Analysis
-
max time kernel
185s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 15:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
02e9594ad734bfcc283faeb5eaa220f7_JC.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
02e9594ad734bfcc283faeb5eaa220f7_JC.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
02e9594ad734bfcc283faeb5eaa220f7_JC.exe
-
Size
87KB
-
MD5
02e9594ad734bfcc283faeb5eaa220f7
-
SHA1
40219f8c6a0ca60e1cec600e5519dcc93addfdc7
-
SHA256
14dc3382d1e0dfd5d9002400720b4fec3f21dc0acc7ca0d43176c1c0f8d0cfc5
-
SHA512
fb659153fc4cc5426597bbff6f12e03d34f4d46a54c8ccf6e9fa962fdbcaf2e8a8238c2e9cb05fee0e5e6aac586e03094b8293cb61aa8fbe66d5df254460767b
-
SSDEEP
1536:yYVyXSJdUT8norGbeyMANdB7wuTgWwt44T3WVTpRQ4xRSRBDNrR0RVe7R6R8RPDA:b+SJWNrYBn6RWVTpecAnDlmbGcGFDex
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bholco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dpiobh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kicednho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pgdcjjom.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpiobh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bfojhngl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ehgmiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pofnok32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acfpilmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eloimcca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fcbjon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ajladp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qfdpgd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hefibg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oigokj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihpgce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Memonbnl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpajjmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beqogc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qcdgei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jbjejojn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aihenoef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cdooongp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mphhbblp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcpagg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eojoelcm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cncmei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ekppjmia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gdpfbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fmnoapba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhcicf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iadphghe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fkpfjnnl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phcbmend.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jaoblk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nhmpmcaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Diackmif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eiocbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bcfbbe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciknhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jnqanbcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mghjcq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjicdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kkalcdao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oglfodai.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdlmnm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilnqhddd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kpnbcfkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hhhmki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Haqbcoce.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aqapek32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goqnae32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohfgeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojhdmgkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ckpdej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dljdcqek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Occlcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bbnjphpe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pajjpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hejaon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ofdicodf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogbolep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkbbqjgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aqfiqjgb.exe -
Executes dropped EXE 64 IoCs
pid Process 2624 Emdeok32.exe 2580 Elibpg32.exe 2604 Eeagimdf.exe 3056 Fbegbacp.exe 2384 Fhbpkh32.exe 2852 Fmohco32.exe 2552 Fggmldfp.exe 2432 Fmaeho32.exe 1892 Fgjjad32.exe 1156 Faonom32.exe 620 Fmfocnjg.exe 2944 Fimoiopk.exe 2588 Gpggei32.exe 2448 Gecpnp32.exe 1820 Goqnae32.exe 2372 Gekfnoog.exe 340 Ghibjjnk.exe 388 Aeiecfga.exe 2376 Bapfhg32.exe 1960 Miapbpmb.exe 1672 Pimkbbpi.exe 1916 Eepmlf32.exe 1988 Hocmpm32.exe 2640 Hdpehd32.exe 2652 Hdbbnd32.exe 2796 Hkmjjn32.exe 2492 Hlpchfdi.exe 2144 Ilifndlo.exe 1188 Iohbjpkb.exe 2840 Inkcem32.exe 836 Ifbkgj32.exe 2756 Ihpgce32.exe 2592 Igcgnbim.exe 368 Inmpklpj.exe 580 Iqllghon.exe 2776 Igeddb32.exe 1096 Ijdppm32.exe 1208 Ibkhak32.exe 2068 Jqnhmgmk.exe 2076 Jghqia32.exe 2072 Jkopndcb.exe 1508 Jegdgj32.exe 2260 Kkalcdao.exe 1684 Kbkdpnil.exe 1144 Keiqlihp.exe 456 Kiemmh32.exe 1540 Kccgheib.exe 1804 Knikfnih.exe 1588 Lhapocoi.exe 1584 Lfdpjp32.exe 2608 Lmnhgjmp.exe 1004 Lbkaoalg.exe 2628 Ljbipolj.exe 2612 Lmpeljkm.exe 3060 Lpoaheja.exe 2880 Lbmnea32.exe 2868 Lekjal32.exe 1696 Lmbabj32.exe 2668 Lpanne32.exe 1068 Lbojjq32.exe 1136 Maiqfl32.exe 572 Mhcicf32.exe 1216 Momapqgn.exe 1076 Mdjihgef.exe -
Loads dropped DLL 64 IoCs
pid Process 2728 02e9594ad734bfcc283faeb5eaa220f7_JC.exe 2728 02e9594ad734bfcc283faeb5eaa220f7_JC.exe 2624 Emdeok32.exe 2624 Emdeok32.exe 2580 Elibpg32.exe 2580 Elibpg32.exe 2604 Eeagimdf.exe 2604 Eeagimdf.exe 3056 Fbegbacp.exe 3056 Fbegbacp.exe 2384 Fhbpkh32.exe 2384 Fhbpkh32.exe 2852 Fmohco32.exe 2852 Fmohco32.exe 2552 Fggmldfp.exe 2552 Fggmldfp.exe 2432 Fmaeho32.exe 2432 Fmaeho32.exe 1892 Fgjjad32.exe 1892 Fgjjad32.exe 1156 Faonom32.exe 1156 Faonom32.exe 620 Fmfocnjg.exe 620 Fmfocnjg.exe 2944 Fimoiopk.exe 2944 Fimoiopk.exe 2588 Gpggei32.exe 2588 Gpggei32.exe 2448 Gecpnp32.exe 2448 Gecpnp32.exe 1820 Goqnae32.exe 1820 Goqnae32.exe 2372 Gekfnoog.exe 2372 Gekfnoog.exe 340 Ghibjjnk.exe 340 Ghibjjnk.exe 388 Aeiecfga.exe 388 Aeiecfga.exe 2376 Bapfhg32.exe 2376 Bapfhg32.exe 1960 Miapbpmb.exe 1960 Miapbpmb.exe 1672 Pimkbbpi.exe 1672 Pimkbbpi.exe 1916 Eepmlf32.exe 1916 Eepmlf32.exe 1988 Hocmpm32.exe 1988 Hocmpm32.exe 2640 Hdpehd32.exe 2640 Hdpehd32.exe 2652 Hdbbnd32.exe 2652 Hdbbnd32.exe 2796 Hkmjjn32.exe 2796 Hkmjjn32.exe 2492 Hlpchfdi.exe 2492 Hlpchfdi.exe 2144 Ilifndlo.exe 2144 Ilifndlo.exe 1188 Iohbjpkb.exe 1188 Iohbjpkb.exe 2840 Inkcem32.exe 2840 Inkcem32.exe 836 Ifbkgj32.exe 836 Ifbkgj32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Gnqolikm.exe Gckknqkg.exe File opened for modification C:\Windows\SysWOW64\Qoimmc32.exe Pgklcaqi.exe File opened for modification