Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
245s -
max time network
292s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
e68ee73e5a3b27a19aa4c40d9225a338_JC.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
e68ee73e5a3b27a19aa4c40d9225a338_JC.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
e68ee73e5a3b27a19aa4c40d9225a338_JC.exe
-
Size
123KB
-
MD5
e68ee73e5a3b27a19aa4c40d9225a338
-
SHA1
56e43285a202b59b880e6fd4cfeeded80a49bc7d
-
SHA256
254f5581c00122d1967a215122922c0d094113d60ff43bef6b286f6a663c23d0
-
SHA512
8707935e04a911a2f8fdf0106ea41278f80e67b8aaa7dc0714d66a85d3568d94d7d9be0cb0ca0b8f784a54f1c916b6a4c3d2ae56374366cc1fc88904fe87b064
-
SSDEEP
3072:S+UepDtXxL2uRlGRdtDbf5qOzy5/qH1RYSa9rR85DEn5k7r8:S+UephXxy8OtDbUOzKiH14rQD85k/8
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhojjjhj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oagkac32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Papmnj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdpepejb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nkbjodoj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjdlkeln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Innhkknc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oopocfgl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onadck32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qepbjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Agbafm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmjpbpl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmaofnkc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ackoqn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbdiabcg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koaohila.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Papmnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qganapgc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knggqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mhfniekh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klniao32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omfadgqj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpmmce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qimifn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kahqbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pcmadj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjloak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmomfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Agdnkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbbigj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Emahhhhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mkeogn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pifdog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Icmnib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmomfm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adceja32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad e68ee73e5a3b27a19aa4c40d9225a338_JC.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlljiklc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olapcm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iaekqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kjpekn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nhdnbipf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhbfcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mhegckpd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlacdj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nchkjhdh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqfigjgi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bghdeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pokkkgpo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjoecjgf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eaejgkih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nopcdbep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jhbfcj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Peiliihm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgplicod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcmheqim.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plgmabke.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inbbfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhmjpbpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhofea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmjfielh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Conofmpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Idcgmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jokdobid.exe -
Executes dropped EXE 64 IoCs
