Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
182s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 11:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bfca00da960f12bea9bb7c49617d0fb8_JC.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
bfca00da960f12bea9bb7c49617d0fb8_JC.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
bfca00da960f12bea9bb7c49617d0fb8_JC.exe
-
Size
74KB
-
MD5
bfca00da960f12bea9bb7c49617d0fb8
-
SHA1
a0c154a9ae3d262329b51ce0323a2ca0eb89bd29
-
SHA256
d736b4a7ae31f2f0254eb2ca8ea0d2c6d1af8de723ee73386f2488490c1c8f4c
-
SHA512
1d28b69db51e69970e8a39558886549150a9ccb9a3a76781d0fb15dee23431f89d3a6cc0342500b4ef986fa847967cb868506af1b4387ed29eadf876147b82e7
-
SSDEEP
1536:FzNyED66VIJyoOJIDwN5rVcUNdYRvxJfI7RaUMLkw4m:FzhbK0oOJJDHjYFLI7RVMe
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Glgcec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nkfaqkcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ncdckm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofellh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Afhcgjkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bikemiik.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agngqmhf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmgifa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gapoob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Khojqj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ebhlmlhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pjbqaj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okolfkjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Apdodc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apflic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emceag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Opmpenbj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Paoedc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dppiddie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aeommfnf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpbadcbj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kobhkh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mljnoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pihnbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eddlcgjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mfpfbemc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pjpdlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bpkedbka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cabaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Amalcd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boadlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bpdnjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gjjcqpbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Opbjpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Opdffmlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kkkigf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkpbbeda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndmidq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aflmbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kbkgfgam.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmgodc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Haggijgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mjgihdib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pfiafk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Admnob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeommfnf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajelmiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Djhnmj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eogckqkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gpledf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmjekahk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eligoe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebfpglkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aehanfgm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djhnmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qjofljho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bpbadcbj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghqqpd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbkgfgam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nmohjopk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdhhepmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pdhhepmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Chjmmnnb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjbqaj32.exe -
