Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/12/2024, 03:49
Behavioral task
behavioral1
Sample
dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe
-
Size
431KB
-
MD5
dce106dfbe765fcb247faf75528a6d81
-
SHA1
6284a2499709b1987bb144daf745617fbca742b4
-
SHA256
2cb9a2e5ecf3e396efd8dd748fd633a4d695fafc8941c2e04911786638cbb8d2
-
SHA512
47d5068f65f15dbc114b119a4a8d9b947bcc699e8e65c3811394e932d86e08dd13836176710ac34f381155dcd751f94fa1976f6c52e627e12c4daeaadfdeb38a
-
SSDEEP
12288:VekJnG34cbICiiPar0GNJ8XQ7P9GPQjWfV:W60G/+6MPmW
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2524 qjcgiih.exe 2260 ajoetgg.exe 2876 sqqrxzi.exe 2772 pgnemft.exe 2776 zjkohia.exe 1760 meuenmy.exe 1252 rinmgwl.exe 1840 bqzjqvl.exe 1104 ibywnpb.exe 1920 vrtzwxg.exe 2472 iekpctf.exe 600 tlommrf.exe 1120 ffvcxer.exe 1684 sexxgep.exe 1152 zpwkdgf.exe 1756 hxjcxvo.exe 1384 wndkwfk.exe 960 gpsuriy.exe 2436 tcckxmx.exe 2076 dnrukpd.exe 2956 qduxtpj.exe 896 dfafebn.exe 1692 nbbxuwo.exe 2528 xeqhhzc.exe 2720 kzaxndb.exe 2900 ufbnlko.exe 2808 haskrgn.exe 2184 rchvejt.exe 2664 etcpnrz.exe 2712 odsaivf.exe 2684 buucqvl.exe 1168 nwbschp.exe 2864 bjkiilo.exe 2860 nhnkqlt.exe 1856 abtacyy.exe 644 kmilpbm.exe 572 xcdngjk.exe 1768 kbgqojp.exe 2972 udvsbmw.exe 2084 huqvkub.exe 1048 rfgffyh.exe 1376 dviioyn.exe 1320 qudlwgs.exe 1784 dkynfoq.exe 2196 qjbqoow.exe 2320 aptoewj.exe 2452 nnwqmeo.exe 2000 zhcygit.exe 1564 ncmolmr.exe 2176 ztpquux.exe 2116 evvggzb.exe 2756 oxkqtci.exe 3068 bzqgeou.exe 2724 omiwkst.exe 2180 booddxx.exe 2844 krdorad.exe 2680 yenlwec.exe 2944 kcpgfmi.exe 2164 uiqedlv.exe 1948 kvqzzys.exe 1036 uxgjucy.exe 2312 hwjmdcd.exe 1504 umdolkj.exe 1108 daembrw.exe -
Loads dropped DLL 64 IoCs
pid Process 2092 dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe 2092 dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe 2524 qjcgiih.exe 2524 qjcgiih.exe 2260 ajoetgg.exe 2260 ajoetgg.exe 2876 sqqrxzi.exe 2876 sqqrxzi.exe 2772 pgnemft.exe 2772 pgnemft.exe 2776 zjkohia.exe 2776 zjkohia.exe 1760 meuenmy.exe 1760 meuenmy.exe 1252 rinmgwl.exe 1252 rinmgwl.exe 1840 bqzjqvl.exe 1840 bqzjqvl.exe 1104 ibywnpb.exe 1104 ibywnpb.exe 1920 vrtzwxg.exe 1920 vrtzwxg.exe 2472 iekpctf.exe 2472 iekpctf.exe 600 tlommrf.exe 600 tlommrf.exe 1120 ffvcxer.exe 1120 ffvcxer.exe 1684 sexxgep.exe 1684 sexxgep.exe 1152 zpwkdgf.exe 1152 zpwkdgf.exe 1756 hxjcxvo.exe 1756 hxjcxvo.exe 1384 wndkwfk.exe 1384 wndkwfk.exe 960 gpsuriy.exe 960 gpsuriy.exe 2436 tcckxmx.exe 2436 tcckxmx.exe 2076 dnrukpd.exe 2076 dnrukpd.exe 2956 qduxtpj.exe 2956 qduxtpj.exe 896 dfafebn.exe 896 dfafebn.exe 1692 nbbxuwo.exe 1692 nbbxuwo.exe 2528 xeqhhzc.exe 2528 xeqhhzc.exe 2720 kzaxndb.exe 2720 kzaxndb.exe 2900 ufbnlko.exe 2900 ufbnlko.exe 2808 haskrgn.exe 2808 haskrgn.exe 2184 rchvejt.exe 2184 rchvejt.exe 2664 etcpnrz.exe 2664 etcpnrz.exe 2712 odsaivf.exe 2712 odsaivf.exe 2684 buucqvl.exe 2684 buucqvl.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\ombvpyj.exe bkvgeuf.exe File opened for modification C:\Windows\SysWOW64\uxgjucy.exe kvqzzys.exe File opened for modification C:\Windows\SysWOW64\gyvpupy.exe uwpijcl.exe File created C:\Windows\SysWOW64\djfzrva.exe uyqpvsm.exe File opened for modification C:\Windows\SysWOW64\glwirfc.exe wihyeco.exe File opened for modification C:\Windows\SysWOW64\kbgqojp.exe xcdngjk.exe File created C:\Windows\SysWOW64\ztpquux.exe ncmolmr.exe File created C:\Windows\SysWOW64\naxbrus.exe ayrlxhg.exe File created C:\Windows\SysWOW64\hyhcrit.exe ulpmlem.exe File opened for modification C:\Windows\SysWOW64\zzrhzby.exe ujoerts.exe File created C:\Windows\SysWOW64\umdolkj.exe hwjmdcd.exe File opened for modification C:\Windows\SysWOW64\onpfcgl.exe bljqiuy.exe File created C:\Windows\SysWOW64\jiyuomz.exe wkdrgec.exe File opened for modification C:\Windows\SysWOW64\wwhtkvj.exe jgeqcne.exe File opened