Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/11/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe
-
Size
107KB
-
MD5
8f4f52279db3eedc7cdaa1f229ebb91d
-
SHA1
2c06ca94a692863099d6bf5db6e8af26ee72d53f
-
SHA256
06bde76b1a6b1627f2aa82fb5fb7f756edce32519607c4d6b9108b1bf6412401
-
SHA512
dc219c1f01eb2baf79b92ebb500204a742d97e2b0963bc4f37424d63d594c555732921f6151905d2c9b319274b27bf2e0ff719cbfe894517603e0e83f33a1f7f
-
SSDEEP
3072:FqTn4EsPVigXmTEKDfx6wW86PT3GMWvji:sTnoV1XmTEoQIzj
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 3052 dlooyrqawds.exe 2800 ijlwlspmrmc.exe 2840 pcjbalxydby.exe 2832 cwprmykiqjl.exe 2620 mvcpexjiqzp.exe 3032 ociztosmkty.exe 1712 bhzuixvqkgm.exe 2356 gfekvydbfhx.exe 1484 voppcvlplcu.exe 1756 asjxwfppfdg.exe 2920 vrcpzhpbaou.exe 1048 kswmiqhgtnk.exe 1184 cdjfinheawq.exe 1636 heszytnsakb.exe 848 rphkuwtmuvf.exe 2964 bolhevbmutj.exe 480 oqrxpzfwatx.exe 2484 bdjnvdmaosj.exe 1204 otepeljipew.exe 2092 vbzpyataoor.exe 2340 aosxrkyiixc.exe 2268 scjdumfjcmj.exe 2856 xlzxkjlpjit.exe 2616 pdbiyprkpja.exe 2600 whmvhatacgu.exe 1148 memvtadudhs.exe 2008 zvoxcaibetf.exe 2056 ohpsgofvlga.exe 1016 qkedbrlpxrf.exe 1984 bjqamqtpxqj.exe 632 nlwqxuxylpo.exe 2824 suelozdeslh.exe 1300 acsdapnwsvc.exe 444 pnpyjdpnyiy.exe 1612 uwftaivtgwj.exe 1304 mohlnobxlgq.exe 2264 zncowwgemsd.exe 2096 ddgascshtgp.exe 2288 lzqobvvwgdj.exe 768 atnbljxnuqg.exe 1632 logtseglibj.exe 2688 yqmbmikunbx.exe 2908 cdgjxspdhki.exe 2732 saoijkywikf.exe 2808 ckdowaarjii.exe 2728 ppvjlrddbuw.exe 2764 wxijxgmnifr.exe 2608 oivbfenmpgx.exe 1188 wyrtztweoqs.exe 2156 jomwhbclpcf.exe 1040 vfhyqjhsqps.exe 1932 idjbzjfirbf.exe 2052 kuprwotdxji.exe 2812 xtstfwykqvv.exe 2444 flruudcxyfo.exe 692 rrioiufjyrc.exe 2968 zrhoobjxytw.exe 964 oohobtsqrct.exe 2260 zkihivtnenx.exe 2284 jjmebmbnndb.exe 1064 qriwnkkfmnw.exe 2216 goqeactrfnt.exe 2504 tjzufgsdtvf.exe 1884 dlpebjyygyk.exe -
Loads dropped DLL 64 IoCs
pid Process 1092 8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe 1092 8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe 3052 dlooyrqawds.exe 3052 dlooyrqawds.exe 2800 ijlwlspmrmc.exe 2800 ijlwlspmrmc.exe 2840 pcjbalxydby.exe 2840 pcjbalxydby.exe 2832 cwprmykiqjl.exe 2832 cwprmykiqjl.exe 2620 mvcpexjiqzp.exe 2620 mvcpexjiqzp.exe 3032 ociztosmkty.exe 3032 ociztosmkty.exe 1712 bhzuixvqkgm.exe 1712 bhzuixvqkgm.exe 2356 gfekvydbfhx.exe 2356 gfekvydbfhx.exe 1484 voppcvlplcu.exe 1484 voppcvlplcu.exe 1756 asjxwfppfdg.exe 1756 asjxwfppfdg.exe 2920 vrcpzhpbaou.exe 2920 vrcpzhpbaou.exe 1048 kswmiqhgtnk.exe 1048 kswmiqhgtnk.exe 1184 cdjfinheawq.exe 1184 cdjfinheawq.exe 1636 heszytnsakb.exe 1636 heszytnsakb.exe 848 rphkuwtmuvf.exe 848 rphkuwtmuvf.exe 2964 bolhevbmutj.exe 2964 bolhevbmutj.exe 480 oqrxpzfwatx.exe 480 oqrxpzfwatx.exe 2484 bdjnvdmaosj.exe 2484 bdjnvdmaosj.exe 1204 otepeljipew.exe 1204 otepeljipew.exe 2092 vbzpyataoor.exe 2092 vbzpyataoor.exe 2340 aosxrkyiixc.exe 2340 aosxrkyiixc.exe 2268 scjdumfjcmj.exe 2268 scjdumfjcmj.exe 2856 xlzxkjlpjit.exe 2856 xlzxkjlpjit.exe 2616 pdbiyprkpja.exe 2616 pdbiyprkpja.exe 2600 whmvhatacgu.exe 2600 whmvhatacgu.exe 1148 memvtadudhs.exe 1148 memvtadudhs.exe 2008 zvoxcaibetf.exe 2008 zvoxcaibetf.exe 2056 ohpsgofvlga.exe 2056 ohpsgofvlga.exe 1016 qkedbrlpxrf.exe 1016 qkedbrlpxrf.exe 1984 bjqamqtpxqj.exe 1984 bjqamqtpxqj.exe 632 nlwqxuxylpo.exe 632 nlwqxuxylpo.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\zncowwgemsd.exe mohlnobxlgq.exe File created C:\Windows\SysWOW64\zsutqbnpyqa.exe qeuwscasysv.exe File created C:\Windows\SysWOW64\auroqdgldio.exe nvwthvbecvb.exe File opened for modification C:\Windows\SysWOW64\uqpamggeeiz.exe knsqydzcrxv.exe File created C:\Windows\SysWOW64\nrksijaghkn.exe ogdmtpruvmr.exe File created C:\Windows\SysWOW64\xwaziehdvmb.exe nmkpmjtbibx.exe File opened for modification C:\Windows\SysWOW64\wosstvvmrxt.exe masudoiqsyo.exe File opened for modification C:\Windows\SysWOW64\zkihivtnenx.exe oohobtsqrct.exe File created C:\Windows\SysWOW64\budveolsgbi.exe owiswggdfpv.exe File created C:\Windows\SysWOW64\defwnzpteks.exe qrnghdqgqdf.exe File created C:\Windows\SysWOW64\kwyovgxkilr.exe atididrqvam.exe File opened for modification C:\Windows\SysWOW64\nlwqxuxylpo.exe