Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 21:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3ab5a20c59746541389fe349f71f9130_NeikiAnalytics.exe
Resource
win7-20240508-en
6 signatures
150 seconds
General
-
Target
3ab5a20c59746541389fe349f71f9130_NeikiAnalytics.exe
-
Size
96KB
-
MD5
3ab5a20c59746541389fe349f71f9130
-
SHA1
ea3a167fd793f09be4c48ce444f1af61eabb354a
-
SHA256
b5cfc7cf8815e90a078928a5df3e9abd1dcbde564eac0d4cda2985a212d1d388
-
SHA512
8702c3e1c26d3be7242c642d8984b3cede5fcdc95c95e39f8613e4e601e0579506b2781ca11de8bf7975b4cbe69afef340c639faba54e2f50aa8d3e50771b55d
-
SSDEEP
1536:rHPnzUqARvVTYhgnQs3wqYEn6/JgGpQx4RA7Jjkg5rjDynIpd7hUczT:rvz+9T5LgqTnWwKk+MrjDyILhUsT
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 64 IoCs
resource yara_rule behavioral2/memory/3572-15-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4080-16-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/2672-24-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/5028-29-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4824-37-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3616-43-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4016-50-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1584-56-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4216-62-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4212-66-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1812-74-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1832-82-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/2464-87-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4764-93-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/432-97-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/2632-103-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3996-114-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3008-118-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1648-125-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1080-129-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4528-137-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1400-143-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/2984-151-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/464-156-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3904-163-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4488-169-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/5112-176-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4680-180-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4512-188-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4612-195-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3020-202-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/672-208-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1296-212-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1608-216-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4888-221-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3164-223-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/2184-229-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3236-233-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3472-238-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4380-242-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1504-246-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4356-250-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3308-254-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3540-258-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/2932-263-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/2732-266-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4804-270-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/816-274-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