for modification C:\Windows\SysWOW64\vqbbwyp.exe ivjmquq.exe File created C:\Windows\SysWOW64\bgbifwy.exe opgfwoa.exe File created C:\Windows\SysWOW64\szejyli.exe jppzlib.exe File created C:\Windows\SysWOW64\zzrhzby.exe ujoerts.exe File opened for modification C:\Windows\SysWOW64\abtacyy.exe nhnkqlt.exe File opened for modification C:\Windows\SysWOW64\qudlwgs.exe dviioyn.exe File opened for modification C:\Windows\SysWOW64\ivrkmno.exe sqrpiis.exe File created C:\Windows\SysWOW64\jgeqcne.exe whjnlfy.exe File created C:\Windows\SysWOW64\pxvomoj.exe cklygll.exe File created C:\Windows\SysWOW64\ttflmmk.exe jjqarje.exe File opened for modification C:\Windows\SysWOW64\sqqrxzi.exe ajoetgg.exe File opened for modification C:\Windows\SysWOW64\zqkuigg.exe nweewbu.exe File created C:\Windows\SysWOW64\sjbhbkg.exe ftgnkca.exe File opened for modification C:\Windows\SysWOW64\bhhsdzu.exe ormpvqo.exe File opened for modification C:\Windows\SysWOW64\msgccui.exe zudautc.exe File created C:\Windows\SysWOW64\qgijpll.exe dpnggdf.exe File opened for modification C:\Windows\SysWOW64\jgalyxq.exe zwlaluc.exe File opened for modification C:\Windows\SysWOW64\vzpsbcs.exe lozighm.exe File opened for modification C:\Windows\SysWOW64\hjjwzsi.exe xgummpb.exe File opened for modification C:\Windows\SysWOW64\jrvcziq.exe zhgsmfb.exe File opened for modification C:\Windows\SysWOW64\vcucjaj.exe ipcndwc.exe File created C:\Windows\SysWOW64\toqsdpv.exe gyvpupy.exe File created C:\Windows\SysWOW64\qoxhqlj.exe dboslic.exe File opened for modification C:\Windows\SysWOW64\hfguoyu.exe xuqjtvf.exe File opened for modification C:\Windows\SysWOW64\zbyifmm.exe mkwgpmg.exe File opened for modification C:\Windows\SysWOW64\dolpimu.exe qbtrciv.exe File opened for modification C:\Windows\SysWOW64\bwvzpnq.exe ocpkeil.exe File created C:\Windows\SysWOW64\hqpxeee.exe uzuunwy.exe File opened for modification C:\Windows\SysWOW64\srhatuq.exe fepkfqj.exe File created C:\Windows\SysWOW64\qfplgow.exe grpwqoi.exe File opened for modification C:\Windows\SysWOW64\gtewbdh.exe tdjttuk.exe File opened for modification C:\Windows\SysWOW64\dgdiqjn.exe qpifhah.exe File opened for modification C:\Windows\SysWOW64\zfbzeca.exe ndvjtyw.exe File opened for modification C:\Windows\SysWOW64\askmkja.exe qivkxgm.exe File created C:\Windows\SysWOW64\tqoizvk.exe gaufinf.exe File created C:\Windows\SysWOW64\qgwampz.exe dqbydhu.exe File created C:\Windows\SysWOW64\rfgffyh.exe huqvkub.exe File created C:\Windows\SysWOW64\izvgviw.exe vjtenaq.exe File created C:\Windows\SysWOW64\lzygkws.exe ybeeuou.exe File opened for modification C:\Windows\SysWOW64\szooecr.exe fxiytyn.exe File created C:\Windows\SysWOW64\pnwnuks.exe cxuklkm.exe File created C:\Windows\SysWOW64\nnwqmeo.exe aptoewj.exe File created C:\Windows\SysWOW64\ndceael.exe excpcxg.exe File opened for modification C:\Windows\SysWOW64\hdkisjs.exe xpklucf.exe File opened for modification C:\Windows\SysWOW64\kufrxxq.exe akqhkuj.exe File created C:\Windows\SysWOW64\zlewfhp.exe qxdzhak.exe File opened for modification C:\Windows\SysWOW64\riufvrs.exe celkrlv.exe File opened for modification C:\Windows\SysWOW64\bcnzwky.exe ohwjrgz.exe File opened for modification C:\Windows\SysWOW64\sibqgat.exe ixmgtxn.exe File created C:\Windows\SysWOW64\brbywdp.exe sdajywc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtaasnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcrovgt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldxypaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhwjphj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qdkygtk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language askmkja.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cqkxndl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tavqevv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erzziff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzrhzby.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qgwampz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jntutst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language booddxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cklygll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toqsdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwjmdcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wkigmtm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quxyxvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qzaczdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ibywnpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nweewbu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqqjejt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adscteg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubutigd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qfyikcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddtltkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ifrcrux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kypilcz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvpfbbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwubqfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hcrqzyf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njnipdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjisnha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpujbaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nirfojf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language irwwknz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdwwrck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jzewmmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emilpyc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syopeyb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ivrkmno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language izushjz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zsbcxya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzhctco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhkkgxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qbtrciv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fkhgsmy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fspuckl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrtzwxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jqxcuzp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cszkhes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eagmzmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btppziz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwnkogx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnpbfun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usvnpqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgccui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhrdkxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ukgnzye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlommrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjyrqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raczeoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kvkvncx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2524 2092 dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2524 2092 dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2524 2092 dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe 30 PID 2092 wrote to memory of 2524 2092 dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe 30 PID 2524 wrote to memory of 2260 2524 qjcgiih.exe 31 PID 2524 wrote to memory of 2260 2524 qjcgiih.exe 31 PID 2524 wrote to memory of 2260 2524 qjcgiih.exe 31 PID 2524 wrote to memory of 2260 2524 qjcgiih.exe 31 PID 2260 wrote to memory of 2876 2260 ajoetgg.exe 32 PID 2260 wrote to memory of 2876 2260 ajoetgg.exe 32 PID 2260 wrote to memory of 2876 2260 ajoetgg.exe 32 PID 2260 wrote to memory of 2876 2260 ajoetgg.exe 32 PID 2876 wrote to memory of 2772 2876 sqqrxzi.exe 33 PID 2876 wrote to memory of 2772 2876 sqqrxzi.exe 33 PID 2876 wrote to memory of 2772 2876 sqqrxzi.exe 33 PID 2876 wrote to memory of 2772 2876 sqqrxzi.exe 33 PID 2772 wrote to memory of 2776 2772 pgnemft.exe 34 PID 2772 wrote to memory of 2776 2772 pgnemft.exe 34 PID 2772 wrote to memory of 2776 2772 pgnemft.exe 34 PID 2772 wrote to memory of 2776 2772 pgnemft.exe 34 PID 2776 wrote to memory of 1760 2776 zjkohia.exe 35 PID 2776 wrote to memory of 1760 2776 zjkohia.exe 35 PID 2776 wrote to memory of 1760 2776 zjkohia.exe 35 PID 2776 wrote to memory of 1760 2776 zjkohia.exe 35 PID 1760 wrote to memory of 1252 1760 meuenmy.exe 36 PID 1760 wrote to memory of 1252 1760 meuenmy.exe 36 PID 1760 wrote to memory of 1252 1760 meuenmy.exe 36 PID 1760 wrote to memory of 1252 1760 meuenmy.exe 36 PID 1252 wrote to memory of 1840 1252 rinmgwl.exe 37 PID 1252 wrote to memory of 1840 1252 rinmgwl.exe 37 PID 1252 wrote to memory of 1840 1252 rinmgwl.exe 37 PID 1252 wrote to memory of 1840 1252 rinmgwl.exe 37 PID 1840 wrote to memory of 1104 1840 bqzjqvl.exe 38 PID 1840 wrote to memory of 1104 1840 bqzjqvl.exe 38 PID 1840 wrote to memory of 1104 1840 bqzjqvl.exe 38 PID 1840 wrote to memory of 1104 1840 bqzjqvl.exe 38 PID 1104 wrote to memory of 1920 1104 ibywnpb.exe 39 PID 1104 wrote to memory of 1920 1104 ibywnpb.exe 39 PID 1104 wrote to memory of 1920 1104 ibywnpb.exe 39 PID 1104 wrote to memory of 1920 1104 ibywnpb.exe 39 PID 1920 wrote to memory of 2472 1920 vrtzwxg.exe 40 PID 1920 wrote to memory of 2472 1920 vrtzwxg.exe 40 PID 1920 wrote to memory of 2472 1920 vrtzwxg.exe 40 PID 1920 wrote to memory of 2472 1920 vrtzwxg.exe 40 PID 2472 wrote to memory of 600 2472 iekpctf.exe 41 PID 2472 wrote to memory of 600 2472 iekpctf.exe 41 PID 2472 wrote to memory of 600 2472 iekpctf.exe 41 PID 2472 wrote to memory of 600 2472 iekpctf.exe 41 PID 600 wrote to memory of 1120 600 tlommrf.exe 42 PID 600 wrote to memory of 1120 600 tlommrf.exe 42 PID 600 wrote to memory of 1120 600 tlommrf.exe 42 PID 600 wrote to memory of 1120 600 tlommrf.exe 42 PID 1120 wrote to memory of 1684 1120 ffvcxer.exe 43 PID 1120 wrote to memory of 1684 1120 ffvcxer.exe 43 PID 1120 wrote to memory of 1684 1120 ffvcxer.exe 43 PID 1120 wrote to memory of 1684 1120 ffvcxer.exe 43 PID 1684 wrote to memory of 1152 1684 sexxgep.exe 44 PID 1684 wrote to memory of 1152 1684 sexxgep.exe 44 PID 1684 wrote to memory of 1152 1684 sexxgep.exe 44 PID 1684 wrote to memory of 1152 1684 sexxgep.exe 44 PID 1152 wrote to memory of 1756 1152 zpwkdgf.exe 45 PID 1152 wrote to memory of 1756 1152 zpwkdgf.exe 45 PID 1152 wrote to memory of 1756 1152 zpwkdgf.exe 45 PID 1152 wrote to memory of 1756 1152 zpwkdgf.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\qjcgiih.exeC:\Windows\system32\qjcgiih.exe 496 "C:\Users\Admin\AppData\Local\Temp\dce106dfbe765fcb247faf75528a6d81_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\ajoetgg.exeC:\Windows\system32\ajoetgg.exe 532 "C:\Windows\SysWOW64\qjcgiih.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\sqqrxzi.exeC:\Windows\system32\sqqrxzi.exe 540 "C:\Windows\SysWOW64\ajoetgg.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\pgnemft.exeC:\Windows\system32\pgnemft.exe 544 "C:\Windows\SysWOW64\sqqrxzi.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\zjkohia.exeC:\Windows\system32\zjkohia.exe 536 "C:\Windows\SysWOW64\pgnemft.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\meuenmy.exeC:\Windows\system32\meuenmy.exe 548 "C:\Windows\SysWOW64\zjkohia.