Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
bb9ae401043baf15102114ad16810608_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bb9ae401043baf15102114ad16810608_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bb9ae401043baf15102114ad16810608_JaffaCakes118.exe
-
Size
520KB
-
MD5
bb9ae401043baf15102114ad16810608
-
SHA1
dc54e0b495311d9f2ddbafbd0b6a1c18d6f4cd1e
-
SHA256
d24992afc3cb999cae226e4f6423c4677dd937fa8962ef1864f7997d76b4c21e
-
SHA512
a1054e28dba383576b18b71918789a5c445f83421417942635db5fc76263c843772c0be35f61c77b40cbcfbf36290f0539b50ad758b98f30fbee7fd8423f741b
-
SSDEEP
12288:+zXIjV1NCiDkj9YRX8bf8ziGd+P+pwemG:SIjVfDkZ1f8ziGd+uweB
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2128 khjlqmla.exe 1168 zhcygitn.exe 2148 kogvqhan.exe 2732 ofjyzpyu.exe 2668 cstwfteh.exe 2700 gixjbzik.exe 1160 ytlbiwqi.exe 2424 gxnospty.exe 1712 tzbeduxi.exe 1940 dcroyxek.exe 2844 qpaeebkp.exe 604 xihjtvtb.exe 2304 hhlgmtab.exe 1444 uucwrxzo.exe 2908 hzmzggks.exe 1252 ryywqfkr.exe 704 elhmwjre.exe 1448 owfwrmxy.exe 888 bnazaucf.exe 3000 olubiuan.exe 1624 xrvrycnj.exe 2088 kqquhkty.exe 2132 xgtwqkyf.exe 2720 kfozgswn.exe 2708 uhdjtvkh.exe 2856 hggmcdio.exe 2852 uwapldnd.exe 2644 hnvrtmtk.exe 1540 qbwprtgh.exe 3028 dzrjatdo.exe 1808 qqumibjv.exe 2484 dgoprkoc.exe 1268 qfjsakuk.exe 2992 atkpqrzg.exe 2256 ngbfdvgt.exe 2472 awwhmdda.exe 1828 jkxfcdrx.exe 1148 wbshllwe.exe 1416 jzukttul.exe 1720 tckmpwin.exe 2452 gbfpxwgu.exe 1420 trhsgelb.exe 2244 gicuonrj.exe 2296 tgxxxnwq.exe 2232 cuyvnubm.exe 2476 plsxechb.exe 1668 cbvamcmj.exe 2712 paqdvlsq.exe 1520 zcfnioyk.exe 2892 mbiirwer.exe 2504 zrdkzwbg.exe 2772 eqynieho.exe 2488 rgbqymmv.exe 1984 autnpuar.exe 2748 nlwqxuxy.exe 2568 ajrtgcdg.exe 840 namvokin.exe 2640 xcjgkfpp.exe 1768 kbeasouw.exe 1952 udtlfraq.exe 1204 hconozgx.exe 960 usrqxzen.exe 2404 grmtfhju.exe 1396 thhvwppb.exe -
Loads dropped DLL 64 IoCs
pid Process 2500 bb9ae401043baf15102114ad16810608_JaffaCakes118.exe 2500 bb9ae401043baf15102114ad16810608_JaffaCakes118.exe 2128 khjlqmla.exe 2128 khjlqmla.exe 1168 zhcygitn.exe 1168 zhcygitn.exe 2148 kogvqhan.exe 2148 kogvqhan.exe 2732 ofjyzpyu.exe 2732 ofjyzpyu.exe 2668 cstwfteh.exe 2668 cstwfteh.exe 2700 gixjbzik.exe 2700 gixjbzik.exe 1160 ytlbiwqi.exe 1160 ytlbiwqi.exe 2424 gxnospty.exe 2424 gxnospty.exe 1712 tzbeduxi.exe 1712 tzbeduxi.exe 1940 dcroyxek.exe 1940 dcroyxek.exe 2844 qpaeebkp.exe 2844 qpaeebkp.exe 604 xihjtvtb.exe 604 xihjtvtb.exe 2304 hhlgmtab.exe 2304 hhlgmtab.exe 1444 uucwrxzo.exe 1444 uucwrxzo.exe 2908 hzmzggks.exe 2908 hzmzggks.exe 1252 ryywqfkr.exe 1252 ryywqfkr.exe 704 elhmwjre.exe 704 elhmwjre.exe 1448 owfwrmxy.exe 1448 owfwrmxy.exe 888 bnazaucf.exe 888 bnazaucf.exe 3000 olubiuan.exe 3000 olubiuan.exe 1624 xrvrycnj.exe 1624 xrvrycnj.exe 2088 kqquhkty.exe 2088 kqquhkty.exe 2132 xgtwqkyf.exe 2132 xgtwqkyf.exe 2720 kfozgswn.exe 2720 kfozgswn.exe 2708 uhdjtvkh.exe 2708 uhdjtvkh.exe 2856 hggmcdio.exe 2856 hggmcdio.exe 2852 uwapldnd.exe 2852 uwapldnd.exe 2644 hnvrtmtk.exe 2644 hnvrtmtk.exe 1540 qbwprtgh.exe 1540 qbwprtgh.exe 3028 dzrjatdo.exe 3028 dzrjatdo.exe 1808 qqumibjv.exe 1808 qqumibjv.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\iyjehvgk.exe zkihivtn.exe File opened for modification C:\Windows\SysWOW64\roosbkpl.exe eytpscje.exe File created C:\Windows\SysWOW64\bglpqpwa.exe opimhhqs.exe File opened for modification C:\Windows\SysWOW64\xpusfvuo.exe kyzpwnxh.exe File created C:\Windows\SysWOW64\zdbfnfhh.exe mngdfxcz.exe File created C:\Windows\SysWOW64\elhmwjre.exe ryywqfkr.exe File opened for modification C:\Windows\SysWOW64\oesztkzp.exe eudoyhlv.exe File opened for modification C:\Windows\SysWOW64\bhkgeqyf.exe orqevqty.exe File opened for modification C:\Windows\SysWOW64\xawmnfra.exe oleppged.exe File opened for modification C:\Windows\SysWOW64\jtxhogcq.exe wdcefywj.exe File created C:\Windows\SysWOW64\gnqmmexq.exe whppwxku.exe File created C:\Windows\SysWOW64\rmbwtbqw.exe