bjqamqtpxqj.exe File created C:\Windows\SysWOW64\wplghhtwpqw.exe jcuqclmjijk.exe File created C:\Windows\SysWOW64\sbzeidyxoug.exe fcecacshoas.exe File created C:\Windows\SysWOW64\hjrdsdppepc.exe utobjvjiddx.exe File created C:\Windows\SysWOW64\trgrhaoihoo.exe jprgmxhgmlk.exe File opened for modification C:\Windows\SysWOW64\ybbpohtvago.exe ocpkeilwaik.exe File opened for modification C:\Windows\SysWOW64\aliyheykggk.exe vqribarfahy.exe File created C:\Windows\SysWOW64\ppvjlrddbuw.exe ckdowaarjii.exe File opened for modification C:\Windows\SysWOW64\nmkakcyifkr.exe aztkeyawqle.exe File created C:\Windows\SysWOW64\nlsdtnjgugk.exe armviafwhhw.exe File created C:\Windows\SysWOW64\kctuavsjsop.exe xmyrrnmczuc.exe File created C:\Windows\SysWOW64\yoigbfylons.exe mmczqsubbnf.exe File created C:\Windows\SysWOW64\rkqqajlqecx.exe exgbugmlyvk.exe File opened for modification C:\Windows\SysWOW64\equqqrxutse.exe rrznijrfsgr.exe File opened for modification C:\Windows\SysWOW64\lifnrdqzmps.exe vwesvpunxtw.exe File created C:\Windows\SysWOW64\ftgnkcaczhb.exe syopeybptio.exe File opened for modification C:\Windows\SysWOW64\dhydaadceqq.exe qrwasaxvldd.exe File created C:\Windows\SysWOW64\jqftenhwelo.exe zfpjrkburij.exe File created C:\Windows\SysWOW64\yfnnyhpkiab.exe pupddejqwpw.exe File created C:\Windows\SysWOW64\mwzzpmyapok.exe cmjpcjsgdlf.exe File opened for modification C:\Windows\SysWOW64\xwakxffcrvv.exe nmkakcyifkr.exe File opened for modification C:\Windows\SysWOW64\iqhrsakozdu.exe vrmobsmhgrh.exe File opened for modification C:\Windows\SysWOW64\ftgnkcaczhb.exe syopeybptio.exe File opened for modification C:\Windows\SysWOW64\rzghmyklaew.exe famedqnehrj.exe File opened for modification C:\Windows\SysWOW64\cifnljfjass.exe pvvpffhwmtf.exe File created C:\Windows\SysWOW64\xmyrrnmczuc.exe nbihekgaerx.exe File opened for modification C:\Windows\SysWOW64\molsudtsqpj.exe cewhzanqvee.exe File opened for modification C:\Windows\SysWOW64\wyqarfdjyjz.exe jwklgszztkl.exe File opened for modification C:\Windows\SysWOW64\vdbmsobfxeg.exe lsmkxlnlltc.exe File opened for modification C:\Windows\SysWOW64\iuvgxrhqbwq.exe vesdoibjakd.exe File created C:\Windows\SysWOW64\hgeldrkvpel.exe xvpbqoebcsg.exe File opened for modification C:\Windows\SysWOW64\kyqwacxnjwu.exe akqhkujqkyp.exe File created C:\Windows\SysWOW64\nrxwsibzwnf.exe dgimffuxjkb.exe File created C:\Windows\SysWOW64\vggfajliiag.exe ilppufmdubt.exe File opened for modification C:\Windows\SysWOW64\orjkrbaadxg.exe btohibvsclt.exe File created C:\Windows\SysWOW64\jryeiikewww.exe ysuhpjdfvgs.exe File opened for modification C:\Windows\SysWOW64\rrznijrfsgr.exe hpkdugllfum.exe File created C:\Windows\SysWOW64\zctgzwebqkk.exe odpjpxxbqmg.exe File created C:\Windows\SysWOW64\tyxaqwgvdpj.exe jwhpvtatqee.exe File created C:\Windows\SysWOW64\ynifkrymack.exe okluxnssnzg.exe File opened for modification C:\Windows\SysWOW64\fenliyxeneb.exe sjvncuyzgxp.exe File opened for modification C:\Windows\SysWOW64\togtmysgofj.exe gqdqwqvznte.exe File opened for modification C:\Windows\SysWOW64\vzjfbzjzvwi.exe lliilswdwyd.exe File created C:\Windows\SysWOW64\ikyyzkmysow.exe yhjoehywfca.exe File opened for modification C:\Windows\SysWOW64\mijkhciwgud.exe zjohzucpniq.exe File opened for modification C:\Windows\SysWOW64\besaxfzerxs.exe orjkrbaadxg.exe File opened for modification C:\Windows\SysWOW64\heszytnsakb.exe cdjfinheawq.exe File opened for modification C:\Windows\SysWOW64\cspibeipipe.exe sqaynacmvea.exe File opened for modification C:\Windows\SysWOW64\kjdxpgbhqhu.exe xlaugyvaxvh.exe File opened for modification C:\Windows\SysWOW64\manicpwaldx.exe zksgthrtlik.exe File created C:\Windows\SysWOW64\xbtpuacscnw.exe kcymeaxlbbj.exe File opened for modification C:\Windows\SysWOW64\iwlaqwnvnhk.exe ylvqdtgtawg.exe File created C:\Windows\SysWOW64\lifyovwgaye.exe ykkvfvqzhmz.