Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 12:54
Behavioral task
behavioral1
Sample
94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe
-
Size
457KB
-
MD5
94cb18098d05da7483ca553db7e0e177
-
SHA1
1a81285f2dc96bf0881e3e9bb919d437a96a5ba4
-
SHA256
a339d8b5036c80bb755fc4c78ef97d3cd849692a6dbd5b825b001dd1bd4878bf
-
SHA512
635af6c0a6bf0e54579f1678623b85a1d1c537d57425ba5f4f764a9f0e72343f69b4a112e6953e22a0286686af560df76bc1b77991130104a31e717e63627ead
-
SSDEEP
12288:UQPA6krEJBqWNtDjLcnKNalKv1V0pjq1GBs:UQ0WNtD/qzAP0Nq1
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2916 cnqmvms.exe 1576 pahcaqr.exe 2940 crcfjyw.exe 2404 hhhsfei.exe 808 ufcuonn.exe 2888 brahlgw.exe 2024 lqmfvfd.exe 2112 ydwvbjc.exe 2012 ghgisuf.exe 2736 qokfdtm.exe 3028 xwgxxiw.exe 2184 hyviklc.exe 2452 pgqawjm.exe 2532 fkrvaoi.exe 1700 mamvvds.exe 1064 tllasxa.exe 2228 edagwvc.exe 1760 taifjnl.exe 2436 ddyqwrs.exe 3060 qbttfrx.exe 2900 dsnvnzv.exe 1512 qiqqwha.exe 2996 chltehg.exe 2932 mvmqcpt.exe 2692 zlgtlxq.exe 2952 mcjvufw.exe 2192 wmzghac.exe 2164 jdtiyii.exe 2064 wylydmh.exe 2152 gaajrpv.exe 2908 trvlzps.exe 2120 dclwuth.exe 316 qpclawg.exe 2032 azswnzm.exe 2728 kchgbds.exe 1316 xpywggz.exe 1276 hzogccf.exe 888 uqjjkkl.exe 2180 golmtsi.exe 2508 qrbogvx.exe 1884 dhwrpvu.exe 1336 qgqtfda.exe 1376 dwtwolf.exe 944 nhjgbpm.exe 3048 sbpwntq.exe 2324 fwgmsxp.exe 2348 ochjqec.exe 876 bbcmzfh.exe 1604 orwpinn.exe 2848 bqzjqvl.exe 2800 lspudyz.exe 2960 yuvjpcd.exe 2664 lhezdgc.exe 2912 vkujqji.exe 2744 iiwmyko.exe 2880 vzrphst.exe 2904 ejhzuva.exe 1660 swypizz.exe 2268 czozvcn.exe 860 lkdkjft.exe 2000 yagmrfz.exe 1672 mnpcxjx.exe 1532 ypvsqvc.exe 1828 ialceri.exe -
Loads dropped DLL 64 IoCs
pid Process 2816 94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe 2816 94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe 2916 cnqmvms.exe 2916 cnqmvms.exe 1576 pahcaqr.exe 1576 pahcaqr.exe 2940 crcfjyw.exe 2940 crcfjyw.exe 2404 hhhsfei.exe 2404 hhhsfei.exe 808 ufcuonn.exe 808 ufcuonn.exe 2888 brahlgw.exe 2888 brahlgw.exe 2024 lqmfvfd.exe 2024 lqmfvfd.exe 2112 ydwvbjc.exe 2112 ydwvbjc.exe 2012 ghgisuf.exe 2012 ghgisuf.exe 2736 qokfdtm.exe 2736 qokfdtm.exe 3028 xwgxxiw.exe 3028 xwgxxiw.exe 2184 hyviklc.exe 2184 hyviklc.exe 2452 pgqawjm.exe 2452 pgqawjm.exe 2532 fkrvaoi.exe 2532 fkrvaoi.exe 1700 mamvvds.exe 1700 mamvvds.exe 1064 tllasxa.exe 1064 tllasxa.exe 2228 edagwvc.exe 2228 edagwvc.exe 1760 taifjnl.exe 1760 taifjnl.exe 2436 ddyqwrs.exe 2436 ddyqwrs.exe 3060 qbttfrx.exe 3060 qbttfrx.exe 2900 dsnvnzv.exe 2900 dsnvnzv.exe 1512 qiqqwha.exe 1512 qiqqwha.exe 2996 chltehg.exe 2996 chltehg.exe 2932 mvmqcpt.exe 2932 mvmqcpt.exe 2692 zlgtlxq.exe 2692 zlgtlxq.exe 2952 mcjvufw.exe 2952 mcjvufw.exe 2192 wmzghac.exe 2192 wmzghac.exe 2164 jdtiyii.exe 2164 jdtiyii.exe 2064 wylydmh.exe 2064 wylydmh.exe 2152 gaajrpv.exe 2152 gaajrpv.exe 2908 trvlzps.exe 2908 trvlzps.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dhwrpvu.exe qrbogvx.exe File created C:\Windows\SysWOW64\uvxjsmq.exe heugjek.exe File opened for modification C:\Windows\SysWOW64\wblwyoc.exe kkquqgw.exe File created C:\Windows\SysWOW64\trudiio.exe joxtnfi.exe File opened for modification C:\Windows\SysWOW64\yxhkpjm.exe lgmhhbo.exe File created C:\Windows\SysWOW64\mzphzqj.exe ziueqie.exe File opened for modification C:\Windows\SysWOW64\syaeohd.exe iwkttep.exe File opened for modification C:\Windows\SysWOW64\jzbkahp.exe wjhqszj.exe File created C:\Windows\SysWOW64\bqwbquh.exe ozbyauk.exe File created C:\Windows\SysWOW64\frdpuvl.exe pmdcyqp.exe File created C:\Windows\SysWOW64\vwhicfk.exe ixmgtxn.exe File created C:\Windows\SysWOW64\whjnlfy.exe nfudybs.exe File created C:\Windows\SysWOW64\ghnrcix.exe trtptir.exe File created C:\Windows\SysWOW64\suhoryc.exe cqztntg.exe File opened for modification