Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 00:34
Static task
static1
Behavioral task
behavioral1
Sample
f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe
-
Size
105KB
-
MD5
f176a160ef615d6a7b2fd43bd4394107
-
SHA1
41c25402f03189d08f6a38c3036ee77addc59e02
-
SHA256
09a86ae227898e5193ff0b6ce5b69a264ae172018b84bda1f7f2b7f178c1d080
-
SHA512
b957795258af71352dfb2cc32e92723266b367d7b2023de8b6914ad9285695a8666ffb79e2f2d2dcedc780253e332ce3f4bfb14ec578490910a3e8a8e0210dc5
-
SSDEEP
3072:Mb6aHPq9QsKUBK0GaO4s6/pyu17Ys56zdD8:eaQsKYKLaRs6/Qs0e
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 64 IoCs
pid Process 2476 dxybdlz.exe 2144 osrmkfi.exe 4360 yrdjvei.exe 4592 lbjuyei.exe 908 yrexomn.exe 4536 iyiuzlv.exe 2740 wioxckn.exe 180 acumnpz.exe 4860 npmctty.exe 4744 yknnbnz.exe 3812 isrstmg.exe 2468 vbxvwly.exe 1340 gxyfegh.exe 1384 qznqrjn.exe 2744 gakgskl.exe 1864 qwdqiem.exe 2984 dyjgtrq.exe 2940 qlbvzvp.exe 1456 dyklfqo.exe 4456 lfgdrox.exe 1332 avrlyxb.exe 2328 nijbdba.exe 1148 bvtrjfz.exe 4872 kgqbean.exe 1452 vqfgjyh.exe 5004 ismwvdt.exe 2752 vfvmahs.exe 1968 fbwwqbt.exe 2836 vfwrmgp.exe 1908 gbxkcbq.exe 1144 qlmmpef.exe 4748 dyekvid.exe 4048 qikmyhd.exe 4588 dyfpgpb.exe 4692 nfrnzoi.exe 3412 xevkjnq.exe 1152 krnipjp.exe 208 awnvtwl.exe 2044 idjvflv.exe 2424 xtudmvz.exe 3152 lgetszx.exe 4320 ytvixdw.exe 2160 iahgqce.exe 2976 vrciykj.exe 2252 iailbbb.exe 2464 sanqmaj.exe 5080 dvnbbuj.exe 3852 qixrhyq.exe 4280 atububx.exe 2952 konlcwx.exe 5100 yytwfvx.exe 3092 ngfemft.exe 2412 qbgptzc.exe 4044 cdmenmg.exe 2684 nznpugh.exe 4344 ddnkymd.exe 1264 nzouggm.exe 3600 kwvcznr.exe 4944 abvpdao.exe 4524 klsayvu.exe 940 uhlsgqd.exe 5040 klunkda.exe 1676 vhmxsxb.exe 832 iuenxba.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\ehllrgc.exe tihohhv.exe File opened for modification C:\Windows\SysWOW64\bfdepmk.exe oslokrm.exe File opened for modification C:\Windows\SysWOW64\tukavja.exe fhakqft.exe File opened for modification C:\Windows\SysWOW64\dqyoxqm.exe qzvmoip.exe File opened for modification C:\Windows\SysWOW64\aoxoqxz.exe nxcmhpu.exe File created C:\Windows\SysWOW64\hbozycw.exe uofjsyy.exe File created C:\Windows\SysWOW64\rbwdfuw.exe hyhbsrq.exe File opened for modification C:\Windows\SysWOW64\qlbvzvp.exe dyjgtrq.exe File opened for modification C:\Windows\SysWOW64\ddnkymd.exe nznpugh.exe File opened for modification C:\Windows\SysWOW64\vqqxias.exe hdzhdwt.exe File opened for modification C:\Windows\SysWOW64\kgojrba.exe xqtgisd.exe File opened for modification C:\Windows\SysWOW64\wcarmat.exe jefodrn.exe File opened for modification C:\Windows\SysWOW64\owcicwn.exe bghftwh.exe File created C:\Windows\SysWOW64\ribpcia.exe ejgmtiu.exe File created C:\Windows\SysWOW64\gtoqluc.exe tdtnduw.exe File opened for modification C:\Windows\SysWOW64\bvtrjfz.exe nijbdba.exe File opened for modification C:\Windows\SysWOW64\hvxmnlp.exe vbrwcgl.exe File created C:\Windows\SysWOW64\fliujjo.exe vqhcboo.exe File created C:\Windows\SysWOW64\zdpdczt.exe memauqo.exe File opened for modification C:\Windows\SysWOW64\cpnnouu.exe ocvxiyw.exe File opened for modification C:\Windows\SysWOW64\lmlxkzd.exe ywrubry.exe File opened for modification C:\Windows\SysWOW64\wxmimjv.exe jyrgdaq.exe File created C:\Windows\SysWOW64\ismwvdt.exe vqfgjyh.exe File created C:\Windows\SysWOW64\erwqqbo.exe qiqoncw.exe File opened for modification C:\Windows\SysWOW64\hnzuekc.exe uaieygd.exe File opened for modification C:\Windows\SysWOW64\pvhdbbw.exe cipnvxx.exe File opened for modification C:\Windows\SysWOW64\zrdkonp.exe ppoatrb.exe File opened for modification C:\Windows\SysWOW64\xdhlysq.exe kqpwsor.exe File created C:\Windows\SysWOW64\ohjcedv.exe