Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
17a1da8ef63acc25806108a32b61b8c0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
17a1da8ef63acc25806108a32b61b8c0.exe
Resource
win10v2004-20240508-en
General
-
Target
17a1da8ef63acc25806108a32b61b8c0.exe
-
Size
313KB
-
MD5
17a1da8ef63acc25806108a32b61b8c0
-
SHA1
c8f9f4f18d74d074114bd2a708338632a366eed3
-
SHA256
7aec72fd6370fe31f75bf5861a6dd7d7fae51051ce3c1467f3f3dcf962913236
-
SHA512
a2fd8d4180a15db61e2a3c809c1c54b96cd4f87af296995cf4a15263c597621e0fdd0050185cbab406cc83cd70083b2eb0f652bf4961fac0665783630075d640
-
SSDEEP
6144:8KurIbStgrXR6JqJCAL4WsXz11PDhTAXBg:8JrIbd49z6Bg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 17a1da8ef63acc25806108a32b61b8c0.exe -
Executes dropped EXE 64 IoCs
pid Process 3576 sm1l3y.exe 1824 ezldwc.exe 2672 wkzvda.exe 1912 jfqljd.exe 1980 ovlnse.exe 2128 yuptcc.exe 3468 ovmbdl.exe 1416 ygclro.exe 4764 lttbwk.exe 840 zglrco.exe 1484 mtugis.exe 4148 zrxjza.exe 4880 jqbgjz.exe 4092 wdtwpv.exe 3796 gcxczt.exe 220 tbseic.exe 3044 hkyhlb.exe 1188 qnnrge.exe 3752 hokzhf.exe 3564 qzakui.exe 2604 emraam.exe 4884 rzjpgq.exe 912 bynnqp.exe 4076 owiphp.exe 1492 bgoako.exe 2772 owrdtx.exe 4412 yvvadv.exe 2292 lqnqjr.exe 1472 zdwgpv.exe 4448 jglqky.exe 2668 wtdgqc.exe 3572 jryiyc.exe 4460 wepyeg.exe 2652 jrzwkk.exe 3696 wermqo.exe 2148 gldjam.exe 3608 tymzgi.exe 5092 gphboq.exe 2540 tczruu.exe 2324 dmobqx.exe 4732 rwumsx.exe 800 emppbx.exe 2392 rzhfhb.exe 1536 bkwpue.exe 1832 oxnfai.exe 2820 bkxuoe.exe 1048 oxpkui.exe 2412 yieuhl.exe 1604 lvwknp.exe 4152 yifass.exe 2556 evxyyo.exe 1744 oubvrn.exe 1572 bpslwr.exe 2516 ojyaid.exe 4560 bsfdlv.exe 4400 lrjbvu.exe 380 ymaqbx.exe 1888 ldvtkg.exe 3008 yqnjpk.exe 4184 iactln.exe 3928 vnurqi.exe 4840 jadgwm.exe 1988 tapehl.exe 3088 gykhpt.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xnavvp.exe kpfanh.exe File opened for modification C:\Windows\SysWOW64\eodqmc.exe syjnec.exe File created C:\Windows\SysWOW64\fsnfuu.exe sfwqor.exe File created C:\Windows\SysWOW64\aegacv.exe nfextv.exe File opened for modification C:\Windows\SysWOW64\kkihpf.exe alekfo.exe File opened for modification C:\Windows\SysWOW64\ubwwvz.exe jukzca.exe File created C:\Windows\SysWOW64\mxgvnf.exe zhetwx.exe File opened for modification C:\Windows\SysWOW64\vgriuz.exe italpd.exe File opened for modification C:\Windows\SysWOW64\fcoswi.exe shxcqe.exe File opened for modification C:\Windows\SysWOW64\vysllp.exe idjvfl.exe File created C:\Windows\SysWOW64\npibni.exe acrmhe.exe File opened for modification C:\Windows\SysWOW64\dfpthq.exe psgdbm.exe File opened for modification C:\Windows\SysWOW64\carvfo.exe stnxvp.exe File opened for modification C:\Windows\SysWOW64\hatsap.exe ufjcvl.exe File opened for modification C:\Windows\SysWOW64\ojvtnb.exe eyfqzy.exe File opened for modification C:\Windows\SysWOW64\twezhl.exe ggjwrc.exe File created C:\Windows\SysWOW64\oyknij.exe enucvg.exe File opened for modification C:\Windows\SysWOW64\gylmbt.exe tlcwvp.exe File opened for modification C:\Windows\SysWOW64\tnemek.exe gamwzg.exe File created C:\Windows\SysWOW64\jqbgjz.exe zrxjza.exe