Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe
-
Size
261KB
-
MD5
9ef5bdc61586c73eb4f775ab3bb16c9c
-
SHA1
f9794ce350f231c5dc20c40a255128bc3147a76c
-
SHA256
1c4e3fe2b33c66d0ff8e3375958b9c3c6df2fb43f133fb1e72803a69dd626dfc
-
SHA512
90a92f1381ae5a408e84685e96269100e35884fbd39deb5028e97c1b5888e0f072a38104350c09790220aa6571603b7b69dc2997e6dfe873bbe495e714047145
-
SSDEEP
3072:ZYUb5QoJ4g+Ri+Zj6Iz1ZdW4SrO7FSVpuc:ZY7xh6SZI4z7FSVpuc
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2960 cmd.exe -
Executes dropped EXE 64 IoCs
Processes:
wihx.exewos.exewid.exewsagwpwv.exewteyig.exewnaqdoaxs.exewevrq.exewuopslf.exewoxuh.exewpvlfl.exewmryr.exewgmo.exewschdknp.exewtvog.exewrqdta.exewbgxsy.exewvm.exewcqvgl.exewylis.exewibfrmhsg.exewehm.exewok.exewtcxfx.exewygnhhujc.exewams.exewxchuxx.exeweiwwgncf.exewrwpmyu.exewmdxydbjt.exewwrty.exewhwfqdwbe.exewlch.exewmtvu.exewpxlws.exewqoaho.exewri.exewfxbcwvp.exewddytxck.exewgtjv.exewxcwqv.exeweub.exewunynp.exewyraid.exewroqd.exewvecex.exewcjq.exewkn.exewnsuiwqc.exewqkgjjpij.exewyacjk.exewbehmfco.exewdfdus.exewbpfb.exewqrbrfv.exewuibant.exewwogdj.exewflqjlok.exewwggesi.exewdlvgbxbj.exewmohy.exewapkwth.exewsmlkfx.exewvdwlrwm.exewrigwv.exepid process 2888 wihx.exe 2728 wos.exe 304 wid.exe 1160 wsagwpwv.exe 1516 wteyig.exe 964 wnaqdoaxs.exe 2232 wevrq.exe 1956 wuopslf.exe 2832 woxuh.exe 2988 wpvlfl.exe 2412 wmryr.exe 3036 wgmo.exe 2604 wschdknp.exe 2508 wtvog.exe 2012 wrqdta.exe 1568 wbgxsy.exe 1704 wvm.exe 2704 wcqvgl.exe 2724 wylis.exe 2776 wibfrmhsg.exe 1232 wehm.exe 2252 wok.exe 1672 wtcxfx.exe 1164 wygnhhujc.exe 1968 wams.exe 2248 wxchuxx.exe 2736 weiwwgncf.exe 2720 wrwpmyu.exe 1516 wmdxydbjt.exe 2192 wwrty.exe 3028 whwfqdwbe.exe 1836 wlch.exe 2212 wmtvu.exe 2420 wpxlws.exe 1568 wqoaho.exe 2356 wri.exe 3052 wfxbcwvp.exe 684 wddytxck.exe 3012 wgtjv.exe 1168 wxcwqv.exe 2492 weub.exe 1692 wunynp.exe 1732 wyraid.exe 536 wroqd.exe 2536 wvecex.exe 2888 wcjq.exe 2928 wkn.exe 808 wnsuiwqc.exe 2408 wqkgjjpij.exe 1928 wyacjk.exe 1672 wbehmfco.exe 2140 wdfdus.exe 2948 wbpfb.exe 2868 wqrbrfv.exe 1488 wuibant.exe 2904 wwogdj.exe 1112 wflqjlok.exe 2192 wwggesi.exe 996 wdlvgbxbj.exe 2104 wmohy.exe 1636 wapkwth.exe 772 wsmlkfx.exe 964 wvdwlrwm.exe 2840 wrigwv.exe -
Loads dropped DLL 64 IoCs
Processes:
9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exewihx.exewos.exewid.exewsagwpwv.exeWerFault.exewteyig.exewnaqdoaxs.exewevrq.exewuopslf.exewoxuh.exewpvlfl.exewmryr.exewgmo.exewschdknp.exewtvog.exewrqdta.exepid process 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe 2888 wihx.exe 2888 wihx.exe 2888 wihx.exe 2888 wihx.exe 2728 wos.exe 2728 wos.exe 2728 wos.exe 2728 wos.exe 304 wid.exe 304 wid.exe 304 wid.exe 304 wid.exe 1160 wsagwpwv.exe 1160 wsagwpwv.exe 1160 wsagwpwv.exe 1160 wsagwpwv.exe 1828 WerFault.exe 1828 WerFault.exe 1828 WerFault.exe 1516 wteyig.exe 1516 wteyig.exe 1516 wteyig.exe 1516 wteyig.exe 964 wnaqdoaxs.exe 964 wnaqdoaxs.exe 964 wnaqdoaxs.exe 964 wnaqdoaxs.exe 2232 wevrq.exe 2232 wevrq.exe 2232 wevrq.exe 2232 wevrq.exe 1956 wuopslf.exe 1956 wuopslf.exe 1956 wuopslf.exe 1956 wuopslf.exe 2832 woxuh.exe 2832 woxuh.exe 2832 woxuh.exe 2832 woxuh.exe 2988 wpvlfl.exe 2988 wpvlfl.exe 2988 wpvlfl.exe 2988 wpvlfl.exe 2412 wmryr.exe 2412 wmryr.exe 2412 wmryr.exe 2412 wmryr.exe 3036 wgmo.exe 3036 wgmo.exe 3036 wgmo.exe 3036 wgmo.exe 2604 wschdknp.exe 2604 wschdknp.exe 2604 wschdknp.exe 2604 wschdknp.exe 2508 wtvog.exe 2508 wtvog.exe 2508 wtvog.exe 2508 wtvog.exe 2012 wrqdta.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
