Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 12:54
Behavioral task
behavioral1
Sample
94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe
-
Size
457KB
-
MD5
94cb18098d05da7483ca553db7e0e177
-
SHA1
1a81285f2dc96bf0881e3e9bb919d437a96a5ba4
-
SHA256
a339d8b5036c80bb755fc4c78ef97d3cd849692a6dbd5b825b001dd1bd4878bf
-
SHA512
635af6c0a6bf0e54579f1678623b85a1d1c537d57425ba5f4f764a9f0e72343f69b4a112e6953e22a0286686af560df76bc1b77991130104a31e717e63627ead
-
SSDEEP
12288:UQPA6krEJBqWNtDjLcnKNalKv1V0pjq1GBs:UQ0WNtD/qzAP0Nq1
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 3460 vwbzczl.exe 5116 ayjukwr.exe 3420 lqzrxmt.exe 1512 vplxhls.exe 4672 yhaumju.exe 3368 igfsfic.exe 4404 vtwpkeb.exe 4248 isrstmg.exe 2320 snscbgh.exe 2476 duwvdsc.exe 3216 srevpkl.exe 5096 djuauin.exe 2232 qlainns.exe 4072 dyjgtrq.exe 1032 qlbvzvp.exe 444 yplbiga.exe 1320 otlwmlx.exe 2892 ypmoufx.exe 772 kuejqwj.exe 3568 yhnywah.exe 4436 idordui.exe 2960 vbjtmvo.exe 3732 idpwpuo.exe 4408 vbszycl.exe 4676 dgumpnw.exe 4124 tkchtbt.exe 1036 gbxkcbq.exe 1592 nfhplub.exe 1468 dyekvid.exe 3492 nufucce.exe 312 xpyfsxf.exe 2112 lzepvwf.exe 2608 ybkfgjj.exe 3084 iwlpods.exe 1760 vngswdp.exe 5000 fjhdmyy.exe 2580 tsnnpxq.exe 744 dvcycae.exe 1156 qqunied.exe 4108 alnyqze.exe 1408 qxjtzng.exe 4608 askdphh.exe 1180 kolwwcq.exe 4796 yjvlcfp.exe 2024 lwmbijn.exe 4572 vvqysiv.exe 2792 iiioyeu.exe 528 vvaeeis.exe 1832 fgpozlh.exe 1680 ktyefpg.exe 1604 xgqclse.exe 4868 ifuzvrm.exe 3372 udxcerj.exe 4696 indfhrj.exe 1296 vanuvvi.exe 872 iqqxddo.exe 2824 sbfhryu.exe 2120 fklsuyu.exe 3520 sbgvcga.exe 2172 foykiky.exe 2404 pvciaig.exe 1704 ditygef.exe 1044 qyoapmk.exe 3244 dlgqvqj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\qlainns.exe djuauin.exe File created C:\Windows\SysWOW64\awmxdsn.exe quxnqpg.exe File opened for modification C:\Windows\SysWOW64\aalwaol.exe pbhzqqd.exe File opened for modification C:\Windows\SysWOW64\iqsbnzw.exe vdjlivq.exe File opened for modification C:\Windows\SysWOW64\hcdbfby.exe uhulzfz.exe File created C:\Windows\SysWOW64\jrehipk.exe tnemekn.exe File opened for modification C:\Windows\SysWOW64\kadaawn.exe axoqnty.exe File opened for modification C:\Windows\SysWOW64\askdphh.exe qxjtzng.exe File opened for modification C:\Windows\SysWOW64\udxcerj.exe ifuzvrm.exe File opened for modification C:\Windows\SysWOW64\vanuvvi.exe indfhrj.exe File created C:\Windows\SysWOW64\uqcgdgb.exe hdkqxkc.exe File created C:\Windows\SysWOW64\fkxtisy.exe rxoecxa.exe File opened for modification C:\Windows\SysWOW64\pddylbh.exe fezasda.exe File created C:\Windows\SysWOW64\nfiendm.exe ahfcech.exe File opened for modification C:\Windows\SysWOW64\iwlpods.exe ybkfgjj.exe File created C:\Windows\SysWOW64\qrfzdcp.exe imvulrm.exe File opened for modification C:\Windows\SysWOW64\hbyclwc.exe togmgad.exe File opened for modification C:\Windows\SysWOW64\nbrkjng.exe dunfrog.exe File opened for modification C:\Windows\SysWOW64\asvsevr.exe nfdcyzk.exe File created C:\Windows\SysWOW64\hmpovmo.exe uzgqpip.exe File created C:\Windows\SysWOW64\quwiepj.exe czesymc.exe File opened for modification C:\Windows\SysWOW64\xcwsdue.exe kebpvmz.exe File opened for modification C:\Windows\SysWOW64\rgkoozo.exe etbzavp.exe File opened for modification C:\Windows\SysWOW64\frccdah.exe sbiamsk.exe File opened for modification C:\Windows\SysWOW64\tmyedrn.exe jnuhtso.exe File opened for modification C:\Windows\SysWOW64\ldaosyx.exe xqjynvy.exe File created C:\Windows\SysWOW64\indfhrj.exe udxcerj.exe File opened for modification C:\Windows\SysWOW64\nsknfpr.exe dlgqvqj.exe File created C:\Windows\SysWOW64\rgtuazu.exe etceuvn.exe File opened for