Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 02:01
Behavioral task
behavioral1
Sample
c765c45cfa41019894a1d0c9a6386e5c.exe
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
c765c45cfa41019894a1d0c9a6386e5c.exe
Resource
win10v2004-20240226-en
0 signatures
150 seconds
General
-
Target
c765c45cfa41019894a1d0c9a6386e5c.exe
-
Size
1.4MB
-
MD5
c765c45cfa41019894a1d0c9a6386e5c
-
SHA1
f694633d5b2dcaa4dd6836f473a339574d7d3493
-
SHA256
1c2c69adad7ee38c3b5da4e9ed2e8a1b2548f900f20970311580070df6cd4477
-
SHA512
58a3ee603f51411b90a87a4b3e425e34d6169520f9b2a47c937d5658573afef6cde6389f6f026637f6372ec7f3980364da4dd13962d6ee3dd832eded71bbdaac
-
SSDEEP
24576:cZ4DPN1QxJBhr6ppuTEtGL0HH8hs3a65pg2qJu9SKvH8:Fshr6pd6/6ZxoKv
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2548 elancb.exe 2840 nvnnbh.exe 2344 slkixn.exe 1744 bhjvgx.exe 2584 omcdgo.exe 596 qpclaw.exe 2280 xpywgg.exe 2680 qrbogv.exe 2336 nslbky.exe 540 mwdwhz.exe 1040 ogumzv.exe 1908 itzhhb.exe 1276 coexzu.exe 676 joahnf.exe 2684 tonxaq.exe 2412 vjopgl.exe 1312 ujoxtb.exe 2320 xvfpmg.exe 2152 vpadlj.exe 1820 fomivh.exe 1932 mzlnkb.exe 2804 gfbinz.exe 2524 rqrnsp.exe 1540 ocmfyw.exe 1796 qmedqs.exe 1568 aptoew.exe 1936 fnzolj.exe 2064 oqljnx.exe 1588 qpaeeb.exe 2600 fagjib.exe 2472 ccqwen.exe 2008 olubiu.exe 1096 upczzj.exe 2416 jqxcuz.exe 1772 qtxzlg.exe 2488 kolzfm.exe 2216 rphkuw.exe 2792 qssfcq.exe 2480 hkevvi.exe 2332 ghmdoj.exe 1924 kmgdbf.exe 1808 mohlno.exe 1760 wciopv.exe 2340 ffhiel.exe 2424 xfkgdy.exe 2764 ejreuf.exe 1964 mcrovg.exe 2580 qhloid.exe 1860 phjzqy.exe 2052 kcooir.exe 2784 eiejkp.exe 2844 ryhmtp.exe 2892 jbvxvh.exe 752 vhnrjq.exe 2716 vwcxag.exe 1992 rbyxho.exe 2068 cwyhpi.exe 1472 jajugt.exe 1740 tdhpnr.exe 2724 ddlmgq.exe 2636 aethwn.exe 2116 ukkkrl.exe 2880 raqkss.exe 2284 ommcrz.exe -
Loads dropped DLL 64 IoCs
pid Process 1152 c765c45cfa41019894a1d0c9a6386e5c.exe 1152 c765c45cfa41019894a1d0c9a6386e5c.exe 2548 elancb.exe 2548 elancb.exe 2840 nvnnbh.exe 2840 nvnnbh.exe 2344 slkixn.exe 2344 slkixn.exe 1744 bhjvgx.exe 1744 bhjvgx.exe 2584 omcdgo.exe 2584 omcdgo.exe 596 qpclaw.exe 596 qpclaw.exe 2280 xpywgg.exe 2280 xpywgg.exe 2680 qrbogv.exe 2680 qrbogv.exe 2336 nslbky.exe 2336 nslbky.exe 540 mwdwhz.exe 540 mwdwhz.exe 1040 ogumzv.exe 1040 ogumzv.exe 1908 itzhhb.exe 1908 itzhhb.exe 1276 coexzu.exe 1276 coexzu.exe 676 joahnf.exe 676 joahnf.exe 2684 tonxaq.exe 2684 tonxaq.exe 2412 vjopgl.exe 2412 vjopgl.exe 1312 ujoxtb.exe 1312 ujoxtb.exe 2320 xvfpmg.exe 2320 xvfpmg.exe 2152 vpadlj.exe 2152 vpadlj.exe 1820 fomivh.exe 1820 fomivh.exe 1932 mzlnkb.exe 1932 mzlnkb.exe 2804 gfbinz.exe 2804 gfbinz.exe 2524 rqrnsp.exe 2524 rqrnsp.exe 1540 ocmfyw.exe 1540 ocmfyw.exe 1796 qmedqs.exe 1796 qmedqs.exe 1568 aptoew.exe 1568 aptoew.exe 1936 fnzolj.exe 1936 fnzolj.exe 2064 oqljnx.exe 2064 oqljnx.exe 1588 qpaeeb.exe 1588 qpaeeb.exe 2600 fagjib.exe 2600 fagjib.exe 2472 ccqwen.exe 2472 ccqwen.exe -
resource yara_rule behavioral1/memory/1152-7-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x000c000000012241-22.dat themida behavioral1/files/0x000c000000012241-25.dat themida behavioral1/files/0x000c000000012241-26.dat themida behavioral1/files/0x000c000000012241-29.dat themida behavioral1/memory/1152-30-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x000c000000012241-35.dat themida behavioral1/files/0x000b000000015a2d-47.dat themida behavioral1/memory/2548-46-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x000b000000015a2d-42.dat themida behavioral1/memory/2548-62-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x000b000000015a2d-64.dat themida behavioral1/files/0x000b000000015c3c-68.dat themida behavioral1/files/0x000b000000015c3c-71.dat themida behavioral1/files/0x000b000000015c3c-75.dat themida behavioral1/memory/2840-77-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x0009000000015c52-92.dat