Analysis
-
max time kernel
150s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 05:03
Static task
static1
Behavioral task
behavioral1
Sample
b671cf1290e9b422689176d710987a1e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b671cf1290e9b422689176d710987a1e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b671cf1290e9b422689176d710987a1e_JaffaCakes118.exe
-
Size
435KB
-
MD5
b671cf1290e9b422689176d710987a1e
-
SHA1
f737ac2676f7ad828c576a53bc28f74140f27035
-
SHA256
38f731b5a9af2ef38f387e7b6fe3760bd4c203e58142b143049d40b0c5e5d593
-
SHA512
0557299c2ced863722474c874072d65b6b3b4939a0d395639ca7ad53e13eb6e71ae2cc4efd1acce660fccab750fd773d8ad1f7a00beaeea0d6c317b4e8fc2d89
-
SSDEEP
12288:ft+79NzBn5t+79NzBn5t+79NzBn5t+79NzBn5t+79NzBnl:ftSB5tSB5tSB5tSB5tSBl
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1744 clixwqif.exe 3064 apiriltc.exe 5100 comzelfr.exe 3192 ialhplmj.exe 2348 cmdzfqrz.exe 3652 xmlqataz.exe 3468 capxmqsy.exe 5096 xmlsfjas.exe 2124 cmdofthn.exe 3464 ipssoola.exe 4740 netrsmez.exe 2648 clisrmkf.exe 3112 fxsjtoto.exe 400 apivujxt.exe 2356 winwceny.exe 4500 sysmnmuq.exe 4888 reglakfp.exe 220 condppjf.exe 5008 cmdazubq.exe 1848 winvjkhu.exe 5044 capxyuux.exe 2592 xmltznjr.exe 4904 dlloaxrm.exe 2508 regemfyv.exe 2824 sysamqfq.exe 1956 ipsnwflt.exe 3080 fxsrgtdf.exe 4524 apiwoozs.exe 3180 clivslrr.exe 4832 drvezwui.exe 3952 igfaagcd.exe 4152 xmlcgwnp.exe 1472 netppmtt.exe 1804 ipschbzx.exe 2416 secmwmus.exe 1640 cmdzobaw.exe 3612 apiyszkv.exe 5004 cmdljoqy.exe 928 capvqzty.exe 2056 ialuuxlx.exe 3248 authlmra.exe 612 comfgpab.exe 3608 ipsfkmkz.exe 4400 regorxnz.exe 3352 syskrivt.exe 2336 cmdamklc.exe 4808 igflkvyf.exe 1284 dlluixbw.exe 2816 advhzvha.exe 1240 dllgetsz.exe 4760 confgvah.exe 4100 netahgqc.exe 1784 advwaqxw.exe 3988 netvmviv.exe 4936 adviwloz.exe 3640 comvnbbu.exe 1112 cmdeyjpt.exe 4512 apilkgzs.exe 4788 comkoesq.exe 4300 apixguxu.exe 3368 ialkpjdy.exe 2324 winjbhox.exe 1384 fxselett.exe 4536 dlloacyj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\comlwyet.exe sysignjq.exe File created C:\Windows\SysWOW64\capcyfnl.exe secmdded.exe File created C:\Windows\SysWOW64\fxstjwpa.exe winyzgjw.exe File opened for modification C:\Windows\SysWOW64\conmfyel.exe dllwkdwd.exe File created C:\Windows\SysWOW64\ipsnnjux.exe fxspsglp.exe File created C:\Windows\SysWOW64\winahelj.exe igfcmbdb.exe File opened for modification C:\Windows\SysWOW64\xmljmbsi.exe cliwvlme.exe File created C:\Windows\SysWOW64\fxsshojr.exe auttdrrs.exe File created C:\Windows\SysWOW64\ipsoddga.exe regmnssx.exe File created C:\Windows\SysWOW64\coniadpc.exe netjngxd.exe File opened for modification C:\Windows\SysWOW64\ialstgnm.exe clibydfm.exe File created C:\Windows\SysWOW64\fxsbewxr.exe netypljo.exe File opened for modification C:\Windows\SysWOW64\apiytlym.exe clidjnsj.exe File created C:\Windows\SysWOW64\clixfiil.exe apiytlym.exe File created C:\Windows\SysWOW64\cmdzrivc.exe ipspkxsd.exe File opened for modification C:\Windows\SysWOW64\cmdvlvwc.exe drvwhxmd.exe File created C:\Windows\SysWOW64\capvqzty.exe cmdljoqy.exe File opened for modification C:\Windows\SysWOW64\fxsxstnx.exe apiwdlmo.exe File opened for modification C:\Windows\SysWOW64\advgmcqq.exe dlltdekm.exe File created C:\Windows\SysWOW64\capkwyqw.exe xmlcsbyx.exe File created C:\Windows\SysWOW64\igfnppgv.exe cliglsvw.exe File created C:\Windows\SysWOW64\contceuv.exe dlluhbdv.exe File opened for modification C:\Windows\SysWOW64\dllzinkt.exe apiezxep.exe File opened for modification C:\Windows\SysWOW64\ipsravui.exe fxssgsli.exe File created C:\Windows\SysWOW64\ipsprgnf.exe netciqhc.exe File opened for modification C:\Windows\SysWOW64\regorxnz.exe ipsfkmkz.exe File opened for modification C:\Windows\SysWOW64\ialsnpze.exe clibkmrw.exe File opened for modification