pid Process 2800 Jbmdig32.exe 2572 Ippkni32.exe 3000 Iiiogoac.exe 2820 Igmppcpm.exe 2816 Ijklmn32.exe 1948 Jojaje32.exe 1512 Jhbfcj32.exe 688 Jkcoee32.exe 320 Jkfkjemd.exe 1488 Lfmhla32.exe 1980 Lilehl32.exe 2144 Lbdiabcg.exe 1848 Linanl32.exe 868 Lbibla32.exe 1752 Lgekdh32.exe 1824 Milagp32.exe 1720 Mlljiklc.exe 596 Medobp32.exe 2328 Mbiokdam.exe 2452 Mhegckpd.exe 1080 Mlacdj32.exe 1040 Nhhdiknb.exe 864 Napibq32.exe 2212 Ndoenlcf.exe 1324 Nkhmkf32.exe 912 Nhojjjhj.exe 3028 Nipgab32.exe 2920 Nchkjhdh.exe 1896 Omnpgqdo.exe 2908 Olapcm32.exe 2880 Ogfdpfjo.exe 2404 Olclimif.exe 1864 Oigmbagp.exe 1664 Oagkac32.exe 1796 Pokkkgpo.exe 312 Phcpdm32.exe 2720 Pjdlkeln.exe 2256 Pcmadj32.exe 1316 Pkdiehca.exe 1336 Pnbeacbd.exe 788 Aejmha32.exe 1084 Edgkap32.exe 2204 Mkmlbc32.exe 2604 Ieokjbkp.exe 2124 Ilicgl32.exe 1540 Jaflocqd.exe 1380 Jddhknpg.exe 1860 Jjnqhh32.exe 2012 Jdgeanne.exe 2376 Jkqmnh32.exe 1708 Kimpocda.exe 2068 Khpqkq32.exe 852 Kpgiln32.exe 1856 Kiomec32.exe 1616 Klniao32.exe 1620 Kchaniho.exe 2240 Kkcfbkfj.exe 1588 Kamooe32.exe 2260 Koaohila.exe 2788 Laokdekd.exe 2504 Mkeogn32.exe 2532 Moqkgmol.exe 1460 Mdmdpd32.exe 2812 Mkgllndq.exe -
Loads dropped DLL 64 IoCs
pid Process 2724 e68ee73e5a3b27a19aa4c40d9225a338_JC.exe 2724 e68ee73e5a3b27a19aa4c40d9225a338_JC.exe 2800 Jbmdig32.exe 2800 Jbmdig32.exe 2572 Ippkni32.exe 2572 Ippkni32.exe 3000 Iiiogoac.exe 3000 Iiiogoac.exe 2820 Igmppcpm.exe 2820 Igmppcpm.exe 2816 Ijklmn32.exe 2816 Ijklmn32.exe 1948 Jojaje32.exe 1948 Jojaje32.exe 1512 Jhbfcj32.exe 1512 Jhbfcj32.exe 688 Jkcoee32.exe 688 Jkcoee32.exe 320 Jkfkjemd.exe 320 Jkfkjemd.exe 1488 Lfmhla32.exe 1488 Lfmhla32.exe 1980 Lilehl32.exe 1980 Lilehl32.exe 2144 Lbdiabcg.exe 2144 Lbdiabcg.exe 1848 Linanl32.exe 1848 Linanl32.exe 868 Lbibla32.exe 868 Lbibla32.exe 1752 Lgekdh32.exe 1752 Lgekdh32.exe 1824 Milagp32.exe 1824 Milagp32.exe 1720 Mlljiklc.exe 1720 Mlljiklc.exe 596 Medobp32.exe 596 Medobp32.exe 2328 Mbiokdam.exe 2328 Mbiokdam.exe 2452 Mhegckpd.exe 2452 Mhegckpd.exe 1080 Mlacdj32.exe 1080 Mlacdj32.exe 1040 Nhhdiknb.exe 1040 Nhhdiknb.exe 864 Napibq32.exe 864 Napibq32.exe 2212 Ndoenlcf.exe 2212 Ndoenlcf.exe 1324 Nkhmkf32.exe 1324 Nkhmkf32.exe 912 Nhojjjhj.exe 912 Nhojjjhj.exe 3028 Nipgab32.exe 3028 Nipgab32.exe 2920 Nchkjhdh.exe 2920 Nchkjhdh.exe 1896 Omnpgqdo.exe 1896 Omnpgqdo.exe 2908 Olapcm32.exe 2908 Olapcm32.exe 2880 Ogfdpfjo.exe 2880 Ogfdpfjo.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Gbjpam32.exe Gokdeb32.exe File created C:\Windows\SysWOW64\Olclimif.exe Ogfdpfjo.exe File created C:\Windows\SysWOW64\Idhqheep.exe Iqldgg32.exe File opened for modification C:\Windows\SysWOW64\Pegbhfgo.exe Pciflkhk.exe File created C:\Windows\SysWOW64\Blohop32.dll Phhkja32.exe File created C:\Windows\SysWOW64\Jhipdo32.dll Dhkmjbbo.exe File opened for modification C:\Windows\SysWOW64\Pkdkpmef.exe Pegbhfgo.exe File opened for modification C:\Windows\SysWOW64\Adceja32.exe Abeinf32.exe File created C:\Windows\SysWOW64\Hhoedk32.dll Cfnaglfn.exe File created C:\Windows\SysWOW64\Hmmdhjlb.exe Hgpkpc32.exe File created C:\Windows\SysWOW64\Jjgiiale.dll Hgpkpc32.exe File created C:\Windows\SysWOW64\Doejcqak.dll Kjbaqn32.exe File opened for modification C:\Windows\SysWOW64\Ncdecefm.exe Nqfigjgi.exe File opened for modification C:\Windows\SysWOW64\Olclimif.exe Ogfdpfjo.exe File created C:\Windows\SysWOW64\Mjbhfk32.dll Kimpocda.exe File opened for modification C:\Windows\SysWOW64\Mdmdpd32.exe Moqkgmol.exe File created C:\Windows\SysWOW64\Bmbmhh32.dll Idedbf32.exe File created C:\Windows\SysWOW64\Cmnafhkl.dll Kpmmce32.exe File opened for modification C:\Windows\SysWOW64\Aqjfoblc.exe Anljbgmp.exe File opened for modification C:\Windows\SysWOW64\Ecpnfn32.exe Ecnaaofc.exe File opened for modification C:\Windows\SysWOW64\Ekkbkq32.exe Eijfchlm.exe File created C:\Windows\SysWOW64\Klniao32.exe Kiomec32.exe File created C:\Windows\SysWOW64\Nadpkfgd.dll Knggqm32.exe File opened for modification C:\Windows\SysWOW64\Lbpcjpek.exe Lihoaj32.exe File opened for modification C:\Windows\SysWOW64\Mlkqhhld.exe Mhfniekh.exe File created C:\Windows\SysWOW64\Bccpob32.dll Pfoakokc.exe File opened for modification C:\Windows\SysWOW64\Eijfchlm.exe Ecpnfn32.exe File created C:\Windows\SysWOW64\Falqhj32.exe Fjeigl32.exe File created C:\Windows\SysWOW64\Kimpocda.exe Jkqmnh32.exe File opened for modification C:\Windows\SysWOW64\Iaekqk32.exe Inioplah.exe File created C:\Windows\SysWOW64\Pgpmcg32.exe Pfoakokc.exe File created C:\Windows\SysWOW64\Phhoog32.dll Bghdeo32.exe File created C:\Windows\SysWOW64\Ggeioi32.dll Dobhamlo.exe File created C:\Windows\SysWOW64\Kkcfbkfj.exe Kchaniho.exe File created C:\Windows\SysWOW64\Oadjjfga.exe Odqiaa32.exe File created C:\Windows\SysWOW64\Nkcmgein.dll Inpeak32.exe File created C:\Windows\SysWOW64\Eigmlcmd.dll Lbpcjpek.exe File created C:\Windows\SysWOW64\Fnbamd32.dll Pednllpk.exe File created C:\Windows\SysWOW64\Gnneqopg.dll Elkoecin.exe File opened for modification C:\Windows\SysWOW64\Gbjpam32.exe Gokdeb32.exe File opened for modification C:\Windows\SysWOW64\Gmodofgd.exe Gdhlni32.exe File created C:\Windows\SysWOW64\Keemfmgm.dll Igmppcpm.exe File created C:\Windows\SysWOW64\Fgfalpog.dll Jaflocqd.exe File created C:\Windows\SysWOW64\Aoomma32.dll Oadjjfga.exe File created C:\Windows\SysWOW64\Pifdog32.exe Papmnj32.exe File created C:\Windows\SysWOW64\Ajegmhpa.exe Ackoqn32.exe File created C:\Windows\SysWOW64\Aanjkcmp.dll Begikk32.exe