Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 03:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ad9940229685fd6abcc00e1de17882ab.exe
Resource
win7-20240220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
ad9940229685fd6abcc00e1de17882ab.exe
Resource
win10v2004-20240226-en
6 signatures
150 seconds
General
-
Target
ad9940229685fd6abcc00e1de17882ab.exe
-
Size
848KB
-
MD5
ad9940229685fd6abcc00e1de17882ab
-
SHA1
9bb7ea76e8f369ff476e438e132a6b0482e7740d
-
SHA256
056471af62308e52d77e24413afe0a36e232ae58a00219ce0fb4c6305825e7b2
-
SHA512
4db562ce1df0d9c448ca0112bc7d10c3f5f8fd0ab7cfb4ced5ddf39e520674fe2670d520883fbad72716fb2c013d43d5b893dc6a23eacfe8022a3752a8e253f9
-
SSDEEP
12288:2TNPom4cxOelra79eWJzPfww4dEBPeKqFAefCnvK9dhwxtaJ:2TihAOelK9ntwlENGAnCdKxgJ
Score
7/10
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad9940229685fd6abcc00e1de17882ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate ad9940229685fd6abcc00e1de17882ab.exe -
Executes dropped EXE 64 IoCs
pid Process 2132 updater.exe 2660 vjfiqkd.exe 2608 lgnidcm.exe 2620 xeilllk.exe 2104 fmvdyat.exe 2792 vuplesx.exe 1592 zklyayi.exe 1640 hwutelf.exe 876 ohsybfo.exe 2280 hpvlyxp.exe 2268 rrkvubv.exe 696 dqnycbb.exe 1496 nscjpeh.exe 1140 bfmyvig.exe 1288 kumwtpt.exe 1568 xkpqcpz.exe 2728 kjktkxe.exe 912 ulzdybl.exe 1692 hkuggjq.exe 292 uxmwmfp.exe 1032 hzslyrt.exe 1616 upmoozz.exe 1784 dskzbcf.exe 2604 quqonhk.exe 2652 dhzetlq.exe 2572 nvatrsv.exe 2476 aisrwoc.exe 1940 kshtkri.exe 2444 xjcwszo.exe 2044 htrgfcu.exe 1552 rtdeybc.exe 308 ejyhgjz.exe 1696 rwqemfg.exe 860 bhfhzin.exe 1980 oxajiqs.exe 2856 bwdmzrq.exe 772 lyswmue.exe 1516 yxnzvcb.exe 452 iwzxfbj.exe 684 vmuzojp.exe 2004 eauxmic.exe 964 rrpzuqz.exe 1644 epkcdzf.exe 2160 oshmqcl.exe 1920 bnrceys.exe 1976 ohxspkw.exe 2192 owvpgsz.exe 2588 xkvnwam.exe 2960 kbqpfis.exe 2480 xoiflmr.exe 2440 kqoveqv.exe 2224 xgjxnyb.exe 2536 hryiach.exe 764 rtnsnfv.exe 2784 zgwnrks.exe 1532 jilpnny.exe 1400 vhgsvve.exe 2304 fjvdiyk.exe 2216 siyfryq.exe 1736 fytiahn.exe 1060 spolipt.exe 1480 czlvdkz.exe 1036 pqgymsf.exe 1304 zbvizvl.exe -
Loads dropped DLL 64 IoCs
pid Process 1688 ad9940229685fd6abcc00e1de17882ab.exe 2132 updater.exe 2132 updater.exe 2132 updater.exe 2132 updater.exe 2132 updater.exe 2660 vjfiqkd.exe 2660 vjfiqkd.exe 2660 vjfiqkd.exe 2660 vjfiqkd.exe 2660 vjfiqkd.exe 2608 lgnidcm.exe 2608 lgnidcm.exe 2608 lgnidcm.exe 2608 lgnidcm.exe 2608 lgnidcm.exe 2620 xeilllk.exe 2620 xeilllk.exe 2620 xeilllk.exe 2620 xeilllk.exe 2620 xeilllk.exe 2104 fmvdyat.exe 2104 fmvdyat.exe 2104 fmvdyat.exe 2104 fmvdyat.exe 2104 fmvdyat.exe 2792 vuplesx.exe 2792 vuplesx.exe 2792 vuplesx.exe 2792 vuplesx.exe 2792 vuplesx.exe 1592 zklyayi.exe 1592 zklyayi.exe 1592 zklyayi.exe 1592 zklyayi.exe 1592 zklyayi.exe 1640 hwutelf.exe 1640 hwutelf.exe 1640 hwutelf.exe 1640 hwutelf.exe 1640 hwutelf.exe 876 ohsybfo.exe 876 ohsybfo.exe 876 ohsybfo.exe 876 ohsybfo.exe 876 ohsybfo.exe 2280 hpvlyxp.exe 2280 hpvlyxp.exe 2280 hpvlyxp.exe 2280 hpvlyxp.exe 2280 hpvlyxp.exe 2268 rrkvubv.exe 2268 rrkvubv.exe 2268 rrkvubv.exe 2268 rrkvubv.exe 2268 rrkvubv.exe 696 dqnycbb.exe 696 dqnycbb.exe 696 dqnycbb.exe 696 dqnycbb.exe 696 dqnycbb.exe 1496 nscjpeh.exe 1496 nscjpeh.exe 1496 nscjpeh.