Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
37s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
545de00a44e44ff1bbc119857dd15f79.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
545de00a44e44ff1bbc119857dd15f79.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
545de00a44e44ff1bbc119857dd15f79.exe
-
Size
147KB
-
MD5
545de00a44e44ff1bbc119857dd15f79
-
SHA1
246493466b8052de8ab1409c438cbafd8398cf0a
-
SHA256
98c33d224206752ea52528b128a3495306c35c53f2c8c206b4c194a9cb82a525
-
SHA512
24f106215aa82dee23bd72718b8aebc7e2ee643d1d04b292b11bab75fa46306a153670f67c6e39bd3dea12a5695f9edebc9a809e2972abfe43a100889fe2deb0
-
SSDEEP
3072:pxIilxA2fi/dLWcEk5VbOcoXjMxkK9u4IRMzOLqo:pxbxA2uEk5YcXk/4IRMq
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2268 qliiui.exe 2768 nmavql.exe 2224 xletbk.exe 2596 houdwn.exe 552 oseqfg.exe 2412 zrqoyf.exe 2884 icfyla.exe 676 tbjwvz.exe 2648 dxkglt.exe 1532 qzqwwg.exe 3020 ayuthf.exe 2076 maijsr.exe 2456 xvbtim.exe 1776 hyrevh.exe 1824 rxdbfg.exe 1060 bteuva.exe 620 lairfz.exe 2408 yqduoh.exe 1496 gbjzlb.exe 3068 twtorf.exe 2856 gnorzn.exe 2736 pxlcnq.exe 2548 axpzfp.exe 2960 kzfjsk.exe 2804 xmwzyo.exe 2428 hxljlr.exe 2020 myuecw.exe 1468 ejhxjt.exe 1740 jwbedv.exe 1316 ypxzmr.exe 964 asnkau.exe 1648 kzrhkl.exe 1868 xmixqp.exe 972 hoyhls.exe 2628 rnkfvr.exe 2196 byzpju.exe 2044 lxdnbs.exe 2756 wtefjn.exe 2588 dxpkay.exe 2696 owtikx.exe 1928 ydfnvw.exe 1916 icjknu.exe 2572 nhcsze.exe 2536 cazfis.exe 2096 mlpqdv.exe 288 zygfjz.exe 2088 jxkduy.exe 1084 tianhb.exe 1812 dhmlza.exe 1544 ogqikq.exe 2176 yfcncp.exe 1264 imglmo.exe 860 spvvar.exe 2484 ztgark.exe 1604 kskgbj.exe 2580 xfbvhf.exe 2424 hmftae.exe 760 rpddnh.exe 2880 oqnqjs.exe 2692 bdfgpo.exe 2208 lnuqkr.exe 3016 vjopgl.exe 1136 uhjvfv.exe 1560 kwglwu.exe -
Loads dropped DLL 64 IoCs
pid Process 3052 545de00a44e44ff1bbc119857dd15f79.exe 3052 545de00a44e44ff1bbc119857dd15f79.exe 2268 qliiui.exe 2268 qliiui.exe 2768 nmavql.exe 2768 nmavql.exe 2224 xletbk.exe 2224 xletbk.exe 2596 houdwn.exe 2596 houdwn.exe 836 Process not Found 836 Process not Found 836 Process not Found 836 Process not Found 836 Process not Found 836 Process not Found 552 oseqfg.exe 552 oseqfg.exe 836 Process not Found 836 Process not Found 836 Process not Found 836 Process not Found 836 Process not Found 836 Process not Found 2412 zrqoyf.exe 2412 zrqoyf.exe 836 Process not Found 836 Process not Found 2884 icfyla.exe 2884 icfyla.exe 836 Process not Found 836 Process not Found 676 tbjwvz.exe 676 tbjwvz.exe 836 Process not Found 836 Process not Found 2648 dxkglt.exe 2648 dxkglt.exe 836 Process not Found 836 Process not Found 1532 qzqwwg.exe 1532 qzqwwg.exe 836 Process not Found 836 Process not Found 3020 ayuthf.exe 3020 ayuthf.exe 836 Process not Found 836 Process not Found 2076 maijsr.exe 2076 maijsr.exe 836 Process not Found 836 Process not Found 2456 xvbtim.exe 2456 xvbtim.exe 836 Process not Found 836 Process not Found 1776 hyrevh.exe 1776 hyrevh.exe 836 Process not Found 836 Process not Found 1824 rxdbfg.exe 836 Process not Found 836 Process not Found 1824 rxdbfg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\bdjnvd.exe bkicbq.exe File opened for modification C:\Windows\SysWOW64\jwbedv.exe ejhxjt.exe File opened for modification C:\Windows\SysWOW64\asnkau.exe ypxzmr.exe File created C:\Windows\SysWOW64\owtikx.exe dxpkay.exe File opened for modification C:\Windows\SysWOW64\fnuuvu.exe bwxzzo.exe File created C:\Windows\SysWOW64\qzqwwg.exe dxkglt.exe File created C:\Windows\SysWOW64\jxkduy.exe zygfjz.exe File created C:\Windows\SysWOW64\imglmo.exe