Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 06:40
Behavioral task
behavioral1
Sample
e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe
-
Size
600KB
-
MD5
e435b6f60ed68fe29ad76ba055220264
-
SHA1
b9717d62e82e0f85a94672fd033e63ab876a7e61
-
SHA256
e626e340cf2cdd3e55b21b122056d3f3ef880bcffcef4abc0659ff48d3eb3f4d
-
SHA512
571ef5cc5d2c3a017ccfcbb52892b4c7946b6df2161dd3f24408bb8b8d55a9a91b6c68a1377f884cf28b71d21fe7aa637b361deda98a011cfa0e1c4f55bf237b
-
SSDEEP
12288:OtGXSmp9GRnlPQk04nQGWPv9p0Ijqfh3CfjRhNXXUtGSvCEafw:H+IkTQVnf0eq5hGS6Eyw
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00090000000233f5-4.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 3076 oqxigjl.exe 2724 ybnsbms.exe 5012 lktvels.exe 4504 wgmomgt.exe 760 gcnybab.exe 5016 ojiynqd.exe 3764 aadtwyi.exe 1136 onvrcch.exe 312 alptkkn.exe 388 ovwwnbn.exe 3232 yxlgjet.exe 2712 itmrqzu.exe 1076 yubhris.exe 1200 jtnechz.exe 4176 vrihkhx.exe 2848 gkyexfz.exe 4520 ocwfemd.exe 3572 aiohsdo.exe 2884 ldpsixp.exe 884 ataaghs.exe 2704 ogspmkr.exe 692 yfwnfjz.exe 4508 ixlsjzs.exe 4364 yfxsqjw.exe 1600 laoqwnv.exe 2696 vztnglc.exe 4400 gyflzkk.exe 464 wzctsla.exe 628 gkrdnoo.exe 4076 ttxgqog.exe 4276 gksizwm.exe 5064 qgtbgqm.exe 2564 dizjsvz.exe 2968 qvjgyzy.exe 1880 diawldw.exe 2544 qvkmrgv.exe 2316 afhwekb.exe 4288 lbahmek.exe 2576 yrdjvei.exe 2660 lemzbip.exe 2748 yrexomn.exe 1036 lmnmuqm.exe 5076 vplxhls.exe 4672 acumnpz.exe 3408 npmctty.exe 2148 bkvszwx.exe 2940 kmtcuzd.exe 3608 yzcsavc.exe 2980 lmuigzj.exe 3444 yzefldh.exe 4848 ikbqzgo.exe 4436 vxkfecm.exe 2504 ikcvkgl.exe 4440 vxmlqks.exe 4368 iwoozsq.exe 1436 svslrrx.exe 372 gezwuix.exe 3920 tvuydqd.exe 4788 dfrbqtj.exe 4200 qsbzwxi.exe 2108 dfsobbg.exe 2828 qscehxf.exe 2072 adzocau.exe 752 kyszkvu.exe -
Loads dropped DLL 64 IoCs
pid Process 1928 e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe 1928 e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe 3076 oqxigjl.exe 3076 oqxigjl.exe 2724 ybnsbms.exe 2724 ybnsbms.exe 5012 lktvels.exe 5012 lktvels.exe 4504 wgmomgt.exe 4504 wgmomgt.exe 760 gcnybab.exe 760 gcnybab.exe 5016 ojiynqd.exe 5016 ojiynqd.exe 3764 aadtwyi.exe 3764 aadtwyi.exe 1136 onvrcch.exe 1136 onvrcch.exe 312 alptkkn.exe 312 alptkkn.exe 388 ovwwnbn.exe 388 ovwwnbn.exe 3232 yxlgjet.exe 3232 yxlgjet.exe 2712 itmrqzu.exe 2712 itmrqzu.exe 1076 yubhris.exe 1076 yubhris.exe 1200 jtnechz.exe 1200 jtnechz.exe 4176 vrihkhx.exe 4176 vrihkhx.exe 2848 gkyexfz.exe 2848 gkyexfz.exe 4520 ocwfemd.exe 4520 ocwfemd.exe 3572 aiohsdo.exe 3572 aiohsdo.exe 2884 ldpsixp.exe 2884 ldpsixp.exe 884 ataaghs.exe 884 ataaghs.exe 2704 ogspmkr.exe 2704 ogspmkr.exe 692 yfwnfjz.exe 692 yfwnfjz.exe 4508 ixlsjzs.exe 4508 ixlsjzs.exe 4364 yfxsqjw.exe 4364 yfxsqjw.exe 1600 laoqwnv.exe 1600 laoqwnv.exe 2696 vztnglc.exe 2696 vztnglc.exe 4400 gyflzkk.exe 4400 gyflzkk.exe 464 wzctsla.exe 464 wzctsla.exe 628 gkrdnoo.exe 628 gkrdnoo.exe 4076 ttxgqog.exe 4076 ttxgqog.exe 4276 gksizwm.exe 4276 gksizwm.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\nhszscz.exe arpwkuu.exe File opened for modification C:\Windows\SysWOW64\bwipmmh.exe oynndmb.exe File opened for modification C:\Windows\SysWOW64\efvfupr.exe rsmpols.exe File created C:\Windows\SysWOW64\rpdgbwb.exe hqrirxt.exe File opened for modification C:\Windows\SysWOW64\gldcuux.exe tymmoqz.exe File opened for modification C:\Windows\SysWOW64\zhebabe.exe pfoqfyx.exe File created C:\Windows\SysWOW64\jqxuwwn.exe yrtpdxf.exe File created C:\Windows\SysWOW64\gzbfioz.exe tbydsob.exe File created C:\Windows\SysWOW64\evtngbd.exe uwppodd.exe File created C:\Windows\SysWOW64\bwjvyue.exe ogpsplz.exe File opened for modification C:\Windows\SysWOW64\yqhrrhr.exe ojdlgik.exe File created C:\Windows\SysWOW64\piarawc.exe fxkgntn.exe File created C:\Windows\SysWOW64\tqqxovp.exe gawugnr.exe File opened for modification C:\Windows\SysWOW64\gefpjdq.exe trvzdhr.exe File opened for modification C:\Windows\SysWOW64\plkzmpv.exe cqtjhlw.exe File created C:\Windows\SysWOW64\rsncztq.exe efvfupr.exe File