Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
-
Size
222KB
-
MD5
f38d258532673cf62200ab2d7dd5268a
-
SHA1
39bf714b2e9ffb5a8cf534977588b71e35952ec6
-
SHA256
5edaadd37dd1dd9425dbbbdcd360194fe1f965ae971a5c8165a3effdc25c7e80
-
SHA512
b2c994c3e6575c0463d4278220f79e29867f37049076e28c97feab5af90eec86a472a0f12945df608d73336121c2ff7b9a0c6b30ba82906c67d7f3fdcedc28cf
-
SSDEEP
6144:ASOrStDEnqmNpMBN+Mcqfbobx4aRrxyre5HfTLGSa:pOrp/N2h4x4aRYixLba
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
Processes:
jvzyiv.exejvzyiv.exebynbkf.exebynbkf.exevipiih.exevipiih.exepoflke.exepoflke.exekfzoit.exekfzoit.exeeslbiz.exeeslbiz.exezjfefo.exezjfefo.exewdprja.exewdprja.exeqjgmep.exeqjgmep.exehbqwlq.exehbqwlq.exefnmjkk.exefnmjkk.exewfxmrd.exewfxmrd.exeqenpma.exeqenpma.exenbmpnh.exenbmpnh.exekcecjt.exekcecjt.exehoaphn.exehoaphn.exeetvpgd.exeetvpgd.exeeeihuh.exeeeihuh.exeygjpaj.exeygjpaj.exeveiptq.exeveiptq.exesimhzx.exesimhzx.exesuyaoj.exesuyaoj.exelhdvwi.exelhdvwi.exedkpnlu.exedkpnlu.exexyuits.exexyuits.exeuvbimz.exeuvbimz.exeukqndh.exeukqndh.exerpunkx.exerpunkx.exerejtbf.exerejtbf.exeqthqsv.exeqthqsv.exekgmlbu.exekgmlbu.exeknjqsk.exeknjqsk.exepid process 2884 jvzyiv.exe 2860 jvzyiv.exe 2580 bynbkf.exe 2780 bynbkf.exe 2748 vipiih.exe 2484 vipiih.exe 2732 poflke.exe 2176 poflke.exe 2184 kfzoit.exe 812 kfzoit.exe 1896 eslbiz.exe 1608 eslbiz.exe 1552 zjfefo.exe 2076 zjfefo.exe 2132 wdprja.exe 1228 wdprja.exe 1636 qjgmep.exe 1984 qjgmep.exe 2396 hbqwlq.exe 1236 hbqwlq.exe 780 fnmjkk.exe 2932 fnmjkk.exe 2300 wfxmrd.exe 1016 wfxmrd.exe 2980 qenpma.exe 2012 qenpma.exe 2004 nbmpnh.exe 1448 nbmpnh.exe 2256 kcecjt.exe 2940 kcecjt.exe 3068 hoaphn.exe 2620 hoaphn.exe 2316 etvpgd.exe 2548 etvpgd.exe 2552 eeihuh.exe 2508 eeihuh.exe 1652 ygjpaj.exe 2204 ygjpaj.exe 1780 veiptq.exe 328 veiptq.exe 1716 simhzx.exe 1668 simhzx.exe 2244 suyaoj.exe 628 suyaoj.exe 1828 lhdvwi.exe 2236 lhdvwi.exe 2528 dkpnlu.exe 588 dkpnlu.exe 1308 xyuits.exe 1860 xyuits.exe 2276 uvbimz.exe 940 uvbimz.exe 972 ukqndh.exe 1772 ukqndh.exe 900 rpunkx.exe 2944 rpunkx.exe 2300 rejtbf.exe 876 rejtbf.exe 1680 qthqsv.exe 1700 qthqsv.exe 2312 kgmlbu.exe 2268 kgmlbu.exe 2540 knjqsk.exe 2656 knjqsk.exe -
Loads dropped DLL 64 IoCs
Processes:
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exejvzyiv.exejvzyiv.exebynbkf.exevipiih.exepoflke.exekfzoit.exeeslbiz.exezjfefo.exewdprja.exeqjgmep.exehbqwlq.exefnmjkk.exewfxmrd.exeqenpma.exenbmpnh.exekcecjt.exehoaphn.exeetvpgd.exeeeihuh.exeygjpaj.exeveiptq.exesimhzx.exesuyaoj.exelhdvwi.exedkpnlu.exexyuits.exeuvbimz.exeukqndh.exerpunkx.exerejtbf.exeqthqsv.exekgmlbu.exepid process 3024 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 3024 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 2884 jvzyiv.exe 2860 jvzyiv.exe 2860 jvzyiv.exe 2780 bynbkf.exe 2780 bynbkf.exe 2484 vipiih.exe 2484 vipiih.exe 2176 poflke.exe 2176 poflke.exe 812 kfzoit.exe 812 kfzoit.exe 1608 eslbiz.exe 1608 eslbiz.exe 2076 zjfefo.exe 2076 zjfefo.exe 1228 wdprja.exe 1228 wdprja.exe 1984 qjgmep.exe 1984 qjgmep.exe 1236 hbqwlq.exe 1236 hbqwlq.exe 2932 fnmjkk.exe 2932 fnmjkk.exe 1016 wfxmrd.exe 1016 wfxmrd.exe 2012 qenpma.exe 2012 qenpma.exe 1448 nbmpnh.exe 1448 nbmpnh.exe 2940 kcecjt.exe 2940 kcecjt.exe 2620 hoaphn.exe 2620 hoaphn.exe 2548 etvpgd.exe 2548 etvpgd.exe 2508 eeihuh.exe 2508 eeihuh.exe 2204 ygjpaj.exe 2204 ygjpaj.exe 328 veiptq.exe 328 veiptq.exe 1668 simhzx.exe 1668 simhzx.exe 628 suyaoj.exe 628 suyaoj.exe 2236 lhdvwi.exe 2236 lhdvwi.exe 588 dkpnlu.exe 588 dkpnlu.exe 1860 xyuits.exe 1860 xyuits.exe 940 uvbimz.exe 940 uvbimz.exe 1772 ukqndh.exe 1772 ukqndh.exe 2944 rpunkx.exe 2944 rpunkx.exe 876 rejtbf.exe 876 rejtbf.exe 1700 qthqsv.exe 1700 qthqsv.exe 2268 kgmlbu.exe -
Drops file in System32 directory 64 IoCs
Processes:
kthsvo.exemavttr.exeeirlyh.exerchvej.exemkhoyc.exeqwfifr.exenpqvjc.exeeslbiz.exehiwumz.exenljtfy.exeusryjc.exefnmjkk.exemofxyo.exeasjxwf.exesyqyqe.exeffhiel.exevrikuo.exeearilq.exeeznvgx.exefpivgz.exeiqqhfm.exeoxxvcb.exezlhqgp.exehoudwn.exeknjqsk.exeomvsur.exegczzeo.exekfzoit.exedsloqh.exezurevk.exelrpkqs.exepixjgt.exeexprxq.exebyzetb.exeyzoeja.exehgqszz.exelcgkzn.exegfekvy.exevrraxg.exernuvfq.exewfxmrd.exesmcrfs.execkdowa.exetwtwvh.exeipwkjz.exemcjvuf.exeiiailm.exeypornb.exemdqfsa.exezimehg.exerdpwkd.exepwewll.exevsdfxn.exeolorkd.exefrjklh.exefqaurw.exeexumor.exezcagci.exezyxejo.exevtmyko.exedrcwun.exedescription ioc process File opened for modification C:\Windows\SysWOW64\husfzr.exe kthsvo.exe File opened for modification C:\Windows\SysWOW64\mmhlid.exe mavttr.exe File created C:\Windows\SysWOW64\exprxq.exe eirlyh.exe File created C:\Windows\SysWOW64\oaovxq.exe rchvej.exe File opened for modification C:\Windows\SysWOW64\jlrbcn.exe mkhoyc.exe File opened for modification C:\Windows\SysWOW64\npqvjc.exe qwfifr.exe File created C:\Windows\SysWOW64\kqiaef.exe npqvjc.exe File opened for modification C:\Windows\SysWOW64\zjfefo.exe eslbiz.exe File created C:\Windows\SysWOW64\avjpmf.exe hiwumz.exe File created C:\Windows\SysWOW64\zzooge.exe nljtfy.exe File opened for modification C:\Windows\SysWOW64\thpdak.exe usryjc.exe File created C:\Windows\SysWOW64\wfxmrd.exe fnmjkk.exe File created C:\Windows\SysWOW64\gyhewq.exe mofxyo.exe File created C:\Windows\SysWOW64\ahhcnn.exe asjxwf.exe File opened for modification C:\Windows\SysWOW64\pnpyjd.exe syqyqe.exe File opened for modification C:\Windows\SysWOW64\drcwun.exe ffhiel.exe File created C:\Windows\SysWOW64\vgfpme.exe vrikuo.exe File opened for modification C:\Windows\SysWOW64\bmnvbl.exe earilq.exe File opened for modification C:\Windows\SysWOW64\yxvqju.exe eznvgx.exe File opened for modification C:\Windows\SysWOW64\budveo.exe fpivgz.exe File opened for modification C:\Windows\SysWOW64\ijrzzh.exe