Analysis
-
max time kernel
150s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 12:43
Static task
static1
Behavioral task
behavioral1
Sample
e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe
-
Size
136KB
-
MD5
e92431263981551cc065005fb0fc1e5b
-
SHA1
ffbaba29d2b6a2fb03da30796bfd7784d1d91191
-
SHA256
9d26baae4318f5bff0ae55fe3e98ea4e918639a766b9453d189b1e6c21352279
-
SHA512
5e8725a5aa72479f6b239c9122715847e8853cfcaa2fe092e4129450e895948637de1740f42afaa62eda47afb430db038b52a512063e460f7b8322958cb40807
-
SSDEEP
3072:lghyf/VUpgyY9xhGhy3otLz/a+sjBriJFyokBfpzbh+C2oQCZvE:WCSgJ9xhG2Ya+G2yoW9bhrr3BE
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2252 vlhfly.exe 2884 labnsh.exe 2856 nhtkip.exe 2684 vhskwd.exe 2732 nvrqzx.exe 1340 uabvqq.exe 2756 ktyqae.exe 1852 ojvcws.exe 3028 jmzauq.exe 476 wccdcz.exe 2152 gquabg.exe 1628 thxdjg.exe 1064 dcqnrj.exe 1988 lgaaau.exe 636 cgksoa.exe 1912 pxfnwa.exe 1744 zwjtpz.exe 1572 ejdsai.exe 2584 wxbykk.exe 2752 efpyfz.exe 2812 wmrdcs.exe 1484 ylftzx.exe 2704 trudii.exe 956 gppgri.exe 2104 qlqqyc.exe 3052 xsdqta.exe 1332 nplqfs.exe 2960 xlmbnn.exe 2352 knsqyz.exe 2176 rugjso.exe 2388 hcrqzy.exe 2324 rbdokx.exe 2944 bmtyxa.exe 1520 odobfi.exe 1272 byfrte.exe 2544 laubgh.exe 1736 vdkluk.exe 2232 kpsgyx.exe 1964 udtewx.exe 1472 hqcubb.exe 2068 ukibnn.exe 2408 evymaq.exe 2956 rlbojq.exe 2800 ekvrrz.exe 1596 omlbnc.exe 1648 eztwrh.exe 2936 nfuuho.exe 1396 asdjms.exe 828 nqgmva.exe 3020 xezcta.exe 2644 cvbeci.exe 2948 pilchm.exe 2124 zwmrxt.exe 2120 mjdhdp.exe 2356 yljxpb.exe 840 iozhkf.exe 2336 yahcgk.exe 1652 igzzer.exe 1324 vfccmz.exe 988 ivxxva.exe 3056 vuszei.exe 2804 ikvcmq.exe 2888 rnknit.exe 2680 elfpqt.exe -
Loads dropped DLL 64 IoCs
pid Process 2908 e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe 2908 e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe 2252 vlhfly.exe 2252 vlhfly.exe 2884 labnsh.exe 2884 labnsh.exe 2856 nhtkip.exe 2856 nhtkip.exe 2684 vhskwd.exe 2684 vhskwd.exe 2732 nvrqzx.exe 2732 nvrqzx.exe 1340 uabvqq.exe 1340 uabvqq.exe 2756 ktyqae.exe 2756 ktyqae.exe 1852 ojvcws.exe 1852 ojvcws.exe 3028 jmzauq.exe 3028 jmzauq.exe 476 wccdcz.exe 476 wccdcz.exe 2152 gquabg.exe 2152 gquabg.exe 1628 thxdjg.exe 1628 thxdjg.exe 1064 dcqnrj.exe 1064 dcqnrj.exe 1988 lgaaau.exe 1988 lgaaau.exe 636 cgksoa.exe 636 cgksoa.exe 1912 pxfnwa.exe 1912 pxfnwa.exe 1744 zwjtpz.exe 1744 zwjtpz.exe 1572 ejdsai.exe 1572 ejdsai.exe 2584 wxbykk.exe 2584 wxbykk.exe 2752 efpyfz.exe 2752 efpyfz.exe 2812 wmrdcs.exe 2812 wmrdcs.exe 1484 ylftzx.exe 1484 ylftzx.exe 2704 trudii.exe 2704 trudii.exe 956 gppgri.exe 956 gppgri.exe 2104 qlqqyc.exe 2104 qlqqyc.exe 3052 xsdqta.exe 3052 xsdqta.exe 1332 nplqfs.exe 1332 nplqfs.exe 2960 xlmbnn.exe 2960 xlmbnn.exe 2352 knsqyz.exe 2352 knsqyz.exe 2176 rugjso.exe 2176 rugjso.exe 2388 hcrqzy.exe 2388 hcrqzy.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\bxgfcl.exe rurvpi.exe File opened for modification C:\Windows\SysWOW64\bxgfcl.exe rurvpi.exe File created C:\Windows\SysWOW64\vdbmso.exe jbvehb.exe File created C:\Windows\SysWOW64\mfhnzk.exe zhmkqj.exe File created C:\Windows\SysWOW64\vmnzgi.exe jkgrne.exe File opened for modification C:\Windows\SysWOW64\dcqnrj.exe thxdjg.exe File opened for modification C:\Windows\SysWOW64\uknfcs.exe iusdtk.exe File opened for modification C:\Windows\SysWOW64\hspncd.exe ucmktv.exe File created C:\Windows\SysWOW64\kaxfkm.exe apivxq.exe File opened for modification C:\Windows\SysWOW64\dsfjcz.exe qbkhuq.exe File opened for modification C:\Windows\SysWOW64\njszpk.exe atxwgc.exe File created C:\Windows\SysWOW64\bprnev.exe oypkvn.exe File created C:\Windows\SysWOW64\okbkdw.exe blghuv.exe File opened for modification