Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 00:49
Behavioral task
behavioral1
Sample
f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe
-
Size
146KB
-
MD5
f4d0a41ba6d000d36a14a362141b6841
-
SHA1
b4b2b3fe7747acd06cf95ce9dc7d14e8e7f8a7f5
-
SHA256
078ed4ad77c6686fadf47f57352d4cc2418bf7641974ba3ee7fc59e8b4b47a09
-
SHA512
75810cdc355a8ea01ef3d9f77ba1d56ed11fc65f84e5a1e5566e9abaf6b4217b92887a27ad1cff072963119f95510035604d8b9dd30ebeb07d6841da297a7908
-
SSDEEP
3072:zqgRa6ZSpvGBjzevS0p5NIgrfKRNjBWzxJ1vp6Lpd4n2OsRcSG:zqgAJp+hzG7IgujExbvp6Lpd42z
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2844 wodjvjbckk.exe 2580 octofliddg.exe 1752 vgebxeltqv.exe 2648 fjtlkhznlh.exe 1724 pqfjugynlf.exe 3020 zsutqbnpyq.exe 1576 mjpwyjkwqc.exe 1084 zehmenrbfb.exe 1780 jgwwrqxdrn.exe 1624 wfrzaqdksz.exe 2388 jzxoldhugy.exe 1960 tkmrggoosj.exe 876 gaptpotvtw.exe 2084 tnzrvksizv.exe 3060 fpfzgxwrnu.exe 2148 famedqnehr.exe 1320 unmzhdjyof.exe 1240 etmwxdwvnd.exe 1524 plccctqqob.exe 2856 zvrmxwfsbm.exe 2908 mmmpgeczby.exe 2096 vokrthrtok.exe 2616 ineucqoipw.exe 2552 squexlccch.exe 2132 fophgtajct.exe 2924 sfrkobgrvg.exe 1120 cphubemtir.exe 976 pcqkhatywq.exe 2248 cttmqiqnxc.exe 2368 mhukoqdjwb.exe 2136 wcnuvkehkm.exe 2428 jtpxeskoly.exe 2364 wrkanspvek.exe 2456 gflxlacrli.exe 2348 tscnqeberi.exe 2444 aebsgxjrlf.exe 1668 qtnamhnfff.exe 1864 atrxfguffd.exe 2488 njuanosmfp.exe 1868 wujkbrgosb.exe 1012 jkenjzewtn.exe 1636 ujqkuylvtl.exe 3008 jzbkahpknt.exe 2640 tygqtgpknk.exe 2432 gamxelbtar.exe 3036 qzyvpkatah.exe 3028 aknfknpnns.exe 1416 nxfdqrnabr.exe 1632 xaufduuuod.exe 2144 kypilczbpp.exe 2188 ubeszxgdba.exe 468 hdkisjsnpa.exe 2468 uqcyynrsvz.exe 1544 bbbdnhzepw.exe 592 quxyxvbvvj.exe 2404 bqyiepkbju.exe 1716 qjvdolnsxq.exe 1464 aizbgkmrxo.exe 2316 nkfisoytkn.exe 1476 xjrocnytkl.exe 1884 nzdojfcpem.exe 2720 xcsywaijrx.exe 1228 kpkocepwfw.exe 1532 mzzyxhvqsh.exe -
Loads dropped DLL 64 IoCs
pid Process 2412 f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe 2412 f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe 2844 wodjvjbckk.exe 2844 wodjvjbckk.exe 2580 octofliddg.exe 2580 octofliddg.exe 1752 vgebxeltqv.exe 1752 vgebxeltqv.exe 2648 fjtlkhznlh.exe 2648 fjtlkhznlh.exe 1724 pqfjugynlf.exe 1724 pqfjugynlf.exe 3020 zsutqbnpyq.exe 3020 zsutqbnpyq.exe 1576 mjpwyjkwqc.exe 1576 mjpwyjkwqc.exe 1084 zehmenrbfb.exe 1084 zehmenrbfb.exe 1780 jgwwrqxdrn.exe 1780 jgwwrqxdrn.exe 1624 wfrzaqdksz.exe 1624 wfrzaqdksz.exe 2388 jzxoldhugy.exe 2388 jzxoldhugy.exe 1960 tkmrggoosj.exe 1960 tkmrggoosj.exe 876 gaptpotvtw.exe 876 gaptpotvtw.exe 2084 tnzrvksizv.exe 2084 tnzrvksizv.exe 3060 fpfzgxwrnu.exe 3060 fpfzgxwrnu.exe 2148 famedqnehr.exe 2148 famedqnehr.exe 1320 unmzhdjyof.exe 1320 unmzhdjyof.exe 1240 etmwxdwvnd.exe 1240 etmwxdwvnd.exe 1524 plccctqqob.exe 1524 plccctqqob.exe 2856 zvrmxwfsbm.exe 2856 zvrmxwfsbm.exe 2908 mmmpgeczby.exe 2908 mmmpgeczby.exe 2096 vokrthrtok.exe 2096 vokrthrtok.exe 2616 ineucqoipw.exe 2616 ineucqoipw.exe 2552 squexlccch.exe 2552 squexlccch.exe 2132 fophgtajct.exe 2132 fophgtajct.exe 2924 sfrkobgrvg.exe 2924 sfrkobgrvg.exe 1120 cphubemtir.exe 1120 cphubemtir.exe 976 pcqkhatywq.exe 976 pcqkhatywq.exe 2248 cttmqiqnxc.exe 2248 cttmqiqnxc.exe 2368 mhukoqdjwb.exe 2368 mhukoqdjwb.exe 2136 wcnuvkehkm.exe 2136 wcnuvkehkm.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\trvtxnztik.exe gssqoeulpx.exe File created C:\Windows\SysWOW64\vgebxeltqv.exe octofliddg.exe File opened for modification C:\Windows\SysWOW64\aebsgxjrlf.exe tscnqeberi.exe File opened for modification C:\Windows\SysWOW64\yxefxzggxn.exe lzcdprbrwb.exe File created C:\Windows\SysWOW64\vzqhqjuklr.exe gnqmmexqew.exe File created C:\Windows\SysWOW64\tpxcbsrooe.exe grcztkmhns.exe File created C:\Windows\SysWOW64\wshsdduexo.exe jbepvvppwc.exe File created C:\Windows\SysWOW64\zpafmusqfr.exe pbhiwnfugb.exe File opened for modification C:\Windows\SysWOW64\wunvadjglf.exe jwsakvdyks.exe File created C:\Windows\SysWOW64\msytlgcqdb.exe defwnzptek.exe File opened for modification C:\Windows\SysWOW64\jrvaiyfwrd.exe wbtxzqzoqr.exe File opened for modification C:\Windows\SysWOW64\pofavlrgmj.exe cqkxndlzlx.exe File opened for modification C:\Windows\SysWOW64\vvyqgtsahh.exe hioaaqlnbh.exe File created C:\Windows\SysWOW64\jiumfpfmel.exe wssjwghfdz.exe File opened for modification C:\Windows\SysWOW64\jnfbzzmffj.exe wpcyrzoyex.exe File opened for modification C:\Windows\SysWOW64\cubugkgrxj.exe skmkshaxlx.exe File opened for modification C:\Windows\SysWOW64\ktrfunvpzx.exe xcwcleqigk.exe File opened for modification C:\Windows\SysWOW64\dvbnhrqvwv.exe qeykyjsovb.exe File