Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 05:41
Static task
static1
Behavioral task
behavioral1
Sample
ab236f72d954d59740bc0e8385648363.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab236f72d954d59740bc0e8385648363.exe
Resource
win10v2004-20240226-en
General
-
Target
ab236f72d954d59740bc0e8385648363.exe
-
Size
102KB
-
MD5
ab236f72d954d59740bc0e8385648363
-
SHA1
7d029fdb435ff74c7741e4530e71fc48542e5461
-
SHA256
7f13e384f8471ee8a3fb31e09ecb312e273fe57cd825a27bf67a4f7360ffa35d
-
SHA512
f8741b8ee458575a010a76d33d92ac1051aec23d422900f5b79c2aaf38a5c630b486d59978428ac49e812ca626ea4ecdda5d3a4f3936234209d6b850e6d12ee2
-
SSDEEP
3072:W5NngL4hq/bl2MO2ZJcicS+9p6q61CVmpEm9A:Qjhq/1O2ZEzGB+my
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
Detect Lumma Stealer payload V4 64 IoCs
resource yara_rule behavioral2/memory/1424-8-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4456-14-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/116-16-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3384-22-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4456-26-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3384-31-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2868-37-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4736-41-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4828-45-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2868-49-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4936-53-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4828-54-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4936-61-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2780-68-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3500-75-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2240-81-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4780-84-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2240-88-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2176-98-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4292-102-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4788-105-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4292-110-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/1476-116-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/1740-124-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3928-131-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3124-137-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2380-138-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3124-145-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3164-152-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/1556-160-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4484-166-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3328-172-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4968-176-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3328-182-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4272-188-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/368-191-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4272-195-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3540-201-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4060-207-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/728-209-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3132-215-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4060-216-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3132-222-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4908-229-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2896-233-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2688-237-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4344-241-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/1748-242-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3604-246-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