Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 07:54
Behavioral task
behavioral1
Sample
a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe
-
Size
147KB
-
MD5
a6c084313af9004bd93f950d402325f1
-
SHA1
700aad3dd08576087be3a670fc9934ad69c4619e
-
SHA256
f4fb97402cc99bd0a29647458d556b3eec9cc5765e552dab9b459b222107e2ec
-
SHA512
495078dadc3861cc7c910548bf98d011ca58a7a5aa8d34eeda32dc9e9770a7b88bfd920300957ed7979f0f03018ee6013b15c9443ef03e45896cb08d7bbbbf00
-
SSDEEP
3072:HrwKSBk6KYLYkl8V127uRIdyl9Tm5lLgCUgHxryoJHE:HrwKMk6jY1V8uiQ7EJUmwoO
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
resource yara_rule behavioral1/files/0x000a00000001225e-4.dat aspack_v212_v242 -
Executes dropped EXE 64 IoCs
pid Process 2668 uznsq.exe 2932 jtkfa.exe 2660 qeqkx.exe 2568 dzazd.exe 2140 iqdcl.exe 2292 ncokf.exe 1992 iiduf.exe 2428 hqbff.exe 1532 cvipo.exe 1356 chvic.exe 2160 rhovs.exe 1600 dyjxa.exe 596 lyixp.exe 1540 vbxic.exe 2528 gwysk.exe 1188 zkdns.exe 888 uuhlq.exe 3024 cqrqh.exe 2752 rvryu.exe 2760 eiina.exe 2944 oojlq.exe 2820 ykkvf.exe 2840 iuzgt.exe 1252 vhjvy.exe 2360 dsqav.exe 1492 nlfga.exe 2356 aqoao.exe 1300 ndgqu.exe 2368 ulbqo.exe 2152 evrbc.exe 2988 orklr.exe 408 bhmoa.exe 928 mgrlk.exe 1040 qiztj.exe 1892 fuvgt.exe 1960 spnwy.exe 980 aambo.exe 1320 kvmtd.exe 2832 xmhwm.exe 1744 efobb.exe 1584 ukowf.exe 2744 bvnbc.exe 2196 otqek.exe 3044 ywfoy.exe 2620 jovmk.exe 328 tnzrv.exe 2904 cbzhl.exe 2868 fxaza.exe 1460 uqxmk.exe 2108 cylew.exe 2004 ufnrb.exe 1620 bqtwq.exe 2384 rgfex.exe 2376 yreju.exe 1920 nlawe.exe 1508 ygbpl.exe 2908 lxwsu.exe 1672 sivxr.exe 1996 cewhz.exe 572 pcqkh.exe 2328 zbcha.exe 2912 gmbup.exe 840 wzjht.exe 1808 dkiuq.exe -
Loads dropped DLL 64 IoCs
pid Process 1908 a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe 1908 a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe 2668 uznsq.exe 2668 uznsq.exe 2932 jtkfa.exe 2932 jtkfa.exe 2660 qeqkx.exe 2660 qeqkx.exe 2568 dzazd.exe 2568 dzazd.exe 2140 iqdcl.exe 2140 iqdcl.exe 2292 ncokf.exe 2292 ncokf.exe 1992 iiduf.exe 1992 iiduf.exe 2428 hqbff.exe 2428 hqbff.exe 1532 cvipo.exe 1532 cvipo.exe 1356 chvic.exe 1356 chvic.exe 2160 rhovs.exe 2160 rhovs.exe 1600 dyjxa.exe 1600 dyjxa.exe 596 lyixp.exe 596 lyixp.exe 1540 vbxic.exe 1540 vbxic.exe 2528 gwysk.exe 2528 gwysk.exe 1188 zkdns.exe 1188 zkdns.exe 888 uuhlq.exe 888 uuhlq.exe 3024 cqrqh.exe 3024 cqrqh.exe 2752 rvryu.exe 2752 rvryu.exe 2760 eiina.exe 2760 eiina.exe 2944 oojlq.exe 2944 oojlq.exe 2820 ykkvf.exe 2820 ykkvf.exe 2840 iuzgt.exe 2840 iuzgt.exe 1252 vhjvy.exe 1252 vhjvy.exe 2360 dsqav.exe 2360 dsqav.exe 1492 nlfga.exe 1492 nlfga.exe 2356 aqoao.exe 2356 aqoao.exe 1300 ndgqu.exe 1300 ndgqu.exe 2368 ulbqo.exe 2368 ulbqo.exe 2152 evrbc.exe 2152 evrbc.exe 2988 orklr.exe 2988 orklr.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\iqmik.exe vzjfb.exe File opened for modification C:\Windows\SysWOW64\bdabl.exe offgd.exe File created C:\Windows\SysWOW64\dtbou.exe unbzw.exe File opened for modification C:\Windows\SysWOW64\hnnio.exe xhmly.exe File opened for modification C:\Windows\SysWOW64\vrmob.exe jbjlt.exe File created C:\Windows\SysWOW64\vndfz.exe iauqt.exe File created C:\Windows\SysWOW64\jupzv.exe wwuwn.exe File opened for modification C:\Windows\SysWOW64\exgbu.exe ujfdw.exe File opened for modification C:\Windows\SysWOW64\uyhxu.exe hdqio.exe File created C:\Windows\SysWOW64\spnwy.exe fuvgt.exe File opened for modification C:\Windows\SysWOW64\zwgwc.exe mglut.exe File opened for modification C:\Windows\SysWOW64\eesor.exe rfxmi.exe File opened for modification C:\Windows\SysWOW64\sjhst.exe nlmqk.exe File created