Analysis
-
max time kernel
108s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe
-
Size
251KB
-
MD5
383709cb3885c660314067b7d9543bf3
-
SHA1
0d3f6cc4e3f72f174351fc614ea54025e0715b93
-
SHA256
5e8bec3c94f5b8dd59824c28dccb4dc3f6b7cdade82160e7d2f6655f8a93628a
-
SHA512
42a4ff2c262ca601f7862dee8cac91ffb389111aa88a9c6d751721bba74fe80323daa8c84a6c5b2b66275d8ef12ed4136ff2157097a7f1a7327f5a5d55279db7
-
SSDEEP
6144:TRazhwlUx2EHSgoy+2eOvJWPz1X5TrUM1a:FkSgGOvJ45XVs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation lhcalgw.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation augabhg.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation xatgaub.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation xckpmsr.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation cugibir.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation vzdegnf.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation nayvhxc.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation uriztgt.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tukavja.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation wmpwgxl.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation rnkmbch.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation clhlfgq.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation ogzwvfh.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation uoqygce.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation ydpcrqm.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation nivkrwe.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation youaqpq.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation apufrzb.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation dbdzqqs.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation yrdjvei.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation etbzavp.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation lzexqal.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation nhetwbe.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation dpzcnyi.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation eksyjjl.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation fbwwqbt.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation dbbbcel.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation qddsduj.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation faklarb.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation wylasbh.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation czunfvg.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation jezvoxu.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation cyxlprm.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation bzxbafl.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation lkultiv.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation ftlqmev.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation funkhti.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation qpdfinc.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation scvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation jydckwe.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation vgxtgpd.exe -
Executes dropped EXE 64 IoCs
pid Process 4900 scvhost.exe 5044 gofthna.exe 1648 nhetwbe.exe 3916 scvhost.exe 1448 yrdjvei.exe 3480 ydpcrqm.exe 4820 scvhost.exe 4356 vezklvy.exe 3056 nayvhxc.exe 1052 scvhost.exe 3464 ftlqmev.exe 4724 scvhost.exe 4812 fmxlflk.exe 448 fbwwqbt.exe 4320 scvhost.exe 4248 ybtksip.exe 5024 fyeidob.exe 3884 scvhost.exe 4708 kzyolou.exe 3504 scvhost.exe 4548 dpzcnyi.exe 4000 nzysmau.exe 4592 scvhost.exe 4644 sfuleel.exe 1200 scvhost.exe 2184 fojbgtg.exe 2216 fliujjo.exe 2424 scvhost.exe 3972 nivkrwe.exe 4636 pdhsywq.exe 3084 scvhost.exe 1940 cyxlprm.exe 2900 zwfrcyw.exe 2736 scvhost.exe 4880 funkhti.exe 2188 scvhost.exe 1028 czunfvg.exe 1992 clhlfgq.exe 4900 scvhost.exe 4548 saawqbe.exe 936 scvhost.exe 4288 xckpmsr.exe 3236 cirklbw.exe 4648 scvhost.exe 932 eksyjjl.exe 3412 scvhost.exe 1684 xatgaub.exe 1564 scvhost.exe 4696 etbzavp.exe 3604 scvhost.exe 2420 whajwxu.exe 3988 eizklly.exe 4644 scvhost.exe 1200 rkgfixi.exe 816 scvhost.exe 3264 cugibir.exe 3176 ubhdrwg.exe 3464 scvhost.exe 3992 uriztgt.exe 1860 ursxyaj.exe 4724 scvhost.exe 3988 jezvoxu.exe 5048 scvhost.exe 4752 wrrysqv.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "sspokqx.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "ycjpnmq.