C:\Windows\SysWOW64\Ibkhak32.exe Ijdppm32.exe File created C:\Windows\SysWOW64\Djjafk32.dll Ckgmon32.exe File created C:\Windows\SysWOW64\Hhhblgim.exe Hfjfpkji.exe File created C:\Windows\SysWOW64\Ogjafghb.dll Mgbeqjpd.exe File opened for modification C:\Windows\SysWOW64\Kjmeaa32.exe Jhbfcj32.exe File created C:\Windows\SysWOW64\Ffndghdj.exe Fnglekch.exe File opened for modification C:\Windows\SysWOW64\Incgfl32.exe Ifloeo32.exe File created C:\Windows\SysWOW64\Fimoiopk.exe Fmfocnjg.exe File created C:\Windows\SysWOW64\Pfikokgf.dll Aeiecfga.exe File created C:\Windows\SysWOW64\Hbnjdf32.dll Igcgnbim.exe File opened for modification C:\Windows\SysWOW64\Maiqfl32.exe Lbojjq32.exe File created C:\Windows\SysWOW64\Ongckp32.exe Ohjkcile.exe File created C:\Windows\SysWOW64\Gqmmhdka.exe Gjcekj32.exe File created C:\Windows\SysWOW64\Hqkmahpp.exe Hdapggln.exe File created C:\Windows\SysWOW64\Jliaac32.dll Ojhdmgkl.exe File created C:\Windows\SysWOW64\Lpjpgo32.dll Pofnok32.exe File opened for modification C:\Windows\SysWOW64\Mbdhinmf.exe Mpflmbnc.exe File opened for modification C:\Windows\SysWOW64\Diackmif.exe Dajkjphd.exe File created C:\Windows\SysWOW64\Glpdbfek.exe Gnhkkjbf.exe File created C:\Windows\SysWOW64\Ndolpa32.dll Ofbgbaio.exe File created C:\Windows\SysWOW64\Oqjedjbn.dll Anpgdp32.exe File created C:\Windows\SysWOW64\Damhmc32.exe Dmalmdcg.exe File created C:\Windows\SysWOW64\Kblooa32.exe Kpnbcfkc.exe File opened for modification C:\Windows\SysWOW64\Ohfgeo32.exe Oamohenq.exe File created C:\Windows\SysWOW64\Fompem32.dll Emfbgg32.exe File created C:\Windows\SysWOW64\Hcdoefdh.dll Epdncb32.exe File created C:\Windows\SysWOW64\Kpljhdca.dll Jqmadn32.exe File opened for modification C:\Windows\SysWOW64\Deeeafii.exe Dcgiejje.exe File created C:\Windows\SysWOW64\Oigokj32.exe Oejfelin.exe File created C:\Windows\SysWOW64\Lpoinb32.dll Dfqjible.exe File opened for modification C:\Windows\SysWOW64\Agaifnhi.exe Iiobcq32.exe File created C:\Windows\SysWOW64\Oagkac32.exe Kbdmboqk.exe File created C:\Windows\SysWOW64\Mklfde32.dll Pgdcjjom.exe File created C:\Windows\SysWOW64\Cdkfco32.exe Cmqmgedi.exe File created C:\Windows\SysWOW64\Nmhqokcq.exe Ojpaeq32.exe File created C:\Windows\SysWOW64\Menfkp32.dll Boggkicf.exe File created C:\Windows\SysWOW64\Bholco32.exe Beqogc32.exe File opened for modification C:\Windows\SysWOW64\Ceanmc32.exe Cngfqi32.exe File created C:\Windows\SysWOW64\Gnhkkjbf.exe Gdpfbd32.exe File created C:\Windows\SysWOW64\Koenkl32.dll Jgdmkhnp.exe File created C:\Windows\SysWOW64\Kamncagl.exe Kbjmhd32.exe File opened for modification C:\Windows\SysWOW64\Fefnmdfo.exe Fbgaahgl.exe File opened for modification C:\Windows\SysWOW64\Kblooa32.exe Kpnbcfkc.exe File created C:\Windows\SysWOW64\Ofbgbaio.exe Oagkac32.exe File opened for modification C:\Windows\SysWOW64\Oijlpjma.exe Oodhca32.exe File created C:\Windows\SysWOW64\Cjnjhcqo.exe Ckkjmf32.exe File opened for modification C:\Windows\SysWOW64\Dfnjqifb.exe Dogbolep.exe File opened for modification C:\Windows\SysWOW64\Degage32.exe Dciekjhc.exe File opened for modification C:\Windows\SysWOW64\Fbgaahgl.exe Fqhegf32.exe File opened for modification C:\Windows\SysWOW64\Qjnajl32.exe Qagiio32.exe File opened for modification C:\Windows\SysWOW64\Bkdclgpl.exe Bjcgdojn.exe File created C:\Windows\SysWOW64\Donlcdgn.exe Diackmif.exe File created C:\Windows\SysWOW64\Occlcg32.exe Ongckp32.exe File opened for modification C:\Windows\SysWOW64\Fhdlbd32.exe Fgcpkldh.exe File created C:\Windows\SysWOW64\Bdmkam32.dll Ajibeg32.exe File opened for modification C:\Windows\SysWOW64\Dhqnnk32.exe Opdkgj32.exe File created C:\Windows\SysWOW64\Dfjpec32.dll Mocogc32.exe File created C:\Windows\SysWOW64\Oicfpkci.exe Ofdicodf.exe File opened for modification C:\Windows\SysWOW64\Ibjing32.exe Dbihccpg.exe File created C:\Windows\SysWOW64\Igeddb32.exe Iqllghon.exe File opened for modification C:\Windows\SysWOW64\Nlanhh32.exe Ngoleb32.exe File created C:\Windows\SysWOW64\Agaifnhi.exe Iiobcq32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imlkdf32.dll" Lbkaoalg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpkmbn32.dll" Dcdlpklh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dnecag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cphdff32.dll" Bimnqk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dfnjqifb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hejaon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Okbgkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cohoqd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Degage32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eomfiobe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fbgaahgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Glpdbfek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jpnfdbig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hhfqejoh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pnnlfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cqkiai32.dll" Kbjbibli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oamohenq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nlfohb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cfggccdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbjhhiqm.dll" Lmbabj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nmggllha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dfgdpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgogqmha.dll" Fkeedo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjgkgm32.dll" Ngjoif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hhhmki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kldofi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ionbanpb.dll" Pdlmnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iapfmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ffbjpfmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bcfbbe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Naqkki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cngfqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnemfipf.dll" Gnenfjdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ibhieo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fmlblq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edqbhk32.dll" Chccfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bbnjphpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dcgiejje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fkkmoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Igeddb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jghqia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ncdpdcfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hefibg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fdohme32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mmjlfgml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bihdfkoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kahedf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajbdocdh.dll" Ilifndlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ohjkcile.