Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe
-
Size
89KB
-
MD5
c82de8b639b5417861d5557a19f942af
-
SHA1
fafa1a38ed2fb58be9f8695c204bfd72a81b9d6e
-
SHA256
45fc975bbcad4f21a23d13ad212525647fbc0834ee5b5a6f32813828ab691aff
-
SHA512
4aeefca4e5050c275f9e92a277275572b04b64fe39df808d178066f5de904ad3e0c17b0937f18f35807f729c3107f11859b9fece54c3be5f7e10c739ed20e7fb
-
SSDEEP
1536:D0GazZad8Qroy3pM5zpkopTnHGjKFW3KC2x26feC+2eE/SIx4NCch1y3VWa:DldTMym5zp1pTH+KvzZx10aAa
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2940 climkwux.exe 2884 dlloqdgj.exe 2568 ipssqykp.exe 3064 sysrcwun.exe 1424 drvgvtsv.exe 1148 cmdfhqdu.exe 1892 xmldctlc.exe 2848 dllqujry.exe 2960 xmlpyokw.exe 2948 condyeae.exe 2400 dllzzwhy.exe 2456 winvagxt.exe 2300 secoptgh.exe 2376 dllifbxz.exe 1648 clibcohn.exe 1488 apiolenr.exe 1644 comwgehg.exe 2104 cmdynust.exe 2232 secfimmi.exe 2860 advzxzww.exe 2716 fxsmowca.exe 2684 advlaumz.exe 992 autoqeac.exe 2792 fxsvucsb.exe 2088 ipslpebj.exe 2440 syskbclh.exe 2900 ipsgcmtc.exe 860 igfllppl.exe 344 drvkxmzk.exe 2196 cmdsbkki.exe 1980 ialmhzvv.exe 2284 winttxnu.exe 1948 comxusrz.exe 1712 advisxgt.exe 1288 winymfnk.exe 560 comjlkke.exe 2632 conwlfoj.exe 328 conclueq.exe 896 syspdsku.exe 2464 comzsuxx.exe 2772 cmdbykrc.exe 2708 winoqaxg.exe 2564 dllnufhf.exe 1572 nettlavn.exe 2832 advpmkdq.exe 2064 netoqqvh.exe 1844 winlyqih.exe 2784 netjtsqh.exe 536 conifqbg.exe 2244 authjnlf.exe 2432 conubdzi.exe 2844 autbfajh.exe 820 fxsajyug.exe 408 condhipj.exe 876 seccblyr.exe 1684 syservlm.exe 1544 cmddmytv.exe 2380 apicyvmt.exe 1412 capstyub.exe 1624 dlldiiif.exe 2252 advqayna.exe 2712 drvuvyuq.exe 2672 dlllqbdq.exe 2060 ialvnlqt.exe -
Loads dropped DLL 64 IoCs
pid Process 2764 c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe 2764 c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe 2940 climkwux.exe 2940 climkwux.exe 2884 dlloqdgj.exe 2884 dlloqdgj.exe 2568 ipssqykp.exe 2568 ipssqykp.exe 3064 sysrcwun.exe 3064 sysrcwun.exe 1424 drvgvtsv.exe 1424 drvgvtsv.exe 1148 cmdfhqdu.exe 1148 cmdfhqdu.exe 1892 xmldctlc.exe 1892 xmldctlc.exe 2848 dllqujry.exe 2848 dllqujry.exe 2960 xmlpyokw.exe 2960 xmlpyokw.exe 2948 condyeae.exe 2948 condyeae.exe 2400 dllzzwhy.exe 2400 dllzzwhy.exe 2456 winvagxt.exe 2456 winvagxt.exe 2300 secoptgh.exe 2300 secoptgh.exe 2376 dllifbxz.exe 2376 dllifbxz.exe 1648 clibcohn.exe 1648 clibcohn.exe 1488 apiolenr.exe 1488 apiolenr.exe 1644 comwgehg.exe 1644 comwgehg.exe 2104 cmdynust.exe 2104 cmdynust.exe 2232 secfimmi.exe 2232 secfimmi.exe 2860 advzxzww.exe 2860 advzxzww.exe 2716 fxsmowca.exe 2716 fxsmowca.exe 2684 advlaumz.exe 2684 advlaumz.exe 992 autoqeac.exe 992 autoqeac.exe 2792 fxsvucsb.exe 2792 fxsvucsb.exe 2088 ipslpebj.exe 2088 ipslpebj.exe 2440 syskbclh.exe 2440 syskbclh.exe 2900 ipsgcmtc.exe 2900 ipsgcmtc.exe 860 igfllppl.exe 860 igfllppl.exe 344 drvkxmzk.exe 344 drvkxmzk.exe 2196 cmdsbkki.exe 2196 cmdsbkki.exe 1980 ialmhzvv.exe 1980 ialmhzvv.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\apiolenr.exe clibcohn.exe File opened for modification C:\Windows\SysWOW64\cliienup.exe sysoyxjd.exe File created C:\Windows\SysWOW64\fxscrfdt.exe capmwcvl.exe File created C:\Windows\SysWOW64\seczooge.exe ipslnrqx.exe File opened for modification C:\Windows\SysWOW64\winlzjym.exe igfuwgpe.exe File created C:\Windows\SysWOW64\ipsaqmal.exe clitmoqm.exe File created C:\Windows\SysWOW64\seccblyr.exe condhipj.exe File opened for modification C:\Windows\SysWOW64\syservlm.exe seccblyr.exe File created C:\Windows\SysWOW64\fxsyqeai.exe dllwkopw.exe File created C:\Windows\SysWOW64\ialhegbe.exe ipsbmlnn.exe File opened for modification C:\Windows\SysWOW64\cliaqqyw.exe secjvnqo.exe File created C:\Windows\SysWOW64\cligywse.exe seciduje.exe File opened for modification C:\Windows\SysWOW64\dllhvczi.exe capefalf.exe File created C:\Windows\SysWOW64\regzltsb.exe capukyow.exe