Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
e212c2808853acf1583ddbe702b9d568
-
SHA1
5b527455ed87cae7f5cd0829efd6033970bf960b
-
SHA256
ed3cf60c3386be62fca0bbda630d283ea4188616872204c208ec81091ee134cf
-
SHA512
7217f258e585c0e7447b5bcc4ca584084c97b734bc2509f87fae9d611198205b7969c71a4c18597c3833652667c6d809789b9599c36803cdc3c126f1a0a59a8c
-
SSDEEP
24576:RGcgOHTzNxOcBOk2AHiZuNhoQshIbVOLnQ19vkudmKfLFRfzay2BEwoeXYRl:RngO/DOgOYWurooVYuFdm8ZRfkE4Yr
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2824 vvom.exe 2892 enbc.exe 2816 tvlf.exe 1596 qpgs.exe 2432 vfln.exe 1764 pdbi.exe 2100 ryek.exe 1724 rfuq.exe 2896 ghmd.exe 1520 ygpa.exe 3024 vewa.exe 1772 udtl.exe 552 upgl.exe 1060 todv.exe 2528 iiai.exe 2204 qizj.exe 2184 alot.exe 2640 fyib.exe 1052 aepd.exe 1100 ieod.exe 2160 wfhq.exe 1276 hmlo.exe 1572 oivb.exe 764 eyhj.exe 588 vqsl.exe 2776 fpwj.exe 2984 vuee.exe 1752 feuo.exe 2556 svor.exe 1652 cfmb.exe 2280 meqz.exe 2560 tmlz.exe 2620 jfim.exe 1948 tfmj.exe 2980 juyr.exe 3016 tukp.exe 1784 goqe.exe 1180 qvuc.exe 2288 forp.exe 1980 pnvm.exe 888 chjc.exe 2348 pcsr.exe 2224 ctnu.exe 2652 mszs.exe 1912 wcpc.exe 1660 gbtz.exe 3056 qeqk.exe 2716 dzaz.exe 2468 itgp.exe 1740 sevz.exe 988 iidu.exe 2788 uovp.exe 2908 fjoi.exe 3032 raqk.exe 3008 bkgv.exe 3052 obbx.exe 1412 euxk.exe 2364 lfwp.exe 2156 bsek.exe 1484 kgfi.exe 1828 xwak.exe 2588 nqwx.exe 1200 xpjv.exe 1720 kcst.exe -
Loads dropped DLL 64 IoCs
pid Process 2124 e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe 2124 e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe 2824 vvom.exe 2824 vvom.exe 2892 enbc.exe 2892 enbc.exe 2816 tvlf.exe 2816 tvlf.exe 1596 qpgs.exe 1596 qpgs.exe 2432 vfln.exe 2432 vfln.exe 1764 pdbi.exe 1764 pdbi.exe 2100 ryek.exe 2100 ryek.exe 576 lxtn.exe 576 lxtn.exe 2896 ghmd.exe 2896 ghmd.exe 1520 ygpa.exe 1520 ygpa.exe 3024 vewa.exe 3024 vewa.exe 1772 udtl.exe 1772 udtl.exe 552 upgl.exe 552 upgl.exe 1060 todv.exe 1060 todv.exe 2528 iiai.exe 2528 iiai.exe 2204 qizj.exe 2204 qizj.exe 2184 alot.exe 2184 alot.exe 2640 fyib.exe 2640 fyib.exe 1052 aepd.exe 1052 aepd.exe 1100 ieod.exe 1100 ieod.exe 2160 wfhq.exe 2160 wfhq.exe 1276 hmlo.exe 1276 hmlo.exe 1572 oivb.exe 1572 oivb.exe 764 eyhj.exe 764 eyhj.exe 588 vqsl.exe 588 vqsl.exe 2776 fpwj.exe 2776 fpwj.exe 2984 vuee.exe 2984 vuee.exe 1752 feuo.exe 1752 feuo.exe 2556 svor.exe 2556 svor.exe 1652 cfmb.exe 1652 cfmb.exe 2280 meqz.exe 2280 meqz.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cqrw.exe qapu.exe File created C:\Windows\SysWOW64\sevz.exe itgp.exe File created C:\Windows\SysWOW64\ylbm.exe luyj.exe File opened for modification C:\Windows\SysWOW64\ftef.exe sryp.exe File opened for modification C:\Windows\SysWOW64\robd.exe exgb.exe File opened for modification C:\Windows\SysWOW64\ifbo.exe vogl.exe File opened for modification C:\Windows\SysWOW64\tcss.exe jdon.exe File created C:\Windows\SysWOW64\alot.exe qizj.exe File opened for modification C:\Windows\SysWOW64\xpjv.exe nqwx.exe File created C:\Windows\SysWOW64\wyia.exe nsik.exe File opened for modification C:\Windows\SysWOW64\nmad.exe anfb.exe File opened for modification C:\Windows\SysWOW64\wcgr.exe jelp.exe File created C:\Windows\SysWOW64\jium.exe wssj.exe File opened for modification C:\Windows\SysWOW64\tukp.exe juyr.exe File opened for modification C:\Windows\SysWOW64\dkiu.exe ricf.exe File created C:\Windows\SysWOW64\rjrh.exe elwf.exe File opened for modification