iqqhfm.exe File opened for modification C:\Windows\SysWOW64\omvsur.exe oxxvcb.exe File opened for modification C:\Windows\SysWOW64\wmrdcs.exe zlhqgp.exe File created C:\Windows\SysWOW64\mmhlid.exe mavttr.exe File created C:\Windows\SysWOW64\eixqmq.exe houdwn.exe File created C:\Windows\SysWOW64\houdwn.exe knjqsk.exe File created C:\Windows\SysWOW64\budveo.exe fpivgz.exe File opened for modification C:\Windows\SysWOW64\lnffxu.exe omvsur.exe File created C:\Windows\SysWOW64\cdjmiz.exe gczzeo.exe File opened for modification C:\Windows\SysWOW64\eslbiz.exe kfzoit.exe File created C:\Windows\SysWOW64\xfqjzf.exe dsloqh.exe File opened for modification C:\Windows\SysWOW64\thdrer.exe zurevk.exe File created C:\Windows\SysWOW64\ipwkjz.exe lrpkqs.exe File opened for modification C:\Windows\SysWOW64\mjhwke.exe pixjgt.exe File opened for modification C:\Windows\SysWOW64\byzetb.exe exprxq.exe File created C:\Windows\SysWOW64\ariono.exe byzetb.exe File created C:\Windows\SysWOW64\smtyrg.exe yzoeja.exe File opened for modification C:\Windows\SysWOW64\vhifvk.exe hgqszz.exe File created C:\Windows\SysWOW64\dvpuba.exe lcgkzn.exe File opened for modification C:\Windows\SysWOW64\asjxwf.exe gfekvy.exe File opened for modification C:\Windows\SysWOW64\ssbntj.exe vrraxg.exe File created C:\Windows\SysWOW64\rfdfzc.exe rnuvfq.exe File opened for modification C:\Windows\SysWOW64\qenpma.exe wfxmrd.exe File created C:\Windows\SysWOW64\tqojce.exe smcrfs.exe File created C:\Windows\SysWOW64\wxijxg.exe ckdowa.exe File opened for modification C:\Windows\SysWOW64\qlawwg.exe twtwvh.exe File created C:\Windows\SysWOW64\ffvkky.exe ipwkjz.exe File created C:\Windows\SysWOW64\gisqxv.exe mcjvuf.exe File created C:\Windows\SysWOW64\ffhiel.exe iiailm.exe File created C:\Windows\SysWOW64\yemxfk.exe ypornb.exe File opened for modification C:\Windows\SysWOW64\jeisol.exe mdqfsa.exe File created C:\Windows\SysWOW64\zurevk.exe zimehg.exe File opened for modification C:\Windows\SysWOW64\obwxdc.exe rdpwkd.exe File opened for modification C:\Windows\SysWOW64\plccct.exe pwewll.exe File opened for modification C:\Windows\SysWOW64\seysvq.exe vsdfxn.exe File opened for modification C:\Windows\SysWOW64\iupzif.exe olorkd.exe File opened for modification C:\Windows\SysWOW64\fghpdy.exe frjklh.exe File created C:\Windows\SysWOW64\cvvmyd.exe fqaurw.exe File created C:\Windows\SysWOW64\bvbmhy.exe exumor.exe File opened for modification C:\Windows\SysWOW64\spnbdo.exe zcagci.exe File created C:\Windows\SysWOW64\vaprnz.exe zyxejo.exe File created C:\Windows\SysWOW64\obwxdc.exe rdpwkd.exe File opened for modification C:\Windows\SysWOW64\syqyqe.exe vtmyko.exe File created C:\Windows\SysWOW64\ckdowa.exe drcwun.exe -
Suspicious use of SetThreadContext 64 IoCs
Processes:
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exejvzyiv.exebynbkf.exevipiih.exepoflke.exekfzoit.exeeslbiz.exezjfefo.exewdprja.exeqjgmep.exehbqwlq.exefnmjkk.exewfxmrd.exeqenpma.exenbmpnh.exekcecjt.exehoaphn.exeetvpgd.exeeeihuh.exeygjpaj.exeveiptq.exesimhzx.exesuyaoj.exelhdvwi.exedkpnlu.exexyuits.exeuvbimz.exeukqndh.exerpunkx.exerejtbf.exeqthqsv.exekgmlbu.exeknjqsk.exehoudwn.exeeixqmq.exeysryss.exeyzoeja.exesmtyrg.exepgplij.exejefokg.exegfpbgk.exedhhgkv.exeaisugy.exeugiwjw.exerdpwkd.exeobwxdc.exelcgkzn.exedvpuba.execkezsq.exewlghxk.exeujnhqr.exeqkxuuc.exeqcgnop.exekboijm.exekmaagq.exeeznvgx.exeyxvqju.exevvcqkt.exestjqda.exeputdzl.exepmcvby.exemcjvuf.exegisqxv.exeastycw.exedescription pid process target process PID 2004 set thread context of 3024 2004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 2884 set thread context of 2860 2884 jvzyiv.exe jvzyiv.exe PID 2580 set thread context of 2780 2580 bynbkf.exe bynbkf.exe PID 2748 set thread context of 2484 2748 vipiih.exe vipiih.exe PID 2732 set thread context of 2176 2732 poflke.exe poflke.exe PID 2184 set thread context of 812 2184 kfzoit.exe kfzoit.exe PID 1896 set thread context of 1608 1896 eslbiz.exe eslbiz.exe PID 1552 set thread context of 2076 1552 zjfefo.exe zjfefo.exe PID 2132 set thread context of 1228 2132 wdprja.exe wdprja.exe PID 1636 set thread context of 1984 1636 qjgmep.exe qjgmep.exe PID 2396 set thread context of 1236 2396 hbqwlq.exe hbqwlq.exe PID 780 set thread context of 2932 780 fnmjkk.exe fnmjkk.exe PID 2300 set thread context of 1016 2300 wfxmrd.exe wfxmrd.exe PID 2980 set thread context of 2012 2980 qenpma.exe qenpma.exe PID 2004 set thread context of 1448 2004 nbmpnh.exe nbmpnh.exe PID 2256 set thread context of 2940 2256 kcecjt.exe kcecjt.exe PID 3068 set thread context of 2620 3068 hoaphn.exe hoaphn.exe PID 2316 set thread context of 2548 2316 etvpgd.exe etvpgd.exe PID 2552 set thread context of 2508 2552 eeihuh.exe eeihuh.exe PID 1652 set thread context of 2204 1652 ygjpaj.exe ygjpaj.exe PID 1780 set thread context of 328 1780 veiptq.exe veiptq.exe PID 1716 set thread context of 1668 1716 simhzx.exe simhzx.exe PID 2244 set thread context of 628 2244 suyaoj.exe suyaoj.exe PID 1828 set thread context of 2236 1828 lhdvwi.exe lhdvwi.exe PID 2528 set thread context of 588 2528 dkpnlu.exe dkpnlu.exe PID 1308 set thread context of 1860 1308 xyuits.exe xyuits.exe PID 2276 set thread context of 940 2276 uvbimz.exe uvbimz.exe PID 972 set thread context of 1772 972 ukqndh.exe ukqndh.exe PID 900 set thread context of 2944 900 rpunkx.exe rpunkx.exe PID 2300 set thread context of 876 2300 rejtbf.exe rejtbf.exe PID 1680 set thread context of 1700 1680 qthqsv.exe qthqsv.exe PID 2312 set thread context of 2268 2312 kgmlbu.exe kgmlbu.exe PID 2540 set thread context of 2656 2540 knjqsk.exe knjqsk.exe PID 2940 set thread context of 2724 2940 houdwn.exe houdwn.exe PID 2620 set thread context of 2916 2620 eixqmq.exe eixqmq.exe PID 