Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 18:13
Static task
static1
Behavioral task
behavioral1
Sample
f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe
-
Size
272KB
-
MD5
f2d8d3ef1d5623bdfa9a0eebd4fc2266
-
SHA1
1a86274d2db5433939ed092da2aa9061b81f4d70
-
SHA256
d8d98aca37ca3d943cc7514a7977c3323eeecceb9e7b12015f2932dba3cd6eab
-
SHA512
189d3760dd2cc2521423bd3c1d7ce80a9160efbf50239a32dde000b6ee5725735f5e8bae581ab800ddd00211c3e13838b3fb40ae2d4fb5805f7126c55528de4a
-
SSDEEP
6144:d/H+8pmvtzHm48oilMAOSf0XFdkzR9CnPYlt8:dv+Ym1Y0AOSfaeR0nwf8
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2100 ldampse.exe 2224 aaimcsf.exe 2692 nydpksl.exe 2920 vdnuclo.exe 2600 fcrrmkv.exe 2636 aevpkju.exe 2908 hmjpegd.exe 1144 uraktpo.exe 2924 zpfagqn.exe 1780 rphkuwt.exe 740 wqpfctz.exe 948 obdfkqa.exe 296 qarvivn.exe 2084 jhtanop.exe 1708 npqvjca.exe 292 aosxrky.exe 860 cnzfphl.exe 1680 agtilxi.exe 788 bfhxjbv.exe 2772 uqvprzd.exe 2832 byiqdof.exe 2596 uthifda.exe 2728 qkedbrl.exe 2836 gdbqdfo.exe 2312 nlwqxux.exe 1736 dbiqemb.exe 2120 namvoki.exe 1920 uhhnjas.exe 2380 fhlltzr.exe 340 rfonczx.exe 2468 zqntzaf.exe 2148 lhivhbl.exe 1952 wciopvl.exe 2440 lwfbyrw.exe 3056 vgvlumc.exe 1624 iabbfzg.exe 3000 vvsqlcf.exe 2056 imnttll.exe 2252 slzrebs.exe 1576 czsocjf.exe 1580 ppvjlrd.exe 2708 copltzj.exe 2768 lrfwgup.exe 784 ypiypcu.exe 2644 jomwhbc.exe 1108 vfhyqjh.exe 2936 gmteaih.exe 1308 sgzmmnt.exe 1372 feuouvr.exe 1688 svorddw.exe 1516 flruudc.exe 1964 pzsrklp.exe 2608 cynustn.exe 540 oohobts.exe 2524 bfkrjby.exe 836 odfusjv.exe 2444 ycjrkid.exe 1728 lephwmh.exe 2420 yvskfvn.exe 2152 ijthvca.exe 2648 vznkdkf.exe 2784 hyimukd.exe 2432 uolpctj.exe 2700 hngklbo.exe -
Loads dropped DLL 64 IoCs
pid Process 2228 f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe 2228 f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe 2100 ldampse.exe 2100 ldampse.exe 2224 aaimcsf.exe 2224 aaimcsf.exe 2692 nydpksl.exe 2692 nydpksl.exe 2920 vdnuclo.exe 2920 vdnuclo.exe 2600 fcrrmkv.exe 2600 fcrrmkv.exe 2636 aevpkju.exe 2636 aevpkju.exe 2908 hmjpegd.exe 2908 hmjpegd.exe 1144 uraktpo.exe 1144 uraktpo.exe 2924 zpfagqn.exe 2924 zpfagqn.exe 1780 rphkuwt.exe 1780 rphkuwt.exe 740 wqpfctz.exe 740 wqpfctz.exe 948 obdfkqa.exe 948 obdfkqa.exe 296 qarvivn.exe 296 qarvivn.exe 2084 jhtanop.exe 2084 jhtanop.exe 1708 npqvjca.exe 1708 npqvjca.exe 292 aosxrky.exe 292 aosxrky.exe 860 cnzfphl.exe 860 cnzfphl.exe 1680 agtilxi.exe 1680 agtilxi.exe 788 bfhxjbv.exe 788 bfhxjbv.exe 2772 uqvprzd.exe 2772 uqvprzd.exe 2832 byiqdof.exe 2832 byiqdof.exe 2596 uthifda.exe 2596 uthifda.exe 2728 qkedbrl.exe 2728 qkedbrl.exe 2836 gdbqdfo.exe 2836 gdbqdfo.exe 2312 nlwqxux.exe 2312 nlwqxux.exe 1736 dbiqemb.exe 1736 dbiqemb.exe 2120 namvoki.exe 2120 namvoki.exe 1920 uhhnjas.exe 1920 uhhnjas.exe 2380 fhlltzr.exe 2380 fhlltzr.exe 340 rfonczx.exe 340 rfonczx.exe 2468 zqntzaf.exe 2468 zqntzaf.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\ukowfyo.exe-up.txt ukowfyo.exe File created C:\Windows\SysWOW64\ngmmggv.exe dsloqhi.exe File created C:\Windows\SysWOW64\zaegoig.exe myyqdvb.exe File created C:\Windows\SysWOW64\emwgmop.exe-up.txt emwgmop.exe File created C:\Windows\SysWOW64\lwfbyrw.exe wciopvl.exe File created C:\Windows\SysWOW64\dtmeltt.exe qcrccso.exe File created C:\Windows\SysWOW64\zijiwlo.exe pjekmmh.exe File created C:\Windows\SysWOW64\mjilmnq.exe-up.txt mjilmnq.exe File opened for modification C:\Windows\SysWOW64\imnttll.exe vvsqlcf.exe File created C:\Windows\SysWOW64\xhsdoxp.exe-up.txt xhsdoxp.exe File opened for modification C:\Windows\SysWOW64\nvafcpn.exe zijiwlo.exe File created C:\Windows\SysWOW64\atoqaoi.exe-up.txt atoqaoi.exe File created C:\Windows\SysWOW64\blzlxlc.exe onwiodf.exe File created C:\Windows\SysWOW64\njyedsa.exe-up.txt njyedsa.exe File opened for