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\yvymakd.exe osicngw.exe File created C:\Windows\SysWOW64\hjfqtlp.exe uscnkdr.exe File opened for modification C:\Windows\SysWOW64\boyposk.exe lkqukfn.exe File created C:\Windows\SysWOW64\epkcdzf.exe rrpzuqz.exe File created C:\Windows\SysWOW64\lairfzk.exe zbnoxzf.exe File opened for modification C:\Windows\SysWOW64\pwawasv.exe fizycki.exe File created C:\Windows\SysWOW64\tgohudg.exe gitflui.exe File created C:\Windows\SysWOW64\hpyokwo.exe uzdlbwj.exe File opened for modification C:\Windows\SysWOW64\btzokcx.exe odwmbur.exe File opened for modification C:\Windows\SysWOW64\vevroig.exe iobpgaa.exe File created C:\Windows\SysWOW64\sxkdhry.exe fzpaqjt.exe File opened for modification C:\Windows\SysWOW64\cntgbjj.exe xozetbd.exe File opened for modification C:\Windows\SysWOW64\sgkbnon.exe gqpyfoq.exe File opened for modification C:\Windows\SysWOW64\mdyyash.exe zqpavwi.exe File opened for modification C:\Windows\SysWOW64\ywukgld.exe picnqeq.exe File opened for modification C:\Windows\SysWOW64\bcongwe.exe tynskrz.exe File created C:\Windows\SysWOW64\tsyjvyk.exe jtumlzc.exe File opened for modification C:\Windows\SysWOW64\shdrfmq.exe fjiowel.exe File created C:\Windows\SysWOW64\mnyvtuy.exe zpdskus.exe File opened for modification C:\Windows\SysWOW64\dioqiqp.exe qjtwsir.exe File opened for modification C:\Windows\SysWOW64\emrsfhx.exe qzaczdy.exe File opened for modification C:\Windows\SysWOW64\qvvpzex.exe dfamqer.exe File opened for modification C:\Windows\SysWOW64\dsjixls.exe ruofodm.exe File created C:\Windows\SysWOW64\jdymfnq.exe wndkwfk.exe File created C:\Windows\SysWOW64\cfznsrk.exe ppfkjjn.exe File created C:\Windows\SysWOW64\pcsrddo.exe fvoutfg.exe File opened for modification C:\Windows\SysWOW64\ahnvlmz.exe qeykyjs.exe File opened for modification C:\Windows\SysWOW64\ymtdmfk.exe lvyaexn.exe File created C:\Windows\SysWOW64\vcqyuvb.exe imvwlnw.exe File opened for modification C:\Windows\SysWOW64\mymenrk.exe cowuaow.exe File opened for modification C:\Windows\SysWOW64\rtixqfe.exe evnuhfz.exe File opened for modification C:\Windows\SysWOW64\ruofodm.exe hooqyvz.exe File opened for modification C:\Windows\SysWOW64\svctzvt.exe ffhqqno.exe File created C:\Windows\SysWOW64\ulzdybl.exe kjktkxe.exe File opened for modification C:\Windows\SysWOW64\teqobws.exe jtbmgtl.exe File created C:\Windows\SysWOW64\vtmykor.exe jurvbom.exe File created C:\Windows\SysWOW64\kvoisjb.exe apokcbo.exe File opened for modification C:\Windows\SysWOW64\amcnvbo.exe qycqxca.exe File created C:\Windows\SysWOW64\zlgtlxq.exe pjriyuk.exe File opened for modification C:\Windows\SysWOW64\jtbmgtl.exe wdgjxlg.exe File created C:\Windows\SysWOW64\tcsnqxf.exe gexkhpa.exe File opened for modification C:\Windows\SysWOW64\tjpthgi.exe gtuqyfl.exe File created C:\Windows\SysWOW64\mpdyjyn.exe cjcitza.exe File opened for modification C:\Windows\SysWOW64\sxzotos.exe fzwllgn.exe File created C:\Windows\SysWOW64\ftpmyih.exe xhprucc.exe File created C:\Windows\SysWOW64\dtytjhm.exe ufxwtaz.exe File opened for modification C:\Windows\SysWOW64\jfimmiw.exe zrhoobj.exe File opened for modification C:\Windows\SysWOW64\wxvfgfn.exe mugdtch.exe File created C:\Windows\SysWOW64\vjadfex.exe itfaxes.exe File created C:\Windows\SysWOW64\rksywfg.exe emxvgxi.exe File opened for modification C:\Windows\SysWOW64\jrpofyc.exe zpaekuo.exe File created C:\Windows\SysWOW64\pwawasv.exe fizycki.exe File opened for modification C:\Windows\SysWOW64\ipaoskn.exe vzylkch.exe File created C:\Windows\SysWOW64\izcpcxj.exe vfwzrlf.exe File created C:\Windows\SysWOW64\pvvpffh.exe cftuxxj.exe File opened for modification C:\Windows\SysWOW64\xrsaozg.exe hnkfkmb.exe File opened for modification C:\Windows\SysWOW64\ykvrkvn.exe lxlbeao.exe File opened for modification C:\Windows\SysWOW64\ganfbzs.exe wmmilrf.exe File created C:\Windows\SysWOW64\cadupht.exe pcjrgzn.exe File created C:\Windows\SysWOW64\syqyqek.exe fznviwe.exe File opened for modification C:\Windows\SysWOW64\aqdjvjm.exe nzbgnbg.exe File created C:\Windows\SysWOW64\xrowzvy.exe kattrns.exe File opened for modification C:\Windows\SysWOW64\tsyjvyk.exe jtumlzc.exe File opened for modification C:\Windows\SysWOW64\nxjygrm.exe dyfbwtf.