Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
542a865eac1dd6aa5de685dfeeb2f92d36eb7b6b210d504e421c1b245bb38732.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
542a865eac1dd6aa5de685dfeeb2f92d36eb7b6b210d504e421c1b245bb38732.exe
Resource
win10v2004-20220812-en
General
-
Target
542a865eac1dd6aa5de685dfeeb2f92d36eb7b6b210d504e421c1b245bb38732.exe
-
Size
157KB
-
MD5
43f9dae058f9d6da6e6ac6a9c2a8d7e1
-
SHA1
8f9b33ab344abd96a51d5aa72f5b5b482933898f
-
SHA256
542a865eac1dd6aa5de685dfeeb2f92d36eb7b6b210d504e421c1b245bb38732
-
SHA512
52edc8354c740b2050ccca855383583052e69f24c5e9e5910ee94f330122a5e5ee82b394fb0bf7975eefdc8e2808707ef9369ceee81cd52f2402a4639436b5b7
-
SSDEEP
1536:1ZcEJFL7xDcXKGz5uYwZYnANVjZVc8K+wC++RiBya3PMCcDEpITeynKDuaagoxey:1mm1DyA7toVHiYuaagoxe2Yo5nowd1
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4504 vgqdcqhh.exe 4888 lzodxlpq.exe 4396 tandmall.exe 4820 vzzawzsl.exe 3136 imjqcvrq.exe 1256 tikjkpav.exe 4932 ggelayxc.exe 4596 qyujfozf.exe 3460 bxgoqmhf.exe 4116 ltzzxhhc.exe 4032 ygqollgh.exe 1420 icrhtfpm.exe 576 wpbwyjor.exe 4248 gkchgepw.exe 2628 qgdzoypu.exe 1828 bnrdctcq.exe 4780 scsgsprz.exe 3624 sneyhtnt.exe 3476 qwxzusve.exe 5064 yowzjyzr.exe 4264 gtymasbh.exe 2172 tcepdrbr.exe 1064 dbqunqbr.exe 4312 qoaktmie.exe 4080 bkbubgib.exe 2040 nmrianct.exe 2720 kozdqkaz.exe 3704 qxsqexjo.exe 4776 awwoowrn.exe 2904 ldjrkcwf.exe 788 vcnwdbde.exe 4572 fyogkwek.exe 3356 slxwqsdo.exe 3228 ycoaxhzr.exe 3008 vzwncojp.exe 4284 ddhatzmf.exe 3132 qraoexaa.exe 4892 sbsdxtiy.exe 2168 nsumfips.exe 4360 xnvencqq.exe 3852 ijopvxrn.exe 4328 arwszhjk.exe 4528 nauuczju.exe 224 akuwwqra.exe 2120 sduafeee.exe 2824 fkhspabs.exe 4456 cpzyeemd.exe 3412 pzfbhdmo.exe 2400 zyjhzctn.exe 3800 jxvekbtn.exe 4588 elmuelwn.exe 2844 ponncquz.exe 1824 sutxriwd.exe 2868 zzelbtgt.exe 4452 mmvahxff.exe 1848 xholorgd.exe 3948 hoaihqnc.exe 1336 rkbboloa.exe 2800 cfulwfpx.exe 1172 ppawzfph.exe 4492 zomtrdwh.exe 1328 bnqrcceh.exe 4352 mjrbjxfm.exe 3436 wektzrfj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xnvencqq.exe nsumfips.exe File opened for modification C:\Windows\SysWOW64\vyhhunpj.exe lzdkjphj.exe File created C:\Windows\SysWOW64\fyogkwek.exe vcnwdbde.exe File opened for modification C:\Windows\SysWOW64\boyjqpbs.exe qpumgqus.exe File opened for modification C:\Windows\SysWOW64\jicrypft.exe yjqtnqyt.exe File opened for modification C:\Windows\SysWOW64\gfonqktf.exe oqodujon.exe File opened for modification C:\Windows\SysWOW64\yknnbnza.exe naxpwxxf.exe File opened for modification C:\Windows\SysWOW64\seiwqvgn.exe qrftvurm.exe File created C:\Windows\SysWOW64\czkpziza.exe sagshkrb.exe File opened for modification C:\Windows\SysWOW64\mjrbjxfm.exe bnqrcceh.exe File opened for modification C:\Windows\SysWOW64\jsmhkhuw.exe wxurelns.exe File created C:\Windows\SysWOW64\zltaqats.exe omhdfbut.exe File created C:\Windows\SysWOW64\zgnoqizk.exe wsxypjso.exe File created C:\Windows\SysWOW64\gaxarnpw.exe tqqxovpm.exe File opened for modification C:\Windows\SysWOW64\oqdtzzgv.exe jpvyrcah.exe File opened for modification C:\Windows\SysWOW64\qcrpojod.exe dpazifpq.exe File created C:\Windows\SysWOW64\xstdvrrv.exe mlqsersh.exe File opened for modification C:\Windows\SysWOW64\jffqofwa.exe yjefylod.exe File opened for modification C:\Windows\SysWOW64\vcnwdbde.exe ldjrkcwf.exe