modification C:\Windows\SysWOW64\nwqitwy.exe ajzsnaa.exe File opened for modification C:\Windows\SysWOW64\quwiepj.exe czesymc.exe File opened for modification C:\Windows\SysWOW64\jyszkur.exe zzotavj.exe File opened for modification C:\Windows\SysWOW64\blhapcp.exe oyxljyj.exe File created C:\Windows\SysWOW64\habawti.exe unjkqpj.exe File created C:\Windows\SysWOW64\dyekvid.exe nfhplub.exe File created C:\Windows\SysWOW64\sbfhryu.exe iqqxddo.exe File created C:\Windows\SysWOW64\xsvgkho.exe kfdqwdp.exe File created C:\Windows\SysWOW64\ujiqced.exe hwqaxaf.exe File created C:\Windows\SysWOW64\eonlwas.exe rbvwqxu.exe File created C:\Windows\SysWOW64\twphdjw.exe fjxsxfx.exe File created C:\Windows\SysWOW64\pnsjlbd.exe cwxhdty.exe File opened for modification C:\Windows\SysWOW64\aipugtx.exe qgaksqq.exe File created C:\Windows\SysWOW64\vbszycl.exe idpwpuo.exe File opened for modification C:\Windows\SysWOW64\xvalmsu.exe nslbrpo.exe File created C:\Windows\SysWOW64\zeqfyvu.exe mryisrv.exe File created C:\Windows\SysWOW64\ictuywy.exe vpbessz.exe File created C:\Windows\SysWOW64\ezgpyln.exe rmoasho.exe File opened for modification C:\Windows\SysWOW64\wfarzei.exe jsjctik.exe File created C:\Windows\SysWOW64\ufcctyp.exe hksmnuq.exe File opened for modification C:\Windows\SysWOW64\yirybya.exe oxuonuu.exe File opened for modification C:\Windows\SysWOW64\rdqkroo.exe habawti.exe File opened for modification C:\Windows\SysWOW64\wcunsnh.exe keakjnb.exe File opened for modification C:\Windows\SysWOW64\uacsetj.exe kpnqjqd.exe File created C:\Windows\SysWOW64\hmkpjha.exe uzsaddt.exe File created C:\Windows\SysWOW64\mzbfplz.exe hmkpjha.exe File created C:\Windows\SysWOW64\jyszkur.exe zzotavj.exe File created C:\Windows\SysWOW64\ybkfgjj.exe lzepvwf.exe File created C:\Windows\SysWOW64\wfarzei.exe jsjctik.exe File opened for modification C:\Windows\SysWOW64\oswfjsx.exe aipugtx.exe File created C:\Windows\SysWOW64\axoqnty.exe nohnkcg.exe File created C:\Windows\SysWOW64\qkscdns.exe akvucmu.exe File opened for modification C:\Windows\SysWOW64\tduuroz.exe jdqwhpr.exe File created C:\Windows\SysWOW64\dgzajxl.exe qtikvtm.exe File created C:\Windows\SysWOW64\togmgad.exe gtwxawe.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ibnmfly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmedpwj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lygdjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jwafire.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oxtjuno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojwfxny.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpmugld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxxcylg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wezxepv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oyeoplk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdzihzs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqmorve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjhlnzb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language klengbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itgeate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jzinktu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfmntzp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kbnbknd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ifmtzlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pgpyzfm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language askdphh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chfzmzj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgtuazu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ujiqced.