Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 04:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
545de00a44e44ff1bbc119857dd15f79.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
545de00a44e44ff1bbc119857dd15f79.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
545de00a44e44ff1bbc119857dd15f79.exe
-
Size
147KB
-
MD5
545de00a44e44ff1bbc119857dd15f79
-
SHA1
246493466b8052de8ab1409c438cbafd8398cf0a
-
SHA256
98c33d224206752ea52528b128a3495306c35c53f2c8c206b4c194a9cb82a525
-
SHA512
24f106215aa82dee23bd72718b8aebc7e2ee643d1d04b292b11bab75fa46306a153670f67c6e39bd3dea12a5695f9edebc9a809e2972abfe43a100889fe2deb0
-
SSDEEP
3072:pxIilxA2fi/dLWcEk5VbOcoXjMxkK9u4IRMzOLqo:pxbxA2uEk5YcXk/4IRMq
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 36 IoCs
pid Process 4808 bgybul.exe 5060 rwumsx.exe 3764 yaerci.exe 676 yieahz.exe 3364 lzhdqh.exe 2108 thudcx.exe 1004 gumtib.exe 4240 tdsvla.exe 4680 eztoav.exe 1556 bxdrso.exe 2128 ymkrlu.exe 4740 gndvca.exe 4920 lbknxh.exe 4624 vyhhun.exe 3788 ibrmsn.exe 2944 qlyaej.exe 316 zoyifh.exe 5012 ffozed.exe 3380 mgxavh.exe 3280 rxoecx.exe 1432 pjkrsr.exe 2560 udvudo.exe 1056 wyywyo.exe 3100 huzhfj.exe 2504 msextk.exe 2392 xnxhbe.exe 4084 kxdsee.exe 4204 rfzkyt.exe 1580 carvfo.exe 3532 kpnqjq.exe 2232 mzffbm.exe 1416 xvfqrh.exe 1100 wzqdaa.exe 3880 jykgja.exe 4660 utlqzc.exe 1408 epejgx.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\utlqzc.exe jykgja.exe File created C:\Windows\SysWOW64\yaerci.exe rwumsx.exe File opened for modification C:\Windows\SysWOW64\vyhhun.exe lbknxh.exe File opened for modification C:\Windows\SysWOW64\mgxavh.exe ffozed.exe File created C:\Windows\SysWOW64\msextk.exe huzhfj.exe File created C:\Windows\SysWOW64\mzffbm.exe kpnqjq.exe File created C:\Windows\SysWOW64\xvfqrh.exe mzffbm.exe File opened for modification C:\Windows\SysWOW64\epejgx.exe utlqzc.exe File opened for modification C:\Windows\SysWOW64\tdsvla.exe gumtib.exe File opened for modification C:\Windows\SysWOW64\ymkrlu.exe bxdrso.exe File opened for modification C:\Windows\SysWOW64\zoyifh.exe qlyaej.exe File created C:\Windows\SysWOW64\kxdsee.exe xnxhbe.exe File created C:\Windows\SysWOW64\carvfo.exe rfzkyt.exe File opened for modification C:\Windows\SysWOW64\kpnqjq.exe carvfo.exe File opened for modification C:\Windows\SysWOW64\rwumsx.exe bgybul.exe File created C:\Windows\SysWOW64\ffozed.exe zoyifh.exe File opened for modification C:\Windows\SysWOW64\msextk.exe huzhfj.exe File opened for modification C:\Windows\SysWOW64\kxdsee.exe xnxhbe.exe File opened for modification C:\Windows\SysWOW64\yaerci.exe rwumsx.exe File created C:\Windows\SysWOW64\gumtib.exe thudcx.exe File opened for modification C:\Windows\SysWOW64\jykgja.exe wzqdaa.exe File created C:\Windows\SysWOW64\kpnqjq.exe carvfo.exe File opened for modification C:\Windows\SysWOW64\bgybul.exe 545de00a44e44ff1bbc119857dd15f79.exe File created C:\Windows\SysWOW64\ymkrlu.exe bxdrso.exe File created C:\Windows\SysWOW64\gndvca.exe ymkrlu.exe File opened for modification C:\Windows\SysWOW64\pjkrsr.exe rxoecx.exe File created C:\Windows\SysWOW64\epejgx.exe utlqzc.exe File created C:\Windows\SysWOW64\ibrmsn.exe vyhhun.exe File opened for modification C:\Windows\SysWOW64\wyywyo.exe udvudo.exe File opened for modification C:\Windows\SysWOW64\xnxhbe.exe msextk.exe File opened for modification