Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe
-
Size
102KB
-
MD5
d5060836445f33cc9dceb93d0425a64a
-
SHA1
9ba7bac9cd8411893009d59f5e3c6171dbb2d868
-
SHA256
ed0e1ecfc2a50ee7924d20d3fb12ce2103b268eb31c1fa6e05542fd41e683ff0
-
SHA512
e72afd40177da1fb39fc350b4b5061b0b05378cc7623a5c74d744d1e39265c4fb03d004102b3cfb1cb5d599e20dbe08cdb03218b77a0c5839438c5e68760ee87
-
SSDEEP
3072:JcXw9QQYAbYK0Pug7Fed5xddQXZUXn/X1cE:NYASug7Fe/7KpUXntcE
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 884 xwqdmmpfl.exe 2568 hhnoipvzy.exe 2080 opaouefrf.exe 2948 whzgitjeg.exe 2608 lehovlkyg.exe 1564 ydcrdtqfz.exe 2560 ifstrxwzm.exe 572 qjcgiihph.exe 2404 gznohrcma.exe 1920 sqqrxzitb.exe 2308 uafblcono.exe 2780 zcowbiubv.exe 1124 rqmbebbup.exe 1712 bbcmzfhwb.exe 2944 orwpinndc.exe 672 yqjmslvdc.exe 2008 gywembwvc.exe 1732 qtxxuvfsp.exe 1584 dssrceczq.exe 296 hmizbovej.exe 2076 axnrjlvdq.exe 2292 ixmrqazyq.exe 2984 xuurcsakr.exe 2232 joahnfmtw.exe 2660 xjsxtalgl.exe 2496 gpsuriydk.exe 1392 tonxaqwkl.exe 1568 geisjybrm.exe 1928 qpxcwtily.exe 2400 aojhosply.exe 2020 qskusfmff.exe 1056 pahnsbctt.exe 796 ntchojyot.exe 872 xtgfyhfot.exe 2132 hdvpukmig.exe 1376 rchvejtig.exe 892 gweioxwzu.exe 2120 ujoxtbuma.exe 2252 dxovjiiih.exe 1716 qnrxarnpa.exe 2336 dmmajrtxb.exe 3044 nobkwuzro.exe 2344 abtacyyec.exe 2368 kmilpbmyp.exe 2704 xcdngjkfq.exe 2044 hntyteyhc.exe 1320 udvsbmwod.exe 2516 huqvkubvw.exe 2744 rfgffyhxj.exe 1668 esxvltgcx.exe 1968 rqsyucmjy.exe 2240 athihfslk.exe 2012 njklpnytl.exe 1852 xuzvlqeny.exe 2864 kkuytqjcz.exe 1220 xjpbcypjs.exe 2472 hlmlpbvde.exe 2124 mywbvxuqt.exe 1272 wmxytfhms.exe 1624 jzoozigrg.exe 2164 wyjrhrmgh.exe 1684 gaybvusbu.exe 3016 tzbeduxiu.exe 2208 dcroyxekh.exe -
Loads dropped DLL 64 IoCs
pid Process 2904 d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe 2904 d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe 884 xwqdmmpfl.exe 884 xwqdmmpfl.exe 2568 hhnoipvzy.exe 2568 hhnoipvzy.exe 2080 opaouefrf.exe 2080 opaouefrf.exe 2948 whzgitjeg.exe 2948 whzgitjeg.exe 2608 lehovlkyg.exe 2608 lehovlkyg.exe 1564 ydcrdtqfz.exe 1564 ydcrdtqfz.exe 2560 ifstrxwzm.exe 2560 ifstrxwzm.exe 572 qjcgiihph.exe 572 qjcgiihph.exe 2404 gznohrcma.exe 2404 gznohrcma.exe 1920 sqqrxzitb.exe 1920 sqqrxzitb.exe 2308 uafblcono.exe 2308 uafblcono.exe 2780 zcowbiubv.exe 2780 zcowbiubv.exe 1124 rqmbebbup.exe 1124 rqmbebbup.exe 1712 bbcmzfhwb.exe 1712 bbcmzfhwb.exe 2944 orwpinndc.exe 2944 orwpinndc.exe 672 yqjmslvdc.exe 672 yqjmslvdc.exe 2008 gywembwvc.exe 2008 gywembwvc.exe 1732 qtxxuvfsp.exe 1732 qtxxuvfsp.exe 1584 dssrceczq.exe 1584 dssrceczq.exe 296 hmizbovej.exe 296 hmizbovej.exe 2076 axnrjlvdq.exe 2076 axnrjlvdq.exe 2292 ixmrqazyq.exe 2292 ixmrqazyq.exe 2984 xuurcsakr.exe 2984 xuurcsakr.exe 2232 joahnfmtw.exe 2232 joahnfmtw.exe 2660 xjsxtalgl.exe 2660 xjsxtalgl.exe 2496 gpsuriydk.exe 2496 gpsuriydk.exe 1392 tonxaqwkl.exe 1392 tonxaqwkl.exe 1568 geisjybrm.exe 1568 geisjybrm.exe 1928 qpxcwtily.exe 1928 qpxcwtily.exe 2400 aojhosply.exe 2400 aojhosply.exe 2020 qskusfmff.exe 2020 qskusfmff.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\aojhosply.exe qpxcwtily.exe File created C:\Windows\SysWOW64\ufxwtazqg.exe gsggnwads.exe File opened for modification C:\Windows\SysWOW64\ofcecinwd.exe evnuhfzuq.exe File created C:\Windows\SysWOW64\uwfbmlztf.exe ejxgixcyq.exe File opened for modification C:\Windows\SysWOW64\nsrizkikt.exe dqbydhuqh.exe File created C:\Windows\SysWOW64\zrmlhkosu.exe nsrizkikt.exe File opened for modification C:\Windows\SysWOW64\zcowbiubv.exe uafblcono.exe File created C:\Windows\SysWOW64\lxwsumwhw.exe ykmcoixui.exe File created C:\Windows\SysWOW64\acuqieegl.exe qottkeqje.exe File opened for modification C:\Windows\SysWOW64\advfwlgjl.exe nnbcodabk.exe File created C:\Windows\SysWOW64\otoujpahx.exe bgwedlbcr.exe File created C:\Windows\SysWOW64\ruuzgsknu.exe edzxyjfgt.exe File opened for modification C:\Windows\SysWOW64\ugsanmbfi.exe hqpxeeeyp.exe File created