Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe
Resource
win10v2004-20220901-en
General
-
Target
1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe
-
Size
92KB
-
MD5
16034e94585422f3df3b2ed91a28e350
-
SHA1
d40e2f5229535f035e067cc13439ef704c49720f
-
SHA256
1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7
-
SHA512
c282ab1573cdc61ff6bf24fb0eac3c71b5fd1865786d38b3224a5871c74a27ea437056df4c71f1364e456026b66d1442e49264c9b2cfe4f914c986d866f13493
-
SSDEEP
1536:VmGp5y7k+jX6Wnaxv/LuQr05UFrEoc4lzBT3jLV3BGnMPJKEsztuJO:X2Rax3L42Fa4XbjLlBRh1sN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gammiakd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jflgmkee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hphbfpbm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gehboi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdokfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjeenqcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiball32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmmoaahh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhmkef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghohkfen.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnbemagl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Claedl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnnoojhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppepag32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccldlm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilbcca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnbfpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bldond32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjgbcpap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnompm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gccepqii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcmfih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hajbpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikgpdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dodjlgog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ficlcq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Himgqmcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgggenfn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnaobhmj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgeeccho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecnbndkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emkqainl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjanqm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbnogl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqpfahlm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Habeec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnponhcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmqkhekn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Elfhdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akgcjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aohbik32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enfcql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hiball32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acbhopeo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iojbek32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qffgdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Belmldgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hepojo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkflfp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plhgkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jakkgfmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhmdldin.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iafalg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqpfahlm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnblchqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkepllld.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emgnapem.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fplicd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fqkfmgbp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkdlai32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eefcmbdc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkicbpjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Elmhjfig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdfafdlo.exe -
Executes dropped EXE 64 IoCs
