Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe
-
Size
137KB
-
MD5
f88ea9233fec35960bbb4feeabcff945
-
SHA1
c28c78118273d41865321b9904fccd820b18bb53
-
SHA256
61aa531af8b25f9f62027debbc860e4d18a7fe9a4f7744a7d596c32b94ba2699
-
SHA512
7c930e5c5fdd6669611a45a378ee5467d5b5d947d61c6201a7b21f926d53c9bc1a05554eb139c4a024e675acbbab8ea7e557b7e01aa0dd8d4a9fb15fc6d73f4a
-
SSDEEP
3072:lghyf/VUpgyY9xhGhy3otLz/a+sjBriJFyokBfpzbh+C2oQCZv6:WCSgJ9xhG2Ya+G2yoW9bhrr3B6
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 64 IoCs
pid Process 1984 jybups.exe 2936 tjqeco.exe 2780 fdwmwa.exe 2704 vtquvk.exe 2792 fsurni.exe 2652 suahyv.exe 2756 cpbrgp.exe 796 sbymqd.exe 1432 bpyjol.exe 2268 lochyj.exe 1864 beohft.exe 2560 ourknb.exe 1704 tlnejp.exe 1560 gjqhsp.exe 2496 vgqhep.exe 2452 ckauob.exe 2120 sexhxo.exe 1956 fuskgx.exe 1928 ptehzv.exe 1056 zsifju.exe 2800 muouuz.exe 2840 wqpfct.exe 2920 lnxnot.exe 2604 yahcup.exe 2044 lcnsoc.exe 1792 ysqnwk.exe 1980 idfxjn.exe 1688 vflnvr.exe 2392 isdcbv.exe 1408 susnwy.exe 1504 bfhxjb.exe 2040 memvta.exe 2180 zrdkzw.exe 1712 eqynie.exe 2428 rgbqym.exe 1660 bjqamq.exe 1544 nhlduq.exe 1924 xkanit.exe 2504 kmgdbf.exe 1580 xzythj.exe 2700 hjndue.exe 2724 uwftai.exe 2304 ezudnl.exe 2708 rypget.exe 2628 eokjmu.exe 1068 ockycb.exe 1440 atnblj.exe 2160 nridtr.exe 2868 aidgcr.exe 2228 nggjla.exe 2928 xmggjh.exe 2288 klbjrh.exe 612 xbwlap.exe 1748 hmlons.exe 1800 xqujry.exe 1516 geugpf.exe 2360 tvpjyn.exe 1832 glkmgn.exe 884 tknopw.exe 2156 gahrye.exe 1524 poigwl.exe 2948 cfdjel.exe 2852 pdgmnu.exe 2696 cuaovc.exe -
Loads dropped DLL 64 IoCs
pid Process 2368 f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe 2368 f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe 1984 jybups.exe 1984 jybups.exe 2936 tjqeco.exe 2936 tjqeco.exe 2780 fdwmwa.exe 2780 fdwmwa.exe 2704 vtquvk.exe 2704 vtquvk.exe 2792 fsurni.exe 2792 fsurni.exe 2652 suahyv.exe 2652 suahyv.exe 2756 cpbrgp.exe 2756 cpbrgp.exe 796 sbymqd.exe 796 sbymqd.exe 1432 bpyjol.exe 1432 bpyjol.exe 2268 lochyj.exe 2268 lochyj.exe 1864 beohft.exe 1864 beohft.exe 2560 ourknb.exe 2560 ourknb.exe 1704 tlnejp.exe 1704 tlnejp.exe 1560 gjqhsp.exe 1560 gjqhsp.exe 2496 vgqhep.exe 2496 vgqhep.exe 2452 ckauob.exe 2452 ckauob.exe 2120 sexhxo.exe 2120 sexhxo.exe 1956 fuskgx.exe 1956 fuskgx.exe 1928 ptehzv.exe 1928 ptehzv.exe 1056 zsifju.exe 1056 zsifju.exe 2800 muouuz.exe 2800 muouuz.exe 2840 wqpfct.exe 2840 wqpfct.exe 2920 lnxnot.exe 2920 lnxnot.exe 2604 yahcup.exe 2604 yahcup.exe 2044 lcnsoc.exe 2044 lcnsoc.exe 1792 ysqnwk.exe 1792 ysqnwk.exe 1980 idfxjn.exe 1980 idfxjn.exe 1688 vflnvr.exe 1688 vflnvr.exe 2392 isdcbv.exe 2392 isdcbv.exe 1408 susnwy.exe 1408 susnwy.exe 1504 bfhxjb.exe 1504 bfhxjb.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\matfer.exe zczcwr.exe File opened for modification C:\Windows\SysWOW64\wlrmvj.exe mwroxk.exe File opened for modification C:\Windows\SysWOW64\fkdrtx.exe stapkx.exe File created C:\Windows\SysWOW64\rztznh.exe ebywey.exe File opened for modification C:\Windows\SysWOW64\zixtii.exe pgiive.exe File created C:\Windows\SysWOW64\ixcubj.exe vyzasb.exe File opened for modification C:\Windows\SysWOW64\sjvncu.exe jduymn.exe File opened for modification C:\Windows\SysWOW64\txejjc.exe jjeutu.exe File opened for modification C:\Windows\SysWOW64\qbwtcq.exe dltqui.exe File created C:\Windows\SysWOW64\exsvpa.exe rgxshz.exe File created C:\Windows\SysWOW64\mbbdsu.exe zdhajm.exe File opened for modification C:\Windows\SysWOW64\efames.exe udlbip.exe File created C:\Windows\SysWOW64\tcyguc.exe gevdlu.exe File opened for modification C:\Windows\SysWOW64\tcvjus.exe kocmes.exe File opened for modification C:\Windows\SysWOW64\nqxeel.exe