Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 12:48
Static task
static1
Behavioral task
behavioral1
Sample
9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe
-
Size
246KB
-
MD5
9629fc742fc460b730eca4b26603970f
-
SHA1
b0ecfb60ff6c0f14faa88c4e7908e455a9c5e8c5
-
SHA256
a4f0fd25463e6899145939949e29f73fd8bc914a69304c3e032bbb15df895a49
-
SHA512
550bbba94b0d4ee9250b8aaba0d48e35c2aa946a6eaaba25569babce8370e39760fe4b93d8180eec835c3690be7c8a31e7bd6b21da5478b707c4d6b4f1630349
-
SSDEEP
6144:d/H+8pmvtzHm48oilMAOSf0XFdkzR9CnPYltB:dv+Ym1Y0AOSfaeR0nwfB
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 1684 zlhmlal.exe 468 jktrdys.exe 4908 tcjpipu.exe 2784 bkwpuew.exe 2044 oxnfaid.exe 4896 gibxifd.exe 2192 oxpkuia.exe 2176 bwjncqg.exe 4164 qsrnpih.exe 1908 ecyxshh.exe 748 jstaaqm.exe 880 oubvrns.exe 3528 dnxisjv.exe 1320 tdrqzsy.exe 2952 dcvnrry.exe 3516 ldunyyc.exe 1984 dcwtdrd.exe 1112 rxoqjvc.exe 4104 vchqceh.exe 3524 onvrcch.exe 3324 bwttfbh.exe 4572 oyhjqgl.exe 3292 twereht.exe 580 lkdwois.exe 944 wcsctyu.exe 1932 lsebaqx.exe 3220 tldchxt.exe 4816 gnjrajg.exe 5064 teeujjd.exe 4844 dzeeqem.exe 2632 tmfzurj.exe 1628 dhgscmj.exe 5092 nkvcxpq.exe 2060 dodxtuv.exe 4876 qqjfegz.exe 4048 amkxuba.exe 2708 qqksygw.exe 1468 bmldgbx.exe 840 ltpaqzf.exe 3232 yjsdzik.exe 3456 ltqochk.exe 1952 ygidhdj.exe 1032 ledgylh.exe 1744 vhaqlov.exe 2516 fctbtjw.exe 3980 ygsbvxq.exe 3060 jclmdsr.exe 836 vwrboee.exe 1396 grsmeze.exe 2544 tbywhye.exe 4536 gztzpyc.exe 2248 qcqbdbq.exe 1808 ayjukwr.exe 2036 tbiumsm.exe 4628 ajvmhiv.exe 2216 qoehdns.exe 876 snifvma.exe 4808 gazubqy.exe 2508 qheslpg.exe 3848 fppasyb.exe 4224 qhffxod.exe 1480 djlnibi.exe 4208 qwclofg.exe 2928 djuauin.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qlxvesi.exe dqoyyoj.exe File created C:\Windows\SysWOW64\vukywpy.exe ihtiqlz.exe File created C:\Windows\SysWOW64\dyekvid.exe qlmmpef.exe File opened for modification C:\Windows\SysWOW64\sjbzmxn.exe fojbgtg.exe File created C:\Windows\SysWOW64\xhhicvm.exe-up.txt xhhicvm.exe File created C:\Windows\SysWOW64\yuehlfd.exe-up.txt yuehlfd.exe File opened for modification C:\Windows\SysWOW64\szwsxon.exe fmecjko.exe File created C:\Windows\SysWOW64\djuauin.exe-up.txt djuauin.exe File opened for modification C:\Windows\SysWOW64\mqxucil.exe zdffxee.exe File opened for modification C:\Windows\SysWOW64\yszpaqc.exe txqzumd.exe File created C:\Windows\SysWOW64\krsmjwi.exe xbxjaod.exe File created C:\Windows\SysWOW64\clnmubj.exe-up.txt clnmubj.exe File opened for modification C:\Windows\SysWOW64\qwclofg.exe djlnibi.exe File created C:\Windows\SysWOW64\ajzuxob.exe qhkkclv.exe File created C:\Windows\SysWOW64\higmrwp.exe unpwltq.exe File created C:\Windows\SysWOW64\qkmqruu.exe-up.txt qkmqruu.exe File created C:\Windows\SysWOW64\mumyvic.exe zzuapee.exe File created C:\Windows\SysWOW64\wxcnuko.exe-up.txt wxcnuko.exe File created C:\Windows\SysWOW64\nkvcxpq.exe dhgscmj.exe File created C:\Windows\SysWOW64\hsimekd.exe uxzwzgf.exe File created C:\Windows\SysWOW64\hrcnsfi.exe-up.txt hrcnsfi.exe File created C:\Windows\SysWOW64\zzwfeup.exe memhyqi.exe File created C:\Windows\SysWOW64\bdmlxhg.exe reiofjy.exe File created C:\Windows\SysWOW64\aywyejd.exe qvhnrgw.exe File created C:\Windows\SysWOW64\rjwwhdv.exe-up.txt rjwwhdv.exe File opened for modification C:\Windows\SysWOW64\tqrhlmy.exe fdasxis.exe File opened for modification C:\Windows\SysWOW64\vmqbabu.exe irhdufv.exe File opened for modification C:\Windows\SysWOW64\hyvxzhi.exe xrjapia.exe File opened for modification C:\Windows\SysWOW64\wijzbny.exe jvrjvka.exe File opened for modification C:\Windows\SysWOW64\zzwfeup.exe memhyqi.exe