File created C:\Windows\SysWOW64\Igfjlfha.dll Dhmjpbpl.exe File created C:\Windows\SysWOW64\Gkphecpa.exe Gbgcln32.exe File created C:\Windows\SysWOW64\Lfmhla32.exe Jkfkjemd.exe File created C:\Windows\SysWOW64\Ojhehlag.exe Ohjhlqbc.exe File created C:\Windows\SysWOW64\Kapgeh32.dll Innhkknc.exe File created C:\Windows\SysWOW64\Jjloak32.exe Jofkcb32.exe File created C:\Windows\SysWOW64\Inagelpj.dll Beelel32.exe File created C:\Windows\SysWOW64\Mlkqhhld.exe Mhfniekh.exe File created C:\Windows\SysWOW64\Mkmemkfk.dll Mhfniekh.exe File opened for modification C:\Windows\SysWOW64\Pefjbknh.exe Pednllpk.exe File created C:\Windows\SysWOW64\Kjdnqckh.dll Jojaje32.exe File created C:\Windows\SysWOW64\Fbpkmpdg.dll Mnheniaa.exe File created C:\Windows\SysWOW64\Lbafhael.dll Olchgp32.exe File created C:\Windows\SysWOW64\Ipgimk32.dll Qofjmnji.exe File created C:\Windows\SysWOW64\Inpeak32.exe Idhqheep.exe File opened for modification C:\Windows\SysWOW64\Amagdcag.exe Agdnkm32.exe File opened for modification C:\Windows\SysWOW64\Gnqafn32.exe Gmodofgd.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qnedbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjcmfg32.dll" Amccicoe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bnppmjkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Medobp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Olapcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Inllflpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jofkcb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kjpekn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ccoejpgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghfcjg32.dll" Gokdeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ecnaaofc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jojaje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mqfajdpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iqldgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmhmdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkmhnbnd.dll" Cjljmjmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nchkjhdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jehmgigk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jgficdgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddcmehfa.dll" Bcmheqim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikpfgkpk.dll" Fajdbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Opihfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edcieadq.dll" Oaqccc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlqddkef.dll" Pkdkpmef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mlljiklc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ionbkmgi.dll" Olclimif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kimpocda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogihfj32.dll" Mbadih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iaekqk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dobhamlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Emahhhhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ggieoddc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bhchag32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bcmheqim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Omnpgqdo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pjdlkeln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cimdba32.dll" Omfadgqj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qganapgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jkmlhccn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oadjjfga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qepbjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhdpllak.dll" Inioplah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ippkni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mqfajdpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Beelel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oaqccc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gbgcln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Napibq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Icmnib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lbibla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lgekdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oappof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpegicii.dll" Nhdnbipf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gigqbf32.dll" Pmaofnkc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bjbdnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oagkac32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pifdog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iaekqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jblmpmfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eegnhfab.dll" Nokiic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qdolobjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jkfkjemd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Laokdekd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfngafnm.dll" Pifdog32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2800 