Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 13:23
Behavioral task
behavioral1
Sample
79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
8 signatures
150 seconds
General
-
Target
79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe
-
Size
113KB
-
MD5
79d5adce123b5ac2b43fa6f85cab19f7
-
SHA1
b655c1fd76c7e44c5fbf6a12d13f54b4209c626c
-
SHA256
2cb4c475804369cbb5b4200540038d393c3e21e42d56ea472d75e38a663271c8
-
SHA512
8ca88e2ad5537654b20e39a760661d73735d24e7263754f8bcc268d278c4e7790c21c31aeeb28f3860ada70ee4547cfa90989300fd8c7ac8fbcffc07f69c504b
-
SSDEEP
3072:+hzx6tb4TRlr6tne5UXnVUiMRvitdZ9w9XI:+hV9WeaavadZCX
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2592 qspagga.exe 1048 ywrnxrd.exe 1796 yzefldh.exe 2116 ihqdwcp.exe 3572 vxkfecm.exe 2040 ikcvkgl.exe 4296 tgvgaau.exe 4168 fijvlny.exe 3716 qazbqda.exe 1488 dqtdzly.exe 2960 tvuydqd.exe 1720 azeembf.exe 2668 nbktfok.exe 4508 dchbzxi.exe 3112 nblzrwp.exe 1100 xixwbup.exe 2980 nqjeies.exe 5032 yljoqyt.exe 3144 lytmwcs.exe 1400 vffkobz.exe 1844 lnrknld.exe 4864 ssbxewg.exe 4348 iwbsijc.exe 2360 ssccqdl.exe 4360 ilzxzro.exe 1080 tdodehi.exe 1952 fujxnpn.exe 4528 thbvttm.exe 1472 crqfowa.exe 4816 qbwiros.exe 2680 dooyxsz.exe 4064 qqunied.exe 4276 alnyqze.exe 1084 ncqbyhk.exe 1680 xxitobk.exe 1524 ncroshh.exe 1392 yxryzbi.exe 1320 iewwkap.exe 4976 vrnmqeo.exe 1516 iexbviv.exe 2648 vvaeeis.exe 4412 fgpozlh.exe 452 nkpjdye.exe 3720 axhzjuc.exe 1136 lsirrod.exe 4936 vampbnl.exe 648 indfhrj.exe 1984 vdyhyzp.exe 2064 fccfiyx.exe 416 sbfhryu.exe 4340 cwyaytd.exe 3512 qgedbsv.exe 3660 caksnfh.exe 4780 pynvdnf.exe 4456 aqdsidh.exe 2196 qyoapmk.exe 64 axsyzlk.exe 4460 kttqhgt.exe 4568 ajfqopo.exe 4592 nslbrpo.exe 5024 xvalmsu.exe 4472 kqsbswb.exe 2336 vmtlzqc.exe 644 lqtgdvz.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\hvurbwg.exe qufbavi.exe File created C:\Windows\SysWOW64\jznitmk.exe wjtfkem.exe File opened for modification C:\Windows\SysWOW64\foqsksk.exe vpmustc.exe File opened for modification C:\Windows\SysWOW64\sflpltr.exe fscrfxs.exe File created C:\Windows\SysWOW64\xoibvch.exe mpevlda.exe File opened for modification C:\Windows\SysWOW64\nuuwkjf.exe awrtbba.exe File created C:\Windows\SysWOW64\iezcysu.exe vrhmspv.exe File opened for modification C:\Windows\SysWOW64\hctjrry.exe umqgajs.exe File opened for modification C:\Windows\SysWOW64\ncroshh.exe xxitobk.exe File created C:\Windows\SysWOW64\ayynawk.exe nivkrwe.exe File opened for modification C:\Windows\SysWOW64\ynlewhm.exe laugqln.exe File opened for modification C:\Windows\SysWOW64\icypxfl.exe vhharbm.exe File created C:\Windows\SysWOW64\xyqbjxj.exe khoybxl.exe File created C:\Windows\SysWOW64\hcohbgd.exe upfrwcw.exe File created C:\Windows\SysWOW64\scxbtih.exe idlvjjz.exe File opened for modification C:\Windows\SysWOW64\kkygfqe.exe ioywxve.exe File created C:\Windows\SysWOW64\mulahdz.exe csvytat.exe File opened for modification C:\Windows\SysWOW64\dbwxghz.exe trhntet.exe File created C:\Windows\SysWOW64\iznuasm.exe vmefuoo.exe File created C:\Windows\SysWOW64\tuoxfkk.exe fhwizgl.exe File created C:\Windows\SysWOW64\lsirrod.exe axhzjuc.exe File created C:\Windows\SysWOW64\xmgbkco.exe krwmeyq.exe File opened for modification C:\Windows\SysWOW64\bbqlbig.exe rueorkh.exe File created C:\Windows\SysWOW64\uevrioq.exe kcfhnlc.exe File created C:\Windows\SysWOW64\oslwfms.exe ethzvol.exe File created C:\Windows\SysWOW64\mkesspy.exe gpvcmlz.exe File created C:\Windows\SysWOW64\ehllrgc.exe rjrijyx.exe File created C:\Windows\SysWOW64\olrrjho.exe bvwwayr.exe File opened for modification C:\Windows\SysWOW64\ouvxodi.exe ejgmtiu.exe File created C:\Windows\SysWOW64\wcvfluc.exe jladdux.exe File created C:\Windows\SysWOW64\pkwyqwy.exe cpniksz.exe File opened for modification C:\Windows\SysWOW64\tfuvwap.exe feoktbx.exe File opened for modification C:\Windows\SysWOW64\trhntet.exe gepxnju.exe File opened for modification C:\Windows\SysWOW64\ekcjxmr.exe uaeykil.exe File created C:\Windows\SysWOW64\azfqewq.exe obkovok.exe File created C:\Windows\SysWOW64\ntkdjtp.exe cugyqui.exe File opened for modification C:\Windows\SysWOW64\jznitmk.exe wjtfkem.exe File opened for