Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/09/2024, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
e3e9cbf263beb4d2a1f86d2a3e63300d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e3e9cbf263beb4d2a1f86d2a3e63300d_JaffaCakes118.exe
-
Size
525KB
-
MD5
e3e9cbf263beb4d2a1f86d2a3e63300d
-
SHA1
e8db946f011cb762ba6ceb9bc7a05c55fb885da3
-
SHA256
67bd628bed44a1e7bd62c14c79cafdc9593d749c04ed3267d3842a6f054b002e
-
SHA512
e2f97ddeeeecb2beab5e3888cb1a0d0505f22b45c5eb7fd21dbaed79b89704be8b4f291c34f87ff31ea838641e2b70a50357462c535bf28cc664c3a5716d774c
-
SSDEEP
12288:ezjK3Gx6kltkR796zJVUverddPcOL8RJPfFCYHrE2cQXWsDQmIitVDVe:ezjKW4kjkazJVl5JcOIfFHHG9lz85e
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2740 tyutfd.exe 2668 svhjwo.exe 2920 uxirqx.exe 1568 jnrjxc.exe 1792 tbsmyr.exe 1464 dliwum.exe 1264 ajnezn.exe 1552 kxnbxv.exe 2060 hnmbqc.exe 2640 tpsrcg.exe 2688 tafjys.exe 380 vrtzwx.exe 1184 lhezdg.exe 1736 frghai.exe 756 mzthuy.exe 2080 pfikkp.exe 1956 rpzhcl.exe 2312 erfpoy.exe 1244 otvzbt.exe 1408 dnrukp.exe 1668 qduxtp.exe 1656 aojhos.exe 320 neecxa.exe 1728 xafuev.exe 2396 hlufsy.exe 276 uymvfc.exe 1492 emnsvb.exe 2888 olrpga.exe 2728 epzkkn.exe 1712 oodium.exe 2936 ycefst.exe 1420 iyfqao.exe 2120 vwzsio.exe 1332 fzpder.exe 2104 sykfmz.exe 3056 ctlquu.exe 2136 mzlnkb.exe 1444 wvmyaw.exe 2184 huqvku.exe 3016 rfgffy.exe 1828 gjoabd.exe 2264 ocmfyw.exe 1780 athihf.exe 2168 loiboz.exe 1012 vcjqmh.exe 1128 ipaosk.exe 2360 ssqqff.exe 1356 czuwye.exe 1460 hppyhm.exe 2472 rambuq.exe 2348 gemwyv.exe 2540 reybiu.exe 1644 asrqgb.exe 1280 nfjgmf.exe 936 avdjvn.exe 1404 nxjygr.exe 824 awmbpa.exe 872 kvqzzy.exe 2020 ujrwxg.exe 1760 hzmzgg.exe 2076 uqpboo.exe 1628 gsvjab.exe 2836 tipmib.exe 2468 dtfwde.exe -
Identifies Wine through registry keys 2 TTPs 64 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine reybiu.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine uywkvd.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine sngutb.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine luhzvs.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine apawwf.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine dnombr.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine xemcet.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine pfikkp.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine edzxyj.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine cuaovc.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine vklshn.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine lpeqdt.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine rtltch.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine vbwzku.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine athihf.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine wppvow.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine flviss.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine rfgffy.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine qjizmm.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine hycqra.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine iypvbz.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine urxtjn.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine jepdmc.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine otvzbt.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine cguaag.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine qbtart.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine gralcl.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine qtniyj.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine vwunvf.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine vkdztt.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine mxrrdr.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine hdyccy.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine yujbof.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine kwditw.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine rambuq.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine qcrccs.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine mtztor.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine clnuxy.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine qirxtz.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine obuwrn.