Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 14:05
Static task
static1
Behavioral task
behavioral1
Sample
f887b8113986c093b5aaa161413db5f6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f887b8113986c093b5aaa161413db5f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f887b8113986c093b5aaa161413db5f6_JaffaCakes118.exe
-
Size
150KB
-
MD5
f887b8113986c093b5aaa161413db5f6
-
SHA1
50601d8d1996b5ecdea292bff5dcee3b85ae26d5
-
SHA256
f7caac4912b9c34a9dd0ce99c91899ce6a24d3ded02d0321d21ac85defc46c34
-
SHA512
59555ae0a00b7659aaaa893853d2848147c747d0565e0b23ba3ec5163b547081e10b45489c9b9cbe0e49ed1eed3e3382da4580e9ecbaa453b6367a9cfe1efb45
-
SSDEEP
3072:viGFSUCzK7GBTEhE37TW9PjGL6+eNvPgj5j2dcRWG5IL6exdwjLiT:v5R7WTbrTULGmTdPgFj2d5/JgjLY
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 1868 nkzhjklit.exe 3604 axjxpokvh.exe 1848 kwvcznruh.exe 3112 ygbfcnrfj.exe 3952 iffcvlzej.exe 4268 veifdtwmc.exe 2656 fdmcokelc.exe 3356 vhmxsxbyr.exe 636 fzcdwodbs.exe 4816 pcznsrjdf.exe 4980 cxjdxvihl.exe 4368 nsknfprny.exe 652 afblltprn.exe 428 kbuwsnqpa.exe 4716 sjqondahi.exe 4612 ikneoeyzc.exe 4528 sffovyyeq.exe 608 fwiregelr.exe 3104 qrbbubfje.exe 2028 xzxbgqobe.exe 1072 kugrmungs.exe 976 vqhcboolf.exe 1000 kupxxckxm.exe 4280 vqipnwlca.exe 1980 isoxybymn.exe 3548 vfgmefwru.exe 4048 fahfmzxoh.exe 788 sunuxlbyv.exe 1060 fpwkdhikj.exe 4472 pdxvscjiw.exe 4880 avnaxallx.exe 3136 nthdgaisy.exe 2488 agzsmehxf.exe 5088 kjodzhwzr.exe 1716 xsvgkhojt.exe 2184 hdkqxkcdg.exe 1712 uqcgdgbqu.exe 376 kucbhtxkb.exe 3012 utoyrsfkb.exe 4640 fphqzmghp.exe 548 soktpmlop.exe 1580 xxqwsmdzj.exe 2944 krwmeyqiw.exe 5108 xmgbkconl.exe 4592 hlszubwnl.exe 2040 vvyjxsoxn.exe 4108 hperifahs.exe 220 rwiobeahs.exe 2328 ixfeumyzv.exe 4448 swjcmlfyv.exe 2320 crkmuggvi.exe 2868 peccacfip.exe 4236 mcbcbjspp.exe 5000 zsdfkrpwq.exe 3864 nckqniphk.exe 2152 xydaulqeg.exe 4764 nnwibuubz.exe 4964 xnafltbaz.exe 4660 kasvrxafo.exe 4000 uzwskwifo.exe 4064 hunqprgsu.exe 2004 ukityamzv.exe 1612 hxajeelej.exe 1588 riptrhrgw.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fefmnzugg.exe rjwwhdvbs.exe File created C:\Windows\SysWOW64\rtxibrems.exe egftvnfid.exe File created C:\Windows\SysWOW64\tpvfvawwl.exe gcdqqxxjx.exe File created C:\Windows\SysWOW64\pyfkdjgyy.exe fzantkzyy.exe File opened for modification C:\Windows\SysWOW64\pfxzencer.exe fvioikvkf.exe File opened for modification C:\Windows\SysWOW64\eqqquircs.exe rdzaofsxe.exe File opened for modification C:\Windows\SysWOW64\vmvmyoiyt.exe izewtkkln.exe File created C:\Windows\SysWOW64\afblltprn.exe nsknfprny.exe File created C:\Windows\SysWOW64\pdxvscjiw.exe fpwkdhikj.exe File opened for modification C:\Windows\SysWOW64\xnanpxarj.exe jaryjtbfv.exe File opened for modification C:\Windows\SysWOW64\yuehlfdzr.exe ojoxxcxff.exe File created C:\Windows\SysWOW64\lsveeqqcs.exe yfdgzmrpd.exe File created C:\Windows\SysWOW64\uscdjmknc.exe gfsnvimao.exe File created C:\Windows\SysWOW64\utikcfksu.exe hgqvwbdno.exe File created C:\Windows\SysWOW64\itgeatenh.exe yjqtnqytv.exe File opened for modification C:\Windows\SysWOW64\veifdtwmc.exe iffcvlzej.exe File opened for modification C:\Windows\SysWOW64\xydaulqeg.exe nckqniphk.exe File opened for modification C:\Windows\SysWOW64\nnwibuubz.exe xydaulqeg.exe File opened for modification C:\Windows\SysWOW64\siqydgxxq.exe evzjxcqlc.exe File created C:\Windows\SysWOW64\fvioikvkf.exe siqydgxxq.exe File opened for modification C:\Windows\SysWOW64\jutkquyah.exe zkeadzsgu.exe File opened for modification C:\Windows\SysWOW64\liszgvead.exe bxuossqfq.exe File created C:\Windows\SysWOW64\vclultcnz.exe itnjitcdf.exe File created C:\Windows\SysWOW64\dksxxkrfk.exe ppazrgsbv.exe File created C:\Windows\SysWOW64\fxkfjircl.exe rkbpdfkxx.exe File opened for modification C:\Windows\SysWOW64\bkkyirnhz.exe oxtjunodt.exe File opened for modification C:\Windows\SysWOW64\vofclgxkt.exe