Analysis
-
max time kernel
148s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe
-
Size
157KB
-
MD5
e588a4a56bce437884b964d9064ba7c6
-
SHA1
d08181c87666562a2909fe533366856c861168a0
-
SHA256
e1eead7acf41ae590942c2c3c23a4e994cb45f8b8e847bf9db81c873482a580c
-
SHA512
69faa174e0f916e3717c28031ce7562eed96a13484e4d596cc581a2444d2e09987a6df74dab0fd08ea4dd0430945553659700d8b05ca1cae5d17caf09282e4aa
-
SSDEEP
3072:trzexfZT9ZZn4SsQ3273WBKblOKJUgkMgPDS5LXEsVJ2:RzenL94S81Bn+7S59J2
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2472 mimbzfxhn.exe 3012 mtztorbbc.exe 3064 jyutuymfc.exe 2772 afurzndwb.exe 2576 qjcmvaarq.exe 2092 yrpeppjbq.exe 1232 fvzrgamrd.exe 2292 moywvuulx.exe 1996 rtsepehtr.exe 2176 evymaqlvw.exe 944 gfxjsmttl.exe 888 qebhdlbtl.exe 1668 twtwvhjrs.exe 2632 dyqhqcptf.exe 2680 hlcpjmucz.exe 2056 crqzzedyt.exe 1908 eiehxiqtz.exe 2116 paumbykwa.exe 2928 rwxpwzzwu.exe 3032 yahcgkcmp.exe 2976 dfskzuhub.exe 2552 neehrsoub.exe 896 qwwxkowsi.exe 2900 aviuunesq.exe 3048 cilfpnklk.exe 924 jnnkhzvaw.exe 2216 ozhssiajr.exe 2496 yytpkhhir.exe 1244 dsbxjrrnk.exe 816 nkqvoitql.exe 1016 sbvqkwfts.exe 2964 cwoarqgyf.exe 1044 evcqpvttl.exe 2288 ouonaubtl.exe 2876 wvnnoaxgm.exe 948 bdkikgirt.exe 1980 gtpdguuuz.exe 2136 nyziqgeju.exe 2844 vcjvhzhzh.exe 2800 fxcgptiev.exe 2756 nfxgbjrou.exe 1072 unlyvybhb.exe 436 emxvgxigc.exe 2712 mqhjxilwo.exe 2464 tjgouktji.exe 2864 etvtzavlj.exe 2656 oazrjydlk.exe 1376 vivjdomdj.exe 3120 anorxyrmd.exe 3180 hvcrjnbwl.exe 3240 sqdbrhbby.exe 3300 oslbpsmgr.exe 3360 zcagciobs.exe 3428 dwqgtaggm.exe 3488 qjjobrpkg.exe 3548 ajnmlqojg.exe 3608 hqimffytg.exe 3668 mgfzbtjem.exe 3732 wcgrjokba.exe 3792 hyhcritzo.exe 3852 lrpkqsdeh.exe 3912 qeijjcimb.exe 3980 yxhkpjmhb.exe 4048 awvznozch.exe -
Loads dropped DLL 64 IoCs
pid Process 2256 e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe 2256 e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe 2472 mimbzfxhn.exe 2472 mimbzfxhn.exe 3012 mtztorbbc.exe 3012 mtztorbbc.exe 3064 jyutuymfc.exe 3064 jyutuymfc.exe 2772 afurzndwb.exe 2772 afurzndwb.exe 2576 qjcmvaarq.exe 2576 qjcmvaarq.exe 2092 yrpeppjbq.exe 2092 yrpeppjbq.exe 1232 fvzrgamrd.exe 1232 fvzrgamrd.exe 2292 moywvuulx.exe 2292 moywvuulx.exe 1996 rtsepehtr.exe 1996 rtsepehtr.exe 2176 evymaqlvw.exe 2176 evymaqlvw.exe 944 gfxjsmttl.exe 944 gfxjsmttl.exe 888 qebhdlbtl.exe 888 qebhdlbtl.exe 1668 twtwvhjrs.exe 1668 twtwvhjrs.exe 2632 dyqhqcptf.exe 2632 dyqhqcptf.exe 2680 hlcpjmucz.exe 2680 hlcpjmucz.exe 2056 crqzzedyt.exe 2056 crqzzedyt.exe 1908 eiehxiqtz.exe 1908 eiehxiqtz.exe 2116 paumbykwa.exe 2116 paumbykwa.exe 2928 rwxpwzzwu.exe 2928 rwxpwzzwu.exe 3032 yahcgkcmp.exe 3032 yahcgkcmp.exe 2976 dfskzuhub.exe 2976 dfskzuhub.exe 2552 neehrsoub.exe 2552 neehrsoub.exe 896 qwwxkowsi.exe 896 qwwxkowsi.exe 2900 aviuunesq.exe 2900 aviuunesq.exe 3048 cilfpnklk.exe 3048 cilfpnklk.exe 924 jnnkhzvaw.exe 924 jnnkhzvaw.exe 2216 ozhssiajr.exe 2216 ozhssiajr.exe 2496 yytpkhhir.exe 2496 yytpkhhir.exe 1244 dsbxjrrnk.exe 1244 dsbxjrrnk.exe 816 nkqvoitql.exe 816 nkqvoitql.exe 1016 sbvqkwfts.exe 1016 sbvqkwfts.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\hkbfixtta.exe xloixylta.exe File created C:\Windows\SysWOW64\bcnzwkyyu.exe ohwjrgzlg.exe File opened for modification C:\Windows\SysWOW64\kfijbzgqf.exe faobixbql.exe File created C:\Windows\SysWOW64\uihclhmyq.exe kjdfbifgq.exe File created C:\Windows\SysWOW64\mxvcdvxar.exe bqreswxaj.exe File opened for modification C:\Windows\SysWOW64\hczydajda.exe aqttohbrg.exe File created C:\Windows\SysWOW64\tcvonoyds.exe jdrqdqqes.exe File opened for modification C:\Windows\SysWOW64\mbzmtdjpu.exe ewpzcshzz.exe File opened for modification C:\Windows\SysWOW64\iwbqvlcob.exe vxgnedxha.exe File opened for modification C:\Windows\SysWOW64\pjlttbukl.exe csrqktpdk.exe File opened for modification C:\Windows\SysWOW64\qbrkgnabz.exe gcnmwosbz.exe File opened for modification C:\Windows\SysWOW64\viggrrsyz.exe lbciztlyz.exe File created C:\Windows\SysWOW64\oepgzrhjt.exe exdjosajt.exe