C:\Windows\SysWOW64\oisneeq.exe bjxkvel.exe File created C:\Windows\SysWOW64\equqqrx.exe rooafft.exe File created C:\Windows\SysWOW64\tbsgrtp.exe knzrblb.exe File opened for modification C:\Windows\SysWOW64\dwikxmn.exe uihuhei.exe File created C:\Windows\SysWOW64\geetoen.exe trudiio.exe File created C:\Windows\SysWOW64\vaprnzm.exe mpshrwx.exe File created C:\Windows\SysWOW64\sjhstad.exe noydnwe.exe File opened for modification C:\Windows\SysWOW64\uwfbmlz.exe hxkydcb.exe File created C:\Windows\SysWOW64\bqzjqvl.exe orwpinn.exe File opened for modification C:\Windows\SysWOW64\rlpjohh.exe evvggzb.exe File opened for modification C:\Windows\SysWOW64\dqbqreq.exe pvkaljr.exe File created C:\Windows\SysWOW64\pdsxpxc.exe favnuuv.exe File created C:\Windows\SysWOW64\yxhkpjm.exe lgmhhbo.exe File opened for modification C:\Windows\SysWOW64\kblsccm.exe xdqptbg.exe File created C:\Windows\SysWOW64\drkgnxj.exe uovwsud.exe File created C:\Windows\SysWOW64\qhahgco.exe dfusvpk.exe File opened for modification C:\Windows\SysWOW64\hubsjlc.exe uvzpbkw.exe File opened for modification C:\Windows\SysWOW64\iynynrx.exe vwhicfk.exe File opened for modification C:\Windows\SysWOW64\ivqujdy.exe venrava.exe File created C:\Windows\SysWOW64\cnqmvms.exe 94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe File created C:\Windows\SysWOW64\hhhsfei.exe crcfjyw.exe File opened for modification C:\Windows\SysWOW64\ghgisuf.exe ydwvbjc.exe File created C:\Windows\SysWOW64\lbjllpf.exe ylojchz.exe File opened for modification C:\Windows\SysWOW64\kqyisjn.exe afiyeoh.exe File opened for modification C:\Windows\SysWOW64\rhiziae.exe efcsxos.exe File opened for modification C:\Windows\SysWOW64\vssqvml.exe lpufije.exe File created C:\Windows\SysWOW64\zsifjuu.exe mycxxii.exe File opened for modification C:\Windows\SysWOW64\uqxmkai.exe psujtal.exe File created C:\Windows\SysWOW64\ntramhw.exe dqbqreq.exe File opened for modification C:\Windows\SysWOW64\gnlvmxb.exe tlffalw.exe File opened for modification C:\Windows\SysWOW64\jqafxyp.exe wdjpsvq.exe File created C:\Windows\SysWOW64\wtshwfr.exe jdpeoxl.exe File opened for modification C:\Windows\SysWOW64\agyufwb.exe nhdrwww.exe File created C:\Windows\SysWOW64\ekiscsh.exe rxrcxoi.exe File opened for modification C:\Windows\SysWOW64\ydwvbjc.exe lqmfvfd.exe File opened for modification C:\Windows\SysWOW64\cuwkgxw.exe pdbiypr.exe File created C:\Windows\SysWOW64\bdnrkhm.exe oekoczo.exe File created C:\Windows\SysWOW64\ecxbgwc.exe voweiwo.exe File created C:\Windows\SysWOW64\spnbdoi.exe gvhmrkw.exe File created C:\Windows\SysWOW64\rlmbfjm.exe eyulzon.exe File created C:\Windows\SysWOW64\dbelawn.exe troanty.exe File created C:\Windows\SysWOW64\oyhbmzx.exe bzmydrz.exe File opened for modification C:\Windows\SysWOW64\ttgquda.exe gzsaiyo.exe File opened for modification C:\Windows\SysWOW64\vkujqji.exe lhezdgc.exe File opened for modification C:\Windows\SysWOW64\guxdxky.exe shgnrgz.exe File opened for modification C:\Windows\SysWOW64\gutcbhi.exe tsnmhue.exe File opened for modification C:\Windows\SysWOW64\exahgcd.exe oszmkwg.exe File opened for modification C:\Windows\SysWOW64\wjhqszj.exe jkenjze.exe File created C:\Windows\SysWOW64\uwpijcl.exe hfnfauo.exe File created C:\Windows\SysWOW64\pahcaqr.exe cnqmvms.