File opened for modification C:\Windows\SysWOW64\secbqmby.exe fxsoywvu.exe File opened for modification C:\Windows\SysWOW64\ipstsssk.exe fxsdxqjk.exe File created C:\Windows\SysWOW64\syspzzcp.exe secekphm.exe File opened for modification C:\Windows\SysWOW64\autdyxhq.exe advaiulv.exe File created C:\Windows\SysWOW64\winwgoci.exe apiuazre.exe File opened for modification C:\Windows\SysWOW64\capgheig.exe drvebowu.exe File created C:\Windows\SysWOW64\sysoyxjd.exe advpduad.exe File created C:\Windows\SysWOW64\igffpyfz.exe cmdcznjw.exe File opened for modification C:\Windows\SysWOW64\advlaumz.exe fxsmowca.exe File created C:\Windows\SysWOW64\autmnlup.exe xmlnlilg.exe File created C:\Windows\SysWOW64\capcpjug.exe igfpxuoc.exe File opened for modification C:\Windows\SysWOW64\netevzfl.exe capcpjug.exe File created C:\Windows\SysWOW64\advqayna.exe dlldiiif.exe File opened for modification C:\Windows\SysWOW64\sysxfgzb.exe sysjeqjt.exe File opened for modification C:\Windows\SysWOW64\xmlshtbb.exe ipsyblpw.exe File opened for modification C:\Windows\SysWOW64\condhipj.exe fxsajyug.exe File created C:\Windows\SysWOW64\advlejpg.exe dllyntjd.exe File created C:\Windows\SysWOW64\winwkpwi.exe igffpmoi.exe File created C:\Windows\SysWOW64\secvfmup.exe sechfxei.exe File created C:\Windows\SysWOW64\apiycfai.exe clillpue.exe File opened for modification C:\Windows\SysWOW64\neticqxt.exe xmlvtasq.exe File created C:\Windows\SysWOW64\dllnnkst.exe secafpog.exe File opened for modification C:\Windows\SysWOW64\sysihfbb.exe advsecsb.exe File opened for modification C:\Windows\SysWOW64\cligjfxu.exe secpgcpu.exe File opened for modification C:\Windows\SysWOW64\comkmhku.exe autmrebm.exe File created C:\Windows\SysWOW64\netxhkpj.exe wingmhhb.exe File opened for modification C:\Windows\SysWOW64\netifboj.exe autfqrbg.exe File created C:\Windows\SysWOW64\igfoaluq.exe comqxjlq.exe File opened for modification C:\Windows\SysWOW64\condyeae.exe xmlpyokw.exe File created C:\Windows\SysWOW64\autdsqxz.exe xmlepopr.exe File created C:\Windows\SysWOW64\xmlhzycw.exe ialekoht.exe File created C:\Windows\SysWOW64\autbfajh.exe conubdzi.exe File created C:\Windows\SysWOW64\winfvoly.exe igfoaluq.exe File created C:\Windows\SysWOW64\conomiab.exe captvkvx.exe File created C:\Windows\SysWOW64\cmdjokqy.exe fxspavfm.exe File created C:\Windows\SysWOW64\regevzar.exe netosxrr.exe File opened for modification C:\Windows\SysWOW64\winlxsgy.exe xmlaiisv.exe File created C:\Windows\SysWOW64\winrssrs.exe xmlgciwp.exe File opened for modification C:\Windows\SysWOW64\clibqhyj.exe nethkrme.exe File opened for modification C:\Windows\SysWOW64\cmdgleak.exe netqqjrc.exe File opened for modification C:\Windows\SysWOW64\cmdjokqy.exe fxspavfm.exe File created C:\Windows\SysWOW64\ialcpyzp.exe regajroc.exe File opened for modification C:\Windows\SysWOW64\drvmqhnq.exe ipsonfep.exe File created C:\Windows\SysWOW64\dllgdxby.exe capwnmov.exe File created C:\Windows\SysWOW64\ipsqlnoo.exe fxsrrkfg.exe File opened for modification C:\Windows\SysWOW64\dllfjsff.exe drvggqwx.exe File opened for modification C:\Windows\SysWOW64\cmdgxtay.exe syspcqsq.exe File opened for modification C:\Windows\SysWOW64\cmdaiiyo.exe syscnfpg.exe File opened for modification C:\Windows\SysWOW64\secvlipx.exe xmlfqfgo.exe File created C:\Windows\SysWOW64\reggaefr.exe netifboj.