Analysis
-
max time kernel
21s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 06:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe
-
Size
1.4MB
-
MD5
98513d260023a0cb3667f2e8dac81c4f
-
SHA1
189be40083f151d30b3c588accdc23ea6c2f5075
-
SHA256
2925a43bce9b41922ab001e421806ef21ae443d4f1eda68639a9b155d5dfb29e
-
SHA512
6eb37009bd8f8145ad9378c87605a6f0195ceed56213bc7d17bef6a78ef6889900442b8f38fb9bd44f780beaa7d7e328b51a2885c141414810a91f0d930a3f27
-
SSDEEP
24576:TQ7ceaRuHmGB7h+4E42P/M2euPuKpxLD2DgDQj9VEH2nyYtLDwI9T9aA/gfsc5E+:6g0Jl+4E42c2euWKpxLD2UDG9Ve2yuIp
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation lfhrkod.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation djfrssv.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation njhqema.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation vhbwxws.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation qoehdns.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation idcsndb.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation vjrccfe.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation ssmadyt.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation itkjhwr.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation ibylydx.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation qnteltf.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation tgvgaau.exe -
Executes dropped EXE 25 IoCs
pid Process 1588 ibylydx.exe 4964 ibylydx.exe 3456 vhbwxws.exe 3904 vhbwxws.exe 5292 qnteltf.exe 5520 qnteltf.exe 648 qoehdns.exe 5200 qoehdns.exe 644 idcsndb.exe 680 idcsndb.exe 4736 tgvgaau.exe 4488 tgvgaau.exe 2788 lfhrkod.exe 2268 lfhrkod.exe 684 djfrssv.exe 2992 djfrssv.exe 5440 vjrccfe.exe 5492 vjrccfe.exe 5896 ssmadyt.exe 4888 ssmadyt.exe 4832 njhqema.exe 3192 njhqema.exe 2624 itkjhwr.exe 3932 itkjhwr.exe 4328 qbgptzc.exe -
Drops file in System32 directory 26 IoCs
description ioc Process File created C:\Windows\SysWOW64\ibylydx.exe JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe File created C:\Windows\SysWOW64\qnteltf.exe vhbwxws.exe File opened for modification C:\Windows\SysWOW64\qnteltf.exe vhbwxws.exe File created C:\Windows\SysWOW64\tgvgaau.exe idcsndb.exe File created C:\Windows\SysWOW64\vjrccfe.exe djfrssv.exe File created C:\Windows\SysWOW64\ssmadyt.exe vjrccfe.exe File created C:\Windows\SysWOW64\qbgptzc.exe itkjhwr.exe File opened for modification C:\Windows\SysWOW64\qbgptzc.exe itkjhwr.exe File opened for modification C:\Windows\SysWOW64\tgvgaau.exe idcsndb.exe File created C:\Windows\SysWOW64\lfhrkod.exe tgvgaau.exe File created C:\Windows\SysWOW64\djfrssv.exe lfhrkod.exe File opened for modification C:\Windows\SysWOW64\vjrccfe.exe djfrssv.exe File opened for modification C:\Windows\SysWOW64\ssmadyt.exe vjrccfe.exe File created C:\Windows\SysWOW64\itkjhwr.exe njhqema.exe File opened for modification C:\Windows\SysWOW64\lfhrkod.exe tgvgaau.exe File created C:\Windows\SysWOW64\vhbwxws.exe ibylydx.exe File opened for modification C:\Windows\SysWOW64\qoehdns.exe qnteltf.exe File created C:\Windows\SysWOW64\idcsndb.exe qoehdns.exe File opened for modification C:\Windows\SysWOW64\idcsndb.exe qoehdns.exe File opened for modification C:\Windows\SysWOW64\djfrssv.exe lfhrkod.exe File created C:\Windows\SysWOW64\njhqema.exe ssmadyt.exe File opened for modification C:\Windows\SysWOW64\ibylydx.exe JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe File opened for modification C:\Windows\SysWOW64\vhbwxws.exe ibylydx.exe File created C:\Windows\SysWOW64\qoehdns.exe qnteltf.exe File opened for modification C:\Windows\SysWOW64\njhqema.exe ssmadyt.exe File opened for modification C:\Windows\SysWOW64\itkjhwr.exe njhqema.exe -