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrteqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oyhbmzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdypwxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language foielwg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqljaqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zrygytf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kycmcdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txnrzrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jmolgvo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language okrnbsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oelvhnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language owjiklj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbszpys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ekiscsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gaajrpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snxjfqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhkgeqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkrmes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kvrfwqp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwkttep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvgxwvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbruzan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mojanmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sixcitb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ghgisuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qgqtfda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbcmzfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exahgcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvleuye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gnniums.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwxeumj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtnhrrp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scxohrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sakjivd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dihfkrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tqnvkkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pwstvko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttgquda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blrqrdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ayhmhql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drsawuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language leiekqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hlcpjmu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsjrkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdqptbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jutdxjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wciopvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjztibt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yrroemo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxkqgvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ayvaewz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gycfaic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgsspfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhwrpvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbsgrtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrlilbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zrqwcae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrpkqsd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pyfuvny.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language golmtsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nzprzgb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oncuzdi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzwdxyq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dectkaq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2916 2816 94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe 30 PID 2816 wrote to memory of 2916 2816 94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe 30 PID 2816 wrote to memory of 2916 2816 94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe 30 PID 2816 wrote to memory of 2916 2816 94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe 30 PID 2916 wrote to memory of 1576 2916 cnqmvms.exe 31 PID 2916 wrote to memory of 1576 2916 