drkgnxjj.exe File opened for modification C:\Windows\SysWOW64\rprvejos.exe eywtvjil.exe File created C:\Windows\SysWOW64\niynvyse.exe ardknqnx.exe File opened for modification C:\Windows\SysWOW64\vzkmvvzm.exe iiijmnuf.exe File opened for modification C:\Windows\SysWOW64\kbpxgrar.exe xcuvpjuk.exe File opened for modification C:\Windows\SysWOW64\erszbqkd.exe rtywtimv.exe File created C:\Windows\SysWOW64\hdibnsgg.exe uefgejar.exe File opened for modification C:\Windows\SysWOW64\fkuakbwd.exe tlsxbtqw.exe File created C:\Windows\SysWOW64\hxrrubai.exe ugwoltub.exe File opened for modification C:\Windows\SysWOW64\fazjfpox.exe sbwgwhiq.exe File opened for modification C:\Windows\SysWOW64\nqefzxoy.exe aajcqxqr.exe File opened for modification C:\Windows\SysWOW64\enmymrlz.exe rprvejos.exe File opened for modification C:\Windows\SysWOW64\thhvwppb.exe grmtfhju.exe File created C:\Windows\SysWOW64\lzvuicns.exe bxfkvzhy.exe File created C:\Windows\SysWOW64\ozvlqzyn.exe bibiizsg.exe File created C:\Windows\SysWOW64\iaodbqjs.exe vjtathdl.exe File created C:\Windows\SysWOW64\xrvrycnj.exe olubiuan.exe File opened for modification C:\Windows\SysWOW64\dbaebhuz.exe qlxblhps.exe File created C:\Windows\SysWOW64\vjjcoipz.exe ldifqbbd.exe File created C:\Windows\SysWOW64\ifdvxlnt.exe voispdhl.exe File created C:\Windows\SysWOW64\jbrstwow.exe wlwqloip.exe File opened for modification C:\Windows\SysWOW64\mkiuvtzp.exe zmnsntti.exe File opened for modification C:\Windows\SysWOW64\ozbyaukv.exe elbjkmwz.exe File created C:\Windows\SysWOW64\kshjwtna.exe aegmymze.exe File opened for modification C:\Windows\SysWOW64\naejyigy.exe ajjhhaar.exe File created C:\Windows\SysWOW64\xvjimszz.exe kfogwkuk.exe File created C:\Windows\SysWOW64\ujuwvxxl.exe hsrumpae.exe File created C:\Windows\SysWOW64\qoapmhed.exe dtizhlfy.exe File opened for modification C:\Windows\SysWOW64\tjihujwm.exe gtgfmbrf.exe File created C:\Windows\SysWOW64\cstwfteh.exe ofjyzpyu.exe File created C:\Windows\SysWOW64\uucwrxzo.exe hhlgmtab.exe File opened for modification C:\Windows\SysWOW64\elhmwjre.exe ryywqfkr.exe File created C:\Windows\SysWOW64\mifqbgzk.exe zkdnsgtd.exe File opened for modification C:\Windows\SysWOW64\wpideitp.exe jynawzoi.exe File created C:\Windows\SysWOW64\qjvdolns.exe dtsbfdhk.exe File created C:\Windows\SysWOW64\odpjpxxb.exe ceuggpzu.exe File created C:\Windows\SysWOW64\lkjrxjtx.exe ytoopani.exe File opened for modification C:\Windows\SysWOW64\aoqwyofl.exe nxvupoae.exe File created C:\Windows\SysWOW64\jrpzneww.exe wsuxfdqp.exe File opened for modification C:\Windows\SysWOW64\vzlnxvep.exe llkqhnrt.exe File opened for modification C:\Windows\SysWOW64\jrpzneww.exe wsuxfdqp.exe File created C:\Windows\SysWOW64\owfwrmxy.exe elhmwjre.exe File opened for modification C:\Windows\SysWOW64\gicuonrj.exe trhsgelb.exe File created C:\Windows\SysWOW64\tgxxxnwq.exe gicuonrj.exe File opened for modification C:\Windows\SysWOW64\oilcgnkc.exe bkjzxfnu.exe File created C:\Windows\SysWOW64\uovwsudp.exe hystkuxz.exe File opened for modification C:\Windows\SysWOW64\xlnrqxws.exe kusohwzd.exe File created C:\Windows\SysWOW64\hfnfauos.exe xrmikvbw.exe File created C:\Windows\SysWOW64\wssjwghf.exe jtxhogcq.exe File opened for modification C:\Windows\SysWOW64\zqauvkhl.exe mrfsmjce.exe File opened for modification C:\Windows\SysWOW64\pbsgicuj.exe fnrrsvhm.exe File created C:\Windows\SysWOW64\pflvzrmo.exe coqsrjgh.exe File opened for modification C:\Windows\SysWOW64\wanactcv.exe jclytlxo.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpusfvuo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwylzotw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlwimlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zynptnfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktvtacok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fargahhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhlgmtab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rdilpyno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language puvvhios.