Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 13:23
Behavioral task
behavioral1
Sample
79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
150 seconds
General
-
Target
79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe
-
Size
113KB
-
MD5
79d5adce123b5ac2b43fa6f85cab19f7
-
SHA1
b655c1fd76c7e44c5fbf6a12d13f54b4209c626c
-
SHA256
2cb4c475804369cbb5b4200540038d393c3e21e42d56ea472d75e38a663271c8
-
SHA512
8ca88e2ad5537654b20e39a760661d73735d24e7263754f8bcc268d278c4e7790c21c31aeeb28f3860ada70ee4547cfa90989300fd8c7ac8fbcffc07f69c504b
-
SSDEEP
3072:+hzx6tb4TRlr6tne5UXnVUiMRvitdZ9w9XI:+hV9WeaavadZCX
Malware Config
Extracted
Family
gozi
Signatures
-
Gozi family
-
Executes dropped EXE 64 IoCs
pid Process 1732 gjoabde.exe 2260 tluqnpr.exe 2900 gnagguv.exe 2848 nvnysre.exe 2792 aptoewj.exe 2008 kkuytqj.exe 2616 uvkigtq.exe 2968 kzsdkgv.exe 3016 mywbvxu.exe 3028 wfiynwc.exe 2596 gixjbzi.exe 872 qhcglyp.exe 2208 dgejugv.exe 1920 iwbeqmh.exe 1368 yenlwec.exe 2224 kjeglmn.exe 1968 xihjtvt.exe 1876 kycmcdy.exe 2064 uucwrxz.exe 1744 hzmzggk.exe 2288 umdolkj.exe 2876 extzznp.exe 2096 rnobhvv.exe 3020 aylmcqb.exe 2904 nsrtodg.exe 1112 afbjuhm.exe 992 inwjowo.exe 2928 suahyvv.exe 3004 hnxuijy.exe 1348 ueswrrd.exe 2504 egpheuk.exe 3036 ociztos.exe 272 evfmdcv.exe 1956 ourknbc.exe 276 btmmwja.exe 776 lvbxjmo.exe 2196 vgqhepu.exe 1016 ixtknqa.exe 1816 vvomwyy.exe 380 eydxjbm.exe 3044 slvmpfl.exe 2712 enbcajp.exe 2308 rdwfrru.exe 1172 bolhevb.exe 1160 lnxnoti.exe 2528 bguayhl.exe 2672 iohssxu.exe 2660 xhencsx.exe 580 igqkmje.exe 1532 ylrfqwb.exe 1516 hzrcgeo.exe 1620 umjsmin.exe 1580 hkevvis.exe 1096 ryektpf.exe 1652 eloiyte.exe 1776 rcrlhtc.exe 1864 tngnuwq.exe 1868 ghmdoju.exe 1184 tudsunt.exe 536 gsyvcnz.exe 2188 qvofpqf.exe 2228 ctiiyyl.exe 2216 nsvgqxs.exe 2076 ajpizxq.exe -
Loads dropped DLL 64 IoCs
pid Process 1924 79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe 1924 79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe 1732 gjoabde.exe 1732 gjoabde.exe 2260 tluqnpr.exe 2260 tluqnpr.exe 2900 gnagguv.exe 2900 gnagguv.exe 2848 nvnysre.exe 2848 nvnysre.exe 2792 aptoewj.exe 2792 aptoewj.exe 2008 kkuytqj.exe 2008 kkuytqj.exe 2616 uvkigtq.exe 2616 uvkigtq.exe 2968 kzsdkgv.exe 2968 kzsdkgv.exe 3016 mywbvxu.exe 3016 mywbvxu.exe 3028 wfiynwc.exe 3028 wfiynwc.exe 2596 gixjbzi.exe 2596 gixjbzi.exe 872 qhcglyp.exe 872 qhcglyp.exe 2208 dgejugv.exe 2208 dgejugv.exe 1920 iwbeqmh.exe 1920 iwbeqmh.exe 1368 yenlwec.exe 1368 yenlwec.exe 2224 kjeglmn.exe 2224 kjeglmn.exe 1968 xihjtvt.exe 1968 xihjtvt.exe 1876 kycmcdy.exe 1876 kycmcdy.exe 2064 uucwrxz.exe 2064 uucwrxz.exe 1744 hzmzggk.exe 1744 hzmzggk.exe 2288 umdolkj.exe 2288 umdolkj.exe 2876 extzznp.exe 2876 extzznp.exe 2096 rnobhvv.exe 2096 rnobhvv.exe 3020 aylmcqb.exe 3020 aylmcqb.exe 2904 nsrtodg.exe 2904 nsrtodg.exe 1112 afbjuhm.exe 1112 afbjuhm.exe 992 inwjowo.exe 992 inwjowo.exe 2928 suahyvv.exe 2928 suahyvv.exe 3004 hnxuijy.exe 3004 hnxuijy.exe 1348 ueswrrd.exe 1348 ueswrrd.exe 2504 egpheuk.exe 2504 egpheuk.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tknopwd.exe glkmgnx.exe File created C:\Windows\SysWOW64\zvacaon.exe lajevko.exe File opened for modification C:\Windows\SysWOW64\fnsdzny.exe ssbntjz.exe File created C:\Windows\SysWOW64\kegojll.exe byfrtex.exe File opened for modification C:\Windows\SysWOW64\rnuvfqc.exe eskfzmd.exe File opened for modification C:\Windows\SysWOW64\pvlqanu.exe cxqnsfx.exe File opened for modification C:\Windows\SysWOW64\ijxtwbm.exe vkuqnbg.exe File opened for modification C:\Windows\SysWOW64\rpbuodd.exe eyyagvg.exe File created C:\Windows\SysWOW64\kdftjtb.exe xnkrbld.exe File created C:\Windows\SysWOW64\nzhbnmq.exe aepdhir.exe File created C:\Windows\SysWOW64\wfhqdud.exe nzhbnmq.exe File created C:\Windows\SysWOW64\budveol.exe owiswgg.exe File opened for modification C:\Windows\SysWOW64\rnknitj.exe ikvcmqd.exe File created C:\Windows\SysWOW64\jtbusoq.exe wcgrjok.exe File opened for modification C:\Windows\SysWOW64\opegnuj.exe ebeqpnw.exe File created C:\Windows\SysWOW64\blzlxlc.exe onwiodf.exe File opened for modification C:\Windows\SysWOW64\qmsowgf.exe doxmnyz.exe File opened for modification C:\Windows\SysWOW64\ifufubw.exe yruieur.exe File created C:\Windows\SysWOW64\kufzksc.exe xvlxbsw.exe File opened for modification C:\Windows\SysWOW64\zkocecj.exe pwnmovw.exe File opened