Analysis
-
max time kernel
101s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 12:32
Behavioral task
behavioral1
Sample
8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe
Resource
win7-20240708-en
8 signatures
150 seconds
General
-
Target
8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe
-
Size
133KB
-
MD5
8ec30d64f460f0d80729fe2cbc74160d
-
SHA1
c4b0d00909390d4d4981ef644ba0e9771c64c3e6
-
SHA256
3d83bd98c2c741ddd28642f11f98ce4038442a2aa95a636ab664c82c03b8badc
-
SHA512
faefe185844b575ee4033d35d6a5e0782191ef702bf35650e6913c54ef1a1202ecc77d13d4d0cf25ef5a16d37b268650d5d48a7ef299793ccea3f5ab438d6cf5
-
SSDEEP
3072:T0fubj0EL97H3uZI6t4CQuz6lwt68JmbRPKU:T24D7HeL2I6lwpJmbl
Malware Config
Signatures
-
Modifies security service 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 49 5348 Process not Found -
Executes dropped EXE 64 IoCs
pid Process 1764 lrswns.exe 5044 vqwbyr.exe 4768 izdebq.exe 5088 vqfgjy.exe 4064 idpwpu.exe 4044 skbuzt.exe 964 fbwwqb.exe 220 soomwf.exe 1884 gbxkcb.exe 116 qlmmpe.exe 4640 dyekvi.exe 4588 kcopmt.exe 1984 xpyfsx.exe 4052 lcpcyb.exe 2604 yphsde.exe 1560 iawcrh.exe 1932 vjdfuz.exe 624 iaxich.exe 3036 vnpyil.exe 3704 fyeido.exe 1228 sloyjk.exe 3440 fyfvpo.exe 860 tlxlvs.exe 2828 dgqwcm.exe 2916 qiwloz.exe 804 dvnbbu.exe 2792 qixrhy.exe 3484 atubub.exe 1400 ncbmxb.exe 2272 atvggb.exe 880 ngfemf.exe 4292 pqcphi.exe 3876 dajrki.exe 4372 qqdutq.exe 4784 ddnkym.exe 4460 nokump.exe 2816 abukst.exe 4952 nolzxw.exe 228 xnqxqv.exe 3124 kwwitv.exe 4972 uhlsgq.exe 1260 iudimu.exe 3792 vhmxsx.exe 4364 fdnqzs.exe 952 vtzqgb.exe 3464 cauqaz.exe 3652 pnmggv.exe 2388 fdxonm.exe 4076 nzhtwx.exe 940 aycvfg.exe 3776 kehopr.exe 2380 aydbyf.exe 4808 nlvzej.exe 1580 vmuzlq.exe 4812 kiczxq.exe 4484 xvlodm.exe 3608 cifwww.exe 1088 utspet.exe 1604 fptzmn.exe 1372 vqipnw.exe 4540 fljzur.exe 4188 scecdr.exe 3412 ajzuxo.exe 2912 kfanfj.exe -
resource yara_rule behavioral2/memory/1564-0-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/files/0x000a00000002346c-115.dat upx behavioral2/memory/1564-231-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/1764-344-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/5088-469-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/5044-463-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4768-580-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/5088-694-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4044-702-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4064-813-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4044-927-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/964-1046-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/116-1169-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/220-1163-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4640-1312-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/1884-1282-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/116-1396-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4640-1512-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/1984-1746-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4052-1636-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4588-1632-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4052-1862-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/2604-1978-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/1560-2088-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/1932-2200-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/624-2312-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3036-2424-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3704-2536-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/1228-2652-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3440-2761-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/2828-2988-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/860-2873-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/2792-3103-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/2916-3098-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/804-3211-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/2792-3323-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3484-3435-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/1400-3547-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/2272-3662-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4292-3666-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/880-3773-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3876-3779-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4292-3888-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3876-3998-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4372-4110-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4784-4222-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4460-4334-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/2816-4449-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4952-4563-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/228-4672-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3124-4784-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/1260-4789-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4972-4900-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4364-5017-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/1260-5013-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3792-5128-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4364-5240-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/952-5354-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3652-5357-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3464-5468-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3652-5579-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/2388-5692-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/4076-5806-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral2/memory/3776-5809-0x0000000000400000-0x000000000051C000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\abukst.exe