Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
13-05-2021 12:59
Static task
static1
Behavioral task
behavioral1
Sample
05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe
-
Size
1.2MB
-
MD5
c626d944e1d25b4d894721ecc151e2fb
-
SHA1
c6ea49b7dae407c17cb8781323073e5d58eba328
-
SHA256
05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4
-
SHA512
32fae6194d4673aa423c2fa7a1dce562642bb14ecb9541191dd682346c1f86480b9cf1fa1d10edfc4eaba290502ddb5753750c82083a624736fd1695a0562c93
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs
-
Executes dropped EXE 64 IoCs
Processes:
Mplhpngd.exeMifinclb.exeMemjcd32.exeNohkai32.exeNgcpfl32.exeOpbkppch.exePojqepii.exePolmko32.exeAfholl32.exeBjfgbkeb.exeCoapampg.exeCmglbi32.exeEcjgkboi.exeEfmmbm32.exeFbigbm32.exeFdjpch32.exeIbbbfbic.exeIoickc32.exeIokpqcmd.exeJpafcknn.exeJkfjqcnc.exeJlhfhl32.exeJcaoefko.exeJepkaakb.exeJljcnl32.exeJcdkke32.exeJjncgpai.exeJphldj32.exeKaihlbnd.exeKkamdh32.exeKfgabqdj.exeKkdjjgba.exeKbnbga32.exeKhhjclak.exeKndblbpb.exeKhjgik32.exeKjkcqceg.exeKqekmn32.exeKjnpfccd.exeLqhhcm32.exeLjpmlc32.exeLfgmqdgf.exeLmaenn32.exeLbnnfe32.exeLmcbcnlp.exeLcmkph32.exeLenggpjk.exeLpdkeiia.exeLfncac32.exeMgopik32.exeMbedfd32.exeMgamok32.exeMajagpkj.exeMlpeei32.exeMmqblaan.exeMjdbfeph.exeMpaknlno.exeMjgoke32.exeMaaghoeb.exeNjilae32.exeNlkhimaq.exeNbdqeg32.exeNioiba32.exeNphaokhg.exepid process 2020 Mplhpngd.exe 900 Mifinclb.exe 1780 Memjcd32.exe 1784 Nohkai32.exe 1704 Ngcpfl32.exe 1308 Opbkppch.exe 1168 Pojqepii.exe 608 Polmko32.exe 1556 Afholl32.exe 676 Bjfgbkeb.exe 1604 Coapampg.exe 1512 Cmglbi32.exe 752 Ecjgkboi.exe 1768 Efmmbm32.exe 1216 Fbigbm32.exe 1792 Fdjpch32.exe 1316 Ibbbfbic.exe 1520 Ioickc32.exe 2028 Iokpqcmd.exe 1292 Jpafcknn.exe 1800 Jkfjqcnc.exe 1752 Jlhfhl32.exe 784 Jcaoefko.exe 932 Jepkaakb.exe 1352 Jljcnl32.exe 1448 Jcdkke32.exe 1608 Jjncgpai.exe 316 Jphldj32.exe 240 Kaihlbnd.exe 616 Kkamdh32.exe 572 Kfgabqdj.exe 1956 Kkdjjgba.exe 432 Kbnbga32.exe 920 Khhjclak.exe 1196 Kndblbpb.exe 664 Khjgik32.exe 860 Kjkcqceg.exe 1064 Kqekmn32.exe 1796 Kjnpfccd.exe 1164 Lqhhcm32.exe 1624 Ljpmlc32.exe 1712 Lfgmqdgf.exe 1244 Lmaenn32.exe 1572 Lbnnfe32.exe 904 Lmcbcnlp.exe 1620 Lcmkph32.exe 1588 Lenggpjk.exe 1612 Lpdkeiia.exe 1224 Lfncac32.exe 412 Mgopik32.exe 1952 Mbedfd32.exe 1248 Mgamok32.exe 2060 Majagpkj.exe 2072 Mlpeei32.exe 2084 Mmqblaan.exe 2096 Mjdbfeph.exe 2108 Mpaknlno.exe 2120 Mjgoke32.exe 2132 Maaghoeb.exe 2144 Njilae32.exe 2156 Nlkhimaq.exe 2168 Nbdqeg32.exe 2180 Nioiba32.exe 2192 Nphaokhg.exe -
Loads dropped DLL 64 IoCs
Processes:
05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exeMplhpngd.exeMifinclb.exeMemjcd32.exeNohkai32.exeNgcpfl32.exeOpbkppch.exePojqepii.exePolmko32.exeAfholl32.exeBjfgbkeb.exeCoapampg.exeCmglbi32.exeEcjgkboi.exeEfmmbm32.exeFbigbm32.exeFdjpch32.exeIbbbfbic.exeIoickc32.exeIokpqcmd.exeJpafcknn.exeJkfjqcnc.exeJlhfhl32.exeJcaoefko.exeJepkaakb.exeJljcnl32.exeJcdkke32.exeJjncgpai.exeJphldj32.exeKaihlbnd.exeKkamdh32.exeKfgabqdj.exepid process 1756 05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe 1756 05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe 2020 Mplhpngd.exe 2020 Mplhpngd.exe 900 Mifinclb.exe 900 Mifinclb.exe 1780 Memjcd32.exe 1780 Memjcd32.exe 1784 Nohkai32.exe 1784 Nohkai32.exe 1704 Ngcpfl32.exe 1704 Ngcpfl32.exe 1308 Opbkppch.exe 1308 Opbkppch.exe 1168 Pojqepii.exe 1168 Pojqepii.exe 608 Polmko32.exe 608 Polmko32.exe 1556 Afholl32.exe 1556 Afholl32.exe 676 Bjfgbkeb.exe 676 Bjfgbkeb.exe 1604 Coapampg.exe 1604 Coapampg.exe 1512 Cmglbi32.exe 1512 Cmglbi32.exe 752 Ecjgkboi.exe 752 Ecjgkboi.exe 1768 Efmmbm32.exe 1768 Efmmbm32.exe 1216 Fbigbm32.exe 1216 Fbigbm32.exe 1792 Fdjpch32.exe 1792 Fdjpch32.exe 1316 Ibbbfbic.exe 1316 Ibbbfbic.exe 1520 Ioickc32.exe 1520 Ioickc32.exe 2028 Iokpqcmd.exe 2028 Iokpqcmd.exe 1292 Jpafcknn.exe 1292 Jpafcknn.exe 1800 Jkfjqcnc.exe 1800 Jkfjqcnc.exe 1752 Jlhfhl32.exe 1752 Jlhfhl32.exe 784 Jcaoefko.exe 784 Jcaoefko.exe 932 Jepkaakb.exe 932 Jepkaakb.exe 1352 Jljcnl32.exe 1352 Jljcnl32.exe 1448 Jcdkke32.exe 1448 Jcdkke32.exe 1608 Jjncgpai.exe 1608 Jjncgpai.exe 316 Jphldj32.exe 316 Jphldj32.exe 240 Kaihlbnd.exe 240 Kaihlbnd.exe 616 Kkamdh32.exe 616 Kkamdh32.exe 572 Kfgabqdj.exe 572 Kfgabqdj.exe -
Drops file in System32 directory 64 IoCs
Processes:
