Analysis
-
max time kernel
251s -
max time network
293s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 19:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c31f95589ed9e077c82dc687765f6dbf_JC.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
c31f95589ed9e077c82dc687765f6dbf_JC.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
c31f95589ed9e077c82dc687765f6dbf_JC.exe
-
Size
79KB
-
MD5
c31f95589ed9e077c82dc687765f6dbf
-
SHA1
7585e435b052563aae64070031baa851b9f8802a
-
SHA256
552f349136f8f8e5d9dfbf670b3331cd2d06320c77f75d6f7aa855edee8b8649
-
SHA512
3fb86dcc82a2cc26d649b1d4f7e40c3f37f050d03bc559e88c6f884dd993feac939a8613b3b74cd56d57d88bbe6f67a96ab05598192818dd0fbfda7f30b01730
-
SSDEEP
1536:JSJkHfq0d3Lqyop8hCuZ0+4oMZrI1jHJZrR:JSJkHyGLfIICubRMu1jHJ9R
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhnkkj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmegjeoc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kboill32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhikiefk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doipoldo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khdhmg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efdjhocj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joanbjkb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hajogm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akkaalpo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jeacpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iiclkqhk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccinpa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlboeanl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnfjhbjo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbflbc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qappbgkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Megbof32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hddjcbfh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Encgglkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnkcca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfiemcab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gleifm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpkfng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jlqpdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" c31f95589ed9e077c82dc687765f6dbf_JC.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iobdopna.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idaimfjf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgbmkp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fldgjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjcimhab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phhkja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ichqhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifgmde32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eckopm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilcqkj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkodleec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhogqn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Miqajeaa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgpqnpjh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnedfljc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aacknfhl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpngec32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgionbbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blfodb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obfmgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jaegpbon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obchnjkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Boekqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emhdhipd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gefnkegl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gekaicof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iokhak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilpohecc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oloapmnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbnnifmh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhfcnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcmaek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohfbendg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hljbambn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpdggm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpfamd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aobblkkk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnqkammo.exe -
