Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2.exe
Resource
win10v2004-20220812-en
General
-
Target
24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2.exe
-
Size
92KB
-
MD5
0c1ea0570289a5160d7c320e20ae8cb0
-
SHA1
1eaaab55c705d47fcc87867f53cfe686f0f341cc
-
SHA256
24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2
-
SHA512
e1b383767e3b366ed3a3f296ed52949f57b2eb371c4b99e005fb5ac2e389f498acce4896aed1c344ad02115012d51ce7f9dd1c63e27368a57c3480d15a999688
-
SSDEEP
1536:Vl4V0MwS9ri/kCHrNWcVrxQD4ZeQJ4l0UIpCCSJO5uAAAbUyW8zB8k3jLV3BGnM8:ZQskQrHeECCq/AAAbUz2/jLlBRh1sN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmfpif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmnkdg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enlkio32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdnbqgfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfnkjmpc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgogae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jihgcdof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhnamo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aphcldgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Commldoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdnbdcca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdbakd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnfnno32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjahnoao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jglgmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcgamh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgahhb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Heclkg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlnofdnn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idgenajb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iejnki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgchbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pojjabqn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eknomc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkilaj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llpgfb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmpdjjqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjohhfjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Liklda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgmiaqfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkpdqjok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abfphpgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Coafgc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hncfekac.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iacpff32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkhnbjhb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkldllfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecmikcfd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgndbh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmaoja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlbgfocn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obmddj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oibpehhp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppjepaaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohepkecb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hncfekac.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Molqamio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akoflm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ambkchoe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkjmbn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofadhhhj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfbhgf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jiomdchn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Konbai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpifaaan.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Memdjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bapfdlga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bapfdlga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmggimmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhcbeeel.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdodepod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njmfeiqm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcgamh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdgkfcjp.exe -
Executes dropped EXE 64 IoCs
pid Process 1744 Diocadjb.exe 948 Fhhelc32.exe 1712 Fngkjj32.exe 1204 Gcimnpcg.exe 1332 Gqojmd32.exe 464 Gcpcnomo.exe 1020 Heclkg32.exe 1836 Hgdembnk.exe 1696 Hnqjolce.exe 1372 Hncfekac.exe 1236 Ijjgjlgg.exe 1532 Iacpff32.exe 1108 Ibgidnbp.exe 972 Idgenajb.exe 1932 Iejnki32.exe 1252 Knobdmej.exe 1012 Ldijag32.exe 1880 Lgiccbjh.exe 1596 Ignjli32.exe 1620 Lmaacfkk.exe 1824 Lkhnbjhb.exe 1360 Ljmkcflj.exe 1488 Ldbppolp.exe 1540 Lgalljkd.exe 848 Mjohhfjg.exe 1436 Molqamio.exe 1732 Mgchbj32.exe 1276 Mjaene32.exe 2032 Mamibh32.exe 572 Mjdace32.exe 660 Mdnbdcca.exe 1152 Mldjepcc.exe 1408 Mbacngaj.exe 1524 Nkldllfh.exe 1264 Njaami32.exe 1164 Nmpmid32.exe 1128 Nclbkn32.exe 540 Nfjnhi32.exe 548 Okjcepkf.exe 1800 Ofadhhhj.exe 672 Opjianoj.exe 1928 Oakeif32.exe 1456 Onofbj32.exe 1952 Pmfpif32.exe 1168 Padhoe32.exe 564 Pbfegmbl.exe 760 Pmkidfbb.exe 976 Ppjepaaf.exe 1592 Pbhalmqi.exe 1616 Plqfebgj.exe 376 Poobanfn.exe 1948 Qdpddd32.exe 880 Agamfo32.exe 2004 Apiaod32.exe 616 Akoflm32.exe 276 Aainigkd.exe 1764 Agffanik.exe 1664 Aekcbknc.exe 1100 Ambkchoe.exe 920 Biilhi32.exe 1960 Bikinibg.exe 1304 Bccmgn32.exe 1344 Bhcbeeel.exe 1392 Bakgnj32.exe -
