Analysis
-
max time kernel
55s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 13:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
67c9216af3be5ce570a99047a8c873d9_JaffaCakes118.exe
Resource
win7-20240708-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
67c9216af3be5ce570a99047a8c873d9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
6 signatures
150 seconds
General
-
Target
67c9216af3be5ce570a99047a8c873d9_JaffaCakes118.exe
-
Size
264KB
-
MD5
67c9216af3be5ce570a99047a8c873d9
-
SHA1
da7b9f50556664fb60af0022d2bd2f0609b5f3f0
-
SHA256
59b41d0f3f73043568e4451c83adf116d48ca220650388b364466233411e1241
-
SHA512
b6978aced93390568da138e343abce9a86c6780a82963e3ee575b5da012e9f7873816cc7cfd73606d4b42ae8994686d2d05a4a348e8e804f3b83d2d21fa25c69
-
SSDEEP
3072:Qr9ApVxVnSbKhSI77xliHheKIVvnMJbo7+7zPmj59utxYSi:R7fIK5nxlCePniboa7zPmKx
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 32 4696 Process not Found 36 4696 Process not Found 39 4696 Process not Found 40 4696 Process not Found 42 4696 Process not Found -
Executes dropped EXE 64 IoCs
pid Process 4724 csrss.exe 2784 csrss.exe 1756 csrss.exe 4296 csrss.exe 1216 csrss.exe 2156 csrss.exe 672 csrss.exe 2404 csrss.exe 4092 csrss.exe 2960 csrss.exe 4440 csrss.exe 3608 csrss.exe 2616 csrss.exe 4644 csrss.exe 4720 csrss.exe 3452 csrss.exe 1496 csrss.exe 4360 csrss.exe 1116 csrss.exe 2136 csrss.exe 1824 csrss.exe 2776 csrss.exe 2740 csrss.exe 4584 csrss.exe 544 csrss.exe 3940 csrss.exe 3948 csrss.exe 5044 csrss.exe 1204 csrss.exe 3972 csrss.exe 2272 csrss.exe 2520 csrss.exe 4084 csrss.exe 3380 csrss.exe 4320 csrss.exe 3984 csrss.exe 2736 csrss.exe 3356 csrss.exe 4520 csrss.exe 3600 csrss.exe 1048 csrss.exe 3768 csrss.exe 4780 csrss.exe 1860 csrss.exe 4996 csrss.exe 2008 csrss.exe 3116 csrss.exe 3076 csrss.exe 2448 csrss.exe 4812 csrss.exe 1864 csrss.exe 2872 csrss.exe 2952 csrss.exe 2988 csrss.exe 844 csrss.exe 2368 csrss.exe 2148 csrss.exe 4176 csrss.exe 4036 csrss.exe 2344 csrss.exe 2228 csrss.exe 3708 csrss.exe 2428 csrss.exe 4200 csrss.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\tkyixg\csrss.exe Process not Found File created C:\Windows\SysWOW64\mybtlk\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\kvpncnp Process not Found File created C:\Windows\SysWOW64\lgtvvkvkam\csrss.exe Process not Found File created C:\Windows\SysWOW64\zqqcatun\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\grzrnpfku\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\loteqi csrss.exe File opened for modification C:\Windows\SysWOW64\vfluog\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\qnjnxmog\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\otqyvgrtjh csrss.exe File opened for modification C:\Windows\SysWOW64\vbibcphaeb\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\agodrq Process not Found File created C:\Windows\SysWOW64\shbkig\csrss.exe Process not Found File created C:\Windows\SysWOW64\cjzgfk\csrss.exe csrss.exe File created C:\Windows\SysWOW64\cdpwwohc\csrss.exe csrss.exe File created C:\Windows\SysWOW64\nkeyjelx\csrss.exe Process not Found File created C:\Windows\SysWOW64\nikerhc\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\dylmqrtjxn\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\ejfsaejdtq