Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe
-
Size
531KB
-
MD5
e67640cd341abde8cb55bd9aa3fe6f86
-
SHA1
f8cc7a10e21eb36b64790337c9ad99766c346bc5
-
SHA256
d6ea739e498f5931b8fbe3881001e343a64cb5755d3df4635b70df2beecae02d
-
SHA512
e74ef64e22bc606d111b07345251e89b527d85f1f5b8e692940f9c8051f234d281a84f6579142ba2824aafe6b5b024d143a2eb3293c336fa17c1d9bc2f251385
-
SSDEEP
12288:+NuaIsd+lbShO2PLOHKwsYyHBsU6lxSnyYxYKSCh3BeQs8/:+oaIzDWLO/sYyHBp6in1xcCh3BeQs8/
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2108 gcvvbp.exe 1664 votbfp.exe 2940 brbywd.exe 2188 qdyeae.exe 2044 vxprkw.exe 2628 dbaebh.exe 796 xltmzj.exe 1528 cmbhpo.exe 2716 juxzke.exe 1048 jjmebm.exe 1616 liauzr.exe 3004 xzehbm.exe 2400 xgcmtc.exe 844 mhorkl.exe 1472 wcpcrg.exe 2116 dkkcmv.exe 2464 lsyuys.exe 2556 qisxgt.exe 2204 dvknmw.exe 2360 ngzxha.exe 2876 xiphvd.exe 316 nvxczi.exe 900 xubajh.exe 1432 heqkek.exe 2128 rarvme.exe 2148 bdhfzh.exe 1356 lfwpuk.exe 2560 vminfj.exe 1628 flmspi.exe 1188 scpnyi.exe 1192 cjtsqh.exe 1916 paovzp.exe 2072 zzasjo.exe 2604 rjolrl.exe 2120 eiinat.exe 2852 oojlqt.exe 2480 bnefyb.exe 2216 odhipj.exe 932 bcblyr.exe 632 oswngr.exe 2304 yrilrq.exe 2040 hfjipy.exe 2572 uwelxg.exe 2776 huzogg.exe 2664 ulbqoo.exe 2928 evrbcr.exe 3036 rpxinw.exe 1012 ekggta.exe 2328 onwiod.exe 2292 blzlxl.exe 2960 octofl.exe 2656 yejyso.exe 1700 kdmbbw.exe 2856 ugblwz.exe 2228 hewofa.exe 308 urneld.exe 1572 efobbl.exe 2196 rwjert.exe 2640 euegat.exe 2976 oxtrnw.exe 2272 bklhta.exe 604 oifjci.exe 2916 ylvuxl.exe 2984 ivsekh.exe -
Identifies Wine through registry keys 2 TTPs 64 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ciralu.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine msgkow.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine rigryu.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine hhvuzm.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine xlnrqx.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine mpovxc.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine pqgejk.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine foabmi.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine qjfqge.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine lsmxyi.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ipjvkk.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ymaokw.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine yorlwb.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine jfwdbl.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine mrqjfv.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine tdzuib.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine wiujxn.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine oxtrnw.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine iuiwwi.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine oecdsi.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine twtwvh.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine mxokgs.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine beuolf.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine kdmbbw.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ugblwz.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ljzdok.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine qisxgt.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine jyyxjd.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine bmters.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine luudyv.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine wdawjd.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine dtjpvq.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine hxrrub.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine fvsjzm.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine rbdokx.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine wgzxnt.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine iaodbq.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine bwoqcm.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine oojlqt.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine boypos.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine hnquqf.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine vttxgr.