created C:\Windows\SysWOW64\dslcjwm.exe upvsntg.exe File opened for modification C:\Windows\SysWOW64\nzphqao.exe aqjenbw.exe File opened for modification C:\Windows\SysWOW64\yxlgjet.exe ovwwnbn.exe File created C:\Windows\SysWOW64\wzctsla.exe gyflzkk.exe File created C:\Windows\SysWOW64\sqmiyfh.exe ehgfvfh.exe File created C:\Windows\SysWOW64\mmbeakr.exe zzrpvgs.exe File opened for modification C:\Windows\SysWOW64\ucinxbl.exe hhrxsxm.exe File opened for modification C:\Windows\SysWOW64\rmpfegl.exe ezgpyln.exe File created C:\Windows\SysWOW64\acumnpz.exe vplxhls.exe File created C:\Windows\SysWOW64\xeaitua.exe jvuxqvi.exe File opened for modification C:\Windows\SysWOW64\bxuvzku.exe ozztqcp.exe File created C:\Windows\SysWOW64\yrinprc.exe nseqesu.exe File created C:\Windows\SysWOW64\nhtkaba.exe biqhrtu.exe File opened for modification C:\Windows\SysWOW64\hqrirxt.exe uawfapo.exe File created C:\Windows\SysWOW64\oxnltya.exe bkwvnut.exe File opened for modification C:\Windows\SysWOW64\xfnhjjr.exe nfjkzkk.exe File created C:\Windows\SysWOW64\uvakgcb.exe kklztzu.exe File created C:\Windows\SysWOW64\mwhwtvy.exe zjphnrz.exe File opened for modification C:\Windows\SysWOW64\oixqvrv.exe bvnshvp.exe File created C:\Windows\SysWOW64\vrihkhx.exe jtnechz.exe File opened for modification C:\Windows\SysWOW64\ttxgqog.exe gkrdnoo.exe File opened for modification C:\Windows\SysWOW64\qxzmdqj.exe dvtxsdx.exe File opened for modification C:\Windows\SysWOW64\arpwkuu.exe negheqv.exe File created C:\Windows\SysWOW64\oiuyrfg.exe exfnecz.exe File created C:\Windows\SysWOW64\tolamcq.exe gefpjdq.exe File created C:\Windows\SysWOW64\ezgpyln.exe rmoasho.exe File opened for modification C:\Windows\SysWOW64\rygieve.exe dpzfbvm.exe File created C:\Windows\SysWOW64\kclikgv.exe xpcsfcw.exe File created C:\Windows\SysWOW64\ocwfemd.exe gkyexfz.exe File created C:\Windows\SysWOW64\bwwoyrc.exe obfqsnw.exe File created C:\Windows\SysWOW64\tphbcok.exe gcyewkl.exe File opened for modification C:\Windows\SysWOW64\shxcqee.exe hitfxgf.exe File opened for modification C:\Windows\SysWOW64\qibemez.exe dvjggaa.exe File created C:\Windows\SysWOW64\hppiihd.exe tfiffhd.exe File opened for modification C:\Windows\SysWOW64\rmoasho.exe erfcmdp.exe File opened for modification C:\Windows\SysWOW64\ohzbugw.exe bmhlocx.exe File opened for modification C:\Windows\SysWOW64\ogpsplz.exe bwipmmh.exe File created C:\Windows\SysWOW64\gldcuux.exe tymmoqz.exe File created C:\Windows\SysWOW64\ntbsteo.exe avgplvr.exe File opened for modification C:\Windows\SysWOW64\uvbpsky.exe hirzmgz.exe File opened for modification C:\Windows\SysWOW64\hoiewxh.exe utzpqti.exe File opened for modification C:\Windows\SysWOW64\lglzlpv.exe ytujflw.exe File opened for modification C:\Windows\SysWOW64\wzctsla.exe gyflzkk.exe File opened for modification C:\Windows\SysWOW64\jupmipk.exe wljbfqs.exe File opened for modification C:\Windows\SysWOW64\gofaadx.exe wpbcqeq.exe File opened for modification C:\Windows\SysWOW64\acrmhel.exe nwhrtna.exe File created C:\Windows\SysWOW64\wxxjigd.exe jkfmucw.exe File opened for modification C:\Windows\SysWOW64\oiuyrfg.exe exfnecz.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ztrhamn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvlohrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omhqfjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tduwcca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llqqfei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxtcndn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjlxvup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnsvmpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzpwwrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbkncfq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cccdkiv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiyefpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lqnjchc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idfyinl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pojahvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svzcvqt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gsomjwx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttdskba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yrinprc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ikbqzgo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvuydqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hibytnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zecjamh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prwvuit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kfwnkgv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language srplomo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gkzzdvi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkwvnut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yrtpdxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwoozsq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cozzrbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frvwuyr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language glymknn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fmzyxyu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dslcjwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qkmkmqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trvzdhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvjgyzy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkvszwx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxmlqks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idzuvov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swyascx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bwrltxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yifqool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wgnvbdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ydvglvg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qcqiwrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gplhbwx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxenist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hiakhge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whaxees.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbogvua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ataaghs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmbeakr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eezdeex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eamqudk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljpwspv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvekbfi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language teiunhw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnrkaih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hirzmgz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thltgob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idkrisb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ietexwf.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1928 e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe 3076 oqxigjl.exe 2724 ybnsbms.exe 5012 lktvels.exe 4504 wgmomgt.exe 760 gcnybab.exe 5016 ojiynqd.exe 3764 aadtwyi.exe 1136 onvrcch.exe 312 alptkkn.exe 388 ovwwnbn.exe 3232 yxlgjet.exe 2712 itmrqzu.exe 1076 yubhris.exe 1200 jtnechz.exe 4176 vrihkhx.exe 2848 gkyexfz.exe 4520 ocwfemd.exe 3572 aiohsdo.exe 2884 ldpsixp.exe 884 ataaghs.exe 2704 ogspmkr.exe 692 yfwnfjz.exe 4508 ixlsjzs.exe 4364 yfxsqjw.exe 1600 laoqwnv.exe 2696 vztnglc.exe 4400 gyflzkk.exe 464 wzctsla.exe 628 gkrdnoo.exe 4076 ttxgqog.exe 4276 gksizwm.exe 5064 qgtbgqm.exe 2564 dizjsvz.exe 2968 qvjgyzy.exe 1880 diawldw.exe 2544 qvkmrgv.exe 2316 afhwekb.exe 4288 lbahmek.exe 2576 yrdjvei.exe 2660 lemzbip.exe 2748 yrexomn.exe 1036 lmnmuqm.exe 5076 vplxhls.exe 4672 acumnpz.exe 3408 npmctty.exe 2148 bkvszwx.exe 2940 kmtcuzd.exe 3608 yzcsavc.exe 2980 lmuigzj.exe 3444 yzefldh.exe 4848 ikbqzgo.exe 4436 vxkfecm.exe 2504 ikcvkgl.exe 4440 vxmlqks.exe 4368 iwoozsq.exe 1436 svslrrx.exe 372 gezwuix.exe 3920 tvuydqd.exe 4788 dfrbqtj.exe 4200 qsbzwxi.exe 2108 dfsobbg.exe 2828 qscehxf.exe 2072 adzocau.