Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 15:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cbd2eccb228e932cb19f92bd01beede4.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
cbd2eccb228e932cb19f92bd01beede4.exe
Resource
win10v2004-20240226-en
3 signatures
150 seconds
General
-
Target
cbd2eccb228e932cb19f92bd01beede4.exe
-
Size
145KB
-
MD5
cbd2eccb228e932cb19f92bd01beede4
-
SHA1
7cc7f452c72b603cb80325e0cc3aaec135ded368
-
SHA256
c0addaa89d6ae4b7199f4e4b37ffa50bf2a69ff728121205a5dce5a677d44f42
-
SHA512
fcd056e001c7f27c0c90068891608387cb6c1c06a044dd6845452972d52c97e0e786b476bc99da24e0c2cd68f11ef0930fe811d78b9b2549c74598aaa15612e2
-
SSDEEP
3072:wt8WgDoza726OcvgsOabwd00Syecg3kI77GR+2pLKGSWB4TU:QgZK6nOEUHechA7G9xKF2YU
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4500 exywyhi.exe 1900 emppbxr.exe 3464 mnwhimv.exe 552 wmamalu.exe 1052 jzscghb.exe 2672 tywaqfa.exe 2484 bwjncqg.exe 3552 ommplyd.exe 3344 bzwfruk.exe 2208 ympnkdp.exe 3588 ihqxryp.exe 3964 wuavxco.exe 5100 gqbgfwx.exe 4984 orzgtdb.exe 1440 ymaqbxc.exe 4300 ldvtkgz.exe 2044 yqnjpkg.exe 4400 ddgrjll.exe 2180 tlsypdo.exe 636 ggjovzn.exe 3092 qbchdto.exe 2140 baoevsv.exe 1228 jpcrzcs.exe 4272 ymkrluc.exe 2872 dkhhzwb.exe 2248 qfyxfza.exe 2616 vksfybm.exe 4884 dhgscmj.exe 4308 grxhuir.exe 3260 lsnckfx.exe 4424 nsgjtlv.exe 4496 gohzbux.exe 4376 lpxcjad.exe 332 iggfqhz.exe 1388 iwoozsq.exe 1040 lnsxgsa.exe 4316 ssccqdl.exe 1624 qqunied.exe 380 vnrvwfc.exe 4472 fndtgek.exe 1628 qiwlozl.exe 2192 aaljapn.exe 2756 iewwkap.exe 5084 smiplxo.exe 3176 yomlgjp.exe 4776 hrbwtmd.exe 1092 snnrajr.exe 2104 xhhicvm.exe 4276 cyxlprm.exe 1288 peccacf.exe 3272 kdviubh.exe 5056 uofjsyy.exe 1680 sqbfzlu.exe 4204 xvfqrhm.exe 3248 hryizju.exe 4396 jykgjau.exe 4560 utlqzcd.exe 4676 bmkqfjz.exe 1992 kbydrme.exe 4540 rfirafh.exe 2260 cbjbizh.exe 2956 mingayp.exe 5088 wsdefor.exe 4296 kfuulsq.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jvenpwl.exe znsqxye.exe File opened for modification C:\Windows\SysWOW64\curxgdx.exe pwwuyds.exe File opened for modification C:\Windows\SysWOW64\bvbkghz.exe opjirqo.exe File opened for modification C:\Windows\SysWOW64\uiqnhrt.exe eaffizq.exe File created C:\Windows\SysWOW64\ikzojla.exe tjliwhp.exe File opened for modification C:\Windows\SysWOW64\qiwlozl.exe fndtgek.exe File created C:\Windows\SysWOW64\xdhlysq.exe eweybzo.exe File created C:\Windows\SysWOW64\hhmklnh.exe zdcfccx.exe File opened for modification C:\Windows\SysWOW64\ekdoilw.exe rxlydpq.exe File opened for modification C:\Windows\SysWOW64\gdpwcvt.exe qrpbyio.exe File created C:\Windows\SysWOW64\gfbrzok.exe yyozezb.exe File opened for modification C:\Windows\SysWOW64\qapfery.exe gfpnpxx.exe File opened for modification C:\Windows\SysWOW64\yzfhatj.exe ijthtkf.exe File opened for modification C:\Windows\SysWOW64\prbpuiv.exe bpcerjd.exe File opened for modification C:\Windows\SysWOW64\gzrivcs.exe qyusutu.exe File opened for modification C:\Windows\SysWOW64\vkzncai.exe onnkfvq.exe File opened for modification C:\Windows\SysWOW64\encifgo.exe wggqlje.exe File created C:\Windows\SysWOW64\gtzfduj.exe ghnfpqf.exe File created C:\Windows\SysWOW64\exywyhi.exe cbd2eccb228e932cb19f92bd01beede4.exe