Loads dropped DLL 64 IoCs
pid Process 1992 24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2.exe 1992 24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2.exe 1744 Diocadjb.exe 1744 Diocadjb.exe 948 Fhhelc32.exe 948 Fhhelc32.exe 1712 Fngkjj32.exe 1712 Fngkjj32.exe 1204 Gcimnpcg.exe 1204 Gcimnpcg.exe 1332 Gqojmd32.exe 1332 Gqojmd32.exe 464 Gcpcnomo.exe 464 Gcpcnomo.exe 1020 Heclkg32.exe 1020 Heclkg32.exe 1836 Hgdembnk.exe 1836 Hgdembnk.exe 1696 Hnqjolce.exe 1696 Hnqjolce.exe 1372 Hncfekac.exe 1372 Hncfekac.exe 1236 Ijjgjlgg.exe 1236 Ijjgjlgg.exe 1532 Iacpff32.exe 1532 Iacpff32.exe 1108 Ibgidnbp.exe 1108 Ibgidnbp.exe 972 Idgenajb.exe 972 Idgenajb.exe 1932 Iejnki32.exe 1932 Iejnki32.exe 1252 Knobdmej.exe 1252 Knobdmej.exe 1012 Ldijag32.exe 1012 Ldijag32.exe 1880 Lgiccbjh.exe 1880 Lgiccbjh.exe 1596 Ignjli32.exe 1596 Ignjli32.exe 1620 Lmaacfkk.exe 1620 Lmaacfkk.exe 1824 Lkhnbjhb.exe 1824 Lkhnbjhb.exe 1360 Ljmkcflj.exe 1360 Ljmkcflj.exe 1488 Ldbppolp.exe 1488 Ldbppolp.exe 1540 Lgalljkd.exe 1540 Lgalljkd.exe 848 Mjohhfjg.exe 848 Mjohhfjg.exe 1436 Molqamio.exe 1436 Molqamio.exe 1732 Mgchbj32.exe 1732 Mgchbj32.exe 1276 Mjaene32.exe 1276 Mjaene32.exe 2032 Mamibh32.exe 2032 Mamibh32.exe 572 Mjdace32.exe 572 Mjdace32.exe 660 Mdnbdcca.exe 660 Mdnbdcca.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Abojhqmg.exe Qpnqffpf.exe File created C:\Windows\SysWOW64\Idgenajb.exe Ibgidnbp.exe File created C:\Windows\SysWOW64\Mjaene32.exe Mgchbj32.exe File created C:\Windows\SysWOW64\Jjchna32.dll Epamke32.exe File opened for modification C:\Windows\SysWOW64\Imlmccmg.exe Ioilgg32.exe File created C:\Windows\SysWOW64\Meajmpfd.dll Oibpehhp.exe File created C:\Windows\SysWOW64\Pbhalmqi.exe Ppjepaaf.exe File created C:\Windows\SysWOW64\Liklda32.exe Lflphf32.exe File created C:\Windows\SysWOW64\Odkqpf32.exe Obmddj32.exe File created C:\Windows\SysWOW64\Dgalebdb.dll Bdnbqgfe.exe File created C:\Windows\SysWOW64\Bkkgcqlp.exe Bccobckm.exe File created C:\Windows\SysWOW64\Nlnofdnn.exe Nojompod.exe File created C:\Windows\SysWOW64\Bdcllf32.exe Blldki32.exe File opened for modification C:\Windows\SysWOW64\Commldoo.exe Cnkpdl32.exe File created C:\Windows\SysWOW64\Ecmikcfd.exe Epamke32.exe File created C:\Windows\SysWOW64\Hlfjaiib.exe Gkpdqjok.exe File created C:\Windows\SysWOW64\Kdhndqem.exe Kcgamh32.exe File created C:\Windows\SysWOW64\Khdjeo32.exe Kdhndqem.exe File created C:\Windows\SysWOW64\Fbpipjig.dll Nccnho32.exe File created C:\Windows\SysWOW64\Padjjj32.exe Pnfnno32.exe File opened for modification C:\Windows\SysWOW64\Ljmkcflj.exe Lkhnbjhb.exe File created C:\Windows\SysWOW64\Bhcbeeel.exe Bccmgn32.exe File created C:\Windows\SysWOW64\Bbgidc32.dll Bccmgn32.exe File created C:\Windows\SysWOW64\Dfdkpg32.dll Dfdofp32.exe File opened for modification C:\Windows\SysWOW64\Lhnamo32.exe Kipaedgf.exe File created C:\Windows\SysWOW64\Nkldllfh.exe Mbacngaj.exe File opened for modification C:\Windows\SysWOW64\Joiifjih.exe Jlkljojd.exe File created C:\Windows\SysWOW64\Bnjffhhq.dll Lkihqm32.exe File opened for modification C:\Windows\SysWOW64\Niaodd32.exe Nfqfbi32.exe File created C:\Windows\SysWOW64\Iclpedof.dll Camenolp.exe File created C:\Windows\SysWOW64\Qjghcqcd.dll Mhlqfc32.exe File opened for modification C:\Windows\SysWOW64\Blldki32.exe Bkkgcqlp.exe File created C:\Windows\SysWOW64\Fhhelc32.exe Diocadjb.exe File created C:\Windows\SysWOW64\Ppjepaaf.exe Pmkidfbb.exe File created C:\Windows\SysWOW64\Joglaj32.exe Jlhpeo32.exe File created C:\Windows\SysWOW64\Niaodd32.exe Nfqfbi32.exe File created C:\Windows\SysWOW64\Memdjg32.exe Lbohnl32.exe File created C:\Windows\SysWOW64\Lbohnl32.exe Llpgfb32.exe File created C:\Windows\SysWOW64\Kpfaagdf.dll Padjjj32.exe File created C:\Windows\SysWOW64\Cnkpdl32.exe Bgahhb32.exe File opened for modification C:\Windows\SysWOW64\Hgdembnk.exe Heclkg32.exe File created C:\Windows\SysWOW64\Cjflbm32.exe Bakgnj32.exe File created C:\Windows\SysWOW64\Imoiic32.exe Imlmccmg.exe File created C:\Windows\SysWOW64\Jlfcoo32.exe Jihgcdof.exe File created C:\Windows\SysWOW64\Lcehcnia.dll Lflphf32.exe File created C:\Windows\SysWOW64\Nkikdh32.dll Oglibafg.exe File opened for modification C:\Windows\SysWOW64\Bmdjdm32.exe Bheeffcd.exe File opened for modification C:\Windows\SysWOW64\Bgmombei.exe Bdnbqgfe.exe File opened for modification C:\Windows\SysWOW64\Eknomc32.exe Egbcmdcm.exe File created C:\Windows\SysWOW64\Mplljf32.dll Jmepibel.exe File created C:\Windows\SysWOW64\Kdodepod.exe Kaahidpa.exe