Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 17:30
Static task
static1
Behavioral task
behavioral1
Sample
de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
de91a7fe31ed66c3e047fb1ea1269ec8
-
SHA1
d46c278786e2be435330fddc3d6ba1e8301cd3af
-
SHA256
a1ef37444b6e1b8a30cdeed40de0a6d7c86f750a4f2355c69a5a6849e82d772d
-
SHA512
703cf07914ff5155ccc4460e78028a89ddf97a492e2c60c6dba25c066faef522716027df38c0a0f783997f10c1079ac0e094e19a399a25d36a26a4a3e555b1bf
-
SSDEEP
24576:9rzMyPt4PdiGr/wf66m2tov+YtgVq2TiQULeMHYM/nV4hV6P0BOeMT6FJy7:9rzMtLr/wf664HtW/5UJH9/nVW6iI6
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2572 ktkxny.exe 1992 zbfpou.exe 2788 bexxil.exe 2008 nnyffn.exe 3028 yjzxvh.exe 280 czwkrn.exe 3032 enzvmo.exe 2652 ztpphl.exe 2724 galibb.exe 1420 ikcftx.exe 2628 vxmvzb.exe 2032 plyqih.exe 1876 zkdnsg.exe 1456 whjnlf.exe 2052 hgoldd.exe 1000 yvniis.exe 2104 jrotqm.exe 3064 vhjvyu.exe 2620 inaqnl.exe 2060 smmvfk.exe 1700 fkhyok.exe 3004 sxzoto.exe 1468 frfvfa.exe 2044 mkdicu.exe 1672 cspibe.exe 2884 jakjvt.exe 2460 wcqqgf.exe 2840 jpagmj.exe 3040 tapqhm.exe 2928 gqstqn.exe 2436 spnwyv.exe 1696 crcgmy.exe 2320 ptiwxc.exe 2144 zsutqb.exe 1096 mfejvf.exe 908 tzlokz.exe 1864 hmueqd.exe 2268 rokolg.exe 2688 ywfoyv.exe 2532 npcbhr.exe 2092 agxeqr.exe 1904 nerhyz.exe 612 xdeery.exe 2824 xlredn.exe 2112 kjuhmw.exe 2072 ufnrbq.exe 2188 eikcot.exe 2284 oszmkw.exe 2972 bjupsw.exe 900 owmeya.exe 696 bysukn.exe 844 nonpsn.exe 2740 xcnmiu.exe 2912 ktiprd.exe 2236 xrlshd.exe 2296 huacvg.exe 1212 usvfdo.exe 1512 hjqhmw.exe 1944 wzjhtg.exe 2280 dkiuqz.exe 2768 qbdxyi.exe 3048 alsall.exe 1084 qbmhsu.exe 2012 aaqfdt.exe -
Loads dropped DLL 64 IoCs
pid Process 2716 de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe 2716 de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe 2572 ktkxny.exe 2572 ktkxny.exe 1992 zbfpou.exe 1992 zbfpou.exe 2788 bexxil.exe 2788 bexxil.exe 2008 nnyffn.exe 2008 nnyffn.exe 3028 yjzxvh.exe 3028 yjzxvh.exe 280 czwkrn.exe 280 czwkrn.exe 3032 enzvmo.exe 3032 enzvmo.exe 2652 ztpphl.exe 2652 ztpphl.exe 2724 galibb.exe 2724 galibb.exe 1420 ikcftx.exe 1420 ikcftx.exe 2628 vxmvzb.exe 2628 vxmvzb.exe 2032 plyqih.exe 2032 plyqih.exe 1876 zkdnsg.exe 1876 zkdnsg.exe 1456 whjnlf.exe 1456 whjnlf.exe 2052 hgoldd.exe 2052 hgoldd.exe 1000 yvniis.exe 1000 yvniis.exe 2104 jrotqm.exe 2104 jrotqm.exe 3064 vhjvyu.exe 3064 vhjvyu.exe 2620 inaqnl.exe 2620 inaqnl.exe 2060 smmvfk.exe 2060 smmvfk.exe 1700 fkhyok.exe 1700 fkhyok.exe 3004 sxzoto.exe 3004 sxzoto.exe 1468 frfvfa.exe 1468 frfvfa.exe 2044 mkdicu.exe 2044 mkdicu.exe 1672 cspibe.exe 1672 cspibe.exe 2884 jakjvt.exe 2884 jakjvt.exe 2460 wcqqgf.exe 2460 wcqqgf.exe 2840 jpagmj.exe 2840 jpagmj.exe 3040 tapqhm.exe 3040 tapqhm.exe 2928 gqstqn.exe 2928 gqstqn.exe 2436 spnwyv.exe 2436 spnwyv.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ctopnc.exe pdunec.exe File opened for modification C:\Windows\SysWOW64\iqxxyd.exe vwrpmy.exe File created C:\Windows\SysWOW64\fvcvkf.exe pquaga.exe File opened for modification C:\Windows\SysWOW64\unrqzc.exe hwooru.exe File created C:\Windows\SysWOW64\dfergj.exe qgkoxa.exe File opened for modification C:\Windows\SysWOW64\twcskl.exe ggzpbc.exe File created C:\Windows\SysWOW64\fmuzah.exe snrwrh.exe File created C:\Windows\SysWOW64\pppwtf.exe czutlw.exe File opened for modification C:\Windows\SysWOW64\citauj.exe syeqhg.exe File opened for modification C:\Windows\SysWOW64\eydbcy.exe riiyuq.exe File created C:\Windows\SysWOW64\sefwcv.exe ffkttu.exe File opened for modification C:\Windows\SysWOW64\npcbhr.exe ywfoyv.exe File opened for modification C:\Windows\SysWOW64\nqgmva.exe asdjms.exe File created C:\Windows\SysWOW64\jthiuy.exe aisyzv.exe File opened for modification C:\Windows\SysWOW64\ldvqte.exe ymaokw.exe File opened for modification C:\Windows\SysWOW64\njyhmd.exe