Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe
-
Size
246KB
-
MD5
9629fc742fc460b730eca4b26603970f
-
SHA1
b0ecfb60ff6c0f14faa88c4e7908e455a9c5e8c5
-
SHA256
a4f0fd25463e6899145939949e29f73fd8bc914a69304c3e032bbb15df895a49
-
SHA512
550bbba94b0d4ee9250b8aaba0d48e35c2aa946a6eaaba25569babce8370e39760fe4b93d8180eec835c3690be7c8a31e7bd6b21da5478b707c4d6b4f1630349
-
SSDEEP
6144:d/H+8pmvtzHm48oilMAOSf0XFdkzR9CnPYltB:dv+Ym1Y0AOSfaeR0nwfB
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2568 ueswrrd.exe 2104 bpyjolm.exe 2788 rivwpyw.exe 2944 ezqzght.exe 2896 grhpydb.exe 1408 bwxzzoh.exe 1268 vgqhepu.exe 804 pmgrfsa.exe 864 sexhxoz.exe 2272 kswmiqh.exe 784 xffcouf.exe 852 eqmhlow.exe 3048 jzukttu.exe 972 bolhevb.exe 1048 dylfwrj.exe 2368 yahcuph.exe 2192 azvssuv.exe 2600 aosxrky.exe 3024 plsxech.exe 2908 xlzxkjl.exe 2792 nxokufn.exe 2808 rntfqlz.exe 2644 gkbfcdi.exe 1772 uthifda.exe 2872 wexssgo.exe 2000 jurvbom.exe 1916 qoqayic.exe 3000 ayggdye.exe 1808 ndxarhh.exe 2836 xzythjq.exe 3020 kbeasou.exe 1812 uwftaiv.exe 1728 hconozg.exe 1444 usrqxze.exe 916 grmtfhj.exe 2288 qubdakx.exe 2420 dvhtmpc.exe 2180 qmkwuxz.exe 2276 dkfydff.exe 1640 qbabmfk.exe 1556 aepdhir.exe 332 nzhbnmq.exe 2916 ztnjyzc.exe 2772 jdctlci.exe 2056 wufwuco.exe 1056 geugpfu.exe 1536 wjubtsr.exe 1052 glkmgnx.exe 1256 tnqbsaj.exe 2884 gmteaih.exe 2304 scnzjin.exe 448 ftibsqs.exe 2016 phjzqyf.exe 272 cuaovce.exe 1460 pwgehgi.exe 1452 zywoujp.exe 604 plejyxl.exe 1680 zntutsa.exe 2244 lpabfee.exe 2068 ycjrkid.exe 2552 iqkpbpq.exe 2932 vhnrjqw.exe 1988 ifhusyt.exe 2664 vwcxagz.exe -
Loads dropped DLL 64 IoCs
pid Process 2536 9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe 2536 9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe 2568 ueswrrd.exe 2568 ueswrrd.exe 2104 bpyjolm.exe 2104 bpyjolm.exe 2788 rivwpyw.exe 2788 rivwpyw.exe 2944 ezqzght.exe 2944 ezqzght.exe 2896 grhpydb.exe 2896 grhpydb.exe 1408 bwxzzoh.exe 1408 bwxzzoh.exe 1268 vgqhepu.exe 1268 vgqhepu.exe 804 pmgrfsa.exe 804 pmgrfsa.exe 864 sexhxoz.exe 864 sexhxoz.exe 2272 kswmiqh.exe 2272 kswmiqh.exe 784 xffcouf.exe 784 xffcouf.exe 852 eqmhlow.exe 852 eqmhlow.exe 3048 jzukttu.exe 3048 jzukttu.exe 972 bolhevb.exe 972 bolhevb.exe 1048 dylfwrj.exe 1048 dylfwrj.exe 2368 yahcuph.exe 2368 yahcuph.exe 2384 snuxdvc.exe 2384 snuxdvc.exe 2600 aosxrky.exe 2600 aosxrky.exe 3024 plsxech.exe 3024 plsxech.exe 2908 xlzxkjl.exe 2908 xlzxkjl.exe 2792 nxokufn.exe 2792 nxokufn.exe 2808 rntfqlz.exe 2808 rntfqlz.exe 2644 gkbfcdi.exe 2644 gkbfcdi.exe 1772 uthifda.exe 1772 uthifda.exe 2872 wexssgo.exe 2872 wexssgo.exe 2000 jurvbom.exe 2000 jurvbom.exe 1916 qoqayic.exe 1916 qoqayic.exe 3000 ayggdye.exe 3000 ayggdye.exe 1808 ndxarhh.exe 1808 ndxarhh.exe 2836 xzythjq.exe 2836 xzythjq.exe 3020 kbeasou.exe 3020 kbeasou.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\jurvbom.exe wexssgo.exe File opened for modification C:\Windows\SysWOW64\ylqijyl.exe lnvfsyn.exe File created C:\Windows\SysWOW64\jlotsps.exe-up.txt jlotsps.exe File opened for modification C:\Windows\SysWOW64\viiugrq.exe lxsklob.exe File created C:\Windows\SysWOW64\xpeyomj.exe krbvfld.exe File created C:\Windows\SysWOW64\ndxarhh.exe ayggdye.exe File opened for modification C:\Windows\SysWOW64\sgabbrw.exe fhfzsrr.exe File created C:\Windows\SysWOW64\puscgbt.exe-up.txt puscgbt.exe File created C:\Windows\SysWOW64\psbrujt.exe cfkcofm.exe File opened for modification C:\Windows\SysWOW64\ojozwuq.exe bttxnul.exe File created C:\Windows\SysWOW64\uqnmxgq.exe hdwwrck.exe File created C:\Windows\SysWOW64\ldqncvf.exe-up.txt ldqncvf.exe File created C:\Windows\SysWOW64\uwelxgw.exe-up.txt uwelxgw.exe File created C:\Windows\SysWOW64\hvcrjnb.exe uehoafv.exe File created C:\Windows\SysWOW64\zkwjeoq.exe mutgwgk.exe File created C:\Windows\SysWOW64\vsfuflu.exe-up.txt