Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 14:05
Behavioral task
behavioral1
Sample
f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe
Resource
win10v2004-20240412-en
0 signatures
150 seconds
General
-
Target
f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe
-
Size
496KB
-
MD5
f13cf06f8beb2ca2c3c85531b5723b2c
-
SHA1
126cb64f21f5a1651d1ba0731d98cd455f98fd86
-
SHA256
71565192fdf78016e9096f6dfec6915bedeb5a7b279ca139476e1cf1df97b2df
-
SHA512
084009c84af2230ef8c55a5b9557a27685026dd63f090b6dccc16f53d2f97c5307ddfb664f6534ce76ef425cfe423e4ce4330185a048a8f873b35f03cc5f395f
-
SSDEEP
12288:aW7X4rzee+qF2d2t4RyKQSAWm4gjJ6qM4+jTCHUmWRFRi:BEeexupyrIU0rD
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2064 auncpwuv.exe 2432 ttepmgld.exe 1960 btyqmkzr.exe 2792 fytiahni.exe 1120 pqgymsfy.exe 1708 ytestivj.exe 1324 ftsdisos.exe 2852 nqlitqbz.exe 2368 mimtnklq.exe 560 eixqmqwd.exe 848 vsabtimp.exe 1776 tnwosltb.exe 1992 maijsrnx.exe 2932 msjtuexg.exe 1844 esmrljbb.exe 2296 rbqmweqz.exe 2676 iiqjaszj.exe 2816 kheryxnm.exe 2340 ksqjnjry.exe 1592 hixrgief.exe 1096 givmhydj.exe 2348 cnqmvmsj.exe 2240 hhhsfeif.exe 2868 qnjnjgck.exe 1716 fzhsmpps.exe 2436 pnipcoco.exe 1684 cazfisat.exe 1928 wktnouov.exe 660 zqhydmxr.exe 2536 wszlzxja.exe 872 volieosl.exe 2844 kskgbjok.exe 2948 enpobcwh.exe 2724 astycwzb.exe 2736 qwbtykww.exe 2764 vqjbxugb.exe 2916 vbwtlgkv.exe 1568 rcggpjww.exe 2580 mbwbshlv.exe 1756 tfgobsol.exe 2616 ysaovctt.exe 1676 pclzcurg.exe 272 pkyroksy.exe 696 ephemkzj.exe 2124 mwdwhzit.exe 1552 okfzczxu.exe 2668 voimtsak.exe 2832 tlommrfq.exe 1500 hejjvjfv.exe 1132 urahbedi.exe 1196 xjsxtalg.exe 1696 rllfzcza.exe 2420 gtgxagfg.exe 2556 phguyosc.exe 1284 kgwptmhb.exe 1968 hstvlbxx.exe 1408 qnrxarnp.exe 1880 naodkgdl.exe 1672 cpxnrlwn.exe 2172 ezoljhwl.exe 592 bagynsiv.exe 1072 vkigsueo.exe 3020 njklpnyt.exe 2840 fbnvxfnf.exe -
Loads dropped DLL 64 IoCs
pid Process 2024 f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe 2024 f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe 2064 auncpwuv.exe 2064 auncpwuv.exe 2432 ttepmgld.exe 2432 ttepmgld.exe 1960 btyqmkzr.exe 1960 btyqmkzr.exe 2792 fytiahni.exe 2792 fytiahni.exe 1120 pqgymsfy.exe 1120 pqgymsfy.exe 1708 ytestivj.exe 1708 ytestivj.exe 1324 ftsdisos.exe 1324 ftsdisos.exe 2852 nqlitqbz.exe 2852 nqlitqbz.exe 2368 mimtnklq.exe 2368 mimtnklq.exe 560 eixqmqwd.exe 560 eixqmqwd.exe 848 vsabtimp.exe 848 vsabtimp.exe 1776 tnwosltb.exe 1776 tnwosltb.exe 1992 maijsrnx.exe 1992 maijsrnx.exe 2932 msjtuexg.exe 2932 msjtuexg.exe 1844 esmrljbb.exe 1844 esmrljbb.exe 2296 rbqmweqz.exe 2296 rbqmweqz.exe 2676 iiqjaszj.exe 2676 iiqjaszj.exe 2816 kheryxnm.exe 2816 kheryxnm.exe 2340 ksqjnjry.exe 2340 ksqjnjry.exe 1592 hixrgief.exe 1592 hixrgief.exe 1096 givmhydj.exe 1096 givmhydj.exe 2348 cnqmvmsj.exe 2348 cnqmvmsj.exe 2240 hhhsfeif.exe 2240 hhhsfeif.exe 2868 qnjnjgck.exe 2868 qnjnjgck.exe 1716 fzhsmpps.exe 1716 fzhsmpps.exe 2436 pnipcoco.exe 2436 pnipcoco.exe 1684 cazfisat.exe 1684 cazfisat.exe 1928 wktnouov.exe 1928 wktnouov.exe 660 zqhydmxr.exe 660 zqhydmxr.exe 2536 wszlzxja.exe 2536 wszlzxja.exe 872 volieosl.exe 872 volieosl.exe -
resource yara_rule behavioral1/memory/2024-0-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/files/0x000a00000001227d-15.dat themida behavioral1/memory/2024-22-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2064-26-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2064-45-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2432-49-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2432-62-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1960-67-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1960-86-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2792-90-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1120-106-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1120-120-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1708-125-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1708-140-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1324-165-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2368-211