Jpnbce32.exeDjnncoqn.exeLllehhol.exeJckjpkha.exeNpicgd32.exeJdbdbh32.exeAibbhmhp.exeNqcffg32.exeOpknep32.exeOqnbpe32.exeLpdkeiia.exeBgacmlff.exeEdipbdco.exeMjbhin32.exeCmebfbne.exeGclfcb32.exeLndjihff.exeOdfhme32.exeHdagel32.exedescription ioc process File created C:\Windows\SysWOW64\Mlmimj32.exe File created C:\Windows\SysWOW64\Gjkdpc32.dll File created C:\Windows\SysWOW64\Jaookmbb.exe Jpnbce32.exe File created C:\Windows\SysWOW64\Gqdedhiq.exe File created C:\Windows\SysWOW64\Mhlgge32.dll File created C:\Windows\SysWOW64\Ifdiijpe.exe File created C:\Windows\SysWOW64\Baclfp32.dll Djnncoqn.exe File created C:\Windows\SysWOW64\Ofchcfbm.dll File created C:\Windows\SysWOW64\Ickmbjkb.dll Lllehhol.exe File created C:\Windows\SysWOW64\Ifgnch32.exe File created C:\Windows\SysWOW64\Fhfcdjng.dll File created C:\Windows\SysWOW64\Pjmlkf32.exe File created C:\Windows\SysWOW64\Dnoldh32.exe File created C:\Windows\SysWOW64\Alqkcl32.dll File created C:\Windows\SysWOW64\Elgpfqll.dll File opened for modification C:\Windows\SysWOW64\Jjebmeon.exe Jckjpkha.exe File created C:\Windows\SysWOW64\Kppkdb32.dll File opened for modification C:\Windows\SysWOW64\Nfckdngh.exe Npicgd32.exe File opened for modification C:\Windows\SysWOW64\Jgqqnc32.exe Jdbdbh32.exe File created C:\Windows\SysWOW64\Ibinbc32.exe File created C:\Windows\SysWOW64\Ihliiihg.exe File opened for modification C:\Windows\SysWOW64\Anelnaon.exe File opened for modification C:\Windows\SysWOW64\Aplkeg32.exe Aibbhmhp.exe File created C:\Windows\SysWOW64\Ndkmpe32.exe File opened for modification C:\Windows\SysWOW64\Nbecnpqa.exe Nqcffg32.exe File created C:\Windows\SysWOW64\Klhdhq32.dll Opknep32.exe File created C:\Windows\SysWOW64\Mifipp32.exe File created C:\Windows\SysWOW64\Aekodi32.exe File created C:\Windows\SysWOW64\Oboogmcf.exe Oqnbpe32.exe File created C:\Windows\SysWOW64\Kagdplnm.dll File opened for modification C:\Windows\SysWOW64\Inljnfkg.exe File created C:\Windows\SysWOW64\Qjnkaf32.exe File opened for modification C:\Windows\SysWOW64\Hnallpqn.exe File opened for modification C:\Windows\SysWOW64\Cogfoh32.exe File created C:\Windows\SysWOW64\Npdjje32.exe File created C:\Windows\SysWOW64\Olmlqqnl.dll File created C:\Windows\SysWOW64\Pmbopgho.dll File created C:\Windows\SysWOW64\Dcboojpe.dll File created C:\Windows\SysWOW64\Amaipodm.dll File opened for modification C:\Windows\SysWOW64\Lfncac32.exe Lpdkeiia.exe File created C:\Windows\SysWOW64\Bohknj32.exe Bgacmlff.exe File created C:\Windows\SysWOW64\Kcacch32.dll File opened for modification C:\Windows\SysWOW64\Elphcbda.exe Edipbdco.exe File created C:\Windows\SysWOW64\Jhdlmppa.dll Mjbhin32.exe File created C:\Windows\SysWOW64\Gnkgdibo.exe File opened for modification C:\Windows\SysWOW64\Ghfbqn32.exe File created C:\Windows\SysWOW64\Pgioaa32.exe File created C:\Windows\SysWOW64\Cpcnbnmi.exe Cmebfbne.exe File created C:\Windows\SysWOW64\Pkgkniqk.exe File created C:\Windows\SysWOW64\Jocfeapb.dll Gclfcb32.exe File created C:\Windows\SysWOW64\Qadndonl.dll File created C:\Windows\SysWOW64\Bmkmdk32.exe File created C:\Windows\SysWOW64\Dhhlgc32.dll File opened for modification C:\Windows\SysWOW64\Nngfbh32.exe File created C:\Windows\SysWOW64\Mincpk32.dll File created C:\Windows\SysWOW64\Hpcjmp32.exe File created C:\Windows\SysWOW64\Lcabaodn.exe Lndjihff.exe File opened for modification C:\Windows\SysWOW64\Ahakmf32.exe File created C:\Windows\SysWOW64\Ilncom32.exe File created C:\Windows\SysWOW64\Nckamf32.dll Odfhme32.exe File created C:\Windows\SysWOW64\Dmlobcco.dll File created C:\Windows\SysWOW64\Ohefphnk.dll File created C:\Windows\SysWOW64\Lchnnp32.exe File created C:\Windows\SysWOW64\Eglpjagp.dll Hdagel32.exe -
Modifies registry class 64 IoCs
Processes:
Njonoc32.exeKfgabqdj.exeCoapampg.exeFpoflb32.exeAdhmplka.exeIndggpni.exeCcmpfeoi.exePgmadf32.exeKhjgik32.exeIeejffke.exeHgkjfh32.exeJmcnianb.exeOnehbh32.exeGpaejk32.exeHcljed32.exeEgalij32.exeBfpinmgl.exeDickdkef.exeHhlocj32.exeJjncgpai.exeIbnkcldl.exeQajbld32.exeAgojhiem.exeJfnmnmkl.exePapkdh32.exeJoljogno.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Njonoc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kfgabqdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpqkme32.dll" Coapampg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnmlje32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Boqlhfld.dll" Fpoflb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Adhmplka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Indggpni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mojmmm32.dll" Ccmpfeoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edhdmnec.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pgmadf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifflf32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekjajfei.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmaomd32.dll" Khjgik32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ieejffke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hgkjfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jmcnianb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knlafm32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fqhicn32.dll" Onehbh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngbkba32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfmmplkg.dll" Gpaejk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eddgkc32.dll" Hcljed32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Egalij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdipem32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhhigbaf.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpmhmhgh.dll" Bfpinmgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dickdkef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hhlocj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jjncgpai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odldpj32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkjipjdn.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nohjjg32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ibnkcldl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdbmio32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qajbld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Agojhiem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jfnmnmkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Papkdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijelbkal.dll" Joljogno.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exeMplhpngd.exeMifinclb.exeMemjcd32.exeNohkai32.exeNgcpfl32.exeOpbkppch.exePojqepii.exePolmko32.exeAfholl32.exeBjfgbkeb.exeCoapampg.exeCmglbi32.exeEcjgkboi.exeEfmmbm32.exeFbigbm32.exedescription pid process target process PID 1756 wrote to memory of 2020 1756 05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe Mplhpngd.exe PID 1756 wrote to memory of 2020 1756 05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe Mplhpngd.exe PID 1756 wrote to memory of 2020 1756 05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe Mplhpngd.exe PID 1756 wrote to memory of 2020 1756 05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe Mplhpngd.exe PID 2020 wrote to memory of 900 2020 Mplhpngd.exe Mifinclb.exe PID 2020 wrote to memory of 900 2020 Mplhpngd.exe Mifinclb.exe PID 2020 wrote to memory of 900 2020 Mplhpngd.exe Mifinclb.exe PID 2020 wrote to memory of 900 2020 Mplhpngd.exe Mifinclb.exe PID 900 wrote to memory of 1780 900 Mifinclb.exe Memjcd32.exe PID 900 wrote to memory of 1780 900 Mifinclb.exe Memjcd32.exe PID 900 wrote to memory of 1780 900 Mifinclb.exe Memjcd32.exe PID 900 wrote to memory of 1780 900 Mifinclb.exe Memjcd32.exe PID 1780 wrote to memory of 1784 1780 Memjcd32.exe Nohkai32.exe PID 1780 wrote to memory of 1784 1780 Memjcd32.exe Nohkai32.exe PID 1780 wrote to memory of 1784 1780 Memjcd32.exe Nohkai32.exe PID 1780 wrote to memory of 1784 1780 Memjcd32.exe Nohkai32.exe PID 1784 wrote to memory of 1704 1784 Nohkai32.exe Ngcpfl32.exe PID 1784 wrote to memory of 1704 1784 Nohkai32.exe Ngcpfl32.exe PID 1784 wrote to memory of 1704 1784 Nohkai32.exe Ngcpfl32.exe PID 1784 wrote to memory of 1704 1784 Nohkai32.exe Ngcpfl32.exe PID 1704 wrote to memory of 1308 1704 Ngcpfl32.exe Opbkppch.exe PID 1704 wrote to memory of 1308 1704 Ngcpfl32.exe Opbkppch.exe PID 1704 wrote to memory of 1308 1704 Ngcpfl32.exe Opbkppch.exe PID 1704 wrote to memory of 1308 1704 Ngcpfl32.exe Opbkppch.exe PID 1308 wrote to memory of 1168 1308 Opbkppch.exe Pojqepii.exe PID 1308 wrote to memory of 1168 1308 Opbkppch.exe Pojqepii.exe PID 1308 wrote to memory of 1168 1308 Opbkppch.exe Pojqepii.exe PID 1308 wrote to memory of 1168 1308 Opbkppch.exe Pojqepii.exe PID 1168 wrote to memory of 608 1168 Pojqepii.exe Polmko32.exe PID 1168 wrote to memory of 608 1168 Pojqepii.exe Polmko32.exe PID 1168 wrote to memory of 608 1168 Pojqepii.exe Polmko32.exe PID 1168 wrote to memory of 608 1168 Pojqepii.exe Polmko32.exe PID 608 wrote to memory of 1556 608 Polmko32.exe Afholl32.exe PID 608 wrote to memory of 1556 608 Polmko32.exe Afholl32.exe PID 608 wrote to memory of 1556 608 Polmko32.exe Afholl32.exe PID 608 wrote to memory of 1556 608 Polmko32.exe Afholl32.exe PID 1556 wrote to memory of 676 1556 Afholl32.exe Bjfgbkeb.exe PID 1556 wrote to memory of 676 1556 Afholl32.exe Bjfgbkeb.exe PID 1556 wrote to