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpiogbmb.dll" Oagkac32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ejcjfgbk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nfbmnpfh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Faonom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Piimanjg.dll" Ifbkgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dahobdpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbfhmqhk.dll" Hjcajn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jnnehb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Meaiia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hajbji32.dll" Elmmhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fkeedo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fldbnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hqkmahpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Koiohb32.dll" Iapfmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ibjing32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2624 2728 02e9594ad734bfcc283faeb5eaa220f7_JC.exe 29 PID 2728 wrote to memory of 2624 2728 02e9594ad734bfcc283faeb5eaa220f7_JC.exe 29 PID 2728 wrote to memory of 2624 2728 02e9594ad734bfcc283faeb5eaa220f7_JC.exe 29 PID 2728 wrote to memory of 2624 2728 02e9594ad734bfcc283faeb5eaa220f7_JC.exe 29 PID 2624 wrote to memory of 2580 2624 Emdeok32.exe 30 PID 2624 wrote to memory of 2580 2624 Emdeok32.exe 30 PID 2624 wrote to memory of 2580 2624 Emdeok32.exe 30 PID 2624 wrote to memory of 2580 2624 Emdeok32.exe 30 PID 2580 wrote to memory of 2604 2580 Elibpg32.exe 31 PID 2580 wrote to memory of 2604 2580 Elibpg32.exe 31 PID 2580 wrote to memory of 2604 2580 Elibpg32.exe 31 PID 2580 wrote to memory of 2604 2580 Elibpg32.exe 31 PID 2604 wrote to memory of 3056 2604 Eeagimdf.exe 32 PID 2604 wrote to memory of 3056 2604 Eeagimdf.exe 32 PID 2604 wrote to memory of 3056 2604 Eeagimdf.exe 32 PID 2604 wrote to memory of 3056 2604 Eeagimdf.exe 32 PID 3056 wrote to memory of 2384 3056 Fbegbacp.exe 34 PID 3056 wrote to memory of 2384 3056 Fbegbacp.exe 34 PID 3056 wrote to memory of 2384 3056 Fbegbacp.exe 34 PID 3056 wrote to memory of 2384 3056 Fbegbacp.exe 34 PID 2384 wrote to memory of 2852 2384 Fhbpkh32.exe 33 PID 2384 wrote to memory of 2852 2384 Fhbpkh32.exe 33 PID 2384 wrote to memory of 2852 2384 Fhbpkh32.exe 33 PID 2384 wrote to memory of 2852 2384 Fhbpkh32.exe 33 PID 2852 wrote to memory of 2552 2852 Fmohco32.exe 36 PID 2852 wrote to memory of 2552 2852 Fmohco32.exe 36 PID 2852 wrote to memory of 2552 2852 Fmohco32.exe 36 PID 2852 wrote to memory of 2552 2852 Fmohco32.exe 36 PID 2552 wrote to memory of 2432 2552 Fggmldfp.exe 35 PID 2552 wrote to memory of 2432 2552 Fggmldfp.exe 35 PID 2552 wrote to memory of 2432 2552 Fggmldfp.exe 35 PID 2552 wrote to memory of 2432 2552 Fggmldfp.exe 35 PID 2432 wrote to memory of 1892 2432 Fmaeho32.exe 37 PID 2432 wrote to memory of 1892 2432 Fmaeho32.exe 37 PID 2432 wrote to memory of 1892 2432 Fmaeho32.exe 37 PID 2432 wrote to memory of 1892 2432 Fmaeho32.exe 37 PID 1892 wrote to memory of 1156 1892 Fgjjad32.exe 38 PID 1892 wrote to memory of 1156 1892 Fgjjad32.exe 38 PID 1892 wrote to memory of 1156 1892 Fgjjad32.exe 38 PID 1892 wrote to memory of 1156 1892 Fgjjad32.exe 38 PID 1156 wrote to memory of 620 1156 Faonom32.exe 39 PID 1156 wrote to memory of 620 1156 Faonom32.exe 39 PID 1156 wrote to memory of 620 1156 Faonom32.exe 39 PID 1156 wrote to memory of 620 1156 Faonom32.exe 39 PID 620 wrote to memory of 2944 620 Fmfocnjg.exe 40 PID 620 wrote to memory of 2944 620 Fmfocnjg.exe 40 PID 620 wrote to memory of 2944 620 Fmfocnjg.exe 40 PID 620 wrote to memory of 2944 620 Fmfocnjg.exe 40 PID 2944 wrote to memory of 2588 2944 Fimoiopk.exe 41 PID 2944 wrote to memory of 2588 2944 Fimoiopk.exe 41 PID 2944 wrote to memory of 2588 2944 Fimoiopk.exe 41 PID 2944 wrote to memory of 2588 2944 Fimoiopk.exe 41 PID 2588 wrote to memory of 2448 2588 Gpggei32.exe 42 PID 2588 wrote to memory of 2448 2588 Gpggei32.exe 42 PID 2588 wrote to memory of 2448 2588 Gpggei32.exe 42 PID 2588 wrote to memory of 2448 2588 Gpggei32.exe 42 PID 2448 wrote to memory of 1820 2448 Gecpnp32.exe 44 PID 2448 wrote to memory of 1820 2448 Gecpnp32.exe 44 PID 2448 wrote to memory of 1820 2448 Gecpnp32.exe 44 PID 2448 wrote to memory of 1820 2448 Gecpnp32.exe 44 PID 1820 wrote to memory of 2372 1820 Goqnae32.exe 43 PID 1820 wrote to memory of 2372 1820 Goqnae32.exe 43 PID 1820 wrote to memory of 2372 1820 Goqnae32.exe 43 PID 1820 wrote to memory of 2372 1820 Goqnae32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\02e9594ad734bfcc283faeb5eaa220f7_JC.exe"C:\Users\Admin\AppData\Local\Temp\02e9594ad734bfcc283faeb5eaa220f7_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\Emdeok32.exeC:\Windows\system32\Emdeok32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Elibpg32.exeC:\Windows\system32\Elibpg32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\Eeagimdf.exeC:\Windows\system32\Eeagimdf.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\Fbegbacp.exeC:\Windows\system32\Fbegbacp.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\Fhbpkh32.exeC:\Windows\system32\Fhbpkh32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384
-
-
-
-
-
-
C:\Windows\SysWOW64\Fmohco32.exeC:\Windows\system32\Fmohco32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\Fggmldfp.exeC:\Windows\system32\Fggmldfp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2552
-
-
C:\Windows\SysWOW64\Fmaeho32.exeC:\Windows\system32\Fmaeho32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\Fgjjad32.exeC:\Windows\system32\Fgjjad32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\Faonom32.exeC:\Windows\system32\Faonom32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\Fmfocnjg.exeC:\Windows\system32\Fmfocnjg.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\Fimoiopk.exeC:\Windows\system32\Fimoiopk.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Gpggei32.exeC:\Windows\system32\Gpggei32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Gecpnp32.exeC:\Windows\system32\Gecpnp32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\Goqnae32.exeC:\Windows\system32\Goqnae32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1820
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Gekfnoog.exeC:\Windows\system32\Gekfnoog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2372 -
C:\Windows\SysWOW64\Ghibjjnk.exeC:\Windows\system32\Ghibjjnk.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:340 -
C:\Windows\SysWOW64\Aeiecfga.exeC:\Windows\system32\Aeiecfga.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:388 -
C:\Windows\SysWOW64\Bapfhg32.exeC:\Windows\system32\Bapfhg32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2376 -
C:\Windows\SysWOW64\Miapbpmb.exeC:\Windows\system32\Miapbpmb.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Windows\SysWOW64\Pimkbbpi.exeC:\Windows\system32\Pimkbbpi.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Windows\SysWOW64\Eepmlf32.exeC:\Windows\system32\Eepmlf32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916 -
C:\Windows\SysWOW64\Hocmpm32.exeC:\Windows\system32\Hocmpm32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Windows\SysWOW64\Hdpehd32.exeC:\Windows\system32\Hdpehd32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2640 -
C:\Windows\SysWOW64\Hdbbnd32.exeC:\Windows\system32\Hdbbnd32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2652 -
