Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
76fa72232ddf24567368efff11f043c6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
76fa72232ddf24567368efff11f043c6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
76fa72232ddf24567368efff11f043c6_JaffaCakes118.exe
-
Size
59KB
-
MD5
76fa72232ddf24567368efff11f043c6
-
SHA1
806d3b9bc4d52ae75fd89cc7c076714c993d1c26
-
SHA256
7948a5dafbc220f1adf19a0880c64c49de521b87bd3032a5b37c03c79db44f96
-
SHA512
27bfa85304c076ef2f297ccfb34015a315cbaca5e7f78bdd0b580a4a69e00a7835fb99666451d86634520897ef09ddc6eb24480fe649ef5f7350349d1784fb41
-
SSDEEP
1536:2Fg/ZOebP6XjGpDUIkigsDsC6HCIO3WjIfemPH6gXXX6:ugZPSipHCHf4HK
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3112 fbrassgc.exe 4984 lhoqftfo.exe 636 vcobnool.exe 3252 fyptuioi.exe 1228 vcqgynld.exe 2100 fffruqrx.exe 4664 sawozuqk.exe 576 czbmktyj.exe 656 tayulcwb.exe 3144 ddneyxcd.exe 1800 iyfuebbi.exe 3148 vlojkfiv.exe 640 cskkeujf.exe 2116 sxkxihgz.exe 3784 sxuuouvi.exe 3392 ndbfpfsq.exe 320 xvrkbvut.exe 64 liiahzty.exe 2524 xyddqhzn.exe 264 iuenxbak.exe 3776 sbqtqahk.exe 4560 cauqazpk.exe 2616 qkatdqpu.exe 1456 xrolpoqe.exe 4956 nwwgttvz.exe 2088 xrxyjowe.exe 2456 hrbwtmdw.exe 4112 upwycubl.exe 3004 ktetgaxx.exe 3948 vpfeougc.exe 4964 ioagwcek.exe 2160 sypmjsgm.exe 3896 fwkpsblu.exe 2636 qslzzvmr.exe 792 cmrplaqb.exe 4408 nhszsczy.exe 3660 arykvuri.exe 3860 nptnmcxp.exe 5000 xoxkwbep.exe 3628 kyenzawa.exe 2460 xogpiich.exe 2200 kqmftngq.exe 2984 umfpbhpo.exe 5020 kqokfumi.exe 3360 vmodupmf.exe 2220 ikjgdpsu.exe 448 skndnozm.exe 4752 ftugqnrw.exe 3836 psgdbmzw.exe 4608 cjbgjufl.exe 4040 mqfdcted.exe 228 drctducd.exe 220 fqorntkd.exe 2624 sdxgtxih.exe 4692 cnnrgapj.exe 4196 paegmevo.exe 544 cnwwazub.exe 5056 nflcfyww.exe 4684 zzrjqcbg.exe 1760 kvkcywbl.exe 2920 alekfofa.exe 2292 nynzkkee.exe 4028 xjdkgnkg.exe 2600 kwuzmrjl.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\fypbymnz.exe slymsiov.exe File created C:\Windows\SysWOW64\nnmkunra.exe zsvuojsv.exe File created C:\Windows\SysWOW64\eqllomay.exe rhfbluin.exe File created C:\Windows\SysWOW64\ouqevmor.exe akjbsnoh.exe File opened for modification C:\Windows\SysWOW64\vadmjrmz.exe hnuwdnnm.exe File created C:\Windows\SysWOW64\mcfvrngz.exe zllsjnbk.exe File opened for modification C:\Windows\SysWOW64\epnosxbt.exe uqbrhyuu.exe File opened for modification C:\Windows\SysWOW64\ftttyvqu.exe scyqinkf.exe File opened for modification C:\Windows\SysWOW64\sbtbpcsa.exe esuyecsq.exe File created C:\Windows\SysWOW64\cpzyclkj.exe onsvzmkz.exe File created C:\Windows\SysWOW64\jgahoxqz.exe zvdwtujf.exe File created C:\Windows\SysWOW64\kwcwbqkv.exe xmwlyykl.exe File opened for modification C:\Windows\SysWOW64\afsnelny.exe nhpkvdhj.exe File opened for modification C:\Windows\SysWOW64\ybzomvao.exe lohzgrcj.exe File created C:\Windows\SysWOW64\mzxfuism.exe ziddlamf.exe File opened for modification C:\Windows\SysWOW64\uicqglgj.exe hvkaahhw.exe File opened for modification C:\Windows\SysWOW64\gxlncvqp.exe wuvchrkn.exe File created C:\Windows\SysWOW64\tyadavud.exe glinurwq.exe File created C:\Windows\SysWOW64\idpvohsy.exe vqygidtl.exe File created C:\Windows\SysWOW64\zsvuojsv.exe ptrwwklv.exe File created C:\Windows\SysWOW64\ukdaqcov.exe hxmkkypq.exe File created C:\Windows\SysWOW64\zwqhbazj.exe mxnfsscc.exe File created C:\Windows\SysWOW64\tdinhosc.exe gqrxbttp.exe File opened for modification C:\Windows\SysWOW64\ajafxnkn.exe nwjhrjda.exe File created C:\Windows\SysWOW64\prabibxh.exe esveycqh.exe File created C:\Windows\SysWOW64\pblhhwjj.exe bzeeewry.exe File created C:\Windows\SysWOW64\mlcoxasp.exe zmhmgsvi.exe File created C:\Windows\SysWOW64\dozdgzev.exe qxeaxryo.exe File opened for modification C:\Windows\SysWOW64\fkdhucwk.exe sxlroyxx.exe File