Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
270s -
max time network
319s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 19:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
db8b643a041f2718696d51dcaf984287_JC.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
db8b643a041f2718696d51dcaf984287_JC.exe
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
db8b643a041f2718696d51dcaf984287_JC.exe
-
Size
125KB
-
MD5
db8b643a041f2718696d51dcaf984287
-
SHA1
f8ee4c4defd1f29a29c126f33ea851c21a7b6933
-
SHA256
ef559e311ac6efd082f372946be39e1b4d5f6bbf2834d73ee20b7fa68bbdf9d2
-
SHA512
9a1fbf5e8704a25fd2b1c09b447e8540605b1733b4e9922377858c788ca3fd8fbcc8d0d347a51cb7d5d0a20c3c3c4dddf53d69bc5ba37cd628275b979ced97aa
-
SSDEEP
3072:6X1Xhn8r1IRJyQGUpcl1WdTCn93OGey/ZhJakrPF:sFhn8IQxYcmTCndOGeKTaG
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jdkolm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qcbndg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbmejg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hlllbobl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmclem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gddppp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejjjef32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkfbbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jacjjbaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ooiemn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Okbcgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eehpoaaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aaaaao32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gckmgi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfqjpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qfqjpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajgidejf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpiobh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Deegjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jkfbbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Egiackkd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jeljeall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jfgnbi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdlncn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbbgde32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhdefo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onnbnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gbcgne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jolingnk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dccbohlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ombflg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjbecgbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qmhegmel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cacjebbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jfiiid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Epdafl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fnjkdcii.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emkcfa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efchog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmpiqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iomdgk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpccfpof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcqfih32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddfllp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjkoch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ahilhikb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnbahg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfqfoeng.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgjedghh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Djmkkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dceodhjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fhngmnij.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Geddla32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdkolm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Anlodd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jeacpq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpmafnbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ombflg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfiiid32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egiackkd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flgfhmdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ejjjef32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aefgao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dccbohlj.exe -