C:\Windows\SysWOW64\wzqdaa.exe xvfqrh.exe File opened for modification C:\Windows\SysWOW64\lzhdqh.exe yieahz.exe File opened for modification C:\Windows\SysWOW64\mzffbm.exe kpnqjq.exe File created C:\Windows\SysWOW64\rfzkyt.exe kxdsee.exe File created C:\Windows\SysWOW64\bgybul.exe 545de00a44e44ff1bbc119857dd15f79.exe File created C:\Windows\SysWOW64\rwumsx.exe bgybul.exe File opened for modification C:\Windows\SysWOW64\gumtib.exe thudcx.exe File created C:\Windows\SysWOW64\eztoav.exe tdsvla.exe File created C:\Windows\SysWOW64\zoyifh.exe qlyaej.exe File created C:\Windows\SysWOW64\wyywyo.exe udvudo.exe File opened for modification C:\Windows\SysWOW64\carvfo.exe rfzkyt.exe File created C:\Windows\SysWOW64\wzqdaa.exe xvfqrh.exe File created C:\Windows\SysWOW64\vyhhun.exe lbknxh.exe File opened for modification C:\Windows\SysWOW64\ibrmsn.exe vyhhun.exe File opened for modification C:\Windows\SysWOW64\rxoecx.exe mgxavh.exe File created C:\Windows\SysWOW64\udvudo.exe pjkrsr.exe File created C:\Windows\SysWOW64\thudcx.exe lzhdqh.exe File opened for modification C:\Windows\SysWOW64\ffozed.exe zoyifh.exe File created C:\Windows\SysWOW64\rxoecx.exe mgxavh.exe File opened for modification C:\Windows\SysWOW64\rfzkyt.exe kxdsee.exe File created C:\Windows\SysWOW64\qlyaej.exe ibrmsn.exe File created C:\Windows\SysWOW64\pjkrsr.exe rxoecx.exe File created C:\Windows\SysWOW64\huzhfj.exe wyywyo.exe File opened for modification C:\Windows\SysWOW64\xvfqrh.exe mzffbm.exe File opened for modification C:\Windows\SysWOW64\yieahz.exe yaerci.exe File opened for modification C:\Windows\SysWOW64\thudcx.exe lzhdqh.exe File created C:\Windows\SysWOW64\bxdrso.exe eztoav.exe File created C:\Windows\SysWOW64\lbknxh.exe gndvca.exe File opened for modification C:\Windows\SysWOW64\udvudo.exe pjkrsr.exe File created C:\Windows\SysWOW64\lzhdqh.exe yieahz.exe File created C:\Windows\SysWOW64\tdsvla.exe gumtib.exe File opened for modification C:\Windows\SysWOW64\bxdrso.exe eztoav.exe File created C:\Windows\SysWOW64\mgxavh.exe ffozed.exe File opened for modification C:\Windows\SysWOW64\huzhfj.exe wyywyo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4808 4504 545de00a44e44ff1bbc119857dd15f79.exe 90 PID 4504 wrote to memory of 4808 4504 545de00a44e44ff1bbc119857dd15f79.exe 90 PID 4504 wrote to memory of 4808 4504 545de00a44e44ff1bbc119857dd15f79.exe 90 PID 4808 wrote to memory of 5060 4808 bgybul.exe 92 PID 4808 wrote to memory of 5060 4808 bgybul.exe 92 PID 4808 wrote to memory of 5060 4808 bgybul.exe 92 PID 5060 wrote to memory of 3764 5060 rwumsx.exe 93 PID 5060 wrote to memory of 3764 5060 rwumsx.exe 93 PID 5060 wrote to memory of 3764 5060 rwumsx.exe 93 PID 3764 wrote to memory of 676 3764 yaerci.exe 94 PID 3764 wrote to memory of 676 3764 yaerci.exe 94 PID 3764 wrote to memory of 676 3764 yaerci.exe 94 PID 676 wrote to memory of 3364 676 yieahz.exe 95 PID 676 wrote to memory of 3364 676 yieahz.exe 95 PID 676 wrote to memory of 3364 676 yieahz.exe 95 PID 3364 wrote to memory of 2108 3364 lzhdqh.exe 96 PID 3364 wrote to memory of 2108 3364 lzhdqh.exe 96 PID 3364 wrote to memory of 2108 3364 lzhdqh.exe 96 PID 2108 wrote to memory of 1004 2108 thudcx.exe 97 PID 2108 wrote to memory of 1004 2108 thudcx.exe 97 PID 2108 wrote to memory of 1004 2108 thudcx.exe 97 PID 1004 wrote to memory of 4240 1004 gumtib.exe 98 PID 1004 wrote to