csrss.exe File opened for modification C:\Windows\SysWOW64\ahkoklmghm Process not Found File created C:\Windows\SysWOW64\zkatvdlj\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\qmlqujiufu\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\swkhxq csrss.exe File opened for modification C:\Windows\SysWOW64\qdowgrot Process not Found File created C:\Windows\SysWOW64\phezvwy\csrss.exe Process not Found File created C:\Windows\SysWOW64\xjxvhoxqvn\csrss.exe csrss.exe File created C:\Windows\SysWOW64\elbgly\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\hthdwibrf Process not Found File opened for modification C:\Windows\SysWOW64\nlqpainwe\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\poobxxbl csrss.exe File opened for modification C:\Windows\SysWOW64\cqlcxn\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\azetivrp\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\xoocsmkktz\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\uphiqxl csrss.exe File created C:\Windows\SysWOW64\ahkoklmghm\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\jixgyyo\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\kadicjtk\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\kuptppuasy\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\cuqqyowtm csrss.exe File opened for modification C:\Windows\SysWOW64\mzyckma\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\yrltbrzxmc\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\rbvcnue\csrss.exe Process not Found File created C:\Windows\SysWOW64\ojwyzkhmia\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\licvlrqd Process not Found File opened for modification C:\Windows\SysWOW64\jyfoya Process not Found File created C:\Windows\SysWOW64\fxtvwh\csrss.exe Process not Found File created C:\Windows\SysWOW64\rrcvmoye\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\nxdoas Process not Found File opened for modification C:\Windows\SysWOW64\dylkufecsc Process not Found File opened for modification C:\Windows\SysWOW64\jxkbngjn Process not Found File opened for modification C:\Windows\SysWOW64\ibwqstyus Process not Found File created C:\Windows\SysWOW64\bnolqblrv\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\fgppkzzhh csrss.exe File opened for modification C:\Windows\SysWOW64\vnlfewxsr csrss.exe File opened for modification C:\Windows\SysWOW64\bkggmj Process not Found File opened for modification C:\Windows\SysWOW64\skghln\csrss.exe Process not Found File opened for modification C:\Windows\SysWOW64\dbtrsppaos\csrss.exe Process not Found File created C:\Windows\SysWOW64\uphiqxl\csrss.exe csrss.exe File created C:\Windows\SysWOW64\eltaocve\csrss.exe Process not Found File created C:\Windows\SysWOW64\zmmliuboyq\csrss.exe Process not Found File created C:\Windows\SysWOW64\enmuhz\csrss.exe Process not Found File created C:\Windows\SysWOW64\oonencnc\csrss.exe Process not Found File created C:\Windows\SysWOW64\yntojmj\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\jqfmlqsvk\csrss.exe Process not Found -
Runs ping.exe 1 TTPs 64 IoCs
