Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 23:50
Static task
static1
Behavioral task
behavioral1
Sample
df1e6663cbc90e91fbb70b3199335d26_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
df1e6663cbc90e91fbb70b3199335d26_JaffaCakes118.exe
-
Size
532KB
-
MD5
df1e6663cbc90e91fbb70b3199335d26
-
SHA1
31aa1340f1fc4cfe4dd966553e113bfb75ac03fa
-
SHA256
e392a10894f21f58de122a16b8721104f965d2381b64ff614a90ae7f19db256b
-
SHA512
bf51b4b34966ae5289ea92b90d3ef43f0f464f3ad4b9293d1f106ef6a3c0bb4457ddd02cbf5714e12a8d0bf5cd7e99e302d955f98129480c4a5416017649b75f
-
SSDEEP
12288:+NuaIsd+lbShO2PLOHKwsYyHBsU6lxSnyYxYKSCh3BeQs8j:+oaIzDWLO/sYyHBp6in1xcCh3BeQs8j
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2584 ecwsdw.exe 2164 bdhfzh.exe 2248 yaofao.exe 2224 vfjfzw.exe 2948 nfudyb.exe 1532 cqrqhx.exe 1848 ppmsqx.exe 1704 rnaioc.exe 2824 bnefyb.exe 580 yklnzi.exe 1640 aucdse.exe 2368 hfjipy.exe 2300 cwdlen.exe 2332 bwbofv.exe 1636 lvnlqt.exe 2696 twmlei.exe 2912 bsorot.exe 668 lzaoys.exe 2416 vcqyuv.exe 1960 cgamdg.exe 1044 saxync.exe 2664 zehmen.exe 2692 mjqgsw.exe 2560 zwieya.exe 2292 gedwsp.exe 836 tkmrgg.exe 2740 jovmkl.exe 2116 niduje.exe 888 dmlpfj.exe 1064 psujta.exe 2772 pzqjop.exe 2408 cylewx.exe 2296 oaruic.exe 1688 zkgzus.exe 1760 juekiv.exe 2820 tqwupp.exe 2644 abvzmj.exe 2388 qvsuwf.exe 2628 sivxrf.exe 2712 fdmmxb.exe 2652 suhpfj.exe 1656 fwnfrw.exe 1072 msxkih.exe 1364 clufsv.exe 540 msgccu.exe 1248 yqpxqk.exe 2420 lswncp.exe 2836 yqypkx.exe 672 fymhfm.exe 1648 vjjcoi.exe 1376 hilfxi.exe 2576 shpchh.exe 1088 fuhsnl.exe 1468 rzqnbc.exe 2256 emilpy.exe 2064 oxxvcb.exe 776 bnsqlj.exe 1476 lnevvi.exe 2148 vxufrl.exe 892 iklvwh.exe 2284 svbgkk.exe 920 fphnvw.exe 820 scqdba.exe 2844 feetuf.exe -
Identifies Wine through registry keys 2 TTPs 64 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine qalfcc.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine lifnrd.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine vawuzw.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine lpqzcc.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine tmewwf.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine askmkj.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ylccqv.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ilzieu.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ifkyxb.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine uvlehr.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine pfbhyt.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine muiric.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine bmrhds.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine admptb.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine rizirf.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine gpqtyu.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine cxuklk.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine mqcfvf.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine thvomo.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine elfpqt.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine bnxjlj.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine clufsv.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine rxpoio.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine qvsqcm.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine bqresw.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine mlheft.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ysljmz.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine tjraqd.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine idkyug.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine juiwph.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine xmhwxm.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine wfctan.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine mddhgs.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine jjvclv.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine vcafeh.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine emofdn.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine xncjwq.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine gojmjr.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ikevuv.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine nfgqxu.