File opened for modification C:\Windows\SysWOW64\nfhplu.exe dgdrbv.exe File created C:\Windows\SysWOW64\najrks.exe cbftrt.exe File created C:\Windows\SysWOW64\xgxewc.exe klgoqy.exe File created C:\Windows\SysWOW64\paavmy.exe cniggu.exe File opened for modification C:\Windows\SysWOW64\tezbsh.exe grilmd.exe File opened for modification C:\Windows\SysWOW64\tammpn.exe jbhpxo.exe File created C:\Windows\SysWOW64\rzhfhb.exe emppbx.exe File opened for modification C:\Windows\SysWOW64\svcjxd.exe fxagod.exe File opened for modification C:\Windows\SysWOW64\rxyuby.exe hqmxja.exe File opened for modification C:\Windows\SysWOW64\zrxjza.exe mtugis.exe File opened for modification C:\Windows\SysWOW64\emraam.exe qzakui.exe File created C:\Windows\SysWOW64\lrjbvu.exe bsfdlv.exe File opened for modification C:\Windows\SysWOW64\vnurqi.exe iactln.exe File opened for modification C:\Windows\SysWOW64\bxjsii.exe rmtimn.exe File opened for modification C:\Windows\SysWOW64\hwfhxc.exe xuqxkz.exe File opened for modification C:\Windows\SysWOW64\sxelnv.exe ecnvha.exe File opened for modification C:\Windows\SysWOW64\qnnrge.exe hkyhlb.exe File opened for modification C:\Windows\SysWOW64\kmqpzo.exe xzzztl.exe File opened for modification C:\Windows\SysWOW64\wzxqjn.exe jegaer.exe File created C:\Windows\SysWOW64\qqvbxi.exe chpyui.exe File created C:\Windows\SysWOW64\buhtmp.exe ohpdgl.exe File opened for modification C:\Windows\SysWOW64\lbtaip.exe yobddl.exe File created C:\Windows\SysWOW64\qticap.exe dyymul.exe File created C:\Windows\SysWOW64\uawfap.exe hffqut.exe File created C:\Windows\SysWOW64\xwrjmn.exe jjztyj.exe File created C:\Windows\SysWOW64\crrqze.exe pehaua.exe File opened for modification C:\Windows\SysWOW64\tmyyka.exe jbjoxf.exe File opened for modification C:\Windows\SysWOW64\fimych.exe svcjxd.exe File opened for modification C:\Windows\SysWOW64\adcsuu.exe nfhplu.exe File opened for modification C:\Windows\SysWOW64\hjocdf.exe ustzuw.exe File opened for modification C:\Windows\SysWOW64\nsuszy.exe afdctu.exe File created C:\Windows\SysWOW64\qdsunk.exe diaehg.exe File created C:\Windows\SysWOW64\asgbyi.exe qscdok.exe File opened for modification C:\Windows\SysWOW64\rjhxcf.exe etmvtx.exe File opened for modification C:\Windows\SysWOW64\twjkcm.exe gjruwq.exe File created C:\Windows\SysWOW64\kyasec.exe xhypvc.exe File created C:\Windows\SysWOW64\lebikr.exe vdesjq.exe File created C:\Windows\SysWOW64\svyywf.exe figiqc.exe File opened for modification C:\Windows\SysWOW64\psgdbm.exe cfonvi.exe File opened for modification C:\Windows\SysWOW64\jryhow.exe zktjdy.exe File opened for modification C:\Windows\SysWOW64\kclmoa.exe ubwwvz.exe File opened for modification C:\Windows\SysWOW64\jfqbfz.exe wszlzd.exe File opened for modification C:\Windows\SysWOW64\qpxuwx.exe gqlwey.exe File created C:\Windows\SysWOW64\gpgcwh.exe xmqsje.