2968 set thread context of 2388 2968 ysryss.exe ysryss.exe PID 2188 set thread context of 2864 2188 yzoeja.exe yzoeja.exe PID 2156 set thread context of 1640 2156 smtyrg.exe smtyrg.exe PID 328 set thread context of 2948 328 pgplij.exe pgplij.exe PID 1668 set thread context of 2060 1668 jefokg.exe jefokg.exe PID 1184 set thread context of 476 1184 gfpbgk.exe gfpbgk.exe PID 2236 set thread context of 3056 2236 dhhgkv.exe dhhgkv.exe PID 588 set thread context of 888 588 aisugy.exe aisugy.exe PID 688 set thread context of 1544 688 ugiwjw.exe ugiwjw.exe PID 1776 set thread context of 1768 1776 rdpwkd.exe rdpwkd.exe PID 2080 set thread context of 1804 2080 obwxdc.exe obwxdc.exe PID 832 set thread context of 2008 832 lcgkzn.exe lcgkzn.exe PID 1696 set thread context of 2148 1696 dvpuba.exe dvpuba.exe PID 2764 set thread context of 2900 2764 ckezsq.exe ckezsq.exe PID 2920 set thread context of 2564 2920 wlghxk.exe wlghxk.exe PID 1156 set thread context of 2940 1156 ujnhqr.exe ujnhqr.exe PID 2436 set thread context of 2620 2436 qkxuuc.exe qkxuuc.exe PID 2852 set thread context of 1676 2852 qcgnop.exe qcgnop.exe PID 1824 set thread context of 1572 1824 kboijm.exe kboijm.exe PID 1564 set thread context of 1728 1564 kmaagq.exe kmaagq.exe PID 2836 set thread context of 2244 2836 eznvgx.exe eznvgx.exe PID 1740 set thread context of 2272 1740 yxvqju.exe yxvqju.exe PID 628 set thread context of 2528 628 vvcqkt.exe vvcqkt.exe PID 1632 set thread context of 2036 1632 stjqda.exe stjqda.exe PID 1888 set thread context of 2000 1888 putdzl.exe putdzl.exe PID 1952 set thread context of 1868 1952 pmcvby.exe pmcvby.exe PID 1748 set thread context of 2120 1748 mcjvuf.exe mcjvuf.exe PID 2924 set thread context of 2056 2924 gisqxv.exe gisqxv.exe PID 968 set thread context of 2772 968 astycw.exe astycw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exejvzyiv.exebynbkf.exevipiih.exepoflke.exekfzoit.exeeslbiz.exezjfefo.exewdprja.exeqjgmep.exehbqwlq.exefnmjkk.exewfxmrd.exeqenpma.exenbmpnh.exekcecjt.exehoaphn.exeetvpgd.exeeeihuh.exeygjpaj.exeveiptq.exesimhzx.exesuyaoj.exelhdvwi.exedkpnlu.exexyuits.exeuvbimz.exeukqndh.exerpunkx.exerejtbf.exeqthqsv.exekgmlbu.exeknjqsk.exehoudwn.exeeixqmq.exeysryss.exeyzoeja.exesmtyrg.exepgplij.exejefokg.exegfpbgk.exedhhgkv.exeaisugy.exeugiwjw.exerdpwkd.exeobwxdc.exelcgkzn.exedvpuba.execkezsq.exewlghxk.exeujnhqr.exeqkxuuc.exeqcgnop.exekboijm.exekmaagq.exeeznvgx.exeyxvqju.exevvcqkt.exestjqda.exeputdzl.exepmcvby.exemcjvuf.exegisqxv.exeastycw.exepid process 2004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 2884 jvzyiv.exe 2580 bynbkf.exe 2748 vipiih.exe 2732 poflke.exe 2184 kfzoit.exe 1896 eslbiz.exe 1552 zjfefo.exe 2132 wdprja.exe 1636 qjgmep.exe 2396 hbqwlq.exe 780 fnmjkk.exe 2300 wfxmrd.exe 2980 qenpma.exe 2004 nbmpnh.exe 2256 kcecjt.exe 3068 hoaphn.exe 2316 etvpgd.exe 2552 eeihuh.exe 1652 ygjpaj.exe 1780 veiptq.exe 1716 simhzx.exe 2244 suyaoj.exe 1828 lhdvwi.exe 2528 dkpnlu.exe 1308 xyuits.exe 2276 uvbimz.exe 972 ukqndh.exe 900 rpunkx.exe 2300 rejtbf.exe 1680 qthqsv.exe 2312 kgmlbu.exe 2540 knjqsk.exe 2940 houdwn.exe 2620 eixqmq.exe 2968 ysryss.exe 2188 yzoeja.exe 2156 smtyrg.exe 328 pgplij.exe 1668 jefokg.exe 1184 gfpbgk.exe 2236 dhhgkv.exe 588 aisugy.exe 688 ugiwjw.exe 1776 rdpwkd.exe 2080 obwxdc.exe 832 lcgkzn.exe 1696 dvpuba.exe 2764 ckezsq.exe 2920 wlghxk.exe 1156 ujnhqr.exe 2436 qkxuuc.exe 2852 qcgnop.exe 1824 kboijm.exe 1564 kmaagq.exe 2836 eznvgx.exe 1740 yxvqju.exe 628 vvcqkt.exe 1632 stjqda.exe 1888 putdzl.exe 1952 pmcvby.exe 1748 mcjvuf.exe 2924 gisqxv.exe 968 astycw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exef38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exejvzyiv.exejvzyiv.exebynbkf.exebynbkf.exevipiih.exevipiih.exepoflke.exepoflke.exekfzoit.exekfzoit.exeeslbiz.exedescription pid process target process PID 2004 wrote to memory of 3024 2004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 2004 wrote to memory of 3024 2004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 2004 wrote to memory of 3024 2004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 2004 wrote to memory of 3024 2004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 2004 wrote to memory of 3024 2004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 2004 wrote to memory of 3024 2004 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 3024 wrote to memory of 2884 3024 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe jvzyiv.exe PID 3024 wrote to memory of 2884 3024 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe jvzyiv.exe PID 3024 wrote to memory of 2884 3024 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe jvzyiv.exe PID 3024 wrote to memory of 2884 3024 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe jvzyiv.exe PID 2884 wrote to memory of 2860 2884 jvzyiv.exe jvzyiv.exe PID 2884 wrote to memory of 2860 2884 jvzyiv.exe jvzyiv.exe PID 2884 wrote to memory of 2860 2884 jvzyiv.exe jvzyiv.exe PID 2884 wrote to memory of 2860 2884 jvzyiv.exe jvzyiv.exe PID 2884 wrote to memory of 2860 2884 jvzyiv.exe jvzyiv.exe PID 2884 wrote to memory of 2860 2884 jvzyiv.exe jvzyiv.exe PID 2860 wrote to memory of 2580 2860 jvzyiv.exe bynbkf.exe PID 2860 wrote to memory of 2580 2860 jvzyiv.exe bynbkf.exe PID 2860 wrote to memory of 2580 2860 jvzyiv.exe bynbkf.exe PID 2860 wrote to memory of 2580 2860 jvzyiv.exe bynbkf.exe PID 2580 wrote to memory of 2780 2580 bynbkf.exe bynbkf.exe PID 2580 wrote to memory of 2780 2580 bynbkf.exe bynbkf.exe PID 2580 wrote to memory of 2780 2580 bynbkf.exe bynbkf.exe PID 2580 wrote to memory of 2780 2580 bynbkf.exe bynbkf.exe PID 2580 wrote to memory of 2780 2580 bynbkf.exe bynbkf.exe PID 2580 wrote to memory of 2780 2580 bynbkf.exe