/2468-278-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1180-282-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/2288-286-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/644-291-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3560-295-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1668-299-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3324-303-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4192-308-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3604-312-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4620-316-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4876-320-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/3748-324-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4476-329-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/4500-331-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/2792-334-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 behavioral2/memory/1784-338-0x0000000000400000-0x00000000004A2000-memory.dmp family_lumma_v4 -
Executes dropped EXE 64 IoCs
pid Process 4080 oifwryeu.exe 2672 wiewyeiq.exe 5028 ghqurdqp.exe 4824 rwumsxlq.exe 3616 bsvxarmn.exe 4016 ombmmwyx.exe 1584 bvhppvqh.exe 4216 oucsxewo.exe 4212 zpdcnyxm.exe 1812 lgyfvycb.exe 1832 wbzxdbdy.exe 2464 djmpxqmq.exe 4764 jstaaqmb.exe 432 wfkqgllf.exe 2632 gqzatpri.exe 3996 tdrqzsym.exe 3008 evhvmjsp.exe 1648 oultwhap.exe 1080 ymaqbxcs.exe 4528 lgggmkgt.exe 1400 wywlzaiw.exe 2984 bwttfbhi.exe 464 lvfrxaph.exe 3904 yxlgjetj.exe 4488 lkdwoisw.exe 5112 yxmmumrj.exe 4680 jpcrzcsd.exe 4512 tarcufhg.exe 4612 eheuwrcg.exe 3020 ocwfemdd.exe 672 ybjcolkd.exe 1296 iinzhjsd.exe 1608 tscflzmg.exe 4888 gnuvrdlk.exe 3164 okeijovi.exe 2184 daqqpgrx.exe 3236 oviaxaau.exe 3472 bmldgbxb.exe 4380 lhmnnvgh.exe 1504 yjsdziki.exe 4356 iflvocln.exe 3308 tamgwwml.exe 3540 gksizwmv.exe 2932 txcgfali.exe 2732 gvfbnaqp.exe 4804 qyulidwj.exe 816 diawldwu.exe 2468 qvkmrgvg.exe 1180 dtnoahbo.exe 2288 nwcznkhi.exe 644 bficqjhs.exe 3560 ossrwngf.exe 1668 brvuevlm.exe 3324 lmnmuqmj.exe 4192 vlakfpuj.exe 3604 ayrzkksw.exe 4620 olbpqorb.exe 4876 bkvszwxq.exe 3748 kmtcuzdk.exe 4476 vimvcueh.exe 4500 lmuigzjb.exe 2792 yzefldho.exe 3040 vuzscgot.exe 4908 ftlqmevs.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\iinzhjsd.exe ybjcolkd.exe File opened for modification C:\Windows\SysWOW64\txcgfali.exe gksizwmv.exe File created C:\Windows\SysWOW64\noxlxqcc.exe abfnrnep.exe File opened for modification C:\Windows\SysWOW64\ovnacysx.exe bavlwumk.exe File opened for modification C:\Windows\SysWOW64\iuzirrvo.exe ynvkgsno.exe File created C:\Windows\SysWOW64\qvkmrgvg.exe diawldwu.exe File opened for modification C:\Windows\SysWOW64\niivsucc.exe dbwyhvvc.exe File created C:\Windows\SysWOW64\uflaafsv.exe hsckvbtj.exe File created C:\Windows\SysWOW64\sdoimpgo.exe fqesglhb.exe File created C:\Windows\SysWOW64\vpkdabqk.exe mmvtfyjp.exe File created C:\Windows\SysWOW64\fhmehldg.exe vahywmvg.exe File created C:\Windows\SysWOW64\mmzzpcts.exe cmvtedma.exe File created C:\Windows\SysWOW64\siiiddax.exe fvzsxzbk.exe File opened for modification C:\Windows\SysWOW64\mdritvvs.exe zqzsnzwf.exe File created C:\Windows\SysWOW64\wrtldkgg.exe jayiucaz.exe File opened for modification C:\Windows\SysWOW64\oonfbrzr.exe bbwpvvae.exe File created C:\Windows\SysWOW64\rvsabexc.exe hsdqgbqi.exe File opened for modification C:\Windows\SysWOW64\tuuozpgi.exe gzcyllzv.exe File opened for modification C:\Windows\SysWOW64\lzxueeru.exe ymgfyali.exe File created C:\Windows\SysWOW64\tscflzmg.exe iinzhjsd.exe File created C:\Windows\SysWOW64\xoxkwbep.exe kbouqxfk.exe File created C:\Windows\SysWOW64\xydaulqe.exe khixldtx.exe File created C:\Windows\SysWOW64\tbsmlfoy.exe rzccqcae.exe File opened for modification