Analysis
-
max time kernel
148s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d.exe
Resource
win10v2004-20220812-en
General
-
Target
aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d.exe
-
Size
50KB
-
MD5
108bcb4eaf19673388f666c4c80a75d0
-
SHA1
5b60b61d92da37e1f0ec20d307811bda8ffffff2
-
SHA256
aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d
-
SHA512
b7c7ed6bdcf5f509c36dfbf953c1188449a22a0d6d795a524581435254228d0dc8ed31c7d201ececec04c78e24a9210a18750269e5fdbaf5427c648830039f80
-
SSDEEP
768:kDSHMFBYLYbVOzIF4MpTDESrbsu/g1O5VXpgC262PM3t/1H5Z:SSsFBjbkXyTYSF5VZ52DMX/
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aedjlb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mioeamqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhkhci32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmdhdhji.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nageleie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knmmdgbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnbgikqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhjkimcn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdmkqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdidnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obmbkbbo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnapaa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enlkio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hahleo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ingbkppc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmlbmdqd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnfklfhb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjdgdgha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gicilkjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mngemh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akabdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfobbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgmjae32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amdllaei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edhpnekf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkjgmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgfigg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdidnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Magdmaec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nomnkh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhhddohe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aglmnj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Logpkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akhqgb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpnnmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mncoff32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnifhapg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnmqqq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nedibbne.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndplcjgl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfgpja32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Poogpkdo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iilcal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfnpao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihlcdk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbgciqfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ieajgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aqnoianm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jelgmlpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmcpeinn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iodclgjb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieokia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipdaoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbkffgfe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmgcqccb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nholabfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgpifn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pchfkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcedgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihmjne32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baphmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chlioa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdpiia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Joiifjih.exe -