File created C:\Windows\SysWOW64\mdgaxxq.exe zqpkscs.exe File opened for modification C:\Windows\SysWOW64\fdasxis.exe wslhkfl.exe File created C:\Windows\SysWOW64\bdmlxhg.exe-up.txt bdmlxhg.exe File created C:\Windows\SysWOW64\gtzfduj.exe tgqhyqk.exe File opened for modification C:\Windows\SysWOW64\pfvpkwp.exe csmzesq.exe File created C:\Windows\SysWOW64\egftvnf.exe-up.txt egftvnf.exe File created C:\Windows\SysWOW64\bwxzsyy.exe-up.txt bwxzsyy.exe File created C:\Windows\SysWOW64\daixkpc.exe tqtnwlw.exe File created C:\Windows\SysWOW64\xpinnvr.exe kuzxizk.exe File created C:\Windows\SysWOW64\wankblo.exe-up.txt wankblo.exe File created C:\Windows\SysWOW64\wqhcmxn.exe jvynhbo.exe File opened for modification C:\Windows\SysWOW64\lhtwwqd.exe ymbgqvw.exe File created C:\Windows\SysWOW64\hsimekd.exe-up.txt hsimekd.exe File created C:\Windows\SysWOW64\akjbsno.exe qlxezwp.exe File created C:\Windows\SysWOW64\qvyqbkx.exe gljgohr.exe File opened for modification C:\Windows\SysWOW64\oyhjqgl.exe bwttfbh.exe File created C:\Windows\SysWOW64\ltpaqzf.exe bmldgbx.exe File created C:\Windows\SysWOW64\yplbiga.exe-up.txt yplbiga.exe File created C:\Windows\SysWOW64\mzbfplz.exe hiycgct.exe File created C:\Windows\SysWOW64\xstgjpn.exe-up.txt xstgjpn.exe File opened for modification C:\Windows\SysWOW64\ahuviyb.exe qwflndv.exe File created C:\Windows\SysWOW64\dyfpgpb.exe-up.txt dyfpgpb.exe File created C:\Windows\SysWOW64\obewxrv.exe eypljoh.exe File created C:\Windows\SysWOW64\qrpbyio.exe-up.txt qrpbyio.exe File created C:\Windows\SysWOW64\dyootsi.exe bzcqjti.exe File created C:\Windows\SysWOW64\qlwzamc.exe-up.txt qlwzamc.exe File created C:\Windows\SysWOW64\kkygfqe.exe fphqzmg.exe File opened for modification C:\Windows\SysWOW64\calijjk.exe pncsvfl.exe File opened for modification C:\Windows\SysWOW64\qmdlahh.exe dwairzb.exe File created C:\Windows\SysWOW64\fmecjko.exe-up.txt fmecjko.exe File opened for modification C:\Windows\SysWOW64\bmtgkad.exe ozbqewe.exe File opened for modification C:\Windows\SysWOW64\yfijplz.exe ksytkha.exe File created C:\Windows\SysWOW64\mfrazoh.exe-up.txt mfrazoh.exe File created C:\Windows\SysWOW64\hgxyasj.exe-up.txt hgxyasj.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgrvjyi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gazubqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ahyiwas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bgutzjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnanpxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pozzwyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzwfeup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhfblui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxyddoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iobpdgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skcmtaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngohzhy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ghnfpqf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdasxis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iparvct.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sarhufx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzcqjti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qsrnpih.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dodxtuv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmuzlqz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmtgkad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrnknqn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dzcrvbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfbbifg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language orfonyp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ygidhdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjbzmxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fmcykab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qdwiskk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxcnuko.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnrjuwe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkigjuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdojism.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdrwsiv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eggygnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language prgtzxm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fojbgtg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxbnxjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdinhos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fngefyx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wankblo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bpzrxlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qodkurt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcjbizm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxjwjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcgfnvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iowpfed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ismwvdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language higmrwp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrujpjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oopyika.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idkwqaz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qbrsmdc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dzeeqem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkkyirn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igwhjax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gdfazon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unqjwfb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eoohlex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvyqbkx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbiumsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djlnibi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kuejqwj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jevuhmo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1684 2012 9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe 84 PID 2012 wrote to memory of 1684 2012 9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe 84 PID 2012 wrote to memory of 1684 2012 9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe 84 PID 1684 wrote to memory of 468 1684 zlhmlal.exe 85 PID 1684 wrote to memory of 468 1684 zlhmlal.exe 85 PID 1684 wrote to memory of 468 1684 zlhmlal.exe 85 PID 468 wrote to memory of 4908 468 jktrdys.exe 87 PID 468 wrote to memory of 4908 468 jktrdys.exe 87 PID 468 wrote to memory of 4908 468 jktrdys.exe 87 PID 4908 wrote to memory of 2784 4908 tcjpipu.exe 90 PID 4908 wrote to memory of 2784 4908 tcjpipu.exe 90 PID 4908 wrote to memory of 2784 4908 tcjpipu.exe 90 PID 2784 wrote to memory of 2044 2784 bkwpuew.exe 91 PID 2784 wrote to memory of 2044 2784 bkwpuew.exe 91 PID 2784 wrote to memory of 2044 2784 bkwpuew.exe 91 PID 2044 wrote to memory of 4896 2044 oxnfaid.exe 92 PID 2044 wrote to memory of 4896 2044 oxnfaid.exe 92 PID 2044 wrote to memory of 4896 2044 oxnfaid.exe 92 PID 4896 wrote to memory of 2192 4896 gibxifd.exe 93 PID 4896 wrote to memory of 2192 4896 gibxifd.exe 93 PID 4896 wrote to memory of 2192 4896 gibxifd.exe 93 PID 