vsfuflu.exe File created C:\Windows\SysWOW64\bttxnul.exe-up.txt bttxnul.exe File created C:\Windows\SysWOW64\ukmojvt.exe-up.txt ukmojvt.exe File created C:\Windows\SysWOW64\fnrrsvh.exe-up.txt fnrrsvh.exe File opened for modification C:\Windows\SysWOW64\ylvqdtg.exe lyeaxpi.exe File created C:\Windows\SysWOW64\mwkllft.exe-up.txt mwkllft.exe File opened for modification C:\Windows\SysWOW64\bttxnul.exe rftzpmg.exe File opened for modification C:\Windows\SysWOW64\jiumfpf.exe wooeuca.exe File opened for modification C:\Windows\SysWOW64\fgcltne.exe sizjkey.exe File created C:\Windows\SysWOW64\cuhzttt.exe-up.txt cuhzttt.exe File created C:\Windows\SysWOW64\mfafsvy.exe-up.txt mfafsvy.exe File opened for modification C:\Windows\SysWOW64\konexwn.exe xxtbpvi.exe File opened for modification C:\Windows\SysWOW64\blzbjfo.exe ojtlpbc.exe File opened for modification C:\Windows\SysWOW64\oxlxqtf.exe fjkaama.exe File created C:\Windows\SysWOW64\tgonpvh.exe-up.txt tgonpvh.exe File opened for modification C:\Windows\SysWOW64\qwwxkow.exe dxbubgq.exe File created C:\Windows\SysWOW64\mhxfrpd.exe-up.txt mhxfrpd.exe File opened for modification C:\Windows\SysWOW64\dqlfjmb.exe vekknze.exe File created C:\Windows\SysWOW64\mzzgjjz.exe-up.txt mzzgjjz.exe File created C:\Windows\SysWOW64\geugpfu.exe-up.txt geugpfu.exe File created C:\Windows\SysWOW64\fdmmxbl.exe sivxrfm.exe File created C:\Windows\SysWOW64\bwoayrp.exe-up.txt bwoayrp.exe File created C:\Windows\SysWOW64\dfxwzuk.exe qgutqme.exe File created C:\Windows\SysWOW64\rivwpyw.exe bpyjolm.exe File created C:\Windows\SysWOW64\qhgskgt.exe-up.txt qhgskgt.exe File created C:\Windows\SysWOW64\dppkynt.exe tmaalke.exe File created C:\Windows\SysWOW64\mtleqme.exe ciwudjq.exe File opened for modification C:\Windows\SysWOW64\jzukttu.exe eqmhlow.exe File created C:\Windows\SysWOW64\nxokufn.exe xlzxkjl.exe File created C:\Windows\SysWOW64\glkmgnx.exe-up.txt glkmgnx.exe File opened for modification C:\Windows\SysWOW64\ucfrsuz.exe iizchiv.exe File opened for modification C:\Windows\SysWOW64\ptenlng.exe cgnxfkh.exe File opened for modification C:\Windows\SysWOW64\lobqcdh.exe yxzntub.exe File created C:\Windows\SysWOW64\takbctu.exe-up.txt takbctu.exe File opened for modification C:\Windows\SysWOW64\kusencp.exe xhaohyq.exe File created C:\Windows\SysWOW64\csfclap.exe ptcadar.exe File created C:\Windows\SysWOW64\awulyoc.exe-up.txt awulyoc.exe File opened for modification C:\Windows\SysWOW64\vjlhfwd.exe ipfamjy.exe File created C:\Windows\SysWOW64\cdoxizj.exe-up.txt cdoxizj.exe File created C:\Windows\SysWOW64\syopeyb.exe isozozo.exe File created C:\Windows\SysWOW64\jthiuyd.exe-up.txt jthiuyd.exe File opened for modification C:\Windows\SysWOW64\srjeqyh.exe faobixb.exe File created C:\Windows\SysWOW64\lerciec.exe-up.txt lerciec.exe File created C:\Windows\SysWOW64\iqkpbpq.exe ycjrkid.exe File opened for modification C:\Windows\SysWOW64\xxtbpvi.exe nndztsc.exe File opened for modification C:\Windows\SysWOW64\mpdyjyn.exe cmonwdg.exe File created C:\Windows\SysWOW64\awulyoc.exe nyziqge.exe File created C:\Windows\SysWOW64\ggbmgws.exe-up.txt ggbmgws.exe File opened for modification C:\Windows\SysWOW64\zvsubzj.exe mtleqme.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvmquzq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbciztl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsfuflu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ioebauf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language