Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 10:09
Behavioral task
behavioral1
Sample
85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe
-
Size
452KB
-
MD5
85a9b80cf58ff00cbf501b77953bf31a
-
SHA1
c99282e2337d76dbbdd1194ed07b2abb33eddd70
-
SHA256
a6a9419dd8bc7a56eec6e3ff07ea0ebd933af587a76fd7c77b886353edbb1ac6
-
SHA512
e8f2899b7220a1855b9b5ad56ac99387db7cd1477b9ea04775277c5f18c173d350e22c13172ecc4b66bd60e61296221754c43b81803f4077e26bdcf52aced6da
-
SSDEEP
12288:zNo6BDYKR1kU+gLcnKNalKv1V0pjnGPzH:zNJkU+aqzAP0Nno
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 3760 lsirrod.exe 2320 pftzkyq.exe 1020 abukstr.exe 4052 nolzxwp.exe 1816 vswnphs.exe 3272 kihvwrw.exe 2728 xvrkbvu.exe 5076 irsvjpv.exe 2024 vejkptc.exe 1692 iuenxba.exe 1896 sqfgfwi.exe 2668 foaiwwg.exe 4268 pnmggvn.exe 3332 cavvmzm.exe 1188 qnnlscl.exe 4564 auricbs.exe 2680 ktdouaa.exe 3216 sffovyy.exe 3784 izcbfub.exe 5064 syogpti.exe 1148 acrmhel.exe 1144 qdouinj.exe 3172 xhyhrym.exe 1560 hgcekxt.exe 552 vttuqas.exe 3496 iglsvwr.exe 2300 snppgvy.exe 3812 agopukc.exe 3788 ntgfagb.exe 4180 djrfhxf.exe 1348 nlgpual.exe 5000 umfpbhp.exe 3256 hdisrpm.exe 2396 agzsmeh.exe 1564 kcadtyq.exe 4772 uepnocw.exe 2560 fxfttsy.exe 4508 skoizvx.exe 1504 firliwd.exe 4432 peswxyd.exe 4832 cunygyj.exe 1900 cyxlprm.exe 2152 sdxgtxi.exe 940 cnnrgap.exe 1044 pxttjzp.exe 448 ffebqjs.exe 1316 ppcmlmz.exe 3284 czapolz.exe 3328 khwpbbi.exe 3100 alekfof.exe 2160 hpgpwzi.exe 4080 ucyfcdg.exe 4156 hppcizf.exe 3540 raenvct.exe 2364 fnocbgs.exe 4172 rdrfjoy.exe 1192 csvytat.exe 3564 mulahdz.exe 208 xqlsoxa.exe 640 kdviubh.exe 3752 xynyaxg.exe 2756 klengbe.exe 3968 uotybel.exe 4800 hbdohij.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\umfpbhp.exe nlgpual.exe File opened for modification C:\Windows\SysWOW64\pjgkqwu.exe cwxulaw.exe File opened for modification C:\Windows\SysWOW64\ibkzlzp.exe vdqwcrk.exe File opened for modification C:\Windows\SysWOW64\kzotiqk.exe xewddum.exe File created C:\Windows\SysWOW64\szwsxon.exe fmecjko.exe File created C:\Windows\SysWOW64\xgglzpa.exe ndrbmmu.exe File opened for modification C:\Windows\SysWOW64\skoizvx.exe fxfttsy.exe File created C:\Windows\SysWOW64\hyvxzhi.exe xngnmet.exe File opened for modification C:\Windows\SysWOW64\vcjbizm.exe kdfexan.exe File opened for modification C:\Windows\SysWOW64\rbwrgiy.exe monbaez.exe File created C:\Windows\SysWOW64\bntofwc.exe oabyzad.exe File created C:\Windows\SysWOW64\rsrtiye.exe hqcjmvy.exe File opened for modification C:\Windows\SysWOW64\uwqiikz.exe hjylcgs.exe File created C:\Windows\SysWOW64\gnlpedl.exe satzqzf.exe File opened for modification C:\Windows\SysWOW64\vswnphs.exe nolzxwp.exe File opened for modification C:\Windows\SysWOW64\firliwd.exe skoizvx.exe File opened for modification C:\Windows\SysWOW64\dilnlez.exe qvtpxbb.exe File opened for modification C:\Windows\SysWOW64\rjwwhdv.exe eweybzo.exe File opened for modification C:\Windows\SysWOW64\jktyohq.exe wxbailr.exe File created C:\Windows\SysWOW64\fwpiqga.exe sjykccb.exe File created C:\Windows\SysWOW64\orfonyp.exe benyhuq.exe File opened for modification C:\Windows\SysWOW64\ybvemaa.exe prgtzxm.exe File opened for modification C:\Windows\SysWOW64\qhknrjr.exe dusylfs.exe File created C:\Windows\SysWOW64\waiupgt.exe jnqekku.exe File created C:\Windows\SysWOW64\fcgfnvp.exe varuasb.exe File opened for modification C:\Windows\SysWOW64\zrursnk.exe medbnjl.exe File opened for modification C:\Windows\SysWOW64\pxekjba.exe ccuudxt.exe File created C:\Windows\SysWOW64\hibdbva.exe tvjnvrb.exe File created C:\Windows\SysWOW64\nkklbou.exe dzmbglf.exe File created C:\Windows\SysWOW64\dmbtjkd.exe qvyqbkx.exe