Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 09:17
Static task
static1
Behavioral task
behavioral1
Sample
bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe
-
Size
555KB
-
MD5
bcb6ae3a7e384d6bd2b189b0c81fdee6
-
SHA1
711bdc0ba64888d63debf718f65212694b250af9
-
SHA256
f4a2b8173b0c4ca15ff55553a5441b9ff61ccaa53d36b680cb279b9284b97ada
-
SHA512
d96c5024ff91f638e34da565e536bb7f8bbae19d99da4212b587f828d673caf78729150f337b60d0dc0ca354ba3c9b397ac0abb968940852635bc3efb3e8e882
-
SSDEEP
12288:+NuaIsd+lbShO2PLOHKwsYyHBsU6lxSnyYxYKSCh3BeQs8/:+oaIzDWLO/sYyHBp6in1xcCh3BeQs8/
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 4 IoCs
pid Process 2792 ruwdjq.exe 2624 ctiaup.exe 2440 mlyggf.exe 2312 okmvek.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine ruwdjq.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine ctiaup.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine mlyggf.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine okmvek.exe -
Loads dropped DLL 8 IoCs
pid Process 2336 bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe 2336 bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe 2792 ruwdjq.exe 2792 ruwdjq.exe 2624 ctiaup.exe 2624 ctiaup.exe 2440 mlyggf.exe 2440 mlyggf.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\okmvek.exe mlyggf.exe File opened for modification C:\Windows\SysWOW64\okmvek.exe mlyggf.exe File created C:\Windows\SysWOW64\ruwdjq.exe bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ruwdjq.exe bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe File created C:\Windows\SysWOW64\ctiaup.exe ruwdjq.exe File opened for modification C:\Windows\SysWOW64\ctiaup.exe ruwdjq.exe File created C:\Windows\SysWOW64\mlyggf.exe ctiaup.exe File opened for modification C:\Windows\SysWOW64\mlyggf.exe ctiaup.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruwdjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctiaup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mlyggf.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2792 2336 bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2792 2336 bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2792 2336 bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe 30 PID 2336 wrote to memory of 2792 2336 bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe 30 PID 2792 wrote to memory of 2624 2792 ruwdjq.exe 31 PID 2792 wrote to memory of 2624 2792 ruwdjq.exe 31 PID 2792 wrote to memory of 2624 2792 ruwdjq.exe 31 PID 2792 wrote to memory of 2624 2792 ruwdjq.exe 31 PID 2624 wrote to memory of 2440 2624 ctiaup.exe 32 PID 2624 wrote to memory of 2440 2624 ctiaup.exe 32 PID 2624 wrote to memory of 2440 2624 ctiaup.exe 32 PID 2624 wrote to memory of 2440 2624 ctiaup.exe 32 PID 2440 wrote to memory of 2312 2440 mlyggf.exe 33 PID 2440 wrote to memory of 2312 2440 mlyggf.exe 33 PID 2440 wrote to memory of 2312 2440 mlyggf.exe 33 PID 2440 wrote to memory of 2312 2440 mlyggf.