Processes:
wcjq.exewmohy.exewmwvuoy.exewbpqhr.exewxgcqjv.exewjhfi.exewrqdta.exewyacjk.exewxuvfmt.exewrusyp.exewkdxbs.exewhnvqy.exewid.exewsmlkfx.exewfhiuoui.exewqrbrfv.exewcydyke.exewehm.exeweiwwgncf.exewjgeou.exewsksue.exewqoaho.exeweub.exewdlvgbxbj.exewqntgvph.exewlch.exewfxbcwvp.exewwggesi.exewibftah.exewvtc.exewgmo.exewbgxsy.exewtcxfx.exewvm.exewnsuiwqc.exewjacudh.exewcworwt.exewtvog.exewibfrmhsg.exewapkwth.exewiatfk.exewnxbqdpbp.exewsgcb.exewrwpmyu.exewbpfb.exewrtuoahy.exewklfvw.exewgkhn.exewrjmceq.exewwogdj.exewybgk.exewyraid.exewkn.exewevrq.exedescription ioc process File opened for modification C:\Windows\SysWOW64\wkn.exe wcjq.exe File opened for modification C:\Windows\SysWOW64\wapkwth.exe wmohy.exe File opened for modification C:\Windows\SysWOW64\wgaavx.exe wmwvuoy.exe File opened for modification C:\Windows\SysWOW64\wsksue.exe wbpqhr.exe File opened for modification C:\Windows\SysWOW64\wcworwt.exe wxgcqjv.exe File created C:\Windows\SysWOW64\wtlqb.exe wjhfi.exe File created C:\Windows\SysWOW64\wbgxsy.exe wrqdta.exe File created C:\Windows\SysWOW64\wbehmfco.exe wyacjk.exe File opened for modification C:\Windows\SysWOW64\wcakh.exe wxuvfmt.exe File opened for modification C:\Windows\SysWOW64\wibftah.exe wrusyp.exe File opened for modification C:\Windows\SysWOW64\wgkhn.exe wkdxbs.exe File opened for modification C:\Windows\SysWOW64\wuulus.exe whnvqy.exe File created C:\Windows\SysWOW64\wsagwpwv.exe wid.exe File opened for modification C:\Windows\SysWOW64\wvdwlrwm.exe wsmlkfx.exe File opened for modification C:\Windows\SysWOW64\wbpqhr.exe wfhiuoui.exe File opened for modification C:\Windows\SysWOW64\wuibant.exe wqrbrfv.exe File created C:\Windows\SysWOW64\wohtdgd.exe wcydyke.exe File created C:\Windows\SysWOW64\wok.exe wehm.exe File opened for modification C:\Windows\SysWOW64\wrwpmyu.exe weiwwgncf.exe File created C:\Windows\SysWOW64\wxuvfmt.exe wjgeou.exe File created C:\Windows\SysWOW64\wxbsd.exe wsksue.exe File opened for modification C:\Windows\SysWOW64\wri.exe wqoaho.exe File opened for modification C:\Windows\SysWOW64\wunynp.exe weub.exe File opened for modification C:\Windows\SysWOW64\wmohy.exe wdlvgbxbj.exe File opened for modification C:\Windows\SysWOW64\wnifsvm.exe wqntgvph.exe File opened for modification C:\Windows\SysWOW64\wmtvu.exe wlch.exe File created C:\Windows\SysWOW64\wddytxck.exe wfxbcwvp.exe File opened for modification C:\Windows\SysWOW64\wdlvgbxbj.exe wwggesi.exe File created C:\Windows\SysWOW64\wrqcubk.exe wibftah.exe File opened for modification C:\Windows\SysWOW64\wcydyke.exe wvtc.exe File created C:\Windows\SysWOW64\wschdknp.exe wgmo.exe File created C:\Windows\SysWOW64\wvm.exe wbgxsy.exe File created C:\Windows\SysWOW64\wygnhhujc.exe wtcxfx.exe File opened for modification C:\Windows\SysWOW64\wcqvgl.exe wvm.exe File created C:\Windows\SysWOW64\wqkgjjpij.exe wnsuiwqc.exe File created C:\Windows\SysWOW64\wvtc.exe wjacudh.exe File created C:\Windows\SysWOW64\wunynp.exe weub.exe File created C:\Windows\SysWOW64\wsksue.exe wbpqhr.exe File created C:\Windows\SysWOW64\whmna.exe wcworwt.exe File opened for modification C:\Windows\SysWOW64\wschdknp.exe wgmo.exe File opened for modification C:\Windows\SysWOW64\wrqdta.exe wtvog.exe File opened for