created C:\Windows\SysWOW64\grpwqoiacn.exe texglkknoo.exe File opened for modification C:\Windows\SysWOW64\omwojvyjlm.exe bsqypiuzyn.exe File created C:\Windows\SysWOW64\rwimkcfrkv.exe eucwzqbhxw.exe File opened for modification C:\Windows\SysWOW64\dxggunkbwl.exe qgllmfftvz.exe File created C:\Windows\SysWOW64\aqzmsdgtpu.exe nawjkdaloi.exe File created C:\Windows\SysWOW64\shugxmbenn.exe frreoewxmb.exe File created C:\Windows\SysWOW64\lyqxcbnqhh.exe yhvutshjov.exe File opened for modification C:\Windows\SysWOW64\eolijhdksi.exe rpifbzydzv.exe File created C:\Windows\SysWOW64\ysicmzqump.exe ltnadrsntc.exe File opened for modification C:\Windows\SysWOW64\spyyehlowh.exe fcojyemjqh.exe File opened for modification C:\Windows\SysWOW64\fpfzgxwrnu.exe tnzrvksizv.exe File opened for modification C:\Windows\SysWOW64\kypilczbpp.exe xaufduuuod.exe File opened for modification C:\Windows\SysWOW64\mzzyxhvqsh.exe kpkocepwfw.exe File opened for modification C:\Windows\SysWOW64\exmomrvtfr.exe umpdznpzsg.exe File created C:\Windows\SysWOW64\khfhncyxdr.exe xikmecsqcf.exe File created C:\Windows\SysWOW64\ebllcvdglz.exe rljitvyqsn.exe File opened for modification C:\Windows\SysWOW64\wfsmpcztxz.exe jpxsgucmwf.exe File opened for modification C:\Windows\SysWOW64\tzjvzktjlp.exe jliyjdonmr.exe File created C:\Windows\SysWOW64\zljyckntdr.exe mugdtchmcf.exe File created C:\Windows\SysWOW64\nvemiwgtcw.exe axjjawambj.exe File created C:\Windows\SysWOW64\puvvhiosfb.exe cdstyailep.exe File opened for modification C:\Windows\SysWOW64\hhzycwgktb.exe urewuwadah.exe File opened for modification C:\Windows\SysWOW64\ivpfudbodq.exe vxudlddhde.exe File opened for modification C:\Windows\SysWOW64\yxobzxejbd.exe ovzrmuxpos.exe File opened for modification C:\Windows\SysWOW64\nhawtpxbzm.exe aqxtkgrtha.exe File created C:\Windows\SysWOW64\tsyjvykjhf.exe gbdgmqecht.exe File opened for modification C:\Windows\SysWOW64\wlixyigxfr.exe nwhhhatbgt.exe File created C:\Windows\SysWOW64\magfpkcvca.exe zkedhkwobo.exe File opened for modification C:\Windows\SysWOW64\xsquvvhlzq.exe neqwxwuprz.exe File opened for modification C:\Windows\SysWOW64\iaodbqjsky.exe vjtathdljm.exe File created C:\Windows\SysWOW64\lmnncxkbma.exe bcqdoudzzp.exe File opened for modification C:\Windows\SysWOW64\mugdtchmcf.exe zwlalucfbl.exe File opened for modification C:\Windows\SysWOW64\txecqxwaia.exe gcvmktyotb.exe File opened for modification C:\Windows\SysWOW64\xvjbmgsurf.exe kwhydymnqt.exe File created C:\Windows\SysWOW64\edanbqgytg.exe reglsijrsu.exe File opened for modification C:\Windows\SysWOW64\qepsqrdlnt.exe douphjxeuh.exe File opened for modification C:\Windows\SysWOW64\uvnldnkymb.exe khmofnfcnk.exe File opened for modification C:\Windows\SysWOW64\bphjmdpmuh.exe ormgddjftv.exe File created C:\Windows\SysWOW64\tkmrggoosj.exe jzxoldhugy.exe File created C:\Windows\SysWOW64\uwpijclaat.exe hfnfauoszh.exe File created C:\Windows\SysWOW64\vcafehrkxy.exe lozighmoyz.exe File created C:\Windows\SysWOW64\fiktchkscz.exe sspqthelcn.exe File created C:\Windows\SysWOW64\qwvokbrfiq.exe dgblctlxhe.exe File opened for modification C:\Windows\SysWOW64\qcnutvtlty.exe dmlrknveam.exe File created C:\Windows\SysWOW64\ogjmvmmbnu.exe bphjmdpmuh.exe File created C:\Windows\SysWOW64\atrxfguffd.exe qtnamhnfff.exe -
resource yara_rule behavioral1/memory/2412-0-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/files/0x00070000000120fe-4.dat upx behavioral1/memory/2844-12-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2412-18-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2844-19-0x0000000002AE0000-0x0000000002BDA000-memory.dmp upx behavioral1/memory/2580-26-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2844-33-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1752-39-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2580-43-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2648-51-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1752-54-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1724-63-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2648-67-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/3020-75-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1724-78-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1576-87-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1084-101-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/3020-92-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1084-114-0x0000000002B70000-0x0000000002C6A000-memory.dmp upx behavioral1/memory/1576-112-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1780-126-0x00000000029E0000-0x0000000002ADA000-memory.dmp