Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 18:13
Static task
static1
Behavioral task
behavioral1
Sample
f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe
-
Size
272KB
-
MD5
f2d8d3ef1d5623bdfa9a0eebd4fc2266
-
SHA1
1a86274d2db5433939ed092da2aa9061b81f4d70
-
SHA256
d8d98aca37ca3d943cc7514a7977c3323eeecceb9e7b12015f2932dba3cd6eab
-
SHA512
189d3760dd2cc2521423bd3c1d7ce80a9160efbf50239a32dde000b6ee5725735f5e8bae581ab800ddd00211c3e13838b3fb40ae2d4fb5805f7126c55528de4a
-
SSDEEP
6144:d/H+8pmvtzHm48oilMAOSf0XFdkzR9CnPYlt8:dv+Ym1Y0AOSfaeR0nwf8
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 4500 gudxwpc.exe 4808 ggppktg.exe 3888 gjbizfk.exe 5060 mevlkcl.exe 3932 wlziubk.exe 3144 yvrymxs.exe 728 rctlrqu.exe 3708 yydqjbw.exe 2604 esxtmxx.exe 448 odmdhbd.exe 4660 zkrwjmg.exe 3336 lpiqxvj.exe 2740 yczgdzq.exe 5108 elibteo.exe 996 whzbntj.exe 4892 gsomjwx.exe 3192 rkernmr.exe 2548 deszzzd.exe 1036 rrbxfvc.exe 1728 emtmkzb.exe 1780 owikxpd.exe 4656 tjbsxfm.exe 1056 gwkidjk.exe 1052 yhyilgl.exe 948 bvbkghz.exe 2316 ivalmnd.exe 4492 travuie.exe 3420 ypxdhjd.exe 528 iokaail.exe 2692 tcotctg.exe 3360 wjcdrlh.exe 4872 ebbeyal.exe 4416 ljpwspv.exe 3528 lvbogbz.exe 3624 ecdblub.exe 1032 obpzwta.exe 4160 obqehtg.exe 896 gxpjsuf.exe 1184 ourxbfq.exe 2860 dnoklbs.exe 2944 qafhrxr.exe 3560 bwgsgsr.exe 2072 lrzcoua.exe 1800 bhtkvew.exe 2956 jaskbka.exe 872 wvbahoy.exe 3868 lgyvrcb.exe 2388 yfbyzkg.exe 744 iauipfh.exe 4020 oyzqvgo.exe 3368 eokybpk.exe 3064 lwxqwft.exe 4408 yjpocjs.exe 2392 gydbftx.exe 664 tduwcca.exe 4948 itgeate.exe 436 tdvjnkg.exe 3408 dzwtveh.exe 1312 ngirfdo.exe 2476 ttshlhn.exe 2960 gjujuht.exe 3088 ohiwfrq.exe 3436 bxdzorv.exe 4740 oogcxab.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\thqspqr.exe-up.txt thqspqr.exe File created C:\Windows\SysWOW64\ozwmphd.exe yyheogn.exe File opened for modification C:\Windows\SysWOW64\iinssrn.exe vvecmnh.exe File created C:\Windows\SysWOW64\sinhlio.exe-up.txt sinhlio.exe File created C:\Windows\SysWOW64\ppakvzl.exe-up.txt ppakvzl.exe File created C:\Windows\SysWOW64\hbsxghl.exe cojaadm.exe File created C:\Windows\SysWOW64\cmhqkhs.exe scrgxel.exe File created C:\Windows\SysWOW64\kvmgqjm.exe-up.txt kvmgqjm.exe File opened for modification C:\Windows\SysWOW64\opzerio.exe equggkh.exe File created C:\Windows\SysWOW64\swpqhmu.exe-up.txt swpqhmu.exe File opened for modification C:\Windows\SysWOW64\cdnwxgg.exe pqvhrci.exe File created C:\Windows\SysWOW64\bwgsgsr.exe-up.txt bwgsgsr.exe File created C:\Windows\SysWOW64\lhrxdhv.exe ymazxdw.exe File opened for modification C:\Windows\SysWOW64\teklnjh.exe gcevbev.exe File created C:\Windows\SysWOW64\fqfyste.exe-up.txt fqfyste.exe File created C:\Windows\SysWOW64\enimkfv.exe uktbxbp.exe File opened for modification C:\Windows\SysWOW64\dfetebx.exe qkvdygr.exe File created C:\Windows\SysWOW64\umjdomy.exe kbutajs.exe File opened for modification C:\Windows\SysWOW64\psnunlv.exe cukredx.exe File opened for modification C:\Windows\SysWOW64\depsxes.exe tekunfk.exe File opened for modification C:\Windows\SysWOW64\qhaukqy.exe ergsbis.exe File created C:\Windows\SysWOW64\obpzwta.exe ecdblub.exe File created C:\Windows\SysWOW64\bbwigdw.exe nontbzx.exe File created C:\Windows\SysWOW64\oogcxab.exe-up.txt oogcxab.exe File opened for modification C:\Windows\SysWOW64\ijthtkf.exe vznxqkn.exe File created C:\Windows\SysWOW64\pzzukkw.exe-up.txt pzzukkw.exe File created C:\Windows\SysWOW64\xemcsxm.exe-up.txt xemcsxm.exe File created C:\Windows\SysWOW64\ymhkkzq.exe lzxueer.exe File opened for modification C:\Windows\SysWOW64\nedacvj.exe ceycswc.exe File created C:\Windows\SysWOW64\zkznwpn.exe