Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/11/2024, 02:55
Behavioral task
behavioral1
Sample
ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
ae70e848f771cf4213fed3fe2d133315
-
SHA1
1cfd5997b0bad2af1483bac6d065fc466194dee3
-
SHA256
dbb1f8653534a072152dcf5a1342525f43f1d66360c36dbe95b552a656e052ab
-
SHA512
3c6fe5fb05ccdcb47f5607a18f0d899663a7eb0864086804b0164f7951b85aeab498c77ca7702658dab1035c81c936e8dd8f24c4980910e97e8144cb84999e6c
-
SSDEEP
24576:f+IH2bjuHmTN4JTl05UdqkYU56Upxde9+mI9zixlVHu:f+IYuwF5ObxG+Ixu
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies security service 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" Process not Found Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 64 IoCs
pid Process 1492 lcpgccj.exe 2160 qlxblhp.exe 2316 dbaebhu.exe 1636 iolenrz.exe 1960 zvlbrfq.exe 2996 oohobts.exe 2880 yzxzwwz.exe 2948 ykgjkds.exe 2352 nssjrnw.exe 1368 xcpueqc.exe 2044 nkbclhg.exe 2332 rbyxhor.exe 3020 pvbkxqy.exe 2824 egqxhea.exe 2372 rmhzvvl.exe 2428 gyquzai.exe 1996 qbffudo.exe 2828 dzazdlu.exe 1620 ckynsfc.exe 2676 sphiwkz.exe 2640 czwkrnn.exe 2668 mclueqt.exe 2864 zpdskus.exe 820 mrjawzx.exe 1792 wmksdtf.exe 2892 galibbk.exe 1060 trfkkjq.exe 868 gpansrw.exe 2220 qpmkdqd.exe 1812 dfhntqb.exe 2076 qecqcyg.exe 636 agrapbn.exe 2312 krpkceb.exe 1740 whjnlfy.exe 2744 kubdzix.exe 1588 ubfajhf.exe 2448 dhgyzps.exe 2552 odhipjt.exe 2576 bcblyry.exe 2344 lbgiiig.exe 2304 ydmytvk.exe 2432 ktobcdq.exe 2148 vstyubx.exe 2760 kmptepz.exe 944 xckwnyx.exe 1408 hniyabl.exe 2764 rpxinws.exe 2500 eoslwex.exe 2192 rbjbjiw.exe 1612 apkyzpj.exe 2024 loowkor.exe 448 vnstcnq.exe 2080 imvwlnw.exe 2016 ptiwxcf.exe 1520 cgamdge.exe 1412 pigbwti.exe 1580 zlvmkwx.exe 112 mjqgswu.exe 2100 wfrzaqd.exe 2340 mqomjmf.exe 1564 tyjmecp.exe 2476 gaptpot.exe 1768 nerhyzw.exe 1548 xhprucc.exe -
Identifies Wine through registry keys 2 TTPs 64 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine inxzdbz.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine rwqdkxe.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine wmksdtf.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine sldxkql.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine feaxbje.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine svqelsn.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine hxvqwog.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine mrjawzx.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine wczjczx.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine mosabrh.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine swgatia.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine udoywex.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine nelemdc.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine paqazeg.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine lywifbq.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine fenliyx.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine boyposk.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine xbjikof.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine kqtxsjs.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine quhcdul.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine mzcucbe.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine lwbvdba.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine vktvypk.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine gueoxad.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine uhfwkjy.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine hxtrmur.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine gdqjbeu.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine vdxgmzi.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ptiwxcf.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine jpmvtqo.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine rexvpys.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ytrluqp.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine xcbrsti.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine wrkansp.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Process not Found Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ibrtgae.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine jyqnojt.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine qjtwsir.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine gpansrw.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine qecqcyg.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine vdzxkqu.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine jmssncg.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine shugxmb.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine lutguhu.exe -
Loads dropped DLL 64 IoCs
pid Process 2820 ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe 2820 ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe 1492 lcpgccj.exe 1492 lcpgccj.exe 2160 qlxblhp.exe 2160 qlxblhp.exe 2316 dbaebhu.exe 2316 dbaebhu.exe 1636 iolenrz.exe 1636 iolenrz.exe 1960 zvlbrfq.exe 1960 zvlbrfq.exe 2996 oohobts.exe 2996 oohobts.exe 2880 yzxzwwz.exe 2880 yzxzwwz.exe 2948 ykgjkds.exe 2948 ykgjkds.exe 2352 nssjrnw.exe 2352 nssjrnw.exe 1368 xcpueqc.exe 1368 xcpueqc.exe 2044 nkbclhg.exe 2044 nkbclhg.exe 2332 rbyxhor.exe 2332 rbyxhor.exe 3020 pvbkxqy.exe 3020 pvbkxqy.exe 2824 egqxhea.exe 2824 egqxhea.exe 2372 rmhzvvl.exe 2372 rmhzvvl.exe 2428 gyquzai.exe 2428 gyquzai.exe 1996 qbffudo.exe 1996 qbffudo.exe 2828 dzazdlu.exe 2828 dzazdlu.exe 1620 ckynsfc.exe 1620 ckynsfc.exe 2676 sphiwkz.exe 2676 sphiwkz.exe 2640 czwkrnn.exe 2640 czwkrnn.exe 2668 mclueqt.exe 2668 mclueqt.exe 2864 zpdskus.exe 2864 zpdskus.exe 820 mrjawzx.exe 820 mrjawzx.exe 1792 wmksdtf.exe 1792 wmksdtf.exe 2892 galibbk.exe 2892 galibbk.exe 1060 trfkkjq.exe 1060 trfkkjq.exe 868 gpansrw.exe 868 gpansrw.exe 2220 qpmkdqd.exe 2220 qpmkdqd.exe 1812 dfhntqb.exe 1812 dfhntqb.exe 2076 qecqcyg.exe 2076 qecqcyg.exe -