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\ruwdjq.exeC:\Windows\system32\ruwdjq.exe 636 "C:\Users\Admin\AppData\Local\Temp\bcb6ae3a7e384d6bd2b189b0c81fdee6_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\ctiaup.exeC:\Windows\system32\ctiaup.exe 692 "C:\Windows\SysWOW64\ruwdjq.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\mlyggf.exeC:\Windows\system32\mlyggf.exe 700 "C:\Windows\SysWOW64\ctiaup.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\okmvek.exeC:\Windows\system32\okmvek.exe 696 "C:\Windows\SysWOW64\mlyggf.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2312 -
C:\Windows\SysWOW64\tofdxu.exeC:\Windows\system32\tofdxu.exe 712 "C:\Windows\SysWOW64\okmvek.exe"6⤵PID:2812
-
C:\Windows\SysWOW64\awtvkj.exeC:\Windows\system32\awtvkj.exe 612 "C:\Windows\SysWOW64\tofdxu.exe"7⤵PID:1656
-
C:\Windows\SysWOW64\tdvipc.exeC:\Windows\system32\tdvipc.exe 716 "C:\Windows\SysWOW64\awtvkj.exe"8⤵PID:2060
-
C:\Windows\SysWOW64\doklcf.exeC:\Windows\system32\doklcf.exe 728 "C:\Windows\SysWOW64\tdvipc.exe"9⤵PID:2992
-
C:\Windows\SysWOW64\nnwqme.exeC:\Windows\system32\nnwqme.exe 720 "C:\Windows\SysWOW64\doklcf.exe"10⤵PID:2808
-
C:\Windows\SysWOW64\aaggsi.exeC:\Windows\system32\aaggsi.exe 732 "C:\Windows\SysWOW64\nnwqme.exe"11⤵PID:2280
-
C:\Windows\SysWOW64\hibymx.exeC:\Windows\system32\hibymx.exe 740 "C:\Windows\SysWOW64\aaggsi.exe"12⤵PID:2728
-
C:\Windows\SysWOW64\mkhoyc.exeC:\Windows\system32\mkhoyc.exe 736 "C:\Windows\SysWOW64\hibymx.exe"13⤵PID:1680
-
C:\Windows\SysWOW64\ouzdqy.exeC:\Windows\system32\ouzdqy.exe 672 "C:\Windows\SysWOW64\mkhoyc.exe"14⤵PID:1716
-
C:\Windows\SysWOW64\gemwyv.exeC:\Windows\system32\gemwyv.exe 748 "C:\Windows\SysWOW64\ouzdqy.exe"15⤵PID:2088
-
C:\Windows\SysWOW64\omiwks.exeC:\Windows\system32\omiwks.exe 760 "C:\Windows\SysWOW64\gemwyv.exe"16⤵PID:3024
-
C:\Windows\SysWOW64\ylmtcr.exeC:\Windows\system32\ylmtcr.exe 752 "C:\Windows\SysWOW64\omiwks.exe"17⤵PID:2748
-
C:\Windows\SysWOW64\ikqrnq.exeC:\Windows\system32\ikqrnq.exe 756 "C:\Windows\SysWOW64\ylmtcr.exe"18⤵PID:2584
-
C:\Windows\SysWOW64\yenlwe.exeC:\Windows\system32\yenlwe.exe 744 "C:\Windows\SysWOW64\ikqrnq.exe"19⤵PID:2264
-
C:\Windows\SysWOW64\ilzjhc.exeC:\Windows\system32\ilzjhc.exe 764 "C:\Windows\SysWOW64\yenlwe.exe"20⤵PID:1392
-
C:\Windows\SysWOW64\uffrah.exeC:\Windows\system32\uffrah.exe 768 "C:\Windows\SysWOW64\ilzjhc.exe"21⤵PID:876
-
C:\Windows\SysWOW64\hhlgmt.exeC:\Windows\system32\hhlgmt.exe 776 "C:\Windows\SysWOW64\uffrah.exe"22⤵PID:1960
-
C:\Windows\SysWOW64\pakgsa.exeC:\Windows\system32\pakgsa.exe 784 "C:\Windows\SysWOW64\hhlgmt.exe"23⤵PID:3068
-
