Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe
-
Size
102KB
-
MD5
d5060836445f33cc9dceb93d0425a64a
-
SHA1
9ba7bac9cd8411893009d59f5e3c6171dbb2d868
-
SHA256
ed0e1ecfc2a50ee7924d20d3fb12ce2103b268eb31c1fa6e05542fd41e683ff0
-
SHA512
e72afd40177da1fb39fc350b4b5061b0b05378cc7623a5c74d744d1e39265c4fb03d004102b3cfb1cb5d599e20dbe08cdb03218b77a0c5839438c5e68760ee87
-
SSDEEP
3072:JcXw9QQYAbYK0Pug7Fed5xddQXZUXn/X1cE:NYASug7Fe/7KpUXntcE
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3524 iopgbezly.exe 4664 lfhrkodkt.exe 1624 tkrwuzgao.exe 4816 izdebqjwi.exe 2028 tveoilkuv.exe 844 fxkeupodj.exe 512 nqjeiesrj.exe 1240 gxljnxuvd.exe 1164 nbvwxixly.exe 2544 yxwpecxim.exe 4920 lnrknldpf.exe 1504 yxxuykdzg.exe 4036 lnsxgsaph.exe 3368 vyhhunpju.exe 1684 ihnkxnhto.exe 1224 vufacrggc.exe 4028 fxukquuap.exe 1744 ssmadytnd.exe 3596 xtudmvztk.exe 1880 tsnnpxqex.exe 4080 awxsyqbuk.exe 4644 qquniedly.exe 1140 aajtnufoz.exe 1056 qqvtuebdt.exe 1772 vgaoqsmfa.exe 404 lkajuxjah.exe 3068 aaljapnxi.exe 1396 iihjnewhi.exe 2912 qujjwknfj.exe 4136 fngefyxwx.exe 2860 nrqjpjamk.exe 4620 vwyetwwyr.exe 232 cdmenmgry.exe 3048 puphvumyz.exe 1524 ddnkymdit.exe 3044 khxxifoyo.exe 3556 xgazrfmng.exe 5084 ktkpwjtsv.exe 912 ygbfcnrfj.exe 2804 iffcvlzej.exe 4852 vsxsapyjp.exe 1416 afqaurcrj.exe 1896 kajsbldpx.exe 976 xnbihpkcl.exe 220 kasyntjgs.exe 3620 sfuleelem.exe 1456 iyryosont.exe 4992 sqhdtqqqu.exe 2648 iyadzatnn.exe 3664 vxvgiiruo.exe 1792 fwzdshyuo.exe 2632 smcgbhebp.exe 2700 fhmehldgd.exe 5112 sudtnobsj.exe 3132 aynzeamie.exe 2624 pgzhljixy.exe 4936 acazsmicl.exe 3328 qslzzvmrf.exe 916 anmrhqnos.exe 5104 kjfcwkwug.exe 5096 sraujzxen.exe 3428 ivbpnncyu.exe 1732 vudsvnzfv.exe 4060 kbpacedcp.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\uxqandkqm.exe hkychzely.exe File opened for modification C:\Windows\SysWOW64\jqgzhekxu.exe wdpkcalkf.exe File opened for modification C:\Windows\SysWOW64\guenlufmu.exe tlxciunct.exe File opened for modification C:\Windows\SysWOW64\yfbgdonqm.exe lsjqxkgly.exe File created C:\Windows\SysWOW64\ygynezfde.exe ltpxydgqy.exe File created C:\Windows\SysWOW64\zdsguuuaa.exe psdwzrogn.exe File created C:\Windows\SysWOW64\efyaoaawf.exe spdxyscpe.exe File opened for modification C:\Windows\SysWOW64\rlnnauero.exe evskrmykn.exe File opened for modification C:\Windows\SysWOW64\liivwwysg.exe bjeylyqtg.exe File created C:\Windows\SysWOW64\iqrvcrrkt.exe ynclpolih.exe File opened for modification C:\Windows\SysWOW64\izvgotfhw.exe yogwbqznj.exe File created C:\Windows\SysWOW64\nbqlwkzgv.exe arkbtlhwb.exe File created C:\Windows\SysWOW64\myhqbblao.exe czvtqcmao.exe File opened for modification C:\Windows\SysWOW64\kajsbldpx.exe afqaurcrj.exe File opened for modification C:\Windows\SysWOW64\zuvbrlvtn.exe mhmllhwoz.exe File opened for modification C:\Windows\SysWOW64\eyaaxrnyj.exe urwdntnyj.exe File created C:\Windows\SysWOW64\naznzrdmy.exe acwkrrxex.exe File created C:\Windows\SysWOW64\czvtqcmao.exe pmldkzfna.exe File opened for modification C:\Windows\SysWOW64\ussmixmeg.exe klgoqyeeg.exe File created C:\Windows\SysWOW64\rwuuobsha.exe bsuzkonnl.exe File created C:\Windows\SysWOW64\bzugykcqm.exe omlqsgddy.exe File created C:\Windows\SysWOW64\jtagaxphs.exe yxznschcf.exe File opened for modification C:\Windows\SysWOW64\ibftkdbvd.exe vovewzuix.exe File opened for modification C:\Windows\SysWOW64\khxumjgxb.exe xunegfhsn.exe File opened for modification C:\Windows\SysWOW64\jeuzpohmv.exe worwhocfc.exe File created C:\Windows\SysWOW64\kjfksoukq.exe xwvumkwyk.exe File opened for modification C:\Windows\SysWOW64\tlxciunct.exe gmdzzmhva.exe File created C:\Windows\SysWOW64\yfbgdonqm.exe lsjqxkgly.exe File created C:\Windows\SysWOW64\khxxifoyo.exe ddnkymdit.exe File opened for modification C:\Windows\SysWOW64\iffcvlzej.exe ygbfcnrfj.exe File created C:\Windows\SysWOW64\jxacpmkur.exe