Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
ad9315ad94f484036fc5f9dea84f8894_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad9315ad94f484036fc5f9dea84f8894_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad9315ad94f484036fc5f9dea84f8894_JaffaCakes118.exe
-
Size
61KB
-
MD5
ad9315ad94f484036fc5f9dea84f8894
-
SHA1
cd70a90a37d90130b1f3ffe423dd5e7810bb3e52
-
SHA256
1e228ac05c25653ac0fdc0b47847f57a81cdfd3b727ca56e30e5b5173699d16c
-
SHA512
0d3a941413f17a2b30151653692efd0e69a4cd234853312281c295d3adb0ba8257bc0a781127b955d858f998ed8ed70af2c5d68ddb5169913ab7e167f9f98584
-
SSDEEP
1536:6Fg/ZOebP6XjGpDUIkigsDsC6HCIO3WjIfemPH6gXXXXX6:SgZPSipHCHf4HK
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1628 lladptsb.exe 4284 vhbwxwsg.exe 4908 jclmdsrl.exe 3276 vsoolaxs.exe 3256 jfxerewf.exe 2252 tejbjcdf.exe 5020 gztzpycj.exe 4584 tqwuyghz.exe 2544 gdfrekgd.exe 3832 ydqpdqsz.exe 3372 dfwxocwa.exe 4624 qodhrcwl.exe 3468 dfxkacus.exe 4408 qspaggaf.exe 2616 acektjhz.exe 1948 lyfvidhe.exe 5104 yzefldho.exe 2744 ikbqzgoi.exe 4656 ylqyahma.exe 3004 ihrihbmg.exe 1380 tgvgaauf.exe 4360 gtmvgetk.exe 4316 qdcgthzm.exe 1700 dqtdzlyr.exe 1460 qddtehfe.exe 4060 azeembfb.exe 5088 nmvtsfeo.exe 3596 akqwinkv.exe 1280 ljcttmrv.exe 1208 ytbewmjf.exe 2160 idyojpxz.exe 2692 vqheplwm.exe 3296 idzuvovr.exe 4164 vqjkisue.exe 4668 fbguwvay.exe 5092 tdefzvai.exe 1996 ffkmkzes.exe 4600 qalfsunp.exe 1216 gftawhkj.exe 5032 qamklclo.exe 1320 alkvyfrj.exe 4888 qpkqckod.exe 2032 aownnjvd.exe 3720 nnrqvrbk.exe 4144 aaafbnap.exe 4672 nnsvhryb.exe 3780 aajtnufo.exe 4520 lvcdcpgl.exe 1364 vgaoqsmf.exe 2672 itjdvwls.exe 3316 vgbtbskf.exe 1864 fffruqrx.exe 1756 seatczxm.exe 2804 frrjicwr.exe 4120 sejhogue.exe 5008 grswucbi.exe 2240 hbihhfik.exe 1428 vozwnjgp.exe 4664 ibrmsnfc.exe 4868 voacyjeh.exe 2800 fzqmumsj.exe 2592 smhczqro.exe 5096 fzzafuqb.exe 4244 smiplxon.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\nnsvhryb.exe aaafbnap.exe File created C:\Windows\SysWOW64\tdnqmqjh.exe giwaymkc.exe File created C:\Windows\SysWOW64\obcdyknk.exe dcyfnlnk.exe File opened for modification C:\Windows\SysWOW64\ohvwacai.exe cqatruvb.exe File created C:\Windows\SysWOW64\eggygndz.exe rqmvynfs.exe File created C:\Windows\SysWOW64\gljgohry.exe tyzqidst.exe File opened for modification C:\Windows\SysWOW64\dksxxkrf.exe ppazrgsb.exe File opened for modification C:\Windows\SysWOW64\hafggpsb.exe xxqwsmdz.exe File opened for modification C:\Windows\SysWOW64\osgceuuw.exe cblzwuxo.exe File created C:\Windows\SysWOW64\liszgvea.exe bxuossqf.exe File created C:\Windows\SysWOW64\szwsxonh.exe fmecjkoc.exe File created C:\Windows\SysWOW64\rlclflva.exe hjmbsipy.exe File opened for modification C:\Windows\SysWOW64\cnyfwfza.exe mmjxuwba.exe File created C:\Windows\SysWOW64\iqlsxtjl.exe ygvhbqvr.exe File opened for modification C:\Windows\SysWOW64\twpvwcto.exe gjxfqhvb.exe File opened for modification C:\Windows\SysWOW64\voacyjeh.exe ibrmsnfc.exe File created C:\Windows\SysWOW64\mayhwwtf.exe bamkmxmf.exe File opened for modification C:\Windows\SysWOW64\rffdguyn.exe eswgaqza.exe File created C:\Windows\SysWOW64\skcmtajx.exe fxkxnfkl.exe File opened for modification C:\Windows\SysWOW64\pjkrsrgy.exe fguhfoaw.exe File created C:\Windows\SysWOW64\vigpbxpc.exe ljcsiyic.exe File opened for modification C:\Windows\SysWOW64\iqlsxtjl.exe ygvhbqvr.exe File created C:\Windows\SysWOW64\ctqkrvfa.exe pgyulrgv.exe File opened for modification C:\Windows\SysWOW64\berbysfm.exe rffdguyn.exe File created C:\Windows\SysWOW64\yxrxpngu.exe lkahjjih.exe File created C:\Windows\SysWOW64\iaiybjzr.exe unqjwfbn.exe File opened for modification C:\Windows\SysWOW64\rgaqzslq.exe hzwtptmq.exe File created C:\Windows\SysWOW64\mtrjqfhn.exe cummggzn.exe File opened for modification