Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
201s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 21:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f4477008189483d361baa6c49512e0be_JC.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
f4477008189483d361baa6c49512e0be_JC.exe
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
f4477008189483d361baa6c49512e0be_JC.exe
-
Size
275KB
-
MD5
f4477008189483d361baa6c49512e0be
-
SHA1
04241acb44ec4e406770f60ed3c3ae2124c67804
-
SHA256
e9915ad4981291b3416376389f6fea4e0149c77ee64d7a8a4e9e81c88f89f739
-
SHA512
779d27669e96c505e92a4027d23116902cc2ec93b904ddc1f68641ba36802002e062e64af0445e52cebe9f0f8cda955b48d7b11775a39283cf75c848efd0e861
-
SSDEEP
6144:HFjkR9zrZXH6tkgzL2V4cpC0L4AY7YWT63cpC0L4f:lgR9mL2/p9i7drp9S
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kikfbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Geghlg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnalqqbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abldpb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjlpjp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehilgikj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lebcdd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dehfig32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmfiam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oldooi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djhldahb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkgbkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cobkja32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmgoqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdkejo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbgmglin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehaonphg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifhinl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpjlldmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbnmhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfjcocad.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opkcpndm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anhomg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apflic32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjopbh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acbieing.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgpjin32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhdddnep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkeialfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dehfig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cojgdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfblmofp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dflnkjhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jphcgq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boncej32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngmbfl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opmpenbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jadnoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhgeao32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joomnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpndcjqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ieglfd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deficgha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnanbijd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjjfbikh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jeiekgfq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdaoacif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agkjknji.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijkjde32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jadnoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emhdhipd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baampb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkdanngk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ongfai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eempcfbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apinihbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inaliedk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kakdpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhnckp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmdnjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehiojb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feekfh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdklnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Epgabhdg.exe -
