Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-05-2021 12:59
Static task
static1
Behavioral task
behavioral1
Sample
05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe
-
Size
1.2MB
-
MD5
c626d944e1d25b4d894721ecc151e2fb
-
SHA1
c6ea49b7dae407c17cb8781323073e5d58eba328
-
SHA256
05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4
-
SHA512
32fae6194d4673aa423c2fa7a1dce562642bb14ecb9541191dd682346c1f86480b9cf1fa1d10edfc4eaba290502ddb5753750c82083a624736fd1695a0562c93
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs
-
Executes dropped EXE 64 IoCs
Processes:
Fcpnjb32.exeGljohg32.exeGdmjnh32.exeGobnka32.exeHhkbcgpa.exeHmhkjefh.exeHiahdfji.exeHfeinjic.exeHfhfci32.exeIimhpdpl.exeIfahih32.exeJfceoh32.exeJbjfdibg.exeJpnfmm32.exeJigkfbga.exeKpoodkcn.exeKelhmaae.exeLendba32.exeMdhgfgog.exeMpohkh32.exeNeecjn32.exeOpidhenn.exeOlpemfdb.exeOdiidcbb.exePqpjidhf.exePqbgncfc.exePnfghh32.exePfallj32.exeAqemkafn.exeAjmacf32.exeAqjffp32.exeBcohbkkd.exeBjkmedpo.exeCgonni32.exeCjbcecjg.exeCehhcljm.exeCfidkd32.exeCmclgogh.exeCejdhlhj.exeCflapd32.exeCnciaanj.exeCemanl32.exeDfnnfdle.exeDacbcmkk.exeDhmjpg32.exeDngblaje.exeDddkeh32.exeDfbgac32.exeDnjobq32.exeDjqpgang.exeDefddj32.exeDfgqlbck.exeDamdikca.exeEhgmfe32.exeEaoaokan.exeEfljgb32.exeEemjeigd.exeEgnfma32.exeEoeono32.exeEhncfd32.exeEklobp32.exeEebcph32.exeFomdnn32.exeFefmkhoj.exepid process 3024 Fcpnjb32.exe 2332 Gljohg32.exe 512 Gdmjnh32.exe 2468 Gobnka32.exe 2536 Hhkbcgpa.exe 856 Hmhkjefh.exe 1120 Hiahdfji.exe 1424 Hfeinjic.exe 1640 Hfhfci32.exe 1808 Iimhpdpl.exe 1768 Ifahih32.exe 2336 Jfceoh32.exe 2732 Jbjfdibg.exe 3520 Jpnfmm32.exe 3616 Jigkfbga.exe 2112 Kpoodkcn.exe 2128 Kelhmaae.exe 3888 Lendba32.exe 188 Mdhgfgog.exe 3892 Mpohkh32.exe 860 Neecjn32.exe 1920 Opidhenn.exe 2320 Olpemfdb.exe 1784 Odiidcbb.exe 540 Pqpjidhf.exe 4116 Pqbgncfc.exe 4160 Pnfghh32.exe 4192 Pfallj32.exe 4228 Aqemkafn.exe 4260 Ajmacf32.exe 4292 Aqjffp32.exe 4320 Bcohbkkd.exe 4352 Bjkmedpo.exe 4384 Cgonni32.exe 4404 Cjbcecjg.exe 4432 Cehhcljm.exe 4464 Cfidkd32.exe 4484 Cmclgogh.exe 4504 Cejdhlhj.exe 4524 Cflapd32.exe 4544 Cnciaanj.exe 4564 Cemanl32.exe 4584 Dfnnfdle.exe 4604 Dacbcmkk.exe 4624 Dhmjpg32.exe 4644 Dngblaje.exe 4664 Dddkeh32.exe 4684 Dfbgac32.exe 4704 Dnjobq32.exe 4724 Djqpgang.exe 4744 Defddj32.exe 4764 Dfgqlbck.exe 4784 Damdikca.exe 4804 Ehgmfe32.exe 4824 Eaoaokan.exe 4844 Efljgb32.exe 4864 Eemjeigd.exe 4884 Egnfma32.exe 4904 Eoeono32.exe 4924 Ehncfd32.exe 4944 Eklobp32.exe 4964 Eebcph32.exe 4984 Fomdnn32.exe 5004 Fefmkhoj.exe -
Drops file in System32 directory 64 IoCs
Processes:
Cqlehgnh.exeGahfaa32.exePeihgo32.exeHmhkjefh.exeEklobp32.exeIomfli32.exeIngmhelj.exeAofoaaea.exeLfdpbm32.exeMilodg32.exeEjlhhipn.exeHkljfe32.exeOloncppg.exePoijkiem.exeAoppkh32.exeEaojddnb.exeFmaapjme.exePpifdl32.exeFpmjlpjp.exeNnljngja.exeOikaaoam.exeOaickq32.exePcplpiak.exeBffhda32.exeFieode32.exeIjimhpbh.exeNhcikc32.exeNlpkgkik.exeFabgkhai.exeIkdgaj32.exeKbcbpafa.exeMffmhmjo.exeMnedmh32.exeIimhpdpl.exeGhceha32.exeGickfcdp.exeInbcme32.exeKbmefpnf.exeLllopd32.exeOcifpj32.exeOpidhenn.exeFgjfhp32.exeGeibgeod.exeHbgimeoa.exeAoilgq32.exeBldbad32.exeCmmegb32.exeDpfkdc32.exeFjneni32.exeHaaigp32.exePekeln32.exeEalnoepe.exeFppgaohm.exeJgkjbb32.exeMadqic32.exeDngblaje.exeDddkeh32.exeOicnldop.exeAccbmfaf.exeOhlegl32.exeBcnknncm.exeCbeddjfb.exedescription ioc process File created C:\Windows\SysWOW64\Pnccbg32.dll Cqlehgnh.exe File created C:\Windows\SysWOW64\Hfgnnc32.dll Gahfaa32.exe File opened for modification C:\Windows\SysWOW64\Plcqcihe.exe Peihgo32.exe File opened for modification C:\Windows\SysWOW64\Hiahdfji.exe Hmhkjefh.exe File created C:\Windows\SysWOW64\Cejanb32.dll Eklobp32.exe File created C:\Windows\SysWOW64\Idjodp32.exe Iomfli32.exe File created C:\Windows\SysWOW64\Idaeeo32.exe Ingmhelj.exe File created C:\Windows\SysWOW64\Aeqgnkmn.exe Aofoaaea.exe File created C:\Windows\SysWOW64\Onjlab32.dll Lfdpbm32.exe File created C:\Windows\SysWOW64\Mpegaakh.exe Milodg32.exe File created C:\Windows\SysWOW64\Emjddeoa.exe Ejlhhipn.exe File created C:\Windows\SysWOW64\Hpicnl32.exe Hkljfe32.exe File opened for modification C:\Windows\SysWOW64\Ocifpj32.exe Oloncppg.exe File opened for modification C:\Windows\SysWOW64\Pgpalgfo.exe Poijkiem.exe File opened for modification C:\Windows\SysWOW64\Ahhddn32.exe Aoppkh32.exe File created C:\Windows\SysWOW64\Edmgqpmf.exe Eaojddnb.exe File created C:\Windows\SysWOW64\Gmghnnbg.dll Fmaapjme.exe File created C:\Windows\SysWOW64\Qfeomckg.exe Ppifdl32.exe File created C:\Windows\SysWOW64\Dlnhek32.dll Fpmjlpjp.exe File created C:\Windows\SysWOW64\Nefbja32.exe Nnljngja.exe File created C:\Windows\SysWOW64\Bflbpbcd.dll Oikaaoam.exe File opened for modification C:\Windows\SysWOW64\Ohckhkdb.exe Oaickq32.exe File created C:\Windows\SysWOW64\Gmccojge.dll Pcplpiak.exe File created C:\Windows\SysWOW64\Bmppqkda.exe Bffhda32.exe File created C:\Windows\SysWOW64\Fppgaohm.exe Fieode32.exe File created C:\Windows\SysWOW64\Dccjfbed.dll Ijimhpbh.exe File opened for modification C:\Windows\SysWOW64\Mpegaakh.exe Milodg32.exe File created C:\Windows\SysWOW64\Nomahmnm.exe Nhcikc32.exe File