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine nmmrbg.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine cgkaau.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine kvracy.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ndpjqk.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine udamdt.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine olnhxk.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine vwrpmy.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine oimadw.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine htwyoa.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine lzcdpr.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine vnjiun.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine rvggbe.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine kikbpa.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ztbivc.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine pdnuui.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine otdhnv.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine iobpga.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine caqxrc.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine nyziqg.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine nupkcb.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ojtlpb.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine ikgzat.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine feetuf.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine pqdbyd.exe -
Loads dropped DLL 64 IoCs
pid Process 3020 df1e6663cbc90e91fbb70b3199335d26_JaffaCakes118.exe 3020 df1e6663cbc90e91fbb70b3199335d26_JaffaCakes118.exe 2584 ecwsdw.exe 2584 ecwsdw.exe 2164 bdhfzh.exe 2164 bdhfzh.exe 2248 yaofao.exe 2248 yaofao.exe 2224 vfjfzw.exe 2224 vfjfzw.exe 2948 nfudyb.exe 2948 nfudyb.exe 1532 cqrqhx.exe 1532 cqrqhx.exe 1848 ppmsqx.exe 1848 ppmsqx.exe 1704 rnaioc.exe 1704 rnaioc.exe 2824 bnefyb.exe 2824 bnefyb.exe 580 yklnzi.exe 580 yklnzi.exe 1640 aucdse.exe 1640 aucdse.exe 2368 hfjipy.exe 2368 hfjipy.exe 2300 cwdlen.exe 2300 cwdlen.exe 2332 bwbofv.exe 2332 bwbofv.exe 1636 lvnlqt.exe 1636 lvnlqt.exe 2696 twmlei.exe 2696 twmlei.exe 2912 bsorot.exe 2912 bsorot.exe 668 lzaoys.exe 668 lzaoys.exe 2416 vcqyuv.exe 2416 vcqyuv.exe 1960 cgamdg.exe 1960 cgamdg.exe 1044 saxync.exe 1044 saxync.exe 2664 zehmen.exe 2664 zehmen.exe 2692 mjqgsw.exe 2692 mjqgsw.exe 2560 zwieya.exe 2560 zwieya.exe 2292 gedwsp.exe 2292 gedwsp.exe 836 tkmrgg.exe 836 tkmrgg.exe 2740 jovmkl.exe 2740 jovmkl.exe 2116 niduje.exe 2116 niduje.exe 888 dmlpfj.exe 888 dmlpfj.exe 1064 psujta.exe 1064 psujta.exe 2772 pzqjop.exe 2772 pzqjop.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\oaruic.exe cylewx.exe File opened for modification C:\Windows\SysWOW64\ujzaxi.exe htwyoa.exe File created C:\Windows\SysWOW64\bfaccn.exe ogxatm.exe File opened for modification C:\Windows\SysWOW64\rxpoio.exe eyulzo.exe File created C:\Windows\SysWOW64\npqcyr.exe ysicmz.exe File opened for modification C:\Windows\SysWOW64\mppkmh.exe zquidh.exe File opened for modification C:\Windows\SysWOW64\nfudyb.exe vfjfzw.exe File created C:\Windows\SysWOW64\pdnuui.exe cnkrla.exe File created C:\Windows\SysWOW64\nelemd.exe gwpdaf.exe File created C:\Windows\SysWOW64\buejts.exe myejha.exe File created C:\Windows\SysWOW64\hnafxk.exe uwfcpk.exe File opened for modification C:\Windows\SysWOW64\hnafxk.exe uwfcpk.exe File created C:\Windows\SysWOW64\ifoczm.exe vpuaqe.exe File opened for modification C:\Windows\SysWOW64\bqwbqu.exe ozbyau.exe File created C:\Windows\SysWOW64\lsmxyi.exe celiab.exe File created C:\Windows\SysWOW64\uptnqn.exe hzqkzn.exe File created C:\Windows\SysWOW64\ndxqdj.exe amcnvb.exe File opened for modification C:\Windows\SysWOW64\lfpxqu.exe hsvqxk.exe File created C:\Windows\SysWOW64\abvzmj.exe tqwupp.exe File created C:\Windows\SysWOW64\twkein.exe gypbae.exe File created C:\Windows\SysWOW64\yoxojq.exe luryyl.exe File created C:\Windows\SysWOW64\jydpbc.exe uykcmf.exe File created C:\Windows\SysWOW64\qvsqcm.exe efqnte.exe File created C:\Windows\SysWOW64\nsyrgz.exe abdopq.exe File created C:\Windows\SysWOW64\swkllm.exe ipgnbn.exe File opened for modification C:\Windows\SysWOW64\fwnfrw.exe suhpfj.exe File opened for modification