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" nseqesu.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "youaqpq.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" cthwfnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "apufrzb.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "nayvhxc.exe" vezklvy.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" ursxyaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" sfuleel.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "vzdegnf.exe" uoqygce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "ursxyaj.exe" uriztgt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" nseqesu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" fyeidob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "whajwxu.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" jydckwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" qpdfinc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "enkwzci.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "vezklvy.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "wrrysqv.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" bmckrhe.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" fbwwqbt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "zwfrcyw.exe" cyxlprm.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" fliujjo.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "xatgaub.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "jezvoxu.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" qddsduj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "lzexqal.exe" lhcalgw.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "fyeidob.exe" ybtksip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "sfuleel.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" pdhsywq.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" pbbhzbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" lhxkbzm.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "uoqygce.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" xpwrhhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "zpsahmr.exe" funkhti.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" zpsahmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "jydckwe.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "eksyjjl.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "eizklly.exe" whajwxu.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "etbzavp.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "uriztgt.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" ogzwvfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "dbdzqqs.exe" dbbbcel.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" nayvhxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "nivkrwe.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "pbbhzbg.exe" sspokqx.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "vgxtgpd.exe" lkultiv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" vgxtgpd.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "wpoywze.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "wmpwgxl.exe" bzxbafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "dbbbcel.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "dbdzqqs.exe" dbbbcel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" pbbhzbg.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" wylasbh.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" zwfrcyw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "eksyjjl.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" lzexqal.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" ogzwvfh.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "avgplvr.exe" scvhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "scvhost.exe" ekawnzh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" cojaadm.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "dpzcnyi.exe" scvhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration = "scvhost.exe" saawqbe.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Configuration = "augabhg.exe" scvhost.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe nayvhxc.exe File opened for modification C:\WINDOWS\SysWOW64\rbgcmbz.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe pojahvd.exe File created C:\WINDOWS\SysWOW64\scvhost.exe rbgcmbz.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe edrxwlu.