Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 11:51
Static task
static1
Behavioral task
behavioral1
Sample
fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe
-
Size
102KB
-
MD5
fcb5695a58313c7c0341bd5a6a0e8bf7
-
SHA1
cc791671160e423aa7845566fdfe0e6c792401f5
-
SHA256
4c16edebd158f250b0fba02dce4f49fa9126e95139016e65b96642f2323930db
-
SHA512
64c9bf3ff64b15baed32ee60c53cbbadd69a29176176e7cc94eb932c93a8bdc8062f4d6daca95797dfd4cd8861905700439ed077bff01545f0c1e39dafd1c321
-
SSDEEP
3072:zDlFYy7UFiiL5/GJCj1GYsyKnuADfzRUlbt3Tzq7h6l:PB7Ur+bYs/uAPe3P/
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
Detect Lumma Stealer payload V4 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2152-10-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/772-16-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3032-20-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4812-24-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/772-25-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4812-33-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4120-39-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4180-46-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2764-53-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4000-60-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4348-66-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4448-72-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3488-79-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/1480-86-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/1520-87-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3536-93-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/1480-95-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3536-101-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4016-107-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4924-114-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2568-120-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2660-121-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4480-127-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2568-128-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4480-134-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4888-140-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4300-141-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3732-147-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4888-150-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3732-155-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4784-162-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/1168-170-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/968-178-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2088-181-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4864-183-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2088-190-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2656-196-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/748-203-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3120-210-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4132-216-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/1468-222-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4804-226-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3548-228-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4804-232-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3972-236-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2964-240-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4524-245-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3292-249-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/5092-254-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4008-259-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4056-260-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4008-266-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3464-270-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