File created C:\Windows\SysWOW64\srplomo.exe cmhqkhs.exe File created C:\Windows\SysWOW64\nexbjfr.exe avrzgfz.exe File created C:\Windows\SysWOW64\jhmncjy.exe bwbfbda.exe File created C:\Windows\SysWOW64\grxhuir.exe dhgscmj.exe File opened for modification C:\Windows\SysWOW64\dpkihhs.exe sxvkdrq.exe File created C:\Windows\SysWOW64\vflyyri.exe fpaqran.exe File opened for modification C:\Windows\SysWOW64\xbpahbh.exe koycbyi.exe File opened for modification C:\Windows\SysWOW64\esuyecs.exe ziedwxm.exe File created C:\Windows\SysWOW64\txazmik.exe jflchsi.exe File opened for modification C:\Windows\SysWOW64\aoyckxx.exe svzcvqt.exe File created C:\Windows\SysWOW64\emppbxr.exe exywyhi.exe File opened for modification C:\Windows\SysWOW64\vnkyjjg.exe krjncog.exe File created C:\Windows\SysWOW64\lzxeial.exe yxrxpng.exe File opened for modification C:\Windows\SysWOW64\idkluqy.exe xijamwx.exe File opened for modification C:\Windows\SysWOW64\crbonyd.exe vjnwtbu.exe File created C:\Windows\SysWOW64\kozpnfg.exe xbpahbh.exe File created C:\Windows\SysWOW64\butpsct.exe okvmpdb.exe File created C:\Windows\SysWOW64\tvaovid.exe gaqzhee.exe File created C:\Windows\SysWOW64\esiizbd.exe rcnfrtx.exe File created C:\Windows\SysWOW64\hstrzto.exe ufcctyp.exe File opened for modification C:\Windows\SysWOW64\jatgfrg.exe cvrtvgd.exe File opened for modification C:\Windows\SysWOW64\kbydrme.exe bmkqfjz.exe File created C:\Windows\SysWOW64\ayvqvfa.exe prqxttw.exe File opened for modification C:\Windows\SysWOW64\zlbeohv.exe mykhadw.exe File created C:\Windows\SysWOW64\seyingw.exe spbdwxt.exe File opened for modification C:\Windows\SysWOW64\pwwuyds.exe fxkxnfk.exe File created C:\Windows\SysWOW64\ihqxryp.exe ympnkdp.exe File created C:\Windows\SysWOW64\bgdfgyo.exe rgziwzp.exe File created C:\Windows\SysWOW64\khoybxl.exe dddlreb.exe File opened for modification C:\Windows\SysWOW64\ghnfpqf.exe wfwpift.exe File opened for modification C:\Windows\SysWOW64\vqmxnyl.exe issufpf.exe File opened for modification C:\Windows\SysWOW64\tlywinp.exe gnduzmj.exe File opened for modification C:\Windows\SysWOW64\qvjobdw.exe invohnn.exe File opened for modification C:\Windows\SysWOW64\mnwhimv.exe emppbxr.exe File created C:\Windows\SysWOW64\rwohsax.exe jvqodlt.exe File opened for modification C:\Windows\SysWOW64\muinmsr.exe rhzxrho.exe File created C:\Windows\SysWOW64\lsafkqb.exe yfqpemc.exe File created C:\Windows\SysWOW64\qvjobdw.exe invohnn.exe File created C:\Windows\SysWOW64\jpcrzcs.exe baoevsv.exe File opened for modification C:\Windows\SysWOW64\ssccqdl.exe lnsxgsa.exe File opened for modification C:\Windows\SysWOW64\wuzoqdk.exe jatgfrg.exe File opened for modification C:\Windows\SysWOW64\wmamalu.exe mnwhimv.exe File opened for modification C:\Windows\SysWOW64\dddlreb.exe qnjjbed.exe File created C:\Windows\SysWOW64\curxgdx.exe pwwuyds.exe File created C:\Windows\SysWOW64\wuzoqdk.exe jatgfrg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4320 wrote to memory of 4500 4320 cbd2eccb228e932cb19f92bd01beede4.exe 90 PID 4320 wrote to memory of 4500 4320 cbd2eccb228e932cb19f92bd01beede4.exe 90 PID 4320 wrote to memory of 4500 4320 cbd2eccb228e932cb19f92bd01beede4.exe 90 