Analysis
-
max time kernel
150s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe
-
Size
222KB
-
MD5
f38d258532673cf62200ab2d7dd5268a
-
SHA1
39bf714b2e9ffb5a8cf534977588b71e35952ec6
-
SHA256
5edaadd37dd1dd9425dbbbdcd360194fe1f965ae971a5c8165a3effdc25c7e80
-
SHA512
b2c994c3e6575c0463d4278220f79e29867f37049076e28c97feab5af90eec86a472a0f12945df608d73336121c2ff7b9a0c6b30ba82906c67d7f3fdcedc28cf
-
SSDEEP
6144:ASOrStDEnqmNpMBN+Mcqfbobx4aRrxyre5HfTLGSa:pOrp/N2h4x4aRYixLba
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
Processes:
jgzpwd.exejgzpwd.exeeqfrnk.exeeqfrnk.execdafem.execdafem.exeemscwi.exeemscwi.exehpvaiw.exehpvaiw.exegiwkci.exegiwkci.exehixyoq.exehixyoq.exeefeypx.exeefeypx.exehxwizg.exehxwizg.exeeyowvj.exeeyowvj.exeeueodn.exeeueodn.exebwwbhq.exebwwbhq.exebexoty.exebexoty.exezqtcja.exezqtcja.exezquhva.exezquhva.exewrmuzl.exewrmuzl.exewcymnp.exewcymnp.exewczszx.exewczszx.exezurqrt.exezurqrt.exeeglkcq.exeeglkcq.exebertvp.exebertvp.exetpeljb.exetpeljb.exettidxf.exettidxf.exernmrwh.exernmrwh.exerubwnq.exerubwnq.exeqjzbey.exeqjzbey.exervlusk.exervlusk.exeryympo.exeryympo.exerkkeda.exerkkeda.exerklkpa.exerklkpa.exerzjpgq.exerzjpgq.exeroyvxy.exeroyvxy.exepid process 2372 jgzpwd.exe 4496 jgzpwd.exe 3596 eqfrnk.exe 3424 eqfrnk.exe 2432 cdafem.exe 4624 cdafem.exe 2652 emscwi.exe 1096 emscwi.exe 3272 hpvaiw.exe 1776 hpvaiw.exe 4888 giwkci.exe 972 giwkci.exe 3024 hixyoq.exe 3568 hixyoq.exe 928 efeypx.exe 2020 efeypx.exe 216 hxwizg.exe 1664 hxwizg.exe 4992 eyowvj.exe 4308 eyowvj.exe 4648 eueodn.exe 2508 eueodn.exe 4712 bwwbhq.exe 1040 bwwbhq.exe 3592 bexoty.exe 4520 bexoty.exe 5032 zqtcja.exe 3420 zqtcja.exe 4396 zquhva.exe 4380 zquhva.exe 1092 wrmuzl.exe 4964 wrmuzl.exe 3412 wcymnp.exe 3176 wcymnp.exe 4256 wczszx.exe 3688 wczszx.exe 3572 zurqrt.exe 2528 zurqrt.exe 4428 eglkcq.exe 5016 eglkcq.exe 2060 bertvp.exe 2620 bertvp.exe 3488 tpeljb.exe 4760 tpeljb.exe 212 ttidxf.exe 3544 ttidxf.exe 4156 rnmrwh.exe 4144 rnmrwh.exe 3996 rubwnq.exe 4476 rubwnq.exe 4836 qjzbey.exe 4732 qjzbey.exe 2260 rvlusk.exe 2540 rvlusk.exe 1144 ryympo.exe 2764 ryympo.exe 4080 rkkeda.exe 3560 rkkeda.exe 1720 rklkpa.exe 4048 rklkpa.exe 5104 rzjpgq.exe 3596 rzjpgq.exe 4380 royvxy.exe 1588 royvxy.exe -
Drops file in System32 directory 64 IoCs
Processes:
tbsmlf.exetnefaj.exehxwizg.exerkkeda.exeictkgz.exeuflaaf.exezmvtab.exebavlwu.exelhrzhi.exeztfsud.exesxelnv.exewjtiyi.exefdpvre.exebertvp.exeryympo.exeqzgclf.exevjccyd.exepzugln.exensuszy.exedqvijx.exehpvaiw.exetpeljb.exersvlzx.exeqkhrip.exessique.exeuqwvjp.execjlwjw.exeunznlu.exebfthzr.exewzctsl.exetsjnuv.exetpgoqo.exenwhdhx.exeypckby.exexhypvc.execdyvxz.exettmdru.exezyrmzk.exebqetnw.exewckiyz.exesxbbpw.exezpjbsf.exezvfpaj.exeqqjfeg.exeiggfqh.exewbebxg.exebgtvlh.exeymaejf.exexmfqou.exebrpehc.exejgzpwd.exervlusk.exeoubvrn.exeuhhhgs.execkqknq.exebbfqfk.exeoorlcv.exetkisfr.exelygiul.exeizcypi.exencqbyh.exevbrwcg.exedescription ioc process File opened for modification C:\Windows\SysWOW64\tnefaj.exe tbsmlf.exe File opened for modification C:\Windows\SysWOW64\tqqxov.exe tnefaj.exe File created C:\Windows\SysWOW64\eyowvj.exe hxwizg.exe File created C:\Windows\SysWOW64\rklkpa.exe rkkeda.exe File created C:\Windows\SysWOW64\hjqpxq.exe ictkgz.exe File created C:\Windows\SysWOW64\uujfan.exe uflaaf.exe File created C:\Windows\SysWOW64\wkutbi.exe zmvtab.exe File opened for modification C:\Windows\SysWOW64\edyijh.exe bavlwu.exe File opened for modification C:\Windows\SysWOW64\oogcxa.exe lhrzhi.exe File created C:\Windows\SysWOW64\cwapgr.exe ztfsud.exe File opened for modification C:\Windows\SysWOW64\recqem.exe sxelnv.exe File opened for modification C:\Windows\SysWOW64\zewfkv.exe wjtiyi.exe File opened for modification C:\Windows\SysWOW64\fvqnlz.exe fdpvre.exe File created C:\Windows\SysWOW64\tpeljb.exe bertvp.exe File created C:\Windows\SysWOW64\rkkeda.exe ryympo.exe File opened for modification C:\Windows\SysWOW64\qoehdn.exe qzgclf.exe File opened for modification C:\Windows\SysWOW64\vpsixt.exe vjccyd.exe File created C:\Windows\SysWOW64\oorlcv.exe pzugln.exe File created C:\Windows\SysWOW64\qvxqll.exe nsuszy.exe File opened for modification C:\Windows\SysWOW64\wkutbi.exe zmvtab.exe File created C:\Windows\SysWOW64\duhbfc.exe dqvijx.exe File created C:\Windows\SysWOW64\giwkci.exe hpvaiw.exe File created C:\Windows\SysWOW64\ttidxf.exe tpeljb.exe File created C:\Windows\SysWOW64\qhkqqf.exe rsvlzx.exe File created C:\Windows\SysWOW64\qvujxt.exe qkhrip.exe File opened for modification C:\Windows\SysWOW64\seuiji.exe ssique.exe File created C:\Windows\SysWOW64\uflaaf.exe uqwvjp.exe File opened for modification C:\Windows\SysWOW64\cuxpfa.exe cjlwjw.exe File created C:\Windows\SysWOW64\uymfzy.exe unznlu.exe File created C:\Windows\SysWOW64\bndmlq.exe bfthzr.exe File created C:\Windows\SysWOW64\woryrc.exe wzctsl.exe File created C:\Windows\SysWOW64\tlsyoi.exe tsjnuv.exe File opened for modification C:\Windows\SysWOW64\tstges.exe tpgoqo.exe File created C:\Windows\SysWOW64\qcwnwo.exe nwhdhx.exe File opened for modification C:\Windows\SysWOW64\bgtvlh.exe ypckby.exe File created C:\Windows\SysWOW64\akbnip.exe xhypvc.exe File created C:\Windows\SysWOW64\uoknml.exe cdyvxz.exe File created C:\Windows\SysWOW64\twzvny.exe ttmdru.exe File opened for modification C:\Windows\SysWOW64\zjveno.exe zyrmzk.exe File opened for modification C:\Windows\SysWOW64\bbqlbi.exe bqetnw.exe File created C:\Windows\SysWOW64\tarjry.exe wckiyz.exe File created C:\Windows\SysWOW64\smygoe.exe sxbbpw.exe File opened for modification C:\Windows\SysWOW64\apkhle.exe