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1928 wrote to memory of 3076 1928 e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe 82 PID 1928 wrote to memory of 3076 1928 e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe 82 PID 1928 wrote to memory of 3076 1928 e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe 82 PID 3076 wrote to memory of 2724 3076 oqxigjl.exe 83 PID 3076 wrote to memory of 2724 3076 oqxigjl.exe 83 PID 3076 wrote to memory of 2724 3076 oqxigjl.exe 83 PID 2724 wrote to memory of 5012 2724 ybnsbms.exe 84 PID 2724 wrote to memory of 5012 2724 ybnsbms.exe 84 PID 2724 wrote to memory of 5012 2724 ybnsbms.exe 84 PID 5012 wrote to memory of 4504 5012 lktvels.exe 85 PID 5012 wrote to memory of 4504 5012 lktvels.exe 85 PID 5012 wrote to memory of 4504 5012 lktvels.exe 85 PID 4504 wrote to memory of 760 4504 wgmomgt.exe 86 PID 4504 wrote to memory of 760 4504 wgmomgt.exe 86 PID 4504 wrote to memory of 760 4504 wgmomgt.exe 86 PID 760 wrote to memory of 5016 760 gcnybab.exe 87 PID 760 wrote to memory of 5016 760 gcnybab.exe 87 PID 760 wrote to memory of 5016 760 gcnybab.exe 87 PID 5016 wrote to memory of 3764 5016 ojiynqd.exe 88 PID 5016 wrote to memory of 3764 5016 ojiynqd.exe 88 PID 5016 wrote to memory of 3764 5016 ojiynqd.exe 88 PID 3764 wrote to memory of 1136 3764 aadtwyi.exe 89 PID 3764 wrote to memory of 1136 3764 aadtwyi.exe 89 PID 3764 wrote to memory of 1136 3764 aadtwyi.exe 89 PID 1136 wrote to memory of 312 1136 onvrcch.exe 90 PID 1136 wrote to memory of 312 1136 onvrcch.exe 90 PID 1136 wrote to memory of 312 1136 onvrcch.exe 90 PID 312 wrote to memory of 388 312 alptkkn.exe 91 PID 312 wrote to memory of 388 312 alptkkn.exe 91 PID 312 wrote to memory of 388 312 alptkkn.exe 91 PID 388 wrote to memory of 3232 388 ovwwnbn.exe 94 PID 388 wrote to memory of 3232 388 ovwwnbn.exe 94 PID 388 wrote to memory of 3232 388 ovwwnbn.exe 94 PID 3232 wrote to memory of 2712 3232 yxlgjet.exe 95 PID 3232 wrote to memory of 2712 3232 yxlgjet.exe 95 PID 3232 wrote to memory of 2712 3232 yxlgjet.exe 95 PID 2712 wrote to memory of 1076 2712 itmrqzu.exe 96 PID 2712 wrote to memory of 1076 2712 itmrqzu.exe 96 PID 2712 wrote to memory of 1076 2712 itmrqzu.exe 96 PID 1076 wrote to memory of 1200 1076 yubhris.exe 97 PID 1076 wrote to memory of 1200 1076 yubhris.exe 97 PID 1076 wrote to memory of 1200 1076 yubhris.exe 97 PID 1200 wrote to memory of 4176 1200 jtnechz.exe 98 PID 1200 wrote to memory of 4176 1200 jtnechz.exe 98 PID 1200 wrote to memory of 4176 1200 jtnechz.exe 98 PID 4176 wrote to memory of 2848 4176 vrihkhx.exe 100 PID 4176 wrote to memory of 2848 4176 vrihkhx.exe 100 PID 4176 wrote to memory of 2848 4176 vrihkhx.exe 100 PID 2848 wrote to memory of 4520 2848 gkyexfz.exe 102 PID 2848 wrote to memory of 4520 2848 gkyexfz.exe 102 PID 2848 wrote to memory of 4520 2848 gkyexfz.exe 102 PID 4520 wrote to memory of 3572 4520 ocwfemd.exe 103 PID 4520 wrote to memory of 3572 4520 ocwfemd.exe 103 PID 4520 wrote to memory of 3572 4520 ocwfemd.exe 103 PID 3572 wrote to memory of 2884 3572 aiohsdo.exe 104 PID 3572 wrote to memory of 2884 3572 aiohsdo.exe 104 PID 3572 wrote to memory of 2884 3572 aiohsdo.exe 104 PID 2884 wrote to memory of 884 2884 ldpsixp.exe 105 PID 2884 wrote to memory of 884 2884 ldpsixp.exe 105 PID 2884 wrote to memory of 884 2884 ldpsixp.exe 105 PID 884 wrote to memory of 2704 884 ataaghs.exe 106 PID 884 wrote to memory of 2704 884 ataaghs.exe 106 PID 884 wrote to memory of 2704 884 ataaghs.exe 106 PID 2704 wrote to memory of 692 2704 ogspmkr.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\oqxigjl.exeC:\Windows\system32\oqxigjl.exe 1172 "C:\Users\Admin\AppData\Local\Temp\e435b6f60ed68fe29ad76ba055220264_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\ybnsbms.exeC:\Windows\system32\ybnsbms.exe 1164 "C:\Windows\SysWOW64\oqxigjl.