PID 4500 wrote to memory of 1900 4500 exywyhi.exe 92 PID 4500 wrote to memory of 1900 4500 exywyhi.exe 92 PID 4500 wrote to memory of 1900 4500 exywyhi.exe 92 PID 1900 wrote to memory of 3464 1900 emppbxr.exe 93 PID 1900 wrote to memory of 3464 1900 emppbxr.exe 93 PID 1900 wrote to memory of 3464 1900 emppbxr.exe 93 PID 3464 wrote to memory of 552 3464 mnwhimv.exe 94 PID 3464 wrote to memory of 552 3464 mnwhimv.exe 94 PID 3464 wrote to memory of 552 3464 mnwhimv.exe 94 PID 552 wrote to memory of 1052 552 wmamalu.exe 95 PID 552 wrote to memory of 1052 552 wmamalu.exe 95 PID 552 wrote to memory of 1052 552 wmamalu.exe 95 PID 1052 wrote to memory of 2672 1052 jzscghb.exe 96 PID 1052 wrote to memory of 2672 1052 jzscghb.exe 96 PID 1052 wrote to memory of 2672 1052 jzscghb.exe 96 PID 2672 wrote to memory of 2484 2672 tywaqfa.exe 97 PID 2672 wrote to memory of 2484 2672 tywaqfa.exe 97 PID 2672 wrote to memory of 2484 2672 tywaqfa.exe 97 PID 2484 wrote to memory of 3552 2484 bwjncqg.exe 98 PID 2484 wrote to memory of 3552 2484 bwjncqg.exe 98 PID 2484 wrote to memory of 3552 2484 bwjncqg.exe 98 PID 3552 wrote to memory of 3344 3552 ommplyd.exe 99 PID 3552 wrote to memory of 3344 3552 ommplyd.exe 99 PID 3552 wrote to memory of 3344 3552 ommplyd.exe 99 PID 3344 wrote to memory of 2208 3344 bzwfruk.exe 100 PID 3344 wrote to memory of 2208 3344 bzwfruk.exe 100 PID 3344 wrote to memory of 2208 3344 bzwfruk.exe 100 PID 2208 wrote to memory of 3588 2208 ympnkdp.exe 101 PID 2208 wrote to memory of 3588 2208 ympnkdp.exe 101 PID 2208 wrote to memory of 3588 2208 ympnkdp.exe 101 PID 3588 wrote to memory of 3964 3588 ihqxryp.exe 102 PID 3588 wrote to memory of 3964 3588 ihqxryp.exe 102 PID 3588 wrote to memory of 3964 3588 ihqxryp.exe 102 PID 3964 wrote to memory of 5100 3964 wuavxco.exe 103 PID 3964 wrote to memory of 5100 3964 wuavxco.exe 103 PID 3964 wrote to memory of 5100 3964 wuavxco.exe 103 PID 5100 wrote to memory of 4984 5100 gqbgfwx.exe 106 PID 5100 wrote to memory of 4984 5100 gqbgfwx.exe 106 PID 5100 wrote to memory of 4984 5100 gqbgfwx.exe 106 PID 4984 wrote to memory of 1440 4984 orzgtdb.exe 107 PID 4984 wrote to memory of 1440 4984 orzgtdb.exe 107 PID 4984 wrote to memory of 1440 4984 orzgtdb.exe 107 PID 1440 wrote to memory of 4300 1440 ymaqbxc.exe 108 PID 1440 wrote to memory of 4300 1440 ymaqbxc.exe 108 PID 1440 wrote to memory of 4300 1440 ymaqbxc.exe 108 PID 4300 wrote to memory of 2044 4300 ldvtkgz.exe 109 PID 4300 wrote to memory of 2044 4300 ldvtkgz.exe 109 PID 4300 wrote to memory of 2044 4300 ldvtkgz.exe 109 PID 2044 wrote to memory of 4400 2044 yqnjpkg.exe 110 PID 2044 wrote to memory of 4400 2044 yqnjpkg.exe 110 PID 2044 wrote to memory of 4400 2044 yqnjpkg.exe 110 PID 4400 wrote to memory of 2180 4400 ddgrjll.exe 112 PID 4400 wrote to memory of 2180 4400 ddgrjll.exe 112 PID 4400 wrote to memory of 2180 4400 ddgrjll.exe 112 PID 2180 wrote to memory of 636 2180 tlsypdo.exe 114 PID 2180 wrote to memory of 636 2180 tlsypdo.exe 114 PID 2180 wrote to memory of 636 2180 tlsypdo.exe 114 PID 636 wrote to memory of 3092 636 ggjovzn.exe 115 PID 636 wrote to memory of 3092 636 ggjovzn.exe 115 PID 636 wrote to memory of 3092 636 ggjovzn.exe 115 PID 3092 wrote to memory of 2140 3092 qbchdto.