nokump.exe File opened for modification C:\Windows\SysWOW64\xsikwl.exe Process not Found File created C:\Windows\SysWOW64\gdvtdk.exe tfaqvj.exe File opened for modification C:\Windows\SysWOW64\mingay.exe bmmote.exe File created C:\Windows\SysWOW64\uflaaf.exe etlfes.exe File opened for modification C:\Windows\SysWOW64\eljpfe.exe qcdecn.exe File created C:\Windows\SysWOW64\dartva.exe qyldkn.exe File created C:\Windows\SysWOW64\houvcm.exe rnxnjd.exe File opened for modification C:\Windows\SysWOW64\trlytk.exe dfddpx.exe File created C:\Windows\SysWOW64\xlayjr.exe obkovo.exe File opened for modification C:\Windows\SysWOW64\wdkltv.exe mijbma.exe File opened for modification C:\Windows\SysWOW64\skxkyz.exe awgeny.exe File opened for modification C:\Windows\SysWOW64\qsxriv.exe ducwsn.exe File created C:\Windows\SysWOW64\newwxx.exe Process not Found File created C:\Windows\SysWOW64\cjqirt.exe Process not Found File opened for modification C:\Windows\SysWOW64\kajqgp.exe xnzaal.exe File created C:\Windows\SysWOW64\csqcvr.exe pcnzmj.exe File created C:\Windows\SysWOW64\pomocz.exe Process not Found File created C:\Windows\SysWOW64\oehnjg.exe bomkay.exe File created C:\Windows\SysWOW64\kizcar.exe xvhmun.exe File created C:\Windows\SysWOW64\pctscd.exe Process not Found File opened for modification C:\Windows\SysWOW64\ozfugw.exe Process not Found File opened for modification C:\Windows\SysWOW64\upcywv.exe Process not Found File created C:\Windows\SysWOW64\kehopr.exe aycvfg.exe File created C:\Windows\SysWOW64\kfpoei.exe Process not Found File opened for modification C:\Windows\SysWOW64\zolmzm.exe Process not Found File opened for modification C:\Windows\SysWOW64\sokzib.exe ffdwfj.exe File opened for modification C:\Windows\SysWOW64\dthkqw.exe tudmgx.exe File created C:\Windows\SysWOW64\petxoc.exe fjamhh.exe File opened for modification C:\Windows\SysWOW64\rsepyh.exe Process not Found File created C:\Windows\SysWOW64\sqxflj.exe Process not Found File opened for modification C:\Windows\SysWOW64\mvmnrp.exe Process not Found File opened for modification C:\Windows\SysWOW64\ctbsli.exe suxvbj.exe File opened for modification C:\Windows\SysWOW64\mugmbv.exe zzpwwr.exe File created C:\Windows\SysWOW64\ylbduy.exe nqatnw.exe File opened for modification C:\Windows\SysWOW64\ltkdpd.exe elokdn.exe File created C:\Windows\SysWOW64\rmnxaj.exe Process not Found File opened for modification C:\Windows\SysWOW64\ukiyyh.exe Process not Found File created C:\Windows\SysWOW64\lrswns.exe 8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\zdghka.exe mqwkff.exe File created C:\Windows\SysWOW64\xeaitu.exe hssnph.exe File created C:\Windows\SysWOW64\cxduht.exe Process not Found File created C:\Windows\SysWOW64\kbzqbg.exe Process not Found File opened for modification C:\Windows\SysWOW64\gxqjse.exe Process not Found File created C:\Windows\SysWOW64\djatrv.exe qsxriv.exe File created C:\Windows\SysWOW64\abomrw.exe qckpgx.exe File created C:\Windows\SysWOW64\sdolil.exe fqfvch.exe File opened for modification C:\Windows\SysWOW64\mxmrdo.exe zkucxk.exe File created C:\Windows\SysWOW64\pswqyx.exe Process not Found File created C:\Windows\SysWOW64\hekmee.exe uohkww.exe File created C:\Windows\SysWOW64\hzhwgn.exe Process not Found File opened for modification C:\Windows\SysWOW64\jatwpn.exe Process not Found File opened for modification C:\Windows\SysWOW64\kiezbo.exe xjkxsg.exe File created C:\Windows\SysWOW64\ypshra.exe lzxeia.exe File created C:\Windows\SysWOW64\qyldkn.exe dlbnes.exe File created C:\Windows\SysWOW64\saxzlc.exe Process not Found File created C:\Windows\SysWOW64\ykkxdo.exe lxsiys.exe File opened for modification C:\Windows\SysWOW64\vqwbyr.exe lrswns.exe File created C:\Windows\SysWOW64\aydbyf.exe kehopr.exe File opened for modification C:\Windows\SysWOW64\efukfa.exe ottpbu.exe File opened for modification C:\Windows\SysWOW64\lzxeia.exe bdwutf.exe File created C:\Windows\SysWOW64\ixgcty.exe xytejz.exe File created C:\Windows\SysWOW64\umttvu.exe Process not Found File created C:\Windows\SysWOW64\iluryn.exe Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gxaqor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtohei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soomwf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiwloz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sdolil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tqhrmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgqwcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvlodm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wymnkt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfxzen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hzntpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eoomhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqipnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmckrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language viofxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erwqqb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language okbnzu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gqudss.exe -
Runs .reg file with regedit 64 IoCs