File created C:\Windows\SysWOW64\eyevkmen.exe wxfuefas.exe File opened for modification C:\Windows\SysWOW64\sotasynh.exe exnusvcz.exe File created C:\Windows\SysWOW64\dkwgdztt.exe xxmqxvvp.exe File created C:\Windows\SysWOW64\frvwuyrq.exe swegocsd.exe File created C:\Windows\SysWOW64\wbtygmkk.exe lcptnnck.exe File created C:\Windows\SysWOW64\ilvxepgq.exe alwxyicv.exe File created C:\Windows\SysWOW64\varuasbw.exe jbosrkeo.exe File opened for modification C:\Windows\SysWOW64\gztzpycj.exe tejbjcdf.exe File opened for modification C:\Windows\SysWOW64\tqwuyghz.exe gztzpycj.exe File created C:\Windows\SysWOW64\xuohcbht.exe qqdutqfd.exe File created C:\Windows\SysWOW64\vvyjxsox.exe hlszubwn.exe File opened for modification C:\Windows\SysWOW64\ihxlhkhy.exe yfibuhae.exe File created C:\Windows\SysWOW64\gdhhisqz.exe yzxuzhnj.exe File created C:\Windows\SysWOW64\sdugyubc.exe dkwgdztt.exe File created C:\Windows\SysWOW64\mxjwjdpq.exe bbqlbigs.exe File created C:\Windows\SysWOW64\ygqollgh.exe ltzzxhhc.exe File opened for modification C:\Windows\SysWOW64\tbbkbbny.exe grvzykno.exe File created C:\Windows\SysWOW64\qcrpojod.exe dpazifpq.exe File created C:\Windows\SysWOW64\qtvdfovx.exe gqgsklod.exe File created C:\Windows\SysWOW64\rkbboloa.exe hoaihqnc.exe File opened for modification C:\Windows\SysWOW64\rlioahpx.exe hqheknpa.exe File created C:\Windows\SysWOW64\jdedmrgp.exe winngohc.exe File opened for modification C:\Windows\SysWOW64\rdxdkdmj.exe jdyddwin.exe File created C:\Windows\SysWOW64\winngohc.exe mfydlsbi.exe File created C:\Windows\SysWOW64\unfrscuc.exe jsmhkhuw.exe File created C:\Windows\SysWOW64\rlioahpx.exe hqheknpa.exe File created C:\Windows\SysWOW64\tbbkbbny.exe grvzykno.exe File opened for modification C:\Windows\SysWOW64\ddhatzmf.exe vzwncojp.exe File opened for modification C:\Windows\SysWOW64\deditamz.exe ydvglvgl.exe File opened for modification C:\Windows\SysWOW64\mytxlhss.exe zpvmihai.exe File created C:\Windows\SysWOW64\nvbwroyh.exe dkmmeksm.exe File opened for modification C:\Windows\SysWOW64\xstdvrrv.exe mlqsersh.exe File created C:\Windows\SysWOW64\tolamcqo.exe gbbcgyjk.exe File created C:\Windows\SysWOW64\gcyewklx.exe wdmgdlex.exe File opened for modification C:\Windows\SysWOW64\bxgoqmhf.exe qyujfozf.exe File opened for modification C:\Windows\SysWOW64\oqodujon.exe jauambif.exe File created C:\Windows\SysWOW64\dcbfiovi.exe qtvdfovx.exe File opened for modification C:\Windows\SysWOW64\qqdutqfd.exe frrxarxe.exe File created C:\Windows\SysWOW64\bwhezsbr.exe ojpptoue.exe File opened for modification C:\Windows\SysWOW64\mvlkjrbq.exe bwhezsbr.exe File opened for modification C:\Windows\SysWOW64\qvxqllps.exe gzwfwrgn.exe File created C:\Windows\SysWOW64\lygiulnv.exe xoaxrmnl.exe File opened for modification C:\Windows\SysWOW64\frrxarxe.exe vwyetwwy.exe File opened for modification C:\Windows\SysWOW64\yjefylod.exe onmvqqnx.exe File created C:\Windows\SysWOW64\baglasqj.exe nqzixsyy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4504 4764 542a865eac1dd6aa5de685dfeeb2f92d36eb7b6b210d504e421c1b245bb38732.exe 82 PID 4764 wrote to memory of 4504 4764 542a865eac1dd6aa5de685dfeeb2f92d36eb7b6b210d504e421c1b245bb38732.exe 82 PID 4764 wrote to memory of 4504 4764 542a865eac1dd6aa5de685dfeeb2f92d36eb7b6b210d504e421c1b245bb38732.exe 82 PID 4504 wrote