Analysis
-
max time kernel
134s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
15-05-2021 14:42
Static task
static1
Behavioral task
behavioral1
Sample
9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d.exe
-
Size
1.1MB
-
MD5
0a44ea401960942fb659e2516a47a230
-
SHA1
af730afece5517a2e8e27d873d2241814381feb2
-
SHA256
9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d
-
SHA512
73a110d75540dd3b33d344e3bcf7633d19bc74f703d709de93a6389fd22ee8429267c175c1adafd9816924b421ed9b3dc1a33d4d4f93887b179f33eec5bea31a
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs
-
Executes dropped EXE 64 IoCs
pid Process 1916 Fqhadkjd.exe 1504 Fppkkgli.exe 1976 Fpbhagjg.exe 1780 Fflpnabc.exe 1712 Gdfjpj32.exe 1704 Ghgokh32.exe 1384 Idpiel32.exe 1220 Jhfhiodn.exe 1488 Jhkadnqi.exe 1696 Kobiklmd.exe 556 Kjjjmdjg.exe 1192 Lipgoaoo.exe 1468 Lcnajn32.exe 1644 Lemnda32.exe 1620 Mhngfl32.exe 1512 Nkloakmk.exe 1408 Ngemkkam.exe 2032 Oojdflfm.exe 1800 Pjaahh32.exe 1708 Qoojpo32.exe 1692 Qigoidkd.exe 1256 Qoagfobq.exe 1676 Aenoneah.exe 1228 Akhgkp32.exe 1004 Abapgjpb.exe 2036 Aeplceoe.exe 1520 Ajmdll32.exe 1992 Aceidacm.exe 1600 Aklafodp.exe 1464 Aaiinfbg.exe 304 Agcakp32.exe 1320 Ampjcghk.exe 1196 Acjbpa32.exe 660 Ajdjlkge.exe 2028 Bancie32.exe 1584 Bbooamdp.exe 2044 Bmdcnf32.exe 1776 Bbalfm32.exe 360 Bmgpcf32.exe 1736 Bebehh32.exe 1344 Bllmebgk.exe 1136 Baiemi32.exe 1528 Bhcnjclo.exe 876 Bomffm32.exe 1592 Bakbbi32.exe 1092 Chekocjm.exe 1796 Cooclm32.exe 1772 Ceikig32.exe 988 Cfjgpood.exe 2020 Cmdpmi32.exe 1156 Cdnhjcnn.exe 2060 Ckhpfn32.exe 2072 Cmglbi32.exe 2084 Cdqdoc32.exe 2096 Ckkmlmch.exe 2108 Cllide32.exe 2120 Cbfaqpac.exe 2132 Cpjbjdpm.exe 2144 Dbhnfo32.exe 2156 Dibfcifn.exe 2168 Dplopc32.exe 2184 Damkglci.exe 2196 Dlcpddco.exe 2208 Dekdmjjo.exe -
Loads dropped DLL 64 IoCs
pid Process 788 9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d.exe 788 9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d.exe 1916 Fqhadkjd.exe 1916 Fqhadkjd.exe 1504 Fppkkgli.exe 1504 Fppkkgli.exe 1976 Fpbhagjg.exe 1976 Fpbhagjg.exe 1780 Fflpnabc.exe 1780 Fflpnabc.exe 1712 Gdfjpj32.exe 1712 Gdfjpj32.exe 1704 Ghgokh32.exe 1704 Ghgokh32.exe 1384 Idpiel32.exe 1384 Idpiel32.exe 1220 Jhfhiodn.exe 1220 Jhfhiodn.exe 1488 Jhkadnqi.exe 1488 Jhkadnqi.exe 1696 Kobiklmd.exe 1696 Kobiklmd.exe 556 Kjjjmdjg.exe 556 Kjjjmdjg.exe 1192 Lipgoaoo.exe 1192 Lipgoaoo.exe 1468 Lcnajn32.exe 1468 Lcnajn32.exe 1644 Lemnda32.exe 1644 Lemnda32.exe 1620 Mhngfl32.exe 1620 Mhngfl32.exe 1512 Nkloakmk.exe 1512 Nkloakmk.exe 1408 Ngemkkam.exe 1408 Ngemkkam.exe 2032 Oojdflfm.exe 2032 Oojdflfm.exe 1800 Pjaahh32.exe 1800 Pjaahh32.exe 1708 Qoojpo32.exe 1708 Qoojpo32.exe 1692 Qigoidkd.exe 1692 Qigoidkd.exe 1256 Qoagfobq.exe 1256 Qoagfobq.exe 1676 Aenoneah.exe 1676 Aenoneah.exe 1228 Akhgkp32.exe 1228 Akhgkp32.exe 1004 Abapgjpb.exe 1004 Abapgjpb.exe 2036 Aeplceoe.exe 2036 Aeplceoe.exe 1520 Ajmdll32.exe 1520 Ajmdll32.exe 1992 Aceidacm.exe 1992 Aceidacm.exe 1600 Aklafodp.exe 1600 Aklafodp.exe 1464 Aaiinfbg.exe 1464 Aaiinfbg.exe 304 Agcakp32.exe 304 Agcakp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mdihgh32.dll Akbcdmkj.exe File opened for modification C:\Windows\SysWOW64\Lbmgkn32.exe Lggcne32.exe File created C:\Windows\SysWOW64\Jgmked32.exe Jpcbiklk.exe File created C:\Windows\SysWOW64\Lfdqkdih.exe Ldcdcl32.exe File created C:\Windows\SysWOW64\Mgopik32.exe Lbbgadid.exe File created C:\Windows\SysWOW64\Bnclfh32.exe Bgidinan.exe File created C:\Windows\SysWOW64\Ljmfpd32.dll Bacegc32.exe File created C:\Windows\SysWOW64\Cblhpkeb.exe