aldedv.exe File opened for modification C:\Windows\SysWOW64\gquabg.exe wofqfd.exe File created C:\Windows\SysWOW64\ldvqte.exe ymaokw.exe File created C:\Windows\SysWOW64\qcdvib.exe dmiszb.exe File created C:\Windows\SysWOW64\fwydbk.exe vuisoh.exe File opened for modification C:\Windows\SysWOW64\wkdbbn.exe mwkllf.exe File opened for modification C:\Windows\SysWOW64\ffkttu.exe spprlm.exe File created C:\Windows\SysWOW64\uknngm.exe itssym.exe File opened for modification C:\Windows\SysWOW64\wofqfd.exe jpknxv.exe File opened for modification C:\Windows\SysWOW64\aisyzv.exe kerdvq.exe File created C:\Windows\SysWOW64\woeekv.exe jyjbbn.exe File created C:\Windows\SysWOW64\fpznhr.exe vejcuo.exe File created C:\Windows\SysWOW64\ptiwxc.exe crcgmy.exe File created C:\Windows\SysWOW64\pmokgc.exe atrxfg.exe File opened for modification C:\Windows\SysWOW64\hegsxs.exe uneqoj.exe File opened for modification C:\Windows\SysWOW64\oordzc.exe bqwbqu.exe File opened for modification C:\Windows\SysWOW64\meqhvz.exe cqprxs.exe File opened for modification C:\Windows\SysWOW64\fkhgsm.exe vzsvej.exe File created C:\Windows\SysWOW64\epxjzz.exe qcnutv.exe File created C:\Windows\SysWOW64\pqvpij.exe fkuakb.exe File opened for modification C:\Windows\SysWOW64\cspibe.exe mkdicu.exe File opened for modification C:\Windows\SysWOW64\bppsse.exe oqupjw.exe File opened for modification C:\Windows\SysWOW64\paqaze.exe fuqljf.exe File created C:\Windows\SysWOW64\thivtv.exe jwklgs.exe File opened for modification C:\Windows\SysWOW64\nrykhu.exe abdhym.exe File opened for modification C:\Windows\SysWOW64\nhlsfx.exe ajqpwp.exe File created C:\Windows\SysWOW64\krbvfl.exe aomlki.exe File opened for modification C:\Windows\SysWOW64\vjwelr.exe isbccr.exe File created C:\Windows\SysWOW64\lfpmao.exe ypukrg.exe File created C:\Windows\SysWOW64\ljitrc.exe ysnyiu.exe File opened for modification C:\Windows\SysWOW64\cwqogq.exe staetn.exe File created C:\Windows\SysWOW64\apfcdu.exe qbennm.exe File opened for modification C:\Windows\SysWOW64\abtioa.exe nkyffs.exe File created C:\Windows\SysWOW64\ytytbe.exe ldvqte.exe File created C:\Windows\SysWOW64\ympyjv.exe lkjrxj.exe File opened for modification C:\Windows\SysWOW64\jwklgs.exe wjbvao.exe File opened for modification C:\Windows\SysWOW64\pppwtf.exe czutlw.exe File created C:\Windows\SysWOW64\ytehep.exe lvjevh.exe File created C:\Windows\SysWOW64\bmeltt.exe liwqpo.exe File created C:\Windows\SysWOW64\mkdicu.exe frfvfa.exe File opened for modification C:\Windows\SysWOW64\agxeqr.exe npcbhr.exe File created C:\Windows\SysWOW64\bppsse.exe oqupjw.exe File created C:\Windows\SysWOW64\qfconn.exe dgimff.exe File opened for modification C:\Windows\SysWOW64\zwykec.exe mgdivc.exe File opened for modification C:\Windows\SysWOW64\xpeyom.exe krbvfl.exe File created C:\Windows\SysWOW64\qrpors.exe dtmlik.exe File opened for modification C:\Windows\SysWOW64\pggqkq.exe cilnbi.exe File created C:\Windows\SysWOW64\dyqhwe.exe ckpjgw.exe File opened for modification C:\Windows\SysWOW64\tejlgs.exe gfgjys.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrteq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ayywey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language loflco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jiumfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fgcjil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjmsgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpeani.