Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 13:41
Behavioral task
behavioral1
Sample
ea1dab772ea67edd7a56a3e641dbfa19_JaffaCakes118.exe
Resource
win7-20240221-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
ea1dab772ea67edd7a56a3e641dbfa19_JaffaCakes118.exe
Resource
win10v2004-20240226-en
6 signatures
150 seconds
General
-
Target
ea1dab772ea67edd7a56a3e641dbfa19_JaffaCakes118.exe
-
Size
31KB
-
MD5
ea1dab772ea67edd7a56a3e641dbfa19
-
SHA1
d1ac24e8f188e11012474fcba8f1512bd7d62e7b
-
SHA256
71fb44f467aa3d6f40e2add320b39ab6d4077a693e6a79ee63584abcbf316844
-
SHA512
eadd29209cc4aeecad4f1aa935647dfab0b567d73f7ed8ae25f28a9d82507a17832d9f4cc84822304e1ec7b36775937f93c681ada11a5fa11f1a77c58004730d
-
SSDEEP
192:5+doBNQlUjGgMUhrniMRqS4t9GuIq0ZxpfFpbpc+:4dYQlviniMRqSG5qxpfnO
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2248 yhcdxnkl.exe 5028 tuwgldi.exe 2656 jnqme.exe 3988 qmkus.exe 3864 ygheaut.exe 4612 esismdh.exe 2472 blapp.exe 3588 yslwpcca.exe 5096 ediowj.exe 3616 ypspdyh.exe 4044 jxsxvk.exe 3172 vzigbiwy.exe 3180 kyqvllg.exe 3568 botvw.exe 2564 xidcocu.exe 3600 egowuys.exe 2028 nxhpsgf.exe 2724 khfzvsal.exe 3108 jzect.exe 4784 dpbwztj.exe 400 tvdcwh.exe 3996 xjllwymu.exe 4148 azobbd.exe 3488 owntq.exe 1200 usnuh.exe 2692 rhcxi.exe 4992 krykxqk.exe 4264 biijye.exe 1144 gmugv.exe 3360 pjfgfhze.exe 4200 fcfwvyey.exe 3916 tamdvpv.exe 1168 srvhgrql.exe 4780 hskgc.exe 3644 yycyfpfp.exe 828 vblir.exe 860 gkjfswqs.exe 4016 jhjcut.exe 3388 xaxwkgm.exe 316 inkzbfv.exe 3032 gtmbif.exe 1920 qdbwpg.exe 4544 oxtqygwu.exe 4416 pvaimskj.exe 4588 jcvgz.exe 1004 pkfjjns.exe 3436 kyxmi.exe 4364 hlxdrnus.exe 2388 wywqbuol.exe 4968 vfkkjflx.exe 908 utauu.exe 3852 wyurkdi.exe 3056 fvxcbo.exe 1048 ydiwo.exe 1776 eudzrlyv.exe 4316 pppqdy.exe 2920 kjdfuh.exe 3376 hylri.exe 4580 kbdstml.exe 4380 wsfyrwhf.exe 2624 mswlwnzl.exe 3684 lbemara.exe 2756 gcwqo.exe 3608 jocrkli.exe -
resource yara_rule behavioral2/memory/4896-0-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/files/0x000700000002323b-3.dat upx behavioral2/memory/4612-26-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/2028-70-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/2028-111-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/400-127-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/3996-132-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/2692-142-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/1920-175-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/4416-180-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/3056-201-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/1048-202-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/4316-207-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/3684-220-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/5144-243-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/5320-254-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/5492-287-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/6296-409-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/7072-491-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/7392-554-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/7560-587-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/9660-882-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/10564-996-0x0000000031420000-0x000000003142A000-memory.dmp upx behavioral2/memory/6840-9527-0x0000000031420000-0x000000003142A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\bkuzeljk.exe" tdgfzj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\xydtypi.exe" eygng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\gtdbcvou.exe" oawovtf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\dmfexygq.exe" zzejcr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\tgcvvd.exe" rjepgmz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wxvlpjxj.exe" kdlmvtp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\qtmjyt.exe" cywve.