Executes dropped EXE 64 IoCs
pid Process 2668 Nkfpefme.exe 328 Cdooongp.exe 2444 Doipoldo.exe 1864 Dgphpi32.exe 2840 Dlmqip32.exe 2972 Dajiag32.exe 1672 Ehfjbd32.exe 1680 Eckopm32.exe 1048 Ehhghdgc.exe 1720 Fdohme32.exe 2056 Fodljn32.exe 2028 Fgpqnpjh.exe 1212 Fbeeliin.exe 2908 Fknido32.exe 2360 Halkahoo.exe 948 Hhfcnb32.exe 1084 Hnpkkm32.exe 2948 Hjglpncm.exe 2152 Hdpqhc32.exe 1948 Hnedfljc.exe 2300 Hpfamd32.exe 2180 Hmjagh32.exe 880 Hddjcbfh.exe 1880 Ilpohecc.exe 936 Ibigeojp.exe 2336 Iicoai32.exe 1996 Iobdopna.exe 2584 Ielllj32.exe 2352 Ilfeidmk.exe 1128 Idaimfjf.exe 2588 Jgihopao.exe 2544 Jjheklqc.exe 2848 Jcpidagc.exe 2528 Kcbfjaeq.exe 1788 Khonbhch.exe 564 Kknkncbl.exe 528 Kcebpqcn.exe 1564 Kfcoll32.exe 1516 Klmghfio.exe 2044 Kolcdahb.exe 1912 Khdhmg32.exe 1328 Kkbdib32.exe 2420 Knapen32.exe 1392 Kqomai32.exe 312 Khfdcgmp.exe 1800 Kjhajo32.exe 1648 Kboill32.exe 576 Lgladc32.exe 2436 Pgionbbl.exe 3064 Akdjfmed.exe 2688 Ahijpa32.exe 2100 Aobblkkk.exe 2196 Apdodc32.exe 3024 Agngqmhf.exe 1604 Anhomg32.exe 2328 Aacknfhl.exe 2268 Agpdfmfc.exe 2320 Bjopbh32.exe 2996 Blmlnd32.exe 2800 Bdddpa32.exe 808 Bfeqgikk.exe 1688 Bjcimhab.exe 1612 Bflghh32.exe 1020 Blfodb32.exe -
Loads dropped DLL 64 IoCs
pid Process 1992 c31f95589ed9e077c82dc687765f6dbf_JC.exe 1992 c31f95589ed9e077c82dc687765f6dbf_JC.exe 2668 Nkfpefme.exe 2668 Nkfpefme.exe 328 Cdooongp.exe 328 Cdooongp.exe 2444 Doipoldo.exe 2444 Doipoldo.exe 1864 Dgphpi32.exe 1864 Dgphpi32.exe 2840 Dlmqip32.exe 2840 Dlmqip32.exe 2972 Dajiag32.exe 2972 Dajiag32.exe 1672 Ehfjbd32.exe 1672 Ehfjbd32.exe 1680 Eckopm32.exe 1680 Eckopm32.exe 1048 Ehhghdgc.exe 1048 Ehhghdgc.exe 1720 Fdohme32.exe 1720 Fdohme32.exe 2056 Fodljn32.exe 2056 Fodljn32.exe 2028 Fgpqnpjh.exe 2028 Fgpqnpjh.exe 1212 Fbeeliin.exe 1212 Fbeeliin.exe 2908 Fknido32.exe 2908 Fknido32.exe 2360 Halkahoo.exe 2360 Halkahoo.exe 948 Hhfcnb32.exe 948 Hhfcnb32.exe 1084 Hnpkkm32.exe 1084 Hnpkkm32.exe 2948 Hjglpncm.exe 2948 Hjglpncm.exe 2152 Hdpqhc32.exe 2152 Hdpqhc32.exe 1948 Hnedfljc.exe 1948 Hnedfljc.exe 2300 Hpfamd32.exe 2300 Hpfamd32.exe 2180 Hmjagh32.exe 2180 Hmjagh32.exe 880 Hddjcbfh.exe 880 Hddjcbfh.exe 1880 Ilpohecc.exe 1880 Ilpohecc.exe 936 Ibigeojp.exe 936 Ibigeojp.exe 2336 Iicoai32.exe 2336 Iicoai32.exe 1996 Iobdopna.exe 1996 Iobdopna.exe 2584 Ielllj32.exe 2584 Ielllj32.exe 2352 Ilfeidmk.exe 2352 Ilfeidmk.exe 1128 Idaimfjf.exe 1128 Idaimfjf.exe 2588 Jgihopao.exe 2588 Jgihopao.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Iapica32.exe Ibmigdnp.exe File created C:\Windows\SysWOW64\Ogbmlp32.exe Oimqkd32.exe File opened for modification C:\Windows\SysWOW64\Khonbhch.exe Kcbfjaeq.exe File created C:\Windows\SysWOW64\Cqkace32.exe Cjqigkfp.exe File created C:\Windows\SysWOW64\Aabioeeg.dll Holcka32.exe File opened for modification C:\Windows\SysWOW64\Pegbhfgo.exe Pomjkl32.exe File created C:\Windows\SysWOW64\Mgbenjbn.exe Mlmqpabh.exe File opened for modification C:\Windows\SysWOW64\Boekqn32.exe Blfodb32.exe File created C:\Windows\SysWOW64\Fldgjd32.exe Fhikiefk.exe File opened for modification C:\Windows\SysWOW64\Hljbambn.exe Hhogqn32.exe File created C:\Windows\SysWOW64\Kbbcch32.exe Kpdggm32.exe File created C:\Windows\SysWOW64\Jopkbala.dll Ibigeojp.exe File opened for modification C:\Windows\SysWOW64\Khcqemfh.exe Kbihhc32.exe File created C:\Windows\SysWOW64\Fodljn32.exe Fdohme32.exe File created C:\Windows\SysWOW64\Pdpoec32.dll Ffhajfga.exe File created C:\Windows\SysWOW64\Joffbeab.exe Jhlnek32.exe File opened for modification C:\Windows\SysWOW64\Hadnddbh.exe Hpcbll32.exe File created C:\Windows\SysWOW64\Nqooqb32.exe Nhhgpdfb.exe File created C:\Windows\SysWOW64\Nibola32.dll Jcpidagc.exe File created C:\Windows\SysWOW64\Aacknfhl.exe Anhomg32.exe File created C:\Windows\SysWOW64\Klgnci32.dll Fpkfng32.exe File created C:\Windows\SysWOW64\Ghmach32.exe Goemjbna.exe File opened for modification C:\Windows\SysWOW64\Jnkcca32.exe Jkmggf32.exe File created C:\Windows\SysWOW64\Akdjfmed.exe