eftrjap.exe File created C:\Windows\SysWOW64\sxrkioj.exe ivcauld.exe File created C:\Windows\SysWOW64\askolzi.exe vbpldrc.exe File created C:\Windows\SysWOW64\kbzigch.exe xrtxddh.exe File opened for modification C:\Windows\SysWOW64\oslokrm.exe ethrzse.exe File created C:\Windows\SysWOW64\zgzyumf.exe mpevlda.exe File opened for modification C:\Windows\SysWOW64\nxtijep.exe zkjsdbq.exe File opened for modification C:\Windows\SysWOW64\cybciet.exe rzxepgl.exe File created C:\Windows\SysWOW64\qhsymjw.exe gevozgq.exe File opened for modification C:\Windows\SysWOW64\jcvfyxy.exe zdqioyr.exe File opened for modification C:\Windows\SysWOW64\vhmmwye.exe iuuxqux.exe File opened for modification C:\Windows\SysWOW64\ysafpnf.exe lfrhjjg.exe File opened for modification C:\Windows\SysWOW64\nblolet.exe drweybm.exe File created C:\Windows\SysWOW64\mhucksy.exe zizacka.exe File created C:\Windows\SysWOW64\vqhcboo.exe hvxmnlp.exe File opened for modification C:\Windows\SysWOW64\nxuvumn.exe akkfoio.exe File opened for modification C:\Windows\SysWOW64\pipnqat.exe ckukasn.exe File created C:\Windows\SysWOW64\johyvjd.exe xpmdebx.exe File opened for modification C:\Windows\SysWOW64\ocvxiyw.exe jdavzqq.exe File opened for modification C:\Windows\SysWOW64\ywrubry.exe lmkrqsg.exe File opened for modification C:\Windows\SysWOW64\amvotdd.exe nzdqnze.exe File created C:\Windows\SysWOW64\ngfemft.exe yytwfvx.exe File opened for modification C:\Windows\SysWOW64\qjwuclq.exe dwmxxhs.exe File opened for modification C:\Windows\SysWOW64\fbwwqbt.exe vfvmahs.exe File opened for modification C:\Windows\SysWOW64\hbozycw.exe uofjsyy.exe File created C:\Windows\SysWOW64\wnkrznh.exe jssttri.exe File opened for modification C:\Windows\SysWOW64\tvxtrsp.exe jtzjepi.exe File opened for modification C:\Windows\SysWOW64\kyxsizj.exe yicpazd.exe File created C:\Windows\SysWOW64\isrstmg.exe yknnbnz.exe File created C:\Windows\SysWOW64\gutwmsc.exe thcggod.exe File opened for modification C:\Windows\SysWOW64\veflurv.exe jfliljp.exe File opened for modification C:\Windows\SysWOW64\ktarpbq.exe amwtfci.exe File created C:\Windows\SysWOW64\akknsmn.exe mxtyeio.exe File created C:\Windows\SysWOW64\ghlmetf.exe tuuozpg.exe File opened for modification C:\Windows\SysWOW64\fdpdnis.exe sqxnhem.exe File created C:\Windows\SysWOW64\jnjquqd.exe wogolqx.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpaggyt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyrqnun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dyklfqo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syrkpnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fyyxjxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ejxrmwy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uqhkxsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnbmvho.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dgowkug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inbnjmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjnipkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fqcyxqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cpniksz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iahgqce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppoatrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language