C:\Windows\SysWOW64\xoirlogm.exe kbybflhh.exe File created C:\Windows\SysWOW64\vgaoqsmf.exe lvcdcpgl.exe File created C:\Windows\SysWOW64\tbdabdqo.exe goulnhrj.exe File opened for modification C:\Windows\SysWOW64\kbuewjpo.exe xoloqnqb.exe File opened for modification C:\Windows\SysWOW64\kczglvrb.exe xphqfzso.exe File created C:\Windows\SysWOW64\zqypdbpy.exe mdgaxxqt.exe File opened for modification C:\Windows\SysWOW64\juuqbcea.exe whlawyfn.exe File created C:\Windows\SysWOW64\epljtpzw.exe rzqgkpup.exe File opened for modification C:\Windows\SysWOW64\aaafbnap.exe nnrqvrbk.exe File created C:\Windows\SysWOW64\cwthyvfd.exe pjkrsrgy.exe File created C:\Windows\SysWOW64\avjacxwf.exe nizcwuxb.exe File created C:\Windows\SysWOW64\ardidhfc.exe mellydhq.exe File created C:\Windows\SysWOW64\kczglvrb.exe xphqfzso.exe File created C:\Windows\SysWOW64\ibrmsnfc.exe vozwnjgp.exe File opened for modification C:\Windows\SysWOW64\iowyrbwg.exe uepnocww.exe File opened for modification C:\Windows\SysWOW64\eivtycip.exe rssqqcdi.exe File created C:\Windows\SysWOW64\rfequusv.exe hvpfhrmt.exe File created C:\Windows\SysWOW64\lqpgitsx.exe yhrefbsn.exe File opened for modification C:\Windows\SysWOW64\iqghovlp.exe vzdegnfi.exe File opened for modification C:\Windows\SysWOW64\xgelfwcj.exe ktvvzsve.exe File created C:\Windows\SysWOW64\sjykccbr.exe fwouwgue.exe File created C:\Windows\SysWOW64\dlosnjgm.exe pyfcifhz.exe File opened for modification C:\Windows\SysWOW64\qmcfohjd.exe gcevbevb.exe File opened for modification C:\Windows\SysWOW64\diqghgwn.exe qvyqbkxa.exe File created C:\Windows\SysWOW64\bgutzjvw.exe rdfreghu.exe File opened for modification C:\Windows\SysWOW64\sqvwidjy.exe ioxmvicw.exe File opened for modification C:\Windows\SysWOW64\nmmdlybn.exe avjacxwf.exe File created C:\Windows\SysWOW64\bmvhelkq.exe ozdrzhld.exe File created C:\Windows\SysWOW64\fninwncz.exe dktcikox.exe File created C:\Windows\SysWOW64\qodhrcwl.exe dfwxocwa.exe File created C:\Windows\SysWOW64\mqxucilm.exe zdffxeeh.exe File opened for modification C:\Windows\SysWOW64\wbkmrwjt.exe myvcdtcz.exe File opened for modification C:\Windows\SysWOW64\wjsvondd.exe jwafireq.exe File opened for modification C:\Windows\SysWOW64\zbfaruun.exe movllqva.exe File opened for modification C:\Windows\SysWOW64\tudpbmgn.exe jvrsrnyn.exe File created C:\Windows\SysWOW64\tqtnwlwb.exe gdjxrqxw.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbwjcezf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zbfaruun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umfdjpfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mjdfcynt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umttvubz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uevjfkjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnyfwfza.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zlgkimjy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zonmdlsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language literucr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfxerewf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpfeougc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eivtycip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfbbifgz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odjemywo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlqfpapu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language