Pgionbbl.exe File created C:\Windows\SysWOW64\Adknlh32.dll Qodplkjj.exe File opened for modification C:\Windows\SysWOW64\Lechcgkk.exe Lpfpkpld.exe File opened for modification C:\Windows\SysWOW64\Gpncdfkl.exe Ggeoka32.exe File created C:\Windows\SysWOW64\Iacelcgc.dll Hqbini32.exe File created C:\Windows\SysWOW64\Megjga32.dll Imppciin.exe File opened for modification C:\Windows\SysWOW64\Koaifi32.exe Jjdanb32.exe File created C:\Windows\SysWOW64\Npklmdie.dll Ifgmde32.exe File created C:\Windows\SysWOW64\Jkkkmkoc.exe Jgooll32.exe File opened for modification C:\Windows\SysWOW64\Hjglpncm.exe Hnpkkm32.exe File opened for modification C:\Windows\SysWOW64\Honpqaff.exe Hhdgdg32.exe File created C:\Windows\SysWOW64\Knkpbehe.exe Kkmcfiia.exe File opened for modification C:\Windows\SysWOW64\Kqomai32.exe Knapen32.exe File created C:\Windows\SysWOW64\Kjkjbo32.dll Lmegjeoc.exe File created C:\Windows\SysWOW64\Cnjhbjql.exe Cgppep32.exe File opened for modification C:\Windows\SysWOW64\Dlboeanl.exe Dgdfocge.exe File created C:\Windows\SysWOW64\Kbpfni32.exe Kgdigkbe.exe File created C:\Windows\SysWOW64\Ijplod32.exe Ibidnf32.exe File created C:\Windows\SysWOW64\Hlloflpk.exe Hhacfn32.exe File created C:\Windows\SysWOW64\Ahijpa32.exe Akdjfmed.exe File created C:\Windows\SysWOW64\Animmgob.exe Akkaalpo.exe File created C:\Windows\SysWOW64\Cddqod32.exe Cbedbi32.exe File opened for modification C:\Windows\SysWOW64\Fpninl32.exe Imppciin.exe File created C:\Windows\SysWOW64\Hhfcnb32.exe Halkahoo.exe File opened for modification C:\Windows\SysWOW64\Phhkja32.exe Pfionfel.exe File created C:\Windows\SysWOW64\Kbflbc32.exe Knkpbehe.exe File created C:\Windows\SysWOW64\Hnpkkm32.exe Hhfcnb32.exe File opened for modification C:\Windows\SysWOW64\Ilfeidmk.exe Ielllj32.exe File created C:\Windows\SysWOW64\Pgionbbl.exe Lgladc32.exe File opened for modification C:\Windows\SysWOW64\Gifgml32.exe Gggkqq32.exe File opened for modification C:\Windows\SysWOW64\Nkfpefme.exe c31f95589ed9e077c82dc687765f6dbf_JC.exe File created C:\Windows\SysWOW64\Kffgjn32.dll Kjhajo32.exe File opened for modification C:\Windows\SysWOW64\Bjopbh32.exe Agpdfmfc.exe File created C:\Windows\SysWOW64\Honpqaff.exe Hhdgdg32.exe File opened for modification C:\Windows\SysWOW64\Jeacpq32.exe Jaegpbon.exe File created C:\Windows\SysWOW64\Laofedjo.exe Kkpdmjfg.exe File opened for modification C:\Windows\SysWOW64\Dgdfocge.exe Cggffocg.exe File created C:\Windows\SysWOW64\Emhdhipd.exe Encgglkm.exe File opened for modification C:\Windows\SysWOW64\Mqhjhgcm.exe Animmgob.exe File created C:\Windows\SysWOW64\Kemknacn.dll Hgfpgj32.exe File created C:\Windows\SysWOW64\Ccckedjl.dll Kbbcch32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgionbbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmjagh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cggnqmhb.dll" Khonbhch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ilpohecc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcjbee32.dll" Lgladc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lqneip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mqhjhgcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hljbambn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eckopm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdohme32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cqmnie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgladc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agpdfmfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbbcch32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khdhmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Igqjfb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbbgmeim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpdggm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phhkja32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnbahg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amdmaocd.dll" Hdpqhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oefffohh.dll" Mbbgmeim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpgdjh32.dll" Jkhogkaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcebpqcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhpnpeei.dll" Fpngec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cijenjap.dll" Gifgml