modification C:\Windows\SysWOW64\ucmbdbt.exe higmrwp.exe File opened for modification C:\Windows\SysWOW64\aiwcwti.exe pjrfmub.exe File created C:\Windows\SysWOW64\nxdztoz.exe akujntt.exe File created C:\Windows\SysWOW64\ohiwfrq.exe bmrhanr.exe File opened for modification C:\Windows\SysWOW64\qojtaek.exe dbaeuam.exe File opened for modification C:\Windows\SysWOW64\qufbavi.exe griresc.exe File created C:\Windows\SysWOW64\wiodvak.exe jvenpwl.exe File opened for modification C:\Windows\SysWOW64\yllzyxc.exe oeycnyu.exe File created C:\Windows\SysWOW64\ynlmzll.exe oozphmd.exe File opened for modification C:\Windows\SysWOW64\pkwyqwy.exe cpniksz.exe File created C:\Windows\SysWOW64\kqsbswb.exe xvalmsu.exe File opened for modification C:\Windows\SysWOW64\piuylbj.exe cjrvdbd.exe File created C:\Windows\SysWOW64\vhharbm.exe iuxklxf.exe File opened for modification C:\Windows\SysWOW64\byjopkn.exe olrrjho.exe File created C:\Windows\SysWOW64\bndmlqr.exe oslwfms.exe File created C:\Windows\SysWOW64\oozphmd.exe abqzbqe.exe File created C:\Windows\SysWOW64\fpeqwxf.exe sqbonxa.exe File opened for modification C:\Windows\SysWOW64\amvwpgj.exe qkxmcdd.exe File created C:\Windows\SysWOW64\cdurozc.exe mufjnye.exe File opened for modification C:\Windows\SysWOW64\zbiamxb.exe morkgtc.exe File created C:\Windows\SysWOW64\vvyhwmu.exe ifwenew.exe File opened for modification C:\Windows\SysWOW64\zumfxab.exe merdpzd.exe File created C:\Windows\SysWOW64\ymhkkzq.exe ondnzbj.exe File created C:\Windows\SysWOW64\vkokdgv.exe llknsiw.exe File created C:\Windows\SysWOW64\gjhexox.exe twxorkz.exe File created C:\Windows\SysWOW64\vrraewa.exe iezcysu.exe File created C:\Windows\SysWOW64\pbqaand.exe ckoxsny.exe -
resource yara_rule behavioral2/memory/3808-0-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/files/0x000c000000023b5f-6.dat upx behavioral2/memory/3808-8-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2592-19-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1796-22-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1048-28-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1796-37-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3572-38-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2116-42-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3572-49-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2040-57-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4296-64-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4168-71-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3716-76-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2960-80-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1488-85-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2668-95-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2960-92-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1720-99-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2668-105-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4508-109-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3112-118-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1100-125-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2980-133-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/5032-139-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3144-146-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1400-152-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1844-156-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4864-166-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4348-173-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2360-177-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4360-182-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1080-192-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1952-198-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4528-205-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1472-212-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4816-216-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2680-225-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4064-230-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4276-235-