C:\Windows\SysWOW64\Hkmjjn32.exeC:\Windows\system32\Hkmjjn32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2796 -
C:\Windows\SysWOW64\Hlpchfdi.exeC:\Windows\system32\Hlpchfdi.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2492 -
C:\Windows\SysWOW64\Ilifndlo.exeC:\Windows\system32\Ilifndlo.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2144 -
C:\Windows\SysWOW64\Iohbjpkb.exeC:\Windows\system32\Iohbjpkb.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1188 -
C:\Windows\SysWOW64\Inkcem32.exeC:\Windows\system32\Inkcem32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Windows\SysWOW64\Ifbkgj32.exeC:\Windows\system32\Ifbkgj32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ihpgce32.exeC:\Windows\system32\Ihpgce32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\Igcgnbim.exeC:\Windows\system32\Igcgnbim.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2592 -
C:\Windows\SysWOW64\Inmpklpj.exeC:\Windows\system32\Inmpklpj.exe3⤵
- Executes dropped EXE
PID:368 -
C:\Windows\SysWOW64\Iqllghon.exeC:\Windows\system32\Iqllghon.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:580 -
C:\Windows\SysWOW64\Igeddb32.exeC:\Windows\system32\Igeddb32.exe5⤵
- Executes dropped EXE
- Modifies registry class
PID:2776 -
C:\Windows\SysWOW64\Ijdppm32.exeC:\Windows\system32\Ijdppm32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1096 -
C:\Windows\SysWOW64\Ibkhak32.exeC:\Windows\system32\Ibkhak32.exe7⤵
- Executes dropped EXE
PID:1208 -
C:\Windows\SysWOW64\Jqnhmgmk.exeC:\Windows\system32\Jqnhmgmk.exe8⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\Jghqia32.exeC:\Windows\system32\Jghqia32.exe9⤵
- Executes dropped EXE
- Modifies registry class
PID:2076 -
C:\Windows\SysWOW64\Jkopndcb.exeC:\Windows\system32\Jkopndcb.exe10⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\Jegdgj32.exeC:\Windows\system32\Jegdgj32.exe11⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\Kkalcdao.exeC:\Windows\system32\Kkalcdao.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Kbkdpnil.exeC:\Windows\system32\Kbkdpnil.exe13⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\Keiqlihp.exeC:\Windows\system32\Keiqlihp.exe14⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\Kiemmh32.exeC:\Windows\system32\Kiemmh32.exe15⤵
- Executes dropped EXE
PID:456 -
C:\Windows\SysWOW64\Kccgheib.exeC:\Windows\system32\Kccgheib.exe16⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\Knikfnih.exeC:\Windows\system32\Knikfnih.exe17⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\Lhapocoi.exeC:\Windows\system32\Lhapocoi.exe18⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\Lfdpjp32.exeC:\Windows\system32\Lfdpjp32.exe19⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\Lmnhgjmp.exeC:\Windows\system32\Lmnhgjmp.exe20⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\Lbkaoalg.exeC:\Windows\system32\Lbkaoalg.exe21⤵
- Executes dropped EXE
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Ljbipolj.exeC:\Windows\system32\Ljbipolj.exe22⤵
- Executes dropped EXE
PID:2628 -
C:\Windows\SysWOW64\Lmpeljkm.exeC:\Windows\system32\Lmpeljkm.exe23⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\Lpoaheja.exeC:\Windows\system32\Lpoaheja.exe24⤵
- Executes dropped EXE
PID:3060 -
C:\Windows\SysWOW64\Lbmnea32.exeC:\Windows\system32\Lbmnea32.exe25⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\Lekjal32.exeC:\Windows\system32\Lekjal32.exe26⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\Lmbabj32.exeC:\Windows\system32\Lmbabj32.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1696 -
C:\Windows\SysWOW64\Lpanne32.exeC:\Windows\system32\Lpanne32.exe28⤵
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\Lbojjq32.exeC:\Windows\system32\Lbojjq32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1068 -
C:\Windows\SysWOW64\Maiqfl32.exeC:\Windows\system32\Maiqfl32.exe30⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\Mhcicf32.exeC:\Windows\system32\Mhcicf32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\Momapqgn.exeC:\Windows\system32\Momapqgn.exe32⤵
- Executes dropped EXE
PID:1216 -
C:\Windows\SysWOW64\Mdjihgef.exeC:\Windows\system32\Mdjihgef.exe33⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\Mkdbea32.exeC:\Windows\system32\Mkdbea32.exe34⤵PID:1996
-
C:\Windows\SysWOW64\Mpqjmh32.exeC:\Windows\system32\Mpqjmh32.exe35⤵PID:2012
-
C:\Windows\SysWOW64\Mcofid32.exeC:\Windows\system32\Mcofid32.exe36⤵PID:2304
-
C:\Windows\SysWOW64\Mmdkfmjc.exeC:\Windows\system32\Mmdkfmjc.exe37⤵PID:2292
-
C:\Windows\SysWOW64\Mgmoob32.exeC:\Windows\system32\Mgmoob32.exe38⤵PID:1468
-
C:\Windows\SysWOW64\Nmggllha.exeC:\Windows\system32\Nmggllha.exe39⤵
- Modifies registry class
PID:744 -
C:\Windows\SysWOW64\Npechhgd.exeC:\Windows\system32\Npechhgd.exe40⤵PID:676
-
C:\Windows\SysWOW64\Ncdpdcfh.exeC:\Windows\system32\Ncdpdcfh.exe41⤵
- Modifies registry class
PID:1656 -
C:\Windows\SysWOW64\Ngoleb32.exeC:\Windows\system32\Ngoleb32.exe42⤵
- Drops file in System32 directory
PID:2008 -
C:\Windows\SysWOW64\Nlanhh32.exeC:\Windows\system32\Nlanhh32.exe43⤵PID:2424
-
C:\Windows\SysWOW64\Nanfqo32.exeC:\Windows\system32\Nanfqo32.exe44⤵PID:2016
-
C:\Windows\SysWOW64\Ndlbmk32.exeC:\Windows\system32\Ndlbmk32.exe45⤵PID:2460
-
C:\Windows\SysWOW64\Ngjoif32.exeC:\Windows\system32\Ngjoif32.exe46⤵
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\Oapcfo32.exeC:\Windows\system32\Oapcfo32.exe47⤵PID:2516
-
C:\Windows\SysWOW64\Ohjkcile.exeC:\Windows\system32\Ohjkcile.exe48⤵
- Drops file in System32 directory
- Modifies registry class
PID:2496 -
C:\Windows\SysWOW64\Ongckp32.exeC:\Windows\system32\Ongckp32.exe49⤵
- Drops file in System32 directory
PID:1008 -
C:\Windows\SysWOW64\Occlcg32.exeC:\Windows\system32\Occlcg32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2856 -
C:\Windows\SysWOW64\Okkddd32.exeC:\Windows\system32\Okkddd32.exe51⤵PID:2888
-
C:\Windows\SysWOW64\Onipqp32.exeC:\Windows\system32\Onipqp32.exe52⤵PID:1192
-
C:\Windows\SysWOW64\Odcimipf.exeC:\Windows\system32\Odcimipf.exe53⤵PID:2168
-
C:\Windows\SysWOW64\Ogaeieoj.exeC:\Windows\system32\Ogaeieoj.exe54⤵PID:1260
-
C:\Windows\SysWOW64\Ojpaeq32.exeC:\Windows\system32\Ojpaeq32.exe55⤵
- Drops file in System32 directory
PID:1152 -
C:\Windows\SysWOW64\Nmhqokcq.exeC:\Windows\system32\Nmhqokcq.exe56⤵PID:1116
-
C:\Windows\SysWOW64\Cbcfbege.exeC:\Windows\system32\Cbcfbege.exe57⤵PID:3044
-
C:\Windows\SysWOW64\Fqilppic.exeC:\Windows\system32\Fqilppic.exe58⤵PID:2092
-
C:\Windows\SysWOW64\Lmcdkbao.exeC:\Windows\system32\Lmcdkbao.exe59⤵PID:1952
-
C:\Windows\SysWOW64\Lpapgnpb.exeC:\Windows\system32\Lpapgnpb.exe60⤵PID:2240
-
C:\Windows\SysWOW64\Lenioenj.exeC:\Windows\system32\Lenioenj.exe61⤵PID:1592
-
C:\Windows\SysWOW64\Phocfd32.exeC:\Windows\system32\Phocfd32.exe62⤵PID:2324
-
C:\Windows\SysWOW64\Iiobcq32.exeC:\Windows\system32\Iiobcq32.exe63⤵
- Drops file in System32 directory
PID:2784 -
C:\Windows\SysWOW64\Agaifnhi.exeC:\Windows\system32\Agaifnhi.exe64⤵PID:2788
-
C:\Windows\SysWOW64\Gbfklolh.exeC:\Windows\system32\Gbfklolh.exe65⤵PID:2536
-
C:\Windows\SysWOW64\Lnlmmo32.exeC:\Windows\system32\Lnlmmo32.exe66⤵PID:2872
-
C:\Windows\SysWOW64\Olobcm32.exeC:\Windows\system32\Olobcm32.exe67⤵PID:2876
-
C:\Windows\SysWOW64\Cncmei32.exeC:\Windows\system32\Cncmei32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1632 -
