Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/11/2024, 14:18
Behavioral task
behavioral1
Sample
8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe
-
Size
317KB
-
MD5
8be7560045f5044b7a3e3a1a8c5c7a4f
-
SHA1
529e2e80dd626cad236fc4063101668317f16436
-
SHA256
1acaf777052e46bd11abf38406fb6cb4a3e0de6ec23dfbea029564c606a2fdcb
-
SHA512
c2c143a198791dcafe1f794c0d3975b6590974cb17e27427a15be6398550f7636a94179cf46e1b767c0cd75f2999fb6a20683c06d241c9248db10b77b9d04071
-
SSDEEP
6144:jsXvCmQRCtq1kePbvRqoHwBFdwmk/zzxhNvEeh7+PvgGj27F6/L1F/FOeR+bFB:6CmQRCtq1kePbvZwBFdwmkbzxhNv/+PS
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2980 kpzkkubnav.exe 2712 camksrbmhe.exe 2736 pcsrddowne.exe 760 zbfpounvvc.exe 276 jajugtvvva.exe 2124 uznsqscvvq.exe 1956 dkkcmvjpib.exe 804 ojozwuqoiz.exe 2668 sajcfcwwjm.exe 2412 dhvapbdvjk.exe 2072 njlkkekxvv.exe 3004 awcaqiicku.exe 1156 khskddpewg.exe 2120 xubajhvjdf.exe 852 gicxhobfkd.exe 1696 redipjjlyo.exe 1660 dyjxavomdn.exe 788 qwdajvtbea.exe 1224 aztkeyawql.exe 3012 nxwnngfdrx.exe 996 arcvyljmfw.exe 2192 nqwxhtpuxj.exe 1552 adonmxogmi.exe 2840 krpkcebdlg.exe 2656 xeyaiaaizf.exe 2572 kubdzixpaa.exe 3044 tiuapqklzq.exe 1460 gzwdxyqsac.exe 540 txrggyvitw.exe 3024 gomipgtpuj.exe 1952 qyjlkjhjgu.exe 2064 dsqavomtut.exe 1864 qnzqbskfis.exe 1200 dectkaqnbf.exe 1580 nhrdxdwhoq.exe 344 zfmggdcooc.exe 2408 mvhjwlhvpo.exe 1996 wkigmtmrpn.exe 1876 moqbqyrmva.exe 3028 wzfldbyoil.exe 1788 jpagmjdvjx.exe 1468 tapqhmjpwj.exe 612 gqstqnpwxv.exe 2212 spnwyvnmxh.exe 1936 ffiyhdstqt.exe 1916 ptiwxcfpxs.exe 1424 cklygllwqe.exe 1556 pigbwtierq.exe 2892 czbeftolsd.exe 2596 ppehobtstp.exe 2692 ydwweigosn.exe 2688 lczzmrewlz.exe 2936 ysubvrklmu.exe 2024 ljpedzpsmg.exe 464 yhrhuhnzns.exe 2396 ivsekhawnq.exe 2912 yasrouxqte.exe 2440 zotoebkntc.exe 2076 mblekxirhb.exe 532 zrfhsfozin.exe 2080 jfgeqnbdhm.exe 1084 wwbhzvhkiy.exe 2308 juekiverbk.exe 2188 txtuvytlnv.exe -
Loads dropped DLL 64 IoCs
pid Process 2968 8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe 2968 8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe 2980 kpzkkubnav.exe 2980 kpzkkubnav.exe 2712 camksrbmhe.exe 2712 camksrbmhe.exe 2736 pcsrddowne.exe 2736 pcsrddowne.exe 760 zbfpounvvc.exe 760 zbfpounvvc.exe 276 jajugtvvva.exe 276 jajugtvvva.exe 2124 uznsqscvvq.exe 2124 uznsqscvvq.exe 1956 dkkcmvjpib.exe 1956 dkkcmvjpib.exe 804 ojozwuqoiz.exe 804 ojozwuqoiz.exe 2668 sajcfcwwjm.exe 2668 sajcfcwwjm.exe 2412 dhvapbdvjk.exe 2412 dhvapbdvjk.exe 2072 njlkkekxvv.exe 2072 njlkkekxvv.exe 3004 awcaqiicku.exe 3004 awcaqiicku.exe 1156 khskddpewg.exe 1156 khskddpewg.exe 2120 xubajhvjdf.exe 2120 xubajhvjdf.exe 852 gicxhobfkd.exe 852 gicxhobfkd.exe 1696 redipjjlyo.exe 1696 redipjjlyo.exe 1660 dyjxavomdn.exe 1660 dyjxavomdn.exe 788 qwdajvtbea.exe 788 qwdajvtbea.exe 1224 aztkeyawql.exe 1224 aztkeyawql.exe 3012 nxwnngfdrx.exe 3012 nxwnngfdrx.exe 996 arcvyljmfw.exe 996 arcvyljmfw.exe 2192 nqwxhtpuxj.exe 2192 nqwxhtpuxj.exe 1552 adonmxogmi.exe 1552 adonmxogmi.exe 2840 krpkcebdlg.exe 2840 krpkcebdlg.exe 2656 xeyaiaaizf.exe 2656 xeyaiaaizf.exe 2572 kubdzixpaa.exe 2572 kubdzixpaa.exe 3044 tiuapqklzq.exe 3044 tiuapqklzq.exe 1460 gzwdxyqsac.exe 1460 gzwdxyqsac.exe 540 txrggyvitw.exe 540 txrggyvitw.exe 3024 gomipgtpuj.exe 3024 gomipgtpuj.exe 1952 qyjlkjhjgu.exe 1952 qyjlkjhjgu.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xacgevrkod.exe kbhdvvtdvr.exe File created C:\Windows\SysWOW64\xqexnoifrr.exe nopmalbdeg.exe File opened for modification C:\Windows\SysWOW64\tnwbihsmqd.exe jgvekzfqrf.exe File created C:\Windows\SysWOW64\mmjhxhhanc.exe zwoeohktuq.exe File created C:\Windows\SysWOW64\nbllhpgwxo.exe adiizojpwc.exe File opened for modification C:\Windows\SysWOW64\szkhkqlmmw.exe fmsremehyx.exe File opened for modification C:\Windows\SysWOW64\mdjxllfhkn.exe zfoucdzajb.exe File opened for modification C:\Windows\SysWOW64\ypkdpmauug.exe lypaymcnbt.exe File created C:\Windows\SysWOW64\eezzdremjs.exe uqgcnsyqku.exe File opened for modification C:\Windows\SysWOW64\bshncxtfur.exe ofqywtusgr.exe File opened for modification C:\Windows\SysWOW64\qktvquivlk.exe