Analysis
-
max time kernel
39s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe
-
Size
98KB
-
MD5
df0e10451d74d8b0f6dec9307b3af3e8
-
SHA1
7b37e201b9d7393b17a4476bead0e63dd4bb76fd
-
SHA256
72683be5df459f9f67ee4cf9a670663166f0df7f72bb2bdf80ad459d52cc966e
-
SHA512
d188330aad45c043074ca92ab873708d09a776fad18b16ad6074ae8dd35434c3404aeee8fb2359fee5e2a9b44a79bae9c21b56552c023adc6105a9350c8cae8b
-
SSDEEP
3072:q3HnXCsf2Cp2GivcxwPnzEx6bfd7DmhqUxWs:CHnXTfv3gzEx6bVOzxF
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2152-16-0x00000000003A0000-0x00000000003C4000-memory.dmp modiloader_stage2 behavioral1/memory/2152-420-0x00000000003A0000-0x00000000003C4000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2152 server.exe 2192 xxx.exe 2752 dudabjoa.exe 2544 dudabjoa.exe 2572 dudabjoa.exe 2668 dudabjoa.exe 2536 dudabjoa.exe 2612 dudabjoa.exe 1300 dudabjoa.exe 676 dudabjoa.exe 2860 dudabjoa.exe 2836 dudabjoa.exe 2300 dudabjoa.exe 588 dudabjoa.exe 2896 dudabjoa.exe 3004 dudabjoa.exe 2176 dudabjoa.exe 2940 dudabjoa.exe 2148 dudabjoa.exe 1840 dudabjoa.exe 1232 dudabjoa.exe 496 dudabjoa.exe 1820 dudabjoa.exe 956 dudabjoa.exe 1632 dudabjoa.exe 1656 dudabjoa.exe 2288 dudabjoa.exe 1536 dudabjoa.exe 1640 dudabjoa.exe 1060 dudabjoa.exe 1548 dudabjoa.exe 3024 dudabjoa.exe 3028 dudabjoa.exe 2212 dudabjoa.exe 2964 dudabjoa.exe 1240 dudabjoa.exe 636 dudabjoa.exe 1904 dudabjoa.exe 2956 dudabjoa.exe 2932 dudabjoa.exe 1600 dudabjoa.exe 992 dudabjoa.exe 1172 dudabjoa.exe 2188 dudabjoa.exe 2456 dudabjoa.exe 2112 dudabjoa.exe 2640 dudabjoa.exe 2748 dudabjoa.exe 2664 dudabjoa.exe 2760 dudabjoa.exe 2564 dudabjoa.exe 2732 dudabjoa.exe 2588 dudabjoa.exe 2992 dudabjoa.exe 2512 dudabjoa.exe 1524 dudabjoa.exe 2440 dudabjoa.exe 2708 dudabjoa.exe 1672 dudabjoa.exe 1808 dudabjoa.exe 2364 dudabjoa.exe 2520 dudabjoa.exe 2428 dudabjoa.exe 1028 dudabjoa.exe -
Loads dropped DLL 64 IoCs
pid Process 2152 server.exe 2192 xxx.exe 2192 xxx.exe 2752 dudabjoa.exe 2752 dudabjoa.exe 2544 dudabjoa.exe 2544 dudabjoa.exe 2572 dudabjoa.exe 2572 dudabjoa.exe 2668 dudabjoa.exe 2668 dudabjoa.exe 2536 dudabjoa.exe 2536 dudabjoa.exe 2612 dudabjoa.exe 2612 dudabjoa.exe 1300 dudabjoa.exe 1300 dudabjoa.exe 676 dudabjoa.exe 676 dudabjoa.exe 2860 dudabjoa.exe 2860 dudabjoa.exe 2836 dudabjoa.exe 2836 dudabjoa.exe 2300 dudabjoa.exe 2300 dudabjoa.exe 588 dudabjoa.exe 588 dudabjoa.exe 2896 dudabjoa.exe 2896 dudabjoa.exe 3004 dudabjoa.exe 3004 dudabjoa.exe 2176 dudabjoa.exe 2176 dudabjoa.exe 2940 dudabjoa.exe 2940 dudabjoa.exe 2148 dudabjoa.exe 2148 dudabjoa.exe 1840 dudabjoa.exe 1840 dudabjoa.exe 1232 dudabjoa.exe 1232 dudabjoa.exe 496 dudabjoa.exe 496 dudabjoa.exe 1820 dudabjoa.exe 1820 dudabjoa.exe 956 dudabjoa.exe 956 dudabjoa.exe 1632 dudabjoa.exe 1632 dudabjoa.exe 1656 dudabjoa.exe 1656 dudabjoa.exe 2288 dudabjoa.exe 2288 dudabjoa.exe 1536 dudabjoa.exe 1536 dudabjoa.exe 1640 dudabjoa.exe 1640 dudabjoa.exe 1060 dudabjoa.exe 1060 dudabjoa.exe 1548 dudabjoa.exe 1548 dudabjoa.exe 3024 dudabjoa.exe 3024 dudabjoa.exe 3028 dudabjoa.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe fujplpjk.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe fujplpjk.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe fujplpjk.exe File created C:\Windows\SysWOW64\dudabjoa.exe fujplpjk.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe fujplpjk.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe fujplpjk.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe fujplpjk.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe fujplpjk.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe fujplpjk.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File opened for modification C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\fujplpjk.exe fujplpjk.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\fujplpjk.exe fujplpjk.