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine egttgo.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine jkndmj.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine lodxno.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine pvlqan.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine gqwfju.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ybfwvo.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine fymhfm.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine sykfmz.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ssqqff.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine fsurni.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine eydxjb.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ddpqvm.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine nzbgnb.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine siqtte.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine dliwum.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine awwpqy.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ohwjrg.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine fvryqi.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine rnknit.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine qtktdu.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine lknqsv.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ldoimi.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine jnrjxc.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine oxpchp.exe -
Loads dropped DLL 64 IoCs
pid Process 1964 e3e9cbf263beb4d2a1f86d2a3e63300d_JaffaCakes118.exe 1964 e3e9cbf263beb4d2a1f86d2a3e63300d_JaffaCakes118.exe 2740 tyutfd.exe 2740 tyutfd.exe 2668 svhjwo.exe 2668 svhjwo.exe 2920 uxirqx.exe 2920 uxirqx.exe 1568 jnrjxc.exe 1568 jnrjxc.exe 1792 tbsmyr.exe 1792 tbsmyr.exe 1464 dliwum.exe 1464 dliwum.exe 1264 ajnezn.exe 1264 ajnezn.exe 1552 kxnbxv.exe 1552 kxnbxv.exe 2060 hnmbqc.exe 2060 hnmbqc.exe 2640 tpsrcg.exe 2640 tpsrcg.exe 2688 tafjys.exe 2688 tafjys.exe 380 vrtzwx.exe 380 vrtzwx.exe 1184 lhezdg.exe 1184 lhezdg.exe 1736 frghai.exe 1736 frghai.exe 756 mzthuy.exe 756 mzthuy.exe 2080 pfikkp.exe 2080 pfikkp.exe 1956 rpzhcl.exe 1956 rpzhcl.exe 2312 erfpoy.exe 2312 erfpoy.exe 1244 otvzbt.exe 1244 otvzbt.exe 1408 dnrukp.exe 1408 dnrukp.exe 1668 qduxtp.exe 1668 qduxtp.exe 1656 aojhos.exe 1656 aojhos.exe 320 neecxa.exe 320 neecxa.exe 1728 xafuev.exe 1728 xafuev.exe 2396 hlufsy.exe 2396 hlufsy.exe 276 uymvfc.exe 276 uymvfc.exe 1492 emnsvb.exe 1492 emnsvb.exe 2888 olrpga.exe 2888 olrpga.exe 2728 epzkkn.exe 2728 epzkkn.exe 1712 oodium.exe 1712 oodium.exe 2936 ycefst.exe 2936 ycefst.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\czuwye.exe ssqqff.exe File opened for modification C:\Windows\SysWOW64\dicbvm.exe qjizmm.exe File created C:\Windows\SysWOW64\jrzraa.exe alytka.exe File opened for modification C:\Windows\SysWOW64\uywkvd.exe hzthnv.exe File opened for modification C:\Windows\SysWOW64\zkocec.exe pwnmov.exe File opened for modification C:\Windows\SysWOW64\pwbrhd.exe fqaurw.exe File created C:\Windows\SysWOW64\ssqqff.exe ipaosk.exe File created C:\Windows\SysWOW64\gkbfcd.exe xeaiew.exe File created C:\Windows\SysWOW64\nkjwne.exe alotfw.exe File created C:\Windows\SysWOW64\tmcoak.exe gvhmrk.exe File created C:\Windows\SysWOW64\hjfrwk.exe xvfugd.exe File opened for modification C:\Windows\SysWOW64\iynynr.exe vzsvej.exe File created C:\Windows\SysWOW64\cjqkhs.exe qtniyj.exe File opened for modification C:\Windows\SysWOW64\kqiaef.exe xanfwf.exe File opened for modification C:\Windows\SysWOW64\sphiwk.exe fymfnk.exe File opened for modification C:\Windows\SysWOW64\gnfyrn.exe twkein.exe File opened for modification C:\Windows\SysWOW64\lnlybz.exe ypivtr.exe File created C:\Windows\SysWOW64\obbzqu.exe fnibav.exe File created C:\Windows\SysWOW64\qduxtp.exe dnrukp.exe File created C:\Windows\SysWOW64\xtsaeb.exe kvpyvt.exe File created C:\Windows\SysWOW64\hhwdrx.exe uibajp.exe File created C:\Windows\SysWOW64\hoaxlq.exe uxfuci.exe File opened for modification C:\Windows\SysWOW64\dnombr.exe rxtktj.exe File created C:\Windows\SysWOW64\gdxqch.exe tnunth.exe File created C:\Windows\SysWOW64\nfjgmf.exe asrqgb.exe File opened for modification C:\Windows\SysWOW64\jvmbiz.exe wfrzaq.exe File opened for modification C:\Windows\SysWOW64\nldahi.exe exdcrj.exe File opened for modification