File opened for modification C:\Windows\SysWOW64\lqvkoqrnx.exe zrshgqmgw.exe File created C:\Windows\SysWOW64\yrpeppjbq.exe qjcmvaarq.exe File opened for modification C:\Windows\SysWOW64\axivlwdah.exe lhwneeamn.exe File created C:\Windows\SysWOW64\nltairmqk.exe dehvysnrk.exe File created C:\Windows\SysWOW64\jmmcijrdm.exe kerkvuhse.exe File opened for modification C:\Windows\SysWOW64\qdpiulhkm.exe dbjsihdbz.exe File opened for modification C:\Windows\SysWOW64\sudhwmwoi.exe qkmseqoqb.exe File created C:\Windows\SysWOW64\kblsccmys.exe dqnnfiwmy.exe File created C:\Windows\SysWOW64\gigizalfv.exe tnwstwesp.exe File opened for modification C:\Windows\SysWOW64\snapftcjz.exe idkfsqnpn.exe File created C:\Windows\SysWOW64\yhfrmuodo.exe oepgzrhjt.exe File created C:\Windows\SysWOW64\lxqnfzayc.exe hkwfmxvyi.exe File opened for modification C:\Windows\SysWOW64\ypsrgjxvn.exe yhfrmuodo.exe File opened for modification C:\Windows\SysWOW64\afurzndwb.exe jyutuymfc.exe File created C:\Windows\SysWOW64\nfxgbjrou.exe fxcgptiev.exe File opened for modification C:\Windows\SysWOW64\csrqktpdk.exe vogltimnx.exe File opened for modification C:\Windows\SysWOW64\ylblyzwbr.exe ompngbpbr.exe File opened for modification C:\Windows\SysWOW64\kbtaoeqyj.exe antcqxdbk.exe File opened for modification C:\Windows\SysWOW64\zgmscesin.exe pdxqhbega.exe File created C:\Windows\SysWOW64\rtsepehtr.exe moywvuulx.exe File opened for modification C:\Windows\SysWOW64\bcnzwkyyu.exe ohwjrgzlg.exe File opened for modification C:\Windows\SysWOW64\evrjomrqm.exe zemosggno.exe File opened for modification C:\Windows\SysWOW64\qavmalsze.exe ipohdrjmk.exe File opened for modification C:\Windows\SysWOW64\icwunpuft.exe ydsxvrngt.exe File opened for modification C:\Windows\SysWOW64\sjmegomeq.exe hrwzcqkjp.exe File opened for modification C:\Windows\SysWOW64\ujnooikmg.exe nbswutacg.exe File created C:\Windows\SysWOW64\fbdttzmph.exe ujnooikmg.exe File created C:\Windows\SysWOW64\htxtpynhv.exe uduqgyqau.exe File created C:\Windows\SysWOW64\etkedsfhw.exe rgsoxogui.exe File created C:\Windows\SysWOW64\etvtzavlj.exe tjgouktji.exe File opened for modification C:\Windows\SysWOW64\mthqjfmmq.exe zcmvbxgfp.exe File opened for modification C:\Windows\SysWOW64\pqzbcdnuu.exe ernesegut.exe File opened for modification C:\Windows\SysWOW64\psveuybqs.exe qavmalsze.exe File opened for modification C:\Windows\SysWOW64\ezlzpsptw.exe hydezvjfo.exe File opened for modification C:\Windows\SysWOW64\qebhdlbtl.exe gfxjsmttl.exe File created C:\Windows\SysWOW64\wzsnruusr.exe rjotdojpl.exe File created C:\Windows\SysWOW64\nabnkteod.exe ydtnybvdd.exe File opened for modification C:\Windows\SysWOW64\zmohbywtk.exe kwuzugbwq.exe File created C:\Windows\SysWOW64\dbjsihdbz.exe wuwswrtqz.exe File opened for modification C:\Windows\SysWOW64\sfknfegmx.exe ifyqufhnp.exe File created C:\Windows\SysWOW64\swyxmtlxq.exe ixuzcudyq.exe File opened for modification C:\Windows\SysWOW64\rfkqkmntn.exe npgvogbih.exe File created C:\Windows\SysWOW64\rmavvxtdn.exe eoxsmpnnu.exe File opened for modification C:\Windows\SysWOW64\wvnnoaxgm.exe ouonaubtl.exe File opened for modification C:\Windows\SysWOW64\toelqdxip.exe loflcotvp.exe File opened for modification C:\Windows\SysWOW64\erbpeaaad.exe rbhmwsusc.exe File opened for modification C:\Windows\SysWOW64\ewftsusao.exe rfkqkmntn.exe File opened for modification C:\Windows\SysWOW64\kalzdfmud.exe uszrfnqyj.exe File created C:\Windows\SysWOW64\popdfzdma.exe ftwtyfdpn.exe File opened for modification C:\Windows\SysWOW64\oazrjydlk.exe etvtzavlj.exe File created C:\Windows\SysWOW64\hvcrjnbwl.exe anorxyrmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpanjbbsz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yqkkttcnk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzksxcufs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kjboqceoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szsulrkmo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aoadjhvjc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zemosggno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igtosvvde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ayqtyrwkj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdispxbos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltawnqtga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qebhdlbtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttoapwbfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcoxvreli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eejchitfm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osobvrmgw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyqhqcptf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvayrkrnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xatxycgst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsmuxpbfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hcpjugtxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hiecqcxxk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhbhyltbu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language moedkgcgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qeijjcimb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfknfegmx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lskemuxgq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssivmshco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amsmfijvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ejtpqvvnj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttlshvpxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxexrcdek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htxtpynhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfdxnufrk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nyziqgeju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hqimffytg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhiziaexk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vogltimnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snhqueiej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language irhwgxynb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evymaqlvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahhkzpely.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udclfffjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqribarfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcvonoyds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cqobuitya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxbkfjdcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nabnkteod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbrxbbfau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vaprnzmnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btienmfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yoppituka.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsstwgdrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pkvjlbtpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zfwubeumy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahcgkcmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mthqjfmmq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbxacjeen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awycynyjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npaiwvszs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iwbqvlcob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxqnfzayc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdggnulad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnuglamix.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2472 2256 e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2472 2256 e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2472 2256 e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2472 2256 e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe 30 PID 2472 wrote to memory of 3012 2472 mimbzfxhn.exe 31 PID 2472 wrote to memory of 3012 2472 mimbzfxhn.exe 31 PID 2472 wrote to memory of 3012 2472 mimbzfxhn.exe 31 PID 2472 wrote to memory of 3012 2472 mimbzfxhn.exe 31 PID 3012 wrote to memory of 3064 3012 mtztorbbc.exe 32 PID 3012 wrote to memory of 3064 3012 mtztorbbc.exe 32 PID 3012 wrote to memory of 3064 3012 mtztorbbc.exe 32 PID 3012 wrote to memory of 3064 3012 mtztorbbc.exe 32 PID 3064 wrote to memory of 2772 3064 jyutuymfc.exe 33 PID 3064 wrote to memory of 2772 3064 jyutuymfc.exe 33 PID 3064 wrote to memory of 2772 3064 jyutuymfc.exe 33 PID 3064 wrote to memory of 2772 3064 jyutuymfc.exe 33 PID 2772 wrote to memory of 2576 2772 afurzndwb.exe 34 PID 2772 wrote to memory of 2576 2772 afurzndwb.exe 34 PID 2772 wrote to memory of 2576 2772 afurzndwb.exe 34 PID 2772 wrote to memory of 2576 2772 afurzndwb.exe 34 PID 2576 wrote to memory of 2092 2576 qjcmvaarq.exe 35 PID 2576 wrote to memory of 2092 2576 qjcmvaarq.exe 35 PID 2576 wrote to memory of 2092 2576 qjcmvaarq.exe 35 PID 2576 wrote to memory of 2092 2576 qjcmvaarq.exe 35 PID 2092 wrote to memory of 1232 2092 yrpeppjbq.exe 36 PID 2092 wrote to memory of 1232 2092 yrpeppjbq.exe 36 PID 2092 wrote to memory of 1232 2092 yrpeppjbq.exe 36 PID 2092 wrote to memory of 1232 2092 yrpeppjbq.exe 36 PID 1232 wrote to memory of 2292 1232 fvzrgamrd.exe 37 PID 1232 wrote to memory of 2292 1232 fvzrgamrd.exe 37 PID 1232 wrote to memory of 2292 1232 fvzrgamrd.exe 37 PID 1232 wrote to memory of 2292 1232 fvzrgamrd.exe 37 PID 2292 wrote to memory of 1996 2292 moywvuulx.exe 38 PID 2292 wrote to memory of 1996 2292 moywvuulx.exe 38 PID 2292 wrote to memory of 1996 2292 moywvuulx.exe 38 PID 2292 wrote to memory of 1996 2292 moywvuulx.exe 38 PID 1996 wrote to memory of 2176 1996 rtsepehtr.exe 39 PID 1996 wrote to memory of 2176 1996 rtsepehtr.exe 39 PID 1996 wrote to memory of 2176 1996 rtsepehtr.exe 39 PID 1996 wrote to memory of 2176 1996 rtsepehtr.exe 39 PID 2176 wrote to memory of 944 2176 evymaqlvw.exe 40 PID 2176 wrote to memory of 944 2176 evymaqlvw.exe 40 PID 2176 wrote to memory of 944 2176 evymaqlvw.exe 40 PID 2176 wrote to memory of 944 2176 evymaqlvw.exe 40 PID 944 wrote to memory of 888 944 gfxjsmttl.exe 41 PID 944 wrote to memory of 888 944 gfxjsmttl.exe 41 PID 944 wrote to memory of 888 944 gfxjsmttl.exe 41 PID 944 wrote to memory of 888 944 gfxjsmttl.exe 41 PID 888 wrote to memory of 1668 888 qebhdlbtl.exe 42 PID 888 wrote to memory of 1668 888 qebhdlbtl.exe 42 PID 888 wrote to memory of 1668 888 qebhdlbtl.exe 42 PID 888 wrote to memory of 1668 888 qebhdlbtl.exe 42 PID 1668 wrote to memory of 2632 1668 twtwvhjrs.exe 43 PID 1668 wrote to memory of 2632 1668 twtwvhjrs.exe 43 PID 1668 wrote to memory of 2632 1668 twtwvhjrs.exe 43 PID 1668 wrote to memory of 2632 1668 twtwvhjrs.exe 43 PID 2632 wrote to memory of 2680 2632 dyqhqcptf.exe 44 PID 2632 wrote to memory of 2680 2632 dyqhqcptf.exe 44 PID 2632 wrote to memory of 2680 2632 dyqhqcptf.exe 44 PID 2632 wrote to memory of 2680 2632 dyqhqcptf.exe 44 PID 2680 wrote to memory of 2056 2680 hlcpjmucz.exe 45 PID 2680 wrote to memory of 2056 2680 hlcpjmucz.exe 45 PID 2680 wrote to memory of 2056 2680 hlcpjmucz.exe 45 PID 2680 wrote to memory of 2056 2680 hlcpjmucz.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\mimbzfxhn.exeC:\Windows\system32\mimbzfxhn.exe 492 "C:\Users\Admin\AppData\Local\Temp\e588a4a56bce437884b964d9064ba7c6_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\mtztorbbc.exeC:\Windows\system32\mtztorbbc.exe 552 "C:\Windows\SysWOW64\mimbzfxhn.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\jyutuymfc.exeC:\Windows\system32\jyutuymfc.exe 500 "C:\Windows\SysWOW64\mtztorbbc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\afurzndwb.exeC:\Windows\system32\afurzndwb.exe 468 "C:\Windows\SysWOW64\jyutuymfc.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\qjcmvaarq.exeC:\Windows\system32\qjcmvaarq.exe 560 "C:\Windows\SysWOW64\afurzndwb.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\yrpeppjbq.exeC:\Windows\system32\yrpeppjbq.exe 524 "C:\Windows\SysWOW64\qjcmvaarq.