C:\Windows\SysWOW64\bqcxle.exe rccavx.exe File created C:\Windows\SysWOW64\ysljmz.exe ppwgzw.exe File opened for modification C:\Windows\SysWOW64\bdablq.exe nqilgm.exe File created C:\Windows\SysWOW64\rwezgn.exe eyjeyf.exe File opened for modification C:\Windows\SysWOW64\qvwfoj.exe ajwske.exe File opened for modification C:\Windows\SysWOW64\glstsq.exe trmezd.exe File created C:\Windows\SysWOW64\tjraqd.exe gloxav.exe File opened for modification C:\Windows\SysWOW64\tkmrgg.exe gedwsp.exe File created C:\Windows\SysWOW64\niduje.exe jovmkl.exe File created C:\Windows\SysWOW64\obxkkn.exe ezhaxk.exe File opened for modification C:\Windows\SysWOW64\hzikye.exe arnsmo.exe File opened for modification C:\Windows\SysWOW64\vjlhfw.exe tvifcw.exe File created C:\Windows\SysWOW64\xawtms.exe kkbrdk.exe File opened for modification C:\Windows\SysWOW64\wstytg.exe mltivh.exe File opened for modification C:\Windows\SysWOW64\angqik.exe npmoak.exe File opened for modification C:\Windows\SysWOW64\sehsbf.exe fgfqtx.exe File created C:\Windows\SysWOW64\tkmrgg.exe gedwsp.exe File opened for modification C:\Windows\SysWOW64\zrnrkq.exe pdnuui.exe File created C:\Windows\SysWOW64\xjpggs.exe ndpjqk.exe File created C:\Windows\SysWOW64\logejk.exe yqlbaj.exe File created C:\Windows\SysWOW64\vrvpwn.exe logejk.exe File opened for modification C:\Windows\SysWOW64\oyqrpj.exe yliwle.exe File opened for modification C:\Windows\SysWOW64\kmjyee.exe xwpvve.exe File opened for modification C:\Windows\SysWOW64\nxqsvu.exe byvpnm.exe File created C:\Windows\SysWOW64\htvhlt.exe udamdt.exe File created C:\Windows\SysWOW64\suhpfj.exe fdmmxb.exe File created C:\Windows\SysWOW64\fwnfrw.exe suhpfj.exe File created C:\Windows\SysWOW64\apohyy.exe iwnxed.exe File created C:\Windows\SysWOW64\bdablq.exe nqilgm.exe File created C:\Windows\SysWOW64\vwrpmy.exe jxwneq.exe File opened for modification C:\Windows\SysWOW64\qwjzxh.exe dgoepz.exe File opened for modification C:\Windows\SysWOW64\fdmmxb.exe sivxrf.exe File created C:\Windows\SysWOW64\tlibav.exe gnfyrn.exe File opened for modification C:\Windows\SysWOW64\rnlfcg.exe elfpqt.exe File created C:\Windows\SysWOW64\rxtktj.exe eyqhkj.exe File opened for modification C:\Windows\SysWOW64\mwvder.exe zyaavq.exe File created C:\Windows\SysWOW64\fxsncs.exe sgqktk.exe File created C:\Windows\SysWOW64\yaofao.exe bdhfzh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ovjizq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xynexa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language necojl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pqzwcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhwhby.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnxjlj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcmjnz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rygoqt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcojye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jixtqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yjsesr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jttcsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elfpqt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkfvto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwfolp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfpxqu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nsyrgz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pzqjop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lswncp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zlcurk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zylhxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpfors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxpoio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxtsxs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzynju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jmrovw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sewwcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqrxie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrvpwn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mwvder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uymiwq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lifnrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvwfoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hcjrqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkyjht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ypdztv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gvbzix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twmlei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iisnex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language