Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 08:00
Static task
static1
Behavioral task
behavioral1
Sample
8381b2b9cd810f3f9ac4318f46536d08_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8381b2b9cd810f3f9ac4318f46536d08_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
8381b2b9cd810f3f9ac4318f46536d08_JaffaCakes118.exe
-
Size
283KB
-
MD5
8381b2b9cd810f3f9ac4318f46536d08
-
SHA1
2f5668f34d2eae43daf76981f2088e63e0364a66
-
SHA256
c9878aebcc1a203e9b9c951803610d6d7abe6e867437db5653733e018d5221d9
-
SHA512
84ef7049d24afa9db891b9899e78144d7421db6e10dd334d2f1cdc5ae2e0795bd866c2f09d4b7251dca17d3f6ba0800ec58569598ba3639291f09b161802ceca
-
SSDEEP
6144:O/6IErzfCIW/M7P5DxXZ35rz3vqvxvxvKvLv8vtvHv3vyvxvyvEvPv6v4vip:+QdSUxXZ54p
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2032 lw2s4UH.exe 4196 lw2s4UH.exe 3120 lw2s4UH.exe 2628 lw2s4UH.exe 4956 lw2s4UH.exe 3996 lw2s4UH.exe 2128 lw2s4UH.exe 3036 lw2s4UH.exe 4148 lw2s4UH.exe 3132 lw2s4UH.exe 5092 lw2s4UH.exe 220 lw2s4UH.exe 2564 lw2s4UH.exe 2352 lw2s4UH.exe 1968 lw2s4UH.exe 3828 lw2s4UH.exe 4824 lw2s4UH.exe 872 lw2s4UH.exe 3984 lw2s4UH.exe 444 lw2s4UH.exe 2400 lw2s4UH.exe 5072 lw2s4UH.exe 5076 lw2s4UH.exe 1676 lw2s4UH.exe 1804 lw2s4UH.exe 3980 lw2s4UH.exe 1564 lw2s4UH.exe 2476 lw2s4UH.exe 4952 lw2s4UH.exe 1244 lw2s4UH.exe 2404 lw2s4UH.exe 2392 lw2s4UH.exe 4440 lw2s4UH.exe 1924 lw2s4UH.exe 3940 lw2s4UH.exe 4448 lw2s4UH.exe 4604 lw2s4UH.exe 2748 lw2s4UH.exe 3516 lw2s4UH.exe 4816 lw2s4UH.exe 2620 lw2s4UH.exe 2060 lw2s4UH.exe 4392 lw2s4UH.exe 5008 lw2s4UH.exe 5088 lw2s4UH.exe 1272 lw2s4UH.exe 1644 lw2s4UH.exe 4888 lw2s4UH.exe 4856 lw2s4UH.exe 3304 lw2s4UH.exe 4592 lw2s4UH.exe 2256 lw2s4UH.exe 4688 lw2s4UH.exe 2768 lw2s4UH.exe 3988 lw2s4UH.exe 2984 lw2s4UH.exe 2684 lw2s4UH.exe 4016 lw2s4UH.exe 4432 lw2s4UH.exe 4292 lw2s4UH.exe 4576 lw2s4UH.exe 2304 lw2s4UH.exe 1256 lw2s4UH.exe 5012 lw2s4UH.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\r: lw2s4UH.exe File opened (read-only) \??\y: lw2s4UH.exe File opened (read-only) \??\p: lw2s4UH.exe File opened (read-only) \??\h: lw2s4UH.exe File opened (read-only) \??\x: lw2s4UH.exe File opened (read-only) \??\u: lw2s4UH.exe File opened (read-only) \??\g: lw2s4UH.exe File opened (read-only) \??\v: lw2s4UH.exe File opened (read-only) \??\x: lw2s4UH.exe File opened (read-only) \??\w: lw2s4UH.exe File opened (read-only) \??\h: lw2s4UH.exe File opened (read-only) \??\s: lw2s4UH.exe File opened (read-only) \??\h: lw2s4UH.exe File opened (read-only) \??\e: lw2s4UH.exe File opened (read-only) \??\n: lw2s4UH.exe File opened (read-only) \??\h: lw2s4UH.exe File opened (read-only) \??\y: lw2s4UH.exe File opened (read-only) \??\n: lw2s4UH.exe File opened (read-only) \??\i: lw2s4UH.exe File opened (read-only) \??\q: lw2s4UH.exe File opened (read-only) \??\y: lw2s4UH.exe File opened (read-only) \??\t: lw2s4UH.exe File opened (read-only) \??\h: lw2s4UH.exe File opened (read-only) \??\r: lw2s4UH.exe File opened (read-only) \??\g: lw2s4UH.exe File opened (read-only) \??\z: lw2s4UH.exe File opened (read-only) \??\k: lw2s4UH.exe File opened (read-only) \??\h: lw2s4UH.exe File opened (read-only) \??\r: lw2s4UH.exe File opened (read-only) \??\e: lw2s4UH.exe File opened (read-only) \??\r: lw2s4UH.exe File opened (read-only) \??\z: lw2s4UH.exe File opened (read-only) \??\n: lw2s4UH.exe File opened (read-only) \??\o: lw2s4UH.exe File opened (read-only) \??\v: lw2s4UH.exe File opened (read-only) \??\l: lw2s4UH.exe File opened (read-only) \??\j: lw2s4UH.exe File opened (read-only) \??\v: lw2s4UH.exe File opened (read-only) \??\h: lw2s4UH.exe File opened (read-only) \??\k: lw2s4UH.exe File opened (read-only) \??\r: lw2s4UH.exe File opened (read-only) \??\k: lw2s4UH.exe File opened (read-only) \??\n: lw2s4UH.exe File opened (read-only) \??