Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe
Resource
win10v2004-20220812-en
General
-
Target
6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe
-
Size
92KB
-
MD5
a2b600e42cd00888208dfb28faa2ecf0
-
SHA1
67fb74581582d18dcde4a6201dc163d540dbd945
-
SHA256
6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d
-
SHA512
7112c57435b25f30de54669c560778c95c35a025c14715e46b03e1dad48fcd2a9b68a4c891a1b9fb162e2d8b07914819983e942e6d7a29f9d4c381b2b7cf6b78
-
SSDEEP
1536:VBAIaHrKZMLzHfa2NdNlzB8i3jLV3BGnMPJKEsztuJO:0IUrKZoi2NDXjjLlBRh1sN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glhajbam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doclem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enooghaa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enmoqlfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcnqdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hljnob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfoldf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcnikh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Memnba32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfgmqhal.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmaembii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eadafkbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcqmjbno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmfmcmnp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dekhmgla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnkfli32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbdhfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlabiink.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohjlbmdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikgdjgda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbqnlebb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eliecd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbhffiog.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddbaccof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhepcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkeedccp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obhjog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnnjkcmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amonbdkm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gigihgdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbiaapeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfodkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eldlhefi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbbkpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Poimjfho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dadeghpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phlhhm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Paemqbie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjedbban.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fipbghkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibfpqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oggipl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjdfebbj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Memnba32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nglglg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpibhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hleacffk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fognoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnadkoef.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfhmlleh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oefmhcni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfhflf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgcjeolg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehpfhehh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfkeqo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iebogk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkhccgdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phabclnp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajhhgg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgcjeolg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgegkn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iepbakki.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiknbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkjpigbg.exe -
Executes dropped EXE 64 IoCs