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\tgqfe.exe" tzxch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wyurkdi.exe" utauu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\tugxmbza.exe" ecrwlagj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ydhratg.exe" pcmjkxxq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\zfksd.exe" nyfaiutd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\gyjsk.exe" emcurfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ktzeq.exe" ahruxwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\fcapbn.exe" uhbzcpnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ybvgqti.exe" iwbgjpz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wntqfpq.exe" ockzlf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\kfwepca.exe" xgvxcv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\syolvp.exe" zklztnw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\yknizkg.exe" qthreydd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\zbfhzoq.exe" hxbyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\vpmsls.exe" xqhalrtl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ggzhaza.exe" glilsuxo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\qecoxr.exe" wogmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\khfzvsal.exe" nxhpsgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wosii.exe" uzjgexum.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ijyqmuh.exe" pjwlhqlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\rpgfaokm.exe" nbcndd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\hlxdrnus.exe" kyxmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\avzljf.exe" zpnag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\zklztnw.exe" rjeimr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\tiyxoj.exe" pwwfsxzx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\sffdt.exe" fjpzcigl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\rbefdr.exe" bkuzeljk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\yhcdxnkl.exe" ea1dab772ea67edd7a56a3e641dbfa19_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ediowj.exe" yslwpcca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\prvrdmyl.exe" gajvxqv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ivircbv.exe" tnlyque.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\zdxqnaxf.exe" gsbcxzb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\rtidg.exe" nkllxxt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\stnkrw.exe" tznyqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\lfmleccn.exe" ltloa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\ltbddkpb.exe" apklsbac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\qhqhuw.exe" cxngv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\sjomhlep.exe" zsibouaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\tzxch.exe" ibfcdgcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\hrzkzlf.exe" tjxkqfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\zoelmgx.exe" ifltqygy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\xgnyg.exe" viburl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\rmfoqf.exe" vhpuzlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\sqbhjkn.exe" vbqcgar.