opened for modification C:\Windows\SysWOW64\Nbjcceph.exe Nlpkgkik.exe File created C:\Windows\SysWOW64\Fdpcgcpm.exe Fabgkhai.exe File opened for modification C:\Windows\SysWOW64\Inbcme32.exe Ikdgaj32.exe File created C:\Windows\SysWOW64\Kimjlk32.exe Kbcbpafa.exe File opened for modification C:\Windows\SysWOW64\Mhgipe32.exe Mffmhmjo.exe File created C:\Windows\SysWOW64\Ihdppaca.dll Mnedmh32.exe File created C:\Windows\SysWOW64\Bhhkmpmp.dll Iimhpdpl.exe File opened for modification C:\Windows\SysWOW64\Gnpnah32.exe Ghceha32.exe File opened for modification C:\Windows\SysWOW64\Ghbonkob.exe Gahfaa32.exe File created C:\Windows\SysWOW64\Gpncbm32.exe Gickfcdp.exe File created C:\Windows\SysWOW64\Idlljphm.exe Inbcme32.exe File created C:\Windows\SysWOW64\Ckjknckg.dll Kbmefpnf.exe File created C:\Windows\SysWOW64\Pngfqj32.dll Lllopd32.exe File opened for modification C:\Windows\SysWOW64\Oicnldop.exe Ocifpj32.exe File created C:\Windows\SysWOW64\Ffbjngcg.dll Opidhenn.exe File created C:\Windows\SysWOW64\Fndnej32.exe Fgjfhp32.exe File created C:\Windows\SysWOW64\Ghhocqnh.exe Geibgeod.exe File created C:\Windows\SysWOW64\Hdeeiqnd.exe Hbgimeoa.exe File created C:\Windows\SysWOW64\Kmqegg32.dll Aoilgq32.exe File created C:\Windows\SysWOW64\Bcnknncm.exe Bldbad32.exe File created C:\Windows\SysWOW64\Colacn32.exe Cmmegb32.exe File opened for modification C:\Windows\SysWOW64\Dfpcamfg.exe Dpfkdc32.exe File opened for modification C:\Windows\SysWOW64\Fahmjceh.exe Fjneni32.exe File created C:\Windows\SysWOW64\Hdpedk32.exe Haaigp32.exe File created C:\Windows\SysWOW64\Plemih32.exe Pekeln32.exe File created C:\Windows\SysWOW64\Pkjmql32.dll Ealnoepe.exe File created C:\Windows\SysWOW64\Clmcnqcn.dll Fppgaohm.exe File created C:\Windows\SysWOW64\Fgonhoei.dll Jgkjbb32.exe File created C:\Windows\SysWOW64\Heigmafd.dll Madqic32.exe File opened for modification C:\Windows\SysWOW64\Dddkeh32.exe Dngblaje.exe File created C:\Windows\SysWOW64\Dfbgac32.exe Dddkeh32.exe File opened for modification C:\Windows\SysWOW64\Oopgdkmh.exe Oicnldop.exe File created C:\Windows\SysWOW64\Afaniaqj.exe Accbmfaf.exe File created C:\Windows\SysWOW64\Beoacj32.dll Ohlegl32.exe File created C:\Windows\SysWOW64\Bjhckh32.exe Bcnknncm.exe File created C:\Windows\SysWOW64\Chomad32.exe Cbeddjfb.exe -
Modifies registry class 64 IoCs
Processes:
Cfidkd32.exeGoojkkhh.exeAfcknang.exeFhbegm32.exeIdihjj32.exeJnnlon32.exeDmlhcgka.exeHdpedk32.exeIionkmjn.exeJfcnda32.exeAcnhag32.exeCqlehgnh.exeGggkogcj.exeNedfea32.exePfallj32.exeEhncfd32.exePjjdmc32.exeHhidojij.exeHaaigp32.exeLnjdajjg.exeBffhda32.exeCmnlbi32.exeIkcpgdnp.exeKnpbkkba.exeLgifdqib.exeLbqgfi32.exeObcfjdhm.exeGkfkplml.exeJbllob32.exeNpagmp32.exeIjimhpbh.exeJqjleicm.exeMblgbg32.exeCcijjlip.exeFekffg32.exeFfioni32.exeMnedmh32.exeBcnknncm.exeHdnpia32.exeKipgbklk.exeNfffoj32.exeOkmnig32.exeColacn32.exeLjioelfc.exeIimhpdpl.exeFghicp32.exeGegfbe32.exeMpegaakh.exeDajaie32.exeEalnoepe.exeGampmpcp.exeMajnce32.exeOomcde32.exePeihgo32.exePcdoqa32.exeAheqdhdm.exeGhceha32.exeNomahmnm.exeAhhddn32.exeDfbpfm32.exePljfdgbn.exeFeijqgmg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cfidkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkieca32.dll" Goojkkhh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlndenjb.dll" Afcknang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngpfbd32.dll" Fhbegm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Idihjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbcoap32.dll" Jnnlon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgeoffjf.dll" Dmlhcgka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hdpedk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iionkmjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jfcnda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Acnhag32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cqlehgnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnlcqiim.dll" Gggkogcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nedfea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pfallj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ehncfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pjjdmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoincpdc.dll" Hhidojij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Haaigp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lnjdajjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bffhda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cmnlbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhedilhj.dll" Ikcpgdnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Knpbkkba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lgifdqib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lbqgfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Obcfjdhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilcdfi32.dll" Gkfkplml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njmfbkma.dll" Jbllob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Npagmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dccjfbed.dll" Ijimhpbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