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\lktvels.exeC:\Windows\system32\lktvels.exe 1176 "C:\Windows\SysWOW64\ybnsbms.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\wgmomgt.exeC:\Windows\system32\wgmomgt.exe 1156 "C:\Windows\SysWOW64\lktvels.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\gcnybab.exeC:\Windows\system32\gcnybab.exe 1180 "C:\Windows\SysWOW64\wgmomgt.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\ojiynqd.exeC:\Windows\system32\ojiynqd.exe 1184 "C:\Windows\SysWOW64\gcnybab.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\aadtwyi.exeC:\Windows\system32\aadtwyi.exe 1188 "C:\Windows\SysWOW64\ojiynqd.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\onvrcch.exeC:\Windows\system32\onvrcch.exe 1160 "C:\Windows\SysWOW64\aadtwyi.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\alptkkn.exeC:\Windows\system32\alptkkn.exe 1196 "C:\Windows\SysWOW64\onvrcch.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\SysWOW64\ovwwnbn.exeC:\Windows\system32\ovwwnbn.exe 1168 "C:\Windows\SysWOW64\alptkkn.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\yxlgjet.exeC:\Windows\system32\yxlgjet.exe 1208 "C:\Windows\SysWOW64\ovwwnbn.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\itmrqzu.exeC:\Windows\system32\itmrqzu.exe 1056 "C:\Windows\SysWOW64\yxlgjet.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\yubhris.exeC:\Windows\system32\yubhris.exe 1216 "C:\Windows\SysWOW64\itmrqzu.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\jtnechz.exeC:\Windows\system32\jtnechz.exe 1200 "C:\Windows\SysWOW64\yubhris.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\vrihkhx.exeC:\Windows\system32\vrihkhx.exe 1064 "C:\Windows\SysWOW64\jtnechz.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\gkyexfz.exeC:\Windows\system32\gkyexfz.exe 1224 "C:\Windows\SysWOW64\vrihkhx.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\ocwfemd.exeC:\Windows\system32\ocwfemd.exe 1232 "C:\Windows\SysWOW64\gkyexfz.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\aiohsdo.exeC:\Windows\system32\aiohsdo.exe 1212 "C:\Windows\SysWOW64\ocwfemd.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\ldpsixp.exeC:\Windows\system32\ldpsixp.exe 1236 "C:\Windows\SysWOW64\aiohsdo.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\ataaghs.exeC:\Windows\system32\ataaghs.exe 1240 "C:\Windows\SysWOW64\ldpsixp.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\ogspmkr.exeC:\Windows\system32\ogspmkr.exe 1244 "C:\Windows\SysWOW64\ataaghs.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\yfwnfjz.exeC:\Windows\system32\yfwnfjz.exe 1220 "C:\Windows\SysWOW64\ogspmkr.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:692 -
C:\Windows\SysWOW64\ixlsjzs.exeC:\Windows\system32\ixlsjzs.exe 1252 "C:\Windows\SysWOW64\yfwnfjz.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4508 -
C:\Windows\SysWOW64\yfxsqjw.exeC:\Windows\system32\yfxsqjw.exe 1228 "C:\Windows\SysWOW64\ixlsjzs.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4364 -
C:\Windows\SysWOW64\laoqwnv.exeC:\Windows\system32\laoqwnv.exe 1260 "C:\Windows\SysWOW64\yfxsqjw.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Windows\SysWOW64\vztnglc.exeC:\Windows\system32\vztnglc.exe 1264 "C:\Windows\SysWOW64\laoqwnv.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Windows\SysWOW64\gyflzkk.exeC:\Windows\system32\gyflzkk.exe 1268 "C:\Windows\SysWOW64\vztnglc.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4400 -
C:\Windows\SysWOW64\wzctsla.exeC:\Windows\system32\wzctsla.exe 1272 "C:\Windows\SysWOW64\gyflzkk.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:464 -
C:\Windows\SysWOW64\gkrdnoo.exeC:\Windows\system32\gkrdnoo.exe 1276 "C:\Windows\SysWOW64\wzctsla.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:628 -
C:\Windows\SysWOW64\ttxgqog.exeC:\Windows\system32\ttxgqog.exe 1284 "C:\Windows\SysWOW64\gkrdnoo.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4076 -
C:\Windows\SysWOW64\gksizwm.exeC:\Windows\system32\gksizwm.exe 1288 "C:\Windows\SysWOW64\ttxgqog.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4276 -