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine lywifb.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine sapezw.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine bhajwk.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ayvaew.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine alsall.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine grswbw.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine usevgy.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine szsulr.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ijjvno.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ddklhe.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine bfaccn.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ytytbe.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine dnombr.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine yusrrx.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine egbtgc.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine qkmseq.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine efobbl.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine sewwcg.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine sgqacz.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine gmwzmh.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine cxbflr.exe -
Loads dropped DLL 64 IoCs
pid Process 2692 e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe 2692 e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe 2108 gcvvbp.exe 2108 gcvvbp.exe 1664 votbfp.exe 1664 votbfp.exe 2940 brbywd.exe 2940 brbywd.exe 2188 qdyeae.exe 2188 qdyeae.exe 2044 vxprkw.exe 2044 vxprkw.exe 2628 dbaebh.exe 2628 dbaebh.exe 796 xltmzj.exe 796 xltmzj.exe 1528 cmbhpo.exe 1528 cmbhpo.exe 2716 juxzke.exe 2716 juxzke.exe 1048 jjmebm.exe 1048 jjmebm.exe 1616 liauzr.exe 1616 liauzr.exe 3004 xzehbm.exe 3004 xzehbm.exe 2400 xgcmtc.exe 2400 xgcmtc.exe 844 mhorkl.exe 844 mhorkl.exe 1472 wcpcrg.exe 1472 wcpcrg.exe 2116 dkkcmv.exe 2116 dkkcmv.exe 2464 lsyuys.exe 2464 lsyuys.exe 2556 qisxgt.exe 2556 qisxgt.exe 2204 dvknmw.exe 2204 dvknmw.exe 2360 ngzxha.exe 2360 ngzxha.exe 2876 xiphvd.exe 2876 xiphvd.exe 316 nvxczi.exe 316 nvxczi.exe 900 xubajh.exe 900 xubajh.exe 1432 heqkek.exe 1432 heqkek.exe 2128 rarvme.exe 2128 rarvme.exe 2148 bdhfzh.exe 2148 bdhfzh.exe 1356 lfwpuk.exe 1356 lfwpuk.exe 2560 vminfj.exe 2560 vminfj.exe 1628 flmspi.exe 1628 flmspi.exe 1188 scpnyi.exe 1188 scpnyi.exe 1192 cjtsqh.exe 1192 cjtsqh.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mdxqjk.exe cpxsld.exe File created C:\Windows\SysWOW64\wjkldg.exe khedru.exe File created C:\Windows\SysWOW64\wsrttw.exe meqedp.exe File opened for modification C:\Windows\SysWOW64\ajhztf.exe ntmwdw.exe File created C:\Windows\SysWOW64\xtnwcq.exe kvtulq.exe File created C:\Windows\SysWOW64\jjmebm.exe juxzke.exe File opened for modification C:\Windows\SysWOW64\vbnluq.exe icsimi.exe File opened for modification C:\Windows\SysWOW64\uwfbml.exe hxkydc.exe File created C:\Windows\SysWOW64\lqqaeb.exe bcqdou.exe File opened for modification C:\Windows\SysWOW64\ijjvno.exe vtotwg.exe File created C:\Windows\SysWOW64\oxtrnw.exe euegat.exe File opened for modification C:\Windows\SysWOW64\xirxdt.exe nfbmix.exe File created C:\Windows\SysWOW64\vhwhby.exe iqbesp.exe File created C:\Windows\SysWOW64\svoixc.exe iwckne.exe File created C:\Windows\SysWOW64\xalctg.exe kkizky.exe File opened for modification C:\Windows\SysWOW64\zkyqpz.exe piifuw.exe File opened for modification C:\Windows\SysWOW64\nnxmok.exe dhfwqc.exe File opened for modification C:\Windows\SysWOW64\kmuzde.exe xnzxuw.exe File opened for modification C:\Windows\SysWOW64\ljzdok.exe yseifk.exe File created C:\Windows\SysWOW64\eljlbp.exe rugjso.exe File created C:\Windows\SysWOW64\nelemd.exe bfqbdv.exe File created C:\Windows\SysWOW64\dfamqe.exe qduffr.exe File opened for modification C:\Windows\SysWOW64\pqgejk.exe calcbb.exe File created C:\Windows\SysWOW64\hmadvl.exe uwfbml.exe File opened for modification C:\Windows\SysWOW64\umjjhz.exe jnxmwa.exe File opened for modification C:\Windows\SysWOW64\zfwvdm.exe lsmxyi.exe File created C:\Windows\SysWOW64\bozaja.exe wpeyas.exe File created