pid Process 4972 Mipflggj.exe 4584 Mibbbg32.exe 3496 Npmkoamd.exe 4340 Nmqkhekn.exe 4964 Nkdlai32.exe 3260 Nmchne32.exe 3900 Ndmpjoah.exe 908 Dnnoojhf.exe 4336 Elfhdn32.exe 3168 Eahjgdml.exe 3112 Eefcmbdc.exe 3648 Ficlcq32.exe 2472 Fifhiphg.exe 1040 Fiheopfd.exe 3652 Fbqjge32.exe 4084 Fklnlhjp.exe 616 Fhpoelii.exe 312 Gbecbeho.exe 3748 Ghbkklgf.exe 4012 Gakpcamg.exe 4052 Gammiakd.exe 2828 Gifapn32.exe 4400 Ghlnajol.exe 3980 Hepojo32.exe 476 Hohccddf.exe 3768 Himgqmcl.exe 4776 Hcflib32.exe 4060 Hommnc32.exe 4264 Hiball32.exe 4892 Hcjedbfg.exe 3348 Ioaficlk.exe 4800 Ioccobji.exe 2968 Ilgchg32.exe 4852 Ihndmhnf.exe 2036 Illmcfdm.exe 2284 Jhcmhg32.exe 4316 Jhejng32.exe 2072 Jkdfjbgb.exe 1852 Jbnogl32.exe 980 Jhhgcffl.exe 1312 Joaopq32.exe 2124 Jflgmkee.exe 4792 Jhjcifdi.exe 1308 Jcphfo32.exe 2076 Jcbdlo32.exe 1280 Koieapgq.exe 1924 Kkpffqme.exe 2268 Komolo32.exe 3996 Kjccihca.exe 3532 Kmaoecbe.exe 748 Kkflfp32.exe 4240 Ljhldg32.exe 1576 Limiecdd.exe 1884 Lmkblajj.exe 3828 Lmmoaahh.exe 5100 Lmokga32.exe 844 Plhgkh32.exe 1608 Pgmkha32.exe 3592 Ppepag32.exe 1820 Pkkdop32.exe 3968 Pmipkk32.exe 1056 Pcfhcb32.exe 956 Plomlgfm.exe 1568 Qpmfbfmc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Aphncnoj.exe Amibgbpg.exe File created C:\Windows\SysWOW64\Flfjpeal.exe Felbck32.exe File created C:\Windows\SysWOW64\Bneacaei.exe Bodaei32.exe File opened for modification C:\Windows\SysWOW64\Cphgjl32.exe Cjnomaik.exe File created C:\Windows\SysWOW64\Jailbo32.dll Emkqainl.exe File created C:\Windows\SysWOW64\Mjcjogoc.dll Hjkinide.exe File opened for modification C:\Windows\SysWOW64\Ipohfole.exe Ionlof32.exe File opened for modification C:\Windows\SysWOW64\Qpmfbfmc.exe Plomlgfm.exe File created C:\Windows\SysWOW64\Elmhjfig.exe Ecepiiid.exe File opened for modification C:\Windows\SysWOW64\Pojehmdg.exe Pllilaed.exe File opened for modification C:\Windows\SysWOW64\Doidgf32.exe Dmkgkk32.exe File created C:\Windows\SysWOW64\Ionlof32.exe Hhccbloj.exe File created C:\Windows\SysWOW64\Kmaoecbe.exe Kjccihca.exe File created C:\Windows\SysWOW64\Dnpdjcch.exe Dkahnhdd.exe File created C:\Windows\SysWOW64\Infqhcfe.dll Hhmdldin.exe File created C:\Windows\SysWOW64\Pellli32.dll Hcjedbfg.exe File opened for modification C:\Windows\SysWOW64\Ihndmhnf.exe Ilgchg32.exe File opened for modification C:\Windows\SysWOW64\Bkepllld.exe Bdkgob32.exe File created C:\Windows\SysWOW64\Kjccihca.exe Komolo32.exe File created C:\Windows\SysWOW64\Jgkcebgp.dll Pmipkk32.exe File opened for modification C:\Windows\SysWOW64\Mihbgkfk.exe Mopmnf32.exe File created C:\Windows\SysWOW64\Cgpcafjg.exe Bpfkdl32.exe File created C:\Windows\SysWOW64\Akgcjn32.exe Alfclfpe.exe File created C:\Windows\SysWOW64\Jkelelad.exe Jhgpipbp.exe File opened for modification C:\Windows\SysWOW64\Boaeojpm.exe Bielgcae.exe File created C:\Windows\SysWOW64\Hhmpqehl.dll Hhjqlngd.exe File opened for modification C:\Windows\SysWOW64\Jheccq32.exe Jakkgfmf.exe File created C:\Windows\SysWOW64\Kllqin32.dll Ldglkmbg.exe File opened for modification C:\Windows\SysWOW64\Cgpcafjg.exe Bpfkdl32.exe File created C:\Windows\SysWOW64\Gbecbeho.exe Fhpoelii.exe File opened for modification C:\Windows\SysWOW64\Dnhnjdip.exe Dqdnppjf.exe File created C:\Windows\SysWOW64\Icolcbjg.dll Cphgjl32.exe File created C:\Windows\SysWOW64\Gdmlln32.dll Enbapcae.exe File created C:\Windows\SysWOW64\Pinnjmie.dll Gjpalabo.exe File opened for modification C:\Windows\SysWOW64\Gmecikkj.exe Gkggmplf.exe File created C:\Windows\SysWOW64\Degpanlg.exe Dnhnjdip.exe File created C:\Windows\SysWOW64\Nkhkfb32.dll Aomkdjcb.exe File created C:\Windows\SysWOW64\Bckdji32.exe Bplhnm32.exe File created C:\Windows\SysWOW64\Dmkgkk32.exe Djlkop32.exe File created C:\Windows\SysWOW64\Heimao32.dll Ifipci32.exe File created C:\Windows\SysWOW64\Ajqffagc.dll Cdnmko32.exe File created C:\Windows\SysWOW64\Dqdnppjf.exe Dnfadekb.exe File opened for modification C:\Windows\SysWOW64\Amibgbpg.exe Aohbik32.exe File created C:\Windows\SysWOW64\Oipadj32.dll Hknmno32.exe File created C:\Windows\SysWOW64\Ekbhah32.dll Plnfaaba.exe File created C:\Windows\SysWOW64\Apceho32.exe Agkqoilo.exe File opened for modification C:\Windows\SysWOW64\Bpfkdl32.exe Bepfgc32.exe File created C:\Windows\SysWOW64\Paeehg32.dll Gpaleq32.exe File created C:\Windows\SysWOW64\Hfdghihg.exe Hdfklnic.exe File opened for modification C:\Windows\SysWOW64\Apclbe32.exe Anepfi32.exe File created C:\Windows\SysWOW64\Mbpfpa32.exe Mobjce32.exe File opened for modification C:\Windows\SysWOW64\Belmldgj.exe Boaeojpm.exe File created C:\Windows\SysWOW64\Blagie32.dll Cjgbcpap.exe File created C:\Windows\SysWOW64\Odailf32.dll Fpcpdcee.exe File created C:\Windows\SysWOW64\Pcfhcb32.exe Pmipkk32.exe File created C:\Windows\SysWOW64\Haimmd32.dll Gjndgada.exe File created C:\Windows\SysWOW64\Emgnapem.exe Eapmlopi.exe File opened for modification C:\Windows\SysWOW64\Enjmlleo.exe Egqeoa32.exe File created C:\Windows\SysWOW64\Hpchkqfb.exe Hnblchqd.exe File opened for modification C:\Windows\SysWOW64\Bdkgob32.exe Bldond32.exe File opened for modification C:\Windows\SysWOW64\Cjofhhmf.exe Bgpjllnc.exe File created C:\Windows\SysWOW64\Egloakef.dll Apceho32.exe File opened for modification C:\Windows\SysWOW64\Ppepag32.exe Pgmkha32.exe File opened for modification C:\Windows\SysWOW64\Emgnapem.exe Eapmlopi.