Executes dropped EXE 64 IoCs
pid Process 1560 Glnnfp32.exe 612 Hchbbm32.exe 832 Hjdgdgha.exe 1052 Ipfihm32.exe 548 Inmbni32.exe 468 Idlhlpam.exe 2024 Jjfpij32.exe 820 Kdldkc32.exe 108 Kmdhdhji.exe 896 Kdoqqb32.exe 1072 Kkhimmib.exe 1380 Kpeaecgj.exe 1736 Kgojbnnf.exe 1680 Kaenpfnm.exe 1760 Kdcjlbmp.exe 1952 Kipbdikh.exe 1928 Lohkhn32.exe 852 Ihlcdk32.exe 672 Ibgdbq32.exe 1252 Kjikfe32.exe 1472 Lhjkimcn.exe 1648 Llhdol32.exe 1128 Logpkg32.exe 1600 Mmlmlc32.exe 1708 Majfbadg.exe 1572 Mcmopjhb.exe 1452 Mjggld32.exe 1960 Mlhpnolp.exe 1212 Njlqgckj.exe 520 Nageleie.exe 660 Njnmmbig.exe 1336 Nkbfjkmc.exe 620 Ndjkcp32.exe 552 Ngigol32.exe 1496 Obqhbdqj.exe 1368 Ogmqjkoa.exe 1712 Omjibb32.exe 1620 Oqjonp32.exe 2000 Opplplfe.exe 1580 Obnhlheh.exe 288 Ofjdlf32.exe 1148 Paeabdhn.exe 1668 Pgpjon32.exe 1616 Pjpbqilk.exe 1936 Phdcjmke.exe 1748 Qhfppm32.exe 1576 Qihlgeoq.exe 1136 Qpbddo32.exe 1972 Qdmqdnog.exe 1296 Afnifi32.exe 1700 Aiobhd32.exe 1592 Aiaondgf.exe 540 Akblel32.exe 1512 Bdpiia32.exe 1988 Bkibfkgl.exe 1624 Bdbfoq32.exe 1196 Bpigca32.exe 2012 Bgbopljn.exe 1172 Biaklgia.exe 1232 Bhfhncni.exe 556 Cejighmc.exe 1132 Cfobbg32.exe 1548 Chpkdb32.exe 676 Ckngpneb.exe -
Loads dropped DLL 64 IoCs
pid Process 1756 aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d.exe 1756 aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d.exe 1560 Glnnfp32.exe 1560 Glnnfp32.exe 612 Hchbbm32.exe 612 Hchbbm32.exe 832 Hjdgdgha.exe 832 Hjdgdgha.exe 1052 Ipfihm32.exe 1052 Ipfihm32.exe 548 Inmbni32.exe 548 Inmbni32.exe 468 Idlhlpam.exe 468 Idlhlpam.exe 2024 Jjfpij32.exe 2024 Jjfpij32.exe 820 Kdldkc32.exe 820 Kdldkc32.exe 108 Kmdhdhji.exe 108 Kmdhdhji.exe 896 Kdoqqb32.exe 896 Kdoqqb32.exe 1072 Kkhimmib.exe 1072 Kkhimmib.exe 1380 Kpeaecgj.exe 1380 Kpeaecgj.exe 1736 Kgojbnnf.exe 1736 Kgojbnnf.exe 1680 Kaenpfnm.exe 1680 Kaenpfnm.exe 1760 Kdcjlbmp.exe 1760 Kdcjlbmp.exe 1952 Kipbdikh.exe 1952 Kipbdikh.exe 1928 Lohkhn32.exe 1928 Lohkhn32.exe 852 Ihlcdk32.exe 852 Ihlcdk32.exe 672 Ibgdbq32.exe 672 Ibgdbq32.exe 1252 Kjikfe32.exe 1252 Kjikfe32.exe 1472 Lhjkimcn.exe 1472 Lhjkimcn.exe 1648 Llhdol32.exe 1648 Llhdol32.exe 1128 Logpkg32.exe 1128 Logpkg32.exe 1600 Mmlmlc32.exe 1600 Mmlmlc32.exe 1708 Majfbadg.exe 1708 Majfbadg.exe 1572 Mcmopjhb.exe 1572 Mcmopjhb.exe 1452 Mjggld32.exe 1452 Mjggld32.exe 1960 Mlhpnolp.exe 1960 Mlhpnolp.exe 1212 Njlqgckj.exe 1212 Njlqgckj.exe 520 Nageleie.exe 520 Nageleie.exe 660 Njnmmbig.exe 660 Njnmmbig.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Fmahdoei.dll Limlmj32.exe File opened for modification C:\Windows\SysWOW64\Hjdgdgha.exe Hchbbm32.exe File created C:\Windows\SysWOW64\Kdmihihk.exe Kaomlmih.exe File created C:\Windows\SysWOW64\Fbipqm32.exe Enpdfj32.exe File created C:\Windows\SysWOW64\Fmodne32.exe Feglmh32.exe File created C:\Windows\SysWOW64\Idahoe32.exe Ipflnfjc.exe File opened for modification C:\Windows\SysWOW64\Kqjahi32.exe Knleln32.exe File created C:\Windows\SysWOW64\Moegjd32.exe Mlgjni32.exe File opened for modification C:\Windows\SysWOW64\Imgpbkkp.exe Iilcal32.exe File opened for modification C:\Windows\SysWOW64\Ogjhkdlb.exe Oobpjfkp.exe File created C:\Windows\SysWOW64\Onpdiaef.dll Anciedhf.exe File opened for modification C:\Windows\SysWOW64\Fdccpmge.exe Fbegcaha.exe File opened for modification C:\Windows\SysWOW64\Agjcpgnl.exe Appkcm32.exe File created C:\Windows\SysWOW64\Fhboek32.dll Mbdklj32.exe File created C:\Windows\SysWOW64\Ngeahi32.exe Nefeln32.exe File created C:\Windows\SysWOW64\Mioeamqe.exe Mfqiebaa.exe File opened for modification C:\Windows\SysWOW64\Daekdnef.exe Dkkbhcni.exe File created C:\Windows\SysWOW64\Idokiedo.exe Iaaomjek.exe File created C:\Windows\SysWOW64\Idlhlpam.exe Inmbni32.exe File created C:\Windows\SysWOW64\Iglgmn32.dll Hbiilgic.exe File created C:\Windows\SysWOW64\Iajeibcm.exe Igdali32.exe File created C:\Windows\SysWOW64\Jbcion32.dll Ekahjo32.exe File created C:\Windows\SysWOW64\Iolgiafh.dll Kjqikoam.exe File created C:\Windows\SysWOW64\Oblpdeel.exe Opmchjfh.exe File created C:\Windows\SysWOW64\Enaifl32.exe Ekbmjp32.exe File created C:\Windows\SysWOW64\Pkakfcfb.exe Pbifnnpa.exe File opened for modification C:\Windows\SysWOW64\Lkpbdekk.exe Lgdfdf32.exe File created