memory of 676 1556 Afholl32.exe Bjfgbkeb.exe PID 1556 wrote to memory of 676 1556 Afholl32.exe Bjfgbkeb.exe PID 676 wrote to memory of 1604 676 Bjfgbkeb.exe Coapampg.exe PID 676 wrote to memory of 1604 676 Bjfgbkeb.exe Coapampg.exe PID 676 wrote to memory of 1604 676 Bjfgbkeb.exe Coapampg.exe PID 676 wrote to memory of 1604 676 Bjfgbkeb.exe Coapampg.exe PID 1604 wrote to memory of 1512 1604 Coapampg.exe Cmglbi32.exe PID 1604 wrote to memory of 1512 1604 Coapampg.exe Cmglbi32.exe PID 1604 wrote to memory of 1512 1604 Coapampg.exe Cmglbi32.exe PID 1604 wrote to memory of 1512 1604 Coapampg.exe Cmglbi32.exe PID 1512 wrote to memory of 752 1512 Cmglbi32.exe Ecjgkboi.exe PID 1512 wrote to memory of 752 1512 Cmglbi32.exe Ecjgkboi.exe PID 1512 wrote to memory of 752 1512 Cmglbi32.exe Ecjgkboi.exe PID 1512 wrote to memory of 752 1512 Cmglbi32.exe Ecjgkboi.exe PID 752 wrote to memory of 1768 752 Ecjgkboi.exe Efmmbm32.exe PID 752 wrote to memory of 1768 752 Ecjgkboi.exe Efmmbm32.exe PID 752 wrote to memory of 1768 752 Ecjgkboi.exe Efmmbm32.exe PID 752 wrote to memory of 1768 752 Ecjgkboi.exe Efmmbm32.exe PID 1768 wrote to memory of 1216 1768 Efmmbm32.exe Fbigbm32.exe PID 1768 wrote to memory of 1216 1768 Efmmbm32.exe Fbigbm32.exe PID 1768 wrote to memory of 1216 1768 Efmmbm32.exe Fbigbm32.exe PID 1768 wrote to memory of 1216 1768 Efmmbm32.exe Fbigbm32.exe PID 1216 wrote to memory of 1792 1216 Fbigbm32.exe Fdjpch32.exe PID 1216 wrote to memory of 1792 1216 Fbigbm32.exe Fdjpch32.exe PID 1216 wrote to memory of 1792 1216 Fbigbm32.exe Fdjpch32.exe PID 1216 wrote to memory of 1792 1216 Fbigbm32.exe Fdjpch32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe"C:\Users\Admin\AppData\Local\Temp\05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\Mplhpngd.exeC:\Windows\system32\Mplhpngd.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\Mifinclb.exeC:\Windows\system32\Mifinclb.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\Memjcd32.exeC:\Windows\system32\Memjcd32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\Nohkai32.exeC:\Windows\system32\Nohkai32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\Ngcpfl32.exeC:\Windows\system32\Ngcpfl32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\Opbkppch.exeC:\Windows\system32\Opbkppch.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\Pojqepii.exeC:\Windows\system32\Pojqepii.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\Polmko32.exeC:\Windows\system32\Polmko32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\Afholl32.exeC:\Windows\system32\Afholl32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\Bjfgbkeb.exeC:\Windows\system32\Bjfgbkeb.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\Coapampg.exeC:\Windows\system32\Coapampg.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\Cmglbi32.exeC:\Windows\system32\Cmglbi32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\Ecjgkboi.exeC:\Windows\system32\Ecjgkboi.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\Efmmbm32.exeC:\Windows\system32\Efmmbm32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\Fbigbm32.exeC:\Windows\system32\Fbigbm32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\Fdjpch32.exeC:\Windows\system32\Fdjpch32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1792 -
C:\Windows\SysWOW64\Ibbbfbic.exeC:\Windows\system32\Ibbbfbic.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1316 -
C:\Windows\SysWOW64\Ioickc32.exeC:\Windows\system32\Ioickc32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1520 -
C:\Windows\SysWOW64\Iokpqcmd.exeC:\Windows\system32\Iokpqcmd.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028 -
C:\Windows\SysWOW64\Jpafcknn.exeC:\Windows\system32\Jpafcknn.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1292 -
C:\Windows\SysWOW64\Jkfjqcnc.exeC:\Windows\system32\Jkfjqcnc.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800 -
C:\Windows\SysWOW64\Jlhfhl32.exeC:\Windows\system32\Jlhfhl32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1752 -
C:\Windows\SysWOW64\Jcaoefko.exeC:\Windows\system32\Jcaoefko.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:784 -
C:\Windows\SysWOW64\Jepkaakb.exeC:\Windows\system32\Jepkaakb.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:932 -
C:\Windows\SysWOW64\Jljcnl32.exeC:\Windows\system32\Jljcnl32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1352 -
C:\Windows\SysWOW64\Jcdkke32.exeC:\Windows\system32\Jcdkke32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448 -