cxbflrbifl.exe File opened for modification C:\Windows\SysWOW64\nopmalbdeg.exe bmjxhypczh.exe File created C:\Windows\SysWOW64\aztkeyawql.exe qwdajvtbea.exe File created C:\Windows\SysWOW64\ylbmbiyebr.exe luyjsitxjf.exe File opened for modification C:\Windows\SysWOW64\uqgcnsyqku.exe hrdzwktjji.exe File opened for modification C:\Windows\SysWOW64\hzqkznwpuf.exe uxkvobsgpf.exe File opened for modification C:\Windows\SysWOW64\hgwsigkblz.exe xdgiudehqo.exe File created C:\Windows\SysWOW64\yimrpoxlii.exe lrjoggzvhw.exe File created C:\Windows\SysWOW64\yxobzxejbd.exe lhuzrxycar.exe File opened for modification C:\Windows\SysWOW64\bfoodgnpkb.exe ootlvxiikh.exe File opened for modification C:\Windows\SysWOW64\bslefuvmhf.exe rinukrpkuu.exe File opened for modification C:\Windows\SysWOW64\krosdiaavz.exe xbtpuacscn.exe File created C:\Windows\SysWOW64\aipqdacklc.exe nsvnurwdkq.exe File created C:\Windows\SysWOW64\qsjutqihvw.exe dboslicauk.exe File created C:\Windows\SysWOW64\anxqcdyjey.exe nxdvuvsclm.exe File opened for modification C:\Windows\SysWOW64\nsvnurwdkq.exe aqpgjnstxq.exe File created C:\Windows\SysWOW64\zwoeohktuq.exe mxlcfzemte.exe File created C:\Windows\SysWOW64\lrjoggzvhw.exe ybomyyuogk.exe File opened for modification C:\Windows\SysWOW64\hihamkgjhd.exe ukexdcjtgr.exe File opened for modification C:\Windows\SysWOW64\lxyfgvrpgq.exe brypqwethr.exe File opened for modification C:\Windows\SysWOW64\myriwhogps.exe zzwfnyizoy.exe File created C:\Windows\SysWOW64\uwpijclaat.exe hfnfauoszh.exe File opened for modification C:\Windows\SysWOW64\ndvjtywjkn.exe amsgkpqcjb.exe File created C:\Windows\SysWOW64\mpovxctzlv.exe cjnxhvgcmw.exe File opened for modification C:\Windows\SysWOW64\mrgdqrvtqu.exe zsmbhjympi.exe File created C:\Windows\SysWOW64\yoigbfylon.exe mmczqsubbn.exe File opened for modification C:\Windows\SysWOW64\jaycmbyqqc.exe wjvzdbbjpi.exe File created C:\Windows\SysWOW64\uznsqscvvq.exe jajugtvvva.exe File opened for modification C:\Windows\SysWOW64\zudautcola.exe mdjxllfhkn.exe File created C:\Windows\SysWOW64\ehlssdigze.exe ruccmzjtkf.exe File opened for modification C:\Windows\SysWOW64\wglbqdbwwo.exe jpizivvpvc.exe File created C:\Windows\SysWOW64\dxbubgqlpp.exe qhgskgtwod.exe File created C:\Windows\SysWOW64\jalbbigpvt.exe zpwqofavii.exe File created C:\Windows\SysWOW64\mwxrtqdkzi.exe ciwudjqfak.exe File opened for modification C:\Windows\SysWOW64\zuxykonuhg.exe qgwampzxhi.exe File opened for modification C:\Windows\SysWOW64\dhvapbdvjk.exe sajcfcwwjm.exe File created C:\Windows\SysWOW64\ndobzdlaco.exe jelyivotbb.exe File created C:\Windows\SysWOW64\crigcxkhlv.exe tkirmxxlmx.exe File created C:\Windows\SysWOW64\jelyivotbb.exe zqkbsnbxcd.exe File created C:\Windows\SysWOW64\kfdfmvyayc.exe acovzrsylq.exe File opened for modification C:\Windows\SysWOW64\wapqfdlsli.exe jnfbzzmffj.exe File opened for modification C:\Windows\SysWOW64\kphzwonnsd.exe xqexnoifrr.exe File opened for modification C:\Windows\SysWOW64\zomlfpmnpe.exe myriwhogps.exe File created C:\Windows\SysWOW64\zcxuawjppa.exe qwwxkowsib.exe File created C:\Windows\SysWOW64\uvmmkyysww.exe kgmpuqlwxy.exe File opened for modification C:\Windows\SysWOW64\frydkgnfal.exe spsnqcjwnm.exe File opened for modification C:\Windows\SysWOW64\jajugtvvva.exe zbfpounvvc.exe File opened for modification C:\Windows\SysWOW64\ixfgddfthn.exe vzkmvvzmob.exe File opened for modification C:\Windows\SysWOW64\ugnqnffnsd.exe iisnexhgrq.exe File opened for modification C:\Windows\SysWOW64\xirulqfpwm.exe krosdiaavz.exe File created C:\Windows\SysWOW64\cipmwudggv.exe sgabbrwmuk.exe File created C:\Windows\SysWOW64\hifyffbopv.exe uoziubpebw.exe File opened for modification C:\Windows\SysWOW64\kpzkkubnav.exe 8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe File created C:\Windows\SysWOW64\tmqabdjhjj.exe ovvftvlsiw.