mxixqlh.exe File created C:\Windows\SysWOW64\whzbntj.exe-up.txt whzbntj.exe File opened for modification C:\Windows\SysWOW64\dvnhtxt.exe tlqwyuf.exe File opened for modification C:\Windows\SysWOW64\tiluvaz.exe gvtepwa.exe File created C:\Windows\SysWOW64\cdnwxgg.exe pqvhrci.exe File opened for modification C:\Windows\SysWOW64\egblily.exe uwmamik.exe File opened for modification C:\Windows\SysWOW64\tnkxrgh.exe ntrugjh.exe File created C:\Windows\SysWOW64\dilbvkb.exe-up.txt dilbvkb.exe File created C:\Windows\SysWOW64\jumfgcz.exe wkguddh.exe File created C:\Windows\SysWOW64\vgriuzr.exe italpds.exe File opened for modification C:\Windows\SysWOW64\rfthahk.exe esbsudl.exe File created C:\Windows\SysWOW64\avmgqqi.exe nidrlmb.exe File created C:\Windows\SysWOW64\ofipdpn.exe bkqzxlg.exe File created C:\Windows\SysWOW64\eumkvtb.exe-up.txt eumkvtb.exe File created C:\Windows\SysWOW64\sjrjati.exe izcyfqc.exe File created C:\Windows\SysWOW64\waecqhs.exe myosdee.exe File opened for modification C:\Windows\SysWOW64\thqspqr.exe jebibvd.exe File opened for modification C:\Windows\SysWOW64\nfhudxd.exe eusspux.exe File created C:\Windows\SysWOW64\lvbogbz.exe-up.txt lvbogbz.exe File opened for modification C:\Windows\SysWOW64\nyebdcb.exe zlmlygc.exe File opened for modification C:\Windows\SysWOW64\itunggv.exe vgkxacw.exe File created C:\Windows\SysWOW64\vnvjidt.exe-up.txt vnvjidt.exe File created C:\Windows\SysWOW64\sjrjati.exe-up.txt sjrjati.exe File created C:\Windows\SysWOW64\tkspxjn.exe-up.txt tkspxjn.exe File created C:\Windows\SysWOW64\ypzyvzm.exe lcpipdn.exe File created C:\Windows\SysWOW64\scqbleo.exe-up.txt scqbleo.exe File opened for modification C:\Windows\SysWOW64\sdstnme.exe isdjzrp.exe File created C:\Windows\SysWOW64\tikobsc.exe-up.txt tikobsc.exe File created C:\Windows\SysWOW64\qqoydln.exe ddxixip.exe File created C:\Windows\SysWOW64\vrhbxpy.exe-up.txt vrhbxpy.exe File created C:\Windows\SysWOW64\jebibvd.exe wvufqwl.exe File opened for modification C:\Windows\SysWOW64\tjbsxfm.exe owikxpd.exe File created C:\Windows\SysWOW64\bcquwmn.exe opzerio.exe File opened for modification C:\Windows\SysWOW64\iaezogs.exe vnvjidt.exe File created C:\Windows\SysWOW64\zdwolbi.exe-up.txt zdwolbi.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stkxanr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdfgnls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avltfid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taapbjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sdoimpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnovgtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzzmvtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fwkmsxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhvabxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agzzfue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jllsipd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lwdmqoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yydqjbw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odmdhbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gydbftx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language othbdmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fwvfrco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ekcjxmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frwzjen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtkivow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccphwno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvtepwa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jobpwig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qkoinoc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ozardfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmdjytf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eqhjgnk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljpwspv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bwgsgsr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmhqkhs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mvwtbbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeebych.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndfsbkj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffgwezb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oggpppa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nontbzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rctlrqu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usvappq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emfpkcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jurqoax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whbbprc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language deszzzd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avgplvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwswjcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toabmjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjsombo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qfygtfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eokybpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccevqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqbmwwy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pehauax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkqzxlg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxlydpq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xyevibh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khjpext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvufqwl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itgeate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sinhlio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfggnsz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ozwmphd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nasmrvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language owcicwn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nglhefr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nsqhorf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1772 wrote to memory of 4500 1772 f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe 89 PID 1772 wrote to memory of 4500 1772 f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe 89 PID 1772 wrote to memory of 4500 1772 f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe 89 PID 4500 wrote to memory of 4808 4500 gudxwpc.exe 90 PID 4500 wrote to memory of 4808 4500 gudxwpc.exe 90 PID 4500 wrote to memory of 4808 4500 gudxwpc.exe 90 PID 4808 wrote to memory of 3888 4808 ggppktg.exe 91 PID 4808 wrote to memory of 3888 4808 ggppktg.exe 91 PID 4808 wrote to memory of 3888 4808 ggppktg.exe 91 PID 3888 wrote to memory of 5060 3888 gjbizfk.exe 92 PID 3888 wrote to memory of 5060 3888 gjbizfk.exe 92 PID 3888 wrote to memory of 5060 3888 gjbizfk.exe 92 PID 5060 wrote to memory of 3932 5060 mevlkcl.exe 93 PID 5060 wrote to memory of 3932 5060 mevlkcl.exe 93 PID 5060 wrote to memory of 3932 5060 mevlkcl.exe 93 PID 3932 wrote to memory of 3144 3932 wlziubk.exe 94 PID 3932 wrote to memory of 3144 3932 wlziubk.exe 94 PID 3932 wrote to memory of 3144 3932 wlziubk.exe 94 PID 3144 wrote to memory of 728 3144 yvrymxs.exe 95 PID 3144 wrote to