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe cugibir.exe File opened for modification C:\WINDOWS\SysWOW64\uriztgt.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe nseqesu.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe sfuleel.exe File created C:\WINDOWS\SysWOW64\rkgfixi.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\ursxyaj.exe uriztgt.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe rnkmbch.exe File created C:\WINDOWS\SysWOW64\bmckrhe.exe ycjpnmq.exe File opened for modification C:\WINDOWS\SysWOW64\wylasbh.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\edrxwlu.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\rkgfixi.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe ursxyaj.exe File created C:\WINDOWS\SysWOW64\scvhost.exe wrrysqv.exe File created C:\WINDOWS\SysWOW64\lhxkbzm.exe rbgcmbz.exe File created C:\WINDOWS\SysWOW64\eizklly.exe whajwxu.exe File opened for modification C:\WINDOWS\SysWOW64\jezvoxu.exe scvhost.exe File created C:\WINDOWS\SysWOW64\wylasbh.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe yrdjvei.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe ydpcrqm.exe File created C:\WINDOWS\SysWOW64\fmxlflk.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\funkhti.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\ftlqmev.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe ybtksip.exe File created C:\WINDOWS\SysWOW64\whajwxu.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe ekawnzh.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File created C:\WINDOWS\SysWOW64\sfuleel.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\lhxkbzm.exe rbgcmbz.exe File created C:\WINDOWS\SysWOW64\wpoywze.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File created C:\WINDOWS\SysWOW64\dbbbcel.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe fqfyste.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\yrdjvei.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe nzysmau.exe File opened for modification C:\WINDOWS\SysWOW64\eksyjjl.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\fbwwqbt.exe fmxlflk.exe File opened for modification C:\WINDOWS\SysWOW64\lhcalgw.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe fojbgtg.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe xatgaub.exe File created C:\WINDOWS\SysWOW64\scvhost.exe whajwxu.exe File created C:\WINDOWS\SysWOW64\qddsduj.exe tukavja.exe File created C:\WINDOWS\SysWOW64\ycjpnmq.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe lhcalgw.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe mnbgvte.exe File created C:\WINDOWS\SysWOW64\vezklvy.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\scvhost.exe kzyolou.exe File opened for modification C:\WINDOWS\SysWOW64\nivkrwe.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\cojaadm.exe apufrzb.exe File opened for modification C:\WINDOWS\SysWOW64\rnkmbch.exe scvhost.exe File created C:\WINDOWS\SysWOW64\scvhost.exe vezklvy.exe File created C:\WINDOWS\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\WINDOWS\SysWOW64\fbhnpde.exe scvhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ czunfvg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ clhlfgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ xckpmsr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nayvhxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nivkrwe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ etbzavp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ydpcrqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ saawqbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ xpwrhhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ pojahvd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nhetwbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ dbdzqqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ youaqpq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bzxbafl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ edrxwlu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ybtksip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ xatgaub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ qpdfinc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ cthwfnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ fliujjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ zwfrcyw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ uoqygce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ fojbgtg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ogzwvfh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ vgxtgpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sspokqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ rnkmbch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ kzyolou.