Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 00:34
Static task
static1
Behavioral task
behavioral1
Sample
f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe
-
Size
105KB
-
MD5
f176a160ef615d6a7b2fd43bd4394107
-
SHA1
41c25402f03189d08f6a38c3036ee77addc59e02
-
SHA256
09a86ae227898e5193ff0b6ce5b69a264ae172018b84bda1f7f2b7f178c1d080
-
SHA512
b957795258af71352dfb2cc32e92723266b367d7b2023de8b6914ad9285695a8666ffb79e2f2d2dcedc780253e332ce3f4bfb14ec578490910a3e8a8e0210dc5
-
SSDEEP
3072:Mb6aHPq9QsKUBK0GaO4s6/pyu17Ys56zdD8:eaQsKYKLaRs6/Qs0e
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2876 msnnbtg.exe 3020 yiqqjbl.exe 2776 vnlqiiw.exe 2824 ptcllgl.exe 2180 hepltdl.exe 588 szivaym.exe 3064 ujhlsuu.exe 1444 rodlzjn.exe 1468 qgedtwx.exe 2464 vtxdmgb.exe 2288 supqijn.exe 560 xsmgwkm.exe 1668 rfrteqh.exe 524 jyalydr.exe 1088 yrxyirt.exe 2000 jjmenhv.exe 1168 ndumlzg.exe 1524 ynkjqph.exe 2988 iuohbop.exe 2204 pfvmyix.exe 972 xkfzpta.exe 2804 hmujcwo.exe 2768 uzezian.exe 2728 ezrpvlf.exe 2812 qtxegyj.exe 2192 qxjcdps.exe 2024 cnmelxx.exe 1972 qavurtw.exe 692 ucluqlo.exe 1536 ebqzakw.exe 2292 jgjhuma.exe 2252 mmpkjlc.exe 1992 bjxkvel.exe 704 gtgfmbr.exe 1836 syxhasc.exe 1572 velsqjd.exe 112 kyifzxf.exe 2036 rjhkoro.exe 1852 utyagnv.exe 2412 eozswie.exe 1156 ozodjll.exe 2652 rfdfzcm.exe 2840 bfhljbt.exe 1376 axivlwd.exe 2888 pxbiasl.exe 2752 zffflrt.exe 388 mviitry.exe 1736 oillosf.exe 3028 hqnytlg.exe 1172 ojmdimp.exe 2296 enmymrl.exe 2848 dztdjlc.exe 2308 iibyara.exe 2564 nnuglam.exe 2524 cjugxtw.exe 2520 fbudqpv.exe 1844 hlltild.exe 1540 ppwgzwo.exe 2160 wbulopw.exe 792 gayjhoe.exe 1052 lnsrayj.exe 2440 aulrzhm.exe 2676 navtvyx.exe 1240 xwwedty.exe -
Loads dropped DLL 64 IoCs
pid Process 2936 f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe 2936 f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe 2876 msnnbtg.exe 2876 msnnbtg.exe 3020 yiqqjbl.exe 3020 yiqqjbl.exe 2776 vnlqiiw.exe 2776 vnlqiiw.exe 2824 ptcllgl.exe 2824 ptcllgl.exe 2180 hepltdl.exe 2180 hepltdl.exe 588 szivaym.exe 588 szivaym.exe 3064 ujhlsuu.exe 3064 ujhlsuu.exe 1444 rodlzjn.exe 1444 rodlzjn.exe 1468 qgedtwx.exe 1468 qgedtwx.exe 2464 vtxdmgb.exe 2464 vtxdmgb.exe 2288 supqijn.exe 2288 supqijn.exe 560 xsmgwkm.exe 560 xsmgwkm.exe 1668 rfrteqh.exe 1668 rfrteqh.exe 524 jyalydr.exe 524 jyalydr.exe 1088 yrxyirt.exe 1088 yrxyirt.exe 2000 jjmenhv.exe 2000 jjmenhv.exe 1168 ndumlzg.exe 1168 ndumlzg.exe 1524 ynkjqph.exe 1524 ynkjqph.exe 2988 iuohbop.exe 2988 iuohbop.exe 2204 pfvmyix.exe 2204 pfvmyix.exe 972 xkfzpta.exe 972 xkfzpta.exe 2804 hmujcwo.exe 2804 hmujcwo.exe 2768 uzezian.exe 2768 uzezian.exe 2728 ezrpvlf.exe 2728 ezrpvlf.exe 2812 qtxegyj.exe 2812 qtxegyj.exe 2192 qxjcdps.exe 2192 qxjcdps.exe 2024 cnmelxx.exe 2024 cnmelxx.exe 1972 qavurtw.exe 1972 qavurtw.exe 692 ucluqlo.exe 692 ucluqlo.exe 1536 ebqzakw.exe 1536 ebqzakw.exe 2292 jgjhuma.exe 2292 jgjhuma.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\nvrxlzj.exe dscnywv.exe File created C:\Windows\SysWOW64\yzdgdiy.exe lbiduab.exe File created C:\Windows\SysWOW64\kqfrzfb.exe aqttohb.exe File opened for modification C:\Windows\SysWOW64\hdjxcvc.exe xexzkwc.exe File created C:\Windows\SysWOW64\lmazesn.exe byzboti.exe File opened for modification C:\Windows\SysWOW64\xykprtm.exe qqppxvd.exe File opened for modification C:\Windows\SysWOW64\mmpkjlc.exe jgjhuma.exe File created C:\Windows\SysWOW64\gayjhoe.exe wbulopw.exe File opened for modification C:\Windows\SysWOW64\clzsobq.exe sbjibyk.exe File created C:\Windows\SysWOW64\dxxxjth.exe qhdutlj.exe File opened for modification C:\Windows\SysWOW64\qteobhw.exe jayjenf.exe File created C:\Windows\SysWOW64\iuohbop.exe ynkjqph.exe File created C:\Windows\SysWOW64\wuugnzd.exe jzkqhvw.exe File opened for modification C:\Windows\SysWOW64\btmamfa.exe