themida behavioral1/memory/2344-99-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/memory/2344-95-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x0009000000015c52-87.dat themida behavioral1/files/0x0009000000015c52-85.dat themida behavioral1/files/0x000b000000015c3c-81.dat themida behavioral1/files/0x0009000000015c52-104.dat themida behavioral1/files/0x0007000000015cb9-115.dat themida behavioral1/memory/1744-117-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x0007000000015cb9-111.dat themida behavioral1/memory/1744-133-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x0007000000015cb9-108.dat themida behavioral1/files/0x0007000000015cb9-136.dat themida behavioral1/files/0x0007000000015d88-142.dat themida behavioral1/files/0x0007000000015d88-140.dat themida behavioral1/files/0x0007000000015d88-146.dat themida behavioral1/memory/2584-163-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x0007000000015d88-168.dat themida behavioral1/files/0x0009000000015db4-171.dat themida behavioral1/files/0x0009000000015db4-177.dat themida behavioral1/files/0x0009000000015db4-173.dat themida behavioral1/files/0x000b000000015a2d-40.dat themida behavioral1/memory/596-178-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x0009000000015e02-182.dat themida behavioral1/files/0x0009000000015e02-188.dat themida behavioral1/files/0x0009000000015e02-184.dat themida behavioral1/files/0x00060000000167db-199.dat themida behavioral1/files/0x00060000000167db-195.dat themida behavioral1/memory/2680-200-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x00060000000167db-193.dat themida behavioral1/files/0x0009000000015e02-190.dat themida behavioral1/memory/2280-189-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x0009000000015db4-179.dat themida behavioral1/files/0x0006000000016b5e-210.dat themida behavioral1/files/0x0006000000016b5e-206.dat themida behavioral1/memory/2336-230-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x0006000000016b96-246.dat themida behavioral1/files/0x0006000000016b96-240.dat themida behavioral1/files/0x0006000000016b96-242.dat themida behavioral1/files/0x0006000000016b5e-232.dat themida behavioral1/files/0x0006000000016b5e-204.dat themida behavioral1/memory/540-262-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x0006000000016b96-265.dat themida behavioral1/files/0x0006000000016c10-273.dat themida behavioral1/files/0x0006000000016c10-277.dat themida behavioral1/files/0x0006000000016c10-271.dat themida behavioral1/memory/1040-291-0x0000000000400000-0x000000000070E000-memory.dmp themida behavioral1/files/0x00060000000167db-201.dat themida -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vpadlj.exe xvfpmg.exe File opened for modification C:\Windows\SysWOW64\togtmy.exe qxhvuc.exe File opened for modification C:\Windows\SysWOW64\kvrfwq.exe lgtafa.exe File opened for modification C:\Windows\SysWOW64\dvmcuu.exe blumcy.exe File opened for modification C:\Windows\SysWOW64\rbyxho.exe vwcxag.exe File created C:\Windows\SysWOW64\ojvcws.exe xzjimf.exe File created C:\Windows\SysWOW64\mzlnkb.exe fomivh.exe File opened for modification C:\Windows\SysWOW64\kpyjte.exe ycirms.exe File opened for modification C:\Windows\SysWOW64\omcdgo.exe bhjvgx.exe File opened for modification C:\Windows\SysWOW64\vkngdn.exe jxxowt.exe File opened for modification C:\Windows\SysWOW64\ubkllb.exe hhwdrx.exe File opened for modification C:\Windows\SysWOW64\ilyfxp.exe kvrfwq.exe File opened for modification C:\Windows\SysWOW64\ykhgqk.exe bjpsuz.exe File opened for modification C:\Windows\SysWOW64\nfudyb.exe kjradj.exe File opened for modification C:\Windows\SysWOW64\yagbcm.exe lrcgzr.exe File created C:\Windows\SysWOW64\ytoxub.exe aztkey.exe File created C:\Windows\SysWOW64\xzczfq.exe smjzuo.exe File created C:\Windows\SysWOW64\gfbinz.exe mzlnkb.exe File opened for