modification C:\Windows\SysWOW64\wehm.exe wibfrmhsg.exe File opened for modification C:\Windows\SysWOW64\wsmlkfx.exe wapkwth.exe File opened for modification C:\Windows\SysWOW64\wxumibng.exe wiatfk.exe File opened for modification C:\Windows\SysWOW64\wrywx.exe wnxbqdpbp.exe File created C:\Windows\SysWOW64\wmwvuoy.exe wsgcb.exe File created C:\Windows\SysWOW64\wmdxydbjt.exe wrwpmyu.exe File opened for modification C:\Windows\SysWOW64\wddytxck.exe wfxbcwvp.exe File created C:\Windows\SysWOW64\wqrbrfv.exe wbpfb.exe File created C:\Windows\SysWOW64\wwyjqhw.exe wrtuoahy.exe File created C:\Windows\SysWOW64\wkrkaqoly.exe wklfvw.exe File opened for modification C:\Windows\SysWOW64\wqntgvph.exe wgkhn.exe File opened for modification C:\Windows\SysWOW64\waxibes.exe wrjmceq.exe File created C:\Windows\SysWOW64\wxumibng.exe wiatfk.exe File created C:\Windows\SysWOW64\wflqjlok.exe wwogdj.exe File opened for modification C:\Windows\SysWOW64\wflqjlok.exe wwogdj.exe File created C:\Windows\SysWOW64\wbhauom.exe wybgk.exe File opened for modification C:\Windows\SysWOW64\wroqd.exe wyraid.exe File created C:\Windows\SysWOW64\wnsuiwqc.exe wkn.exe File created C:\Windows\SysWOW64\wdlvgbxbj.exe wwggesi.exe File created C:\Windows\SysWOW64\wvdwlrwm.exe wsmlkfx.exe File opened for modification C:\Windows\SysWOW64\wkrkaqoly.exe wklfvw.exe File opened for modification C:\Windows\SysWOW64\wuopslf.exe wevrq.exe File created C:\Windows\SysWOW64\wrqdta.exe wtvog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1828 1160 WerFault.exe wsagwpwv.exe 2096 2736 WerFault.exe weiwwgncf.exe 1096 808 WerFault.exe wnsuiwqc.exe 2400 996 WerFault.exe wdlvgbxbj.exe 2868 964 WerFault.exe wvdwlrwm.exe 788 2084 WerFault.exe wkrxsdnwa.exe 2732 1804 WerFault.exe wmdvfohkc.exe 708 2964 WerFault.exe wrtuoahy.exe 2512 548 WerFault.exe wmdwaubc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.execmd.execmd.execmd.exewwyjqhw.execmd.exewnaqdoaxs.execmd.exewcqvgl.execmd.exewygnhhujc.exewyacjk.exewuibant.execmd.exewxumibng.execmd.execmd.exewrcli.execmd.exewroqd.exewkvvup.execmd.exewsgcb.execmd.execmd.execmd.exewmryr.execmd.execmd.exewdordj.execmd.execmd.exewriql.execmd.exewgaavx.execmd.exewos.execmd.exewhmna.execmd.execmd.execmd.execmd.execmd.exewfqti.execmd.execmd.execmd.exewdlvgbxbj.exewsmlkfx.execmd.execmd.exewjacudh.exewihx.exewvdwlrwm.execmd.exewrtuoahy.exewntmesn.execmd.exewrknaeb.exewtvog.execmd.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwyjqhw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnaqdoaxs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcqvgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wygnhhujc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyacjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuibant.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxumibng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrcli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wroqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wkvvup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsgcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmryr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdordj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wriql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wgaavx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whmna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfqti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdlvgbxbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsmlkfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjacudh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wihx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvdwlrwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrtuoahy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wntmesn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrknaeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wtvog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exewihx.exewos.exewid.exewsagwpwv.exewteyig.exewnaqdoaxs.exewevrq.exedescription pid process target process PID 1704 wrote to memory of 2888 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe wihx.exe PID 1704 wrote to memory of 2888 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe wihx.exe PID 1704 wrote to memory of 2888 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe wihx.exe PID 1704 wrote to memory of 2888 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe wihx.exe PID 1704 wrote to memory of 2960 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe cmd.exe PID 1704 wrote to memory of 2960 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe cmd.exe PID 1704 wrote to memory of 2960 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe cmd.exe PID 1704 wrote to memory of 2960 1704 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe cmd.exe PID 2888 wrote to memory of 2728 2888 wihx.exe wos.exe PID 2888 wrote to memory of 2728 2888 wihx.exe wos.exe PID 2888 wrote to memory of 2728 2888 wihx.exe wos.exe PID 2888 wrote to memory of 2728 2888 wihx.exe wos.exe PID 2888 wrote to memory of 2748 2888 wihx.exe cmd.exe PID 2888 wrote to memory of 2748 2888 wihx.exe cmd.exe PID 2888 wrote to memory of 2748 2888 wihx.exe cmd.exe PID 2888 wrote to memory of 2748 2888 wihx.exe cmd.exe PID 2728 wrote to memory of 304 2728 wos.exe wid.exe PID 2728 wrote to memory of 304 2728 wos.exe wid.exe PID 2728 wrote to memory of 304 2728 wos.exe wid.exe PID 2728 wrote to memory of 304 2728 wos.exe wid.exe PID 2728 wrote to memory of 1112 2728 wos.exe cmd.exe PID 2728 wrote to memory of 1112 2728 wos.exe cmd.exe PID 2728 wrote to memory of 1112 2728 wos.exe cmd.exe PID 2728 wrote to memory of 1112 2728 wos.exe cmd.exe PID 304 wrote to memory of 1160 304 wid.exe wsagwpwv.exe PID 304 wrote to memory of 1160 304 wid.exe wsagwpwv.exe PID 304 wrote to memory of 1160 304 wid.exe wsagwpwv.exe PID 304 wrote to memory of 1160 304 wid.exe wsagwpwv.exe PID 304 wrote to memory of 1376 304 wid.exe cmd.exe PID 304 wrote to memory of 1376 304 wid.exe cmd.exe PID 304 wrote to memory of 1376 304 wid.exe cmd.exe PID 304 wrote to memory of 1376 304 wid.exe cmd.exe PID 1160 wrote to memory of 1516 1160 wsagwpwv.exe wteyig.exe PID 1160 wrote to memory of 1516 1160 wsagwpwv.exe wteyig.exe PID 1160 wrote to memory of 1516 1160 wsagwpwv.exe wteyig.exe PID 1160 wrote to memory of 1516 1160 wsagwpwv.exe wteyig.exe PID 1160 wrote to memory of 2636 1160 wsagwpwv.exe cmd.exe PID 1160 wrote to memory of 2636 1160 wsagwpwv.exe cmd.exe PID 1160 wrote to memory of 2636 1160 wsagwpwv.exe cmd.exe PID 1160 wrote to memory of 2636 1160 wsagwpwv.exe cmd.exe PID 1160 wrote to memory of 1828 1160 wsagwpwv.exe WerFault.exe PID 1160 wrote to memory of 1828 1160 wsagwpwv.exe WerFault.exe