opened for modification C:\Windows\SysWOW64\xhixrapi.exe jxcnoaxy.exe File opened for modification C:\Windows\SysWOW64\blhapcpd.exe onmyguko.exe File created C:\Windows\SysWOW64\vyfpfuou.exe ilozzypq.exe File created C:\Windows\SysWOW64\nwjhrjda.exe dpfkhkdb.exe File opened for modification C:\Windows\SysWOW64\duyqqild.exe qhgsknmr.exe File created C:\Windows\SysWOW64\cheaupje.exe swpqhmuk.exe File opened for modification C:\Windows\SysWOW64\zysrljpv.exe mlacfoqi.exe File created C:\Windows\SysWOW64\uagbgiwn.exe kyrrtnql.exe File opened for modification C:\Windows\SysWOW64\zllsjnbk.exe mceqgoba.exe File created C:\Windows\SysWOW64\lwxqwftp.exe blioaknv.exe File created C:\Windows\SysWOW64\iqbujzud.exe yrxwzaml.exe File created C:\Windows\SysWOW64\slzreqmm.exe fypbymnz.exe File created C:\Windows\SysWOW64\psfrjuxu.exe ftttyvqu.exe File opened for modification C:\Windows\SysWOW64\alekfofa.exe kvkcywbl.exe File created C:\Windows\SysWOW64\oyzqvgoi.exe blhapcpd.exe File created C:\Windows\SysWOW64\ickonwsk.exe ysueztmq.exe File created C:\Windows\SysWOW64\oenoybkm.exe ecxelyes.exe File opened for modification C:\Windows\SysWOW64\hfmsncoh.exe tscciypu.exe File opened for modification C:\Windows\SysWOW64\usdqtyvm.exe hfmsncoh.exe File opened for modification C:\Windows\SysWOW64\vpypvbhi.exe iuprpxie.exe File opened for modification C:\Windows\SysWOW64\pxoytqcz.exe ztfdpdff.exe File opened for modification C:\Windows\SysWOW64\wvrzmquc.exe jihcgnvp.exe File opened for modification C:\Windows\SysWOW64\onsvzmkz.exe bsbgtilm.exe File created C:\Windows\SysWOW64\hxmkkypq.exe ukcuevqd.exe File opened for modification C:\Windows\SysWOW64\sgpufwmd.exe flyezsgr.exe File opened for modification C:\Windows\SysWOW64\iyfuebbi.exe ddneyxcd.exe File created C:\Windows\SysWOW64\hunylvfj.exe uhwjfsgw.exe File created C:\Windows\SysWOW64\gxlncvqp.exe wuvchrkn.exe File opened for modification C:\Windows\SysWOW64\owylxweo.exe bjgwrsxb.exe File opened for modification C:\Windows\SysWOW64\xbpahbhn.exe klvxytcy.exe File opened for modification C:\Windows\SysWOW64\mykzezpz.exe czfbuaqz.exe File created C:\Windows\SysWOW64\adlknjct.exe mteikkcj.exe File created C:\Windows\SysWOW64\bjgwrsxb.exe ooxglozw.exe File created C:\Windows\SysWOW64\fjlpyblt.exe urvktlsr.exe File created C:\Windows\SysWOW64\flyezsgr.exe svdcqsij.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fyqhkmtz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nsbcjhld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cqatruvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wtlcfbue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uepytuxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwvbbcop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trwephpr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swocrjyt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ibholfcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngrlqoov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dilvgigi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eksyjjle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldaosyxu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vihosqcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtswvuni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hepqyrtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lmfuqvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvtfaehw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flyexfsg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxoytqcz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qkmqruup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxfbpwxq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjxatjwx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftugqnrw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language