C:\Windows\SysWOW64\uojpls.exe ixomcr.exe File opened for modification C:\Windows\SysWOW64\tzehsv.exe gicmkv.exe File created C:\Windows\SysWOW64\yclmxz.exe mmqjor.exe File opened for modification C:\Windows\SysWOW64\zuwdkw.exe mdcbbo.exe File opened for modification C:\Windows\SysWOW64\ksmbsc.exe ycsyjb.exe File opened for modification C:\Windows\SysWOW64\vasmqy.exe mxvcdv.exe File created C:\Windows\SysWOW64\uxdbrt.exe hzizjl.exe File opened for modification C:\Windows\SysWOW64\xuokjc.exe kduhat.exe File created C:\Windows\SysWOW64\ojvcws.exe ktyqae.exe File opened for modification C:\Windows\SysWOW64\vvbojq.exe lhbrtj.exe File created C:\Windows\SysWOW64\bqpywx.exe ozmvnp.exe File created C:\Windows\SysWOW64\udhnki.exe hmmsba.exe File created C:\Windows\SysWOW64\gjmiqo.exe twcskl.exe File opened for modification C:\Windows\SysWOW64\xqsitu.exe kaxfkm.exe File created C:\Windows\SysWOW64\mivxgv.exe zndiar.exe File created C:\Windows\SysWOW64\lgaaau.exe dcqnrj.exe File opened for modification C:\Windows\SysWOW64\gqjiiv.exe enmymr.exe File created C:\Windows\SysWOW64\cyslpb.exe pixjgt.exe File opened for modification C:\Windows\SysWOW64\fhygxx.exe wtxjzq.exe File opened for modification C:\Windows\SysWOW64\nkczmh.exe alhxdg.exe File opened for modification C:\Windows\SysWOW64\jdvfkf.exe wfactw.exe File opened for modification C:\Windows\SysWOW64\uxxfpj.exe hhccgb.exe File created C:\Windows\SysWOW64\xtible.exe kunycd.exe File created C:\Windows\SysWOW64\rekrzx.exe egppqo.exe File opened for modification C:\Windows\SysWOW64\lspabi.exe cepdli.exe File created C:\Windows\SysWOW64\djxtog.exe nfoykt.exe File opened for modification C:\Windows\SysWOW64\tbsaok.exe goidjo.exe File created C:\Windows\SysWOW64\zfzyto.exe moedkg.exe File opened for modification C:\Windows\SysWOW64\ojvcws.exe ktyqae.exe File created C:\Windows\SysWOW64\hzssvj.exe xodiif.exe File created C:\Windows\SysWOW64\tnguso.exe goerjg.exe File opened for modification C:\Windows\SysWOW64\sfgewg.exe feaolu.exe File opened for modification C:\Windows\SysWOW64\cjspzc.exe sgdemy.exe File created C:\Windows\SysWOW64\xhvhta.exe sqafls.exe File opened for modification C:\Windows\SysWOW64\bueyyu.exe rrpokr.exe File created C:\Windows\SysWOW64\rslbgc.exe ieklqc.exe File opened for modification C:\Windows\SysWOW64\jmzauq.exe ojvcws.exe File opened for modification C:\Windows\SysWOW64\rksywf.exe exaiib.exe File created C:\Windows\SysWOW64\sncvyp.exe fakftt.exe File opened for modification C:\Windows\SysWOW64\rigywz.exe eslvnz.exe File created C:\Windows\SysWOW64\trosic.exe gttpat.exe File created C:\Windows\SysWOW64\bblorp.exe olilip.exe File opened for modification C:\Windows\SysWOW64\vhskwd.exe nhtkip.exe File opened for modification C:\Windows\SysWOW64\kgbisp.exe xhyfkp.exe File opened for modification C:\Windows\SysWOW64\rntnoi.exe eoqkxa.exe File opened for modification C:\Windows\SysWOW64\mumdbj.exe djxtog.exe File opened for modification C:\Windows\SysWOW64\eskfzm.exe upnver.exe File created C:\Windows\SysWOW64\fgapad.exe vszrkw.exe File opened for modification C:\Windows\SysWOW64\duntlu.exe qvsqcm.exe File created C:\Windows\SysWOW64\pxaqtc.exe czfnkt.exe File opened for modification C:\Windows\SysWOW64\xktrge.exe ktyoxv.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfwfxp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gppgri.