Executes dropped EXE 64 IoCs
pid Process 2620 Iijfoh32.exe 2780 Bfblmofp.exe 2548 Hajkip32.exe 3044 Cinahhff.exe 1008 Fjdpgnee.exe 1972 Ieqbbl32.exe 1556 Mqlbnnej.exe 2580 Mmcbbo32.exe 2804 Nbddfe32.exe 1668 Neemgp32.exe 1508 Oldooi32.exe 2136 Ohmljj32.exe 2412 Ojlife32.exe 1652 Odfjdk32.exe 2340 Omonmpcm.exe 1804 Pihlhagn.exe 1300 Pahjgb32.exe 2372 Qkpnph32.exe 864 Qckcdj32.exe 540 Qlcgmpkp.exe 1728 Aodqok32.exe 1732 Acbieing.exe 2248 Aagfffbo.exe 1984 Boncej32.exe 2084 Bdklnq32.exe 2280 Bncpffdn.exe 2700 Bnhjae32.exe 2720 Biakbc32.exe 912 Cfekkgla.exe 2712 Ckbccnji.exe 2496 Copljmpo.exe 1064 Cbnhfhoc.exe 740 Ceoagcld.exe 1904 Cgmndokg.exe 2384 Cbcbag32.exe 1744 Cgpjin32.exe 660 Dedkbb32.exe 964 Dfegjknm.exe 1208 Dhdddnep.exe 1600 Dihmae32.exe 2872 Dflnkjhe.exe 2932 Dmffhd32.exe 1928 Dimfmeef.exe 2916 Eahkag32.exe 1484 Ebghkjjc.exe 824 Mlhbgc32.exe 2908 Bjlpjp32.exe 2016 Dddmkkpb.exe 3004 Djhldahb.exe 1088 Dpedmhfi.exe 2300 Emieflec.exe 1768 Epgabhdg.exe 2272 Efaiobkc.exe 2208 Ebhjdc32.exe 1800 Ejcohe32.exe 1956 Eapcjo32.exe 1588 Ehilgikj.exe 1580 Fdpmljan.exe 1756 Fmknko32.exe 2716 Fdefgimi.exe 2972 Flpkll32.exe 2616 Fbjchfaq.exe 1076 Flbgak32.exe 1080 Faopib32.exe -
Loads dropped DLL 64 IoCs
pid Process 2584 f4477008189483d361baa6c49512e0be_JC.exe 2584 f4477008189483d361baa6c49512e0be_JC.exe 2620 Iijfoh32.exe 2620 Iijfoh32.exe 2780 Bfblmofp.exe 2780 Bfblmofp.exe 2548 Hajkip32.exe 2548 Hajkip32.exe 3044 Cinahhff.exe 3044 Cinahhff.exe 1008 Fjdpgnee.exe 1008 Fjdpgnee.exe 1972 Ieqbbl32.exe 1972 Ieqbbl32.exe 1556 Mqlbnnej.exe 1556 Mqlbnnej.exe 2580 Mmcbbo32.exe 2580 Mmcbbo32.exe 2804 Nbddfe32.exe 2804 Nbddfe32.exe 1668 Neemgp32.exe 1668 Neemgp32.exe 1508 Oldooi32.exe 1508 Oldooi32.exe 2136 Ohmljj32.exe 2136 Ohmljj32.exe 2412 Ojlife32.exe 2412 Ojlife32.exe 1652 Odfjdk32.exe 1652 Odfjdk32.exe 2340 Omonmpcm.exe 2340 Omonmpcm.exe 1804 Pihlhagn.exe 1804 Pihlhagn.exe 1300 Pahjgb32.exe 1300 Pahjgb32.exe 2372 Qkpnph32.exe 2372 Qkpnph32.exe 864 Qckcdj32.exe 864 Qckcdj32.exe 540 Qlcgmpkp.exe 540 Qlcgmpkp.exe 1728 Aodqok32.exe 1728 Aodqok32.exe 1732 Acbieing.exe 1732 Acbieing.exe 2248 Aagfffbo.exe 2248 Aagfffbo.exe 1984 Boncej32.exe 1984 Boncej32.exe 2084 Bdklnq32.exe 2084 Bdklnq32.exe 2280 Bncpffdn.exe 2280 Bncpffdn.exe 2700 Bnhjae32.exe 2700 Bnhjae32.exe 2720 Biakbc32.exe 2720 Biakbc32.exe 912 Cfekkgla.exe 912 Cfekkgla.exe 2712 Ckbccnji.exe 2712 Ckbccnji.exe 2496 Copljmpo.exe 2496 Copljmpo.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ifajif32.exe Igojmjgf.exe File created C:\Windows\SysWOW64\Hcdekagh.dll Nhombc32.exe File created C:\Windows\SysWOW64\Bbakgjmj.exe Bkgbkp32.exe File created C:\Windows\SysWOW64\Bbggdf32.exe Bmjnlp32.exe File created C:\Windows\SysWOW64\Qkicgd32.dll Cinahhff.exe File created C:\Windows\SysWOW64\Jkeialfp.exe Jmplqp32.exe File created C:\Windows\SysWOW64\Oghnoi32.exe Knhnkc32.exe File opened for modification C:\Windows\SysWOW64\Qmhegmel.exe Qbcajdee.exe File opened for modification C:\Windows\SysWOW64\Jadnoc32.exe Jjjfbikh.exe File created C:\Windows\SysWOW64\Floaji32.exe Ljoidf32.exe File opened for modification C:\Windows\SysWOW64\Oejfelin.exe Olablfbm.exe File opened for modification C:\Windows\SysWOW64\Gapbbk32.exe Fpnekc32.exe File created C:\Windows\SysWOW64\Hjiijqhk.dll Pmcjceam.exe File created C:\Windows\SysWOW64\Lbmllgcc.dll Knhnkc32.exe File opened for modification C:\Windows\SysWOW64\Aefgao32.exe Apinihbm.exe File created C:\Windows\SysWOW64\Aagfffbo.exe Acbieing.exe File created C:\Windows\SysWOW64\Gmioem32.dll Ikinjj32.exe File opened for modification C:\Windows\SysWOW64\Omodibcg.exe Ojphmfdc.exe File created C:\Windows\SysWOW64\Apkkng32.exe Ahdcmj32.exe File created C:\Windows\SysWOW64\Nqcgln32.dll Odfjdk32.exe File created C:\Windows\SysWOW64\Kkmddmop.exe Kdaoacif.exe File created C:\Windows\SysWOW64\Bocadg32.exe Bppqhjnp.exe File created C:\Windows\SysWOW64\Cfcjopoa.dll Qjleem32.exe File created C:\Windows\SysWOW64\Emhdhipd.exe Ejjhlmqa.exe File opened for modification C:\Windows\SysWOW64\Aadnfo32.exe Aoeajc32.exe File created C:\Windows\SysWOW64\Pdofdoec.dll Bfblmofp.exe File created C:\Windows\SysWOW64\Odfjdk32.exe Ojlife32.exe File