enaawvco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kyilifsu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cpzyclkj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yyrudoqu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiurwsin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grxfuetc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pummbjdk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lmxeuzle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aullbeea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqczidvg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyaphnug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syrhpjpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language occgtgwl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oopyikaf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scyqinkf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpefvlyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language araoceep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language njaylxbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hxworjuw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uwppoddy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxelixrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pwwuydsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuyvggki.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvcrhven.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ptlxydrh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cjgrkmde.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmnqqvhi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbomvuco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxdaziup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxmjqlcx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdabdsvx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language goqdafke.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsyrztzy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyywyoni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iiblmhab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mzwaiamu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baioqhfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gxqcecix.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvioikvk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tudpbmgn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3000 wrote to memory of 3112 3000 76fa72232ddf24567368efff11f043c6_JaffaCakes118.exe 84 PID 3000 wrote to memory of 3112 3000 76fa72232ddf24567368efff11f043c6_JaffaCakes118.exe 84 PID 3000 wrote to memory of 3112 3000 76fa72232ddf24567368efff11f043c6_JaffaCakes118.exe 84 PID 3112 wrote to memory of 4984 3112 fbrassgc.exe 87 PID 3112 wrote to memory of 4984 3112 fbrassgc.exe 87 PID 3112 wrote to memory of 4984 3112 fbrassgc.exe 87 PID 4984 wrote to memory of 636 4984 lhoqftfo.exe 88 PID 4984 wrote to memory of 636 4984 lhoqftfo.exe 88 PID 4984 wrote to memory of 636 4984 lhoqftfo.exe 88 PID 636 wrote to memory of 3252 636 vcobnool.exe 90 PID 636 wrote to memory of 3252 636 vcobnool.exe 90 PID 636 wrote to memory of 3252 636 vcobnool.exe 90 PID 3252 wrote to memory of 1228 3252 fyptuioi.exe 91 PID 3252 wrote to memory of 1228 3252 fyptuioi.exe 91 PID 3252 wrote to memory of 1228 3252 fyptuioi.exe 91 PID 1228 wrote to memory of 2100 1228 vcqgynld.exe 93 PID 1228 wrote to memory of 2100 1228 vcqgynld.exe 93 PID 1228 wrote to memory of 2100 1228 vcqgynld.exe 93 PID 2100 wrote to memory of 4664 2100 fffruqrx.exe 94 PID 2100 wrote to memory of 4664 2100 fffruqrx.exe 94 PID 2100 