\t: lw2s4UH.exe File opened (read-only) \??\v: lw2s4UH.exe File opened (read-only) \??\u: lw2s4UH.exe File opened (read-only) \??\t: lw2s4UH.exe File opened (read-only) \??\o: lw2s4UH.exe File opened (read-only) \??\g: lw2s4UH.exe File opened (read-only) \??\s: lw2s4UH.exe File opened (read-only) \??\e: lw2s4UH.exe File opened (read-only) \??\y: lw2s4UH.exe File opened (read-only) \??\u: lw2s4UH.exe File opened (read-only) \??\s: lw2s4UH.exe File opened (read-only) \??\s: lw2s4UH.exe File opened (read-only) \??\g: lw2s4UH.exe File opened (read-only) \??\t: lw2s4UH.exe File opened (read-only) \??\g: lw2s4UH.exe File opened (read-only) \??\k: lw2s4UH.exe File opened (read-only) \??\s: lw2s4UH.exe File opened (read-only) \??\j: lw2s4UH.exe File opened (read-only) \??\p: lw2s4UH.exe File opened (read-only) \??\g: lw2s4UH.exe File opened (read-only) \??\g: lw2s4UH.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\lw2s4UH\wDmQ0vK.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe File created C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exe lw2s4UH.exe -
Program crash 1 IoCs
pid pid_target Process 9052 6560 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeLoadDriverPrivilege 4028 8381b2b9cd810f3f9ac4318f46536d08_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2032 lw2s4UH.exe Token: SeLoadDriverPrivilege 4196 lw2s4UH.exe Token: SeLoadDriverPrivilege 3120 lw2s4UH.exe Token: SeLoadDriverPrivilege 2628 lw2s4UH.exe Token: SeLoadDriverPrivilege 4956 lw2s4UH.exe Token: SeLoadDriverPrivilege 3996 lw2s4UH.exe Token: SeLoadDriverPrivilege 2128 lw2s4UH.exe Token: SeLoadDriverPrivilege 3036 lw2s4UH.exe Token: SeLoadDriverPrivilege 4148 lw2s4UH.exe Token: SeLoadDriverPrivilege 3132 lw2s4UH.exe Token: SeLoadDriverPrivilege 5092 lw2s4UH.exe Token: SeLoadDriverPrivilege 220 lw2s4UH.exe Token: SeLoadDriverPrivilege 2564 lw2s4UH.exe Token: SeLoadDriverPrivilege 2352 lw2s4UH.exe Token: SeLoadDriverPrivilege 1968 lw2s4UH.exe Token: SeLoadDriverPrivilege 3828 lw2s4UH.exe Token: SeLoadDriverPrivilege 4824 lw2s4UH.exe Token: SeLoadDriverPrivilege 872 lw2s4UH.exe Token: SeLoadDriverPrivilege 3984 lw2s4UH.exe Token: SeLoadDriverPrivilege 444 lw2s4UH.exe Token: SeLoadDriverPrivilege 2400 lw2s4UH.exe Token: SeLoadDriverPrivilege 5072 lw2s4UH.exe Token: SeLoadDriverPrivilege 5076 lw2s4UH.exe Token: SeLoadDriverPrivilege 1676 lw2s4UH.exe Token: SeLoadDriverPrivilege 1804 lw2s4UH.exe Token: SeLoadDriverPrivilege 3980 lw2s4UH.exe Token: SeLoadDriverPrivilege 1564 lw2s4UH.exe Token: SeLoadDriverPrivilege 2476 lw2s4UH.exe Token: SeLoadDriverPrivilege 4952 lw2s4UH.exe Token: SeLoadDriverPrivilege 1244 lw2s4UH.exe Token: SeLoadDriverPrivilege 2404 lw2s4UH.exe Token: SeLoadDriverPrivilege 2392 lw2s4UH.exe Token: SeLoadDriverPrivilege 4440 lw2s4UH.exe Token: SeLoadDriverPrivilege 1924 lw2s4UH.exe Token: SeLoadDriverPrivilege 3940 lw2s4UH.exe Token: SeLoadDriverPrivilege 4448 lw2s4UH.exe Token: SeLoadDriverPrivilege 4604 lw2s4UH.exe Token: SeLoadDriverPrivilege 2748 lw2s4UH.exe Token: SeLoadDriverPrivilege 3516 lw2s4UH.exe Token: SeLoadDriverPrivilege 4816 lw2s4UH.exe Token: SeLoadDriverPrivilege 2620 lw2s4UH.exe Token: SeLoadDriverPrivilege 2060 lw2s4UH.exe Token: SeLoadDriverPrivilege 4392 lw2s4UH.exe Token: SeLoadDriverPrivilege 5008 lw2s4UH.exe Token: SeLoadDriverPrivilege 5088 lw2s4UH.exe Token: SeLoadDriverPrivilege 1272 lw2s4UH.exe Token: SeLoadDriverPrivilege 1644 lw2s4UH.exe Token: SeLoadDriverPrivilege 4888 lw2s4UH.exe Token: SeLoadDriverPrivilege 4856 lw2s4UH.exe Token: SeLoadDriverPrivilege 3304 lw2s4UH.exe Token: SeLoadDriverPrivilege 4592 lw2s4UH.exe Token: SeLoadDriverPrivilege 2256 lw2s4UH.exe Token: SeLoadDriverPrivilege 4688 lw2s4UH.exe Token: SeLoadDriverPrivilege 2768 lw2s4UH.exe Token: SeLoadDriverPrivilege 3988 lw2s4UH.exe Token: SeLoadDriverPrivilege 2984 lw2s4UH.exe Token: SeLoadDriverPrivilege 2684 lw2s4UH.exe Token: SeLoadDriverPrivilege 4016 lw2s4UH.exe Token: SeLoadDriverPrivilege 4432 lw2s4UH.exe Token: SeLoadDriverPrivilege 4292 lw2s4UH.exe Token: SeLoadDriverPrivilege 4576 lw2s4UH.exe Token: SeLoadDriverPrivilege 2304 lw2s4UH.exe Token: SeLoadDriverPrivilege 1256 lw2s4UH.