C:\Windows\SysWOW64\rxtkt.exe eyqhk.exe File opened for modification C:\Windows\SysWOW64\erzzi.exe sxtsx.exe File opened for modification C:\Windows\SysWOW64\buqff.exe oevdx.exe File created C:\Windows\SysWOW64\kqtwe.exe xsquv.exe File created C:\Windows\SysWOW64\rizir.exe ejxgi.exe File opened for modification C:\Windows\SysWOW64\dkxmf.exe quukw.exe File opened for modification C:\Windows\SysWOW64\wuugn.exe jwzde.exe File created C:\Windows\SysWOW64\iiduf.exe ncokf.exe File opened for modification C:\Windows\SysWOW64\epgvi.exe rylta.exe File created C:\Windows\SysWOW64\cbjwj.exe sniyl.exe File created C:\Windows\SysWOW64\cpsrp.exe tbruz.exe File opened for modification C:\Windows\SysWOW64\hgbma.exe upgkr.exe File created C:\Windows\SysWOW64\tgwwy.exe gqbuq.exe File opened for modification C:\Windows\SysWOW64\szkhk.exe fihmb.exe File opened for modification C:\Windows\SysWOW64\bypxw.exe pauuo.exe File opened for modification C:\Windows\SysWOW64\kkvoi.exe xmalz.exe File opened for modification C:\Windows\SysWOW64\uqwly.exe kkvoi.exe File created C:\Windows\SysWOW64\pofav.exe cqkxn.exe File created C:\Windows\SysWOW64\aoyzf.exe nydxw.exe File opened for modification C:\Windows\SysWOW64\ormpv.exe bssmm.exe File created C:\Windows\SysWOW64\gmhwr.exe tvmtj.exe File opened for modification C:\Windows\SysWOW64\xwjaa.exe kjrlu.exe File created C:\Windows\SysWOW64\ypivt.exe tynsk.exe File created C:\Windows\SysWOW64\hedwm.exe urthg.exe File created C:\Windows\SysWOW64\tbruz.exe gcxri.exe File opened for modification C:\Windows\SysWOW64\mfoyl.exe zptvd.exe File created C:\Windows\SysWOW64\fpskj.exe syxha.exe File created C:\Windows\SysWOW64\bmahe.exe ovfev.exe File opened for modification C:\Windows\SysWOW64\mzgoq.exe hilma.exe File created C:\Windows\SysWOW64\uznsq.exe a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe File created C:\Windows\SysWOW64\yegak.exe lnlyb.exe File created C:\Windows\SysWOW64\xvbzu.exe kehwm.exe File opened for modification C:\Windows\SysWOW64\ryoxs.exe hvyve.exe File opened for modification C:\Windows\SysWOW64\iszug.exe vcerx.exe File opened for modification C:\Windows\SysWOW64\cfhcw.exe psxmq.exe File created C:\Windows\SysWOW64\bhmoa.exe orklr.exe File opened for modification C:\Windows\SysWOW64\rgfex.exe bqtwq.exe File created C:\Windows\SysWOW64\eaqqr.exe uxtnw.exe File opened for modification C:\Windows\SysWOW64\ozvgw.exe epgvi.exe File opened for modification C:\Windows\SysWOW64\xbcfx.exe kolhj.exe File created C:\Windows\SysWOW64\lqveu.exe bgfug.exe File created C:\Windows\SysWOW64\squta.exe fzzqr.exe File opened for modification C:\Windows\SysWOW64\dujgh.exe tkudt.exe File created C:\Windows\SysWOW64\qnjvn.exe daafh.exe File created C:\Windows\SysWOW64\ndrni.exe amwkz.exe File opened for modification C:\Windows\SysWOW64\byxwx.exe rwimk.exe File opened for modification C:\Windows\SysWOW64\onsjf.exe bxxgw.exe File opened for modification C:\Windows\SysWOW64\uibaj.exe kgmqv.exe File opened for modification C:\Windows\SysWOW64\ayohg.exe oilex.exe File created C:\Windows\SysWOW64\ohhvl.exe buqff.exe File opened for modification C:\Windows\SysWOW64\ukqrr.exe htooi.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aicfk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjvij.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lzvjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbrxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htlbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dirtm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlrtu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cnjql.