modification C:\Windows\SysWOW64\blguezq.exe oyoeywr.exe File created C:\Windows\SysWOW64\vdvtvlm.exe inaqnlg.exe File created C:\Windows\SysWOW64\wrskeda.exe mdsnovn.exe File created C:\Windows\SysWOW64\pjekmmh.exe dhydaad.exe File opened for modification C:\Windows\SysWOW64\gpywuac.exe tqvtlsf.exe File created C:\Windows\SysWOW64\xszmdvw.exe nhkcqsq.exe File created C:\Windows\SysWOW64\jomwhbc.exe ypiypcu.exe File opened for modification C:\Windows\SysWOW64\riaqhvm.exe esgozng.exe File created C:\Windows\SysWOW64\ebwcvgi.exe-up.txt ebwcvgi.exe File created C:\Windows\SysWOW64\oecdsii.exe-up.txt oecdsii.exe File created C:\Windows\SysWOW64\iisnexh.exe uvbqybb.exe File created C:\Windows\SysWOW64\ejdsait.exe rsiyrao.exe File opened for modification C:\Windows\SysWOW64\yvjzwdy.exe iqbespb.exe File created C:\Windows\SysWOW64\urhsadc.exe-up.txt urhsadc.exe File opened for modification C:\Windows\SysWOW64\qqwttvg.exe hcdwvnt.exe File opened for modification C:\Windows\SysWOW64\wpeyasx.exe mnpnnpr.exe File created C:\Windows\SysWOW64\uniudon.exe-up.txt uniudon.exe File opened for modification C:\Windows\SysWOW64\pmxajmf.exe cznkeig.exe File created C:\Windows\SysWOW64\bnlnznu.exe-up.txt bnlnznu.exe File created C:\Windows\SysWOW64\yhrhuhn.exe-up.txt yhrhuhn.exe File created C:\Windows\SysWOW64\nykxrhy.exe alsallz.exe File created C:\Windows\SysWOW64\lrlvjlk.exe ybisadf.exe File created C:\Windows\SysWOW64\fzshhwa.exe-up.txt fzshhwa.exe File opened for modification C:\Windows\SysWOW64\qcasfce.exe dlfpouz.exe File created C:\Windows\SysWOW64\pyrxtop.exe-up.txt pyrxtop.exe File created C:\Windows\SysWOW64\icfcexz.exe-up.txt icfcexz.exe File created C:\Windows\SysWOW64\cdhxusm.exe-up.txt cdhxusm.exe File created C:\Windows\SysWOW64\xlrednn.exe vicuqkz.exe File created C:\Windows\SysWOW64\tauuorr.exe gyondfn.exe File opened for modification C:\Windows\SysWOW64\alemoxe.exe njyedsa.exe File opened for modification C:\Windows\SysWOW64\gmadtmo.exe toxakej.exe File created C:\Windows\SysWOW64\ugtliuv.exe-up.txt ugtliuv.exe File opened for modification C:\Windows\SysWOW64\ebtmdea.exe rdyjuwv.exe File opened for modification C:\Windows\SysWOW64\jomwhbc.exe ypiypcu.exe File created C:\Windows\SysWOW64\esbkkiz.exe-up.txt esbkkiz.exe File opened for modification C:\Windows\SysWOW64\tuwrfcn.exe gebowuh.exe File opened for modification C:\Windows\SysWOW64\mdsnovn.exe zfpkfvh.exe File opened for modification C:\Windows\SysWOW64\cyohhwr.exe swyxmtl.exe File created C:\Windows\SysWOW64\aaimcsf.exe ldampse.exe File created C:\Windows\SysWOW64\piafuiv.exe csfclap.exe File created C:\Windows\SysWOW64\tbifbrs.exe gknctrn.exe File created C:\Windows\SysWOW64\xxfcaoa.exe-up.txt xxfcaoa.exe File created C:\Windows\SysWOW64\vwtesgj.exe ifzbjge.exe File created C:\Windows\SysWOW64\sapezwc.exe-up.txt sapezwc.exe File created C:\Windows\SysWOW64\lrpkqsd.exe bdomzlq.exe File opened for modification C:\Windows\SysWOW64\lrpkqsd.exe bdomzlq.exe File created C:\Windows\SysWOW64\nlwqxux.exe-up.txt nlwqxux.exe File created C:\Windows\SysWOW64\ssbntjz.exe-up.txt ssbntjz.exe File opened for modification C:\Windows\SysWOW64\qiqgice.exe drvdzbh.exe File created C:\Windows\SysWOW64\ifzbjge.exe-up.txt ifzbjge.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdbqdfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhivhbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frfvfax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ejdsait.