C:\Windows\SysWOW64\xohoou.exe kqmugm.exe File opened for modification C:\Windows\SysWOW64\xvfugd.exe kfkrxv.exe File opened for modification C:\Windows\SysWOW64\cxqnsf.exe qgnljx.exe File opened for modification C:\Windows\SysWOW64\ystjoa.exe luyhfa.exe File created C:\Windows\SysWOW64\mzlnkb.exe ctlquu.exe File opened for modification C:\Windows\SysWOW64\aazvgd.exe nbesxd.exe File opened for modification C:\Windows\SysWOW64\soklti.exe fxijka.exe File created C:\Windows\SysWOW64\oqrxpz.exe ecziza.exe File created C:\Windows\SysWOW64\hkdcvm.exe uuizne.exe File created C:\Windows\SysWOW64\yemxfk.exe lfruwj.exe File created C:\Windows\SysWOW64\yujbof.exe leozff.exe File created C:\Windows\SysWOW64\elxqqq.exe uwftai.exe File opened for modification C:\Windows\SysWOW64\dtmelt.exe qcrccs.exe File created C:\Windows\SysWOW64\yzmhdl.exe lajevk.exe File opened for modification C:\Windows\SysWOW64\ocmfyw.exe gjoabd.exe File opened for modification C:\Windows\SysWOW64\xanfwf.exe nmmigy.exe File opened for modification C:\Windows\SysWOW64\luhzvs.exe yemxfk.exe File opened for modification C:\Windows\SysWOW64\nplqfs.exe dblthl.exe File opened for modification C:\Windows\SysWOW64\wzzqmq.exe mtztor.exe File created C:\Windows\SysWOW64\yegzvw.exe lodxno.exe File created C:\Windows\SysWOW64\xafjpc.exe kkkhgu.exe File opened for modification C:\Windows\SysWOW64\eydxjb.exe vkdztt.exe File opened for modification C:\Windows\SysWOW64\hfkysi.exe vopwba.exe File opened for modification C:\Windows\SysWOW64\zbyifm.exe mkwgpm.exe File opened for modification C:\Windows\SysWOW64\ujrwxg.exe kvqzzy.exe File created C:\Windows\SysWOW64\sbzoei.exe dicbvm.exe File opened for modification C:\Windows\SysWOW64\rbalgy.exe elxqqq.exe File opened for modification C:\Windows\SysWOW64\mxrrdr.exe zywouj.exe File created C:\Windows\SysWOW64\dtmelt.exe qcrccs.exe File created C:\Windows\SysWOW64\aqdjvj.exe nzbgnb.exe File opened for modification C:\Windows\SysWOW64\hzkruz.exe ylkcea.exe File created C:\Windows\SysWOW64\jyutuy.exe wzzqmq.exe File opened for modification C:\Windows\SysWOW64\ahhkzp.exe nqmhqh.exe File created C:\Windows\SysWOW64\sphiwk.exe fymfnk.exe File opened for modification C:\Windows\SysWOW64\csfcla.exe ptcada.exe File created C:\Windows\SysWOW64\pdiqfe.exe cqraza.exe File created C:\Windows\SysWOW64\vwzsio.exe iyfqao.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zdbifh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icmndw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymfkhs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdctlc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tynskr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eacvhk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edzxyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xesyzd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xyrsep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlpeqm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frghai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tiwill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wufwuc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttxnu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hoaxlq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exdcrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jzowdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qbndzy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ycefst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language voppcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yooqlc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxodzs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tttwgx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eydbcy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajqpwp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hexkml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rkejzi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eydxjb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lejttk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language