Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 08:58
Static task
static1
Behavioral task
behavioral1
Sample
e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe
-
Size
196KB
-
MD5
e6779e752414de3c7e71508a1d563838
-
SHA1
4ed9ce093526268c6b2711b7561e64a630147a0e
-
SHA256
bf030221ad4286dcaf60fa0380e079ca5e1765585a26d82a36bd8f127d75b36b
-
SHA512
c1530c47d2fd7b82bab4a1f95851a24f31d4582ce728b7d017390bf17f5a448cb7e0ba46b2c017da72f7be64fdadea3c75c1eba9bd5310a1bce7e460f84686b3
-
SSDEEP
3072:jrbjo5Ia5p1KFQQfguhH4bKLdN7fNQKtLsQ2pSZdijFHzn5PBPCrOBcs8vnlKf19:HYv5yqYH4bKdN/tLsLpOuFTnjPuTJvAn
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2692 iksyjlvxr.exe 2716 vmyouqhye.exe 2744 kukwbhdvy.exe 2652 uiklrhqsf.exe 2684 hvcbflpwl.exe 1668 uxirqxbgz.exe 1912 eixbdahil.exe 352 rysemanpm.exe 1564 eljtsemua.exe 2428 owzenhswn.exe 780 yzooakyqa.exe 2288 iyamljgqa.exe 2376 ykbhpodkh.exe 1612 anqrcsreu.exe 984 kxnbxvxgg.exe 2576 uwrzitfgo.exe 2672 hnmbqccnh.exe 112 ulpezciui.exe 2696 gckhpkncj.exe 2060 rboeajvbj.exe 2400 ezrhirsjc.exe 2924 norwyqgfj.exe 2880 aemzhylmc.exe 1684 nvhcyhrbd.exe 2644 xfwmlkxvp.exe 2448 kwzptkddq.exe 2364 xuurcsakr.exe 2836 klpulagrk.exe 1976 xjsxtalgl.exe 1800 gpsuriydk.exe 1324 tonxaqwkl.exe 2944 geisjybrm.exe 2592 tdluryhye.exe 2180 gtgxagfgf.exe 2120 phguyoscf.exe 836 cybxgoxjf.exe 1372 poeapwdyg.exe 916 cnzcyeagz.exe 2304 mponlipau.exe 2380 zojptimhn.exe 880 jqyaplbjh.exe 2356 wpbvxtyqa.exe 2336 jfwxgtexb.exe 2984 weraobjfc.exe 2896 jutdxjpmv.exe 2940 sjuavruic.exe 2632 fzpderzpv.exe 2656 sykfmzffv.exe 1052 fomivhkmw.exe 2624 sfhleiitp.exe 2024 ctiaupvpw.exe 564 ojddcxbxp.exe 2116 bigftxgeq.exe 2712 oyaibfelr.exe 820 bxvlkojsk.exe 2072 ldwiavwpr.exe 3004 ybrljvcek.exe 2340 lstgrdall.exe 1652 vcjqmhofx.exe 1688 htetvhlmy.exe 2012 urgveprcz.exe 2020 hibymxxjs.exe 1960 mywbvxuqt.exe 1700 wjllqaikf.exe -
Loads dropped DLL 64 IoCs
pid Process 3016 e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe 3016 e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe 2692 iksyjlvxr.exe 2692 iksyjlvxr.exe 2716 vmyouqhye.exe 2716 vmyouqhye.exe 2744 kukwbhdvy.exe 2744 kukwbhdvy.exe 2652 uiklrhqsf.exe 2652 uiklrhqsf.exe 2684 hvcbflpwl.exe 2684 hvcbflpwl.exe 1668 uxirqxbgz.exe 1668 uxirqxbgz.exe 1912 eixbdahil.exe 1912 eixbdahil.exe 352 rysemanpm.exe 352 rysemanpm.exe 1564 eljtsemua.exe 1564 eljtsemua.exe 2428 owzenhswn.exe 2428 owzenhswn.exe 780 yzooakyqa.exe 780 yzooakyqa.exe 2288 iyamljgqa.exe 2288 iyamljgqa.exe 2376 ykbhpodkh.exe 2376 ykbhpodkh.exe 1612 anqrcsreu.exe 1612 anqrcsreu.exe 984 kxnbxvxgg.exe 984 kxnbxvxgg.exe 2576 uwrzitfgo.exe 2576 uwrzitfgo.exe 2672 hnmbqccnh.exe 2672 hnmbqccnh.exe 112 ulpezciui.exe 112 ulpezciui.exe 2696 gckhpkncj.exe 2696 gckhpkncj.exe 2060 rboeajvbj.exe 2060 rboeajvbj.exe 2400 ezrhirsjc.exe 2400 ezrhirsjc.exe 2924 norwyqgfj.exe 2924 norwyqgfj.exe 2880 aemzhylmc.exe 2880 aemzhylmc.exe 1684 nvhcyhrbd.exe 1684 nvhcyhrbd.exe 2644 xfwmlkxvp.exe 2644 xfwmlkxvp.exe 2448 kwzptkddq.exe 2448 kwzptkddq.exe 2364 xuurcsakr.exe 2364 xuurcsakr.exe 2836 klpulagrk.exe 2836 klpulagrk.exe 1976 xjsxtalgl.exe 1976 xjsxtalgl.exe 1800 gpsuriydk.exe 1800 gpsuriydk.exe 1324 tonxaqwkl.exe 1324 tonxaqwkl.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\ubkllblfl.exe kvkvncxje.exe File opened for modification C:\Windows\SysWOW64\kjkaipchd.exe ykqxzhxak.exe File opened for modification C:\Windows\SysWOW64\tjnwbyhic.exe glstsqjbb.exe File opened for modification C:\Windows\SysWOW64\celriofbv.exe tykbsgsew.exe File opened for modification C:\Windows\SysWOW64\wkivvicuz.exe jtftmaeng.exe File opened for modification C:\Windows\SysWOW64\vqqjejtak.exe izvgviwtk.exe File opened for modification C:\Windows\SysWOW64\ppzceqxsh.exe czwavqrlo.exe File opened for modification C:\Windows\SysWOW64\irbdrurze.exe vbgaiumsd.exe File opened for modification C:\Windows\SysWOW64\ahhcnnamh.exe nrezenveg.exe File opened for modification C:\Windows\SysWOW64\sdmxrfzdl.exe fejvixtwk.exe File created