C:\Windows\SysWOW64\rnmuep.exe fwjrng.exe File created C:\Windows\SysWOW64\nnqbpl.exe dltqui.exe File opened for modification C:\Windows\SysWOW64\dkiuqz.exe ricfwv.exe File opened for modification C:\Windows\SysWOW64\ohxpcc.exe bqcmtu.exe File created C:\Windows\SysWOW64\tyblpw.exe jombct.exe File opened for modification C:\Windows\SysWOW64\scqlnv.exe fdnien.exe File opened for modification C:\Windows\SysWOW64\paovzp.exe cjtsqh.exe File opened for modification C:\Windows\SysWOW64\mugdtc.exe zzwfny.exe File opened for modification C:\Windows\SysWOW64\smbwna.exe fzshhw.exe File opened for modification C:\Windows\SysWOW64\niywyx.exe dufziq.exe File opened for modification C:\Windows\SysWOW64\iwjtus.exe vfoqls.exe File opened for modification C:\Windows\SysWOW64\knkghp.exe xpqdyg.exe File created C:\Windows\SysWOW64\vnlqii.exe lzltsb.exe File opened for modification C:\Windows\SysWOW64\nviiny.exe essyav.exe File created C:\Windows\SysWOW64\crcoys.exe tckzat.exe File opened for modification C:\Windows\SysWOW64\ojrebf.exe egbtgc.exe File created C:\Windows\SysWOW64\obzovs.exe blxlnk.exe File created C:\Windows\SysWOW64\fanuga.exe sghmvw.exe File created C:\Windows\SysWOW64\wtfege.exe jckbxw.exe File opened for modification C:\Windows\SysWOW64\xvjims.exe ltdttf.exe File created C:\Windows\SysWOW64\gszcae.exe tuwzjw.exe File opened for modification C:\Windows\SysWOW64\xjpggs.exe ndpjqk.exe File opened for modification C:\Windows\SysWOW64\qktvqu.exe cxbflr.exe File created C:\Windows\SysWOW64\tjegyg.exe jkajgp.exe File created C:\Windows\SysWOW64\vontaw.exe ixtrrw.exe File created C:\Windows\SysWOW64\cdnreg.exe pqdbyd.exe File created C:\Windows\SysWOW64\rypxpi.exe fanuga.exe File created C:\Windows\SysWOW64\npszmh.exe cqobui.exe File opened for modification C:\Windows\SysWOW64\cmjpcj.exe pvhmtj.exe File created C:\Windows\SysWOW64\owxdpd.exe bydayv.exe File opened for modification C:\Windows\SysWOW64\hxrrub.exe xucghy.exe File opened for modification C:\Windows\SysWOW64\uyqxiu.exe hhvuzm.exe File created C:\Windows\SysWOW64\oifjci.exe bklhta.exe File opened for modification C:\Windows\SysWOW64\rugjso.exe esabhc.exe File opened for modification C:\Windows\SysWOW64\tejlgs.exe grswbw.exe File opened for modification C:\Windows\SysWOW64\rypxpi.exe fanuga.exe File opened for modification C:\Windows\SysWOW64\dnupvo.exe ocgcma.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jwuawb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zljyck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ankfjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tjegyg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ohmdtd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhmlym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hyhdti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dsairf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsayuu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubldfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pqmrbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upjojw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtufjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rccavx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lywifb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbdokx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kjupyq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdjfpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kmmlvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xiphvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epkzxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cxbflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvjims.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yakiib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gxyumz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilgtzq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lcghtf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxtvow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdiuzc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwjert.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language veftna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdxqjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gafuso.