Cpmlcofo.exe File created C:\Windows\SysWOW64\Ggbhia32.exe Gddlmf32.exe File opened for modification C:\Windows\SysWOW64\Heiagijc.exe Hibabh32.exe File created C:\Windows\SysWOW64\Ibfgkaco.dll Cdqdoc32.exe File created C:\Windows\SysWOW64\Oognkinn.dll Hjknfb32.exe File opened for modification C:\Windows\SysWOW64\Jhadcm32.exe Johpjgab.exe File created C:\Windows\SysWOW64\Aopqfbai.dll Heiagijc.exe File created C:\Windows\SysWOW64\Hngpoffi.dll Akhgkp32.exe File created C:\Windows\SysWOW64\Menmhhhh.dll Gqcmni32.exe File created C:\Windows\SysWOW64\Gfhejnph.exe Gefibf32.exe File created C:\Windows\SysWOW64\Kjhpqm32.exe Kcogdcla.exe File created C:\Windows\SysWOW64\Efbfhf32.dll Ceikig32.exe File opened for modification C:\Windows\SysWOW64\Phoano32.exe Peaebd32.exe File created C:\Windows\SysWOW64\Jaakqmqp.exe Jkgcdb32.exe File opened for modification C:\Windows\SysWOW64\Jddahg32.exe Johhpq32.exe File created C:\Windows\SysWOW64\Efpojjpe.dll Lqnkalbk.exe File created C:\Windows\SysWOW64\Aklafodp.exe Aceidacm.exe File created C:\Windows\SysWOW64\Hmaeqn32.dll Fqlgmjca.exe File created C:\Windows\SysWOW64\Jhadcm32.exe Johpjgab.exe File created C:\Windows\SysWOW64\Bgcgbhbk.dll Lbbgadid.exe File opened for modification C:\Windows\SysWOW64\Plhqin32.exe Penhldqo.exe File created C:\Windows\SysWOW64\Amkjnaie.exe Abeephio.exe File created C:\Windows\SysWOW64\Nabaaa32.dll Ejjbek32.exe File created C:\Windows\SysWOW64\Bebehh32.exe Bmgpcf32.exe File created C:\Windows\SysWOW64\Gbmmlpjm.exe Gpoqpdki.exe File opened for modification C:\Windows\SysWOW64\Jgmked32.exe Jpcbiklk.exe File created C:\Windows\SysWOW64\Kfdfpj32.dll Jjijlq32.exe File created C:\Windows\SysWOW64\Niaeha32.exe Nbgmkggk.exe File created C:\Windows\SysWOW64\Igmdnn32.dll Ohmhilmg.exe File created C:\Windows\SysWOW64\Bifoikde.dll Hpjcchbj.exe File opened for modification C:\Windows\SysWOW64\Kdagnlem.exe Kbpola32.exe File created C:\Windows\SysWOW64\Eondpmce.exe Edipbdco.exe File created C:\Windows\SysWOW64\Nochhied.dll Ckkmlmch.exe File opened for modification C:\Windows\SysWOW64\Gfdoaogk.exe Gcfcedhh.exe File created C:\Windows\SysWOW64\Iadodo32.dll Gelihkiq.exe File created C:\Windows\SysWOW64\Cgqeeamh.dll Pgdnolbh.exe File created C:\Windows\SysWOW64\Fppdbi32.dll Bnclfh32.exe File created C:\Windows\SysWOW64\Bcdniobm.exe Bafbmcci.exe File created C:\Windows\SysWOW64\Cbcnqj32.exe Clifdphn.exe File opened for modification C:\Windows\SysWOW64\Iflkdqno.exe Ieknmh32.exe File opened for modification C:\Windows\SysWOW64\Bmdcnf32.exe Bbooamdp.exe File created C:\Windows\SysWOW64\Opdpep32.dll Hajpnk32.exe File opened for modification C:\Windows\SysWOW64\Pcplpiak.exe Plfdco32.exe File created C:\Windows\SysWOW64\Iiamak32.exe Ifcaep32.exe File created C:\Windows\SysWOW64\Jddahg32.exe Johhpq32.exe File created C:\Windows\SysWOW64\Aeplceoe.exe Abapgjpb.exe File created C:\Windows\SysWOW64\Bmgpcf32.exe Bbalfm32.exe File created C:\Windows\SysWOW64\Cbfaqpac.exe Cllide32.exe File opened for modification C:\Windows\SysWOW64\Joklpgop.exe Jhadcm32.exe File opened for modification C:\Windows\SysWOW64\Oiqafd32.exe Oddinm32.exe File opened for modification C:\Windows\SysWOW64\Dihiahmh.exe Dbnadn32.exe File created C:\Windows\SysWOW64\Lmghllem.exe Ljhlpq32.exe File created C:\Windows\SysWOW64\Ffhida32.dll Lmghllem.exe File created C:\Windows\SysWOW64\Bbjmgcml.dll Ngemkkam.exe File opened for modification C:\Windows\SysWOW64\Aeplceoe.exe Abapgjpb.exe File created C:\Windows\SysWOW64\Iekcfjjh.dll Dkmfqp32.exe File