Suspicious use of SetThreadContext 13 IoCs
description pid Process procid_target PID 5036 set thread context of 4184 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 97 PID 1588 set thread context of 4964 1588 ibylydx.exe 104 PID 3456 set thread context of 3904 3456 vhbwxws.exe 110 PID 5292 set thread context of 5520 5292 qnteltf.exe 114 PID 648 set thread context of 5200 648 qoehdns.exe 118 PID 644 set thread context of 680 644 idcsndb.exe 122 PID 4736 set thread context of 4488 4736 tgvgaau.exe 126 PID 2788 set thread context of 2268 2788 lfhrkod.exe 130 PID 684 set thread context of 2992 684 djfrssv.exe 134 PID 5440 set thread context of 5492 5440 vjrccfe.exe 138 PID 5896 set thread context of 4888 5896 ssmadyt.exe 142 PID 4832 set thread context of 3192 4832 njhqema.exe 146 PID 2624 set thread context of 3932 2624 itkjhwr.exe 150 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3924 5036 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itkjhwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qnteltf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idcsndb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njhqema.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoehdns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qbgptzc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qoehdns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfhrkod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfhrkod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djfrssv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language itkjhwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhbwxws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgvgaau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djfrssv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjrccfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjrccfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idcsndb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ibylydx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ibylydx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhbwxws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qnteltf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgvgaau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssmadyt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njhqema.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssmadyt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 5964 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 95 PID 5036 wrote to memory of 5964 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 95 PID 5036 wrote to memory of 5964 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 95 PID 5036 wrote to memory of 4184 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 97 PID 5036 wrote to memory of 4184 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 97 PID 5036 wrote to memory of 4184 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 97 PID 5036 wrote to memory of 4184 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 97 PID 5036 wrote to memory of 4184 