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 8860 8760 WerFault.exe 412 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpjfiake.dll" Ilgchg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jhjcifdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ljhldg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpaddd32.dll" Ppepag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odailf32.dll" Fpcpdcee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdfklnic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edlbpi32.dll" Hmnoec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npmkoamd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifkmihbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkahnhdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klklclaf.dll" Dnfadekb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fegihlnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihpjhaih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qmnbkdjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdkgob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obmcihhj.dll" Ffjkkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejpbpq32.dll" Pimmpfep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pimmpfep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Alooho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hnibdgkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gmecikkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Japdbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bpfkdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ineplfcf.dll" Bgggenfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iinkmj32.dll" Nbglpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccnjgf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fnofgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjkinide.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hphbfpbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gjbnbq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkggmplf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilcbnh32.dll" Ccldlm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhmdldin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qefkjg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abaadj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghppif32.dll" Abaadj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bneacaei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npipdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emkqainl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oanfmpil.dll" Gnmbhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Elmhjfig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdggkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhmkef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjpalabo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpqcncgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpelib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghcjae32.dll" Gccepqii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cknbbkdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nldjde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amblfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oipadj32.dll" Hknmno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnjcnqme.dll" Boaeojpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idlfjc32.dll" Pgmkha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lchglk32.dll" Belmldgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdfklnic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cngpamcl.dll" Ajnmaj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdikibgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Facchlpc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apqhbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eofbmgco.dll" Gchnkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcfhcb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgpjllnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pedndg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnjdenca.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4972 4988 1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe 81 PID 4988 wrote to memory of 4972 4988 1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe 81 PID 4988 wrote to memory of 4972 4988 1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe 81 PID 4972 wrote to memory of 4584 4972 Mipflggj.exe 82 PID 4972 wrote to memory of 4584 4972 Mipflggj.exe 82 PID 4972 wrote to memory of 4584 4972 Mipflggj.exe 82 PID 4584 wrote to memory of 3496 4584 Mibbbg32.exe 83 PID 4584 wrote to memory of 3496 4584 Mibbbg32.exe 83 PID 4584 wrote to memory of 3496 4584 Mibbbg32.exe 83 PID 3496 wrote to memory of 4340 3496 Npmkoamd.exe 84 PID 3496 wrote to memory of 4340 3496 Npmkoamd.exe 84 PID 3496 wrote to memory of 4340 3496 Npmkoamd.exe 84 PID 4340 wrote to memory of 4964 4340 Nmqkhekn.exe 85 PID 4340 wrote to memory of 4964 4340 Nmqkhekn.exe 85 PID 4340 wrote to memory of 4964 4340 Nmqkhekn.exe 85 PID 4964 wrote to memory of 3260 4964 Nkdlai32.exe 86 PID 4964 wrote to memory of 3260 4964 Nkdlai32.exe 86 PID 4964 wrote to memory of 3260 4964 Nkdlai32.exe 86 PID 3260 wrote to memory of 3900 3260 Nmchne32.exe 87 PID 3260 wrote to memory of 3900 3260 Nmchne32.exe 87 PID 3260 wrote to memory of 3900 3260 Nmchne32.exe 87 PID 3900 wrote to memory of 908 3900 Ndmpjoah.exe 88 PID 3900 wrote to memory of 908 3900 Ndmpjoah.exe 88 PID 3900 wrote to memory of 908 3900 Ndmpjoah.exe 88 PID 908 wrote to memory of 4336 908 Dnnoojhf.exe 89 PID 908 wrote to memory of 4336 908 Dnnoojhf.exe 89 PID 908 wrote to memory of 4336 908 Dnnoojhf.exe 89 PID 4336 wrote to memory of 3168 4336 Elfhdn32.exe 90 PID 4336 wrote to memory of 3168 4336 Elfhdn32.exe 90 PID 4336 wrote to memory of 3168 4336 Elfhdn32.exe 90 PID 3168 wrote to memory of 3112 3168 Eahjgdml.exe 91 PID 3168 wrote to memory of 3112 3168 Eahjgdml.exe 91 PID 3168 wrote to memory of 3112 3168 Eahjgdml.exe 91 PID 3112 wrote to memory of 3648 3112 Eefcmbdc.exe 92 PID 3112 wrote to memory of 3648 3112 Eefcmbdc.exe 92 PID 3112 wrote to memory of 3648 3112 Eefcmbdc.exe 92 PID 3648 wrote to memory of 2472 3648 Ficlcq32.exe 93 PID 3648 wrote to memory of 2472 3648 Ficlcq32.exe 93 PID 3648 wrote to memory of 2472 3648 Ficlcq32.exe 93 PID 2472 wrote to memory of 1040 2472 Fifhiphg.exe 94 PID 2472 wrote to memory of 1040 2472 Fifhiphg.exe 94 PID 2472 wrote to memory of 1040 2472 Fifhiphg.exe 94 PID 1040 wrote to memory of 3652 1040 Fiheopfd.exe 95 PID 1040 wrote to memory of 3652 1040 Fiheopfd.exe 95 PID 1040 wrote to memory of 3652 1040 Fiheopfd.exe 95 PID 3652 wrote to memory of 4084 3652 Fbqjge32.exe 96 PID 3652 wrote to memory of 4084 3652 Fbqjge32.exe 96 PID 3652 wrote to memory of 4084 3652 Fbqjge32.exe 96 PID 4084 wrote to memory of 616 4084 Fklnlhjp.exe 97 PID 4084 wrote to memory of 616 4084 Fklnlhjp.exe 97 PID 4084 wrote to memory of 616 4084 Fklnlhjp.exe 97 PID 616 wrote to memory of 312 616 Fhpoelii.exe 98 PID 616 wrote to memory of 312 616 Fhpoelii.exe 98 PID 616 wrote to memory of 312 616 Fhpoelii.exe 98 PID 312 wrote to memory of 3748 312 Gbecbeho.exe 99 PID 312 wrote to memory of 3748 312 Gbecbeho.exe 99 PID 312 wrote to memory of 3748 312 Gbecbeho.exe 99 PID 3748 wrote to memory of 4012 3748 Ghbkklgf.exe 100 PID 3748 wrote to memory of 4012 3748 Ghbkklgf.exe 100 PID 3748 wrote to memory of 4012 3748 Ghbkklgf.exe 100 PID 4012 wrote to memory of 4052 4012 Gakpcamg.exe 101 PID 4012 wrote to memory of 4052 4012 Gakpcamg.exe 101 PID 4012 wrote to memory of 4052 4012 Gakpcamg.exe 101 PID 4052 wrote to memory of 2828 4052 Gammiakd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe"C:\Users\Admin\AppData\Local\Temp\1f4a00c02cb87be3efc8fff9eab00ff67e8f33d5e0f817cf1233a9afcd912fb7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\Mipflggj.exeC:\Windows\system32\Mipflggj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\Mibbbg32.exeC:\Windows\system32\Mibbbg32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\Npmkoamd.exeC:\Windows\system32\Npmkoamd.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\Nmqkhekn.exeC:\Windows\system32\Nmqkhekn.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\Nkdlai32.exeC:\Windows\system32\Nkdlai32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\Nmchne32.exeC:\Windows\system32\Nmchne32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\Ndmpjoah.exeC:\Windows\system32\Ndmpjoah.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\Dnnoojhf.exeC:\Windows\system32\Dnnoojhf.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\Elfhdn32.exeC:\Windows\system32\Elfhdn32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\Eahjgdml.exeC:\Windows\system32\Eahjgdml.