File opened for modification C:\Windows\SysWOW64\Mhbggb32.exe Mdgkfcjp.exe File created C:\Windows\SysWOW64\Gaecbe32.dll Odnmfegd.exe File created C:\Windows\SysWOW64\Mjqbgi32.exe Mngemh32.exe File created C:\Windows\SysWOW64\Jmfdkcdd.exe Jcifgoai.exe File opened for modification C:\Windows\SysWOW64\Nldlpeei.exe Mpnlkd32.exe File created C:\Windows\SysWOW64\Dcpmkb32.dll Djpkgoci.exe File created C:\Windows\SysWOW64\Dfgpao32.dll Empdijqj.exe File opened for modification C:\Windows\SysWOW64\Egbcmdcm.exe Dphkpk32.exe File created C:\Windows\SysWOW64\Gihedk32.dll Ielocb32.exe File opened for modification C:\Windows\SysWOW64\Jenghedj.exe Jglgmh32.exe File created C:\Windows\SysWOW64\Aplaem32.dll Bgmombei.exe File created C:\Windows\SysWOW64\Cgogae32.exe Cfnkjmpc.exe File created C:\Windows\SysWOW64\Obiedijg.dll Dkmpgd32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jcedgi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgbjlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkhldd32.dll" Mfjpbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlnofdnn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmdjdm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdcllf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gcimnpcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djpkgoci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgmjae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iajeibcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Clefah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjjain32.dll" Cgogae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkldllfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eojmapap.dll" Ambkchoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fajpki32.dll" Dphkpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ielocb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Faelkqdq.dll" Nlpkpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oeklod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omoophda.dll" Aebool32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijjgjlgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgiecq32.dll" Ldbppolp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obmfip32.dll" Nkldllfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfdofp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djpkgoci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmppombl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkilaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Biilhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjkemleb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dpenjknc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mohfhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Blmmaddp.dll" Chgnki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmnkdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efihaogj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kemeee32.dll" Konbai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdokeo32.dll" Bpecehli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohagkana.dll" Bgahhb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkihqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpefkq32.dll" Hncfekac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmkidfbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhcbeeel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjgpbj32.dll" Hfbhgf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihodkmop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Joglaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgbjlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kckhckaf.dll" Mpnlkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odnmfegd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpfaagdf.dll" Padjjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kejcgnke.dll" Qpnqffpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdcllf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkmpgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgobec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gcimnpcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knobdmej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjaene32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Opjianoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akoflm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjkemleb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cccjfalc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjchna32.dll" Epamke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogkcpeii.dll" Nijhcele.