C:\Windows\SysWOW64\mzio.exe zjfm.exe File created C:\Windows\SysWOW64\ltax.exe ycfv.exe File created C:\Windows\SysWOW64\omic.exe bwfa.exe File opened for modification C:\Windows\SysWOW64\mxvc.exe zzah.exe File opened for modification C:\Windows\SysWOW64\dzaz.exe qeqk.exe File created C:\Windows\SysWOW64\nidu.exe ducw.exe File created C:\Windows\SysWOW64\dlzd.exe txyo.exe File created C:\Windows\SysWOW64\rrya.exe hdyc.exe File created C:\Windows\SysWOW64\upnv.exe hnhf.exe File created C:\Windows\SysWOW64\zamn.exe mkrk.exe File opened for modification C:\Windows\SysWOW64\kufz.exe xszk.exe File created C:\Windows\SysWOW64\fezv.exe sgxt.exe File created C:\Windows\SysWOW64\lpcg.exe yvwy.exe File opened for modification C:\Windows\SysWOW64\lggp.exe ylxz.exe File opened for modification C:\Windows\SysWOW64\whpp.exe jium.exe File opened for modification C:\Windows\SysWOW64\ekpo.exe riiy.exe File created C:\Windows\SysWOW64\cwjl.exe pfgj.exe File created C:\Windows\SysWOW64\bygm.exe ohlk.exe File created C:\Windows\SysWOW64\jewe.exe vrmo.exe File created C:\Windows\SysWOW64\ugtl.exe ienv.exe File created C:\Windows\SysWOW64\ofyi.exe evjy.exe File created C:\Windows\SysWOW64\wdce.exe npbp.exe File opened for modification C:\Windows\SysWOW64\hwhl.exe uymi.exe File opened for modification C:\Windows\SysWOW64\vdvz.exe mxvc.exe File opened for modification C:\Windows\SysWOW64\vfoq.exe jhtn.exe File created C:\Windows\SysWOW64\ilgq.exe vmln.exe File opened for modification C:\Windows\SysWOW64\ygzt.exe lpeq.exe File created C:\Windows\SysWOW64\ljvh.exe ylbm.exe File opened for modification C:\Windows\SysWOW64\dxlw.exe qcug.exe File opened for modification C:\Windows\SysWOW64\lgaa.exe yqfy.exe File opened for modification C:\Windows\SysWOW64\izlz.exe snle.exe File created C:\Windows\SysWOW64\llii.exe yvnf.exe File opened for modification C:\Windows\SysWOW64\lpcg.exe yvwy.exe File opened for modification C:\Windows\SysWOW64\oxlx.exe fjka.exe File created C:\Windows\SysWOW64\nvtf.exe awyc.exe File opened for modification C:\Windows\SysWOW64\rqsl.exe hcro.exe File opened for modification C:\Windows\SysWOW64\fjoi.exe uovp.exe File created C:\Windows\SysWOW64\rdra.exe efpy.exe File created C:\Windows\SysWOW64\acdg.exe nmad.exe File opened for modification C:\Windows\SysWOW64\ztwz.exe pfec.exe File opened for modification C:\Windows\SysWOW64\nhdr.exe dfog.exe File created C:\Windows\SysWOW64\chlg.exe qqqd.exe File opened for modification C:\Windows\SysWOW64\svor.exe feuo.exe File created C:\Windows\SysWOW64\ynfi.exe lpcg.exe File opened for modification C:\Windows\SysWOW64\xatq.exe kyna.exe File created C:\Windows\SysWOW64\bjmp.exe okrn.exe File created C:\Windows\SysWOW64\jlke.exe wrdx.exe File created C:\Windows\SysWOW64\urew.exe lceg.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djkj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qgle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqsl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lknq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgms.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zazu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdyx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awyc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mlhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dscn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ylbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ghdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxfu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hlws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yssr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language enbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lkdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wumf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ienv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uymi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qeqk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wihm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ynfi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mkrk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mijk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pueo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uczl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fwrz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcqn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rzta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zdkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gycf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kbeh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hewo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gqbu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eskf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlpu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xier.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zamn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language novz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otmx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language waij.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2124 e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe 2824 vvom.exe 2892 enbc.exe 2816 tvlf.exe 1596 qpgs.exe 2432 vfln.exe 1764 pdbi.exe 2100 ryek.exe 576 lxtn.exe 2896 ghmd.exe 1520 ygpa.exe 3024 vewa.exe 1772 udtl.exe 552 upgl.exe 1060 todv.exe 2528 iiai.exe 2204 qizj.exe 2184 alot.exe 2640 fyib.exe 1052 aepd.exe 1100 ieod.exe 2160 wfhq.exe 1276 hmlo.exe 1572 oivb.exe 764 eyhj.exe 588 vqsl.exe 2776 fpwj.exe 2984 vuee.exe 1752 feuo.exe 2556 svor.exe 1652 cfmb.exe 2280 meqz.exe 2560 tmlz.exe 2620 jfim.exe 1948 tfmj.exe 2980 juyr.exe 3016 tukp.exe 1784 goqe.exe 1180 qvuc.exe 2288 forp.exe 1980 pnvm.exe 888 chjc.exe 2348 pcsr.exe 2224 ctnu.exe 2652 mszs.exe 1912 wcpc.exe 1660 gbtz.exe 3056 qeqk.exe 2716 dzaz.exe 2468 itgp.exe 1740 sevz.exe 988 iidu.exe 2788 uovp.exe 2908 fjoi.exe 3032 raqk.exe 3008 bkgv.exe 3052 obbx.exe 1412 euxk.exe 2364 lfwp.exe 2156 bsek.exe 1484 kgfi.exe 1828 xwak.exe 2588 nqwx.exe 1200 xpjv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2824 2124 e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2824 2124 e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2824 2124 e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe 30 PID 2124 wrote to memory of 2824 2124 e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2892 2824 vvom.exe 31 PID 2824 wrote to memory of 2892 2824 vvom.exe 31 PID 2824 wrote to memory of 2892 2824 vvom.exe 31 PID 2824 wrote to memory of 2892 2824 vvom.exe 31 PID 2892 wrote to memory of 2816 2892 enbc.exe 32 PID 2892 wrote to memory of 2816 2892 enbc.exe 32 PID 2892 wrote to memory of 2816 2892 enbc.exe 32 PID 2892 wrote to memory of 2816 2892 enbc.exe 32 PID 2816 