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1680-237-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1084-241-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1680-243-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1524-250-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1392-255-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1320-257-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4976-264-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1516-268-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2648-270-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4412-278-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/452-279-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3720-287-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1136-292-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4936-297-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/648-302-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2064-303-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/1984-307-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/2064-312-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/416-317-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4340-322-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3512-327-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/3660-333-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4780-338-0x0000000000400000-0x000000000049A000-memory.dmp upx behavioral2/memory/4456-342-0x0000000000400000-0x000000000049A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uepttfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ehuydga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tqbgstt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gbhdwtc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfgfcka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qazbqda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wogolqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cugyqui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsnuinn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language azfyaao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aqdsidh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nthdgai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egpjkvi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdvhmk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qpuubua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axsyzlk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kqtozzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dccevqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aakkaxm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbiamxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtquuyl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrmpokp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zqcgidf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wufgwhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kqsbswb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziafnsy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language krolclu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbrwcgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language euygbgp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lytctoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moyoksi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isusskn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yljoqyt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lytmwcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nkhyiqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jzovetq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kttqhgt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csvytat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hzfektj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jwfsngv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xehouoz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjaemfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ixfajkc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vltserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kbzigch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrraewa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ajgdgky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljzmrrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keqpsgy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pkcorpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umobqwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdtvyxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxnzsds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qasoetj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mulahdz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvkmwed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jladehk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oncugtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language okvpuvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwoxnev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avujbzh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mufjnye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aiwcwti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yjawbkd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3808 wrote to memory of 2592 3808 79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe 85 PID 3808 wrote to memory of 2592 3808 79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe 85 PID 3808 wrote to memory of 2592 3808 79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe 85 PID 2592 wrote to memory of 1048 2592 qspagga.exe 86 PID 2592 wrote to memory of 1048 2592 qspagga.exe 86 PID 2592 wrote to memory of 1048 2592 qspagga.exe 86 PID 1048 wrote to memory of 1796 1048 ywrnxrd.exe 87 PID 1048 wrote to memory of 1796 1048 ywrnxrd.exe 87 PID 1048 wrote to memory of 1796 1048 ywrnxrd.exe 87 PID 1796 wrote to memory of 2116 1796 yzefldh.exe 88 PID 1796 wrote to memory of 2116 1796 yzefldh.exe 88 PID 1796 wrote to memory of 2116 1796 yzefldh.exe 88 PID 2116 wrote to memory of 3572 2116 ihqdwcp.exe 91 PID 2116 wrote to memory of 3572 2116 ihqdwcp.exe 91 PID 2116 wrote to memory of 3572 2116 ihqdwcp.exe 91 PID 3572 wrote to memory of 2040 3572 vxkfecm.exe 92 PID 3572 wrote to memory of 2040 3572 vxkfecm.exe 92 PID 3572 wrote to memory of 2040 3572 vxkfecm.exe 92 PID 2040 wrote to memory of 4296 2040 ikcvkgl.exe 93 PID 2040 wrote to memory of 4296 2040 ikcvkgl.exe 93 PID 2040 wrote to memory of 4296 2040 ikcvkgl.exe 93 PID 4296 wrote to memory of 4168 4296 tgvgaau.exe 94 PID 4296 wrote to memory of 4168 4296 tgvgaau.exe 94 PID 4296 wrote to memory of 4168 4296 tgvgaau.exe 94 PID 4168 wrote to memory of 3716 4168 fijvlny.exe 95 PID 4168 wrote to memory of 3716 4168 fijvlny.exe 95 PID 4168 wrote to memory of 3716 4168 fijvlny.exe 95 PID 3716 wrote to memory of 1488 3716 qazbqda.exe 96 PID 3716 wrote to memory of 1488 3716 qazbqda.exe 96 PID 3716 wrote to memory of 1488 3716 qazbqda.exe 96 PID 1488 wrote to memory of 2960 1488 dqtdzly.exe 97 PID 1488 wrote to memory of 2960 1488 dqtdzly.exe 97 PID 1488 wrote to memory of 2960 1488 dqtdzly.exe 97 PID 2960 wrote to memory of 1720 2960 tvuydqd.exe 98 PID 2960 wrote to memory of 1720 2960 tvuydqd.exe 98 PID 2960 wrote to memory of 1720 2960 tvuydqd.exe 98 PID 1720 wrote to memory of 2668 1720 azeembf.exe 99 PID 1720 wrote to memory of 2668 1720 azeembf.exe 99 PID 1720 wrote to memory of 2668 1720 azeembf.exe 99 PID 2668 wrote to memory of 4508 2668 nbktfok.exe 100 PID 2668 wrote to memory of 4508 2668 nbktfok.exe 100 PID 2668 wrote to memory of 4508 2668 nbktfok.exe 100 PID 4508 wrote to memory of 3112 4508 dchbzxi.exe 103 PID 4508 wrote to memory of 3112 4508 dchbzxi.exe 103 PID 4508 wrote to memory of 3112 4508 dchbzxi.exe 103 PID 3112 wrote to memory of 1100 3112 nblzrwp.exe 104 PID 3112 wrote to memory of 1100 3112 nblzrwp.exe 104 PID 3112 wrote to memory of 1100 3112 nblzrwp.exe 104 PID 1100 wrote to memory of 2980 1100 xixwbup.exe 105 PID 1100 wrote to memory of 2980 1100 xixwbup.exe 105 PID 1100 wrote to memory of 2980 1100 xixwbup.exe 105 PID 