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 97 PID 5036 wrote to memory of 4184 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 97 PID 5036 wrote to memory of 4184 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 97 PID 5036 wrote to memory of 4184 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 97 PID 5036 wrote to memory of 4184 5036 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 97 PID 4184 wrote to memory of 1588 4184 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 100 PID 4184 wrote to memory of 1588 4184 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 100 PID 4184 wrote to memory of 1588 4184 JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe 100 PID 1588 wrote to memory of 5760 1588 ibylydx.exe 102 PID 1588 wrote to memory of 5760 1588 ibylydx.exe 102 PID 1588 wrote to memory of 5760 1588 ibylydx.exe 102 PID 1588 wrote to memory of 4964 1588 ibylydx.exe 104 PID 1588 wrote to memory of 4964 1588 ibylydx.exe 104 PID 1588 wrote to memory of 4964 1588 ibylydx.exe 104 PID 1588 wrote to memory of 4964 1588 ibylydx.exe 104 PID 1588 wrote to memory of 4964 1588 ibylydx.exe 104 PID 1588 wrote to memory of 4964 1588 ibylydx.exe 104 PID 1588 wrote to memory of 4964 1588 ibylydx.exe 104 PID 1588 wrote to memory of 4964 1588 ibylydx.exe 104 PID 1588 wrote to memory of 4964 1588 ibylydx.exe 104 PID 4964 wrote to memory of 3456 4964 ibylydx.exe 105 PID 4964 wrote to memory of 3456 4964 ibylydx.exe 105 PID 4964 wrote to memory of 3456 4964 ibylydx.exe 105 PID 3456 wrote to memory of 4180 3456 vhbwxws.exe 106 PID 3456 wrote to memory of 4180 3456 vhbwxws.exe 106 PID 3456 wrote to memory of 4180 3456 vhbwxws.exe 106 PID 3456 wrote to memory of 3904 3456 vhbwxws.exe 110 PID 3456 wrote to memory of 3904 3456 vhbwxws.exe 110 PID 3456 wrote to memory of 3904 3456 vhbwxws.exe 110 PID 3456 wrote to memory of 3904 3456 vhbwxws.exe 110 PID 3456 wrote to memory of 3904 3456 vhbwxws.exe 110 PID 3456 wrote to memory of 3904 3456 vhbwxws.exe 110 PID 3456 wrote to memory of 3904 3456 vhbwxws.exe 110 PID 3456 wrote to memory of 3904 3456 vhbwxws.exe 110 PID 3456 wrote to memory of 3904 3456 vhbwxws.exe 110 PID 3904 wrote to memory of 5292 3904 vhbwxws.exe 111 PID 3904 wrote to memory of 5292 3904 vhbwxws.exe 111 PID 3904 wrote to memory of 5292 3904 vhbwxws.exe 111 PID 5292 wrote to memory of 3696 5292 qnteltf.exe 112 PID 5292 wrote to memory of 3696 5292 qnteltf.exe 112 PID 5292 wrote to memory of 3696 5292 qnteltf.exe 112 PID 5292 wrote to memory of 5520 5292 qnteltf.exe 114 PID 5292 wrote to memory of 5520 5292 qnteltf.exe 114 PID 5292 wrote to memory of 5520 5292 qnteltf.exe 114 PID 5292 wrote to memory of 5520 5292 qnteltf.exe 114 PID 5292 wrote to memory of 5520 5292 qnteltf.exe 114 PID 5292 wrote to memory of 5520 5292 qnteltf.exe 114 PID 5292 wrote to memory of 5520 5292 qnteltf.exe 114 PID 5292 wrote to memory of 5520 5292 qnteltf.exe 114 PID 5292 wrote to memory of 5520 5292 qnteltf.exe 114 PID 5520 wrote to memory of 648 5520 qnteltf.exe 115 PID 5520 wrote to memory of 648 5520 qnteltf.exe 115 PID 5520 wrote to memory of 648 5520 qnteltf.exe 115 PID 648 wrote to memory of 472 648 qoehdns.exe 116 PID 648 wrote to memory of 472 648 qoehdns.exe 116 PID 648 wrote to memory of 472 648 qoehdns.exe 116 PID 648 wrote to memory of 5200 648 qoehdns.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\shlap.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:5964