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\hkstmv.exe" vqkpavyg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\vhxblxtx.exe" ongceo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\finorfm.exe" ughhzm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wszvfvr.exe" dvyauba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wcnlc.exe" zbfhzoq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\kwrrpx.exe" cbkuiuqy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wdpuae.exe" ppihypqn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\bgwpolwv.exe" abndg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\gajvxqv.exe" nmwogneb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wgkwgkbz.exe" omomq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\wpatre.exe" lrnyef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\viburl.exe" fvrvl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Cryptographic Service = "C:\\Windows\\system32\\dklreeam.exe" qpjtprg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\snkxto.exe lvrdm.exe File opened for modification C:\Windows\SysWOW64\bgwpolwv.exe abndg.exe File created C:\Windows\SysWOW64\qnozbo.exe lujajppm.exe File created C:\Windows\SysWOW64\vkulpfoh.exe ttnjmru.exe File opened for modification C:\Windows\SysWOW64\rpdcx.exe emjgiz.exe File created C:\Windows\SysWOW64\ockzlf.exe cjjgilqf.exe File created C:\Windows\SysWOW64\yvliapfc.exe mutss.exe File opened for modification C:\Windows\SysWOW64\jhjcut.exe gkjfswqs.exe File created C:\Windows\SysWOW64\xgkcpez.exe dhpguc.exe File created C:\Windows\SysWOW64\owinqj.exe ehyidwjd.exe File opened for modification C:\Windows\SysWOW64\rooccvr.exe oazmnsk.exe File created C:\Windows\SysWOW64\nfkfbjj.exe ltbddkpb.exe File opened for modification C:\Windows\SysWOW64\cstsjgri.exe siati.exe File opened for modification C:\Windows\SysWOW64\mebkzg.exe curgy.exe File created C:\Windows\SysWOW64\srvhgrql.exe tamdvpv.exe File opened for modification C:\Windows\SysWOW64\uuxhgfpf.exe fxamsnjq.exe File opened for modification C:\Windows\SysWOW64\mhcsf.exe mmwxuey.exe File opened for modification C:\Windows\SysWOW64\tbbpchel.exe ebdppzat.exe File created C:\Windows\SysWOW64\rjdjkjx.exe jugmmehg.exe File created C:\Windows\SysWOW64\jxxzsxi.exe lvuziv.exe File opened for modification C:\Windows\SysWOW64\gnzfi.exe lushdat.exe File opened for modification C:\Windows\SysWOW64\yjrrohug.exe tbazkjhj.exe File created C:\Windows\SysWOW64\auygeuyh.exe zcxpcs.exe File opened for modification C:\Windows\SysWOW64\uhbzcpnb.exe xxosfu.exe File opened for modification C:\Windows\SysWOW64\fymzcej.exe qtjhzfim.exe File created C:\Windows\SysWOW64\tuwgldi.exe yhcdxnkl.exe File opened for modification C:\Windows\SysWOW64\uhqar.exe qxqifvn.exe File created C:\Windows\SysWOW64\oxtqygwu.exe qdbwpg.exe File opened for modification C:\Windows\SysWOW64\xsvefzwd.exe jcacwck.exe File opened for modification C:\Windows\SysWOW64\sqbhjkn.exe vbqcgar.exe File opened for modification C:\Windows\SysWOW64\rfacqjg.exe eqnzwd.exe File opened for modification C:\Windows\SysWOW64\oazmnsk.exe ehagxvo.exe File created C:\Windows\SysWOW64\npsuchr.exe oryic.exe File opened for modification C:\Windows\SysWOW64\zsibouaw.exe gqvxdjfs.exe File opened for modification C:\Windows\SysWOW64\apklsbac.exe busrtvpk.exe File opened for modification C:\Windows\SysWOW64\ldrpgdb.exe dbfmtq.exe File opened for modification C:\Windows\SysWOW64\cnohnlg.exe cjwqhxqq.exe File created C:\Windows\SysWOW64\kcqnpzi.exe agcbjx.exe File created C:\Windows\SysWOW64\mxjuh.exe dnvty.exe File created C:\Windows\SysWOW64\ezbjfzk.exe wzbiexrl.exe File created C:\Windows\SysWOW64\sfcfw.exe tkoxpx.exe File created C:\Windows\SysWOW64\fblmw.exe dvlsj.exe File created C:\Windows\SysWOW64\qgbak.exe erokrkvq.exe File opened for modification C:\Windows\SysWOW64\rrutggt.exe dhjwcni.exe File opened for modification C:\Windows\SysWOW64\hssmvvej.exe fwtmrp.exe File created C:\Windows\SysWOW64\asfisp.exe elgdvrx.exe File created C:\Windows\SysWOW64\sdpcvdth.exe nxahxl.exe File opened for modification C:\Windows\SysWOW64\eholzycr.exe ttevs.exe File opened for modification C:\Windows\SysWOW64\emjgiz.exe eholzycr.exe File created C:\Windows\SysWOW64\qhqhuw.exe cxngv.exe File created