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\Eefcmbdc.exeC:\Windows\system32\Eefcmbdc.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\Ficlcq32.exeC:\Windows\system32\Ficlcq32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\Fifhiphg.exeC:\Windows\system32\Fifhiphg.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\Fiheopfd.exeC:\Windows\system32\Fiheopfd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\Fbqjge32.exeC:\Windows\system32\Fbqjge32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\Fklnlhjp.exeC:\Windows\system32\Fklnlhjp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\Fhpoelii.exeC:\Windows\system32\Fhpoelii.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\Gbecbeho.exeC:\Windows\system32\Gbecbeho.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\SysWOW64\Ghbkklgf.exeC:\Windows\system32\Ghbkklgf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\Gakpcamg.exeC:\Windows\system32\Gakpcamg.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\Gammiakd.exeC:\Windows\system32\Gammiakd.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\Gifapn32.exeC:\Windows\system32\Gifapn32.exe23⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Ghlnajol.exeC:\Windows\system32\Ghlnajol.exe24⤵
- Executes dropped EXE
PID:4400 -
C:\Windows\SysWOW64\Hepojo32.exeC:\Windows\system32\Hepojo32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3980 -
C:\Windows\SysWOW64\Hohccddf.exeC:\Windows\system32\Hohccddf.exe26⤵
- Executes dropped EXE
PID:476 -
C:\Windows\SysWOW64\Himgqmcl.exeC:\Windows\system32\Himgqmcl.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3768 -
C:\Windows\SysWOW64\Hcflib32.exeC:\Windows\system32\Hcflib32.exe28⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\SysWOW64\Hommnc32.exeC:\Windows\system32\Hommnc32.exe29⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\SysWOW64\Hiball32.exeC:\Windows\system32\Hiball32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4264 -
C:\Windows\SysWOW64\Hcjedbfg.exeC:\Windows\system32\Hcjedbfg.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4892 -
C:\Windows\SysWOW64\Ioaficlk.exeC:\Windows\system32\Ioaficlk.exe32⤵
- Executes dropped EXE
PID:3348 -
C:\Windows\SysWOW64\Ioccobji.exeC:\Windows\system32\Ioccobji.exe33⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\Ilgchg32.exeC:\Windows\system32\Ilgchg32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2968 -
C:\Windows\SysWOW64\Ihndmhnf.exeC:\Windows\system32\Ihndmhnf.exe35⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\Illmcfdm.exeC:\Windows\system32\Illmcfdm.exe36⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\Jhcmhg32.exeC:\Windows\system32\Jhcmhg32.exe37⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\Jhejng32.exeC:\Windows\system32\Jhejng32.exe38⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\Jkdfjbgb.exeC:\Windows\system32\Jkdfjbgb.exe39⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\Jbnogl32.exeC:\Windows\system32\Jbnogl32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\Jhhgcffl.exeC:\Windows\system32\Jhhgcffl.exe41⤵
- Executes dropped EXE
PID:980 -
C:\Windows\SysWOW64\Joaopq32.exeC:\Windows\system32\Joaopq32.exe42⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SysWOW64\Jflgmkee.exeC:\Windows\system32\Jflgmkee.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\Jhjcifdi.exeC:\Windows\system32\Jhjcifdi.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:4792 -
C:\Windows\SysWOW64\Jcphfo32.exeC:\Windows\system32\Jcphfo32.exe45⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\SysWOW64\Jcbdlo32.exeC:\Windows\system32\Jcbdlo32.exe46⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\Koieapgq.exeC:\Windows\system32\Koieapgq.exe47⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\Kkpffqme.exeC:\Windows\system32\Kkpffqme.exe48⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\Komolo32.exeC:\Windows\system32\Komolo32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2268 -
C:\Windows\SysWOW64\Kjccihca.exeC:\Windows\system32\Kjccihca.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3996 -
C:\Windows\SysWOW64\Kmaoecbe.exeC:\Windows\system32\Kmaoecbe.exe51⤵
- Executes dropped EXE
PID:3532 -
C:\Windows\SysWOW64\Kkflfp32.exeC:\Windows\system32\Kkflfp32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:748 -
C:\Windows\SysWOW64\Ljhldg32.exeC:\Windows\system32\Ljhldg32.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:4240 -