C:\Windows\SysWOW64\Ibnkaf32.dll Pnbgikqh.exe File created C:\Windows\SysWOW64\Ahdjpn32.dll Oafhgnca.exe File created C:\Windows\SysWOW64\Bhillkpf.dll Dkkfkm32.exe File opened for modification C:\Windows\SysWOW64\Pcpeohdb.exe Ppbibmeo.exe File created C:\Windows\SysWOW64\Gcljal32.dll Njlqgckj.exe File created C:\Windows\SysWOW64\Chifphpq.dll Mbcqmg32.exe File created C:\Windows\SysWOW64\Phigbl32.exe Pekkfqdn.exe File created C:\Windows\SysWOW64\Apeobn32.dll Khmpngma.exe File opened for modification C:\Windows\SysWOW64\Ibgdbq32.exe Ihlcdk32.exe File opened for modification C:\Windows\SysWOW64\Lnaboj32.exe Lanaef32.exe File opened for modification C:\Windows\SysWOW64\Iacoicie.exe Ibpomf32.exe File created C:\Windows\SysWOW64\Pekkfqdn.exe Pblnjeej.exe File opened for modification C:\Windows\SysWOW64\Plgpijih.exe Pbokpe32.exe File opened for modification C:\Windows\SysWOW64\Ejofgnbb.exe Mbdklj32.exe File created C:\Windows\SysWOW64\Hkconmml.dll Qceedn32.exe File opened for modification C:\Windows\SysWOW64\Dhjihe32.exe Dekmli32.exe File opened for modification C:\Windows\SysWOW64\Ipdaoc32.exe Ihmjne32.exe File created C:\Windows\SysWOW64\Phpecm32.dll Lldnhi32.exe File created C:\Windows\SysWOW64\Gemoga32.dll Nbelkc32.exe File created C:\Windows\SysWOW64\Blofjnec.exe Aiqjnbep.exe File created C:\Windows\SysWOW64\Hgnpeojb.dll Ebidailb.exe File created C:\Windows\SysWOW64\Lnnnqqjo.exe Lkpbdekk.exe File created C:\Windows\SysWOW64\Bnkbnq32.exe Bjpfmbek.exe File created C:\Windows\SysWOW64\Pffldo32.dll Kdkmbijn.exe File created C:\Windows\SysWOW64\Omklgo32.exe Ojmpkc32.exe File created C:\Windows\SysWOW64\Qcfdmbmi.dll Qdgnhl32.exe File created C:\Windows\SysWOW64\Qceedn32.exe Qqgihb32.exe File created C:\Windows\SysWOW64\Jldhlj32.dll Nofgkijn.exe File created C:\Windows\SysWOW64\Aigfhdnm.dll Cedjlg32.exe File created C:\Windows\SysWOW64\Aegdoh32.dll Gmmigjdh.exe File created C:\Windows\SysWOW64\Pkdmio32.dll Pjihnl32.exe File created C:\Windows\SysWOW64\Dmeeipab.exe Dkfimd32.exe File created C:\Windows\SysWOW64\Nghgleio.dll Jlibnhck.exe File created C:\Windows\SysWOW64\Abbdcq32.dll Kolheb32.exe File created C:\Windows\SysWOW64\Dobeko32.dll Ppnbnjff.exe File created C:\Windows\SysWOW64\Iilcal32.exe Igngeacc.exe File created C:\Windows\SysWOW64\Lkneoe32.exe Lioicj32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbigbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjignkjb.dll" Mmoncd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pidjap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hccmfmnd.dll" Pbokpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nojafh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Poacek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Geilghpo.dll" Cmlbmdqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjpbqilk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmjnpo32.dll" Aqdbgp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkpoflbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgcdgp32.dll" Ejofgnbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phgkiqko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhongjcn.dll" Iaaomjek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfnpao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phpecm32.dll" Lldnhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncnbdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhjccl32.dll" Okcnpi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdkeob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgmcdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cqkjda32.dll" Kckjjdfk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aecbfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mimiln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akbpdike.