Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe
Resource
win10v2004-20220901-en
General
-
Target
1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe
-
Size
92KB
-
MD5
16034e94585422f3df3b2ed91a28e350
-
SHA1
d40e2f5229535f035e067cc13439ef704c49720f
-
SHA256
1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7
-
SHA512
c282ab1573cdc61ff6bf24fb0eac3c71b5fd1865786d38b3224a5871c74a27ea437056df4c71f1364e456026b66d1442e49264c9b2cfe4f914c986d866f13493
-
SSDEEP
1536:VmGp5y7k+jX6Wnaxv/LuQr05UFrEoc4lzBT3jLV3BGnMPJKEsztuJO:X2Rax3L42Fa4XbjLlBRh1sN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaeaipei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmnndpik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkifhh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmdelppn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hqcebh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejfcbcpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffppmcch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gigopnja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emepmbdh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glmfnepd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbjoflnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plbfnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inpghc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oemkmmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjklnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idjpemaq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ongnib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmdelppn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqjemabj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llmhhjaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nipdgmpc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inbdncha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofogeeen.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omipao32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icailide.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afmnoa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bibpll32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjnfam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfnfkqca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njjgfqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkpbhejg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgmakkoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Miapod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdpemh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dapoqfag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdcjbb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jajhbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lopmoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfhjkd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdhfqj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlmnkkfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcomij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cghbojah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhjgmp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejpmpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgbhdfdb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iljneojf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjqcfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lioklo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljahaoqk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffdjhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gigopnja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijlahc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jokffjgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jhckop32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kifkll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdpjoedm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lddpihbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pehnaafq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdappkgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gabddphl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnkobhdm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lajlncda.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afmnoa32.exe -
Executes dropped EXE 64 IoCs