C:\Windows\SysWOW64\qetgwywpr.exe dgzegyqzq.exe File created C:\Windows\SysWOW64\ykmcoixui.exe owmeyakxi.exe File opened for modification C:\Windows\SysWOW64\qrtthgaxf.exe cecdbcbkq.exe File created C:\Windows\SysWOW64\rchvejtig.exe hdvpukmig.exe File created C:\Windows\SysWOW64\yvnyrpmwe.exe tiwillfjq.exe File created C:\Windows\SysWOW64\cbqeqpnxu.exe pkvbhhhqu.exe File opened for modification C:\Windows\SysWOW64\gobsyulrt.exe tyzpqmnks.exe File opened for modification C:\Windows\SysWOW64\xuzvlqeny.exe njklpnytl.exe File created C:\Windows\SysWOW64\qalrhfjra.exe dcroyxekh.exe File opened for modification C:\Windows\SysWOW64\yuadhrtju.exe lzqobvvwg.exe File created C:\Windows\SysWOW64\ngmmggvrg.exe dsloqhiug.exe File opened for modification C:\Windows\SysWOW64\qoppdajtw.exe dyummsdmw.exe File created C:\Windows\SysWOW64\iaoxhyhya.exe ybkawziza.exe File opened for modification C:\Windows\SysWOW64\aogiwqaas.exe npdgoictr.exe File created C:\Windows\SysWOW64\olutrnwpy.exe ddhwzowxy.exe File created C:\Windows\SysWOW64\aaqkxleqi.exe njnipdyjh.exe File opened for modification C:\Windows\SysWOW64\tckzatsic.exe gmhwrlmbb.exe File opened for modification C:\Windows\SysWOW64\ghlvobvcl.exe xwvlbxpaz.exe File created C:\Windows\SysWOW64\otujohqec.exe jjloycsqd.exe File opened for modification C:\Windows\SysWOW64\luewklcfq.exe yzuhepdab.exe File created C:\Windows\SysWOW64\aragjlmbk.exe qhlwoqggp.exe File created C:\Windows\SysWOW64\ptiwxcfpx.exe fjtlkhznl.exe File created C:\Windows\SysWOW64\gwzkczqtv.exe tyfiurkmc.exe File opened for modification C:\Windows\SysWOW64\rfkjmcpoy.exe huuzzzjul.exe File created C:\Windows\SysWOW64\eoqdiicrl.exe rxvbraxkk.exe File opened for modification C:\Windows\SysWOW64\wjoothiri.exe jtumlzcjh.exe File created C:\Windows\SysWOW64\wzpkovvmo.exe mosabrhsc.exe File created C:\Windows\SysWOW64\dnheudvmk.exe uzghevipl.exe File created C:\Windows\SysWOW64\ensqqwqjl.exe rxpoiolck.exe File opened for modification C:\Windows\SysWOW64\rbffaxzvm.exe eckcrpunl.exe File created C:\Windows\SysWOW64\mwghwbuzj.exe zflfnaosi.exe File opened for modification C:\Windows\SysWOW64\xwqdmmpfl.exe d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe File created C:\Windows\SysWOW64\hivmbxunm.exe uraktpoft.exe File created C:\Windows\SysWOW64\fokazehoy.exe syqyqekhf.exe File created C:\Windows\SysWOW64\jtumlzcjh.exe wczjczxcg.exe File created C:\Windows\SysWOW64\dqqtfiazx.exe ranrxavkw.exe File opened for modification C:\Windows\SysWOW64\xjavuvjxc.exe ktgslnlqj.exe File created C:\Windows\SysWOW64\hmizbovej.exe dssrceczq.exe File opened for modification C:\Windows\SysWOW64\ugctzczsc.exe ieodnxvip.exe File opened for modification C:\Windows\SysWOW64\ifstrxwzm.exe ydcrdtqfz.exe File created C:\Windows\SysWOW64\dsloqhiug.exe qtimhzlnf.exe File opened for modification C:\Windows\SysWOW64\sowsujxol.exe fytqmbzhl.exe File opened for modification C:\Windows\SysWOW64\uzozapjjx.exe ibuxjhdcw.exe File opened for modification C:\Windows\SysWOW64\tgporueyh.exe jsoqbnrbh.exe File opened for modification C:\Windows\SysWOW64\ntchojyot.exe pahnsbctt.exe File created C:\Windows\SysWOW64\wmxytfhms.exe mywbvxuqt.exe File opened for modification C:\Windows\SysWOW64\xjzinknhy.exe kkefwkhax.exe File opened for modification C:\Windows\SysWOW64\vuszeiyej.exe ivxxvasxi.exe File created C:\Windows\SysWOW64\gqiulvdpc.exe tdqefrwlo.exe File created C:\Windows\SysWOW64\xjavuvjxc.exe ktgslnlqj.exe File created C:\Windows\SysWOW64\gznohrcma.exe qjcgiihph.