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fasuzdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gamwzgo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dunfrog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxkgntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uyboaxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmobjmq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqistvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sgerfcz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kieguek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbvwqxu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljfflis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmpovmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kpnqjqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language enaawvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfdcyzk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yplbiga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avmnmsf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbukfqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrydvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uilonsj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yirybya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tarzuba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjfcbhs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txeggxw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qapfery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frccdah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fduzlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvedzkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhaumju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kfdqwdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yrxwzam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srspnob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zjphnrz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsjqxkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dliufmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lqtgdvz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edxvxar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xplrmkz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlchiiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qlbvzvp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 3460 3668 94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe 83 PID 3668 wrote to memory of 3460 3668 94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe 83 PID 3668 wrote to memory of 3460 3668 94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe 83 PID 3460 wrote to memory of 5116 3460 vwbzczl.exe 84 PID 3460 wrote to memory of 5116 3460 vwbzczl.exe 84 PID 3460 wrote to memory of 5116 3460 vwbzczl.exe 84 PID 5116 wrote to memory of 3420 5116 ayjukwr.exe 85 PID 5116 wrote to memory of 3420 5116 ayjukwr.exe 85 PID 5116 wrote to memory of 3420 5116 ayjukwr.exe 85 PID 3420 wrote to memory of 1512 3420 lqzrxmt.exe 86 PID 3420 wrote to memory of 1512 3420 lqzrxmt.exe 86 PID 3420 wrote to memory of 1512 3420 lqzrxmt.exe 86 PID 1512 wrote to memory of 4672 1512 vplxhls.exe 87 PID 1512 wrote to memory of 4672 1512 vplxhls.exe 87 PID 1512 wrote to memory of 4672 1512 vplxhls.exe 87 PID 4672 wrote to memory of 3368 4672 yhaumju.exe 88 PID 4672 wrote to memory of 3368 4672 yhaumju.exe 88 PID 4672 wrote to memory of 3368 4672 yhaumju.exe 88 PID 3368 wrote to memory of 4404 3368 igfsfic.exe 89 PID 3368 wrote to memory of 4404 3368 igfsfic.exe 89 PID 3368 wrote to memory of 4404 3368 igfsfic.exe 89 PID 