zpjbsf.exe File opened for modification C:\Windows\SysWOW64\zgshon.exe zvfpaj.exe File opened for modification C:\Windows\SysWOW64\ttmdru.exe qqjfeg.exe File created C:\Windows\SysWOW64\ivdkhq.exe iggfqh.exe File created C:\Windows\SysWOW64\wnquls.exe wbebxg.exe File created C:\Windows\SysWOW64\avjacx.exe bgtvlh.exe File opened for modification C:\Windows\SysWOW64\ypmwxj.exe ymaejf.exe File opened for modification C:\Windows\SysWOW64\asltem.exe xmfqou.exe File opened for modification C:\Windows\SysWOW64\bgekzl.exe brpehc.exe File opened for modification C:\Windows\SysWOW64\eqfrnk.exe jgzpwd.exe File opened for modification C:\Windows\SysWOW64\ryympo.exe rvlusk.exe File opened for modification C:\Windows\SysWOW64\ofnnfz.exe oubvrn.exe File opened for modification C:\Windows\SysWOW64\xnvjvk.exe uhhhgs.exe File opened for modification C:\Windows\SysWOW64\fntizl.exe ckqknq.exe File created C:\Windows\SysWOW64\bnrjuw.exe bbfqfk.exe File created C:\Windows\SysWOW64\pzeezz.exe oorlcv.exe File opened for modification C:\Windows\SysWOW64\pzeezz.exe oorlcv.exe File opened for modification C:\Windows\SysWOW64\onlqrf.exe tkisfr.exe File opened for modification C:\Windows\SysWOW64\iwnink.exe lygiul.exe File opened for modification C:\Windows\SysWOW64\lrtjza.exe izcypi.exe File created C:\Windows\SysWOW64\kolwwc.exe ncqbyh.exe File created C:\Windows\SysWOW64\sqqwdf.exe vbrwcg.exe -
Suspicious use of SetThreadContext 64 IoCs
Processes:
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exejgzpwd.exeeqfrnk.execdafem.exeemscwi.exehpvaiw.exegiwkci.exehixyoq.exeefeypx.exehxwizg.exeeyowvj.exeeueodn.exebwwbhq.exebexoty.exezqtcja.exezquhva.exewrmuzl.exewcymnp.exewczszx.exezurqrt.exeeglkcq.exebertvp.exetpeljb.exettidxf.exernmrwh.exerubwnq.exeqjzbey.exervlusk.exeryympo.exerkkeda.exerklkpa.exerzjpgq.exeroyvxy.exerzlnmc.exeuuolyq.exersvlzx.exeqhkqqf.exeqkxjfr.exervjbtv.exetymzgi.exetnkefz.exetrwwtd.exetcjpip.exetryuzx.exetywaqf.exetkisfr.exeonlqrf.exeoubvrn.exeofnnfz.exeoultwh.exeoumyip.exeojjezx.exeqtbtrt.exeqfnmgx.exeqiaecj.exeqxxjts.exeqmnpka.exeqyzhzm.exeqbmanq.exeqqjfeg.exettmdru.exetwzvny.exewzctsl.exeworyrc.exedescription pid process target process PID 4484 set thread context of 612 4484 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 2372 set thread context of 4496 2372 jgzpwd.exe jgzpwd.exe PID 3596 set thread context of 3424 3596 eqfrnk.exe eqfrnk.exe PID 2432 set thread context of 4624 2432 cdafem.exe cdafem.exe PID 2652 set thread context of 1096 2652 emscwi.exe emscwi.exe PID 3272 set thread context of 1776 3272 hpvaiw.exe hpvaiw.exe PID 4888 set thread context of 972 4888 giwkci.exe giwkci.exe PID 3024 set thread context of 3568 3024 hixyoq.exe hixyoq.exe PID 928 set thread context of 2020 928 efeypx.exe efeypx.exe PID 216 set thread context of 1664 216 hxwizg.exe hxwizg.exe PID 4992 set thread context of 4308 4992 eyowvj.exe eyowvj.exe PID 4648 set thread context of 2508 4648 eueodn.exe eueodn.exe PID 4712 set thread context of 1040 4712 bwwbhq.exe bwwbhq.exe PID 3592 set thread context of 4520 3592 bexoty.exe bexoty.exe PID 5032 set thread context of 3420 5032 zqtcja.exe zqtcja.exe PID 4396 set thread context of 4380 4396 zquhva.exe zquhva.exe PID 1092 set thread context of 4964 1092 wrmuzl.exe wrmuzl.exe PID 3412 set thread context of 3176 3412 wcymnp.exe wcymnp.exe PID 4256 set thread context of 3688 4256 wczszx.exe wczszx.exe PID 3572 set thread context of 2528 3572 zurqrt.exe zurqrt.exe PID 4428 set thread context of 5016 4428 eglkcq.exe eglkcq.exe PID 2060 set thread context of 2620 2060 bertvp.exe bertvp.exe PID 3488 set thread context of 4760 3488 tpeljb.exe tpeljb.exe PID 212 set thread context of 3544 212 ttidxf.exe ttidxf.exe PID 4156 set thread context of 4144 4156 rnmrwh.exe rnmrwh.exe PID 3996 set thread context of 4476 3996 rubwnq.exe rubwnq.exe PID 4836 set thread context of 4732 4836 qjzbey.exe qjzbey.exe PID 2260 set thread context of 2540 2260 rvlusk.exe rvlusk.exe PID 1144 set thread context of 2764 1144 ryympo.exe ryympo.exe PID 4080 set thread context of 3560 4080 rkkeda.exe rkkeda.exe PID 1720 set thread context of 4048 1720 rklkpa.exe rklkpa.exe PID 5104 set thread context of 3596 5104 rzjpgq.exe rzjpgq.exe PID 4380 set thread context of 1588 4380 royvxy.exe royvxy.exe PID 3412 set thread context of 1512 3412 rzlnmc.exe rzlnmc.exe PID 1412 set thread context of 2736 1412 uuolyq.exe uuolyq.exe PID 2600 set thread context of 1776 2600 rsvlzx.exe rsvlzx.exe PID 2228 set thread context of 440 2228 qhkqqf.exe qhkqqf.exe PID 2392 set thread context of 3848 2392 qkxjfr.exe qkxjfr.exe PID 972 set thread context of 4728 972 rvjbtv.exe rvjbtv.exe PID 752 set thread context of 2216 752 tymzgi.exe tymzgi.exe PID 5088 set thread context of 3484 5088 tnkefz.exe tnkefz.exe PID 4656 set thread context of 4328 4656 trwwtd.exe trwwtd.exe PID 2904 set thread context of 4932 2904 tcjpip.exe tcjpip.exe PID 1920 set thread context of 3496 1920 tryuzx.exe tryuzx.exe PID 5080 set thread context of 2072 5080 tywaqf.exe tywaqf.exe PID 2956 set thread context of 1944 2956 tkisfr.exe tkisfr.exe PID 4808 set thread context of 3764 4808 onlqrf.exe onlqrf.exe PID 3420 set thread context of 3500 3420 oubvrn.exe oubvrn.exe PID 2832 set thread context of 512 2832 ofnnfz.exe ofnnfz.exe PID 728 set thread context of 3156 728 oultwh.exe oultwh.exe PID 2740 set thread context of 2268 2740 oumyip.exe oumyip.exe PID 2648 set thread context of 3340 2648 ojjezx.exe ojjezx.exe PID 1084 set thread context of 2000 1084 qtbtrt.exe