C:\Windows\SysWOW64\oxifdtbd.exe dxeasucd.exe File created C:\Windows\SysWOW64\cgilfvnz.exe owcicwnp.exe File created C:\Windows\SysWOW64\ndksimyi.exe aqtvujzd.exe File opened for modification C:\Windows\SysWOW64\pjwtrurl.exe fjswzekl.exe File created C:\Windows\SysWOW64\gqhwrwtk.exe tvyhlsuf.exe File opened for modification C:\Windows\SysWOW64\akvphsyx.exe nxdztozs.exe File opened for modification C:\Windows\SysWOW64\cagepwra.exe pqatmxzq.exe File opened for modification C:\Windows\SysWOW64\olwnzqbc.exe abykwqjs.exe File created C:\Windows\SysWOW64\srplomop.exe fexwiqqc.exe File created C:\Windows\SysWOW64\ofipdpnu.exe bhfmuhhn.exe File opened for modification C:\Windows\SysWOW64\vgqtylkg.exe jhvqqder.exe File created C:\Windows\SysWOW64\fjdlmzqg.exe thxdbvle.exe File opened for modification C:\Windows\SysWOW64\jtkkaeqs.exe tswczdsa.exe File created C:\Windows\SysWOW64\rsyrfwwi.exe htuuvywi.exe File opened for modification C:\Windows\SysWOW64\pfjvopkm.exe chosgpfe.exe File opened for modification C:\Windows\SysWOW64\aqmrimfy.exe qrauynyy.exe File created C:\Windows\SysWOW64\fvzsxzbk.exe sihdrvuf.exe File opened for modification C:\Windows\SysWOW64\ebdmbsqz.exe rzxepglq.exe File created C:\Windows\SysWOW64\jcutgfww.exe vpkdabqk.exe File created C:\Windows\SysWOW64\shwqpngn.exe iissfoyn.exe File opened for modification C:\Windows\SysWOW64\yqjqjrsq.exe ldzadvtl.exe File opened for modification C:\Windows\SysWOW64\moihrmjo.exe zbqjlicc.exe File created C:\Windows\SysWOW64\isussknp.exe vfcdmgol.exe File created C:\Windows\SysWOW64\vxtvjtrz.exe fxenisth.exe File created C:\Windows\SysWOW64\mykzezpz.exe zlajyvrm.exe File opened for modification C:\Windows\SysWOW64\fhwizglz.exe wwhxmdxf.exe File created C:\Windows\SysWOW64\vfliygtc.exe isussknp.exe File opened for modification C:\Windows\SysWOW64\lllseptg.exe yytcylvt.exe File created C:\Windows\SysWOW64\ossrwngf.exe bficqjhs.exe File created C:\Windows\SysWOW64\rsncztqn.exe ecsarlsg.exe File opened for modification C:\Windows\SysWOW64\uoknmljn.exe hbsxghla.exe File created C:\Windows\SysWOW64\uphpbwmb.exe hcxzvsno.exe File opened for modification C:\Windows\SysWOW64\bghftwhi.exe rdsvytbg.exe File opened for modification C:\Windows\SysWOW64\yiyfcsro.exe pfjvopkm.exe File created C:\Windows\SysWOW64\ffebqjsj.exe sokzibnb.exe File opened for modification C:\Windows\SysWOW64\ppdrxmwc.exe cclcrqxp.exe File opened for modification C:\Windows\SysWOW64\gjujuhth.exe swduoduu.exe File created C:\Windows\SysWOW64\ndvhoied.exe aqmrimfy.exe File opened for modification C:\Windows\SysWOW64\nrevjwly.exe atbsaoor.exe File created C:\Windows\SysWOW64\aqspjbul.exe prfsycmm.exe File opened for modification C:\Windows\SysWOW64\aavuhwog.exe nnlfcahb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 4080 3572 3ab5a20c59746541389fe349f71f9130_NeikiAnalytics.exe 84 PID 3572 wrote to memory of 4080 3572 3ab5a20c59746541389fe349f71f9130_NeikiAnalytics.exe 84 PID 3572 wrote to memory of 4080 3572 3ab5a20c59746541389fe349f71f9130_NeikiAnalytics.exe 84 PID 4080 wrote to memory of 2672 4080 oifwryeu.exe 85 PID 4080 wrote to memory of 2672 4080 oifwryeu.exe 85 PID 4080 wrote to memory of 2672 4080 oifwryeu.exe 85 PID 2672 wrote to memory of 5028 2672 wiewyeiq.exe 86 PID 2672 wrote to memory of 5028 2672 wiewyeiq.exe 86 PID 2672 wrote to memory of 5028 2672 wiewyeiq.exe 86 PID 5028 wrote to memory of 4824 5028 ghqurdqp.exe 88 PID 5028 wrote to memory of 4824 5028 ghqurdqp.exe 88 PID 5028 wrote to memory of 4824 5028 ghqurdqp.exe 88 PID 4824 wrote to memory of 3616 4824 rwumsxlq.exe 89 PID 4824 wrote to memory of 3616 4824 rwumsxlq.exe 89 PID 4824 wrote to memory of 3616 4824 rwumsxlq.exe 89 PID 3616 wrote to memory of 4016 3616 bsvxarmn.exe 90 PID 3616 wrote to memory of 4016 3616 bsvxarmn.exe 