memory of 728 3144 yvrymxs.exe 95 PID 3144 wrote to memory of 728 3144 yvrymxs.exe 95 PID 728 wrote to memory of 3708 728 rctlrqu.exe 96 PID 728 wrote to memory of 3708 728 rctlrqu.exe 96 PID 728 wrote to memory of 3708 728 rctlrqu.exe 96 PID 3708 wrote to memory of 2604 3708 yydqjbw.exe 97 PID 3708 wrote to memory of 2604 3708 yydqjbw.exe 97 PID 3708 wrote to memory of 2604 3708 yydqjbw.exe 97 PID 2604 wrote to memory of 448 2604 esxtmxx.exe 98 PID 2604 wrote to memory of 448 2604 esxtmxx.exe 98 PID 2604 wrote to memory of 448 2604 esxtmxx.exe 98 PID 448 wrote to memory of 4660 448 odmdhbd.exe 99 PID 448 wrote to memory of 4660 448 odmdhbd.exe 99 PID 448 wrote to memory of 4660 448 odmdhbd.exe 99 PID 4660 wrote to memory of 3336 4660 zkrwjmg.exe 102 PID 4660 wrote to memory of 3336 4660 zkrwjmg.exe 102 PID 4660 wrote to memory of 3336 4660 zkrwjmg.exe 102 PID 3336 wrote to memory of 2740 3336 lpiqxvj.exe 103 PID 3336 wrote to memory of 2740 3336 lpiqxvj.exe 103 PID 3336 wrote to memory of 2740 3336 lpiqxvj.exe 103 PID 2740 wrote to memory of 5108 2740 yczgdzq.exe 104 PID 2740 wrote to memory of 5108 2740 yczgdzq.exe 104 PID 2740 wrote to memory of 5108 2740 yczgdzq.exe 104 PID 5108 wrote to memory of 996 5108 elibteo.exe 105 PID 5108 wrote to memory of 996 5108 elibteo.exe 105 PID 5108 wrote to memory of 996 5108 elibteo.exe 105 PID 996 wrote to memory of 4892 996 whzbntj.exe 106 PID 996 wrote to memory of 4892 996 whzbntj.exe 106 PID 996 wrote to memory of 4892 996 whzbntj.exe 106 PID 4892 wrote to memory of 3192 4892 gsomjwx.exe 108 PID 4892 wrote to memory of 3192 4892 gsomjwx.exe 108 PID 4892 wrote to memory of 3192 4892 gsomjwx.exe 108 PID 3192 wrote to memory of 2548 3192 rkernmr.exe 109 PID 3192 wrote to memory of 2548 3192 rkernmr.exe 109 PID 3192 wrote to memory of 2548 3192 rkernmr.exe 109 PID 2548 wrote to memory of 1036 2548 deszzzd.exe 111 PID 2548 wrote to memory of 1036 2548 deszzzd.exe 111 PID 2548 wrote to memory of 1036 2548 deszzzd.exe 111 PID 1036 wrote to memory of 1728 1036 rrbxfvc.exe 113 PID 1036 wrote to memory of 1728 1036 rrbxfvc.exe 113 PID 1036 wrote to memory of 1728 1036 rrbxfvc.exe 113 PID 1728 wrote to memory of 1780 1728 emtmkzb.exe 114 PID 1728 wrote to memory of 1780 1728 emtmkzb.exe 114 PID 1728 wrote to memory of 1780 1728 emtmkzb.exe 114 PID 1780 wrote to memory of 4656 1780 owikxpd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\gudxwpc.exeC:\Windows\system32\gudxwpc.exe 1164 "C:\Users\Admin\AppData\Local\Temp\f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\ggppktg.exeC:\Windows\system32\ggppktg.exe 1128 "C:\Windows\SysWOW64\gudxwpc.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\gjbizfk.exeC:\Windows\system32\gjbizfk.exe 1056 "C:\Windows\SysWOW64\ggppktg.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\mevlkcl.exeC:\Windows\system32\mevlkcl.exe 1176 "C:\Windows\SysWOW64\gjbizfk.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\wlziubk.exeC:\Windows\system32\wlziubk.exe 1064 "C:\Windows\SysWOW64\mevlkcl.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\yvrymxs.exeC:\Windows\system32\yvrymxs.exe 1120 "C:\Windows\SysWOW64\wlziubk.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\rctlrqu.exeC:\Windows\system32\rctlrqu.exe 1192 "C:\Windows\SysWOW64\yvrymxs.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\yydqjbw.exeC:\Windows\system32\yydqjbw.exe 1196 "C:\Windows\SysWOW64\rctlrqu.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\esxtmxx.exeC:\Windows\system32\esxtmxx.exe 1104 "C:\Windows\SysWOW64\yydqjbw.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\odmdhbd.exeC:\Windows\system32\odmdhbd.exe 1200 "C:\Windows\SysWOW64\esxtmxx.