-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1992-307-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2932-323-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1844-348-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2296-380-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2676-388-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2816-408-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2340-417-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1592-424-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1096-431-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2348-438-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2240-445-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1716-498-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2436-505-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1684-529-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1928-557-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/660-568-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2536-575-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/872-582-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2844-589-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2724-638-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2736-661-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2764-668-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2916-689-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1568-720-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2580-738-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1756-747-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2616-772-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1676-788-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/272-808-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/696-841-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2124-857-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1552-867-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2668-887-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2832-917-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1500-934-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1132-955-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1196-964-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1696-990-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2420-1004-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2556-1012-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1284-1019-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1968-1026-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1408-1033-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1880-1052-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/2172-1086-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/592-1124-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/1072-1125-0x0000000000400000-0x00000000005BB000-memory.dmp themida behavioral1/memory/3020-1147-0x0000000000400000-0x00000000005BB000-memory.dmp themida -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\hstvlbxx.exe kgwptmhb.exe File created C:\Windows\SysWOW64\zrkvzuhc.exe flttwxsd.exe File opened for modification C:\Windows\SysWOW64\fzhsmpps.exe qnjnjgck.exe File opened for modification C:\Windows\SysWOW64\ncmolmra.exe fbnvxfnf.exe File opened for modification C:\Windows\SysWOW64\kqcgjwxk.exe ifbyxnfv.exe File opened for modification C:\Windows\SysWOW64\nwncdpji.exe iztkqtuj.exe File opened for modification C:\Windows\SysWOW64\ppzceqxs.exe kviptyhw.exe File created C:\Windows\SysWOW64\tnwosltb.exe vsabtimp.exe File opened for modification C:\Windows\SysWOW64\psrnpxch.exe ewydhdtb.exe File created C:\Windows\SysWOW64\lpcgxoka.exe earilqxu.exe File opened for modification C:\Windows\SysWOW64\gtgxagfg.exe rllfzcza.exe File created C:\Windows\SysWOW64\loverdep.exe thvomonx.exe File created C:\Windows\SysWOW64\zjzzsgpq.exe fdrexiiq.exe File opened for modification C:\Windows\SysWOW64\imvwlnwx.exe fuvgtroz.exe File created C:\Windows\SysWOW64\oordzcnk.exe jfjjixhe.exe