ibnmflyxn.exe File created C:\Windows\SysWOW64\vbpswhaak.exe iofcqdbvv.exe File opened for modification C:\Windows\SysWOW64\krwmeyqiw.exe xxqwsmdzj.exe File created C:\Windows\SysWOW64\yirybyaoa.exe oxuonuuuo.exe File created C:\Windows\SysWOW64\bpbwhgssj.exe prgtzxmci.exe File opened for modification C:\Windows\SysWOW64\agzzfuedl.exe ntpjzqgqe.exe File opened for modification C:\Windows\SysWOW64\apufrzbbd.exe mucplvcwx.exe File created C:\Windows\SysWOW64\lhnxyjcmg.exe yuehlfdzr.exe File opened for modification C:\Windows\SysWOW64\arenwtqji.exe mwnxiprwt.exe File created C:\Windows\SysWOW64\edxvxaruh.exe utikcfksu.exe File opened for modification C:\Windows\SysWOW64\gqrhypuyg.exe tdhrslvtr.exe File created C:\Windows\SysWOW64\gqsvjosqa.exe tdjxdttlu.exe File opened for modification C:\Windows\SysWOW64\gqsvjosqa.exe tdjxdttlu.exe File opened for modification C:\Windows\SysWOW64\xdssqsxxm.exe kiickoyky.exe File created C:\Windows\SysWOW64\zfrsmllop.exe mgopvlfho.exe File opened for modification C:\Windows\SysWOW64\vyhcyclmn.exe ilpelymhz.exe File opened for modification C:\Windows\SysWOW64\uagbgiwnk.exe kyrrtnqly.exe File opened for modification C:\Windows\SysWOW64\fuemamgem.exe szmwuihry.exe File opened for modification C:\Windows\SysWOW64\bntofwcvw.exe oabyzadqi.exe File opened for modification C:\Windows\SysWOW64\fgquktjpd.exe rlyweqkcx.exe File created C:\Windows\SysWOW64\dyootsica.exe boydgpcao.exe File created C:\Windows\SysWOW64\xpngmhyzy.exe kcwqgeznj.exe File opened for modification C:\Windows\SysWOW64\kdzohyqsr.exe aajduvkyf.exe File created C:\Windows\SysWOW64\utoyrsfkb.exe kucbhtxkb.exe File created C:\Windows\SysWOW64\mbwrtlulu.exe zombnhvgg.exe File opened for modification C:\Windows\SysWOW64\xuulpzxkm.exe nrfauwrqa.exe File opened for modification C:\Windows\SysWOW64\sqrusstgv.exe fviwmoubo.exe File opened for modification C:\Windows\SysWOW64\pozzwydmq.exe ctqkrvfak.exe File opened for modification C:\Windows\SysWOW64\avnaxallx.exe pdxvscjiw.exe File opened for modification C:\Windows\SysWOW64\zqpcoylqb.exe mdfmiumdn.exe File opened for modification C:\Windows\SysWOW64\bikuchdns.exe ozdrzhldq.exe File created C:\Windows\SysWOW64\wijhxrxsn.exe jvrsrnynh.exe File opened for modification C:\Windows\SysWOW64\qwflndvxb.exe djvvhzwsm.exe File opened for modification C:\Windows\SysWOW64\emctvkcje.exe qzldpgeey.exe File opened for modification C:\Windows\SysWOW64\evzragwkm.exe utjgfdqhz.exe File created C:\Windows\SysWOW64\zzwfeuplx.exe memhyqiyj.exe File created C:\Windows\SysWOW64\tqtnwlwbd.exe gdjxrqxwo.exe File opened for modification C:\Windows\SysWOW64\qztobozlq.exe dirlsncep.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrtedjfdq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zyrmzkjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crpxxhwpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxcnukocd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rsrtiyehs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clqsitnym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sthkpxhur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxjdxvihl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmgrgzivh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvtpxbbfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfbfkggie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqhcboolf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skcmtajxq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utjgfdqhz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itowubaca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iowpfedvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language veifdtwmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eutklxcxm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gqsvjosqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language juuqbceaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdfmiumdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmddedidx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qkrxsnmuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oabyzadqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjnivwqkx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpbesszxq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tqxyxrmfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hlpssgkxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avinqqyow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lgjvuanrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmfqoujmb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tscciypuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgxyasjil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agzzfuedl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gnlpedlzj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qrbbubfje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdgruukuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language enaawvcow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fuemamgem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdkqxkcdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eeezvnkhz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fefmnzugg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vyhcyclmn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fzantkzyy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aajduvkyf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvqrmmvsz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umoiupldw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wijhxrxsn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eqqquircs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utoyrsfkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpkjosvly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzvskrjvi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lghqjaizy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emctvkcje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cummggznh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qlxezwppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xydaulqeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fviwmoubo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpcjmzxpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kjpswmzjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ykbcslmtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kupxxckxm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ezpgfspex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llzwtglru.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1868 2644 f887b8113986c093b5aaa161413db5f6_JaffaCakes118.exe 86 PID 2644 wrote to memory of 1868 2644 f887b8113986c093b5aaa161413db5f6_JaffaCakes118.exe 86 PID 2644 wrote to memory of 1868 2644 f887b8113986c093b5aaa161413db5f6_JaffaCakes118.exe 86 PID 1868 wrote to memory of 3604 1868 nkzhjklit.exe 87 PID 1868 wrote to memory of 3604 1868 nkzhjklit.exe 87 PID 1868 wrote to memory of 3604 1868 nkzhjklit.exe 87 PID 3604 wrote to memory of 1848 3604 axjxpokvh.exe 88 PID 3604 wrote to memory of 1848 3604 axjxpokvh.exe 88 PID 3604 wrote to memory of 1848 3604 axjxpokvh.exe 88 PID 1848 wrote to memory of 3112 1848 kwvcznruh.exe 89 PID 1848 wrote to memory of 3112 1848 kwvcznruh.exe 89 PID 1848 wrote to memory of 3112 1848 kwvcznruh.exe 89 PID 3112 wrote to memory of 3952 3112 ygbfcnrfj.exe 90 PID 3112 wrote to memory of 3952 3112 ygbfcnrfj.exe 90 PID 3112 wrote to memory of 3952 3112 ygbfcnrfj.exe 90 PID 3952 wrote to memory of 4268 3952 iffcvlzej.exe 91 PID 3952 wrote to memory of 4268 3952 iffcvlzej.exe 91 PID 3952 wrote to memory of 4268 