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\fvzrgamrd.exeC:\Windows\system32\fvzrgamrd.exe 568 "C:\Windows\SysWOW64\yrpeppjbq.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\moywvuulx.exeC:\Windows\system32\moywvuulx.exe 572 "C:\Windows\SysWOW64\fvzrgamrd.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\rtsepehtr.exeC:\Windows\system32\rtsepehtr.exe 576 "C:\Windows\SysWOW64\moywvuulx.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\evymaqlvw.exeC:\Windows\system32\evymaqlvw.exe 580 "C:\Windows\SysWOW64\rtsepehtr.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\gfxjsmttl.exeC:\Windows\system32\gfxjsmttl.exe 584 "C:\Windows\SysWOW64\evymaqlvw.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\qebhdlbtl.exeC:\Windows\system32\qebhdlbtl.exe 588 "C:\Windows\SysWOW64\gfxjsmttl.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\twtwvhjrs.exeC:\Windows\system32\twtwvhjrs.exe 592 "C:\Windows\SysWOW64\qebhdlbtl.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\dyqhqcptf.exeC:\Windows\system32\dyqhqcptf.exe 596 "C:\Windows\SysWOW64\twtwvhjrs.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\hlcpjmucz.exeC:\Windows\system32\hlcpjmucz.exe 600 "C:\Windows\SysWOW64\dyqhqcptf.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\crqzzedyt.exeC:\Windows\system32\crqzzedyt.exe 604 "C:\Windows\SysWOW64\hlcpjmucz.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2056 -
C:\Windows\SysWOW64\eiehxiqtz.exeC:\Windows\system32\eiehxiqtz.exe 608 "C:\Windows\SysWOW64\crqzzedyt.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1908 -
C:\Windows\SysWOW64\paumbykwa.exeC:\Windows\system32\paumbykwa.exe 612 "C:\Windows\SysWOW64\eiehxiqtz.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2116 -
C:\Windows\SysWOW64\rwxpwzzwu.exeC:\Windows\system32\rwxpwzzwu.exe 616 "C:\Windows\SysWOW64\paumbykwa.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2928 -
C:\Windows\SysWOW64\yahcgkcmp.exeC:\Windows\system32\yahcgkcmp.exe 620 "C:\Windows\SysWOW64\rwxpwzzwu.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\dfskzuhub.exeC:\Windows\system32\dfskzuhub.exe 624 "C:\Windows\SysWOW64\yahcgkcmp.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2976 -
C:\Windows\SysWOW64\neehrsoub.exeC:\Windows\system32\neehrsoub.exe 628 "C:\Windows\SysWOW64\dfskzuhub.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Windows\SysWOW64\qwwxkowsi.exeC:\Windows\system32\qwwxkowsi.exe 632 "C:\Windows\SysWOW64\neehrsoub.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896 -
C:\Windows\SysWOW64\aviuunesq.exeC:\Windows\system32\aviuunesq.exe 636 "C:\Windows\SysWOW64\qwwxkowsi.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2900 -
C:\Windows\SysWOW64\cilfpnklk.exeC:\Windows\system32\cilfpnklk.exe 640 "C:\Windows\SysWOW64\aviuunesq.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3048 -
C:\Windows\SysWOW64\jnnkhzvaw.exeC:\Windows\system32\jnnkhzvaw.exe 644 "C:\Windows\SysWOW64\cilfpnklk.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:924 -
C:\Windows\SysWOW64\ozhssiajr.exeC:\Windows\system32\ozhssiajr.exe 648 "C:\Windows\SysWOW64\jnnkhzvaw.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2216 -
C:\Windows\SysWOW64\yytpkhhir.exeC:\Windows\system32\yytpkhhir.exe 652 "C:\Windows\SysWOW64\ozhssiajr.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2496 -
C:\Windows\SysWOW64\dsbxjrrnk.exeC:\Windows\system32\dsbxjrrnk.exe 656 "C:\Windows\SysWOW64\yytpkhhir.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1244 -
C:\Windows\SysWOW64\nkqvoitql.exeC:\Windows\system32\nkqvoitql.exe 660 "C:\Windows\SysWOW64\dsbxjrrnk.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:816 -
C:\Windows\SysWOW64\sbvqkwfts.exeC:\Windows\system32\sbvqkwfts.exe 664 "C:\Windows\SysWOW64\nkqvoitql.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1016 -
C:\Windows\SysWOW64\cwoarqgyf.exeC:\Windows\system32\cwoarqgyf.exe 668 "C:\Windows\SysWOW64\sbvqkwfts.exe"33⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\evcqpvttl.exeC:\Windows\system32\evcqpvttl.exe 672 "C:\Windows\SysWOW64\cwoarqgyf.exe"34⤵