cnqmvms.exe 31 PID 2916 wrote to memory of 1576 2916 cnqmvms.exe 31 PID 2916 wrote to memory of 1576 2916 cnqmvms.exe 31 PID 1576 wrote to memory of 2940 1576 pahcaqr.exe 32 PID 1576 wrote to memory of 2940 1576 pahcaqr.exe 32 PID 1576 wrote to memory of 2940 1576 pahcaqr.exe 32 PID 1576 wrote to memory of 2940 1576 pahcaqr.exe 32 PID 2940 wrote to memory of 2404 2940 crcfjyw.exe 33 PID 2940 wrote to memory of 2404 2940 crcfjyw.exe 33 PID 2940 wrote to memory of 2404 2940 crcfjyw.exe 33 PID 2940 wrote to memory of 2404 2940 crcfjyw.exe 33 PID 2404 wrote to memory of 808 2404 hhhsfei.exe 34 PID 2404 wrote to memory of 808 2404 hhhsfei.exe 34 PID 2404 wrote to memory of 808 2404 hhhsfei.exe 34 PID 2404 wrote to memory of 808 2404 hhhsfei.exe 34 PID 808 wrote to memory of 2888 808 ufcuonn.exe 35 PID 808 wrote to memory of 2888 808 ufcuonn.exe 35 PID 808 wrote to memory of 2888 808 ufcuonn.exe 35 PID 808 wrote to memory of 2888 808 ufcuonn.exe 35 PID 2888 wrote to memory of 2024 2888 brahlgw.exe 36 PID 2888 wrote to memory of 2024 2888 brahlgw.exe 36 PID 2888 wrote to memory of 2024 2888 brahlgw.exe 36 PID 2888 wrote to memory of 2024 2888 brahlgw.exe 36 PID 2024 wrote to memory of 2112 2024 lqmfvfd.exe 37 PID 2024 wrote to memory of 2112 2024 lqmfvfd.exe 37 PID 2024 wrote to memory of 2112 2024 lqmfvfd.exe 37 PID 2024 wrote to memory of 2112 2024 lqmfvfd.exe 37 PID 2112 wrote to memory of 2012 2112 ydwvbjc.exe 38 PID 2112 wrote to memory of 2012 2112 ydwvbjc.exe 38 PID 2112 wrote to memory of 2012 2112 ydwvbjc.exe 38 PID 2112 wrote to memory of 2012 2112 ydwvbjc.exe 38 PID 2012 wrote to memory of 2736 2012 ghgisuf.exe 39 PID 2012 wrote to memory of 2736 2012 ghgisuf.exe 39 PID 2012 wrote to memory of 2736 2012 ghgisuf.exe 39 PID 2012 wrote to memory of 2736 2012 ghgisuf.exe 39 PID 2736 wrote to memory of 3028 2736 qokfdtm.exe 40 PID 2736 wrote to memory of 3028 2736 qokfdtm.exe 40 PID 2736 wrote to memory of 3028 2736 qokfdtm.exe 40 PID 2736 wrote to memory of 3028 2736 qokfdtm.exe 40 PID 3028 wrote to memory of 2184 3028 xwgxxiw.exe 41 PID 3028 wrote to memory of 2184 3028 xwgxxiw.exe 41 PID 3028 wrote to memory of 2184 3028 xwgxxiw.exe 41 PID 3028 wrote to memory of 2184 3028 xwgxxiw.exe 41 PID 2184 wrote to memory of 2452 2184 hyviklc.exe 42 PID 2184 wrote to memory of 2452 2184 hyviklc.exe 42 PID 2184 wrote to memory of 2452 2184 hyviklc.exe 42 PID 2184 wrote to memory of 2452 2184 hyviklc.exe 42 PID 2452 wrote to memory of 2532 2452 pgqawjm.exe 43 PID 2452 wrote to memory of 2532 2452 pgqawjm.exe 43 PID 2452 wrote to memory of 2532 2452 pgqawjm.exe 43 PID 2452 wrote to memory of 2532 2452 pgqawjm.exe 43 PID 2532 wrote to memory of 1700 2532 fkrvaoi.exe 44 PID 2532 wrote to memory of 1700 2532 fkrvaoi.exe 44 PID 2532 wrote to memory of 1700 2532 fkrvaoi.exe 44 PID 2532 wrote to memory of 1700 2532 fkrvaoi.exe 44 PID 1700 wrote to memory of 1064 1700 mamvvds.exe 45 PID 1700 wrote to memory of 1064 1700 mamvvds.exe 45 PID 1700 wrote to memory of 1064 1700 mamvvds.exe 45 PID 1700 wrote to memory of 1064 1700 mamvvds.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cnqmvms.exeC:\Windows\system32\cnqmvms.exe 488 "C:\Users\Admin\AppData\Local\Temp\94cb18098d05da7483ca553db7e0e177_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\pahcaqr.exeC:\Windows\system32\pahcaqr.exe 536 "C:\Windows\SysWOW64\cnqmvms.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\crcfjyw.exeC:\Windows\system32\crcfjyw.exe 532 "C:\Windows\SysWOW64\pahcaqr.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\hhhsfei.exeC:\Windows\system32\hhhsfei.exe 540 "C:\Windows\SysWOW64\crcfjyw.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\ufcuonn.exeC:\Windows\system32\ufcuonn.exe 556 "C:\Windows\SysWOW64\hhhsfei.