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iqxxyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hztgkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whjnlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ytlsql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajfsjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gppdma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language paqaze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gfbvvy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdomzl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iarbsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bwmigq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sefwcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkmhku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lunszw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language affdth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lwslzr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jckbxw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlpeqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvxqpe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljzdok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ugquep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gfsfso.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrpodz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvgprt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qeodbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language klrpxs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgzawu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mlbfrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cojihv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttkwas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evmffw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language japuwa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgoldd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icbypa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spnbdo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mwkllf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbbwlm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wkmrex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxsqvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pskkdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uwfbml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vopbws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccqvbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vwrpmy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spknko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kjuhmw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qnjvnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gkcvri.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfzfmu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsdvvy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvniis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mfejvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fuqljf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmywgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abdhym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pqvpij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oexzed.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2716 de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe 2572 ktkxny.exe 1992 zbfpou.exe 2788 bexxil.exe 2008 nnyffn.exe 3028 yjzxvh.exe 280 czwkrn.exe 3032 enzvmo.exe 2652 ztpphl.exe 2724 galibb.exe 1420 ikcftx.exe 2628 vxmvzb.exe 2032 plyqih.exe 1876 zkdnsg.exe 1456 whjnlf.exe 2052 hgoldd.exe 1000 yvniis.exe 2104 jrotqm.exe 3064 vhjvyu.exe 2620 inaqnl.exe 2060 smmvfk.exe 1700 fkhyok.exe 3004 sxzoto.exe 1468 frfvfa.exe 2044 mkdicu.exe 1672 cspibe.exe 2884 jakjvt.exe 2460 wcqqgf.exe 2840 jpagmj.exe 3040 tapqhm.exe 2928 gqstqn.exe 2436 spnwyv.exe 1696 crcgmy.exe 2320 ptiwxc.exe 2144 zsutqb.exe 1096 mfejvf.exe 908 tzlokz.exe 1864 hmueqd.exe 2268 rokolg.exe 2688 ywfoyv.exe 2532 npcbhr.exe 2092 agxeqr.exe 1904 nerhyz.exe 612 xdeery.exe 2824 