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlbgfocn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nojompod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cgdemapa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ignjli32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1744 1992 24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2.exe 28 PID 1992 wrote to memory of 1744 1992 24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2.exe 28 PID 1992 wrote to memory of 1744 1992 24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2.exe 28 PID 1992 wrote to memory of 1744 1992 24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2.exe 28 PID 1744 wrote to memory of 948 1744 Diocadjb.exe 29 PID 1744 wrote to memory of 948 1744 Diocadjb.exe 29 PID 1744 wrote to memory of 948 1744 Diocadjb.exe 29 PID 1744 wrote to memory of 948 1744 Diocadjb.exe 29 PID 948 wrote to memory of 1712 948 Fhhelc32.exe 30 PID 948 wrote to memory of 1712 948 Fhhelc32.exe 30 PID 948 wrote to memory of 1712 948 Fhhelc32.exe 30 PID 948 wrote to memory of 1712 948 Fhhelc32.exe 30 PID 1712 wrote to memory of 1204 1712 Fngkjj32.exe 31 PID 1712 wrote to memory of 1204 1712 Fngkjj32.exe 31 PID 1712 wrote to memory of 1204 1712 Fngkjj32.exe 31 PID 1712 wrote to memory of 1204 1712 Fngkjj32.exe 31 PID 1204 wrote to memory of 1332 1204 Gcimnpcg.exe 32 PID 1204 wrote to memory of 1332 1204 Gcimnpcg.exe 32 PID 1204 wrote to memory of 1332 1204 Gcimnpcg.exe 32 PID 1204 wrote to memory of 1332 1204 Gcimnpcg.exe 32 PID 1332 wrote to memory of 464 1332 Gqojmd32.exe 33 PID 1332 wrote to memory of 464 1332 Gqojmd32.exe 33 PID 1332 wrote to memory of 464 1332 Gqojmd32.exe 33 PID 1332 wrote to memory of 464 1332 Gqojmd32.exe 33 PID 464 wrote to memory of 1020 464 Gcpcnomo.exe 34 PID 464 wrote to memory of 1020 464 Gcpcnomo.exe 34 PID 464 wrote to memory of 1020 464 Gcpcnomo.exe 34 PID 464 wrote to memory of 1020 464 Gcpcnomo.exe 34 PID 1020 wrote to memory of 1836 1020 Heclkg32.exe 35 PID 1020 wrote to memory of 1836 1020 Heclkg32.exe 35 PID 1020 wrote to memory of 1836 1020 Heclkg32.exe 35 PID 1020 wrote to memory of 1836 1020 Heclkg32.exe 35 PID 1836 wrote to memory of 1696 1836 Hgdembnk.exe 36 PID 1836 wrote to memory of 1696 1836 Hgdembnk.exe 36 PID 1836 wrote to memory of 1696 1836 Hgdembnk.exe 36 PID 1836 wrote to memory of 1696 1836 Hgdembnk.exe 36 PID 1696 wrote to memory of 1372 1696 Hnqjolce.exe 37 PID 1696 wrote to memory of 1372 1696 Hnqjolce.exe 37 PID 1696 wrote to memory of 1372 1696 Hnqjolce.exe 37 PID 1696 wrote to memory of 1372 1696 Hnqjolce.exe 37 PID 1372 wrote to memory of 1236 1372 Hncfekac.exe 38 PID 1372 wrote to memory of 1236 1372 Hncfekac.exe 38 PID 1372 wrote to memory of 1236 1372 Hncfekac.exe 38 PID 1372 wrote to memory of 1236 1372 Hncfekac.exe 38 PID 1236 wrote to memory of 1532 1236 Ijjgjlgg.exe 39 PID 1236 wrote to memory of 1532 1236 Ijjgjlgg.exe 39 PID 1236 wrote to memory of 1532 1236 Ijjgjlgg.exe 39 PID 1236 wrote to memory of 1532 1236 Ijjgjlgg.exe 39 PID 1532 wrote to memory of 1108 1532 Iacpff32.exe 40 PID 1532 wrote to memory of 1108 1532 Iacpff32.exe 40 PID 1532 wrote to memory of 1108 1532 Iacpff32.exe 40 PID 1532 wrote to memory of 1108 1532 Iacpff32.exe 40 PID 1108 wrote to memory of 972 1108 Ibgidnbp.exe 41 PID 1108 wrote to memory of 972 1108 Ibgidnbp.exe 41 PID 1108 wrote to memory of 972 1108 Ibgidnbp.exe 41 PID 1108 wrote to memory of 972 1108 Ibgidnbp.exe 41 PID 972 wrote to memory of 1932 972 Idgenajb.exe 42 PID 972 wrote to memory of 1932 972 Idgenajb.exe 42 PID 972 wrote to memory of 1932 972 Idgenajb.exe 42 PID 972 wrote to memory of 1932 972 Idgenajb.exe 42 PID 1932 wrote to memory of 1252 1932 Iejnki32.exe 43 PID 1932 wrote to memory of 1252 1932 Iejnki32.exe 43 PID 1932 wrote to memory of 1252 1932 Iejnki32.exe 43 PID 1932 wrote to memory of 1252 1932 Iejnki32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2.exe"C:\Users\Admin\AppData\Local\Temp\24085a3fb94ef37c61eb8fb52befc61b1ba37ffcf3428742dbf2ef1dd9864dd2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\Diocadjb.exeC:\Windows\system32\Diocadjb.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\Fhhelc32.exeC:\Windows\system32\Fhhelc32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\Fngkjj32.exeC:\Windows\system32\Fngkjj32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\Gcimnpcg.exeC:\Windows\system32\Gcimnpcg.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\Gqojmd32.exeC:\Windows\system32\Gqojmd32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\Gcpcnomo.exeC:\Windows\system32\Gcpcnomo.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\Heclkg32.exeC:\Windows\system32\Heclkg32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\Hgdembnk.exeC:\Windows\system32\Hgdembnk.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\Hnqjolce.exeC:\Windows\system32\Hnqjolce.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\Hncfekac.exeC:\Windows\system32\Hncfekac.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\Ijjgjlgg.exeC:\Windows\system32\Ijjgjlgg.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\Iacpff32.exeC:\Windows\system32\Iacpff32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\Ibgidnbp.exeC:\Windows\system32\Ibgidnbp.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\Idgenajb.exeC:\Windows\system32\Idgenajb.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\Iejnki32.exeC:\Windows\system32\Iejnki32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\Knobdmej.exeC:\Windows\system32\Knobdmej.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1252 -