modification C:\Windows\SysWOW64\pnfqex.exe axxgxs.exe File opened for modification C:\Windows\SysWOW64\gdxqch.exe zhmkqj.exe File opened for modification C:\Windows\SysWOW64\mtleqm.exe malmwz.exe File created C:\Windows\SysWOW64\xfkgdy.exe ffhiel.exe File opened for modification C:\Windows\SysWOW64\phjzqy.exe qhloid.exe File opened for modification C:\Windows\SysWOW64\hjzxpg.exe iypvbz.exe File created C:\Windows\SysWOW64\knqkpe.exe idquxi.exe File created C:\Windows\SysWOW64\yhvuts.exe zaykmx.exe File created C:\Windows\SysWOW64\exahgc.exe elnpry.exe File opened for modification C:\Windows\SysWOW64\bjpsuz.exe extfwf.exe File opened for modification C:\Windows\SysWOW64\rysbhs.exe nmadco.exe File created C:\Windows\SysWOW64\hxvqwo.exe clkide.exe File created C:\Windows\SysWOW64\zhmkqj.exe awciuc.exe File created C:\Windows\SysWOW64\uomobm.exe zivtzo.exe File created C:\Windows\SysWOW64\seuzor.exe bxukkd.exe File created C:\Windows\SysWOW64\okygzr.exe vivfzc.exe File created C:\Windows\SysWOW64\obyahs.exe gxovph.exe File created C:\Windows\SysWOW64\weglal.exe pwllnv.exe File created C:\Windows\SysWOW64\cmqson.exe hoaxlq.exe File created C:\Windows\SysWOW64\wvjjzw.exe touhke.exe File created C:\Windows\SysWOW64\admptb.exe lzorwg.exe File created C:\Windows\SysWOW64\kqmugm.exe icjjlm.exe File opened for modification C:\Windows\SysWOW64\raqkss.exe ukkkrl.exe File created C:\Windows\SysWOW64\awiwlk.exe wkigmt.exe File opened for modification C:\Windows\SysWOW64\zduxgr.exe admptb.exe File opened for modification C:\Windows\SysWOW64\awiexn.exe yagbcm.exe File opened for modification C:\Windows\SysWOW64\netvvz.exe vxufrl.exe File created C:\Windows\SysWOW64\vuszei.exe qkkfnc.exe File created C:\Windows\SysWOW64\zmfkaq.exe xzczfq.exe File opened for modification C:\Windows\SysWOW64\sphjzk.exe rqbtbf.exe File opened for modification C:\Windows\SysWOW64\malmwz.exe vllwrl.exe File created C:\Windows\SysWOW64\touhke.exe uwuoqr.exe File created C:\Windows\SysWOW64\vfmikd.exe togtmy.exe File opened for modification C:\Windows\SysWOW64\ritqmb.exe kaxfyz.exe File created C:\Windows\SysWOW64\hkevvi.exe qssfcq.exe File created C:\Windows\SysWOW64\qxhvuc.exe onpfcg.exe File created C:\Windows\SysWOW64\pbystc.exe ngwpyc.exe File created C:\Windows\SysWOW64\qckzio.exe uehoaf.exe File created C:\Windows\SysWOW64\zvifmy.exe lfycdy.exe File created C:\Windows\SysWOW64\elancb.exe c765c45cfa41019894a1d0c9a6386e5c.exe File created C:\Windows\SysWOW64\vhnrjq.exe jbvxvh.exe File opened for modification C:\Windows\SysWOW64\tnufhf.exe ommcrz.exe File opened for modification C:\Windows\SysWOW64\axxgxs.exe dlblhq.exe File created C:\Windows\SysWOW64\owqlxp.exe ubkllb.exe File opened for modification C:\Windows\SysWOW64\tdhpnr.exe jajugt.exe File created C:\Windows\SysWOW64\hejpqt.exe ssncay.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1152 c765c45cfa41019894a1d0c9a6386e5c.exe 2548 elancb.exe 2840 nvnnbh.exe 2344 slkixn.exe 1744 bhjvgx.exe 2584 omcdgo.exe 596 qpclaw.exe 2280 xpywgg.exe 2680 qrbogv.exe 2336 nslbky.exe 540 mwdwhz.exe 1040 ogumzv.exe 1908 itzhhb.exe 1276 coexzu.exe 676 joahnf.exe 2684 tonxaq.exe 2412 vjopgl.exe 1312 ujoxtb.exe 2320 xvfpmg.exe 2152 vpadlj.exe 1820 fomivh.exe 1932 mzlnkb.exe 2804 gfbinz.exe 2524 rqrnsp.exe 1540 ocmfyw.exe 1796 qmedqs.exe 1568 aptoew.exe 1936 fnzolj.exe 2064 oqljnx.exe 1588 qpaeeb.exe 2600 fagjib.exe 2472 ccqwen.exe 2008 olubiu.exe 1096 upczzj.exe 2416 jqxcuz.exe 1772 qtxzlg.exe 2488 kolzfm.exe 2216 rphkuw.exe 2792 qssfcq.exe 2480 hkevvi.exe 2332 ghmdoj.exe 1924 kmgdbf.exe 1808 mohlno.exe 1760 wciopv.exe 2340 ffhiel.exe 2424 xfkgdy.exe 2456 wmgowx.exe 1964 mcrovg.exe 2580 qhloid.exe 1860 phjzqy.exe 2052 kcooir.exe 2784 eiejkp.exe 2844 ryhmtp.exe 2892 jbvxvh.exe 752 vhnrjq.exe 2716 vwcxag.exe 1992 rbyxho.exe 2068 cwyhpi.exe 1472 jajugt.exe 1740 tdhpnr.exe 2724 