Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 10:09
Behavioral task
behavioral1
Sample
85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe
-
Size
452KB
-
MD5
85a9b80cf58ff00cbf501b77953bf31a
-
SHA1
c99282e2337d76dbbdd1194ed07b2abb33eddd70
-
SHA256
a6a9419dd8bc7a56eec6e3ff07ea0ebd933af587a76fd7c77b886353edbb1ac6
-
SHA512
e8f2899b7220a1855b9b5ad56ac99387db7cd1477b9ea04775277c5f18c173d350e22c13172ecc4b66bd60e61296221754c43b81803f4077e26bdcf52aced6da
-
SSDEEP
12288:zNo6BDYKR1kU+gLcnKNalKv1V0pjnGPzH:zNJkU+aqzAP0Nno
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 2080 yomustj.exe 2860 pclzcur.exe 2136 mpehvev.exe 2816 woiegdd.exe 2676 jedhoda.exe 2528 tpsrcgp.exe 1924 gckhpkn.exe 2844 dgfzosy.exe 2704 biackhu.exe 1280 abbueue.exe 2924 yyhcloi.exe 564 kanrxtm.exe 1580 xqiufbr.exe 400 cdbcydw.exe 1876 uddmejc.exe 1528 htgpmri.exe 768 rpzhcli.exe 2168 bdaxstw.exe 2420 otvzbtb.exe 2176 avjpmff.exe 3004 oisfaje.exe 2448 akyulor.exe 3052 knofzrx.exe 1652 xeqhhzc.exe 2752 kzaxndb.exe 2552 ufbnlko.exe 2588 hdvpukm.exe 2840 uuysctr.exe 3024 hstvlbx.exe 2776 ujoxtbu.exe 1944 buucqvl.exe 2892 qkgkpmg.exe 2716 xvfpmgx.exe 2504 kthsvoc.exe 532 xkcveoa.exe 804 kixymwf.exe 3036 xzaadfl.exe 2400 hntytey.exe 2876 udvsbmw.exe 572 huqvkub.exe 784 uslytvh.exe 1588 gjoabde.exe 2964 qxoyzkr.exe 2428 dojaisx.exe 1180 qmedqsc.exe 876 ddhgzba.exe 2960 qbcjijf.exe 2060 mgxboqy.exe 3056 zwsdxzw.exe 2784 evvggzb.exe 2632 rlpjohh.exe 1764 bzqgeou.exe 2004 oqljnxr.exe 2576 booddxx.exe 1148 nfjgmfd.exe 2796 avdjvna.exe 2896 kjeglmn.exe 1304 xihjtvt.exe 2144 kycmcdy.exe 440 xpwosdw.exe 2320 knzrblb.exe 1268 tbsgrtp.exe 1108 gsvjabu.exe 1448 tipmibs.exe -
Loads dropped DLL 64 IoCs
pid Process 2600 85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe 2600 85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe 2080 yomustj.exe 2080 yomustj.exe 2860 pclzcur.exe 2860 pclzcur.exe 2136 mpehvev.exe 2136 mpehvev.exe 2816 woiegdd.exe 2816 woiegdd.exe 2676 jedhoda.exe 2676 jedhoda.exe 2528 tpsrcgp.exe 2528 tpsrcgp.exe 1924 gckhpkn.exe 1924 gckhpkn.exe 2844 dgfzosy.exe 2844 dgfzosy.exe 2704 biackhu.exe 2704 biackhu.exe 1280 abbueue.exe 1280 abbueue.exe 2924 yyhcloi.exe 2924 yyhcloi.exe 564 kanrxtm.exe 564 kanrxtm.exe 1580 xqiufbr.exe 1580 xqiufbr.exe 400 cdbcydw.exe 400 cdbcydw.exe 1876 uddmejc.exe 1876 uddmejc.exe 1528 htgpmri.exe 1528 htgpmri.exe 768 rpzhcli.exe 768 rpzhcli.exe 2168 bdaxstw.exe 2168 bdaxstw.exe 2420 otvzbtb.exe 2420 otvzbtb.exe 2176 avjpmff.exe 2176 avjpmff.exe 3004 oisfaje.exe 3004 oisfaje.exe 2448 akyulor.exe 2448 akyulor.exe 3052 knofzrx.exe 3052 knofzrx.exe 1652 xeqhhzc.exe 1652 xeqhhzc.exe 2752 kzaxndb.exe 2752 kzaxndb.exe 2552 ufbnlko.exe 2552 ufbnlko.exe 2588 hdvpukm.exe 2588 hdvpukm.exe 2840 uuysctr.exe 2840 uuysctr.exe 3024 hstvlbx.exe 3024 hstvlbx.exe 2776 ujoxtbu.exe 2776 ujoxtbu.exe 1944 buucqvl.exe 1944 buucqvl.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ijldbjn.exe vtqasbh.exe File created C:\Windows\SysWOW64\tbsgrtp.exe knzrblb.exe File created C:\Windows\SysWOW64\xpkkfzr.exe kzphxrt.exe File created C:\Windows\SysWOW64\nzudafm.exe abrasxh.exe File opened for modification C:\Windows\SysWOW64\pxodzsp.exe cglirkk.exe File opened for modification C:\Windows\SysWOW64\bjxkvel.exe otdhnvf.exe File opened for modification C:\Windows\SysWOW64\tetzqyv.exe gnyxhqy.exe File created C:\Windows\SysWOW64\gmnjjxy.exe wymmkql.exe File created C:\Windows\SysWOW64\iixulma.exe vjcrceu.exe File opened for modification C:\Windows\SysWOW64\vbgswsi.exe izsllnd.exe File opened for modification C:\Windows\SysWOW64\kmptepz.exe xvvqnhu.exe File created C:\Windows\SysWOW64\zhkzhrq.exe mjpwyjk.exe File created C:\Windows\SysWOW64\axvybxc.exe nklbwtd.exe File created C:\Windows\SysWOW64\vivjdom.exe iksgvgh.exe File created C:\Windows\SysWOW64\poigwlv.exe