upx behavioral1/memory/1084-116-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1624-127-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2388-140-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1780-138-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1624-147-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1960-154-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/876-167-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2388-157-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1960-175-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2084-181-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/876-194-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2084-203-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2148-210-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1320-222-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/3060-221-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2148-224-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1240-232-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1320-241-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1240-248-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2856-254-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1524-262-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2856-269-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2096-274-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2908-282-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2096-289-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2552-295-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2616-303-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2552-309-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2132-320-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2924-326-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/976-330-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/1120-338-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/976-343-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2368-348-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2248-356-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2136-358-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2368-357-0x0000000002C60000-0x0000000002D5A000-memory.dmp upx behavioral1/memory/2368-362-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2428-367-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2136-372-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2428-379-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2456-384-0x0000000000400000-0x00000000004FA000-memory.dmp upx behavioral1/memory/2364-387-0x0000000000400000-0x00000000004FA000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaucmqspfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdibnsggmt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language giqpwsxmyw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pynnryqcjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jwsakvdyks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ujqkuylvtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ylsxjwssnm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jqsupgayzu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language saibmrizci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kuukoavuqn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cttmqiqnxc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lykchmxjqr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ylmbgleysp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fknyercscw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jliyjdonmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sscdioczeu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltdttfvpnz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language impogugilg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aizbgkmrxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruccmzjtkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nauxrkfykw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ryqtlxllyu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbrxbbfauw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcyvddxgie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cjzrxtrozh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcojkkbset.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elwfuipblr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlgeknpxvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nzbgnbgroy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emtzbcably.