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkihivtnenx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xncjwqrfhvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yaovejajqfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdytpukjcfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfxmcucdepv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aosxrkyiixc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vzsvejrofqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpxviuuvrli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gilnkyrcuxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cifnljfjass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlvyqdflkhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jkenjzewtnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uksdlfhnvva.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsfuflubqtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhnyhhtniwc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qwlptcouhqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uwftaivtgwj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbyxhoramsa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktsxwzfgnir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wptaslzkkiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sftqxruyorc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvnfdkqnvlq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ohpsgofvlga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coxddnambwj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language azbrhfuxuck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uhtshzlwwtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xutqeodrixe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdjfinheawq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdjxllfhknj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hegsxslpjvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ulepzawcpiw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vaprnzmnbxo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfabojjcrtz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zksgthrtlik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbihekgaerx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uafjxxamfyp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awsdcshbxjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdbmsobfxeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bduhvagpzwx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxijxgmnifr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgheigmvpru.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbfwgsibzao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrxwsibzwnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jckkmhbxwjh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rinukrpkuuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtsbfdhkwec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhvsekpcszi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmlrknveamx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lytunblzvts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ociztosmkty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kzdsycaljkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dshjmsukqkw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mruxjccxult.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsugqqmxuhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzabxebobkr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flludpbpqgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jhycaglckyg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frdpuvltzbk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sncvypswsat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfnucettsjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtzunksawqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egqwtzvrngu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lgtpoxbzurb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vfxngwjzupf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1092 wrote to memory of 3052 1092 8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe 30 PID 1092 wrote to memory of 3052 1092 8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe 30 PID 1092 wrote to memory of 3052 1092 8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe 30 PID 1092 wrote to memory of 3052 1092 8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe 