Windows\SysWOW64\svbmbevxr.exeC:\Windows\system32\svbmbevxr.exe 908 "C:\Windows\SysWOW64\fegstwqqq.exe"105⤵
- Drops file in System32 directory
PID:2080 -
C:\Windows\SysWOW64\ftepketej.exeC:\Windows\system32\ftepketej.exe 932 "C:\Windows\SysWOW64\svbmbevxr.exe"106⤵PID:1756
-
C:\Windows\SysWOW64\skzstmzuk.exeC:\Windows\system32\skzstmzuk.exe 920 "C:\Windows\SysWOW64\ftepketej.exe"107⤵PID:2528
-
C:\Windows\SysWOW64\byzpjumqj.exeC:\Windows\system32\byzpjumqj.exe 928 "C:\Windows\SysWOW64\skzstmzuk.exe"108⤵PID:2736
-
C:\Windows\SysWOW64\opuszcrxk.exeC:\Windows\system32\opuszcrxk.exe 936 "C:\Windows\SysWOW64\byzpjumqj.exe"109⤵PID:2552
-
C:\Windows\SysWOW64\bnpuicpel.exeC:\Windows\system32\bnpuicpel.exe 940 "C:\Windows\SysWOW64\opuszcrxk.exe"110⤵PID:2420
-
C:\Windows\SysWOW64\oesxqkumm.exeC:\Windows\system32\oesxqkumm.exe 944 "C:\Windows\SysWOW64\bnpuicpel.exe"111⤵PID:2704
-
C:\Windows\SysWOW64\bcnazsatf.exeC:\Windows\system32\bcnazsatf.exe 948 "C:\Windows\SysWOW64\oesxqkumm.exe"112⤵PID:880
-
C:\Windows\SysWOW64\linppsnpe.exeC:\Windows\system32\linppsnpe.exe 952 "C:\Windows\SysWOW64\bcnazsatf.exe"113⤵PID:1572
-
C:\Windows\SysWOW64\yhisyalxf.exeC:\Windows\system32\yhisyalxf.exe 964 "C:\Windows\SysWOW64\linppsnpe.exe"114⤵
- Drops file in System32 directory
PID:2164 -
C:\Windows\SysWOW64\kxlvgiqeg.exeC:\Windows\system32\kxlvgiqeg.exe 956 "C:\Windows\SysWOW64\yhisyalxf.exe"115⤵PID:2312
-
C:\Windows\SysWOW64\xwgxxiwtg.exeC:\Windows\system32\xwgxxiwtg.exe 960 "C:\Windows\SysWOW64\kxlvgiqeg.exe"116⤵PID:2744
-
C:\Windows\SysWOW64\hyviklcnt.exeC:\Windows\system32\hyviklcnt.exe 968 "C:\Windows\SysWOW64\xwgxxiwtg.exe"117⤵PID:1792
-
C:\Windows\SysWOW64\uxqktuium.exeC:\Windows\system32\uxqktuium.exe 972 "C:\Windows\SysWOW64\hyviklcnt.exe"118⤵PID:2352
-
C:\Windows\SysWOW64\zfvfpitft.exeC:\Windows\system32\zfvfpitft.exe 976 "C:\Windows\SysWOW64\uxqktuium.exe"119⤵PID:1684
-
C:\Windows\SysWOW64\jxkduynau.exeC:\Windows\system32\jxkduynau.exe 980 "C:\Windows\SysWOW64\zfvfpitft.exe"120⤵PID:664
-
C:\Windows\SysWOW64\rijirrduo.exeC:\Windows\system32\rijirrduo.exe 984 "C:\Windows\SysWOW64\jxkduynau.exe"121⤵PID:968
-
C:\Windows\SysWOW64\gycqxbzjh.exeC:\Windows\system32\gycqxbzjh.exe 1000 "C:\Windows\SysWOW64\rijirrduo.exe"122⤵PID:1344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-