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idbpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pauuo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qnlcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ltwln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pckhv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cqkxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhmly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hqbff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbzhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language weecc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcwvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ygbpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neehr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qapuw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkjta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbruz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syxha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxxgw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sdkqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxvcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oojlq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjvnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ivdys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language foxwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iszug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ysicm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rylta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eapbp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppggy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sniyl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccckd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language voglt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hndbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dzazd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlsdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxsnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kgmqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kfrcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjhst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gkmcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bgfug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkdns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiztj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uaqnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icycb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iroha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bypxw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnfkz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ndrni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlpuy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfebw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yegak.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xuedu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qfqrb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2668 1908 a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe 30 PID 1908 wrote to memory of 2668 1908 a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe 30 PID 1908 wrote to memory of 2668 1908 a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe 30 PID 1908 wrote to memory of 2668 1908 a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2932 2668 uznsq.exe 31 PID 2668 wrote to memory of 2932 2668 uznsq.exe 31 PID 2668 wrote to memory of 2932 2668 uznsq.exe 31 PID 2668 wrote to memory of 2932 2668 uznsq.exe 31 PID 2932 wrote to memory of 2660 2932 jtkfa.exe 32 PID 2932 wrote to memory of 2660 2932 jtkfa.exe 32 PID 2932 wrote to memory of 2660 2932 jtkfa.exe 32 PID 2932 wrote to memory of 2660 2932 jtkfa.exe 32 PID 2660 wrote to memory of 2568 2660 qeqkx.exe 33 PID 2660 wrote to memory of 2568 2660 qeqkx.exe 33 PID 2660 wrote to memory of 2568 2660 qeqkx.exe 33 PID 2660 wrote to memory of 2568 2660 qeqkx.exe 33 PID 2568 wrote to memory of 2140 2568 dzazd.exe 34 PID 2568 wrote to memory of 2140 2568 dzazd.exe 34 PID 2568 wrote to memory of 2140 2568 dzazd.exe 34 PID 2568 wrote to memory of 2140 2568 dzazd.exe 34 PID 2140 wrote to memory of 2292 2140 iqdcl.exe 35 PID 2140 wrote to memory of 2292 2140 iqdcl.exe 35 PID 2140 wrote to memory of 2292 2140 iqdcl.exe 35 PID 2140 wrote to memory of 2292 2140 iqdcl.exe 35 PID 2292 wrote to memory of 1992 2292 ncokf.exe 36 PID 2292 wrote to memory of 1992 2292 ncokf.exe 36 PID 2292 wrote to memory of 1992 2292 ncokf.exe 36 PID 2292 wrote to memory of 1992 2292 ncokf.exe 36 PID 1992 wrote to memory of 2428 1992 iiduf.exe 37 PID 1992 wrote to memory of 2428 1992 iiduf.exe 37 PID 1992 wrote to memory of 2428 1992 iiduf.exe 37 PID 1992 wrote to memory of 2428 1992 iiduf.exe 37 PID 2428 wrote to memory of 1532 2428 hqbff.exe 38 PID 2428 wrote to memory of 1532 2428 hqbff.exe 38 PID 2428 wrote to memory of 1532 2428 hqbff.exe 38 PID 2428 wrote to memory of 1532 2428 hqbff.exe 38 PID 1532 wrote to memory of 1356 1532 cvipo.exe 39 PID 1532 wrote to memory of 1356 1532 cvipo.exe 39 PID 1532 wrote to memory of 1356 1532 cvipo.exe 39 PID 1532 wrote to memory of 1356 1532 cvipo.exe 39 PID 1356 wrote to memory of 2160 1356 chvic.exe 40 PID 1356 wrote to memory of 2160 1356 chvic.exe 40 PID 1356 wrote to memory of 2160 1356 chvic.exe 40 PID 1356 wrote to memory of 2160 1356 chvic.exe 40 PID 2160 wrote to memory of 1600 2160 rhovs.exe 41 PID 2160 wrote to memory of 1600 2160 rhovs.exe 41 PID 2160 wrote to memory of 1600 2160 rhovs.exe 41 PID 2160 wrote to memory of 1600 2160 rhovs.exe 41 PID 1600 wrote to memory of 596 1600 dyjxa.exe 42 PID 1600 wrote to memory of 596 1600 dyjxa.exe 42 PID 1600 wrote to memory of 596 1600 dyjxa.exe 42 PID 1600 wrote to memory of 596 1600 dyjxa.exe 42 PID 596 wrote to memory of 1540 596 lyixp.exe 43 PID 596 wrote to memory of 1540 596 lyixp.exe 43 PID 596 wrote to memory of 1540 596 lyixp.exe 43 PID 596 wrote to memory of 1540 596 lyixp.exe 43 PID 1540 wrote to memory of 2528 1540 vbxic.exe 44 PID 1540 wrote to memory of 2528 1540 vbxic.exe 44 PID 1540 wrote to memory of 2528 1540 vbxic.exe 44 PID 1540 wrote to memory of 2528 1540 vbxic.exe 44 PID 2528 wrote to memory of 1188 2528 gwysk.exe 45 PID 2528 wrote to memory of 1188 2528 gwysk.exe 45 PID 2528 wrote to memory of 1188 2528 gwysk.exe 45 PID 2528 wrote to memory of 1188 2528 gwysk.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\uznsq.exeC:\Windows\system32\uznsq.exe 476 "C:\Users\Admin\AppData\Local\Temp\a6c084313af9004bd93f950d402325f1_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\jtkfa.exeC:\Windows\system32\jtkfa.exe 532 "C:\Windows\SysWOW64\uznsq.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\qeqkx.exeC:\Windows\system32\qeqkx.exe 536 "C:\Windows\SysWOW64\jtkfa.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\dzazd.exeC:\Windows\system32\dzazd.exe 548 "C:\Windows\SysWOW64\qeqkx.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\iqdcl.exeC:\Windows\system32\iqdcl.exe 540 "C:\Windows\SysWOW64\dzazd.