jqjleicm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mblgbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ccijjlip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fekffg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ffioni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihdppaca.dll" Mnedmh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bcnknncm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hdnpia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hilbli32.dll" Kipgbklk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nfffoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnfbjckh.dll" Okmnig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Colacn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pekcfj32.dll" Ljioelfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iimhpdpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jopelqlj.dll" Fghicp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gegfbe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mpegaakh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dajaie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ealnoepe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gampmpcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lebhmabm.dll" Majnce32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oomcde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Peihgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pcdoqa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aheqdhdm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ghceha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nomahmnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijhnbb32.dll" Ahhddn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lccoed32.dll" Dfbpfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ljioelfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lnjdajjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aocgflhn.dll" Pljfdgbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Feijqgmg.exe -
NTFS ADS 1 IoCs
Processes:
Cjcbff32.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\2Ý9²d€û{® .ë&Ö'™]º&™#Ñ:™W¡Uƒ ¯&ŸH¥&W¯'ëPÔ\Têæ1ÃGT¹'ŽQ§'Ž(ö{È åzË·EËârÝšþöpÃ7À ºtÏÿr£oContent-type: text\html <HTML><HEAD><TITLE>Error400<\TITLE><\HEAD><BODY><h1>Error300: Browser sent malformed request Cjcbff32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exeFcpnjb32.exeGljohg32.exeGdmjnh32.exeGobnka32.exeHhkbcgpa.exeHmhkjefh.exeHiahdfji.exeHfeinjic.exeHfhfci32.exeIimhpdpl.exeIfahih32.exeJfceoh32.exeJbjfdibg.exeJpnfmm32.exeJigkfbga.exeKpoodkcn.exeKelhmaae.exeLendba32.exeMdhgfgog.exeMpohkh32.exeNeecjn32.exedescription pid process target process PID 3968 wrote to memory of 3024 3968 05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe Fcpnjb32.exe PID 3968 wrote to memory of 3024 3968 05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe Fcpnjb32.exe PID 3968 wrote to memory of 3024 3968 05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe Fcpnjb32.exe PID 3024 wrote to memory of 2332 3024 Fcpnjb32.exe Gljohg32.exe PID 3024 wrote to memory of 2332 3024 Fcpnjb32.exe Gljohg32.exe PID 3024 wrote to memory of 2332 3024 Fcpnjb32.exe Gljohg32.exe PID 2332 wrote to memory of 512 2332 Gljohg32.exe Gdmjnh32.exe PID 2332 wrote to memory of 512 2332 Gljohg32.exe Gdmjnh32.exe PID 2332 wrote to memory of 512 2332 Gljohg32.exe Gdmjnh32.exe PID 512 wrote to memory of 2468 512 Gdmjnh32.exe Gobnka32.exe PID 512 wrote to memory of 2468 512 Gdmjnh32.exe Gobnka32.exe PID 512 wrote to memory of 2468 512 Gdmjnh32.exe Gobnka32.exe PID 2468 wrote to memory of 2536 2468 Gobnka32.exe Hhkbcgpa.exe PID 2468 wrote to memory of 2536 2468 Gobnka32.exe Hhkbcgpa.exe PID 2468 wrote to memory of 2536 2468 Gobnka32.exe Hhkbcgpa.exe PID 2536 wrote to memory of 856 2536 Hhkbcgpa.exe Hmhkjefh.exe PID 2536 wrote to memory of 856 2536 Hhkbcgpa.exe Hmhkjefh.exe PID 2536 wrote to memory of 856 2536 Hhkbcgpa.exe Hmhkjefh.exe PID 856 wrote to memory of 1120 856 Hmhkjefh.exe Hiahdfji.exe PID 856 wrote to memory of 1120 856 Hmhkjefh.exe Hiahdfji.exe PID 856 wrote to memory of 1120 856 Hmhkjefh.exe Hiahdfji.exe PID 1120 wrote to memory of 1424 1120 Hiahdfji.exe Hfeinjic.exe PID 1120 wrote to memory of 1424 1120 Hiahdfji.exe Hfeinjic.exe PID 1120 wrote to memory of 1424 1120 Hiahdfji.exe Hfeinjic.exe PID 1424 wrote to memory of 1640 1424 Hfeinjic.exe Hfhfci32.exe PID 1424 wrote to memory of 1640 1424 Hfeinjic.exe Hfhfci32.exe PID 1424 wrote to memory of 1640 1424 Hfeinjic.exe Hfhfci32.exe PID 1640 wrote to memory of 1808 1640 Hfhfci32.exe Iimhpdpl.exe PID 1640 wrote to memory of 1808 1640 Hfhfci32.exe Iimhpdpl.exe PID 1640 wrote to memory of 1808 1640 Hfhfci32.exe Iimhpdpl.exe PID 1808 wrote to memory of 1768 1808 Iimhpdpl.exe Ifahih32.exe PID 1808 wrote to memory of 1768 1808 Iimhpdpl.exe Ifahih32.exe PID 1808 wrote to memory of 1768 1808 Iimhpdpl.exe Ifahih32.exe PID 1768 wrote to memory of 2336 1768 Ifahih32.exe Jfceoh32.exe PID 1768 wrote to memory of 2336 1768 Ifahih32.exe Jfceoh32.exe PID 1768 wrote to memory of 2336 1768 Ifahih32.exe