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uhhvvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltnuzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltdttf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drthmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcsnqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zwgwce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxokgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timxib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gltmnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkvfri.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpcqsq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcnmiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvectn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ysxfgv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcqdou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxabwo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zmvkou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uwelxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kikbpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvmmky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajhztf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbwaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eowewq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnmngi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hujsyy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twtwvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npszmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvknmw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kjxdyq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfaccn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jombct.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2108 2692 e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2108 2692 e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2108 2692 e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe 31 PID 2692 wrote to memory of 2108 2692 e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe 31 PID 2108 wrote to memory of 1664 2108 gcvvbp.exe 32 PID 2108 wrote to memory of 1664 2108 gcvvbp.exe 32 PID 2108 wrote to memory of 1664 2108 gcvvbp.exe 32 PID 2108 wrote to memory of 1664 2108 gcvvbp.exe 32 PID 1664 wrote to memory of 2940 1664 votbfp.exe 33 PID 1664 wrote to memory of 2940 1664 votbfp.exe 33 PID 1664 wrote to memory of 2940 1664 votbfp.exe 33 PID 1664 wrote to memory of 2940 1664 votbfp.exe 33 PID 2940 wrote to memory of 2188 2940 brbywd.exe 34 PID 2940 wrote to memory of 2188 2940 brbywd.exe 34 PID 2940 wrote to memory of 2188 2940 brbywd.exe 34 PID 2940 wrote to memory of 2188 2940 brbywd.exe 34 PID 2188 wrote to memory of 2044 2188 qdyeae.exe 35 PID 2188 wrote to memory of 2044 2188 qdyeae.exe 35 PID 2188 wrote to memory of 2044 2188 qdyeae.exe 35 PID 2188 wrote to memory of 2044 2188 qdyeae.exe 35 PID 2044 wrote to memory of 2628 2044 vxprkw.exe 36 PID 2044 wrote to memory of 2628 2044 vxprkw.exe 36 PID 2044 wrote to memory of 2628 2044 vxprkw.exe 36 PID 2044 wrote to memory of 2628 2044 vxprkw.exe 36 PID 2628 wrote to memory of 796 2628 dbaebh.exe 37 PID 2628 wrote to memory of 796 2628 dbaebh.exe 37 PID 2628 wrote to memory of 796 2628 dbaebh.exe 37 PID 2628 wrote to memory of 796 2628 dbaebh.exe 37 PID 796 wrote to memory of 1528 796 xltmzj.exe 38 PID 796 wrote to memory of 1528 796 xltmzj.exe 38 PID 796 wrote to memory of 1528 796 xltmzj.exe 38 PID 796 wrote to memory of 1528 796 xltmzj.exe 38 PID 1528 wrote to memory of 2716 1528 cmbhpo.exe 39 PID 1528 wrote to memory of 2716 1528 cmbhpo.exe 39 PID 1528 wrote to memory of 2716 1528 cmbhpo.exe 39 PID 1528 wrote to memory of 2716 1528 cmbhpo.exe 39 PID 2716 wrote to memory of 1048 2716 juxzke.exe 40 PID 2716 wrote to memory of 1048 2716 juxzke.exe 40 PID 2716 wrote to memory of 1048 2716 juxzke.exe 40 PID 2716 wrote to memory of 1048 2716 juxzke.exe 40 PID 1048 wrote to memory of 1616 1048 jjmebm.exe 41 PID 1048 wrote to memory of 1616 1048 jjmebm.exe 41 PID 1048 wrote to memory of 1616 