for modification C:\Windows\SysWOW64\ffobdki.exe vrneecv.exe File opened for modification C:\Windows\SysWOW64\emwgmop.exe robddos.exe File opened for modification C:\Windows\SysWOW64\sprqwty.exe frwnols.exe File created C:\Windows\SysWOW64\tluqnpr.exe gjoabde.exe File created C:\Windows\SysWOW64\btmmwja.exe ourknbc.exe File created C:\Windows\SysWOW64\twudzdk.exe jxqgpfd.exe File opened for modification C:\Windows\SysWOW64\kkkzuzh.exe xmhwmrj.exe File created C:\Windows\SysWOW64\vrneecv.exe iedozgw.exe File created C:\Windows\SysWOW64\kbehqfs.exe acskxgk.exe File opened for modification C:\Windows\SysWOW64\beuolfw.exe oozldwr.exe File created C:\Windows\SysWOW64\tijjweg.exe gsggnwa.exe File opened for modification C:\Windows\SysWOW64\bkvgeuf.exe otsdvla.exe File opened for modification C:\Windows\SysWOW64\fbrxhuw.exe tlpuyur.exe File created C:\Windows\SysWOW64\duwkmrh.exe ydbidjc.exe File created C:\Windows\SysWOW64\ttkwast.exe gupuskn.exe File opened for modification C:\Windows\SysWOW64\pkckovc.exe cxtuisw.exe File opened for modification C:\Windows\SysWOW64\kwiosly.exe xyntjds.exe File created C:\Windows\SysWOW64\wnimsxh.exe nziouyu.exe File created C:\Windows\SysWOW64\oeoazxk.exe bntxqpf.exe File created C:\Windows\SysWOW64\tyfiurk.exe kkekejf.exe File opened for modification C:\Windows\SysWOW64\grivnuz.exe xgtlart.exe File created C:\Windows\SysWOW64\qrnghdq.exe dbtdyvl.exe File opened for modification C:\Windows\SysWOW64\waijzkh.exe nlhmjcu.exe File opened for modification C:\Windows\SysWOW64\ociztos.exe egpheuk.exe File opened for modification C:\Windows\SysWOW64\ctiiyyl.exe qvofpqf.exe File created C:\Windows\SysWOW64\xrfzvgn.exe nhqpidz.exe File created C:\Windows\SysWOW64\bkgvfvz.exe raqksst.exe File opened for modification C:\Windows\SysWOW64\tnfkzpx.exe gwchqor.exe File opened for modification C:\Windows\SysWOW64\zqaxiro.exe pflnnwa.exe File opened for modification C:\Windows\SysWOW64\vqcxdbt.exe iahuubv.exe File opened for modification C:\Windows\SysWOW64\guxgimq.exe twudzdk.exe File opened for modification C:\Windows\SysWOW64\huacvgz.exe xoaffyl.exe File created C:\Windows\SysWOW64\hzkruzu.exe ylkceah.exe File opened for modification C:\Windows\SysWOW64\ybisadf.exe oysinaz.exe File opened for modification C:\Windows\SysWOW64\zcmvbxg.exe meksspb.exe File created C:\Windows\SysWOW64\bwbofvz.exe rmmdkrt.exe File opened for modification C:\Windows\SysWOW64\xcbrsti.exe kegojll.exe File created C:\Windows\SysWOW64\iqhyjfb.exe vvpadbc.exe File opened for modification C:\Windows\SysWOW64\hjspisx.exe ukxmzkz.exe File opened for modification C:\Windows\SysWOW64\sttftbq.exe fuyckbk.exe File opened for modification C:\Windows\SysWOW64\hfjipyq.exe yrilrql.exe File created C:\Windows\SysWOW64\knzzfog.exe waijzkh.exe File opened for modification C:\Windows\SysWOW64\ibwwusb.exe vkbtlsv.exe File created C:\Windows\SysWOW64\gqbuqbt.exe trgrhao.exe -
resource yara_rule behavioral1/memory/1924-0-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/files/0x00070000000120fe-5.dat upx behavioral1/memory/1732-13-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1924-19-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1732-22-0x0000000002430000-0x00000000024CA000-memory.dmp upx behavioral1/memory/1732-31-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2260-43-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2848-52-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2900-55-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2848-66-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2008-77-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2616-90-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2792-84-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2008-95-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2616-104-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2968-118-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/3028-126-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/3016-128-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/3028-142-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2596-153-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/872-168-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2208-181-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1920-197-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1368-206-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2224-213-0x00000000023C0000-0x000000000245A000-memory.dmp