File created C:\Windows\SysWOW64\suhorycl.exe lbivifph.exe File created C:\Windows\SysWOW64\gioinfqj.exe hqnytlgs.exe File created C:\Windows\SysWOW64\idfxjnxj.exe ikenpsns.exe File created C:\Windows\SysWOW64\tkmrggoo.exe ppehobts.exe File opened for modification C:\Windows\SysWOW64\wnktotcl.exe qnojarjc.exe File created C:\Windows\SysWOW64\quljkjen.exe eawjwjpv.exe File created C:\Windows\SysWOW64\gqiulvdp.exe wgrwmsre.exe File opened for modification C:\Windows\SysWOW64\ywwwpdtk.exe zwzlqiew.exe File opened for modification C:\Windows\SysWOW64\gdguluzj.exe xtstfwyk.exe File created C:\Windows\SysWOW64\crsibkeq.exe kygsikrm.exe File created C:\Windows\SysWOW64\eevlwktr.exe crsibkeq.exe File opened for modification C:\Windows\SysWOW64\nauygnts.exe lbgiiigx.exe File opened for modification C:\Windows\SysWOW64\ikenpsns.exe tckmpwin.exe File opened for modification C:\Windows\SysWOW64\kviptyhw.exe gycfaick.exe File opened for modification C:\Windows\SysWOW64\ytiltufi.exe zmkvirkv.exe File opened for modification C:\Windows\SysWOW64\xlaugyva.exe hkoufbim.exe File created C:\Windows\SysWOW64\pqnhwgxb.exe vsxntiij.exe File opened for modification C:\Windows\SysWOW64\nuhvgnkq.exe basnaowp.exe File opened for modification C:\Windows\SysWOW64\cazfisat.exe pnipcoco.exe File opened for modification C:\Windows\SysWOW64\fekyrljm.exe jspgtvqi.exe File created C:\Windows\SysWOW64\ttepmgld.exe auncpwuv.exe File opened for modification C:\Windows\SysWOW64\gjudxsur.exe xovbpceg.exe File created C:\Windows\SysWOW64\givmhydj.exe hixrgief.exe File opened for modification C:\Windows\SysWOW64\iiijmnuf.exe nfdtmuli.exe File opened for modification C:\Windows\SysWOW64\iztkqtuj.exe rhiziaex.exe File created C:\Windows\SysWOW64\vlvyqdfl.exe vwytzvcx.exe File opened for modification C:\Windows\SysWOW64\kgfioxhv.exe mjksqtgt.exe File created C:\Windows\SysWOW64\wvpeiiby.exe zuwrnfpp.exe File opened for modification C:\Windows\SysWOW64\plzfwmpo.exe azuatddg.exe File opened for modification C:\Windows\SysWOW64\vsabtimp.exe eixqmqwd.exe File opened for modification C:\Windows\SysWOW64\loverdep.exe thvomonx.exe File opened for modification C:\Windows\SysWOW64\bbxmdxkt.exe btzokcxo.exe File created C:\Windows\SysWOW64\cazfisat.exe pnipcoco.exe File created C:\Windows\SysWOW64\mbwbshlv.exe rcggpjww.exe File created C:\Windows\SysWOW64\kjuhmwkk.exe yhrhuhnz.exe File created C:\Windows\SysWOW64\lbvaseyz.exe rcwnvmzj.exe File opened for modification C:\Windows\SysWOW64\qaijyips.exe ytiltufi.exe File created C:\Windows\SysWOW64\eixqmqwd.exe mimtnklq.exe File created C:\Windows\SysWOW64\rmhzvvlh.exe uhmzwfse.exe File opened for modification C:\Windows\SysWOW64\pemwdwug.exe vywbizfh.exe File created C:\Windows\SysWOW64\krzwvsni.exe qaijyips.exe File opened for modification C:\Windows\SysWOW64\mcncampe.exe pmgrfsag.exe File opened for modification C:\Windows\SysWOW64\pxmyqetm.exe vvsqlcfk.exe File opened for modification C:\Windows\SysWOW64\ydibhyuh.exe uqpbooiz.exe File opened for modification C:\Windows\SysWOW64\qnrxarnp.exe hstvlbxx.exe File created C:\Windows\SysWOW64\nxjygrmh.exe fekyrljm.exe File opened for modification C:\Windows\SysWOW64\idfxjnxj.exe ikenpsns.exe File opened for modification C:\Windows\SysWOW64\rmhzvvlh.exe uhmzwfse.exe File opened for modification C:\Windows\SysWOW64\hkoufbim.exe vmnhxyvr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe 2064 auncpwuv.exe 2432 ttepmgld.exe 1960 btyqmkzr.exe 2792 fytiahni.exe 1120 pqgymsfy.exe 1708 ytestivj.exe 1324 ftsdisos.exe 2852 nqlitqbz.exe 2368 mimtnklq.exe 560 eixqmqwd.exe 848 vsabtimp.exe 1776 tnwosltb.exe 1992 maijsrnx.exe 2932 msjtuexg.exe 1844 esmrljbb.exe 2296 rbqmweqz.exe 2676 iiqjaszj.exe 2816 kheryxnm.exe 2340 ksqjnjry.exe 1592 hixrgief.exe 1096 givmhydj.exe 2348 cnqmvmsj.exe 2240 hhhsfeif.exe 2868 qnjnjgck.exe 1716 fzhsmpps.exe 2436 pnipcoco.exe 1684 cazfisat.exe 1928 wktnouov.exe 660 zqhydmxr.exe 2536 wszlzxja.exe 872 volieosl.exe 2844 kskgbjok.exe 2948 enpobcwh.exe 2724 astycwzb.exe 2736 qwbtykww.exe 2764 vqjbxugb.exe 2916 vbwtlgkv.exe 1568 rcggpjww.exe 2580 mbwbshlv.exe 1756 tfgobsol.exe 