ecwhgd.exe File created C:\Windows\SysWOW64\kjdxpg.exe wwlzjc.exe File opened for modification C:\Windows\SysWOW64\jwsvxd.exe aisyzv.exe File opened for modification C:\Windows\SysWOW64\yhulrl.exe mizijc.exe File created C:\Windows\SysWOW64\kclhkz.exe xljfcr.exe File opened for modification C:\Windows\SysWOW64\zopgve.exe nymemw.exe File opened for modification C:\Windows\SysWOW64\cwhskc.exe qymxct.exe File created C:\Windows\SysWOW64\zkwjeo.exe mutgwg.exe File opened for modification C:\Windows\SysWOW64\ajnvop.exe qvnyyi.exe File opened for modification C:\Windows\SysWOW64\piifuw.exe cjodlo.exe File opened for modification C:\Windows\SysWOW64\xzythj.exe kmgdbf.exe File created C:\Windows\SysWOW64\mqomjm.exe zatjbe.exe File created C:\Windows\SysWOW64\yymphn.exe mzruzf.exe File opened for modification C:\Windows\SysWOW64\yymphn.exe mzruzf.exe File created C:\Windows\SysWOW64\jswqdj.exe wccnuj.exe File created C:\Windows\SysWOW64\qfbiur.exe hrilek.exe File created C:\Windows\SysWOW64\huozef.exe udtewx.exe File opened for modification C:\Windows\SysWOW64\bgmftz.exe oprckr.exe File created C:\Windows\SysWOW64\iqkuva.exe vaprnz.exe File opened for modification C:\Windows\SysWOW64\xbcfxs.exe kchchk.exe File created C:\Windows\SysWOW64\gjvtlw.exe thpdak.exe File created C:\Windows\SysWOW64\ngrljy.exe apxibx.exe File opened for modification C:\Windows\SysWOW64\lsarrt.exe ybfoit.exe File created C:\Windows\SysWOW64\vggfpo.exe ipldgg.exe File opened for modification C:\Windows\SysWOW64\rfiioq.exe irilyj.exe File opened for modification C:\Windows\SysWOW64\gvofqb.exe whnhab.exe File opened for modification C:\Windows\SysWOW64\qetgwy.exe dgzegy.exe File opened for modification C:\Windows\SysWOW64\akqhku.exe ntnecm.exe File opened for modification C:\Windows\SysWOW64\ejfiwe.exe rkkfnw.exe File opened for modification C:\Windows\SysWOW64\puzknp.exe cvfhfp.exe File opened for modification C:\Windows\SysWOW64\wegpth.exe jfdmkz.exe File opened for modification C:\Windows\SysWOW64\nwkhsi.exe dijkcj.exe File created C:\Windows\SysWOW64\yhlvjh.exe lrqsaz.exe File opened for modification C:\Windows\SysWOW64\qebhdl.exe dnheud.exe File opened for modification C:\Windows\SysWOW64\fjhxpn.exe asmugf.exe File created C:\Windows\SysWOW64\guxoug.exe xgwqeh.exe File created C:\Windows\SysWOW64\sfztyp.exe icjjlm.exe File opened for modification C:\Windows\SysWOW64\rutmro.exe evyjjg.exe File created C:\Windows\SysWOW64\kiofee.exe fvxpyb.exe File opened for modification C:\Windows\SysWOW64\zgwmpb.exe meqedp.exe File opened for modification C:\Windows\SysWOW64\ksmbsc.exe ycsyjb.exe File opened for modification C:\Windows\SysWOW64\bpwjuw.exe rjetep.exe File created C:\Windows\SysWOW64\aidgcr.exe nridtr.exe File created C:\Windows\SysWOW64\mvhjwl.exe zixtii.exe File opened for modification C:\Windows\SysWOW64\aisyzv.exe nsxvqv.exe File opened for modification C:\Windows\SysWOW64\irilyj.exe vanipj.exe File opened for modification C:\Windows\SysWOW64\qslcpl.exe ghnrci.exe File opened for modification C:\Windows\SysWOW64\wrztlr.exe jswqdj.exe File created C:\Windows\SysWOW64\shpchh.exe fqvazh.exe File opened for modification C:\Windows\SysWOW64\msfusr.exe cdfxck.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omvsur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnkfkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjvncu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ohbejj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gkwzof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language susnwy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhlduq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nmlkep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjmego.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tckzat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language escfkh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqyiep.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdwmwa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtquvk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dijkcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vgpyca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kchchk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbvzsl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whnhab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khkgjs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qvsuwf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evyjjg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language osmyrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yttaco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aijnrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whjnlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language culvgn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zopgve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ollajp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymmaab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language equqqr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ghnrci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpvhoh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vepgue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language walelj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ysxfgv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgxshz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cpvmsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnwxrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oyoeyw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ydzahn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kshjwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jlxjvz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksmbsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xzythj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zixtii.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vyzasb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsjrkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utppyv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hqbffb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language azewyt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oiaqlt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dflznx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vwmwlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljitrc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aisyzv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jncvtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahcup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bycsut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ktoltf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afiyeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmggqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adowpw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sayucg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1984 2368 f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1984 2368 f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1984 2368 f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1984 2368 f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe 30 PID 1984 wrote to memory of 2936 1984 jybups.exe 31 PID 1984 wrote to memory of 2936 1984 jybups.exe 31 PID 1984 wrote to memory of 2936 1984 jybups.exe 31 PID 1984 wrote to memory of 2936 1984 jybups.exe 31 PID 2936 wrote to memory of 2780 2936 tjqeco.exe 32 PID 2936 wrote to memory of 2780 2936 tjqeco.exe 32 PID 2936 wrote to memory of 2780 2936 tjqeco.exe 32 PID 2936 wrote to memory of 2780 2936 tjqeco.exe 32 PID 2780 wrote to memory of 2704 2780 fdwmwa.exe 33 PID 2780 wrote to memory of 2704 2780 fdwmwa.exe 33 PID 2780 wrote to memory of 2704 2780 fdwmwa.exe 33 PID 2780 wrote to memory of 2704 2780 fdwmwa.exe 33 PID 2704 wrote to memory of 2792 2704 vtquvk.exe 34 PID 2704 wrote to memory of 2792 2704 vtquvk.exe 34 PID 2704 wrote to memory of 2792 2704 vtquvk.exe 34 PID 2704 wrote to memory of 2792 2704 vtquvk.exe 34 PID 2792 wrote to memory of 2652 2792 fsurni.exe 35 PID 2792 wrote to memory of 2652 2792 fsurni.exe 35 PID 2792 wrote to memory of 2652 2792 fsurni.exe 35 PID 2792 wrote to memory of 2652 2792 fsurni.exe 35 PID 2652 wrote to memory of 2756 2652 suahyv.exe 36 PID 2652 wrote to memory of 2756 2652 suahyv.exe 36 PID 2652 wrote to memory of 2756 2652 suahyv.exe 36 PID 2652 wrote to memory of 2756 2652 suahyv.exe 36 PID 2756 wrote to memory of 796 2756 cpbrgp.exe 38 PID 2756 wrote to memory of 796 2756 cpbrgp.exe 38 PID 2756 wrote to memory of 796 2756 cpbrgp.exe 38 PID 2756 wrote to memory of 796 2756 cpbrgp.exe 38 PID 796 wrote to memory of 1432 796 sbymqd.exe 39 PID 796 wrote to memory of 1432 796 sbymqd.exe 39 PID 796 wrote to memory of 1432 796 sbymqd.exe 39 PID 796 wrote to memory of 1432 796 sbymqd.exe 39 PID 1432 wrote to memory of 2268 1432 bpyjol.exe 40 PID 1432 wrote to memory of 2268 1432 bpyjol.exe 40 PID 1432 wrote to memory of 2268 1432 bpyjol.exe 40 PID 1432 wrote to memory of 2268 1432 bpyjol.exe 40 PID 2268 wrote to memory of 1864 2268 lochyj.exe 41 PID 2268 wrote to memory of 1864 2268 lochyj.exe 41 PID 2268 wrote to memory of 1864 2268 lochyj.exe 41 PID 2268 wrote to memory of 1864 2268 lochyj.exe 41 PID 1864 wrote to memory of 2560 1864 beohft.exe 42 PID 1864 wrote to memory of 2560 1864 beohft.exe 42 PID 1864 wrote to memory of 2560 1864 beohft.exe 42 PID 1864 wrote to memory of 2560 1864 beohft.exe 42 PID 2560 wrote to memory of 1704 2560 ourknb.exe 43 PID 2560 wrote to memory of 1704 2560 ourknb.exe 43 PID 2560 wrote to memory of 1704 2560 ourknb.exe 43 PID 2560 wrote to memory of 1704 2560 ourknb.exe 43 PID 1704 wrote to memory of 1560 1704 tlnejp.exe 44 PID 1704 wrote to memory of 1560 1704 tlnejp.exe 44 PID 1704 wrote to memory of 1560 1704 tlnejp.exe 44 PID 1704 wrote to memory of 1560 1704 tlnejp.exe 44 PID 1560 wrote to memory of 2496 1560 gjqhsp.exe 45 PID 1560 wrote to memory of 2496 1560 gjqhsp.exe 45 PID 1560 wrote to memory of 2496 1560 gjqhsp.exe 45 PID 1560 wrote to memory of 2496 1560 gjqhsp.exe 45 PID 2496 wrote to memory of 2452 2496 vgqhep.exe 46 PID 2496 wrote to memory of 2452 2496 vgqhep.exe 46 PID 2496 wrote to memory of 2452 2496 vgqhep.exe 46 PID 2496 wrote to memory of 2452 2496 vgqhep.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\jybups.exeC:\Windows\system32\jybups.exe 472 "C:\Users\Admin\AppData\Local\Temp\f88ea9233fec35960bbb4feeabcff945_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\tjqeco.exeC:\Windows\system32\tjqeco.exe 532 "C:\Windows\SysWOW64\jybups.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\fdwmwa.exeC:\Windows\system32\fdwmwa.exe 544 "C:\Windows\SysWOW64\tjqeco.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\vtquvk.exeC:\Windows\system32\vtquvk.exe 536 "C:\Windows\SysWOW64\fdwmwa.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\fsurni.exeC:\Windows\system32\fsurni.exe 540 "C:\Windows\SysWOW64\vtquvk.