pid Process 1728 Process not Found 4736 regedit.exe 1920 regedit.exe 3128 regedit.exe 5432 regedit.exe 4940 Process not Found 640 Process not Found 60 regedit.exe 4416 regedit.exe 5096 regedit.exe 4572 regedit.exe 5368 Process not Found 6468 Process not Found 2416 regedit.exe 2856 regedit.exe 4636 regedit.exe 1492 regedit.exe 4156 regedit.exe 5924 Process not Found 5752 regedit.exe 1156 regedit.exe 6532 Process not Found 2868 regedit.exe 1408 regedit.exe 5328 regedit.exe 3700 Process not Found 3504 Process not Found 4272 regedit.exe 2856 regedit.exe 5236 Process not Found 5884 Process not Found 5740 Process not Found 5576 Process not Found 6760 Process not Found 384 regedit.exe 2128 regedit.exe 6108 regedit.exe 2936 Process not Found 6744 Process not Found 5576 Process not Found 2020 Process not Found 1148 Process not Found 6452 Process not Found 5204 regedit.exe 1492 regedit.exe 2824 regedit.exe 5784 Process not Found 2136 Process not Found 6448 Process not Found 392 regedit.exe 4680 Process not Found 3096 regedit.exe 4028 regedit.exe 2936 regedit.exe 5728 regedit.exe 1920 regedit.exe 5344 regedit.exe 5380 Process not Found 6448 Process not Found 3316 regedit.exe 4536 Process not Found 5060 Process not Found 2240 regedit.exe 5860 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2520 1564 8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe 84 PID 1564 wrote to memory of 2520 1564 8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe 84 PID 1564 wrote to memory of 2520 1564 8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe 84 PID 2520 wrote to memory of 4928 2520 cmd.exe 86 PID 2520 wrote to memory of 4928 2520 cmd.exe 86 PID 2520 wrote to memory of 4928 2520 cmd.exe 86 PID 1564 wrote to memory of 1764 1564 8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe 88 PID 1564 wrote to memory of 1764 1564 8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe 88 PID 1564 wrote to memory of 1764 1564 8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe 88 PID 1764 wrote to memory of 4852 1764 lrswns.exe 89 PID 1764 wrote to memory of 4852 1764 lrswns.exe 89 PID 1764 wrote to memory of 4852 1764 lrswns.exe 89 PID 4852 wrote to memory of 4840 4852 cmd.exe 91 PID 4852 wrote to memory of 4840 4852 cmd.exe 91 PID 4852 wrote to memory of 4840 4852 cmd.exe 91 PID 1764 wrote to memory of 5044 1764 lrswns.exe 92 PID 1764 wrote to memory of 5044 1764 lrswns.exe 92 PID 1764 wrote to memory of 5044 1764 lrswns.exe 92 PID 5044 wrote to memory of 464 5044 vqwbyr.exe 93 PID 5044 wrote to memory of 464 5044 vqwbyr.exe 93 PID 5044 wrote to memory of 464 5044 vqwbyr.exe 93 PID 464 wrote to memory of 3848 464 cmd.exe 94 PID 464 wrote to memory of 3848 464 cmd.exe 94 PID 464 wrote to memory of 3848 464 cmd.exe 94 PID 5044 wrote to memory of 4768 5044 vqwbyr.exe 95 PID 5044 wrote to memory of 4768 5044 vqwbyr.exe 95 PID 5044 wrote to memory of 4768 5044 vqwbyr.exe 95 PID 4768 wrote to memory of 3652 4768 izdebq.exe 233 PID 4768 wrote to memory of 3652 4768 izdebq.exe 233 PID 4768 wrote to memory of 3652 4768 izdebq.exe 233 PID 3652 wrote to memory of 3036 3652 cmd.exe 147 PID 3652 wrote to memory of 3036 3652 cmd.exe 147 PID 3652 wrote to memory of 3036 3652 cmd.exe 147 PID 4768 wrote to memory of 5088 4768 izdebq.exe 98 PID 4768 wrote to memory of 5088 4768 izdebq.exe 98 PID 4768 wrote to memory of 5088 4768 izdebq.exe 98 PID 5088 wrote to memory of 2180 5088 vqfgjy.exe 99 PID 5088 wrote to memory of 2180 5088 vqfgjy.exe 99 PID 5088 wrote to memory of 2180 5088 vqfgjy.exe 99 PID 2180 wrote to memory of 3820 2180 cmd.exe 100 PID 2180 wrote to memory of 3820 2180 cmd.exe 100 PID 2180 wrote to memory of 3820 2180 cmd.exe 100 PID 5088 wrote to memory of 4064 5088 vqfgjy.exe 101 PID 5088 wrote to memory of 4064 5088 vqfgjy.exe 101 PID 5088 wrote to memory of 4064 5088 vqfgjy.exe 101 PID 4064 wrote to memory of 2156 4064 idpwpu.exe 102 PID 4064 wrote to memory of 2156 4064 idpwpu.exe 102 PID 4064 wrote to memory of 2156 4064 idpwpu.exe 102 PID 2156 wrote to memory of 2416 2156 cmd.exe 103 PID 2156 wrote to memory of 2416 2156 cmd.exe 103 PID 2156 wrote to memory of 2416 2156 cmd.exe 103 PID 4064 wrote to memory of 4044 4064 idpwpu.exe 104 PID 4064 wrote to memory of 4044 4064 idpwpu.exe 104 PID 4064 wrote to memory of 4044 4064 idpwpu.exe 104 PID 4044 wrote to memory of 1192 4044 skbuzt.exe 105 PID 4044 wrote to memory of 1192 4044 skbuzt.exe 105 PID 4044 wrote to memory of 1192 4044 skbuzt.exe 105 PID 1192 wrote to memory of 4920 1192 cmd.exe 106 PID 1192 wrote to memory of 4920 1192 cmd.exe 106 PID 1192 wrote to memory of 4920 1192 cmd.exe 106 PID 4044 wrote to memory of 964 4044 skbuzt.exe 107 PID 4044 wrote to memory of 964 4044 skbuzt.exe 107 PID 4044 wrote to memory of 964 4044 skbuzt.exe 107 PID 964 wrote to memory of 3956 964 fbwwqb.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵PID:4928
-
-
-
C:\Windows\SysWOW64\lrswns.exeC:\Windows\system32\lrswns.exe 1204 "C:\Users\Admin\AppData\Local\Temp\8ec30d64f460f0d80729fe2cbc74160d_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵PID:4840
-
-
-
C:\Windows\SysWOW64\vqwbyr.exeC:\Windows\system32\vqwbyr.exe 1168 "C:\Windows\SysWOW64\lrswns.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat4⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵PID:3848
-
-
-
C:\Windows\SysWOW64\izdebq.exeC:\Windows\system32\izdebq.exe 1172 "C:\Windows\SysWOW64\vqwbyr.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat5⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵PID:3036
-
-
-
C:\Windows\SysWOW64\vqfgjy.exeC:\Windows\system32\vqfgjy.exe 1176 "C:\Windows\SysWOW64\izdebq.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat6⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵PID:3820
-
-
-
C:\Windows\SysWOW64\idpwpu.exeC:\Windows\system32\idpwpu.exe 1180 "C:\Windows\SysWOW64\vqfgjy.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat7⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- Runs .reg file with regedit
PID:2416
-
-
-
C:\Windows\SysWOW64\skbuzt.exeC:\Windows\system32\skbuzt.exe 1164 "C:\Windows\SysWOW64\idpwpu.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat8⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵PID:4920
-
-
-
C:\Windows\SysWOW64\fbwwqb.exeC:\Windows\system32\fbwwqb.exe 1184 "C:\Windows\SysWOW64\skbuzt.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat9⤵PID:3956