to memory of 4888 4504 vgqdcqhh.exe 83 PID 4504 wrote to memory of 4888 4504 vgqdcqhh.exe 83 PID 4504 wrote to memory of 4888 4504 vgqdcqhh.exe 83 PID 4888 wrote to memory of 4396 4888 lzodxlpq.exe 84 PID 4888 wrote to memory of 4396 4888 lzodxlpq.exe 84 PID 4888 wrote to memory of 4396 4888 lzodxlpq.exe 84 PID 4396 wrote to memory of 4820 4396 tandmall.exe 85 PID 4396 wrote to memory of 4820 4396 tandmall.exe 85 PID 4396 wrote to memory of 4820 4396 tandmall.exe 85 PID 4820 wrote to memory of 3136 4820 vzzawzsl.exe 86 PID 4820 wrote to memory of 3136 4820 vzzawzsl.exe 86 PID 4820 wrote to memory of 3136 4820 vzzawzsl.exe 86 PID 3136 wrote to memory of 1256 3136 imjqcvrq.exe 87 PID 3136 wrote to memory of 1256 3136 imjqcvrq.exe 87 PID 3136 wrote to memory of 1256 3136 imjqcvrq.exe 87 PID 1256 wrote to memory of 4932 1256 tikjkpav.exe 88 PID 1256 wrote to memory of 4932 1256 tikjkpav.exe 88 PID 1256 wrote to memory of 4932 1256 tikjkpav.exe 88 PID 4932 wrote to memory of 4596 4932 ggelayxc.exe 89 PID 4932 wrote to memory of 4596 4932 ggelayxc.exe 89 PID 4932 wrote to memory of 4596 4932 ggelayxc.exe 89 PID 4596 wrote to memory of 3460 4596 qyujfozf.exe 90 PID 4596 wrote to memory of 3460 4596 qyujfozf.exe 90 PID 4596 wrote to memory of 3460 4596 qyujfozf.exe 90 PID 3460 wrote to memory of 4116 3460 bxgoqmhf.exe 91 PID 3460 wrote to memory of 4116 3460 bxgoqmhf.exe 91 PID 3460 wrote to memory of 4116 3460 bxgoqmhf.exe 91 PID 4116 wrote to memory of 4032 4116 ltzzxhhc.exe 92 PID 4116 wrote to memory of 4032 4116 ltzzxhhc.exe 92 PID 4116 wrote to memory of 4032 4116 ltzzxhhc.exe 92 PID 4032 wrote to memory of 1420 4032 ygqollgh.exe 93 PID 4032 wrote to memory of 1420 4032 ygqollgh.exe 93 PID 4032 wrote to memory of 1420 4032 ygqollgh.exe 93 PID 1420 wrote to memory of 576 1420 icrhtfpm.exe 94 PID 1420 wrote to memory of 576 1420 icrhtfpm.exe 94 PID 1420 wrote to memory of 576 1420 icrhtfpm.exe 94 PID 576 wrote to memory of 4248 576 wpbwyjor.exe 95 PID 576 wrote to memory of 4248 576 wpbwyjor.exe 95 PID 576 wrote to memory of 4248 576 wpbwyjor.exe 95 PID 4248 wrote to memory of 2628 4248 gkchgepw.exe 96 PID 4248 wrote to memory of 2628 4248 gkchgepw.exe 96 PID 4248 wrote to memory of 2628 4248 gkchgepw.exe 96 PID 2628 wrote to memory of 1828 2628 qgdzoypu.exe 97 PID 2628 wrote to memory of 1828 2628 qgdzoypu.exe 97 PID 2628 wrote to memory of 1828 2628 qgdzoypu.exe 97 PID 1828 wrote to memory of 4780 1828 bnrdctcq.exe 98 PID 1828 wrote to memory of 4780 1828 bnrdctcq.exe 98 PID 1828 wrote to memory of 4780 1828 bnrdctcq.exe 98 PID 4780 wrote to memory of 3624 4780 scsgsprz.exe 99 PID 4780 wrote to memory of 3624 4780 scsgsprz.exe 99 PID 4780 wrote to memory of 3624 4780 scsgsprz.exe 99 PID 3624 wrote to memory of 3476 3624 sneyhtnt.exe 100 PID 3624 wrote to memory of 3476 3624 sneyhtnt.exe 100 PID 3624 wrote to memory of 3476 3624 sneyhtnt.exe 100 PID 3476 wrote to memory of 5064 3476 qwxzusve.exe 101 PID 3476 wrote to memory of 5064 3476 qwxzusve.exe 101 PID 3476 wrote to memory of 5064 3476 qwxzusve.exe 101 PID 5064 wrote to memory of 4264 5064 yowzjyzr.exe 102 PID 5064 wrote to memory of 4264 5064 yowzjyzr.exe 102 PID 5064 wrote to memory of 4264 5064 yowzjyzr.exe 102 PID 4264 wrote to memory of 2172 4264 gtymasbh.