qtbtrt.exe PID 2136 set thread context of 3608 2136 qfnmgx.exe qfnmgx.exe PID 2060 set thread context of 2768 2060 qiaecj.exe qiaecj.exe PID 3488 set thread context of 3716 3488 qxxjts.exe qxxjts.exe PID 368 set thread context of 4448 368 qmnpka.exe qmnpka.exe PID 4156 set thread context of 5112 4156 qyzhzm.exe qyzhzm.exe PID 3996 set thread context of 4004 3996 qbmanq.exe qbmanq.exe PID 4060 set thread context of 4876 4060 qqjfeg.exe qqjfeg.exe PID 724 set thread context of 3664 724 ttmdru.exe ttmdru.exe PID 2968 set thread context of 772 2968 twzvny.exe twzvny.exe PID 3348 set thread context of 436 3348 wzctsl.exe wzctsl.exe PID 4496 set thread context of 2204 4496 woryrc.exe woryrc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exejgzpwd.exeeqfrnk.execdafem.exeemscwi.exehpvaiw.exegiwkci.exehixyoq.exeefeypx.exehxwizg.exeeyowvj.exeeueodn.exebwwbhq.exebexoty.exezqtcja.exezquhva.exewrmuzl.exewcymnp.exewczszx.exezurqrt.exeeglkcq.exebertvp.exetpeljb.exettidxf.exernmrwh.exerubwnq.exeqjzbey.exervlusk.exeryympo.exerkkeda.exerklkpa.exerzjpgq.exepid process 4484 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 4484 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe 2372 jgzpwd.exe 2372 jgzpwd.exe 3596 eqfrnk.exe 3596 eqfrnk.exe 2432 cdafem.exe 2432 cdafem.exe 2652 emscwi.exe 2652 emscwi.exe 3272 hpvaiw.exe 3272 hpvaiw.exe 4888 giwkci.exe 4888 giwkci.exe 3024 hixyoq.exe 3024 hixyoq.exe 928 efeypx.exe 928 efeypx.exe 216 hxwizg.exe 216 hxwizg.exe 4992 eyowvj.exe 4992 eyowvj.exe 4648 eueodn.exe 4648 eueodn.exe 4712 bwwbhq.exe 4712 bwwbhq.exe 3592 bexoty.exe 3592 bexoty.exe 5032 zqtcja.exe 5032 zqtcja.exe 4396 zquhva.exe 4396 zquhva.exe 1092 wrmuzl.exe 1092 wrmuzl.exe 3412 wcymnp.exe 3412 wcymnp.exe 4256 wczszx.exe 4256 wczszx.exe 3572 zurqrt.exe 3572 zurqrt.exe 4428 eglkcq.exe 4428 eglkcq.exe 2060 bertvp.exe 2060 bertvp.exe 3488 tpeljb.exe 3488 tpeljb.exe 212 ttidxf.exe 212 ttidxf.exe 4156 rnmrwh.exe 4156 rnmrwh.exe 3996 rubwnq.exe 3996 rubwnq.exe 4836 qjzbey.exe 4836 qjzbey.exe 2260 rvlusk.exe 2260 rvlusk.exe 1144 ryympo.exe 1144 ryympo.exe 4080 rkkeda.exe 4080 rkkeda.exe 1720 rklkpa.exe 1720 rklkpa.exe 5104 rzjpgq.exe 5104 rzjpgq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exef38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exejgzpwd.exejgzpwd.exeeqfrnk.exeeqfrnk.execdafem.execdafem.exeemscwi.exeemscwi.exehpvaiw.exehpvaiw.exegiwkci.exegiwkci.exehixyoq.exehixyoq.exedescription pid process target process PID 4484 wrote to memory of 612 4484 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 4484 wrote to memory of 612 4484 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 4484 wrote to memory of 612 4484 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 4484 wrote to memory of 612 4484 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 4484 wrote to memory of 612 4484 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe PID 612 wrote to memory of 2372 612 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe jgzpwd.exe PID 612 wrote to memory of 2372 612 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe jgzpwd.exe PID 612 wrote to memory of 2372 612 f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe jgzpwd.exe PID 2372 wrote to memory of 4496 2372 jgzpwd.exe jgzpwd.exe PID 2372 wrote to memory of 4496 2372 jgzpwd.exe jgzpwd.exe PID 2372 wrote to memory of 4496 2372 jgzpwd.exe jgzpwd.exe PID 2372 wrote to memory of 4496 2372 jgzpwd.exe jgzpwd.exe PID 2372 wrote to memory of 4496 2372 jgzpwd.exe jgzpwd.exe PID 4496 wrote to memory of 3596 4496 jgzpwd.exe eqfrnk.exe PID 4496 wrote to memory of 3596 4496 jgzpwd.exe eqfrnk.exe PID 4496 wrote to memory of 3596 4496 jgzpwd.exe eqfrnk.exe PID 3596 wrote to memory of 3424 3596 eqfrnk.exe eqfrnk.exe PID 3596 wrote to memory of 3424 3596 eqfrnk.exe eqfrnk.exe PID 3596 wrote to memory of 3424 3596 eqfrnk.exe eqfrnk.exe PID 3596 wrote to memory of 3424 3596 eqfrnk.exe eqfrnk.exe PID 3596 wrote to memory of 3424 3596 eqfrnk.exe eqfrnk.exe PID 3424 wrote to memory of 2432 3424 eqfrnk.exe cdafem.exe PID 3424 wrote to memory of 2432 3424 eqfrnk.exe cdafem.exe PID 3424 wrote to memory of 2432 3424 eqfrnk.exe cdafem.exe PID 2432 wrote to memory of 4624 2432 cdafem.exe cdafem.exe PID 2432 wrote to memory of 4624 2432 cdafem.exe cdafem.exe PID 2432 wrote to memory of 4624 2432 cdafem.exe cdafem.exe PID 2432 wrote to memory of 4624 2432 cdafem.exe cdafem.exe PID 2432 wrote to memory of 4624 2432 cdafem.exe cdafem.exe PID 4624 wrote to memory of 2652 4624 cdafem.exe emscwi.exe PID 4624 wrote to memory of 2652 4624 cdafem.exe emscwi.exe PID 4624 wrote to memory of 2652 4624 cdafem.exe emscwi.exe PID 2652 wrote to memory of 1096 2652 emscwi.exe emscwi.exe PID 2652 wrote to memory of 1096 2652 emscwi.exe emscwi.exe PID 2652 wrote to memory of 1096 2652 emscwi.exe emscwi.exe PID 2652 wrote to memory of 1096 2652 emscwi.exe emscwi.exe PID 2652 wrote to memory of 1096 2652 emscwi.exe emscwi.exe PID 1096 wrote to memory of 3272 1096 emscwi.exe hpvaiw.exe PID 1096 wrote to memory of 3272 1096 emscwi.exe hpvaiw.exe PID 1096 wrote to memory of 3272 1096 emscwi.exe hpvaiw.exe PID 3272 wrote to memory of 1776 3272 hpvaiw.exe hpvaiw.exe PID 3272 wrote to memory of 1776 3272 hpvaiw.exe hpvaiw.exe PID 3272 wrote to memory of 1776 3272 hpvaiw.exe hpvaiw.exe PID 3272 wrote to memory of 1776 3272 hpvaiw.exe hpvaiw.exe PID 3272 wrote to memory of 1776 3272 hpvaiw.exe hpvaiw.exe PID 1776 wrote to memory of 4888 1776 hpvaiw.exe giwkci.exe PID 1776 wrote to memory of 4888 1776 