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reglsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fzshhw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qbztvy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxgfcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aubczt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mefwat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language femirl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ieklqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lqcnbu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlhfly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xzfcrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vszrkw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxqkkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yjkdjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kvtulq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eqaicw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lftgpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxpgnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zdufll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbdokx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoyzfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language krzwvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctbwaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqhaxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebqzak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llnodk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tohhvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjzxca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbkwei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vaanzi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xiclcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uhjdjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language advfwl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfgewg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpufij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhcnip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqdxco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbvkgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xaialz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlwfib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wouzpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iruaey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvmuvy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qizqev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvkuyz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksmbsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zqqeoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qfxziu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eqodpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjxitp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhskwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language efpyfz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtywti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lkqukf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evnuhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sncvyp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language enylml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mimnsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jecnav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gsvdfs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iozhkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxlnil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2252 2908 e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2252 2908 e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2252 2908 e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2252 2908 e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe 30 PID 2252 wrote to memory of 2884 2252 vlhfly.exe 31 PID 2252 wrote to memory of 2884 2252 vlhfly.exe 31 PID 2252 wrote to memory of 2884 2252 vlhfly.exe 31 PID 2252 wrote to memory of 2884 2252 vlhfly.exe 31 PID 2884 wrote to memory of 2856 2884 labnsh.exe 32 PID 2884 wrote to memory of 2856 2884 labnsh.exe 32 PID 2884 wrote to memory of 2856 2884 labnsh.exe 32 PID 2884 wrote to memory of 2856 2884 labnsh.exe 32 PID 2856 wrote to memory of 2684 2856 nhtkip.exe 33 PID 2856 wrote to memory of 2684 2856 nhtkip.exe 33 PID 2856 wrote to memory of 2684 2856 nhtkip.exe 33 PID 2856 wrote to memory of 2684 2856 nhtkip.exe 33 PID 2684 wrote to memory of 2732 2684 vhskwd.exe 34 PID 2684 wrote to memory of 2732 2684 vhskwd.exe 34 PID 2684 wrote to memory of 2732 2684 vhskwd.exe 34 PID 2684 wrote to memory of 2732 2684 vhskwd.exe 34 PID 2732 wrote to memory of 1340 2732 nvrqzx.exe 35 PID 2732 wrote to memory of 1340 2732 nvrqzx.exe 35 PID 2732 wrote to memory of 1340 2732 nvrqzx.exe 35 PID 2732 wrote to memory of 1340 2732 nvrqzx.exe 35 PID 1340 wrote to memory of 2756 1340 uabvqq.exe 36 PID 1340 wrote to memory of 2756 1340 uabvqq.exe 36 PID 1340 wrote to memory of 2756 1340 uabvqq.exe 36 PID 1340 wrote to memory of 2756 1340 uabvqq.exe 36 PID 2756 wrote to memory of 1852 2756 ktyqae.exe 37 PID 2756 wrote to memory of 1852 2756 ktyqae.exe 37 PID 2756 wrote to memory of 1852 2756 ktyqae.exe 37 PID 2756 wrote to memory of 1852 2756 ktyqae.exe 37 PID 1852 wrote to memory of 3028 1852 ojvcws.exe 38 PID 1852 wrote to memory of 3028 1852 ojvcws.exe 38 PID 1852 wrote to memory of 3028 1852 ojvcws.exe 38 PID 1852 wrote to memory of 3028 1852 ojvcws.exe 38 PID 3028 wrote to memory of 476 3028 jmzauq.exe 39 PID 3028 wrote to memory of 476 3028 jmzauq.exe 39 PID 3028 wrote to memory of 476 3028 jmzauq.exe 39 PID 3028 wrote to memory of 476 3028 jmzauq.exe 39 PID 476 wrote to memory of 2152 476 wccdcz.exe 40 PID 476 wrote to memory of 2152 476 wccdcz.exe 40 PID 476 wrote to memory of 2152 476 wccdcz.exe 40 PID 476 wrote to memory of 2152 476 wccdcz.exe 40 PID 2152 wrote to memory of 1628 2152 gquabg.exe 41 PID 2152 wrote to memory of 1628 2152 gquabg.exe 41 PID 2152 wrote to memory of 1628 2152 gquabg.exe 41 PID 2152 wrote to memory of 1628 2152 gquabg.exe 41 PID 1628 wrote to memory of 1064 1628 thxdjg.exe 42 PID 1628 wrote to memory of 1064 1628 thxdjg.exe 42 PID 1628 wrote to memory of 1064 1628 thxdjg.exe 42 PID 1628 wrote to memory of 1064 1628 thxdjg.exe 42 PID 1064 wrote to memory of 1988 1064 dcqnrj.exe 43 PID 1064 wrote to memory of 1988 1064 dcqnrj.exe 43 PID 1064 wrote to memory of 1988 1064 dcqnrj.exe 43 PID 1064 wrote to memory of 1988 1064 dcqnrj.exe 43 PID 1988 wrote to memory of 636 1988 lgaaau.exe 44 PID 1988 wrote to memory of 636 1988 lgaaau.exe 44 PID 1988 wrote to memory of 636 1988 lgaaau.exe 44 PID 1988 wrote to memory of 636 1988 lgaaau.exe 44 PID 636 wrote to memory of 1912 636 cgksoa.exe 45 PID 636 wrote to memory of 1912 636 cgksoa.exe 45 PID 636 wrote to memory of 1912 636 cgksoa.exe 45 PID 636 wrote to memory of 1912 636 cgksoa.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\vlhfly.exeC:\Windows\system32\vlhfly.exe 484 "C:\Users\Admin\AppData\Local\Temp\e92431263981551cc065005fb0fc1e5b_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\labnsh.exeC:\Windows\system32\labnsh.exe 532 "C:\Windows\SysWOW64\vlhfly.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\nhtkip.exeC:\Windows\system32\nhtkip.exe 536 "C:\Windows\SysWOW64\labnsh.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\vhskwd.exeC:\Windows\system32\vhskwd.exe 548 "C:\Windows\SysWOW64\nhtkip.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\nvrqzx.exeC:\Windows\system32\nvrqzx.exe 540 "C:\Windows\SysWOW64\vhskwd.