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\rinmgwl.exeC:\Windows\system32\rinmgwl.exe 556 "C:\Windows\SysWOW64\meuenmy.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\bqzjqvl.exeC:\Windows\system32\bqzjqvl.exe 552 "C:\Windows\SysWOW64\rinmgwl.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\ibywnpb.exeC:\Windows\system32\ibywnpb.exe 560 "C:\Windows\SysWOW64\bqzjqvl.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\vrtzwxg.exeC:\Windows\system32\vrtzwxg.exe 564 "C:\Windows\SysWOW64\ibywnpb.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\iekpctf.exeC:\Windows\system32\iekpctf.exe 568 "C:\Windows\SysWOW64\vrtzwxg.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\tlommrf.exeC:\Windows\system32\tlommrf.exe 572 "C:\Windows\SysWOW64\iekpctf.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Windows\SysWOW64\ffvcxer.exeC:\Windows\system32\ffvcxer.exe 576 "C:\Windows\SysWOW64\tlommrf.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\sexxgep.exeC:\Windows\system32\sexxgep.exe 584 "C:\Windows\SysWOW64\ffvcxer.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\zpwkdgf.exeC:\Windows\system32\zpwkdgf.exe 596 "C:\Windows\SysWOW64\sexxgep.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\hxjcxvo.exeC:\Windows\system32\hxjcxvo.exe 580 "C:\Windows\SysWOW64\zpwkdgf.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Windows\SysWOW64\wndkwfk.exeC:\Windows\system32\wndkwfk.exe 588 "C:\Windows\SysWOW64\hxjcxvo.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1384 -
C:\Windows\SysWOW64\gpsuriy.exeC:\Windows\system32\gpsuriy.exe 600 "C:\Windows\SysWOW64\wndkwfk.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:960 -
C:\Windows\SysWOW64\tcckxmx.exeC:\Windows\system32\tcckxmx.exe 592 "C:\Windows\SysWOW64\gpsuriy.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436 -
C:\Windows\SysWOW64\dnrukpd.exeC:\Windows\system32\dnrukpd.exe 608 "C:\Windows\SysWOW64\tcckxmx.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2076 -
C:\Windows\SysWOW64\qduxtpj.exeC:\Windows\system32\qduxtpj.exe 628 "C:\Windows\SysWOW64\dnrukpd.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2956 -
C:\Windows\SysWOW64\dfafebn.exeC:\Windows\system32\dfafebn.exe 604 "C:\Windows\SysWOW64\qduxtpj.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896 -
C:\Windows\SysWOW64\nbbxuwo.exeC:\Windows\system32\nbbxuwo.exe 624 "C:\Windows\SysWOW64\dfafebn.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Windows\SysWOW64\xeqhhzc.exeC:\Windows\system32\xeqhhzc.exe 612 "C:\Windows\SysWOW64\nbbxuwo.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2528 -
C:\Windows\SysWOW64\kzaxndb.exeC:\Windows\system32\kzaxndb.exe 616 "C:\Windows\SysWOW64\xeqhhzc.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2720 -
C:\Windows\SysWOW64\ufbnlko.exeC:\Windows\system32\ufbnlko.exe 620 "C:\Windows\SysWOW64\kzaxndb.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2900 -
C:\Windows\SysWOW64\haskrgn.exeC:\Windows\system32\haskrgn.exe 644 "C:\Windows\SysWOW64\ufbnlko.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2808 -
C:\Windows\SysWOW64\rchvejt.exeC:\Windows\system32\rchvejt.exe 632 "C:\Windows\SysWOW64\haskrgn.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2184 -
C:\Windows\SysWOW64\etcpnrz.exeC:\Windows\system32\etcpnrz.exe 652 "C:\Windows\SysWOW64\rchvejt.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2664 -
C:\Windows\SysWOW64\odsaivf.exeC:\Windows\system32\odsaivf.exe 648 "C:\Windows\SysWOW64\etcpnrz.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2712 -
C:\Windows\SysWOW64\buucqvl.exeC:\Windows\system32\buucqvl.exe 636 "C:\Windows\SysWOW64\odsaivf.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684 -