2192 wrote to memory of 2176 2192 oxpkuia.exe 94 PID 2192 wrote to memory of 2176 2192 oxpkuia.exe 94 PID 2192 wrote to memory of 2176 2192 oxpkuia.exe 94 PID 2176 wrote to memory of 4164 2176 bwjncqg.exe 95 PID 2176 wrote to memory of 4164 2176 bwjncqg.exe 95 PID 2176 wrote to memory of 4164 2176 bwjncqg.exe 95 PID 4164 wrote to memory of 1908 4164 qsrnpih.exe 96 PID 4164 wrote to memory of 1908 4164 qsrnpih.exe 96 PID 4164 wrote to memory of 1908 4164 qsrnpih.exe 96 PID 1908 wrote to memory of 748 1908 ecyxshh.exe 97 PID 1908 wrote to memory of 748 1908 ecyxshh.exe 97 PID 1908 wrote to memory of 748 1908 ecyxshh.exe 97 PID 748 wrote to memory of 880 748 jstaaqm.exe 98 PID 748 wrote to memory of 880 748 jstaaqm.exe 98 PID 748 wrote to memory of 880 748 jstaaqm.exe 98 PID 880 wrote to memory of 3528 880 oubvrns.exe 99 PID 880 wrote to memory of 3528 880 oubvrns.exe 99 PID 880 wrote to memory of 3528 880 oubvrns.exe 99 PID 3528 wrote to memory of 1320 3528 dnxisjv.exe 100 PID 3528 wrote to memory of 1320 3528 dnxisjv.exe 100 PID 3528 wrote to memory of 1320 3528 dnxisjv.exe 100 PID 1320 wrote to memory of 2952 1320 tdrqzsy.exe 101 PID 1320 wrote to memory of 2952 1320 tdrqzsy.exe 101 PID 1320 wrote to memory of 2952 1320 tdrqzsy.exe 101 PID 2952 wrote to memory of 3516 2952 dcvnrry.exe 102 PID 2952 wrote to memory of 3516 2952 dcvnrry.exe 102 PID 2952 wrote to memory of 3516 2952 dcvnrry.exe 102 PID 3516 wrote to memory of 1984 3516 ldunyyc.exe 103 PID 3516 wrote to memory of 1984 3516 ldunyyc.exe 103 PID 3516 wrote to memory of 1984 3516 ldunyyc.exe 103 PID 1984 wrote to memory of 1112 1984 dcwtdrd.exe 106 PID 1984 wrote to memory of 1112 1984 dcwtdrd.exe 106 PID 1984 wrote to memory of 1112 1984 dcwtdrd.exe 106 PID 1112 wrote to memory of 4104 1112 rxoqjvc.exe 107 PID 1112 wrote to memory of 4104 1112 rxoqjvc.exe 107 PID 1112 wrote to memory of 4104 1112 rxoqjvc.exe 107 PID 4104 wrote to memory of 3524 4104 vchqceh.exe 108 PID 4104 wrote to memory of 3524 4104 vchqceh.exe 108 PID 4104 wrote to memory of 3524 4104 vchqceh.exe 108 PID 3524 wrote to memory of 3324 3524 onvrcch.exe 109 PID 3524 wrote to memory of 3324 3524 onvrcch.exe 109 PID 3524 wrote to memory of 3324 3524 onvrcch.exe 109 PID 3324 wrote to memory of 4572 3324 bwttfbh.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\zlhmlal.exeC:\Windows\system32\zlhmlal.exe 1168 "C:\Users\Admin\AppData\Local\Temp\9629fc742fc460b730eca4b26603970f_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\jktrdys.exeC:\Windows\system32\jktrdys.exe 1172 "C:\Windows\SysWOW64\zlhmlal.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\tcjpipu.exeC:\Windows\system32\tcjpipu.exe 1176 "C:\Windows\SysWOW64\jktrdys.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\bkwpuew.exeC:\Windows\system32\bkwpuew.exe 1164 "C:\Windows\SysWOW64\tcjpipu.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\oxnfaid.exeC:\Windows\system32\oxnfaid.exe 1184 "C:\Windows\SysWOW64\bkwpuew.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\gibxifd.exeC:\Windows\system32\gibxifd.exe 1188 "C:\Windows\SysWOW64\oxnfaid.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\oxpkuia.exeC:\Windows\system32\oxpkuia.exe 1192 "C:\Windows\SysWOW64\gibxifd.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\bwjncqg.exeC:\Windows\system32\bwjncqg.exe 1180 "C:\Windows\SysWOW64\oxpkuia.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\qsrnpih.exeC:\Windows\system32\qsrnpih.exe 1072 "C:\Windows\SysWOW64\bwjncqg.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\ecyxshh.exeC:\Windows\system32\ecyxshh.exe 1204 "C:\Windows\SysWOW64\qsrnpih.