pid Process 1388 Icicqeii.exe 2008 Iejlbpfj.exe 668 Ikgdjgda.exe 468 Jdoicmka.exe 1872 Jngnlb32.exe 520 Jkknef32.exe 1756 Jdcbol32.exe 1820 Jahchp32.exe 2040 Jnndmakj.exe 776 Jjedbban.exe 764 Kcnikh32.exe 2036 Kmfmcmnp.exe 1980 Khmnhndc.exe 1720 Kbebad32.exe 1924 Kmkgom32.exe 1536 Kiagcn32.exe 432 Kiddim32.exe 388 Lblibcdl.exe 960 Lkdmkhkm.exe 1668 Lgknpi32.exe 1408 Lcboej32.exe 1072 Lpiojkli.exe 2016 Lcghpj32.exe 992 Micqhqpg.exe 1784 Mnpipgno.exe 888 Mifmnpnd.exe 580 Mnbffgll.exe 1688 Memnba32.exe 1684 Mlffok32.exe 1132 Mbqnlebb.exe 796 Meokhabf.exe 1700 Mjlcqhpm.exe 1148 Mafkmb32.exe 1156 Mhpcjl32.exe 1816 Nahhbaeg.exe 1416 Nkqmlg32.exe 1488 Nmoihb32.exe 680 Nfgmqhal.exe 576 Nmaembii.exe 1444 Ndknjl32.exe 1292 Neljadfd.exe 856 Nlfbno32.exe 1176 Nglglg32.exe 1708 Nhmccp32.exe 1944 Nogkpjkb.exe 1324 Oeacmd32.exe 588 Ohppip32.exe 644 Ooiheiio.exe 2032 Odfqnqgg.exe 1528 Okpijjoc.exe 1596 Oefmhcni.exe 1208 Oggipl32.exe 1588 Onaaleld.exe 1920 Ogifek32.exe 1084 Ojjogfof.exe 1120 Pjmllfmc.exe 984 Pfcmagcg.exe 2020 Ppiaopbn.exe 836 Pjaege32.exe 1552 Pfhflf32.exe 1480 Pclffj32.exe 832 Qobgkkcp.exe 2024 Qhklcajq.exe 1948 Qqfphcgl.exe -
Loads dropped DLL 64 IoCs
pid Process 1048 6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe 1048 6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe 1388 Icicqeii.exe 1388 Icicqeii.exe 2008 Iejlbpfj.exe 2008 Iejlbpfj.exe 668 Ikgdjgda.exe 668 Ikgdjgda.exe 468 Jdoicmka.exe 468 Jdoicmka.exe 1872 Jngnlb32.exe 1872 Jngnlb32.exe 520 Jkknef32.exe 520 Jkknef32.exe 1756 Jdcbol32.exe 1756 Jdcbol32.exe 1820 Jahchp32.exe 1820 Jahchp32.exe 2040 Jnndmakj.exe 2040 Jnndmakj.exe 776 Jjedbban.exe 776 Jjedbban.exe 764 Kcnikh32.exe 764 Kcnikh32.exe 2036 Kmfmcmnp.exe 2036 Kmfmcmnp.exe 1980 Khmnhndc.exe 1980 Khmnhndc.exe 1720 Kbebad32.exe 1720 Kbebad32.exe 1924 Kmkgom32.exe 1924 Kmkgom32.exe 1536 Kiagcn32.exe 1536 Kiagcn32.exe 432 Kiddim32.exe 432 Kiddim32.exe 388 Lblibcdl.exe 388 Lblibcdl.exe 960 Lkdmkhkm.exe 960 Lkdmkhkm.exe 1668 Lgknpi32.exe 1668 Lgknpi32.exe 1408 Lcboej32.exe 1408 Lcboej32.exe 1072 Lpiojkli.exe 1072 Lpiojkli.exe 2016 Lcghpj32.exe 2016 Lcghpj32.exe 992 Micqhqpg.exe 992 Micqhqpg.exe 1784 Mnpipgno.exe 1784 Mnpipgno.exe 888 Mifmnpnd.exe 888 Mifmnpnd.exe 580 Mnbffgll.exe 580 Mnbffgll.exe 1688 Memnba32.exe 1688 Memnba32.exe 1684 Mlffok32.exe 1684 Mlffok32.exe 1132 Mbqnlebb.exe 1132 Mbqnlebb.exe 796 Meokhabf.exe 796 Meokhabf.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ogioke32.exe Ooagig32.exe File created C:\Windows\SysWOW64\Onoammlc.dll Kmfmcmnp.exe File created C:\Windows\SysWOW64\Kbebad32.exe Khmnhndc.exe File opened for modification C:\Windows\SysWOW64\Cpnodqnj.exe Cbjokl32.exe File created C:\Windows\SysWOW64\Odpanlgd.dll Enmoqlfp.exe File created C:\Windows\SysWOW64\Hlokba32.dll Fjflkmja.exe File created C:\Windows\SysWOW64\Lmcfbkob.exe Ibfpqo32.exe File created C:\Windows\SysWOW64\Fkjaoogc.dll Odcmnjen.exe File opened for modification C:\Windows\SysWOW64\Ikgdjgda.exe Iejlbpfj.exe File opened for modification C:\Windows\SysWOW64\Lgknpi32.exe Lkdmkhkm.exe File opened for modification C:\Windows\SysWOW64\Bamcgfco.exe Bjcjkl32.exe File created C:\Windows\SysWOW64\Ghndljib.dll Lbpokami.exe File created C:\Windows\SysWOW64\Ldpmaijf.dll Nabdlo32.exe File created C:\Windows\SysWOW64\Nahhbaeg.exe Mhpcjl32.exe File created C:\Windows\SysWOW64\Gmphcfog.exe Gffpfl32.exe File opened for modification C:\Windows\SysWOW64\Phlhhm32.exe Penlla32.exe File created C:\Windows\SysWOW64\Bgdnhlcd.dll Ellbid32.exe File created C:\Windows\SysWOW64\Lbdhfa32.exe Loflje32.exe File created C:\Windows\SysWOW64\Idoohd32.dll Ajoeai32.exe File opened for modification C:\Windows\SysWOW64\Daolli32.exe Cpnodqnj.exe File created C:\Windows\SysWOW64\Higdamjc.dll Daahah32.exe File created C:\Windows\SysWOW64\Ooncfkml.dll Hfhikohc.exe File opened for modification C:\Windows\SysWOW64\Enooghaa.exe Dgegkn32.exe File opened for modification C:\Windows\SysWOW64\Gbomam32.exe Gkeedccp.exe File opened for modification C:\Windows\SysWOW64\Iljkne32.exe Iiknbj32.exe File created C:\Windows\SysWOW64\Mokeem32.dll Loabofne.exe File created C:\Windows\SysWOW64\Lbpokami.exe Loabofne.exe File created C:\Windows\SysWOW64\Jlfjcchi.dll Mbqnlebb.exe File created C:\Windows\SysWOW64\Ajhhgg32.exe Apbcjo32.exe File opened for modification C:\Windows\SysWOW64\Bdkodabc.exe Bamcgfco.exe File opened for modification C:\Windows\SysWOW64\Cncpfj32.exe Bflhel32.exe File created C:\Windows\SysWOW64\Fanjki32.dll Gbkdfnoa.exe File created C:\Windows\SysWOW64\Lkjdbfbc.dll Glhajbam.exe File created C:\Windows\SysWOW64\Leoqpibc.dll Hnhkkn32.exe File opened for modification C:\Windows\SysWOW64\Lbbkpa32.exe Lkhccgdj.exe File created C:\Windows\SysWOW64\Nlabiink.exe Nibfmnog.exe File opened for modification C:\Windows\SysWOW64\Nhhcnj32.exe Niebbmmd.exe File opened for modification C:\Windows\SysWOW64\Meokhabf.exe Mbqnlebb.exe File created C:\Windows\SysWOW64\Ddfodp32.dll