krjoeh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vovwrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lqxjlq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyqhwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fzeocq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjshwb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ifoczm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wslygp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pawccw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxyuas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjcoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdrylp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itvinp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojmdim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppwgzw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxwneq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ehmrxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agshnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fymhfm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mjfpzk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gnbtnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ztbivc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgkaau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mppkmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gedwsp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2584 3020 df1e6663cbc90e91fbb70b3199335d26_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2584 3020 df1e6663cbc90e91fbb70b3199335d26_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2584 3020 df1e6663cbc90e91fbb70b3199335d26_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2584 3020 df1e6663cbc90e91fbb70b3199335d26_JaffaCakes118.exe 30 PID 2584 wrote to memory of 2164 2584 ecwsdw.exe 31 PID 2584 wrote to memory of 2164 2584 ecwsdw.exe 31 PID 2584 wrote to memory of 2164 2584 ecwsdw.exe 31 PID 2584 wrote to memory of 2164 2584 ecwsdw.exe 31 PID 2164 wrote to memory of 2248 2164 bdhfzh.exe 32 PID 2164 wrote to memory of 2248 2164 bdhfzh.exe 32 PID 2164 wrote to memory of 2248 2164 bdhfzh.exe 32 PID 2164 wrote to memory of 2248 2164 bdhfzh.exe 32 PID 2248 wrote to memory of 2224 2248 yaofao.exe 33 PID 2248 wrote to memory of 2224 2248 yaofao.exe 33 PID 2248 wrote to memory of 2224 2248 yaofao.exe 33 PID 2248 wrote to memory of 2224 2248 yaofao.exe 33 PID 2224 wrote to memory of 2948 2224 vfjfzw.exe 34 PID 2224 wrote to memory of 2948 2224 vfjfzw.exe 34 PID 2224 wrote to memory of 2948 2224 vfjfzw.exe 34 PID 2224 wrote to memory of 2948 2224 vfjfzw.exe 34 PID 2948 wrote to memory of 1532 2948 nfudyb.exe 35 PID 2948 wrote to memory of 1532 2948 nfudyb.exe 35 PID 2948 wrote to memory of 1532 2948 nfudyb.exe 35 PID 2948 wrote to memory of 1532 2948 nfudyb.exe 35 PID 1532 wrote to memory of 1848 1532 cqrqhx.exe 36 PID 1532 wrote to memory of 1848 1532 cqrqhx.exe 36 PID 1532 wrote to memory of 1848 1532 cqrqhx.exe 36 PID 1532 wrote to memory of 1848 1532 cqrqhx.exe 36 PID 1848 wrote to memory of 1704 1848 ppmsqx.exe 37 PID 1848 wrote to memory of 1704 1848 ppmsqx.exe 37 PID 1848 wrote to memory of 1704 1848 ppmsqx.exe 37 PID 1848 wrote to memory of 1704 1848 ppmsqx.exe 37 PID 1704 wrote to memory of 2824 1704 rnaioc.exe 38 PID 1704 wrote to memory of 2824 1704 rnaioc.exe 38 PID 1704 wrote to memory of 2824 1704 rnaioc.exe 38 PID 1704 wrote to memory of 2824 1704 rnaioc.exe 38 PID 2824 wrote to memory of 580 2824 bnefyb.exe 39 PID 2824 wrote to memory of 580 2824 bnefyb.exe 39 PID 2824 wrote to memory of 580 2824 bnefyb.exe 39 PID 2824 wrote to memory of 580 2824 bnefyb.exe 39 PID 580 wrote to memory of 1640 580 yklnzi.exe 40 PID 580 wrote to memory of 1640 580 yklnzi.exe 40 PID 580 wrote to memory of 1640 580 yklnzi.exe 40 PID 580 wrote to memory of 1640 580 yklnzi.exe 40 PID 1640 wrote to memory