C:\Windows\SysWOW64\Cfjdfg32.exeC:\Windows\system32\Cfjdfg32.exe69⤵PID:1884
-
C:\Windows\SysWOW64\Cihqbb32.exeC:\Windows\system32\Cihqbb32.exe70⤵PID:2004
-
C:\Windows\SysWOW64\Ckgmon32.exeC:\Windows\system32\Ckgmon32.exe71⤵
- Drops file in System32 directory
PID:2548 -
C:\Windows\SysWOW64\Cneiki32.exeC:\Windows\system32\Cneiki32.exe72⤵PID:2408
-
C:\Windows\SysWOW64\Ciknhb32.exeC:\Windows\system32\Ciknhb32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:964 -
C:\Windows\SysWOW64\Ckijdm32.exeC:\Windows\system32\Ckijdm32.exe74⤵PID:2256
-
C:\Windows\SysWOW64\Cngfqi32.exeC:\Windows\system32\Cngfqi32.exe75⤵
- Drops file in System32 directory
- Modifies registry class
PID:1280 -
C:\Windows\SysWOW64\Ceanmc32.exeC:\Windows\system32\Ceanmc32.exe76⤵PID:2952
-
C:\Windows\SysWOW64\Cgpjin32.exeC:\Windows\system32\Cgpjin32.exe77⤵PID:2096
-
C:\Windows\SysWOW64\Dahobdpe.exeC:\Windows\system32\Dahobdpe.exe78⤵
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Dcfknooi.exeC:\Windows\system32\Dcfknooi.exe79⤵PID:1788
-
C:\Windows\SysWOW64\Dfegjknm.exeC:\Windows\system32\Dfegjknm.exe80⤵PID:2400
-
C:\Windows\SysWOW64\Djqcki32.exeC:\Windows\system32\Djqcki32.exe81⤵PID:2824
-
C:\Windows\SysWOW64\Dajlhc32.exeC:\Windows\system32\Dajlhc32.exe82⤵PID:1988
-
C:\Windows\SysWOW64\Dcihdo32.exeC:\Windows\system32\Dcihdo32.exe83⤵PID:2796
-
C:\Windows\SysWOW64\Dfgdpj32.exeC:\Windows\system32\Dfgdpj32.exe84⤵
- Modifies registry class
PID:1652 -
C:\Windows\SysWOW64\Dmalmdcg.exeC:\Windows\system32\Dmalmdcg.exe85⤵
- Drops file in System32 directory
PID:1096 -
C:\Windows\SysWOW64\Damhmc32.exeC:\Windows\system32\Damhmc32.exe86⤵PID:2268
-
C:\Windows\SysWOW64\Dckdio32.exeC:\Windows\system32\Dckdio32.exe87⤵PID:1984
-
C:\Windows\SysWOW64\Dfjaej32.exeC:\Windows\system32\Dfjaej32.exe88⤵PID:2108
-
C:\Windows\SysWOW64\Dogbolep.exeC:\Windows\system32\Dogbolep.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2896 -
C:\Windows\SysWOW64\Dfnjqifb.exeC:\Windows\system32\Dfnjqifb.exe90⤵
- Modifies registry class
PID:1696
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Cjnjhcqo.exeC:\Windows\system32\Cjnjhcqo.exe69⤵PID:1608
-
C:\Windows\SysWOW64\Cahbem32.exeC:\Windows\system32\Cahbem32.exe70⤵PID:2052
-
C:\Windows\SysWOW64\Ccfoah32.exeC:\Windows\system32\Ccfoah32.exe71⤵PID:1432
-
C:\Windows\SysWOW64\Ckmfbf32.exeC:\Windows\system32\Ckmfbf32.exe72⤵PID:2396
-
C:\Windows\SysWOW64\Cajokmfi.exeC:\Windows\system32\Cajokmfi.exe73⤵PID:1792
-
C:\Windows\SysWOW64\Cefkkk32.exeC:\Windows\system32\Cefkkk32.exe74⤵PID:2948
-
C:\Windows\SysWOW64\Cfggccdp.exeC:\Windows\system32\Cfggccdp.exe75⤵
- Modifies registry class
PID:1468 -
C:\Windows\SysWOW64\Camlpldf.exeC:\Windows\system32\Camlpldf.exe76⤵PID:2436
-
C:\Windows\SysWOW64\Dcpagg32.exeC:\Windows\system32\Dcpagg32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2664 -
C:\Windows\SysWOW64\Dfnncb32.exeC:\Windows\system32\Dfnncb32.exe78⤵PID:2772
-
C:\Windows\SysWOW64\Diljpn32.exeC:\Windows\system32\Diljpn32.exe79⤵PID:2812
-
C:\Windows\SysWOW64\Dpfblh32.exeC:\Windows\system32\Dpfblh32.exe80⤵PID:2208
-
C:\Windows\SysWOW64\Dfqjible.exeC:\Windows\system32\Dfqjible.exe81⤵
- Drops file in System32 directory
PID:656 -
C:\Windows\SysWOW64\Diofenki.exeC:\Windows\system32\Diofenki.exe82⤵PID:2460
-
C:\Windows\SysWOW64\Dpiobh32.exeC:\Windows\system32\Dpiobh32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2672 -
C:\Windows\SysWOW64\Dajkjphd.exeC:\Windows\system32\Dajkjphd.exe84⤵
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\Diackmif.exeC:\Windows\system32\Diackmif.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\Donlcdgn.exeC:\Windows\system32\Donlcdgn.exe86⤵PID:2748
-
C:\Windows\SysWOW64\Dbihccpg.exeC:\Windows\system32\Dbihccpg.exe87⤵
- Drops file in System32 directory
PID:748 -
C:\Windows\SysWOW64\Ibjing32.exeC:\Windows\system32\Ibjing32.exe88⤵
- Modifies registry class
PID:1136 -
C:\Windows\SysWOW64\Kahedf32.exeC:\Windows\system32\Kahedf32.exe89⤵
- Modifies registry class
PID:2216
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ehpgha32.exeC:\Windows\system32\Ehpgha32.exe28⤵PID:2436
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Epgoio32.exeC:\Windows\system32\Epgoio32.exe1⤵PID:3000
-
C:\Windows\SysWOW64\Eojoelcm.exeC:\Windows\system32\Eojoelcm.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2292 -
C:\Windows\SysWOW64\Eiocbd32.exeC:\Windows\system32\Eiocbd32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2212 -
C:\Windows\SysWOW64\Ekppjmia.exeC:\Windows\system32\Ekppjmia.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1868
-
-
-
-
C:\Windows\SysWOW64\Eehqme32.exeC:\Windows\system32\Eehqme32.exe1⤵PID:2516
-
C:\Windows\SysWOW64\Ehgmiq32.exeC:\Windows\system32\Ehgmiq32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1192 -
C:\Windows\SysWOW64\Ekeiel32.exeC:\Windows\system32\Ekeiel32.exe3⤵PID:1896
-
C:\Windows\SysWOW64\Epbamc32.exeC:\Windows\system32\Epbamc32.exe4⤵PID:2660
-
C:\Windows\SysWOW64\Ehiiop32.exeC:\Windows\system32\Ehiiop32.exe5⤵PID:3020
-
C:\Windows\SysWOW64\Emfbgg32.exeC:\Windows\system32\Emfbgg32.exe6⤵
- Drops file in System32 directory
PID:1260 -
C:\Windows\SysWOW64\Epdncb32.exeC:\Windows\system32\Epdncb32.exe7⤵
- Drops file in System32 directory
PID:1328 -
C:\Windows\SysWOW64\Fcbjon32.exeC:\Windows\system32\Fcbjon32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:684 -
C:\Windows\SysWOW64\Fimclh32.exeC:\Windows\system32\Fimclh32.exe9⤵PID:1880
-
C:\Windows\SysWOW64\Folhio32.exeC:\Windows\system32\Folhio32.exe10⤵PID:2560
-
C:\Windows\SysWOW64\Fgcpkldh.exeC:\Windows\system32\Fgcpkldh.exe11⤵
- Drops file in System32 directory
PID:756 -
C:\Windows\SysWOW64\Fhdlbd32.exeC:\Windows\system32\Fhdlbd32.exe12⤵PID:2932
-
C:\Windows\SysWOW64\Fpkdca32.exeC:\Windows\system32\Fpkdca32.exe13⤵PID:1692
-
C:\Windows\SysWOW64\Fcjqpm32.exeC:\Windows\system32\Fcjqpm32.exe14⤵PID:2156
-
C:\Windows\SysWOW64\Ficilgai.exeC:\Windows\system32\Ficilgai.exe15⤵PID:308
-
C:\Windows\SysWOW64\Flbehbqm.exeC:\Windows\system32\Flbehbqm.exe16⤵PID:1800
-
C:\Windows\SysWOW64\Fkeedo32.exeC:\Windows\system32\Fkeedo32.exe17⤵
- Modifies registry class
PID:2084 -
C:\Windows\SysWOW64\Fejjah32.exeC:\Windows\system32\Fejjah32.exe18⤵PID:2024
-
C:\Windows\SysWOW64\Fldbnb32.exeC:\Windows\system32\Fldbnb32.exe19⤵
- Modifies registry class
PID:748 -
C:\Windows\SysWOW64\Gnenfjdh.exeC:\Windows\system32\Gnenfjdh.exe20⤵
- Modifies registry class
PID:1968 -
C:\Windows\SysWOW64\Gdpfbd32.exeC:\Windows\system32\Gdpfbd32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1376 -
C:\Windows\SysWOW64\Gnhkkjbf.exeC:\Windows\system32\Gnhkkjbf.exe22⤵
- Drops file in System32 directory
PID:900 -
C:\Windows\SysWOW64\Glpdbfek.exeC:\Windows\system32\Glpdbfek.exe23⤵
- Modifies registry class
PID:1664 -
C:\Windows\SysWOW64\Gcimop32.exeC:\Windows\system32\Gcimop32.exe24⤵PID:1188
-
C:\Windows\SysWOW64\Gjcekj32.exeC:\Windows\system32\Gjcekj32.exe25⤵
- Drops file in System32 directory
PID:2576 -
C:\Windows\SysWOW64\Gqmmhdka.exeC:\Windows\system32\Gqmmhdka.exe26⤵PID:2388
-
C:\Windows\SysWOW64\Hfjfpkji.exeC:\Windows\system32\Hfjfpkji.exe27⤵
- Drops file in System32 directory
PID:1432 -
C:\Windows\SysWOW64\Hhhblgim.exeC:\Windows\system32\Hhhblgim.exe28⤵PID:2628
-
C:\Windows\SysWOW64\Hqpjndio.exeC:\Windows\system32\Hqpjndio.exe29⤵PID:1616