ddlmgq.exe 2636 aethwn.exe 2116 ukkkrl.exe 2880 raqkss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2548 1152 c765c45cfa41019894a1d0c9a6386e5c.exe 28 PID 1152 wrote to memory of 2548 1152 c765c45cfa41019894a1d0c9a6386e5c.exe 28 PID 1152 wrote to memory of 2548 1152 c765c45cfa41019894a1d0c9a6386e5c.exe 28 PID 1152 wrote to memory of 2548 1152 c765c45cfa41019894a1d0c9a6386e5c.exe 28 PID 2548 wrote to memory of 2840 2548 elancb.exe 29 PID 2548 wrote to memory of 2840 2548 elancb.exe 29 PID 2548 wrote to memory of 2840 2548 elancb.exe 29 PID 2548 wrote to memory of 2840 2548 elancb.exe 29 PID 2840 wrote to memory of 2344 2840 nvnnbh.exe 30 PID 2840 wrote to memory of 2344 2840 nvnnbh.exe 30 PID 2840 wrote to memory of 2344 2840 nvnnbh.exe 30 PID 2840 wrote to memory of 2344 2840 nvnnbh.exe 30 PID 2344 wrote to memory of 1744 2344 slkixn.exe 31 PID 2344 wrote to memory of 1744 2344 slkixn.exe 31 PID 2344 wrote to memory of 1744 2344 slkixn.exe 31 PID 2344 wrote to memory of 1744 2344 slkixn.exe 31 PID 1744 wrote to memory of 2584 1744 bhjvgx.exe 32 PID 1744 wrote to memory of 2584 1744 bhjvgx.exe 32 PID 1744 wrote to memory of 2584 1744 bhjvgx.exe 32 PID 1744 wrote to memory of 2584 1744 bhjvgx.exe 32 PID 2584 wrote to memory of 596 2584 omcdgo.exe 33 PID 2584 wrote to memory of 596 2584 omcdgo.exe 33 PID 2584 wrote to memory of 596 2584 omcdgo.exe 33 PID 2584 wrote to memory of 596 2584 omcdgo.exe 33 PID 596 wrote to memory of 2280 596 qpclaw.exe 34 PID 596 wrote to memory of 2280 596 qpclaw.exe 34 PID 596 wrote to memory of 2280 596 qpclaw.exe 34 PID 596 wrote to memory of 2280 596 qpclaw.exe 34 PID 2280 wrote to memory of 2680 2280 xpywgg.exe 35 PID 2280 wrote to memory of 2680 2280 xpywgg.exe 35 PID 2280 wrote to memory of 2680 2280 xpywgg.exe 35 PID 2280 wrote to memory of 2680 2280 xpywgg.exe 35 PID 2680 wrote to memory of 2336 2680 qrbogv.exe 36 PID 2680 wrote to memory of 2336 2680 qrbogv.exe 36 PID 2680 wrote to memory of 2336 2680 qrbogv.exe 36 PID 2680 wrote to memory of 2336 2680 qrbogv.exe 36 PID 2336 wrote to memory of 540 2336 nslbky.exe 37 PID 2336 wrote to memory of 540 2336 nslbky.exe 37 PID 2336 wrote to memory of 540 2336 nslbky.exe 37 PID 2336 wrote to memory of 540 2336 nslbky.exe 37 PID 540 wrote to memory of 1040 540 mwdwhz.exe 38 PID 540 wrote to memory of 1040 540 mwdwhz.exe 38 PID 540 wrote to memory of 1040 540 mwdwhz.exe 38 PID 540 wrote to memory of 1040 540 mwdwhz.exe 38 PID 1040 wrote to memory of 1908 1040 ogumzv.exe 39 PID 1040 wrote to memory of 1908 1040 ogumzv.exe 39 PID 1040 wrote to memory of 1908 1040 ogumzv.exe 39 PID 1040 wrote to memory of 1908 1040 ogumzv.exe 39 PID 1908 wrote to memory of 1276 1908 itzhhb.exe 40 PID 1908 wrote to memory of 1276 1908 itzhhb.exe 40 PID 1908 wrote to memory of 1276 1908 itzhhb.exe 40 PID 1908 wrote to memory of 1276 1908 itzhhb.exe 40 PID 1276 wrote to memory of 676 1276 coexzu.exe 41 PID 1276 wrote to memory of 676 1276 coexzu.exe 41 PID 1276 wrote to memory of 676 1276 coexzu.exe 41 PID 1276 wrote to memory of 676 1276 coexzu.exe 41 PID 676 wrote to memory of 2684 676 joahnf.exe 42 PID 676 wrote to memory of 2684 676 joahnf.exe 42 PID 676 wrote to memory of 2684 676 joahnf.exe 42 PID 676 wrote to memory of 2684 676 joahnf.exe 42 PID 2684 wrote to memory of 2412 2684 tonxaq.exe 43 PID 2684 wrote to memory of 2412 2684 tonxaq.exe 43 PID 2684 wrote to memory of 2412 2684 tonxaq.exe 43 PID 2684 wrote to memory of 2412 2684 tonxaq.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\c765c45cfa41019894a1d0c9a6386e5c.exe"C:\Users\Admin\AppData\Local\Temp\c765c45cfa41019894a1d0c9a6386e5c.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\elancb.exeC:\Windows\system32\elancb.exe 700 "C:\Users\Admin\AppData\Local\Temp\c765c45cfa41019894a1d0c9a6386e5c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\nvnnbh.exeC:\Windows\system32\nvnnbh.exe 624 "C:\Windows\SysWOW64\elancb.