pid Process 1752 Ongnib32.exe 480 Oakcpmmd.exe 1456 Ohghbg32.exe 1436 Pdpemh32.exe 1308 Plbqbi32.exe 768 Qaafppjh.exe 468 Ankcjpni.exe 1496 Anmpppkg.exe 760 Albmal32.exe 108 Ajfmjqoh.exe 1808 Aqpegk32.exe 1004 Afmnoa32.exe 304 Bkjfgh32.exe 1352 Bibpll32.exe 776 Bjfiidad.exe 580 Dbmnid32.exe 1468 Dhlcgkaf.exe 1980 Dnfkde32.exe 1804 Ddgmgkbe.exe 1012 Elbblnpp.exe 924 Efhfifpf.exe 944 Eleoan32.exe 1280 Efjbof32.exe 1520 Elgkgm32.exe 616 Eljhlmjh.exe 1600 Eafpdchp.exe 664 Kifkll32.exe 780 Mlpcciom.exe 624 Njfmaq32.exe 1688 Ofpjka32.exe 1868 Obfkqbge.exe 1728 Ohpcmmoa.exe 1548 Okooihne.exe 1824 Oojkjf32.exe 392 Oqlhaolm.exe 1992 Ohbpclmo.exe 1724 Ojdljd32.exe 300 Odiqhmbc.exe 1064 Oclqcj32.exe 340 Ojfipdaj.exe 364 Pmdelppn.exe 1640 Pcomij32.exe 1672 Pfmjee32.exe 568 Pndafb32.exe 992 Pmgbaonk.exe 628 Pcajni32.exe 1560 Ppldnjgg.exe 1716 Qapnla32.exe 1500 Acqfmmhd.exe 1416 Affijg32.exe 1308 Ambnla32.exe 1536 Bilkga32.exe 1496 Bmnqpe32.exe 856 Baimacec.exe 1808 Cghbojah.exe 1144 Clgglq32.exe 1352 Cpepbo32.exe 1068 Cgohoikp.exe 1468 Cindkdjd.exe 892 Chcama32.exe 1012 Cpjinnpn.exe 1340 Domiik32.exe 1280 Degafene.exe 1596 Dlajbo32.exe -
Loads dropped DLL 64 IoCs
pid Process 904 1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe 904 1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe 1752 Ongnib32.exe 1752 Ongnib32.exe 480 Oakcpmmd.exe 480 Oakcpmmd.exe 1456 Ohghbg32.exe 1456 Ohghbg32.exe 1436 Pdpemh32.exe 1436 Pdpemh32.exe 1308 Plbqbi32.exe 1308 Plbqbi32.exe 768 Qaafppjh.exe 768 Qaafppjh.exe 468 Ankcjpni.exe 468 Ankcjpni.exe 1496 Anmpppkg.exe 1496 Anmpppkg.exe 760 Albmal32.exe 760 Albmal32.exe 108 Ajfmjqoh.exe 108 Ajfmjqoh.exe 1808 Aqpegk32.exe 1808 Aqpegk32.exe 1004 Afmnoa32.exe 1004 Afmnoa32.exe 304 Bkjfgh32.exe 304 Bkjfgh32.exe 1352 Bibpll32.exe 1352 Bibpll32.exe 776 Bjfiidad.exe 776 Bjfiidad.exe 580 Dbmnid32.exe 580 Dbmnid32.exe 1468 Dhlcgkaf.exe 1468 Dhlcgkaf.exe 1980 Dnfkde32.exe 1980 Dnfkde32.exe 1804 Ddgmgkbe.exe 1804 Ddgmgkbe.exe 1012 Elbblnpp.exe 1012 Elbblnpp.exe 924 Efhfifpf.exe 924 Efhfifpf.exe 944 Eleoan32.exe 944 Eleoan32.exe 1280 Efjbof32.exe 1280 Efjbof32.exe 1520 Elgkgm32.exe 1520 Elgkgm32.exe 616 Eljhlmjh.exe 616 Eljhlmjh.exe 1600 Eafpdchp.exe 1600 Eafpdchp.exe 664 Kifkll32.exe 664 Kifkll32.exe 780 Mlpcciom.exe 780 Mlpcciom.exe 624 Njfmaq32.exe 624 Njfmaq32.exe 1688 Ofpjka32.exe 1688 Ofpjka32.exe 1868 Obfkqbge.exe 1868 Obfkqbge.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Elgkgm32.exe Efjbof32.exe File opened for modification C:\Windows\SysWOW64\Acqfmmhd.exe Qapnla32.exe File created C:\Windows\SysWOW64\Jfnfkqca.exe Jdpjoedm.exe File created C:\Windows\SysWOW64\Jfqcqp32.exe Jbegpaie.exe File created C:\Windows\SysWOW64\Fkbnjgkn.dll Hdefjn32.exe File created C:\Windows\SysWOW64\Ghlolh32.dll Kglfddgo.exe File created C:\Windows\SysWOW64\Obfkqbge.exe Ofpjka32.exe File created C:\Windows\SysWOW64\Ejdfkggg.exe Eqlbbaqg.exe File created C:\Windows\SysWOW64\Lkplggjh.dll Ecohil32.exe File opened for modification C:\Windows\SysWOW64\Hjljkneo.exe Hqcebh32.exe File created C:\Windows\SysWOW64\Ojomqcia.exe Obheof32.exe File created C:\Windows\SysWOW64\Eclkfi32.exe Eannjmif.exe File created C:\Windows\SysWOW64\Mmhfcgen.dll Ghoifjmf.exe File created C:\Windows\SysWOW64\Gckmjn32.dll Eleoan32.exe File created C:\Windows\SysWOW64\Neppekhf.dll Eqlbbaqg.exe File created C:\Windows\SysWOW64\Gmjegdbo.exe Fillqflh.exe File created C:\Windows\SysWOW64\Hbpndbcg.dll Lgclecag.exe File created C:\Windows\SysWOW64\Focfjaan.dll Mobfch32.exe File opened for modification C:\Windows\SysWOW64\Kjeqnefc.exe Kallepoc.exe File created C:\Windows\SysWOW64\Ddgmgkbe.exe Dnfkde32.exe File created C:\Windows\SysWOW64\Jjaogibo.dll Ejpmpg32.exe File created C:\Windows\SysWOW64\Lfhppagl.dll Gphacpab.exe File created C:\Windows\SysWOW64\Dicbhe32.exe Dehfgfmn.exe File created C:\Windows\SysWOW64\Mlgjni32.exe Lfmbaobj.exe File created C:\Windows\SysWOW64\Oemkmmop.exe Omfclpom.exe File opened for modification C:\Windows\SysWOW64\Fiebjn32.exe Feigiodj.exe File created C:\Windows\SysWOW64\Mkdill32.exe Monhgk32.exe File created C:\Windows\SysWOW64\Gehgjg32.dll Hqahmhqq.exe File created C:\Windows\SysWOW64\Ejdfmc32.exe Aphcldgk.exe File created C:\Windows\SysWOW64\Ekcbgf32.exe Eclkfi32.exe File created C:\Windows\SysWOW64\Ongnib32.exe 1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe File opened for modification C:\Windows\SysWOW64\Afmnoa32.exe Aqpegk32.exe File created C:\Windows\SysWOW64\Fpfemg32.dll Kifkll32.exe File opened for modification C:\Windows\SysWOW64\Jdpjoedm.exe Jlibnhck.exe File created C:\Windows\SysWOW64\Domiik32.exe Cpjinnpn.exe File created C:\Windows\SysWOW64\Kiilpdgk.dll Dnnnkl32.exe File created C:\Windows\SysWOW64\Lgclecag.exe Lddpihbc.exe File opened for modification C:\Windows\SysWOW64\Nkbjoh32.exe Nidnbl32.exe File created C:\Windows\SysWOW64\Haemhc32.exe Henlcb32.exe File created C:\Windows\SysWOW64\Bdncge32.dll Kallepoc.exe File created C:\Windows\SysWOW64\Paqlcm32.dll Qaafppjh.exe File created C:\Windows\SysWOW64\Qapnla32.exe Ppldnjgg.exe File opened for modification C:\Windows\SysWOW64\Ejdfkggg.exe Eqlbbaqg.exe File created C:\Windows\SysWOW64\Ogefon32.dll Nbhipb32.exe File created C:\Windows\SysWOW64\Hdjcfjoe.exe