Executes dropped EXE 64 IoCs
pid Process 1884 Qfkgdd32.exe 2720 Aljmbknm.exe 2684 Aebakp32.exe 848 Almihjlj.exe 2516 Afbnec32.exe 2996 Alofnj32.exe 588 Aegkfpah.exe 2696 Bmgifa32.exe 1868 Bhmmcjjd.exe 2240 Bmjekahk.exe 1512 Bbfnchfb.exe 2844 Blobmm32.exe 696 Biccfalm.exe 3024 Ciepkajj.exe 2092 Chjmmnnb.exe 3064 Cabaec32.exe 1560 Cniajdkg.exe 840 Ckmbdh32.exe 2712 Cpjklo32.exe 2384 Ckpoih32.exe 2216 Ddhcbnnn.exe 2248 Dpodgocb.exe 2160 Dflmpebj.exe 2968 Dpaqmnap.exe 2008 Dcpmijqc.exe 2472 Dgkiih32.exe 2236 Djlbkcfn.exe 2764 Dcdfdi32.exe 2804 Edeclabl.exe 2784 Ekpkhkji.exe 1944 Gapoob32.exe 2992 Hmgodc32.exe 472 Hhlcal32.exe 1060 Okolfkjg.exe 2676 Haggijgb.exe 2872 Emceag32.exe 1048 Emilqb32.exe 2360 Efbpihoo.exe 2100 Ebjfiboe.exe 432 Jboanfmm.exe 2172 Qjofljho.exe 1556 Qmmbhegc.exe 816 Qedjib32.exe 112 Qgbfen32.exe 2336 Qjacai32.exe 2196 Afhcgjkq.exe 2920 Ajcpgi32.exe 1176 Amalcd32.exe 1696 Ajelmiag.exe 1996 Acnqen32.exe 1984 Aflmbj32.exe 2724 Aeommfnf.exe 1720 Amfeodoh.exe 2912 Apeakonl.exe 2524 Afojgiei.exe 2616 Aeajcf32.exe 2540 Ahpfoa32.exe 2300 Anjnllbd.exe 1764 Aedghf32.exe 268 Aipbidbj.exe 2700 Alnoepam.exe 2632 Anlkakqa.exe 1396 Bakgmgpe.exe 2844 Bdkpob32.exe -
Loads dropped DLL 64 IoCs
pid Process 2900 bfca00da960f12bea9bb7c49617d0fb8_JC.exe 2900 bfca00da960f12bea9bb7c49617d0fb8_JC.exe 1884 Qfkgdd32.exe 1884 Qfkgdd32.exe 2720 Aljmbknm.exe 2720 Aljmbknm.exe 2684 Aebakp32.exe 2684 Aebakp32.exe 848 Almihjlj.exe 848 Almihjlj.exe 2516 Afbnec32.exe 2516 Afbnec32.exe 2996 Alofnj32.exe 2996 Alofnj32.exe 588 Aegkfpah.exe 588 Aegkfpah.exe 2696 Bmgifa32.exe 2696 Bmgifa32.exe 1868 Bhmmcjjd.exe 1868 Bhmmcjjd.exe 2240 Bmjekahk.exe 2240 Bmjekahk.exe 1512 Bbfnchfb.exe 1512 Bbfnchfb.exe 2844 Blobmm32.exe 2844 Blobmm32.exe 696 Biccfalm.exe 696 Biccfalm.exe 3024 Ciepkajj.exe 3024 Ciepkajj.exe 2092 Chjmmnnb.exe 2092 Chjmmnnb.exe 3064 Cabaec32.exe 3064 Cabaec32.exe 1560 Cniajdkg.exe 1560 Cniajdkg.exe 840 Ckmbdh32.exe 840 Ckmbdh32.exe 2712 Cpjklo32.exe 2712 Cpjklo32.exe 2384 Ckpoih32.exe 2384 Ckpoih32.exe 2216 Ddhcbnnn.exe 2216 Ddhcbnnn.exe 2248 Dpodgocb.exe 2248 Dpodgocb.exe 2160 Dflmpebj.exe 2160 Dflmpebj.exe 2968 Dpaqmnap.exe 2968 Dpaqmnap.exe 2008 Dcpmijqc.exe 2008 Dcpmijqc.exe 2472 Dgkiih32.exe 2472 Dgkiih32.exe 2236 Djlbkcfn.exe 2236 Djlbkcfn.exe 2764 Dcdfdi32.exe 2764 Dcdfdi32.exe 2804 Edeclabl.exe 2804 Edeclabl.exe 2784 Ekpkhkji.exe 2784 Ekpkhkji.exe 1944 Gapoob32.exe 1944 Gapoob32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Lelphbon.exe Lgipmf32.exe File opened for modification C:\Windows\SysWOW64\Labamcdb.exe Lodeahen.exe File opened for modification C:\Windows\SysWOW64\Omcmda32.exe Ofiegggd.exe File opened for modification C:\Windows\SysWOW64\Akbmqmgg.exe Aiaqie32.exe File opened for modification C:\Windows\SysWOW64\Bpkedbka.exe Bjamhh32.exe File opened for modification C:\Windows\SysWOW64\Blobmm32.exe Bbfnchfb.exe File opened for modification C:\Windows\SysWOW64\Ebjfiboe.exe Efbpihoo.exe File created C:\Windows\SysWOW64\Kmqldpab.exe Kbkgfgam.exe File opened for modification C:\Windows\SysWOW64\Nkddkk32.exe Nfglcd32.exe File created C:\Windows\SysWOW64\Foepck32.dll Bphhobmd.exe File created C:\Windows\SysWOW64\Amfeodoh.exe Aeommfnf.exe File created C:\Windows\SysWOW64\Bgkcqbqo.dll Kpjoel32.exe File created C:\Windows\SysWOW64\Ajelmiag.exe Amalcd32.exe File opened for modification C:\Windows\SysWOW64\Ekjjebed.exe Djhnmj32.exe File created C:\Windows\SysWOW64\Glgcec32.exe Gdpkdf32.exe File created C:\Windows\SysWOW64\Agongp32.dll Mqcnjnol.exe File opened for modification C:\Windows\SysWOW64\Ciepkajj.exe Biccfalm.exe File created C:\Windows\SysWOW64\Kgmgdi32.dll Efbpihoo.exe File opened for modification C:\Windows\SysWOW64\Anlkakqa.exe Alnoepam.exe File created C:\Windows\SysWOW64\Apcngn32.dll Dppiddie.exe File created C:\Windows\SysWOW64\Fddfbm32.dll Edbonh32.exe File created C:\Windows\SysWOW64\Lpfnnl32.dll Kkkigf32.exe File