Executes dropped EXE 64 IoCs
pid Process 1888 Cmclem32.exe 2524 Dmhfpmee.exe 2592 Diofenki.exe 1896 Dpiobh32.exe 2932 Deegjo32.exe 1624 Donlcdgn.exe 2156 Dlblmh32.exe 2540 Ddmaak32.exe 1984 Epdafl32.exe 2252 Ekifcd32.exe 652 Elmoqlmh.exe 2268 Eeecibci.exe 2892 Eehpoaaf.exe 1876 Fieiephm.exe 1152 Fhkffl32.exe 1096 Fnjkdcii.exe 1940 Fhpoalho.exe 696 Fnlhibff.exe 2980 Fcipaien.exe 3004 Fnodob32.exe 2164 Gckmgi32.exe 2332 Gjeedcjh.exe 860 Ghkbepop.exe 3020 Gbcgne32.exe 848 Gcbchhmc.exe 2104 Gddppp32.exe 2180 Gnldhf32.exe 1588 Gfclic32.exe 2772 Hbjmodph.exe 2544 Hekfpo32.exe 2828 Jddhknpg.exe 1880 Jmmmdd32.exe 2248 Jolingnk.exe 2572 Jdibfn32.exe 2208 Jfgnbi32.exe 312 Jmafocbb.exe 1596 Jdkolm32.exe 876 Jgjkhi32.exe 1852 Jmdcecpp.exe 1460 Koodlbeh.exe 2052 Gingqjgd.exe 300 Knidfm32.exe 964 Pkpboe32.exe 1972 Pamkgl32.exe 1356 Pnalqqbf.exe 2188 Pijmanoe.exe 2024 Qcpang32.exe 2436 Qjjikafh.exe 2296 Qmhegmel.exe 1452 Qcbndg32.exe 2972 Qfqjpb32.exe 908 Amkbmlci.exe 1660 Anlodd32.exe 1584 Aefgao32.exe 2492 Ahilhikb.exe 2480 Ajgidejf.exe 2968 Aaaaao32.exe 2368 Adpmmj32.exe 2276 Ajjejdhc.exe 1080 Amhafpgg.exe 2392 Bdbjcj32.exe 1668 Bfqfoeng.exe 2360 Bgglpd32.exe 2808 Bhiigmnn.exe -
Loads dropped DLL 64 IoCs
pid Process 2604 db8b643a041f2718696d51dcaf984287_JC.exe 2604 db8b643a041f2718696d51dcaf984287_JC.exe 1888 Cmclem32.exe 1888 Cmclem32.exe 2524 Dmhfpmee.exe 2524 Dmhfpmee.exe 2592 Diofenki.exe 2592 Diofenki.exe 1896 Dpiobh32.exe 1896 Dpiobh32.exe 2932 Deegjo32.exe 2932 Deegjo32.exe 1624 Donlcdgn.exe 1624 Donlcdgn.exe 2156 Dlblmh32.exe 2156 Dlblmh32.exe 2540 Ddmaak32.exe 2540 Ddmaak32.exe 1984 Epdafl32.exe 1984 Epdafl32.exe 2252 Ekifcd32.exe 2252 Ekifcd32.exe 652 Elmoqlmh.exe 652 Elmoqlmh.exe 2268 Eeecibci.exe 2268 Eeecibci.exe 2892 Eehpoaaf.exe 2892 Eehpoaaf.exe 1876 Fieiephm.exe 1876 Fieiephm.exe 1152 Fhkffl32.exe 1152 Fhkffl32.exe 1096 Fnjkdcii.exe 1096 Fnjkdcii.exe 1940 Fhpoalho.exe 1940 Fhpoalho.exe 696 Fnlhibff.exe 696 Fnlhibff.exe 2980 Fcipaien.exe 2980 Fcipaien.exe 3004 Fnodob32.exe 3004 Fnodob32.exe 2164 Gckmgi32.exe 2164 Gckmgi32.exe 2332 Gjeedcjh.exe 2332 Gjeedcjh.exe 860 Ghkbepop.exe 860 Ghkbepop.exe 3020 Gbcgne32.exe 3020 Gbcgne32.exe 848 Gcbchhmc.exe 848 Gcbchhmc.exe 2104 Gddppp32.exe 2104 Gddppp32.exe 2180 Gnldhf32.exe 2180 Gnldhf32.exe 1588 Gfclic32.exe 1588 Gfclic32.exe 2772 Hbjmodph.exe 2772 Hbjmodph.exe 2544 Hekfpo32.exe 2544 Hekfpo32.exe 2828 Jddhknpg.exe 2828 Jddhknpg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Lpoinb32.dll Dmhfpmee.exe File created C:\Windows\SysWOW64\Jplkmd32.dll Gddppp32.exe File created C:\Windows\SysWOW64\Ailmoc32.dll Emkcfa32.exe File created C:\Windows\SysWOW64\Dpiobh32.exe Diofenki.exe File opened for modification C:\Windows\SysWOW64\Dpiobh32.exe Diofenki.exe File created C:\Windows\SysWOW64\Jbbgde32.exe Jjkoch32.exe File created C:\Windows\SysWOW64\Eighek32.dll Fcipaien.exe File created C:\Windows\SysWOW64\Dloadlan.dll Pamkgl32.exe File created C:\Windows\SysWOW64\Dclbco32.dll Ahilhikb.exe File opened for modification C:\Windows\SysWOW64\Flgfhmdf.exe Ffjnpeen.exe File created C:\Windows\SysWOW64\Hlkaje32.dll Jeofka32.exe File created C:\Windows\SysWOW64\Dmhfpmee.exe Cmclem32.exe File opened for modification C:\Windows\SysWOW64\Jolingnk.exe Jmmmdd32.exe File created C:\Windows\SysWOW64\Ahilhikb.exe Aefgao32.exe File opened for modification C:\Windows\SysWOW64\Fpqfcl32.exe Fbmejg32.exe File opened for modification C:\Windows\SysWOW64\Epdafl32.exe Ddmaak32.exe File opened for modification C:\Windows\SysWOW64\Knidfm32.exe Gingqjgd.exe File created C:\Windows\SysWOW64\Bdbjcj32.exe Amhafpgg.exe File created C:\Windows\SysWOW64\Ikndiaof.dll Joanbjkb.exe File opened for modification C:\Windows\SysWOW64\Jfiiid32.exe Jnbahg32.exe File created C:\Windows\SysWOW64\Jgooll32.exe Jeacpq32.exe File created C:\Windows\SysWOW64\Eafgiapo.dll Jjphngdl.exe File opened for modification C:\Windows\SysWOW64\Fnlhibff.exe Fhpoalho.exe File opened for modification C:\Windows\SysWOW64\Koodlbeh.exe Jmdcecpp.exe File opened for modification C:\Windows\SysWOW64\Ajgidejf.exe Ahilhikb.exe File created C:\Windows\SysWOW64\Dceodhjg.exe Djmkkb32.exe File opened for modification C:\Windows\SysWOW64\Cmclem32.exe