4344-247-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3604-252-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2608-256-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2536-260-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3292-262-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3108-266-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2536-267-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2804-271-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3108-272-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2804-277-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3916-281-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/2768-282-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/3916-286-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/4468-290-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 behavioral2/memory/5116-294-0x0000000000400000-0x00000000004E0000-memory.dmp family_lumma_v4 -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 116 rswylesfr.exe 4456 lubglyakf.exe 3384 wermqoufg.exe 4736 harwxidkt.exe 2868 oecjptgag.exe 4828 exywyhiru.exe 4936 otrogcjoi.exe 2780 ysdmqaqoi.exe 3500 gprzclohw.exe 4780 wxchjurwp.exe 2240 bkwpuewej.exe 2176 oxnfaidry.exe 4788 ytgpqcdol.exe 4292 jlwvutfrm.exe 1476 oqpcoukzg.exe 1740 ylqnvxlwu.exe 3928 dgidbtkja.exe 2380 rtrahwqop.exe 3124 bseyzvqop.exe 3164 lktvelsrq.exe 1556 tshvqbbbp.exe 4484 gjjyhjhqq.exe 4968 ojiynqddy.exe 3328 bwsotukqf.exe 368 onvrcchxf.exe 4272 twdlshndn.exe 3540 dgtjxxpgo.exe 728 lkdwoiswb.exe 4060 wcsctyuzc.exe 3132 ieyjflyap.exe 4908 tarcufhgd.exe 2896 ixahsxnjy.exe 2688 yyxxlgejs.exe 1748 teosoetat.exe 4344 gnuvrdlkm.exe 3604 qnysccskv.exe 2608 amkxubakv.exe 3292 laoqwnvkj.exe 2536 norsrnkld.exe 3108 yjsdzikiq.exe 2804 ibiilymlr.exe 2768 txbttsnqf.exe 3916 dtblbnoos.exe 4468 qgtbgqmsz.exe 5116 qrftvurmo.exe 4044 gzrbcmubh.exe 4284 dabgfpgkv.exe 4052 tqwuyghzr.exe 4836 dpazifpqr.exe 1752 qovcrnmgk.exe 2580 ajvmhivdx.exe 4592 nwncmmuqm.exe 4660 qodhrcwln.exe 3076 anhfcbvkn.exe 2080 dqkdooymv.exe 4172 gxyfeghqp.exe 1640 scrndwqlj.exe 392 ikcvkglal.exe 2168 tcsbxwndm.exe 2356 iketyabim.exe 2152 qaagcdybh.exe 2276 dfrbqtjnz.exe 216 ytzrkemno.exe 952 lgroqiksc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\crzjdetvf.exe sokzibnbs.exe File created C:\Windows\SysWOW64\hqcjmvyff.exe rhfbluinl.exe File created C:\Windows\SysWOW64\ycjpnmqxf.exe fykptxwvf.exe File opened for modification C:\Windows\SysWOW64\ffzfynkde.exe zivxlllsr.exe File created C:\Windows\SysWOW64\tvyhlsufq.exe gfveukpyx.exe File opened for modification C:\Windows\SysWOW64\bffupowcw.exe oswfjsxpi.exe File opened for modification C:\Windows\SysWOW64\wxchjurwp.exe gprzclohw.exe File created C:\Windows\SysWOW64\pabjpfdao.exe xszekmkdu.exe File created C:\Windows\SysWOW64\gmzrjotyj.exe euhcqslac.exe File opened for modification C:\Windows\SysWOW64\aosnsgoxj.exe oyxljyjqq.exe File opened for modification C:\Windows\SysWOW64\nhsxqoqfc.exe digafpifc.exe File opened for modification C:\Windows\SysWOW64\zgzyumfuc.exe mwsvrmfkj.exe File opened for modification C:\Windows\SysWOW64\rknfdqvgu.exe gpmunvvbh.exe File opened for modification C:\Windows\SysWOW64\ypzqadoeq.exe idzvwqrkj.exe File opened for modification C:\Windows\SysWOW64\ivktlphnj.exe lydtsqtyi.exe File created C:\Windows\SysWOW64\sxuuouvih.exe ictkgzvku.exe File opened for modification C:\Windows\SysWOW64\irhdufvjt.exe avxydmstg.exe File opened for modification C:\Windows\SysWOW64\ijzynpbtn.exe vwpihlcgz.exe File created C:\Windows\SysWOW64\lgroqiksc.exe ytzrkemno.exe File created C:\Windows\SysWOW64\vmtlzqciq.exe qzzdggpav.exe File opened for modification C:\Windows\SysWOW64\hwutdklzr.exe fmdelodac.exe File opened for modification C:\Windows\SysWOW64\nckqniphk.exe zpsahmrce.exe File opened for modification C:\Windows\SysWOW64\xtkhjgpdx.exe