Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe
Resource
win10v2004-20220812-en
General
-
Target
0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe
-
Size
92KB
-
MD5
0a169d1ba23ee3ff785d7d7f1f8cf8c0
-
SHA1
d7480ae2b7385420b5329effd9d5788db05db0ef
-
SHA256
0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06
-
SHA512
fe40ec516b643f51dcff4c8717a699b949497b394bc6ec6636a59562882daf7bb3d9144dc3aa8852e503296f46ea7389fc18c1d3f5d982cb59cb156306b12861
-
SSDEEP
1536:VMdV4KmYWwkbnZJvodj0tLpzmQdRbU/jygWnWEGgY0ClizB23jLV3BGnMPJKEszJ:qdV4u8jvodj0tLpzmQdRb+EGgY0Cl4aG
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkfqfjif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngdmglhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekmhhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oqjqie32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbidgjno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbfjhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qlaiioei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjdgdgha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gjkdnhpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clfpdgec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdplojhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mibggnpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnflnile.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idpbcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmjdhqmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nckami32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fppdjgop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlemni32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jobmgiao.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dejcmfkk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dikocj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gqnbdj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neljod32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ockgpk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmqqnahc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkdcpj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgpojool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anigpe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bodkpmbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbqlbm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpelkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idadjhem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkongh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfkmajnc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dajnmmmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhjkimcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmgkcm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkibfkgl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgffdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knlcceba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndfpkpip.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbbfbd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikaklh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmlihkdp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emkenici.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apkiecqh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gflila32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecldkbdn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhlaeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kingim32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbepglaf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkifhh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhfmpq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nldefobm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkciehjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipjbeiho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Moopoenp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmlgbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dajnmmmb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfmhkpda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ielhil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eimlij32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhnpmkoc.exe -