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\suahyv.exeC:\Windows\system32\suahyv.exe 548 "C:\Windows\SysWOW64\fsurni.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cpbrgp.exeC:\Windows\system32\cpbrgp.exe 560 "C:\Windows\SysWOW64\suahyv.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\sbymqd.exeC:\Windows\system32\sbymqd.exe 552 "C:\Windows\SysWOW64\cpbrgp.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\bpyjol.exeC:\Windows\system32\bpyjol.exe 564 "C:\Windows\SysWOW64\sbymqd.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\lochyj.exeC:\Windows\system32\lochyj.exe 572 "C:\Windows\SysWOW64\bpyjol.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\beohft.exeC:\Windows\system32\beohft.exe 576 "C:\Windows\SysWOW64\lochyj.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\ourknb.exeC:\Windows\system32\ourknb.exe 580 "C:\Windows\SysWOW64\beohft.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\tlnejp.exeC:\Windows\system32\tlnejp.exe 556 "C:\Windows\SysWOW64\ourknb.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\gjqhsp.exeC:\Windows\system32\gjqhsp.exe 568 "C:\Windows\SysWOW64\tlnejp.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\vgqhep.exeC:\Windows\system32\vgqhep.exe 588 "C:\Windows\SysWOW64\gjqhsp.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\ckauob.exeC:\Windows\system32\ckauob.exe 584 "C:\Windows\SysWOW64\vgqhep.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2452 -
C:\Windows\SysWOW64\sexhxo.exeC:\Windows\system32\sexhxo.exe 596 "C:\Windows\SysWOW64\ckauob.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120 -
C:\Windows\SysWOW64\fuskgx.exeC:\Windows\system32\fuskgx.exe 600 "C:\Windows\SysWOW64\sexhxo.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1956 -
C:\Windows\SysWOW64\ptehzv.exeC:\Windows\system32\ptehzv.exe 604 "C:\Windows\SysWOW64\fuskgx.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928 -
C:\Windows\SysWOW64\zsifju.exeC:\Windows\system32\zsifju.exe 612 "C:\Windows\SysWOW64\ptehzv.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1056 -
C:\Windows\SysWOW64\muouuz.exeC:\Windows\system32\muouuz.exe 608 "C:\Windows\SysWOW64\zsifju.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2800 -
C:\Windows\SysWOW64\wqpfct.exeC:\Windows\system32\wqpfct.exe 592 "C:\Windows\SysWOW64\muouuz.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Windows\SysWOW64\lnxnot.exeC:\Windows\system32\lnxnot.exe 616 "C:\Windows\SysWOW64\wqpfct.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920 -
C:\Windows\SysWOW64\yahcup.exeC:\Windows\system32\yahcup.exe 632 "C:\Windows\SysWOW64\lnxnot.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Windows\SysWOW64\lcnsoc.exeC:\Windows\system32\lcnsoc.exe 620 "C:\Windows\SysWOW64\yahcup.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044 -
C:\Windows\SysWOW64\ysqnwk.exeC:\Windows\system32\ysqnwk.exe 624 "C:\Windows\SysWOW64\lcnsoc.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1792 -
C:\Windows\SysWOW64\idfxjn.exeC:\Windows\system32\idfxjn.exe 628 "C:\Windows\SysWOW64\ysqnwk.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1980 -
C:\Windows\SysWOW64\vflnvr.exeC:\Windows\system32\vflnvr.exe 636 "C:\Windows\SysWOW64\idfxjn.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688 -
C:\Windows\SysWOW64\isdcbv.exeC:\Windows\system32\isdcbv.exe 640 "C:\Windows\SysWOW64\vflnvr.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2392 -
C:\Windows\SysWOW64\susnwy.exeC:\Windows\system32\susnwy.exe 652 "C:\Windows\SysWOW64\isdcbv.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Windows\SysWOW64\bfhxjb.exeC:\Windows\system32\bfhxjb.exe 644 "C:\Windows\SysWOW64\susnwy.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1504 -