File created C:\Windows\SysWOW64\fninwnc.exe dktciko.exe File opened for modification C:\Windows\SysWOW64\hjgwgyy.exe uowyacz.exe File created C:\Windows\SysWOW64\ceuujvk.exe prleezd.exe File opened for modification C:\Windows\SysWOW64\telxfbj.exe gjbizfk.exe File created C:\Windows\SysWOW64\wlvsprd.exe gkykorf.exe File created C:\Windows\SysWOW64\gcikyvn.exe tpqutro.exe File created C:\Windows\SysWOW64\syoptxh.exe ivzeyub.exe File created C:\Windows\SysWOW64\gdfazon.exe tqwktkg.exe File created C:\Windows\SysWOW64\xcvqbhd.exe kspoyhd.exe File opened for modification C:\Windows\SysWOW64\qnznpsb.exe daixkpc.exe File created C:\Windows\SysWOW64\lsveeqq.exe yfdgzmr.exe File opened for modification C:\Windows\SysWOW64\vdqwcrk.exe iqghovl.exe File created C:\Windows\SysWOW64\xgelfwc.exe kqjiwow.exe File created C:\Windows\SysWOW64\tpvfvaw.exe gcdqqxx.exe File created C:\Windows\SysWOW64\cwthyvf.exe pjkrsrg.exe File opened for modification C:\Windows\SysWOW64\mgsefyr.exe ceuujvk.exe File created C:\Windows\SysWOW64\ywlhocg.exe lfrfguj.exe File created C:\Windows\SysWOW64\jdzssbu.exe vtshpbu.exe File opened for modification C:\Windows\SysWOW64\ayydqqi.exe qzlgfsb.exe File created C:\Windows\SysWOW64\liszgve.exe bagbvwx.exe File created C:\Windows\SysWOW64\rwnhzjo.exe ejvsmnq.exe File created C:\Windows\SysWOW64\sqfgfwi.exe iuenxba.exe File opened for modification C:\Windows\SysWOW64\agopukc.exe snppgvy.exe File opened for modification C:\Windows\SysWOW64\rrtedjf.exe hgwtqgz.exe File created C:\Windows\SysWOW64\mdgaxxq.exe zqpkscs.exe File opened for modification C:\Windows\SysWOW64\kektuxl.exe xoirlog.exe File created C:\Windows\SysWOW64\jsudion.exe wxcnuko.exe File opened for modification C:\Windows\SysWOW64\rwnhzjo.exe ejvsmnq.exe File opened for modification C:\Windows\SysWOW64\xvrkbvu.exe kihvwrw.exe File opened for modification C:\Windows\SysWOW64\foaiwwg.exe sqfgfwi.exe File opened for modification C:\Windows\SysWOW64\qdouinj.exe acrmhel.exe File opened for modification C:\Windows\SysWOW64\hywktpf.exe ulfvnlg.exe File opened for modification C:\Windows\SysWOW64\ckqknqg.exe pxzvhui.exe File created C:\Windows\SysWOW64\qvtpxbb.exe cikzrxc.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyhhosk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language varuasb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfbfkgg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipcefpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vejkptc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yszpaqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtowpev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ibkzlzp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyxlprm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgwtqgz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uvpnszv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbwjcez.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxkxnfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axtnoqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woxpwiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsudion.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwthyvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msbirpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zqypdbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fefmnzu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egftvnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbgnbhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uowyacz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lwlpikp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhqmwau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aywyejd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kskuqcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language phebmkg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvjnvrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ocqknth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkeadzs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kaoxgiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhockji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isihtii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hygpsrs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbfiuya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlgjtwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hqxtdon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlqfpap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yqjlyww.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctwijnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sccmrnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxbsnhk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hixxndw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnqekku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lgnpvfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjnwtbu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjylcgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gljgohr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rssqqcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rjnassr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language blnzjhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language waiupgt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ixswxxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ioxmvic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbdvfvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utjgfdq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdisrpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ejvsmnq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fwouwgu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language berbysf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skdzdvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmkpjha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrtwspg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3320 wrote to memory of 3760 3320 85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe 86 PID 3320 wrote to memory of 3760 3320 85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe 86 PID 3320 wrote to memory of 3760 3320 85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe 86 PID 3760 wrote to memory of 2320 3760 lsirrod.exe 88 PID 3760 wrote to memory of 2320 3760 lsirrod.exe 88 PID 3760 wrote to memory of 2320 3760 lsirrod.exe 88 PID 2320 wrote to memory of 1020 2320 pftzkyq.exe 89 PID 2320 wrote to memory of 1020 2320 pftzkyq.exe 89 PID 2320 wrote to memory of 1020 2320 pftzkyq.exe 89 PID 1020 wrote to memory of 4052 1020 abukstr.exe 90 PID 1020 wrote to memory of 4052 1020 abukstr.exe 90 PID 1020 wrote to memory of 4052 1020 abukstr.exe 90 PID 4052 wrote to memory of 1816 4052 nolzxwp.exe 91 PID 4052 wrote to memory of 1816 4052 nolzxwp.exe 91 PID 4052 wrote to memory of 1816 4052 nolzxwp.exe 91 PID 1816 wrote to memory of 3272 1816 vswnphs.exe 92 PID 1816 wrote to memory of 3272 1816 vswnphs.exe 92 PID 1816 wrote to memory of 3272 1816 vswnphs.exe 92 PID 3272 wrote to memory of 2728 3272 kihvwrw.exe 93 PID 3272 wrote to memory of 2728 3272 kihvwrw.exe 93 PID 3272 wrote to memory of 2728 3272 