memory of 4240 1004 gumtib.exe 98 PID 1004 wrote to memory of 4240 1004 gumtib.exe 98 PID 4240 wrote to memory of 4680 4240 tdsvla.exe 99 PID 4240 wrote to memory of 4680 4240 tdsvla.exe 99 PID 4240 wrote to memory of 4680 4240 tdsvla.exe 99 PID 4680 wrote to memory of 1556 4680 eztoav.exe 100 PID 4680 wrote to memory of 1556 4680 eztoav.exe 100 PID 4680 wrote to memory of 1556 4680 eztoav.exe 100 PID 1556 wrote to memory of 2128 1556 bxdrso.exe 101 PID 1556 wrote to memory of 2128 1556 bxdrso.exe 101 PID 1556 wrote to memory of 2128 1556 bxdrso.exe 101 PID 2128 wrote to memory of 4740 2128 ymkrlu.exe 102 PID 2128 wrote to memory of 4740 2128 ymkrlu.exe 102 PID 2128 wrote to memory of 4740 2128 ymkrlu.exe 102 PID 4740 wrote to memory of 4920 4740 gndvca.exe 105 PID 4740 wrote to memory of 4920 4740 gndvca.exe 105 PID 4740 wrote to memory of 4920 4740 gndvca.exe 105 PID 4920 wrote to memory of 4624 4920 lbknxh.exe 106 PID 4920 wrote to memory of 4624 4920 lbknxh.exe 106 PID 4920 wrote to memory of 4624 4920 lbknxh.exe 106 PID 4624 wrote to memory of 3788 4624 vyhhun.exe 109 PID 4624 wrote to memory of 3788 4624 vyhhun.exe 109 PID 4624 wrote to memory of 3788 4624 vyhhun.exe 109 PID 3788 wrote to memory of 2944 3788 ibrmsn.exe 110 PID 3788 wrote to memory of 2944 3788 ibrmsn.exe 110 PID 3788 wrote to memory of 2944 3788 ibrmsn.exe 110 PID 2944 wrote to memory of 316 2944 qlyaej.exe 112 PID 2944 wrote to memory of 316 2944 qlyaej.exe 112 PID 2944 wrote to memory of 316 2944 qlyaej.exe 112 PID 316 wrote to memory of 5012 316 zoyifh.exe 113 PID 316 wrote to memory of 5012 316 zoyifh.exe 113 PID 316 wrote to memory of 5012 316 zoyifh.exe 113 PID 5012 wrote to memory of 3380 5012 ffozed.exe 114 PID 5012 wrote to memory of 3380 5012 ffozed.exe 114 PID 5012 wrote to memory of 3380 5012 ffozed.exe 114 PID 3380 wrote to memory of 3280 3380 mgxavh.exe 116 PID 3380 wrote to memory of 3280 3380 mgxavh.exe 116 PID 3380 wrote to memory of 3280 3380 mgxavh.exe 116 PID 3280 wrote to memory of 1432 3280 rxoecx.exe 117 PID 3280 wrote to memory of 1432 3280 rxoecx.exe 117 PID 3280 wrote to memory of 1432 3280 rxoecx.exe 117 PID 1432 wrote to memory of 2560 1432 pjkrsr.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\545de00a44e44ff1bbc119857dd15f79.exe"C:\Users\Admin\AppData\Local\Temp\545de00a44e44ff1bbc119857dd15f79.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\bgybul.exeC:\Windows\system32\bgybul.exe 1192 "C:\Users\Admin\AppData\Local\Temp\545de00a44e44ff1bbc119857dd15f79.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\rwumsx.exeC:\Windows\system32\rwumsx.exe 1156 "C:\Windows\SysWOW64\bgybul.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\yaerci.exeC:\Windows\system32\yaerci.exe 1160 "C:\Windows\SysWOW64\rwumsx.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\yieahz.exeC:\Windows\system32\yieahz.exe 1164 "C:\Windows\SysWOW64\yaerci.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\lzhdqh.exeC:\Windows\system32\lzhdqh.exe 1168 "C:\Windows\SysWOW64\yieahz.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\thudcx.exeC:\Windows\system32\thudcx.exe 1152 "C:\Windows\SysWOW64\lzhdqh.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\gumtib.exeC:\Windows\system32\gumtib.exe 1148 "C:\Windows\SysWOW64\thudcx.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\tdsvla.exeC:\Windows\system32\tdsvla.exe 1172 "C:\Windows\SysWOW64\gumtib.