C:\Windows\SysWOW64\nwbschp.exeC:\Windows\system32\nwbschp.exe 640 "C:\Windows\SysWOW64\buucqvl.exe"33⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\SysWOW64\bjkiilo.exeC:\Windows\system32\bjkiilo.exe 672 "C:\Windows\SysWOW64\nwbschp.exe"34⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\SysWOW64\nhnkqlt.exeC:\Windows\system32\nhnkqlt.exe 660 "C:\Windows\SysWOW64\bjkiilo.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2860 -
C:\Windows\SysWOW64\abtacyy.exeC:\Windows\system32\abtacyy.exe 664 "C:\Windows\SysWOW64\nhnkqlt.exe"36⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\SysWOW64\kmilpbm.exeC:\Windows\system32\kmilpbm.exe 656 "C:\Windows\SysWOW64\abtacyy.exe"37⤵
- Executes dropped EXE
PID:644 -
C:\Windows\SysWOW64\xcdngjk.exeC:\Windows\system32\xcdngjk.exe 684 "C:\Windows\SysWOW64\kmilpbm.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:572 -
C:\Windows\SysWOW64\kbgqojp.exeC:\Windows\system32\kbgqojp.exe 668 "C:\Windows\SysWOW64\xcdngjk.exe"39⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\udvsbmw.exeC:\Windows\system32\udvsbmw.exe 676 "C:\Windows\SysWOW64\kbgqojp.exe"40⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\huqvkub.exeC:\Windows\system32\huqvkub.exe 680 "C:\Windows\SysWOW64\udvsbmw.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\rfgffyh.exeC:\Windows\system32\rfgffyh.exe 700 "C:\Windows\SysWOW64\huqvkub.exe"42⤵
- Executes dropped EXE
PID:1048 -
C:\Windows\SysWOW64\dviioyn.exeC:\Windows\system32\dviioyn.exe 688 "C:\Windows\SysWOW64\rfgffyh.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1376 -
C:\Windows\SysWOW64\qudlwgs.exeC:\Windows\system32\qudlwgs.exe 696 "C:\Windows\SysWOW64\dviioyn.exe"44⤵
- Executes dropped EXE
PID:1320 -
C:\Windows\SysWOW64\dkynfoq.exeC:\Windows\system32\dkynfoq.exe 692 "C:\Windows\SysWOW64\qudlwgs.exe"45⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\qjbqoow.exeC:\Windows\system32\qjbqoow.exe 712 "C:\Windows\SysWOW64\dkynfoq.exe"46⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\aptoewj.exeC:\Windows\system32\aptoewj.exe 704 "C:\Windows\SysWOW64\qjbqoow.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2320 -
C:\Windows\SysWOW64\nnwqmeo.exeC:\Windows\system32\nnwqmeo.exe 724 "C:\Windows\SysWOW64\aptoewj.exe"48⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\zhcygit.exeC:\Windows\system32\zhcygit.exe 716 "C:\Windows\SysWOW64\nnwqmeo.exe"49⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\ncmolmr.exeC:\Windows\system32\ncmolmr.exe 708 "C:\Windows\SysWOW64\zhcygit.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1564 -
C:\Windows\SysWOW64\ztpquux.exeC:\Windows\system32\ztpquux.exe 720 "C:\Windows\SysWOW64\ncmolmr.exe"51⤵
- Executes dropped EXE
PID:2176 -
C:\Windows\SysWOW64\evvggzb.exeC:\Windows\system32\evvggzb.exe 744 "C:\Windows\SysWOW64\ztpquux.exe"52⤵
- Executes dropped EXE
PID:2116 -
C:\Windows\SysWOW64\oxkqtci.exeC:\Windows\system32\oxkqtci.exe 732 "C:\Windows\SysWOW64\evvggzb.exe"53⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\bzqgeou.exeC:\Windows\system32\bzqgeou.exe 736 "C:\Windows\SysWOW64\oxkqtci.exe"54⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\omiwkst.exeC:\Windows\system32\omiwkst.exe 728 "C:\Windows\SysWOW64\bzqgeou.exe"55⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\booddxx.exeC:\Windows\system32\booddxx.exe 760 "C:\Windows\SysWOW64\omiwkst.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\krdorad.exeC:\Windows\system32\krdorad.exe 740 "C:\Windows\SysWOW64\booddxx.exe"57⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\yenlwec.exeC:\Windows\system32\yenlwec.exe 768 "C:\Windows\SysWOW64\krdorad.exe"58⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\kcpgfmi.exeC:\Windows\system32\kcpgfmi.exe 748 "C:\Windows\SysWOW64\yenlwec.exe"59⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\uiqedlv.exeC:\Windows\system32\uiqedlv.exe 752 "C:\Windows\SysWOW64\kcpgfmi.exe"60⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\kvqzzys.exeC:\Windows\system32\kvqzzys.exe 756 "C:\Windows\SysWOW64\uiqedlv.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1948 -