rnlcwyn.exe File opened for modification C:\Windows\SysWOW64\sedpgzq.exe lwpouko.exe File opened for modification C:\Windows\SysWOW64\rczrgyz.exe emeoqqb.exe File created C:\Windows\SysWOW64\sgumdgh.exe ihioliz.exe File opened for modification C:\Windows\SysWOW64\xwwedty.exe navtvyx.exe File created C:\Windows\SysWOW64\abhttgm.exe pfgjlld.exe File created C:\Windows\SysWOW64\byzboti.exe rczrgyz.exe File created C:\Windows\SysWOW64\mvmcaoh.exe cvifpph.exe File opened for modification C:\Windows\SysWOW64\ppwgzwo.exe hlltild.exe File created C:\Windows\SysWOW64\btddqjp.exe rjotdoj.exe File created C:\Windows\SysWOW64\buzvign.exe inwqdom.exe File created C:\Windows\SysWOW64\flvqevz.exe buzvign.exe File created C:\Windows\SysWOW64\zwkidds.exe mjbtxhl.exe File opened for modification C:\Windows\SysWOW64\dibawim.exe tymqbfg.exe File opened for modification C:\Windows\SysWOW64\wazxqwi.exe mbvafyb.exe File created C:\Windows\SysWOW64\lnsrayj.exe gayjhoe.exe File created C:\Windows\SysWOW64\hamvmnx.exe sstnfeu.exe File created C:\Windows\SysWOW64\pwfdicl.exe ftqtvzf.exe File created C:\Windows\SysWOW64\ghucmcp.exe wwfarzj.exe File opened for modification C:\Windows\SysWOW64\pkrvnub.exe eoqkxaa.exe File created C:\Windows\SysWOW64\ohynulz.exe hwaixrj.exe File opened for modification C:\Windows\SysWOW64\cwudnxv.exe vlvyqdf.exe File created C:\Windows\SysWOW64\rxpoiol.exe hmadvlf.exe File opened for modification C:\Windows\SysWOW64\nyhjrpc.exe drclgqu.exe File created C:\Windows\SysWOW64\iltwtuf.exe vfkbfdu.exe File opened for modification C:\Windows\SysWOW64\sguojof.exe iltwtuf.exe File opened for modification C:\Windows\SysWOW64\nltiumy.exe daeyhjk.exe File created C:\Windows\SysWOW64\pjlttbu.exe cwudnxv.exe File created C:\Windows\SysWOW64\aetwzut.exe mrkgtqu.exe File opened for modification C:\Windows\SysWOW64\gdkmdgc.exe rnzexxy.exe File opened for modification C:\Windows\SysWOW64\ytybnho.exe oqiqaei.exe File created C:\Windows\SysWOW64\ykckupg.exe odymjqg.exe File created C:\Windows\SysWOW64\atkleym.exe qykboel.exe File opened for modification C:\Windows\SysWOW64\fgcltne.exe vvmbgjp.exe File created C:\Windows\SysWOW64\jkxrzcm.exe zlttpdf.exe File opened for modification C:\Windows\SysWOW64\sgumdgh.exe ihioliz.exe File created C:\Windows\SysWOW64\qclplgk.exe edqmcyf.exe File created C:\Windows\SysWOW64\ealtgxh.exe ubzvwza.exe File opened for modification C:\Windows\SysWOW64\aeflfjm.exe qtqakgf.exe File opened for modification C:\Windows\SysWOW64\orxdpaz.exe dklxfbr.exe File opened for modification C:\Windows\SysWOW64\lxljqus.exe byzmfvt.exe File opened for modification C:\Windows\SysWOW64\tgqabmc.exe jhecqnu.exe File opened for modification C:\Windows\SysWOW64\wkzchaa.exe jtezysu.exe File created C:\Windows\SysWOW64\stpxsmv.exe ixomcru.exe File created C:\Windows\SysWOW64\nebtrsr.exe zrsdlpl.exe File created C:\Windows\SysWOW64\vhrkjby.exe iuzudyz.exe File created C:\Windows\SysWOW64\rcitbbr.exe hdwwrck.exe File opened for modification C:\Windows\SysWOW64\ogujofx.exe atktiby.exe File opened for modification C:\Windows\SysWOW64\cyubxzy.exe snfqkws.exe File created C:\Windows\SysWOW64\tyiuwlx.exe igtosvv.exe File opened for modification C:\Windows\SysWOW64\ncsnniu.exe iqzfuyp.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syxhasc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pgttmux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htjaksl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language metzgwd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzmothi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqlhyia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gtgfmbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qclplgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhvxint.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnojrbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oillosf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyyfmdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtxdmgb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebqzakw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khmofnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdjfpoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qalfccx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fgcltne.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language psxmqtx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language veqerjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ohynulz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sucbdqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lzuiikl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfgjlld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmpwtkd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcwgkbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgylech.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlfsrho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frqzqna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sguojof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mvtnukb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nojraak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bamxvdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ncbcfqf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szivaym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exlvfuc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ompdoye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwfarzj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khvvtea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsqbhmw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmtoulm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phezzkt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tajegfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kjupyqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbalgqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hohfezn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdntutj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yntklkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlwfiba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uihclhm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnlcwyn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxbuhac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgmfgtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afayqac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rsrtkgw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnsrayj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiujxnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xgrdewy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvajzms.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iloadtg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xwleeuv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language klhiaso.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ujsapiw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yakndlf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2876 2936 f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2876 2936 f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2876 2936 f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe 30 PID 2936 wrote to memory of 2876 2936 f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe 30 PID 2876 wrote to memory of 3020 2876 msnnbtg.exe 31 PID 2876 wrote to memory of 3020 2876 msnnbtg.exe 31 PID 2876 wrote to memory of 3020 2876 msnnbtg.exe 31 PID 2876 wrote to memory of 3020 2876 msnnbtg.exe 31 PID 3020 wrote to memory of 2776 3020 yiqqjbl.exe 32 PID 3020 wrote to memory of 2776 3020 yiqqjbl.exe 32 PID 3020 wrote to memory of 2776 3020 yiqqjbl.exe 32 PID 3020 wrote to memory of 2776 3020 yiqqjbl.exe 32 PID 2776 wrote to memory of 2824 2776 vnlqiiw.exe 33 PID 2776 wrote to memory of 2824 2776 vnlqiiw.exe 33 PID 2776 wrote to memory of 2824 2776 vnlqiiw.exe 33 PID 2776 wrote to memory of 2824 2776 vnlqiiw.exe 33 PID 2824 wrote to memory of 2180 2824 ptcllgl.exe 34 PID 2824 wrote to memory of 2180 2824 ptcllgl.exe 34 PID 2824 wrote to memory of 2180 2824 ptcllgl.exe 34 PID 2824 wrote to memory of 2180 2824 ptcllgl.exe 34 PID 2180 wrote to memory of 588 2180 hepltdl.exe 35 PID 2180 wrote to memory of 588 2180 hepltdl.exe 35 PID 2180 wrote to memory of 588 2180 hepltdl.exe 35 PID 2180 wrote to memory of 588 2180 hepltdl.exe 35 PID 588 wrote to memory of 3064 588 szivaym.exe 36 PID 588 wrote to memory of 3064 588 szivaym.exe 36 PID 588 wrote to memory of 3064 588 szivaym.exe 36 PID 588 wrote to memory of 3064 588 szivaym.exe 36 PID 3064 wrote to memory of 1444 3064 ujhlsuu.exe 37 PID 3064 wrote to memory of 1444 3064 ujhlsuu.exe 37 PID 3064 wrote to memory of 1444 3064 ujhlsuu.exe 37 PID 3064 wrote to memory of 1444 3064 ujhlsuu.exe 37 PID 1444 wrote to memory of 1468 1444 rodlzjn.exe 38 PID 1444 wrote to memory of 1468 1444 rodlzjn.exe 38 PID 1444 wrote to memory of 1468 1444 rodlzjn.exe 38 PID 1444 wrote to memory of 1468 1444 rodlzjn.exe 38 PID 1468 wrote to memory of 2464 1468 qgedtwx.exe 39 PID 1468 wrote to memory of 2464 1468 qgedtwx.exe 39 PID 1468 wrote to memory of 2464 1468 qgedtwx.exe 39 PID 1468 wrote to memory of 2464 1468 qgedtwx.exe 39 PID 2464 wrote to memory of 2288 2464 vtxdmgb.exe 40 PID 2464 wrote to memory of 2288 2464 vtxdmgb.exe 40 PID 2464 wrote to memory of 2288 2464 vtxdmgb.exe 40 PID 2464 wrote to memory of 2288 2464 vtxdmgb.exe 40 PID 2288 wrote to memory of 560 2288 supqijn.exe 41 PID 2288 wrote to memory of 560 2288 supqijn.exe 41 PID 2288 wrote to memory of 560 2288 supqijn.exe 41 PID 2288 wrote to memory of 560 2288 supqijn.exe 41 PID 560 wrote to memory of 1668 560 xsmgwkm.exe 42 PID 560 wrote to memory of 1668 560 xsmgwkm.exe 42 PID 560 wrote to memory of 1668 560 xsmgwkm.exe 42 PID 560 wrote to memory of 1668 560 xsmgwkm.exe 42 PID 1668 wrote to memory of 524 1668 rfrteqh.exe 43 PID 1668 wrote to memory of 524 1668 rfrteqh.exe 43 PID 1668 wrote to memory of 524 1668 rfrteqh.exe 43 PID 1668 wrote to memory of 524 1668 rfrteqh.exe 43 PID 524 wrote to memory of 1088 524 jyalydr.exe 44 PID 524 wrote to memory of 1088 524 jyalydr.exe 44 PID 524 wrote to memory of 1088 524 jyalydr.exe 44 PID 524 wrote to memory of 1088 524 jyalydr.exe 44 PID 1088 wrote to memory of 2000 1088 yrxyirt.exe 45 PID 1088 wrote to memory of 2000 1088 yrxyirt.exe 45 PID 1088 wrote to memory of 2000 1088 yrxyirt.exe 45 PID 1088 wrote to memory of 2000 1088 yrxyirt.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\msnnbtg.exeC:\Windows\system32\msnnbtg.exe 460 "C:\Users\Admin\AppData\Local\Temp\f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\yiqqjbl.exeC:\Windows\system32\yiqqjbl.exe 432 "C:\Windows\SysWOW64\msnnbtg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\vnlqiiw.exeC:\Windows\system32\vnlqiiw.exe 516 "C:\Windows\SysWOW64\yiqqjbl.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\ptcllgl.exeC:\Windows\system32\ptcllgl.exe 436 "C:\Windows\SysWOW64\vnlqiiw.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\hepltdl.exeC:\Windows\system32\hepltdl.exe 524 "C:\Windows\SysWOW64\ptcllgl.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\szivaym.exeC:\Windows\system32\szivaym.exe 440 "C:\Windows\SysWOW64\hepltdl.