esvnpy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uuizne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjcrce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcsskp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dnrukp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsaydk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jkndmj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vipvbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eyqhkj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfruwj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clnuxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bswyaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uwftai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language noitdi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbchaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpeqdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxujeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feaxbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfzkpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vyrxtu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cuaovc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udcbib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkmrgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mlifjz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffjnwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llmewn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qmipka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utwsss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uiauek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gemwyv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxtncu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tknopw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eldysc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mkwgpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzrrpe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2740 1964 e3e9cbf263beb4d2a1f86d2a3e63300d_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2740 1964 e3e9cbf263beb4d2a1f86d2a3e63300d_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2740 1964 e3e9cbf263beb4d2a1f86d2a3e63300d_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2740 1964 e3e9cbf263beb4d2a1f86d2a3e63300d_JaffaCakes118.exe 30 PID 2740 wrote to memory of 2668 2740 tyutfd.exe 31 PID 2740 wrote to memory of 2668 2740 tyutfd.exe 31 PID 2740 wrote to memory of 2668 2740 tyutfd.exe 31 PID 2740 wrote to memory of 2668 2740 tyutfd.exe 31 PID 2668 wrote to memory of 2920 2668 svhjwo.exe 32 PID 2668 wrote to memory of 2920 2668 svhjwo.exe 32 PID 2668 wrote to memory of 2920 2668 svhjwo.exe 32 PID 2668 wrote to memory of 2920 2668 svhjwo.exe 32 PID 2920 wrote to memory of 1568 2920 uxirqx.exe 33 PID 2920 wrote to memory of 1568 2920 uxirqx.exe 33 PID 2920 wrote to memory of 1568 2920 uxirqx.exe 33 PID 2920 wrote to memory of 1568 2920 uxirqx.exe 33 PID 1568 wrote to memory of 1792 1568 jnrjxc.exe 34 PID 1568 wrote to memory of 1792 1568 jnrjxc.exe 34 PID 1568 wrote to memory of 1792 1568 jnrjxc.exe 34 PID 1568 wrote to memory of 1792 1568 jnrjxc.exe 34 PID 1792 wrote to memory of 1464 1792 tbsmyr.exe 35 PID 1792 wrote to memory of 1464 1792 tbsmyr.exe 35 PID 1792 wrote to memory of 1464 1792 tbsmyr.exe 35 PID 1792 wrote to memory of 1464 1792 tbsmyr.exe 35 PID 1464 wrote to memory of 1264 1464 dliwum.exe 36 PID 1464 wrote to memory of 1264 1464 dliwum.exe 36 PID 1464 wrote to memory of 1264 1464 dliwum.exe 36 PID 1464 wrote to memory of 1264 1464 dliwum.exe 36 PID 1264 wrote to memory of 1552 1264 ajnezn.exe 37 PID 1264 wrote to memory of 1552 1264 ajnezn.exe 37 PID 1264 wrote to memory of 1552 1264 ajnezn.exe 37 PID 1264 wrote to memory of 1552 1264 ajnezn.exe 37 PID 1552 wrote to memory of 2060 1552 kxnbxv.exe 38 PID 1552 wrote to memory of 2060 1552 kxnbxv.exe 38 PID 1552 wrote to memory of 2060 1552 kxnbxv.exe 38 PID 1552 wrote to memory of 2060 1552 kxnbxv.exe 38 PID 2060 wrote to memory of 2640 2060 hnmbqc.exe 39 PID 2060 wrote to memory of 2640 2060 hnmbqc.exe 39 PID 2060 wrote to memory of 2640 2060 hnmbqc.exe 39 PID 2060 wrote to memory of 2640 2060 hnmbqc.exe 39 PID 2640 wrote to memory of 2688 2640 tpsrcg.exe 40 PID 2640 wrote to memory of 2688 2640 tpsrcg.exe 40 PID 2640 wrote to memory of 2688 2640 tpsrcg.exe 40 PID 2640 wrote to memory of 2688 2640 tpsrcg.exe 40 PID 2688 wrote to memory of 380 2688 tafjys.exe 41 PID 2688 wrote to memory of 380 2688 tafjys.exe 41 PID 2688 wrote to memory of 380 