wrote to memory of 4664 2100 fffruqrx.exe 94 PID 4664 wrote to memory of 576 4664 sawozuqk.exe 95 PID 4664 wrote to memory of 576 4664 sawozuqk.exe 95 PID 4664 wrote to memory of 576 4664 sawozuqk.exe 95 PID 576 wrote to memory of 656 576 czbmktyj.exe 96 PID 576 wrote to memory of 656 576 czbmktyj.exe 96 PID 576 wrote to memory of 656 576 czbmktyj.exe 96 PID 656 wrote to memory of 3144 656 tayulcwb.exe 99 PID 656 wrote to memory of 3144 656 tayulcwb.exe 99 PID 656 wrote to memory of 3144 656 tayulcwb.exe 99 PID 3144 wrote to memory of 1800 3144 ddneyxcd.exe 100 PID 3144 wrote to memory of 1800 3144 ddneyxcd.exe 100 PID 3144 wrote to memory of 1800 3144 ddneyxcd.exe 100 PID 1800 wrote to memory of 3148 1800 iyfuebbi.exe 101 PID 1800 wrote to memory of 3148 1800 iyfuebbi.exe 101 PID 1800 wrote to memory of 3148 1800 iyfuebbi.exe 101 PID 3148 wrote to memory of 640 3148 vlojkfiv.exe 102 PID 3148 wrote to memory of 640 3148 vlojkfiv.exe 102 PID 3148 wrote to memory of 640 3148 vlojkfiv.exe 102 PID 640 wrote to memory of 2116 640 cskkeujf.exe 103 PID 640 wrote to memory of 2116 640 cskkeujf.exe 103 PID 640 wrote to memory of 2116 640 cskkeujf.exe 103 PID 2116 wrote to memory of 3784 2116 sxkxihgz.exe 105 PID 2116 wrote to memory of 3784 2116 sxkxihgz.exe 105 PID 2116 wrote to memory of 3784 2116 sxkxihgz.exe 105 PID 3784 wrote to memory of 3392 3784 sxuuouvi.exe 106 PID 3784 wrote to memory of 3392 3784 sxuuouvi.exe 106 PID 3784 wrote to memory of 3392 3784 sxuuouvi.exe 106 PID 3392 wrote to memory of 320 3392 ndbfpfsq.exe 108 PID 3392 wrote to memory of 320 3392 ndbfpfsq.exe 108 PID 3392 wrote to memory of 320 3392 ndbfpfsq.exe 108 PID 320 wrote to memory of 64 320 xvrkbvut.exe 109 PID 320 wrote to memory of 64 320 xvrkbvut.exe 109 PID 320 wrote to memory of 64 320 xvrkbvut.exe 109 PID 64 wrote to memory of 2524 64 liiahzty.exe 110 PID 64 wrote to memory of 2524 64 liiahzty.exe 110 PID 64 wrote to memory of 2524 64 liiahzty.exe 110 PID 2524 wrote to memory of 264 2524 xyddqhzn.exe 111 PID 2524 wrote to memory of 264 2524 xyddqhzn.exe 111 PID 2524 wrote to memory of 264 2524 xyddqhzn.exe 111 PID 264 wrote to memory of 3776 264 iuenxbak.exe 112 PID 264 wrote to memory of 3776 264 iuenxbak.exe 112 PID 264 wrote to memory of 3776 264 iuenxbak.exe 112 PID 3776 wrote to memory of 4560 3776 sbqtqahk.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\76fa72232ddf24567368efff11f043c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\76fa72232ddf24567368efff11f043c6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\fbrassgc.exeC:\Windows\system32\fbrassgc.exe 1120 "C:\Users\Admin\AppData\Local\Temp\76fa72232ddf24567368efff11f043c6_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\lhoqftfo.exeC:\Windows\system32\lhoqftfo.exe 1132 "C:\Windows\SysWOW64\fbrassgc.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\vcobnool.exeC:\Windows\system32\vcobnool.exe 1136 "C:\Windows\SysWOW64\lhoqftfo.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\fyptuioi.exeC:\Windows\system32\fyptuioi.exe 1140 "C:\Windows\SysWOW64\vcobnool.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\vcqgynld.exeC:\Windows\system32\vcqgynld.exe 1144 "C:\Windows\SysWOW64\fyptuioi.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\fffruqrx.exeC:\Windows\system32\fffruqrx.exe 1128 "C:\Windows\SysWOW64\vcqgynld.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\sawozuqk.exeC:\Windows\system32\sawozuqk.exe 1152 "C:\Windows\SysWOW64\fffruqrx.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\czbmktyj.exeC:\Windows\system32\czbmktyj.exe 1156 "C:\Windows\SysWOW64\sawozuqk.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\tayulcwb.exeC:\Windows\system32\tayulcwb.exe 1148 "C:\Windows\SysWOW64\czbmktyj.