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjpace32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pokmflbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gefnkegl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flmfqi32.dll" Gekaicof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbeeliin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngjial32.dll" Kkbdib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehiojb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkbdib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcljne32.dll" Agpdfmfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkodleec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkpdmjfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlhkpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmfaanik.dll" Jfiemcab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pegbhfgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmegjeoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehiojb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghmach32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbcgmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phhkja32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gennoclc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfldiqpl.dll" Lcbpblnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lechcgkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apdodc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmabhfca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfkabcop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfnlhh32.dll" Ooidai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhhoanak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcbpem32.dll" Fbeeliin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fiecfgfc.dll" Fldgjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khdhmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kffgjn32.dll" Kjhajo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibigeojp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkodleec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdbecoia.dll" Mfijcdek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qkfgfm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpngec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efdjhocj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcniok32.dll" Gggkqq32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2668 1992 c31f95589ed9e077c82dc687765f6dbf_JC.exe 27 PID 1992 wrote to memory of 2668 1992 c31f95589ed9e077c82dc687765f6dbf_JC.exe 27 PID 1992 wrote to memory of 2668 1992 c31f95589ed9e077c82dc687765f6dbf_JC.exe 27 PID 1992 wrote to memory of 2668 1992 c31f95589ed9e077c82dc687765f6dbf_JC.exe 27 PID 2668 wrote to memory of 328 2668 Nkfpefme.exe 28 PID 2668 wrote to memory of 328 2668 Nkfpefme.exe 28 PID 2668 wrote to memory of 328 2668 Nkfpefme.exe 28 PID 2668 wrote to memory of 328 2668 Nkfpefme.exe 28 PID 328 wrote to memory of 2444 328 Cdooongp.exe 29 PID 328 wrote to memory of 2444 328 Cdooongp.exe 29 PID 328 wrote to memory of 2444 328 Cdooongp.exe 29 PID 328 wrote to memory of 2444 328 Cdooongp.exe 29 PID 2444 wrote to memory of 1864 2444 Doipoldo.exe 30 PID 2444 wrote to memory of 1864 2444 Doipoldo.exe 30 PID 2444 wrote to memory of 1864 2444 Doipoldo.exe 30 PID 2444 wrote to memory of 1864 2444 Doipoldo.exe 30 PID 1864 wrote to memory of 2840 1864 Dgphpi32.exe 31 PID 1864 wrote to memory of 2840 1864 Dgphpi32.exe 31 PID 1864 wrote to memory of 2840 1864 Dgphpi32.exe 31 PID 1864 wrote to memory of 2840 1864 Dgphpi32.exe 31 PID 2840 wrote to memory of 2972 2840 Dlmqip32.exe 32 PID 2840 wrote to memory of 2972 2840 Dlmqip32.exe 32 PID 2840 wrote to memory of 2972 2840 Dlmqip32.exe 32 PID 2840 wrote to memory of 2972 2840 Dlmqip32.exe 32 PID 2972 wrote to memory of 1672 2972 Dajiag32.exe 33 PID 2972 wrote to memory of 1672 2972 Dajiag32.exe 33 PID 2972 wrote to memory of 1672 2972 Dajiag32.exe 33 PID 2972 wrote to memory of 1672 2972 Dajiag32.exe 33 PID 1672 wrote to memory of 1680 1672 Ehfjbd32.exe 35 PID 1672 wrote to memory of 1680 1672 Ehfjbd32.exe 35 PID 1672 wrote to memory of 1680 1672 Ehfjbd32.exe 35 PID 1672 wrote to memory of 1680 1672 Ehfjbd32.exe 35 PID 1680 wrote to memory of 1048 1680 