resource yara_rule behavioral1/memory/2820-0-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/files/0x0008000000016d30-124.dat themida behavioral1/memory/2820-128-0x0000000004CF0000-0x00000000050A7000-memory.dmp themida behavioral1/memory/1492-132-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1492-131-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1492-136-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2160-149-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1492-146-0x0000000004BC0000-0x0000000004F77000-memory.dmp themida behavioral1/memory/2316-163-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1636-176-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2316-178-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1960-190-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2996-319-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2996-450-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2880-448-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1960-401-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2948-577-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2880-696-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2044-977-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1368-966-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2332-1214-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/3020-1334-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2824-1452-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2372-1572-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2428-1692-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1996-1812-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2828-1932-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1620-2054-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2676-2172-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2640-2294-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2668-2412-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2864-2534-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/820-2652-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1792-2772-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2892-2892-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1060-3012-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/868-3132-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2220-3254-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1812-3268-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/636-3509-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2312-3628-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1740-3748-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2744-3868-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1588-3988-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2448-4108-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2552-4228-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2576-4348-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2344-4468-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2304-4588-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2432-4708-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2148-4829-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2760-4948-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/944-5068-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1408-5188-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2764-5308-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2500-5428-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2192-5548-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1612-5668-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2024-5788-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/448-5908-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2080-6028-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/2016-6148-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1520-6270-0x0000000000400000-0x00000000007B7000-memory.dmp themida behavioral1/memory/1412-6390-0x0000000000400000-0x00000000007B7000-memory.dmp themida -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\traxawm.exe gafusoh.exe File opened for modification C:\Windows\SysWOW64\kineazi.exe Process not Found File created C:\Windows\SysWOW64\lkxcrca.exe Process not Found File created C:\Windows\SysWOW64\sjwlrzj.exe Process not Found File created C:\Windows\SysWOW64\nnoohwh.exe awulyoc.exe File created C:\Windows\SysWOW64\gueoxad.exe wvsrfbw.exe File opened for modification C:\Windows\SysWOW64\bbnidne.exe llbaeda.exe File created C:\Windows\SysWOW64\boyposk.exe oydmfke.exe File created C:\Windows\SysWOW64\apzhifu.exe kznzbvq.exe File opened for modification C:\Windows\SysWOW64\dfamqer.exe traxawm.exe File created C:\Windows\SysWOW64\eceknsp.exe Process not Found File created C:\Windows\SysWOW64\rhmohhx.exe Process not Found File opened for modification C:\Windows\SysWOW64\jtpxesk.exe wcnuvke.exe File opened for modification C:\Windows\SysWOW64\sbytnve.exe Process not Found File opened for modification C:\Windows\SysWOW64\xddmkhl.exe Process not Found File opened for modification C:\Windows\SysWOW64\blumcyw.exe Process not Found File created C:\Windows\SysWOW64\xaufduu.exe naiisvm.exe File created C:\Windows\SysWOW64\ekpdxob.exe lknqsvh.exe File opened for modification C:\Windows\SysWOW64\qxmuwlg.exe Process not Found File opened for modification C:\Windows\SysWOW64\qtniyjr.exe Process not Found File opened for modification C:\Windows\SysWOW64\ktobcdq.exe ydmytvk.exe File created C:\Windows\SysWOW64\iileput.exe Process not Found File created C:\Windows\SysWOW64\vclukkf.exe Process not Found File opened for modification C:\Windows\SysWOW64\gflxlac.exe wrkansp.exe File opened for modification C:\Windows\SysWOW64\jkajgpr.exe Process not Found File created C:\Windows\SysWOW64\plzfwmp.exe Process not Found File created C:\Windows\SysWOW64\vssqvml.exe Process not Found File opened for modification C:\Windows\SysWOW64\apzhifu.exe kznzbvq.exe File created C:\Windows\SysWOW64\wlsdhgu.exe Process not Found File opened for modification C:\Windows\SysWOW64\lnbxoxl.exe Process not Found File created C:\Windows\SysWOW64\vhlqlmy.exe Process not Found File opened for modification C:\Windows\SysWOW64\apxibxd.exe Process not Found File opened for modification C:\Windows\SysWOW64\ggcdcce.exe fpooeyr.exe File opened for modification C:\Windows\SysWOW64\jghtfmd.exe aesjsrx.exe File created C:\Windows\SysWOW64\oydmfke.exe bhajwkh.exe File created C:\Windows\SysWOW64\bwxhlil.exe Process not Found File created C:\Windows\SysWOW64\xssbrzc.exe Process not Found File created C:\Windows\SysWOW64\crcoysf.exe Process not Found File created C:\Windows\SysWOW64\whjnlfy.exe krpkceb.exe File created C:\Windows\SysWOW64\rmhzvvl.exe egqxhea.exe File opened for modification C:\Windows\SysWOW64\jjxlmgy.exe wscidxs.exe File created C:\Windows\SysWOW64\rtdqrym.exe edanbqg.exe File opened for modification