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62366775-2A45-7E34-4FE8-CCD65283E88E}\InprocServer32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\RECALL.DLL" ad9940229685fd6abcc00e1de17882ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62366775-2A45-7E34-4FE8-CCD65283E88E}\MapiFormFactory ad9940229685fd6abcc00e1de17882ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62366775-2A45-7E34-4FE8-CCD65283E88E}\MapiFormFactory\ = "1" ad9940229685fd6abcc00e1de17882ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62366775-2A45-7E34-4FE8-CCD65283E88E} ad9940229685fd6abcc00e1de17882ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62366775-2A45-7E34-4FE8-CCD65283E88E}\ = "Outlook Message Recall Item" ad9940229685fd6abcc00e1de17882ab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{62366775-2A45-7E34-4FE8-CCD65283E88E}\InprocServer32 ad9940229685fd6abcc00e1de17882ab.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1688 ad9940229685fd6abcc00e1de17882ab.exe Token: SeIncBasePriorityPrivilege 1688 ad9940229685fd6abcc00e1de17882ab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2132 1688 ad9940229685fd6abcc00e1de17882ab.exe 28 PID 1688 wrote to memory of 2132 1688 ad9940229685fd6abcc00e1de17882ab.exe 28 PID 1688 wrote to memory of 2132 1688 ad9940229685fd6abcc00e1de17882ab.exe 28 PID 1688 wrote to memory of 2132 1688 ad9940229685fd6abcc00e1de17882ab.exe 28 PID 1688 wrote to memory of 2132 1688 ad9940229685fd6abcc00e1de17882ab.exe 28 PID 1688 wrote to memory of 2132 1688 ad9940229685fd6abcc00e1de17882ab.exe 28 PID 1688 wrote to memory of 2132 1688 ad9940229685fd6abcc00e1de17882ab.exe 28 PID 2132 wrote to memory of 2660 2132 updater.exe 29 PID 2132 wrote to memory of 2660 2132 updater.exe 29 PID 2132 wrote to memory of 2660 2132 updater.exe 29 PID 2132 wrote to memory of 2660 2132 updater.exe 29 PID 2132 wrote to memory of 2660 2132 updater.exe 29 PID 2132 wrote to memory of 2660 2132 updater.exe 29 PID 2132 wrote to memory of 2660 2132 updater.exe 29 PID 2660 wrote to memory of 2608 2660 vjfiqkd.exe 30 PID 2660 wrote to memory of 2608 2660 vjfiqkd.exe 30 PID 2660 wrote to memory of 2608 2660 vjfiqkd.exe 30 PID 2660 wrote to memory of 2608 2660 vjfiqkd.exe 30 PID 2660 wrote to memory of 2608 2660 vjfiqkd.exe 30 PID 2660 wrote to memory of 2608 2660 vjfiqkd.exe 30 PID 2660 wrote to memory of 2608 2660 vjfiqkd.exe 30 PID 2608 wrote to memory of 2620 2608 lgnidcm.exe 31 PID 2608 wrote to memory of 2620 2608 lgnidcm.exe 31 PID 2608 wrote to memory of 2620 2608 lgnidcm.exe 31 PID 2608 wrote to memory of 2620 2608 lgnidcm.exe 31 PID 2608 wrote to memory of 2620 2608 lgnidcm.exe 31 PID 2608 wrote to memory of 2620 2608 lgnidcm.exe 31 PID 2608 wrote to memory of 2620 2608 lgnidcm.exe 31 PID 2620 wrote to memory of 2104 2620 xeilllk.exe 32 PID 2620 wrote to memory of 2104 2620 xeilllk.exe 32 PID 2620 wrote to memory of 2104 2620 xeilllk.exe 32 PID 2620 wrote to memory of 2104 2620 xeilllk.exe 32 PID 2620 wrote to