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\542a865eac1dd6aa5de685dfeeb2f92d36eb7b6b210d504e421c1b245bb38732.exe"C:\Users\Admin\AppData\Local\Temp\542a865eac1dd6aa5de685dfeeb2f92d36eb7b6b210d504e421c1b245bb38732.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\vgqdcqhh.exeC:\Windows\system32\vgqdcqhh.exe 1012 "C:\Users\Admin\AppData\Local\Temp\542a865eac1dd6aa5de685dfeeb2f92d36eb7b6b210d504e421c1b245bb38732.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\lzodxlpq.exeC:\Windows\system32\lzodxlpq.exe 1140 "C:\Windows\SysWOW64\vgqdcqhh.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\tandmall.exeC:\Windows\system32\tandmall.exe 1148 "C:\Windows\SysWOW64\lzodxlpq.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\vzzawzsl.exeC:\Windows\system32\vzzawzsl.exe 1152 "C:\Windows\SysWOW64\tandmall.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\imjqcvrq.exeC:\Windows\system32\imjqcvrq.exe 1156 "C:\Windows\SysWOW64\vzzawzsl.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\tikjkpav.exeC:\Windows\system32\tikjkpav.exe 1080 "C:\Windows\SysWOW64\imjqcvrq.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\ggelayxc.exeC:\Windows\system32\ggelayxc.exe 1160 "C:\Windows\SysWOW64\tikjkpav.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\qyujfozf.exeC:\Windows\system32\qyujfozf.exe 1164 "C:\Windows\SysWOW64\ggelayxc.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\bxgoqmhf.exeC:\Windows\system32\bxgoqmhf.exe 1172 "C:\Windows\SysWOW64\qyujfozf.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\ltzzxhhc.exeC:\Windows\system32\ltzzxhhc.exe 1136 "C:\Windows\SysWOW64\bxgoqmhf.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\ygqollgh.exeC:\Windows\system32\ygqollgh.exe 1096 "C:\Windows\SysWOW64\ltzzxhhc.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\icrhtfpm.exeC:\Windows\system32\icrhtfpm.exe 1184 "C:\Windows\SysWOW64\ygqollgh.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\wpbwyjor.exeC:\Windows\system32\wpbwyjor.exe 1180 "C:\Windows\SysWOW64\icrhtfpm.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\gkchgepw.exeC:\Windows\system32\gkchgepw.exe 1192 "C:\Windows\SysWOW64\wpbwyjor.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\qgdzoypu.exeC:\Windows\system32\qgdzoypu.exe 1176 "C:\Windows\SysWOW64\gkchgepw.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\bnrdctcq.exeC:\Windows\system32\bnrdctcq.exe 1200 "C:\Windows\SysWOW64\qgdzoypu.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\scsgsprz.exeC:\Windows\system32\scsgsprz.exe 1168 "C:\Windows\SysWOW64\bnrdctcq.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\sneyhtnt.exeC:\Windows\system32\sneyhtnt.exe 1196 "C:\Windows\SysWOW64\scsgsprz.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\qwxzusve.exeC:\Windows\system32\qwxzusve.exe 1208 "C:\Windows\SysWOW64\sneyhtnt.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\yowzjyzr.exeC:\Windows\system32\yowzjyzr.exe 1216 "C:\Windows\SysWOW64\qwxzusve.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\gtymasbh.exeC:\Windows\system32\gtymasbh.exe 1188 "C:\Windows\SysWOW64\yowzjyzr.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\tcepdrbr.exeC:\Windows\system32\tcepdrbr.exe 1224 "C:\Windows\SysWOW64\gtymasbh.exe"23⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\dbqunqbr.exeC:\Windows\system32\dbqunqbr.exe 1228 "C:\Windows\SysWOW64\tcepdrbr.exe"24⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\qoaktmie.exeC:\Windows\system32\qoaktmie.exe 1232 "C:\Windows\SysWOW64\dbqunqbr.exe"25⤵