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ueqvygqqel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xaialzbxdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndhxsqvjrq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lczzmrewlz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjrocnytkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zruaremdjy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxjyllqyyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahhkzpelyk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ysuhpjdfvg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quxdedattz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rknzuszrxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyjxavomdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tijjwegktf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caqxrcwdih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szejyliuft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hivmnsgiab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adiizojpwc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebxihzjabx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language buqffwfsdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vewhdnjihx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzwdxyqsac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rljitvyqsn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yrxyirtysj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cjnxhvgcmw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pzkoedivhi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agibpprubi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwboxeehql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqodkqmwof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qgwampzxhi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language anryzjpjjs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksrngpzoyf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nqbqyfrlqn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkkcmvjpib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nqwxhtpuxj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbqmbybqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htvhltntcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emzcqqymiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddnycyahql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnmuepflmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnbbybnixj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcrgxjywqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language molsudtsqp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xgapojwcsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsmxyixdcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hprohkfqpw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language glrerhqtrq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tapqhmjpwj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fkrdmqmrzb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbtpuacscn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptjtsuyjze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kphzwonnsd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language glksefvgso.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhrhuhnzns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrowzvyiui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mvwbnkgaqz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cduauvebvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqojhxytoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eevrucrodo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oajaffpyaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avwqstzyni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaiydqiqic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmjhxhhanc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zmrgyqjanl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wapqfdlsli.