untdfik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebfhwvy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqikbuq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utxhuyj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ncmnsdx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eizklly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsafkqb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ywvfcpw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nzdqnze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oonfbrz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dhlyzga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scmbqcz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrtxddh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ehllrgc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiqoncw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjvtyjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hdzhdwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfjvopk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yrexomn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sdolilo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eiafspc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tkswmcr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrciykj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjpitku.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhmmwye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwoxnev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ejgmtiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gahaaxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgwilog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ydbeity.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kfpoeid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pmcfdrc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ezvhufi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdtnduw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language akvphsy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lzxeial.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language idzvwqr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acumnpz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language brmueig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soqdvhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fjdlmzq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qeegsfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zmunpbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xixmxqv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sopxbzx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxybdlz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pipnqat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qccfnlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ycbrqbw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2476 2472 f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe 82 PID 2472 wrote to memory of 2476 2472 f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe 82 PID 2472 wrote to memory of 2476 2472 f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe 82 PID 2476 wrote to memory of 2144 2476 dxybdlz.exe 83 PID 2476 wrote to memory of 2144 2476 dxybdlz.exe 83 PID 2476 wrote to memory of 2144 2476 dxybdlz.exe 83 PID 2144 wrote to memory of 4360 2144 osrmkfi.exe 84 PID 2144 wrote to memory of 4360 2144 osrmkfi.exe 84 PID 2144 wrote to memory of 4360 2144 osrmkfi.exe 84 PID 4360 wrote to memory of 4592 4360 yrdjvei.exe 85 PID 4360 wrote to memory of 4592 4360 yrdjvei.exe 85 PID 4360 wrote to memory of 4592 4360 yrdjvei.exe 85 PID 4592 wrote to memory of 908 4592 lbjuyei.exe 86 PID 4592 wrote to memory of 908 4592 lbjuyei.exe 86 PID 4592 wrote to memory of 908 4592 lbjuyei.exe 86 PID 908 wrote to memory of 4536 908 yrexomn.exe 87 PID 908 wrote to memory of 4536 908 yrexomn.exe 87 PID 908 wrote to memory of 4536 908 yrexomn.exe 87 PID 4536 wrote to memory of 2740 4536 iyiuzlv.exe 88 PID 4536 wrote