C:\Windows\SysWOW64\vvyqgts.exe frydkgn.exe File created C:\Windows\SysWOW64\zjzzsgp.exe Process not Found File opened for modification C:\Windows\SysWOW64\xmfayci.exe Process not Found File created C:\Windows\SysWOW64\ggbmgws.exe Process not Found File created C:\Windows\SysWOW64\rbyxhor.exe nkbclhg.exe File opened for modification C:\Windows\SysWOW64\abrhqjx.exe Process not Found File opened for modification C:\Windows\SysWOW64\squlwxt.exe fazjfpo.exe File created C:\Windows\SysWOW64\lrwkxhq.exe Process not Found File opened for modification C:\Windows\SysWOW64\rsavstq.exe Process not Found File opened for modification C:\Windows\SysWOW64\axoygdt.exe Process not Found File opened for modification C:\Windows\SysWOW64\wuazrei.exe Process not Found File opened for modification C:\Windows\SysWOW64\jpmvtqo.exe wrjskqq.exe File opened for modification C:\Windows\SysWOW64\wrkansp.exe jtpxesk.exe File created C:\Windows\SysWOW64\kqkekrd.exe Process not Found File created C:\Windows\SysWOW64\agrapbn.exe qecqcyg.exe File opened for modification C:\Windows\SysWOW64\zkgzusy.exe mtlwess.exe File created C:\Windows\SysWOW64\wscidxs.exe mimyium.exe File opened for modification C:\Windows\SysWOW64\xvjbmgs.exe kwhydym.exe File opened for modification C:\Windows\SysWOW64\kkomulb.exe iwnxedo.exe File created C:\Windows\SysWOW64\glqfwqm.exe Process not Found File opened for modification C:\Windows\SysWOW64\ofyikmn.exe Process not Found File created C:\Windows\SysWOW64\ochqtef.exe Process not Found -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjtwsir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfamqer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhusszt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nyziqge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npjkofg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apzhifu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtuzovm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs .reg file with regedit 64 IoCs
pid Process 1716 regedit.exe 2628 regedit.exe 3416 Process not Found 3600 Process not Found 4780 Process not Found 2164 regedit.exe 1624 regedit.exe 2164 regedit.exe 3520 regedit.exe 2800 Process not Found 4544 Process not Found 1576 Process not Found 596 Process not Found 1708 regedit.exe 2400 regedit.exe 1692 Process not Found 4048 Process not Found 564 regedit.exe 3316 Process not Found 3544 Process not Found 1300 regedit.exe 788 regedit.exe 536 regedit.exe 2684 regedit.exe 2872 regedit.exe 2368 regedit.exe 948 regedit.exe 3368 Process not Found 2964 regedit.exe 3252 Process not Found 3556 Process not Found 3540 regedit.exe 2212 regedit.exe 596 regedit.exe 2724 regedit.exe 2868 regedit.exe 2852 regedit.exe 3552 Process not Found 2440 Process not Found 4716 Process not Found 2852 regedit.exe 2020 regedit.exe 2456 regedit.exe 3360 regedit.exe 1300 Process not Found 3452 Process not Found 4108 Process not Found 4368 Process not Found 2492 regedit.exe 4220 Process not Found 2852 regedit.exe 2052 regedit.exe 3640 Process not Found 4800 Process not Found 1160 Process not Found 772 regedit.exe 1004 regedit.exe 2424 regedit.exe 2520 regedit.exe 4776 Process not Found 1780 Process not Found 2268 regedit.exe 4580 Process not Found 4160 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2820 ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe 1492 lcpgccj.exe 2160 qlxblhp.exe 2316 dbaebhu.exe 1636 iolenrz.exe 1960 zvlbrfq.exe 2996 oohobts.exe 2880 yzxzwwz.exe 2948 ykgjkds.exe 2352 nssjrnw.exe 1368 xcpueqc.exe 2044 nkbclhg.exe 2332 rbyxhor.exe 3020 pvbkxqy.exe 2824 egqxhea.exe 2372 rmhzvvl.exe 2428 gyquzai.exe 1996 qbffudo.exe 2828 dzazdlu.exe 1620 ckynsfc.exe 2676 sphiwkz.exe 2640 czwkrnn.exe 2668 mclueqt.exe 2864 zpdskus.exe 820 mrjawzx.exe 1792 wmksdtf.exe 2892 galibbk.exe 1060 trfkkjq.exe 868 gpansrw.exe 2220 qpmkdqd.exe 1812 dfhntqb.exe 2076 qecqcyg.exe 636 agrapbn.exe 2312 krpkceb.exe 1740 whjnlfy.exe 2744 kubdzix.exe 1588 ubfajhf.exe 2448 dhgyzps.exe 2552 odhipjt.exe 2576 bcblyry.exe 2344 lbgiiig.exe 2304 ydmytvk.exe 2432 ktobcdq.exe 2148 vstyubx.exe 2760 kmptepz.exe 944 xckwnyx.exe 1408 hniyabl.exe 2764 rpxinws.exe 2500 eoslwex.exe 2192 rbjbjiw.exe 1612 apkyzpj.exe 2024 loowkor.exe 448 vnstcnq.exe 2080 imvwlnw.exe 2016 ptiwxcf.exe 1520 cgamdge.exe 1412 pigbwti.exe 1580 zlvmkwx.exe 112 mjqgswu.exe 2100 wfrzaqd.exe 2340 mqomjmf.exe 1564 tyjmecp.exe 2476 gaptpot.exe 1768 nerhyzw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2596 2820 ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe 266 PID 2820 wrote to memory of 2596 2820 ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe 266 PID 2820 wrote to memory of 2596 2820 ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe 266 PID 2820 wrote to memory of 2596 2820 ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe 266 PID 2596 wrote to memory of 1352 2596 cmd.exe 49 PID 2596 wrote to memory of 1352 2596 cmd.exe 49 PID 2596 wrote to memory of 1352 2596 cmd.exe 49 PID 2596 wrote to memory of 1352 2596 cmd.exe 49 PID 2820 wrote to memory of 1492 2820 ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe 32 PID 2820 wrote to memory of 1492 2820 ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe 32 PID 2820 wrote to memory of 1492 2820 ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe 32 PID 2820 wrote to memory of 1492 2820 ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe 32 PID 1492 wrote to memory of 2160 1492 lcpgccj.exe 33 PID 1492 wrote to memory of 2160 1492 lcpgccj.exe 33 PID 1492 wrote to memory of 2160 1492 lcpgccj.exe 33 PID 1492 wrote to memory of 2160 1492 lcpgccj.exe 33 PID 2160 wrote to memory of 2316 2160 qlxblhp.exe 34 PID 2160 wrote to memory of 2316 2160 qlxblhp.exe 34 PID 2160 wrote to memory of 2316 2160 qlxblhp.exe 34 PID 2160 wrote to memory of 2316 2160 qlxblhp.exe 34 PID 2316 wrote to memory of 1636 2316 dbaebhu.exe 35 PID 2316 wrote to memory of 1636 2316 dbaebhu.exe 35 PID 2316 wrote to memory of 1636 2316 dbaebhu.exe 35 PID 2316 wrote to memory of 1636 2316 dbaebhu.exe 35 PID 1636 wrote to memory of 1960 1636 iolenrz.exe 36 PID 1636 wrote to memory of 1960 1636 iolenrz.exe 36 PID 1636 wrote to memory of 1960 1636 iolenrz.exe 36 PID 1636 wrote to memory of 1960 1636 iolenrz.exe 36 PID 1960 wrote to memory of 1056 1960 zvlbrfq.exe 37 PID 1960 wrote to memory of 1056 1960 zvlbrfq.exe 37 PID 1960 wrote to memory of 1056 1960 zvlbrfq.exe 37 PID 1960 wrote to memory of 1056 1960 zvlbrfq.exe 