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2980 2968 8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2980 2968 8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2980 2968 8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe 30 PID 2968 wrote to memory of 2980 2968 8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe 30 PID 2980 wrote to memory of 2712 2980 kpzkkubnav.exe 31 PID 2980 wrote to memory of 2712 2980 kpzkkubnav.exe 31 PID 2980 wrote to memory of 2712 2980 kpzkkubnav.exe 31 PID 2980 wrote to memory of 2712 2980 kpzkkubnav.exe 31 PID 2712 wrote to memory of 2736 2712 camksrbmhe.exe 32 PID 2712 wrote to memory of 2736 2712 camksrbmhe.exe 32 PID 2712 wrote to memory of 2736 2712 camksrbmhe.exe 32 PID 2712 wrote to memory of 2736 2712 camksrbmhe.exe 32 PID 2736 wrote to memory of 760 2736 pcsrddowne.exe 33 PID 2736 wrote to memory of 760 2736 pcsrddowne.exe 33 PID 2736 wrote to memory of 760 2736 pcsrddowne.exe 33 PID 2736 wrote to memory of 760 2736 pcsrddowne.exe 33 PID 760 wrote to memory of 276 760 zbfpounvvc.exe 34 PID 760 wrote to memory of 276 760 zbfpounvvc.exe 34 PID 760 wrote to memory of 276 760 zbfpounvvc.exe 34 PID 760 wrote to memory of 276 760 zbfpounvvc.exe 34 PID 276 wrote to memory of 2124 276 jajugtvvva.exe 35 PID 276 wrote to memory of 2124 276 jajugtvvva.exe 35 PID 276 wrote to memory of 2124 276 jajugtvvva.exe 35 PID 276 wrote to memory of 2124 276 jajugtvvva.exe 35 PID 2124 wrote to memory of 1956 2124 uznsqscvvq.exe 36 PID 2124 wrote to memory of 1956 2124 uznsqscvvq.exe 36 PID 2124 wrote to memory of 1956 2124 uznsqscvvq.exe 36 PID 2124 wrote to memory of 1956 2124 uznsqscvvq.exe 36 PID 1956 wrote to memory of 804 1956 dkkcmvjpib.exe 37 PID 1956 wrote to memory of 804 1956 dkkcmvjpib.exe 37 PID 1956 wrote to memory of 804 1956 dkkcmvjpib.exe 37 PID 1956 wrote to memory of 804 1956 dkkcmvjpib.exe 37 PID 804 wrote to memory of 2668 804 ojozwuqoiz.exe 38 PID 804 wrote to memory of 2668 804 ojozwuqoiz.exe 38 PID 804 wrote to memory of 2668 804 ojozwuqoiz.exe 38 PID 804 wrote to memory of 2668 804 ojozwuqoiz.exe 38 PID 2668 wrote to memory of 2412 2668 sajcfcwwjm.exe 39 PID 2668 wrote to memory of 2412 2668 sajcfcwwjm.exe 39 PID 2668 wrote to memory of 2412 2668 sajcfcwwjm.exe 39 PID 2668 wrote to memory of 2412 2668 sajcfcwwjm.exe 39 PID 2412 wrote to memory of 2072 2412 dhvapbdvjk.exe 40 PID 2412 wrote to memory of 2072 2412 dhvapbdvjk.exe 40 PID 2412 wrote to memory of 2072 2412 dhvapbdvjk.exe 40 PID 2412 wrote to memory of 2072 2412 dhvapbdvjk.exe 40 PID 2072 wrote to memory of 3004 2072 njlkkekxvv.exe 41 PID 2072 wrote to memory of 3004 2072 njlkkekxvv.exe 41 PID 2072 wrote to memory of 3004 2072 njlkkekxvv.exe 41 PID 2072 wrote to memory of 3004 2072 njlkkekxvv.exe 41 PID 3004 wrote to memory of 1156 3004 awcaqiicku.exe 42 PID 3004 wrote to memory of 1156 3004 awcaqiicku.exe 42 PID 3004 wrote to memory of 1156 3004 awcaqiicku.exe 42 PID 3004 wrote to memory of 1156 3004 awcaqiicku.exe 42 PID 1156 wrote to memory of 2120 1156 khskddpewg.exe 43 PID 1156 wrote to memory of 2120 1156 khskddpewg.exe 43 PID 1156 wrote to memory of 2120 1156 khskddpewg.exe 43 PID 1156 wrote to memory of 2120 1156 khskddpewg.exe 43 PID 2120 wrote to memory of 852 2120 xubajhvjdf.exe 44 PID 2120 wrote to memory of 852 2120 xubajhvjdf.exe 44 PID 2120 wrote to memory of 852 2120 xubajhvjdf.exe 44 PID 2120 wrote to memory of 852 2120 xubajhvjdf.exe 44 PID 852 wrote to memory of 1696 852 gicxhobfkd.exe 45 PID 852 wrote to memory of 1696 852 gicxhobfkd.exe 45 PID 852 wrote to memory of 1696 852 gicxhobfkd.exe 45 PID 852 wrote to memory of 1696 852 gicxhobfkd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\kpzkkubnav.exeC:\Windows\system32\kpzkkubnav.exe 468 "C:\Users\Admin\AppData\Local\Temp\8be7560045f5044b7a3e3a1a8c5c7a4f_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\camksrbmhe.exeC:\Windows\system32\camksrbmhe.exe 532 "C:\Windows\SysWOW64\kpzkkubnav.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\pcsrddowne.exeC:\Windows\system32\pcsrddowne.exe 524 "C:\Windows\SysWOW64\camksrbmhe.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\zbfpounvvc.exeC:\Windows\system32\zbfpounvvc.exe 540 "C:\Windows\SysWOW64\pcsrddowne.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\jajugtvvva.exeC:\Windows\system32\jajugtvvva.exe 528 "C:\Windows\SysWOW64\zbfpounvvc.