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\ncokf.exeC:\Windows\system32\ncokf.exe 552 "C:\Windows\SysWOW64\iqdcl.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\iiduf.exeC:\Windows\system32\iiduf.exe 544 "C:\Windows\SysWOW64\ncokf.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\hqbff.exeC:\Windows\system32\hqbff.exe 564 "C:\Windows\SysWOW64\iiduf.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cvipo.exeC:\Windows\system32\cvipo.exe 508 "C:\Windows\SysWOW64\hqbff.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\chvic.exeC:\Windows\system32\chvic.exe 460 "C:\Windows\SysWOW64\cvipo.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\rhovs.exeC:\Windows\system32\rhovs.exe 568 "C:\Windows\SysWOW64\chvic.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\dyjxa.exeC:\Windows\system32\dyjxa.exe 452 "C:\Windows\SysWOW64\rhovs.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\lyixp.exeC:\Windows\system32\lyixp.exe 576 "C:\Windows\SysWOW64\dyjxa.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\vbxic.exeC:\Windows\system32\vbxic.exe 456 "C:\Windows\SysWOW64\lyixp.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\gwysk.exeC:\Windows\system32\gwysk.exe 584 "C:\Windows\SysWOW64\vbxic.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\zkdns.exeC:\Windows\system32\zkdns.exe 468 "C:\Windows\SysWOW64\gwysk.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Windows\SysWOW64\uuhlq.exeC:\Windows\system32\uuhlq.exe 592 "C:\Windows\SysWOW64\zkdns.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:888 -
C:\Windows\SysWOW64\cqrqh.exeC:\Windows\system32\cqrqh.exe 492 "C:\Windows\SysWOW64\uuhlq.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024 -
C:\Windows\SysWOW64\rvryu.exeC:\Windows\system32\rvryu.exe 600 "C:\Windows\SysWOW64\cqrqh.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2752 -
C:\Windows\SysWOW64\eiina.exeC:\Windows\system32\eiina.exe 616 "C:\Windows\SysWOW64\rvryu.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2760 -
C:\Windows\SysWOW64\oojlq.exeC:\Windows\system32\oojlq.exe 604 "C:\Windows\SysWOW64\eiina.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\ykkvf.exeC:\Windows\system32\ykkvf.exe 612 "C:\Windows\SysWOW64\oojlq.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2820 -
C:\Windows\SysWOW64\iuzgt.exeC:\Windows\system32\iuzgt.exe 620 "C:\Windows\SysWOW64\ykkvf.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Windows\SysWOW64\vhjvy.exeC:\Windows\system32\vhjvy.exe 632 "C:\Windows\SysWOW64\iuzgt.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1252 -
C:\Windows\SysWOW64\dsqav.exeC:\Windows\system32\dsqav.exe 644 "C:\Windows\SysWOW64\vhjvy.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2360 -
C:\Windows\SysWOW64\nlfga.exeC:\Windows\system32\nlfga.exe 608 "C:\Windows\SysWOW64\dsqav.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1492 -
C:\Windows\SysWOW64\aqoao.exeC:\Windows\system32\aqoao.exe 624 "C:\Windows\SysWOW64\nlfga.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2356 -
C:\Windows\SysWOW64\ndgqu.exeC:\Windows\system32\ndgqu.exe 648 "C:\Windows\SysWOW64\aqoao.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1300 -
C:\Windows\SysWOW64\ulbqo.exeC:\Windows\system32\ulbqo.exe 636 "C:\Windows\SysWOW64\ndgqu.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2368 -
C:\Windows\SysWOW64\evrbc.exeC:\Windows\system32\evrbc.exe 628 "C:\Windows\SysWOW64\ulbqo.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2152 -
C:\Windows\SysWOW64\orklr.exeC:\Windows\system32\orklr.exe 652 "C:\Windows\SysWOW64\evrbc.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2988 -
C:\Windows\SysWOW64\bhmoa.exeC:\Windows\system32\bhmoa.exe 640 "C:\Windows\SysWOW64\orklr.exe"33⤵