memory of 2104 2620 xeilllk.exe 32 PID 2620 wrote to memory of 2104 2620 xeilllk.exe 32 PID 2620 wrote to memory of 2104 2620 xeilllk.exe 32 PID 2104 wrote to memory of 2792 2104 fmvdyat.exe 33 PID 2104 wrote to memory of 2792 2104 fmvdyat.exe 33 PID 2104 wrote to memory of 2792 2104 fmvdyat.exe 33 PID 2104 wrote to memory of 2792 2104 fmvdyat.exe 33 PID 2104 wrote to memory of 2792 2104 fmvdyat.exe 33 PID 2104 wrote to memory of 2792 2104 fmvdyat.exe 33 PID 2104 wrote to memory of 2792 2104 fmvdyat.exe 33 PID 2792 wrote to memory of 1592 2792 vuplesx.exe 34 PID 2792 wrote to memory of 1592 2792 vuplesx.exe 34 PID 2792 wrote to memory of 1592 2792 vuplesx.exe 34 PID 2792 wrote to memory of 1592 2792 vuplesx.exe 34 PID 2792 wrote to memory of 1592 2792 vuplesx.exe 34 PID 2792 wrote to memory of 1592 2792 vuplesx.exe 34 PID 2792 wrote to memory of 1592 2792 vuplesx.exe 34 PID 1592 wrote to memory of 1640 1592 zklyayi.exe 35 PID 1592 wrote to memory of 1640 1592 zklyayi.exe 35 PID 1592 wrote to memory of 1640 1592 zklyayi.exe 35 PID 1592 wrote to memory of 1640 1592 zklyayi.exe 35 PID 1592 wrote to memory of 1640 1592 zklyayi.exe 35 PID 1592 wrote to memory of 1640 1592 zklyayi.exe 35 PID 1592 wrote to memory of 1640 1592 zklyayi.exe 35 PID 1640 wrote to memory of 876 1640 hwutelf.exe 36 PID 1640 wrote to memory of 876 1640 hwutelf.exe 36 PID 1640 wrote to memory of 876 1640 hwutelf.exe 36 PID 1640 wrote to memory of 876 1640 hwutelf.exe 36 PID 1640 wrote to memory of 876 1640 hwutelf.exe 36 PID 1640 wrote to memory of 876 1640 hwutelf.exe 36 PID 1640 wrote to memory of 876 1640 hwutelf.exe 36 PID 876 wrote to memory of 2280 876 ohsybfo.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad9940229685fd6abcc00e1de17882ab.exe"C:\Users\Admin\AppData\Local\Temp\ad9940229685fd6abcc00e1de17882ab.exe"1⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\updater.exeupdater.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\vjfiqkd.exeC:\Windows\system32\vjfiqkd.exe 540 "C:\Users\Admin\AppData\Local\Temp\updater.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\lgnidcm.exeC:\Windows\system32\lgnidcm.exe 604 "C:\Windows\SysWOW64\vjfiqkd.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\xeilllk.exeC:\Windows\system32\xeilllk.exe 596 "C:\Windows\SysWOW64\lgnidcm.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\fmvdyat.exeC:\Windows\system32\fmvdyat.exe 620 "C:\Windows\SysWOW64\xeilllk.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\vuplesx.exeC:\Windows\system32\vuplesx.exe 600 "C:\Windows\SysWOW64\fmvdyat.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\zklyayi.exeC:\Windows\system32\zklyayi.exe 628 "C:\Windows\SysWOW64\vuplesx.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\hwutelf.exeC:\Windows\system32\hwutelf.exe 608 "C:\Windows\SysWOW64\zklyayi.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\ohsybfo.exeC:\Windows\system32\ohsybfo.exe 632 "C:\Windows\SysWOW64\hwutelf.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\hpvlyxp.exeC:\Windows\system32\hpvlyxp.exe 616 "C:\Windows\SysWOW64\ohsybfo.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2280 -
C:\Windows\SysWOW64\rrkvubv.exeC:\Windows\system32\rrkvubv.exe 612 "C:\Windows\SysWOW64\hpvlyxp.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2268 -
C:\Windows\SysWOW64\dqnycbb.exeC:\Windows\system32\dqnycbb.exe 624 "C:\Windows\SysWOW64\rrkvubv.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:696 -