pid Process 7760 Process not Found 5456 PING.EXE 9660 Process not Found 7488 Process not Found 7940 Process not Found 6500 PING.EXE 9496 Process not Found 9932 Process not Found 7304 PING.EXE 6360 Process not Found 5788 Process not Found 9528 Process not Found 9896 Process not Found 6852 PING.EXE 8320 Process not Found 7388 PING.EXE 5336 PING.EXE 5884 Process not Found 8160 Process not Found 4672 Process not Found 9040 Process not Found 3544 Process not Found 8292 PING.EXE 2288 PING.EXE 9312 Process not Found 1116 Process not Found 3388 Process not Found 7692 Process not Found 4596 Process not Found 6840 Process not Found 3408 Process not Found 2668 Process not Found 6832 Process not Found 10148 Process not Found 3408 PING.EXE 7728 PING.EXE 6972 Process not Found 8120 Process not Found 2192 Process not Found 736 Process not Found 9344 Process not Found 7696 Process not Found 6588 Process not Found 5364 Process not Found 7656 Process not Found 8624 Process not Found 7212 PING.EXE 7432 PING.EXE 9568 Process not Found 7240 Process not Found 9516 PING.EXE 5184 PING.EXE 6316 Process not Found 8472 Process not Found 8468 Process not Found 5412 Process not Found 10060 Process not Found 7252 Process not Found 9808 Process not Found 1336 Process not Found 7244 Process not Found 8656 PING.EXE 8640 Process not Found 1100 PING.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2340 67c9216af3be5ce570a99047a8c873d9_JaffaCakes118.exe 4724 csrss.exe 2784 csrss.exe 1756 csrss.exe 4296 csrss.exe 1216 csrss.exe 2156 csrss.exe 672 csrss.exe 2404 csrss.exe 4092 csrss.exe 2960 csrss.exe 4440 csrss.exe 3608 csrss.exe 2616 csrss.exe 4644 csrss.exe 4720 csrss.exe 3452 csrss.exe 1496 csrss.exe 4360 csrss.exe 1116 csrss.exe 2136 csrss.exe 1824 csrss.exe 2776 csrss.exe 2740 csrss.exe 4584 csrss.exe 544 csrss.exe 3940 csrss.exe 3948 csrss.exe 5044 csrss.exe 1204 csrss.exe 3972 csrss.exe 2272 csrss.exe 2520 csrss.exe 4084 csrss.exe 3380 csrss.exe 4320 csrss.exe 3984 csrss.exe 2736 csrss.exe 3356 csrss.exe 4520 csrss.exe 3600 csrss.exe 1048 csrss.exe 3768 csrss.exe 4780 csrss.exe 1860 csrss.exe 4996 csrss.exe 2008 csrss.exe 3116 csrss.exe 3076 csrss.exe 2448 csrss.exe 4812 csrss.exe 1864 csrss.exe 2872 csrss.exe 2952 csrss.exe 2988 csrss.exe 844 csrss.exe 2368 csrss.exe 2148 csrss.exe 4176 csrss.exe 4036 csrss.exe 2344 csrss.exe 2228 csrss.exe 3708 csrss.exe 2428 csrss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 4724 2340 67c9216af3be5ce570a99047a8c873d9_JaffaCakes118.exe 83 PID 2340 wrote to memory of 4724 2340 67c9216af3be5ce570a99047a8c873d9_JaffaCakes118.exe 83 PID 2340 wrote to memory of 4724 2340 67c9216af3be5ce570a99047a8c873d9_JaffaCakes118.exe 83 PID 4724 wrote to memory of 2784 4724 csrss.exe 84 PID 4724 wrote to memory of 2784 4724 csrss.exe 84 PID 4724 wrote to memory of 2784 4724 csrss.exe 84 PID 2784 wrote to memory of 1756 2784 csrss.exe 85 PID 2784 wrote to memory of 1756 2784 csrss.exe 85 PID 2784 wrote to memory of 1756 2784 csrss.exe 85 PID 1756 wrote to memory of 4296 1756 csrss.exe 86 PID 1756 wrote to memory of 4296 1756 csrss.exe 86 PID 1756 wrote to memory of 4296 1756 csrss.exe 86 PID 4296 wrote to memory of 1216 4296 csrss.exe 87 PID 4296 wrote to memory of 1216 4296 csrss.exe 87 PID 4296 wrote to memory of 1216 4296 csrss.exe 87 PID 1216 wrote to memory of 2156 1216 csrss.exe 