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\eztoav.exeC:\Windows\system32\eztoav.exe 1176 "C:\Windows\SysWOW64\tdsvla.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\bxdrso.exeC:\Windows\system32\bxdrso.exe 1180 "C:\Windows\SysWOW64\eztoav.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\ymkrlu.exeC:\Windows\system32\ymkrlu.exe 1196 "C:\Windows\SysWOW64\bxdrso.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\gndvca.exeC:\Windows\system32\gndvca.exe 1200 "C:\Windows\SysWOW64\ymkrlu.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\lbknxh.exeC:\Windows\system32\lbknxh.exe 1184 "C:\Windows\SysWOW64\gndvca.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\vyhhun.exeC:\Windows\system32\vyhhun.exe 1188 "C:\Windows\SysWOW64\lbknxh.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\ibrmsn.exeC:\Windows\system32\ibrmsn.exe 1204 "C:\Windows\SysWOW64\vyhhun.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\qlyaej.exeC:\Windows\system32\qlyaej.exe 1216 "C:\Windows\SysWOW64\ibrmsn.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\zoyifh.exeC:\Windows\system32\zoyifh.exe 1220 "C:\Windows\SysWOW64\qlyaej.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\ffozed.exeC:\Windows\system32\ffozed.exe 1224 "C:\Windows\SysWOW64\zoyifh.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\mgxavh.exeC:\Windows\system32\mgxavh.exe 1208 "C:\Windows\SysWOW64\ffozed.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\rxoecx.exeC:\Windows\system32\rxoecx.exe 1228 "C:\Windows\SysWOW64\mgxavh.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\pjkrsr.exeC:\Windows\system32\pjkrsr.exe 1132 "C:\Windows\SysWOW64\rxoecx.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\udvudo.exeC:\Windows\system32\udvudo.exe 1060 "C:\Windows\SysWOW64\pjkrsr.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2560 -
C:\Windows\SysWOW64\wyywyo.exeC:\Windows\system32\wyywyo.exe 1244 "C:\Windows\SysWOW64\udvudo.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1056 -
C:\Windows\SysWOW64\huzhfj.exeC:\Windows\system32\huzhfj.exe 1252 "C:\Windows\SysWOW64\wyywyo.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3100 -
C:\Windows\SysWOW64\msextk.exeC:\Windows\system32\msextk.exe 1248 "C:\Windows\SysWOW64\huzhfj.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\xnxhbe.exeC:\Windows\system32\xnxhbe.exe 1236 "C:\Windows\SysWOW64\msextk.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2392 -
C:\Windows\SysWOW64\kxdsee.exeC:\Windows\system32\kxdsee.exe 1260 "C:\Windows\SysWOW64\xnxhbe.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4084
-
-
C:\Windows\SysWOW64\rfzkyt.exeC:\Windows\system32\rfzkyt.exe 1240 "C:\Windows\SysWOW64\kxdsee.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4204 -
C:\Windows\SysWOW64\carvfo.exeC:\Windows\system32\carvfo.exe 1268 "C:\Windows\SysWOW64\rfzkyt.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1580 -
C:\Windows\SysWOW64\kpnqjq.exeC:\Windows\system32\kpnqjq.exe 1272 "C:\Windows\SysWOW64\carvfo.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3532 -
C:\Windows\SysWOW64\mzffbm.exeC:\Windows\system32\mzffbm.exe 1256 "C:\Windows\SysWOW64\kpnqjq.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2232 -