Jfceoh32.exe PID 2336 wrote to memory of 2732 2336 Jfceoh32.exe Jbjfdibg.exe PID 2336 wrote to memory of 2732 2336 Jfceoh32.exe Jbjfdibg.exe PID 2336 wrote to memory of 2732 2336 Jfceoh32.exe Jbjfdibg.exe PID 2732 wrote to memory of 3520 2732 Jbjfdibg.exe Jpnfmm32.exe PID 2732 wrote to memory of 3520 2732 Jbjfdibg.exe Jpnfmm32.exe PID 2732 wrote to memory of 3520 2732 Jbjfdibg.exe Jpnfmm32.exe PID 3520 wrote to memory of 3616 3520 Jpnfmm32.exe Jigkfbga.exe PID 3520 wrote to memory of 3616 3520 Jpnfmm32.exe Jigkfbga.exe PID 3520 wrote to memory of 3616 3520 Jpnfmm32.exe Jigkfbga.exe PID 3616 wrote to memory of 2112 3616 Jigkfbga.exe Kpoodkcn.exe PID 3616 wrote to memory of 2112 3616 Jigkfbga.exe Kpoodkcn.exe PID 3616 wrote to memory of 2112 3616 Jigkfbga.exe Kpoodkcn.exe PID 2112 wrote to memory of 2128 2112 Kpoodkcn.exe Kelhmaae.exe PID 2112 wrote to memory of 2128 2112 Kpoodkcn.exe Kelhmaae.exe PID 2112 wrote to memory of 2128 2112 Kpoodkcn.exe Kelhmaae.exe PID 2128 wrote to memory of 3888 2128 Kelhmaae.exe Lendba32.exe PID 2128 wrote to memory of 3888 2128 Kelhmaae.exe Lendba32.exe PID 2128 wrote to memory of 3888 2128 Kelhmaae.exe Lendba32.exe PID 3888 wrote to memory of 188 3888 Lendba32.exe Mdhgfgog.exe PID 3888 wrote to memory of 188 3888 Lendba32.exe Mdhgfgog.exe PID 3888 wrote to memory of 188 3888 Lendba32.exe Mdhgfgog.exe PID 188 wrote to memory of 3892 188 Mdhgfgog.exe Mpohkh32.exe PID 188 wrote to memory of 3892 188 Mdhgfgog.exe Mpohkh32.exe PID 188 wrote to memory of 3892 188 Mdhgfgog.exe Mpohkh32.exe PID 3892 wrote to memory of 860 3892 Mpohkh32.exe Neecjn32.exe PID 3892 wrote to memory of 860 3892 Mpohkh32.exe Neecjn32.exe PID 3892 wrote to memory of 860 3892 Mpohkh32.exe Neecjn32.exe PID 860 wrote to memory of 1920 860 Neecjn32.exe Opidhenn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe"C:\Users\Admin\AppData\Local\Temp\05efdf1f2913db6abe0d5b1969aa22617937f77c2fe35c6d9bf7e00b02e7f7b4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\Fcpnjb32.exeC:\Windows\system32\Fcpnjb32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Gljohg32.exeC:\Windows\system32\Gljohg32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\Gdmjnh32.exeC:\Windows\system32\Gdmjnh32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\Gobnka32.exeC:\Windows\system32\Gobnka32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\Hhkbcgpa.exeC:\Windows\system32\Hhkbcgpa.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Hmhkjefh.exeC:\Windows\system32\Hmhkjefh.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\Hiahdfji.exeC:\Windows\system32\Hiahdfji.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\Hfeinjic.exeC:\Windows\system32\Hfeinjic.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\Hfhfci32.exeC:\Windows\system32\Hfhfci32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Iimhpdpl.exeC:\Windows\system32\Iimhpdpl.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\Ifahih32.exeC:\Windows\system32\Ifahih32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\Jfceoh32.exeC:\Windows\system32\Jfceoh32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\Jbjfdibg.exeC:\Windows\system32\Jbjfdibg.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\Jpnfmm32.exeC:\Windows\system32\Jpnfmm32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520
-
C:\Windows\SysWOW64\Jigkfbga.exeC:\Windows\system32\Jigkfbga.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\Kpoodkcn.exeC:\Windows\system32\Kpoodkcn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\Kelhmaae.exeC:\Windows\system32\Kelhmaae.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128
-
C:\Windows\SysWOW64\Lendba32.exeC:\Windows\system32\Lendba32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\Mdhgfgog.exeC:\Windows\system32\Mdhgfgog.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Windows\SysWOW64\Mpohkh32.exeC:\Windows\system32\Mpohkh32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\Neecjn32.exeC:\Windows\system32\Neecjn32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\Opidhenn.exeC:\Windows\system32\Opidhenn.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1920 -
C:\Windows\SysWOW64\Olpemfdb.exeC:\Windows\system32\Olpemfdb.exe6⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Odiidcbb.exeC:\Windows\system32\Odiidcbb.exe7⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\Pqpjidhf.exeC:\Windows\system32\Pqpjidhf.exe8⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\Pqbgncfc.exeC:\Windows\system32\Pqbgncfc.exe9⤵
- Executes dropped EXE
PID:4116 -
C:\Windows\SysWOW64\Pnfghh32.exeC:\Windows\system32\Pnfghh32.exe10⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\Pfallj32.exeC:\Windows\system32\Pfallj32.exe11⤵
- Executes dropped EXE
- Modifies registry class
PID:4192 -
C:\Windows\SysWOW64\Aqemkafn.exeC:\Windows\system32\Aqemkafn.exe12⤵
- Executes dropped EXE
PID:4228 -
C:\Windows\SysWOW64\Ajmacf32.exeC:\Windows\system32\Ajmacf32.exe13⤵
- Executes dropped EXE
PID:4260 -
C:\Windows\SysWOW64\Aqjffp32.exeC:\Windows\system32\Aqjffp32.exe14⤵
- Executes dropped EXE
PID:4292 -