yfcncp.exe File created C:\Windows\SysWOW64\qbwprt.exe jqxcuz.exe File opened for modification C:\Windows\SysWOW64\cpbrgp.exe pcjbal.exe File created C:\Windows\SysWOW64\qhpkby.exe cuyvnu.exe File opened for modification C:\Windows\SysWOW64\nmavql.exe qliiui.exe File created C:\Windows\SysWOW64\xletbk.exe nmavql.exe File created C:\Windows\SysWOW64\wtefjn.exe lxdnbs.exe File opened for modification C:\Windows\SysWOW64\zygfjz.exe mlpqdv.exe File opened for modification C:\Windows\SysWOW64\svnbil.exe lkhwlr.exe File created C:\Windows\SysWOW64\ypxzmr.exe jwbedv.exe File created C:\Windows\SysWOW64\dxkglt.exe tbjwvz.exe File created C:\Windows\SysWOW64\kzfjsk.exe axpzfp.exe File opened for modification C:\Windows\SysWOW64\xmwzyo.exe kzfjsk.exe File created C:\Windows\SysWOW64\bdfgpo.exe oqnqjs.exe File opened for modification C:\Windows\SysWOW64\oqnqjs.exe rpddnh.exe File opened for modification C:\Windows\SysWOW64\kwglwu.exe uhjvfv.exe File created C:\Windows\SysWOW64\svnbil.exe lkhwlr.exe File opened for modification C:\Windows\SysWOW64\tbjwvz.exe icfyla.exe File created C:\Windows\SysWOW64\rnkfvr.exe hoyhls.exe File opened for modification C:\Windows\SysWOW64\nhcsze.exe icjknu.exe File created C:\Windows\SysWOW64\tbjwvz.exe icfyla.exe File created C:\Windows\SysWOW64\lkhwlr.exe dgejug.exe File created C:\Windows\SysWOW64\zsyylr.exe ptmbbs.exe File opened for modification C:\Windows\SysWOW64\lairfz.exe bteuva.exe File created C:\Windows\SysWOW64\icjknu.exe ydfnvw.exe File opened for modification C:\Windows\SysWOW64\gnorzn.exe twtorf.exe File created C:\Windows\SysWOW64\hmftae.exe xfbvhf.exe File opened for modification C:\Windows\SysWOW64\uhjvfv.exe vjopgl.exe File opened for modification C:\Windows\SysWOW64\lkhwlr.exe dgejug.exe File created C:\Windows\SysWOW64\lmfgzq.exe mitbuz.exe File created C:\Windows\SysWOW64\oseqfg.exe houdwn.exe File created C:\Windows\SysWOW64\gbjzlb.exe yqduoh.exe File created C:\Windows\SysWOW64\lxdnbs.exe byzpju.exe File opened for modification C:\Windows\SysWOW64\vtquvk.exe igyepo.exe File created C:\Windows\SysWOW64\rpddnh.exe hmftae.exe File created C:\Windows\SysWOW64\wigrgk.exe lmfgzq.exe File created C:\Windows\SysWOW64\zygfjz.exe mlpqdv.exe File opened for modification C:\Windows\SysWOW64\zsyylr.exe ptmbbs.exe File created C:\Windows\SysWOW64\mofxyo.exe cpbrgp.exe File created C:\Windows\SysWOW64\bteuva.exe rxdbfg.exe File created C:\Windows\SysWOW64\ejhxjt.exe myuecw.exe File created C:\Windows\SysWOW64\oqnqjs.exe rpddnh.exe File opened for modification C:\Windows\SysWOW64\bdfgpo.exe oqnqjs.exe File created C:\Windows\SysWOW64\mitbuz.exe zsyylr.exe File created C:\Windows\SysWOW64\hxljlr.exe xmwzyo.exe File created C:\Windows\SysWOW64\mlpqdv.exe cazfis.exe File created C:\Windows\SysWOW64\dzphlw.exe pmgrfs.exe File created C:\Windows\SysWOW64\qtntoc.exe kwglwu.exe File created C:\Windows\SysWOW64\bwxzzo.exe qbwprt.exe File created C:\Windows\SysWOW64\vjopgl.exe lnuqkr.exe File created C:\Windows\SysWOW64\vtquvk.exe igyepo.exe File opened for modification C:\Windows\SysWOW64\hyrevh.exe xvbtim.exe File created C:\Windows\SysWOW64\hoyhls.exe xmixqp.exe File created C:\Windows\SysWOW64\ydfnvw.exe owtikx.exe File opened for modification C:\Windows\SysWOW64\pmgrfs.exe fnuuvu.exe File opened for modification C:\Windows\SysWOW64\xvbtim.exe maijsr.exe File opened for modification C:\Windows\SysWOW64\xmixqp.exe kzrhkl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2268 3052 545de00a44e44ff1bbc119857dd15f79.exe 28 PID 3052 wrote to memory of 2268 3052 