C:\Windows\SysWOW64\nscjpeh.exeC:\Windows\system32\nscjpeh.exe 636 "C:\Windows\SysWOW64\dqnycbb.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1496 -
C:\Windows\SysWOW64\bfmyvig.exeC:\Windows\system32\bfmyvig.exe 640 "C:\Windows\SysWOW64\nscjpeh.exe"15⤵
- Executes dropped EXE
PID:1140 -
C:\Windows\SysWOW64\kumwtpt.exeC:\Windows\system32\kumwtpt.exe 652 "C:\Windows\SysWOW64\bfmyvig.exe"16⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\xkpqcpz.exeC:\Windows\system32\xkpqcpz.exe 644 "C:\Windows\SysWOW64\kumwtpt.exe"17⤵
- Executes dropped EXE
PID:1568 -
C:\Windows\SysWOW64\kjktkxe.exeC:\Windows\system32\kjktkxe.exe 648 "C:\Windows\SysWOW64\xkpqcpz.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2728 -
C:\Windows\SysWOW64\ulzdybl.exeC:\Windows\system32\ulzdybl.exe 656 "C:\Windows\SysWOW64\kjktkxe.exe"19⤵
- Executes dropped EXE
PID:912 -
C:\Windows\SysWOW64\hkuggjq.exeC:\Windows\system32\hkuggjq.exe 676 "C:\Windows\SysWOW64\ulzdybl.exe"20⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\uxmwmfp.exeC:\Windows\system32\uxmwmfp.exe 660 "C:\Windows\SysWOW64\hkuggjq.exe"21⤵
- Executes dropped EXE
PID:292 -
C:\Windows\SysWOW64\hzslyrt.exeC:\Windows\system32\hzslyrt.exe 664 "C:\Windows\SysWOW64\uxmwmfp.exe"22⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\SysWOW64\upmoozz.exeC:\Windows\system32\upmoozz.exe 668 "C:\Windows\SysWOW64\hzslyrt.exe"23⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\dskzbcf.exeC:\Windows\system32\dskzbcf.exe 680 "C:\Windows\SysWOW64\upmoozz.exe"24⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\quqonhk.exeC:\Windows\system32\quqonhk.exe 672 "C:\Windows\SysWOW64\dskzbcf.exe"25⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\dhzetlq.exeC:\Windows\system32\dhzetlq.exe 684 "C:\Windows\SysWOW64\quqonhk.exe"26⤵
- Executes dropped EXE
PID:2652 -
C:\Windows\SysWOW64\nvatrsv.exeC:\Windows\system32\nvatrsv.exe 696 "C:\Windows\SysWOW64\dhzetlq.exe"27⤵
- Executes dropped EXE
PID:2572 -
C:\Windows\SysWOW64\aisrwoc.exeC:\Windows\system32\aisrwoc.exe 688 "C:\Windows\SysWOW64\nvatrsv.exe"28⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\SysWOW64\kshtkri.exeC:\Windows\system32\kshtkri.exe 692 "C:\Windows\SysWOW64\aisrwoc.exe"29⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\SysWOW64\xjcwszo.exeC:\Windows\system32\xjcwszo.exe 716 "C:\Windows\SysWOW64\kshtkri.exe"30⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\htrgfcu.exeC:\Windows\system32\htrgfcu.exe 704 "C:\Windows\SysWOW64\xjcwszo.exe"31⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\rtdeybc.exeC:\Windows\system32\rtdeybc.exe 700 "C:\Windows\SysWOW64\htrgfcu.exe"32⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\ejyhgjz.exeC:\Windows\system32\ejyhgjz.exe 708 "C:\Windows\SysWOW64\rtdeybc.exe"33⤵
- Executes dropped EXE
PID:308 -
C:\Windows\SysWOW64\rwqemfg.exeC:\Windows\system32\rwqemfg.exe 720 "C:\Windows\SysWOW64\ejyhgjz.exe"34⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\bhfhzin.exeC:\Windows\system32\bhfhzin.exe 712 "C:\Windows\SysWOW64\rwqemfg.exe"35⤵
- Executes dropped EXE
PID:860 -
C:\Windows\SysWOW64\oxajiqs.exeC:\Windows\system32\oxajiqs.exe 732 "C:\Windows\SysWOW64\bhfhzin.exe"36⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\bwdmzrq.exeC:\Windows\system32\bwdmzrq.exe 724 "C:\Windows\SysWOW64\oxajiqs.exe"37⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\SysWOW64\lyswmue.exeC:\Windows\system32\lyswmue.exe 740 "C:\Windows\SysWOW64\bwdmzrq.exe"38⤵
- Executes dropped EXE
PID:772 -