2616 ysaovctt.exe 1676 pclzcurg.exe 272 pkyroksy.exe 696 ephemkzj.exe 2124 mwdwhzit.exe 1552 okfzczxu.exe 2668 voimtsak.exe 2832 tlommrfq.exe 1500 hejjvjfv.exe 1132 urahbedi.exe 1196 xjsxtalg.exe 1696 rllfzcza.exe 2420 gtgxagfg.exe 2556 phguyosc.exe 1284 kgwptmhb.exe 1968 hstvlbxx.exe 1408 qnrxarnp.exe 1880 naodkgdl.exe 1672 cpxnrlwn.exe 2172 ezoljhwl.exe 592 bagynsiv.exe 1072 vkigsueo.exe 3020 njklpnyt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2064 2024 f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2064 2024 f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2064 2024 f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe 28 PID 2024 wrote to memory of 2064 2024 f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe 28 PID 2064 wrote to memory of 2432 2064 auncpwuv.exe 29 PID 2064 wrote to memory of 2432 2064 auncpwuv.exe 29 PID 2064 wrote to memory of 2432 2064 auncpwuv.exe 29 PID 2064 wrote to memory of 2432 2064 auncpwuv.exe 29 PID 2432 wrote to memory of 1960 2432 ttepmgld.exe 30 PID 2432 wrote to memory of 1960 2432 ttepmgld.exe 30 PID 2432 wrote to memory of 1960 2432 ttepmgld.exe 30 PID 2432 wrote to memory of 1960 2432 ttepmgld.exe 30 PID 1960 wrote to memory of 2792 1960 btyqmkzr.exe 31 PID 1960 wrote to memory of 2792 1960 btyqmkzr.exe 31 PID 1960 wrote to memory of 2792 1960 btyqmkzr.exe 31 PID 1960 wrote to memory of 2792 1960 btyqmkzr.exe 31 PID 2792 wrote to memory of 1120 2792 fytiahni.exe 32 PID 2792 wrote to memory of 1120 2792 fytiahni.exe 32 PID 2792 wrote to memory of 1120 2792 fytiahni.exe 32 PID 2792 wrote to memory of 1120 2792 fytiahni.exe 32 PID 1120 wrote to memory of 1708 1120 pqgymsfy.exe 33 PID 1120 wrote to memory of 1708 1120 pqgymsfy.exe 33 PID 1120 wrote to memory of 1708 1120 pqgymsfy.exe 33 PID 1120 wrote to memory of 1708 1120 pqgymsfy.exe 33 PID 1708 wrote to memory of 1324 1708 ytestivj.exe 34 PID 1708 wrote to memory of 1324 1708 ytestivj.exe 34 PID 1708 wrote to memory of 1324 1708 ytestivj.exe 34 PID 1708 wrote to memory of 1324 1708 ytestivj.exe 34 PID 1324 wrote to memory of 2852 1324 ftsdisos.exe 35 PID 1324 wrote to memory of 2852 1324 ftsdisos.exe 35 PID 1324 wrote to memory of 2852 1324 ftsdisos.exe 35 PID 1324 wrote to memory of 2852 1324 ftsdisos.exe 35 PID 2852 wrote to memory of 2368 2852 nqlitqbz.exe 36 PID 2852 wrote to memory of 2368 2852 nqlitqbz.exe 36 PID 2852 wrote to memory of 2368 2852 nqlitqbz.exe 36 PID 2852 wrote to memory of 2368 2852 nqlitqbz.exe 36 PID 2368 wrote to memory of 560 2368 mimtnklq.exe 37 PID 2368 wrote to memory of 560 2368 mimtnklq.exe 37 PID 2368 wrote to memory of 560 2368 mimtnklq.exe 37 PID 2368 wrote to memory of 560 2368 mimtnklq.exe 37 PID 560 wrote to memory of 848 560 eixqmqwd.exe 38 PID 560 wrote to memory of 848 560 eixqmqwd.exe 38 PID 560 wrote to memory of 848 560 eixqmqwd.exe 38 PID 560 wrote to memory of 848 560 eixqmqwd.exe 38 PID 848 wrote to memory of 1776 848 vsabtimp.exe 39 PID 848 wrote to memory of 1776 848 vsabtimp.exe 39 PID 848 wrote to memory of 1776 848 vsabtimp.exe 39 PID 848 wrote to memory of 1776 848 vsabtimp.exe 39 PID 1776 wrote to memory of 1992 1776 tnwosltb.exe 40 PID 1776 wrote to memory of 1992 1776 tnwosltb.exe 40 PID 1776 wrote to memory of 1992 1776 tnwosltb.exe 40 PID 1776 wrote to memory of 1992 1776 tnwosltb.exe 40 PID 1992 wrote to memory of 2932 1992 maijsrnx.exe 41 PID 1992 wrote to memory of 2932 1992 maijsrnx.exe 41 PID 1992 wrote to memory of 2932 1992 maijsrnx.exe 41 PID 1992 wrote to memory of 2932 1992 maijsrnx.exe 41 PID 2932 wrote to memory of 1844 2932 msjtuexg.exe 42 PID 2932 wrote to memory of 1844 2932 msjtuexg.exe 42 PID 2932 wrote to memory of 1844 2932 msjtuexg.exe 42 PID 2932 wrote to memory of 1844 2932 msjtuexg.exe 42 PID 1844 wrote to memory of 2296 1844 esmrljbb.exe 43 PID 1844 wrote to memory of 2296 1844 esmrljbb.exe 43 PID 1844 wrote to memory of 2296 1844 esmrljbb.exe 43 PID 1844 wrote to memory of 2296 1844 esmrljbb.