545de00a44e44ff1bbc119857dd15f79.exe 28 PID 3052 wrote to memory of 2268 3052 545de00a44e44ff1bbc119857dd15f79.exe 28 PID 3052 wrote to memory of 2268 3052 545de00a44e44ff1bbc119857dd15f79.exe 28 PID 2268 wrote to memory of 2768 2268 qliiui.exe 29 PID 2268 wrote to memory of 2768 2268 qliiui.exe 29 PID 2268 wrote to memory of 2768 2268 qliiui.exe 29 PID 2268 wrote to memory of 2768 2268 qliiui.exe 29 PID 2768 wrote to memory of 2224 2768 nmavql.exe 68 PID 2768 wrote to memory of 2224 2768 nmavql.exe 68 PID 2768 wrote to memory of 2224 2768 nmavql.exe 68 PID 2768 wrote to memory of 2224 2768 nmavql.exe 68 PID 2224 wrote to memory of 2596 2224 xletbk.exe 30 PID 2224 wrote to memory of 2596 2224 xletbk.exe 30 PID 2224 wrote to memory of 2596 2224 xletbk.exe 30 PID 2224 wrote to memory of 2596 2224 xletbk.exe 30 PID 2596 wrote to memory of 552 2596 houdwn.exe 65 PID 2596 wrote to memory of 552 2596 houdwn.exe 65 PID 2596 wrote to memory of 552 2596 houdwn.exe 65 PID 2596 wrote to memory of 552 2596 houdwn.exe 65 PID 552 wrote to memory of 2412 552 oseqfg.exe 62 PID 552 wrote to memory of 2412 552 oseqfg.exe 62 PID 552 wrote to memory of 2412 552 oseqfg.exe 62 PID 552 wrote to memory of 2412 552 oseqfg.exe 62 PID 2412 wrote to memory of 2884 2412 zrqoyf.exe 31 PID 2412 wrote to memory of 2884 2412 zrqoyf.exe 31 PID 2412 wrote to memory of 2884 2412 zrqoyf.exe 31 PID 2412 wrote to memory of 2884 2412 zrqoyf.exe 31 PID 2884 wrote to memory of 676 2884 icfyla.exe 32 PID 2884 wrote to memory of 676 2884 icfyla.exe 32 PID 2884 wrote to memory of 676 2884 icfyla.exe 32 PID 2884 wrote to memory of 676 2884 icfyla.exe 32 PID 676 wrote to memory of 2648 676 tbjwvz.exe 55 PID 676 wrote to memory of 2648 676 tbjwvz.exe 55 PID 676 wrote to memory of 2648 676 tbjwvz.exe 55 PID 676 wrote to memory of 2648 676 tbjwvz.exe 55 PID 2648 wrote to memory of 1532 2648 dxkglt.exe 52 PID 2648 wrote to memory of 1532 2648 dxkglt.exe 52 PID 2648 wrote to memory of 1532 2648 dxkglt.exe 52 PID 2648 wrote to memory of 1532 2648 dxkglt.exe 52 PID 1532 wrote to memory of 3020 1532 qzqwwg.exe 49 PID 1532 wrote to memory of 3020 1532 qzqwwg.exe 49 PID 1532 wrote to memory of 3020 1532 qzqwwg.exe 49 PID 1532 wrote to memory of 3020 1532 qzqwwg.exe 49 PID 3020 wrote to memory of 2076 3020 ayuthf.exe 33 PID 3020 wrote to memory of 2076 3020 ayuthf.exe 33 PID 3020 wrote to memory of 2076 3020 ayuthf.exe 33 PID 3020 wrote to memory of 2076 3020 ayuthf.exe 33 PID 2076 wrote to memory of 2456 2076 maijsr.exe 34 PID 2076 wrote to memory of 2456 2076 maijsr.exe 34 PID 2076 wrote to memory of 2456 2076 maijsr.exe 34 PID 2076 wrote to memory of 2456 2076 maijsr.exe 34 PID 2456 wrote to memory of 1776 2456 xvbtim.exe 35 PID 2456 wrote to memory of 1776 2456 xvbtim.exe 35 PID 2456 wrote to memory of 1776 2456 xvbtim.exe 35 PID 2456 wrote to memory of 1776 2456 xvbtim.exe 35 PID 1776 wrote to memory of 1824 1776 hyrevh.exe 36 PID 1776 wrote to memory of 1824 1776 hyrevh.exe 36 PID 1776 wrote to memory of 1824 1776 hyrevh.exe 36 PID 1776 wrote to memory of 1824 1776 hyrevh.exe 36 PID 1824 wrote to memory of 1060 1824 rxdbfg.exe 37 PID 1824 wrote to memory of 1060 1824 rxdbfg.exe 37 PID 1824 wrote to memory of 1060 1824 rxdbfg.exe 37 PID 1824 wrote to memory of 1060 1824 rxdbfg.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\545de00a44e44ff1bbc119857dd15f79.exe"C:\Users\Admin\AppData\Local\Temp\545de00a44e44ff1bbc119857dd15f79.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\qliiui.exeC:\Windows\system32\qliiui.exe 528 "C:\Users\Admin\AppData\Local\Temp\545de00a44e44ff1bbc119857dd15f79.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\nmavql.exeC:\Windows\system32\nmavql.exe 532 "C:\Windows\SysWOW64\qliiui.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\xletbk.exeC:\Windows\system32\xletbk.exe 536 "C:\Windows\SysWOW64\nmavql.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224