Hkbomd32.exe File created C:\Windows\SysWOW64\Cmcggamd.dll Kbpebhcn.exe File opened for modification C:\Windows\SysWOW64\Cindkdjd.exe Cgohoikp.exe File created C:\Windows\SysWOW64\Bmkhlj32.dll Lfmbaobj.exe File created C:\Windows\SysWOW64\Ebgdki32.dll Mlgjni32.exe File opened for modification C:\Windows\SysWOW64\Mmdjgm32.exe Mjfnka32.exe File created C:\Windows\SysWOW64\Ihcopl32.exe Ieebda32.exe File created C:\Windows\SysWOW64\Jeoeoppf.exe Jkfqfjif.exe File opened for modification C:\Windows\SysWOW64\Imalhhnj.exe Ijcplmof.exe File created C:\Windows\SysWOW64\Pobepcfp.dll Lpnmchfe.exe File opened for modification C:\Windows\SysWOW64\Lfmbaobj.exe Lcnfeccf.exe File created C:\Windows\SysWOW64\Mggaof32.exe Mdiecj32.exe File opened for modification C:\Windows\SysWOW64\Nameaokl.exe Nplijg32.exe File opened for modification C:\Windows\SysWOW64\Flabqj32.exe Fibfdn32.exe File opened for modification C:\Windows\SysWOW64\Hnnjcc32.exe Hkongh32.exe File created C:\Windows\SysWOW64\Ejdnmf32.dll Khfich32.exe File created C:\Windows\SysWOW64\Jdcoia32.dll Khieig32.exe File opened for modification C:\Windows\SysWOW64\Kocnea32.exe Kglfddgo.exe File opened for modification C:\Windows\SysWOW64\Mfoogo32.exe Mnhgeape.exe File opened for modification C:\Windows\SysWOW64\Faedjlcn.exe Fjklnb32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbdifbpd.dll" Ibcnkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lldnhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gabddphl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llkfqmgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkifhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmgnng32.dll" Okooihne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iakcoc32.dll" Dapoqfag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkganokn.dll" Fcjkmp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fndlia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oakcpmmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejpmpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dicbhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Piffgolg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gdkhhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idjpemaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppldnjgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ppldnjgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Goifdaqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afaeoafg.dll" Jnohko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poehco32.dll" Hhoeempa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kecojo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hqcebh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eleoan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fokeqb32.dll" Acqfmmhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbhipb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ekcbgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghaflikc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hoikhi32.dll" Leqndc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pndafb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkplggjh.dll" Ecohil32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mggaof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfahkaqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmgkkpfk.dll" Fiebjn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijlahc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lajlncda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Miapod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paqlcm32.dll" Qaafppjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngihankf.dll" Hqcebh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fachem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffppmcch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hipijqng.dll" Efjbof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbdicj32.dll" Dgmgimpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gehgjg32.dll" Hqahmhqq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekigplmq.dll" Pfhjkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gigopnja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ineqcbfn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcomij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Domiik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jeaffm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbegpaie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olefdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcepihem.dll" Igmelh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nccnjdek.dll" Kfghhgpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhopjjjk.dll" Pcajni32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddcdhq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgdpne32.dll" Efgnehqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nfahkaqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gokbjaoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kalnidgk.dll" Jaoamjgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgbjed32.dll" Jfihncko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjmhbcfb.dll" Pppodi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Feigiodj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flcofi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imphmn32.dll" Bjfiidad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 