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 3576 2536 17a1da8ef63acc25806108a32b61b8c0.exe 80 PID 2536 wrote to memory of 3576 2536 17a1da8ef63acc25806108a32b61b8c0.exe 80 PID 2536 wrote to memory of 3576 2536 17a1da8ef63acc25806108a32b61b8c0.exe 80 PID 3576 wrote to memory of 1824 3576 sm1l3y.exe 82 PID 3576 wrote to memory of 1824 3576 sm1l3y.exe 82 PID 3576 wrote to memory of 1824 3576 sm1l3y.exe 82 PID 1824 wrote to memory of 2672 1824 ezldwc.exe 83 PID 1824 wrote to memory of 2672 1824 ezldwc.exe 83 PID 1824 wrote to memory of 2672 1824 ezldwc.exe 83 PID 2672 wrote to memory of 1912 2672 wkzvda.exe 84 PID 2672 wrote to memory of 1912 2672 wkzvda.exe 84 PID 2672 wrote to memory of 1912 2672 wkzvda.exe 84 PID 1912 wrote to memory of 1980 1912 jfqljd.exe 85 PID 1912 wrote to memory of 1980 1912 jfqljd.exe 85 PID 1912 wrote to memory of 1980 1912 jfqljd.exe 85 PID 1980 wrote to memory of 2128 1980 ovlnse.exe 87 PID 1980 wrote to memory of 2128 1980 ovlnse.exe 87 PID 1980 wrote to memory of 2128 1980 ovlnse.exe 87 PID 2128 wrote to memory of 3468 2128 yuptcc.exe 88 PID 2128 wrote to memory of 3468 2128 yuptcc.exe 88 PID 2128 wrote to memory of 3468 2128 yuptcc.exe 88 PID 3468 wrote to memory of 1416 3468 ovmbdl.exe 89 PID 3468 wrote to memory of 1416 3468 ovmbdl.exe 89 PID 3468 wrote to memory of 1416 3468 ovmbdl.exe 89 PID 1416 wrote to memory of 4764 1416 ygclro.exe 90 PID 1416 wrote to memory of 4764 1416 ygclro.exe 90 PID 1416 wrote to memory of 4764 1416 ygclro.exe 90 PID 4764 wrote to memory of 840 4764 lttbwk.exe 91 PID 4764 wrote to memory of 840 4764 lttbwk.exe 91 PID 4764 wrote to memory of 840 4764 lttbwk.exe 91 PID 840 wrote to memory of 1484 840 zglrco.exe 92 PID 840 wrote to memory of 1484 840 zglrco.exe 92 PID 840 wrote to memory of 1484 840 zglrco.exe 92 PID 1484 wrote to memory of 4148 1484 mtugis.exe 93 PID 1484 wrote to memory of 4148 1484 mtugis.exe 93 PID 1484 wrote to memory of 4148 1484 mtugis.exe 93 PID 4148 wrote to memory of 4880 4148 zrxjza.exe 94 PID 4148 wrote to memory of 4880 4148 zrxjza.exe 94 PID 4148 wrote to memory of 4880 4148 zrxjza.exe 94 PID 4880 wrote to memory of 4092 4880 jqbgjz.exe 95 PID 4880 wrote to memory of 4092 4880 jqbgjz.exe 95 PID 4880 wrote to memory of 4092 4880 jqbgjz.exe 95 PID 4092 wrote to memory of 3796 4092 wdtwpv.exe 98 PID 4092 wrote to memory of 3796 4092 wdtwpv.exe 98 PID 4092 wrote to memory of 3796 4092 wdtwpv.exe 98 PID 3796 wrote to memory of 220 3796 gcxczt.exe 99 PID 3796 wrote to memory of 220 3796 gcxczt.exe 99 PID 3796 wrote to memory of 220 3796 gcxczt.exe 99 PID 220 wrote to memory of 3044 220 tbseic.exe 100 PID 220 wrote to memory of 3044 220 tbseic.exe 100 PID 220 wrote to memory of 3044 220 tbseic.exe 100 PID 3044 wrote to memory of 1188 3044 hkyhlb.exe 101 PID 3044 wrote to memory of 1188 3044 hkyhlb.exe 101 PID 3044 wrote to memory of 1188 3044 hkyhlb.exe 101 PID 1188 wrote to memory of 3752 1188 qnnrge.exe 102 PID 1188 wrote to memory of 3752 1188 qnnrge.exe 102 PID 1188 wrote to memory of 3752 1188 qnnrge.exe 102 PID 3752 wrote to memory of 3564 3752 hokzhf.exe 104 PID 3752 wrote to memory of 3564 3752 hokzhf.exe 104 PID 3752 wrote to memory of 3564 3752 hokzhf.exe 104 PID 3564 wrote to memory of 2604 3564 qzakui.exe 106 PID 3564 wrote to memory of 2604 3564 qzakui.exe 106 PID 3564 wrote to memory of 2604 3564 qzakui.exe 106 PID 2604 wrote to memory of 4884 2604 emraam.