C:\Windows\SysWOW64\Jjncgpai.exeC:\Windows\system32\Jjncgpai.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Jphldj32.exeC:\Windows\system32\Jphldj32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:316 -
C:\Windows\SysWOW64\Kaihlbnd.exeC:\Windows\system32\Kaihlbnd.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:240 -
C:\Windows\SysWOW64\Kkamdh32.exeC:\Windows\system32\Kkamdh32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:616 -
C:\Windows\SysWOW64\Kfgabqdj.exeC:\Windows\system32\Kfgabqdj.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:572 -
C:\Windows\SysWOW64\Kkdjjgba.exeC:\Windows\system32\Kkdjjgba.exe33⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\Kbnbga32.exeC:\Windows\system32\Kbnbga32.exe34⤵
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\Khhjclak.exeC:\Windows\system32\Khhjclak.exe35⤵
- Executes dropped EXE
PID:920 -
C:\Windows\SysWOW64\Kndblbpb.exeC:\Windows\system32\Kndblbpb.exe36⤵
- Executes dropped EXE
PID:1196 -
C:\Windows\SysWOW64\Khjgik32.exeC:\Windows\system32\Khjgik32.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:664 -
C:\Windows\SysWOW64\Kjkcqceg.exeC:\Windows\system32\Kjkcqceg.exe38⤵
- Executes dropped EXE
PID:860 -
C:\Windows\SysWOW64\Kqekmn32.exeC:\Windows\system32\Kqekmn32.exe39⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\Kjnpfccd.exeC:\Windows\system32\Kjnpfccd.exe40⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\Lqhhcm32.exeC:\Windows\system32\Lqhhcm32.exe41⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\SysWOW64\Ljpmlc32.exeC:\Windows\system32\Ljpmlc32.exe42⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Lfgmqdgf.exeC:\Windows\system32\Lfgmqdgf.exe43⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\Lmaenn32.exeC:\Windows\system32\Lmaenn32.exe44⤵
- Executes dropped EXE
PID:1244 -
C:\Windows\SysWOW64\Lbnnfe32.exeC:\Windows\system32\Lbnnfe32.exe45⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\SysWOW64\Lmcbcnlp.exeC:\Windows\system32\Lmcbcnlp.exe46⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\Lcmkph32.exeC:\Windows\system32\Lcmkph32.exe47⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Lenggpjk.exeC:\Windows\system32\Lenggpjk.exe48⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\Lpdkeiia.exeC:\Windows\system32\Lpdkeiia.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1612 -
C:\Windows\SysWOW64\Lfncac32.exeC:\Windows\system32\Lfncac32.exe50⤵
- Executes dropped EXE
PID:1224 -
C:\Windows\SysWOW64\Mgopik32.exeC:\Windows\system32\Mgopik32.exe51⤵
- Executes dropped EXE
PID:412 -
C:\Windows\SysWOW64\Mbedfd32.exeC:\Windows\system32\Mbedfd32.exe52⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Mgamok32.exeC:\Windows\system32\Mgamok32.exe53⤵
- Executes dropped EXE
PID:1248 -
C:\Windows\SysWOW64\Majagpkj.exeC:\Windows\system32\Majagpkj.exe54⤵
- Executes dropped EXE
PID:2060 -
C:\Windows\SysWOW64\Mlpeei32.exeC:\Windows\system32\Mlpeei32.exe55⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\Mmqblaan.exeC:\Windows\system32\Mmqblaan.exe56⤵
- Executes dropped EXE
PID:2084 -
C:\Windows\SysWOW64\Mjdbfeph.exeC:\Windows\system32\Mjdbfeph.exe57⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\SysWOW64\Mpaknlno.exeC:\Windows\system32\Mpaknlno.exe58⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\Mjgoke32.exeC:\Windows\system32\Mjgoke32.exe59⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\Maaghoeb.exeC:\Windows\system32\Maaghoeb.exe60⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\Njilae32.exeC:\Windows\system32\Njilae32.exe61⤵
- Executes dropped EXE
PID:2144 -
C:\Windows\SysWOW64\Nlkhimaq.exeC:\Windows\system32\Nlkhimaq.exe62⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\Nbdqeg32.exeC:\Windows\system32\Nbdqeg32.exe63⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\Nioiba32.exeC:\Windows\system32\Nioiba32.exe64⤵
- Executes dropped EXE
PID:2180 -
C:\Windows\SysWOW64\Nphaokhg.exeC:\Windows\system32\Nphaokhg.exe65⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\Nbgmkggk.exeC:\Windows\system32\Nbgmkggk.exe66⤵PID:2204
-
C:\Windows\SysWOW64\Niaeha32.exeC:\Windows\system32\Niaeha32.exe67⤵PID:2212
-
C:\Windows\SysWOW64\Nloadl32.exeC:\Windows\system32\Nloadl32.exe68⤵PID:2224
-
C:\Windows\SysWOW64\Nbijqfeh.exeC:\Windows\system32\Nbijqfeh.exe69⤵PID:2232
-
C:\Windows\SysWOW64\Nicbmq32.exeC:\Windows\system32\Nicbmq32.exe70⤵PID:2240
-
C:\Windows\SysWOW64\Nlanillh.exeC:\Windows\system32\Nlanillh.exe71⤵PID:2248
-
C:\Windows\SysWOW64\Nangacjp.exeC:\Windows\system32\Nangacjp.exe72⤵PID:2256
-