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\ujhlsuu.exeC:\Windows\system32\ujhlsuu.exe 532 "C:\Windows\SysWOW64\szivaym.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\rodlzjn.exeC:\Windows\system32\rodlzjn.exe 444 "C:\Windows\SysWOW64\ujhlsuu.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\qgedtwx.exeC:\Windows\system32\qgedtwx.exe 540 "C:\Windows\SysWOW64\rodlzjn.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\vtxdmgb.exeC:\Windows\system32\vtxdmgb.exe 448 "C:\Windows\SysWOW64\qgedtwx.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\supqijn.exeC:\Windows\system32\supqijn.exe 500 "C:\Windows\SysWOW64\vtxdmgb.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\xsmgwkm.exeC:\Windows\system32\xsmgwkm.exe 492 "C:\Windows\SysWOW64\supqijn.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\rfrteqh.exeC:\Windows\system32\rfrteqh.exe 560 "C:\Windows\SysWOW64\xsmgwkm.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\jyalydr.exeC:\Windows\system32\jyalydr.exe 452 "C:\Windows\SysWOW64\rfrteqh.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\yrxyirt.exeC:\Windows\system32\yrxyirt.exe 484 "C:\Windows\SysWOW64\jyalydr.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\jjmenhv.exeC:\Windows\system32\jjmenhv.exe 568 "C:\Windows\SysWOW64\yrxyirt.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2000 -
C:\Windows\SysWOW64\ndumlzg.exeC:\Windows\system32\ndumlzg.exe 520 "C:\Windows\SysWOW64\jjmenhv.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1168 -
C:\Windows\SysWOW64\ynkjqph.exeC:\Windows\system32\ynkjqph.exe 576 "C:\Windows\SysWOW64\ndumlzg.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1524 -
C:\Windows\SysWOW64\iuohbop.exeC:\Windows\system32\iuohbop.exe 580 "C:\Windows\SysWOW64\ynkjqph.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988 -
C:\Windows\SysWOW64\pfvmyix.exeC:\Windows\system32\pfvmyix.exe 456 "C:\Windows\SysWOW64\iuohbop.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2204 -
C:\Windows\SysWOW64\xkfzpta.exeC:\Windows\system32\xkfzpta.exe 592 "C:\Windows\SysWOW64\pfvmyix.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:972 -
C:\Windows\SysWOW64\hmujcwo.exeC:\Windows\system32\hmujcwo.exe 588 "C:\Windows\SysWOW64\xkfzpta.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2804 -
C:\Windows\SysWOW64\uzezian.exeC:\Windows\system32\uzezian.exe 596 "C:\Windows\SysWOW64\hmujcwo.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2768 -
C:\Windows\SysWOW64\ezrpvlf.exeC:\Windows\system32\ezrpvlf.exe 468 "C:\Windows\SysWOW64\uzezian.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728 -
C:\Windows\SysWOW64\qtxegyj.exeC:\Windows\system32\qtxegyj.exe 604 "C:\Windows\SysWOW64\ezrpvlf.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2812 -
C:\Windows\SysWOW64\qxjcdps.exeC:\Windows\system32\qxjcdps.exe 488 "C:\Windows\SysWOW64\qtxegyj.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Windows\SysWOW64\cnmelxx.exeC:\Windows\system32\cnmelxx.exe 612 "C:\Windows\SysWOW64\qxjcdps.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2024 -
C:\Windows\SysWOW64\qavurtw.exeC:\Windows\system32\qavurtw.exe 616 "C:\Windows\SysWOW64\cnmelxx.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Windows\SysWOW64\ucluqlo.exeC:\Windows\system32\ucluqlo.exe 620 "C:\Windows\SysWOW64\qavurtw.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:692 -
C:\Windows\SysWOW64\ebqzakw.exeC:\Windows\system32\ebqzakw.exe 536 "C:\Windows\SysWOW64\ucluqlo.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\SysWOW64\jgjhuma.exeC:\Windows\system32\jgjhuma.exe 628 "C:\Windows\SysWOW64\ebqzakw.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2292 -
