Analysis
-
max time kernel
32s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 11:51
Static task
static1
Behavioral task
behavioral1
Sample
fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe
-
Size
102KB
-
MD5
fcb5695a58313c7c0341bd5a6a0e8bf7
-
SHA1
cc791671160e423aa7845566fdfe0e6c792401f5
-
SHA256
4c16edebd158f250b0fba02dce4f49fa9126e95139016e65b96642f2323930db
-
SHA512
64c9bf3ff64b15baed32ee60c53cbbadd69a29176176e7cc94eb932c93a8bdc8062f4d6daca95797dfd4cd8861905700439ed077bff01545f0c1e39dafd1c321
-
SSDEEP
3072:zDlFYy7UFiiL5/GJCj1GYsyKnuADfzRUlbt3Tzq7h6l:PB7Ur+bYs/uAPe3P/
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
Detect Lumma Stealer payload V4 64 IoCs
Processes:
resource yara_rule behavioral1/memory/1084-0-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2272-13-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/1084-16-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2608-27-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2272-31-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2608-41-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2356-51-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2356-63-0x0000000002250000-0x0000000002337000-memory.dmp family_lumma_v4 behavioral1/memory/2584-56-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2348-66-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2356-69-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2924-80-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2348-84-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2924-98-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/640-106-0x0000000002850000-0x0000000002937000-memory.dmp family_lumma_v4 behavioral1/memory/640-107-0x0000000002850000-0x0000000002937000-memory.dmp family_lumma_v4 behavioral1/memory/1968-108-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/640-109-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/1968-120-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2312-131-0x0000000002750000-0x0000000002837000-memory.dmp family_lumma_v4 behavioral1/memory/1704-133-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/1704-145-0x0000000002730000-0x0000000002817000-memory.dmp family_lumma_v4 behavioral1/memory/1592-146-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2312-137-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/1704-150-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/1592-162-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2656-172-0x00000000026D0000-0x00000000027B7000-memory.dmp family_lumma_v4 behavioral1/memory/2656-174-0x00000000026D0000-0x00000000027B7000-memory.dmp family_lumma_v4 behavioral1/memory/2640-173-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2656-178-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2640-186-0x0000000002590000-0x0000000002677000-memory.dmp family_lumma_v4 behavioral1/memory/2716-188-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2640-190-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2716-202-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/1904-213-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2708-228-0x00000000028F0000-0x00000000029D7000-memory.dmp family_lumma_v4 behavioral1/memory/2748-229-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2868-221-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2708-230-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2748-237-0x00000000027D0000-0x00000000028B7000-memory.dmp family_lumma_v4 behavioral1/memory/2748-238-0x00000000027D0000-0x00000000028B7000-memory.dmp family_lumma_v4 behavioral1/memory/888-239-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2748-241-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/888-248-0x00000000026E0000-0x00000000027C7000-memory.dmp family_lumma_v4 behavioral1/memory/1340-249-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/888-250-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2912-257-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/1340-258-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2912-265-0x00000000028E0000-0x00000000029C7000-memory.dmp family_lumma_v4 behavioral1/memory/2912-266-0x00000000028E0000-0x00000000029C7000-memory.dmp family_lumma_v4 