C:\Windows\SysWOW64\Ldijag32.exeC:\Windows\system32\Ldijag32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012 -
C:\Windows\SysWOW64\Lgiccbjh.exeC:\Windows\system32\Lgiccbjh.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1880 -
C:\Windows\SysWOW64\Ignjli32.exeC:\Windows\system32\Ignjli32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Lmaacfkk.exeC:\Windows\system32\Lmaacfkk.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Windows\SysWOW64\Lkhnbjhb.exeC:\Windows\system32\Lkhnbjhb.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\Ljmkcflj.exeC:\Windows\system32\Ljmkcflj.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360 -
C:\Windows\SysWOW64\Ldbppolp.exeC:\Windows\system32\Ldbppolp.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1488 -
C:\Windows\SysWOW64\Lgalljkd.exeC:\Windows\system32\Lgalljkd.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1540 -
C:\Windows\SysWOW64\Mjohhfjg.exeC:\Windows\system32\Mjohhfjg.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:848 -
C:\Windows\SysWOW64\Molqamio.exeC:\Windows\system32\Molqamio.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1436 -
C:\Windows\SysWOW64\Mgchbj32.exeC:\Windows\system32\Mgchbj32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1732 -
C:\Windows\SysWOW64\Mjaene32.exeC:\Windows\system32\Mjaene32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1276 -
C:\Windows\SysWOW64\Mamibh32.exeC:\Windows\system32\Mamibh32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Windows\SysWOW64\Mjdace32.exeC:\Windows\system32\Mjdace32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:572 -
C:\Windows\SysWOW64\Mdnbdcca.exeC:\Windows\system32\Mdnbdcca.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:660 -
C:\Windows\SysWOW64\Mldjepcc.exeC:\Windows\system32\Mldjepcc.exe33⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\Mbacngaj.exeC:\Windows\system32\Mbacngaj.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1408 -
C:\Windows\SysWOW64\Nkldllfh.exeC:\Windows\system32\Nkldllfh.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1524 -
C:\Windows\SysWOW64\Njaami32.exeC:\Windows\system32\Njaami32.exe36⤵
- Executes dropped EXE
PID:1264 -
C:\Windows\SysWOW64\Nmpmid32.exeC:\Windows\system32\Nmpmid32.exe37⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\SysWOW64\Nclbkn32.exeC:\Windows\system32\Nclbkn32.exe38⤵
- Executes dropped EXE
PID:1128 -
C:\Windows\SysWOW64\Nfjnhi32.exeC:\Windows\system32\Nfjnhi32.exe39⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\Okjcepkf.exeC:\Windows\system32\Okjcepkf.exe40⤵
- Executes dropped EXE
PID:548 -
C:\Windows\SysWOW64\Ofadhhhj.exeC:\Windows\system32\Ofadhhhj.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\Opjianoj.exeC:\Windows\system32\Opjianoj.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:672 -
C:\Windows\SysWOW64\Oakeif32.exeC:\Windows\system32\Oakeif32.exe43⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\Onofbj32.exeC:\Windows\system32\Onofbj32.exe44⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\Pmfpif32.exeC:\Windows\system32\Pmfpif32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Padhoe32.exeC:\Windows\system32\Padhoe32.exe46⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\SysWOW64\Pbfegmbl.exeC:\Windows\system32\Pbfegmbl.exe47⤵
- Executes dropped EXE
PID:564 -
C:\Windows\SysWOW64\Pmkidfbb.exeC:\Windows\system32\Pmkidfbb.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:760 -
C:\Windows\SysWOW64\Ppjepaaf.exeC:\Windows\system32\Ppjepaaf.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:976 -
C:\Windows\SysWOW64\Pbhalmqi.exeC:\Windows\system32\Pbhalmqi.exe50⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\Plqfebgj.exeC:\Windows\system32\Plqfebgj.exe51⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Poobanfn.exeC:\Windows\system32\Poobanfn.exe52⤵
- Executes dropped EXE
PID:376 -
C:\Windows\SysWOW64\Qdpddd32.exeC:\Windows\system32\Qdpddd32.exe53⤵
- Executes dropped EXE
PID:1948 -
C:\Windows\SysWOW64\Agamfo32.exeC:\Windows\system32\Agamfo32.exe54⤵
- Executes dropped EXE
PID:880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Apiaod32.exeC:\Windows\system32\Apiaod32.exe1⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\Akoflm32.exeC:\Windows\system32\Akoflm32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:616 -
C:\Windows\SysWOW64\Aainigkd.exeC:\Windows\system32\Aainigkd.exe3⤵
- Executes dropped EXE
PID:276 -
C:\Windows\SysWOW64\Agffanik.exeC:\Windows\system32\Agffanik.exe4⤵
- Executes dropped EXE
PID:1764
-
-
-
-
C:\Windows\SysWOW64\Aekcbknc.exeC:\Windows\system32\Aekcbknc.exe1⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\Ambkchoe.exeC:\Windows\system32\Ambkchoe.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1100 -
C:\Windows\SysWOW64\Biilhi32.exeC:\Windows\system32\Biilhi32.exe3⤵
- Executes dropped EXE