C:\Windows\SysWOW64\abndg.exe ufqjchoc.exe File created C:\Windows\SysWOW64\daxvzi.exe aubgusl.exe File opened for modification C:\Windows\SysWOW64\droix.exe ndtkfzxw.exe File created C:\Windows\SysWOW64\ydiwo.exe fvxcbo.exe File opened for modification C:\Windows\SysWOW64\jpmmg.exe nnjmf.exe File opened for modification C:\Windows\SysWOW64\xgnyg.exe viburl.exe File opened for modification C:\Windows\SysWOW64\xgvxcv.exe sdlgjju.exe File opened for modification C:\Windows\SysWOW64\eygng.exe lfmleccn.exe File opened for modification C:\Windows\SysWOW64\zixxn.exe soizb.exe File opened for modification C:\Windows\SysWOW64\zslms.exe uzamwlqm.exe File opened for modification C:\Windows\SysWOW64\ybvgqti.exe iwbgjpz.exe File created C:\Windows\SysWOW64\xidcocu.exe botvw.exe File created C:\Windows\SysWOW64\gyfmznt.exe gurglv.exe File opened for modification C:\Windows\SysWOW64\xvpaftn.exe wlpyf.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4896 ea1dab772ea67edd7a56a3e641dbfa19_JaffaCakes118.exe Token: SeDebugPrivilege 2248 yhcdxnkl.exe Token: SeDebugPrivilege 5028 tuwgldi.exe Token: SeDebugPrivilege 2656 jnqme.exe Token: SeDebugPrivilege 3988 qmkus.exe Token: SeDebugPrivilege 3864 ygheaut.exe Token: SeDebugPrivilege 4612 esismdh.exe Token: SeDebugPrivilege 2472 blapp.exe Token: SeDebugPrivilege 3588 yslwpcca.exe Token: SeDebugPrivilege 5096 ediowj.exe Token: SeDebugPrivilege 3616 ypspdyh.exe Token: SeDebugPrivilege 4044 jxsxvk.exe Token: SeDebugPrivilege 3172 vzigbiwy.exe Token: SeDebugPrivilege 3180 kyqvllg.exe Token: SeDebugPrivilege 3568 botvw.exe Token: SeDebugPrivilege 2564 xidcocu.exe Token: SeDebugPrivilege 3600 egowuys.exe Token: SeDebugPrivilege 2028 nxhpsgf.exe Token: SeDebugPrivilege 2724 khfzvsal.exe Token: SeDebugPrivilege 3108 jzect.exe Token: SeDebugPrivilege 4784 dpbwztj.exe Token: SeDebugPrivilege 400 tvdcwh.exe Token: SeDebugPrivilege 3996 xjllwymu.exe Token: SeDebugPrivilege 4148 azobbd.exe Token: SeDebugPrivilege 3488 owntq.exe Token: SeDebugPrivilege 1200 usnuh.exe Token: SeDebugPrivilege 2692 rhcxi.exe Token: SeDebugPrivilege 4992 krykxqk.exe Token: SeDebugPrivilege 4264 biijye.exe Token: SeDebugPrivilege 1144 gmugv.exe Token: SeDebugPrivilege 3360 pjfgfhze.exe Token: SeDebugPrivilege 4200 fcfwvyey.exe Token: SeDebugPrivilege 3916 tamdvpv.exe Token: SeDebugPrivilege 1168 srvhgrql.exe Token: SeDebugPrivilege 4780 hskgc.exe Token: SeDebugPrivilege 3644 yycyfpfp.exe Token: SeDebugPrivilege 828 vblir.exe Token: SeDebugPrivilege 860 gkjfswqs.exe Token: SeDebugPrivilege 4016 jhjcut.exe Token: SeDebugPrivilege 3388 xaxwkgm.exe Token: SeDebugPrivilege 316 inkzbfv.exe Token: SeDebugPrivilege 3032 gtmbif.exe Token: SeDebugPrivilege 1920 qdbwpg.exe Token: SeDebugPrivilege 4544 oxtqygwu.exe Token: SeDebugPrivilege 4416 pvaimskj.exe Token: SeDebugPrivilege 4588 jcvgz.exe Token: SeDebugPrivilege 1004 pkfjjns.exe Token: SeDebugPrivilege 3436 kyxmi.exe Token: SeDebugPrivilege 4364 hlxdrnus.exe Token: SeDebugPrivilege 2388 wywqbuol.exe Token: SeDebugPrivilege 4968 vfkkjflx.exe Token: SeDebugPrivilege 908 utauu.exe Token: SeDebugPrivilege 3852 wyurkdi.exe Token: SeDebugPrivilege 3056 fvxcbo.exe Token: SeDebugPrivilege 1048 ydiwo.exe Token: SeDebugPrivilege 1776 eudzrlyv.exe Token: SeDebugPrivilege 4316 pppqdy.exe Token: SeDebugPrivilege 2920 kjdfuh.exe Token: SeDebugPrivilege 3376 hylri.exe Token: SeDebugPrivilege 4580 kbdstml.exe Token: SeDebugPrivilege 4380 wsfyrwhf.exe Token: SeDebugPrivilege 2624 mswlwnzl.exe Token: SeDebugPrivilege 3684 lbemara.exe Token: SeDebugPrivilege 2756 gcwqo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4896 wrote to memory of 2248 4896 ea1dab772ea67edd7a56a3e641dbfa19_JaffaCakes118.exe 88 PID 4896 wrote to memory of 2248 4896 ea1dab772ea67edd7a56a3e641dbfa19_JaffaCakes118.exe 88 PID 4896 wrote to memory of 2248 4896 