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\ddneyxcd.exeC:\Windows\system32\ddneyxcd.exe 1160 "C:\Windows\SysWOW64\tayulcwb.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\iyfuebbi.exeC:\Windows\system32\iyfuebbi.exe 1164 "C:\Windows\SysWOW64\ddneyxcd.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\vlojkfiv.exeC:\Windows\system32\vlojkfiv.exe 1168 "C:\Windows\SysWOW64\iyfuebbi.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\cskkeujf.exeC:\Windows\system32\cskkeujf.exe 1176 "C:\Windows\SysWOW64\vlojkfiv.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\sxkxihgz.exeC:\Windows\system32\sxkxihgz.exe 1180 "C:\Windows\SysWOW64\cskkeujf.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\sxuuouvi.exeC:\Windows\system32\sxuuouvi.exe 996 "C:\Windows\SysWOW64\sxkxihgz.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\ndbfpfsq.exeC:\Windows\system32\ndbfpfsq.exe 1184 "C:\Windows\SysWOW64\sxuuouvi.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\xvrkbvut.exeC:\Windows\system32\xvrkbvut.exe 1192 "C:\Windows\SysWOW64\ndbfpfsq.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\liiahzty.exeC:\Windows\system32\liiahzty.exe 1188 "C:\Windows\SysWOW64\xvrkbvut.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\xyddqhzn.exeC:\Windows\system32\xyddqhzn.exe 1196 "C:\Windows\SysWOW64\liiahzty.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\iuenxbak.exeC:\Windows\system32\iuenxbak.exe 1200 "C:\Windows\SysWOW64\xyddqhzn.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\sbqtqahk.exeC:\Windows\system32\sbqtqahk.exe 1204 "C:\Windows\SysWOW64\iuenxbak.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\cauqazpk.exeC:\Windows\system32\cauqazpk.exe 1212 "C:\Windows\SysWOW64\sbqtqahk.exe"23⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\qkatdqpu.exeC:\Windows\system32\qkatdqpu.exe 1208 "C:\Windows\SysWOW64\cauqazpk.exe"24⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\xrolpoqe.exeC:\Windows\system32\xrolpoqe.exe 1124 "C:\Windows\SysWOW64\qkatdqpu.exe"25⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\nwwgttvz.exeC:\Windows\system32\nwwgttvz.exe 1228 "C:\Windows\SysWOW64\xrolpoqe.exe"26⤵
- Executes dropped EXE
PID:4956 -
C:\Windows\SysWOW64\xrxyjowe.exeC:\Windows\system32\xrxyjowe.exe 1220 "C:\Windows\SysWOW64\nwwgttvz.exe"27⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\hrbwtmdw.exeC:\Windows\system32\hrbwtmdw.exe 1232 "C:\Windows\SysWOW64\xrxyjowe.exe"28⤵
- Executes dropped EXE
PID:2456 -
C:\Windows\SysWOW64\upwycubl.exeC:\Windows\system32\upwycubl.exe 1236 "C:\Windows\SysWOW64\hrbwtmdw.exe"29⤵
- Executes dropped EXE
PID:4112 -
C:\Windows\SysWOW64\ktetgaxx.exeC:\Windows\system32\ktetgaxx.exe 1224 "C:\Windows\SysWOW64\upwycubl.exe"30⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\vpfeougc.exeC:\Windows\system32\vpfeougc.exe 1172 "C:\Windows\SysWOW64\ktetgaxx.exe"31⤵
- Executes dropped EXE
PID:3948 -
C:\Windows\SysWOW64\ioagwcek.exeC:\Windows\system32\ioagwcek.exe 1244 "C:\Windows\SysWOW64\vpfeougc.exe"32⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\sypmjsgm.exeC:\Windows\system32\sypmjsgm.exe 1252 "C:\Windows\SysWOW64\ioagwcek.exe"33⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\fwkpsblu.exeC:\Windows\system32\fwkpsblu.exe 1256 "C:\Windows\SysWOW64\sypmjsgm.exe"34⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\SysWOW64\qslzzvmr.exeC:\Windows\system32\qslzzvmr.exe 1248 "C:\Windows\SysWOW64\fwkpsblu.exe"35⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\cmrplaqb.exeC:\Windows\system32\cmrplaqb.exe 1264 "C:\Windows\SysWOW64\qslzzvmr.exe"36⤵
- Executes dropped EXE
PID:792 -