90 PID 3616 wrote to memory of 4016 3616 bsvxarmn.exe 90 PID 4016 wrote to memory of 1584 4016 ombmmwyx.exe 91 PID 4016 wrote to memory of 1584 4016 ombmmwyx.exe 91 PID 4016 wrote to memory of 1584 4016 ombmmwyx.exe 91 PID 1584 wrote to memory of 4216 1584 bvhppvqh.exe 92 PID 1584 wrote to memory of 4216 1584 bvhppvqh.exe 92 PID 1584 wrote to memory of 4216 1584 bvhppvqh.exe 92 PID 4216 wrote to memory of 4212 4216 oucsxewo.exe 93 PID 4216 wrote to memory of 4212 4216 oucsxewo.exe 93 PID 4216 wrote to memory of 4212 4216 oucsxewo.exe 93 PID 4212 wrote to memory of 1812 4212 zpdcnyxm.exe 94 PID 4212 wrote to memory of 1812 4212 zpdcnyxm.exe 94 PID 4212 wrote to memory of 1812 4212 zpdcnyxm.exe 94 PID 1812 wrote to memory of 1832 1812 lgyfvycb.exe 95 PID 1812 wrote to memory of 1832 1812 lgyfvycb.exe 95 PID 1812 wrote to memory of 1832 1812 lgyfvycb.exe 95 PID 1832 wrote to memory of 2464 1832 wbzxdbdy.exe 96 PID 1832 wrote to memory of 2464 1832 wbzxdbdy.exe 96 PID 1832 wrote to memory of 2464 1832 wbzxdbdy.exe 96 PID 2464 wrote to memory of 4764 2464 djmpxqmq.exe 97 PID 2464 wrote to memory of 4764 2464 djmpxqmq.exe 97 PID 2464 wrote to memory of 4764 2464 djmpxqmq.exe 97 PID 4764 wrote to memory of 432 4764 jstaaqmb.exe 100 PID 4764 wrote to memory of 432 4764 jstaaqmb.exe 100 PID 4764 wrote to memory of 432 4764 jstaaqmb.exe 100 PID 432 wrote to memory of 2632 432 wfkqgllf.exe 101 PID 432 wrote to memory of 2632 432 wfkqgllf.exe 101 PID 432 wrote to memory of 2632 432 wfkqgllf.exe 101 PID 2632 wrote to memory of 3996 2632 gqzatpri.exe 102 PID 2632 wrote to memory of 3996 2632 gqzatpri.exe 102 PID 2632 wrote to memory of 3996 2632 gqzatpri.exe 102 PID 3996 wrote to memory of 3008 3996 tdrqzsym.exe 103 PID 3996 wrote to memory of 3008 3996 tdrqzsym.exe 103 PID 3996 wrote to memory of 3008 3996 tdrqzsym.exe 103 PID 3008 wrote to memory of 1648 3008 evhvmjsp.exe 105 PID 3008 wrote to memory of 1648 3008 evhvmjsp.exe 105 PID 3008 wrote to memory of 1648 3008 evhvmjsp.exe 105 PID 1648 wrote to memory of 1080 1648 oultwhap.exe 107 PID 1648 wrote to memory of 1080 1648 oultwhap.exe 107 PID 1648 wrote to memory of 1080 1648 oultwhap.exe 107 PID 1080 wrote to memory of 4528 1080 ymaqbxcs.exe 108 PID 1080 wrote to memory of 4528 1080 ymaqbxcs.exe 108 PID 1080 wrote to memory of 4528 1080 ymaqbxcs.exe 108 PID 4528 wrote to memory of 1400 4528 lgggmkgt.exe 109 PID 4528 wrote to memory of 1400 4528 lgggmkgt.exe 109 PID 4528 wrote to memory of 1400 4528 lgggmkgt.exe 109 PID 1400 wrote to memory of 2984 1400 wywlzaiw.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ab5a20c59746541389fe349f71f9130_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3ab5a20c59746541389fe349f71f9130_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\oifwryeu.exeC:\Windows\system32\oifwryeu.exe 1152 "C:\Users\Admin\AppData\Local\Temp\3ab5a20c59746541389fe349f71f9130_NeikiAnalytics.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\wiewyeiq.exeC:\Windows\system32\wiewyeiq.exe 1148 "C:\Windows\SysWOW64\oifwryeu.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\ghqurdqp.exeC:\Windows\system32\ghqurdqp.exe 1040 "C:\Windows\SysWOW64\wiewyeiq.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\rwumsxlq.exeC:\Windows\system32\rwumsxlq.exe 1060 "C:\Windows\SysWOW64\ghqurdqp.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\bsvxarmn.exeC:\Windows\system32\bsvxarmn.exe 1104 "C:\Windows\SysWOW64\rwumsxlq.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\ombmmwyx.exeC:\Windows\system32\ombmmwyx.exe 1172 "C:\Windows\SysWOW64\bsvxarmn.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\bvhppvqh.exeC:\Windows\system32\bvhppvqh.exe 1176 "C:\Windows\SysWOW64\ombmmwyx.