Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 15:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cbd2eccb228e932cb19f92bd01beede4.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
cbd2eccb228e932cb19f92bd01beede4.exe
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
cbd2eccb228e932cb19f92bd01beede4.exe
-
Size
145KB
-
MD5
cbd2eccb228e932cb19f92bd01beede4
-
SHA1
7cc7f452c72b603cb80325e0cc3aaec135ded368
-
SHA256
c0addaa89d6ae4b7199f4e4b37ffa50bf2a69ff728121205a5dce5a677d44f42
-
SHA512
fcd056e001c7f27c0c90068891608387cb6c1c06a044dd6845452972d52c97e0e786b476bc99da24e0c2cd68f11ef0930fe811d78b9b2549c74598aaa15612e2
-
SSDEEP
3072:wt8WgDoza726OcvgsOabwd00Syecg3kI77GR+2pLKGSWB4TU:QgZK6nOEUHechA7G9xKF2YU
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2736 eoepzok.exe 2704 tpocdzw.exe 2880 axkvppg.exe 2476 ibmihai.exe 1108 itvabms.exe 2824 aeisirt.exe 1084 ziuqfib.exe 1964 hbtqupf.exe 640 tgktigq.exe 1180 bknyrrt.exe 2064 jpxljce.exe 2216 qwsdvaf.exe 2128 avwaoqn.exe 3036 idsbaow.exe 2316 szllpix.exe 1392 zgglcyh.exe 2284 zzhvwkq.exe 2120 ppadccu.exe 2332 owqokxk.exe 1704 bntqtxh.exe 2388 iugjfvr.exe 3020 vhyylrp.exe 2608 aurgeac.exe 2728 nlmjmji.exe 2416 ndnbhvs.exe 2960 wrnzfdx.exe 2012 gqawpbe.exe 2820 rjptcsg.exe 2744 yuohrlo.exe 1524 jpprygp.exe 2852 saebujd.exe 1972 dvfmbde.exe 2588 kahztoh.exe 1652 pqmupcs.exe 2056 uvfuaef.exe 2244 hixrgie.exe 2372 oxkkaxn.exe 2052 gbzucpy.exe 2320 dvpubai.exe 1800 qiykgeh.exe 1152 ahkhrco.exe 1368 hsjuowx.exe 992 rnkfvrf.exe 1012 zdxxqgh.exe 1604 jckcafo.exe 2292 wptsgjn.exe 1740 dxpkayx.exe 2884 lfckmvg.exe 2604 veoifmo.exe 3040 flsfplv.exe 2752 qgtqxfw.exe 2464 ulnxqpb.exe 2740 celdnjr.exe 872 mdpixir.exe 2452 wdbfihy.exe 1116 jqlvokx.exe 476 temsmsk.exe 1584 dzndtml.exe 2108 nyraels.exe 2260 xxdywka.exe 1132 iteqeeb.exe 2868 pjriyuk.exe 488 cgidmdv.exe 2116 pbabsgu.exe -
Loads dropped DLL 64 IoCs
pid Process 1768 cbd2eccb228e932cb19f92bd01beede4.exe 1768 cbd2eccb228e932cb19f92bd01beede4.exe 2736 eoepzok.exe 2736 eoepzok.exe 2704 tpocdzw.exe 2704 tpocdzw.exe 848 Process not Found 848 Process not Found 848 Process not Found 848 Process not Found 848 Process not Found 848 Process not Found 2880 axkvppg.exe 2880 axkvppg.exe 848 Process not Found 848 Process not Found 2476 ibmihai.exe 848 Process not Found 848 Process not Found 2476 ibmihai.exe 1108 itvabms.exe 1108 itvabms.exe 848 Process not Found 848 Process not Found 2824 aeisirt.exe 2824 aeisirt.exe 848 Process not Found 848 Process not Found 1084 ziuqfib.exe 1084 ziuqfib.exe 848 Process not Found 848 Process not Found 1964 hbtqupf.exe 1964 hbtqupf.exe 848 Process not Found 848 Process not Found 640 tgktigq.exe 640 tgktigq.exe 848 Process not Found 848 Process not Found 1180 bknyrrt.exe 1180 bknyrrt.exe 848 Process not Found 848 Process not Found 2064 jpxljce.exe 2064 jpxljce.exe 848 Process not Found 848 Process not Found 2216 qwsdvaf.exe 2216 qwsdvaf.exe 848 Process not Found 848 Process not Found 2128 avwaoqn.exe 2128 avwaoqn.exe 848 Process not Found 848 Process not Found 3036 idsbaow.exe 848 Process not Found 848 Process not Found 3036 idsbaow.exe 2316 szllpix.exe 2316 szllpix.exe 848 Process not Found 848 Process not Found -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\kkmyfle.exe ddzglvv.exe File created C:\Windows\SysWOW64\lzltsbr.exe ymtdmfk.exe File opened for modification