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xsquvvhlzq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ydiqkxpimn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plwpoklgyv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqsitukxam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qlvsmvrzis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qmrdzdsjjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfsmpcztxz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymjengpraw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qwvokbrfiq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlwfibazpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adjqbriavr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gplyitzqmb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyubxzyfzr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ywwwpdtkyr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hqkbgdfrvz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zsutqbnpyq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubeszxgdba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kpprxtwwwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msytlgcqdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flpxgwbwlm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkkjoclqls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogjmvmmbnu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nglixbobdw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktrfunvpzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qzcjvztpfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwupmmkrud.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unsgcmogvm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajjhhaarqs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmujcwonhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fiktchkscz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szlsnavtyi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrmikvbwzj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frhcpmulbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qlawwgoytr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2844 2412 f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2844 2412 f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2844 2412 f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe 30 PID 2412 wrote to memory of 2844 2412 f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2580 2844 wodjvjbckk.exe 31 PID 2844 wrote to memory of 2580 2844 wodjvjbckk.exe 31 PID 2844 wrote to memory of 2580 2844 wodjvjbckk.exe 31 PID 2844 wrote to memory of 2580 2844 wodjvjbckk.exe 31 PID 2580 wrote to memory of 1752 2580 octofliddg.exe 32 PID 2580 wrote to memory of 1752 2580 octofliddg.exe 32 PID 2580 wrote to memory of 1752 2580 octofliddg.exe 32 PID 2580 wrote to memory of 1752 2580 octofliddg.exe 32 PID 1752 wrote to memory of 2648 1752 vgebxeltqv.exe 33 PID 1752 wrote to memory of 2648 1752 vgebxeltqv.exe 33 PID 1752 wrote to memory of 2648 1752 vgebxeltqv.exe 33 PID 1752 wrote to memory of 2648 1752 vgebxeltqv.exe 33 PID 2648 wrote to memory of 1724 2648 fjtlkhznlh.exe 34 PID 2648 wrote to memory of 1724 2648 fjtlkhznlh.exe 34 PID 2648 wrote to memory of 1724 2648 fjtlkhznlh.exe 34 PID 2648 wrote to memory of 1724 2648 fjtlkhznlh.exe 34 PID 1724 wrote to memory of 3020 1724 pqfjugynlf.exe 35 PID 1724 wrote to memory of 3020 1724 pqfjugynlf.exe 35 PID 1724 wrote to memory of 3020 1724 pqfjugynlf.exe 35 PID 1724 wrote to memory of 3020 1724 pqfjugynlf.exe 35 PID 3020 wrote to memory of 1576 3020 zsutqbnpyq.exe 36 PID 3020 wrote to memory of 1576 3020 zsutqbnpyq.exe 36 PID 3020 wrote to memory of 1576 3020 zsutqbnpyq.exe 36 PID 3020 wrote to memory of 1576 3020 zsutqbnpyq.exe 36 PID 1576 wrote to memory of 1084 1576 mjpwyjkwqc.exe 37 PID 1576 wrote to memory of 1084 1576 mjpwyjkwqc.exe 37 PID 1576 wrote to memory of 1084 1576 mjpwyjkwqc.exe 37 PID 1576 wrote to memory of 1084 1576 mjpwyjkwqc.exe 37 PID 1084 wrote to memory of 1780 1084 zehmenrbfb.exe 38 PID 1084 wrote to memory of 1780 1084 zehmenrbfb.exe 38 PID 1084 wrote to memory of 1780 1084 zehmenrbfb.exe 38 PID 1084 wrote to memory of 1780 1084 zehmenrbfb.exe 38 PID 1780 wrote to memory of 1624 1780 jgwwrqxdrn.exe 39 PID 1780 wrote to memory of 1624 1780 jgwwrqxdrn.exe 39 PID 1780 wrote to memory of 1624 1780 jgwwrqxdrn.exe 39 PID 1780 wrote to memory of 1624 1780 jgwwrqxdrn.exe 39 PID 1624 wrote to memory of 2388 1624 wfrzaqdksz.exe 40 PID 1624 wrote to memory of 2388 