88 PID 1216 wrote to memory of 2156 1216 csrss.exe 88 PID 1216 wrote to memory of 2156 1216 csrss.exe 88 PID 2156 wrote to memory of 672 2156 csrss.exe 89 PID 2156 wrote to memory of 672 2156 csrss.exe 89 PID 2156 wrote to memory of 672 2156 csrss.exe 89 PID 672 wrote to memory of 2404 672 csrss.exe 90 PID 672 wrote to memory of 2404 672 csrss.exe 90 PID 672 wrote to memory of 2404 672 csrss.exe 90 PID 2404 wrote to memory of 4092 2404 csrss.exe 92 PID 2404 wrote to memory of 4092 2404 csrss.exe 92 PID 2404 wrote to memory of 4092 2404 csrss.exe 92 PID 4092 wrote to memory of 2960 4092 csrss.exe 93 PID 4092 wrote to memory of 2960 4092 csrss.exe 93 PID 4092 wrote to memory of 2960 4092 csrss.exe 93 PID 2960 wrote to memory of 4440 2960 csrss.exe 95 PID 2960 wrote to memory of 4440 2960 csrss.exe 95 PID 2960 wrote to memory of 4440 2960 csrss.exe 95 PID 4440 wrote to memory of 3608 4440 csrss.exe 96 PID 4440 wrote to memory of 3608 4440 csrss.exe 96 PID 4440 wrote to memory of 3608 4440 csrss.exe 96 PID 3608 wrote to memory of 2616 3608 csrss.exe 97 PID 3608 wrote to memory of 2616 3608 csrss.exe 97 PID 3608 wrote to memory of 2616 3608 csrss.exe 97 PID 2616 wrote to memory of 4644 2616 csrss.exe 98 PID 2616 wrote to memory of 4644 2616 csrss.exe 98 PID 2616 wrote to memory of 4644 2616 csrss.exe 98 PID 4644 wrote to memory of 4720 4644 csrss.exe 100 PID 4644 wrote to memory of 4720 4644 csrss.exe 100 PID 4644 wrote to memory of 4720 4644 csrss.exe 100 PID 4720 wrote to memory of 3452 4720 csrss.exe 101 PID 4720 wrote to memory of 3452 4720 csrss.exe 101 PID 4720 wrote to memory of 3452 4720 csrss.exe 101 PID 3452 wrote to memory of 1496 3452 csrss.exe 102 PID 3452 wrote to memory of 1496 3452 csrss.exe 102 PID 3452 wrote to memory of 1496 3452 csrss.exe 102 PID 1496 wrote to memory of 4360 1496 csrss.exe 103 PID 1496 wrote to memory of 4360 1496 csrss.exe 103 PID 1496 wrote to memory of 4360 1496 csrss.exe 103 PID 4360 wrote to memory of 1116 4360 csrss.exe 104 PID 4360 wrote to memory of 1116 4360 csrss.exe 104 PID 4360 wrote to memory of 1116 4360 csrss.exe 104 PID 1116 wrote to memory of 2136 1116 csrss.exe 105 PID 1116 wrote to memory of 2136 1116 csrss.exe 105 PID 1116 wrote to memory of 2136 1116 csrss.exe 105 PID 2136 wrote to memory of 1824 2136 csrss.exe 106 PID 2136 wrote to memory of 1824 2136 csrss.exe 106 PID 2136 wrote to memory of 1824 2136 csrss.exe 106 PID 1824 wrote to memory of 2776 1824 csrss.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\67c9216af3be5ce570a99047a8c873d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\67c9216af3be5ce570a99047a8c873d9_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\oaadnmgh\csrss.exeC:\Windows\system32\oaadnmgh\csrss.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\uxmjzqv\csrss.exeC:\Windows\system32\uxmjzqv\csrss.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\oyglqb\csrss.exeC:\Windows\system32\oyglqb\csrss.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\vvsqdgblrg\csrss.exeC:\Windows\system32\vvsqdgblrg\csrss.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\aabcixk\csrss.exeC:\Windows\system32\aabcixk\csrss.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\vwqwkjr\csrss.exeC:\Windows\system32\vwqwkjr\csrss.