C:\Windows\SysWOW64\mmpkjlc.exeC:\Windows\system32\mmpkjlc.exe 480 "C:\Windows\SysWOW64\jgjhuma.exe"33⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\bjxkvel.exeC:\Windows\system32\bjxkvel.exe 636 "C:\Windows\SysWOW64\mmpkjlc.exe"34⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\gtgfmbr.exeC:\Windows\system32\gtgfmbr.exe 476 "C:\Windows\SysWOW64\bjxkvel.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:704 -
C:\Windows\SysWOW64\syxhasc.exeC:\Windows\system32\syxhasc.exe 644 "C:\Windows\SysWOW64\gtgfmbr.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Windows\SysWOW64\velsqjd.exeC:\Windows\system32\velsqjd.exe 556 "C:\Windows\SysWOW64\syxhasc.exe"37⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\SysWOW64\kyifzxf.exeC:\Windows\system32\kyifzxf.exe 652 "C:\Windows\SysWOW64\velsqjd.exe"38⤵
- Executes dropped EXE
PID:112 -
C:\Windows\SysWOW64\rjhkoro.exeC:\Windows\system32\rjhkoro.exe 464 "C:\Windows\SysWOW64\kyifzxf.exe"39⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\utyagnv.exeC:\Windows\system32\utyagnv.exe 660 "C:\Windows\SysWOW64\rjhkoro.exe"40⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\eozswie.exeC:\Windows\system32\eozswie.exe 648 "C:\Windows\SysWOW64\utyagnv.exe"41⤵
- Executes dropped EXE
PID:2412 -
C:\Windows\SysWOW64\ozodjll.exeC:\Windows\system32\ozodjll.exe 668 "C:\Windows\SysWOW64\eozswie.exe"42⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\SysWOW64\rfdfzcm.exeC:\Windows\system32\rfdfzcm.exe 632 "C:\Windows\SysWOW64\ozodjll.exe"43⤵
- Executes dropped EXE
PID:2652 -
C:\Windows\SysWOW64\bfhljbt.exeC:\Windows\system32\bfhljbt.exe 676 "C:\Windows\SysWOW64\rfdfzcm.exe"44⤵
- Executes dropped EXE
PID:2840 -
C:\Windows\SysWOW64\axivlwd.exeC:\Windows\system32\axivlwd.exe 472 "C:\Windows\SysWOW64\bfhljbt.exe"45⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\pxbiasl.exeC:\Windows\system32\pxbiasl.exe 684 "C:\Windows\SysWOW64\axivlwd.exe"46⤵
- Executes dropped EXE
PID:2888 -
C:\Windows\SysWOW64\zffflrt.exeC:\Windows\system32\zffflrt.exe 688 "C:\Windows\SysWOW64\pxbiasl.exe"47⤵
- Executes dropped EXE
PID:2752 -
C:\Windows\SysWOW64\mviitry.exeC:\Windows\system32\mviitry.exe 692 "C:\Windows\SysWOW64\zffflrt.exe"48⤵
- Executes dropped EXE
PID:388 -
C:\Windows\SysWOW64\oillosf.exeC:\Windows\system32\oillosf.exe 496 "C:\Windows\SysWOW64\mviitry.exe"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\hqnytlg.exeC:\Windows\system32\hqnytlg.exe 700 "C:\Windows\SysWOW64\oillosf.exe"50⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\ojmdimp.exeC:\Windows\system32\ojmdimp.exe 720 "C:\Windows\SysWOW64\hqnytlg.exe"51⤵
- Executes dropped EXE
PID:1172 -
C:\Windows\SysWOW64\enmymrl.exeC:\Windows\system32\enmymrl.exe 704 "C:\Windows\SysWOW64\ojmdimp.exe"52⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\dztdjlc.exeC:\Windows\system32\dztdjlc.exe 712 "C:\Windows\SysWOW64\enmymrl.exe"53⤵
- Executes dropped EXE
PID:2848 -
C:\Windows\SysWOW64\iibyara.exeC:\Windows\system32\iibyara.exe 708 "C:\Windows\SysWOW64\dztdjlc.exe"54⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\nnuglam.exeC:\Windows\system32\nnuglam.exe 716 "C:\Windows\SysWOW64\iibyara.exe"55⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\cjugxtw.exeC:\Windows\system32\cjugxtw.exe 728 "C:\Windows\SysWOW64\nnuglam.exe"56⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\fbudqpv.exeC:\Windows\system32\fbudqpv.exe 508 "C:\Windows\SysWOW64\cjugxtw.exe"57⤵
- Executes dropped EXE
PID:2520 -
C:\Windows\SysWOW64\hlltild.exeC:\Windows\system32\hlltild.exe 736 "C:\Windows\SysWOW64\fbudqpv.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1844 -
C:\Windows\SysWOW64\ppwgzwo.exeC:\Windows\system32\ppwgzwo.exe 584 "C:\Windows\SysWOW64\hlltild.exe"59⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\wbulopw.exeC:\Windows\system32\wbulopw.exe 744 "C:\Windows\SysWOW64\ppwgzwo.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2160 -