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\ibylydx.exeC:\Windows\system32\ibylydx.exe 1000 "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98513d260023a0cb3667f2e8dac81c4f.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nvtfu.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:5760
-
-
C:\Windows\SysWOW64\ibylydx.exeC:\Windows\SysWOW64\ibylydx.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\vhbwxws.exeC:\Windows\system32\vhbwxws.exe 1156 "C:\Windows\SysWOW64\ibylydx.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sbail.bat" "6⤵
- System Location Discovery: System Language Discovery
PID:4180
-
-
C:\Windows\SysWOW64\vhbwxws.exeC:\Windows\SysWOW64\vhbwxws.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\qnteltf.exeC:\Windows\system32\qnteltf.exe 1044 "C:\Windows\SysWOW64\vhbwxws.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jnmbw.bat" "8⤵
- System Location Discovery: System Language Discovery
PID:3696
-
-
C:\Windows\SysWOW64\qnteltf.exeC:\Windows\SysWOW64\qnteltf.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5520 -
C:\Windows\SysWOW64\qoehdns.exeC:\Windows\system32\qoehdns.exe 1016 "C:\Windows\SysWOW64\qnteltf.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rkmrc.bat" "10⤵
- System Location Discovery: System Language Discovery
PID:472
-
-
C:\Windows\SysWOW64\qoehdns.exeC:\Windows\SysWOW64\qoehdns.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5200 -
C:\Windows\SysWOW64\idcsndb.exeC:\Windows\system32\idcsndb.exe 1044 "C:\Windows\SysWOW64\qoehdns.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pouur.bat" "12⤵
- System Location Discovery: System Language Discovery
PID:760
-
-
C:\Windows\SysWOW64\idcsndb.exeC:\Windows\SysWOW64\idcsndb.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:680 -
C:\Windows\SysWOW64\tgvgaau.exeC:\Windows\system32\tgvgaau.exe 1016 "C:\Windows\SysWOW64\idcsndb.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xrjtx.bat" "14⤵
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\SysWOW64\tgvgaau.exeC:\Windows\SysWOW64\tgvgaau.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Windows\SysWOW64\lfhrkod.exeC:\Windows\system32\lfhrkod.exe 988 "C:\Windows\SysWOW64\tgvgaau.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ntnwq.bat" "16⤵
- System Location Discovery: System Language Discovery
PID:632
-
-
C:\Windows\SysWOW64\lfhrkod.exeC:\Windows\SysWOW64\lfhrkod.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\djfrssv.exeC:\Windows\system32\djfrssv.exe 1032 "C:\Windows\SysWOW64\lfhrkod.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ujcpa.bat" "18⤵
- System Location Discovery: System Language Discovery
PID:3928
-
-
C:\Windows\SysWOW64\djfrssv.exeC:\Windows\SysWOW64\djfrssv.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\vjrccfe.exeC:\Windows\system32\vjrccfe.exe 1068 "C:\Windows\SysWOW64\djfrssv.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kanrv.bat" "20⤵
- System Location Discovery: System Language Discovery
PID:5560
-
-
C:\Windows\SysWOW64\vjrccfe.exeC:\Windows\SysWOW64\vjrccfe.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5492 -
C:\Windows\SysWOW64\ssmadyt.exeC:\Windows\system32\ssmadyt.exe 1020 "C:\Windows\SysWOW64\vjrccfe.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xlidh.bat" "22⤵