kihvwrw.exe 93 PID 2728 wrote to memory of 5076 2728 xvrkbvu.exe 96 PID 2728 wrote to memory of 5076 2728 xvrkbvu.exe 96 PID 2728 wrote to memory of 5076 2728 xvrkbvu.exe 96 PID 5076 wrote to memory of 2024 5076 irsvjpv.exe 97 PID 5076 wrote to memory of 2024 5076 irsvjpv.exe 97 PID 5076 wrote to memory of 2024 5076 irsvjpv.exe 97 PID 2024 wrote to memory of 1692 2024 vejkptc.exe 98 PID 2024 wrote to memory of 1692 2024 vejkptc.exe 98 PID 2024 wrote to memory of 1692 2024 vejkptc.exe 98 PID 1692 wrote to memory of 1896 1692 iuenxba.exe 99 PID 1692 wrote to memory of 1896 1692 iuenxba.exe 99 PID 1692 wrote to memory of 1896 1692 iuenxba.exe 99 PID 1896 wrote to memory of 2668 1896 sqfgfwi.exe 100 PID 1896 wrote to memory of 2668 1896 sqfgfwi.exe 100 PID 1896 wrote to memory of 2668 1896 sqfgfwi.exe 100 PID 2668 wrote to memory of 4268 2668 foaiwwg.exe 102 PID 2668 wrote to memory of 4268 2668 foaiwwg.exe 102 PID 2668 wrote to memory of 4268 2668 foaiwwg.exe 102 PID 4268 wrote to memory of 3332 4268 pnmggvn.exe 103 PID 4268 wrote to memory of 3332 4268 pnmggvn.exe 103 PID 4268 wrote to memory of 3332 4268 pnmggvn.exe 103 PID 3332 wrote to memory of 1188 3332 cavvmzm.exe 105 PID 3332 wrote to memory of 1188 3332 cavvmzm.exe 105 PID 3332 wrote to memory of 1188 3332 cavvmzm.exe 105 PID 1188 wrote to memory of 4564 1188 qnnlscl.exe 106 PID 1188 wrote to memory of 4564 1188 qnnlscl.exe 106 PID 1188 wrote to memory of 4564 1188 qnnlscl.exe 106 PID 4564 wrote to memory of 2680 4564 auricbs.exe 107 PID 4564 wrote to memory of 2680 4564 auricbs.exe 107 PID 4564 wrote to memory of 2680 4564 auricbs.exe 107 PID 2680 wrote to memory of 3216 2680 ktdouaa.exe 108 PID 2680 wrote to memory of 3216 2680 ktdouaa.exe 108 PID 2680 wrote to memory of 3216 2680 ktdouaa.exe 108 PID 3216 wrote to memory of 3784 3216 sffovyy.exe 109 PID 3216 wrote to memory of 3784 3216 sffovyy.exe 109 PID 3216 wrote to memory of 3784 3216 sffovyy.exe 109 PID 3784 wrote to memory of 5064 3784 izcbfub.exe 110 PID 3784 wrote to memory of 5064 3784 izcbfub.exe 110 PID 3784 wrote to memory of 5064 3784 izcbfub.exe 110 PID 5064 wrote to memory of 1148 5064 syogpti.exe 111 PID 5064 wrote to memory of 1148 5064 syogpti.exe 111 PID 5064 wrote to memory of 1148 5064 syogpti.exe 111 PID 1148 wrote to memory of 1144 1148 acrmhel.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\lsirrod.exeC:\Windows\system32\lsirrod.exe 1196 "C:\Users\Admin\AppData\Local\Temp\85a9b80cf58ff00cbf501b77953bf31a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\pftzkyq.exeC:\Windows\system32\pftzkyq.exe 1152 "C:\Windows\SysWOW64\lsirrod.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\abukstr.exeC:\Windows\system32\abukstr.exe 1148 "C:\Windows\SysWOW64\pftzkyq.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\nolzxwp.exeC:\Windows\system32\nolzxwp.exe 1160 "C:\Windows\SysWOW64\abukstr.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\vswnphs.exeC:\Windows\system32\vswnphs.exe 1156 "C:\Windows\SysWOW64\nolzxwp.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\kihvwrw.exeC:\Windows\system32\kihvwrw.exe 1164 "C:\Windows\SysWOW64\vswnphs.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\xvrkbvu.exeC:\Windows\system32\xvrkbvu.exe 1172 "C:\Windows\SysWOW64\kihvwrw.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\irsvjpv.exeC:\Windows\system32\irsvjpv.exe 1176 "C:\Windows\SysWOW64\xvrkbvu.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\vejkptc.exeC:\Windows\system32\vejkptc.exe 1168 "C:\Windows\SysWOW64\irsvjpv.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\iuenxba.exeC:\Windows\system32\iuenxba.exe 1180 "C:\Windows\SysWOW64\vejkptc.