2980 wrote to memory of 5032 2980 nqjeies.exe 106 PID 2980 wrote to memory of 5032 2980 nqjeies.exe 106 PID 2980 wrote to memory of 5032 2980 nqjeies.exe 106 PID 5032 wrote to memory of 3144 5032 yljoqyt.exe 108 PID 5032 wrote to memory of 3144 5032 yljoqyt.exe 108 PID 5032 wrote to memory of 3144 5032 yljoqyt.exe 108 PID 3144 wrote to memory of 1400 3144 lytmwcs.exe 110 PID 3144 wrote to memory of 1400 3144 lytmwcs.exe 110 PID 3144 wrote to memory of 1400 3144 lytmwcs.exe 110 PID 1400 wrote to memory of 1844 1400 vffkobz.exe 111 PID 1400 wrote to memory of 1844 1400 vffkobz.exe 111 PID 1400 wrote to memory of 1844 1400 vffkobz.exe 111 PID 1844 wrote to memory of 4864 1844 lnrknld.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\qspagga.exeC:\Windows\system32\qspagga.exe 1032 "C:\Users\Admin\AppData\Local\Temp\79d5adce123b5ac2b43fa6f85cab19f7_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\ywrnxrd.exeC:\Windows\system32\ywrnxrd.exe 1152 "C:\Windows\SysWOW64\qspagga.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\yzefldh.exeC:\Windows\system32\yzefldh.exe 1160 "C:\Windows\SysWOW64\ywrnxrd.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\ihqdwcp.exeC:\Windows\system32\ihqdwcp.exe 1156 "C:\Windows\SysWOW64\yzefldh.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\vxkfecm.exeC:\Windows\system32\vxkfecm.exe 1168 "C:\Windows\SysWOW64\ihqdwcp.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\ikcvkgl.exeC:\Windows\system32\ikcvkgl.exe 1176 "C:\Windows\SysWOW64\vxkfecm.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\tgvgaau.exeC:\Windows\system32\tgvgaau.exe 1172 "C:\Windows\SysWOW64\ikcvkgl.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\fijvlny.exeC:\Windows\system32\fijvlny.exe 1164 "C:\Windows\SysWOW64\tgvgaau.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\qazbqda.exeC:\Windows\system32\qazbqda.exe 1184 "C:\Windows\SysWOW64\fijvlny.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\dqtdzly.exeC:\Windows\system32\dqtdzly.exe 1188 "C:\Windows\SysWOW64\qazbqda.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\tvuydqd.exeC:\Windows\system32\tvuydqd.exe 1192 "C:\Windows\SysWOW64\dqtdzly.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\azeembf.exeC:\Windows\system32\azeembf.exe 1180 "C:\Windows\SysWOW64\tvuydqd.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\nbktfok.exeC:\Windows\system32\nbktfok.exe 1200 "C:\Windows\SysWOW64\azeembf.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\dchbzxi.exeC:\Windows\system32\dchbzxi.exe 1204 "C:\Windows\SysWOW64\nbktfok.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\nblzrwp.exeC:\Windows\system32\nblzrwp.exe 1224 "C:\Windows\SysWOW64\dchbzxi.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\xixwbup.exeC:\Windows\system32\xixwbup.exe 1196 "C:\Windows\SysWOW64\nblzrwp.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\nqjeies.exeC:\Windows\system32\nqjeies.exe 1208 "C:\Windows\SysWOW64\xixwbup.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\yljoqyt.exeC:\Windows\system32\yljoqyt.exe 1216 "C:\Windows\SysWOW64\nqjeies.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\lytmwcs.exeC:\Windows\system32\lytmwcs.exe 1212 "C:\Windows\SysWOW64\yljoqyt.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\vffkobz.exeC:\Windows\system32\vffkobz.exe 1228 "C:\Windows\SysWOW64\lytmwcs.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\lnrknld.exeC:\Windows\system32\lnrknld.exe 1136 "C:\Windows\SysWOW64\vffkobz.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\ssbxewg.exeC:\Windows\system32\ssbxewg.exe 1148 "C:\Windows\SysWOW64\lnrknld.exe"23⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\iwbsijc.exeC:\Windows\system32\iwbsijc.exe 1236 "C:\Windows\SysWOW64\ssbxewg.exe"24⤵
- Executes dropped EXE
PID:4348 -
C:\Windows\SysWOW64\ssccqdl.exeC:\Windows\system32\ssccqdl.exe 1240 "C:\Windows\SysWOW64\iwbsijc.exe"25⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\ilzxzro.exeC:\Windows\system32\ilzxzro.exe 1248 "C:\Windows\SysWOW64\ssccqdl.exe"26⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\tdodehi.exeC:\Windows\system32\tdodehi.exe 1244 "C:\Windows\SysWOW64\ilzxzro.exe"27⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\fujxnpn.exeC:\Windows\system32\fujxnpn.exe 1252 "C:\Windows\SysWOW64\tdodehi.exe"28⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\thbvttm.exeC:\Windows\system32\thbvttm.exe 1260 "C:\Windows\SysWOW64\fujxnpn.exe"29⤵