4404 wrote to memory of 4248 4404 vtwpkeb.exe 90 PID 4404 wrote to memory of 4248 4404 vtwpkeb.exe 90 PID 4404 wrote to memory of 4248 4404 vtwpkeb.exe 90 PID 4248 wrote to memory of 2320 4248 isrstmg.exe 91 PID 4248 wrote to memory of 2320 4248 isrstmg.exe 91 PID 4248 wrote to memory of 2320 4248 isrstmg.exe 91 PID 2320 wrote to memory of 2476 2320 snscbgh.exe 92 PID 2320 wrote to memory of 2476 2320 snscbgh.exe 92 PID 2320 wrote to memory of 2476 2320 snscbgh.exe 92 PID 2476 wrote to memory of 3216 2476 duwvdsc.exe 93 PID 2476 wrote to memory of 3216 2476 duwvdsc.exe 93 PID 2476 wrote to memory of 3216 2476 duwvdsc.exe 93 PID 3216 wrote to memory of 5096 3216 srevpkl.exe 94 PID 3216 wrote to memory of 5096 3216 srevpkl.exe 94 PID 3216 wrote to memory of 5096 3216 srevpkl.exe 94 PID 5096 wrote to memory of 2232 5096 djuauin.exe 95 PID 5096 wrote to memory of 2232 5096 djuauin.exe 95 PID 5096 wrote to memory of 2232 5096 djuauin.exe 95 PID 2232 wrote to memory of 4072 2232 qlainns.exe 98 PID 2232 wrote to memory of 4072 2232 qlainns.exe 98 PID 2232 wrote to memory of 4072 2232 qlainns.exe 98 PID 4072 wrote to memory of 1032 4072 dyjgtrq.exe 99 PID 4072 wrote to memory of 1032 4072 dyjgtrq.exe 99 PID 4072 wrote to memory of 1032 4072 dyjgtrq.exe 99 PID 1032 wrote to memory of 444 1032 qlbvzvp.exe 101 PID 1032 wrote to memory of 444 1032 qlbvzvp.exe 101 PID 1032 wrote to memory of 444 1032 qlbvzvp.exe 101 PID 444 wrote to memory of 1320 444 yplbiga.exe 102 PID 444 wrote to memory of 1320 444 yplbiga.exe 102 PID 444 wrote to memory of 1320 444 yplbiga.exe 102 PID 1320 wrote to memory of 2892 1320 otlwmlx.exe 103 PID 1320 wrote to memory of 2892 1320 otlwmlx.exe 103 PID 1320 wrote to memory of 2892 1320 otlwmlx.exe 103 PID 2892 wrote to memory of 772 2892 ypmoufx.exe 106 PID 2892 wrote to memory of 772 2892 ypmoufx.exe 106 PID 2892 wrote to memory of 772 2892 ypmoufx.exe 106 PID 772 wrote to memory of 3568 772 kuejqwj.exe 109 PID 772 wrote to memory of 3568 772 kuejqwj.exe 109 PID 772 wrote to memory of 3568 772 kuejqwj.exe 109 PID 3568 wrote to memory of 4436 3568 yhnywah.exe 110 PID 3568 wrote to memory of 4436 3568 yhnywah.exe 110 PID 3568 wrote to memory of 4436 3568 yhnywah.exe 110 PID 4436 wrote to memory of 2960 4436 idordui.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\vwbzczl.exeC:\Windows\system32\vwbzczl.exe 1152 "C:\Users\Admin\AppData\Local\Temp\94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\ayjukwr.exeC:\Windows\system32\ayjukwr.exe 1156 "C:\Windows\SysWOW64\vwbzczl.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\lqzrxmt.exeC:\Windows\system32\lqzrxmt.exe 1160 "C:\Windows\SysWOW64\ayjukwr.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\vplxhls.exeC:\Windows\system32\vplxhls.exe 1164 "C:\Windows\SysWOW64\lqzrxmt.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\yhaumju.exeC:\Windows\system32\yhaumju.exe 1168 "C:\Windows\SysWOW64\vplxhls.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\igfsfic.exeC:\Windows\system32\igfsfic.exe 1172 "C:\Windows\SysWOW64\yhaumju.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\vtwpkeb.exeC:\Windows\system32\vtwpkeb.exe 1176 "C:\Windows\SysWOW64\igfsfic.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\isrstmg.exeC:\Windows\system32\isrstmg.exe 1148 "C:\Windows\SysWOW64\vtwpkeb.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\snscbgh.exeC:\Windows\system32\snscbgh.exe 1184 "C:\Windows\SysWOW64\isrstmg.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\duwvdsc.exeC:\Windows\system32\duwvdsc.exe 1180 "C:\Windows\SysWOW64\snscbgh.