- Modifies registry class
PID:920 -
C:\Windows\SysWOW64\Bikinibg.exeC:\Windows\system32\Bikinibg.exe4⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Bccmgn32.exeC:\Windows\system32\Bccmgn32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1304 -
C:\Windows\SysWOW64\Bhcbeeel.exeC:\Windows\system32\Bhcbeeel.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1344 -
C:\Windows\SysWOW64\Bakgnj32.exeC:\Windows\system32\Bakgnj32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1392 -
C:\Windows\SysWOW64\Cjflbm32.exeC:\Windows\system32\Cjflbm32.exe8⤵PID:860
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Cdlpoein.exeC:\Windows\system32\Cdlpoein.exe1⤵PID:1784
-
C:\Windows\SysWOW64\Ccopkb32.exeC:\Windows\system32\Ccopkb32.exe2⤵PID:980
-
C:\Windows\SysWOW64\Cqbqdf32.exeC:\Windows\system32\Cqbqdf32.exe3⤵PID:1492
-
C:\Windows\SysWOW64\Cgmiaqfo.exeC:\Windows\system32\Cgmiaqfo.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1716 -
C:\Windows\SysWOW64\Cjkemleb.exeC:\Windows\system32\Cjkemleb.exe5⤵
- Modifies registry class
PID:1396 -
C:\Windows\SysWOW64\Cmiaigdf.exeC:\Windows\system32\Cmiaigdf.exe6⤵PID:968
-
C:\Windows\SysWOW64\Cccjfalc.exeC:\Windows\system32\Cccjfalc.exe7⤵
- Modifies registry class
PID:680 -
C:\Windows\SysWOW64\Cfbfbmkg.exeC:\Windows\system32\Cfbfbmkg.exe8⤵PID:1512
-
C:\Windows\SysWOW64\Cipbnhjj.exeC:\Windows\system32\Cipbnhjj.exe9⤵PID:1648
-
C:\Windows\SysWOW64\Cjpohk32.exeC:\Windows\system32\Cjpohk32.exe10⤵PID:1644
-
C:\Windows\SysWOW64\Cmnkdg32.exeC:\Windows\system32\Cmnkdg32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\Dkchec32.exeC:\Windows\system32\Dkchec32.exe12⤵PID:2060
-
C:\Windows\SysWOW64\Dnadao32.exeC:\Windows\system32\Dnadao32.exe13⤵PID:2068
-
C:\Windows\SysWOW64\Dfilbl32.exeC:\Windows\system32\Dfilbl32.exe14⤵PID:2076
-
C:\Windows\SysWOW64\Dbpmhmjc.exeC:\Windows\system32\Dbpmhmjc.exe15⤵PID:2116
-
C:\Windows\SysWOW64\Denidh32.exeC:\Windows\system32\Denidh32.exe16⤵PID:2132
-
C:\Windows\SysWOW64\Diiedgap.exeC:\Windows\system32\Diiedgap.exe17⤵PID:2236
-
C:\Windows\SysWOW64\Depfih32.exeC:\Windows\system32\Depfih32.exe18⤵PID:2256
-
C:\Windows\SysWOW64\Dgobec32.exeC:\Windows\system32\Dgobec32.exe19⤵
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\Djmnao32.exeC:\Windows\system32\Djmnao32.exe20⤵PID:2372
-
C:\Windows\SysWOW64\Dfdofp32.exeC:\Windows\system32\Dfdofp32.exe21⤵
- Drops file in System32 directory
- Modifies registry class
PID:2392 -
C:\Windows\SysWOW64\Djpkgoci.exeC:\Windows\system32\Djpkgoci.exe22⤵
- Drops file in System32 directory
- Modifies registry class
PID:2400 -
C:\Windows\SysWOW64\Effllp32.exeC:\Windows\system32\Effllp32.exe23⤵PID:2408
-
C:\Windows\SysWOW64\Ejbgmnaf.exeC:\Windows\system32\Ejbgmnaf.exe24⤵PID:2416
-
C:\Windows\SysWOW64\Empdijqj.exeC:\Windows\system32\Empdijqj.exe25⤵
- Drops file in System32 directory
PID:2424 -
C:\Windows\SysWOW64\Ealpih32.exeC:\Windows\system32\Ealpih32.exe26⤵PID:2432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ecjled32.exeC:\Windows\system32\Ecjled32.exe1⤵PID:2440
-
C:\Windows\SysWOW64\Ebmlaqoa.exeC:\Windows\system32\Ebmlaqoa.exe2⤵PID:2448
-
C:\Windows\SysWOW64\Efihaogj.exeC:\Windows\system32\Efihaogj.exe3⤵
- Modifies registry class
PID:2456
-
-
-
C:\Windows\SysWOW64\Epamke32.exeC:\Windows\system32\Epamke32.exe1⤵
- Drops file in System32 directory
- Modifies registry class
PID:2464 -
C:\Windows\SysWOW64\Ecmikcfd.exeC:\Windows\system32\Ecmikcfd.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2624 -
C:\Windows\SysWOW64\Pjkddldi.exeC:\Windows\system32\Pjkddldi.exe3⤵PID:2632
-
C:\Windows\SysWOW64\Pojjabqn.exeC:\Windows\system32\Pojjabqn.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2640 -
C:\Windows\SysWOW64\Qmagqf32.exeC:\Windows\system32\Qmagqf32.exe5⤵PID:2668
-
C:\Windows\SysWOW64\Cmppombl.exeC:\Windows\system32\Cmppombl.exe6⤵
- Modifies registry class
PID:2676 -
C:\Windows\SysWOW64\Cjgmna32.exeC:\Windows\system32\Cjgmna32.exe7⤵PID:2684
-
C:\Windows\SysWOW64\Ciiminfm.exeC:\Windows\system32\Ciiminfm.exe8⤵PID:2692
-
C:\Windows\SysWOW64\Cmgfolld.exeC:\Windows\system32\Cmgfolld.exe9⤵PID:2716
-
C:\Windows\SysWOW64\Dgmjae32.exeC:\Windows\system32\Dgmjae32.exe10⤵
- Modifies registry class
PID:2724 -
C:\Windows\SysWOW64\Dpenjknc.exeC:\Windows\system32\Dpenjknc.exe11⤵
- Modifies registry class
PID:2732 -
C:\Windows\SysWOW64\Dhmflhoe.exeC:\Windows\system32\Dhmflhoe.exe12⤵PID:2740
-
C:\Windows\SysWOW64\Dinbcq32.exeC:\Windows\system32\Dinbcq32.exe13⤵PID:2748
-
C:\Windows\SysWOW64\Daekdnef.exeC:\Windows\system32\Daekdnef.exe14⤵PID:2756
-
C:\Windows\SysWOW64\Dphkpk32.exeC:\Windows\system32\Dphkpk32.exe15⤵
- Drops file in System32 directory
- Modifies registry class
PID:2764 -
C:\Windows\SysWOW64\Egbcmdcm.exeC:\Windows\system32\Egbcmdcm.exe16⤵
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\Eknomc32.exeC:\Windows\system32\Eknomc32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2780 -
C:\Windows\SysWOW64\Enlkio32.exeC:\Windows\system32\Enlkio32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2788 -