optiaabk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbzwhzhf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxahmjop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vyhcyclm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pyfcifhz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pgyulrgv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pifobtqs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuuxvsev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twpvwcto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epljtpzw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gftawhkj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrjicwr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjkrsrgy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ztbukcpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qmcfohjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvvhzws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fguhfoaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vigpbxpc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oakmlaii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qdyvcxvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bowlkvuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tshqobcr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdvhsgmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzefldho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vwkdjgmu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fmcykabn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rbvwqxuo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curxgdxs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dqhlibtk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iyhudzpx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfxrkyti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language erqyzfzv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjkwmung.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mfrazohd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgvgaauf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffkmkzes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxpgjeea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbdohijg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ozdrzhld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language darcvwiv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kbybflhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfxkacus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smhczqro.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssgpkhyw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mowqwyss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language diqghgwn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfequusv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbnfmvpb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 1628 804 ad9315ad94f484036fc5f9dea84f8894_JaffaCakes118.exe 84 PID 804 wrote to memory of 1628 804 ad9315ad94f484036fc5f9dea84f8894_JaffaCakes118.exe 84 PID 804 wrote to memory of 1628 804 ad9315ad94f484036fc5f9dea84f8894_JaffaCakes118.exe 84 PID 1628 wrote to memory of 4284 1628 lladptsb.exe 86 PID 1628 wrote to memory of 4284 1628 lladptsb.exe 86 PID 1628 wrote to memory of 4284 1628 lladptsb.exe 86 PID 4284 wrote to memory of 4908 4284 vhbwxwsg.exe 89 PID 4284 wrote to memory of 4908 4284 vhbwxwsg.exe 89 PID 4284 wrote to memory of 4908 4284 vhbwxwsg.exe 89 PID 4908 wrote to memory of 3276 4908 jclmdsrl.exe 90 PID 4908 wrote to memory of 3276 4908 jclmdsrl.exe 90 PID 4908 wrote to memory of 3276 4908 jclmdsrl.exe 90 PID 3276 wrote to memory of 3256 3276 vsoolaxs.exe 91 PID 3276 wrote to memory of 3256 3276 vsoolaxs.exe 91 PID 3276 wrote to memory of 3256 3276 vsoolaxs.exe 91 PID 3256 wrote to memory of 2252 3256 jfxerewf.exe 92 PID 3256 wrote to memory of 2252 3256 jfxerewf.exe 92 PID 3256 wrote to memory of 2252 3256 jfxerewf.exe 92 PID 2252 wrote to memory of 5020 2252 tejbjcdf.exe 93 PID 2252 wrote to memory of 5020 2252 tejbjcdf.exe 93 PID 2252 wrote