C:\Windows\SysWOW64\winspsld.exe cmdfycfz.exe File opened for modification C:\Windows\SysWOW64\sysnemek.exe conamwzg.exe File opened for modification C:\Windows\SysWOW64\comcrffj.exe sysrcukg.exe File created C:\Windows\SysWOW64\convplbl.exe fxskaboi.exe File created C:\Windows\SysWOW64\regbreuq.exe autozphm.exe File opened for modification C:\Windows\SysWOW64\cmdlyaej.exe igfbsxbk.exe File created C:\Windows\SysWOW64\autivtyc.exe dllzpqvc.exe File opened for modification C:\Windows\SysWOW64\dlldexsz.exe ipscpprq.exe File opened for modification C:\Windows\SysWOW64\ipsfkuai.exe sysssfue.exe File created C:\Windows\SysWOW64\conbhdrw.exe fxszrawt.exe File opened for modification C:\Windows\SysWOW64\regfwruk.exe autsmbpg.exe File created C:\Windows\SysWOW64\autyuqjm.exe clixfiil.exe File created C:\Windows\SysWOW64\ialnuhts.exe drvscrnw.exe File opened for modification C:\Windows\SysWOW64\ialnuhts.exe drvscrnw.exe File created C:\Windows\SysWOW64\autvkzuv.exe advkvphs.exe File opened for modification C:\Windows\SysWOW64\igfrjsjt.exe syseacdp.exe File created C:\Windows\SysWOW64\authlmra.exe ialuuxlx.exe File created C:\Windows\SysWOW64\fxsrwmey.exe autskolz.exe File opened for modification C:\Windows\SysWOW64\cmdayhww.exe winamkmx.exe File created C:\Windows\SysWOW64\capottdo.exe xmlppvtp.exe File created C:\Windows\SysWOW64\netciqhc.exe xmlpqbby.exe File created C:\Windows\SysWOW64\autblxlg.exe xmlcqudy.exe File opened for modification C:\Windows\SysWOW64\sysdnkej.exe fxsuhzbr.exe File opened for modification C:\Windows\SysWOW64\apioejcq.exe fxskwogc.exe File opened for modification C:\Windows\SysWOW64\nethbcvc.exe xmlryamc.exe File opened for modification C:\Windows\SysWOW64\cliyhodk.exe sechemvc.exe File opened for modification C:\Windows\SysWOW64\igfaagcd.exe drvezwui.exe File opened for modification C:\Windows\SysWOW64\dllkbuoh.exe apixjwjd.exe File created C:\Windows\SysWOW64\clijsgqx.exe seckpdap.exe File created C:\Windows\SysWOW64\xmlfqtun.exe clisgdoj.exe File opened for modification C:\Windows\SysWOW64\fxscsimp.exe drvyknij.exe File opened for modification C:\Windows\SysWOW64\advwhmht.exe fxsxvpxu.exe File created C:\Windows\SysWOW64\autpzqad.exe igfdzvwq.exe File created C:\Windows\SysWOW64\comcrffj.exe sysrcukg.exe File opened for modification C:\Windows\SysWOW64\ipsognzi.exe clihcigk.exe File created C:\Windows\SysWOW64\dlluixbw.exe igflkvyf.exe File opened for modification C:\Windows\SysWOW64\ialhrfpp.exe capafixq.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drvijzbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysmnmuq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language confxrky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clivencz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secbjzlh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfynltz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drvuabbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apitwxaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language capaanzv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language authlmra.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apilkgzs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language advoderi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ialyheur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netuhmgw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seciivww.