2724 e68ee73e5a3b27a19aa4c40d9225a338_JC.exe 27 PID 2724 wrote to memory of 2800 2724 e68ee73e5a3b27a19aa4c40d9225a338_JC.exe 27 PID 2724 wrote to memory of 2800 2724 e68ee73e5a3b27a19aa4c40d9225a338_JC.exe 27 PID 2724 wrote to memory of 2800 2724 e68ee73e5a3b27a19aa4c40d9225a338_JC.exe 27 PID 2800 wrote to memory of 2572 2800 Jbmdig32.exe 28 PID 2800 wrote to memory of 2572 2800 Jbmdig32.exe 28 PID 2800 wrote to memory of 2572 2800 Jbmdig32.exe 28 PID 2800 wrote to memory of 2572 2800 Jbmdig32.exe 28 PID 2572 wrote to memory of 3000 2572 Ippkni32.exe 29 PID 2572 wrote to memory of 3000 2572 Ippkni32.exe 29 PID 2572 wrote to memory of 3000 2572 Ippkni32.exe 29 PID 2572 wrote to memory of 3000 2572 Ippkni32.exe 29 PID 3000 wrote to memory of 2820 3000 Iiiogoac.exe 30 PID 3000 wrote to memory of 2820 3000 Iiiogoac.exe 30 PID 3000 wrote to memory of 2820 3000 Iiiogoac.exe 30 PID 3000 wrote to memory of 2820 3000 Iiiogoac.exe 30 PID 2820 wrote to memory of 2816 2820 Igmppcpm.exe 32 PID 2820 wrote to memory of 2816 2820 Igmppcpm.exe 32 PID 2820 wrote to memory of 2816 2820 Igmppcpm.exe 32 PID 2820 wrote to memory of 2816 2820 Igmppcpm.exe 32 PID 2816 wrote to memory of 1948 2816 Ijklmn32.exe 31 PID 2816 wrote to memory of 1948 2816 Ijklmn32.exe 31 PID 2816 wrote to memory of 1948 2816 Ijklmn32.exe 31 PID 2816 wrote to memory of 1948 2816 Ijklmn32.exe 31 PID 1948 wrote to memory of 1512 1948 Jojaje32.exe 33 PID 1948 wrote to memory of 1512 1948 Jojaje32.exe 33 PID 1948 wrote to memory of 1512 1948 Jojaje32.exe 33 PID 1948 wrote to memory of 1512 1948 Jojaje32.exe 33 PID 1512 wrote to memory of 688 1512 Jhbfcj32.exe 34 PID 1512 wrote to memory of 688 1512 Jhbfcj32.exe 34 PID 1512 wrote to memory of 688 1512 Jhbfcj32.exe 34 PID 1512 wrote to memory of 688 1512 Jhbfcj32.exe 34 PID 688 wrote to memory of 320 688 Jkcoee32.exe 35 PID 688 wrote to memory of 320 688 Jkcoee32.exe 35 PID 688 wrote to memory of 320 688 Jkcoee32.exe 35 PID 688 wrote to memory of 320 688 Jkcoee32.exe 35 PID 320 wrote to memory of 1488 320 Jkfkjemd.exe 36 PID 320 wrote to memory of 1488 320 Jkfkjemd.exe 36 PID 320 wrote to memory of 1488 320 Jkfkjemd.exe 36 PID 320 wrote to memory of 1488 320 Jkfkjemd.exe 36 PID 1488 wrote to memory of 1980 1488 Lfmhla32.exe 37 PID 1488 wrote to memory of 1980 1488 Lfmhla32.exe 37 PID 1488 wrote to memory of 1980 1488 Lfmhla32.exe 37 PID 1488 wrote to memory of 1980 1488 Lfmhla32.exe 37 PID 1980 wrote to memory of 2144 1980 Lilehl32.exe 38 PID 1980 wrote to memory of 2144 1980 Lilehl32.exe 38 PID 1980 wrote to memory of 2144 1980 Lilehl32.exe 38 PID 1980 wrote to memory of 2144 1980 Lilehl32.exe 38 PID 2144 wrote to memory of 1848 2144 Lbdiabcg.exe 39 PID 2144 wrote to memory of 1848 2144 Lbdiabcg.exe 39 PID 2144 wrote to memory of 1848 2144 Lbdiabcg.exe 39 PID 2144 wrote to memory of 1848 2144 Lbdiabcg.exe 39 PID 1848 wrote to memory of 868 1848 Linanl32.exe 40 PID 1848 wrote to memory of 868 1848 Linanl32.exe 40 PID 1848 wrote to memory of 868 1848 Linanl32.exe 40 PID 1848 wrote to memory of 868 1848 Linanl32.exe 40 PID 868 wrote to memory of 1752 868 Lbibla32.exe 41 PID 868 wrote to memory of 1752 868 Lbibla32.exe 41 PID 868 wrote to memory of 1752 868 Lbibla32.exe 41 PID 868 wrote to memory of 1752 868 Lbibla32.exe 41 PID 1752 wrote to memory of 1824 1752 Lgekdh32.exe 42 PID 1752 wrote to memory of 1824 1752 Lgekdh32.exe 42 PID 1752 wrote to memory of 1824 1752 Lgekdh32.exe 42 PID 1752 wrote to memory of 1824 1752 Lgekdh32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\e68ee73e5a3b27a19aa4c40d9225a338_JC.exe"C:\Users\Admin\AppData\Local\Temp\e68ee73e5a3b27a19aa4c40d9225a338_JC.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Jbmdig32.exeC:\Windows\system32\Jbmdig32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\Ippkni32.exeC:\Windows\system32\Ippkni32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\Iiiogoac.exeC:\Windows\system32\Iiiogoac.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\Igmppcpm.exeC:\Windows\system32\Igmppcpm.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Ijklmn32.exeC:\Windows\system32\Ijklmn32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816
-
-
-
-
-
-
C:\Windows\SysWOW64\Jojaje32.exeC:\Windows\system32\Jojaje32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\Jhbfcj32.exeC:\Windows\system32\Jhbfcj32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\Jkcoee32.exeC:\Windows\system32\Jkcoee32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\Jkfkjemd.exeC:\Windows\system32\Jkfkjemd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\Lfmhla32.exeC:\Windows\system32\Lfmhla32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\Lilehl32.exeC:\Windows\system32\Lilehl32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\Lbdiabcg.exeC:\Windows\system32\Lbdiabcg.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\Linanl32.exeC:\Windows\system32\Linanl32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\Lbibla32.exeC:\Windows\system32\Lbibla32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\Lgekdh32.exeC:\Windows\system32\Lgekdh32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\Milagp32.exeC:\Windows\system32\Milagp32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824 -