C:\Windows\SysWOW64\gayjhoe.exeC:\Windows\system32\gayjhoe.exe 756 "C:\Windows\SysWOW64\wbulopw.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:792 -
C:\Windows\SysWOW64\lnsrayj.exeC:\Windows\system32\lnsrayj.exe 740 "C:\Windows\SysWOW64\gayjhoe.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1052 -
C:\Windows\SysWOW64\aulrzhm.exeC:\Windows\system32\aulrzhm.exe 572 "C:\Windows\SysWOW64\lnsrayj.exe"63⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\navtvyx.exeC:\Windows\system32\navtvyx.exe 752 "C:\Windows\SysWOW64\aulrzhm.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2676 -
C:\Windows\SysWOW64\xwwedty.exeC:\Windows\system32\xwwedty.exe 760 "C:\Windows\SysWOW64\navtvyx.exe"65⤵
- Executes dropped EXE
PID:1240 -
C:\Windows\SysWOW64\hdibnsg.exeC:\Windows\system32\hdibnsg.exe 772 "C:\Windows\SysWOW64\xwwedty.exe"66⤵PID:2664
-
C:\Windows\SysWOW64\sybudmg.exeC:\Windows\system32\sybudmg.exe 776 "C:\Windows\SysWOW64\hdibnsg.exe"67⤵PID:640
-
C:\Windows\SysWOW64\cbqeqpn.exeC:\Windows\system32\cbqeqpn.exe 768 "C:\Windows\SysWOW64\sybudmg.exe"68⤵PID:2756
-
C:\Windows\SysWOW64\jfajzap.exeC:\Windows\system32\jfajzap.exe 748 "C:\Windows\SysWOW64\cbqeqpn.exe"69⤵PID:2860
-
C:\Windows\SysWOW64\whgztnc.exeC:\Windows\system32\whgztnc.exe 780 "C:\Windows\SysWOW64\jfajzap.exe"70⤵PID:1660
-
C:\Windows\SysWOW64\edqmcyf.exeC:\Windows\system32\edqmcyf.exe 784 "C:\Windows\SysWOW64\whgztnc.exe"71⤵
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\qclplgk.exeC:\Windows\system32\qclplgk.exe 788 "C:\Windows\SysWOW64\edqmcyf.exe"72⤵
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Windows\SysWOW64\vsqbhmw.exeC:\Windows\system32\vsqbhmw.exe 792 "C:\Windows\SysWOW64\qclplgk.exe"73⤵
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\imwrsya.exeC:\Windows\system32\imwrsya.exe 796 "C:\Windows\SysWOW64\vsqbhmw.exe"74⤵PID:2092
-
C:\Windows\SysWOW64\pqgejkd.exeC:\Windows\system32\pqgejkd.exe 800 "C:\Windows\SysWOW64\imwrsya.exe"75⤵PID:1956
-
C:\Windows\SysWOW64\csmmvwh.exeC:\Windows\system32\csmmvwh.exe 804 "C:\Windows\SysWOW64\pqgejkd.exe"76⤵PID:1108
-
C:\Windows\SysWOW64\jaamplq.exeC:\Windows\system32\jaamplq.exe 808 "C:\Windows\SysWOW64\csmmvwh.exe"77⤵PID:1980
-
C:\Windows\SysWOW64\xnrcvpp.exeC:\Windows\system32\xnrcvpp.exe 812 "C:\Windows\SysWOW64\jaamplq.exe"78⤵PID:2280
-
C:\Windows\SysWOW64\hmvzfox.exeC:\Windows\system32\hmvzfox.exe 680 "C:\Windows\SysWOW64\xnrcvpp.exe"79⤵PID:1096
-
C:\Windows\SysWOW64\ourraeg.exeC:\Windows\system32\ourraeg.exe 820 "C:\Windows\SysWOW64\hmvzfox.exe"80⤵PID:900
-
C:\Windows\SysWOW64\ypskhyh.exeC:\Windows\system32\ypskhyh.exe 828 "C:\Windows\SysWOW64\ourraeg.exe"81⤵PID:236
-
C:\Windows\SysWOW64\idshxfu.exeC:\Windows\system32\idshxfu.exe 836 "C:\Windows\SysWOW64\ypskhyh.exe"82⤵PID:1472
-
C:\Windows\SysWOW64\tvifcww.exeC:\Windows\system32\tvifcww.exe 848 "C:\Windows\SysWOW64\idshxfu.exe"83⤵PID:2300
-
C:\Windows\SysWOW64\dvmcuue.exeC:\Windows\system32\dvmcuue.exe 824 "C:\Windows\SysWOW64\tvifcww.exe"84⤵PID:2132
-
C:\Windows\SysWOW64\ihgkowi.exeC:\Windows\system32\ihgkowi.exe 552 "C:\Windows\SysWOW64\dvmcuue.exe"85⤵PID:1700
-
C:\Windows\SysWOW64\rvgheev.exeC:\Windows\system32\rvgheev.exe 844 "C:\Windows\SysWOW64\ihgkowi.exe"86⤵PID:2364
-
C:\Windows\SysWOW64\zsquvpy.exeC:\Windows\system32\zsquvpy.exe 840 "C:\Windows\SysWOW64\rvgheev.exe"87⤵PID:2892
-
C:\Windows\SysWOW64\picuugc.exeC:\Windows\system32\picuugc.exe 852 "C:\Windows\SysWOW64\zsquvpy.exe"88⤵PID:2904
-
C:\Windows\SysWOW64\wppvowl.exeC:\Windows\system32\wppvowl.exe 856 "C:\Windows\SysWOW64\picuugc.exe"89⤵PID:2980
-
C:\Windows\SysWOW64\ganfbzs.exeC:\Windows\system32\ganfbzs.exe 860 "C:\Windows\SysWOW64\wppvowl.exe"90⤵PID:2944
-
C:\Windows\SysWOW64\qzrcuxz.exeC:\Windows\system32\qzrcuxz.exe 864 "C:\Windows\SysWOW64\ganfbzs.exe"91⤵PID:2908