C:\Windows\SysWOW64\Bcohbkkd.exeC:\Windows\system32\Bcohbkkd.exe15⤵
- Executes dropped EXE
PID:4320 -
C:\Windows\SysWOW64\Bjkmedpo.exeC:\Windows\system32\Bjkmedpo.exe16⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\Cgonni32.exeC:\Windows\system32\Cgonni32.exe17⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Cjbcecjg.exeC:\Windows\system32\Cjbcecjg.exe18⤵
- Executes dropped EXE
PID:4404 -
C:\Windows\SysWOW64\Cehhcljm.exeC:\Windows\system32\Cehhcljm.exe19⤵
- Executes dropped EXE
PID:4432 -
C:\Windows\SysWOW64\Cfidkd32.exeC:\Windows\system32\Cfidkd32.exe20⤵
- Executes dropped EXE
- Modifies registry class
PID:4464 -
C:\Windows\SysWOW64\Cmclgogh.exeC:\Windows\system32\Cmclgogh.exe21⤵
- Executes dropped EXE
PID:4484 -
C:\Windows\SysWOW64\Cejdhlhj.exeC:\Windows\system32\Cejdhlhj.exe22⤵
- Executes dropped EXE
PID:4504 -
C:\Windows\SysWOW64\Cflapd32.exeC:\Windows\system32\Cflapd32.exe23⤵
- Executes dropped EXE
PID:4524 -
C:\Windows\SysWOW64\Cnciaanj.exeC:\Windows\system32\Cnciaanj.exe24⤵
- Executes dropped EXE
PID:4544 -
C:\Windows\SysWOW64\Cemanl32.exeC:\Windows\system32\Cemanl32.exe25⤵
- Executes dropped EXE
PID:4564 -
C:\Windows\SysWOW64\Dfnnfdle.exeC:\Windows\system32\Dfnnfdle.exe26⤵
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\Dacbcmkk.exeC:\Windows\system32\Dacbcmkk.exe27⤵
- Executes dropped EXE
PID:4604 -
C:\Windows\SysWOW64\Dhmjpg32.exeC:\Windows\system32\Dhmjpg32.exe28⤵
- Executes dropped EXE
PID:4624 -
C:\Windows\SysWOW64\Dngblaje.exeC:\Windows\system32\Dngblaje.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4644 -
C:\Windows\SysWOW64\Dddkeh32.exeC:\Windows\system32\Dddkeh32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4664 -
C:\Windows\SysWOW64\Dfbgac32.exeC:\Windows\system32\Dfbgac32.exe31⤵
- Executes dropped EXE
PID:4684 -
C:\Windows\SysWOW64\Dnjobq32.exeC:\Windows\system32\Dnjobq32.exe32⤵
- Executes dropped EXE
PID:4704 -
C:\Windows\SysWOW64\Djqpgang.exeC:\Windows\system32\Djqpgang.exe33⤵
- Executes dropped EXE
PID:4724 -
C:\Windows\SysWOW64\Defddj32.exeC:\Windows\system32\Defddj32.exe34⤵
- Executes dropped EXE
PID:4744 -
C:\Windows\SysWOW64\Dfgqlbck.exeC:\Windows\system32\Dfgqlbck.exe35⤵
- Executes dropped EXE
PID:4764 -
C:\Windows\SysWOW64\Damdikca.exeC:\Windows\system32\Damdikca.exe36⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\Ehgmfe32.exeC:\Windows\system32\Ehgmfe32.exe37⤵
- Executes dropped EXE
PID:4804 -
C:\Windows\SysWOW64\Eaoaokan.exeC:\Windows\system32\Eaoaokan.exe38⤵
- Executes dropped EXE
PID:4824 -
C:\Windows\SysWOW64\Efljgb32.exeC:\Windows\system32\Efljgb32.exe39⤵
- Executes dropped EXE
PID:4844 -
C:\Windows\SysWOW64\Eemjeigd.exeC:\Windows\system32\Eemjeigd.exe40⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\Egnfma32.exeC:\Windows\system32\Egnfma32.exe41⤵
- Executes dropped EXE
PID:4884 -
C:\Windows\SysWOW64\Eoeono32.exeC:\Windows\system32\Eoeono32.exe42⤵
- Executes dropped EXE
PID:4904 -
C:\Windows\SysWOW64\Ehncfd32.exeC:\Windows\system32\Ehncfd32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:4924 -
C:\Windows\SysWOW64\Eklobp32.exeC:\Windows\system32\Eklobp32.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4944 -
C:\Windows\SysWOW64\Eebcph32.exeC:\Windows\system32\Eebcph32.exe45⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\Fomdnn32.exeC:\Windows\system32\Fomdnn32.exe46⤵
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\Fefmkhoj.exeC:\Windows\system32\Fefmkhoj.exe47⤵
- Executes dropped EXE
PID:5004 -
C:\Windows\SysWOW64\Fghicp32.exeC:\Windows\system32\Fghicp32.exe48⤵
- Modifies registry class
PID:5024 -
C:\Windows\SysWOW64\Fmaapjme.exeC:\Windows\system32\Fmaapjme.exe49⤵
- Drops file in System32 directory
PID:5040 -
C:\Windows\SysWOW64\Feijqgmg.exeC:\Windows\system32\Feijqgmg.exe50⤵
- Modifies registry class
PID:5056 -
C:\Windows\SysWOW64\Fgjfhp32.exeC:\Windows\system32\Fgjfhp32.exe51⤵
- Drops file in System32 directory
PID:5072 -
C:\Windows\SysWOW64\Fndnej32.exeC:\Windows\system32\Fndnej32.exe52⤵PID:5088
-
C:\Windows\SysWOW64\Fekffg32.exeC:\Windows\system32\Fekffg32.exe53⤵
- Modifies registry class
PID:5104 -
C:\Windows\SysWOW64\Fhibbb32.exeC:\Windows\system32\Fhibbb32.exe54⤵PID:1052
-
C:\Windows\SysWOW64\Fockombe.exeC:\Windows\system32\Fockombe.exe55⤵PID:3900
-
C:\Windows\SysWOW64\Fabgkhai.exeC:\Windows\system32\Fabgkhai.exe56⤵
- Drops file in System32 directory
PID:1968 -
C:\Windows\SysWOW64\Fdpcgcpm.exeC:\Windows\system32\Fdpcgcpm.exe57⤵PID:2856
-
C:\Windows\SysWOW64\Fkjkdn32.exeC:\Windows\system32\Fkjkdn32.exe58⤵PID:4180
-
C:\Windows\SysWOW64\Gaddqh32.exeC:\Windows\system32\Gaddqh32.exe59⤵PID:4148
-
C:\Windows\SysWOW64\Gdbpmc32.exeC:\Windows\system32\Gdbpmc32.exe60⤵PID:4244
-
C:\Windows\SysWOW64\Ggalio32.exeC:\Windows\system32\Ggalio32.exe61⤵PID:4240
-
C:\Windows\SysWOW64\Gohdjl32.exeC:\Windows\system32\Gohdjl32.exe62⤵PID:4248
-
C:\Windows\SysWOW64\Gafqfg32.exeC:\Windows\system32\Gafqfg32.exe63⤵PID:4304
-
C:\Windows\SysWOW64\Ghqicadp.exeC:\Windows\system32\Ghqicadp.exe64⤵PID:4368
-
C:\Windows\SysWOW64\Gkoeomcd.exeC:\Windows\system32\Gkoeomcd.exe65⤵PID:4440
-
C:\Windows\SysWOW64\Gnmakh32.exeC:\Windows\system32\Gnmakh32.exe66⤵PID:4532