-
-
-
-
C:\Windows\SysWOW64\houdwn.exeC:\Windows\system32\houdwn.exe 540 "C:\Windows\SysWOW64\xletbk.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\oseqfg.exeC:\Windows\system32\oseqfg.exe 548 "C:\Windows\SysWOW64\houdwn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:552
-
-
C:\Windows\SysWOW64\icfyla.exeC:\Windows\system32\icfyla.exe 544 "C:\Windows\SysWOW64\zrqoyf.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\tbjwvz.exeC:\Windows\system32\tbjwvz.exe 552 "C:\Windows\SysWOW64\icfyla.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\dxkglt.exeC:\Windows\system32\dxkglt.exe 560 "C:\Windows\SysWOW64\tbjwvz.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2648
-
-
-
C:\Windows\SysWOW64\maijsr.exeC:\Windows\system32\maijsr.exe 572 "C:\Windows\SysWOW64\ayuthf.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\xvbtim.exeC:\Windows\system32\xvbtim.exe 576 "C:\Windows\SysWOW64\maijsr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\hyrevh.exeC:\Windows\system32\hyrevh.exe 592 "C:\Windows\SysWOW64\xvbtim.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\rxdbfg.exeC:\Windows\system32\rxdbfg.exe 580 "C:\Windows\SysWOW64\hyrevh.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\bteuva.exeC:\Windows\system32\bteuva.exe 584 "C:\Windows\SysWOW64\rxdbfg.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1060 -
C:\Windows\SysWOW64\lairfz.exeC:\Windows\system32\lairfz.exe 588 "C:\Windows\SysWOW64\bteuva.exe"6⤵
- Executes dropped EXE
PID:620
-
-
-
-
-
-
C:\Windows\SysWOW64\gbjzlb.exeC:\Windows\system32\gbjzlb.exe 600 "C:\Windows\SysWOW64\yqduoh.exe"1⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\SysWOW64\twtorf.exeC:\Windows\system32\twtorf.exe 604 "C:\Windows\SysWOW64\gbjzlb.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3068 -
C:\Windows\SysWOW64\gnorzn.exeC:\Windows\system32\gnorzn.exe 608 "C:\Windows\SysWOW64\twtorf.exe"3⤵
- Executes dropped EXE
PID:2856
-
-
-
C:\Windows\SysWOW64\pxlcnq.exeC:\Windows\system32\pxlcnq.exe 612 "C:\Windows\SysWOW64\gnorzn.exe"1⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\axpzfp.exeC:\Windows\system32\axpzfp.exe 616 "C:\Windows\SysWOW64\pxlcnq.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2548 -
C:\Windows\SysWOW64\kzfjsk.exeC:\Windows\system32\kzfjsk.exe 620 "C:\Windows\SysWOW64\axpzfp.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2960 -
C:\Windows\SysWOW64\xmwzyo.exeC:\Windows\system32\xmwzyo.exe 624 "C:\Windows\SysWOW64\kzfjsk.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2804 -
C:\Windows\SysWOW64\hxljlr.exeC:\Windows\system32\hxljlr.exe 628 "C:\Windows\SysWOW64\xmwzyo.exe"5⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\myuecw.exeC:\Windows\system32\myuecw.exe 632 "C:\Windows\SysWOW64\hxljlr.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2020 -
C:\Windows\SysWOW64\ejhxjt.exeC:\Windows\system32\ejhxjt.exe 636 "C:\Windows\SysWOW64\myuecw.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\jwbedv.exeC:\Windows\system32\jwbedv.exe 648 "C:\Windows\SysWOW64\ejhxjt.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1740 -
C:\Windows\SysWOW64\ypxzmr.exeC:\Windows\system32\ypxzmr.exe 520 "C:\Windows\SysWOW64\jwbedv.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1316 -