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dlluhbdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language advgmcqq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seckpdap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxsutbua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cliqrbcf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seccngcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmdazubq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clifrluw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igffnftr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secaglas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conydpkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ialkpjdy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caprbpyh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedbgy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxsgsefy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secfrfgu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clidjnsj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winhjmow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ialhuelo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language contceuv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language seckzuyk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmloeqrz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cliqhcmx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secxdfxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netwkcdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfmecen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmddfyin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apissfzc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cliwpkgy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cliwthyv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autivtyc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drvscrnw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmlwcmdr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmlxlkdc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regorxnz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipscpprq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxsdxtnu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllrwkyi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysonmdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autwjmna.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netcthmz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autrhnyb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apiyszkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxselett.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netetqtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language confmrhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ialmzuzm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language secdsutg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllzpqvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3584 wrote to memory of 1744 3584 b671cf1290e9b422689176d710987a1e_JaffaCakes118.exe 85 PID 3584 wrote to memory of 1744 3584 b671cf1290e9b422689176d710987a1e_JaffaCakes118.exe 85 PID 3584 wrote to memory of 1744 3584 b671cf1290e9b422689176d710987a1e_JaffaCakes118.exe 85 PID 1744 wrote to memory of 3064 1744 clixwqif.exe 86 PID 1744 wrote to memory of 3064 1744 clixwqif.exe 86 PID 1744 wrote to memory of 3064 1744 clixwqif.exe 86 PID 3064 wrote to memory of 5100 3064 apiriltc.exe 88 PID 3064 wrote to memory of 5100 3064 apiriltc.exe 88 PID 3064 wrote to memory of 5100 3064 apiriltc.exe 88 PID 5100 wrote to memory of 3192 5100 comzelfr.exe 89 PID 5100 wrote to memory of 3192 5100 comzelfr.exe 89 PID 5100 wrote to memory of 3192 5100 comzelfr.exe 89 PID 3192 wrote to memory of 2348 3192 ialhplmj.exe 90 PID 3192 wrote to memory of 2348 3192 ialhplmj.exe 90 PID 3192 wrote to memory of 2348 3192 ialhplmj.exe 90 PID 2348 wrote to memory of 3652 2348 cmdzfqrz.exe 91 PID 2348 wrote to memory of 3652 2348 cmdzfqrz.exe 91 PID 2348 wrote to memory of 3652 2348 