1048 jjmebm.exe 41 PID 1048 wrote to memory of 1616 1048 jjmebm.exe 41 PID 1616 wrote to memory of 3004 1616 liauzr.exe 42 PID 1616 wrote to memory of 3004 1616 liauzr.exe 42 PID 1616 wrote to memory of 3004 1616 liauzr.exe 42 PID 1616 wrote to memory of 3004 1616 liauzr.exe 42 PID 3004 wrote to memory of 2400 3004 xzehbm.exe 43 PID 3004 wrote to memory of 2400 3004 xzehbm.exe 43 PID 3004 wrote to memory of 2400 3004 xzehbm.exe 43 PID 3004 wrote to memory of 2400 3004 xzehbm.exe 43 PID 2400 wrote to memory of 844 2400 xgcmtc.exe 44 PID 2400 wrote to memory of 844 2400 xgcmtc.exe 44 PID 2400 wrote to memory of 844 2400 xgcmtc.exe 44 PID 2400 wrote to memory of 844 2400 xgcmtc.exe 44 PID 844 wrote to memory of 1472 844 mhorkl.exe 45 PID 844 wrote to memory of 1472 844 mhorkl.exe 45 PID 844 wrote to memory of 1472 844 mhorkl.exe 45 PID 844 wrote to memory of 1472 844 mhorkl.exe 45 PID 1472 wrote to memory of 2116 1472 wcpcrg.exe 46 PID 1472 wrote to memory of 2116 1472 wcpcrg.exe 46 PID 1472 wrote to memory of 2116 1472 wcpcrg.exe 46 PID 1472 wrote to memory of 2116 1472 wcpcrg.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\gcvvbp.exeC:\Windows\system32\gcvvbp.exe 636 "C:\Users\Admin\AppData\Local\Temp\e67640cd341abde8cb55bd9aa3fe6f86_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\votbfp.exeC:\Windows\system32\votbfp.exe 612 "C:\Windows\SysWOW64\gcvvbp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\brbywd.exeC:\Windows\system32\brbywd.exe 620 "C:\Windows\SysWOW64\votbfp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\qdyeae.exeC:\Windows\system32\qdyeae.exe 616 "C:\Windows\SysWOW64\brbywd.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\vxprkw.exeC:\Windows\system32\vxprkw.exe 624 "C:\Windows\SysWOW64\qdyeae.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\dbaebh.exeC:\Windows\system32\dbaebh.exe 628 "C:\Windows\SysWOW64\vxprkw.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\xltmzj.exeC:\Windows\system32\xltmzj.exe 640 "C:\Windows\SysWOW64\dbaebh.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\cmbhpo.exeC:\Windows\system32\cmbhpo.exe 664 "C:\Windows\SysWOW64\xltmzj.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\juxzke.exeC:\Windows\system32\juxzke.exe 632 "C:\Windows\SysWOW64\cmbhpo.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\jjmebm.exeC:\Windows\system32\jjmebm.exe 688 "C:\Windows\SysWOW64\juxzke.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\liauzr.exeC:\Windows\system32\liauzr.exe 704 "C:\Windows\SysWOW64\jjmebm.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\xzehbm.exeC:\Windows\system32\xzehbm.exe 660 "C:\Windows\SysWOW64\liauzr.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\xgcmtc.exeC:\Windows\system32\xgcmtc.exe 680 "C:\Windows\SysWOW64\xzehbm.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\mhorkl.exeC:\Windows\system32\mhorkl.exe 676 "C:\Windows\SysWOW64\xgcmtc.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\wcpcrg.exeC:\Windows\system32\wcpcrg.exe 684 "C:\Windows\SysWOW64\mhorkl.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\dkkcmv.exeC:\Windows\system32\dkkcmv.exe 648 "C:\Windows\SysWOW64\wcpcrg.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2116 -
C:\Windows\SysWOW64\lsyuys.exeC:\Windows\system32\lsyuys.exe 756 "C:\Windows\SysWOW64\dkkcmv.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2464 -
C:\Windows\SysWOW64\qisxgt.exeC:\Windows\system32\qisxgt.exe 760 "C:\Windows\SysWOW64\lsyuys.exe"19⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
PID:2556 -
C:\Windows\SysWOW64\dvknmw.exeC:\Windows\system32\dvknmw.exe 764 "C:\Windows\SysWOW64\qisxgt.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\ngzxha.exeC:\Windows\system32\ngzxha.exe 776 "C:\Windows\SysWOW64\dvknmw.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2360 -
C:\Windows\SysWOW64\xiphvd.exeC:\Windows\system32\xiphvd.exe 780 "C:\Windows\SysWOW64\ngzxha.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\SysWOW64\nvxczi.exeC:\Windows\system32\nvxczi.exe 772 "C:\Windows\SysWOW64\xiphvd.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:316 -
C:\Windows\SysWOW64\xubajh.exeC:\Windows\system32\xubajh.exe 768 "C:\Windows\SysWOW64\nvxczi.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:900 -