C:\Windows\SysWOW64\xvfqrh.exeC:\Windows\system32\xvfqrh.exe 1280 "C:\Windows\SysWOW64\mzffbm.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1416 -
C:\Windows\SysWOW64\wzqdaa.exeC:\Windows\system32\wzqdaa.exe 1264 "C:\Windows\SysWOW64\xvfqrh.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1100 -
C:\Windows\SysWOW64\jykgja.exeC:\Windows\system32\jykgja.exe 1276 "C:\Windows\SysWOW64\wzqdaa.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3880 -
C:\Windows\SysWOW64\utlqzc.exeC:\Windows\system32\utlqzc.exe 1292 "C:\Windows\SysWOW64\jykgja.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4660 -
C:\Windows\SysWOW64\epejgx.exeC:\Windows\system32\epejgx.exe 1296 "C:\Windows\SysWOW64\utlqzc.exe"9⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\pvrbij.exeC:\Windows\system32\pvrbij.exe 1284 "C:\Windows\SysWOW64\epejgx.exe"10⤵PID:3064
-
C:\Windows\SysWOW64\zggddm.exeC:\Windows\system32\zggddm.exe 1304 "C:\Windows\SysWOW64\pvrbij.exe"11⤵PID:1632
-
C:\Windows\SysWOW64\jczwlg.exeC:\Windows\system32\jczwlg.exe 1308 "C:\Windows\SysWOW64\zggddm.exe"12⤵PID:816
-
C:\Windows\SysWOW64\xdfzog.exeC:\Windows\system32\xdfzog.exe 1320 "C:\Windows\SysWOW64\jczwlg.exe"13⤵PID:3976
-
C:\Windows\SysWOW64\hzgrwa.exeC:\Windows\system32\hzgrwa.exe 1300 "C:\Windows\SysWOW64\xdfzog.exe"14⤵PID:792
-
C:\Windows\SysWOW64\oobjqq.exeC:\Windows\system32\oobjqq.exe 1316 "C:\Windows\SysWOW64\hzgrwa.exe"15⤵PID:2780
-
C:\Windows\SysWOW64\umyzvr.exeC:\Windows\system32\umyzvr.exe 1312 "C:\Windows\SysWOW64\oobjqq.exe"16⤵PID:2784
-
C:\Windows\SysWOW64\hzqpjn.exeC:\Windows\system32\hzqpjn.exe 1288 "C:\Windows\SysWOW64\umyzvr.exe"17⤵PID:884
-
C:\Windows\SysWOW64\umzepq.exeC:\Windows\system32\umzepq.exe 1332 "C:\Windows\SysWOW64\hzqpjn.exe"18⤵PID:652
-
C:\Windows\SysWOW64\elmczp.exeC:\Windows\system32\elmczp.exe 1324 "C:\Windows\SysWOW64\umzepq.exe"19⤵PID:1564
-
C:\Windows\SysWOW64\pdbhef.exeC:\Windows\system32\pdbhef.exe 1336 "C:\Windows\SysWOW64\elmczp.exe"20⤵PID:2756
-
C:\Windows\SysWOW64\zdffxe.exeC:\Windows\system32\zdffxe.exe 1328 "C:\Windows\SysWOW64\pdbhef.exe"21⤵PID:728
-
C:\Windows\SysWOW64\mqxuci.exeC:\Windows\system32\mqxuci.exe 1348 "C:\Windows\SysWOW64\zdffxe.exe"22⤵PID:948
-
C:\Windows\SysWOW64\wxbsnh.exeC:\Windows\system32\wxbsnh.exe 1360 "C:\Windows\SysWOW64\mqxuci.exe"23⤵PID:2400
-
C:\Windows\SysWOW64\jktitl.exeC:\Windows\system32\jktitl.exe 1340 "C:\Windows\SysWOW64\wxbsnh.exe"24⤵PID:2368
-
C:\Windows\SysWOW64\uflaaf.exeC:\Windows\system32\uflaaf.exe 1344 "C:\Windows\SysWOW64\jktitl.exe"25⤵PID:3500
-
C:\Windows\SysWOW64\hsdqgb.exeC:\Windows\system32\hsdqgb.exe 1232 "C:\Windows\SysWOW64\uflaaf.exe"26⤵PID:1944
-
C:\Windows\SysWOW64\roeawv.exeC:\Windows\system32\roeawv.exe 1364 "C:\Windows\SysWOW64\hsdqgb.exe"27⤵PID:408
-
C:\Windows\SysWOW64\cniggu.exeC:\Windows\system32\cniggu.exe 1356 "C:\Windows\SysWOW64\roeawv.exe"28⤵PID:4556
-
C:\Windows\SysWOW64\rzqtkh.exeC:\Windows\system32\rzqtkh.exe 1376 "C:\Windows\SysWOW64\cniggu.exe"29⤵PID:4772
-
C:\Windows\SysWOW64\cvjlsc.exeC:\Windows\system32\cvjlsc.exe 1372 "C:\Windows\SysWOW64\rzqtkh.exe"30⤵PID:2348
-
C:\Windows\SysWOW64\mxgvnf.exeC:\Windows\system32\mxgvnf.exe 1384 "C:\Windows\SysWOW64\cvjlsc.exe"31⤵PID:4632
-
C:\Windows\SysWOW64\zkqltj.exeC:\Windows\system32\zkqltj.exe 1368 "C:\Windows\SysWOW64\mxgvnf.exe"32⤵PID:2112
-
C:\Windows\SysWOW64\jgrwad.exeC:\Windows\system32\jgrwad.exe 1380 "C:\Windows\SysWOW64\zkqltj.exe"33⤵PID:4796