dkimjilhd.exe File opened for modification C:\Windows\SysWOW64\djxgwsxgo.exe tktjetqgo.exe File created C:\Windows\SysWOW64\crdjibmyy.exe shgznygwm.exe File created C:\Windows\SysWOW64\xbepqhufo.exe kkjmhzpyn.exe File opened for modification C:\Windows\SysWOW64\ususgmfdb.exe hfkuaigyn.exe File opened for modification C:\Windows\SysWOW64\fhcndhzdj.exe vxndiesjw.exe File created C:\Windows\SysWOW64\mtzhvpjjs.exe zghrpmlwm.exe File opened for modification C:\Windows\SysWOW64\lgyvrcbsb.exe yqdsicdlj.exe File opened for modification C:\Windows\SysWOW64\ydqxyuqpp.exe lqzhsqsdb.exe File opened for modification C:\Windows\SysWOW64\dscwuujvl.exe qftgoylqw.exe File opened for modification C:\Windows\SysWOW64\noiswbeeu.exe aekqtceus.exe File opened for modification C:\Windows\SysWOW64\vpsixttil.exe izxfhloak.exe File created C:\Windows\SysWOW64\dkhgyinqj.exe qmmepaiii.exe File created C:\Windows\SysWOW64\wowrqgaar.exe ibftkdbvd.exe File opened for modification C:\Windows\SysWOW64\xcsvfipaw.exe nzvlkfiyb.exe File opened for modification C:\Windows\SysWOW64\aaljapnxi.exe lkajuxjah.exe File opened for modification C:\Windows\SysWOW64\zktjdypqt.exe mtzhvpjjs.exe File created C:\Windows\SysWOW64\jukyjnfrn.exe zkvookrps.exe File created C:\Windows\SysWOW64\umfpbhpoe.exe hzwavdijq.exe File created C:\Windows\SysWOW64\qticapovk.exe gmeepqgvk.exe File created C:\Windows\SysWOW64\yeweodlcp.exe ofsgdeldp.exe File created C:\Windows\SysWOW64\xlqcgbofn.exe kmviqtjyn.exe File created C:\Windows\SysWOW64\nbvwxixly.exe gxljnxuvd.exe File opened for modification C:\Windows\SysWOW64\smcgbhebp.exe fwzdshyuo.exe File created C:\Windows\SysWOW64\mktztjwlf.exe cpsglpngs.exe File opened for modification C:\Windows\SysWOW64\ncvfsmvca.exe aplpmixxu.exe File created C:\Windows\SysWOW64\hitfxgfwl.exe vrycpfzhk.exe File opened for modification C:\Windows\SysWOW64\dreptjrqt.exe qenzofldf.exe File created C:\Windows\SysWOW64\fpkoxuuwe.exe srplomopd.exe File opened for modification C:\Windows\SysWOW64\rpashlssu.exe ecrubptfo.exe File opened for modification C:\Windows\SysWOW64\wufbvsbrf.exe lusdlturf.exe File created C:\Windows\SysWOW64\wybwqfxgy.exe ipvungxwe.exe File created C:\Windows\SysWOW64\vbdwlgrsg.exe mrolydlqt.exe File opened for modification C:\Windows\SysWOW64\injgemcwf.exe yoximnvwf.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjntqxufy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjocdfpdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omxmytrsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language girebmcbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbepqhufo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jrehipkcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ryfdtnhpw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsjqxkgly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlywinpmv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pmmwegava.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jwojvquoh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wukzpxxnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bazifveej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oayiayash.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zuuwflybt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlsyoitqf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koxazkzih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fgfdksgzc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vyxdjuitj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkrwuzgao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ivbpnncyu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ussmixmeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nstnnyhzo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yclqxjqcq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfdcyzkpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqsuygths.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kaauueawt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qdpoodsau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvaovidop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fqkrsqdxq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mjtwxnocb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ikjmwfptg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evskrmykn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bwgsgsrha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xzdcouluo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language copjkueas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkvookrps.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhdgzizwf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hasvklkzo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aajtnufoz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfbcoblru.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbdwlgrsg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxacpmkur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mqozjxiuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdhggeogd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deowjgops.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvhsmpwsu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language anmrhqnos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umfpbhpoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language olxkdxjqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvyszpptc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrnyevnzz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ofsgdeldp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aeemhspkp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojwfxnywi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxroijqgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfjkzkkcp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qpuyyisch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language czvtqcmao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yevizzoul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gbnaxqzxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isdoenppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ejngxdxjl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3524 2172 d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe 83 PID 2172 wrote to memory of 3524 2172 d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe 83 PID 2172 wrote to memory of 3524 2172 d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe 83 PID 3524 wrote to memory of 4664 3524 iopgbezly.exe 85 PID 3524 wrote to memory of 4664 3524 iopgbezly.exe 85 PID 3524 wrote to memory of 4664 3524 iopgbezly.exe 85 PID 4664 wrote to memory of 1624 4664 lfhrkodkt.exe 86 PID 4664 wrote to memory of 1624 4664 lfhrkodkt.exe 86 PID 4664 wrote to memory of 1624 4664 lfhrkodkt.exe 86 PID 1624 wrote to memory of 4816 1624 tkrwuzgao.exe 88 PID 1624 wrote to memory of 4816 1624 tkrwuzgao.exe 88 PID 1624 wrote to memory of 4816 1624 tkrwuzgao.exe 88 PID 4816 wrote to memory of 2028 4816 izdebqjwi.exe 89 PID 4816 wrote to memory of 2028 4816 izdebqjwi.exe 89 PID 4816 wrote to memory of 2028 4816 izdebqjwi.exe 89 PID 2028 wrote to memory of 844 2028 tveoilkuv.exe 91 PID 2028 wrote to memory of 844 2028 tveoilkuv.exe 91 PID 2028 wrote to memory of 844 2028 tveoilkuv.exe 91 PID 844 wrote to memory of 512 844 fxkeupodj.exe 92 PID 844 wrote to memory of 512 844 fxkeupodj.exe 92 PID 844 wrote to memory of 512 844 fxkeupodj.exe 92 PID 512 wrote to memory of 1240 512 nqjeiesrj.exe 93 PID 512 wrote to memory of 1240 512 nqjeiesrj.exe 