bynbkf.exe PID 2780 wrote to memory of 2748 2780 bynbkf.exe vipiih.exe PID 2780 wrote to memory of 2748 2780 bynbkf.exe vipiih.exe PID 2780 wrote to memory of 2748 2780 bynbkf.exe vipiih.exe PID 2780 wrote to memory of 2748 2780 bynbkf.exe vipiih.exe PID 2748 wrote to memory of 2484 2748 vipiih.exe vipiih.exe PID 2748 wrote to memory of 2484 2748 vipiih.exe vipiih.exe PID 2748 wrote to memory of 2484 2748 vipiih.exe vipiih.exe PID 2748 wrote to memory of 2484 2748 vipiih.exe vipiih.exe PID 2748 wrote to memory of 2484 2748 vipiih.exe vipiih.exe PID 2748 wrote to memory of 2484 2748 vipiih.exe vipiih.exe PID 2484 wrote to memory of 2732 2484 vipiih.exe poflke.exe PID 2484 wrote to memory of 2732 2484 vipiih.exe poflke.exe PID 2484 wrote to memory of 2732 2484 vipiih.exe poflke.exe PID 2484 wrote to memory of 2732 2484 vipiih.exe poflke.exe PID 2732 wrote to memory of 2176 2732 poflke.exe poflke.exe PID 2732 wrote to memory of 2176 2732 poflke.exe poflke.exe PID 2732 wrote to memory of 2176 2732 poflke.exe poflke.exe PID 2732 wrote to memory of 2176 2732 poflke.exe poflke.exe PID 2732 wrote to memory of 2176 2732 poflke.exe poflke.exe PID 2732 wrote to memory of 2176 2732 poflke.exe poflke.exe PID 2176 wrote to memory of 2184 2176 poflke.exe kfzoit.exe PID 2176 wrote to memory of 2184 2176 poflke.exe kfzoit.exe PID 2176 wrote to memory of 2184 2176 poflke.exe kfzoit.exe PID 2176 wrote to memory of 2184 2176 poflke.exe kfzoit.exe PID 2184 wrote to memory of 812 2184 kfzoit.exe kfzoit.exe PID 2184 wrote to memory of 812 2184 kfzoit.exe kfzoit.exe PID 2184 wrote to memory of 812 2184 kfzoit.exe kfzoit.exe PID 2184 wrote to memory of 812 2184 kfzoit.exe kfzoit.exe PID 2184 wrote to memory of 812 2184 kfzoit.exe kfzoit.exe PID 2184 wrote to memory of 812 2184 kfzoit.exe kfzoit.exe PID 812 wrote to memory of 1896 812 kfzoit.exe eslbiz.exe PID 812 wrote to memory of 1896 812 kfzoit.exe eslbiz.exe PID 812 wrote to memory of 1896 812 kfzoit.exe eslbiz.exe PID 812 wrote to memory of 1896 812 kfzoit.exe eslbiz.exe PID 1896 wrote to memory of 1608 1896 eslbiz.exe eslbiz.exe PID 1896 wrote to memory of 1608 1896 eslbiz.exe eslbiz.exe PID 1896 wrote to memory of 1608 1896 eslbiz.exe eslbiz.exe PID 1896 wrote to memory of 1608 1896 eslbiz.exe eslbiz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\jvzyiv.exeC:\Windows\system32\jvzyiv.exe 484 "C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\jvzyiv.exe484 C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\bynbkf.exeC:\Windows\system32\bynbkf.exe 444 "C:\Windows\SysWOW64\jvzyiv.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\bynbkf.exe444 C:\Windows\SysWOW64\jvzyiv.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\vipiih.exeC:\Windows\system32\vipiih.exe 444 "C:\Windows\SysWOW64\bynbkf.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\vipiih.exe444 C:\Windows\SysWOW64\bynbkf.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\poflke.exeC:\Windows\system32\poflke.exe 444 "C:\Windows\SysWOW64\vipiih.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\poflke.exe444 C:\Windows\SysWOW64\vipiih.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\kfzoit.exeC:\Windows\system32\kfzoit.exe 444 "C:\Windows\SysWOW64\poflke.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\kfzoit.exe444 C:\Windows\SysWOW64\poflke.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\eslbiz.exeC:\Windows\system32\eslbiz.exe 444 "C:\Windows\SysWOW64\kfzoit.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\eslbiz.exe444 C:\Windows\SysWOW64\kfzoit.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1608 -
C:\Windows\SysWOW64\zjfefo.exeC:\Windows\system32\zjfefo.exe 444 "C:\Windows\SysWOW64\eslbiz.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\zjfefo.exe444 C:\Windows\SysWOW64\eslbiz.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2076 -
C:\Windows\SysWOW64\wdprja.exeC:\Windows\system32\wdprja.exe 472 "C:\Windows\SysWOW64\zjfefo.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\wdprja.exe472 C:\Windows\SysWOW64\zjfefo.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1228 -
C:\Windows\SysWOW64\qjgmep.exeC:\Windows\system32\qjgmep.exe 444 "C:\Windows\SysWOW64\wdprja.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\qjgmep.exe444 C:\Windows\SysWOW64\wdprja.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984 -
C:\Windows\SysWOW64\hbqwlq.exeC:\Windows\system32\hbqwlq.exe 444 "C:\Windows\SysWOW64\qjgmep.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\hbqwlq.exe444 C:\Windows\SysWOW64\qjgmep.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1236 -
C:\Windows\SysWOW64\fnmjkk.exeC:\Windows\system32\fnmjkk.exe 444 "C:\Windows\SysWOW64\hbqwlq.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:780 -
C:\Windows\SysWOW64\fnmjkk.exe444 C:\Windows\SysWOW64\hbqwlq.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2932 -
C:\Windows\SysWOW64\wfxmrd.exeC:\Windows\system32\wfxmrd.exe 444 "C:\Windows\SysWOW64\fnmjkk.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\wfxmrd.exe444 C:\Windows\SysWOW64\fnmjkk.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1016 -
C:\Windows\SysWOW64\qenpma.exeC:\Windows\system32\qenpma.exe 444 "C:\Windows\SysWOW64\wfxmrd.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\qenpma.exe444 C:\Windows\SysWOW64\wfxmrd.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2012 -
C:\Windows\SysWOW64\nbmpnh.exeC:\Windows\system32\nbmpnh.exe 448 "C:\Windows\SysWOW64\qenpma.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\nbmpnh.exe448 C:\Windows\SysWOW64\qenpma.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448 -