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ukjzcsim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntiieqhq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbflddau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkfydffm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abeppbey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aegmymze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhudpksy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fejvixtw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sizjkeyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language juekiver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rzqnbcdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uwpijcla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpqozhdu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jmokeemb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggmlsdyi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qpnrazbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnvrtmtk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meqzjfks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkdnsgtd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dkrktkeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjhluwmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlnrqxws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bglpqpwa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljpexukg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ryyechwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxudlddh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stdddpet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yfncitww.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkngdnwy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kegojllw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfogjtqn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxajwkve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uaealzsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odpjpxxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mifqbgzk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldifqbbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oilcgnkc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language codvhsfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sbpdklok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdoxizje.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iyjehvgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzgeonqj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htwyoawl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oordzcnk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcfobqxe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utdewsdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxvvswcz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fazjfpox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sspqthel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mjmiyjoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhzycwgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frdpuvlt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ywwwpdtk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbdxebex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nrksijag.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2128 2500 bb9ae401043baf15102114ad16810608_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2128 2500 bb9ae401043baf15102114ad16810608_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2128 2500 bb9ae401043baf15102114ad16810608_JaffaCakes118.exe 30 PID 2500 wrote to memory of 2128 2500 bb9ae401043baf15102114ad16810608_JaffaCakes118.exe 30 PID 2128 wrote to memory of 1168 2128 khjlqmla.exe 31 PID 2128 wrote to memory of 1168 2128 khjlqmla.exe 31 PID 2128 wrote to memory of 1168 2128 khjlqmla.exe 31 PID 2128 wrote to memory of 1168 2128 khjlqmla.exe 31 PID 1168 wrote to memory of 2148 1168 zhcygitn.exe 32 PID 1168 wrote to memory of 2148 1168 zhcygitn.exe 32 PID 1168 wrote to memory of 2148 1168 zhcygitn.exe 32 PID 1168 wrote to memory of 2148 1168 zhcygitn.exe 32 PID 2148 wrote to memory of 2732 2148 kogvqhan.exe 33 PID 2148 wrote to memory of 2732 2148 kogvqhan.exe 33 PID 2148 wrote to memory of 2732 2148 kogvqhan.exe 33 PID 2148 wrote to memory of 2732 2148 kogvqhan.exe 33 PID 2732 wrote to memory of 2668 2732 ofjyzpyu.exe 34 PID 2732 wrote to memory of 2668 2732 ofjyzpyu.exe 34 PID 2732 wrote to memory of 2668 2732 ofjyzpyu.exe 34 PID 2732 wrote to memory of 2668 2732 ofjyzpyu.exe 34 PID 2668 wrote to memory of 2700 2668 cstwfteh.exe 35 PID 2668 wrote to memory of 2700 2668 cstwfteh.exe 35 PID 2668 wrote to memory of 2700 2668 cstwfteh.exe 35 PID 2668 wrote to memory of 2700 2668 cstwfteh.exe 35 PID 2700 wrote to memory of 1160 2700 gixjbzik.exe 36 PID 2700 wrote to memory of 1160 2700 gixjbzik.exe 36 PID 2700 wrote to memory of 1160 2700 gixjbzik.exe 36 PID 2700 wrote to memory of 1160 2700 gixjbzik.exe 36 PID 1160 wrote to memory of 2424 1160 ytlbiwqi.exe 37 PID 1160 wrote to memory of 2424 1160 ytlbiwqi.exe 37 PID 1160 wrote to memory of 2424 1160 ytlbiwqi.exe 37 PID 1160 wrote to memory of 2424 1160 ytlbiwqi.exe 37 PID 2424 wrote to memory of 1712 2424 gxnospty.exe 38 PID 2424 wrote to memory of 1712 2424 gxnospty.exe 38 PID 2424 wrote to memory of 1712 2424 gxnospty.exe 38 PID 2424 wrote to memory of 1712 2424 gxnospty.exe 38 PID 1712 wrote to memory of 1940 1712 tzbeduxi.exe 39 PID 1712 wrote to memory of 1940 1712 tzbeduxi.exe 39 PID 1712 wrote to memory of 1940 1712 tzbeduxi.exe 39 PID 1712 wrote to memory of 1940 1712 tzbeduxi.exe 39 PID 1940 wrote to memory of 2844 1940 dcroyxek.exe 40 PID 1940 wrote to memory of 2844 1940 dcroyxek.exe 40 PID 1940 wrote to memory of 2844 1940 dcroyxek.exe 40 PID 1940 wrote to memory of 2844 1940 dcroyxek.exe 40 PID 2844 wrote to memory of 604 2844 qpaeebkp.exe 41 PID 2844 wrote to memory of 604 2844 qpaeebkp.exe 41 PID 2844 wrote to memory of 604 2844 qpaeebkp.exe 41 PID 2844 wrote to memory of 604 2844 qpaeebkp.exe 41 PID 604 wrote to memory of 2304 604 xihjtvtb.exe 42 PID 604 wrote to memory of 2304 604 xihjtvtb.exe 42 PID 604 wrote to memory of 2304 604 xihjtvtb.exe 42 PID 604 wrote to memory of 2304 604 xihjtvtb.exe 42 PID 2304 wrote to memory of 1444 2304 hhlgmtab.exe 43 PID 2304 wrote to memory of 1444 2304 hhlgmtab.exe 43 PID 2304 wrote to memory of 1444 2304 hhlgmtab.exe 43 PID 2304 wrote to memory of 1444 2304 hhlgmtab.exe 43 PID 1444 wrote to memory of 2908 1444 uucwrxzo.exe 44 PID 1444 wrote to memory of 2908 1444 uucwrxzo.exe 44 PID 1444 wrote to memory of 2908 1444 uucwrxzo.exe 44 PID 1444 wrote to memory of 2908 1444 uucwrxzo.exe 44 PID 2908 wrote to memory of 1252 2908 hzmzggks.exe 45 PID 2908 wrote to memory of 1252 2908 hzmzggks.exe 45 PID 2908 wrote to memory of 1252 2908 hzmzggks.exe 45 PID 2908 wrote to memory of 1252 2908 hzmzggks.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb9ae401043baf15102114ad16810608_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bb9ae401043baf15102114ad16810608_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\khjlqmla.exeC:\Windows\system32\khjlqmla.exe 468 "C:\Users\Admin\AppData\Local\Temp\bb9ae401043baf15102114ad16810608_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\zhcygitn.exeC:\Windows\system32\zhcygitn.exe 548 "C:\Windows\SysWOW64\khjlqmla.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\kogvqhan.exeC:\Windows\system32\kogvqhan.exe 568 "C:\Windows\SysWOW64\zhcygitn.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\ofjyzpyu.exeC:\Windows\system32\ofjyzpyu.exe 552 "C:\Windows\SysWOW64\kogvqhan.