Eckopm32.exe 34 PID 1680 wrote to memory of 1048 1680 Eckopm32.exe 34 PID 1680 wrote to memory of 1048 1680 Eckopm32.exe 34 PID 1680 wrote to memory of 1048 1680 Eckopm32.exe 34 PID 1048 wrote to memory of 1720 1048 Ehhghdgc.exe 36 PID 1048 wrote to memory of 1720 1048 Ehhghdgc.exe 36 PID 1048 wrote to memory of 1720 1048 Ehhghdgc.exe 36 PID 1048 wrote to memory of 1720 1048 Ehhghdgc.exe 36 PID 1720 wrote to memory of 2056 1720 Fdohme32.exe 37 PID 1720 wrote to memory of 2056 1720 Fdohme32.exe 37 PID 1720 wrote to memory of 2056 1720 Fdohme32.exe 37 PID 1720 wrote to memory of 2056 1720 Fdohme32.exe 37 PID 2056 wrote to memory of 2028 2056 Fodljn32.exe 38 PID 2056 wrote to memory of 2028 2056 Fodljn32.exe 38 PID 2056 wrote to memory of 2028 2056 Fodljn32.exe 38 PID 2056 wrote to memory of 2028 2056 Fodljn32.exe 38 PID 2028 wrote to memory of 1212 2028 Fgpqnpjh.exe 39 PID 2028 wrote to memory of 1212 2028 Fgpqnpjh.exe 39 PID 2028 wrote to memory of 1212 2028 Fgpqnpjh.exe 39 PID 2028 wrote to memory of 1212 2028 Fgpqnpjh.exe 39 PID 1212 wrote to memory of 2908 1212 Fbeeliin.exe 40 PID 1212 wrote to memory of 2908 1212 Fbeeliin.exe 40 PID 1212 wrote to memory of 2908 1212 Fbeeliin.exe 40 PID 1212 wrote to memory of 2908 1212 Fbeeliin.exe 40 PID 2908 wrote to memory of 2360 2908 Fknido32.exe 41 PID 2908 wrote to memory of 2360 2908 Fknido32.exe 41 PID 2908 wrote to memory of 2360 2908 Fknido32.exe 41 PID 2908 wrote to memory of 2360 2908 Fknido32.exe 41 PID 2360 wrote to memory of 948 2360 Halkahoo.exe 42 PID 2360 wrote to memory of 948 2360 Halkahoo.exe 42 PID 2360 wrote to memory of 948 2360 Halkahoo.exe 42 PID 2360 wrote to memory of 948 2360 Halkahoo.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\c31f95589ed9e077c82dc687765f6dbf_JC.exe"C:\Users\Admin\AppData\Local\Temp\c31f95589ed9e077c82dc687765f6dbf_JC.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\Nkfpefme.exeC:\Windows\system32\Nkfpefme.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Cdooongp.exeC:\Windows\system32\Cdooongp.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\Doipoldo.exeC:\Windows\system32\Doipoldo.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\Dgphpi32.exeC:\Windows\system32\Dgphpi32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\Dlmqip32.exeC:\Windows\system32\Dlmqip32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Dajiag32.exeC:\Windows\system32\Dajiag32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\Ehfjbd32.exeC:\Windows\system32\Ehfjbd32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\Eckopm32.exeC:\Windows\system32\Eckopm32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1680
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ehhghdgc.exeC:\Windows\system32\Ehhghdgc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\Fdohme32.exeC:\Windows\system32\Fdohme32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\Fodljn32.exeC:\Windows\system32\Fodljn32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Fgpqnpjh.exeC:\Windows\system32\Fgpqnpjh.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\Fbeeliin.exeC:\Windows\system32\Fbeeliin.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\Fknido32.exeC:\Windows\system32\Fknido32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\Halkahoo.exeC:\Windows\system32\Halkahoo.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\Hhfcnb32.exeC:\Windows\system32\Hhfcnb32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:948 -
C:\Windows\SysWOW64\Hnpkkm32.exeC:\Windows\system32\Hnpkkm32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1084 -
C:\Windows\SysWOW64\Hjglpncm.exeC:\Windows\system32\Hjglpncm.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948 -
C:\Windows\SysWOW64\Hdpqhc32.exeC:\Windows\system32\Hdpqhc32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2152 -
C:\Windows\SysWOW64\Hnedfljc.exeC:\Windows\system32\Hnedfljc.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1948 -
C:\Windows\SysWOW64\Hpfamd32.exeC:\Windows\system32\Hpfamd32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2300 -
C:\Windows\SysWOW64\Hmjagh32.exeC:\Windows\system32\Hmjagh32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\Hddjcbfh.exeC:\Windows\system32\Hddjcbfh.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:880 -