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 2032 4028 8381b2b9cd810f3f9ac4318f46536d08_JaffaCakes118.exe 91 PID 4028 wrote to memory of 2032 4028 8381b2b9cd810f3f9ac4318f46536d08_JaffaCakes118.exe 91 PID 4028 wrote to memory of 2032 4028 8381b2b9cd810f3f9ac4318f46536d08_JaffaCakes118.exe 91 PID 2032 wrote to memory of 4196 2032 lw2s4UH.exe 92 PID 2032 wrote to memory of 4196 2032 lw2s4UH.exe 92 PID 2032 wrote to memory of 4196 2032 lw2s4UH.exe 92 PID 4196 wrote to memory of 3120 4196 lw2s4UH.exe 93 PID 4196 wrote to memory of 3120 4196 lw2s4UH.exe 93 PID 4196 wrote to memory of 3120 4196 lw2s4UH.exe 93 PID 3120 wrote to memory of 2628 3120 lw2s4UH.exe 94 PID 3120 wrote to memory of 2628 3120 lw2s4UH.exe 94 PID 3120 wrote to memory of 2628 3120 lw2s4UH.exe 94 PID 2628 wrote to memory of 4956 2628 lw2s4UH.exe 95 PID 2628 wrote to memory of 4956 2628 lw2s4UH.exe 95 PID 2628 wrote to memory of 4956 2628 lw2s4UH.exe 95 PID 4956 wrote to memory of 3996 4956 lw2s4UH.exe 96 PID 4956 wrote to memory of 3996 4956 lw2s4UH.exe 96 PID 4956 wrote to memory of 3996 4956 lw2s4UH.exe 96 PID 3996 wrote to memory of 2128 3996 lw2s4UH.exe 97 PID 3996 wrote to memory of 2128 3996 lw2s4UH.exe 97 PID 3996 wrote to memory of 2128 3996 lw2s4UH.exe 97 PID 2128 wrote to memory of 3036 2128 lw2s4UH.exe 98 PID 2128 wrote to memory of 3036 2128 lw2s4UH.exe 98 PID 2128 wrote to memory of 3036 2128 lw2s4UH.exe 98 PID 3036 wrote to memory of 4148 3036 lw2s4UH.exe 99 PID 3036 wrote to memory of 4148 3036 lw2s4UH.exe 99 PID 3036 wrote to memory of 4148 3036 lw2s4UH.exe 99 PID 4148 wrote to memory of 3132 4148 lw2s4UH.exe 100 PID 4148 wrote to memory of 3132 4148 lw2s4UH.exe 100 PID 4148 wrote to memory of 3132 4148 lw2s4UH.exe 100 PID 3132 wrote to memory of 5092 3132 lw2s4UH.exe 101 PID 3132 wrote to memory of 5092 3132 lw2s4UH.exe 101 PID 3132 wrote to memory of 5092 3132 lw2s4UH.exe 101 PID 5092 wrote to memory of 220 5092 lw2s4UH.exe 102 PID 5092 wrote to memory of 220 5092 lw2s4UH.exe 102 PID 5092 wrote to memory of 220 5092 lw2s4UH.exe 102 PID 220 wrote to memory of 2564 220 lw2s4UH.exe 103 PID 220 wrote to memory of 2564 220 lw2s4UH.exe 103 PID 220 wrote to memory of 2564 220 lw2s4UH.exe 103 PID 2564 wrote to memory of 2352 2564 lw2s4UH.exe 104 PID 2564 wrote to memory of 2352 2564 lw2s4UH.exe 104 PID 2564 wrote to memory of 2352 2564 lw2s4UH.exe 104 PID 2352 wrote to memory of 1968 2352 lw2s4UH.exe 105 PID 2352 wrote to memory of 1968 2352 lw2s4UH.exe 105 PID 2352 wrote to memory of 1968 2352 lw2s4UH.exe 105 PID 1968 wrote to memory of 3828 1968 lw2s4UH.exe 106 PID 1968 wrote to memory of 3828 1968 lw2s4UH.exe 106 PID 1968 wrote to memory of 3828 1968 lw2s4UH.exe 106 PID 3828 wrote to memory of 4824 3828 lw2s4UH.exe 107 PID 3828 wrote to memory of 4824 3828 lw2s4UH.exe 107 PID 3828 wrote to memory of 4824 3828 lw2s4UH.exe 107 PID 4824 wrote to memory of 872 4824 lw2s4UH.exe 108 PID 4824 wrote to memory of 872 4824 lw2s4UH.exe 108 PID 4824 wrote to memory of 872 4824 lw2s4UH.exe 108 PID 872 wrote to memory of 3984 872 lw2s4UH.exe 109 PID 872 wrote to memory of 3984 872 lw2s4UH.exe 109 PID 872 wrote to memory of 3984 872 lw2s4UH.exe 109 PID 3984 wrote to memory of 444 3984 lw2s4UH.exe 110 PID 3984 wrote to memory of 444 3984 lw2s4UH.exe 110 PID 3984 wrote to memory of 444 3984 lw2s4UH.exe 110 PID 444 wrote to memory of 2400 444 lw2s4UH.exe 111 PID 444 wrote to memory of 2400 444 lw2s4UH.exe 111 PID 444 wrote to memory of 2400 444 lw2s4UH.exe 111 PID 2400 wrote to memory of 5072 2400 lw2s4UH.