C:\Windows\SysWOW64\aafybsjta.exe qmeallwwa.exe File created C:\Windows\SysWOW64\ryhmtpaog.exe eiejkpvhf.exe File created C:\Windows\SysWOW64\mruxjccxu.exe zazubufqt.exe File opened for modification C:\Windows\SysWOW64\itepbwymy.exe vdbmsobfx.exe File created C:\Windows\SysWOW64\gnyykyafa.exe todvbyuyz.exe File created C:\Windows\SysWOW64\agrapbnby.exe nqwxhtpux.exe File created C:\Windows\SysWOW64\sswbfeyil.exe jewepwlmm.exe File opened for modification C:\Windows\SysWOW64\zomlfpmnp.exe myriwhogp.exe File opened for modification C:\Windows\SysWOW64\hzfotkqme.exe ubkllblfl.exe File opened for modification C:\Windows\SysWOW64\blaafkqdc.exe sfzkpcdhd.exe File opened for modification C:\Windows\SysWOW64\ojvcwsvkv.exe blaafkqdc.exe File created C:\Windows\SysWOW64\xfwmlkxvp.exe nvhcyhrbd.exe File created C:\Windows\SysWOW64\xpuzdalqa.exe krzwvsnih.exe File opened for modification C:\Windows\SysWOW64\exnjbuzkj.exe zhsgtmudq.exe File created C:\Windows\SysWOW64\nqptnactg.exe baureawmf.exe File opened for modification C:\Windows\SysWOW64\vzsqkryue.exe llrbuklyw.exe File created C:\Windows\SysWOW64\tqqrdttje.exe grnoulncm.exe File created C:\Windows\SysWOW64\ycrhpcpdk.exe mloegcjwr.exe File created C:\Windows\SysWOW64\igyiilvny.exe vivfzcxgx.exe File opened for modification C:\Windows\SysWOW64\lqqaebqvy.exe bcqdoudzz.exe File opened for modification C:\Windows\SysWOW64\blxlnklxd.exe omcrecoik.exe File opened for modification C:\Windows\SysWOW64\uwrzitfgo.exe kxnbxvxgg.exe File created C:\Windows\SysWOW64\cbvamcmjc.exe plsxechbb.exe File opened for modification C:\Windows\SysWOW64\qxhvuctih.exe dgmsdunbg.exe File opened for modification C:\Windows\SysWOW64\oprckrgpk.exe brxabjbij.exe File opened for modification C:\Windows\SysWOW64\tdluryhye.exe geisjybrm.exe File created C:\Windows\SysWOW64\ctiaupvpw.exe sfhleiitp.exe File opened for modification C:\Windows\SysWOW64\lgcbylatq.exe ypiypculp.exe File opened for modification C:\Windows\SysWOW64\swjmoumth.exe fypjfuhmo.exe File created C:\Windows\SysWOW64\ufxwtazqg.exe hodtlstjg.exe File created C:\Windows\SysWOW64\djkjnyqlt.exe qshgeqlea.exe File created C:\Windows\SysWOW64\favnuuvnu.exe scaklmqgc.exe File created C:\Windows\SysWOW64\winbqyihv.exe jktyiqcau.exe File created C:\Windows\SysWOW64\kukwbhdvy.exe vmyouqhye.exe File opened for modification C:\Windows\SysWOW64\mipecmwvq.exe ccpgmejzq.exe File created C:\Windows\SysWOW64\qzlgrnlal.exe diqeifgss.exe File created C:\Windows\SysWOW64\wqpfctzsu.exe jzukttulb.exe File created C:\Windows\SysWOW64\todvbyuyz.exe jicydrhba.exe File created C:\Windows\SysWOW64\sqkfyuasb.exe frhcpmulb.exe File created C:\Windows\SysWOW64\scaklmqgc.exe flfhdekzb.exe File opened for modification C:\Windows\SysWOW64\fhzgonmdr.exe sjedffooq.exe File opened for modification C:\Windows\SysWOW64\wsrttwrit.exe meqedpemu.exe File created C:\Windows\SysWOW64\wyjrhrmgh.exe jzoozigrg.exe File created C:\Windows\SysWOW64\dnmruoecs.exe rokolghvz.exe File created C:\Windows\SysWOW64\ltaxqyvjk.exe ycfvhyqbs.exe File created C:\Windows\SysWOW64\yokicebod.exe lyiftewhc.exe File opened for modification C:\Windows\SysWOW64\nwypzjeff.exe agwmragyf.exe File created C:\Windows\SysWOW64\udkulxxbk.exe heqscxsuj.exe File created C:\Windows\SysWOW64\yvwylkfrd.exe lwbvdbajd.exe File opened for modification C:\Windows\SysWOW64\dwqgtaggm.exe tqqrdttje.exe File created C:\Windows\SysWOW64\brxabjbij.exe oauxtjvbq.exe File opened for modification C:\Windows\SysWOW64\excpcxgwz.exe ryhmtpaog.exe File opened for modification C:\Windows\SysWOW64\kahxxidbi.exe ykmcoixui.exe File opened for modification C:\Windows\SysWOW64\zqauvkhlp.exe mrfsmjceo.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ygztmtccc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cotowyire.