904 wrote to memory of 1752 904 1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe 28 PID 904 wrote to memory of 1752 904 1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe 28 PID 904 wrote to memory of 1752 904 1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe 28 PID 904 wrote to memory of 1752 904 1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe 28 PID 1752 wrote to memory of 480 1752 Ongnib32.exe 30 PID 1752 wrote to memory of 480 1752 Ongnib32.exe 30 PID 1752 wrote to memory of 480 1752 Ongnib32.exe 30 PID 1752 wrote to memory of 480 1752 Ongnib32.exe 30 PID 480 wrote to memory of 1456 480 Oakcpmmd.exe 29 PID 480 wrote to memory of 1456 480 Oakcpmmd.exe 29 PID 480 wrote to memory of 1456 480 Oakcpmmd.exe 29 PID 480 wrote to memory of 1456 480 Oakcpmmd.exe 29 PID 1456 wrote to memory of 1436 1456 Ohghbg32.exe 31 PID 1456 wrote to memory of 1436 1456 Ohghbg32.exe 31 PID 1456 wrote to memory of 1436 1456 Ohghbg32.exe 31 PID 1456 wrote to memory of 1436 1456 Ohghbg32.exe 31 PID 1436 wrote to memory of 1308 1436 Pdpemh32.exe 32 PID 1436 wrote to memory of 1308 1436 Pdpemh32.exe 32 PID 1436 wrote to memory of 1308 1436 Pdpemh32.exe 32 PID 1436 wrote to memory of 1308 1436 Pdpemh32.exe 32 PID 1308 wrote to memory of 768 1308 Plbqbi32.exe 33 PID 1308 wrote to memory of 768 1308 Plbqbi32.exe 33 PID 1308 wrote to memory of 768 1308 Plbqbi32.exe 33 PID 1308 wrote to memory of 768 1308 Plbqbi32.exe 33 PID 768 wrote to memory of 468 768 Qaafppjh.exe 34 PID 768 wrote to memory of 468 768 Qaafppjh.exe 34 PID 768 wrote to memory of 468 768 Qaafppjh.exe 34 PID 768 wrote to memory of 468 768 Qaafppjh.exe 34 PID 468 wrote to memory of 1496 468 Ankcjpni.exe 39 PID 468 wrote to memory of 1496 468 Ankcjpni.exe 39 PID 468 wrote to memory of 1496 468 Ankcjpni.exe 39 PID 468 wrote to memory of 1496 468 Ankcjpni.exe 39 PID 1496 wrote to memory of 760 1496 Anmpppkg.exe 38 PID 1496 wrote to memory of 760 1496 Anmpppkg.exe 38 PID 1496 wrote to memory of 760 1496 Anmpppkg.exe 38 PID 1496 wrote to memory of 760 1496 Anmpppkg.exe 38 PID 760 wrote to memory of 108 760 Albmal32.exe 36 PID 760 wrote to memory of 108 760 Albmal32.exe 36 PID 760 wrote to memory of 108 760 Albmal32.exe 36 PID 760 wrote to memory of 108 760 Albmal32.exe 36 PID 108 wrote to memory of 1808 108 Ajfmjqoh.exe 35 PID 108 wrote to memory of 1808 108 Ajfmjqoh.exe 35 PID 108 wrote to memory of 1808 108 Ajfmjqoh.exe 35 PID 108 wrote to memory of 1808 108 Ajfmjqoh.exe 35 PID 1808 wrote to memory of 1004 1808 Aqpegk32.exe 37 PID 1808 wrote to memory of 1004 1808 Aqpegk32.exe 37 PID 1808 wrote to memory of 1004 1808 Aqpegk32.exe 37 PID 1808 wrote to memory of 1004 1808 Aqpegk32.exe 37 PID 1004 wrote to memory of 304 1004 Afmnoa32.exe 40 PID 1004 wrote to memory of 304 1004 Afmnoa32.exe 40 PID 1004 wrote to memory of 304 1004 Afmnoa32.exe 40 PID 1004 wrote to memory of 304 1004 Afmnoa32.exe 40 PID 304 wrote to memory of 1352 304 Bkjfgh32.exe 41 PID 304 wrote to memory of 1352 304 Bkjfgh32.exe 41 PID 304 wrote to memory of 1352 304 Bkjfgh32.exe 41 PID 304 wrote to memory of 1352 304 Bkjfgh32.exe 41 PID 1352 wrote to memory of 776 1352 Bibpll32.exe 42 PID 1352 wrote to memory of 776 1352 Bibpll32.exe 42 PID 1352 wrote to memory of 776 1352 Bibpll32.exe 42 PID 1352 wrote to memory of 776 1352 Bibpll32.exe 42 PID 776 wrote to memory of 580 776 Bjfiidad.exe 43 PID 776 wrote to memory of 580 776 Bjfiidad.exe 43 PID 776 wrote to memory of 580 776 Bjfiidad.exe 43 PID 776 wrote to memory of 580 776 Bjfiidad.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe"C:\Users\Admin\AppData\Local\Temp\1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\Ongnib32.exeC:\Windows\system32\Ongnib32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\Oakcpmmd.exeC:\Windows\system32\Oakcpmmd.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:480
-
-
-