gahryei.exe File created C:\Windows\SysWOW64\ftqmjbd.exe srkwyoz.exe File opened for modification C:\Windows\SysWOW64\vcucjaj.exe imraasd.exe File opened for modification C:\Windows\SysWOW64\trdowto.exe kdcygmb.exe File created C:\Windows\SysWOW64\ztmxbyx.exe mgdivcy.exe File opened for modification C:\Windows\SysWOW64\jflnzkd.exe woitqcx.exe File opened for modification C:\Windows\SysWOW64\sfxmcuc.exe ichbpqo.exe File created C:\Windows\SysWOW64\mmfvund.exe dgexenq.exe File opened for modification C:\Windows\SysWOW64\mynbpsv.exe zhkzhrq.exe File opened for modification C:\Windows\SysWOW64\lnlybzk.exe ypivtrf.exe File created C:\Windows\SysWOW64\zyxejoa.exe macbaou.exe File opened for modification C:\Windows\SysWOW64\oysinaz.exe bayfest.exe File created C:\Windows\SysWOW64\ldhxzlx.exe bpghjek.exe File opened for modification C:\Windows\SysWOW64\ldhxzlx.exe bpghjek.exe File opened for modification C:\Windows\SysWOW64\lkxcrca.exe ytcaitd.exe File created C:\Windows\SysWOW64\hntytey.exe xzaadfl.exe File created C:\Windows\SysWOW64\mynbpsv.exe zhkzhrq.exe File created C:\Windows\SysWOW64\xmozkiq.exe kotwbas.exe File created C:\Windows\SysWOW64\cglirkk.exe qeftfxg.exe File opened for modification C:\Windows\SysWOW64\zjzzsgp.exe mhtjgtk.exe File created C:\Windows\SysWOW64\fsugqqm.exe sczdhho.exe File opened for modification C:\Windows\SysWOW64\ddhgzba.exe qmedqsc.exe File created C:\Windows\SysWOW64\oewloee.exe bgbifwy.exe File created C:\Windows\SysWOW64\vsxntii.exe iuckkik.exe File opened for modification C:\Windows\SysWOW64\qvmivyx.exe dxjfmps.exe File opened for modification C:\Windows\SysWOW64\snbyqzd.exe fohvhrx.exe File created C:\Windows\SysWOW64\zwsdxzw.exe mgxboqy.exe File opened for modification C:\Windows\SysWOW64\vdnuclo.exe iekrtdq.exe File created C:\Windows\SysWOW64\jnsylhx.exe woxwdgs.exe File opened for modification C:\Windows\SysWOW64\rmfzwap.exe ewcxoak.exe File opened for modification C:\Windows\SysWOW64\nzbgnbg.exe axvybxc.exe File opened for modification C:\Windows\SysWOW64\nbpplzt.exe blumcyw.exe File created C:\Windows\SysWOW64\hcjrqco.exe ueowhti.exe File created C:\Windows\SysWOW64\ypivtrf.exe tynskrz.exe File opened for modification C:\Windows\SysWOW64\ypjueoz.exe mvdetbu.exe File opened for modification C:\Windows\SysWOW64\lodxnoe.exe ypjueoz.exe File opened for modification C:\Windows\SysWOW64\uuysctr.exe hdvpukm.exe File opened for modification C:\Windows\SysWOW64\mzpzmvx.exe zjuxens.exe File created C:\Windows\SysWOW64\pbbpafi.exe ckynsfc.exe File created C:\Windows\SysWOW64\yliwleq.exe ofhynxd.exe File opened for modification C:\Windows\SysWOW64\molsudt.exe cakcwwg.exe File opened for modification C:\Windows\SysWOW64\rryaafv.exe hdyccyi.exe File created C:\Windows\SysWOW64\wyfjytr.exe jicgqll.exe File created C:\Windows\SysWOW64\mugkmhj.exe zelhdze.exe File opened for modification C:\Windows\SysWOW64\vtrpkvo.exe idwmbni.exe File created C:\Windows\SysWOW64\zhdouvw.exe pxodzsp.exe File created C:\Windows\SysWOW64\pukrpqi.exe cwqogqd.exe File created C:\Windows\SysWOW64\gcqowwn.exe tmnlnnh.exe File created C:\Windows\SysWOW64\oqrxpzf.exe eczizaa.exe File opened for modification C:\Windows\SysWOW64\rjraede.exe ekxywdy.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language poigwlv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtumlzc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfvmyix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language macbaou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fztxkoq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cltxtnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woiegdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gjoabde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elfpqtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ygqakcx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kejamgp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language knofzrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mkruvfu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahcylke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqgwrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npxftwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aqpxuce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mpehvev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oisneeq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwnizyf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbmebrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hsnfgih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrerxoz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language otvzbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrmlasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ylkceah.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldbceeh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdwwrck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hstbikv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alotfwh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ingcylj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elxqqqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oysinaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language krqgsix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afzibwz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evvggzb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkdzttz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdgmnuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mtztorb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpkkfzr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pljlmpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ueowhti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxjfmps.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwjlumj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kixymwf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language glkmgnx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eydxjbm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vyzasbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qcwoqyw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language koaselg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xeuvmtm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxodzsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cpbrgpw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zuwrnfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yerojai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rmqkrgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lzaekuz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwlfojg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rcodlyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qpwqalo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgheigm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xodiifl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgfzosy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zudautc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2080 2600 85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe 30 PID 2600 wrote to memory of 2080 2600 85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe 30 PID 2600 wrote to memory of 2080 2600 85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe 30 PID 2600 wrote to memory of 2080 2600 85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe 30 PID 2080 wrote to memory of 2860 2080 yomustj.exe 31 PID 2080 wrote to memory of 2860 2080 yomustj.exe 31 PID 2080 wrote to memory of 2860 2080 yomustj.exe 31 PID 2080 wrote to memory of 2860 2080 yomustj.exe 31 PID 2860 wrote to memory of 2136 2860 pclzcur.exe 32 PID 2860 wrote to memory of 2136 2860 pclzcur.exe 32 PID 2860 wrote to memory of 2136 2860 pclzcur.exe 32 PID 2860 wrote to memory of 2136 2860 pclzcur.exe 32 PID 2136 wrote to memory of 2816 2136 mpehvev.exe 33 PID 2136 wrote to memory of 2816 2136 mpehvev.exe 33 PID 2136 wrote to memory of 2816 2136 mpehvev.exe 33 PID 2136 wrote to memory of 2816 2136 mpehvev.exe 33 PID 2816 wrote to memory of 2676 2816 woiegdd.exe 34 PID 2816 wrote to memory of 2676 2816 woiegdd.exe 34 PID 2816 wrote to memory of 2676 2816 woiegdd.exe 34 PID 2816 wrote to memory of 2676 2816 woiegdd.exe 34 PID 2676 wrote to memory of 2528 2676 jedhoda.exe 35 PID 2676 wrote to memory of 2528 2676 jedhoda.exe 35 PID 2676 wrote to memory of 2528 2676 jedhoda.exe 35 PID 2676 wrote to memory of 2528 2676 jedhoda.exe 35 PID 2528 wrote to memory of 1924 2528 tpsrcgp.exe 36 PID 2528 wrote to memory of 1924 2528 tpsrcgp.exe 36 PID 2528 wrote to memory of 1924 2528 tpsrcgp.exe 36 PID 2528 wrote to memory of 1924 2528 tpsrcgp.exe 36 PID 1924 wrote to memory of 2844 1924 gckhpkn.exe 37 PID 1924 wrote to memory of 2844 1924 gckhpkn.exe 37 PID 1924 wrote to memory of 2844 1924 gckhpkn.exe 37 PID 1924 wrote to memory of 2844 1924 gckhpkn.exe 37 PID 2844 wrote to memory of 2704 2844 dgfzosy.exe 38 PID 2844 wrote to memory of 2704 2844 dgfzosy.exe 38 PID 2844 wrote to memory of 2704 2844 dgfzosy.exe 38 PID 2844 wrote to memory of 2704 2844 dgfzosy.exe 38 PID 2704 wrote to memory of 1280 2704 biackhu.exe 39 PID 2704 wrote to memory of 1280 2704 biackhu.exe 39 PID 2704 wrote to memory of 1280 2704 biackhu.exe 39 PID 2704 wrote to memory of 1280 2704 biackhu.exe 39 PID 1280 wrote to memory of 2924 1280 abbueue.exe 40 PID 1280 wrote to memory of 2924 1280 abbueue.exe 40 PID 1280 wrote to memory of 2924 1280 abbueue.exe 40 PID 1280 wrote to memory of 2924 1280 abbueue.exe 40 PID 2924 wrote to memory of 564 2924 yyhcloi.exe 41 PID 2924 wrote to memory of 564 2924 yyhcloi.exe 41 PID 2924 wrote to memory of 564 2924 yyhcloi.exe 41 PID 2924 wrote to memory of 564 2924 yyhcloi.exe 41 PID 564 wrote to memory of 1580 564 kanrxtm.exe 42 PID 564 wrote to memory of 1580 564 kanrxtm.exe 42 PID 564 wrote to memory of 1580 564 kanrxtm.exe 42 PID 564 wrote to memory of 1580 564 kanrxtm.exe 42 PID 1580 wrote to memory of 400 1580 xqiufbr.exe 43 PID 1580 wrote to memory of 400 1580 xqiufbr.exe 43 PID 1580 wrote to memory of 400 1580 xqiufbr.exe 43 PID 1580 wrote to memory of 400 1580 xqiufbr.exe 43 PID 400 wrote to memory of 1876 400 cdbcydw.exe 44 PID 400 wrote to memory of 1876 400 cdbcydw.exe 44 PID 400 wrote to memory of 1876 400 cdbcydw.exe 44 PID 400 wrote to memory of 1876 400 cdbcydw.exe 44 PID 1876 wrote to memory of 1528 1876 uddmejc.exe 45 PID 1876 wrote to memory of 1528 1876 uddmejc.exe 45 PID 1876 wrote to memory of 1528 1876 uddmejc.exe 45 PID 1876 wrote to memory of 1528 1876 uddmejc.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\yomustj.exeC:\Windows\system32\yomustj.exe 464 "C:\Users\Admin\AppData\Local\Temp\85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\pclzcur.exeC:\Windows\system32\pclzcur.exe 520 "C:\Windows\SysWOW64\yomustj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\mpehvev.exeC:\Windows\system32\mpehvev.exe 524 "C:\Windows\SysWOW64\pclzcur.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\woiegdd.exeC:\Windows\system32\woiegdd.exe 440 "C:\Windows\SysWOW64\mpehvev.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\jedhoda.exeC:\Windows\system32\jedhoda.exe 508 "C:\Windows\SysWOW64\woiegdd.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\tpsrcgp.exeC:\Windows\system32\tpsrcgp.exe 512 "C:\Windows\SysWOW64\jedhoda.