C:\Windows\SysWOW64\Ilpohecc.exeC:\Windows\system32\Ilpohecc.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1880 -
C:\Windows\SysWOW64\Ibigeojp.exeC:\Windows\system32\Ibigeojp.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:936 -
C:\Windows\SysWOW64\Iicoai32.exeC:\Windows\system32\Iicoai32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2336 -
C:\Windows\SysWOW64\Iobdopna.exeC:\Windows\system32\Iobdopna.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1996 -
C:\Windows\SysWOW64\Ielllj32.exeC:\Windows\system32\Ielllj32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ilfeidmk.exeC:\Windows\system32\Ilfeidmk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2352 -
C:\Windows\SysWOW64\Idaimfjf.exeC:\Windows\system32\Idaimfjf.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1128 -
C:\Windows\SysWOW64\Jgihopao.exeC:\Windows\system32\Jgihopao.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2588 -
C:\Windows\SysWOW64\Jjheklqc.exeC:\Windows\system32\Jjheklqc.exe4⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\Jcpidagc.exeC:\Windows\system32\Jcpidagc.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Kcbfjaeq.exeC:\Windows\system32\Kcbfjaeq.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2528 -
C:\Windows\SysWOW64\Khonbhch.exeC:\Windows\system32\Khonbhch.exe7⤵
- Executes dropped EXE
- Modifies registry class
PID:1788 -
C:\Windows\SysWOW64\Kknkncbl.exeC:\Windows\system32\Kknkncbl.exe8⤵
- Executes dropped EXE
PID:564 -
C:\Windows\SysWOW64\Kcebpqcn.exeC:\Windows\system32\Kcebpqcn.exe9⤵
- Executes dropped EXE
- Modifies registry class
PID:528 -
C:\Windows\SysWOW64\Kfcoll32.exeC:\Windows\system32\Kfcoll32.exe10⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\Klmghfio.exeC:\Windows\system32\Klmghfio.exe11⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\Kolcdahb.exeC:\Windows\system32\Kolcdahb.exe12⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\Khdhmg32.exeC:\Windows\system32\Khdhmg32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\Kkbdib32.exeC:\Windows\system32\Kkbdib32.exe14⤵
- Executes dropped EXE
- Modifies registry class
PID:1328 -
C:\Windows\SysWOW64\Knapen32.exeC:\Windows\system32\Knapen32.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2420 -
C:\Windows\SysWOW64\Kqomai32.exeC:\Windows\system32\Kqomai32.exe16⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\Khfdcgmp.exeC:\Windows\system32\Khfdcgmp.exe17⤵
- Executes dropped EXE
PID:312 -
C:\Windows\SysWOW64\Kjhajo32.exeC:\Windows\system32\Kjhajo32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\Kboill32.exeC:\Windows\system32\Kboill32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\Lgladc32.exeC:\Windows\system32\Lgladc32.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:576 -
C:\Windows\SysWOW64\Pgionbbl.exeC:\Windows\system32\Pgionbbl.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2436 -
C:\Windows\SysWOW64\Akdjfmed.exeC:\Windows\system32\Akdjfmed.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3064 -
C:\Windows\SysWOW64\Ahijpa32.exeC:\Windows\system32\Ahijpa32.exe23⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Aobblkkk.exeC:\Windows\system32\Aobblkkk.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\Apdodc32.exeC:\Windows\system32\Apdodc32.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:2196 -
C:\Windows\SysWOW64\Agngqmhf.exeC:\Windows\system32\Agngqmhf.exe26⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\Anhomg32.exeC:\Windows\system32\Anhomg32.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\Aacknfhl.exeC:\Windows\system32\Aacknfhl.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\Agpdfmfc.exeC:\Windows\system32\Agpdfmfc.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2268 -
C:\Windows\SysWOW64\Bjopbh32.exeC:\Windows\system32\Bjopbh32.exe30⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Blmlnd32.exeC:\Windows\system32\Blmlnd32.exe31⤵
- Executes dropped EXE
PID:2996 -
C:\Windows\SysWOW64\Bdddpa32.exeC:\Windows\system32\Bdddpa32.exe32⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Bfeqgikk.exeC:\Windows\system32\Bfeqgikk.exe33⤵
- Executes dropped EXE
PID:808 -
C:\Windows\SysWOW64\Bjcimhab.exeC:\Windows\system32\Bjcimhab.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\Bflghh32.exeC:\Windows\system32\Bflghh32.exe35⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\Blfodb32.exeC:\Windows\system32\Blfodb32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1020 -