cmdzfqrz.exe 91 PID 3652 wrote to memory of 3468 3652 xmlqataz.exe 93 PID 3652 wrote to memory of 3468 3652 xmlqataz.exe 93 PID 3652 wrote to memory of 3468 3652 xmlqataz.exe 93 PID 3468 wrote to memory of 5096 3468 capxmqsy.exe 94 PID 3468 wrote to memory of 5096 3468 capxmqsy.exe 94 PID 3468 wrote to memory of 5096 3468 capxmqsy.exe 94 PID 5096 wrote to memory of 2124 5096 xmlsfjas.exe 95 PID 5096 wrote to memory of 2124 5096 xmlsfjas.exe 95 PID 5096 wrote to memory of 2124 5096 xmlsfjas.exe 95 PID 2124 wrote to memory of 3464 2124 cmdofthn.exe 96 PID 2124 wrote to memory of 3464 2124 cmdofthn.exe 96 PID 2124 wrote to memory of 3464 2124 cmdofthn.exe 96 PID 3464 wrote to memory of 4740 3464 ipssoola.exe 97 PID 3464 wrote to memory of 4740 3464 ipssoola.exe 97 PID 3464 wrote to memory of 4740 3464 ipssoola.exe 97 PID 4740 wrote to memory of 2648 4740 netrsmez.exe 98 PID 4740 wrote to memory of 2648 4740 netrsmez.exe 98 PID 4740 wrote to memory of 2648 4740 netrsmez.exe 98 PID 2648 wrote to memory of 3112 2648 clisrmkf.exe 101 PID 2648 wrote to memory of 3112 2648 clisrmkf.exe 101 PID 2648 wrote to memory of 3112 2648 clisrmkf.exe 101 PID 3112 wrote to memory of 400 3112 fxsjtoto.exe 102 PID 3112 wrote to memory of 400 3112 fxsjtoto.exe 102 PID 3112 wrote to memory of 400 3112 fxsjtoto.exe 102 PID 400 wrote to memory of 2356 400 apivujxt.exe 103 PID 400 wrote to memory of 2356 400 apivujxt.exe 103 PID 400 wrote to memory of 2356 400 apivujxt.exe 103 PID 2356 wrote to memory of 4500 2356 winwceny.exe 104 PID 2356 wrote to memory of 4500 2356 winwceny.exe 104 PID 2356 wrote to memory of 4500 2356 winwceny.exe 104 PID 4500 wrote to memory of 4888 4500 sysmnmuq.exe 106 PID 4500 wrote to memory of 4888 4500 sysmnmuq.exe 106 PID 4500 wrote to memory of 4888 4500 sysmnmuq.exe 106 PID 4888 wrote to memory of 220 4888 reglakfp.exe 108 PID 4888 wrote to memory of 220 4888 reglakfp.exe 108 PID 4888 wrote to memory of 220 4888 reglakfp.exe 108 PID 220 wrote to memory of 5008 220 condppjf.exe 109 PID 220 wrote to memory of 5008 220 condppjf.exe 109 PID 220 wrote to memory of 5008 220 condppjf.exe 109 PID 5008 wrote to memory of 1848 5008 cmdazubq.exe 110 PID 5008 wrote to memory of 1848 5008 cmdazubq.exe 110 PID 5008 wrote to memory of 1848 5008 cmdazubq.exe 110 PID 1848 wrote to memory of 5044 1848 winvjkhu.exe 111 PID 1848 wrote to memory of 5044 1848 winvjkhu.exe 111 PID 1848 wrote to memory of 5044 1848 winvjkhu.exe 111 PID 5044 wrote to memory of 2592 5044 capxyuux.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\b671cf1290e9b422689176d710987a1e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b671cf1290e9b422689176d710987a1e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\clixwqif.exeC:\Windows\system32\clixwqif.exe 1160 "C:\Users\Admin\AppData\Local\Temp\b671cf1290e9b422689176d710987a1e_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\apiriltc.exeC:\Windows\system32\apiriltc.exe 1128 "C:\Windows\SysWOW64\clixwqif.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\comzelfr.exeC:\Windows\system32\comzelfr.exe 1032 "C:\Windows\SysWOW64\apiriltc.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\ialhplmj.exeC:\Windows\system32\ialhplmj.exe 1136 "C:\Windows\SysWOW64\comzelfr.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\cmdzfqrz.exeC:\Windows\system32\cmdzfqrz.exe 1036 "C:\Windows\SysWOW64\ialhplmj.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\xmlqataz.exeC:\Windows\system32\xmlqataz.exe 1144 "C:\Windows\SysWOW64\cmdzfqrz.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\capxmqsy.exeC:\Windows\system32\capxmqsy.exe 1148 "C:\Windows\SysWOW64\xmlqataz.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\xmlsfjas.exeC:\Windows\system32\xmlsfjas.exe 1152 "C:\Windows\SysWOW64\capxmqsy.