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\dudabjoa.exe dudabjoa.exe File created C:\Windows\SysWOW64\fujplpjk.exe fujplpjk.exe File opened for modification C:\Windows\SysWOW64\fujplpjk.exe dudabjoa.exe File created C:\Windows\SysWOW64\fujplpjk.exe fujplpjk.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmQQ2.dll server.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\server.exe df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe File opened for modification C:\Windows\server.exe df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe File created C:\Windows\xxx.exe df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe File opened for modification C:\Windows\xxx.exe df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3844 15328 Process not Found 2291 20772 14440 Process not Found 2269 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujplpjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujplpjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujplpjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujplpjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujplpjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujplpjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujplpjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujplpjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujplpjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dudabjoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fujplpjk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2152 server.exe 2152 server.exe 2152 server.exe 2152 server.exe 2192 xxx.exe 2752 dudabjoa.exe 2544 dudabjoa.exe 2572 dudabjoa.exe 2668 dudabjoa.exe 2536 dudabjoa.exe 2612 dudabjoa.exe 1300 dudabjoa.exe 676 dudabjoa.exe 2860 dudabjoa.exe 2836 dudabjoa.exe 2300 dudabjoa.exe 588 dudabjoa.exe 2896 dudabjoa.exe 3004 dudabjoa.exe 2176 dudabjoa.exe 2940 dudabjoa.exe 2148 dudabjoa.exe 1840 dudabjoa.exe 1232 dudabjoa.exe 496 dudabjoa.exe 1820 dudabjoa.exe 956 dudabjoa.exe 1632 dudabjoa.exe 1656 dudabjoa.exe 2288 dudabjoa.exe 1536 dudabjoa.exe 1640 dudabjoa.exe 1060 dudabjoa.exe 1548 dudabjoa.exe 3024 dudabjoa.exe 3028 dudabjoa.exe 2212 dudabjoa.exe 2964 dudabjoa.exe 1240 dudabjoa.exe 636 dudabjoa.exe 1904 dudabjoa.exe 2956 dudabjoa.exe 1600 dudabjoa.exe 992 dudabjoa.exe 1172 dudabjoa.exe 2188 dudabjoa.exe 2456 dudabjoa.exe 2112 dudabjoa.exe 2640 dudabjoa.exe 2748 dudabjoa.exe 2664 dudabjoa.exe 2760 dudabjoa.exe 2564 dudabjoa.exe 2732 dudabjoa.exe 2588 dudabjoa.exe 2992 dudabjoa.exe 2512 dudabjoa.exe 1524 dudabjoa.exe 2440 dudabjoa.exe 2440 dudabjoa.exe 2708 dudabjoa.exe 2708 dudabjoa.exe 1672 dudabjoa.exe 1672 dudabjoa.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2152 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2152 2488 df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2152 2488 df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2152 2488 df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2152 2488 df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2192 2488 df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe 32 PID 2488 wrote to memory of 2192 2488 df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe 32 PID 2488 wrote to memory of 2192 2488 df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe 32 PID 2488 wrote to memory of 2192 2488 df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe 32 PID 2192 wrote to memory of 2752 2192 xxx.exe 33 PID 2192 wrote to memory of 2752 2192 xxx.exe 33 PID 2192 wrote to memory of 2752 2192 xxx.exe 33 PID 2192 wrote to memory of 2752 2192 xxx.exe 33 PID 2752 wrote to memory of 2544 2752 dudabjoa.exe 34 PID 2752 wrote to memory of 2544 2752 dudabjoa.exe 34 PID 2752 wrote to memory of 2544 2752 dudabjoa.exe 34 PID 2752 wrote to memory of 2544 2752 dudabjoa.exe 34 PID 2544 wrote to memory of 2572 2544 dudabjoa.exe 35 PID 2544 wrote to memory of 2572 2544 dudabjoa.exe 35 PID 2544 wrote to memory of 2572 2544 dudabjoa.exe 35 PID 2544 wrote to memory of 2572 2544 dudabjoa.exe 35 PID 2572 wrote to memory of 2668 2572 dudabjoa.exe 36 PID 