created C:\Windows\SysWOW64\Hlgpmnkj.dll Gledgkfn.exe File opened for modification C:\Windows\SysWOW64\Giakoc32.exe Gmkjjbhg.exe File created C:\Windows\SysWOW64\Dbpmba32.dll Jmplqp32.exe File created C:\Windows\SysWOW64\Enfmio32.dll Gapbbk32.exe File created C:\Windows\SysWOW64\Jkdanngk.exe Jibdff32.exe File opened for modification C:\Windows\SysWOW64\Pmlajm32.exe Okmena32.exe File opened for modification C:\Windows\SysWOW64\Neabophn.exe Nmjknb32.exe File opened for modification C:\Windows\SysWOW64\Oeaoncjj.exe Ongfai32.exe File created C:\Windows\SysWOW64\Bnajicja.dll Mloigc32.exe File created C:\Windows\SysWOW64\Cddhfa32.dll Olablfbm.exe File opened for modification C:\Windows\SysWOW64\Fmjfbe32.exe Fcjliali.exe File created C:\Windows\SysWOW64\Hmpjieck.dll Qkpnph32.exe File created C:\Windows\SysWOW64\Fdpmljan.exe Ehilgikj.exe File opened for modification C:\Windows\SysWOW64\Iqpiepcn.exe Inaliedk.exe File created C:\Windows\SysWOW64\Jnhich32.dll Kleeqp32.exe File created C:\Windows\SysWOW64\Lfpgkicd.exe Ldqkqf32.exe File created C:\Windows\SysWOW64\Ndqnahdk.dll Jelbqg32.exe File opened for modification C:\Windows\SysWOW64\Dmffhd32.exe Dflnkjhe.exe File created C:\Windows\SysWOW64\Fmdicgof.dll Hllffmbb.exe File created C:\Windows\SysWOW64\Edopja32.dll Kckeno32.exe File created C:\Windows\SysWOW64\Apqhllki.dll Ehiojb32.exe File created C:\Windows\SysWOW64\Olmmho32.dll Gmkjjbhg.exe File created C:\Windows\SysWOW64\Jifnen32.dll Cqhdnfpp.exe File opened for modification C:\Windows\SysWOW64\Pckgchbp.exe Pjqfebnb.exe File opened for modification C:\Windows\SysWOW64\Flbgak32.exe Fbjchfaq.exe File created C:\Windows\SysWOW64\Dmfkcf32.exe Cflcglho.exe File opened for modification C:\Windows\SysWOW64\Bppqhjnp.exe Bgglpd32.exe File opened for modification C:\Windows\SysWOW64\Ceoagcld.exe Cbnhfhoc.exe File opened for modification C:\Windows\SysWOW64\Mlhbgc32.exe Ebghkjjc.exe File opened for modification C:\Windows\SysWOW64\Mgfjld32.exe Megmpi32.exe File opened for modification C:\Windows\SysWOW64\Abldpb32.exe Aamgfpfh.exe File opened for modification C:\Windows\SysWOW64\Bmjnlp32.exe Bfqfoeng.exe File opened for modification C:\Windows\SysWOW64\Bdklnq32.exe Boncej32.exe File created C:\Windows\SysWOW64\Ijkjde32.exe Idnako32.exe File opened for modification C:\Windows\SysWOW64\Ndcqbdge.exe Nnghjm32.exe File created C:\Windows\SysWOW64\Ehkflp32.dll Oejfelin.exe File created C:\Windows\SysWOW64\Cnjhbjql.exe Chmpicbd.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emmnch32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pahjgb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Flpkll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbhkngcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gadkmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oeaoncjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clncfhep.dll" Dbgmglin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjdpgnee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojlife32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbajci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdfifg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djhldahb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iggdmkmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djibjkmd.dll" Bkooed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bncpffdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkcbgbdo.dll" Cgpjin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idihponj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bflghh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckbccnji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbfappjm.dll" Mcagma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pahjia32.dll" Nmlekj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbilpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcoodlbd.dll" Cfekkgla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ighchh32.dll" Mlhbgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofbgjk32.dll" Nndkdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjplnpco.dll" Oghnoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ceoagcld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkiiie32.dll" Gdbeqmag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfpgkicd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node