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzezobxop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccpgmejzq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vajypxxae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gepaqnpqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fqeqcrewp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acuqieegl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wijukjpmy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsimiaqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language krdakxvzp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbmebrbsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jcehrslyf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dsvuodcgt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtzunksaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ufxwtazqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxxxkjjkj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nujzyfqrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ypukrgysa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwqdmmpfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhsdoxpzw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zdhtiivae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wkeydvabi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gjienhmgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtdprfvgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hqmteuqxc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xctolntuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alecszqtz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gwkpcjvch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zduxgruhp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srysuemal.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjavuvjxc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kaacybgsn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hpgwoztpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zflfnaosi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjulbtjol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ybkawziza.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xkfzptaku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zhdouvwyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pzalmhwil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trfkkjqdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptiwxcfpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbrkbtpkw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmcavxtwl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxucyuhdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpsuriydk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjloycsqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gaptpotvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dqbydhuqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wczjczxcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language laubgheup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gqiulvdpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nzbgnbgro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pzthypsen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ixmrqazyq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpdcnnkrw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language owmeyakxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbtdyvlzp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jncvtvhgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iijygwnmx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yfjxmlido.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pahnsbctt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npdgoictr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxwpzbfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wzpkovvmo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 884 2904 d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe 28 PID 2904 wrote to memory of 884 2904 d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe 28 PID 2904 wrote to memory of 884 2904 d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe 28 PID 2904 wrote to memory of 884 2904 d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe 28 PID 884 wrote to memory of 2568 884 xwqdmmpfl.exe 29 PID 884 wrote to memory of 2568 884 xwqdmmpfl.exe 29 PID 884 wrote to memory