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cstwfteh.exeC:\Windows\system32\cstwfteh.exe 572 "C:\Windows\SysWOW64\ofjyzpyu.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\gixjbzik.exeC:\Windows\system32\gixjbzik.exe 556 "C:\Windows\SysWOW64\cstwfteh.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\ytlbiwqi.exeC:\Windows\system32\ytlbiwqi.exe 584 "C:\Windows\SysWOW64\gixjbzik.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\gxnospty.exeC:\Windows\system32\gxnospty.exe 576 "C:\Windows\SysWOW64\ytlbiwqi.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\tzbeduxi.exeC:\Windows\system32\tzbeduxi.exe 580 "C:\Windows\SysWOW64\gxnospty.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\dcroyxek.exeC:\Windows\system32\dcroyxek.exe 560 "C:\Windows\SysWOW64\tzbeduxi.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\qpaeebkp.exeC:\Windows\system32\qpaeebkp.exe 564 "C:\Windows\SysWOW64\dcroyxek.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\xihjtvtb.exeC:\Windows\system32\xihjtvtb.exe 588 "C:\Windows\SysWOW64\qpaeebkp.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\hhlgmtab.exeC:\Windows\system32\hhlgmtab.exe 600 "C:\Windows\SysWOW64\xihjtvtb.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\uucwrxzo.exeC:\Windows\system32\uucwrxzo.exe 592 "C:\Windows\SysWOW64\hhlgmtab.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\hzmzggks.exeC:\Windows\system32\hzmzggks.exe 616 "C:\Windows\SysWOW64\uucwrxzo.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\ryywqfkr.exeC:\Windows\system32\ryywqfkr.exe 604 "C:\Windows\SysWOW64\hzmzggks.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1252 -
C:\Windows\SysWOW64\elhmwjre.exeC:\Windows\system32\elhmwjre.exe 612 "C:\Windows\SysWOW64\ryywqfkr.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:704 -
C:\Windows\SysWOW64\owfwrmxy.exeC:\Windows\system32\owfwrmxy.exe 596 "C:\Windows\SysWOW64\elhmwjre.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448 -
C:\Windows\SysWOW64\bnazaucf.exeC:\Windows\system32\bnazaucf.exe 624 "C:\Windows\SysWOW64\owfwrmxy.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:888 -
C:\Windows\SysWOW64\olubiuan.exeC:\Windows\system32\olubiuan.exe 628 "C:\Windows\SysWOW64\bnazaucf.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3000 -
C:\Windows\SysWOW64\xrvrycnj.exeC:\Windows\system32\xrvrycnj.exe 608 "C:\Windows\SysWOW64\olubiuan.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624 -
C:\Windows\SysWOW64\kqquhkty.exeC:\Windows\system32\kqquhkty.exe 620 "C:\Windows\SysWOW64\xrvrycnj.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088 -
C:\Windows\SysWOW64\xgtwqkyf.exeC:\Windows\system32\xgtwqkyf.exe 632 "C:\Windows\SysWOW64\kqquhkty.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2132 -
C:\Windows\SysWOW64\kfozgswn.exeC:\Windows\system32\kfozgswn.exe 636 "C:\Windows\SysWOW64\xgtwqkyf.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2720 -
C:\Windows\SysWOW64\uhdjtvkh.exeC:\Windows\system32\uhdjtvkh.exe 640 "C:\Windows\SysWOW64\kfozgswn.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2708 -
C:\Windows\SysWOW64\hggmcdio.exeC:\Windows\system32\hggmcdio.exe 644 "C:\Windows\SysWOW64\uhdjtvkh.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856 -
C:\Windows\SysWOW64\uwapldnd.exeC:\Windows\system32\uwapldnd.exe 648 "C:\Windows\SysWOW64\hggmcdio.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Windows\SysWOW64\hnvrtmtk.exeC:\Windows\system32\hnvrtmtk.exe 660 "C:\Windows\SysWOW64\uwapldnd.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\qbwprtgh.exeC:\Windows\system32\qbwprtgh.exe 652 "C:\Windows\SysWOW64\hnvrtmtk.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1540 -
C:\Windows\SysWOW64\dzrjatdo.exeC:\Windows\system32\dzrjatdo.exe 656 "C:\Windows\SysWOW64\qbwprtgh.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3028 -
C:\Windows\SysWOW64\qqumibjv.exeC:\Windows\system32\qqumibjv.exe 668 "C:\Windows\SysWOW64\dzrjatdo.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808 -