Executes dropped EXE 64 IoCs
pid Process 1804 Bnjoicpe.exe 1076 Bnoidc32.exe 2008 Bqpafn32.exe 1212 Cjhfoc32.exe 1724 Cjkcdc32.exe 588 Cfacid32.exe 1984 Cfdpod32.exe 1316 Cplehihq.exe 1336 Dlcemjme.exe 612 Dnconejf.exe 1840 Djjocfpj.exe 1952 Dhnpmkoc.exe 1852 Dpidamlo.exe 464 Eleoan32.exe 1776 Ehlofoca.exe 1648 Eepppbbk.exe 1896 Ekmhhj32.exe 308 Fdgifoeq.exe 1784 Ffplof32.exe 456 Gjpajd32.exe 272 Ggjklmcj.exe 900 Gjkdnhpk.exe 1944 Hdqhkq32.exe 1620 Hdceaq32.exe 2044 Hgaaml32.exe 1992 Hjpnig32.exe 964 Hjbjogjc.exe 2024 Hcjohm32.exe 1980 Hjdgdgha.exe 1084 Hfkhihme.exe 432 Nfbodkij.exe 1816 Nokcmapj.exe 524 Ikgighhq.exe 1612 Hcfhef32.exe 748 Jmgkcm32.exe 1956 Khfeojeh.exe 672 Kejfho32.exe 1068 Kdocikij.exe 1656 Klfkkhil.exe 1960 Kacccphc.exe 1032 Kjkhlend.exe 1396 Kmjdhqmg.exe 1304 Kagmno32.exe 1444 Ldfijj32.exe 1644 Lfdefebe.exe 1560 Llanompm.exe 1040 Lejbgb32.exe 296 Lobgphmn.exe 2028 Lhjkimcn.exe 908 Lhmhomal.exe 1892 Laelgb32.exe 324 Lhoedm32.exe 784 Mkmaph32.exe 1532 Mecenq32.exe 1732 Mnnjbc32.exe 1344 Mhdnol32.exe 564 Miekgd32.exe 1408 Mdjodm32.exe 2004 Mlfcho32.exe 1972 Mgkhfh32.exe 1416 Nfqegd32.exe 1268 Npfidm32.exe 568 Nhanip32.exe 1704 Nbibae32.exe -
Loads dropped DLL 64 IoCs
pid Process 1932 0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe 1932 0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe 1804 Bnjoicpe.exe 1804 Bnjoicpe.exe 1076 Bnoidc32.exe 1076 Bnoidc32.exe 2008 Bqpafn32.exe 2008 Bqpafn32.exe 1212 Cjhfoc32.exe 1212 Cjhfoc32.exe 1724 Cjkcdc32.exe 1724 Cjkcdc32.exe 588 Cfacid32.exe 588 Cfacid32.exe 1984 Cfdpod32.exe 1984 Cfdpod32.exe 1316 Cplehihq.exe 1316 Cplehihq.exe 1336 Dlcemjme.exe 1336 Dlcemjme.exe 612 Dnconejf.exe 612 Dnconejf.exe 1840 Djjocfpj.exe 1840 Djjocfpj.exe 1952 Dhnpmkoc.exe 1952 Dhnpmkoc.exe 1852 Dpidamlo.exe 1852 Dpidamlo.exe 464 Eleoan32.exe 464 Eleoan32.exe 1776 Ehlofoca.exe 1776 Ehlofoca.exe 1648 Eepppbbk.exe 1648 Eepppbbk.exe 1896 Ekmhhj32.exe 1896 Ekmhhj32.exe 308 Fdgifoeq.exe 308 Fdgifoeq.exe 1784 Ffplof32.exe 1784 Ffplof32.exe 456 Gjpajd32.exe 456 Gjpajd32.exe 272 Ggjklmcj.exe 272 Ggjklmcj.exe 900 Gjkdnhpk.exe 900 Gjkdnhpk.exe 1944 Hdqhkq32.exe 1944 Hdqhkq32.exe 1620 Hdceaq32.exe 1620 Hdceaq32.exe 2044 Hgaaml32.exe 2044 Hgaaml32.exe 1992 Hjpnig32.exe 1992 Hjpnig32.exe 964 Hjbjogjc.exe 964 Hjbjogjc.exe 2024 Hcjohm32.exe 2024 Hcjohm32.exe 1980 Hjdgdgha.exe 1980 Hjdgdgha.exe 1084 Hfkhihme.exe 1084 Hfkhihme.exe 432 Nfbodkij.exe 432 Nfbodkij.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Jkkifeof.exe Jhlmjjpb.exe File created C:\Windows\SysWOW64\Nlplpg32.dll Nnebmg32.exe File created C:\Windows\SysWOW64\Kbiolebl.dll Kieddboq.exe File created C:\Windows\SysWOW64\Lehddbjg.exe Lmqlcdie.exe File created C:\Windows\SysWOW64\Nodngj32.exe Nkibgkge.exe File created C:\Windows\SysWOW64\Afqhgb32.dll Qiaeiegp.exe File created C:\Windows\SysWOW64\Facpma32.dll Chdjkc32.exe File created C:\Windows\SysWOW64\Iacngibf.dll Ejabmm32.exe File created C:\Windows\SysWOW64\Bkcghi32.dll Onphkckf.exe File opened for modification C:\Windows\SysWOW64\Endkmmpb.exe Egjbqb32.exe File created C:\Windows\SysWOW64\Hpdjdj32.exe Hocmlagh.exe File opened for modification C:\Windows\SysWOW64\Hcebeejg.exe Hpgfiikc.exe File created C:\Windows\SysWOW64\Njqlmgij.exe Ngbpal32.exe File created C:\Windows\SysWOW64\Hjdgfcbb.exe Hhejjhco.exe File opened for modification C:\Windows\SysWOW64\Kbpebhcn.exe Klfmen32.exe File created C:\Windows\SysWOW64\Cakkea32.dll Deolhe32.exe File opened for modification C:\Windows\SysWOW64\Fogmpn32.exe Fkkaophh.exe File opened for modification C:\Windows\SysWOW64\Flfpmf32.exe Fjgdak32.exe File created C:\Windows\SysWOW64\Hkmaahoe.exe Hhoeempa.exe File opened for modification C:\Windows\SysWOW64\Dpidamlo.exe Dhnpmkoc.exe File created C:\Windows\SysWOW64\Jgqcbe32.dll Gbdlhnfa.exe File created C:\Windows\SysWOW64\Egjbqb32.exe Edlfdgia.exe File created C:\Windows\SysWOW64\Ahlgfldm.dll Qanaafcp.exe File created C:\Windows\SysWOW64\Bdoaocoi.dll Djihkm32.exe File created C:\Windows\SysWOW64\Laianaea.dll Fdklid32.exe File opened for modification C:\Windows\SysWOW64\Jhanjp32.exe Ijnnncip.exe File created C:\Windows\SysWOW64\Kjbdhf32.exe Kgdglj32.exe File created C:\Windows\SysWOW64\Kjkhlend.exe Kacccphc.exe File created C:\Windows\SysWOW64\Cpaobg32.dll Dafdgm32.exe