upx behavioral1/memory/2224-218-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1968-222-0x0000000001EA0000-0x0000000001F3A000-memory.dmp upx behavioral1/memory/1968-230-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1876-234-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1744-242-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2064-244-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1744-254-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2876-258-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2288-260-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2876-269-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2096-276-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/3020-282-0x00000000025A0000-0x000000000263A000-memory.dmp upx behavioral1/memory/3020-284-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2904-292-0x0000000002420000-0x00000000024BA000-memory.dmp upx behavioral1/memory/2904-291-0x0000000002420000-0x00000000024BA000-memory.dmp upx behavioral1/memory/2904-293-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/992-301-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2928-311-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1112-302-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/992-315-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2928-323-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1348-329-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/3004-330-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1348-343-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/3036-348-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2504-350-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/3036-362-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/276-375-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/272-367-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1956-374-0x0000000001E50000-0x0000000001EEA000-memory.dmp upx behavioral1/memory/1956-378-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/276-386-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/776-398-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/2196-399-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1016-407-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/1816-417-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/3044-423-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/380-428-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral1/memory/3044-432-0x00000000026A0000-0x000000000273A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eloiyte.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ayhmhql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zfzqhlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjmsmtq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ypdztvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msqhoke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xgtlart.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language opjbjqj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzklvci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oexzedr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ikvcmqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aliywjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnsgioy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grlpwuc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eikcota.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnjmqyq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhubten.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gknsflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asmugfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ofqywtu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khedrue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language booktov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uncnngm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfsrvjy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mwunpmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvsuudf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bneesqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfpmaod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ekavgdw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdzekq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgfextf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnsdzny.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tijjweg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mvnlkap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdwwrck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnobhvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ozkodes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gojmjrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnunthv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ouvgykz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gygbndk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxznshi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ylrfqwb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpivgzs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unmzhdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lajevko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfdxnuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language suurtcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkuytqj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iedozgw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rryaafv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ojtlpbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmlrknv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gnagguv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skgjcar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hoaxlqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evcqpvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htlboqt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emwgmop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xihjtvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ociztos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bsorotn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qebhdlb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agpecml.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1732 1924 79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe 30 PID 1924 wrote to memory of 1732 1924 79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe 30 PID 1924 wrote to memory of 1732 1924 79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe 30 PID 1924 wrote to memory of 1732 1924 79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2260 1732 gjoabde.exe 31 PID 1732 wrote to memory of 2260 1732 gjoabde.exe 31 PID 1732 wrote to memory of 2260 1732 gjoabde.exe 31 PID 1732 wrote to memory of 2260 1732 gjoabde.exe 31 PID 2260 wrote to memory of 2900 2260 tluqnpr.exe 32 PID 2260 wrote to memory of 2900 2260 tluqnpr.exe 32 PID 2260 wrote to memory of 2900 2260 tluqnpr.exe 32 PID 2260 wrote to memory of 2900 2260 tluqnpr.exe 32 PID 2900 wrote to memory of 2848 2900 gnagguv.exe 33 PID 2900 wrote to memory of 2848 2900 gnagguv.exe 33 PID 2900 wrote to memory of 2848 2900 gnagguv.exe 33 PID 2900 wrote to memory of 2848 2900 gnagguv.exe 33 PID 2848 wrote to memory of 2792 2848 nvnysre.exe 34 PID 2848 wrote to memory of 2792 2848 nvnysre.exe 34 PID 2848 wrote to memory of 2792 2848 nvnysre.exe 34 PID 2848 wrote to memory of 2792 2848 nvnysre.exe 34 PID 2792 wrote to memory of 2008 2792 aptoewj.exe 35 PID 2792 wrote to memory of 2008 2792 aptoewj.exe 35 PID 2792 wrote to memory of 2008 2792 aptoewj.exe 35 PID 2792 wrote to memory of 2008 2792 aptoewj.exe 35 PID 2008 wrote to memory of 2616 2008 kkuytqj.exe 36 PID 2008 wrote to memory of 2616 2008 kkuytqj.exe 36 PID 2008 wrote to memory of 2616 2008 kkuytqj.exe 36 PID 2008 wrote to memory of 2616 2008 kkuytqj.exe 36 PID 2616 wrote to memory of 2968 2616 uvkigtq.exe 37 PID 2616 wrote to memory of 2968 2616 uvkigtq.exe 37 PID 2616 wrote to memory of 2968 2616 uvkigtq.exe 37 PID 2616 wrote to memory of 2968 2616 uvkigtq.exe 37 PID 2968 wrote to memory of 3016 2968 kzsdkgv.exe 38 PID 2968 wrote to memory of 3016 2968 kzsdkgv.exe 38 PID 2968 wrote to memory of 3016 2968 kzsdkgv.exe 38 PID 2968 wrote to memory of 3016 2968 kzsdkgv.exe 38 PID 3016 wrote to memory of 3028 3016 mywbvxu.exe 39 PID 3016 wrote to memory of 