3952 iffcvlzej.exe 91 PID 4268 wrote to memory of 2656 4268 veifdtwmc.exe 92 PID 4268 wrote to memory of 2656 4268 veifdtwmc.exe 92 PID 4268 wrote to memory of 2656 4268 veifdtwmc.exe 92 PID 2656 wrote to memory of 3356 2656 fdmcokelc.exe 93 PID 2656 wrote to memory of 3356 2656 fdmcokelc.exe 93 PID 2656 wrote to memory of 3356 2656 fdmcokelc.exe 93 PID 3356 wrote to memory of 636 3356 vhmxsxbyr.exe 94 PID 3356 wrote to memory of 636 3356 vhmxsxbyr.exe 94 PID 3356 wrote to memory of 636 3356 vhmxsxbyr.exe 94 PID 636 wrote to memory of 4816 636 fzcdwodbs.exe 95 PID 636 wrote to memory of 4816 636 fzcdwodbs.exe 95 PID 636 wrote to memory of 4816 636 fzcdwodbs.exe 95 PID 4816 wrote to memory of 4980 4816 pcznsrjdf.exe 96 PID 4816 wrote to memory of 4980 4816 pcznsrjdf.exe 96 PID 4816 wrote to memory of 4980 4816 pcznsrjdf.exe 96 PID 4980 wrote to memory of 4368 4980 cxjdxvihl.exe 97 PID 4980 wrote to memory of 4368 4980 cxjdxvihl.exe 97 PID 4980 wrote to memory of 4368 4980 cxjdxvihl.exe 97 PID 4368 wrote to memory of 652 4368 nsknfprny.exe 98 PID 4368 wrote to memory of 652 4368 nsknfprny.exe 98 PID 4368 wrote to memory of 652 4368 nsknfprny.exe 98 PID 652 wrote to memory of 428 652 afblltprn.exe 99 PID 652 wrote to memory of 428 652 afblltprn.exe 99 PID 652 wrote to memory of 428 652 afblltprn.exe 99 PID 428 wrote to memory of 4716 428 kbuwsnqpa.exe 100 PID 428 wrote to memory of 4716 428 kbuwsnqpa.exe 100 PID 428 wrote to memory of 4716 428 kbuwsnqpa.exe 100 PID 4716 wrote to memory of 4612 4716 sjqondahi.exe 101 PID 4716 wrote to memory of 4612 4716 sjqondahi.exe 101 PID 4716 wrote to memory of 4612 4716 sjqondahi.exe 101 PID 4612 wrote to memory of 4528 4612 ikneoeyzc.exe 102 PID 4612 wrote to memory of 4528 4612 ikneoeyzc.exe 102 PID 4612 wrote to memory of 4528 4612 ikneoeyzc.exe 102 PID 4528 wrote to memory of 608 4528 sffovyyeq.exe 103 PID 4528 wrote to memory of 608 4528 sffovyyeq.exe 103 PID 4528 wrote to memory of 608 4528 sffovyyeq.exe 103 PID 608 wrote to memory of 3104 608 fwiregelr.exe 104 PID 608 wrote to memory of 3104 608 fwiregelr.exe 104 PID 608 wrote to memory of 3104 608 fwiregelr.exe 104 PID 3104 wrote to memory of 2028 3104 qrbbubfje.exe 105 PID 3104 wrote to memory of 2028 3104 qrbbubfje.exe 105 PID 3104 wrote to memory of 2028 3104 qrbbubfje.exe 105 PID 2028 wrote to memory of 1072 2028 xzxbgqobe.exe 106 PID 2028 wrote to memory of 1072 2028 xzxbgqobe.exe 106 PID 2028 wrote to memory of 1072 2028 xzxbgqobe.exe 106 PID 1072 wrote to memory of 976 1072 kugrmungs.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\f887b8113986c093b5aaa161413db5f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f887b8113986c093b5aaa161413db5f6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\nkzhjklit.exeC:\Windows\system32\nkzhjklit.exe 1188 "C:\Users\Admin\AppData\Local\Temp\f887b8113986c093b5aaa161413db5f6_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\axjxpokvh.exeC:\Windows\system32\axjxpokvh.exe 1152 "C:\Windows\SysWOW64\nkzhjklit.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\kwvcznruh.exeC:\Windows\system32\kwvcznruh.exe 1148 "C:\Windows\SysWOW64\axjxpokvh.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\ygbfcnrfj.exeC:\Windows\system32\ygbfcnrfj.exe 1160 "C:\Windows\SysWOW64\kwvcznruh.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\iffcvlzej.exeC:\Windows\system32\iffcvlzej.exe 1156 "C:\Windows\SysWOW64\ygbfcnrfj.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\veifdtwmc.exeC:\Windows\system32\veifdtwmc.exe 1164 "C:\Windows\SysWOW64\iffcvlzej.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\fdmcokelc.exeC:\Windows\system32\fdmcokelc.exe 1168 "C:\Windows\SysWOW64\veifdtwmc.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\vhmxsxbyr.exeC:\Windows\system32\vhmxsxbyr.exe 1172 "C:\Windows\SysWOW64\fdmcokelc.