Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 05:09
Static task
static1
Behavioral task
behavioral1
Sample
b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe
-
Size
291KB
-
MD5
b6f4f06b306d2ec8bb84f4312b3ead20
-
SHA1
9e3a7d1cdc6e4ca3e3f77b4e600c40cd751b2491
-
SHA256
01ab469cbc136b144f0f4f747af356de3270c794e9ab63e49b1b4ab908e9e079
-
SHA512
8b62dfa5b6ac38a3ff88fe4c08f8c1ab63a3df027c8ddbc2984ccacadb800fdedd52b087f6da4abc0c3d00618e457ba9c832dc9414866dfdf5f2a71b835433c1
-
SSDEEP
6144:00NJ7p6GME0ifks0TsCfYOiOr4TRRPgKJM5QabWHxD+kRdvqM:FJF6Gx0NqOrGoJQQWwkh
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2256 nkfhpp.exe 1884 mormmg.exe 2672 mvokdw.exe 2484 bgmphx.exe 316 iohpbm.exe 1676 duqkek.exe 480 kgwptm.exe 1744 mmdaid.exe 3016 zruuwm.exe 1472 zgsavu.exe 1728 oaovxq.exe 2960 qkgkpm.exe 648 ibidds.exe 2388 kthsvo.exe 2980 ciyxgq.exe 2232 mhkvqo.exe 2936 zffxzp.exe 1004 mwaahx.exe 2472 zmddyf.exe 2728 huqvku.exe 2220 wkcdre.exe 1776 gjoabd.exe 1936 rqsyuc.exe 2904 bpedea.exe 2808 njklpn.exe 1464 aifoyn.exe 1120 kwglwu.exe 700 uvkigt.exe 924 kzsdkg.exe 2156 mkhoyc.exe 2924 zendjo.exe 2380 mzftps.exe 2652 vfxinz.exe 2700 jspgtv.exe 2464 vuvoei.exe 2600 fthlpg.exe 2476 srcoxp.exe 1644 curysk.exe 2364 pwxoew.exe 1028 zvklov.exe 2544 mitbuz.exe 2184 zkzrnd.exe 1080 mbcuwl.exe 1132 wlrejp.exe 2140 inxmvt.exe 1584 vesodb.exe 2400 iunrmj.exe 2368 sfkbhm.exe 800 ijlwls.exe 2608 sipuwq.exe 2620 fkdjhd.exe 3028 pvsuug.exe 2524 clnwlg.exe 1944 ocizto.exe 548 balccx.exe 2852 ldamps.exe 940 ybvhya.exe 1008 lvbxjm.exe 2208 vdnucl.exe 2972 itixkl.exe 1980 vvomwy.exe 2192 fuskgx.exe 2396 slvmpf.exe 2932 fjqpxf.exe -
Loads dropped DLL 64 IoCs
pid Process 2276 b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe 2276 b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe 2256 nkfhpp.exe 2256 nkfhpp.exe 1884 mormmg.exe 1884 mormmg.exe 1884 mormmg.exe 2672 mvokdw.exe 2672 mvokdw.exe 2672 mvokdw.exe 2484 bgmphx.exe 2484 bgmphx.exe 2484 bgmphx.exe 316 iohpbm.exe 316 iohpbm.exe 316 iohpbm.exe 1676 duqkek.exe 1676 duqkek.exe 1676 duqkek.exe 480 kgwptm.exe 480 kgwptm.exe 480 kgwptm.exe 1744 mmdaid.exe 1744 mmdaid.exe 1744 mmdaid.exe 3016 zruuwm.exe 3016 zruuwm.exe 3016 zruuwm.exe 1472 zgsavu.exe 1472 zgsavu.exe 1472 zgsavu.exe 1728 oaovxq.exe 1728 oaovxq.exe 1728 oaovxq.exe 2960 qkgkpm.exe 2960 qkgkpm.exe 2960 qkgkpm.exe 648 ibidds.exe 648 ibidds.exe 648 ibidds.exe 2388 kthsvo.exe 2388 kthsvo.exe 2388 kthsvo.exe 2980 ciyxgq.exe 2980 ciyxgq.exe 2980 ciyxgq.exe 2232 mhkvqo.exe 2232 mhkvqo.exe 2232 mhkvqo.exe 2936 zffxzp.exe 2936 zffxzp.exe 2936 zffxzp.exe 1004 mwaahx.exe 1004 mwaahx.exe 1004 mwaahx.exe 2472 zmddyf.exe 2472 zmddyf.exe 2472 zmddyf.exe 2728 huqvku.exe 2728 huqvku.exe 2728 huqvku.exe 2220 wkcdre.exe 2220 wkcdre.exe 2220 wkcdre.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\hvcrjn.exe uehoaf.exe File created C:\Windows\SysWOW64\fueynm.exe ssyjbz.exe File opened for modification C:\Windows\SysWOW64\suwbuf.exe igweeg.exe File created C:\Windows\SysWOW64\qmsowg.exe crizqc.exe File opened for modification C:\Windows\SysWOW64\mrwcjr.exe hxquyn.exe File created C:\Windows\SysWOW64\vddaho.exe laoyul.exe File opened for modification C:\Windows\SysWOW64\zvpfgk.exe krpkce.exe File created C:\Windows\SysWOW64\zhxzsl.exe jdpeox.exe File opened for modification C:\Windows\SysWOW64\cepdli.exe sfcgsj.exe File opened for modification C:\Windows\SysWOW64\laoyul.exe yblvlc.exe File created C:\Windows\SysWOW64\orjkrb.exe bpcufw.exe File opened for modification C:\Windows\SysWOW64\bmnvbl.exe linafg.exe File opened for modification C:\Windows\SysWOW64\eectez.exe rrsdyv.exe File opened for modification C:\Windows\SysWOW64\zgsavu.exe zruuwm.exe File opened for modification C:\Windows\SysWOW64\zmddyf.exe mwaahx.exe File created C:\Windows\SysWOW64\jepvai.exe woutsz.exe