of 2568 884 xwqdmmpfl.exe 29 PID 884 wrote to memory of 2568 884 xwqdmmpfl.exe 29 PID 2568 wrote to memory of 2080 2568 hhnoipvzy.exe 30 PID 2568 wrote to memory of 2080 2568 hhnoipvzy.exe 30 PID 2568 wrote to memory of 2080 2568 hhnoipvzy.exe 30 PID 2568 wrote to memory of 2080 2568 hhnoipvzy.exe 30 PID 2080 wrote to memory of 2948 2080 opaouefrf.exe 31 PID 2080 wrote to memory of 2948 2080 opaouefrf.exe 31 PID 2080 wrote to memory of 2948 2080 opaouefrf.exe 31 PID 2080 wrote to memory of 2948 2080 opaouefrf.exe 31 PID 2948 wrote to memory of 2608 2948 whzgitjeg.exe 32 PID 2948 wrote to memory of 2608 2948 whzgitjeg.exe 32 PID 2948 wrote to memory of 2608 2948 whzgitjeg.exe 32 PID 2948 wrote to memory of 2608 2948 whzgitjeg.exe 32 PID 2608 wrote to memory of 1564 2608 lehovlkyg.exe 33 PID 2608 wrote to memory of 1564 2608 lehovlkyg.exe 33 PID 2608 wrote to memory of 1564 2608 lehovlkyg.exe 33 PID 2608 wrote to memory of 1564 2608 lehovlkyg.exe 33 PID 1564 wrote to memory of 2560 1564 ydcrdtqfz.exe 34 PID 1564 wrote to memory of 2560 1564 ydcrdtqfz.exe 34 PID 1564 wrote to memory of 2560 1564 ydcrdtqfz.exe 34 PID 1564 wrote to memory of 2560 1564 ydcrdtqfz.exe 34 PID 2560 wrote to memory of 572 2560 ifstrxwzm.exe 35 PID 2560 wrote to memory of 572 2560 ifstrxwzm.exe 35 PID 2560 wrote to memory of 572 2560 ifstrxwzm.exe 35 PID 2560 wrote to memory of 572 2560 ifstrxwzm.exe 35 PID 572 wrote to memory of 2404 572 qjcgiihph.exe 36 PID 572 wrote to memory of 2404 572 qjcgiihph.exe 36 PID 572 wrote to memory of 2404 572 qjcgiihph.exe 36 PID 572 wrote to memory of 2404 572 qjcgiihph.exe 36 PID 2404 wrote to memory of 1920 2404 gznohrcma.exe 37 PID 2404 wrote to memory of 1920 2404 gznohrcma.exe 37 PID 2404 wrote to memory of 1920 2404 gznohrcma.exe 37 PID 2404 wrote to memory of 1920 2404 gznohrcma.exe 37 PID 1920 wrote to memory of 2308 1920 sqqrxzitb.exe 38 PID 1920 wrote to memory of 2308 1920 sqqrxzitb.exe 38 PID 1920 wrote to memory of 2308 1920 sqqrxzitb.exe 38 PID 1920 wrote to memory of 2308 1920 sqqrxzitb.exe 38 PID 2308 wrote to memory of 2780 2308 uafblcono.exe 39 PID 2308 wrote to memory of 2780 2308 uafblcono.exe 39 PID 2308 wrote to memory of 2780 2308 uafblcono.exe 39 PID 2308 wrote to memory of 2780 2308 uafblcono.exe 39 PID 2780 wrote to memory of 1124 2780 zcowbiubv.exe 40 PID 2780 wrote to memory of 1124 2780 zcowbiubv.exe 40 PID 2780 wrote to memory of 1124 2780 zcowbiubv.exe 40 PID 2780 wrote to memory of 1124 2780 zcowbiubv.exe 40 PID 1124 wrote to memory of 1712 1124 rqmbebbup.exe 41 PID 1124 wrote to memory of 1712 1124 rqmbebbup.exe 41 PID 1124 wrote to memory of 1712 1124 rqmbebbup.exe 41 PID 1124 wrote to memory of 1712 1124 rqmbebbup.exe 41 PID 1712 wrote to memory of 2944 1712 bbcmzfhwb.exe 42 PID 1712 wrote to memory of 2944 1712 bbcmzfhwb.exe 42 PID 1712 wrote to memory of 2944 1712 bbcmzfhwb.exe 42 PID 1712 wrote to memory of 2944 1712 bbcmzfhwb.exe 42 PID 2944 wrote to memory of 672 2944 orwpinndc.exe 43 PID 2944 wrote to memory of 672 2944 orwpinndc.exe 43 PID 2944 wrote to memory of 672 2944 orwpinndc.exe 43 PID 2944 wrote to memory of 672 2944 orwpinndc.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\xwqdmmpfl.exeC:\Windows\system32\xwqdmmpfl.exe 492 "C:\Users\Admin\AppData\Local\Temp\d5060836445f33cc9dceb93d0425a64a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\hhnoipvzy.exeC:\Windows\system32\hhnoipvzy.exe 532 "C:\Windows\SysWOW64\xwqdmmpfl.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\opaouefrf.exeC:\Windows\system32\opaouefrf.exe 536 "C:\Windows\SysWOW64\hhnoipvzy.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\whzgitjeg.exeC:\Windows\system32\whzgitjeg.exe 548 "C:\Windows\SysWOW64\opaouefrf.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\lehovlkyg.exeC:\Windows\system32\lehovlkyg.exe 540 "C:\Windows\SysWOW64\whzgitjeg.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\ydcrdtqfz.exeC:\Windows\system32\ydcrdtqfz.exe 552 "C:\Windows\SysWOW64\lehovlkyg.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\ifstrxwzm.exeC:\Windows\system32\ifstrxwzm.exe 544 "C:\Windows\SysWOW64\ydcrdtqfz.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\qjcgiihph.exeC:\Windows\system32\qjcgiihph.exe 560 "C:\Windows\SysWOW64\ifstrxwzm.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\gznohrcma.exeC:\Windows\system32\gznohrcma.exe 556 "C:\Windows\SysWOW64\qjcgiihph.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\sqqrxzitb.exeC:\Windows\system32\sqqrxzitb.exe 576 "C:\Windows\SysWOW64\gznohrcma.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\uafblcono.exeC:\Windows\system32\uafblcono.exe 564 "C:\Windows\SysWOW64\sqqrxzitb.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\zcowbiubv.exeC:\Windows\system32\zcowbiubv.exe 568 "C:\Windows\SysWOW64\uafblcono.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\rqmbebbup.exeC:\Windows\system32\rqmbebbup.exe 572 "C:\Windows\SysWOW64\zcowbiubv.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\bbcmzfhwb.exeC:\Windows\system32\bbcmzfhwb.exe 580 "C:\Windows\SysWOW64\rqmbebbup.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\orwpinndc.exeC:\Windows\system32\orwpinndc.exe 584 "C:\Windows\SysWOW64\bbcmzfhwb.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\yqjmslvdc.exeC:\Windows\system32\yqjmslvdc.exe 600 "C:\Windows\SysWOW64\orwpinndc.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:672 -
C:\Windows\SysWOW64\gywembwvc.exeC:\Windows\system32\gywembwvc.exe 588 "C:\Windows\SysWOW64\yqjmslvdc.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008 -
C:\Windows\SysWOW64\qtxxuvfsp.exeC:\Windows\system32\qtxxuvfsp.exe 592 "C:\Windows\SysWOW64\gywembwvc.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1732 -
C:\Windows\SysWOW64\dssrceczq.exeC:\Windows\system32\dssrceczq.exe 524 "C:\Windows\SysWOW64\qtxxuvfsp.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\hmizbovej.exeC:\Windows\system32\hmizbovej.exe 604 "C:\Windows\SysWOW64\dssrceczq.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:296 -
C:\Windows\SysWOW64\axnrjlvdq.exeC:\Windows\system32\axnrjlvdq.exe 608 "C:\Windows\SysWOW64\hmizbovej.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2076 -
C:\Windows\SysWOW64\ixmrqazyq.exeC:\Windows\system32\ixmrqazyq.exe 616 "C:\Windows\SysWOW64\axnrjlvdq.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\xuurcsakr.exeC:\Windows\system32\xuurcsakr.exe 612 "C:\Windows\SysWOW64\ixmrqazyq.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984 -
C:\Windows\SysWOW64\joahnfmtw.exeC:\Windows\system32\joahnfmtw.exe 624 "C:\Windows\SysWOW64\xuurcsakr.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2232 -
C:\Windows\SysWOW64\xjsxtalgl.exeC:\Windows\system32\xjsxtalgl.exe 620 "C:\Windows\SysWOW64\joahnfmtw.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2660 -
C:\Windows\SysWOW64\gpsuriydk.exeC:\Windows\system32\gpsuriydk.exe 628 "C:\Windows\SysWOW64\xjsxtalgl.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\tonxaqwkl.exeC:\Windows\system32\tonxaqwkl.exe 632 "C:\Windows\SysWOW64\gpsuriydk.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1392 -
C:\Windows\SysWOW64\geisjybrm.exeC:\Windows\system32\geisjybrm.exe 636 "C:\Windows\SysWOW64\tonxaqwkl.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1568 -
C:\Windows\SysWOW64\qpxcwtily.exeC:\Windows\system32\qpxcwtily.exe 640 "C:\Windows\SysWOW64\geisjybrm.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1928 -
C:\Windows\SysWOW64\aojhosply.exeC:\Windows\system32\aojhosply.exe 648 "C:\Windows\SysWOW64\qpxcwtily.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400 -
C:\Windows\SysWOW64\qskusfmff.exeC:\Windows\system32\qskusfmff.exe 656 "C:\Windows\SysWOW64\aojhosply.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2020 -
C:\Windows\SysWOW64\pahnsbctt.exeC:\Windows\system32\pahnsbctt.exe 488 "C:\Windows\SysWOW64\qskusfmff.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\SysWOW64\ntchojyot.exeC:\Windows\system32\ntchojyot.exe 512 "C:\Windows\SysWOW64\pahnsbctt.exe"34⤵