37 PID 1056 wrote to memory of 2768 1056 cmd.exe 288 PID 1056 wrote to memory of 2768 1056 cmd.exe 288 PID 1056 wrote to memory of 2768 1056 cmd.exe 288 PID 1056 wrote to memory of 2768 1056 cmd.exe 288 PID 1960 wrote to memory of 2996 1960 zvlbrfq.exe 39 PID 1960 wrote to memory of 2996 1960 zvlbrfq.exe 39 PID 1960 wrote to memory of 2996 1960 zvlbrfq.exe 39 PID 1960 wrote to memory of 2996 1960 zvlbrfq.exe 39 PID 2996 wrote to memory of 2176 2996 oohobts.exe 127 PID 2996 wrote to memory of 2176 2996 oohobts.exe 127 PID 2996 wrote to memory of 2176 2996 oohobts.exe 127 PID 2996 wrote to memory of 2176 2996 oohobts.exe 127 PID 2996 wrote to memory of 2880 2996 oohobts.exe 42 PID 2996 wrote to memory of 2880 2996 oohobts.exe 42 PID 2996 wrote to memory of 2880 2996 oohobts.exe 42 PID 2996 wrote to memory of 2880 2996 oohobts.exe 42 PID 2176 wrote to memory of 2236 2176 cmd.exe 41 PID 2176 wrote to memory of 2236 2176 cmd.exe 41 PID 2176 wrote to memory of 2236 2176 cmd.exe 41 PID 2176 wrote to memory of 2236 2176 cmd.exe 41 PID 2880 wrote to memory of 692 2880 yzxzwwz.exe 43 PID 2880 wrote to memory of 692 2880 yzxzwwz.exe 43 PID 2880 wrote to memory of 692 2880 yzxzwwz.exe 43 PID 2880 wrote to memory of 692 2880 yzxzwwz.exe 43 PID 2880 wrote to memory of 2948 2880 yzxzwwz.exe 44 PID 2880 wrote to memory of 2948 2880 yzxzwwz.exe 44 PID 2880 wrote to memory of 2948 2880 yzxzwwz.exe 44 PID 2880 wrote to memory of 2948 2880 yzxzwwz.exe 44 PID 692 wrote to memory of 1812 692 cmd.exe 45 PID 692 wrote to memory of 1812 692 cmd.exe 45 PID 692 wrote to memory of 1812 692 cmd.exe 45 PID 692 wrote to memory of 1812 692 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵PID:1352
-
-
-
C:\Windows\SysWOW64\lcpgccj.exeC:\Windows\system32\lcpgccj.exe 656 "C:\Users\Admin\AppData\Local\Temp\ae70e848f771cf4213fed3fe2d133315_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\qlxblhp.exeC:\Windows\system32\qlxblhp.exe 632 "C:\Windows\SysWOW64\lcpgccj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\dbaebhu.exeC:\Windows\system32\dbaebhu.exe 712 "C:\Windows\SysWOW64\qlxblhp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\iolenrz.exeC:\Windows\system32\iolenrz.exe 636 "C:\Windows\SysWOW64\dbaebhu.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\zvlbrfq.exeC:\Windows\system32\zvlbrfq.exe 624 "C:\Windows\SysWOW64\iolenrz.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat7⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵PID:2768
-
-
-
C:\Windows\SysWOW64\oohobts.exeC:\Windows\system32\oohobts.exe 728 "C:\Windows\SysWOW64\zvlbrfq.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat8⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵PID:2236
-
-
-
C:\Windows\SysWOW64\yzxzwwz.exeC:\Windows\system32\yzxzwwz.exe 736 "C:\Windows\SysWOW64\oohobts.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat9⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵PID:1812
-
-
-
C:\Windows\SysWOW64\ykgjkds.exeC:\Windows\system32\ykgjkds.exe 648 "C:\Windows\SysWOW64\yzxzwwz.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat10⤵PID:2192
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- System Location Discovery: System Language Discovery
PID:332
-
-
-
C:\Windows\SysWOW64\nssjrnw.exeC:\Windows\system32\nssjrnw.exe 740 "C:\Windows\SysWOW64\ykgjkds.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat11⤵PID:1352
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵PID:2196
-
-
-
C:\Windows\SysWOW64\xcpueqc.exeC:\Windows\system32\xcpueqc.exe 744 "C:\Windows\SysWOW64\nssjrnw.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1368 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat12⤵PID:1272
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵PID:2140
-
-
-
C:\Windows\SysWOW64\nkbclhg.exeC:\Windows\system32\nkbclhg.exe 752 "C:\Windows\SysWOW64\xcpueqc.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat13⤵PID:1616
-
-
C:\Windows\SysWOW64\rbyxhor.exeC:\Windows\system32\rbyxhor.exe 660 "C:\Windows\SysWOW64\nkbclhg.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat14⤵PID:2376
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg15⤵PID:2800
-
-
-
C:\Windows\SysWOW64\pvbkxqy.exeC:\Windows\system32\pvbkxqy.exe 676 "C:\Windows\SysWOW64\rbyxhor.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat15⤵PID:2632
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg16⤵PID:2152
-
-
-
C:\Windows\SysWOW64\egqxhea.exeC:\Windows\system32\egqxhea.exe 764 "C:\Windows\SysWOW64\pvbkxqy.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat16⤵PID:1456
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg17⤵
- Runs .reg file with regedit
PID:1004
-
-
-
C:\Windows\SysWOW64\rmhzvvl.exeC:\Windows\system32\rmhzvvl.exe 768 "C:\Windows\SysWOW64\egqxhea.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat17⤵PID:2240
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg18⤵PID:2268
-
-
-
C:\Windows\SysWOW64\gyquzai.exeC:\Windows\system32\gyquzai.exe 772 "C:\Windows\SysWOW64\rmhzvvl.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat18⤵PID:2796
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg19⤵
- Modifies security service
PID:964
-
-
-
C:\Windows\SysWOW64\qbffudo.exeC:\Windows\system32\qbffudo.exe 776 "C:\Windows\SysWOW64\gyquzai.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1996 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat19⤵PID:864
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg20⤵PID:3056
-
-
-
C:\Windows\SysWOW64\dzazdlu.exeC:\Windows\system32\dzazdlu.exe 780 "C:\Windows\SysWOW64\qbffudo.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat20⤵PID:1968
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg21⤵PID:692
-
-
-
C:\Windows\SysWOW64\ckynsfc.exeC:\Windows\system32\ckynsfc.exe 784 "C:\Windows\SysWOW64\dzazdlu.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat21⤵PID:1584
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg22⤵PID:588
-
-
-
C:\Windows\SysWOW64\sphiwkz.exeC:\Windows\system32\sphiwkz.exe 760 "C:\Windows\SysWOW64\ckynsfc.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat22⤵PID:1760
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg23⤵PID:2020
-
-
-
C:\Windows\SysWOW64\czwkrnn.exeC:\Windows\system32\czwkrnn.exe 756 "C:\Windows\SysWOW64\sphiwkz.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat23⤵PID:1604
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg24⤵
- Modifies security service
PID:2016
-
-
-