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ gofthna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ cojaadm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ hprfvbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nzysmau.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ augabhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ mnbgvte.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ lkultiv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpwgxl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ubhdrwg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ekawnzh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wylasbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ yrdjvei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ scvhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ jezvoxu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4900 4416 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4900 4416 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4900 4416 383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe 86 PID 4900 wrote to memory of 5044 4900 scvhost.exe 87 PID 4900 wrote to memory of 5044 4900 scvhost.exe 87 PID 4900 wrote to memory of 5044 4900 scvhost.exe 87 PID 5044 wrote to memory of 1648 5044 gofthna.exe 88 PID 5044 wrote to memory of 1648 5044 gofthna.exe 88 PID 5044 wrote to memory of 1648 5044 gofthna.exe 88 PID 1648 wrote to memory of 3916 1648 nhetwbe.exe 89 PID 1648 wrote to memory of 3916 1648 nhetwbe.exe 89 PID 1648 wrote to memory of 3916 1648 nhetwbe.exe 89 PID 3916 wrote to memory of 1448 3916 scvhost.exe 90 PID 3916 wrote to memory of 1448 3916 scvhost.exe 90 PID 3916 wrote to memory of 1448 3916 scvhost.exe 90 PID 1448 wrote to memory of 3480 1448 yrdjvei.exe 91 PID 1448 wrote to memory of 3480 1448 yrdjvei.exe 91 PID 1448 wrote to memory of 3480 1448 yrdjvei.exe 91 PID 3480 wrote to memory of 4820 3480 ydpcrqm.exe 92 PID 3480 wrote to memory of 4820 3480 ydpcrqm.exe 92 PID 3480 wrote to memory of 4820 3480 ydpcrqm.exe 92 PID 4820 wrote to memory of 4356 4820 scvhost.exe 93 PID 4820 wrote to memory of 4356 4820 scvhost.exe 93 PID 4820 wrote to memory of 4356 4820 scvhost.exe 93 PID 4356 wrote to memory of 3056 4356 vezklvy.exe 94 PID 4356 wrote to memory of 3056 4356 vezklvy.exe 94 PID 4356 wrote to memory of 3056 4356 vezklvy.exe 94 PID 3056 wrote to memory of 1052 3056 nayvhxc.exe 95 PID 3056 wrote to memory of 1052 3056 nayvhxc.exe 95 PID 3056 wrote to memory of 1052 3056 nayvhxc.exe 95 PID 1052 wrote to memory of 3464 1052 scvhost.exe 96 PID 1052 wrote to memory of 3464 1052 scvhost.exe 96 PID 1052 wrote to memory of 3464 1052 scvhost.exe 96 PID 3464 wrote to memory of 4724 3464 ftlqmev.exe 97 PID 3464 wrote to memory of 4724 3464 ftlqmev.exe 97 PID 3464 wrote to memory of 4724 3464 ftlqmev.exe 97 PID 4724 wrote to memory of 4812 4724 scvhost.exe 98 PID 4724 wrote to memory of 4812 4724 scvhost.exe 98 PID 4724 wrote to memory of 4812 4724 scvhost.exe 98 PID 4812 wrote to memory of 448 4812 fmxlflk.exe 99 PID 4812 wrote to memory of 448 4812 fmxlflk.exe 99 PID 4812 wrote to memory of 448 4812 fmxlflk.exe 99 PID 448 wrote to memory of 4320 448 fbwwqbt.exe 100 PID 448 wrote to memory of 4320 448 fbwwqbt.exe 100 PID 448 wrote to memory of 4320 448 fbwwqbt.exe 100 PID 4320 wrote to memory of 4248 4320 scvhost.exe 101 PID 4320 wrote to memory of 4248 4320 scvhost.exe 101 PID 4320 wrote to memory of 4248 4320 scvhost.exe 101 PID 4248 wrote to memory of 5024 4248 ybtksip.exe 102 PID 4248 wrote to memory of 5024 4248 ybtksip.exe 102 PID 4248 wrote to memory of 5024 4248 ybtksip.exe 102 PID 5024 wrote to memory of 3884 5024 fyeidob.exe 103 PID 5024 wrote to memory of 3884 5024 fyeidob.exe 103 PID 5024 wrote to memory of 3884 5024 fyeidob.exe 103 PID 3884 wrote to memory of 4708 3884 scvhost.exe 104 PID 3884 wrote to memory of 4708 3884 scvhost.exe 104 PID 3884 wrote to memory of 4708 3884 scvhost.exe 104 PID 4708 wrote to memory of 3504 4708 kzyolou.exe 105 PID 4708 wrote to memory of 3504 4708 kzyolou.exe 105 PID 4708 wrote to memory of 3504 4708 kzyolou.exe 105 PID 3504 wrote to memory of 4548 3504 scvhost.exe 106 PID 3504 wrote to memory of 4548 3504 scvhost.exe 106 PID 3504 wrote to memory of 4548 3504 scvhost.exe 106 PID 4548 wrote to memory of 4000 4548 dpzcnyi.