File created C:\Windows\SysWOW64\Cjnidc32.dll Edbmogdk.exe File created C:\Windows\SysWOW64\Bgdioo32.exe Beemcc32.exe File created C:\Windows\SysWOW64\Mgjgkbml.dll Jbpicdqc.exe File created C:\Windows\SysWOW64\Obbifnaf.dll Jkhmlj32.exe File created C:\Windows\SysWOW64\Ppfckpbb.exe Pqdcoc32.exe File created C:\Windows\SysWOW64\Ejabmm32.exe Ecgjpc32.exe File created C:\Windows\SysWOW64\Cdofhd32.exe Caajli32.exe File opened for modification C:\Windows\SysWOW64\Oklbdh32.exe Olibhkim.exe File created C:\Windows\SysWOW64\Fgpfjeej.exe Feajnjfg.exe File created C:\Windows\SysWOW64\Kcnnjjgc.exe Knaeacil.exe File opened for modification C:\Windows\SysWOW64\Fpgpdg32.exe Fllddibg.exe File opened for modification C:\Windows\SysWOW64\Gbdlhnfa.exe Goeplbgm.exe File created C:\Windows\SysWOW64\Ncfoolce.exe Nagccqda.exe File created C:\Windows\SysWOW64\Jgilhp32.dll Ohpcmmoa.exe File created C:\Windows\SysWOW64\Eoonlpkj.exe Eheeof32.exe File created C:\Windows\SysWOW64\Poqmqodk.dll Kfdkbgap.exe File created C:\Windows\SysWOW64\Kgljfqpc.dll Jcjhpg32.exe File created C:\Windows\SysWOW64\Bnlefieh.exe Bkmijnfd.exe File created C:\Windows\SysWOW64\Cbdqpl32.exe Cillgfko.exe File opened for modification C:\Windows\SysWOW64\Didibk32.exe Dhblkccd.exe File created C:\Windows\SysWOW64\Hdgnih32.dll Hmecikmh.exe File created C:\Windows\SysWOW64\Ohfjgdnd.dll Njknag32.exe File created C:\Windows\SysWOW64\Aikpom32.dll Knaeacil.exe File opened for modification C:\Windows\SysWOW64\Obigfb32.exe Okooihne.exe File created C:\Windows\SysWOW64\Ifffdc32.dll Cdedee32.exe File created C:\Windows\SysWOW64\Hbalaako.exe Hmecikmh.exe File created C:\Windows\SysWOW64\Gbfqkcfl.dll Hmimdj32.exe File created C:\Windows\SysWOW64\Ehkhnd32.exe Eejoli32.exe File created C:\Windows\SysWOW64\Cebloddg.dll Mbidgjno.exe File created C:\Windows\SysWOW64\Lcjgil32.dll Podgeqde.exe File created C:\Windows\SysWOW64\Dndodg32.dll Qkmdpahf.exe File created C:\Windows\SysWOW64\Qeedog32.dll Foojkc32.exe File created C:\Windows\SysWOW64\Ghnddh32.exe Gqgmck32.exe File created C:\Windows\SysWOW64\Ilihedgi.dll Baficjnl.exe File opened for modification C:\Windows\SysWOW64\Eqdeihne.exe Dnehmmoa.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcpcaoil.dll" Ncfoolce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qejnbeki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fohaog32.dll" Kjnjmflk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lngjieoj.dll" Mopelkcc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npfkobel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pkpefnch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nfgkhcmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifoafcda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gminnk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blfcecbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igqfqp32.dll" Akblel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngdmglhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mecghfqh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aejbdfja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmhjmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojccgehm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ikdhbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omcmcaep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cplehihq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kacccphc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njknag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pgpgfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjjkbidk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckcfgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcagcj32.dll" Dfbifjhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bogohl32.dll" Ehkhnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hbfela32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Boobdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbpkfi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fnljakej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khpahh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fchifb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkmaahoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlfcho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