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\uabvqq.exeC:\Windows\system32\uabvqq.exe 556 "C:\Windows\SysWOW64\nvrqzx.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\ktyqae.exeC:\Windows\system32\ktyqae.exe 544 "C:\Windows\SysWOW64\uabvqq.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\ojvcws.exeC:\Windows\system32\ojvcws.exe 576 "C:\Windows\SysWOW64\ktyqae.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\jmzauq.exeC:\Windows\system32\jmzauq.exe 552 "C:\Windows\SysWOW64\ojvcws.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\wccdcz.exeC:\Windows\system32\wccdcz.exe 560 "C:\Windows\SysWOW64\jmzauq.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\gquabg.exeC:\Windows\system32\gquabg.exe 564 "C:\Windows\SysWOW64\wccdcz.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\thxdjg.exeC:\Windows\system32\thxdjg.exe 588 "C:\Windows\SysWOW64\gquabg.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\dcqnrj.exeC:\Windows\system32\dcqnrj.exe 568 "C:\Windows\SysWOW64\thxdjg.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\lgaaau.exeC:\Windows\system32\lgaaau.exe 584 "C:\Windows\SysWOW64\dcqnrj.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cgksoa.exeC:\Windows\system32\cgksoa.exe 572 "C:\Windows\SysWOW64\lgaaau.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\pxfnwa.exeC:\Windows\system32\pxfnwa.exe 580 "C:\Windows\SysWOW64\cgksoa.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1912 -
C:\Windows\SysWOW64\zwjtpz.exeC:\Windows\system32\zwjtpz.exe 592 "C:\Windows\SysWOW64\pxfnwa.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1744 -
C:\Windows\SysWOW64\ejdsai.exeC:\Windows\system32\ejdsai.exe 612 "C:\Windows\SysWOW64\zwjtpz.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572 -
C:\Windows\SysWOW64\wxbykk.exeC:\Windows\system32\wxbykk.exe 600 "C:\Windows\SysWOW64\ejdsai.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2584 -
C:\Windows\SysWOW64\efpyfz.exeC:\Windows\system32\efpyfz.exe 596 "C:\Windows\SysWOW64\wxbykk.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\wmrdcs.exeC:\Windows\system32\wmrdcs.exe 608 "C:\Windows\SysWOW64\efpyfz.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2812 -
C:\Windows\SysWOW64\ylftzx.exeC:\Windows\system32\ylftzx.exe 604 "C:\Windows\SysWOW64\wmrdcs.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1484 -
C:\Windows\SysWOW64\trudii.exeC:\Windows\system32\trudii.exe 616 "C:\Windows\SysWOW64\ylftzx.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2704 -
C:\Windows\SysWOW64\gppgri.exeC:\Windows\system32\gppgri.exe 628 "C:\Windows\SysWOW64\trudii.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:956 -
C:\Windows\SysWOW64\qlqqyc.exeC:\Windows\system32\qlqqyc.exe 620 "C:\Windows\SysWOW64\gppgri.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2104 -
C:\Windows\SysWOW64\xsdqta.exeC:\Windows\system32\xsdqta.exe 636 "C:\Windows\SysWOW64\qlqqyc.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3052 -
C:\Windows\SysWOW64\nplqfs.exeC:\Windows\system32\nplqfs.exe 624 "C:\Windows\SysWOW64\xsdqta.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1332 -
C:\Windows\SysWOW64\xlmbnn.exeC:\Windows\system32\xlmbnn.exe 644 "C:\Windows\SysWOW64\nplqfs.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2960 -
C:\Windows\SysWOW64\knsqyz.exeC:\Windows\system32\knsqyz.exe 632 "C:\Windows\SysWOW64\xlmbnn.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2352 -
C:\Windows\SysWOW64\rugjso.exeC:\Windows\system32\rugjso.exe 660 "C:\Windows\SysWOW64\knsqyz.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2176 -
C:\Windows\SysWOW64\hcrqzy.exeC:\Windows\system32\hcrqzy.exe 640 "C:\Windows\SysWOW64\rugjso.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2388 -