1624 wfrzaqdksz.exe 40 PID 1624 wrote to memory of 2388 1624 wfrzaqdksz.exe 40 PID 1624 wrote to memory of 2388 1624 wfrzaqdksz.exe 40 PID 2388 wrote to memory of 1960 2388 jzxoldhugy.exe 41 PID 2388 wrote to memory of 1960 2388 jzxoldhugy.exe 41 PID 2388 wrote to memory of 1960 2388 jzxoldhugy.exe 41 PID 2388 wrote to memory of 1960 2388 jzxoldhugy.exe 41 PID 1960 wrote to memory of 876 1960 tkmrggoosj.exe 42 PID 1960 wrote to memory of 876 1960 tkmrggoosj.exe 42 PID 1960 wrote to memory of 876 1960 tkmrggoosj.exe 42 PID 1960 wrote to memory of 876 1960 tkmrggoosj.exe 42 PID 876 wrote to memory of 2084 876 gaptpotvtw.exe 43 PID 876 wrote to memory of 2084 876 gaptpotvtw.exe 43 PID 876 wrote to memory of 2084 876 gaptpotvtw.exe 43 PID 876 wrote to memory of 2084 876 gaptpotvtw.exe 43 PID 2084 wrote to memory of 3060 2084 tnzrvksizv.exe 44 PID 2084 wrote to memory of 3060 2084 tnzrvksizv.exe 44 PID 2084 wrote to memory of 3060 2084 tnzrvksizv.exe 44 PID 2084 wrote to memory of 3060 2084 tnzrvksizv.exe 44 PID 3060 wrote to memory of 2148 3060 fpfzgxwrnu.exe 45 PID 3060 wrote to memory of 2148 3060 fpfzgxwrnu.exe 45 PID 3060 wrote to memory of 2148 3060 fpfzgxwrnu.exe 45 PID 3060 wrote to memory of 2148 3060 fpfzgxwrnu.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\wodjvjbckk.exeC:\Windows\system32\wodjvjbckk.exe 452 "C:\Users\Admin\AppData\Local\Temp\f4d0a41ba6d000d36a14a362141b6841_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\octofliddg.exeC:\Windows\system32\octofliddg.exe 516 "C:\Windows\SysWOW64\wodjvjbckk.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\vgebxeltqv.exeC:\Windows\system32\vgebxeltqv.exe 508 "C:\Windows\SysWOW64\octofliddg.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\fjtlkhznlh.exeC:\Windows\system32\fjtlkhznlh.exe 512 "C:\Windows\SysWOW64\vgebxeltqv.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\pqfjugynlf.exeC:\Windows\system32\pqfjugynlf.exe 520 "C:\Windows\SysWOW64\fjtlkhznlh.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\zsutqbnpyq.exeC:\Windows\system32\zsutqbnpyq.exe 524 "C:\Windows\SysWOW64\pqfjugynlf.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\mjpwyjkwqc.exeC:\Windows\system32\mjpwyjkwqc.exe 528 "C:\Windows\SysWOW64\zsutqbnpyq.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\zehmenrbfb.exeC:\Windows\system32\zehmenrbfb.exe 540 "C:\Windows\SysWOW64\mjpwyjkwqc.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\jgwwrqxdrn.exeC:\Windows\system32\jgwwrqxdrn.exe 532 "C:\Windows\SysWOW64\zehmenrbfb.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\wfrzaqdksz.exeC:\Windows\system32\wfrzaqdksz.exe 536 "C:\Windows\SysWOW64\jgwwrqxdrn.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\jzxoldhugy.exeC:\Windows\system32\jzxoldhugy.exe 544 "C:\Windows\SysWOW64\wfrzaqdksz.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\tkmrggoosj.exeC:\Windows\system32\tkmrggoosj.exe 564 "C:\Windows\SysWOW64\jzxoldhugy.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\gaptpotvtw.exeC:\Windows\system32\gaptpotvtw.exe 548 "C:\Windows\SysWOW64\tkmrggoosj.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\tnzrvksizv.exeC:\Windows\system32\tnzrvksizv.exe 500 "C:\Windows\SysWOW64\gaptpotvtw.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\fpfzgxwrnu.exeC:\Windows\system32\fpfzgxwrnu.exe 492 "C:\Windows\SysWOW64\tnzrvksizv.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\famedqnehr.exeC:\Windows\system32\famedqnehr.exe 560 "C:\Windows\SysWOW64\fpfzgxwrnu.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2148 -
C:\Windows\SysWOW64\unmzhdjyof.exeC:\Windows\system32\unmzhdjyof.exe 568 "C:\Windows\SysWOW64\famedqnehr.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1320 -
C:\Windows\SysWOW64\etmwxdwvnd.exeC:\Windows\system32\etmwxdwvnd.exe 572 "C:\Windows\SysWOW64\unmzhdjyof.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1240 -
C:\Windows\SysWOW64\plccctqqob.exeC:\Windows\system32\plccctqqob.exe 576 "C:\Windows\SysWOW64\etmwxdwvnd.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524 -
C:\Windows\SysWOW64\zvrmxwfsbm.exeC:\Windows\system32\zvrmxwfsbm.exe 580 "C:\Windows\SysWOW64\plccctqqob.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856 -
C:\Windows\SysWOW64\mmmpgeczby.exeC:\Windows\system32\mmmpgeczby.exe 584 "C:\Windows\SysWOW64\zvrmxwfsbm.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908 -
C:\Windows\SysWOW64\vokrthrtok.exeC:\Windows\system32\vokrthrtok.exe 604 "C:\Windows\SysWOW64\mmmpgeczby.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2096 -