2352-274-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/1772-278-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2312-279-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/1772-283-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3344-287-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/1336-288-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3344-292-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2172-296-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/4052-297-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/2172-302-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 behavioral2/memory/3796-309-0x0000000000400000-0x00000000004E7000-memory.dmp family_lumma_v4 -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
Processes:
exuxfaw.exersmnkwv.execonfsqw.exemrchftc.exezaisqtc.exejdyddwi.exewyhsjah.exejlzipeo.exewyqyvzn.exegagiidt.exerwzayxu.exehihvckz.exeuzcykkw.exehmtoqov.exertxlanc.exeeueodnc.exertgrmvi.exeejbtvvg.exerwtjazm.exezmgjvoo.exeousjcgr.exechjhhcq.exejltmrvb.exezbfuyew.exejxgenzx.exewrmuzlk.exejasxclc.exewznaklh.exegyrfvkp.exetouadsu.exehyakgrm.exeuwvnprs.exehjeddvq.exeriranuy.exebhvyxtg.exerudtbgc.exetthqmxk.exejxplqkh.exetwtqijo.exegrlgonn.exerrpdymv.exeeehteht.exerrqjkls.exebqcguka.exercdbyxw.exebyduosx.exeosjbzwb.exebbqmcwb.exeoalpleh.exeyzxmvdp.exejrmsatj.exewhhurto.exegdifyvp.exetfoukat.exegouxnzt.exeqrkiadz.exehshqbdx.exerzlnmcf.exeemcdzge.exerdxfioj.exeeqpdosi.exeoaegbno.exebkkqeno.exeoaftnvu.exepid process 3032 exuxfaw.exe 772 rsmnkwv.exe 4812 confsqw.exe 4120 mrchftc.exe 4180 zaisqtc.exe 2764 jdyddwi.exe 4000 wyhsjah.exe 4348 jlzipeo.exe 4448 wyqyvzn.exe 3488 gagiidt.exe 1520 rwzayxu.exe 1480 hihvckz.exe 3536 uzcykkw.exe 4016 hmtoqov.exe 4924 rtxlanc.exe 2660 eueodnc.exe 2568 rtgrmvi.exe 4480 ejbtvvg.exe 4300 rwtjazm.exe 4888 zmgjvoo.exe 3732 ousjcgr.exe 4784 chjhhcq.exe 1168 jltmrvb.exe 968 zbfuyew.exe 4864 jxgenzx.exe 2088 wrmuzlk.exe 2656 jasxclc.exe 748 wznaklh.exe 3120 gyrfvkp.exe 4132 touadsu.exe 1468 hyakgrm.exe 3548 uwvnprs.exe 4804 hjeddvq.exe 3972 riranuy.exe 2964 bhvyxtg.exe 4524 rudtbgc.exe 3292 tthqmxk.exe 5092 jxplqkh.exe 4056 twtqijo.exe 4008 grlgonn.exe 3464 rrpdymv.exe 2352 eehteht.exe 2312 rrqjkls.exe 1772 bqcguka.exe 1336 rcdbyxw.exe 3344 byduosx.exe 4052 osjbzwb.exe 2172 bbqmcwb.exe 3796 oalpleh.exe 1864 yzxmvdp.exe 4032 jrmsatj.exe 636 whhurto.exe 3076 gdifyvp.exe 2136 tfoukat.exe 1044 gouxnzt.exe 4640 qrkiadz.exe 3460 hshqbdx.exe 4420 rzlnmcf.exe 5008 emcdzge.exe 1428 rdxfioj.exe 3668 eqpdosi.exe 1248 oaegbno.exe 1768 bkkqeno.exe 4736 oaftnvu.exe -
Drops file in System32 directory 64 IoCs
Processes:
wrmuzlk.exeoaegbno.exeblgvfqf.exehrbwtmd.exeklengbe.exeptlrfnu.exeltdekmy.exeyiplgms.exebjgwrsx.exemzbfplz.exeschpwpn.exejezxqle.exernzfvcy.exegfpnpxx.exeqjushfj.exemjzxhwy.exewyhsjah.exevmuzlqz.exervddtgk.exetdnqmqj.exeluatlxq.exeltasijp.exegcicdro.exefguhfoa.exejgkfvfs.exelkahjji.exeygvhbqv.exeehgnqjo.exebpymmlk.exexrtwspg.exensbcjhl.exewuuxvse.exesoehcxu.exevcobnoo.exeexavyqh.exevfvuelr.exedkrqyxm.exeaoxdcng.exeesuyecs.exebbfqfka.exeoalpleh.exeylwjtyy.exeqbmanqo.exeokgfojd.exeuotybel.exetelxfbj.exenfxrttc.exeafsneln.exeowylxwe.exeuzcykkw.exedtwshwc.exeizcbfub.exembvwxht.exemzxfuis.exeuicqglg.exejrixnya.exelubglya.exerqmvynf.exeolkoxku.exewyqyvzn.exegyrfvkp.exemqopraf.exeeivtyci.exeonrzkdh.exedescription ioc process File created C:\Windows\SysWOW64\jasxclc.exe wrmuzlk.exe File opened for modification C:\Windows\SysWOW64\bkkqeno.exe oaegbno.exe File created C:\Windows\SysWOW64\oyxllte.exe blgvfqf.exe File created C:\Windows\SysWOW64\vmtlzqc.exe hrbwtmd.exe File created C:\Windows\SysWOW64\uotybel.exe klengbe.exe File opened for modification C:\Windows\SysWOW64\cgdhljt.exe ptlrfnu.exe File opened for modification C:\Windows\SysWOW64\ygmcqqx.exe ltdekmy.exe File created C:\Windows\SysWOW64\lvgbmqq.exe yiplgms.exe File created C:\Windows\SysWOW64\owylxwe.exe bjgwrsx.exe File opened for modification