guzvqkp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ydzahnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mwkllft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loverde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcckjgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plavjxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cqprxsj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wooeuca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcqdoud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geugpfu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nndztsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language levzarm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bwoayrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yimmuwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhiofoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ezqzght.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkoufbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oaaklum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxbubgq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnoewcm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ayggdye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crodguq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubldfwu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moxlask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lssftzc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language znyashs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kshzejc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language peftlyp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptjtsuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dylfwrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svbgkkp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqcmtuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wihmoou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ycugfxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rqutgth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language piwicvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crsibke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icyvmtr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdljomr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rysbhsg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnnxrfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language euhdfwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uwnanhq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vwesvpu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlgmsjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amyzouv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjkaama.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sscdioc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjxdeke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxdzdzu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnmuepf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ombvpyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcfobqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjgvjic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxfzxat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jokvjxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlzxkjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xzythjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzlokzu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snvnraf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2568 2536 9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2568 2536 9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2568 2536 9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe 30 PID 2536 wrote to memory of 2568 2536 9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2104 2568 ueswrrd.exe 31 PID 2568 wrote to memory of 2104 2568 ueswrrd.exe 31 PID 2568 wrote to memory of 2104 2568 ueswrrd.exe 31 PID 2568 wrote to memory of 2104 2568 ueswrrd.exe 31 PID 2104 wrote to memory of 2788 2104 bpyjolm.exe 33 PID 2104 wrote to memory of 2788 2104 bpyjolm.exe 33 PID 2104 wrote to memory of 2788 2104 bpyjolm.exe 33 PID 2104 wrote to memory of 2788 2104 bpyjolm.exe 33 PID 2788 wrote to memory of 2944 2788 rivwpyw.exe 34 PID 2788 wrote to memory of 2944 2788 rivwpyw.exe 34 PID 2788 wrote to memory of 2944 2788 rivwpyw.exe 34 PID 2788 wrote to memory of 2944 2788 rivwpyw.exe 34 PID 2944 wrote to memory of 2896 2944 ezqzght.exe 35 PID 2944 wrote to memory of 2896 2944 ezqzght.exe 35 PID 2944 wrote to memory of 2896 2944 ezqzght.exe 35 PID 2944 wrote to memory of 2896 2944 ezqzght.exe 35 PID 2896 wrote to memory of 1408 2896 grhpydb.exe 36 PID 2896 wrote to memory of 1408 2896 grhpydb.exe 36 PID 2896 wrote to memory of 1408 2896 grhpydb.exe 36 PID 2896 wrote to memory of 1408 2896 grhpydb.exe 36 PID 1408 wrote to memory of 1268 1408 bwxzzoh.exe 37 PID 1408 wrote to memory of 1268 1408 bwxzzoh.exe 37 PID 1408 wrote to memory of 1268 1408 bwxzzoh.exe 37 PID 1408 wrote to memory of 1268 1408 bwxzzoh.exe 37 PID 1268 wrote to memory of 804 1268 vgqhepu.exe 38 PID 1268 wrote to memory of 804 1268 vgqhepu.exe 38 PID 1268 wrote to memory of 804 1268 vgqhepu.exe 38 PID 1268 wrote to memory of 804 1268 vgqhepu.exe 38 PID 804 wrote to memory of 864 804 pmgrfsa.exe 39 PID 804 wrote to memory of 864 804 pmgrfsa.exe 39 PID 804 wrote to memory of 864 804 pmgrfsa.exe 39 PID 804 wrote to memory of 864 804 pmgrfsa.exe 39 PID 864 wrote to memory of 2272 864 sexhxoz.exe 40 PID 864 wrote to memory of 2272 864 sexhxoz.exe 40 PID 864 wrote to memory of 2272 864 sexhxoz.exe 40 PID 864 wrote to memory of 2272 864 sexhxoz.exe 40 PID 2272 wrote to memory of 784 2272 kswmiqh.exe 41 PID 2272 wrote to memory of 784 2272 kswmiqh.exe 41 PID 2272 wrote to memory of 784 2272 kswmiqh.exe 41 PID 2272 wrote to memory of 784 2272 kswmiqh.exe 41 PID 784 wrote to memory of 852 784 xffcouf.exe 42 PID 784 wrote to memory of 852 784 xffcouf.exe 42 PID 784 wrote to memory of 852 784 xffcouf.exe 42 PID 784 wrote to memory of 852 784 xffcouf.exe 42 PID 852 wrote to memory of 3048 852 eqmhlow.exe 43 PID 852 wrote to memory of 3048 852 eqmhlow.exe 43 PID 852 wrote to memory of 3048 852 eqmhlow.exe 43 PID 852 wrote to memory of 3048 852 eqmhlow.exe 43 PID 3048 wrote to memory of 972 3048 jzukttu.exe 44 PID 3048 wrote to memory of 972 3048 jzukttu.exe 44 PID 3048 wrote to memory of 972 3048 jzukttu.exe 44 PID 3048 wrote to memory of 972 3048 jzukttu.exe 44 PID 972 wrote to memory of 1048 972 bolhevb.exe 45 PID 972 wrote to memory of 1048 972 bolhevb.exe 45 PID 972 wrote to memory of 1048 972 bolhevb.exe 45 PID 972 wrote to memory of 1048 972 bolhevb.exe 45 PID 1048 wrote to memory of 2368 1048 dylfwrj.exe 46 PID 1048 wrote to memory of 2368 1048 dylfwrj.exe 46 PID 1048 wrote to memory of 2368 1048 dylfwrj.exe 46 PID 1048 wrote to memory of 2368 1048 dylfwrj.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\ueswrrd.exeC:\Windows\system32\ueswrrd.exe 468 "C:\Users\Admin\AppData\Local\Temp\9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\bpyjolm.exeC:\Windows\system32\bpyjolm.exe 532 "C:\Windows\SysWOW64\ueswrrd.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\rivwpyw.exeC:\Windows\system32\rivwpyw.exe 524 "C:\Windows\SysWOW64\bpyjolm.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\ezqzght.exeC:\Windows\system32\ezqzght.exe 528 "C:\Windows\SysWOW64\rivwpyw.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\grhpydb.exeC:\Windows\system32\grhpydb.exe 536 "C:\Windows\SysWOW64\ezqzght.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\bwxzzoh.exeC:\Windows\system32\bwxzzoh.exe 540 "C:\Windows\SysWOW64\grhpydb.