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\brahlgw.exeC:\Windows\system32\brahlgw.exe 544 "C:\Windows\SysWOW64\ufcuonn.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\lqmfvfd.exeC:\Windows\system32\lqmfvfd.exe 548 "C:\Windows\SysWOW64\brahlgw.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\ydwvbjc.exeC:\Windows\system32\ydwvbjc.exe 552 "C:\Windows\SysWOW64\lqmfvfd.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\ghgisuf.exeC:\Windows\system32\ghgisuf.exe 572 "C:\Windows\SysWOW64\ydwvbjc.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\qokfdtm.exeC:\Windows\system32\qokfdtm.exe 564 "C:\Windows\SysWOW64\ghgisuf.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\xwgxxiw.exeC:\Windows\system32\xwgxxiw.exe 560 "C:\Windows\SysWOW64\qokfdtm.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\hyviklc.exeC:\Windows\system32\hyviklc.exe 568 "C:\Windows\SysWOW64\xwgxxiw.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\pgqawjm.exeC:\Windows\system32\pgqawjm.exe 576 "C:\Windows\SysWOW64\hyviklc.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\fkrvaoi.exeC:\Windows\system32\fkrvaoi.exe 584 "C:\Windows\SysWOW64\pgqawjm.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\mamvvds.exeC:\Windows\system32\mamvvds.exe 600 "C:\Windows\SysWOW64\fkrvaoi.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\tllasxa.exeC:\Windows\system32\tllasxa.exe 580 "C:\Windows\SysWOW64\mamvvds.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1064 -
C:\Windows\SysWOW64\edagwvc.exeC:\Windows\system32\edagwvc.exe 588 "C:\Windows\SysWOW64\tllasxa.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2228 -
C:\Windows\SysWOW64\taifjnl.exeC:\Windows\system32\taifjnl.exe 592 "C:\Windows\SysWOW64\edagwvc.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760 -
C:\Windows\SysWOW64\ddyqwrs.exeC:\Windows\system32\ddyqwrs.exe 596 "C:\Windows\SysWOW64\taifjnl.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436 -
C:\Windows\SysWOW64\qbttfrx.exeC:\Windows\system32\qbttfrx.exe 612 "C:\Windows\SysWOW64\ddyqwrs.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3060 -
C:\Windows\SysWOW64\dsnvnzv.exeC:\Windows\system32\dsnvnzv.exe 616 "C:\Windows\SysWOW64\qbttfrx.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2900 -
C:\Windows\SysWOW64\qiqqwha.exeC:\Windows\system32\qiqqwha.exe 608 "C:\Windows\SysWOW64\dsnvnzv.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1512 -
C:\Windows\SysWOW64\chltehg.exeC:\Windows\system32\chltehg.exe 628 "C:\Windows\SysWOW64\qiqqwha.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2996 -
C:\Windows\SysWOW64\mvmqcpt.exeC:\Windows\system32\mvmqcpt.exe 624 "C:\Windows\SysWOW64\chltehg.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2932 -
C:\Windows\SysWOW64\zlgtlxq.exeC:\Windows\system32\zlgtlxq.exe 640 "C:\Windows\SysWOW64\mvmqcpt.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2692 -
C:\Windows\SysWOW64\mcjvufw.exeC:\Windows\system32\mcjvufw.exe 636 "C:\Windows\SysWOW64\zlgtlxq.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2952 -
C:\Windows\SysWOW64\wmzghac.exeC:\Windows\system32\wmzghac.exe 648 "C:\Windows\SysWOW64\mcjvufw.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Windows\SysWOW64\jdtiyii.exeC:\Windows\system32\jdtiyii.exe 604 "C:\Windows\SysWOW64\wmzghac.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2164 -
C:\Windows\SysWOW64\wylydmh.exeC:\Windows\system32\wylydmh.exe 652 "C:\Windows\SysWOW64\jdtiyii.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Windows\SysWOW64\gaajrpv.exeC:\Windows\system32\gaajrpv.exe 620 "C:\Windows\SysWOW64\wylydmh.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\trvlzps.exeC:\Windows\system32\trvlzps.exe 656 "C:\Windows\SysWOW64\gaajrpv.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908 -