Cimagg32.exe File opened for modification C:\Windows\SysWOW64\Gbkdfnoa.exe Gkqlic32.exe File created C:\Windows\SysWOW64\Hgdgfo32.dll 6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe File created C:\Windows\SysWOW64\Mafkmb32.exe Mjlcqhpm.exe File created C:\Windows\SysWOW64\Mqpmap32.dll Pclffj32.exe File created C:\Windows\SysWOW64\Ieahcndg.dll Cncpfj32.exe File created C:\Windows\SysWOW64\Cdebjpkh.exe Clnjibjf.exe File created C:\Windows\SysWOW64\Lapdaj32.dll Elginddg.exe File opened for modification C:\Windows\SysWOW64\Fcqmjbno.exe Fmgemh32.exe File created C:\Windows\SysWOW64\Kemedi32.dll Gigihgdl.exe File opened for modification C:\Windows\SysWOW64\Ogfbee32.exe Obkfdfhc.exe File opened for modification C:\Windows\SysWOW64\Pdhbhm32.exe Pnnjkcmg.exe File created C:\Windows\SysWOW64\Mnbffgll.exe Mifmnpnd.exe File opened for modification C:\Windows\SysWOW64\Mnbffgll.exe Mifmnpnd.exe File created C:\Windows\SysWOW64\Lkhccgdj.exe Liiggl32.exe File created C:\Windows\SysWOW64\Ehpfhehh.exe Ebfnlk32.exe File created C:\Windows\SysWOW64\Mlffok32.exe Memnba32.exe File created C:\Windows\SysWOW64\Pocdlcff.dll Mjlcqhpm.exe File created C:\Windows\SysWOW64\Mlmfob32.dll Nogkpjkb.exe File created C:\Windows\SysWOW64\Kfpqnnne.dll Okpijjoc.exe File created C:\Windows\SysWOW64\Obljmbkg.dll Bfohli32.exe File created C:\Windows\SysWOW64\Kndqpl32.dll Dhlqnb32.exe File created C:\Windows\SysWOW64\Gfqhekoe.dll Eldlhefi.exe File created C:\Windows\SysWOW64\Fcqmjbno.exe Fmgemh32.exe File created C:\Windows\SysWOW64\Cclfjdbg.dll Mcadig32.exe File created C:\Windows\SysWOW64\Emhmeo32.dll Mjklfala.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkeiep32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbdhfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Olanhlaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Befbbe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmaembii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aqimnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpckci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Niebbmmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnhmcb32.dll" Jnndmakj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkdolnfi.dll" Nfgmqhal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qncnoi32.dll" Bamcgfco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgcjeolg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ammgak32.dll" Fbmdljjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ooelid32.dll" Fcqmjbno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfhikohc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcghpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mnpipgno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbqnlebb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjlcqhpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nppleidl.dll" Ajhhgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnkfgcab.dll" Enooghaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibafeple.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbpokami.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkknef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgcmcgei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bakaiklj.dll" Eghdpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgdnhlcd.dll" Ellbid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfflepjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Loabofne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnnojd32.dll" Obkfdfhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Micqhqpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdkodabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daahah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Diafaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Floaip32.dll" Eochdpem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmcfbkob.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgfjigcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Necjjj32.dll" Olanhlaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajoeai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agkkbm32.dll" Lbbkpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbnpceph.dll" Omlagp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eafqfk32.dll" Ogioke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ognnogfi.dll" Fqdncfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qcanhn32.dll" Ogifek32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amonbdkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgjginaf.dll" Bbhffiog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Diojgdki.dll" Dgegkn