oobjmq32.dll" Nallnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fffebn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpcajkcp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Peedge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qcdlaohi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbqlbm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbibae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njigamfc.dll" Mlpcciom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fahfaimb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmklllcl.dll" Icolfjfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Banmbh32.dll" Qopeekdm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebplkmjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbchgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cpdhjeki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qpoadied.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfdife32.dll" Olfnjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lniclpca.dll" Fahfaimb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmopcn32.dll" Onkopd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmcomehm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oijindme.dll" Nmqqnahc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ialcibbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgonakmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dlpbjemh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ilbqjjmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdcnok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kaiknobm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpbban32.dll" Cjolaodk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kddhfbpi.dll" Ielhil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpppiigk.dll" Klehdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clmeiahp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1804 1932 0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe 27 PID 1932 wrote to memory of 1804 1932 0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe 27 PID 1932 wrote to memory of 1804 1932 0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe 27 PID 1932 wrote to memory of 1804 1932 0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe 27 PID 1804 wrote to memory of 1076 1804 Bnjoicpe.exe 28 PID 1804 wrote to memory of 1076 1804 Bnjoicpe.exe 28 PID 1804 wrote to memory of 1076 1804 Bnjoicpe.exe 28 PID 1804 wrote to memory of 1076 1804 Bnjoicpe.exe 28 PID 1076 wrote to memory of 2008 1076 Bnoidc32.exe 29 PID 1076 wrote to memory of 2008 1076 Bnoidc32.exe 29 PID 1076 wrote to memory of 2008 1076 Bnoidc32.exe 29 PID 1076 wrote to memory of 2008 1076 Bnoidc32.exe 29 PID 2008 wrote to memory of 1212 2008 Bqpafn32.exe 30 PID 2008 wrote to memory of 1212 2008 Bqpafn32.exe 30 PID 2008 wrote to memory of 1212 2008 Bqpafn32.exe 30 PID 2008 wrote to memory of 1212 2008 Bqpafn32.exe 30 PID 1212 wrote to memory of 1724 1212 Cjhfoc32.exe 31 PID 1212 wrote to memory of 1724 1212 Cjhfoc32.exe 31 PID 1212 wrote to memory of 1724 1212 Cjhfoc32.exe 31 PID 1212 wrote to memory of 1724 1212 Cjhfoc32.exe 31 PID 1724 wrote to memory of 588 1724 Cjkcdc32.exe 32 PID 1724 wrote to memory of 588 1724 Cjkcdc32.exe 32 PID 1724 wrote to memory of 588 1724 Cjkcdc32.exe 32 PID 1724 wrote to memory of 588 1724 Cjkcdc32.exe 32 PID 588 wrote to memory of 1984 588 Cfacid32.exe 33 PID 588 wrote to memory of 1984 588 Cfacid32.exe 33 PID 588 wrote to memory of 1984 588 Cfacid32.exe 33 PID 588 wrote to memory of 1984 588 Cfacid32.exe 33 PID 1984 wrote to memory of 1316 1984 Cfdpod32.exe 34 PID 1984 wrote to memory of 1316 1984 Cfdpod32.exe 34 PID 1984 wrote to memory of 1316 1984 Cfdpod32.exe 34 PID 1984 wrote to memory of 1316 1984 Cfdpod32.exe 34 PID 1316 wrote to memory of 1336 1316 Cplehihq.exe 35 PID 1316 wrote to memory of 1336 1316 Cplehihq.exe 35 PID 1316 wrote to memory of 1336 1316 Cplehihq.exe 35 PID 1316 wrote to memory of 1336 1316 Cplehihq.exe 35 PID 1336 wrote to memory of 612 1336 Dlcemjme.exe 36 PID 1336 wrote to memory of 612 1336 Dlcemjme.exe 36 PID 1336 wrote to memory of 612 1336 Dlcemjme.exe 36 PID 1336 wrote to memory of 612 1336 Dlcemjme.exe 36 PID 612 wrote to memory of 1840 612 Dnconejf.exe 37 PID 612 