f4477008189483d361baa6c49512e0be_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mliibj32.dll" Inbpnbbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qpgachdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbeoggic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dcbpfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apinihbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cojgdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmgoqg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pijjhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfpjkiol.dll" Cflcglho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Behpeaqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nphncc32.dll" Emmnch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nadbabeo.dll" Fcjliali.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pplfpa32.dll" Bpndcjqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdofdoec.dll" Bfblmofp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inkkgm32.dll" Khgnff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pklnfalh.dll" Ljdjildq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdpoeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfqfoeng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epggabhd.dll" Ejcohe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmmfoaha.dll" Jkfncn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Neelhckg.dll" Lnnkmdfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pckgchbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nfjkapmp.dll" Ehckdp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apinihbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmebkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oeaoncjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apflic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcjliali.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hqmfhhje.dll" Mqlbnnej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhdddnep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eapcjo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lakqoe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qfqjpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehckdp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2620 2584 f4477008189483d361baa6c49512e0be_JC.exe 29 PID 2584 wrote to memory of 2620 2584 f4477008189483d361baa6c49512e0be_JC.exe 29 PID 2584 wrote to memory of 2620 2584 f4477008189483d361baa6c49512e0be_JC.exe 29 PID 2584 wrote to memory of 2620 2584 f4477008189483d361baa6c49512e0be_JC.exe 29 PID 2620 wrote to memory of 2780 2620 Iijfoh32.exe 30 PID 2620 wrote to memory of 2780 2620 Iijfoh32.exe 30 PID 2620 wrote to memory of 2780 2620 Iijfoh32.exe 30 PID 2620 wrote to memory of 2780 2620 Iijfoh32.exe 30 PID 2780 wrote to memory of 2548 2780 Bfblmofp.exe 31 PID 2780 wrote to memory of 2548 2780 Bfblmofp.exe 31 PID 2780 wrote to memory of 2548 2780 Bfblmofp.exe 31 PID 2780 wrote to memory of 2548 2780 Bfblmofp.exe 31 PID 2548 wrote to memory of 3044 2548 Hajkip32.exe 32 PID 2548 wrote to memory of 3044 2548 Hajkip32.exe 32 PID 2548 wrote to memory of 3044 2548 Hajkip32.exe 32 PID 2548 wrote to memory of 3044 2548 Hajkip32.exe 32 PID 3044 wrote to memory of 1008 3044 Cinahhff.exe 33 PID 3044 wrote to memory of 1008 3044 Cinahhff.exe 33 PID 3044 wrote to memory of 1008 3044 Cinahhff.exe 33 PID 3044 wrote to memory of 1008 3044 Cinahhff.exe 33 PID 1008 wrote to memory of 1972 1008 Fjdpgnee.exe 34 PID 1008 wrote to memory of 1972 1008 Fjdpgnee.exe 34 PID 1008 wrote to memory of 1972 1008 Fjdpgnee.exe 34 PID 1008 wrote to memory of 1972 1008 Fjdpgnee.exe 34 PID 1972 wrote to memory of 1556 1972 Ieqbbl32.exe 35 PID 1972 wrote to memory of 1556 1972 Ieqbbl32.exe 35 PID 1972 wrote to memory of 1556 1972 Ieqbbl32.exe 35 PID 1972 wrote to memory of 1556 1972 Ieqbbl32.exe 35 PID 1556 wrote to memory of 2580 1556 Mqlbnnej.exe 36 PID 1556 wrote to memory of 2580 1556 Mqlbnnej.exe 36 PID 1556 wrote to memory of 2580 1556 Mqlbnnej.exe 36 PID 1556 wrote to memory of 2580 1556 Mqlbnnej.exe 36 PID 2580 wrote to memory of 2804 2580 Mmcbbo32.exe 37 PID 2580 wrote to memory of 2804 2580 Mmcbbo32.exe 37 PID 2580 wrote to memory of 2804 2580 Mmcbbo32.exe 37 PID 2580 wrote to memory of 2804 2580 Mmcbbo32.exe 37 PID 2804 wrote to memory of 1668 2804 Nbddfe32.exe 38 PID 2804 wrote to