C:\Windows\SysWOW64\mclueqt.exeC:\Windows\system32\mclueqt.exe 796 "C:\Windows\SysWOW64\czwkrnn.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat24⤵PID:2180
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg25⤵PID:1816
-
-
-
C:\Windows\SysWOW64\zpdskus.exeC:\Windows\system32\zpdskus.exe 800 "C:\Windows\SysWOW64\mclueqt.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat25⤵
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg26⤵PID:2240
-
-
-
C:\Windows\SysWOW64\mrjawzx.exeC:\Windows\system32\mrjawzx.exe 804 "C:\Windows\SysWOW64\zpdskus.exe"25⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat26⤵PID:788
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg27⤵PID:1812
-
-
-
C:\Windows\SysWOW64\wmksdtf.exeC:\Windows\system32\wmksdtf.exe 808 "C:\Windows\SysWOW64\mrjawzx.exe"26⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat27⤵PID:3024
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg28⤵PID:2808
-
-
-
C:\Windows\SysWOW64\galibbk.exeC:\Windows\system32\galibbk.exe 816 "C:\Windows\SysWOW64\wmksdtf.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat28⤵PID:1544
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg29⤵PID:2164
-
-
-
C:\Windows\SysWOW64\trfkkjq.exeC:\Windows\system32\trfkkjq.exe 812 "C:\Windows\SysWOW64\galibbk.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat29⤵PID:1760
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg30⤵PID:1160
-
-
-
C:\Windows\SysWOW64\gpansrw.exeC:\Windows\system32\gpansrw.exe 828 "C:\Windows\SysWOW64\trfkkjq.exe"29⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:868 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat30⤵PID:2860
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg31⤵
- System Location Discovery: System Language Discovery
PID:1524
-
-
-
C:\Windows\SysWOW64\qpmkdqd.exeC:\Windows\system32\qpmkdqd.exe 820 "C:\Windows\SysWOW64\gpansrw.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat31⤵PID:1036
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg32⤵PID:2404
-
-
-
C:\Windows\SysWOW64\dfhntqb.exeC:\Windows\system32\dfhntqb.exe 824 "C:\Windows\SysWOW64\qpmkdqd.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat32⤵PID:2792
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg33⤵PID:2920
-
-
-
C:\Windows\SysWOW64\qecqcyg.exeC:\Windows\system32\qecqcyg.exe 832 "C:\Windows\SysWOW64\dfhntqb.exe"32⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat33⤵PID:1752
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg34⤵PID:2408
-
-
-
C:\Windows\SysWOW64\agrapbn.exeC:\Windows\system32\agrapbn.exe 836 "C:\Windows\SysWOW64\qecqcyg.exe"33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:636 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat34⤵PID:2000
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg35⤵PID:1196
-
-
-
C:\Windows\SysWOW64\krpkceb.exeC:\Windows\system32\krpkceb.exe 840 "C:\Windows\SysWOW64\agrapbn.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat35⤵PID:2876
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg36⤵PID:2088
-
-
-
C:\Windows\SysWOW64\whjnlfy.exeC:\Windows\system32\whjnlfy.exe 844 "C:\Windows\SysWOW64\krpkceb.exe"35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat36⤵PID:588
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg37⤵
- Runs .reg file with regedit
PID:2492
-
-
-
C:\Windows\SysWOW64\kubdzix.exeC:\Windows\system32\kubdzix.exe 848 "C:\Windows\SysWOW64\whjnlfy.exe"36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat37⤵PID:716
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg38⤵PID:2176
-
-
-
C:\Windows\SysWOW64\ubfajhf.exeC:\Windows\system32\ubfajhf.exe 856 "C:\Windows\SysWOW64\kubdzix.exe"37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat38⤵PID:1956
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg39⤵PID:2120
-
-
-
C:\Windows\SysWOW64\dhgyzps.exeC:\Windows\system32\dhgyzps.exe 852 "C:\Windows\SysWOW64\ubfajhf.exe"38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat39⤵PID:2236
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg40⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
C:\Windows\SysWOW64\odhipjt.exeC:\Windows\system32\odhipjt.exe 860 "C:\Windows\SysWOW64\dhgyzps.exe"39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat40⤵PID:1820
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg41⤵
- Runs .reg file with regedit
PID:2020
-
-
-
C:\Windows\SysWOW64\bcblyry.exeC:\Windows\system32\bcblyry.exe 864 "C:\Windows\SysWOW64\odhipjt.exe"40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat41⤵PID:816
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg42⤵PID:1292
-
-
-
C:\Windows\SysWOW64\lbgiiig.exeC:\Windows\system32\lbgiiig.exe 868 "C:\Windows\SysWOW64\bcblyry.exe"41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat42⤵PID:2384
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg43⤵
- Runs .reg file with regedit
PID:536
-
-
-
C:\Windows\SysWOW64\ydmytvk.exeC:\Windows\system32\ydmytvk.exe 872 "C:\Windows\SysWOW64\lbgiiig.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat43⤵PID:2496
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg44⤵PID:884
-
-
-
C:\Windows\SysWOW64\ktobcdq.exeC:\Windows\system32\ktobcdq.exe 876 "C:\Windows\SysWOW64\ydmytvk.exe"43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat44⤵PID:2692
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg45⤵PID:1956
-
-
-
C:\Windows\SysWOW64\vstyubx.exeC:\Windows\system32\vstyubx.exe 880 "C:\Windows\SysWOW64\ktobcdq.exe"44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2148 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat45⤵PID:1864
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg46⤵PID:2164
-
-
-
C:\Windows\SysWOW64\kmptepz.exeC:\Windows\system32\kmptepz.exe 884 "C:\Windows\SysWOW64\vstyubx.exe"45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat46⤵PID:644
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg47⤵PID:2816
-
-
-
C:\Windows\SysWOW64\xckwnyx.exeC:\Windows\system32\xckwnyx.exe 888 "C:\Windows\SysWOW64\kmptepz.exe"46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:944 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat47⤵PID:2388
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg48⤵PID:2412
-
-
-
C:\Windows\SysWOW64\hniyabl.exeC:\Windows\system32\hniyabl.exe 892 "C:\Windows\SysWOW64\xckwnyx.exe"47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1408 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat48⤵PID:1564
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg49⤵PID:2236
-
-
-
C:\Windows\SysWOW64\rpxinws.exeC:\Windows\system32\rpxinws.exe 896 "C:\Windows\SysWOW64\hniyabl.exe"48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat49⤵PID:1296