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\zkrwjmg.exeC:\Windows\system32\zkrwjmg.exe 1208 "C:\Windows\SysWOW64\odmdhbd.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\lpiqxvj.exeC:\Windows\system32\lpiqxvj.exe 1068 "C:\Windows\SysWOW64\zkrwjmg.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\yczgdzq.exeC:\Windows\system32\yczgdzq.exe 1212 "C:\Windows\SysWOW64\lpiqxvj.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\elibteo.exeC:\Windows\system32\elibteo.exe 1216 "C:\Windows\SysWOW64\yczgdzq.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\whzbntj.exeC:\Windows\system32\whzbntj.exe 1220 "C:\Windows\SysWOW64\elibteo.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\gsomjwx.exeC:\Windows\system32\gsomjwx.exe 1224 "C:\Windows\SysWOW64\whzbntj.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\rkernmr.exeC:\Windows\system32\rkernmr.exe 1236 "C:\Windows\SysWOW64\gsomjwx.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\deszzzd.exeC:\Windows\system32\deszzzd.exe 1228 "C:\Windows\SysWOW64\rkernmr.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\rrbxfvc.exeC:\Windows\system32\rrbxfvc.exe 1232 "C:\Windows\SysWOW64\deszzzd.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\emtmkzb.exeC:\Windows\system32\emtmkzb.exe 1240 "C:\Windows\SysWOW64\rrbxfvc.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\owikxpd.exeC:\Windows\system32\owikxpd.exe 1252 "C:\Windows\SysWOW64\emtmkzb.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\tjbsxfm.exeC:\Windows\system32\tjbsxfm.exe 1248 "C:\Windows\SysWOW64\owikxpd.exe"23⤵
- Executes dropped EXE
PID:4656 -
C:\Windows\SysWOW64\gwkidjk.exeC:\Windows\system32\gwkidjk.exe 1256 "C:\Windows\SysWOW64\tjbsxfm.exe"24⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\yhyilgl.exeC:\Windows\system32\yhyilgl.exe 1072 "C:\Windows\SysWOW64\gwkidjk.exe"25⤵
- Executes dropped EXE
PID:1052 -
C:\Windows\SysWOW64\bvbkghz.exeC:\Windows\system32\bvbkghz.exe 1260 "C:\Windows\SysWOW64\yhyilgl.exe"26⤵
- Executes dropped EXE
PID:948 -
C:\Windows\SysWOW64\ivalmnd.exeC:\Windows\system32\ivalmnd.exe 1044 "C:\Windows\SysWOW64\bvbkghz.exe"27⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\travuie.exeC:\Windows\system32\travuie.exe 1268 "C:\Windows\SysWOW64\ivalmnd.exe"28⤵
- Executes dropped EXE
PID:4492 -
C:\Windows\SysWOW64\ypxdhjd.exeC:\Windows\system32\ypxdhjd.exe 1080 "C:\Windows\SysWOW64\travuie.exe"29⤵
- Executes dropped EXE
PID:3420 -
C:\Windows\SysWOW64\iokaail.exeC:\Windows\system32\iokaail.exe 1284 "C:\Windows\SysWOW64\ypxdhjd.exe"30⤵
- Executes dropped EXE
PID:528 -
C:\Windows\SysWOW64\tcotctg.exeC:\Windows\system32\tcotctg.exe 1276 "C:\Windows\SysWOW64\iokaail.exe"31⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\wjcdrlh.exeC:\Windows\system32\wjcdrlh.exe 1292 "C:\Windows\SysWOW64\tcotctg.exe"32⤵
- Executes dropped EXE
PID:3360 -
C:\Windows\SysWOW64\ebbeyal.exeC:\Windows\system32\ebbeyal.exe 1296 "C:\Windows\SysWOW64\wjcdrlh.exe"33⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\ljpwspv.exeC:\Windows\system32\ljpwspv.exe 1112 "C:\Windows\SysWOW64\ebbeyal.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Windows\SysWOW64\lvbogbz.exeC:\Windows\system32\lvbogbz.exe 1084 "C:\Windows\SysWOW64\ljpwspv.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3528 -
C:\Windows\SysWOW64\ecdblub.exeC:\Windows\system32\ecdblub.exe 1300 "C:\Windows\SysWOW64\lvbogbz.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3624 -