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Windows\SysWOW64\ssmadyt.exeC:\Windows\SysWOW64\ssmadyt.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Windows\SysWOW64\njhqema.exeC:\Windows\system32\njhqema.exe 1052 "C:\Windows\SysWOW64\ssmadyt.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ifgmu.bat" "24⤵
- System Location Discovery: System Language Discovery
PID:5816
-
-
C:\Windows\SysWOW64\njhqema.exeC:\Windows\SysWOW64\njhqema.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Windows\SysWOW64\itkjhwr.exeC:\Windows\system32\itkjhwr.exe 1032 "C:\Windows\SysWOW64\njhqema.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\diwhk.bat" "26⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\itkjhwr.exeC:\Windows\SysWOW64\itkjhwr.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3932 -
C:\Windows\SysWOW64\qbgptzc.exeC:\Windows\system32\qbgptzc.exe 1044 "C:\Windows\SysWOW64\itkjhwr.exe"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\shlyb.bat" "28⤵PID:3436
-
-
C:\Windows\SysWOW64\qbgptzc.exeC:\Windows\SysWOW64\qbgptzc.exe28⤵PID:4296
-
C:\Windows\SysWOW64\nkauusj.exeC:\Windows\system32\nkauusj.exe 1044 "C:\Windows\SysWOW64\qbgptzc.exe"29⤵PID:6132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\avase.bat" "30⤵PID:5156
-
-
C:\Windows\SysWOW64\nkauusj.exeC:\Windows\SysWOW64\nkauusj.exe30⤵PID:2360
-
C:\Windows\SysWOW64\vejkptc.exeC:\Windows\system32\vejkptc.exe 1044 "C:\Windows\SysWOW64\nkauusj.exe"31⤵PID:1236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\swbqs.bat" "32⤵PID:1984
-
-
C:\Windows\SysWOW64\vejkptc.exeC:\Windows\SysWOW64\vejkptc.exe32⤵PID:1436
-
C:\Windows\SysWOW64\nauubmo.exeC:\Windows\system32\nauubmo.exe 1056 "C:\Windows\SysWOW64\vejkptc.exe"33⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ckgic.bat" "34⤵PID:1248
-
-
C:\Windows\SysWOW64\nauubmo.exeC:\Windows\SysWOW64\nauubmo.exe34⤵PID:1852
-
C:\Windows\SysWOW64\xsuaqzq.exeC:\Windows\system32\xsuaqzq.exe 1020 "C:\Windows\SysWOW64\nauubmo.exe"35⤵PID:6140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uiapu.bat" "36⤵PID:4268
-
-
C:\Windows\SysWOW64\xsuaqzq.exeC:\Windows\SysWOW64\xsuaqzq.exe36⤵PID:2852
-
C:\Windows\SysWOW64\cyxlprm.exeC:\Windows\system32\cyxlprm.exe 1032 "C:\Windows\SysWOW64\xsuaqzq.exe"37⤵PID:2848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kwojf.bat" "38⤵PID:5720
-
-
C:\Windows\SysWOW64\cyxlprm.exeC:\Windows\SysWOW64\cyxlprm.exe38⤵PID:6104
-
C:\Windows\SysWOW64\ppcmlmz.exeC:\Windows\system32\ppcmlmz.exe 1052 "C:\Windows\SysWOW64\cyxlprm.exe"39⤵PID:536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\unsxo.bat" "40⤵PID:5412
-
-
C:\Windows\SysWOW64\ppcmlmz.exeC:\Windows\SysWOW64\ppcmlmz.exe40⤵PID:5440
-
C:\Windows\SysWOW64\ugjsfhn.exeC:\Windows\system32\ugjsfhn.exe 1044 "C:\Windows\SysWOW64\ppcmlmz.exe"41⤵PID:5220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wgbfj.bat" "42⤵PID:5328
-
-
C:\Windows\SysWOW64\ugjsfhn.exeC:\Windows\SysWOW64\ugjsfhn.exe42⤵PID:5136
-
C:\Windows\SysWOW64\uvicipw.exeC:\Windows\system32\uvicipw.exe 1032 "C:\Windows\SysWOW64\ugjsfhn.exe"43⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oguex.bat" "44⤵PID:4120
-
-
C:\Windows\SysWOW64\uvicipw.exeC:\Windows\SysWOW64\uvicipw.exe44⤵PID:2624
-
C:\Windows\SysWOW64\mvvymxh.exeC:\Windows\system32\mvvymxh.exe 1020 "C:\Windows\SysWOW64\uvicipw.exe"45⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qgdmy.bat" "46⤵PID:3444
-
-
C:\Windows\SysWOW64\mvvymxh.exeC:\Windows\SysWOW64\mvvymxh.exe46⤵PID:3968