C:\Windows\SysWOW64\Ndmcnnic.exeC:\Windows\system32\Ndmcnnic.exe73⤵PID:2264
-
C:\Windows\SysWOW64\Okgkjh32.exeC:\Windows\system32\Okgkjh32.exe74⤵PID:2272
-
C:\Windows\SysWOW64\Oaqcgbhm.exeC:\Windows\system32\Oaqcgbhm.exe75⤵PID:2280
-
C:\Windows\SysWOW64\Ohkldm32.exeC:\Windows\system32\Ohkldm32.exe76⤵PID:2288
-
C:\Windows\SysWOW64\Okihph32.exeC:\Windows\system32\Okihph32.exe77⤵PID:2296
-
C:\Windows\SysWOW64\Oacpmb32.exeC:\Windows\system32\Oacpmb32.exe78⤵PID:2304
-
C:\Windows\SysWOW64\Ohmhilmg.exeC:\Windows\system32\Ohmhilmg.exe79⤵PID:2312
-
C:\Windows\SysWOW64\Omjaacko.exeC:\Windows\system32\Omjaacko.exe80⤵PID:2320
-
C:\Windows\SysWOW64\Ocgijjjf.exeC:\Windows\system32\Ocgijjjf.exe81⤵PID:2328
-
C:\Windows\SysWOW64\Oiqafd32.exeC:\Windows\system32\Oiqafd32.exe82⤵PID:2336
-
C:\Windows\SysWOW64\Opkjcn32.exeC:\Windows\system32\Opkjcn32.exe83⤵PID:2344
-
C:\Windows\SysWOW64\Ogdbphpm.exeC:\Windows\system32\Ogdbphpm.exe84⤵PID:2352
-
C:\Windows\SysWOW64\Oicnldop.exeC:\Windows\system32\Oicnldop.exe85⤵PID:2360
-
C:\Windows\SysWOW64\Opmgin32.exeC:\Windows\system32\Opmgin32.exe86⤵PID:2368
-
C:\Windows\SysWOW64\Pggoehnj.exeC:\Windows\system32\Pggoehnj.exe87⤵PID:2376
-
C:\Windows\SysWOW64\Phhkmp32.exeC:\Windows\system32\Phhkmp32.exe88⤵PID:2384
-
C:\Windows\SysWOW64\Pobcjj32.exeC:\Windows\system32\Pobcjj32.exe89⤵PID:2392
-
C:\Windows\SysWOW64\Pellgdbb.exeC:\Windows\system32\Pellgdbb.exe90⤵PID:2400
-
C:\Windows\SysWOW64\Phjhcpbe.exeC:\Windows\system32\Phjhcpbe.exe91⤵PID:2408
-
C:\Windows\SysWOW64\Podppj32.exeC:\Windows\system32\Podppj32.exe92⤵PID:2416
-
C:\Windows\SysWOW64\Plhqin32.exeC:\Windows\system32\Plhqin32.exe93⤵PID:2424
-
C:\Windows\SysWOW64\Pnjmqf32.exeC:\Windows\system32\Pnjmqf32.exe94⤵PID:2432
-
C:\Windows\SysWOW64\Peaebd32.exeC:\Windows\system32\Peaebd32.exe95⤵PID:2440
-
C:\Windows\SysWOW64\Poijkiem.exeC:\Windows\system32\Poijkiem.exe96⤵PID:2448
-
C:\Windows\SysWOW64\Pdfbcpcd.exeC:\Windows\system32\Pdfbcpcd.exe97⤵PID:2456
-
C:\Windows\SysWOW64\Pjckkgal.exeC:\Windows\system32\Pjckkgal.exe98⤵PID:2464
-
C:\Windows\SysWOW64\Qajbld32.exeC:\Windows\system32\Qajbld32.exe99⤵
- Modifies registry class
PID:2472 -
C:\Windows\SysWOW64\Qdhohp32.exeC:\Windows\system32\Qdhohp32.exe100⤵PID:2480
-
C:\Windows\SysWOW64\Qkbgejio.exeC:\Windows\system32\Qkbgejio.exe101⤵PID:2488
-
C:\Windows\SysWOW64\Qnqcaehb.exeC:\Windows\system32\Qnqcaehb.exe102⤵PID:2496
-
C:\Windows\SysWOW64\Qdklnp32.exeC:\Windows\system32\Qdklnp32.exe103⤵PID:2504
-
C:\Windows\SysWOW64\Qgihjk32.exeC:\Windows\system32\Qgihjk32.exe104⤵PID:2512
-
C:\Windows\SysWOW64\Ancpgefp.exeC:\Windows\system32\Ancpgefp.exe105⤵PID:2520
-
C:\Windows\SysWOW64\Aqalcqec.exeC:\Windows\system32\Aqalcqec.exe106⤵PID:2528
-
C:\Windows\SysWOW64\Agkdpklp.exeC:\Windows\system32\Agkdpklp.exe107⤵PID:2536
-
C:\Windows\SysWOW64\Aimagc32.exeC:\Windows\system32\Aimagc32.exe108⤵PID:2544
-
C:\Windows\SysWOW64\Acbedl32.exeC:\Windows\system32\Acbedl32.exe109⤵PID:2552
-
C:\Windows\SysWOW64\Ajlnafia.exeC:\Windows\system32\Ajlnafia.exe110⤵PID:2560
-
C:\Windows\SysWOW64\Akmjin32.exeC:\Windows\system32\Akmjin32.exe111⤵PID:2568
-
C:\Windows\SysWOW64\Abgbfh32.exeC:\Windows\system32\Abgbfh32.exe112⤵PID:2576
-
C:\Windows\SysWOW64\Aefobc32.exeC:\Windows\system32\Aefobc32.exe113⤵PID:2584
-
C:\Windows\SysWOW64\Ammfca32.exeC:\Windows\system32\Ammfca32.exe114⤵PID:2592
-
C:\Windows\SysWOW64\Aokbol32.exeC:\Windows\system32\Aokbol32.exe115⤵PID:2600
-
C:\Windows\SysWOW64\Afeklfmb.exeC:\Windows\system32\Afeklfmb.exe116⤵PID:2608
-
C:\Windows\SysWOW64\Agfgco32.exeC:\Windows\system32\Agfgco32.exe117⤵PID:2616
-
C:\Windows\SysWOW64\Aonoel32.exeC:\Windows\system32\Aonoel32.exe118⤵PID:2624
-
C:\Windows\SysWOW64\Baolldia.exeC:\Windows\system32\Baolldia.exe119⤵PID:2632
-
C:\Windows\SysWOW64\Bkdpjm32.exeC:\Windows\system32\Bkdpjm32.exe120⤵PID:2640
-
C:\Windows\SysWOW64\Baaibd32.exeC:\Windows\system32\Baaibd32.exe121⤵PID:2648
-
C:\Windows\SysWOW64\Bkgmom32.exeC:\Windows\system32\Bkgmom32.exe122⤵PID:2656
-
C:\Windows\SysWOW64\Bfpnpjdc.exeC:\Windows\system32\Bfpnpjdc.exe123⤵PID:2664
-
C:\Windows\SysWOW64\Bmjfld32.exeC:\Windows\system32\Bmjfld32.exe124⤵PID:2672
-
C:\Windows\SysWOW64\Bcdniobm.exeC:\Windows\system32\Bcdniobm.exe125⤵PID:2680
-
C:\Windows\SysWOW64\Bjnffi32.exeC:\Windows\system32\Bjnffi32.exe126⤵PID:2688
-
C:\Windows\SysWOW64\Bmmbbd32.exeC:\Windows\system32\Bmmbbd32.exe127⤵PID:2696
-
C:\Windows\SysWOW64\Bcgkonqj.exeC:\Windows\system32\Bcgkonqj.exe128⤵PID:2704
-
C:\Windows\SysWOW64\Cihmbdkm.exeC:\Windows\system32\Cihmbdkm.exe129⤵PID:2712
-
C:\Windows\SysWOW64\Cbqakj32.exeC:\Windows\system32\Cbqakj32.exe130⤵PID:2720