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\gckhpkn.exeC:\Windows\system32\gckhpkn.exe 444 "C:\Windows\SysWOW64\tpsrcgp.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\dgfzosy.exeC:\Windows\system32\dgfzosy.exe 448 "C:\Windows\SysWOW64\gckhpkn.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\biackhu.exeC:\Windows\system32\biackhu.exe 548 "C:\Windows\SysWOW64\dgfzosy.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\abbueue.exeC:\Windows\system32\abbueue.exe 564 "C:\Windows\SysWOW64\biackhu.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\yyhcloi.exeC:\Windows\system32\yyhcloi.exe 552 "C:\Windows\SysWOW64\abbueue.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\kanrxtm.exeC:\Windows\system32\kanrxtm.exe 556 "C:\Windows\SysWOW64\yyhcloi.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\xqiufbr.exeC:\Windows\system32\xqiufbr.exe 560 "C:\Windows\SysWOW64\kanrxtm.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\cdbcydw.exeC:\Windows\system32\cdbcydw.exe 568 "C:\Windows\SysWOW64\xqiufbr.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\uddmejc.exeC:\Windows\system32\uddmejc.exe 572 "C:\Windows\SysWOW64\cdbcydw.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\htgpmri.exeC:\Windows\system32\htgpmri.exe 576 "C:\Windows\SysWOW64\uddmejc.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528 -
C:\Windows\SysWOW64\rpzhcli.exeC:\Windows\system32\rpzhcli.exe 580 "C:\Windows\SysWOW64\htgpmri.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:768 -
C:\Windows\SysWOW64\bdaxstw.exeC:\Windows\system32\bdaxstw.exe 584 "C:\Windows\SysWOW64\rpzhcli.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2168 -
C:\Windows\SysWOW64\otvzbtb.exeC:\Windows\system32\otvzbtb.exe 588 "C:\Windows\SysWOW64\bdaxstw.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\avjpmff.exeC:\Windows\system32\avjpmff.exe 592 "C:\Windows\SysWOW64\otvzbtb.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2176 -
C:\Windows\SysWOW64\oisfaje.exeC:\Windows\system32\oisfaje.exe 596 "C:\Windows\SysWOW64\avjpmff.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004 -
C:\Windows\SysWOW64\akyulor.exeC:\Windows\system32\akyulor.exe 600 "C:\Windows\SysWOW64\oisfaje.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2448 -
C:\Windows\SysWOW64\knofzrx.exeC:\Windows\system32\knofzrx.exe 604 "C:\Windows\SysWOW64\akyulor.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\xeqhhzc.exeC:\Windows\system32\xeqhhzc.exe 608 "C:\Windows\SysWOW64\knofzrx.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1652 -
C:\Windows\SysWOW64\kzaxndb.exeC:\Windows\system32\kzaxndb.exe 612 "C:\Windows\SysWOW64\xeqhhzc.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2752 -
C:\Windows\SysWOW64\ufbnlko.exeC:\Windows\system32\ufbnlko.exe 616 "C:\Windows\SysWOW64\kzaxndb.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Windows\SysWOW64\hdvpukm.exeC:\Windows\system32\hdvpukm.exe 620 "C:\Windows\SysWOW64\ufbnlko.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\uuysctr.exeC:\Windows\system32\uuysctr.exe 624 "C:\Windows\SysWOW64\hdvpukm.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Windows\SysWOW64\hstvlbx.exeC:\Windows\system32\hstvlbx.exe 628 "C:\Windows\SysWOW64\uuysctr.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024 -
C:\Windows\SysWOW64\ujoxtbu.exeC:\Windows\system32\ujoxtbu.exe 644 "C:\Windows\SysWOW64\hstvlbx.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2776 -
C:\Windows\SysWOW64\buucqvl.exeC:\Windows\system32\buucqvl.exe 632 "C:\Windows\SysWOW64\ujoxtbu.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Windows\SysWOW64\qkgkpmg.exeC:\Windows\system32\qkgkpmg.exe 540 "C:\Windows\SysWOW64\buucqvl.exe"33⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\SysWOW64\xvfpmgx.exeC:\Windows\system32\xvfpmgx.exe 640 "C:\Windows\SysWOW64\qkgkpmg.exe"34⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\kthsvoc.exeC:\Windows\system32\kthsvoc.exe 660 "C:\Windows\SysWOW64\xvfpmgx.exe"35⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\xkcveoa.exeC:\Windows\system32\xkcveoa.exe 648 "C:\Windows\SysWOW64\kthsvoc.exe"36⤵