3028 3016 mywbvxu.exe 39 PID 3016 wrote to memory of 3028 3016 mywbvxu.exe 39 PID 3016 wrote to memory of 3028 3016 mywbvxu.exe 39 PID 3028 wrote to memory of 2596 3028 wfiynwc.exe 40 PID 3028 wrote to memory of 2596 3028 wfiynwc.exe 40 PID 3028 wrote to memory of 2596 3028 wfiynwc.exe 40 PID 3028 wrote to memory of 2596 3028 wfiynwc.exe 40 PID 2596 wrote to memory of 872 2596 gixjbzi.exe 41 PID 2596 wrote to memory of 872 2596 gixjbzi.exe 41 PID 2596 wrote to memory of 872 2596 gixjbzi.exe 41 PID 2596 wrote to memory of 872 2596 gixjbzi.exe 41 PID 872 wrote to memory of 2208 872 qhcglyp.exe 42 PID 872 wrote to memory of 2208 872 qhcglyp.exe 42 PID 872 wrote to memory of 2208 872 qhcglyp.exe 42 PID 872 wrote to memory of 2208 872 qhcglyp.exe 42 PID 2208 wrote to memory of 1920 2208 dgejugv.exe 43 PID 2208 wrote to memory of 1920 2208 dgejugv.exe 43 PID 2208 wrote to memory of 1920 2208 dgejugv.exe 43 PID 2208 wrote to memory of 1920 2208 dgejugv.exe 43 PID 1920 wrote to memory of 1368 1920 iwbeqmh.exe 44 PID 1920 wrote to memory of 1368 1920 iwbeqmh.exe 44 PID 1920 wrote to memory of 1368 1920 iwbeqmh.exe 44 PID 1920 wrote to memory of 1368 1920 iwbeqmh.exe 44 PID 1368 wrote to memory of 2224 1368 yenlwec.exe 45 PID 1368 wrote to memory of 2224 1368 yenlwec.exe 45 PID 1368 wrote to memory of 2224 1368 yenlwec.exe 45 PID 1368 wrote to memory of 2224 1368 yenlwec.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\gjoabde.exeC:\Windows\system32\gjoabde.exe 496 "C:\Users\Admin\AppData\Local\Temp\79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\tluqnpr.exeC:\Windows\system32\tluqnpr.exe 536 "C:\Windows\SysWOW64\gjoabde.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\gnagguv.exeC:\Windows\system32\gnagguv.exe 532 "C:\Windows\SysWOW64\tluqnpr.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\nvnysre.exeC:\Windows\system32\nvnysre.exe 544 "C:\Windows\SysWOW64\gnagguv.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\aptoewj.exeC:\Windows\system32\aptoewj.exe 540 "C:\Windows\SysWOW64\nvnysre.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\kkuytqj.exeC:\Windows\system32\kkuytqj.exe 564 "C:\Windows\SysWOW64\aptoewj.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\uvkigtq.exeC:\Windows\system32\uvkigtq.exe 548 "C:\Windows\SysWOW64\kkuytqj.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\kzsdkgv.exeC:\Windows\system32\kzsdkgv.exe 552 "C:\Windows\SysWOW64\uvkigtq.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\mywbvxu.exeC:\Windows\system32\mywbvxu.exe 556 "C:\Windows\SysWOW64\kzsdkgv.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\wfiynwc.exeC:\Windows\system32\wfiynwc.exe 572 "C:\Windows\SysWOW64\mywbvxu.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\gixjbzi.exeC:\Windows\system32\gixjbzi.exe 560 "C:\Windows\SysWOW64\wfiynwc.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\qhcglyp.exeC:\Windows\system32\qhcglyp.exe 584 "C:\Windows\SysWOW64\gixjbzi.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\dgejugv.exeC:\Windows\system32\dgejugv.exe 568 "C:\Windows\SysWOW64\qhcglyp.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\iwbeqmh.exeC:\Windows\system32\iwbeqmh.exe 576 "C:\Windows\SysWOW64\dgejugv.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\yenlwec.exeC:\Windows\system32\yenlwec.exe 588 "C:\Windows\SysWOW64\iwbeqmh.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\kjeglmn.exeC:\Windows\system32\kjeglmn.exe 592 "C:\Windows\SysWOW64\yenlwec.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2224 -
C:\Windows\SysWOW64\xihjtvt.exeC:\Windows\system32\xihjtvt.exe 580 "C:\Windows\SysWOW64\kjeglmn.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\kycmcdy.exeC:\Windows\system32\kycmcdy.exe 604 "C:\Windows\SysWOW64\xihjtvt.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1876 -
C:\Windows\SysWOW64\uucwrxz.exeC:\Windows\system32\uucwrxz.exe 596 "C:\Windows\SysWOW64\kycmcdy.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Windows\SysWOW64\hzmzggk.exeC:\Windows\system32\hzmzggk.exe 624 "C:\Windows\SysWOW64\uucwrxz.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1744 -
C:\Windows\SysWOW64\umdolkj.exeC:\Windows\system32\umdolkj.exe 608 "C:\Windows\SysWOW64\hzmzggk.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2288 -