db8b643a041f2718696d51dcaf984287_JC.exe File opened for modification C:\Windows\SysWOW64\Gcbchhmc.exe Gbcgne32.exe File created C:\Windows\SysWOW64\Nejcehnf.dll Fbmejg32.exe File created C:\Windows\SysWOW64\Oehkkddl.exe Onnbnj32.exe File created C:\Windows\SysWOW64\Halmme32.dll Jacjjbaq.exe File created C:\Windows\SysWOW64\Eeecibci.exe Elmoqlmh.exe File created C:\Windows\SysWOW64\Kbdikmpd.dll Gingqjgd.exe File created C:\Windows\SysWOW64\Aefgao32.exe Anlodd32.exe File created C:\Windows\SysWOW64\Ebhgaocg.dll Dcqfih32.exe File created C:\Windows\SysWOW64\Fnjkdcii.exe Fhkffl32.exe File created C:\Windows\SysWOW64\Bgglpd32.exe Bfqfoeng.exe File opened for modification C:\Windows\SysWOW64\Ooiemn32.exe Ldallo32.exe File created C:\Windows\SysWOW64\Knidfm32.exe Gingqjgd.exe File opened for modification C:\Windows\SysWOW64\Baampb32.exe Bocadg32.exe File created C:\Windows\SysWOW64\Donlcdgn.exe Deegjo32.exe File created C:\Windows\SysWOW64\Lkmhbpqc.dll Fhkffl32.exe File created C:\Windows\SysWOW64\Lfefchpb.dll Gcbchhmc.exe File created C:\Windows\SysWOW64\Pffdfm32.dll Gnldhf32.exe File opened for modification C:\Windows\SysWOW64\Jcfpam32.exe Jmlhdc32.exe File created C:\Windows\SysWOW64\Ejnjlm32.dll Diofenki.exe File created C:\Windows\SysWOW64\Cacjebbl.exe Ckjaih32.exe File opened for modification C:\Windows\SysWOW64\Ejjjef32.exe Ebofpc32.exe File created C:\Windows\SysWOW64\Ibkacfok.exe Iomdgk32.exe File created C:\Windows\SysWOW64\Ajjejdhc.exe Adpmmj32.exe File opened for modification C:\Windows\SysWOW64\Bhiigmnn.exe Bgglpd32.exe File created C:\Windows\SysWOW64\Nicbejbc.dll Fpqfcl32.exe File created C:\Windows\SysWOW64\Blohop32.dll Hahdjfqc.exe File created C:\Windows\SysWOW64\Jhnmkopa.dll Knidfm32.exe File created C:\Windows\SysWOW64\Jeacpq32.exe Jbbgde32.exe File created C:\Windows\SysWOW64\Epdafl32.exe Ddmaak32.exe File created C:\Windows\SysWOW64\Miocfn32.dll Eeecibci.exe File opened for modification C:\Windows\SysWOW64\Fieiephm.exe Eehpoaaf.exe File created C:\Windows\SysWOW64\Cogomh32.dll Jgjkhi32.exe File created C:\Windows\SysWOW64\Ogdjap32.exe Oqjbdfne.exe File opened for modification C:\Windows\SysWOW64\Oehkkddl.exe Onnbnj32.exe File created C:\Windows\SysWOW64\Nkapdb32.dll Ekifcd32.exe File opened for modification C:\Windows\SysWOW64\Amhafpgg.exe Ajjejdhc.exe File created C:\Windows\SysWOW64\Dcqfih32.exe Dpbjmm32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gingqjgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Knidfm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dpiobh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gckmgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pkpboe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Diofenki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gfclic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jddhknpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjfhdham.dll" Egiackkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Amkbmlci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nejcehnf.dll" Fbmejg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ldallo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Deegjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgfalpog.dll" Hekfpo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dceodhjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hahdjfqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dilmllog.dll" Jbbgde32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cmclem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dolpiipk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gifjeeip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gdlncn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgcgncml.dll" Qcbndg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cdbfanao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dqagohnf.dll" Ejmgjf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jkfbbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Geddla32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gddppp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cogomh32.dll" Jgjkhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jeljeall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmllhi32.dll" Jeacpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ejjjef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eqfogp