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\vgqhepu.exeC:\Windows\system32\vgqhepu.exe 484 "C:\Windows\SysWOW64\bwxzzoh.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\pmgrfsa.exeC:\Windows\system32\pmgrfsa.exe 548 "C:\Windows\SysWOW64\vgqhepu.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\sexhxoz.exeC:\Windows\system32\sexhxoz.exe 556 "C:\Windows\SysWOW64\pmgrfsa.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\kswmiqh.exeC:\Windows\system32\kswmiqh.exe 560 "C:\Windows\SysWOW64\sexhxoz.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\xffcouf.exeC:\Windows\system32\xffcouf.exe 520 "C:\Windows\SysWOW64\kswmiqh.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\eqmhlow.exeC:\Windows\system32\eqmhlow.exe 564 "C:\Windows\SysWOW64\xffcouf.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\jzukttu.exeC:\Windows\system32\jzukttu.exe 544 "C:\Windows\SysWOW64\eqmhlow.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\bolhevb.exeC:\Windows\system32\bolhevb.exe 572 "C:\Windows\SysWOW64\jzukttu.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\dylfwrj.exeC:\Windows\system32\dylfwrj.exe 588 "C:\Windows\SysWOW64\bolhevb.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\yahcuph.exeC:\Windows\system32\yahcuph.exe 576 "C:\Windows\SysWOW64\dylfwrj.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2368 -
C:\Windows\SysWOW64\azvssuv.exeC:\Windows\system32\azvssuv.exe 604 "C:\Windows\SysWOW64\yahcuph.exe"18⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\snuxdvc.exeC:\Windows\system32\snuxdvc.exe 580 "C:\Windows\SysWOW64\azvssuv.exe"19⤵
- Loads dropped DLL
PID:2384 -
C:\Windows\SysWOW64\aosxrky.exeC:\Windows\system32\aosxrky.exe 600 "C:\Windows\SysWOW64\snuxdvc.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2600 -
C:\Windows\SysWOW64\plsxech.exeC:\Windows\system32\plsxech.exe 584 "C:\Windows\SysWOW64\aosxrky.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024 -
C:\Windows\SysWOW64\xlzxkjl.exeC:\Windows\system32\xlzxkjl.exe 596 "C:\Windows\SysWOW64\plsxech.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\nxokufn.exeC:\Windows\system32\nxokufn.exe 592 "C:\Windows\SysWOW64\xlzxkjl.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2792 -
C:\Windows\SysWOW64\rntfqlz.exeC:\Windows\system32\rntfqlz.exe 620 "C:\Windows\SysWOW64\nxokufn.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2808 -
C:\Windows\SysWOW64\gkbfcdi.exeC:\Windows\system32\gkbfcdi.exe 608 "C:\Windows\SysWOW64\rntfqlz.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644 -
C:\Windows\SysWOW64\uthifda.exeC:\Windows\system32\uthifda.exe 612 "C:\Windows\SysWOW64\gkbfcdi.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772 -
C:\Windows\SysWOW64\wexssgo.exeC:\Windows\system32\wexssgo.exe 628 "C:\Windows\SysWOW64\uthifda.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2872 -
C:\Windows\SysWOW64\jurvbom.exeC:\Windows\system32\jurvbom.exe 616 "C:\Windows\SysWOW64\wexssgo.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2000 -
C:\Windows\SysWOW64\qoqayic.exeC:\Windows\system32\qoqayic.exe 624 "C:\Windows\SysWOW64\jurvbom.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916 -
C:\Windows\SysWOW64\ayggdye.exeC:\Windows\system32\ayggdye.exe 632 "C:\Windows\SysWOW64\qoqayic.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\ndxarhh.exeC:\Windows\system32\ndxarhh.exe 636 "C:\Windows\SysWOW64\ayggdye.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808 -
C:\Windows\SysWOW64\xzythjq.exeC:\Windows\system32\xzythjq.exe 644 "C:\Windows\SysWOW64\ndxarhh.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\kbeasou.exeC:\Windows\system32\kbeasou.exe 640 "C:\Windows\SysWOW64\xzythjq.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3020 -