- Executes dropped EXE
PID:532 -
C:\Windows\SysWOW64\kixymwf.exeC:\Windows\system32\kixymwf.exe 664 "C:\Windows\SysWOW64\xkcveoa.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:804 -
C:\Windows\SysWOW64\xzaadfl.exeC:\Windows\system32\xzaadfl.exe 656 "C:\Windows\SysWOW64\kixymwf.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\hntytey.exeC:\Windows\system32\hntytey.exe 652 "C:\Windows\SysWOW64\xzaadfl.exe"39⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\udvsbmw.exeC:\Windows\system32\udvsbmw.exe 668 "C:\Windows\SysWOW64\hntytey.exe"40⤵
- Executes dropped EXE
PID:2876 -
C:\Windows\SysWOW64\huqvkub.exeC:\Windows\system32\huqvkub.exe 672 "C:\Windows\SysWOW64\udvsbmw.exe"41⤵
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\uslytvh.exeC:\Windows\system32\uslytvh.exe 680 "C:\Windows\SysWOW64\huqvkub.exe"42⤵
- Executes dropped EXE
PID:784 -
C:\Windows\SysWOW64\gjoabde.exeC:\Windows\system32\gjoabde.exe 676 "C:\Windows\SysWOW64\uslytvh.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\qxoyzkr.exeC:\Windows\system32\qxoyzkr.exe 684 "C:\Windows\SysWOW64\gjoabde.exe"44⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\dojaisx.exeC:\Windows\system32\dojaisx.exe 696 "C:\Windows\SysWOW64\qxoyzkr.exe"45⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\qmedqsc.exeC:\Windows\system32\qmedqsc.exe 688 "C:\Windows\SysWOW64\dojaisx.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1180 -
C:\Windows\SysWOW64\ddhgzba.exeC:\Windows\system32\ddhgzba.exe 692 "C:\Windows\SysWOW64\qmedqsc.exe"47⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\qbcjijf.exeC:\Windows\system32\qbcjijf.exe 700 "C:\Windows\SysWOW64\ddhgzba.exe"48⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\zhcygit.exeC:\Windows\system32\zhcygit.exe 704 "C:\Windows\SysWOW64\qbcjijf.exe"49⤵PID:2128
-
C:\Windows\SysWOW64\mgxboqy.exeC:\Windows\system32\mgxboqy.exe 712 "C:\Windows\SysWOW64\zhcygit.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2060 -
C:\Windows\SysWOW64\zwsdxzw.exeC:\Windows\system32\zwsdxzw.exe 708 "C:\Windows\SysWOW64\mgxboqy.exe"51⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\evvggzb.exeC:\Windows\system32\evvggzb.exe 716 "C:\Windows\SysWOW64\zwsdxzw.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\rlpjohh.exeC:\Windows\system32\rlpjohh.exe 736 "C:\Windows\SysWOW64\evvggzb.exe"53⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\bzqgeou.exeC:\Windows\system32\bzqgeou.exe 724 "C:\Windows\SysWOW64\rlpjohh.exe"54⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\oqljnxr.exeC:\Windows\system32\oqljnxr.exe 728 "C:\Windows\SysWOW64\bzqgeou.exe"55⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\booddxx.exeC:\Windows\system32\booddxx.exe 720 "C:\Windows\SysWOW64\oqljnxr.exe"56⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\nfjgmfd.exeC:\Windows\system32\nfjgmfd.exe 732 "C:\Windows\SysWOW64\booddxx.exe"57⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\avdjvna.exeC:\Windows\system32\avdjvna.exe 740 "C:\Windows\SysWOW64\nfjgmfd.exe"58⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\kjeglmn.exeC:\Windows\system32\kjeglmn.exe 744 "C:\Windows\SysWOW64\avdjvna.exe"59⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\xihjtvt.exeC:\Windows\system32\xihjtvt.exe 748 "C:\Windows\SysWOW64\kjeglmn.exe"60⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\kycmcdy.exeC:\Windows\system32\kycmcdy.exe 752 "C:\Windows\SysWOW64\xihjtvt.exe"61⤵
- Executes dropped EXE
PID:2144 -