C:\Windows\SysWOW64\rbdokx.exeC:\Windows\system32\rbdokx.exe 656 "C:\Windows\SysWOW64\hcrqzy.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\bmtyxa.exeC:\Windows\system32\bmtyxa.exe 648 "C:\Windows\SysWOW64\rbdokx.exe"34⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\odobfi.exeC:\Windows\system32\odobfi.exe 664 "C:\Windows\SysWOW64\bmtyxa.exe"35⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\byfrte.exeC:\Windows\system32\byfrte.exe 652 "C:\Windows\SysWOW64\odobfi.exe"36⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\laubgh.exeC:\Windows\system32\laubgh.exe 676 "C:\Windows\SysWOW64\byfrte.exe"37⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\vdkluk.exeC:\Windows\system32\vdkluk.exe 668 "C:\Windows\SysWOW64\laubgh.exe"38⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\kpsgyx.exeC:\Windows\system32\kpsgyx.exe 680 "C:\Windows\SysWOW64\vdkluk.exe"39⤵
- Executes dropped EXE
PID:2232 -
C:\Windows\SysWOW64\udtewx.exeC:\Windows\system32\udtewx.exe 672 "C:\Windows\SysWOW64\kpsgyx.exe"40⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\hqcubb.exeC:\Windows\system32\hqcubb.exe 688 "C:\Windows\SysWOW64\udtewx.exe"41⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\ukibnn.exeC:\Windows\system32\ukibnn.exe 692 "C:\Windows\SysWOW64\hqcubb.exe"42⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\evymaq.exeC:\Windows\system32\evymaq.exe 696 "C:\Windows\SysWOW64\ukibnn.exe"43⤵
- Executes dropped EXE
PID:2408 -
C:\Windows\SysWOW64\rlbojq.exeC:\Windows\system32\rlbojq.exe 708 "C:\Windows\SysWOW64\evymaq.exe"44⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\ekvrrz.exeC:\Windows\system32\ekvrrz.exe 700 "C:\Windows\SysWOW64\rlbojq.exe"45⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\omlbnc.exeC:\Windows\system32\omlbnc.exe 684 "C:\Windows\SysWOW64\ekvrrz.exe"46⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\eztwrh.exeC:\Windows\system32\eztwrh.exe 724 "C:\Windows\SysWOW64\omlbnc.exe"47⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\nfuuho.exeC:\Windows\system32\nfuuho.exe 712 "C:\Windows\SysWOW64\eztwrh.exe"48⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\asdjms.exeC:\Windows\system32\asdjms.exe 716 "C:\Windows\SysWOW64\nfuuho.exe"49⤵
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\nqgmva.exeC:\Windows\system32\nqgmva.exe 704 "C:\Windows\SysWOW64\asdjms.exe"50⤵
- Executes dropped EXE
PID:828 -
C:\Windows\SysWOW64\xezcta.exeC:\Windows\system32\xezcta.exe 732 "C:\Windows\SysWOW64\nqgmva.exe"51⤵
- Executes dropped EXE
PID:3020 -
C:\Windows\SysWOW64\cvbeci.exeC:\Windows\system32\cvbeci.exe 720 "C:\Windows\SysWOW64\xezcta.exe"52⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\pilchm.exeC:\Windows\system32\pilchm.exe 748 "C:\Windows\SysWOW64\cvbeci.exe"53⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\zwmrxt.exeC:\Windows\system32\zwmrxt.exe 736 "C:\Windows\SysWOW64\pilchm.exe"54⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\mjdhdp.exeC:\Windows\system32\mjdhdp.exe 756 "C:\Windows\SysWOW64\zwmrxt.exe"55⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\yljxpb.exeC:\Windows\system32\yljxpb.exe 760 "C:\Windows\SysWOW64\mjdhdp.exe"56⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\iozhkf.exeC:\Windows\system32\iozhkf.exe 728 "C:\Windows\SysWOW64\yljxpb.exe"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\yahcgk.exeC:\Windows\system32\yahcgk.exe 740 "C:\Windows\SysWOW64\iozhkf.exe"58⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\igzzer.exeC:\Windows\system32\igzzer.exe 772 "C:\Windows\SysWOW64\yahcgk.exe"59⤵