C:\Windows\SysWOW64\uwftaiv.exeC:\Windows\system32\uwftaiv.exe 648 "C:\Windows\SysWOW64\kbeasou.exe"34⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\hconozg.exeC:\Windows\system32\hconozg.exe 660 "C:\Windows\SysWOW64\uwftaiv.exe"35⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\usrqxze.exeC:\Windows\system32\usrqxze.exe 668 "C:\Windows\SysWOW64\hconozg.exe"36⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\grmtfhj.exeC:\Windows\system32\grmtfhj.exe 656 "C:\Windows\SysWOW64\usrqxze.exe"37⤵
- Executes dropped EXE
PID:916 -
C:\Windows\SysWOW64\qubdakx.exeC:\Windows\system32\qubdakx.exe 652 "C:\Windows\SysWOW64\grmtfhj.exe"38⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\dvhtmpc.exeC:\Windows\system32\dvhtmpc.exe 664 "C:\Windows\SysWOW64\qubdakx.exe"39⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\qmkwuxz.exeC:\Windows\system32\qmkwuxz.exe 680 "C:\Windows\SysWOW64\dvhtmpc.exe"40⤵
- Executes dropped EXE
PID:2180 -
C:\Windows\SysWOW64\dkfydff.exeC:\Windows\system32\dkfydff.exe 672 "C:\Windows\SysWOW64\qmkwuxz.exe"41⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\qbabmfk.exeC:\Windows\system32\qbabmfk.exe 684 "C:\Windows\SysWOW64\dkfydff.exe"42⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\aepdhir.exeC:\Windows\system32\aepdhir.exe 688 "C:\Windows\SysWOW64\qbabmfk.exe"43⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\nzhbnmq.exeC:\Windows\system32\nzhbnmq.exe 692 "C:\Windows\SysWOW64\aepdhir.exe"44⤵
- Executes dropped EXE
PID:332 -
C:\Windows\SysWOW64\ztnjyzc.exeC:\Windows\system32\ztnjyzc.exe 708 "C:\Windows\SysWOW64\nzhbnmq.exe"45⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\jdctlci.exeC:\Windows\system32\jdctlci.exe 696 "C:\Windows\SysWOW64\ztnjyzc.exe"46⤵
- Executes dropped EXE
PID:2772 -
C:\Windows\SysWOW64\wufwuco.exeC:\Windows\system32\wufwuco.exe 704 "C:\Windows\SysWOW64\jdctlci.exe"47⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\geugpfu.exeC:\Windows\system32\geugpfu.exe 676 "C:\Windows\SysWOW64\wufwuco.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\SysWOW64\wjubtsr.exeC:\Windows\system32\wjubtsr.exe 700 "C:\Windows\SysWOW64\geugpfu.exe"49⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\glkmgnx.exeC:\Windows\system32\glkmgnx.exe 716 "C:\Windows\SysWOW64\wjubtsr.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1052 -
C:\Windows\SysWOW64\tnqbsaj.exeC:\Windows\system32\tnqbsaj.exe 720 "C:\Windows\SysWOW64\glkmgnx.exe"51⤵
- Executes dropped EXE
PID:1256 -
C:\Windows\SysWOW64\gmteaih.exeC:\Windows\system32\gmteaih.exe 712 "C:\Windows\SysWOW64\tnqbsaj.exe"52⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\SysWOW64\scnzjin.exeC:\Windows\system32\scnzjin.exe 728 "C:\Windows\SysWOW64\gmteaih.exe"53⤵
- Executes dropped EXE
PID:2304 -
C:\Windows\SysWOW64\ftibsqs.exeC:\Windows\system32\ftibsqs.exe 740 "C:\Windows\SysWOW64\scnzjin.exe"54⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\phjzqyf.exeC:\Windows\system32\phjzqyf.exe 724 "C:\Windows\SysWOW64\ftibsqs.exe"55⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\cuaovce.exeC:\Windows\system32\cuaovce.exe 748 "C:\Windows\SysWOW64\phjzqyf.exe"56⤵
- Executes dropped EXE
PID:272 -
C:\Windows\SysWOW64\pwgehgi.exeC:\Windows\system32\pwgehgi.exe 732 "C:\Windows\SysWOW64\cuaovce.exe"57⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\zywoujp.exeC:\Windows\system32\zywoujp.exe 756 "C:\Windows\SysWOW64\pwgehgi.exe"58⤵
- Executes dropped EXE
PID:1452 -
C:\Windows\SysWOW64\plejyxl.exeC:\Windows\system32\plejyxl.exe 736 "C:\Windows\SysWOW64\zywoujp.exe"59⤵
- Executes dropped EXE
PID:604 -
C:\Windows\SysWOW64\zntutsa.exeC:\Windows\system32\zntutsa.exe 744 "C:\Windows\SysWOW64\plejyxl.exe"60⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\SysWOW64\lpabfee.exeC:\Windows\system32\lpabfee.exe 752 "C:\Windows\SysWOW64\zntutsa.exe"61⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\ycjrkid.exeC:\Windows\system32\ycjrkid.exe 760 "C:\Windows\SysWOW64\lpabfee.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2068 -