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\sqfgfwi.exeC:\Windows\system32\sqfgfwi.exe 1188 "C:\Windows\SysWOW64\iuenxba.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\foaiwwg.exeC:\Windows\system32\foaiwwg.exe 1204 "C:\Windows\SysWOW64\sqfgfwi.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\pnmggvn.exeC:\Windows\system32\pnmggvn.exe 1184 "C:\Windows\SysWOW64\foaiwwg.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\cavvmzm.exeC:\Windows\system32\cavvmzm.exe 1192 "C:\Windows\SysWOW64\pnmggvn.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\qnnlscl.exeC:\Windows\system32\qnnlscl.exe 1200 "C:\Windows\SysWOW64\cavvmzm.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\auricbs.exeC:\Windows\system32\auricbs.exe 1212 "C:\Windows\SysWOW64\qnnlscl.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\ktdouaa.exeC:\Windows\system32\ktdouaa.exe 1216 "C:\Windows\SysWOW64\auricbs.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\sffovyy.exeC:\Windows\system32\sffovyy.exe 1220 "C:\Windows\SysWOW64\ktdouaa.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\izcbfub.exeC:\Windows\system32\izcbfub.exe 1224 "C:\Windows\SysWOW64\sffovyy.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\syogpti.exeC:\Windows\system32\syogpti.exe 1208 "C:\Windows\SysWOW64\izcbfub.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\acrmhel.exeC:\Windows\system32\acrmhel.exe 1236 "C:\Windows\SysWOW64\syogpti.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\qdouinj.exeC:\Windows\system32\qdouinj.exe 1232 "C:\Windows\SysWOW64\acrmhel.exe"23⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\xhyhrym.exeC:\Windows\system32\xhyhrym.exe 1240 "C:\Windows\SysWOW64\qdouinj.exe"24⤵
- Executes dropped EXE
PID:3172 -
C:\Windows\SysWOW64\hgcekxt.exeC:\Windows\system32\hgcekxt.exe 1228 "C:\Windows\SysWOW64\xhyhrym.exe"25⤵
- Executes dropped EXE
PID:1560 -
C:\Windows\SysWOW64\vttuqas.exeC:\Windows\system32\vttuqas.exe 1244 "C:\Windows\SysWOW64\hgcekxt.exe"26⤵
- Executes dropped EXE
PID:552 -
C:\Windows\SysWOW64\iglsvwr.exeC:\Windows\system32\iglsvwr.exe 1252 "C:\Windows\SysWOW64\vttuqas.exe"27⤵
- Executes dropped EXE
PID:3496 -
C:\Windows\SysWOW64\snppgvy.exeC:\Windows\system32\snppgvy.exe 1044 "C:\Windows\SysWOW64\iglsvwr.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2300 -
C:\Windows\SysWOW64\agopukc.exeC:\Windows\system32\agopukc.exe 1120 "C:\Windows\SysWOW64\snppgvy.exe"29⤵
- Executes dropped EXE
PID:3812 -
C:\Windows\SysWOW64\ntgfagb.exeC:\Windows\system32\ntgfagb.exe 1264 "C:\Windows\SysWOW64\agopukc.exe"30⤵
- Executes dropped EXE
PID:3788 -
C:\Windows\SysWOW64\djrfhxf.exeC:\Windows\system32\djrfhxf.exe 1272 "C:\Windows\SysWOW64\ntgfagb.exe"31⤵
- Executes dropped EXE
PID:4180 -
C:\Windows\SysWOW64\nlgpual.exeC:\Windows\system32\nlgpual.exe 1048 "C:\Windows\SysWOW64\djrfhxf.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1348 -
C:\Windows\SysWOW64\umfpbhp.exeC:\Windows\system32\umfpbhp.exe 1052 "C:\Windows\SysWOW64\nlgpual.exe"33⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\hdisrpm.exeC:\Windows\system32\hdisrpm.exe 1280 "C:\Windows\SysWOW64\umfpbhp.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3256 -
C:\Windows\SysWOW64\agzsmeh.exeC:\Windows\system32\agzsmeh.exe 1284 "C:\Windows\SysWOW64\hdisrpm.exe"35⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\kcadtyq.exeC:\Windows\system32\kcadtyq.exe 1276 "C:\Windows\SysWOW64\agzsmeh.exe"36⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\uepnocw.exeC:\Windows\system32\uepnocw.exe 1288 "C:\Windows\SysWOW64\kcadtyq.exe"37⤵
- Executes dropped EXE
PID:4772 -