wrote to memory of 1840 612 Dnconejf.exe 37 PID 612 wrote to memory of 1840 612 Dnconejf.exe 37 PID 612 wrote to memory of 1840 612 Dnconejf.exe 37 PID 1840 wrote to memory of 1952 1840 Djjocfpj.exe 38 PID 1840 wrote to memory of 1952 1840 Djjocfpj.exe 38 PID 1840 wrote to memory of 1952 1840 Djjocfpj.exe 38 PID 1840 wrote to memory of 1952 1840 Djjocfpj.exe 38 PID 1952 wrote to memory of 1852 1952 Dhnpmkoc.exe 39 PID 1952 wrote to memory of 1852 1952 Dhnpmkoc.exe 39 PID 1952 wrote to memory of 1852 1952 Dhnpmkoc.exe 39 PID 1952 wrote to memory of 1852 1952 Dhnpmkoc.exe 39 PID 1852 wrote to memory of 464 1852 Dpidamlo.exe 40 PID 1852 wrote to memory of 464 1852 Dpidamlo.exe 40 PID 1852 wrote to memory of 464 1852 Dpidamlo.exe 40 PID 1852 wrote to memory of 464 1852 Dpidamlo.exe 40 PID 464 wrote to memory of 1776 464 Eleoan32.exe 41 PID 464 wrote to memory of 1776 464 Eleoan32.exe 41 PID 464 wrote to memory of 1776 464 Eleoan32.exe 41 PID 464 wrote to memory of 1776 464 Eleoan32.exe 41 PID 1776 wrote to memory of 1648 1776 Ehlofoca.exe 42 PID 1776 wrote to memory of 1648 1776 Ehlofoca.exe 42 PID 1776 wrote to memory of 1648 1776 Ehlofoca.exe 42 PID 1776 wrote to memory of 1648 1776 Ehlofoca.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe"C:\Users\Admin\AppData\Local\Temp\0a525f1e6480afb4ee9c4d8104ed4b9804dec01fd81c0e20e9ae7d6de1dd6b06.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\Bnjoicpe.exeC:\Windows\system32\Bnjoicpe.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Bnoidc32.exeC:\Windows\system32\Bnoidc32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\Bqpafn32.exeC:\Windows\system32\Bqpafn32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\Cjhfoc32.exeC:\Windows\system32\Cjhfoc32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\Cjkcdc32.exeC:\Windows\system32\Cjkcdc32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\Cfacid32.exeC:\Windows\system32\Cfacid32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\Cfdpod32.exeC:\Windows\system32\Cfdpod32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Cplehihq.exeC:\Windows\system32\Cplehihq.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\Dlcemjme.exeC:\Windows\system32\Dlcemjme.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\Dnconejf.exeC:\Windows\system32\Dnconejf.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\Djjocfpj.exeC:\Windows\system32\Djjocfpj.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\Dhnpmkoc.exeC:\Windows\system32\Dhnpmkoc.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\Dpidamlo.exeC:\Windows\system32\Dpidamlo.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\Eleoan32.exeC:\Windows\system32\Eleoan32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\Ehlofoca.exeC:\Windows\system32\Ehlofoca.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\Eepppbbk.exeC:\Windows\system32\Eepppbbk.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1648 -
C:\Windows\SysWOW64\Ekmhhj32.exeC:\Windows\system32\Ekmhhj32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1896 -
C:\Windows\SysWOW64\Fdgifoeq.exeC:\Windows\system32\Fdgifoeq.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:308 -
C:\Windows\SysWOW64\Ffplof32.exeC:\Windows\system32\Ffplof32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1784 -
C:\Windows\SysWOW64\Gjpajd32.exeC:\Windows\system32\Gjpajd32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:456 -
C:\Windows\SysWOW64\Ggjklmcj.exeC:\Windows\system32\Ggjklmcj.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:272 -
C:\Windows\SysWOW64\Gjkdnhpk.exeC:\Windows\system32\Gjkdnhpk.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:900 -
C:\Windows\SysWOW64\Hdqhkq32.exeC:\Windows\system32\Hdqhkq32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Windows\SysWOW64\Hdceaq32.exeC:\Windows\system32\Hdceaq32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Windows\SysWOW64\Hgaaml32.exeC:\Windows\system32\Hgaaml32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044 -
C:\Windows\SysWOW64\Hjpnig32.exeC:\Windows\system32\Hjpnig32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1992 -
C:\Windows\SysWOW64\Hjbjogjc.exeC:\Windows\system32\Hjbjogjc.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:964 -
C:\Windows\SysWOW64\Hcjohm32.exeC:\Windows\system32\Hcjohm32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2024 -