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efomgj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nglglg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bflhel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbfdkqga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Poimjfho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qqfphcgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elacff32.dll" Agbejmmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fiihphkb.dll" Bjcjkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eklfoaio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fqdncfmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fognoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlmpjldc.dll" Gbhgpnad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkpoagll.dll" Gbomam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmlledio.dll" Jkknef32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bflhel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkclpp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcnqdb32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1388 1048 6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe 27 PID 1048 wrote to memory of 1388 1048 6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe 27 PID 1048 wrote to memory of 1388 1048 6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe 27 PID 1048 wrote to memory of 1388 1048 6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe 27 PID 1388 wrote to memory of 2008 1388 Icicqeii.exe 28 PID 1388 wrote to memory of 2008 1388 Icicqeii.exe 28 PID 1388 wrote to memory of 2008 1388 Icicqeii.exe 28 PID 1388 wrote to memory of 2008 1388 Icicqeii.exe 28 PID 2008 wrote to memory of 668 2008 Iejlbpfj.exe 29 PID 2008 wrote to memory of 668 2008 Iejlbpfj.exe 29 PID 2008 wrote to memory of 668 2008 Iejlbpfj.exe 29 PID 2008 wrote to memory of 668 2008 Iejlbpfj.exe 29 PID 668 wrote to memory of 468 668 Ikgdjgda.exe 30 PID 668 wrote to memory of 468 668 Ikgdjgda.exe 30 PID 668 wrote to memory of 468 668 Ikgdjgda.exe 30 PID 668 wrote to memory of 468 668 Ikgdjgda.exe 30 PID 468 wrote to memory of 1872 468 Jdoicmka.exe 31 PID 468 wrote to memory of 1872 468 Jdoicmka.exe 31 PID 468 wrote to memory of 1872 468 Jdoicmka.exe 31 PID 468 wrote to memory of 1872 468 Jdoicmka.exe 31 PID 1872 wrote to memory of 520 1872 Jngnlb32.exe 32 PID 1872 wrote to memory of 520 1872 Jngnlb32.exe 32 PID 1872 wrote to memory of 520 1872 Jngnlb32.exe 32 PID 1872 wrote to memory of 520 1872 Jngnlb32.exe 32 PID 520 wrote to memory of 1756 520 Jkknef32.exe 33 PID 520 wrote to memory of 1756 520 Jkknef32.exe 33 PID 520 wrote to memory of 1756 520 Jkknef32.exe 33 PID 520 wrote to memory of 1756 520 Jkknef32.exe 33 PID 1756 wrote to memory of 1820 1756 Jdcbol32.exe 34 PID 1756 wrote to memory of 1820 1756 Jdcbol32.exe 34 PID 1756 wrote to memory of 1820 1756 Jdcbol32.exe 34 PID 1756 wrote to memory of 1820 1756 Jdcbol32.exe 34 PID 1820 wrote to memory of 2040 1820 Jahchp32.exe 35 PID 1820 wrote to memory of 2040 1820 Jahchp32.exe 35 PID 1820 wrote to memory of 2040 1820 Jahchp32.exe 35 PID 1820 wrote to memory of 2040 1820 Jahchp32.exe 35 PID 2040 wrote to memory of 776 2040 Jnndmakj.exe 36 PID 2040 wrote to memory of 776 2040 Jnndmakj.exe 36 PID 2040 wrote to memory of 776 2040 Jnndmakj.exe 36 PID 2040 wrote to memory of 776 2040 Jnndmakj.exe 36 PID 776 wrote to memory of 764 776 Jjedbban.exe 37 PID 776 wrote to memory of 764 776 Jjedbban.exe 37 PID 776 wrote to memory of 764 776 Jjedbban.exe 37 PID 776 wrote to memory of 764 776 Jjedbban.exe 37 PID 764 wrote to memory of 2036 764 Kcnikh32.exe 38 PID 764 wrote to memory of 2036 764 Kcnikh32.exe 38 PID 764 wrote to memory of 2036 764 Kcnikh32.exe 38 PID 764 wrote to memory of 2036 764 Kcnikh32.exe 38 PID 2036 wrote to memory of 1980 2036 Kmfmcmnp.exe 39 PID 2036 wrote to memory of 1980 2036 Kmfmcmnp.exe 39 PID 2036 wrote to memory of 1980 2036 Kmfmcmnp.exe 39 PID 2036 wrote to memory of 1980 2036 Kmfmcmnp.exe 39 PID 1980 wrote to memory of 1720 1980 Khmnhndc.exe 40 PID 1980 wrote to memory of 1720 1980 Khmnhndc.exe 40 PID 1980 wrote to memory of 1720 1980 Khmnhndc.exe 40 PID 1980 wrote to memory of 1720 1980 Khmnhndc.exe 40 PID 1720 wrote to memory of 1924 1720 Kbebad32.exe 41 PID 1720 wrote to memory of 1924 1720 Kbebad32.exe 41 PID 1720 wrote to memory of 1924 1720 Kbebad32.exe 41 PID 1720 wrote to memory of 1924 1720 Kbebad32.exe 41 PID 1924 wrote to memory of 1536 1924 Kmkgom32.exe 43 PID 1924 wrote to memory of 1536 1924 Kmkgom32.exe 43 PID 1924 wrote to memory of 1536 1924 Kmkgom32.exe 43 PID 1924 wrote to memory of 1536 1924 Kmkgom32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe"C:\Users\Admin\AppData\Local\Temp\6dbc0331d219ba4d600d668e64f4efee6e081efacf0874acb3acd3749ad99a1d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\Icicqeii.exeC:\Windows\system32\Icicqeii.