C:\Windows\SysWOW64\fxfttsy.exeC:\Windows\system32\fxfttsy.exe 1292 "C:\Windows\SysWOW64\uepnocw.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2560 -
C:\Windows\SysWOW64\skoizvx.exeC:\Windows\system32\skoizvx.exe 1300 "C:\Windows\SysWOW64\fxfttsy.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4508 -
C:\Windows\SysWOW64\firliwd.exeC:\Windows\system32\firliwd.exe 1128 "C:\Windows\SysWOW64\skoizvx.exe"40⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\peswxyd.exeC:\Windows\system32\peswxyd.exe 1304 "C:\Windows\SysWOW64\firliwd.exe"41⤵
- Executes dropped EXE
PID:4432 -
C:\Windows\SysWOW64\cunygyj.exeC:\Windows\system32\cunygyj.exe 1312 "C:\Windows\SysWOW64\peswxyd.exe"42⤵
- Executes dropped EXE
PID:4832 -
C:\Windows\SysWOW64\cyxlprm.exeC:\Windows\system32\cyxlprm.exe 1308 "C:\Windows\SysWOW64\cunygyj.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Windows\SysWOW64\sdxgtxi.exeC:\Windows\system32\sdxgtxi.exe 1320 "C:\Windows\SysWOW64\cyxlprm.exe"44⤵
- Executes dropped EXE
PID:2152 -
C:\Windows\SysWOW64\cnnrgap.exeC:\Windows\system32\cnnrgap.exe 1268 "C:\Windows\SysWOW64\sdxgtxi.exe"45⤵
- Executes dropped EXE
PID:940 -
C:\Windows\SysWOW64\pxttjzp.exeC:\Windows\system32\pxttjzp.exe 1324 "C:\Windows\SysWOW64\cnnrgap.exe"46⤵
- Executes dropped EXE
PID:1044 -
C:\Windows\SysWOW64\ffebqjs.exeC:\Windows\system32\ffebqjs.exe 1328 "C:\Windows\SysWOW64\pxttjzp.exe"47⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\ppcmlmz.exeC:\Windows\system32\ppcmlmz.exe 1332 "C:\Windows\SysWOW64\ffebqjs.exe"48⤵
- Executes dropped EXE
PID:1316 -
C:\Windows\SysWOW64\czapolz.exeC:\Windows\system32\czapolz.exe 1336 "C:\Windows\SysWOW64\ppcmlmz.exe"49⤵
- Executes dropped EXE
PID:3284 -
C:\Windows\SysWOW64\khwpbbi.exeC:\Windows\system32\khwpbbi.exe 1340 "C:\Windows\SysWOW64\czapolz.exe"50⤵
- Executes dropped EXE
PID:3328 -
C:\Windows\SysWOW64\alekfof.exeC:\Windows\system32\alekfof.exe 1348 "C:\Windows\SysWOW64\khwpbbi.exe"51⤵
- Executes dropped EXE
PID:3100 -
C:\Windows\SysWOW64\hpgpwzi.exeC:\Windows\system32\hpgpwzi.exe 1352 "C:\Windows\SysWOW64\alekfof.exe"52⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\ucyfcdg.exeC:\Windows\system32\ucyfcdg.exe 1356 "C:\Windows\SysWOW64\hpgpwzi.exe"53⤵
- Executes dropped EXE
PID:4080 -
C:\Windows\SysWOW64\hppcizf.exeC:\Windows\system32\hppcizf.exe 1248 "C:\Windows\SysWOW64\ucyfcdg.exe"54⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\raenvct.exeC:\Windows\system32\raenvct.exe 1360 "C:\Windows\SysWOW64\hppcizf.exe"55⤵
- Executes dropped EXE
PID:3540 -
C:\Windows\SysWOW64\fnocbgs.exeC:\Windows\system32\fnocbgs.exe 1368 "C:\Windows\SysWOW64\raenvct.exe"56⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\rdrfjoy.exeC:\Windows\system32\rdrfjoy.exe 1372 "C:\Windows\SysWOW64\fnocbgs.exe"57⤵
- Executes dropped EXE
PID:4172 -
C:\Windows\SysWOW64\csvytat.exeC:\Windows\system32\csvytat.exe 1380 "C:\Windows\SysWOW64\rdrfjoy.exe"58⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\SysWOW64\mulahdz.exeC:\Windows\system32\mulahdz.exe 1376 "C:\Windows\SysWOW64\csvytat.exe"59⤵
- Executes dropped EXE
PID:3564 -
C:\Windows\SysWOW64\xqlsoxa.exeC:\Windows\system32\xqlsoxa.exe 1384 "C:\Windows\SysWOW64\mulahdz.exe"60⤵
- Executes dropped EXE
PID:208 -
C:\Windows\SysWOW64\kdviubh.exeC:\Windows\system32\kdviubh.exe 1388 "C:\Windows\SysWOW64\xqlsoxa.exe"61⤵
- Executes dropped EXE
PID:640 -
C:\Windows\SysWOW64\xynyaxg.exeC:\Windows\system32\xynyaxg.exe 1364 "C:\Windows\SysWOW64\kdviubh.exe"62⤵
- Executes dropped EXE
PID:3752 -
C:\Windows\SysWOW64\klengbe.exeC:\Windows\system32\klengbe.exe 1396 "C:\Windows\SysWOW64\xynyaxg.exe"63⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\uotybel.exeC:\Windows\system32\uotybel.exe 1012 "C:\Windows\SysWOW64\klengbe.exe"64⤵