created C:\Windows\SysWOW64\Hliphekl.dll Bfegkj32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4740 4732 WerFault.exe 416 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhcnjclo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oqifal32.dll" Cbfaqpac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbbhqkhb.dll" Mnkekelf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eolhjneg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghgokh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkjikqfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpjcchbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Deapdh32.dll" Kcogdcla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbaffkao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cddjhbei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nolmlpge.dll" Dgnfpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gemkpk32.dll" Fkeacald.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dekdmjjo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgnndn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lllehhol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ljkieqdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckhpfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpjcchbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoajakch.dll" Paqpff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkhodj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gflnef32.dll" Bgidinan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Johhpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acjbpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhhcojoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iaaoaind.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jaakqmqp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kcadicjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agcakp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obfpmkpk.dll" Bancie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbdqeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghiadh32.dll" Dppdhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mibnfj32.dll" Lfdqkdih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhhflned.dll" Fqidmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pddblihh.dll" Ilnmhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aeiejobk.dll" Lllehhol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgaiondl.dll" Idpiel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bancie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdnhjcnn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbkdgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fqidmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfmofamg.dll" Glokdfge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpaknlno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amkjnaie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdihgh32.dll" Akbcdmkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fninof32.dll" Kkoida32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mccmnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bndmnb32.dll" Hndnaapa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibbbfbic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjppmpof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpimib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Joelja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Midoalei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