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\17a1da8ef63acc25806108a32b61b8c0.exe"C:\Users\Admin\AppData\Local\Temp\17a1da8ef63acc25806108a32b61b8c0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\Desktop\sm1l3y.exe"C:\Users\Admin\Desktop\sm1l3y.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\ezldwc.exeC:\Windows\system32\ezldwc.exe 1008 "C:\Users\Admin\Desktop\sm1l3y.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\wkzvda.exeC:\Windows\system32\wkzvda.exe 1140 "C:\Windows\SysWOW64\ezldwc.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\jfqljd.exeC:\Windows\system32\jfqljd.exe 1144 "C:\Windows\SysWOW64\wkzvda.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\ovlnse.exeC:\Windows\system32\ovlnse.exe 1148 "C:\Windows\SysWOW64\jfqljd.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\yuptcc.exeC:\Windows\system32\yuptcc.exe 1152 "C:\Windows\SysWOW64\ovlnse.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\ovmbdl.exeC:\Windows\system32\ovmbdl.exe 1156 "C:\Windows\SysWOW64\yuptcc.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\ygclro.exeC:\Windows\system32\ygclro.exe 1164 "C:\Windows\SysWOW64\ovmbdl.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\lttbwk.exeC:\Windows\system32\lttbwk.exe 1168 "C:\Windows\SysWOW64\ygclro.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\zglrco.exeC:\Windows\system32\zglrco.exe 1160 "C:\Windows\SysWOW64\lttbwk.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\mtugis.exeC:\Windows\system32\mtugis.exe 1180 "C:\Windows\SysWOW64\zglrco.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\zrxjza.exeC:\Windows\system32\zrxjza.exe 1172 "C:\Windows\SysWOW64\mtugis.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\jqbgjz.exeC:\Windows\system32\jqbgjz.exe 1176 "C:\Windows\SysWOW64\zrxjza.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\wdtwpv.exeC:\Windows\system32\wdtwpv.exe 1184 "C:\Windows\SysWOW64\jqbgjz.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\gcxczt.exeC:\Windows\system32\gcxczt.exe 1188 "C:\Windows\SysWOW64\wdtwpv.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\tbseic.exeC:\Windows\system32\tbseic.exe 1192 "C:\Windows\SysWOW64\gcxczt.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\hkyhlb.exeC:\Windows\system32\hkyhlb.exe 1196 "C:\Windows\SysWOW64\tbseic.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\qnnrge.exeC:\Windows\system32\qnnrge.exe 1132 "C:\Windows\SysWOW64\hkyhlb.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\hokzhf.exeC:\Windows\system32\hokzhf.exe 1204 "C:\Windows\SysWOW64\qnnrge.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\qzakui.exeC:\Windows\system32\qzakui.exe 1208 "C:\Windows\SysWOW64\hokzhf.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\emraam.exeC:\Windows\system32\emraam.exe 1216 "C:\Windows\SysWOW64\qzakui.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\rzjpgq.exeC:\Windows\system32\rzjpgq.exe 1220 "C:\Windows\SysWOW64\emraam.exe"23⤵
- Executes dropped EXE
PID:4884 -
C:\Windows\SysWOW64\bynnqp.exeC:\Windows\system32\bynnqp.exe 1212 "C:\Windows\SysWOW64\rzjpgq.exe"24⤵