C:\Windows\SysWOW64\extzznp.exeC:\Windows\system32\extzznp.exe 612 "C:\Windows\SysWOW64\umdolkj.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2876 -
C:\Windows\SysWOW64\rnobhvv.exeC:\Windows\system32\rnobhvv.exe 600 "C:\Windows\SysWOW64\extzznp.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\aylmcqb.exeC:\Windows\system32\aylmcqb.exe 628 "C:\Windows\SysWOW64\rnobhvv.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3020 -
C:\Windows\SysWOW64\nsrtodg.exeC:\Windows\system32\nsrtodg.exe 620 "C:\Windows\SysWOW64\aylmcqb.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904 -
C:\Windows\SysWOW64\afbjuhm.exeC:\Windows\system32\afbjuhm.exe 616 "C:\Windows\SysWOW64\nsrtodg.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1112 -
C:\Windows\SysWOW64\inwjowo.exeC:\Windows\system32\inwjowo.exe 636 "C:\Windows\SysWOW64\afbjuhm.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:992 -
C:\Windows\SysWOW64\suahyvv.exeC:\Windows\system32\suahyvv.exe 640 "C:\Windows\SysWOW64\inwjowo.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2928 -
C:\Windows\SysWOW64\hnxuijy.exeC:\Windows\system32\hnxuijy.exe 632 "C:\Windows\SysWOW64\suahyvv.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004 -
C:\Windows\SysWOW64\ueswrrd.exeC:\Windows\system32\ueswrrd.exe 644 "C:\Windows\SysWOW64\hnxuijy.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1348 -
C:\Windows\SysWOW64\egpheuk.exeC:\Windows\system32\egpheuk.exe 648 "C:\Windows\SysWOW64\ueswrrd.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\ociztos.exeC:\Windows\system32\ociztos.exe 656 "C:\Windows\SysWOW64\egpheuk.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Windows\SysWOW64\evfmdcv.exeC:\Windows\system32\evfmdcv.exe 652 "C:\Windows\SysWOW64\ociztos.exe"34⤵
- Executes dropped EXE
PID:272 -
C:\Windows\SysWOW64\ourknbc.exeC:\Windows\system32\ourknbc.exe 660 "C:\Windows\SysWOW64\evfmdcv.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1956 -
C:\Windows\SysWOW64\btmmwja.exeC:\Windows\system32\btmmwja.exe 664 "C:\Windows\SysWOW64\ourknbc.exe"36⤵
- Executes dropped EXE
PID:276 -
C:\Windows\SysWOW64\lvbxjmo.exeC:\Windows\system32\lvbxjmo.exe 668 "C:\Windows\SysWOW64\btmmwja.exe"37⤵
- Executes dropped EXE
PID:776 -
C:\Windows\SysWOW64\vgqhepu.exeC:\Windows\system32\vgqhepu.exe 672 "C:\Windows\SysWOW64\lvbxjmo.exe"38⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\ixtknqa.exeC:\Windows\system32\ixtknqa.exe 680 "C:\Windows\SysWOW64\vgqhepu.exe"39⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\SysWOW64\vvomwyy.exeC:\Windows\system32\vvomwyy.exe 688 "C:\Windows\SysWOW64\ixtknqa.exe"40⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\eydxjbm.exeC:\Windows\system32\eydxjbm.exe 676 "C:\Windows\SysWOW64\vvomwyy.exe"41⤵
- Executes dropped EXE
PID:380 -
C:\Windows\SysWOW64\slvmpfl.exeC:\Windows\system32\slvmpfl.exe 692 "C:\Windows\SysWOW64\eydxjbm.exe"42⤵
- Executes dropped EXE
PID:3044 -
C:\Windows\SysWOW64\enbcajp.exeC:\Windows\system32\enbcajp.exe 684 "C:\Windows\SysWOW64\slvmpfl.exe"43⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\rdwfrru.exeC:\Windows\system32\rdwfrru.exe 704 "C:\Windows\SysWOW64\enbcajp.exe"44⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\bolhevb.exeC:\Windows\system32\bolhevb.exe 696 "C:\Windows\SysWOW64\rdwfrru.exe"45⤵
- Executes dropped EXE
PID:1172 -
C:\Windows\SysWOW64\lnxnoti.exeC:\Windows\system32\lnxnoti.exe 708 "C:\Windows\SysWOW64\bolhevb.exe"46⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\bguayhl.exeC:\Windows\system32\bguayhl.exe 700 "C:\Windows\SysWOW64\lnxnoti.exe"47⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\SysWOW64\iohssxu.exeC:\Windows\system32\iohssxu.exe 716 "C:\Windows\SysWOW64\bguayhl.exe"48⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\SysWOW64\xhencsx.exeC:\Windows\system32\xhencsx.exe 712 "C:\Windows\SysWOW64\iohssxu.exe"49⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\igqkmje.exeC:\Windows\system32\igqkmje.exe 732 "C:\Windows\SysWOW64\xhencsx.exe"50⤵
- Executes dropped EXE
PID:580 -
C:\Windows\SysWOW64\ylrfqwb.exeC:\Windows\system32\ylrfqwb.exe 720 "C:\Windows\SysWOW64\igqkmje.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\hzrcgeo.exeC:\Windows\system32\hzrcgeo.exe 736 "C:\Windows\SysWOW64\ylrfqwb.exe"52⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\umjsmin.exeC:\Windows\system32\umjsmin.exe 728 "C:\Windows\SysWOW64\hzrcgeo.exe"53⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\hkevvis.exeC:\Windows\system32\hkevvis.exe 724 "C:\Windows\SysWOW64\umjsmin.exe"54⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\ryektpf.exeC:\Windows\system32\ryektpf.exe 740 "C:\Windows\SysWOW64\hkevvis.exe"55⤵