C:\Windows\SysWOW64\zmlvvoy.exe mzbfplz.exe File opened for modification C:\Windows\SysWOW64\gpqmctm.exe schpwpn.exe File created C:\Windows\SysWOW64\wrjmwoc.exe jezxqle.exe File opened for modification C:\Windows\SysWOW64\bmldgbx.exe rnzfvcy.exe File created C:\Windows\SysWOW64\tsycvbw.exe gfpnpxx.exe File opened for modification C:\Windows\SysWOW64\dweinbq.exe qjushfj.exe File opened for modification C:\Windows\SysWOW64\wmpiuzm.exe mjzxhwy.exe File opened for modification C:\Windows\SysWOW64\jlzipeo.exe wyhsjah.exe File opened for modification C:\Windows\SysWOW64\flywvph.exe vmuzlqz.exe File created C:\Windows\SysWOW64\eivtyci.exe rvddtgk.exe File created C:\Windows\SysWOW64\guituyp.exe tdnqmqj.exe File created C:\Windows\SysWOW64\vtnrvwy.exe luatlxq.exe File created C:\Windows\SysWOW64\zgshono.exe ltasijp.exe File opened for modification C:\Windows\SysWOW64\qbmanqo.exe gcicdro.exe File opened for modification C:\Windows\SysWOW64\pfyepnz.exe fguhfoa.exe File opened for modification C:\Windows\SysWOW64\wttvbjr.exe jgkfvfs.exe File created C:\Windows\SysWOW64\yxrxpng.exe lkahjji.exe File opened for modification C:\Windows\SysWOW64\iqlsxtj.exe ygvhbqv.exe File opened for modification C:\Windows\SysWOW64\rgaqzsl.exe ehgnqjo.exe File created C:\Windows\SysWOW64\ocqbrpj.exe bpymmlk.exe File created C:\Windows\SysWOW64\keclytf.exe xrtwspg.exe File opened for modification C:\Windows\SysWOW64\aftsplk.exe nsbcjhl.exe File opened for modification C:\Windows\SysWOW64\jhenbwl.exe wuuxvse.exe File opened for modification C:\Windows\SysWOW64\iobpdgs.exe soehcxu.exe File created C:\Windows\SysWOW64\ipyqtsm.exe vcobnoo.exe File created C:\Windows\SysWOW64\ugwdazx.exe exavyqh.exe File created C:\Windows\SysWOW64\iankkop.exe vfvuelr.exe File opened for modification C:\Windows\SysWOW64\qjushfj.exe dkrqyxm.exe File opened for modification C:\Windows\SysWOW64\krmnxrn.exe aoxdcng.exe File created C:\Windows\SysWOW64\sbtbpcs.exe esuyecs.exe File created C:\Windows\SysWOW64\ooxgloz.exe bbfqfka.exe File opened for modification C:\Windows\SysWOW64\yzxmvdp.exe oalpleh.exe File opened for modification C:\Windows\SysWOW64\mynyzcf.exe ylwjtyy.exe File created C:\Windows\SysWOW64\daocwyt.exe qbmanqo.exe File created C:\Windows\SysWOW64\bxyvunb.exe okgfojd.exe File created C:\Windows\SysWOW64\hbdohij.exe uotybel.exe File opened for modification C:\Windows\SysWOW64\gvoavjp.exe telxfbj.exe File opened for modification C:\Windows\SysWOW64\asooyxb.exe nfxrttc.exe File opened for modification C:\Windows\SysWOW64\nsbcjhl.exe afsneln.exe File created C:\Windows\SysWOW64\yznwkzk.exe owylxwe.exe File opened for modification C:\Windows\SysWOW64\hmtoqov.exe uzcykkw.exe File created C:\Windows\SysWOW64\nvldczi.exe dtwshwc.exe File created C:\Windows\SysWOW64\vmuzlqz.exe izcbfub.exe File opened for modification C:\Windows\SysWOW64\zonmdls.exe mbvwxht.exe File created C:\Windows\SysWOW64\zmhvzmr.exe mzxfuis.exe File opened for modification C:\Windows\SysWOW64\ehgnqjo.exe uicqglg.exe File opened for modification C:\Windows\SysWOW64\weantuy.exe jrixnya.exe File opened for modification C:\Windows\SysWOW64\ylwjtyy.exe lubglya.exe File opened for modification C:\Windows\SysWOW64\bsbgtil.exe rqmvynf.exe File opened for modification C:\Windows\SysWOW64\bbfqfka.exe olkoxku.exe File created C:\Windows\SysWOW64\gagiidt.exe wyqyvzn.exe File opened for modification C:\Windows\SysWOW64\touadsu.exe gyrfvkp.exe File created C:\Windows\SysWOW64\zzusuaf.exe mqopraf.exe File opened for modification C:\Windows\SysWOW64\rdfregh.exe eivtyci.exe File created C:\Windows\SysWOW64\bxxbndz.exe onrzkdh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exeexuxfaw.exersmnkwv.execonfsqw.exemrchftc.exezaisqtc.exejdyddwi.exewyhsjah.exejlzipeo.exewyqyvzn.exegagiidt.exerwzayxu.exehihvckz.exeuzcykkw.exehmtoqov.exertxlanc.exeeueodnc.exertgrmvi.exeejbtvvg.exerwtjazm.exezmgjvoo.exeousjcgr.exedescription pid process target process PID 2152 wrote to memory of 3032 2152 fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe exuxfaw.exe PID 2152 wrote to memory of 3032 2152 fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe exuxfaw.exe PID 2152 wrote to memory of 3032 2152 fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe exuxfaw.exe PID 3032 wrote to memory of 772 3032 exuxfaw.exe rsmnkwv.exe PID 3032 wrote to memory of 772 3032 exuxfaw.exe rsmnkwv.exe PID 3032 wrote to memory of 772 3032 exuxfaw.exe rsmnkwv.exe PID 772 wrote to memory of 4812 772 rsmnkwv.exe confsqw.exe PID 772 wrote to memory of 4812 772 rsmnkwv.exe confsqw.exe PID 772 wrote to memory of 4812 772 rsmnkwv.exe confsqw.exe PID 4812 wrote to memory of 4120 4812 confsqw.exe mrchftc.exe PID 4812 wrote to memory of 4120 4812 confsqw.exe mrchftc.exe PID 4812 wrote to memory of 4120 4812 confsqw.exe mrchftc.exe PID 4120 wrote to memory of 4180 4120 mrchftc.exe zaisqtc.exe PID 4120 wrote to memory of 4180 4120 mrchftc.exe zaisqtc.exe PID 4120 wrote to memory of 4180 4120 mrchftc.exe zaisqtc.exe PID 4180 wrote to memory of 2764 4180 zaisqtc.exe jdyddwi.exe PID 4180 wrote to memory of 2764 4180 zaisqtc.exe jdyddwi.exe PID 4180 wrote to memory of 2764 4180 zaisqtc.exe jdyddwi.exe PID 2764 wrote to memory of 4000 2764 jdyddwi.exe wyhsjah.exe PID 2764 wrote to memory of 4000 2764 jdyddwi.exe wyhsjah.exe PID 2764 wrote to memory of 4000 2764 jdyddwi.exe wyhsjah.exe PID 4000 wrote to memory of 4348 4000 wyhsjah.exe jlzipeo.exe PID 4000 wrote to memory of 4348 4000 wyhsjah.exe jlzipeo.exe PID 4000 wrote to memory of 4348 4000 wyhsjah.exe jlzipeo.exe PID 4348 wrote to memory of 4448 4348 jlzipeo.exe wyqyvzn.exe PID 4348 wrote to memory of 4448 4348 jlzipeo.exe wyqyvzn.exe PID 4348 wrote to memory of 4448 4348 jlzipeo.exe wyqyvzn.exe PID 4448 wrote to memory of 3488 4448 wyqyvzn.exe gagiidt.exe PID 4448 wrote to memory of 3488 4448 wyqyvzn.exe gagiidt.exe PID 4448 wrote to memory of 3488 4448 wyqyvzn.exe gagiidt.exe PID 3488 wrote to memory of 1520 3488 gagiidt.exe rwzayxu.exe PID 3488 wrote to memory of 1520 3488 gagiidt.exe rwzayxu.exe PID 3488 wrote to memory of 1520 3488 gagiidt.exe rwzayxu.exe PID 1520 wrote to memory of 1480 1520 rwzayxu.exe hihvckz.exe PID 1520 wrote to memory of 1480 1520 rwzayxu.exe hihvckz.exe PID 1520 wrote to memory of 1480 1520 rwzayxu.exe hihvckz.exe PID 1480 wrote to memory of 3536 1480 hihvckz.exe uzcykkw.exe PID 1480 wrote to memory of 3536 1480 hihvckz.exe uzcykkw.exe PID 1480 wrote to memory of 3536 1480 hihvckz.exe uzcykkw.exe PID 3536 wrote to memory of 4016 3536 uzcykkw.exe hmtoqov.exe PID 3536 wrote to memory of 4016 3536 uzcykkw.exe hmtoqov.exe PID 3536 wrote to memory of 4016 3536 uzcykkw.exe hmtoqov.exe PID 4016 wrote to memory of 4924 4016 hmtoqov.exe rtxlanc.exe PID 4016 wrote to memory of 4924 4016 hmtoqov.exe rtxlanc.exe PID 4016 wrote to memory of 4924 4016 hmtoqov.exe rtxlanc.exe PID 4924 wrote to memory of 2660 4924 rtxlanc.exe eueodnc.exe PID 4924 wrote to memory of 2660 4924 rtxlanc.exe eueodnc.exe PID 4924 wrote to memory of 2660 4924 rtxlanc.exe eueodnc.exe PID 2660 wrote to memory of 2568 2660 eueodnc.exe rtgrmvi.exe PID 2660 wrote to memory of 2568 2660 eueodnc.exe rtgrmvi.exe PID 2660 wrote to memory of 2568 2660 eueodnc.exe rtgrmvi.exe PID 2568 wrote to memory of 4480 2568 rtgrmvi.exe ejbtvvg.exe PID 2568 wrote to memory of 4480 2568 rtgrmvi.exe ejbtvvg.exe PID 2568 wrote to memory of 4480 2568 rtgrmvi.exe ejbtvvg.exe PID 4480 wrote to memory of 4300 4480 ejbtvvg.exe rwtjazm.exe PID 4480 wrote to memory of 4300 4480 ejbtvvg.exe rwtjazm.exe PID 4480 wrote to memory of 4300 4480 ejbtvvg.exe rwtjazm.exe PID 4300 wrote to memory of 4888 4300 rwtjazm.exe zmgjvoo.exe PID 4300 wrote to memory of 4888 4300 rwtjazm.exe zmgjvoo.exe PID 4300 wrote to memory of 4888 4300 rwtjazm.exe zmgjvoo.exe PID 4888 wrote to memory of 3732 4888 zmgjvoo.exe ousjcgr.exe PID 4888 wrote to memory of 3732 4888 zmgjvoo.exe ousjcgr.exe PID 4888 wrote to memory of 3732 4888 zmgjvoo.exe ousjcgr.exe PID 3732 wrote to memory of 4784 3732 ousjcgr.exe chjhhcq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\exuxfaw.exeC:\Windows\system32\exuxfaw.exe 1168 "C:\Users\Admin\AppData\Local\Temp\fcb5695a58313c7c0341bd5a6a0e8bf7_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\rsmnkwv.exeC:\Windows\system32\rsmnkwv.exe 1128 "C:\Windows\SysWOW64\exuxfaw.