C:\Windows\SysWOW64\Hjdgdgha.exeC:\Windows\system32\Hjdgdgha.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1980 -
C:\Windows\SysWOW64\Hfkhihme.exeC:\Windows\system32\Hfkhihme.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1084 -
C:\Windows\SysWOW64\Nfbodkij.exeC:\Windows\system32\Nfbodkij.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:432 -
C:\Windows\SysWOW64\Nokcmapj.exeC:\Windows\system32\Nokcmapj.exe33⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\Ikgighhq.exeC:\Windows\system32\Ikgighhq.exe34⤵
- Executes dropped EXE
PID:524 -
C:\Windows\SysWOW64\Hcfhef32.exeC:\Windows\system32\Hcfhef32.exe35⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\Jmgkcm32.exeC:\Windows\system32\Jmgkcm32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:748 -
C:\Windows\SysWOW64\Khfeojeh.exeC:\Windows\system32\Khfeojeh.exe37⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\Kejfho32.exeC:\Windows\system32\Kejfho32.exe38⤵
- Executes dropped EXE
PID:672 -
C:\Windows\SysWOW64\Kdocikij.exeC:\Windows\system32\Kdocikij.exe39⤵
- Executes dropped EXE
PID:1068 -
C:\Windows\SysWOW64\Klfkkhil.exeC:\Windows\system32\Klfkkhil.exe40⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Kacccphc.exeC:\Windows\system32\Kacccphc.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1960 -
C:\Windows\SysWOW64\Kjkhlend.exeC:\Windows\system32\Kjkhlend.exe42⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\SysWOW64\Kmjdhqmg.exeC:\Windows\system32\Kmjdhqmg.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\Kagmno32.exeC:\Windows\system32\Kagmno32.exe44⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\Ldfijj32.exeC:\Windows\system32\Ldfijj32.exe45⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\Lfdefebe.exeC:\Windows\system32\Lfdefebe.exe46⤵
- Executes dropped EXE
PID:1644 -
C:\Windows\SysWOW64\Llanompm.exeC:\Windows\system32\Llanompm.exe47⤵
- Executes dropped EXE
PID:1560
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Lejbgb32.exeC:\Windows\system32\Lejbgb32.exe1⤵
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\Lobgphmn.exeC:\Windows\system32\Lobgphmn.exe2⤵
- Executes dropped EXE
PID:296
-
-
C:\Windows\SysWOW64\Lhjkimcn.exeC:\Windows\system32\Lhjkimcn.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Lhmhomal.exeC:\Windows\system32\Lhmhomal.exe2⤵
- Executes dropped EXE
PID:908 -
C:\Windows\SysWOW64\Laelgb32.exeC:\Windows\system32\Laelgb32.exe3⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\Lhoedm32.exeC:\Windows\system32\Lhoedm32.exe4⤵
- Executes dropped EXE
PID:324 -
C:\Windows\SysWOW64\Mkmaph32.exeC:\Windows\system32\Mkmaph32.exe5⤵
- Executes dropped EXE
PID:784 -
C:\Windows\SysWOW64\Mecenq32.exeC:\Windows\system32\Mecenq32.exe6⤵
- Executes dropped EXE
PID:1532 -
C:\Windows\SysWOW64\Mnnjbc32.exeC:\Windows\system32\Mnnjbc32.exe7⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\Mhdnol32.exeC:\Windows\system32\Mhdnol32.exe8⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\Miekgd32.exeC:\Windows\system32\Miekgd32.exe9⤵
- Executes dropped EXE
PID:564 -
C:\Windows\SysWOW64\Mdjodm32.exeC:\Windows\system32\Mdjodm32.exe10⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\Mlfcho32.exeC:\Windows\system32\Mlfcho32.exe11⤵
- Executes dropped EXE
- Modifies registry class
PID:2004 -
C:\Windows\SysWOW64\Mgkhfh32.exeC:\Windows\system32\Mgkhfh32.exe12⤵
- Executes dropped EXE
PID:1972 -
C:\Windows\SysWOW64\Nfqegd32.exeC:\Windows\system32\Nfqegd32.exe13⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\Npfidm32.exeC:\Windows\system32\Npfidm32.exe14⤵
- Executes dropped EXE
PID:1268 -
C:\Windows\SysWOW64\Nhanip32.exeC:\Windows\system32\Nhanip32.exe15⤵
- Executes dropped EXE
PID:568 -
C:\Windows\SysWOW64\Nbibae32.exeC:\Windows\system32\Nbibae32.exe16⤵
- Executes dropped EXE
- Modifies registry class
PID:1704 -
C:\Windows\SysWOW64\Nkbfjkmc.exeC:\Windows\system32\Nkbfjkmc.exe17⤵PID:1836
-
C:\Windows\SysWOW64\Nfgkhcmi.exeC:\Windows\system32\Nfgkhcmi.exe18⤵
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Nkdcpj32.exeC:\Windows\system32\Nkdcpj32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1364 -
C:\Windows\SysWOW64\Nkfpej32.exeC:\Windows\system32\Nkfpej32.exe20⤵PID:1616
-
C:\Windows\SysWOW64\Ododnppn.exeC:\Windows\system32\Ododnppn.exe21⤵PID:1936