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sapezwc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhtanop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngmmggv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mnpnnpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhlltzr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwklgmq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajgdebb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osmyrbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hyimukd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feuouvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bsorotn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nklbwtd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language waeutvo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zaegoig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yikeybj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language suksjqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aevpkju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kyqwacx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arknmfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language knkghph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdnuclo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uraktpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flruudc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mjksqtg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ywfoyvi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mouhpnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsrrmoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcrrmkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zqntzaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vznkdkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zijiwlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inixnpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaimcsf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kvmtdje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njyedsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xszmdvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cynustn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sajcfcw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdhxusm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crsibke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubldfwu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtmeltt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kosimav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yomtfmu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jinnnly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpqdygk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjzkusf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rpormza.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gmadtmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfhyqjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvxgijo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwupmmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qtimhzl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oaqimud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qsjutqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyohhwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lephwmh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhydaad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yorlwbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nczoxfk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2100 2228 f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2100 2228 f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2100 2228 f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe 31 PID 2228 wrote to memory of 2100 2228 f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2224 2100 ldampse.exe 32 PID 2100 wrote to memory of 2224 2100 ldampse.exe 32 PID 2100 wrote to memory of 2224 2100 ldampse.exe 32 PID 2100 wrote to memory of 2224 2100 ldampse.exe 32 PID 2224 wrote to