opened for modification C:\Windows\SysWOW64\Oflbmg32.exe Opbjpm32.exe File created C:\Windows\SysWOW64\Mhibdl32.dll Opdffmlb.exe File opened for modification C:\Windows\SysWOW64\Qgbfen32.exe Qedjib32.exe File created C:\Windows\SysWOW64\Aeajcf32.exe Afojgiei.exe File opened for modification C:\Windows\SysWOW64\Bfliqmjg.exe Bpbadcbj.exe File opened for modification C:\Windows\SysWOW64\Gdpkdf32.exe Gabohk32.exe File opened for modification C:\Windows\SysWOW64\Mpodoo32.exe Ljelbeke.exe File opened for modification C:\Windows\SysWOW64\Aegkfpah.exe Alofnj32.exe File opened for modification C:\Windows\SysWOW64\Dgkiih32.exe Dcpmijqc.exe File opened for modification C:\Windows\SysWOW64\Nkfaqkcq.exe Ndmidq32.exe File created C:\Windows\SysWOW64\Ljgneg32.dll Ndmidq32.exe File created C:\Windows\SysWOW64\Phdden32.exe Pdhhepmo.exe File created C:\Windows\SysWOW64\Bbehkijc.dll Pdpoeo32.exe File opened for modification C:\Windows\SysWOW64\Aiaqie32.exe Aajhhgpg.exe File created C:\Windows\SysWOW64\Qjacai32.exe Qgbfen32.exe File created C:\Windows\SysWOW64\Alcomf32.dll Nfglcd32.exe File created C:\Windows\SysWOW64\Ogbkakeo.exe Oqhcda32.exe File opened for modification C:\Windows\SysWOW64\Ddhcbnnn.exe Ckpoih32.exe File created C:\Windows\SysWOW64\Oifibb32.dll Lgipmf32.exe File created C:\Windows\SysWOW64\Amalcd32.exe Ajcpgi32.exe File opened for modification C:\Windows\SysWOW64\Aeajcf32.exe Afojgiei.exe File created C:\Windows\SysWOW64\Eligoe32.exe Edbonh32.exe File opened for modification C:\Windows\SysWOW64\Kbikah32.exe Kpjoel32.exe File created C:\Windows\SysWOW64\Mqcnjnol.exe Mneancpi.exe File created C:\Windows\SysWOW64\Nmlgcbei.exe Nfbogh32.exe File opened for modification C:\Windows\SysWOW64\Okolfkjg.exe Hhlcal32.exe File created C:\Windows\SysWOW64\Emceag32.exe Haggijgb.exe File opened for modification C:\Windows\SysWOW64\Pjbqaj32.exe Phdden32.exe File opened for modification C:\Windows\SysWOW64\Cniajdkg.exe Cabaec32.exe File created C:\Windows\SysWOW64\Phbhpo32.exe Pnicgi32.exe File created C:\Windows\SysWOW64\Qlkcjadb.exe Qfnkajfk.exe File opened for modification C:\Windows\SysWOW64\Qoipflcf.exe Qlkcjadb.exe File opened for modification C:\Windows\SysWOW64\Chjmmnnb.exe Ciepkajj.exe File opened for modification C:\Windows\SysWOW64\Bpdnjb32.exe Bikemiik.exe File created C:\Windows\SysWOW64\Fahpaj32.dll Ckmbdh32.exe File created C:\Windows\SysWOW64\Anjnllbd.exe Ahpfoa32.exe File opened for modification C:\Windows\SysWOW64\Dflmpebj.exe Dpodgocb.exe File opened for modification C:\Windows\SysWOW64\Efbpihoo.exe Emilqb32.exe File opened for modification C:\Windows\SysWOW64\Mjgihdib.exe Mgillijo.exe File created C:\Windows\SysWOW64\Bhmmcjjd.exe Bmgifa32.exe File opened for modification C:\Windows\SysWOW64\Dpodgocb.exe Ddhcbnnn.exe File created C:\Windows\SysWOW64\Qoeidfog.dll Bpdnjb32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Djlbkcfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gpledf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kphbom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgqcjacj.dll" Lelphbon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mjgihdib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcoggn32.dll" Oppmkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbclfmph.dll" Apeakonl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ghcmedmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ojbdbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Omaqoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofiegggd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pfiafk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dflmpebj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Haggijgb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afojgiei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ndmidq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcnjqa32.dll" Pdhhepmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qamnbhdj.dll" Bhmmcjjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dpaqmnap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gjjcqpbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nknifeba.dll" Ndofjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pihnbf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Blobmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eogckqkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdfoaq32.dll" Kbkgfgam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gepgni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Khmmkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kojmeg32.dll" Kmqldpab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ohmneokp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pnicgi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cabaec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bakgmgpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlahmcbg.dll" Cioohh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gnhlgoia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phejfdcd.dll" Pjgjmipf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pmefidoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pdmbpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ppdbepon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmkiol32.dll" Edeclabl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gijlagpq.dll" Qedjib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Afhcgjkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmbkgfki.dll" Dbaflm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mcbjfjnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bagaojbj.dll" Opmpenbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmdkqkgp.dll" Qiodcecl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Djhnmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pmefidoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afbnec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmddhe32.dll" Dpodgocb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aeajcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Plkgkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljkaejba.dll" Bbfnchfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aipbidbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlljfo32.dll" Mcbjfjnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcljne32.dll" Acdhen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmffif32.dll" Bdkpob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kmqldpab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ljelbeke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mjlbcd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nfbogh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ogbkakeo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Opmpenbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pjbqaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ekjjebed.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 1884 2900 bfca00da960f12bea9bb7c49617d0fb8_JC.exe 29 PID 2900 wrote to memory of 1884 2900 bfca00da960f12bea9bb7c49617d0fb8_JC.exe 29 PID 2900 wrote to memory of 1884 2900 bfca00da960f12bea9bb7c49617d0fb8_JC.exe 29 PID 2900 wrote to memory of 1884 2900 bfca00da960f12bea9bb7c49617d0fb8_JC.exe 29 PID 1884 wrote to memory of 2720 1884 Qfkgdd32.exe 30 PID 1884 wrote to memory of 2720 1884 Qfkgdd32.exe 30 PID 1884 wrote to memory of 2720 1884 Qfkgdd32.exe 30 PID 1884 wrote to memory of 2720 1884 Qfkgdd32.exe 30 PID 2720 wrote to memory of 2684 2720 Aljmbknm.exe 31 PID 2720 wrote to memory of 2684 2720 Aljmbknm.exe 31 PID 2720 wrote to memory of 2684 2720 Aljmbknm.exe 31 PID 2720 wrote to memory of 2684 2720 Aljmbknm.exe 31 PID 2684 wrote to memory of 848 2684 Aebakp32.exe 32 PID 2684 wrote to memory of 848 2684 Aebakp32.exe 32 PID 2684 wrote to memory of 848 2684 Aebakp32.exe 32 PID 2684 wrote to memory of 848 2684 Aebakp32.exe 32 PID 848 wrote to memory of 2516 848 Almihjlj.exe 33 PID 848 wrote to memory of 2516 848 Almihjlj.exe 33 PID 848 wrote to memory of 2516 848 Almihjlj.exe 33 PID 848 wrote to memory of 2516 848 Almihjlj.exe 33 PID 2516 wrote to memory of 2996 2516 Afbnec32.exe 34 PID 2516 wrote to memory of 2996 2516 Afbnec32.exe 34 PID 2516 wrote to memory of 2996 2516 Afbnec32.exe 34 PID 2516 wrote to memory of 2996 2516 Afbnec32.exe 34 PID 2996 wrote to memory of 588 2996 Alofnj32.exe 35 PID 2996 wrote to memory of 588 2996 Alofnj32.exe 35 PID 2996 wrote to memory of 588 2996 Alofnj32.exe 35 PID 