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\fzcdwodbs.exeC:\Windows\system32\fzcdwodbs.exe 1176 "C:\Windows\SysWOW64\vhmxsxbyr.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\pcznsrjdf.exeC:\Windows\system32\pcznsrjdf.exe 1180 "C:\Windows\SysWOW64\fzcdwodbs.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cxjdxvihl.exeC:\Windows\system32\cxjdxvihl.exe 1184 "C:\Windows\SysWOW64\pcznsrjdf.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\nsknfprny.exeC:\Windows\system32\nsknfprny.exe 1192 "C:\Windows\SysWOW64\cxjdxvihl.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\afblltprn.exeC:\Windows\system32\afblltprn.exe 1200 "C:\Windows\SysWOW64\nsknfprny.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\kbuwsnqpa.exeC:\Windows\system32\kbuwsnqpa.exe 1144 "C:\Windows\SysWOW64\afblltprn.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\sjqondahi.exeC:\Windows\system32\sjqondahi.exe 1208 "C:\Windows\SysWOW64\kbuwsnqpa.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\ikneoeyzc.exeC:\Windows\system32\ikneoeyzc.exe 1204 "C:\Windows\SysWOW64\sjqondahi.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\sffovyyeq.exeC:\Windows\system32\sffovyyeq.exe 1220 "C:\Windows\SysWOW64\ikneoeyzc.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\fwiregelr.exeC:\Windows\system32\fwiregelr.exe 1224 "C:\Windows\SysWOW64\sffovyyeq.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\qrbbubfje.exeC:\Windows\system32\qrbbubfje.exe 1212 "C:\Windows\SysWOW64\fwiregelr.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\xzxbgqobe.exeC:\Windows\system32\xzxbgqobe.exe 1248 "C:\Windows\SysWOW64\qrbbubfje.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\kugrmungs.exeC:\Windows\system32\kugrmungs.exe 1244 "C:\Windows\SysWOW64\xzxbgqobe.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\vqhcboolf.exeC:\Windows\system32\vqhcboolf.exe 1128 "C:\Windows\SysWOW64\kugrmungs.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:976 -
C:\Windows\SysWOW64\kupxxckxm.exeC:\Windows\system32\kupxxckxm.exe 1228 "C:\Windows\SysWOW64\vqhcboolf.exe"24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1000 -
C:\Windows\SysWOW64\vqipnwlca.exeC:\Windows\system32\vqipnwlca.exe 1232 "C:\Windows\SysWOW64\kupxxckxm.exe"25⤵
- Executes dropped EXE
PID:4280 -
C:\Windows\SysWOW64\isoxybymn.exeC:\Windows\system32\isoxybymn.exe 1240 "C:\Windows\SysWOW64\vqipnwlca.exe"26⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\vfgmefwru.exeC:\Windows\system32\vfgmefwru.exe 1236 "C:\Windows\SysWOW64\isoxybymn.exe"27⤵
- Executes dropped EXE
PID:3548 -
C:\Windows\SysWOW64\fahfmzxoh.exeC:\Windows\system32\fahfmzxoh.exe 1256 "C:\Windows\SysWOW64\vfgmefwru.exe"28⤵
- Executes dropped EXE
PID:4048 -
C:\Windows\SysWOW64\sunuxlbyv.exeC:\Windows\system32\sunuxlbyv.exe 1252 "C:\Windows\SysWOW64\fahfmzxoh.exe"29⤵
- Executes dropped EXE
PID:788 -
C:\Windows\SysWOW64\fpwkdhikj.exeC:\Windows\system32\fpwkdhikj.exe 1264 "C:\Windows\SysWOW64\sunuxlbyv.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1060 -
C:\Windows\SysWOW64\pdxvscjiw.exeC:\Windows\system32\pdxvscjiw.exe 1260 "C:\Windows\SysWOW64\fpwkdhikj.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4472 -
C:\Windows\SysWOW64\avnaxallx.exeC:\Windows\system32\avnaxallx.exe 1268 "C:\Windows\SysWOW64\pdxvscjiw.exe"32⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\nthdgaisy.exeC:\Windows\system32\nthdgaisy.exe 1272 "C:\Windows\SysWOW64\avnaxallx.exe"33⤵
- Executes dropped EXE
PID:3136 -
C:\Windows\SysWOW64\agzsmehxf.exeC:\Windows\system32\agzsmehxf.exe 1276 "C:\Windows\SysWOW64\nthdgaisy.exe"34⤵
- Executes dropped EXE
PID:2488 -
C:\Windows\SysWOW64\kjodzhwzr.exeC:\Windows\system32\kjodzhwzr.exe 1132 "C:\Windows\SysWOW64\agzsmehxf.exe"35⤵
- Executes dropped EXE
PID:5088 -