C:\Windows\SysWOW64\Mlljiklc.exeC:\Windows\system32\Mlljiklc.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1720 -
C:\Windows\SysWOW64\Medobp32.exeC:\Windows\system32\Medobp32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:596 -
C:\Windows\SysWOW64\Mbiokdam.exeC:\Windows\system32\Mbiokdam.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2328 -
C:\Windows\SysWOW64\Mhegckpd.exeC:\Windows\system32\Mhegckpd.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Mlacdj32.exeC:\Windows\system32\Mlacdj32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1080 -
C:\Windows\SysWOW64\Nhhdiknb.exeC:\Windows\system32\Nhhdiknb.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1040 -
C:\Windows\SysWOW64\Napibq32.exeC:\Windows\system32\Napibq32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:864 -
C:\Windows\SysWOW64\Ndoenlcf.exeC:\Windows\system32\Ndoenlcf.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2212 -
C:\Windows\SysWOW64\Nkhmkf32.exeC:\Windows\system32\Nkhmkf32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1324 -
C:\Windows\SysWOW64\Nhojjjhj.exeC:\Windows\system32\Nhojjjhj.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:912
-
-
-
-
-
-
C:\Windows\SysWOW64\Nipgab32.exeC:\Windows\system32\Nipgab32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3028 -
C:\Windows\SysWOW64\Nchkjhdh.exeC:\Windows\system32\Nchkjhdh.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2920 -
C:\Windows\SysWOW64\Omnpgqdo.exeC:\Windows\system32\Omnpgqdo.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1896 -
C:\Windows\SysWOW64\Olapcm32.exeC:\Windows\system32\Olapcm32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2908 -
C:\Windows\SysWOW64\Ogfdpfjo.exeC:\Windows\system32\Ogfdpfjo.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2880 -
C:\Windows\SysWOW64\Olclimif.exeC:\Windows\system32\Olclimif.exe6⤵
- Executes dropped EXE
- Modifies registry class
PID:2404 -
C:\Windows\SysWOW64\Oigmbagp.exeC:\Windows\system32\Oigmbagp.exe7⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\Oagkac32.exeC:\Windows\system32\Oagkac32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1664 -
C:\Windows\SysWOW64\Pokkkgpo.exeC:\Windows\system32\Pokkkgpo.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\Phcpdm32.exeC:\Windows\system32\Phcpdm32.exe10⤵
- Executes dropped EXE
PID:312 -
C:\Windows\SysWOW64\Pjdlkeln.exeC:\Windows\system32\Pjdlkeln.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2720 -
C:\Windows\SysWOW64\Pcmadj32.exeC:\Windows\system32\Pcmadj32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2256 -
C:\Windows\SysWOW64\Pkdiehca.exeC:\Windows\system32\Pkdiehca.exe13⤵
- Executes dropped EXE
PID:1316 -
C:\Windows\SysWOW64\Pnbeacbd.exeC:\Windows\system32\Pnbeacbd.exe14⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\Aejmha32.exeC:\Windows\system32\Aejmha32.exe15⤵
- Executes dropped EXE
PID:788 -
C:\Windows\SysWOW64\Edgkap32.exeC:\Windows\system32\Edgkap32.exe16⤵
- Executes dropped EXE
PID:1084 -
C:\Windows\SysWOW64\Mkmlbc32.exeC:\Windows\system32\Mkmlbc32.exe17⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\Ieokjbkp.exeC:\Windows\system32\Ieokjbkp.exe18⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\Ilicgl32.exeC:\Windows\system32\Ilicgl32.exe19⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\Jaflocqd.exeC:\Windows\system32\Jaflocqd.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1540 -
C:\Windows\SysWOW64\Jddhknpg.exeC:\Windows\system32\Jddhknpg.exe21⤵
- Executes dropped EXE
PID:1380 -
C:\Windows\SysWOW64\Jjnqhh32.exeC:\Windows\system32\Jjnqhh32.exe22⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\SysWOW64\Jdgeanne.exeC:\Windows\system32\Jdgeanne.exe23⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\Jkqmnh32.exeC:\Windows\system32\Jkqmnh32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2376 -
C:\Windows\SysWOW64\Kimpocda.exeC:\Windows\system32\Kimpocda.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Khpqkq32.exeC:\Windows\system32\Khpqkq32.exe26⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\Kpgiln32.exeC:\Windows\system32\Kpgiln32.exe27⤵
- Executes dropped EXE
PID:852 -
C:\Windows\SysWOW64\Kiomec32.exeC:\Windows\system32\Kiomec32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1856 -
C:\Windows\SysWOW64\Klniao32.exeC:\Windows\system32\Klniao32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Kchaniho.exeC:\Windows\system32\Kchaniho.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1620 -
C:\Windows\SysWOW64\Kkcfbkfj.exeC:\Windows\system32\Kkcfbkfj.exe31⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\Kamooe32.exeC:\Windows\system32\Kamooe32.exe32⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\Koaohila.exeC:\Windows\system32\Koaohila.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Laokdekd.exeC:\Windows\system32\Laokdekd.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:2788 -