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\jstaaqm.exeC:\Windows\system32\jstaaqm.exe 1200 "C:\Windows\SysWOW64\ecyxshh.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\oubvrns.exeC:\Windows\system32\oubvrns.exe 1212 "C:\Windows\SysWOW64\jstaaqm.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\dnxisjv.exeC:\Windows\system32\dnxisjv.exe 1208 "C:\Windows\SysWOW64\oubvrns.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\tdrqzsy.exeC:\Windows\system32\tdrqzsy.exe 1216 "C:\Windows\SysWOW64\dnxisjv.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\dcvnrry.exeC:\Windows\system32\dcvnrry.exe 1224 "C:\Windows\SysWOW64\tdrqzsy.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\ldunyyc.exeC:\Windows\system32\ldunyyc.exe 1228 "C:\Windows\SysWOW64\dcvnrry.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\dcwtdrd.exeC:\Windows\system32\dcwtdrd.exe 1220 "C:\Windows\SysWOW64\ldunyyc.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\rxoqjvc.exeC:\Windows\system32\rxoqjvc.exe 1232 "C:\Windows\SysWOW64\dcwtdrd.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\vchqceh.exeC:\Windows\system32\vchqceh.exe 1240 "C:\Windows\SysWOW64\rxoqjvc.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\onvrcch.exeC:\Windows\system32\onvrcch.exe 1244 "C:\Windows\SysWOW64\vchqceh.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\bwttfbh.exeC:\Windows\system32\bwttfbh.exe 1236 "C:\Windows\SysWOW64\onvrcch.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\oyhjqgl.exeC:\Windows\system32\oyhjqgl.exe 1252 "C:\Windows\SysWOW64\bwttfbh.exe"23⤵
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\twereht.exeC:\Windows\system32\twereht.exe 1140 "C:\Windows\SysWOW64\oyhjqgl.exe"24⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\SysWOW64\lkdwois.exeC:\Windows\system32\lkdwois.exe 1260 "C:\Windows\SysWOW64\twereht.exe"25⤵
- Executes dropped EXE
PID:580 -
C:\Windows\SysWOW64\wcsctyu.exeC:\Windows\system32\wcsctyu.exe 1264 "C:\Windows\SysWOW64\lkdwois.exe"26⤵
- Executes dropped EXE
PID:944 -
C:\Windows\SysWOW64\lsebaqx.exeC:\Windows\system32\lsebaqx.exe 1256 "C:\Windows\SysWOW64\wcsctyu.exe"27⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\tldchxt.exeC:\Windows\system32\tldchxt.exe 1272 "C:\Windows\SysWOW64\lsebaqx.exe"28⤵
- Executes dropped EXE
PID:3220 -
C:\Windows\SysWOW64\gnjrajg.exeC:\Windows\system32\gnjrajg.exe 1268 "C:\Windows\SysWOW64\tldchxt.exe"29⤵
- Executes dropped EXE
PID:4816 -
C:\Windows\SysWOW64\teeujjd.exeC:\Windows\system32\teeujjd.exe 1284 "C:\Windows\SysWOW64\gnjrajg.exe"30⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\SysWOW64\dzeeqem.exeC:\Windows\system32\dzeeqem.exe 1276 "C:\Windows\SysWOW64\teeujjd.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4844 -
C:\Windows\SysWOW64\tmfzurj.exeC:\Windows\system32\tmfzurj.exe 1280 "C:\Windows\SysWOW64\dzeeqem.exe"32⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\dhgscmj.exeC:\Windows\system32\dhgscmj.exe 1288 "C:\Windows\SysWOW64\tmfzurj.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1628 -
C:\Windows\SysWOW64\nkvcxpq.exeC:\Windows\system32\nkvcxpq.exe 1292 "C:\Windows\SysWOW64\dhgscmj.exe"34⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\dodxtuv.exeC:\Windows\system32\dodxtuv.exe 1312 "C:\Windows\SysWOW64\nkvcxpq.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Windows\SysWOW64\qqjfegz.exeC:\Windows\system32\qqjfegz.exe 1304 "C:\Windows\SysWOW64\dodxtuv.exe"36⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\SysWOW64\amkxuba.exeC:\Windows\system32\amkxuba.exe 1296 "C:\Windows\SysWOW64\qqjfegz.exe"37⤵
- Executes dropped EXE
PID:4048 -