File created C:\Windows\SysWOW64\ostbex.exe cynust.exe File created C:\Windows\SysWOW64\nmlkep.exe dfhntq.exe File opened for modification C:\Windows\SysWOW64\fuvgtr.exe wodjvj.exe File opened for modification C:\Windows\SysWOW64\ypjueo.exe lzorwg.exe File opened for modification C:\Windows\SysWOW64\abtioa.exe nhnsco.exe File created C:\Windows\SysWOW64\utwvpd.exe hvtbgd.exe File opened for modification C:\Windows\SysWOW64\sbytnv.exe flvqev.exe File opened for modification C:\Windows\SysWOW64\mormmg.exe nkfhpp.exe File opened for modification C:\Windows\SysWOW64\mvokdw.exe mormmg.exe File opened for modification C:\Windows\SysWOW64\iohpbm.exe bgmphx.exe File created C:\Windows\SysWOW64\dectka.exe qnzqbs.exe File opened for modification C:\Windows\SysWOW64\pmrgzx.exe fyrrbq.exe File opened for modification C:\Windows\SysWOW64\zbchaz.exe nzwagu.exe File created C:\Windows\SysWOW64\uzdkqg.exe kooadl.exe File opened for modification C:\Windows\SysWOW64\ucfrsu.exe hlcpjm.exe File opened for modification C:\Windows\SysWOW64\unpckd.exe fjphgx.exe File created C:\Windows\SysWOW64\yblvlc.exe llqtvc.exe File created C:\Windows\SysWOW64\cjqkhs.exe qtniyj.exe File opened for modification C:\Windows\SysWOW64\flvqev.exe tjpati.exe File created C:\Windows\SysWOW64\fmksrv.exe pabxni.exe File opened for modification C:\Windows\SysWOW64\vddaho.exe laoyul.exe File opened for modification C:\Windows\SysWOW64\ocizto.exe clnwlg.exe File created C:\Windows\SysWOW64\qjzkus.exe gcvmkt.exe File opened for modification C:\Windows\SysWOW64\bjhluw.exe rbdokx.exe File created C:\Windows\SysWOW64\iseyqz.exe vyyieu.exe File created C:\Windows\SysWOW64\hlltil.exe ujfdwy.exe File created C:\Windows\SysWOW64\soklti.exe fxijka.exe File created C:\Windows\SysWOW64\jphqrn.exe abhttg.exe File created C:\Windows\SysWOW64\ssivms.exe ftfsdk.exe File opened for modification C:\Windows\SysWOW64\sqlvbe.exe cdkaxz.exe File opened for modification C:\Windows\SysWOW64\mkakkk.exe ypjueo.exe File created C:\Windows\SysWOW64\vxfzxa.exe iycxpr.exe File opened for modification C:\Windows\SysWOW64\ibidds.exe qkgkpm.exe File opened for modification C:\Windows\SysWOW64\ubldfw.exe hzfotk.exe File created C:\Windows\SysWOW64\drkgnx.exe rbpexp.exe File created C:\Windows\SysWOW64\otdhnv.exe efcsxo.exe File created C:\Windows\SysWOW64\llqtvc.exe bxpvfv.exe File opened for modification C:\Windows\SysWOW64\lwbdhe.exe yfhbyw.exe File opened for modification C:\Windows\SysWOW64\mdeiew.exe zbybts.exe File created C:\Windows\SysWOW64\txrggy.exe gvlqvu.exe File created C:\Windows\SysWOW64\cdfxck.exe pnkutc.exe File opened for modification C:\Windows\SysWOW64\fbeijx.exe dypyou.exe File opened for modification C:\Windows\SysWOW64\dectka.exe qnzqbs.exe File opened for modification C:\Windows\SysWOW64\shooth.exe fueynm.exe File created C:\Windows\SysWOW64\rilpsh.exe fgeihu.exe File opened for modification C:\Windows\SysWOW64\oazype.exe bnhjji.exe File created C:\Windows\SysWOW64\tavqev.exe gnlayr.exe File created C:\Windows\SysWOW64\kqkekr.exe ywewye.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kzsdkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtpxes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udnbaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhawtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fgeihu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edbeuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mzftps.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ryektp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kagysm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mpiscv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgonpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eskfzm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnuvfq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbeijx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clnwlg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iydies.