30 PID 3052 wrote to memory of 2800 3052 dlooyrqawds.exe 31 PID 3052 wrote to memory of 2800 3052 dlooyrqawds.exe 31 PID 3052 wrote to memory of 2800 3052 dlooyrqawds.exe 31 PID 3052 wrote to memory of 2800 3052 dlooyrqawds.exe 31 PID 2800 wrote to memory of 2840 2800 ijlwlspmrmc.exe 32 PID 2800 wrote to memory of 2840 2800 ijlwlspmrmc.exe 32 PID 2800 wrote to memory of 2840 2800 ijlwlspmrmc.exe 32 PID 2800 wrote to memory of 2840 2800 ijlwlspmrmc.exe 32 PID 2840 wrote to memory of 2832 2840 pcjbalxydby.exe 33 PID 2840 wrote to memory of 2832 2840 pcjbalxydby.exe 33 PID 2840 wrote to memory of 2832 2840 pcjbalxydby.exe 33 PID 2840 wrote to memory of 2832 2840 pcjbalxydby.exe 33 PID 2832 wrote to memory of 2620 2832 cwprmykiqjl.exe 34 PID 2832 wrote to memory of 2620 2832 cwprmykiqjl.exe 34 PID 2832 wrote to memory of 2620 2832 cwprmykiqjl.exe 34 PID 2832 wrote to memory of 2620 2832 cwprmykiqjl.exe 34 PID 2620 wrote to memory of 3032 2620 mvcpexjiqzp.exe 35 PID 2620 wrote to memory of 3032 2620 mvcpexjiqzp.exe 35 PID 2620 wrote to memory of 3032 2620 mvcpexjiqzp.exe 35 PID 2620 wrote to memory of 3032 2620 mvcpexjiqzp.exe 35 PID 3032 wrote to memory of 1712 3032 ociztosmkty.exe 36 PID 3032 wrote to memory of 1712 3032 ociztosmkty.exe 36 PID 3032 wrote to memory of 1712 3032 ociztosmkty.exe 36 PID 3032 wrote to memory of 1712 3032 ociztosmkty.exe 36 PID 1712 wrote to memory of 2356 1712 bhzuixvqkgm.exe 37 PID 1712 wrote to memory of 2356 1712 bhzuixvqkgm.exe 37 PID 1712 wrote to memory of 2356 1712 bhzuixvqkgm.exe 37 PID 1712 wrote to memory of 2356 1712 bhzuixvqkgm.exe 37 PID 2356 wrote to memory of 1484 2356 gfekvydbfhx.exe 38 PID 2356 wrote to memory of 1484 2356 gfekvydbfhx.exe 38 PID 2356 wrote to memory of 1484 2356 gfekvydbfhx.exe 38 PID 2356 wrote to memory of 1484 2356 gfekvydbfhx.exe 38 PID 1484 wrote to memory of 1756 1484 voppcvlplcu.exe 39 PID 1484 wrote to memory of 1756 1484 voppcvlplcu.exe 39 PID 1484 wrote to memory of 1756 1484 voppcvlplcu.exe 39 PID 1484 wrote to memory of 1756 1484 voppcvlplcu.exe 39 PID 1756 wrote to memory of 2920 1756 asjxwfppfdg.exe 40 PID 1756 wrote to memory of 2920 1756 asjxwfppfdg.exe 40 PID 1756 wrote to memory of 2920 1756 asjxwfppfdg.exe 40 PID 1756 wrote to memory of 2920 1756 asjxwfppfdg.exe 40 PID 2920 wrote to memory of 1048 2920 vrcpzhpbaou.exe 41 PID 2920 wrote to memory of 1048 2920 vrcpzhpbaou.exe 41 PID 2920 wrote to memory of 1048 2920 vrcpzhpbaou.exe 41 PID 2920 wrote to memory of 1048 2920 vrcpzhpbaou.exe 41 PID 1048 wrote to memory of 1184 1048 kswmiqhgtnk.exe 42 PID 1048 wrote to memory of 1184 1048 kswmiqhgtnk.exe 42 PID 1048 wrote to memory of 1184 1048 kswmiqhgtnk.exe 42 PID 1048 wrote to memory of 1184 1048 kswmiqhgtnk.exe 42 PID 1184 wrote to memory of 1636 1184 cdjfinheawq.exe 43 PID 1184 wrote to memory of 1636 1184 cdjfinheawq.exe 43 PID 1184 wrote to memory of 1636 1184 cdjfinheawq.exe 43 PID 1184 wrote to memory of 1636 1184 cdjfinheawq.exe 43 PID 1636 wrote to memory of 848 1636 heszytnsakb.exe 44 PID 1636 wrote to memory of 848 1636 heszytnsakb.exe 44 PID 1636 wrote to memory of 848 1636 heszytnsakb.exe 44 PID 1636 wrote to memory of 848 1636 heszytnsakb.exe 44 PID 848 wrote to memory of 2964 848 rphkuwtmuvf.exe 45 PID 848 wrote to memory of 2964 848 rphkuwtmuvf.exe 45 PID 848 wrote to memory of 2964 848 rphkuwtmuvf.exe 45 PID 848 wrote to memory of 2964 848 rphkuwtmuvf.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\dlooyrqawds.exeC:\Windows\system32\dlooyrqawds.exe 528 "C:\Users\Admin\AppData\Local\Temp\8f4f52279db3eedc7cdaa1f229ebb91d_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\ijlwlspmrmc.exeC:\Windows\system32\ijlwlspmrmc.exe 452 "C:\Windows\SysWOW64\dlooyrqawds.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\pcjbalxydby.exeC:\Windows\system32\pcjbalxydby.exe 540 "C:\Windows\SysWOW64\ijlwlspmrmc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cwprmykiqjl.exeC:\Windows\system32\cwprmykiqjl.exe 552 "C:\Windows\SysWOW64\pcjbalxydby.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\mvcpexjiqzp.exeC:\Windows\system32\mvcpexjiqzp.exe 536 "C:\Windows\SysWOW64\cwprmykiqjl.