C:\Windows\SysWOW64\qqksygw.exeC:\Windows\system32\qqksygw.exe 1316 "C:\Windows\SysWOW64\amkxuba.exe"38⤵
- Executes dropped EXE
PID:2708 -
C:\Windows\SysWOW64\bmldgbx.exeC:\Windows\system32\bmldgbx.exe 1136 "C:\Windows\SysWOW64\qqksygw.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\ltpaqzf.exeC:\Windows\system32\ltpaqzf.exe 1308 "C:\Windows\SysWOW64\bmldgbx.exe"40⤵
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\yjsdzik.exeC:\Windows\system32\yjsdzik.exe 1324 "C:\Windows\SysWOW64\ltpaqzf.exe"41⤵
- Executes dropped EXE
PID:3232 -
C:\Windows\SysWOW64\ltqochk.exeC:\Windows\system32\ltqochk.exe 1328 "C:\Windows\SysWOW64\yjsdzik.exe"42⤵
- Executes dropped EXE
PID:3456 -
C:\Windows\SysWOW64\ygidhdj.exeC:\Windows\system32\ygidhdj.exe 1320 "C:\Windows\SysWOW64\ltqochk.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\ledgylh.exeC:\Windows\system32\ledgylh.exe 1336 "C:\Windows\SysWOW64\ygidhdj.exe"44⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\SysWOW64\vhaqlov.exeC:\Windows\system32\vhaqlov.exe 1344 "C:\Windows\SysWOW64\ledgylh.exe"45⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\fctbtjw.exeC:\Windows\system32\fctbtjw.exe 1332 "C:\Windows\SysWOW64\vhaqlov.exe"46⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\ygsbvxq.exeC:\Windows\system32\ygsbvxq.exe 1352 "C:\Windows\SysWOW64\fctbtjw.exe"47⤵
- Executes dropped EXE
PID:3980 -
C:\Windows\SysWOW64\jclmdsr.exeC:\Windows\system32\jclmdsr.exe 1356 "C:\Windows\SysWOW64\ygsbvxq.exe"48⤵
- Executes dropped EXE
PID:3060 -
C:\Windows\SysWOW64\vwrboee.exeC:\Windows\system32\vwrboee.exe 1340 "C:\Windows\SysWOW64\jclmdsr.exe"49⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\grsmeze.exeC:\Windows\system32\grsmeze.exe 1360 "C:\Windows\SysWOW64\vwrboee.exe"50⤵
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\tbywhye.exeC:\Windows\system32\tbywhye.exe 1368 "C:\Windows\SysWOW64\grsmeze.exe"51⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\gztzpyc.exeC:\Windows\system32\gztzpyc.exe 1348 "C:\Windows\SysWOW64\tbywhye.exe"52⤵
- Executes dropped EXE
PID:4536 -
C:\Windows\SysWOW64\qcqbdbq.exeC:\Windows\system32\qcqbdbq.exe 1372 "C:\Windows\SysWOW64\gztzpyc.exe"53⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\ayjukwr.exeC:\Windows\system32\ayjukwr.exe 1364 "C:\Windows\SysWOW64\qcqbdbq.exe"54⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\tbiumsm.exeC:\Windows\system32\tbiumsm.exe 1392 "C:\Windows\SysWOW64\ayjukwr.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\SysWOW64\ajvmhiv.exeC:\Windows\system32\ajvmhiv.exe 1376 "C:\Windows\SysWOW64\tbiumsm.exe"56⤵
- Executes dropped EXE
PID:4628 -
C:\Windows\SysWOW64\qoehdns.exeC:\Windows\system32\qoehdns.exe 1380 "C:\Windows\SysWOW64\ajvmhiv.exe"57⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\snifvma.exeC:\Windows\system32\snifvma.exe 1384 "C:\Windows\SysWOW64\qoehdns.exe"58⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\gazubqy.exeC:\Windows\system32\gazubqy.exe 1400 "C:\Windows\SysWOW64\snifvma.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Windows\SysWOW64\qheslpg.exeC:\Windows\system32\qheslpg.exe 1388 "C:\Windows\SysWOW64\gazubqy.exe"60⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\fppasyb.exeC:\Windows\system32\fppasyb.exe 1152 "C:\Windows\SysWOW64\qheslpg.exe"61⤵
- Executes dropped EXE
PID:3848 -
C:\Windows\SysWOW64\qhffxod.exeC:\Windows\system32\qhffxod.exe 1404 "C:\Windows\SysWOW64\fppasyb.exe"62⤵
- Executes dropped EXE
PID:4224 -
C:\Windows\SysWOW64\djlnibi.exeC:\Windows\system32\djlnibi.exe 1148 "C:\Windows\SysWOW64\qhffxod.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\qwclofg.exeC:\Windows\system32\qwclofg.exe 1416 "C:\Windows\SysWOW64\djlnibi.exe"64⤵