of 2368 1640 aucdse.exe 41 PID 1640 wrote to memory of 2368 1640 aucdse.exe 41 PID 1640 wrote to memory of 2368 1640 aucdse.exe 41 PID 1640 wrote to memory of 2368 1640 aucdse.exe 41 PID 2368 wrote to memory of 2300 2368 hfjipy.exe 42 PID 2368 wrote to memory of 2300 2368 hfjipy.exe 42 PID 2368 wrote to memory of 2300 2368 hfjipy.exe 42 PID 2368 wrote to memory of 2300 2368 hfjipy.exe 42 PID 2300 wrote to memory of 2332 2300 cwdlen.exe 43 PID 2300 wrote to memory of 2332 2300 cwdlen.exe 43 PID 2300 wrote to memory of 2332 2300 cwdlen.exe 43 PID 2300 wrote to memory of 2332 2300 cwdlen.exe 43 PID 2332 wrote to memory of 1636 2332 bwbofv.exe 44 PID 2332 wrote to memory of 1636 2332 bwbofv.exe 44 PID 2332 wrote to memory of 1636 2332 bwbofv.exe 44 PID 2332 wrote to memory of 1636 2332 bwbofv.exe 44 PID 1636 wrote to memory of 2696 1636 lvnlqt.exe 45 PID 1636 wrote to memory of 2696 1636 lvnlqt.exe 45 PID 1636 wrote to memory of 2696 1636 lvnlqt.exe 45 PID 1636 wrote to memory of 2696 1636 lvnlqt.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\df1e6663cbc90e91fbb70b3199335d26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df1e6663cbc90e91fbb70b3199335d26_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\ecwsdw.exeC:\Windows\system32\ecwsdw.exe 636 "C:\Users\Admin\AppData\Local\Temp\df1e6663cbc90e91fbb70b3199335d26_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\bdhfzh.exeC:\Windows\system32\bdhfzh.exe 612 "C:\Windows\SysWOW64\ecwsdw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\yaofao.exeC:\Windows\system32\yaofao.exe 620 "C:\Windows\SysWOW64\bdhfzh.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\vfjfzw.exeC:\Windows\system32\vfjfzw.exe 616 "C:\Windows\SysWOW64\yaofao.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\nfudyb.exeC:\Windows\system32\nfudyb.exe 632 "C:\Windows\SysWOW64\vfjfzw.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cqrqhx.exeC:\Windows\system32\cqrqhx.exe 716 "C:\Windows\SysWOW64\nfudyb.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\ppmsqx.exeC:\Windows\system32\ppmsqx.exe 720 "C:\Windows\SysWOW64\cqrqhx.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\rnaioc.exeC:\Windows\system32\rnaioc.exe 640 "C:\Windows\SysWOW64\ppmsqx.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\bnefyb.exeC:\Windows\system32\bnefyb.exe 628 "C:\Windows\SysWOW64\rnaioc.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\yklnzi.exeC:\Windows\system32\yklnzi.exe 660 "C:\Windows\SysWOW64\bnefyb.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\aucdse.exeC:\Windows\system32\aucdse.exe 744 "C:\Windows\SysWOW64\yklnzi.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\hfjipy.exeC:\Windows\system32\hfjipy.exe 736 "C:\Windows\SysWOW64\aucdse.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cwdlen.exeC:\Windows\system32\cwdlen.exe 652 "C:\Windows\SysWOW64\hfjipy.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\bwbofv.exeC:\Windows\system32\bwbofv.exe 656 "C:\Windows\SysWOW64\cwdlen.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\lvnlqt.exeC:\Windows\system32\lvnlqt.exe 752 "C:\Windows\SysWOW64\bwbofv.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\twmlei.exeC:\Windows\system32\twmlei.exe 664 "C:\Windows\SysWOW64\lvnlqt.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\SysWOW64\bsorot.exeC:\Windows\system32\bsorot.exe 760 "C:\Windows\SysWOW64\twmlei.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2912 -
C:\Windows\SysWOW64\lzaoys.exeC:\Windows\system32\lzaoys.exe 764 "C:\Windows\SysWOW64\bsorot.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:668 -
C:\Windows\SysWOW64\vcqyuv.exeC:\Windows\system32\vcqyuv.exe 768 "C:\Windows\SysWOW64\lzaoys.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2416 -
C:\Windows\SysWOW64\cgamdg.exeC:\Windows\system32\cgamdg.exe 756 "C:\Windows\SysWOW64\vcqyuv.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Windows\SysWOW64\saxync.exeC:\Windows\system32\saxync.exe 784 "C:\Windows\SysWOW64\cgamdg.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044 -
C:\Windows\SysWOW64\zehmen.exeC:\Windows\system32\zehmen.exe 776 "C:\Windows\SysWOW64\saxync.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2664 -
C:\Windows\SysWOW64\mjqgsw.exeC:\Windows\system32\mjqgsw.exe 780 "C:\Windows\SysWOW64\zehmen.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2692 -