memory of 2692 2224 aaimcsf.exe 33 PID 2224 wrote to memory of 2692 2224 aaimcsf.exe 33 PID 2224 wrote to memory of 2692 2224 aaimcsf.exe 33 PID 2224 wrote to memory of 2692 2224 aaimcsf.exe 33 PID 2692 wrote to memory of 2920 2692 nydpksl.exe 34 PID 2692 wrote to memory of 2920 2692 nydpksl.exe 34 PID 2692 wrote to memory of 2920 2692 nydpksl.exe 34 PID 2692 wrote to memory of 2920 2692 nydpksl.exe 34 PID 2920 wrote to memory of 2600 2920 vdnuclo.exe 35 PID 2920 wrote to memory of 2600 2920 vdnuclo.exe 35 PID 2920 wrote to memory of 2600 2920 vdnuclo.exe 35 PID 2920 wrote to memory of 2600 2920 vdnuclo.exe 35 PID 2600 wrote to memory of 2636 2600 fcrrmkv.exe 36 PID 2600 wrote to memory of 2636 2600 fcrrmkv.exe 36 PID 2600 wrote to memory of 2636 2600 fcrrmkv.exe 36 PID 2600 wrote to memory of 2636 2600 fcrrmkv.exe 36 PID 2636 wrote to memory of 2908 2636 aevpkju.exe 37 PID 2636 wrote to memory of 2908 2636 aevpkju.exe 37 PID 2636 wrote to memory of 2908 2636 aevpkju.exe 37 PID 2636 wrote to memory of 2908 2636 aevpkju.exe 37 PID 2908 wrote to memory of 1144 2908 hmjpegd.exe 38 PID 2908 wrote to memory of 1144 2908 hmjpegd.exe 38 PID 2908 wrote to memory of 1144 2908 hmjpegd.exe 38 PID 2908 wrote to memory of 1144 2908 hmjpegd.exe 38 PID 1144 wrote to memory of 2924 1144 uraktpo.exe 39 PID 1144 wrote to memory of 2924 1144 uraktpo.exe 39 PID 1144 wrote to memory of 2924 1144 uraktpo.exe 39 PID 1144 wrote to memory of 2924 1144 uraktpo.exe 39 PID 2924 wrote to memory of 1780 2924 zpfagqn.exe 40 PID 2924 wrote to memory of 1780 2924 zpfagqn.exe 40 PID 2924 wrote to memory of 1780 2924 zpfagqn.exe 40 PID 2924 wrote to memory of 1780 2924 zpfagqn.exe 40 PID 1780 wrote to memory of 740 1780 rphkuwt.exe 41 PID 1780 wrote to memory of 740 1780 rphkuwt.exe 41 PID 1780 wrote to memory of 740 1780 rphkuwt.exe 41 PID 1780 wrote to memory of 740 1780 rphkuwt.exe 41 PID 740 wrote to memory of 948 740 wqpfctz.exe 42 PID 740 wrote to memory of 948 740 wqpfctz.exe 42 PID 740 wrote to memory of 948 740 wqpfctz.exe 42 PID 740 wrote to memory of 948 740 wqpfctz.exe 42 PID 948 wrote to memory of 296 948 obdfkqa.exe 43 PID 948 wrote to memory of 296 948 obdfkqa.exe 43 PID 948 wrote to memory of 296 948 obdfkqa.exe 43 PID 948 wrote to memory of 296 948 obdfkqa.exe 43 PID 296 wrote to memory of 2084 296 qarvivn.exe 44 PID 296 wrote to memory of 2084 296 qarvivn.exe 44 PID 296 wrote to memory of 2084 296 qarvivn.exe 44 PID 296 wrote to memory of 2084 296 qarvivn.exe 44 PID 2084 wrote to memory of 1708 2084 jhtanop.exe 45 PID 2084 wrote to memory of 1708 2084 jhtanop.exe 45 PID 2084 wrote to memory of 1708 2084 jhtanop.exe 45 PID 2084 wrote to memory of 1708 2084 jhtanop.exe 45 PID 1708 wrote to memory of 292 1708 npqvjca.exe 46 PID 1708 wrote to memory of 292 1708 npqvjca.exe 46 PID 1708 wrote to memory of 292 1708 npqvjca.exe 46 PID 1708 wrote to memory of 292 1708 npqvjca.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\ldampse.exeC:\Windows\system32\ldampse.exe 544 "C:\Users\Admin\AppData\Local\Temp\f2d8d3ef1d5623bdfa9a0eebd4fc2266_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\aaimcsf.exeC:\Windows\system32\aaimcsf.exe 536 "C:\Windows\SysWOW64\ldampse.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\nydpksl.exeC:\Windows\system32\nydpksl.exe 532 "C:\Windows\SysWOW64\aaimcsf.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\vdnuclo.exeC:\Windows\system32\vdnuclo.exe 540 "C:\Windows\SysWOW64\nydpksl.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\fcrrmkv.exeC:\Windows\system32\fcrrmkv.exe 552 "C:\Windows\SysWOW64\vdnuclo.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\aevpkju.exeC:\Windows\system32\aevpkju.exe 548 "C:\Windows\SysWOW64\fcrrmkv.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\hmjpegd.exeC:\Windows\system32\hmjpegd.exe 556 "C:\Windows\SysWOW64\aevpkju.