- Executes dropped EXE
PID:4208 -
C:\Windows\SysWOW64\djuauin.exeC:\Windows\system32\djuauin.exe 1412 "C:\Windows\SysWOW64\qwclofg.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2928 -
C:\Windows\SysWOW64\qwdqiem.exeC:\Windows\system32\qwdqiem.exe 1420 "C:\Windows\SysWOW64\djuauin.exe"66⤵PID:1092
-
C:\Windows\SysWOW64\dmgtqms.exeC:\Windows\system32\dmgtqms.exe 1424 "C:\Windows\SysWOW64\qwdqiem.exe"67⤵PID:4516
-
C:\Windows\SysWOW64\nizdyhs.exeC:\Windows\system32\nizdyhs.exe 1428 "C:\Windows\SysWOW64\dmgtqms.exe"68⤵PID:3708
-
C:\Windows\SysWOW64\yplbiga.exeC:\Windows\system32\yplbiga.exe 1432 "C:\Windows\SysWOW64\nizdyhs.exe"69⤵
- Drops file in System32 directory
PID:5084 -
C:\Windows\SysWOW64\lcvyokz.exeC:\Windows\system32\lcvyokz.exe 1156 "C:\Windows\SysWOW64\yplbiga.exe"70⤵PID:3840
-
C:\Windows\SysWOW64\xebghod.exeC:\Windows\system32\xebghod.exe 1440 "C:\Windows\SysWOW64\lcvyokz.exe"71⤵PID:2988
-
C:\Windows\SysWOW64\kuejqwj.exeC:\Windows\system32\kuejqwj.exe 1448 "C:\Windows\SysWOW64\xebghod.exe"72⤵
- System Location Discovery: System Language Discovery
PID:3208 -
C:\Windows\SysWOW64\yekttwb.exeC:\Windows\system32\yekttwb.exe 1444 "C:\Windows\SysWOW64\kuejqwj.exe"73⤵PID:4904
-
C:\Windows\SysWOW64\lufwcwg.exeC:\Windows\system32\lufwcwg.exe 1456 "C:\Windows\SysWOW64\yekttwb.exe"74⤵PID:4612
-
C:\Windows\SysWOW64\yhomhaf.exeC:\Windows\system32\yhomhaf.exe 1460 "C:\Windows\SysWOW64\lufwcwg.exe"75⤵PID:4412
-
C:\Windows\SysWOW64\ismwvdt.exeC:\Windows\system32\ismwvdt.exe 1464 "C:\Windows\SysWOW64\yhomhaf.exe"76⤵
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\vfvmahs.exeC:\Windows\system32\vfvmahs.exe 1468 "C:\Windows\SysWOW64\ismwvdt.exe"77⤵PID:2184
-
C:\Windows\SysWOW64\iobpdgs.exeC:\Windows\system32\iobpdgs.exe 1472 "C:\Windows\SysWOW64\vfvmahs.exe"78⤵
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Windows\SysWOW64\vfwrmgp.exeC:\Windows\system32\vfwrmgp.exe 1476 "C:\Windows\SysWOW64\iobpdgs.exe"79⤵PID:3264
-
C:\Windows\SysWOW64\fmipefx.exeC:\Windows\system32\fmipefx.exe 1452 "C:\Windows\SysWOW64\vfwrmgp.exe"80⤵PID:2468
-
C:\Windows\SysWOW64\qlmmpef.exeC:\Windows\system32\qlmmpef.exe 1484 "C:\Windows\SysWOW64\fmipefx.exe"81⤵
- Drops file in System32 directory
PID:3656 -
C:\Windows\SysWOW64\dyekvid.exeC:\Windows\system32\dyekvid.exe 1488 "C:\Windows\SysWOW64\qlmmpef.exe"82⤵PID:4436
-
C:\Windows\SysWOW64\qlwzamc.exeC:\Windows\system32\qlwzamc.exe 1480 "C:\Windows\SysWOW64\dyekvid.exe"83⤵
- Drops file in System32 directory
PID:1956 -
C:\Windows\SysWOW64\dyfpgpb.exeC:\Windows\system32\dyfpgpb.exe 1492 "C:\Windows\SysWOW64\qlwzamc.exe"84⤵
- Drops file in System32 directory
PID:4580 -
C:\Windows\SysWOW64\njuablp.exeC:\Windows\system32\njuablp.exe 1504 "C:\Windows\SysWOW64\dyfpgpb.exe"85⤵PID:4848
-
C:\Windows\SysWOW64\dkrivtf.exeC:\Windows\system32\dkrivtf.exe 1496 "C:\Windows\SysWOW64\njuablp.exe"86⤵PID:1020
-
C:\Windows\SysWOW64\nmhsqxt.exeC:\Windows\system32\nmhsqxt.exe 1500 "C:\Windows\SysWOW64\dkrivtf.exe"87⤵PID:3316
-
C:\Windows\SysWOW64\ahyiwas.exeC:\Windows\system32\ahyiwas.exe 1508 "C:\Windows\SysWOW64\nmhsqxt.exe"88⤵
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Windows\SysWOW64\nuixbwr.exeC:\Windows\system32\nuixbwr.exe 1516 "C:\Windows\SysWOW64\ahyiwas.exe"89⤵PID:1792
-
C:\Windows\SysWOW64\xtudmvz.exeC:\Windows\system32\xtudmvz.exe 1512 "C:\Windows\SysWOW64\nuixbwr.exe"90⤵PID:3672
-
C:\Windows\SysWOW64\kkpxudw.exeC:\Windows\system32\kkpxudw.exe 1528 "C:\Windows\SysWOW64\xtudmvz.exe"91⤵PID:3336
-
C:\Windows\SysWOW64\yfgvahd.exeC:\Windows\system32\yfgvahd.exe 1524 "C:\Windows\SysWOW64\kkpxudw.exe"92⤵PID:3648