C:\Windows\SysWOW64\Limiecdd.exeC:\Windows\system32\Limiecdd.exe54⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\SysWOW64\Lmkblajj.exeC:\Windows\system32\Lmkblajj.exe55⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\Lmmoaahh.exeC:\Windows\system32\Lmmoaahh.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3828 -
C:\Windows\SysWOW64\Lmokga32.exeC:\Windows\system32\Lmokga32.exe57⤵
- Executes dropped EXE
PID:5100 -
C:\Windows\SysWOW64\Plhgkh32.exeC:\Windows\system32\Plhgkh32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:844 -
C:\Windows\SysWOW64\Pgmkha32.exeC:\Windows\system32\Pgmkha32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Ppepag32.exeC:\Windows\system32\Ppepag32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3592 -
C:\Windows\SysWOW64\Pkkdop32.exeC:\Windows\system32\Pkkdop32.exe61⤵
- Executes dropped EXE
PID:1820 -
C:\Windows\SysWOW64\Pmipkk32.exeC:\Windows\system32\Pmipkk32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3968 -
C:\Windows\SysWOW64\Pcfhcb32.exeC:\Windows\system32\Pcfhcb32.exe63⤵
- Executes dropped EXE
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Plomlgfm.exeC:\Windows\system32\Plomlgfm.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:956 -
C:\Windows\SysWOW64\Qpmfbfmc.exeC:\Windows\system32\Qpmfbfmc.exe65⤵
- Executes dropped EXE
PID:1568 -
C:\Windows\SysWOW64\Qgfnop32.exeC:\Windows\system32\Qgfnop32.exe66⤵PID:4716
-
C:\Windows\SysWOW64\Qcmoca32.exeC:\Windows\system32\Qcmoca32.exe67⤵PID:1208
-
C:\Windows\SysWOW64\Qiggpkaa.exeC:\Windows\system32\Qiggpkaa.exe68⤵PID:1972
-
C:\Windows\SysWOW64\Alfclfpe.exeC:\Windows\system32\Alfclfpe.exe69⤵
- Drops file in System32 directory
PID:4640 -
C:\Windows\SysWOW64\Akgcjn32.exeC:\Windows\system32\Akgcjn32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3988 -
C:\Windows\SysWOW64\Anepfi32.exeC:\Windows\system32\Anepfi32.exe71⤵
- Drops file in System32 directory
PID:4008 -
C:\Windows\SysWOW64\Apclbe32.exeC:\Windows\system32\Apclbe32.exe72⤵PID:4868
-
C:\Windows\SysWOW64\Acbhopeo.exeC:\Windows\system32\Acbhopeo.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1528 -
C:\Windows\SysWOW64\Ajlpkj32.exeC:\Windows\system32\Ajlpkj32.exe74⤵PID:3244
-
C:\Windows\SysWOW64\Aljmgf32.exeC:\Windows\system32\Aljmgf32.exe75⤵PID:5068
-
C:\Windows\SysWOW64\Ajnmaj32.exeC:\Windows\system32\Ajnmaj32.exe76⤵
- Modifies registry class
PID:2216
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Almime32.exeC:\Windows\system32\Almime32.exe1⤵PID:2248
-
C:\Windows\SysWOW64\Acgajpaj.exeC:\Windows\system32\Acgajpaj.exe2⤵PID:2888
-
C:\Windows\SysWOW64\Alofbehj.exeC:\Windows\system32\Alofbehj.exe3⤵PID:2416
-
C:\Windows\SysWOW64\Adfndbil.exeC:\Windows\system32\Adfndbil.exe4⤵PID:2728
-
C:\Windows\SysWOW64\Bnobmh32.exeC:\Windows\system32\Bnobmh32.exe5⤵PID:5112
-
C:\Windows\SysWOW64\Bdikibgj.exeC:\Windows\system32\Bdikibgj.exe6⤵
- Modifies registry class
PID:4088 -
C:\Windows\SysWOW64\Bgggenfn.exeC:\Windows\system32\Bgggenfn.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:224 -
C:\Windows\SysWOW64\Bnaobhmj.exeC:\Windows\system32\Bnaobhmj.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3908 -
C:\Windows\SysWOW64\Bldond32.exeC:\Windows\system32\Bldond32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3464 -
C:\Windows\SysWOW64\Bdkgob32.exeC:\Windows\system32\Bdkgob32.exe10⤵
- Drops file in System32 directory
- Modifies registry class
PID:3764 -
C:\Windows\SysWOW64\Bkepllld.exeC:\Windows\system32\Bkepllld.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3144 -
C:\Windows\SysWOW64\Blflcd32.exeC:\Windows\system32\Blflcd32.exe12⤵PID:4312
-
C:\Windows\SysWOW64\Blhiidpp.exeC:\Windows\system32\Blhiidpp.exe13⤵PID:1060
-
C:\Windows\SysWOW64\Bnhecg32.exeC:\Windows\system32\Bnhecg32.exe14⤵PID:1640
-
C:\Windows\SysWOW64\Bdbnpaoo.exeC:\Windows\system32\Bdbnpaoo.exe15⤵PID:3376
-
C:\Windows\SysWOW64\Bgpjllnc.exeC:\Windows\system32\Bgpjllnc.exe16⤵
- Drops file in System32 directory
- Modifies registry class
PID:3608 -
C:\Windows\SysWOW64\Cjofhhmf.exeC:\Windows\system32\Cjofhhmf.exe17⤵PID:4048
-
C:\Windows\SysWOW64\Cknbbkdi.exeC:\Windows\system32\Cknbbkdi.exe18⤵
- Modifies registry class
PID:3444 -
C:\Windows\SysWOW64\Cnmonfcm.exeC:\Windows\system32\Cnmonfcm.exe19⤵PID:2856
-
C:\Windows\SysWOW64\Cdggkp32.exeC:\Windows\system32\Cdggkp32.exe20⤵
- Modifies registry class
PID:1420 -
C:\Windows\SysWOW64\Cgecgl32.exeC:\Windows\system32\Cgecgl32.exe21⤵PID:3832
-
C:\Windows\SysWOW64\Cjcocg32.exeC:\Windows\system32\Cjcocg32.exe22⤵PID:1932
-
C:\Windows\SysWOW64\Cmblob32.exeC:\Windows\system32\Cmblob32.exe23⤵PID:2256
-
C:\Windows\SysWOW64\Ccldlm32.exeC:\Windows\system32\Ccldlm32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2756 -
C:\Windows\SysWOW64\Ckclmj32.exeC:\Windows\system32\Ckclmj32.exe25⤵PID:3892