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\cmdofthn.exeC:\Windows\system32\cmdofthn.exe 1156 "C:\Windows\SysWOW64\xmlsfjas.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\ipssoola.exeC:\Windows\system32\ipssoola.exe 1140 "C:\Windows\SysWOW64\cmdofthn.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\netrsmez.exeC:\Windows\system32\netrsmez.exe 1172 "C:\Windows\SysWOW64\ipssoola.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\clisrmkf.exeC:\Windows\system32\clisrmkf.exe 1164 "C:\Windows\SysWOW64\netrsmez.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\fxsjtoto.exeC:\Windows\system32\fxsjtoto.exe 1176 "C:\Windows\SysWOW64\clisrmkf.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\apivujxt.exeC:\Windows\system32\apivujxt.exe 1168 "C:\Windows\SysWOW64\fxsjtoto.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\winwceny.exeC:\Windows\system32\winwceny.exe 1012 "C:\Windows\SysWOW64\apivujxt.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\sysmnmuq.exeC:\Windows\system32\sysmnmuq.exe 1188 "C:\Windows\SysWOW64\winwceny.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\reglakfp.exeC:\Windows\system32\reglakfp.exe 1184 "C:\Windows\SysWOW64\sysmnmuq.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\condppjf.exeC:\Windows\system32\condppjf.exe 1196 "C:\Windows\SysWOW64\reglakfp.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\cmdazubq.exeC:\Windows\system32\cmdazubq.exe 1020 "C:\Windows\SysWOW64\condppjf.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\winvjkhu.exeC:\Windows\system32\winvjkhu.exe 1028 "C:\Windows\SysWOW64\cmdazubq.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\capxyuux.exeC:\Windows\system32\capxyuux.exe 1204 "C:\Windows\SysWOW64\winvjkhu.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\xmltznjr.exeC:\Windows\system32\xmltznjr.exe 1212 "C:\Windows\SysWOW64\capxyuux.exe"23⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\dlloaxrm.exeC:\Windows\system32\dlloaxrm.exe 1216 "C:\Windows\SysWOW64\xmltznjr.exe"24⤵
- Executes dropped EXE
PID:4904 -
C:\Windows\SysWOW64\regemfyv.exeC:\Windows\system32\regemfyv.exe 1208 "C:\Windows\SysWOW64\dlloaxrm.exe"25⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\sysamqfq.exeC:\Windows\system32\sysamqfq.exe 1224 "C:\Windows\SysWOW64\regemfyv.exe"26⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\ipsnwflt.exeC:\Windows\system32\ipsnwflt.exe 1228 "C:\Windows\SysWOW64\sysamqfq.exe"27⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\fxsrgtdf.exeC:\Windows\system32\fxsrgtdf.exe 1004 "C:\Windows\SysWOW64\ipsnwflt.exe"28⤵
- Executes dropped EXE
PID:3080 -
C:\Windows\SysWOW64\apiwoozs.exeC:\Windows\system32\apiwoozs.exe 1044 "C:\Windows\SysWOW64\fxsrgtdf.exe"29⤵
- Executes dropped EXE
PID:4524 -
C:\Windows\SysWOW64\clivslrr.exeC:\Windows\system32\clivslrr.exe 1056 "C:\Windows\SysWOW64\apiwoozs.exe"30⤵
- Executes dropped EXE
PID:3180 -
C:\Windows\SysWOW64\drvezwui.exeC:\Windows\system32\drvezwui.exe 1244 "C:\Windows\SysWOW64\clivslrr.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4832 -
C:\Windows\SysWOW64\igfaagcd.exeC:\Windows\system32\igfaagcd.exe 1048 "C:\Windows\SysWOW64\drvezwui.exe"32⤵
- Executes dropped EXE
PID:3952 -
C:\Windows\SysWOW64\xmlcgwnp.exeC:\Windows\system32\xmlcgwnp.exe 1252 "C:\Windows\SysWOW64\igfaagcd.exe"33⤵
- Executes dropped EXE
PID:4152 -
C:\Windows\SysWOW64\netppmtt.exeC:\Windows\system32\netppmtt.exe 1256 "C:\Windows\SysWOW64\xmlcgwnp.exe"34⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\ipschbzx.exeC:\Windows\system32\ipschbzx.exe 1248 "C:\Windows\SysWOW64\netppmtt.exe"35⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\secmwmus.exeC:\Windows\system32\secmwmus.exe 1260 "C:\Windows\SysWOW64\ipschbzx.exe"36⤵
- Executes dropped EXE