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\383709cb3885c660314067b7d9543bf3_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\USERS\ADMIN\APPDATA\LOCAL\TEMP\383709CB3885C660314067B7D9543BF3_JAFFACAKES118.EXE2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\WINDOWS\SysWOW64\gofthna.exe"C:\WINDOWS\SYSTEM32\gofthna.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\WINDOWS\SysWOW64\nhetwbe.exe"C:\WINDOWS\SYSTEM32\nhetwbe.exe" mElTC:\WINDOWS\SYSWOW64\GOFTHNA.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\NHETWBE.EXE5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\WINDOWS\SysWOW64\yrdjvei.exe"C:\WINDOWS\SYSTEM32\yrdjvei.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\WINDOWS\SysWOW64\ydpcrqm.exe"C:\WINDOWS\SYSTEM32\ydpcrqm.exe" mElTC:\WINDOWS\SYSWOW64\YRDJVEI.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\YDPCRQM.EXE8⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\WINDOWS\SysWOW64\vezklvy.exe"C:\WINDOWS\SYSTEM32\vezklvy.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE9⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\WINDOWS\SysWOW64\nayvhxc.exe"C:\WINDOWS\SYSTEM32\nayvhxc.exe" mElTC:\WINDOWS\SYSWOW64\VEZKLVY.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\NAYVHXC.EXE11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\WINDOWS\SysWOW64\ftlqmev.exe"C:\WINDOWS\SYSTEM32\ftlqmev.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\FTLQMEV.EXE13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\WINDOWS\SysWOW64\fmxlflk.exe"C:\WINDOWS\SYSTEM32\fmxlflk.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\WINDOWS\SysWOW64\fbwwqbt.exe"C:\WINDOWS\SYSTEM32\fbwwqbt.exe" mElTC:\WINDOWS\SYSWOW64\FMXLFLK.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:448 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\FBWWQBT.EXE16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\WINDOWS\SysWOW64\ybtksip.exe"C:\WINDOWS\SYSTEM32\ybtksip.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE17⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\WINDOWS\SysWOW64\fyeidob.exe"C:\WINDOWS\SYSTEM32\fyeidob.exe" mElTC:\WINDOWS\SYSWOW64\YBTKSIP.EXE18⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\FYEIDOB.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\WINDOWS\SysWOW64\kzyolou.exe"C:\WINDOWS\SYSTEM32\kzyolou.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\KZYOLOU.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\WINDOWS\SysWOW64\dpzcnyi.exe"C:\WINDOWS\SYSTEM32\dpzcnyi.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\WINDOWS\SysWOW64\nzysmau.exe"C:\WINDOWS\SYSTEM32\nzysmau.exe" mElTC:\WINDOWS\SYSWOW64\DPZCNYI.EXE23⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4000 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\NZYSMAU.EXE24⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4592 -
C:\WINDOWS\SysWOW64\sfuleel.exe"C:\WINDOWS\SYSTEM32\sfuleel.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE25⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4644 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\SFULEEL.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1200 -
C:\WINDOWS\SysWOW64\fojbgtg.exe"C:\WINDOWS\SYSTEM32\fojbgtg.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE27⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2184 -
C:\WINDOWS\SysWOW64\fliujjo.exe"C:\WINDOWS\SYSTEM32\fliujjo.exe" mElTC:\WINDOWS\SYSWOW64\FOJBGTG.EXE28⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:2216 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\FLIUJJO.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2424 -
C:\WINDOWS\SysWOW64\nivkrwe.exe"C:\WINDOWS\SYSTEM32\nivkrwe.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3972 -
C:\WINDOWS\SysWOW64\pdhsywq.exe"C:\WINDOWS\SYSTEM32\pdhsywq.exe" mElTC:\WINDOWS\SYSWOW64\NIVKRWE.EXE31⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4636 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\PDHSYWQ.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3084 -
C:\WINDOWS\SysWOW64\cyxlprm.exe"C:\WINDOWS\SYSTEM32\cyxlprm.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1940 -