behavioral1/memory/2828-267-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2912-268-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2828-275-0x0000000002920000-0x0000000002A07000-memory.dmp family_lumma_v4 behavioral1/memory/2588-276-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2828-277-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2588-284-0x00000000027F0000-0x00000000028D7000-memory.dmp family_lumma_v4 behavioral1/memory/2848-285-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2588-286-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2848-293-0x0000000002860000-0x0000000002947000-memory.dmp family_lumma_v4 behavioral1/memory/2848-294-0x0000000002860000-0x0000000002947000-memory.dmp family_lumma_v4 behavioral1/memory/2360-295-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2848-297-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral1/memory/2360-305-0x0000000002780000-0x0000000002867000-memory.dmp family_lumma_v4 behavioral1/memory/2360-306-0x0000000002780000-0x0000000002867000-memory.dmp family_lumma_v4 -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
Processes:
lpdpbus.exeaemzhyl.exehmizbov.exeslmxmnu.execgnhbhd.exehqvkknj.exerwwziuo.exetonxaqw.exedjohikf.exeaojhosp.exeszxaopq.exeduqkekq.exezvixzvc.exemmdaidi.exeohgcdex.exeujoxtbu.exeyvhfnlh.exeiyfqaoo.exetuyahio.exeabtacyy.exehusfzro.exeprcsidr.execmliogq.exejxsnlay.exerfgffyh.exebagynsi.exejerdwdt.exeddhgzba.exennwqmeo.exeuvkigtq.exehibymxx.exehppyhmg.exerambuqm.exebkcgzgo.exelvrqujv.exescejgye.exenbvljwl.exeptmbbst.exezontjmu.exeknzrblb.exeuqpbooi.exegojexwn.exernobhvv.exevesodbg.exeirkejff.exenedmchk.exexswjaox.exehrihlne.exermjzshf.exewruzmrs.exehnvrtmt.exerxlcopz.exeaaimcsf.exeiekrtdq.exesdwxdcq.exedzphlwy.exengbfdvg.exeuopfqkh.execvkxkar.exemuouuzy.exeztrxdhe.exeivhhykk.exewiqxeoj.exegicuonr.exepid process 2272 lpdpbus.exe 2608 aemzhyl.exe 2584 hmizbov.exe 2356 slmxmnu.exe 2348 cgnhbhd.exe 2924 hqvkknj.exe 640 rwwziuo.exe 1968 tonxaqw.exe 2312 djohikf.exe 1704 aojhosp.exe 1592 szxaopq.exe 2656 duqkekq.exe 2640 zvixzvc.exe 2716 mmdaidi.exe 1904 ohgcdex.exe 2868 ujoxtbu.exe 2708 yvhfnlh.exe 2748 iyfqaoo.exe 888 tuyahio.exe 1340 abtacyy.exe 2912 husfzro.exe 2828 prcsidr.exe 2588 cmliogq.exe 2848 jxsnlay.exe 2360 rfgffyh.exe 2412 bagynsi.exe 2332 jerdwdt.exe 1448 ddhgzba.exe 800 nnwqmeo.exe 1828 uvkigtq.exe 2324 hibymxx.exe 1500 hppyhmg.exe 3032 rambuqm.exe 2132 bkcgzgo.exe 380 lvrqujv.exe 440 scejgye.exe 1580 nbvljwl.exe 1116 ptmbbst.exe 1120 zontjmu.exe 2852 knzrblb.exe 2972 uqpbooi.exe 2224 gojexwn.exe 2148 rnobhvv.exe 2024 vesodbg.exe 1728 irkejff.exe 2576 nedmchk.exe 2128 xswjaox.exe 2376 hrihlne.exe 2768 rmjzshf.exe 856 wruzmrs.exe 2084 hnvrtmt.exe 1944 rxlcopz.exe 2200 aaimcsf.exe 1900 iekrtdq.exe 1648 sdwxdcq.exe 1948 dzphlwy.exe 528 ngbfdvg.exe 2040 uopfqkh.exe 324 cvkxkar.exe 2816 muouuzy.exe 1800 ztrxdhe.exe 1752 ivhhykk.exe 2172 wiqxeoj.exe 3000 gicuonr.exe -
Loads dropped DLL 64 IoCs
Processes:
fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exelpdpbus.exeaemzhyl.exehmizbov.exeslmxmnu.execgnhbhd.exehqvkknj.exerwwziuo.exetonxaqw.exedjohikf.exeaojhosp.exeszxaopq.exeduqkekq.exezvixzvc.exemmdaidi.exeohgcdex.exeujoxtbu.exeyvhfnlh.exeiyfqaoo.exetuyahio.exeabtacyy.exehusfzro.exeprcsidr.execmliogq.exejxsnlay.exerfgffyh.exebagynsi.exejerdwdt.exeddhgzba.exennwqmeo.exeuvkigtq.exehibymxx.exepid process 1084 fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe 1084 fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe 2272 lpdpbus.exe 2272 lpdpbus.exe 2608 aemzhyl.exe 2608 aemzhyl.exe 2584 hmizbov.exe 2584 hmizbov.exe 2356 slmxmnu.exe 2356 slmxmnu.exe 2348 cgnhbhd.exe 2348 cgnhbhd.exe 2924 hqvkknj.exe 2924 hqvkknj.exe 640 rwwziuo.exe 640 rwwziuo.exe 1968 tonxaqw.exe 1968 tonxaqw.exe 2312 djohikf.exe 2312 djohikf.exe 1704 aojhosp.exe 1704 aojhosp.exe 1592 szxaopq.exe 1592 szxaopq.exe 2656 duqkekq.exe 2656 duqkekq.exe 2640 zvixzvc.exe 2640 zvixzvc.exe 2716 mmdaidi.exe 2716 mmdaidi.exe 1904 ohgcdex.exe 1904 ohgcdex.exe 2868 ujoxtbu.exe 2868 ujoxtbu.exe 2708 yvhfnlh.exe 2708 yvhfnlh.exe 2748 iyfqaoo.exe 2748 iyfqaoo.exe 888 tuyahio.exe 888 tuyahio.exe 1340 abtacyy.exe 1340 abtacyy.exe 2912 husfzro.exe 2912 husfzro.exe 2828 prcsidr.exe 2828 prcsidr.exe 2588 cmliogq.exe 2588 cmliogq.exe 2848 jxsnlay.exe 2848 jxsnlay.exe 2360 rfgffyh.exe 2360 rfgffyh.exe 2412 bagynsi.exe 2412 bagynsi.exe 2332 jerdwdt.exe 2332 jerdwdt.exe 1448 ddhgzba.exe 1448 ddhgzba.exe 800 nnwqmeo.exe 800 nnwqmeo.exe 1828 uvkigtq.exe 1828 uvkigtq.exe 2324 hibymxx.exe 2324 hibymxx.exe -