C:\Windows\SysWOW64\ineucqoipw.exeC:\Windows\system32\ineucqoipw.exe 588 "C:\Windows\SysWOW64\vokrthrtok.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2616 -
C:\Windows\SysWOW64\squexlccch.exeC:\Windows\system32\squexlccch.exe 592 "C:\Windows\SysWOW64\ineucqoipw.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Windows\SysWOW64\fophgtajct.exeC:\Windows\system32\fophgtajct.exe 596 "C:\Windows\SysWOW64\squexlccch.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2132 -
C:\Windows\SysWOW64\sfrkobgrvg.exeC:\Windows\system32\sfrkobgrvg.exe 600 "C:\Windows\SysWOW64\fophgtajct.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924 -
C:\Windows\SysWOW64\cphubemtir.exeC:\Windows\system32\cphubemtir.exe 608 "C:\Windows\SysWOW64\sfrkobgrvg.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1120 -
C:\Windows\SysWOW64\pcqkhatywq.exeC:\Windows\system32\pcqkhatywq.exe 556 "C:\Windows\SysWOW64\cphubemtir.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:976 -
C:\Windows\SysWOW64\cttmqiqnxc.exeC:\Windows\system32\cttmqiqnxc.exe 616 "C:\Windows\SysWOW64\pcqkhatywq.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\mhukoqdjwb.exeC:\Windows\system32\mhukoqdjwb.exe 624 "C:\Windows\SysWOW64\cttmqiqnxc.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2368 -
C:\Windows\SysWOW64\wcnuvkehkm.exeC:\Windows\system32\wcnuvkehkm.exe 620 "C:\Windows\SysWOW64\mhukoqdjwb.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2136 -
C:\Windows\SysWOW64\jtpxeskoly.exeC:\Windows\system32\jtpxeskoly.exe 628 "C:\Windows\SysWOW64\wcnuvkehkm.exe"33⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\wrkanspvek.exeC:\Windows\system32\wrkanspvek.exe 632 "C:\Windows\SysWOW64\jtpxeskoly.exe"34⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\gflxlacrli.exeC:\Windows\system32\gflxlacrli.exe 636 "C:\Windows\SysWOW64\wrkanspvek.exe"35⤵
- Executes dropped EXE
PID:2456 -
C:\Windows\SysWOW64\tscnqeberi.exeC:\Windows\system32\tscnqeberi.exe 640 "C:\Windows\SysWOW64\gflxlacrli.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2348 -
C:\Windows\SysWOW64\aebsgxjrlf.exeC:\Windows\system32\aebsgxjrlf.exe 664 "C:\Windows\SysWOW64\tscnqeberi.exe"37⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\qtnamhnfff.exeC:\Windows\system32\qtnamhnfff.exe 644 "C:\Windows\SysWOW64\aebsgxjrlf.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\atrxfguffd.exeC:\Windows\system32\atrxfguffd.exe 648 "C:\Windows\SysWOW64\qtnamhnfff.exe"39⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\njuanosmfp.exeC:\Windows\system32\njuanosmfp.exe 652 "C:\Windows\SysWOW64\atrxfguffd.exe"40⤵
- Executes dropped EXE
PID:2488 -
C:\Windows\SysWOW64\wujkbrgosb.exeC:\Windows\system32\wujkbrgosb.exe 660 "C:\Windows\SysWOW64\njuanosmfp.exe"41⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\jkenjzewtn.exeC:\Windows\system32\jkenjzewtn.exe 656 "C:\Windows\SysWOW64\wujkbrgosb.exe"42⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\ujqkuylvtl.exeC:\Windows\system32\ujqkuylvtl.exe 676 "C:\Windows\SysWOW64\jkenjzewtn.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Windows\SysWOW64\jzbkahpknt.exeC:\Windows\system32\jzbkahpknt.exe 668 "C:\Windows\SysWOW64\ujqkuylvtl.exe"44⤵
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\tygqtgpknk.exeC:\Windows\system32\tygqtgpknk.exe 672 "C:\Windows\SysWOW64\jzbkahpknt.exe"45⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\gamxelbtar.exeC:\Windows\system32\gamxelbtar.exe 680 "C:\Windows\SysWOW64\tygqtgpknk.exe"46⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\qzyvpkatah.exeC:\Windows\system32\qzyvpkatah.exe 684 "C:\Windows\SysWOW64\gamxelbtar.exe"47⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\aknfknpnns.exeC:\Windows\system32\aknfknpnns.exe 688 "C:\Windows\SysWOW64\qzyvpkatah.exe"48⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\nxfdqrnabr.exeC:\Windows\system32\nxfdqrnabr.exe 692 "C:\Windows\SysWOW64\aknfknpnns.exe"49⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\xaufduuuod.exeC:\Windows\system32\xaufduuuod.exe 696 "C:\Windows\SysWOW64\nxfdqrnabr.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1632 -
C:\Windows\SysWOW64\kypilczbpp.exeC:\Windows\system32\kypilczbpp.exe 704 "C:\Windows\SysWOW64\xaufduuuod.exe"51⤵
- Executes dropped EXE
PID:2144 -
C:\Windows\SysWOW64\ubeszxgdba.exeC:\Windows\system32\ubeszxgdba.exe 700 "C:\Windows\SysWOW64\kypilczbpp.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\SysWOW64\hdkisjsnpa.exeC:\Windows\system32\hdkisjsnpa.exe 720 "C:\Windows\SysWOW64\ubeszxgdba.exe"53⤵
- Executes dropped EXE
PID:468 -