C:\Windows\SysWOW64\jbrstwo.exe wlwqloi.exe File opened for modification C:\Windows\SysWOW64\sqqrxzi.exe fdybkvj.exe File created C:\Windows\SysWOW64\vejcuoi.exe sjismth.exe File created C:\Windows\SysWOW64\hixrgie.exe uvfuaef.exe File opened for modification C:\Windows\SysWOW64\rbalgyo.exe kqcgjwx.exe File created C:\Windows\SysWOW64\kahztoh.exe dvfmbde.exe File opened for modification C:\Windows\SysWOW64\ymmsogm.exe eshcone.exe File opened for modification C:\Windows\SysWOW64\fazjfpo.exe vpjysmh.exe File created C:\Windows\SysWOW64\wittudn.exe mjhwkef.exe File created C:\Windows\SysWOW64\zcxnuit.exe psichfn.exe File opened for modification C:\Windows\SysWOW64\gkqgkbs.exe wlmjacl.exe File opened for modification C:\Windows\SysWOW64\ojhokxw.exe bsfmbpr.exe File opened for modification C:\Windows\SysWOW64\zgkfimx.exe mtapcrz.exe File opened for modification C:\Windows\SysWOW64\gbzucpy.exe oxkkaxn.exe File opened for modification C:\Windows\SysWOW64\qgtqxfw.exe flsfplv.exe File opened for modification C:\Windows\SysWOW64\yzmhdlm.exe pooxipg.exe File created C:\Windows\SysWOW64\mdqfsas.exe blaafkq.exe File created C:\Windows\SysWOW64\bigftxg.exe hyeyndk.exe File opened for modification C:\Windows\SysWOW64\qriwnkk.exe gvhmgpj.exe File created C:\Windows\SysWOW64\ykgjkds.exe qriwnkk.exe File opened for modification C:\Windows\SysWOW64\pfaglng.exe fgnabpy.exe File opened for modification C:\Windows\SysWOW64\dzndtml.exe temsmsk.exe File created C:\Windows\SysWOW64\qwwschy.exe euqcqcu.exe File created C:\Windows\SysWOW64\ihiavht.exe vqofmzo.exe File opened for modification C:\Windows\SysWOW64\kixymwf.exe xnoigth.exe File created C:\Windows\SysWOW64\wwhvuxu.exe mlstgug.exe File opened for modification C:\Windows\SysWOW64\noxebhl.exe dlitoee.exe File created C:\Windows\SysWOW64\rhzkfqo.exe eiehxiq.exe File created C:\Windows\SysWOW64\ylzyeib.exe lypaymc.exe File opened for modification C:\Windows\SysWOW64\qiflniq.exe gjsgdjj.exe File created C:\Windows\SysWOW64\kshzejc.exe atvbmku.exe File opened for modification C:\Windows\SysWOW64\hyeyndk.exe ulmiham.exe File opened for modification C:\Windows\SysWOW64\bxbdoso.exe rbalgyo.exe File created C:\Windows\SysWOW64\nszupel.exe cxychjc.exe File created C:\Windows\SysWOW64\ffrwgrh.exe yusrrxr.exe File opened for modification C:\Windows\SysWOW64\hbtqupf.exe ziuqfib.exe File created C:\Windows\SysWOW64\oxkkaxn.exe hixrgie.exe File opened for modification C:\Windows\SysWOW64\wdbfihy.exe mdpixir.exe File created C:\Windows\SysWOW64\lvnmfen.exe bsxcjbh.exe File created C:\Windows\SysWOW64\xisyhyz.exe nxdvuvs.exe File opened for modification C:\Windows\SysWOW64\mpovxct.exe zvifmyo.exe File opened for modification C:\Windows\SysWOW64\xnoigth.exe nobkwuz.exe File created C:\Windows\SysWOW64\aoncrzp.exe qmxsewi.exe File created C:\Windows\SysWOW64\wlmjacl.exe jyutuym.exe File opened for modification C:\Windows\SysWOW64\lnuyote.exe bcfobqx.exe File opened for modification C:\Windows\SysWOW64\wptsgjn.exe jckcafo.exe File opened for modification C:\Windows\SysWOW64\klisbvq.exe xjcdqrm.exe File opened for modification C:\Windows\SysWOW64\uypyjbi.exe kzdsyca.exe File opened for modification C:\Windows\SysWOW64\fwjrngz.exe uxfuciz.exe File opened for modification C:\Windows\SysWOW64\yekproj.exe oegsypb.exe File opened for modification C:\Windows\SysWOW64\ebmbffm.exe