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hyimuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cncxbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkzoav.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bvujvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdeiew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nscqcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language opnodk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prdixp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpdvlt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ejrsxm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nejwqz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iohpbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bexxil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dectka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language suwbuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asutji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmfemi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otdhnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curysk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fkdjhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msfusr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sdarkq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcbvl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blaafk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfeupj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvsuug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zqaxir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epdzvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sbpdkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxujeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxajwk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ocevqe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egjuui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjcrce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kyifzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tteayh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xowwxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qnzqbs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxxowt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drkgnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arpzak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yameoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vyyieu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ypjueo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnujec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkirmx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvbxjm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language myipcm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2276 b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe 2256 nkfhpp.exe 1884 mormmg.exe 2672 mvokdw.exe 2484 bgmphx.exe 316 iohpbm.exe 1676 duqkek.exe 480 kgwptm.exe 1744 mmdaid.exe 3016 zruuwm.exe 1472 zgsavu.exe 1728 oaovxq.exe 2960 qkgkpm.exe 648 ibidds.exe 2388 kthsvo.exe 2980 ciyxgq.exe 2232 mhkvqo.exe 2936 zffxzp.exe 1004 mwaahx.exe 2472 zmddyf.exe 2728 huqvku.exe 2220 wkcdre.exe 1776 gjoabd.exe 1936 rqsyuc.exe 2904 bpedea.exe 2808 njklpn.exe 1464 aifoyn.exe 1120 kwglwu.exe 700 uvkigt.exe 924 kzsdkg.exe 2156 mkhoyc.exe 2924 zendjo.exe 2380 mzftps.exe 2652 vfxinz.exe 2700 jspgtv.exe 2464 vuvoei.exe 2600 fthlpg.exe 2476 srcoxp.exe 1644 curysk.exe 2364 pwxoew.exe 1028 zvklov.exe 2544 mitbuz.exe 2184 zkzrnd.exe 1080 mbcuwl.exe 1132 wlrejp.exe 2140 inxmvt.exe 1584 vesodb.exe 2400 