- Executes dropped EXE
PID:912 -
C:\Windows\SysWOW64\owiphp.exeC:\Windows\system32\owiphp.exe 1224 "C:\Windows\SysWOW64\bynnqp.exe"25⤵
- Executes dropped EXE
PID:4076 -
C:\Windows\SysWOW64\bgoako.exeC:\Windows\system32\bgoako.exe 1232 "C:\Windows\SysWOW64\owiphp.exe"26⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\SysWOW64\owrdtx.exeC:\Windows\system32\owrdtx.exe 1228 "C:\Windows\SysWOW64\bgoako.exe"27⤵
- Executes dropped EXE
PID:2772 -
C:\Windows\SysWOW64\yvvadv.exeC:\Windows\system32\yvvadv.exe 1240 "C:\Windows\SysWOW64\owrdtx.exe"28⤵
- Executes dropped EXE
PID:4412 -
C:\Windows\SysWOW64\lqnqjr.exeC:\Windows\system32\lqnqjr.exe 1236 "C:\Windows\SysWOW64\yvvadv.exe"29⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\zdwgpv.exeC:\Windows\system32\zdwgpv.exe 1248 "C:\Windows\SysWOW64\lqnqjr.exe"30⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\jglqky.exeC:\Windows\system32\jglqky.exe 1244 "C:\Windows\SysWOW64\zdwgpv.exe"31⤵
- Executes dropped EXE
PID:4448 -
C:\Windows\SysWOW64\wtdgqc.exeC:\Windows\system32\wtdgqc.exe 1252 "C:\Windows\SysWOW64\jglqky.exe"32⤵
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\jryiyc.exeC:\Windows\system32\jryiyc.exe 1256 "C:\Windows\SysWOW64\wtdgqc.exe"33⤵
- Executes dropped EXE
PID:3572 -
C:\Windows\SysWOW64\wepyeg.exeC:\Windows\system32\wepyeg.exe 1260 "C:\Windows\SysWOW64\jryiyc.exe"34⤵
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\jrzwkk.exeC:\Windows\system32\jrzwkk.exe 1056 "C:\Windows\SysWOW64\wepyeg.exe"35⤵
- Executes dropped EXE
PID:2652 -
C:\Windows\SysWOW64\wermqo.exeC:\Windows\system32\wermqo.exe 1272 "C:\Windows\SysWOW64\jrzwkk.exe"36⤵
- Executes dropped EXE
PID:3696 -
C:\Windows\SysWOW64\gldjam.exeC:\Windows\system32\gldjam.exe 1276 "C:\Windows\SysWOW64\wermqo.exe"37⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\tymzgi.exeC:\Windows\system32\tymzgi.exe 1280 "C:\Windows\SysWOW64\gldjam.exe"38⤵
- Executes dropped EXE
PID:3608 -
C:\Windows\SysWOW64\gphboq.exeC:\Windows\system32\gphboq.exe 1284 "C:\Windows\SysWOW64\tymzgi.exe"39⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\tczruu.exeC:\Windows\system32\tczruu.exe 1268 "C:\Windows\SysWOW64\gphboq.exe"40⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\dmobqx.exeC:\Windows\system32\dmobqx.exe 1288 "C:\Windows\SysWOW64\tczruu.exe"41⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\rwumsx.exeC:\Windows\system32\rwumsx.exe 1296 "C:\Windows\SysWOW64\dmobqx.exe"42⤵
- Executes dropped EXE
PID:4732 -
C:\Windows\SysWOW64\emppbx.exeC:\Windows\system32\emppbx.exe 1300 "C:\Windows\SysWOW64\rwumsx.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:800 -
C:\Windows\SysWOW64\rzhfhb.exeC:\Windows\system32\rzhfhb.exe 1292 "C:\Windows\SysWOW64\emppbx.exe"44⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\bkwpue.exeC:\Windows\system32\bkwpue.exe 1264 "C:\Windows\SysWOW64\rzhfhb.exe"45⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\oxnfai.exeC:\Windows\system32\oxnfai.exe 1308 "C:\Windows\SysWOW64\bkwpue.exe"46⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\bkxuoe.exeC:\Windows\system32\bkxuoe.exe 1312 "C:\Windows\SysWOW64\oxnfai.exe"47⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\SysWOW64\oxpkui.exeC:\Windows\system32\oxpkui.exe 1316 "C:\Windows\SysWOW64\bkxuoe.exe"48⤵