C:\Windows\SysWOW64\Boekqn32.exeC:\Windows\system32\Boekqn32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3016 -
C:\Windows\SysWOW64\Cbcgmi32.exeC:\Windows\system32\Cbcgmi32.exe38⤵
- Modifies registry class
PID:1492 -
C:\Windows\SysWOW64\Cdadie32.exeC:\Windows\system32\Cdadie32.exe39⤵PID:2940
-
C:\Windows\SysWOW64\Cgppep32.exeC:\Windows\system32\Cgppep32.exe40⤵
- Drops file in System32 directory
PID:2240 -
C:\Windows\SysWOW64\Cnjhbjql.exeC:\Windows\system32\Cnjhbjql.exe41⤵PID:824
-
C:\Windows\SysWOW64\Cbedbi32.exeC:\Windows\system32\Cbedbi32.exe42⤵
- Drops file in System32 directory
PID:1900 -
C:\Windows\SysWOW64\Cddqod32.exeC:\Windows\system32\Cddqod32.exe43⤵PID:908
-
C:\Windows\SysWOW64\Cgbmkp32.exeC:\Windows\system32\Cgbmkp32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2592 -
C:\Windows\SysWOW64\Cjqigkfp.exeC:\Windows\system32\Cjqigkfp.exe45⤵
- Drops file in System32 directory
PID:628 -
C:\Windows\SysWOW64\Cqkace32.exeC:\Windows\system32\Cqkace32.exe46⤵PID:2668
-
C:\Windows\SysWOW64\Ccinpa32.exeC:\Windows\system32\Ccinpa32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2772 -
C:\Windows\SysWOW64\Cjcflkdm.exeC:\Windows\system32\Cjcflkdm.exe48⤵PID:600
-
C:\Windows\SysWOW64\Cmabhfca.exeC:\Windows\system32\Cmabhfca.exe49⤵
- Modifies registry class
PID:1212 -
C:\Windows\SysWOW64\Cqmnie32.exeC:\Windows\system32\Cqmnie32.exe50⤵
- Modifies registry class
PID:2164 -
C:\Windows\SysWOW64\Cggffocg.exeC:\Windows\system32\Cggffocg.exe51⤵
- Drops file in System32 directory
PID:2152 -
C:\Windows\SysWOW64\Dgdfocge.exeC:\Windows\system32\Dgdfocge.exe52⤵
- Drops file in System32 directory
PID:1172 -
C:\Windows\SysWOW64\Dlboeanl.exeC:\Windows\system32\Dlboeanl.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:544 -
C:\Windows\SysWOW64\Dnqkammo.exeC:\Windows\system32\Dnqkammo.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2012 -
C:\Windows\SysWOW64\Ehiojb32.exeC:\Windows\system32\Ehiojb32.exe55⤵
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\Encgglkm.exeC:\Windows\system32\Encgglkm.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2516 -
C:\Windows\SysWOW64\Emhdhipd.exeC:\Windows\system32\Emhdhipd.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3048 -
C:\Windows\SysWOW64\Emojih32.exeC:\Windows\system32\Emojih32.exe58⤵PID:2900
-
C:\Windows\SysWOW64\Fpngec32.exeC:\Windows\system32\Fpngec32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2548 -
C:\Windows\SysWOW64\Fhikiefk.exeC:\Windows\system32\Fhikiefk.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\Fldgjd32.exeC:\Windows\system32\Fldgjd32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2184 -
C:\Windows\SysWOW64\Feaeni32.exeC:\Windows\system32\Feaeni32.exe62⤵PID:2192
-
C:\Windows\SysWOW64\Fojjfogp.exeC:\Windows\system32\Fojjfogp.exe63⤵PID:2416
-
C:\Windows\SysWOW64\Fpkfng32.exeC:\Windows\system32\Fpkfng32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2932 -
C:\Windows\SysWOW64\Ggeoka32.exeC:\Windows\system32\Ggeoka32.exe65⤵
- Drops file in System32 directory
PID:2480 -
C:\Windows\SysWOW64\Gpncdfkl.exeC:\Windows\system32\Gpncdfkl.exe66⤵PID:2872
-
C:\Windows\SysWOW64\Gggkqq32.exeC:\Windows\system32\Gggkqq32.exe67⤵
- Drops file in System32 directory
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\Gifgml32.exeC:\Windows\system32\Gifgml32.exe68⤵
- Modifies registry class
PID:2808 -
C:\Windows\SysWOW64\Glddig32.exeC:\Windows\system32\Glddig32.exe69⤵PID:1640
-
C:\Windows\SysWOW64\Gdklje32.exeC:\Windows\system32\Gdklje32.exe70⤵PID:2852
-
C:\Windows\SysWOW64\Glfqngom.exeC:\Windows\system32\Glfqngom.exe71⤵PID:2876
-
C:\Windows\SysWOW64\Goemjbna.exeC:\Windows\system32\Goemjbna.exe72⤵
- Drops file in System32 directory
PID:2456 -
C:\Windows\SysWOW64\Ghmach32.exeC:\Windows\system32\Ghmach32.exe73⤵
- Modifies registry class
PID:560 -
C:\Windows\SysWOW64\Gafelnkb.exeC:\Windows\system32\Gafelnkb.exe74⤵PID:532
-
C:\Windows\SysWOW64\Holcka32.exeC:\Windows\system32\Holcka32.exe75⤵
- Drops file in System32 directory
PID:2884 -
C:\Windows\SysWOW64\Hajogm32.exeC:\Windows\system32\Hajogm32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2936 -
C:\Windows\SysWOW64\Hhdgdg32.exeC:\Windows\system32\Hhdgdg32.exe77⤵