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\auncpwuv.exeC:\Windows\system32\auncpwuv.exe 660 "C:\Users\Admin\AppData\Local\Temp\f13cf06f8beb2ca2c3c85531b5723b2c_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\ttepmgld.exeC:\Windows\system32\ttepmgld.exe 628 "C:\Windows\SysWOW64\auncpwuv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\btyqmkzr.exeC:\Windows\system32\btyqmkzr.exe 636 "C:\Windows\SysWOW64\ttepmgld.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\fytiahni.exeC:\Windows\system32\fytiahni.exe 624 "C:\Windows\SysWOW64\btyqmkzr.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\pqgymsfy.exeC:\Windows\system32\pqgymsfy.exe 640 "C:\Windows\SysWOW64\fytiahni.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\ytestivj.exeC:\Windows\system32\ytestivj.exe 644 "C:\Windows\SysWOW64\pqgymsfy.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\ftsdisos.exeC:\Windows\system32\ftsdisos.exe 648 "C:\Windows\SysWOW64\ytestivj.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\nqlitqbz.exeC:\Windows\system32\nqlitqbz.exe 632 "C:\Windows\SysWOW64\ftsdisos.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\mimtnklq.exeC:\Windows\system32\mimtnklq.exe 684 "C:\Windows\SysWOW64\nqlitqbz.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\eixqmqwd.exeC:\Windows\system32\eixqmqwd.exe 656 "C:\Windows\SysWOW64\mimtnklq.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\vsabtimp.exeC:\Windows\system32\vsabtimp.exe 664 "C:\Windows\SysWOW64\eixqmqwd.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\tnwosltb.exeC:\Windows\system32\tnwosltb.exe 652 "C:\Windows\SysWOW64\vsabtimp.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\maijsrnx.exeC:\Windows\system32\maijsrnx.exe 676 "C:\Windows\SysWOW64\tnwosltb.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\msjtuexg.exeC:\Windows\system32\msjtuexg.exe 668 "C:\Windows\SysWOW64\maijsrnx.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\esmrljbb.exeC:\Windows\system32\esmrljbb.exe 708 "C:\Windows\SysWOW64\msjtuexg.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\rbqmweqz.exeC:\Windows\system32\rbqmweqz.exe 712 "C:\Windows\SysWOW64\esmrljbb.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\iiqjaszj.exeC:\Windows\system32\iiqjaszj.exe 692 "C:\Windows\SysWOW64\rbqmweqz.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\kheryxnm.exeC:\Windows\system32\kheryxnm.exe 744 "C:\Windows\SysWOW64\iiqjaszj.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\ksqjnjry.exeC:\Windows\system32\ksqjnjry.exe 720 "C:\Windows\SysWOW64\kheryxnm.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\hixrgief.exeC:\Windows\system32\hixrgief.exe 620 "C:\Windows\SysWOW64\ksqjnjry.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\givmhydj.exeC:\Windows\system32\givmhydj.exe 700 "C:\Windows\SysWOW64\hixrgief.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\SysWOW64\cnqmvmsj.exeC:\Windows\system32\cnqmvmsj.exe 724 "C:\Windows\SysWOW64\givmhydj.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\hhhsfeif.exeC:\Windows\system32\hhhsfeif.exe 736 "C:\Windows\SysWOW64\cnqmvmsj.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\qnjnjgck.exeC:\Windows\system32\qnjnjgck.exe 696 "C:\Windows\SysWOW64\hhhsfeif.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\fzhsmpps.exeC:\Windows\system32\fzhsmpps.exe 680 "C:\Windows\SysWOW64\qnjnjgck.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\pnipcoco.exeC:\Windows\system32\pnipcoco.exe 764 "C:\Windows\SysWOW64\fzhsmpps.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\cazfisat.exeC:\Windows\system32\cazfisat.exe 808 "C:\Windows\SysWOW64\pnipcoco.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\wktnouov.exeC:\Windows\system32\wktnouov.exe 704 "C:\Windows\SysWOW64\cazfisat.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1928 -
C:\Windows\SysWOW64\zqhydmxr.exeC:\Windows\system32\zqhydmxr.exe 816 "C:\Windows\SysWOW64\wktnouov.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:660 -
C:\Windows\SysWOW64\wszlzxja.exeC:\Windows\system32\wszlzxja.exe 804 "C:\Windows\SysWOW64\zqhydmxr.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2536 -
C:\Windows\SysWOW64\volieosl.exeC:\Windows\system32\volieosl.exe 772 "C:\Windows\SysWOW64\wszlzxja.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:872 -