hpvaiw.exe giwkci.exe PID 1776 wrote to memory of 4888 1776 hpvaiw.exe giwkci.exe PID 4888 wrote to memory of 972 4888 giwkci.exe giwkci.exe PID 4888 wrote to memory of 972 4888 giwkci.exe giwkci.exe PID 4888 wrote to memory of 972 4888 giwkci.exe giwkci.exe PID 4888 wrote to memory of 972 4888 giwkci.exe giwkci.exe PID 4888 wrote to memory of 972 4888 giwkci.exe giwkci.exe PID 972 wrote to memory of 3024 972 giwkci.exe hixyoq.exe PID 972 wrote to memory of 3024 972 giwkci.exe hixyoq.exe PID 972 wrote to memory of 3024 972 giwkci.exe hixyoq.exe PID 3024 wrote to memory of 3568 3024 hixyoq.exe hixyoq.exe PID 3024 wrote to memory of 3568 3024 hixyoq.exe hixyoq.exe PID 3024 wrote to memory of 3568 3024 hixyoq.exe hixyoq.exe PID 3024 wrote to memory of 3568 3024 hixyoq.exe hixyoq.exe PID 3024 wrote to memory of 3568 3024 hixyoq.exe hixyoq.exe PID 3568 wrote to memory of 928 3568 hixyoq.exe efeypx.exe PID 3568 wrote to memory of 928 3568 hixyoq.exe efeypx.exe PID 3568 wrote to memory of 928 3568 hixyoq.exe efeypx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\jgzpwd.exeC:\Windows\system32\jgzpwd.exe 996 "C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\jgzpwd.exe996 C:\Users\Admin\AppData\Local\Temp\f38d258532673cf62200ab2d7dd5268a_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\eqfrnk.exeC:\Windows\system32\eqfrnk.exe 1136 "C:\Windows\SysWOW64\jgzpwd.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\eqfrnk.exe1136 C:\Windows\SysWOW64\jgzpwd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\cdafem.exeC:\Windows\system32\cdafem.exe 1036 "C:\Windows\SysWOW64\eqfrnk.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\cdafem.exe1036 C:\Windows\SysWOW64\eqfrnk.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\emscwi.exeC:\Windows\system32\emscwi.exe 1028 "C:\Windows\SysWOW64\cdafem.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\emscwi.exe1028 C:\Windows\SysWOW64\cdafem.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\hpvaiw.exeC:\Windows\system32\hpvaiw.exe 1020 "C:\Windows\SysWOW64\emscwi.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\hpvaiw.exe1020 C:\Windows\SysWOW64\emscwi.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\giwkci.exeC:\Windows\system32\giwkci.exe 1104 "C:\Windows\SysWOW64\hpvaiw.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\giwkci.exe1104 C:\Windows\SysWOW64\hpvaiw.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\hixyoq.exeC:\Windows\system32\hixyoq.exe 1008 "C:\Windows\SysWOW64\giwkci.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\hixyoq.exe1008 C:\Windows\SysWOW64\giwkci.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\efeypx.exeC:\Windows\system32\efeypx.exe 1008 "C:\Windows\SysWOW64\hixyoq.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Windows\SysWOW64\efeypx.exe1008 C:\Windows\SysWOW64\hixyoq.exe18⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\hxwizg.exeC:\Windows\system32\hxwizg.exe 1144 "C:\Windows\SysWOW64\efeypx.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:216 -
C:\Windows\SysWOW64\hxwizg.exe1144 C:\Windows\SysWOW64\efeypx.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1664 -
C:\Windows\SysWOW64\eyowvj.exeC:\Windows\system32\eyowvj.exe 1020 "C:\Windows\SysWOW64\hxwizg.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4992 -
C:\Windows\SysWOW64\eyowvj.exe1020 C:\Windows\SysWOW64\hxwizg.exe22⤵
- Executes dropped EXE
PID:4308 -
C:\Windows\SysWOW64\eueodn.exeC:\Windows\system32\eueodn.exe 1144 "C:\Windows\SysWOW64\eyowvj.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4648 -
C:\Windows\SysWOW64\eueodn.exe1144 C:\Windows\SysWOW64\eyowvj.exe24⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\bwwbhq.exeC:\Windows\system32\bwwbhq.exe 1020 "C:\Windows\SysWOW64\eueodn.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4712 -
C:\Windows\SysWOW64\bwwbhq.exe1020 C:\Windows\SysWOW64\eueodn.exe26⤵
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\bexoty.exeC:\Windows\system32\bexoty.exe 1140 "C:\Windows\SysWOW64\bwwbhq.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3592 -
C:\Windows\SysWOW64\bexoty.exe1140 C:\Windows\SysWOW64\bwwbhq.exe28⤵
- Executes dropped EXE
PID:4520 -
C:\Windows\SysWOW64\zqtcja.exeC:\Windows\system32\zqtcja.exe 1084 "C:\Windows\SysWOW64\bexoty.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5032 -
C:\Windows\SysWOW64\zqtcja.exe1084 C:\Windows\SysWOW64\bexoty.exe30⤵
- Executes dropped EXE
PID:3420 -
C:\Windows\SysWOW64\zquhva.exeC:\Windows\system32\zquhva.exe 1008 "C:\Windows\SysWOW64\zqtcja.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4396 -
C:\Windows\SysWOW64\zquhva.exe1008 C:\Windows\SysWOW64\zqtcja.exe32⤵
- Executes dropped EXE
PID:4380 -
C:\Windows\SysWOW64\wrmuzl.exeC:\Windows\system32\wrmuzl.exe 1104 "C:\Windows\SysWOW64\zquhva.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1092 -
C:\Windows\SysWOW64\wrmuzl.exe1104 C:\Windows\SysWOW64\zquhva.exe34⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\wcymnp.exeC:\Windows\system32\wcymnp.exe 1020 "C:\Windows\SysWOW64\wrmuzl.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3412 -
C:\Windows\SysWOW64\wcymnp.exe1020 C:\Windows\SysWOW64\wrmuzl.exe36⤵
- Executes dropped EXE
PID:3176 -
C:\Windows\SysWOW64\wczszx.exeC:\Windows\system32\wczszx.exe 1028 "C:\Windows\SysWOW64\wcymnp.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4256 -
C:\Windows\SysWOW64\wczszx.exe1028 C:\Windows\SysWOW64\wcymnp.exe38⤵
- Executes dropped EXE
PID:3688 -