C:\Windows\SysWOW64\dclwuth.exeC:\Windows\system32\dclwuth.exe 632 "C:\Windows\SysWOW64\trvlzps.exe"33⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\qpclawg.exeC:\Windows\system32\qpclawg.exe 668 "C:\Windows\SysWOW64\dclwuth.exe"34⤵
- Executes dropped EXE
PID:316 -
C:\Windows\SysWOW64\azswnzm.exeC:\Windows\system32\azswnzm.exe 644 "C:\Windows\SysWOW64\qpclawg.exe"35⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\kchgbds.exeC:\Windows\system32\kchgbds.exe 672 "C:\Windows\SysWOW64\azswnzm.exe"36⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\xpywggz.exeC:\Windows\system32\xpywggz.exe 660 "C:\Windows\SysWOW64\kchgbds.exe"37⤵
- Executes dropped EXE
PID:1316 -
C:\Windows\SysWOW64\hzogccf.exeC:\Windows\system32\hzogccf.exe 684 "C:\Windows\SysWOW64\xpywggz.exe"38⤵
- Executes dropped EXE
PID:1276 -
C:\Windows\SysWOW64\uqjjkkl.exeC:\Windows\system32\uqjjkkl.exe 664 "C:\Windows\SysWOW64\hzogccf.exe"39⤵
- Executes dropped EXE
PID:888 -
C:\Windows\SysWOW64\golmtsi.exeC:\Windows\system32\golmtsi.exe 696 "C:\Windows\SysWOW64\uqjjkkl.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\qrbogvx.exeC:\Windows\system32\qrbogvx.exe 676 "C:\Windows\SysWOW64\golmtsi.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2508 -
C:\Windows\SysWOW64\dhwrpvu.exeC:\Windows\system32\dhwrpvu.exe 700 "C:\Windows\SysWOW64\qrbogvx.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Windows\SysWOW64\qgqtfda.exeC:\Windows\system32\qgqtfda.exe 688 "C:\Windows\SysWOW64\dhwrpvu.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Windows\SysWOW64\dwtwolf.exeC:\Windows\system32\dwtwolf.exe 680 "C:\Windows\SysWOW64\qgqtfda.exe"44⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\nhjgbpm.exeC:\Windows\system32\nhjgbpm.exe 692 "C:\Windows\SysWOW64\dwtwolf.exe"45⤵
- Executes dropped EXE
PID:944 -
C:\Windows\SysWOW64\sbpwntq.exeC:\Windows\system32\sbpwntq.exe 704 "C:\Windows\SysWOW64\nhjgbpm.exe"46⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\fwgmsxp.exeC:\Windows\system32\fwgmsxp.exe 712 "C:\Windows\SysWOW64\sbpwntq.exe"47⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\ochjqec.exeC:\Windows\system32\ochjqec.exe 728 "C:\Windows\SysWOW64\fwgmsxp.exe"48⤵
- Executes dropped EXE
PID:2348 -
C:\Windows\SysWOW64\bbcmzfh.exeC:\Windows\system32\bbcmzfh.exe 716 "C:\Windows\SysWOW64\ochjqec.exe"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:876 -
C:\Windows\SysWOW64\orwpinn.exeC:\Windows\system32\orwpinn.exe 708 "C:\Windows\SysWOW64\bbcmzfh.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\bqzjqvl.exeC:\Windows\system32\bqzjqvl.exe 720 "C:\Windows\SysWOW64\orwpinn.exe"51⤵
- Executes dropped EXE
PID:2848 -
C:\Windows\SysWOW64\lspudyz.exeC:\Windows\system32\lspudyz.exe 736 "C:\Windows\SysWOW64\bqzjqvl.exe"52⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\yuvjpcd.exeC:\Windows\system32\yuvjpcd.exe 724 "C:\Windows\SysWOW64\lspudyz.exe"53⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\lhezdgc.exeC:\Windows\system32\lhezdgc.exe 732 "C:\Windows\SysWOW64\yuvjpcd.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\vkujqji.exeC:\Windows\system32\vkujqji.exe 740 "C:\Windows\SysWOW64\lhezdgc.exe"55⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\iiwmyko.exeC:\Windows\system32\iiwmyko.exe 744 "C:\Windows\SysWOW64\vkujqji.exe"56⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\vzrphst.exeC:\Windows\system32\vzrphst.exe 756 "C:\Windows\SysWOW64\iiwmyko.exe"57⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\ejhzuva.exeC:\Windows\system32\ejhzuva.exe 748 "C:\Windows\SysWOW64\vzrphst.exe"58⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\SysWOW64\swypizz.exeC:\Windows\system32\swypizz.exe 760 "C:\Windows\SysWOW64\ejhzuva.exe"59⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\czozvcn.exeC:\Windows\system32\czozvcn.exe 772 "C:\Windows\SysWOW64\swypizz.exe"60⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\lkdkjft.exeC:\Windows\system32\lkdkjft.exe 752 "C:\Windows\SysWOW64\czozvcn.exe"61⤵