xlredn.exe 2112 kjuhmw.exe 2072 ufnrbq.exe 2188 eikcot.exe 2284 oszmkw.exe 2972 bjupsw.exe 900 owmeya.exe 696 bysukn.exe 844 nonpsn.exe 2740 xcnmiu.exe 2912 ktiprd.exe 2236 xrlshd.exe 2296 huacvg.exe 1212 usvfdo.exe 1512 hjqhmw.exe 1944 wzjhtg.exe 2280 dkiuqz.exe 2768 qbdxyi.exe 3048 alsall.exe 1084 qbmhsu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2572 2716 de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2572 2716 de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2572 2716 de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe 30 PID 2716 wrote to memory of 2572 2716 de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe 30 PID 2572 wrote to memory of 1992 2572 ktkxny.exe 31 PID 2572 wrote to memory of 1992 2572 ktkxny.exe 31 PID 2572 wrote to memory of 1992 2572 ktkxny.exe 31 PID 2572 wrote to memory of 1992 2572 ktkxny.exe 31 PID 1992 wrote to memory of 2788 1992 zbfpou.exe 32 PID 1992 wrote to memory of 2788 1992 zbfpou.exe 32 PID 1992 wrote to memory of 2788 1992 zbfpou.exe 32 PID 1992 wrote to memory of 2788 1992 zbfpou.exe 32 PID 2788 wrote to memory of 2008 2788 bexxil.exe 33 PID 2788 wrote to memory of 2008 2788 bexxil.exe 33 PID 2788 wrote to memory of 2008 2788 bexxil.exe 33 PID 2788 wrote to memory of 2008 2788 bexxil.exe 33 PID 2008 wrote to memory of 3028 2008 nnyffn.exe 34 PID 2008 wrote to memory of 3028 2008 nnyffn.exe 34 PID 2008 wrote to memory of 3028 2008 nnyffn.exe 34 PID 2008 wrote to memory of 3028 2008 nnyffn.exe 34 PID 3028 wrote to memory of 280 3028 yjzxvh.exe 35 PID 3028 wrote to memory of 280 3028 yjzxvh.exe 35 PID 3028 wrote to memory of 280 3028 yjzxvh.exe 35 PID 3028 wrote to memory of 280 3028 yjzxvh.exe 35 PID 280 wrote to memory of 3032 280 czwkrn.exe 36 PID 280 wrote to memory of 3032 280 czwkrn.exe 36 PID 280 wrote to memory of 3032 280 czwkrn.exe 36 PID 280 wrote to memory of 3032 280 czwkrn.exe 36 PID 3032 wrote to memory of 2652 3032 enzvmo.exe 37 PID 3032 wrote to memory of 2652 3032 enzvmo.exe 37 PID 3032 wrote to memory of 2652 3032 enzvmo.exe 37 PID 3032 wrote to memory of 2652 3032 enzvmo.exe 37 PID 2652 wrote to memory of 2724 2652 ztpphl.exe 38 PID 2652 wrote to memory of 2724 2652 ztpphl.exe 38 PID 2652 wrote to memory of 2724 2652 ztpphl.exe 38 PID 2652 wrote to memory of 2724 2652 ztpphl.exe 38 PID 2724 wrote to memory of 1420 2724 galibb.exe 39 PID 2724 wrote to memory of 1420 2724 galibb.exe 39 PID 2724 wrote to memory of 1420 2724 galibb.exe 39 PID 2724 wrote to memory of 1420 2724 galibb.exe 39 PID 1420 wrote to memory of 2628 1420 ikcftx.exe 40 PID 1420 wrote to memory of 2628 1420 ikcftx.exe 40 PID 1420 wrote to memory of 2628 1420 ikcftx.exe 40 PID 1420 wrote to memory of 2628 1420 ikcftx.exe 40 PID 2628 wrote to memory of 2032 2628 vxmvzb.exe 41 PID 2628 wrote to memory of 2032 2628 vxmvzb.exe 41 PID 2628 wrote to memory of 2032 2628 vxmvzb.exe 41 PID 2628 wrote to memory of 2032 2628 vxmvzb.exe 41 PID 2032 wrote to memory of 1876 2032 plyqih.exe 42 PID 2032 wrote to memory of 1876 2032 plyqih.exe 42 PID 2032 wrote to memory of 1876 2032 plyqih.exe 42 PID 2032 wrote to memory of 1876 2032 plyqih.exe 42 PID 1876 wrote to memory of 1456 1876 zkdnsg.exe 43 PID 1876 wrote to memory of 1456 1876 zkdnsg.exe 43 PID 1876 wrote to memory of 1456 1876 zkdnsg.exe 43 PID 1876 wrote to memory of 1456 1876 zkdnsg.exe 43 PID 1456 wrote to memory of 2052 1456 whjnlf.exe 44 PID 1456 wrote to memory of 2052 1456 whjnlf.exe 44 PID 1456 wrote to memory of 2052 1456 whjnlf.exe 44 PID 1456 wrote to memory of 2052 1456 whjnlf.exe 44 PID 2052 wrote to memory of 1000 2052 hgoldd.exe 45 PID 2052 wrote to memory of 1000 2052 hgoldd.exe 45 PID 2052 wrote to memory of 1000 2052 hgoldd.exe 45 PID 2052 wrote to memory of 1000 2052 hgoldd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\ktkxny.exeC:\Windows\system32\ktkxny.exe 648 "C:\Users\Admin\AppData\Local\Temp\de91a7fe31ed66c3e047fb1ea1269ec8_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\zbfpou.exeC:\Windows\system32\zbfpou.exe 624 "C:\Windows\SysWOW64\ktkxny.