2688 tafjys.exe 41 PID 2688 wrote to memory of 380 2688 tafjys.exe 41 PID 380 wrote to memory of 1184 380 vrtzwx.exe 42 PID 380 wrote to memory of 1184 380 vrtzwx.exe 42 PID 380 wrote to memory of 1184 380 vrtzwx.exe 42 PID 380 wrote to memory of 1184 380 vrtzwx.exe 42 PID 1184 wrote to memory of 1736 1184 lhezdg.exe 43 PID 1184 wrote to memory of 1736 1184 lhezdg.exe 43 PID 1184 wrote to memory of 1736 1184 lhezdg.exe 43 PID 1184 wrote to memory of 1736 1184 lhezdg.exe 43 PID 1736 wrote to memory of 756 1736 frghai.exe 44 PID 1736 wrote to memory of 756 1736 frghai.exe 44 PID 1736 wrote to memory of 756 1736 frghai.exe 44 PID 1736 wrote to memory of 756 1736 frghai.exe 44 PID 756 wrote to memory of 2080 756 mzthuy.exe 45 PID 756 wrote to memory of 2080 756 mzthuy.exe 45 PID 756 wrote to memory of 2080 756 mzthuy.exe 45 PID 756 wrote to memory of 2080 756 mzthuy.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3e9cbf263beb4d2a1f86d2a3e63300d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3e9cbf263beb4d2a1f86d2a3e63300d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\tyutfd.exeC:\Windows\system32\tyutfd.exe 636 "C:\Users\Admin\AppData\Local\Temp\e3e9cbf263beb4d2a1f86d2a3e63300d_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\svhjwo.exeC:\Windows\system32\svhjwo.exe 616 "C:\Windows\SysWOW64\tyutfd.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\uxirqx.exeC:\Windows\system32\uxirqx.exe 612 "C:\Windows\SysWOW64\svhjwo.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\jnrjxc.exeC:\Windows\system32\jnrjxc.exe 620 "C:\Windows\SysWOW64\uxirqx.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\tbsmyr.exeC:\Windows\system32\tbsmyr.exe 624 "C:\Windows\SysWOW64\jnrjxc.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\dliwum.exeC:\Windows\system32\dliwum.exe 632 "C:\Windows\SysWOW64\tbsmyr.exe"7⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\ajnezn.exeC:\Windows\system32\ajnezn.exe 628 "C:\Windows\SysWOW64\dliwum.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\kxnbxv.exeC:\Windows\system32\kxnbxv.exe 720 "C:\Windows\SysWOW64\ajnezn.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\hnmbqc.exeC:\Windows\system32\hnmbqc.exe 664 "C:\Windows\SysWOW64\kxnbxv.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\tpsrcg.exeC:\Windows\system32\tpsrcg.exe 640 "C:\Windows\SysWOW64\hnmbqc.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\tafjys.exeC:\Windows\system32\tafjys.exe 652 "C:\Windows\SysWOW64\tpsrcg.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\vrtzwx.exeC:\Windows\system32\vrtzwx.exe 660 "C:\Windows\SysWOW64\tafjys.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\lhezdg.exeC:\Windows\system32\lhezdg.exe 736 "C:\Windows\SysWOW64\vrtzwx.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\frghai.exeC:\Windows\system32\frghai.exe 668 "C:\Windows\SysWOW64\lhezdg.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\mzthuy.exeC:\Windows\system32\mzthuy.exe 732 "C:\Windows\SysWOW64\frghai.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\pfikkp.exeC:\Windows\system32\pfikkp.exe 708 "C:\Windows\SysWOW64\mzthuy.exe"17⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:2080 -
C:\Windows\SysWOW64\rpzhcl.exeC:\Windows\system32\rpzhcl.exe 716 "C:\Windows\SysWOW64\pfikkp.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1956 -
C:\Windows\SysWOW64\erfpoy.exeC:\Windows\system32\erfpoy.exe 756 "C:\Windows\SysWOW64\rpzhcl.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2312 -
C:\Windows\SysWOW64\otvzbt.exeC:\Windows\system32\otvzbt.exe 760 "C:\Windows\SysWOW64\erfpoy.exe"20⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:1244 -
C:\Windows\SysWOW64\dnrukp.exeC:\Windows\system32\dnrukp.exe 768 "C:\Windows\SysWOW64\otvzbt.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Windows\SysWOW64\qduxtp.exeC:\Windows\system32\qduxtp.exe 776 "C:\Windows\SysWOW64\dnrukp.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668 -
C:\Windows\SysWOW64\aojhos.exeC:\Windows\system32\aojhos.exe 764 "C:\Windows\SysWOW64\qduxtp.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Windows\SysWOW64\neecxa.exeC:\Windows\system32\neecxa.exe 772 "C:\Windows\SysWOW64\aojhos.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:320 -
C:\Windows\SysWOW64\xafuev.exeC:\Windows\system32\xafuev.exe 784 "C:\Windows\SysWOW64\neecxa.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1728 -