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\uraktpo.exeC:\Windows\system32\uraktpo.exe 560 "C:\Windows\SysWOW64\hmjpegd.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\zpfagqn.exeC:\Windows\system32\zpfagqn.exe 572 "C:\Windows\SysWOW64\uraktpo.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\rphkuwt.exeC:\Windows\system32\rphkuwt.exe 568 "C:\Windows\SysWOW64\zpfagqn.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\wqpfctz.exeC:\Windows\system32\wqpfctz.exe 580 "C:\Windows\SysWOW64\rphkuwt.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\obdfkqa.exeC:\Windows\system32\obdfkqa.exe 564 "C:\Windows\SysWOW64\wqpfctz.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\qarvivn.exeC:\Windows\system32\qarvivn.exe 576 "C:\Windows\SysWOW64\obdfkqa.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\jhtanop.exeC:\Windows\system32\jhtanop.exe 584 "C:\Windows\SysWOW64\qarvivn.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\npqvjca.exeC:\Windows\system32\npqvjca.exe 588 "C:\Windows\SysWOW64\jhtanop.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\aosxrky.exeC:\Windows\system32\aosxrky.exe 592 "C:\Windows\SysWOW64\npqvjca.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:292 -
C:\Windows\SysWOW64\cnzfphl.exeC:\Windows\system32\cnzfphl.exe 596 "C:\Windows\SysWOW64\aosxrky.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:860 -
C:\Windows\SysWOW64\agtilxi.exeC:\Windows\system32\agtilxi.exe 600 "C:\Windows\SysWOW64\cnzfphl.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1680 -
C:\Windows\SysWOW64\bfhxjbv.exeC:\Windows\system32\bfhxjbv.exe 624 "C:\Windows\SysWOW64\agtilxi.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:788 -
C:\Windows\SysWOW64\uqvprzd.exeC:\Windows\system32\uqvprzd.exe 604 "C:\Windows\SysWOW64\bfhxjbv.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2772 -
C:\Windows\SysWOW64\byiqdof.exeC:\Windows\system32\byiqdof.exe 608 "C:\Windows\SysWOW64\uqvprzd.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2832 -
C:\Windows\SysWOW64\uthifda.exeC:\Windows\system32\uthifda.exe 616 "C:\Windows\SysWOW64\byiqdof.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2596 -
C:\Windows\SysWOW64\qkedbrl.exeC:\Windows\system32\qkedbrl.exe 632 "C:\Windows\SysWOW64\uthifda.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728 -
C:\Windows\SysWOW64\gdbqdfo.exeC:\Windows\system32\gdbqdfo.exe 612 "C:\Windows\SysWOW64\qkedbrl.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\nlwqxux.exeC:\Windows\system32\nlwqxux.exe 620 "C:\Windows\SysWOW64\gdbqdfo.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2312 -
C:\Windows\SysWOW64\dbiqemb.exeC:\Windows\system32\dbiqemb.exe 628 "C:\Windows\SysWOW64\nlwqxux.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1736 -
C:\Windows\SysWOW64\namvoki.exeC:\Windows\system32\namvoki.exe 652 "C:\Windows\SysWOW64\dbiqemb.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120 -
C:\Windows\SysWOW64\uhhnjas.exeC:\Windows\system32\uhhnjas.exe 636 "C:\Windows\SysWOW64\namvoki.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1920 -
C:\Windows\SysWOW64\fhlltzr.exeC:\Windows\system32\fhlltzr.exe 656 "C:\Windows\SysWOW64\uhhnjas.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\rfonczx.exeC:\Windows\system32\rfonczx.exe 640 "C:\Windows\SysWOW64\fhlltzr.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:340 -
C:\Windows\SysWOW64\zqntzaf.exeC:\Windows\system32\zqntzaf.exe 660 "C:\Windows\SysWOW64\rfonczx.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\SysWOW64\lhivhbl.exeC:\Windows\system32\lhivhbl.exe 648 "C:\Windows\SysWOW64\zqntzaf.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\wciopvl.exeC:\Windows\system32\wciopvl.exe 672 "C:\Windows\SysWOW64\lhivhbl.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1952 -