C:\Windows\SysWOW64\qgtbgqm.exeC:\Windows\system32\qgtbgqm.exe 1256 "C:\Windows\SysWOW64\gksizwm.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5064 -
C:\Windows\SysWOW64\dizjsvz.exeC:\Windows\system32\dizjsvz.exe 1296 "C:\Windows\SysWOW64\qgtbgqm.exe"34⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564 -
C:\Windows\SysWOW64\qvjgyzy.exeC:\Windows\system32\qvjgyzy.exe 1300 "C:\Windows\SysWOW64\dizjsvz.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Windows\SysWOW64\diawldw.exeC:\Windows\system32\diawldw.exe 1280 "C:\Windows\SysWOW64\qvjgyzy.exe"36⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Windows\SysWOW64\qvkmrgv.exeC:\Windows\system32\qvkmrgv.exe 1308 "C:\Windows\SysWOW64\diawldw.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Windows\SysWOW64\afhwekb.exeC:\Windows\system32\afhwekb.exe 1292 "C:\Windows\SysWOW64\qvkmrgv.exe"38⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Windows\SysWOW64\lbahmek.exeC:\Windows\system32\lbahmek.exe 1304 "C:\Windows\SysWOW64\afhwekb.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4288 -
C:\Windows\SysWOW64\yrdjvei.exeC:\Windows\system32\yrdjvei.exe 1320 "C:\Windows\SysWOW64\lbahmek.exe"40⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576 -
C:\Windows\SysWOW64\lemzbip.exeC:\Windows\system32\lemzbip.exe 1324 "C:\Windows\SysWOW64\yrdjvei.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Windows\SysWOW64\yrexomn.exeC:\Windows\system32\yrexomn.exe 1316 "C:\Windows\SysWOW64\lemzbip.exe"42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Windows\SysWOW64\lmnmuqm.exeC:\Windows\system32\lmnmuqm.exe 1328 "C:\Windows\SysWOW64\yrexomn.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Windows\SysWOW64\vplxhls.exeC:\Windows\system32\vplxhls.exe 1332 "C:\Windows\SysWOW64\lmnmuqm.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:5076 -
C:\Windows\SysWOW64\acumnpz.exeC:\Windows\system32\acumnpz.exe 1340 "C:\Windows\SysWOW64\vplxhls.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4672 -
C:\Windows\SysWOW64\npmctty.exeC:\Windows\system32\npmctty.exe 1336 "C:\Windows\SysWOW64\acumnpz.exe"46⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3408 -
C:\Windows\SysWOW64\bkvszwx.exeC:\Windows\system32\bkvszwx.exe 1348 "C:\Windows\SysWOW64\npmctty.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Windows\SysWOW64\kmtcuzd.exeC:\Windows\system32\kmtcuzd.exe 1352 "C:\Windows\SysWOW64\bkvszwx.exe"48⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Windows\SysWOW64\yzcsavc.exeC:\Windows\system32\yzcsavc.exe 1192 "C:\Windows\SysWOW64\kmtcuzd.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3608 -
C:\Windows\SysWOW64\lmuigzj.exeC:\Windows\system32\lmuigzj.exe 1356 "C:\Windows\SysWOW64\yzcsavc.exe"50⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Windows\SysWOW64\yzefldh.exeC:\Windows\system32\yzefldh.exe 1364 "C:\Windows\SysWOW64\lmuigzj.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3444 -
C:\Windows\SysWOW64\ikbqzgo.exeC:\Windows\system32\ikbqzgo.exe 1360 "C:\Windows\SysWOW64\yzefldh.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4848 -
C:\Windows\SysWOW64\vxkfecm.exeC:\Windows\system32\vxkfecm.exe 1368 "C:\Windows\SysWOW64\ikbqzgo.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4436 -
C:\Windows\SysWOW64\ikcvkgl.exeC:\Windows\system32\ikcvkgl.exe 1312 "C:\Windows\SysWOW64\vxkfecm.exe"54⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2504 -
C:\Windows\SysWOW64\vxmlqks.exeC:\Windows\system32\vxmlqks.exe 1376 "C:\Windows\SysWOW64\ikcvkgl.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4440 -
C:\Windows\SysWOW64\iwoozsq.exeC:\Windows\system32\iwoozsq.exe 1380 "C:\Windows\SysWOW64\vxmlqks.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4368 -
C:\Windows\SysWOW64\svslrrx.exeC:\Windows\system32\svslrrx.exe 1384 "C:\Windows\SysWOW64\iwoozsq.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Windows\SysWOW64\gezwuix.exeC:\Windows\system32\gezwuix.exe 1388 "C:\Windows\SysWOW64\svslrrx.exe"58⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:372 -