-
C:\Windows\SysWOW64\Gedilf32.exeC:\Windows\system32\Gedilf32.exe67⤵PID:4612
-
C:\Windows\SysWOW64\Ghceha32.exeC:\Windows\system32\Ghceha32.exe68⤵
- Drops file in System32 directory
- Modifies registry class
PID:4692 -
C:\Windows\SysWOW64\Gnpnah32.exeC:\Windows\system32\Gnpnah32.exe69⤵PID:4792
-
C:\Windows\SysWOW64\Gegfbe32.exeC:\Windows\system32\Gegfbe32.exe70⤵
- Modifies registry class
PID:4872 -
C:\Windows\SysWOW64\Ghebna32.exeC:\Windows\system32\Ghebna32.exe71⤵PID:4952
-
C:\Windows\SysWOW64\Goojkkhh.exeC:\Windows\system32\Goojkkhh.exe72⤵
- Modifies registry class
PID:5012 -
C:\Windows\SysWOW64\Geibgeod.exeC:\Windows\system32\Geibgeod.exe73⤵
- Drops file in System32 directory
PID:5132 -
C:\Windows\SysWOW64\Ghhocqnh.exeC:\Windows\system32\Ghhocqnh.exe74⤵PID:5148
-
C:\Windows\SysWOW64\Gkfkplml.exeC:\Windows\system32\Gkfkplml.exe75⤵
- Modifies registry class
PID:5164 -
C:\Windows\SysWOW64\Hapclf32.exeC:\Windows\system32\Hapclf32.exe76⤵PID:5180
-
C:\Windows\SysWOW64\Hdnpia32.exeC:\Windows\system32\Hdnpia32.exe77⤵
- Modifies registry class
PID:5196 -
C:\Windows\SysWOW64\Hkhhelki.exeC:\Windows\system32\Hkhhelki.exe78⤵PID:5212
-
C:\Windows\SysWOW64\Hngdagjm.exeC:\Windows\system32\Hngdagjm.exe79⤵PID:5228
-
C:\Windows\SysWOW64\Hdqlnabj.exeC:\Windows\system32\Hdqlnabj.exe80⤵PID:5244
-
C:\Windows\SysWOW64\Hgohjman.exeC:\Windows\system32\Hgohjman.exe81⤵PID:5268
-
C:\Windows\SysWOW64\Hofqkjap.exeC:\Windows\system32\Hofqkjap.exe82⤵PID:5304
-
C:\Windows\SysWOW64\Hadmgeqc.exeC:\Windows\system32\Hadmgeqc.exe83⤵PID:5332
-
C:\Windows\SysWOW64\Hdcidapg.exeC:\Windows\system32\Hdcidapg.exe84⤵PID:5376
-
C:\Windows\SysWOW64\Hkmaqk32.exeC:\Windows\system32\Hkmaqk32.exe85⤵PID:5396
-
C:\Windows\SysWOW64\Hbgimeoa.exeC:\Windows\system32\Hbgimeoa.exe86⤵
- Drops file in System32 directory
PID:5412 -
C:\Windows\SysWOW64\Hdeeiqnd.exeC:\Windows\system32\Hdeeiqnd.exe87⤵PID:5428
-
C:\Windows\SysWOW64\Hgdbel32.exeC:\Windows\system32\Hgdbel32.exe88⤵PID:5444
-
C:\Windows\SysWOW64\Hokjfi32.exeC:\Windows\system32\Hokjfi32.exe89⤵PID:5460
-
C:\Windows\SysWOW64\Hfebcceg.exeC:\Windows\system32\Hfebcceg.exe90⤵PID:5488
-
C:\Windows\SysWOW64\Hhcnoodk.exeC:\Windows\system32\Hhcnoodk.exe91⤵PID:5504
-
C:\Windows\SysWOW64\Iomfli32.exeC:\Windows\system32\Iomfli32.exe92⤵
- Drops file in System32 directory
PID:5520 -
C:\Windows\SysWOW64\Idjodp32.exeC:\Windows\system32\Idjodp32.exe93⤵PID:5536
-
C:\Windows\SysWOW64\Ikdgaj32.exeC:\Windows\system32\Ikdgaj32.exe94⤵
- Drops file in System32 directory
PID:5552 -
C:\Windows\SysWOW64\Inbcme32.exeC:\Windows\system32\Inbcme32.exe95⤵
- Drops file in System32 directory
PID:5568 -
C:\Windows\SysWOW64\Idlljphm.exeC:\Windows\system32\Idlljphm.exe96⤵PID:5584
-
C:\Windows\SysWOW64\Ikfdgj32.exeC:\Windows\system32\Ikfdgj32.exe97⤵PID:5600
-
C:\Windows\SysWOW64\Inepce32.exeC:\Windows\system32\Inepce32.exe98⤵PID:5616
-
C:\Windows\SysWOW64\Iflhdb32.exeC:\Windows\system32\Iflhdb32.exe99⤵PID:5632
-
C:\Windows\SysWOW64\Igmelken.exeC:\Windows\system32\Igmelken.exe100⤵PID:5648
-
C:\Windows\SysWOW64\Ingmhelj.exeC:\Windows\system32\Ingmhelj.exe101⤵
- Drops file in System32 directory
PID:5668 -
C:\Windows\SysWOW64\Idaeeo32.exeC:\Windows\system32\Idaeeo32.exe102⤵PID:5684
-
C:\Windows\SysWOW64\Ikkmaikd.exeC:\Windows\system32\Ikkmaikd.exe103⤵PID:5700
-
C:\Windows\SysWOW64\Ibeeoc32.exeC:\Windows\system32\Ibeeoc32.exe104⤵PID:5716
-
C:\Windows\SysWOW64\Iionkmjn.exeC:\Windows\system32\Iionkmjn.exe105⤵
- Modifies registry class
PID:5732 -
C:\Windows\SysWOW64\Joifhgaj.exeC:\Windows\system32\Joifhgaj.exe106⤵PID:5748
-
C:\Windows\SysWOW64\Jfcnda32.exeC:\Windows\system32\Jfcnda32.exe107⤵
- Modifies registry class
PID:5764 -
C:\Windows\SysWOW64\Jiakqm32.exeC:\Windows\system32\Jiakqm32.exe108⤵PID:5780
-
C:\Windows\SysWOW64\Jkpgmh32.exeC:\Windows\system32\Jkpgmh32.exe109⤵PID:5796
-
C:\Windows\SysWOW64\Jbjoibok.exeC:\Windows\system32\Jbjoibok.exe110⤵PID:5812
-
C:\Windows\SysWOW64\Jidgfm32.exeC:\Windows\system32\Jidgfm32.exe111⤵PID:5828
-
C:\Windows\SysWOW64\Jonpcgme.exeC:\Windows\system32\Jonpcgme.exe112⤵PID:5844
-
C:\Windows\SysWOW64\Jbllob32.exeC:\Windows\system32\Jbllob32.exe113⤵
- Modifies registry class
PID:5860 -
C:\Windows\SysWOW64\Jifdlldf.exeC:\Windows\system32\Jifdlldf.exe114⤵PID:5876
-
C:\Windows\SysWOW64\Joplhf32.exeC:\Windows\system32\Joplhf32.exe115⤵PID:5892
-
C:\Windows\SysWOW64\Jfjdeqbo.exeC:\Windows\system32\Jfjdeqbo.exe116⤵PID:5908
-
C:\Windows\SysWOW64\Jbaejahc.exeC:\Windows\system32\Jbaejahc.exe117⤵PID:5924
-
C:\Windows\SysWOW64\Jikmgl32.exeC:\Windows\system32\Jikmgl32.exe118⤵PID:5940
-
C:\Windows\SysWOW64\Kpeecfgm.exeC:\Windows\system32\Kpeecfgm.exe119⤵PID:5956
-
C:\Windows\SysWOW64\Kbcbpafa.exeC:\Windows\system32\Kbcbpafa.exe120⤵
- Drops file in System32 directory
PID:5972 -
C:\Windows\SysWOW64\Kimjlk32.exeC:\Windows\system32\Kimjlk32.exe121⤵PID:5988
-
C:\Windows\SysWOW64\Kpgbieej.exeC:\Windows\system32\Kpgbieej.exe122⤵PID:6004
-
C:\Windows\SysWOW64\Kfakfpmg.exeC:\Windows\system32\Kfakfpmg.exe123⤵PID:6020
-
C:\Windows\SysWOW64\Kipgbklk.exeC:\Windows\system32\Kipgbklk.exe124⤵
- Modifies registry class
PID:6040 -