kyasecqqj.exe File opened for modification C:\Windows\SysWOW64\gdfyxadcd.exe qcqiwrnkj.exe File opened for modification C:\Windows\SysWOW64\vpiigyhol.exe icysauijx.exe File created C:\Windows\SysWOW64\vxroijqgr.exe ikiydfkbl.exe File opened for modification C:\Windows\SysWOW64\oyzqvgoil.exe aosnsgoxj.exe File opened for modification C:\Windows\SysWOW64\lazskqzdx.exe tpusktyeq.exe File opened for modification C:\Windows\SysWOW64\bmstkabuk.exe ltvzamzde.exe File opened for modification C:\Windows\SysWOW64\qgtbgqmsz.exe dtblbnoos.exe File created C:\Windows\SysWOW64\rildmxbdf.exe mhviwaexx.exe File created C:\Windows\SysWOW64\mzddufgrc.exe cszfkgzsc.exe File created C:\Windows\SysWOW64\smygoexwi.exe qdhrwipxb.exe File opened for modification C:\Windows\SysWOW64\abxcvnynv.exe nonmpjabh.exe File created C:\Windows\SysWOW64\hmaxuozqe.exe rwoxnevbk.exe File opened for modification C:\Windows\SysWOW64\nwncmmuqm.exe ajvmhivdx.exe File created C:\Windows\SysWOW64\gxyfeghqp.exe dqkdooymv.exe File created C:\Windows\SysWOW64\ikzipddmr.exe scoajlhpx.exe File opened for modification C:\Windows\SysWOW64\ecdblubxj.exe qsxrivbnh.exe File created C:\Windows\SysWOW64\becbuqklj.exe laugqlnrc.exe File opened for modification C:\Windows\SysWOW64\recqemjuk.exe erkbyilhw.exe File created C:\Windows\SysWOW64\mxnzsdspx.exe eprhyorxq.exe File created C:\Windows\SysWOW64\mjzpdazxx.exe cqksycxuw.exe File created C:\Windows\SysWOW64\fyqhkmtzf.exe slzreqmmz.exe File opened for modification C:\Windows\SysWOW64\eprhyorxq.exe ficchxgjw.exe File opened for modification C:\Windows\SysWOW64\frvwuyrqp.exe xrxwnrnvp.exe File created C:\Windows\SysWOW64\jinlivobw.exe ralylcmfc.exe File opened for modification C:\Windows\SysWOW64\juggwqnot.exe tbrlmukff.exe File opened for modification C:\Windows\SysWOW64\hqcjmvyff.exe rhfbluinl.exe File opened for modification C:\Windows\SysWOW64\wnqcpvava.exe jxwzgnuoz.exe File opened for modification C:\Windows\SysWOW64\xjdetjtit.exe nkzhjklit.exe File opened for modification C:\Windows\SysWOW64\tlsyoitqf.exe oyzqvgoil.exe File opened for modification C:\Windows\SysWOW64\ftnderxzj.exe sgvfynzmd.exe File opened for modification C:\Windows\SysWOW64\hcohbgdxj.exe uaieygdnh.exe File created C:\Windows\SysWOW64\iketyabim.exe tcsbxwndm.exe File created C:\Windows\SysWOW64\peyjurzva.exe zsqoqmcat.exe File opened for modification C:\Windows\SysWOW64\kqjiwowcs.exe ijdfhwvgy.exe File created C:\Windows\SysWOW64\dtblbnoos.exe txbttsnqf.exe File opened for modification C:\Windows\SysWOW64\gutwmscwt.exe wnpzbtuxt.exe File opened for modification C:\Windows\SysWOW64\zakrppfvd.exe mbpoghagl.exe File created C:\Windows\SysWOW64\rwoxnevbk.exe gmzrjotyj.exe File created C:\Windows\SysWOW64\mgxavhesf.exe htdscfzjt.exe File created C:\Windows\SysWOW64\qlhoopivq.exe lgnpvfdvw.exe File created C:\Windows\SysWOW64\rtrahwqop.exe dgidbtkja.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 116 1424 ab236f72d954d59740bc0e8385648363.exe 89 PID 1424 wrote to memory of 116 1424 ab236f72d954d59740bc0e8385648363.exe 89 PID 1424 wrote to memory of 116 1424 ab236f72d954d59740bc0e8385648363.exe 89 PID 116 wrote to memory of 4456 116 rswylesfr.exe 91 PID 116 wrote to memory of 4456 116 rswylesfr.exe 91 PID 116 wrote to memory of 4456 116 rswylesfr.exe 91 PID 4456 wrote to memory of 3384 4456 lubglyakf.exe 92 PID 4456 wrote to memory of 3384 4456 lubglyakf.exe 92 PID 4456 wrote to memory of 3384 4456 lubglyakf.exe 92 PID 3384 wrote to memory of 4736 3384 wermqoufg.exe 93 PID 3384 wrote to memory of 4736 3384 wermqoufg.exe 93 PID 3384 wrote to memory of 4736 3384 wermqoufg.exe 93 PID 4736 wrote to memory of 2868 4736 harwxidkt.exe 94 PID 4736 wrote to memory of 2868 4736 harwxidkt.exe 94 PID 4736 wrote to memory of 2868 4736 harwxidkt.exe 94 PID 2868 wrote to memory of 4828 2868 oecjptgag.exe 95 PID 2868 wrote to memory