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\slkixn.exeC:\Windows\system32\slkixn.exe 632 "C:\Windows\SysWOW64\nvnnbh.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\bhjvgx.exeC:\Windows\system32\bhjvgx.exe 628 "C:\Windows\SysWOW64\slkixn.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\omcdgo.exeC:\Windows\system32\omcdgo.exe 640 "C:\Windows\SysWOW64\bhjvgx.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\qpclaw.exeC:\Windows\system32\qpclaw.exe 668 "C:\Windows\SysWOW64\omcdgo.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\xpywgg.exeC:\Windows\system32\xpywgg.exe 644 "C:\Windows\SysWOW64\qpclaw.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\qrbogv.exeC:\Windows\system32\qrbogv.exe 648 "C:\Windows\SysWOW64\xpywgg.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\nslbky.exeC:\Windows\system32\nslbky.exe 652 "C:\Windows\SysWOW64\qrbogv.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\mwdwhz.exeC:\Windows\system32\mwdwhz.exe 636 "C:\Windows\SysWOW64\nslbky.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\ogumzv.exeC:\Windows\system32\ogumzv.exe 660 "C:\Windows\SysWOW64\mwdwhz.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\itzhhb.exeC:\Windows\system32\itzhhb.exe 656 "C:\Windows\SysWOW64\ogumzv.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\coexzu.exeC:\Windows\system32\coexzu.exe 672 "C:\Windows\SysWOW64\itzhhb.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\joahnf.exeC:\Windows\system32\joahnf.exe 708 "C:\Windows\SysWOW64\coexzu.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\tonxaq.exeC:\Windows\system32\tonxaq.exe 676 "C:\Windows\SysWOW64\joahnf.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\vjopgl.exeC:\Windows\system32\vjopgl.exe 680 "C:\Windows\SysWOW64\tonxaq.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2412 -
C:\Windows\SysWOW64\ujoxtb.exeC:\Windows\system32\ujoxtb.exe 664 "C:\Windows\SysWOW64\vjopgl.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1312 -
C:\Windows\SysWOW64\xvfpmg.exeC:\Windows\system32\xvfpmg.exe 696 "C:\Windows\SysWOW64\ujoxtb.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\vpadlj.exeC:\Windows\system32\vpadlj.exe 684 "C:\Windows\SysWOW64\xvfpmg.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\fomivh.exeC:\Windows\system32\fomivh.exe 748 "C:\Windows\SysWOW64\vpadlj.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1820 -
C:\Windows\SysWOW64\mzlnkb.exeC:\Windows\system32\mzlnkb.exe 764 "C:\Windows\SysWOW64\fomivh.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1932 -
C:\Windows\SysWOW64\gfbinz.exeC:\Windows\system32\gfbinz.exe 688 "C:\Windows\SysWOW64\mzlnkb.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\rqrnsp.exeC:\Windows\system32\rqrnsp.exe 756 "C:\Windows\SysWOW64\gfbinz.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\ocmfyw.exeC:\Windows\system32\ocmfyw.exe 692 "C:\Windows\SysWOW64\rqrnsp.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\qmedqs.exeC:\Windows\system32\qmedqs.exe 712 "C:\Windows\SysWOW64\ocmfyw.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\SysWOW64\aptoew.exeC:\Windows\system32\aptoew.exe 716 "C:\Windows\SysWOW64\qmedqs.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\fnzolj.exeC:\Windows\system32\fnzolj.exe 704 "C:\Windows\SysWOW64\aptoew.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\oqljnx.exeC:\Windows\system32\oqljnx.exe 724 "C:\Windows\SysWOW64\fnzolj.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\qpaeeb.exeC:\Windows\system32\qpaeeb.exe 736 "C:\Windows\SysWOW64\oqljnx.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\SysWOW64\fagjib.exeC:\Windows\system32\fagjib.exe 768 "C:\Windows\SysWOW64\qpaeeb.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2600 -