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmdukdzw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cligjfxu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windrcup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfywtvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfuwgpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clivrkmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language authjnlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxsixulm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language advsvnpq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autpaygm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igffpmoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfndbjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conyifzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipszdsew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmlkeghf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autdyxhq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clibcohn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winszmdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipsnhjji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conadnwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secfyfvi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmlvobtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllcfobq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autihyec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmdiamtc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllaprnz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drvlnhxk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmlxpvfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syspdsku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmlaiisv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ialghpdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language advxbsly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmluvgem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autdnjek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfupusk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conephnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syssguwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmlezvjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmlnijng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfcdglw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingmhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmdljayc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comyrvnq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ialirtmx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllrlzmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmlnyybi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autfqrbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apisvcyg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxspavfm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conrjkrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllifbxz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secfimmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clioapmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apialvce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmltoeza.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language advncxbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comsqypi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxsmowca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllnufhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secewofa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxsusohw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autkrncz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfgpebf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apigmlsd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2940 2764 c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2940 2764 c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2940 2764 c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe 31 PID 2764 wrote to memory of 2940 2764 c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe 31 PID 2940 wrote to memory of 2884 2940 climkwux.exe 32 PID 2940 wrote to memory of 2884 2940 climkwux.exe 32 PID 2940 wrote to memory of 2884 2940 