- Executes dropped EXE
PID:1048 -
C:\Windows\SysWOW64\yieuhl.exeC:\Windows\system32\yieuhl.exe 1324 "C:\Windows\SysWOW64\oxpkui.exe"49⤵
- Executes dropped EXE
PID:2412 -
C:\Windows\SysWOW64\lvwknp.exeC:\Windows\system32\lvwknp.exe 1320 "C:\Windows\SysWOW64\yieuhl.exe"50⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\SysWOW64\yifass.exeC:\Windows\system32\yifass.exe 1332 "C:\Windows\SysWOW64\lvwknp.exe"51⤵
- Executes dropped EXE
PID:4152 -
C:\Windows\SysWOW64\evxyyo.exeC:\Windows\system32\evxyyo.exe 1336 "C:\Windows\SysWOW64\yifass.exe"52⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\oubvrn.exeC:\Windows\system32\oubvrn.exe 1340 "C:\Windows\SysWOW64\evxyyo.exe"53⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\bpslwr.exeC:\Windows\system32\bpslwr.exe 1344 "C:\Windows\SysWOW64\oubvrn.exe"54⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\SysWOW64\ojyaid.exeC:\Windows\system32\ojyaid.exe 1348 "C:\Windows\SysWOW64\bpslwr.exe"55⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\bsfdlv.exeC:\Windows\system32\bsfdlv.exe 1304 "C:\Windows\SysWOW64\ojyaid.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4560 -
C:\Windows\SysWOW64\lrjbvu.exeC:\Windows\system32\lrjbvu.exe 1352 "C:\Windows\SysWOW64\bsfdlv.exe"57⤵
- Executes dropped EXE
PID:4400 -
C:\Windows\SysWOW64\ymaqbx.exeC:\Windows\system32\ymaqbx.exe 1360 "C:\Windows\SysWOW64\lrjbvu.exe"58⤵
- Executes dropped EXE
PID:380 -
C:\Windows\SysWOW64\ldvtkg.exeC:\Windows\system32\ldvtkg.exe 1364 "C:\Windows\SysWOW64\ymaqbx.exe"59⤵
- Executes dropped EXE
PID:1888 -
C:\Windows\SysWOW64\yqnjpk.exeC:\Windows\system32\yqnjpk.exe 1200 "C:\Windows\SysWOW64\ldvtkg.exe"60⤵
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\iactln.exeC:\Windows\system32\iactln.exe 1368 "C:\Windows\SysWOW64\yqnjpk.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4184 -
C:\Windows\SysWOW64\vnurqi.exeC:\Windows\system32\vnurqi.exe 1376 "C:\Windows\SysWOW64\iactln.exe"62⤵
- Executes dropped EXE
PID:3928 -
C:\Windows\SysWOW64\jadgwm.exeC:\Windows\system32\jadgwm.exe 1372 "C:\Windows\SysWOW64\vnurqi.exe"63⤵
- Executes dropped EXE
PID:4840 -
C:\Windows\SysWOW64\tapehl.exeC:\Windows\system32\tapehl.exe 1384 "C:\Windows\SysWOW64\jadgwm.exe"64⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\gykhpt.exeC:\Windows\system32\gykhpt.exe 1328 "C:\Windows\SysWOW64\tapehl.exe"65⤵
- Executes dropped EXE
PID:3088 -
C:\Windows\SysWOW64\tlcwvp.exeC:\Windows\system32\tlcwvp.exe 1392 "C:\Windows\SysWOW64\gykhpt.exe"66⤵
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\gylmbt.exeC:\Windows\system32\gylmbt.exe 1396 "C:\Windows\SysWOW64\tlcwvp.exe"67⤵PID:4856
-
C:\Windows\SysWOW64\tldchx.exeC:\Windows\system32\tldchx.exe 1400 "C:\Windows\SysWOW64\gylmbt.exe"68⤵PID:2476
-
C:\Windows\SysWOW64\dwsmca.exeC:\Windows\system32\dwsmca.exe 1404 "C:\Windows\SysWOW64\tldchx.exe"69⤵PID:1920
-