- Executes dropped EXE
PID:408 -
C:\Windows\SysWOW64\mgrlk.exeC:\Windows\system32\mgrlk.exe 656 "C:\Windows\SysWOW64\bhmoa.exe"34⤵
- Executes dropped EXE
PID:928 -
C:\Windows\SysWOW64\qiztj.exeC:\Windows\system32\qiztj.exe 660 "C:\Windows\SysWOW64\mgrlk.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1040 -
C:\Windows\SysWOW64\fuvgt.exeC:\Windows\system32\fuvgt.exe 664 "C:\Windows\SysWOW64\qiztj.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1892 -
C:\Windows\SysWOW64\spnwy.exeC:\Windows\system32\spnwy.exe 668 "C:\Windows\SysWOW64\fuvgt.exe"37⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\aambo.exeC:\Windows\system32\aambo.exe 676 "C:\Windows\SysWOW64\spnwy.exe"38⤵
- Executes dropped EXE
PID:980 -
C:\Windows\SysWOW64\kvmtd.exeC:\Windows\system32\kvmtd.exe 680 "C:\Windows\SysWOW64\aambo.exe"39⤵
- Executes dropped EXE
PID:1320 -
C:\Windows\SysWOW64\xmhwm.exeC:\Windows\system32\xmhwm.exe 688 "C:\Windows\SysWOW64\kvmtd.exe"40⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\SysWOW64\efobb.exeC:\Windows\system32\efobb.exe 672 "C:\Windows\SysWOW64\xmhwm.exe"41⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\ukowf.exeC:\Windows\system32\ukowf.exe 684 "C:\Windows\SysWOW64\efobb.exe"42⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\bvnbc.exeC:\Windows\system32\bvnbc.exe 704 "C:\Windows\SysWOW64\ukowf.exe"43⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\otqek.exeC:\Windows\system32\otqek.exe 696 "C:\Windows\SysWOW64\bvnbc.exe"44⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\ywfoy.exeC:\Windows\system32\ywfoy.exe 692 "C:\Windows\SysWOW64\otqek.exe"45⤵
- Executes dropped EXE
PID:3044 -
C:\Windows\SysWOW64\jovmk.exeC:\Windows\system32\jovmk.exe 700 "C:\Windows\SysWOW64\ywfoy.exe"46⤵
- Executes dropped EXE
PID:2620 -
C:\Windows\SysWOW64\tnzrv.exeC:\Windows\system32\tnzrv.exe 708 "C:\Windows\SysWOW64\jovmk.exe"47⤵
- Executes dropped EXE
PID:328 -
C:\Windows\SysWOW64\cbzhl.exeC:\Windows\system32\cbzhl.exe 712 "C:\Windows\SysWOW64\tnzrv.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\fxaza.exeC:\Windows\system32\fxaza.exe 728 "C:\Windows\SysWOW64\cbzhl.exe"49⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\uqxmk.exeC:\Windows\system32\uqxmk.exe 716 "C:\Windows\SysWOW64\fxaza.exe"50⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\cylew.exeC:\Windows\system32\cylew.exe 736 "C:\Windows\SysWOW64\uqxmk.exe"51⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\ufnrb.exeC:\Windows\system32\ufnrb.exe 720 "C:\Windows\SysWOW64\cylew.exe"52⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\bqtwq.exeC:\Windows\system32\bqtwq.exe 740 "C:\Windows\SysWOW64\ufnrb.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1620 -
C:\Windows\SysWOW64\rgfex.exeC:\Windows\system32\rgfex.exe 724 "C:\Windows\SysWOW64\bqtwq.exe"54⤵
- Executes dropped EXE
PID:2384 -
C:\Windows\SysWOW64\yreju.exeC:\Windows\system32\yreju.exe 748 "C:\Windows\SysWOW64\rgfex.exe"55⤵
- Executes dropped EXE
PID:2376 -
C:\Windows\SysWOW64\nlawe.exeC:\Windows\system32\nlawe.exe 732 "C:\Windows\SysWOW64\yreju.exe"56⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\ygbpl.exeC:\Windows\system32\ygbpl.exe 744 "C:\Windows\SysWOW64\nlawe.exe"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\lxwsu.exeC:\Windows\system32\lxwsu.exe 752 "C:\Windows\SysWOW64\ygbpl.exe"58⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\sivxr.exeC:\Windows\system32\sivxr.exe 764 "C:\Windows\SysWOW64\lxwsu.exe"59⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\cewhz.exeC:\Windows\system32\cewhz.exe 756 "C:\Windows\SysWOW64\sivxr.exe"60⤵