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg50⤵PID:1388
-
-
-
C:\Windows\SysWOW64\eoslwex.exeC:\Windows\system32\eoslwex.exe 900 "C:\Windows\SysWOW64\rpxinws.exe"49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat50⤵PID:2200
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg51⤵PID:2308
-
-
-
C:\Windows\SysWOW64\rbjbjiw.exeC:\Windows\system32\rbjbjiw.exe 912 "C:\Windows\SysWOW64\eoslwex.exe"50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat51⤵PID:964
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg52⤵PID:2108
-
-
-
C:\Windows\SysWOW64\apkyzpj.exeC:\Windows\system32\apkyzpj.exe 904 "C:\Windows\SysWOW64\rbjbjiw.exe"51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat52⤵PID:2604
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg53⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
C:\Windows\SysWOW64\loowkor.exeC:\Windows\system32\loowkor.exe 920 "C:\Windows\SysWOW64\apkyzpj.exe"52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat53⤵PID:3052
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg54⤵PID:2952
-
-
-
C:\Windows\SysWOW64\vnstcnq.exeC:\Windows\system32\vnstcnq.exe 908 "C:\Windows\SysWOW64\loowkor.exe"53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:448 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat54⤵PID:2412
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg55⤵
- Runs .reg file with regedit
PID:564
-
-
-
C:\Windows\SysWOW64\imvwlnw.exeC:\Windows\system32\imvwlnw.exe 928 "C:\Windows\SysWOW64\vnstcnq.exe"54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2080 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat55⤵PID:1276
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg56⤵PID:1464
-
-
-
C:\Windows\SysWOW64\ptiwxcf.exeC:\Windows\system32\ptiwxcf.exe 916 "C:\Windows\SysWOW64\imvwlnw.exe"55⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat56⤵PID:2528
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg57⤵
- Runs .reg file with regedit
PID:2852
-
-
-
C:\Windows\SysWOW64\cgamdge.exeC:\Windows\system32\cgamdge.exe 924 "C:\Windows\SysWOW64\ptiwxcf.exe"56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1520 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat57⤵PID:2164
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg58⤵PID:2932
-
-
-
C:\Windows\SysWOW64\pigbwti.exeC:\Windows\system32\pigbwti.exe 932 "C:\Windows\SysWOW64\cgamdge.exe"57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat58⤵PID:1776
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg59⤵
- Runs .reg file with regedit
PID:1708
-
-
-
C:\Windows\SysWOW64\zlvmkwx.exeC:\Windows\system32\zlvmkwx.exe 936 "C:\Windows\SysWOW64\pigbwti.exe"58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat59⤵PID:2808
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg60⤵PID:2844
-
-
-
C:\Windows\SysWOW64\mjqgswu.exeC:\Windows\system32\mjqgswu.exe 940 "C:\Windows\SysWOW64\zlvmkwx.exe"59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:112 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat60⤵PID:2896
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg61⤵
- Runs .reg file with regedit
PID:772
-
-
-
C:\Windows\SysWOW64\wfrzaqd.exeC:\Windows\system32\wfrzaqd.exe 944 "C:\Windows\SysWOW64\mjqgswu.exe"60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat61⤵
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg62⤵PID:1312
-
-
-
C:\Windows\SysWOW64\mqomjmf.exeC:\Windows\system32\mqomjmf.exe 948 "C:\Windows\SysWOW64\wfrzaqd.exe"61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat62⤵PID:2408
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg63⤵PID:2484
-
-
-
C:\Windows\SysWOW64\tyjmecp.exeC:\Windows\system32\tyjmecp.exe 952 "C:\Windows\SysWOW64\mqomjmf.exe"62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat63⤵PID:584
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg64⤵PID:1456
-
-
-
C:\Windows\SysWOW64\gaptpot.exeC:\Windows\system32\gaptpot.exe 956 "C:\Windows\SysWOW64\tyjmecp.exe"63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat64⤵PID:2184
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg65⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
-
C:\Windows\SysWOW64\nerhyzw.exeC:\Windows\system32\nerhyzw.exe 960 "C:\Windows\SysWOW64\gaptpot.exe"64⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat65⤵PID:2624
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg66⤵PID:1196
-
-
-
C:\Windows\SysWOW64\xhprucc.exeC:\Windows\system32\xhprucc.exe 964 "C:\Windows\SysWOW64\nerhyzw.exe"65⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat66⤵PID:1628
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg67⤵
- Runs .reg file with regedit
PID:2964
-
-
-
C:\Windows\SysWOW64\zcibbxl.exeC:\Windows\system32\zcibbxl.exe 968 "C:\Windows\SysWOW64\xhprucc.exe"66⤵PID:1504
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat67⤵
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg68⤵PID:1324
-
-
-
C:\Windows\SysWOW64\pwewlln.exeC:\Windows\system32\pwewlln.exe 972 "C:\Windows\SysWOW64\zcibbxl.exe"67⤵PID:2920
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat68⤵PID:1584
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg69⤵PID:2204
-
-
-
C:\Windows\SysWOW64\zrfhsfo.exeC:\Windows\system32\zrfhsfo.exe 976 "C:\Windows\SysWOW64\pwewlln.exe"68⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat69⤵PID:2908
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg70⤵PID:3068
-
-
-
C:\Windows\SysWOW64\mtlwess.exeC:\Windows\system32\mtlwess.exe 980 "C:\Windows\SysWOW64\zrfhsfo.exe"69⤵
- Drops file in System32 directory
PID:696 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat70⤵PID:2684
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg71⤵PID:1512
-
-
-
C:\Windows\SysWOW64\zkgzusy.exeC:\Windows\system32\zkgzusy.exe 984 "C:\Windows\SysWOW64\mtlwess.exe"70⤵PID:2516
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat71⤵PID:2588
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg72⤵PID:1608
-
-
-
C:\Windows\SysWOW64\mmmpgec.exeC:\Windows\system32\mmmpgec.exe 792 "C:\Windows\SysWOW64\zkgzusy.exe"71⤵PID:2472
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat72⤵PID:1776
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg73⤵PID:2608
-
-
-
C:\Windows\SysWOW64\txtuvyt.exeC:\Windows\system32\txtuvyt.exe 992 "C:\Windows\SysWOW64\mmmpgec.exe"72⤵PID:1296
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat73⤵PID:2408
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg74⤵PID:2140
-
-
-