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hahdjfqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fhpoalho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gddppp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Imohko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfmomnpf.dll" Ecbonloe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Elmoqlmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Adpmmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnnknj32.dll" Ajjejdhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnfknj32.dll" Bdbjcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Miocfn32.dll" Eeecibci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ajjejdhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekdahg32.dll" Dffhfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekmijp32.dll" Jeljeall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jjphngdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efkglqja.dll" Okbcgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jgjkhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fpqfcl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fhpdbmgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gdiamnki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iokjjdin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pnalqqbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hlllbobl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njoglg32.dll" Imohko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jmlhdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Emkcfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbmnmf32.dll" Jjnlhg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iokjjdin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgijal32.dll" Qnedbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fnlhibff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eglagllf.dll" Pkpboe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bogmmc32.dll" Cdbfanao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alldjd32.dll" Cklnog32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 1888 2604 db8b643a041f2718696d51dcaf984287_JC.exe 27 PID 2604 wrote to memory of 1888 2604 db8b643a041f2718696d51dcaf984287_JC.exe 27 PID 2604 wrote to memory of 1888 2604 db8b643a041f2718696d51dcaf984287_JC.exe 27 PID 2604 wrote to memory of 1888 2604 db8b643a041f2718696d51dcaf984287_JC.exe 27 PID 1888 wrote to memory of 2524 1888 Cmclem32.exe 28 PID 1888 wrote to memory of 2524 1888 Cmclem32.exe 28 PID 1888 wrote to memory of 2524 1888 Cmclem32.exe 28 PID 1888 wrote to memory of 2524 1888 Cmclem32.exe 28 PID 2524 wrote to memory of 2592 2524 Dmhfpmee.exe 29 PID 2524 wrote to memory of 2592 2524 Dmhfpmee.exe 29 PID 2524 wrote to memory of 2592 2524 Dmhfpmee.exe 29 PID 2524 wrote to memory of 2592 2524 Dmhfpmee.exe 29 PID 2592 wrote to memory of 1896 2592 Diofenki.exe 30 PID 2592 wrote to memory of 1896 2592 Diofenki.exe 30 PID 2592 wrote to memory of 1896 2592 Diofenki.exe 30 PID 2592 wrote to memory of 1896 2592 Diofenki.exe 30 PID 1896 wrote to memory of 2932 1896 Dpiobh32.exe 40 PID 1896 wrote to memory of 2932 1896 Dpiobh32.exe 40 PID 1896 wrote to memory of 2932 1896 Dpiobh32.exe 40 PID 1896 wrote to memory of 2932 1896 Dpiobh32.exe 40 PID 2932 wrote to memory of 1624 2932 Deegjo32.exe 31 PID 2932 wrote to memory of 1624 2932 Deegjo32.exe 31 PID 2932 wrote to memory of 1624 2932 Deegjo32.exe 31 PID 2932 wrote to memory of 1624 2932 Deegjo32.exe 31 PID 1624 wrote to memory of 2156 1624 Donlcdgn.exe 32 PID 1624 wrote to memory of 2156 1624 Donlcdgn.exe 32 PID 1624 wrote to memory of 2156 1624 Donlcdgn.exe 32 PID 1624 wrote to memory of 2156 1624 Donlcdgn.exe 32 PID 2156 wrote to memory of 2540 2156 Dlblmh32.exe 35 PID 2156 wrote to memory of 2540 2156 Dlblmh32.exe 35 PID 2156 wrote to memory of 2540 2156 Dlblmh32.exe 35 PID 2156 wrote to memory of 2540 2156 Dlblmh32.exe 35 PID 2540 wrote to memory of 1984 2540 Ddmaak32.exe 34 PID 2540 wrote to memory of 1984 2540 Ddmaak32.exe 34 PID 2540 wrote to memory of 1984 2540 Ddmaak32.exe 34 PID 2540 wrote to memory of 1984 2540 Ddmaak32.exe 34 PID 1984 wrote to memory of 2252 1984 Epdafl32.exe 33 PID 1984 wrote to memory of 2252 1984 Epdafl32.exe 33 PID 1984 wrote to memory of 2252 1984 Epdafl32.exe 33 PID 1984 wrote to memory of 2252 1984 Epdafl32.exe 33 PID 2252 wrote to memory of 652 2252 