C:\Windows\SysWOW64\Knlojbjb.exeC:\Windows\system32\Knlojbjb.exe125⤵PID:6056
-
C:\Windows\SysWOW64\Kefggl32.exeC:\Windows\system32\Kefggl32.exe126⤵PID:6072
-
C:\Windows\SysWOW64\Kgddcg32.exeC:\Windows\system32\Kgddcg32.exe127⤵PID:6088
-
C:\Windows\SysWOW64\Knolpahp.exeC:\Windows\system32\Knolpahp.exe128⤵PID:6104
-
C:\Windows\SysWOW64\Kehdml32.exeC:\Windows\system32\Kehdml32.exe129⤵PID:6120
-
C:\Windows\SysWOW64\Klblif32.exeC:\Windows\system32\Klblif32.exe130⤵PID:6136
-
C:\Windows\SysWOW64\Kbmefpnf.exeC:\Windows\system32\Kbmefpnf.exe131⤵
- Drops file in System32 directory
PID:4012 -
C:\Windows\SysWOW64\Kifmbj32.exeC:\Windows\system32\Kifmbj32.exe132⤵PID:364
-
C:\Windows\SysWOW64\Lpqeodmp.exeC:\Windows\system32\Lpqeodmp.exe133⤵PID:2256
-
C:\Windows\SysWOW64\Lfjmln32.exeC:\Windows\system32\Lfjmln32.exe134⤵PID:2452
-
C:\Windows\SysWOW64\Lhljdf32.exeC:\Windows\system32\Lhljdf32.exe135⤵PID:2460
-
C:\Windows\SysWOW64\Lnebqqbh.exeC:\Windows\system32\Lnebqqbh.exe136⤵PID:2416
-
C:\Windows\SysWOW64\Lepjmk32.exeC:\Windows\system32\Lepjmk32.exe137⤵PID:3864
-
C:\Windows\SysWOW64\Lhnfif32.exeC:\Windows\system32\Lhnfif32.exe138⤵PID:6152
-
C:\Windows\SysWOW64\Lnhofppe.exeC:\Windows\system32\Lnhofppe.exe139⤵PID:6168
-
C:\Windows\SysWOW64\Lebgcj32.exeC:\Windows\system32\Lebgcj32.exe140⤵PID:6184
-
C:\Windows\SysWOW64\Lllopd32.exeC:\Windows\system32\Lllopd32.exe141⤵
- Drops file in System32 directory
PID:6200 -
C:\Windows\SysWOW64\Lbfglofk.exeC:\Windows\system32\Lbfglofk.exe142⤵PID:6216
-
C:\Windows\SysWOW64\Lippii32.exeC:\Windows\system32\Lippii32.exe143⤵PID:6232
-
C:\Windows\SysWOW64\Lpjhecee.exeC:\Windows\system32\Lpjhecee.exe144⤵PID:6248
-
C:\Windows\SysWOW64\Lfdpbm32.exeC:\Windows\system32\Lfdpbm32.exe145⤵
- Drops file in System32 directory
PID:6264 -
C:\Windows\SysWOW64\Miblnh32.exeC:\Windows\system32\Miblnh32.exe146⤵PID:6280
-
C:\Windows\SysWOW64\Mplekb32.exeC:\Windows\system32\Mplekb32.exe147⤵PID:6296
-
C:\Windows\SysWOW64\Mffmhmjo.exeC:\Windows\system32\Mffmhmjo.exe148⤵
- Drops file in System32 directory
PID:6312 -
C:\Windows\SysWOW64\Mhgipe32.exeC:\Windows\system32\Mhgipe32.exe149⤵PID:6328
-
C:\Windows\SysWOW64\Mpoaqb32.exeC:\Windows\system32\Mpoaqb32.exe150⤵PID:6344
-
C:\Windows\SysWOW64\Mfhjmlhm.exeC:\Windows\system32\Mfhjmlhm.exe151⤵PID:6360
-
C:\Windows\SysWOW64\Migfihgp.exeC:\Windows\system32\Migfihgp.exe152⤵PID:6376
-
C:\Windows\SysWOW64\Mpanfb32.exeC:\Windows\system32\Mpanfb32.exe153⤵PID:6392
-
C:\Windows\SysWOW64\Mfkfcl32.exeC:\Windows\system32\Mfkfcl32.exe154⤵PID:6408
-
C:\Windows\SysWOW64\Mhlckdlh.exeC:\Windows\system32\Mhlckdlh.exe155⤵PID:6424
-
C:\Windows\SysWOW64\Mofkgn32.exeC:\Windows\system32\Mofkgn32.exe156⤵PID:6440
-
C:\Windows\SysWOW64\Mfmchl32.exeC:\Windows\system32\Mfmchl32.exe157⤵PID:6456
-
C:\Windows\SysWOW64\Milodg32.exeC:\Windows\system32\Milodg32.exe158⤵
- Drops file in System32 directory
PID:6472 -
C:\Windows\SysWOW64\Mpegaakh.exeC:\Windows\system32\Mpegaakh.exe159⤵
- Modifies registry class
PID:6488 -
C:\Windows\SysWOW64\Mbddnm32.exeC:\Windows\system32\Mbddnm32.exe160⤵PID:6504
-
C:\Windows\SysWOW64\Nhqlfc32.exeC:\Windows\system32\Nhqlfc32.exe161⤵PID:6520
-
C:\Windows\SysWOW64\Nphdga32.exeC:\Windows\system32\Nphdga32.exe162⤵PID:6536
-
C:\Windows\SysWOW64\Nfbmckpb.exeC:\Windows\system32\Nfbmckpb.exe163⤵PID:6552
-
C:\Windows\SysWOW64\Nhcikc32.exeC:\Windows\system32\Nhcikc32.exe164⤵
- Drops file in System32 directory
PID:6568 -
C:\Windows\SysWOW64\Nomahmnm.exeC:\Windows\system32\Nomahmnm.exe165⤵
- Modifies registry class
PID:6584 -
C:\Windows\SysWOW64\Nfdiik32.exeC:\Windows\system32\Nfdiik32.exe166⤵PID:6600
-
C:\Windows\SysWOW64\Nhefacdn.exeC:\Windows\system32\Nhefacdn.exe167⤵PID:6616
-
C:\Windows\SysWOW64\Npmnbpep.exeC:\Windows\system32\Npmnbpep.exe168⤵PID:6632
-
C:\Windows\SysWOW64\Nfffoj32.exeC:\Windows\system32\Nfffoj32.exe169⤵
- Modifies registry class
PID:6648 -
C:\Windows\SysWOW64\Nhhbfbbk.exeC:\Windows\system32\Nhhbfbbk.exe170⤵PID:6664
-
C:\Windows\SysWOW64\Npojgpbm.exeC:\Windows\system32\Npojgpbm.exe171⤵PID:6680
-
C:\Windows\SysWOW64\Ngibdj32.exeC:\Windows\system32\Ngibdj32.exe172⤵PID:6696
-
C:\Windows\SysWOW64\Nigoqein.exeC:\Windows\system32\Nigoqein.exe173⤵PID:6712
-
C:\Windows\SysWOW64\Npagmp32.exeC:\Windows\system32\Npagmp32.exe174⤵
- Modifies registry class
PID:6728 -
C:\Windows\SysWOW64\Oloncppg.exeC:\Windows\system32\Oloncppg.exe175⤵
- Drops file in System32 directory
PID:6744 -
C:\Windows\SysWOW64\Ocifpj32.exeC:\Windows\system32\Ocifpj32.exe176⤵
- Drops file in System32 directory
PID:6760 -
C:\Windows\SysWOW64\Oicnldop.exeC:\Windows\system32\Oicnldop.exe177⤵
- Drops file in System32 directory
PID:6776 -
C:\Windows\SysWOW64\Oopgdkmh.exeC:\Windows\system32\Oopgdkmh.exe178⤵PID:6792
-
C:\Windows\SysWOW64\Pggoehnj.exeC:\Windows\system32\Pggoehnj.exe179⤵PID:6808
-
C:\Windows\SysWOW64\Phhkmp32.exeC:\Windows\system32\Phhkmp32.exe180⤵PID:6824
-
C:\Windows\SysWOW64\Pobcjj32.exeC:\Windows\system32\Pobcjj32.exe181⤵PID:6840
-
C:\Windows\SysWOW64\Pgilkh32.exeC:\Windows\system32\Pgilkh32.exe182⤵PID:6856
-
C:\Windows\SysWOW64\Phjhcpbe.exeC:\Windows\system32\Phjhcpbe.exe183⤵PID:6872
-