C:\Windows\SysWOW64\Ohghbg32.exeC:\Windows\system32\Ohghbg32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\Pdpemh32.exeC:\Windows\system32\Pdpemh32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\Plbqbi32.exeC:\Windows\system32\Plbqbi32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\Qaafppjh.exeC:\Windows\system32\Qaafppjh.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\Ankcjpni.exeC:\Windows\system32\Ankcjpni.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\Anmpppkg.exeC:\Windows\system32\Anmpppkg.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1496
-
-
-
-
-
-
C:\Windows\SysWOW64\Aqpegk32.exeC:\Windows\system32\Aqpegk32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\Afmnoa32.exeC:\Windows\system32\Afmnoa32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\Bkjfgh32.exeC:\Windows\system32\Bkjfgh32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\Bibpll32.exeC:\Windows\system32\Bibpll32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\Bjfiidad.exeC:\Windows\system32\Bjfiidad.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\Dbmnid32.exeC:\Windows\system32\Dbmnid32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:580 -
C:\Windows\SysWOW64\Dhlcgkaf.exeC:\Windows\system32\Dhlcgkaf.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1468 -
C:\Windows\SysWOW64\Dnfkde32.exeC:\Windows\system32\Dnfkde32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1980 -
C:\Windows\SysWOW64\Ddgmgkbe.exeC:\Windows\system32\Ddgmgkbe.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Windows\SysWOW64\Elbblnpp.exeC:\Windows\system32\Elbblnpp.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012 -
C:\Windows\SysWOW64\Efhfifpf.exeC:\Windows\system32\Efhfifpf.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:924 -
C:\Windows\SysWOW64\Eleoan32.exeC:\Windows\system32\Eleoan32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:944 -
C:\Windows\SysWOW64\Efjbof32.exeC:\Windows\system32\Efjbof32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1280 -
C:\Windows\SysWOW64\Elgkgm32.exeC:\Windows\system32\Elgkgm32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1520 -
C:\Windows\SysWOW64\Eljhlmjh.exeC:\Windows\system32\Eljhlmjh.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:616 -
C:\Windows\SysWOW64\Eafpdchp.exeC:\Windows\system32\Eafpdchp.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Windows\SysWOW64\Kifkll32.exeC:\Windows\system32\Kifkll32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:664 -
C:\Windows\SysWOW64\Mlpcciom.exeC:\Windows\system32\Mlpcciom.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:780 -
C:\Windows\SysWOW64\Njfmaq32.exeC:\Windows\system32\Njfmaq32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:624 -
C:\Windows\SysWOW64\Ofpjka32.exeC:\Windows\system32\Ofpjka32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\Obfkqbge.exeC:\Windows\system32\Obfkqbge.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1868 -
C:\Windows\SysWOW64\Ohpcmmoa.exeC:\Windows\system32\Ohpcmmoa.exe22⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\Okooihne.exeC:\Windows\system32\Okooihne.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:1548 -
C:\Windows\SysWOW64\Oojkjf32.exeC:\Windows\system32\Oojkjf32.exe24⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\Oqlhaolm.exeC:\Windows\system32\Oqlhaolm.exe25⤵
- Executes dropped EXE
PID:392 -
C:\Windows\SysWOW64\Ohbpclmo.exeC:\Windows\system32\Ohbpclmo.exe26⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\Ojdljd32.exeC:\Windows\system32\Ojdljd32.exe27⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\Odiqhmbc.exeC:\Windows\system32\Odiqhmbc.exe28⤵
- Executes dropped EXE
PID:300 -
C:\Windows\SysWOW64\Oclqcj32.exeC:\Windows\system32\Oclqcj32.exe29⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\Ojfipdaj.exeC:\Windows\system32\Ojfipdaj.exe30⤵
- Executes dropped EXE
PID:340 -
C:\Windows\SysWOW64\Pmdelppn.exeC:\Windows\system32\Pmdelppn.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:364 -
C:\Windows\SysWOW64\Pcomij32.exeC:\Windows\system32\Pcomij32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1640 -
C:\Windows\SysWOW64\Pfmjee32.exeC:\Windows\system32\Pfmjee32.exe33⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\Pndafb32.exeC:\Windows\system32\Pndafb32.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:568 -
C:\Windows\SysWOW64\Pmgbaonk.exeC:\Windows\system32\Pmgbaonk.exe35⤵
- Executes dropped EXE
PID:992 -
C:\Windows\SysWOW64\Pcajni32.exeC:\Windows\system32\Pcajni32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:628 -
C:\Windows\SysWOW64\Ppldnjgg.exeC:\Windows\system32\Ppldnjgg.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1560 -
C:\Windows\SysWOW64\Qapnla32.exeC:\Windows\system32\Qapnla32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1716 -
C:\Windows\SysWOW64\Acqfmmhd.exeC:\Windows\system32\Acqfmmhd.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:1500 -
C:\Windows\SysWOW64\Affijg32.exeC:\Windows\system32\Affijg32.exe40⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\Ambnla32.exeC:\Windows\system32\Ambnla32.exe41⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\SysWOW64\Bilkga32.exeC:\Windows\system32\Bilkga32.exe42⤵