C:\Windows\SysWOW64\heqkek.exeC:\Windows\system32\heqkek.exe 784 "C:\Windows\SysWOW64\xubajh.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1432 -
C:\Windows\SysWOW64\rarvme.exeC:\Windows\system32\rarvme.exe 796 "C:\Windows\SysWOW64\heqkek.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2128 -
C:\Windows\SysWOW64\bdhfzh.exeC:\Windows\system32\bdhfzh.exe 792 "C:\Windows\SysWOW64\rarvme.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2148 -
C:\Windows\SysWOW64\lfwpuk.exeC:\Windows\system32\lfwpuk.exe 788 "C:\Windows\SysWOW64\bdhfzh.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1356 -
C:\Windows\SysWOW64\vminfj.exeC:\Windows\system32\vminfj.exe 800 "C:\Windows\SysWOW64\lfwpuk.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2560 -
C:\Windows\SysWOW64\flmspi.exeC:\Windows\system32\flmspi.exe 752 "C:\Windows\SysWOW64\vminfj.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1628 -
C:\Windows\SysWOW64\scpnyi.exeC:\Windows\system32\scpnyi.exe 808 "C:\Windows\SysWOW64\flmspi.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1188 -
C:\Windows\SysWOW64\cjtsqh.exeC:\Windows\system32\cjtsqh.exe 812 "C:\Windows\SysWOW64\scpnyi.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1192 -
C:\Windows\SysWOW64\paovzp.exeC:\Windows\system32\paovzp.exe 816 "C:\Windows\SysWOW64\cjtsqh.exe"33⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\SysWOW64\zzasjo.exeC:\Windows\system32\zzasjo.exe 820 "C:\Windows\SysWOW64\paovzp.exe"34⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\rjolrl.exeC:\Windows\system32\rjolrl.exe 824 "C:\Windows\SysWOW64\zzasjo.exe"35⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\eiinat.exeC:\Windows\system32\eiinat.exe 828 "C:\Windows\SysWOW64\rjolrl.exe"36⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\oojlqt.exeC:\Windows\system32\oojlqt.exe 832 "C:\Windows\SysWOW64\eiinat.exe"37⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2852 -
C:\Windows\SysWOW64\bnefyb.exeC:\Windows\system32\bnefyb.exe 836 "C:\Windows\SysWOW64\oojlqt.exe"38⤵
- Executes dropped EXE
PID:2480 -
C:\Windows\SysWOW64\odhipj.exeC:\Windows\system32\odhipj.exe 844 "C:\Windows\SysWOW64\bnefyb.exe"39⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\bcblyr.exeC:\Windows\system32\bcblyr.exe 840 "C:\Windows\SysWOW64\odhipj.exe"40⤵
- Executes dropped EXE
PID:932 -
C:\Windows\SysWOW64\oswngr.exeC:\Windows\system32\oswngr.exe 848 "C:\Windows\SysWOW64\bcblyr.exe"41⤵
- Executes dropped EXE
PID:632 -
C:\Windows\SysWOW64\yrilrq.exeC:\Windows\system32\yrilrq.exe 852 "C:\Windows\SysWOW64\oswngr.exe"42⤵
- Executes dropped EXE
PID:2304 -
C:\Windows\SysWOW64\hfjipy.exeC:\Windows\system32\hfjipy.exe 860 "C:\Windows\SysWOW64\yrilrq.exe"43⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\uwelxg.exeC:\Windows\system32\uwelxg.exe 856 "C:\Windows\SysWOW64\hfjipy.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Windows\SysWOW64\huzogg.exeC:\Windows\system32\huzogg.exe 864 "C:\Windows\SysWOW64\uwelxg.exe"45⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\ulbqoo.exeC:\Windows\system32\ulbqoo.exe 868 "C:\Windows\SysWOW64\huzogg.exe"46⤵
- Executes dropped EXE
PID:2664 -
C:\Windows\SysWOW64\evrbcr.exeC:\Windows\system32\evrbcr.exe 876 "C:\Windows\SysWOW64\ulbqoo.exe"47⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\SysWOW64\rpxinw.exeC:\Windows\system32\rpxinw.exe 872 "C:\Windows\SysWOW64\evrbcr.exe"48⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\ekggta.exeC:\Windows\system32\ekggta.exe 880 "C:\Windows\SysWOW64\rpxinw.exe"49⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\onwiod.exeC:\Windows\system32\onwiod.exe 884 "C:\Windows\SysWOW64\ekggta.exe"50⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\blzlxl.exeC:\Windows\system32\blzlxl.exe 888 "C:\Windows\SysWOW64\onwiod.exe"51⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\octofl.exeC:\Windows\system32\octofl.exe 892 "C:\Windows\SysWOW64\blzlxl.exe"52⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\yejyso.exeC:\Windows\system32\yejyso.exe 804 "C:\Windows\SysWOW64\octofl.exe"53⤵
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\kdmbbw.exeC:\Windows\system32\kdmbbw.exe 908 "C:\Windows\SysWOW64\yejyso.exe"54⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1700 -