C:\Windows\SysWOW64\dgoprkoc.exeC:\Windows\system32\dgoprkoc.exe 664 "C:\Windows\SysWOW64\qqumibjv.exe"33⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\qfjsakuk.exeC:\Windows\system32\qfjsakuk.exe 672 "C:\Windows\SysWOW64\dgoprkoc.exe"34⤵
- Executes dropped EXE
PID:1268 -
C:\Windows\SysWOW64\atkpqrzg.exeC:\Windows\system32\atkpqrzg.exe 684 "C:\Windows\SysWOW64\qfjsakuk.exe"35⤵
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\ngbfdvgt.exeC:\Windows\system32\ngbfdvgt.exe 676 "C:\Windows\SysWOW64\atkpqrzg.exe"36⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\SysWOW64\awwhmdda.exeC:\Windows\system32\awwhmdda.exe 680 "C:\Windows\SysWOW64\ngbfdvgt.exe"37⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\jkxfcdrx.exeC:\Windows\system32\jkxfcdrx.exe 688 "C:\Windows\SysWOW64\awwhmdda.exe"38⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\wbshllwe.exeC:\Windows\system32\wbshllwe.exe 692 "C:\Windows\SysWOW64\jkxfcdrx.exe"39⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\jzukttul.exeC:\Windows\system32\jzukttul.exe 696 "C:\Windows\SysWOW64\wbshllwe.exe"40⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\tckmpwin.exeC:\Windows\system32\tckmpwin.exe 700 "C:\Windows\SysWOW64\jzukttul.exe"41⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\gbfpxwgu.exeC:\Windows\system32\gbfpxwgu.exe 704 "C:\Windows\SysWOW64\tckmpwin.exe"42⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\trhsgelb.exeC:\Windows\system32\trhsgelb.exe 708 "C:\Windows\SysWOW64\gbfpxwgu.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1420 -
C:\Windows\SysWOW64\gicuonrj.exeC:\Windows\system32\gicuonrj.exe 716 "C:\Windows\SysWOW64\trhsgelb.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\tgxxxnwq.exeC:\Windows\system32\tgxxxnwq.exe 724 "C:\Windows\SysWOW64\gicuonrj.exe"45⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\cuyvnubm.exeC:\Windows\system32\cuyvnubm.exe 720 "C:\Windows\SysWOW64\tgxxxnwq.exe"46⤵
- Executes dropped EXE
PID:2232 -
C:\Windows\SysWOW64\plsxechb.exeC:\Windows\system32\plsxechb.exe 728 "C:\Windows\SysWOW64\cuyvnubm.exe"47⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\SysWOW64\cbvamcmj.exeC:\Windows\system32\cbvamcmj.exe 712 "C:\Windows\SysWOW64\plsxechb.exe"48⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\paqdvlsq.exeC:\Windows\system32\paqdvlsq.exe 736 "C:\Windows\SysWOW64\cbvamcmj.exe"49⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\zcfnioyk.exeC:\Windows\system32\zcfnioyk.exe 732 "C:\Windows\SysWOW64\paqdvlsq.exe"50⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\mbiirwer.exeC:\Windows\system32\mbiirwer.exe 756 "C:\Windows\SysWOW64\zcfnioyk.exe"51⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\SysWOW64\zrdkzwbg.exeC:\Windows\system32\zrdkzwbg.exe 740 "C:\Windows\SysWOW64\mbiirwer.exe"52⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\eqynieho.exeC:\Windows\system32\eqynieho.exe 760 "C:\Windows\SysWOW64\zrdkzwbg.exe"53⤵
- Executes dropped EXE
PID:2772 -
C:\Windows\SysWOW64\rgbqymmv.exeC:\Windows\system32\rgbqymmv.exe 748 "C:\Windows\SysWOW64\eqynieho.exe"54⤵
- Executes dropped EXE
PID:2488 -
C:\Windows\SysWOW64\autnpuar.exeC:\Windows\system32\autnpuar.exe 772 "C:\Windows\SysWOW64\rgbqymmv.exe"55⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\nlwqxuxy.exeC:\Windows\system32\nlwqxuxy.exe 744 "C:\Windows\SysWOW64\autnpuar.exe"56⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\ajrtgcdg.exeC:\Windows\system32\ajrtgcdg.exe 752 "C:\Windows\SysWOW64\nlwqxuxy.exe"57⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\namvokin.exeC:\Windows\system32\namvokin.exe 764 "C:\Windows\SysWOW64\ajrtgcdg.exe"58⤵