C:\WINDOWS\SysWOW64\zwfrcyw.exe"C:\WINDOWS\SYSTEM32\zwfrcyw.exe" mElTC:\WINDOWS\SYSWOW64\CYXLPRM.EXE34⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:2900 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\ZWFRCYW.EXE35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2736 -
C:\WINDOWS\SysWOW64\funkhti.exe"C:\WINDOWS\SYSTEM32\funkhti.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:4880 -
C:\WINDOWS\SysWOW64\zpsahmr.exe"C:\WINDOWS\SYSTEM32\zpsahmr.exe" mElTC:\WINDOWS\SYSWOW64\FUNKHTI.EXE37⤵
- Adds Run key to start application
PID:4360 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\ZPSAHMR.EXE38⤵
- Executes dropped EXE
- Modifies registry class
PID:2188 -
C:\WINDOWS\SysWOW64\czunfvg.exe"C:\WINDOWS\SYSTEM32\czunfvg.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1028 -
C:\WINDOWS\SysWOW64\clhlfgq.exe"C:\WINDOWS\SYSTEM32\clhlfgq.exe" mElTC:\WINDOWS\SYSWOW64\CZUNFVG.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1992 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\CLHLFGQ.EXE41⤵
- Executes dropped EXE
- Modifies registry class
PID:4900 -
C:\WINDOWS\SysWOW64\saawqbe.exe"C:\WINDOWS\SYSTEM32\saawqbe.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE42⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4548 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\SAAWQBE.EXE43⤵
- Executes dropped EXE
PID:936 -
C:\WINDOWS\SysWOW64\xckpmsr.exe"C:\WINDOWS\SYSTEM32\xckpmsr.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4288 -
C:\WINDOWS\SysWOW64\cirklbw.exe"C:\WINDOWS\SYSTEM32\cirklbw.exe" mElTC:\WINDOWS\SYSWOW64\XCKPMSR.EXE45⤵
- Executes dropped EXE
PID:3236 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\CIRKLBW.EXE46⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4648 -
C:\WINDOWS\SysWOW64\eksyjjl.exe"C:\WINDOWS\SYSTEM32\eksyjjl.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE47⤵
- Checks computer location settings
- Executes dropped EXE
PID:932 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\EKSYJJL.EXE48⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3412 -
C:\WINDOWS\SysWOW64\xatgaub.exe"C:\WINDOWS\SYSTEM32\xatgaub.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE49⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1684 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\XATGAUB.EXE50⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:1564 -
C:\WINDOWS\SysWOW64\etbzavp.exe"C:\WINDOWS\SYSTEM32\etbzavp.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4696 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\ETBZAVP.EXE52⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3604 -
C:\WINDOWS\SysWOW64\whajwxu.exe"C:\WINDOWS\SYSTEM32\whajwxu.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE53⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2420 -
C:\WINDOWS\SysWOW64\eizklly.exe"C:\WINDOWS\SYSTEM32\eizklly.exe" mElTC:\WINDOWS\SYSWOW64\WHAJWXU.EXE54⤵
- Executes dropped EXE
PID:3988 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\EIZKLLY.EXE55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4644 -
C:\WINDOWS\SysWOW64\rkgfixi.exe"C:\WINDOWS\SYSTEM32\rkgfixi.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE56⤵
- Executes dropped EXE
PID:1200 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\RKGFIXI.EXE57⤵
- Checks computer location settings
- Executes dropped EXE
PID:816 -
C:\WINDOWS\SysWOW64\cugibir.exe"C:\WINDOWS\SYSTEM32\cugibir.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3264 -
C:\WINDOWS\SysWOW64\ubhdrwg.exe"C:\WINDOWS\SYSTEM32\ubhdrwg.exe" mElTC:\WINDOWS\SYSWOW64\CUGIBIR.EXE59⤵
- Executes dropped EXE
- Modifies registry class
PID:3176 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\UBHDRWG.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3464 -
C:\WINDOWS\SysWOW64\uriztgt.exe"C:\WINDOWS\SYSTEM32\uriztgt.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE61⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3992 -
C:\WINDOWS\SysWOW64\ursxyaj.exe"C:\WINDOWS\SYSTEM32\ursxyaj.exe" mElTC:\WINDOWS\SYSWOW64\URIZTGT.EXE62⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1860 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\URSXYAJ.EXE63⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4724 -
C:\WINDOWS\SysWOW64\jezvoxu.exe"C:\WINDOWS\SYSTEM32\jezvoxu.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3988 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\JEZVOXU.EXE65⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5048 -