rksywfg.exe File opened for modification C:\Windows\SysWOW64\lfckmvg.exe dxpkayx.exe File created C:\Windows\SysWOW64\dzndtml.exe temsmsk.exe File created C:\Windows\SysWOW64\pakgsae.exe cnsrmey.exe File created C:\Windows\SysWOW64\ykhztth.exe olubiua.exe File opened for modification C:\Windows\SysWOW64\fsqretw.exe ykvrkvn.exe File created C:\Windows\SysWOW64\temsmsk.exe jqlvokx.exe File opened for modification C:\Windows\SysWOW64\jygxqiz.exe mmlkzgt.exe File created C:\Windows\SysWOW64\hjwtxwe.exe clqtpjv.exe File created C:\Windows\SysWOW64\qxoyzkr.exe bigftxg.exe File opened for modification C:\Windows\SysWOW64\yaofaow.exe qwdajvt.exe File opened for modification C:\Windows\SysWOW64\tlffalw.exe gyvpupy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2736 1768 cbd2eccb228e932cb19f92bd01beede4.exe 28 PID 1768 wrote to memory of 2736 1768 cbd2eccb228e932cb19f92bd01beede4.exe 28 PID 1768 wrote to memory of 2736 1768 cbd2eccb228e932cb19f92bd01beede4.exe 28 PID 1768 wrote to memory of 2736 1768 cbd2eccb228e932cb19f92bd01beede4.exe 28 PID 2736 wrote to memory of 2704 2736 eoepzok.exe 29 PID 2736 wrote to memory of 2704 2736 eoepzok.exe 29 PID 2736 wrote to memory of 2704 2736 eoepzok.exe 29 PID 2736 wrote to memory of 2704 2736 eoepzok.exe 29 PID 2704 wrote to memory of 2880 2704 tpocdzw.exe 30 PID 2704 wrote to memory of 2880 2704 tpocdzw.exe 30 PID 2704 wrote to memory of 2880 2704 tpocdzw.exe 30 PID 2704 wrote to memory of 2880 2704 tpocdzw.exe 30 PID 2880 wrote to memory of 2476 2880 axkvppg.exe 31 PID 2880 wrote to memory of 2476 2880 axkvppg.exe 31 PID 2880 wrote to memory of 2476 2880 axkvppg.exe 31 PID 2880 wrote to memory of 2476 2880 axkvppg.exe 31 PID 2476 wrote to memory of 1108 2476 ibmihai.exe 32 PID 2476 wrote to memory of 1108 2476 ibmihai.exe 32 PID 2476 wrote to memory of 1108 2476 ibmihai.exe 32 PID 2476 wrote to memory of 1108 2476 ibmihai.exe 32 PID 1108 wrote to memory of 2824 1108 itvabms.exe 33 PID 1108 wrote to memory of 2824 1108 itvabms.exe 33 PID 1108 wrote to memory of 2824 1108 itvabms.exe 33 PID 1108 wrote to memory of 2824 1108 itvabms.exe 33 PID 2824 wrote to memory of 1084 2824 aeisirt.exe 34 PID 2824 wrote to memory of 1084 2824 aeisirt.exe 34 PID 2824 wrote to memory of 1084 2824 aeisirt.exe 34 PID 2824 wrote to memory of 1084 2824 aeisirt.exe 34 PID 1084 wrote to memory of 1964 1084 ziuqfib.exe 35 PID 1084 wrote to memory of 1964 1084 ziuqfib.exe 35 PID 1084 wrote to memory of 1964 1084 ziuqfib.exe 35 PID 1084 wrote to memory of 1964 1084 ziuqfib.exe 35 PID 1964 wrote to memory of 640 1964 hbtqupf.exe 36 PID 1964 wrote to memory of 640 1964 hbtqupf.exe 36 PID 1964 wrote to memory of 640 1964 hbtqupf.exe 36 PID 1964 wrote to memory of 640 1964 hbtqupf.exe 36 PID 640 wrote to memory of 1180 640 tgktigq.exe 37 PID 640 wrote to memory of 1180 640 tgktigq.exe 37 PID 640 wrote to memory of 1180 640 tgktigq.exe 37 PID 640 wrote to memory of 1180 640 tgktigq.exe 37 PID 1180 wrote to memory of 2064 1180 bknyrrt.exe 38 PID 1180 wrote to memory of 2064 1180 bknyrrt.exe 38 PID 1180 wrote to memory of 2064 1180 bknyrrt.exe 38 PID 1180 wrote to memory of 2064 1180 bknyrrt.exe 38 PID 2064 wrote to memory of 2216 2064 jpxljce.exe 39 PID 2064 wrote to memory of 2216 2064 jpxljce.exe 39 PID 2064 wrote to memory of 2216 2064 jpxljce.exe 39 PID 2064 wrote to memory of 2216 2064 