C:\Windows\SysWOW64\memvta.exeC:\Windows\system32\memvta.exe 660 "C:\Windows\SysWOW64\bfhxjb.exe"33⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\zrdkzw.exeC:\Windows\system32\zrdkzw.exe 656 "C:\Windows\SysWOW64\memvta.exe"34⤵
- Executes dropped EXE
PID:2180 -
C:\Windows\SysWOW64\eqynie.exeC:\Windows\system32\eqynie.exe 676 "C:\Windows\SysWOW64\zrdkzw.exe"35⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\rgbqym.exeC:\Windows\system32\rgbqym.exe 648 "C:\Windows\SysWOW64\eqynie.exe"36⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\bjqamq.exeC:\Windows\system32\bjqamq.exe 668 "C:\Windows\SysWOW64\rgbqym.exe"37⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\nhlduq.exeC:\Windows\system32\nhlduq.exe 664 "C:\Windows\SysWOW64\bjqamq.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\xkanit.exeC:\Windows\system32\xkanit.exe 688 "C:\Windows\SysWOW64\nhlduq.exe"39⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\kmgdbf.exeC:\Windows\system32\kmgdbf.exe 672 "C:\Windows\SysWOW64\xkanit.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\xzythj.exeC:\Windows\system32\xzythj.exe 680 "C:\Windows\SysWOW64\kmgdbf.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\hjndue.exeC:\Windows\system32\hjndue.exe 684 "C:\Windows\SysWOW64\xzythj.exe"42⤵
- Executes dropped EXE
PID:2700 -
C:\Windows\SysWOW64\uwftai.exeC:\Windows\system32\uwftai.exe 700 "C:\Windows\SysWOW64\hjndue.exe"43⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\ezudnl.exeC:\Windows\system32\ezudnl.exe 696 "C:\Windows\SysWOW64\uwftai.exe"44⤵
- Executes dropped EXE
PID:2304 -
C:\Windows\SysWOW64\rypget.exeC:\Windows\system32\rypget.exe 712 "C:\Windows\SysWOW64\ezudnl.exe"45⤵
- Executes dropped EXE
PID:2708 -
C:\Windows\SysWOW64\eokjmu.exeC:\Windows\system32\eokjmu.exe 704 "C:\Windows\SysWOW64\rypget.exe"46⤵
- Executes dropped EXE
PID:2628 -
C:\Windows\SysWOW64\ockycb.exeC:\Windows\system32\ockycb.exe 716 "C:\Windows\SysWOW64\eokjmu.exe"47⤵
- Executes dropped EXE
PID:1068 -
C:\Windows\SysWOW64\atnblj.exeC:\Windows\system32\atnblj.exe 692 "C:\Windows\SysWOW64\ockycb.exe"48⤵
- Executes dropped EXE
PID:1440 -
C:\Windows\SysWOW64\nridtr.exeC:\Windows\system32\nridtr.exe 708 "C:\Windows\SysWOW64\atnblj.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2160 -
C:\Windows\SysWOW64\aidgcr.exeC:\Windows\system32\aidgcr.exe 724 "C:\Windows\SysWOW64\nridtr.exe"50⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\nggjla.exeC:\Windows\system32\nggjla.exe 732 "C:\Windows\SysWOW64\aidgcr.exe"51⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\xmggjh.exeC:\Windows\system32\xmggjh.exe 720 "C:\Windows\SysWOW64\nggjla.exe"52⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\SysWOW64\klbjrh.exeC:\Windows\system32\klbjrh.exe 748 "C:\Windows\SysWOW64\xmggjh.exe"53⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\xbwlap.exeC:\Windows\system32\xbwlap.exe 736 "C:\Windows\SysWOW64\klbjrh.exe"54⤵
- Executes dropped EXE
PID:612 -
C:\Windows\SysWOW64\hmlons.exeC:\Windows\system32\hmlons.exe 752 "C:\Windows\SysWOW64\xbwlap.exe"55⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\SysWOW64\xqujry.exeC:\Windows\system32\xqujry.exe 756 "C:\Windows\SysWOW64\hmlons.exe"56⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\geugpf.exeC:\Windows\system32\geugpf.exe 760 "C:\Windows\SysWOW64\xqujry.exe"57⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\tvpjyn.exeC:\Windows\system32\tvpjyn.exe 740 "C:\Windows\SysWOW64\geugpf.exe"58⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\glkmgn.exeC:\Windows\system32\glkmgn.exe 776 "C:\Windows\SysWOW64\tvpjyn.exe"59⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\tknopw.exeC:\Windows\system32\tknopw.exe 