- Executes dropped EXE
PID:796 -
C:\Windows\SysWOW64\xtgfyhfot.exeC:\Windows\system32\xtgfyhfot.exe 672 "C:\Windows\SysWOW64\ntchojyot.exe"35⤵
- Executes dropped EXE
PID:872 -
C:\Windows\SysWOW64\hdvpukmig.exeC:\Windows\system32\hdvpukmig.exe 664 "C:\Windows\SysWOW64\xtgfyhfot.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2132 -
C:\Windows\SysWOW64\rchvejtig.exeC:\Windows\system32\rchvejtig.exe 660 "C:\Windows\SysWOW64\hdvpukmig.exe"37⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\gweioxwzu.exeC:\Windows\system32\gweioxwzu.exe 668 "C:\Windows\SysWOW64\rchvejtig.exe"38⤵
- Executes dropped EXE
PID:892 -
C:\Windows\SysWOW64\ujoxtbuma.exeC:\Windows\system32\ujoxtbuma.exe 684 "C:\Windows\SysWOW64\gweioxwzu.exe"39⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\dxovjiiih.exeC:\Windows\system32\dxovjiiih.exe 676 "C:\Windows\SysWOW64\ujoxtbuma.exe"40⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\qnrxarnpa.exeC:\Windows\system32\qnrxarnpa.exe 688 "C:\Windows\SysWOW64\dxovjiiih.exe"41⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\dmmajrtxb.exeC:\Windows\system32\dmmajrtxb.exe 692 "C:\Windows\SysWOW64\qnrxarnpa.exe"42⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\nobkwuzro.exeC:\Windows\system32\nobkwuzro.exe 696 "C:\Windows\SysWOW64\dmmajrtxb.exe"43⤵
- Executes dropped EXE
PID:3044 -
C:\Windows\SysWOW64\abtacyyec.exeC:\Windows\system32\abtacyyec.exe 680 "C:\Windows\SysWOW64\nobkwuzro.exe"44⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\SysWOW64\kmilpbmyp.exeC:\Windows\system32\kmilpbmyp.exe 720 "C:\Windows\SysWOW64\abtacyyec.exe"45⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\xcdngjkfq.exeC:\Windows\system32\xcdngjkfq.exe 700 "C:\Windows\SysWOW64\kmilpbmyp.exe"46⤵
- Executes dropped EXE
PID:2704 -
C:\Windows\SysWOW64\hntyteyhc.exeC:\Windows\system32\hntyteyhc.exe 704 "C:\Windows\SysWOW64\xcdngjkfq.exe"47⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\udvsbmwod.exeC:\Windows\system32\udvsbmwod.exe 708 "C:\Windows\SysWOW64\hntyteyhc.exe"48⤵
- Executes dropped EXE
PID:1320 -
C:\Windows\SysWOW64\huqvkubvw.exeC:\Windows\system32\huqvkubvw.exe 712 "C:\Windows\SysWOW64\udvsbmwod.exe"49⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\rfgffyhxj.exeC:\Windows\system32\rfgffyhxj.exe 716 "C:\Windows\SysWOW64\huqvkubvw.exe"50⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\esxvltgcx.exeC:\Windows\system32\esxvltgcx.exe 724 "C:\Windows\SysWOW64\rfgffyhxj.exe"51⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\rqsyucmjy.exeC:\Windows\system32\rqsyucmjy.exe 728 "C:\Windows\SysWOW64\esxvltgcx.exe"52⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\athihfslk.exeC:\Windows\system32\athihfslk.exe 736 "C:\Windows\SysWOW64\rqsyucmjy.exe"53⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\njklpnytl.exeC:\Windows\system32\njklpnytl.exe 732 "C:\Windows\SysWOW64\athihfslk.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\xuzvlqeny.exeC:\Windows\system32\xuzvlqeny.exe 740 "C:\Windows\SysWOW64\njklpnytl.exe"55⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\kkuytqjcz.exeC:\Windows\system32\kkuytqjcz.exe 744 "C:\Windows\SysWOW64\xuzvlqeny.exe"56⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\SysWOW64\xjpbcypjs.exeC:\Windows\system32\xjpbcypjs.exe 748 "C:\Windows\SysWOW64\kkuytqjcz.exe"57⤵
- Executes dropped EXE
PID:1220 -