C:\Windows\SysWOW64\kskgbjok.exeC:\Windows\system32\kskgbjok.exe 776 "C:\Windows\SysWOW64\volieosl.exe"33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\enpobcwh.exeC:\Windows\system32\enpobcwh.exe 740 "C:\Windows\SysWOW64\kskgbjok.exe"34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\astycwzb.exeC:\Windows\system32\astycwzb.exe 688 "C:\Windows\SysWOW64\enpobcwh.exe"35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\qwbtykww.exeC:\Windows\system32\qwbtykww.exe 840 "C:\Windows\SysWOW64\astycwzb.exe"36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\vqjbxugb.exeC:\Windows\system32\vqjbxugb.exe 844 "C:\Windows\SysWOW64\qwbtykww.exe"37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\vbwtlgkv.exeC:\Windows\system32\vbwtlgkv.exe 848 "C:\Windows\SysWOW64\vqjbxugb.exe"38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\rcggpjww.exeC:\Windows\system32\rcggpjww.exe 728 "C:\Windows\SysWOW64\vbwtlgkv.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\mbwbshlv.exeC:\Windows\system32\mbwbshlv.exe 788 "C:\Windows\SysWOW64\rcggpjww.exe"40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\tfgobsol.exeC:\Windows\system32\tfgobsol.exe 864 "C:\Windows\SysWOW64\mbwbshlv.exe"41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\ysaovctt.exeC:\Windows\system32\ysaovctt.exe 860 "C:\Windows\SysWOW64\tfgobsol.exe"42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\pclzcurg.exeC:\Windows\system32\pclzcurg.exe 732 "C:\Windows\SysWOW64\ysaovctt.exe"43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\pkyroksy.exeC:\Windows\system32\pkyroksy.exe 828 "C:\Windows\SysWOW64\pclzcurg.exe"44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:272 -
C:\Windows\SysWOW64\ephemkzj.exeC:\Windows\system32\ephemkzj.exe 716 "C:\Windows\SysWOW64\pkyroksy.exe"45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:696 -
C:\Windows\SysWOW64\mwdwhzit.exeC:\Windows\system32\mwdwhzit.exe 752 "C:\Windows\SysWOW64\ephemkzj.exe"46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\okfzczxu.exeC:\Windows\system32\okfzczxu.exe 888 "C:\Windows\SysWOW64\mwdwhzit.exe"47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\voimtsak.exeC:\Windows\system32\voimtsak.exe 884 "C:\Windows\SysWOW64\okfzczxu.exe"48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\tlommrfq.exeC:\Windows\system32\tlommrfq.exe 756 "C:\Windows\SysWOW64\voimtsak.exe"49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\hejjvjfv.exeC:\Windows\system32\hejjvjfv.exe 768 "C:\Windows\SysWOW64\tlommrfq.exe"50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\urahbedi.exeC:\Windows\system32\urahbedi.exe 900 "C:\Windows\SysWOW64\hejjvjfv.exe"51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\xjsxtalg.exeC:\Windows\system32\xjsxtalg.exe 908 "C:\Windows\SysWOW64\urahbedi.exe"52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1196 -
C:\Windows\SysWOW64\rllfzcza.exeC:\Windows\system32\rllfzcza.exe 832 "C:\Windows\SysWOW64\xjsxtalg.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\gtgxagfg.exeC:\Windows\system32\gtgxagfg.exe 780 "C:\Windows\SysWOW64\rllfzcza.exe"54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\phguyosc.exeC:\Windows\system32\phguyosc.exe 824 "C:\Windows\SysWOW64\gtgxagfg.exe"55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2556 -
C:\Windows\SysWOW64\kgwptmhb.exeC:\Windows\system32\kgwptmhb.exe 920 "C:\Windows\SysWOW64\phguyosc.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1284 -
C:\Windows\SysWOW64\hstvlbxx.exeC:\Windows\system32\hstvlbxx.exe 748 "C:\Windows\SysWOW64\kgwptmhb.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\SysWOW64\qnrxarnp.exeC:\Windows\system32\qnrxarnp.exe 800 "C:\Windows\SysWOW64\hstvlbxx.exe"58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1408 -