-
C:\Windows\SysWOW64\Ongigefo.exeC:\Windows\system32\Ongigefo.exe22⤵PID:320
-
C:\Windows\SysWOW64\Ocdaoldf.exeC:\Windows\system32\Ocdaoldf.exe23⤵PID:1924
-
C:\Windows\SysWOW64\Ofbnkgci.exeC:\Windows\system32\Ofbnkgci.exe24⤵PID:1476
-
C:\Windows\SysWOW64\Ogbjej32.exeC:\Windows\system32\Ogbjej32.exe25⤵PID:2000
-
C:\Windows\SysWOW64\Oqjonp32.exeC:\Windows\system32\Oqjonp32.exe26⤵PID:1176
-
C:\Windows\SysWOW64\Ojccgehm.exeC:\Windows\system32\Ojccgehm.exe27⤵
- Modifies registry class
PID:332 -
C:\Windows\SysWOW64\Ockgpk32.exeC:\Windows\system32\Ockgpk32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2040 -
C:\Windows\SysWOW64\Pmcliqen.exeC:\Windows\system32\Pmcliqen.exe29⤵PID:1988
-
C:\Windows\SysWOW64\Pijmnajb.exeC:\Windows\system32\Pijmnajb.exe30⤵PID:2016
-
C:\Windows\SysWOW64\Pbenlgoq.exeC:\Windows\system32\Pbenlgoq.exe31⤵PID:1124
-
C:\Windows\SysWOW64\Pnloah32.exeC:\Windows\system32\Pnloah32.exe32⤵PID:2164
-
C:\Windows\SysWOW64\Pmalbdim.exeC:\Windows\system32\Pmalbdim.exe33⤵PID:2172
-
C:\Windows\SysWOW64\Qmchhd32.exeC:\Windows\system32\Qmchhd32.exe34⤵PID:2180
-
C:\Windows\SysWOW64\Apdaio32.exeC:\Windows\system32\Apdaio32.exe35⤵PID:2188
-
C:\Windows\SysWOW64\Alkbop32.exeC:\Windows\system32\Alkbop32.exe36⤵PID:2196
-
C:\Windows\SysWOW64\Aiaondgf.exeC:\Windows\system32\Aiaondgf.exe37⤵PID:2204
-
C:\Windows\SysWOW64\Ahdoiq32.exeC:\Windows\system32\Ahdoiq32.exe38⤵PID:2212
-
C:\Windows\SysWOW64\Akblel32.exeC:\Windows\system32\Akblel32.exe39⤵
- Modifies registry class
PID:2220 -
C:\Windows\SysWOW64\Akehkl32.exeC:\Windows\system32\Akehkl32.exe40⤵PID:2228
-
C:\Windows\SysWOW64\Bglipm32.exeC:\Windows\system32\Bglipm32.exe41⤵PID:2236
-
C:\Windows\SysWOW64\Bpdnhbgf.exeC:\Windows\system32\Bpdnhbgf.exe42⤵PID:2244
-
C:\Windows\SysWOW64\Bkibfkgl.exeC:\Windows\system32\Bkibfkgl.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2252 -
C:\Windows\SysWOW64\Bdbfoq32.exeC:\Windows\system32\Bdbfoq32.exe44⤵PID:2260
-
C:\Windows\SysWOW64\Bddcdpkj.exeC:\Windows\system32\Bddcdpkj.exe45⤵PID:2268
-
C:\Windows\SysWOW64\Biaklgia.exeC:\Windows\system32\Biaklgia.exe46⤵PID:2276
-
C:\Windows\SysWOW64\Bondenhi.exeC:\Windows\system32\Bondenhi.exe47⤵PID:2284
-
C:\Windows\SysWOW64\Bgelfk32.exeC:\Windows\system32\Bgelfk32.exe48⤵PID:2292
-
C:\Windows\SysWOW64\Cejighmc.exeC:\Windows\system32\Cejighmc.exe49⤵PID:2300
-
C:\Windows\SysWOW64\Caajli32.exeC:\Windows\system32\Caajli32.exe50⤵
- Drops file in System32 directory
PID:2308 -
C:\Windows\SysWOW64\Cdofhd32.exeC:\Windows\system32\Cdofhd32.exe51⤵PID:2316
-
C:\Windows\SysWOW64\Clfniabm.exeC:\Windows\system32\Clfniabm.exe52⤵PID:2324
-
C:\Windows\SysWOW64\Coejemaa.exeC:\Windows\system32\Coejemaa.exe53⤵PID:2372
-
C:\Windows\SysWOW64\Cgpojool.exeC:\Windows\system32\Cgpojool.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2416 -
C:\Windows\SysWOW64\Caecghob.exeC:\Windows\system32\Caecghob.exe55⤵PID:2484
-
C:\Windows\SysWOW64\Cgbkoo32.exeC:\Windows\system32\Cgbkoo32.exe56⤵PID:2508
-
C:\Windows\SysWOW64\Ckngpneb.exeC:\Windows\system32\Ckngpneb.exe57⤵PID:2524
-
C:\Windows\SysWOW64\Cnldlidf.exeC:\Windows\system32\Cnldlidf.exe58⤵PID:2580
-
C:\Windows\SysWOW64\Cgeheo32.exeC:\Windows\system32\Cgeheo32.exe59⤵PID:2608
-
C:\Windows\SysWOW64\Hdfmbhnp.exeC:\Windows\system32\Hdfmbhnp.exe60⤵PID:2616
-
C:\Windows\SysWOW64\Ijmhamdm.exeC:\Windows\system32\Ijmhamdm.exe61⤵PID:2632
-
C:\Windows\SysWOW64\Kpcpnf32.exeC:\Windows\system32\Kpcpnf32.exe62⤵PID:2640
-
C:\Windows\SysWOW64\Kfmhkpda.exeC:\Windows\system32\Kfmhkpda.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2648 -
C:\Windows\SysWOW64\Kmgqhj32.exeC:\Windows\system32\Kmgqhj32.exe64⤵PID:2656
-
C:\Windows\SysWOW64\Kpemdf32.exeC:\Windows\system32\Kpemdf32.exe65⤵PID:2664
-
C:\Windows\SysWOW64\Kbcipa32.exeC:\Windows\system32\Kbcipa32.exe66⤵PID:2672
-
C:\Windows\SysWOW64\Kebelm32.exeC:\Windows\system32\Kebelm32.exe67⤵PID:2680
-
C:\Windows\SysWOW64\Khpahh32.exeC:\Windows\system32\Khpahh32.exe68⤵
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\Kpgiieip.exeC:\Windows\system32\Kpgiieip.exe69⤵PID:2696
-
C:\Windows\SysWOW64\Kaifan32.exeC:\Windows\system32\Kaifan32.exe70⤵PID:2756
-
C:\Windows\SysWOW64\Mlnfnj32.exeC:\Windows\system32\Mlnfnj32.exe71⤵PID:2764
-
C:\Windows\SysWOW64\Mpjbnh32.exeC:\Windows\system32\Mpjbnh32.exe72⤵PID:2772
-