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\ayhklnqszc\csrss.exeC:\Windows\system32\ayhklnqszc\csrss.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\ibwzwthoc\csrss.exeC:\Windows\system32\ibwzwthoc\csrss.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\iovpnibr\csrss.exeC:\Windows\system32\iovpnibr\csrss.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\bsgqih\csrss.exeC:\Windows\system32\bsgqih\csrss.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\znhckmzvdy\csrss.exeC:\Windows\system32\znhckmzvdy\csrss.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\ybgsbbuyi\csrss.exeC:\Windows\system32\ybgsbbuyi\csrss.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\fysxofjt\csrss.exeC:\Windows\system32\fysxofjt\csrss.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\xgigxdtjza\csrss.exeC:\Windows\system32\xgigxdtjza\csrss.exe15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\scxaapzraf\csrss.exeC:\Windows\system32\scxaapzraf\csrss.exe16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\xhgmegi\csrss.exeC:\Windows\system32\xhgmegi\csrss.exe17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\znjwdikp\csrss.exeC:\Windows\system32\znjwdikp\csrss.exe18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\zaimux\csrss.exeC:\Windows\system32\zaimux\csrss.exe19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\guctcokrhs\csrss.exeC:\Windows\system32\guctcokrhs\csrss.exe20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\gibjtcftl\csrss.exeC:\Windows\system32\gibjtcftl\csrss.exe21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\zlnjobfe\csrss.exeC:\Windows\system32\zlnjobfe\csrss.exe22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\zzmzfq\csrss.exeC:\Windows\system32\zzmzfq\csrss.exe23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Windows\SysWOW64\ajtrrrkmdz\csrss.exeC:\Windows\system32\ajtrrrkmdz\csrss.exe24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Windows\SysWOW64\ggfwevait\csrss.exeC:\Windows\system32\ggfwevait\csrss.exe25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4584 -
C:\Windows\SysWOW64\guemvkvl\csrss.exeC:\Windows\system32\guemvkvl\csrss.exe26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:544 -
C:\Windows\SysWOW64\ghdcmzp\csrss.exeC:\Windows\system32\ghdcmzp\csrss.exe27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3940 -
C:\Windows\SysWOW64\kmreku\csrss.exeC:\Windows\system32\kmreku\csrss.exe28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3948 -
C:\Windows\SysWOW64\qjdkxyxwje\csrss.exeC:\Windows\system32\qjdkxyxwje\csrss.exe29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5044 -
C:\Windows\SysWOW64\xgppjdnsz\csrss.exeC:\Windows\system32\xgppjdnsz\csrss.exe30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1204 -
C:\Windows\SysWOW64\ddbvwico\csrss.exeC:\Windows\system32\ddbvwico\csrss.exe31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3972 -
C:\Windows\SysWOW64\dralmwx\csrss.exeC:\Windows\system32\dralmwx\csrss.exe32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Windows\SysWOW64\klvsvn\csrss.exeC:\Windows\system32\klvsvn\csrss.exe33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2520 -