to memory of 5020 2252 tejbjcdf.exe 93 PID 5020 wrote to memory of 4584 5020 gztzpycj.exe 94 PID 5020 wrote to memory of 4584 5020 gztzpycj.exe 94 PID 5020 wrote to memory of 4584 5020 gztzpycj.exe 94 PID 4584 wrote to memory of 2544 4584 tqwuyghz.exe 95 PID 4584 wrote to memory of 2544 4584 tqwuyghz.exe 95 PID 4584 wrote to memory of 2544 4584 tqwuyghz.exe 95 PID 2544 wrote to memory of 3832 2544 gdfrekgd.exe 97 PID 2544 wrote to memory of 3832 2544 gdfrekgd.exe 97 PID 2544 wrote to memory of 3832 2544 gdfrekgd.exe 97 PID 3832 wrote to memory of 3372 3832 ydqpdqsz.exe 98 PID 3832 wrote to memory of 3372 3832 ydqpdqsz.exe 98 PID 3832 wrote to memory of 3372 3832 ydqpdqsz.exe 98 PID 3372 wrote to memory of 4624 3372 dfwxocwa.exe 101 PID 3372 wrote to memory of 4624 3372 dfwxocwa.exe 101 PID 3372 wrote to memory of 4624 3372 dfwxocwa.exe 101 PID 4624 wrote to memory of 3468 4624 qodhrcwl.exe 102 PID 4624 wrote to memory of 3468 4624 qodhrcwl.exe 102 PID 4624 wrote to memory of 3468 4624 qodhrcwl.exe 102 PID 3468 wrote to memory of 4408 3468 dfxkacus.exe 103 PID 3468 wrote to memory of 4408 3468 dfxkacus.exe 103 PID 3468 wrote to memory of 4408 3468 dfxkacus.exe 103 PID 4408 wrote to memory of 2616 4408 qspaggaf.exe 104 PID 4408 wrote to memory of 2616 4408 qspaggaf.exe 104 PID 4408 wrote to memory of 2616 4408 qspaggaf.exe 104 PID 2616 wrote to memory of 1948 2616 acektjhz.exe 105 PID 2616 wrote to memory of 1948 2616 acektjhz.exe 105 PID 2616 wrote to memory of 1948 2616 acektjhz.exe 105 PID 1948 wrote to memory of 5104 1948 lyfvidhe.exe 108 PID 1948 wrote to memory of 5104 1948 lyfvidhe.exe 108 PID 1948 wrote to memory of 5104 1948 lyfvidhe.exe 108 PID 5104 wrote to memory of 2744 5104 yzefldho.exe 109 PID 5104 wrote to memory of 2744 5104 yzefldho.exe 109 PID 5104 wrote to memory of 2744 5104 yzefldho.exe 109 PID 2744 wrote to memory of 4656 2744 ikbqzgoi.exe 110 PID 2744 wrote to memory of 4656 2744 ikbqzgoi.exe 110 PID 2744 wrote to memory of 4656 2744 ikbqzgoi.exe 110 PID 4656 wrote to memory of 3004 4656 ylqyahma.exe 111 PID 4656 wrote to memory of 3004 4656 ylqyahma.exe 111 PID 4656 wrote to memory of 3004 4656 ylqyahma.exe 111 PID 3004 wrote to memory of 1380 3004 ihrihbmg.exe 112 PID 3004 wrote to memory of 1380 3004 ihrihbmg.exe 112 PID 3004 wrote to memory of 1380 3004 ihrihbmg.exe 112 PID 1380 wrote to memory of 4360 1380 tgvgaauf.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad9315ad94f484036fc5f9dea84f8894_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad9315ad94f484036fc5f9dea84f8894_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\lladptsb.exeC:\Windows\system32\lladptsb.exe 1008 "C:\Users\Admin\AppData\Local\Temp\ad9315ad94f484036fc5f9dea84f8894_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\vhbwxwsg.exeC:\Windows\system32\vhbwxwsg.exe 1128 "C:\Windows\SysWOW64\lladptsb.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\jclmdsrl.exeC:\Windows\system32\jclmdsrl.exe 1132 "C:\Windows\SysWOW64\vhbwxwsg.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\vsoolaxs.exeC:\Windows\system32\vsoolaxs.exe 1136 "C:\Windows\SysWOW64\jclmdsrl.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\jfxerewf.exeC:\Windows\system32\jfxerewf.exe 1144 "C:\Windows\SysWOW64\vsoolaxs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\tejbjcdf.exeC:\Windows\system32\tejbjcdf.exe 1140 "C:\Windows\SysWOW64\jfxerewf.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\gztzpycj.exeC:\Windows\system32\gztzpycj.exe 1152 "C:\Windows\SysWOW64\tejbjcdf.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\tqwuyghz.exeC:\Windows\system32\tqwuyghz.exe 1156 "C:\Windows\SysWOW64\gztzpycj.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\gdfrekgd.exeC:\Windows\system32\gdfrekgd.exe 1160 "C:\Windows\SysWOW64\tqwuyghz.