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\xcjgkfpp.exeC:\Windows\system32\xcjgkfpp.exe 780 "C:\Windows\SysWOW64\namvokin.exe"59⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\kbeasouw.exeC:\Windows\system32\kbeasouw.exe 768 "C:\Windows\SysWOW64\xcjgkfpp.exe"60⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\udtlfraq.exeC:\Windows\system32\udtlfraq.exe 788 "C:\Windows\SysWOW64\kbeasouw.exe"61⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\hconozgx.exeC:\Windows\system32\hconozgx.exe 776 "C:\Windows\SysWOW64\udtlfraq.exe"62⤵
- Executes dropped EXE
PID:1204 -
C:\Windows\SysWOW64\usrqxzen.exeC:\Windows\system32\usrqxzen.exe 796 "C:\Windows\SysWOW64\hconozgx.exe"63⤵
- Executes dropped EXE
PID:960 -
C:\Windows\SysWOW64\grmtfhju.exeC:\Windows\system32\grmtfhju.exe 784 "C:\Windows\SysWOW64\usrqxzen.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2404 -
C:\Windows\SysWOW64\thhvwppb.exeC:\Windows\system32\thhvwppb.exe 804 "C:\Windows\SysWOW64\grmtfhju.exe"65⤵
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\dvhtmpcx.exeC:\Windows\system32\dvhtmpcx.exe 792 "C:\Windows\SysWOW64\thhvwppb.exe"66⤵PID:1848
-
C:\Windows\SysWOW64\qmkwuxzf.exeC:\Windows\system32\qmkwuxzf.exe 816 "C:\Windows\SysWOW64\dvhtmpcx.exe"67⤵PID:1856
-
C:\Windows\SysWOW64\dkfydffm.exeC:\Windows\system32\dkfydffm.exe 800 "C:\Windows\SysWOW64\qmkwuxzf.exe"68⤵
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\qbabmfkt.exeC:\Windows\system32\qbabmfkt.exe 808 "C:\Windows\SysWOW64\dkfydffm.exe"69⤵PID:2344
-
C:\Windows\SysWOW64\drcwunqa.exeC:\Windows\system32\drcwunqa.exe 812 "C:\Windows\SysWOW64\qbabmfkt.exe"70⤵PID:1628
-
C:\Windows\SysWOW64\mgvtsvvf.exeC:\Windows\system32\mgvtsvvf.exe 828 "C:\Windows\SysWOW64\drcwunqa.exe"71⤵PID:2548
-
C:\Windows\SysWOW64\wfhqdudw.exeC:\Windows\system32\wfhqdudw.exe 820 "C:\Windows\SysWOW64\mgvtsvvf.exe"72⤵PID:2768
-
C:\Windows\SysWOW64\kargjybj.exeC:\Windows\system32\kargjybj.exe 824 "C:\Windows\SysWOW64\wfhqdudw.exe"73⤵PID:2888
-
C:\Windows\SysWOW64\xqujryhq.exeC:\Windows\system32\xqujryhq.exe 836 "C:\Windows\SysWOW64\kargjybj.exe"74⤵PID:1256
-
C:\Windows\SysWOW64\gtjtmbns.exeC:\Windows\system32\gtjtmbns.exe 832 "C:\Windows\SysWOW64\xqujryhq.exe"75⤵PID:2584
-
C:\Windows\SysWOW64\trewvjta.exeC:\Windows\system32\trewvjta.exe 840 "C:\Windows\SysWOW64\gtjtmbns.exe"76⤵PID:2124
-
C:\Windows\SysWOW64\gihzeryh.exeC:\Windows\system32\gihzeryh.exe 852 "C:\Windows\SysWOW64\trewvjta.exe"77⤵PID:1688
-
C:\Windows\SysWOW64\qwhwurld.exeC:\Windows\system32\qwhwurld.exe 844 "C:\Windows\SysWOW64\gihzeryh.exe"78⤵PID:1692
-
C:\Windows\SysWOW64\dmczczjk.exeC:\Windows\system32\dmczczjk.exe 848 "C:\Windows\SysWOW64\qwhwurld.exe"79⤵PID:1192
-
C:\Windows\SysWOW64\qlxblhps.exeC:\Windows\system32\qlxblhps.exe 860 "C:\Windows\SysWOW64\dmczczjk.exe"80⤵
- Drops file in System32 directory
PID:1100 -
C:\Windows\SysWOW64\dbaebhuz.exeC:\Windows\system32\dbaebhuz.exe 864 "C:\Windows\SysWOW64\qlxblhps.exe"81⤵PID:788
-
C:\Windows\SysWOW64\qauhkpag.exeC:\Windows\system32\qauhkpag.exe 856 "C:\Windows\SysWOW64\dbaebhuz.exe"82⤵PID:1216
-
C:\Windows\SysWOW64\zgvwaxfd.exeC:\Windows\system32\zgvwaxfd.exe 868 "C:\Windows\SysWOW64\qauhkpag.exe"83⤵PID:1832
-
C:\Windows\SysWOW64\meqzjfks.exeC:\Windows\system32\meqzjfks.exe 872 "C:\Windows\SysWOW64\zgvwaxfd.exe"84⤵
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\zvlbrfqz.exeC:\Windows\system32\zvlbrfqz.exe 888 "C:\Windows\SysWOW64\meqzjfks.exe"85⤵PID:1600
-
C:\Windows\SysWOW64\mtneanvg.exeC:\Windows\system32\mtneanvg.exe 876 "C:\Windows\SysWOW64\zvlbrfqz.exe"86⤵PID:1568
-
C:\Windows\SysWOW64\zkihivtn.exeC:\Windows\system32\zkihivtn.exe 880 "C:\Windows\SysWOW64\mtneanvg.exe"87⤵
- Drops file in System32 directory
PID:2052 -
C:\Windows\SysWOW64\iyjehvgk.exeC:\Windows\system32\iyjehvgk.exe 892 "C:\Windows\SysWOW64\zkihivtn.exe"88⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\wlaumzfx.exeC:\Windows\system32\wlaumzfx.exe 884 "C:\Windows\SysWOW64\iyjehvgk.exe"89⤵PID:996
-
C:\Windows\SysWOW64\jbvxvhke.exeC:\Windows\system32\jbvxvhke.exe 896 "C:\Windows\SysWOW64\wlaumzfx.exe"90⤵PID:2516
-
C:\Windows\SysWOW64\smlhikry.exeC:\Windows\system32\smlhikry.exe 904 "C:\Windows\SysWOW64\jbvxvhke.exe"91⤵PID:2212