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\srevpkl.exeC:\Windows\system32\srevpkl.exe 1188 "C:\Windows\SysWOW64\duwvdsc.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\djuauin.exeC:\Windows\system32\djuauin.exe 1196 "C:\Windows\SysWOW64\srevpkl.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\qlainns.exeC:\Windows\system32\qlainns.exe 1200 "C:\Windows\SysWOW64\djuauin.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\dyjgtrq.exeC:\Windows\system32\dyjgtrq.exe 1192 "C:\Windows\SysWOW64\qlainns.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\qlbvzvp.exeC:\Windows\system32\qlbvzvp.exe 1208 "C:\Windows\SysWOW64\dyjgtrq.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\yplbiga.exeC:\Windows\system32\yplbiga.exe 1204 "C:\Windows\SysWOW64\qlbvzvp.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\otlwmlx.exeC:\Windows\system32\otlwmlx.exe 1212 "C:\Windows\SysWOW64\yplbiga.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\ypmoufx.exeC:\Windows\system32\ypmoufx.exe 1216 "C:\Windows\SysWOW64\otlwmlx.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\kuejqwj.exeC:\Windows\system32\kuejqwj.exe 1220 "C:\Windows\SysWOW64\ypmoufx.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\yhnywah.exeC:\Windows\system32\yhnywah.exe 1224 "C:\Windows\SysWOW64\kuejqwj.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\idordui.exeC:\Windows\system32\idordui.exe 1232 "C:\Windows\SysWOW64\yhnywah.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\vbjtmvo.exeC:\Windows\system32\vbjtmvo.exe 1240 "C:\Windows\SysWOW64\idordui.exe"23⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\idpwpuo.exeC:\Windows\system32\idpwpuo.exe 1088 "C:\Windows\SysWOW64\vbjtmvo.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3732 -
C:\Windows\SysWOW64\vbszycl.exeC:\Windows\system32\vbszycl.exe 1236 "C:\Windows\SysWOW64\idpwpuo.exe"25⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\dgumpnw.exeC:\Windows\system32\dgumpnw.exe 1144 "C:\Windows\SysWOW64\vbszycl.exe"26⤵
- Executes dropped EXE
PID:4676 -
C:\Windows\SysWOW64\tkchtbt.exeC:\Windows\system32\tkchtbt.exe 1248 "C:\Windows\SysWOW64\dgumpnw.exe"27⤵
- Executes dropped EXE
PID:4124 -
C:\Windows\SysWOW64\gbxkcbq.exeC:\Windows\system32\gbxkcbq.exe 1252 "C:\Windows\SysWOW64\tkchtbt.exe"28⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\SysWOW64\nfhplub.exeC:\Windows\system32\nfhplub.exe 1256 "C:\Windows\SysWOW64\gbxkcbq.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\dyekvid.exeC:\Windows\system32\dyekvid.exe 1264 "C:\Windows\SysWOW64\nfhplub.exe"30⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\nufucce.exeC:\Windows\system32\nufucce.exe 1260 "C:\Windows\SysWOW64\dyekvid.exe"31⤵
- Executes dropped EXE
PID:3492 -
C:\Windows\SysWOW64\xpyfsxf.exeC:\Windows\system32\xpyfsxf.exe 1272 "C:\Windows\SysWOW64\nufucce.exe"32⤵
- Executes dropped EXE
PID:312 -
C:\Windows\SysWOW64\lzepvwf.exeC:\Windows\system32\lzepvwf.exe 1268 "C:\Windows\SysWOW64\xpyfsxf.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2112 -
C:\Windows\SysWOW64\ybkfgjj.exeC:\Windows\system32\ybkfgjj.exe 1276 "C:\Windows\SysWOW64\lzepvwf.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2608 -
C:\Windows\SysWOW64\iwlpods.exeC:\Windows\system32\iwlpods.exe 1284 "C:\Windows\SysWOW64\ybkfgjj.exe"35⤵
- Executes dropped EXE
PID:3084 -
C:\Windows\SysWOW64\vngswdp.exeC:\Windows\system32\vngswdp.exe 1288 "C:\Windows\SysWOW64\iwlpods.exe"36⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\fjhdmyy.exeC:\Windows\system32\fjhdmyy.exe 1292 "C:\Windows\SysWOW64\vngswdp.exe"37⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\tsnnpxq.exeC:\Windows\system32\tsnnpxq.exe 1296 "C:\Windows\SysWOW64\fjhdmyy.exe"38⤵