C:\Windows\SysWOW64\nhszsczy.exeC:\Windows\system32\nhszsczy.exe 1268 "C:\Windows\SysWOW64\cmrplaqb.exe"37⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\arykvuri.exeC:\Windows\system32\arykvuri.exe 1216 "C:\Windows\SysWOW64\nhszsczy.exe"38⤵
- Executes dropped EXE
PID:3660 -
C:\Windows\SysWOW64\nptnmcxp.exeC:\Windows\system32\nptnmcxp.exe 1240 "C:\Windows\SysWOW64\arykvuri.exe"39⤵
- Executes dropped EXE
PID:3860 -
C:\Windows\SysWOW64\xoxkwbep.exeC:\Windows\system32\xoxkwbep.exe 1276 "C:\Windows\SysWOW64\nptnmcxp.exe"40⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\kyenzawa.exeC:\Windows\system32\kyenzawa.exe 1280 "C:\Windows\SysWOW64\xoxkwbep.exe"41⤵
- Executes dropped EXE
PID:3628 -
C:\Windows\SysWOW64\xogpiich.exeC:\Windows\system32\xogpiich.exe 1260 "C:\Windows\SysWOW64\kyenzawa.exe"42⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\kqmftngq.exeC:\Windows\system32\kqmftngq.exe 1272 "C:\Windows\SysWOW64\xogpiich.exe"43⤵
- Executes dropped EXE
PID:2200 -
C:\Windows\SysWOW64\umfpbhpo.exeC:\Windows\system32\umfpbhpo.exe 1296 "C:\Windows\SysWOW64\kqmftngq.exe"44⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\kqokfumi.exeC:\Windows\system32\kqokfumi.exe 1292 "C:\Windows\SysWOW64\umfpbhpo.exe"45⤵
- Executes dropped EXE
PID:5020 -
C:\Windows\SysWOW64\vmodupmf.exeC:\Windows\system32\vmodupmf.exe 1304 "C:\Windows\SysWOW64\kqokfumi.exe"46⤵
- Executes dropped EXE
PID:3360 -
C:\Windows\SysWOW64\ikjgdpsu.exeC:\Windows\system32\ikjgdpsu.exe 1308 "C:\Windows\SysWOW64\vmodupmf.exe"47⤵
- Executes dropped EXE
PID:2220 -
C:\Windows\SysWOW64\skndnozm.exeC:\Windows\system32\skndnozm.exe 1312 "C:\Windows\SysWOW64\ikjgdpsu.exe"48⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\ftugqnrw.exeC:\Windows\system32\ftugqnrw.exe 1300 "C:\Windows\SysWOW64\skndnozm.exe"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Windows\SysWOW64\psgdbmzw.exeC:\Windows\system32\psgdbmzw.exe 1320 "C:\Windows\SysWOW64\ftugqnrw.exe"50⤵
- Executes dropped EXE
PID:3836 -
C:\Windows\SysWOW64\cjbgjufl.exeC:\Windows\system32\cjbgjufl.exe 1316 "C:\Windows\SysWOW64\psgdbmzw.exe"51⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\mqfdcted.exeC:\Windows\system32\mqfdcted.exe 1324 "C:\Windows\SysWOW64\cjbgjufl.exe"52⤵
- Executes dropped EXE
PID:4040 -
C:\Windows\SysWOW64\drctducd.exeC:\Windows\system32\drctducd.exe 1328 "C:\Windows\SysWOW64\mqfdcted.exe"53⤵
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\fqorntkd.exeC:\Windows\system32\fqorntkd.exe 1336 "C:\Windows\SysWOW64\drctducd.exe"54⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\sdxgtxih.exeC:\Windows\system32\sdxgtxih.exe 1284 "C:\Windows\SysWOW64\fqorntkd.exe"55⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\SysWOW64\cnnrgapj.exeC:\Windows\system32\cnnrgapj.exe 1340 "C:\Windows\SysWOW64\sdxgtxih.exe"56⤵
- Executes dropped EXE
PID:4692 -
C:\Windows\SysWOW64\paegmevo.exeC:\Windows\system32\paegmevo.exe 1344 "C:\Windows\SysWOW64\cnnrgapj.exe"57⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\SysWOW64\cnwwazub.exeC:\Windows\system32\cnwwazub.exe 1348 "C:\Windows\SysWOW64\paegmevo.exe"58⤵
- Executes dropped EXE
PID:544 -
C:\Windows\SysWOW64\nflcfyww.exeC:\Windows\system32\nflcfyww.exe 1356 "C:\Windows\SysWOW64\cnwwazub.exe"59⤵
- Executes dropped EXE
PID:5056 -
C:\Windows\SysWOW64\zzrjqcbg.exeC:\Windows\system32\zzrjqcbg.exe 1360 "C:\Windows\SysWOW64\nflcfyww.exe"60⤵
- Executes dropped EXE
PID:4684 -
C:\Windows\SysWOW64\kvkcywbl.exeC:\Windows\system32\kvkcywbl.exe 1352 "C:\Windows\SysWOW64\zzrjqcbg.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1760 -
C:\Windows\SysWOW64\alekfofa.exeC:\Windows\system32\alekfofa.exe 1332 "C:\Windows\SysWOW64\kvkcywbl.exe"62⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\nynzkkee.exeC:\Windows\system32\nynzkkee.exe 1372 "C:\Windows\SysWOW64\alekfofa.exe"63⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\xjdkgnkg.exeC:\Windows\system32\xjdkgnkg.exe 1364 "C:\Windows\SysWOW64\nynzkkee.exe"64⤵