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\oucsxewo.exeC:\Windows\system32\oucsxewo.exe 1180 "C:\Windows\SysWOW64\bvhppvqh.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\zpdcnyxm.exeC:\Windows\system32\zpdcnyxm.exe 1168 "C:\Windows\SysWOW64\oucsxewo.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\lgyfvycb.exeC:\Windows\system32\lgyfvycb.exe 1188 "C:\Windows\SysWOW64\zpdcnyxm.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\wbzxdbdy.exeC:\Windows\system32\wbzxdbdy.exe 1048 "C:\Windows\SysWOW64\lgyfvycb.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\djmpxqmq.exeC:\Windows\system32\djmpxqmq.exe 1052 "C:\Windows\SysWOW64\wbzxdbdy.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\jstaaqmb.exeC:\Windows\system32\jstaaqmb.exe 1200 "C:\Windows\SysWOW64\djmpxqmq.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\wfkqgllf.exeC:\Windows\system32\wfkqgllf.exe 1208 "C:\Windows\SysWOW64\jstaaqmb.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\gqzatpri.exeC:\Windows\system32\gqzatpri.exe 1204 "C:\Windows\SysWOW64\wfkqgllf.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\tdrqzsym.exeC:\Windows\system32\tdrqzsym.exe 1212 "C:\Windows\SysWOW64\gqzatpri.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\evhvmjsp.exeC:\Windows\system32\evhvmjsp.exe 1044 "C:\Windows\SysWOW64\tdrqzsym.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\oultwhap.exeC:\Windows\system32\oultwhap.exe 1216 "C:\Windows\SysWOW64\evhvmjsp.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\ymaqbxcs.exeC:\Windows\system32\ymaqbxcs.exe 1224 "C:\Windows\SysWOW64\oultwhap.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\lgggmkgt.exeC:\Windows\system32\lgggmkgt.exe 1228 "C:\Windows\SysWOW64\ymaqbxcs.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\wywlzaiw.exeC:\Windows\system32\wywlzaiw.exe 1144 "C:\Windows\SysWOW64\lgggmkgt.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\bwttfbhi.exeC:\Windows\system32\bwttfbhi.exe 1056 "C:\Windows\SysWOW64\wywlzaiw.exe"23⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\lvfrxaph.exeC:\Windows\system32\lvfrxaph.exe 1240 "C:\Windows\SysWOW64\bwttfbhi.exe"24⤵
- Executes dropped EXE
PID:464 -
C:\Windows\SysWOW64\yxlgjetj.exeC:\Windows\system32\yxlgjetj.exe 1244 "C:\Windows\SysWOW64\lvfrxaph.exe"25⤵
- Executes dropped EXE
PID:3904 -
C:\Windows\SysWOW64\lkdwoisw.exeC:\Windows\system32\lkdwoisw.exe 1236 "C:\Windows\SysWOW64\yxlgjetj.exe"26⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\yxmmumrj.exeC:\Windows\system32\yxmmumrj.exe 1184 "C:\Windows\SysWOW64\lkdwoisw.exe"27⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\jpcrzcsd.exeC:\Windows\system32\jpcrzcsd.exe 1252 "C:\Windows\SysWOW64\yxmmumrj.exe"28⤵
- Executes dropped EXE
PID:4680 -
C:\Windows\SysWOW64\tarcufhg.exeC:\Windows\system32\tarcufhg.exe 1256 "C:\Windows\SysWOW64\jpcrzcsd.exe"29⤵
- Executes dropped EXE
PID:4512 -
C:\Windows\SysWOW64\eheuwrcg.exeC:\Windows\system32\eheuwrcg.exe 1064 "C:\Windows\SysWOW64\tarcufhg.exe"30⤵
- Executes dropped EXE
PID:4612 -
C:\Windows\SysWOW64\ocwfemdd.exeC:\Windows\system32\ocwfemdd.exe 1272 "C:\Windows\SysWOW64\eheuwrcg.exe"31⤵
- Executes dropped EXE
PID:3020 -
C:\Windows\SysWOW64\ybjcolkd.exeC:\Windows\system32\ybjcolkd.exe 1268 "C:\Windows\SysWOW64\ocwfemdd.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:672 -
C:\Windows\SysWOW64\iinzhjsd.exeC:\Windows\system32\iinzhjsd.exe 1264 "C:\Windows\SysWOW64\ybjcolkd.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1296 -
C:\Windows\SysWOW64\tscflzmg.exeC:\Windows\system32\tscflzmg.exe 1276 "C:\Windows\SysWOW64\iinzhjsd.exe"34⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\gnuvrdlk.exeC:\Windows\system32\gnuvrdlk.exe 1248 "C:\Windows\SysWOW64\tscflzmg.exe"35⤵
- Executes dropped EXE
PID:4888 -