C:\Windows\SysWOW64\yxnzvcb.exeC:\Windows\system32\yxnzvcb.exe 728 "C:\Windows\SysWOW64\lyswmue.exe"39⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\iwzxfbj.exeC:\Windows\system32\iwzxfbj.exe 736 "C:\Windows\SysWOW64\yxnzvcb.exe"40⤵
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\vmuzojp.exeC:\Windows\system32\vmuzojp.exe 744 "C:\Windows\SysWOW64\iwzxfbj.exe"41⤵
- Executes dropped EXE
PID:684 -
C:\Windows\SysWOW64\eauxmic.exeC:\Windows\system32\eauxmic.exe 756 "C:\Windows\SysWOW64\vmuzojp.exe"42⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\rrpzuqz.exeC:\Windows\system32\rrpzuqz.exe 748 "C:\Windows\SysWOW64\eauxmic.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:964 -
C:\Windows\SysWOW64\epkcdzf.exeC:\Windows\system32\epkcdzf.exe 752 "C:\Windows\SysWOW64\rrpzuqz.exe"44⤵
- Executes dropped EXE
PID:1644 -
C:\Windows\SysWOW64\oshmqcl.exeC:\Windows\system32\oshmqcl.exe 760 "C:\Windows\SysWOW64\epkcdzf.exe"45⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\bnrceys.exeC:\Windows\system32\bnrceys.exe 780 "C:\Windows\SysWOW64\oshmqcl.exe"46⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\ohxspkw.exeC:\Windows\system32\ohxspkw.exe 764 "C:\Windows\SysWOW64\bnrceys.exe"47⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\bgamysc.exeC:\Windows\system32\bgamysc.exe 776 "C:\Windows\SysWOW64\ohxspkw.exe"48⤵PID:1608
-
C:\Windows\SysWOW64\owvpgsz.exeC:\Windows\system32\owvpgsz.exe 768 "C:\Windows\SysWOW64\bgamysc.exe"49⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\xkvnwam.exeC:\Windows\system32\xkvnwam.exe 772 "C:\Windows\SysWOW64\owvpgsz.exe"50⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\kbqpfis.exeC:\Windows\system32\kbqpfis.exe 788 "C:\Windows\SysWOW64\xkvnwam.exe"51⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\xoiflmr.exeC:\Windows\system32\xoiflmr.exe 784 "C:\Windows\SysWOW64\kbqpfis.exe"52⤵
- Executes dropped EXE
PID:2480 -
C:\Windows\SysWOW64\kqoveqv.exeC:\Windows\system32\kqoveqv.exe 792 "C:\Windows\SysWOW64\xoiflmr.exe"53⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\xgjxnyb.exeC:\Windows\system32\xgjxnyb.exe 808 "C:\Windows\SysWOW64\kqoveqv.exe"54⤵
- Executes dropped EXE
PID:2224 -
C:\Windows\SysWOW64\hryiach.exeC:\Windows\system32\hryiach.exe 796 "C:\Windows\SysWOW64\xgjxnyb.exe"55⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\rtnsnfv.exeC:\Windows\system32\rtnsnfv.exe 812 "C:\Windows\SysWOW64\hryiach.exe"56⤵
- Executes dropped EXE
PID:764 -
C:\Windows\SysWOW64\zgwnrks.exeC:\Windows\system32\zgwnrks.exe 800 "C:\Windows\SysWOW64\rtnsnfv.exe"57⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\jilpnny.exeC:\Windows\system32\jilpnny.exe 820 "C:\Windows\SysWOW64\zgwnrks.exe"58⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\SysWOW64\vhgsvve.exeC:\Windows\system32\vhgsvve.exe 804 "C:\Windows\SysWOW64\jilpnny.exe"59⤵
- Executes dropped EXE
PID:1400 -
C:\Windows\SysWOW64\fjvdiyk.exeC:\Windows\system32\fjvdiyk.exe 828 "C:\Windows\SysWOW64\vhgsvve.exe"60⤵
- Executes dropped EXE
PID:2304 -
C:\Windows\SysWOW64\siyfryq.exeC:\Windows\system32\siyfryq.exe 816 "C:\Windows\SysWOW64\fjvdiyk.exe"61⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\fytiahn.exeC:\Windows\system32\fytiahn.exe 836 "C:\Windows\SysWOW64\siyfryq.exe"62⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\spolipt.exeC:\Windows\system32\spolipt.exe 824 "C:\Windows\SysWOW64\fytiahn.exe"63⤵
- Executes dropped EXE
PID:1060 -