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbd2eccb228e932cb19f92bd01beede4.exe"C:\Users\Admin\AppData\Local\Temp\cbd2eccb228e932cb19f92bd01beede4.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\exywyhi.exeC:\Windows\system32\exywyhi.exe 1032 "C:\Users\Admin\AppData\Local\Temp\cbd2eccb228e932cb19f92bd01beede4.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\emppbxr.exeC:\Windows\system32\emppbxr.exe 1152 "C:\Windows\SysWOW64\exywyhi.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\mnwhimv.exeC:\Windows\system32\mnwhimv.exe 1156 "C:\Windows\SysWOW64\emppbxr.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\wmamalu.exeC:\Windows\system32\wmamalu.exe 1160 "C:\Windows\SysWOW64\mnwhimv.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\jzscghb.exeC:\Windows\system32\jzscghb.exe 1164 "C:\Windows\SysWOW64\wmamalu.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\tywaqfa.exeC:\Windows\system32\tywaqfa.exe 1048 "C:\Windows\SysWOW64\jzscghb.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\bwjncqg.exeC:\Windows\system32\bwjncqg.exe 1172 "C:\Windows\SysWOW64\tywaqfa.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\ommplyd.exeC:\Windows\system32\ommplyd.exe 1180 "C:\Windows\SysWOW64\bwjncqg.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\bzwfruk.exeC:\Windows\system32\bzwfruk.exe 1176 "C:\Windows\SysWOW64\ommplyd.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\ympnkdp.exeC:\Windows\system32\ympnkdp.exe 1188 "C:\Windows\SysWOW64\bzwfruk.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\ihqxryp.exeC:\Windows\system32\ihqxryp.exe 1192 "C:\Windows\SysWOW64\ympnkdp.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\wuavxco.exeC:\Windows\system32\wuavxco.exe 1196 "C:\Windows\SysWOW64\ihqxryp.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\gqbgfwx.exeC:\Windows\system32\gqbgfwx.exe 1200 "C:\Windows\SysWOW64\wuavxco.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\orzgtdb.exeC:\Windows\system32\orzgtdb.exe 1052 "C:\Windows\SysWOW64\gqbgfwx.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\ymaqbxc.exeC:\Windows\system32\ymaqbxc.exe 1204 "C:\Windows\SysWOW64\orzgtdb.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\ldvtkgz.exeC:\Windows\system32\ldvtkgz.exe 1208 "C:\Windows\SysWOW64\ymaqbxc.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\yqnjpkg.exeC:\Windows\system32\yqnjpkg.exe 1216 "C:\Windows\SysWOW64\ldvtkgz.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\ddgrjll.exeC:\Windows\system32\ddgrjll.exe 1220 "C:\Windows\SysWOW64\yqnjpkg.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\tlsypdo.exeC:\Windows\system32\tlsypdo.exe 1224 "C:\Windows\SysWOW64\ddgrjll.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\ggjovzn.exeC:\Windows\system32\ggjovzn.exe 1228 "C:\Windows\SysWOW64\tlsypdo.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\qbchdto.exeC:\Windows\system32\qbchdto.exe 1056 "C:\Windows\SysWOW64\ggjovzn.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\baoevsv.exeC:\Windows\system32\baoevsv.exe 1236 "C:\Windows\SysWOW64\qbchdto.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2140 -