C:\Windows\SysWOW64\tvuydqd.exeC:\Windows\system32\tvuydqd.exe 1396 "C:\Windows\SysWOW64\gezwuix.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3920 -
C:\Windows\SysWOW64\dfrbqtj.exeC:\Windows\system32\dfrbqtj.exe 1392 "C:\Windows\SysWOW64\tvuydqd.exe"60⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4788 -
C:\Windows\SysWOW64\qsbzwxi.exeC:\Windows\system32\qsbzwxi.exe 1404 "C:\Windows\SysWOW64\dfrbqtj.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4200 -
C:\Windows\SysWOW64\dfsobbg.exeC:\Windows\system32\dfsobbg.exe 1344 "C:\Windows\SysWOW64\qsbzwxi.exe"62⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Windows\SysWOW64\qscehxf.exeC:\Windows\system32\qscehxf.exe 1400 "C:\Windows\SysWOW64\dfsobbg.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Windows\SysWOW64\adzocau.exeC:\Windows\system32\adzocau.exe 1372 "C:\Windows\SysWOW64\qscehxf.exe"64⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Windows\SysWOW64\kyszkvu.exeC:\Windows\system32\kyszkvu.exe 1416 "C:\Windows\SysWOW64\adzocau.exe"65⤵
- Executes dropped EXE
PID:752 -
C:\Windows\SysWOW64\vutrspv.exeC:\Windows\system32\vutrspv.exe 1424 "C:\Windows\SysWOW64\kyszkvu.exe"66⤵PID:3596
-
C:\Windows\SysWOW64\idzuvov.exeC:\Windows\system32\idzuvov.exe 1428 "C:\Windows\SysWOW64\vutrspv.exe"67⤵
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\sddrnnd.exeC:\Windows\system32\sddrnnd.exe 1436 "C:\Windows\SysWOW64\idzuvov.exe"68⤵PID:1572
-
C:\Windows\SysWOW64\dvtxsdx.exeC:\Windows\system32\dvtxsdx.exe 1044 "C:\Windows\SysWOW64\sddrnnd.exe"69⤵
- Drops file in System32 directory
PID:4304 -
C:\Windows\SysWOW64\qxzmdqj.exeC:\Windows\system32\qxzmdqj.exe 1440 "C:\Windows\SysWOW64\dvtxsdx.exe"70⤵PID:3276
-
C:\Windows\SysWOW64\xpyfsxf.exeC:\Windows\system32\xpyfsxf.exe 1072 "C:\Windows\SysWOW64\qxzmdqj.exe"71⤵PID:976
-
C:\Windows\SysWOW64\ilzxzro.exeC:\Windows\system32\ilzxzro.exe 1052 "C:\Windows\SysWOW64\xpyfsxf.exe"72⤵PID:4000
-
C:\Windows\SysWOW64\qamklcl.exeC:\Windows\system32\qamklcl.exe 1456 "C:\Windows\SysWOW64\ilzxzro.exe"73⤵PID:5096
-
C:\Windows\SysWOW64\ssmadyt.exeC:\Windows\system32\ssmadyt.exe 1036 "C:\Windows\SysWOW64\qamklcl.exe"74⤵PID:5040
-
C:\Windows\SysWOW64\swyascx.exeC:\Windows\system32\swyascx.exe 1084 "C:\Windows\SysWOW64\ssmadyt.exe"75⤵
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\futvakd.exeC:\Windows\system32\futvakd.exe 1460 "C:\Windows\SysWOW64\swyascx.exe"76⤵PID:2436
-
C:\Windows\SysWOW64\thltgob.exeC:\Windows\system32\thltgob.exe 1088 "C:\Windows\SysWOW64\futvakd.exe"77⤵
- System Location Discovery: System Language Discovery
PID:4408 -
C:\Windows\SysWOW64\vrciykj.exeC:\Windows\system32\vrciykj.exe 1068 "C:\Windows\SysWOW64\thltgob.exe"78⤵PID:3416
-
C:\Windows\SysWOW64\iemyegi.exeC:\Windows\system32\iemyegi.exe 1476 "C:\Windows\SysWOW64\vrciykj.exe"79⤵PID:4964
-
C:\Windows\SysWOW64\vrdokjh.exeC:\Windows\system32\vrdokjh.exe 1480 "C:\Windows\SysWOW64\iemyegi.exe"80⤵PID:1424
-
C:\Windows\SysWOW64\gnegseh.exeC:\Windows\system32\gnegseh.exe 1472 "C:\Windows\SysWOW64\vrdokjh.exe"81⤵PID:3552
-
C:\Windows\SysWOW64\nusymtr.exeC:\Windows\system32\nusymtr.exe 1484 "C:\Windows\SysWOW64\gnegseh.exe"82⤵PID:4692
-
C:\Windows\SysWOW64\dklgtlv.exeC:\Windows\system32\dklgtlv.exe 1492 "C:\Windows\SysWOW64\nusymtr.exe"83⤵PID:4376
-
C:\Windows\SysWOW64\qxvwyht.exeC:\Windows\system32\qxvwyht.exe 1500 "C:\Windows\SysWOW64\dklgtlv.exe"84⤵PID:2880
-
C:\Windows\SysWOW64\xbfjiaw.exeC:\Windows\system32\xbfjiaw.exe 1488 "C:\Windows\SysWOW64\qxvwyht.exe"85⤵PID:3288
-
C:\Windows\SysWOW64\nvbwroy.exeC:\Windows\system32\nvbwroy.exe 1504 "C:\Windows\SysWOW64\xbfjiaw.exe"86⤵PID:4028
-
C:\Windows\SysWOW64\seihuny.exeC:\Windows\system32\seihuny.exe 1496 "C:\Windows\SysWOW64\nvbwroy.exe"87⤵PID:640
-
C:\Windows\SysWOW64\amvzpdi.exeC:\Windows\system32\amvzpdi.exe 1516 "C:\Windows\SysWOW64\seihuny.exe"88⤵PID:4404
-
C:\Windows\SysWOW64\qnshqlg.exeC:\Windows\system32\qnshqlg.exe 1508 "C:\Windows\SysWOW64\amvzpdi.exe"89⤵PID:224