Drops file in System32 directory 64 IoCs
Processes:
excpcxg.execmliogq.exengbfdvg.exeuqpbooi.exeuopfqkh.execopltzj.exewvqulsj.exelvrqujv.exewiqxeoj.exelpdpbus.exeivhhykk.exexpdcnnk.exeypiypcu.exeaaimcsf.exeuekdoux.exeiydagfc.exeokkoioq.exexarrqzl.exeszxaopq.exenbvljwl.exeepznbxd.exefvoutfg.exennwqmeo.exeqvucsbt.exejxsnlay.exeuaigdmc.exehmizbov.exenedmchk.exevesodbg.exexjvtgdu.exekepnvst.exeubcohna.exeptmbbst.exeesbkkiz.exeipwkxfv.exehibymxx.exeknzrblb.exerxlcopz.exeoolsmwl.exefdfczkw.exeaemzhyl.exeohgcdex.exebagynsi.exennujyil.exeduqkekq.exeuolpctj.exehrihlne.exeslmxmnu.exerfgffyh.exezontjmu.exevajypxx.exeiqkpbpq.exedescription ioc process File created C:\Windows\SysWOW64\iqkpbpq.exe excpcxg.exe File opened for modification C:\Windows\SysWOW64\jxsnlay.exe cmliogq.exe File created C:\Windows\SysWOW64\uopfqkh.exe ngbfdvg.exe File opened for modification C:\Windows\SysWOW64\gojexwn.exe uqpbooi.exe File created C:\Windows\SysWOW64\cvkxkar.exe uopfqkh.exe File opened for modification C:\Windows\SysWOW64\lrfwgup.exe copltzj.exe File opened for modification C:\Windows\SysWOW64\ipwkxfv.exe wvqulsj.exe File opened for modification C:\Windows\SysWOW64\scejgye.exe lvrqujv.exe File created C:\Windows\SysWOW64\gicuonr.exe wiqxeoj.exe File created C:\Windows\SysWOW64\aemzhyl.exe lpdpbus.exe File opened for modification C:\Windows\SysWOW64\wiqxeoj.exe ivhhykk.exe File created C:\Windows\SysWOW64\kfffwwp.exe xpdcnnk.exe File opened for modification C:\Windows\SysWOW64\mcrovgt.exe ypiypcu.exe File created C:\Windows\SysWOW64\iekrtdq.exe aaimcsf.exe File created C:\Windows\SysWOW64\epznbxd.exe uekdoux.exe File created C:\Windows\SysWOW64\syqyqek.exe iydagfc.exe File opened for modification C:\Windows\SysWOW64\woutszs.exe okkoioq.exe File opened for modification C:\Windows\SysWOW64\gdguluz.exe xarrqzl.exe File opened for modification C:\Windows\SysWOW64\duqkekq.exe szxaopq.exe File created C:\Windows\SysWOW64\ptmbbst.exe nbvljwl.exe File opened for modification C:\Windows\SysWOW64\gicuonr.exe wiqxeoj.exe File opened for modification C:\Windows\SysWOW64\oolsmwl.exe epznbxd.exe File opened for modification C:\Windows\SysWOW64\uolpctj.exe fvoutfg.exe File opened for modification C:\Windows\SysWOW64\uvkigtq.exe nnwqmeo.exe File opened for modification C:\Windows\SysWOW64\fdfczkw.exe qvucsbt.exe File created C:\Windows\SysWOW64\rfgffyh.exe jxsnlay.exe File opened for modification C:\Windows\SysWOW64\ewjqkhc.exe uaigdmc.exe File created C:\Windows\SysWOW64\slmxmnu.exe hmizbov.exe File created C:\Windows\SysWOW64\xswjaox.exe nedmchk.exe File created C:\Windows\SysWOW64\irkejff.exe vesodbg.exe File created C:\Windows\SysWOW64\hizqqcb.exe xjvtgdu.exe File created C:\Windows\SysWOW64\uaigdmc.exe kepnvst.exe File created C:\Windows\SysWOW64\eagmzmi.exe ubcohna.exe File opened for modification C:\Windows\SysWOW64\zontjmu.exe ptmbbst.exe File opened for modification C:\Windows\SysWOW64\uopfqkh.exe ngbfdvg.exe File created C:\Windows\SysWOW64\lrfwgup.exe copltzj.exe File created C:\Windows\SysWOW64\mcrovgt.exe ypiypcu.exe File created C:\Windows\SysWOW64\wvqulsj.exe esbkkiz.exe File opened for modification C:\Windows\SysWOW64\udkulxx.exe ipwkxfv.exe File opened for modification C:\Windows\SysWOW64\iekrtdq.exe aaimcsf.exe File opened for modification C:\Windows\SysWOW64\hppyhmg.exe hibymxx.exe File created C:\Windows\SysWOW64\uqpbooi.exe knzrblb.exe File created C:\Windows\SysWOW64\aaimcsf.exe rxlcopz.exe File created C:\Windows\SysWOW64\lxtncuq.exe oolsmwl.exe File created C:\Windows\SysWOW64\fvoutfg.exe fdfczkw.exe File opened for modification C:\Windows\SysWOW64\hmizbov.exe aemzhyl.exe File created C:\Windows\SysWOW64\ujoxtbu.exe ohgcdex.exe File opened for modification C:\Windows\SysWOW64\jerdwdt.exe bagynsi.exe File created C:\Windows\SysWOW64\hppyhmg.exe hibymxx.exe File opened for modification C:\Windows\SysWOW64\epznbxd.exe uekdoux.exe File created C:\Windows\SysWOW64\woutszs.exe okkoioq.exe File opened for modification C:\Windows\SysWOW64\xjvtgdu.exe nnujyil.exe File created C:\Windows\SysWOW64\uolpctj.exe fvoutfg.exe File created C:\Windows\SysWOW64\zvixzvc.exe