of 4828 2868 oecjptgag.exe 95 PID 2868 wrote to memory of 4828 2868 oecjptgag.exe 95 PID 4828 wrote to memory of 4936 4828 exywyhiru.exe 96 PID 4828 wrote to memory of 4936 4828 exywyhiru.exe 96 PID 4828 wrote to memory of 4936 4828 exywyhiru.exe 96 PID 4936 wrote to memory of 2780 4936 otrogcjoi.exe 97 PID 4936 wrote to memory of 2780 4936 otrogcjoi.exe 97 PID 4936 wrote to memory of 2780 4936 otrogcjoi.exe 97 PID 2780 wrote to memory of 3500 2780 ysdmqaqoi.exe 98 PID 2780 wrote to memory of 3500 2780 ysdmqaqoi.exe 98 PID 2780 wrote to memory of 3500 2780 ysdmqaqoi.exe 98 PID 3500 wrote to memory of 4780 3500 gprzclohw.exe 99 PID 3500 wrote to memory of 4780 3500 gprzclohw.exe 99 PID 3500 wrote to memory of 4780 3500 gprzclohw.exe 99 PID 4780 wrote to memory of 2240 4780 wxchjurwp.exe 100 PID 4780 wrote to memory of 2240 4780 wxchjurwp.exe 100 PID 4780 wrote to memory of 2240 4780 wxchjurwp.exe 100 PID 2240 wrote to memory of 2176 2240 bkwpuewej.exe 101 PID 2240 wrote to memory of 2176 2240 bkwpuewej.exe 101 PID 2240 wrote to memory of 2176 2240 bkwpuewej.exe 101 PID 2176 wrote to memory of 4788 2176 oxnfaidry.exe 102 PID 2176 wrote to memory of 4788 2176 oxnfaidry.exe 102 PID 2176 wrote to memory of 4788 2176 oxnfaidry.exe 102 PID 4788 wrote to memory of 4292 4788 ytgpqcdol.exe 103 PID 4788 wrote to memory of 4292 4788 ytgpqcdol.exe 103 PID 4788 wrote to memory of 4292 4788 ytgpqcdol.exe 103 PID 4292 wrote to memory of 1476 4292 jlwvutfrm.exe 104 PID 4292 wrote to memory of 1476 4292 jlwvutfrm.exe 104 PID 4292 wrote to memory of 1476 4292 jlwvutfrm.exe 104 PID 1476 wrote to memory of 1740 1476 oqpcoukzg.exe 105 PID 1476 wrote to memory of 1740 1476 oqpcoukzg.exe 105 PID 1476 wrote to memory of 1740 1476 oqpcoukzg.exe 105 PID 1740 wrote to memory of 3928 1740 ylqnvxlwu.exe 107 PID 1740 wrote to memory of 3928 1740 ylqnvxlwu.exe 107 PID 1740 wrote to memory of 3928 1740 ylqnvxlwu.exe 107 PID 3928 wrote to memory of 2380 3928 dgidbtkja.exe 108 PID 3928 wrote to memory of 2380 3928 dgidbtkja.exe 108 PID 3928 wrote to memory of 2380 3928 dgidbtkja.exe 108 PID 2380 wrote to memory of 3124 2380 rtrahwqop.exe 109 PID 2380 wrote to memory of 3124 2380 rtrahwqop.exe 109 PID 2380 wrote to memory of 3124 2380 rtrahwqop.exe 109 PID 3124 wrote to memory of 3164 3124 bseyzvqop.exe 111 PID 3124 wrote to memory of 3164 3124 bseyzvqop.exe 111 PID 3124 wrote to memory of 3164 3124 bseyzvqop.exe 111 PID 3164 wrote to memory of 1556 3164 lktvelsrq.exe 112 PID 3164 wrote to memory of 1556 3164 lktvelsrq.exe 112 PID 3164 wrote to memory of 1556 3164 lktvelsrq.exe 112 PID 1556 wrote to memory of 4484 1556 tshvqbbbp.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab236f72d954d59740bc0e8385648363.exe"C:\Users\Admin\AppData\Local\Temp\ab236f72d954d59740bc0e8385648363.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\rswylesfr.exeC:\Windows\system32\rswylesfr.exe 996 "C:\Users\Admin\AppData\Local\Temp\ab236f72d954d59740bc0e8385648363.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\lubglyakf.exeC:\Windows\system32\lubglyakf.exe 1128 "C:\Windows\SysWOW64\rswylesfr.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\wermqoufg.exeC:\Windows\system32\wermqoufg.exe 1132 "C:\Windows\SysWOW64\lubglyakf.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\harwxidkt.exeC:\Windows\system32\harwxidkt.exe 1136 "C:\Windows\SysWOW64\wermqoufg.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\oecjptgag.exeC:\Windows\system32\oecjptgag.exe 1144 "C:\Windows\SysWOW64\harwxidkt.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\exywyhiru.exeC:\Windows\system32\exywyhiru.exe 1148 "C:\Windows\SysWOW64\oecjptgag.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\otrogcjoi.exeC:\Windows\system32\otrogcjoi.exe 1140 "C:\Windows\SysWOW64\exywyhiru.