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\confsqw.exeC:\Windows\system32\confsqw.exe 1132 "C:\Windows\SysWOW64\rsmnkwv.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\mrchftc.exeC:\Windows\system32\mrchftc.exe 1124 "C:\Windows\SysWOW64\confsqw.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\zaisqtc.exeC:\Windows\system32\zaisqtc.exe 1136 "C:\Windows\SysWOW64\mrchftc.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\jdyddwi.exeC:\Windows\system32\jdyddwi.exe 1144 "C:\Windows\SysWOW64\zaisqtc.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\wyhsjah.exeC:\Windows\system32\wyhsjah.exe 1148 "C:\Windows\SysWOW64\jdyddwi.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\jlzipeo.exeC:\Windows\system32\jlzipeo.exe 1152 "C:\Windows\SysWOW64\wyhsjah.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\wyqyvzn.exeC:\Windows\system32\wyqyvzn.exe 1140 "C:\Windows\SysWOW64\jlzipeo.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\gagiidt.exeC:\Windows\system32\gagiidt.exe 1156 "C:\Windows\SysWOW64\wyqyvzn.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\rwzayxu.exeC:\Windows\system32\rwzayxu.exe 1160 "C:\Windows\SysWOW64\gagiidt.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\hihvckz.exeC:\Windows\system32\hihvckz.exe 1116 "C:\Windows\SysWOW64\rwzayxu.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\uzcykkw.exeC:\Windows\system32\uzcykkw.exe 1176 "C:\Windows\SysWOW64\hihvckz.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\hmtoqov.exeC:\Windows\system32\hmtoqov.exe 1088 "C:\Windows\SysWOW64\uzcykkw.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\rtxlanc.exeC:\Windows\system32\rtxlanc.exe 1184 "C:\Windows\SysWOW64\hmtoqov.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\eueodnc.exeC:\Windows\system32\eueodnc.exe 1188 "C:\Windows\SysWOW64\rtxlanc.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\rtgrmvi.exeC:\Windows\system32\rtgrmvi.exe 1192 "C:\Windows\SysWOW64\eueodnc.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\ejbtvvg.exeC:\Windows\system32\ejbtvvg.exe 1180 "C:\Windows\SysWOW64\rtgrmvi.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\rwtjazm.exeC:\Windows\system32\rwtjazm.exe 1204 "C:\Windows\SysWOW64\ejbtvvg.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\zmgjvoo.exeC:\Windows\system32\zmgjvoo.exe 1196 "C:\Windows\SysWOW64\rwtjazm.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\ousjcgr.exeC:\Windows\system32\ousjcgr.exe 1208 "C:\Windows\SysWOW64\zmgjvoo.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\chjhhcq.exeC:\Windows\system32\chjhhcq.exe 1200 "C:\Windows\SysWOW64\ousjcgr.exe"23⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\jltmrvb.exeC:\Windows\system32\jltmrvb.exe 1216 "C:\Windows\SysWOW64\chjhhcq.exe"24⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\SysWOW64\zbfuyew.exeC:\Windows\system32\zbfuyew.exe 1220 "C:\Windows\SysWOW64\jltmrvb.exe"25⤵
- Executes dropped EXE
PID:968 -
C:\Windows\SysWOW64\jxgenzx.exeC:\Windows\system32\jxgenzx.exe 1212 "C:\Windows\SysWOW64\zbfuyew.exe"26⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\wrmuzlk.exeC:\Windows\system32\wrmuzlk.exe 1228 "C:\Windows\SysWOW64\jxgenzx.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2088 -
C:\Windows\SysWOW64\jasxclc.exeC:\Windows\system32\jasxclc.exe 1232 "C:\Windows\SysWOW64\wrmuzlk.exe"28⤵
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\wznaklh.exeC:\Windows\system32\wznaklh.exe 1236 "C:\Windows\SysWOW64\jasxclc.exe"29⤵
- Executes dropped EXE
PID:748 -