Ekifcd32.exe 36 PID 2252 wrote to memory of 652 2252 Ekifcd32.exe 36 PID 2252 wrote to memory of 652 2252 Ekifcd32.exe 36 PID 2252 wrote to memory of 652 2252 Ekifcd32.exe 36 PID 652 wrote to memory of 2268 652 Elmoqlmh.exe 37 PID 652 wrote to memory of 2268 652 Elmoqlmh.exe 37 PID 652 wrote to memory of 2268 652 Elmoqlmh.exe 37 PID 652 wrote to memory of 2268 652 Elmoqlmh.exe 37 PID 2268 wrote to memory of 2892 2268 Eeecibci.exe 38 PID 2268 wrote to memory of 2892 2268 Eeecibci.exe 38 PID 2268 wrote to memory of 2892 2268 Eeecibci.exe 38 PID 2268 wrote to memory of 2892 2268 Eeecibci.exe 38 PID 2892 wrote to memory of 1876 2892 Eehpoaaf.exe 39 PID 2892 wrote to memory of 1876 2892 Eehpoaaf.exe 39 PID 2892 wrote to memory of 1876 2892 Eehpoaaf.exe 39 PID 2892 wrote to memory of 1876 2892 Eehpoaaf.exe 39 PID 1876 wrote to memory of 1152 1876 Fieiephm.exe 41 PID 1876 wrote to memory of 1152 1876 Fieiephm.exe 41 PID 1876 wrote to memory of 1152 1876 Fieiephm.exe 41 PID 1876 wrote to memory of 1152 1876 Fieiephm.exe 41 PID 1152 wrote to memory of 1096 1152 Fhkffl32.exe 42 PID 1152 wrote to memory of 1096 1152 Fhkffl32.exe 42 PID 1152 wrote to memory of 1096 1152 Fhkffl32.exe 42 PID 1152 wrote to memory of 1096 1152 Fhkffl32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\db8b643a041f2718696d51dcaf984287_JC.exe"C:\Users\Admin\AppData\Local\Temp\db8b643a041f2718696d51dcaf984287_JC.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\Cmclem32.exeC:\Windows\system32\Cmclem32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\Dmhfpmee.exeC:\Windows\system32\Dmhfpmee.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\Diofenki.exeC:\Windows\system32\Diofenki.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\Dpiobh32.exeC:\Windows\system32\Dpiobh32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\Deegjo32.exeC:\Windows\system32\Deegjo32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2932
-
-
-
-
-
-
C:\Windows\SysWOW64\Donlcdgn.exeC:\Windows\system32\Donlcdgn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\Dlblmh32.exeC:\Windows\system32\Dlblmh32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\Ddmaak32.exeC:\Windows\system32\Ddmaak32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2540
-
-
-
C:\Windows\SysWOW64\Ekifcd32.exeC:\Windows\system32\Ekifcd32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Elmoqlmh.exeC:\Windows\system32\Elmoqlmh.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\Eeecibci.exeC:\Windows\system32\Eeecibci.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\Eehpoaaf.exeC:\Windows\system32\Eehpoaaf.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\Fieiephm.exeC:\Windows\system32\Fieiephm.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\Fhkffl32.exeC:\Windows\system32\Fhkffl32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\Fnjkdcii.exeC:\Windows\system32\Fnjkdcii.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1096 -
C:\Windows\SysWOW64\Fhpoalho.exeC:\Windows\system32\Fhpoalho.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1940 -
C:\Windows\SysWOW64\Fnlhibff.exeC:\Windows\system32\Fnlhibff.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:696
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Epdafl32.exeC:\Windows\system32\Epdafl32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984
-
C:\Windows\SysWOW64\Fcipaien.exeC:\Windows\system32\Fcipaien.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2980 -
C:\Windows\SysWOW64\Fnodob32.exeC:\Windows\system32\Fnodob32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004 -
C:\Windows\SysWOW64\Gckmgi32.exeC:\Windows\system32\Gckmgi32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2164
-
-
-
C:\Windows\SysWOW64\Gjeedcjh.exeC:\Windows\system32\Gjeedcjh.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2332 -
C:\Windows\SysWOW64\Ghkbepop.exeC:\Windows\system32\Ghkbepop.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:860 -
C:\Windows\SysWOW64\Gbcgne32.exeC:\Windows\system32\Gbcgne32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3020 -
C:\Windows\SysWOW64\Gcbchhmc.exeC:\Windows\system32\Gcbchhmc.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:848 -
C:\Windows\SysWOW64\Gddppp32.exeC:\Windows\system32\Gddppp32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2104 -
C:\Windows\SysWOW64\Gnldhf32.exeC:\Windows\system32\Gnldhf32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2180