C:\Windows\SysWOW64\hlufsy.exeC:\Windows\system32\hlufsy.exe 780 "C:\Windows\SysWOW64\xafuev.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2396 -
C:\Windows\SysWOW64\uymvfc.exeC:\Windows\system32\uymvfc.exe 796 "C:\Windows\SysWOW64\hlufsy.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:276 -
C:\Windows\SysWOW64\emnsvb.exeC:\Windows\system32\emnsvb.exe 788 "C:\Windows\SysWOW64\uymvfc.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1492 -
C:\Windows\SysWOW64\olrpga.exeC:\Windows\system32\olrpga.exe 804 "C:\Windows\SysWOW64\emnsvb.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Windows\SysWOW64\epzkkn.exeC:\Windows\system32\epzkkn.exe 800 "C:\Windows\SysWOW64\olrpga.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728 -
C:\Windows\SysWOW64\oodium.exeC:\Windows\system32\oodium.exe 808 "C:\Windows\SysWOW64\epzkkn.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712 -
C:\Windows\SysWOW64\ycefst.exeC:\Windows\system32\ycefst.exe 812 "C:\Windows\SysWOW64\oodium.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\iyfqao.exeC:\Windows\system32\iyfqao.exe 820 "C:\Windows\SysWOW64\ycefst.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1420 -
C:\Windows\SysWOW64\vwzsio.exeC:\Windows\system32\vwzsio.exe 824 "C:\Windows\SysWOW64\iyfqao.exe"34⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\fzpder.exeC:\Windows\system32\fzpder.exe 840 "C:\Windows\SysWOW64\vwzsio.exe"35⤵
- Executes dropped EXE
PID:1332 -
C:\Windows\SysWOW64\sykfmz.exeC:\Windows\system32\sykfmz.exe 816 "C:\Windows\SysWOW64\fzpder.exe"36⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2104 -
C:\Windows\SysWOW64\ctlquu.exeC:\Windows\system32\ctlquu.exe 836 "C:\Windows\SysWOW64\sykfmz.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3056 -
C:\Windows\SysWOW64\mzlnkb.exeC:\Windows\system32\mzlnkb.exe 792 "C:\Windows\SysWOW64\ctlquu.exe"38⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\SysWOW64\wvmyaw.exeC:\Windows\system32\wvmyaw.exe 832 "C:\Windows\SysWOW64\mzlnkb.exe"39⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\huqvku.exeC:\Windows\system32\huqvku.exe 844 "C:\Windows\SysWOW64\wvmyaw.exe"40⤵
- Executes dropped EXE
PID:2184 -
C:\Windows\SysWOW64\rfgffy.exeC:\Windows\system32\rfgffy.exe 852 "C:\Windows\SysWOW64\huqvku.exe"41⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:3016 -
C:\Windows\SysWOW64\gjoabd.exeC:\Windows\system32\gjoabd.exe 848 "C:\Windows\SysWOW64\rfgffy.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1828 -
C:\Windows\SysWOW64\ocmfyw.exeC:\Windows\system32\ocmfyw.exe 856 "C:\Windows\SysWOW64\gjoabd.exe"43⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\SysWOW64\athihf.exeC:\Windows\system32\athihf.exe 860 "C:\Windows\SysWOW64\ocmfyw.exe"44⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1780 -
C:\Windows\SysWOW64\loiboz.exeC:\Windows\system32\loiboz.exe 864 "C:\Windows\SysWOW64\athihf.exe"45⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\vcjqmh.exeC:\Windows\system32\vcjqmh.exe 828 "C:\Windows\SysWOW64\loiboz.exe"46⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\ipaosk.exeC:\Windows\system32\ipaosk.exe 872 "C:\Windows\SysWOW64\vcjqmh.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1128 -
C:\Windows\SysWOW64\ssqqff.exeC:\Windows\system32\ssqqff.exe 868 "C:\Windows\SysWOW64\ipaosk.exe"48⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\czuwye.exeC:\Windows\system32\czuwye.exe 884 "C:\Windows\SysWOW64\ssqqff.exe"49⤵
- Executes dropped EXE
PID:1356 -
C:\Windows\SysWOW64\hppyhm.exeC:\Windows\system32\hppyhm.exe 880 "C:\Windows\SysWOW64\czuwye.exe"50⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\rambuq.exeC:\Windows\system32\rambuq.exe 892 "C:\Windows\SysWOW64\hppyhm.exe"51⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2472 -
C:\Windows\SysWOW64\gemwyv.exeC:\Windows\system32\gemwyv.exe 888 "C:\Windows\SysWOW64\rambuq.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\reybiu.exeC:\Windows\system32\reybiu.exe 896 "C:\Windows\SysWOW64\gemwyv.exe"53⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2540 -
C:\Windows\SysWOW64\asrqgb.exeC:\Windows\system32\asrqgb.exe 900 "C:\Windows\SysWOW64\reybiu.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1644 -