93 PID 512 wrote to memory of 1240 512 nqjeiesrj.exe 93 PID 1240 wrote to memory of 1164 1240 gxljnxuvd.exe 94 PID 1240 wrote to memory of 1164 1240 gxljnxuvd.exe 94 PID 1240 wrote to memory of 1164 1240 gxljnxuvd.exe 94 PID 1164 wrote to memory of 2544 1164 nbvwxixly.exe 95 PID 1164 wrote to memory of 2544 1164 nbvwxixly.exe 95 PID 1164 wrote to memory of 2544 1164 nbvwxixly.exe 95 PID 2544 wrote to memory of 4920 2544 yxwpecxim.exe 96 PID 2544 wrote to memory of 4920 2544 yxwpecxim.exe 96 PID 2544 wrote to memory of 4920 2544 yxwpecxim.exe 96 PID 4920 wrote to memory of 1504 4920 lnrknldpf.exe 97 PID 4920 wrote to memory of 1504 4920 lnrknldpf.exe 97 PID 4920 wrote to memory of 1504 4920 lnrknldpf.exe 97 PID 1504 wrote to memory of 4036 1504 yxxuykdzg.exe 98 PID 1504 wrote to memory of 4036 1504 yxxuykdzg.exe 98 PID 1504 wrote to memory of 4036 1504 yxxuykdzg.exe 98 PID 4036 wrote to memory of 3368 4036 lnsxgsaph.exe 99 PID 4036 wrote to memory of 3368 4036 lnsxgsaph.exe 99 PID 4036 wrote to memory of 3368 4036 lnsxgsaph.exe 99 PID 3368 wrote to memory of 1684 3368 vyhhunpju.exe 100 PID 3368 wrote to memory of 1684 3368 vyhhunpju.exe 100 PID 3368 wrote to memory of 1684 3368 vyhhunpju.exe 100 PID 1684 wrote to memory of 1224 1684 ihnkxnhto.exe 101 PID 1684 wrote to memory of 1224 1684 ihnkxnhto.exe 101 PID 1684 wrote to memory of 1224 1684 ihnkxnhto.exe 101 PID 1224 wrote to memory of 4028 1224 vufacrggc.exe 102 PID 1224 wrote to memory of 4028 1224 vufacrggc.exe 102 PID 1224 wrote to memory of 4028 1224 vufacrggc.exe 102 PID 4028 wrote to memory of 1744 4028 fxukquuap.exe 103 PID 4028 wrote to memory of 1744 4028 fxukquuap.exe 103 PID 4028 wrote to memory of 1744 4028 fxukquuap.exe 103 PID 1744 wrote to memory of 3596 1744 ssmadytnd.exe 104 PID 1744 wrote to memory of 3596 1744 ssmadytnd.exe 104 PID 1744 wrote to memory of 3596 1744 ssmadytnd.exe 104 PID 3596 wrote to memory of 1880 3596 xtudmvztk.exe 105 PID 3596 wrote to memory of 1880 3596 xtudmvztk.exe 105 PID 3596 wrote to memory of 1880 3596 xtudmvztk.exe 105 PID 1880 wrote to memory of 4080 1880 tsnnpxqex.exe 108 PID 1880 wrote to memory of 4080 1880 tsnnpxqex.exe 108 PID 1880 wrote to memory of 4080 1880 tsnnpxqex.exe 108 PID 4080 wrote to memory of 4644 4080 awxsyqbuk.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\iopgbezly.exeC:\Windows\system32\iopgbezly.exe 1164 "C:\Users\Admin\AppData\Local\Temp\d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\lfhrkodkt.exeC:\Windows\system32\lfhrkodkt.exe 1152 "C:\Windows\SysWOW64\iopgbezly.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\tkrwuzgao.exeC:\Windows\system32\tkrwuzgao.exe 1148 "C:\Windows\SysWOW64\lfhrkodkt.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\izdebqjwi.exeC:\Windows\system32\izdebqjwi.exe 1156 "C:\Windows\SysWOW64\tkrwuzgao.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\tveoilkuv.exeC:\Windows\system32\tveoilkuv.exe 1160 "C:\Windows\SysWOW64\izdebqjwi.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\fxkeupodj.exeC:\Windows\system32\fxkeupodj.exe 1168 "C:\Windows\SysWOW64\tveoilkuv.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\nqjeiesrj.exeC:\Windows\system32\nqjeiesrj.exe 1176 "C:\Windows\SysWOW64\fxkeupodj.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\gxljnxuvd.exeC:\Windows\system32\gxljnxuvd.exe 1172 "C:\Windows\SysWOW64\nqjeiesrj.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\nbvwxixly.exeC:\Windows\system32\nbvwxixly.exe 1184 "C:\Windows\SysWOW64\gxljnxuvd.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\yxwpecxim.exeC:\Windows\system32\yxwpecxim.exe 1188 "C:\Windows\SysWOW64\nbvwxixly.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\lnrknldpf.exeC:\Windows\system32\lnrknldpf.exe 1180 "C:\Windows\SysWOW64\yxwpecxim.