C:\Windows\SysWOW64\xsvgkhojt.exeC:\Windows\system32\xsvgkhojt.exe 1292 "C:\Windows\SysWOW64\kjodzhwzr.exe"36⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\hdkqxkcdg.exeC:\Windows\system32\hdkqxkcdg.exe 1284 "C:\Windows\SysWOW64\xsvgkhojt.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\SysWOW64\uqcgdgbqu.exeC:\Windows\system32\uqcgdgbqu.exe 1288 "C:\Windows\SysWOW64\hdkqxkcdg.exe"38⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\kucbhtxkb.exeC:\Windows\system32\kucbhtxkb.exe 1296 "C:\Windows\SysWOW64\uqcgdgbqu.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:376 -
C:\Windows\SysWOW64\utoyrsfkb.exeC:\Windows\system32\utoyrsfkb.exe 1300 "C:\Windows\SysWOW64\kucbhtxkb.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\fphqzmghp.exeC:\Windows\system32\fphqzmghp.exe 1304 "C:\Windows\SysWOW64\utoyrsfkb.exe"41⤵
- Executes dropped EXE
PID:4640 -
C:\Windows\SysWOW64\soktpmlop.exeC:\Windows\system32\soktpmlop.exe 1316 "C:\Windows\SysWOW64\fphqzmghp.exe"42⤵
- Executes dropped EXE
PID:548 -
C:\Windows\SysWOW64\xxqwsmdzj.exeC:\Windows\system32\xxqwsmdzj.exe 1308 "C:\Windows\SysWOW64\soktpmlop.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1580 -
C:\Windows\SysWOW64\krwmeyqiw.exeC:\Windows\system32\krwmeyqiw.exe 1320 "C:\Windows\SysWOW64\xxqwsmdzj.exe"44⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\xmgbkconl.exeC:\Windows\system32\xmgbkconl.exe 1312 "C:\Windows\SysWOW64\krwmeyqiw.exe"45⤵
- Executes dropped EXE
PID:5108 -
C:\Windows\SysWOW64\hlszubwnl.exeC:\Windows\system32\hlszubwnl.exe 1324 "C:\Windows\SysWOW64\xmgbkconl.exe"46⤵
- Executes dropped EXE
PID:4592 -
C:\Windows\SysWOW64\vvyjxsoxn.exeC:\Windows\system32\vvyjxsoxn.exe 1332 "C:\Windows\SysWOW64\hlszubwnl.exe"47⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\hperifahs.exeC:\Windows\system32\hperifahs.exe 1328 "C:\Windows\SysWOW64\vvyjxsoxn.exe"48⤵
- Executes dropped EXE
PID:4108 -
C:\Windows\SysWOW64\rwiobeahs.exeC:\Windows\system32\rwiobeahs.exe 1336 "C:\Windows\SysWOW64\hperifahs.exe"49⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\ixfeumyzv.exeC:\Windows\system32\ixfeumyzv.exe 1344 "C:\Windows\SysWOW64\rwiobeahs.exe"50⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\swjcmlfyv.exeC:\Windows\system32\swjcmlfyv.exe 1340 "C:\Windows\SysWOW64\ixfeumyzv.exe"51⤵
- Executes dropped EXE
PID:4448 -
C:\Windows\SysWOW64\crkmuggvi.exeC:\Windows\system32\crkmuggvi.exe 1356 "C:\Windows\SysWOW64\swjcmlfyv.exe"52⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\peccacfip.exeC:\Windows\system32\peccacfip.exe 1280 "C:\Windows\SysWOW64\crkmuggvi.exe"53⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\zprmnftcj.exeC:\Windows\system32\zprmnftcj.exe 1348 "C:\Windows\SysWOW64\peccacfip.exe"54⤵PID:4428
-
C:\Windows\SysWOW64\mcbcbjspp.exeC:\Windows\system32\mcbcbjspp.exe 1364 "C:\Windows\SysWOW64\zprmnftcj.exe"55⤵
- Executes dropped EXE
PID:4236 -
C:\Windows\SysWOW64\zsdfkrpwq.exeC:\Windows\system32\zsdfkrpwq.exe 1360 "C:\Windows\SysWOW64\mcbcbjspp.exe"56⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\nckqniphk.exeC:\Windows\system32\nckqniphk.exe 1372 "C:\Windows\SysWOW64\zsdfkrpwq.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3864 -
C:\Windows\SysWOW64\xydaulqeg.exeC:\Windows\system32\xydaulqeg.exe 1376 "C:\Windows\SysWOW64\nckqniphk.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\nnwibuubz.exeC:\Windows\system32\nnwibuubz.exe 1380 "C:\Windows\SysWOW64\xydaulqeg.exe"59⤵
- Executes dropped EXE
PID:4764 -
C:\Windows\SysWOW64\xnafltbaz.exeC:\Windows\system32\xnafltbaz.exe 1384 "C:\Windows\SysWOW64\nnwibuubz.exe"60⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\kasvrxafo.exeC:\Windows\system32\kasvrxafo.exe 1216 "C:\Windows\SysWOW64\xnafltbaz.exe"61⤵
- Executes dropped EXE
PID:4660 -
C:\Windows\SysWOW64\uzwskwifo.exeC:\Windows\system32\uzwskwifo.exe 1392 "C:\Windows\SysWOW64\kasvrxafo.exe"62⤵
- Executes dropped EXE
PID:4000 -