C:\Windows\SysWOW64\asnkau.exeC:\Windows\system32\asnkau.exe 644 "C:\Windows\SysWOW64\ypxzmr.exe"10⤵
- Executes dropped EXE
PID:964 -
C:\Windows\SysWOW64\kzrhkl.exeC:\Windows\system32\kzrhkl.exe 660 "C:\Windows\SysWOW64\asnkau.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1648 -
C:\Windows\SysWOW64\xmixqp.exeC:\Windows\system32\xmixqp.exe 652 "C:\Windows\SysWOW64\kzrhkl.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1868 -
C:\Windows\SysWOW64\hoyhls.exeC:\Windows\system32\hoyhls.exe 656 "C:\Windows\SysWOW64\xmixqp.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:972 -
C:\Windows\SysWOW64\rnkfvr.exeC:\Windows\system32\rnkfvr.exe 664 "C:\Windows\SysWOW64\hoyhls.exe"14⤵
- Executes dropped EXE
PID:2628 -
C:\Windows\SysWOW64\byzpju.exeC:\Windows\system32\byzpju.exe 668 "C:\Windows\SysWOW64\rnkfvr.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2196 -
C:\Windows\SysWOW64\lxdnbs.exeC:\Windows\system32\lxdnbs.exe 680 "C:\Windows\SysWOW64\byzpju.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\wtefjn.exeC:\Windows\system32\wtefjn.exe 684 "C:\Windows\SysWOW64\lxdnbs.exe"17⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\dxpkay.exeC:\Windows\system32\dxpkay.exe 672 "C:\Windows\SysWOW64\wtefjn.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\owtikx.exeC:\Windows\system32\owtikx.exe 676 "C:\Windows\SysWOW64\dxpkay.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2696 -
C:\Windows\SysWOW64\ydfnvw.exeC:\Windows\system32\ydfnvw.exe 692 "C:\Windows\SysWOW64\owtikx.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1928 -
C:\Windows\SysWOW64\icjknu.exeC:\Windows\system32\icjknu.exe 688 "C:\Windows\SysWOW64\ydfnvw.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\nhcsze.exeC:\Windows\system32\nhcsze.exe 704 "C:\Windows\SysWOW64\icjknu.exe"22⤵
- Executes dropped EXE
PID:2572 -
C:\Windows\SysWOW64\cazfis.exeC:\Windows\system32\cazfis.exe 696 "C:\Windows\SysWOW64\nhcsze.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2536 -
C:\Windows\SysWOW64\mlpqdv.exeC:\Windows\system32\mlpqdv.exe 712 "C:\Windows\SysWOW64\cazfis.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2096 -
C:\Windows\SysWOW64\zygfjz.exeC:\Windows\system32\zygfjz.exe 700 "C:\Windows\SysWOW64\mlpqdv.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:288 -
C:\Windows\SysWOW64\jxkduy.exeC:\Windows\system32\jxkduy.exe 708 "C:\Windows\SysWOW64\zygfjz.exe"26⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\tianhb.exeC:\Windows\system32\tianhb.exe 716 "C:\Windows\SysWOW64\jxkduy.exe"27⤵
- Executes dropped EXE
PID:1084 -
C:\Windows\SysWOW64\dhmlza.exeC:\Windows\system32\dhmlza.exe 728 "C:\Windows\SysWOW64\tianhb.exe"28⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\ogqikq.exeC:\Windows\system32\ogqikq.exe 732 "C:\Windows\SysWOW64\dhmlza.exe"29⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\yfcncp.exeC:\Windows\system32\yfcncp.exe 724 "C:\Windows\SysWOW64\ogqikq.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\imglmo.exeC:\Windows\system32\imglmo.exe 720 "C:\Windows\SysWOW64\yfcncp.exe"31⤵
- Executes dropped EXE
PID:1264 -
C:\Windows\SysWOW64\spvvar.exeC:\Windows\system32\spvvar.exe 744 "C:\Windows\SysWOW64\imglmo.exe"32⤵
- Executes dropped EXE
PID:860 -
C:\Windows\SysWOW64\ztgark.exeC:\Windows\system32\ztgark.exe 740 "C:\Windows\SysWOW64\spvvar.exe"33⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\kskgbj.exeC:\Windows\system32\kskgbj.exe 760 "C:\Windows\SysWOW64\ztgark.exe"34⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\SysWOW64\xfbvhf.exeC:\Windows\system32\xfbvhf.exe 736 "C:\Windows\SysWOW64\kskgbj.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2580 -