-
C:\Windows\SysWOW64\Ceonge32.exeC:\Windows\system32\Ceonge32.exe131⤵PID:2728
-
C:\Windows\SysWOW64\Cjlfol32.exeC:\Windows\system32\Cjlfol32.exe132⤵PID:2736
-
C:\Windows\SysWOW64\Cafnlffe.exeC:\Windows\system32\Cafnlffe.exe133⤵PID:2744
-
C:\Windows\SysWOW64\Chpfiqma.exeC:\Windows\system32\Chpfiqma.exe134⤵PID:2752
-
C:\Windows\SysWOW64\Cjncelme.exeC:\Windows\system32\Cjncelme.exe135⤵PID:2760
-
C:\Windows\SysWOW64\Cahkaf32.exeC:\Windows\system32\Cahkaf32.exe136⤵PID:2768
-
C:\Windows\SysWOW64\Dhbcnpko.exeC:\Windows\system32\Dhbcnpko.exe137⤵PID:2776
-
C:\Windows\SysWOW64\Dkqpjljc.exeC:\Windows\system32\Dkqpjljc.exe138⤵PID:2784
-
C:\Windows\SysWOW64\Dpmhbbij.exeC:\Windows\system32\Dpmhbbij.exe139⤵PID:2792
-
C:\Windows\SysWOW64\Dhdpdpil.exeC:\Windows\system32\Dhdpdpil.exe140⤵PID:2800
-
C:\Windows\SysWOW64\Dkclpk32.exeC:\Windows\system32\Dkclpk32.exe141⤵PID:2808
-
C:\Windows\SysWOW64\Damdmepm.exeC:\Windows\system32\Damdmepm.exe142⤵PID:2816
-
C:\Windows\SysWOW64\Ddkqiaoq.exeC:\Windows\system32\Ddkqiaoq.exe143⤵PID:2824
-
C:\Windows\SysWOW64\Dkeiek32.exeC:\Windows\system32\Dkeiek32.exe144⤵PID:2832
-
C:\Windows\SysWOW64\Dmceaf32.exeC:\Windows\system32\Dmceaf32.exe145⤵PID:2840
-
C:\Windows\SysWOW64\Dpbanb32.exeC:\Windows\system32\Dpbanb32.exe146⤵PID:2848
-
C:\Windows\SysWOW64\Deojfi32.exeC:\Windows\system32\Deojfi32.exe147⤵PID:2856
-
C:\Windows\SysWOW64\Dmfbgfco.exeC:\Windows\system32\Dmfbgfco.exe148⤵PID:2864
-
C:\Windows\SysWOW64\Dpdncabb.exeC:\Windows\system32\Dpdncabb.exe149⤵PID:2872
-
C:\Windows\SysWOW64\Dgnfpl32.exeC:\Windows\system32\Dgnfpl32.exe150⤵PID:2880
-
C:\Windows\SysWOW64\Dlkohb32.exeC:\Windows\system32\Dlkohb32.exe151⤵PID:2888
-
C:\Windows\SysWOW64\Eahgqi32.exeC:\Windows\system32\Eahgqi32.exe152⤵PID:2896
-
C:\Windows\SysWOW64\Elmknbfc.exeC:\Windows\system32\Elmknbfc.exe153⤵PID:2904
-
C:\Windows\SysWOW64\Ecgdkl32.exeC:\Windows\system32\Ecgdkl32.exe154⤵PID:2912
-
C:\Windows\SysWOW64\Edipbdco.exeC:\Windows\system32\Edipbdco.exe155⤵
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\Elphcbda.exeC:\Windows\system32\Elphcbda.exe156⤵PID:2928
-
C:\Windows\SysWOW64\Enadkj32.exeC:\Windows\system32\Enadkj32.exe157⤵PID:2936
-
C:\Windows\SysWOW64\Ehfihc32.exeC:\Windows\system32\Ehfihc32.exe158⤵PID:2944
-
C:\Windows\SysWOW64\Eoqaem32.exeC:\Windows\system32\Eoqaem32.exe159⤵PID:2952
-
C:\Windows\SysWOW64\Edmjmd32.exeC:\Windows\system32\Edmjmd32.exe160⤵PID:2960
-
C:\Windows\SysWOW64\Eglfio32.exeC:\Windows\system32\Eglfio32.exe161⤵PID:2968
-
C:\Windows\SysWOW64\Enfnfifj.exeC:\Windows\system32\Enfnfifj.exe162⤵PID:2976
-
C:\Windows\SysWOW64\Edpfcc32.exeC:\Windows\system32\Edpfcc32.exe163⤵PID:2984
-
C:\Windows\SysWOW64\Fkjopnec.exeC:\Windows\system32\Fkjopnec.exe164⤵PID:2992
-
C:\Windows\SysWOW64\Fnhkli32.exeC:\Windows\system32\Fnhkli32.exe165⤵PID:3000
-
C:\Windows\SysWOW64\Fdbchckd.exeC:\Windows\system32\Fdbchckd.exe166⤵PID:3008
-
C:\Windows\SysWOW64\Ffcppk32.exeC:\Windows\system32\Ffcppk32.exe167⤵PID:3016
-
C:\Windows\SysWOW64\Flmhmeio.exeC:\Windows\system32\Flmhmeio.exe168⤵PID:3024
-
C:\Windows\SysWOW64\Fcgpip32.exeC:\Windows\system32\Fcgpip32.exe169⤵PID:3032
-
C:\Windows\SysWOW64\Fjahfjhi.exeC:\Windows\system32\Fjahfjhi.exe170⤵PID:3040
-
C:\Windows\SysWOW64\Fqkqcdoe.exeC:\Windows\system32\Fqkqcdoe.exe171⤵PID:3048
-
C:\Windows\SysWOW64\Fblmkl32.exeC:\Windows\system32\Fblmkl32.exe172⤵PID:3056
-
C:\Windows\SysWOW64\Fmbahe32.exeC:\Windows\system32\Fmbahe32.exe173⤵PID:3064
-
C:\Windows\SysWOW64\Fopmdp32.exeC:\Windows\system32\Fopmdp32.exe174⤵PID:2068
-
C:\Windows\SysWOW64\Fbojpl32.exeC:\Windows\system32\Fbojpl32.exe175⤵PID:2092
-
C:\Windows\SysWOW64\Fhibmfjn.exeC:\Windows\system32\Fhibmfjn.exe176⤵PID:2116
-
C:\Windows\SysWOW64\Fkgniaia.exeC:\Windows\system32\Fkgniaia.exe177⤵PID:2140
-
C:\Windows\SysWOW64\Ggnonbof.exeC:\Windows\system32\Ggnonbof.exe178⤵PID:2164
-
C:\Windows\SysWOW64\Gnhgkl32.exeC:\Windows\system32\Gnhgkl32.exe179⤵PID:2188
-
C:\Windows\SysWOW64\Gqfcgh32.exeC:\Windows\system32\Gqfcgh32.exe180⤵PID:1848
-
C:\Windows\SysWOW64\Ggplcbmc.exeC:\Windows\system32\Ggplcbmc.exe181⤵PID:1628
-
C:\Windows\SysWOW64\Gjohpmlg.exeC:\Windows\system32\Gjohpmlg.exe182⤵PID:3076
-
C:\Windows\SysWOW64\Gcglhccg.exeC:\Windows\system32\Gcglhccg.exe183⤵PID:3084
-
C:\Windows\SysWOW64\Gkndjpcj.exeC:\Windows\system32\Gkndjpcj.exe184⤵PID:3092
-
C:\Windows\SysWOW64\Gmoqah32.exeC:\Windows\system32\Gmoqah32.exe185⤵PID:3100
-
C:\Windows\SysWOW64\Gefibf32.exeC:\Windows\system32\Gefibf32.exe186⤵PID:3108
-
C:\Windows\SysWOW64\Gfhejnph.exeC:\Windows\system32\Gfhejnph.exe187⤵PID:3116