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\yxxuykdzg.exeC:\Windows\system32\yxxuykdzg.exe 1196 "C:\Windows\SysWOW64\lnrknldpf.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\lnsxgsaph.exeC:\Windows\system32\lnsxgsaph.exe 1200 "C:\Windows\SysWOW64\yxxuykdzg.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\vyhhunpju.exeC:\Windows\system32\vyhhunpju.exe 1204 "C:\Windows\SysWOW64\lnsxgsaph.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\ihnkxnhto.exeC:\Windows\system32\ihnkxnhto.exe 1208 "C:\Windows\SysWOW64\vyhhunpju.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\vufacrggc.exeC:\Windows\system32\vufacrggc.exe 1192 "C:\Windows\SysWOW64\ihnkxnhto.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\fxukquuap.exeC:\Windows\system32\fxukquuap.exe 1216 "C:\Windows\SysWOW64\vufacrggc.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\ssmadytnd.exeC:\Windows\system32\ssmadytnd.exe 1220 "C:\Windows\SysWOW64\fxukquuap.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\xtudmvztk.exeC:\Windows\system32\xtudmvztk.exe 1212 "C:\Windows\SysWOW64\ssmadytnd.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\tsnnpxqex.exeC:\Windows\system32\tsnnpxqex.exe 1224 "C:\Windows\SysWOW64\xtudmvztk.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\awxsyqbuk.exeC:\Windows\system32\awxsyqbuk.exe 1228 "C:\Windows\SysWOW64\tsnnpxqex.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\qquniedly.exeC:\Windows\system32\qquniedly.exe 1232 "C:\Windows\SysWOW64\awxsyqbuk.exe"23⤵
- Executes dropped EXE
PID:4644 -
C:\Windows\SysWOW64\aajtnufoz.exeC:\Windows\system32\aajtnufoz.exe 1240 "C:\Windows\SysWOW64\qquniedly.exe"24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Windows\SysWOW64\qqvtuebdt.exeC:\Windows\system32\qqvtuebdt.exe 1244 "C:\Windows\SysWOW64\aajtnufoz.exe"25⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\vgaoqsmfa.exeC:\Windows\system32\vgaoqsmfa.exe 1248 "C:\Windows\SysWOW64\qqvtuebdt.exe"26⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\lkajuxjah.exeC:\Windows\system32\lkajuxjah.exe 1252 "C:\Windows\SysWOW64\vgaoqsmfa.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:404 -
C:\Windows\SysWOW64\aaljapnxi.exeC:\Windows\system32\aaljapnxi.exe 1256 "C:\Windows\SysWOW64\lkajuxjah.exe"28⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\iihjnewhi.exeC:\Windows\system32\iihjnewhi.exe 1236 "C:\Windows\SysWOW64\aaljapnxi.exe"29⤵
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\qujjwknfj.exeC:\Windows\system32\qujjwknfj.exe 1016 "C:\Windows\SysWOW64\iihjnewhi.exe"30⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\fngefyxwx.exeC:\Windows\system32\fngefyxwx.exe 1268 "C:\Windows\SysWOW64\qujjwknfj.exe"31⤵
- Executes dropped EXE
PID:4136 -
C:\Windows\SysWOW64\nrqjpjamk.exeC:\Windows\system32\nrqjpjamk.exe 1272 "C:\Windows\SysWOW64\fngefyxwx.exe"32⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\vwyetwwyr.exeC:\Windows\system32\vwyetwwyr.exe 1264 "C:\Windows\SysWOW64\nrqjpjamk.exe"33⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\cdmenmgry.exeC:\Windows\system32\cdmenmgry.exe 1284 "C:\Windows\SysWOW64\vwyetwwyr.exe"34⤵
- Executes dropped EXE
PID:232 -
C:\Windows\SysWOW64\puphvumyz.exeC:\Windows\system32\puphvumyz.exe 1260 "C:\Windows\SysWOW64\cdmenmgry.exe"35⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\ddnkymdit.exeC:\Windows\system32\ddnkymdit.exe 1036 "C:\Windows\SysWOW64\puphvumyz.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1524 -
C:\Windows\SysWOW64\khxxifoyo.exeC:\Windows\system32\khxxifoyo.exe 1292 "C:\Windows\SysWOW64\ddnkymdit.exe"37⤵
- Executes dropped EXE
PID:3044 -
C:\Windows\SysWOW64\xgazrfmng.exeC:\Windows\system32\xgazrfmng.exe 1296 "C:\Windows\SysWOW64\khxxifoyo.exe"38⤵
- Executes dropped EXE
PID:3556 -