C:\Windows\SysWOW64\jpcrzcs.exeC:\Windows\system32\jpcrzcs.exe 1244 "C:\Windows\SysWOW64\baoevsv.exe"24⤵
- Executes dropped EXE
PID:1228 -
C:\Windows\SysWOW64\ymkrluc.exeC:\Windows\system32\ymkrluc.exe 1240 "C:\Windows\SysWOW64\jpcrzcs.exe"25⤵
- Executes dropped EXE
PID:4272 -
C:\Windows\SysWOW64\dkhhzwb.exeC:\Windows\system32\dkhhzwb.exe 1248 "C:\Windows\SysWOW64\ymkrluc.exe"26⤵
- Executes dropped EXE
PID:2872 -
C:\Windows\SysWOW64\qfyxfza.exeC:\Windows\system32\qfyxfza.exe 1256 "C:\Windows\SysWOW64\dkhhzwb.exe"27⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\vksfybm.exeC:\Windows\system32\vksfybm.exe 1252 "C:\Windows\SysWOW64\qfyxfza.exe"28⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\dhgscmj.exeC:\Windows\system32\dhgscmj.exe 1028 "C:\Windows\SysWOW64\vksfybm.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4884 -
C:\Windows\SysWOW64\grxhuir.exeC:\Windows\system32\grxhuir.exe 1264 "C:\Windows\SysWOW64\dhgscmj.exe"30⤵
- Executes dropped EXE
PID:4308 -
C:\Windows\SysWOW64\lsnckfx.exeC:\Windows\system32\lsnckfx.exe 1268 "C:\Windows\SysWOW64\grxhuir.exe"31⤵
- Executes dropped EXE
PID:3260 -
C:\Windows\SysWOW64\nsgjtlv.exeC:\Windows\system32\nsgjtlv.exe 1044 "C:\Windows\SysWOW64\lsnckfx.exe"32⤵
- Executes dropped EXE
PID:4424 -
C:\Windows\SysWOW64\gohzbux.exeC:\Windows\system32\gohzbux.exe 1272 "C:\Windows\SysWOW64\nsgjtlv.exe"33⤵
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\lpxcjad.exeC:\Windows\system32\lpxcjad.exe 1260 "C:\Windows\SysWOW64\gohzbux.exe"34⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\iggfqhz.exeC:\Windows\system32\iggfqhz.exe 1284 "C:\Windows\SysWOW64\lpxcjad.exe"35⤵
- Executes dropped EXE
PID:332 -
C:\Windows\SysWOW64\iwoozsq.exeC:\Windows\system32\iwoozsq.exe 1288 "C:\Windows\SysWOW64\iggfqhz.exe"36⤵
- Executes dropped EXE
PID:1388 -
C:\Windows\SysWOW64\lnsxgsa.exeC:\Windows\system32\lnsxgsa.exe 1292 "C:\Windows\SysWOW64\iwoozsq.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1040 -
C:\Windows\SysWOW64\ssccqdl.exeC:\Windows\system32\ssccqdl.exe 1280 "C:\Windows\SysWOW64\lnsxgsa.exe"38⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\qqunied.exeC:\Windows\system32\qqunied.exe 1300 "C:\Windows\SysWOW64\ssccqdl.exe"39⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\vnrvwfc.exeC:\Windows\system32\vnrvwfc.exe 1068 "C:\Windows\SysWOW64\qqunied.exe"40⤵
- Executes dropped EXE
PID:380 -
C:\Windows\SysWOW64\fndtgek.exeC:\Windows\system32\fndtgek.exe 1308 "C:\Windows\SysWOW64\vnrvwfc.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4472 -
C:\Windows\SysWOW64\qiwlozl.exeC:\Windows\system32\qiwlozl.exe 1316 "C:\Windows\SysWOW64\fndtgek.exe"42⤵
- Executes dropped EXE
PID:1628 -
C:\Windows\SysWOW64\aaljapn.exeC:\Windows\system32\aaljapn.exe 1304 "C:\Windows\SysWOW64\qiwlozl.exe"43⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\iewwkap.exeC:\Windows\system32\iewwkap.exe 1320 "C:\Windows\SysWOW64\aaljapn.exe"44⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\smiplxo.exeC:\Windows\system32\smiplxo.exe 1324 "C:\Windows\SysWOW64\iewwkap.exe"45⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\yomlgjp.exeC:\Windows\system32\yomlgjp.exe 1328 "C:\Windows\SysWOW64\smiplxo.exe"46⤵