-
C:\Windows\SysWOW64\Hjhofj32.exeC:\Windows\system32\Hjhofj32.exe30⤵PID:2204
-
C:\Windows\SysWOW64\Hmfkbeoc.exeC:\Windows\system32\Hmfkbeoc.exe31⤵PID:2160
-
C:\Windows\SysWOW64\Hcqcoo32.exeC:\Windows\system32\Hcqcoo32.exe32⤵PID:744
-
C:\Windows\SysWOW64\Hdapggln.exeC:\Windows\system32\Hdapggln.exe33⤵
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\Hqkmahpp.exeC:\Windows\system32\Hqkmahpp.exe34⤵
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Hefibg32.exeC:\Windows\system32\Hefibg32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Hjcajn32.exeC:\Windows\system32\Hjcajn32.exe36⤵
- Modifies registry class
PID:2140 -
C:\Windows\SysWOW64\Iamjghnm.exeC:\Windows\system32\Iamjghnm.exe37⤵PID:2656
-
C:\Windows\SysWOW64\Inajql32.exeC:\Windows\system32\Inajql32.exe38⤵PID:2556
-
C:\Windows\SysWOW64\Iapfmg32.exeC:\Windows\system32\Iapfmg32.exe39⤵
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Ifloeo32.exeC:\Windows\system32\Ifloeo32.exe40⤵
- Drops file in System32 directory
PID:1292 -
C:\Windows\SysWOW64\Incgfl32.exeC:\Windows\system32\Incgfl32.exe41⤵PID:1488
-
C:\Windows\SysWOW64\Icponb32.exeC:\Windows\system32\Icponb32.exe42⤵PID:2680
-
C:\Windows\SysWOW64\Iadphghe.exeC:\Windows\system32\Iadphghe.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2852 -
C:\Windows\SysWOW64\Icbldbgi.exeC:\Windows\system32\Icbldbgi.exe44⤵PID:2172
-
C:\Windows\SysWOW64\Iiodliep.exeC:\Windows\system32\Iiodliep.exe45⤵PID:936
-
C:\Windows\SysWOW64\Ilnqhddd.exeC:\Windows\system32\Ilnqhddd.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2532 -
C:\Windows\SysWOW64\Ibhieo32.exeC:\Windows\system32\Ibhieo32.exe47⤵
- Modifies registry class
PID:824 -
C:\Windows\SysWOW64\Jmmmbg32.exeC:\Windows\system32\Jmmmbg32.exe48⤵PID:2180
-
C:\Windows\SysWOW64\Jbjejojn.exeC:\Windows\system32\Jbjejojn.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2328 -
C:\Windows\SysWOW64\Jhgnbehe.exeC:\Windows\system32\Jhgnbehe.exe50⤵PID:3040
-
C:\Windows\SysWOW64\Jpnfdbig.exeC:\Windows\system32\Jpnfdbig.exe51⤵
- Modifies registry class
PID:1152 -
C:\Windows\SysWOW64\Jaoblk32.exeC:\Windows\system32\Jaoblk32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1180 -
C:\Windows\SysWOW64\Jhikhefb.exeC:\Windows\system32\Jhikhefb.exe53⤵PID:2144
-
C:\Windows\SysWOW64\Khpaidpk.exeC:\Windows\system32\Khpaidpk.exe54⤵PID:2076
-
C:\Windows\SysWOW64\Kiamql32.exeC:\Windows\system32\Kiamql32.exe55⤵PID:456
-
C:\Windows\SysWOW64\Kplfmfmf.exeC:\Windows\system32\Kplfmfmf.exe56⤵PID:1004
-
C:\Windows\SysWOW64\Kbjbibli.exeC:\Windows\system32\Kbjbibli.exe57⤵
- Modifies registry class
PID:3016 -
C:\Windows\SysWOW64\Kmpfgklo.exeC:\Windows\system32\Kmpfgklo.exe58⤵PID:1780
-
C:\Windows\SysWOW64\Kpnbcfkc.exeC:\Windows\system32\Kpnbcfkc.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2992 -
C:\Windows\SysWOW64\Kblooa32.exeC:\Windows\system32\Kblooa32.exe60⤵PID:2060
-
C:\Windows\SysWOW64\Chccfe32.exeC:\Windows\system32\Chccfe32.exe61⤵
- Modifies registry class
PID:2744 -
C:\Windows\SysWOW64\Gajlcp32.exeC:\Windows\system32\Gajlcp32.exe62⤵PID:2772
-
C:\Windows\SysWOW64\Gonlld32.exeC:\Windows\system32\Gonlld32.exe63⤵PID:1528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Hhfqejoh.exeC:\Windows\system32\Hhfqejoh.exe1⤵
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\Hkdmaenk.exeC:\Windows\system32\Hkdmaenk.exe2⤵PID:340
-
C:\Windows\SysWOW64\Hejaon32.exeC:\Windows\system32\Hejaon32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2684 -
C:\Windows\SysWOW64\Hhhmki32.exeC:\Windows\system32\Hhhmki32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1992 -
C:\Windows\SysWOW64\Hmefcp32.exeC:\Windows\system32\Hmefcp32.exe5⤵PID:2352
-
C:\Windows\SysWOW64\Haqbcoce.exeC:\Windows\system32\Haqbcoce.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:904 -
C:\Windows\SysWOW64\Hhkjpi32.exeC:\Windows\system32\Hhkjpi32.exe7⤵PID:2840
-
C:\Windows\SysWOW64\Hkifld32.exeC:\Windows\system32\Hkifld32.exe8⤵PID:320
-
C:\Windows\SysWOW64\Jqjdon32.exeC:\Windows\system32\Jqjdon32.exe9⤵PID:2924
-
C:\Windows\SysWOW64\Jgdmkhnp.exeC:\Windows\system32\Jgdmkhnp.exe10⤵
- Drops file in System32 directory
PID:2760
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Jqmadn32.exeC:\Windows\system32\Jqmadn32.exe1⤵
- Drops file in System32 directory
PID:2240 -
C:\Windows\SysWOW64\Jnqanbcj.exeC:\Windows\system32\Jnqanbcj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2308 -
C:\Windows\SysWOW64\Jobnej32.exeC:\Windows\system32\Jobnej32.exe3⤵PID:1500
-
C:\Windows\SysWOW64\Kbjmhd32.exeC:\Windows\system32\Kbjmhd32.exe4⤵
- Drops file in System32 directory
PID:1156 -
C:\Windows\SysWOW64\Kamncagl.exeC:\Windows\system32\Kamncagl.exe5⤵PID:1352
-
C:\Windows\SysWOW64\Kicednho.exeC:\Windows\system32\Kicednho.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2276 -
C:\Windows\SysWOW64\Kkbbqjgb.exeC:\Windows\system32\Kkbbqjgb.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2528 -
C:\Windows\SysWOW64\Kbljmd32.exeC:\Windows\system32\Kbljmd32.exe8⤵PID:1096
-
C:\Windows\SysWOW64\Kaojiqej.exeC:\Windows\system32\Kaojiqej.exe9⤵PID:2896
-
C:\Windows\SysWOW64\Kldofi32.exeC:\Windows\system32\Kldofi32.exe10⤵
- Modifies registry class
PID:1928 -
C:\Windows\SysWOW64\Kmeknakn.exeC:\Windows\system32\Kmeknakn.exe11⤵PID:2844
-
-
-
-
-
C:\Windows\SysWOW64\Nnboonmb.exeC:\Windows\system32\Nnboonmb.exe8⤵PID:2920
-
C:\Windows\SysWOW64\Naqkki32.exeC:\Windows\system32\Naqkki32.exe9⤵
- Modifies registry class
PID:2572 -
C:\Windows\SysWOW64\Nlfohb32.exeC:\Windows\system32\Nlfohb32.exe10⤵
- Modifies registry class
PID:2676 -
C:\Windows\SysWOW64\Njiocobg.exeC:\Windows\system32\Njiocobg.exe11⤵PID:1260
-
C:\Windows\SysWOW64\Neocahbm.exeC:\Windows\system32\Neocahbm.exe12⤵PID:1088
-
C:\Windows\SysWOW64\Nhmpmcaq.exeC:\Windows\system32\Nhmpmcaq.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1116 -
C:\Windows\SysWOW64\Njklioqd.exeC:\Windows\system32\Njklioqd.exe14⤵PID:1860
-
C:\Windows\SysWOW64\Nphdaeol.exeC:\Windows\system32\Nphdaeol.exe15⤵PID:2744
-
C:\Windows\SysWOW64\Nfbmnpfh.exeC:\Windows\system32\Nfbmnpfh.exe16⤵
- Modifies registry class
PID:340 -
C:\Windows\SysWOW64\Ndfmgdeb.exeC:\Windows\system32\Ndfmgdeb.exe17⤵PID:2884
-
C:\Windows\SysWOW64\Ofdicodf.exeC:\Windows\system32\Ofdicodf.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2608 -
C:\Windows\SysWOW64\Oicfpkci.exeC:\Windows\system32\Oicfpkci.exe19⤵PID:2064
-
C:\Windows\SysWOW64\Opmnle32.exeC:\Windows\system32\Opmnle32.exe20⤵PID:964
-
C:\Windows\SysWOW64\Obkjhpjj.exeC:\Windows\system32\Obkjhpjj.exe21⤵PID:2616
-
C:\Windows\SysWOW64\Oejfelin.exeC:\Windows\system32\Oejfelin.exe22⤵
- Drops file in System32 directory
PID:1928 -
C:\Windows\SysWOW64\Oigokj32.exeC:\Windows\system32\Oigokj32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2276 -
C:\Windows\SysWOW64\Oodhca32.exeC:\Windows\system32\Oodhca32.exe24⤵
- Drops file in System32 directory
PID:824 -
C:\Windows\SysWOW64\Oijlpjma.exeC:\Windows\system32\Oijlpjma.exe25⤵PID:520
-
C:\Windows\SysWOW64\Okmena32.exeC:\Windows\system32\Okmena32.exe26⤵PID:268
-
C:\Windows\SysWOW64\Pajjpk32.exeC:\Windows\system32\Pajjpk32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2280 -
C:\Windows\SysWOW64\Phcbmend.exeC:\Windows\system32\Phcbmend.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1248 -