C:\Windows\SysWOW64\Pcplpiak.exeC:\Windows\system32\Pcplpiak.exe184⤵
- Drops file in System32 directory
PID:6888 -
C:\Windows\SysWOW64\Pjjdmc32.exeC:\Windows\system32\Pjjdmc32.exe185⤵
- Modifies registry class
PID:6904 -
C:\Windows\SysWOW64\Plhqin32.exeC:\Windows\system32\Plhqin32.exe186⤵PID:6916
-
C:\Windows\SysWOW64\Pogmejgp.exeC:\Windows\system32\Pogmejgp.exe187⤵PID:6936
-
C:\Windows\SysWOW64\Peaebd32.exeC:\Windows\system32\Peaebd32.exe188⤵PID:6952
-
C:\Windows\SysWOW64\Plknonfi.exeC:\Windows\system32\Plknonfi.exe189⤵PID:6968
-
C:\Windows\SysWOW64\Poijkiem.exeC:\Windows\system32\Poijkiem.exe190⤵
- Drops file in System32 directory
PID:6984 -
C:\Windows\SysWOW64\Pgpalgfo.exeC:\Windows\system32\Pgpalgfo.exe191⤵PID:7000
-
C:\Windows\SysWOW64\Phanco32.exeC:\Windows\system32\Phanco32.exe192⤵PID:7012
-
C:\Windows\SysWOW64\Ppifdl32.exeC:\Windows\system32\Ppifdl32.exe193⤵
- Drops file in System32 directory
PID:7040 -
C:\Windows\SysWOW64\Qfeomckg.exeC:\Windows\system32\Qfeomckg.exe194⤵PID:7080
-
C:\Windows\SysWOW64\Qlpgjm32.exeC:\Windows\system32\Qlpgjm32.exe195⤵PID:7096
-
C:\Windows\SysWOW64\Qoncfi32.exeC:\Windows\system32\Qoncfi32.exe196⤵PID:7112
-
C:\Windows\SysWOW64\Qgekgf32.exeC:\Windows\system32\Qgekgf32.exe197⤵PID:7124
-
C:\Windows\SysWOW64\Qhfgonhh.exeC:\Windows\system32\Qhfgonhh.exe198⤵PID:7144
-
C:\Windows\SysWOW64\Aoppkh32.exeC:\Windows\system32\Aoppkh32.exe199⤵
- Drops file in System32 directory
PID:7160 -
C:\Windows\SysWOW64\Ahhddn32.exeC:\Windows\system32\Ahhddn32.exe200⤵
- Modifies registry class
PID:7176 -
C:\Windows\SysWOW64\Aobmahmb.exeC:\Windows\system32\Aobmahmb.exe201⤵PID:7192
-
C:\Windows\SysWOW64\Acnhag32.exeC:\Windows\system32\Acnhag32.exe202⤵
- Modifies registry class
PID:7208 -
C:\Windows\SysWOW64\Ajhanamh.exeC:\Windows\system32\Ajhanamh.exe203⤵PID:7224
-
C:\Windows\SysWOW64\Aqbikk32.exeC:\Windows\system32\Aqbikk32.exe204⤵PID:7240
-
C:\Windows\SysWOW64\Aglagelb.exeC:\Windows\system32\Aglagelb.exe205⤵PID:7256
-
C:\Windows\SysWOW64\Ajjncq32.exeC:\Windows\system32\Ajjncq32.exe206⤵PID:7272
-
C:\Windows\SysWOW64\Amijpl32.exeC:\Windows\system32\Amijpl32.exe207⤵PID:7288
-
C:\Windows\SysWOW64\Accbmfaf.exeC:\Windows\system32\Accbmfaf.exe208⤵
- Drops file in System32 directory
PID:7304 -
C:\Windows\SysWOW64\Afaniaqj.exeC:\Windows\system32\Afaniaqj.exe209⤵PID:7320
-
C:\Windows\SysWOW64\Amkfel32.exeC:\Windows\system32\Amkfel32.exe210⤵PID:7336
-
C:\Windows\SysWOW64\Aoibag32.exeC:\Windows\system32\Aoibag32.exe211⤵PID:7352
-
C:\Windows\SysWOW64\Afcknang.exeC:\Windows\system32\Afcknang.exe212⤵
- Modifies registry class
PID:7368 -
C:\Windows\SysWOW64\Amnckkfd.exeC:\Windows\system32\Amnckkfd.exe213⤵PID:7384
-
C:\Windows\SysWOW64\Bologgeh.exeC:\Windows\system32\Bologgeh.exe214⤵PID:7400
-
C:\Windows\SysWOW64\Bffhda32.exeC:\Windows\system32\Bffhda32.exe215⤵
- Drops file in System32 directory
- Modifies registry class
PID:7416 -
C:\Windows\SysWOW64\Bmppqkda.exeC:\Windows\system32\Bmppqkda.exe216⤵PID:7432
-
C:\Windows\SysWOW64\Bonlmfce.exeC:\Windows\system32\Bonlmfce.exe217⤵PID:7448
-
C:\Windows\SysWOW64\Bgednccg.exeC:\Windows\system32\Bgednccg.exe218⤵PID:7464
-
C:\Windows\SysWOW64\Bifqel32.exeC:\Windows\system32\Bifqel32.exe219⤵PID:7480
-
C:\Windows\SysWOW64\Boqibf32.exeC:\Windows\system32\Boqibf32.exe220⤵PID:7496
-
C:\Windows\SysWOW64\Bfkaopho.exeC:\Windows\system32\Bfkaopho.exe221⤵PID:7512
-
C:\Windows\SysWOW64\Biimklgc.exeC:\Windows\system32\Biimklgc.exe222⤵PID:7528
-
C:\Windows\SysWOW64\Bocehf32.exeC:\Windows\system32\Bocehf32.exe223⤵PID:7544
-
C:\Windows\SysWOW64\Bfmndpfm.exeC:\Windows\system32\Bfmndpfm.exe224⤵PID:7560
-
C:\Windows\SysWOW64\Bmgfaj32.exeC:\Windows\system32\Bmgfaj32.exe225⤵PID:7576
-
C:\Windows\SysWOW64\Ccehicaa.exeC:\Windows\system32\Ccehicaa.exe226⤵PID:7592
-
C:\Windows\SysWOW64\Cjppen32.exeC:\Windows\system32\Cjppen32.exe227⤵PID:7608
-
C:\Windows\SysWOW64\Cmnlbi32.exeC:\Windows\system32\Cmnlbi32.exe228⤵
- Modifies registry class
PID:7624 -
C:\Windows\SysWOW64\Cchdocon.exeC:\Windows\system32\Cchdocon.exe229⤵PID:7640
-
C:\Windows\SysWOW64\Cidmgjme.exeC:\Windows\system32\Cidmgjme.exe230⤵PID:7656
-
C:\Windows\SysWOW64\Cqlehgnh.exeC:\Windows\system32\Cqlehgnh.exe231⤵
- Drops file in System32 directory
- Modifies registry class
PID:7672 -
C:\Windows\SysWOW64\Ccjadb32.exeC:\Windows\system32\Ccjadb32.exe232⤵PID:7688
-
C:\Windows\SysWOW64\Cjdiqmdh.exeC:\Windows\system32\Cjdiqmdh.exe233⤵PID:7704
-
C:\Windows\SysWOW64\Cpabicbp.exeC:\Windows\system32\Cpabicbp.exe234⤵PID:7720
-
C:\Windows\SysWOW64\Cfkjfn32.exeC:\Windows\system32\Cfkjfn32.exe235⤵PID:7736
-
C:\Windows\SysWOW64\Ciifbi32.exeC:\Windows\system32\Ciifbi32.exe236⤵PID:7752
-
C:\Windows\SysWOW64\Daqncf32.exeC:\Windows\system32\Daqncf32.exe237⤵PID:7768
-
C:\Windows\SysWOW64\Dgjfpq32.exeC:\Windows\system32\Dgjfpq32.exe238⤵PID:7784
-
C:\Windows\SysWOW64\Dilcgign.exeC:\Windows\system32\Dilcgign.exe239⤵PID:7800
-
C:\Windows\SysWOW64\Dpfkdc32.exeC:\Windows\system32\Dpfkdc32.exe240⤵
- Drops file in System32 directory
PID:7816 -
C:\Windows\SysWOW64\Dfpcamfg.exeC:\Windows\system32\Dfpcamfg.exe241⤵PID:7832
-
C:\Windows\SysWOW64\Dinpmhek.exeC:\Windows\system32\Dinpmhek.exe242⤵PID:7848