C:\Windows\SysWOW64\ugblwz.exeC:\Windows\system32\ugblwz.exe 904 "C:\Windows\SysWOW64\kdmbbw.exe"55⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2856 -
C:\Windows\SysWOW64\hewofa.exeC:\Windows\system32\hewofa.exe 900 "C:\Windows\SysWOW64\ugblwz.exe"56⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\urneld.exeC:\Windows\system32\urneld.exe 916 "C:\Windows\SysWOW64\hewofa.exe"57⤵
- Executes dropped EXE
PID:308 -
C:\Windows\SysWOW64\efobbl.exeC:\Windows\system32\efobbl.exe 912 "C:\Windows\SysWOW64\urneld.exe"58⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1572 -
C:\Windows\SysWOW64\rwjert.exeC:\Windows\system32\rwjert.exe 928 "C:\Windows\SysWOW64\efobbl.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\euegat.exeC:\Windows\system32\euegat.exe 748 "C:\Windows\SysWOW64\rwjert.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2640 -
C:\Windows\SysWOW64\oxtrnw.exeC:\Windows\system32\oxtrnw.exe 932 "C:\Windows\SysWOW64\euegat.exe"61⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2976 -
C:\Windows\SysWOW64\bklhta.exeC:\Windows\system32\bklhta.exe 924 "C:\Windows\SysWOW64\oxtrnw.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2272 -
C:\Windows\SysWOW64\oifjci.exeC:\Windows\system32\oifjci.exe 936 "C:\Windows\SysWOW64\bklhta.exe"63⤵
- Executes dropped EXE
PID:604 -
C:\Windows\SysWOW64\ylvuxl.exeC:\Windows\system32\ylvuxl.exe 940 "C:\Windows\SysWOW64\oifjci.exe"64⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\ivsekh.exeC:\Windows\system32\ivsekh.exe 944 "C:\Windows\SysWOW64\ylvuxl.exe"65⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\vicuqk.exeC:\Windows\system32\vicuqk.exe 948 "C:\Windows\SysWOW64\ivsekh.exe"66⤵PID:2988
-
C:\Windows\SysWOW64\azewyt.exeC:\Windows\system32\azewyt.exe 956 "C:\Windows\SysWOW64\vicuqk.exe"67⤵PID:1864
-
C:\Windows\SysWOW64\jnxmwa.exeC:\Windows\system32\jnxmwa.exe 952 "C:\Windows\SysWOW64\azewyt.exe"68⤵
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\umjjhz.exeC:\Windows\system32\umjjhz.exe 960 "C:\Windows\SysWOW64\jnxmwa.exe"69⤵PID:2176
-
C:\Windows\SysWOW64\jqjele.exeC:\Windows\system32\jqjele.exe 964 "C:\Windows\SysWOW64\umjjhz.exe"70⤵PID:2588
-
C:\Windows\SysWOW64\tbhpyh.exeC:\Windows\system32\tbhpyh.exe 968 "C:\Windows\SysWOW64\jqjele.exe"71⤵PID:1880
-
C:\Windows\SysWOW64\dewzlk.exeC:\Windows\system32\dewzlk.exe 972 "C:\Windows\SysWOW64\tbhpyh.exe"72⤵PID:1560
-
C:\Windows\SysWOW64\qcrccs.exeC:\Windows\system32\qcrccs.exe 980 "C:\Windows\SysWOW64\dewzlk.exe"73⤵PID:1932
-
C:\Windows\SysWOW64\dpjrio.exeC:\Windows\system32\dpjrio.exe 976 "C:\Windows\SysWOW64\qcrccs.exe"74⤵PID:1960
-
C:\Windows\SysWOW64\naycvr.exeC:\Windows\system32\naycvr.exe 988 "C:\Windows\SysWOW64\dpjrio.exe"75⤵PID:1296
-
C:\Windows\SysWOW64\xcnmiu.exeC:\Windows\system32\xcnmiu.exe 920 "C:\Windows\SysWOW64\naycvr.exe"76⤵
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\SysWOW64\kpfcoy.exeC:\Windows\system32\kpfcoy.exe 996 "C:\Windows\SysWOW64\xcnmiu.exe"77⤵PID:1860
-
C:\Windows\SysWOW64\xoaffy.exeC:\Windows\system32\xoaffy.exe 992 "C:\Windows\SysWOW64\kpfcoy.exe"78⤵PID:2396
-
C:\Windows\SysWOW64\huacvg.exeC:\Windows\system32\huacvg.exe 1000 "C:\Windows\SysWOW64\xoaffy.exe"79⤵PID:2500
-
C:\Windows\SysWOW64\usvfdo.exeC:\Windows\system32\usvfdo.exe 1004 "C:\Windows\SysWOW64\huacvg.exe"80⤵PID:1216
-
C:\Windows\SysWOW64\eshcon.exeC:\Windows\system32\eshcon.exe 1008 "C:\Windows\SysWOW64\usvfdo.exe"81⤵PID:988
-
C:\Windows\SysWOW64\ricfwv.exeC:\Windows\system32\ricfwv.exe 1012 "C:\Windows\SysWOW64\eshcon.exe"82⤵
- Drops file in System32 directory
PID:952 -
C:\Windows\SysWOW64\dkiuqz.exeC:\Windows\system32\dkiuqz.exe 1016 "C:\Windows\SysWOW64\ricfwv.exe"83⤵PID:2384
-
C:\Windows\SysWOW64\rxakvd.exeC:\Windows\system32\rxakvd.exe 1020 "C:\Windows\SysWOW64\dkiuqz.exe"84⤵PID:2832
-
C:\Windows\SysWOW64\alsall.exeC:\Windows\system32\alsall.exe 984 "C:\Windows\SysWOW64\rxakvd.exe"85⤵
- Identifies Wine through registry keys
PID:2612 -
C:\Windows\SysWOW64\qqbupq.exeC:\Windows\system32\qqbupq.exe 1032 "C:\Windows\SysWOW64\alsall.exe"86⤵PID:2712
-
C:\Windows\SysWOW64\aaqfdt.exeC:\Windows\system32\aaqfdt.exe 1036 "C:\Windows\SysWOW64\qqbupq.exe"87⤵PID:2388