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dakokpbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chifphpq.dll" Mbcqmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inefhdgo.dll" Kocnea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akoenj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iglgmn32.dll" Hbiilgic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nomnkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmdhdg32.dll" Ehobcdgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agiqij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lihpob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkdmio32.dll" Pjihnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihcanhkn.dll" Nefeln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkoclmdg.dll" Bmgibe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgfpkmgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnaboj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Elhnkjij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbmclf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ekbmjp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjclkpab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Opepcodl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihgfiden.dll" Aljmoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgikghpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgdalkpo.dll" Llpdmjpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mqipgl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pqdehlcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egfmhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Keiopekg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acjoompc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abplqi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpjkhcbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kacham32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qhgheg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clqdde32.dll" Oiamlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Keiopekg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oeabapoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnaboj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lobhllci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjbngdfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igngeacc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iaiadbgd.dll" Pajolqbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qoibiigd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aonldh32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1560 1756 aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d.exe 28 PID 1756 wrote to memory of 1560 1756 aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d.exe 28 PID 1756 wrote to memory of 1560 1756 aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d.exe 28 PID 1756 wrote to memory of 1560 1756 aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d.exe 28 PID 1560 wrote to memory of 612 1560 Glnnfp32.exe 29 PID 1560 wrote to memory of 612 1560 Glnnfp32.exe 29 PID 1560 wrote to memory of 612 1560 Glnnfp32.exe 29 PID 1560 wrote to memory of 612 1560 Glnnfp32.exe 29 PID 612 wrote to memory of 832 612 Hchbbm32.exe 30 PID 612 wrote to memory of 832 612 Hchbbm32.exe 30 PID 612 wrote to memory of 832 612 Hchbbm32.exe 30 PID 612 wrote to memory of 832 612 Hchbbm32.exe 30 PID 832 wrote to memory of 1052 832 Hjdgdgha.exe 31 PID 832 wrote to memory of 1052 832 Hjdgdgha.exe 31 PID 832 wrote to memory of 1052 832 Hjdgdgha.exe 31 PID 832 wrote to memory of 1052 832 Hjdgdgha.exe 31 PID 1052 wrote to memory of 548 1052 Ipfihm32.exe 32 PID 1052 wrote to memory of 548 1052 Ipfihm32.exe 32 PID 1052 wrote to memory of 548 1052 Ipfihm32.exe 32 PID 1052 wrote to memory of 548 1052 Ipfihm32.exe 32 PID 548 wrote to memory of 468 548 Inmbni32.exe 33 PID 548 wrote to memory of 468 548 Inmbni32.exe 33 PID 548 wrote to memory of 468 548 Inmbni32.exe 33 PID 548 wrote to memory of 468 548 Inmbni32.exe 33 PID 468 wrote to memory of 2024 468 Idlhlpam.exe 34 PID 468 wrote to memory of 2024 468 Idlhlpam.exe 34 PID 468 wrote to memory of 2024 468 Idlhlpam.exe 34 PID 468 wrote to memory of 2024 468 Idlhlpam.exe 34 PID 2024 wrote to memory of 820 2024 Jjfpij32.exe 35 PID 2024 wrote to memory of 820 2024 Jjfpij32.exe 35 PID 2024 wrote to memory of 820 2024 Jjfpij32.exe 35 PID 2024 wrote to memory of 820 2024 Jjfpij32.exe 35 PID 820 wrote to memory of 108 820 Kdldkc32.exe 36 PID 820 wrote to memory of 108 820 Kdldkc32.exe 36 PID 820 wrote to memory of 108 820 Kdldkc32.exe 36 PID 820 wrote to memory of 108 820 Kdldkc32.exe 36 PID 108 wrote to memory of 896 108 Kmdhdhji.exe 37 PID 108 wrote to memory of 896 108 Kmdhdhji.exe 37 PID 108 wrote to memory of 896 108 