C:\Windows\SysWOW64\nfjgmf.exeC:\Windows\system32\nfjgmf.exe 908 "C:\Windows\SysWOW64\asrqgb.exe"55⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\avdjvn.exeC:\Windows\system32\avdjvn.exe 904 "C:\Windows\SysWOW64\nfjgmf.exe"56⤵
- Executes dropped EXE
PID:936 -
C:\Windows\SysWOW64\nxjygr.exeC:\Windows\system32\nxjygr.exe 912 "C:\Windows\SysWOW64\avdjvn.exe"57⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\awmbpa.exeC:\Windows\system32\awmbpa.exe 920 "C:\Windows\SysWOW64\nxjygr.exe"58⤵
- Executes dropped EXE
PID:824 -
C:\Windows\SysWOW64\kvqzzy.exeC:\Windows\system32\kvqzzy.exe 932 "C:\Windows\SysWOW64\awmbpa.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:872 -
C:\Windows\SysWOW64\ujrwxg.exeC:\Windows\system32\ujrwxg.exe 936 "C:\Windows\SysWOW64\kvqzzy.exe"60⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\hzmzgg.exeC:\Windows\system32\hzmzgg.exe 916 "C:\Windows\SysWOW64\ujrwxg.exe"61⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\uqpboo.exeC:\Windows\system32\uqpboo.exe 924 "C:\Windows\SysWOW64\hzmzgg.exe"62⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\gsvjab.exeC:\Windows\system32\gsvjab.exe 948 "C:\Windows\SysWOW64\uqpboo.exe"63⤵
- Executes dropped EXE
PID:1628 -
C:\Windows\SysWOW64\tipmib.exeC:\Windows\system32\tipmib.exe 940 "C:\Windows\SysWOW64\gsvjab.exe"64⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\dtfwde.exeC:\Windows\system32\dtfwde.exe 928 "C:\Windows\SysWOW64\tipmib.exe"65⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\qjizmm.exeC:\Windows\system32\qjizmm.exe 956 "C:\Windows\SysWOW64\dtfwde.exe"66⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\dicbvm.exeC:\Windows\system32\dicbvm.exe 960 "C:\Windows\SysWOW64\qjizmm.exe"67⤵
- Drops file in System32 directory
PID:1248 -
C:\Windows\SysWOW64\sbzoei.exeC:\Windows\system32\sbzoei.exe 952 "C:\Windows\SysWOW64\dicbvm.exe"68⤵PID:2948
-
C:\Windows\SysWOW64\fsurni.exeC:\Windows\system32\fsurni.exe 964 "C:\Windows\SysWOW64\sbzoei.exe"69⤵
- Identifies Wine through registry keys
PID:3064 -
C:\Windows\SysWOW64\sipuwq.exeC:\Windows\system32\sipuwq.exe 944 "C:\Windows\SysWOW64\fsurni.exe"70⤵PID:2284
-
C:\Windows\SysWOW64\cwprmy.exeC:\Windows\system32\cwprmy.exe 972 "C:\Windows\SysWOW64\sipuwq.exe"71⤵PID:1832
-
C:\Windows\SysWOW64\pvsuug.exeC:\Windows\system32\pvsuug.exe 968 "C:\Windows\SysWOW64\cwprmy.exe"72⤵PID:2100
-
C:\Windows\SysWOW64\cickac.exeC:\Windows\system32\cickac.exe 976 "C:\Windows\SysWOW64\pvsuug.exe"73⤵PID:2848
-
C:\Windows\SysWOW64\lochyj.exeC:\Windows\system32\lochyj.exe 992 "C:\Windows\SysWOW64\cickac.exe"74⤵PID:2420
-
C:\Windows\SysWOW64\ymfkhs.exeC:\Windows\system32\ymfkhs.exe 980 "C:\Windows\SysWOW64\lochyj.exe"75⤵
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\jmjhrq.exeC:\Windows\system32\jmjhrq.exe 988 "C:\Windows\SysWOW64\ymfkhs.exe"76⤵PID:1796
-
C:\Windows\SysWOW64\voppcv.exeC:\Windows\system32\voppcv.exe 984 "C:\Windows\SysWOW64\jmjhrq.exe"77⤵
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\iekrtd.exeC:\Windows\system32\iekrtd.exe 996 "C:\Windows\SysWOW64\voppcv.exe"78⤵PID:2016
-
C:\Windows\SysWOW64\vdnucl.exeC:\Windows\system32\vdnucl.exe 1000 "C:\Windows\SysWOW64\iekrtd.exe"79⤵PID:1524
-
C:\Windows\SysWOW64\itixkl.exeC:\Windows\system32\itixkl.exe 1004 "C:\Windows\SysWOW64\vdnucl.exe"80⤵PID:2896
-
C:\Windows\SysWOW64\vkdztt.exeC:\Windows\system32\vkdztt.exe 1008 "C:\Windows\SysWOW64\itixkl.exe"81⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\eydxjb.exeC:\Windows\system32\eydxjb.exe 1028 "C:\Windows\SysWOW64\vkdztt.exe"82⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Windows\SysWOW64\rwgzsb.exeC:\Windows\system32\rwgzsb.exe 1012 "C:\Windows\SysWOW64\eydxjb.exe"83⤵PID:2324
-
C:\Windows\SysWOW64\enbcaj.exeC:\Windows\system32\enbcaj.exe 1020 "C:\Windows\SysWOW64\rwgzsb.exe"84⤵PID:2140
-
C:\Windows\SysWOW64\rdwfrr.exeC:\Windows\system32\rdwfrr.exe 1016 "C:\Windows\SysWOW64\enbcaj.exe"85⤵PID:3008
-
C:\Windows\SysWOW64\ecziza.exeC:\Windows\system32\ecziza.exe 1032 "C:\Windows\SysWOW64\rdwfrr.exe"86⤵
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\oqrxpz.exeC:\Windows\system32\oqrxpz.exe 1036 "C:\Windows\SysWOW64\ecziza.exe"87⤵PID:2124
-
C:\Windows\SysWOW64\bguayh.exeC:\Windows\system32\bguayh.exe 1040 "C:\Windows\SysWOW64\oqrxpz.exe"88⤵PID:2824
-
C:\Windows\SysWOW64\oxpchp.exeC:\Windows\system32\oxpchp.exe 1044 "C:\Windows\SysWOW64\bguayh.exe"89⤵
- Identifies Wine through registry keys
PID:2808 -