C:\Windows\SysWOW64\eogsqmdzu\csrss.exeC:\Windows\system32\eogsqmdzu\csrss.exe34⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4084 -
C:\Windows\SysWOW64\kltycqsv\csrss.exeC:\Windows\system32\kltycqsv\csrss.exe35⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3380 -
C:\Windows\SysWOW64\qifdpvi\csrss.exeC:\Windows\system32\qifdpvi\csrss.exe36⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4320 -
C:\Windows\SysWOW64\xfrjczy\csrss.exeC:\Windows\system32\xfrjczy\csrss.exe37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3984 -
C:\Windows\SysWOW64\yqyaoajsmy\csrss.exeC:\Windows\system32\yqyaoajsmy\csrss.exe38⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Windows\SysWOW64\poislxhc\csrss.exeC:\Windows\system32\poislxhc\csrss.exe39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3356 -
C:\Windows\SysWOW64\wluxxcx\csrss.exeC:\Windows\system32\wluxxcx\csrss.exe40⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4520 -
C:\Windows\SysWOW64\xrwhweyy\csrss.exeC:\Windows\system32\xrwhweyy\csrss.exe41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3600 -
C:\Windows\SysWOW64\xevxns\csrss.exeC:\Windows\system32\xevxns\csrss.exe42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1048 -
C:\Windows\SysWOW64\lidtrz\csrss.exeC:\Windows\system32\lidtrz\csrss.exe43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3768 -
C:\Windows\SysWOW64\sfpzedjoje\csrss.exeC:\Windows\system32\sfpzedjoje\csrss.exe44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780 -
C:\Windows\SysWOW64\ycbeqiyjz\csrss.exeC:\Windows\system32\ycbeqiyjz\csrss.exe45⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1860 -
C:\Windows\SysWOW64\ljbzzcjy\csrss.exeC:\Windows\system32\ljbzzcjy\csrss.exe46⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4996 -
C:\Windows\SysWOW64\rgnflhy\csrss.exeC:\Windows\system32\rgnflhy\csrss.exe47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Windows\SysWOW64\tsxncokjay\csrss.exeC:\Windows\system32\tsxncokjay\csrss.exe48⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3116 -
C:\Windows\SysWOW64\binmwg\csrss.exeC:\Windows\system32\binmwg\csrss.exe49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3076 -
C:\Windows\SysWOW64\nwjoxnkt\csrss.exeC:\Windows\system32\nwjoxnkt\csrss.exe50⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Windows\SysWOW64\ttvtjsa\csrss.exeC:\Windows\system32\ttvtjsa\csrss.exe51⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4812 -
C:\Windows\SysWOW64\bjlsekwi\csrss.exeC:\Windows\system32\bjlsekwi\csrss.exe52⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1864 -
C:\Windows\SysWOW64\opknmegw\csrss.exeC:\Windows\system32\opknmegw\csrss.exe53⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Windows\SysWOW64\urbbnhfxjy\csrss.exeC:\Windows\system32\urbbnhfxjy\csrss.exe54⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Windows\SysWOW64\pnrvpumfjd\csrss.exeC:\Windows\system32\pnrvpumfjd\csrss.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Windows\SysWOW64\cuqqyowtm\csrss.exeC:\Windows\system32\cuqqyowtm\csrss.exe56⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Windows\SysWOW64\ircvktmp\csrss.exeC:\Windows\system32\ircvktmp\csrss.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Windows\SysWOW64\poobxxbl\csrss.exeC:\Windows\system32\poobxxbl\csrss.exe58⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Windows\SysWOW64\cvowfrm\csrss.exeC:\Windows\system32\cvowfrm\csrss.exe59⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4176 -