C:\Windows\SysWOW64\Mkeogn32.exeC:\Windows\system32\Mkeogn32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\Moqkgmol.exeC:\Windows\system32\Moqkgmol.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2532 -
C:\Windows\SysWOW64\Mdmdpd32.exeC:\Windows\system32\Mdmdpd32.exe37⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\Mkgllndq.exeC:\Windows\system32\Mkgllndq.exe38⤵
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\Mbadih32.exeC:\Windows\system32\Mbadih32.exe39⤵
- Modifies registry class
PID:1564 -
C:\Windows\SysWOW64\Mhklfbcj.exeC:\Windows\system32\Mhklfbcj.exe40⤵PID:1544
-
C:\Windows\SysWOW64\Mnheniaa.exeC:\Windows\system32\Mnheniaa.exe41⤵
- Drops file in System32 directory
PID:2576 -
C:\Windows\SysWOW64\Mqfajdpe.exeC:\Windows\system32\Mqfajdpe.exe42⤵
- Modifies registry class
PID:2732 -
C:\Windows\SysWOW64\Mjoecjgf.exeC:\Windows\system32\Mjoecjgf.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1368 -
C:\Windows\SysWOW64\Mnjaci32.exeC:\Windows\system32\Mnjaci32.exe44⤵PID:1248
-
C:\Windows\SysWOW64\Mcgjlp32.exeC:\Windows\system32\Mcgjlp32.exe45⤵PID:2284
-
C:\Windows\SysWOW64\Olchgp32.exeC:\Windows\system32\Olchgp32.exe46⤵
- Drops file in System32 directory
PID:2268 -
C:\Windows\SysWOW64\Onadck32.exeC:\Windows\system32\Onadck32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1960 -
C:\Windows\SysWOW64\Oappof32.exeC:\Windows\system32\Oappof32.exe48⤵
- Modifies registry class
PID:1156 -
C:\Windows\SysWOW64\Ohjhlqbc.exeC:\Windows\system32\Ohjhlqbc.exe49⤵
- Drops file in System32 directory
PID:432 -
C:\Windows\SysWOW64\Ojhehlag.exeC:\Windows\system32\Ojhehlag.exe50⤵PID:2416
-
C:\Windows\SysWOW64\Omfadgqj.exeC:\Windows\system32\Omfadgqj.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1372 -
C:\Windows\SysWOW64\Odqiaa32.exeC:\Windows\system32\Odqiaa32.exe52⤵
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\Oadjjfga.exeC:\Windows\system32\Oadjjfga.exe53⤵
- Drops file in System32 directory
- Modifies registry class
PID:2572 -
C:\Windows\SysWOW64\Peiliihm.exeC:\Windows\system32\Peiliihm.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1396 -
C:\Windows\SysWOW64\Poapbn32.exeC:\Windows\system32\Poapbn32.exe55⤵PID:964
-
C:\Windows\SysWOW64\Papmnj32.exeC:\Windows\system32\Papmnj32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2112 -
C:\Windows\SysWOW64\Pifdog32.exeC:\Windows\system32\Pifdog32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Pabidiko.exeC:\Windows\system32\Pabidiko.exe58⤵PID:2784
-
C:\Windows\SysWOW64\Pdpepejb.exeC:\Windows\system32\Pdpepejb.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1704 -
C:\Windows\SysWOW64\Plgmabke.exeC:\Windows\system32\Plgmabke.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1744 -
C:\Windows\SysWOW64\Qofjmnji.exeC:\Windows\system32\Qofjmnji.exe61⤵
- Drops file in System32 directory
PID:2760
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Qepbjh32.exeC:\Windows\system32\Qepbjh32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1788 -
C:\Windows\SysWOW64\Qganapgc.exeC:\Windows\system32\Qganapgc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\Qpicjend.exeC:\Windows\system32\Qpicjend.exe3⤵PID:1596
-
C:\Windows\SysWOW64\Aclhap32.exeC:\Windows\system32\Aclhap32.exe4⤵PID:688
-
C:\Windows\SysWOW64\Kebggncm.exeC:\Windows\system32\Kebggncm.exe5⤵PID:1728
-
C:\Windows\SysWOW64\Ecmlomgk.exeC:\Windows\system32\Ecmlomgk.exe6⤵PID:2528
-
C:\Windows\SysWOW64\Gdckncfj.exeC:\Windows\system32\Gdckncfj.exe7⤵PID:328
-
C:\Windows\SysWOW64\Hlhbhdlj.exeC:\Windows\system32\Hlhbhdlj.exe8⤵PID:1008
-
C:\Windows\SysWOW64\Inioplah.exeC:\Windows\system32\Inioplah.exe9⤵
- Drops file in System32 directory
- Modifies registry class
PID:1784 -
C:\Windows\SysWOW64\Iaekqk32.exeC:\Windows\system32\Iaekqk32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2700 -
C:\Windows\SysWOW64\Idcgmf32.exeC:\Windows\system32\Idcgmf32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:528 -
C:\Windows\SysWOW64\Igacia32.exeC:\Windows\system32\Igacia32.exe12⤵PID:1168
-
C:\Windows\SysWOW64\Inllflpf.exeC:\Windows\system32\Inllflpf.exe13⤵
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\Idedbf32.exeC:\Windows\system32\Idedbf32.exe14⤵
- Drops file in System32 directory
PID:744 -
C:\Windows\SysWOW64\Ikplopnp.exeC:\Windows\system32\Ikplopnp.exe15⤵PID:2480
-
C:\Windows\SysWOW64\Innhkknc.exeC:\Windows\system32\Innhkknc.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1116 -
C:\Windows\SysWOW64\Iqldgg32.exeC:\Windows\system32\Iqldgg32.exe17⤵
- Drops file in System32 directory
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Idhqheep.exeC:\Windows\system32\Idhqheep.exe18⤵
- Drops file in System32 directory
PID:1996 -
C:\Windows\SysWOW64\Inpeak32.exeC:\Windows\system32\Inpeak32.exe19⤵
- Drops file in System32 directory
PID:3052 -
C:\Windows\SysWOW64\Iqoamf32.exeC:\Windows\system32\Iqoamf32.exe20⤵PID:2120