C:\Windows\SysWOW64\Fkbegfjl.exeC:\Windows\system32\Fkbegfjl.exe19⤵PID:2796
-
C:\Windows\SysWOW64\Gbecbdjm.exeC:\Windows\system32\Gbecbdjm.exe20⤵PID:2836
-
C:\Windows\SysWOW64\Gkmhkjam.exeC:\Windows\system32\Gkmhkjam.exe21⤵PID:2852
-
C:\Windows\SysWOW64\Gcdplgap.exeC:\Windows\system32\Gcdplgap.exe22⤵PID:2900
-
C:\Windows\SysWOW64\Gkpdqjok.exeC:\Windows\system32\Gkpdqjok.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2908 -
C:\Windows\SysWOW64\Hlfjaiib.exeC:\Windows\system32\Hlfjaiib.exe24⤵PID:2916
-
C:\Windows\SysWOW64\Hfbhgf32.exeC:\Windows\system32\Hfbhgf32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2924 -
C:\Windows\SysWOW64\Hdfiaj32.exeC:\Windows\system32\Hdfiaj32.exe26⤵PID:2932
-
C:\Windows\SysWOW64\Hblebggp.exeC:\Windows\system32\Hblebggp.exe27⤵PID:2940
-
C:\Windows\SysWOW64\Hejbnbfd.exeC:\Windows\system32\Hejbnbfd.exe28⤵PID:2948
-
C:\Windows\SysWOW64\Ielocb32.exeC:\Windows\system32\Ielocb32.exe29⤵
- Drops file in System32 directory
- Modifies registry class
PID:2956 -
C:\Windows\SysWOW64\Ihkkpm32.exeC:\Windows\system32\Ihkkpm32.exe30⤵PID:2964
-
C:\Windows\SysWOW64\Ilfgplkn.exeC:\Windows\system32\Ilfgplkn.exe31⤵PID:2972
-
C:\Windows\SysWOW64\Ihodkmop.exeC:\Windows\system32\Ihodkmop.exe32⤵
- Modifies registry class
PID:2980 -
C:\Windows\SysWOW64\Iknqghnc.exeC:\Windows\system32\Iknqghnc.exe33⤵PID:2988
-
C:\Windows\SysWOW64\Ioilgg32.exeC:\Windows\system32\Ioilgg32.exe34⤵
- Drops file in System32 directory
PID:2996 -
C:\Windows\SysWOW64\Imlmccmg.exeC:\Windows\system32\Imlmccmg.exe35⤵
- Drops file in System32 directory
PID:3004 -
C:\Windows\SysWOW64\Imoiic32.exeC:\Windows\system32\Imoiic32.exe36⤵PID:3012
-
C:\Windows\SysWOW64\Iajeibcm.exeC:\Windows\system32\Iajeibcm.exe37⤵
- Modifies registry class
PID:3020 -
C:\Windows\SysWOW64\Jdhaemba.exeC:\Windows\system32\Jdhaemba.exe38⤵PID:3028
-
C:\Windows\SysWOW64\Jcnofj32.exeC:\Windows\system32\Jcnofj32.exe39⤵PID:3036
-
C:\Windows\SysWOW64\Jkefhg32.exeC:\Windows\system32\Jkefhg32.exe40⤵PID:3044
-
C:\Windows\SysWOW64\Jihgcdof.exeC:\Windows\system32\Jihgcdof.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3052 -
C:\Windows\SysWOW64\Jlfcoo32.exeC:\Windows\system32\Jlfcoo32.exe42⤵PID:3068
-
C:\Windows\SysWOW64\Jdmkqm32.exeC:\Windows\system32\Jdmkqm32.exe43⤵PID:2096
-
C:\Windows\SysWOW64\Jglgmh32.exeC:\Windows\system32\Jglgmh32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\Jenghedj.exeC:\Windows\system32\Jenghedj.exe45⤵PID:2148
-
C:\Windows\SysWOW64\Jmepibel.exeC:\Windows\system32\Jmepibel.exe46⤵
- Drops file in System32 directory
PID:2164 -
C:\Windows\SysWOW64\Jlhpeo32.exeC:\Windows\system32\Jlhpeo32.exe47⤵
- Drops file in System32 directory
PID:2188 -
C:\Windows\SysWOW64\Joglaj32.exeC:\Windows\system32\Joglaj32.exe48⤵
- Modifies registry class
PID:2204 -
C:\Windows\SysWOW64\Jgndbh32.exeC:\Windows\system32\Jgndbh32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2220 -
C:\Windows\SysWOW64\Jilpnc32.exeC:\Windows\system32\Jilpnc32.exe50⤵PID:2264
-
C:\Windows\SysWOW64\Jlkljojd.exeC:\Windows\system32\Jlkljojd.exe51⤵
- Drops file in System32 directory
PID:2292 -
C:\Windows\SysWOW64\Joiifjih.exeC:\Windows\system32\Joiifjih.exe52⤵PID:2312
-
C:\Windows\SysWOW64\Jcedgi32.exeC:\Windows\system32\Jcedgi32.exe53⤵
- Modifies registry class
PID:2328 -
C:\Windows\SysWOW64\Jiomdchn.exeC:\Windows\system32\Jiomdchn.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2344 -
C:\Windows\SysWOW64\Klmipnha.exeC:\Windows\system32\Klmipnha.exe55⤵PID:2360
-
C:\Windows\SysWOW64\Kkpilk32.exeC:\Windows\system32\Kkpilk32.exe56⤵PID:2384
-
C:\Windows\SysWOW64\Kcgamh32.exeC:\Windows\system32\Kcgamh32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Kdhndqem.exeC:\Windows\system32\Kdhndqem.exe58⤵
- Drops file in System32 directory
PID:2516 -
C:\Windows\SysWOW64\Khdjeo32.exeC:\Windows\system32\Khdjeo32.exe59⤵PID:2532
-
C:\Windows\SysWOW64\Konbai32.exeC:\Windows\system32\Konbai32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2548 -
C:\Windows\SysWOW64\Knqbmflm.exeC:\Windows\system32\Knqbmflm.exe61⤵PID:2576
-
C:\Windows\SysWOW64\Kkdcfjjg.exeC:\Windows\system32\Kkdcfjjg.exe62⤵PID:1832
-
C:\Windows\SysWOW64\Kjjphg32.exeC:\Windows\system32\Kjjphg32.exe63⤵PID:1828
-
C:\Windows\SysWOW64\Kaahidpa.exeC:\Windows\system32\Kaahidpa.exe64⤵
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\Kdodepod.exeC:\Windows\system32\Kdodepod.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:604 -
C:\Windows\SysWOW64\Kgnpaknh.exeC:\Windows\system32\Kgnpaknh.exe66⤵PID:1200
-
C:\Windows\SysWOW64\Kkilaj32.exeC:\Windows\system32\Kkilaj32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:432 -
C:\Windows\SysWOW64\Knhhne32.exeC:\Windows\system32\Knhhne32.exe68⤵PID:756
-
C:\Windows\SysWOW64\Kmjiiblp.exeC:\Windows\system32\Kmjiiblp.exe69⤵PID:2600
-
C:\Windows\SysWOW64\Lqhappbf.exeC:\Windows\system32\Lqhappbf.exe70⤵PID:972
-
C:\Windows\SysWOW64\Lgbjlj32.exeC:\Windows\system32\Lgbjlj32.exe71⤵
- Modifies registry class
PID:1932 -
C:\Windows\SysWOW64\Lonnqm32.exeC:\Windows\system32\Lonnqm32.exe72⤵PID:1252
-