-
C:\Windows\SysWOW64\ktdlzer.exeC:\Windows\system32\ktdlzer.exe 1044 "C:\Windows\SysWOW64\mvvymxh.exe"47⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fbfox.bat" "48⤵PID:3516
-
-
C:\Windows\SysWOW64\ktdlzer.exeC:\Windows\SysWOW64\ktdlzer.exe48⤵PID:4192
-
C:\Windows\SysWOW64\pfyepnz.exeC:\Windows\system32\pfyepnz.exe 1044 "C:\Windows\SysWOW64\ktdlzer.exe"49⤵PID:3396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\edwhg.bat" "50⤵PID:876
-
-
C:\Windows\SysWOW64\pfyepnz.exeC:\Windows\SysWOW64\pfyepnz.exe50⤵PID:3028
-
C:\Windows\SysWOW64\puxxsdi.exeC:\Windows\system32\puxxsdi.exe 1044 "C:\Windows\SysWOW64\pfyepnz.exe"51⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xyywr.bat" "52⤵PID:2748
-
-
C:\Windows\SysWOW64\puxxsdi.exeC:\Windows\SysWOW64\puxxsdi.exe52⤵PID:5912
-
C:\Windows\SysWOW64\fsiaexe.exeC:\Windows\system32\fsiaexe.exe 1016 "C:\Windows\SysWOW64\puxxsdi.exe"53⤵PID:696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xvygo.bat" "54⤵PID:5152
-
-
C:\Windows\SysWOW64\fsiaexe.exeC:\Windows\SysWOW64\fsiaexe.exe54⤵PID:2312
-
C:\Windows\SysWOW64\kbzigch.exeC:\Windows\system32\kbzigch.exe 1012 "C:\Windows\SysWOW64\fsiaexe.exe"55⤵PID:1212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vhlgh.bat" "56⤵PID:2044
-
-
C:\Windows\SysWOW64\kbzigch.exeC:\Windows\SysWOW64\kbzigch.exe56⤵PID:5472
-
C:\Windows\SysWOW64\rqkljow.exeC:\Windows\system32\rqkljow.exe 1044 "C:\Windows\SysWOW64\kbzigch.exe"57⤵PID:5748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yvbmf.bat" "58⤵PID:4628
-
-
C:\Windows\SysWOW64\rqkljow.exeC:\Windows\SysWOW64\rqkljow.exe58⤵PID:4936
-
C:\Windows\SysWOW64\rrujpjl.exeC:\Windows\system32\rrujpjl.exe 1044 "C:\Windows\SysWOW64\rqkljow.exe"59⤵PID:2688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\srccp.bat" "60⤵PID:880
-
-
C:\Windows\SysWOW64\rrujpjl.exeC:\Windows\SysWOW64\rrujpjl.exe60⤵PID:5964
-
C:\Windows\SysWOW64\hoguadz.exeC:\Windows\system32\hoguadz.exe 1044 "C:\Windows\SysWOW64\rrujpjl.exe"61⤵PID:788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wcsod.bat" "62⤵PID:1992
-
-
C:\Windows\SysWOW64\hoguadz.exeC:\Windows\SysWOW64\hoguadz.exe62⤵PID:3972
-
C:\Windows\SysWOW64\hatsapj.exeC:\Windows\system32\hatsapj.exe 1044 "C:\Windows\SysWOW64\hoguadz.exe"63⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nglhu.bat" "64⤵PID:4020
-
-
C:\Windows\SysWOW64\hatsapj.exeC:\Windows\SysWOW64\hatsapj.exe64⤵PID:3416
-
C:\Windows\SysWOW64\zsonfpc.exeC:\Windows\system32\zsonfpc.exe 1016 "C:\Windows\SysWOW64\hatsapj.exe"65⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oymvw.bat" "66⤵PID:5168
-
-
C:\Windows\SysWOW64\zsonfpc.exeC:\Windows\SysWOW64\zsonfpc.exe66⤵PID:2864
-
C:\Windows\SysWOW64\ebxwhuf.exeC:\Windows\system32\ebxwhuf.exe 1032 "C:\Windows\SysWOW64\zsonfpc.exe"67⤵PID:696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\duoyv.bat" "68⤵PID:2908
-
-
C:\Windows\SysWOW64\ebxwhuf.exeC:\Windows\SysWOW64\ebxwhuf.exe68⤵PID:5836
-
C:\Windows\SysWOW64\ucumwka.exeC:\Windows\system32\ucumwka.exe 1020 "C:\Windows\SysWOW64\ebxwhuf.exe"69⤵PID:536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hemep.bat" "70⤵PID:5788
-
-
C:\Windows\SysWOW64\ucumwka.exeC:\Windows\SysWOW64\ucumwka.exe70⤵PID:4892
-
C:\Windows\SysWOW64\uohkwwc.exeC:\Windows\system32\uohkwwc.exe 1016 "C:\Windows\SysWOW64\ucumwka.exe"71⤵PID:976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\baott.bat" "72⤵PID:5872