C:\Windows\SysWOW64\avkfpp.exeC:\Windows\system32\avkfpp.exe 1048 "C:\Windows\SysWOW64\oxpchp.exe"90⤵PID:2928
-
C:\Windows\SysWOW64\nmmigy.exeC:\Windows\system32\nmmigy.exe 1052 "C:\Windows\SysWOW64\avkfpp.exe"91⤵
- Drops file in System32 directory
PID:892 -
C:\Windows\SysWOW64\xanfwf.exeC:\Windows\system32\xanfwf.exe 1056 "C:\Windows\SysWOW64\nmmigy.exe"92⤵
- Drops file in System32 directory
PID:768 -
C:\Windows\SysWOW64\kqiaef.exeC:\Windows\system32\kqiaef.exe 1060 "C:\Windows\SysWOW64\xanfwf.exe"93⤵PID:1972
-
C:\Windows\SysWOW64\xpdcnn.exeC:\Windows\system32\xpdcnn.exe 1064 "C:\Windows\SysWOW64\kqiaef.exe"94⤵PID:644
-
C:\Windows\SysWOW64\kfffww.exeC:\Windows\system32\kfffww.exe 1068 "C:\Windows\SysWOW64\xpdcnn.exe"95⤵PID:2236
-
C:\Windows\SysWOW64\xeaiew.exeC:\Windows\system32\xeaiew.exe 1072 "C:\Windows\SysWOW64\kfffww.exe"96⤵
- Drops file in System32 directory
PID:1932 -
C:\Windows\SysWOW64\gkbfcd.exeC:\Windows\system32\gkbfcd.exe 1076 "C:\Windows\SysWOW64\xeaiew.exe"97⤵PID:1572
-
C:\Windows\SysWOW64\tiwill.exeC:\Windows\system32\tiwill.exe 1080 "C:\Windows\SysWOW64\gkbfcd.exe"98⤵
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\yzrltt.exeC:\Windows\system32\yzrltt.exe 1084 "C:\Windows\SysWOW64\tiwill.exe"99⤵PID:2592
-
C:\Windows\SysWOW64\lxtncu.exeC:\Windows\system32\lxtncu.exe 1088 "C:\Windows\SysWOW64\yzrltt.exe"100⤵
- System Location Discovery: System Language Discovery
PID:1296 -
C:\Windows\SysWOW64\yooqlc.exeC:\Windows\system32\yooqlc.exe 1092 "C:\Windows\SysWOW64\lxtncu.exe"101⤵
- System Location Discovery: System Language Discovery
PID:444 -
C:\Windows\SysWOW64\lejttk.exeC:\Windows\system32\lejttk.exe 1108 "C:\Windows\SysWOW64\yooqlc.exe"102⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\vskirj.exeC:\Windows\system32\vskirj.exe 1096 "C:\Windows\SysWOW64\lejttk.exe"103⤵PID:2612
-
C:\Windows\SysWOW64\hrmlas.exeC:\Windows\system32\hrmlas.exe 1104 "C:\Windows\SysWOW64\vskirj.exe"104⤵PID:1104
-
C:\Windows\SysWOW64\uhhnja.exeC:\Windows\system32\uhhnja.exe 1100 "C:\Windows\SysWOW64\hrmlas.exe"105⤵PID:1396
-
C:\Windows\SysWOW64\hycqra.exeC:\Windows\system32\hycqra.exe 1120 "C:\Windows\SysWOW64\uhhnja.exe"106⤵
- Identifies Wine through registry keys
PID:1952 -
C:\Windows\SysWOW64\uwftai.exeC:\Windows\system32\uwftai.exe 1112 "C:\Windows\SysWOW64\hycqra.exe"107⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:680 -
C:\Windows\SysWOW64\elxqqq.exeC:\Windows\system32\elxqqq.exe 1116 "C:\Windows\SysWOW64\uwftai.exe"108⤵
- Drops file in System32 directory
PID:1424 -
C:\Windows\SysWOW64\rbalgy.exeC:\Windows\system32\rbalgy.exe 1124 "C:\Windows\SysWOW64\elxqqq.exe"109⤵PID:2844
-
C:\Windows\SysWOW64\esvnpy.exeC:\Windows\system32\esvnpy.exe 1128 "C:\Windows\SysWOW64\rbalgy.exe"110⤵
- System Location Discovery: System Language Discovery
PID:980 -
C:\Windows\SysWOW64\rqqqyg.exeC:\Windows\system32\rqqqyg.exe 876 "C:\Windows\SysWOW64\esvnpy.exe"111⤵PID:1692
-
C:\Windows\SysWOW64\egttgo.exeC:\Windows\system32\egttgo.exe 1148 "C:\Windows\SysWOW64\rqqqyg.exe"112⤵
- Identifies Wine through registry keys
PID:948 -
C:\Windows\SysWOW64\nvtqwo.exeC:\Windows\system32\nvtqwo.exe 1136 "C:\Windows\SysWOW64\egttgo.exe"113⤵PID:2444
-
C:\Windows\SysWOW64\alotfw.exeC:\Windows\system32\alotfw.exe 1140 "C:\Windows\SysWOW64\nvtqwo.exe"114⤵
- Drops file in System32 directory
PID:600 -
C:\Windows\SysWOW64\nkjwne.exeC:\Windows\system32\nkjwne.exe 1144 "C:\Windows\SysWOW64\alotfw.exe"115⤵PID:3032
-
C:\Windows\SysWOW64\aamyee.exeC:\Windows\system32\aamyee.exe 1152 "C:\Windows\SysWOW64\nkjwne.exe"116⤵PID:2616
-
C:\Windows\SysWOW64\nzhbnm.exeC:\Windows\system32\nzhbnm.exe 1156 "C:\Windows\SysWOW64\aamyee.exe"117⤵PID:2056
-
C:\Windows\SysWOW64\wfhqdu.exeC:\Windows\system32\wfhqdu.exe 1160 "C:\Windows\SysWOW64\nzhbnm.exe"118⤵PID:2996
-
C:\Windows\SysWOW64\jdctlc.exeC:\Windows\system32\jdctlc.exe 1164 "C:\Windows\SysWOW64\wfhqdu.exe"119⤵
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\wufwuc.exeC:\Windows\system32\wufwuc.exe 1168 "C:\Windows\SysWOW64\jdctlc.exe"120⤵
- System Location Discovery: System Language Discovery
PID:628 -
C:\Windows\SysWOW64\jsaydk.exeC:\Windows\system32\jsaydk.exe 1172 "C:\Windows\SysWOW64\wufwuc.exe"121⤵
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\wjubts.exeC:\Windows\system32\wjubts.exe 1176 "C:\Windows\SysWOW64\jsaydk.exe"122⤵PID:2620
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-