-
C:\Windows\SysWOW64\lsqlglc.exeC:\Windows\system32\lsqlglc.exe 1520 "C:\Windows\SysWOW64\yfgvahd.exe"93⤵PID:368
-
C:\Windows\SysWOW64\yfibuha.exeC:\Windows\system32\yfibuha.exe 1536 "C:\Windows\SysWOW64\lsqlglc.exe"94⤵PID:784
-
C:\Windows\SysWOW64\iemyegi.exeC:\Windows\system32\iemyegi.exe 1540 "C:\Windows\SysWOW64\yfibuha.exe"95⤵PID:5076
-
C:\Windows\SysWOW64\vcobnoo.exeC:\Windows\system32\vcobnoo.exe 1544 "C:\Windows\SysWOW64\iemyegi.exe"96⤵PID:1664
-
C:\Windows\SysWOW64\ipyqtsm.exeC:\Windows\system32\ipyqtsm.exe 1532 "C:\Windows\SysWOW64\vcobnoo.exe"97⤵PID:2316
-
C:\Windows\SysWOW64\vcqgynl.exeC:\Windows\system32\vcqgynl.exe 1548 "C:\Windows\SysWOW64\ipyqtsm.exe"98⤵PID:2456
-
C:\Windows\SysWOW64\fffruqr.exeC:\Windows\system32\fffruqr.exe 1556 "C:\Windows\SysWOW64\vcqgynl.exe"99⤵PID:4960
-
C:\Windows\SysWOW64\tplbxqr.exeC:\Windows\system32\tplbxqr.exe 1436 "C:\Windows\SysWOW64\fffruqr.exe"100⤵PID:4828
-
C:\Windows\SysWOW64\fngefyx.exeC:\Windows\system32\fngefyx.exe 1196 "C:\Windows\SysWOW64\tplbxqr.exe"101⤵
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\tayulcw.exeC:\Windows\system32\tayulcw.exe 1568 "C:\Windows\SysWOW64\fngefyx.exe"102⤵PID:1132
-
C:\Windows\SysWOW64\dzcrvbd.exeC:\Windows\system32\dzcrvbd.exe 1572 "C:\Windows\SysWOW64\tayulcw.exe"103⤵
- System Location Discovery: System Language Discovery
PID:3172 -
C:\Windows\SysWOW64\iyfuebb.exeC:\Windows\system32\iyfuebb.exe 1564 "C:\Windows\SysWOW64\dzcrvbd.exe"104⤵PID:1812
-
C:\Windows\SysWOW64\vlojkfi.exeC:\Windows\system32\vlojkfi.exe 1584 "C:\Windows\SysWOW64\iyfuebb.exe"105⤵PID:4480
-
C:\Windows\SysWOW64\iygzqjg.exeC:\Windows\system32\iygzqjg.exe 1396 "C:\Windows\SysWOW64\vlojkfi.exe"106⤵PID:4408
-
C:\Windows\SysWOW64\savklmn.exeC:\Windows\system32\savklmn.exe 1580 "C:\Windows\SysWOW64\iygzqjg.exe"107⤵PID:4044
-
C:\Windows\SysWOW64\fvnzril.exeC:\Windows\system32\fvnzril.exe 1588 "C:\Windows\SysWOW64\savklmn.exe"108⤵PID:2796
-
C:\Windows\SysWOW64\purfbgt.exeC:\Windows\system32\purfbgt.exe 1592 "C:\Windows\SysWOW64\fvnzril.exe"109⤵PID:5052
-
C:\Windows\SysWOW64\fvoncpr.exeC:\Windows\system32\fvoncpr.exe 1596 "C:\Windows\SysWOW64\purfbgt.exe"110⤵PID:2556
-
C:\Windows\SysWOW64\pydxqsx.exeC:\Windows\system32\pydxqsx.exe 1600 "C:\Windows\SysWOW64\fvoncpr.exe"111⤵PID:4784
-
C:\Windows\SysWOW64\ctvnvww.exeC:\Windows\system32\ctvnvww.exe 1604 "C:\Windows\SysWOW64\pydxqsx.exe"112⤵PID:2032
-
C:\Windows\SysWOW64\qgedbsv.exeC:\Windows\system32\qgedbsv.exe 1616 "C:\Windows\SysWOW64\ctvnvww.exe"113⤵PID:4004
-
C:\Windows\SysWOW64\dtwshwc.exeC:\Windows\system32\dtwshwc.exe 1620 "C:\Windows\SysWOW64\qgedbsv.exe"114⤵PID:4360
-
C:\Windows\SysWOW64\nsaqzvb.exeC:\Windows\system32\nsaqzvb.exe 1624 "C:\Windows\SysWOW64\dtwshwc.exe"115⤵PID:4320
-
C:\Windows\SysWOW64\aqdsidh.exeC:\Windows\system32\aqdsidh.exe 1628 "C:\Windows\SysWOW64\nsaqzvb.exe"116⤵PID:4456
-
C:\Windows\SysWOW64\kphqsco.exeC:\Windows\system32\kphqsco.exe 1612 "C:\Windows\SysWOW64\aqdsidh.exe"117⤵PID:4496
-
C:\Windows\SysWOW64\aqegude.exeC:\Windows\system32\aqegude.exe 1608 "C:\Windows\SysWOW64\kphqsco.exe"118⤵PID:4280
-
C:\Windows\SysWOW64\kpidebm.exeC:\Windows\system32\kpidebm.exe 1636 "C:\Windows\SysWOW64\aqegude.exe"119⤵PID:3736
-
C:\Windows\SysWOW64\xolgnkr.exeC:\Windows\system32\xolgnkr.exe 1640 "C:\Windows\SysWOW64\kpidebm.exe"120⤵PID:3932
-
C:\Windows\SysWOW64\kbuwsnq.exeC:\Windows\system32\kbuwsnq.exe 1648 "C:\Windows\SysWOW64\xolgnkr.exe"121⤵PID:3572
-
C:\Windows\SysWOW64\vagtlmy.exeC:\Windows\system32\vagtlmy.exe 1644 "C:\Windows\SysWOW64\kbuwsnq.exe"122⤵PID:4524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-