C:\Windows\SysWOW64\zurqrt.exeC:\Windows\system32\zurqrt.exe 1144 "C:\Windows\SysWOW64\wczszx.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3572 -
C:\Windows\SysWOW64\zurqrt.exe1144 C:\Windows\SysWOW64\wczszx.exe40⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\SysWOW64\eglkcq.exeC:\Windows\system32\eglkcq.exe 1144 "C:\Windows\SysWOW64\zurqrt.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4428 -
C:\Windows\SysWOW64\eglkcq.exe1144 C:\Windows\SysWOW64\zurqrt.exe42⤵
- Executes dropped EXE
PID:5016 -
C:\Windows\SysWOW64\bertvp.exeC:\Windows\system32\bertvp.exe 1016 "C:\Windows\SysWOW64\eglkcq.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\bertvp.exe1016 C:\Windows\SysWOW64\eglkcq.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2620 -
C:\Windows\SysWOW64\tpeljb.exeC:\Windows\system32\tpeljb.exe 1140 "C:\Windows\SysWOW64\bertvp.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3488 -
C:\Windows\SysWOW64\tpeljb.exe1140 C:\Windows\SysWOW64\bertvp.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4760 -
C:\Windows\SysWOW64\ttidxf.exeC:\Windows\system32\ttidxf.exe 1032 "C:\Windows\SysWOW64\tpeljb.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:212 -
C:\Windows\SysWOW64\ttidxf.exe1032 C:\Windows\SysWOW64\tpeljb.exe48⤵
- Executes dropped EXE
PID:3544 -
C:\Windows\SysWOW64\rnmrwh.exeC:\Windows\system32\rnmrwh.exe 1140 "C:\Windows\SysWOW64\ttidxf.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4156 -
C:\Windows\SysWOW64\rnmrwh.exe1140 C:\Windows\SysWOW64\ttidxf.exe50⤵
- Executes dropped EXE
PID:4144 -
C:\Windows\SysWOW64\rubwnq.exeC:\Windows\system32\rubwnq.exe 1036 "C:\Windows\SysWOW64\rnmrwh.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3996 -
C:\Windows\SysWOW64\rubwnq.exe1036 C:\Windows\SysWOW64\rnmrwh.exe52⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\SysWOW64\qjzbey.exeC:\Windows\system32\qjzbey.exe 1104 "C:\Windows\SysWOW64\rubwnq.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4836 -
C:\Windows\SysWOW64\qjzbey.exe1104 C:\Windows\SysWOW64\rubwnq.exe54⤵
- Executes dropped EXE
PID:4732 -
C:\Windows\SysWOW64\rvlusk.exeC:\Windows\system32\rvlusk.exe 1020 "C:\Windows\SysWOW64\qjzbey.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\rvlusk.exe1020 C:\Windows\SysWOW64\qjzbey.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\ryympo.exeC:\Windows\system32\ryympo.exe 1020 "C:\Windows\SysWOW64\rvlusk.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1144 -
C:\Windows\SysWOW64\ryympo.exe1020 C:\Windows\SysWOW64\rvlusk.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2764 -
C:\Windows\SysWOW64\rkkeda.exeC:\Windows\system32\rkkeda.exe 1028 "C:\Windows\SysWOW64\ryympo.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4080 -
C:\Windows\SysWOW64\rkkeda.exe1028 C:\Windows\SysWOW64\ryympo.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3560 -
C:\Windows\SysWOW64\rklkpa.exeC:\Windows\system32\rklkpa.exe 1036 "C:\Windows\SysWOW64\rkkeda.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\rklkpa.exe1036 C:\Windows\SysWOW64\rkkeda.exe62⤵
- Executes dropped EXE
PID:4048 -
C:\Windows\SysWOW64\rzjpgq.exeC:\Windows\system32\rzjpgq.exe 1020 "C:\Windows\SysWOW64\rklkpa.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5104 -
C:\Windows\SysWOW64\rzjpgq.exe1020 C:\Windows\SysWOW64\rklkpa.exe64⤵
- Executes dropped EXE
PID:3596 -
C:\Windows\SysWOW64\royvxy.exeC:\Windows\system32\royvxy.exe 1020 "C:\Windows\SysWOW64\rzjpgq.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4380 -
C:\Windows\SysWOW64\royvxy.exe1020 C:\Windows\SysWOW64\rzjpgq.exe66⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\rzlnmc.exeC:\Windows\system32\rzlnmc.exe 1012 "C:\Windows\SysWOW64\royvxy.exe"67⤵
- Suspicious use of SetThreadContext
PID:3412 -
C:\Windows\SysWOW64\rzlnmc.exe1012 C:\Windows\SysWOW64\royvxy.exe68⤵PID:1512
-
C:\Windows\SysWOW64\uuolyq.exeC:\Windows\system32\uuolyq.exe 1148 "C:\Windows\SysWOW64\rzlnmc.exe"69⤵
- Suspicious use of SetThreadContext
PID:1412 -
C:\Windows\SysWOW64\uuolyq.exe1148 C:\Windows\SysWOW64\rzlnmc.exe70⤵PID:2736
-
C:\Windows\SysWOW64\rsvlzx.exeC:\Windows\system32\rsvlzx.exe 1032 "C:\Windows\SysWOW64\uuolyq.exe"71⤵
- Suspicious use of SetThreadContext
PID:2600 -
C:\Windows\SysWOW64\rsvlzx.exe1032 C:\Windows\SysWOW64\uuolyq.exe72⤵
- Drops file in System32 directory
PID:1776 -
C:\Windows\SysWOW64\qhkqqf.exeC:\Windows\system32\qhkqqf.exe 1140 "C:\Windows\SysWOW64\rsvlzx.exe"73⤵
- Suspicious use of SetThreadContext
PID:2228 -
C:\Windows\SysWOW64\qhkqqf.exe1140 C:\Windows\SysWOW64\rsvlzx.exe74⤵PID:440
-
C:\Windows\SysWOW64\qkxjfr.exeC:\Windows\system32\qkxjfr.exe 1140 "C:\Windows\SysWOW64\qhkqqf.exe"75⤵
- Suspicious use of SetThreadContext
PID:2392 -
C:\Windows\SysWOW64\qkxjfr.exe1140 C:\Windows\SysWOW64\qhkqqf.exe76⤵PID:3848
-
C:\Windows\SysWOW64\rvjbtv.exeC:\Windows\system32\rvjbtv.exe 1040 "C:\Windows\SysWOW64\qkxjfr.exe"77⤵
- Suspicious use of SetThreadContext
PID:972 -
C:\Windows\SysWOW64\rvjbtv.exe1040 C:\Windows\SysWOW64\qkxjfr.exe78⤵PID:4728
-
C:\Windows\SysWOW64\tymzgi.exeC:\Windows\system32\tymzgi.exe 1036 "C:\Windows\SysWOW64\rvjbtv.exe"79⤵
- Suspicious use of SetThreadContext
PID:752 -
C:\Windows\SysWOW64\tymzgi.exe1036 C:\Windows\SysWOW64\rvjbtv.exe80⤵PID:2216
-
C:\Windows\SysWOW64\tnkefz.exeC:\Windows\system32\tnkefz.exe 1148 "C:\Windows\SysWOW64\tymzgi.exe"81⤵
- Suspicious use of SetThreadContext
PID:5088 -
C:\Windows\SysWOW64\tnkefz.exe1148 C:\Windows\SysWOW64\tymzgi.exe82⤵PID:3484
-
C:\Windows\SysWOW64\trwwtd.exeC:\Windows\system32\trwwtd.exe 1036 "C:\Windows\SysWOW64\tnkefz.exe"83⤵