memory of 1668 2804 Nbddfe32.exe 38 PID 2804 wrote to memory of 1668 2804 Nbddfe32.exe 38 PID 2804 wrote to memory of 1668 2804 Nbddfe32.exe 38 PID 1668 wrote to memory of 1508 1668 Neemgp32.exe 39 PID 1668 wrote to memory of 1508 1668 Neemgp32.exe 39 PID 1668 wrote to memory of 1508 1668 Neemgp32.exe 39 PID 1668 wrote to memory of 1508 1668 Neemgp32.exe 39 PID 1508 wrote to memory of 2136 1508 Oldooi32.exe 42 PID 1508 wrote to memory of 2136 1508 Oldooi32.exe 42 PID 1508 wrote to memory of 2136 1508 Oldooi32.exe 42 PID 1508 wrote to memory of 2136 1508 Oldooi32.exe 42 PID 2136 wrote to memory of 2412 2136 Ohmljj32.exe 41 PID 2136 wrote to memory of 2412 2136 Ohmljj32.exe 41 PID 2136 wrote to memory of 2412 2136 Ohmljj32.exe 41 PID 2136 wrote to memory of 2412 2136 Ohmljj32.exe 41 PID 2412 wrote to memory of 1652 2412 Ojlife32.exe 40 PID 2412 wrote to memory of 1652 2412 Ojlife32.exe 40 PID 2412 wrote to memory of 1652 2412 Ojlife32.exe 40 PID 2412 wrote to memory of 1652 2412 Ojlife32.exe 40 PID 1652 wrote to memory of 2340 1652 Odfjdk32.exe 43 PID 1652 wrote to memory of 2340 1652 Odfjdk32.exe 43 PID 1652 wrote to memory of 2340 1652 Odfjdk32.exe 43 PID 1652 wrote to memory of 2340 1652 Odfjdk32.exe 43 PID 2340 wrote to memory of 1804 2340 Omonmpcm.exe 44 PID 2340 wrote to memory of 1804 2340 Omonmpcm.exe 44 PID 2340 wrote to memory of 1804 2340 Omonmpcm.exe 44 PID 2340 wrote to memory of 1804 2340 Omonmpcm.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4477008189483d361baa6c49512e0be_JC.exe"C:\Users\Admin\AppData\Local\Temp\f4477008189483d361baa6c49512e0be_JC.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\Iijfoh32.exeC:\Windows\system32\Iijfoh32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\Bfblmofp.exeC:\Windows\system32\Bfblmofp.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Hajkip32.exeC:\Windows\system32\Hajkip32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\Cinahhff.exeC:\Windows\system32\Cinahhff.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\Fjdpgnee.exeC:\Windows\system32\Fjdpgnee.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\Ieqbbl32.exeC:\Windows\system32\Ieqbbl32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\Mqlbnnej.exeC:\Windows\system32\Mqlbnnej.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\Mmcbbo32.exeC:\Windows\system32\Mmcbbo32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\Nbddfe32.exeC:\Windows\system32\Nbddfe32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Neemgp32.exeC:\Windows\system32\Neemgp32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\Oldooi32.exeC:\Windows\system32\Oldooi32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\Ohmljj32.exeC:\Windows\system32\Ohmljj32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136
-
-
-
-
C:\Windows\SysWOW64\Cojgdf32.exeC:\Windows\system32\Cojgdf32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2980 -
C:\Windows\SysWOW64\Cpkclnea.exeC:\Windows\system32\Cpkclnea.exe12⤵PID:1148
-
C:\Windows\SysWOW64\Chbkmkec.exeC:\Windows\system32\Chbkmkec.exe13⤵PID:2612
-
C:\Windows\SysWOW64\Cjchec32.exeC:\Windows\system32\Cjchec32.exe14⤵PID:2736
-
C:\Windows\SysWOW64\Cpmpbncn.exeC:\Windows\system32\Cpmpbncn.exe15⤵PID:2512
-
C:\Windows\SysWOW64\Ckcdof32.exeC:\Windows\system32\Ckcdof32.exe16⤵PID:1132
-
C:\Windows\SysWOW64\Cldagoib.exeC:\Windows\system32\Cldagoib.exe17⤵PID:1012
-
C:\Windows\SysWOW64\Ccnici32.exeC:\Windows\system32\Ccnici32.exe18⤵PID:2084
-
C:\Windows\SysWOW64\Dncmaa32.exeC:\Windows\system32\Dncmaa32.exe19⤵PID:2948
-
C:\Windows\SysWOW64\Dcqfih32.exeC:\Windows\system32\Dcqfih32.exe20⤵PID:2692
-
C:\Windows\SysWOW64\Dfobed32.exeC:\Windows\system32\Dfobed32.exe21⤵PID:2208
-
C:\Windows\SysWOW64\Dlijbn32.exeC:\Windows\system32\Dlijbn32.exe22⤵PID:3028
-
C:\Windows\SysWOW64\Dfaokckn.exeC:\Windows\system32\Dfaokckn.exe23⤵PID:2108
-
C:\Windows\SysWOW64\Dbhppd32.exeC:\Windows\system32\Dbhppd32.exe24⤵PID:2872
-
C:\Windows\SysWOW64\Dnopdf32.exeC:\Windows\system32\Dnopdf32.exe25⤵PID:1016
-
C:\Windows\SysWOW64\Enamje32.exeC:\Windows\system32\Enamje32.exe26⤵PID:1772
-
C:\Windows\SysWOW64\Ekgjiiaj.exeC:\Windows\system32\Ekgjiiaj.exe27⤵PID:1716
-
C:\Windows\SysWOW64\Emifaa32.exeC:\Windows\system32\Emifaa32.exe28⤵PID:2764
-
C:\Windows\SysWOW64\Ecelck32.exeC:\Windows\system32\Ecelck32.exe29⤵PID:2892
-
C:\Windows\SysWOW64\Eqilmp32.exeC:\Windows\system32\Eqilmp32.exe30⤵PID:2200