C:\Windows\SysWOW64\ktkpwjtsv.exeC:\Windows\system32\ktkpwjtsv.exe 1288 "C:\Windows\SysWOW64\xgazrfmng.exe"39⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\ygbfcnrfj.exeC:\Windows\system32\ygbfcnrfj.exe 1304 "C:\Windows\SysWOW64\ktkpwjtsv.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:912 -
C:\Windows\SysWOW64\iffcvlzej.exeC:\Windows\system32\iffcvlzej.exe 1312 "C:\Windows\SysWOW64\ygbfcnrfj.exe"41⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\vsxsapyjp.exeC:\Windows\system32\vsxsapyjp.exe 1308 "C:\Windows\SysWOW64\iffcvlzej.exe"42⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\afqaurcrj.exeC:\Windows\system32\afqaurcrj.exe 1040 "C:\Windows\SysWOW64\vsxsapyjp.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1416 -
C:\Windows\SysWOW64\kajsbldpx.exeC:\Windows\system32\kajsbldpx.exe 1324 "C:\Windows\SysWOW64\afqaurcrj.exe"44⤵
- Executes dropped EXE
PID:1896 -
C:\Windows\SysWOW64\xnbihpkcl.exeC:\Windows\system32\xnbihpkcl.exe 1320 "C:\Windows\SysWOW64\kajsbldpx.exe"45⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\kasyntjgs.exeC:\Windows\system32\kasyntjgs.exe 1344 "C:\Windows\SysWOW64\xnbihpkcl.exe"46⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\sfuleelem.exeC:\Windows\system32\sfuleelem.exe 1316 "C:\Windows\SysWOW64\kasyntjgs.exe"47⤵
- Executes dropped EXE
PID:3620 -
C:\Windows\SysWOW64\iyryosont.exeC:\Windows\system32\iyryosont.exe 1044 "C:\Windows\SysWOW64\sfuleelem.exe"48⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\sqhdtqqqu.exeC:\Windows\system32\sqhdtqqqu.exe 1332 "C:\Windows\SysWOW64\iyryosont.exe"49⤵
- Executes dropped EXE
PID:4992 -
C:\Windows\SysWOW64\iyadzatnn.exeC:\Windows\system32\iyadzatnn.exe 1336 "C:\Windows\SysWOW64\sqhdtqqqu.exe"50⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\vxvgiiruo.exeC:\Windows\system32\vxvgiiruo.exe 1352 "C:\Windows\SysWOW64\iyadzatnn.exe"51⤵
- Executes dropped EXE
PID:3664 -
C:\Windows\SysWOW64\fwzdshyuo.exeC:\Windows\system32\fwzdshyuo.exe 1340 "C:\Windows\SysWOW64\vxvgiiruo.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1792 -
C:\Windows\SysWOW64\smcgbhebp.exeC:\Windows\system32\smcgbhebp.exe 1144 "C:\Windows\SysWOW64\fwzdshyuo.exe"53⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\fhmehldgd.exeC:\Windows\system32\fhmehldgd.exe 1356 "C:\Windows\SysWOW64\smcgbhebp.exe"54⤵
- Executes dropped EXE
PID:2700 -
C:\Windows\SysWOW64\sudtnobsj.exeC:\Windows\system32\sudtnobsj.exe 1360 "C:\Windows\SysWOW64\fhmehldgd.exe"55⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\aynzeamie.exeC:\Windows\system32\aynzeamie.exe 1368 "C:\Windows\SysWOW64\sudtnobsj.exe"56⤵
- Executes dropped EXE
PID:3132 -
C:\Windows\SysWOW64\pgzhljixy.exeC:\Windows\system32\pgzhljixy.exe 1384 "C:\Windows\SysWOW64\aynzeamie.exe"57⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\SysWOW64\acazsmicl.exeC:\Windows\system32\acazsmicl.exe 1372 "C:\Windows\SysWOW64\pgzhljixy.exe"58⤵
- Executes dropped EXE
PID:4936 -
C:\Windows\SysWOW64\qslzzvmrf.exeC:\Windows\system32\qslzzvmrf.exe 1376 "C:\Windows\SysWOW64\acazsmicl.exe"59⤵
- Executes dropped EXE
PID:3328 -
C:\Windows\SysWOW64\anmrhqnos.exeC:\Windows\system32\anmrhqnos.exe 1328 "C:\Windows\SysWOW64\qslzzvmrf.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:916 -
C:\Windows\SysWOW64\kjfcwkwug.exeC:\Windows\system32\kjfcwkwug.exe 1392 "C:\Windows\SysWOW64\anmrhqnos.exe"61⤵
- Executes dropped EXE
PID:5104 -
C:\Windows\SysWOW64\sraujzxen.exeC:\Windows\system32\sraujzxen.exe 1056 "C:\Windows\SysWOW64\kjfcwkwug.exe"62⤵
- Executes dropped EXE
PID:5096 -
C:\Windows\SysWOW64\ivbpnncyu.exeC:\Windows\system32\ivbpnncyu.exe 1396 "C:\Windows\SysWOW64\sraujzxen.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3428 -