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kvebvroax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mzphzqjkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cqlfdtpxe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lkxumzwcp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hoaxlqxmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbgaiumsd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dshkbcjer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jgqkgqvhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlwqxuxyl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xctolntuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language excpcxgwz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfjcqsfqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmugvufhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjjobrpkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diqeifgss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnpuzmums.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjuavruic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jokhlbfhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziebpwwpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zfzrihfuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meqedpemu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language owpktkujt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aqpyxlguf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubkllblfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvpbzeztv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swyxmtlxq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language olvigmysg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rysemanpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iyamljgqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsrttwrit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atkleymgt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvjimszzb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plsxechbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ztxphpijb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkbrdkcmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language earogiqns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtgexyckv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wakgnziba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktrfunvpz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrneecveq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhksodieu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geisjybrm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eypldybgy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlvwfmmav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flfhdekzb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rigryuvfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bigftxgeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nljmhtgrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pyymoqcje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nfgqxusig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahhcnnamh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajrtgcdgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eiejkpvhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zvpfgkypa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sibicfphn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frreoewxm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brxabjbij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pabxnimen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcjqmhofx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyjrhrmgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcojyemjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ciyczntdq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2692 3016 e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2692 3016 e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2692 3016 e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe 30 PID 3016 wrote to memory of 2692 3016 e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2716 2692 iksyjlvxr.exe 31 PID 2692 