C:\Windows\SysWOW64\ccqwen.exeC:\Windows\system32\ccqwen.exe 796 "C:\Windows\SysWOW64\pakgsa.exe"24⤵PID:2508
-
C:\Windows\SysWOW64\oalzmv.exeC:\Windows\system32\oalzmv.exe 780 "C:\Windows\SysWOW64\ccqwen.exe"25⤵PID:2012
-
C:\Windows\SysWOW64\ydibhy.exeC:\Windows\system32\ydibhy.exe 788 "C:\Windows\SysWOW64\oalzmv.exe"26⤵PID:2020
-
C:\Windows\SysWOW64\inxmvt.exeC:\Windows\system32\inxmvt.exe 792 "C:\Windows\SysWOW64\ydibhy.exe"27⤵PID:2952
-
C:\Windows\SysWOW64\vesodb.exeC:\Windows\system32\vesodb.exe 808 "C:\Windows\SysWOW64\inxmvt.exe"28⤵PID:896
-
C:\Windows\SysWOW64\irkejf.exeC:\Windows\system32\irkejf.exe 800 "C:\Windows\SysWOW64\vesodb.exe"29⤵PID:2524
-
C:\Windows\SysWOW64\sbzoei.exeC:\Windows\system32\sbzoei.exe 804 "C:\Windows\SysWOW64\irkejf.exe"30⤵PID:2556
-
C:\Windows\SysWOW64\caduph.exeC:\Windows\system32\caduph.exe 812 "C:\Windows\SysWOW64\sbzoei.exe"31⤵PID:1652
-
C:\Windows\SysWOW64\pcjbal.exeC:\Windows\system32\pcjbal.exe 816 "C:\Windows\SysWOW64\caduph.exe"32⤵PID:1304
-
C:\Windows\SysWOW64\cwprmy.exeC:\Windows\system32\cwprmy.exe 772 "C:\Windows\SysWOW64\pcjbal.exe"33⤵PID:1972
-
C:\Windows\SysWOW64\mvcpex.exeC:\Windows\system32\mvcpex.exe 832 "C:\Windows\SysWOW64\cwprmy.exe"34⤵PID:2248
-
C:\Windows\SysWOW64\zuwrnf.exeC:\Windows\system32\zuwrnf.exe 820 "C:\Windows\SysWOW64\mvcpex.exe"35⤵PID:2628
-
C:\Windows\SysWOW64\mkruvf.exeC:\Windows\system32\mkruvf.exe 828 "C:\Windows\SysWOW64\zuwrnf.exe"36⤵PID:2604
-
C:\Windows\SysWOW64\wvpeii.exeC:\Windows\system32\wvpeii.exe 844 "C:\Windows\SysWOW64\mkruvf.exe"37⤵PID:2724
-
C:\Windows\SysWOW64\jmjhrq.exeC:\Windows\system32\jmjhrq.exe 836 "C:\Windows\SysWOW64\wvpeii.exe"38⤵PID:2600
-
C:\Windows\SysWOW64\wzbxxm.exeC:\Windows\system32\wzbxxm.exe 840 "C:\Windows\SysWOW64\jmjhrq.exe"39⤵PID:2100
-
C:\Windows\SysWOW64\ibhmqz.exeC:\Windows\system32\ibhmqz.exe 848 "C:\Windows\SysWOW64\wzbxxm.exe"40⤵PID:2788
-
C:\Windows\SysWOW64\sdwxdc.exeC:\Windows\system32\sdwxdc.exe 852 "C:\Windows\SysWOW64\ibhmqz.exe"41⤵PID:2428
-
C:\Windows\SysWOW64\fygmjg.exeC:\Windows\system32\fygmjg.exe 856 "C:\Windows\SysWOW64\sdwxdc.exe"42⤵PID:576
-
C:\Windows\SysWOW64\pbdxwj.exeC:\Windows\system32\pbdxwj.exe 860 "C:\Windows\SysWOW64\fygmjg.exe"43⤵PID:3040
-
C:\Windows\SysWOW64\czyafj.exeC:\Windows\system32\czyafj.exe 864 "C:\Windows\SysWOW64\pbdxwj.exe"44⤵PID:2296
-
C:\Windows\SysWOW64\mcncam.exeC:\Windows\system32\mcncam.exe 868 "C:\Windows\SysWOW64\czyafj.exe"45⤵PID:2392
-
C:\Windows\SysWOW64\zsifju.exeC:\Windows\system32\zsifju.exe 824 "C:\Windows\SysWOW64\mcncam.exe"46⤵PID:2656
-
C:\Windows\SysWOW64\muouuz.exeC:\Windows\system32\muouuz.exe 876 "C:\Windows\SysWOW64\zsifju.exe"47⤵PID:1948
-
C:\Windows\SysWOW64\ztrxdh.exeC:\Windows\system32\ztrxdh.exe 872 "C:\Windows\SysWOW64\muouuz.exe"48⤵PID:1724
-