duqkekq.exe File opened for modification C:\Windows\SysWOW64\mhorkly.exe uolpctj.exe File created C:\Windows\SysWOW64\mhorkly.exe uolpctj.exe File created C:\Windows\SysWOW64\rmjzshf.exe hrihlne.exe File opened for modification C:\Windows\SysWOW64\syqyqek.exe iydagfc.exe File opened for modification C:\Windows\SysWOW64\eagmzmi.exe ubcohna.exe File created C:\Windows\SysWOW64\cgnhbhd.exe slmxmnu.exe File opened for modification C:\Windows\SysWOW64\bagynsi.exe rfgffyh.exe File opened for modification C:\Windows\SysWOW64\knzrblb.exe zontjmu.exe File created C:\Windows\SysWOW64\iydagfc.exe vajypxx.exe File created C:\Windows\SysWOW64\qvucsbt.exe iqkpbpq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exelpdpbus.exeaemzhyl.exehmizbov.exeslmxmnu.execgnhbhd.exehqvkknj.exerwwziuo.exetonxaqw.exedjohikf.exeaojhosp.exeszxaopq.exeduqkekq.exezvixzvc.exemmdaidi.exeohgcdex.exedescription pid process target process PID 1084 wrote to memory of 2272 1084 fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe lpdpbus.exe PID 1084 wrote to memory of 2272 1084 fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe lpdpbus.exe PID 1084 wrote to memory of 2272 1084 fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe lpdpbus.exe PID 1084 wrote to memory of 2272 1084 fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe lpdpbus.exe PID 2272 wrote to memory of 2608 2272 lpdpbus.exe aemzhyl.exe PID 2272 wrote to memory of 2608 2272 lpdpbus.exe aemzhyl.exe PID 2272 wrote to memory of 2608 2272 lpdpbus.exe aemzhyl.exe PID 2272 wrote to memory of 2608 2272 lpdpbus.exe aemzhyl.exe PID 2608 wrote to memory of 2584 2608 aemzhyl.exe hmizbov.exe PID 2608 wrote to memory of 2584 2608 aemzhyl.exe hmizbov.exe PID 2608 wrote to memory of 2584 2608 aemzhyl.exe hmizbov.exe PID 2608 wrote to memory of 2584 2608 aemzhyl.exe hmizbov.exe PID 2584 wrote to memory of 2356 2584 hmizbov.exe slmxmnu.exe PID 2584 wrote to memory of 2356 2584 hmizbov.exe slmxmnu.exe PID 2584 wrote to memory of 2356 2584 hmizbov.exe slmxmnu.exe PID 2584 wrote to memory of 2356 2584 hmizbov.exe slmxmnu.exe PID 2356 wrote to memory of 2348 2356 slmxmnu.exe cgnhbhd.exe PID 2356 wrote to memory of 2348 2356 slmxmnu.exe cgnhbhd.exe PID 2356 wrote to memory of 2348 2356 slmxmnu.exe cgnhbhd.exe PID 2356 wrote to memory of 2348 2356 slmxmnu.exe cgnhbhd.exe PID 2348 wrote to memory of 2924 2348 cgnhbhd.exe hqvkknj.exe PID 2348 wrote to memory of 2924 2348 cgnhbhd.exe hqvkknj.exe PID 2348 wrote to memory of 2924 2348 cgnhbhd.exe hqvkknj.exe PID 2348 wrote to memory of 2924 2348 cgnhbhd.exe hqvkknj.exe PID 2924 wrote to memory of 640 2924 hqvkknj.exe rwwziuo.exe PID 2924 wrote to memory of 640 2924 hqvkknj.exe rwwziuo.exe PID 2924 wrote to memory of 640 2924 hqvkknj.exe rwwziuo.exe PID 2924 wrote to memory of 640 2924 hqvkknj.exe rwwziuo.exe PID 640 wrote to memory of 1968 640 rwwziuo.exe tonxaqw.exe PID 640 wrote to memory of 1968 640 rwwziuo.exe tonxaqw.exe PID 640 wrote to memory of 1968 640 rwwziuo.exe tonxaqw.exe PID 640 wrote to memory of 1968 640 rwwziuo.exe tonxaqw.exe PID 1968 wrote to memory of 2312 1968 tonxaqw.exe djohikf.exe PID 1968 wrote to memory of 2312 1968 tonxaqw.exe djohikf.exe PID 1968 wrote to memory of 2312 1968 tonxaqw.exe djohikf.exe PID 1968 wrote to memory of 2312 1968 tonxaqw.exe djohikf.exe PID 2312 wrote to memory of 1704 2312 djohikf.exe aojhosp.exe PID 2312 wrote to memory of 1704 2312 djohikf.exe aojhosp.exe PID 2312 wrote to memory of 1704 2312 djohikf.exe aojhosp.exe PID 2312 wrote to memory of 1704 2312 djohikf.exe aojhosp.exe PID 1704 wrote to memory of 1592 1704 aojhosp.exe szxaopq.exe PID 1704 wrote to memory of 1592 1704 aojhosp.exe szxaopq.exe PID 1704 wrote to memory of 1592 1704 aojhosp.exe szxaopq.exe PID 1704 wrote to memory of 1592 1704 aojhosp.exe szxaopq.exe PID 1592 wrote to memory of 2656 1592 szxaopq.exe duqkekq.exe PID 1592 wrote to memory of 2656 1592 szxaopq.exe duqkekq.exe PID 1592 wrote to memory of 2656 1592 szxaopq.exe duqkekq.exe PID 1592 wrote to memory of 2656 1592 szxaopq.exe duqkekq.exe PID 2656 wrote to memory of 2640 2656 duqkekq.exe zvixzvc.exe PID 2656 wrote to memory of 2640 2656 duqkekq.exe zvixzvc.exe PID 2656 wrote to memory of 2640 2656 duqkekq.exe zvixzvc.exe PID 2656 wrote to memory of 2640 2656 