wrote to memory of 2716 2692 iksyjlvxr.exe 31 PID 2692 wrote to memory of 2716 2692 iksyjlvxr.exe 31 PID 2692 wrote to memory of 2716 2692 iksyjlvxr.exe 31 PID 2716 wrote to memory of 2744 2716 vmyouqhye.exe 32 PID 2716 wrote to memory of 2744 2716 vmyouqhye.exe 32 PID 2716 wrote to memory of 2744 2716 vmyouqhye.exe 32 PID 2716 wrote to memory of 2744 2716 vmyouqhye.exe 32 PID 2744 wrote to memory of 2652 2744 kukwbhdvy.exe 33 PID 2744 wrote to memory of 2652 2744 kukwbhdvy.exe 33 PID 2744 wrote to memory of 2652 2744 kukwbhdvy.exe 33 PID 2744 wrote to memory of 2652 2744 kukwbhdvy.exe 33 PID 2652 wrote to memory of 2684 2652 uiklrhqsf.exe 34 PID 2652 wrote to memory of 2684 2652 uiklrhqsf.exe 34 PID 2652 wrote to memory of 2684 2652 uiklrhqsf.exe 34 PID 2652 wrote to memory of 2684 2652 uiklrhqsf.exe 34 PID 2684 wrote to memory of 1668 2684 hvcbflpwl.exe 35 PID 2684 wrote to memory of 1668 2684 hvcbflpwl.exe 35 PID 2684 wrote to memory of 1668 2684 hvcbflpwl.exe 35 PID 2684 wrote to memory of 1668 2684 hvcbflpwl.exe 35 PID 1668 wrote to memory of 1912 1668 uxirqxbgz.exe 36 PID 1668 wrote to memory of 1912 1668 uxirqxbgz.exe 36 PID 1668 wrote to memory of 1912 1668 uxirqxbgz.exe 36 PID 1668 wrote to memory of 1912 1668 uxirqxbgz.exe 36 PID 1912 wrote to memory of 352 1912 eixbdahil.exe 37 PID 1912 wrote to memory of 352 1912 eixbdahil.exe 37 PID 1912 wrote to memory of 352 1912 eixbdahil.exe 37 PID 1912 wrote to memory of 352 1912 eixbdahil.exe 37 PID 352 wrote to memory of 1564 352 rysemanpm.exe 38 PID 352 wrote to memory of 1564 352 rysemanpm.exe 38 PID 352 wrote to memory of 1564 352 rysemanpm.exe 38 PID 352 wrote to memory of 1564 352 rysemanpm.exe 38 PID 1564 wrote to memory of 2428 1564 eljtsemua.exe 39 PID 1564 wrote to memory of 2428 1564 eljtsemua.exe 39 PID 1564 wrote to memory of 2428 1564 eljtsemua.exe 39 PID 1564 wrote to memory of 2428 1564 eljtsemua.exe 39 PID 2428 wrote to memory of 780 2428 owzenhswn.exe 40 PID 2428 wrote to memory of 780 2428 owzenhswn.exe 40 PID 2428 wrote to memory of 780 2428 owzenhswn.exe 40 PID 2428 wrote to memory of 780 2428 owzenhswn.exe 40 PID 780 wrote to memory of 2288 780 yzooakyqa.exe 41 PID 780 wrote to memory of 2288 780 yzooakyqa.exe 41 PID 780 wrote to memory of 2288 780 yzooakyqa.exe 41 PID 780 wrote to memory of 2288 780 yzooakyqa.exe 41 PID 2288 wrote to memory of 2376 2288 iyamljgqa.exe 42 PID 2288 wrote to memory of 2376 2288 iyamljgqa.exe 42 PID 2288 wrote to memory of 2376 2288 iyamljgqa.exe 42 PID 2288 wrote to memory of 2376 2288 iyamljgqa.exe 42 PID 2376 wrote to memory of 1612 2376 ykbhpodkh.exe 43 PID 2376 wrote to memory of 1612 2376 ykbhpodkh.exe 43 PID 2376 wrote to memory of 1612 2376 ykbhpodkh.exe 43 PID 2376 wrote to memory of 1612 2376 ykbhpodkh.exe 43 PID 1612 wrote to memory of 984 1612 anqrcsreu.exe 44 PID 1612 wrote to memory of 984 1612 anqrcsreu.exe 44 PID 1612 wrote to memory of 984 1612 anqrcsreu.exe 44 PID 1612 wrote to memory of 984 1612 anqrcsreu.exe 44 PID 984 wrote to memory of 2576 984 kxnbxvxgg.exe 45 PID 984 wrote to memory of 2576 984 kxnbxvxgg.exe 45 PID 984 wrote to memory of 2576 984 kxnbxvxgg.exe 45 PID 984 wrote to memory of 2576 984 kxnbxvxgg.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\iksyjlvxr.exeC:\Windows\system32\iksyjlvxr.exe 480 "C:\Users\Admin\AppData\Local\Temp\e6779e752414de3c7e71508a1d563838_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\vmyouqhye.exeC:\Windows\system32\vmyouqhye.exe 548 "C:\Windows\SysWOW64\iksyjlvxr.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\kukwbhdvy.exeC:\Windows\system32\kukwbhdvy.exe 552 "C:\Windows\SysWOW64\vmyouqhye.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\uiklrhqsf.exeC:\Windows\system32\uiklrhqsf.exe 556 "C:\Windows\SysWOW64\kukwbhdvy.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\hvcbflpwl.exeC:\Windows\system32\hvcbflpwl.exe 560 "C:\Windows\SysWOW64\uiklrhqsf.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\uxirqxbgz.exeC:\Windows\system32\uxirqxbgz.exe 564 "C:\Windows\SysWOW64\hvcbflpwl.