PID 1160 wrote to memory of 1828 1160 wsagwpwv.exe WerFault.exe PID 1160 wrote to memory of 1828 1160 wsagwpwv.exe WerFault.exe PID 1516 wrote to memory of 964 1516 wteyig.exe wnaqdoaxs.exe PID 1516 wrote to memory of 964 1516 wteyig.exe wnaqdoaxs.exe PID 1516 wrote to memory of 964 1516 wteyig.exe wnaqdoaxs.exe PID 1516 wrote to memory of 964 1516 wteyig.exe wnaqdoaxs.exe PID 1516 wrote to memory of 2576 1516 wteyig.exe cmd.exe PID 1516 wrote to memory of 2576 1516 wteyig.exe cmd.exe PID 1516 wrote to memory of 2576 1516 wteyig.exe cmd.exe PID 1516 wrote to memory of 2576 1516 wteyig.exe cmd.exe PID 964 wrote to memory of 2232 964 wnaqdoaxs.exe wevrq.exe PID 964 wrote to memory of 2232 964 wnaqdoaxs.exe wevrq.exe PID 964 wrote to memory of 2232 964 wnaqdoaxs.exe wevrq.exe PID 964 wrote to memory of 2232 964 wnaqdoaxs.exe wevrq.exe PID 964 wrote to memory of 1644 964 wnaqdoaxs.exe cmd.exe PID 964 wrote to memory of 1644 964 wnaqdoaxs.exe cmd.exe PID 964 wrote to memory of 1644 964 wnaqdoaxs.exe cmd.exe PID 964 wrote to memory of 1644 964 wnaqdoaxs.exe cmd.exe PID 2232 wrote to memory of 1956 2232 wevrq.exe wuopslf.exe PID 2232 wrote to memory of 1956 2232 wevrq.exe wuopslf.exe PID 2232 wrote to memory of 1956 2232 wevrq.exe wuopslf.exe PID 2232 wrote to memory of 1956 2232 wevrq.exe wuopslf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\wihx.exe"C:\Windows\system32\wihx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\wos.exe"C:\Windows\system32\wos.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\wid.exe"C:\Windows\system32\wid.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\wsagwpwv.exe"C:\Windows\system32\wsagwpwv.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\wteyig.exe"C:\Windows\system32\wteyig.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\wnaqdoaxs.exe"C:\Windows\system32\wnaqdoaxs.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\wevrq.exe"C:\Windows\system32\wevrq.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\wuopslf.exe"C:\Windows\system32\wuopslf.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1956 -
C:\Windows\SysWOW64\woxuh.exe"C:\Windows\system32\woxuh.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2832 -
C:\Windows\SysWOW64\wpvlfl.exe"C:\Windows\system32\wpvlfl.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988 -
C:\Windows\SysWOW64\wmryr.exe"C:\Windows\system32\wmryr.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\wgmo.exe"C:\Windows\system32\wgmo.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\wschdknp.exe"C:\Windows\system32\wschdknp.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2604 -
C:\Windows\SysWOW64\wtvog.exe"C:\Windows\system32\wtvog.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2508 -
C:\Windows\SysWOW64\wrqdta.exe"C:\Windows\system32\wrqdta.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\wbgxsy.exe"C:\Windows\system32\wbgxsy.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1568 -
C:\Windows\SysWOW64\wvm.exe"C:\Windows\system32\wvm.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1704 -
C:\Windows\SysWOW64\wcqvgl.exe"C:\Windows\system32\wcqvgl.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\wylis.exe"C:\Windows\system32\wylis.exe"20⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\wibfrmhsg.exe"C:\Windows\system32\wibfrmhsg.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2776 -