C:\Windows\SysWOW64\naodkgdl.exeC:\Windows\system32\naodkgdl.exe 760 "C:\Windows\SysWOW64\qnrxarnp.exe"59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\cpxnrlwn.exeC:\Windows\system32\cpxnrlwn.exe 792 "C:\Windows\SysWOW64\naodkgdl.exe"60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\ezoljhwl.exeC:\Windows\system32\ezoljhwl.exe 796 "C:\Windows\SysWOW64\cpxnrlwn.exe"61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\bagynsiv.exeC:\Windows\system32\bagynsiv.exe 820 "C:\Windows\SysWOW64\ezoljhwl.exe"62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:592 -
C:\Windows\SysWOW64\vkigsueo.exeC:\Windows\system32\vkigsueo.exe 784 "C:\Windows\SysWOW64\bagynsiv.exe"63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1072 -
C:\Windows\SysWOW64\njklpnyt.exeC:\Windows\system32\njklpnyt.exe 948 "C:\Windows\SysWOW64\vkigsueo.exe"64⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\fbnvxfnf.exeC:\Windows\system32\fbnvxfnf.exe 952 "C:\Windows\SysWOW64\njklpnyt.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2840 -
C:\Windows\SysWOW64\ncmolmra.exeC:\Windows\system32\ncmolmra.exe 880 "C:\Windows\SysWOW64\fbnvxfnf.exe"66⤵PID:2632
-
C:\Windows\SysWOW64\wfiynwcq.exeC:\Windows\system32\wfiynwcq.exe 892 "C:\Windows\SysWOW64\ncmolmra.exe"67⤵PID:1640
-
C:\Windows\SysWOW64\bzqgeouv.exeC:\Windows\system32\bzqgeouv.exe 972 "C:\Windows\SysWOW64\wfiynwcq.exe"68⤵PID:2532
-
C:\Windows\SysWOW64\jspgtvqi.exeC:\Windows\system32\jspgtvqi.exe 940 "C:\Windows\SysWOW64\bzqgeouv.exe"69⤵
- Drops file in System32 directory
PID:2980 -
C:\Windows\SysWOW64\fekyrljm.exeC:\Windows\system32\fekyrljm.exe 928 "C:\Windows\SysWOW64\jspgtvqi.exe"70⤵
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\nxjygrmh.exeC:\Windows\system32\nxjygrmh.exe 876 "C:\Windows\SysWOW64\fekyrljm.exe"71⤵PID:976
-
C:\Windows\SysWOW64\fagjibxx.exeC:\Windows\system32\fagjibxx.exe 836 "C:\Windows\SysWOW64\nxjygrmh.exe"72⤵PID:2796
-
C:\Windows\SysWOW64\uqpbooiz.exeC:\Windows\system32\uqpbooiz.exe 904 "C:\Windows\SysWOW64\fagjibxx.exe"73⤵
- Drops file in System32 directory
PID:1212 -
C:\Windows\SysWOW64\ydibhyuh.exeC:\Windows\system32\ydibhyuh.exe 868 "C:\Windows\SysWOW64\uqpbooiz.exe"74⤵PID:2276
-
C:\Windows\SysWOW64\gzthtwho.exeC:\Windows\system32\gzthtwho.exe 852 "C:\Windows\SysWOW64\ydibhyuh.exe"75⤵PID:2480
-
C:\Windows\SysWOW64\fsurnire.exeC:\Windows\system32\fsurnire.exe 872 "C:\Windows\SysWOW64\gzthtwho.exe"76⤵PID:1344
-
C:\Windows\SysWOW64\zuwrnfpp.exeC:\Windows\system32\zuwrnfpp.exe 812 "C:\Windows\SysWOW64\fsurnire.exe"77⤵
- Drops file in System32 directory
PID:2092 -
C:\Windows\SysWOW64\wvpeiiby.exeC:\Windows\system32\wvpeiiby.exe 916 "C:\Windows\SysWOW64\zuwrnfpp.exe"78⤵PID:2976
-
C:\Windows\SysWOW64\tlnejpof.exeC:\Windows\system32\tlnejpof.exe 856 "C:\Windows\SysWOW64\wvpeiiby.exe"79⤵PID:2452
-
C:\Windows\SysWOW64\pmgrfsag.exeC:\Windows\system32\pmgrfsag.exe 924 "C:\Windows\SysWOW64\tlnejpof.exe"80⤵
- Drops file in System32 directory
PID:1932 -
C:\Windows\SysWOW64\mcncampe.exeC:\Windows\system32\mcncampe.exe 932 "C:\Windows\SysWOW64\pmgrfsag.exe"81⤵PID:2896
-
C:\Windows\SysWOW64\tckmpwin.exeC:\Windows\system32\tckmpwin.exe 912 "C:\Windows\SysWOW64\mcncampe.exe"82⤵
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\ikenpsns.exeC:\Windows\system32\ikenpsns.exe 936 "C:\Windows\SysWOW64\tckmpwin.exe"83⤵
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\idfxjnxj.exeC:\Windows\system32\idfxjnxj.exe 896 "C:\Windows\SysWOW64\ikenpsns.exe"84⤵PID:2700
-
C:\Windows\SysWOW64\aosxrkyi.exeC:\Windows\system32\aosxrkyi.exe 1000 "C:\Windows\SysWOW64\idfxjnxj.exe"85⤵PID:2264
-
C:\Windows\SysWOW64\ewydhdtb.exeC:\Windows\system32\ewydhdtb.exe 980 "C:\Windows\SysWOW64\aosxrkyi.exe"86⤵
- Drops file in System32 directory
PID:2828 -
C:\Windows\SysWOW64\psrnpxch.exeC:\Windows\system32\psrnpxch.exe 1044 "C:\Windows\SysWOW64\ewydhdtb.exe"87⤵PID:2308
-
C:\Windows\SysWOW64\opkladon.exeC:\Windows\system32\opkladon.exe 956 "C:\Windows\SysWOW64\psrnpxch.exe"88⤵PID:2084
-
C:\Windows\SysWOW64\fznviwez.exeC:\Windows\system32\fznviwez.exe 960 "C:\Windows\SysWOW64\opkladon.exe"89⤵PID:1828
-
C:\Windows\SysWOW64\ifbyxnfv.exeC:\Windows\system32\ifbyxnfv.exe 968 "C:\Windows\SysWOW64\fznviwez.exe"90⤵
- Drops file in System32 directory
PID:1016 -
C:\Windows\SysWOW64\kqcgjwxk.exeC:\Windows\system32\kqcgjwxk.exe 976 "C:\Windows\SysWOW64\ifbyxnfv.exe"91⤵PID:1332
-