Kmdhdhji.exe 37 PID 108 wrote to memory of 896 108 Kmdhdhji.exe 37 PID 896 wrote to memory of 1072 896 Kdoqqb32.exe 38 PID 896 wrote to memory of 1072 896 Kdoqqb32.exe 38 PID 896 wrote to memory of 1072 896 Kdoqqb32.exe 38 PID 896 wrote to memory of 1072 896 Kdoqqb32.exe 38 PID 1072 wrote to memory of 1380 1072 Kkhimmib.exe 39 PID 1072 wrote to memory of 1380 1072 Kkhimmib.exe 39 PID 1072 wrote to memory of 1380 1072 Kkhimmib.exe 39 PID 1072 wrote to memory of 1380 1072 Kkhimmib.exe 39 PID 1380 wrote to memory of 1736 1380 Kpeaecgj.exe 40 PID 1380 wrote to memory of 1736 1380 Kpeaecgj.exe 40 PID 1380 wrote to memory of 1736 1380 Kpeaecgj.exe 40 PID 1380 wrote to memory of 1736 1380 Kpeaecgj.exe 40 PID 1736 wrote to memory of 1680 1736 Kgojbnnf.exe 41 PID 1736 wrote to memory of 1680 1736 Kgojbnnf.exe 41 PID 1736 wrote to memory of 1680 1736 Kgojbnnf.exe 41 PID 1736 wrote to memory of 1680 1736 Kgojbnnf.exe 41 PID 1680 wrote to memory of 1760 1680 Kaenpfnm.exe 42 PID 1680 wrote to memory of 1760 1680 Kaenpfnm.exe 42 PID 1680 wrote to memory of 1760 1680 Kaenpfnm.exe 42 PID 1680 wrote to memory of 1760 1680 Kaenpfnm.exe 42 PID 1760 wrote to memory of 1952 1760 Kdcjlbmp.exe 43 PID 1760 wrote to memory of 1952 1760 Kdcjlbmp.exe 43 PID 1760 wrote to memory of 1952 1760 Kdcjlbmp.exe 43 PID 1760 wrote to memory of 1952 1760 Kdcjlbmp.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d.exe"C:\Users\Admin\AppData\Local\Temp\aa91f4b5b3115fe82a36c8cbed76cfc1932b03627937363bb24a8574bf1c648d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\Glnnfp32.exeC:\Windows\system32\Glnnfp32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\Hchbbm32.exeC:\Windows\system32\Hchbbm32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\Hjdgdgha.exeC:\Windows\system32\Hjdgdgha.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\Ipfihm32.exeC:\Windows\system32\Ipfihm32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\Inmbni32.exeC:\Windows\system32\Inmbni32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\Idlhlpam.exeC:\Windows\system32\Idlhlpam.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\Jjfpij32.exeC:\Windows\system32\Jjfpij32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\Kdldkc32.exeC:\Windows\system32\Kdldkc32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\Kmdhdhji.exeC:\Windows\system32\Kmdhdhji.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\Kdoqqb32.exeC:\Windows\system32\Kdoqqb32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\Kkhimmib.exeC:\Windows\system32\Kkhimmib.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\Kpeaecgj.exeC:\Windows\system32\Kpeaecgj.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\Kgojbnnf.exeC:\Windows\system32\Kgojbnnf.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\Kaenpfnm.exeC:\Windows\system32\Kaenpfnm.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\Kdcjlbmp.exeC:\Windows\system32\Kdcjlbmp.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\Kipbdikh.exeC:\Windows\system32\Kipbdikh.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Windows\SysWOW64\Lohkhn32.exeC:\Windows\system32\Lohkhn32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928 -
C:\Windows\SysWOW64\Ihlcdk32.exeC:\Windows\system32\Ihlcdk32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:852 -
C:\Windows\SysWOW64\Ibgdbq32.exeC:\Windows\system32\Ibgdbq32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:672 -
C:\Windows\SysWOW64\Kjikfe32.exeC:\Windows\system32\Kjikfe32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1252 -
C:\Windows\SysWOW64\Lhjkimcn.exeC:\Windows\system32\Lhjkimcn.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1472 -
C:\Windows\SysWOW64\Llhdol32.exeC:\Windows\system32\Llhdol32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1648 -
C:\Windows\SysWOW64\Logpkg32.exeC:\Windows\system32\Logpkg32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1128 -
C:\Windows\SysWOW64\Mmlmlc32.exeC:\Windows\system32\Mmlmlc32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Windows\SysWOW64\Majfbadg.exeC:\Windows\system32\Majfbadg.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708 -
C:\Windows\SysWOW64\Mcmopjhb.exeC:\Windows\system32\Mcmopjhb.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572 -