-
-
C:\Windows\SysWOW64\uohkwwc.exeC:\Windows\SysWOW64\uohkwwc.exe72⤵PID:1556
-
C:\Windows\SysWOW64\erixibv.exeC:\Windows\system32\erixibv.exe 1044 "C:\Windows\SysWOW64\uohkwwc.exe"73⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bfhbn.bat" "74⤵PID:868
-
-
C:\Windows\SysWOW64\erixibv.exeC:\Windows\SysWOW64\erixibv.exe74⤵PID:3964
-
C:\Windows\SysWOW64\twxorkz.exeC:\Windows\system32\twxorkz.exe 1028 "C:\Windows\SysWOW64\erixibv.exe"75⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fhxga.bat" "76⤵PID:6140
-
-
C:\Windows\SysWOW64\twxorkz.exeC:\Windows\SysWOW64\twxorkz.exe76⤵PID:4088
-
C:\Windows\SysWOW64\zfhotpc.exeC:\Windows\system32\zfhotpc.exe 1012 "C:\Windows\SysWOW64\twxorkz.exe"77⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uxjhv.bat" "78⤵PID:5104
-
-
C:\Windows\SysWOW64\zfhotpc.exeC:\Windows\SysWOW64\zfhotpc.exe78⤵PID:3896
-
C:\Windows\SysWOW64\ocszxkq.exeC:\Windows\system32\ocszxkq.exe 1040 "C:\Windows\SysWOW64\zfhotpc.exe"79⤵PID:5188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmxbg.bat" "80⤵PID:5792
-
-
C:\Windows\SysWOW64\ocszxkq.exeC:\Windows\SysWOW64\ocszxkq.exe80⤵PID:536
-
C:\Windows\SysWOW64\lsafkqb.exeC:\Windows\system32\lsafkqb.exe 1060 "C:\Windows\SysWOW64\ocszxkq.exe"81⤵PID:6112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\movrt.bat" "82⤵PID:976
-
-
C:\Windows\SysWOW64\lsafkqb.exeC:\Windows\SysWOW64\lsafkqb.exe82⤵PID:4328
-
C:\Windows\SysWOW64\ggaskvt.exeC:\Windows\system32\ggaskvt.exe 1044 "C:\Windows\SysWOW64\lsafkqb.exe"83⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xiigl.bat" "84⤵PID:3840
-
-
C:\Windows\SysWOW64\ggaskvt.exeC:\Windows\SysWOW64\ggaskvt.exe84⤵PID:772
-
C:\Windows\SysWOW64\esxtmxx.exeC:\Windows\system32\esxtmxx.exe 1036 "C:\Windows\SysWOW64\ggaskvt.exe"85⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\flpyf.bat" "86⤵PID:3620
-
-
C:\Windows\SysWOW64\esxtmxx.exeC:\Windows\SysWOW64\esxtmxx.exe86⤵PID:4612
-
C:\Windows\SysWOW64\wtkoqxq.exeC:\Windows\system32\wtkoqxq.exe 1020 "C:\Windows\SysWOW64\esxtmxx.exe"87⤵PID:2848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eqigy.bat" "88⤵PID:5828
-
-
C:\Windows\SysWOW64\wtkoqxq.exeC:\Windows\SysWOW64\wtkoqxq.exe88⤵PID:6096
-
C:\Windows\SysWOW64\yhyilgl.exeC:\Windows\system32\yhyilgl.exe 1044 "C:\Windows\SysWOW64\wtkoqxq.exe"89⤵PID:4132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yxqel.bat" "90⤵PID:4988
-
-
C:\Windows\SysWOW64\yhyilgl.exeC:\Windows\SysWOW64\yhyilgl.exe90⤵PID:5992
-
C:\Windows\SysWOW64\dbaymso.exeC:\Windows\system32\dbaymso.exe 1016 "C:\Windows\SysWOW64\yhyilgl.exe"91⤵PID:3688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rdkle.bat" "92⤵PID:696
-
-
C:\Windows\SysWOW64\dbaymso.exeC:\Windows\SysWOW64\dbaymso.exe92⤵PID:4860
-
C:\Windows\SysWOW64\dyymulh.exeC:\Windows\system32\dyymulh.exe 1044 "C:\Windows\SysWOW64\dbaymso.exe"93⤵PID:5240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uqbau.bat" "94⤵PID:6076
-
-
C:\Windows\SysWOW64\dyymulh.exeC:\Windows\SysWOW64\dyymulh.exe94⤵PID:352
-
C:\Windows\SysWOW64\ejmkuxr.exeC:\Windows\system32\ejmkuxr.exe 1016 "C:\Windows\SysWOW64\dyymulh.exe"95⤵PID:2304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jmeut.bat" "96⤵PID:5408
-
-
C:\Windows\SysWOW64\ejmkuxr.exeC:\Windows\SysWOW64\ejmkuxr.exe96⤵PID:3460
-
C:\Windows\SysWOW64\wyosesd.exeC:\Windows\system32\wyosesd.exe 1044 "C:\Windows\SysWOW64\ejmkuxr.exe"97⤵PID:5844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dmfcd.bat" "98⤵PID:6100