C:\Windows\SysWOW64\ccqwen.exeC:\Windows\system32\ccqwen.exe 720 "C:\Windows\SysWOW64\fagjib.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Windows\SysWOW64\olubiu.exeC:\Windows\system32\olubiu.exe 740 "C:\Windows\SysWOW64\ccqwen.exe"33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\upczzj.exeC:\Windows\system32\upczzj.exe 788 "C:\Windows\SysWOW64\olubiu.exe"34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\SysWOW64\jqxcuz.exeC:\Windows\system32\jqxcuz.exe 812 "C:\Windows\SysWOW64\upczzj.exe"35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\SysWOW64\qtxzlg.exeC:\Windows\system32\qtxzlg.exe 744 "C:\Windows\SysWOW64\jqxcuz.exe"36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\kolzfm.exeC:\Windows\system32\kolzfm.exe 732 "C:\Windows\SysWOW64\qtxzlg.exe"37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\rphkuw.exeC:\Windows\system32\rphkuw.exe 760 "C:\Windows\SysWOW64\kolzfm.exe"38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2216 -
C:\Windows\SysWOW64\qssfcq.exeC:\Windows\system32\qssfcq.exe 796 "C:\Windows\SysWOW64\rphkuw.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2792 -
C:\Windows\SysWOW64\hkevvi.exeC:\Windows\system32\hkevvi.exe 772 "C:\Windows\SysWOW64\qssfcq.exe"40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\ghmdoj.exeC:\Windows\system32\ghmdoj.exe 752 "C:\Windows\SysWOW64\hkevvi.exe"41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\kmgdbf.exeC:\Windows\system32\kmgdbf.exe 776 "C:\Windows\SysWOW64\ghmdoj.exe"42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\mohlno.exeC:\Windows\system32\mohlno.exe 728 "C:\Windows\SysWOW64\kmgdbf.exe"43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\wciopv.exeC:\Windows\system32\wciopv.exe 784 "C:\Windows\SysWOW64\mohlno.exe"44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1760 -
C:\Windows\SysWOW64\ffhiel.exeC:\Windows\system32\ffhiel.exe 792 "C:\Windows\SysWOW64\wciopv.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\xfkgdy.exeC:\Windows\system32\xfkgdy.exe 800 "C:\Windows\SysWOW64\ffhiel.exe"46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\ejreuf.exeC:\Windows\system32\ejreuf.exe 828 "C:\Windows\SysWOW64\xfkgdy.exe"47⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\wmgowx.exeC:\Windows\system32\wmgowx.exe 832 "C:\Windows\SysWOW64\ejreuf.exe"48⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\mcrovg.exeC:\Windows\system32\mcrovg.exe 852 "C:\Windows\SysWOW64\wmgowx.exe"49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\qhloid.exeC:\Windows\system32\qhloid.exe 804 "C:\Windows\SysWOW64\mcrovg.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\phjzqy.exeC:\Windows\system32\phjzqy.exe 780 "C:\Windows\SysWOW64\qhloid.exe"51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\kcooir.exeC:\Windows\system32\kcooir.exe 816 "C:\Windows\SysWOW64\phjzqy.exe"52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2052 -
C:\Windows\SysWOW64\eiejkp.exeC:\Windows\system32\eiejkp.exe 820 "C:\Windows\SysWOW64\kcooir.exe"53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\ryhmtp.exeC:\Windows\system32\ryhmtp.exe 908 "C:\Windows\SysWOW64\eiejkp.exe"54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\jbvxvh.exeC:\Windows\system32\jbvxvh.exe 860 "C:\Windows\SysWOW64\ryhmtp.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\vhnrjq.exeC:\Windows\system32\vhnrjq.exe 916 "C:\Windows\SysWOW64\jbvxvh.exe"56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:752 -
C:\Windows\SysWOW64\vwcxag.exeC:\Windows\system32\vwcxag.exe 808 "C:\Windows\SysWOW64\vhnrjq.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\rbyxho.exeC:\Windows\system32\rbyxho.exe 836 "C:\Windows\SysWOW64\vwcxag.exe"58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\cwyhpi.exeC:\Windows\system32\cwyhpi.exe 880 "C:\Windows\SysWOW64\rbyxho.exe"59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2068 -