-
C:\Windows\SysWOW64\Ebjhdhak.exeC:\Windows\system32\Ebjhdhak.exe31⤵PID:1908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kikfbm32.exeC:\Windows\system32\Kikfbm32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1364 -
C:\Windows\SysWOW64\Knhnkc32.exeC:\Windows\system32\Knhnkc32.exe9⤵
- Drops file in System32 directory
PID:2416 -
C:\Windows\SysWOW64\Oghnoi32.exeC:\Windows\system32\Oghnoi32.exe10⤵
- Modifies registry class
PID:844 -
C:\Windows\SysWOW64\Efneahdl.exeC:\Windows\system32\Efneahdl.exe11⤵PID:2800
-
C:\Windows\SysWOW64\Epfjjnkl.exeC:\Windows\system32\Epfjjnkl.exe12⤵PID:1928
-
C:\Windows\SysWOW64\Eagfaf32.exeC:\Windows\system32\Eagfaf32.exe13⤵PID:344
-
C:\Windows\SysWOW64\Einnbc32.exeC:\Windows\system32\Einnbc32.exe14⤵PID:1708
-
C:\Windows\SysWOW64\Ehaonphg.exeC:\Windows\system32\Ehaonphg.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1936 -
C:\Windows\SysWOW64\Ehckdp32.exeC:\Windows\system32\Ehckdp32.exe16⤵
- Modifies registry class
PID:2164
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Odfjdk32.exeC:\Windows\system32\Odfjdk32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\Omonmpcm.exeC:\Windows\system32\Omonmpcm.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\Pihlhagn.exeC:\Windows\system32\Pihlhagn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Windows\SysWOW64\Pahjgb32.exeC:\Windows\system32\Pahjgb32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1300 -
C:\Windows\SysWOW64\Qkpnph32.exeC:\Windows\system32\Qkpnph32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\Qckcdj32.exeC:\Windows\system32\Qckcdj32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:864 -
C:\Windows\SysWOW64\Qlcgmpkp.exeC:\Windows\system32\Qlcgmpkp.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:540 -
C:\Windows\SysWOW64\Aodqok32.exeC:\Windows\system32\Aodqok32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1728 -
C:\Windows\SysWOW64\Acbieing.exeC:\Windows\system32\Acbieing.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1732 -
C:\Windows\SysWOW64\Aagfffbo.exeC:\Windows\system32\Aagfffbo.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2248 -
C:\Windows\SysWOW64\Boncej32.exeC:\Windows\system32\Boncej32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\Bdklnq32.exeC:\Windows\system32\Bdklnq32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2084 -
C:\Windows\SysWOW64\Bncpffdn.exeC:\Windows\system32\Bncpffdn.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2280 -
C:\Windows\SysWOW64\Bnhjae32.exeC:\Windows\system32\Bnhjae32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2700 -
C:\Windows\SysWOW64\Biakbc32.exeC:\Windows\system32\Biakbc32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2720 -
C:\Windows\SysWOW64\Cfekkgla.exeC:\Windows\system32\Cfekkgla.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:912 -
C:\Windows\SysWOW64\Ckbccnji.exeC:\Windows\system32\Ckbccnji.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Copljmpo.exeC:\Windows\system32\Copljmpo.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2496 -
C:\Windows\SysWOW64\Cbnhfhoc.exeC:\Windows\system32\Cbnhfhoc.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1064 -
C:\Windows\SysWOW64\Ceoagcld.exeC:\Windows\system32\Ceoagcld.exe20⤵
- Executes dropped EXE
- Modifies registry class
PID:740 -
C:\Windows\SysWOW64\Cgmndokg.exeC:\Windows\system32\Cgmndokg.exe21⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\SysWOW64\Cbcbag32.exeC:\Windows\system32\Cbcbag32.exe22⤵
- Executes dropped EXE
PID:2384 -
C:\Windows\SysWOW64\Cgpjin32.exeC:\Windows\system32\Cgpjin32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1744 -
C:\Windows\SysWOW64\Dedkbb32.exeC:\Windows\system32\Dedkbb32.exe24⤵
- Executes dropped EXE
PID:660 -
C:\Windows\SysWOW64\Dfegjknm.exeC:\Windows\system32\Dfegjknm.exe25⤵
- Executes dropped EXE
PID:964 -
C:\Windows\SysWOW64\Dhdddnep.exeC:\Windows\system32\Dhdddnep.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1208 -
C:\Windows\SysWOW64\Dihmae32.exeC:\Windows\system32\Dihmae32.exe27⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\Dflnkjhe.exeC:\Windows\system32\Dflnkjhe.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2872 -