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\Honpqaff.exeC:\Windows\system32\Honpqaff.exe78⤵PID:1064
-
C:\Windows\SysWOW64\Hdkhihdn.exeC:\Windows\system32\Hdkhihdn.exe79⤵PID:2376
-
C:\Windows\SysWOW64\Hhgdig32.exeC:\Windows\system32\Hhgdig32.exe80⤵PID:1096
-
C:\Windows\SysWOW64\Hqbini32.exeC:\Windows\system32\Hqbini32.exe81⤵
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\Hkgmkbih.exeC:\Windows\system32\Hkgmkbih.exe82⤵PID:1864
-
C:\Windows\SysWOW64\Hqdeciho.exeC:\Windows\system32\Hqdeciho.exe83⤵PID:1104
-
C:\Windows\SysWOW64\Hcbapdgc.exeC:\Windows\system32\Hcbapdgc.exe84⤵PID:2360
-
C:\Windows\SysWOW64\Imkfhj32.exeC:\Windows\system32\Imkfhj32.exe85⤵PID:2560
-
C:\Windows\SysWOW64\Ioibde32.exeC:\Windows\system32\Ioibde32.exe86⤵PID:2924
-
C:\Windows\SysWOW64\Igqjfb32.exeC:\Windows\system32\Igqjfb32.exe87⤵
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Iibgmk32.exeC:\Windows\system32\Iibgmk32.exe88⤵PID:2856
-
C:\Windows\SysWOW64\Iolojejd.exeC:\Windows\system32\Iolojejd.exe89⤵PID:312
-
C:\Windows\SysWOW64\Iffggo32.exeC:\Windows\system32\Iffggo32.exe90⤵PID:1544
-
C:\Windows\SysWOW64\Imppciin.exeC:\Windows\system32\Imppciin.exe91⤵
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\Fpninl32.exeC:\Windows\system32\Fpninl32.exe92⤵PID:3044
-
C:\Windows\SysWOW64\Ffhajfga.exeC:\Windows\system32\Ffhajfga.exe93⤵
- Drops file in System32 directory
PID:2556 -
C:\Windows\SysWOW64\Efdjhocj.exeC:\Windows\system32\Efdjhocj.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1508 -
C:\Windows\SysWOW64\Iiddoo32.exeC:\Windows\system32\Iiddoo32.exe95⤵PID:2716
-
C:\Windows\SysWOW64\Ilcqkj32.exeC:\Windows\system32\Ilcqkj32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2780 -
C:\Windows\SysWOW64\Ibmigdnp.exeC:\Windows\system32\Ibmigdnp.exe97⤵
- Drops file in System32 directory
PID:2536 -
C:\Windows\SysWOW64\Iapica32.exeC:\Windows\system32\Iapica32.exe98⤵PID:1188
-
C:\Windows\SysWOW64\Jhjapklh.exeC:\Windows\system32\Jhjapklh.exe99⤵PID:1660
-
C:\Windows\SysWOW64\Jnfjhbjo.exeC:\Windows\system32\Jnfjhbjo.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2040 -
C:\Windows\SysWOW64\Jenbioka.exeC:\Windows\system32\Jenbioka.exe101⤵PID:2368
-
C:\Windows\SysWOW64\Jhlnek32.exeC:\Windows\system32\Jhlnek32.exe102⤵
- Drops file in System32 directory
PID:884 -
C:\Windows\SysWOW64\Joffbeab.exeC:\Windows\system32\Joffbeab.exe103⤵PID:328
-
C:\Windows\SysWOW64\Jadbnqpe.exeC:\Windows\system32\Jadbnqpe.exe104⤵PID:1892
-
C:\Windows\SysWOW64\Jhnkkj32.exeC:\Windows\system32\Jhnkkj32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2704 -
C:\Windows\SysWOW64\Jkmggf32.exeC:\Windows\system32\Jkmggf32.exe106⤵
- Drops file in System32 directory
PID:936 -
C:\Windows\SysWOW64\Jnkcca32.exeC:\Windows\system32\Jnkcca32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1592 -
C:\Windows\SysWOW64\Jagocpnc.exeC:\Windows\system32\Jagocpnc.exe108⤵PID:2848
-
C:\Windows\SysWOW64\Jchlkh32.exeC:\Windows\system32\Jchlkh32.exe109⤵PID:2204
-
C:\Windows\SysWOW64\Jkodleec.exeC:\Windows\system32\Jkodleec.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1564 -
C:\Windows\SysWOW64\Jlqpdn32.exeC:\Windows\system32\Jlqpdn32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1440 -
C:\Windows\SysWOW64\Jdghek32.exeC:\Windows\system32\Jdghek32.exe112⤵PID:2176
-
C:\Windows\SysWOW64\Jcjhahbo.exeC:\Windows\system32\Jcjhahbo.exe113⤵PID:576
-
C:\Windows\SysWOW64\Jfiemcab.exeC:\Windows\system32\Jfiemcab.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3024 -
C:\Windows\SysWOW64\Jjdanb32.exeC:\Windows\system32\Jjdanb32.exe115⤵
- Drops file in System32 directory
PID:2320 -
C:\Windows\SysWOW64\Koaifi32.exeC:\Windows\system32\Koaifi32.exe116⤵PID:1612
-
C:\Windows\SysWOW64\Kfkabcop.exeC:\Windows\system32\Kfkabcop.exe117⤵
- Modifies registry class
PID:2940 -
C:\Windows\SysWOW64\Khinoo32.exeC:\Windows\system32\Khinoo32.exe118⤵PID:2000
-
C:\Windows\SysWOW64\Kcoblg32.exeC:\Windows\system32\Kcoblg32.exe119⤵PID:2324
-
C:\Windows\SysWOW64\Kdbkiobe.exeC:\Windows\system32\Kdbkiobe.exe120⤵PID:2916
-
C:\Windows\SysWOW64\Khngjn32.exeC:\Windows\system32\Khngjn32.exe121⤵PID:2152
-
C:\Windows\SysWOW64\Kkmcfiia.exeC:\Windows\system32\Kkmcfiia.exe122⤵
- Drops file in System32 directory
PID:2720
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-