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\8381b2b9cd810f3f9ac4318f46536d08_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8381b2b9cd810f3f9ac4318f46536d08_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe6⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe7⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe11⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe14⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5076 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1676 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3980 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe29⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe30⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4952 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe31⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2404 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2392 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4440 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1924 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe36⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3940 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4448 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe38⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4604 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2748 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe41⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4816 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2620 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4392 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5088 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe47⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4888 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4856 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3304 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4592 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe53⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2256 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4688 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3988 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe58⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe59⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:4016 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4432 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4292 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4576 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2304 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1256 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe65⤵
- Executes dropped EXE
- Enumerates connected drives
PID:5012 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe66⤵
- Enumerates connected drives
PID:3380 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe67⤵
- Enumerates connected drives
PID:4940 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe68⤵
- Enumerates connected drives
PID:1460 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe69⤵PID:964
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe70⤵
- Enumerates connected drives
PID:2512 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe71⤵PID:1568
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe72⤵PID:396
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe73⤵
- Drops file in System32 directory
PID:4360 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe74⤵PID:3580
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe75⤵
- Drops file in System32 directory
PID:2344 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe76⤵PID:4668
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe77⤵PID:884
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe78⤵PID:3944
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe79⤵PID:4408
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe80⤵PID:3812
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe81⤵
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe82⤵PID:5128
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe83⤵
- Enumerates connected drives
PID:5144 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe84⤵PID:5160
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe85⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:5176 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe86⤵PID:5192
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe87⤵
- Drops file in System32 directory
PID:5208 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe88⤵PID:5224
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe89⤵PID:5240
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe90⤵PID:5256
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe91⤵PID:5272
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe92⤵PID:5288
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe93⤵PID:5304
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe94⤵
- Enumerates connected drives
PID:5320 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe95⤵PID:5336
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe96⤵
- Drops file in System32 directory
PID:5356 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe97⤵PID:5372
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe98⤵PID:5392
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe99⤵PID:5408
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe100⤵
- Drops file in System32 directory
PID:5424 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe101⤵
- Enumerates connected drives
PID:5436 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe102⤵PID:5452
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe103⤵
- Enumerates connected drives
PID:5472 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe104⤵PID:5484
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe105⤵PID:5504
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe106⤵PID:5516
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe107⤵
- Drops file in System32 directory
PID:5536 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe108⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:5552 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe109⤵PID:5572
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe110⤵
- Drops file in System32 directory
PID:5588 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe111⤵
- Enumerates connected drives
PID:5604 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe112⤵PID:5624
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe113⤵
- Drops file in System32 directory
PID:5640 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe114⤵
- Enumerates connected drives
PID:5656 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe115⤵PID:5672
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe116⤵PID:5692
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe117⤵
- Enumerates connected drives
PID:5716 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe118⤵PID:5752
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe119⤵PID:5784
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe120⤵PID:5800
-
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe121⤵
- Enumerates connected drives
PID:5816 -
C:\Windows\SysWOW64\wDmQ0vK\lw2s4UH.exeC:\Windows\system32\wDmQ0vK\lw2s4UH.exe122⤵
- Drops file in System32 directory
PID:5832
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-