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\vfccmz.exeC:\Windows\system32\vfccmz.exe 744 "C:\Windows\SysWOW64\igzzer.exe"60⤵
- Executes dropped EXE
PID:1324 -
C:\Windows\SysWOW64\ivxxva.exeC:\Windows\system32\ivxxva.exe 752 "C:\Windows\SysWOW64\vfccmz.exe"61⤵
- Executes dropped EXE
PID:988 -
C:\Windows\SysWOW64\vuszei.exeC:\Windows\system32\vuszei.exe 764 "C:\Windows\SysWOW64\ivxxva.exe"62⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\ikvcmq.exeC:\Windows\system32\ikvcmq.exe 780 "C:\Windows\SysWOW64\vuszei.exe"63⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\rnknit.exeC:\Windows\system32\rnknit.exe 776 "C:\Windows\SysWOW64\ikvcmq.exe"64⤵
- Executes dropped EXE
PID:2888 -
C:\Windows\SysWOW64\elfpqt.exeC:\Windows\system32\elfpqt.exe 768 "C:\Windows\SysWOW64\rnknit.exe"65⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\oouadw.exeC:\Windows\system32\oouadw.exe 788 "C:\Windows\SysWOW64\elfpqt.exe"66⤵PID:2708
-
C:\Windows\SysWOW64\bmxcme.exeC:\Windows\system32\bmxcme.exe 784 "C:\Windows\SysWOW64\oouadw.exe"67⤵PID:2892
-
C:\Windows\SysWOW64\ozhssi.exeC:\Windows\system32\ozhssi.exe 796 "C:\Windows\SysWOW64\bmxcme.exe"68⤵PID:2660
-
C:\Windows\SysWOW64\ynhpqi.exeC:\Windows\system32\ynhpqi.exe 804 "C:\Windows\SysWOW64\ozhssi.exe"69⤵PID:1088
-
C:\Windows\SysWOW64\lazfwm.exeC:\Windows\system32\lazfwm.exe 792 "C:\Windows\SysWOW64\ynhpqi.exe"70⤵PID:2868
-
C:\Windows\SysWOW64\yruieu.exeC:\Windows\system32\yruieu.exe 812 "C:\Windows\SysWOW64\lazfwm.exe"71⤵PID:2844
-
C:\Windows\SysWOW64\ifufub.exeC:\Windows\system32\ifufub.exe 800 "C:\Windows\SysWOW64\yruieu.exe"72⤵PID:1696
-
C:\Windows\SysWOW64\vvpadb.exeC:\Windows\system32\vvpadb.exe 820 "C:\Windows\SysWOW64\ifufub.exe"73⤵PID:2064
-
C:\Windows\SysWOW64\iusdtk.exeC:\Windows\system32\iusdtk.exe 808 "C:\Windows\SysWOW64\vvpadb.exe"74⤵
- Drops file in System32 directory
PID:1112 -
C:\Windows\SysWOW64\uknfcs.exeC:\Windows\system32\uknfcs.exe 816 "C:\Windows\SysWOW64\iusdtk.exe"75⤵PID:576
-
C:\Windows\SysWOW64\hjhils.exeC:\Windows\system32\hjhils.exe 828 "C:\Windows\SysWOW64\uknfcs.exe"76⤵PID:2000
-
C:\Windows\SysWOW64\rpifbz.exeC:\Windows\system32\rpifbz.exe 824 "C:\Windows\SysWOW64\hjhils.exe"77⤵PID:2116
-
C:\Windows\SysWOW64\eolijh.exeC:\Windows\system32\eolijh.exe 832 "C:\Windows\SysWOW64\rpifbz.exe"78⤵PID:1980
-
C:\Windows\SysWOW64\reglsi.exeC:\Windows\system32\reglsi.exe 848 "C:\Windows\SysWOW64\eolijh.exe"79⤵
- System Location Discovery: System Language Discovery
PID:776 -
C:\Windows\SysWOW64\bpvvnl.exeC:\Windows\system32\bpvvnl.exe 840 "C:\Windows\SysWOW64\reglsi.exe"80⤵PID:2280
-
C:\Windows\SysWOW64\ofqywt.exeC:\Windows\system32\ofqywt.exe 836 "C:\Windows\SysWOW64\bpvvnl.exe"81⤵PID:2556
-
C:\Windows\SysWOW64\betaeb.exeC:\Windows\system32\betaeb.exe 844 "C:\Windows\SysWOW64\ofqywt.exe"82⤵PID:2896
-
C:\Windows\SysWOW64\kgidse.exeC:\Windows\system32\kgidse.exe 852 "C:\Windows\SysWOW64\betaeb.exe"83⤵PID:2928
-
C:\Windows\SysWOW64\ytsbxa.exeC:\Windows\system32\ytsbxa.exe 856 "C:\Windows\SysWOW64\kgidse.exe"84⤵PID:2716
-
C:\Windows\SysWOW64\lsudgi.exeC:\Windows\system32\lsudgi.exe 860 "C:\Windows\SysWOW64\ytsbxa.exe"85⤵PID:2836
-
C:\Windows\SysWOW64\uukgbl.exeC:\Windows\system32\uukgbl.exe 864 "C:\Windows\SysWOW64\lsudgi.exe"86⤵PID:2792
-
C:\Windows\SysWOW64\efzqoo.exeC:\Windows\system32\efzqoo.exe 868 "C:\Windows\SysWOW64\uukgbl.exe"87⤵PID:1312
-
C:\Windows\SysWOW64\ujhlsu.exeC:\Windows\system32\ujhlsu.exe 872 "C:\Windows\SysWOW64\efzqoo.exe"88⤵PID:936
-
C:\Windows\SysWOW64\exaiib.exeC:\Windows\system32\exaiib.exe 876 "C:\Windows\SysWOW64\ujhlsu.exe"89⤵
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\rksywf.exeC:\Windows\system32\rksywf.exe 880 "C:\Windows\SysWOW64\exaiib.exe"90⤵PID:1140
-