C:\Windows\SysWOW64\wehm.exe"C:\Windows\system32\wehm.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1232 -
C:\Windows\SysWOW64\wok.exe"C:\Windows\system32\wok.exe"23⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\wtcxfx.exe"C:\Windows\system32\wtcxfx.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1672 -
C:\Windows\SysWOW64\wygnhhujc.exe"C:\Windows\system32\wygnhhujc.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Windows\SysWOW64\wams.exe"C:\Windows\system32\wams.exe"26⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\wxchuxx.exe"C:\Windows\system32\wxchuxx.exe"27⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\weiwwgncf.exe"C:\Windows\system32\weiwwgncf.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2736 -
C:\Windows\SysWOW64\wrwpmyu.exe"C:\Windows\system32\wrwpmyu.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2720 -
C:\Windows\SysWOW64\wmdxydbjt.exe"C:\Windows\system32\wmdxydbjt.exe"30⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\wwrty.exe"C:\Windows\system32\wwrty.exe"31⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\whwfqdwbe.exe"C:\Windows\system32\whwfqdwbe.exe"32⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\wlch.exe"C:\Windows\system32\wlch.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1836 -
C:\Windows\SysWOW64\wmtvu.exe"C:\Windows\system32\wmtvu.exe"34⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\wpxlws.exe"C:\Windows\system32\wpxlws.exe"35⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\wqoaho.exe"C:\Windows\system32\wqoaho.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1568 -
C:\Windows\SysWOW64\wri.exe"C:\Windows\system32\wri.exe"37⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\wfxbcwvp.exe"C:\Windows\system32\wfxbcwvp.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3052 -
C:\Windows\SysWOW64\wddytxck.exe"C:\Windows\system32\wddytxck.exe"39⤵
- Executes dropped EXE
PID:684 -
C:\Windows\SysWOW64\wgtjv.exe"C:\Windows\system32\wgtjv.exe"40⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\wxcwqv.exe"C:\Windows\system32\wxcwqv.exe"41⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\SysWOW64\weub.exe"C:\Windows\system32\weub.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\wunynp.exe"C:\Windows\system32\wunynp.exe"43⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\wyraid.exe"C:\Windows\system32\wyraid.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1732 -
C:\Windows\SysWOW64\wroqd.exe"C:\Windows\system32\wroqd.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\wvecex.exe"C:\Windows\system32\wvecex.exe"46⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\wcjq.exe"C:\Windows\system32\wcjq.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2888 -
C:\Windows\SysWOW64\wkn.exe"C:\Windows\system32\wkn.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2928 -
C:\Windows\SysWOW64\wnsuiwqc.exe"C:\Windows\system32\wnsuiwqc.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:808 -
C:\Windows\SysWOW64\wqkgjjpij.exe"C:\Windows\system32\wqkgjjpij.exe"50⤵
- Executes dropped EXE
PID:2408 -
C:\Windows\SysWOW64\wyacjk.exe"C:\Windows\system32\wyacjk.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\wbehmfco.exe"C:\Windows\system32\wbehmfco.exe"52⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\wdfdus.exe"C:\Windows\system32\wdfdus.exe"53⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\wbpfb.exe"C:\Windows\system32\wbpfb.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2948 -