C:\Windows\SysWOW64\iqqhfmv.exeC:\Windows\system32\iqqhfmv.exe 996 "C:\Windows\SysWOW64\txtuvyt.exe"73⤵PID:320
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat74⤵PID:2956
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg75⤵
- Runs .reg file with regedit
PID:788
-
-
-
C:\Windows\SysWOW64\vdzxkqu.exeC:\Windows\system32\vdzxkqu.exe 1000 "C:\Windows\SysWOW64\iqqhfmv.exe"74⤵
- Identifies Wine through registry keys
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat75⤵PID:1324
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg76⤵PID:2068
-
-
-
C:\Windows\SysWOW64\iccztyz.exeC:\Windows\system32\iccztyz.exe 1004 "C:\Windows\SysWOW64\vdzxkqu.exe"75⤵PID:2932
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat76⤵PID:2244
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg77⤵PID:1040
-
-
-
C:\Windows\SysWOW64\sbgxlxh.exeC:\Windows\system32\sbgxlxh.exe 988 "C:\Windows\SysWOW64\iccztyz.exe"76⤵PID:2912
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat77⤵PID:584
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg78⤵PID:1064
-
-
-
C:\Windows\SysWOW64\cphubem.exeC:\Windows\system32\cphubem.exe 1012 "C:\Windows\SysWOW64\sbgxlxh.exe"77⤵PID:1388
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat78⤵PID:1444
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg79⤵PID:2020
-
-
-
C:\Windows\SysWOW64\pcqkhat.exeC:\Windows\system32\pcqkhat.exe 1016 "C:\Windows\SysWOW64\cphubem.exe"78⤵PID:2348
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat79⤵PID:864
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg80⤵PID:2524
-
-
-
C:\Windows\SysWOW64\zfoucdz.exeC:\Windows\system32\zfoucdz.exe 1020 "C:\Windows\SysWOW64\pcqkhat.exe"79⤵PID:2788
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat80⤵PID:1008
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg81⤵PID:1800
-
-
-
C:\Windows\SysWOW64\jmssncg.exeC:\Windows\system32\jmssncg.exe 1028 "C:\Windows\SysWOW64\zfoucdz.exe"80⤵
- Identifies Wine through registry keys
PID:1788 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat81⤵
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg82⤵PID:2896
-
-
-
C:\Windows\SysWOW64\wcnuvke.exeC:\Windows\system32\wcnuvke.exe 1032 "C:\Windows\SysWOW64\jmssncg.exe"81⤵
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat82⤵PID:1348
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg83⤵
- Modifies security service
PID:2156
-
-
-
C:\Windows\SysWOW64\jtpxesk.exeC:\Windows\system32\jtpxesk.exe 1036 "C:\Windows\SysWOW64\wcnuvke.exe"82⤵
- Drops file in System32 directory
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat83⤵PID:3028
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg84⤵
- Modifies security service
PID:1560
-
-
-
C:\Windows\SysWOW64\wrkansp.exeC:\Windows\system32\wrkansp.exe 1040 "C:\Windows\SysWOW64\jtpxesk.exe"83⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat84⤵PID:1684
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg85⤵PID:2196
-
-
-
C:\Windows\SysWOW64\gflxlac.exeC:\Windows\system32\gflxlac.exe 1044 "C:\Windows\SysWOW64\wrkansp.exe"84⤵PID:2232
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat85⤵PID:2724
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg86⤵PID:2736
-
-
-
C:\Windows\SysWOW64\swgatia.exeC:\Windows\system32\swgatia.exe 1048 "C:\Windows\SysWOW64\gflxlac.exe"85⤵
- Identifies Wine through registry keys
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat86⤵PID:476
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg87⤵
- Runs .reg file with regedit
PID:1300
-
-
-
C:\Windows\SysWOW64\fmjccif.exeC:\Windows\system32\fmjccif.exe 788 "C:\Windows\SysWOW64\swgatia.exe"86⤵PID:1064
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat87⤵PID:2276
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg88⤵
- Modifies security service
PID:2496
-
-
-
C:\Windows\SysWOW64\sldxkql.exeC:\Windows\system32\sldxkql.exe 1056 "C:\Windows\SysWOW64\fmjccif.exe"87⤵
- Identifies Wine through registry keys
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat88⤵PID:2152
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg89⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cntiytr.exeC:\Windows\system32\cntiytr.exe 1064 "C:\Windows\SysWOW64\sldxkql.exe"88⤵PID:316
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat89⤵PID:2004
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg90⤵PID:1800
-
-
-
C:\Windows\SysWOW64\pmokgcx.exeC:\Windows\system32\pmokgcx.exe 1060 "C:\Windows\SysWOW64\cntiytr.exe"89⤵PID:1012
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat90⤵PID:2256
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg91⤵PID:1752
-
-
-
C:\Windows\SysWOW64\zplvcfd.exeC:\Windows\system32\zplvcfd.exe 1068 "C:\Windows\SysWOW64\pmokgcx.exe"90⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat91⤵
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg92⤵PID:1240
-
-
-
C:\Windows\SysWOW64\pblqgka.exeC:\Windows\system32\pblqgka.exe 1072 "C:\Windows\SysWOW64\zplvcfd.exe"91⤵PID:3056
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat92⤵PID:332
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg93⤵
- Runs .reg file with regedit
PID:2268
-
-
-
C:\Windows\SysWOW64\zapnqjh.exeC:\Windows\system32\zapnqjh.exe 1076 "C:\Windows\SysWOW64\pblqgka.exe"92⤵PID:2792
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat93⤵PID:288
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg94⤵PID:2528
-
-
-
C:\Windows\SysWOW64\jdnxdmo.exeC:\Windows\system32\jdnxdmo.exe 1080 "C:\Windows\SysWOW64\zapnqjh.exe"93⤵PID:2876
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat94⤵PID:1616
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg95⤵PID:2492
-
-
-
C:\Windows\SysWOW64\opgfwoa.exeC:\Windows\system32\opgfwoa.exe 1084 "C:\Windows\SysWOW64\jdnxdmo.exe"94⤵PID:2020
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat95⤵PID:2252
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg96⤵
- Modifies security service
PID:1464
-
-
-
C:\Windows\SysWOW64\bgbifwy.exeC:\Windows\system32\bgbifwy.exe 1088 "C:\Windows\SysWOW64\opgfwoa.exe"95⤵PID:1512
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat96⤵PID:1736
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg97⤵
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
C:\Windows\SysWOW64\nihyqik.exeC:\Windows\system32\nihyqik.exe 1092 "C:\Windows\SysWOW64\bgbifwy.exe"96⤵PID:2512
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat97⤵PID:2856
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg98⤵PID:408
-
-
-