iunrmj.exe 2368 sfkbhm.exe 800 ijlwls.exe 2608 sipuwq.exe 2620 fkdjhd.exe 3028 pvsuug.exe 2524 clnwlg.exe 1944 ocizto.exe 548 balccx.exe 2852 ldamps.exe 940 ybvhya.exe 1008 lvbxjm.exe 2208 vdnucl.exe 2972 itixkl.exe 1980 vvomwy.exe 2192 fuskgx.exe 2396 slvmpf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2256 2276 b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2256 2276 b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2256 2276 b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe 28 PID 2276 wrote to memory of 2256 2276 b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe 28 PID 2256 wrote to memory of 1884 2256 nkfhpp.exe 29 PID 2256 wrote to memory of 1884 2256 nkfhpp.exe 29 PID 2256 wrote to memory of 1884 2256 nkfhpp.exe 29 PID 2256 wrote to memory of 1884 2256 nkfhpp.exe 29 PID 1884 wrote to memory of 2672 1884 mormmg.exe 30 PID 1884 wrote to memory of 2672 1884 mormmg.exe 30 PID 1884 wrote to memory of 2672 1884 mormmg.exe 30 PID 1884 wrote to memory of 2672 1884 mormmg.exe 30 PID 2672 wrote to memory of 2484 2672 mvokdw.exe 31 PID 2672 wrote to memory of 2484 2672 mvokdw.exe 31 PID 2672 wrote to memory of 2484 2672 mvokdw.exe 31 PID 2672 wrote to memory of 2484 2672 mvokdw.exe 31 PID 2484 wrote to memory of 316 2484 bgmphx.exe 32 PID 2484 wrote to memory of 316 2484 bgmphx.exe 32 PID 2484 wrote to memory of 316 2484 bgmphx.exe 32 PID 2484 wrote to memory of 316 2484 bgmphx.exe 32 PID 316 wrote to memory of 1676 316 iohpbm.exe 33 PID 316 wrote to memory of 1676 316 iohpbm.exe 33 PID 316 wrote to memory of 1676 316 iohpbm.exe 33 PID 316 wrote to memory of 1676 316 iohpbm.exe 33 PID 1676 wrote to memory of 480 1676 duqkek.exe 34 PID 1676 wrote to memory of 480 1676 duqkek.exe 34 PID 1676 wrote to memory of 480 1676 duqkek.exe 34 PID 1676 wrote to memory of 480 1676 duqkek.exe 34 PID 480 wrote to memory of 1744 480 kgwptm.exe 35 PID 480 wrote to memory of 1744 480 kgwptm.exe 35 PID 480 wrote to memory of 1744 480 kgwptm.exe 35 PID 480 wrote to memory of 1744 480 kgwptm.exe 35 PID 1744 wrote to memory of 3016 1744 mmdaid.exe 36 PID 1744 wrote to memory of 3016 1744 mmdaid.exe 36 PID 1744 wrote to memory of 3016 1744 mmdaid.exe 36 PID 1744 wrote to memory of 3016 1744 mmdaid.exe 36 PID 3016 wrote to memory of 1472 3016 zruuwm.exe 37 PID 3016 wrote to memory of 1472 3016 zruuwm.exe 37 PID 3016 wrote to memory of 1472 3016 zruuwm.exe 37 PID 3016 wrote to memory of 1472 3016 zruuwm.exe 37 PID 1472 wrote to memory of 1728 1472 zgsavu.exe 38 PID 1472 wrote to memory of 1728 1472 zgsavu.exe 38 PID 1472 wrote to memory of 1728 1472 zgsavu.exe 38 PID 1472 wrote to memory of 1728 1472 zgsavu.exe 38 PID 1728 wrote to memory of 2960 1728 oaovxq.exe 39 PID 1728 wrote to memory of 2960 1728 oaovxq.exe 39 PID 1728 wrote to memory of 2960 1728 oaovxq.exe 39 PID 1728 wrote to memory of 2960 1728 oaovxq.exe 39 PID 2960 wrote to memory of 648 2960 qkgkpm.exe 40 PID 2960 wrote to memory of 648 2960 qkgkpm.exe 40 PID 2960 wrote to memory of 648 2960 qkgkpm.exe 40 PID 2960 wrote to memory of 648 2960 qkgkpm.exe 40 PID 648 wrote to memory of 2388 648 ibidds.exe 41 PID 648 wrote to memory of 2388 648 ibidds.exe 41 PID 648 wrote to memory of 2388 648 ibidds.exe 41 PID 648 wrote to memory of 2388 648 ibidds.exe 41 PID 2388 wrote to memory of 2980 2388 kthsvo.exe 42 PID 2388 wrote to memory of 2980 2388 kthsvo.exe 42 PID 2388 wrote to memory of 2980 2388 kthsvo.exe 42 PID 2388 wrote to memory of 2980 2388 kthsvo.exe 42 PID 2980 wrote to memory of 2232 2980 ciyxgq.exe 43 PID 2980 wrote to memory of 2232 2980 ciyxgq.exe 43 PID 2980 wrote to memory of 2232 2980 ciyxgq.exe 43 PID 2980 wrote to memory of 2232 2980 ciyxgq.