C:\Windows\SysWOW64\uqfoyabmry\csrss.exeC:\Windows\system32\uqfoyabmry\csrss.exe60⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4036 -
C:\Windows\SysWOW64\bnsukfqhh\csrss.exeC:\Windows\system32\bnsukfqhh\csrss.exe61⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Windows\SysWOW64\ctudjhriu\csrss.exeC:\Windows\system32\ctudjhriu\csrss.exe62⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Windows\SysWOW64\cgttawml\csrss.exeC:\Windows\system32\cgttawml\csrss.exe63⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3708 -
C:\Windows\SysWOW64\nupvad\csrss.exeC:\Windows\system32\nupvad\csrss.exe64⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Windows\SysWOW64\vojcjtwaaz\csrss.exeC:\Windows\system32\vojcjtwaaz\csrss.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4200 -
C:\Windows\SysWOW64\uphiqxl\csrss.exeC:\Windows\system32\uphiqxl\csrss.exe66⤵PID:4872
-
C:\Windows\SysWOW64\wvkspzmg\csrss.exeC:\Windows\system32\wvkspzmg\csrss.exe67⤵PID:1712
-
C:\Windows\SysWOW64\cswxbdc\csrss.exeC:\Windows\system32\cswxbdc\csrss.exe68⤵PID:2168
-
C:\Windows\SysWOW64\anwjei\csrss.exeC:\Windows\system32\anwjei\csrss.exe69⤵PID:3872
-
C:\Windows\SysWOW64\zbvzvxuzv\csrss.exeC:\Windows\system32\zbvzvxuzv\csrss.exe70⤵PID:3824
-
C:\Windows\SysWOW64\zouplmpc\csrss.exeC:\Windows\system32\zouplmpc\csrss.exe71⤵PID:5112
-
C:\Windows\SysWOW64\zbtgcbk\csrss.exeC:\Windows\system32\zbtgcbk\csrss.exe72⤵PID:2560
-
C:\Windows\SysWOW64\laxzqjzb\csrss.exeC:\Windows\system32\laxzqjzb\csrss.exe73⤵PID:1092
-
C:\Windows\SysWOW64\gwmtsvfj\csrss.exeC:\Windows\system32\gwmtsvfj\csrss.exe74⤵PID:4156
-
C:\Windows\SysWOW64\ntyyfzvf\csrss.exeC:\Windows\system32\ntyyfzvf\csrss.exe75⤵PID:2256
-
C:\Windows\SysWOW64\tqkerek\csrss.exeC:\Windows\system32\tqkerek\csrss.exe76⤵PID:3876
-
C:\Windows\SysWOW64\blflau\csrss.exeC:\Windows\system32\blflau\csrss.exe77⤵PID:1792
-
C:\Windows\SysWOW64\mzbmbbuq\csrss.exeC:\Windows\system32\mzbmbbuq\csrss.exe78⤵PID:4484
-
C:\Windows\SysWOW64\swnsngj\csrss.exeC:\Windows\system32\swnsngj\csrss.exe79⤵PID:512
-
C:\Windows\SysWOW64\ucpbmilm\csrss.exeC:\Windows\system32\ucpbmilm\csrss.exe80⤵PID:2864
-
C:\Windows\SysWOW64\uporcxf\csrss.exeC:\Windows\system32\uporcxf\csrss.exe81⤵PID:4012
-
C:\Windows\SysWOW64\bjjyln\csrss.exeC:\Windows\system32\bjjyln\csrss.exe82⤵PID:1588
-
C:\Windows\SysWOW64\mxfamupe\csrss.exeC:\Windows\system32\mxfamupe\csrss.exe83⤵PID:3556
-
C:\Windows\SysWOW64\bkhetrbt\csrss.exeC:\Windows\system32\bkhetrbt\csrss.exe84⤵PID:3236
-
C:\Windows\SysWOW64\mydgty\csrss.exeC:\Windows\system32\mydgty\csrss.exe85⤵PID:1980
-
C:\Windows\SysWOW64\qdqistxxjw\csrss.exeC:\Windows\system32\qdqistxxjw\csrss.exe86⤵PID:2372
-
C:\Windows\SysWOW64\jhcinsxh\csrss.exeC:\Windows\system32\jhcinsxh\csrss.exe87⤵PID:4732
-
C:\Windows\SysWOW64\edrcpedpd\csrss.exeC:\Windows\system32\edrcpedpd\csrss.exe88⤵
- Drops file in System32 directory
PID:2308 -