C:\Windows\SysWOW64\hunqprgsu.exeC:\Windows\system32\hunqprgsu.exe 1068 "C:\Windows\SysWOW64\uzwskwifo.exe"63⤵
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\ukityamzv.exeC:\Windows\system32\ukityamzv.exe 1396 "C:\Windows\SysWOW64\hunqprgsu.exe"64⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\hxajeelej.exeC:\Windows\system32\hxajeelej.exe 1400 "C:\Windows\SysWOW64\ukityamzv.exe"65⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\riptrhrgw.exeC:\Windows\system32\riptrhrgw.exe 1408 "C:\Windows\SysWOW64\hxajeelej.exe"66⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\evzjxcqlc.exeC:\Windows\system32\evzjxcqlc.exe 1012 "C:\Windows\SysWOW64\riptrhrgw.exe"67⤵
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\siqydgxxq.exeC:\Windows\system32\siqydgxxq.exe 1352 "C:\Windows\SysWOW64\evzjxcqlc.exe"68⤵
- Drops file in System32 directory
PID:3468 -
C:\Windows\SysWOW64\fvioikvkf.exeC:\Windows\system32\fvioikvkf.exe 1420 "C:\Windows\SysWOW64\siqydgxxq.exe"69⤵
- Drops file in System32 directory
PID:4080 -
C:\Windows\SysWOW64\pfxzencer.exeC:\Windows\system32\pfxzencer.exe 1416 "C:\Windows\SysWOW64\fvioikvkf.exe"70⤵PID:4308
-
C:\Windows\SysWOW64\cshojrarf.exeC:\Windows\system32\cshojrarf.exe 1412 "C:\Windows\SysWOW64\pfxzencer.exe"71⤵PID:4780
-
C:\Windows\SysWOW64\pfyepnzwm.exeC:\Windows\system32\pfyepnzwm.exe 1428 "C:\Windows\SysWOW64\cshojrarf.exe"72⤵PID:4312
-
C:\Windows\SysWOW64\zecjamhwm.exeC:\Windows\system32\zecjamhwm.exe 1432 "C:\Windows\SysWOW64\pfyepnzwm.exe"73⤵PID:2880
-
C:\Windows\SysWOW64\mdfmiumdn.exeC:\Windows\system32\mdfmiumdn.exe 1436 "C:\Windows\SysWOW64\zecjamhwm.exe"74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\zqpcoylqb.exeC:\Windows\system32\zqpcoylqb.exe 1440 "C:\Windows\SysWOW64\mdfmiumdn.exe"75⤵PID:4784
-
C:\Windows\SysWOW64\mdgruukuh.exeC:\Windows\system32\mdgruukuh.exe 1444 "C:\Windows\SysWOW64\zqpcoylqb.exe"76⤵
- System Location Discovery: System Language Discovery
PID:4252 -
C:\Windows\SysWOW64\aqyhixrhw.exeC:\Windows\system32\aqyhixrhw.exe 1448 "C:\Windows\SysWOW64\mdgruukuh.exe"77⤵PID:1920
-
C:\Windows\SysWOW64\jansvbxbi.exeC:\Windows\system32\jansvbxbi.exe 1452 "C:\Windows\SysWOW64\aqyhixrhw.exe"78⤵PID:2676
-
C:\Windows\SysWOW64\xnxhbewow.exeC:\Windows\system32\xnxhbewow.exe 1456 "C:\Windows\SysWOW64\jansvbxbi.exe"79⤵PID:1972
-
C:\Windows\SysWOW64\kxdseewyq.exeC:\Windows\system32\kxdseewyq.exe 1460 "C:\Windows\SysWOW64\xnxhbewow.exe"80⤵PID:4844
-
C:\Windows\SysWOW64\xngnmetgr.exeC:\Windows\system32\xngnmetgr.exe 1464 "C:\Windows\SysWOW64\kxdseewyq.exe"81⤵PID:1776
-
C:\Windows\SysWOW64\hyvxzhiie.exeC:\Windows\system32\hyvxzhiie.exe 1476 "C:\Windows\SysWOW64\xngnmetgr.exe"82⤵PID:440
-
C:\Windows\SysWOW64\ulfvnlgms.exeC:\Windows\system32\ulfvnlgms.exe 1480 "C:\Windows\SysWOW64\hyvxzhiie.exe"83⤵PID:1364
-
C:\Windows\SysWOW64\hywktpfzy.exeC:\Windows\system32\hywktpfzy.exe 1468 "C:\Windows\SysWOW64\ulfvnlgms.exe"84⤵PID:4436
-
C:\Windows\SysWOW64\uprncplgz.exeC:\Windows\system32\uprncplgz.exe 1472 "C:\Windows\SysWOW64\hywktpfzy.exe"85⤵PID:4900
-
C:\Windows\SysWOW64\ewdlmosgz.exeC:\Windows\system32\ewdlmosgz.exe 1424 "C:\Windows\SysWOW64\uprncplgz.exe"86⤵PID:2036
-
C:\Windows\SysWOW64\rjnassrln.exeC:\Windows\system32\rjnassrln.exe 1048 "C:\Windows\SysWOW64\ewdlmosgz.exe"87⤵PID:4520
-
C:\Windows\SysWOW64\xweqyvqyc.exeC:\Windows\system32\xweqyvqyc.exe 1500 "C:\Windows\SysWOW64\rjnassrln.exe"88⤵PID:3644
-
C:\Windows\SysWOW64\kjogdzodi.exeC:\Windows\system32\kjogdzodi.exe 1196 "C:\Windows\SysWOW64\xweqyvqyc.exe"89⤵PID:3992
-
C:\Windows\SysWOW64\xzrimausj.exeC:\Windows\system32\xzrimausj.exe 1496 "C:\Windows\SysWOW64\kjogdzodi.exe"90⤵PID:2252
-
C:\Windows\SysWOW64\hgvgeycjj.exeC:\Windows\system32\hgvgeycjj.exe 1508 "C:\Windows\SysWOW64\xzrimausj.exe"91⤵PID:2948
-
C:\Windows\SysWOW64\uxyjngzzk.exeC:\Windows\system32\uxyjngzzk.exe 1504 "C:\Windows\SysWOW64\hgvgeycjj.exe"92⤵PID:3712