C:\Windows\SysWOW64\qjkcie.exeC:\Windows\system32\qjkcie.exe 1408 "C:\Windows\SysWOW64\dwsmca.exe"70⤵PID:2216
-
C:\Windows\SysWOW64\dwtzna.exeC:\Windows\system32\dwtzna.exe 1380 "C:\Windows\SysWOW64\qjkcie.exe"71⤵PID:1680
-
C:\Windows\SysWOW64\rjlptd.exeC:\Windows\system32\rjlptd.exe 1356 "C:\Windows\SysWOW64\dwtzna.exe"72⤵PID:3344
-
C:\Windows\SysWOW64\ataagh.exeC:\Windows\system32\ataagh.exe 1420 "C:\Windows\SysWOW64\rjlptd.exe"73⤵PID:3944
-
C:\Windows\SysWOW64\odgcjg.exeC:\Windows\system32\odgcjg.exe 1424 "C:\Windows\SysWOW64\ataagh.exe"74⤵PID:4896
-
C:\Windows\SysWOW64\btbfag.exeC:\Windows\system32\btbfag.exe 1388 "C:\Windows\SysWOW64\odgcjg.exe"75⤵PID:1456
-
C:\Windows\SysWOW64\lsnckf.exeC:\Windows\system32\lsnckf.exe 1428 "C:\Windows\SysWOW64\btbfag.exe"76⤵PID:4936
-
C:\Windows\SysWOW64\yriftn.exeC:\Windows\system32\yriftn.exe 1432 "C:\Windows\SysWOW64\lsnckf.exe"77⤵PID:3712
-
C:\Windows\SysWOW64\leavzr.exeC:\Windows\system32\leavzr.exe 1440 "C:\Windows\SysWOW64\yriftn.exe"78⤵PID:1364
-
C:\Windows\SysWOW64\vdesjq.exeC:\Windows\system32\vdesjq.exe 1436 "C:\Windows\SysWOW64\leavzr.exe"79⤵
- Drops file in System32 directory
PID:560 -
C:\Windows\SysWOW64\lebikr.exeC:\Windows\system32\lebikr.exe 1452 "C:\Windows\SysWOW64\vdesjq.exe"80⤵PID:4208
-
C:\Windows\SysWOW64\voqtgu.exeC:\Windows\system32\voqtgu.exe 1084 "C:\Windows\SysWOW64\lebikr.exe"81⤵PID:4712
-
C:\Windows\SysWOW64\ibiily.exeC:\Windows\system32\ibiily.exe 1448 "C:\Windows\SysWOW64\voqtgu.exe"82⤵PID:2760
-
C:\Windows\SysWOW64\tamgww.exeC:\Windows\system32\tamgww.exe 1460 "C:\Windows\SysWOW64\ibiily.exe"83⤵PID:3764
-
C:\Windows\SysWOW64\jbjoxf.exeC:\Windows\system32\jbjoxf.exe 1464 "C:\Windows\SysWOW64\tamgww.exe"84⤵
- Drops file in System32 directory
PID:3212 -
C:\Windows\SysWOW64\tmyyka.exeC:\Windows\system32\tmyyka.exe 1116 "C:\Windows\SysWOW64\jbjoxf.exe"85⤵PID:3780
-
C:\Windows\SysWOW64\gzqoqe.exeC:\Windows\system32\gzqoqe.exe 1472 "C:\Windows\SysWOW64\tmyyka.exe"86⤵PID:3316
-
C:\Windows\SysWOW64\tmzewi.exeC:\Windows\system32\tmzewi.exe 1476 "C:\Windows\SysWOW64\gzqoqe.exe"87⤵PID:4696
-
C:\Windows\SysWOW64\gzrbcm.exeC:\Windows\system32\gzrbcm.exe 1092 "C:\Windows\SysWOW64\tmzewi.exe"88⤵PID:4716
-
C:\Windows\SysWOW64\qkgexp.exeC:\Windows\system32\qkgexp.exe 1480 "C:\Windows\SysWOW64\gzrbcm.exe"89⤵PID:4532
-
C:\Windows\SysWOW64\dxybdl.exeC:\Windows\system32\dxybdl.exe 1044 "C:\Windows\SysWOW64\qkgexp.exe"90⤵PID:2776
-
C:\Windows\SysWOW64\nwcznk.exeC:\Windows\system32\nwcznk.exe 1492 "C:\Windows\SysWOW64\dxybdl.exe"91⤵PID:408
-
C:\Windows\SysWOW64\dxzhot.exeC:\Windows\system32\dxzhot.exe 1468 "C:\Windows\SysWOW64\nwcznk.exe"92⤵PID:1252
-
C:\Windows\SysWOW64\owdezr.exeC:\Windows\system32\owdezr.exe 1484 "C:\Windows\SysWOW64\dxzhot.exe"93⤵PID:4588
-
C:\Windows\SysWOW64\buyhhs.exeC:\Windows\system32\buyhhs.exe 1496 "C:\Windows\SysWOW64\owdezr.exe"94⤵PID:3020
-
C:\Windows\SysWOW64\ohpxnv.exeC:\Windows\system32\ohpxnv.exe 1504 "C:\Windows\SysWOW64\buyhhs.exe"95⤵PID:3668
-
C:\Windows\SysWOW64\buhmtz.exeC:\Windows\system32\buhmtz.exe 1512 "C:\Windows\SysWOW64\ohpxnv.exe"96⤵PID:2552
-