-
C:\Windows\SysWOW64\ucsoiy.exeC:\Windows\system32\ucsoiy.exe 1396 "C:\Windows\SysWOW64\jgrwad.exe"34⤵PID:3284
-
C:\Windows\SysWOW64\ebwlax.exeC:\Windows\system32\ebwlax.exe 1124 "C:\Windows\SysWOW64\ucsoiy.exe"35⤵PID:3804
-
C:\Windows\SysWOW64\rkcodo.exeC:\Windows\system32\rkcodo.exe 1408 "C:\Windows\SysWOW64\ebwlax.exe"36⤵PID:4440
-
C:\Windows\SysWOW64\brguon.exeC:\Windows\system32\brguon.exe 1392 "C:\Windows\SysWOW64\rkcodo.exe"37⤵PID:1116
-
C:\Windows\SysWOW64\enthgv.exeC:\Windows\system32\enthgv.exe 1400 "C:\Windows\SysWOW64\brguon.exe"38⤵PID:1768
-
C:\Windows\SysWOW64\ybhvax.exeC:\Windows\system32\ybhvax.exe 1424 "C:\Windows\SysWOW64\enthgv.exe"39⤵PID:4608
-
C:\Windows\SysWOW64\wvrzmq.exeC:\Windows\system32\wvrzmq.exe 1416 "C:\Windows\SysWOW64\ybhvax.exe"40⤵PID:4856
-
C:\Windows\SysWOW64\rjrijy.exeC:\Windows\system32\rjrijy.exe 1404 "C:\Windows\SysWOW64\wvrzmq.exe"41⤵PID:1456
-
C:\Windows\SysWOW64\jditdy.exeC:\Windows\system32\jditdy.exe 1436 "C:\Windows\SysWOW64\rjrijy.exe"42⤵PID:2604
-
C:\Windows\SysWOW64\lnlmmo.exeC:\Windows\system32\lnlmmo.exe 1428 "C:\Windows\SysWOW64\jditdy.exe"43⤵PID:4968
-
C:\Windows\SysWOW64\lzxeia.exeC:\Windows\system32\lzxeia.exe 1432 "C:\Windows\SysWOW64\lnlmmo.exe"44⤵PID:4684
-
C:\Windows\SysWOW64\vybktz.exeC:\Windows\system32\vybktz.exe 1440 "C:\Windows\SysWOW64\lzxeia.exe"45⤵PID:1540
-
C:\Windows\SysWOW64\ejmkux.exeC:\Windows\system32\ejmkux.exe 1128 "C:\Windows\SysWOW64\vybktz.exe"46⤵PID:4676
-
C:\Windows\SysWOW64\ojqhmv.exeC:\Windows\system32\ojqhmv.exe 1212 "C:\Windows\SysWOW64\ejmkux.exe"47⤵PID:1204
-
C:\Windows\SysWOW64\yqcfxu.exeC:\Windows\system32\yqcfxu.exe 1444 "C:\Windows\SysWOW64\ojqhmv.exe"48⤵PID:1940
-
C:\Windows\SysWOW64\lzipau.exeC:\Windows\system32\lzipau.exe 1448 "C:\Windows\SysWOW64\yqcfxu.exe"49⤵PID:4764
-
C:\Windows\SysWOW64\wymnkt.exeC:\Windows\system32\wymnkt.exe 1456 "C:\Windows\SysWOW64\lzipau.exe"50⤵PID:2876
-
C:\Windows\SysWOW64\jledqw.exeC:\Windows\system32\jledqw.exe 1452 "C:\Windows\SysWOW64\wymnkt.exe"51⤵PID:1996
-
C:\Windows\SysWOW64\wyoses.exeC:\Windows\system32\wyoses.exe 1460 "C:\Windows\SysWOW64\jledqw.exe"52⤵PID:4448
-
C:\Windows\SysWOW64\gjddrv.exeC:\Windows\system32\gjddrv.exe 1472 "C:\Windows\SysWOW64\wyoses.exe"53⤵PID:1660
-
C:\Windows\SysWOW64\tsjnuv.exeC:\Windows\system32\tsjnuv.exe 1464 "C:\Windows\SysWOW64\gjddrv.exe"54⤵PID:3716
-
C:\Windows\SysWOW64\drvleu.exeC:\Windows\system32\drvleu.exe 1468 "C:\Windows\SysWOW64\tsjnuv.exe"55⤵PID:1300
-
C:\Windows\SysWOW64\qefbkx.exeC:\Windows\system32\qefbkx.exe 1496 "C:\Windows\SysWOW64\drvleu.exe"56⤵PID:720
-
C:\Windows\SysWOW64\ymaten.exeC:\Windows\system32\ymaten.exe 1476 "C:\Windows\SysWOW64\qefbkx.exe"57⤵PID:496
-
C:\Windows\SysWOW64\lzkqkr.exeC:\Windows\system32\lzkqkr.exe 1480 "C:\Windows\SysWOW64\ymaten.exe"58⤵PID:1704
-
C:\Windows\SysWOW64\qialbw.exeC:\Windows\system32\qialbw.exe 1492 "C:\Windows\SysWOW64\lzkqkr.exe"59⤵PID:1460
-
C:\Windows\SysWOW64\esyoeo.exeC:\Windows\system32\esyoeo.exe 1484 "C:\Windows\SysWOW64\qialbw.exe"60⤵PID:4564
-
C:\Windows\SysWOW64\evlgsa.exeC:\Windows\system32\evlgsa.exe 1488 "C:\Windows\SysWOW64\esyoeo.exe"61⤵PID:4472
-
C:\Windows\SysWOW64\gfkekw.exeC:\Windows\system32\gfkekw.exe 1500 "C:\Windows\SysWOW64\evlgsa.exe"62⤵PID:4320
-
C:\Windows\SysWOW64\ibdpsq.exeC:\Windows\system32\ibdpsq.exe 1116 "C:\Windows\SysWOW64\gfkekw.exe"63⤵PID:2556