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\bexxil.exeC:\Windows\system32\bexxil.exe 632 "C:\Windows\SysWOW64\zbfpou.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\nnyffn.exeC:\Windows\system32\nnyffn.exe 724 "C:\Windows\SysWOW64\bexxil.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\yjzxvh.exeC:\Windows\system32\yjzxvh.exe 640 "C:\Windows\SysWOW64\nnyffn.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\czwkrn.exeC:\Windows\system32\czwkrn.exe 720 "C:\Windows\SysWOW64\yjzxvh.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\enzvmo.exeC:\Windows\system32\enzvmo.exe 728 "C:\Windows\SysWOW64\czwkrn.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\ztpphl.exeC:\Windows\system32\ztpphl.exe 636 "C:\Windows\SysWOW64\enzvmo.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\galibb.exeC:\Windows\system32\galibb.exe 628 "C:\Windows\SysWOW64\ztpphl.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\ikcftx.exeC:\Windows\system32\ikcftx.exe 644 "C:\Windows\SysWOW64\galibb.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\vxmvzb.exeC:\Windows\system32\vxmvzb.exe 748 "C:\Windows\SysWOW64\ikcftx.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\plyqih.exeC:\Windows\system32\plyqih.exe 676 "C:\Windows\SysWOW64\vxmvzb.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\zkdnsg.exeC:\Windows\system32\zkdnsg.exe 756 "C:\Windows\SysWOW64\plyqih.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\whjnlf.exeC:\Windows\system32\whjnlf.exe 752 "C:\Windows\SysWOW64\zkdnsg.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\hgoldd.exeC:\Windows\system32\hgoldd.exe 760 "C:\Windows\SysWOW64\whjnlf.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\yvniis.exeC:\Windows\system32\yvniis.exe 708 "C:\Windows\SysWOW64\hgoldd.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1000 -
C:\Windows\SysWOW64\jrotqm.exeC:\Windows\system32\jrotqm.exe 768 "C:\Windows\SysWOW64\yvniis.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\vhjvyu.exeC:\Windows\system32\vhjvyu.exe 772 "C:\Windows\SysWOW64\jrotqm.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\inaqnl.exeC:\Windows\system32\inaqnl.exe 776 "C:\Windows\SysWOW64\vhjvyu.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\smmvfk.exeC:\Windows\system32\smmvfk.exe 780 "C:\Windows\SysWOW64\inaqnl.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\fkhyok.exeC:\Windows\system32\fkhyok.exe 784 "C:\Windows\SysWOW64\smmvfk.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1700 -
C:\Windows\SysWOW64\sxzoto.exeC:\Windows\system32\sxzoto.exe 764 "C:\Windows\SysWOW64\fkhyok.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\frfvfa.exeC:\Windows\system32\frfvfa.exe 788 "C:\Windows\SysWOW64\sxzoto.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1468 -
C:\Windows\SysWOW64\mkdicu.exeC:\Windows\system32\mkdicu.exe 796 "C:\Windows\SysWOW64\frfvfa.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\cspibe.exeC:\Windows\system32\cspibe.exe 800 "C:\Windows\SysWOW64\mkdicu.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\jakjvt.exeC:\Windows\system32\jakjvt.exe 808 "C:\Windows\SysWOW64\cspibe.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2884 -