- Executes dropped EXE
PID:1044 -
C:\Windows\SysWOW64\ouonaubtl.exeC:\Windows\system32\ouonaubtl.exe 676 "C:\Windows\SysWOW64\evcqpvttl.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2288 -
C:\Windows\SysWOW64\wvnnoaxgm.exeC:\Windows\system32\wvnnoaxgm.exe 680 "C:\Windows\SysWOW64\ouonaubtl.exe"36⤵
- Executes dropped EXE
PID:2876 -
C:\Windows\SysWOW64\bdkikgirt.exeC:\Windows\system32\bdkikgirt.exe 684 "C:\Windows\SysWOW64\wvnnoaxgm.exe"37⤵
- Executes dropped EXE
PID:948 -
C:\Windows\SysWOW64\gtpdguuuz.exeC:\Windows\system32\gtpdguuuz.exe 688 "C:\Windows\SysWOW64\bdkikgirt.exe"38⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\nyziqgeju.exeC:\Windows\system32\nyziqgeju.exe 692 "C:\Windows\SysWOW64\gtpdguuuz.exe"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\vcjvhzhzh.exeC:\Windows\system32\vcjvhzhzh.exe 696 "C:\Windows\SysWOW64\nyziqgeju.exe"40⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\fxcgptiev.exeC:\Windows\system32\fxcgptiev.exe 700 "C:\Windows\SysWOW64\vcjvhzhzh.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2800 -
C:\Windows\SysWOW64\nfxgbjrou.exeC:\Windows\system32\nfxgbjrou.exe 704 "C:\Windows\SysWOW64\fxcgptiev.exe"42⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\unlyvybhb.exeC:\Windows\system32\unlyvybhb.exe 708 "C:\Windows\SysWOW64\nfxgbjrou.exe"43⤵
- Executes dropped EXE
PID:1072 -
C:\Windows\SysWOW64\emxvgxigc.exeC:\Windows\system32\emxvgxigc.exe 712 "C:\Windows\SysWOW64\unlyvybhb.exe"44⤵
- Executes dropped EXE
PID:436 -
C:\Windows\SysWOW64\mqhjxilwo.exeC:\Windows\system32\mqhjxilwo.exe 716 "C:\Windows\SysWOW64\emxvgxigc.exe"45⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\tjgouktji.exeC:\Windows\system32\tjgouktji.exe 720 "C:\Windows\SysWOW64\mqhjxilwo.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\etvtzavlj.exeC:\Windows\system32\etvtzavlj.exe 724 "C:\Windows\SysWOW64\tjgouktji.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\oazrjydlk.exeC:\Windows\system32\oazrjydlk.exe 728 "C:\Windows\SysWOW64\etvtzavlj.exe"48⤵
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\vivjdomdj.exeC:\Windows\system32\vivjdomdj.exe 732 "C:\Windows\SysWOW64\oazrjydlk.exe"49⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\anorxyrmd.exeC:\Windows\system32\anorxyrmd.exe 736 "C:\Windows\SysWOW64\vivjdomdj.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3120 -
C:\Windows\SysWOW64\hvcrjnbwl.exeC:\Windows\system32\hvcrjnbwl.exe 740 "C:\Windows\SysWOW64\anorxyrmd.exe"51⤵
- Executes dropped EXE
PID:3180 -
C:\Windows\SysWOW64\sqdbrhbby.exeC:\Windows\system32\sqdbrhbby.exe 744 "C:\Windows\SysWOW64\hvcrjnbwl.exe"52⤵
- Executes dropped EXE
PID:3240 -
C:\Windows\SysWOW64\oslbpsmgr.exeC:\Windows\system32\oslbpsmgr.exe 748 "C:\Windows\SysWOW64\sqdbrhbby.exe"53⤵
- Executes dropped EXE
PID:3300 -
C:\Windows\SysWOW64\zcagciobs.exeC:\Windows\system32\zcagciobs.exe 752 "C:\Windows\SysWOW64\oslbpsmgr.exe"54⤵
- Executes dropped EXE
PID:3360 -
C:\Windows\SysWOW64\dwqgtaggm.exeC:\Windows\system32\dwqgtaggm.exe 756 "C:\Windows\SysWOW64\zcagciobs.exe"55⤵
- Executes dropped EXE
PID:3428 -
C:\Windows\SysWOW64\qjjobrpkg.exeC:\Windows\system32\qjjobrpkg.exe 760 "C:\Windows\SysWOW64\dwqgtaggm.exe"56⤵
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\ajnmlqojg.exeC:\Windows\system32\ajnmlqojg.exe 764 "C:\Windows\SysWOW64\qjjobrpkg.exe"57⤵
- Executes dropped EXE
PID:3548 -
C:\Windows\SysWOW64\hqimffytg.exeC:\Windows\system32\hqimffytg.exe 768 "C:\Windows\SysWOW64\ajnmlqojg.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\mgfzbtjem.exeC:\Windows\system32\mgfzbtjem.exe 772 "C:\Windows\SysWOW64\hqimffytg.exe"59⤵
- Executes dropped EXE
PID:3668 -
C:\Windows\SysWOW64\wcgrjokba.exeC:\Windows\system32\wcgrjokba.exe 776 "C:\Windows\SysWOW64\mgfzbtjem.exe"60⤵
- Executes dropped EXE
PID:3732 -
C:\Windows\SysWOW64\hyhcritzo.exeC:\Windows\system32\hyhcritzo.exe 780 "C:\Windows\SysWOW64\wcgrjokba.exe"61⤵
- Executes dropped EXE