-
C:\Windows\SysWOW64\Icmnib32.exeC:\Windows\system32\Icmnib32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2412 -
C:\Windows\SysWOW64\Inbbfk32.exeC:\Windows\system32\Inbbfk32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1364 -
C:\Windows\SysWOW64\Jofkcb32.exeC:\Windows\system32\Jofkcb32.exe23⤵
- Drops file in System32 directory
- Modifies registry class
PID:1740 -
C:\Windows\SysWOW64\Jjloak32.exeC:\Windows\system32\Jjloak32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3000 -
C:\Windows\SysWOW64\Jkmlhccn.exeC:\Windows\system32\Jkmlhccn.exe25⤵
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Jcddja32.exeC:\Windows\system32\Jcddja32.exe26⤵PID:1512
-
C:\Windows\SysWOW64\Jfbpfl32.exeC:\Windows\system32\Jfbpfl32.exe27⤵PID:1140
-
C:\Windows\SysWOW64\Jialbh32.exeC:\Windows\system32\Jialbh32.exe28⤵PID:2992
-
C:\Windows\SysWOW64\Jokdobid.exeC:\Windows\system32\Jokdobid.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1028 -
C:\Windows\SysWOW64\Jbiqkmhh.exeC:\Windows\system32\Jbiqkmhh.exe30⤵PID:2264
-
C:\Windows\SysWOW64\Jehmgigk.exeC:\Windows\system32\Jehmgigk.exe31⤵
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\Jgficdgo.exeC:\Windows\system32\Jgficdgo.exe32⤵
- Modifies registry class
PID:1112 -
C:\Windows\SysWOW64\Jomadaga.exeC:\Windows\system32\Jomadaga.exe33⤵PID:2304
-
C:\Windows\SysWOW64\Jblmpmfe.exeC:\Windows\system32\Jblmpmfe.exe34⤵
- Modifies registry class
PID:2944 -
C:\Windows\SysWOW64\Jaajaikm.exeC:\Windows\system32\Jaajaikm.exe35⤵PID:472
-
C:\Windows\SysWOW64\Kjllpopk.exeC:\Windows\system32\Kjllpopk.exe36⤵PID:1628
-
C:\Windows\SysWOW64\Knggqm32.exeC:\Windows\system32\Knggqm32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1556 -
C:\Windows\SysWOW64\Kaedmi32.exeC:\Windows\system32\Kaedmi32.exe38⤵PID:2836
-
C:\Windows\SysWOW64\Kgplicod.exeC:\Windows\system32\Kgplicod.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2524 -
C:\Windows\SysWOW64\Knidfm32.exeC:\Windows\system32\Knidfm32.exe40⤵PID:616
-
C:\Windows\SysWOW64\Kahqbh32.exeC:\Windows\system32\Kahqbh32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1520 -
C:\Windows\SysWOW64\Kjpekn32.exeC:\Windows\system32\Kjpekn32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:268 -
C:\Windows\SysWOW64\Kpmmce32.exeC:\Windows\system32\Kpmmce32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1288 -
C:\Windows\SysWOW64\Kjbaqn32.exeC:\Windows\system32\Kjbaqn32.exe44⤵
- Drops file in System32 directory
PID:1972 -
C:\Windows\SysWOW64\Kmanmi32.exeC:\Windows\system32\Kmanmi32.exe45⤵PID:2056
-
C:\Windows\SysWOW64\Lihoaj32.exeC:\Windows\system32\Lihoaj32.exe46⤵
- Drops file in System32 directory
PID:1228 -
C:\Windows\SysWOW64\Lbpcjpek.exeC:\Windows\system32\Lbpcjpek.exe47⤵
- Drops file in System32 directory
PID:1852 -
C:\Windows\SysWOW64\Loiqephm.exeC:\Windows\system32\Loiqephm.exe48⤵PID:2724
-
C:\Windows\SysWOW64\Lahmalgq.exeC:\Windows\system32\Lahmalgq.exe49⤵PID:1572
-
C:\Windows\SysWOW64\Lolmjpfj.exeC:\Windows\system32\Lolmjpfj.exe50⤵PID:2624
-
C:\Windows\SysWOW64\Lmomfm32.exeC:\Windows\system32\Lmomfm32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3008 -
C:\Windows\SysWOW64\Mkbnpaln.exeC:\Windows\system32\Mkbnpaln.exe52⤵PID:736
-
C:\Windows\SysWOW64\Mhfniekh.exeC:\Windows\system32\Mhfniekh.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2160 -
C:\Windows\SysWOW64\Mlkqhhld.exeC:\Windows\system32\Mlkqhhld.exe54⤵PID:1688
-
C:\Windows\SysWOW64\Mceidb32.exeC:\Windows\system32\Mceidb32.exe55⤵PID:2124
-
C:\Windows\SysWOW64\Mhaami32.exeC:\Windows\system32\Mhaami32.exe56⤵PID:932
-
C:\Windows\SysWOW64\Nokiic32.exeC:\Windows\system32\Nokiic32.exe57⤵
- Modifies registry class
PID:2552 -
C:\Windows\SysWOW64\Nhdnbipf.exeC:\Windows\system32\Nhdnbipf.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2860 -
C:\Windows\SysWOW64\Nkbjodoj.exeC:\Windows\system32\Nkbjodoj.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:760 -
C:\Windows\SysWOW64\Ndkogj32.exeC:\Windows\system32\Ndkogj32.exe60⤵PID:2484
-
C:\Windows\SysWOW64\Nopcdbep.exeC:\Windows\system32\Nopcdbep.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2956 -
C:\Windows\SysWOW64\Npdlbj32.exeC:\Windows\system32\Npdlbj32.exe62⤵PID:2060
-
C:\Windows\SysWOW64\Nkipoc32.exeC:\Windows\system32\Nkipoc32.exe63⤵PID:2024
-
C:\Windows\SysWOW64\Nnhmkohe.exeC:\Windows\system32\Nnhmkohe.exe64⤵PID:2240
-
C:\Windows\SysWOW64\Nqfigjgi.exeC:\Windows\system32\Nqfigjgi.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2904 -
C:\Windows\SysWOW64\Ncdecefm.exeC:\Windows\system32\Ncdecefm.exe66⤵PID:2164
-
C:\Windows\SysWOW64\Oopocfgl.exeC:\Windows\system32\Oopocfgl.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2464 -
C:\Windows\SysWOW64\Ojecaoga.exeC:\Windows\system32\Ojecaoga.exe68⤵PID:1480
-
C:\Windows\SysWOW64\Okgphg32.exeC:\Windows\system32\Okgphg32.exe69⤵PID:1968
-
C:\Windows\SysWOW64\Omflbj32.exeC:\Windows\system32\Omflbj32.exe70⤵PID:2808
-
C:\Windows\SysWOW64\Okimnfkm.exeC:\Windows\system32\Okimnfkm.exe71⤵PID:2792
-
C:\Windows\SysWOW64\Pfoakokc.exeC:\Windows\system32\Pfoakokc.exe72⤵