C:\Windows\SysWOW64\wcqqgf.exeC:\Windows\system32\wcqqgf.exe 792 "C:\Windows\SysWOW64\jakjvt.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\jpagmj.exeC:\Windows\system32\jpagmj.exe 812 "C:\Windows\SysWOW64\wcqqgf.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\tapqhm.exeC:\Windows\system32\tapqhm.exe 804 "C:\Windows\SysWOW64\jpagmj.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\gqstqn.exeC:\Windows\system32\gqstqn.exe 820 "C:\Windows\SysWOW64\tapqhm.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\spnwyv.exeC:\Windows\system32\spnwyv.exe 832 "C:\Windows\SysWOW64\gqstqn.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\crcgmy.exeC:\Windows\system32\crcgmy.exe 828 "C:\Windows\SysWOW64\spnwyv.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\ptiwxc.exeC:\Windows\system32\ptiwxc.exe 836 "C:\Windows\SysWOW64\crcgmy.exe"34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\zsutqb.exeC:\Windows\system32\zsutqb.exe 824 "C:\Windows\SysWOW64\ptiwxc.exe"35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\mfejvf.exeC:\Windows\system32\mfejvf.exe 844 "C:\Windows\SysWOW64\zsutqb.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\SysWOW64\tzlokz.exeC:\Windows\system32\tzlokz.exe 840 "C:\Windows\SysWOW64\mfejvf.exe"37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:908 -
C:\Windows\SysWOW64\hmueqd.exeC:\Windows\system32\hmueqd.exe 848 "C:\Windows\SysWOW64\tzlokz.exe"38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1864 -
C:\Windows\SysWOW64\rokolg.exeC:\Windows\system32\rokolg.exe 864 "C:\Windows\SysWOW64\hmueqd.exe"39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\ywfoyv.exeC:\Windows\system32\ywfoyv.exe 652 "C:\Windows\SysWOW64\rokolg.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\npcbhr.exeC:\Windows\system32\npcbhr.exe 856 "C:\Windows\SysWOW64\ywfoyv.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2532 -
C:\Windows\SysWOW64\agxeqr.exeC:\Windows\system32\agxeqr.exe 860 "C:\Windows\SysWOW64\npcbhr.exe"42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2092 -
C:\Windows\SysWOW64\nerhyz.exeC:\Windows\system32\nerhyz.exe 868 "C:\Windows\SysWOW64\agxeqr.exe"43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\xdeery.exeC:\Windows\system32\xdeery.exe 852 "C:\Windows\SysWOW64\nerhyz.exe"44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:612 -
C:\Windows\SysWOW64\xlredn.exeC:\Windows\system32\xlredn.exe 872 "C:\Windows\SysWOW64\xdeery.exe"45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\kjuhmw.exeC:\Windows\system32\kjuhmw.exe 880 "C:\Windows\SysWOW64\xlredn.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\ufnrbq.exeC:\Windows\system32\ufnrbq.exe 884 "C:\Windows\SysWOW64\kjuhmw.exe"47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\eikcot.exeC:\Windows\system32\eikcot.exe 876 "C:\Windows\SysWOW64\ufnrbq.exe"48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\SysWOW64\oszmkw.exeC:\Windows\system32\oszmkw.exe 892 "C:\Windows\SysWOW64\eikcot.exe"49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\bjupsw.exeC:\Windows\system32\bjupsw.exe 888 "C:\Windows\SysWOW64\oszmkw.exe"50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\owmeya.exeC:\Windows\system32\owmeya.exe 912 "C:\Windows\SysWOW64\bjupsw.exe"51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:900 -
C:\Windows\SysWOW64\bysukn.exeC:\Windows\system32\bysukn.exe 896 "C:\Windows\SysWOW64\owmeya.exe"52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:696 -
C:\Windows\SysWOW64\nonpsn.exeC:\Windows\system32\nonpsn.exe 900 "C:\Windows\SysWOW64\bysukn.exe"53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:844 -
C:\Windows\SysWOW64\xcnmiu.exeC:\Windows\system32\xcnmiu.exe 908 "C:\Windows\SysWOW64\nonpsn.exe"54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2740 -
C:\Windows\SysWOW64\ktiprd.exeC:\Windows\system32\ktiprd.exe 916 "C:\Windows\SysWOW64\xcnmiu.exe"55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\xrlshd.exeC:\Windows\system32\xrlshd.exe 904 "C:\Windows\SysWOW64\ktiprd.exe"56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\huacvg.exeC:\Windows\system32\huacvg.exe 924 "C:\Windows\SysWOW64\xrlshd.exe"57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\usvfdo.exeC:\Windows\system32\usvfdo.exe 928 "C:\Windows\SysWOW64\huacvg.exe"58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1212 -