kipegpbg.dll" Cblhpkeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpngnfmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idpiel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhngfl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abapgjpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bebehh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nhhonm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhibmfjn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjfckn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmcbcnlp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkgmom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggplcbmc.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe 4740 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4740 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4740 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 788 wrote to memory of 1916 788 9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d.exe 25 PID 788 wrote to memory of 1916 788 9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d.exe 25 PID 788 wrote to memory of 1916 788 9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d.exe 25 PID 788 wrote to memory of 1916 788 9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d.exe 25 PID 1916 wrote to memory of 1504 1916 Fqhadkjd.exe 27 PID 1916 wrote to memory of 1504 1916 Fqhadkjd.exe 27 PID 1916 wrote to memory of 1504 1916 Fqhadkjd.exe 27 PID 1916 wrote to memory of 1504 1916 Fqhadkjd.exe 27 PID 1504 wrote to memory of 1976 1504 Fppkkgli.exe 28 PID 1504 wrote to memory of 1976 1504 Fppkkgli.exe 28 PID 1504 wrote to memory of 1976 1504 Fppkkgli.exe 28 PID 1504 wrote to memory of 1976 1504 Fppkkgli.exe 28 PID 1976 wrote to memory of 1780 1976 Fpbhagjg.exe 29 PID 1976 wrote to memory of 1780 1976 Fpbhagjg.exe 29 PID 1976 wrote to memory of 1780 1976 Fpbhagjg.exe 29 PID 1976 wrote to memory of 1780 1976 Fpbhagjg.exe 29 PID 1780 wrote to memory of 1712 1780 Fflpnabc.exe 30 PID 1780 wrote to memory of 1712 1780 Fflpnabc.exe 30 PID 1780 wrote to memory of 1712 1780 Fflpnabc.exe 30 PID 1780 wrote to memory of 1712 1780 Fflpnabc.exe 30 PID 1712 wrote to memory of 1704 1712 Gdfjpj32.exe 31 PID 1712 wrote to memory of 1704 1712 Gdfjpj32.exe 31 PID 1712 wrote to memory of 1704 1712 Gdfjpj32.exe 31 PID 1712 wrote to memory of 1704 1712 Gdfjpj32.exe 31 PID 1704 wrote to memory of 1384 1704 Ghgokh32.exe 32 PID 1704 wrote to memory of 1384 1704 Ghgokh32.exe 32 PID 1704 wrote to memory of 1384 1704 Ghgokh32.exe 32 PID 1704 wrote to memory of 1384 1704 Ghgokh32.exe 32 PID 1384 wrote to memory of 1220 1384 Idpiel32.exe 33 PID 1384 wrote to memory of 1220 1384 Idpiel32.exe 33 PID 1384 wrote to memory of 1220 1384 Idpiel32.exe 33 PID 1384 wrote to memory of 1220 1384 Idpiel32.exe 33 PID 1220 wrote to memory of 1488 1220 Jhfhiodn.exe 34 PID 1220 wrote to memory of 1488 1220 Jhfhiodn.exe 34 PID 1220 wrote to memory of 1488 1220 Jhfhiodn.exe 34 PID 1220 wrote to memory of 1488 1220 Jhfhiodn.exe 34 PID 1488 wrote to memory of 1696 1488 Jhkadnqi.exe 35 PID 1488 wrote to memory of 1696 1488 Jhkadnqi.exe 35 PID 1488 wrote to memory of 1696 1488 Jhkadnqi.exe 35 PID 1488 wrote to memory of 1696 1488 Jhkadnqi.exe 35 PID 1696 wrote to memory of 556 1696 Kobiklmd.exe 37 PID 1696 wrote to memory of 556 1696 Kobiklmd.exe 37 PID 1696 wrote to memory of 556 1696 Kobiklmd.exe 37 PID 1696 wrote to memory of 556 1696 Kobiklmd.exe 37 PID 556 wrote to memory of 1192 556 Kjjjmdjg.exe 38 