- Executes dropped EXE
PID:2580 -
C:\Windows\SysWOW64\dvcycae.exeC:\Windows\system32\dvcycae.exe 1280 "C:\Windows\SysWOW64\tsnnpxq.exe"39⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\qqunied.exeC:\Windows\system32\qqunied.exe 1304 "C:\Windows\SysWOW64\dvcycae.exe"40⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\SysWOW64\alnyqze.exeC:\Windows\system32\alnyqze.exe 1308 "C:\Windows\SysWOW64\qqunied.exe"41⤵
- Executes dropped EXE
PID:4108 -
C:\Windows\SysWOW64\qxjtzng.exeC:\Windows\system32\qxjtzng.exe 1244 "C:\Windows\SysWOW64\alnyqze.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1408 -
C:\Windows\SysWOW64\askdphh.exeC:\Windows\system32\askdphh.exe 1124 "C:\Windows\SysWOW64\qxjtzng.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Windows\SysWOW64\kolwwcq.exeC:\Windows\system32\kolwwcq.exe 1316 "C:\Windows\SysWOW64\askdphh.exe"44⤵
- Executes dropped EXE
PID:1180 -
C:\Windows\SysWOW64\yjvlcfp.exeC:\Windows\system32\yjvlcfp.exe 1324 "C:\Windows\SysWOW64\kolwwcq.exe"45⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\lwmbijn.exeC:\Windows\system32\lwmbijn.exe 1320 "C:\Windows\SysWOW64\yjvlcfp.exe"46⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\vvqysiv.exeC:\Windows\system32\vvqysiv.exe 1332 "C:\Windows\SysWOW64\lwmbijn.exe"47⤵
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\iiioyeu.exeC:\Windows\system32\iiioyeu.exe 1336 "C:\Windows\SysWOW64\vvqysiv.exe"48⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\vvaeeis.exeC:\Windows\system32\vvaeeis.exe 1344 "C:\Windows\SysWOW64\iiioyeu.exe"49⤵
- Executes dropped EXE
PID:528 -
C:\Windows\SysWOW64\fgpozlh.exeC:\Windows\system32\fgpozlh.exe 1328 "C:\Windows\SysWOW64\vvaeeis.exe"50⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\ktyefpg.exeC:\Windows\system32\ktyefpg.exe 1340 "C:\Windows\SysWOW64\fgpozlh.exe"51⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\SysWOW64\xgqclse.exeC:\Windows\system32\xgqclse.exe 1352 "C:\Windows\SysWOW64\ktyefpg.exe"52⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\SysWOW64\ifuzvrm.exeC:\Windows\system32\ifuzvrm.exe 1356 "C:\Windows\SysWOW64\xgqclse.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4868 -
C:\Windows\SysWOW64\udxcerj.exeC:\Windows\system32\udxcerj.exe 1128 "C:\Windows\SysWOW64\ifuzvrm.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3372 -
C:\Windows\SysWOW64\indfhrj.exeC:\Windows\system32\indfhrj.exe 1360 "C:\Windows\SysWOW64\udxcerj.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4696 -
C:\Windows\SysWOW64\vanuvvi.exeC:\Windows\system32\vanuvvi.exe 1364 "C:\Windows\SysWOW64\indfhrj.exe"56⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\iqqxddo.exeC:\Windows\system32\iqqxddo.exe 1372 "C:\Windows\SysWOW64\vanuvvi.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:872 -
C:\Windows\SysWOW64\sbfhryu.exeC:\Windows\system32\sbfhryu.exe 1376 "C:\Windows\SysWOW64\iqqxddo.exe"58⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\fklsuyu.exeC:\Windows\system32\fklsuyu.exe 1380 "C:\Windows\SysWOW64\sbfhryu.exe"59⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\sbgvcga.exeC:\Windows\system32\sbgvcga.exe 1368 "C:\Windows\SysWOW64\fklsuyu.exe"60⤵
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\foykiky.exeC:\Windows\system32\foykiky.exe 1384 "C:\Windows\SysWOW64\sbgvcga.exe"61⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\pvciaig.exeC:\Windows\system32\pvciaig.exe 1388 "C:\Windows\SysWOW64\foykiky.exe"62⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\ditygef.exeC:\Windows\system32\ditygef.exe 1396 "C:\Windows\SysWOW64\pvciaig.exe"63⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\SysWOW64\qyoapmk.exeC:\Windows\system32\qyoapmk.exe 1400 "C:\Windows\SysWOW64\ditygef.exe"64⤵