jpxljce.exe 39 PID 2216 wrote to memory of 2128 2216 qwsdvaf.exe 40 PID 2216 wrote to memory of 2128 2216 qwsdvaf.exe 40 PID 2216 wrote to memory of 2128 2216 qwsdvaf.exe 40 PID 2216 wrote to memory of 2128 2216 qwsdvaf.exe 40 PID 2128 wrote to memory of 3036 2128 avwaoqn.exe 41 PID 2128 wrote to memory of 3036 2128 avwaoqn.exe 41 PID 2128 wrote to memory of 3036 2128 avwaoqn.exe 41 PID 2128 wrote to memory of 3036 2128 avwaoqn.exe 41 PID 3036 wrote to memory of 2316 3036 idsbaow.exe 42 PID 3036 wrote to memory of 2316 3036 idsbaow.exe 42 PID 3036 wrote to memory of 2316 3036 idsbaow.exe 42 PID 3036 wrote to memory of 2316 3036 idsbaow.exe 42 PID 2316 wrote to memory of 1392 2316 szllpix.exe 43 PID 2316 wrote to memory of 1392 2316 szllpix.exe 43 PID 2316 wrote to memory of 1392 2316 szllpix.exe 43 PID 2316 wrote to memory of 1392 2316 szllpix.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbd2eccb228e932cb19f92bd01beede4.exe"C:\Users\Admin\AppData\Local\Temp\cbd2eccb228e932cb19f92bd01beede4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\eoepzok.exeC:\Windows\system32\eoepzok.exe 492 "C:\Users\Admin\AppData\Local\Temp\cbd2eccb228e932cb19f92bd01beede4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\tpocdzw.exeC:\Windows\system32\tpocdzw.exe 532 "C:\Windows\SysWOW64\eoepzok.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\axkvppg.exeC:\Windows\system32\axkvppg.exe 536 "C:\Windows\SysWOW64\tpocdzw.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\ibmihai.exeC:\Windows\system32\ibmihai.exe 544 "C:\Windows\SysWOW64\axkvppg.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\itvabms.exeC:\Windows\system32\itvabms.exe 452 "C:\Windows\SysWOW64\ibmihai.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\aeisirt.exeC:\Windows\system32\aeisirt.exe 456 "C:\Windows\SysWOW64\itvabms.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\ziuqfib.exeC:\Windows\system32\ziuqfib.exe 396 "C:\Windows\SysWOW64\aeisirt.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\hbtqupf.exeC:\Windows\system32\hbtqupf.exe 560 "C:\Windows\SysWOW64\ziuqfib.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\tgktigq.exeC:\Windows\system32\tgktigq.exe 548 "C:\Windows\SysWOW64\hbtqupf.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\bknyrrt.exeC:\Windows\system32\bknyrrt.exe 564 "C:\Windows\SysWOW64\tgktigq.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\jpxljce.exeC:\Windows\system32\jpxljce.exe 568 "C:\Windows\SysWOW64\bknyrrt.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\qwsdvaf.exeC:\Windows\system32\qwsdvaf.exe 512 "C:\Windows\SysWOW64\jpxljce.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\avwaoqn.exeC:\Windows\system32\avwaoqn.exe 576 "C:\Windows\SysWOW64\qwsdvaf.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\idsbaow.exeC:\Windows\system32\idsbaow.exe 580 "C:\Windows\SysWOW64\avwaoqn.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\szllpix.exeC:\Windows\system32\szllpix.exe 476 "C:\Windows\SysWOW64\idsbaow.