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\eixbdahil.exeC:\Windows\system32\eixbdahil.exe 568 "C:\Windows\SysWOW64\uxirqxbgz.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\rysemanpm.exeC:\Windows\system32\rysemanpm.exe 572 "C:\Windows\SysWOW64\eixbdahil.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\eljtsemua.exeC:\Windows\system32\eljtsemua.exe 576 "C:\Windows\SysWOW64\rysemanpm.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\owzenhswn.exeC:\Windows\system32\owzenhswn.exe 580 "C:\Windows\SysWOW64\eljtsemua.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\yzooakyqa.exeC:\Windows\system32\yzooakyqa.exe 596 "C:\Windows\SysWOW64\owzenhswn.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\iyamljgqa.exeC:\Windows\system32\iyamljgqa.exe 584 "C:\Windows\SysWOW64\yzooakyqa.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\ykbhpodkh.exeC:\Windows\system32\ykbhpodkh.exe 608 "C:\Windows\SysWOW64\iyamljgqa.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\anqrcsreu.exeC:\Windows\system32\anqrcsreu.exe 588 "C:\Windows\SysWOW64\ykbhpodkh.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\kxnbxvxgg.exeC:\Windows\system32\kxnbxvxgg.exe 592 "C:\Windows\SysWOW64\anqrcsreu.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\uwrzitfgo.exeC:\Windows\system32\uwrzitfgo.exe 600 "C:\Windows\SysWOW64\kxnbxvxgg.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2576 -
C:\Windows\SysWOW64\hnmbqccnh.exeC:\Windows\system32\hnmbqccnh.exe 620 "C:\Windows\SysWOW64\uwrzitfgo.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2672 -
C:\Windows\SysWOW64\ulpezciui.exeC:\Windows\system32\ulpezciui.exe 604 "C:\Windows\SysWOW64\hnmbqccnh.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:112 -
C:\Windows\SysWOW64\gckhpkncj.exeC:\Windows\system32\gckhpkncj.exe 628 "C:\Windows\SysWOW64\ulpezciui.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2696 -
C:\Windows\SysWOW64\rboeajvbj.exeC:\Windows\system32\rboeajvbj.exe 612 "C:\Windows\SysWOW64\gckhpkncj.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2060 -
C:\Windows\SysWOW64\ezrhirsjc.exeC:\Windows\system32\ezrhirsjc.exe 616 "C:\Windows\SysWOW64\rboeajvbj.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400 -
C:\Windows\SysWOW64\norwyqgfj.exeC:\Windows\system32\norwyqgfj.exe 624 "C:\Windows\SysWOW64\ezrhirsjc.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924 -
C:\Windows\SysWOW64\aemzhylmc.exeC:\Windows\system32\aemzhylmc.exe 632 "C:\Windows\SysWOW64\norwyqgfj.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2880 -
C:\Windows\SysWOW64\nvhcyhrbd.exeC:\Windows\system32\nvhcyhrbd.exe 636 "C:\Windows\SysWOW64\aemzhylmc.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1684 -
C:\Windows\SysWOW64\xfwmlkxvp.exeC:\Windows\system32\xfwmlkxvp.exe 640 "C:\Windows\SysWOW64\nvhcyhrbd.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644 -
C:\Windows\SysWOW64\kwzptkddq.exeC:\Windows\system32\kwzptkddq.exe 644 "C:\Windows\SysWOW64\xfwmlkxvp.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2448 -
C:\Windows\SysWOW64\xuurcsakr.exeC:\Windows\system32\xuurcsakr.exe 648 "C:\Windows\SysWOW64\kwzptkddq.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2364 -
C:\Windows\SysWOW64\klpulagrk.exeC:\Windows\system32\klpulagrk.exe 652 "C:\Windows\SysWOW64\xuurcsakr.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2836 -
C:\Windows\SysWOW64\xjsxtalgl.exeC:\Windows\system32\xjsxtalgl.exe 664 "C:\Windows\SysWOW64\klpulagrk.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976 -
C:\Windows\SysWOW64\gpsuriydk.exeC:\Windows\system32\gpsuriydk.exe 656 "C:\Windows\SysWOW64\xjsxtalgl.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800 -
C:\Windows\SysWOW64\tonxaqwkl.exeC:\Windows\system32\tonxaqwkl.exe 660 "C:\Windows\SysWOW64\gpsuriydk.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1324 -