C:\Windows\SysWOW64\kadicjtk\csrss.exeC:\Windows\system32\kadicjtk\csrss.exe89⤵PID:4728
-
C:\Windows\SysWOW64\xhddkdd\csrss.exeC:\Windows\system32\xhddkdd\csrss.exe90⤵PID:5160
-
C:\Windows\SysWOW64\yskuxe\csrss.exeC:\Windows\system32\yskuxe\csrss.exe91⤵PID:5204
-
C:\Windows\SysWOW64\yfjkosjhv\csrss.exeC:\Windows\system32\yfjkosjhv\csrss.exe92⤵PID:5248
-
C:\Windows\SysWOW64\qdsckphr\csrss.exeC:\Windows\system32\qdsckphr\csrss.exe93⤵PID:5292
-
C:\Windows\SysWOW64\jgecfo\csrss.exeC:\Windows\system32\jgecfo\csrss.exe94⤵PID:5340
-
C:\Windows\SysWOW64\rbyjofnabw\csrss.exeC:\Windows\system32\rbyjofnabw\csrss.exe95⤵PID:5392
-
C:\Windows\SysWOW64\shbsmhoanv\csrss.exeC:\Windows\system32\shbsmhoanv\csrss.exe96⤵PID:5464
-
C:\Windows\SysWOW64\qbwpvidg\csrss.exeC:\Windows\system32\qbwpvidg\csrss.exe97⤵PID:5516
-
C:\Windows\SysWOW64\shzzukeg\csrss.exeC:\Windows\system32\shzzukeg\csrss.exe98⤵PID:5564
-
C:\Windows\SysWOW64\svypkzz\csrss.exeC:\Windows\system32\svypkzz\csrss.exe99⤵PID:5608
-
C:\Windows\SysWOW64\gyglpf\csrss.exeC:\Windows\system32\gyglpf\csrss.exe100⤵PID:5652
-
C:\Windows\SysWOW64\mvsrbkpwkb\csrss.exeC:\Windows\system32\mvsrbkpwkb\csrss.exe101⤵PID:5696
-
C:\Windows\SysWOW64\ssewopesa\csrss.exeC:\Windows\system32\ssewopesa\csrss.exe102⤵
- Drops file in System32 directory
PID:5740 -
C:\Windows\SysWOW64\zqqcatun\csrss.exeC:\Windows\system32\zqqcatun\csrss.exe103⤵PID:5788
-
C:\Windows\SysWOW64\mwqxjnec\csrss.exeC:\Windows\system32\mwqxjnec\csrss.exe104⤵PID:5836
-
C:\Windows\SysWOW64\cidtqd\csrss.exeC:\Windows\system32\cidtqd\csrss.exe105⤵PID:5880
-
C:\Windows\SysWOW64\hnmguuqbu\csrss.exeC:\Windows\system32\hnmguuqbu\csrss.exe106⤵PID:5924
-
C:\Windows\SysWOW64\wzokbqcq\csrss.exeC:\Windows\system32\wzokbqcq\csrss.exe107⤵PID:5972
-
C:\Windows\SysWOW64\wmnasfw\csrss.exeC:\Windows\system32\wmnasfw\csrss.exe108⤵PID:6016
-
C:\Windows\SysWOW64\wxusfg\csrss.exeC:\Windows\system32\wxusfg\csrss.exe109⤵PID:6060
-
C:\Windows\SysWOW64\ilqtfnlqc\csrss.exeC:\Windows\system32\ilqtfnlqc\csrss.exe110⤵PID:6104
-
C:\Windows\SysWOW64\dhfnizsxd\csrss.exeC:\Windows\system32\dhfnizsxd\csrss.exe111⤵PID:4148
-
C:\Windows\SysWOW64\jertveht\csrss.exeC:\Windows\system32\jertveht\csrss.exe112⤵PID:5188
-
C:\Windows\SysWOW64\qbdyhix\csrss.exeC:\Windows\system32\qbdyhix\csrss.exe113⤵
- Drops file in System32 directory
PID:5256 -
C:\Windows\SysWOW64\qmlqujiufu\csrss.exeC:\Windows\system32\qmlqujiufu\csrss.exe114⤵
- Drops file in System32 directory
PID:5364 -
C:\Windows\SysWOW64\xjxvhoxqvn\csrss.exeC:\Windows\system32\xjxvhoxqvn\csrss.exe115⤵PID:5496
-
C:\Windows\SysWOW64\xwwlxcst\csrss.exeC:\Windows\system32\xwwlxcst\csrss.exe116⤵PID:5616
-
C:\Windows\SysWOW64\iksnyj\csrss.exeC:\Windows\system32\iksnyj\csrss.exe117⤵PID:5688
-
C:\Windows\SysWOW64\pfmuhacibw\csrss.exeC:\Windows\system32\pfmuhacibw\csrss.exe118⤵PID:5860
-
C:\Windows\SysWOW64\kbbojmiqca\csrss.exeC:\Windows\system32\kbbojmiqca\csrss.exe119⤵PID:5956
-
C:\Windows\SysWOW64\pfkaodro\csrss.exeC:\Windows\system32\pfkaodro\csrss.exe120⤵PID:6040
-
C:\Windows\SysWOW64\kczurqyw\csrss.exeC:\Windows\system32\kczurqyw\csrss.exe121⤵PID:6100
-
C:\Windows\SysWOW64\mojchxjltu\csrss.exeC:\Windows\system32\mojchxjltu\csrss.exe122⤵PID:5168
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-