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\zgglcyh.exeC:\Windows\system32\zgglcyh.exe 496 "C:\Windows\SysWOW64\szllpix.exe"17⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\zzhvwkq.exeC:\Windows\system32\zzhvwkq.exe 464 "C:\Windows\SysWOW64\zgglcyh.exe"18⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\ppadccu.exeC:\Windows\system32\ppadccu.exe 596 "C:\Windows\SysWOW64\zzhvwkq.exe"19⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\owqokxk.exeC:\Windows\system32\owqokxk.exe 468 "C:\Windows\SysWOW64\ppadccu.exe"20⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\bntqtxh.exeC:\Windows\system32\bntqtxh.exe 604 "C:\Windows\SysWOW64\owqokxk.exe"21⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\SysWOW64\iugjfvr.exeC:\Windows\system32\iugjfvr.exe 608 "C:\Windows\SysWOW64\bntqtxh.exe"22⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\vhyylrp.exeC:\Windows\system32\vhyylrp.exe 540 "C:\Windows\SysWOW64\iugjfvr.exe"23⤵
- Executes dropped EXE
PID:3020 -
C:\Windows\SysWOW64\aurgeac.exeC:\Windows\system32\aurgeac.exe 620 "C:\Windows\SysWOW64\vhyylrp.exe"24⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\nlmjmji.exeC:\Windows\system32\nlmjmji.exe 616 "C:\Windows\SysWOW64\aurgeac.exe"25⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\ndnbhvs.exeC:\Windows\system32\ndnbhvs.exe 504 "C:\Windows\SysWOW64\nlmjmji.exe"26⤵
- Executes dropped EXE
PID:2416 -
C:\Windows\SysWOW64\wrnzfdx.exeC:\Windows\system32\wrnzfdx.exe 628 "C:\Windows\SysWOW64\ndnbhvs.exe"27⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\gqawpbe.exeC:\Windows\system32\gqawpbe.exe 636 "C:\Windows\SysWOW64\wrnzfdx.exe"28⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\rjptcsg.exeC:\Windows\system32\rjptcsg.exe 632 "C:\Windows\SysWOW64\gqawpbe.exe"29⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\SysWOW64\yuohrlo.exeC:\Windows\system32\yuohrlo.exe 640 "C:\Windows\SysWOW64\rjptcsg.exe"30⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\jpprygp.exeC:\Windows\system32\jpprygp.exe 472 "C:\Windows\SysWOW64\yuohrlo.exe"31⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\SysWOW64\saebujd.exeC:\Windows\system32\saebujd.exe 648 "C:\Windows\SysWOW64\jpprygp.exe"32⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\dvfmbde.exeC:\Windows\system32\dvfmbde.exe 652 "C:\Windows\SysWOW64\saebujd.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1972 -
C:\Windows\SysWOW64\kahztoh.exeC:\Windows\system32\kahztoh.exe 656 "C:\Windows\SysWOW64\dvfmbde.exe"34⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\pqmupcs.exeC:\Windows\system32\pqmupcs.exe 660 "C:\Windows\SysWOW64\kahztoh.exe"35⤵
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\uvfuaef.exeC:\Windows\system32\uvfuaef.exe 664 "C:\Windows\SysWOW64\pqmupcs.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2056 -
C:\Windows\SysWOW64\hixrgie.exeC:\Windows\system32\hixrgie.exe 668 "C:\Windows\SysWOW64\uvfuaef.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\oxkkaxn.exeC:\Windows\system32\oxkkaxn.exe 672 "C:\Windows\SysWOW64\hixrgie.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\gbzucpy.exeC:\Windows\system32\gbzucpy.exe 676 "C:\Windows\SysWOW64\oxkkaxn.exe"39⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\SysWOW64\dvpubai.exeC:\Windows\system32\dvpubai.exe 680 "C:\Windows\SysWOW64\gbzucpy.exe"40⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\qiykgeh.exeC:\Windows\system32\qiykgeh.exe 684 "C:\Windows\SysWOW64\dvpubai.exe"41⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\ahkhrco.exeC:\Windows\system32\ahkhrco.exe 520 "C:\Windows\SysWOW64\qiykgeh.exe"42⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\hsjuowx.exeC:\Windows\system32\hsjuowx.exe 692 "C:\Windows\SysWOW64\ahkhrco.exe"43⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\SysWOW64\rnkfvrf.exeC:\Windows\system32\rnkfvrf.exe 484 "C:\Windows\SysWOW64\hsjuowx.exe"44⤵