- Executes dropped EXE
PID:4528 -
C:\Windows\SysWOW64\crqfowa.exeC:\Windows\system32\crqfowa.exe 1256 "C:\Windows\SysWOW64\thbvttm.exe"30⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\qbwiros.exeC:\Windows\system32\qbwiros.exe 1232 "C:\Windows\SysWOW64\crqfowa.exe"31⤵
- Executes dropped EXE
PID:4816 -
C:\Windows\SysWOW64\dooyxsz.exeC:\Windows\system32\dooyxsz.exe 1272 "C:\Windows\SysWOW64\qbwiros.exe"32⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\qqunied.exeC:\Windows\system32\qqunied.exe 1268 "C:\Windows\SysWOW64\dooyxsz.exe"33⤵
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\alnyqze.exeC:\Windows\system32\alnyqze.exe 1280 "C:\Windows\SysWOW64\qqunied.exe"34⤵
- Executes dropped EXE
PID:4276 -
C:\Windows\SysWOW64\ncqbyhk.exeC:\Windows\system32\ncqbyhk.exe 1284 "C:\Windows\SysWOW64\alnyqze.exe"35⤵
- Executes dropped EXE
PID:1084 -
C:\Windows\SysWOW64\xxitobk.exeC:\Windows\system32\xxitobk.exe 1288 "C:\Windows\SysWOW64\ncqbyhk.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\ncroshh.exeC:\Windows\system32\ncroshh.exe 1292 "C:\Windows\SysWOW64\xxitobk.exe"37⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\SysWOW64\yxryzbi.exeC:\Windows\system32\yxryzbi.exe 1276 "C:\Windows\SysWOW64\ncroshh.exe"38⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\iewwkap.exeC:\Windows\system32\iewwkap.exe 1304 "C:\Windows\SysWOW64\yxryzbi.exe"39⤵
- Executes dropped EXE
PID:1320 -
C:\Windows\SysWOW64\vrnmqeo.exeC:\Windows\system32\vrnmqeo.exe 1296 "C:\Windows\SysWOW64\iewwkap.exe"40⤵
- Executes dropped EXE
PID:4976 -
C:\Windows\SysWOW64\iexbviv.exeC:\Windows\system32\iexbviv.exe 1312 "C:\Windows\SysWOW64\vrnmqeo.exe"41⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\vvaeeis.exeC:\Windows\system32\vvaeeis.exe 1352 "C:\Windows\SysWOW64\iexbviv.exe"42⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\fgpozlh.exeC:\Windows\system32\fgpozlh.exe 1300 "C:\Windows\SysWOW64\vvaeeis.exe"43⤵
- Executes dropped EXE
PID:4412 -
C:\Windows\SysWOW64\nkpjdye.exeC:\Windows\system32\nkpjdye.exe 1328 "C:\Windows\SysWOW64\fgpozlh.exe"44⤵
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\axhzjuc.exeC:\Windows\system32\axhzjuc.exe 1308 "C:\Windows\SysWOW64\nkpjdye.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3720 -
C:\Windows\SysWOW64\lsirrod.exeC:\Windows\system32\lsirrod.exe 1320 "C:\Windows\SysWOW64\axhzjuc.exe"46⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\vampbnl.exeC:\Windows\system32\vampbnl.exe 1324 "C:\Windows\SysWOW64\lsirrod.exe"47⤵
- Executes dropped EXE
PID:4936 -
C:\Windows\SysWOW64\indfhrj.exeC:\Windows\system32\indfhrj.exe 1332 "C:\Windows\SysWOW64\vampbnl.exe"48⤵
- Executes dropped EXE
PID:648 -
C:\Windows\SysWOW64\vdyhyzp.exeC:\Windows\system32\vdyhyzp.exe 1316 "C:\Windows\SysWOW64\indfhrj.exe"49⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\fccfiyx.exeC:\Windows\system32\fccfiyx.exe 1340 "C:\Windows\SysWOW64\vdyhyzp.exe"50⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\sbfhryu.exeC:\Windows\system32\sbfhryu.exe 1344 "C:\Windows\SysWOW64\fccfiyx.exe"51⤵
- Executes dropped EXE
PID:416 -
C:\Windows\SysWOW64\cwyaytd.exeC:\Windows\system32\cwyaytd.exe 1348 "C:\Windows\SysWOW64\sbfhryu.exe"52⤵
- Executes dropped EXE
PID:4340 -
C:\Windows\SysWOW64\qgedbsv.exeC:\Windows\system32\qgedbsv.exe 1336 "C:\Windows\SysWOW64\cwyaytd.exe"53⤵
- Executes dropped EXE
PID:3512 -
C:\Windows\SysWOW64\caksnfh.exeC:\Windows\system32\caksnfh.exe 1360 "C:\Windows\SysWOW64\qgedbsv.exe"54⤵
- Executes dropped EXE
PID:3660 -
C:\Windows\SysWOW64\pynvdnf.exeC:\Windows\system32\pynvdnf.exe 1356 "C:\Windows\SysWOW64\caksnfh.exe"55⤵