-
C:\Windows\SysWOW64\ddnkymd.exeC:\Windows\system32\ddnkymd.exe 1520 "C:\Windows\SysWOW64\qnshqlg.exe"90⤵PID:3192
-
C:\Windows\SysWOW64\nkzhjkl.exeC:\Windows\system32\nkzhjkl.exe 1524 "C:\Windows\SysWOW64\ddnkymd.exe"91⤵PID:1676
-
C:\Windows\SysWOW64\uhjuado.exeC:\Windows\system32\uhjuado.exe 1532 "C:\Windows\SysWOW64\nkzhjkl.exe"92⤵PID:1140
-
C:\Windows\SysWOW64\iqqxddo.exeC:\Windows\system32\iqqxddo.exe 1528 "C:\Windows\SysWOW64\uhjuado.exe"93⤵PID:4412
-
C:\Windows\SysWOW64\sxuuouv.exeC:\Windows\system32\sxuuouv.exe 1536 "C:\Windows\SysWOW64\iqqxddo.exe"94⤵PID:708
-
C:\Windows\SysWOW64\uhlsgqd.exeC:\Windows\system32\uhlsgqd.exe 1092 "C:\Windows\SysWOW64\sxuuouv.exe"95⤵PID:4608
-
C:\Windows\SysWOW64\liiahzt.exeC:\Windows\system32\liiahzt.exe 1540 "C:\Windows\SysWOW64\uhlsgqd.exe"96⤵PID:4832
-
C:\Windows\SysWOW64\pynvdnf.exeC:\Windows\system32\pynvdnf.exe 1548 "C:\Windows\SysWOW64\liiahzt.exe"97⤵PID:4420
-
C:\Windows\SysWOW64\clxljjd.exeC:\Windows\system32\clxljjd.exe 1556 "C:\Windows\SysWOW64\pynvdnf.exe"98⤵PID:2584
-
C:\Windows\SysWOW64\sbqtqah.exeC:\Windows\system32\sbqtqah.exe 1544 "C:\Windows\SysWOW64\clxljjd.exe"99⤵PID:4300
-
C:\Windows\SysWOW64\cauqazp.exeC:\Windows\system32\cauqazp.exe 1564 "C:\Windows\SysWOW64\sbqtqah.exe"100⤵PID:1296
-
C:\Windows\SysWOW64\nsknfpr.exeC:\Windows\system32\nsknfpr.exe 1568 "C:\Windows\SysWOW64\cauqazp.exe"101⤵PID:3676
-
C:\Windows\SysWOW64\ajfqopo.exeC:\Windows\system32\ajfqopo.exe 1560 "C:\Windows\SysWOW64\nsknfpr.exe"102⤵PID:4568
-
C:\Windows\SysWOW64\kefjdkx.exeC:\Windows\system32\kefjdkx.exe 1580 "C:\Windows\SysWOW64\ajfqopo.exe"103⤵PID:3468
-
C:\Windows\SysWOW64\yomlgjp.exeC:\Windows\system32\yomlgjp.exe 1572 "C:\Windows\SysWOW64\kefjdkx.exe"104⤵PID:2184
-
C:\Windows\SysWOW64\fwzdshy.exeC:\Windows\system32\fwzdshy.exe 1576 "C:\Windows\SysWOW64\yomlgjp.exe"105⤵PID:3760
-
C:\Windows\SysWOW64\prawabz.exeC:\Windows\system32\prawabz.exe 1048 "C:\Windows\SysWOW64\fwzdshy.exe"106⤵PID:3816
-
C:\Windows\SysWOW64\fwirege.exeC:\Windows\system32\fwirege.exe 1592 "C:\Windows\SysWOW64\prawabz.exe"107⤵PID:1876
-
C:\Windows\SysWOW64\nwhrtna.exeC:\Windows\system32\nwhrtna.exe 1096 "C:\Windows\SysWOW64\fwirege.exe"108⤵
- Drops file in System32 directory
PID:4612 -
C:\Windows\SysWOW64\acrmhel.exeC:\Windows\system32\acrmhel.exe 1600 "C:\Windows\SysWOW64\nwhrtna.exe"109⤵PID:4948
-
C:\Windows\SysWOW64\pkkuonp.exeC:\Windows\system32\pkkuonp.exe 1596 "C:\Windows\SysWOW64\acrmhel.exe"110⤵PID:2164
-
C:\Windows\SysWOW64\dtqwrnh.exeC:\Windows\system32\dtqwrnh.exe 1588 "C:\Windows\SysWOW64\pkkuonp.exe"111⤵PID:4320
-
C:\Windows\SysWOW64\negheqv.exeC:\Windows\system32\negheqv.exe 1612 "C:\Windows\SysWOW64\dtqwrnh.exe"112⤵
- Drops file in System32 directory
PID:4324 -
C:\Windows\SysWOW64\arpwkuu.exeC:\Windows\system32\arpwkuu.exe 1604 "C:\Windows\SysWOW64\negheqv.exe"113⤵
- Drops file in System32 directory
PID:2612 -
C:\Windows\SysWOW64\nhszscz.exeC:\Windows\system32\nhszscz.exe 1468 "C:\Windows\SysWOW64\arpwkuu.exe"114⤵PID:2732
-
C:\Windows\SysWOW64\arykvur.exeC:\Windows\system32\arykvur.exe 1608 "C:\Windows\SysWOW64\nhszscz.exe"115⤵PID:5072
-
C:\Windows\SysWOW64\nptnmcx.exeC:\Windows\system32\nptnmcx.exe 1620 "C:\Windows\SysWOW64\arykvur.exe"116⤵PID:4136
-
C:\Windows\SysWOW64\xoxkwbe.exeC:\Windows\system32\xoxkwbe.exe 1632 "C:\Windows\SysWOW64\nptnmcx.exe"117⤵PID:3048
-
C:\Windows\SysWOW64\kfanfjc.exeC:\Windows\system32\kfanfjc.exe 1624 "C:\Windows\SysWOW64\xoxkwbe.exe"118⤵PID:1072
-
C:\Windows\SysWOW64\xogpiic.exeC:\Windows\system32\xogpiic.exe 1640 "C:\Windows\SysWOW64\kfanfjc.exe"119⤵PID:2188
-
C:\Windows\SysWOW64\knbsqih.exeC:\Windows\system32\knbsqih.exe 1636 "C:\Windows\SysWOW64\xogpiic.exe"120⤵PID:3936
-
C:\Windows\SysWOW64\xaliwmg.exeC:\Windows\system32\xaliwmg.exe 1616 "C:\Windows\SysWOW64\knbsqih.exe"121⤵PID:1340
-
C:\Windows\SysWOW64\izxfhlo.exeC:\Windows\system32\izxfhlo.exe 1644 "C:\Windows\SysWOW64\xaliwmg.exe"122⤵PID:2124
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-