- Executes dropped EXE
PID:860 -
C:\Windows\SysWOW64\yagmrfz.exeC:\Windows\system32\yagmrfz.exe 784 "C:\Windows\SysWOW64\lkdkjft.exe"62⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\mnpcxjx.exeC:\Windows\system32\mnpcxjx.exe 764 "C:\Windows\SysWOW64\yagmrfz.exe"63⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\ypvsqvc.exeC:\Windows\system32\ypvsqvc.exe 768 "C:\Windows\SysWOW64\mnpcxjx.exe"64⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\SysWOW64\ialceri.exeC:\Windows\system32\ialceri.exe 776 "C:\Windows\SysWOW64\ypvsqvc.exe"65⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\vurkpdu.exeC:\Windows\system32\vurkpdu.exe 788 "C:\Windows\SysWOW64\ialceri.exe"66⤵PID:840
-
C:\Windows\SysWOW64\ihiavht.exeC:\Windows\system32\ihiavht.exe 792 "C:\Windows\SysWOW64\vurkpdu.exe"67⤵PID:984
-
C:\Windows\SysWOW64\srykqka.exeC:\Windows\system32\srykqka.exe 796 "C:\Windows\SysWOW64\ihiavht.exe"68⤵PID:1400
-
C:\Windows\SysWOW64\fitnzkf.exeC:\Windows\system32\fitnzkf.exe 780 "C:\Windows\SysWOW64\srykqka.exe"69⤵PID:1768
-
C:\Windows\SysWOW64\sgvphsl.exeC:\Windows\system32\sgvphsl.exe 816 "C:\Windows\SysWOW64\fitnzkf.exe"70⤵PID:1764
-
C:\Windows\SysWOW64\cjlauvr.exeC:\Windows\system32\cjlauvr.exe 804 "C:\Windows\SysWOW64\sgvphsl.exe"71⤵PID:544
-
C:\Windows\SysWOW64\pwcpazq.exeC:\Windows\system32\pwcpazq.exe 820 "C:\Windows\SysWOW64\cjlauvr.exe"72⤵PID:688
-
C:\Windows\SysWOW64\zgsavuw.exeC:\Windows\system32\zgsavuw.exe 808 "C:\Windows\SysWOW64\pwcpazq.exe"73⤵PID:2168
-
C:\Windows\SysWOW64\mxmcedc.exeC:\Windows\system32\mxmcedc.exe 800 "C:\Windows\SysWOW64\zgsavuw.exe"74⤵PID:2596
-
C:\Windows\SysWOW64\vhcnrgi.exeC:\Windows\system32\vhcnrgi.exe 812 "C:\Windows\SysWOW64\mxmcedc.exe"75⤵PID:2696
-
C:\Windows\SysWOW64\jutdxjp.exeC:\Windows\system32\jutdxjp.exe 824 "C:\Windows\SysWOW64\vhcnrgi.exe"76⤵
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\sxjnsnv.exeC:\Windows\system32\sxjnsnv.exe 832 "C:\Windows\SysWOW64\jutdxjp.exe"77⤵PID:2444
-
C:\Windows\SysWOW64\ciyxgqb.exeC:\Windows\system32\ciyxgqb.exe 828 "C:\Windows\SysWOW64\sxjnsnv.exe"78⤵PID:2668
-
C:\Windows\SysWOW64\pytaoqh.exeC:\Windows\system32\pytaoqh.exe 836 "C:\Windows\SysWOW64\ciyxgqb.exe"79⤵PID:2176
-
C:\Windows\SysWOW64\ctlquug.exeC:\Windows\system32\ctlquug.exe 852 "C:\Windows\SysWOW64\pytaoqh.exe"80⤵PID:2516
-
C:\Windows\SysWOW64\mwaahxm.exeC:\Windows\system32\mwaahxm.exe 844 "C:\Windows\SysWOW64\ctlquug.exe"81⤵PID:2060
-
C:\Windows\SysWOW64\zmddyfs.exeC:\Windows\system32\zmddyfs.exe 840 "C:\Windows\SysWOW64\mwaahxm.exe"82⤵PID:2220
-
C:\Windows\SysWOW64\mlyggfx.exeC:\Windows\system32\mlyggfx.exe 848 "C:\Windows\SysWOW64\zmddyfs.exe"83⤵PID:2896
-
C:\Windows\SysWOW64\wzydwnk.exeC:\Windows\system32\wzydwnk.exe 864 "C:\Windows\SysWOW64\mlyggfx.exe"84⤵PID:2128
-
C:\Windows\SysWOW64\jmitcqj.exeC:\Windows\system32\jmitcqj.exe 860 "C:\Windows\SysWOW64\wzydwnk.exe"85⤵PID:1832
-
C:\Windows\SysWOW64\wclvlrp.exeC:\Windows\system32\wclvlrp.exe 856 "C:\Windows\SysWOW64\jmitcqj.exe"86⤵PID:1260
-
C:\Windows\SysWOW64\jerdwdt.exeC:\Windows\system32\jerdwdt.exe 872 "C:\Windows\SysWOW64\wclvlrp.exe"87⤵PID:1440
-
C:\Windows\SysWOW64\shgnrgz.exeC:\Windows\system32\shgnrgz.exe 876 "C:\Windows\SysWOW64\jerdwdt.exe"88⤵
- Drops file in System32 directory
PID:2856 -
C:\Windows\SysWOW64\guxdxky.exeC:\Windows\system32\guxdxky.exe 868 "C:\Windows\SysWOW64\shgnrgz.exe"89⤵PID:1028
-
C:\Windows\SysWOW64\pfnnknm.exeC:\Windows\system32\pfnnknm.exe 880 "C:\Windows\SysWOW64\guxdxky.exe"90⤵PID:2456
-
C:\Windows\SysWOW64\cviqtnk.exeC:\Windows\system32\cviqtnk.exe 884 "C:\Windows\SysWOW64\pfnnknm.exe"91⤵PID:2512
-