2572 wrote to memory of 2668 2572 dudabjoa.exe 36 PID 2572 wrote to memory of 2668 2572 dudabjoa.exe 36 PID 2572 wrote to memory of 2668 2572 dudabjoa.exe 36 PID 2668 wrote to memory of 2536 2668 dudabjoa.exe 37 PID 2668 wrote to memory of 2536 2668 dudabjoa.exe 37 PID 2668 wrote to memory of 2536 2668 dudabjoa.exe 37 PID 2668 wrote to memory of 2536 2668 dudabjoa.exe 37 PID 2536 wrote to memory of 2612 2536 dudabjoa.exe 38 PID 2536 wrote to memory of 2612 2536 dudabjoa.exe 38 PID 2536 wrote to memory of 2612 2536 dudabjoa.exe 38 PID 2536 wrote to memory of 2612 2536 dudabjoa.exe 38 PID 2612 wrote to memory of 1300 2612 dudabjoa.exe 39 PID 2612 wrote to memory of 1300 2612 dudabjoa.exe 39 PID 2612 wrote to memory of 1300 2612 dudabjoa.exe 39 PID 2612 wrote to memory of 1300 2612 dudabjoa.exe 39 PID 1300 wrote to memory of 676 1300 dudabjoa.exe 40 PID 1300 wrote to memory of 676 1300 dudabjoa.exe 40 PID 1300 wrote to memory of 676 1300 dudabjoa.exe 40 PID 1300 wrote to memory of 676 1300 dudabjoa.exe 40 PID 676 wrote to memory of 2860 676 dudabjoa.exe 41 PID 676 wrote to memory of 2860 676 dudabjoa.exe 41 PID 676 wrote to memory of 2860 676 dudabjoa.exe 41 PID 676 wrote to memory of 2860 676 dudabjoa.exe 41 PID 2860 wrote to memory of 2836 2860 dudabjoa.exe 42 PID 2860 wrote to memory of 2836 2860 dudabjoa.exe 42 PID 2860 wrote to memory of 2836 2860 dudabjoa.exe 42 PID 2860 wrote to memory of 2836 2860 dudabjoa.exe 42 PID 2836 wrote to memory of 2300 2836 dudabjoa.exe 43 PID 2836 wrote to memory of 2300 2836 dudabjoa.exe 43 PID 2836 wrote to memory of 2300 2836 dudabjoa.exe 43 PID 2836 wrote to memory of 2300 2836 dudabjoa.exe 43 PID 2300 wrote to memory of 588 2300 dudabjoa.exe 44 PID 2300 wrote to memory of 588 2300 dudabjoa.exe 44 PID 2300 wrote to memory of 588 2300 dudabjoa.exe 44 PID 2300 wrote to memory of 588 2300 dudabjoa.exe 44 PID 588 wrote to memory of 2896 588 dudabjoa.exe 45 PID 588 wrote to memory of 2896 588 dudabjoa.exe 45 PID 588 wrote to memory of 2896 588 dudabjoa.exe 45 PID 588 wrote to memory of 2896 588 dudabjoa.exe 45 PID 2896 wrote to memory of 3004 2896 dudabjoa.exe 46 PID 2896 wrote to memory of 3004 2896 dudabjoa.exe 46 PID 2896 wrote to memory of 3004 2896 dudabjoa.exe 46 PID 2896 wrote to memory of 3004 2896 dudabjoa.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df0e10451d74d8b0f6dec9307b3af3e8_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\server.exe"C:\Windows\server.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2152
-
-
C:\Windows\xxx.exe"C:\Windows\xxx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2148 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1840 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1232 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:496 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1820 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:956 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1536 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1548 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2212 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1240 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:636 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe40⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:992 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1172 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2440 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe60⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2520 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe63⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe64⤵
- Executes dropped EXE
PID:1028 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe65⤵PID:980
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe66⤵PID:1460
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe67⤵
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe68⤵PID:1932