- Suspicious use of SetThreadContext
PID:4656 -
C:\Windows\SysWOW64\trwwtd.exe1036 C:\Windows\SysWOW64\tnkefz.exe84⤵PID:4328
-
C:\Windows\SysWOW64\tcjpip.exeC:\Windows\system32\tcjpip.exe 1120 "C:\Windows\SysWOW64\trwwtd.exe"85⤵
- Suspicious use of SetThreadContext
PID:2904 -
C:\Windows\SysWOW64\tcjpip.exe1120 C:\Windows\SysWOW64\trwwtd.exe86⤵PID:4932
-
C:\Windows\SysWOW64\tryuzx.exeC:\Windows\system32\tryuzx.exe 1008 "C:\Windows\SysWOW64\tcjpip.exe"87⤵
- Suspicious use of SetThreadContext
PID:1920 -
C:\Windows\SysWOW64\tryuzx.exe1008 C:\Windows\SysWOW64\tcjpip.exe88⤵PID:3496
-
C:\Windows\SysWOW64\tywaqf.exeC:\Windows\system32\tywaqf.exe 1140 "C:\Windows\SysWOW64\tryuzx.exe"89⤵
- Suspicious use of SetThreadContext
PID:5080 -
C:\Windows\SysWOW64\tywaqf.exe1140 C:\Windows\SysWOW64\tryuzx.exe90⤵PID:2072
-
C:\Windows\SysWOW64\tkisfr.exeC:\Windows\system32\tkisfr.exe 1008 "C:\Windows\SysWOW64\tywaqf.exe"91⤵
- Suspicious use of SetThreadContext
PID:2956 -
C:\Windows\SysWOW64\tkisfr.exe1008 C:\Windows\SysWOW64\tywaqf.exe92⤵
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\onlqrf.exeC:\Windows\system32\onlqrf.exe 1028 "C:\Windows\SysWOW64\tkisfr.exe"93⤵
- Suspicious use of SetThreadContext
PID:4808 -
C:\Windows\SysWOW64\onlqrf.exe1028 C:\Windows\SysWOW64\tkisfr.exe94⤵PID:3764
-
C:\Windows\SysWOW64\oubvrn.exeC:\Windows\system32\oubvrn.exe 912 "C:\Windows\SysWOW64\onlqrf.exe"95⤵
- Suspicious use of SetThreadContext
PID:3420 -
C:\Windows\SysWOW64\oubvrn.exe912 C:\Windows\SysWOW64\onlqrf.exe96⤵
- Drops file in System32 directory
PID:3500 -
C:\Windows\SysWOW64\ofnnfz.exeC:\Windows\system32\ofnnfz.exe 1140 "C:\Windows\SysWOW64\oubvrn.exe"97⤵
- Suspicious use of SetThreadContext
PID:2832 -
C:\Windows\SysWOW64\ofnnfz.exe1140 C:\Windows\SysWOW64\oubvrn.exe98⤵PID:512
-
C:\Windows\SysWOW64\oultwh.exeC:\Windows\system32\oultwh.exe 1028 "C:\Windows\SysWOW64\ofnnfz.exe"99⤵
- Suspicious use of SetThreadContext
PID:728 -
C:\Windows\SysWOW64\oultwh.exe1028 C:\Windows\SysWOW64\ofnnfz.exe100⤵PID:3156
-
C:\Windows\SysWOW64\oumyip.exeC:\Windows\system32\oumyip.exe 1040 "C:\Windows\SysWOW64\oultwh.exe"101⤵
- Suspicious use of SetThreadContext
PID:2740 -
C:\Windows\SysWOW64\oumyip.exe1040 C:\Windows\SysWOW64\oultwh.exe102⤵PID:2268
-
C:\Windows\SysWOW64\ojjezx.exeC:\Windows\system32\ojjezx.exe 1020 "C:\Windows\SysWOW64\oumyip.exe"103⤵
- Suspicious use of SetThreadContext
PID:2648 -
C:\Windows\SysWOW64\ojjezx.exe1020 C:\Windows\SysWOW64\oumyip.exe104⤵PID:3340
-
C:\Windows\SysWOW64\qtbtrt.exeC:\Windows\system32\qtbtrt.exe 1032 "C:\Windows\SysWOW64\ojjezx.exe"105⤵
- Suspicious use of SetThreadContext
PID:1084 -
C:\Windows\SysWOW64\qtbtrt.exe1032 C:\Windows\SysWOW64\ojjezx.exe106⤵PID:2000
-
C:\Windows\SysWOW64\qfnmgx.exeC:\Windows\system32\qfnmgx.exe 1048 "C:\Windows\SysWOW64\qtbtrt.exe"107⤵
- Suspicious use of SetThreadContext
PID:2136 -
C:\Windows\SysWOW64\qfnmgx.exe1048 C:\Windows\SysWOW64\qtbtrt.exe108⤵PID:3608
-
C:\Windows\SysWOW64\qiaecj.exeC:\Windows\system32\qiaecj.exe 1008 "C:\Windows\SysWOW64\qfnmgx.exe"109⤵
- Suspicious use of SetThreadContext
PID:2060 -
C:\Windows\SysWOW64\qiaecj.exe1008 C:\Windows\SysWOW64\qfnmgx.exe110⤵PID:2768
-
C:\Windows\SysWOW64\qxxjts.exeC:\Windows\system32\qxxjts.exe 1012 "C:\Windows\SysWOW64\qiaecj.exe"111⤵
- Suspicious use of SetThreadContext
PID:3488 -
C:\Windows\SysWOW64\qxxjts.exe1012 C:\Windows\SysWOW64\qiaecj.exe112⤵PID:3716
-
C:\Windows\SysWOW64\qmnpka.exeC:\Windows\system32\qmnpka.exe 1032 "C:\Windows\SysWOW64\qxxjts.exe"113⤵
- Suspicious use of SetThreadContext
PID:368 -
C:\Windows\SysWOW64\qmnpka.exe1032 C:\Windows\SysWOW64\qxxjts.exe114⤵PID:4448
-
C:\Windows\SysWOW64\qyzhzm.exeC:\Windows\system32\qyzhzm.exe 1020 "C:\Windows\SysWOW64\qmnpka.exe"115⤵
- Suspicious use of SetThreadContext
PID:4156 -
C:\Windows\SysWOW64\qyzhzm.exe1020 C:\Windows\SysWOW64\qmnpka.exe116⤵PID:5112
-
C:\Windows\SysWOW64\qbmanq.exeC:\Windows\system32\qbmanq.exe 1036 "C:\Windows\SysWOW64\qyzhzm.exe"117⤵
- Suspicious use of SetThreadContext
PID:3996 -
C:\Windows\SysWOW64\qbmanq.exe1036 C:\Windows\SysWOW64\qyzhzm.exe118⤵PID:4004
-
C:\Windows\SysWOW64\qqjfeg.exeC:\Windows\system32\qqjfeg.exe 1036 "C:\Windows\SysWOW64\qbmanq.exe"119⤵
- Suspicious use of SetThreadContext
PID:4060 -
C:\Windows\SysWOW64\qqjfeg.exe1036 C:\Windows\SysWOW64\qbmanq.exe120⤵
- Drops file in System32 directory
PID:4876 -
C:\Windows\SysWOW64\ttmdru.exeC:\Windows\system32\ttmdru.exe 1028 "C:\Windows\SysWOW64\qqjfeg.exe"121⤵
- Suspicious use of SetThreadContext
PID:724 -
C:\Windows\SysWOW64\ttmdru.exe1028 C:\Windows\SysWOW64\qqjfeg.exe122⤵
- Drops file in System32 directory
PID:3664 -
C:\Windows\SysWOW64\twzvny.exeC:\Windows\system32\twzvny.exe 1036 "C:\Windows\SysWOW64\ttmdru.exe"123⤵
- Suspicious use of SetThreadContext
PID:2968 -
C:\Windows\SysWOW64\twzvny.exe1036 C:\Windows\SysWOW64\ttmdru.exe124⤵PID:772
-
C:\Windows\SysWOW64\wzctsl.exeC:\Windows\system32\wzctsl.exe 1032 "C:\Windows\SysWOW64\twzvny.exe"125⤵
- Suspicious use of SetThreadContext
PID:3348 -
C:\Windows\SysWOW64\wzctsl.exe1032 C:\Windows\SysWOW64\twzvny.exe126⤵
- Drops file in System32 directory
PID:436 -
C:\Windows\SysWOW64\woryrc.exeC:\Windows\system32\woryrc.exe 1184 "C:\Windows\SysWOW64\wzctsl.exe"127⤵
- Suspicious use of SetThreadContext
PID:4496 -
C:\Windows\SysWOW64\woryrc.exe1184 C:\Windows\SysWOW64\wzctsl.exe128⤵PID:2204
-
C:\Windows\SysWOW64\txcgfa.exeC:\Windows\system32\txcgfa.exe 1140 "C:\Windows\SysWOW64\woryrc.exe"129⤵PID:4048
-
C:\Windows\SysWOW64\txcgfa.exe1140 C:\Windows\SysWOW64\woryrc.exe130⤵PID:3424