- Executes dropped EXE
PID:4312 -
C:\Windows\SysWOW64\bkbubgib.exeC:\Windows\system32\bkbubgib.exe 1220 "C:\Windows\SysWOW64\qoaktmie.exe"26⤵
- Executes dropped EXE
PID:4080 -
C:\Windows\SysWOW64\nmrianct.exeC:\Windows\system32\nmrianct.exe 1240 "C:\Windows\SysWOW64\bkbubgib.exe"27⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\kozdqkaz.exeC:\Windows\system32\kozdqkaz.exe 1252 "C:\Windows\SysWOW64\nmrianct.exe"28⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\qxsqexjo.exeC:\Windows\system32\qxsqexjo.exe 1244 "C:\Windows\SysWOW64\kozdqkaz.exe"29⤵
- Executes dropped EXE
PID:3704 -
C:\Windows\SysWOW64\awwoowrn.exeC:\Windows\system32\awwoowrn.exe 1248 "C:\Windows\SysWOW64\qxsqexjo.exe"30⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\SysWOW64\ldjrkcwf.exeC:\Windows\system32\ldjrkcwf.exe 1236 "C:\Windows\SysWOW64\awwoowrn.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2904 -
C:\Windows\SysWOW64\vcnwdbde.exeC:\Windows\system32\vcnwdbde.exe 1260 "C:\Windows\SysWOW64\ldjrkcwf.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:788 -
C:\Windows\SysWOW64\fyogkwek.exeC:\Windows\system32\fyogkwek.exe 1264 "C:\Windows\SysWOW64\vcnwdbde.exe"33⤵
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\slxwqsdo.exeC:\Windows\system32\slxwqsdo.exe 1256 "C:\Windows\SysWOW64\fyogkwek.exe"34⤵
- Executes dropped EXE
PID:3356 -
C:\Windows\SysWOW64\ycoaxhzr.exeC:\Windows\system32\ycoaxhzr.exe 1268 "C:\Windows\SysWOW64\slxwqsdo.exe"35⤵
- Executes dropped EXE
PID:3228 -
C:\Windows\SysWOW64\vzwncojp.exeC:\Windows\system32\vzwncojp.exe 1276 "C:\Windows\SysWOW64\ycoaxhzr.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3008 -
C:\Windows\SysWOW64\ddhatzmf.exeC:\Windows\system32\ddhatzmf.exe 1032 "C:\Windows\SysWOW64\vzwncojp.exe"37⤵
- Executes dropped EXE
PID:4284 -
C:\Windows\SysWOW64\qraoexaa.exeC:\Windows\system32\qraoexaa.exe 1280 "C:\Windows\SysWOW64\ddhatzmf.exe"38⤵
- Executes dropped EXE
PID:3132 -
C:\Windows\SysWOW64\sbsdxtiy.exeC:\Windows\system32\sbsdxtiy.exe 1288 "C:\Windows\SysWOW64\qraoexaa.exe"39⤵
- Executes dropped EXE
PID:4892 -
C:\Windows\SysWOW64\nsumfips.exeC:\Windows\system32\nsumfips.exe 1292 "C:\Windows\SysWOW64\sbsdxtiy.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\xnvencqq.exeC:\Windows\system32\xnvencqq.exe 1284 "C:\Windows\SysWOW64\nsumfips.exe"41⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\ijopvxrn.exeC:\Windows\system32\ijopvxrn.exe 1296 "C:\Windows\SysWOW64\xnvencqq.exe"42⤵
- Executes dropped EXE
PID:3852 -
C:\Windows\SysWOW64\arwszhjk.exeC:\Windows\system32\arwszhjk.exe 1300 "C:\Windows\SysWOW64\ijopvxrn.exe"43⤵
- Executes dropped EXE
PID:4328 -
C:\Windows\SysWOW64\nauuczju.exeC:\Windows\system32\nauuczju.exe 1308 "C:\Windows\SysWOW64\arwszhjk.exe"44⤵
- Executes dropped EXE
PID:4528 -
C:\Windows\SysWOW64\akuwwqra.exeC:\Windows\system32\akuwwqra.exe 1304 "C:\Windows\SysWOW64\nauuczju.exe"45⤵
- Executes dropped EXE
PID:224 -
C:\Windows\SysWOW64\sduafeee.exeC:\Windows\system32\sduafeee.exe 1316 "C:\Windows\SysWOW64\akuwwqra.exe"46⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\fkhspabs.exeC:\Windows\system32\fkhspabs.exe 1320 "C:\Windows\SysWOW64\sduafeee.exe"47⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\cpzyeemd.exeC:\Windows\system32\cpzyeemd.exe 1324 "C:\Windows\SysWOW64\fkhspabs.exe"48⤵