C:\Windows\SysWOW64\dtlsly.exeC:\Windows\system32\dtlsly.exe 1516 "C:\Windows\SysWOW64\buhmtz.exe"97⤵PID:4032
-
C:\Windows\SysWOW64\qodhrc.exeC:\Windows\system32\qodhrc.exe 1520 "C:\Windows\SysWOW64\dtlsly.exe"98⤵PID:3568
-
C:\Windows\SysWOW64\dfxkac.exeC:\Windows\system32\dfxkac.exe 1524 "C:\Windows\SysWOW64\qodhrc.exe"99⤵PID:3924
-
C:\Windows\SysWOW64\qspagg.exeC:\Windows\system32\qspagg.exe 1508 "C:\Windows\SysWOW64\dfxkac.exe"100⤵PID:1012
-
C:\Windows\SysWOW64\acektj.exeC:\Windows\system32\acektj.exe 1532 "C:\Windows\SysWOW64\qspagg.exe"101⤵PID:4172
-
C:\Windows\SysWOW64\omlnwj.exeC:\Windows\system32\omlnwj.exe 1540 "C:\Windows\SysWOW64\acektj.exe"102⤵PID:4980
-
C:\Windows\SysWOW64\xoaxrm.exeC:\Windows\system32\xoaxrm.exe 1076 "C:\Windows\SysWOW64\omlnwj.exe"103⤵PID:4580
-
C:\Windows\SysWOW64\lbknxh.exeC:\Windows\system32\lbknxh.exe 1544 "C:\Windows\SysWOW64\xoaxrm.exe"104⤵PID:4140
-
C:\Windows\SysWOW64\yobddl.exeC:\Windows\system32\yobddl.exe 1548 "C:\Windows\SysWOW64\lbknxh.exe"105⤵
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\lbtaip.exeC:\Windows\system32\lbtaip.exe 1552 "C:\Windows\SysWOW64\yobddl.exe"106⤵PID:3048
-
C:\Windows\SysWOW64\yandrx.exeC:\Windows\system32\yandrx.exe 1556 "C:\Windows\SysWOW64\lbtaip.exe"107⤵PID:4428
-
C:\Windows\SysWOW64\lnftxt.exeC:\Windows\system32\lnftxt.exe 1536 "C:\Windows\SysWOW64\yandrx.exe"108⤵PID:2472
-
C:\Windows\SysWOW64\vxudsw.exeC:\Windows\system32\vxudsw.exe 1564 "C:\Windows\SysWOW64\lnftxt.exe"109⤵PID:2972
-
C:\Windows\SysWOW64\izbgvw.exeC:\Windows\system32\izbgvw.exe 1560 "C:\Windows\SysWOW64\vxudsw.exe"110⤵PID:4524
-
C:\Windows\SysWOW64\vxwjee.exeC:\Windows\system32\vxwjee.exe 1576 "C:\Windows\SysWOW64\izbgvw.exe"111⤵PID:3636
-
C:\Windows\SysWOW64\fxagod.exeC:\Windows\system32\fxagod.exe 1568 "C:\Windows\SysWOW64\vxwjee.exe"112⤵
- Drops file in System32 directory
PID:2228 -
C:\Windows\SysWOW64\svcjxd.exeC:\Windows\system32\svcjxd.exe 1580 "C:\Windows\SysWOW64\fxagod.exe"113⤵
- Drops file in System32 directory
PID:3536 -
C:\Windows\SysWOW64\fimych.exeC:\Windows\system32\fimych.exe 1572 "C:\Windows\SysWOW64\svcjxd.exe"114⤵PID:2368
-
C:\Windows\SysWOW64\tveoil.exeC:\Windows\system32\tveoil.exe 1588 "C:\Windows\SysWOW64\fimych.exe"115⤵PID:3784
-
C:\Windows\SysWOW64\givmoo.exeC:\Windows\system32\givmoo.exe 1584 "C:\Windows\SysWOW64\tveoil.exe"116⤵PID:2452
-
C:\Windows\SysWOW64\qtkwjs.exeC:\Windows\system32\qtkwjs.exe 1600 "C:\Windows\SysWOW64\givmoo.exe"117⤵PID:5060
-
C:\Windows\SysWOW64\dgumpn.exeC:\Windows\system32\dgumpn.exe 1032 "C:\Windows\SysWOW64\qtkwjs.exe"118⤵PID:3240
-
C:\Windows\SysWOW64\qtmcvr.exeC:\Windows\system32\qtmcvr.exe 1604 "C:\Windows\SysWOW64\dgumpn.exe"119⤵PID:952
-
C:\Windows\SysWOW64\dgdrbv.exeC:\Windows\system32\dgdrbv.exe 1596 "C:\Windows\SysWOW64\qtmcvr.exe"120⤵
- Drops file in System32 directory
PID:2716 -
C:\Windows\SysWOW64\nfhplu.exeC:\Windows\system32\nfhplu.exe 1608 "C:\Windows\SysWOW64\dgdrbv.exe"121⤵
- Drops file in System32 directory
PID:228 -
C:\Windows\SysWOW64\adcsuu.exeC:\Windows\system32\adcsuu.exe 1612 "C:\Windows\SysWOW64\nfhplu.exe"122⤵PID:2840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-