C:\Windows\SysWOW64\aknfknp.exeC:\Windows\system32\aknfknp.exe 1096 "C:\Windows\SysWOW64\nihyqik.exe"97⤵PID:1324
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat98⤵PID:2628
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg99⤵PID:588
-
-
-
C:\Windows\SysWOW64\naiisvm.exeC:\Windows\system32\naiisvm.exe 1100 "C:\Windows\SysWOW64\aknfknp.exe"98⤵
- Drops file in System32 directory
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat99⤵
- System Location Discovery: System Language Discovery
PID:716 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg100⤵PID:2928
-
-
-
C:\Windows\SysWOW64\xaufduu.exeC:\Windows\system32\xaufduu.exe 1104 "C:\Windows\SysWOW64\naiisvm.exe"99⤵PID:3008
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat100⤵PID:2152
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg101⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
C:\Windows\SysWOW64\hhylnsb.exeC:\Windows\system32\hhylnsb.exe 1052 "C:\Windows\SysWOW64\xaufduu.exe"100⤵PID:2396
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat101⤵PID:1108
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg102⤵PID:1028
-
-
-
C:\Windows\SysWOW64\xsvyxge.exeC:\Windows\system32\xsvyxge.exe 1108 "C:\Windows\SysWOW64\hhylnsb.exe"101⤵PID:1544
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat102⤵PID:332
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg103⤵PID:2244
-
-
-
C:\Windows\SysWOW64\ewflozo.exeC:\Windows\system32\ewflozo.exe 684 "C:\Windows\SysWOW64\xsvyxge.exe"102⤵PID:1088
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat103⤵PID:2276
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg104⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Windows\SysWOW64\lpeqdtx.exeC:\Windows\system32\lpeqdtx.exe 1120 "C:\Windows\SysWOW64\ewflozo.exe"103⤵PID:2180
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat104⤵PID:1756
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg105⤵PID:2228
-
-
-
C:\Windows\SysWOW64\bbbdnhz.exeC:\Windows\system32\bbbdnhz.exe 1124 "C:\Windows\SysWOW64\lpeqdtx.exe"104⤵PID:2808
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat105⤵PID:2564
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg106⤵PID:2404
-
-
-
C:\Windows\SysWOW64\lwbvdba.exeC:\Windows\system32\lwbvdba.exe 1128 "C:\Windows\SysWOW64\bbbdnhz.exe"105⤵
- Identifies Wine through registry keys
PID:1360 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat106⤵PID:1528
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg107⤵PID:2252
-
-
-
C:\Windows\SysWOW64\tepoprj.exeC:\Windows\system32\tepoprj.exe 652 "C:\Windows\SysWOW64\lwbvdba.exe"106⤵PID:3032
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat107⤵PID:1144
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg108⤵
- Runs .reg file with regedit
PID:2684
-
-
-
C:\Windows\SysWOW64\daqgwlk.exeC:\Windows\system32\daqgwlk.exe 664 "C:\Windows\SysWOW64\tepoprj.exe"107⤵PID:2608
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat108⤵
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg109⤵PID:2408
-
-
-
C:\Windows\SysWOW64\qcwoqyw.exeC:\Windows\system32\qcwoqyw.exe 1140 "C:\Windows\SysWOW64\daqgwlk.exe"108⤵PID:2736
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat109⤵PID:2280
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg110⤵PID:2624
-
-
-
C:\Windows\SysWOW64\amlydbd.exeC:\Windows\system32\amlydbd.exe 1144 "C:\Windows\SysWOW64\qcwoqyw.exe"109⤵PID:2236
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat110⤵PID:1348
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg111⤵PID:772
-
-
-
C:\Windows\SysWOW64\klxvnak.exeC:\Windows\system32\klxvnak.exe 1136 "C:\Windows\SysWOW64\amlydbd.exe"110⤵PID:964
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat111⤵PID:2600
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg112⤵PID:2072
-
-
-
C:\Windows\SysWOW64\uhqodul.exeC:\Windows\system32\uhqodul.exe 1148 "C:\Windows\SysWOW64\klxvnak.exe"111⤵PID:2096
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat112⤵PID:1036
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg113⤵PID:1096
-
-
-
C:\Windows\SysWOW64\hxtrmur.exeC:\Windows\system32\hxtrmur.exe 1156 "C:\Windows\SysWOW64\uhqodul.exe"112⤵
- Identifies Wine through registry keys
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat113⤵PID:288
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg114⤵
- Modifies security service
PID:2604
-
-
-
C:\Windows\SysWOW64\mwotudo.exeC:\Windows\system32\mwotudo.exe 1152 "C:\Windows\SysWOW64\hxtrmur.exe"113⤵PID:2060
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat114⤵PID:3012
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg115⤵PID:2632
-
-
-
C:\Windows\SysWOW64\wvsrfbw.exeC:\Windows\system32\wvsrfbw.exe 1164 "C:\Windows\SysWOW64\mwotudo.exe"114⤵
- Drops file in System32 directory
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat115⤵PID:2568
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg116⤵PID:340
-
-
-
C:\Windows\SysWOW64\gueoxad.exeC:\Windows\system32\gueoxad.exe 1160 "C:\Windows\SysWOW64\wvsrfbw.exe"115⤵
- Identifies Wine through registry keys
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat116⤵PID:2560
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg117⤵
- Modifies security service
PID:536
-
-
-
C:\Windows\SysWOW64\lhxwiki.exeC:\Windows\system32\lhxwiki.exe 644 "C:\Windows\SysWOW64\gueoxad.exe"116⤵PID:1240
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat117⤵PID:692
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg118⤵PID:908
-
-
-
C:\Windows\SysWOW64\yxszrkn.exeC:\Windows\system32\yxszrkn.exe 1180 "C:\Windows\SysWOW64\lhxwiki.exe"117⤵PID:2288
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat118⤵PID:2004
-
-
C:\Windows\SysWOW64\nrpmagq.exeC:\Windows\system32\nrpmagq.exe 1176 "C:\Windows\SysWOW64\yxszrkn.exe"118⤵PID:884
-
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat119⤵PID:1840
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg120⤵PID:716
-
-
-
C:\Windows\SysWOW64\shugxmb.exeC:\Windows\system32\shugxmb.exe 672 "C:\Windows\SysWOW64\nrpmagq.exe"119⤵
- Identifies Wine through registry keys
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat120⤵PID:2856
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg121⤵PID:1808
-
-
-
C:\Windows\SysWOW64\ibrtgae.exeC:\Windows\system32\ibrtgae.exe 1184 "C:\Windows\SysWOW64\shugxmb.exe"120⤵
- Identifies Wine through registry keys
PID:1936 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat121⤵PID:3052
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg122⤵PID:2796
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-