C:\Windows\SysWOW64\uxgjucy.exeC:\Windows\system32\uxgjucy.exe 764 "C:\Windows\SysWOW64\kvqzzys.exe"62⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\SysWOW64\hwjmdcd.exeC:\Windows\system32\hwjmdcd.exe 772 "C:\Windows\SysWOW64\uxgjucy.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\umdolkj.exeC:\Windows\system32\umdolkj.exe 776 "C:\Windows\SysWOW64\hwjmdcd.exe"64⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\daembrw.exeC:\Windows\system32\daembrw.exe 780 "C:\Windows\SysWOW64\umdolkj.exe"65⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\SysWOW64\rnobhvv.exeC:\Windows\system32\rnobhvv.exe 784 "C:\Windows\SysWOW64\daembrw.exe"66⤵PID:1604
-
C:\Windows\SysWOW64\dpujbaz.exeC:\Windows\system32\dpujbaz.exe 788 "C:\Windows\SysWOW64\rnobhvv.exe"67⤵
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Windows\SysWOW64\nsrtodg.exeC:\Windows\system32\nsrtodg.exe 792 "C:\Windows\SysWOW64\dpujbaz.exe"68⤵PID:1520
-
C:\Windows\SysWOW64\derosqk.exeC:\Windows\system32\derosqk.exe 796 "C:\Windows\SysWOW64\nsrtodg.exe"69⤵PID:1700
-
C:\Windows\SysWOW64\nhhzflr.exeC:\Windows\system32\nhhzflr.exe 808 "C:\Windows\SysWOW64\derosqk.exe"70⤵PID:1568
-
C:\Windows\SysWOW64\axjcotw.exeC:\Windows\system32\axjcotw.exe 800 "C:\Windows\SysWOW64\nhhzflr.exe"71⤵PID:1936
-
C:\Windows\SysWOW64\nweewbu.exeC:\Windows\system32\nweewbu.exe 812 "C:\Windows\SysWOW64\axjcotw.exe"72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Windows\SysWOW64\zqkuigg.exeC:\Windows\system32\zqkuigg.exe 804 "C:\Windows\SysWOW64\nweewbu.exe"73⤵PID:1248
-
C:\Windows\SysWOW64\mofxyoe.exeC:\Windows\system32\mofxyoe.exe 820 "C:\Windows\SysWOW64\zqkuigg.exe"74⤵PID:2564
-
C:\Windows\SysWOW64\wruzmrs.exeC:\Windows\system32\wruzmrs.exe 816 "C:\Windows\SysWOW64\mofxyoe.exe"75⤵PID:1596
-
C:\Windows\SysWOW64\jqxcuzp.exeC:\Windows\system32\jqxcuzp.exe 836 "C:\Windows\SysWOW64\wruzmrs.exe"76⤵
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\SysWOW64\wkdrgec.exeC:\Windows\system32\wkdrgec.exe 828 "C:\Windows\SysWOW64\jqxcuzp.exe"77⤵
- Drops file in System32 directory
PID:2752 -
C:\Windows\SysWOW64\jiyuomz.exeC:\Windows\system32\jiyuomz.exe 824 "C:\Windows\SysWOW64\wkdrgec.exe"78⤵PID:2828
-
C:\Windows\SysWOW64\tlnejpo.exeC:\Windows\system32\tlnejpo.exe 832 "C:\Windows\SysWOW64\jiyuomz.exe"79⤵PID:2780
-
C:\Windows\SysWOW64\gjqhspl.exeC:\Windows\system32\gjqhspl.exe 852 "C:\Windows\SysWOW64\tlnejpo.exe"80⤵PID:3024
-
C:\Windows\SysWOW64\salkbxr.exeC:\Windows\system32\salkbxr.exe 844 "C:\Windows\SysWOW64\gjqhspl.exe"81⤵PID:1736
-
C:\Windows\SysWOW64\fygmjgw.exeC:\Windows\system32\fygmjgw.exe 856 "C:\Windows\SysWOW64\salkbxr.exe"82⤵PID:2428
-
C:\Windows\SysWOW64\ssmuvkb.exeC:\Windows\system32\ssmuvkb.exe 840 "C:\Windows\SysWOW64\fygmjgw.exe"83⤵PID:2040
-
C:\Windows\SysWOW64\frpxdsg.exeC:\Windows\system32\frpxdsg.exe 848 "C:\Windows\SysWOW64\ssmuvkb.exe"84⤵PID:1992
-
C:\Windows\SysWOW64\ptehzvn.exeC:\Windows\system32\ptehzvn.exe 864 "C:\Windows\SysWOW64\frpxdsg.exe"85⤵PID:2456
-
C:\Windows\SysWOW64\cszkhes.exeC:\Windows\system32\cszkhes.exe 872 "C:\Windows\SysWOW64\ptehzvn.exe"86⤵
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\muouuzy.exeC:\Windows\system32\muouuzy.exe 868 "C:\Windows\SysWOW64\cszkhes.exe"87⤵PID:2788
-
C:\Windows\SysWOW64\zhgkacx.exeC:\Windows\system32\zhgkacx.exe 880 "C:\Windows\SysWOW64\muouuzy.exe"88⤵PID:780
-
C:\Windows\SysWOW64\ivhhykk.exeC:\Windows\system32\ivhhykk.exe 876 "C:\Windows\SysWOW64\zhgkacx.exe"89⤵PID:2024
-
C:\Windows\SysWOW64\yahcuph.exeC:\Windows\system32\yahcuph.exe 860 "C:\Windows\SysWOW64\ivhhykk.exe"90⤵PID:800
-
C:\Windows\SysWOW64\ikenpsn.exeC:\Windows\system32\ikenpsn.exe 892 "C:\Windows\SysWOW64\yahcuph.exe"91⤵PID:580
-