-
C:\Windows\SysWOW64\Gnomkkqk.exeC:\Windows\system32\Gnomkkqk.exe188⤵PID:3124
-
C:\Windows\SysWOW64\Gclfcb32.exeC:\Windows\system32\Gclfcb32.exe189⤵
- Drops file in System32 directory
PID:3132 -
C:\Windows\SysWOW64\Gjenplfo.exeC:\Windows\system32\Gjenplfo.exe190⤵PID:3140
-
C:\Windows\SysWOW64\Hapfmf32.exeC:\Windows\system32\Hapfmf32.exe191⤵PID:3148
-
C:\Windows\SysWOW64\Hbabeocj.exeC:\Windows\system32\Hbabeocj.exe192⤵PID:3156
-
C:\Windows\SysWOW64\Hmfgbgcp.exeC:\Windows\system32\Hmfgbgcp.exe193⤵PID:3164
-
C:\Windows\SysWOW64\Hpecncbc.exeC:\Windows\system32\Hpecncbc.exe194⤵PID:3184
-
C:\Windows\SysWOW64\Hbcojn32.exeC:\Windows\system32\Hbcojn32.exe195⤵PID:3192
-
C:\Windows\SysWOW64\Hmicgg32.exeC:\Windows\system32\Hmicgg32.exe196⤵PID:3200
-
C:\Windows\SysWOW64\Hnjpoogl.exeC:\Windows\system32\Hnjpoogl.exe197⤵PID:3208
-
C:\Windows\SysWOW64\Hedhli32.exeC:\Windows\system32\Hedhli32.exe198⤵PID:3216
-
C:\Windows\SysWOW64\Hlnqicfe.exeC:\Windows\system32\Hlnqicfe.exe199⤵PID:3224
-
C:\Windows\SysWOW64\Hbhien32.exeC:\Windows\system32\Hbhien32.exe200⤵PID:3232
-
C:\Windows\SysWOW64\Hibabh32.exeC:\Windows\system32\Hibabh32.exe201⤵PID:3240
-
C:\Windows\SysWOW64\Iflkdqno.exeC:\Windows\system32\Iflkdqno.exe202⤵PID:3248
-
C:\Windows\SysWOW64\Imfcak32.exeC:\Windows\system32\Imfcak32.exe203⤵PID:3256
-
C:\Windows\SysWOW64\Ihlgnc32.exeC:\Windows\system32\Ihlgnc32.exe204⤵PID:3264
-
C:\Windows\SysWOW64\Iadlgilb.exeC:\Windows\system32\Iadlgilb.exe205⤵PID:3272
-
C:\Windows\SysWOW64\Ibehoa32.exeC:\Windows\system32\Ibehoa32.exe206⤵PID:3280
-
C:\Windows\SysWOW64\Iioqkk32.exeC:\Windows\system32\Iioqkk32.exe207⤵PID:3288
-
C:\Windows\SysWOW64\Ipiiheaj.exeC:\Windows\system32\Ipiiheaj.exe208⤵PID:3296
-
C:\Windows\SysWOW64\Ifcaep32.exeC:\Windows\system32\Ifcaep32.exe209⤵PID:3304
-
C:\Windows\SysWOW64\Iiamak32.exeC:\Windows\system32\Iiamak32.exe210⤵PID:3312
-
C:\Windows\SysWOW64\Jpleneog.exeC:\Windows\system32\Jpleneog.exe211⤵PID:3320
-
C:\Windows\SysWOW64\Jfenjofd.exeC:\Windows\system32\Jfenjofd.exe212⤵PID:3328
-
C:\Windows\SysWOW64\Jhgjbg32.exeC:\Windows\system32\Jhgjbg32.exe213⤵PID:3336
-
C:\Windows\SysWOW64\Jpnbce32.exeC:\Windows\system32\Jpnbce32.exe214⤵
- Drops file in System32 directory
PID:3344 -
C:\Windows\SysWOW64\Jaookmbb.exeC:\Windows\system32\Jaookmbb.exe215⤵PID:3352
-
C:\Windows\SysWOW64\Jhighg32.exeC:\Windows\system32\Jhighg32.exe216⤵PID:3360
-
C:\Windows\SysWOW64\Jocodaal.exeC:\Windows\system32\Jocodaal.exe217⤵PID:3368
-
C:\Windows\SysWOW64\Jemgak32.exeC:\Windows\system32\Jemgak32.exe218⤵PID:3376
-
C:\Windows\SysWOW64\Jlgpne32.exeC:\Windows\system32\Jlgpne32.exe219⤵PID:3384
-
C:\Windows\SysWOW64\Jnhlenfd.exeC:\Windows\system32\Jnhlenfd.exe220⤵PID:3392
-
C:\Windows\SysWOW64\Jdbdbh32.exeC:\Windows\system32\Jdbdbh32.exe221⤵
- Drops file in System32 directory
PID:3400 -
C:\Windows\SysWOW64\Jgqqnc32.exeC:\Windows\system32\Jgqqnc32.exe222⤵PID:3408
-
C:\Windows\SysWOW64\Jafell32.exeC:\Windows\system32\Jafell32.exe223⤵PID:3416
-
C:\Windows\SysWOW64\Jddahg32.exeC:\Windows\system32\Jddahg32.exe224⤵PID:3424
-
C:\Windows\SysWOW64\Kkoida32.exeC:\Windows\system32\Kkoida32.exe225⤵PID:3432
-
C:\Windows\SysWOW64\Kahaalkh.exeC:\Windows\system32\Kahaalkh.exe226⤵PID:3440
-
C:\Windows\SysWOW64\Kgejibip.exeC:\Windows\system32\Kgejibip.exe227⤵PID:3448
-
C:\Windows\SysWOW64\Klbbaigg.exeC:\Windows\system32\Klbbaigg.exe228⤵PID:3456
-
C:\Windows\SysWOW64\Kejgko32.exeC:\Windows\system32\Kejgko32.exe229⤵PID:3464
-
C:\Windows\SysWOW64\Knaollnj.exeC:\Windows\system32\Knaollnj.exe230⤵PID:3472
-
C:\Windows\SysWOW64\Kcogdcla.exeC:\Windows\system32\Kcogdcla.exe231⤵PID:3480
-
C:\Windows\SysWOW64\Khkpljkh.exeC:\Windows\system32\Khkpljkh.exe232⤵PID:3488
-
C:\Windows\SysWOW64\Koehid32.exeC:\Windows\system32\Koehid32.exe233⤵PID:3496
-
C:\Windows\SysWOW64\Kfopfnib.exeC:\Windows\system32\Kfopfnib.exe234⤵PID:3504
-
C:\Windows\SysWOW64\Kliibhao.exeC:\Windows\system32\Kliibhao.exe235⤵PID:3512
-
C:\Windows\SysWOW64\Lfamkn32.exeC:\Windows\system32\Lfamkn32.exe236⤵PID:3520
-
C:\Windows\SysWOW64\Lllehhol.exeC:\Windows\system32\Lllehhol.exe237⤵
- Drops file in System32 directory
PID:3528 -
C:\Windows\SysWOW64\Lnmbpq32.exeC:\Windows\system32\Lnmbpq32.exe238⤵PID:3536
-
C:\Windows\SysWOW64\Ldgjljlg.exeC:\Windows\system32\Ldgjljlg.exe239⤵PID:3544
-
C:\Windows\SysWOW64\Lkqbidcd.exeC:\Windows\system32\Lkqbidcd.exe240⤵PID:3552
-
C:\Windows\SysWOW64\Lnooepch.exeC:\Windows\system32\Lnooepch.exe241⤵PID:3560
-
C:\Windows\SysWOW64\Lqnkalbk.exeC:\Windows\system32\Lqnkalbk.exe242⤵PID:3568