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\uznsqscvvq.exeC:\Windows\system32\uznsqscvvq.exe 548 "C:\Windows\SysWOW64\jajugtvvva.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\dkkcmvjpib.exeC:\Windows\system32\dkkcmvjpib.exe 536 "C:\Windows\SysWOW64\uznsqscvvq.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\ojozwuqoiz.exeC:\Windows\system32\ojozwuqoiz.exe 560 "C:\Windows\SysWOW64\dkkcmvjpib.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\sajcfcwwjm.exeC:\Windows\system32\sajcfcwwjm.exe 564 "C:\Windows\SysWOW64\ojozwuqoiz.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\dhvapbdvjk.exeC:\Windows\system32\dhvapbdvjk.exe 556 "C:\Windows\SysWOW64\sajcfcwwjm.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\njlkkekxvv.exeC:\Windows\system32\njlkkekxvv.exe 544 "C:\Windows\SysWOW64\dhvapbdvjk.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\awcaqiicku.exeC:\Windows\system32\awcaqiicku.exe 552 "C:\Windows\SysWOW64\njlkkekxvv.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\khskddpewg.exeC:\Windows\system32\khskddpewg.exe 568 "C:\Windows\SysWOW64\awcaqiicku.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\xubajhvjdf.exeC:\Windows\system32\xubajhvjdf.exe 572 "C:\Windows\SysWOW64\khskddpewg.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\gicxhobfkd.exeC:\Windows\system32\gicxhobfkd.exe 576 "C:\Windows\SysWOW64\xubajhvjdf.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\redipjjlyo.exeC:\Windows\system32\redipjjlyo.exe 580 "C:\Windows\SysWOW64\gicxhobfkd.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1696 -
C:\Windows\SysWOW64\dyjxavomdn.exeC:\Windows\system32\dyjxavomdn.exe 584 "C:\Windows\SysWOW64\redipjjlyo.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\qwdajvtbea.exeC:\Windows\system32\qwdajvtbea.exe 588 "C:\Windows\SysWOW64\dyjxavomdn.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:788 -
C:\Windows\SysWOW64\aztkeyawql.exeC:\Windows\system32\aztkeyawql.exe 592 "C:\Windows\SysWOW64\qwdajvtbea.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1224 -
C:\Windows\SysWOW64\nxwnngfdrx.exeC:\Windows\system32\nxwnngfdrx.exe 596 "C:\Windows\SysWOW64\aztkeyawql.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3012 -
C:\Windows\SysWOW64\arcvyljmfw.exeC:\Windows\system32\arcvyljmfw.exe 600 "C:\Windows\SysWOW64\nxwnngfdrx.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:996 -
C:\Windows\SysWOW64\nqwxhtpuxj.exeC:\Windows\system32\nqwxhtpuxj.exe 612 "C:\Windows\SysWOW64\arcvyljmfw.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Windows\SysWOW64\adonmxogmi.exeC:\Windows\system32\adonmxogmi.exe 624 "C:\Windows\SysWOW64\nqwxhtpuxj.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552 -
C:\Windows\SysWOW64\krpkcebdlg.exeC:\Windows\system32\krpkcebdlg.exe 620 "C:\Windows\SysWOW64\adonmxogmi.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Windows\SysWOW64\xeyaiaaizf.exeC:\Windows\system32\xeyaiaaizf.exe 604 "C:\Windows\SysWOW64\krpkcebdlg.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2656 -
C:\Windows\SysWOW64\kubdzixpaa.exeC:\Windows\system32\kubdzixpaa.exe 640 "C:\Windows\SysWOW64\xeyaiaaizf.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2572 -
C:\Windows\SysWOW64\tiuapqklzq.exeC:\Windows\system32\tiuapqklzq.exe 628 "C:\Windows\SysWOW64\kubdzixpaa.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3044 -
C:\Windows\SysWOW64\gzwdxyqsac.exeC:\Windows\system32\gzwdxyqsac.exe 632 "C:\Windows\SysWOW64\tiuapqklzq.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1460 -
C:\Windows\SysWOW64\txrggyvitw.exeC:\Windows\system32\txrggyvitw.exe 616 "C:\Windows\SysWOW64\gzwdxyqsac.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:540 -
C:\Windows\SysWOW64\gomipgtpuj.exeC:\Windows\system32\gomipgtpuj.exe 644 "C:\Windows\SysWOW64\txrggyvitw.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024 -