climkwux.exe 32 PID 2940 wrote to memory of 2884 2940 climkwux.exe 32 PID 2884 wrote to memory of 2568 2884 dlloqdgj.exe 33 PID 2884 wrote to memory of 2568 2884 dlloqdgj.exe 33 PID 2884 wrote to memory of 2568 2884 dlloqdgj.exe 33 PID 2884 wrote to memory of 2568 2884 dlloqdgj.exe 33 PID 2568 wrote to memory of 3064 2568 ipssqykp.exe 34 PID 2568 wrote to memory of 3064 2568 ipssqykp.exe 34 PID 2568 wrote to memory of 3064 2568 ipssqykp.exe 34 PID 2568 wrote to memory of 3064 2568 ipssqykp.exe 34 PID 3064 wrote to memory of 1424 3064 sysrcwun.exe 35 PID 3064 wrote to memory of 1424 3064 sysrcwun.exe 35 PID 3064 wrote to memory of 1424 3064 sysrcwun.exe 35 PID 3064 wrote to memory of 1424 3064 sysrcwun.exe 35 PID 1424 wrote to memory of 1148 1424 drvgvtsv.exe 36 PID 1424 wrote to memory of 1148 1424 drvgvtsv.exe 36 PID 1424 wrote to memory of 1148 1424 drvgvtsv.exe 36 PID 1424 wrote to memory of 1148 1424 drvgvtsv.exe 36 PID 1148 wrote to memory of 1892 1148 cmdfhqdu.exe 37 PID 1148 wrote to memory of 1892 1148 cmdfhqdu.exe 37 PID 1148 wrote to memory of 1892 1148 cmdfhqdu.exe 37 PID 1148 wrote to memory of 1892 1148 cmdfhqdu.exe 37 PID 1892 wrote to memory of 2848 1892 xmldctlc.exe 38 PID 1892 wrote to memory of 2848 1892 xmldctlc.exe 38 PID 1892 wrote to memory of 2848 1892 xmldctlc.exe 38 PID 1892 wrote to memory of 2848 1892 xmldctlc.exe 38 PID 2848 wrote to memory of 2960 2848 dllqujry.exe 39 PID 2848 wrote to memory of 2960 2848 dllqujry.exe 39 PID 2848 wrote to memory of 2960 2848 dllqujry.exe 39 PID 2848 wrote to memory of 2960 2848 dllqujry.exe 39 PID 2960 wrote to memory of 2948 2960 xmlpyokw.exe 40 PID 2960 wrote to memory of 2948 2960 xmlpyokw.exe 40 PID 2960 wrote to memory of 2948 2960 xmlpyokw.exe 40 PID 2960 wrote to memory of 2948 2960 xmlpyokw.exe 40 PID 2948 wrote to memory of 2400 2948 condyeae.exe 41 PID 2948 wrote to memory of 2400 2948 condyeae.exe 41 PID 2948 wrote to memory of 2400 2948 condyeae.exe 41 PID 2948 wrote to memory of 2400 2948 condyeae.exe 41 PID 2400 wrote to memory of 2456 2400 dllzzwhy.exe 42 PID 2400 wrote to memory of 2456 2400 dllzzwhy.exe 42 PID 2400 wrote to memory of 2456 2400 dllzzwhy.exe 42 PID 2400 wrote to memory of 2456 2400 dllzzwhy.exe 42 PID 2456 wrote to memory of 2300 2456 winvagxt.exe 43 PID 2456 wrote to memory of 2300 2456 winvagxt.exe 43 PID 2456 wrote to memory of 2300 2456 winvagxt.exe 43 PID 2456 wrote to memory of 2300 2456 winvagxt.exe 43 PID 2300 wrote to memory of 2376 2300 secoptgh.exe 44 PID 2300 wrote to memory of 2376 2300 secoptgh.exe 44 PID 2300 wrote to memory of 2376 2300 secoptgh.exe 44 PID 2300 wrote to memory of 2376 2300 secoptgh.exe 44 PID 2376 wrote to memory of 1648 2376 dllifbxz.exe 45 PID 2376 wrote to memory of 1648 2376 dllifbxz.exe 45 PID 2376 wrote to memory of 1648 2376 dllifbxz.exe 45 PID 2376 wrote to memory of 1648 2376 dllifbxz.exe 45 PID 1648 wrote to memory of 1488 1648 clibcohn.exe 46 PID 1648 wrote to memory of 1488 1648 clibcohn.exe 46 PID 1648 wrote to memory of 1488 1648 clibcohn.exe 46 PID 1648 wrote to memory of 1488 1648 clibcohn.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\climkwux.exeC:\Windows\system32\climkwux.exe 472 "C:\Users\Admin\AppData\Local\Temp\c82de8b639b5417861d5557a19f942af_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\dlloqdgj.exeC:\Windows\system32\dlloqdgj.exe 512 "C:\Windows\SysWOW64\climkwux.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\ipssqykp.exeC:\Windows\system32\ipssqykp.exe 516 "C:\Windows\SysWOW64\dlloqdgj.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\sysrcwun.exeC:\Windows\system32\sysrcwun.exe 520 "C:\Windows\SysWOW64\ipssqykp.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\drvgvtsv.exeC:\Windows\system32\drvgvtsv.exe 524 "C:\Windows\SysWOW64\sysrcwun.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmdfhqdu.exeC:\Windows\system32\cmdfhqdu.exe 528 "C:\Windows\SysWOW64\drvgvtsv.