C:\Windows\SysWOW64\uqcyynrsvz.exeC:\Windows\system32\uqcyynrsvz.exe 708 "C:\Windows\SysWOW64\hdkisjsnpa.exe"54⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\bbbdnhzepw.exeC:\Windows\system32\bbbdnhzepw.exe 712 "C:\Windows\SysWOW64\uqcyynrsvz.exe"55⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\quxyxvbvvj.exeC:\Windows\system32\quxyxvbvvj.exe 728 "C:\Windows\SysWOW64\bbbdnhzepw.exe"56⤵
- Executes dropped EXE
PID:592 -
C:\Windows\SysWOW64\bqyiepkbju.exeC:\Windows\system32\bqyiepkbju.exe 724 "C:\Windows\SysWOW64\quxyxvbvvj.exe"57⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\qjvdolnsxq.exeC:\Windows\system32\qjvdolnsxq.exe 716 "C:\Windows\SysWOW64\bqyiepkbju.exe"58⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\aizbgkmrxo.exeC:\Windows\system32\aizbgkmrxo.exe 740 "C:\Windows\SysWOW64\qjvdolnsxq.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Windows\SysWOW64\nkfisoytkn.exeC:\Windows\system32\nkfisoytkn.exe 732 "C:\Windows\SysWOW64\aizbgkmrxo.exe"60⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\xjrocnytkl.exeC:\Windows\system32\xjrocnytkl.exe 748 "C:\Windows\SysWOW64\nkfisoytkn.exe"61⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\nzdojfcpem.exeC:\Windows\system32\nzdojfcpem.exe 736 "C:\Windows\SysWOW64\xjrocnytkl.exe"62⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\xcsywaijrx.exeC:\Windows\system32\xcsywaijrx.exe 756 "C:\Windows\SysWOW64\nzdojfcpem.exe"63⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\kpkocepwfw.exeC:\Windows\system32\kpkocepwfw.exe 744 "C:\Windows\SysWOW64\xcsywaijrx.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1228 -
C:\Windows\SysWOW64\mzzyxhvqsh.exeC:\Windows\system32\mzzyxhvqsh.exe 764 "C:\Windows\SysWOW64\kpkocepwfw.exe"65⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\SysWOW64\wcojkkbset.exeC:\Windows\system32\wcojkkbset.exe 760 "C:\Windows\SysWOW64\mzzyxhvqsh.exe"66⤵
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\jxgyqoaxts.exeC:\Windows\system32\jxgyqoaxts.exe 752 "C:\Windows\SysWOW64\wcojkkbset.exe"67⤵PID:2836
-
C:\Windows\SysWOW64\wobbzogete.exeC:\Windows\system32\wobbzogete.exe 768 "C:\Windows\SysWOW64\jxgyqoaxts.exe"68⤵PID:2884
-
C:\Windows\SysWOW64\jewepwlmmq.exeC:\Windows\system32\jewepwlmmq.exe 772 "C:\Windows\SysWOW64\wobbzogete.exe"69⤵PID:2000
-
C:\Windows\SysWOW64\sswbfeyilp.exeC:\Windows\system32\sswbfeyilp.exe 776 "C:\Windows\SysWOW64\jewepwlmmq.exe"70⤵PID:1412
-
C:\Windows\SysWOW64\frreoewxmb.exeC:\Windows\system32\frreoewxmb.exe 788 "C:\Windows\SysWOW64\sswbfeyilp.exe"71⤵
- Drops file in System32 directory
PID:1428 -
C:\Windows\SysWOW64\shugxmbenn.exeC:\Windows\system32\shugxmbenn.exe 780 "C:\Windows\SysWOW64\frreoewxmb.exe"72⤵PID:2076
-
C:\Windows\SysWOW64\ckjrspiyay.exeC:\Windows\system32\ckjrspiyay.exe 804 "C:\Windows\SysWOW64\shugxmbenn.exe"73⤵PID:2420
-
C:\Windows\SysWOW64\pieuaxngbl.exeC:\Windows\system32\pieuaxngbl.exe 792 "C:\Windows\SysWOW64\ckjrspiyay.exe"74⤵PID:1192
-
C:\Windows\SysWOW64\czhwjxtntx.exeC:\Windows\system32\czhwjxtntx.exe 784 "C:\Windows\SysWOW64\pieuaxngbl.exe"75⤵PID:1360
-
C:\Windows\SysWOW64\pxcrsfycuj.exeC:\Windows\system32\pxcrsfycuj.exe 808 "C:\Windows\SysWOW64\czhwjxtntx.exe"76⤵PID:2396
-
C:\Windows\SysWOW64\cowuaowjvv.exeC:\Windows\system32\cowuaowjvv.exe 800 "C:\Windows\SysWOW64\pxcrsfycuj.exe"77⤵PID:3052
-
C:\Windows\SysWOW64\oqcjmsiljv.exeC:\Windows\system32\oqcjmsiljv.exe 796 "C:\Windows\SysWOW64\cowuaowjvv.exe"78⤵PID:2780
-
C:\Windows\SysWOW64\yssuzvpnvg.exeC:\Windows\system32\yssuzvpnvg.exe 816 "C:\Windows\SysWOW64\oqcjmsiljv.exe"79⤵PID:2104
-
C:\Windows\SysWOW64\lrvwpduuws.exeC:\Windows\system32\lrvwpduuws.exe 812 "C:\Windows\SysWOW64\yssuzvpnvg.exe"80⤵PID:832
-
C:\Windows\SysWOW64\yhpzymsbpe.exeC:\Windows\system32\yhpzymsbpe.exe 820 "C:\Windows\SysWOW64\lrvwpduuws.exe"81⤵PID:1204
-
C:\Windows\SysWOW64\lykchmxjqr.exeC:\Windows\system32\lykchmxjqr.exe 824 "C:\Windows\SysWOW64\yhpzymsbpe.exe"82⤵
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\vmlrxtkfpp.exeC:\Windows\system32\vmlrxtkfpp.exe 828 "C:\Windows\SysWOW64\lykchmxjqr.exe"83⤵PID:2536
-
C:\Windows\SysWOW64\hkoufbimqb.exeC:\Windows\system32\hkoufbimqb.exe 832 "C:\Windows\SysWOW64\vmlrxtkfpp.exe"84⤵PID:792
-
C:\Windows\SysWOW64\ubixocnbrv.exeC:\Windows\system32\ubixocnbrv.exe 836 "C:\Windows\SysWOW64\hkoufbimqb.exe"85⤵PID:2864
-
C:\Windows\SysWOW64\hrdzwktjji.exeC:\Windows\system32\hrdzwktjji.exe 840 "C:\Windows\SysWOW64\ubixocnbrv.exe"86⤵PID:2268
-
C:\Windows\SysWOW64\utjpqwxkxh.exeC:\Windows\system32\utjpqwxkxh.exe 844 "C:\Windows\SysWOW64\hrdzwktjji.exe"87⤵PID:2596
-
C:\Windows\SysWOW64\eezzdremjs.exeC:\Windows\system32\eezzdremjs.exe 852 "C:\Windows\SysWOW64\utjpqwxkxh.exe"88⤵PID:2744