to memory of 2740 4536 iyiuzlv.exe 88 PID 4536 wrote to memory of 2740 4536 iyiuzlv.exe 88 PID 2740 wrote to memory of 180 2740 wioxckn.exe 89 PID 2740 wrote to memory of 180 2740 wioxckn.exe 89 PID 2740 wrote to memory of 180 2740 wioxckn.exe 89 PID 180 wrote to memory of 4860 180 acumnpz.exe 90 PID 180 wrote to memory of 4860 180 acumnpz.exe 90 PID 180 wrote to memory of 4860 180 acumnpz.exe 90 PID 4860 wrote to memory of 4744 4860 npmctty.exe 91 PID 4860 wrote to memory of 4744 4860 npmctty.exe 91 PID 4860 wrote to memory of 4744 4860 npmctty.exe 91 PID 4744 wrote to memory of 3812 4744 yknnbnz.exe 92 PID 4744 wrote to memory of 3812 4744 yknnbnz.exe 92 PID 4744 wrote to memory of 3812 4744 yknnbnz.exe 92 PID 3812 wrote to memory of 2468 3812 isrstmg.exe 93 PID 3812 wrote to memory of 2468 3812 isrstmg.exe 93 PID 3812 wrote to memory of 2468 3812 isrstmg.exe 93 PID 2468 wrote to memory of 1340 2468 vbxvwly.exe 94 PID 2468 wrote to memory of 1340 2468 vbxvwly.exe 94 PID 2468 wrote to memory of 1340 2468 vbxvwly.exe 94 PID 1340 wrote to memory of 1384 1340 gxyfegh.exe 95 PID 1340 wrote to memory of 1384 1340 gxyfegh.exe 95 PID 1340 wrote to memory of 1384 1340 gxyfegh.exe 95 PID 1384 wrote to memory of 2744 1384 qznqrjn.exe 96 PID 1384 wrote to memory of 2744 1384 qznqrjn.exe 96 PID 1384 wrote to memory of 2744 1384 qznqrjn.exe 96 PID 2744 wrote to memory of 1864 2744 gakgskl.exe 97 PID 2744 wrote to memory of 1864 2744 gakgskl.exe 97 PID 2744 wrote to memory of 1864 2744 gakgskl.exe 97 PID 1864 wrote to memory of 2984 1864 qwdqiem.exe 98 PID 1864 wrote to memory of 2984 1864 qwdqiem.exe 98 PID 1864 wrote to memory of 2984 1864 qwdqiem.exe 98 PID 2984 wrote to memory of 2940 2984 dyjgtrq.exe 99 PID 2984 wrote to memory of 2940 2984 dyjgtrq.exe 99 PID 2984 wrote to memory of 2940 2984 dyjgtrq.exe 99 PID 2940 wrote to memory of 1456 2940 qlbvzvp.exe 100 PID 2940 wrote to memory of 1456 2940 qlbvzvp.exe 100 PID 2940 wrote to memory of 1456 2940 qlbvzvp.exe 100 PID 1456 wrote to memory of 4456 1456 dyklfqo.exe 101 PID 1456 wrote to memory of 4456 1456 dyklfqo.exe 101 PID 1456 wrote to memory of 4456 1456 dyklfqo.exe 101 PID 4456 wrote to memory of 1332 4456 lfgdrox.exe 102 PID 4456 wrote to memory of 1332 4456 lfgdrox.exe 102 PID 4456 wrote to memory of 1332 4456 lfgdrox.exe 102 PID 1332 wrote to memory of 2328 1332 avrlyxb.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\dxybdlz.exeC:\Windows\system32\dxybdlz.exe 1168 "C:\Users\Admin\AppData\Local\Temp\f176a160ef615d6a7b2fd43bd4394107_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\osrmkfi.exeC:\Windows\system32\osrmkfi.exe 1132 "C:\Windows\SysWOW64\dxybdlz.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\yrdjvei.exeC:\Windows\system32\yrdjvei.exe 1128 "C:\Windows\SysWOW64\osrmkfi.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\lbjuyei.exeC:\Windows\system32\lbjuyei.exe 1136 "C:\Windows\SysWOW64\yrdjvei.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\yrexomn.exeC:\Windows\system32\yrexomn.exe 1140 "C:\Windows\SysWOW64\lbjuyei.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\iyiuzlv.exeC:\Windows\system32\iyiuzlv.exe 1144 "C:\Windows\SysWOW64\yrexomn.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\wioxckn.exeC:\Windows\system32\wioxckn.exe 1148 "C:\Windows\SysWOW64\iyiuzlv.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\acumnpz.exeC:\Windows\system32\acumnpz.exe 952 "C:\Windows\SysWOW64\wioxckn.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Windows\SysWOW64\npmctty.exeC:\Windows\system32\npmctty.exe 1156 "C:\Windows\SysWOW64\acumnpz.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\yknnbnz.exeC:\Windows\system32\yknnbnz.exe 1152 "C:\Windows\SysWOW64\npmctty.