C:\Windows\SysWOW64\obpzwta.exeC:\Windows\system32\obpzwta.exe 1304 "C:\Windows\SysWOW64\ecdblub.exe"37⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\SysWOW64\obqehtg.exeC:\Windows\system32\obqehtg.exe 1088 "C:\Windows\SysWOW64\obpzwta.exe"38⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\gxpjsuf.exeC:\Windows\system32\gxpjsuf.exe 1096 "C:\Windows\SysWOW64\obqehtg.exe"39⤵
- Executes dropped EXE
PID:896 -
C:\Windows\SysWOW64\ourxbfq.exeC:\Windows\system32\ourxbfq.exe 1320 "C:\Windows\SysWOW64\gxpjsuf.exe"40⤵
- Executes dropped EXE
PID:1184 -
C:\Windows\SysWOW64\dnoklbs.exeC:\Windows\system32\dnoklbs.exe 1324 "C:\Windows\SysWOW64\ourxbfq.exe"41⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\qafhrxr.exeC:\Windows\system32\qafhrxr.exe 1328 "C:\Windows\SysWOW64\dnoklbs.exe"42⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\bwgsgsr.exeC:\Windows\system32\bwgsgsr.exe 1336 "C:\Windows\SysWOW64\qafhrxr.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3560 -
C:\Windows\SysWOW64\lrzcoua.exeC:\Windows\system32\lrzcoua.exe 1340 "C:\Windows\SysWOW64\bwgsgsr.exe"44⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\bhtkvew.exeC:\Windows\system32\bhtkvew.exe 1332 "C:\Windows\SysWOW64\lrzcoua.exe"45⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\jaskbka.exeC:\Windows\system32\jaskbka.exe 1036 "C:\Windows\SysWOW64\bhtkvew.exe"46⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\wvbahoy.exeC:\Windows\system32\wvbahoy.exe 1352 "C:\Windows\SysWOW64\jaskbka.exe"47⤵
- Executes dropped EXE
PID:872 -
C:\Windows\SysWOW64\lgyvrcb.exeC:\Windows\system32\lgyvrcb.exe 1348 "C:\Windows\SysWOW64\wvbahoy.exe"48⤵
- Executes dropped EXE
PID:3868 -
C:\Windows\SysWOW64\yfbyzkg.exeC:\Windows\system32\yfbyzkg.exe 1100 "C:\Windows\SysWOW64\lgyvrcb.exe"49⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\iauipfh.exeC:\Windows\system32\iauipfh.exe 1356 "C:\Windows\SysWOW64\yfbyzkg.exe"50⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\oyzqvgo.exeC:\Windows\system32\oyzqvgo.exe 1360 "C:\Windows\SysWOW64\iauipfh.exe"51⤵
- Executes dropped EXE
PID:4020 -
C:\Windows\SysWOW64\eokybpk.exeC:\Windows\system32\eokybpk.exe 1364 "C:\Windows\SysWOW64\oyzqvgo.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3368 -
C:\Windows\SysWOW64\lwxqwft.exeC:\Windows\system32\lwxqwft.exe 1368 "C:\Windows\SysWOW64\eokybpk.exe"53⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\yjpocjs.exeC:\Windows\system32\yjpocjs.exe 1376 "C:\Windows\SysWOW64\lwxqwft.exe"54⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\gydbftx.exeC:\Windows\system32\gydbftx.exe 1172 "C:\Windows\SysWOW64\yjpocjs.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\tduwcca.exeC:\Windows\system32\tduwcca.exe 1380 "C:\Windows\SysWOW64\gydbftx.exe"56⤵
- Executes dropped EXE
PID:664 -
C:\Windows\SysWOW64\itgeate.exeC:\Windows\system32\itgeate.exe 1384 "C:\Windows\SysWOW64\tduwcca.exe"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4948 -
C:\Windows\SysWOW64\tdvjnkg.exeC:\Windows\system32\tdvjnkg.exe 1396 "C:\Windows\SysWOW64\itgeate.exe"58⤵
- Executes dropped EXE
PID:436 -
C:\Windows\SysWOW64\dzwtveh.exeC:\Windows\system32\dzwtveh.exe 1400 "C:\Windows\SysWOW64\tdvjnkg.exe"59⤵
- Executes dropped EXE
PID:3408 -
C:\Windows\SysWOW64\ngirfdo.exeC:\Windows\system32\ngirfdo.exe 1412 "C:\Windows\SysWOW64\dzwtveh.exe"60⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SysWOW64\ttshlhn.exeC:\Windows\system32\ttshlhn.exe 1108 "C:\Windows\SysWOW64\ngirfdo.exe"61⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\SysWOW64\gjujuht.exeC:\Windows\system32\gjujuht.exe 1404 "C:\Windows\SysWOW64\ttshlhn.exe"62⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\ohiwfrq.exeC:\Windows\system32\ohiwfrq.exe 1140 "C:\Windows\SysWOW64\gjujuht.exe"63⤵