wrote to memory of 1596 2816 tvlf.exe 34 PID 2816 wrote to memory of 1596 2816 tvlf.exe 34 PID 2816 wrote to memory of 1596 2816 tvlf.exe 34 PID 2816 wrote to memory of 1596 2816 tvlf.exe 34 PID 1596 wrote to memory of 2432 1596 qpgs.exe 35 PID 1596 wrote to memory of 2432 1596 qpgs.exe 35 PID 1596 wrote to memory of 2432 1596 qpgs.exe 35 PID 1596 wrote to memory of 2432 1596 qpgs.exe 35 PID 2432 wrote to memory of 1764 2432 vfln.exe 36 PID 2432 wrote to memory of 1764 2432 vfln.exe 36 PID 2432 wrote to memory of 1764 2432 vfln.exe 36 PID 2432 wrote to memory of 1764 2432 vfln.exe 36 PID 1764 wrote to memory of 2100 1764 pdbi.exe 37 PID 1764 wrote to memory of 2100 1764 pdbi.exe 37 PID 1764 wrote to memory of 2100 1764 pdbi.exe 37 PID 1764 wrote to memory of 2100 1764 pdbi.exe 37 PID 2100 wrote to memory of 1724 2100 ryek.exe 38 PID 2100 wrote to memory of 1724 2100 ryek.exe 38 PID 2100 wrote to memory of 1724 2100 ryek.exe 38 PID 2100 wrote to memory of 1724 2100 ryek.exe 38 PID 576 wrote to memory of 2896 576 lxtn.exe 40 PID 576 wrote to memory of 2896 576 lxtn.exe 40 PID 576 wrote to memory of 2896 576 lxtn.exe 40 PID 576 wrote to memory of 2896 576 lxtn.exe 40 PID 2896 wrote to memory of 1520 2896 ghmd.exe 41 PID 2896 wrote to memory of 1520 2896 ghmd.exe 41 PID 2896 wrote to memory of 1520 2896 ghmd.exe 41 PID 2896 wrote to memory of 1520 2896 ghmd.exe 41 PID 1520 wrote to memory of 3024 1520 ygpa.exe 42 PID 1520 wrote to memory of 3024 1520 ygpa.exe 42 PID 1520 wrote to memory of 3024 1520 ygpa.exe 42 PID 1520 wrote to memory of 3024 1520 ygpa.exe 42 PID 3024 wrote to memory of 1772 3024 vewa.exe 43 PID 3024 wrote to memory of 1772 3024 vewa.exe 43 PID 3024 wrote to memory of 1772 3024 vewa.exe 43 PID 3024 wrote to memory of 1772 3024 vewa.exe 43 PID 1772 wrote to memory of 552 1772 udtl.exe 44 PID 1772 wrote to memory of 552 1772 udtl.exe 44 PID 1772 wrote to memory of 552 1772 udtl.exe 44 PID 1772 wrote to memory of 552 1772 udtl.exe 44 PID 552 wrote to memory of 1060 552 upgl.exe 45 PID 552 wrote to memory of 1060 552 upgl.exe 45 PID 552 wrote to memory of 1060 552 upgl.exe 45 PID 552 wrote to memory of 1060 552 upgl.exe 45 PID 1060 wrote to memory of 2528 1060 todv.exe 46 PID 1060 wrote to memory of 2528 1060 todv.exe 46 PID 1060 wrote to memory of 2528 1060 todv.exe 46 PID 1060 wrote to memory of 2528 1060 todv.exe 46 PID 2528 wrote to memory of 2204 2528 iiai.exe 47 PID 2528 wrote to memory of 2204 2528 iiai.exe 47 PID 2528 wrote to memory of 2204 2528 iiai.exe 47 PID 2528 wrote to memory of 2204 2528 iiai.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\vvom.exeC:\Windows\system32\vvom.exe 620 "C:\Users\Admin\AppData\Local\Temp\e212c2808853acf1583ddbe702b9d568_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\enbc.exeC:\Windows\system32\enbc.exe 612 "C:\Windows\SysWOW64\vvom.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\tvlf.exeC:\Windows\system32\tvlf.exe 616 "C:\Windows\SysWOW64\enbc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\qpgs.exeC:\Windows\system32\qpgs.exe 624 "C:\Windows\SysWOW64\tvlf.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\vfln.exeC:\Windows\system32\vfln.exe 632 "C:\Windows\SysWOW64\qpgs.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\pdbi.exeC:\Windows\system32\pdbi.exe 628 "C:\Windows\SysWOW64\vfln.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\ryek.exeC:\Windows\system32\ryek.exe 636 "C:\Windows\SysWOW64\pdbi.