C:\Windows\SysWOW64\xpwosdw.exeC:\Windows\system32\xpwosdw.exe 760 "C:\Windows\SysWOW64\kycmcdy.exe"62⤵
- Executes dropped EXE
PID:440 -
C:\Windows\SysWOW64\knzrblb.exeC:\Windows\system32\knzrblb.exe 756 "C:\Windows\SysWOW64\xpwosdw.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2320 -
C:\Windows\SysWOW64\tbsgrtp.exeC:\Windows\system32\tbsgrtp.exe 764 "C:\Windows\SysWOW64\knzrblb.exe"64⤵
- Executes dropped EXE
PID:1268 -
C:\Windows\SysWOW64\gsvjabu.exeC:\Windows\system32\gsvjabu.exe 768 "C:\Windows\SysWOW64\tbsgrtp.exe"65⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\SysWOW64\tipmibs.exeC:\Windows\system32\tipmibs.exe 772 "C:\Windows\SysWOW64\gsvjabu.exe"66⤵
- Executes dropped EXE
PID:1448 -
C:\Windows\SysWOW64\ghkorjx.exeC:\Windows\system32\ghkorjx.exe 776 "C:\Windows\SysWOW64\tipmibs.exe"67⤵PID:2424
-
C:\Windows\SysWOW64\txnrzrd.exeC:\Windows\system32\txnrzrd.exe 780 "C:\Windows\SysWOW64\ghkorjx.exe"68⤵PID:2900
-
C:\Windows\SysWOW64\dlooyrq.exeC:\Windows\system32\dlooyrq.exe 800 "C:\Windows\SysWOW64\txnrzrd.exe"69⤵PID:2384
-
C:\Windows\SysWOW64\pcjrgzn.exeC:\Windows\system32\pcjrgzn.exe 784 "C:\Windows\SysWOW64\dlooyrq.exe"70⤵PID:2484
-
C:\Windows\SysWOW64\cadupht.exeC:\Windows\system32\cadupht.exe 788 "C:\Windows\SysWOW64\pcjrgzn.exe"71⤵PID:692
-
C:\Windows\SysWOW64\prgoxhz.exeC:\Windows\system32\prgoxhz.exe 792 "C:\Windows\SysWOW64\cadupht.exe"72⤵PID:2064
-
C:\Windows\SysWOW64\cpbrgpw.exeC:\Windows\system32\cpbrgpw.exe 808 "C:\Windows\SysWOW64\prgoxhz.exe"73⤵
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\msqcbsk.exeC:\Windows\system32\msqcbsk.exe 804 "C:\Windows\SysWOW64\cpbrgpw.exe"74⤵PID:2996
-
C:\Windows\SysWOW64\zuwrnfp.exeC:\Windows\system32\zuwrnfp.exe 828 "C:\Windows\SysWOW64\msqcbsk.exe"75⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\mkruvfu.exeC:\Windows\system32\mkruvfu.exe 796 "C:\Windows\SysWOW64\zuwrnfp.exe"76⤵
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Windows\SysWOW64\zjuxens.exeC:\Windows\system32\zjuxens.exe 812 "C:\Windows\SysWOW64\mkruvfu.exe"77⤵
- Drops file in System32 directory
PID:1168 -
C:\Windows\SysWOW64\mzpzmvx.exeC:\Windows\system32\mzpzmvx.exe 816 "C:\Windows\SysWOW64\zjuxens.exe"78⤵PID:2832
-
C:\Windows\SysWOW64\voppcvl.exeC:\Windows\system32\voppcvl.exe 820 "C:\Windows\SysWOW64\mzpzmvx.exe"79⤵PID:2536
-
C:\Windows\SysWOW64\iekrtdq.exeC:\Windows\system32\iekrtdq.exe 824 "C:\Windows\SysWOW64\voppcvl.exe"80⤵
- Drops file in System32 directory
PID:2532 -
C:\Windows\SysWOW64\vdnuclo.exeC:\Windows\system32\vdnuclo.exe 832 "C:\Windows\SysWOW64\iekrtdq.exe"81⤵PID:1272
-
C:\Windows\SysWOW64\itixklt.exeC:\Windows\system32\itixklt.exe 836 "C:\Windows\SysWOW64\vdnuclo.exe"82⤵PID:2616
-
C:\Windows\SysWOW64\vkdzttz.exeC:\Windows\system32\vkdzttz.exe 840 "C:\Windows\SysWOW64\itixklt.exe"83⤵
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Windows\SysWOW64\eydxjbm.exeC:\Windows\system32\eydxjbm.exe 844 "C:\Windows\SysWOW64\vkdzttz.exe"84⤵
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Windows\SysWOW64\rwgzsbj.exeC:\Windows\system32\rwgzsbj.exe 864 "C:\Windows\SysWOW64\eydxjbm.exe"85⤵PID:1948
-
C:\Windows\SysWOW64\enbcajp.exeC:\Windows\system32\enbcajp.exe 848 "C:\Windows\SysWOW64\rwgzsbj.exe"86⤵PID:2848
-
C:\Windows\SysWOW64\rdwfrru.exeC:\Windows\system32\rdwfrru.exe 872 "C:\Windows\SysWOW64\enbcajp.exe"87⤵PID:2036
-
C:\Windows\SysWOW64\eczizaa.exeC:\Windows\system32\eczizaa.exe 852 "C:\Windows\SysWOW64\rdwfrru.exe"88⤵
- Drops file in System32 directory
PID:840 -
C:\Windows\SysWOW64\oqrxpzf.exeC:\Windows\system32\oqrxpzf.exe 876 "C:\Windows\SysWOW64\eczizaa.exe"89⤵PID:2488
-
C:\Windows\SysWOW64\bguayhl.exeC:\Windows\system32\bguayhl.exe 856 "C:\Windows\SysWOW64\oqrxpzf.exe"90⤵PID:576
-
C:\Windows\SysWOW64\oxpchpq.exeC:\Windows\system32\oxpchpq.exe 860 "C:\Windows\SysWOW64\bguayhl.exe"91⤵PID:1748