- Executes dropped EXE
PID:3088 -
C:\Windows\SysWOW64\bxdzorv.exeC:\Windows\system32\bxdzorv.exe 1408 "C:\Windows\SysWOW64\ohiwfrq.exe"64⤵
- Executes dropped EXE
PID:3436 -
C:\Windows\SysWOW64\oogcxab.exeC:\Windows\system32\oogcxab.exe 1420 "C:\Windows\SysWOW64\bxdzorv.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4740 -
C:\Windows\SysWOW64\qgxzpwb.exeC:\Windows\system32\qgxzpwb.exe 1416 "C:\Windows\SysWOW64\oogcxab.exe"66⤵PID:1104
-
C:\Windows\SysWOW64\taapbjd.exeC:\Windows\system32\taapbjd.exe 1048 "C:\Windows\SysWOW64\qgxzpwb.exe"67⤵
- System Location Discovery: System Language Discovery
PID:4724 -
C:\Windows\SysWOW64\dtqvgzf.exeC:\Windows\system32\dtqvgzf.exe 1428 "C:\Windows\SysWOW64\taapbjd.exe"68⤵PID:4980
-
C:\Windows\SysWOW64\tmnqqvh.exeC:\Windows\system32\tmnqqvh.exe 1040 "C:\Windows\SysWOW64\dtqvgzf.exe"69⤵PID:4244
-
C:\Windows\SysWOW64\dlrniup.exeC:\Windows\system32\dlrniup.exe 1436 "C:\Windows\SysWOW64\tmnqqvh.exe"70⤵PID:2520
-
C:\Windows\SysWOW64\qyidoqo.exeC:\Windows\system32\qyidoqo.exe 1448 "C:\Windows\SysWOW64\dlrniup.exe"71⤵PID:1912
-
C:\Windows\SysWOW64\dtssutm.exeC:\Windows\system32\dtssutm.exe 1444 "C:\Windows\SysWOW64\qyidoqo.exe"72⤵PID:4768
-
C:\Windows\SysWOW64\iylafdz.exeC:\Windows\system32\iylafdz.exe 1440 "C:\Windows\SysWOW64\dtssutm.exe"73⤵PID:1304
-
C:\Windows\SysWOW64\qvhnrgw.exeC:\Windows\system32\qvhnrgw.exe 1452 "C:\Windows\SysWOW64\iylafdz.exe"74⤵PID:2544
-
C:\Windows\SysWOW64\aywyejd.exeC:\Windows\system32\aywyejd.exe 1460 "C:\Windows\SysWOW64\qvhnrgw.exe"75⤵PID:1432
-
C:\Windows\SysWOW64\iyvytqh.exeC:\Windows\system32\iyvytqh.exe 1464 "C:\Windows\SysWOW64\aywyejd.exe"76⤵PID:3632
-
C:\Windows\SysWOW64\bumynmb.exeC:\Windows\system32\bumynmb.exe 1468 "C:\Windows\SysWOW64\iyvytqh.exe"77⤵PID:4316
-
C:\Windows\SysWOW64\othbdmh.exeC:\Windows\system32\othbdmh.exe 1456 "C:\Windows\SysWOW64\bumynmb.exe"78⤵
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Windows\SysWOW64\tuxwmsn.exeC:\Windows\system32\tuxwmsn.exe 1132 "C:\Windows\SysWOW64\othbdmh.exe"79⤵PID:2816
-
C:\Windows\SysWOW64\gkszuak.exeC:\Windows\system32\gkszuak.exe 1476 "C:\Windows\SysWOW64\tuxwmsn.exe"80⤵PID:2376
-
C:\Windows\SysWOW64\qdiwhqm.exeC:\Windows\system32\qdiwhqm.exe 1480 "C:\Windows\SysWOW64\gkszuak.exe"81⤵PID:2148
-
C:\Windows\SysWOW64\dizzvzy.exeC:\Windows\system32\dizzvzy.exe 1484 "C:\Windows\SysWOW64\qdiwhqm.exe"82⤵PID:1136
-
C:\Windows\SysWOW64\qvjobdw.exeC:\Windows\system32\qvjobdw.exe 1496 "C:\Windows\SysWOW64\dizzvzy.exe"83⤵PID:4816
-
C:\Windows\SysWOW64\ysecfnt.exeC:\Windows\system32\ysecfnt.exe 1060 "C:\Windows\SysWOW64\qvjobdw.exe"84⤵PID:4460
-
C:\Windows\SysWOW64\qdsunkc.exeC:\Windows\system32\qdsunkc.exe 1492 "C:\Windows\SysWOW64\ysecfnt.exe"85⤵PID:3424
-
C:\Windows\SysWOW64\vidcgmh.exeC:\Windows\system32\vidcgmh.exe 1500 "C:\Windows\SysWOW64\qdsunkc.exe"86⤵PID:1604
-
C:\Windows\SysWOW64\ntrugjh.exeC:\Windows\system32\ntrugjh.exe 1144 "C:\Windows\SysWOW64\vidcgmh.exe"87⤵
- Drops file in System32 directory
PID:4380 -
C:\Windows\SysWOW64\tnkxrgh.exeC:\Windows\system32\tnkxrgh.exe 1148 "C:\Windows\SysWOW64\ntrugjh.exe"88⤵PID:4772
-
C:\Windows\SysWOW64\avgplvr.exeC:\Windows\system32\avgplvr.exe 1512 "C:\Windows\SysWOW64\tnkxrgh.exe"89⤵
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\ntbsteo.exeC:\Windows\system32\ntbsteo.exe 1432 "C:\Windows\SysWOW64\avgplvr.exe"90⤵PID:4092
-
C:\Windows\SysWOW64\vmasaks.exeC:\Windows\system32\vmasaks.exe 1524 "C:\Windows\SysWOW64\ntbsteo.exe"91⤵PID:2796
-
C:\Windows\SysWOW64\izrigor.exeC:\Windows\system32\izrigor.exe 1520 "C:\Windows\SysWOW64\vmasaks.exe"92⤵PID:3724
-