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\ydqpdqsz.exeC:\Windows\system32\ydqpdqsz.exe 1168 "C:\Windows\SysWOW64\gdfrekgd.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\dfwxocwa.exeC:\Windows\system32\dfwxocwa.exe 1148 "C:\Windows\SysWOW64\ydqpdqsz.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\qodhrcwl.exeC:\Windows\system32\qodhrcwl.exe 1164 "C:\Windows\SysWOW64\dfwxocwa.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\dfxkacus.exeC:\Windows\system32\dfxkacus.exe 1172 "C:\Windows\SysWOW64\qodhrcwl.exe"14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\qspaggaf.exeC:\Windows\system32\qspaggaf.exe 1180 "C:\Windows\SysWOW64\dfxkacus.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\acektjhz.exeC:\Windows\system32\acektjhz.exe 1176 "C:\Windows\SysWOW64\qspaggaf.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\lyfvidhe.exeC:\Windows\system32\lyfvidhe.exe 1184 "C:\Windows\SysWOW64\acektjhz.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\yzefldho.exeC:\Windows\system32\yzefldho.exe 1192 "C:\Windows\SysWOW64\lyfvidhe.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\ikbqzgoi.exeC:\Windows\system32\ikbqzgoi.exe 1188 "C:\Windows\SysWOW64\yzefldho.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\ylqyahma.exeC:\Windows\system32\ylqyahma.exe 1200 "C:\Windows\SysWOW64\ikbqzgoi.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\ihrihbmg.exeC:\Windows\system32\ihrihbmg.exe 1012 "C:\Windows\SysWOW64\ylqyahma.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\tgvgaauf.exeC:\Windows\system32\tgvgaauf.exe 1204 "C:\Windows\SysWOW64\ihrihbmg.exe"22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\gtmvgetk.exeC:\Windows\system32\gtmvgetk.exe 1252 "C:\Windows\SysWOW64\tgvgaauf.exe"23⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\qdcgthzm.exeC:\Windows\system32\qdcgthzm.exe 1208 "C:\Windows\SysWOW64\gtmvgetk.exe"24⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\dqtdzlyr.exeC:\Windows\system32\dqtdzlyr.exe 1124 "C:\Windows\SysWOW64\qdcgthzm.exe"25⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\qddtehfe.exeC:\Windows\system32\qddtehfe.exe 1196 "C:\Windows\SysWOW64\dqtdzlyr.exe"26⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\azeembfb.exeC:\Windows\system32\azeembfb.exe 1224 "C:\Windows\SysWOW64\qddtehfe.exe"27⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\SysWOW64\nmvtsfeo.exeC:\Windows\system32\nmvtsfeo.exe 1228 "C:\Windows\SysWOW64\azeembfb.exe"28⤵
- Executes dropped EXE
PID:5088 -
C:\Windows\SysWOW64\akqwinkv.exeC:\Windows\system32\akqwinkv.exe 1232 "C:\Windows\SysWOW64\nmvtsfeo.exe"29⤵
- Executes dropped EXE
PID:3596 -
C:\Windows\SysWOW64\ljcttmrv.exeC:\Windows\system32\ljcttmrv.exe 1236 "C:\Windows\SysWOW64\akqwinkv.exe"30⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\ytbewmjf.exeC:\Windows\system32\ytbewmjf.exe 1240 "C:\Windows\SysWOW64\ljcttmrv.exe"31⤵
- Executes dropped EXE
PID:1208 -
C:\Windows\SysWOW64\idyojpxz.exeC:\Windows\system32\idyojpxz.exe 1212 "C:\Windows\SysWOW64\ytbewmjf.exe"32⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\vqheplwm.exeC:\Windows\system32\vqheplwm.exe 1248 "C:\Windows\SysWOW64\idyojpxz.exe"33⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\idzuvovr.exeC:\Windows\system32\idzuvovr.exe 1256 "C:\Windows\SysWOW64\vqheplwm.exe"34⤵
- Executes dropped EXE
PID:3296 -
C:\Windows\SysWOW64\vqjkisue.exeC:\Windows\system32\vqjkisue.exe 1260 "C:\Windows\SysWOW64\idzuvovr.exe"35⤵
- Executes dropped EXE
PID:4164 -
C:\Windows\SysWOW64\fbguwvay.exeC:\Windows\system32\fbguwvay.exe 1264 "C:\Windows\SysWOW64\vqjkisue.exe"36⤵
- Executes dropped EXE
PID:4668 -