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\nkfhpp.exeC:\Windows\system32\nkfhpp.exe 484 "C:\Users\Admin\AppData\Local\Temp\b6f4f06b306d2ec8bb84f4312b3ead20_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\mormmg.exeC:\Windows\system32\mormmg.exe 492 "C:\Windows\SysWOW64\nkfhpp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\mvokdw.exeC:\Windows\system32\mvokdw.exe 520 "C:\Windows\SysWOW64\mormmg.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\bgmphx.exeC:\Windows\system32\bgmphx.exe 516 "C:\Windows\SysWOW64\mvokdw.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\iohpbm.exeC:\Windows\system32\iohpbm.exe 552 "C:\Windows\SysWOW64\bgmphx.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\duqkek.exeC:\Windows\system32\duqkek.exe 468 "C:\Windows\SysWOW64\iohpbm.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\kgwptm.exeC:\Windows\system32\kgwptm.exe 560 "C:\Windows\SysWOW64\duqkek.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\SysWOW64\mmdaid.exeC:\Windows\system32\mmdaid.exe 544 "C:\Windows\SysWOW64\kgwptm.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\zruuwm.exeC:\Windows\system32\zruuwm.exe 568 "C:\Windows\SysWOW64\mmdaid.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\zgsavu.exeC:\Windows\system32\zgsavu.exe 504 "C:\Windows\SysWOW64\zruuwm.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\oaovxq.exeC:\Windows\system32\oaovxq.exe 576 "C:\Windows\SysWOW64\zgsavu.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\qkgkpm.exeC:\Windows\system32\qkgkpm.exe 564 "C:\Windows\SysWOW64\oaovxq.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\ibidds.exeC:\Windows\system32\ibidds.exe 584 "C:\Windows\SysWOW64\qkgkpm.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\kthsvo.exeC:\Windows\system32\kthsvo.exe 604 "C:\Windows\SysWOW64\ibidds.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\ciyxgq.exeC:\Windows\system32\ciyxgq.exe 592 "C:\Windows\SysWOW64\kthsvo.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\mhkvqo.exeC:\Windows\system32\mhkvqo.exe 616 "C:\Windows\SysWOW64\ciyxgq.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\zffxzp.exeC:\Windows\system32\zffxzp.exe 588 "C:\Windows\SysWOW64\mhkvqo.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Windows\SysWOW64\mwaahx.exeC:\Windows\system32\mwaahx.exe 612 "C:\Windows\SysWOW64\zffxzp.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1004 -
C:\Windows\SysWOW64\zmddyf.exeC:\Windows\system32\zmddyf.exe 596 "C:\Windows\SysWOW64\mwaahx.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Windows\SysWOW64\huqvku.exeC:\Windows\system32\huqvku.exe 632 "C:\Windows\SysWOW64\zmddyf.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\wkcdre.exeC:\Windows\system32\wkcdre.exe 600 "C:\Windows\SysWOW64\huqvku.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2220 -
C:\Windows\SysWOW64\gjoabd.exeC:\Windows\system32\gjoabd.exe 628 "C:\Windows\SysWOW64\wkcdre.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\SysWOW64\rqsyuc.exeC:\Windows\system32\rqsyuc.exe 608 "C:\Windows\SysWOW64\gjoabd.exe"24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\bpedea.exeC:\Windows\system32\bpedea.exe 648 "C:\Windows\SysWOW64\rqsyuc.exe"25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\njklpn.exeC:\Windows\system32\njklpn.exe 624 "C:\Windows\SysWOW64\bpedea.exe"26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\aifoyn.exeC:\Windows\system32\aifoyn.exe 652 "C:\Windows\SysWOW64\njklpn.exe"27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Windows\SysWOW64\kwglwu.exeC:\Windows\system32\kwglwu.exe 620 "C:\Windows\SysWOW64\aifoyn.exe"28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1120 -
C:\Windows\SysWOW64\uvkigt.exeC:\Windows\system32\uvkigt.exe 656 "C:\Windows\SysWOW64\kwglwu.exe"29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:700 -