C:\Windows\SysWOW64\okeijovi.exeC:\Windows\system32\okeijovi.exe 1280 "C:\Windows\SysWOW64\gnuvrdlk.exe"36⤵
- Executes dropped EXE
PID:3164 -
C:\Windows\SysWOW64\daqqpgrx.exeC:\Windows\system32\daqqpgrx.exe 1292 "C:\Windows\SysWOW64\okeijovi.exe"37⤵
- Executes dropped EXE
PID:2184 -
C:\Windows\SysWOW64\oviaxaau.exeC:\Windows\system32\oviaxaau.exe 1288 "C:\Windows\SysWOW64\daqqpgrx.exe"38⤵
- Executes dropped EXE
PID:3236 -
C:\Windows\SysWOW64\bmldgbxb.exeC:\Windows\system32\bmldgbxb.exe 1296 "C:\Windows\SysWOW64\oviaxaau.exe"39⤵
- Executes dropped EXE
PID:3472 -
C:\Windows\SysWOW64\lhmnnvgh.exeC:\Windows\system32\lhmnnvgh.exe 1304 "C:\Windows\SysWOW64\bmldgbxb.exe"40⤵
- Executes dropped EXE
PID:4380 -
C:\Windows\SysWOW64\yjsdziki.exeC:\Windows\system32\yjsdziki.exe 1308 "C:\Windows\SysWOW64\lhmnnvgh.exe"41⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\iflvocln.exeC:\Windows\system32\iflvocln.exe 1312 "C:\Windows\SysWOW64\yjsdziki.exe"42⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\SysWOW64\tamgwwml.exeC:\Windows\system32\tamgwwml.exe 1300 "C:\Windows\SysWOW64\iflvocln.exe"43⤵
- Executes dropped EXE
PID:3308 -
C:\Windows\SysWOW64\gksizwmv.exeC:\Windows\system32\gksizwmv.exe 1320 "C:\Windows\SysWOW64\tamgwwml.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3540 -
C:\Windows\SysWOW64\txcgfali.exeC:\Windows\system32\txcgfali.exe 1316 "C:\Windows\SysWOW64\gksizwmv.exe"45⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\gvfbnaqp.exeC:\Windows\system32\gvfbnaqp.exe 1324 "C:\Windows\SysWOW64\txcgfali.exe"46⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\qyulidwj.exeC:\Windows\system32\qyulidwj.exe 1328 "C:\Windows\SysWOW64\gvfbnaqp.exe"47⤵
- Executes dropped EXE
PID:4804 -
C:\Windows\SysWOW64\diawldwu.exeC:\Windows\system32\diawldwu.exe 1336 "C:\Windows\SysWOW64\qyulidwj.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:816 -
C:\Windows\SysWOW64\qvkmrgvg.exeC:\Windows\system32\qvkmrgvg.exe 1332 "C:\Windows\SysWOW64\diawldwu.exe"49⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\dtnoahbo.exeC:\Windows\system32\dtnoahbo.exe 1340 "C:\Windows\SysWOW64\qvkmrgvg.exe"50⤵
- Executes dropped EXE
PID:1180 -
C:\Windows\SysWOW64\nwcznkhi.exeC:\Windows\system32\nwcznkhi.exe 1352 "C:\Windows\SysWOW64\dtnoahbo.exe"51⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\bficqjhs.exeC:\Windows\system32\bficqjhs.exe 1356 "C:\Windows\SysWOW64\nwcznkhi.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:644 -
C:\Windows\SysWOW64\ossrwngf.exeC:\Windows\system32\ossrwngf.exe 1344 "C:\Windows\SysWOW64\bficqjhs.exe"53⤵
- Executes dropped EXE
PID:3560 -
C:\Windows\SysWOW64\brvuevlm.exeC:\Windows\system32\brvuevlm.exe 1360 "C:\Windows\SysWOW64\ossrwngf.exe"54⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\lmnmuqmj.exeC:\Windows\system32\lmnmuqmj.exe 1364 "C:\Windows\SysWOW64\brvuevlm.exe"55⤵
- Executes dropped EXE
PID:3324 -
C:\Windows\SysWOW64\vlakfpuj.exeC:\Windows\system32\vlakfpuj.exe 1348 "C:\Windows\SysWOW64\lmnmuqmj.exe"56⤵
- Executes dropped EXE
PID:4192 -
C:\Windows\SysWOW64\ayrzkksw.exeC:\Windows\system32\ayrzkksw.exe 1368 "C:\Windows\SysWOW64\vlakfpuj.exe"57⤵
- Executes dropped EXE
PID:3604 -
C:\Windows\SysWOW64\olbpqorb.exeC:\Windows\system32\olbpqorb.exe 1372 "C:\Windows\SysWOW64\ayrzkksw.exe"58⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\bkvszwxq.exeC:\Windows\system32\bkvszwxq.exe 1376 "C:\Windows\SysWOW64\olbpqorb.exe"59⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\SysWOW64\kmtcuzdk.exeC:\Windows\system32\kmtcuzdk.exe 1380 "C:\Windows\SysWOW64\bkvszwxq.exe"60⤵