C:\Windows\SysWOW64\vbzpyat.exeC:\Windows\system32\vbzpyat.exe 888 "C:\Windows\SysWOW64\ikenpsn.exe"92⤵PID:976
-
C:\Windows\SysWOW64\izushjz.exeC:\Windows\system32\izushjz.exe 900 "C:\Windows\SysWOW64\vbzpyat.exe"93⤵
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\vtaasnd.exeC:\Windows\system32\vtaasnd.exe 896 "C:\Windows\SysWOW64\izushjz.exe"94⤵
- System Location Discovery: System Language Discovery
PID:1260 -
C:\Windows\SysWOW64\fepkfqj.exeC:\Windows\system32\fepkfqj.exe 908 "C:\Windows\SysWOW64\vtaasnd.exe"95⤵
- Drops file in System32 directory
PID:2536 -
C:\Windows\SysWOW64\srhatuq.exeC:\Windows\system32\srhatuq.exe 904 "C:\Windows\SysWOW64\fepkfqj.exe"96⤵PID:1820
-
C:\Windows\SysWOW64\bfhxjbv.exeC:\Windows\system32\bfhxjbv.exe 920 "C:\Windows\SysWOW64\srhatuq.exe"97⤵PID:2736
-
C:\Windows\SysWOW64\rjisnha.exeC:\Windows\system32\rjisnha.exe 884 "C:\Windows\SysWOW64\bfhxjbv.exe"98⤵
- System Location Discovery: System Language Discovery
PID:1324 -
C:\Windows\SysWOW64\bufdakg.exeC:\Windows\system32\bufdakg.exe 928 "C:\Windows\SysWOW64\rjisnha.exe"99⤵PID:2852
-
C:\Windows\SysWOW64\oolsmwl.exeC:\Windows\system32\oolsmwl.exe 912 "C:\Windows\SysWOW64\bufdakg.exe"100⤵PID:2704
-
C:\Windows\SysWOW64\tngnuwq.exeC:\Windows\system32\tngnuwq.exe 916 "C:\Windows\SysWOW64\oolsmwl.exe"101⤵PID:2596
-
C:\Windows\SysWOW64\gaxlaap.exeC:\Windows\system32\gaxlaap.exe 940 "C:\Windows\SysWOW64\tngnuwq.exe"102⤵PID:3048
-
C:\Windows\SysWOW64\qoqayic.exeC:\Windows\system32\qoqayic.exe 924 "C:\Windows\SysWOW64\gaxlaap.exe"103⤵PID:2892
-
C:\Windows\SysWOW64\detdhqz.exeC:\Windows\system32\detdhqz.exe 932 "C:\Windows\SysWOW64\qoqayic.exe"104⤵PID:1924
-
C:\Windows\SysWOW64\qvofpqf.exeC:\Windows\system32\qvofpqf.exe 936 "C:\Windows\SysWOW64\detdhqz.exe"105⤵PID:2872
-
C:\Windows\SysWOW64\ctiiyyl.exeC:\Windows\system32\ctiiyyl.exe 944 "C:\Windows\SysWOW64\qvofpqf.exe"106⤵PID:1164
-
C:\Windows\SysWOW64\pkllhgq.exeC:\Windows\system32\pkllhgq.exe 956 "C:\Windows\SysWOW64\ctiiyyl.exe"107⤵PID:1416
-
C:\Windows\SysWOW64\zymifgv.exeC:\Windows\system32\zymifgv.exe 948 "C:\Windows\SysWOW64\pkllhgq.exe"108⤵PID:1772
-
C:\Windows\SysWOW64\mlvykkc.exeC:\Windows\system32\mlvykkc.exe 968 "C:\Windows\SysWOW64\zymifgv.exe"109⤵PID:2344
-
C:\Windows\SysWOW64\zncowwg.exeC:\Windows\system32\zncowwg.exe 952 "C:\Windows\SysWOW64\mlvykkc.exe"110⤵PID:1704
-
C:\Windows\SysWOW64\jprqjzn.exeC:\Windows\system32\jprqjzn.exe 960 "C:\Windows\SysWOW64\zncowwg.exe"111⤵PID:1536
-
C:\Windows\SysWOW64\zczlnej.exeC:\Windows\system32\zczlnej.exe 964 "C:\Windows\SysWOW64\jprqjzn.exe"112⤵PID:2980
-
C:\Windows\SysWOW64\jepvaiy.exeC:\Windows\system32\jepvaiy.exe 972 "C:\Windows\SysWOW64\zczlnej.exe"113⤵PID:2488
-
C:\Windows\SysWOW64\vvjyrqv.exeC:\Windows\system32\vvjyrqv.exe 988 "C:\Windows\SysWOW64\jepvaiy.exe"114⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\ixpocui.exeC:\Windows\system32\ixpocui.exe 976 "C:\Windows\SysWOW64\vvjyrqv.exe"115⤵PID:2168
-
C:\Windows\SysWOW64\vvsqlcf.exeC:\Windows\system32\vvsqlcf.exe 980 "C:\Windows\SysWOW64\ixpocui.exe"116⤵PID:2552
-
C:\Windows\SysWOW64\fyibyfu.exeC:\Windows\system32\fyibyfu.exe 996 "C:\Windows\SysWOW64\vvsqlcf.exe"117⤵PID:2520
-
C:\Windows\SysWOW64\saoijky.exeC:\Windows\system32\saoijky.exe 984 "C:\Windows\SysWOW64\fyibyfu.exe"118⤵PID:1576
-
C:\Windows\SysWOW64\fnfgpox.exeC:\Windows\system32\fnfgpox.exe 1004 "C:\Windows\SysWOW64\saoijky.exe"119⤵PID:2636
-
C:\Windows\SysWOW64\sdajywc.exeC:\Windows\system32\sdajywc.exe 1000 "C:\Windows\SysWOW64\fnfgpox.exe"120⤵
- Drops file in System32 directory
PID:2628 -
C:\Windows\SysWOW64\brbywdp.exeC:\Windows\system32\brbywdp.exe 1008 "C:\Windows\SysWOW64\sdajywc.exe"121⤵PID:1340
-
C:\Windows\SysWOW64\lrfwgup.exeC:\Windows\system32\lrfwgup.exe 992 "C:\Windows\SysWOW64\brbywdp.exe"122⤵PID:3052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-