- Executes dropped EXE
PID:1536
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ajfmjqoh.exeC:\Windows\system32\Ajfmjqoh.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:108
-
C:\Windows\SysWOW64\Albmal32.exeC:\Windows\system32\Albmal32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:760
-
C:\Windows\SysWOW64\Bmnqpe32.exeC:\Windows\system32\Bmnqpe32.exe1⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\SysWOW64\Baimacec.exeC:\Windows\system32\Baimacec.exe2⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\Cghbojah.exeC:\Windows\system32\Cghbojah.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\Clgglq32.exeC:\Windows\system32\Clgglq32.exe4⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\Cpepbo32.exeC:\Windows\system32\Cpepbo32.exe5⤵
- Executes dropped EXE
PID:1352 -
C:\Windows\SysWOW64\Cgohoikp.exeC:\Windows\system32\Cgohoikp.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1068 -
C:\Windows\SysWOW64\Cindkdjd.exeC:\Windows\system32\Cindkdjd.exe7⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\Chcama32.exeC:\Windows\system32\Chcama32.exe8⤵
- Executes dropped EXE
PID:892 -
C:\Windows\SysWOW64\Cpjinnpn.exeC:\Windows\system32\Cpjinnpn.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1012 -
C:\Windows\SysWOW64\Domiik32.exeC:\Windows\system32\Domiik32.exe10⤵
- Executes dropped EXE
- Modifies registry class
PID:1340 -
C:\Windows\SysWOW64\Degafene.exeC:\Windows\system32\Degafene.exe11⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\Dlajbo32.exeC:\Windows\system32\Dlajbo32.exe12⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\Doacdj32.exeC:\Windows\system32\Doacdj32.exe13⤵PID:832
-
C:\Windows\SysWOW64\Dapoqfag.exeC:\Windows\system32\Dapoqfag.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:268 -
C:\Windows\SysWOW64\Dhjgmp32.exeC:\Windows\system32\Dhjgmp32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:676 -
C:\Windows\SysWOW64\Dgmgimpn.exeC:\Windows\system32\Dgmgimpn.exe16⤵
- Modifies registry class
PID:936 -
C:\Windows\SysWOW64\Dodpjjqq.exeC:\Windows\system32\Dodpjjqq.exe17⤵PID:1900
-
C:\Windows\SysWOW64\Dnilkf32.exeC:\Windows\system32\Dnilkf32.exe18⤵PID:1348
-
C:\Windows\SysWOW64\Dqgigbdl.exeC:\Windows\system32\Dqgigbdl.exe19⤵PID:2016
-
C:\Windows\SysWOW64\Ddcdhq32.exeC:\Windows\system32\Ddcdhq32.exe20⤵
- Modifies registry class
PID:948
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ekmmdkdb.exeC:\Windows\system32\Ekmmdkdb.exe1⤵PID:1508
-
C:\Windows\SysWOW64\Ejpmpg32.exeC:\Windows\system32\Ejpmpg32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1316 -
C:\Windows\SysWOW64\Emnilc32.exeC:\Windows\system32\Emnilc32.exe3⤵PID:964
-
C:\Windows\SysWOW64\Eqjemabj.exeC:\Windows\system32\Eqjemabj.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1256 -
C:\Windows\SysWOW64\Efgnehqa.exeC:\Windows\system32\Efgnehqa.exe5⤵
- Modifies registry class
PID:768 -
C:\Windows\SysWOW64\Ejbjeg32.exeC:\Windows\system32\Ejbjeg32.exe6⤵PID:1260
-
-
-
-
-
-
C:\Windows\SysWOW64\Ennfffac.exeC:\Windows\system32\Ennfffac.exe1⤵PID:1664
-
C:\Windows\SysWOW64\Eqlbbaqg.exeC:\Windows\system32\Eqlbbaqg.exe2⤵
- Drops file in System32 directory
PID:968 -
C:\Windows\SysWOW64\Ejdfkggg.exeC:\Windows\system32\Ejdfkggg.exe3⤵PID:1268
-
C:\Windows\SysWOW64\Emepmbdh.exeC:\Windows\system32\Emepmbdh.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1700 -
C:\Windows\SysWOW64\Eodlimcl.exeC:\Windows\system32\Eodlimcl.exe5⤵PID:596
-
C:\Windows\SysWOW64\Ecohil32.exeC:\Windows\system32\Ecohil32.exe6⤵
- Drops file in System32 directory
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\Ekjlnnip.exeC:\Windows\system32\Ekjlnnip.exe7⤵PID:1488
-
C:\Windows\SysWOW64\Fajaleee.exeC:\Windows\system32\Fajaleee.exe8⤵PID:1676
-
C:\Windows\SysWOW64\Fcjkmp32.exeC:\Windows\system32\Fcjkmp32.exe9⤵
- Modifies registry class
PID:840 -
C:\Windows\SysWOW64\Fankgd32.exeC:\Windows\system32\Fankgd32.exe10⤵PID:1100
-
C:\Windows\SysWOW64\Fmelle32.exeC:\Windows\system32\Fmelle32.exe11⤵PID:1652
-
C:\Windows\SysWOW64\Fjilei32.exeC:\Windows\system32\Fjilei32.exe12⤵PID:2012
-
C:\Windows\SysWOW64\Fillqflh.exeC:\Windows\system32\Fillqflh.exe13⤵
- Drops file in System32 directory
PID:1580 -
C:\Windows\SysWOW64\Gmjegdbo.exeC:\Windows\system32\Gmjegdbo.exe14⤵PID:1320
-
C:\Windows\SysWOW64\Gphacpab.exeC:\Windows\system32\Gphacpab.exe15⤵
- Drops file in System32 directory
PID:1336 -
C:\Windows\SysWOW64\Gbkgjk32.exeC:\Windows\system32\Gbkgjk32.exe16⤵PID:2044
-
C:\Windows\SysWOW64\Gieogedn.exeC:\Windows\system32\Gieogedn.exe17⤵PID:480
-
C:\Windows\SysWOW64\Hdopgbql.exeC:\Windows\system32\Hdopgbql.exe18⤵PID:1324
-
C:\Windows\SysWOW64\Hdcjbb32.exeC:\Windows\system32\Hdcjbb32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1768 -