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\vimvcueh.exeC:\Windows\system32\vimvcueh.exe 1384 "C:\Windows\SysWOW64\kmtcuzdk.exe"61⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\SysWOW64\lmuigzjb.exeC:\Windows\system32\lmuigzjb.exe 1388 "C:\Windows\SysWOW64\vimvcueh.exe"62⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\SysWOW64\yzefldho.exeC:\Windows\system32\yzefldho.exe 1392 "C:\Windows\SysWOW64\lmuigzjb.exe"63⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\iveqtxim.exeC:\Windows\system32\iveqtxim.exe 1404 "C:\Windows\SysWOW64\yzefldho.exe"64⤵PID:1784
-
C:\Windows\SysWOW64\vuzscgot.exeC:\Windows\system32\vuzscgot.exe 1400 "C:\Windows\SysWOW64\iveqtxim.exe"65⤵
- Executes dropped EXE
PID:3040 -
C:\Windows\SysWOW64\ftlqmevs.exeC:\Windows\system32\ftlqmevs.exe 1408 "C:\Windows\SysWOW64\vuzscgot.exe"66⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\SysWOW64\tcsbxwnd.exeC:\Windows\system32\tcsbxwnd.exe 1396 "C:\Windows\SysWOW64\ftlqmevs.exe"67⤵PID:3480
-
C:\Windows\SysWOW64\dbwyhvvc.exeC:\Windows\system32\dbwyhvvc.exe 1416 "C:\Windows\SysWOW64\tcsbxwnd.exe"68⤵
- Drops file in System32 directory
PID:3736 -
C:\Windows\SysWOW64\niivsucc.exeC:\Windows\system32\niivsucc.exe 1412 "C:\Windows\SysWOW64\dbwyhvvc.exe"69⤵PID:3484
-
C:\Windows\SysWOW64\azdyacaj.exeC:\Windows\system32\azdyacaj.exe 1420 "C:\Windows\SysWOW64\niivsucc.exe"70⤵PID:5100
-
C:\Windows\SysWOW64\kuejqwjh.exeC:\Windows\system32\kuejqwjh.exe 1428 "C:\Windows\SysWOW64\azdyacaj.exe"71⤵PID:4596
-
C:\Windows\SysWOW64\yhnywaht.exeC:\Windows\system32\yhnywaht.exe 1424 "C:\Windows\SysWOW64\kuejqwjh.exe"72⤵PID:1544
-
C:\Windows\SysWOW64\lrtjzahe.exeC:\Windows\system32\lrtjzahe.exe 1432 "C:\Windows\SysWOW64\yhnywaht.exe"73⤵PID:5076
-
C:\Windows\SysWOW64\vbjtmvoy.exeC:\Windows\system32\vbjtmvoy.exe 1436 "C:\Windows\SysWOW64\lrtjzahe.exe"74⤵PID:1376
-
C:\Windows\SysWOW64\idpwpuoi.exeC:\Windows\system32\idpwpuoi.exe 1448 "C:\Windows\SysWOW64\vbjtmvoy.exe"75⤵PID:1300
-
C:\Windows\SysWOW64\tzqpxpoo.exeC:\Windows\system32\tzqpxpoo.exe 1444 "C:\Windows\SysWOW64\idpwpuoi.exe"76⤵PID:756
-
C:\Windows\SysWOW64\dgumpnwn.exeC:\Windows\system32\dgumpnwn.exe 1456 "C:\Windows\SysWOW64\tzqpxpoo.exe"77⤵PID:2148
-
C:\Windows\SysWOW64\tkchtbta.exeC:\Windows\system32\tkchtbta.exe 1440 "C:\Windows\SysWOW64\dgumpnwn.exe"78⤵PID:3300
-
C:\Windows\SysWOW64\dvsrgezc.exeC:\Windows\system32\dvsrgezc.exe 1260 "C:\Windows\SysWOW64\tkchtbta.exe"79⤵PID:4508
-
C:\Windows\SysWOW64\qlmmpefj.exeC:\Windows\system32\qlmmpefj.exe 1476 "C:\Windows\SysWOW64\dvsrgezc.exe"80⤵PID:4704
-
C:\Windows\SysWOW64\dyekvidw.exeC:\Windows\system32\dyekvidw.exe 1284 "C:\Windows\SysWOW64\qlmmpefj.exe"81⤵PID:316
-
C:\Windows\SysWOW64\qikmyhdg.exeC:\Windows\system32\qikmyhdg.exe 1468 "C:\Windows\SysWOW64\dyekvidw.exe"82⤵PID:336
-
C:\Windows\SysWOW64\asaxtkka.exeC:\Windows\system32\asaxtkka.exe 1464 "C:\Windows\SysWOW64\qikmyhdg.exe"83⤵PID:880
-
C:\Windows\SysWOW64\nfrnzoin.exeC:\Windows\system32\nfrnzoin.exe 1480 "C:\Windows\SysWOW64\asaxtkka.exe"84⤵PID:4520
-
C:\Windows\SysWOW64\xevkjnqn.exeC:\Windows\system32\xevkjnqn.exe 1488 "C:\Windows\SysWOW64\nfrnzoin.exe"85⤵PID:4604
-
C:\Windows\SysWOW64\nfsakoof.exeC:\Windows\system32\nfsakoof.exe 1484 "C:\Windows\SysWOW64\xevkjnqn.exe"86⤵PID:3840
-
C:\Windows\SysWOW64\xiicxruz.exeC:\Windows\system32\xiicxruz.exe 1496 "C:\Windows\SysWOW64\nfsakoof.exe"87⤵PID:2568
-
C:\Windows\SysWOW64\ldzadvtl.exeC:\Windows\system32\ldzadvtl.exe 1472 "C:\Windows\SysWOW64\xiicxruz.exe"88⤵
- Drops file in System32 directory
PID:1696 -
C:\Windows\SysWOW64\yqjqjrsq.exeC:\Windows\system32\yqjqjrsq.exe 1500 "C:\Windows\SysWOW64\ldzadvtl.exe"89⤵PID:1492
-
C:\Windows\SysWOW64\lgetszxf.exeC:\Windows\system32\lgetszxf.exe 1504 "C:\Windows\SysWOW64\yqjqjrsq.exe"90⤵PID:2420
-
C:\Windows\SysWOW64\vfqqkyfx.exeC:\Windows\system32\vfqqkyfx.exe 1220 "C:\Windows\SysWOW64\lgetszxf.exe"91⤵PID:3332
-
C:\Windows\SysWOW64\iahgqcek.exeC:\Windows\system32\iahgqcek.exe 1508 "C:\Windows\SysWOW64\vfqqkyfx.exe"92⤵PID:4268