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\isrstmg.exeC:\Windows\system32\isrstmg.exe 1164 "C:\Windows\SysWOW64\yknnbnz.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\vbxvwly.exeC:\Windows\system32\vbxvwly.exe 1172 "C:\Windows\SysWOW64\isrstmg.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\gxyfegh.exeC:\Windows\system32\gxyfegh.exe 1160 "C:\Windows\SysWOW64\vbxvwly.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\qznqrjn.exeC:\Windows\system32\qznqrjn.exe 1176 "C:\Windows\SysWOW64\gxyfegh.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\gakgskl.exeC:\Windows\system32\gakgskl.exe 1124 "C:\Windows\SysWOW64\qznqrjn.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\qwdqiem.exeC:\Windows\system32\qwdqiem.exe 1188 "C:\Windows\SysWOW64\gakgskl.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\dyjgtrq.exeC:\Windows\system32\dyjgtrq.exe 1184 "C:\Windows\SysWOW64\qwdqiem.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\qlbvzvp.exeC:\Windows\system32\qlbvzvp.exe 1044 "C:\Windows\SysWOW64\dyjgtrq.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\dyklfqo.exeC:\Windows\system32\dyklfqo.exe 1200 "C:\Windows\SysWOW64\qlbvzvp.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\lfgdrox.exeC:\Windows\system32\lfgdrox.exe 1196 "C:\Windows\SysWOW64\dyklfqo.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\avrlyxb.exeC:\Windows\system32\avrlyxb.exe 1204 "C:\Windows\SysWOW64\lfgdrox.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\nijbdba.exeC:\Windows\system32\nijbdba.exe 1212 "C:\Windows\SysWOW64\avrlyxb.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2328 -
C:\Windows\SysWOW64\bvtrjfz.exeC:\Windows\system32\bvtrjfz.exe 1216 "C:\Windows\SysWOW64\nijbdba.exe"24⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\kgqbean.exeC:\Windows\system32\kgqbean.exe 1220 "C:\Windows\SysWOW64\bvtrjfz.exe"25⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\vqfgjyh.exeC:\Windows\system32\vqfgjyh.exe 1208 "C:\Windows\SysWOW64\kgqbean.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1452 -
C:\Windows\SysWOW64\ismwvdt.exeC:\Windows\system32\ismwvdt.exe 1224 "C:\Windows\SysWOW64\vqfgjyh.exe"27⤵
- Executes dropped EXE
PID:5004 -
C:\Windows\SysWOW64\vfvmahs.exeC:\Windows\system32\vfvmahs.exe 1228 "C:\Windows\SysWOW64\ismwvdt.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2752 -
C:\Windows\SysWOW64\fbwwqbt.exeC:\Windows\system32\fbwwqbt.exe 1236 "C:\Windows\SysWOW64\vfvmahs.exe"29⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\vfwrmgp.exeC:\Windows\system32\vfwrmgp.exe 1076 "C:\Windows\SysWOW64\fbwwqbt.exe"30⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\gbxkcbq.exeC:\Windows\system32\gbxkcbq.exe 1244 "C:\Windows\SysWOW64\vfwrmgp.exe"31⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\qlmmpef.exeC:\Windows\system32\qlmmpef.exe 1248 "C:\Windows\SysWOW64\gbxkcbq.exe"32⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\dyekvid.exeC:\Windows\system32\dyekvid.exe 1252 "C:\Windows\SysWOW64\qlmmpef.exe"33⤵
- Executes dropped EXE
PID:4748 -
C:\Windows\SysWOW64\qikmyhd.exeC:\Windows\system32\qikmyhd.exe 1240 "C:\Windows\SysWOW64\dyekvid.exe"34⤵
- Executes dropped EXE
PID:4048 -
C:\Windows\SysWOW64\dyfpgpb.exeC:\Windows\system32\dyfpgpb.exe 1260 "C:\Windows\SysWOW64\qikmyhd.exe"35⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\nfrnzoi.exeC:\Windows\system32\nfrnzoi.exe 984 "C:\Windows\SysWOW64\dyfpgpb.exe"36⤵
- Executes dropped EXE
PID:4692 -
C:\Windows\SysWOW64\xevkjnq.exeC:\Windows\system32\xevkjnq.exe 1268 "C:\Windows\SysWOW64\nfrnzoi.exe"37⤵
- Executes dropped EXE
PID:3412 -