PID:2416 -
C:\Windows\SysWOW64\cmdzobaw.exeC:\Windows\system32\cmdzobaw.exe 1268 "C:\Windows\SysWOW64\secmwmus.exe"37⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\apiyszkv.exeC:\Windows\system32\apiyszkv.exe 1272 "C:\Windows\SysWOW64\cmdzobaw.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3612 -
C:\Windows\SysWOW64\cmdljoqy.exeC:\Windows\system32\cmdljoqy.exe 1264 "C:\Windows\SysWOW64\apiyszkv.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5004 -
C:\Windows\SysWOW64\capvqzty.exeC:\Windows\system32\capvqzty.exe 1280 "C:\Windows\SysWOW64\cmdljoqy.exe"40⤵
- Executes dropped EXE
PID:928 -
C:\Windows\SysWOW64\ialuuxlx.exeC:\Windows\system32\ialuuxlx.exe 1284 "C:\Windows\SysWOW64\capvqzty.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2056 -
C:\Windows\SysWOW64\authlmra.exeC:\Windows\system32\authlmra.exe 1288 "C:\Windows\SysWOW64\ialuuxlx.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Windows\SysWOW64\comfgpab.exeC:\Windows\system32\comfgpab.exe 1292 "C:\Windows\SysWOW64\authlmra.exe"43⤵
- Executes dropped EXE
PID:612 -
C:\Windows\SysWOW64\ipsfkmkz.exeC:\Windows\system32\ipsfkmkz.exe 1240 "C:\Windows\SysWOW64\comfgpab.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3608 -
C:\Windows\SysWOW64\regorxnz.exeC:\Windows\system32\regorxnz.exe 1300 "C:\Windows\SysWOW64\ipsfkmkz.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4400 -
C:\Windows\SysWOW64\syskrivt.exeC:\Windows\system32\syskrivt.exe 1108 "C:\Windows\SysWOW64\regorxnz.exe"46⤵
- Executes dropped EXE
PID:3352 -
C:\Windows\SysWOW64\cmdamklc.exeC:\Windows\system32\cmdamklc.exe 1052 "C:\Windows\SysWOW64\syskrivt.exe"47⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\igflkvyf.exeC:\Windows\system32\igflkvyf.exe 1308 "C:\Windows\SysWOW64\cmdamklc.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4808 -
C:\Windows\SysWOW64\dlluixbw.exeC:\Windows\system32\dlluixbw.exe 1316 "C:\Windows\SysWOW64\igflkvyf.exe"49⤵
- Executes dropped EXE
PID:1284 -
C:\Windows\SysWOW64\advhzvha.exeC:\Windows\system32\advhzvha.exe 1312 "C:\Windows\SysWOW64\dlluixbw.exe"50⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\dllgetsz.exeC:\Windows\system32\dllgetsz.exe 1324 "C:\Windows\SysWOW64\advhzvha.exe"51⤵
- Executes dropped EXE
PID:1240 -
C:\Windows\SysWOW64\confgvah.exeC:\Windows\system32\confgvah.exe 1320 "C:\Windows\SysWOW64\dllgetsz.exe"52⤵
- Executes dropped EXE
PID:4760 -
C:\Windows\SysWOW64\netahgqc.exeC:\Windows\system32\netahgqc.exe 1304 "C:\Windows\SysWOW64\confgvah.exe"53⤵
- Executes dropped EXE
PID:4100 -
C:\Windows\SysWOW64\advwaqxw.exeC:\Windows\system32\advwaqxw.exe 1336 "C:\Windows\SysWOW64\netahgqc.exe"54⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\netvmviv.exeC:\Windows\system32\netvmviv.exe 1328 "C:\Windows\SysWOW64\advwaqxw.exe"55⤵
- Executes dropped EXE
PID:3988 -
C:\Windows\SysWOW64\adviwloz.exeC:\Windows\system32\adviwloz.exe 1344 "C:\Windows\SysWOW64\netvmviv.exe"56⤵
- Executes dropped EXE
PID:4936 -
C:\Windows\SysWOW64\comvnbbu.exeC:\Windows\system32\comvnbbu.exe 1348 "C:\Windows\SysWOW64\adviwloz.exe"57⤵
- Executes dropped EXE
PID:3640 -
C:\Windows\SysWOW64\secroljp.exeC:\Windows\system32\secroljp.exe 1352 "C:\Windows\SysWOW64\comvnbbu.exe"58⤵PID:3900
-
C:\Windows\SysWOW64\cmdeyjpt.exeC:\Windows\system32\cmdeyjpt.exe 1356 "C:\Windows\SysWOW64\secroljp.exe"59⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\apilkgzs.exeC:\Windows\system32\apilkgzs.exe 1360 "C:\Windows\SysWOW64\cmdeyjpt.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Windows\SysWOW64\comkoesq.exeC:\Windows\system32\comkoesq.exe 1340 "C:\Windows\SysWOW64\apilkgzs.exe"61⤵
- Executes dropped EXE
PID:4788 -
C:\Windows\SysWOW64\apixguxu.exeC:\Windows\system32\apixguxu.exe 1296 "C:\Windows\SysWOW64\comkoesq.exe"62⤵