-
C:\Windows\SysWOW64\Cmdhdbfb.exeC:\Windows\system32\Cmdhdbfb.exe26⤵PID:1128
-
C:\Windows\SysWOW64\Cdkpfpfd.exeC:\Windows\system32\Cdkpfpfd.exe27⤵PID:4456
-
C:\Windows\SysWOW64\Cgjmbkeh.exeC:\Windows\system32\Cgjmbkeh.exe28⤵PID:1368
-
C:\Windows\SysWOW64\Cndeoe32.exeC:\Windows\system32\Cndeoe32.exe29⤵PID:4448
-
C:\Windows\SysWOW64\Cqbakq32.exeC:\Windows\system32\Cqbakq32.exe30⤵PID:3456
-
C:\Windows\SysWOW64\Cdnmko32.exeC:\Windows\system32\Cdnmko32.exe31⤵
- Drops file in System32 directory
PID:2736 -
C:\Windows\SysWOW64\Dkhehilo.exeC:\Windows\system32\Dkhehilo.exe32⤵PID:740
-
C:\Windows\SysWOW64\Dnfadekb.exeC:\Windows\system32\Dnfadekb.exe33⤵
- Drops file in System32 directory
- Modifies registry class
PID:612 -
C:\Windows\SysWOW64\Dqdnppjf.exeC:\Windows\system32\Dqdnppjf.exe34⤵
- Drops file in System32 directory
PID:3616 -
C:\Windows\SysWOW64\Dnhnjdip.exeC:\Windows\system32\Dnhnjdip.exe35⤵
- Drops file in System32 directory
PID:4656 -
C:\Windows\SysWOW64\Degpanlg.exeC:\Windows\system32\Degpanlg.exe36⤵PID:2392
-
C:\Windows\SysWOW64\Dkahnhdd.exeC:\Windows\system32\Dkahnhdd.exe37⤵
- Drops file in System32 directory
- Modifies registry class
PID:3416 -
C:\Windows\SysWOW64\Dnpdjcch.exeC:\Windows\system32\Dnpdjcch.exe38⤵PID:2352
-
C:\Windows\SysWOW64\Deimgn32.exeC:\Windows\system32\Deimgn32.exe39⤵PID:3580
-
C:\Windows\SysWOW64\Dghici32.exeC:\Windows\system32\Dghici32.exe40⤵PID:3024
-
C:\Windows\SysWOW64\Enbapcae.exeC:\Windows\system32\Enbapcae.exe41⤵
- Drops file in System32 directory
PID:4824 -
C:\Windows\SysWOW64\Eapmlopi.exeC:\Windows\system32\Eapmlopi.exe42⤵
- Drops file in System32 directory
PID:1876 -
C:\Windows\SysWOW64\Emgnapem.exeC:\Windows\system32\Emgnapem.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5132 -
C:\Windows\SysWOW64\Ecafnj32.exeC:\Windows\system32\Ecafnj32.exe44⤵PID:5148
-
C:\Windows\SysWOW64\Eaeggn32.exeC:\Windows\system32\Eaeggn32.exe45⤵PID:5164
-
C:\Windows\SysWOW64\Ecccci32.exeC:\Windows\system32\Ecccci32.exe46⤵PID:5180
-
C:\Windows\SysWOW64\Ecepiiid.exeC:\Windows\system32\Ecepiiid.exe47⤵
- Drops file in System32 directory
PID:5196 -
C:\Windows\SysWOW64\Elmhjfig.exeC:\Windows\system32\Elmhjfig.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5300 -
C:\Windows\SysWOW64\Eeelcl32.exeC:\Windows\system32\Eeelcl32.exe49⤵PID:5316
-
C:\Windows\SysWOW64\Fmpagnmb.exeC:\Windows\system32\Fmpagnmb.exe50⤵PID:5332
-
C:\Windows\SysWOW64\Fegihlnd.exeC:\Windows\system32\Fegihlnd.exe51⤵
- Modifies registry class
PID:5348 -
C:\Windows\SysWOW64\Fanimm32.exeC:\Windows\system32\Fanimm32.exe52⤵PID:5364
-
C:\Windows\SysWOW64\Fcmfih32.exeC:\Windows\system32\Fcmfih32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5380 -
C:\Windows\SysWOW64\Fjfnfbji.exeC:\Windows\system32\Fjfnfbji.exe54⤵PID:5396
-
C:\Windows\SysWOW64\Felbck32.exeC:\Windows\system32\Felbck32.exe55⤵
- Drops file in System32 directory
PID:5412 -
C:\Windows\SysWOW64\Flfjpeal.exeC:\Windows\system32\Flfjpeal.exe56⤵PID:5428
-
C:\Windows\SysWOW64\Facchlpc.exeC:\Windows\system32\Facchlpc.exe57⤵
- Modifies registry class
PID:5444 -
C:\Windows\SysWOW64\Fhmkef32.exeC:\Windows\system32\Fhmkef32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5460 -
C:\Windows\SysWOW64\Fjkgaa32.exeC:\Windows\system32\Fjkgaa32.exe59⤵PID:5476
-
C:\Windows\SysWOW64\Faepnlnq.exeC:\Windows\system32\Faepnlnq.exe60⤵PID:5492
-
C:\Windows\SysWOW64\Ghohkfen.exeC:\Windows\system32\Ghohkfen.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5508 -
C:\Windows\SysWOW64\Gjndgada.exeC:\Windows\system32\Gjndgada.exe62⤵
- Drops file in System32 directory
PID:5524 -
C:\Windows\SysWOW64\Gmlpcmce.exeC:\Windows\system32\Gmlpcmce.exe63⤵PID:5540
-
C:\Windows\SysWOW64\Gdfipg32.exeC:\Windows\system32\Gdfipg32.exe64⤵PID:5556
-
C:\Windows\SysWOW64\Gjpalabo.exeC:\Windows\system32\Gjpalabo.exe65⤵
- Drops file in System32 directory
- Modifies registry class
PID:5576 -
C:\Windows\SysWOW64\Gajiik32.exeC:\Windows\system32\Gajiik32.exe66⤵PID:5592
-
C:\Windows\SysWOW64\Gdheefio.exeC:\Windows\system32\Gdheefio.exe67⤵PID:5608
-
C:\Windows\SysWOW64\Gjbnbq32.exeC:\Windows\system32\Gjbnbq32.exe68⤵
- Modifies registry class
PID:5624 -
C:\Windows\SysWOW64\Gehboi32.exeC:\Windows\system32\Gehboi32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5728 -
C:\Windows\SysWOW64\Ghikadmc.exeC:\Windows\system32\Ghikadmc.exe70⤵PID:5744
-
C:\Windows\SysWOW64\Gkggmplf.exeC:\Windows\system32\Gkggmplf.exe71⤵
- Drops file in System32 directory
- Modifies registry class
PID:5760 -
C:\Windows\SysWOW64\Gmecikkj.exeC:\Windows\system32\Gmecikkj.exe72⤵
- Modifies registry class
PID:5776 -