- Executes dropped EXE
PID:1044 -
C:\Windows\SysWOW64\dlgqvqj.exeC:\Windows\system32\dlgqvqj.exe 1392 "C:\Windows\SysWOW64\qyoapmk.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3244 -
C:\Windows\SysWOW64\nsknfpr.exeC:\Windows\system32\nsknfpr.exe 1404 "C:\Windows\SysWOW64\dlgqvqj.exe"66⤵PID:1892
-
C:\Windows\SysWOW64\ajfqopo.exeC:\Windows\system32\ajfqopo.exe 1408 "C:\Windows\SysWOW64\nsknfpr.exe"67⤵PID:4032
-
C:\Windows\SysWOW64\nslbrpo.exeC:\Windows\system32\nslbrpo.exe 1312 "C:\Windows\SysWOW64\ajfqopo.exe"68⤵
- Drops file in System32 directory
PID:4716 -
C:\Windows\SysWOW64\xvalmsu.exeC:\Windows\system32\xvalmsu.exe 1432 "C:\Windows\SysWOW64\nslbrpo.exe"69⤵PID:4856
-
C:\Windows\SysWOW64\kqsbswb.exeC:\Windows\system32\kqsbswb.exe 1348 "C:\Windows\SysWOW64\xvalmsu.exe"70⤵PID:2160
-
C:\Windows\SysWOW64\upwycub.exeC:\Windows\system32\upwycub.exe 1444 "C:\Windows\SysWOW64\kqsbswb.exe"71⤵PID:5008
-
C:\Windows\SysWOW64\lqtgdvz.exeC:\Windows\system32\lqtgdvz.exe 1140 "C:\Windows\SysWOW64\upwycub.exe"72⤵
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\utirqyf.exeC:\Windows\system32\utirqyf.exe 1424 "C:\Windows\SysWOW64\lqtgdvz.exe"73⤵PID:4064
-
C:\Windows\SysWOW64\icpttyf.exeC:\Windows\system32\icpttyf.exe 1436 "C:\Windows\SysWOW64\utirqyf.exe"74⤵PID:624
-
C:\Windows\SysWOW64\vbrwcgl.exeC:\Windows\system32\vbrwcgl.exe 1440 "C:\Windows\SysWOW64\icpttyf.exe"75⤵PID:2220
-
C:\Windows\SysWOW64\fawcufk.exeC:\Windows\system32\fawcufk.exe 1428 "C:\Windows\SysWOW64\vbrwcgl.exe"76⤵PID:3988
-
C:\Windows\SysWOW64\snnrajr.exeC:\Windows\system32\snnrajr.exe 1456 "C:\Windows\SysWOW64\fawcufk.exe"77⤵PID:2212
-
C:\Windows\SysWOW64\faxhgfq.exeC:\Windows\system32\faxhgfq.exe 1500 "C:\Windows\SysWOW64\snnrajr.exe"78⤵PID:4892
-
C:\Windows\SysWOW64\phjeqdx.exeC:\Windows\system32\phjeqdx.exe 1460 "C:\Windows\SysWOW64\faxhgfq.exe"79⤵PID:3496
-
C:\Windows\SysWOW64\fljzuru.exeC:\Windows\system32\fljzuru.exe 1448 "C:\Windows\SysWOW64\phjeqdx.exe"80⤵PID:3616
-
C:\Windows\SysWOW64\pkvxfpu.exeC:\Windows\system32\pkvxfpu.exe 1464 "C:\Windows\SysWOW64\fljzuru.exe"81⤵PID:1356
-
C:\Windows\SysWOW64\dxfmlla.exeC:\Windows\system32\dxfmlla.exe 1452 "C:\Windows\SysWOW64\pkvxfpu.exe"82⤵PID:4848
-
C:\Windows\SysWOW64\miuxgoh.exeC:\Windows\system32\miuxgoh.exe 1472 "C:\Windows\SysWOW64\dxfmlla.exe"83⤵PID:3480
-
C:\Windows\SysWOW64\avmnmsf.exeC:\Windows\system32\avmnmsf.exe 1476 "C:\Windows\SysWOW64\miuxgoh.exe"84⤵
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\SysWOW64\nesxpsf.exeC:\Windows\system32\nesxpsf.exe 1468 "C:\Windows\SysWOW64\avmnmsf.exe"85⤵PID:4024
-
C:\Windows\SysWOW64\xhhicvm.exeC:\Windows\system32\xhhicvm.exe 1484 "C:\Windows\SysWOW64\nesxpsf.exe"86⤵PID:2860
-
C:\Windows\SysWOW64\kfckkvr.exeC:\Windows\system32\kfckkvr.exe 1488 "C:\Windows\SysWOW64\xhhicvm.exe"87⤵PID:2540
-
C:\Windows\SysWOW64\xsuaqzq.exeC:\Windows\system32\xsuaqzq.exe 1504 "C:\Windows\SysWOW64\kfckkvr.exe"88⤵PID:364
-
C:\Windows\SysWOW64\kfdqwdp.exeC:\Windows\system32\kfdqwdp.exe 1492 "C:\Windows\SysWOW64\xsuaqzq.exe"89⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Windows\SysWOW64\xsvgkho.exeC:\Windows\system32\xsvgkho.exe 1496 "C:\Windows\SysWOW64\kfdqwdp.exe"90⤵PID:4604
-
C:\Windows\SysWOW64\hdkqxkc.exeC:\Windows\system32\hdkqxkc.exe 1508 "C:\Windows\SysWOW64\xsvgkho.exe"91⤵
- Drops file in System32 directory
PID:3028 -
C:\Windows\SysWOW64\uqcgdgb.exeC:\Windows\system32\uqcgdgb.exe 1512 "C:\Windows\SysWOW64\hdkqxkc.exe"92⤵PID:2872
-
C:\Windows\SysWOW64\idlvjjz.exeC:\Windows\system32\idlvjjz.exe 1516 "C:\Windows\SysWOW64\uqcgdgb.exe"93⤵PID:2908