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\ialkpjdy.exeC:\Windows\system32\ialkpjdy.exe 1372 "C:\Windows\SysWOW64\apixguxu.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3368 -
C:\Windows\SysWOW64\winjbhox.exeC:\Windows\system32\winjbhox.exe 1368 "C:\Windows\SysWOW64\ialkpjdy.exe"64⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\fxselett.exeC:\Windows\system32\fxselett.exe 1376 "C:\Windows\SysWOW64\winjbhox.exe"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1384 -
C:\Windows\SysWOW64\dlloacyj.exeC:\Windows\system32\dlloacyj.exe 1040 "C:\Windows\SysWOW64\fxselett.exe"66⤵
- Executes dropped EXE
PID:4536 -
C:\Windows\SysWOW64\conndfhr.exeC:\Windows\system32\conndfhr.exe 1064 "C:\Windows\SysWOW64\dlloacyj.exe"67⤵PID:3996
-
C:\Windows\SysWOW64\sysanuvv.exeC:\Windows\system32\sysanuvv.exe 1388 "C:\Windows\SysWOW64\conndfhr.exe"68⤵PID:4184
-
C:\Windows\SysWOW64\regzzafu.exeC:\Windows\system32\regzzafu.exe 1396 "C:\Windows\SysWOW64\sysanuvv.exe"69⤵PID:2280
-
C:\Windows\SysWOW64\drvmiplx.exeC:\Windows\system32\drvmiplx.exe 1392 "C:\Windows\SysWOW64\regzzafu.exe"70⤵PID:1572
-
C:\Windows\SysWOW64\cmdtvnvw.exeC:\Windows\system32\cmdtvnvw.exe 1400 "C:\Windows\SysWOW64\drvmiplx.exe"71⤵PID:2552
-
C:\Windows\SysWOW64\sysonxlr.exeC:\Windows\system32\sysonxlr.exe 1408 "C:\Windows\SysWOW64\cmdtvnvw.exe"72⤵PID:1156
-
C:\Windows\SysWOW64\regnavvp.exeC:\Windows\system32\regnavvp.exe 1412 "C:\Windows\SysWOW64\sysonxlr.exe"73⤵PID:2712
-
C:\Windows\SysWOW64\capoxlxq.exeC:\Windows\system32\capoxlxq.exe 1404 "C:\Windows\SysWOW64\regnavvp.exe"74⤵PID:2004
-
C:\Windows\SysWOW64\ipswkdjg.exeC:\Windows\system32\ipswkdjg.exe 1416 "C:\Windows\SysWOW64\capoxlxq.exe"75⤵PID:1004
-
C:\Windows\SysWOW64\cmdgqgmf.exeC:\Windows\system32\cmdgqgmf.exe 1424 "C:\Windows\SysWOW64\ipswkdjg.exe"76⤵PID:4516
-
C:\Windows\SysWOW64\ialiwvxs.exeC:\Windows\system32\ialiwvxs.exe 1380 "C:\Windows\SysWOW64\cmdgqgmf.exe"77⤵PID:1324
-
C:\Windows\SysWOW64\capdxonm.exeC:\Windows\system32\capdxonm.exe 1428 "C:\Windows\SysWOW64\ialiwvxs.exe"78⤵PID:428
-
C:\Windows\SysWOW64\regixbrr.exeC:\Windows\system32\regixbrr.exe 1436 "C:\Windows\SysWOW64\capdxonm.exe"79⤵PID:4916
-
C:\Windows\SysWOW64\sechkgbq.exeC:\Windows\system32\sechkgbq.exe 1420 "C:\Windows\SysWOW64\regixbrr.exe"80⤵PID:1920
-
C:\Windows\SysWOW64\regccqjl.exeC:\Windows\system32\regccqjl.exe 1440 "C:\Windows\SysWOW64\sechkgbq.exe"81⤵PID:3824
-
C:\Windows\SysWOW64\igfeigux.exeC:\Windows\system32\igfeigux.exe 1448 "C:\Windows\SysWOW64\regccqjl.exe"82⤵PID:1504
-
C:\Windows\SysWOW64\comajrks.exeC:\Windows\system32\comajrks.exe 1444 "C:\Windows\SysWOW64\igfeigux.exe"83⤵PID:4132
-
C:\Windows\SysWOW64\apinbgqw.exeC:\Windows\system32\apinbgqw.exe 1456 "C:\Windows\SysWOW64\comajrks.exe"84⤵PID:432
-
C:\Windows\SysWOW64\dllakwvr.exeC:\Windows\system32\dllakwvr.exe 1452 "C:\Windows\SysWOW64\apinbgqw.exe"85⤵PID:3424
-
C:\Windows\SysWOW64\winvlodm.exeC:\Windows\system32\winvlodm.exe 1068 "C:\Windows\SysWOW64\dllakwvr.exe"86⤵PID:4244
-
C:\Windows\SysWOW64\dllvxmnl.exeC:\Windows\system32\dllvxmnl.exe 1464 "C:\Windows\SysWOW64\winvlodm.exe"87⤵PID:2688
-
C:\Windows\SysWOW64\winqhcbo.exeC:\Windows\system32\winqhcbo.exe 1472 "C:\Windows\SysWOW64\dllvxmnl.exe"88⤵PID:2332
-
C:\Windows\SysWOW64\fxsdzrhs.exeC:\Windows\system32\fxsdzrhs.exe 1468 "C:\Windows\SysWOW64\winqhcbo.exe"89⤵PID:4520
-
C:\Windows\SysWOW64\ipsttuqa.exeC:\Windows\system32\ipsttuqa.exe 1480 "C:\Windows\SysWOW64\fxsdzrhs.exe"90⤵PID:1628
-
C:\Windows\SysWOW64\cliglsvw.exeC:\Windows\system32\cliglsvw.exe 1484 "C:\Windows\SysWOW64\ipsttuqa.exe"91⤵
- Drops file in System32 directory
PID:1328 -
C:\Windows\SysWOW64\igfnppgv.exeC:\Windows\system32\igfnppgv.exe 1488 "C:\Windows\SysWOW64\cliglsvw.exe"92⤵PID:996
-