- Executes dropped EXE
PID:3176 -
C:\Windows\SysWOW64\hrbwtmd.exeC:\Windows\system32\hrbwtmd.exe 1332 "C:\Windows\SysWOW64\yomlgjp.exe"47⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\SysWOW64\snnrajr.exeC:\Windows\system32\snnrajr.exe 1336 "C:\Windows\SysWOW64\hrbwtmd.exe"48⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\xhhicvm.exeC:\Windows\system32\xhhicvm.exe 1340 "C:\Windows\SysWOW64\snnrajr.exe"49⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\cyxlprm.exeC:\Windows\system32\cyxlprm.exe 1344 "C:\Windows\SysWOW64\xhhicvm.exe"50⤵
- Executes dropped EXE
PID:4276 -
C:\Windows\SysWOW64\peccacf.exeC:\Windows\system32\peccacf.exe 1348 "C:\Windows\SysWOW64\cyxlprm.exe"51⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\kdviubh.exeC:\Windows\system32\kdviubh.exe 1312 "C:\Windows\SysWOW64\peccacf.exe"52⤵
- Executes dropped EXE
PID:3272 -
C:\Windows\SysWOW64\uofjsyy.exeC:\Windows\system32\uofjsyy.exe 1356 "C:\Windows\SysWOW64\kdviubh.exe"53⤵
- Executes dropped EXE
PID:5056 -
C:\Windows\SysWOW64\sqbfzlu.exeC:\Windows\system32\sqbfzlu.exe 1352 "C:\Windows\SysWOW64\uofjsyy.exe"54⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\SysWOW64\xvfqrhm.exeC:\Windows\system32\xvfqrhm.exe 1360 "C:\Windows\SysWOW64\sqbfzlu.exe"55⤵
- Executes dropped EXE
PID:4204 -
C:\Windows\SysWOW64\hryizju.exeC:\Windows\system32\hryizju.exe 1364 "C:\Windows\SysWOW64\xvfqrhm.exe"56⤵
- Executes dropped EXE
PID:3248 -
C:\Windows\SysWOW64\jykgjau.exeC:\Windows\system32\jykgjau.exe 1368 "C:\Windows\SysWOW64\hryizju.exe"57⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\utlqzcd.exeC:\Windows\system32\utlqzcd.exe 1372 "C:\Windows\SysWOW64\jykgjau.exe"58⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\bmkqfjz.exeC:\Windows\system32\bmkqfjz.exe 1376 "C:\Windows\SysWOW64\utlqzcd.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4676 -
C:\Windows\SysWOW64\kbydrme.exeC:\Windows\system32\kbydrme.exe 1380 "C:\Windows\SysWOW64\bmkqfjz.exe"60⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\rfirafh.exeC:\Windows\system32\rfirafh.exe 1384 "C:\Windows\SysWOW64\kbydrme.exe"61⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\SysWOW64\cbjbizh.exeC:\Windows\system32\cbjbizh.exe 1388 "C:\Windows\SysWOW64\rfirafh.exe"62⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\mingayp.exeC:\Windows\system32\mingayp.exe 1392 "C:\Windows\SysWOW64\cbjbizh.exe"63⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\wsdefor.exeC:\Windows\system32\wsdefor.exe 1396 "C:\Windows\SysWOW64\mingayp.exe"64⤵
- Executes dropped EXE
PID:5088 -
C:\Windows\SysWOW64\kfuulsq.exeC:\Windows\system32\kfuulsq.exe 1400 "C:\Windows\SysWOW64\wsdefor.exe"65⤵
- Executes dropped EXE
PID:4296 -
C:\Windows\SysWOW64\jgvmffa.exeC:\Windows\system32\jgvmffa.exe 1404 "C:\Windows\SysWOW64\kfuulsq.exe"66⤵PID:3164
-
C:\Windows\SysWOW64\xhbpiea.exeC:\Windows\system32\xhbpiea.exe 1408 "C:\Windows\SysWOW64\jgvmffa.exe"67⤵PID:2224
-
C:\Windows\SysWOW64\kclmoay.exeC:\Windows\system32\kclmoay.exe 1412 "C:\Windows\SysWOW64\xhbpiea.exe"68⤵PID:3648
-
C:\Windows\SysWOW64\ubxkgzy.exeC:\Windows\system32\ubxkgzy.exe 1420 "C:\Windows\SysWOW64\kclmoay.exe"69⤵PID:4692
-