C:\Windows\SysWOW64\gyrfvkp.exeC:\Windows\system32\gyrfvkp.exe 1224 "C:\Windows\SysWOW64\wznaklh.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3120 -
C:\Windows\SysWOW64\touadsu.exeC:\Windows\system32\touadsu.exe 1240 "C:\Windows\SysWOW64\gyrfvkp.exe"31⤵
- Executes dropped EXE
PID:4132 -
C:\Windows\SysWOW64\hyakgrm.exeC:\Windows\system32\hyakgrm.exe 1252 "C:\Windows\SysWOW64\touadsu.exe"32⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\uwvnprs.exeC:\Windows\system32\uwvnprs.exe 1164 "C:\Windows\SysWOW64\hyakgrm.exe"33⤵
- Executes dropped EXE
PID:3548 -
C:\Windows\SysWOW64\hjeddvq.exeC:\Windows\system32\hjeddvq.exe 1256 "C:\Windows\SysWOW64\uwvnprs.exe"34⤵
- Executes dropped EXE
PID:4804 -
C:\Windows\SysWOW64\riranuy.exeC:\Windows\system32\riranuy.exe 1260 "C:\Windows\SysWOW64\hjeddvq.exe"35⤵
- Executes dropped EXE
PID:3972 -
C:\Windows\SysWOW64\bhvyxtg.exeC:\Windows\system32\bhvyxtg.exe 1264 "C:\Windows\SysWOW64\riranuy.exe"36⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\rudtbgc.exeC:\Windows\system32\rudtbgc.exe 1244 "C:\Windows\SysWOW64\bhvyxtg.exe"37⤵
- Executes dropped EXE
PID:4524 -
C:\Windows\SysWOW64\tthqmxk.exeC:\Windows\system32\tthqmxk.exe 1272 "C:\Windows\SysWOW64\rudtbgc.exe"38⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\SysWOW64\jxplqkh.exeC:\Windows\system32\jxplqkh.exe 1276 "C:\Windows\SysWOW64\tthqmxk.exe"39⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\twtqijo.exeC:\Windows\system32\twtqijo.exe 1280 "C:\Windows\SysWOW64\jxplqkh.exe"40⤵
- Executes dropped EXE
PID:4056 -
C:\Windows\SysWOW64\grlgonn.exeC:\Windows\system32\grlgonn.exe 1064 "C:\Windows\SysWOW64\twtqijo.exe"41⤵
- Executes dropped EXE
PID:4008 -
C:\Windows\SysWOW64\rrpdymv.exeC:\Windows\system32\rrpdymv.exe 1288 "C:\Windows\SysWOW64\grlgonn.exe"42⤵
- Executes dropped EXE
PID:3464 -
C:\Windows\SysWOW64\eehteht.exeC:\Windows\system32\eehteht.exe 1248 "C:\Windows\SysWOW64\rrpdymv.exe"43⤵
- Executes dropped EXE
PID:2352 -
C:\Windows\SysWOW64\rrqjkls.exeC:\Windows\system32\rrqjkls.exe 1296 "C:\Windows\SysWOW64\eehteht.exe"44⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\bqcguka.exeC:\Windows\system32\bqcguka.exe 1284 "C:\Windows\SysWOW64\rrqjkls.exe"45⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\rcdbyxw.exeC:\Windows\system32\rcdbyxw.exe 1292 "C:\Windows\SysWOW64\bqcguka.exe"46⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\byduosx.exeC:\Windows\system32\byduosx.exe 1308 "C:\Windows\SysWOW64\rcdbyxw.exe"47⤵
- Executes dropped EXE
PID:3344 -
C:\Windows\SysWOW64\osjbzwb.exeC:\Windows\system32\osjbzwb.exe 1304 "C:\Windows\SysWOW64\byduosx.exe"48⤵
- Executes dropped EXE
PID:4052 -
C:\Windows\SysWOW64\bbqmcwb.exeC:\Windows\system32\bbqmcwb.exe 1312 "C:\Windows\SysWOW64\osjbzwb.exe"49⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\oalpleh.exeC:\Windows\system32\oalpleh.exe 1320 "C:\Windows\SysWOW64\bbqmcwb.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3796 -
C:\Windows\SysWOW64\yzxmvdp.exeC:\Windows\system32\yzxmvdp.exe 1316 "C:\Windows\SysWOW64\oalpleh.exe"51⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\jrmsatj.exeC:\Windows\system32\jrmsatj.exe 1324 "C:\Windows\SysWOW64\yzxmvdp.exe"52⤵
- Executes dropped EXE
PID:4032 -
C:\Windows\SysWOW64\whhurto.exeC:\Windows\system32\whhurto.exe 1328 "C:\Windows\SysWOW64\jrmsatj.exe"53⤵
- Executes dropped EXE
PID:636 -
C:\Windows\SysWOW64\gdifyvp.exeC:\Windows\system32\gdifyvp.exe 1300 "C:\Windows\SysWOW64\whhurto.exe"54⤵
- Executes dropped EXE
PID:3076 -
C:\Windows\SysWOW64\tfoukat.exeC:\Windows\system32\tfoukat.exe 1340 "C:\Windows\SysWOW64\gdifyvp.exe"55⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\SysWOW64\gouxnzt.exeC:\Windows\system32\gouxnzt.exe 1344 "C:\Windows\SysWOW64\tfoukat.exe"56⤵
- Executes dropped EXE
PID:1044 -
C:\Windows\SysWOW64\qrkiadz.exeC:\Windows\system32\qrkiadz.exe 1348 "C:\Windows\SysWOW64\gouxnzt.exe"57⤵
- Executes dropped EXE
PID:4640 -
C:\Windows\SysWOW64\hshqbdx.exeC:\Windows\system32\hshqbdx.exe 1268 "C:\Windows\SysWOW64\qrkiadz.exe"58⤵