C:\Windows\SysWOW64\lwfbyrw.exeC:\Windows\system32\lwfbyrw.exe 664 "C:\Windows\SysWOW64\wciopvl.exe"35⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\vgvlumc.exeC:\Windows\system32\vgvlumc.exe 680 "C:\Windows\SysWOW64\lwfbyrw.exe"36⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\iabbfzg.exeC:\Windows\system32\iabbfzg.exe 668 "C:\Windows\SysWOW64\vgvlumc.exe"37⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\vvsqlcf.exeC:\Windows\system32\vvsqlcf.exe 696 "C:\Windows\SysWOW64\iabbfzg.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3000 -
C:\Windows\SysWOW64\imnttll.exeC:\Windows\system32\imnttll.exe 644 "C:\Windows\SysWOW64\vvsqlcf.exe"39⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\slzrebs.exeC:\Windows\system32\slzrebs.exe 676 "C:\Windows\SysWOW64\imnttll.exe"40⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\czsocjf.exeC:\Windows\system32\czsocjf.exe 688 "C:\Windows\SysWOW64\slzrebs.exe"41⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\SysWOW64\ppvjlrd.exeC:\Windows\system32\ppvjlrd.exe 704 "C:\Windows\SysWOW64\czsocjf.exe"42⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\copltzj.exeC:\Windows\system32\copltzj.exe 692 "C:\Windows\SysWOW64\ppvjlrd.exe"43⤵
- Executes dropped EXE
PID:2708 -
C:\Windows\SysWOW64\lrfwgup.exeC:\Windows\system32\lrfwgup.exe 708 "C:\Windows\SysWOW64\copltzj.exe"44⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\ypiypcu.exeC:\Windows\system32\ypiypcu.exe 700 "C:\Windows\SysWOW64\lrfwgup.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:784 -
C:\Windows\SysWOW64\jomwhbc.exeC:\Windows\system32\jomwhbc.exe 712 "C:\Windows\SysWOW64\ypiypcu.exe"46⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\vfhyqjh.exeC:\Windows\system32\vfhyqjh.exe 684 "C:\Windows\SysWOW64\jomwhbc.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108 -
C:\Windows\SysWOW64\gmteaih.exeC:\Windows\system32\gmteaih.exe 720 "C:\Windows\SysWOW64\vfhyqjh.exe"48⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\sgzmmnt.exeC:\Windows\system32\sgzmmnt.exe 716 "C:\Windows\SysWOW64\gmteaih.exe"49⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\SysWOW64\feuouvr.exeC:\Windows\system32\feuouvr.exe 740 "C:\Windows\SysWOW64\sgzmmnt.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Windows\SysWOW64\svorddw.exeC:\Windows\system32\svorddw.exe 728 "C:\Windows\SysWOW64\feuouvr.exe"51⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\flruudc.exeC:\Windows\system32\flruudc.exe 736 "C:\Windows\SysWOW64\svorddw.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\pzsrklp.exeC:\Windows\system32\pzsrklp.exe 732 "C:\Windows\SysWOW64\flruudc.exe"53⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\cynustn.exeC:\Windows\system32\cynustn.exe 760 "C:\Windows\SysWOW64\pzsrklp.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\oohobts.exeC:\Windows\system32\oohobts.exe 744 "C:\Windows\SysWOW64\cynustn.exe"55⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\bfkrjby.exeC:\Windows\system32\bfkrjby.exe 752 "C:\Windows\SysWOW64\oohobts.exe"56⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\odfusjv.exeC:\Windows\system32\odfusjv.exe 748 "C:\Windows\SysWOW64\bfkrjby.exe"57⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\ycjrkid.exeC:\Windows\system32\ycjrkid.exe 776 "C:\Windows\SysWOW64\odfusjv.exe"58⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\lephwmh.exeC:\Windows\system32\lephwmh.exe 756 "C:\Windows\SysWOW64\ycjrkid.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\yvskfvn.exeC:\Windows\system32\yvskfvn.exe 768 "C:\Windows\SysWOW64\lephwmh.exe"60⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\ijthvca.exeC:\Windows\system32\ijthvca.exe 724 "C:\Windows\SysWOW64\yvskfvn.exe"61⤵
- Executes dropped EXE