C:\Windows\SysWOW64\ptctcvp.exeC:\Windows\system32\ptctcvp.exe 888 "C:\Windows\SysWOW64\cviqtnk.exe"92⤵PID:1868
-
C:\Windows\SysWOW64\zidqadc.exeC:\Windows\system32\zidqadc.exe 896 "C:\Windows\SysWOW64\ptctcvp.exe"93⤵PID:2008
-
C:\Windows\SysWOW64\evvggzb.exeC:\Windows\system32\evvggzb.exe 908 "C:\Windows\SysWOW64\zidqadc.exe"94⤵
- Drops file in System32 directory
PID:1520 -
C:\Windows\SysWOW64\rlpjohh.exeC:\Windows\system32\rlpjohh.exe 900 "C:\Windows\SysWOW64\evvggzb.exe"95⤵PID:3064
-
C:\Windows\SysWOW64\bzqgeou.exeC:\Windows\system32\bzqgeou.exe 904 "C:\Windows\SysWOW64\rlpjohh.exe"96⤵PID:2076
-
C:\Windows\SysWOW64\oqljnxr.exeC:\Windows\system32\oqljnxr.exe 912 "C:\Windows\SysWOW64\bzqgeou.exe"97⤵PID:2640
-
C:\Windows\SysWOW64\asrqgbe.exeC:\Windows\system32\asrqgbe.exe 892 "C:\Windows\SysWOW64\oqljnxr.exe"98⤵PID:2016
-
C:\Windows\SysWOW64\nfjgmfd.exeC:\Windows\system32\nfjgmfd.exe 916 "C:\Windows\SysWOW64\asrqgbe.exe"99⤵PID:2792
-
C:\Windows\SysWOW64\avdjvna.exeC:\Windows\system32\avdjvna.exe 940 "C:\Windows\SysWOW64\nfjgmfd.exe"100⤵PID:2160
-
C:\Windows\SysWOW64\nxjygrm.exeC:\Windows\system32\nxjygrm.exe 920 "C:\Windows\SysWOW64\avdjvna.exe"101⤵PID:568
-
C:\Windows\SysWOW64\xihjtvt.exeC:\Windows\system32\xihjtvt.exe 936 "C:\Windows\SysWOW64\nxjygrm.exe"102⤵PID:1164
-
C:\Windows\SysWOW64\kycmcdy.exeC:\Windows\system32\kycmcdy.exe 924 "C:\Windows\SysWOW64\xihjtvt.exe"103⤵
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\xpwosdw.exeC:\Windows\system32\xpwosdw.exe 928 "C:\Windows\SysWOW64\kycmcdy.exe"104⤵PID:760
-
C:\Windows\SysWOW64\knzrblb.exeC:\Windows\system32\knzrblb.exe 944 "C:\Windows\SysWOW64\xpwosdw.exe"105⤵
- Drops file in System32 directory
PID:2992 -
C:\Windows\SysWOW64\tbsgrtp.exeC:\Windows\system32\tbsgrtp.exe 932 "C:\Windows\SysWOW64\knzrblb.exe"106⤵
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\gsvjabu.exeC:\Windows\system32\gsvjabu.exe 948 "C:\Windows\SysWOW64\tbsgrtp.exe"107⤵PID:1272
-
C:\Windows\SysWOW64\tipmibs.exeC:\Windows\system32\tipmibs.exe 952 "C:\Windows\SysWOW64\gsvjabu.exe"108⤵PID:3032
-
C:\Windows\SysWOW64\dtfwdeg.exeC:\Windows\system32\dtfwdeg.exe 956 "C:\Windows\SysWOW64\tipmibs.exe"109⤵PID:1032
-
C:\Windows\SysWOW64\txnrzrd.exeC:\Windows\system32\txnrzrd.exe 964 "C:\Windows\SysWOW64\dtfwdeg.exe"110⤵
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\dicbvmj.exeC:\Windows\system32\dicbvmj.exe 960 "C:\Windows\SysWOW64\txnrzrd.exe"111⤵PID:2248
-
C:\Windows\SysWOW64\nksmipp.exeC:\Windows\system32\nksmipp.exe 980 "C:\Windows\SysWOW64\dicbvmj.exe"112⤵PID:1068
-
C:\Windows\SysWOW64\ajnoryv.exeC:\Windows\system32\ajnoryv.exe 968 "C:\Windows\SysWOW64\nksmipp.exe"113⤵PID:2364
-
C:\Windows\SysWOW64\nzprzgb.exeC:\Windows\system32\nzprzgb.exe 988 "C:\Windows\SysWOW64\ajnoryv.exe"114⤵
- System Location Discovery: System Language Discovery
PID:872 -
C:\Windows\SysWOW64\wkfcujh.exeC:\Windows\system32\wkfcujh.exe 1000 "C:\Windows\SysWOW64\nzprzgb.exe"115⤵PID:372
-
C:\Windows\SysWOW64\jbaedjm.exeC:\Windows\system32\jbaedjm.exe 976 "C:\Windows\SysWOW64\wkfcujh.exe"116⤵PID:556
-
C:\Windows\SysWOW64\wdgmowr.exeC:\Windows\system32\wdgmowr.exe 984 "C:\Windows\SysWOW64\jbaedjm.exe"117⤵PID:2548
-
C:\Windows\SysWOW64\jqxcuzp.exeC:\Windows\system32\jqxcuzp.exe 992 "C:\Windows\SysWOW64\wdgmowr.exe"118⤵PID:1712
-
C:\Windows\SysWOW64\tsnmhue.exeC:\Windows\system32\tsnmhue.exe 996 "C:\Windows\SysWOW64\jqxcuzp.exe"119⤵
- Drops file in System32 directory
PID:2980 -
C:\Windows\SysWOW64\gutcbhi.exeC:\Windows\system32\gutcbhi.exe 1004 "C:\Windows\SysWOW64\tsnmhue.exe"120⤵PID:2972
-
C:\Windows\SysWOW64\thkrhlh.exeC:\Windows\system32\thkrhlh.exe 1016 "C:\Windows\SysWOW64\gutcbhi.exe"121⤵PID:2780
-
C:\Windows\SysWOW64\dsacuon.exeC:\Windows\system32\dsacuon.exe 1008 "C:\Windows\SysWOW64\thkrhlh.exe"122⤵PID:2968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-