PID:3792 -
C:\Windows\SysWOW64\lrpkqsdeh.exeC:\Windows\system32\lrpkqsdeh.exe 784 "C:\Windows\SysWOW64\hyhcritzo.exe"62⤵
- Executes dropped EXE
PID:3852 -
C:\Windows\SysWOW64\qeijjcimb.exeC:\Windows\system32\qeijjcimb.exe 788 "C:\Windows\SysWOW64\lrpkqsdeh.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3912 -
C:\Windows\SysWOW64\yxhkpjmhb.exeC:\Windows\system32\yxhkpjmhb.exe 792 "C:\Windows\SysWOW64\qeijjcimb.exe"64⤵
- Executes dropped EXE
PID:3980 -
C:\Windows\SysWOW64\awvznozch.exeC:\Windows\system32\awvznozch.exe 472 "C:\Windows\SysWOW64\yxhkpjmhb.exe"65⤵
- Executes dropped EXE
PID:4048 -
C:\Windows\SysWOW64\ixuzcudyq.exeC:\Windows\system32\ixuzcudyq.exe 800 "C:\Windows\SysWOW64\awvznozch.exe"66⤵
- Drops file in System32 directory
PID:1724 -
C:\Windows\SysWOW64\swyxmtlxq.exeC:\Windows\system32\swyxmtlxq.exe 808 "C:\Windows\SysWOW64\ixuzcudyq.exe"67⤵PID:2668
-
C:\Windows\SysWOW64\cyohhwrrd.exeC:\Windows\system32\cyohhwrrd.exe 812 "C:\Windows\SysWOW64\swyxmtlxq.exe"68⤵PID:3128
-
C:\Windows\SysWOW64\hiecqcxxk.exeC:\Windows\system32\hiecqcxxk.exe 804 "C:\Windows\SysWOW64\cyohhwrrd.exe"69⤵
- System Location Discovery: System Language Discovery
PID:3200 -
C:\Windows\SysWOW64\rhiziaexk.exeC:\Windows\system32\rhiziaexk.exe 828 "C:\Windows\SysWOW64\hiecqcxxk.exe"70⤵
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\ylsnsmhnx.exeC:\Windows\system32\ylsnsmhnx.exe 820 "C:\Windows\SysWOW64\rhiziaexk.exe"71⤵PID:1976
-
C:\Windows\SysWOW64\iztkqtujw.exeC:\Windows\system32\iztkqtujw.exe 824 "C:\Windows\SysWOW64\ylsnsmhnx.exe"72⤵PID:324
-
C:\Windows\SysWOW64\tjihujwmx.exeC:\Windows\system32\tjihujwmx.exe 816 "C:\Windows\SysWOW64\iztkqtujw.exe"73⤵PID:2444
-
C:\Windows\SysWOW64\dqnnfiwmy.exeC:\Windows\system32\dqnnfiwmy.exe 508 "C:\Windows\SysWOW64\tjihujwmx.exe"74⤵
- Drops file in System32 directory
PID:3320 -
C:\Windows\SysWOW64\kblsccmys.exeC:\Windows\system32\kblsccmys.exe 840 "C:\Windows\SysWOW64\dqnnfiwmy.exe"75⤵PID:2480
-
C:\Windows\SysWOW64\xsovlkkfs.exeC:\Windows\system32\xsovlkkfs.exe 496 "C:\Windows\SysWOW64\kblsccmys.exe"76⤵PID:3424
-
C:\Windows\SysWOW64\hzssvjrfs.exeC:\Windows\system32\hzssvjrfs.exe 852 "C:\Windows\SysWOW64\xsovlkkfs.exe"77⤵PID:1428
-
C:\Windows\SysWOW64\rutdldskg.exeC:\Windows\system32\rutdldskg.exe 864 "C:\Windows\SysWOW64\hzssvjrfs.exe"78⤵PID:3624
-
C:\Windows\SysWOW64\bxinygget.exeC:\Windows\system32\bxinygget.exe 848 "C:\Windows\SysWOW64\rutdldskg.exe"79⤵PID:2816
-
C:\Windows\SysWOW64\mtjffbhcg.exeC:\Windows\system32\mtjffbhcg.exe 844 "C:\Windows\SysWOW64\bxinygget.exe"80⤵PID:3804
-
C:\Windows\SysWOW64\teikcupws.exeC:\Windows\system32\teikcupws.exe 856 "C:\Windows\SysWOW64\mtjffbhcg.exe"81⤵PID:548
-
C:\Windows\SysWOW64\gzsaiyobh.exeC:\Windows\system32\gzsaiyobh.exe 880 "C:\Windows\SysWOW64\teikcupws.exe"82⤵PID:2608
-
C:\Windows\SysWOW64\lhwneeamn.exeC:\Windows\system32\lhwneeamn.exe 860 "C:\Windows\SysWOW64\gzsaiyobh.exe"83⤵
- Drops file in System32 directory
PID:1132 -
C:\Windows\SysWOW64\axivlwdah.exeC:\Windows\system32\axivlwdah.exe 892 "C:\Windows\SysWOW64\lhwneeamn.exe"84⤵PID:1968
-
C:\Windows\SysWOW64\kwusvvlah.exeC:\Windows\system32\kwusvvlah.exe 872 "C:\Windows\SysWOW64\axivlwdah.exe"85⤵PID:2364
-
C:\Windows\SysWOW64\mviitryvv.exeC:\Windows\system32\mviitryvv.exe 884 "C:\Windows\SysWOW64\kwusvvlah.exe"86⤵PID:2184
-
C:\Windows\SysWOW64\ritqmbddh.exeC:\Windows\system32\ritqmbddh.exe 876 "C:\Windows\SysWOW64\mviitryvv.exe"87⤵PID:2724
-
C:\Windows\SysWOW64\eywtvjili.exeC:\Windows\system32\eywtvjili.exe 540 "C:\Windows\SysWOW64\ritqmbddh.exe"88⤵PID:2192
-
C:\Windows\SysWOW64\mdggnulad.exeC:\Windows\system32\mdggnulad.exe 896 "C:\Windows\SysWOW64\eywtvjili.exe"89⤵
- System Location Discovery: System Language Discovery
PID:1168 -
C:\Windows\SysWOW64\loflcotvp.exeC:\Windows\system32\loflcotvp.exe 908 "C:\Windows\SysWOW64\mdggnulad.exe"90⤵
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\toelqdxip.exeC:\Windows\system32\toelqdxip.exe 888 "C:\Windows\SysWOW64\loflcotvp.exe"91⤵PID:1160