-
C:\Windows\SysWOW64\twezhl.exeC:\Windows\system32\twezhl.exe 1508 "C:\Windows\SysWOW64\ibdpsq.exe"64⤵PID:1524
-
C:\Windows\SysWOW64\tiqrwp.exeC:\Windows\system32\tiqrwp.exe 1520 "C:\Windows\SysWOW64\twezhl.exe"65⤵PID:4628
-
C:\Windows\SysWOW64\derkdj.exeC:\Windows\system32\derkdj.exe 1524 "C:\Windows\SysWOW64\tiqrwp.exe"66⤵PID:2360
-
C:\Windows\SysWOW64\qrbzjn.exeC:\Windows\system32\qrbzjn.exe 1512 "C:\Windows\SysWOW64\derkdj.exe"67⤵PID:4344
-
C:\Windows\SysWOW64\bmckrh.exeC:\Windows\system32\bmckrh.exe 1516 "C:\Windows\SysWOW64\qrbzjn.exe"68⤵PID:3292
-
C:\Windows\SysWOW64\olwnzq.exeC:\Windows\system32\olwnzq.exe 1528 "C:\Windows\SysWOW64\bmckrh.exe"69⤵PID:4352
-
C:\Windows\SysWOW64\ykjsso.exeC:\Windows\system32\ykjsso.exe 1412 "C:\Windows\SysWOW64\olwnzq.exe"70⤵PID:4644
-
C:\Windows\SysWOW64\ijnpcn.exeC:\Windows\system32\ijnpcn.exe 1536 "C:\Windows\SysWOW64\ykjsso.exe"71⤵PID:4476
-
C:\Windows\SysWOW64\vwefir.exeC:\Windows\system32\vwefir.exe 1548 "C:\Windows\SysWOW64\ijnpcn.exe"72⤵PID:3800
-
C:\Windows\SysWOW64\ijovon.exeC:\Windows\system32\ijovon.exe 1540 "C:\Windows\SysWOW64\vwefir.exe"73⤵PID:772
-
C:\Windows\SysWOW64\sqasgm.exeC:\Windows\system32\sqasgm.exe 1544 "C:\Windows\SysWOW64\ijovon.exe"74⤵PID:4112
-
C:\Windows\SysWOW64\gzgdjl.exeC:\Windows\system32\gzgdjl.exe 1552 "C:\Windows\SysWOW64\sqasgm.exe"75⤵PID:4800
-
C:\Windows\SysWOW64\qcwnwo.exeC:\Windows\system32\qcwnwo.exe 1572 "C:\Windows\SysWOW64\gzgdjl.exe"76⤵PID:1760
-
C:\Windows\SysWOW64\dmcqzo.exeC:\Windows\system32\dmcqzo.exe 1564 "C:\Windows\SysWOW64\qcwnwo.exe"77⤵PID:4812
-
C:\Windows\SysWOW64\qzlgfs.exeC:\Windows\system32\qzlgfs.exe 1580 "C:\Windows\SysWOW64\dmcqzo.exe"78⤵PID:3464
-
C:\Windows\SysWOW64\ajjqsn.exeC:\Windows\system32\ajjqsn.exe 1568 "C:\Windows\SysWOW64\qzlgfs.exe"79⤵PID:3844
-
C:\Windows\SysWOW64\othbdm.exeC:\Windows\system32\othbdm.exe 1556 "C:\Windows\SysWOW64\ajjqsn.exe"80⤵PID:1728
-
C:\Windows\SysWOW64\yvfdrp.exeC:\Windows\system32\yvfdrp.exe 1584 "C:\Windows\SysWOW64\othbdm.exe"81⤵PID:5104
-
C:\Windows\SysWOW64\lfloup.exeC:\Windows\system32\lfloup.exe 1560 "C:\Windows\SysWOW64\yvfdrp.exe"82⤵PID:1544
-
C:\Windows\SysWOW64\vepleo.exeC:\Windows\system32\vepleo.exe 1576 "C:\Windows\SysWOW64\lfloup.exe"83⤵PID:2652
-
C:\Windows\SysWOW64\invohn.exeC:\Windows\system32\invohn.exe 1588 "C:\Windows\SysWOW64\vepleo.exe"84⤵PID:4820
-
C:\Windows\SysWOW64\tmzuzm.exeC:\Windows\system32\tmzuzm.exe 1592 "C:\Windows\SysWOW64\invohn.exe"85⤵PID:3884
-
C:\Windows\SysWOW64\glcwim.exeC:\Windows\system32\glcwim.exe 1596 "C:\Windows\SysWOW64\tmzuzm.exe"86⤵PID:2540
-
C:\Windows\SysWOW64\qkgusl.exeC:\Windows\system32\qkgusl.exe 1604 "C:\Windows\SysWOW64\glcwim.exe"87⤵PID:452
-
C:\Windows\SysWOW64\dtnwvk.exeC:\Windows\system32\dtnwvk.exe 1608 "C:\Windows\SysWOW64\qkgusl.exe"88⤵PID:3632
-
C:\Windows\SysWOW64\ntrugj.exeC:\Windows\system32\ntrugj.exe 1600 "C:\Windows\SysWOW64\dtnwvk.exe"89⤵PID:2356
-
C:\Windows\SysWOW64\agikun.exeC:\Windows\system32\agikun.exe 1620 "C:\Windows\SysWOW64\ntrugj.exe"90⤵PID:2280
-
C:\Windows\SysWOW64\lnmpem.exeC:\Windows\system32\lnmpem.exe 1612 "C:\Windows\SysWOW64\agikun.exe"91⤵PID:3828
-
C:\Windows\SysWOW64\vinzmg.exeC:\Windows\system32\vinzmg.exe 1352 "C:\Windows\SysWOW64\lnmpem.exe"92⤵PID:3780
-
C:\Windows\SysWOW64\ikucpg.exeC:\Windows\system32\ikucpg.exe 1624 "C:\Windows\SysWOW64\vinzmg.exe"93⤵PID:4792