-
C:\Windows\SysWOW64\fdfczkwf.exeC:\Windows\system32\fdfczkwf.exe 908 "C:\Windows\SysWOW64\smlhikry.exe"92⤵PID:2080
-
C:\Windows\SysWOW64\sbiehscu.exeC:\Windows\system32\sbiehscu.exe 916 "C:\Windows\SysWOW64\fdfczkwf.exe"93⤵PID:2796
-
C:\Windows\SysWOW64\chjcxahr.exeC:\Windows\system32\chjcxahr.exe 900 "C:\Windows\SysWOW64\sbiehscu.exe"94⤵PID:2736
-
C:\Windows\SysWOW64\pgeegany.exeC:\Windows\system32\pgeegany.exe 920 "C:\Windows\SysWOW64\chjcxahr.exe"95⤵PID:1436
-
C:\Windows\SysWOW64\cwyhpisf.exeC:\Windows\system32\cwyhpisf.exe 912 "C:\Windows\SysWOW64\pgeegany.exe"96⤵PID:2332
-
C:\Windows\SysWOW64\mhorklyz.exeC:\Windows\system32\mhorklyz.exe 928 "C:\Windows\SysWOW64\cwyhpisf.exe"97⤵PID:1880
-
C:\Windows\SysWOW64\zxrusteg.exeC:\Windows\system32\zxrusteg.exe 924 "C:\Windows\SysWOW64\mhorklyz.exe"98⤵PID:2896
-
C:\Windows\SysWOW64\lwlxbtjw.exeC:\Windows\system32\lwlxbtjw.exe 936 "C:\Windows\SysWOW64\zxrusteg.exe"99⤵PID:1300
-
C:\Windows\SysWOW64\ymgakchd.exeC:\Windows\system32\ymgakchd.exe 940 "C:\Windows\SysWOW64\lwlxbtjw.exe"100⤵PID:2072
-
C:\Windows\SysWOW64\ldjcsknk.exeC:\Windows\system32\ldjcsknk.exe 956 "C:\Windows\SysWOW64\ymgakchd.exe"101⤵PID:532
-
C:\Windows\SysWOW64\nrksijag.exeC:\Windows\system32\nrksijag.exe 944 "C:\Windows\SysWOW64\ldjcsknk.exe"102⤵
- System Location Discovery: System Language Discovery
PID:684 -
C:\Windows\SysWOW64\apfuzrfo.exeC:\Windows\system32\apfuzrfo.exe 952 "C:\Windows\SysWOW64\nrksijag.exe"103⤵PID:952
-
C:\Windows\SysWOW64\ngzxhadv.exeC:\Windows\system32\ngzxhadv.exe 948 "C:\Windows\SysWOW64\apfuzrfo.exe"104⤵PID:2920
-
C:\Windows\SysWOW64\xiphvdrx.exeC:\Windows\system32\xiphvdrx.exe 932 "C:\Windows\SysWOW64\ngzxhadv.exe"105⤵PID:2240
-
C:\Windows\SysWOW64\khskddpe.exeC:\Windows\system32\khskddpe.exe 964 "C:\Windows\SysWOW64\xiphvdrx.exe"106⤵PID:1836
-
C:\Windows\SysWOW64\xubajhvj.exeC:\Windows\system32\xubajhvj.exe 960 "C:\Windows\SysWOW64\khskddpe.exe"107⤵PID:2436
-
C:\Windows\SysWOW64\gicxhobf.exeC:\Windows\system32\gicxhobf.exe 968 "C:\Windows\SysWOW64\xubajhvj.exe"108⤵PID:1512
-
C:\Windows\SysWOW64\tyxaqwgv.exeC:\Windows\system32\tyxaqwgv.exe 972 "C:\Windows\SysWOW64\gicxhobf.exe"109⤵PID:1944
-
C:\Windows\SysWOW64\gxzdywmc.exeC:\Windows\system32\gxzdywmc.exe 980 "C:\Windows\SysWOW64\tyxaqwgv.exe"110⤵PID:2196
-
C:\Windows\SysWOW64\tnufhfrj.exeC:\Windows\system32\tnufhfrj.exe 976 "C:\Windows\SysWOW64\gxzdywmc.exe"111⤵PID:2884
-
C:\Windows\SysWOW64\gepaqnpq.exeC:\Windows\system32\gepaqnpq.exe 984 "C:\Windows\SysWOW64\tnufhfrj.exe"112⤵PID:2672
-
C:\Windows\SysWOW64\qpmkdqdk.exeC:\Windows\system32\qpmkdqdk.exe 1000 "C:\Windows\SysWOW64\gepaqnpq.exe"113⤵PID:2728
-
C:\Windows\SysWOW64\dfhntqbz.exeC:\Windows\system32\dfhntqbz.exe 992 "C:\Windows\SysWOW64\qpmkdqdk.exe"114⤵PID:1452
-
C:\Windows\SysWOW64\qecqcygh.exeC:\Windows\system32\qecqcygh.exe 988 "C:\Windows\SysWOW64\dfhntqbz.exe"115⤵PID:2420
-
C:\Windows\SysWOW64\zkdnsgtd.exeC:\Windows\system32\zkdnsgtd.exe 996 "C:\Windows\SysWOW64\qecqcygh.exe"116⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\mifqbgzk.exeC:\Windows\system32\mifqbgzk.exe 1004 "C:\Windows\SysWOW64\zkdnsgtd.exe"117⤵
- System Location Discovery: System Language Discovery
PID:884 -
C:\Windows\SysWOW64\zzasjows.exeC:\Windows\system32\zzasjows.exe 1008 "C:\Windows\SysWOW64\mifqbgzk.exe"118⤵PID:1696
-
C:\Windows\SysWOW64\mxvvswcz.exeC:\Windows\system32\mxvvswcz.exe 1036 "C:\Windows\SysWOW64\zzasjows.exe"119⤵
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Windows\SysWOW64\wakgnzib.exeC:\Windows\system32\wakgnzib.exe 1016 "C:\Windows\SysWOW64\mxvvswcz.exe"120⤵PID:1972
-
C:\Windows\SysWOW64\jynawzoi.exeC:\Windows\system32\jynawzoi.exe 1040 "C:\Windows\SysWOW64\wakgnzib.exe"121⤵
- Drops file in System32 directory
PID:848 -
C:\Windows\SysWOW64\wpideitp.exeC:\Windows\system32\wpideitp.exe 1012 "C:\Windows\SysWOW64\jynawzoi.exe"122⤵PID:2912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-