C:\Windows\SysWOW64\geisjybrm.exeC:\Windows\system32\geisjybrm.exe 668 "C:\Windows\SysWOW64\tonxaqwkl.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\tdluryhye.exeC:\Windows\system32\tdluryhye.exe 676 "C:\Windows\SysWOW64\geisjybrm.exe"34⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\gtgxagfgf.exeC:\Windows\system32\gtgxagfgf.exe 672 "C:\Windows\SysWOW64\tdluryhye.exe"35⤵
- Executes dropped EXE
PID:2180 -
C:\Windows\SysWOW64\phguyoscf.exeC:\Windows\system32\phguyoscf.exe 680 "C:\Windows\SysWOW64\gtgxagfgf.exe"36⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\cybxgoxjf.exeC:\Windows\system32\cybxgoxjf.exe 684 "C:\Windows\SysWOW64\phguyoscf.exe"37⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\poeapwdyg.exeC:\Windows\system32\poeapwdyg.exe 696 "C:\Windows\SysWOW64\cybxgoxjf.exe"38⤵
- Executes dropped EXE
PID:1372 -
C:\Windows\SysWOW64\cnzcyeagz.exeC:\Windows\system32\cnzcyeagz.exe 688 "C:\Windows\SysWOW64\poeapwdyg.exe"39⤵
- Executes dropped EXE
PID:916 -
C:\Windows\SysWOW64\mponlipau.exeC:\Windows\system32\mponlipau.exe 700 "C:\Windows\SysWOW64\cnzcyeagz.exe"40⤵
- Executes dropped EXE
PID:2304 -
C:\Windows\SysWOW64\zojptimhn.exeC:\Windows\system32\zojptimhn.exe 692 "C:\Windows\SysWOW64\mponlipau.exe"41⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\jqyaplbjh.exeC:\Windows\system32\jqyaplbjh.exe 720 "C:\Windows\SysWOW64\zojptimhn.exe"42⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\wpbvxtyqa.exeC:\Windows\system32\wpbvxtyqa.exe 704 "C:\Windows\SysWOW64\jqyaplbjh.exe"43⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\jfwxgtexb.exeC:\Windows\system32\jfwxgtexb.exe 712 "C:\Windows\SysWOW64\wpbvxtyqa.exe"44⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\weraobjfc.exeC:\Windows\system32\weraobjfc.exe 708 "C:\Windows\SysWOW64\jfwxgtexb.exe"45⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\jutdxjpmv.exeC:\Windows\system32\jutdxjpmv.exe 716 "C:\Windows\SysWOW64\weraobjfc.exe"46⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\sjuavruic.exeC:\Windows\system32\sjuavruic.exe 724 "C:\Windows\SysWOW64\jutdxjpmv.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\fzpderzpv.exeC:\Windows\system32\fzpderzpv.exe 744 "C:\Windows\SysWOW64\sjuavruic.exe"48⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\sykfmzffv.exeC:\Windows\system32\sykfmzffv.exe 728 "C:\Windows\SysWOW64\fzpderzpv.exe"49⤵
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\fomivhkmw.exeC:\Windows\system32\fomivhkmw.exe 736 "C:\Windows\SysWOW64\sykfmzffv.exe"50⤵
- Executes dropped EXE
PID:1052 -
C:\Windows\SysWOW64\sfhleiitp.exeC:\Windows\system32\sfhleiitp.exe 732 "C:\Windows\SysWOW64\fomivhkmw.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2624 -
C:\Windows\SysWOW64\ctiaupvpw.exeC:\Windows\system32\ctiaupvpw.exe 740 "C:\Windows\SysWOW64\sfhleiitp.exe"52⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\ojddcxbxp.exeC:\Windows\system32\ojddcxbxp.exe 748 "C:\Windows\SysWOW64\ctiaupvpw.exe"53⤵
- Executes dropped EXE
PID:564 -
C:\Windows\SysWOW64\bigftxgeq.exeC:\Windows\system32\bigftxgeq.exe 764 "C:\Windows\SysWOW64\ojddcxbxp.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\oyaibfelr.exeC:\Windows\system32\oyaibfelr.exe 752 "C:\Windows\SysWOW64\bigftxgeq.exe"55⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\bxvlkojsk.exeC:\Windows\system32\bxvlkojsk.exe 756 "C:\Windows\SysWOW64\oyaibfelr.exe"56⤵
- Executes dropped EXE
PID:820 -
C:\Windows\SysWOW64\ldwiavwpr.exeC:\Windows\system32\ldwiavwpr.exe 760 "C:\Windows\SysWOW64\bxvlkojsk.exe"57⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\ybrljvcek.exeC:\Windows\system32\ybrljvcek.exe 768 "C:\Windows\SysWOW64\ldwiavwpr.exe"58⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\lstgrdall.exeC:\Windows\system32\lstgrdall.exe 772 "C:\Windows\SysWOW64\ybrljvcek.exe"59⤵
- Executes dropped EXE
PID:2340 -