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\pzfbhdmo.exeC:\Windows\system32\pzfbhdmo.exe 1212 "C:\Windows\SysWOW64\cpzyeemd.exe"49⤵
- Executes dropped EXE
PID:3412 -
C:\Windows\SysWOW64\zyjhzctn.exeC:\Windows\system32\zyjhzctn.exe 1272 "C:\Windows\SysWOW64\pzfbhdmo.exe"50⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\jxvekbtn.exeC:\Windows\system32\jxvekbtn.exe 1336 "C:\Windows\SysWOW64\zyjhzctn.exe"51⤵
- Executes dropped EXE
PID:3800 -
C:\Windows\SysWOW64\elmuelwn.exeC:\Windows\system32\elmuelwn.exe 1332 "C:\Windows\SysWOW64\jxvekbtn.exe"52⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\ponncquz.exeC:\Windows\system32\ponncquz.exe 1340 "C:\Windows\SysWOW64\elmuelwn.exe"53⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\sutxriwd.exeC:\Windows\system32\sutxriwd.exe 1344 "C:\Windows\SysWOW64\ponncquz.exe"54⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\zzelbtgt.exeC:\Windows\system32\zzelbtgt.exe 1328 "C:\Windows\SysWOW64\sutxriwd.exe"55⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\mmvahxff.exeC:\Windows\system32\mmvahxff.exe 1352 "C:\Windows\SysWOW64\zzelbtgt.exe"56⤵
- Executes dropped EXE
PID:4452 -
C:\Windows\SysWOW64\xholorgd.exeC:\Windows\system32\xholorgd.exe 1312 "C:\Windows\SysWOW64\mmvahxff.exe"57⤵
- Executes dropped EXE
PID:1848 -
C:\Windows\SysWOW64\hoaihqnc.exeC:\Windows\system32\hoaihqnc.exe 1360 "C:\Windows\SysWOW64\xholorgd.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3948 -
C:\Windows\SysWOW64\rkbboloa.exeC:\Windows\system32\rkbboloa.exe 1356 "C:\Windows\SysWOW64\hoaihqnc.exe"59⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\cfulwfpx.exeC:\Windows\system32\cfulwfpx.exe 1372 "C:\Windows\SysWOW64\rkbboloa.exe"60⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\ppawzfph.exeC:\Windows\system32\ppawzfph.exe 1368 "C:\Windows\SysWOW64\cfulwfpx.exe"61⤵
- Executes dropped EXE
PID:1172 -
C:\Windows\SysWOW64\zomtrdwh.exeC:\Windows\system32\zomtrdwh.exe 1376 "C:\Windows\SysWOW64\ppawzfph.exe"62⤵
- Executes dropped EXE
PID:4492 -
C:\Windows\SysWOW64\bnqrcceh.exeC:\Windows\system32\bnqrcceh.exe 1380 "C:\Windows\SysWOW64\zomtrdwh.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1328 -
C:\Windows\SysWOW64\mjrbjxfm.exeC:\Windows\system32\mjrbjxfm.exe 1388 "C:\Windows\SysWOW64\bnqrcceh.exe"64⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\wektzrfj.exeC:\Windows\system32\wektzrfj.exe 1392 "C:\Windows\SysWOW64\mjrbjxfm.exe"65⤵
- Executes dropped EXE
PID:3436 -
C:\Windows\SysWOW64\halegmgh.exeC:\Windows\system32\halegmgh.exe 1396 "C:\Windows\SysWOW64\wektzrfj.exe"66⤵PID:4548
-
C:\Windows\SysWOW64\mbtzxrmu.exeC:\Windows\system32\mbtzxrmu.exe 1400 "C:\Windows\SysWOW64\halegmgh.exe"67⤵PID:2556
-
C:\Windows\SysWOW64\wxurelns.exeC:\Windows\system32\wxurelns.exe 1384 "C:\Windows\SysWOW64\mbtzxrmu.exe"68⤵
- Drops file in System32 directory
PID:3684 -
C:\Windows\SysWOW64\jsmhkhuw.exeC:\Windows\system32\jsmhkhuw.exe 1408 "C:\Windows\SysWOW64\wxurelns.exe"69⤵
- Drops file in System32 directory
PID:2764 -
C:\Windows\SysWOW64\unfrscuc.exeC:\Windows\system32\unfrscuc.exe 1404 "C:\Windows\SysWOW64\jsmhkhuw.exe"70⤵PID:4828