C:\Windows\SysWOW64\Dmffhd32.exeC:\Windows\system32\Dmffhd32.exe29⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\Dimfmeef.exeC:\Windows\system32\Dimfmeef.exe30⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\Eahkag32.exeC:\Windows\system32\Eahkag32.exe31⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\Ebghkjjc.exeC:\Windows\system32\Ebghkjjc.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1484 -
C:\Windows\SysWOW64\Mlhbgc32.exeC:\Windows\system32\Mlhbgc32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:824 -
C:\Windows\SysWOW64\Bjlpjp32.exeC:\Windows\system32\Bjlpjp32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\Dddmkkpb.exeC:\Windows\system32\Dddmkkpb.exe35⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\Djhldahb.exeC:\Windows\system32\Djhldahb.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\Dpedmhfi.exeC:\Windows\system32\Dpedmhfi.exe37⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\SysWOW64\Emieflec.exeC:\Windows\system32\Emieflec.exe38⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\Epgabhdg.exeC:\Windows\system32\Epgabhdg.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\Efaiobkc.exeC:\Windows\system32\Efaiobkc.exe40⤵
- Executes dropped EXE
PID:2272 -
C:\Windows\SysWOW64\Ebhjdc32.exeC:\Windows\system32\Ebhjdc32.exe41⤵
- Executes dropped EXE
PID:2208 -
C:\Windows\SysWOW64\Ejcohe32.exeC:\Windows\system32\Ejcohe32.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\Eapcjo32.exeC:\Windows\system32\Eapcjo32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:1956 -
C:\Windows\SysWOW64\Ehilgikj.exeC:\Windows\system32\Ehilgikj.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1588 -
C:\Windows\SysWOW64\Fdpmljan.exeC:\Windows\system32\Fdpmljan.exe45⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\Fmknko32.exeC:\Windows\system32\Fmknko32.exe46⤵
- Executes dropped EXE
PID:1756 -
C:\Windows\SysWOW64\Fdefgimi.exeC:\Windows\system32\Fdefgimi.exe47⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Flpkll32.exeC:\Windows\system32\Flpkll32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:2972 -
C:\Windows\SysWOW64\Fbjchfaq.exeC:\Windows\system32\Fbjchfaq.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2616 -
C:\Windows\SysWOW64\Flbgak32.exeC:\Windows\system32\Flbgak32.exe50⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\Faopib32.exeC:\Windows\system32\Faopib32.exe51⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\Gledgkfn.exeC:\Windows\system32\Gledgkfn.exe52⤵
- Drops file in System32 directory
PID:3060 -
C:\Windows\SysWOW64\Gbolce32.exeC:\Windows\system32\Gbolce32.exe53⤵PID:2840
-
C:\Windows\SysWOW64\Gemhpq32.exeC:\Windows\system32\Gemhpq32.exe54⤵PID:2000
-
C:\Windows\SysWOW64\Goemhfco.exeC:\Windows\system32\Goemhfco.exe55⤵PID:1852
-
C:\Windows\SysWOW64\Gdbeqmag.exeC:\Windows\system32\Gdbeqmag.exe56⤵
- Modifies registry class
PID:1784 -
C:\Windows\SysWOW64\Gmkjjbhg.exeC:\Windows\system32\Gmkjjbhg.exe57⤵
- Drops file in System32 directory
PID:2812 -
C:\Windows\SysWOW64\Giakoc32.exeC:\Windows\system32\Giakoc32.exe58⤵PID:572
-
C:\Windows\SysWOW64\Gpkckneh.exeC:\Windows\system32\Gpkckneh.exe59⤵PID:2816
-
C:\Windows\SysWOW64\Gkaghf32.exeC:\Windows\system32\Gkaghf32.exe60⤵PID:1564
-
C:\Windows\SysWOW64\Hpnpam32.exeC:\Windows\system32\Hpnpam32.exe61⤵PID:1988
-
C:\Windows\SysWOW64\Hekhid32.exeC:\Windows\system32\Hekhid32.exe62⤵PID:1068
-
C:\Windows\SysWOW64\Hldpfnij.exeC:\Windows\system32\Hldpfnij.exe63⤵PID:2588
-
C:\Windows\SysWOW64\Hgjdcghp.exeC:\Windows\system32\Hgjdcghp.exe64⤵PID:888
-
C:\Windows\SysWOW64\Hpbilmop.exeC:\Windows\system32\Hpbilmop.exe65⤵PID:2376
-
C:\Windows\SysWOW64\Heoadcmh.exeC:\Windows\system32\Heoadcmh.exe66⤵PID:1788
-
C:\Windows\SysWOW64\Hohfmi32.exeC:\Windows\system32\Hohfmi32.exe67⤵PID:936
-
C:\Windows\SysWOW64\Hfanjcke.exeC:\Windows\system32\Hfanjcke.exe68⤵PID:972
-
C:\Windows\SysWOW64\Hllffmbb.exeC:\Windows\system32\Hllffmbb.exe69⤵
- Drops file in System32 directory
PID:1636 -
C:\Windows\SysWOW64\Iolohhpc.exeC:\Windows\system32\Iolohhpc.exe70⤵PID:2148
-
C:\Windows\SysWOW64\Idihponj.exeC:\Windows\system32\Idihponj.exe71⤵
- Modifies registry class
PID:2292 -
C:\Windows\SysWOW64\Iggdmkmn.exeC:\Windows\system32\Iggdmkmn.exe72⤵
- Modifies registry class
PID:1796 -
C:\Windows\SysWOW64\Inaliedk.exeC:\Windows\system32\Inaliedk.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3024 -
C:\Windows\SysWOW64\Iqpiepcn.exeC:\Windows\system32\Iqpiepcn.exe74⤵PID:1676
-
C:\Windows\SysWOW64\Igjabj32.exeC:\Windows\system32\Igjabj32.exe75⤵PID:2244
-