-
-
-
-
-
-
C:\Windows\SysWOW64\Gfclic32.exeC:\Windows\system32\Gfclic32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1588 -
C:\Windows\SysWOW64\Hbjmodph.exeC:\Windows\system32\Hbjmodph.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2772 -
C:\Windows\SysWOW64\Hekfpo32.exeC:\Windows\system32\Hekfpo32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2544
-
-
-
C:\Windows\SysWOW64\Jddhknpg.exeC:\Windows\system32\Jddhknpg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2828 -
C:\Windows\SysWOW64\Jmmmdd32.exeC:\Windows\system32\Jmmmdd32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1880 -
C:\Windows\SysWOW64\Jolingnk.exeC:\Windows\system32\Jolingnk.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\Jdibfn32.exeC:\Windows\system32\Jdibfn32.exe4⤵
- Executes dropped EXE
PID:2572 -
C:\Windows\SysWOW64\Jfgnbi32.exeC:\Windows\system32\Jfgnbi32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2208 -
C:\Windows\SysWOW64\Jmafocbb.exeC:\Windows\system32\Jmafocbb.exe6⤵
- Executes dropped EXE
PID:312 -
C:\Windows\SysWOW64\Jdkolm32.exeC:\Windows\system32\Jdkolm32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\Jgjkhi32.exeC:\Windows\system32\Jgjkhi32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:876 -
C:\Windows\SysWOW64\Jmdcecpp.exeC:\Windows\system32\Jmdcecpp.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1852 -
C:\Windows\SysWOW64\Koodlbeh.exeC:\Windows\system32\Koodlbeh.exe10⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\Gingqjgd.exeC:\Windows\system32\Gingqjgd.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\Knidfm32.exeC:\Windows\system32\Knidfm32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:300 -
C:\Windows\SysWOW64\Pkpboe32.exeC:\Windows\system32\Pkpboe32.exe13⤵
- Executes dropped EXE
- Modifies registry class
PID:964 -
C:\Windows\SysWOW64\Pamkgl32.exeC:\Windows\system32\Pamkgl32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1972 -
C:\Windows\SysWOW64\Pnalqqbf.exeC:\Windows\system32\Pnalqqbf.exe15⤵
- Executes dropped EXE
- Modifies registry class
PID:1356 -
C:\Windows\SysWOW64\Pijmanoe.exeC:\Windows\system32\Pijmanoe.exe16⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\Qcpang32.exeC:\Windows\system32\Qcpang32.exe17⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\Qjjikafh.exeC:\Windows\system32\Qjjikafh.exe18⤵
- Executes dropped EXE
PID:2436 -
C:\Windows\SysWOW64\Qmhegmel.exeC:\Windows\system32\Qmhegmel.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\Qcbndg32.exeC:\Windows\system32\Qcbndg32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1452 -
C:\Windows\SysWOW64\Qfqjpb32.exeC:\Windows\system32\Qfqjpb32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\Amkbmlci.exeC:\Windows\system32\Amkbmlci.exe22⤵
- Executes dropped EXE
- Modifies registry class
PID:908 -
C:\Windows\SysWOW64\Anlodd32.exeC:\Windows\system32\Anlodd32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1660 -
C:\Windows\SysWOW64\Aefgao32.exeC:\Windows\system32\Aefgao32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\Ahilhikb.exeC:\Windows\system32\Ahilhikb.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Ajgidejf.exeC:\Windows\system32\Ajgidejf.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2480 -
C:\Windows\SysWOW64\Aaaaao32.exeC:\Windows\system32\Aaaaao32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\Adpmmj32.exeC:\Windows\system32\Adpmmj32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2368 -
C:\Windows\SysWOW64\Ajjejdhc.exeC:\Windows\system32\Ajjejdhc.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Amhafpgg.exeC:\Windows\system32\Amhafpgg.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1080 -
C:\Windows\SysWOW64\Bdbjcj32.exeC:\Windows\system32\Bdbjcj32.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:2392 -
C:\Windows\SysWOW64\Bfqfoeng.exeC:\Windows\system32\Bfqfoeng.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\Bgglpd32.exeC:\Windows\system32\Bgglpd32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\Bhiigmnn.exeC:\Windows\system32\Bhiigmnn.exe34⤵
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\Bocadg32.exeC:\Windows\system32\Bocadg32.exe35⤵
- Drops file in System32 directory
PID:776 -
C:\Windows\SysWOW64\Baampb32.exeC:\Windows\system32\Baampb32.exe36⤵PID:2256
-
C:\Windows\SysWOW64\Ckjaih32.exeC:\Windows\system32\Ckjaih32.exe37⤵
- Drops file in System32 directory
PID:2568 -