728 "C:\Windows\SysWOW64\glkmgn.exe"60⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\gahrye.exeC:\Windows\system32\gahrye.exe 772 "C:\Windows\SysWOW64\tknopw.exe"61⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\poigwl.exeC:\Windows\system32\poigwl.exe 764 "C:\Windows\SysWOW64\gahrye.exe"62⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\SysWOW64\cfdjel.exeC:\Windows\system32\cfdjel.exe 780 "C:\Windows\SysWOW64\poigwl.exe"63⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\pdgmnu.exeC:\Windows\system32\pdgmnu.exe 768 "C:\Windows\SysWOW64\cfdjel.exe"64⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\cuaovc.exeC:\Windows\system32\cuaovc.exe 788 "C:\Windows\SysWOW64\pdgmnu.exe"65⤵
- Executes dropped EXE
PID:2696 -
C:\Windows\SysWOW64\psvrec.exeC:\Windows\system32\psvrec.exe 800 "C:\Windows\SysWOW64\cuaovc.exe"66⤵PID:2648
-
C:\Windows\SysWOW64\zvlbrf.exeC:\Windows\system32\zvlbrf.exe 808 "C:\Windows\SysWOW64\psvrec.exe"67⤵PID:1540
-
C:\Windows\SysWOW64\mxrrdr.exeC:\Windows\system32\mxrrdr.exe 744 "C:\Windows\SysWOW64\zvlbrf.exe"68⤵PID:1220
-
C:\Windows\SysWOW64\zkihiv.exeC:\Windows\system32\zkihiv.exe 784 "C:\Windows\SysWOW64\mxrrdr.exe"69⤵PID:1784
-
C:\Windows\SysWOW64\iyjehv.exeC:\Windows\system32\iyjehv.exe 816 "C:\Windows\SysWOW64\zkihiv.exe"70⤵PID:1944
-
C:\Windows\SysWOW64\wlaumz.exeC:\Windows\system32\wlaumz.exe 812 "C:\Windows\SysWOW64\iyjehv.exe"71⤵PID:1696
-
C:\Windows\SysWOW64\goqeac.exeC:\Windows\system32\goqeac.exe 792 "C:\Windows\SysWOW64\wlaumz.exe"72⤵PID:2188
-
C:\Windows\SysWOW64\qvucsb.exeC:\Windows\system32\qvucsb.exe 804 "C:\Windows\SysWOW64\goqeac.exe"73⤵PID:1088
-
C:\Windows\SysWOW64\dlpebj.exeC:\Windows\system32\dlpebj.exe 824 "C:\Windows\SysWOW64\qvucsb.exe"74⤵PID:1304
-
C:\Windows\SysWOW64\qkshjj.exeC:\Windows\system32\qkshjj.exe 832 "C:\Windows\SysWOW64\dlpebj.exe"75⤵PID:2012
-
C:\Windows\SysWOW64\camksr.exeC:\Windows\system32\camksr.exe 796 "C:\Windows\SysWOW64\qkshjj.exe"76⤵PID:2192
-
C:\Windows\SysWOW64\monziy.exeC:\Windows\system32\monziy.exe 836 "C:\Windows\SysWOW64\camksr.exe"77⤵PID:2220
-
C:\Windows\SysWOW64\zficyz.exeC:\Windows\system32\zficyz.exe 828 "C:\Windows\SysWOW64\monziy.exe"78⤵PID:780
-
C:\Windows\SysWOW64\mvlehh.exeC:\Windows\system32\mvlehh.exe 852 "C:\Windows\SysWOW64\zficyz.exe"79⤵PID:2660
-
C:\Windows\SysWOW64\zufhqp.exeC:\Windows\system32\zufhqp.exe 848 "C:\Windows\SysWOW64\mvlehh.exe"80⤵PID:1916
-
C:\Windows\SysWOW64\mkakyp.exeC:\Windows\system32\mkakyp.exe 864 "C:\Windows\SysWOW64\zufhqp.exe"81⤵PID:2380
-
C:\Windows\SysWOW64\vybhox.exeC:\Windows\system32\vybhox.exe 524 "C:\Windows\SysWOW64\mkakyp.exe"82⤵PID:2760
-
C:\Windows\SysWOW64\jlsxua.exeC:\Windows\system32\jlsxua.exe 856 "C:\Windows\SysWOW64\vybhox.exe"83⤵PID:2128
-
C:\Windows\SysWOW64\nknadj.exeC:\Windows\system32\nknadj.exe 840 "C:\Windows\SysWOW64\jlsxua.exe"84⤵PID:2844
-
C:\Windows\SysWOW64\xqopbi.exeC:\Windows\system32\xqopbi.exe 844 "C:\Windows\SysWOW64\nknadj.exe"85⤵PID:2572
-
C:\Windows\SysWOW64\klfngm.exeC:\Windows\system32\klfngm.exe 872 "C:\Windows\SysWOW64\xqopbi.exe"86⤵PID:2632
-
C:\Windows\SysWOW64\xbahpu.exeC:\Windows\system32\xbahpu.exe 868 "C:\Windows\SysWOW64\klfngm.exe"87⤵PID:1960
-
C:\Windows\SysWOW64\hqbffb.exeC:\Windows\system32\hqbffb.exe 876 "C:\Windows\SysWOW64\xbahpu.exe"88⤵
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\ugwhoc.exeC:\Windows\system32\ugwhoc.exe 860 "C:\Windows\SysWOW64\hqbffb.exe"89⤵PID:3020
-
C:\Windows\SysWOW64\htnxcf.exeC:\Windows\system32\htnxcf.exe 884 "C:\Windows\SysWOW64\ugwhoc.exe"90⤵PID:1372
-
C:\Windows\SysWOW64\rhovsn.exeC:\Windows\system32\rhovsn.exe 892 "C:\Windows\SysWOW64\htnxcf.exe"91⤵PID:448