C:\Windows\SysWOW64\Ijhmnf32.exeC:\Windows\system32\Ijhmnf32.exe76⤵PID:2576
-
C:\Windows\SysWOW64\Idnako32.exeC:\Windows\system32\Idnako32.exe77⤵
- Drops file in System32 directory
PID:2648 -
C:\Windows\SysWOW64\Ijkjde32.exeC:\Windows\system32\Ijkjde32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2928 -
C:\Windows\SysWOW64\Igojmjgf.exeC:\Windows\system32\Igojmjgf.exe79⤵
- Drops file in System32 directory
PID:2488 -
C:\Windows\SysWOW64\Ifajif32.exeC:\Windows\system32\Ifajif32.exe80⤵PID:2512
-
C:\Windows\SysWOW64\Iqgofo32.exeC:\Windows\system32\Iqgofo32.exe81⤵PID:1932
-
C:\Windows\SysWOW64\Jbhkngcd.exeC:\Windows\system32\Jbhkngcd.exe82⤵
- Modifies registry class
PID:2604 -
C:\Windows\SysWOW64\Jibcja32.exeC:\Windows\system32\Jibcja32.exe83⤵PID:2184
-
C:\Windows\SysWOW64\Jmplqp32.exeC:\Windows\system32\Jmplqp32.exe84⤵
- Drops file in System32 directory
PID:488 -
C:\Windows\SysWOW64\Jkeialfp.exeC:\Windows\system32\Jkeialfp.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:764 -
C:\Windows\SysWOW64\Jncenh32.exeC:\Windows\system32\Jncenh32.exe86⤵PID:592
-
C:\Windows\SysWOW64\Jennjblp.exeC:\Windows\system32\Jennjblp.exe87⤵PID:2952
-
C:\Windows\SysWOW64\Jjjfbikh.exeC:\Windows\system32\Jjjfbikh.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:576 -
C:\Windows\SysWOW64\Jadnoc32.exeC:\Windows\system32\Jadnoc32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1996 -
C:\Windows\SysWOW64\Knhoig32.exeC:\Windows\system32\Knhoig32.exe90⤵PID:2600
-
C:\Windows\SysWOW64\Kebgea32.exeC:\Windows\system32\Kebgea32.exe91⤵PID:2684
-
C:\Windows\SysWOW64\Knkkngol.exeC:\Windows\system32\Knkkngol.exe92⤵PID:2380
-
C:\Windows\SysWOW64\Kplhfo32.exeC:\Windows\system32\Kplhfo32.exe93⤵PID:1632
-
C:\Windows\SysWOW64\Kjalch32.exeC:\Windows\system32\Kjalch32.exe94⤵PID:2240
-
C:\Windows\SysWOW64\Kakdpb32.exeC:\Windows\system32\Kakdpb32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:548 -
C:\Windows\SysWOW64\Kcjqlm32.exeC:\Windows\system32\Kcjqlm32.exe96⤵PID:2328
-
C:\Windows\SysWOW64\Kleeqp32.exeC:\Windows\system32\Kleeqp32.exe97⤵
- Drops file in System32 directory
PID:868 -
C:\Windows\SysWOW64\Kfkjnh32.exeC:\Windows\system32\Kfkjnh32.exe98⤵PID:2264
-
C:\Windows\SysWOW64\Kbajci32.exeC:\Windows\system32\Kbajci32.exe99⤵
- Modifies registry class
PID:1716 -
C:\Windows\SysWOW64\Lhnckp32.exeC:\Windows\system32\Lhnckp32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2416 -
C:\Windows\SysWOW64\Lohkhjcj.exeC:\Windows\system32\Lohkhjcj.exe101⤵PID:932
-
C:\Windows\SysWOW64\Lebcdd32.exeC:\Windows\system32\Lebcdd32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2656 -
C:\Windows\SysWOW64\Lkolmk32.exeC:\Windows\system32\Lkolmk32.exe103⤵PID:2776
-
C:\Windows\SysWOW64\Lkahbkgk.exeC:\Windows\system32\Lkahbkgk.exe104⤵PID:2844
-
C:\Windows\SysWOW64\Lakqoe32.exeC:\Windows\system32\Lakqoe32.exe105⤵
- Modifies registry class
PID:1780 -
C:\Windows\SysWOW64\Lmbadfdl.exeC:\Windows\system32\Lmbadfdl.exe106⤵PID:2732
-
C:\Windows\SysWOW64\Lhgeao32.exeC:\Windows\system32\Lhgeao32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:672 -
C:\Windows\SysWOW64\Lmdnjf32.exeC:\Windows\system32\Lmdnjf32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2068 -
C:\Windows\SysWOW64\Ffcdlncp.exeC:\Windows\system32\Ffcdlncp.exe109⤵PID:2912
-
C:\Windows\SysWOW64\Fbjeao32.exeC:\Windows\system32\Fbjeao32.exe110⤵PID:1848
-
C:\Windows\SysWOW64\Fidmniqa.exeC:\Windows\system32\Fidmniqa.exe111⤵PID:1168
-
C:\Windows\SysWOW64\Fpnekc32.exeC:\Windows\system32\Fpnekc32.exe112⤵
- Drops file in System32 directory
PID:1860 -
C:\Windows\SysWOW64\Gapbbk32.exeC:\Windows\system32\Gapbbk32.exe113⤵
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\Glefpd32.exeC:\Windows\system32\Glefpd32.exe114⤵PID:392
-
C:\Windows\SysWOW64\Gncblo32.exeC:\Windows\system32\Gncblo32.exe115⤵PID:1960
-
C:\Windows\SysWOW64\Gadkmj32.exeC:\Windows\system32\Gadkmj32.exe116⤵
- Modifies registry class
PID:1132 -
C:\Windows\SysWOW64\Fqjbme32.exeC:\Windows\system32\Fqjbme32.exe117⤵PID:2612
-
C:\Windows\SysWOW64\Hhaogp32.exeC:\Windows\system32\Hhaogp32.exe118⤵PID:2864
-
C:\Windows\SysWOW64\Idhplaoe.exeC:\Windows\system32\Idhplaoe.exe119⤵PID:756
-
C:\Windows\SysWOW64\Ihclmp32.exeC:\Windows\system32\Ihclmp32.exe120⤵PID:524
-
C:\Windows\SysWOW64\Ijahik32.exeC:\Windows\system32\Ijahik32.exe121⤵PID:2736
-
C:\Windows\SysWOW64\Ieglfd32.exeC:\Windows\system32\Ieglfd32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-