C:\Windows\SysWOW64\kcecjt.exeC:\Windows\system32\kcecjt.exe 456 "C:\Windows\SysWOW64\nbmpnh.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\SysWOW64\kcecjt.exe456 C:\Windows\SysWOW64\nbmpnh.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2940 -
C:\Windows\SysWOW64\hoaphn.exeC:\Windows\system32\hoaphn.exe 456 "C:\Windows\SysWOW64\kcecjt.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3068 -
C:\Windows\SysWOW64\hoaphn.exe456 C:\Windows\SysWOW64\kcecjt.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2620 -
C:\Windows\SysWOW64\etvpgd.exeC:\Windows\system32\etvpgd.exe 496 "C:\Windows\SysWOW64\hoaphn.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\etvpgd.exe496 C:\Windows\SysWOW64\hoaphn.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2548 -
C:\Windows\SysWOW64\eeihuh.exeC:\Windows\system32\eeihuh.exe 444 "C:\Windows\SysWOW64\etvpgd.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\eeihuh.exe444 C:\Windows\SysWOW64\etvpgd.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2508 -
C:\Windows\SysWOW64\ygjpaj.exeC:\Windows\system32\ygjpaj.exe 444 "C:\Windows\SysWOW64\eeihuh.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\ygjpaj.exe444 C:\Windows\SysWOW64\eeihuh.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2204 -
C:\Windows\SysWOW64\veiptq.exeC:\Windows\system32\veiptq.exe 448 "C:\Windows\SysWOW64\ygjpaj.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\veiptq.exe448 C:\Windows\SysWOW64\ygjpaj.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:328 -
C:\Windows\SysWOW64\simhzx.exeC:\Windows\system32\simhzx.exe 448 "C:\Windows\SysWOW64\veiptq.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\simhzx.exe448 C:\Windows\SysWOW64\veiptq.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668 -
C:\Windows\SysWOW64\suyaoj.exeC:\Windows\system32\suyaoj.exe 452 "C:\Windows\SysWOW64\simhzx.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2244 -
C:\Windows\SysWOW64\suyaoj.exe452 C:\Windows\SysWOW64\simhzx.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:628 -
C:\Windows\SysWOW64\lhdvwi.exeC:\Windows\system32\lhdvwi.exe 448 "C:\Windows\SysWOW64\suyaoj.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1828 -
C:\Windows\SysWOW64\lhdvwi.exe448 C:\Windows\SysWOW64\suyaoj.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2236 -
C:\Windows\SysWOW64\dkpnlu.exeC:\Windows\system32\dkpnlu.exe 448 "C:\Windows\SysWOW64\lhdvwi.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\dkpnlu.exe448 C:\Windows\SysWOW64\lhdvwi.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:588 -
C:\Windows\SysWOW64\xyuits.exeC:\Windows\system32\xyuits.exe 496 "C:\Windows\SysWOW64\dkpnlu.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1308 -
C:\Windows\SysWOW64\xyuits.exe496 C:\Windows\SysWOW64\dkpnlu.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1860 -
C:\Windows\SysWOW64\uvbimz.exeC:\Windows\system32\uvbimz.exe 444 "C:\Windows\SysWOW64\xyuits.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\uvbimz.exe444 C:\Windows\SysWOW64\xyuits.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:940 -
C:\Windows\SysWOW64\ukqndh.exeC:\Windows\system32\ukqndh.exe 464 "C:\Windows\SysWOW64\uvbimz.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:972 -
C:\Windows\SysWOW64\ukqndh.exe464 C:\Windows\SysWOW64\uvbimz.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772 -
C:\Windows\SysWOW64\rpunkx.exeC:\Windows\system32\rpunkx.exe 444 "C:\Windows\SysWOW64\ukqndh.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:900 -
C:\Windows\SysWOW64\rpunkx.exe444 C:\Windows\SysWOW64\ukqndh.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944 -
C:\Windows\SysWOW64\rejtbf.exeC:\Windows\system32\rejtbf.exe 444 "C:\Windows\SysWOW64\rpunkx.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\rejtbf.exe444 C:\Windows\SysWOW64\rpunkx.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:876 -
C:\Windows\SysWOW64\qthqsv.exeC:\Windows\system32\qthqsv.exe 452 "C:\Windows\SysWOW64\rejtbf.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\qthqsv.exe452 C:\Windows\SysWOW64\rejtbf.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700 -
C:\Windows\SysWOW64\kgmlbu.exeC:\Windows\system32\kgmlbu.exe 444 "C:\Windows\SysWOW64\qthqsv.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\kgmlbu.exe444 C:\Windows\SysWOW64\qthqsv.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2268 -
C:\Windows\SysWOW64\knjqsk.exeC:\Windows\system32\knjqsk.exe 444 "C:\Windows\SysWOW64\kgmlbu.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\knjqsk.exe444 C:\Windows\SysWOW64\kgmlbu.exe66⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2656 -
C:\Windows\SysWOW64\houdwn.exeC:\Windows\system32\houdwn.exe 448 "C:\Windows\SysWOW64\knjqsk.exe"67⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\houdwn.exe448 C:\Windows\SysWOW64\knjqsk.exe68⤵
- Drops file in System32 directory
PID:2724 -
C:\Windows\SysWOW64\eixqmq.exeC:\Windows\system32\eixqmq.exe 444 "C:\Windows\SysWOW64\houdwn.exe"69⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\eixqmq.exe444 C:\Windows\SysWOW64\houdwn.exe70⤵PID:2916
-
C:\Windows\SysWOW64\ysryss.exeC:\Windows\system32\ysryss.exe 448 "C:\Windows\SysWOW64\eixqmq.exe"71⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\ysryss.exe448 C:\Windows\SysWOW64\eixqmq.exe72⤵PID:2388
-
C:\Windows\SysWOW64\yzoeja.exeC:\Windows\system32\yzoeja.exe 444 "C:\Windows\SysWOW64\ysryss.exe"73⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\SysWOW64\yzoeja.exe444 C:\Windows\SysWOW64\ysryss.exe74⤵
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\smtyrg.exeC:\Windows\system32\smtyrg.exe 492 "C:\Windows\SysWOW64\yzoeja.exe"75⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Windows\SysWOW64\smtyrg.exe492 C:\Windows\SysWOW64\yzoeja.exe76⤵PID:1640
-