C:\Windows\SysWOW64\qyjlkjhjgu.exeC:\Windows\system32\qyjlkjhjgu.exe 608 "C:\Windows\SysWOW64\gomipgtpuj.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Windows\SysWOW64\dsqavomtut.exeC:\Windows\system32\dsqavomtut.exe 636 "C:\Windows\SysWOW64\qyjlkjhjgu.exe"33⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\qnzqbskfis.exeC:\Windows\system32\qnzqbskfis.exe 648 "C:\Windows\SysWOW64\dsqavomtut.exe"34⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\dectkaqnbf.exeC:\Windows\system32\dectkaqnbf.exe 664 "C:\Windows\SysWOW64\qnzqbskfis.exe"35⤵
- Executes dropped EXE
PID:1200 -
C:\Windows\SysWOW64\nhrdxdwhoq.exeC:\Windows\system32\nhrdxdwhoq.exe 652 "C:\Windows\SysWOW64\dectkaqnbf.exe"36⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\zfmggdcooc.exeC:\Windows\system32\zfmggdcooc.exe 672 "C:\Windows\SysWOW64\nhrdxdwhoq.exe"37⤵
- Executes dropped EXE
PID:344 -
C:\Windows\SysWOW64\mvhjwlhvpo.exeC:\Windows\system32\mvhjwlhvpo.exe 656 "C:\Windows\SysWOW64\zfmggdcooc.exe"38⤵
- Executes dropped EXE
PID:2408 -
C:\Windows\SysWOW64\wkigmtmrpn.exeC:\Windows\system32\wkigmtmrpn.exe 676 "C:\Windows\SysWOW64\mvhjwlhvpo.exe"39⤵
- Executes dropped EXE
PID:1996 -
C:\Windows\SysWOW64\moqbqyrmva.exeC:\Windows\system32\moqbqyrmva.exe 660 "C:\Windows\SysWOW64\wkigmtmrpn.exe"40⤵
- Executes dropped EXE
PID:1876 -
C:\Windows\SysWOW64\wzfldbyoil.exeC:\Windows\system32\wzfldbyoil.exe 680 "C:\Windows\SysWOW64\moqbqyrmva.exe"41⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\jpagmjdvjx.exeC:\Windows\system32\jpagmjdvjx.exe 668 "C:\Windows\SysWOW64\wzfldbyoil.exe"42⤵
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\tapqhmjpwj.exeC:\Windows\system32\tapqhmjpwj.exe 692 "C:\Windows\SysWOW64\jpagmjdvjx.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Windows\SysWOW64\gqstqnpwxv.exeC:\Windows\system32\gqstqnpwxv.exe 684 "C:\Windows\SysWOW64\tapqhmjpwj.exe"44⤵
- Executes dropped EXE
PID:612 -
C:\Windows\SysWOW64\spnwyvnmxh.exeC:\Windows\system32\spnwyvnmxh.exe 700 "C:\Windows\SysWOW64\gqstqnpwxv.exe"45⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\ffiyhdstqt.exeC:\Windows\system32\ffiyhdstqt.exe 688 "C:\Windows\SysWOW64\spnwyvnmxh.exe"46⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\ptiwxcfpxs.exeC:\Windows\system32\ptiwxcfpxs.exe 716 "C:\Windows\SysWOW64\ffiyhdstqt.exe"47⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\SysWOW64\cklygllwqe.exeC:\Windows\system32\cklygllwqe.exe 696 "C:\Windows\SysWOW64\ptiwxcfpxs.exe"48⤵
- Executes dropped EXE
PID:1424 -
C:\Windows\SysWOW64\pigbwtierq.exeC:\Windows\system32\pigbwtierq.exe 712 "C:\Windows\SysWOW64\cklygllwqe.exe"49⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\czbeftolsd.exeC:\Windows\system32\czbeftolsd.exe 708 "C:\Windows\SysWOW64\pigbwtierq.exe"50⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\SysWOW64\ppehobtstp.exeC:\Windows\system32\ppehobtstp.exe 724 "C:\Windows\SysWOW64\czbeftolsd.exe"51⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\SysWOW64\ydwweigosn.exeC:\Windows\system32\ydwweigosn.exe 720 "C:\Windows\SysWOW64\ppehobtstp.exe"52⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\lczzmrewlz.exeC:\Windows\system32\lczzmrewlz.exe 732 "C:\Windows\SysWOW64\ydwweigosn.exe"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Windows\SysWOW64\ysubvrklmu.exeC:\Windows\system32\ysubvrklmu.exe 704 "C:\Windows\SysWOW64\lczzmrewlz.exe"54⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\ljpedzpsmg.exeC:\Windows\system32\ljpedzpsmg.exe 740 "C:\Windows\SysWOW64\ysubvrklmu.exe"55⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\yhrhuhnzns.exeC:\Windows\system32\yhrhuhnzns.exe 728 "C:\Windows\SysWOW64\ljpedzpsmg.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:464 -
C:\Windows\SysWOW64\ivsekhawnq.exeC:\Windows\system32\ivsekhawnq.exe 748 "C:\Windows\SysWOW64\yhrhuhnzns.exe"57⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\yasrouxqte.exeC:\Windows\system32\yasrouxqte.exe 744 "C:\Windows\SysWOW64\ivsekhawnq.exe"58⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\zotoebkntc.exeC:\Windows\system32\zotoebkntc.exe 756 "C:\Windows\SysWOW64\yasrouxqte.exe"59⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\mblekxirhb.exeC:\Windows\system32\mblekxirhb.exe 736 "C:\Windows\SysWOW64\zotoebkntc.exe"60⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\zrfhsfozin.exeC:\Windows\system32\zrfhsfozin.exe 752 "C:\Windows\SysWOW64\mblekxirhb.exe"61⤵