PID:2152 -
C:\Windows\SysWOW64\vznkdkf.exeC:\Windows\system32\vznkdkf.exe 764 "C:\Windows\SysWOW64\ijthvca.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\hyimukd.exeC:\Windows\system32\hyimukd.exe 780 "C:\Windows\SysWOW64\vznkdkf.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\uolpctj.exeC:\Windows\system32\uolpctj.exe 784 "C:\Windows\SysWOW64\hyimukd.exe"64⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\hngklbo.exeC:\Windows\system32\hngklbo.exe 772 "C:\Windows\SysWOW64\uolpctj.exe"65⤵
- Executes dropped EXE
PID:2700 -
C:\Windows\SysWOW64\rtghbab.exeC:\Windows\system32\rtghbab.exe 808 "C:\Windows\SysWOW64\hngklbo.exe"66⤵PID:2796
-
C:\Windows\SysWOW64\esbkkiz.exeC:\Windows\system32\esbkkiz.exe 792 "C:\Windows\SysWOW64\rtghbab.exe"67⤵
- Drops file in System32 directory
PID:2804 -
C:\Windows\SysWOW64\riemsqe.exeC:\Windows\system32\riemsqe.exe 788 "C:\Windows\SysWOW64\esbkkiz.exe"68⤵PID:2856
-
C:\Windows\SysWOW64\ehzpbrk.exeC:\Windows\system32\ehzpbrk.exe 796 "C:\Windows\SysWOW64\riemsqe.exe"69⤵PID:2944
-
C:\Windows\SysWOW64\ojozwuq.exeC:\Windows\system32\ojozwuq.exe 812 "C:\Windows\SysWOW64\ehzpbrk.exe"70⤵PID:2744
-
C:\Windows\SysWOW64\sajcfcw.exeC:\Windows\system32\sajcfcw.exe 800 "C:\Windows\SysWOW64\ojozwuq.exe"71⤵
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\fymfnkb.exeC:\Windows\system32\fymfnkb.exe 828 "C:\Windows\SysWOW64\sajcfcw.exe"72⤵PID:3004
-
C:\Windows\SysWOW64\sphiwkz.exeC:\Windows\system32\sphiwkz.exe 804 "C:\Windows\SysWOW64\fymfnkb.exe"73⤵PID:2296
-
C:\Windows\SysWOW64\cdhxusm.exeC:\Windows\system32\cdhxusm.exe 816 "C:\Windows\SysWOW64\sphiwkz.exe"74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\pqrnawl.exeC:\Windows\system32\pqrnawl.exe 836 "C:\Windows\SysWOW64\cdhxusm.exe"75⤵PID:1508
-
C:\Windows\SysWOW64\csfclap.exeC:\Windows\system32\csfclap.exe 844 "C:\Windows\SysWOW64\pqrnawl.exe"76⤵
- Drops file in System32 directory
PID:1072 -
C:\Windows\SysWOW64\piafuiv.exeC:\Windows\system32\piafuiv.exe 820 "C:\Windows\SysWOW64\csfclap.exe"77⤵PID:272
-
C:\Windows\SysWOW64\chvicqa.exeC:\Windows\system32\chvicqa.exe 840 "C:\Windows\SysWOW64\piafuiv.exe"78⤵PID:2544
-
C:\Windows\SysWOW64\mjksqtg.exeC:\Windows\system32\mjksqtg.exe 832 "C:\Windows\SysWOW64\chvicqa.exe"79⤵
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\yinvyum.exeC:\Windows\system32\yinvyum.exe 824 "C:\Windows\SysWOW64\mjksqtg.exe"80⤵PID:944
-
C:\Windows\SysWOW64\lyixpcs.exeC:\Windows\system32\lyixpcs.exe 848 "C:\Windows\SysWOW64\yinvyum.exe"81⤵PID:1652
-
C:\Windows\SysWOW64\vminfjx.exeC:\Windows\system32\vminfjx.exe 864 "C:\Windows\SysWOW64\lyixpcs.exe"82⤵PID:2192
-
C:\Windows\SysWOW64\iddpnjc.exeC:\Windows\system32\iddpnjc.exe 856 "C:\Windows\SysWOW64\vminfjx.exe"83⤵PID:1180
-
C:\Windows\SysWOW64\vqvftnb.exeC:\Windows\system32\vqvftnb.exe 860 "C:\Windows\SysWOW64\iddpnjc.exe"84⤵PID:2808
-
C:\Windows\SysWOW64\fxzlemj.exeC:\Windows\system32\fxzlemj.exe 852 "C:\Windows\SysWOW64\vqvftnb.exe"85⤵PID:2912
-
C:\Windows\SysWOW64\pdzactw.exeC:\Windows\system32\pdzactw.exe 880 "C:\Windows\SysWOW64\fxzlemj.exe"86⤵PID:2732
-
C:\Windows\SysWOW64\ccudkcb.exeC:\Windows\system32\ccudkcb.exe 872 "C:\Windows\SysWOW64\pdzactw.exe"87⤵PID:2756
-
C:\Windows\SysWOW64\psxftcz.exeC:\Windows\system32\psxftcz.exe 888 "C:\Windows\SysWOW64\ccudkcb.exe"88⤵PID:2172
-
C:\Windows\SysWOW64\crsibke.exeC:\Windows\system32\crsibke.exe 876 "C:\Windows\SysWOW64\psxftcz.exe"89⤵
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\SysWOW64\phnlksk.exeC:\Windows\system32\phnlksk.exe 868 "C:\Windows\SysWOW64\crsibke.exe"90⤵PID:976
-
C:\Windows\SysWOW64\yvniisx.exeC:\Windows\system32\yvniisx.exe 884 "C:\Windows\SysWOW64\phnlksk.exe"91⤵PID:2864
-
C:\Windows\SysWOW64\lifyovw.exeC:\Windows\system32\lifyovw.exe 904 "C:\Windows\SysWOW64\yvniisx.exe"92⤵PID:2396