C:\Windows\SysWOW64\kzsdkg.exeC:\Windows\system32\kzsdkg.exe 644 "C:\Windows\SysWOW64\uvkigt.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\mkhoyc.exeC:\Windows\system32\mkhoyc.exe 640 "C:\Windows\SysWOW64\kzsdkg.exe"31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Windows\SysWOW64\zendjo.exeC:\Windows\system32\zendjo.exe 636 "C:\Windows\SysWOW64\mkhoyc.exe"32⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\mzftps.exeC:\Windows\system32\mzftps.exe 684 "C:\Windows\SysWOW64\zendjo.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2380 -
C:\Windows\SysWOW64\vfxinz.exeC:\Windows\system32\vfxinz.exe 664 "C:\Windows\SysWOW64\mzftps.exe"34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\jspgtv.exeC:\Windows\system32\jspgtv.exe 676 "C:\Windows\SysWOW64\vfxinz.exe"35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2700 -
C:\Windows\SysWOW64\vuvoei.exeC:\Windows\system32\vuvoei.exe 680 "C:\Windows\SysWOW64\jspgtv.exe"36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\fthlpg.exeC:\Windows\system32\fthlpg.exe 668 "C:\Windows\SysWOW64\vuvoei.exe"37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2600 -
C:\Windows\SysWOW64\srcoxp.exeC:\Windows\system32\srcoxp.exe 672 "C:\Windows\SysWOW64\fthlpg.exe"38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\curysk.exeC:\Windows\system32\curysk.exe 692 "C:\Windows\SysWOW64\srcoxp.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\pwxoew.exeC:\Windows\system32\pwxoew.exe 688 "C:\Windows\SysWOW64\curysk.exe"40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\zvklov.exeC:\Windows\system32\zvklov.exe 700 "C:\Windows\SysWOW64\pwxoew.exe"41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\SysWOW64\mitbuz.exeC:\Windows\system32\mitbuz.exe 696 "C:\Windows\SysWOW64\zvklov.exe"42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\zkzrnd.exeC:\Windows\system32\zkzrnd.exe 716 "C:\Windows\SysWOW64\mitbuz.exe"43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\mbcuwl.exeC:\Windows\system32\mbcuwl.exe 660 "C:\Windows\SysWOW64\zkzrnd.exe"44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1080 -
C:\Windows\SysWOW64\wlrejp.exeC:\Windows\system32\wlrejp.exe 712 "C:\Windows\SysWOW64\mbcuwl.exe"45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\inxmvt.exeC:\Windows\system32\inxmvt.exe 704 "C:\Windows\SysWOW64\wlrejp.exe"46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\vesodb.exeC:\Windows\system32\vesodb.exe 728 "C:\Windows\SysWOW64\inxmvt.exe"47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Windows\SysWOW64\iunrmj.exeC:\Windows\system32\iunrmj.exe 708 "C:\Windows\SysWOW64\vesodb.exe"48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\sfkbhm.exeC:\Windows\system32\sfkbhm.exe 736 "C:\Windows\SysWOW64\iunrmj.exe"49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Windows\SysWOW64\ijlwls.exeC:\Windows\system32\ijlwls.exe 720 "C:\Windows\SysWOW64\sfkbhm.exe"50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:800 -
C:\Windows\SysWOW64\sipuwq.exeC:\Windows\system32\sipuwq.exe 740 "C:\Windows\SysWOW64\ijlwls.exe"51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\fkdjhd.exeC:\Windows\system32\fkdjhd.exe 732 "C:\Windows\SysWOW64\sipuwq.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\pvsuug.exeC:\Windows\system32\pvsuug.exe 752 "C:\Windows\SysWOW64\fkdjhd.exe"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Windows\SysWOW64\clnwlg.exeC:\Windows\system32\clnwlg.exe 744 "C:\Windows\SysWOW64\pvsuug.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\ocizto.exeC:\Windows\system32\ocizto.exe 764 "C:\Windows\SysWOW64\clnwlg.exe"55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\balccx.exeC:\Windows\system32\balccx.exe 724 "C:\Windows\SysWOW64\ocizto.exe"56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\ldamps.exeC:\Windows\system32\ldamps.exe 756 "C:\Windows\SysWOW64\balccx.exe"57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\ybvhya.exeC:\Windows\system32\ybvhya.exe 748 "C:\Windows\SysWOW64\ldamps.exe"58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:940 -