- Executes dropped EXE
PID:532 -
C:\Windows\SysWOW64\jfgeqnbdhm.exeC:\Windows\system32\jfgeqnbdhm.exe 760 "C:\Windows\SysWOW64\zrfhsfozin.exe"62⤵
- Executes dropped EXE
PID:2080 -
C:\Windows\SysWOW64\wwbhzvhkiy.exeC:\Windows\system32\wwbhzvhkiy.exe 764 "C:\Windows\SysWOW64\jfgeqnbdhm.exe"63⤵
- Executes dropped EXE
PID:1084 -
C:\Windows\SysWOW64\juekiverbk.exeC:\Windows\system32\juekiverbk.exe 768 "C:\Windows\SysWOW64\wwbhzvhkiy.exe"64⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\txtuvytlnv.exeC:\Windows\system32\txtuvytlnv.exe 776 "C:\Windows\SysWOW64\juekiverbk.exe"65⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\gwoxegqtoi.exeC:\Windows\system32\gwoxegqtoi.exe 772 "C:\Windows\SysWOW64\txtuvytlnv.exe"66⤵PID:2384
-
C:\Windows\SysWOW64\tjfmrkxfch.exeC:\Windows\system32\tjfmrkxfch.exe 780 "C:\Windows\SysWOW64\gwoxegqtoi.exe"67⤵PID:3016
-
C:\Windows\SysWOW64\flludpbpqg.exeC:\Windows\system32\flludpbpqg.exe 784 "C:\Windows\SysWOW64\tjfmrkxfch.exe"68⤵PID:2352
-
C:\Windows\SysWOW64\pnbeqsijdr.exeC:\Windows\system32\pnbeqsijdr.exe 804 "C:\Windows\SysWOW64\flludpbpqg.exe"69⤵PID:1444
-
C:\Windows\SysWOW64\cewhzanqve.exeC:\Windows\system32\cewhzanqve.exe 788 "C:\Windows\SysWOW64\pnbeqsijdr.exe"70⤵PID:2088
-
C:\Windows\SysWOW64\molsudtsqp.exeC:\Windows\system32\molsudtsqp.exe 812 "C:\Windows\SysWOW64\cewhzanqve.exe"71⤵
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\zfoucdzajb.exeC:\Windows\system32\zfoucdzajb.exe 792 "C:\Windows\SysWOW64\molsudtsqp.exe"72⤵
- Drops file in System32 directory
PID:2312 -
C:\Windows\SysWOW64\mdjxllfhkn.exeC:\Windows\system32\mdjxllfhkn.exe 796 "C:\Windows\SysWOW64\zfoucdzajb.exe"73⤵
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\zudautcola.exeC:\Windows\system32\zudautcola.exe 800 "C:\Windows\SysWOW64\mdjxllfhkn.exe"74⤵PID:2652
-
C:\Windows\SysWOW64\jetkhxqqxl.exeC:\Windows\system32\jetkhxqqxl.exe 808 "C:\Windows\SysWOW64\zudautcola.exe"75⤵PID:2948
-
C:\Windows\SysWOW64\wvwnpxoxyx.exeC:\Windows\system32\wvwnpxoxyx.exe 816 "C:\Windows\SysWOW64\jetkhxqqxl.exe"76⤵PID:2624
-
C:\Windows\SysWOW64\jlqpyfterj.exeC:\Windows\system32\jlqpyfterj.exe 824 "C:\Windows\SysWOW64\wvwnpxoxyx.exe"77⤵PID:2740
-
C:\Windows\SysWOW64\vklshnzmse.exeC:\Windows\system32\vklshnzmse.exe 820 "C:\Windows\SysWOW64\jlqpyfterj.exe"78⤵PID:2640
-
C:\Windows\SysWOW64\fymhfmmiru.exeC:\Windows\system32\fymhfmmiru.exe 836 "C:\Windows\SysWOW64\vklshnzmse.exe"79⤵PID:2224
-
C:\Windows\SysWOW64\sopknvkpso.exeC:\Windows\system32\sopknvkpso.exe 828 "C:\Windows\SysWOW64\fymhfmmiru.exe"80⤵PID:2304
-
C:\Windows\SysWOW64\ffjnwdpxtb.exeC:\Windows\system32\ffjnwdpxtb.exe 832 "C:\Windows\SysWOW64\sopknvkpso.exe"81⤵PID:2876
-
C:\Windows\SysWOW64\sdepfdveln.exeC:\Windows\system32\sdepfdveln.exe 840 "C:\Windows\SysWOW64\ffjnwdpxtb.exe"82⤵PID:2744
-
C:\Windows\SysWOW64\fuhsnlstmz.exeC:\Windows\system32\fuhsnlstmz.exe 852 "C:\Windows\SysWOW64\sdepfdveln.exe"83⤵PID:2784
-
C:\Windows\SysWOW64\oiaqltfpmx.exeC:\Windows\system32\oiaqltfpmx.exe 844 "C:\Windows\SysWOW64\fuhsnlstmz.exe"84⤵PID:2008
-
C:\Windows\SysWOW64\emilpyccal.exeC:\Windows\system32\emilpyccal.exe 860 "C:\Windows\SysWOW64\oiaqltfpmx.exe"85⤵PID:2372
-
C:\Windows\SysWOW64\oajaffpyaj.exeC:\Windows\system32\oajaffpyaj.exe 848 "C:\Windows\SysWOW64\emilpyccal.exe"86⤵
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\bnsqljolgi.exeC:\Windows\system32\bnsqljolgi.exe 856 "C:\Windows\SysWOW64\oajaffpyaj.exe"87⤵PID:912
-
C:\Windows\SysWOW64\lypaymcnbt.exeC:\Windows\system32\lypaymcnbt.exe 868 "C:\Windows\SysWOW64\bnsqljolgi.exe"88⤵
- Drops file in System32 directory
PID:1244 -
C:\Windows\SysWOW64\ypkdpmauug.exeC:\Windows\system32\ypkdpmauug.exe 880 "C:\Windows\SysWOW64\lypaymcnbt.exe"89⤵PID:1604
-
C:\Windows\SysWOW64\lnffxugbus.exeC:\Windows\system32\lnffxugbus.exe 884 "C:\Windows\SysWOW64\ypkdpmauug.exe"90⤵PID:1256
-