- Executes dropped EXE
PID:3968 -
C:\Windows\SysWOW64\hbdohij.exeC:\Windows\system32\hbdohij.exe 1400 "C:\Windows\SysWOW64\uotybel.exe"65⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\uzgqpip.exeC:\Windows\system32\uzgqpip.exe 1344 "C:\Windows\SysWOW64\hbdohij.exe"66⤵PID:1928
-
C:\Windows\SysWOW64\hjmbsip.exeC:\Windows\system32\hjmbsip.exe 1412 "C:\Windows\SysWOW64\uzgqpip.exe"67⤵PID:2336
-
C:\Windows\SysWOW64\rlclflv.exeC:\Windows\system32\rlclflv.exe 1416 "C:\Windows\SysWOW64\hjmbsip.exe"68⤵PID:3280
-
C:\Windows\SysWOW64\fylblou.exeC:\Windows\system32\fylblou.exe 1420 "C:\Windows\SysWOW64\rlclflv.exe"69⤵PID:4588
-
C:\Windows\SysWOW64\stdrrsb.exeC:\Windows\system32\stdrrsb.exe 1408 "C:\Windows\SysWOW64\fylblou.exe"70⤵PID:1948
-
C:\Windows\SysWOW64\fguhfoa.exeC:\Windows\system32\fguhfoa.exe 1428 "C:\Windows\SysWOW64\stdrrsb.exe"71⤵PID:232
-
C:\Windows\SysWOW64\pjkrsrg.exeC:\Windows\system32\pjkrsrg.exe 1392 "C:\Windows\SysWOW64\fguhfoa.exe"72⤵
- Drops file in System32 directory
PID:4212 -
C:\Windows\SysWOW64\cwthyvf.exeC:\Windows\system32\cwthyvf.exe 1432 "C:\Windows\SysWOW64\pjkrsrg.exe"73⤵
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\prleezd.exeC:\Windows\system32\prleezd.exe 1440 "C:\Windows\SysWOW64\cwthyvf.exe"74⤵
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\ceuujvk.exeC:\Windows\system32\ceuujvk.exe 1436 "C:\Windows\SysWOW64\prleezd.exe"75⤵
- Drops file in System32 directory
PID:1456 -
C:\Windows\SysWOW64\mgsefyr.exeC:\Windows\system32\mgsefyr.exe 1448 "C:\Windows\SysWOW64\ceuujvk.exe"76⤵PID:840
-
C:\Windows\SysWOW64\ztbukcp.exeC:\Windows\system32\ztbukcp.exe 1456 "C:\Windows\SysWOW64\mgsefyr.exe"77⤵PID:1016
-
C:\Windows\SysWOW64\jansvbx.exeC:\Windows\system32\jansvbx.exe 1444 "C:\Windows\SysWOW64\ztbukcp.exe"78⤵PID:3364
-
C:\Windows\SysWOW64\xnxhbew.exeC:\Windows\system32\xnxhbew.exe 1460 "C:\Windows\SysWOW64\jansvbx.exe"79⤵PID:3796
-
C:\Windows\SysWOW64\kaoxgiu.exeC:\Windows\system32\kaoxgiu.exe 1004 "C:\Windows\SysWOW64\xnxhbew.exe"80⤵
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\xngnmet.exeC:\Windows\system32\xngnmet.exe 1464 "C:\Windows\SysWOW64\kaoxgiu.exe"81⤵
- Drops file in System32 directory
PID:4984 -
C:\Windows\SysWOW64\hyvxzhi.exeC:\Windows\system32\hyvxzhi.exe 1476 "C:\Windows\SysWOW64\xngnmet.exe"82⤵PID:2676
-
C:\Windows\SysWOW64\ulfvnlg.exeC:\Windows\system32\ulfvnlg.exe 1468 "C:\Windows\SysWOW64\hyvxzhi.exe"83⤵
- Drops file in System32 directory
PID:4372 -
C:\Windows\SysWOW64\hywktpf.exeC:\Windows\system32\hywktpf.exe 1472 "C:\Windows\SysWOW64\ulfvnlg.exe"84⤵PID:2308
-
C:\Windows\SysWOW64\ulgazle.exeC:\Windows\system32\ulgazle.exe 1480 "C:\Windows\SysWOW64\hywktpf.exe"85⤵PID:4940
-
C:\Windows\SysWOW64\ewdlmos.exeC:\Windows\system32\ewdlmos.exe 1484 "C:\Windows\SysWOW64\ulgazle.exe"86⤵PID:4780
-
C:\Windows\SysWOW64\rjnassr.exeC:\Windows\system32\rjnassr.exe 1492 "C:\Windows\SysWOW64\ewdlmos.exe"87⤵
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Windows\SysWOW64\xweqyvq.exeC:\Windows\system32\xweqyvq.exe 1496 "C:\Windows\SysWOW64\rjnassr.exe"88⤵PID:2448
-
C:\Windows\SysWOW64\kjogdzo.exeC:\Windows\system32\kjogdzo.exe 1500 "C:\Windows\SysWOW64\xweqyvq.exe"89⤵PID:3924
-
C:\Windows\SysWOW64\utlqzcd.exeC:\Windows\system32\utlqzcd.exe 1488 "C:\Windows\SysWOW64\kjogdzo.exe"90⤵PID:1748
-
C:\Windows\SysWOW64\hgvgeyc.exeC:\Windows\system32\hgvgeyc.exe 1508 "C:\Windows\SysWOW64\utlqzcd.exe"91⤵PID:4992
-
C:\Windows\SysWOW64\utmekca.exeC:\Windows\system32\utmekca.exe 1504 "C:\Windows\SysWOW64\hgvgeyc.exe"92⤵PID:3624
-