2996 wrote to memory of 588 2996 Alofnj32.exe 35 PID 588 wrote to memory of 2696 588 Aegkfpah.exe 36 PID 588 wrote to memory of 2696 588 Aegkfpah.exe 36 PID 588 wrote to memory of 2696 588 Aegkfpah.exe 36 PID 588 wrote to memory of 2696 588 Aegkfpah.exe 36 PID 2696 wrote to memory of 1868 2696 Bmgifa32.exe 37 PID 2696 wrote to memory of 1868 2696 Bmgifa32.exe 37 PID 2696 wrote to memory of 1868 2696 Bmgifa32.exe 37 PID 2696 wrote to memory of 1868 2696 Bmgifa32.exe 37 PID 1868 wrote to memory of 2240 1868 Bhmmcjjd.exe 38 PID 1868 wrote to memory of 2240 1868 Bhmmcjjd.exe 38 PID 1868 wrote to memory of 2240 1868 Bhmmcjjd.exe 38 PID 1868 wrote to memory of 2240 1868 Bhmmcjjd.exe 38 PID 2240 wrote to memory of 1512 2240 Bmjekahk.exe 39 PID 2240 wrote to memory of 1512 2240 Bmjekahk.exe 39 PID 2240 wrote to memory of 1512 2240 Bmjekahk.exe 39 PID 2240 wrote to memory of 1512 2240 Bmjekahk.exe 39 PID 1512 wrote to memory of 2844 1512 Bbfnchfb.exe 40 PID 1512 wrote to memory of 2844 1512 Bbfnchfb.exe 40 PID 1512 wrote to memory of 2844 1512 Bbfnchfb.exe 40 PID 1512 wrote to memory of 2844 1512 Bbfnchfb.exe 40 PID 2844 wrote to memory of 696 2844 Blobmm32.exe 41 PID 2844 wrote to memory of 696 2844 Blobmm32.exe 41 PID 2844 wrote to memory of 696 2844 Blobmm32.exe 41 PID 2844 wrote to memory of 696 2844 Blobmm32.exe 41 PID 696 wrote to memory of 3024 696 Biccfalm.exe 42 PID 696 wrote to memory of 3024 696 Biccfalm.exe 42 PID 696 wrote to memory of 3024 696 Biccfalm.exe 42 PID 696 wrote to memory of 3024 696 Biccfalm.exe 42 PID 3024 wrote to memory of 2092 3024 Ciepkajj.exe 43 PID 3024 wrote to memory of 2092 3024 Ciepkajj.exe 43 PID 3024 wrote to memory of 2092 3024 Ciepkajj.exe 43 PID 3024 wrote to memory of 2092 3024 Ciepkajj.exe 43 PID 2092 wrote to memory of 3064 2092 Chjmmnnb.exe 44 PID 2092 wrote to memory of 3064 2092 Chjmmnnb.exe 44 PID 2092 wrote to memory of 3064 2092 Chjmmnnb.exe 44 PID 2092 wrote to memory of 3064 2092 Chjmmnnb.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfca00da960f12bea9bb7c49617d0fb8_JC.exe"C:\Users\Admin\AppData\Local\Temp\bfca00da960f12bea9bb7c49617d0fb8_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\Qfkgdd32.exeC:\Windows\system32\Qfkgdd32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\Aljmbknm.exeC:\Windows\system32\Aljmbknm.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Aebakp32.exeC:\Windows\system32\Aebakp32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Almihjlj.exeC:\Windows\system32\Almihjlj.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\Afbnec32.exeC:\Windows\system32\Afbnec32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\Alofnj32.exeC:\Windows\system32\Alofnj32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Aegkfpah.exeC:\Windows\system32\Aegkfpah.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\Bmgifa32.exeC:\Windows\system32\Bmgifa32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Bhmmcjjd.exeC:\Windows\system32\Bhmmcjjd.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\Bmjekahk.exeC:\Windows\system32\Bmjekahk.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\Bbfnchfb.exeC:\Windows\system32\Bbfnchfb.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\Blobmm32.exeC:\Windows\system32\Blobmm32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Biccfalm.exeC:\Windows\system32\Biccfalm.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\Ciepkajj.exeC:\Windows\system32\Ciepkajj.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Chjmmnnb.exeC:\Windows\system32\Chjmmnnb.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Cabaec32.exeC:\Windows\system32\Cabaec32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:3064 -
C:\Windows\SysWOW64\Cniajdkg.exeC:\Windows\system32\Cniajdkg.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1560 -
C:\Windows\SysWOW64\Ckmbdh32.exeC:\Windows\system32\Ckmbdh32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:840 -
C:\Windows\SysWOW64\Cpjklo32.exeC:\Windows\system32\Cpjklo32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2712 -
C:\Windows\SysWOW64\Ckpoih32.exeC:\Windows\system32\Ckpoih32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2384 -
C:\Windows\SysWOW64\Ddhcbnnn.exeC:\Windows\system32\Ddhcbnnn.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2216 -