PID 556 wrote to memory of 1192 556 Kjjjmdjg.exe 38 PID 556 wrote to memory of 1192 556 Kjjjmdjg.exe 38 PID 556 wrote to memory of 1192 556 Kjjjmdjg.exe 38 PID 1192 wrote to memory of 1468 1192 Lipgoaoo.exe 43 PID 1192 wrote to memory of 1468 1192 Lipgoaoo.exe 43 PID 1192 wrote to memory of 1468 1192 Lipgoaoo.exe 43 PID 1192 wrote to memory of 1468 1192 Lipgoaoo.exe 43 PID 1468 wrote to memory of 1644 1468 Lcnajn32.exe 42 PID 1468 wrote to memory of 1644 1468 Lcnajn32.exe 42 PID 1468 wrote to memory of 1644 1468 Lcnajn32.exe 42 PID 1468 wrote to memory of 1644 1468 Lcnajn32.exe 42 PID 1644 wrote to memory of 1620 1644 Lemnda32.exe 41 PID 1644 wrote to memory of 1620 1644 Lemnda32.exe 41 PID 1644 wrote to memory of 1620 1644 Lemnda32.exe 41 PID 1644 wrote to memory of 1620 1644 Lemnda32.exe 41 PID 1620 wrote to memory of 1512 1620 Mhngfl32.exe 44 PID 1620 wrote to memory of 1512 1620 Mhngfl32.exe 44 PID 1620 wrote to memory of 1512 1620 Mhngfl32.exe 44 PID 1620 wrote to memory of 1512 1620 Mhngfl32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d.exe"C:\Users\Admin\AppData\Local\Temp\9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\Fqhadkjd.exeC:\Windows\system32\Fqhadkjd.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\Fppkkgli.exeC:\Windows\system32\Fppkkgli.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\Fpbhagjg.exeC:\Windows\system32\Fpbhagjg.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\Fflpnabc.exeC:\Windows\system32\Fflpnabc.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\Gdfjpj32.exeC:\Windows\system32\Gdfjpj32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\Ghgokh32.exeC:\Windows\system32\Ghgokh32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\Idpiel32.exeC:\Windows\system32\Idpiel32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\Jhfhiodn.exeC:\Windows\system32\Jhfhiodn.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\Jhkadnqi.exeC:\Windows\system32\Jhkadnqi.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\Kobiklmd.exeC:\Windows\system32\Kobiklmd.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\Kjjjmdjg.exeC:\Windows\system32\Kjjjmdjg.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\Lipgoaoo.exeC:\Windows\system32\Lipgoaoo.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\Lcnajn32.exeC:\Windows\system32\Lcnajn32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1468
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Mhngfl32.exeC:\Windows\system32\Mhngfl32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\Nkloakmk.exeC:\Windows\system32\Nkloakmk.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1512 -
C:\Windows\SysWOW64\Ngemkkam.exeC:\Windows\system32\Ngemkkam.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1408 -
C:\Windows\SysWOW64\Oojdflfm.exeC:\Windows\system32\Oojdflfm.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Windows\SysWOW64\Pjaahh32.exeC:\Windows\system32\Pjaahh32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800 -
C:\Windows\SysWOW64\Qoojpo32.exeC:\Windows\system32\Qoojpo32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708 -
C:\Windows\SysWOW64\Qigoidkd.exeC:\Windows\system32\Qigoidkd.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Windows\SysWOW64\Qoagfobq.exeC:\Windows\system32\Qoagfobq.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1256 -
C:\Windows\SysWOW64\Aenoneah.exeC:\Windows\system32\Aenoneah.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Windows\SysWOW64\Akhgkp32.exeC:\Windows\system32\Akhgkp32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1228 -