C:\Windows\SysWOW64\capahfmz.exeC:\Windows\system32\capahfmz.exe 1476 "C:\Windows\SysWOW64\igfnppgv.exe"93⤵PID:4688
-
C:\Windows\SysWOW64\fxsrbhuh.exeC:\Windows\system32\fxsrbhuh.exe 1496 "C:\Windows\SysWOW64\capahfmz.exe"94⤵PID:4236
-
C:\Windows\SysWOW64\advqofng.exeC:\Windows\system32\advqofng.exe 1500 "C:\Windows\SysWOW64\fxsrbhuh.exe"95⤵PID:2916
-
C:\Windows\SysWOW64\sysoiivg.exeC:\Windows\system32\sysoiivg.exe 1432 "C:\Windows\SysWOW64\advqofng.exe"96⤵PID:876
-
C:\Windows\SysWOW64\igfbsxbk.exeC:\Windows\system32\igfbsxbk.exe 1492 "C:\Windows\SysWOW64\sysoiivg.exe"97⤵
- Drops file in System32 directory
PID:4604 -
C:\Windows\SysWOW64\cmdlyaej.exeC:\Windows\system32\cmdlyaej.exe 1512 "C:\Windows\SysWOW64\igfbsxbk.exe"98⤵PID:3956
-
C:\Windows\SysWOW64\xmlbbdns.exeC:\Windows\system32\xmlbbdns.exe 1516 "C:\Windows\SysWOW64\cmdlyaej.exe"99⤵PID:1064
-
C:\Windows\SysWOW64\capafixq.exeC:\Windows\system32\capafixq.exe 1520 "C:\Windows\SysWOW64\xmlbbdns.exe"100⤵
- Drops file in System32 directory
PID:4328 -
C:\Windows\SysWOW64\ialhrfpp.exeC:\Windows\system32\ialhrfpp.exe 1504 "C:\Windows\SysWOW64\capafixq.exe"101⤵PID:1388
-
C:\Windows\SysWOW64\sysignjq.exeC:\Windows\system32\sysignjq.exe 1524 "C:\Windows\SysWOW64\ialhrfpp.exe"102⤵
- Drops file in System32 directory
PID:1204 -
C:\Windows\SysWOW64\comlwyet.exeC:\Windows\system32\comlwyet.exe 1532 "C:\Windows\SysWOW64\sysignjq.exe"103⤵PID:3456
-
C:\Windows\SysWOW64\drvucbht.exeC:\Windows\system32\drvucbht.exe 1528 "C:\Windows\SysWOW64\comlwyet.exe"104⤵PID:4828
-
C:\Windows\SysWOW64\clifrluw.exeC:\Windows\system32\clifrluw.exe 1540 "C:\Windows\SysWOW64\drvucbht.exe"105⤵
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Windows\SysWOW64\advgotvx.exeC:\Windows\system32\advgotvx.exe 1548 "C:\Windows\SysWOW64\clifrluw.exe"106⤵PID:4128
-
C:\Windows\SysWOW64\dllfaygw.exeC:\Windows\system32\dllfaygw.exe 1460 "C:\Windows\SysWOW64\advgotvx.exe"107⤵PID:2372
-
C:\Windows\SysWOW64\autskolz.exeC:\Windows\system32\autskolz.exe 1552 "C:\Windows\SysWOW64\dllfaygw.exe"108⤵
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\fxsrwmey.exeC:\Windows\system32\fxsrwmey.exe 1556 "C:\Windows\SysWOW64\autskolz.exe"109⤵PID:3860
-
C:\Windows\SysWOW64\ipsqromg.exeC:\Windows\system32\ipsqromg.exe 1560 "C:\Windows\SysWOW64\fxsrwmey.exe"110⤵PID:1560
-
C:\Windows\SysWOW64\cmdzxrpy.exeC:\Windows\system32\cmdzxrpy.exe 1536 "C:\Windows\SysWOW64\ipsqromg.exe"111⤵PID:4368
-
C:\Windows\SysWOW64\igfcmbdb.exeC:\Windows\system32\igfcmbdb.exe 1564 "C:\Windows\SysWOW64\cmdzxrpy.exe"112⤵
- Drops file in System32 directory
PID:3644 -
C:\Windows\SysWOW64\winahelj.exeC:\Windows\system32\winahelj.exe 1568 "C:\Windows\SysWOW64\igfcmbdb.exe"113⤵PID:3428
-
C:\Windows\SysWOW64\conkohoj.exeC:\Windows\system32\conkohoj.exe 1544 "C:\Windows\SysWOW64\winahelj.exe"114⤵PID:4968
-
C:\Windows\SysWOW64\secaqjxr.exeC:\Windows\system32\secaqjxr.exe 1576 "C:\Windows\SysWOW64\conkohoj.exe"115⤵PID:2076
-
C:\Windows\SysWOW64\comzvppi.exeC:\Windows\system32\comzvppi.exe 1580 "C:\Windows\SysWOW64\secaqjxr.exe"116⤵PID:4452
-
C:\Windows\SysWOW64\secmmfvl.exeC:\Windows\system32\secmmfvl.exe 1592 "C:\Windows\SysWOW64\comzvppi.exe"117⤵PID:1728
-
C:\Windows\SysWOW64\comtqcgk.exeC:\Windows\system32\comtqcgk.exe 1588 "C:\Windows\SysWOW64\secmmfvl.exe"118⤵PID:2116
-
C:\Windows\SysWOW64\apigislo.exeC:\Windows\system32\apigislo.exe 1596 "C:\Windows\SysWOW64\comtqcgk.exe"119⤵PID:1020
-
C:\Windows\SysWOW64\capxduuw.exeC:\Windows\system32\capxduuw.exe 1600 "C:\Windows\SysWOW64\apigislo.exe"120⤵PID:2852
-
C:\Windows\SysWOW64\advgjxxo.exeC:\Windows\system32\advgjxxo.exe 1604 "C:\Windows\SysWOW64\capxduuw.exe"121⤵PID:2396
-
C:\Windows\SysWOW64\sysfeagw.exeC:\Windows\system32\sysfeagw.exe 1608 "C:\Windows\SysWOW64\advgjxxo.exe"122⤵PID:916
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-