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\xmldctlc.exeC:\Windows\system32\xmldctlc.exe 532 "C:\Windows\SysWOW64\cmdfhqdu.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\dllqujry.exeC:\Windows\system32\dllqujry.exe 536 "C:\Windows\SysWOW64\xmldctlc.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\xmlpyokw.exeC:\Windows\system32\xmlpyokw.exe 540 "C:\Windows\SysWOW64\dllqujry.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\condyeae.exeC:\Windows\system32\condyeae.exe 544 "C:\Windows\SysWOW64\xmlpyokw.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\dllzzwhy.exeC:\Windows\system32\dllzzwhy.exe 548 "C:\Windows\SysWOW64\condyeae.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\winvagxt.exeC:\Windows\system32\winvagxt.exe 552 "C:\Windows\SysWOW64\dllzzwhy.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\secoptgh.exeC:\Windows\system32\secoptgh.exe 560 "C:\Windows\SysWOW64\winvagxt.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\dllifbxz.exeC:\Windows\system32\dllifbxz.exe 576 "C:\Windows\SysWOW64\secoptgh.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\clibcohn.exeC:\Windows\system32\clibcohn.exe 556 "C:\Windows\SysWOW64\dllifbxz.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\apiolenr.exeC:\Windows\system32\apiolenr.exe 564 "C:\Windows\SysWOW64\clibcohn.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1488 -
C:\Windows\SysWOW64\comwgehg.exeC:\Windows\system32\comwgehg.exe 572 "C:\Windows\SysWOW64\apiolenr.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644 -
C:\Windows\SysWOW64\cmdynust.exeC:\Windows\system32\cmdynust.exe 568 "C:\Windows\SysWOW64\comwgehg.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2104 -
C:\Windows\SysWOW64\secfimmi.exeC:\Windows\system32\secfimmi.exe 580 "C:\Windows\SysWOW64\cmdynust.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\advzxzww.exeC:\Windows\system32\advzxzww.exe 584 "C:\Windows\SysWOW64\secfimmi.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Windows\SysWOW64\fxsmowca.exeC:\Windows\system32\fxsmowca.exe 588 "C:\Windows\SysWOW64\advzxzww.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\advlaumz.exeC:\Windows\system32\advlaumz.exe 596 "C:\Windows\SysWOW64\fxsmowca.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684 -
C:\Windows\SysWOW64\autoqeac.exeC:\Windows\system32\autoqeac.exe 592 "C:\Windows\SysWOW64\advlaumz.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:992 -
C:\Windows\SysWOW64\fxsvucsb.exeC:\Windows\system32\fxsvucsb.exe 600 "C:\Windows\SysWOW64\autoqeac.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2792 -
C:\Windows\SysWOW64\ipslpebj.exeC:\Windows\system32\ipslpebj.exe 608 "C:\Windows\SysWOW64\fxsvucsb.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088 -
C:\Windows\SysWOW64\syskbclh.exeC:\Windows\system32\syskbclh.exe 604 "C:\Windows\SysWOW64\ipslpebj.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2440 -
C:\Windows\SysWOW64\ipsgcmtc.exeC:\Windows\system32\ipsgcmtc.exe 612 "C:\Windows\SysWOW64\syskbclh.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2900 -
C:\Windows\SysWOW64\igfllppl.exeC:\Windows\system32\igfllppl.exe 616 "C:\Windows\SysWOW64\ipsgcmtc.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:860 -
C:\Windows\SysWOW64\drvkxmzk.exeC:\Windows\system32\drvkxmzk.exe 620 "C:\Windows\SysWOW64\igfllppl.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:344 -
C:\Windows\SysWOW64\cmdsbkki.exeC:\Windows\system32\cmdsbkki.exe 636 "C:\Windows\SysWOW64\drvkxmzk.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2196 -
C:\Windows\SysWOW64\ialmhzvv.exeC:\Windows\system32\ialmhzvv.exe 632 "C:\Windows\SysWOW64\cmdsbkki.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1980 -