C:\Windows\SysWOW64\krnipjp.exeC:\Windows\system32\krnipjp.exe 1272 "C:\Windows\SysWOW64\xevkjnq.exe"38⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\awnvtwl.exeC:\Windows\system32\awnvtwl.exe 1276 "C:\Windows\SysWOW64\krnipjp.exe"39⤵
- Executes dropped EXE
PID:208 -
C:\Windows\SysWOW64\idjvflv.exeC:\Windows\system32\idjvflv.exe 1264 "C:\Windows\SysWOW64\awnvtwl.exe"40⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\xtudmvz.exeC:\Windows\system32\xtudmvz.exe 1284 "C:\Windows\SysWOW64\idjvflv.exe"41⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\lgetszx.exeC:\Windows\system32\lgetszx.exe 1292 "C:\Windows\SysWOW64\xtudmvz.exe"42⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\SysWOW64\ytvixdw.exeC:\Windows\system32\ytvixdw.exe 1288 "C:\Windows\SysWOW64\lgetszx.exe"43⤵
- Executes dropped EXE
PID:4320 -
C:\Windows\SysWOW64\iahgqce.exeC:\Windows\system32\iahgqce.exe 1296 "C:\Windows\SysWOW64\ytvixdw.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\vrciykj.exeC:\Windows\system32\vrciykj.exe 1300 "C:\Windows\SysWOW64\iahgqce.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\iailbbb.exeC:\Windows\system32\iailbbb.exe 1280 "C:\Windows\SysWOW64\vrciykj.exe"46⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\sanqmaj.exeC:\Windows\system32\sanqmaj.exe 1304 "C:\Windows\SysWOW64\iailbbb.exe"47⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\dvnbbuj.exeC:\Windows\system32\dvnbbuj.exe 1256 "C:\Windows\SysWOW64\sanqmaj.exe"48⤵
- Executes dropped EXE
PID:5080 -
C:\Windows\SysWOW64\qixrhyq.exeC:\Windows\system32\qixrhyq.exe 1312 "C:\Windows\SysWOW64\dvnbbuj.exe"49⤵
- Executes dropped EXE
PID:3852 -
C:\Windows\SysWOW64\atububx.exeC:\Windows\system32\atububx.exe 1320 "C:\Windows\SysWOW64\qixrhyq.exe"50⤵
- Executes dropped EXE
PID:4280 -
C:\Windows\SysWOW64\konlcwx.exeC:\Windows\system32\konlcwx.exe 1324 "C:\Windows\SysWOW64\atububx.exe"51⤵
- Executes dropped EXE
PID:2952 -
C:\Windows\SysWOW64\yytwfvx.exeC:\Windows\system32\yytwfvx.exe 1328 "C:\Windows\SysWOW64\konlcwx.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5100 -
C:\Windows\SysWOW64\ngfemft.exeC:\Windows\system32\ngfemft.exe 1348 "C:\Windows\SysWOW64\yytwfvx.exe"53⤵
- Executes dropped EXE
PID:3092 -
C:\Windows\SysWOW64\qbgptzc.exeC:\Windows\system32\qbgptzc.exe 1308 "C:\Windows\SysWOW64\ngfemft.exe"54⤵
- Executes dropped EXE
PID:2412 -
C:\Windows\SysWOW64\cdmenmg.exeC:\Windows\system32\cdmenmg.exe 1332 "C:\Windows\SysWOW64\qbgptzc.exe"55⤵
- Executes dropped EXE
PID:4044 -
C:\Windows\SysWOW64\nznpugh.exeC:\Windows\system32\nznpugh.exe 1316 "C:\Windows\SysWOW64\cdmenmg.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2684 -
C:\Windows\SysWOW64\ddnkymd.exeC:\Windows\system32\ddnkymd.exe 1344 "C:\Windows\SysWOW64\nznpugh.exe"57⤵
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\nzouggm.exeC:\Windows\system32\nzouggm.exe 1340 "C:\Windows\SysWOW64\ddnkymd.exe"58⤵
- Executes dropped EXE
PID:1264 -
C:\Windows\SysWOW64\xjdetjt.exeC:\Windows\system32\xjdetjt.exe 1352 "C:\Windows\SysWOW64\nzouggm.exe"59⤵PID:2208
-
C:\Windows\SysWOW64\kwvcznr.exeC:\Windows\system32\kwvcznr.exe 1360 "C:\Windows\SysWOW64\xjdetjt.exe"60⤵
- Executes dropped EXE
PID:3600 -
C:\Windows\SysWOW64\abvpdao.exeC:\Windows\system32\abvpdao.exe 1356 "C:\Windows\SysWOW64\kwvcznr.exe"61⤵
- Executes dropped EXE
PID:4944 -
C:\Windows\SysWOW64\klsayvu.exeC:\Windows\system32\klsayvu.exe 1368 "C:\Windows\SysWOW64\abvpdao.exe"62⤵
- Executes dropped EXE
PID:4524 -
C:\Windows\SysWOW64\uhlsgqd.exeC:\Windows\system32\uhlsgqd.exe 1372 "C:\Windows\SysWOW64\klsayvu.exe"63⤵
- Executes dropped EXE
PID:940 -
C:\Windows\SysWOW64\klunkda.exeC:\Windows\system32\klunkda.exe 1376 "C:\Windows\SysWOW64\uhlsgqd.exe"64⤵