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵PID:1712
-
-
-
C:\Windows\SysWOW64\soomwf.exeC:\Windows\system32\soomwf.exe 1192 "C:\Windows\SysWOW64\fbwwqb.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat10⤵PID:5000
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵PID:3296
-
-
-
C:\Windows\SysWOW64\gbxkcb.exeC:\Windows\system32\gbxkcb.exe 1196 "C:\Windows\SysWOW64\soomwf.exe"10⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat11⤵PID:5064
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵PID:3368
-
-
-
C:\Windows\SysWOW64\qlmmpe.exeC:\Windows\system32\qlmmpe.exe 1200 "C:\Windows\SysWOW64\gbxkcb.exe"11⤵
- Executes dropped EXE
PID:116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat12⤵PID:1744
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵PID:3096
-
-
-
C:\Windows\SysWOW64\dyekvi.exeC:\Windows\system32\dyekvi.exe 1188 "C:\Windows\SysWOW64\qlmmpe.exe"12⤵
- Executes dropped EXE
PID:4640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat13⤵PID:1400
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg14⤵PID:3112
-
-
-
C:\Windows\SysWOW64\kcopmt.exeC:\Windows\system32\kcopmt.exe 1208 "C:\Windows\SysWOW64\dyekvi.exe"13⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat14⤵PID:1660
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg15⤵
- Runs .reg file with regedit
PID:4736
-
-
-
C:\Windows\SysWOW64\xpyfsx.exeC:\Windows\system32\xpyfsx.exe 1212 "C:\Windows\SysWOW64\kcopmt.exe"14⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat15⤵PID:1060
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg16⤵PID:2016
-
-
-
C:\Windows\SysWOW64\lcpcyb.exeC:\Windows\system32\lcpcyb.exe 1220 "C:\Windows\SysWOW64\xpyfsx.exe"15⤵
- Executes dropped EXE
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat16⤵PID:1668
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg17⤵PID:3920
-
-
-
C:\Windows\SysWOW64\yphsde.exeC:\Windows\system32\yphsde.exe 1216 "C:\Windows\SysWOW64\lcpcyb.exe"16⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat17⤵PID:3260
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg18⤵PID:864
-
-
-
C:\Windows\SysWOW64\iawcrh.exeC:\Windows\system32\iawcrh.exe 1228 "C:\Windows\SysWOW64\yphsde.exe"17⤵
- Executes dropped EXE
PID:1560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat18⤵PID:2908
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg19⤵PID:2432
-
-
-
C:\Windows\SysWOW64\vjdfuz.exeC:\Windows\system32\vjdfuz.exe 1232 "C:\Windows\SysWOW64\iawcrh.exe"18⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat19⤵PID:852
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg20⤵PID:4372
-
-
-
C:\Windows\SysWOW64\iaxich.exeC:\Windows\system32\iaxich.exe 1224 "C:\Windows\SysWOW64\vjdfuz.exe"19⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat20⤵PID:5104
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg21⤵PID:3208
-
-
-
C:\Windows\SysWOW64\vnpyil.exeC:\Windows\system32\vnpyil.exe 1236 "C:\Windows\SysWOW64\iaxich.exe"20⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat21⤵PID:2400
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg22⤵
- Runs .reg file with regedit
PID:1920
-
-
-
C:\Windows\SysWOW64\fyeido.exeC:\Windows\system32\fyeido.exe 1240 "C:\Windows\SysWOW64\vnpyil.exe"21⤵
- Executes dropped EXE
PID:3704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat22⤵PID:2448
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg23⤵
- Runs .reg file with regedit
PID:384
-
-
-
C:\Windows\SysWOW64\sloyjk.exeC:\Windows\system32\sloyjk.exe 1248 "C:\Windows\SysWOW64\fyeido.exe"22⤵
- Executes dropped EXE
PID:1228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat23⤵PID:3928
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg24⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
-
C:\Windows\SysWOW64\fyfvpo.exeC:\Windows\system32\fyfvpo.exe 1252 "C:\Windows\SysWOW64\sloyjk.exe"23⤵
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat24⤵PID:4668
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg25⤵PID:2404
-
-
-
C:\Windows\SysWOW64\tlxlvs.exeC:\Windows\system32\tlxlvs.exe 1244 "C:\Windows\SysWOW64\fyfvpo.exe"24⤵
- Executes dropped EXE
PID:860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat25⤵PID:3560
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg26⤵PID:760
-
-
-
C:\Windows\SysWOW64\dgqwcm.exeC:\Windows\system32\dgqwcm.exe 1260 "C:\Windows\SysWOW64\tlxlvs.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat26⤵PID:3920
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg27⤵
- Modifies security service
PID:2428
-
-
-
C:\Windows\SysWOW64\qiwloz.exeC:\Windows\system32\qiwloz.exe 1256 "C:\Windows\SysWOW64\dgqwcm.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat27⤵PID:2912
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg28⤵PID:1232
-
-
-
C:\Windows\SysWOW64\dvnbbu.exeC:\Windows\system32\dvnbbu.exe 1268 "C:\Windows\SysWOW64\qiwloz.exe"27⤵
- Executes dropped EXE
PID:804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat28⤵PID:1672
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg29⤵PID:1704
-
-
-
C:\Windows\SysWOW64\qixrhy.exeC:\Windows\system32\qixrhy.exe 1264 "C:\Windows\SysWOW64\dvnbbu.exe"28⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat29⤵PID:3936
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg30⤵PID:884
-
-
-
C:\Windows\SysWOW64\atubub.exeC:\Windows\system32\atubub.exe 1276 "C:\Windows\SysWOW64\qixrhy.exe"29⤵
- Executes dropped EXE
PID:3484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat30⤵PID:3112
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg31⤵PID:1096
-
-
-
C:\Windows\SysWOW64\ncbmxb.exeC:\Windows\system32\ncbmxb.exe 1280 "C:\Windows\SysWOW64\atubub.exe"30⤵
- Executes dropped EXE
PID:1400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat31⤵PID:5064
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg32⤵PID:376