-
C:\Windows\SysWOW64\hgwtqgzje.exeC:\Windows\system32\hgwtqgzje.exe 1492 "C:\Windows\SysWOW64\uxyjngzzk.exe"93⤵PID:824
-
C:\Windows\SysWOW64\rrtedjfdq.exeC:\Windows\system32\rrtedjfdq.exe 1516 "C:\Windows\SysWOW64\hgwtqgzje.exe"94⤵
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Windows\SysWOW64\eedtjfmqe.exeC:\Windows\system32\eedtjfmqe.exe 1520 "C:\Windows\SysWOW64\rrtedjfdq.exe"95⤵PID:3632
-
C:\Windows\SysWOW64\rrujpjlvt.exeC:\Windows\system32\rrujpjlvt.exe 1528 "C:\Windows\SysWOW64\eedtjfmqe.exe"96⤵PID:1464
-
C:\Windows\SysWOW64\eeezvnkhz.exeC:\Windows\system32\eeezvnkhz.exe 1536 "C:\Windows\SysWOW64\rrujpjlvt.exe"97⤵
- System Location Discovery: System Language Discovery
PID:968 -
C:\Windows\SysWOW64\oobjqqqcu.exeC:\Windows\system32\oobjqqqcu.exe 1524 "C:\Windows\SysWOW64\eeezvnkhz.exe"98⤵PID:1576
-
C:\Windows\SysWOW64\cblzwuxoa.exeC:\Windows\system32\cblzwuxoa.exe 1544 "C:\Windows\SysWOW64\oobjqqqcu.exe"99⤵PID:1944
-
C:\Windows\SysWOW64\pocpbpwto.exeC:\Windows\system32\pocpbpwto.exe 1548 "C:\Windows\SysWOW64\cblzwuxoa.exe"100⤵PID:3608
-
C:\Windows\SysWOW64\cbmmhtugd.exeC:\Windows\system32\cbmmhtugd.exe 1532 "C:\Windows\SysWOW64\pocpbpwto.exe"101⤵PID:2712
-
C:\Windows\SysWOW64\mmjxuwbap.exeC:\Windows\system32\mmjxuwbap.exe 1540 "C:\Windows\SysWOW64\cbmmhtugd.exe"102⤵PID:4152
-
C:\Windows\SysWOW64\zztmaaznv.exeC:\Windows\system32\zztmaaznv.exe 1552 "C:\Windows\SysWOW64\mmjxuwbap.exe"103⤵PID:4940
-
C:\Windows\SysWOW64\mmlcgwgak.exeC:\Windows\system32\mmlcgwgak.exe 1560 "C:\Windows\SysWOW64\zztmaaznv.exe"104⤵PID:2932
-
C:\Windows\SysWOW64\zzusuafey.exeC:\Windows\system32\zzusuafey.exe 1556 "C:\Windows\SysWOW64\mmlcgwgak.exe"105⤵PID:3676
-
C:\Windows\SysWOW64\jcrchdlhl.exeC:\Windows\system32\jcrchdlhl.exe 1572 "C:\Windows\SysWOW64\zzusuafey.exe"106⤵PID:452
-
C:\Windows\SysWOW64\wxbsnhklr.exeC:\Windows\system32\wxbsnhklr.exe 1568 "C:\Windows\SysWOW64\jcrchdlhl.exe"107⤵PID:3412
-
C:\Windows\SysWOW64\jktitljyf.exeC:\Windows\system32\jktitljyf.exe 1576 "C:\Windows\SysWOW64\wxbsnhklr.exe"108⤵PID:1184
-
C:\Windows\SysWOW64\xxcfyhqdu.exeC:\Windows\system32\xxcfyhqdu.exe 1584 "C:\Windows\SysWOW64\jktitljyf.exe"109⤵PID:4976
-
C:\Windows\SysWOW64\hzrimkwfg.exeC:\Windows\system32\hzrimkwfg.exe 1580 "C:\Windows\SysWOW64\xxcfyhqdu.exe"110⤵PID:2664
-
C:\Windows\SysWOW64\uujfanvkm.exeC:\Windows\system32\uujfanvkm.exe 1564 "C:\Windows\SysWOW64\hzrimkwfg.exe"111⤵PID:1928
-
C:\Windows\SysWOW64\hhbvfrtxb.exeC:\Windows\system32\hhbvfrtxb.exe 1592 "C:\Windows\SysWOW64\uujfanvkm.exe"112⤵PID:3812
-
C:\Windows\SysWOW64\uukllvabp.exeC:\Windows\system32\uukllvabp.exe 1588 "C:\Windows\SysWOW64\hhbvfrtxb.exe"113⤵PID:4736
-
C:\Windows\SysWOW64\exavyqhdc.exeC:\Windows\system32\exavyqhdc.exe 1604 "C:\Windows\SysWOW64\uukllvabp.exe"114⤵PID:4160
-
C:\Windows\SysWOW64\rsrleufiq.exeC:\Windows\system32\rsrleufiq.exe 1600 "C:\Windows\SysWOW64\exavyqhdc.exe"115⤵PID:724
-
C:\Windows\SysWOW64\efjbkyevw.exeC:\Windows\system32\efjbkyevw.exe 1608 "C:\Windows\SysWOW64\rsrleufiq.exe"116⤵PID:2720
-
C:\Windows\SysWOW64\oenycxmvw.exeC:\Windows\system32\oenycxmvw.exe 1616 "C:\Windows\SysWOW64\efjbkyevw.exe"117⤵PID:640
-
C:\Windows\SysWOW64\buiblfrcx.exeC:\Windows\system32\buiblfrcx.exe 1612 "C:\Windows\SysWOW64\oenycxmvw.exe"118⤵PID:1220
-
C:\Windows\SysWOW64\peolowjmz.exeC:\Windows\system32\peolowjmz.exe 1512 "C:\Windows\SysWOW64\buiblfrcx.exe"119⤵PID:1424
-
C:\Windows\SysWOW64\czfbuaqzf.exeC:\Windows\system32\czfbuaqzf.exe 1620 "C:\Windows\SysWOW64\peolowjmz.exe"120⤵PID:3576
-
C:\Windows\SysWOW64\mbvmhdwts.exeC:\Windows\system32\mbvmhdwts.exe 1596 "C:\Windows\SysWOW64\czfbuaqzf.exe"121⤵PID:3828
-
C:\Windows\SysWOW64\zombnhvgg.exeC:\Windows\system32\zombnhvgg.exe 1632 "C:\Windows\SysWOW64\mbvmhdwts.exe"122⤵
- Drops file in System32 directory
PID:4596
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-