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\ociztosmkty.exeC:\Windows\system32\ociztosmkty.exe 476 "C:\Windows\SysWOW64\mvcpexjiqzp.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\bhzuixvqkgm.exeC:\Windows\system32\bhzuixvqkgm.exe 560 "C:\Windows\SysWOW64\ociztosmkty.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\gfekvydbfhx.exeC:\Windows\system32\gfekvydbfhx.exe 456 "C:\Windows\SysWOW64\bhzuixvqkgm.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\voppcvlplcu.exeC:\Windows\system32\voppcvlplcu.exe 556 "C:\Windows\SysWOW64\gfekvydbfhx.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\asjxwfppfdg.exeC:\Windows\system32\asjxwfppfdg.exe 572 "C:\Windows\SysWOW64\voppcvlplcu.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\vrcpzhpbaou.exeC:\Windows\system32\vrcpzhpbaou.exe 564 "C:\Windows\SysWOW64\asjxwfppfdg.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\kswmiqhgtnk.exeC:\Windows\system32\kswmiqhgtnk.exe 568 "C:\Windows\SysWOW64\vrcpzhpbaou.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cdjfinheawq.exeC:\Windows\system32\cdjfinheawq.exe 580 "C:\Windows\SysWOW64\kswmiqhgtnk.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\heszytnsakb.exeC:\Windows\system32\heszytnsakb.exe 504 "C:\Windows\SysWOW64\cdjfinheawq.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rphkuwtmuvf.exeC:\Windows\system32\rphkuwtmuvf.exe 588 "C:\Windows\SysWOW64\heszytnsakb.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\bolhevbmutj.exeC:\Windows\system32\bolhevbmutj.exe 592 "C:\Windows\SysWOW64\rphkuwtmuvf.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2964 -
C:\Windows\SysWOW64\oqrxpzfwatx.exeC:\Windows\system32\oqrxpzfwatx.exe 584 "C:\Windows\SysWOW64\bolhevbmutj.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:480 -
C:\Windows\SysWOW64\bdjnvdmaosj.exeC:\Windows\system32\bdjnvdmaosj.exe 596 "C:\Windows\SysWOW64\oqrxpzfwatx.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2484 -
C:\Windows\SysWOW64\otepeljipew.exeC:\Windows\system32\otepeljipew.exe 600 "C:\Windows\SysWOW64\bdjnvdmaosj.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1204 -
C:\Windows\SysWOW64\vbzpyataoor.exeC:\Windows\system32\vbzpyataoor.exe 620 "C:\Windows\SysWOW64\otepeljipew.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2092 -
C:\Windows\SysWOW64\aosxrkyiixc.exeC:\Windows\system32\aosxrkyiixc.exe 500 "C:\Windows\SysWOW64\vbzpyataoor.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\scjdumfjcmj.exeC:\Windows\system32\scjdumfjcmj.exe 616 "C:\Windows\SysWOW64\aosxrkyiixc.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2268 -
C:\Windows\SysWOW64\xlzxkjlpjit.exeC:\Windows\system32\xlzxkjlpjit.exe 612 "C:\Windows\SysWOW64\scjdumfjcmj.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856 -
C:\Windows\SysWOW64\pdbiyprkpja.exeC:\Windows\system32\pdbiyprkpja.exe 608 "C:\Windows\SysWOW64\xlzxkjlpjit.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2616 -
C:\Windows\SysWOW64\whmvhatacgu.exeC:\Windows\system32\whmvhatacgu.exe 644 "C:\Windows\SysWOW64\pdbiyprkpja.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2600 -
C:\Windows\SysWOW64\memvtadudhs.exeC:\Windows\system32\memvtadudhs.exe 628 "C:\Windows\SysWOW64\whmvhatacgu.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1148 -
C:\Windows\SysWOW64\zvoxcaibetf.exeC:\Windows\system32\zvoxcaibetf.exe 636 "C:\Windows\SysWOW64\memvtadudhs.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008 -
C:\Windows\SysWOW64\ohpsgofvlga.exeC:\Windows\system32\ohpsgofvlga.exe 640 "C:\Windows\SysWOW64\zvoxcaibetf.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\SysWOW64\qkedbrlpxrf.exeC:\Windows\system32\qkedbrlpxrf.exe 624 "C:\Windows\SysWOW64\ohpsgofvlga.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1016 -
C:\Windows\SysWOW64\bjqamqtpxqj.exeC:\Windows\system32\bjqamqtpxqj.exe 632 "C:\Windows\SysWOW64\qkedbrlpxrf.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\nlwqxuxylpo.exeC:\Windows\system32\nlwqxuxylpo.exe 468 "C:\Windows\SysWOW64\bjqamqtpxqj.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:632 -