C:\Windows\SysWOW64\hmftae.exeC:\Windows\system32\hmftae.exe 748 "C:\Windows\SysWOW64\xfbvhf.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2424 -
C:\Windows\SysWOW64\rpddnh.exeC:\Windows\system32\rpddnh.exe 752 "C:\Windows\SysWOW64\hmftae.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:760 -
C:\Windows\SysWOW64\oqnqjs.exeC:\Windows\system32\oqnqjs.exe 756 "C:\Windows\SysWOW64\rpddnh.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2880 -
C:\Windows\SysWOW64\bdfgpo.exeC:\Windows\system32\bdfgpo.exe 764 "C:\Windows\SysWOW64\oqnqjs.exe"39⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\lnuqkr.exeC:\Windows\system32\lnuqkr.exe 768 "C:\Windows\SysWOW64\bdfgpo.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2208 -
C:\Windows\SysWOW64\vjopgl.exeC:\Windows\system32\vjopgl.exe 772 "C:\Windows\SysWOW64\lnuqkr.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3016 -
C:\Windows\SysWOW64\uhjvfv.exeC:\Windows\system32\uhjvfv.exe 776 "C:\Windows\SysWOW64\vjopgl.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1136 -
C:\Windows\SysWOW64\kwglwu.exeC:\Windows\system32\kwglwu.exe 796 "C:\Windows\SysWOW64\uhjvfv.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1560 -
C:\Windows\SysWOW64\qtntoc.exeC:\Windows\system32\qtntoc.exe 788 "C:\Windows\SysWOW64\kwglwu.exe"44⤵PID:2448
-
C:\Windows\SysWOW64\dgejug.exeC:\Windows\system32\dgejug.exe 524 "C:\Windows\SysWOW64\qtntoc.exe"45⤵
- Drops file in System32 directory
PID:580 -
C:\Windows\SysWOW64\lkhwlr.exeC:\Windows\system32\lkhwlr.exe 808 "C:\Windows\SysWOW64\dgejug.exe"46⤵
- Drops file in System32 directory
PID:1068 -
C:\Windows\SysWOW64\svnbil.exeC:\Windows\system32\svnbil.exe 812 "C:\Windows\SysWOW64\lkhwlr.exe"47⤵PID:2356
-
C:\Windows\SysWOW64\zdbtui.exeC:\Windows\system32\zdbtui.exe 800 "C:\Windows\SysWOW64\svnbil.exe"48⤵PID:2168
-
C:\Windows\SysWOW64\ptmbbs.exeC:\Windows\system32\ptmbbs.exe 784 "C:\Windows\SysWOW64\zdbtui.exe"49⤵
- Drops file in System32 directory
PID:872 -
C:\Windows\SysWOW64\zsyylr.exeC:\Windows\system32\zsyylr.exe 804 "C:\Windows\SysWOW64\ptmbbs.exe"50⤵
- Drops file in System32 directory
PID:2760 -
C:\Windows\SysWOW64\mitbuz.exeC:\Windows\system32\mitbuz.exe 792 "C:\Windows\SysWOW64\zsyylr.exe"51⤵
- Drops file in System32 directory
PID:2140 -
C:\Windows\SysWOW64\lmfgzq.exeC:\Windows\system32\lmfgzq.exe 816 "C:\Windows\SysWOW64\mitbuz.exe"52⤵
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\wigrgk.exeC:\Windows\system32\wigrgk.exe 820 "C:\Windows\SysWOW64\lmfgzq.exe"53⤵PID:1644
-
C:\Windows\SysWOW64\yzuhep.exeC:\Windows\system32\yzuhep.exe 824 "C:\Windows\SysWOW64\wigrgk.exe"54⤵PID:2688
-
C:\Windows\SysWOW64\igyepo.exeC:\Windows\system32\igyepo.exe 828 "C:\Windows\SysWOW64\yzuhep.exe"55⤵
- Drops file in System32 directory
PID:2904 -
C:\Windows\SysWOW64\vtquvk.exeC:\Windows\system32\vtquvk.exe 832 "C:\Windows\SysWOW64\igyepo.exe"56⤵PID:1724
-
C:\Windows\SysWOW64\cepzsl.exeC:\Windows\system32\cepzsl.exe 844 "C:\Windows\SysWOW64\vtquvk.exe"57⤵PID:2800
-
C:\Windows\SysWOW64\pcjbal.exeC:\Windows\system32\pcjbal.exe 856 "C:\Windows\SysWOW64\cepzsl.exe"58⤵
- Drops file in System32 directory
PID:1040 -
C:\Windows\SysWOW64\cpbrgp.exeC:\Windows\system32\cpbrgp.exe 836 "C:\Windows\SysWOW64\pcjbal.exe"59⤵
- Drops file in System32 directory
PID:2420 -
C:\Windows\SysWOW64\mofxyo.exeC:\Windows\system32\mofxyo.exe 852 "C:\Windows\SysWOW64\cpbrgp.exe"60⤵PID:1688
-
C:\Windows\SysWOW64\wdgmow.exeC:\Windows\system32\wdgmow.exe 840 "C:\Windows\SysWOW64\mofxyo.exe"61⤵PID:3012