-
C:\Windows\SysWOW64\scxbtih.exeC:\Windows\system32\scxbtih.exe 1480 "C:\Windows\SysWOW64\idlvjjz.exe"94⤵PID:4828
-
C:\Windows\SysWOW64\fbsdcqm.exeC:\Windows\system32\fbsdcqm.exe 1524 "C:\Windows\SysWOW64\scxbtih.exe"95⤵PID:3452
-
C:\Windows\SysWOW64\soktpml.exeC:\Windows\system32\soktpml.exe 1528 "C:\Windows\SysWOW64\fbsdcqm.exe"96⤵PID:3864
-
C:\Windows\SysWOW64\xxqwsmd.exeC:\Windows\system32\xxqwsmd.exe 1532 "C:\Windows\SysWOW64\soktpml.exe"97⤵PID:3356
-
C:\Windows\SysWOW64\kolzbuj.exeC:\Windows\system32\kolzbuj.exe 1416 "C:\Windows\SysWOW64\xxqwsmd.exe"98⤵PID:4736
-
C:\Windows\SysWOW64\uyajoxx.exeC:\Windows\system32\uyajoxx.exe 1548 "C:\Windows\SysWOW64\kolzbuj.exe"99⤵PID:232
-
C:\Windows\SysWOW64\hlszubw.exeC:\Windows\system32\hlszubw.exe 1540 "C:\Windows\SysWOW64\uyajoxx.exe"100⤵PID:736
-
C:\Windows\SysWOW64\uyboaxv.exeC:\Windows\system32\uyboaxv.exe 1544 "C:\Windows\SysWOW64\hlszubw.exe"101⤵
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Windows\SysWOW64\iltmgat.exeC:\Windows\system32\iltmgat.exe 1552 "C:\Windows\SysWOW64\uyboaxv.exe"102⤵PID:2840
-
C:\Windows\SysWOW64\rwiobea.exeC:\Windows\system32\rwiobea.exe 1536 "C:\Windows\SysWOW64\iltmgat.exe"103⤵PID:4092
-
C:\Windows\SysWOW64\fjamhhh.exeC:\Windows\system32\fjamhhh.exe 1556 "C:\Windows\SysWOW64\rwiobea.exe"104⤵PID:3240
-
C:\Windows\SysWOW64\ssgpkhy.exeC:\Windows\system32\ssgpkhy.exe 1568 "C:\Windows\SysWOW64\fjamhhh.exe"105⤵PID:2360
-
C:\Windows\SysWOW64\fjbsshe.exeC:\Windows\system32\fjbsshe.exe 1564 "C:\Windows\SysWOW64\ssgpkhy.exe"106⤵PID:2644
-
C:\Windows\SysWOW64\pifpdgm.exeC:\Windows\system32\pifpdgm.exe 1572 "C:\Windows\SysWOW64\fjbsshe.exe"107⤵PID:1300
-
C:\Windows\SysWOW64\cgisloj.exeC:\Windows\system32\cgisloj.exe 1576 "C:\Windows\SysWOW64\pifpdgm.exe"108⤵PID:4792
-
C:\Windows\SysWOW64\pqouooj.exeC:\Windows\system32\pqouooj.exe 1560 "C:\Windows\SysWOW64\cgisloj.exe"109⤵PID:2768
-
C:\Windows\SysWOW64\cgjxxop.exeC:\Windows\system32\cgjxxop.exe 1580 "C:\Windows\SysWOW64\pqouooj.exe"110⤵PID:3868
-
C:\Windows\SysWOW64\mryisrv.exeC:\Windows\system32\mryisrv.exe 1588 "C:\Windows\SysWOW64\cgjxxop.exe"111⤵
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\zeqfyvu.exeC:\Windows\system32\zeqfyvu.exe 1584 "C:\Windows\SysWOW64\mryisrv.exe"112⤵PID:1896
-
C:\Windows\SysWOW64\nnwibuu.exeC:\Windows\system32\nnwibuu.exe 1592 "C:\Windows\SysWOW64\zeqfyvu.exe"113⤵PID:3456
-
C:\Windows\SysWOW64\aerlkcz.exeC:\Windows\system32\aerlkcz.exe 1036 "C:\Windows\SysWOW64\nnwibuu.exe"114⤵PID:2292
-
C:\Windows\SysWOW64\kpgvxyg.exeC:\Windows\system32\kpgvxyg.exe 1600 "C:\Windows\SysWOW64\aerlkcz.exe"115⤵PID:2760
-
C:\Windows\SysWOW64\xcyldbe.exeC:\Windows\system32\xcyldbe.exe 1604 "C:\Windows\SysWOW64\kpgvxyg.exe"116⤵PID:2640
-
C:\Windows\SysWOW64\klengbe.exeC:\Windows\system32\klengbe.exe 1608 "C:\Windows\SysWOW64\xcyldbe.exe"117⤵
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\uotybel.exeC:\Windows\system32\uotybel.exe 1616 "C:\Windows\SysWOW64\klengbe.exe"118⤵PID:2744
-
C:\Windows\SysWOW64\hmobjmq.exeC:\Windows\system32\hmobjmq.exe 1612 "C:\Windows\SysWOW64\uotybel.exe"119⤵
- System Location Discovery: System Language Discovery
PID:4312 -
C:\Windows\SysWOW64\uzgqpip.exeC:\Windows\system32\uzgqpip.exe 1624 "C:\Windows\SysWOW64\hmobjmq.exe"120⤵
- Drops file in System32 directory
PID:396 -
C:\Windows\SysWOW64\hmpovmo.exeC:\Windows\system32\hmpovmo.exe 1632 "C:\Windows\SysWOW64\uzgqpip.exe"121⤵
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\uzhebqv.exeC:\Windows\system32\uzhebqv.exe 1628 "C:\Windows\SysWOW64\hmpovmo.exe"122⤵PID:4680
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-