- Executes dropped EXE
PID:1996 -
C:\Windows\SysWOW64\pcqkh.exeC:\Windows\system32\pcqkh.exe 760 "C:\Windows\SysWOW64\cewhz.exe"61⤵
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\zbcha.exeC:\Windows\system32\zbcha.exe 772 "C:\Windows\SysWOW64\pcqkh.exe"62⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\gmbup.exeC:\Windows\system32\gmbup.exe 768 "C:\Windows\SysWOW64\zbcha.exe"63⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\wzjht.exeC:\Windows\system32\wzjht.exe 780 "C:\Windows\SysWOW64\gmbup.exe"64⤵
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\dkiuq.exeC:\Windows\system32\dkiuq.exe 784 "C:\Windows\SysWOW64\wzjht.exe"65⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\rxakv.exeC:\Windows\system32\rxakv.exe 776 "C:\Windows\SysWOW64\dkiuq.exe"66⤵PID:2704
-
C:\Windows\SysWOW64\yqypk.exeC:\Windows\system32\yqypk.exe 804 "C:\Windows\SysWOW64\rxakv.exe"67⤵PID:2580
-
C:\Windows\SysWOW64\nykxr.exeC:\Windows\system32\nykxr.exe 788 "C:\Windows\SysWOW64\yqypk.exe"68⤵PID:2632
-
C:\Windows\SysWOW64\xjzin.exeC:\Windows\system32\xjzin.exe 808 "C:\Windows\SysWOW64\nykxr.exe"69⤵PID:2800
-
C:\Windows\SysWOW64\kzucv.exeC:\Windows\system32\kzucv.exe 796 "C:\Windows\SysWOW64\xjzin.exe"70⤵PID:348
-
C:\Windows\SysWOW64\xqxfe.exeC:\Windows\system32\xqxfe.exe 816 "C:\Windows\SysWOW64\kzucv.exe"71⤵PID:2792
-
C:\Windows\SysWOW64\kosim.exeC:\Windows\system32\kosim.exe 792 "C:\Windows\SysWOW64\xqxfe.exe"72⤵PID:2044
-
C:\Windows\SysWOW64\ucsfc.exeC:\Windows\system32\ucsfc.exe 812 "C:\Windows\SysWOW64\kosim.exe"73⤵PID:2300
-
C:\Windows\SysWOW64\htnil.exeC:\Windows\system32\htnil.exe 800 "C:\Windows\SysWOW64\ucsfc.exe"74⤵PID:2816
-
C:\Windows\SysWOW64\ugfxr.exeC:\Windows\system32\ugfxr.exe 820 "C:\Windows\SysWOW64\htnil.exe"75⤵PID:1516
-
C:\Windows\SysWOW64\dufvp.exeC:\Windows\system32\dufvp.exe 828 "C:\Windows\SysWOW64\ugfxr.exe"76⤵PID:2180
-
C:\Windows\SysWOW64\qkayx.exeC:\Windows\system32\qkayx.exe 824 "C:\Windows\SysWOW64\dufvp.exe"77⤵PID:2900
-
C:\Windows\SysWOW64\dxsnd.exeC:\Windows\system32\dxsnd.exe 832 "C:\Windows\SysWOW64\qkayx.exe"78⤵
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\nlsdt.exeC:\Windows\system32\nlsdt.exe 836 "C:\Windows\SysWOW64\dxsnd.exe"79⤵
- System Location Discovery: System Language Discovery
PID:552 -
C:\Windows\SysWOW64\aycaz.exeC:\Windows\system32\aycaz.exe 840 "C:\Windows\SysWOW64\nlsdt.exe"80⤵PID:1896
-
C:\Windows\SysWOW64\kjrlu.exeC:\Windows\system32\kjrlu.exe 852 "C:\Windows\SysWOW64\aycaz.exe"81⤵
- Drops file in System32 directory
PID:896 -
C:\Windows\SysWOW64\xwjaa.exeC:\Windows\system32\xwjaa.exe 848 "C:\Windows\SysWOW64\kjrlu.exe"82⤵PID:316
-
C:\Windows\SysWOW64\hhyln.exeC:\Windows\system32\hhyln.exe 856 "C:\Windows\SysWOW64\xwjaa.exe"83⤵PID:2236
-
C:\Windows\SysWOW64\uxtnw.exeC:\Windows\system32\uxtnw.exe 844 "C:\Windows\SysWOW64\hhyln.exe"84⤵
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\eaqqr.exeC:\Windows\system32\eaqqr.exe 876 "C:\Windows\SysWOW64\uxtnw.exe"85⤵PID:2464
-
C:\Windows\SysWOW64\rylta.exeC:\Windows\system32\rylta.exe 868 "C:\Windows\SysWOW64\eaqqr.exe"86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\epgvi.exeC:\Windows\system32\epgvi.exe 860 "C:\Windows\SysWOW64\rylta.exe"87⤵
- Drops file in System32 directory
PID:2700 -
C:\Windows\SysWOW64\ozvgw.exeC:\Windows\system32\ozvgw.exe 872 "C:\Windows\SysWOW64\epgvi.exe"88⤵PID:340
-
C:\Windows\SysWOW64\bqyie.exeC:\Windows\system32\bqyie.exe 864 "C:\Windows\SysWOW64\ozvgw.exe"89⤵PID:2588
-
C:\Windows\SysWOW64\ootlv.exeC:\Windows\system32\ootlv.exe 880 "C:\Windows\SysWOW64\bqyie.exe"90⤵PID:2844
-