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe69⤵
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe70⤵PID:2908
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe71⤵PID:2248
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe72⤵PID:2672
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe73⤵PID:2560
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe74⤵PID:2568
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe75⤵
- Drops file in System32 directory
PID:448 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe76⤵PID:288
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe77⤵PID:2216
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe78⤵PID:1876
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe79⤵PID:2088
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe80⤵
- Drops file in System32 directory
PID:876 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe81⤵PID:1448
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe82⤵PID:2040
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe83⤵PID:2180
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe84⤵PID:3080
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe85⤵PID:3108
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe86⤵PID:3128
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe87⤵PID:3160
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe88⤵PID:3180
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe89⤵PID:3212
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe90⤵PID:3232
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe91⤵PID:3260
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe92⤵PID:3280
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe93⤵PID:3312
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe94⤵PID:3332
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe95⤵PID:3364
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe96⤵PID:3384
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe97⤵PID:3412
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe98⤵PID:3432
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe99⤵PID:3456
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe100⤵PID:3480
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe101⤵
- System Location Discovery: System Language Discovery
PID:3516 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe102⤵PID:3536
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe103⤵PID:3560
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe104⤵PID:3584
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe105⤵PID:3616
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe106⤵PID:3636
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe107⤵PID:3660
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe108⤵PID:3684
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe109⤵PID:3720
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe110⤵PID:3740
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe111⤵PID:3772
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe112⤵
- Drops file in System32 directory
PID:3792 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe113⤵PID:3820
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe114⤵PID:3840
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe115⤵PID:3864
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe116⤵
- System Location Discovery: System Language Discovery
PID:3888 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe117⤵PID:3920
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe118⤵
- Drops file in System32 directory
PID:3940 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe119⤵
- Drops file in System32 directory
PID:3964 -
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe120⤵PID:3992
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe121⤵PID:4024
-
C:\Windows\SysWOW64\dudabjoa.exeC:\Windows\system32\dudabjoa.exe122⤵
- Drops file in System32 directory
PID:4044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-