C:\Windows\SysWOW64\Cacjebbl.exeC:\Windows\system32\Cacjebbl.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2504 -
C:\Windows\SysWOW64\Cdbfanao.exeC:\Windows\system32\Cdbfanao.exe39⤵
- Modifies registry class
PID:2940 -
C:\Windows\SysWOW64\Cklnog32.exeC:\Windows\system32\Cklnog32.exe40⤵
- Modifies registry class
PID:1984 -
C:\Windows\SysWOW64\Caffkapi.exeC:\Windows\system32\Caffkapi.exe41⤵PID:1992
-
C:\Windows\SysWOW64\Cgbochop.exeC:\Windows\system32\Cgbochop.exe42⤵PID:1940
-
C:\Windows\SysWOW64\Dgjedghh.exeC:\Windows\system32\Dgjedghh.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1856 -
C:\Windows\SysWOW64\Dpbjmm32.exeC:\Windows\system32\Dpbjmm32.exe44⤵
- Drops file in System32 directory
PID:3020 -
C:\Windows\SysWOW64\Dcqfih32.exeC:\Windows\system32\Dcqfih32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\Djjnfbei.exeC:\Windows\system32\Djjnfbei.exe46⤵PID:2212
-
C:\Windows\SysWOW64\Dccbohlj.exeC:\Windows\system32\Dccbohlj.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1904 -
C:\Windows\SysWOW64\Djmkkb32.exeC:\Windows\system32\Djmkkb32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1520 -
C:\Windows\SysWOW64\Dceodhjg.exeC:\Windows\system32\Dceodhjg.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1232 -
C:\Windows\SysWOW64\Ddfllp32.exeC:\Windows\system32\Ddfllp32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1296 -
C:\Windows\SysWOW64\Dolpiipk.exeC:\Windows\system32\Dolpiipk.exe51⤵
- Modifies registry class
PID:2988 -
C:\Windows\SysWOW64\Dffhfc32.exeC:\Windows\system32\Dffhfc32.exe52⤵
- Modifies registry class
PID:1476 -
C:\Windows\SysWOW64\Ehgagn32.exeC:\Windows\system32\Ehgagn32.exe53⤵PID:1612
-
C:\Windows\SysWOW64\Egiackkd.exeC:\Windows\system32\Egiackkd.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3028 -
C:\Windows\SysWOW64\Ebofpc32.exeC:\Windows\system32\Ebofpc32.exe55⤵
- Drops file in System32 directory
PID:1196 -
C:\Windows\SysWOW64\Ejjjef32.exeC:\Windows\system32\Ejjjef32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3060 -
C:\Windows\SysWOW64\Eqdbapoa.exeC:\Windows\system32\Eqdbapoa.exe57⤵PID:1736
-
C:\Windows\SysWOW64\Ecbonloe.exeC:\Windows\system32\Ecbonloe.exe58⤵
- Modifies registry class
PID:2220 -
C:\Windows\SysWOW64\Egnknj32.exeC:\Windows\system32\Egnknj32.exe59⤵PID:1684
-
C:\Windows\SysWOW64\Ejmgjf32.exeC:\Windows\system32\Ejmgjf32.exe60⤵
- Modifies registry class
PID:2496 -
C:\Windows\SysWOW64\Emkcfa32.exeC:\Windows\system32\Emkcfa32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2716 -
C:\Windows\SysWOW64\Eqfogp32.exeC:\Windows\system32\Eqfogp32.exe62⤵
- Modifies registry class
PID:2512 -
C:\Windows\SysWOW64\Efchog32.exeC:\Windows\system32\Efchog32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2308 -
C:\Windows\SysWOW64\Eqilmp32.exeC:\Windows\system32\Eqilmp32.exe64⤵PID:376
-
C:\Windows\SysWOW64\Fbmejg32.exeC:\Windows\system32\Fbmejg32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1376 -
C:\Windows\SysWOW64\Fpqfcl32.exeC:\Windows\system32\Fpqfcl32.exe66⤵
- Drops file in System32 directory
- Modifies registry class
PID:1784 -
C:\Windows\SysWOW64\Ffjnpeen.exeC:\Windows\system32\Ffjnpeen.exe67⤵
- Drops file in System32 directory
PID:2752 -
C:\Windows\SysWOW64\Flgfhmdf.exeC:\Windows\system32\Flgfhmdf.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2120 -
C:\Windows\SysWOW64\Fbaoegkb.exeC:\Windows\system32\Fbaoegkb.exe69⤵PID:1748
-
C:\Windows\SysWOW64\Fhngmnij.exeC:\Windows\system32\Fhngmnij.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2864 -
C:\Windows\SysWOW64\Fbckjfip.exeC:\Windows\system32\Fbckjfip.exe71⤵PID:1068
-
C:\Windows\SysWOW64\Fhpdbmgg.exeC:\Windows\system32\Fhpdbmgg.exe72⤵
- Modifies registry class
PID:1300 -
C:\Windows\SysWOW64\Fnjlog32.exeC:\Windows\system32\Fnjlog32.exe73⤵PID:2892
-
C:\Windows\SysWOW64\Geddla32.exeC:\Windows\system32\Geddla32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Gnmiegma.exeC:\Windows\system32\Gnmiegma.exe75⤵PID:1892
-
C:\Windows\SysWOW64\Gmpiqd32.exeC:\Windows\system32\Gmpiqd32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:848 -
C:\Windows\SysWOW64\Gdiamnki.exeC:\Windows\system32\Gdiamnki.exe77⤵
- Modifies registry class
PID:2544 -
C:\Windows\SysWOW64\Gifjeeip.exeC:\Windows\system32\Gifjeeip.exe78⤵
- Modifies registry class
PID:2248 -
C:\Windows\SysWOW64\Gdlncn32.exeC:\Windows\system32\Gdlncn32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1160 -