- Executes dropped EXE
PID:4028 -
C:\Windows\SysWOW64\kwuzmrjl.exeC:\Windows\system32\kwuzmrjl.exe 1380 "C:\Windows\SysWOW64\xjdkgnkg.exe"65⤵
- Executes dropped EXE
PID:2600 -
C:\Windows\SysWOW64\urvktlsr.exeC:\Windows\system32\urvktlsr.exe 1368 "C:\Windows\SysWOW64\kwuzmrjl.exe"66⤵
- Drops file in System32 directory
PID:2140 -
C:\Windows\SysWOW64\fjlpyblt.exeC:\Windows\system32\fjlpyblt.exe 1388 "C:\Windows\SysWOW64\urvktlsr.exe"67⤵PID:2620
-
C:\Windows\SysWOW64\rdrfjoyv.exeC:\Windows\system32\rdrfjoyv.exe 1392 "C:\Windows\SysWOW64\fjlpyblt.exe"68⤵PID:208
-
C:\Windows\SysWOW64\fnximnqf.exeC:\Windows\system32\fnximnqf.exe 1384 "C:\Windows\SysWOW64\rdrfjoyv.exe"69⤵PID:4032
-
C:\Windows\SysWOW64\piqscizl.exeC:\Windows\system32\piqscizl.exe 1396 "C:\Windows\SysWOW64\fnximnqf.exe"70⤵PID:2468
-
C:\Windows\SysWOW64\ztfdpdff.exeC:\Windows\system32\ztfdpdff.exe 1376 "C:\Windows\SysWOW64\piqscizl.exe"71⤵
- Drops file in System32 directory
PID:4328 -
C:\Windows\SysWOW64\pxoytqcz.exeC:\Windows\system32\pxoytqcz.exe 1408 "C:\Windows\SysWOW64\ztfdpdff.exe"72⤵
- System Location Discovery: System Language Discovery
PID:4180 -
C:\Windows\SysWOW64\ztoqblcw.exeC:\Windows\system32\ztoqblcw.exe 1412 "C:\Windows\SysWOW64\pxoytqcz.exe"73⤵PID:2576
-
C:\Windows\SysWOW64\kphaifdc.exeC:\Windows\system32\kphaifdc.exe 1404 "C:\Windows\SysWOW64\ztoqblcw.exe"74⤵PID:1064
-
C:\Windows\SysWOW64\vhxgvvfw.exeC:\Windows\system32\vhxgvvfw.exe 1420 "C:\Windows\SysWOW64\kphaifdc.exe"75⤵PID:3076
-
C:\Windows\SysWOW64\ejmqiylz.exeC:\Windows\system32\ejmqiylz.exe 1400 "C:\Windows\SysWOW64\vhxgvvfw.exe"76⤵PID:2036
-
C:\Windows\SysWOW64\stttlylj.exeC:\Windows\system32\stttlylj.exe 1424 "C:\Windows\SysWOW64\ejmqiylz.exe"77⤵PID:3212
-
C:\Windows\SysWOW64\hjmbsipy.exeC:\Windows\system32\hjmbsipy.exe 1432 "C:\Windows\SysWOW64\stttlylj.exe"78⤵PID:2360
-
C:\Windows\SysWOW64\seflacqv.exeC:\Windows\system32\seflacqv.exe 1428 "C:\Windows\SysWOW64\hjmbsipy.exe"79⤵PID:1116
-
C:\Windows\SysWOW64\fvioikvk.exeC:\Windows\system32\fvioikvk.exe 1288 "C:\Windows\SysWOW64\seflacqv.exe"80⤵
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\pummbjdk.exeC:\Windows\system32\pummbjdk.exe 1440 "C:\Windows\SysWOW64\fvioikvk.exe"81⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Windows\SysWOW64\zbqjlicc.exeC:\Windows\system32\zbqjlicc.exe 1444 "C:\Windows\SysWOW64\pummbjdk.exe"82⤵PID:376
-
C:\Windows\SysWOW64\pcnzmjab.exeC:\Windows\system32\pcnzmjab.exe 1448 "C:\Windows\SysWOW64\zbqjlicc.exe"83⤵PID:5108
-
C:\Windows\SysWOW64\zecjamhw.exeC:\Windows\system32\zecjamhw.exe 1456 "C:\Windows\SysWOW64\pcnzmjab.exe"84⤵PID:3772
-
C:\Windows\SysWOW64\nojmdlhg.exeC:\Windows\system32\nojmdlhg.exe 1452 "C:\Windows\SysWOW64\zecjamhw.exe"85⤵PID:3152
-
C:\Windows\SysWOW64\wyywyoni.exeC:\Windows\system32\wyywyoni.exe 1416 "C:\Windows\SysWOW64\nojmdlhg.exe"86⤵
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\nzverxla.exeC:\Windows\system32\nzverxla.exe 1464 "C:\Windows\SysWOW64\wyywyoni.exe"87⤵PID:3444
-
C:\Windows\SysWOW64\xyhcjota.exeC:\Windows\system32\xyhcjota.exe 1468 "C:\Windows\SysWOW64\nzverxla.exe"88⤵PID:4596
-
C:\Windows\SysWOW64\klrspsre.exeC:\Windows\system32\klrspsre.exe 1476 "C:\Windows\SysWOW64\xyhcjota.exe"89⤵PID:4444
-
C:\Windows\SysWOW64\uwgccvyg.exeC:\Windows\system32\uwgccvyg.exe 1480 "C:\Windows\SysWOW64\klrspsre.exe"90⤵PID:3440
-
C:\Windows\SysWOW64\hjyaizwl.exeC:\Windows\system32\hjyaizwl.exe 1484 "C:\Windows\SysWOW64\uwgccvyg.exe"91⤵PID:1988
-
C:\Windows\SysWOW64\uwppoddy.exeC:\Windows\system32\uwppoddy.exe 1488 "C:\Windows\SysWOW64\hjyaizwl.exe"92⤵
- System Location Discovery: System Language Discovery
PID:4160 -