ea1dab772ea67edd7a56a3e641dbfa19_JaffaCakes118.exe 88 PID 2248 wrote to memory of 5028 2248 yhcdxnkl.exe 89 PID 2248 wrote to memory of 5028 2248 yhcdxnkl.exe 89 PID 2248 wrote to memory of 5028 2248 yhcdxnkl.exe 89 PID 5028 wrote to memory of 2656 5028 tuwgldi.exe 90 PID 5028 wrote to memory of 2656 5028 tuwgldi.exe 90 PID 5028 wrote to memory of 2656 5028 tuwgldi.exe 90 PID 2656 wrote to memory of 3988 2656 jnqme.exe 91 PID 2656 wrote to memory of 3988 2656 jnqme.exe 91 PID 2656 wrote to memory of 3988 2656 jnqme.exe 91 PID 3988 wrote to memory of 3864 3988 qmkus.exe 92 PID 3988 wrote to memory of 3864 3988 qmkus.exe 92 PID 3988 wrote to memory of 3864 3988 qmkus.exe 92 PID 3864 wrote to memory of 4612 3864 ygheaut.exe 93 PID 3864 wrote to memory of 4612 3864 ygheaut.exe 93 PID 3864 wrote to memory of 4612 3864 ygheaut.exe 93 PID 4612 wrote to memory of 2472 4612 esismdh.exe 94 PID 4612 wrote to memory of 2472 4612 esismdh.exe 94 PID 4612 wrote to memory of 2472 4612 esismdh.exe 94 PID 2472 wrote to memory of 3588 2472 blapp.exe 95 PID 2472 wrote to memory of 3588 2472 blapp.exe 95 PID 2472 wrote to memory of 3588 2472 blapp.exe 95 PID 3588 wrote to memory of 5096 3588 yslwpcca.exe 96 PID 3588 wrote to memory of 5096 3588 yslwpcca.exe 96 PID 3588 wrote to memory of 5096 3588 yslwpcca.exe 96 PID 5096 wrote to memory of 3616 5096 ediowj.exe 97 PID 5096 wrote to memory of 3616 5096 ediowj.exe 97 PID 5096 wrote to memory of 3616 5096 ediowj.exe 97 PID 3616 wrote to memory of 4044 3616 ypspdyh.exe 98 PID 3616 wrote to memory of 4044 3616 ypspdyh.exe 98 PID 3616 wrote to memory of 4044 3616 ypspdyh.exe 98 PID 4044 wrote to memory of 3172 4044 jxsxvk.exe 99 PID 4044 wrote to memory of 3172 4044 jxsxvk.exe 99 PID 4044 wrote to memory of 3172 4044 jxsxvk.exe 99 PID 3172 wrote to memory of 3180 3172 vzigbiwy.exe 100 PID 3172 wrote to memory of 3180 3172 vzigbiwy.exe 100 PID 3172 wrote to memory of 3180 3172 vzigbiwy.exe 100 PID 3180 wrote to memory of 3568 3180 kyqvllg.exe 101 PID 3180 wrote to memory of 3568 3180 kyqvllg.exe 101 PID 3180 wrote to memory of 3568 3180 kyqvllg.exe 101 PID 3568 wrote to memory of 2564 3568 botvw.exe 102 PID 3568 wrote to memory of 2564 3568 botvw.exe 102 PID 3568 wrote to memory of 2564 3568 botvw.exe 102 PID 2564 wrote to memory of 3600 2564 xidcocu.exe 103 PID 2564 wrote to memory of 3600 2564 xidcocu.exe 103 PID 2564 wrote to memory of 3600 2564 xidcocu.exe 103 PID 3600 wrote to memory of 2028 3600 egowuys.exe 104 PID 3600 wrote to memory of 2028 3600 egowuys.exe 104 PID 3600 wrote to memory of 2028 3600 egowuys.exe 104 PID 2028 wrote to memory of 2724 2028 nxhpsgf.exe 105 PID 2028 wrote to memory of 2724 2028 nxhpsgf.exe 105 PID 2028 wrote to memory of 2724 2028 nxhpsgf.exe 105 PID 2724 wrote to memory of 3108 2724 khfzvsal.exe 106 PID 2724 wrote to memory of 3108 2724 khfzvsal.exe 106 PID 2724 wrote to memory of 3108 2724 khfzvsal.exe 106 PID 3108 wrote to memory of 4784 3108 jzect.exe 107 PID 3108 wrote to memory of 4784 3108 jzect.exe 107 PID 3108 wrote to memory of 4784 3108 jzect.exe 107 PID 4784 wrote to memory of 400 4784 dpbwztj.exe 108 PID 4784 wrote to memory of 400 4784 dpbwztj.exe 108 PID 4784 wrote to memory of 400 4784 dpbwztj.exe 108 PID 400 wrote to memory of 3996 400 tvdcwh.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea1dab772ea67edd7a56a3e641dbfa19_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea1dab772ea67edd7a56a3e641dbfa19_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\yhcdxnkl.exeC:\Windows\system32\yhcdxnkl.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\tuwgldi.exeC:\Windows\system32\tuwgldi.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\jnqme.exeC:\Windows\system32\jnqme.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\qmkus.exeC:\Windows\system32\qmkus.