-
-
-
C:\Windows\SysWOW64\atvggb.exeC:\Windows\system32\atvggb.exe 1272 "C:\Windows\SysWOW64\ncbmxb.exe"31⤵
- Executes dropped EXE
PID:2272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat32⤵PID:3888
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg33⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
C:\Windows\SysWOW64\ngfemf.exeC:\Windows\system32\ngfemf.exe 1284 "C:\Windows\SysWOW64\atvggb.exe"32⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat33⤵PID:4368
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg34⤵PID:2884
-
-
-
C:\Windows\SysWOW64\pqcphi.exeC:\Windows\system32\pqcphi.exe 1288 "C:\Windows\SysWOW64\ngfemf.exe"33⤵
- Executes dropped EXE
PID:4292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat34⤵PID:3528
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg35⤵PID:524
-
-
-
C:\Windows\SysWOW64\dajrki.exeC:\Windows\system32\dajrki.exe 1292 "C:\Windows\SysWOW64\pqcphi.exe"34⤵
- Executes dropped EXE
PID:3876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat35⤵PID:2620
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg36⤵PID:4516
-
-
-
C:\Windows\SysWOW64\qqdutq.exeC:\Windows\system32\qqdutq.exe 1296 "C:\Windows\SysWOW64\dajrki.exe"35⤵
- Executes dropped EXE
PID:4372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat36⤵PID:264
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg37⤵PID:4212
-
-
-
C:\Windows\SysWOW64\ddnkym.exeC:\Windows\system32\ddnkym.exe 1300 "C:\Windows\SysWOW64\qqdutq.exe"36⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat37⤵PID:4236
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg38⤵PID:4196
-
-
-
C:\Windows\SysWOW64\nokump.exeC:\Windows\system32\nokump.exe 1308 "C:\Windows\SysWOW64\ddnkym.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat38⤵PID:4912
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg39⤵PID:3616
-
-
-
C:\Windows\SysWOW64\abukst.exeC:\Windows\system32\abukst.exe 1312 "C:\Windows\SysWOW64\nokump.exe"38⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat39⤵PID:4632
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg40⤵PID:460
-
-
-
C:\Windows\SysWOW64\nolzxw.exeC:\Windows\system32\nolzxw.exe 1304 "C:\Windows\SysWOW64\abukst.exe"39⤵
- Executes dropped EXE
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat40⤵PID:2616
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg41⤵
- Modifies security service
PID:2112
-
-
-
C:\Windows\SysWOW64\xnqxqv.exeC:\Windows\system32\xnqxqv.exe 1316 "C:\Windows\SysWOW64\nolzxw.exe"40⤵
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat41⤵PID:4412
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg42⤵
- System Location Discovery: System Language Discovery
PID:3660
-
-
-
C:\Windows\SysWOW64\kwwitv.exeC:\Windows\system32\kwwitv.exe 1320 "C:\Windows\SysWOW64\xnqxqv.exe"41⤵
- Executes dropped EXE
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat42⤵PID:940
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg43⤵PID:408
-
-
-
C:\Windows\SysWOW64\uhlsgq.exeC:\Windows\system32\uhlsgq.exe 1328 "C:\Windows\SysWOW64\kwwitv.exe"42⤵
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat43⤵PID:2820
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg44⤵PID:5040
-
-
-
C:\Windows\SysWOW64\iudimu.exeC:\Windows\system32\iudimu.exe 1332 "C:\Windows\SysWOW64\uhlsgq.exe"43⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat44⤵PID:2168
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg45⤵PID:5000
-
-
-
C:\Windows\SysWOW64\vhmxsx.exeC:\Windows\system32\vhmxsx.exe 1336 "C:\Windows\SysWOW64\iudimu.exe"44⤵
- Executes dropped EXE
PID:3792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat45⤵PID:4016
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg46⤵PID:1532
-
-
-
C:\Windows\SysWOW64\fdnqzs.exeC:\Windows\system32\fdnqzs.exe 1340 "C:\Windows\SysWOW64\vhmxsx.exe"45⤵
- Executes dropped EXE
PID:4364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat46⤵PID:1060
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg47⤵PID:2000
-
-
-
C:\Windows\SysWOW64\vtzqgb.exeC:\Windows\system32\vtzqgb.exe 1324 "C:\Windows\SysWOW64\fdnqzs.exe"46⤵
- Executes dropped EXE
PID:952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat47⤵PID:3944
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg48⤵PID:4700
-
-
-
C:\Windows\SysWOW64\cauqaz.exeC:\Windows\system32\cauqaz.exe 1344 "C:\Windows\SysWOW64\vtzqgb.exe"47⤵
- Executes dropped EXE
PID:3464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat48⤵PID:976
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg49⤵PID:4420
-
-
-
C:\Windows\SysWOW64\pnmggv.exeC:\Windows\system32\pnmggv.exe 1352 "C:\Windows\SysWOW64\cauqaz.exe"48⤵
- Executes dropped EXE
PID:3652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat49⤵PID:2896
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg50⤵PID:4272
-
-
-
C:\Windows\SysWOW64\fdxonm.exeC:\Windows\system32\fdxonm.exe 1348 "C:\Windows\SysWOW64\pnmggv.exe"49⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat50⤵PID:1060
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg51⤵PID:3776
-
-
-
C:\Windows\SysWOW64\nzhtwx.exeC:\Windows\system32\nzhtwx.exe 1360 "C:\Windows\SysWOW64\fdxonm.exe"50⤵
- Executes dropped EXE
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat51⤵PID:1204
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg52⤵PID:464
-
-
-
C:\Windows\SysWOW64\aycvfg.exeC:\Windows\system32\aycvfg.exe 1364 "C:\Windows\SysWOW64\nzhtwx.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat52⤵PID:1580
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg53⤵PID:2556
-
-
-
C:\Windows\SysWOW64\kehopr.exeC:\Windows\system32\kehopr.exe 1356 "C:\Windows\SysWOW64\aycvfg.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat53⤵PID:2896
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg54⤵PID:1724
-
-
-