C:\Windows\SysWOW64\czlvdkz.exeC:\Windows\system32\czlvdkz.exe 844 "C:\Windows\SysWOW64\spolipt.exe"64⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\pqgymsf.exeC:\Windows\system32\pqgymsf.exe 832 "C:\Windows\SysWOW64\czlvdkz.exe"65⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\SysWOW64\zbvizvl.exeC:\Windows\system32\zbvizvl.exe 840 "C:\Windows\SysWOW64\pqgymsf.exe"66⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\monyfzs.exeC:\Windows\system32\monyfzs.exe 848 "C:\Windows\SysWOW64\zbvizvl.exe"67⤵PID:680
-
C:\Windows\SysWOW64\wcnvdgx.exeC:\Windows\system32\wcnvdgx.exe 852 "C:\Windows\SysWOW64\monyfzs.exe"68⤵PID:320
-
C:\Windows\SysWOW64\jsiymhd.exeC:\Windows\system32\jsiymhd.exe 856 "C:\Windows\SysWOW64\wcnvdgx.exe"69⤵PID:2164
-
C:\Windows\SysWOW64\wfaoskb.exeC:\Windows\system32\wfaoskb.exe 860 "C:\Windows\SysWOW64\jsiymhd.exe"70⤵PID:2040
-
C:\Windows\SysWOW64\gqpyfoq.exeC:\Windows\system32\gqpyfoq.exe 864 "C:\Windows\SysWOW64\wfaoskb.exe"71⤵
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\sgkbnon.exeC:\Windows\system32\sgkbnon.exe 884 "C:\Windows\SysWOW64\gqpyfoq.exe"72⤵PID:2372
-
C:\Windows\SysWOW64\fffdwwt.exeC:\Windows\system32\fffdwwt.exe 868 "C:\Windows\SysWOW64\sgkbnon.exe"73⤵PID:1192
-
C:\Windows\SysWOW64\plftudg.exeC:\Windows\system32\plftudg.exe 876 "C:\Windows\SysWOW64\fffdwwt.exe"74⤵PID:2600
-
C:\Windows\SysWOW64\cjivdll.exeC:\Windows\system32\cjivdll.exe 872 "C:\Windows\SysWOW64\plftudg.exe"75⤵PID:2448
-
C:\Windows\SysWOW64\pwslihk.exeC:\Windows\system32\pwslihk.exe 892 "C:\Windows\SysWOW64\cjivdll.exe"76⤵PID:2944
-
C:\Windows\SysWOW64\zksiypx.exeC:\Windows\system32\zksiypx.exe 880 "C:\Windows\SysWOW64\pwslihk.exe"77⤵PID:2208
-
C:\Windows\SysWOW64\mxkymtw.exeC:\Windows\system32\mxkymtw.exe 888 "C:\Windows\SysWOW64\zksiypx.exe"78⤵PID:2580
-
C:\Windows\SysWOW64\zofbvbc.exeC:\Windows\system32\zofbvbc.exe 896 "C:\Windows\SysWOW64\mxkymtw.exe"79⤵PID:1948
-
C:\Windows\SysWOW64\jyuliwi.exeC:\Windows\system32\jyuliwi.exe 908 "C:\Windows\SysWOW64\zofbvbc.exe"80⤵PID:1924
-
C:\Windows\SysWOW64\wpporen.exeC:\Windows\system32\wpporen.exe 900 "C:\Windows\SysWOW64\jyuliwi.exe"81⤵PID:1272
-
C:\Windows\SysWOW64\gamymhu.exeC:\Windows\system32\gamymhu.exe 924 "C:\Windows\SysWOW64\wpporen.exe"82⤵PID:1572
-
C:\Windows\SysWOW64\sqhbupz.exeC:\Windows\system32\sqhbupz.exe 912 "C:\Windows\SysWOW64\gamymhu.exe"83⤵PID:2088
-
C:\Windows\SysWOW64\fhcedpx.exeC:\Windows\system32\fhcedpx.exe 904 "C:\Windows\SysWOW64\sqhbupz.exe"84⤵PID:2120
-
C:\Windows\SysWOW64\sffgmyc.exeC:\Windows\system32\sffgmyc.exe 916 "C:\Windows\SysWOW64\fhcedpx.exe"85⤵PID:2236
-
C:\Windows\SysWOW64\ciujzbj.exeC:\Windows\system32\ciujzbj.exe 920 "C:\Windows\SysWOW64\sffgmyc.exe"86⤵PID:2632
-
C:\Windows\SysWOW64\pgplijo.exeC:\Windows\system32\pgplijo.exe 928 "C:\Windows\SysWOW64\ciujzbj.exe"87⤵PID:2412
-
C:\Windows\SysWOW64\zjewdev.exeC:\Windows\system32\zjewdev.exe 940 "C:\Windows\SysWOW64\pgplijo.exe"88⤵PID:1820
-
C:\Windows\SysWOW64\mlkmoqh.exeC:\Windows\system32\mlkmoqh.exe 936 "C:\Windows\SysWOW64\zjewdev.exe"89⤵PID:1308
-
C:\Windows\SysWOW64\zbnoxzf.exeC:\Windows\system32\zbnoxzf.exe 948 "C:\Windows\SysWOW64\mlkmoqh.exe"90⤵
- Drops file in System32 directory
PID:2008 -
C:\Windows\SysWOW64\lairfzk.exeC:\Windows\system32\lairfzk.exe 952 "C:\Windows\SysWOW64\zbnoxzf.exe"91⤵PID:2892
-
C:\Windows\SysWOW64\yqduohq.exeC:\Windows\system32\yqduohq.exe 956 "C:\Windows\SysWOW64\lairfzk.exe"92⤵PID:1252
-
C:\Windows\SysWOW64\lpfwxpn.exeC:\Windows\system32\lpfwxpn.exe 932 "C:\Windows\SysWOW64\yqduohq.exe"93⤵PID:2332