-
C:\Windows\SysWOW64\avkfppw.exeC:\Windows\system32\avkfppw.exe 868 "C:\Windows\SysWOW64\oxpchpq.exe"92⤵PID:2164
-
C:\Windows\SysWOW64\nmmigyt.exeC:\Windows\system32\nmmigyt.exe 880 "C:\Windows\SysWOW64\avkfppw.exe"93⤵PID:2284
-
C:\Windows\SysWOW64\xanfwfg.exeC:\Windows\system32\xanfwfg.exe 892 "C:\Windows\SysWOW64\nmmigyt.exe"94⤵PID:2372
-
C:\Windows\SysWOW64\kqiaefm.exeC:\Windows\system32\kqiaefm.exe 884 "C:\Windows\SysWOW64\xanfwfg.exe"95⤵PID:2316
-
C:\Windows\SysWOW64\xpdcnnk.exeC:\Windows\system32\xpdcnnk.exe 900 "C:\Windows\SysWOW64\kqiaefm.exe"96⤵PID:992
-
C:\Windows\SysWOW64\kfffwwp.exeC:\Windows\system32\kfffwwp.exe 888 "C:\Windows\SysWOW64\xpdcnnk.exe"97⤵PID:2220
-
C:\Windows\SysWOW64\xeaiewv.exeC:\Windows\system32\xeaiewv.exe 896 "C:\Windows\SysWOW64\kfffwwp.exe"98⤵PID:2344
-
C:\Windows\SysWOW64\hgqszzb.exeC:\Windows\system32\hgqszzb.exe 904 "C:\Windows\SysWOW64\xeaiewv.exe"99⤵PID:2108
-
C:\Windows\SysWOW64\tiwillf.exeC:\Windows\system32\tiwillf.exe 916 "C:\Windows\SysWOW64\hgqszzb.exe"100⤵PID:2644
-
C:\Windows\SysWOW64\yzrlttl.exeC:\Windows\system32\yzrlttl.exe 908 "C:\Windows\SysWOW64\tiwillf.exe"101⤵PID:1596
-
C:\Windows\SysWOW64\lxtncuq.exeC:\Windows\system32\lxtncuq.exe 924 "C:\Windows\SysWOW64\yzrlttl.exe"102⤵PID:2404
-
C:\Windows\SysWOW64\yooqlcw.exeC:\Windows\system32\yooqlcw.exe 912 "C:\Windows\SysWOW64\lxtncuq.exe"103⤵PID:2988
-
C:\Windows\SysWOW64\lejttku.exeC:\Windows\system32\lejttku.exe 920 "C:\Windows\SysWOW64\yooqlcw.exe"104⤵PID:2712
-
C:\Windows\SysWOW64\vskirjh.exeC:\Windows\system32\vskirjh.exe 928 "C:\Windows\SysWOW64\lejttku.exe"105⤵PID:2880
-
C:\Windows\SysWOW64\hrmlasm.exeC:\Windows\system32\hrmlasm.exe 932 "C:\Windows\SysWOW64\vskirjh.exe"106⤵
- System Location Discovery: System Language Discovery
PID:1392 -
C:\Windows\SysWOW64\uhhnjas.exeC:\Windows\system32\uhhnjas.exe 940 "C:\Windows\SysWOW64\hrmlasm.exe"107⤵PID:2916
-
C:\Windows\SysWOW64\ekxywdy.exeC:\Windows\system32\ekxywdy.exe 948 "C:\Windows\SysWOW64\uhhnjas.exe"108⤵
- Drops file in System32 directory
PID:1488 -
C:\Windows\SysWOW64\rjraede.exeC:\Windows\system32\rjraede.exe 936 "C:\Windows\SysWOW64\ekxywdy.exe"109⤵PID:1052
-
C:\Windows\SysWOW64\elxqqqi.exeC:\Windows\system32\elxqqqi.exe 944 "C:\Windows\SysWOW64\rjraede.exe"110⤵
- System Location Discovery: System Language Discovery
PID:872 -
C:\Windows\SysWOW64\rbalgyo.exeC:\Windows\system32\rbalgyo.exe 952 "C:\Windows\SysWOW64\elxqqqi.exe"111⤵PID:1324
-
C:\Windows\SysWOW64\esvnpyl.exeC:\Windows\system32\esvnpyl.exe 956 "C:\Windows\SysWOW64\rbalgyo.exe"112⤵PID:2452
-
C:\Windows\SysWOW64\rqqqygr.exeC:\Windows\system32\rqqqygr.exe 964 "C:\Windows\SysWOW64\esvnpyl.exe"113⤵PID:1084
-
C:\Windows\SysWOW64\egttgow.exeC:\Windows\system32\egttgow.exe 980 "C:\Windows\SysWOW64\rqqqygr.exe"114⤵PID:864
-
C:\Windows\SysWOW64\nvtqwoj.exeC:\Windows\system32\nvtqwoj.exe 960 "C:\Windows\SysWOW64\egttgow.exe"115⤵PID:1496
-
C:\Windows\SysWOW64\alotfwh.exeC:\Windows\system32\alotfwh.exe 976 "C:\Windows\SysWOW64\nvtqwoj.exe"116⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\nkjwnem.exeC:\Windows\system32\nkjwnem.exe 968 "C:\Windows\SysWOW64\alotfwh.exe"117⤵PID:2304
-
C:\Windows\SysWOW64\aamyees.exeC:\Windows\system32\aamyees.exe 972 "C:\Windows\SysWOW64\nkjwnem.exe"118⤵PID:1656
-
C:\Windows\SysWOW64\klbjrhy.exeC:\Windows\system32\klbjrhy.exe 984 "C:\Windows\SysWOW64\aamyees.exe"119⤵PID:2672
-
C:\Windows\SysWOW64\xbwlape.exeC:\Windows\system32\xbwlape.exe 988 "C:\Windows\SysWOW64\klbjrhy.exe"120⤵PID:2152
-
C:\Windows\SysWOW64\hmlonsk.exeC:\Windows\system32\hmlonsk.exe 992 "C:\Windows\SysWOW64\xbwlape.exe"121⤵PID:1276
-
C:\Windows\SysWOW64\xqujryh.exeC:\Windows\system32\xqujryh.exe 996 "C:\Windows\SysWOW64\hmlonsk.exe"122⤵PID:1144
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-