C:\Windows\SysWOW64\vudsvnzfv.exeC:\Windows\system32\vudsvnzfv.exe 1020 "C:\Windows\SysWOW64\ivbpnncyu.exe"64⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\kbpacedcp.exeC:\Windows\system32\kbpacedcp.exe 1404 "C:\Windows\SysWOW64\vudsvnzfv.exe"65⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\SysWOW64\vxqkkzezc.exeC:\Windows\system32\vxqkkzezc.exe 1408 "C:\Windows\SysWOW64\kbpacedcp.exe"66⤵PID:2832
-
C:\Windows\SysWOW64\hzwavdijq.exeC:\Windows\system32\hzwavdijq.exe 1400 "C:\Windows\SysWOW64\vxqkkzezc.exe"67⤵
- Drops file in System32 directory
PID:2608 -
C:\Windows\SysWOW64\umfpbhpoe.exeC:\Windows\system32\umfpbhpoe.exe 1412 "C:\Windows\SysWOW64\hzwavdijq.exe"68⤵
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\izxfhloak.exeC:\Windows\system32\izxfhloak.exe 1420 "C:\Windows\SysWOW64\umfpbhpoe.exe"69⤵
- Drops file in System32 directory
PID:4860 -
C:\Windows\SysWOW64\vpsixttil.exeC:\Windows\system32\vpsixttil.exe 1416 "C:\Windows\SysWOW64\izxfhloak.exe"70⤵PID:388
-
C:\Windows\SysWOW64\fihncjnkm.exeC:\Windows\system32\fihncjnkm.exe 1428 "C:\Windows\SysWOW64\vpsixttil.exe"71⤵PID:4156
-
C:\Windows\SysWOW64\vxtvjtrzg.exeC:\Windows\system32\vxtvjtrzg.exe 1432 "C:\Windows\SysWOW64\fihncjnkm.exe"72⤵PID:3728
-
C:\Windows\SysWOW64\faqgwwxbs.exeC:\Windows\system32\faqgwwxbs.exe 1436 "C:\Windows\SysWOW64\vxtvjtrzg.exe"73⤵PID:4836
-
C:\Windows\SysWOW64\qpuyyisch.exeC:\Windows\system32\qpuyyisch.exe 1440 "C:\Windows\SysWOW64\faqgwwxbs.exe"74⤵
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Windows\SysWOW64\arkbtlhwb.exeC:\Windows\system32\arkbtlhwb.exe 1444 "C:\Windows\SysWOW64\qpuyyisch.exe"75⤵
- Drops file in System32 directory
PID:1232 -
C:\Windows\SysWOW64\nbqlwkzgv.exeC:\Windows\system32\nbqlwkzgv.exe 1424 "C:\Windows\SysWOW64\arkbtlhwb.exe"76⤵PID:3244
-
C:\Windows\SysWOW64\xlgwjonii.exeC:\Windows\system32\xlgwjonii.exe 1452 "C:\Windows\SysWOW64\nbqlwkzgv.exe"77⤵PID:1580
-
C:\Windows\SysWOW64\cyxlprmnw.exeC:\Windows\system32\cyxlprmnw.exe 1380 "C:\Windows\SysWOW64\xlgwjonii.exe"78⤵PID:640
-
C:\Windows\SysWOW64\pidosjmxq.exeC:\Windows\system32\pidosjmxq.exe 1456 "C:\Windows\SysWOW64\cyxlprmnw.exe"79⤵PID:4248
-
C:\Windows\SysWOW64\xqromgnqx.exeC:\Windows\system32\xqromgnqx.exe 1300 "C:\Windows\SysWOW64\pidosjmxq.exe"80⤵PID:3308
-
C:\Windows\SysWOW64\mxcotqrer.exeC:\Windows\system32\mxcotqrer.exe 1472 "C:\Windows\SysWOW64\xqromgnqx.exe"81⤵PID:3976
-
C:\Windows\SysWOW64\xqsuygths.exeC:\Windows\system32\xqsuygths.exe 1464 "C:\Windows\SysWOW64\mxcotqrer.exe"82⤵
- System Location Discovery: System Language Discovery
PID:4056 -
C:\Windows\SysWOW64\njppiuvyg.exeC:\Windows\system32\njppiuvyg.exe 1468 "C:\Windows\SysWOW64\xqsuygths.exe"83⤵PID:4100
-
C:\Windows\SysWOW64\awgenyulm.exeC:\Windows\system32\awgenyulm.exe 1480 "C:\Windows\SysWOW64\njppiuvyg.exe"84⤵PID:4012
-
C:\Windows\SysWOW64\kvkcywblm.exeC:\Windows\system32\kvkcywblm.exe 1484 "C:\Windows\SysWOW64\awgenyulm.exe"85⤵PID:3144
-
C:\Windows\SysWOW64\xunegfhsn.exeC:\Windows\system32\xunegfhsn.exe 1476 "C:\Windows\SysWOW64\kvkcywblm.exe"86⤵
- Drops file in System32 directory
PID:4140 -
C:\Windows\SysWOW64\khxumjgxb.exeC:\Windows\system32\khxumjgxb.exe 1492 "C:\Windows\SysWOW64\xunegfhsn.exe"87⤵PID:5040
-
C:\Windows\SysWOW64\xuokseeki.exeC:\Windows\system32\xuokseeki.exe 1500 "C:\Windows\SysWOW64\khxumjgxb.exe"88⤵PID:3520
-
C:\Windows\SysWOW64\ksjnjnkrj.exeC:\Windows\system32\ksjnjnkrj.exe 1496 "C:\Windows\SysWOW64\xuokseeki.exe"89⤵PID:2012
-
C:\Windows\SysWOW64\xfbcoqjwx.exeC:\Windows\system32\xfbcoqjwx.exe 1504 "C:\Windows\SysWOW64\ksjnjnkrj.exe"90⤵PID:4840
-
C:\Windows\SysWOW64\hiqnctpyj.exeC:\Windows\system32\hiqnctpyj.exe 1520 "C:\Windows\SysWOW64\xfbcoqjwx.exe"91⤵PID:1500
-
C:\Windows\SysWOW64\urwxflpid.exeC:\Windows\system32\urwxflpid.exe 1508 "C:\Windows\SysWOW64\hiqnctpyj.exe"92⤵PID:5092
-
C:\Windows\SysWOW64\fqavpkxil.exeC:\Windows\system32\fqavpkxil.exe 1512 "C:\Windows\SysWOW64\urwxflpid.exe"93⤵PID:4296
-
C:\Windows\SysWOW64\spdxyscpe.exeC:\Windows\system32\spdxyscpe.exe 1516 "C:\Windows\SysWOW64\fqavpkxil.exe"94⤵