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\ysdmqaqoi.exeC:\Windows\system32\ysdmqaqoi.exe 992 "C:\Windows\SysWOW64\otrogcjoi.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\gprzclohw.exeC:\Windows\system32\gprzclohw.exe 1160 "C:\Windows\SysWOW64\ysdmqaqoi.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\wxchjurwp.exeC:\Windows\system32\wxchjurwp.exe 1164 "C:\Windows\SysWOW64\gprzclohw.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\bkwpuewej.exeC:\Windows\system32\bkwpuewej.exe 1168 "C:\Windows\SysWOW64\wxchjurwp.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\oxnfaidry.exeC:\Windows\system32\oxnfaidry.exe 1156 "C:\Windows\SysWOW64\bkwpuewej.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\ytgpqcdol.exeC:\Windows\system32\ytgpqcdol.exe 1172 "C:\Windows\SysWOW64\oxnfaidry.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\jlwvutfrm.exeC:\Windows\system32\jlwvutfrm.exe 1180 "C:\Windows\SysWOW64\ytgpqcdol.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\oqpcoukzg.exeC:\Windows\system32\oqpcoukzg.exe 1176 "C:\Windows\SysWOW64\jlwvutfrm.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\ylqnvxlwu.exeC:\Windows\system32\ylqnvxlwu.exe 1188 "C:\Windows\SysWOW64\oqpcoukzg.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\dgidbtkja.exeC:\Windows\system32\dgidbtkja.exe 1192 "C:\Windows\SysWOW64\ylqnvxlwu.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\rtrahwqop.exeC:\Windows\system32\rtrahwqop.exe 1196 "C:\Windows\SysWOW64\dgidbtkja.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\bseyzvqop.exeC:\Windows\system32\bseyzvqop.exe 1200 "C:\Windows\SysWOW64\rtrahwqop.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\lktvelsrq.exeC:\Windows\system32\lktvelsrq.exe 1204 "C:\Windows\SysWOW64\bseyzvqop.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\tshvqbbbp.exeC:\Windows\system32\tshvqbbbp.exe 1208 "C:\Windows\SysWOW64\lktvelsrq.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\gjjyhjhqq.exeC:\Windows\system32\gjjyhjhqq.exe 1212 "C:\Windows\SysWOW64\tshvqbbbp.exe"23⤵
- Executes dropped EXE
PID:4484 -
C:\Windows\SysWOW64\ojiynqddy.exeC:\Windows\system32\ojiynqddy.exe 1028 "C:\Windows\SysWOW64\gjjyhjhqq.exe"24⤵
- Executes dropped EXE
PID:4968 -
C:\Windows\SysWOW64\bwsotukqf.exeC:\Windows\system32\bwsotukqf.exe 1216 "C:\Windows\SysWOW64\ojiynqddy.exe"25⤵
- Executes dropped EXE
PID:3328 -
C:\Windows\SysWOW64\onvrcchxf.exeC:\Windows\system32\onvrcchxf.exe 1220 "C:\Windows\SysWOW64\bwsotukqf.exe"26⤵
- Executes dropped EXE
PID:368 -
C:\Windows\SysWOW64\twdlshndn.exeC:\Windows\system32\twdlshndn.exe 1004 "C:\Windows\SysWOW64\onvrcchxf.exe"27⤵
- Executes dropped EXE
PID:4272 -
C:\Windows\SysWOW64\dgtjxxpgo.exeC:\Windows\system32\dgtjxxpgo.exe 1228 "C:\Windows\SysWOW64\twdlshndn.exe"28⤵
- Executes dropped EXE
PID:3540 -
C:\Windows\SysWOW64\lkdwoiswb.exeC:\Windows\system32\lkdwoiswb.exe 1016 "C:\Windows\SysWOW64\dgtjxxpgo.exe"29⤵
- Executes dropped EXE
PID:728 -
C:\Windows\SysWOW64\wcsctyuzc.exeC:\Windows\system32\wcsctyuzc.exe 1000 "C:\Windows\SysWOW64\lkdwoiswb.exe"30⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\SysWOW64\ieyjflyap.exeC:\Windows\system32\ieyjflyap.exe 1244 "C:\Windows\SysWOW64\wcsctyuzc.exe"31⤵
- Executes dropped EXE
PID:3132 -
C:\Windows\SysWOW64\tarcufhgd.exeC:\Windows\system32\tarcufhgd.exe 1040 "C:\Windows\SysWOW64\ieyjflyap.exe"32⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\ixahsxnjy.exeC:\Windows\system32\ixahsxnjy.exe 1008 "C:\Windows\SysWOW64\tarcufhgd.exe"33⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\yyxxlgejs.exeC:\Windows\system32\yyxxlgejs.exe 1012 "C:\Windows\SysWOW64\ixahsxnjy.exe"34⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\teosoetat.exeC:\Windows\system32\teosoetat.exe 1020 "C:\Windows\SysWOW64\yyxxlgejs.exe"35⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\SysWOW64\gnuvrdlkm.exeC:\Windows\system32\gnuvrdlkm.exe 1060 "C:\Windows\SysWOW64\teosoetat.exe"36⤵