-
C:\Windows\SysWOW64\jqxcuz.exeC:\Windows\system32\jqxcuz.exe 848 "C:\Windows\SysWOW64\wdgmow.exe"62⤵
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\qbwprt.exeC:\Windows\system32\qbwprt.exe 868 "C:\Windows\SysWOW64\jqxcuz.exe"63⤵
- Drops file in System32 directory
PID:1092 -
C:\Windows\SysWOW64\bwxzzo.exeC:\Windows\system32\bwxzzo.exe 872 "C:\Windows\SysWOW64\qbwprt.exe"64⤵
- Drops file in System32 directory
PID:1540 -
C:\Windows\SysWOW64\fnuuvu.exeC:\Windows\system32\fnuuvu.exe 880 "C:\Windows\SysWOW64\bwxzzo.exe"65⤵
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\pmgrfs.exeC:\Windows\system32\pmgrfs.exe 884 "C:\Windows\SysWOW64\fnuuvu.exe"66⤵
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\dzphlw.exeC:\Windows\system32\dzphlw.exe 860 "C:\Windows\SysWOW64\pmgrfs.exe"67⤵PID:1556
-
C:\Windows\SysWOW64\ngbfdv.exeC:\Windows\system32\ngbfdv.exe 864 "C:\Windows\SysWOW64\dzphlw.exe"68⤵PID:2372
-
C:\Windows\SysWOW64\xffcou.exeC:\Windows\system32\xffcou.exe 888 "C:\Windows\SysWOW64\ngbfdv.exe"69⤵PID:1412
-
C:\Windows\SysWOW64\hivmbx.exeC:\Windows\system32\hivmbx.exe 876 "C:\Windows\SysWOW64\xffcou.exe"70⤵PID:2584
-
C:\Windows\SysWOW64\udmchb.exeC:\Windows\system32\udmchb.exe 896 "C:\Windows\SysWOW64\hivmbx.exe"71⤵PID:1764
-
C:\Windows\SysWOW64\bkicbq.exeC:\Windows\system32\bkicbq.exe 892 "C:\Windows\SysWOW64\udmchb.exe"72⤵
- Drops file in System32 directory
PID:2816 -
C:\Windows\SysWOW64\bdjnvd.exeC:\Windows\system32\bdjnvd.exe 904 "C:\Windows\SysWOW64\bkicbq.exe"73⤵PID:2120
-
C:\Windows\SysWOW64\lcnsoc.exeC:\Windows\system32\lcnsoc.exe 900 "C:\Windows\SysWOW64\bdjnvd.exe"74⤵PID:2852
-
C:\Windows\SysWOW64\vekubf.exeC:\Windows\system32\vekubf.exe 908 "C:\Windows\SysWOW64\lcnsoc.exe"75⤵PID:2552
-
C:\Windows\SysWOW64\cuyvnu.exeC:\Windows\system32\cuyvnu.exe 912 "C:\Windows\SysWOW64\vekubf.exe"76⤵
- Drops file in System32 directory
PID:2888 -
C:\Windows\SysWOW64\qhpkby.exeC:\Windows\system32\qhpkby.exe 916 "C:\Windows\SysWOW64\cuyvnu.exe"77⤵PID:2772
-
C:\Windows\SysWOW64\uxmfpe.exeC:\Windows\system32\uxmfpe.exe 920 "C:\Windows\SysWOW64\qhpkby.exe"78⤵PID:636
-
C:\Windows\SysWOW64\ewydhd.exeC:\Windows\system32\ewydhd.exe 924 "C:\Windows\SysWOW64\uxmfpe.exe"79⤵PID:2956
-
C:\Windows\SysWOW64\rjisnh.exeC:\Windows\system32\rjisnh.exe 928 "C:\Windows\SysWOW64\ewydhd.exe"80⤵PID:2860
-
C:\Windows\SysWOW64\zrdkzw.exeC:\Windows\system32\zrdkzw.exe 932 "C:\Windows\SysWOW64\rjisnh.exe"81⤵PID:2632
-
C:\Windows\SysWOW64\dtjalj.exeC:\Windows\system32\dtjalj.exe 940 "C:\Windows\SysWOW64\zrdkzw.exe"82⤵PID:2016
-
C:\Windows\SysWOW64\qkedbr.exeC:\Windows\system32\qkedbr.exe 948 "C:\Windows\SysWOW64\dtjalj.exe"83⤵PID:1820
-
C:\Windows\SysWOW64\autnpu.exeC:\Windows\system32\autnpu.exe 936 "C:\Windows\SysWOW64\qkedbr.exe"84⤵PID:2388
-
C:\Windows\SysWOW64\lquywo.exeC:\Windows\system32\lquywo.exe 944 "C:\Windows\SysWOW64\autnpu.exe"85⤵PID:1192
-
C:\Windows\SysWOW64\vskirj.exeC:\Windows\system32\vskirj.exe 952 "C:\Windows\SysWOW64\lquywo.exe"86⤵PID:1800
-
C:\Windows\SysWOW64\fokaze.exeC:\Windows\system32\fokaze.exe 956 "C:\Windows\SysWOW64\vskirj.exe"87⤵PID:948
-
C:\Windows\SysWOW64\pnpyjd.exeC:\Windows\system32\pnpyjd.exe 960 "C:\Windows\SysWOW64\fokaze.exe"88⤵PID:684
-
C:\Windows\SysWOW64\cmrbsl.exeC:\Windows\system32\cmrbsl.exe 964 "C:\Windows\SysWOW64\pnpyjd.exe"89⤵PID:2100
-
C:\Windows\SysWOW64\jxqgpf.exeC:\Windows\system32\jxqgpf.exe 968 "C:\Windows\SysWOW64\cmrbsl.exe"90⤵PID:1500
-
C:\Windows\SysWOW64\wkivvi.exeC:\Windows\system32\wkivvi.exe 640 "C:\Windows\SysWOW64\jxqgpf.exe"91⤵PID:2216