C:\Windows\SysWOW64\lvbxjm.exeC:\Windows\system32\lvbxjm.exe 772 "C:\Windows\SysWOW64\ybvhya.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Windows\SysWOW64\vdnucl.exeC:\Windows\system32\vdnucl.exe 760 "C:\Windows\SysWOW64\lvbxjm.exe"60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Windows\SysWOW64\itixkl.exeC:\Windows\system32\itixkl.exe 784 "C:\Windows\SysWOW64\vdnucl.exe"61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\vvomwy.exeC:\Windows\system32\vvomwy.exe 768 "C:\Windows\SysWOW64\itixkl.exe"62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\fuskgx.exeC:\Windows\system32\fuskgx.exe 788 "C:\Windows\SysWOW64\vvomwy.exe"63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\slvmpf.exeC:\Windows\system32\slvmpf.exe 776 "C:\Windows\SysWOW64\fuskgx.exe"64⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\fjqpxf.exeC:\Windows\system32\fjqpxf.exe 800 "C:\Windows\SysWOW64\slvmpf.exe"65⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\rdwfrr.exeC:\Windows\system32\rdwfrr.exe 792 "C:\Windows\SysWOW64\fjqpxf.exe"66⤵PID:2628
-
C:\Windows\SysWOW64\bolhev.exeC:\Windows\system32\bolhev.exe 796 "C:\Windows\SysWOW64\rdwfrr.exe"67⤵PID:884
-
C:\Windows\SysWOW64\oeoknv.exeC:\Windows\system32\oeoknv.exe 812 "C:\Windows\SysWOW64\bolhev.exe"68⤵PID:872
-
C:\Windows\SysWOW64\ypduay.exeC:\Windows\system32\ypduay.exe 820 "C:\Windows\SysWOW64\oeoknv.exe"69⤵PID:2772
-
C:\Windows\SysWOW64\otepel.exeC:\Windows\system32\otepel.exe 804 "C:\Windows\SysWOW64\ypduay.exe"70⤵PID:2848
-
C:\Windows\SysWOW64\yetazo.exeC:\Windows\system32\yetazo.exe 824 "C:\Windows\SysWOW64\otepel.exe"71⤵PID:1608
-
C:\Windows\SysWOW64\luwcio.exeC:\Windows\system32\luwcio.exe 780 "C:\Windows\SysWOW64\yetazo.exe"72⤵PID:1300
-
C:\Windows\SysWOW64\ylrfqw.exeC:\Windows\system32\ylrfqw.exe 828 "C:\Windows\SysWOW64\luwcio.exe"73⤵PID:2944
-
C:\Windows\SysWOW64\knxvcj.exeC:\Windows\system32\knxvcj.exe 808 "C:\Windows\SysWOW64\ylrfqw.exe"74⤵PID:2136
-
C:\Windows\SysWOW64\umjsmi.exeC:\Windows\system32\umjsmi.exe 832 "C:\Windows\SysWOW64\knxvcj.exe"75⤵PID:2176
-
C:\Windows\SysWOW64\hopixm.exeC:\Windows\system32\hopixm.exe 816 "C:\Windows\SysWOW64\umjsmi.exe"76⤵PID:2584
-
C:\Windows\SysWOW64\ryektp.exeC:\Windows\system32\ryektp.exe 844 "C:\Windows\SysWOW64\hopixm.exe"77⤵
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\hdefxv.exeC:\Windows\system32\hdefxv.exe 836 "C:\Windows\SysWOW64\ryektp.exe"78⤵PID:1968
-
C:\Windows\SysWOW64\uthifd.exeC:\Windows\system32\uthifd.exe 856 "C:\Windows\SysWOW64\hdefxv.exe"79⤵PID:2624
-
C:\Windows\SysWOW64\vhifvk.exeC:\Windows\system32\vhifvk.exe 852 "C:\Windows\SysWOW64\uthifd.exe"80⤵PID:352
-
C:\Windows\SysWOW64\iydies.exeC:\Windows\system32\iydies.exe 864 "C:\Windows\SysWOW64\vhifvk.exe"81⤵
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\vtmyko.exeC:\Windows\system32\vtmyko.exe 840 "C:\Windows\SysWOW64\iydies.exe"82⤵PID:3056
-
C:\Windows\SysWOW64\fwkifr.exeC:\Windows\system32\fwkifr.exe 868 "C:\Windows\SysWOW64\vtmyko.exe"83⤵PID:2872
-
C:\Windows\SysWOW64\sueloz.exeC:\Windows\system32\sueloz.exe 848 "C:\Windows\SysWOW64\fwkifr.exe"84⤵PID:2908
-
C:\Windows\SysWOW64\ctiiyy.exeC:\Windows\system32\ctiiyy.exe 876 "C:\Windows\SysWOW64\sueloz.exe"85⤵PID:3004
-
C:\Windows\SysWOW64\pnpyjd.exeC:\Windows\system32\pnpyjd.exe 860 "C:\Windows\SysWOW64\ctiiyy.exe"86⤵PID:2080
-
C:\Windows\SysWOW64\cmrbsl.exeC:\Windows\system32\cmrbsl.exe 888 "C:\Windows\SysWOW64\pnpyjd.exe"87⤵PID:604
-
C:\Windows\SysWOW64\pcmdjt.exeC:\Windows\system32\pcmdjt.exe 872 "C:\Windows\SysWOW64\cmrbsl.exe"88⤵PID:2008
-
C:\Windows\SysWOW64\zbybts.exeC:\Windows\system32\zbybts.exe 884 "C:\Windows\SysWOW64\pcmdjt.exe"89⤵
- Drops file in System32 directory
PID:2564 -