-
C:\Windows\SysWOW64\dyjxav.exeC:\Windows\system32\dyjxav.exe 880 "C:\Windows\SysWOW64\rhovsn.exe"92⤵PID:704
-
C:\Windows\SysWOW64\qwdajv.exeC:\Windows\system32\qwdajv.exe 908 "C:\Windows\SysWOW64\dyjxav.exe"93⤵PID:988
-
C:\Windows\SysWOW64\dngdrd.exeC:\Windows\system32\dngdrd.exe 896 "C:\Windows\SysWOW64\qwdajv.exe"94⤵PID:2140
-
C:\Windows\SysWOW64\nxwnng.exeC:\Windows\system32\nxwnng.exe 912 "C:\Windows\SysWOW64\dngdrd.exe"95⤵PID:2464
-
C:\Windows\SysWOW64\arcvyl.exeC:\Windows\system32\arcvyl.exe 888 "C:\Windows\SysWOW64\nxwnng.exe"96⤵PID:2988
-
C:\Windows\SysWOW64\nmlkep.exeC:\Windows\system32\nmlkep.exe 916 "C:\Windows\SysWOW64\arcvyl.exe"97⤵
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\adonmx.exeC:\Windows\system32\adonmx.exe 904 "C:\Windows\SysWOW64\nmlkep.exe"98⤵PID:2136
-
C:\Windows\SysWOW64\krpkce.exeC:\Windows\system32\krpkce.exe 924 "C:\Windows\SysWOW64\adonmx.exe"99⤵PID:2404
-
C:\Windows\SysWOW64\whjnlf.exeC:\Windows\system32\whjnlf.exe 900 "C:\Windows\SysWOW64\krpkce.exe"100⤵
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Windows\SysWOW64\jgeqcn.exeC:\Windows\system32\jgeqcn.exe 920 "C:\Windows\SysWOW64\whjnlf.exe"101⤵PID:1608
-
C:\Windows\SysWOW64\wwhtkv.exeC:\Windows\system32\wwhtkv.exe 928 "C:\Windows\SysWOW64\jgeqcn.exe"102⤵PID:2612
-
C:\Windows\SysWOW64\jncvtv.exeC:\Windows\system32\jncvtv.exe 936 "C:\Windows\SysWOW64\wwhtkv.exe"103⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\tbdljc.exeC:\Windows\system32\tbdljc.exe 932 "C:\Windows\SysWOW64\jncvtv.exe"104⤵PID:2896
-
C:\Windows\SysWOW64\gzxnsl.exeC:\Windows\system32\gzxnsl.exe 948 "C:\Windows\SysWOW64\tbdljc.exe"105⤵PID:2408
-
C:\Windows\SysWOW64\tqsqal.exeC:\Windows\system32\tqsqal.exe 944 "C:\Windows\SysWOW64\gzxnsl.exe"106⤵PID:2316
-
C:\Windows\SysWOW64\ggvtjt.exeC:\Windows\system32\ggvtjt.exe 956 "C:\Windows\SysWOW64\tqsqal.exe"107⤵PID:3056
-
C:\Windows\SysWOW64\tfqvzb.exeC:\Windows\system32\tfqvzb.exe 964 "C:\Windows\SysWOW64\ggvtjt.exe"108⤵PID:2528
-
C:\Windows\SysWOW64\chfgne.exeC:\Windows\system32\chfgne.exe 952 "C:\Windows\SysWOW64\tfqvzb.exe"109⤵PID:2008
-
C:\Windows\SysWOW64\pgiive.exeC:\Windows\system32\pgiive.exe 972 "C:\Windows\SysWOW64\chfgne.exe"110⤵
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\zixtii.exeC:\Windows\system32\zixtii.exe 940 "C:\Windows\SysWOW64\pgiive.exe"111⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\mvhjwl.exeC:\Windows\system32\mvhjwl.exe 960 "C:\Windows\SysWOW64\zixtii.exe"112⤵PID:2108
-
C:\Windows\SysWOW64\wkigmt.exeC:\Windows\system32\wkigmt.exe 968 "C:\Windows\SysWOW64\mvhjwl.exe"113⤵PID:2656
-
C:\Windows\SysWOW64\jakjvt.exeC:\Windows\system32\jakjvt.exe 980 "C:\Windows\SysWOW64\wkigmt.exe"114⤵PID:592
-
C:\Windows\SysWOW64\wvuybx.exeC:\Windows\system32\wvuybx.exe 992 "C:\Windows\SysWOW64\jakjvt.exe"115⤵PID:1488
-
C:\Windows\SysWOW64\jpagmj.exeC:\Windows\system32\jpagmj.exe 988 "C:\Windows\SysWOW64\wvuybx.exe"116⤵PID:1624
-
C:\Windows\SysWOW64\wodjvj.exeC:\Windows\system32\wodjvj.exe 996 "C:\Windows\SysWOW64\jpagmj.exe"117⤵PID:2520
-
C:\Windows\SysWOW64\fuvgtr.exeC:\Windows\system32\fuvgtr.exe 984 "C:\Windows\SysWOW64\wodjvj.exe"118⤵PID:2376
-
C:\Windows\SysWOW64\ssyjbz.exeC:\Windows\system32\ssyjbz.exe 976 "C:\Windows\SysWOW64\fuvgtr.exe"119⤵PID:2056
-
C:\Windows\SysWOW64\fjtlkh.exeC:\Windows\system32\fjtlkh.exe 1008 "C:\Windows\SysWOW64\ssyjbz.exe"120⤵PID:1592
-
C:\Windows\SysWOW64\shooth.exeC:\Windows\system32\shooth.exe 1016 "C:\Windows\SysWOW64\fjtlkh.exe"121⤵PID:2664
-
C:\Windows\SysWOW64\cklygl.exeC:\Windows\system32\cklygl.exe 1004 "C:\Windows\SysWOW64\shooth.exe"122⤵PID:1732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-