- Executes dropped EXE
PID:3460 -
C:\Windows\SysWOW64\rzlnmcf.exeC:\Windows\system32\rzlnmcf.exe 1352 "C:\Windows\SysWOW64\hshqbdx.exe"59⤵
- Executes dropped EXE
PID:4420 -
C:\Windows\SysWOW64\emcdzge.exeC:\Windows\system32\emcdzge.exe 1356 "C:\Windows\SysWOW64\rzlnmcf.exe"60⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\rdxfioj.exeC:\Windows\system32\rdxfioj.exe 1044 "C:\Windows\SysWOW64\emcdzge.exe"61⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\SysWOW64\eqpdosi.exeC:\Windows\system32\eqpdosi.exe 1360 "C:\Windows\SysWOW64\rdxfioj.exe"62⤵
- Executes dropped EXE
PID:3668 -
C:\Windows\SysWOW64\oaegbno.exeC:\Windows\system32\oaegbno.exe 1368 "C:\Windows\SysWOW64\eqpdosi.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1248 -
C:\Windows\SysWOW64\bkkqeno.exeC:\Windows\system32\bkkqeno.exe 1372 "C:\Windows\SysWOW64\oaegbno.exe"64⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\oaftnvu.exeC:\Windows\system32\oaftnvu.exe 1376 "C:\Windows\SysWOW64\bkkqeno.exe"65⤵
- Executes dropped EXE
PID:4736 -
C:\Windows\SysWOW64\bnxjszt.exeC:\Windows\system32\bnxjszt.exe 1384 "C:\Windows\SysWOW64\oaftnvu.exe"66⤵PID:4044
-
C:\Windows\SysWOW64\lubglya.exeC:\Windows\system32\lubglya.exe 1052 "C:\Windows\SysWOW64\bnxjszt.exe"67⤵
- Drops file in System32 directory
PID:792 -
C:\Windows\SysWOW64\ylwjtyy.exeC:\Windows\system32\ylwjtyy.exe 1392 "C:\Windows\SysWOW64\lubglya.exe"68⤵
- Drops file in System32 directory
PID:3880 -
C:\Windows\SysWOW64\mynyzcf.exeC:\Windows\system32\mynyzcf.exe 1396 "C:\Windows\SysWOW64\ylwjtyy.exe"69⤵PID:2164
-
C:\Windows\SysWOW64\zlfoffd.exeC:\Windows\system32\zlfoffd.exe 1388 "C:\Windows\SysWOW64\mynyzcf.exe"70⤵PID:2492
-
C:\Windows\SysWOW64\jvuzsik.exeC:\Windows\system32\jvuzsik.exe 1404 "C:\Windows\SysWOW64\zlfoffd.exe"71⤵PID:4764
-
C:\Windows\SysWOW64\wiewyei.exeC:\Windows\system32\wiewyei.exe 1408 "C:\Windows\SysWOW64\jvuzsik.exe"72⤵PID:428
-
C:\Windows\SysWOW64\ghqurdq.exeC:\Windows\system32\ghqurdq.exe 1412 "C:\Windows\SysWOW64\wiewyei.exe"73⤵PID:2028
-
C:\Windows\SysWOW64\winckmo.exeC:\Windows\system32\winckmo.exe 1080 "C:\Windows\SysWOW64\ghqurdq.exe"74⤵PID:4520
-
C:\Windows\SysWOW64\gtcmfpu.exeC:\Windows\system32\gtcmfpu.exe 1400 "C:\Windows\SysWOW64\winckmo.exe"75⤵PID:872
-
C:\Windows\SysWOW64\tgmcltt.exeC:\Windows\system32\tgmcltt.exe 1420 "C:\Windows\SysWOW64\gtcmfpu.exe"76⤵PID:1344
-
C:\Windows\SysWOW64\gtdrrps.exeC:\Windows\system32\gtdrrps.exe 1424 "C:\Windows\SysWOW64\tgmcltt.exe"77⤵PID:8
-
C:\Windows\SysWOW64\tgvhwtz.exeC:\Windows\system32\tgvhwtz.exe 1428 "C:\Windows\SysWOW64\gtdrrps.exe"78⤵PID:2648
-
C:\Windows\SysWOW64\enzfhry.exeC:\Windows\system32\enzfhry.exe 1432 "C:\Windows\SysWOW64\tgvhwtz.exe"79⤵PID:1016
-
C:\Windows\SysWOW64\rduhpae.exeC:\Windows\system32\rduhpae.exe 1436 "C:\Windows\SysWOW64\enzfhry.exe"80⤵PID:1484
-
C:\Windows\SysWOW64\eqlfddc.exeC:\Windows\system32\eqlfddc.exe 1448 "C:\Windows\SysWOW64\rduhpae.exe"81⤵PID:816
-
C:\Windows\SysWOW64\oqpcouk.exeC:\Windows\system32\oqpcouk.exe 1452 "C:\Windows\SysWOW64\eqlfddc.exe"82⤵PID:4244
-
C:\Windows\SysWOW64\bosfwcq.exeC:\Windows\system32\bosfwcq.exe 1444 "C:\Windows\SysWOW64\oqpcouk.exe"83⤵PID:1204
-
C:\Windows\SysWOW64\gbcvcgo.exeC:\Windows\system32\gbcvcgo.exe 1440 "C:\Windows\SysWOW64\bosfwcq.exe"84⤵PID:2880
-
C:\Windows\SysWOW64\totlikn.exeC:\Windows\system32\totlikn.exe 1460 "C:\Windows\SysWOW64\gbcvcgo.exe"85⤵PID:4304
-
C:\Windows\SysWOW64\gblaogm.exeC:\Windows\system32\gblaogm.exe 1464 "C:\Windows\SysWOW64\totlikn.exe"86⤵PID:3680
-
C:\Windows\SysWOW64\qmaljja.exeC:\Windows\system32\qmaljja.exe 1380 "C:\Windows\SysWOW64\gblaogm.exe"87⤵PID:4224
-
C:\Windows\SysWOW64\dzkapnz.exeC:\Windows\system32\dzkapnz.exe 1416 "C:\Windows\SysWOW64\qmaljja.exe"88⤵PID:2848
-
C:\Windows\SysWOW64\qmbqury.exeC:\Windows\system32\qmbqury.exe 1472 "C:\Windows\SysWOW64\dzkapnz.exe"89⤵PID:1612
-
C:\Windows\SysWOW64\blgvfqf.exeC:\Windows\system32\blgvfqf.exe 1476 "C:\Windows\SysWOW64\qmbqury.exe"90⤵