duqkekq.exe zvixzvc.exe PID 2640 wrote to memory of 2716 2640 zvixzvc.exe mmdaidi.exe PID 2640 wrote to memory of 2716 2640 zvixzvc.exe mmdaidi.exe PID 2640 wrote to memory of 2716 2640 zvixzvc.exe mmdaidi.exe PID 2640 wrote to memory of 2716 2640 zvixzvc.exe mmdaidi.exe PID 2716 wrote to memory of 1904 2716 mmdaidi.exe ohgcdex.exe PID 2716 wrote to memory of 1904 2716 mmdaidi.exe ohgcdex.exe PID 2716 wrote to memory of 1904 2716 mmdaidi.exe ohgcdex.exe PID 2716 wrote to memory of 1904 2716 mmdaidi.exe ohgcdex.exe PID 1904 wrote to memory of 2868 1904 ohgcdex.exe ujoxtbu.exe PID 1904 wrote to memory of 2868 1904 ohgcdex.exe ujoxtbu.exe PID 1904 wrote to memory of 2868 1904 ohgcdex.exe ujoxtbu.exe PID 1904 wrote to memory of 2868 1904 ohgcdex.exe ujoxtbu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\lpdpbus.exeC:\Windows\system32\lpdpbus.exe 476 "C:\Users\Admin\AppData\Local\Temp\fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\aemzhyl.exeC:\Windows\system32\aemzhyl.exe 512 "C:\Windows\SysWOW64\lpdpbus.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\hmizbov.exeC:\Windows\system32\hmizbov.exe 516 "C:\Windows\SysWOW64\aemzhyl.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\slmxmnu.exeC:\Windows\system32\slmxmnu.exe 452 "C:\Windows\SysWOW64\hmizbov.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cgnhbhd.exeC:\Windows\system32\cgnhbhd.exe 524 "C:\Windows\SysWOW64\slmxmnu.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\hqvkknj.exeC:\Windows\system32\hqvkknj.exe 528 "C:\Windows\SysWOW64\cgnhbhd.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\rwwziuo.exeC:\Windows\system32\rwwziuo.exe 532 "C:\Windows\SysWOW64\hqvkknj.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\tonxaqw.exeC:\Windows\system32\tonxaqw.exe 492 "C:\Windows\SysWOW64\rwwziuo.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\djohikf.exeC:\Windows\system32\djohikf.exe 464 "C:\Windows\SysWOW64\tonxaqw.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\aojhosp.exeC:\Windows\system32\aojhosp.exe 544 "C:\Windows\SysWOW64\djohikf.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\szxaopq.exeC:\Windows\system32\szxaopq.exe 548 "C:\Windows\SysWOW64\aojhosp.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\duqkekq.exeC:\Windows\system32\duqkekq.exe 564 "C:\Windows\SysWOW64\szxaopq.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\zvixzvc.exeC:\Windows\system32\zvixzvc.exe 552 "C:\Windows\SysWOW64\duqkekq.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\mmdaidi.exeC:\Windows\system32\mmdaidi.exe 556 "C:\Windows\SysWOW64\zvixzvc.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\ohgcdex.exeC:\Windows\system32\ohgcdex.exe 560 "C:\Windows\SysWOW64\mmdaidi.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\ujoxtbu.exeC:\Windows\system32\ujoxtbu.exe 580 "C:\Windows\SysWOW64\ohgcdex.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2868 -
C:\Windows\SysWOW64\yvhfnlh.exeC:\Windows\system32\yvhfnlh.exe 572 "C:\Windows\SysWOW64\ujoxtbu.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2708 -
C:\Windows\SysWOW64\iyfqaoo.exeC:\Windows\system32\iyfqaoo.exe 584 "C:\Windows\SysWOW64\yvhfnlh.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2748 -
C:\Windows\SysWOW64\tuyahio.exeC:\Windows\system32\tuyahio.exe 568 "C:\Windows\SysWOW64\iyfqaoo.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:888 -
C:\Windows\SysWOW64\abtacyy.exeC:\Windows\system32\abtacyy.exe 500 "C:\Windows\SysWOW64\tuyahio.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1340 -
C:\Windows\SysWOW64\husfzro.exeC:\Windows\system32\husfzro.exe 604 "C:\Windows\SysWOW64\abtacyy.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2912 -
C:\Windows\SysWOW64\prcsidr.exeC:\Windows\system32\prcsidr.exe 592 "C:\Windows\SysWOW64\husfzro.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2828 -
C:\Windows\SysWOW64\cmliogq.exeC:\Windows\system32\cmliogq.exe 588 "C:\Windows\SysWOW64\prcsidr.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\jxsnlay.exeC:\Windows\system32\jxsnlay.exe 460 "C:\Windows\SysWOW64\cmliogq.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\rfgffyh.exeC:\Windows\system32\rfgffyh.exe 600 "C:\Windows\SysWOW64\jxsnlay.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\bagynsi.exeC:\Windows\system32\bagynsi.exe 576 "C:\Windows\SysWOW64\rfgffyh.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2412 -