-
C:\Windows\SysWOW64\dmiszby.exeC:\Windows\system32\dmiszby.exe 868 "C:\Windows\SysWOW64\qzrcuxz.exe"92⤵PID:2612
-
C:\Windows\SysWOW64\xloixyl.exeC:\Windows\system32\xloixyl.exe 548 "C:\Windows\SysWOW64\dmiszby.exe"93⤵PID:2800
-
C:\Windows\SysWOW64\qkrnczf.exeC:\Windows\system32\qkrnczf.exe 876 "C:\Windows\SysWOW64\xloixyl.exe"94⤵PID:3032
-
C:\Windows\SysWOW64\xdxsrtv.exeC:\Windows\system32\xdxsrtv.exe 764 "C:\Windows\SysWOW64\qkrnczf.exe"95⤵PID:2360
-
C:\Windows\SysWOW64\hvnywjp.exeC:\Windows\system32\hvnywjp.exe 892 "C:\Windows\SysWOW64\xdxsrtv.exe"96⤵PID:2108
-
C:\Windows\SysWOW64\rurvpix.exeC:\Windows\system32\rurvpix.exe 884 "C:\Windows\SysWOW64\hvnywjp.exe"97⤵PID:2808
-
C:\Windows\SysWOW64\cudszge.exeC:\Windows\system32\cudszge.exe 896 "C:\Windows\SysWOW64\rurvpix.exe"98⤵PID:2704
-
C:\Windows\SysWOW64\yyzsgox.exeC:\Windows\system32\yyzsgox.exe 504 "C:\Windows\SysWOW64\cudszge.exe"99⤵PID:2260
-
C:\Windows\SysWOW64\ookaeft.exeC:\Windows\system32\ookaeft.exe 900 "C:\Windows\SysWOW64\yyzsgox.exe"100⤵PID:2124
-
C:\Windows\SysWOW64\vzjfbzj.exeC:\Windows\system32\vzjfbzj.exe 904 "C:\Windows\SysWOW64\ookaeft.exe"101⤵PID:2304
-
C:\Windows\SysWOW64\ddtltkm.exeC:\Windows\system32\ddtltkm.exe 880 "C:\Windows\SysWOW64\vzjfbzj.exe"102⤵PID:2388
-
C:\Windows\SysWOW64\vlvyqdf.exeC:\Windows\system32\vlvyqdf.exe 916 "C:\Windows\SysWOW64\ddtltkm.exe"103⤵
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\cwudnxv.exeC:\Windows\system32\cwudnxv.exe 912 "C:\Windows\SysWOW64\vlvyqdf.exe"104⤵
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\pjlttbu.exeC:\Windows\system32\pjlttbu.exe 544 "C:\Windows\SysWOW64\cwudnxv.exe"105⤵PID:892
-
C:\Windows\SysWOW64\uzqoppg.exeC:\Windows\system32\uzqoppg.exe 924 "C:\Windows\SysWOW64\pjlttbu.exe"106⤵PID:936
-
C:\Windows\SysWOW64\hmadvlf.exeC:\Windows\system32\hmadvlf.exe 936 "C:\Windows\SysWOW64\uzqoppg.exe"107⤵
- Drops file in System32 directory
PID:2240 -
C:\Windows\SysWOW64\rxpoiol.exeC:\Windows\system32\rxpoiol.exe 928 "C:\Windows\SysWOW64\hmadvlf.exe"108⤵PID:884
-
C:\Windows\SysWOW64\bzmydrz.exeC:\Windows\system32\bzmydrz.exe 932 "C:\Windows\SysWOW64\rxpoiol.exe"109⤵PID:2920
-
C:\Windows\SysWOW64\rpyyciv.exeC:\Windows\system32\rpyyciv.exe 956 "C:\Windows\SysWOW64\bzmydrz.exe"110⤵PID:2372
-
C:\Windows\SysWOW64\bsnixej.exeC:\Windows\system32\bsnixej.exe 940 "C:\Windows\SysWOW64\rpyyciv.exe"111⤵PID:2380
-
C:\Windows\SysWOW64\akobryt.exeC:\Windows\system32\akobryt.exe 528 "C:\Windows\SysWOW64\bsnixej.exe"112⤵PID:3068
-
C:\Windows\SysWOW64\ymjengp.exeC:\Windows\system32\ymjengp.exe 948 "C:\Windows\SysWOW64\akobryt.exe"113⤵PID:2560
-
C:\Windows\SysWOW64\drclgqu.exeC:\Windows\system32\drclgqu.exe 960 "C:\Windows\SysWOW64\ymjengp.exe"114⤵
- Drops file in System32 directory
PID:568 -
C:\Windows\SysWOW64\nyhjrpc.exeC:\Windows\system32\nyhjrpc.exe 732 "C:\Windows\SysWOW64\drclgqu.exe"115⤵PID:2496
-
C:\Windows\SysWOW64\ujnooik.exeC:\Windows\system32\ujnooik.exe 964 "C:\Windows\SysWOW64\nyhjrpc.exe"116⤵PID:2508
-
C:\Windows\SysWOW64\efgyvdl.exeC:\Windows\system32\efgyvdl.exe 968 "C:\Windows\SysWOW64\ujnooik.exe"117⤵PID:2152
-
C:\Windows\SysWOW64\rhmohhx.exeC:\Windows\system32\rhmohhx.exe 972 "C:\Windows\SysWOW64\efgyvdl.exe"118⤵PID:2200
-
C:\Windows\SysWOW64\wiujxnv.exeC:\Windows\system32\wiujxnv.exe 976 "C:\Windows\SysWOW64\rhmohhx.exe"119⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\lfcjkfe.exeC:\Windows\system32\lfcjkfe.exe 996 "C:\Windows\SysWOW64\wiujxnv.exe"120⤵PID:2424
-
C:\Windows\SysWOW64\wadbrzf.exeC:\Windows\system32\wadbrzf.exe 988 "C:\Windows\SysWOW64\lfcjkfe.exe"121⤵PID:2932
-
C:\Windows\SysWOW64\jryeiik.exeC:\Windows\system32\jryeiik.exe 980 "C:\Windows\SysWOW64\wadbrzf.exe"122⤵PID:1464
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-