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\aqdsidh.exeC:\Windows\system32\aqdsidh.exe 1368 "C:\Windows\SysWOW64\pynvdnf.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Windows\SysWOW64\qyoapmk.exeC:\Windows\system32\qyoapmk.exe 1264 "C:\Windows\SysWOW64\aqdsidh.exe"57⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\axsyzlk.exeC:\Windows\system32\axsyzlk.exe 1376 "C:\Windows\SysWOW64\qyoapmk.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:64 -
C:\Windows\SysWOW64\kttqhgt.exeC:\Windows\system32\kttqhgt.exe 1372 "C:\Windows\SysWOW64\axsyzlk.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Windows\SysWOW64\ajfqopo.exeC:\Windows\system32\ajfqopo.exe 1384 "C:\Windows\SysWOW64\kttqhgt.exe"60⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\nslbrpo.exeC:\Windows\system32\nslbrpo.exe 1380 "C:\Windows\SysWOW64\ajfqopo.exe"61⤵
- Executes dropped EXE
PID:4592 -
C:\Windows\SysWOW64\xvalmsu.exeC:\Windows\system32\xvalmsu.exe 1388 "C:\Windows\SysWOW64\nslbrpo.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5024 -
C:\Windows\SysWOW64\kqsbswb.exeC:\Windows\system32\kqsbswb.exe 1392 "C:\Windows\SysWOW64\xvalmsu.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4472 -
C:\Windows\SysWOW64\vmtlzqc.exeC:\Windows\system32\vmtlzqc.exe 1396 "C:\Windows\SysWOW64\kqsbswb.exe"64⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\lqtgdvz.exeC:\Windows\system32\lqtgdvz.exe 1400 "C:\Windows\SysWOW64\vmtlzqc.exe"65⤵
- Executes dropped EXE
PID:644 -
C:\Windows\SysWOW64\vmuzlqz.exeC:\Windows\system32\vmuzlqz.exe 1412 "C:\Windows\SysWOW64\lqtgdvz.exe"66⤵PID:4220
-
C:\Windows\SysWOW64\ioagwce.exeC:\Windows\system32\ioagwce.exe 1404 "C:\Windows\SysWOW64\vmuzlqz.exe"67⤵PID:4256
-
C:\Windows\SysWOW64\vbrwcgl.exeC:\Windows\system32\vbrwcgl.exe 1408 "C:\Windows\SysWOW64\ioagwce.exe"68⤵
- System Location Discovery: System Language Discovery
PID:376 -
C:\Windows\SysWOW64\cifwwwm.exeC:\Windows\system32\cifwwwm.exe 1416 "C:\Windows\SysWOW64\vbrwcgl.exe"69⤵PID:4556
-
C:\Windows\SysWOW64\sqqwdfq.exeC:\Windows\system32\sqqwdfq.exe 1132 "C:\Windows\SysWOW64\cifwwwm.exe"70⤵PID:4584
-
C:\Windows\SysWOW64\faxhgfq.exeC:\Windows\system32\faxhgfq.exe 1424 "C:\Windows\SysWOW64\sqqwdfq.exe"71⤵PID:2992
-
C:\Windows\SysWOW64\syrkpnn.exeC:\Windows\system32\syrkpnn.exe 1428 "C:\Windows\SysWOW64\faxhgfq.exe"72⤵PID:1112
-
C:\Windows\SysWOW64\agncbcx.exeC:\Windows\system32\agncbcx.exe 1436 "C:\Windows\SysWOW64\syrkpnn.exe"73⤵PID:2552
-
C:\Windows\SysWOW64\poykiua.exeC:\Windows\system32\poykiua.exe 1432 "C:\Windows\SysWOW64\agncbcx.exe"74⤵PID:3276
-
C:\Windows\SysWOW64\cjqznqz.exeC:\Windows\system32\cjqznqz.exe 1448 "C:\Windows\SysWOW64\poykiua.exe"75⤵PID:2872
-
C:\Windows\SysWOW64\qwzptty.exeC:\Windows\system32\qwzptty.exe 1440 "C:\Windows\SysWOW64\cjqznqz.exe"76⤵PID:2420
-
C:\Windows\SysWOW64\djrfhxf.exeC:\Windows\system32\djrfhxf.exe 1444 "C:\Windows\SysWOW64\qwzptty.exe"77⤵PID:2968
-
C:\Windows\SysWOW64\nivkrwe.exeC:\Windows\system32\nivkrwe.exe 1452 "C:\Windows\SysWOW64\djrfhxf.exe"78⤵
- Drops file in System32 directory
PID:3672 -
C:\Windows\SysWOW64\ayynawk.exeC:\Windows\system32\ayynawk.exe 1464 "C:\Windows\SysWOW64\nivkrwe.exe"79⤵PID:1936
-
C:\Windows\SysWOW64\nthdgai.exeC:\Windows\system32\nthdgai.exe 1460 "C:\Windows\SysWOW64\ayynawk.exe"80⤵
- System Location Discovery: System Language Discovery
PID:4040 -
C:\Windows\SysWOW64\xpinnvr.exeC:\Windows\system32\xpinnvr.exe 1468 "C:\Windows\SysWOW64\nthdgai.exe"81⤵PID:2432
-
C:\Windows\SysWOW64\kcadtyq.exeC:\Windows\system32\kcadtyq.exe 1476 "C:\Windows\SysWOW64\xpinnvr.exe"82⤵PID:4284
-
C:\Windows\SysWOW64\xwgtnlu.exeC:\Windows\system32\xwgtnlu.exe 1456 "C:\Windows\SysWOW64\kcadtyq.exe"83⤵PID:4060
-
C:\Windows\SysWOW64\krqisht.exeC:\Windows\system32\krqisht.exe 1480 "C:\Windows\SysWOW64\xwgtnlu.exe"84⤵PID:1512
-
C:\Windows\SysWOW64\xehyyls.exeC:\Windows\system32\xehyyls.exe 1472 "C:\Windows\SysWOW64\krqisht.exe"85⤵PID:1548
-
C:\Windows\SysWOW64\idlvjjz.exeC:\Windows\system32\idlvjjz.exe 1036 "C:\Windows\SysWOW64\xehyyls.exe"86⤵
- Drops file in System32 directory
PID:3752 -
C:\Windows\SysWOW64\scxbtih.exeC:\Windows\system32\scxbtih.exe 1492 "C:\Windows\SysWOW64\idlvjjz.exe"87⤵PID:4952
-
C:\Windows\SysWOW64\ioywxve.exeC:\Windows\system32\ioywxve.exe 1500 "C:\Windows\SysWOW64\scxbtih.exe"88⤵