C:\Windows\SysWOW64\jajugt.exeC:\Windows\system32\jajugt.exe 932 "C:\Windows\SysWOW64\cwyhpi.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\SysWOW64\tdhpnr.exeC:\Windows\system32\tdhpnr.exe 824 "C:\Windows\SysWOW64\jajugt.exe"61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\ddlmgq.exeC:\Windows\system32\ddlmgq.exe 872 "C:\Windows\SysWOW64\tdhpnr.exe"62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\aethwn.exeC:\Windows\system32\aethwn.exe 856 "C:\Windows\SysWOW64\ddlmgq.exe"63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\ukkkrl.exeC:\Windows\system32\ukkkrl.exe 840 "C:\Windows\SysWOW64\aethwn.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\raqkss.exeC:\Windows\system32\raqkss.exe 892 "C:\Windows\SysWOW64\ukkkrl.exe"65⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\ommcrz.exeC:\Windows\system32\ommcrz.exe 848 "C:\Windows\SysWOW64\raqkss.exe"66⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2284 -
C:\Windows\SysWOW64\tnufhf.exeC:\Windows\system32\tnufhf.exe 888 "C:\Windows\SysWOW64\ommcrz.exe"67⤵PID:2560
-
C:\Windows\SysWOW64\aztkey.exeC:\Windows\system32\aztkey.exe 844 "C:\Windows\SysWOW64\tnufhf.exe"68⤵
- Drops file in System32 directory
PID:1716 -
C:\Windows\SysWOW64\ytoxub.exeC:\Windows\system32\ytoxub.exe 868 "C:\Windows\SysWOW64\aztkey.exe"69⤵PID:2952
-
C:\Windows\SysWOW64\kjradj.exeC:\Windows\system32\kjradj.exe 976 "C:\Windows\SysWOW64\ytoxub.exe"70⤵
- Drops file in System32 directory
PID:1664 -
C:\Windows\SysWOW64\nfudyb.exeC:\Windows\system32\nfudyb.exe 984 "C:\Windows\SysWOW64\kjradj.exe"71⤵PID:1632
-
C:\Windows\SysWOW64\ubeqpv.exeC:\Windows\system32\ubeqpv.exe 912 "C:\Windows\SysWOW64\nfudyb.exe"72⤵PID:2948
-
C:\Windows\SysWOW64\rcodly.exeC:\Windows\system32\rcodly.exe 864 "C:\Windows\SysWOW64\ubeqpv.exe"73⤵PID:872
-
C:\Windows\SysWOW64\gvlqvu.exeC:\Windows\system32\gvlqvu.exe 988 "C:\Windows\SysWOW64\rcodly.exe"74⤵PID:2148
-
C:\Windows\SysWOW64\fzwllg.exeC:\Windows\system32\fzwllg.exe 928 "C:\Windows\SysWOW64\gvlqvu.exe"75⤵PID:1680
-
C:\Windows\SysWOW64\wkigmt.exeC:\Windows\system32\wkigmt.exe 876 "C:\Windows\SysWOW64\fzwllg.exe"76⤵
- Drops file in System32 directory
PID:1948 -
C:\Windows\SysWOW64\awiwlk.exeC:\Windows\system32\awiwlk.exe 896 "C:\Windows\SysWOW64\wkigmt.exe"77⤵PID:1008
-
C:\Windows\SysWOW64\zlvmkw.exeC:\Windows\system32\zlvmkw.exe 884 "C:\Windows\SysWOW64\awiwlk.exe"78⤵PID:1724
-
C:\Windows\SysWOW64\dnmruo.exeC:\Windows\system32\dnmruo.exe 900 "C:\Windows\SysWOW64\zlvmkw.exe"79⤵PID:2432
-
C:\Windows\SysWOW64\srlosb.exeC:\Windows\system32\srlosb.exe 904 "C:\Windows\SysWOW64\dnmruo.exe"80⤵PID:2464
-
C:\Windows\SysWOW64\epbjuz.exeC:\Windows\system32\epbjuz.exe 920 "C:\Windows\SysWOW64\srlosb.exe"81⤵PID:1476
-
C:\Windows\SysWOW64\elnpry.exeC:\Windows\system32\elnpry.exe 924 "C:\Windows\SysWOW64\epbjuz.exe"82⤵
- Drops file in System32 directory
PID:1372 -
C:\Windows\SysWOW64\exahgc.exeC:\Windows\system32\exahgc.exe 940 "C:\Windows\SysWOW64\elnpry.exe"83⤵PID:940
-
C:\Windows\SysWOW64\smjzuo.exeC:\Windows\system32\smjzuo.exe 936 "C:\Windows\SysWOW64\exahgc.exe"84⤵
- Drops file in System32 directory
PID:2028 -
C:\Windows\SysWOW64\xzczfq.exeC:\Windows\system32\xzczfq.exe 944 "C:\Windows\SysWOW64\smjzuo.exe"85⤵
- Drops file in System32 directory
PID:436 -
C:\Windows\SysWOW64\zmfkaq.exeC:\Windows\system32\zmfkaq.exe 952 "C:\Windows\SysWOW64\xzczfq.exe"86⤵PID:2788
-
C:\Windows\SysWOW64\xgbxzt.exeC:\Windows\system32\xgbxzt.exe 948 "C:\Windows\SysWOW64\zmfkaq.exe"87⤵PID:2304
-
C:\Windows\SysWOW64\bxfkvz.exeC:\Windows\system32\bxfkvz.exe 992 "C:\Windows\SysWOW64\xgbxzt.exe"88⤵PID:1736
-
C:\Windows\SysWOW64\bedpmp.exeC:\Windows\system32\bedpmp.exe 1000 "C:\Windows\SysWOW64\bxfkvz.exe"89⤵PID:2588
-
C:\Windows\SysWOW64\ddjfkm.exeC:\Windows\system32\ddjfkm.exe 960 "C:\Windows\SysWOW64\bedpmp.exe"90⤵PID:1576
-