-
C:\Windows\SysWOW64\vnrvwfcx.exeC:\Windows\system32\vnrvwfcx.exe 1516 "C:\Windows\SysWOW64\iahgqcek.exe"93⤵PID:4776
-
C:\Windows\SysWOW64\iailbbbb.exeC:\Windows\system32\iailbbbb.exe 1524 "C:\Windows\SysWOW64\vnrvwfcx.exe"94⤵PID:3352
-
C:\Windows\SysWOW64\vrdokjhj.exeC:\Windows\system32\vrdokjhj.exe 1520 "C:\Windows\SysWOW64\iailbbbb.exe"95⤵PID:3216
-
C:\Windows\SysWOW64\fyptuioi.exeC:\Windows\system32\fyptuioi.exe 1512 "C:\Windows\SysWOW64\vrdokjhj.exe"96⤵PID:932
-
C:\Windows\SysWOW64\pxtrnhwi.exeC:\Windows\system32\pxtrnhwi.exe 1460 "C:\Windows\SysWOW64\fyptuioi.exe"97⤵PID:456
-
C:\Windows\SysWOW64\gyqzgima.exeC:\Windows\system32\gyqzgima.exe 1532 "C:\Windows\SysWOW64\pxtrnhwi.exe"98⤵PID:1440
-
C:\Windows\SysWOW64\qbgjblsc.exeC:\Windows\system32\qbgjblsc.exe 1540 "C:\Windows\SysWOW64\gyqzgima.exe"99⤵PID:2060
-
C:\Windows\SysWOW64\dkmmeksm.exeC:\Windows\system32\dkmmeksm.exe 1544 "C:\Windows\SysWOW64\qbgjblsc.exe"100⤵PID:960
-
C:\Windows\SysWOW64\qjhontyu.exeC:\Windows\system32\qjhontyu.exe 1548 "C:\Windows\SysWOW64\dkmmeksm.exe"101⤵PID:1720
-
C:\Windows\SysWOW64\dzcrvbdb.exeC:\Windows\system32\dzcrvbdb.exe 1492 "C:\Windows\SysWOW64\qjhontyu.exe"102⤵PID:3328
-
C:\Windows\SysWOW64\fyoogadb.exeC:\Windows\system32\fyoogadb.exe 1556 "C:\Windows\SysWOW64\dzcrvbdb.exe"103⤵PID:1336
-
C:\Windows\SysWOW64\stxemvkn.exeC:\Windows\system32\stxemvkn.exe 1564 "C:\Windows\SysWOW64\fyoogadb.exe"104⤵PID:2576
-
C:\Windows\SysWOW64\cskkeujf.exeC:\Windows\system32\cskkeujf.exe 1536 "C:\Windows\SysWOW64\stxemvkn.exe"105⤵PID:1576
-
C:\Windows\SysWOW64\stgsfdhf.exeC:\Windows\system32\stgsfdhf.exe 1568 "C:\Windows\SysWOW64\cskkeujf.exe"106⤵PID:1208
-
C:\Windows\SysWOW64\cwwctgnz.exeC:\Windows\system32\cwwctgnz.exe 1560 "C:\Windows\SysWOW64\stgsfdhf.exe"107⤵PID:4748
-
C:\Windows\SysWOW64\prfsycmm.exeC:\Windows\system32\prfsycmm.exe 1572 "C:\Windows\SysWOW64\cwwctgnz.exe"108⤵
- Drops file in System32 directory
PID:4272 -
C:\Windows\SysWOW64\aqspjbul.exeC:\Windows\system32\aqspjbul.exe 1584 "C:\Windows\SysWOW64\prfsycmm.exe"109⤵PID:2876
-
C:\Windows\SysWOW64\ndbfpfsq.exeC:\Windows\system32\ndbfpfsq.exe 1576 "C:\Windows\SysWOW64\aqspjbul.exe"110⤵PID:2764
-
C:\Windows\SysWOW64\aqtvujzd.exeC:\Windows\system32\aqtvujzd.exe 1580 "C:\Windows\SysWOW64\ndbfpfsq.exe"111⤵
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\ndksimyi.exeC:\Windows\system32\ndksimyi.exe 1588 "C:\Windows\SysWOW64\aqtvujzd.exe"112⤵PID:4772
-
C:\Windows\SysWOW64\abfnrnep.exeC:\Windows\system32\abfnrnep.exe 1596 "C:\Windows\SysWOW64\ndksimyi.exe"113⤵
- Drops file in System32 directory
PID:4000 -
C:\Windows\SysWOW64\noxlxqcc.exeC:\Windows\system32\noxlxqcc.exe 1600 "C:\Windows\SysWOW64\abfnrnep.exe"114⤵PID:4092
-
C:\Windows\SysWOW64\ykpveldz.exeC:\Windows\system32\ykpveldz.exe 1604 "C:\Windows\SysWOW64\noxlxqcc.exe"115⤵PID:4484
-
C:\Windows\SysWOW64\kasyntjg.exeC:\Windows\system32\kasyntjg.exe 1592 "C:\Windows\SysWOW64\ykpveldz.exe"116⤵PID:3624
-
C:\Windows\SysWOW64\xznavtgw.exeC:\Windows\system32\xznavtgw.exe 1528 "C:\Windows\SysWOW64\kasyntjg.exe"117⤵PID:4952
-
C:\Windows\SysWOW64\lmfqbxna.exeC:\Windows\system32\lmfqbxna.exe 1612 "C:\Windows\SysWOW64\xznavtgw.exe"118⤵PID:1848
-
C:\Windows\SysWOW64\vljouwma.exeC:\Windows\system32\vljouwma.exe 1620 "C:\Windows\SysWOW64\lmfqbxna.exe"119⤵PID:2248
-
C:\Windows\SysWOW64\iyadzatn.exeC:\Windows\system32\iyadzatn.exe 1628 "C:\Windows\SysWOW64\vljouwma.exe"120⤵PID:1324
-
C:\Windows\SysWOW64\sjqondah.exeC:\Windows\system32\sjqondah.exe 1616 "C:\Windows\SysWOW64\iyadzatn.exe"121⤵PID:4580
-
C:\Windows\SysWOW64\fwzdshyu.exeC:\Windows\system32\fwzdshyu.exe 1632 "C:\Windows\SysWOW64\sjqondah.exe"122⤵PID:2996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-