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\Iejlbpfj.exeC:\Windows\system32\Iejlbpfj.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\Ikgdjgda.exeC:\Windows\system32\Ikgdjgda.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\Jdoicmka.exeC:\Windows\system32\Jdoicmka.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\Jngnlb32.exeC:\Windows\system32\Jngnlb32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\Jkknef32.exeC:\Windows\system32\Jkknef32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\Jdcbol32.exeC:\Windows\system32\Jdcbol32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\Jahchp32.exeC:\Windows\system32\Jahchp32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\Jnndmakj.exeC:\Windows\system32\Jnndmakj.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\Jjedbban.exeC:\Windows\system32\Jjedbban.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\Kcnikh32.exeC:\Windows\system32\Kcnikh32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\Kmfmcmnp.exeC:\Windows\system32\Kmfmcmnp.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\Khmnhndc.exeC:\Windows\system32\Khmnhndc.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\Kbebad32.exeC:\Windows\system32\Kbebad32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\Kmkgom32.exeC:\Windows\system32\Kmkgom32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\Kiagcn32.exeC:\Windows\system32\Kiagcn32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1536
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kiddim32.exeC:\Windows\system32\Kiddim32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:432 -
C:\Windows\SysWOW64\Lblibcdl.exeC:\Windows\system32\Lblibcdl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:388
-
-
C:\Windows\SysWOW64\Lkdmkhkm.exeC:\Windows\system32\Lkdmkhkm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:960 -
C:\Windows\SysWOW64\Lgknpi32.exeC:\Windows\system32\Lgknpi32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668 -
C:\Windows\SysWOW64\Lcboej32.exeC:\Windows\system32\Lcboej32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1408 -
C:\Windows\SysWOW64\Lpiojkli.exeC:\Windows\system32\Lpiojkli.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1072 -
C:\Windows\SysWOW64\Lcghpj32.exeC:\Windows\system32\Lcghpj32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\Micqhqpg.exeC:\Windows\system32\Micqhqpg.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:992 -
C:\Windows\SysWOW64\Mnpipgno.exeC:\Windows\system32\Mnpipgno.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1784 -
C:\Windows\SysWOW64\Mifmnpnd.exeC:\Windows\system32\Mifmnpnd.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:888 -
C:\Windows\SysWOW64\Mnbffgll.exeC:\Windows\system32\Mnbffgll.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:580 -
C:\Windows\SysWOW64\Memnba32.exeC:\Windows\system32\Memnba32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\Mlffok32.exeC:\Windows\system32\Mlffok32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Windows\SysWOW64\Mbqnlebb.exeC:\Windows\system32\Mbqnlebb.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1132 -
C:\Windows\SysWOW64\Meokhabf.exeC:\Windows\system32\Meokhabf.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:796 -
C:\Windows\SysWOW64\Mjlcqhpm.exeC:\Windows\system32\Mjlcqhpm.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1700 -
C:\Windows\SysWOW64\Mafkmb32.exeC:\Windows\system32\Mafkmb32.exe15⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\Mhpcjl32.exeC:\Windows\system32\Mhpcjl32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1156 -
C:\Windows\SysWOW64\Nahhbaeg.exeC:\Windows\system32\Nahhbaeg.exe17⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\Nkqmlg32.exeC:\Windows\system32\Nkqmlg32.exe18⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\Nmoihb32.exeC:\Windows\system32\Nmoihb32.exe19⤵
- Executes dropped EXE
PID:1488 -
C:\Windows\SysWOW64\Nfgmqhal.exeC:\Windows\system32\Nfgmqhal.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:680 -
C:\Windows\SysWOW64\Nmaembii.exeC:\Windows\system32\Nmaembii.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:576 -
C:\Windows\SysWOW64\Ndknjl32.exeC:\Windows\system32\Ndknjl32.exe22⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\Neljadfd.exeC:\Windows\system32\Neljadfd.exe23⤵
- Executes dropped EXE
PID:1292 -