- Executes dropped EXE
PID:992 -
C:\Windows\SysWOW64\zdxxqgh.exeC:\Windows\system32\zdxxqgh.exe 704 "C:\Windows\SysWOW64\rnkfvrf.exe"45⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\jckcafo.exeC:\Windows\system32\jckcafo.exe 624 "C:\Windows\SysWOW64\zdxxqgh.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\wptsgjn.exeC:\Windows\system32\wptsgjn.exe 708 "C:\Windows\SysWOW64\jckcafo.exe"47⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\dxpkayx.exeC:\Windows\system32\dxpkayx.exe 712 "C:\Windows\SysWOW64\wptsgjn.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1740 -
C:\Windows\SysWOW64\lfckmvg.exeC:\Windows\system32\lfckmvg.exe 720 "C:\Windows\SysWOW64\dxpkayx.exe"49⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\SysWOW64\veoifmo.exeC:\Windows\system32\veoifmo.exe 728 "C:\Windows\SysWOW64\lfckmvg.exe"50⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\flsfplv.exeC:\Windows\system32\flsfplv.exe 716 "C:\Windows\SysWOW64\veoifmo.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3040 -
C:\Windows\SysWOW64\qgtqxfw.exeC:\Windows\system32\qgtqxfw.exe 724 "C:\Windows\SysWOW64\flsfplv.exe"52⤵
- Executes dropped EXE
PID:2752 -
C:\Windows\SysWOW64\ulnxqpb.exeC:\Windows\system32\ulnxqpb.exe 732 "C:\Windows\SysWOW64\qgtqxfw.exe"53⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\celdnjr.exeC:\Windows\system32\celdnjr.exe 736 "C:\Windows\SysWOW64\ulnxqpb.exe"54⤵
- Executes dropped EXE
PID:2740 -
C:\Windows\SysWOW64\mdpixir.exeC:\Windows\system32\mdpixir.exe 696 "C:\Windows\SysWOW64\celdnjr.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:872 -
C:\Windows\SysWOW64\wdbfihy.exeC:\Windows\system32\wdbfihy.exe 744 "C:\Windows\SysWOW64\mdpixir.exe"56⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\jqlvokx.exeC:\Windows\system32\jqlvokx.exe 748 "C:\Windows\SysWOW64\wdbfihy.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1116 -
C:\Windows\SysWOW64\temsmsk.exeC:\Windows\system32\temsmsk.exe 756 "C:\Windows\SysWOW64\jqlvokx.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:476 -
C:\Windows\SysWOW64\dzndtml.exeC:\Windows\system32\dzndtml.exe 752 "C:\Windows\SysWOW64\temsmsk.exe"59⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\nyraels.exeC:\Windows\system32\nyraels.exe 760 "C:\Windows\SysWOW64\dzndtml.exe"60⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\xxdywka.exeC:\Windows\system32\xxdywka.exe 764 "C:\Windows\SysWOW64\nyraels.exe"61⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\iteqeeb.exeC:\Windows\system32\iteqeeb.exe 768 "C:\Windows\SysWOW64\xxdywka.exe"62⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\pjriyuk.exeC:\Windows\system32\pjriyuk.exe 772 "C:\Windows\SysWOW64\iteqeeb.exe"63⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\cgidmdv.exeC:\Windows\system32\cgidmdv.exe 776 "C:\Windows\SysWOW64\pjriyuk.exe"64⤵
- Executes dropped EXE
PID:488 -
C:\Windows\SysWOW64\pbabsgu.exeC:\Windows\system32\pbabsgu.exe 780 "C:\Windows\SysWOW64\cgidmdv.exe"65⤵
- Executes dropped EXE
PID:2116 -
C:\Windows\SysWOW64\wmzghac.exeC:\Windows\system32\wmzghac.exe 784 "C:\Windows\SysWOW64\pbabsgu.exe"66⤵PID:1460
-