-
C:\Windows\SysWOW64\ruccmzjtkf.exeC:\Windows\system32\ruccmzjtkf.exe 864 "C:\Windows\SysWOW64\eezzdremjs.exe"89⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\elwfuipblr.exeC:\Windows\system32\elwfuipblr.exe 848 "C:\Windows\SysWOW64\ruccmzjtkf.exe"90⤵
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\rjrhdquied.exeC:\Windows\system32\rjrhdquied.exe 868 "C:\Windows\SysWOW64\elwfuipblr.exe"91⤵PID:612
-
C:\Windows\SysWOW64\eaucmqspfp.exeC:\Windows\system32\eaucmqspfp.exe 860 "C:\Windows\SysWOW64\rjrhdquied.exe"92⤵
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\nljmhtgrrb.exeC:\Windows\system32\nljmhtgrrb.exe 876 "C:\Windows\SysWOW64\eaucmqspfp.exe"93⤵PID:2816
-
C:\Windows\SysWOW64\abeppbeysn.exeC:\Windows\system32\abeppbeysn.exe 856 "C:\Windows\SysWOW64\nljmhtgrrb.exe"94⤵PID:2208
-
C:\Windows\SysWOW64\kmuzdesafy.exeC:\Windows\system32\kmuzdesafy.exe 872 "C:\Windows\SysWOW64\abeppbeysn.exe"95⤵PID:1608
-
C:\Windows\SysWOW64\xcwcleqigk.exeC:\Windows\system32\xcwcleqigk.exe 880 "C:\Windows\SysWOW64\kmuzdesafy.exe"96⤵
- Drops file in System32 directory
PID:284 -
C:\Windows\SysWOW64\ktrfunvpzx.exeC:\Windows\system32\ktrfunvpzx.exe 892 "C:\Windows\SysWOW64\xcwcleqigk.exe"97⤵
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\xrmikvbwzj.exeC:\Windows\system32\xrmikvbwzj.exe 884 "C:\Windows\SysWOW64\ktrfunvpzx.exe"98⤵
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Windows\SysWOW64\hfnfauoszh.exeC:\Windows\system32\hfnfauoszh.exe 888 "C:\Windows\SysWOW64\xrmikvbwzj.exe"99⤵
- Drops file in System32 directory
PID:2272 -
C:\Windows\SysWOW64\uwpijclaat.exeC:\Windows\system32\uwpijclaat.exe 900 "C:\Windows\SysWOW64\hfnfauoszh.exe"100⤵PID:1288
-
C:\Windows\SysWOW64\gyvpupyjnt.exeC:\Windows\system32\gyvpupyjnt.exe 908 "C:\Windows\SysWOW64\uwpijclaat.exe"101⤵PID:2320
-
C:\Windows\SysWOW64\tlffalwobs.exeC:\Windows\system32\tlffalwobs.exe 896 "C:\Windows\SysWOW64\gyvpupyjnt.exe"102⤵PID:1844
-
C:\Windows\SysWOW64\gnlvmxbyhr.exeC:\Windows\system32\gnlvmxbyhr.exe 904 "C:\Windows\SysWOW64\tlffalwobs.exe"103⤵PID:1592
-
C:\Windows\SysWOW64\qpifhahatc.exeC:\Windows\system32\qpifhahatc.exe 912 "C:\Windows\SysWOW64\gnlvmxbyhr.exe"104⤵PID:1772
-
C:\Windows\SysWOW64\dgdiqjnhup.exeC:\Windows\system32\dgdiqjnhup.exe 924 "C:\Windows\SysWOW64\qpifhahatc.exe"105⤵PID:2140
-
C:\Windows\SysWOW64\qeykyjsovb.exeC:\Windows\system32\qeykyjsovb.exe 936 "C:\Windows\SysWOW64\dgdiqjnhup.exe"106⤵
- Drops file in System32 directory
PID:1520 -
C:\Windows\SysWOW64\dvbnhrqvwv.exeC:\Windows\system32\dvbnhrqvwv.exe 932 "C:\Windows\SysWOW64\qeykyjsovb.exe"107⤵PID:2704
-
C:\Windows\SysWOW64\qtwqpzvdph.exeC:\Windows\system32\qtwqpzvdph.exe 916 "C:\Windows\SysWOW64\dvbnhrqvwv.exe"108⤵PID:1500
-
C:\Windows\SysWOW64\zwlalucfbl.exeC:\Windows\system32\zwlalucfbl.exe 920 "C:\Windows\SysWOW64\qtwqpzvdph.exe"109⤵
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\mugdtchmcf.exeC:\Windows\system32\mugdtchmcf.exe 944 "C:\Windows\SysWOW64\zwlalucfbl.exe"110⤵
- Drops file in System32 directory
PID:2500 -
C:\Windows\SysWOW64\zljyckntdr.exeC:\Windows\system32\zljyckntdr.exe 612 "C:\Windows\SysWOW64\mugdtchmcf.exe"111⤵PID:2416
-
C:\Windows\SysWOW64\jzjvssapcp.exeC:\Windows\system32\jzjvssapcp.exe 940 "C:\Windows\SysWOW64\zljyckntdr.exe"112⤵PID:852
-
C:\Windows\SysWOW64\wmtlyozuqp.exeC:\Windows\system32\wmtlyozuqp.exe 956 "C:\Windows\SysWOW64\jzjvssapcp.exe"113⤵PID:2336
-
C:\Windows\SysWOW64\bcongwejjb.exeC:\Windows\system32\bcongwejjb.exe 948 "C:\Windows\SysWOW64\wmtlyozuqp.exe"114⤵PID:1244
-
C:\Windows\SysWOW64\lnlybzkeem.exeC:\Windows\system32\lnlybzkeem.exe 972 "C:\Windows\SysWOW64\bcongwejjb.exe"115⤵PID:484
-
C:\Windows\SysWOW64\yegakhqlxy.exeC:\Windows\system32\yegakhqlxy.exe 964 "C:\Windows\SysWOW64\lnlybzkeem.exe"116⤵PID:2440
-
C:\Windows\SysWOW64\lcbdthosyl.exeC:\Windows\system32\lcbdthosyl.exe 960 "C:\Windows\SysWOW64\yegakhqlxy.exe"117⤵PID:1584
-
C:\Windows\SysWOW64\uibajpboxj.exeC:\Windows\system32\uibajpboxj.exe 952 "C:\Windows\SysWOW64\lcbdthosyl.exe"118⤵PID:1732
-
C:\Windows\SysWOW64\hhwdrxgeyv.exeC:\Windows\system32\hhwdrxgeyv.exe 980 "C:\Windows\SysWOW64\uibajpboxj.exe"119⤵PID:2656
-
C:\Windows\SysWOW64\uxzgixmlyh.exeC:\Windows\system32\uxzgixmlyh.exe 968 "C:\Windows\SysWOW64\hhwdrxgeyv.exe"120⤵PID:924
-
C:\Windows\SysWOW64\hwubqfjsru.exeC:\Windows\system32\hwubqfjsru.exe 976 "C:\Windows\SysWOW64\uxzgixmlyh.exe"121⤵PID:2092
-
C:\Windows\SysWOW64\umpdznpzsg.exeC:\Windows\system32\umpdznpzsg.exe 996 "C:\Windows\SysWOW64\hwubqfjsru.exe"122⤵
- Drops file in System32 directory
PID:1880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-