C:\Windows\SysWOW64\aydbyf.exeC:\Windows\system32\aydbyf.exe 1372 "C:\Windows\SysWOW64\kehopr.exe"53⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat54⤵PID:4484
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg55⤵PID:3968
-
-
-
C:\Windows\SysWOW64\nlvzej.exeC:\Windows\system32\nlvzej.exe 1376 "C:\Windows\SysWOW64\aydbyf.exe"54⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat55⤵PID:3848
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg56⤵PID:1724
-
-
-
C:\Windows\SysWOW64\vmuzlq.exeC:\Windows\system32\vmuzlq.exe 1380 "C:\Windows\SysWOW64\nlvzej.exe"55⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat56⤵PID:2400
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg57⤵PID:4412
-
-
-
C:\Windows\SysWOW64\kiczxq.exeC:\Windows\system32\kiczxq.exe 1384 "C:\Windows\SysWOW64\vmuzlq.exe"56⤵
- Executes dropped EXE
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat57⤵PID:3944
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg58⤵PID:1284
-
-
-
C:\Windows\SysWOW64\xvlodm.exeC:\Windows\system32\xvlodm.exe 1388 "C:\Windows\SysWOW64\kiczxq.exe"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat58⤵PID:4564
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg59⤵PID:4996
-
-
-
C:\Windows\SysWOW64\cifwww.exeC:\Windows\system32\cifwww.exe 1392 "C:\Windows\SysWOW64\xvlodm.exe"58⤵
- Executes dropped EXE
PID:3608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat59⤵PID:4440
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg60⤵PID:3968
-
-
-
C:\Windows\SysWOW64\utspet.exeC:\Windows\system32\utspet.exe 1396 "C:\Windows\SysWOW64\cifwww.exe"59⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat60⤵PID:1896
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg61⤵
- Modifies security service
PID:976
-
-
-
C:\Windows\SysWOW64\fptzmn.exeC:\Windows\system32\fptzmn.exe 1368 "C:\Windows\SysWOW64\utspet.exe"60⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat61⤵PID:2964
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg62⤵
- Modifies security service
PID:2160
-
-
-
C:\Windows\SysWOW64\vqipnw.exeC:\Windows\system32\vqipnw.exe 1400 "C:\Windows\SysWOW64\fptzmn.exe"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat62⤵PID:5064
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg63⤵PID:2300
-
-
-
C:\Windows\SysWOW64\fljzur.exeC:\Windows\system32\fljzur.exe 1408 "C:\Windows\SysWOW64\vqipnw.exe"62⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat63⤵PID:3368
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg64⤵PID:2404
-
-
-
C:\Windows\SysWOW64\scecdr.exeC:\Windows\system32\scecdr.exe 1404 "C:\Windows\SysWOW64\fljzur.exe"63⤵
- Executes dropped EXE
PID:4188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat64⤵PID:2656
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg65⤵
- Modifies security service
PID:3456
-
-
-
C:\Windows\SysWOW64\ajzuxo.exeC:\Windows\system32\ajzuxo.exe 1416 "C:\Windows\SysWOW64\scecdr.exe"64⤵
- Executes dropped EXE
PID:3412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat65⤵PID:4088
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg66⤵PID:4776
-
-
-
C:\Windows\SysWOW64\kfanfj.exeC:\Windows\system32\kfanfj.exe 1412 "C:\Windows\SysWOW64\ajzuxo.exe"65⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat66⤵PID:2780
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg67⤵PID:2796
-
-
-
C:\Windows\SysWOW64\xskclf.exeC:\Windows\system32\xskclf.exe 1424 "C:\Windows\SysWOW64\kfanfj.exe"66⤵PID:2584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat67⤵PID:3120
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg68⤵PID:4984
-
-
-
C:\Windows\SysWOW64\kqmftn.exeC:\Windows\system32\kqmftn.exe 1420 "C:\Windows\SysWOW64\xskclf.exe"67⤵PID:1664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat68⤵PID:4884
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg69⤵PID:1108
-
-
-
C:\Windows\SysWOW64\xaliwm.exeC:\Windows\system32\xaliwm.exe 1432 "C:\Windows\SysWOW64\kqmftn.exe"68⤵PID:2132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat69⤵PID:5116
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg70⤵PID:4448
-
-
-
C:\Windows\SysWOW64\izxfhl.exeC:\Windows\system32\izxfhl.exe 1436 "C:\Windows\SysWOW64\xaliwm.exe"69⤵PID:1472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat70⤵PID:4660
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg71⤵PID:1352
-
-
-
C:\Windows\SysWOW64\ubdvap.exeC:\Windows\system32\ubdvap.exe 1428 "C:\Windows\SysWOW64\izxfhl.exe"70⤵PID:3588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat71⤵PID:4240
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg72⤵PID:1204
-
-
-
C:\Windows\SysWOW64\houlgt.exeC:\Windows\system32\houlgt.exe 1440 "C:\Windows\SysWOW64\ubdvap.exe"71⤵PID:2112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat72⤵
- System Location Discovery: System Language Discovery
PID:3368 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg73⤵
- System Location Discovery: System Language Discovery
PID:4196
-
-
-
C:\Windows\SysWOW64\uepnoc.exeC:\Windows\system32\uepnoc.exe 1448 "C:\Windows\SysWOW64\houlgt.exe"72⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat73⤵PID:1076
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg74⤵PID:536
-
-
-
C:\Windows\SysWOW64\iowyrb.exeC:\Windows\system32\iowyrb.exe 1452 "C:\Windows\SysWOW64\uepnoc.exe"73⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat74⤵PID:1712
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg75⤵PID:720
-
-
-
C:\Windows\SysWOW64\snavca.exeC:\Windows\system32\snavca.exe 1456 "C:\Windows\SysWOW64\iowyrb.exe"74⤵PID:1532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat75⤵PID:2136
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg76⤵PID:992
-
-
-
C:\Windows\SysWOW64\iziqgf.exeC:\Windows\system32\iziqgf.exe 1460 "C:\Windows\SysWOW64\snavca.exe"75⤵PID:1060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat76⤵PID:856
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg77⤵PID:3336
-
-
-