C:\Windows\SysWOW64\suelozdeslh.exeC:\Windows\system32\suelozdeslh.exe 656 "C:\Windows\SysWOW64\nlwqxuxylpo.exe"33⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\acsdapnwsvc.exeC:\Windows\system32\acsdapnwsvc.exe 660 "C:\Windows\SysWOW64\suelozdeslh.exe"34⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\pnpyjdpnyiy.exeC:\Windows\system32\pnpyjdpnyiy.exe 664 "C:\Windows\SysWOW64\acsdapnwsvc.exe"35⤵
- Executes dropped EXE
PID:444 -
C:\Windows\SysWOW64\uwftaivtgwj.exeC:\Windows\system32\uwftaivtgwj.exe 460 "C:\Windows\SysWOW64\pnpyjdpnyiy.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\mohlnobxlgq.exeC:\Windows\system32\mohlnobxlgq.exe 668 "C:\Windows\SysWOW64\uwftaivtgwj.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1304 -
C:\Windows\SysWOW64\zncowwgemsd.exeC:\Windows\system32\zncowwgemsd.exe 672 "C:\Windows\SysWOW64\mohlnobxlgq.exe"38⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\SysWOW64\ddgascshtgp.exeC:\Windows\system32\ddgascshtgp.exe 680 "C:\Windows\SysWOW64\zncowwgemsd.exe"39⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\SysWOW64\lzqobvvwgdj.exeC:\Windows\system32\lzqobvvwgdj.exe 676 "C:\Windows\SysWOW64\ddgascshtgp.exe"40⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\atnbljxnuqg.exeC:\Windows\system32\atnbljxnuqg.exe 684 "C:\Windows\SysWOW64\lzqobvvwgdj.exe"41⤵
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\logtseglibj.exeC:\Windows\system32\logtseglibj.exe 524 "C:\Windows\SysWOW64\atnbljxnuqg.exe"42⤵
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\yqmbmikunbx.exeC:\Windows\system32\yqmbmikunbx.exe 692 "C:\Windows\SysWOW64\logtseglibj.exe"43⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\cdgjxspdhki.exeC:\Windows\system32\cdgjxspdhki.exe 520 "C:\Windows\SysWOW64\yqmbmikunbx.exe"44⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\saoijkywikf.exeC:\Windows\system32\saoijkywikf.exe 700 "C:\Windows\SysWOW64\cdgjxspdhki.exe"45⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\ckdowaarjii.exeC:\Windows\system32\ckdowaarjii.exe 704 "C:\Windows\SysWOW64\saoijkywikf.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\ppvjlrddbuw.exeC:\Windows\system32\ppvjlrddbuw.exe 708 "C:\Windows\SysWOW64\ckdowaarjii.exe"47⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\wxijxgmnifr.exeC:\Windows\system32\wxijxgmnifr.exe 716 "C:\Windows\SysWOW64\ppvjlrddbuw.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\SysWOW64\oivbfenmpgx.exeC:\Windows\system32\oivbfenmpgx.exe 712 "C:\Windows\SysWOW64\wxijxgmnifr.exe"49⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\wyrtztweoqs.exeC:\Windows\system32\wyrtztweoqs.exe 724 "C:\Windows\SysWOW64\oivbfenmpgx.exe"50⤵
- Executes dropped EXE
PID:1188 -
C:\Windows\SysWOW64\jomwhbclpcf.exeC:\Windows\system32\jomwhbclpcf.exe 720 "C:\Windows\SysWOW64\wyrtztweoqs.exe"51⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\vfhyqjhsqps.exeC:\Windows\system32\vfhyqjhsqps.exe 732 "C:\Windows\SysWOW64\jomwhbclpcf.exe"52⤵
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\idjbzjfirbf.exeC:\Windows\system32\idjbzjfirbf.exe 736 "C:\Windows\SysWOW64\vfhyqjhsqps.exe"53⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\kuprwotdxji.exeC:\Windows\system32\kuprwotdxji.exe 508 "C:\Windows\SysWOW64\idjbzjfirbf.exe"54⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\SysWOW64\xtstfwykqvv.exeC:\Windows\system32\xtstfwykqvv.exe 740 "C:\Windows\SysWOW64\kuprwotdxji.exe"55⤵
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\flruudcxyfo.exeC:\Windows\system32\flruudcxyfo.exe 760 "C:\Windows\SysWOW64\xtstfwykqvv.exe"56⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\rrioiufjyrc.exeC:\Windows\system32\rrioiufjyrc.exe 744 "C:\Windows\SysWOW64\flruudcxyfo.exe"57⤵
- Executes dropped EXE
PID:692 -
C:\Windows\SysWOW64\zrhoobjxytw.exeC:\Windows\system32\zrhoobjxytw.exe 748 "C:\Windows\SysWOW64\rrioiufjyrc.exe"58⤵
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\oohobtsqrct.exeC:\Windows\system32\oohobtsqrct.exe 752 "C:\Windows\SysWOW64\zrhoobjxytw.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:964 -