C:\Windows\SysWOW64\hjqhmw.exeC:\Windows\system32\hjqhmw.exe 932 "C:\Windows\SysWOW64\usvfdo.exe"59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\wzjhtg.exeC:\Windows\system32\wzjhtg.exe 936 "C:\Windows\SysWOW64\hjqhmw.exe"60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\dkiuqz.exeC:\Windows\system32\dkiuqz.exe 940 "C:\Windows\SysWOW64\wzjhtg.exe"61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\qbdxyi.exeC:\Windows\system32\qbdxyi.exe 920 "C:\Windows\SysWOW64\dkiuqz.exe"62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\alsall.exeC:\Windows\system32\alsall.exe 948 "C:\Windows\SysWOW64\qbdxyi.exe"63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\qbmhsu.exeC:\Windows\system32\qbmhsu.exe 952 "C:\Windows\SysWOW64\alsall.exe"64⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1084 -
C:\Windows\SysWOW64\aaqfdt.exeC:\Windows\system32\aaqfdt.exe 956 "C:\Windows\SysWOW64\qbmhsu.exe"65⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\nuwvog.exeC:\Windows\system32\nuwvog.exe 960 "C:\Windows\SysWOW64\aaqfdt.exe"66⤵PID:944
-
C:\Windows\SysWOW64\atrxfg.exeC:\Windows\system32\atrxfg.exe 964 "C:\Windows\SysWOW64\nuwvog.exe"67⤵
- Drops file in System32 directory
PID:2456 -
C:\Windows\SysWOW64\pmokgc.exeC:\Windows\system32\pmokgc.exe 968 "C:\Windows\SysWOW64\atrxfg.exe"68⤵PID:2276
-
C:\Windows\SysWOW64\cguaag.exeC:\Windows\system32\cguaag.exe 976 "C:\Windows\SysWOW64\pmokgc.exe"69⤵PID:1240
-
C:\Windows\SysWOW64\pblqgk.exeC:\Windows\system32\pblqgk.exe 972 "C:\Windows\SysWOW64\cguaag.exe"70⤵PID:2692
-
C:\Windows\SysWOW64\zhmnwr.exeC:\Windows\system32\zhmnwr.exe 984 "C:\Windows\SysWOW64\pblqgk.exe"71⤵PID:1256
-
C:\Windows\SysWOW64\lghqes.exeC:\Windows\system32\lghqes.exe 980 "C:\Windows\SysWOW64\zhmnwr.exe"72⤵PID:2308
-
C:\Windows\SysWOW64\ztyfkv.exeC:\Windows\system32\ztyfkv.exe 992 "C:\Windows\SysWOW64\lghqes.exe"73⤵PID:776
-
C:\Windows\SysWOW64\jvoqfy.exeC:\Windows\system32\jvoqfy.exe 988 "C:\Windows\SysWOW64\ztyfkv.exe"74⤵PID:2264
-
C:\Windows\SysWOW64\vuisoh.exeC:\Windows\system32\vuisoh.exe 1000 "C:\Windows\SysWOW64\jvoqfy.exe"75⤵
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\fwydbk.exeC:\Windows\system32\fwydbk.exe 996 "C:\Windows\SysWOW64\vuisoh.exe"76⤵PID:2388
-
C:\Windows\SysWOW64\svbgkk.exeC:\Windows\system32\svbgkk.exe 944 "C:\Windows\SysWOW64\fwydbk.exe"77⤵PID:540
-
C:\Windows\SysWOW64\cxqqfn.exeC:\Windows\system32\cxqqfn.exe 1008 "C:\Windows\SysWOW64\svbgkk.exe"78⤵PID:1112
-
C:\Windows\SysWOW64\pwllnv.exeC:\Windows\system32\pwllnv.exe 1016 "C:\Windows\SysWOW64\cxqqfn.exe"79⤵PID:276
-
C:\Windows\SysWOW64\cmonwd.exeC:\Windows\system32\cmonwd.exe 1020 "C:\Windows\SysWOW64\pwllnv.exe"80⤵PID:1580
-
C:\Windows\SysWOW64\mpdyjy.exeC:\Windows\system32\mpdyjy.exe 1012 "C:\Windows\SysWOW64\cmonwd.exe"81⤵PID:1016
-
C:\Windows\SysWOW64\znyash.exeC:\Windows\system32\znyash.exe 1028 "C:\Windows\SysWOW64\mpdyjy.exe"82⤵PID:1224
-
C:\Windows\SysWOW64\mesdbp.exeC:\Windows\system32\mesdbp.exe 1032 "C:\Windows\SysWOW64\znyash.exe"83⤵PID:1492
-
C:\Windows\SysWOW64\zcvgjp.exeC:\Windows\system32\zcvgjp.exe 1036 "C:\Windows\SysWOW64\mesdbp.exe"84⤵PID:1556
-
C:\Windows\SysWOW64\jflqes.exeC:\Windows\system32\jflqes.exe 1048 "C:\Windows\SysWOW64\zcvgjp.exe"85⤵PID:2684
-
C:\Windows\SysWOW64\veftna.exeC:\Windows\system32\veftna.exe 1040 "C:\Windows\SysWOW64\jflqes.exe"86⤵PID:2360
-
C:\Windows\SysWOW64\iuiwwi.exeC:\Windows\system32\iuiwwi.exe 1060 "C:\Windows\SysWOW64\veftna.exe"87⤵PID:2332
-
C:\Windows\SysWOW64\vkdyej.exeC:\Windows\system32\vkdyej.exe 1052 "C:\Windows\SysWOW64\iuiwwi.exe"88⤵PID:812
-
C:\Windows\SysWOW64\fzeocq.exeC:\Windows\system32\fzeocq.exe 1056 "C:\Windows\SysWOW64\vkdyej.exe"89⤵PID:1308
-