C:\Windows\SysWOW64\Dpodgocb.exeC:\Windows\system32\Dpodgocb.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2248 -
C:\Windows\SysWOW64\Dflmpebj.exeC:\Windows\system32\Dflmpebj.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2160
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Dcpmijqc.exeC:\Windows\system32\Dcpmijqc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2008 -
C:\Windows\SysWOW64\Dgkiih32.exeC:\Windows\system32\Dgkiih32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472 -
C:\Windows\SysWOW64\Djlbkcfn.exeC:\Windows\system32\Djlbkcfn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2236 -
C:\Windows\SysWOW64\Dcdfdi32.exeC:\Windows\system32\Dcdfdi32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2764 -
C:\Windows\SysWOW64\Edeclabl.exeC:\Windows\system32\Edeclabl.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\Ekpkhkji.exeC:\Windows\system32\Ekpkhkji.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2784 -
C:\Windows\SysWOW64\Gapoob32.exeC:\Windows\system32\Gapoob32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Windows\SysWOW64\Hmgodc32.exeC:\Windows\system32\Hmgodc32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\Hhlcal32.exeC:\Windows\system32\Hhlcal32.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:472 -
C:\Windows\SysWOW64\Okolfkjg.exeC:\Windows\system32\Okolfkjg.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1060 -
C:\Windows\SysWOW64\Haggijgb.exeC:\Windows\system32\Haggijgb.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2676 -
C:\Windows\SysWOW64\Emceag32.exeC:\Windows\system32\Emceag32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2872 -
C:\Windows\SysWOW64\Emilqb32.exeC:\Windows\system32\Emilqb32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1048 -
C:\Windows\SysWOW64\Efbpihoo.exeC:\Windows\system32\Efbpihoo.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\Ebjfiboe.exeC:\Windows\system32\Ebjfiboe.exe15⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\Jboanfmm.exeC:\Windows\system32\Jboanfmm.exe16⤵
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\Qjofljho.exeC:\Windows\system32\Qjofljho.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\Qmmbhegc.exeC:\Windows\system32\Qmmbhegc.exe18⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\Qedjib32.exeC:\Windows\system32\Qedjib32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:816 -
C:\Windows\SysWOW64\Qgbfen32.exeC:\Windows\system32\Qgbfen32.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:112 -
C:\Windows\SysWOW64\Qjacai32.exeC:\Windows\system32\Qjacai32.exe21⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\Afhcgjkq.exeC:\Windows\system32\Afhcgjkq.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2196 -
C:\Windows\SysWOW64\Ajcpgi32.exeC:\Windows\system32\Ajcpgi32.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\Amalcd32.exeC:\Windows\system32\Amalcd32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1176 -
C:\Windows\SysWOW64\Ajelmiag.exeC:\Windows\system32\Ajelmiag.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\Acnqen32.exeC:\Windows\system32\Acnqen32.exe26⤵
- Executes dropped EXE
PID:1996 -
C:\Windows\SysWOW64\Aflmbj32.exeC:\Windows\system32\Aflmbj32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\Aeommfnf.exeC:\Windows\system32\Aeommfnf.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2724 -
C:\Windows\SysWOW64\Amfeodoh.exeC:\Windows\system32\Amfeodoh.exe29⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\Apeakonl.exeC:\Windows\system32\Apeakonl.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:2912 -
C:\Windows\SysWOW64\Afojgiei.exeC:\Windows\system32\Afojgiei.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\Aeajcf32.exeC:\Windows\system32\Aeajcf32.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\Ahpfoa32.exeC:\Windows\system32\Ahpfoa32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\Anjnllbd.exeC:\Windows\system32\Anjnllbd.exe34⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\Aedghf32.exeC:\Windows\system32\Aedghf32.exe35⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\Aipbidbj.exeC:\Windows\system32\Aipbidbj.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:268 -