- Executes dropped EXE
PID:5040 -
C:\Windows\SysWOW64\vhmxsxb.exeC:\Windows\system32\vhmxsxb.exe 1232 "C:\Windows\SysWOW64\klunkda.exe"65⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\SysWOW64\iuenxba.exeC:\Windows\system32\iuenxba.exe 1388 "C:\Windows\SysWOW64\vhmxsxb.exe"66⤵
- Executes dropped EXE
PID:832 -
C:\Windows\SysWOW64\vtzqgbf.exeC:\Windows\system32\vtzqgbf.exe 1384 "C:\Windows\SysWOW64\iuenxba.exe"67⤵PID:2080
-
C:\Windows\SysWOW64\igqgmfe.exeC:\Windows\system32\igqgmfe.exe 1380 "C:\Windows\SysWOW64\vtzqgbf.exe"68⤵PID:2504
-
C:\Windows\SysWOW64\sigqhis.exeC:\Windows\system32\sigqhis.exe 1392 "C:\Windows\SysWOW64\igqgmfe.exe"69⤵PID:1252
-
C:\Windows\SysWOW64\fdxonmr.exeC:\Windows\system32\fdxonmr.exe 1400 "C:\Windows\SysWOW64\sigqhis.exe"70⤵PID:4940
-
C:\Windows\SysWOW64\pcblxly.exeC:\Windows\system32\pcblxly.exe 1404 "C:\Windows\SysWOW64\fdxonmr.exe"71⤵PID:2452
-
C:\Windows\SysWOW64\aycvfgz.exeC:\Windows\system32\aycvfgz.exe 1408 "C:\Windows\SysWOW64\pcblxly.exe"72⤵PID:3788
-
C:\Windows\SysWOW64\nhigifr.exeC:\Windows\system32\nhigifr.exe 1364 "C:\Windows\SysWOW64\aycvfgz.exe"73⤵PID:2580
-
C:\Windows\SysWOW64\auswwby.exeC:\Windows\system32\auswwby.exe 1420 "C:\Windows\SysWOW64\nhigifr.exe"74⤵PID:4680
-
C:\Windows\SysWOW64\ktetgax.exeC:\Windows\system32\ktetgax.exe 1336 "C:\Windows\SysWOW64\auswwby.exe"75⤵PID:4384
-
C:\Windows\SysWOW64\xvkjrmk.exeC:\Windows\system32\xvkjrmk.exe 1416 "C:\Windows\SysWOW64\ktetgax.exe"76⤵PID:5044
-
C:\Windows\SysWOW64\hrltzhl.exeC:\Windows\system32\hrltzhl.exe 1428 "C:\Windows\SysWOW64\xvkjrmk.exe"77⤵PID:2168
-
C:\Windows\SysWOW64\vbrwcgl.exeC:\Windows\system32\vbrwcgl.exe 1424 "C:\Windows\SysWOW64\hrltzhl.exe"78⤵
- Drops file in System32 directory
PID:1088 -
C:\Windows\SysWOW64\hvxmnlp.exeC:\Windows\system32\hvxmnlp.exe 1436 "C:\Windows\SysWOW64\vbrwcgl.exe"79⤵
- Drops file in System32 directory
PID:3252 -
C:\Windows\SysWOW64\vqhcboo.exeC:\Windows\system32\vqhcboo.exe 1440 "C:\Windows\SysWOW64\hvxmnlp.exe"80⤵
- Drops file in System32 directory
PID:4292 -
C:\Windows\SysWOW64\fliujjo.exeC:\Windows\system32\fliujjo.exe 1432 "C:\Windows\SysWOW64\vqhcboo.exe"81⤵PID:2060
-
C:\Windows\SysWOW64\syrkpnn.exeC:\Windows\system32\syrkpnn.exe 1444 "C:\Windows\SysWOW64\fliujjo.exe"82⤵
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Windows\SysWOW64\fljzuru.exeC:\Windows\system32\fljzuru.exe 1448 "C:\Windows\SysWOW64\syrkpnn.exe"83⤵PID:3528
-
C:\Windows\SysWOW64\snppgvy.exeC:\Windows\system32\snppgvy.exe 1456 "C:\Windows\SysWOW64\fljzuru.exe"84⤵PID:4888
-
C:\Windows\SysWOW64\cjqznqz.exeC:\Windows\system32\cjqznqz.exe 1396 "C:\Windows\SysWOW64\snppgvy.exe"85⤵PID:1208
-
C:\Windows\SysWOW64\pzlceyf.exeC:\Windows\system32\pzlceyf.exe 1464 "C:\Windows\SysWOW64\cjqznqz.exe"86⤵PID:3616
-
C:\Windows\SysWOW64\cmcskcd.exeC:\Windows\system32\cmcskcd.exe 1460 "C:\Windows\SysWOW64\pzlceyf.exe"87⤵PID:4180
-
C:\Windows\SysWOW64\qzmiqfc.exeC:\Windows\system32\qzmiqfc.exe 1472 "C:\Windows\SysWOW64\cmcskcd.exe"88⤵PID:1624
-
C:\Windows\SysWOW64\zkjsdbq.exeC:\Windows\system32\zkjsdbq.exe 1476 "C:\Windows\SysWOW64\qzmiqfc.exe"89⤵
- Drops file in System32 directory
PID:2548 -
C:\Windows\SysWOW64\nxtijep.exeC:\Windows\system32\nxtijep.exe 1480 "C:\Windows\SysWOW64\zkjsdbq.exe"90⤵PID:3172
-
C:\Windows\SysWOW64\akkfoio.exeC:\Windows\system32\akkfoio.exe 1484 "C:\Windows\SysWOW64\nxtijep.exe"91⤵
- Drops file in System32 directory
PID:3148 -
C:\Windows\SysWOW64\nxuvumn.exeC:\Windows\system32\nxuvumn.exe 1468 "C:\Windows\SysWOW64\akkfoio.exe"92⤵PID:2444
-
C:\Windows\SysWOW64\xhrfppt.exeC:\Windows\system32\xhrfppt.exe 1492 "C:\Windows\SysWOW64\nxuvumn.exe"93⤵PID:1524