C:\Windows\SysWOW64\jerdwdt.exeC:\Windows\system32\jerdwdt.exe 612 "C:\Windows\SysWOW64\bagynsi.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2332 -
C:\Windows\SysWOW64\ddhgzba.exeC:\Windows\system32\ddhgzba.exe 432 "C:\Windows\SysWOW64\jerdwdt.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448 -
C:\Windows\SysWOW64\nnwqmeo.exeC:\Windows\system32\nnwqmeo.exe 620 "C:\Windows\SysWOW64\ddhgzba.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:800 -
C:\Windows\SysWOW64\uvkigtq.exeC:\Windows\system32\uvkigtq.exe 624 "C:\Windows\SysWOW64\nnwqmeo.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1828 -
C:\Windows\SysWOW64\hibymxx.exeC:\Windows\system32\hibymxx.exe 636 "C:\Windows\SysWOW64\uvkigtq.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2324 -
C:\Windows\SysWOW64\hppyhmg.exeC:\Windows\system32\hppyhmg.exe 648 "C:\Windows\SysWOW64\hibymxx.exe"33⤵
- Executes dropped EXE
PID:1500 -
C:\Windows\SysWOW64\rambuqm.exeC:\Windows\system32\rambuqm.exe 628 "C:\Windows\SysWOW64\hppyhmg.exe"34⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\SysWOW64\bkcgzgo.exeC:\Windows\system32\bkcgzgo.exe 632 "C:\Windows\SysWOW64\rambuqm.exe"35⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\lvrqujv.exeC:\Windows\system32\lvrqujv.exe 640 "C:\Windows\SysWOW64\bkcgzgo.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:380 -
C:\Windows\SysWOW64\scejgye.exeC:\Windows\system32\scejgye.exe 644 "C:\Windows\SysWOW64\lvrqujv.exe"37⤵
- Executes dropped EXE
PID:440 -
C:\Windows\SysWOW64\nbvljwl.exeC:\Windows\system32\nbvljwl.exe 652 "C:\Windows\SysWOW64\scejgye.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1580 -
C:\Windows\SysWOW64\ptmbbst.exeC:\Windows\system32\ptmbbst.exe 660 "C:\Windows\SysWOW64\nbvljwl.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1116 -
C:\Windows\SysWOW64\zontjmu.exeC:\Windows\system32\zontjmu.exe 656 "C:\Windows\SysWOW64\ptmbbst.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1120 -
C:\Windows\SysWOW64\knzrblb.exeC:\Windows\system32\knzrblb.exe 668 "C:\Windows\SysWOW64\zontjmu.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\uqpbooi.exeC:\Windows\system32\uqpbooi.exe 664 "C:\Windows\SysWOW64\knzrblb.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\gojexwn.exeC:\Windows\system32\gojexwn.exe 672 "C:\Windows\SysWOW64\uqpbooi.exe"43⤵
- Executes dropped EXE
PID:2224 -
C:\Windows\SysWOW64\rnobhvv.exeC:\Windows\system32\rnobhvv.exe 680 "C:\Windows\SysWOW64\gojexwn.exe"44⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\vesodbg.exeC:\Windows\system32\vesodbg.exe 688 "C:\Windows\SysWOW64\rnobhvv.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2024 -
C:\Windows\SysWOW64\irkejff.exeC:\Windows\system32\irkejff.exe 696 "C:\Windows\SysWOW64\vesodbg.exe"46⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\nedmchk.exeC:\Windows\system32\nedmchk.exe 692 "C:\Windows\SysWOW64\irkejff.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2576 -
C:\Windows\SysWOW64\xswjaox.exeC:\Windows\system32\xswjaox.exe 676 "C:\Windows\SysWOW64\nedmchk.exe"48⤵
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\hrihlne.exeC:\Windows\system32\hrihlne.exe 704 "C:\Windows\SysWOW64\xswjaox.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2376 -
C:\Windows\SysWOW64\rmjzshf.exeC:\Windows\system32\rmjzshf.exe 684 "C:\Windows\SysWOW64\hrihlne.exe"50⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\wruzmrs.exeC:\Windows\system32\wruzmrs.exe 720 "C:\Windows\SysWOW64\rmjzshf.exe"51⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\hnvrtmt.exeC:\Windows\system32\hnvrtmt.exe 700 "C:\Windows\SysWOW64\wruzmrs.exe"52⤵
- Executes dropped EXE
PID:2084 -
C:\Windows\SysWOW64\rxlcopz.exeC:\Windows\system32\rxlcopz.exe 708 "C:\Windows\SysWOW64\hnvrtmt.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\aaimcsf.exeC:\Windows\system32\aaimcsf.exe 712 "C:\Windows\SysWOW64\rxlcopz.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\iekrtdq.exeC:\Windows\system32\iekrtdq.exe 732 "C:\Windows\SysWOW64\aaimcsf.exe"55⤵
- Executes dropped EXE
PID:1900 -
C:\Windows\SysWOW64\sdwxdcq.exeC:\Windows\system32\sdwxdcq.exe 728 "C:\Windows\SysWOW64\iekrtdq.exe"56⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\dzphlwy.exeC:\Windows\system32\dzphlwy.exe 436 "C:\Windows\SysWOW64\sdwxdcq.exe"57⤵