C:\Windows\SysWOW64\zwieya.exeC:\Windows\system32\zwieya.exe 796 "C:\Windows\SysWOW64\mjqgsw.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560 -
C:\Windows\SysWOW64\gedwsp.exeC:\Windows\system32\gedwsp.exe 772 "C:\Windows\SysWOW64\zwieya.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\tkmrgg.exeC:\Windows\system32\tkmrgg.exe 792 "C:\Windows\SysWOW64\gedwsp.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:836 -
C:\Windows\SysWOW64\jovmkl.exeC:\Windows\system32\jovmkl.exe 800 "C:\Windows\SysWOW64\tkmrgg.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2740 -
C:\Windows\SysWOW64\niduje.exeC:\Windows\system32\niduje.exe 804 "C:\Windows\SysWOW64\jovmkl.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2116 -
C:\Windows\SysWOW64\dmlpfj.exeC:\Windows\system32\dmlpfj.exe 816 "C:\Windows\SysWOW64\niduje.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:888 -
C:\Windows\SysWOW64\psujta.exeC:\Windows\system32\psujta.exe 808 "C:\Windows\SysWOW64\dmlpfj.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1064 -
C:\Windows\SysWOW64\pzqjop.exeC:\Windows\system32\pzqjop.exe 788 "C:\Windows\SysWOW64\psujta.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Windows\SysWOW64\cylewx.exeC:\Windows\system32\cylewx.exe 828 "C:\Windows\SysWOW64\pzqjop.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2408 -
C:\Windows\SysWOW64\oaruic.exeC:\Windows\system32\oaruic.exe 812 "C:\Windows\SysWOW64\cylewx.exe"34⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\zkgzus.exeC:\Windows\system32\zkgzus.exe 836 "C:\Windows\SysWOW64\oaruic.exe"35⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\juekiv.exeC:\Windows\system32\juekiv.exe 820 "C:\Windows\SysWOW64\zkgzus.exe"36⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\tqwupp.exeC:\Windows\system32\tqwupp.exe 844 "C:\Windows\SysWOW64\juekiv.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2820 -
C:\Windows\SysWOW64\abvzmj.exeC:\Windows\system32\abvzmj.exe 832 "C:\Windows\SysWOW64\tqwupp.exe"38⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\qvsuwf.exeC:\Windows\system32\qvsuwf.exe 824 "C:\Windows\SysWOW64\abvzmj.exe"39⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\sivxrf.exeC:\Windows\system32\sivxrf.exe 648 "C:\Windows\SysWOW64\qvsuwf.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2628 -
C:\Windows\SysWOW64\fdmmxb.exeC:\Windows\system32\fdmmxb.exe 840 "C:\Windows\SysWOW64\sivxrf.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2712 -
C:\Windows\SysWOW64\suhpfj.exeC:\Windows\system32\suhpfj.exe 852 "C:\Windows\SysWOW64\fdmmxb.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2652 -
C:\Windows\SysWOW64\fwnfrw.exeC:\Windows\system32\fwnfrw.exe 856 "C:\Windows\SysWOW64\suhpfj.exe"43⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\msxkih.exeC:\Windows\system32\msxkih.exe 868 "C:\Windows\SysWOW64\fwnfrw.exe"44⤵
- Executes dropped EXE
PID:1072 -
C:\Windows\SysWOW64\clufsv.exeC:\Windows\system32\clufsv.exe 876 "C:\Windows\SysWOW64\msxkih.exe"45⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1364 -
C:\Windows\SysWOW64\msgccu.exeC:\Windows\system32\msgccu.exe 864 "C:\Windows\SysWOW64\clufsv.exe"46⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\yqpxqk.exeC:\Windows\system32\yqpxqk.exe 880 "C:\Windows\SysWOW64\msgccu.exe"47⤵
- Executes dropped EXE
PID:1248 -
C:\Windows\SysWOW64\lswncp.exeC:\Windows\system32\lswncp.exe 872 "C:\Windows\SysWOW64\yqpxqk.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\yqypkx.exeC:\Windows\system32\yqypkx.exe 860 "C:\Windows\SysWOW64\lswncp.exe"49⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\fymhfm.exeC:\Windows\system32\fymhfm.exe 888 "C:\Windows\SysWOW64\yqypkx.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:672 -