C:\Windows\SysWOW64\Dnnnkl32.exeC:\Windows\system32\Dnnnkl32.exe20⤵
- Drops file in System32 directory
PID:1284 -
C:\Windows\SysWOW64\Dehfgfmn.exeC:\Windows\system32\Dehfgfmn.exe21⤵
- Drops file in System32 directory
PID:1864 -
C:\Windows\SysWOW64\Dicbhe32.exeC:\Windows\system32\Dicbhe32.exe22⤵
- Modifies registry class
PID:1484 -
C:\Windows\SysWOW64\Dnbgflal.exeC:\Windows\system32\Dnbgflal.exe23⤵PID:1276
-
C:\Windows\SysWOW64\Fahfaimb.exeC:\Windows\system32\Fahfaimb.exe24⤵PID:1976
-
C:\Windows\SysWOW64\Fpmccf32.exeC:\Windows\system32\Fpmccf32.exe25⤵PID:584
-
C:\Windows\SysWOW64\Gpdicelb.exeC:\Windows\system32\Gpdicelb.exe26⤵PID:1772
-
C:\Windows\SysWOW64\Gcbepp32.exeC:\Windows\system32\Gcbepp32.exe27⤵PID:760
-
C:\Windows\SysWOW64\Gfqall32.exeC:\Windows\system32\Gfqall32.exe28⤵PID:836
-
C:\Windows\SysWOW64\Goifdaqj.exeC:\Windows\system32\Goifdaqj.exe29⤵
- Modifies registry class
PID:2000 -
C:\Windows\SysWOW64\Gjojbjpq.exeC:\Windows\system32\Gjojbjpq.exe30⤵PID:1200
-
C:\Windows\SysWOW64\Ghajmg32.exeC:\Windows\system32\Ghajmg32.exe31⤵PID:300
-
C:\Windows\SysWOW64\Glmfnepd.exeC:\Windows\system32\Glmfnepd.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:340 -
C:\Windows\SysWOW64\Gokbjaoh.exeC:\Windows\system32\Gokbjaoh.exe33⤵
- Modifies registry class
PID:1640 -
C:\Windows\SysWOW64\Gbjoflnl.exeC:\Windows\system32\Gbjoflnl.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:568 -
C:\Windows\SysWOW64\Gdhkbh32.exeC:\Windows\system32\Gdhkbh32.exe35⤵PID:1320
-
C:\Windows\SysWOW64\Gdkhhg32.exeC:\Windows\system32\Gdkhhg32.exe36⤵
- Modifies registry class
PID:2044 -
C:\Windows\SysWOW64\Ghfdhfcf.exeC:\Windows\system32\Ghfdhfcf.exe37⤵PID:628
-
C:\Windows\SysWOW64\Hkdpdabi.exeC:\Windows\system32\Hkdpdabi.exe38⤵PID:1716
-
C:\Windows\SysWOW64\Hqahmhqq.exeC:\Windows\system32\Hqahmhqq.exe39⤵
- Drops file in System32 directory
- Modifies registry class
PID:1416 -
C:\Windows\SysWOW64\Hhhqnf32.exeC:\Windows\system32\Hhhqnf32.exe40⤵PID:1536
-
C:\Windows\SysWOW64\Hqcebh32.exeC:\Windows\system32\Hqcebh32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:856 -
C:\Windows\SysWOW64\Hjljkneo.exeC:\Windows\system32\Hjljkneo.exe42⤵PID:1144
-
C:\Windows\SysWOW64\Hgpjdb32.exeC:\Windows\system32\Hgpjdb32.exe43⤵PID:1068
-
C:\Windows\SysWOW64\Hjnfam32.exeC:\Windows\system32\Hjnfam32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:892 -
C:\Windows\SysWOW64\Hmmbmi32.exeC:\Windows\system32\Hmmbmi32.exe45⤵PID:1340
-
C:\Windows\SysWOW64\Hjqcfm32.exeC:\Windows\system32\Hjqcfm32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1596 -
C:\Windows\SysWOW64\Iblhkp32.exeC:\Windows\system32\Iblhkp32.exe47⤵PID:268
-
C:\Windows\SysWOW64\Ijcplmof.exeC:\Windows\system32\Ijcplmof.exe48⤵
- Drops file in System32 directory
PID:1600 -
C:\Windows\SysWOW64\Imalhhnj.exeC:\Windows\system32\Imalhhnj.exe49⤵PID:936
-
C:\Windows\SysWOW64\Ifjqan32.exeC:\Windows\system32\Ifjqan32.exe50⤵PID:1348
-
C:\Windows\SysWOW64\Iihmmi32.exeC:\Windows\system32\Iihmmi32.exe51⤵PID:948
-
C:\Windows\SysWOW64\Ihmjne32.exeC:\Windows\system32\Ihmjne32.exe52⤵PID:1316
-
C:\Windows\SysWOW64\Ibcnkn32.exeC:\Windows\system32\Ibcnkn32.exe53⤵
- Modifies registry class
PID:1256 -
C:\Windows\SysWOW64\Ijnbpq32.exeC:\Windows\system32\Ijnbpq32.exe54⤵PID:1260
-
C:\Windows\SysWOW64\Iahklkmd.exeC:\Windows\system32\Iahklkmd.exe55⤵PID:968
-
C:\Windows\SysWOW64\Ijqoeqce.exeC:\Windows\system32\Ijqoeqce.exe56⤵PID:1700
-
C:\Windows\SysWOW64\Jajhbj32.exeC:\Windows\system32\Jajhbj32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1528 -
C:\Windows\SysWOW64\Jfgpja32.exeC:\Windows\system32\Jfgpja32.exe58⤵PID:780
-
C:\Windows\SysWOW64\Jnohko32.exeC:\Windows\system32\Jnohko32.exe59⤵
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Jamdgj32.exeC:\Windows\system32\Jamdgj32.exe60⤵PID:1688
-
C:\Windows\SysWOW64\Jihilmfj.exeC:\Windows\system32\Jihilmfj.exe61⤵PID:1728
-
C:\Windows\SysWOW64\Jaoamjgl.exeC:\Windows\system32\Jaoamjgl.exe62⤵
- Modifies registry class
PID:1100 -
C:\Windows\SysWOW64\Jlibnhck.exeC:\Windows\system32\Jlibnhck.exe63⤵
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\Jdpjoedm.exeC:\Windows\system32\Jdpjoedm.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\Jfnfkqca.exeC:\Windows\system32\Jfnfkqca.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1352 -
C:\Windows\SysWOW64\Jeaffm32.exeC:\Windows\system32\Jeaffm32.exe66⤵
- Modifies registry class
PID:1468 -
C:\Windows\SysWOW64\Jmhohjjn.exeC:\Windows\system32\Jmhohjjn.exe67⤵PID:1012
-
C:\Windows\SysWOW64\Jpgkdfia.exeC:\Windows\system32\Jpgkdfia.exe68⤵PID:832
-
C:\Windows\SysWOW64\Jbegpaie.exeC:\Windows\system32\Jbegpaie.exe69⤵
- Drops file in System32 directory
- Modifies registry class
PID:676 -
C:\Windows\SysWOW64\Jfqcqp32.exeC:\Windows\system32\Jfqcqp32.exe70⤵PID:1900
-