C:\Windows\SysWOW64\svbbna.exeC:\Windows\system32\svbbna.exe 1464 "C:\Windows\SysWOW64\iziqgf.exe"76⤵PID:4984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat77⤵PID:3764
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg78⤵
- Runs .reg file with regedit
PID:2856
-
-
-
C:\Windows\SysWOW64\fphqzm.exeC:\Windows\system32\fphqzm.exe 1468 "C:\Windows\SysWOW64\svbbna.exe"77⤵PID:2404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat78⤵PID:2288
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg79⤵PID:2300
-
-
-
C:\Windows\SysWOW64\ihwomc.exeC:\Windows\system32\ihwomc.exe 1444 "C:\Windows\SysWOW64\fphqzm.exe"78⤵PID:4256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat79⤵PID:1156
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg80⤵PID:2100
-
-
-
C:\Windows\SysWOW64\ugzruk.exeC:\Windows\system32\ugzruk.exe 1476 "C:\Windows\SysWOW64\ihwomc.exe"79⤵PID:2776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat80⤵PID:3928
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg81⤵PID:2972
-
-
-
C:\Windows\SysWOW64\ffdwfj.exeC:\Windows\system32\ffdwfj.exe 1480 "C:\Windows\SysWOW64\ugzruk.exe"80⤵
- Drops file in System32 directory
PID:4432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat81⤵PID:2896
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg82⤵PID:460
-
-
-
C:\Windows\SysWOW64\sokzib.exeC:\Windows\system32\sokzib.exe 1472 "C:\Windows\SysWOW64\ffdwfj.exe"81⤵PID:1392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat82⤵
- System Location Discovery: System Language Discovery
PID:3620
-
-
C:\Windows\SysWOW64\higmrw.exeC:\Windows\system32\higmrw.exe 1488 "C:\Windows\SysWOW64\sokzib.exe"82⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat83⤵PID:2656
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg84⤵PID:2948
-
-
-
C:\Windows\SysWOW64\vvyjxs.exeC:\Windows\system32\vvyjxs.exe 1484 "C:\Windows\SysWOW64\higmrw.exe"83⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat84⤵PID:2344
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg85⤵PID:4572
-
-
-
C:\Windows\SysWOW64\awgeny.exeC:\Windows\system32\awgeny.exe 1492 "C:\Windows\SysWOW64\vvyjxs.exe"84⤵
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat85⤵
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg86⤵PID:5028
-
-
-
C:\Windows\SysWOW64\skxkyz.exeC:\Windows\system32\skxkyz.exe 1500 "C:\Windows\SysWOW64\awgeny.exe"85⤵PID:4496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat86⤵PID:2288
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg87⤵PID:4192
-
-
-
C:\Windows\SysWOW64\fjamhh.exeC:\Windows\system32\fjamhh.exe 1504 "C:\Windows\SysWOW64\skxkyz.exe"86⤵
- Drops file in System32 directory
PID:2000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat87⤵PID:4396
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg88⤵
- Modifies security service
PID:4680
-
-
-
C:\Windows\SysWOW64\petxoc.exeC:\Windows\system32\petxoc.exe 1496 "C:\Windows\SysWOW64\fjamhh.exe"87⤵PID:2016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat88⤵PID:4720
-
-
C:\Windows\SysWOW64\cvvzxk.exeC:\Windows\system32\cvvzxk.exe 1508 "C:\Windows\SysWOW64\petxoc.exe"88⤵PID:2620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat89⤵PID:4880
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg90⤵PID:2448
-
-
-
C:\Windows\SysWOW64\mqwkff.exeC:\Windows\system32\mqwkff.exe 1512 "C:\Windows\SysWOW64\cvvzxk.exe"89⤵
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat90⤵PID:1016
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg91⤵PID:3640
-
-
-
C:\Windows\SysWOW64\zdghka.exeC:\Windows\system32\zdghka.exe 1520 "C:\Windows\SysWOW64\mqwkff.exe"90⤵PID:2848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat91⤵PID:3968
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg92⤵PID:628
-
-
-
C:\Windows\SysWOW64\hefazp.exeC:\Windows\system32\hefazp.exe 1516 "C:\Windows\SysWOW64\zdghka.exe"91⤵PID:1352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat92⤵PID:544
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg93⤵PID:552
-
-
-
C:\Windows\SysWOW64\zsdfkr.exeC:\Windows\system32\zsdfkr.exe 1524 "C:\Windows\SysWOW64\hefazp.exe"92⤵PID:3452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat93⤵PID:3660
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg94⤵PID:1896
-
-
-
C:\Windows\SysWOW64\kowxrl.exeC:\Windows\system32\kowxrl.exe 1532 "C:\Windows\SysWOW64\zsdfkr.exe"93⤵PID:4700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat94⤵PID:756
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg95⤵PID:3936
-
-
-
C:\Windows\SysWOW64\xnzaal.exeC:\Windows\system32\xnzaal.exe 1536 "C:\Windows\SysWOW64\kowxrl.exe"94⤵
- Drops file in System32 directory
PID:3960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat95⤵PID:4264
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg96⤵
- Runs .reg file with regedit
PID:60
-
-
-
C:\Windows\SysWOW64\kajqgp.exeC:\Windows\system32\kajqgp.exe 1540 "C:\Windows\SysWOW64\xnzaal.exe"95⤵PID:2344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat96⤵PID:2824
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg97⤵PID:864
-
-
-
C:\Windows\SysWOW64\aerlkc.exeC:\Windows\system32\aerlkc.exe 1544 "C:\Windows\SysWOW64\kajqgp.exe"96⤵PID:4840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat97⤵PID:2968
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg98⤵
- Modifies security service
PID:3516
-
-
-
C:\Windows\SysWOW64\hmedes.exeC:\Windows\system32\hmedes.exe 1548 "C:\Windows\SysWOW64\aerlkc.exe"97⤵PID:4664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat98⤵PID:3824
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg99⤵
- Modifies security service
- Runs .reg file with regedit
PID:2868
-
-
-
C:\Windows\SysWOW64\xynyax.exeC:\Windows\system32\xynyax.exe 1528 "C:\Windows\SysWOW64\hmedes.exe"98⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat99⤵PID:2128
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg100⤵PID:4844
-