C:\Windows\SysWOW64\tdefzvai.exeC:\Windows\system32\tdefzvai.exe 1268 "C:\Windows\SysWOW64\fbguwvay.exe"37⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\ffkmkzes.exeC:\Windows\system32\ffkmkzes.exe 1272 "C:\Windows\SysWOW64\tdefzvai.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\qalfsunp.exeC:\Windows\system32\qalfsunp.exe 1276 "C:\Windows\SysWOW64\ffkmkzes.exe"39⤵
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\gftawhkj.exeC:\Windows\system32\gftawhkj.exe 1244 "C:\Windows\SysWOW64\qalfsunp.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\SysWOW64\qamklclo.exeC:\Windows\system32\qamklclo.exe 1280 "C:\Windows\SysWOW64\gftawhkj.exe"41⤵
- Executes dropped EXE
PID:5032 -
C:\Windows\SysWOW64\alkvyfrj.exeC:\Windows\system32\alkvyfrj.exe 1288 "C:\Windows\SysWOW64\qamklclo.exe"42⤵
- Executes dropped EXE
PID:1320 -
C:\Windows\SysWOW64\qpkqckod.exeC:\Windows\system32\qpkqckod.exe 1220 "C:\Windows\SysWOW64\alkvyfrj.exe"43⤵
- Executes dropped EXE
PID:4888 -
C:\Windows\SysWOW64\aownnjvd.exeC:\Windows\system32\aownnjvd.exe 1292 "C:\Windows\SysWOW64\qpkqckod.exe"44⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\nnrqvrbk.exeC:\Windows\system32\nnrqvrbk.exe 1300 "C:\Windows\SysWOW64\aownnjvd.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3720 -
C:\Windows\SysWOW64\aaafbnap.exeC:\Windows\system32\aaafbnap.exe 1304 "C:\Windows\SysWOW64\nnrqvrbk.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4144 -
C:\Windows\SysWOW64\nnsvhryb.exeC:\Windows\system32\nnsvhryb.exe 1308 "C:\Windows\SysWOW64\aaafbnap.exe"47⤵
- Executes dropped EXE
PID:4672 -
C:\Windows\SysWOW64\aajtnufo.exeC:\Windows\system32\aajtnufo.exe 1296 "C:\Windows\SysWOW64\nnsvhryb.exe"48⤵
- Executes dropped EXE
PID:3780 -
C:\Windows\SysWOW64\lvcdcpgl.exeC:\Windows\system32\lvcdcpgl.exe 1284 "C:\Windows\SysWOW64\aajtnufo.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4520 -
C:\Windows\SysWOW64\vgaoqsmf.exeC:\Windows\system32\vgaoqsmf.exe 1312 "C:\Windows\SysWOW64\lvcdcpgl.exe"50⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\itjdvwls.exeC:\Windows\system32\itjdvwls.exe 1320 "C:\Windows\SysWOW64\vgaoqsmf.exe"51⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\SysWOW64\vgbtbskf.exeC:\Windows\system32\vgbtbskf.exe 1324 "C:\Windows\SysWOW64\itjdvwls.exe"52⤵
- Executes dropped EXE
PID:3316 -
C:\Windows\SysWOW64\fffruqrx.exeC:\Windows\system32\fffruqrx.exe 1332 "C:\Windows\SysWOW64\vgbtbskf.exe"53⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\seatczxm.exeC:\Windows\system32\seatczxm.exe 1328 "C:\Windows\SysWOW64\fffruqrx.exe"54⤵
- Executes dropped EXE
PID:1756 -
C:\Windows\SysWOW64\frrjicwr.exeC:\Windows\system32\frrjicwr.exe 1336 "C:\Windows\SysWOW64\seatczxm.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\sejhogue.exeC:\Windows\system32\sejhogue.exe 1344 "C:\Windows\SysWOW64\frrjicwr.exe"56⤵
- Executes dropped EXE
PID:4120 -
C:\Windows\SysWOW64\grswucbi.exeC:\Windows\system32\grswucbi.exe 1340 "C:\Windows\SysWOW64\sejhogue.exe"57⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\hbihhfik.exeC:\Windows\system32\hbihhfik.exe 1348 "C:\Windows\SysWOW64\grswucbi.exe"58⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\vozwnjgp.exeC:\Windows\system32\vozwnjgp.exe 1352 "C:\Windows\SysWOW64\hbihhfik.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1428 -
C:\Windows\SysWOW64\ibrmsnfc.exeC:\Windows\system32\ibrmsnfc.exe 1356 "C:\Windows\SysWOW64\vozwnjgp.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4664 -
C:\Windows\SysWOW64\voacyjeh.exeC:\Windows\system32\voacyjeh.exe 1052 "C:\Windows\SysWOW64\ibrmsnfc.exe"61⤵
- Executes dropped EXE
PID:4868 -
C:\Windows\SysWOW64\fzqmumsj.exeC:\Windows\system32\fzqmumsj.exe 1368 "C:\Windows\SysWOW64\voacyjeh.exe"62⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\smhczqro.exeC:\Windows\system32\smhczqro.exe 1364 "C:\Windows\SysWOW64\fzqmumsj.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\fzzafuqb.exeC:\Windows\system32\fzzafuqb.exe 1376 "C:\Windows\SysWOW64\smhczqro.exe"64⤵