- Executes dropped EXE
PID:1096 -
C:\Windows\SysWOW64\eloiyte.exeC:\Windows\system32\eloiyte.exe 744 "C:\Windows\SysWOW64\ryektpf.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Windows\SysWOW64\rcrlhtc.exeC:\Windows\system32\rcrlhtc.exe 756 "C:\Windows\SysWOW64\eloiyte.exe"57⤵
- Executes dropped EXE
PID:1776 -
C:\Windows\SysWOW64\tngnuwq.exeC:\Windows\system32\tngnuwq.exe 752 "C:\Windows\SysWOW64\rcrlhtc.exe"58⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\ghmdoju.exeC:\Windows\system32\ghmdoju.exe 760 "C:\Windows\SysWOW64\tngnuwq.exe"59⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\tudsunt.exeC:\Windows\system32\tudsunt.exe 528 "C:\Windows\SysWOW64\ghmdoju.exe"60⤵
- Executes dropped EXE
PID:1184 -
C:\Windows\SysWOW64\gsyvcnz.exeC:\Windows\system32\gsyvcnz.exe 764 "C:\Windows\SysWOW64\tudsunt.exe"61⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\qvofpqf.exeC:\Windows\system32\qvofpqf.exe 776 "C:\Windows\SysWOW64\gsyvcnz.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2188 -
C:\Windows\SysWOW64\ctiiyyl.exeC:\Windows\system32\ctiiyyl.exe 772 "C:\Windows\SysWOW64\qvofpqf.exe"63⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\nsvgqxs.exeC:\Windows\system32\nsvgqxs.exe 780 "C:\Windows\SysWOW64\ctiiyyl.exe"64⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\ajpizxq.exeC:\Windows\system32\ajpizxq.exe 784 "C:\Windows\SysWOW64\nsvgqxs.exe"65⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\jxqgpfd.exeC:\Windows\system32\jxqgpfd.exe 768 "C:\Windows\SysWOW64\ajpizxq.exe"66⤵
- Drops file in System32 directory
PID:2736 -
C:\Windows\SysWOW64\twudzdk.exeC:\Windows\system32\twudzdk.exe 800 "C:\Windows\SysWOW64\jxqgpfd.exe"67⤵
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\guxgimq.exeC:\Windows\system32\guxgimq.exe 796 "C:\Windows\SysWOW64\twudzdk.exe"68⤵PID:2840
-
C:\Windows\SysWOW64\thhvwpp.exeC:\Windows\system32\thhvwpp.exe 792 "C:\Windows\SysWOW64\guxgimq.exe"69⤵PID:236
-
C:\Windows\SysWOW64\dvhtmpc.exeC:\Windows\system32\dvhtmpc.exe 788 "C:\Windows\SysWOW64\thhvwpp.exe"70⤵PID:2944
-
C:\Windows\SysWOW64\qmkwuxz.exeC:\Windows\system32\qmkwuxz.exe 804 "C:\Windows\SysWOW64\dvhtmpc.exe"71⤵PID:684
-
C:\Windows\SysWOW64\dzulabg.exeC:\Windows\system32\dzulabg.exe 812 "C:\Windows\SysWOW64\qmkwuxz.exe"72⤵PID:2896
-
C:\Windows\SysWOW64\nnujyil.exeC:\Windows\system32\nnujyil.exe 808 "C:\Windows\SysWOW64\dzulabg.exe"73⤵PID:2940
-
C:\Windows\SysWOW64\aepdhir.exeC:\Windows\system32\aepdhir.exe 820 "C:\Windows\SysWOW64\nnujyil.exe"74⤵
- Drops file in System32 directory
PID:1904 -
C:\Windows\SysWOW64\nzhbnmq.exeC:\Windows\system32\nzhbnmq.exe 816 "C:\Windows\SysWOW64\aepdhir.exe"75⤵
- Drops file in System32 directory
PID:2164 -
C:\Windows\SysWOW64\wfhqdud.exeC:\Windows\system32\wfhqdud.exe 824 "C:\Windows\SysWOW64\nzhbnmq.exe"76⤵PID:1272
-
C:\Windows\SysWOW64\kargjyb.exeC:\Windows\system32\kargjyb.exe 840 "C:\Windows\SysWOW64\wfhqdud.exe"77⤵PID:3040
-
C:\Windows\SysWOW64\xqujryh.exeC:\Windows\system32\xqujryh.exe 836 "C:\Windows\SysWOW64\kargjyb.exe"78⤵PID:1640
-
C:\Windows\SysWOW64\geugpfu.exeC:\Windows\system32\geugpfu.exe 832 "C:\Windows\SysWOW64\xqujryh.exe"79⤵PID:908
-
C:\Windows\SysWOW64\tvpjyna.exeC:\Windows\system32\tvpjyna.exe 852 "C:\Windows\SysWOW64\geugpfu.exe"80⤵PID:568
-
C:\Windows\SysWOW64\glkmgnx.exeC:\Windows\system32\glkmgnx.exe 844 "C:\Windows\SysWOW64\tvpjyna.exe"81⤵
- Drops file in System32 directory
PID:1756 -
C:\Windows\SysWOW64\tknopwd.exeC:\Windows\system32\tknopwd.exe 848 "C:\Windows\SysWOW64\glkmgnx.exe"82⤵PID:1928
-
C:\Windows\SysWOW64\gahryei.exeC:\Windows\system32\gahryei.exe 828 "C:\Windows\SysWOW64\tknopwd.exe"83⤵PID:1596
-
C:\Windows\SysWOW64\poigwlv.exeC:\Windows\system32\poigwlv.exe 864 "C:\Windows\SysWOW64\gahryei.exe"84⤵PID:2920
-
C:\Windows\SysWOW64\cfdjelt.exeC:\Windows\system32\cfdjelt.exe 872 "C:\Windows\SysWOW64\poigwlv.exe"85⤵PID:1564
-
C:\Windows\SysWOW64\qauhkpa.exeC:\Windows\system32\qauhkpa.exe 868 "C:\Windows\SysWOW64\cfdjelt.exe"86⤵PID:2784
-
C:\Windows\SysWOW64\zgvwaxf.exeC:\Windows\system32\zgvwaxf.exe 860 "C:\Windows\SysWOW64\qauhkpa.exe"87⤵PID:2776