C:\Windows\SysWOW64\pgplij.exeC:\Windows\system32\pgplij.exe 460 "C:\Windows\SysWOW64\smtyrg.exe"77⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:328 -
C:\Windows\SysWOW64\pgplij.exe460 C:\Windows\SysWOW64\smtyrg.exe78⤵PID:2948
-
C:\Windows\SysWOW64\jefokg.exeC:\Windows\system32\jefokg.exe 472 "C:\Windows\SysWOW64\pgplij.exe"79⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\jefokg.exe472 C:\Windows\SysWOW64\pgplij.exe80⤵PID:2060
-
C:\Windows\SysWOW64\gfpbgk.exeC:\Windows\system32\gfpbgk.exe 452 "C:\Windows\SysWOW64\jefokg.exe"81⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1184 -
C:\Windows\SysWOW64\gfpbgk.exe452 C:\Windows\SysWOW64\jefokg.exe82⤵PID:476
-
C:\Windows\SysWOW64\dhhgkv.exeC:\Windows\system32\dhhgkv.exe 456 "C:\Windows\SysWOW64\gfpbgk.exe"83⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\dhhgkv.exe456 C:\Windows\SysWOW64\gfpbgk.exe84⤵PID:3056
-
C:\Windows\SysWOW64\aisugy.exeC:\Windows\system32\aisugy.exe 444 "C:\Windows\SysWOW64\dhhgkv.exe"85⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:588 -
C:\Windows\SysWOW64\aisugy.exe444 C:\Windows\SysWOW64\dhhgkv.exe86⤵PID:888
-
C:\Windows\SysWOW64\ugiwjw.exeC:\Windows\system32\ugiwjw.exe 448 "C:\Windows\SysWOW64\aisugy.exe"87⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:688 -
C:\Windows\SysWOW64\ugiwjw.exe448 C:\Windows\SysWOW64\aisugy.exe88⤵PID:1544
-
C:\Windows\SysWOW64\rdpwkd.exeC:\Windows\system32\rdpwkd.exe 472 "C:\Windows\SysWOW64\ugiwjw.exe"89⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\SysWOW64\rdpwkd.exe472 C:\Windows\SysWOW64\ugiwjw.exe90⤵
- Drops file in System32 directory
PID:1768 -
C:\Windows\SysWOW64\obwxdc.exeC:\Windows\system32\obwxdc.exe 460 "C:\Windows\SysWOW64\rdpwkd.exe"91⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2080 -
C:\Windows\SysWOW64\obwxdc.exe460 C:\Windows\SysWOW64\rdpwkd.exe92⤵PID:1804
-
C:\Windows\SysWOW64\lcgkzn.exeC:\Windows\system32\lcgkzn.exe 456 "C:\Windows\SysWOW64\obwxdc.exe"93⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:832 -
C:\Windows\SysWOW64\lcgkzn.exe456 C:\Windows\SysWOW64\obwxdc.exe94⤵
- Drops file in System32 directory
PID:2008 -
C:\Windows\SysWOW64\dvpuba.exeC:\Windows\system32\dvpuba.exe 452 "C:\Windows\SysWOW64\lcgkzn.exe"95⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\dvpuba.exe452 C:\Windows\SysWOW64\lcgkzn.exe96⤵PID:2148
-
C:\Windows\SysWOW64\ckezsq.exeC:\Windows\system32\ckezsq.exe 444 "C:\Windows\SysWOW64\dvpuba.exe"97⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\ckezsq.exe444 C:\Windows\SysWOW64\dvpuba.exe98⤵PID:2900
-
C:\Windows\SysWOW64\wlghxk.exeC:\Windows\system32\wlghxk.exe 456 "C:\Windows\SysWOW64\ckezsq.exe"99⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\wlghxk.exe456 C:\Windows\SysWOW64\ckezsq.exe100⤵PID:2564
-
C:\Windows\SysWOW64\ujnhqr.exeC:\Windows\system32\ujnhqr.exe 456 "C:\Windows\SysWOW64\wlghxk.exe"101⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1156 -
C:\Windows\SysWOW64\ujnhqr.exe456 C:\Windows\SysWOW64\wlghxk.exe102⤵PID:2940
-
C:\Windows\SysWOW64\qkxuuc.exeC:\Windows\system32\qkxuuc.exe 452 "C:\Windows\SysWOW64\ujnhqr.exe"103⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\qkxuuc.exe452 C:\Windows\SysWOW64\ujnhqr.exe104⤵PID:2620
-
C:\Windows\SysWOW64\qcgnop.exeC:\Windows\system32\qcgnop.exe 460 "C:\Windows\SysWOW64\qkxuuc.exe"105⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\qcgnop.exe460 C:\Windows\SysWOW64\qkxuuc.exe106⤵PID:1676
-
C:\Windows\SysWOW64\kboijm.exeC:\Windows\system32\kboijm.exe 456 "C:\Windows\SysWOW64\qcgnop.exe"107⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\kboijm.exe456 C:\Windows\SysWOW64\qcgnop.exe108⤵PID:1572
-
C:\Windows\SysWOW64\kmaagq.exeC:\Windows\system32\kmaagq.exe 444 "C:\Windows\SysWOW64\kboijm.exe"109⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Windows\SysWOW64\kmaagq.exe444 C:\Windows\SysWOW64\kboijm.exe110⤵PID:1728
-
C:\Windows\SysWOW64\eznvgx.exeC:\Windows\system32\eznvgx.exe 444 "C:\Windows\SysWOW64\kmaagq.exe"111⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\eznvgx.exe444 C:\Windows\SysWOW64\kmaagq.exe112⤵
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\yxvqju.exeC:\Windows\system32\yxvqju.exe 444 "C:\Windows\SysWOW64\eznvgx.exe"113⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\yxvqju.exe444 C:\Windows\SysWOW64\eznvgx.exe114⤵PID:2272
-
C:\Windows\SysWOW64\vvcqkt.exeC:\Windows\system32\vvcqkt.exe 456 "C:\Windows\SysWOW64\yxvqju.exe"115⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\Windows\SysWOW64\vvcqkt.exe456 C:\Windows\SysWOW64\yxvqju.exe116⤵PID:2528
-
C:\Windows\SysWOW64\stjqda.exeC:\Windows\system32\stjqda.exe 472 "C:\Windows\SysWOW64\vvcqkt.exe"117⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\stjqda.exe472 C:\Windows\SysWOW64\vvcqkt.exe118⤵PID:2036
-
C:\Windows\SysWOW64\putdzl.exeC:\Windows\system32\putdzl.exe 456 "C:\Windows\SysWOW64\stjqda.exe"119⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\putdzl.exe456 C:\Windows\SysWOW64\stjqda.exe120⤵PID:2000
-
C:\Windows\SysWOW64\pmcvby.exeC:\Windows\system32\pmcvby.exe 472 "C:\Windows\SysWOW64\putdzl.exe"121⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\pmcvby.exe472 C:\Windows\SysWOW64\putdzl.exe122⤵PID:1868
-
C:\Windows\SysWOW64\mcjvuf.exeC:\Windows\system32\mcjvuf.exe 440 "C:\Windows\SysWOW64\pmcvby.exe"123⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Windows\SysWOW64\mcjvuf.exe440 C:\Windows\SysWOW64\pmcvby.exe124⤵
- Drops file in System32 directory
PID:2120 -
C:\Windows\SysWOW64\gisqxv.exeC:\Windows\system32\gisqxv.exe 472 "C:\Windows\SysWOW64\mcjvuf.exe"125⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\gisqxv.exe472 C:\Windows\SysWOW64\mcjvuf.exe126⤵PID:2056
-