C:\Windows\SysWOW64\Nlfbno32.exeC:\Windows\system32\Nlfbno32.exe24⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\Nglglg32.exeC:\Windows\system32\Nglglg32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1176 -
C:\Windows\SysWOW64\Nhmccp32.exeC:\Windows\system32\Nhmccp32.exe26⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SysWOW64\Nogkpjkb.exeC:\Windows\system32\Nogkpjkb.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\Oeacmd32.exeC:\Windows\system32\Oeacmd32.exe28⤵
- Executes dropped EXE
PID:1324 -
C:\Windows\SysWOW64\Ohppip32.exeC:\Windows\system32\Ohppip32.exe29⤵
- Executes dropped EXE
PID:588 -
C:\Windows\SysWOW64\Ooiheiio.exeC:\Windows\system32\Ooiheiio.exe30⤵
- Executes dropped EXE
PID:644 -
C:\Windows\SysWOW64\Odfqnqgg.exeC:\Windows\system32\Odfqnqgg.exe31⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\Okpijjoc.exeC:\Windows\system32\Okpijjoc.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1528 -
C:\Windows\SysWOW64\Oefmhcni.exeC:\Windows\system32\Oefmhcni.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\Oggipl32.exeC:\Windows\system32\Oggipl32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1208 -
C:\Windows\SysWOW64\Onaaleld.exeC:\Windows\system32\Onaaleld.exe35⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\Ogifek32.exeC:\Windows\system32\Ogifek32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:1920 -
C:\Windows\SysWOW64\Ojjogfof.exeC:\Windows\system32\Ojjogfof.exe37⤵
- Executes dropped EXE
PID:1084 -
C:\Windows\SysWOW64\Pjmllfmc.exeC:\Windows\system32\Pjmllfmc.exe38⤵
- Executes dropped EXE
PID:1120
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Pfcmagcg.exeC:\Windows\system32\Pfcmagcg.exe1⤵
- Executes dropped EXE
PID:984 -
C:\Windows\SysWOW64\Ppiaopbn.exeC:\Windows\system32\Ppiaopbn.exe2⤵
- Executes dropped EXE
PID:2020
-
-
C:\Windows\SysWOW64\Pjaege32.exeC:\Windows\system32\Pjaege32.exe1⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\Pfhflf32.exeC:\Windows\system32\Pfhflf32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\Pclffj32.exeC:\Windows\system32\Pclffj32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1480 -
C:\Windows\SysWOW64\Qobgkkcp.exeC:\Windows\system32\Qobgkkcp.exe4⤵
- Executes dropped EXE
PID:832 -
C:\Windows\SysWOW64\Qhklcajq.exeC:\Windows\system32\Qhklcajq.exe5⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\Qqfphcgl.exeC:\Windows\system32\Qqfphcgl.exe6⤵
- Executes dropped EXE
- Modifies registry class
PID:1948 -
C:\Windows\SysWOW64\Ajoeai32.exeC:\Windows\system32\Ajoeai32.exe7⤵
- Drops file in System32 directory
- Modifies registry class
PID:620 -
C:\Windows\SysWOW64\Aqimnc32.exeC:\Windows\system32\Aqimnc32.exe8⤵
- Modifies registry class
PID:568 -
C:\Windows\SysWOW64\Agbejmmf.exeC:\Windows\system32\Agbejmmf.exe9⤵
- Modifies registry class
PID:1792 -
C:\Windows\SysWOW64\Amonbdkm.exeC:\Windows\system32\Amonbdkm.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1492 -
C:\Windows\SysWOW64\Acifon32.exeC:\Windows\system32\Acifon32.exe11⤵PID:1524
-
C:\Windows\SysWOW64\Anojlg32.exeC:\Windows\system32\Anojlg32.exe12⤵PID:1076
-
C:\Windows\SysWOW64\Appgdohn.exeC:\Windows\system32\Appgdohn.exe13⤵PID:1124
-
C:\Windows\SysWOW64\Aihkmeno.exeC:\Windows\system32\Aihkmeno.exe14⤵PID:1724
-
C:\Windows\SysWOW64\Apbcjo32.exeC:\Windows\system32\Apbcjo32.exe15⤵
- Drops file in System32 directory
PID:1828 -
C:\Windows\SysWOW64\Ajhhgg32.exeC:\Windows\system32\Ajhhgg32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Amfdcc32.exeC:\Windows\system32\Amfdcc32.exe17⤵PID:1704
-
C:\Windows\SysWOW64\Bcplpm32.exeC:\Windows\system32\Bcplpm32.exe18⤵PID:768
-
C:\Windows\SysWOW64\Bfohli32.exeC:\Windows\system32\Bfohli32.exe19⤵
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\Blladp32.exeC:\Windows\system32\Blladp32.exe20⤵PID:1964
-
C:\Windows\SysWOW64\Bbeiajaj.exeC:\Windows\system32\Bbeiajaj.exe21⤵PID:2060
-
C:\Windows\SysWOW64\Bipand32.exeC:\Windows\system32\Bipand32.exe22⤵PID:2080
-
C:\Windows\SysWOW64\Bpijjnpc.exeC:\Windows\system32\Bpijjnpc.exe23⤵PID:2096
-
C:\Windows\SysWOW64\Bbhffiog.exeC:\Windows\system32\Bbhffiog.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Befbbe32.exeC:\Windows\system32\Befbbe32.exe25⤵
- Modifies registry class
PID:2136 -
C:\Windows\SysWOW64\Bjcjkl32.exeC:\Windows\system32\Bjcjkl32.exe26⤵
- Drops file in System32 directory
- Modifies registry class
PID:2164 -
C:\Windows\SysWOW64\Bamcgfco.exeC:\Windows\system32\Bamcgfco.exe27⤵
- Drops file in System32 directory
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\Bdkodabc.exeC:\Windows\system32\Bdkodabc.exe28⤵
- Modifies registry class
PID:2192 -
C:\Windows\SysWOW64\Bnacajbi.exeC:\Windows\system32\Bnacajbi.exe29⤵PID:2212
-
C:\Windows\SysWOW64\Bekknd32.exeC:\Windows\system32\Bekknd32.exe30⤵PID:2236