-
C:\Windows\SysWOW64\vluibzc.exeC:\Windows\system32\vluibzc.exe 896 "C:\Windows\SysWOW64\lifyovw.exe"93⤵PID:660
-
C:\Windows\SysWOW64\inaqnlg.exeC:\Windows\system32\inaqnlg.exe 916 "C:\Windows\SysWOW64\vluibzc.exe"94⤵
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\vdvtvlm.exeC:\Windows\system32\vdvtvlm.exe 892 "C:\Windows\SysWOW64\inaqnlg.exe"95⤵PID:2416
-
C:\Windows\SysWOW64\iynqbpl.exeC:\Windows\system32\iynqbpl.exe 928 "C:\Windows\SysWOW64\vdvtvlm.exe"96⤵PID:1664
-
C:\Windows\SysWOW64\vstyubx.exeC:\Windows\system32\vstyubx.exe 908 "C:\Windows\SysWOW64\iynqbpl.exe"97⤵PID:1588
-
C:\Windows\SysWOW64\frfvfax.exeC:\Windows\system32\frfvfax.exe 932 "C:\Windows\SysWOW64\vstyubx.exe"98⤵
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\rtllqfj.exeC:\Windows\system32\rtllqfj.exe 912 "C:\Windows\SysWOW64\frfvfax.exe"99⤵PID:2508
-
C:\Windows\SysWOW64\esgozng.exeC:\Windows\system32\esgozng.exe 936 "C:\Windows\SysWOW64\rtllqfj.exe"100⤵
- Drops file in System32 directory
PID:1216 -
C:\Windows\SysWOW64\riaqhvm.exeC:\Windows\system32\riaqhvm.exe 900 "C:\Windows\SysWOW64\esgozng.exe"101⤵PID:1936
-
C:\Windows\SysWOW64\bwbofvz.exeC:\Windows\system32\bwbofvz.exe 920 "C:\Windows\SysWOW64\riaqhvm.exe"102⤵PID:2388
-
C:\Windows\SysWOW64\onwiodf.exeC:\Windows\system32\onwiodf.exe 924 "C:\Windows\SysWOW64\bwbofvz.exe"103⤵
- Drops file in System32 directory
PID:2764 -
C:\Windows\SysWOW64\blzlxlc.exeC:\Windows\system32\blzlxlc.exe 940 "C:\Windows\SysWOW64\onwiodf.exe"104⤵PID:2740
-
C:\Windows\SysWOW64\octofli.exeC:\Windows\system32\octofli.exe 948 "C:\Windows\SysWOW64\blzlxlc.exe"105⤵PID:1472
-
C:\Windows\SysWOW64\bsorotn.exeC:\Windows\system32\bsorotn.exe 952 "C:\Windows\SysWOW64\octofli.exe"106⤵
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\kgpombs.exeC:\Windows\system32\kgpombs.exe 944 "C:\Windows\SysWOW64\bsorotn.exe"107⤵PID:1268
-
C:\Windows\SysWOW64\xtgesez.exeC:\Windows\system32\xtgesez.exe 964 "C:\Windows\SysWOW64\kgpombs.exe"108⤵PID:2968
-
C:\Windows\SysWOW64\kvmtdje.exeC:\Windows\system32\kvmtdje.exe 956 "C:\Windows\SysWOW64\xtgesez.exe"109⤵
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\uyceqmk.exeC:\Windows\system32\uyceqmk.exe 968 "C:\Windows\SysWOW64\kvmtdje.exe"110⤵PID:2980
-
C:\Windows\SysWOW64\hxxgzup.exeC:\Windows\system32\hxxgzup.exe 972 "C:\Windows\SysWOW64\uyceqmk.exe"111⤵PID:3008
-
C:\Windows\SysWOW64\ukowfyo.exeC:\Windows\system32\ukowfyo.exe 960 "C:\Windows\SysWOW64\hxxgzup.exe"112⤵
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\eypldyb.exeC:\Windows\system32\eypldyb.exe 976 "C:\Windows\SysWOW64\ukowfyo.exe"113⤵PID:1776
-
C:\Windows\SysWOW64\rlgjjba.exeC:\Windows\system32\rlgjjba.exe 992 "C:\Windows\SysWOW64\eypldyb.exe"114⤵PID:1944
-
C:\Windows\SysWOW64\ywfoyvi.exeC:\Windows\system32\ywfoyvi.exe 980 "C:\Windows\SysWOW64\rlgjjba.exe"115⤵
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\SysWOW64\ljpedzp.exeC:\Windows\system32\ljpedzp.exe 984 "C:\Windows\SysWOW64\ywfoyvi.exe"116⤵PID:888
-
C:\Windows\SysWOW64\yhrhuhn.exeC:\Windows\system32\yhrhuhn.exe 996 "C:\Windows\SysWOW64\ljpedzp.exe"117⤵
- Drops file in System32 directory
PID:372 -
C:\Windows\SysWOW64\ikhrhkb.exeC:\Windows\system32\ikhrhkb.exe 1012 "C:\Windows\SysWOW64\yhrhuhn.exe"118⤵PID:1412
-
C:\Windows\SysWOW64\vicuqkz.exeC:\Windows\system32\vicuqkz.exe 1000 "C:\Windows\SysWOW64\ikhrhkb.exe"119⤵
- Drops file in System32 directory
PID:1548 -
C:\Windows\SysWOW64\xlrednn.exeC:\Windows\system32\xlrednn.exe 1020 "C:\Windows\SysWOW64\vicuqkz.exe"120⤵PID:376
-
C:\Windows\SysWOW64\kyjujrm.exeC:\Windows\system32\kyjujrm.exe 988 "C:\Windows\SysWOW64\xlrednn.exe"121⤵PID:1628
-
C:\Windows\SysWOW64\umjjhzz.exeC:\Windows\system32\umjjhzz.exe 1028 "C:\Windows\SysWOW64\kyjujrm.exe"122⤵PID:2812
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-