C:\Windows\SysWOW64\astycw.exeC:\Windows\system32\astycw.exe 444 "C:\Windows\SysWOW64\gisqxv.exe"127⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:968 -
C:\Windows\SysWOW64\astycw.exe444 C:\Windows\SysWOW64\gisqxv.exe128⤵PID:2772
-
C:\Windows\SysWOW64\avfqrj.exeC:\Windows\system32\avfqrj.exe 452 "C:\Windows\SysWOW64\astycw.exe"129⤵PID:2040
-
C:\Windows\SysWOW64\avfqrj.exe452 C:\Windows\SysWOW64\astycw.exe130⤵PID:1964
-
C:\Windows\SysWOW64\uiklrh.exeC:\Windows\system32\uiklrh.exe 444 "C:\Windows\SysWOW64\avfqrj.exe"131⤵PID:2524
-
C:\Windows\SysWOW64\uiklrh.exe444 C:\Windows\SysWOW64\avfqrj.exe132⤵PID:2644
-
C:\Windows\SysWOW64\uuwent.exeC:\Windows\system32\uuwent.exe 456 "C:\Windows\SysWOW64\uiklrh.exe"133⤵PID:3068
-
C:\Windows\SysWOW64\uuwent.exe456 C:\Windows\SysWOW64\uiklrh.exe134⤵PID:2672
-
C:\Windows\SysWOW64\rvprjw.exeC:\Windows\system32\rvprjw.exe 440 "C:\Windows\SysWOW64\uuwent.exe"135⤵PID:2316
-
C:\Windows\SysWOW64\rvprjw.exe440 C:\Windows\SysWOW64\uuwent.exe136⤵PID:2476
-
C:\Windows\SysWOW64\olorkd.exeC:\Windows\system32\olorkd.exe 444 "C:\Windows\SysWOW64\rvprjw.exe"137⤵PID:2504
-
C:\Windows\SysWOW64\olorkd.exe444 C:\Windows\SysWOW64\rvprjw.exe138⤵
- Drops file in System32 directory
PID:944 -
C:\Windows\SysWOW64\iupzif.exeC:\Windows\system32\iupzif.exe 472 "C:\Windows\SysWOW64\olorkd.exe"139⤵PID:2620
-
C:\Windows\SysWOW64\iupzif.exe472 C:\Windows\SysWOW64\olorkd.exe140⤵PID:2192
-
C:\Windows\SysWOW64\xvhmmi.exeC:\Windows\system32\xvhmmi.exe 456 "C:\Windows\SysWOW64\iupzif.exe"141⤵PID:2180
-
C:\Windows\SysWOW64\xvhmmi.exe456 C:\Windows\SysWOW64\iupzif.exe142⤵PID:2404
-
C:\Windows\SysWOW64\xkxrdy.exeC:\Windows\system32\xkxrdy.exe 452 "C:\Windows\SysWOW64\xvhmmi.exe"143⤵PID:2864
-
C:\Windows\SysWOW64\xkxrdy.exe452 C:\Windows\SysWOW64\xvhmmi.exe144⤵PID:2160
-
C:\Windows\SysWOW64\tpsrcg.exeC:\Windows\system32\tpsrcg.exe 448 "C:\Windows\SysWOW64\xkxrdy.exe"145⤵PID:2532
-
C:\Windows\SysWOW64\tpsrcg.exe448 C:\Windows\SysWOW64\xkxrdy.exe146⤵PID:2228
-
C:\Windows\SysWOW64\thbbeb.exeC:\Windows\system32\thbbeb.exe 452 "C:\Windows\SysWOW64\tpsrcg.exe"147⤵PID:2420
-
C:\Windows\SysWOW64\thbbeb.exe452 C:\Windows\SysWOW64\tpsrcg.exe148⤵PID:572
-
C:\Windows\SysWOW64\ttousf.exeC:\Windows\system32\ttousf.exe 448 "C:\Windows\SysWOW64\thbbeb.exe"149⤵PID:2076
-
C:\Windows\SysWOW64\ttousf.exe448 C:\Windows\SysWOW64\thbbeb.exe150⤵PID:2236
-
C:\Windows\SysWOW64\ngspal.exeC:\Windows\system32\ngspal.exe 456 "C:\Windows\SysWOW64\ttousf.exe"151⤵PID:1988
-
C:\Windows\SysWOW64\ngspal.exe456 C:\Windows\SysWOW64\ttousf.exe152⤵PID:1760
-
C:\Windows\SysWOW64\nkfhpp.exeC:\Windows\system32\nkfhpp.exe 456 "C:\Windows\SysWOW64\ngspal.exe"153⤵PID:444
-
C:\Windows\SysWOW64\nkfhpp.exe456 C:\Windows\SysWOW64\ngspal.exe154⤵PID:1900
-
C:\Windows\SysWOW64\klpula.exeC:\Windows\system32\klpula.exe 452 "C:\Windows\SysWOW64\nkfhpp.exe"155⤵PID:1836
-
C:\Windows\SysWOW64\klpula.exe452 C:\Windows\SysWOW64\nkfhpp.exe156⤵PID:1460
-
C:\Windows\SysWOW64\hiwumz.exeC:\Windows\system32\hiwumz.exe 468 "C:\Windows\SysWOW64\klpula.exe"157⤵PID:2352
-
C:\Windows\SysWOW64\hiwumz.exe468 C:\Windows\SysWOW64\klpula.exe158⤵
- Drops file in System32 directory
PID:2896 -
C:\Windows\SysWOW64\avjpmf.exeC:\Windows\system32\avjpmf.exe 452 "C:\Windows\SysWOW64\hiwumz.exe"159⤵PID:2932
-
C:\Windows\SysWOW64\avjpmf.exe452 C:\Windows\SysWOW64\hiwumz.exe160⤵PID:1560
-
C:\Windows\SysWOW64\aojhos.exeC:\Windows\system32\aojhos.exe 444 "C:\Windows\SysWOW64\avjpmf.exe"161⤵PID:1060
-
C:\Windows\SysWOW64\aojhos.exe444 C:\Windows\SysWOW64\avjpmf.exe162⤵PID:3000
-
C:\Windows\SysWOW64\xeqhhz.exeC:\Windows\system32\xeqhhz.exe 448 "C:\Windows\SysWOW64\aojhos.exe"163⤵PID:2708
-
C:\Windows\SysWOW64\xeqhhz.exe448 C:\Windows\SysWOW64\aojhos.exe164⤵PID:2312
-
C:\Windows\SysWOW64\ufbnlk.exeC:\Windows\system32\ufbnlk.exe 472 "C:\Windows\SysWOW64\xeqhhz.exe"165⤵PID:1196
-
C:\Windows\SysWOW64\ufbnlk.exe472 C:\Windows\SysWOW64\xeqhhz.exe166⤵PID:1276
-
C:\Windows\SysWOW64\rchvej.exeC:\Windows\system32\rchvej.exe 448 "C:\Windows\SysWOW64\ufbnlk.exe"167⤵PID:2576
-
C:\Windows\SysWOW64\rchvej.exe448 C:\Windows\SysWOW64\ufbnlk.exe168⤵
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\oaovxq.exeC:\Windows\system32\oaovxq.exe 452 "C:\Windows\SysWOW64\rchvej.exe"169⤵PID:2564
-
C:\Windows\SysWOW64\oaovxq.exe452 C:\Windows\SysWOW64\rchvej.exe170⤵PID:2448
-
C:\Windows\SysWOW64\ospfzd.exeC:\Windows\system32\ospfzd.exe 444 "C:\Windows\SysWOW64\oaovxq.exe"171⤵PID:2484
-
C:\Windows\SysWOW64\ospfzd.exe444 C:\Windows\SysWOW64\oaovxq.exe172⤵PID:1596
-
C:\Windows\SysWOW64\kthsvo.exeC:\Windows\system32\kthsvo.exe 444 "C:\Windows\SysWOW64\ospfzd.exe"173⤵PID:2320
-
C:\Windows\SysWOW64\kthsvo.exe444 C:\Windows\SysWOW64\ospfzd.exe174⤵
- Drops file in System32 directory
PID:2208 -
C:\Windows\SysWOW64\husfzr.exeC:\Windows\system32\husfzr.exe 472 "C:\Windows\SysWOW64\kthsvo.exe"175⤵PID:1672
-
C:\Windows\SysWOW64\husfzr.exe472 C:\Windows\SysWOW64\kthsvo.exe176⤵PID:1076
-
C:\Windows\SysWOW64\hntyte.exeC:\Windows\system32\hntyte.exe 456 "C:\Windows\SysWOW64\husfzr.exe"177⤵PID:1796
-
C:\Windows\SysWOW64\hntyte.exe456 C:\Windows\SysWOW64\husfzr.exe178⤵PID:2172
-
C:\Windows\SysWOW64\edzyml.exeC:\Windows\system32\edzyml.exe 452 "C:\Windows\SysWOW64\hntyte.exe"179⤵PID:1668
-
C:\Windows\SysWOW64\edzyml.exe452 C:\Windows\SysWOW64\hntyte.exe180⤵PID:2264
-
C:\Windows\SysWOW64\esxvlt.exeC:\Windows\system32\esxvlt.exe 456 "C:\Windows\SysWOW64\edzyml.exe"181⤵PID:2240
-
C:\Windows\SysWOW64\esxvlt.exe456 C:\Windows\SysWOW64\edzyml.exe182⤵PID:2244
-
C:\Windows\SysWOW64\athihf.exeC:\Windows\system32\athihf.exe 452 "C:\Windows\SysWOW64\esxvlt.exe"183⤵PID:672
-
C:\Windows\SysWOW64\athihf.exe452 C:\Windows\SysWOW64\esxvlt.exe184⤵PID:2076
-