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\ygheaut.exeC:\Windows\system32\ygheaut.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\esismdh.exeC:\Windows\system32\esismdh.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\blapp.exeC:\Windows\system32\blapp.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\yslwpcca.exeC:\Windows\system32\yslwpcca.exe9⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\ediowj.exeC:\Windows\system32\ediowj.exe10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\ypspdyh.exeC:\Windows\system32\ypspdyh.exe11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\jxsxvk.exeC:\Windows\system32\jxsxvk.exe12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\vzigbiwy.exeC:\Windows\system32\vzigbiwy.exe13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\kyqvllg.exeC:\Windows\system32\kyqvllg.exe14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\botvw.exeC:\Windows\system32\botvw.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\xidcocu.exeC:\Windows\system32\xidcocu.exe16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\egowuys.exeC:\Windows\system32\egowuys.exe17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\nxhpsgf.exeC:\Windows\system32\nxhpsgf.exe18⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\khfzvsal.exeC:\Windows\system32\khfzvsal.exe19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\jzect.exeC:\Windows\system32\jzect.exe20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\dpbwztj.exeC:\Windows\system32\dpbwztj.exe21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\tvdcwh.exeC:\Windows\system32\tvdcwh.exe22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\xjllwymu.exeC:\Windows\system32\xjllwymu.exe23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3996 -
C:\Windows\SysWOW64\azobbd.exeC:\Windows\system32\azobbd.exe24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4148 -
C:\Windows\SysWOW64\owntq.exeC:\Windows\system32\owntq.exe25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3488 -
C:\Windows\SysWOW64\usnuh.exeC:\Windows\system32\usnuh.exe26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Windows\SysWOW64\rhcxi.exeC:\Windows\system32\rhcxi.exe27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\SysWOW64\krykxqk.exeC:\Windows\system32\krykxqk.exe28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4992 -
C:\Windows\SysWOW64\biijye.exeC:\Windows\system32\biijye.exe29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4264 -
C:\Windows\SysWOW64\gmugv.exeC:\Windows\system32\gmugv.exe30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1144 -
C:\Windows\SysWOW64\pjfgfhze.exeC:\Windows\system32\pjfgfhze.exe31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3360 -
C:\Windows\SysWOW64\fcfwvyey.exeC:\Windows\system32\fcfwvyey.exe32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4200 -
C:\Windows\SysWOW64\tamdvpv.exeC:\Windows\system32\tamdvpv.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Windows\SysWOW64\srvhgrql.exeC:\Windows\system32\srvhgrql.exe34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SysWOW64\hskgc.exeC:\Windows\system32\hskgc.exe35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4780 -
C:\Windows\SysWOW64\yycyfpfp.exeC:\Windows\system32\yycyfpfp.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3644 -
C:\Windows\SysWOW64\vblir.exeC:\Windows\system32\vblir.exe37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:828 -
C:\Windows\SysWOW64\gkjfswqs.exeC:\Windows\system32\gkjfswqs.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:860 -
C:\Windows\SysWOW64\jhjcut.exeC:\Windows\system32\jhjcut.exe39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4016 -
C:\Windows\SysWOW64\xaxwkgm.exeC:\Windows\system32\xaxwkgm.exe40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3388 -