C:\Windows\SysWOW64\Abapgjpb.exeC:\Windows\system32\Abapgjpb.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Aeplceoe.exeC:\Windows\system32\Aeplceoe.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2036 -
C:\Windows\SysWOW64\Ajmdll32.exeC:\Windows\system32\Ajmdll32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1520 -
C:\Windows\SysWOW64\Aceidacm.exeC:\Windows\system32\Aceidacm.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\Aklafodp.exeC:\Windows\system32\Aklafodp.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Windows\SysWOW64\Aaiinfbg.exeC:\Windows\system32\Aaiinfbg.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1464 -
C:\Windows\SysWOW64\Agcakp32.exeC:\Windows\system32\Agcakp32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:304 -
C:\Windows\SysWOW64\Ampjcghk.exeC:\Windows\system32\Ampjcghk.exe18⤵
- Executes dropped EXE
PID:1320 -
C:\Windows\SysWOW64\Acjbpa32.exeC:\Windows\system32\Acjbpa32.exe19⤵
- Executes dropped EXE
- Modifies registry class
PID:1196 -
C:\Windows\SysWOW64\Ajdjlkge.exeC:\Windows\system32\Ajdjlkge.exe20⤵
- Executes dropped EXE
PID:660 -
C:\Windows\SysWOW64\Bancie32.exeC:\Windows\system32\Bancie32.exe21⤵
- Executes dropped EXE
- Modifies registry class
PID:2028 -
C:\Windows\SysWOW64\Bbooamdp.exeC:\Windows\system32\Bbooamdp.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\Bmdcnf32.exeC:\Windows\system32\Bmdcnf32.exe23⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\Bbalfm32.exeC:\Windows\system32\Bbalfm32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1776 -
C:\Windows\SysWOW64\Bmgpcf32.exeC:\Windows\system32\Bmgpcf32.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:360 -
C:\Windows\SysWOW64\Bebehh32.exeC:\Windows\system32\Bebehh32.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:1736 -
C:\Windows\SysWOW64\Bllmebgk.exeC:\Windows\system32\Bllmebgk.exe27⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\Baiemi32.exeC:\Windows\system32\Baiemi32.exe28⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\Bhcnjclo.exeC:\Windows\system32\Bhcnjclo.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\Bomffm32.exeC:\Windows\system32\Bomffm32.exe30⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\Bakbbi32.exeC:\Windows\system32\Bakbbi32.exe31⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\Chekocjm.exeC:\Windows\system32\Chekocjm.exe32⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Cooclm32.exeC:\Windows\system32\Cooclm32.exe33⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\Ceikig32.exeC:\Windows\system32\Ceikig32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1772 -
C:\Windows\SysWOW64\Cfjgpood.exeC:\Windows\system32\Cfjgpood.exe35⤵
- Executes dropped EXE
PID:988 -
C:\Windows\SysWOW64\Cmdpmi32.exeC:\Windows\system32\Cmdpmi32.exe36⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\Cdnhjcnn.exeC:\Windows\system32\Cdnhjcnn.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:1156 -
C:\Windows\SysWOW64\Ckhpfn32.exeC:\Windows\system32\Ckhpfn32.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:2060 -
C:\Windows\SysWOW64\Cmglbi32.exeC:\Windows\system32\Cmglbi32.exe39⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\Cdqdoc32.exeC:\Windows\system32\Cdqdoc32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\Ckkmlmch.exeC:\Windows\system32\Ckkmlmch.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2096 -
C:\Windows\SysWOW64\Cllide32.exeC:\Windows\system32\Cllide32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2108 -