C:\Windows\SysWOW64\dshkbc.exeC:\Windows\system32\dshkbc.exe 964 "C:\Windows\SysWOW64\ddjfkm.exe"91⤵PID:2056
-
C:\Windows\SysWOW64\cntiyt.exeC:\Windows\system32\cntiyt.exe 968 "C:\Windows\SysWOW64\dshkbc.exe"92⤵PID:1508
-
C:\Windows\SysWOW64\zlaiza.exeC:\Windows\system32\zlaiza.exe 956 "C:\Windows\SysWOW64\cntiyt.exe"93⤵PID:868
-
C:\Windows\SysWOW64\cvrfrw.exeC:\Windows\system32\cvrfrw.exe 972 "C:\Windows\SysWOW64\zlaiza.exe"94⤵PID:764
-
C:\Windows\SysWOW64\bnsqlj.exeC:\Windows\system32\bnsqlj.exe 1028 "C:\Windows\SysWOW64\cvrfrw.exe"95⤵PID:1708
-
C:\Windows\SysWOW64\vxufrl.exeC:\Windows\system32\vxufrl.exe 980 "C:\Windows\SysWOW64\bnsqlj.exe"96⤵
- Drops file in System32 directory
PID:1692 -
C:\Windows\SysWOW64\netvvz.exeC:\Windows\system32\netvvz.exe 996 "C:\Windows\SysWOW64\vxufrl.exe"97⤵PID:2172
-
C:\Windows\SysWOW64\pwllnv.exeC:\Windows\system32\pwllnv.exe 1008 "C:\Windows\SysWOW64\netvvz.exe"98⤵
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\weglal.exeC:\Windows\system32\weglal.exe 1044 "C:\Windows\SysWOW64\pwllnv.exe"99⤵PID:1608
-
C:\Windows\SysWOW64\wwhvux.exeC:\Windows\system32\wwhvux.exe 1004 "C:\Windows\SysWOW64\weglal.exe"100⤵PID:840
-
C:\Windows\SysWOW64\rnjyrm.exeC:\Windows\system32\rnjyrm.exe 1012 "C:\Windows\SysWOW64\wwhvux.exe"101⤵PID:1028
-
C:\Windows\SysWOW64\tbmbmn.exeC:\Windows\system32\tbmbmn.exe 1020 "C:\Windows\SysWOW64\rnjyrm.exe"102⤵PID:112
-
C:\Windows\SysWOW64\dlblhq.exeC:\Windows\system32\dlblhq.exe 1032 "C:\Windows\SysWOW64\tbmbmn.exe"103⤵
- Drops file in System32 directory
PID:3012 -
C:\Windows\SysWOW64\axxgxs.exeC:\Windows\system32\axxgxs.exe 1040 "C:\Windows\SysWOW64\dlblhq.exe"104⤵
- Drops file in System32 directory
PID:2648 -
C:\Windows\SysWOW64\pnfqex.exeC:\Windows\system32\pnfqex.exe 1016 "C:\Windows\SysWOW64\axxgxs.exe"105⤵PID:2944
-
C:\Windows\SysWOW64\jxxowt.exeC:\Windows\system32\jxxowt.exe 1036 "C:\Windows\SysWOW64\pnfqex.exe"106⤵
- Drops file in System32 directory
PID:2212 -
C:\Windows\SysWOW64\vkngdn.exeC:\Windows\system32\vkngdn.exe 1048 "C:\Windows\SysWOW64\jxxowt.exe"107⤵PID:2812
-
C:\Windows\SysWOW64\atvbmk.exeC:\Windows\system32\atvbmk.exe 1052 "C:\Windows\SysWOW64\vkngdn.exe"108⤵PID:2436
-
C:\Windows\SysWOW64\xmozki.exeC:\Windows\system32\xmozki.exe 1056 "C:\Windows\SysWOW64\atvbmk.exe"109⤵PID:1132
-
C:\Windows\SysWOW64\ypphwr.exeC:\Windows\system32\ypphwr.exe 1064 "C:\Windows\SysWOW64\xmozki.exe"110⤵PID:1216
-
C:\Windows\SysWOW64\yaqjsy.exeC:\Windows\system32\yaqjsy.exe 1068 "C:\Windows\SysWOW64\ypphwr.exe"111⤵PID:2888
-
C:\Windows\SysWOW64\ubixoc.exeC:\Windows\system32\ubixoc.exe 1072 "C:\Windows\SysWOW64\yaqjsy.exe"112⤵PID:2556
-
C:\Windows\SysWOW64\uihuhe.exeC:\Windows\system32\uihuhe.exe 1060 "C:\Windows\SysWOW64\ubixoc.exe"113⤵PID:916
-
C:\Windows\SysWOW64\owmpql.exeC:\Windows\system32\owmpql.exe 1084 "C:\Windows\SysWOW64\uihuhe.exe"114⤵PID:580
-
C:\Windows\SysWOW64\gvxnhq.exeC:\Windows\system32\gvxnhq.exe 1108 "C:\Windows\SysWOW64\owmpql.exe"115⤵PID:2652
-
C:\Windows\SysWOW64\iypvbz.exeC:\Windows\system32\iypvbz.exe 1080 "C:\Windows\SysWOW64\gvxnhq.exe"116⤵
- Drops file in System32 directory
PID:1364 -
C:\Windows\SysWOW64\hjzxpg.exeC:\Windows\system32\hjzxpg.exe 1076 "C:\Windows\SysWOW64\iypvbz.exe"117⤵PID:1288
-
C:\Windows\SysWOW64\gqwioc.exeC:\Windows\system32\gqwioc.exe 1092 "C:\Windows\SysWOW64\hjzxpg.exe"118⤵PID:1852
-
C:\Windows\SysWOW64\lgciwp.exeC:\Windows\system32\lgciwp.exe 1124 "C:\Windows\SysWOW64\gqwioc.exe"119⤵PID:2664
-
C:\Windows\SysWOW64\ncflrq.exeC:\Windows\system32\ncflrq.exe 1088 "C:\Windows\SysWOW64\lgciwp.exe"120⤵PID:1052
-
C:\Windows\SysWOW64\rkkfnw.exeC:\Windows\system32\rkkfnw.exe 1096 "C:\Windows\SysWOW64\ncflrq.exe"121⤵PID:2088
-
C:\Windows\SysWOW64\bozaja.exeC:\Windows\system32\bozaja.exe 1100 "C:\Windows\SysWOW64\rkkfnw.exe"122⤵PID:1032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-