C:\Windows\SysWOW64\Pieodn32.exeC:\Windows\system32\Pieodn32.exe29⤵PID:1204
-
C:\Windows\SysWOW64\Palgek32.exeC:\Windows\system32\Palgek32.exe30⤵PID:2352
-
C:\Windows\SysWOW64\Pcmcmcjc.exeC:\Windows\system32\Pcmcmcjc.exe31⤵PID:1160
-
C:\Windows\SysWOW64\Pkdknq32.exeC:\Windows\system32\Pkdknq32.exe32⤵PID:2240
-
C:\Windows\SysWOW64\Pdmpgfae.exeC:\Windows\system32\Pdmpgfae.exe33⤵PID:1500
-
C:\Windows\SysWOW64\Pgklcaqi.exeC:\Windows\system32\Pgklcaqi.exe34⤵
- Drops file in System32 directory
PID:2896 -
C:\Windows\SysWOW64\Qoimmc32.exeC:\Windows\system32\Qoimmc32.exe35⤵PID:1640
-
C:\Windows\SysWOW64\Qagiio32.exeC:\Windows\system32\Qagiio32.exe36⤵
- Drops file in System32 directory
PID:2428 -
C:\Windows\SysWOW64\Qjnajl32.exeC:\Windows\system32\Qjnajl32.exe37⤵PID:1848
-
C:\Windows\SysWOW64\Akbkhd32.exeC:\Windows\system32\Akbkhd32.exe38⤵PID:1552
-
C:\Windows\SysWOW64\Anpgdp32.exeC:\Windows\system32\Anpgdp32.exe39⤵
- Drops file in System32 directory
PID:2284 -
C:\Windows\SysWOW64\Adjoqjfc.exeC:\Windows\system32\Adjoqjfc.exe40⤵PID:856
-
C:\Windows\SysWOW64\Anbcio32.exeC:\Windows\system32\Anbcio32.exe41⤵PID:1724
-
C:\Windows\SysWOW64\Aqapek32.exeC:\Windows\system32\Aqapek32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2332 -
C:\Windows\SysWOW64\Admlfida.exeC:\Windows\system32\Admlfida.exe43⤵PID:2840
-
C:\Windows\SysWOW64\Ajidnp32.exeC:\Windows\system32\Ajidnp32.exe44⤵PID:888
-
C:\Windows\SysWOW64\Abqlpn32.exeC:\Windows\system32\Abqlpn32.exe45⤵PID:1660
-
C:\Windows\SysWOW64\Acbigfii.exeC:\Windows\system32\Acbigfii.exe46⤵PID:1352
-
C:\Windows\SysWOW64\Ajladp32.exeC:\Windows\system32\Ajladp32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2256 -
C:\Windows\SysWOW64\Aqfiqjgb.exeC:\Windows\system32\Aqfiqjgb.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:900 -
C:\Windows\SysWOW64\Acdemegf.exeC:\Windows\system32\Acdemegf.exe49⤵PID:2832
-
C:\Windows\SysWOW64\Ajnnipnc.exeC:\Windows\system32\Ajnnipnc.exe50⤵PID:2860
-
C:\Windows\SysWOW64\Ammjekmg.exeC:\Windows\system32\Ammjekmg.exe51⤵PID:1956
-
C:\Windows\SysWOW64\Bcfbbe32.exeC:\Windows\system32\Bcfbbe32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2684 -
C:\Windows\SysWOW64\Bjcgdojn.exeC:\Windows\system32\Bjcgdojn.exe53⤵
- Drops file in System32 directory
PID:296 -
C:\Windows\SysWOW64\Bkdclgpl.exeC:\Windows\system32\Bkdclgpl.exe54⤵PID:2308
-
C:\Windows\SysWOW64\Bbnlia32.exeC:\Windows\system32\Bbnlia32.exe55⤵PID:1312
-
C:\Windows\SysWOW64\Bihdfkoe.exeC:\Windows\system32\Bihdfkoe.exe56⤵
- Modifies registry class
PID:2224 -
C:\Windows\SysWOW64\Boblbe32.exeC:\Windows\system32\Boblbe32.exe57⤵PID:2108
-
C:\Windows\SysWOW64\Bbpioa32.exeC:\Windows\system32\Bbpioa32.exe58⤵PID:2204
-
C:\Windows\SysWOW64\Bbbedqcc.exeC:\Windows\system32\Bbbedqcc.exe59⤵PID:2624
-
C:\Windows\SysWOW64\Baeepm32.exeC:\Windows\system32\Baeepm32.exe60⤵PID:1688
-
C:\Windows\SysWOW64\Bimnqk32.exeC:\Windows\system32\Bimnqk32.exe61⤵
- Modifies registry class
PID:2140 -
C:\Windows\SysWOW64\Ckkjmf32.exeC:\Windows\system32\Ckkjmf32.exe62⤵
- Drops file in System32 directory
PID:1632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Jnnehb32.exeC:\Windows\system32\Jnnehb32.exe1⤵
- Modifies registry class
PID:3028
-
C:\Windows\SysWOW64\Kaagnp32.exeC:\Windows\system32\Kaagnp32.exe1⤵PID:3020
-
C:\Windows\SysWOW64\Laccdp32.exeC:\Windows\system32\Laccdp32.exe2⤵PID:328
-
C:\Windows\SysWOW64\Lppgfkpd.exeC:\Windows\system32\Lppgfkpd.exe3⤵PID:756
-
C:\Windows\SysWOW64\Lbncbgoh.exeC:\Windows\system32\Lbncbgoh.exe4⤵PID:2752
-
C:\Windows\SysWOW64\Memonbnl.exeC:\Windows\system32\Memonbnl.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2084 -
C:\Windows\SysWOW64\Mlfgkleh.exeC:\Windows\system32\Mlfgkleh.exe6⤵PID:1668
-
C:\Windows\SysWOW64\Moecghdl.exeC:\Windows\system32\Moecghdl.exe7⤵PID:1660
-
C:\Windows\SysWOW64\Macpcccp.exeC:\Windows\system32\Macpcccp.exe8⤵PID:1324
-
C:\Windows\SysWOW64\Mlidplcf.exeC:\Windows\system32\Mlidplcf.exe9⤵PID:1312
-
C:\Windows\SysWOW64\Mogqlgbi.exeC:\Windows\system32\Mogqlgbi.exe10⤵PID:560
-
C:\Windows\SysWOW64\Meaiia32.exeC:\Windows\system32\Meaiia32.exe11⤵
- Modifies registry class
PID:2000 -
C:\Windows\SysWOW64\Mgbeqjpd.exeC:\Windows\system32\Mgbeqjpd.exe12⤵
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\Mahinb32.exeC:\Windows\system32\Mahinb32.exe13⤵PID:1916
-
C:\Windows\SysWOW64\Ohdkop32.exeC:\Windows\system32\Ohdkop32.exe14⤵PID:2808
-
C:\Windows\SysWOW64\Okbgkk32.exeC:\Windows\system32\Okbgkk32.exe15⤵
- Modifies registry class
PID:1576 -
C:\Windows\SysWOW64\Oamohenq.exeC:\Windows\system32\Oamohenq.exe16⤵
- Drops file in System32 directory
- Modifies registry class
PID:2204 -
C:\Windows\SysWOW64\Ohfgeo32.exeC:\Windows\system32\Ohfgeo32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1708 -
C:\Windows\SysWOW64\Ojhdmgkl.exeC:\Windows\system32\Ojhdmgkl.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\Oaolne32.exeC:\Windows\system32\Oaolne32.exe19⤵PID:1584
-
C:\Windows\SysWOW64\Odmhjp32.exeC:\Windows\system32\Odmhjp32.exe20⤵PID:2912
-
C:\Windows\SysWOW64\Ommfibdg.exeC:\Windows\system32\Ommfibdg.exe21⤵PID:3060
-
C:\Windows\SysWOW64\Jhbfcj32.exeC:\Windows\system32\Jhbfcj32.exe22⤵
- Drops file in System32 directory
PID:1068 -
C:\Windows\SysWOW64\Kjmeaa32.exeC:\Windows\system32\Kjmeaa32.exe23⤵PID:2424
-
C:\Windows\SysWOW64\Kbdmboqk.exeC:\Windows\system32\Kbdmboqk.exe24⤵
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\Oagkac32.exeC:\Windows\system32\Oagkac32.exe25⤵
- Drops file in System32 directory
- Modifies registry class
PID:2876 -
C:\Windows\SysWOW64\Ofbgbaio.exeC:\Windows\system32\Ofbgbaio.exe26⤵
- Drops file in System32 directory
PID:2328 -
C:\Windows\SysWOW64\Pgdcjjom.exeC:\Windows\system32\Pgdcjjom.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2692 -
C:\Windows\SysWOW64\Pkopjh32.exeC:\Windows\system32\Pkopjh32.exe28⤵PID:1820
-
C:\Windows\SysWOW64\Pnnlfd32.exeC:\Windows\system32\Pnnlfd32.exe29⤵
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\Pqlhbo32.exeC:\Windows\system32\Pqlhbo32.exe30⤵PID:2400
-
C:\Windows\SysWOW64\Phcpdm32.exeC:\Windows\system32\Phcpdm32.exe31⤵PID:2756
-
C:\Windows\SysWOW64\Pjdlkeln.exeC:\Windows\system32\Pjdlkeln.exe32⤵PID:1180
-
C:\Windows\SysWOW64\Pdlmnm32.exeC:\Windows\system32\Pdlmnm32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\Pfnjfepp.exeC:\Windows\system32\Pfnjfepp.exe34⤵PID:1896
-
C:\Windows\SysWOW64\Pofnok32.exeC:\Windows\system32\Pofnok32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:456 -
C:\Windows\SysWOW64\Pfpflenm.exeC:\Windows\system32\Pfpflenm.exe36⤵PID:2356
-
C:\Windows\SysWOW64\Pinchq32.exeC:\Windows\system32\Pinchq32.exe37⤵PID:1520
-
C:\Windows\SysWOW64\Qcdgei32.exeC:\Windows\system32\Qcdgei32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2932 -
C:\Windows\SysWOW64\Qjnoacdc.exeC:\Windows\system32\Qjnoacdc.exe39⤵PID:668
-
C:\Windows\SysWOW64\Qmlknocg.exeC:\Windows\system32\Qmlknocg.exe40⤵PID:2732
-
C:\Windows\SysWOW64\Qcfdji32.exeC:\Windows\system32\Qcfdji32.exe41⤵PID:620
-
C:\Windows\SysWOW64\Qfdpgd32.exeC:\Windows\system32\Qfdpgd32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2380 -
C:\Windows\SysWOW64\Akahokho.exeC:\Windows\system32\Akahokho.exe43⤵PID:2360
-
C:\Windows\SysWOW64\Aihenoef.exeC:\Windows\system32\Aihenoef.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:388 -