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\qnysccskv.exeC:\Windows\system32\qnysccskv.exe 1268 "C:\Windows\SysWOW64\gnuvrdlkm.exe"37⤵
- Executes dropped EXE
PID:3604 -
C:\Windows\SysWOW64\amkxubakv.exeC:\Windows\system32\amkxubakv.exe 1272 "C:\Windows\SysWOW64\qnysccskv.exe"38⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\laoqwnvkj.exeC:\Windows\system32\laoqwnvkj.exe 1052 "C:\Windows\SysWOW64\amkxubakv.exe"39⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\SysWOW64\norsrnkld.exeC:\Windows\system32\norsrnkld.exe 1048 "C:\Windows\SysWOW64\laoqwnvkj.exe"40⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\yjsdzikiq.exeC:\Windows\system32\yjsdzikiq.exe 1032 "C:\Windows\SysWOW64\norsrnkld.exe"41⤵
- Executes dropped EXE
PID:3108 -
C:\Windows\SysWOW64\ibiilymlr.exeC:\Windows\system32\ibiilymlr.exe 1076 "C:\Windows\SysWOW64\yjsdzikiq.exe"42⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\txbttsnqf.exeC:\Windows\system32\txbttsnqf.exe 1036 "C:\Windows\SysWOW64\ibiilymlr.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2768 -
C:\Windows\SysWOW64\dtblbnoos.exeC:\Windows\system32\dtblbnoos.exe 1056 "C:\Windows\SysWOW64\txbttsnqf.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3916 -
C:\Windows\SysWOW64\qgtbgqmsz.exeC:\Windows\system32\qgtbgqmsz.exe 1072 "C:\Windows\SysWOW64\dtblbnoos.exe"45⤵
- Executes dropped EXE
PID:4468 -
C:\Windows\SysWOW64\qrftvurmo.exeC:\Windows\system32\qrftvurmo.exe 1044 "C:\Windows\SysWOW64\qgtbgqmsz.exe"46⤵
- Executes dropped EXE
PID:5116 -
C:\Windows\SysWOW64\gzrbcmubh.exeC:\Windows\system32\gzrbcmubh.exe 1064 "C:\Windows\SysWOW64\qrftvurmo.exe"47⤵
- Executes dropped EXE
PID:4044 -
C:\Windows\SysWOW64\dabgfpgkv.exeC:\Windows\system32\dabgfpgkv.exe 1312 "C:\Windows\SysWOW64\gzrbcmubh.exe"48⤵
- Executes dropped EXE
PID:4284 -
C:\Windows\SysWOW64\tqwuyghzr.exeC:\Windows\system32\tqwuyghzr.exe 1080 "C:\Windows\SysWOW64\dabgfpgkv.exe"49⤵
- Executes dropped EXE
PID:4052 -
C:\Windows\SysWOW64\dpazifpqr.exeC:\Windows\system32\dpazifpqr.exe 1104 "C:\Windows\SysWOW64\tqwuyghzr.exe"50⤵
- Executes dropped EXE
PID:4836 -
C:\Windows\SysWOW64\qovcrnmgk.exeC:\Windows\system32\qovcrnmgk.exe 1324 "C:\Windows\SysWOW64\dpazifpqr.exe"51⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\ajvmhivdx.exeC:\Windows\system32\ajvmhivdx.exe 1328 "C:\Windows\SysWOW64\qovcrnmgk.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2580 -
C:\Windows\SysWOW64\nwncmmuqm.exeC:\Windows\system32\nwncmmuqm.exe 1092 "C:\Windows\SysWOW64\ajvmhivdx.exe"53⤵
- Executes dropped EXE
PID:4592 -
C:\Windows\SysWOW64\qodhrcwln.exeC:\Windows\system32\qodhrcwln.exe 1332 "C:\Windows\SysWOW64\nwncmmuqm.exe"54⤵
- Executes dropped EXE
PID:4660 -
C:\Windows\SysWOW64\anhfcbvkn.exeC:\Windows\system32\anhfcbvkn.exe 1068 "C:\Windows\SysWOW64\qodhrcwln.exe"55⤵
- Executes dropped EXE
PID:3076 -
C:\Windows\SysWOW64\dqkdooymv.exeC:\Windows\system32\dqkdooymv.exe 1340 "C:\Windows\SysWOW64\anhfcbvkn.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2080 -
C:\Windows\SysWOW64\gxyfeghqp.exeC:\Windows\system32\gxyfeghqp.exe 1348 "C:\Windows\SysWOW64\dqkdooymv.exe"57⤵
- Executes dropped EXE
PID:4172 -
C:\Windows\SysWOW64\scrndwqlj.exeC:\Windows\system32\scrndwqlj.exe 1344 "C:\Windows\SysWOW64\gxyfeghqp.exe"58⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\ikcvkglal.exeC:\Windows\system32\ikcvkglal.exe 1356 "C:\Windows\SysWOW64\scrndwqlj.exe"59⤵
- Executes dropped EXE
PID:392 -
C:\Windows\SysWOW64\tcsbxwndm.exeC:\Windows\system32\tcsbxwndm.exe 1360 "C:\Windows\SysWOW64\ikcvkglal.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\iketyabim.exeC:\Windows\system32\iketyabim.exe 1352 "C:\Windows\SysWOW64\tcsbxwndm.exe"61⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\qaagcdybh.exeC:\Windows\system32\qaagcdybh.exe 1084 "C:\Windows\SysWOW64\iketyabim.exe"62⤵