C:\WINDOWS\SysWOW64\wrrysqv.exe"C:\WINDOWS\SYSTEM32\wrrysqv.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE66⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4752 -
C:\WINDOWS\SysWOW64\ekawnzh.exe"C:\WINDOWS\SYSTEM32\ekawnzh.exe" mElTC:\WINDOWS\SYSWOW64\WRRYSQV.EXE67⤵
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3996 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\EKAWNZH.EXE68⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4836 -
C:\WINDOWS\SysWOW64\rbgcmbz.exe"C:\WINDOWS\SYSTEM32\rbgcmbz.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE69⤵
- Drops file in System32 directory
PID:544 -
C:\WINDOWS\SysWOW64\lhxkbzm.exe"C:\WINDOWS\SYSTEM32\lhxkbzm.exe" mElTC:\WINDOWS\SYSWOW64\RBGCMBZ.EXE70⤵
- Adds Run key to start application
PID:2268 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\LHXKBZM.EXE71⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
PID:1448 -
C:\WINDOWS\SysWOW64\wpoywze.exe"C:\WINDOWS\SYSTEM32\wpoywze.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE72⤵PID:3276
-
C:\WINDOWS\SysWOW64\ogzwvfh.exe"C:\WINDOWS\SYSTEM32\ogzwvfh.exe" mElTC:\WINDOWS\SYSWOW64\WPOYWZE.EXE73⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:4116 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\OGZWVFH.EXE74⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3824 -
C:\WINDOWS\SysWOW64\jydckwe.exe"C:\WINDOWS\SYSTEM32\jydckwe.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE75⤵
- Checks computer location settings
- Adds Run key to start application
PID:4644 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\JYDCKWE.EXE76⤵
- Adds Run key to start application
- Modifies registry class
PID:4400 -
C:\WINDOWS\SysWOW64\youaqpq.exe"C:\WINDOWS\SYSTEM32\youaqpq.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE77⤵
- Checks computer location settings
- Modifies registry class
PID:1544 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\YOUAQPQ.EXE78⤵
- Checks computer location settings
PID:3572 -
C:\WINDOWS\SysWOW64\bzxbafl.exe"C:\WINDOWS\SYSTEM32\bzxbafl.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE79⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:1308 -
C:\WINDOWS\SysWOW64\wmpwgxl.exe"C:\WINDOWS\SYSTEM32\wmpwgxl.exe" mElTC:\WINDOWS\SYSWOW64\BZXBAFL.EXE80⤵
- Checks computer location settings
- Modifies registry class
PID:4256 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\WMPWGXL.EXE81⤵
- Modifies registry class
PID:676 -
C:\WINDOWS\SysWOW64\tokmbdk.exe"C:\WINDOWS\SYSTEM32\tokmbdk.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE82⤵PID:1448
-
C:\WINDOWS\SysWOW64\qpdfinc.exe"C:\WINDOWS\SYSTEM32\qpdfinc.exe" mElTC:\WINDOWS\SYSWOW64\TOKMBDK.EXE83⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:3276 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\QPDFINC.EXE84⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4080 -
C:\WINDOWS\SysWOW64\lkultiv.exe"C:\WINDOWS\SYSTEM32\lkultiv.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE85⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:4128 -
C:\WINDOWS\SysWOW64\vgxtgpd.exe"C:\WINDOWS\SYSTEM32\vgxtgpd.exe" mElTC:\WINDOWS\SYSWOW64\LKULTIV.EXE86⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:4304 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\VGXTGPD.EXE87⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
PID:4500 -
C:\WINDOWS\SysWOW64\ycjpnmq.exe"C:\WINDOWS\SYSTEM32\ycjpnmq.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE88⤵
- Drops file in System32 directory
PID:3016 -
C:\WINDOWS\SysWOW64\bmckrhe.exe"C:\WINDOWS\SYSTEM32\bmckrhe.exe" mElTC:\WINDOWS\SYSWOW64\YCJPNMQ.EXE89⤵
- Adds Run key to start application
PID:4548 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\BMCKRHE.EXE90⤵
- Checks computer location settings
- Modifies registry class
PID:936 -
C:\WINDOWS\SysWOW64\nseqesu.exe"C:\WINDOWS\SYSTEM32\nseqesu.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE91⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:548 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\NSEQESU.EXE92⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
PID:3152 -
C:\WINDOWS\SysWOW64\dbbbcel.exe"C:\WINDOWS\SYSTEM32\dbbbcel.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE93⤵
- Checks computer location settings
- Adds Run key to start application
PID:3244 -
C:\WINDOWS\SysWOW64\dbdzqqs.exe"C:\WINDOWS\SYSTEM32\dbdzqqs.exe" mElTC:\WINDOWS\SYSWOW64\DBBBCEL.EXE94⤵