C:\Windows\SysWOW64\Mbhojd32.exeC:\Windows\system32\Mbhojd32.exe73⤵PID:2780
-
C:\Windows\SysWOW64\Mibggnpi.exeC:\Windows\system32\Mibggnpi.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2788 -
C:\Windows\SysWOW64\Mlpcciom.exeC:\Windows\system32\Mlpcciom.exe75⤵
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Moopoenp.exeC:\Windows\system32\Moopoenp.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2804 -
C:\Windows\SysWOW64\Mamlkqmd.exeC:\Windows\system32\Mamlkqmd.exe77⤵PID:2812
-
C:\Windows\SysWOW64\Middlnnf.exeC:\Windows\system32\Middlnnf.exe78⤵PID:2820
-
C:\Windows\SysWOW64\Mlbphimj.exeC:\Windows\system32\Mlbphimj.exe79⤵PID:2828
-
C:\Windows\SysWOW64\Mbmhecdg.exeC:\Windows\system32\Mbmhecdg.exe80⤵PID:2836
-
C:\Windows\SysWOW64\Mekdaocj.exeC:\Windows\system32\Mekdaocj.exe81⤵PID:2844
-
C:\Windows\SysWOW64\Mlemni32.exeC:\Windows\system32\Mlemni32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2852 -
C:\Windows\SysWOW64\Mkhmjeab.exeC:\Windows\system32\Mkhmjeab.exe83⤵PID:2860
-
C:\Windows\SysWOW64\Mnfifaae.exeC:\Windows\system32\Mnfifaae.exe84⤵PID:2868
-
C:\Windows\SysWOW64\Olibhkim.exeC:\Windows\system32\Olibhkim.exe85⤵
- Drops file in System32 directory
PID:2876 -
C:\Windows\SysWOW64\Oklbdh32.exeC:\Windows\system32\Oklbdh32.exe86⤵PID:2884
-
C:\Windows\SysWOW64\Onkopd32.exeC:\Windows\system32\Onkopd32.exe87⤵
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\Obfkqbge.exeC:\Windows\system32\Obfkqbge.exe88⤵PID:2900
-
C:\Windows\SysWOW64\Ohpcmmoa.exeC:\Windows\system32\Ohpcmmoa.exe89⤵
- Drops file in System32 directory
PID:2908 -
C:\Windows\SysWOW64\Okooihne.exeC:\Windows\system32\Okooihne.exe90⤵
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\Obigfb32.exeC:\Windows\system32\Obigfb32.exe91⤵PID:2924
-
C:\Windows\SysWOW64\Odgdbn32.exeC:\Windows\system32\Odgdbn32.exe92⤵PID:2932
-
C:\Windows\SysWOW64\Ogepni32.exeC:\Windows\system32\Ogepni32.exe93⤵PID:2948
-
C:\Windows\SysWOW64\Onphkckf.exeC:\Windows\system32\Onphkckf.exe94⤵
- Drops file in System32 directory
PID:2968 -
C:\Windows\SysWOW64\Oqndgojj.exeC:\Windows\system32\Oqndgojj.exe95⤵PID:2984
-
C:\Windows\SysWOW64\Odiqhmbc.exeC:\Windows\system32\Odiqhmbc.exe96⤵PID:2996
-
C:\Windows\SysWOW64\Oghmdibg.exeC:\Windows\system32\Oghmdibg.exe97⤵PID:3012
-
C:\Windows\SysWOW64\Pnbeqb32.exeC:\Windows\system32\Pnbeqb32.exe98⤵PID:2132
-
C:\Windows\SysWOW64\Ppldnjgg.exeC:\Windows\system32\Ppldnjgg.exe99⤵PID:2140
-
C:\Windows\SysWOW64\Pffmkc32.exeC:\Windows\system32\Pffmkc32.exe100⤵PID:2148
-
C:\Windows\SysWOW64\Qghicldb.exeC:\Windows\system32\Qghicldb.exe101⤵PID:2156
-
C:\Windows\SysWOW64\Qpoadied.exeC:\Windows\system32\Qpoadied.exe102⤵
- Modifies registry class
PID:2332 -
C:\Windows\SysWOW64\Qelilpcl.exeC:\Windows\system32\Qelilpcl.exe103⤵PID:2344
-
C:\Windows\SysWOW64\Qleaijki.exeC:\Windows\system32\Qleaijki.exe104⤵PID:2352
-
C:\Windows\SysWOW64\Qbpjfd32.exeC:\Windows\system32\Qbpjfd32.exe105⤵PID:2360
-
C:\Windows\SysWOW64\Acqfmmhd.exeC:\Windows\system32\Acqfmmhd.exe106⤵PID:2368
-
C:\Windows\SysWOW64\Ajkojg32.exeC:\Windows\system32\Ajkojg32.exe107⤵PID:2384
-
C:\Windows\SysWOW64\Aaeggagm.exeC:\Windows\system32\Aaeggagm.exe108⤵PID:2392
-
C:\Windows\SysWOW64\Acccclfa.exeC:\Windows\system32\Acccclfa.exe109⤵PID:2400
-
C:\Windows\SysWOW64\Afaoohee.exeC:\Windows\system32\Afaoohee.exe110⤵PID:2408
-
C:\Windows\SysWOW64\Anigpe32.exeC:\Windows\system32\Anigpe32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2424 -
C:\Windows\SysWOW64\Apjdhmle.exeC:\Windows\system32\Apjdhmle.exe112⤵PID:2588
-
C:\Windows\SysWOW64\Dckboimo.exeC:\Windows\system32\Dckboimo.exe113⤵PID:1456
-
C:\Windows\SysWOW64\Ajjjhici.exeC:\Windows\system32\Ajjjhici.exe114⤵PID:1712
-
C:\Windows\SysWOW64\Cekmhilk.exeC:\Windows\system32\Cekmhilk.exe115⤵PID:988
-
C:\Windows\SysWOW64\Cifiih32.exeC:\Windows\system32\Cifiih32.exe116⤵PID:1280
-
C:\Windows\SysWOW64\Cpqafbla.exeC:\Windows\system32\Cpqafbla.exe117⤵PID:1844
-
C:\Windows\SysWOW64\Cbonbm32.exeC:\Windows\system32\Cbonbm32.exe118⤵PID:688
-
C:\Windows\SysWOW64\Cemjni32.exeC:\Windows\system32\Cemjni32.exe119⤵PID:808
-
C:\Windows\SysWOW64\Clgbkcae.exeC:\Windows\system32\Clgbkcae.exe120⤵PID:692
-
C:\Windows\SysWOW64\Cneognqi.exeC:\Windows\system32\Cneognqi.exe121⤵PID:2624
-
C:\Windows\SysWOW64\Cepgch32.exeC:\Windows\system32\Cepgch32.exe122⤵PID:308
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-