- Drops file in System32 directory
PID:1540 -
C:\Windows\SysWOW64\Pgpmcg32.exeC:\Windows\system32\Pgpmcg32.exe73⤵PID:1192
-
C:\Windows\SysWOW64\Pnjepahn.exeC:\Windows\system32\Pnjepahn.exe74⤵PID:2704
-
C:\Windows\SysWOW64\Pednllpk.exeC:\Windows\system32\Pednllpk.exe75⤵
- Drops file in System32 directory
PID:3012 -
C:\Windows\SysWOW64\Pefjbknh.exeC:\Windows\system32\Pefjbknh.exe76⤵PID:2424
-
C:\Windows\SysWOW64\Pkpboe32.exeC:\Windows\system32\Pkpboe32.exe77⤵PID:2864
-
C:\Windows\SysWOW64\Pmaofnkc.exeC:\Windows\system32\Pmaofnkc.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1368 -
C:\Windows\SysWOW64\Pfjcocad.exeC:\Windows\system32\Pfjcocad.exe79⤵PID:860
-
C:\Windows\SysWOW64\Qimifn32.exeC:\Windows\system32\Qimifn32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1316 -
C:\Windows\SysWOW64\Bokdiahg.exeC:\Windows\system32\Bokdiahg.exe81⤵PID:2668
-
C:\Windows\SysWOW64\Beelel32.exeC:\Windows\system32\Beelel32.exe82⤵
- Drops file in System32 directory
- Modifies registry class
PID:2812 -
C:\Windows\SysWOW64\Bhchag32.exeC:\Windows\system32\Bhchag32.exe83⤵
- Modifies registry class
PID:1156 -
C:\Windows\SysWOW64\Bjbdnb32.exeC:\Windows\system32\Bjbdnb32.exe84⤵
- Modifies registry class
PID:1928 -
C:\Windows\SysWOW64\Balmjmeh.exeC:\Windows\system32\Balmjmeh.exe85⤵PID:1136
-
C:\Windows\SysWOW64\Begikk32.exeC:\Windows\system32\Begikk32.exe86⤵
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\Opihfb32.exeC:\Windows\system32\Opihfb32.exe87⤵
- Modifies registry class
PID:2932 -
C:\Windows\SysWOW64\Oaqccc32.exeC:\Windows\system32\Oaqccc32.exe88⤵
- Modifies registry class
PID:2088 -
C:\Windows\SysWOW64\Pciflkhk.exeC:\Windows\system32\Pciflkhk.exe89⤵
- Drops file in System32 directory
PID:996 -
C:\Windows\SysWOW64\Pegbhfgo.exeC:\Windows\system32\Pegbhfgo.exe90⤵
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\Pkdkpmef.exeC:\Windows\system32\Pkdkpmef.exe91⤵
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Pfionfel.exeC:\Windows\system32\Pfionfel.exe92⤵PID:1588
-
C:\Windows\SysWOW64\Phhkja32.exeC:\Windows\system32\Phhkja32.exe93⤵
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\Qnedbh32.exeC:\Windows\system32\Qnedbh32.exe94⤵
- Modifies registry class
PID:2996 -
C:\Windows\SysWOW64\Qdolobjd.exeC:\Windows\system32\Qdolobjd.exe95⤵
- Modifies registry class
PID:1084 -
C:\Windows\SysWOW64\Abeinf32.exeC:\Windows\system32\Abeinf32.exe96⤵
- Drops file in System32 directory
PID:2688 -
C:\Windows\SysWOW64\Adceja32.exeC:\Windows\system32\Adceja32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1692 -
C:\Windows\SysWOW64\Agbafm32.exeC:\Windows\system32\Agbafm32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1776 -
C:\Windows\SysWOW64\Anljbgmp.exeC:\Windows\system32\Anljbgmp.exe99⤵
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\Aqjfoblc.exeC:\Windows\system32\Aqjfoblc.exe100⤵PID:1488
-
C:\Windows\SysWOW64\Agdnkm32.exeC:\Windows\system32\Agdnkm32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1600 -
C:\Windows\SysWOW64\Amagdcag.exeC:\Windows\system32\Amagdcag.exe102⤵PID:1544
-
C:\Windows\SysWOW64\Ackoqn32.exeC:\Windows\system32\Ackoqn32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:432 -
C:\Windows\SysWOW64\Ajegmhpa.exeC:\Windows\system32\Ajegmhpa.exe104⤵PID:1672
-
C:\Windows\SysWOW64\Amccicoe.exeC:\Windows\system32\Amccicoe.exe105⤵
- Modifies registry class
PID:968 -
C:\Windows\SysWOW64\Abplajnl.exeC:\Windows\system32\Abplajnl.exe106⤵PID:1824
-
C:\Windows\SysWOW64\Ajgdbgnn.exeC:\Windows\system32\Ajgdbgnn.exe107⤵PID:2328
-
C:\Windows\SysWOW64\Aodmkn32.exeC:\Windows\system32\Aodmkn32.exe108⤵PID:2948
-
C:\Windows\SysWOW64\Bbbigj32.exeC:\Windows\system32\Bbbigj32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1396 -
C:\Windows\SysWOW64\Beaece32.exeC:\Windows\system32\Beaece32.exe110⤵PID:1252
-
C:\Windows\SysWOW64\Bmhmdb32.exeC:\Windows\system32\Bmhmdb32.exe111⤵
- Modifies registry class
PID:1008 -
C:\Windows\SysWOW64\Bniilkan.exeC:\Windows\system32\Bniilkan.exe112⤵PID:2272
-
C:\Windows\SysWOW64\Bionicac.exeC:\Windows\system32\Bionicac.exe113⤵PID:1996
-
C:\Windows\SysWOW64\Beenndfh.exeC:\Windows\system32\Beenndfh.exe114⤵PID:1740
-
C:\Windows\SysWOW64\Bnppmjkf.exeC:\Windows\system32\Bnppmjkf.exe115⤵
- Modifies registry class
PID:2992 -
C:\Windows\SysWOW64\Bcmheqim.exeC:\Windows\system32\Bcmheqim.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\Bghdeo32.exeC:\Windows\system32\Bghdeo32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1952 -
C:\Windows\SysWOW64\Ccoejpgj.exeC:\Windows\system32\Ccoejpgj.exe118⤵
- Modifies registry class
PID:1908 -
C:\Windows\SysWOW64\Cfnaglfn.exeC:\Windows\system32\Cfnaglfn.exe119⤵
- Drops file in System32 directory
PID:2936 -
C:\Windows\SysWOW64\Cjljmjmd.exeC:\Windows\system32\Cjljmjmd.exe120⤵
- Modifies registry class
PID:3008 -
C:\Windows\SysWOW64\Cmjfielh.exeC:\Windows\system32\Cmjfielh.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1380 -
C:\Windows\SysWOW64\Cbgnaljp.exeC:\Windows\system32\Cbgnaljp.exe122⤵PID:2376
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-