-
-
C:\Windows\SysWOW64\wyosesd.exeC:\Windows\SysWOW64\wyosesd.exe98⤵PID:5072
-
C:\Windows\SysWOW64\ixswxxi.exeC:\Windows\system32\ixswxxi.exe 1028 "C:\Windows\SysWOW64\wyosesd.exe"99⤵PID:1752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dkyjw.bat" "100⤵PID:2860
-
-
C:\Windows\SysWOW64\ixswxxi.exeC:\Windows\SysWOW64\ixswxxi.exe100⤵PID:6028
-
C:\Windows\SysWOW64\taapbjd.exeC:\Windows\system32\taapbjd.exe 1016 "C:\Windows\SysWOW64\ixswxxi.exe"101⤵PID:5864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xyhoi.bat" "102⤵PID:3688
-
-
C:\Windows\SysWOW64\taapbjd.exeC:\Windows\SysWOW64\taapbjd.exe102⤵PID:540
-
C:\Windows\SysWOW64\dbavrwf.exeC:\Windows\system32\dbavrwf.exe 1048 "C:\Windows\SysWOW64\taapbjd.exe"103⤵PID:5256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pitxy.bat" "104⤵PID:5932
-
-
C:\Windows\SysWOW64\dbavrwf.exeC:\Windows\SysWOW64\dbavrwf.exe104⤵PID:4588
-
C:\Windows\SysWOW64\qkguslh.exeC:\Windows\system32\qkguslh.exe 1016 "C:\Windows\SysWOW64\dbavrwf.exe"105⤵PID:644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\trkcs.bat" "106⤵PID:4864
-
-
C:\Windows\SysWOW64\qkguslh.exeC:\Windows\SysWOW64\qkguslh.exe106⤵PID:6112
-
C:\Windows\SysWOW64\lnmpemn.exeC:\Windows\system32\lnmpemn.exe 1016 "C:\Windows\SysWOW64\qkguslh.exe"107⤵PID:516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jiveo.bat" "108⤵PID:3660
-
-
C:\Windows\SysWOW64\lnmpemn.exeC:\Windows\SysWOW64\lnmpemn.exe108⤵PID:4560
-
C:\Windows\SysWOW64\vxnyiwu.exeC:\Windows\system32\vxnyiwu.exe 1040 "C:\Windows\SysWOW64\lnmpemn.exe"109⤵PID:1784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dbwkx.bat" "110⤵PID:2356
-
-
C:\Windows\SysWOW64\vxnyiwu.exeC:\Windows\SysWOW64\vxnyiwu.exe110⤵PID:4540
-
C:\Windows\SysWOW64\qxnwjca.exeC:\Windows\system32\qxnwjca.exe 1020 "C:\Windows\SysWOW64\vxnyiwu.exe"111⤵PID:4744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jcwdy.bat" "112⤵PID:1036
-
-
C:\Windows\SysWOW64\qxnwjca.exeC:\Windows\SysWOW64\qxnwjca.exe112⤵PID:3976
-
C:\Windows\SysWOW64\yulkfcx.exeC:\Windows\system32\yulkfcx.exe 1056 "C:\Windows\SysWOW64\qxnwjca.exe"113⤵PID:5880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yphos.bat" "114⤵PID:1108
-
-
C:\Windows\SysWOW64\yulkfcx.exeC:\Windows\SysWOW64\yulkfcx.exe114⤵PID:544
-
C:\Windows\SysWOW64\seyingw.exeC:\Windows\system32\seyingw.exe 1016 "C:\Windows\SysWOW64\yulkfcx.exe"115⤵PID:2856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pelys.bat" "116⤵PID:1172
-
-
C:\Windows\SysWOW64\seyingw.exeC:\Windows\SysWOW64\seyingw.exe116⤵PID:4744
-
C:\Windows\SysWOW64\yjezjjt.exeC:\Windows\system32\yjezjjt.exe 1056 "C:\Windows\SysWOW64\seyingw.exe"117⤵PID:5296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wsaav.bat" "118⤵PID:1872
-
-
C:\Windows\SysWOW64\yjezjjt.exeC:\Windows\SysWOW64\yjezjjt.exe118⤵PID:5188
-
C:\Windows\SysWOW64\kajzglg.exeC:\Windows\system32\kajzglg.exe 1044 "C:\Windows\SysWOW64\yjezjjt.exe"119⤵PID:3740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mjlbr.bat" "120⤵PID:5360
-
-
C:\Windows\SysWOW64\kajzglg.exeC:\Windows\SysWOW64\kajzglg.exe120⤵PID:5032
-
C:\Windows\SysWOW64\ijdfhwv.exeC:\Windows\system32\ijdfhwv.exe 1016 "C:\Windows\SysWOW64\kajzglg.exe"121⤵PID:4948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mheik.bat" "122⤵PID:1784
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-