C:\Windows\SysWOW64\wqrbrfv.exe"C:\Windows\system32\wqrbrfv.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2868 -
C:\Windows\SysWOW64\wuibant.exe"C:\Windows\system32\wuibant.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Windows\SysWOW64\wwogdj.exe"C:\Windows\system32\wwogdj.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2904 -
C:\Windows\SysWOW64\wflqjlok.exe"C:\Windows\system32\wflqjlok.exe"58⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\wwggesi.exe"C:\Windows\system32\wwggesi.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\wdlvgbxbj.exe"C:\Windows\system32\wdlvgbxbj.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:996 -
C:\Windows\SysWOW64\wmohy.exe"C:\Windows\system32\wmohy.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\wapkwth.exe"C:\Windows\system32\wapkwth.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1636 -
C:\Windows\SysWOW64\wsmlkfx.exe"C:\Windows\system32\wsmlkfx.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:772 -
C:\Windows\SysWOW64\wvdwlrwm.exe"C:\Windows\system32\wvdwlrwm.exe"64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:964 -
C:\Windows\SysWOW64\wrigwv.exe"C:\Windows\system32\wrigwv.exe"65⤵
- Executes dropped EXE
PID:2840 -
C:\Windows\SysWOW64\wfhiuoui.exe"C:\Windows\system32\wfhiuoui.exe"66⤵
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\wbpqhr.exe"C:\Windows\system32\wbpqhr.exe"67⤵
- Drops file in System32 directory
PID:1296 -
C:\Windows\SysWOW64\wsksue.exe"C:\Windows\system32\wsksue.exe"68⤵
- Drops file in System32 directory
PID:3024 -
C:\Windows\SysWOW64\wxbsd.exe"C:\Windows\system32\wxbsd.exe"69⤵PID:1060
-
C:\Windows\SysWOW64\wpvurx.exe"C:\Windows\system32\wpvurx.exe"70⤵PID:2800
-
C:\Windows\SysWOW64\wybgk.exe"C:\Windows\system32\wybgk.exe"71⤵
- Drops file in System32 directory
PID:1836 -
C:\Windows\SysWOW64\wbhauom.exe"C:\Windows\system32\wbhauom.exe"72⤵PID:1948
-
C:\Windows\SysWOW64\wkvvup.exe"C:\Windows\system32\wkvvup.exe"73⤵
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\SysWOW64\wlqdyhp.exe"C:\Windows\system32\wlqdyhp.exe"74⤵PID:3048
-
C:\Windows\SysWOW64\wrusyp.exe"C:\Windows\system32\wrusyp.exe"75⤵
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\wibftah.exe"C:\Windows\system32\wibftah.exe"76⤵
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\wrqcubk.exe"C:\Windows\system32\wrqcubk.exe"77⤵PID:1792
-
C:\Windows\SysWOW64\wfmhqu.exe"C:\Windows\system32\wfmhqu.exe"78⤵PID:2484
-
C:\Windows\SysWOW64\wkrxsdnwa.exe"C:\Windows\system32\wkrxsdnwa.exe"79⤵PID:2084
-
C:\Windows\SysWOW64\whxtl.exe"C:\Windows\system32\whxtl.exe"80⤵PID:2456
-
C:\Windows\SysWOW64\wmdvfohkc.exe"C:\Windows\system32\wmdvfohkc.exe"81⤵PID:1804
-
C:\Windows\SysWOW64\wrtuoahy.exe"C:\Windows\system32\wrtuoahy.exe"82⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\wwyjqhw.exe"C:\Windows\system32\wwyjqhw.exe"83⤵
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Windows\SysWOW64\wntmesn.exe"C:\Windows\system32\wntmesn.exe"84⤵
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\wklfvw.exe"C:\Windows\system32\wklfvw.exe"85⤵
- Drops file in System32 directory
PID:1960 -
C:\Windows\SysWOW64\wkrkaqoly.exe"C:\Windows\system32\wkrkaqoly.exe"86⤵PID:2556
-
C:\Windows\SysWOW64\wxgcqjv.exe"C:\Windows\system32\wxgcqjv.exe"87⤵