- Executes dropped EXE
PID:1948 -
C:\Windows\SysWOW64\ngbfdvg.exeC:\Windows\system32\ngbfdvg.exe 724 "C:\Windows\SysWOW64\dzphlwy.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:528 -
C:\Windows\SysWOW64\uopfqkh.exeC:\Windows\system32\uopfqkh.exe 744 "C:\Windows\SysWOW64\ngbfdvg.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2040 -
C:\Windows\SysWOW64\cvkxkar.exeC:\Windows\system32\cvkxkar.exe 740 "C:\Windows\SysWOW64\uopfqkh.exe"60⤵
- Executes dropped EXE
PID:324 -
C:\Windows\SysWOW64\muouuzy.exeC:\Windows\system32\muouuzy.exe 736 "C:\Windows\SysWOW64\cvkxkar.exe"61⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\ztrxdhe.exeC:\Windows\system32\ztrxdhe.exe 748 "C:\Windows\SysWOW64\muouuzy.exe"62⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\ivhhykk.exeC:\Windows\system32\ivhhykk.exe 752 "C:\Windows\SysWOW64\ztrxdhe.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\wiqxeoj.exeC:\Windows\system32\wiqxeoj.exe 756 "C:\Windows\SysWOW64\ivhhykk.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\gicuonr.exeC:\Windows\system32\gicuonr.exe 764 "C:\Windows\SysWOW64\wiqxeoj.exe"65⤵
- Executes dropped EXE
PID:3000 -
C:\Windows\SysWOW64\qpgszly.exeC:\Windows\system32\qpgszly.exe 760 "C:\Windows\SysWOW64\gicuonr.exe"66⤵PID:2144
-
C:\Windows\SysWOW64\xanfwfg.exeC:\Windows\system32\xanfwfg.exe 768 "C:\Windows\SysWOW64\qpgszly.exe"67⤵PID:2300
-
C:\Windows\SysWOW64\hzrcgeo.exeC:\Windows\system32\hzrcgeo.exe 776 "C:\Windows\SysWOW64\xanfwfg.exe"68⤵PID:2876
-
C:\Windows\SysWOW64\xpdcnnk.exeC:\Windows\system32\xpdcnnk.exe 784 "C:\Windows\SysWOW64\hzrcgeo.exe"69⤵
- Drops file in System32 directory
PID:2436 -
C:\Windows\SysWOW64\kfffwwp.exeC:\Windows\system32\kfffwwp.exe 772 "C:\Windows\SysWOW64\xpdcnnk.exe"70⤵PID:2404
-
C:\Windows\SysWOW64\uekdoux.exeC:\Windows\system32\uekdoux.exe 780 "C:\Windows\SysWOW64\kfffwwp.exe"71⤵
- Drops file in System32 directory
PID:2820 -
C:\Windows\SysWOW64\epznbxd.exeC:\Windows\system32\epznbxd.exe 788 "C:\Windows\SysWOW64\uekdoux.exe"72⤵
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\oolsmwl.exeC:\Windows\system32\oolsmwl.exe 804 "C:\Windows\SysWOW64\epznbxd.exe"73⤵
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\lxtncuq.exeC:\Windows\system32\lxtncuq.exe 796 "C:\Windows\SysWOW64\oolsmwl.exe"74⤵PID:936
-
C:\Windows\SysWOW64\vajypxx.exeC:\Windows\system32\vajypxx.exe 820 "C:\Windows\SysWOW64\lxtncuq.exe"75⤵
- Drops file in System32 directory
PID:768 -
C:\Windows\SysWOW64\iydagfc.exeC:\Windows\system32\iydagfc.exe 792 "C:\Windows\SysWOW64\vajypxx.exe"76⤵
- Drops file in System32 directory
PID:1436 -
C:\Windows\SysWOW64\syqyqek.exeC:\Windows\system32\syqyqek.exe 812 "C:\Windows\SysWOW64\iydagfc.exe"77⤵PID:1612
-
C:\Windows\SysWOW64\zfdqdtt.exeC:\Windows\system32\zfdqdtt.exe 716 "C:\Windows\SysWOW64\syqyqek.exe"78⤵PID:1344
-
C:\Windows\SysWOW64\kepnvst.exeC:\Windows\system32\kepnvst.exe 808 "C:\Windows\SysWOW64\zfdqdtt.exe"79⤵
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\uaigdmc.exeC:\Windows\system32\uaigdmc.exe 816 "C:\Windows\SysWOW64\kepnvst.exe"80⤵
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\ewjqkhc.exeC:\Windows\system32\ewjqkhc.exe 824 "C:\Windows\SysWOW64\uaigdmc.exe"81⤵PID:1044
-
C:\Windows\SysWOW64\okkoioq.exeC:\Windows\system32\okkoioq.exe 828 "C:\Windows\SysWOW64\ewjqkhc.exe"82⤵
- Drops file in System32 directory
PID:844 -
C:\Windows\SysWOW64\woutszs.exeC:\Windows\system32\woutszs.exe 836 "C:\Windows\SysWOW64\okkoioq.exe"83⤵PID:1932
-
C:\Windows\SysWOW64\gnyykya.exeC:\Windows\system32\gnyykya.exe 832 "C:\Windows\SysWOW64\woutszs.exe"84⤵PID:2100
-
C:\Windows\SysWOW64\tapoqcz.exeC:\Windows\system32\tapoqcz.exe 848 "C:\Windows\SysWOW64\gnyykya.exe"85⤵PID:2760
-
C:\Windows\SysWOW64\dzulabg.exeC:\Windows\system32\dzulabg.exe 840 "C:\Windows\SysWOW64\tapoqcz.exe"86⤵PID:2904
-
C:\Windows\SysWOW64\nnujyil.exeC:\Windows\system32\nnujyil.exe 844 "C:\Windows\SysWOW64\dzulabg.exe"87⤵
- Drops file in System32 directory
PID:2196 -
C:\Windows\SysWOW64\xjvtgdu.exeC:\Windows\system32\xjvtgdu.exe 856 "C:\Windows\SysWOW64\nnujyil.exe"88⤵
- Drops file in System32 directory
PID:2460 -
C:\Windows\SysWOW64\hizqqcb.exeC:\Windows\system32\hizqqcb.exe 852 "C:\Windows\SysWOW64\xjvtgdu.exe"89⤵PID:2344