C:\Windows\SysWOW64\Ajibeg32.exeC:\Windows\system32\Ajibeg32.exe45⤵
- Drops file in System32 directory
PID:3068 -
C:\Windows\SysWOW64\Andnff32.exeC:\Windows\system32\Andnff32.exe46⤵PID:2376
-
C:\Windows\SysWOW64\Aacjba32.exeC:\Windows\system32\Aacjba32.exe47⤵PID:2576
-
C:\Windows\SysWOW64\Acafnm32.exeC:\Windows\system32\Acafnm32.exe48⤵PID:2964
-
C:\Windows\SysWOW64\Akhopj32.exeC:\Windows\system32\Akhopj32.exe49⤵PID:2452
-
C:\Windows\SysWOW64\Angklf32.exeC:\Windows\system32\Angklf32.exe50⤵PID:1684
-
C:\Windows\SysWOW64\Anigaeoh.exeC:\Windows\system32\Anigaeoh.exe51⤵PID:1216
-
C:\Windows\SysWOW64\Aahdmanl.exeC:\Windows\system32\Aahdmanl.exe52⤵PID:2092
-
C:\Windows\SysWOW64\Acfpilmp.exeC:\Windows\system32\Acfpilmp.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2680 -
C:\Windows\SysWOW64\Bfdlehlc.exeC:\Windows\system32\Bfdlehlc.exe54⤵PID:2324
-
C:\Windows\SysWOW64\Bjphff32.exeC:\Windows\system32\Bjphff32.exe55⤵PID:2940
-
C:\Windows\SysWOW64\Bmndbb32.exeC:\Windows\system32\Bmndbb32.exe56⤵PID:2532
-
C:\Windows\SysWOW64\Bajqcqli.exeC:\Windows\system32\Bajqcqli.exe57⤵PID:2180
-
C:\Windows\SysWOW64\Bbkmki32.exeC:\Windows\system32\Bbkmki32.exe58⤵PID:2004
-
C:\Windows\SysWOW64\Bbnjphpe.exeC:\Windows\system32\Bbnjphpe.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Bigbmb32.exeC:\Windows\system32\Bigbmb32.exe60⤵PID:2104
-
C:\Windows\SysWOW64\Bpajjmon.exeC:\Windows\system32\Bpajjmon.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2880 -
C:\Windows\SysWOW64\Bfkbfg32.exeC:\Windows\system32\Bfkbfg32.exe62⤵PID:3000
-
C:\Windows\SysWOW64\Boggkicf.exeC:\Windows\system32\Boggkicf.exe63⤵
- Drops file in System32 directory
PID:1904 -
C:\Windows\SysWOW64\Beqogc32.exeC:\Windows\system32\Beqogc32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2212 -
C:\Windows\SysWOW64\Bholco32.exeC:\Windows\system32\Bholco32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:108 -
C:\Windows\SysWOW64\Bjnhpj32.exeC:\Windows\system32\Bjnhpj32.exe66⤵PID:1648
-
C:\Windows\SysWOW64\Ckpdej32.exeC:\Windows\system32\Ckpdej32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1800 -
C:\Windows\SysWOW64\Cajmbd32.exeC:\Windows\system32\Cajmbd32.exe68⤵PID:1380
-
C:\Windows\SysWOW64\Ceeibbgn.exeC:\Windows\system32\Ceeibbgn.exe69⤵PID:2372
-
C:\Windows\SysWOW64\Cffejk32.exeC:\Windows\system32\Cffejk32.exe70⤵PID:1308
-
C:\Windows\SysWOW64\Cmqmgedi.exeC:\Windows\system32\Cmqmgedi.exe71⤵
- Drops file in System32 directory
PID:988 -
C:\Windows\SysWOW64\Cdkfco32.exeC:\Windows\system32\Cdkfco32.exe72⤵PID:3012
-
C:\Windows\SysWOW64\Clhgnagn.exeC:\Windows\system32\Clhgnagn.exe73⤵PID:2068
-
C:\Windows\SysWOW64\Cdooongp.exeC:\Windows\system32\Cdooongp.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1664 -
C:\Windows\SysWOW64\Dilggefh.exeC:\Windows\system32\Dilggefh.exe75⤵PID:2112
-
C:\Windows\SysWOW64\Dljdcqek.exeC:\Windows\system32\Dljdcqek.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2792 -
C:\Windows\SysWOW64\Dcdlpklh.exeC:\Windows\system32\Dcdlpklh.exe77⤵
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\Dcgiejje.exeC:\Windows\system32\Dcgiejje.exe78⤵
- Drops file in System32 directory
- Modifies registry class
PID:1952 -
C:\Windows\SysWOW64\Deeeafii.exeC:\Windows\system32\Deeeafii.exe79⤵PID:676
-
C:\Windows\SysWOW64\Dhcanahm.exeC:\Windows\system32\Dhcanahm.exe80⤵PID:956
-
C:\Windows\SysWOW64\Dlomnp32.exeC:\Windows\system32\Dlomnp32.exe81⤵PID:2736
-
C:\Windows\SysWOW64\Dciekjhc.exeC:\Windows\system32\Dciekjhc.exe82⤵
- Drops file in System32 directory
PID:2968 -
C:\Windows\SysWOW64\Degage32.exeC:\Windows\system32\Degage32.exe83⤵
- Modifies registry class
PID:1980 -
C:\Windows\SysWOW64\Dhfnca32.exeC:\Windows\system32\Dhfnca32.exe84⤵PID:1012
-
C:\Windows\SysWOW64\Dopfpkng.exeC:\Windows\system32\Dopfpkng.exe85⤵PID:2444
-
C:\Windows\SysWOW64\Dnbfkh32.exeC:\Windows\system32\Dnbfkh32.exe86⤵PID:2144
-
C:\Windows\SysWOW64\Dejnme32.exeC:\Windows\system32\Dejnme32.exe87⤵PID:2076
-
C:\Windows\SysWOW64\Dkggel32.exeC:\Windows\system32\Dkggel32.exe88⤵PID:572
-
C:\Windows\SysWOW64\Dnecag32.exeC:\Windows\system32\Dnecag32.exe89⤵
- Modifies registry class
PID:1844 -
C:\Windows\SysWOW64\Ejnqkh32.exeC:\Windows\system32\Ejnqkh32.exe90⤵PID:2916
-
C:\Windows\SysWOW64\Elmmhc32.exeC:\Windows\system32\Elmmhc32.exe91⤵
- Modifies registry class
PID:1212 -
C:\Windows\SysWOW64\Ecfednma.exeC:\Windows\system32\Ecfednma.exe92⤵PID:292
-
C:\Windows\SysWOW64\Efeaqi32.exeC:\Windows\system32\Efeaqi32.exe93⤵PID:1124
-
C:\Windows\SysWOW64\Eloimcca.exeC:\Windows\system32\Eloimcca.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1060 -
C:\Windows\SysWOW64\Eomfiobe.exeC:\Windows\system32\Eomfiobe.exe95⤵
- Modifies registry class
PID:1508 -
C:\Windows\SysWOW64\Ejcjfgbk.exeC:\Windows\system32\Ejcjfgbk.exe96⤵
- Modifies registry class
PID:2404 -
C:\Windows\SysWOW64\Eqmbca32.exeC:\Windows\system32\Eqmbca32.exe97⤵PID:1948
-
C:\Windows\SysWOW64\Ebnokjpf.exeC:\Windows\system32\Ebnokjpf.exe98⤵PID:1924
-
C:\Windows\SysWOW64\Fdohme32.exeC:\Windows\system32\Fdohme32.exe99⤵
- Modifies registry class
PID:2440 -
C:\Windows\SysWOW64\Fmfpnb32.exeC:\Windows\system32\Fmfpnb32.exe100⤵PID:2724
-
C:\Windows\SysWOW64\Fnglekch.exeC:\Windows\system32\Fnglekch.exe101⤵
- Drops file in System32 directory
PID:1572 -
C:\Windows\SysWOW64\Ffndghdj.exeC:\Windows\system32\Ffndghdj.exe102⤵PID:2828
-
C:\Windows\SysWOW64\Fkkmoo32.exeC:\Windows\system32\Fkkmoo32.exe103⤵
- Modifies registry class
PID:2096 -
C:\Windows\SysWOW64\Fniikj32.exeC:\Windows\system32\Fniikj32.exe104⤵PID:2260
-
C:\Windows\SysWOW64\Fqhegf32.exeC:\Windows\system32\Fqhegf32.exe105⤵
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Fbgaahgl.exeC:\Windows\system32\Fbgaahgl.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Fefnmdfo.exeC:\Windows\system32\Fefnmdfo.exe107⤵PID:1780
-
C:\Windows\SysWOW64\Fkpfjnnl.exeC:\Windows\system32\Fkpfjnnl.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2588 -
C:\Windows\SysWOW64\Fmabaf32.exeC:\Windows\system32\Fmabaf32.exe109⤵PID:1072
-
C:\Windows\SysWOW64\Gckknqkg.exeC:\Windows\system32\Gckknqkg.exe110⤵
- Drops file in System32 directory
PID:2944 -
C:\Windows\SysWOW64\Gnqolikm.exeC:\Windows\system32\Gnqolikm.exe111⤵PID:1376
-
C:\Windows\SysWOW64\Gimmbg32.exeC:\Windows\system32\Gimmbg32.exe112⤵PID:876
-
C:\Windows\SysWOW64\Gpfeoqmf.exeC:\Windows\system32\Gpfeoqmf.exe113⤵PID:2388
-
C:\Windows\SysWOW64\Gfqmkk32.exeC:\Windows\system32\Gfqmkk32.exe114⤵PID:2472
-
C:\Windows\SysWOW64\Oglfodai.exeC:\Windows\system32\Oglfodai.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2668 -
C:\Windows\SysWOW64\Omfoko32.exeC:\Windows\system32\Omfoko32.exe116⤵PID:2788
-
C:\Windows\SysWOW64\Opdkgj32.exeC:\Windows\system32\Opdkgj32.exe117⤵
- Drops file in System32 directory
PID:2984 -
C:\Windows\SysWOW64\Dhqnnk32.exeC:\Windows\system32\Dhqnnk32.exe118⤵PID:2904
-
C:\Windows\SysWOW64\Ffomjgoj.exeC:\Windows\system32\Ffomjgoj.exe119⤵PID:2644
-
C:\Windows\SysWOW64\Fliefa32.exeC:\Windows\system32\Fliefa32.exe120⤵PID:3008
-
C:\Windows\SysWOW64\Fohacl32.exeC:\Windows\system32\Fohacl32.exe121⤵PID:2900
-
C:\Windows\SysWOW64\Ffbjpfmg.exeC:\Windows\system32\Ffbjpfmg.exe122⤵
- Modifies registry class
PID:1692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-