C:\Windows\SysWOW64\iohnfxc.exeC:\Windows\system32\iohnfxc.exe 1152 "C:\Windows\SysWOW64\izrigor.exe"93⤵PID:1844
-
C:\Windows\SysWOW64\tgwskve.exeC:\Windows\system32\tgwskve.exe 1160 "C:\Windows\SysWOW64\iohnfxc.exe"94⤵PID:4404
-
C:\Windows\SysWOW64\ficavzi.exeC:\Windows\system32\ficavzi.exe 1536 "C:\Windows\SysWOW64\tgwskve.exe"95⤵PID:3772
-
C:\Windows\SysWOW64\syfdeho.exeC:\Windows\system32\syfdeho.exe 1544 "C:\Windows\SysWOW64\ficavzi.exe"96⤵PID:812
-
C:\Windows\SysWOW64\flpakln.exeC:\Windows\system32\flpakln.exe 1552 "C:\Windows\SysWOW64\syfdeho.exe"97⤵PID:1624
-
C:\Windows\SysWOW64\sksdslk.exeC:\Windows\system32\sksdslk.exe 1076 "C:\Windows\SysWOW64\flpakln.exe"98⤵PID:2964
-
C:\Windows\SysWOW64\dfkoigt.exeC:\Windows\system32\dfkoigt.exe 1504 "C:\Windows\SysWOW64\sksdslk.exe"99⤵PID:3452
-
C:\Windows\SysWOW64\qscdoks.exeC:\Windows\system32\qscdoks.exe 1564 "C:\Windows\SysWOW64\dfkoigt.exe"100⤵PID:3044
-
C:\Windows\SysWOW64\dfutuor.exeC:\Windows\system32\dfutuor.exe 1556 "C:\Windows\SysWOW64\qscdoks.exe"101⤵PID:3532
-
C:\Windows\SysWOW64\isdjzrp.exeC:\Windows\system32\isdjzrp.exe 1560 "C:\Windows\SysWOW64\dfutuor.exe"102⤵
- Drops file in System32 directory
PID:4360 -
C:\Windows\SysWOW64\sdstnme.exeC:\Windows\system32\sdstnme.exe 1568 "C:\Windows\SysWOW64\isdjzrp.exe"103⤵PID:1416
-
C:\Windows\SysWOW64\fqkrsqd.exeC:\Windows\system32\fqkrsqd.exe 1168 "C:\Windows\SysWOW64\sdstnme.exe"104⤵PID:2460
-
C:\Windows\SysWOW64\sdugyub.exeC:\Windows\system32\sdugyub.exe 1592 "C:\Windows\SysWOW64\fqkrsqd.exe"105⤵PID:4576
-
C:\Windows\SysWOW64\gqlweya.exeC:\Windows\system32\gqlweya.exe 1580 "C:\Windows\SysWOW64\sdugyub.exe"106⤵PID:1168
-
C:\Windows\SysWOW64\pbbhzbg.exeC:\Windows\system32\pbbhzbg.exe 1584 "C:\Windows\SysWOW64\gqlweya.exe"107⤵PID:5016
-
C:\Windows\SysWOW64\awbrhwp.exeC:\Windows\system32\awbrhwp.exe 1588 "C:\Windows\SysWOW64\pbbhzbg.exe"108⤵PID:4276
-
C:\Windows\SysWOW64\nnwupwn.exeC:\Windows\system32\nnwupwn.exe 1488 "C:\Windows\SysWOW64\awbrhwp.exe"109⤵PID:1756
-
C:\Windows\SysWOW64\awcesvn.exeC:\Windows\system32\awcesvn.exe 1596 "C:\Windows\SysWOW64\nnwupwn.exe"110⤵PID:964
-
C:\Windows\SysWOW64\nnfhbds.exeC:\Windows\system32\nnfhbds.exe 1600 "C:\Windows\SysWOW64\awcesvn.exe"111⤵PID:1164
-
C:\Windows\SysWOW64\aapxhhr.exeC:\Windows\system32\aapxhhr.exe 1604 "C:\Windows\SysWOW64\nnfhbds.exe"112⤵PID:2416
-
C:\Windows\SysWOW64\khbuzgz.exeC:\Windows\system32\khbuzgz.exe 1608 "C:\Windows\SysWOW64\aapxhhr.exe"113⤵PID:368
-
C:\Windows\SysWOW64\xxwxige.exeC:\Windows\system32\xxwxige.exe 1628 "C:\Windows\SysWOW64\khbuzgz.exe"114⤵PID:1488
-
C:\Windows\SysWOW64\lhcalgw.exeC:\Windows\system32\lhcalgw.exe 1612 "C:\Windows\SysWOW64\xxwxige.exe"115⤵PID:4668
-
C:\Windows\SysWOW64\xjipwsa.exeC:\Windows\system32\xjipwsa.exe 1616 "C:\Windows\SysWOW64\lhcalgw.exe"116⤵PID:3376
-
C:\Windows\SysWOW64\iimnhri.exeC:\Windows\system32\iimnhri.exe 1620 "C:\Windows\SysWOW64\xjipwsa.exe"117⤵PID:4884
-
C:\Windows\SysWOW64\vvecmnh.exeC:\Windows\system32\vvecmnh.exe 1632 "C:\Windows\SysWOW64\iimnhri.exe"118⤵
- Drops file in System32 directory
PID:1760 -
C:\Windows\SysWOW64\iinssrn.exeC:\Windows\system32\iinssrn.exe 1636 "C:\Windows\SysWOW64\vvecmnh.exe"119⤵PID:540
-
C:\Windows\SysWOW64\vvfqyvm.exeC:\Windows\system32\vvfqyvm.exe 1624 "C:\Windows\SysWOW64\iinssrn.exe"120⤵PID:3048
-
C:\Windows\SysWOW64\italpds.exeC:\Windows\system32\italpds.exe 1644 "C:\Windows\SysWOW64\vvfqyvm.exe"121⤵
- Drops file in System32 directory
PID:916 -
C:\Windows\SysWOW64\vgriuzr.exeC:\Windows\system32\vgriuzr.exe 1656 "C:\Windows\SysWOW64\italpds.exe"122⤵PID:2324
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-