C:\Windows\SysWOW64\vcjqmhofx.exeC:\Windows\system32\vcjqmhofx.exe 776 "C:\Windows\SysWOW64\lstgrdall.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Windows\SysWOW64\htetvhlmy.exeC:\Windows\system32\htetvhlmy.exe 780 "C:\Windows\SysWOW64\vcjqmhofx.exe"61⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\urgveprcz.exeC:\Windows\system32\urgveprcz.exe 788 "C:\Windows\SysWOW64\htetvhlmy.exe"62⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\hibymxxjs.exeC:\Windows\system32\hibymxxjs.exe 784 "C:\Windows\SysWOW64\urgveprcz.exe"63⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\mywbvxuqt.exeC:\Windows\system32\mywbvxuqt.exe 808 "C:\Windows\SysWOW64\hibymxxjs.exe"64⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\wjllqaikf.exeC:\Windows\system32\wjllqaikf.exe 792 "C:\Windows\SysWOW64\mywbvxuqt.exe"65⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\jzoozigrg.exeC:\Windows\system32\jzoozigrg.exe 800 "C:\Windows\SysWOW64\wjllqaikf.exe"66⤵
- Drops file in System32 directory
PID:1820 -
C:\Windows\SysWOW64\wyjrhrmgh.exeC:\Windows\system32\wyjrhrmgh.exe 804 "C:\Windows\SysWOW64\jzoozigrg.exe"67⤵
- System Location Discovery: System Language Discovery
PID:804 -
C:\Windows\SysWOW64\gekoxyzdg.exeC:\Windows\system32\gekoxyzdg.exe 812 "C:\Windows\SysWOW64\wyjrhrmgh.exe"68⤵PID:2776
-
C:\Windows\SysWOW64\scejgyekh.exeC:\Windows\system32\scejgyekh.exe 820 "C:\Windows\SysWOW64\gekoxyzdg.exe"69⤵PID:2740
-
C:\Windows\SysWOW64\fthlpgcra.exeC:\Windows\system32\fthlpgcra.exe 816 "C:\Windows\SysWOW64\scejgyekh.exe"70⤵PID:2664
-
C:\Windows\SysWOW64\srcoxphzb.exeC:\Windows\system32\srcoxphzb.exe 796 "C:\Windows\SysWOW64\fthlpgcra.exe"71⤵PID:3060
-
C:\Windows\SysWOW64\fixropngb.exeC:\Windows\system32\fixropngb.exe 832 "C:\Windows\SysWOW64\srcoxphzb.exe"72⤵PID:672
-
C:\Windows\SysWOW64\pwxoewacb.exeC:\Windows\system32\pwxoewacb.exe 824 "C:\Windows\SysWOW64\fixropngb.exe"73⤵PID:2572
-
C:\Windows\SysWOW64\cnsrmeyjb.exeC:\Windows\system32\cnsrmeyjb.exe 840 "C:\Windows\SysWOW64\pwxoewacb.exe"74⤵PID:1904
-
C:\Windows\SysWOW64\plvtvedru.exeC:\Windows\system32\plvtvedru.exe 828 "C:\Windows\SysWOW64\cnsrmeyjb.exe"75⤵PID:1432
-
C:\Windows\SysWOW64\ccqwenjgv.exeC:\Windows\system32\ccqwenjgv.exe 844 "C:\Windows\SysWOW64\plvtvedru.exe"76⤵PID:1176
-
C:\Windows\SysWOW64\oalzmvgnw.exeC:\Windows\system32\oalzmvgnw.exe 836 "C:\Windows\SysWOW64\ccqwenjgv.exe"77⤵PID:1764
-
C:\Windows\SysWOW64\yglokutjv.exeC:\Windows\system32\yglokutjv.exe 856 "C:\Windows\SysWOW64\oalzmvgnw.exe"78⤵PID:396
-
C:\Windows\SysWOW64\lfortczrw.exeC:\Windows\system32\lfortczrw.exe 848 "C:\Windows\SysWOW64\yglokutjv.exe"79⤵PID:936
-
C:\Windows\SysWOW64\yvjubleyp.exeC:\Windows\system32\yvjubleyp.exe 852 "C:\Windows\SysWOW64\lfortczrw.exe"80⤵PID:2800
-
C:\Windows\SysWOW64\luewklcfq.exeC:\Windows\system32\luewklcfq.exe 860 "C:\Windows\SysWOW64\yvjubleyp.exe"81⤵PID:2096
-
C:\Windows\SysWOW64\ykhztthmr.exeC:\Windows\system32\ykhztthmr.exe 876 "C:\Windows\SysWOW64\luewklcfq.exe"82⤵PID:888
-
C:\Windows\SysWOW64\hyzwravjq.exeC:\Windows\system32\hyzwravjq.exe 864 "C:\Windows\SysWOW64\ykhztthmr.exe"83⤵PID:3048
-
C:\Windows\SysWOW64\upczzjaqr.exeC:\Windows\system32\upczzjaqr.exe 868 "C:\Windows\SysWOW64\hyzwravjq.exe"84⤵PID:2404
-
C:\Windows\SysWOW64\hnxuijyfj.exeC:\Windows\system32\hnxuijyfj.exe 872 "C:\Windows\SysWOW64\upczzjaqr.exe"85⤵PID:1776
-
C:\Windows\SysWOW64\ueswrrdmk.exeC:\Windows\system32\ueswrrdmk.exe 888 "C:\Windows\SysWOW64\hnxuijyfj.exe"86⤵PID:1836
-
C:\Windows\SysWOW64\huuzzzjul.exeC:\Windows\system32\huuzzzjul.exe 892 "C:\Windows\SysWOW64\ueswrrdmk.exe"87⤵PID:2736
-
C:\Windows\SysWOW64\rivwpywqk.exeC:\Windows\system32\rivwpywqk.exe 896 "C:\Windows\SysWOW64\huuzzzjul.exe"88⤵PID:2952
-
C:\Windows\SysWOW64\ezqzghtxl.exeC:\Windows\system32\ezqzghtxl.exe 912 "C:\Windows\SysWOW64\rivwpywqk.exe"89⤵PID:2892
-
C:\Windows\SysWOW64\rxlcopzee.exeC:\Windows\system32\rxlcopzee.exe 880 "C:\Windows\SysWOW64\ezqzghtxl.exe"90⤵PID:1620
-
C:\Windows\SysWOW64\donexpfmf.exeC:\Windows\system32\donexpfmf.exe 900 "C:\Windows\SysWOW64\rxlcopzee.exe"91⤵PID:2676
-
C:\Windows\SysWOW64\qmihgxktg.exeC:\Windows\system32\qmihgxktg.exe 904 "C:\Windows\SysWOW64\donexpfmf.exe"92⤵PID:2460
-