-
C:\Windows\SysWOW64\grmtfh.exeC:\Windows\system32\grmtfh.exe 976 "C:\Windows\SysWOW64\wkivvi.exe"92⤵PID:2124
-
C:\Windows\SysWOW64\thhvwp.exeC:\Windows\system32\thhvwp.exe 984 "C:\Windows\SysWOW64\grmtfh.exe"93⤵PID:2000
-
C:\Windows\SysWOW64\dkegjs.exeC:\Windows\system32\dkegjs.exe 980 "C:\Windows\SysWOW64\thhvwp.exe"94⤵PID:2836
-
C:\Windows\SysWOW64\nvtqwo.exeC:\Windows\system32\nvtqwo.exe 992 "C:\Windows\SysWOW64\dkegjs.exe"95⤵PID:1696
-
C:\Windows\SysWOW64\xuxopm.exeC:\Windows\system32\xuxopm.exe 1004 "C:\Windows\SysWOW64\nvtqwo.exe"96⤵PID:2084
-
C:\Windows\SysWOW64\fuwovb.exeC:\Windows\system32\fuwovb.exe 1000 "C:\Windows\SysWOW64\xuxopm.exe"97⤵PID:780
-
C:\Windows\SysWOW64\nzhbnm.exeC:\Windows\system32\nzhbnm.exe 1012 "C:\Windows\SysWOW64\fuwovb.exe"98⤵PID:1756
-
C:\Windows\SysWOW64\ukfgcg.exeC:\Windows\system32\ukfgcg.exe 988 "C:\Windows\SysWOW64\nzhbnm.exe"99⤵PID:2080
-
C:\Windows\SysWOW64\ejreuf.exeC:\Windows\system32\ejreuf.exe 1008 "C:\Windows\SysWOW64\ukfgcg.exe"100⤵PID:1048
-
C:\Windows\SysWOW64\lrfwgu.exeC:\Windows\system32\lrfwgu.exe 1016 "C:\Windows\SysWOW64\ejreuf.exe"101⤵PID:2236
-
C:\Windows\SysWOW64\wyrtzt.exeC:\Windows\system32\wyrtzt.exe 996 "C:\Windows\SysWOW64\lrfwgu.exe"102⤵PID:2032
-
C:\Windows\SysWOW64\yiirrp.exeC:\Windows\system32\yiirrp.exe 1020 "C:\Windows\SysWOW64\wyrtzt.exe"103⤵PID:1864
-
C:\Windows\SysWOW64\gmteai.exeC:\Windows\system32\gmteai.exe 1028 "C:\Windows\SysWOW64\yiirrp.exe"104⤵PID:2508
-
C:\Windows\SysWOW64\qlxblh.exeC:\Windows\system32\qlxblh.exe 1032 "C:\Windows\SysWOW64\gmteai.exe"105⤵PID:1612
-
C:\Windows\SysWOW64\vqqjej.exeC:\Windows\system32\vqqjej.exe 1036 "C:\Windows\SysWOW64\qlxblh.exe"106⤵PID:2228
-
C:\Windows\SysWOW64\hswrpv.exeC:\Windows\system32\hswrpv.exe 1040 "C:\Windows\SysWOW64\vqqjej.exe"107⤵PID:1628
-
C:\Windows\SysWOW64\snxjfq.exeC:\Windows\system32\snxjfq.exe 1056 "C:\Windows\SysWOW64\hswrpv.exe"108⤵PID:1512
-
C:\Windows\SysWOW64\cmbhpo.exeC:\Windows\system32\cmbhpo.exe 1052 "C:\Windows\SysWOW64\snxjfq.exe"109⤵PID:2668
-
C:\Windows\SysWOW64\mtnean.exeC:\Windows\system32\mtnean.exe 1060 "C:\Windows\SysWOW64\cmbhpo.exe"110⤵PID:2988
-
C:\Windows\SysWOW64\wwdovq.exeC:\Windows\system32\wwdovq.exe 1064 "C:\Windows\SysWOW64\mtnean.exe"111⤵PID:2544
-
C:\Windows\SysWOW64\jjmebm.exeC:\Windows\system32\jjmebm.exe 1044 "C:\Windows\SysWOW64\wwdovq.exe"112⤵PID:1684
-
C:\Windows\SysWOW64\qriwnk.exeC:\Windows\system32\qriwnk.exe 1048 "C:\Windows\SysWOW64\jjmebm.exe"113⤵PID:1960
-
C:\Windows\SysWOW64\yydwhz.exeC:\Windows\system32\yydwhz.exe 1068 "C:\Windows\SysWOW64\qriwnk.exe"114⤵PID:1656
-
C:\Windows\SysWOW64\ijthvc.exeC:\Windows\system32\ijthvc.exe 1072 "C:\Windows\SysWOW64\yydwhz.exe"115⤵PID:1816
-
C:\Windows\SysWOW64\sixenb.exeC:\Windows\system32\sixenb.exe 1092 "C:\Windows\SysWOW64\ijthvc.exe"116⤵PID:1664
-
C:\Windows\SysWOW64\fhshwb.exeC:\Windows\system32\fhshwb.exe 1076 "C:\Windows\SysWOW64\sixenb.exe"117⤵PID:2716
-
C:\Windows\SysWOW64\sujxbf.exeC:\Windows\system32\sujxbf.exe 1100 "C:\Windows\SysWOW64\fhshwb.exe"118⤵PID:2332
-
C:\Windows\SysWOW64\ctnume.exeC:\Windows\system32\ctnume.exe 1080 "C:\Windows\SysWOW64\sujxbf.exe"119⤵PID:1976
-
C:\Windows\SysWOW64\mvlehh.exeC:\Windows\system32\mvlehh.exe 1096 "C:\Windows\SysWOW64\ctnume.exe"120⤵PID:2844
-
C:\Windows\SysWOW64\zxrust.exeC:\Windows\system32\zxrust.exe 1084 "C:\Windows\SysWOW64\mvlehh.exe"121⤵PID:1980
-
C:\Windows\SysWOW64\jtkfao.exeC:\Windows\system32\jtkfao.exe 1108 "C:\Windows\SysWOW64\zxrust.exe"122⤵PID:1144
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-