C:\Windows\SysWOW64\Alnoepam.exeC:\Windows\system32\Alnoepam.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2700 -
C:\Windows\SysWOW64\Anlkakqa.exeC:\Windows\system32\Anlkakqa.exe38⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\Bakgmgpe.exeC:\Windows\system32\Bakgmgpe.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:1396 -
C:\Windows\SysWOW64\Bdkpob32.exeC:\Windows\system32\Bdkpob32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:2844 -
C:\Windows\SysWOW64\Bjehlldb.exeC:\Windows\system32\Bjehlldb.exe41⤵PID:2164
-
C:\Windows\SysWOW64\Boadlk32.exeC:\Windows\system32\Boadlk32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2556 -
C:\Windows\SysWOW64\Bpbadcbj.exeC:\Windows\system32\Bpbadcbj.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:880 -
C:\Windows\SysWOW64\Bfliqmjg.exeC:\Windows\system32\Bfliqmjg.exe44⤵PID:1716
-
C:\Windows\SysWOW64\Bikemiik.exeC:\Windows\system32\Bikemiik.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2688 -
C:\Windows\SysWOW64\Bpdnjb32.exeC:\Windows\system32\Bpdnjb32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1900 -
C:\Windows\SysWOW64\Bbcjfn32.exeC:\Windows\system32\Bbcjfn32.exe47⤵PID:1508
-
C:\Windows\SysWOW64\Bimbbhgh.exeC:\Windows\system32\Bimbbhgh.exe48⤵PID:1096
-
C:\Windows\SysWOW64\Bpgjob32.exeC:\Windows\system32\Bpgjob32.exe49⤵PID:2888
-
C:\Windows\SysWOW64\Bdbfpafn.exeC:\Windows\system32\Bdbfpafn.exe50⤵PID:1980
-
C:\Windows\SysWOW64\Bbegkn32.exeC:\Windows\system32\Bbegkn32.exe51⤵PID:824
-
C:\Windows\SysWOW64\Cioohh32.exeC:\Windows\system32\Cioohh32.exe52⤵
- Modifies registry class
PID:2976 -
C:\Windows\SysWOW64\Dhiacg32.exeC:\Windows\system32\Dhiacg32.exe53⤵PID:1928
-
C:\Windows\SysWOW64\Dppiddie.exeC:\Windows\system32\Dppiddie.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\Dcofqphi.exeC:\Windows\system32\Dcofqphi.exe55⤵PID:1228
-
C:\Windows\SysWOW64\Dbaflm32.exeC:\Windows\system32\Dbaflm32.exe56⤵
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\Djhnmj32.exeC:\Windows\system32\Djhnmj32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\Ekjjebed.exeC:\Windows\system32\Ekjjebed.exe58⤵
- Modifies registry class
PID:1620 -
C:\Windows\SysWOW64\Ecabfpff.exeC:\Windows\system32\Ecabfpff.exe59⤵PID:2136
-
C:\Windows\SysWOW64\Edbonh32.exeC:\Windows\system32\Edbonh32.exe60⤵
- Drops file in System32 directory
PID:2296 -
C:\Windows\SysWOW64\Eligoe32.exeC:\Windows\system32\Eligoe32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1324 -
C:\Windows\SysWOW64\Eogckqkk.exeC:\Windows\system32\Eogckqkk.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2244 -
C:\Windows\SysWOW64\Ebfpglkn.exeC:\Windows\system32\Ebfpglkn.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:884 -
C:\Windows\SysWOW64\Eddlcgjb.exeC:\Windows\system32\Eddlcgjb.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1748 -
C:\Windows\SysWOW64\Ehphdf32.exeC:\Windows\system32\Ehphdf32.exe65⤵PID:2624
-
C:\Windows\SysWOW64\Ekndpa32.exeC:\Windows\system32\Ekndpa32.exe66⤵PID:2736
-
C:\Windows\SysWOW64\Enmplm32.exeC:\Windows\system32\Enmplm32.exe67⤵PID:2620
-
C:\Windows\SysWOW64\Ebhlmlhl.exeC:\Windows\system32\Ebhlmlhl.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2880 -
C:\Windows\SysWOW64\Gekncjfe.exeC:\Windows\system32\Gekncjfe.exe69⤵PID:2500
-
C:\Windows\SysWOW64\Gjhfkqdm.exeC:\Windows\system32\Gjhfkqdm.exe70⤵PID:2984
-
C:\Windows\SysWOW64\Gabohk32.exeC:\Windows\system32\Gabohk32.exe71⤵
- Drops file in System32 directory
PID:548 -
C:\Windows\SysWOW64\Gdpkdf32.exeC:\Windows\system32\Gdpkdf32.exe72⤵
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\Glgcec32.exeC:\Windows\system32\Glgcec32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2672 -
C:\Windows\SysWOW64\Gjjcqpbj.exeC:\Windows\system32\Gjjcqpbj.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:568 -
C:\Windows\SysWOW64\Gadkmj32.exeC:\Windows\system32\Gadkmj32.exe75⤵PID:596
-
C:\Windows\SysWOW64\Gepgni32.exeC:\Windows\system32\Gepgni32.exe76⤵
- Modifies registry class
PID:1868 -
C:\Windows\SysWOW64\Gfadeaho.exeC:\Windows\system32\Gfadeaho.exe77⤵PID:1644
-
C:\Windows\SysWOW64\Gnhlgoia.exeC:\Windows\system32\Gnhlgoia.exe78⤵
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\Gpihog32.exeC:\Windows\system32\Gpihog32.exe79⤵PID:2924
-