-
-
C:\Windows\SysWOW64\klengb.exeC:\Windows\system32\klengb.exe 1556 "C:\Windows\SysWOW64\xynyax.exe"99⤵PID:3860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat100⤵PID:1284
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg101⤵PID:712
-
-
-
C:\Windows\SysWOW64\uotybe.exeC:\Windows\system32\uotybe.exe 1560 "C:\Windows\SysWOW64\klengb.exe"100⤵PID:2904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat101⤵PID:1724
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg102⤵PID:1528
-
-
-
C:\Windows\SysWOW64\hbdohi.exeC:\Windows\system32\hbdohi.exe 1564 "C:\Windows\SysWOW64\uotybe.exe"101⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat102⤵PID:4800
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg103⤵PID:3268
-
-
-
C:\Windows\SysWOW64\uwvlme.exeC:\Windows\system32\uwvlme.exe 1568 "C:\Windows\SysWOW64\hbdohi.exe"102⤵PID:4344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat103⤵PID:376
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg104⤵
- Runs .reg file with regedit
PID:4272
-
-
-
C:\Windows\SysWOW64\hmpovm.exeC:\Windows\system32\hmpovm.exe 1572 "C:\Windows\SysWOW64\uwvlme.exe"103⤵PID:4440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat104⤵PID:1944
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg105⤵
- Runs .reg file with regedit
PID:2856
-
-
-
C:\Windows\SysWOW64\uzhebq.exeC:\Windows\system32\uzhebq.exe 1576 "C:\Windows\SysWOW64\hmpovm.exe"104⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat105⤵PID:2884
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg106⤵PID:1920
-
-
-
C:\Windows\SysWOW64\fylblo.exeC:\Windows\system32\fylblo.exe 1580 "C:\Windows\SysWOW64\uzhebq.exe"105⤵PID:4720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat106⤵PID:4412
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg107⤵
- Runs .reg file with regedit
PID:3096
-
-
-
C:\Windows\SysWOW64\pfxzen.exeC:\Windows\system32\pfxzen.exe 1552 "C:\Windows\SysWOW64\fylblo.exe"106⤵
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat107⤵PID:3848
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg108⤵PID:4196
-
-
-
C:\Windows\SysWOW64\cpdbhn.exeC:\Windows\system32\cpdbhn.exe 1584 "C:\Windows\SysWOW64\pfxzen.exe"107⤵PID:3932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat108⤵PID:1076
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg109⤵
- System Location Discovery: System Language Discovery
PID:3208
-
-
-
C:\Windows\SysWOW64\pcnzmj.exeC:\Windows\system32\pcnzmj.exe 1588 "C:\Windows\SysWOW64\cpdbhn.exe"108⤵
- Drops file in System32 directory
PID:3620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat109⤵PID:2788
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg110⤵PID:2644
-
-
-
C:\Windows\SysWOW64\csqcvr.exeC:\Windows\system32\csqcvr.exe 1596 "C:\Windows\SysWOW64\pcnzmj.exe"109⤵PID:3096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat110⤵PID:60
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg111⤵
- System Location Discovery: System Language Discovery
PID:3416
-
-
-
C:\Windows\SysWOW64\mdfmiu.exeC:\Windows\system32\mdfmiu.exe 1600 "C:\Windows\SysWOW64\csqcvr.exe"110⤵PID:1672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat111⤵PID:3296
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg112⤵PID:2156
-
-
-
C:\Windows\SysWOW64\xjkxsg.exeC:\Windows\system32\xjkxsg.exe 1608 "C:\Windows\SysWOW64\mdfmiu.exe"111⤵
- Drops file in System32 directory
PID:3208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat112⤵PID:2872
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg113⤵PID:4016
-
-
-
C:\Windows\SysWOW64\kiezbo.exeC:\Windows\system32\kiezbo.exe 1604 "C:\Windows\SysWOW64\xjkxsg.exe"112⤵PID:4348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat113⤵PID:1016
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg114⤵
- Modifies security service
PID:4368
-
-
-
C:\Windows\SysWOW64\xyhcjo.exeC:\Windows\system32\xyhcjo.exe 1612 "C:\Windows\SysWOW64\kiezbo.exe"113⤵PID:2964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat114⤵PID:864
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg115⤵PID:2004
-
-
-
C:\Windows\SysWOW64\hylzun.exeC:\Windows\system32\hylzun.exe 1592 "C:\Windows\SysWOW64\xyhcjo.exe"114⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat115⤵PID:3848
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg116⤵PID:4412
-
-
-
C:\Windows\SysWOW64\uldxar.exeC:\Windows\system32\uldxar.exe 1620 "C:\Windows\SysWOW64\hylzun.exe"115⤵PID:264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat116⤵PID:1076
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg117⤵PID:2788
-
-
-
C:\Windows\SysWOW64\eshusp.exeC:\Windows\system32\eshusp.exe 1624 "C:\Windows\SysWOW64\uldxar.exe"116⤵PID:1724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat117⤵PID:2360
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg118⤵PID:1016
-
-
-
C:\Windows\SysWOW64\uwppod.exeC:\Windows\system32\uwppod.exe 1616 "C:\Windows\SysWOW64\eshusp.exe"117⤵PID:2536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat118⤵PID:5112
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg119⤵PID:864
-
-
-
C:\Windows\SysWOW64\hjzfuz.exeC:\Windows\system32\hjzfuz.exe 1628 "C:\Windows\SysWOW64\uwppod.exe"118⤵PID:2616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat119⤵PID:2208
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg120⤵PID:1028
-
-
-
C:\Windows\SysWOW64\ruoqpc.exeC:\Windows\system32\ruoqpc.exe 1636 "C:\Windows\SysWOW64\hjzfuz.exe"119⤵PID:2012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat120⤵PID:2416
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg121⤵PID:2644
-
-
-
C:\Windows\SysWOW64\ceenus.exeC:\Windows\system32\ceenus.exe 1640 "C:\Windows\SysWOW64\ruoqpc.exe"120⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat121⤵PID:1508
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg122⤵PID:1408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-