-
C:\Windows\SysWOW64\rspbmfi.exeC:\Windows\system32\rspbmfi.exe 860 "C:\Windows\SysWOW64\hizqqcb.exe"90⤵PID:584
-
C:\Windows\SysWOW64\copltzj.exeC:\Windows\system32\copltzj.exe 876 "C:\Windows\SysWOW64\rspbmfi.exe"91⤵
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\lrfwgup.exeC:\Windows\system32\lrfwgup.exe 864 "C:\Windows\SysWOW64\copltzj.exe"92⤵PID:956
-
C:\Windows\SysWOW64\ypiypcu.exeC:\Windows\system32\ypiypcu.exe 868 "C:\Windows\SysWOW64\lrfwgup.exe"93⤵
- Drops file in System32 directory
PID:2060 -
C:\Windows\SysWOW64\mcrovgt.exeC:\Windows\system32\mcrovgt.exe 872 "C:\Windows\SysWOW64\ypiypcu.exe"94⤵PID:836
-
C:\Windows\SysWOW64\tnqbsaj.exeC:\Windows\system32\tnqbsaj.exe 884 "C:\Windows\SysWOW64\mcrovgt.exe"95⤵PID:952
-
C:\Windows\SysWOW64\djrmzuk.exeC:\Windows\system32\djrmzuk.exe 616 "C:\Windows\SysWOW64\tnqbsaj.exe"96⤵PID:2208
-
C:\Windows\SysWOW64\kuprwot.exeC:\Windows\system32\kuprwot.exe 896 "C:\Windows\SysWOW64\djrmzuk.exe"97⤵PID:1440
-
C:\Windows\SysWOW64\ubcohna.exeC:\Windows\system32\ubcohna.exe 892 "C:\Windows\SysWOW64\kuprwot.exe"98⤵
- Drops file in System32 directory
PID:1040 -
C:\Windows\SysWOW64\eagmzmi.exeC:\Windows\system32\eagmzmi.exe 888 "C:\Windows\SysWOW64\ubcohna.exe"99⤵PID:976
-
C:\Windows\SysWOW64\meqzjfk.exeC:\Windows\system32\meqzjfk.exe 900 "C:\Windows\SysWOW64\eagmzmi.exe"100⤵PID:1276
-
C:\Windows\SysWOW64\xarrqzl.exeC:\Windows\system32\xarrqzl.exe 904 "C:\Windows\SysWOW64\meqzjfk.exe"101⤵
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\gdguluz.exeC:\Windows\system32\gdguluz.exe 908 "C:\Windows\SysWOW64\xarrqzl.exe"102⤵PID:1732
-
C:\Windows\SysWOW64\uqyrryy.exeC:\Windows\system32\uqyrryy.exe 912 "C:\Windows\SysWOW64\gdguluz.exe"103⤵PID:1096
-
C:\Windows\SysWOW64\excpcxg.exeC:\Windows\system32\excpcxg.exe 916 "C:\Windows\SysWOW64\uqyrryy.exe"104⤵
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\iqkpbpq.exeC:\Windows\system32\iqkpbpq.exe 488 "C:\Windows\SysWOW64\excpcxg.exe"105⤵
- Drops file in System32 directory
PID:2604 -
C:\Windows\SysWOW64\qvucsbt.exeC:\Windows\system32\qvucsbt.exe 480 "C:\Windows\SysWOW64\iqkpbpq.exe"106⤵
- Drops file in System32 directory
PID:2612 -
C:\Windows\SysWOW64\fdfczkw.exeC:\Windows\system32\fdfczkw.exe 504 "C:\Windows\SysWOW64\qvucsbt.exe"107⤵
- Drops file in System32 directory
PID:2424 -
C:\Windows\SysWOW64\fvoutfg.exeC:\Windows\system32\fvoutfg.exe 440 "C:\Windows\SysWOW64\fdfczkw.exe"108⤵
- Drops file in System32 directory
PID:1724 -
C:\Windows\SysWOW64\uolpctj.exeC:\Windows\system32\uolpctj.exe 496 "C:\Windows\SysWOW64\fvoutfg.exe"109⤵
- Drops file in System32 directory
PID:2252 -
C:\Windows\SysWOW64\mhorkly.exeC:\Windows\system32\mhorkly.exe 444 "C:\Windows\SysWOW64\uolpctj.exe"110⤵PID:1488
-
C:\Windows\SysWOW64\esbkkiz.exeC:\Windows\system32\esbkkiz.exe 520 "C:\Windows\SysWOW64\mhorkly.exe"111⤵
- Drops file in System32 directory
PID:2320 -
C:\Windows\SysWOW64\wvqulsj.exeC:\Windows\system32\wvqulsj.exe 448 "C:\Windows\SysWOW64\esbkkiz.exe"112⤵
- Drops file in System32 directory
PID:948 -
C:\Windows\SysWOW64\ipwkxfv.exeC:\Windows\system32\ipwkxfv.exe 540 "C:\Windows\SysWOW64\wvqulsj.exe"113⤵
- Drops file in System32 directory
PID:2988 -
C:\Windows\SysWOW64\udkulxx.exeC:\Windows\system32\udkulxx.exe 456 "C:\Windows\SysWOW64\ipwkxfv.exe"114⤵PID:1620
-
C:\Windows\SysWOW64\adonmxo.exeC:\Windows\system32\adonmxo.exe 608 "C:\Windows\SysWOW64\udkulxx.exe"115⤵PID:1516
-
C:\Windows\SysWOW64\vluibzc.exeC:\Windows\system32\vluibzc.exe 468 "C:\Windows\SysWOW64\adonmxo.exe"116⤵PID:2052
-
C:\Windows\SysWOW64\qvyghfa.exeC:\Windows\system32\qvyghfa.exe 880 "C:\Windows\SysWOW64\vluibzc.exe"117⤵PID:2732
-
C:\Windows\SysWOW64\frfvfax.exeC:\Windows\system32\frfvfax.exe 472 "C:\Windows\SysWOW64\qvyghfa.exe"118⤵PID:1688
-
C:\Windows\SysWOW64\xovbpce.exeC:\Windows\system32\xovbpce.exe 924 "C:\Windows\SysWOW64\frfvfax.exe"119⤵PID:612
-
C:\Windows\SysWOW64\fjtlkhz.exeC:\Windows\system32\fjtlkhz.exe 484 "C:\Windows\SysWOW64\xovbpce.exe"120⤵PID:3012
-
C:\Windows\SysWOW64\hewofag.exeC:\Windows\system32\hewofag.exe 932 "C:\Windows\SysWOW64\fjtlkhz.exe"121⤵PID:2784
-
C:\Windows\SysWOW64\unzjiuv.exeC:\Windows\system32\unzjiuv.exe 508 "C:\Windows\SysWOW64\hewofag.exe"122⤵PID:2268
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-