-
C:\Windows\SysWOW64\qvjgyz.exeC:\Windows\system32\qvjgyz.exe 1140 "C:\Windows\SysWOW64\txcgfa.exe"131⤵PID:3596
-
C:\Windows\SysWOW64\qvjgyz.exe1140 C:\Windows\SysWOW64\txcgfa.exe132⤵PID:1984
-
C:\Windows\SysWOW64\qyvzul.exeC:\Windows\system32\qyvzul.exe 1048 "C:\Windows\SysWOW64\qvjgyz.exe"133⤵PID:1588
-
C:\Windows\SysWOW64\qyvzul.exe1048 C:\Windows\SysWOW64\qvjgyz.exe134⤵PID:1204
-
C:\Windows\SysWOW64\qkhrip.exeC:\Windows\system32\qkhrip.exe 1008 "C:\Windows\SysWOW64\qyvzul.exe"135⤵PID:1524
-
C:\Windows\SysWOW64\qkhrip.exe1008 C:\Windows\SysWOW64\qyvzul.exe136⤵
- Drops file in System32 directory
PID:1320 -
C:\Windows\SysWOW64\qvujxt.exeC:\Windows\system32\qvujxt.exe 1140 "C:\Windows\SysWOW64\qkhrip.exe"137⤵PID:2736
-
C:\Windows\SysWOW64\qvujxt.exe1140 C:\Windows\SysWOW64\qkhrip.exe138⤵PID:4720
-
C:\Windows\SysWOW64\qzgclf.exeC:\Windows\system32\qzgclf.exe 1020 "C:\Windows\SysWOW64\qvujxt.exe"139⤵PID:2528
-
C:\Windows\SysWOW64\qzgclf.exe1020 C:\Windows\SysWOW64\qvujxt.exe140⤵
- Drops file in System32 directory
PID:1684 -
C:\Windows\SysWOW64\qoehdn.exeC:\Windows\system32\qoehdn.exe 1140 "C:\Windows\SysWOW64\qzgclf.exe"141⤵PID:3964
-
C:\Windows\SysWOW64\qoehdn.exe1140 C:\Windows\SysWOW64\qzgclf.exe142⤵PID:4844
-
C:\Windows\SysWOW64\izqazz.exeC:\Windows\system32\izqazz.exe 1012 "C:\Windows\SysWOW64\qoehdn.exe"143⤵PID:4548
-
C:\Windows\SysWOW64\izqazz.exe1012 C:\Windows\SysWOW64\qoehdn.exe144⤵PID:4284
-
C:\Windows\SysWOW64\iggfqh.exeC:\Windows\system32\iggfqh.exe 1012 "C:\Windows\SysWOW64\izqazz.exe"145⤵PID:216
-
C:\Windows\SysWOW64\iggfqh.exe1012 C:\Windows\SysWOW64\izqazz.exe146⤵
- Drops file in System32 directory
PID:1664 -
C:\Windows\SysWOW64\ivdkhq.exeC:\Windows\system32\ivdkhq.exe 1008 "C:\Windows\SysWOW64\iggfqh.exe"147⤵PID:2156
-
C:\Windows\SysWOW64\ivdkhq.exe1008 C:\Windows\SysWOW64\iggfqh.exe148⤵PID:4328
-
C:\Windows\SysWOW64\lygiul.exeC:\Windows\system32\lygiul.exe 1020 "C:\Windows\SysWOW64\ivdkhq.exe"149⤵PID:4060
-
C:\Windows\SysWOW64\lygiul.exe1020 C:\Windows\SysWOW64\ivdkhq.exe150⤵
- Drops file in System32 directory
PID:4768 -
C:\Windows\SysWOW64\iwnink.exeC:\Windows\system32\iwnink.exe 1032 "C:\Windows\SysWOW64\lygiul.exe"151⤵PID:4732
-
C:\Windows\SysWOW64\iwnink.exe1032 C:\Windows\SysWOW64\lygiul.exe152⤵PID:2128
-
C:\Windows\SysWOW64\iwoozs.exeC:\Windows\system32\iwoozs.exe 1008 "C:\Windows\SysWOW64\iwnink.exe"153⤵PID:2540
-
C:\Windows\SysWOW64\iwoozs.exe1008 C:\Windows\SysWOW64\iwnink.exe154⤵PID:2072
-
C:\Windows\SysWOW64\izbgvw.exeC:\Windows\system32\izbgvw.exe 1008 "C:\Windows\SysWOW64\iwoozs.exe"155⤵PID:396
-
C:\Windows\SysWOW64\izbgvw.exe1008 C:\Windows\SysWOW64\iwoozs.exe156⤵PID:1352
-
C:\Windows\SysWOW64\izcypi.exeC:\Windows\system32\izcypi.exe 1012 "C:\Windows\SysWOW64\izbgvw.exe"157⤵PID:404
-
C:\Windows\SysWOW64\izcypi.exe1012 C:\Windows\SysWOW64\izbgvw.exe158⤵
- Drops file in System32 directory
PID:4396 -
C:\Windows\SysWOW64\lrtjza.exeC:\Windows\system32\lrtjza.exe 1032 "C:\Windows\SysWOW64\izcypi.exe"159⤵PID:2204
-
C:\Windows\SysWOW64\lrtjza.exe1032 C:\Windows\SysWOW64\izcypi.exe160⤵PID:1668
-
C:\Windows\SysWOW64\ismwvd.exeC:\Windows\system32\ismwvd.exe 1140 "C:\Windows\SysWOW64\lrtjza.exe"161⤵PID:412
-
C:\Windows\SysWOW64\ismwvd.exe1140 C:\Windows\SysWOW64\lrtjza.exe162⤵PID:3412
-
C:\Windows\SysWOW64\isncgk.exeC:\Windows\system32\isncgk.exe 1008 "C:\Windows\SysWOW64\ismwvd.exe"163⤵PID:1984
-
C:\Windows\SysWOW64\isncgk.exe1008 C:\Windows\SysWOW64\ismwvd.exe164⤵PID:1108
-
C:\Windows\SysWOW64\ihkhft.exeC:\Windows\system32\ihkhft.exe 1016 "C:\Windows\SysWOW64\isncgk.exe"165⤵PID:1204
-
C:\Windows\SysWOW64\ihkhft.exe1016 C:\Windows\SysWOW64\isncgk.exe166⤵PID:2468
-
C:\Windows\SysWOW64\iwamxb.exeC:\Windows\system32\iwamxb.exe 1140 "C:\Windows\SysWOW64\ihkhft.exe"167⤵PID:4444
-
C:\Windows\SysWOW64\iwamxb.exe1140 C:\Windows\SysWOW64\ihkhft.exe168⤵PID:4076
-
C:\Windows\SysWOW64\lnsxgs.exeC:\Windows\system32\lnsxgs.exe 1032 "C:\Windows\SysWOW64\iwamxb.exe"169⤵PID:2988
-
C:\Windows\SysWOW64\lnsxgs.exe1032 C:\Windows\SysWOW64\iwamxb.exe170⤵PID:3296
-
C:\Windows\SysWOW64\ihnkxn.exeC:\Windows\system32\ihnkxn.exe 1008 "C:\Windows\SysWOW64\lnsxgs.exe"171⤵PID:1684
-
C:\Windows\SysWOW64\ihnkxn.exe1008 C:\Windows\SysWOW64\lnsxgs.exe172⤵PID:4036
-
C:\Windows\SysWOW64\iawcrh.exeC:\Windows\system32\iawcrh.exe 1008 "C:\Windows\SysWOW64\ihnkxn.exe"173⤵PID:4996
-
C:\Windows\SysWOW64\iawcrh.exe1008 C:\Windows\SysWOW64\ihnkxn.exe174⤵PID:1724
-
C:\Windows\SysWOW64\idjvfl.exeC:\Windows\system32\idjvfl.exe 1144 "C:\Windows\SysWOW64\iawcrh.exe"175⤵PID:2680
-
C:\Windows\SysWOW64\idjvfl.exe1144 C:\Windows\SysWOW64\iawcrh.exe176⤵PID:5092
-
C:\Windows\SysWOW64\ilkazl.exeC:\Windows\system32\ilkazl.exe 1008 "C:\Windows\SysWOW64\idjvfl.exe"177⤵PID:4880
-
C:\Windows\SysWOW64\ilkazl.exe1008 C:\Windows\SysWOW64\idjvfl.exe178⤵PID:2300
-
C:\Windows\SysWOW64\njhqem.exeC:\Windows\system32\njhqem.exe 1032 "C:\Windows\SysWOW64\ilkazl.exe"179⤵PID:4900
-
C:\Windows\SysWOW64\njhqem.exe1032 C:\Windows\SysWOW64\ilkazl.exe180⤵PID:4300
-
C:\Windows\SysWOW64\ncqbyh.exeC:\Windows\system32\ncqbyh.exe 1104 "C:\Windows\SysWOW64\njhqem.exe"181⤵PID:4004
-
C:\Windows\SysWOW64\ncqbyh.exe1104 C:\Windows\SysWOW64\njhqem.exe182⤵
- Drops file in System32 directory
PID:4484 -
C:\Windows\SysWOW64\kolwwc.exeC:\Windows\system32\kolwwc.exe 1016 "C:\Windows\SysWOW64\ncqbyh.exe"183⤵PID:4452
-
C:\Windows\SysWOW64\kolwwc.exe1016 C:\Windows\SysWOW64\ncqbyh.exe184⤵PID:3944
-
C:\Windows\SysWOW64\kzyolo.exeC:\Windows\system32\kzyolo.exe 1144 "C:\Windows\SysWOW64\kolwwc.exe"185⤵PID:3872