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\rfuq.exeC:\Windows\system32\rfuq.exe 644 "C:\Windows\SysWOW64\ryek.exe"9⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\lxtn.exeC:\Windows\system32\lxtn.exe 668 "C:\Windows\SysWOW64\rfuq.exe"10⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\ghmd.exeC:\Windows\system32\ghmd.exe 736 "C:\Windows\SysWOW64\lxtn.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\ygpa.exeC:\Windows\system32\ygpa.exe 704 "C:\Windows\SysWOW64\ghmd.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\vewa.exeC:\Windows\system32\vewa.exe 652 "C:\Windows\SysWOW64\ygpa.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\udtl.exeC:\Windows\system32\udtl.exe 708 "C:\Windows\SysWOW64\vewa.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\upgl.exeC:\Windows\system32\upgl.exe 648 "C:\Windows\SysWOW64\udtl.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\todv.exeC:\Windows\system32\todv.exe 716 "C:\Windows\SysWOW64\upgl.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\iiai.exeC:\Windows\system32\iiai.exe 764 "C:\Windows\SysWOW64\todv.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\qizj.exeC:\Windows\system32\qizj.exe 660 "C:\Windows\SysWOW64\iiai.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\alot.exeC:\Windows\system32\alot.exe 760 "C:\Windows\SysWOW64\qizj.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\fyib.exeC:\Windows\system32\fyib.exe 692 "C:\Windows\SysWOW64\alot.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\aepd.exeC:\Windows\system32\aepd.exe 772 "C:\Windows\SysWOW64\fyib.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1052 -
C:\Windows\SysWOW64\ieod.exeC:\Windows\system32\ieod.exe 776 "C:\Windows\SysWOW64\aepd.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Windows\SysWOW64\wfhq.exeC:\Windows\system32\wfhq.exe 784 "C:\Windows\SysWOW64\ieod.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2160 -
C:\Windows\SysWOW64\hmlo.exeC:\Windows\system32\hmlo.exe 780 "C:\Windows\SysWOW64\wfhq.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1276 -
C:\Windows\SysWOW64\oivb.exeC:\Windows\system32\oivb.exe 756 "C:\Windows\SysWOW64\hmlo.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Windows\SysWOW64\eyhj.exeC:\Windows\system32\eyhj.exe 788 "C:\Windows\SysWOW64\oivb.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:764 -
C:\Windows\SysWOW64\vqsl.exeC:\Windows\system32\vqsl.exe 796 "C:\Windows\SysWOW64\eyhj.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:588 -
C:\Windows\SysWOW64\fpwj.exeC:\Windows\system32\fpwj.exe 676 "C:\Windows\SysWOW64\vqsl.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\vuee.exeC:\Windows\system32\vuee.exe 800 "C:\Windows\SysWOW64\fpwj.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\feuo.exeC:\Windows\system32\feuo.exe 808 "C:\Windows\SysWOW64\vuee.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\svor.exeC:\Windows\system32\svor.exe 820 "C:\Windows\SysWOW64\feuo.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2556 -