-
C:\Windows\SysWOW64\zpvmihai.exeC:\Windows\system32\zpvmihai.exe 1348 "C:\Windows\SysWOW64\unfrscuc.exe"71⤵
- Drops file in System32 directory
PID:3140 -
C:\Windows\SysWOW64\mytxlhss.exeC:\Windows\system32\mytxlhss.exe 1364 "C:\Windows\SysWOW64\zpvmihai.exe"72⤵PID:4848
-
C:\Windows\SysWOW64\wxfuefas.exeC:\Windows\system32\wxfuefas.exe 1424 "C:\Windows\SysWOW64\mytxlhss.exe"73⤵
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\eyevkmen.exeC:\Windows\system32\eyevkmen.exe 1428 "C:\Windows\SysWOW64\wxfuefas.exe"74⤵PID:1936
-
C:\Windows\SysWOW64\jdyddwin.exeC:\Windows\system32\jdyddwin.exe 1412 "C:\Windows\SysWOW64\eyevkmen.exe"75⤵
- Drops file in System32 directory
PID:748 -
C:\Windows\SysWOW64\rdxdkdmj.exeC:\Windows\system32\rdxdkdmj.exe 1436 "C:\Windows\SysWOW64\jdyddwin.exe"76⤵PID:2348
-
C:\Windows\SysWOW64\eqosqhlv.exeC:\Windows\system32\eqosqhlv.exe 1432 "C:\Windows\SysWOW64\rdxdkdmj.exe"77⤵PID:3896
-
C:\Windows\SysWOW64\omhdfbut.exeC:\Windows\system32\omhdfbut.exe 1444 "C:\Windows\SysWOW64\eqosqhlv.exe"78⤵
- Drops file in System32 directory
PID:208 -
C:\Windows\SysWOW64\zltaqats.exeC:\Windows\system32\zltaqats.exe 1416 "C:\Windows\SysWOW64\omhdfbut.exe"79⤵PID:4120
-
C:\Windows\SysWOW64\mgdywesx.exeC:\Windows\system32\mgdywesx.exe 1448 "C:\Windows\SysWOW64\zltaqats.exe"80⤵PID:1268
-
C:\Windows\SysWOW64\zijbzdsi.exeC:\Windows\system32\zijbzdsi.exe 1036 "C:\Windows\SysWOW64\mgdywesx.exe"81⤵PID:360
-
C:\Windows\SysWOW64\jpvyrcah.exeC:\Windows\system32\jpvyrcah.exe 1460 "C:\Windows\SysWOW64\zijbzdsi.exe"82⤵
- Drops file in System32 directory
PID:3960 -
C:\Windows\SysWOW64\oqdtzzgv.exeC:\Windows\system32\oqdtzzgv.exe 1456 "C:\Windows\SysWOW64\jpvyrcah.exe"83⤵PID:4840
-
C:\Windows\SysWOW64\cdnrfdea.exeC:\Windows\system32\cdnrfdea.exe 1464 "C:\Windows\SysWOW64\oqdtzzgv.exe"84⤵PID:3296
-
C:\Windows\SysWOW64\mkzoycma.exeC:\Windows\system32\mkzoycma.exe 1452 "C:\Windows\SysWOW64\cdnrfdea.exe"85⤵PID:2260
-
C:\Windows\SysWOW64\zmfrbcek.exeC:\Windows\system32\zmfrbcek.exe 1440 "C:\Windows\SysWOW64\mkzoycma.exe"86⤵PID:984
-
C:\Windows\SysWOW64\hqheknpa.exeC:\Windows\system32\hqheknpa.exe 1476 "C:\Windows\SysWOW64\zmfrbcek.exe"87⤵
- Drops file in System32 directory
PID:2312 -
C:\Windows\SysWOW64\rlioahpx.exeC:\Windows\system32\rlioahpx.exe 1480 "C:\Windows\SysWOW64\hqheknpa.exe"88⤵PID:64
-
C:\Windows\SysWOW64\eyaeflok.exeC:\Windows\system32\eyaeflok.exe 1484 "C:\Windows\SysWOW64\rlioahpx.exe"89⤵PID:620
-
C:\Windows\SysWOW64\ojpptoue.exeC:\Windows\system32\ojpptoue.exe 1468 "C:\Windows\SysWOW64\eyaeflok.exe"90⤵
- Drops file in System32 directory
PID:4252 -
C:\Windows\SysWOW64\bwhezsbr.exeC:\Windows\system32\bwhezsbr.exe 1496 "C:\Windows\SysWOW64\ojpptoue.exe"91⤵
- Drops file in System32 directory
PID:2184 -
C:\Windows\SysWOW64\mvlkjrbq.exeC:\Windows\system32\mvlkjrbq.exe 1492 "C:\Windows\SysWOW64\bwhezsbr.exe"92⤵PID:1284
-
C:\Windows\SysWOW64\wrmuzlko.exeC:\Windows\system32\wrmuzlko.exe 1500 "C:\Windows\SysWOW64\mvlkjrbq.exe"93⤵PID:2332
-
C:\Windows\SysWOW64\gmffggkt.exeC:\Windows\system32\gmffggkt.exe 1508 "C:\Windows\SysWOW64\wrmuzlko.exe"94⤵PID:2568
-
C:\Windows\SysWOW64\uwlpjfkd.exeC:\Windows\system32\uwlpjfkd.exe 1472 "C:\Windows\SysWOW64\gmffggkt.exe"95⤵PID:4704
-
C:\Windows\SysWOW64\bavcbqnt.exeC:\Windows\system32\bavcbqnt.exe 1512 "C:\Windows\SysWOW64\uwlpjfkd.exe"96⤵PID:4608