C:\Windows\SysWOW64\iqkpbpq.exeC:\Windows\system32\iqkpbpq.exe 768 "C:\Windows\SysWOW64\ycjrkid.exe"63⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\vhnrjqw.exeC:\Windows\system32\vhnrjqw.exe 764 "C:\Windows\SysWOW64\iqkpbpq.exe"64⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\ifhusyt.exeC:\Windows\system32\ifhusyt.exe 772 "C:\Windows\SysWOW64\vhnrjqw.exe"65⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\vwcxagz.exeC:\Windows\system32\vwcxagz.exe 780 "C:\Windows\SysWOW64\ifhusyt.exe"66⤵
- Executes dropped EXE
PID:2664 -
C:\Windows\SysWOW64\fhshwbf.exeC:\Windows\system32\fhshwbf.exe 776 "C:\Windows\SysWOW64\vwcxagz.exe"67⤵PID:2800
-
C:\Windows\SysWOW64\rbyxhor.exeC:\Windows\system32\rbyxhor.exe 784 "C:\Windows\SysWOW64\fhshwbf.exe"68⤵PID:2804
-
C:\Windows\SysWOW64\fopmnrq.exeC:\Windows\system32\fopmnrq.exe 788 "C:\Windows\SysWOW64\rbyxhor.exe"69⤵PID:2712
-
C:\Windows\SysWOW64\rmkpvaw.exeC:\Windows\system32\rmkpvaw.exe 792 "C:\Windows\SysWOW64\fopmnrq.exe"70⤵PID:2976
-
C:\Windows\SysWOW64\egqxhea.exeC:\Windows\system32\egqxhea.exe 800 "C:\Windows\SysWOW64\rmkpvaw.exe"71⤵PID:1732
-
C:\Windows\SysWOW64\rftzpmg.exeC:\Windows\system32\rftzpmg.exe 796 "C:\Windows\SysWOW64\egqxhea.exe"72⤵
- Drops file in System32 directory
PID:2624 -
C:\Windows\SysWOW64\bttxnul.exeC:\Windows\system32\bttxnul.exe 812 "C:\Windows\SysWOW64\rftzpmg.exe"73⤵
- Drops file in System32 directory
PID:2980 -
C:\Windows\SysWOW64\ojozwuq.exeC:\Windows\system32\ojozwuq.exe 816 "C:\Windows\SysWOW64\bttxnul.exe"74⤵PID:1208
-
C:\Windows\SysWOW64\sajcfcw.exeC:\Windows\system32\sajcfcw.exe 804 "C:\Windows\SysWOW64\ojozwuq.exe"75⤵PID:1200
-
C:\Windows\SysWOW64\fymfnkb.exeC:\Windows\system32\fymfnkb.exe 808 "C:\Windows\SysWOW64\sajcfcw.exe"76⤵PID:1600
-
C:\Windows\SysWOW64\pbbpafi.exeC:\Windows\system32\pbbpafi.exe 820 "C:\Windows\SysWOW64\fymfnkb.exe"77⤵PID:1948
-
C:\Windows\SysWOW64\cdhxusm.exeC:\Windows\system32\cdhxusm.exe 824 "C:\Windows\SysWOW64\pbbpafi.exe"78⤵PID:1932
-
C:\Windows\SysWOW64\ptcadar.exeC:\Windows\system32\ptcadar.exe 828 "C:\Windows\SysWOW64\cdhxusm.exe"79⤵
- Drops file in System32 directory
PID:1568 -
C:\Windows\SysWOW64\csfclap.exeC:\Windows\system32\csfclap.exe 832 "C:\Windows\SysWOW64\ptcadar.exe"80⤵PID:1748
-
C:\Windows\SysWOW64\muunydd.exeC:\Windows\system32\muunydd.exe 836 "C:\Windows\SysWOW64\csfclap.exe"81⤵PID:1604
-
C:\Windows\SysWOW64\chvicqa.exeC:\Windows\system32\chvicqa.exe 848 "C:\Windows\SysWOW64\muunydd.exe"82⤵PID:896
-
C:\Windows\SysWOW64\lnvfsyn.exeC:\Windows\system32\lnvfsyn.exe 840 "C:\Windows\SysWOW64\chvicqa.exe"83⤵
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\ylqijyl.exeC:\Windows\system32\ylqijyl.exe 844 "C:\Windows\SysWOW64\lnvfsyn.exe"84⤵PID:2564
-
C:\Windows\SysWOW64\lctcsgq.exeC:\Windows\system32\lctcsgq.exe 852 "C:\Windows\SysWOW64\ylqijyl.exe"85⤵PID:2492
-
C:\Windows\SysWOW64\yaofaow.exeC:\Windows\system32\yaofaow.exe 856 "C:\Windows\SysWOW64\lctcsgq.exe"86⤵PID:2764
-
C:\Windows\SysWOW64\lriijob.exeC:\Windows\system32\lriijob.exe 860 "C:\Windows\SysWOW64\yaofaow.exe"87⤵PID:2396
-
C:\Windows\SysWOW64\scpnyik.exeC:\Windows\system32\scpnyik.exe 876 "C:\Windows\SysWOW64\lriijob.exe"88⤵PID:2924
-
C:\Windows\SysWOW64\fakqoqp.exeC:\Windows\system32\fakqoqp.exe 868 "C:\Windows\SysWOW64\scpnyik.exe"89⤵PID:2704
-
C:\Windows\SysWOW64\srfsxzn.exeC:\Windows\system32\srfsxzn.exe 872 "C:\Windows\SysWOW64\fakqoqp.exe"90⤵PID:1928
-
C:\Windows\SysWOW64\fpivgzs.exeC:\Windows\system32\fpivgzs.exe 880 "C:\Windows\SysWOW64\srfsxzn.exe"91⤵PID:3008
-
C:\Windows\SysWOW64\psxftcz.exeC:\Windows\system32\psxftcz.exe 896 "C:\Windows\SysWOW64\fpivgzs.exe"92⤵PID:1724