C:\Windows\SysWOW64\inkzbfv.exeC:\Windows\system32\inkzbfv.exe41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:316 -
C:\Windows\SysWOW64\gtmbif.exeC:\Windows\system32\gtmbif.exe42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Windows\SysWOW64\qdbwpg.exeC:\Windows\system32\qdbwpg.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Windows\SysWOW64\oxtqygwu.exeC:\Windows\system32\oxtqygwu.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Windows\SysWOW64\pvaimskj.exeC:\Windows\system32\pvaimskj.exe45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4416 -
C:\Windows\SysWOW64\jcvgz.exeC:\Windows\system32\jcvgz.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4588 -
C:\Windows\SysWOW64\pkfjjns.exeC:\Windows\system32\pkfjjns.exe47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1004 -
C:\Windows\SysWOW64\kyxmi.exeC:\Windows\system32\kyxmi.exe48⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3436 -
C:\Windows\SysWOW64\hlxdrnus.exeC:\Windows\system32\hlxdrnus.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4364 -
C:\Windows\SysWOW64\wywqbuol.exeC:\Windows\system32\wywqbuol.exe50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Windows\SysWOW64\vfkkjflx.exeC:\Windows\system32\vfkkjflx.exe51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4968 -
C:\Windows\SysWOW64\utauu.exeC:\Windows\system32\utauu.exe52⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:908 -
C:\Windows\SysWOW64\wyurkdi.exeC:\Windows\system32\wyurkdi.exe53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3852 -
C:\Windows\SysWOW64\fvxcbo.exeC:\Windows\system32\fvxcbo.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3056 -
C:\Windows\SysWOW64\ydiwo.exeC:\Windows\system32\ydiwo.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\SysWOW64\eudzrlyv.exeC:\Windows\system32\eudzrlyv.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Windows\SysWOW64\pppqdy.exeC:\Windows\system32\pppqdy.exe57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4316 -
C:\Windows\SysWOW64\kjdfuh.exeC:\Windows\system32\kjdfuh.exe58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2920 -
C:\Windows\SysWOW64\hylri.exeC:\Windows\system32\hylri.exe59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3376 -
C:\Windows\SysWOW64\kbdstml.exeC:\Windows\system32\kbdstml.exe60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4580 -
C:\Windows\SysWOW64\wsfyrwhf.exeC:\Windows\system32\wsfyrwhf.exe61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4380 -
C:\Windows\SysWOW64\mswlwnzl.exeC:\Windows\system32\mswlwnzl.exe62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2624 -
C:\Windows\SysWOW64\lbemara.exeC:\Windows\system32\lbemara.exe63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3684 -
C:\Windows\SysWOW64\gcwqo.exeC:\Windows\system32\gcwqo.exe64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2756 -
C:\Windows\SysWOW64\jocrkli.exeC:\Windows\system32\jocrkli.exe65⤵
- Executes dropped EXE
PID:3608 -
C:\Windows\SysWOW64\rswediji.exeC:\Windows\system32\rswediji.exe66⤵PID:4768
-
C:\Windows\SysWOW64\awdeudx.exeC:\Windows\system32\awdeudx.exe67⤵PID:2340
-
C:\Windows\SysWOW64\xbocwq.exeC:\Windows\system32\xbocwq.exe68⤵PID:3256
-
C:\Windows\SysWOW64\wuuzpj.exeC:\Windows\system32\wuuzpj.exe69⤵PID:3944
-
C:\Windows\SysWOW64\bahgftz.exeC:\Windows\system32\bahgftz.exe70⤵PID:2324
-
C:\Windows\SysWOW64\taosxvs.exeC:\Windows\system32\taosxvs.exe71⤵PID:5048
-
C:\Windows\SysWOW64\uzjgexum.exeC:\Windows\system32\uzjgexum.exe72⤵
- Adds Run key to start application
PID:1600 -
C:\Windows\SysWOW64\wosii.exeC:\Windows\system32\wosii.exe73⤵PID:3300
-
C:\Windows\SysWOW64\hwzhsjyu.exeC:\Windows\system32\hwzhsjyu.exe74⤵PID:4952
-
C:\Windows\SysWOW64\hbecg.exeC:\Windows\system32\hbecg.exe75⤵PID:232
-
C:\Windows\SysWOW64\hnwkcy.exeC:\Windows\system32\hnwkcy.exe76⤵PID:1604
-