C:\Windows\SysWOW64\vjjcoi.exeC:\Windows\system32\vjjcoi.exe 900 "C:\Windows\SysWOW64\fymhfm.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\hilfxi.exeC:\Windows\system32\hilfxi.exe 892 "C:\Windows\SysWOW64\vjjcoi.exe"52⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\shpchh.exeC:\Windows\system32\shpchh.exe 896 "C:\Windows\SysWOW64\hilfxi.exe"53⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\fuhsnl.exeC:\Windows\system32\fuhsnl.exe 912 "C:\Windows\SysWOW64\shpchh.exe"54⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\SysWOW64\rzqnbc.exeC:\Windows\system32\rzqnbc.exe 916 "C:\Windows\SysWOW64\fuhsnl.exe"55⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\emilpy.exeC:\Windows\system32\emilpy.exe 904 "C:\Windows\SysWOW64\rzqnbc.exe"56⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\SysWOW64\oxxvcb.exeC:\Windows\system32\oxxvcb.exe 908 "C:\Windows\SysWOW64\emilpy.exe"57⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\bnsqlj.exeC:\Windows\system32\bnsqlj.exe 920 "C:\Windows\SysWOW64\oxxvcb.exe"58⤵
- Executes dropped EXE
PID:776 -
C:\Windows\SysWOW64\lnevvi.exeC:\Windows\system32\lnevvi.exe 924 "C:\Windows\SysWOW64\bnsqlj.exe"59⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\vxufrl.exeC:\Windows\system32\vxufrl.exe 884 "C:\Windows\SysWOW64\lnevvi.exe"60⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\iklvwh.exeC:\Windows\system32\iklvwh.exe 932 "C:\Windows\SysWOW64\vxufrl.exe"61⤵
- Executes dropped EXE
PID:892 -
C:\Windows\SysWOW64\svbgkk.exeC:\Windows\system32\svbgkk.exe 936 "C:\Windows\SysWOW64\iklvwh.exe"62⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\fphnvw.exeC:\Windows\system32\fphnvw.exe 940 "C:\Windows\SysWOW64\svbgkk.exe"63⤵
- Executes dropped EXE
PID:920 -
C:\Windows\SysWOW64\scqdba.exeC:\Windows\system32\scqdba.exe 952 "C:\Windows\SysWOW64\fphnvw.exe"64⤵
- Executes dropped EXE
PID:820 -
C:\Windows\SysWOW64\feetuf.exeC:\Windows\system32\feetuf.exe 944 "C:\Windows\SysWOW64\scqdba.exe"65⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2844 -
C:\Windows\SysWOW64\poudhi.exeC:\Windows\system32\poudhi.exe 948 "C:\Windows\SysWOW64\feetuf.exe"66⤵PID:2140
-
C:\Windows\SysWOW64\cfogqq.exeC:\Windows\system32\cfogqq.exe 956 "C:\Windows\SysWOW64\poudhi.exe"67⤵PID:2276
-
C:\Windows\SysWOW64\ovjizq.exeC:\Windows\system32\ovjizq.exe 968 "C:\Windows\SysWOW64\cfogqq.exe"68⤵
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\ygztmt.exeC:\Windows\system32\ygztmt.exe 928 "C:\Windows\SysWOW64\ovjizq.exe"69⤵PID:560
-
C:\Windows\SysWOW64\linafg.exeC:\Windows\system32\linafg.exe 964 "C:\Windows\SysWOW64\ygztmt.exe"70⤵PID:2228
-
C:\Windows\SysWOW64\yvwylk.exeC:\Windows\system32\yvwylk.exe 972 "C:\Windows\SysWOW64\linafg.exe"71⤵PID:1856
-
C:\Windows\SysWOW64\iuiwwi.exeC:\Windows\system32\iuiwwi.exe 976 "C:\Windows\SysWOW64\yvwylk.exe"72⤵PID:2396
-
C:\Windows\SysWOW64\sfygjm.exeC:\Windows\system32\sfygjm.exe 980 "C:\Windows\SysWOW64\iuiwwi.exe"73⤵PID:2176
-
C:\Windows\SysWOW64\fzeocq.exeC:\Windows\system32\fzeocq.exe 984 "C:\Windows\SysWOW64\sfygjm.exe"74⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\sxzqly.exeC:\Windows\system32\sxzqly.exe 988 "C:\Windows\SysWOW64\fzeocq.exe"75⤵PID:2972
-
C:\Windows\SysWOW64\fottty.exeC:\Windows\system32\fottty.exe 992 "C:\Windows\SysWOW64\sxzqly.exe"76⤵PID:2204
-
C:\Windows\SysWOW64\sewwcg.exeC:\Windows\system32\sewwcg.exe 996 "C:\Windows\SysWOW64\fottty.exe"77⤵
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\SysWOW64\fdrylp.exeC:\Windows\system32\fdrylp.exe 1000 "C:\Windows\SysWOW64\sewwcg.exe"78⤵
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Windows\SysWOW64\grswbw.exeC:\Windows\system32\grswbw.exe 1012 "C:\Windows\SysWOW64\fdrylp.exe"79⤵PID:1580
-
C:\Windows\SysWOW64\thmyjw.exeC:\Windows\system32\thmyjw.exe 1004 "C:\Windows\SysWOW64\grswbw.exe"80⤵PID:1136
-
C:\Windows\SysWOW64\gypbae.exeC:\Windows\system32\gypbae.exe 1008 "C:\Windows\SysWOW64\thmyjw.exe"81⤵
- Drops file in System32 directory
PID:3052 -
C:\Windows\SysWOW64\twkein.exeC:\Windows\system32\twkein.exe 1028 "C:\Windows\SysWOW64\gypbae.exe"82⤵PID:2808
-
C:\Windows\SysWOW64\gnfyrn.exeC:\Windows\system32\gnfyrn.exe 1020 "C:\Windows\SysWOW64\twkein.exe"83⤵
- Drops file in System32 directory
PID:1700 -
C:\Windows\SysWOW64\tlibav.exeC:\Windows\system32\tlibav.exe 1016 "C:\Windows\SysWOW64\gnfyrn.exe"84⤵PID:1748
-
C:\Windows\SysWOW64\crizqc.exeC:\Windows\system32\crizqc.exe 1036 "C:\Windows\SysWOW64\tlibav.exe"85⤵PID:2572
-
C:\Windows\SysWOW64\pqdbyd.exeC:\Windows\system32\pqdbyd.exe 1032 "C:\Windows\SysWOW64\crizqc.exe"86⤵
- Identifies Wine through registry keys
PID:3000 -
C:\Windows\SysWOW64\cgyehl.exeC:\Windows\system32\cgyehl.exe 960 "C:\Windows\SysWOW64\pqdbyd.exe"87⤵PID:1804
-
C:\Windows\SysWOW64\pfbhyt.exeC:\Windows\system32\pfbhyt.exe 1044 "C:\Windows\SysWOW64\cgyehl.exe"88⤵