C:\Windows\SysWOW64\Hdokfe32.exeC:\Windows\system32\Hdokfe32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5792 -
C:\Windows\SysWOW64\Hkicbpjd.exeC:\Windows\system32\Hkicbpjd.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5808 -
C:\Windows\SysWOW64\Hoepcn32.exeC:\Windows\system32\Hoepcn32.exe75⤵PID:5824
-
C:\Windows\SysWOW64\Heohphjj.exeC:\Windows\system32\Heohphjj.exe76⤵PID:5840
-
C:\Windows\SysWOW64\Hhmdldin.exeC:\Windows\system32\Hhmdldin.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5856 -
C:\Windows\SysWOW64\Hmjmdk32.exeC:\Windows\system32\Hmjmdk32.exe78⤵PID:5872
-
C:\Windows\SysWOW64\Headeh32.exeC:\Windows\system32\Headeh32.exe79⤵PID:5888
-
C:\Windows\SysWOW64\Hhpaac32.exeC:\Windows\system32\Hhpaac32.exe80⤵PID:5904
-
C:\Windows\SysWOW64\Hknmno32.exeC:\Windows\system32\Hknmno32.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:5920 -
C:\Windows\SysWOW64\Hahejimk.exeC:\Windows\system32\Hahejimk.exe82⤵PID:5936
-
C:\Windows\SysWOW64\Hdfafdlo.exeC:\Windows\system32\Hdfafdlo.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5952 -
C:\Windows\SysWOW64\Holfdm32.exeC:\Windows\system32\Holfdm32.exe84⤵PID:5968
-
C:\Windows\SysWOW64\Hajbpi32.exeC:\Windows\system32\Hajbpi32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5984 -
C:\Windows\SysWOW64\Hhdjmcce.exeC:\Windows\system32\Hhdjmcce.exe86⤵PID:6000
-
C:\Windows\SysWOW64\Honbim32.exeC:\Windows\system32\Honbim32.exe87⤵PID:6016
-
C:\Windows\SysWOW64\Iehkfgao.exeC:\Windows\system32\Iehkfgao.exe88⤵PID:6032
-
C:\Windows\SysWOW64\Ilbcca32.exeC:\Windows\system32\Ilbcca32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6048 -
C:\Windows\SysWOW64\Iekglg32.exeC:\Windows\system32\Iekglg32.exe90⤵PID:6064
-
C:\Windows\SysWOW64\Ihichb32.exeC:\Windows\system32\Ihichb32.exe91⤵PID:6080
-
C:\Windows\SysWOW64\Ikgpdn32.exeC:\Windows\system32\Ikgpdn32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6096 -
C:\Windows\SysWOW64\Inflpi32.exeC:\Windows\system32\Inflpi32.exe93⤵PID:6116
-
C:\Windows\SysWOW64\Iemdaf32.exeC:\Windows\system32\Iemdaf32.exe94⤵PID:6136
-
C:\Windows\SysWOW64\Ihkpma32.exeC:\Windows\system32\Ihkpma32.exe95⤵PID:5228
-
C:\Windows\SysWOW64\Ikjmim32.exeC:\Windows\system32\Ikjmim32.exe96⤵PID:5660
-
C:\Windows\SysWOW64\Iafalg32.exeC:\Windows\system32\Iafalg32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5676 -
C:\Windows\SysWOW64\Ihpjhaih.exeC:\Windows\system32\Ihpjhaih.exe98⤵
- Modifies registry class
PID:5692 -
C:\Windows\SysWOW64\Iojbek32.exeC:\Windows\system32\Iojbek32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5708 -
C:\Windows\SysWOW64\Jahnag32.exeC:\Windows\system32\Jahnag32.exe100⤵PID:5724
-
C:\Windows\SysWOW64\Jdgjmbnl.exeC:\Windows\system32\Jdgjmbnl.exe101⤵PID:6132
-
C:\Windows\SysWOW64\Jakkgfmf.exeC:\Windows\system32\Jakkgfmf.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5252 -
C:\Windows\SysWOW64\Jheccq32.exeC:\Windows\system32\Jheccq32.exe103⤵PID:5268
-
C:\Windows\SysWOW64\Jookpjlp.exeC:\Windows\system32\Jookpjlp.exe104⤵PID:5284
-
C:\Windows\SysWOW64\Jamhlfkc.exeC:\Windows\system32\Jamhlfkc.exe105⤵PID:5640
-
C:\Windows\SysWOW64\Jhgpipbp.exeC:\Windows\system32\Jhgpipbp.exe106⤵
- Drops file in System32 directory
PID:5656 -
C:\Windows\SysWOW64\Jkelelad.exeC:\Windows\system32\Jkelelad.exe107⤵PID:6160
-
C:\Windows\SysWOW64\Japdbe32.exeC:\Windows\system32\Japdbe32.exe108⤵
- Modifies registry class
PID:6176 -
C:\Windows\SysWOW64\Jdnqna32.exeC:\Windows\system32\Jdnqna32.exe109⤵PID:6260
-
C:\Windows\SysWOW64\Ldglkmbg.exeC:\Windows\system32\Ldglkmbg.exe110⤵
- Drops file in System32 directory
PID:6276 -
C:\Windows\SysWOW64\Mkadhg32.exeC:\Windows\system32\Mkadhg32.exe111⤵PID:6292
-
C:\Windows\SysWOW64\Mnpadc32.exeC:\Windows\system32\Mnpadc32.exe112⤵PID:6320
-
C:\Windows\SysWOW64\Mmaabj32.exeC:\Windows\system32\Mmaabj32.exe113⤵PID:6336
-
C:\Windows\SysWOW64\Mopmnf32.exeC:\Windows\system32\Mopmnf32.exe114⤵
- Drops file in System32 directory
PID:6352 -
C:\Windows\SysWOW64\Mihbgkfk.exeC:\Windows\system32\Mihbgkfk.exe115⤵PID:6368
-
C:\Windows\SysWOW64\Mobjce32.exeC:\Windows\system32\Mobjce32.exe116⤵
- Drops file in System32 directory
PID:6384 -
C:\Windows\SysWOW64\Mbpfpa32.exeC:\Windows\system32\Mbpfpa32.exe117⤵PID:6400
-
C:\Windows\SysWOW64\Meoblllo.exeC:\Windows\system32\Meoblllo.exe118⤵PID:6416
-
C:\Windows\SysWOW64\Mmfkmjla.exeC:\Windows\system32\Mmfkmjla.exe119⤵PID:6432
-
C:\Windows\SysWOW64\Mfnofo32.exeC:\Windows\system32\Mfnofo32.exe120⤵PID:6448
-
C:\Windows\SysWOW64\Miohgjpc.exeC:\Windows\system32\Miohgjpc.exe121⤵PID:6464
-
C:\Windows\SysWOW64\Npipdd32.exeC:\Windows\system32\Npipdd32.exe122⤵
- Modifies registry class
PID:6480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-