- Drops file in System32 directory
PID:2696 -
C:\Windows\SysWOW64\oyxllte.exeC:\Windows\system32\oyxllte.exe 1480 "C:\Windows\SysWOW64\blgvfqf.exe"91⤵PID:4836
-
C:\Windows\SysWOW64\bwsotuk.exeC:\Windows\system32\bwsotuk.exe 1484 "C:\Windows\SysWOW64\oyxllte.exe"92⤵PID:1448
-
C:\Windows\SysWOW64\ojjezxi.exeC:\Windows\system32\ojjezxi.exe 1488 "C:\Windows\SysWOW64\bwsotuk.exe"93⤵PID:4084
-
C:\Windows\SysWOW64\bwttfbh.exeC:\Windows\system32\bwttfbh.exe 1496 "C:\Windows\SysWOW64\ojjezxi.exe"94⤵PID:3092
-
C:\Windows\SysWOW64\lhqeaen.exeC:\Windows\system32\lhqeaen.exe 1500 "C:\Windows\SysWOW64\bwttfbh.exe"95⤵PID:392
-
C:\Windows\SysWOW64\yuatgau.exeC:\Windows\system32\yuatgau.exe 1492 "C:\Windows\SysWOW64\lhqeaen.exe"96⤵PID:864
-
C:\Windows\SysWOW64\lhrjmet.exeC:\Windows\system32\lhrjmet.exe 1504 "C:\Windows\SysWOW64\yuatgau.exe"97⤵PID:4028
-
C:\Windows\SysWOW64\yubhris.exeC:\Windows\system32\yubhris.exe 1508 "C:\Windows\SysWOW64\lhrjmet.exe"98⤵PID:1804
-
C:\Windows\SysWOW64\jtnechz.exeC:\Windows\system32\jtnechz.exe 1456 "C:\Windows\SysWOW64\yubhris.exe"99⤵PID:5048
-
C:\Windows\SysWOW64\vrihkhx.exeC:\Windows\system32\vrihkhx.exe 1516 "C:\Windows\SysWOW64\jtnechz.exe"100⤵PID:1472
-
C:\Windows\SysWOW64\jezxqle.exeC:\Windows\system32\jezxqle.exe 1524 "C:\Windows\SysWOW64\vrihkhx.exe"101⤵
- Drops file in System32 directory
PID:4536 -
C:\Windows\SysWOW64\wrjmwoc.exeC:\Windows\system32\wrjmwoc.exe 1468 "C:\Windows\SysWOW64\jezxqle.exe"102⤵PID:552
-
C:\Windows\SysWOW64\gcgxrsj.exeC:\Windows\system32\gcgxrsj.exe 1532 "C:\Windows\SysWOW64\wrjmwoc.exe"103⤵PID:1664
-
C:\Windows\SysWOW64\tpqmxvh.exeC:\Windows\system32\tpqmxvh.exe 1528 "C:\Windows\SysWOW64\gcgxrsj.exe"104⤵PID:3236
-
C:\Windows\SysWOW64\gcicdro.exeC:\Windows\system32\gcicdro.exe 1540 "C:\Windows\SysWOW64\tpqmxvh.exe"105⤵
- Drops file in System32 directory
PID:1460 -
C:\Windows\SysWOW64\qbmanqo.exeC:\Windows\system32\qbmanqo.exe 1512 "C:\Windows\SysWOW64\gcicdro.exe"106⤵
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\daocwyt.exeC:\Windows\system32\daocwyt.exe 1548 "C:\Windows\SysWOW64\qbmanqo.exe"107⤵PID:1360
-
C:\Windows\SysWOW64\qnysccs.exeC:\Windows\system32\qnysccs.exe 1552 "C:\Windows\SysWOW64\daocwyt.exe"108⤵PID:1384
-
C:\Windows\SysWOW64\daqqpgr.exeC:\Windows\system32\daqqpgr.exe 1544 "C:\Windows\SysWOW64\qnysccs.exe"109⤵PID:264
-
C:\Windows\SysWOW64\rnzfvcy.exeC:\Windows\system32\rnzfvcy.exe 1560 "C:\Windows\SysWOW64\daqqpgr.exe"110⤵
- Drops file in System32 directory
PID:3672 -
C:\Windows\SysWOW64\bmldgbx.exeC:\Windows\system32\bmldgbx.exe 1564 "C:\Windows\SysWOW64\rnzfvcy.exe"111⤵PID:4160
-
C:\Windows\SysWOW64\okgfojd.exeC:\Windows\system32\okgfojd.exe 1520 "C:\Windows\SysWOW64\bmldgbx.exe"112⤵
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\bxyvunb.exeC:\Windows\system32\bxyvunb.exe 1568 "C:\Windows\SysWOW64\okgfojd.exe"113⤵PID:4464
-
C:\Windows\SysWOW64\okhlaii.exeC:\Windows\system32\okhlaii.exe 1572 "C:\Windows\SysWOW64\bxyvunb.exe"114⤵PID:5088
-
C:\Windows\SysWOW64\yvfvvmp.exeC:\Windows\system32\yvfvvmp.exe 1576 "C:\Windows\SysWOW64\okhlaii.exe"115⤵PID:1688
-
C:\Windows\SysWOW64\liolbpn.exeC:\Windows\system32\liolbpn.exe 1556 "C:\Windows\SysWOW64\yvfvvmp.exe"116⤵PID:448
-
C:\Windows\SysWOW64\yvgjhtm.exeC:\Windows\system32\yvgjhtm.exe 1580 "C:\Windows\SysWOW64\liolbpn.exe"117⤵PID:3168
-
C:\Windows\SysWOW64\lipymxl.exeC:\Windows\system32\lipymxl.exe 1592 "C:\Windows\SysWOW64\yvgjhtm.exe"118⤵PID:2996
-
C:\Windows\SysWOW64\vsfjasz.exeC:\Windows\system32\vsfjasz.exe 1588 "C:\Windows\SysWOW64\lipymxl.exe"119⤵PID:3456
-
C:\Windows\SysWOW64\jclmdsr.exeC:\Windows\system32\jclmdsr.exe 1600 "C:\Windows\SysWOW64\vsfjasz.exe"120⤵PID:116
-
C:\Windows\SysWOW64\vsoolax.exeC:\Windows\system32\vsoolax.exe 1604 "C:\Windows\SysWOW64\jclmdsr.exe"121⤵PID:4452
-
C:\Windows\SysWOW64\jfxerew.exeC:\Windows\system32\jfxerew.exe 1536 "C:\Windows\SysWOW64\vsoolax.exe"122⤵PID:4444
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-