C:\Windows\SysWOW64\jzivvej.exeC:\Windows\system32\jzivvej.exe 788 "C:\Windows\SysWOW64\wmzghac.exe"67⤵PID:944
-
C:\Windows\SysWOW64\wylydmh.exeC:\Windows\system32\wylydmh.exe 792 "C:\Windows\SysWOW64\jzivvej.exe"68⤵PID:904
-
C:\Windows\SysWOW64\gaajrpv.exeC:\Windows\system32\gaajrpv.exe 796 "C:\Windows\SysWOW64\wylydmh.exe"69⤵PID:1680
-
C:\Windows\SysWOW64\trvlzps.exeC:\Windows\system32\trvlzps.exe 800 "C:\Windows\SysWOW64\gaajrpv.exe"70⤵PID:2204
-
C:\Windows\SysWOW64\ftbtlcf.exeC:\Windows\system32\ftbtlcf.exe 804 "C:\Windows\SysWOW64\trvlzps.exe"71⤵PID:1304
-
C:\Windows\SysWOW64\perdgfl.exeC:\Windows\system32\perdgfl.exe 812 "C:\Windows\SysWOW64\ftbtlcf.exe"72⤵PID:2616
-
C:\Windows\SysWOW64\critmjk.exeC:\Windows\system32\critmjk.exe 808 "C:\Windows\SysWOW64\perdgfl.exe"73⤵PID:2672
-
C:\Windows\SysWOW64\nqmywir.exeC:\Windows\system32\nqmywir.exe 816 "C:\Windows\SysWOW64\critmjk.exe"74⤵PID:2644
-
C:\Windows\SysWOW64\wskjjdy.exeC:\Windows\system32\wskjjdy.exe 820 "C:\Windows\SysWOW64\nqmywir.exe"75⤵PID:2856
-
C:\Windows\SysWOW64\hzogccf.exeC:\Windows\system32\hzogccf.exe 832 "C:\Windows\SysWOW64\wskjjdy.exe"76⤵PID:2780
-
C:\Windows\SysWOW64\uqjjkkl.exeC:\Windows\system32\uqjjkkl.exe 824 "C:\Windows\SysWOW64\hzogccf.exe"77⤵PID:1880
-
C:\Windows\SysWOW64\epvgvjk.exeC:\Windows\system32\epvgvjk.exe 828 "C:\Windows\SysWOW64\uqjjkkl.exe"78⤵PID:1636
-
C:\Windows\SysWOW64\ltflmuv.exeC:\Windows\system32\ltflmuv.exe 836 "C:\Windows\SysWOW64\epvgvjk.exe"79⤵PID:1496
-
C:\Windows\SysWOW64\smezbvd.exeC:\Windows\system32\smezbvd.exe 840 "C:\Windows\SysWOW64\ltflmuv.exe"80⤵PID:864
-
C:\Windows\SysWOW64\fdybkvj.exeC:\Windows\system32\fdybkvj.exe 844 "C:\Windows\SysWOW64\smezbvd.exe"81⤵
- Drops file in System32 directory
PID:2692 -
C:\Windows\SysWOW64\sqqrxzi.exeC:\Windows\system32\sqqrxzi.exe 852 "C:\Windows\SysWOW64\fdybkvj.exe"82⤵PID:1960
-
C:\Windows\SysWOW64\vpuoiyp.exeC:\Windows\system32\vpuoiyp.exe 856 "C:\Windows\SysWOW64\sqqrxzi.exe"83⤵PID:3016
-
C:\Windows\SysWOW64\ephemkz.exeC:\Windows\system32\ephemkz.exe 872 "C:\Windows\SysWOW64\vpuoiyp.exe"84⤵PID:1876
-
C:\Windows\SysWOW64\iqouexe.exeC:\Windows\system32\iqouexe.exe 860 "C:\Windows\SysWOW64\ephemkz.exe"85⤵PID:1104
-
C:\Windows\SysWOW64\shbkjiv.exeC:\Windows\system32\shbkjiv.exe 864 "C:\Windows\SysWOW64\iqouexe.exe"86⤵PID:1364
-
C:\Windows\SysWOW64\zmlxaby.exeC:\Windows\system32\zmlxaby.exe 868 "C:\Windows\SysWOW64\shbkjiv.exe"87⤵PID:1528
-
C:\Windows\SysWOW64\joahnfm.exeC:\Windows\system32\joahnfm.exe 848 "C:\Windows\SysWOW64\zmlxaby.exe"88⤵PID:1832
-
C:\Windows\SysWOW64\xjsxtal.exeC:\Windows\system32\xjsxtal.exe 876 "C:\Windows\SysWOW64\joahnfm.exe"89⤵PID:1168
-
C:\Windows\SysWOW64\euqcqcu.exeC:\Windows\system32\euqcqcu.exe 896 "C:\Windows\SysWOW64\xjsxtal.exe"90⤵
- Drops file in System32 directory
PID:880 -
C:\Windows\SysWOW64\qwwschy.exeC:\Windows\system32\qwwschy.exe 880 "C:\Windows\SysWOW64\euqcqcu.exe"91⤵PID:1776
-
C:\Windows\SysWOW64\bsxcjbh.exeC:\Windows\system32\bsxcjbh.exe 888 "C:\Windows\SysWOW64\qwwschy.exe"92⤵
- Drops file in System32 directory
PID:1188 -
C:\Windows\SysWOW64\lvnmfen.exeC:\Windows\system32\lvnmfen.exe 700 "C:\Windows\SysWOW64\bsxcjbh.exe"93⤵PID:2888
-
C:\Windows\SysWOW64\vqofmzo.exeC:\Windows\system32\vqofmzo.exe 892 "C:\Windows\SysWOW64\lvnmfen.exe"94⤵
- Drops file in System32 directory
PID:2612 -
C:\Windows\SysWOW64\ihiavht.exeC:\Windows\system32\ihiavht.exe 904 "C:\Windows\SysWOW64\vqofmzo.exe"95⤵PID:2140