-
C:\Windows\SysWOW64\kzyolo.exe1144 C:\Windows\SysWOW64\kolwwc.exe186⤵PID:5024
-
C:\Windows\SysWOW64\lzztwn.exeC:\Windows\system32\lzztwn.exe 1020 "C:\Windows\SysWOW64\kzyolo.exe"187⤵PID:2792
-
C:\Windows\SysWOW64\lzztwn.exe1020 C:\Windows\SysWOW64\kzyolo.exe188⤵PID:4560
-
C:\Windows\SysWOW64\lowzoe.exeC:\Windows\system32\lowzoe.exe 1008 "C:\Windows\SysWOW64\lzztwn.exe"189⤵PID:1972
-
C:\Windows\SysWOW64\lowzoe.exe1008 C:\Windows\SysWOW64\lzztwn.exe190⤵PID:1964
-
C:\Windows\SysWOW64\dajrki.exeC:\Windows\system32\dajrki.exe 1048 "C:\Windows\SysWOW64\lowzoe.exe"191⤵PID:4376
-
C:\Windows\SysWOW64\dajrki.exe1048 C:\Windows\SysWOW64\lowzoe.exe192⤵PID:872
-
C:\Windows\SysWOW64\cskkeu.exeC:\Windows\system32\cskkeu.exe 1032 "C:\Windows\SysWOW64\dajrki.exe"193⤵PID:1756
-
C:\Windows\SysWOW64\cskkeu.exe1032 C:\Windows\SysWOW64\dajrki.exe194⤵PID:5100
-
C:\Windows\SysWOW64\fvnzri.exeC:\Windows\system32\fvnzri.exe 1016 "C:\Windows\SysWOW64\cskkeu.exe"195⤵PID:4972
-
C:\Windows\SysWOW64\fvnzri.exe1016 C:\Windows\SysWOW64\cskkeu.exe196⤵PID:4160
-
C:\Windows\SysWOW64\ictkgz.exeC:\Windows\system32\ictkgz.exe 1008 "C:\Windows\SysWOW64\fvnzri.exe"197⤵PID:412
-
C:\Windows\SysWOW64\ictkgz.exe1008 C:\Windows\SysWOW64\fvnzri.exe198⤵
- Drops file in System32 directory
PID:1588 -
C:\Windows\SysWOW64\hjqpxq.exeC:\Windows\system32\hjqpxq.exe 1008 "C:\Windows\SysWOW64\ictkgz.exe"199⤵PID:2740
-
C:\Windows\SysWOW64\hjqpxq.exe1008 C:\Windows\SysWOW64\ictkgz.exe200⤵PID:4052
-
C:\Windows\SysWOW64\klunkd.exeC:\Windows\system32\klunkd.exe 1008 "C:\Windows\SysWOW64\hjqpxq.exe"201⤵PID:4236
-
C:\Windows\SysWOW64\klunkd.exe1008 C:\Windows\SysWOW64\hjqpxq.exe202⤵PID:1320
-
C:\Windows\SysWOW64\kajsbl.exeC:\Windows\system32\kajsbl.exe 1028 "C:\Windows\SysWOW64\klunkd.exe"203⤵PID:4888
-
C:\Windows\SysWOW64\kajsbl.exe1028 C:\Windows\SysWOW64\klunkd.exe204⤵PID:3776
-
C:\Windows\SysWOW64\ndmioz.exeC:\Windows\system32\ndmioz.exe 1008 "C:\Windows\SysWOW64\kajsbl.exe"205⤵PID:3508
-
C:\Windows\SysWOW64\ndmioz.exe1008 C:\Windows\SysWOW64\kajsbl.exe206⤵PID:2160
-
C:\Windows\SysWOW64\nsknfp.exeC:\Windows\system32\nsknfp.exe 1012 "C:\Windows\SysWOW64\ndmioz.exe"207⤵PID:3144
-
C:\Windows\SysWOW64\nsknfp.exe1012 C:\Windows\SysWOW64\ndmioz.exe208⤵PID:1684
-
C:\Windows\SysWOW64\pzyyuh.exeC:\Windows\system32\pzyyuh.exe 1012 "C:\Windows\SysWOW64\nsknfp.exe"209⤵PID:4340
-
C:\Windows\SysWOW64\pzyyuh.exe1012 C:\Windows\SysWOW64\nsknfp.exe210⤵PID:4552
-
C:\Windows\SysWOW64\pgodmp.exeC:\Windows\system32\pgodmp.exe 1008 "C:\Windows\SysWOW64\pzyyuh.exe"211⤵PID:2948
-
C:\Windows\SysWOW64\pgodmp.exe1008 C:\Windows\SysWOW64\pzyyuh.exe212⤵PID:4412
-
C:\Windows\SysWOW64\sjrbyc.exeC:\Windows\system32\sjrbyc.exe 1012 "C:\Windows\SysWOW64\pgodmp.exe"213⤵PID:4952
-
C:\Windows\SysWOW64\sjrbyc.exe1012 C:\Windows\SysWOW64\pgodmp.exe214⤵PID:516
-
C:\Windows\SysWOW64\sudtno.exeC:\Windows\system32\sudtno.exe 1020 "C:\Windows\SysWOW64\sjrbyc.exe"215⤵PID:4992
-
C:\Windows\SysWOW64\sudtno.exe1020 C:\Windows\SysWOW64\sjrbyc.exe216⤵PID:2300
-
C:\Windows\SysWOW64\vbrwcg.exeC:\Windows\system32\vbrwcg.exe 1104 "C:\Windows\SysWOW64\sudtno.exe"217⤵PID:4648
-
C:\Windows\SysWOW64\vbrwcg.exe1104 C:\Windows\SysWOW64\sudtno.exe218⤵
- Drops file in System32 directory
PID:3032 -
C:\Windows\SysWOW64\sqqwdf.exeC:\Windows\system32\sqqwdf.exe 1144 "C:\Windows\SysWOW64\vbrwcg.exe"219⤵PID:2260
-
C:\Windows\SysWOW64\sqqwdf.exe1144 C:\Windows\SysWOW64\vbrwcg.exe220⤵PID:3192
-
C:\Windows\SysWOW64\vttuqa.exeC:\Windows\system32\vttuqa.exe 1140 "C:\Windows\SysWOW64\sqqwdf.exe"221⤵PID:4768
-
C:\Windows\SysWOW64\vttuqa.exe1140 C:\Windows\SysWOW64\sqqwdf.exe222⤵PID:3496
-
C:\Windows\SysWOW64\uirzhj.exeC:\Windows\system32\uirzhj.exe 1032 "C:\Windows\SysWOW64\vttuqa.exe"223⤵PID:4144
-
C:\Windows\SysWOW64\uirzhj.exe1032 C:\Windows\SysWOW64\vttuqa.exe224⤵PID:4828
-
C:\Windows\SysWOW64\vudsvn.exeC:\Windows\system32\vudsvn.exe 1140 "C:\Windows\SysWOW64\uirzhj.exe"225⤵PID:772
-
C:\Windows\SysWOW64\vudsvn.exe1140 C:\Windows\SysWOW64\uirzhj.exe226⤵PID:2956
-
C:\Windows\SysWOW64\vxqkkz.exeC:\Windows\system32\vxqkkz.exe 1144 "C:\Windows\SysWOW64\vudsvn.exe"227⤵PID:396
-
C:\Windows\SysWOW64\vxqkkz.exe1144 C:\Windows\SysWOW64\vudsvn.exe228⤵PID:612
-
C:\Windows\SysWOW64\vjccyd.exeC:\Windows\system32\vjccyd.exe 1144 "C:\Windows\SysWOW64\vxqkkz.exe"229⤵PID:3764
-
C:\Windows\SysWOW64\vjccyd.exe1144 C:\Windows\SysWOW64\vxqkkz.exe230⤵
- Drops file in System32 directory
PID:3020 -
C:\Windows\SysWOW64\vpsixt.exeC:\Windows\system32\vpsixt.exe 1140 "C:\Windows\SysWOW64\vjccyd.exe"231⤵PID:3500
-
C:\Windows\SysWOW64\vpsixt.exe1140 C:\Windows\SysWOW64\vjccyd.exe232⤵PID:2100
-
C:\Windows\SysWOW64\uepnoc.exeC:\Windows\system32\uepnoc.exe 1012 "C:\Windows\SysWOW64\vpsixt.exe"233⤵PID:2192
-
C:\Windows\SysWOW64\uepnoc.exe1012 C:\Windows\SysWOW64\vpsixt.exe234⤵PID:2960
-
C:\Windows\SysWOW64\uqcgdg.exeC:\Windows\system32\uqcgdg.exe 1036 "C:\Windows\SysWOW64\uepnoc.exe"235⤵PID:2832
-
C:\Windows\SysWOW64\uqcgdg.exe1036 C:\Windows\SysWOW64\uepnoc.exe236⤵PID:4492
-
C:\Windows\SysWOW64\ufrluw.exeC:\Windows\system32\ufrluw.exe 1028 "C:\Windows\SysWOW64\uqcgdg.exe"237⤵PID:1240
-
C:\Windows\SysWOW64\ufrluw.exe1028 C:\Windows\SysWOW64\uqcgdg.exe238⤵PID:556
-
C:\Windows\SysWOW64\xwrwef.exeC:\Windows\system32\xwrwef.exe 1008 "C:\Windows\SysWOW64\ufrluw.exe"239⤵PID:2736
-
C:\Windows\SysWOW64\xwrwef.exe1008 C:\Windows\SysWOW64\ufrluw.exe240⤵PID:4888
-
C:\Windows\SysWOW64\plhbvn.exeC:\Windows\system32\plhbvn.exe 1032 "C:\Windows\SysWOW64\xwrwef.exe"241⤵PID:4444
-