C:\Windows\SysWOW64\hlmlpbvde.exeC:\Windows\system32\hlmlpbvde.exe 756 "C:\Windows\SysWOW64\xjpbcypjs.exe"58⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\mywbvxuqt.exeC:\Windows\system32\mywbvxuqt.exe 760 "C:\Windows\SysWOW64\hlmlpbvde.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\wmxytfhms.exeC:\Windows\system32\wmxytfhms.exe 764 "C:\Windows\SysWOW64\mywbvxuqt.exe"60⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\jzoozigrg.exeC:\Windows\system32\jzoozigrg.exe 752 "C:\Windows\SysWOW64\wmxytfhms.exe"61⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\wyjrhrmgh.exeC:\Windows\system32\wyjrhrmgh.exe 772 "C:\Windows\SysWOW64\jzoozigrg.exe"62⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\gaybvusbu.exeC:\Windows\system32\gaybvusbu.exe 784 "C:\Windows\SysWOW64\wyjrhrmgh.exe"63⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\tzbeduxiu.exeC:\Windows\system32\tzbeduxiu.exe 768 "C:\Windows\SysWOW64\gaybvusbu.exe"64⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\SysWOW64\dcroyxekh.exeC:\Windows\system32\dcroyxekh.exe 788 "C:\Windows\SysWOW64\tzbeduxiu.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2208 -
C:\Windows\SysWOW64\qalrhfjra.exeC:\Windows\system32\qalrhfjra.exe 780 "C:\Windows\SysWOW64\dcroyxekh.exe"66⤵PID:2092
-
C:\Windows\SysWOW64\crglqfpyb.exeC:\Windows\system32\crglqfpyb.exe 776 "C:\Windows\SysWOW64\qalrhfjra.exe"67⤵PID:284
-
C:\Windows\SysWOW64\phjoyoufc.exeC:\Windows\system32\phjoyoufc.exe 792 "C:\Windows\SysWOW64\crglqfpyb.exe"68⤵PID:1648
-
C:\Windows\SysWOW64\zsyylrbzo.exeC:\Windows\system32\zsyylrbzo.exe 820 "C:\Windows\SysWOW64\phjoyoufc.exe"69⤵PID:2084
-
C:\Windows\SysWOW64\mitbuzgpp.exeC:\Windows\system32\mitbuzgpp.exe 800 "C:\Windows\SysWOW64\zsyylrbzo.exe"70⤵PID:2952
-
C:\Windows\SysWOW64\wtjmpcnjc.exeC:\Windows\system32\wtjmpcnjc.exe 804 "C:\Windows\SysWOW64\mitbuzgpp.exe"71⤵PID:2636
-
C:\Windows\SysWOW64\jjloycsqd.exeC:\Windows\system32\jjloycsqd.exe 808 "C:\Windows\SysWOW64\wtjmpcnjc.exe"72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\otujohqec.exeC:\Windows\system32\otujohqec.exe 832 "C:\Windows\SysWOW64\jjloycsqd.exe"73⤵PID:2428
-
C:\Windows\SysWOW64\yzuhepdab.exeC:\Windows\system32\yzuhepdab.exe 796 "C:\Windows\SysWOW64\otujohqec.exe"74⤵
- Drops file in System32 directory
PID:2384 -
C:\Windows\SysWOW64\luewklcfq.exeC:\Windows\system32\luewklcfq.exe 828 "C:\Windows\SysWOW64\yzuhepdab.exe"75⤵PID:2424
-
C:\Windows\SysWOW64\yokmwxopd.exeC:\Windows\system32\yokmwxopd.exe 812 "C:\Windows\SysWOW64\luewklcfq.exe"76⤵PID:1288
-
C:\Windows\SysWOW64\hyzwravjq.exeC:\Windows\system32\hyzwravjq.exe 836 "C:\Windows\SysWOW64\yokmwxopd.exe"77⤵PID:292
-
C:\Windows\SysWOW64\upczzjaqr.exeC:\Windows\system32\upczzjaqr.exe 816 "C:\Windows\SysWOW64\hyzwravjq.exe"78⤵PID:2932
-
C:\Windows\SysWOW64\hrihlneaw.exeC:\Windows\system32\hrihlneaw.exe 848 "C:\Windows\SysWOW64\upczzjaqr.exe"79⤵PID:340
-
C:\Windows\SysWOW64\ueswrrdmk.exeC:\Windows\system32\ueswrrdmk.exe 840 "C:\Windows\SysWOW64\hrihlneaw.exe"80⤵PID:1324
-
C:\Windows\SysWOW64\huuzzzjul.exeC:\Windows\system32\huuzzzjul.exe 844 "C:\Windows\SysWOW64\ueswrrdmk.exe"81⤵
- Drops file in System32 directory
PID:2096 -
C:\Windows\SysWOW64\rfkjmcpoy.exeC:\Windows\system32\rfkjmcpoy.exe 856 "C:\Windows\SysWOW64\huuzzzjul.exe"82⤵PID:1848
-
C:\Windows\SysWOW64\evfmdcvvz.exeC:\Windows\system32\evfmdcvvz.exe 852 "C:\Windows\SysWOW64\rfkjmcpoy.exe"83⤵PID:2988
-
C:\Windows\SysWOW64\oguxqfbxl.exeC:\Windows\system32\oguxqfbxl.exe 824 "C:\Windows\SysWOW64\evfmdcvvz.exe"84⤵PID:880
-
C:\Windows\SysWOW64\bwxzzohem.exeC:\Windows\system32\bwxzzohem.exe 864 "C:\Windows\SysWOW64\oguxqfbxl.exe"85⤵PID:788
-
C:\Windows\SysWOW64\lhmkmrngz.exeC:\Windows\system32\lhmkmrngz.exe 876 "C:\Windows\SysWOW64\bwxzzohem.exe"86⤵PID:2284
-
C:\Windows\SysWOW64\yxhmvrsns.exeC:\Windows\system32\yxhmvrsns.exe 860 "C:\Windows\SysWOW64\lhmkmrngz.exe"87⤵PID:2196
-
C:\Windows\SysWOW64\kznuodxpf.exeC:\Windows\system32\kznuodxpf.exe 868 "C:\Windows\SysWOW64\yxhmvrsns.exe"88⤵PID:2564
-
C:\Windows\SysWOW64\xqqxxlceg.exeC:\Windows\system32\xqqxxlceg.exe 880 "C:\Windows\SysWOW64\kznuodxpf.exe"89⤵PID:2680
-
C:\Windows\SysWOW64\kdzuchbju.exeC:\Windows\system32\kdzuchbju.exe 872 "C:\Windows\SysWOW64\xqqxxlceg.exe"90⤵PID:2736
-
C:\Windows\SysWOW64\uraktpoft.exeC:\Windows\system32\uraktpoft.exe 884 "C:\Windows\SysWOW64\kdzuchbju.exe"91⤵
- Drops file in System32 directory
PID:2700 -