C:\Windows\SysWOW64\cfmb.exeC:\Windows\system32\cfmb.exe 804 "C:\Windows\SysWOW64\svor.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\meqz.exeC:\Windows\system32\meqz.exe 812 "C:\Windows\SysWOW64\cfmb.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\tmlz.exeC:\Windows\system32\tmlz.exe 816 "C:\Windows\SysWOW64\meqz.exe"34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\jfim.exeC:\Windows\system32\jfim.exe 836 "C:\Windows\SysWOW64\tmlz.exe"35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\tfmj.exeC:\Windows\system32\tfmj.exe 824 "C:\Windows\SysWOW64\jfim.exe"36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\juyr.exeC:\Windows\system32\juyr.exe 832 "C:\Windows\SysWOW64\tfmj.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\tukp.exeC:\Windows\system32\tukp.exe 840 "C:\Windows\SysWOW64\juyr.exe"38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\goqe.exeC:\Windows\system32\goqe.exe 792 "C:\Windows\SysWOW64\tukp.exe"39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\qvuc.exeC:\Windows\system32\qvuc.exe 848 "C:\Windows\SysWOW64\goqe.exe"40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1180 -
C:\Windows\SysWOW64\forp.exeC:\Windows\system32\forp.exe 828 "C:\Windows\SysWOW64\qvuc.exe"41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\pnvm.exeC:\Windows\system32\pnvm.exe 852 "C:\Windows\SysWOW64\forp.exe"42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\chjc.exeC:\Windows\system32\chjc.exe 856 "C:\Windows\SysWOW64\pnvm.exe"43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\pcsr.exeC:\Windows\system32\pcsr.exe 844 "C:\Windows\SysWOW64\chjc.exe"44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\ctnu.exeC:\Windows\system32\ctnu.exe 860 "C:\Windows\SysWOW64\pcsr.exe"45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\mszs.exeC:\Windows\system32\mszs.exe 872 "C:\Windows\SysWOW64\ctnu.exe"46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\wcpc.exeC:\Windows\system32\wcpc.exe 864 "C:\Windows\SysWOW64\mszs.exe"47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Windows\SysWOW64\gbtz.exeC:\Windows\system32\gbtz.exe 880 "C:\Windows\SysWOW64\wcpc.exe"48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\qeqk.exeC:\Windows\system32\qeqk.exe 876 "C:\Windows\SysWOW64\gbtz.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\dzaz.exeC:\Windows\system32\dzaz.exe 884 "C:\Windows\SysWOW64\qeqk.exe"50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\itgp.exeC:\Windows\system32\itgp.exe 888 "C:\Windows\SysWOW64\dzaz.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\sevz.exeC:\Windows\system32\sevz.exe 892 "C:\Windows\SysWOW64\itgp.exe"52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\iidu.exeC:\Windows\system32\iidu.exe 868 "C:\Windows\SysWOW64\sevz.exe"53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\uovp.exeC:\Windows\system32\uovp.exe 904 "C:\Windows\SysWOW64\iidu.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\fjoi.exeC:\Windows\system32\fjoi.exe 908 "C:\Windows\SysWOW64\uovp.exe"55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\raqk.exeC:\Windows\system32\raqk.exe 900 "C:\Windows\SysWOW64\fjoi.exe"56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\bkgv.exeC:\Windows\system32\bkgv.exe 896 "C:\Windows\SysWOW64\raqk.exe"57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\obbx.exeC:\Windows\system32\obbx.exe 920 "C:\Windows\SysWOW64\bkgv.exe"58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\euxk.exeC:\Windows\system32\euxk.exe 924 "C:\Windows\SysWOW64\obbx.exe"59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Windows\SysWOW64\lfwp.exeC:\Windows\system32\lfwp.exe 916 "C:\Windows\SysWOW64\euxk.exe"60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\bsek.exeC:\Windows\system32\bsek.exe 912 "C:\Windows\SysWOW64\lfwp.exe"61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Windows\SysWOW64\kgfi.exeC:\Windows\system32\kgfi.exe 932 "C:\Windows\SysWOW64\bsek.exe"62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\xwak.exeC:\Windows\system32\xwak.exe 928 "C:\Windows\SysWOW64\kgfi.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1828 -