C:\Windows\SysWOW64\ljmamp.exeC:\Windows\system32\ljmamp.exe 884 "C:\Windows\SysWOW64\ztrxdh.exe"49⤵PID:1844
-
C:\Windows\SysWOW64\vmbkhs.exeC:\Windows\system32\vmbkhs.exe 896 "C:\Windows\SysWOW64\ljmamp.exe"50⤵PID:1700
-
C:\Windows\SysWOW64\ikenps.exeC:\Windows\system32\ikenps.exe 888 "C:\Windows\SysWOW64\vmbkhs.exe"51⤵PID:1536
-
C:\Windows\SysWOW64\vbzpya.exeC:\Windows\system32\vbzpya.exe 892 "C:\Windows\SysWOW64\ikenps.exe"52⤵PID:2528
-
C:\Windows\SysWOW64\floale.exeC:\Windows\system32\floale.exe 908 "C:\Windows\SysWOW64\vbzpya.exe"53⤵PID:2924
-
C:\Windows\SysWOW64\sfuixi.exeC:\Windows\system32\sfuixi.exe 724 "C:\Windows\SysWOW64\floale.exe"54⤵PID:1276
-
C:\Windows\SysWOW64\fepkfq.exeC:\Windows\system32\fepkfq.exe 900 "C:\Windows\SysWOW64\sfuixi.exe"55⤵PID:2416
-
C:\Windows\SysWOW64\susnwy.exeC:\Windows\system32\susnwy.exe 904 "C:\Windows\SysWOW64\fepkfq.exe"56⤵PID:2880
-
C:\Windows\SysWOW64\ftnqez.exeC:\Windows\system32\ftnqez.exe 916 "C:\Windows\SysWOW64\susnwy.exe"57⤵PID:680
-
C:\Windows\SysWOW64\owcasc.exeC:\Windows\system32\owcasc.exe 912 "C:\Windows\SysWOW64\ftnqez.exe"58⤵PID:3004
-
C:\Windows\SysWOW64\byiqdo.exeC:\Windows\system32\byiqdo.exe 928 "C:\Windows\SysWOW64\owcasc.exe"59⤵PID:2068
-
C:\Windows\SysWOW64\olafjs.exeC:\Windows\system32\olafjs.exe 932 "C:\Windows\SysWOW64\byiqdo.exe"60⤵PID:2608
-
C:\Windows\SysWOW64\qnpqev.exeC:\Windows\system32\qnpqev.exe 924 "C:\Windows\SysWOW64\olafjs.exe"61⤵PID:1548
-
C:\Windows\SysWOW64\gaxlaa.exeC:\Windows\system32\gaxlaa.exe 936 "C:\Windows\SysWOW64\qnpqev.exe"62⤵PID:1120
-
C:\Windows\SysWOW64\qoqayi.exeC:\Windows\system32\qoqayi.exe 940 "C:\Windows\SysWOW64\gaxlaa.exe"63⤵PID:2224
-
C:\Windows\SysWOW64\detdhq.exeC:\Windows\system32\detdhq.exe 944 "C:\Windows\SysWOW64\qoqayi.exe"64⤵PID:2400
-
C:\Windows\SysWOW64\qvofpq.exeC:\Windows\system32\qvofpq.exe 948 "C:\Windows\SysWOW64\detdhq.exe"65⤵PID:2244
-
C:\Windows\SysWOW64\zfdqdt.exeC:\Windows\system32\zfdqdt.exe 952 "C:\Windows\SysWOW64\qvofpq.exe"66⤵PID:1632
-
C:\Windows\SysWOW64\nsvgqx.exeC:\Windows\system32\nsvgqx.exe 956 "C:\Windows\SysWOW64\zfdqdt.exe"67⤵PID:1552
-
C:\Windows\SysWOW64\zubvcb.exeC:\Windows\system32\zubvcb.exe 960 "C:\Windows\SysWOW64\nsvgqx.exe"68⤵PID:2712
-
C:\Windows\SysWOW64\jxqgpf.exeC:\Windows\system32\jxqgpf.exe 968 "C:\Windows\SysWOW64\zubvcb.exe"69⤵PID:3020
-
C:\Windows\SysWOW64\wvliyn.exeC:\Windows\system32\wvliyn.exe 964 "C:\Windows\SysWOW64\jxqgpf.exe"70⤵PID:920
-
C:\Windows\SysWOW64\jmolgv.exeC:\Windows\system32\jmolgv.exe 972 "C:\Windows\SysWOW64\wvliyn.exe"71⤵PID:2872
-
C:\Windows\SysWOW64\todvby.exeC:\Windows\system32\todvby.exe 976 "C:\Windows\SysWOW64\jmolgv.exe"72⤵PID:2768
-
C:\Windows\SysWOW64\gjnlhu.exeC:\Windows\system32\gjnlhu.exe 988 "C:\Windows\SysWOW64\todvby.exe"73⤵PID:2516
-