C:\Windows\SysWOW64\Hlllbobl.exeC:\Windows\system32\Hlllbobl.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Hahdjfqc.exeC:\Windows\system32\Hahdjfqc.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:2928 -
C:\Windows\SysWOW64\Qnedbh32.exeC:\Windows\system32\Qnedbh32.exe82⤵
- Modifies registry class
PID:2720 -
C:\Windows\SysWOW64\Dacdlqpc.exeC:\Windows\system32\Dacdlqpc.exe83⤵PID:2528
-
C:\Windows\SysWOW64\Ombflg32.exeC:\Windows\system32\Ombflg32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2500 -
C:\Windows\SysWOW64\Imohko32.exeC:\Windows\system32\Imohko32.exe85⤵
- Modifies registry class
PID:2960 -
C:\Windows\SysWOW64\Iomdgk32.exeC:\Windows\system32\Iomdgk32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\Ibkacfok.exeC:\Windows\system32\Ibkacfok.exe87⤵PID:2784
-
C:\Windows\SysWOW64\Ifgmde32.exeC:\Windows\system32\Ifgmde32.exe88⤵PID:2768
-
C:\Windows\SysWOW64\Jkdell32.exeC:\Windows\system32\Jkdell32.exe89⤵PID:788
-
C:\Windows\SysWOW64\Jnbahg32.exeC:\Windows\system32\Jnbahg32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1712 -
C:\Windows\SysWOW64\Jfiiid32.exeC:\Windows\system32\Jfiiid32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1224 -
C:\Windows\SysWOW64\Jeljeall.exeC:\Windows\system32\Jeljeall.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2540 -
C:\Windows\SysWOW64\Jkfbbk32.exeC:\Windows\system32\Jkfbbk32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:696 -
C:\Windows\SysWOW64\Joanbjkb.exeC:\Windows\system32\Joanbjkb.exe94⤵
- Drops file in System32 directory
PID:1960 -
C:\Windows\SysWOW64\Jacjjbaq.exeC:\Windows\system32\Jacjjbaq.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2300 -
C:\Windows\SysWOW64\Jeofka32.exeC:\Windows\system32\Jeofka32.exe96⤵
- Drops file in System32 directory
PID:1088 -
C:\Windows\SysWOW64\Jjkoch32.exeC:\Windows\system32\Jjkoch32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\Jbbgde32.exeC:\Windows\system32\Jbbgde32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1952 -
C:\Windows\SysWOW64\Jeacpq32.exeC:\Windows\system32\Jeacpq32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1924 -
C:\Windows\SysWOW64\Jgooll32.exeC:\Windows\system32\Jgooll32.exe100⤵PID:1212
-
C:\Windows\SysWOW64\Jjnlhg32.exeC:\Windows\system32\Jjnlhg32.exe101⤵
- Modifies registry class
PID:996 -
C:\Windows\SysWOW64\Jmlhdc32.exeC:\Windows\system32\Jmlhdc32.exe102⤵
- Drops file in System32 directory
- Modifies registry class
PID:924 -
C:\Windows\SysWOW64\Jcfpam32.exeC:\Windows\system32\Jcfpam32.exe103⤵PID:1884
-
C:\Windows\SysWOW64\Jjphngdl.exeC:\Windows\system32\Jjphngdl.exe104⤵
- Drops file in System32 directory
- Modifies registry class
PID:276 -
C:\Windows\SysWOW64\Jmndjbco.exeC:\Windows\system32\Jmndjbco.exe105⤵PID:1800
-
C:\Windows\SysWOW64\Jpmafnbc.exeC:\Windows\system32\Jpmafnbc.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2692 -
C:\Windows\SysWOW64\Kjbecgbi.exeC:\Windows\system32\Kjbecgbi.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1616 -
C:\Windows\SysWOW64\Kmqapbam.exeC:\Windows\system32\Kmqapbam.exe108⤵PID:2840
-
C:\Windows\SysWOW64\Lhdefo32.exeC:\Windows\system32\Lhdefo32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2712 -
C:\Windows\SysWOW64\Lonmcimn.exeC:\Windows\system32\Lonmcimn.exe110⤵PID:2504
-
C:\Windows\SysWOW64\Lmqnoe32.exeC:\Windows\system32\Lmqnoe32.exe111⤵PID:1876
-
C:\Windows\SysWOW64\Ldjfkpke.exeC:\Windows\system32\Ldjfkpke.exe112⤵PID:3020
-
C:\Windows\SysWOW64\Lkdnhj32.exeC:\Windows\system32\Lkdnhj32.exe113⤵PID:1728
-
C:\Windows\SysWOW64\Laofedjo.exeC:\Windows\system32\Laofedjo.exe114⤵PID:2396
-
C:\Windows\SysWOW64\Lgkomk32.exeC:\Windows\system32\Lgkomk32.exe115⤵PID:3028
-
C:\Windows\SysWOW64\Lijkif32.exeC:\Windows\system32\Lijkif32.exe116⤵PID:2556
-
C:\Windows\SysWOW64\Lpccfpof.exeC:\Windows\system32\Lpccfpof.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2716 -
C:\Windows\SysWOW64\Lkigcinl.exeC:\Windows\system32\Lkigcinl.exe118⤵PID:376
-
C:\Windows\SysWOW64\Ldallo32.exeC:\Windows\system32\Ldallo32.exe119⤵
- Drops file in System32 directory
- Modifies registry class
PID:1784 -
C:\Windows\SysWOW64\Ooiemn32.exeC:\Windows\system32\Ooiemn32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2476 -
C:\Windows\SysWOW64\Oqjbdfne.exeC:\Windows\system32\Oqjbdfne.exe121⤵
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\Ogdjap32.exeC:\Windows\system32\Ogdjap32.exe122⤵PID:1580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-