C:\Windows\SysWOW64\yqoiam.exeC:\Windows\system32\yqoiam.exe 472 "C:\Windows\SysWOW64\athihf.exe"185⤵PID:1632
-
C:\Windows\SysWOW64\yqoiam.exe472 C:\Windows\SysWOW64\athihf.exe186⤵PID:1692
-
C:\Windows\SysWOW64\xjpbcy.exeC:\Windows\system32\xjpbcy.exe 444 "C:\Windows\SysWOW64\yqoiam.exe"187⤵PID:1304
-
C:\Windows\SysWOW64\xjpbcy.exe444 C:\Windows\SysWOW64\yqoiam.exe188⤵PID:1888
-
C:\Windows\SysWOW64\mkhoyc.exeC:\Windows\system32\mkhoyc.exe 452 "C:\Windows\SysWOW64\xjpbcy.exe"189⤵PID:2000
-
C:\Windows\SysWOW64\mkhoyc.exe452 C:\Windows\SysWOW64\xjpbcy.exe190⤵
- Drops file in System32 directory
PID:1112 -
C:\Windows\SysWOW64\jlrbcn.exeC:\Windows\system32\jlrbcn.exe 444 "C:\Windows\SysWOW64\mkhoyc.exe"191⤵PID:1104
-
C:\Windows\SysWOW64\jlrbcn.exe444 C:\Windows\SysWOW64\mkhoyc.exe192⤵PID:1620
-
C:\Windows\SysWOW64\idalwz.exeC:\Windows\system32\idalwz.exe 448 "C:\Windows\SysWOW64\jlrbcn.exe"193⤵PID:2972
-
C:\Windows\SysWOW64\idalwz.exe448 C:\Windows\SysWOW64\jlrbcn.exe194⤵PID:2896
-
C:\Windows\SysWOW64\fthlpg.exeC:\Windows\system32\fthlpg.exe 444 "C:\Windows\SysWOW64\idalwz.exe"195⤵PID:1272
-
C:\Windows\SysWOW64\fthlpg.exe444 C:\Windows\SysWOW64\idalwz.exe196⤵PID:564
-
C:\Windows\SysWOW64\zdbtui.exeC:\Windows\system32\zdbtui.exe 456 "C:\Windows\SysWOW64\fthlpg.exe"197⤵PID:2820
-
C:\Windows\SysWOW64\zdbtui.exe456 C:\Windows\SysWOW64\fthlpg.exe198⤵PID:2256
-
C:\Windows\SysWOW64\zsyylr.exeC:\Windows\system32\zsyylr.exe 476 "C:\Windows\SysWOW64\zdbtui.exe"199⤵PID:1964
-
C:\Windows\SysWOW64\zsyylr.exe476 C:\Windows\SysWOW64\zdbtui.exe200⤵PID:2520
-
C:\Windows\SysWOW64\zkzrnd.exeC:\Windows\system32\zkzrnd.exe 452 "C:\Windows\SysWOW64\zsyylr.exe"201⤵PID:2644
-
C:\Windows\SysWOW64\zkzrnd.exe452 C:\Windows\SysWOW64\zsyylr.exe202⤵PID:2544
-
C:\Windows\SysWOW64\tubzlf.exeC:\Windows\system32\tubzlf.exe 444 "C:\Windows\SysWOW64\zkzrnd.exe"203⤵PID:2456
-
C:\Windows\SysWOW64\tubzlf.exe444 C:\Windows\SysWOW64\zkzrnd.exe204⤵PID:2444
-
C:\Windows\SysWOW64\smcrfs.exeC:\Windows\system32\smcrfs.exe 444 "C:\Windows\SysWOW64\tubzlf.exe"205⤵PID:2848
-
C:\Windows\SysWOW64\smcrfs.exe444 C:\Windows\SysWOW64\tubzlf.exe206⤵
- Drops file in System32 directory
PID:2448 -
C:\Windows\SysWOW64\tqojce.exeC:\Windows\system32\tqojce.exe 496 "C:\Windows\SysWOW64\smcrfs.exe"207⤵PID:1732
-
C:\Windows\SysWOW64\tqojce.exe496 C:\Windows\SysWOW64\smcrfs.exe208⤵PID:1268
-
C:\Windows\SysWOW64\mdtwck.exeC:\Windows\system32\mdtwck.exe 452 "C:\Windows\SysWOW64\tqojce.exe"209⤵PID:1676
-
C:\Windows\SysWOW64\mdtwck.exe452 C:\Windows\SysWOW64\tqojce.exe210⤵PID:1736
-
C:\Windows\SysWOW64\mofxyo.exeC:\Windows\system32\mofxyo.exe 444 "C:\Windows\SysWOW64\mdtwck.exe"211⤵PID:1064
-
C:\Windows\SysWOW64\mofxyo.exe444 C:\Windows\SysWOW64\mdtwck.exe212⤵
- Drops file in System32 directory
PID:2668 -
C:\Windows\SysWOW64\gyhewq.exeC:\Windows\system32\gyhewq.exe 444 "C:\Windows\SysWOW64\mofxyo.exe"213⤵PID:2472
-
C:\Windows\SysWOW64\gyhewq.exe444 C:\Windows\SysWOW64\mofxyo.exe214⤵PID:2248
-
C:\Windows\SysWOW64\gfekvy.exeC:\Windows\system32\gfekvy.exe 444 "C:\Windows\SysWOW64\gyhewq.exe"215⤵PID:1360
-
C:\Windows\SysWOW64\gfekvy.exe444 C:\Windows\SysWOW64\gyhewq.exe216⤵
- Drops file in System32 directory
PID:672 -
C:\Windows\SysWOW64\asjxwf.exeC:\Windows\system32\asjxwf.exe 444 "C:\Windows\SysWOW64\gfekvy.exe"217⤵PID:588
-
C:\Windows\SysWOW64\asjxwf.exe444 C:\Windows\SysWOW64\gfekvy.exe218⤵
- Drops file in System32 directory
PID:2076 -
C:\Windows\SysWOW64\ahhcnn.exeC:\Windows\system32\ahhcnn.exe 444 "C:\Windows\SysWOW64\asjxwf.exe"219⤵PID:2036
-
C:\Windows\SysWOW64\ahhcnn.exe444 C:\Windows\SysWOW64\asjxwf.exe220⤵PID:2276
-
C:\Windows\SysWOW64\xirpry.exeC:\Windows\system32\xirpry.exe 448 "C:\Windows\SysWOW64\ahhcnn.exe"221⤵PID:972
-
C:\Windows\SysWOW64\xirpry.exe448 C:\Windows\SysWOW64\ahhcnn.exe222⤵PID:900
-
C:\Windows\SysWOW64\ugypkx.exeC:\Windows\system32\ugypkx.exe 444 "C:\Windows\SysWOW64\xirpry.exe"223⤵PID:1900
-
C:\Windows\SysWOW64\ugypkx.exe444 C:\Windows\SysWOW64\xirpry.exe224⤵PID:2960
-
C:\Windows\SysWOW64\rhicoi.exeC:\Windows\system32\rhicoi.exe 452 "C:\Windows\SysWOW64\ugypkx.exe"225⤵PID:2088
-
C:\Windows\SysWOW64\rhicoi.exe452 C:\Windows\SysWOW64\ugypkx.exe226⤵PID:1620
-
C:\Windows\SysWOW64\qwfifr.exeC:\Windows\system32\qwfifr.exe 444 "C:\Windows\SysWOW64\rhicoi.exe"227⤵PID:1584
-
C:\Windows\SysWOW64\qwfifr.exe444 C:\Windows\SysWOW64\rhicoi.exe228⤵
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\npqvjc.exeC:\Windows\system32\npqvjc.exe 444 "C:\Windows\SysWOW64\qwfifr.exe"229⤵PID:3000
-
C:\Windows\SysWOW64\npqvjc.exe444 C:\Windows\SysWOW64\qwfifr.exe230⤵
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\kqiaef.exeC:\Windows\system32\kqiaef.exe 444 "C:\Windows\SysWOW64\npqvjc.exe"231⤵PID:3040
-
C:\Windows\SysWOW64\kqiaef.exe444 C:\Windows\SysWOW64\npqvjc.exe232⤵PID:2560
-
C:\Windows\SysWOW64\kfffww.exeC:\Windows\system32\kfffww.exe 444 "C:\Windows\SysWOW64\kqiaef.exe"233⤵PID:2576
-
C:\Windows\SysWOW64\kfffww.exe444 C:\Windows\SysWOW64\kqiaef.exe234⤵PID:2548
-
C:\Windows\SysWOW64\hgqszz.exeC:\Windows\system32\hgqszz.exe 444 "C:\Windows\SysWOW64\kfffww.exe"235⤵PID:2748
-
C:\Windows\SysWOW64\hgqszz.exe444 C:\Windows\SysWOW64\kfffww.exe236⤵
- Drops file in System32 directory
PID:2968 -
C:\Windows\SysWOW64\vhifvk.exeC:\Windows\system32\vhifvk.exe 472 "C:\Windows\SysWOW64\hgqszz.exe"237⤵PID:1212
-
C:\Windows\SysWOW64\vhifvk.exe472 C:\Windows\SysWOW64\hgqszz.exe238⤵PID:1652
-
C:\Windows\SysWOW64\vtmyko.exeC:\Windows\system32\vtmyko.exe 444 "C:\Windows\SysWOW64\vhifvk.exe"239⤵PID:2448
-
C:\Windows\SysWOW64\vtmyko.exe444 C:\Windows\SysWOW64\vhifvk.exe240⤵
- Drops file in System32 directory
PID:1200 -
C:\Windows\SysWOW64\syqyqe.exeC:\Windows\system32\syqyqe.exe 440 "C:\Windows\SysWOW64\vtmyko.exe"241⤵PID:1204
-