C:\Windows\SysWOW64\Lmaoja32.exeC:\Windows\system32\Lmaoja32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1388 -
C:\Windows\SysWOW64\Lopkfl32.exeC:\Windows\system32\Lopkfl32.exe74⤵PID:1032
-
C:\Windows\SysWOW64\Lclggk32.exeC:\Windows\system32\Lclggk32.exe75⤵PID:1316
-
C:\Windows\SysWOW64\Lfjccf32.exeC:\Windows\system32\Lfjccf32.exe76⤵PID:1012
-
C:\Windows\SysWOW64\Lemcoccc.exeC:\Windows\system32\Lemcoccc.exe77⤵PID:2608
-
C:\Windows\SysWOW64\Lflphf32.exeC:\Windows\system32\Lflphf32.exe78⤵
- Drops file in System32 directory
PID:1880 -
C:\Windows\SysWOW64\Liklda32.exeC:\Windows\system32\Liklda32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1596 -
C:\Windows\SysWOW64\Lkihqm32.exeC:\Windows\system32\Lkihqm32.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:1620 -
C:\Windows\SysWOW64\Mngemh32.exeC:\Windows\system32\Mngemh32.exe81⤵
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\Mjqbgi32.exeC:\Windows\system32\Mjqbgi32.exe82⤵PID:1360
-
C:\Windows\SysWOW64\Mmoncd32.exeC:\Windows\system32\Mmoncd32.exe83⤵PID:1488
-
C:\Windows\SysWOW64\Makjdcco.exeC:\Windows\system32\Makjdcco.exe84⤵PID:1540
-
C:\Windows\SysWOW64\Mcigpo32.exeC:\Windows\system32\Mcigpo32.exe85⤵PID:848
-
C:\Windows\SysWOW64\Mfjpbj32.exeC:\Windows\system32\Mfjpbj32.exe86⤵
- Modifies registry class
PID:1436 -
C:\Windows\SysWOW64\Nijhcele.exeC:\Windows\system32\Nijhcele.exe87⤵
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\Nnjnakhi.exeC:\Windows\system32\Nnjnakhi.exe88⤵PID:1276
-
C:\Windows\SysWOW64\Nfqfbi32.exeC:\Windows\system32\Nfqfbi32.exe89⤵
- Drops file in System32 directory
PID:772 -
C:\Windows\SysWOW64\Niaodd32.exeC:\Windows\system32\Niaodd32.exe90⤵PID:364
-
C:\Windows\SysWOW64\Nlpkpo32.exeC:\Windows\system32\Nlpkpo32.exe91⤵
- Modifies registry class
PID:928 -
C:\Windows\SysWOW64\Njcklllk.exeC:\Windows\system32\Njcklllk.exe92⤵PID:820
-
C:\Windows\SysWOW64\Nlbgfocn.exeC:\Windows\system32\Nlbgfocn.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1704 -
C:\Windows\SysWOW64\Oeklod32.exeC:\Windows\system32\Oeklod32.exe94⤵
- Modifies registry class
PID:2068 -
C:\Windows\SysWOW64\Pnjfmi32.exeC:\Windows\system32\Pnjfmi32.exe95⤵PID:2612
-
C:\Windows\SysWOW64\Giolkc32.exeC:\Windows\system32\Giolkc32.exe96⤵PID:2392
-
C:\Windows\SysWOW64\Jcifgoai.exeC:\Windows\system32\Jcifgoai.exe97⤵
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\Jmfdkcdd.exeC:\Windows\system32\Jmfdkcdd.exe98⤵PID:2408
-
C:\Windows\SysWOW64\Kipaedgf.exeC:\Windows\system32\Kipaedgf.exe99⤵
- Drops file in System32 directory
PID:2436 -
C:\Windows\SysWOW64\Lhnamo32.exeC:\Windows\system32\Lhnamo32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2444 -
C:\Windows\SysWOW64\Lpifaaan.exeC:\Windows\system32\Lpifaaan.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2452 -
C:\Windows\SysWOW64\Llpgfb32.exeC:\Windows\system32\Llpgfb32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2460 -
C:\Windows\SysWOW64\Lbohnl32.exeC:\Windows\system32\Lbohnl32.exe103⤵
- Drops file in System32 directory
PID:1728 -
C:\Windows\SysWOW64\Memdjg32.exeC:\Windows\system32\Memdjg32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2648 -
C:\Windows\SysWOW64\Mhlqfc32.exeC:\Windows\system32\Mhlqfc32.exe105⤵
- Drops file in System32 directory
PID:2656 -
C:\Windows\SysWOW64\Mkjmbn32.exeC:\Windows\system32\Mkjmbn32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2700 -
C:\Windows\SysWOW64\Mdbakd32.exeC:\Windows\system32\Mdbakd32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2708 -
C:\Windows\SysWOW64\Mkljhnfb.exeC:\Windows\system32\Mkljhnfb.exe108⤵PID:1996
-
C:\Windows\SysWOW64\Mohfhm32.exeC:\Windows\system32\Mohfhm32.exe109⤵
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\Mdgkfcjp.exeC:\Windows\system32\Mdgkfcjp.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2812 -
C:\Windows\SysWOW64\Mhbggb32.exeC:\Windows\system32\Mhbggb32.exe111⤵PID:2820
-
C:\Windows\SysWOW64\Mnoooi32.exeC:\Windows\system32\Mnoooi32.exe112⤵PID:2828
-
C:\Windows\SysWOW64\Mpnlkd32.exeC:\Windows\system32\Mpnlkd32.exe113⤵
- Drops file in System32 directory
- Modifies registry class
PID:2844 -
C:\Windows\SysWOW64\Nldlpeei.exeC:\Windows\system32\Nldlpeei.exe114⤵PID:2860
-
C:\Windows\SysWOW64\Npbefclo.exeC:\Windows\system32\Npbefclo.exe115⤵PID:2868
-
C:\Windows\SysWOW64\Ncaabokc.exeC:\Windows\system32\Ncaabokc.exe116⤵PID:2876
-
C:\Windows\SysWOW64\Nglmcn32.exeC:\Windows\system32\Nglmcn32.exe117⤵PID:2892
-
C:\Windows\SysWOW64\Nccnho32.exeC:\Windows\system32\Nccnho32.exe118⤵
- Drops file in System32 directory
PID:2088 -
C:\Windows\SysWOW64\Njmfeiqm.exeC:\Windows\system32\Njmfeiqm.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2184 -
C:\Windows\SysWOW64\Nojompod.exeC:\Windows\system32\Nojompod.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:2320 -
C:\Windows\SysWOW64\Nlnofdnn.exeC:\Windows\system32\Nlnofdnn.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2336 -
C:\Windows\SysWOW64\Ohepkecb.exeC:\Windows\system32\Ohepkecb.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2352
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-