- Executes dropped EXE
PID:2152 -
C:\Windows\SysWOW64\dfrbqtjnz.exeC:\Windows\system32\dfrbqtjnz.exe 1088 "C:\Windows\SysWOW64\qaagcdybh.exe"63⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\ytzrkemno.exeC:\Windows\system32\ytzrkemno.exe 1124 "C:\Windows\SysWOW64\dfrbqtjnz.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:216 -
C:\Windows\SysWOW64\lgroqiksc.exeC:\Windows\system32\lgroqiksc.exe 1384 "C:\Windows\SysWOW64\ytzrkemno.exe"65⤵
- Executes dropped EXE
PID:952 -
C:\Windows\SysWOW64\idyojpxzd.exeC:\Windows\system32\idyojpxzd.exe 1152 "C:\Windows\SysWOW64\lgroqiksc.exe"66⤵PID:3352
-
C:\Windows\SysWOW64\nqkjueqim.exeC:\Windows\system32\nqkjueqim.exe 1420 "C:\Windows\SysWOW64\idyojpxzd.exe"67⤵PID:4704
-
C:\Windows\SysWOW64\lkffkgwvs.exeC:\Windows\system32\lkffkgwvs.exe 1184 "C:\Windows\SysWOW64\nqkjueqim.exe"68⤵PID:2440
-
C:\Windows\SysWOW64\yxxuykdzg.exeC:\Windows\system32\yxxuykdzg.exe 1224 "C:\Windows\SysWOW64\lkffkgwvs.exe"69⤵PID:4064
-
C:\Windows\SysWOW64\dncpmqgkn.exeC:\Windows\system32\dncpmqgkn.exe 1096 "C:\Windows\SysWOW64\yxxuykdzg.exe"70⤵PID:4812
-
C:\Windows\SysWOW64\lzepvwfbo.exeC:\Windows\system32\lzepvwfbo.exe 1100 "C:\Windows\SysWOW64\dncpmqgkn.exe"71⤵PID:3312
-
C:\Windows\SysWOW64\qmyxogsji.exeC:\Windows\system32\qmyxogsji.exe 1108 "C:\Windows\SysWOW64\lzepvwfbo.exe"72⤵PID:976
-
C:\Windows\SysWOW64\alkvyfrjj.exeC:\Windows\system32\alkvyfrjj.exe 1232 "C:\Windows\SysWOW64\qmyxogsji.exe"73⤵PID:3848
-
C:\Windows\SysWOW64\dcbfiovie.exeC:\Windows\system32\dcbfiovie.exe 1408 "C:\Windows\SysWOW64\alkvyfrjj.exe"74⤵PID:2852
-
C:\Windows\SysWOW64\nnrqvrbkr.exeC:\Windows\system32\nnrqvrbkr.exe 1116 "C:\Windows\SysWOW64\dcbfiovie.exe"75⤵PID:1756
-
C:\Windows\SysWOW64\ipwtnxxht.exeC:\Windows\system32\ipwtnxxht.exe 1112 "C:\Windows\SysWOW64\nnrqvrbkr.exe"76⤵PID:1008
-
C:\Windows\SysWOW64\vrdokjhja.exeC:\Windows\system32\vrdokjhja.exe 1424 "C:\Windows\SysWOW64\ipwtnxxht.exe"77⤵PID:4024
-
C:\Windows\SysWOW64\nroljpseb.exeC:\Windows\system32\nroljpseb.exe 1248 "C:\Windows\SysWOW64\vrdokjhja.exe"78⤵PID:760
-
C:\Windows\SysWOW64\gyqzgimav.exeC:\Windows\system32\gyqzgimav.exe 1120 "C:\Windows\SysWOW64\nroljpseb.exe"79⤵PID:4840
-
C:\Windows\SysWOW64\qxvwyhtav.exeC:\Windows\system32\qxvwyhtav.exe 1440 "C:\Windows\SysWOW64\gyqzgimav.exe"80⤵PID:4712
-
C:\Windows\SysWOW64\awhtjfbzv.exeC:\Windows\system32\awhtjfbzv.exe 1276 "C:\Windows\SysWOW64\qxvwyhtav.exe"81⤵PID:3636
-
C:\Windows\SysWOW64\lllmlzwak.exeC:\Windows\system32\lllmlzwak.exe 1448 "C:\Windows\SysWOW64\awhtjfbzv.exe"82⤵PID:3084
-
C:\Windows\SysWOW64\nnawguccf.exeC:\Windows\system32\nnawguccf.exe 1444 "C:\Windows\SysWOW64\lllmlzwak.exe"83⤵PID:4860
-
C:\Windows\SysWOW64\nznpughom.exeC:\Windows\system32\nznpughom.exe 1280 "C:\Windows\SysWOW64\nnawguccf.exe"84⤵PID:3564
-
C:\Windows\SysWOW64\cpyxbqklf.exeC:\Windows\system32\cpyxbqklf.exe 1264 "C:\Windows\SysWOW64\nznpughom.exe"85⤵PID:532
-
C:\Windows\SysWOW64\nkzhjklit.exeC:\Windows\system32\nkzhjklit.exe 1288 "C:\Windows\SysWOW64\cpyxbqklf.exe"86⤵
- Drops file in System32 directory
PID:3856 -
C:\Windows\SysWOW64\xjdetjtit.exeC:\Windows\system32\xjdetjtit.exe 1236 "C:\Windows\SysWOW64\nkzhjklit.exe"87⤵PID:3580
-
C:\Windows\SysWOW64\ictkgzvku.exeC:\Windows\system32\ictkgzvku.exe 1240 "C:\Windows\SysWOW64\xjdetjtit.exe"88⤵
- Drops file in System32 directory
PID:4136 -
C:\Windows\SysWOW64\sxuuouvih.exeC:\Windows\system32\sxuuouvih.exe 1308 "C:\Windows\SysWOW64\ictkgzvku.exe"89⤵PID:4488
-
C:\Windows\SysWOW64\sxvizbtzk.exeC:\Windows\system32\sxvizbtzk.exe 1480 "C:\Windows\SysWOW64\sxuuouvih.exe"90⤵PID:4952
-
C:\Windows\SysWOW64\iuenxbakx.exeC:\Windows\system32\iuenxbakx.exe 1476 "C:\Windows\SysWOW64\sxvizbtzk.exe"91⤵PID:3800
-
C:\Windows\SysWOW64\pcznsrjdf.exeC:\Windows\system32\pcznsrjdf.exe 1252 "C:\Windows\SysWOW64\iuenxbakx.exe"92⤵PID:4076
-