C:\Windows\SysWOW64\eabhryf.exeC:\Windows\system32\eabhryf.exe 1416 "C:\Windows\SysWOW64\ubxkgzy.exe"70⤵PID:1204
-
C:\Windows\SysWOW64\psrnvwh.exeC:\Windows\system32\psrnvwh.exe 1428 "C:\Windows\SysWOW64\eabhryf.exe"71⤵PID:4864
-
C:\Windows\SysWOW64\bmxupam.exeC:\Windows\system32\bmxupam.exe 1072 "C:\Windows\SysWOW64\psrnvwh.exe"72⤵PID:2316
-
C:\Windows\SysWOW64\ohokvek.exeC:\Windows\system32\ohokvek.exe 1432 "C:\Windows\SysWOW64\bmxupam.exe"73⤵PID:1536
-
C:\Windows\SysWOW64\zdpdczt.exeC:\Windows\system32\zdpdczt.exe 1440 "C:\Windows\SysWOW64\ohokvek.exe"74⤵PID:1392
-
C:\Windows\SysWOW64\mmwffyl.exeC:\Windows\system32\mmwffyl.exe 1444 "C:\Windows\SysWOW64\zdpdczt.exe"75⤵PID:1328
-
C:\Windows\SysWOW64\wplqtbz.exeC:\Windows\system32\wplqtbz.exe 1436 "C:\Windows\SysWOW64\mmwffyl.exe"76⤵PID:1448
-
C:\Windows\SysWOW64\jggsbbx.exeC:\Windows\system32\jggsbbx.exe 1452 "C:\Windows\SysWOW64\wplqtbz.exe"77⤵PID:4492
-
C:\Windows\SysWOW64\xpmdebx.exeC:\Windows\system32\xpmdebx.exe 1456 "C:\Windows\SysWOW64\jggsbbx.exe"78⤵PID:4708
-
C:\Windows\SysWOW64\johyvjd.exeC:\Windows\system32\johyvjd.exe 1460 "C:\Windows\SysWOW64\xpmdebx.exe"79⤵PID:3788
-
C:\Windows\SysWOW64\untdfik.exeC:\Windows\system32\untdfik.exe 1448 "C:\Windows\SysWOW64\johyvjd.exe"80⤵PID:4572
-
C:\Windows\SysWOW64\ebxwhuf.exeC:\Windows\system32\ebxwhuf.exe 1464 "C:\Windows\SysWOW64\untdfik.exe"81⤵PID:1456
-
C:\Windows\SysWOW64\rvddtgk.exeC:\Windows\system32\rvddtgk.exe 1468 "C:\Windows\SysWOW64\ebxwhuf.exe"82⤵PID:4900
-
C:\Windows\SysWOW64\wfmyjeq.exeC:\Windows\system32\wfmyjeq.exe 1476 "C:\Windows\SysWOW64\rvddtgk.exe"83⤵PID:3496
-
C:\Windows\SysWOW64\mjutnrm.exeC:\Windows\system32\mjutnrm.exe 1480 "C:\Windows\SysWOW64\wfmyjeq.exe"84⤵PID:4332
-
C:\Windows\SysWOW64\wiyrxqu.exeC:\Windows\system32\wiyrxqu.exe 1484 "C:\Windows\SysWOW64\mjutnrm.exe"85⤵PID:1852
-
C:\Windows\SysWOW64\jvqodlt.exeC:\Windows\system32\jvqodlt.exe 1076 "C:\Windows\SysWOW64\wiyrxqu.exe"86⤵
- Drops file in System32 directory
PID:4032 -
C:\Windows\SysWOW64\rwohsax.exeC:\Windows\system32\rwohsax.exe 1016 "C:\Windows\SysWOW64\jvqodlt.exe"87⤵PID:3172
-
C:\Windows\SysWOW64\crpzzvx.exeC:\Windows\system32\crpzzvx.exe 1492 "C:\Windows\SysWOW64\rwohsax.exe"88⤵PID:2108
-
C:\Windows\SysWOW64\mqtwktf.exeC:\Windows\system32\mqtwktf.exe 1500 "C:\Windows\SysWOW64\crpzzvx.exe"89⤵PID:1884
-
C:\Windows\SysWOW64\zdlmqxe.exeC:\Windows\system32\zdlmqxe.exe 1060 "C:\Windows\SysWOW64\mqtwktf.exe"90⤵PID:2740
-
C:\Windows\SysWOW64\rhzxrho.exeC:\Windows\system32\rhzxrho.exe 1512 "C:\Windows\SysWOW64\zdlmqxe.exe"91⤵
- Drops file in System32 directory
PID:4436 -
C:\Windows\SysWOW64\muinmsr.exeC:\Windows\system32\muinmsr.exe 1516 "C:\Windows\SysWOW64\rhzxrho.exe"92⤵PID:2196
-
C:\Windows\SysWOW64\zhzcswp.exeC:\Windows\system32\zhzcswp.exe 1508 "C:\Windows\SysWOW64\muinmsr.exe"93⤵PID:2088
-
C:\Windows\SysWOW64\hiycgct.exeC:\Windows\system32\hiycgct.exe 1520 "C:\Windows\SysWOW64\zhzcswp.exe"94⤵PID:1424
-
C:\Windows\SysWOW64\wfgclvd.exeC:\Windows\system32\wfgclvd.exe 1524 "C:\Windows\SysWOW64\hiycgct.exe"95⤵PID:808
-
C:\Windows\SysWOW64\bwbfbda.exeC:\Windows\system32\bwbfbda.exe 1504 "C:\Windows\SysWOW64\wfgclvd.exe"96⤵
- Drops file in System32 directory