C:\Windows\SysWOW64\zkihivtnenx.exeC:\Windows\system32\zkihivtnenx.exe 764 "C:\Windows\SysWOW64\oohobtsqrct.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\jjmebmbnndb.exeC:\Windows\system32\jjmebmbnndb.exe 776 "C:\Windows\SysWOW64\zkihivtnenx.exe"61⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\qriwnkkfmnw.exeC:\Windows\system32\qriwnkkfmnw.exe 772 "C:\Windows\SysWOW64\jjmebmbnndb.exe"62⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\goqeactrfnt.exeC:\Windows\system32\goqeactrfnt.exe 756 "C:\Windows\SysWOW64\qriwnkkfmnw.exe"63⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\tjzufgsdtvf.exeC:\Windows\system32\tjzufgsdtvf.exe 780 "C:\Windows\SysWOW64\goqeactrfnt.exe"64⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\dlpebjyygyk.exeC:\Windows\system32\dlpebjyygyk.exe 768 "C:\Windows\SysWOW64\tjzufgsdtvf.exe"65⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\ceypvviourk.exeC:\Windows\system32\ceypvviourk.exe 472 "C:\Windows\SysWOW64\dlpebjyygyk.exe"66⤵PID:2932
-
C:\Windows\SysWOW64\rbyxhoramsa.exeC:\Windows\system32\rbyxhoramsa.exe 792 "C:\Windows\SysWOW64\ceypvviourk.exe"67⤵
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\SysWOW64\cwyhpisfadl.exeC:\Windows\system32\cwyhpisfadl.exe 804 "C:\Windows\SysWOW64\rbyxhoramsa.exe"68⤵PID:2848
-
C:\Windows\SysWOW64\rqvuywuwoqa.exeC:\Windows\system32\rqvuywuwoqa.exe 788 "C:\Windows\SysWOW64\cwyhpisfadl.exe"69⤵PID:2780
-
C:\Windows\SysWOW64\clwmgqvucbd.exeC:\Windows\system32\clwmgqvucbd.exe 816 "C:\Windows\SysWOW64\rqvuywuwoqa.exe"70⤵PID:2656
-
C:\Windows\SysWOW64\ornhchgycor.exeC:\Windows\system32\ornhchgycor.exe 796 "C:\Windows\SysWOW64\clwmgqvucbd.exe"71⤵PID:2424
-
C:\Windows\SysWOW64\ymgakchdpzv.exeC:\Windows\system32\ymgakchdpzv.exe 800 "C:\Windows\SysWOW64\ornhchgycor.exe"72⤵PID:1732
-
C:\Windows\SysWOW64\ogdmtpruvmr.exeC:\Windows\system32\ogdmtpruvmr.exe 824 "C:\Windows\SysWOW64\ymgakchdpzv.exe"73⤵
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\nrksijaghkn.exeC:\Windows\system32\nrksijaghkn.exe 832 "C:\Windows\SysWOW64\ogdmtpruvmr.exe"74⤵PID:808
-
C:\Windows\SysWOW64\ckynsfcyvxj.exeC:\Windows\system32\ckynsfcyvxj.exe 812 "C:\Windows\SysWOW64\nrksijaghkn.exe"75⤵PID:2468
-
C:\Windows\SysWOW64\qxqcyjbckww.exeC:\Windows\system32\qxqcyjbckww.exe 840 "C:\Windows\SysWOW64\ckynsfcyvxj.exe"76⤵PID:2480
-
C:\Windows\SysWOW64\cwlfojgscij.exeC:\Windows\system32\cwlfojgscij.exe 820 "C:\Windows\SysWOW64\qxqcyjbckww.exe"77⤵PID:1868
-
C:\Windows\SysWOW64\hqbffbrxwrv.exeC:\Windows\system32\hqbffbrxwrv.exe 844 "C:\Windows\SysWOW64\cwlfojgscij.exe"78⤵PID:2820
-
C:\Windows\SysWOW64\wjyappbgkfs.exeC:\Windows\system32\wjyappbgkfs.exe 828 "C:\Windows\SysWOW64\hqbffbrxwrv.exe"79⤵PID:2200
-
C:\Windows\SysWOW64\jwhpvtatqee.exeC:\Windows\system32\jwhpvtatqee.exe 836 "C:\Windows\SysWOW64\wjyappbgkfs.exe"80⤵
- Drops file in System32 directory
PID:1660 -
C:\Windows\SysWOW64\tyxaqwgvdpj.exeC:\Windows\system32\tyxaqwgvdpj.exe 848 "C:\Windows\SysWOW64\jwhpvtatqee.exe"81⤵PID:1748
-
C:\Windows\SysWOW64\dyjxavomdnn.exeC:\Windows\system32\dyjxavomdnn.exe 860 "C:\Windows\SysWOW64\tyxaqwgvdpj.exe"82⤵PID:3064
-
C:\Windows\SysWOW64\qwdajvtbeaa.exeC:\Windows\system32\qwdajvtbeaa.exe 872 "C:\Windows\SysWOW64\dyjxavomdnn.exe"83⤵PID:616
-
C:\Windows\SysWOW64\aztkeyawqle.exeC:\Windows\system32\aztkeyawqle.exe 852 "C:\Windows\SysWOW64\qwdajvtbeaa.exe"84⤵
- Drops file in System32 directory
PID:2280 -
C:\Windows\SysWOW64\nmkakcyifkr.exeC:\Windows\system32\nmkakcyifkr.exe 856 "C:\Windows\SysWOW64\aztkeyawqle.exe"85⤵
- Drops file in System32 directory
PID:2992 -
C:\Windows\SysWOW64\xwakxffcrvv.exeC:\Windows\system32\xwakxffcrvv.exe 864 "C:\Windows\SysWOW64\nmkakcyifkr.exe"86⤵PID:2996
-
C:\Windows\SysWOW64\kjradjlpgui.exeC:\Windows\system32\kjradjlpgui.exe 868 "C:\Windows\SysWOW64\xwakxffcrvv.exe"87⤵PID:2104
-
C:\Windows\SysWOW64\uuhlqesjsgm.exeC:\Windows\system32\uuhlqesjsgm.exe 884 "C:\Windows\SysWOW64\kjradjlpgui.exe"88⤵PID:2604
-
C:\Windows\SysWOW64\hkbnhmxqtsz.exeC:\Windows\system32\hkbnhmxqtsz.exe 876 "C:\Windows\SysWOW64\uuhlqesjsgm.exe"89⤵PID:1240
-
C:\Windows\SysWOW64\owiswggdfpv.exeC:\Windows\system32\owiswggdfpv.exe 880 "C:\Windows\SysWOW64\hkbnhmxqtsz.exe"90⤵
- Drops file in System32 directory
PID:888 -
C:\Windows\SysWOW64\budveolsgbi.exeC:\Windows\system32\budveolsgbi.exe 888 "C:\Windows\SysWOW64\owiswggdfpv.exe"91⤵PID:2724
-