C:\Windows\SysWOW64\tdtttg.exeC:\Windows\system32\tdtttg.exe 980 "C:\Windows\SysWOW64\gjnlhu.exe"74⤵PID:2664
-
C:\Windows\SysWOW64\gcvvbp.exeC:\Windows\system32\gcvvbp.exe 984 "C:\Windows\SysWOW64\tdtttg.exe"75⤵PID:2612
-
C:\Windows\SysWOW64\qelgok.exeC:\Windows\system32\qelgok.exe 992 "C:\Windows\SysWOW64\gcvvbp.exe"76⤵PID:2376
-
C:\Windows\SysWOW64\cgrwaw.exeC:\Windows\system32\cgrwaw.exe 996 "C:\Windows\SysWOW64\qelgok.exe"77⤵PID:1188
-
C:\Windows\SysWOW64\pxmyqe.exeC:\Windows\system32\pxmyqe.exe 1000 "C:\Windows\SysWOW64\cgrwaw.exe"78⤵PID:812
-
C:\Windows\SysWOW64\cvpbze.exeC:\Windows\system32\cvpbze.exe 1004 "C:\Windows\SysWOW64\pxmyqe.exe"79⤵PID:2420
-
C:\Windows\SysWOW64\pmjein.exeC:\Windows\system32\pmjein.exe 1008 "C:\Windows\SysWOW64\cvpbze.exe"80⤵PID:2972
-
C:\Windows\SysWOW64\ckegqv.exeC:\Windows\system32\ckegqv.exe 1012 "C:\Windows\SysWOW64\pmjein.exe"81⤵PID:1648
-
C:\Windows\SysWOW64\lrfwgu.exeC:\Windows\system32\lrfwgu.exe 1016 "C:\Windows\SysWOW64\ckegqv.exe"82⤵PID:2288
-
C:\Windows\SysWOW64\ypiypc.exeC:\Windows\system32\ypiypc.exe 1020 "C:\Windows\SysWOW64\lrfwgu.exe"83⤵PID:1204
-
C:\Windows\SysWOW64\lgcbyl.exeC:\Windows\system32\lgcbyl.exe 1028 "C:\Windows\SysWOW64\ypiypc.exe"84⤵PID:2324
-
C:\Windows\SysWOW64\ywxeol.exeC:\Windows\system32\ywxeol.exe 1032 "C:\Windows\SysWOW64\lgcbyl.exe"85⤵PID:2520
-
C:\Windows\SysWOW64\lvagxt.exeC:\Windows\system32\lvagxt.exe 1044 "C:\Windows\SysWOW64\ywxeol.exe"86⤵PID:2816
-
C:\Windows\SysWOW64\vxprkw.exeC:\Windows\system32\vxprkw.exe 920 "C:\Windows\SysWOW64\lvagxt.exe"87⤵PID:2804
-
C:\Windows\SysWOW64\iwktte.exeC:\Windows\system32\iwktte.exe 1040 "C:\Windows\SysWOW64\vxprkw.exe"88⤵PID:2620
-
C:\Windows\SysWOW64\vqqjej.exeC:\Windows\system32\vqqjej.exe 1048 "C:\Windows\SysWOW64\iwktte.exe"89⤵PID:1952
-
C:\Windows\SysWOW64\iolenr.exeC:\Windows\system32\iolenr.exe 1036 "C:\Windows\SysWOW64\vqqjej.exe"90⤵PID:552
-
C:\Windows\SysWOW64\ufohvz.exeC:\Windows\system32\ufohvz.exe 1056 "C:\Windows\SysWOW64\iolenr.exe"91⤵PID:2216
-
C:\Windows\SysWOW64\etoety.exeC:\Windows\system32\etoety.exe 1060 "C:\Windows\SysWOW64\ufohvz.exe"92⤵PID:1896
-
C:\Windows\SysWOW64\rjjhch.exeC:\Windows\system32\rjjhch.exe 1064 "C:\Windows\SysWOW64\etoety.exe"93⤵PID:276
-
C:\Windows\SysWOW64\eebwik.exeC:\Windows\system32\eebwik.exe 1068 "C:\Windows\SysWOW64\rjjhch.exe"94⤵PID:2576
-
C:\Windows\SysWOW64\ohqhvo.exeC:\Windows\system32\ohqhvo.exe 1072 "C:\Windows\SysWOW64\eebwik.exe"95⤵PID:1920
-
C:\Windows\SysWOW64\bjwwos.exeC:\Windows\system32\bjwwos.exe 1080 "C:\Windows\SysWOW64\ohqhvo.exe"96⤵PID:996
-
C:\Windows\SysWOW64\ozrzxa.exeC:\Windows\system32\ozrzxa.exe 1088 "C:\Windows\SysWOW64\bjwwos.exe"97⤵PID:1440
-
C:\Windows\SysWOW64\ykgjkd.exeC:\Windows\system32\ykgjkd.exe 1052 "C:\Windows\SysWOW64\ozrzxa.exe"98⤵PID:1640