-
C:\Windows\SysWOW64\Bflhel32.exeC:\Windows\system32\Bflhel32.exe31⤵
- Drops file in System32 directory
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Cncpfj32.exeC:\Windows\system32\Cncpfj32.exe32⤵
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\Cpdlnbfd.exeC:\Windows\system32\Cpdlnbfd.exe33⤵PID:2272
-
C:\Windows\SysWOW64\Cfodkl32.exeC:\Windows\system32\Cfodkl32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2280 -
C:\Windows\SysWOW64\Cimagg32.exeC:\Windows\system32\Cimagg32.exe35⤵
- Drops file in System32 directory
PID:2288 -
C:\Windows\SysWOW64\Cdbedp32.exeC:\Windows\system32\Cdbedp32.exe36⤵PID:2296
-
C:\Windows\SysWOW64\Cfaaqllo.exeC:\Windows\system32\Cfaaqllo.exe37⤵PID:2304
-
C:\Windows\SysWOW64\Cjmmaj32.exeC:\Windows\system32\Cjmmaj32.exe38⤵PID:2312
-
C:\Windows\SysWOW64\Clnjibjf.exeC:\Windows\system32\Clnjibjf.exe39⤵
- Drops file in System32 directory
PID:2320 -
C:\Windows\SysWOW64\Cdebjpkh.exeC:\Windows\system32\Cdebjpkh.exe40⤵PID:2328
-
C:\Windows\SysWOW64\Cfcnfkjl.exeC:\Windows\system32\Cfcnfkjl.exe41⤵PID:2336
-
C:\Windows\SysWOW64\Ciajbgip.exeC:\Windows\system32\Ciajbgip.exe42⤵PID:2344
-
C:\Windows\SysWOW64\Cplboa32.exeC:\Windows\system32\Cplboa32.exe43⤵PID:2352
-
C:\Windows\SysWOW64\Cbjokl32.exeC:\Windows\system32\Cbjokl32.exe44⤵
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\Cpnodqnj.exeC:\Windows\system32\Cpnodqnj.exe45⤵
- Drops file in System32 directory
PID:2368 -
C:\Windows\SysWOW64\Daolli32.exeC:\Windows\system32\Daolli32.exe46⤵PID:2376
-
C:\Windows\SysWOW64\Dekhmgla.exeC:\Windows\system32\Dekhmgla.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2384 -
C:\Windows\SysWOW64\Dhidicle.exeC:\Windows\system32\Dhidicle.exe48⤵PID:2392
-
C:\Windows\SysWOW64\Doclem32.exeC:\Windows\system32\Doclem32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2400 -
C:\Windows\SysWOW64\Daahah32.exeC:\Windows\system32\Daahah32.exe50⤵
- Drops file in System32 directory
- Modifies registry class
PID:2408 -
C:\Windows\SysWOW64\Dhlqnb32.exeC:\Windows\system32\Dhlqnb32.exe51⤵
- Drops file in System32 directory
PID:2416 -
C:\Windows\SysWOW64\Dkjmjn32.exeC:\Windows\system32\Dkjmjn32.exe52⤵PID:2424
-
C:\Windows\SysWOW64\Dadeghpb.exeC:\Windows\system32\Dadeghpb.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2432 -
C:\Windows\SysWOW64\Ddbaccof.exeC:\Windows\system32\Ddbaccof.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2440 -
C:\Windows\SysWOW64\Dkljpn32.exeC:\Windows\system32\Dkljpn32.exe55⤵PID:2448
-
C:\Windows\SysWOW64\Dnkfli32.exeC:\Windows\system32\Dnkfli32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2456 -
C:\Windows\SysWOW64\Dpibhd32.exeC:\Windows\system32\Dpibhd32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2464 -
C:\Windows\SysWOW64\Dgcjeolg.exeC:\Windows\system32\Dgcjeolg.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2472 -
C:\Windows\SysWOW64\Diafaj32.exeC:\Windows\system32\Diafaj32.exe59⤵
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Daiobg32.exeC:\Windows\system32\Daiobg32.exe60⤵PID:2488
-
C:\Windows\SysWOW64\Dgegkn32.exeC:\Windows\system32\Dgegkn32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2496 -
C:\Windows\SysWOW64\Enooghaa.exeC:\Windows\system32\Enooghaa.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2504 -
C:\Windows\SysWOW64\Epnlcdqe.exeC:\Windows\system32\Epnlcdqe.exe63⤵PID:2512
-
C:\Windows\SysWOW64\Eghdpn32.exeC:\Windows\system32\Eghdpn32.exe64⤵
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Eldlhefi.exeC:\Windows\system32\Eldlhefi.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2528 -
C:\Windows\SysWOW64\Eochdpem.exeC:\Windows\system32\Eochdpem.exe66⤵
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\Ecodeo32.exeC:\Windows\system32\Ecodeo32.exe67⤵PID:2544
-
C:\Windows\SysWOW64\Elginddg.exeC:\Windows\system32\Elginddg.exe68⤵
- Drops file in System32 directory
PID:2552 -
C:\Windows\SysWOW64\Epbeoc32.exeC:\Windows\system32\Epbeoc32.exe69⤵PID:2560
-
C:\Windows\SysWOW64\Eadafkbn.exeC:\Windows\system32\Eadafkbn.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2568 -
C:\Windows\SysWOW64\Efomgj32.exeC:\Windows\system32\Efomgj32.exe71⤵
- Modifies registry class
PID:2576 -
C:\Windows\SysWOW64\Eliecd32.exeC:\Windows\system32\Eliecd32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2584 -
C:\Windows\SysWOW64\Eklfoaio.exeC:\Windows\system32\Eklfoaio.exe73⤵
- Modifies registry class
PID:2592 -
C:\Windows\SysWOW64\Ebfnlk32.exeC:\Windows\system32\Ebfnlk32.exe74⤵
- Drops file in System32 directory
PID:2600 -
C:\Windows\SysWOW64\Ehpfhehh.exeC:\Windows\system32\Ehpfhehh.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2608 -