C:\Windows\SysWOW64\hrqcnrc.exeC:\Windows\system32\hrqcnrc.exe77⤵PID:3868
-
C:\Windows\SysWOW64\ekmymfgk.exeC:\Windows\system32\ekmymfgk.exe78⤵PID:2056
-
C:\Windows\SysWOW64\yffydng.exeC:\Windows\system32\yffydng.exe79⤵PID:2308
-
C:\Windows\SysWOW64\ehyidwjd.exeC:\Windows\system32\ehyidwjd.exe80⤵
- Drops file in System32 directory
PID:1340 -
C:\Windows\SysWOW64\owinqj.exeC:\Windows\system32\owinqj.exe81⤵PID:4068
-
C:\Windows\SysWOW64\limllcd.exeC:\Windows\system32\limllcd.exe82⤵PID:464
-
C:\Windows\SysWOW64\enamk.exeC:\Windows\system32\enamk.exe83⤵PID:4820
-
C:\Windows\SysWOW64\jtwlww.exeC:\Windows\system32\jtwlww.exe84⤵PID:5144
-
C:\Windows\SysWOW64\frvmam.exeC:\Windows\system32\frvmam.exe85⤵PID:5208
-
C:\Windows\SysWOW64\epjfale.exeC:\Windows\system32\epjfale.exe86⤵PID:5244
-
C:\Windows\SysWOW64\xekqv.exeC:\Windows\system32\xekqv.exe87⤵PID:5268
-
C:\Windows\SysWOW64\dwsxpd.exeC:\Windows\system32\dwsxpd.exe88⤵PID:5296
-
C:\Windows\SysWOW64\mjigdqkk.exeC:\Windows\system32\mjigdqkk.exe89⤵PID:5320
-
C:\Windows\SysWOW64\xpeldu.exeC:\Windows\system32\xpeldu.exe90⤵PID:5352
-
C:\Windows\SysWOW64\bgeywau.exeC:\Windows\system32\bgeywau.exe91⤵PID:5388
-
C:\Windows\SysWOW64\jsxdw.exeC:\Windows\system32\jsxdw.exe92⤵PID:5416
-
C:\Windows\SysWOW64\flwwlu.exeC:\Windows\system32\flwwlu.exe93⤵PID:5444
-
C:\Windows\SysWOW64\pxljro.exeC:\Windows\system32\pxljro.exe94⤵PID:5468
-
C:\Windows\SysWOW64\qscosfsq.exeC:\Windows\system32\qscosfsq.exe95⤵PID:5492
-
C:\Windows\SysWOW64\nxahxl.exeC:\Windows\system32\nxahxl.exe96⤵
- Drops file in System32 directory
PID:5516 -
C:\Windows\SysWOW64\sdpcvdth.exeC:\Windows\system32\sdpcvdth.exe97⤵PID:5540
-
C:\Windows\SysWOW64\dbfmtq.exeC:\Windows\system32\dbfmtq.exe98⤵
- Drops file in System32 directory
PID:5564 -
C:\Windows\SysWOW64\ldrpgdb.exeC:\Windows\system32\ldrpgdb.exe99⤵PID:5588
-
C:\Windows\SysWOW64\embdo.exeC:\Windows\system32\embdo.exe100⤵PID:5612
-
C:\Windows\SysWOW64\ttnjmru.exeC:\Windows\system32\ttnjmru.exe101⤵
- Drops file in System32 directory
PID:5636 -
C:\Windows\SysWOW64\vkulpfoh.exeC:\Windows\system32\vkulpfoh.exe102⤵PID:5660
-
C:\Windows\SysWOW64\qdmfz.exeC:\Windows\system32\qdmfz.exe103⤵PID:5684
-
C:\Windows\SysWOW64\ivksgjkb.exeC:\Windows\system32\ivksgjkb.exe104⤵PID:5708
-
C:\Windows\SysWOW64\zpnag.exeC:\Windows\system32\zpnag.exe105⤵
- Adds Run key to start application
PID:5736 -
C:\Windows\SysWOW64\avzljf.exeC:\Windows\system32\avzljf.exe106⤵PID:5764
-
C:\Windows\SysWOW64\ywlyegds.exeC:\Windows\system32\ywlyegds.exe107⤵PID:5788
-
C:\Windows\SysWOW64\kdlwxxk.exeC:\Windows\system32\kdlwxxk.exe108⤵PID:5812
-
C:\Windows\SysWOW64\zcxpcs.exeC:\Windows\system32\zcxpcs.exe109⤵
- Drops file in System32 directory
PID:5836 -
C:\Windows\SysWOW64\auygeuyh.exeC:\Windows\system32\auygeuyh.exe110⤵PID:5860
-
C:\Windows\SysWOW64\klryah.exeC:\Windows\system32\klryah.exe111⤵PID:5884
-
C:\Windows\SysWOW64\qaqgee.exeC:\Windows\system32\qaqgee.exe112⤵PID:5908
-
C:\Windows\SysWOW64\eztbskgc.exeC:\Windows\system32\eztbskgc.exe113⤵PID:5940
-
C:\Windows\SysWOW64\ffqvepbv.exeC:\Windows\system32\ffqvepbv.exe114⤵PID:5992
-
C:\Windows\SysWOW64\pigwvgj.exeC:\Windows\system32\pigwvgj.exe115⤵PID:6016
-
C:\Windows\SysWOW64\bvlrvj.exeC:\Windows\system32\bvlrvj.exe116⤵PID:6044
-
C:\Windows\SysWOW64\ttevs.exeC:\Windows\system32\ttevs.exe117⤵
- Drops file in System32 directory
PID:6068 -
C:\Windows\SysWOW64\eholzycr.exeC:\Windows\system32\eholzycr.exe118⤵
- Drops file in System32 directory
PID:6092 -
C:\Windows\SysWOW64\emjgiz.exeC:\Windows\system32\emjgiz.exe119⤵
- Drops file in System32 directory
PID:6116 -
C:\Windows\SysWOW64\rpdcx.exeC:\Windows\system32\rpdcx.exe120⤵PID:5132
-
C:\Windows\SysWOW64\slkjuewz.exeC:\Windows\system32\slkjuewz.exe121⤵PID:752
-
C:\Windows\SysWOW64\qdnzw.exeC:\Windows\system32\qdnzw.exe122⤵PID:556
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-