C:\Windows\SysWOW64\winttxnu.exeC:\Windows\system32\winttxnu.exe 624 "C:\Windows\SysWOW64\ialmhzvv.exe"33⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\comxusrz.exeC:\Windows\system32\comxusrz.exe 640 "C:\Windows\SysWOW64\winttxnu.exe"34⤵
- Executes dropped EXE
PID:1948 -
C:\Windows\SysWOW64\advisxgt.exeC:\Windows\system32\advisxgt.exe 628 "C:\Windows\SysWOW64\comxusrz.exe"35⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\winymfnk.exeC:\Windows\system32\winymfnk.exe 644 "C:\Windows\SysWOW64\advisxgt.exe"36⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\comjlkke.exeC:\Windows\system32\comjlkke.exe 648 "C:\Windows\SysWOW64\winymfnk.exe"37⤵
- Executes dropped EXE
PID:560 -
C:\Windows\SysWOW64\conwlfoj.exeC:\Windows\system32\conwlfoj.exe 656 "C:\Windows\SysWOW64\comjlkke.exe"38⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\conclueq.exeC:\Windows\system32\conclueq.exe 652 "C:\Windows\SysWOW64\conwlfoj.exe"39⤵
- Executes dropped EXE
PID:328 -
C:\Windows\SysWOW64\syspdsku.exeC:\Windows\system32\syspdsku.exe 660 "C:\Windows\SysWOW64\conclueq.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SysWOW64\comzsuxx.exeC:\Windows\system32\comzsuxx.exe 672 "C:\Windows\SysWOW64\syspdsku.exe"41⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\cmdbykrc.exeC:\Windows\system32\cmdbykrc.exe 664 "C:\Windows\SysWOW64\comzsuxx.exe"42⤵
- Executes dropped EXE
PID:2772 -
C:\Windows\SysWOW64\winoqaxg.exeC:\Windows\system32\winoqaxg.exe 668 "C:\Windows\SysWOW64\cmdbykrc.exe"43⤵
- Executes dropped EXE
PID:2708 -
C:\Windows\SysWOW64\dllnufhf.exeC:\Windows\system32\dllnufhf.exe 676 "C:\Windows\SysWOW64\winoqaxg.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\nettlavn.exeC:\Windows\system32\nettlavn.exe 680 "C:\Windows\SysWOW64\dllnufhf.exe"45⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\SysWOW64\advpmkdq.exeC:\Windows\system32\advpmkdq.exe 684 "C:\Windows\SysWOW64\nettlavn.exe"46⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\SysWOW64\netoqqvh.exeC:\Windows\system32\netoqqvh.exe 688 "C:\Windows\SysWOW64\advpmkdq.exe"47⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\winlyqih.exeC:\Windows\system32\winlyqih.exe 692 "C:\Windows\SysWOW64\netoqqvh.exe"48⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\netjtsqh.exeC:\Windows\system32\netjtsqh.exe 696 "C:\Windows\SysWOW64\winlyqih.exe"49⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\conifqbg.exeC:\Windows\system32\conifqbg.exe 700 "C:\Windows\SysWOW64\netjtsqh.exe"50⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\authjnlf.exeC:\Windows\system32\authjnlf.exe 704 "C:\Windows\SysWOW64\conifqbg.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\conubdzi.exeC:\Windows\system32\conubdzi.exe 708 "C:\Windows\SysWOW64\authjnlf.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\autbfajh.exeC:\Windows\system32\autbfajh.exe 712 "C:\Windows\SysWOW64\conubdzi.exe"53⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\fxsajyug.exeC:\Windows\system32\fxsajyug.exe 716 "C:\Windows\SysWOW64\autbfajh.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:820 -
C:\Windows\SysWOW64\condhipj.exeC:\Windows\system32\condhipj.exe 732 "C:\Windows\SysWOW64\fxsajyug.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:408 -
C:\Windows\SysWOW64\seccblyr.exeC:\Windows\system32\seccblyr.exe 728 "C:\Windows\SysWOW64\condhipj.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:876 -
C:\Windows\SysWOW64\syservlm.exeC:\Windows\system32\syservlm.exe 740 "C:\Windows\SysWOW64\seccblyr.exe"57⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\cmddmytv.exeC:\Windows\system32\cmddmytv.exe 736 "C:\Windows\SysWOW64\syservlm.exe"58⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\apicyvmt.exeC:\Windows\system32\apicyvmt.exe 720 "C:\Windows\SysWOW64\cmddmytv.exe"59⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\capstyub.exeC:\Windows\system32\capstyub.exe 724 "C:\Windows\SysWOW64\apicyvmt.exe"60⤵