-
C:\Windows\SysWOW64\srykqka.exeC:\Windows\system32\srykqka.exe 900 "C:\Windows\SysWOW64\ihiavht.exe"96⤵PID:2800
-
C:\Windows\SysWOW64\fepiwgy.exeC:\Windows\system32\fepiwgy.exe 908 "C:\Windows\SysWOW64\srykqka.exe"97⤵PID:2724
-
C:\Windows\SysWOW64\pdtfgfg.exeC:\Windows\system32\pdtfgfg.exe 912 "C:\Windows\SysWOW64\fepiwgy.exe"98⤵PID:2812
-
C:\Windows\SysWOW64\zojptim.exeC:\Windows\system32\zojptim.exe 916 "C:\Windows\SysWOW64\pdtfgfg.exe"99⤵PID:2396
-
C:\Windows\SysWOW64\jqyaplb.exeC:\Windows\system32\jqyaplb.exe 920 "C:\Windows\SysWOW64\zojptim.exe"100⤵PID:2848
-
C:\Windows\SysWOW64\wpbvxty.exeC:\Windows\system32\wpbvxty.exe 924 "C:\Windows\SysWOW64\jqyaplb.exe"101⤵PID:1484
-
C:\Windows\SysWOW64\jclsdxf.exeC:\Windows\system32\jclsdxf.exe 928 "C:\Windows\SysWOW64\wpbvxty.exe"102⤵PID:1836
-
C:\Windows\SysWOW64\tqlitwk.exeC:\Windows\system32\tqlitwk.exe 940 "C:\Windows\SysWOW64\jclsdxf.exe"103⤵PID:1100
-
C:\Windows\SysWOW64\dpxfmvr.exeC:\Windows\system32\dpxfmvr.exe 932 "C:\Windows\SysWOW64\tqlitwk.exe"104⤵PID:1436
-
C:\Windows\SysWOW64\nobkwuz.exeC:\Windows\system32\nobkwuz.exe 936 "C:\Windows\SysWOW64\dpxfmvr.exe"105⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\xnoigth.exeC:\Windows\system32\xnoigth.exe 944 "C:\Windows\SysWOW64\nobkwuz.exe"106⤵
- Drops file in System32 directory
PID:1980 -
C:\Windows\SysWOW64\kixymwf.exeC:\Windows\system32\kixymwf.exe 948 "C:\Windows\SysWOW64\xnoigth.exe"107⤵PID:832
-
C:\Windows\SysWOW64\ulmiham.exeC:\Windows\system32\ulmiham.exe 952 "C:\Windows\SysWOW64\kixymwf.exe"108⤵
- Drops file in System32 directory
PID:1232 -
C:\Windows\SysWOW64\hyeyndk.exeC:\Windows\system32\hyeyndk.exe 956 "C:\Windows\SysWOW64\ulmiham.exe"109⤵
- Drops file in System32 directory
PID:1120 -
C:\Windows\SysWOW64\bigftxg.exeC:\Windows\system32\bigftxg.exe 972 "C:\Windows\SysWOW64\hyeyndk.exe"110⤵
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\qxoyzkr.exeC:\Windows\system32\qxoyzkr.exe 960 "C:\Windows\SysWOW64\bigftxg.exe"111⤵PID:2516
-
C:\Windows\SysWOW64\kdxtuig.exeC:\Windows\system32\kdxtuig.exe 964 "C:\Windows\SysWOW64\qxoyzkr.exe"112⤵PID:1580
-
C:\Windows\SysWOW64\xuzvlqe.exeC:\Windows\system32\xuzvlqe.exe 968 "C:\Windows\SysWOW64\kdxtuig.exe"113⤵PID:780
-
C:\Windows\SysWOW64\ipaoskn.exeC:\Windows\system32\ipaoskn.exe 980 "C:\Windows\SysWOW64\xuzvlqe.exe"114⤵PID:344
-
C:\Windows\SysWOW64\soeldjm.exeC:\Windows\system32\soeldjm.exe 976 "C:\Windows\SysWOW64\ipaoskn.exe"115⤵PID:1588
-
C:\Windows\SysWOW64\cnjjvau.exeC:\Windows\system32\cnjjvau.exe 988 "C:\Windows\SysWOW64\soeldjm.exe"116⤵PID:1696
-
C:\Windows\SysWOW64\eygtidi.exeC:\Windows\system32\eygtidi.exe 740 "C:\Windows\SysWOW64\cnjjvau.exe"117⤵PID:632
-
C:\Windows\SysWOW64\oxkqtci.exeC:\Windows\system32\oxkqtci.exe 992 "C:\Windows\SysWOW64\eygtidi.exe"118⤵PID:588
-
C:\Windows\SysWOW64\ywoolbp.exeC:\Windows\system32\ywoolbp.exe 996 "C:\Windows\SysWOW64\oxkqtci.exe"119⤵PID:2840
-
C:\Windows\SysWOW64\asrqgbe.exeC:\Windows\system32\asrqgbe.exe 1016 "C:\Windows\SysWOW64\ywoolbp.exe"120⤵PID:1772
-
C:\Windows\SysWOW64\lnsjovf.exeC:\Windows\system32\lnsjovf.exe 1000 "C:\Windows\SysWOW64\asrqgbe.exe"121⤵PID:860
-
C:\Windows\SysWOW64\vqhtbzl.exeC:\Windows\system32\vqhtbzl.exe 1008 "C:\Windows\SysWOW64\lnsjovf.exe"122⤵PID:2044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-