C:\Windows\SysWOW64\bfood.exeC:\Windows\system32\bfood.exe 888 "C:\Windows\SysWOW64\ootlv.exe"91⤵PID:2572
-
C:\Windows\SysWOW64\kplyr.exeC:\Windows\system32\kplyr.exe 892 "C:\Windows\SysWOW64\bfood.exe"92⤵PID:3016
-
C:\Windows\SysWOW64\usaje.exeC:\Windows\system32\usaje.exe 884 "C:\Windows\SysWOW64\kplyr.exe"93⤵PID:2512
-
C:\Windows\SysWOW64\hivlu.exeC:\Windows\system32\hivlu.exe 896 "C:\Windows\SysWOW64\usaje.exe"94⤵PID:2780
-
C:\Windows\SysWOW64\uhqod.exeC:\Windows\system32\uhqod.exe 916 "C:\Windows\SysWOW64\hivlu.exe"95⤵PID:2544
-
C:\Windows\SysWOW64\hxtrm.exeC:\Windows\system32\hxtrm.exe 900 "C:\Windows\SysWOW64\uhqod.exe"96⤵PID:2052
-
C:\Windows\SysWOW64\mwotu.exeC:\Windows\system32\mwotu.exe 908 "C:\Windows\SysWOW64\hxtrm.exe"97⤵PID:2244
-
C:\Windows\SysWOW64\zqubg.exeC:\Windows\system32\zqubg.exe 912 "C:\Windows\SysWOW64\mwotu.exe"98⤵PID:2596
-
C:\Windows\SysWOW64\jbjlt.exeC:\Windows\system32\jbjlt.exe 924 "C:\Windows\SysWOW64\zqubg.exe"99⤵
- Drops file in System32 directory
PID:2080 -
C:\Windows\SysWOW64\vrmob.exeC:\Windows\system32\vrmob.exe 904 "C:\Windows\SysWOW64\jbjlt.exe"100⤵PID:2012
-
C:\Windows\SysWOW64\jewep.exeC:\Windows\system32\jewep.exe 920 "C:\Windows\SysWOW64\vrmob.exe"101⤵PID:444
-
C:\Windows\SysWOW64\sswbf.exeC:\Windows\system32\sswbf.exe 928 "C:\Windows\SysWOW64\jewep.exe"102⤵PID:768
-
C:\Windows\SysWOW64\fforl.exeC:\Windows\system32\fforl.exe 932 "C:\Windows\SysWOW64\sswbf.exe"103⤵PID:2308
-
C:\Windows\SysWOW64\sejtu.exeC:\Windows\system32\sejtu.exe 936 "C:\Windows\SysWOW64\fforl.exe"104⤵PID:2980
-
C:\Windows\SysWOW64\ckjrs.exeC:\Windows\system32\ckjrs.exe 940 "C:\Windows\SysWOW64\sejtu.exe"105⤵PID:2852
-
C:\Windows\SysWOW64\pieua.exeC:\Windows\system32\pieua.exe 944 "C:\Windows\SysWOW64\ckjrs.exe"106⤵PID:2452
-
C:\Windows\SysWOW64\zhqrl.exeC:\Windows\system32\zhqrl.exe 964 "C:\Windows\SysWOW64\pieua.exe"107⤵PID:1476
-
C:\Windows\SysWOW64\mglut.exeC:\Windows\system32\mglut.exe 948 "C:\Windows\SysWOW64\zhqrl.exe"108⤵
- Drops file in System32 directory
PID:2600 -
C:\Windows\SysWOW64\zwgwc.exeC:\Windows\system32\zwgwc.exe 968 "C:\Windows\SysWOW64\mglut.exe"109⤵PID:1264
-
C:\Windows\SysWOW64\jzvhx.exeC:\Windows\system32\jzvhx.exe 952 "C:\Windows\SysWOW64\zwgwc.exe"110⤵PID:2824
-
C:\Windows\SysWOW64\wxybg.exeC:\Windows\system32\wxybg.exe 956 "C:\Windows\SysWOW64\jzvhx.exe"111⤵PID:2560
-
C:\Windows\SysWOW64\ganmt.exeC:\Windows\system32\ganmt.exe 960 "C:\Windows\SysWOW64\wxybg.exe"112⤵PID:1568
-
C:\Windows\SysWOW64\tnfkz.exeC:\Windows\system32\tnfkz.exe 984 "C:\Windows\SysWOW64\ganmt.exe"113⤵
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\SysWOW64\glaeh.exeC:\Windows\system32\glaeh.exe 972 "C:\Windows\SysWOW64\tnfkz.exe"114⤵PID:1468
-
C:\Windows\SysWOW64\paacf.exeC:\Windows\system32\paacf.exe 976 "C:\Windows\SysWOW64\glaeh.exe"115⤵PID:2380
-
C:\Windows\SysWOW64\cqveo.exeC:\Windows\system32\cqveo.exe 980 "C:\Windows\SysWOW64\paacf.exe"116⤵PID:2068
-
C:\Windows\SysWOW64\phqhx.exeC:\Windows\system32\phqhx.exe 988 "C:\Windows\SysWOW64\cqveo.exe"117⤵PID:1280
-
C:\Windows\SysWOW64\cftkf.exeC:\Windows\system32\cftkf.exe 996 "C:\Windows\SysWOW64\phqhx.exe"118⤵PID:3064
-
C:\Windows\SysWOW64\miiut.exeC:\Windows\system32\miiut.exe 992 "C:\Windows\SysWOW64\cftkf.exe"119⤵PID:948
-
C:\Windows\SysWOW64\zgdxb.exeC:\Windows\system32\zgdxb.exe 1000 "C:\Windows\SysWOW64\miiut.exe"120⤵PID:1708
-
C:\Windows\SysWOW64\jjshw.exeC:\Windows\system32\jjshw.exe 1028 "C:\Windows\SysWOW64\zgdxb.exe"121⤵PID:1524
-
C:\Windows\SysWOW64\whvkf.exeC:\Windows\system32\whvkf.exe 1008 "C:\Windows\SysWOW64\jjshw.exe"122⤵PID:844
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-