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\kkygfqe.exeC:\Windows\system32\kkygfqe.exe 1496 "C:\Windows\SysWOW64\ioywxve.exe"89⤵PID:564
-
C:\Windows\SysWOW64\xeewyur.exeC:\Windows\system32\xeewyur.exe 1488 "C:\Windows\SysWOW64\kkygfqe.exe"90⤵PID:3184
-
C:\Windows\SysWOW64\krwmeyq.exeC:\Windows\system32\krwmeyq.exe 1504 "C:\Windows\SysWOW64\xeewyur.exe"91⤵
- Drops file in System32 directory
PID:948 -
C:\Windows\SysWOW64\xmgbkco.exeC:\Windows\system32\xmgbkco.exe 1512 "C:\Windows\SysWOW64\krwmeyq.exe"92⤵PID:548
-
C:\Windows\SysWOW64\higmrwp.exeC:\Windows\system32\higmrwp.exe 1516 "C:\Windows\SysWOW64\xmgbkco.exe"93⤵
- Drops file in System32 directory
PID:1912 -
C:\Windows\SysWOW64\ucmbdbt.exeC:\Windows\system32\ucmbdbt.exe 1420 "C:\Windows\SysWOW64\higmrwp.exe"94⤵PID:2580
-
C:\Windows\SysWOW64\hperifa.exeC:\Windows\system32\hperifa.exe 1524 "C:\Windows\SysWOW64\ucmbdbt.exe"95⤵PID:1068
-
C:\Windows\SysWOW64\ukohojz.exeC:\Windows\system32\ukohojz.exe 1520 "C:\Windows\SysWOW64\hperifa.exe"96⤵PID:2808
-
C:\Windows\SysWOW64\ffozeda.exeC:\Windows\system32\ffozeda.exe 1144 "C:\Windows\SysWOW64\ukohojz.exe"97⤵PID:4844
-
C:\Windows\SysWOW64\swjcmlf.exeC:\Windows\system32\swjcmlf.exe 1528 "C:\Windows\SysWOW64\ffozeda.exe"98⤵PID:444
-
C:\Windows\SysWOW64\fjbsshe.exeC:\Windows\system32\fjbsshe.exe 1536 "C:\Windows\SysWOW64\swjcmlf.exe"99⤵PID:1448
-
C:\Windows\SysWOW64\ptqcgkk.exeC:\Windows\system32\ptqcgkk.exe 1544 "C:\Windows\SysWOW64\fjbsshe.exe"100⤵PID:4940
-
C:\Windows\SysWOW64\cgisloj.exeC:\Windows\system32\cgisloj.exe 1548 "C:\Windows\SysWOW64\ptqcgkk.exe"101⤵PID:1920
-
C:\Windows\SysWOW64\pxduuwp.exeC:\Windows\system32\pxduuwp.exe 1556 "C:\Windows\SysWOW64\cgisloj.exe"102⤵PID:4496
-
C:\Windows\SysWOW64\cgjxxop.exeC:\Windows\system32\cgjxxop.exe 1508 "C:\Windows\SysWOW64\pxduuwp.exe"103⤵PID:1968
-
C:\Windows\SysWOW64\pfeagwu.exeC:\Windows\system32\pfeagwu.exe 1560 "C:\Windows\SysWOW64\cgjxxop.exe"104⤵PID:2936
-
C:\Windows\SysWOW64\csvytat.exeC:\Windows\system32\csvytat.exe 1564 "C:\Windows\SysWOW64\pfeagwu.exe"105⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Windows\SysWOW64\mulahdz.exeC:\Windows\system32\mulahdz.exe 1568 "C:\Windows\SysWOW64\csvytat.exe"106⤵
- System Location Discovery: System Language Discovery
PID:3264 -
C:\Windows\SysWOW64\zhcymhy.exeC:\Windows\system32\zhcymhy.exe 1552 "C:\Windows\SysWOW64\mulahdz.exe"107⤵PID:3084
-
C:\Windows\SysWOW64\ncmnsdx.exeC:\Windows\system32\ncmnsdx.exe 1572 "C:\Windows\SysWOW64\zhcymhy.exe"108⤵PID:636
-
C:\Windows\SysWOW64\apddyge.exeC:\Windows\system32\apddyge.exe 1584 "C:\Windows\SysWOW64\ncmnsdx.exe"109⤵PID:4036
-
C:\Windows\SysWOW64\kphaifd.exeC:\Windows\system32\kphaifd.exe 1580 "C:\Windows\SysWOW64\apddyge.exe"110⤵PID:5044
-
C:\Windows\SysWOW64\xczqwjk.exeC:\Windows\system32\xczqwjk.exe 1076 "C:\Windows\SysWOW64\kphaifd.exe"111⤵PID:3640
-
C:\Windows\SysWOW64\hmobjmq.exeC:\Windows\system32\hmobjmq.exe 1364 "C:\Windows\SysWOW64\xczqwjk.exe"112⤵PID:2272
-
C:\Windows\SysWOW64\xnljlno.exeC:\Windows\system32\xnljlno.exe 1596 "C:\Windows\SysWOW64\hmobjmq.exe"113⤵PID:784
-
C:\Windows\SysWOW64\hqbtyqv.exeC:\Windows\system32\hqbtyqv.exe 1600 "C:\Windows\SysWOW64\xnljlno.exe"114⤵PID:5056
-
C:\Windows\SysWOW64\udsjeut.exeC:\Windows\system32\udsjeut.exe 1604 "C:\Windows\SysWOW64\hqbtyqv.exe"115⤵PID:1584
-
C:\Windows\SysWOW64\ekwootb.exeC:\Windows\system32\ekwootb.exe 1592 "C:\Windows\SysWOW64\udsjeut.exe"116⤵PID:640
-
C:\Windows\SysWOW64\ultwpur.exeC:\Windows\system32\ultwpur.exe 1612 "C:\Windows\SysWOW64\ekwootb.exe"117⤵PID:1620
-
C:\Windows\SysWOW64\enjgkxf.exeC:\Windows\system32\enjgkxf.exe 1608 "C:\Windows\SysWOW64\ultwpur.exe"118⤵PID:384
-
C:\Windows\SysWOW64\sxpjnwx.exeC:\Windows\system32\sxpjnwx.exe 1620 "C:\Windows\SysWOW64\enjgkxf.exe"119⤵PID:4744
-
C:\Windows\SysWOW64\fvkmwed.exeC:\Windows\system32\fvkmwed.exe 1624 "C:\Windows\SysWOW64\sxpjnwx.exe"120⤵
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\sibccac.exeC:\Windows\system32\sibccac.exe 1628 "C:\Windows\SysWOW64\fvkmwed.exe"121⤵PID:1280
-
C:\Windows\SysWOW64\chfzmzj.exeC:\Windows\system32\chfzmzj.exe 1616 "C:\Windows\SysWOW64\sibccac.exe"122⤵PID:5004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-