C:\Windows\SysWOW64\Cbfaqpac.exeC:\Windows\system32\Cbfaqpac.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:2120 -
C:\Windows\SysWOW64\Cpjbjdpm.exeC:\Windows\system32\Cpjbjdpm.exe44⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\Dbhnfo32.exeC:\Windows\system32\Dbhnfo32.exe45⤵
- Executes dropped EXE
PID:2144 -
C:\Windows\SysWOW64\Dibfcifn.exeC:\Windows\system32\Dibfcifn.exe46⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\Dplopc32.exeC:\Windows\system32\Dplopc32.exe47⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\Damkglci.exeC:\Windows\system32\Damkglci.exe48⤵
- Executes dropped EXE
PID:2184 -
C:\Windows\SysWOW64\Dlcpddco.exeC:\Windows\system32\Dlcpddco.exe49⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\Dekdmjjo.exeC:\Windows\system32\Dekdmjjo.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:2208 -
C:\Windows\SysWOW64\Dleljd32.exeC:\Windows\system32\Dleljd32.exe51⤵PID:2220
-
C:\Windows\SysWOW64\Dabebk32.exeC:\Windows\system32\Dabebk32.exe52⤵PID:2228
-
C:\Windows\SysWOW64\Dhlmoegp.exeC:\Windows\system32\Dhlmoegp.exe53⤵PID:2236
-
C:\Windows\SysWOW64\Dkjikqfd.exeC:\Windows\system32\Dkjikqfd.exe54⤵
- Modifies registry class
PID:2244 -
C:\Windows\SysWOW64\Dadahk32.exeC:\Windows\system32\Dadahk32.exe55⤵PID:2252
-
C:\Windows\SysWOW64\Dhnjde32.exeC:\Windows\system32\Dhnjde32.exe56⤵PID:2260
-
C:\Windows\SysWOW64\Dkmfqp32.exeC:\Windows\system32\Dkmfqp32.exe57⤵
- Drops file in System32 directory
PID:2268 -
C:\Windows\SysWOW64\Enkbml32.exeC:\Windows\system32\Enkbml32.exe58⤵PID:2276
-
C:\Windows\SysWOW64\Edejifja.exeC:\Windows\system32\Edejifja.exe59⤵PID:2284
-
C:\Windows\SysWOW64\Egcfeaje.exeC:\Windows\system32\Egcfeaje.exe60⤵PID:2292
-
C:\Windows\SysWOW64\Ejbcamii.exeC:\Windows\system32\Ejbcamii.exe61⤵PID:2300
-
C:\Windows\SysWOW64\Elponhhm.exeC:\Windows\system32\Elponhhm.exe62⤵PID:2308
-
C:\Windows\SysWOW64\Ecjgkboi.exeC:\Windows\system32\Ecjgkboi.exe63⤵PID:2316
-
C:\Windows\SysWOW64\Ejdpgl32.exeC:\Windows\system32\Ejdpgl32.exe64⤵PID:2324
-
C:\Windows\SysWOW64\Elclch32.exeC:\Windows\system32\Elclch32.exe65⤵PID:2332
-
C:\Windows\SysWOW64\Ecmdpbmg.exeC:\Windows\system32\Ecmdpbmg.exe66⤵PID:2340
-
C:\Windows\SysWOW64\Efkplmlk.exeC:\Windows\system32\Efkplmlk.exe67⤵PID:2348
-
C:\Windows\SysWOW64\Elgeogbe.exeC:\Windows\system32\Elgeogbe.exe68⤵PID:2356
-
C:\Windows\SysWOW64\Eofakbah.exeC:\Windows\system32\Eofakbah.exe69⤵PID:2364
-
C:\Windows\SysWOW64\Ffpjgm32.exeC:\Windows\system32\Ffpjgm32.exe70⤵PID:2372
-
C:\Windows\SysWOW64\Fhnfch32.exeC:\Windows\system32\Fhnfch32.exe71⤵PID:2380
-
C:\Windows\SysWOW64\Fohnpbof.exeC:\Windows\system32\Fohnpbof.exe72⤵PID:2388
-
C:\Windows\SysWOW64\Ffbfml32.exeC:\Windows\system32\Ffbfml32.exe73⤵PID:2396
-
C:\Windows\SysWOW64\Fgccdd32.exeC:\Windows\system32\Fgccdd32.exe74⤵PID:2404
-
C:\Windows\SysWOW64\Fojkfb32.exeC:\Windows\system32\Fojkfb32.exe75⤵PID:2412
-
C:\Windows\SysWOW64\Fqlgmjca.exeC:\Windows\system32\Fqlgmjca.exe76⤵
- Drops file in System32 directory
PID:2420 -
C:\Windows\SysWOW64\Fgfpjd32.exeC:\Windows\system32\Fgfpjd32.exe77⤵PID:2428
-
C:\Windows\SysWOW64\Fjdlfp32.exeC:\Windows\system32\Fjdlfp32.exe78⤵PID:2436
-
C:\Windows\SysWOW64\Fbkdgm32.exeC:\Windows\system32\Fbkdgm32.exe79⤵
- Modifies registry class
PID:2444 -
C:\Windows\SysWOW64\Fdjpch32.exeC:\Windows\system32\Fdjpch32.exe80⤵PID:2452
-
C:\Windows\SysWOW64\Fghlpdhk.exeC:\Windows\system32\Fghlpdhk.exe81⤵PID:2460
-
C:\Windows\SysWOW64\Fnbdln32.exeC:\Windows\system32\Fnbdln32.exe82⤵PID:2468