C:\Windows\SysWOW64\ockycbzg.exeC:\Windows\system32\ockycbzg.exe 964 "C:\Windows\SysWOW64\kqcgjwxk.exe"92⤵PID:1300
-
C:\Windows\SysWOW64\vvsqlcfk.exeC:\Windows\system32\vvsqlcfk.exe 984 "C:\Windows\SysWOW64\ockycbzg.exe"93⤵
- Drops file in System32 directory
PID:1628 -
C:\Windows\SysWOW64\pxmyqetm.exeC:\Windows\system32\pxmyqetm.exe 988 "C:\Windows\SysWOW64\vvsqlcfk.exe"94⤵PID:1964
-
C:\Windows\SysWOW64\zlnbslma.exeC:\Windows\system32\zlnbslma.exe 992 "C:\Windows\SysWOW64\pxmyqetm.exe"95⤵PID:1348
-
C:\Windows\SysWOW64\rokmuvwq.exeC:\Windows\system32\rokmuvwq.exe 996 "C:\Windows\SysWOW64\zlnbslma.exe"96⤵PID:3052
-
C:\Windows\SysWOW64\ihnobomc.exeC:\Windows\system32\ihnobomc.exe 944 "C:\Windows\SysWOW64\rokmuvwq.exe"97⤵PID:108
-
C:\Windows\SysWOW64\xtstfwyk.exeC:\Windows\system32\xtstfwyk.exe 1004 "C:\Windows\SysWOW64\ihnobomc.exe"98⤵
- Drops file in System32 directory
PID:1760 -
C:\Windows\SysWOW64\gdguluzj.exeC:\Windows\system32\gdguluzj.exe 1012 "C:\Windows\SysWOW64\xtstfwyk.exe"99⤵PID:2636
-
C:\Windows\SysWOW64\iyjehvgk.exeC:\Windows\system32\iyjehvgk.exe 1016 "C:\Windows\SysWOW64\gdguluzj.exe"100⤵PID:2016
-
C:\Windows\SysWOW64\vdbeglpf.exeC:\Windows\system32\vdbeglpf.exe 1008 "C:\Windows\SysWOW64\iyjehvgk.exe"101⤵PID:2196
-
C:\Windows\SysWOW64\nwmpoefa.exeC:\Windows\system32\nwmpoefa.exe 1036 "C:\Windows\SysWOW64\vdbeglpf.exe"102⤵PID:2776
-
C:\Windows\SysWOW64\uhmzwfse.exeC:\Windows\system32\uhmzwfse.exe 1020 "C:\Windows\SysWOW64\nwmpoefa.exe"103⤵
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\rmhzvvlh.exeC:\Windows\system32\rmhzvvlh.exe 1032 "C:\Windows\SysWOW64\uhmzwfse.exe"104⤵PID:2656
-
C:\Windows\SysWOW64\apfuzrfo.exeC:\Windows\system32\apfuzrfo.exe 1080 "C:\Windows\SysWOW64\rmhzvvlh.exe"105⤵PID:1220
-
C:\Windows\SysWOW64\uovpupmn.exeC:\Windows\system32\uovpupmn.exe 1028 "C:\Windows\SysWOW64\apfuzrfo.exe"106⤵PID:2200
-
C:\Windows\SysWOW64\muunyddx.exeC:\Windows\system32\muunyddx.exe 1052 "C:\Windows\SysWOW64\uovpupmn.exe"107⤵PID:2412
-
C:\Windows\SysWOW64\mjksqtgt.exeC:\Windows\system32\mjksqtgt.exe 1088 "C:\Windows\SysWOW64\muunyddx.exe"108⤵
- Drops file in System32 directory
PID:2800 -
C:\Windows\SysWOW64\kgfioxhv.exeC:\Windows\system32\kgfioxhv.exe 1040 "C:\Windows\SysWOW64\mjksqtgt.exe"109⤵PID:2644
-
C:\Windows\SysWOW64\kygsikrm.exeC:\Windows\system32\kygsikrm.exe 1092 "C:\Windows\SysWOW64\kgfioxhv.exe"110⤵
- Drops file in System32 directory
PID:1140 -
C:\Windows\SysWOW64\crsibkeq.exeC:\Windows\system32\crsibkeq.exe 1064 "C:\Windows\SysWOW64\kygsikrm.exe"111⤵
- Drops file in System32 directory
PID:2692 -
C:\Windows\SysWOW64\eevlwktr.exeC:\Windows\system32\eevlwktr.exe 1060 "C:\Windows\SysWOW64\crsibkeq.exe"112⤵PID:688
-
C:\Windows\SysWOW64\lbgiiigx.exeC:\Windows\system32\lbgiiigx.exe 1100 "C:\Windows\SysWOW64\eevlwktr.exe"113⤵
- Drops file in System32 directory
PID:1728 -
C:\Windows\SysWOW64\nauygnts.exeC:\Windows\system32\nauygnts.exe 1056 "C:\Windows\SysWOW64\lbgiiigx.exe"114⤵PID:1736
-
C:\Windows\SysWOW64\xovbpceg.exeC:\Windows\system32\xovbpceg.exe 1048 "C:\Windows\SysWOW64\nauygnts.exe"115⤵
- Drops file in System32 directory
PID:940 -
C:\Windows\SysWOW64\gjudxsur.exeC:\Windows\system32\gjudxsur.exe 1076 "C:\Windows\SysWOW64\xovbpceg.exe"116⤵PID:1984
-
C:\Windows\SysWOW64\fuvgtroz.exeC:\Windows\system32\fuvgtroz.exe 1116 "C:\Windows\SysWOW64\gjudxsur.exe"117⤵
- Drops file in System32 directory
PID:2648 -
C:\Windows\SysWOW64\imvwlnwx.exeC:\Windows\system32\imvwlnwx.exe 1132 "C:\Windows\SysWOW64\fuvgtroz.exe"118⤵PID:2888
-
C:\Windows\SysWOW64\konexwnm.exeC:\Windows\system32\konexwnm.exe 1120 "C:\Windows\SysWOW64\imvwlnwx.exe"119⤵PID:2076
-
C:\Windows\SysWOW64\ppehobts.exeC:\Windows\system32\ppehobts.exe 1152 "C:\Windows\SysWOW64\konexwnm.exe"120⤵
- Drops file in System32 directory
PID:1084 -
C:\Windows\SysWOW64\tkmrggoo.exeC:\Windows\system32\tkmrggoo.exe 1124 "C:\Windows\SysWOW64\ppehobts.exe"121⤵PID:2320
-
C:\Windows\SysWOW64\yhrhuhnz.exeC:\Windows\system32\yhrhuhnz.exe 1096 "C:\Windows\SysWOW64\tkmrggoo.exe"122⤵
- Drops file in System32 directory
PID:1948
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-