- Executes dropped EXE
PID:5096 -
C:\Windows\SysWOW64\smiplxon.exeC:\Windows\system32\smiplxon.exe 1372 "C:\Windows\SysWOW64\fzzafuqb.exe"65⤵
- Executes dropped EXE
PID:4244 -
C:\Windows\SysWOW64\dhjatsxl.exeC:\Windows\system32\dhjatsxl.exe 1380 "C:\Windows\SysWOW64\smiplxon.exe"66⤵PID:1060
-
C:\Windows\SysWOW64\nszkonef.exeC:\Windows\system32\nszkonef.exe 1388 "C:\Windows\SysWOW64\dhjatsxl.exe"67⤵PID:4628
-
C:\Windows\SysWOW64\abfnrnep.exeC:\Windows\system32\abfnrnep.exe 1392 "C:\Windows\SysWOW64\nszkonef.exe"68⤵PID:2352
-
C:\Windows\SysWOW64\kajsbldp.exeC:\Windows\system32\kajsbldp.exe 1384 "C:\Windows\SysWOW64\abfnrnep.exe"69⤵PID:4588
-
C:\Windows\SysWOW64\vwkdjgmu.exeC:\Windows\system32\vwkdjgmu.exe 1400 "C:\Windows\SysWOW64\kajsbldp.exe"70⤵
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Windows\SysWOW64\ijcspklz.exeC:\Windows\system32\ijcspklz.exe 1404 "C:\Windows\SysWOW64\vwkdjgmu.exe"71⤵PID:2480
-
C:\Windows\SysWOW64\sfuleele.exeC:\Windows\system32\sfuleele.exe 1396 "C:\Windows\SysWOW64\ijcspklz.exe"72⤵PID:4288
-
C:\Windows\SysWOW64\cehipdtw.exeC:\Windows\system32\cehipdtw.exe 1412 "C:\Windows\SysWOW64\sfuleele.exe"73⤵PID:576
-
C:\Windows\SysWOW64\sqhdtqqq.exeC:\Windows\system32\sqhdtqqq.exe 1408 "C:\Windows\SysWOW64\cehipdtw.exe"74⤵PID:4688
-
C:\Windows\SysWOW64\fdytymod.exeC:\Windows\system32\fdytymod.exe 1416 "C:\Windows\SysWOW64\sqhdtqqq.exe"75⤵PID:2008
-
C:\Windows\SysWOW64\nlulljyn.exeC:\Windows\system32\nlulljyn.exe 1432 "C:\Windows\SysWOW64\fdytymod.exe"76⤵PID:2128
-
C:\Windows\SysWOW64\auswwbyx.exeC:\Windows\system32\auswwbyx.exe 1420 "C:\Windows\SysWOW64\nlulljyn.exe"77⤵PID:4680
-
C:\Windows\SysWOW64\kxpgjeea.exeC:\Windows\system32\kxpgjeea.exe 1424 "C:\Windows\SysWOW64\auswwbyx.exe"78⤵
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\vpfeougc.exeC:\Windows\system32\vpfeougc.exe 1316 "C:\Windows\SysWOW64\kxpgjeea.exe"79⤵
- System Location Discovery: System Language Discovery
PID:4572 -
C:\Windows\SysWOW64\hrltzhle.exeC:\Windows\system32\hrltzhle.exe 1440 "C:\Windows\SysWOW64\vpfeougc.exe"80⤵PID:4032
-
C:\Windows\SysWOW64\uevjfkjr.exeC:\Windows\system32\uevjfkjr.exe 1436 "C:\Windows\SysWOW64\hrltzhle.exe"81⤵
- System Location Discovery: System Language Discovery
PID:312 -
C:\Windows\SysWOW64\irmzlgie.exeC:\Windows\system32\irmzlgie.exe 1444 "C:\Windows\SysWOW64\uevjfkjr.exe"82⤵PID:5080
-
C:\Windows\SysWOW64\snnrajrb.exeC:\Windows\system32\snnrajrb.exe 1452 "C:\Windows\SysWOW64\irmzlgie.exe"83⤵PID:4156
-
C:\Windows\SysWOW64\faxhgfqg.exeC:\Windows\system32\faxhgfqg.exe 1448 "C:\Windows\SysWOW64\snnrajrb.exe"84⤵PID:4856
-
C:\Windows\SysWOW64\pkmrtiwi.exeC:\Windows\system32\pkmrtiwi.exe 1460 "C:\Windows\SysWOW64\faxhgfqg.exe"85⤵PID:4136
-
C:\Windows\SysWOW64\accpyyyl.exeC:\Windows\system32\accpyyyl.exe 1464 "C:\Windows\SysWOW64\pkmrtiwi.exe"86⤵PID:2108
-
C:\Windows\SysWOW64\pkvxfpuz.exeC:\Windows\system32\pkvxfpuz.exe 1456 "C:\Windows\SysWOW64\accpyyyl.exe"87⤵PID:4764
-
C:\Windows\SysWOW64\agopukcx.exeC:\Windows\system32\agopukcx.exe 1472 "C:\Windows\SysWOW64\pkvxfpuz.exe"88⤵PID:2176
-
C:\Windows\SysWOW64\ntgfagbj.exeC:\Windows\system32\ntgfagbj.exe 1468 "C:\Windows\SysWOW64\agopukcx.exe"89⤵PID:2420
-
C:\Windows\SysWOW64\xdvpnjhe.exeC:\Windows\system32\xdvpnjhe.exe 1476 "C:\Windows\SysWOW64\ntgfagbj.exe"90⤵PID:3244
-
C:\Windows\SysWOW64\kqmftngq.exeC:\Windows\system32\kqmftngq.exe 1428 "C:\Windows\SysWOW64\xdvpnjhe.exe"91⤵PID:1256
-
C:\Windows\SysWOW64\xdwvzrnd.exeC:\Windows\system32\xdwvzrnd.exe 1488 "C:\Windows\SysWOW64\kqmftngq.exe"92⤵PID:4952
-