C:\Windows\SysWOW64\Ellbid32.exeC:\Windows\system32\Ellbid32.exe76⤵
- Drops file in System32 directory
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\Enmoqlfp.exeC:\Windows\system32\Enmoqlfp.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2624 -
C:\Windows\SysWOW64\Efdgbigb.exeC:\Windows\system32\Efdgbigb.exe78⤵PID:2632
-
C:\Windows\SysWOW64\Fhbcnefe.exeC:\Windows\system32\Fhbcnefe.exe79⤵PID:2640
-
C:\Windows\SysWOW64\Fbkggjmf.exeC:\Windows\system32\Fbkggjmf.exe80⤵PID:2648
-
C:\Windows\SysWOW64\Fhepcd32.exeC:\Windows\system32\Fhepcd32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2656 -
C:\Windows\SysWOW64\Fkclpp32.exeC:\Windows\system32\Fkclpp32.exe82⤵
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Fjflkmja.exeC:\Windows\system32\Fjflkmja.exe83⤵
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\Fbmdljjc.exeC:\Windows\system32\Fbmdljjc.exe84⤵
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Fcnqdb32.exeC:\Windows\system32\Fcnqdb32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2692 -
C:\Windows\SysWOW64\Fkeiep32.exeC:\Windows\system32\Fkeiep32.exe86⤵
- Modifies registry class
PID:2700 -
C:\Windows\SysWOW64\Fmgemh32.exeC:\Windows\system32\Fmgemh32.exe87⤵
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\Fcqmjbno.exeC:\Windows\system32\Fcqmjbno.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2716 -
C:\Windows\SysWOW64\Fglijq32.exeC:\Windows\system32\Fglijq32.exe89⤵PID:2724
-
C:\Windows\SysWOW64\Fqdncfmi.exeC:\Windows\system32\Fqdncfmi.exe90⤵
- Modifies registry class
PID:2732 -
C:\Windows\SysWOW64\Fognoc32.exeC:\Windows\system32\Fognoc32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Fipbghkd.exeC:\Windows\system32\Fipbghkd.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2748 -
C:\Windows\SysWOW64\Fqgkif32.exeC:\Windows\system32\Fqgkif32.exe93⤵PID:2756
-
C:\Windows\SysWOW64\Gbhgpnad.exeC:\Windows\system32\Gbhgpnad.exe94⤵
- Modifies registry class
PID:2764 -
C:\Windows\SysWOW64\Gjooakaf.exeC:\Windows\system32\Gjooakaf.exe95⤵PID:2772
-
C:\Windows\SysWOW64\Gkqlic32.exeC:\Windows\system32\Gkqlic32.exe96⤵
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\Gbkdfnoa.exeC:\Windows\system32\Gbkdfnoa.exe97⤵
- Drops file in System32 directory
PID:2788 -
C:\Windows\SysWOW64\Gffpfl32.exeC:\Windows\system32\Gffpfl32.exe98⤵
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\Gmphcfog.exeC:\Windows\system32\Gmphcfog.exe99⤵PID:2804
-
C:\Windows\SysWOW64\Gkchoc32.exeC:\Windows\system32\Gkchoc32.exe100⤵PID:2812
-
C:\Windows\SysWOW64\Gnadkoef.exeC:\Windows\system32\Gnadkoef.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2820 -
C:\Windows\SysWOW64\Gfhmlleh.exeC:\Windows\system32\Gfhmlleh.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2828 -
C:\Windows\SysWOW64\Gigihgdl.exeC:\Windows\system32\Gigihgdl.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2836 -
C:\Windows\SysWOW64\Gkeedccp.exeC:\Windows\system32\Gkeedccp.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2844 -
C:\Windows\SysWOW64\Gbomam32.exeC:\Windows\system32\Gbomam32.exe105⤵
- Modifies registry class
PID:2852 -
C:\Windows\SysWOW64\Gglfid32.exeC:\Windows\system32\Gglfid32.exe106⤵PID:2860
-
C:\Windows\SysWOW64\Glhajbam.exeC:\Windows\system32\Glhajbam.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2868 -
C:\Windows\SysWOW64\Gbajfmij.exeC:\Windows\system32\Gbajfmij.exe108⤵PID:2876
-
C:\Windows\SysWOW64\Gccfne32.exeC:\Windows\system32\Gccfne32.exe109⤵PID:2884
-
C:\Windows\SysWOW64\Hljnob32.exeC:\Windows\system32\Hljnob32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2892 -
C:\Windows\SysWOW64\Hnhkkn32.exeC:\Windows\system32\Hnhkkn32.exe111⤵
- Drops file in System32 directory
PID:2900 -
C:\Windows\SysWOW64\Hebchhfk.exeC:\Windows\system32\Hebchhfk.exe112⤵PID:2908
-
C:\Windows\SysWOW64\Hfcopp32.exeC:\Windows\system32\Hfcopp32.exe113⤵PID:2916
-
C:\Windows\SysWOW64\Hnkgam32.exeC:\Windows\system32\Hnkgam32.exe114⤵PID:2924
-
C:\Windows\SysWOW64\Haicmi32.exeC:\Windows\system32\Haicmi32.exe115⤵PID:2932
-
C:\Windows\SysWOW64\Hcgpidkb.exeC:\Windows\system32\Hcgpidkb.exe116⤵PID:2940
-
C:\Windows\SysWOW64\Hfflepjf.exeC:\Windows\system32\Hfflepjf.exe117⤵
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\Hidhakij.exeC:\Windows\system32\Hidhakij.exe118⤵PID:2956
-
C:\Windows\SysWOW64\Hmpdbj32.exeC:\Windows\system32\Hmpdbj32.exe119⤵PID:2964
-
C:\Windows\SysWOW64\Hdjmodip.exeC:\Windows\system32\Hdjmodip.exe120⤵PID:2972
-
C:\Windows\SysWOW64\Hfhikohc.exeC:\Windows\system32\Hfhikohc.exe121⤵
- Drops file in System32 directory
- Modifies registry class
PID:2980 -
C:\Windows\SysWOW64\Hmbahi32.exeC:\Windows\system32\Hmbahi32.exe122⤵PID:2988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-