-
C:\Windows\SysWOW64\pnnsgumy.exeC:\Windows\system32\pnnsgumy.exe 1516 "C:\Windows\SysWOW64\bavcbqnt.exe"97⤵PID:1776
-
C:\Windows\SysWOW64\cawimqll.exeC:\Windows\system32\cawimqll.exe 1520 "C:\Windows\SysWOW64\pnnsgumy.exe"98⤵PID:5008
-
C:\Windows\SysWOW64\mwxsukti.exeC:\Windows\system32\mwxsukti.exe 1524 "C:\Windows\SysWOW64\cawimqll.exe"99⤵PID:2092
-
C:\Windows\SysWOW64\wgmdhnak.exeC:\Windows\system32\wgmdhnak.exe 1528 "C:\Windows\SysWOW64\mwxsukti.exe"100⤵PID:4376
-
C:\Windows\SysWOW64\jqtnknau.exeC:\Windows\system32\jqtnknau.exe 1488 "C:\Windows\SysWOW64\wgmdhnak.exe"101⤵PID:2032
-
C:\Windows\SysWOW64\upxlcmzu.exeC:\Windows\system32\upxlcmzu.exe 1536 "C:\Windows\SysWOW64\jqtnknau.exe"102⤵PID:4320
-
C:\Windows\SysWOW64\wojinlhm.exeC:\Windows\system32\wojinlhm.exe 1540 "C:\Windows\SysWOW64\upxlcmzu.exe"103⤵PID:4500
-
C:\Windows\SysWOW64\jxplqkhw.exeC:\Windows\system32\jxplqkhw.exe 1548 "C:\Windows\SysWOW64\wojinlhm.exe"104⤵PID:1788
-
C:\Windows\SysWOW64\twtqijow.exeC:\Windows\system32\twtqijow.exe 1544 "C:\Windows\SysWOW64\jxplqkhw.exe"105⤵PID:3924
-
C:\Windows\SysWOW64\grlgonnj.exeC:\Windows\system32\grlgonnj.exe 1552 "C:\Windows\SysWOW64\twtqijow.exe"106⤵PID:5012
-
C:\Windows\SysWOW64\wsxypjso.exeC:\Windows\system32\wsxypjso.exe 1560 "C:\Windows\SysWOW64\grlgonnj.exe"107⤵
- Drops file in System32 directory
PID:3884 -
C:\Windows\SysWOW64\zgnoqizk.exeC:\Windows\system32\zgnoqizk.exe 1556 "C:\Windows\SysWOW64\wsxypjso.exe"108⤵PID:4852
-
C:\Windows\SysWOW64\jfzmahhj.exeC:\Windows\system32\jfzmahhj.exe 1568 "C:\Windows\SysWOW64\zgnoqizk.exe"109⤵PID:1800
-
C:\Windows\SysWOW64\wwupjpmr.exeC:\Windows\system32\wwupjpmr.exe 1572 "C:\Windows\SysWOW64\jfzmahhj.exe"110⤵PID:1432
-
C:\Windows\SysWOW64\grvzykno.exeC:\Windows\system32\grvzykno.exe 1576 "C:\Windows\SysWOW64\wwupjpmr.exe"111⤵
- Drops file in System32 directory
PID:4420 -
C:\Windows\SysWOW64\tbbkbbny.exeC:\Windows\system32\tbbkbbny.exe 1564 "C:\Windows\SysWOW64\grvzykno.exe"112⤵PID:2316
-
C:\Windows\SysWOW64\hokzhfml.exeC:\Windows\system32\hokzhfml.exe 1580 "C:\Windows\SysWOW64\tbbkbbny.exe"113⤵PID:3240
-
C:\Windows\SysWOW64\qzakuisf.exeC:\Windows\system32\qzakuisf.exe 1504 "C:\Windows\SysWOW64\hokzhfml.exe"114⤵PID:4788
-
C:\Windows\SysWOW64\eignxisq.exeC:\Windows\system32\eignxisq.exe 1588 "C:\Windows\SysWOW64\qzakuisf.exe"115⤵PID:1508
-
C:\Windows\SysWOW64\lrzutqtn.exeC:\Windows\system32\lrzutqtn.exe 1592 "C:\Windows\SysWOW64\eignxisq.exe"116⤵PID:2712
-
C:\Windows\SysWOW64\zpdcnyxm.exeC:\Windows\system32\zpdcnyxm.exe 1532 "C:\Windows\SysWOW64\lrzutqtn.exe"117⤵PID:4304
-
C:\Windows\SysWOW64\lgyfvycb.exeC:\Windows\system32\lgyfvycb.exe 1612 "C:\Windows\SysWOW64\zpdcnyxm.exe"118⤵PID:1516
-
C:\Windows\SysWOW64\wfkkgxkt.exeC:\Windows\system32\wfkkgxkt.exe 1596 "C:\Windows\SysWOW64\lgyfvycb.exe"119⤵PID:5068
-
C:\Windows\SysWOW64\jauambif.exeC:\Windows\system32\jauambif.exe 1604 "C:\Windows\SysWOW64\wfkkgxkt.exe"120⤵
- Drops file in System32 directory
PID:3996 -
C:\Windows\SysWOW64\oqodujon.exeC:\Windows\system32\oqodujon.exe 1608 "C:\Windows\SysWOW64\jauambif.exe"121⤵
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\gfonqktf.exeC:\Windows\system32\gfonqktf.exe 1620 "C:\Windows\SysWOW64\oqodujon.exe"122⤵PID:1960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-