C:\Windows\SysWOW64\asjxwfppf.exeC:\Windows\system32\asjxwfppf.exe 908 "C:\Windows\SysWOW64\qmihgxktg.exe"93⤵PID:2852
-
C:\Windows\SysWOW64\nrezenveg.exeC:\Windows\system32\nrezenveg.exe 884 "C:\Windows\SysWOW64\asjxwfppf.exe"94⤵
- Drops file in System32 directory
PID:3000 -
C:\Windows\SysWOW64\ahhcnnamh.exeC:\Windows\system32\ahhcnnamh.exe 916 "C:\Windows\SysWOW64\nrezenveg.exe"95⤵
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\ngbfdvgtz.exeC:\Windows\system32\ngbfdvgtz.exe 928 "C:\Windows\SysWOW64\ahhcnnamh.exe"96⤵PID:2108
-
C:\Windows\SysWOW64\awwhmddaa.exeC:\Windows\system32\awwhmddaa.exe 932 "C:\Windows\SysWOW64\ngbfdvgtz.exe"97⤵PID:1392
-
C:\Windows\SysWOW64\jkxfcdrxz.exeC:\Windows\system32\jkxfcdrxz.exe 920 "C:\Windows\SysWOW64\awwhmddaa.exe"98⤵PID:336
-
C:\Windows\SysWOW64\wbshllwea.exeC:\Windows\system32\wbshllwea.exe 924 "C:\Windows\SysWOW64\jkxfcdrxz.exe"99⤵PID:1348
-
C:\Windows\SysWOW64\jzukttulb.exeC:\Windows\system32\jzukttulb.exe 936 "C:\Windows\SysWOW64\wbshllwea.exe"100⤵
- Drops file in System32 directory
PID:1340 -
C:\Windows\SysWOW64\wqpfctzsu.exeC:\Windows\system32\wqpfctzsu.exe 948 "C:\Windows\SysWOW64\jzukttulb.exe"101⤵PID:2484
-
C:\Windows\SysWOW64\jokhlbfhv.exeC:\Windows\system32\jokhlbfhv.exe 944 "C:\Windows\SysWOW64\wqpfctzsu.exe"102⤵
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\tvlfjjseu.exeC:\Windows\system32\tvlfjjseu.exe 956 "C:\Windows\SysWOW64\jokhlbfhv.exe"103⤵PID:2908
-
C:\Windows\SysWOW64\gicuonrji.exeC:\Windows\system32\gicuonrji.exe 940 "C:\Windows\SysWOW64\tvlfjjseu.exe"104⤵PID:2520
-
C:\Windows\SysWOW64\tgxxxnwqj.exeC:\Windows\system32\tgxxxnwqj.exe 952 "C:\Windows\SysWOW64\gicuonrji.exe"105⤵PID:2608
-
C:\Windows\SysWOW64\cuyvnubmi.exeC:\Windows\system32\cuyvnubmi.exe 960 "C:\Windows\SysWOW64\tgxxxnwqj.exe"106⤵PID:3052
-
C:\Windows\SysWOW64\plsxechbb.exeC:\Windows\system32\plsxechbb.exe 980 "C:\Windows\SysWOW64\cuyvnubmi.exe"107⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\cbvamcmjc.exeC:\Windows\system32\cbvamcmjc.exe 964 "C:\Windows\SysWOW64\plsxechbb.exe"108⤵PID:2148
-
C:\Windows\SysWOW64\paqdvlsqd.exeC:\Windows\system32\paqdvlsqd.exe 988 "C:\Windows\SysWOW64\cbvamcmjc.exe"109⤵PID:3068
-
C:\Windows\SysWOW64\cqlfdtpxe.exeC:\Windows\system32\cqlfdtpxe.exe 968 "C:\Windows\SysWOW64\paqdvlsqd.exe"110⤵
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\memvtadud.exeC:\Windows\system32\memvtadud.exe 972 "C:\Windows\SysWOW64\cqlfdtpxe.exe"111⤵PID:1908
-
C:\Windows\SysWOW64\zvoxcaibe.exeC:\Windows\system32\zvoxcaibe.exe 976 "C:\Windows\SysWOW64\memvtadud.exe"112⤵PID:2240
-
C:\Windows\SysWOW64\dtjaljoiw.exeC:\Windows\system32\dtjaljoiw.exe 996 "C:\Windows\SysWOW64\zvoxcaibe.exe"113⤵PID:700
-
C:\Windows\SysWOW64\rgbqymmvl.exeC:\Windows\system32\rgbqymmvl.exe 984 "C:\Windows\SysWOW64\dtjaljoiw.exe"114⤵PID:1852
-
C:\Windows\SysWOW64\autnpuark.exeC:\Windows\system32\autnpuark.exe 1004 "C:\Windows\SysWOW64\rgbqymmvl.exe"115⤵PID:2084
-
C:\Windows\SysWOW64\nlwqxuxyl.exeC:\Windows\system32\nlwqxuxyl.exe 992 "C:\Windows\SysWOW64\autnpuark.exe"116⤵
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\ajrtgcdgm.exeC:\Windows\system32\ajrtgcdgm.exe 1000 "C:\Windows\SysWOW64\nlwqxuxyl.exe"117⤵
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\namvokine.exeC:\Windows\system32\namvokine.exe 1016 "C:\Windows\SysWOW64\ajrtgcdgm.exe"118⤵PID:1272
-
C:\Windows\SysWOW64\aqpyxlguf.exeC:\Windows\system32\aqpyxlguf.exe 1020 "C:\Windows\SysWOW64\namvokine.exe"119⤵
- System Location Discovery: System Language Discovery
PID:1584 -
C:\Windows\SysWOW64\kepnvstqf.exeC:\Windows\system32\kepnvstqf.exe 1012 "C:\Windows\SysWOW64\aqpyxlguf.exe"120⤵PID:2968
-
C:\Windows\SysWOW64\wvkqeaygf.exeC:\Windows\system32\wvkqeaygf.exe 1008 "C:\Windows\SysWOW64\kepnvstqf.exe"121⤵PID:1856
-
C:\Windows\SysWOW64\jtftmaeng.exeC:\Windows\system32\jtftmaeng.exe 1028 "C:\Windows\SysWOW64\wvkqeaygf.exe"122⤵
- Drops file in System32 directory
PID:2260
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-