-
C:\Windows\SysWOW64\gfzozddqq.exeC:\Windows\system32\gfzozddqq.exe 920 "C:\Windows\SysWOW64\toelqdxip.exe"92⤵PID:3220
-
C:\Windows\SysWOW64\nnuglamix.exeC:\Windows\system32\nnuglamix.exe 900 "C:\Windows\SysWOW64\gfzozddqq.exe"93⤵
- System Location Discovery: System Language Discovery
PID:3876 -
C:\Windows\SysWOW64\alpjubspq.exeC:\Windows\system32\alpjubspq.exe 924 "C:\Windows\SysWOW64\nnuglamix.exe"94⤵PID:3856
-
C:\Windows\SysWOW64\kkbgmzrpq.exeC:\Windows\system32\kkbgmzrpq.exe 912 "C:\Windows\SysWOW64\alpjubspq.exe"95⤵PID:2960
-
C:\Windows\SysWOW64\ujfdwyzoq.exeC:\Windows\system32\ujfdwyzoq.exe 916 "C:\Windows\SysWOW64\kkbgmzrpq.exe"96⤵PID:2580
-
C:\Windows\SysWOW64\eijbhxhoz.exeC:\Windows\system32\eijbhxhoz.exe 936 "C:\Windows\SysWOW64\ujfdwyzoq.exe"97⤵PID:3816
-
C:\Windows\SysWOW64\othlcanil.exeC:\Windows\system32\othlcanil.exe 928 "C:\Windows\SysWOW64\eijbhxhoz.exe"98⤵PID:3384
-
C:\Windows\SysWOW64\wbulopwal.exeC:\Windows\system32\wbulopwal.exe 932 "C:\Windows\SysWOW64\othlcanil.exe"99⤵PID:1484
-
C:\Windows\SysWOW64\gayjhoeal.exeC:\Windows\system32\gayjhoeal.exe 940 "C:\Windows\SysWOW64\wbulopwal.exe"100⤵PID:912
-
C:\Windows\SysWOW64\qzlgrnlal.exeC:\Windows\system32\qzlgrnlal.exe 944 "C:\Windows\SysWOW64\gayjhoeal.exe"101⤵PID:4076
-
C:\Windows\SysWOW64\xpyylcnks.exeC:\Windows\system32\xpyylcnks.exe 564 "C:\Windows\SysWOW64\qzlgrnlal.exe"102⤵PID:4044
-
C:\Windows\SysWOW64\cqobuitya.exeC:\Windows\system32\cqobuitya.exe 956 "C:\Windows\SysWOW64\xpyylcnks.exe"103⤵
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Windows\SysWOW64\psujnuxzf.exeC:\Windows\system32\psujnuxzf.exe 532 "C:\Windows\SysWOW64\cqobuitya.exe"104⤵PID:3116
-
C:\Windows\SysWOW64\zrygytfzf.exeC:\Windows\system32\zrygytfzf.exe 952 "C:\Windows\SysWOW64\psujnuxzf.exe"105⤵PID:3196
-
C:\Windows\SysWOW64\eesorvsha.exeC:\Windows\system32\eesorvsha.exe 968 "C:\Windows\SysWOW64\zrygytfzf.exe"106⤵PID:1684
-
C:\Windows\SysWOW64\ryyechwrn.exeC:\Windows\system32\ryyechwrn.exe 972 "C:\Windows\SysWOW64\eesorvsha.exe"107⤵PID:1608
-
C:\Windows\SysWOW64\btzokcxob.exeC:\Windows\system32\btzokcxob.exe 964 "C:\Windows\SysWOW64\ryyechwrn.exe"108⤵PID:3020
-
C:\Windows\SysWOW64\osurskcvb.exeC:\Windows\system32\osurskcvb.exe 976 "C:\Windows\SysWOW64\btzokcxob.exe"109⤵PID:1688
-
C:\Windows\SysWOW64\vaprnzmnb.exeC:\Windows\system32\vaprnzmnb.exe 520 "C:\Windows\SysWOW64\osurskcvb.exe"110⤵
- System Location Discovery: System Language Discovery
PID:3368 -
C:\Windows\SysWOW64\iuvzyeqxo.exeC:\Windows\system32\iuvzyeqxo.exe 988 "C:\Windows\SysWOW64\vaprnzmnb.exe"111⤵PID:2968
-
C:\Windows\SysWOW64\qyxmpxtnb.exeC:\Windows\system32\qyxmpxtnb.exe 980 "C:\Windows\SysWOW64\iuvzyeqxo.exe"112⤵PID:1600
-
C:\Windows\SysWOW64\calcbbxop.exeC:\Windows\system32\calcbbxop.exe 992 "C:\Windows\SysWOW64\qyxmpxtnb.exe"113⤵PID:3508
-
C:\Windows\SysWOW64\ibuxjhdcw.exeC:\Windows\system32\ibuxjhdcw.exe 512 "C:\Windows\SysWOW64\calcbbxop.exe"114⤵PID:3688
-
C:\Windows\SysWOW64\amhpredbd.exeC:\Windows\system32\amhpredbd.exe 1008 "C:\Windows\SysWOW64\ibuxjhdcw.exe"115⤵PID:3664
-
C:\Windows\SysWOW64\hfguoyunp.exeC:\Windows\system32\hfguoyunp.exe 996 "C:\Windows\SysWOW64\amhpredbd.exe"116⤵PID:1788
-
C:\Windows\SysWOW64\rbhmwsusc.exeC:\Windows\system32\rbhmwsusc.exe 1000 "C:\Windows\SysWOW64\hfguoyunp.exe"117⤵
- Drops file in System32 directory
PID:3864 -
C:\Windows\SysWOW64\erbpeaaad.exeC:\Windows\system32\erbpeaaad.exe 960 "C:\Windows\SysWOW64\rbhmwsusc.exe"118⤵PID:836
-
C:\Windows\SysWOW64\lcaubuimx.exeC:\Windows\system32\lcaubuimx.exe 1012 "C:\Windows\SysWOW64\erbpeaaad.exe"119⤵PID:2084
-
C:\Windows\SysWOW64\qpucvenuj.exeC:\Windows\system32\qpucvenuj.exe 536 "C:\Windows\SysWOW64\lcaubuimx.exe"120⤵PID:3976
-
C:\Windows\SysWOW64\jwwhsxpre.exeC:\Windows\system32\jwwhsxpre.exe 1028 "C:\Windows\SysWOW64\qpucvenuj.exe"121⤵PID:2908
-
C:\Windows\SysWOW64\tvifcwwqe.exeC:\Windows\system32\tvifcwwqe.exe 1040 "C:\Windows\SysWOW64\jwwhsxpre.exe"122⤵PID:2384
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-