C:\Windows\SysWOW64\hnksxdbf.exeC:\Windows\system32\hnksxdbf.exe 1472 "C:\Windows\SysWOW64\uwppoddy.exe"93⤵PID:1968
-
C:\Windows\SysWOW64\ruoqpcif.exeC:\Windows\system32\ruoqpcif.exe 1496 "C:\Windows\SysWOW64\hnksxdbf.exe"94⤵PID:4972
-
C:\Windows\SysWOW64\hvlyqlgx.exeC:\Windows\system32\hvlyqlgx.exe 1492 "C:\Windows\SysWOW64\ruoqpcif.exe"95⤵PID:1108
-
C:\Windows\SysWOW64\suxvbjgx.exeC:\Windows\system32\suxvbjgx.exe 1500 "C:\Windows\SysWOW64\hvlyqlgx.exe"96⤵PID:4600
-
C:\Windows\SysWOW64\eksyjjle.exeC:\Windows\system32\eksyjjle.exe 1508 "C:\Windows\SysWOW64\suxvbjgx.exe"97⤵
- System Location Discovery: System Language Discovery
PID:5092 -
C:\Windows\SysWOW64\prwvuitd.exeC:\Windows\system32\prwvuitd.exe 1504 "C:\Windows\SysWOW64\eksyjjle.exe"98⤵PID:1028
-
C:\Windows\SysWOW64\xstdvrrv.exeC:\Windows\system32\xstdvrrv.exe 1512 "C:\Windows\SysWOW64\prwvuitd.exe"99⤵PID:2348
-
C:\Windows\SysWOW64\hvjnquxx.exeC:\Windows\system32\hvjnquxx.exe 1520 "C:\Windows\SysWOW64\xstdvrrv.exe"100⤵PID:3632
-
C:\Windows\SysWOW64\uepytuxi.exeC:\Windows\system32\uepytuxi.exe 1516 "C:\Windows\SysWOW64\hvjnquxx.exe"101⤵
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Windows\SysWOW64\hvkbcuvp.exeC:\Windows\system32\hvkbcuvp.exe 1528 "C:\Windows\SysWOW64\uepytuxi.exe"102⤵PID:1572
-
C:\Windows\SysWOW64\uqbrhyuu.exeC:\Windows\system32\uqbrhyuu.exe 1532 "C:\Windows\SysWOW64\hvkbcuvp.exe"103⤵
- Drops file in System32 directory
PID:4584 -
C:\Windows\SysWOW64\epnosxbt.exeC:\Windows\system32\epnosxbt.exe 1524 "C:\Windows\SysWOW64\uqbrhyuu.exe"104⤵PID:780
-
C:\Windows\SysWOW64\rcxeyaag.exeC:\Windows\system32\rcxeyaag.exe 1436 "C:\Windows\SysWOW64\epnosxbt.exe"105⤵PID:4308
-
C:\Windows\SysWOW64\bmmoteoa.exeC:\Windows\system32\bmmoteoa.exe 1460 "C:\Windows\SysWOW64\rcxeyaag.exe"106⤵PID:960
-
C:\Windows\SysWOW64\pzeezznn.exeC:\Windows\system32\pzeezznn.exe 1544 "C:\Windows\SysWOW64\bmmoteoa.exe"107⤵PID:1624
-
C:\Windows\SysWOW64\cmvtedma.exeC:\Windows\system32\cmvtedma.exe 1548 "C:\Windows\SysWOW64\pzeezznn.exe"108⤵PID:4172
-
C:\Windows\SysWOW64\pzfrkhkf.exeC:\Windows\system32\pzfrkhkf.exe 1556 "C:\Windows\SysWOW64\cmvtedma.exe"109⤵PID:3220
-
C:\Windows\SysWOW64\zkucxkzh.exeC:\Windows\system32\zkucxkzh.exe 1552 "C:\Windows\SysWOW64\pzfrkhkf.exe"110⤵PID:2604
-
C:\Windows\SysWOW64\mxmrdoym.exeC:\Windows\system32\mxmrdoym.exe 1564 "C:\Windows\SysWOW64\zkucxkzh.exe"111⤵PID:4164
-
C:\Windows\SysWOW64\zkvhjkwy.exeC:\Windows\system32\zkvhjkwy.exe 1560 "C:\Windows\SysWOW64\mxmrdoym.exe"112⤵PID:4156
-
C:\Windows\SysWOW64\mxnxpovd.exeC:\Windows\system32\mxnxpovd.exe 1572 "C:\Windows\SysWOW64\zkvhjkwy.exe"113⤵PID:3228
-
C:\Windows\SysWOW64\wichkrbf.exeC:\Windows\system32\wichkrbf.exe 1568 "C:\Windows\SysWOW64\mxnxpovd.exe"114⤵PID:2912
-
C:\Windows\SysWOW64\mjzpdazx.exeC:\Windows\system32\mjzpdazx.exe 1536 "C:\Windows\SysWOW64\wichkrbf.exe"115⤵PID:4304
-
C:\Windows\SysWOW64\widnwzhx.exeC:\Windows\system32\widnwzhx.exe 1584 "C:\Windows\SysWOW64\mjzpdazx.exe"116⤵PID:116
-
C:\Windows\SysWOW64\jygpezme.exeC:\Windows\system32\jygpezme.exe 1580 "C:\Windows\SysWOW64\widnwzhx.exe"117⤵PID:2420
-
C:\Windows\SysWOW64\xlqfkdlr.exeC:\Windows\system32\xlqfkdlr.exe 1588 "C:\Windows\SysWOW64\jygpezme.exe"118⤵PID:1196
-
C:\Windows\SysWOW64\kghdqgkw.exeC:\Windows\system32\kghdqgkw.exe 1596 "C:\Windows\SysWOW64\xlqfkdlr.exe"119⤵PID:4148
-
C:\Windows\SysWOW64\uflaafsv.exeC:\Windows\system32\uflaafsv.exe 1592 "C:\Windows\SysWOW64\kghdqgkw.exe"120⤵PID:2564
-
C:\Windows\SysWOW64\hwodjfpd.exeC:\Windows\system32\hwodjfpd.exe 1604 "C:\Windows\SysWOW64\uflaafsv.exe"121⤵PID:3528
-
C:\Windows\SysWOW64\ujysxjwp.exeC:\Windows\system32\ujysxjwp.exe 1616 "C:\Windows\SysWOW64\hwodjfpd.exe"122⤵PID:2076
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-