- Identifies Wine through registry keys
PID:1816 -
C:\Windows\SysWOW64\cvwjgt.exeC:\Windows\system32\cvwjgt.exe 1048 "C:\Windows\SysWOW64\pfbhyt.exe"89⤵PID:2196
-
C:\Windows\SysWOW64\mjwzwa.exeC:\Windows\system32\mjwzwa.exe 1052 "C:\Windows\SysWOW64\cvwjgt.exe"90⤵PID:2512
-
C:\Windows\SysWOW64\zarbfj.exeC:\Windows\system32\zarbfj.exe 1056 "C:\Windows\SysWOW64\mjwzwa.exe"91⤵PID:1060
-
C:\Windows\SysWOW64\mymenr.exeC:\Windows\system32\mymenr.exe 1060 "C:\Windows\SysWOW64\zarbfj.exe"92⤵PID:1684
-
C:\Windows\SysWOW64\ypphwr.exeC:\Windows\system32\ypphwr.exe 1064 "C:\Windows\SysWOW64\mymenr.exe"93⤵PID:984
-
C:\Windows\SysWOW64\irerru.exeC:\Windows\system32\irerru.exe 1068 "C:\Windows\SysWOW64\ypphwr.exe"94⤵PID:2356
-
C:\Windows\SysWOW64\vmnhxy.exeC:\Windows\system32\vmnhxy.exe 1040 "C:\Windows\SysWOW64\irerru.exe"95⤵PID:860
-
C:\Windows\SysWOW64\fplrkb.exeC:\Windows\system32\fplrkb.exe 1072 "C:\Windows\SysWOW64\vmnhxy.exe"96⤵PID:2548
-
C:\Windows\SysWOW64\paacfe.exeC:\Windows\system32\paacfe.exe 1080 "C:\Windows\SysWOW64\fplrkb.exe"97⤵PID:2580
-
C:\Windows\SysWOW64\cnkrla.exeC:\Windows\system32\cnkrla.exe 1084 "C:\Windows\SysWOW64\paacfe.exe"98⤵
- Drops file in System32 directory
PID:2840 -
C:\Windows\SysWOW64\pdnuui.exeC:\Windows\system32\pdnuui.exe 1088 "C:\Windows\SysWOW64\cnkrla.exe"99⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:272 -
C:\Windows\SysWOW64\zrnrkq.exeC:\Windows\system32\zrnrkq.exe 1100 "C:\Windows\SysWOW64\pdnuui.exe"100⤵PID:2136
-
C:\Windows\SysWOW64\mexhqt.exeC:\Windows\system32\mexhqt.exe 1092 "C:\Windows\SysWOW64\zrnrkq.exe"101⤵PID:2232
-
C:\Windows\SysWOW64\zgdxby.exeC:\Windows\system32\zgdxby.exe 1096 "C:\Windows\SysWOW64\mexhqt.exe"102⤵PID:3068
-
C:\Windows\SysWOW64\jjshwb.exeC:\Windows\system32\jjshwb.exe 1112 "C:\Windows\SysWOW64\zgdxby.exe"103⤵
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\zvacao.exeC:\Windows\system32\zvacao.exe 1076 "C:\Windows\SysWOW64\jjshwb.exe"104⤵PID:1620
-
C:\Windows\SysWOW64\jyqnoj.exeC:\Windows\system32\jyqnoj.exe 1108 "C:\Windows\SysWOW64\zvacao.exe"105⤵PID:1728
-
C:\Windows\SysWOW64\vawuzw.exeC:\Windows\system32\vawuzw.exe 1116 "C:\Windows\SysWOW64\jyqnoj.exe"106⤵
- Identifies Wine through registry keys
PID:868 -
C:\Windows\SysWOW64\iqrxie.exeC:\Windows\system32\iqrxie.exe 1120 "C:\Windows\SysWOW64\vawuzw.exe"107⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\vpuaqe.exeC:\Windows\system32\vpuaqe.exe 1124 "C:\Windows\SysWOW64\iqrxie.exe"108⤵
- Drops file in System32 directory
PID:1964 -
C:\Windows\SysWOW64\ifoczm.exeC:\Windows\system32\ifoczm.exe 1128 "C:\Windows\SysWOW64\vpuaqe.exe"109⤵
- System Location Discovery: System Language Discovery
PID:376 -
C:\Windows\SysWOW64\stpaxu.exeC:\Windows\system32\stpaxu.exe 1132 "C:\Windows\SysWOW64\ifoczm.exe"110⤵PID:2928
-
C:\Windows\SysWOW64\fkkcfc.exeC:\Windows\system32\fkkcfc.exe 1136 "C:\Windows\SysWOW64\stpaxu.exe"111⤵PID:1520
-
C:\Windows\SysWOW64\rinxoc.exeC:\Windows\system32\rinxoc.exe 1140 "C:\Windows\SysWOW64\fkkcfc.exe"112⤵PID:2796
-
C:\Windows\SysWOW64\ezhaxk.exeC:\Windows\system32\ezhaxk.exe 1144 "C:\Windows\SysWOW64\rinxoc.exe"113⤵
- Drops file in System32 directory
PID:1412 -
C:\Windows\SysWOW64\obxkkn.exeC:\Windows\system32\obxkkn.exe 1148 "C:\Windows\SysWOW64\ezhaxk.exe"114⤵PID:2068
-
C:\Windows\SysWOW64\bddads.exeC:\Windows\system32\bddads.exe 1104 "C:\Windows\SysWOW64\obxkkn.exe"115⤵PID:2524
-
C:\Windows\SysWOW64\ocgcma.exeC:\Windows\system32\ocgcma.exe 1156 "C:\Windows\SysWOW64\bddads.exe"116⤵PID:1644
-
C:\Windows\SysWOW64\bppsse.exeC:\Windows\system32\bppsse.exe 1168 "C:\Windows\SysWOW64\ocgcma.exe"117⤵PID:2264
-
C:\Windows\SysWOW64\ojvidi.exeC:\Windows\system32\ojvidi.exe 1160 "C:\Windows\SysWOW64\bppsse.exe"118⤵PID:444
-
C:\Windows\SysWOW64\bhqlmq.exeC:\Windows\system32\bhqlmq.exe 1164 "C:\Windows\SysWOW64\ojvidi.exe"119⤵PID:2428
-
C:\Windows\SysWOW64\kvracy.exeC:\Windows\system32\kvracy.exe 1172 "C:\Windows\SysWOW64\bhqlmq.exe"120⤵
- Identifies Wine through registry keys
PID:3024 -
C:\Windows\SysWOW64\xiiyqc.exeC:\Windows\system32\xiiyqc.exe 1176 "C:\Windows\SysWOW64\kvracy.exe"121⤵PID:964
-
C:\Windows\SysWOW64\kzdsyc.exeC:\Windows\system32\kzdsyc.exe 1180 "C:\Windows\SysWOW64\xiiyqc.exe"122⤵PID:2852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-