- Executes dropped EXE
PID:1412 -
C:\Windows\SysWOW64\dlldiiif.exeC:\Windows\system32\dlldiiif.exe 752 "C:\Windows\SysWOW64\capstyub.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\advqayna.exeC:\Windows\system32\advqayna.exe 756 "C:\Windows\SysWOW64\dlldiiif.exe"62⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\ipseavdi.exeC:\Windows\system32\ipseavdi.exe 744 "C:\Windows\SysWOW64\advqayna.exe"63⤵PID:1660
-
C:\Windows\SysWOW64\drvuvyuq.exeC:\Windows\system32\drvuvyuq.exe 748 "C:\Windows\SysWOW64\ipseavdi.exe"64⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\dlllqbdq.exeC:\Windows\system32\dlllqbdq.exe 768 "C:\Windows\SysWOW64\drvuvyuq.exe"65⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\SysWOW64\ialvnlqt.exeC:\Windows\system32\ialvnlqt.exe 760 "C:\Windows\SysWOW64\dlllqbdq.exe"66⤵
- Executes dropped EXE
PID:2060 -
C:\Windows\SysWOW64\secanguh.exeC:\Windows\system32\secanguh.exe 764 "C:\Windows\SysWOW64\ialvnlqt.exe"67⤵PID:2604
-
C:\Windows\SysWOW64\syskdrhk.exeC:\Windows\system32\syskdrhk.exe 772 "C:\Windows\SysWOW64\secanguh.exe"68⤵PID:1268
-
C:\Windows\SysWOW64\cliejyso.exeC:\Windows\system32\cliejyso.exe 776 "C:\Windows\SysWOW64\syskdrhk.exe"69⤵PID:868
-
C:\Windows\SysWOW64\xmlzaoys.exeC:\Windows\system32\xmlzaoys.exe 784 "C:\Windows\SysWOW64\cliejyso.exe"70⤵PID:1988
-
C:\Windows\SysWOW64\ipstgese.exeC:\Windows\system32\ipstgese.exe 788 "C:\Windows\SysWOW64\xmlzaoys.exe"71⤵PID:2924
-
C:\Windows\SysWOW64\secewofa.exeC:\Windows\system32\secewofa.exe 792 "C:\Windows\SysWOW64\ipstgese.exe"72⤵
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Windows\SysWOW64\clivrroi.exeC:\Windows\system32\clivrroi.exe 780 "C:\Windows\SysWOW64\secewofa.exe"73⤵PID:2484
-
C:\Windows\SysWOW64\ialtttwq.exeC:\Windows\system32\ialtttwq.exe 796 "C:\Windows\SysWOW64\clivrroi.exe"74⤵PID:1228
-
C:\Windows\SysWOW64\advkowfy.exeC:\Windows\system32\advkowfy.exe 800 "C:\Windows\SysWOW64\ialtttwq.exe"75⤵PID:840
-
C:\Windows\SysWOW64\advypldy.exeC:\Windows\system32\advypldy.exe 804 "C:\Windows\SysWOW64\advkowfy.exe"76⤵PID:960
-
C:\Windows\SysWOW64\sysokolg.exeC:\Windows\system32\sysokolg.exe 820 "C:\Windows\SysWOW64\advypldy.exe"77⤵PID:2448
-
C:\Windows\SysWOW64\dllnmruo.exeC:\Windows\system32\dllnmruo.exe 812 "C:\Windows\SysWOW64\sysokolg.exe"78⤵PID:1776
-
C:\Windows\SysWOW64\condhudo.exeC:\Windows\system32\condhudo.exe 808 "C:\Windows\SysWOW64\dllnmruo.exe"79⤵PID:1760
-
C:\Windows\SysWOW64\secucwlw.exeC:\Windows\system32\secucwlw.exe 816 "C:\Windows\SysWOW64\condhudo.exe"80⤵PID:2524
-
C:\Windows\SysWOW64\seciduje.exeC:\Windows\system32\seciduje.exe 824 "C:\Windows\SysWOW64\secucwlw.exe"81⤵
- Drops file in System32 directory
PID:236 -
C:\Windows\SysWOW64\cligywse.exeC:\Windows\system32\cligywse.exe 828 "C:\Windows\SysWOW64\seciduje.exe"82⤵PID:796
-
C:\Windows\SysWOW64\wintpmyi.exeC:\Windows\system32\wintpmyi.exe 832 "C:\Windows\SysWOW64\cligywse.exe"83⤵PID:2976
-
C:\Windows\SysWOW64\winzqjop.exeC:\Windows\system32\winzqjop.exe 840 "C:\Windows\SysWOW64\wintpmyi.exe"84⤵PID:2668
-
C:\Windows\SysWOW64\netylewx.exeC:\Windows\system32\netylewx.exe 856 "C:\Windows\SysWOW64\winzqjop.exe"85⤵PID:1512
-
C:\Windows\SysWOW64\cmdonhfx.exeC:\Windows\system32\cmdonhfx.exe 836 "C:\Windows\SysWOW64\netylewx.exe"86⤵PID:2724
-
C:\Windows\SysWOW64\xmlnijng.exeC:\Windows\system32\xmlnijng.exe 844 "C:\Windows\SysWOW64\cmdonhfx.exe"87⤵
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\winpyujj.exeC:\Windows\system32\winpyujj.exe 848 "C:\Windows\SysWOW64\xmlnijng.exe"88⤵PID:572
-
C:\Windows\SysWOW64\netosxrr.exeC:\Windows\system32\netosxrr.exe 852 "C:\Windows\SysWOW64\winpyujj.exe"89⤵
- Drops file in System32 directory
PID:2384 -
C:\Windows\SysWOW64\regevzar.exeC:\Windows\system32\regevzar.exe 860 "C:\Windows\SysWOW64\netosxrr.exe"90⤵PID:2620
-