-
C:\Windows\SysWOW64\kajmtl.exeC:\Windows\system32\kajmtl.exe 1084 "C:\Windows\SysWOW64\ykgjkd.exe"99⤵PID:1928
-
C:\Windows\SysWOW64\xzehbm.exeC:\Windows\system32\xzehbm.exe 708 "C:\Windows\SysWOW64\kajmtl.exe"100⤵PID:864
-
C:\Windows\SysWOW64\kpzkku.exeC:\Windows\system32\kpzkku.exe 1096 "C:\Windows\SysWOW64\xzehbm.exe"101⤵PID:1660
-
C:\Windows\SysWOW64\xgcmtc.exeC:\Windows\system32\xgcmtc.exe 1100 "C:\Windows\SysWOW64\kpzkku.exe"102⤵PID:2948
-
C:\Windows\SysWOW64\huukrb.exeC:\Windows\system32\huukrb.exe 1076 "C:\Windows\SysWOW64\xgcmtc.exe"103⤵PID:1424
-
C:\Windows\SysWOW64\ukxmzk.exeC:\Windows\system32\ukxmzk.exe 1108 "C:\Windows\SysWOW64\huukrb.exe"104⤵PID:2292
-
C:\Windows\SysWOW64\hjspis.exeC:\Windows\system32\hjspis.exe 1120 "C:\Windows\SysWOW64\ukxmzk.exe"105⤵PID:2260
-
C:\Windows\SysWOW64\uznsqs.exeC:\Windows\system32\uznsqs.exe 1112 "C:\Windows\SysWOW64\hjspis.exe"106⤵PID:1672
-
C:\Windows\SysWOW64\gyquza.exeC:\Windows\system32\gyquza.exe 1116 "C:\Windows\SysWOW64\uznsqs.exe"107⤵PID:3052
-
C:\Windows\SysWOW64\qeqkxh.exeC:\Windows\system32\qeqkxh.exe 1124 "C:\Windows\SysWOW64\gyquza.exe"108⤵PID:916
-
C:\Windows\SysWOW64\ddlmgq.exeC:\Windows\system32\ddlmgq.exe 1128 "C:\Windows\SysWOW64\qeqkxh.exe"109⤵PID:2572
-
C:\Windows\SysWOW64\itgpoq.exeC:\Windows\system32\itgpoq.exe 1132 "C:\Windows\SysWOW64\ddlmgq.exe"110⤵PID:352
-
C:\Windows\SysWOW64\vsjsxy.exeC:\Windows\system32\vsjsxy.exe 1136 "C:\Windows\SysWOW64\itgpoq.exe"111⤵PID:1524
-
C:\Windows\SysWOW64\iidufg.exeC:\Windows\system32\iidufg.exe 1104 "C:\Windows\SysWOW64\vsjsxy.exe"112⤵PID:992
-
C:\Windows\SysWOW64\rweswg.exeC:\Windows\system32\rweswg.exe 1144 "C:\Windows\SysWOW64\iidufg.exe"113⤵PID:2912
-
C:\Windows\SysWOW64\enzvmo.exeC:\Windows\system32\enzvmo.exe 1140 "C:\Windows\SysWOW64\rweswg.exe"114⤵PID:2184
-
C:\Windows\SysWOW64\rluxvw.exeC:\Windows\system32\rluxvw.exe 1152 "C:\Windows\SysWOW64\enzvmo.exe"115⤵PID:2176
-
C:\Windows\SysWOW64\ecwsdw.exeC:\Windows\system32\ecwsdw.exe 1156 "C:\Windows\SysWOW64\rluxvw.exe"116⤵PID:3048
-
C:\Windows\SysWOW64\rarvme.exeC:\Windows\system32\rarvme.exe 1148 "C:\Windows\SysWOW64\ecwsdw.exe"117⤵PID:1852
-
C:\Windows\SysWOW64\bgsscm.exeC:\Windows\system32\bgsscm.exe 1164 "C:\Windows\SysWOW64\rarvme.exe"118⤵PID:1892
-
C:\Windows\SysWOW64\ofnvlu.exeC:\Windows\system32\ofnvlu.exe 1172 "C:\Windows\SysWOW64\bgsscm.exe"119⤵PID:2988
-
C:\Windows\SysWOW64\bvqxbu.exeC:\Windows\system32\bvqxbu.exe 1180 "C:\Windows\SysWOW64\ofnvlu.exe"120⤵PID:2676
-
C:\Windows\SysWOW64\kgfiox.exeC:\Windows\system32\kgfiox.exe 1168 "C:\Windows\SysWOW64\bvqxbu.exe"121⤵PID:380
-
C:\Windows\SysWOW64\xwakxf.exeC:\Windows\system32\xwakxf.exe 1176 "C:\Windows\SysWOW64\kgfiox.exe"122⤵PID:2072
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-