-
C:\Windows\SysWOW64\crsibke.exeC:\Windows\system32\crsibke.exe 884 "C:\Windows\SysWOW64\psxftcz.exe"93⤵
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\phnlksk.exeC:\Windows\system32\phnlksk.exe 904 "C:\Windows\SysWOW64\crsibke.exe"94⤵PID:1484
-
C:\Windows\SysWOW64\yvniisx.exeC:\Windows\system32\yvniisx.exe 864 "C:\Windows\SysWOW64\phnlksk.exe"95⤵PID:1952
-
C:\Windows\SysWOW64\lifyovw.exeC:\Windows\system32\lifyovw.exe 888 "C:\Windows\SysWOW64\yvniisx.exe"96⤵PID:780
-
C:\Windows\SysWOW64\vhjvyud.exeC:\Windows\system32\vhjvyud.exe 892 "C:\Windows\SysWOW64\lifyovw.exe"97⤵PID:976
-
C:\Windows\SysWOW64\lbgiiig.exeC:\Windows\system32\lbgiiig.exe 900 "C:\Windows\SysWOW64\vhjvyud.exe"98⤵PID:1592
-
C:\Windows\SysWOW64\yrilrql.exeC:\Windows\system32\yrilrql.exe 908 "C:\Windows\SysWOW64\lbgiiig.exe"99⤵PID:1892
-
C:\Windows\SysWOW64\icyvmtr.exeC:\Windows\system32\icyvmtr.exe 916 "C:\Windows\SysWOW64\yrilrql.exe"100⤵
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Windows\SysWOW64\uwelxgw.exeC:\Windows\system32\uwelxgw.exe 912 "C:\Windows\SysWOW64\icyvmtr.exe"101⤵
- Drops file in System32 directory
PID:2316 -
C:\Windows\SysWOW64\huzoggb.exeC:\Windows\system32\huzoggb.exe 924 "C:\Windows\SysWOW64\uwelxgw.exe"102⤵PID:2188
-
C:\Windows\SysWOW64\ulbqooz.exeC:\Windows\system32\ulbqooz.exe 920 "C:\Windows\SysWOW64\huzoggb.exe"103⤵PID:2472
-
C:\Windows\SysWOW64\hjwtxwe.exeC:\Windows\system32\hjwtxwe.exe 940 "C:\Windows\SysWOW64\ulbqooz.exe"104⤵PID:1504
-
C:\Windows\SysWOW64\rpxinws.exeC:\Windows\system32\rpxinws.exe 928 "C:\Windows\SysWOW64\hjwtxwe.exe"105⤵PID:2520
-
C:\Windows\SysWOW64\eoslwex.exeC:\Windows\system32\eoslwex.exe 932 "C:\Windows\SysWOW64\rpxinws.exe"106⤵PID:2832
-
C:\Windows\SysWOW64\rbjbjiw.exeC:\Windows\system32\rbjbjiw.exe 936 "C:\Windows\SysWOW64\eoslwex.exe"107⤵PID:1752
-
C:\Windows\SysWOW64\apkyzpj.exeC:\Windows\system32\apkyzpj.exe 956 "C:\Windows\SysWOW64\rbjbjiw.exe"108⤵PID:2284
-
C:\Windows\SysWOW64\qtktdug.exeC:\Windows\system32\qtktdug.exe 948 "C:\Windows\SysWOW64\apkyzpj.exe"109⤵PID:1472
-
C:\Windows\SysWOW64\ahlrtct.exeC:\Windows\system32\ahlrtct.exe 952 "C:\Windows\SysWOW64\qtktdug.exe"110⤵PID:2328
-
C:\Windows\SysWOW64\nygtckq.exeC:\Windows\system32\nygtckq.exe 960 "C:\Windows\SysWOW64\ahlrtct.exe"111⤵PID:1364
-
C:\Windows\SysWOW64\awiwlkw.exeC:\Windows\system32\awiwlkw.exe 944 "C:\Windows\SysWOW64\nygtckq.exe"112⤵PID:304
-
C:\Windows\SysWOW64\nndztsc.exeC:\Windows\system32\nndztsc.exe 964 "C:\Windows\SysWOW64\awiwlkw.exe"113⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:856 -
C:\Windows\SysWOW64\xxtbpvi.exeC:\Windows\system32\xxtbpvi.exe 972 "C:\Windows\SysWOW64\nndztsc.exe"114⤵
- Drops file in System32 directory
PID:584 -
C:\Windows\SysWOW64\konexwn.exeC:\Windows\system32\konexwn.exe 968 "C:\Windows\SysWOW64\xxtbpvi.exe"115⤵PID:1008
-
C:\Windows\SysWOW64\tzlokzu.exeC:\Windows\system32\tzlokzu.exe 980 "C:\Windows\SysWOW64\konexwn.exe"116⤵
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\jdljomr.exeC:\Windows\system32\jdljomr.exe 976 "C:\Windows\SysWOW64\tzlokzu.exe"117⤵
- System Location Discovery: System Language Discovery
PID:276 -
C:\Windows\SysWOW64\trmgmte.exeC:\Windows\system32\trmgmte.exe 988 "C:\Windows\SysWOW64\jdljomr.exe"118⤵PID:2580
-
C:\Windows\SysWOW64\dqqexsl.exeC:\Windows\system32\dqqexsl.exe 984 "C:\Windows\SysWOW64\trmgmte.exe"119⤵PID:2060
-
C:\Windows\SysWOW64\qhthfsr.exeC:\Windows\system32\qhthfsr.exe 992 "C:\Windows\SysWOW64\dqqexsl.exe"120⤵PID:1924
-
C:\Windows\SysWOW64\ducwlwq.exeC:\Windows\system32\ducwlwq.exe 996 "C:\Windows\SysWOW64\qhthfsr.exe"121⤵PID:2936
-
C:\Windows\SysWOW64\nerhyzw.exeC:\Windows\system32\nerhyzw.exe 1012 "C:\Windows\SysWOW64\ducwlwq.exe"122⤵PID:2780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-