C:\Windows\SysWOW64\yhlvjhklir.exeC:\Windows\system32\yhlvjhklir.exe 864 "C:\Windows\SysWOW64\lnffxugbus.exe"91⤵PID:1900
-
C:\Windows\SysWOW64\hsbfwkyfuc.exeC:\Windows\system32\hsbfwkyfuc.exe 872 "C:\Windows\SysWOW64\yhlvjhklir.exe"92⤵PID:2264
-
C:\Windows\SysWOW64\uidifkwmvp.exeC:\Windows\system32\uidifkwmvp.exe 876 "C:\Windows\SysWOW64\hsbfwkyfuc.exe"93⤵PID:376
-
C:\Windows\SysWOW64\hhylnsbuob.exeC:\Windows\system32\hhylnsbuob.exe 888 "C:\Windows\SysWOW64\uidifkwmvp.exe"94⤵PID:3008
-
C:\Windows\SysWOW64\uxtnwbhbpn.exeC:\Windows\system32\uxtnwbhbpn.exe 912 "C:\Windows\SysWOW64\hhylnsbuob.exe"95⤵PID:1412
-
C:\Windows\SysWOW64\howqmbeqqz.exeC:\Windows\system32\howqmbeqqz.exe 892 "C:\Windows\SysWOW64\uxtnwbhbpn.exe"96⤵PID:2240
-
C:\Windows\SysWOW64\rcwgdismpy.exeC:\Windows\system32\rcwgdismpy.exe 900 "C:\Windows\SysWOW64\howqmbeqqz.exe"97⤵PID:2680
-
C:\Windows\SysWOW64\earilqxuqk.exeC:\Windows\system32\earilqxuqk.exe 920 "C:\Windows\SysWOW64\rcwgdismpy.exe"98⤵PID:2604
-
C:\Windows\SysWOW64\ozvgwpftqi.exeC:\Windows\system32\ozvgwpftqi.exe 908 "C:\Windows\SysWOW64\earilqxuqk.exe"99⤵PID:2816
-
C:\Windows\SysWOW64\atjvpujvvh.exeC:\Windows\system32\atjvpujvvh.exe 896 "C:\Windows\SysWOW64\ozvgwpftqi.exe"100⤵PID:1928
-
C:\Windows\SysWOW64\ootlvxiikh.exeC:\Windows\system32\ootlvxiikh.exe 904 "C:\Windows\SysWOW64\atjvpujvvh.exe"101⤵
- Drops file in System32 directory
PID:848 -
C:\Windows\SysWOW64\bfoodgnpkb.exeC:\Windows\system32\bfoodgnpkb.exe 916 "C:\Windows\SysWOW64\ootlvxiikh.exe"102⤵PID:2252
-
C:\Windows\SysWOW64\nhudpksyya.exeC:\Windows\system32\nhudpksyya.exe 940 "C:\Windows\SysWOW64\bfoodgnpkb.exe"103⤵PID:1016
-
C:\Windows\SysWOW64\xjrocnytkl.exeC:\Windows\system32\xjrocnytkl.exe 924 "C:\Windows\SysWOW64\nhudpksyya.exe"104⤵
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\kimqlvdady.exeC:\Windows\system32\kimqlvdady.exe 928 "C:\Windows\SysWOW64\xjrocnytkl.exe"105⤵PID:552
-
C:\Windows\SysWOW64\xyhltwjhek.exeC:\Windows\system32\xyhltwjhek.exe 932 "C:\Windows\SysWOW64\kimqlvdady.exe"106⤵PID:692
-
C:\Windows\SysWOW64\kpkocepwfw.exeC:\Windows\system32\kpkocepwfw.exe 948 "C:\Windows\SysWOW64\xyhltwjhek.exe"107⤵PID:1352
-
C:\Windows\SysWOW64\ldklaluteu.exeC:\Windows\system32\ldklaluteu.exe 960 "C:\Windows\SysWOW64\kpkocepwfw.exe"108⤵PID:2456
-
C:\Windows\SysWOW64\ybfoitzafh.exeC:\Windows\system32\ybfoitzafh.exe 936 "C:\Windows\SysWOW64\ldklaluteu.exe"109⤵PID:1832
-
C:\Windows\SysWOW64\lvleuyebsg.exeC:\Windows\system32\lvleuyebsg.exe 944 "C:\Windows\SysWOW64\ybfoitzafh.exe"110⤵PID:1760
-
C:\Windows\SysWOW64\yidtackozf.exeC:\Windows\system32\yidtackozf.exe 972 "C:\Windows\SysWOW64\lvleuyebsg.exe"111⤵PID:2092
-
C:\Windows\SysWOW64\lhxwikivzr.exeC:\Windows\system32\lhxwikivzr.exe 968 "C:\Windows\SysWOW64\yidtackozf.exe"112⤵PID:2148
-
C:\Windows\SysWOW64\yxszrkndae.exeC:\Windows\system32\yxszrkndae.exe 976 "C:\Windows\SysWOW64\lhxwikivzr.exe"113⤵PID:872
-
C:\Windows\SysWOW64\iiijmnufnp.exeC:\Windows\system32\iiijmnufnp.exe 956 "C:\Windows\SysWOW64\yxszrkndae.exe"114⤵PID:2052
-
C:\Windows\SysWOW64\vzkmvvzmob.exeC:\Windows\system32\vzkmvvzmob.exe 984 "C:\Windows\SysWOW64\iiijmnufnp.exe"115⤵
- Drops file in System32 directory
PID:2860 -
C:\Windows\SysWOW64\ixfgddfthn.exeC:\Windows\system32\ixfgddfthn.exe 992 "C:\Windows\SysWOW64\vzkmvvzmob.exe"116⤵PID:2700
-
C:\Windows\SysWOW64\rdgetdsqgm.exeC:\Windows\system32\rdgetdsqgm.exe 980 "C:\Windows\SysWOW64\ixfgddfthn.exe"117⤵PID:2620
-
C:\Windows\SysWOW64\ecbhklqxhy.exeC:\Windows\system32\ecbhklqxhy.exe 964 "C:\Windows\SysWOW64\rdgetdsqgm.exe"118⤵PID:2932
-
C:\Windows\SysWOW64\rpswqpokvx.exeC:\Windows\system32\rpswqpokvx.exe 1000 "C:\Windows\SysWOW64\ecbhklqxhy.exe"119⤵PID:1664
-
C:\Windows\SysWOW64\bdtugwbguw.exeC:\Windows\system32\bdtugwbguw.exe 952 "C:\Windows\SysWOW64\rpswqpokvx.exe"120⤵PID:2868
-
C:\Windows\SysWOW64\rhtpkcyabj.exeC:\Windows\system32\rhtpkcyabj.exe 988 "C:\Windows\SysWOW64\bdtugwbguw.exe"121⤵PID:1780
-
C:\Windows\SysWOW64\bkjzxfnuou.exeC:\Windows\system32\bkjzxfnuou.exe 996 "C:\Windows\SysWOW64\rhtpkcyabj.exe"122⤵PID:2332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-