-
C:\Windows\SysWOW64\Fcomde32.exeC:\Windows\system32\Fcomde32.exe83⤵PID:2476
-
C:\Windows\SysWOW64\Fjieaoel.exeC:\Windows\system32\Fjieaoel.exe84⤵PID:2484
-
C:\Windows\SysWOW64\Gqcmni32.exeC:\Windows\system32\Gqcmni32.exe85⤵
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Ggmfkcdf.exeC:\Windows\system32\Ggmfkcdf.exe86⤵PID:2500
-
C:\Windows\SysWOW64\Gmincj32.exeC:\Windows\system32\Gmincj32.exe87⤵PID:2508
-
C:\Windows\SysWOW64\Gbfgka32.exeC:\Windows\system32\Gbfgka32.exe88⤵PID:2516
-
C:\Windows\SysWOW64\Gjnoln32.exeC:\Windows\system32\Gjnoln32.exe89⤵PID:2524
-
C:\Windows\SysWOW64\Glokdfge.exeC:\Windows\system32\Glokdfge.exe90⤵
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\Gcfcedhh.exeC:\Windows\system32\Gcfcedhh.exe91⤵
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\Gfdoaogk.exeC:\Windows\system32\Gfdoaogk.exe92⤵PID:2548
-
C:\Windows\SysWOW64\Gmngninh.exeC:\Windows\system32\Gmngninh.exe93⤵PID:2556
-
C:\Windows\SysWOW64\Gpmdjeml.exeC:\Windows\system32\Gpmdjeml.exe94⤵PID:2564
-
C:\Windows\SysWOW64\Gfflgo32.exeC:\Windows\system32\Gfflgo32.exe95⤵PID:2572
-
C:\Windows\SysWOW64\Giehcj32.exeC:\Windows\system32\Giehcj32.exe96⤵PID:2580
-
C:\Windows\SysWOW64\Gpoqpdki.exeC:\Windows\system32\Gpoqpdki.exe97⤵
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\Gbmmlpjm.exeC:\Windows\system32\Gbmmlpjm.exe98⤵PID:2596
-
C:\Windows\SysWOW64\Gelihkiq.exeC:\Windows\system32\Gelihkiq.exe99⤵
- Drops file in System32 directory
PID:2604 -
C:\Windows\SysWOW64\Hhjedgid.exeC:\Windows\system32\Hhjedgid.exe100⤵PID:2612
-
C:\Windows\SysWOW64\Hndnaapa.exeC:\Windows\system32\Hndnaapa.exe101⤵
- Modifies registry class
PID:2620 -
C:\Windows\SysWOW64\Henfnk32.exeC:\Windows\system32\Henfnk32.exe102⤵PID:2628
-
C:\Windows\SysWOW64\Hhmbjf32.exeC:\Windows\system32\Hhmbjf32.exe103⤵PID:2636
-
C:\Windows\SysWOW64\Hjknfb32.exeC:\Windows\system32\Hjknfb32.exe104⤵
- Drops file in System32 directory
PID:2644 -
C:\Windows\SysWOW64\Hmijbm32.exeC:\Windows\system32\Hmijbm32.exe105⤵PID:2652
-
C:\Windows\SysWOW64\Hdcboglf.exeC:\Windows\system32\Hdcboglf.exe106⤵PID:2660
-
C:\Windows\SysWOW64\Hfaokcki.exeC:\Windows\system32\Hfaokcki.exe107⤵PID:2668
-
C:\Windows\SysWOW64\Hmlggmcf.exeC:\Windows\system32\Hmlggmcf.exe108⤵PID:2676
-
C:\Windows\SysWOW64\Hpjcchbj.exeC:\Windows\system32\Hpjcchbj.exe109⤵
- Drops file in System32 directory
- Modifies registry class
PID:2684 -
C:\Windows\SysWOW64\Hjphaaap.exeC:\Windows\system32\Hjphaaap.exe110⤵PID:2692
-
C:\Windows\SysWOW64\Hajpnk32.exeC:\Windows\system32\Hajpnk32.exe111⤵
- Drops file in System32 directory
PID:2700 -
C:\Windows\SysWOW64\Hdhljg32.exeC:\Windows\system32\Hdhljg32.exe112⤵PID:2708
-
C:\Windows\SysWOW64\Hbklecok.exeC:\Windows\system32\Hbklecok.exe113⤵PID:2716
-
C:\Windows\SysWOW64\Hiedbn32.exeC:\Windows\system32\Hiedbn32.exe114⤵PID:2724
-
C:\Windows\SysWOW64\Idjioffn.exeC:\Windows\system32\Idjioffn.exe115⤵PID:2732
-
C:\Windows\SysWOW64\Ielego32.exeC:\Windows\system32\Ielego32.exe116⤵PID:2740
-
C:\Windows\SysWOW64\Iodjpdbm.exeC:\Windows\system32\Iodjpdbm.exe117⤵PID:2748
-
C:\Windows\SysWOW64\Ienbmo32.exeC:\Windows\system32\Ienbmo32.exe118⤵PID:2756
-
C:\Windows\SysWOW64\Ihlnij32.exeC:\Windows\system32\Ihlnij32.exe119⤵PID:2764
-
C:\Windows\SysWOW64\Ibbbfbic.exeC:\Windows\system32\Ibbbfbic.exe120⤵
- Modifies registry class
PID:2772 -
C:\Windows\SysWOW64\Iepobnhg.exeC:\Windows\system32\Iepobnhg.exe121⤵PID:2780
-
C:\Windows\SysWOW64\Iljgoh32.exeC:\Windows\system32\Iljgoh32.exe122⤵PID:2788
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-