C:\Windows\SysWOW64\apivqcjz.exeC:\Windows\system32\apivqcjz.exe 864 "C:\Windows\SysWOW64\regevzar.exe"91⤵PID:264
-
C:\Windows\SysWOW64\drvffmwc.exeC:\Windows\system32\drvffmwc.exe 868 "C:\Windows\SysWOW64\apivqcjz.exe"92⤵PID:2152
-
C:\Windows\SysWOW64\dllwipmc.exeC:\Windows\system32\dllwipmc.exe 872 "C:\Windows\SysWOW64\drvffmwc.exe"93⤵PID:1868
-
C:\Windows\SysWOW64\conudsvl.exeC:\Windows\system32\conudsvl.exe 880 "C:\Windows\SysWOW64\dllwipmc.exe"94⤵PID:2160
-
C:\Windows\SysWOW64\regbehls.exeC:\Windows\system32\regbehls.exe 876 "C:\Windows\SysWOW64\conudsvl.exe"95⤵PID:2136
-
C:\Windows\SysWOW64\apizykua.exeC:\Windows\system32\apizykua.exe 888 "C:\Windows\SysWOW64\regbehls.exe"96⤵PID:2504
-
C:\Windows\SysWOW64\capqtmca.exeC:\Windows\system32\capqtmca.exe 900 "C:\Windows\SysWOW64\apizykua.exe"97⤵PID:956
-
C:\Windows\SysWOW64\fxsowplj.exeC:\Windows\system32\fxsowplj.exe 892 "C:\Windows\SysWOW64\capqtmca.exe"98⤵PID:3000
-
C:\Windows\SysWOW64\ipsfrstr.exeC:\Windows\system32\ipsfrstr.exe 884 "C:\Windows\SysWOW64\fxsowplj.exe"99⤵PID:1212
-
C:\Windows\SysWOW64\secpgcpu.exeC:\Windows\system32\secpgcpu.exe 896 "C:\Windows\SysWOW64\ipsfrstr.exe"100⤵
- Drops file in System32 directory
PID:2156 -
C:\Windows\SysWOW64\cligjfxu.exeC:\Windows\system32\cligjfxu.exe 904 "C:\Windows\SysWOW64\secpgcpu.exe"101⤵
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\SysWOW64\ialweigc.exeC:\Windows\system32\ialweigc.exe 920 "C:\Windows\SysWOW64\cligjfxu.exe"102⤵PID:3068
-
C:\Windows\SysWOW64\fxskefwk.exeC:\Windows\system32\fxskefwk.exe 908 "C:\Windows\SysWOW64\ialweigc.exe"103⤵PID:1640
-
C:\Windows\SysWOW64\ipsjzink.exeC:\Windows\system32\ipsjzink.exe 912 "C:\Windows\SysWOW64\fxskefwk.exe"104⤵PID:2316
-
C:\Windows\SysWOW64\drvzucvs.exeC:\Windows\system32\drvzucvs.exe 916 "C:\Windows\SysWOW64\ipsjzink.exe"105⤵PID:1900
-
C:\Windows\SysWOW64\dllqxfea.exeC:\Windows\system32\dllqxfea.exe 924 "C:\Windows\SysWOW64\drvzucvs.exe"106⤵PID:2172
-
C:\Windows\SysWOW64\conosima.exeC:\Windows\system32\conosima.exe 940 "C:\Windows\SysWOW64\dllqxfea.exe"107⤵PID:2664
-
C:\Windows\SysWOW64\concsfci.exeC:\Windows\system32\concsfci.exe 928 "C:\Windows\SysWOW64\conosima.exe"108⤵PID:3020
-
C:\Windows\SysWOW64\sectnilq.exeC:\Windows\system32\sectnilq.exe 932 "C:\Windows\SysWOW64\concsfci.exe"109⤵PID:1204
-
C:\Windows\SysWOW64\clijqkuy.exeC:\Windows\system32\clijqkuy.exe 936 "C:\Windows\SysWOW64\sectnilq.exe"110⤵PID:2184
-
C:\Windows\SysWOW64\fxsilnky.exeC:\Windows\system32\fxsilnky.exe 944 "C:\Windows\SysWOW64\clijqkuy.exe"111⤵PID:2652
-
C:\Windows\SysWOW64\ipsygqtg.exeC:\Windows\system32\ipsygqtg.exe 948 "C:\Windows\SysWOW64\fxsilnky.exe"112⤵PID:2280
-
C:\Windows\SysWOW64\ipsmgfjo.exeC:\Windows\system32\ipsmgfjo.exe 952 "C:\Windows\SysWOW64\ipsygqtg.exe"113⤵PID:1652
-
C:\Windows\SysWOW64\clizyvpk.exeC:\Windows\system32\clizyvpk.exe 960 "C:\Windows\SysWOW64\ipsmgfjo.exe"114⤵PID:2424
-
C:\Windows\SysWOW64\ialytyxs.exeC:\Windows\system32\ialytyxs.exe 972 "C:\Windows\SysWOW64\clizyvpk.exe"115⤵PID:1112
-
C:\Windows\SysWOW64\xmlaiisv.exeC:\Windows\system32\xmlaiisv.exe 956 "C:\Windows\SysWOW64\ialytyxs.exe"116⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\winlxsgy.exeC:\Windows\system32\winlxsgy.exe 976 "C:\Windows\SysWOW64\xmlaiisv.exe"117⤵PID:2396
-
C:\Windows\SysWOW64\compgnkd.exeC:\Windows\system32\compgnkd.exe 964 "C:\Windows\SysWOW64\winlxsgy.exe"118⤵PID:2336
-
C:\Windows\SysWOW64\clieglal.exeC:\Windows\system32\clieglal.exe 968 "C:\Windows\SysWOW64\compgnkd.exe"119⤵PID:276
-
C:\Windows\SysWOW64\ialubnit.exeC:\Windows\system32\ialubnit.exe 980 "C:\Windows\SysWOW64\clieglal.exe"120⤵PID:340
-
C:\Windows\SysWOW64\advlwqrt.exeC:\Windows\system32\advlwqrt.exe 988 "C:\Windows\SysWOW64\ialubnit.exe"121⤵PID:2368
-
C:\Windows\SysWOW64\sysjztib.exeC:\Windows\system32\sysjztib.exe 1008 "C:\Windows\SysWOW64\advlwqrt.exe"122⤵PID:2752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-