C:\Windows\SysWOW64\mdeiew.exeC:\Windows\system32\mdeiew.exe 892 "C:\Windows\SysWOW64\zbybts.exe"90⤵
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\woutsz.exeC:\Windows\system32\woutsz.exe 904 "C:\Windows\SysWOW64\mdeiew.exe"91⤵
- Drops file in System32 directory
PID:1952 -
C:\Windows\SysWOW64\jepvai.exeC:\Windows\system32\jepvai.exe 880 "C:\Windows\SysWOW64\woutsz.exe"92⤵PID:3036
-
C:\Windows\SysWOW64\vvjyrq.exeC:\Windows\system32\vvjyrq.exe 912 "C:\Windows\SysWOW64\jepvai.exe"93⤵PID:2576
-
C:\Windows\SysWOW64\ffhiel.exeC:\Windows\system32\ffhiel.exe 896 "C:\Windows\SysWOW64\vvjyrq.exe"94⤵PID:2784
-
C:\Windows\SysWOW64\swclnt.exeC:\Windows\system32\swclnt.exe 908 "C:\Windows\SysWOW64\ffhiel.exe"95⤵PID:2856
-
C:\Windows\SysWOW64\fuwovb.exeC:\Windows\system32\fuwovb.exe 900 "C:\Windows\SysWOW64\swclnt.exe"96⤵PID:2496
-
C:\Windows\SysWOW64\pxmyqe.exeC:\Windows\system32\pxmyqe.exe 924 "C:\Windows\SysWOW64\fuwovb.exe"97⤵PID:1708
-
C:\Windows\SysWOW64\czsocj.exeC:\Windows\system32\czsocj.exe 920 "C:\Windows\SysWOW64\pxmyqe.exe"98⤵PID:2888
-
C:\Windows\SysWOW64\pmjein.exeC:\Windows\system32\pmjein.exe 944 "C:\Windows\SysWOW64\czsocj.exe"99⤵PID:1232
-
C:\Windows\SysWOW64\copltz.exeC:\Windows\system32\copltz.exe 916 "C:\Windows\SysWOW64\pmjein.exe"100⤵PID:888
-
C:\Windows\SysWOW64\lrfwgu.exeC:\Windows\system32\lrfwgu.exe 932 "C:\Windows\SysWOW64\copltz.exe"101⤵PID:2404
-
C:\Windows\SysWOW64\bdnrkh.exeC:\Windows\system32\bdnrkh.exe 940 "C:\Windows\SysWOW64\lrfwgu.exe"102⤵PID:2536
-
C:\Windows\SysWOW64\mcrovg.exeC:\Windows\system32\mcrovg.exe 948 "C:\Windows\SysWOW64\bdnrkh.exe"103⤵PID:844
-
C:\Windows\SysWOW64\ywxeol.exeC:\Windows\system32\ywxeol.exe 936 "C:\Windows\SysWOW64\mcrovg.exe"104⤵PID:2344
-
C:\Windows\SysWOW64\ihnobo.exeC:\Windows\system32\ihnobo.exe 960 "C:\Windows\SysWOW64\ywxeol.exe"105⤵PID:2668
-
C:\Windows\SysWOW64\vxprkw.exeC:\Windows\system32\vxprkw.exe 952 "C:\Windows\SysWOW64\ihnobo.exe"106⤵PID:3024
-
C:\Windows\SysWOW64\iwktte.exeC:\Windows\system32\iwktte.exe 964 "C:\Windows\SysWOW64\vxprkw.exe"107⤵PID:1268
-
C:\Windows\SysWOW64\vmfwbe.exeC:\Windows\system32\vmfwbe.exe 928 "C:\Windows\SysWOW64\iwktte.exe"108⤵PID:2732
-
C:\Windows\SysWOW64\flruud.exeC:\Windows\system32\flruud.exe 980 "C:\Windows\SysWOW64\vmfwbe.exe"109⤵PID:1928
-
C:\Windows\SysWOW64\snxjfq.exeC:\Windows\system32\snxjfq.exe 956 "C:\Windows\SysWOW64\flruud.exe"110⤵PID:2216
-
C:\Windows\SysWOW64\cynust.exeC:\Windows\system32\cynust.exe 996 "C:\Windows\SysWOW64\snxjfq.exe"111⤵
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\ostbex.exeC:\Windows\system32\ostbex.exe 968 "C:\Windows\SysWOW64\cynust.exe"112⤵PID:1948
-
C:\Windows\SysWOW64\bfkrjb.exeC:\Windows\system32\bfkrjb.exe 976 "C:\Windows\SysWOW64\ostbex.exe"113⤵PID:2720
-
C:\Windows\SysWOW64\ohqhvo.exeC:\Windows\system32\ohqhvo.exe 972 "C:\Windows\SysWOW64\bfkrjb.exe"114⤵PID:756
-
C:\Windows\SysWOW64\yguenm.exeC:\Windows\system32\yguenm.exe 992 "C:\Windows\SysWOW64\ohqhvo.exe"115⤵PID:2656
-
C:\Windows\SysWOW64\lephwm.exeC:\Windows\system32\lephwm.exe 1000 "C:\Windows\SysWOW64\yguenm.exe"116⤵PID:2568
-
C:\Windows\SysWOW64\yvskfv.exeC:\Windows\system32\yvskfv.exe 1008 "C:\Windows\SysWOW64\lephwm.exe"117⤵PID:2556
-
C:\Windows\SysWOW64\ijthvc.exeC:\Windows\system32\ijthvc.exe 984 "C:\Windows\SysWOW64\yvskfv.exe"118⤵PID:2516
-
C:\Windows\SysWOW64\vwcxag.exeC:\Windows\system32\vwcxag.exe 1012 "C:\Windows\SysWOW64\ijthvc.exe"119⤵PID:1616
-
C:\Windows\SysWOW64\hyimuk.exeC:\Windows\system32\hyimuk.exe 988 "C:\Windows\SysWOW64\vwcxag.exe"120⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\sxukej.exeC:\Windows\system32\sxukej.exe 1020 "C:\Windows\SysWOW64\hyimuk.exe"121⤵PID:1520
-
C:\Windows\SysWOW64\ezarqw.exeC:\Windows\system32\ezarqw.exe 1032 "C:\Windows\SysWOW64\sxukej.exe"122⤵PID:1076
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-