-
C:\Windows\SysWOW64\kubvvla.exeC:\Windows\system32\kubvvla.exe 1488 "C:\Windows\SysWOW64\xhrfppt.exe"94⤵PID:4832
-
C:\Windows\SysWOW64\xhslbpz.exeC:\Windows\system32\xhslbpz.exe 1496 "C:\Windows\SysWOW64\kubvvla.exe"95⤵PID:4016
-
C:\Windows\SysWOW64\hgwilog.exeC:\Windows\system32\hgwilog.exe 1500 "C:\Windows\SysWOW64\xhslbpz.exe"96⤵
- System Location Discovery: System Language Discovery
PID:5012 -
C:\Windows\SysWOW64\utoyrsf.exeC:\Windows\system32\utoyrsf.exe 1508 "C:\Windows\SysWOW64\hgwilog.exe"97⤵PID:5000
-
C:\Windows\SysWOW64\ioywxve.exeC:\Windows\system32\ioywxve.exe 1504 "C:\Windows\SysWOW64\utoyrsf.exe"98⤵PID:1716
-
C:\Windows\SysWOW64\vbpldrc.exeC:\Windows\system32\vbpldrc.exe 1512 "C:\Windows\SysWOW64\ioywxve.exe"99⤵
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\askolzi.exeC:\Windows\system32\askolzi.exe 1516 "C:\Windows\SysWOW64\vbpldrc.exe"100⤵PID:4332
-
C:\Windows\SysWOW64\kdzzhco.exeC:\Windows\system32\kdzzhco.exe 1520 "C:\Windows\SysWOW64\askolzi.exe"101⤵PID:548
-
C:\Windows\SysWOW64\xmgbkco.exeC:\Windows\system32\xmgbkco.exe 1524 "C:\Windows\SysWOW64\kdzzhco.exe"102⤵PID:4700
-
C:\Windows\SysWOW64\kdiescu.exeC:\Windows\system32\kdiescu.exe 1528 "C:\Windows\SysWOW64\xmgbkco.exe"103⤵PID:2560
-
C:\Windows\SysWOW64\xqsuygt.exeC:\Windows\system32\xqsuygt.exe 1532 "C:\Windows\SysWOW64\kdiescu.exe"104⤵PID:2020
-
C:\Windows\SysWOW64\haheljz.exeC:\Windows\system32\haheljz.exe 1536 "C:\Windows\SysWOW64\xqsuygt.exe"105⤵PID:4868
-
C:\Windows\SysWOW64\unzurny.exeC:\Windows\system32\unzurny.exe 1540 "C:\Windows\SysWOW64\haheljz.exe"106⤵PID:1016
-
C:\Windows\SysWOW64\ixfeumy.exeC:\Windows\system32\ixfeumy.exe 1544 "C:\Windows\SysWOW64\unzurny.exe"107⤵PID:3704
-
C:\Windows\SysWOW64\unahdnd.exeC:\Windows\system32\unahdnd.exe 1548 "C:\Windows\SysWOW64\ixfeumy.exe"108⤵PID:2140
-
C:\Windows\SysWOW64\eypkyqk.exeC:\Windows\system32\eypkyqk.exe 1552 "C:\Windows\SysWOW64\unahdnd.exe"109⤵PID:1660
-
C:\Windows\SysWOW64\slhheui.exeC:\Windows\system32\slhheui.exe 1560 "C:\Windows\SysWOW64\eypkyqk.exe"110⤵PID:3436
-
C:\Windows\SysWOW64\fyyxjxh.exeC:\Windows\system32\fyyxjxh.exe 1556 "C:\Windows\SysWOW64\slhheui.exe"111⤵
- System Location Discovery: System Language Discovery
PID:3576 -
C:\Windows\SysWOW64\slinpto.exeC:\Windows\system32\slinpto.exe 1564 "C:\Windows\SysWOW64\fyyxjxh.exe"112⤵PID:1748
-
C:\Windows\SysWOW64\ckukasn.exeC:\Windows\system32\ckukasn.exe 1572 "C:\Windows\SysWOW64\slinpto.exe"113⤵
- Drops file in System32 directory
PID:3872 -
C:\Windows\SysWOW64\pipnqat.exeC:\Windows\system32\pipnqat.exe 968 "C:\Windows\SysWOW64\ckukasn.exe"114⤵
- System Location Discovery: System Language Discovery
PID:4720 -
C:\Windows\SysWOW64\csvytat.exeC:\Windows\system32\csvytat.exe 1084 "C:\Windows\SysWOW64\pipnqat.exe"115⤵PID:4528
-
C:\Windows\SysWOW64\piqsciz.exeC:\Windows\system32\piqsciz.exe 1584 "C:\Windows\SysWOW64\csvytat.exe"116⤵PID:4544
-
C:\Windows\SysWOW64\zhcymhy.exeC:\Windows\system32\zhcymhy.exe 1580 "C:\Windows\SysWOW64\piqsciz.exe"117⤵PID:3964
-
C:\Windows\SysWOW64\ncmnsdx.exeC:\Windows\system32\ncmnsdx.exe 1588 "C:\Windows\SysWOW64\zhcymhy.exe"118⤵
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\ztoqblc.exeC:\Windows\system32\ztoqblc.exe 1592 "C:\Windows\SysWOW64\ncmnsdx.exe"119⤵PID:4224
-
C:\Windows\SysWOW64\ngyghpb.exeC:\Windows\system32\ngyghpb.exe 1604 "C:\Windows\SysWOW64\ztoqblc.exe"120⤵PID:376
-
C:\Windows\SysWOW64\xrnqcsp.exeC:\Windows\system32\xrnqcsp.exe 1568 "C:\Windows\SysWOW64\ngyghpb.exe"121⤵PID:2320
-
C:\Windows\SysWOW64\kefgioo.exeC:\Windows\system32\kefgioo.exe 1600 "C:\Windows\SysWOW64\xrnqcsp.exe"122⤵PID:836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-