C:\Windows\SysWOW64\ijcspklzz.exeC:\Windows\system32\ijcspklzz.exe 1492 "C:\Windows\SysWOW64\pcznsrjdf.exe"93⤵PID:440
-
C:\Windows\SysWOW64\vwliunjmf.exeC:\Windows\system32\vwliunjmf.exe 1472 "C:\Windows\SysWOW64\ijcspklzz.exe"94⤵PID:3720
-
C:\Windows\SysWOW64\xcztkfliz.exeC:\Windows\system32\xcztkfliz.exe 1496 "C:\Windows\SysWOW64\vwliunjmf.exe"95⤵PID:5024
-
C:\Windows\SysWOW64\qzzdggpav.exeC:\Windows\system32\qzzdggpav.exe 1504 "C:\Windows\SysWOW64\xcztkfliz.exe"96⤵
- Drops file in System32 directory
PID:4732 -
C:\Windows\SysWOW64\vmtlzqciq.exeC:\Windows\system32\vmtlzqciq.exe 1500 "C:\Windows\SysWOW64\qzzdggpav.exe"97⤵PID:4116
-
C:\Windows\SysWOW64\izcbfubvw.exeC:\Windows\system32\izcbfubvw.exe 1508 "C:\Windows\SysWOW64\vmtlzqciq.exe"98⤵PID:4656
-
C:\Windows\SysWOW64\sudtnobsj.exeC:\Windows\system32\sudtnobsj.exe 1516 "C:\Windows\SysWOW64\izcbfubvw.exe"99⤵PID:4640
-
C:\Windows\SysWOW64\cthrfnjsk.exeC:\Windows\system32\cthrfnjsk.exe 1256 "C:\Windows\SysWOW64\sudtnobsj.exe"100⤵PID:4440
-
C:\Windows\SysWOW64\fwkpsblur.exeC:\Windows\system32\fwkpsblur.exe 1412 "C:\Windows\SysWOW64\cthrfnjsk.exe"101⤵PID:748
-
C:\Windows\SysWOW64\fliujjoit.exeC:\Windows\system32\fliujjoit.exe 1304 "C:\Windows\SysWOW64\fwkpsblur.exe"102⤵PID:4036
-
C:\Windows\SysWOW64\syrkpnnvz.exeC:\Windows\system32\syrkpnnvz.exe 1260 "C:\Windows\SysWOW64\fliujjoit.exe"103⤵PID:1228
-
C:\Windows\SysWOW64\fljzuruao.exeC:\Windows\system32\fljzuruao.exe 1536 "C:\Windows\SysWOW64\syrkpnnvz.exe"104⤵PID:1072
-
C:\Windows\SysWOW64\kbouqxfku.exeC:\Windows\system32\kbouqxfku.exe 1520 "C:\Windows\SysWOW64\fljzuruao.exe"105⤵PID:3512
-
C:\Windows\SysWOW64\agopukcxb.exeC:\Windows\system32\agopukcxb.exe 1540 "C:\Windows\SysWOW64\kbouqxfku.exe"106⤵PID:2316
-
C:\Windows\SysWOW64\ntgfagbjp.exeC:\Windows\system32\ntgfagbjp.exe 1284 "C:\Windows\SysWOW64\agopukcxb.exe"107⤵PID:4184
-
C:\Windows\SysWOW64\scoajlhpx.exeC:\Windows\system32\scoajlhpx.exe 1364 "C:\Windows\SysWOW64\ntgfagbjp.exe"108⤵
- Drops file in System32 directory
PID:908 -
C:\Windows\SysWOW64\ikzipddmr.exeC:\Windows\system32\ikzipddmr.exe 1292 "C:\Windows\SysWOW64\scoajlhpx.exe"109⤵PID:2140
-
C:\Windows\SysWOW64\sgasfxlje.exeC:\Windows\system32\sgasfxlje.exe 1484 "C:\Windows\SysWOW64\ikzipddmr.exe"110⤵PID:2268
-
C:\Windows\SysWOW64\cqpdsssdr.exeC:\Windows\system32\cqpdsssdr.exe 1564 "C:\Windows\SysWOW64\sgasfxlje.exe"111⤵PID:5032
-
C:\Windows\SysWOW64\mmqnavsje.exeC:\Windows\system32\mmqnavsje.exe 1568 "C:\Windows\SysWOW64\cqpdsssdr.exe"112⤵PID:1328
-
C:\Windows\SysWOW64\avxydmstg.exeC:\Windows\system32\avxydmstg.exe 1296 "C:\Windows\SysWOW64\mmqnavsje.exe"113⤵
- Drops file in System32 directory
PID:4300 -
C:\Windows\SysWOW64\irhdufvjt.exeC:\Windows\system32\irhdufvjt.exe 1376 "C:\Windows\SysWOW64\avxydmstg.exe"114⤵PID:8
-
C:\Windows\SysWOW64\szlifedit.exeC:\Windows\system32\szlifedit.exe 1380 "C:\Windows\SysWOW64\irhdufvjt.exe"115⤵PID:3320
-
C:\Windows\SysWOW64\firliwdtv.exeC:\Windows\system32\firliwdtv.exe 1580 "C:\Windows\SysWOW64\szlifedit.exe"116⤵PID:2076
-
C:\Windows\SysWOW64\peswxydqi.exeC:\Windows\system32\peswxydqi.exe 1320 "C:\Windows\SysWOW64\firliwdtv.exe"117⤵PID:1632
-
C:\Windows\SysWOW64\azloftenw.exeC:\Windows\system32\azloftenw.exe 1368 "C:\Windows\SysWOW64\peswxydqi.exe"118⤵PID:1148
-
C:\Windows\SysWOW64\fmdelodac.exeC:\Windows\system32\fmdelodac.exe 1592 "C:\Windows\SysWOW64\azloftenw.exe"119⤵
- Drops file in System32 directory
PID:4008 -
C:\Windows\SysWOW64\hwutdklzr.exeC:\Windows\system32\hwutdklzr.exe 1596 "C:\Windows\SysWOW64\fmdelodac.exe"120⤵PID:5108
-
C:\Windows\SysWOW64\sokzibnbs.exeC:\Windows\system32\sokzibnbs.exe 1600 "C:\Windows\SysWOW64\hwutdklzr.exe"121⤵
- Drops file in System32 directory
PID:4264 -
C:\Windows\SysWOW64\crzjdetvf.exeC:\Windows\system32\crzjdetvf.exe 1608 "C:\Windows\SysWOW64\sokzibnbs.exe"122⤵PID:5080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-