C:\Windows\SysWOW64\ebmbff.exeC:\Windows\system32\ebmbff.exe 892 "C:\Windows\SysWOW64\rksywf.exe"91⤵PID:1704
-
C:\Windows\SysWOW64\olklsi.exeC:\Windows\system32\olklsi.exe 884 "C:\Windows\SysWOW64\ebmbff.exe"92⤵PID:1680
-
C:\Windows\SysWOW64\bcfobq.exeC:\Windows\system32\bcfobq.exe 908 "C:\Windows\SysWOW64\olklsi.exe"93⤵PID:2092
-
C:\Windows\SysWOW64\nelemd.exeC:\Windows\system32\nelemd.exe 888 "C:\Windows\SysWOW64\bcfobq.exe"94⤵PID:2728
-
C:\Windows\SysWOW64\xhaohy.exeC:\Windows\system32\xhaohy.exe 896 "C:\Windows\SysWOW64\nelemd.exe"95⤵PID:2344
-
C:\Windows\SysWOW64\kfvjqg.exeC:\Windows\system32\kfvjqg.exe 904 "C:\Windows\SysWOW64\xhaohy.exe"96⤵PID:2604
-
C:\Windows\SysWOW64\xwylzo.exeC:\Windows\system32\xwylzo.exe 912 "C:\Windows\SysWOW64\kfvjqg.exe"97⤵PID:1700
-
C:\Windows\SysWOW64\kusohw.exeC:\Windows\system32\kusohw.exe 900 "C:\Windows\SysWOW64\xwylzo.exe"98⤵PID:2272
-
C:\Windows\SysWOW64\uxiyus.exeC:\Windows\system32\uxiyus.exe 920 "C:\Windows\SysWOW64\kusohw.exe"99⤵PID:2632
-
C:\Windows\SysWOW64\zzooge.exeC:\Windows\system32\zzooge.exe 924 "C:\Windows\SysWOW64\uxiyus.exe"100⤵PID:1712
-
C:\Windows\SysWOW64\mprrwm.exeC:\Windows\system32\mprrwm.exe 916 "C:\Windows\SysWOW64\zzooge.exe"101⤵PID:2588
-
C:\Windows\SysWOW64\yomtfm.exeC:\Windows\system32\yomtfm.exe 928 "C:\Windows\SysWOW64\mprrwm.exe"102⤵PID:320
-
C:\Windows\SysWOW64\legwou.exeC:\Windows\system32\legwou.exe 948 "C:\Windows\SysWOW64\yomtfm.exe"103⤵PID:2764
-
C:\Windows\SysWOW64\vhwhby.exeC:\Windows\system32\vhwhby.exe 932 "C:\Windows\SysWOW64\legwou.exe"104⤵PID:2696
-
C:\Windows\SysWOW64\ifzbjg.exeC:\Windows\system32\ifzbjg.exe 940 "C:\Windows\SysWOW64\vhwhby.exe"105⤵PID:2780
-
C:\Windows\SysWOW64\vzfrvk.exeC:\Windows\system32\vzfrvk.exe 944 "C:\Windows\SysWOW64\ifzbjg.exe"106⤵PID:704
-
C:\Windows\SysWOW64\iyzuds.exeC:\Windows\system32\iyzuds.exe 952 "C:\Windows\SysWOW64\vzfrvk.exe"107⤵PID:3040
-
C:\Windows\SysWOW64\vouwut.exeC:\Windows\system32\vouwut.exe 936 "C:\Windows\SysWOW64\iyzuds.exe"108⤵PID:932
-
C:\Windows\SysWOW64\fzshhw.exeC:\Windows\system32\fzshhw.exe 956 "C:\Windows\SysWOW64\vouwut.exe"109⤵
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Windows\SysWOW64\rtywti.exeC:\Windows\system32\rtywti.exe 960 "C:\Windows\SysWOW64\fzshhw.exe"110⤵
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\erszbq.exeC:\Windows\system32\erszbq.exe 980 "C:\Windows\SysWOW64\rtywti.exe"111⤵PID:2168
-
C:\Windows\SysWOW64\rinukr.exeC:\Windows\system32\rinukr.exe 964 "C:\Windows\SysWOW64\erszbq.exe"112⤵PID:924
-
C:\Windows\SysWOW64\bslefu.exeC:\Windows\system32\bslefu.exe 968 "C:\Windows\SysWOW64\rinukr.exe"113⤵PID:2084
-
C:\Windows\SysWOW64\ofuclx.exeC:\Windows\system32\ofuclx.exe 972 "C:\Windows\SysWOW64\bslefu.exe"114⤵PID:908
-
C:\Windows\SysWOW64\yikeyb.exeC:\Windows\system32\yikeyb.exe 988 "C:\Windows\SysWOW64\ofuclx.exe"115⤵PID:1992
-
C:\Windows\SysWOW64\lkqukf.exeC:\Windows\system32\lkqukf.exe 984 "C:\Windows\SysWOW64\yikeyb.exe"116⤵
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\yisxsn.exeC:\Windows\system32\yisxsn.exe 992 "C:\Windows\SysWOW64\lkqukf.exe"117⤵PID:2492
-
C:\Windows\SysWOW64\lvcmyr.exeC:\Windows\system32\lvcmyr.exe 996 "C:\Windows\SysWOW64\yisxsn.exe"118⤵PID:1784
-
C:\Windows\SysWOW64\ucdkwz.exeC:\Windows\system32\ucdkwz.exe 976 "C:\Windows\SysWOW64\lvcmyr.exe"119⤵PID:2228
-
C:\Windows\SysWOW64\haxmfz.exeC:\Windows\system32\haxmfz.exe 1000 "C:\Windows\SysWOW64\ucdkwz.exe"120⤵PID:2852
-
C:\Windows\SysWOW64\unpckd.exeC:\Windows\system32\unpckd.exe 1004 "C:\Windows\SysWOW64\haxmfz.exe"121⤵PID:2880
-
C:\Windows\SysWOW64\ebqzak.exeC:\Windows\system32\ebqzak.exe 1008 "C:\Windows\SysWOW64\unpckd.exe"122⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-