C:\Windows\SysWOW64\phnlkskxmbu.exeC:\Windows\system32\phnlkskxmbu.exe 900 "C:\Windows\SysWOW64\budveolsgbi.exe"92⤵PID:3020
-
C:\Windows\SysWOW64\ykkvfvqzhmz.exeC:\Windows\system32\ykkvfvqzhmz.exe 892 "C:\Windows\SysWOW64\phnlkskxmbu.exe"93⤵
- Drops file in System32 directory
PID:2624 -
C:\Windows\SysWOW64\lifyovwgaye.exeC:\Windows\system32\lifyovwgaye.exe 904 "C:\Windows\SysWOW64\ykkvfvqzhmz.exe"94⤵PID:2412
-
C:\Windows\SysWOW64\yzabxebobkr.exeC:\Windows\system32\yzabxebobkr.exe 896 "C:\Windows\SysWOW64\lifyovwgaye.exe"95⤵
- System Location Discovery: System Language Discovery
PID:816 -
C:\Windows\SysWOW64\inaqnlgkajw.exeC:\Windows\system32\inaqnlgkajw.exe 916 "C:\Windows\SysWOW64\yzabxebobkr.exe"96⤵PID:844
-
C:\Windows\SysWOW64\vdvtvlmrbvj.exeC:\Windows\system32\vdvtvlmrbvj.exe 908 "C:\Windows\SysWOW64\inaqnlgkajw.exe"97⤵PID:1768
-
C:\Windows\SysWOW64\icyvmtrybhw.exeC:\Windows\system32\icyvmtrybhw.exe 924 "C:\Windows\SysWOW64\vdvtvlmrbvj.exe"98⤵PID:2032
-
C:\Windows\SysWOW64\sengzwyaosa.exeC:\Windows\system32\sengzwyaosa.exe 912 "C:\Windows\SysWOW64\icyvmtrybhw.exe"99⤵PID:1968
-
C:\Windows\SysWOW64\frfvfaxfurn.exeC:\Windows\system32\frfvfaxfurn.exe 936 "C:\Windows\SysWOW64\sengzwyaosa.exe"100⤵PID:1348
-
C:\Windows\SysWOW64\sqaynacmvea.exeC:\Windows\system32\sqaynacmvea.exe 808 "C:\Windows\SysWOW64\frfvfaxfurn.exe"101⤵
- Drops file in System32 directory
PID:2512 -
C:\Windows\SysWOW64\cspibeipipe.exeC:\Windows\system32\cspibeipipe.exe 920 "C:\Windows\SysWOW64\sqaynacmvea.exe"102⤵PID:2592
-
C:\Windows\SysWOW64\ldetwhxjvaj.exeC:\Windows\system32\ldetwhxjvaj.exe 932 "C:\Windows\SysWOW64\cspibeipipe.exe"103⤵PID:2144
-
C:\Windows\SysWOW64\wcqqgfwidyn.exeC:\Windows\system32\wcqqgfwidyn.exe 948 "C:\Windows\SysWOW64\ldetwhxjvaj.exe"104⤵PID:2108
-
C:\Windows\SysWOW64\jbltpocpwla.exeC:\Windows\system32\jbltpocpwla.exe 944 "C:\Windows\SysWOW64\wcqqgfwidyn.exe"105⤵PID:2696
-
C:\Windows\SysWOW64\wodjvjbckkm.exeC:\Windows\system32\wodjvjbckkm.exe 940 "C:\Windows\SysWOW64\jbltpocpwla.exe"106⤵PID:2860
-
C:\Windows\SysWOW64\gqstqnpwxvr.exeC:\Windows\system32\gqstqnpwxvr.exe 952 "C:\Windows\SysWOW64\wodjvjbckkm.exe"107⤵PID:2896
-
C:\Windows\SysWOW64\spnwyvnmxhe.exeC:\Windows\system32\spnwyvnmxhe.exe 956 "C:\Windows\SysWOW64\gqstqnpwxvr.exe"108⤵PID:2788
-
C:\Windows\SysWOW64\crcgmybgksi.exeC:\Windows\system32\crcgmybgksi.exe 972 "C:\Windows\SysWOW64\spnwyvnmxhe.exe"109⤵PID:1964
-
C:\Windows\SysWOW64\qeuwscasysv.exeC:\Windows\system32\qeuwscasysv.exe 976 "C:\Windows\SysWOW64\crcgmybgksi.exe"110⤵
- Drops file in System32 directory
PID:1740 -
C:\Windows\SysWOW64\zsutqbnpyqa.exeC:\Windows\system32\zsutqbnpyqa.exe 960 "C:\Windows\SysWOW64\qeuwscasysv.exe"111⤵PID:1716
-
C:\Windows\SysWOW64\mjpwyjkwqcn.exeC:\Windows\system32\mjpwyjkwqcn.exe 968 "C:\Windows\SysWOW64\zsutqbnpyqa.exe"112⤵PID:2132
-
C:\Windows\SysWOW64\zehmenrbfbz.exeC:\Windows\system32\zehmenrbfbz.exe 964 "C:\Windows\SysWOW64\mjpwyjkwqcn.exe"113⤵PID:2404
-
C:\Windows\SysWOW64\jkzjuvwxeae.exeC:\Windows\system32\jkzjuvwxeae.exe 980 "C:\Windows\SysWOW64\zehmenrbfbz.exe"114⤵PID:2460
-
C:\Windows\SysWOW64\wicmdvcnfmj.exeC:\Windows\system32\wicmdvcnfmj.exe 984 "C:\Windows\SysWOW64\jkzjuvwxeae.exe"115⤵PID:2456
-
C:\Windows\SysWOW64\jvmbizartlw.exeC:\Windows\system32\jvmbizartlw.exe 1004 "C:\Windows\SysWOW64\wicmdvcnfmj.exe"116⤵PID:404
-
C:\Windows\SysWOW64\tkmrggoosjb.exeC:\Windows\system32\tkmrggoosjb.exe 996 "C:\Windows\SysWOW64\jvmbizartlw.exe"117⤵PID:2040
-
C:\Windows\SysWOW64\gxeomkmbgjn.exeC:\Windows\system32\gxeomkmbgjn.exe 988 "C:\Windows\SysWOW64\tkmrggoosjb.exe"118⤵PID:2500
-
C:\Windows\SysWOW64\tnzrvksizvb.exeC:\Windows\system32\tnzrvksizvb.exe 992 "C:\Windows\SysWOW64\gxeomkmbgjn.exe"119⤵PID:264
-
C:\Windows\SysWOW64\dyocinycmgf.exeC:\Windows\system32\dyocinycmgf.exe 1016 "C:\Windows\SysWOW64\tnzrvksizvb.exe"120⤵PID:884
-
C:\Windows\SysWOW64\famedqnehrj.exeC:\Windows\system32\famedqnehrj.exe 1012 "C:\Windows\SysWOW64\dyocinycmgf.exe"121⤵
- Drops file in System32 directory
PID:1052 -
C:\Windows\SysWOW64\rzghmyklaew.exeC:\Windows\system32\rzghmyklaew.exe 1020 "C:\Windows\SysWOW64\famedqnehrj.exe"122⤵PID:316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-