C:\Windows\SysWOW64\nqwx.exeC:\Windows\system32\nqwx.exe 944 "C:\Windows\SysWOW64\xwak.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Windows\SysWOW64\xpjv.exeC:\Windows\system32\xpjv.exe 940 "C:\Windows\SysWOW64\nqwx.exe"65⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1200 -
C:\Windows\SysWOW64\kcst.exeC:\Windows\system32\kcst.exe 952 "C:\Windows\SysWOW64\xpjv.exe"66⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\umiv.exeC:\Windows\system32\umiv.exe 936 "C:\Windows\SysWOW64\kcst.exe"67⤵PID:1568
-
C:\Windows\SysWOW64\mxvv.exeC:\Windows\system32\mxvv.exe 956 "C:\Windows\SysWOW64\umiv.exe"68⤵PID:1616
-
C:\Windows\SysWOW64\zoqy.exeC:\Windows\system32\zoqy.exe 960 "C:\Windows\SysWOW64\mxvv.exe"69⤵PID:2860
-
C:\Windows\SysWOW64\jcqn.exeC:\Windows\system32\jcqn.exe 948 "C:\Windows\SysWOW64\zoqy.exe"70⤵PID:1424
-
C:\Windows\SysWOW64\wstq.exeC:\Windows\system32\wstq.exe 968 "C:\Windows\SysWOW64\jcqn.exe"71⤵PID:1440
-
C:\Windows\SysWOW64\jrot.exeC:\Windows\system32\jrot.exe 972 "C:\Windows\SysWOW64\wstq.exe"72⤵PID:2688
-
C:\Windows\SysWOW64\vhjv.exeC:\Windows\system32\vhjv.exe 976 "C:\Windows\SysWOW64\jrot.exe"73⤵PID:2240
-
C:\Windows\SysWOW64\fsgg.exeC:\Windows\system32\fsgg.exe 984 "C:\Windows\SysWOW64\vhjv.exe"74⤵PID:2344
-
C:\Windows\SysWOW64\sibi.exeC:\Windows\system32\sibi.exe 980 "C:\Windows\SysWOW64\fsgg.exe"75⤵PID:2676
-
C:\Windows\SysWOW64\fzwl.exeC:\Windows\system32\fzwl.exe 992 "C:\Windows\SysWOW64\sibi.exe"76⤵PID:1732
-
C:\Windows\SysWOW64\sxzo.exeC:\Windows\system32\sxzo.exe 1004 "C:\Windows\SysWOW64\fzwl.exe"77⤵PID:1000
-
C:\Windows\SysWOW64\clrd.exeC:\Windows\system32\clrd.exe 996 "C:\Windows\SysWOW64\sxzo.exe"78⤵PID:2388
-
C:\Windows\SysWOW64\pcug.exeC:\Windows\system32\pcug.exe 988 "C:\Windows\SysWOW64\clrd.exe"79⤵PID:2268
-
C:\Windows\SysWOW64\cspi.exeC:\Windows\system32\cspi.exe 1000 "C:\Windows\SysWOW64\pcug.exe"80⤵PID:3048
-
C:\Windows\SysWOW64\orkl.exeC:\Windows\system32\orkl.exe 1008 "C:\Windows\SysWOW64\cspi.exe"81⤵PID:2104
-
C:\Windows\SysWOW64\bhmo.exeC:\Windows\system32\bhmo.exe 1012 "C:\Windows\SysWOW64\orkl.exe"82⤵PID:2844
-
C:\Windows\SysWOW64\ojtd.exeC:\Windows\system32\ojtd.exe 964 "C:\Windows\SysWOW64\bhmo.exe"83⤵PID:2780
-
C:\Windows\SysWOW64\ymio.exeC:\Windows\system32\ymio.exe 1028 "C:\Windows\SysWOW64\ojtd.exe"84⤵PID:852
-
C:\Windows\SysWOW64\lkdr.exeC:\Windows\system32\lkdr.exe 1032 "C:\Windows\SysWOW64\ymio.exe"85⤵
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\ybgl.exeC:\Windows\system32\ybgl.exe 1036 "C:\Windows\SysWOW64\lkdr.exe"86⤵PID:2020
-
C:\Windows\SysWOW64\lzao.exeC:\Windows\system32\lzao.exe 1020 "C:\Windows\SysWOW64\ybgl.exe"87⤵PID:3060
-
C:\Windows\SysWOW64\ugbl.exeC:\Windows\system32\ugbl.exe 1044 "C:\Windows\SysWOW64\lzao.exe"88⤵PID:3004
-
C:\Windows\SysWOW64\hewo.exeC:\Windows\system32\hewo.exe 1040 "C:\Windows\SysWOW64\ugbl.exe"89⤵
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Windows\SysWOW64\uvrr.exeC:\Windows\system32\uvrr.exe 1048 "C:\Windows\SysWOW64\hewo.exe"90⤵PID:2484
-
C:\Windows\SysWOW64\hxxg.exeC:\Windows\system32\hxxg.exe 1052 "C:\Windows\SysWOW64\uvrr.exe"91⤵