C:\Windows\SysWOW64\hivmbxunm.exeC:\Windows\system32\hivmbxunm.exe 892 "C:\Windows\SysWOW64\uraktpoft.exe"92⤵PID:2648
-
C:\Windows\SysWOW64\ugypkxrun.exeC:\Windows\system32\ugypkxrun.exe 888 "C:\Windows\SysWOW64\hivmbxunm.exe"93⤵PID:1792
-
C:\Windows\SysWOW64\hxsssfxjo.exeC:\Windows\system32\hxsssfxjo.exe 904 "C:\Windows\SysWOW64\ugypkxrun.exe"94⤵PID:836
-
C:\Windows\SysWOW64\rhicoidda.exeC:\Windows\system32\rhicoidda.exe 900 "C:\Windows\SysWOW64\hxsssfxjo.exe"95⤵PID:2004
-
C:\Windows\SysWOW64\dboszvqno.exeC:\Windows\system32\dboszvqno.exe 916 "C:\Windows\SysWOW64\rhicoidda.exe"96⤵PID:2452
-
C:\Windows\SysWOW64\niapjupmo.exeC:\Windows\system32\niapjupmo.exe 908 "C:\Windows\SysWOW64\dboszvqno.exe"97⤵PID:2040
-
C:\Windows\SysWOW64\azvssuvup.exeC:\Windows\system32\azvssuvup.exe 896 "C:\Windows\SysWOW64\niapjupmo.exe"98⤵PID:2544
-
C:\Windows\SysWOW64\npqvjcabi.exeC:\Windows\system32\npqvjcabi.exe 928 "C:\Windows\SysWOW64\azvssuvup.exe"99⤵PID:1676
-
C:\Windows\SysWOW64\xanfwfgvu.exeC:\Windows\system32\xanfwfgvu.exe 920 "C:\Windows\SysWOW64\npqvjcabi.exe"100⤵PID:980
-
C:\Windows\SysWOW64\knxvcjfij.exeC:\Windows\system32\knxvcjfij.exe 912 "C:\Windows\SysWOW64\xanfwfgvu.exe"101⤵PID:532
-
C:\Windows\SysWOW64\xpdcnnkrw.exeC:\Windows\system32\xpdcnnkrw.exe 932 "C:\Windows\SysWOW64\knxvcjfij.exe"102⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\hrsnirylj.exeC:\Windows\system32\hrsnirylj.exe 924 "C:\Windows\SysWOW64\xpdcnnkrw.exe"103⤵PID:2844
-
C:\Windows\SysWOW64\xeaiewvgq.exeC:\Windows\system32\xeaiewvgq.exe 936 "C:\Windows\SysWOW64\hrsnirylj.exe"104⤵PID:2016
-
C:\Windows\SysWOW64\hgqszzbac.exeC:\Windows\system32\hgqszzbac.exe 940 "C:\Windows\SysWOW64\xeaiewvgq.exe"105⤵PID:2432
-
C:\Windows\SysWOW64\tiwillfjq.exeC:\Windows\system32\tiwillfjq.exe 948 "C:\Windows\SysWOW64\hgqszzbac.exe"106⤵
- Drops file in System32 directory
PID:2032 -
C:\Windows\SysWOW64\yvnyrpmwe.exeC:\Windows\system32\yvnyrpmwe.exe 956 "C:\Windows\SysWOW64\tiwillfjq.exe"107⤵PID:2372
-
C:\Windows\SysWOW64\lxtncuqyr.exeC:\Windows\system32\lxtncuqyr.exe 952 "C:\Windows\SysWOW64\yvnyrpmwe.exe"108⤵PID:2992
-
C:\Windows\SysWOW64\vajypxxae.exeC:\Windows\system32\vajypxxae.exe 960 "C:\Windows\SysWOW64\lxtncuqyr.exe"109⤵
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\inanvbwfk.exeC:\Windows\system32\inanvbwfk.exe 964 "C:\Windows\SysWOW64\vajypxxae.exe"110⤵PID:2600
-
C:\Windows\SysWOW64\syqyqekhf.exeC:\Windows\system32\syqyqekhf.exe 968 "C:\Windows\SysWOW64\inanvbwfk.exe"111⤵
- Drops file in System32 directory
PID:2656 -
C:\Windows\SysWOW64\fokazehoy.exeC:\Windows\system32\fokazehoy.exe 980 "C:\Windows\SysWOW64\syqyqekhf.exe"112⤵PID:2876
-
C:\Windows\SysWOW64\pzalmhwil.exeC:\Windows\system32\pzalmhwil.exe 972 "C:\Windows\SysWOW64\fokazehoy.exe"113⤵
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\fdiyqutcz.exeC:\Windows\system32\fdiyqutcz.exe 976 "C:\Windows\SysWOW64\pzalmhwil.exe"114⤵PID:1976
-
C:\Windows\SysWOW64\pgxilxzem.exeC:\Windows\system32\pgxilxzem.exe 944 "C:\Windows\SysWOW64\fdiyqutcz.exe"115⤵PID:316
-
C:\Windows\SysWOW64\bidyxcdga.exeC:\Windows\system32\bidyxcdga.exe 988 "C:\Windows\SysWOW64\pgxilxzem.exe"116⤵PID:2140
-
C:\Windows\SysWOW64\pvnodgktg.exeC:\Windows\system32\pvnodgktg.exe 992 "C:\Windows\SysWOW64\bidyxcdga.exe"117⤵PID:1972
-
C:\Windows\SysWOW64\yjoltnppn.exeC:\Windows\system32\yjoltnppn.exe 996 "C:\Windows\SysWOW64\pvnodgktg.exe"118⤵PID:2236
-
C:\Windows\SysWOW64\lzqobvvwg.exeC:\Windows\system32\lzqobvvwg.exe 1000 "C:\Windows\SysWOW64\yjoltnppn.exe"119⤵
- Drops file in System32 directory
PID:1052 -
C:\Windows\SysWOW64\yuadhrtju.exeC:\Windows\system32\yuadhrtju.exe 1004 "C:\Windows\SysWOW64\lzqobvvwg.exe"120⤵PID:2276
-
C:\Windows\SysWOW64\logtsegli.exeC:\Windows\system32\logtsegli.exe 1008 "C:\Windows\SysWOW64\yuadhrtju.exe"121⤵PID:2924
-
C:\Windows\SysWOW64\vzvdohmnu.exeC:\Windows\system32\vzvdohmnu.exe 984 "C:\Windows\SysWOW64\logtsegli.exe"122⤵PID:480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-