C:\Windows\SysWOW64\Kolheb32.exeC:\Windows\system32\Kolheb32.exe71⤵PID:2016
-
C:\Windows\SysWOW64\Kefpamff.exeC:\Windows\system32\Kefpamff.exe72⤵PID:1508
-
C:\Windows\SysWOW64\Klphnfmc.exeC:\Windows\system32\Klphnfmc.exe73⤵PID:1664
-
C:\Windows\SysWOW64\Kkbhjc32.exeC:\Windows\system32\Kkbhjc32.exe74⤵PID:768
-
C:\Windows\SysWOW64\Kbjpkq32.exeC:\Windows\system32\Kbjpkq32.exe75⤵PID:964
-
C:\Windows\SysWOW64\Kehmgl32.exeC:\Windows\system32\Kehmgl32.exe76⤵PID:1268
-
C:\Windows\SysWOW64\Khfich32.exeC:\Windows\system32\Khfich32.exe77⤵
- Drops file in System32 directory
PID:596 -
C:\Windows\SysWOW64\Kkeeoc32.exeC:\Windows\system32\Kkeeoc32.exe78⤵PID:664
-
C:\Windows\SysWOW64\Kmcalo32.exeC:\Windows\system32\Kmcalo32.exe79⤵PID:1488
-
C:\Windows\SysWOW64\Kdmihihk.exeC:\Windows\system32\Kdmihihk.exe80⤵PID:624
-
C:\Windows\SysWOW64\Khieig32.exeC:\Windows\system32\Khieig32.exe81⤵
- Drops file in System32 directory
PID:840 -
C:\Windows\SysWOW64\Kglfddgo.exeC:\Windows\system32\Kglfddgo.exe82⤵
- Drops file in System32 directory
PID:1868 -
C:\Windows\SysWOW64\Kocnea32.exeC:\Windows\system32\Kocnea32.exe83⤵PID:1548
-
C:\Windows\SysWOW64\Kdpfnh32.exeC:\Windows\system32\Kdpfnh32.exe84⤵PID:1652
-
C:\Windows\SysWOW64\Kgnbjd32.exeC:\Windows\system32\Kgnbjd32.exe85⤵PID:392
-
C:\Windows\SysWOW64\Kimofo32.exeC:\Windows\system32\Kimofo32.exe86⤵PID:1580
-
C:\Windows\SysWOW64\Lacggm32.exeC:\Windows\system32\Lacggm32.exe87⤵PID:1724
-
C:\Windows\SysWOW64\Ldbcch32.exeC:\Windows\system32\Ldbcch32.exe88⤵PID:1064
-
C:\Windows\SysWOW64\Lgqopc32.exeC:\Windows\system32\Lgqopc32.exe89⤵PID:364
-
C:\Windows\SysWOW64\Lioklo32.exeC:\Windows\system32\Lioklo32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1672 -
C:\Windows\SysWOW64\Llmhhjaa.exeC:\Windows\system32\Llmhhjaa.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1336 -
C:\Windows\SysWOW64\Lddpihbc.exeC:\Windows\system32\Lddpihbc.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:992 -
C:\Windows\SysWOW64\Lgclecag.exeC:\Windows\system32\Lgclecag.exe93⤵
- Drops file in System32 directory
PID:480 -
C:\Windows\SysWOW64\Ljahaoqk.exeC:\Windows\system32\Ljahaoqk.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1560 -
C:\Windows\SysWOW64\Lnmdam32.exeC:\Windows\system32\Lnmdam32.exe95⤵PID:1500
-
C:\Windows\SysWOW64\Lpkpni32.exeC:\Windows\system32\Lpkpni32.exe96⤵PID:1308
-
C:\Windows\SysWOW64\Lcjmjd32.exeC:\Windows\system32\Lcjmjd32.exe97⤵PID:616
-
C:\Windows\SysWOW64\Lhfebk32.exeC:\Windows\system32\Lhfebk32.exe98⤵PID:1496
-
C:\Windows\SysWOW64\Lpnmchfe.exeC:\Windows\system32\Lpnmchfe.exe99⤵
- Drops file in System32 directory
PID:1808 -
C:\Windows\SysWOW64\Lopmoe32.exeC:\Windows\system32\Lopmoe32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2056 -
C:\Windows\SysWOW64\Ljfaln32.exeC:\Windows\system32\Ljfaln32.exe101⤵PID:2064
-
C:\Windows\SysWOW64\Lldnhi32.exeC:\Windows\system32\Lldnhi32.exe102⤵
- Modifies registry class
PID:2072 -
C:\Windows\SysWOW64\Lcnfeccf.exeC:\Windows\system32\Lcnfeccf.exe103⤵
- Drops file in System32 directory
PID:2080 -
C:\Windows\SysWOW64\Lfmbaobj.exeC:\Windows\system32\Lfmbaobj.exe104⤵
- Drops file in System32 directory
PID:2088 -
C:\Windows\SysWOW64\Mlgjni32.exeC:\Windows\system32\Mlgjni32.exe105⤵
- Drops file in System32 directory
PID:2096 -
C:\Windows\SysWOW64\Moegjd32.exeC:\Windows\system32\Moegjd32.exe106⤵PID:2104
-
C:\Windows\SysWOW64\Mnhgeape.exeC:\Windows\system32\Mnhgeape.exe107⤵
- Drops file in System32 directory
PID:2112 -
C:\Windows\SysWOW64\Mfoogo32.exeC:\Windows\system32\Mfoogo32.exe108⤵PID:2120
-
C:\Windows\SysWOW64\Mhmkcj32.exeC:\Windows\system32\Mhmkcj32.exe109⤵PID:2128
-
C:\Windows\SysWOW64\Mbfplpfk.exeC:\Windows\system32\Mbfplpfk.exe110⤵PID:2136
-
C:\Windows\SysWOW64\Mddlhkeo.exeC:\Windows\system32\Mddlhkeo.exe111⤵PID:2144
-
C:\Windows\SysWOW64\Mgbhdfdb.exeC:\Windows\system32\Mgbhdfdb.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2152 -
C:\Windows\SysWOW64\Mjadpbcf.exeC:\Windows\system32\Mjadpbcf.exe113⤵PID:2160
-
C:\Windows\SysWOW64\Mdfimk32.exeC:\Windows\system32\Mdfimk32.exe114⤵PID:2168
-
C:\Windows\SysWOW64\Mkqajeji.exeC:\Windows\system32\Mkqajeji.exe115⤵PID:2176
-
C:\Windows\SysWOW64\Mdiecj32.exeC:\Windows\system32\Mdiecj32.exe116⤵
- Drops file in System32 directory
PID:2184 -
C:\Windows\SysWOW64\Mggaof32.exeC:\Windows\system32\Mggaof32.exe117⤵
- Modifies registry class
PID:2192 -
C:\Windows\SysWOW64\Mjfnka32.exeC:\Windows\system32\Mjfnka32.exe118⤵
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\Mmdjgm32.exeC:\Windows\system32\Mmdjgm32.exe119⤵PID:2208
-
C:\Windows\SysWOW64\Mobfch32.exeC:\Windows\system32\Mobfch32.exe120⤵
- Drops file in System32 directory
PID:2216 -
C:\Windows\SysWOW64\Ncnbdg32.exeC:\Windows\system32\Ncnbdg32.exe121⤵PID:2224
-
C:\Windows\SysWOW64\Njjgfqkl.exeC:\Windows\system32\Njjgfqkl.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-