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\ukow.exeC:\Windows\system32\ukow.exe 1056 "C:\Windows\SysWOW64\hxxg.exe"92⤵PID:2796
-
C:\Windows\SysWOW64\hmue.exeC:\Windows\system32\hmue.exe 1060 "C:\Windows\SysWOW64\ukow.exe"93⤵PID:1792
-
C:\Windows\SysWOW64\roko.exeC:\Windows\system32\roko.exe 1076 "C:\Windows\SysWOW64\hmue.exe"94⤵PID:328
-
C:\Windows\SysWOW64\dnmr.exeC:\Windows\system32\dnmr.exe 1064 "C:\Windows\SysWOW64\roko.exe"95⤵PID:2096
-
C:\Windows\SysWOW64\qdhu.exeC:\Windows\system32\qdhu.exe 1068 "C:\Windows\SysWOW64\dnmr.exe"96⤵PID:2472
-
C:\Windows\SysWOW64\ducw.exeC:\Windows\system32\ducw.exe 1072 "C:\Windows\SysWOW64\qdhu.exe"97⤵
- Drops file in System32 directory
PID:948 -
C:\Windows\SysWOW64\nidu.exeC:\Windows\system32\nidu.exe 1084 "C:\Windows\SysWOW64\ducw.exe"98⤵PID:2260
-
C:\Windows\SysWOW64\agyw.exeC:\Windows\system32\agyw.exe 1080 "C:\Windows\SysWOW64\nidu.exe"99⤵PID:1612
-
C:\Windows\SysWOW64\ftpm.exeC:\Windows\system32\ftpm.exe 1088 "C:\Windows\SysWOW64\agyw.exe"100⤵PID:2832
-
C:\Windows\SysWOW64\snvc.exeC:\Windows\system32\snvc.exe 1092 "C:\Windows\SysWOW64\ftpm.exe"101⤵PID:348
-
C:\Windows\SysWOW64\cyle.exeC:\Windows\system32\cyle.exe 1100 "C:\Windows\SysWOW64\snvc.exe"102⤵PID:1308
-
C:\Windows\SysWOW64\oaru.exeC:\Windows\system32\oaru.exe 1096 "C:\Windows\SysWOW64\cyle.exe"103⤵PID:2548
-
C:\Windows\SysWOW64\bnij.exeC:\Windows\system32\bnij.exe 1108 "C:\Windows\SysWOW64\oaru.exe"104⤵PID:1480
-
C:\Windows\SysWOW64\ohoz.exeC:\Windows\system32\ohoz.exe 1016 "C:\Windows\SysWOW64\bnij.exe"105⤵PID:2680
-
C:\Windows\SysWOW64\yrej.exeC:\Windows\system32\yrej.exe 1112 "C:\Windows\SysWOW64\ohoz.exe"106⤵PID:2312
-
C:\Windows\SysWOW64\ligm.exeC:\Windows\system32\ligm.exe 1116 "C:\Windows\SysWOW64\yrej.exe"107⤵PID:2308
-
C:\Windows\SysWOW64\yvqc.exeC:\Windows\system32\yvqc.exe 1120 "C:\Windows\SysWOW64\ligm.exe"108⤵PID:2008
-
C:\Windows\SysWOW64\lxws.exeC:\Windows\system32\lxws.exe 1124 "C:\Windows\SysWOW64\yvqc.exe"109⤵PID:1984
-
C:\Windows\SysWOW64\vhlc.exeC:\Windows\system32\vhlc.exe 1128 "C:\Windows\SysWOW64\lxws.exe"110⤵PID:1236
-
C:\Windows\SysWOW64\hbrk.exeC:\Windows\system32\hbrk.exe 1136 "C:\Windows\SysWOW64\vhlc.exe"111⤵PID:2916
-
C:\Windows\SysWOW64\uaum.exeC:\Windows\system32\uaum.exe 1132 "C:\Windows\SysWOW64\hbrk.exe"112⤵PID:1988
-
C:\Windows\SysWOW64\hqpp.exeC:\Windows\system32\hqpp.exe 1140 "C:\Windows\SysWOW64\uaum.exe"113⤵PID:1388
-
C:\Windows\SysWOW64\rbez.exeC:\Windows\system32\rbez.exe 1144 "C:\Windows\SysWOW64\hqpp.exe"114⤵PID:2372
-
C:\Windows\SysWOW64\hfnu.exeC:\Windows\system32\hfnu.exe 1148 "C:\Windows\SysWOW64\rbez.exe"115⤵PID:1620
-
C:\Windows\SysWOW64\ricf.exeC:\Windows\system32\ricf.exe 1164 "C:\Windows\SysWOW64\hfnu.exe"116⤵
- Drops file in System32 directory
PID:2868 -
C:\Windows\SysWOW64\dkiu.exeC:\Windows\system32\dkiu.exe 1152 "C:\Windows\SysWOW64\ricf.exe"117⤵PID:1132
-
C:\Windows\SysWOW64\rxak.exeC:\Windows\system32\rxak.exe 1156 "C:\Windows\SysWOW64\dkiu.exe"118⤵PID:2420
-
C:\Windows\SysWOW64\alsa.exeC:\Windows\system32\alsa.exe 1160 "C:\Windows\SysWOW64\rxak.exe"119⤵
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\qqbu.exeC:\Windows\system32\qqbu.exe 1168 "C:\Windows\SysWOW64\alsa.exe"120⤵PID:2648
-
C:\Windows\SysWOW64\aebs.exeC:\Windows\system32\aebs.exe 1172 "C:\Windows\SysWOW64\qqbu.exe"121⤵PID:2340
-
C:\Windows\SysWOW64\nrli.exeC:\Windows\system32\nrli.exe 1180 "C:\Windows\SysWOW64\aebs.exe"122⤵PID:1076
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-