- Checks computer location settings
- Modifies registry class
PID:3956 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\DBDZQQS.EXE95⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:4932 -
C:\WINDOWS\SysWOW64\avgplvr.exe"C:\WINDOWS\SYSTEM32\avgplvr.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE96⤵PID:4356
-
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\AVGPLVR.EXE97⤵
- Checks computer location settings
- Modifies registry class
PID:5100 -
C:\WINDOWS\SysWOW64\tukavja.exe"C:\WINDOWS\SYSTEM32\tukavja.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE98⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2624 -
C:\WINDOWS\SysWOW64\qddsduj.exe"C:\WINDOWS\SYSTEM32\qddsduj.exe" mElTC:\WINDOWS\SYSWOW64\TUKAVJA.EXE99⤵
- Checks computer location settings
- Adds Run key to start application
PID:3576 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\QDDSDUJ.EXE100⤵
- Checks computer location settings
- Adds Run key to start application
PID:4520 -
C:\WINDOWS\SysWOW64\sspokqx.exe"C:\WINDOWS\SYSTEM32\sspokqx.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE101⤵
- Adds Run key to start application
- Modifies registry class
PID:3100 -
C:\WINDOWS\SysWOW64\pbbhzbg.exe"C:\WINDOWS\SYSTEM32\pbbhzbg.exe" mElTC:\WINDOWS\SYSWOW64\SSPOKQX.EXE102⤵
- Adds Run key to start application
PID:1724 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\PBBHZBG.EXE103⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2736 -
C:\WINDOWS\SysWOW64\lhcalgw.exe"C:\WINDOWS\SYSTEM32\lhcalgw.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE104⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
PID:4428 -
C:\WINDOWS\SysWOW64\lzexqal.exe"C:\WINDOWS\SYSTEM32\lzexqal.exe" mElTC:\WINDOWS\SYSWOW64\LHCALGW.EXE105⤵
- Checks computer location settings
- Adds Run key to start application
PID:556 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\LZEXQAL.EXE106⤵
- Adds Run key to start application
PID:1028 -
C:\WINDOWS\SysWOW64\uoqygce.exe"C:\WINDOWS\SYSTEM32\uoqygce.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE107⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:3060 -
C:\WINDOWS\SysWOW64\vzdegnf.exe"C:\WINDOWS\SYSTEM32\vzdegnf.exe" mElTC:\WINDOWS\SYSWOW64\UOQYGCE.EXE108⤵
- Checks computer location settings
PID:3204 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\VZDEGNF.EXE109⤵
- Adds Run key to start application
PID:1564 -
C:\WINDOWS\SysWOW64\augabhg.exe"C:\WINDOWS\SYSTEM32\augabhg.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE110⤵
- Checks computer location settings
- Modifies registry class
PID:3084 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\AUGABHG.EXE111⤵
- Checks computer location settings
PID:4812 -
C:\WINDOWS\SysWOW64\faklarb.exe"C:\WINDOWS\SYSTEM32\faklarb.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE112⤵
- Checks computer location settings
PID:4156 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\FAKLARB.EXE113⤵
- Checks computer location settings
PID:3792 -
C:\WINDOWS\SysWOW64\xpwrhhd.exe"C:\WINDOWS\SYSTEM32\xpwrhhd.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE114⤵
- Adds Run key to start application
- Modifies registry class
PID:872 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\XPWRHHD.EXE115⤵
- Drops file in System32 directory
- Modifies registry class
PID:4352 -
C:\WINDOWS\SysWOW64\fbhnpde.exe"C:\WINDOWS\SYSTEM32\fbhnpde.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE116⤵PID:4632
-
C:\WINDOWS\SysWOW64\fqfyste.exe"C:\WINDOWS\SYSTEM32\fqfyste.exe" mElTC:\WINDOWS\SYSWOW64\FBHNPDE.EXE117⤵
- Drops file in System32 directory
PID:4944 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\FQFYSTE.EXE118⤵PID:3212
-
C:\WINDOWS\SysWOW64\mnbgvte.exe"C:\WINDOWS\SYSTEM32\mnbgvte.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE119⤵
- Drops file in System32 directory
- Modifies registry class
PID:1076 -
C:\WINDOWS\SysWOW64\scvhost.exe"C:\WINDOWS\SYSTEM32\scvhost.exe" mElTC:\WINDOWS\SYSWOW64\MNBGVTE.EXE120⤵
- Adds Run key to start application
- Modifies registry class
PID:960 -
C:\WINDOWS\SysWOW64\apufrzb.exe"C:\WINDOWS\SYSTEM32\apufrzb.exe" mElTC:\WINDOWS\SYSWOW64\SCVHOST.EXE121⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3608 -
C:\WINDOWS\SysWOW64\cojaadm.exe"C:\WINDOWS\SYSTEM32\cojaadm.exe" mElTC:\WINDOWS\SYSWOW64\APUFRZB.EXE122⤵
- Adds Run key to start application
- Modifies registry class
PID:1108
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-