C:\Windows\SysWOW64\Ghqqpd32.exeC:\Windows\system32\Ghqqpd32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2792 -
C:\Windows\SysWOW64\Gibmglep.exeC:\Windows\system32\Gibmglep.exe81⤵PID:1356
-
C:\Windows\SysWOW64\Gpledf32.exeC:\Windows\system32\Gpledf32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1504 -
C:\Windows\SysWOW64\Ghcmedmo.exeC:\Windows\system32\Ghcmedmo.exe83⤵
- Modifies registry class
PID:2044 -
C:\Windows\SysWOW64\Hohhfbkl.exeC:\Windows\system32\Hohhfbkl.exe84⤵PID:1756
-
C:\Windows\SysWOW64\Mahlgkgo.exeC:\Windows\system32\Mahlgkgo.exe85⤵PID:2256
-
C:\Windows\SysWOW64\Khmmkj32.exeC:\Windows\system32\Khmmkj32.exe86⤵
- Modifies registry class
PID:1648 -
C:\Windows\SysWOW64\Kfpmfgpn.exeC:\Windows\system32\Kfpmfgpn.exe87⤵PID:2192
-
C:\Windows\SysWOW64\Kkkigf32.exeC:\Windows\system32\Kkkigf32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2232 -
C:\Windows\SysWOW64\Kaeadppc.exeC:\Windows\system32\Kaeadppc.exe89⤵PID:2744
-
C:\Windows\SysWOW64\Kphbom32.exeC:\Windows\system32\Kphbom32.exe90⤵
- Modifies registry class
PID:2600 -
C:\Windows\SysWOW64\Khojqj32.exeC:\Windows\system32\Khojqj32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2532 -
C:\Windows\SysWOW64\Kknfme32.exeC:\Windows\system32\Kknfme32.exe92⤵PID:2988
-
C:\Windows\SysWOW64\Kipfhbmo.exeC:\Windows\system32\Kipfhbmo.exe93⤵PID:2212
-
C:\Windows\SysWOW64\Kpjoel32.exeC:\Windows\system32\Kpjoel32.exe94⤵
- Drops file in System32 directory
PID:1804 -
C:\Windows\SysWOW64\Kbikah32.exeC:\Windows\system32\Kbikah32.exe95⤵PID:2684
-
C:\Windows\SysWOW64\Kkpbbeda.exeC:\Windows\system32\Kkpbbeda.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1936 -
C:\Windows\SysWOW64\Kpmkjlbi.exeC:\Windows\system32\Kpmkjlbi.exe97⤵PID:1656
-
C:\Windows\SysWOW64\Kbkgfgam.exeC:\Windows\system32\Kbkgfgam.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:632 -
C:\Windows\SysWOW64\Kmqldpab.exeC:\Windows\system32\Kmqldpab.exe99⤵
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Kobhkh32.exeC:\Windows\system32\Kobhkh32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1532 -
C:\Windows\SysWOW64\Lgipmf32.exeC:\Windows\system32\Lgipmf32.exe101⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\Lelphbon.exeC:\Windows\system32\Lelphbon.exe102⤵
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Lhjmdn32.exeC:\Windows\system32\Lhjmdn32.exe103⤵PID:1044
-
C:\Windows\SysWOW64\Llfiemfj.exeC:\Windows\system32\Llfiemfj.exe104⤵PID:2576
-
C:\Windows\SysWOW64\Lodeahen.exeC:\Windows\system32\Lodeahen.exe105⤵
- Drops file in System32 directory
PID:2328 -
C:\Windows\SysWOW64\Labamcdb.exeC:\Windows\system32\Labamcdb.exe106⤵PID:996
-
C:\Windows\SysWOW64\Ljelbeke.exeC:\Windows\system32\Ljelbeke.exe107⤵
- Drops file in System32 directory
- Modifies registry class
PID:2336 -
C:\Windows\SysWOW64\Mpodoo32.exeC:\Windows\system32\Mpodoo32.exe108⤵PID:1176
-
C:\Windows\SysWOW64\Mcmpkj32.exeC:\Windows\system32\Mcmpkj32.exe109⤵PID:2200
-
C:\Windows\SysWOW64\Mgillijo.exeC:\Windows\system32\Mgillijo.exe110⤵
- Drops file in System32 directory
PID:1552 -
C:\Windows\SysWOW64\Mjgihdib.exeC:\Windows\system32\Mjgihdib.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:992 -
C:\Windows\SysWOW64\Mpaado32.exeC:\Windows\system32\Mpaado32.exe112⤵PID:1896
-
C:\Windows\SysWOW64\Mgkiaihl.exeC:\Windows\system32\Mgkiaihl.exe113⤵PID:2304
-
C:\Windows\SysWOW64\Mfnime32.exeC:\Windows\system32\Mfnime32.exe114⤵PID:1716
-
C:\Windows\SysWOW64\Mneancpi.exeC:\Windows\system32\Mneancpi.exe115⤵
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Mqcnjnol.exeC:\Windows\system32\Mqcnjnol.exe116⤵
- Drops file in System32 directory
PID:280 -
C:\Windows\SysWOW64\Mcbjfjnp.exeC:\Windows\system32\Mcbjfjnp.exe117⤵
- Modifies registry class
PID:1148 -
C:\Windows\SysWOW64\Mfpfbemc.exeC:\Windows\system32\Mfpfbemc.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1436 -
C:\Windows\SysWOW64\Mjlbcd32.exeC:\Windows\system32\Mjlbcd32.exe119⤵
- Modifies registry class
PID:1988 -
C:\Windows\SysWOW64\Mljnoo32.exeC:\Windows\system32\Mljnoo32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1588 -
C:\Windows\SysWOW64\Moijkk32.exeC:\Windows\system32\Moijkk32.exe121⤵PID:1748
-
C:\Windows\SysWOW64\Mbgggf32.exeC:\Windows\system32\Mbgggf32.exe122⤵PID:2880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-