C:\Windows\SysWOW64\kqokfumi.exeC:\Windows\system32\kqokfumi.exe 1492 "C:\Windows\SysWOW64\xdwvzrnd.exe"93⤵PID:3260
-
C:\Windows\SysWOW64\vpsixtti.exeC:\Windows\system32\vpsixtti.exe 1484 "C:\Windows\SysWOW64\kqokfumi.exe"94⤵PID:4088
-
C:\Windows\SysWOW64\kcadtyqc.exeC:\Windows\system32\kcadtyqc.exe 1500 "C:\Windows\SysWOW64\vpsixtti.exe"95⤵PID:4872
-
C:\Windows\SysWOW64\uepnocww.exeC:\Windows\system32\uepnocww.exe 1504 "C:\Windows\SysWOW64\kcadtyqc.exe"96⤵
- Drops file in System32 directory
PID:1392 -
C:\Windows\SysWOW64\iowyrbwg.exeC:\Windows\system32\iowyrbwg.exe 1496 "C:\Windows\SysWOW64\uepnocww.exe"97⤵PID:2864
-
C:\Windows\SysWOW64\vmqbabuo.exeC:\Windows\system32\vmqbabuo.exe 1480 "C:\Windows\SysWOW64\iowyrbwg.exe"98⤵PID:392
-
C:\Windows\SysWOW64\fmcykabn.exeC:\Windows\system32\fmcykabn.exe 1360 "C:\Windows\SysWOW64\vmqbabuo.exe"99⤵
- System Location Discovery: System Language Discovery
PID:3136 -
C:\Windows\SysWOW64\scxbtihu.exeC:\Windows\system32\scxbtihu.exe 1520 "C:\Windows\SysWOW64\fmcykabn.exe"100⤵PID:3672
-
C:\Windows\SysWOW64\fphqzmgh.exeC:\Windows\system32\fphqzmgh.exe 1516 "C:\Windows\SysWOW64\scxbtihu.exe"101⤵PID:2736
-
C:\Windows\SysWOW64\kkygfqeu.exeC:\Windows\system32\kkygfqeu.exe 1528 "C:\Windows\SysWOW64\fphqzmgh.exe"102⤵PID:3716
-
C:\Windows\SysWOW64\xxqwsmdz.exeC:\Windows\system32\xxqwsmdz.exe 1532 "C:\Windows\SysWOW64\kkygfqeu.exe"103⤵
- Drops file in System32 directory
PID:3232 -
C:\Windows\SysWOW64\hafggpsb.exeC:\Windows\system32\hafggpsb.exe 1508 "C:\Windows\SysWOW64\xxqwsmdz.exe"104⤵PID:3640
-
C:\Windows\SysWOW64\unpwltqg.exeC:\Windows\system32\unpwltqg.exe 1544 "C:\Windows\SysWOW64\hafggpsb.exe"105⤵PID:1448
-
C:\Windows\SysWOW64\higmrwpt.exeC:\Windows\system32\higmrwpt.exe 1540 "C:\Windows\SysWOW64\unpwltqg.exe"106⤵PID:988
-
C:\Windows\SysWOW64\vvyjxsox.exeC:\Windows\system32\vvyjxsox.exe 1536 "C:\Windows\SysWOW64\higmrwpt.exe"107⤵PID:4436
-
C:\Windows\SysWOW64\exnusvcz.exeC:\Windows\system32\exnusvcz.exe 1548 "C:\Windows\SysWOW64\vvyjxsox.exe"108⤵PID:1412
-
C:\Windows\SysWOW64\skxkyzbe.exeC:\Windows\system32\skxkyzbe.exe 1524 "C:\Windows\SysWOW64\exnusvcz.exe"109⤵PID:896
-
C:\Windows\SysWOW64\ffozedar.exeC:\Windows\system32\ffozedar.exe 1560 "C:\Windows\SysWOW64\skxkyzbe.exe"110⤵PID:3904
-
C:\Windows\SysWOW64\ssgpkhyw.exeC:\Windows\system32\ssgpkhyw.exe 1564 "C:\Windows\SysWOW64\ffozedar.exe"111⤵
- System Location Discovery: System Language Discovery
PID:500 -
C:\Windows\SysWOW64\cvvzxkny.exeC:\Windows\system32\cvvzxkny.exe 1556 "C:\Windows\SysWOW64\ssgpkhyw.exe"112⤵PID:2192
-
C:\Windows\SysWOW64\pifpdgml.exeC:\Windows\system32\pifpdgml.exe 1552 "C:\Windows\SysWOW64\cvvzxkny.exe"113⤵PID:1228
-
C:\Windows\SysWOW64\zprmnftc.exeC:\Windows\system32\zprmnftc.exe 1576 "C:\Windows\SysWOW64\pifpdgml.exe"114⤵PID:1940
-
C:\Windows\SysWOW64\pqouoojc.exeC:\Windows\system32\pqouoojc.exe 1572 "C:\Windows\SysWOW64\zprmnftc.exe"115⤵PID:3824
-
C:\Windows\SysWOW64\zsdfkrpw.exeC:\Windows\system32\zsdfkrpw.exe 1584 "C:\Windows\SysWOW64\pqouoojc.exe"116⤵PID:4068
-
C:\Windows\SysWOW64\mfndpnwj.exeC:\Windows\system32\mfndpnwj.exe 1588 "C:\Windows\SysWOW64\zsdfkrpw.exe"117⤵PID:4684
-
C:\Windows\SysWOW64\aafsvqvo.exeC:\Windows\system32\aafsvqvo.exe 1592 "C:\Windows\SysWOW64\mfndpnwj.exe"118⤵PID:4348
-
C:\Windows\SysWOW64\nnwibuub.exeC:\Windows\system32\nnwibuub.exe 1596 "C:\Windows\SysWOW64\aafsvqvo.exe"119⤵PID:4644
-
C:\Windows\SysWOW64\xnafltba.exeC:\Windows\system32\xnafltba.exe 1600 "C:\Windows\SysWOW64\nnwibuub.exe"120⤵PID:4972
-
C:\Windows\SysWOW64\kdviubhi.exeC:\Windows\system32\kdviubhi.exe 1604 "C:\Windows\SysWOW64\xnafltba.exe"121⤵PID:3964
-
C:\Windows\SysWOW64\xynyaxgm.exeC:\Windows\system32\xynyaxgm.exe 1608 "C:\Windows\SysWOW64\kdviubhi.exe"122⤵PID:3812
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-