-
C:\Windows\SysWOW64\tfuvwa.exeC:\Windows\system32\tfuvwa.exe 1636 "C:\Windows\SysWOW64\ikucpg.exe"94⤵PID:2036
-
C:\Windows\SysWOW64\dqkfrd.exeC:\Windows\system32\dqkfrd.exe 1648 "C:\Windows\SysWOW64\tfuvwa.exe"95⤵PID:2848
-
C:\Windows\SysWOW64\qzqiud.exeC:\Windows\system32\qzqiud.exe 1640 "C:\Windows\SysWOW64\dqkfrd.exe"96⤵PID:3508
-
C:\Windows\SysWOW64\xhdihs.exeC:\Windows\system32\xhdihs.exe 1628 "C:\Windows\SysWOW64\qzqiud.exe"97⤵PID:5076
-
C:\Windows\SysWOW64\luvyuw.exeC:\Windows\system32\luvyuw.exe 1652 "C:\Windows\SysWOW64\xhdihs.exe"98⤵PID:924
-
C:\Windows\SysWOW64\yebaxo.exeC:\Windows\system32\yebaxo.exe 1632 "C:\Windows\SysWOW64\luvyuw.exe"99⤵PID:1248
-
C:\Windows\SysWOW64\izutfi.exeC:\Windows\system32\izutfi.exe 1644 "C:\Windows\SysWOW64\yebaxo.exe"100⤵PID:1188
-
C:\Windows\SysWOW64\tygqph.exeC:\Windows\system32\tygqph.exe 1664 "C:\Windows\SysWOW64\izutfi.exe"101⤵PID:3488
-
C:\Windows\SysWOW64\glqgvl.exeC:\Windows\system32\glqgvl.exe 1668 "C:\Windows\SysWOW64\tygqph.exe"102⤵PID:4604
-
C:\Windows\SysWOW64\qscdok.exeC:\Windows\system32\qscdok.exe 1672 "C:\Windows\SysWOW64\glqgvl.exe"103⤵PID:2584
-
C:\Windows\SysWOW64\dfutuo.exeC:\Windows\system32\dfutuo.exe 1660 "C:\Windows\SysWOW64\qscdok.exe"104⤵PID:212
-
C:\Windows\SysWOW64\isdjzr.exeC:\Windows\system32\isdjzr.exe 1656 "C:\Windows\SysWOW64\dfutuo.exe"105⤵PID:3272
-
C:\Windows\SysWOW64\sspokq.exeC:\Windows\system32\sspokq.exe 1136 "C:\Windows\SysWOW64\isdjzr.exe"106⤵PID:2256
-
C:\Windows\SysWOW64\cztmup.exeC:\Windows\system32\cztmup.exe 1688 "C:\Windows\SysWOW64\sspokq.exe"107⤵PID:4348
-
C:\Windows\SysWOW64\qaaoxg.exeC:\Windows\system32\qaaoxg.exe 1680 "C:\Windows\SysWOW64\cztmup.exe"108⤵PID:4536
-
C:\Windows\SysWOW64\xqnore.exeC:\Windows\system32\xqnore.exe 1696 "C:\Windows\SysWOW64\qaaoxg.exe"109⤵PID:4616
-
C:\Windows\SysWOW64\kdfexa.exeC:\Windows\system32\kdfexa.exe 1692 "C:\Windows\SysWOW64\xqnore.exe"110⤵PID:5084
-
C:\Windows\SysWOW64\vcjbiz.exeC:\Windows\system32\vcjbiz.exe 1700 "C:\Windows\SysWOW64\kdfexa.exe"111⤵PID:1412
-
C:\Windows\SysWOW64\ilpely.exeC:\Windows\system32\ilpely.exe 1684 "C:\Windows\SysWOW64\vcjbiz.exe"112⤵PID:3276
-
C:\Windows\SysWOW64\slbkdx.exeC:\Windows\system32\slbkdx.exe 1708 "C:\Windows\SysWOW64\ilpely.exe"113⤵PID:3228
-
C:\Windows\SysWOW64\fbwemf.exeC:\Windows\system32\fbwemf.exe 1704 "C:\Windows\SysWOW64\slbkdx.exe"114⤵PID:2824
-
C:\Windows\SysWOW64\swocrj.exeC:\Windows\system32\swocrj.exe 1720 "C:\Windows\SysWOW64\fbwemf.exe"115⤵PID:2732
-
C:\Windows\SysWOW64\fjxsxf.exeC:\Windows\system32\fjxsxf.exe 1712 "C:\Windows\SysWOW64\swocrj.exe"116⤵PID:5072
-
C:\Windows\SysWOW64\nrtkrc.exeC:\Windows\system32\nrtkrc.exe 1388 "C:\Windows\SysWOW64\fjxsxf.exe"117⤵PID:1824
-
C:\Windows\SysWOW64\aazvuu.exeC:\Windows\system32\aazvuu.exe 1724 "C:\Windows\SysWOW64\nrtkrc.exe"118⤵PID:3772
-
C:\Windows\SysWOW64\kzdsfs.exeC:\Windows\system32\kzdsfs.exe 1736 "C:\Windows\SysWOW64\aazvuu.exe"119⤵PID:3888
-
C:\Windows\SysWOW64\yjjvis.exeC:\Windows\system32\yjjvis.exe 1728 "C:\Windows\SysWOW64\kzdsfs.exe"120⤵PID:4452
-
C:\Windows\SysWOW64\iinssr.exeC:\Windows\system32\iinssr.exe 1740 "C:\Windows\SysWOW64\yjjvis.exe"121⤵PID:844
-
C:\Windows\SysWOW64\shzylp.exeC:\Windows\system32\shzylp.exe 1748 "C:\Windows\SysWOW64\iinssr.exe"122⤵PID:548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-