C:\Windows\SysWOW64\sxzqly.exeC:\Windows\system32\sxzqly.exe 1064 "C:\Windows\SysWOW64\fzeocq.exe"90⤵PID:1616
-
C:\Windows\SysWOW64\fottty.exeC:\Windows\system32\fottty.exe 1044 "C:\Windows\SysWOW64\sxzqly.exe"91⤵PID:1452
-
C:\Windows\SysWOW64\pqrdhb.exeC:\Windows\system32\pqrdhb.exe 1068 "C:\Windows\SysWOW64\fottty.exe"92⤵PID:2212
-
C:\Windows\SysWOW64\upmgpk.exeC:\Windows\system32\upmgpk.exe 1076 "C:\Windows\SysWOW64\pqrdhb.exe"93⤵PID:464
-
C:\Windows\SysWOW64\gfgjys.exeC:\Windows\system32\gfgjys.exe 1072 "C:\Windows\SysWOW64\upmgpk.exe"94⤵
- Drops file in System32 directory
PID:580 -
C:\Windows\SysWOW64\tejlgs.exeC:\Windows\system32\tejlgs.exe 1084 "C:\Windows\SysWOW64\gfgjys.exe"95⤵PID:828
-
C:\Windows\SysWOW64\gueoxa.exeC:\Windows\system32\gueoxa.exe 1080 "C:\Windows\SysWOW64\tejlgs.exe"96⤵PID:3016
-
C:\Windows\SysWOW64\qiflni.exeC:\Windows\system32\qiflni.exe 1100 "C:\Windows\SysWOW64\gueoxa.exe"97⤵PID:1924
-
C:\Windows\SysWOW64\dvobtl.exeC:\Windows\system32\dvobtl.exe 1092 "C:\Windows\SysWOW64\qiflni.exe"98⤵PID:2756
-
C:\Windows\SysWOW64\qmrebm.exeC:\Windows\system32\qmrebm.exe 1088 "C:\Windows\SysWOW64\dvobtl.exe"99⤵PID:852
-
C:\Windows\SysWOW64\dkmhku.exeC:\Windows\system32\dkmhku.exe 1096 "C:\Windows\SysWOW64\qmrebm.exe"100⤵
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\nnbjfx.exeC:\Windows\system32\nnbjfx.exe 1104 "C:\Windows\SysWOW64\dkmhku.exe"101⤵PID:3024
-
C:\Windows\SysWOW64\xxrtta.exeC:\Windows\system32\xxrtta.exe 1108 "C:\Windows\SysWOW64\nnbjfx.exe"102⤵PID:2668
-
C:\Windows\SysWOW64\kotwba.exeC:\Windows\system32\kotwba.exe 1116 "C:\Windows\SysWOW64\xxrtta.exe"103⤵PID:1836
-
C:\Windows\SysWOW64\xbdmhe.exeC:\Windows\system32\xbdmhe.exe 1112 "C:\Windows\SysWOW64\kotwba.exe"104⤵PID:2880
-
C:\Windows\SysWOW64\jdjbsq.exeC:\Windows\system32\jdjbsq.exe 1120 "C:\Windows\SysWOW64\xbdmhe.exe"105⤵PID:1592
-
C:\Windows\SysWOW64\wbmebr.exeC:\Windows\system32\wbmebr.exe 1128 "C:\Windows\SysWOW64\jdjbsq.exe"106⤵PID:2596
-
C:\Windows\SysWOW64\gimbzy.exeC:\Windows\system32\gimbzy.exe 1140 "C:\Windows\SysWOW64\wbmebr.exe"107⤵PID:2696
-
C:\Windows\SysWOW64\tgheig.exeC:\Windows\system32\tgheig.exe 1124 "C:\Windows\SysWOW64\gimbzy.exe"108⤵PID:596
-
C:\Windows\SysWOW64\gwchqo.exeC:\Windows\system32\gwchqo.exe 1132 "C:\Windows\SysWOW64\tgheig.exe"109⤵PID:376
-
C:\Windows\SysWOW64\tnfkzp.exeC:\Windows\system32\tnfkzp.exe 1136 "C:\Windows\SysWOW64\gwchqo.exe"110⤵PID:992
-
C:\Windows\SysWOW64\glaehx.exeC:\Windows\system32\glaehx.exe 1144 "C:\Windows\SysWOW64\tnfkzp.exe"111⤵PID:2412
-
C:\Windows\SysWOW64\paacfe.exeC:\Windows\system32\paacfe.exe 1152 "C:\Windows\SysWOW64\glaehx.exe"112⤵PID:2576
-
C:\Windows\SysWOW64\cqveoe.exeC:\Windows\system32\cqveoe.exe 1156 "C:\Windows\SysWOW64\paacfe.exe"113⤵PID:2888
-
C:\Windows\SysWOW64\phqhxm.exeC:\Windows\system32\phqhxm.exe 1148 "C:\Windows\SysWOW64\cqveoe.exe"114⤵PID:1008
-
C:\Windows\SysWOW64\zrnrkq.exeC:\Windows\system32\zrnrkq.exe 1164 "C:\Windows\SysWOW64\phqhxm.exe"115⤵PID:1156
-
C:\Windows\SysWOW64\miiuty.exeC:\Windows\system32\miiuty.exe 1160 "C:\Windows\SysWOW64\zrnrkq.exe"116⤵PID:2856
-
C:\Windows\SysWOW64\zdakyu.exeC:\Windows\system32\zdakyu.exe 1172 "C:\Windows\SysWOW64\miiuty.exe"117⤵PID:1108
-
C:\Windows\SysWOW64\jjshwb.exeC:\Windows\system32\jjshwb.exe 1004 "C:\Windows\SysWOW64\zdakyu.exe"118⤵PID:2608
-
C:\Windows\SysWOW64\whvkfj.exeC:\Windows\system32\whvkfj.exe 1188 "C:\Windows\SysWOW64\jjshwb.exe"119⤵PID:2312
-
C:\Windows\SysWOW64\jyqnoj.exeC:\Windows\system32\jyqnoj.exe 1176 "C:\Windows\SysWOW64\whvkfj.exe"120⤵PID:2828
-
C:\Windows\SysWOW64\vwlhwr.exeC:\Windows\system32\vwlhwr.exe 1184 "C:\Windows\SysWOW64\jyqnoj.exe"121⤵PID:340
-
C:\Windows\SysWOW64\innkfa.exeC:\Windows\system32\innkfa.exe 1200 "C:\Windows\SysWOW64\vwlhwr.exe"122⤵PID:1076
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-