C:\Windows\SysWOW64\hgwtqgz.exeC:\Windows\system32\hgwtqgz.exe 1512 "C:\Windows\SysWOW64\utmekca.exe"93⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Windows\SysWOW64\rrtedjf.exeC:\Windows\system32\rrtedjf.exe 1520 "C:\Windows\SysWOW64\hgwtqgz.exe"94⤵PID:4836
-
C:\Windows\SysWOW64\eedtjfm.exeC:\Windows\system32\eedtjfm.exe 1524 "C:\Windows\SysWOW64\rrtedjf.exe"95⤵PID:832
-
C:\Windows\SysWOW64\rrujpjl.exeC:\Windows\system32\rrujpjl.exe 1516 "C:\Windows\SysWOW64\eedtjfm.exe"96⤵PID:3176
-
C:\Windows\SysWOW64\eeezvnk.exeC:\Windows\system32\eeezvnk.exe 1532 "C:\Windows\SysWOW64\rrujpjl.exe"97⤵PID:2464
-
C:\Windows\SysWOW64\oobjqqq.exeC:\Windows\system32\oobjqqq.exe 1536 "C:\Windows\SysWOW64\eeezvnk.exe"98⤵PID:2188
-
C:\Windows\SysWOW64\cblzwux.exeC:\Windows\system32\cblzwux.exe 1540 "C:\Windows\SysWOW64\oobjqqq.exe"99⤵PID:4360
-
C:\Windows\SysWOW64\pocpbpw.exeC:\Windows\system32\pocpbpw.exe 1528 "C:\Windows\SysWOW64\cblzwux.exe"100⤵PID:2852
-
C:\Windows\SysWOW64\zohumov.exeC:\Windows\system32\zohumov.exe 1544 "C:\Windows\SysWOW64\pocpbpw.exe"101⤵PID:3644
-
C:\Windows\SysWOW64\mmjxuwb.exeC:\Windows\system32\mmjxuwb.exe 1548 "C:\Windows\SysWOW64\zohumov.exe"102⤵PID:3628
-
C:\Windows\SysWOW64\cnyfwfz.exeC:\Windows\system32\cnyfwfz.exe 1424 "C:\Windows\SysWOW64\mmjxuwb.exe"103⤵PID:2128
-
C:\Windows\SysWOW64\mmlcgwg.exeC:\Windows\system32\mmlcgwg.exe 1556 "C:\Windows\SysWOW64\cnyfwfz.exe"104⤵PID:2644
-
C:\Windows\SysWOW64\zzusuaf.exeC:\Windows\system32\zzusuaf.exe 1564 "C:\Windows\SysWOW64\mmlcgwg.exe"105⤵PID:4444
-
C:\Windows\SysWOW64\jcrchdl.exeC:\Windows\system32\jcrchdl.exe 1560 "C:\Windows\SysWOW64\zzusuaf.exe"106⤵PID:824
-
C:\Windows\SysWOW64\wxbsnhk.exeC:\Windows\system32\wxbsnhk.exe 1568 "C:\Windows\SysWOW64\jcrchdl.exe"107⤵
- System Location Discovery: System Language Discovery
PID:4768 -
C:\Windows\SysWOW64\jnwvwpq.exeC:\Windows\system32\jnwvwpq.exe 1452 "C:\Windows\SysWOW64\wxbsnhk.exe"108⤵PID:3044
-
C:\Windows\SysWOW64\xxcfyhq.exeC:\Windows\system32\xxcfyhq.exe 1316 "C:\Windows\SysWOW64\jnwvwpq.exe"109⤵PID:3392
-
C:\Windows\SysWOW64\hzrimkw.exeC:\Windows\system32\hzrimkw.exe 1584 "C:\Windows\SysWOW64\xxcfyhq.exe"110⤵PID:5100
-
C:\Windows\SysWOW64\uujfanv.exeC:\Windows\system32\uujfanv.exe 1580 "C:\Windows\SysWOW64\hzrimkw.exe"111⤵PID:1296
-
C:\Windows\SysWOW64\hhbvfrt.exeC:\Windows\system32\hhbvfrt.exe 1604 "C:\Windows\SysWOW64\uujfanv.exe"112⤵PID:4616
-
C:\Windows\SysWOW64\uukllva.exeC:\Windows\system32\uukllva.exe 1588 "C:\Windows\SysWOW64\hhbvfrt.exe"113⤵PID:2052
-
C:\Windows\SysWOW64\exavyqh.exeC:\Windows\system32\exavyqh.exe 1404 "C:\Windows\SysWOW64\uukllva.exe"114⤵PID:4504
-
C:\Windows\SysWOW64\rsrleuf.exeC:\Windows\system32\rsrleuf.exe 1596 "C:\Windows\SysWOW64\exavyqh.exe"115⤵PID:3792
-
C:\Windows\SysWOW64\efjbkye.exeC:\Windows\system32\efjbkye.exe 1608 "C:\Windows\SysWOW64\rsrleuf.exe"116⤵PID:1260
-
C:\Windows\SysWOW64\rssqqcd.exeC:\Windows\system32\rssqqcd.exe 1612 "C:\Windows\SysWOW64\efjbkye.exe"117⤵
- System Location Discovery: System Language Discovery
PID:4572 -
C:\Windows\SysWOW64\buiblfr.exeC:\Windows\system32\buiblfr.exe 1616 "C:\Windows\SysWOW64\rssqqcd.exe"118⤵PID:2148
-
C:\Windows\SysWOW64\opzyrbq.exeC:\Windows\system32\opzyrbq.exe 1620 "C:\Windows\SysWOW64\buiblfr.exe"119⤵PID:3448
-
C:\Windows\SysWOW64\ccroxfp.exeC:\Windows\system32\ccroxfp.exe 1636 "C:\Windows\SysWOW64\opzyrbq.exe"120⤵PID:4076
-
C:\Windows\SysWOW64\ppaecin.exeC:\Windows\system32\ppaecin.exe 1600 "C:\Windows\SysWOW64\ccroxfp.exe"121⤵PID:3500
-
C:\Windows\SysWOW64\zsqoqmc.exeC:\Windows\system32\zsqoqmc.exe 1624 "C:\Windows\SysWOW64\ppaecin.exe"122⤵PID:2264
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-