- Drops file in System32 directory
PID:2716 -
C:\Windows\SysWOW64\efyaoaawf.exeC:\Windows\system32\efyaoaawf.exe 1532 "C:\Windows\SysWOW64\spdxyscpe.exe"95⤵PID:1836
-
C:\Windows\SysWOW64\spedraahh.exeC:\Windows\system32\spedraahh.exe 1524 "C:\Windows\SysWOW64\efyaoaawf.exe"96⤵PID:3948
-
C:\Windows\SysWOW64\czunfvgjt.exeC:\Windows\system32\czunfvgjt.exe 1528 "C:\Windows\SysWOW64\spedraahh.exe"97⤵PID:3256
-
C:\Windows\SysWOW64\pmldkzfna.exeC:\Windows\system32\pmldkzfna.exe 1540 "C:\Windows\SysWOW64\czunfvgjt.exe"98⤵
- Drops file in System32 directory
PID:1352 -
C:\Windows\SysWOW64\czvtqcmao.exeC:\Windows\system32\czvtqcmao.exe 1536 "C:\Windows\SysWOW64\pmldkzfna.exe"99⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4500 -
C:\Windows\SysWOW64\myhqbblao.exeC:\Windows\system32\myhqbblao.exe 1488 "C:\Windows\SysWOW64\czvtqcmao.exe"100⤵PID:3220
-
C:\Windows\SysWOW64\clhlfgqmv.exeC:\Windows\system32\clhlfgqmv.exe 1448 "C:\Windows\SysWOW64\myhqbblao.exe"101⤵PID:3784
-
C:\Windows\SysWOW64\pyzjkkpzj.exeC:\Windows\system32\pyzjkkpzj.exe 1548 "C:\Windows\SysWOW64\clhlfgqmv.exe"102⤵PID:364
-
C:\Windows\SysWOW64\atstafpwx.exeC:\Windows\system32\atstafpwx.exe 1460 "C:\Windows\SysWOW64\pyzjkkpzj.exe"103⤵PID:1440
-
C:\Windows\SysWOW64\nkuwjnvey.exeC:\Windows\system32\nkuwjnvey.exe 1556 "C:\Windows\SysWOW64\atstafpwx.exe"104⤵PID:2656
-
C:\Windows\SysWOW64\xukgwqbgk.exeC:\Windows\system32\xukgwqbgk.exe 1560 "C:\Windows\SysWOW64\nkuwjnvey.exe"105⤵PID:4488
-
C:\Windows\SysWOW64\nvhoxrzyf.exeC:\Windows\system32\nvhoxrzyf.exe 1572 "C:\Windows\SysWOW64\xukgwqbgk.exe"106⤵PID:1552
-
C:\Windows\SysWOW64\xywzkugas.exeC:\Windows\system32\xywzkugas.exe 1568 "C:\Windows\SysWOW64\nvhoxrzyf.exe"107⤵PID:2316
-
C:\Windows\SysWOW64\klgoqyeeg.exeC:\Windows\system32\klgoqyeeg.exe 1596 "C:\Windows\SysWOW64\xywzkugas.exe"108⤵
- Drops file in System32 directory
PID:4376 -
C:\Windows\SysWOW64\ussmixmeg.exeC:\Windows\system32\ussmixmeg.exe 1576 "C:\Windows\SysWOW64\klgoqyeeg.exe"109⤵
- System Location Discovery: System Language Discovery
PID:4736 -
C:\Windows\SysWOW64\hfbcoblru.exeC:\Windows\system32\hfbcoblru.exe 1580 "C:\Windows\SysWOW64\ussmixmeg.exe"110⤵
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\uweexbqyn.exeC:\Windows\system32\uweexbqyn.exe 1564 "C:\Windows\SysWOW64\hfbcoblru.exe"111⤵PID:3376
-
C:\Windows\SysWOW64\hjocdfpdb.exeC:\Windows\system32\hjocdfpdb.exe 1588 "C:\Windows\SysWOW64\uweexbqyn.exe"112⤵
- System Location Discovery: System Language Discovery
PID:1204 -
C:\Windows\SysWOW64\rqazndxdb.exeC:\Windows\system32\rqazndxdb.exe 1584 "C:\Windows\SysWOW64\hjocdfpdb.exe"113⤵PID:1044
-
C:\Windows\SysWOW64\hrxhomnuw.exeC:\Windows\system32\hrxhomnuw.exe 1592 "C:\Windows\SysWOW64\rqazndxdb.exe"114⤵PID:872
-
C:\Windows\SysWOW64\smqswhvaj.exeC:\Windows\system32\smqswhvaj.exe 1604 "C:\Windows\SysWOW64\hrxhomnuw.exe"115⤵PID:620
-
C:\Windows\SysWOW64\fgwhhlajx.exeC:\Windows\system32\fgwhhlajx.exe 1608 "C:\Windows\SysWOW64\smqswhvaj.exe"116⤵PID:1460
-
C:\Windows\SysWOW64\stnxvpyol.exeC:\Windows\system32\stnxvpyol.exe 1600 "C:\Windows\SysWOW64\fgwhhlajx.exe"117⤵PID:3636
-
C:\Windows\SysWOW64\carvfogol.exeC:\Windows\system32\carvfogol.exe 1616 "C:\Windows\SysWOW64\stnxvpyol.exe"118⤵PID:4336
-
C:\Windows\SysWOW64\pkyfingyf.exeC:\Windows\system32\pkyfingyf.exe 1620 "C:\Windows\SysWOW64\carvfogol.exe"119⤵PID:1796
-
C:\Windows\SysWOW64\caairndfg.exeC:\Windows\system32\caairndfg.exe 1624 "C:\Windows\SysWOW64\pkyfingyf.exe"120⤵PID:5000
-
C:\Windows\SysWOW64\mlqsershs.exeC:\Windows\system32\mlqsershs.exe 1628 "C:\Windows\SysWOW64\caairndfg.exe"121⤵PID:540
-
C:\Windows\SysWOW64\zyzikurmh.exeC:\Windows\system32\zyzikurmh.exe 1632 "C:\Windows\SysWOW64\mlqsershs.exe"122⤵PID:4108
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-