PID:208 -
C:\Windows\SysWOW64\jhmncjy.exeC:\Windows\system32\jhmncjy.exe 1532 "C:\Windows\SysWOW64\bwbfbda.exe"97⤵PID:60
-
C:\Windows\SysWOW64\wggqlje.exeC:\Windows\system32\wggqlje.exe 1528 "C:\Windows\SysWOW64\jhmncjy.exe"98⤵
- Drops file in System32 directory
PID:4688 -
C:\Windows\SysWOW64\encifgo.exeC:\Windows\system32\encifgo.exe 1536 "C:\Windows\SysWOW64\wggqlje.exe"99⤵PID:4728
-
C:\Windows\SysWOW64\tdnqmqj.exeC:\Windows\system32\tdnqmqj.exe 1088 "C:\Windows\SysWOW64\encifgo.exe"100⤵PID:1988
-
C:\Windows\SysWOW64\guituyp.exeC:\Windows\system32\guituyp.exe 1544 "C:\Windows\SysWOW64\tdnqmqj.exe"101⤵PID:4760
-
C:\Windows\SysWOW64\rmyqzor.exeC:\Windows\system32\rmyqzor.exe 1552 "C:\Windows\SysWOW64\guituyp.exe"102⤵PID:3732
-
C:\Windows\SysWOW64\blkokny.exeC:\Windows\system32\blkokny.exe 1556 "C:\Windows\SysWOW64\rmyqzor.exe"103⤵PID:1080
-
C:\Windows\SysWOW64\ouqynnq.exeC:\Windows\system32\ouqynnq.exe 1560 "C:\Windows\SysWOW64\blkokny.exe"104⤵PID:732
-
C:\Windows\SysWOW64\zuuwfly.exeC:\Windows\system32\zuuwfly.exe 1548 "C:\Windows\SysWOW64\ouqynnq.exe"105⤵PID:1684
-
C:\Windows\SysWOW64\jtytpkf.exeC:\Windows\system32\jtytpkf.exe 1568 "C:\Windows\SysWOW64\zuuwfly.exe"106⤵PID:2280
-
C:\Windows\SysWOW64\woqjvge.exeC:\Windows\system32\woqjvge.exe 1572 "C:\Windows\SysWOW64\jtytpkf.exe"107⤵PID:768
-
C:\Windows\SysWOW64\jbhhbkd.exeC:\Windows\system32\jbhhbkd.exe 1564 "C:\Windows\SysWOW64\woqjvge.exe"108⤵PID:700
-
C:\Windows\SysWOW64\twarjel.exeC:\Windows\system32\twarjel.exe 1576 "C:\Windows\SysWOW64\jbhhbkd.exe"109⤵PID:4756
-
C:\Windows\SysWOW64\gnduzmj.exeC:\Windows\system32\gnduzmj.exe 1584 "C:\Windows\SysWOW64\twarjel.exe"110⤵
- Drops file in System32 directory
PID:2408 -
C:\Windows\SysWOW64\tlywinp.exeC:\Windows\system32\tlywinp.exe 1580 "C:\Windows\SysWOW64\gnduzmj.exe"111⤵PID:2988
-
C:\Windows\SysWOW64\ehzhphp.exeC:\Windows\system32\ehzhphp.exe 1588 "C:\Windows\SysWOW64\tlywinp.exe"112⤵PID:2276
-
C:\Windows\SysWOW64\ruixvlo.exeC:\Windows\system32\ruixvlo.exe 1592 "C:\Windows\SysWOW64\ehzhphp.exe"113⤵PID:4444
-
C:\Windows\SysWOW64\ceycabq.exeC:\Windows\system32\ceycabq.exe 1600 "C:\Windows\SysWOW64\ruixvlo.exe"114⤵PID:3168
-
C:\Windows\SysWOW64\ogeslou.exeC:\Windows\system32\ogeslou.exe 1604 "C:\Windows\SysWOW64\ceycabq.exe"115⤵PID:2124
-
C:\Windows\SysWOW64\yfqpemc.exeC:\Windows\system32\yfqpemc.exe 1608 "C:\Windows\SysWOW64\ogeslou.exe"116⤵
- Drops file in System32 directory
PID:4604 -
C:\Windows\SysWOW64\lsafkqb.exeC:\Windows\system32\lsafkqb.exe 1596 "C:\Windows\SysWOW64\yfqpemc.exe"117⤵PID:1256
-
C:\Windows\SysWOW64\znrupmh.exeC:\Windows\system32\znrupmh.exe 1612 "C:\Windows\SysWOW64\lsafkqb.exe"118⤵PID:3984
-
C:\Windows\SysWOW64\majkvqg.exeC:\Windows\system32\majkvqg.exe 1616 "C:\Windows\SysWOW64\znrupmh.exe"119⤵PID:3180
-
C:\Windows\SysWOW64\wznqgpo.exeC:\Windows\system32\wznqgpo.exe 1624 "C:\Windows\SysWOW64\majkvqg.exe"120⤵PID:3772
-
C:\Windows\SysWOW64\gyrnynn.exeC:\Windows\system32\gyrnynn.exe 1620 "C:\Windows\SysWOW64\wznqgpo.exe"121⤵PID:1232
-
C:\Windows\SysWOW64\tixqbnn.exeC:\Windows\system32\tixqbnn.exe 1628 "C:\Windows\SysWOW64\gyrnynn.exe"122⤵PID:5040
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-