-
C:\Windows\SysWOW64\mbfmgbm.exeC:\Windows\system32\mbfmgbm.exe 856 "C:\Windows\SysWOW64\zgvwaxf.exe"88⤵PID:2080
-
C:\Windows\SysWOW64\zrhoobj.exeC:\Windows\system32\zrhoobj.exe 880 "C:\Windows\SysWOW64\mbfmgbm.exe"89⤵PID:1028
-
C:\Windows\SysWOW64\jrlmhzr.exeC:\Windows\system32\jrlmhzr.exe 888 "C:\Windows\SysWOW64\zrhoobj.exe"90⤵PID:2868
-
C:\Windows\SysWOW64\uqyrryy.exeC:\Windows\system32\uqyrryy.exe 892 "C:\Windows\SysWOW64\jrlmhzr.exe"91⤵PID:2460
-
C:\Windows\SysWOW64\deqhhgl.exeC:\Windows\system32\deqhhgl.exe 900 "C:\Windows\SysWOW64\uqyrryy.exe"92⤵PID:2988
-
C:\Windows\SysWOW64\qctjqoj.exeC:\Windows\system32\qctjqoj.exe 884 "C:\Windows\SysWOW64\deqhhgl.exe"93⤵PID:1760
-
C:\Windows\SysWOW64\dpdzekq.exeC:\Windows\system32\dpdzekq.exe 904 "C:\Windows\SysWOW64\qctjqoj.exe"94⤵
- System Location Discovery: System Language Discovery
PID:2004 -
C:\Windows\SysWOW64\nssjrnw.exeC:\Windows\system32\nssjrnw.exe 876 "C:\Windows\SysWOW64\dpdzekq.exe"95⤵PID:2424
-
C:\Windows\SysWOW64\aqvmavb.exeC:\Windows\system32\aqvmavb.exe 896 "C:\Windows\SysWOW64\nssjrnw.exe"96⤵PID:2140
-
C:\Windows\SysWOW64\nhqpidz.exeC:\Windows\system32\nhqpidz.exe 908 "C:\Windows\SysWOW64\aqvmavb.exe"97⤵
- Drops file in System32 directory
PID:2348 -
C:\Windows\SysWOW64\xrfzvgn.exeC:\Windows\system32\xrfzvgn.exe 920 "C:\Windows\SysWOW64\nhqpidz.exe"98⤵PID:1884
-
C:\Windows\SysWOW64\kiicmgl.exeC:\Windows\system32\kiicmgl.exe 912 "C:\Windows\SysWOW64\xrfzvgn.exe"99⤵PID:916
-
C:\Windows\SysWOW64\ukxmzkz.exeC:\Windows\system32\ukxmzkz.exe 916 "C:\Windows\SysWOW64\kiicmgl.exe"100⤵
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\hjspisx.exeC:\Windows\system32\hjspisx.exe 928 "C:\Windows\SysWOW64\ukxmzkz.exe"101⤵PID:1704
-
C:\Windows\SysWOW64\rmhzvvl.exeC:\Windows\system32\rmhzvvl.exe 936 "C:\Windows\SysWOW64\hjspisx.exe"102⤵PID:320
-
C:\Windows\SysWOW64\dkkcmvj.exeC:\Windows\system32\dkkcmvj.exe 944 "C:\Windows\SysWOW64\rmhzvvl.exe"103⤵PID:1592
-
C:\Windows\SysWOW64\qbffudo.exeC:\Windows\system32\qbffudo.exe 948 "C:\Windows\SysWOW64\dkkcmvj.exe"104⤵PID:2772
-
C:\Windows\SysWOW64\dzazdlu.exeC:\Windows\system32\dzazdlu.exe 924 "C:\Windows\SysWOW64\qbffudo.exe"105⤵PID:2764
-
C:\Windows\SysWOW64\iqdcllr.exeC:\Windows\system32\iqdcllr.exe 960 "C:\Windows\SysWOW64\dzazdlu.exe"106⤵PID:2756
-
C:\Windows\SysWOW64\sevzbte.exeC:\Windows\system32\sevzbte.exe 956 "C:\Windows\SysWOW64\iqdcllr.exe"107⤵PID:2796
-
C:\Windows\SysWOW64\fuyckbk.exeC:\Windows\system32\fuyckbk.exe 932 "C:\Windows\SysWOW64\sevzbte.exe"108⤵
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\sttftbq.exeC:\Windows\system32\sttftbq.exe 952 "C:\Windows\SysWOW64\fuyckbk.exe"109⤵PID:2992
-
C:\Windows\SysWOW64\fjoijjn.exeC:\Windows\system32\fjoijjn.exe 968 "C:\Windows\SysWOW64\sttftbq.exe"110⤵PID:1624
-
C:\Windows\SysWOW64\raqksst.exeC:\Windows\system32\raqksst.exe 940 "C:\Windows\SysWOW64\fjoijjn.exe"111⤵
- Drops file in System32 directory
PID:1280 -
C:\Windows\SysWOW64\bkgvfvz.exeC:\Windows\system32\bkgvfvz.exe 984 "C:\Windows\SysWOW64\raqksst.exe"112⤵PID:1456
-
C:\Windows\SysWOW64\obbxove.exeC:\Windows\system32\obbxove.exe 972 "C:\Windows\SysWOW64\bkgvfvz.exe"113⤵PID:2024
-
C:\Windows\SysWOW64\yinvyum.exeC:\Windows\system32\yinvyum.exe 976 "C:\Windows\SysWOW64\obbxove.exe"114⤵PID:2272
-
C:\Windows\SysWOW64\lyixpcs.exeC:\Windows\system32\lyixpcs.exe 980 "C:\Windows\SysWOW64\yinvyum.exe"115⤵PID:1940
-
C:\Windows\SysWOW64\vminfjx.exeC:\Windows\system32\vminfjx.exe 992 "C:\Windows\SysWOW64\lyixpcs.exe"116⤵PID:3008
-
C:\Windows\SysWOW64\izsllnd.exeC:\Windows\system32\izsllnd.exe 988 "C:\Windows\SysWOW64\vminfjx.exe"117⤵PID:1944
-
C:\Windows\SysWOW64\vqvftnb.exeC:\Windows\system32\vqvftnb.exe 996 "C:\Windows\SysWOW64\izsllnd.exe"118⤵PID:2468
-
C:\Windows\SysWOW64\fevdrvo.exeC:\Windows\system32\fevdrvo.exe 1000 "C:\Windows\SysWOW64\vqvftnb.exe"119⤵PID:3052
-
C:\Windows\SysWOW64\srfsxzn.exeC:\Windows\system32\srfsxzn.exe 1012 "C:\Windows\SysWOW64\fevdrvo.exe"120⤵PID:1748
-
C:\Windows\SysWOW64\fpivgzs.exeC:\Windows\system32\fpivgzs.exe 964 "C:\Windows\SysWOW64\srfsxzn.exe"121⤵
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\owiswgg.exeC:\Windows\system32\owiswgg.exe 1008 "C:\Windows\SysWOW64\fpivgzs.exe"122⤵
- Drops file in System32 directory
PID:1808
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-