-
C:\Windows\SysWOW64\vrvhssc.exeC:\Windows\system32\vrvhssc.exe 960 "C:\Windows\SysWOW64\lpfwxpn.exe"94⤵PID:2112
-
C:\Windows\SysWOW64\iiqjasz.exeC:\Windows\system32\iiqjasz.exe 944 "C:\Windows\SysWOW64\vrvhssc.exe"95⤵PID:2540
-
C:\Windows\SysWOW64\ssfmown.exeC:\Windows\system32\ssfmown.exe 964 "C:\Windows\SysWOW64\iiqjasz.exe"96⤵PID:2640
-
C:\Windows\SysWOW64\fjiowel.exeC:\Windows\system32\fjiowel.exe 968 "C:\Windows\SysWOW64\ssfmown.exe"97⤵
- Drops file in System32 directory
PID:2668 -
C:\Windows\SysWOW64\shdrfmq.exeC:\Windows\system32\shdrfmq.exe 980 "C:\Windows\SysWOW64\fjiowel.exe"98⤵PID:2688
-
C:\Windows\SysWOW64\fyxunmw.exeC:\Windows\system32\fyxunmw.exe 988 "C:\Windows\SysWOW64\shdrfmq.exe"99⤵PID:1952
-
C:\Windows\SysWOW64\swaxwuc.exeC:\Windows\system32\swaxwuc.exe 984 "C:\Windows\SysWOW64\fyxunmw.exe"100⤵PID:2940
-
C:\Windows\SysWOW64\bctuuch.exeC:\Windows\system32\bctuuch.exe 972 "C:\Windows\SysWOW64\swaxwuc.exe"101⤵PID:1848
-
C:\Windows\SysWOW64\obwxdcm.exeC:\Windows\system32\obwxdcm.exe 996 "C:\Windows\SysWOW64\bctuuch.exe"102⤵PID:1932
-
C:\Windows\SysWOW64\brqzlks.exeC:\Windows\system32\brqzlks.exe 976 "C:\Windows\SysWOW64\obwxdcm.exe"103⤵PID:2244
-
C:\Windows\SysWOW64\oqlcusx.exeC:\Windows\system32\oqlcusx.exe 1004 "C:\Windows\SysWOW64\brqzlks.exe"104⤵PID:2096
-
C:\Windows\SysWOW64\ytjepve.exeC:\Windows\system32\ytjepve.exe 992 "C:\Windows\SysWOW64\oqlcusx.exe"105⤵PID:1768
-
C:\Windows\SysWOW64\dgscvrc.exeC:\Windows\system32\dgscvrc.exe 1012 "C:\Windows\SysWOW64\ytjepve.exe"106⤵PID:2060
-
C:\Windows\SysWOW64\nutrlzq.exeC:\Windows\system32\nutrlzq.exe 1000 "C:\Windows\SysWOW64\dgscvrc.exe"107⤵PID:1096
-
C:\Windows\SysWOW64\ahkhrco.exeC:\Windows\system32\ahkhrco.exe 1008 "C:\Windows\SysWOW64\nutrlzq.exe"108⤵PID:888
-
C:\Windows\SysWOW64\krasefv.exeC:\Windows\system32\krasefv.exe 1016 "C:\Windows\SysWOW64\ahkhrco.exe"109⤵PID:1380
-
C:\Windows\SysWOW64\wlghxkh.exeC:\Windows\system32\wlghxkh.exe 1020 "C:\Windows\SysWOW64\krasefv.exe"110⤵PID:564
-
C:\Windows\SysWOW64\jkbkgsf.exeC:\Windows\system32\jkbkgsf.exe 1028 "C:\Windows\SysWOW64\wlghxkh.exe"111⤵PID:2356
-
C:\Windows\SysWOW64\wadnpak.exeC:\Windows\system32\wadnpak.exe 1040 "C:\Windows\SysWOW64\jkbkgsf.exe"112⤵PID:2204
-
C:\Windows\SysWOW64\gltxcdq.exeC:\Windows\system32\gltxcdq.exe 1032 "C:\Windows\SysWOW64\wadnpak.exe"113⤵PID:2556
-
C:\Windows\SysWOW64\tycnizx.exeC:\Windows\system32\tycnizx.exe 1056 "C:\Windows\SysWOW64\gltxcdq.exe"114⤵PID:2148
-
C:\Windows\SysWOW64\gofpqhv.exeC:\Windows\system32\gofpqhv.exe 1036 "C:\Windows\SysWOW64\tycnizx.exe"115⤵PID:1604
-
C:\Windows\SysWOW64\qcgnopi.exeC:\Windows\system32\qcgnopi.exe 1060 "C:\Windows\SysWOW64\gofpqhv.exe"116⤵PID:2392
-
C:\Windows\SysWOW64\dtbpxpn.exeC:\Windows\system32\dtbpxpn.exe 1044 "C:\Windows\SysWOW64\qcgnopi.exe"117⤵PID:2500
-
C:\Windows\SysWOW64\qrvkfxl.exeC:\Windows\system32\qrvkfxl.exe 1064 "C:\Windows\SysWOW64\dtbpxpn.exe"118⤵PID:2484
-
C:\Windows\SysWOW64\aulvtaz.exeC:\Windows\system32\aulvtaz.exe 1052 "C:\Windows\SysWOW64\qrvkfxl.exe"119⤵PID:2824
-
C:\Windows\SysWOW64\nsoxbix.exeC:\Windows\system32\nsoxbix.exe 1048 "C:\Windows\SysWOW64\aulvtaz.exe"120⤵PID:1664
-
C:\Windows\SysWOW64\zjiasjc.exeC:\Windows\system32\zjiasjc.exe 1068 "C:\Windows\SysWOW64\nsoxbix.exe"121⤵PID:2740
-
C:\Windows\SysWOW64\mhddbri.exeC:\Windows\system32\mhddbri.exe 1080 "C:\Windows\SysWOW64\zjiasjc.exe"122⤵PID:1044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-