-
C:\Windows\SysWOW64\nrlilb.exeC:\Windows\system32\nrlilb.exe 896 "C:\Windows\SysWOW64\aaqfdt.exe"88⤵PID:2472
-
C:\Windows\SysWOW64\apokcb.exeC:\Windows\system32\apokcb.exe 1044 "C:\Windows\SysWOW64\nrlilb.exe"89⤵PID:624
-
C:\Windows\SysWOW64\kvoisj.exeC:\Windows\system32\kvoisj.exe 1040 "C:\Windows\SysWOW64\apokcb.exe"90⤵PID:2740
-
C:\Windows\SysWOW64\wujkbr.exeC:\Windows\system32\wujkbr.exe 1056 "C:\Windows\SysWOW64\kvoisj.exe"91⤵PID:880
-
C:\Windows\SysWOW64\jopsmv.exeC:\Windows\system32\jopsmv.exe 1052 "C:\Windows\SysWOW64\wujkbr.exe"92⤵PID:2608
-
C:\Windows\SysWOW64\wjhqsz.exeC:\Windows\system32\wjhqsz.exe 1060 "C:\Windows\SysWOW64\jopsmv.exe"93⤵PID:648
-
C:\Windows\SysWOW64\jzbkah.exeC:\Windows\system32\jzbkah.exe 1064 "C:\Windows\SysWOW64\wjhqsz.exe"94⤵PID:2092
-
C:\Windows\SysWOW64\tnciyp.exeC:\Windows\system32\tnciyp.exe 1072 "C:\Windows\SysWOW64\jzbkah.exe"95⤵PID:2020
-
C:\Windows\SysWOW64\gexkhp.exeC:\Windows\system32\gexkhp.exe 1068 "C:\Windows\SysWOW64\tnciyp.exe"96⤵PID:2912
-
C:\Windows\SysWOW64\tcsnqx.exeC:\Windows\system32\tcsnqx.exe 1080 "C:\Windows\SysWOW64\gexkhp.exe"97⤵
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\gtuqyf.exeC:\Windows\system32\gtuqyf.exe 1076 "C:\Windows\SysWOW64\tcsnqx.exe"98⤵PID:2848
-
C:\Windows\SysWOW64\tjpthg.exeC:\Windows\system32\tjpthg.exe 1084 "C:\Windows\SysWOW64\gtuqyf.exe"99⤵PID:2264
-
C:\Windows\SysWOW64\cxqqfn.exeC:\Windows\system32\cxqqfn.exe 1088 "C:\Windows\SysWOW64\tjpthg.exe"100⤵PID:1856
-
C:\Windows\SysWOW64\pkhglr.exeC:\Windows\system32\pkhglr.exe 1092 "C:\Windows\SysWOW64\cxqqfn.exe"101⤵PID:2440
-
C:\Windows\SysWOW64\cjcitz.exeC:\Windows\system32\cjcitz.exe 1104 "C:\Windows\SysWOW64\pkhglr.exe"102⤵PID:2220
-
C:\Windows\SysWOW64\mpdyjy.exeC:\Windows\system32\mpdyjy.exe 1100 "C:\Windows\SysWOW64\cjcitz.exe"103⤵PID:1788
-
C:\Windows\SysWOW64\znyash.exeC:\Windows\system32\znyash.exe 1096 "C:\Windows\SysWOW64\mpdyjy.exe"104⤵PID:1792
-
C:\Windows\SysWOW64\mapqyk.exeC:\Windows\system32\mapqyk.exe 1028 "C:\Windows\SysWOW64\znyash.exe"105⤵PID:3032
-
C:\Windows\SysWOW64\wpqnws.exeC:\Windows\system32\wpqnws.exe 1112 "C:\Windows\SysWOW64\mapqyk.exe"106⤵PID:2688
-
C:\Windows\SysWOW64\jflqes.exeC:\Windows\system32\jflqes.exe 1120 "C:\Windows\SysWOW64\wpqnws.exe"107⤵PID:2936
-
C:\Windows\SysWOW64\veftna.exeC:\Windows\system32\veftna.exe 1116 "C:\Windows\SysWOW64\jflqes.exe"108⤵
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\SysWOW64\iuiwwi.exeC:\Windows\system32\iuiwwi.exe 1128 "C:\Windows\SysWOW64\veftna.exe"109⤵
- Identifies Wine through registry keys
PID:2060 -
C:\Windows\SysWOW64\vkdyej.exeC:\Windows\system32\vkdyej.exe 1124 "C:\Windows\SysWOW64\iuiwwi.exe"110⤵PID:2144
-
C:\Windows\SysWOW64\fvsjzm.exeC:\Windows\system32\fvsjzm.exe 1132 "C:\Windows\SysWOW64\vkdyej.exe"111⤵
- Identifies Wine through registry keys
PID:1140 -
C:\Windows\SysWOW64\sxzqly.exeC:\Windows\system32\sxzqly.exe 1136 "C:\Windows\SysWOW64\fvsjzm.exe"112⤵PID:2068
-
C:\Windows\SysWOW64\fottty.exeC:\Windows\system32\fottty.exe 1144 "C:\Windows\SysWOW64\sxzqly.exe"113⤵PID:2768
-
C:\Windows\SysWOW64\sewwcg.exeC:\Windows\system32\sewwcg.exe 1140 "C:\Windows\SysWOW64\fottty.exe"114⤵
- Identifies Wine through registry keys
PID:2724 -
C:\Windows\SysWOW64\upmgpk.exeC:\Windows\system32\upmgpk.exe 1148 "C:\Windows\SysWOW64\sewwcg.exe"115⤵PID:2868
-
C:\Windows\SysWOW64\grswbw.exeC:\Windows\system32\grswbw.exe 1152 "C:\Windows\SysWOW64\upmgpk.exe"116⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\tejlgs.exeC:\Windows\system32\tejlgs.exe 1160 "C:\Windows\SysWOW64\grswbw.exe"117⤵PID:1468
-
C:\Windows\SysWOW64\gypbae.exeC:\Windows\system32\gypbae.exe 1156 "C:\Windows\SysWOW64\tejlgs.exe"118⤵PID:1608
-
C:\Windows\SysWOW64\twkein.exeC:\Windows\system32\twkein.exe 1176 "C:\Windows\SysWOW64\gypbae.exe"119⤵PID:1516
-
C:\Windows\SysWOW64\gnfyrn.exeC:\Windows\system32\gnfyrn.exe 1164 "C:\Windows\SysWOW64\twkein.exe"120⤵PID:2548
-
C:\Windows\SysWOW64\tlibav.exeC:\Windows\system32\tlibav.exe 1168 "C:\Windows\SysWOW64\gnfyrn.exe"121⤵PID:1724
-
C:\Windows\SysWOW64\fforlh.exeC:\Windows\system32\fforlh.exe 1172 "C:\Windows\SysWOW64\tlibav.exe"122⤵PID:3060
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-