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\wcworwt.exe"C:\Windows\system32\wcworwt.exe"88⤵
- Drops file in System32 directory
PID:1208 -
C:\Windows\SysWOW64\whmna.exe"C:\Windows\system32\whmna.exe"89⤵
- System Location Discovery: System Language Discovery
PID:1212 -
C:\Windows\SysWOW64\wkdxbs.exe"C:\Windows\system32\wkdxbs.exe"90⤵
- Drops file in System32 directory
PID:2616 -
C:\Windows\SysWOW64\wgkhn.exe"C:\Windows\system32\wgkhn.exe"91⤵
- Drops file in System32 directory
PID:2684 -
C:\Windows\SysWOW64\wqntgvph.exe"C:\Windows\system32\wqntgvph.exe"92⤵
- Drops file in System32 directory
PID:2948 -
C:\Windows\SysWOW64\wnifsvm.exe"C:\Windows\system32\wnifsvm.exe"93⤵PID:1068
-
C:\Windows\SysWOW64\wfpsn.exe"C:\Windows\system32\wfpsn.exe"94⤵PID:2600
-
C:\Windows\SysWOW64\wjgeou.exe"C:\Windows\system32\wjgeou.exe"95⤵
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\wxuvfmt.exe"C:\Windows\system32\wxuvfmt.exe"96⤵
- Drops file in System32 directory
PID:1380 -
C:\Windows\SysWOW64\wcakh.exe"C:\Windows\system32\wcakh.exe"97⤵PID:1356
-
C:\Windows\SysWOW64\wmdwaubc.exe"C:\Windows\system32\wmdwaubc.exe"98⤵PID:548
-
C:\Windows\SysWOW64\wrjmceq.exe"C:\Windows\system32\wrjmceq.exe"99⤵
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\waxibes.exe"C:\Windows\system32\waxibes.exe"100⤵PID:2080
-
C:\Windows\SysWOW64\wkcste.exe"C:\Windows\system32\wkcste.exe"101⤵PID:2816
-
C:\Windows\SysWOW64\wtada.exe"C:\Windows\system32\wtada.exe"102⤵PID:2424
-
C:\Windows\SysWOW64\whnvqy.exe"C:\Windows\system32\whnvqy.exe"103⤵
- Drops file in System32 directory
PID:2724 -
C:\Windows\SysWOW64\wuulus.exe"C:\Windows\system32\wuulus.exe"104⤵PID:2368
-
C:\Windows\SysWOW64\wiatfk.exe"C:\Windows\system32\wiatfk.exe"105⤵
- Drops file in System32 directory
PID:2196 -
C:\Windows\SysWOW64\wxumibng.exe"C:\Windows\system32\wxumibng.exe"106⤵
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\SysWOW64\wdordj.exe"C:\Windows\system32\wdordj.exe"107⤵
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\wyglv.exe"C:\Windows\system32\wyglv.exe"108⤵PID:1620
-
C:\Windows\SysWOW64\wumjp.exe"C:\Windows\system32\wumjp.exe"109⤵PID:2860
-
C:\Windows\SysWOW64\wfqti.exe"C:\Windows\system32\wfqti.exe"110⤵
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\wjhfi.exe"C:\Windows\system32\wjhfi.exe"111⤵
- Drops file in System32 directory
PID:2924 -
C:\Windows\SysWOW64\wtlqb.exe"C:\Windows\system32\wtlqb.exe"112⤵PID:964
-
C:\Windows\SysWOW64\wqgenyug.exe"C:\Windows\system32\wqgenyug.exe"113⤵PID:1912
-
C:\Windows\SysWOW64\wmxvhcm.exe"C:\Windows\system32\wmxvhcm.exe"114⤵PID:1908
-
C:\Windows\SysWOW64\wrcli.exe"C:\Windows\system32\wrcli.exe"115⤵
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\wriql.exe"C:\Windows\system32\wriql.exe"116⤵
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\wioegq.exe"C:\Windows\system32\wioegq.exe"117⤵PID:2396
-
C:\Windows\SysWOW64\wfuaar.exe"C:\Windows\system32\wfuaar.exe"118⤵PID:1952
-
C:\Windows\SysWOW64\wjacudh.exe"C:\Windows\system32\wjacudh.exe"119⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\wvtc.exe"C:\Windows\system32\wvtc.exe"120⤵
- Drops file in System32 directory
PID:580 -
C:\Windows\SysWOW64\wcydyke.exe"C:\Windows\system32\wcydyke.exe"121⤵
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\wohtdgd.exe"C:\Windows\system32\wohtdgd.exe"122⤵PID:2980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-