C:\Windows\SysWOW64\Mjggld32.exeC:\Windows\system32\Mjggld32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1452 -
C:\Windows\SysWOW64\Mlhpnolp.exeC:\Windows\system32\Mlhpnolp.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Windows\SysWOW64\Njlqgckj.exeC:\Windows\system32\Njlqgckj.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1212 -
C:\Windows\SysWOW64\Nageleie.exeC:\Windows\system32\Nageleie.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:520 -
C:\Windows\SysWOW64\Njnmmbig.exeC:\Windows\system32\Njnmmbig.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:660 -
C:\Windows\SysWOW64\Nkbfjkmc.exeC:\Windows\system32\Nkbfjkmc.exe33⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\Ndjkcp32.exeC:\Windows\system32\Ndjkcp32.exe34⤵
- Executes dropped EXE
PID:620 -
C:\Windows\SysWOW64\Ngigol32.exeC:\Windows\system32\Ngigol32.exe35⤵
- Executes dropped EXE
PID:552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Obqhbdqj.exeC:\Windows\system32\Obqhbdqj.exe1⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\SysWOW64\Ogmqjkoa.exeC:\Windows\system32\Ogmqjkoa.exe2⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\SysWOW64\Omjibb32.exeC:\Windows\system32\Omjibb32.exe3⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\Oqjonp32.exeC:\Windows\system32\Oqjonp32.exe4⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Opplplfe.exeC:\Windows\system32\Opplplfe.exe5⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\Obnhlheh.exeC:\Windows\system32\Obnhlheh.exe6⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\Ofjdlf32.exeC:\Windows\system32\Ofjdlf32.exe7⤵
- Executes dropped EXE
PID:288 -
C:\Windows\SysWOW64\Paeabdhn.exeC:\Windows\system32\Paeabdhn.exe8⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\Pgpjon32.exeC:\Windows\system32\Pgpjon32.exe9⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\Pjpbqilk.exeC:\Windows\system32\Pjpbqilk.exe10⤵
- Executes dropped EXE
- Modifies registry class
PID:1616 -
C:\Windows\SysWOW64\Phdcjmke.exeC:\Windows\system32\Phdcjmke.exe11⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\Qhfppm32.exeC:\Windows\system32\Qhfppm32.exe12⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\SysWOW64\Qihlgeoq.exeC:\Windows\system32\Qihlgeoq.exe13⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\SysWOW64\Qpbddo32.exeC:\Windows\system32\Qpbddo32.exe14⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\Qdmqdnog.exeC:\Windows\system32\Qdmqdnog.exe15⤵
- Executes dropped EXE
PID:1972 -
C:\Windows\SysWOW64\Afnifi32.exeC:\Windows\system32\Afnifi32.exe16⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\Aiobhd32.exeC:\Windows\system32\Aiobhd32.exe17⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\Aiaondgf.exeC:\Windows\system32\Aiaondgf.exe18⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\Akblel32.exeC:\Windows\system32\Akblel32.exe19⤵
- Executes dropped EXE
PID:540
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Bdpiia32.exeC:\Windows\system32\Bdpiia32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1512 -
C:\Windows\SysWOW64\Bkibfkgl.exeC:\Windows\system32\Bkibfkgl.exe2⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\Bdbfoq32.exeC:\Windows\system32\Bdbfoq32.exe3⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Bpigca32.exeC:\Windows\system32\Bpigca32.exe4⤵
- Executes dropped EXE
PID:1196
-
-
-
-
C:\Windows\SysWOW64\Bgbopljn.exeC:\Windows\system32\Bgbopljn.exe1⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\Biaklgia.exeC:\Windows\system32\Biaklgia.exe2⤵
- Executes dropped EXE
PID:1172 -
C:\Windows\SysWOW64\Bhfhncni.exeC:\Windows\system32\Bhfhncni.exe3⤵
- Executes dropped EXE
PID:1232 -
C:\Windows\SysWOW64\Cejighmc.exeC:\Windows\system32\Cejighmc.exe4⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\Cfobbg32.exeC:\Windows\system32\Cfobbg32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1132
-
-
-
-
-
C:\Windows\SysWOW64\Ckngpneb.exeC:\Windows\system32\Ckngpneb.exe1⤵
- Executes dropped EXE
PID:676 -
C:\Windows\SysWOW64\Cnldlidf.exeC:\Windows\system32\Cnldlidf.exe2⤵PID:1820
-
C:\Windows\SysWOW64\Cqkphdcj.exeC:\Windows\system32\Cqkphdcj.exe3⤵PID:1536
-
C:\Windows\SysWOW64\Djcdaj32.exeC:\Windows\system32\Djcdaj32.exe4⤵PID:1112
-
C:\Windows\SysWOW64\Dnamgh32.exeC:\Windows\system32\Dnamgh32.exe5⤵PID:892
-
C:\Windows\SysWOW64\Dcneoo32.exeC:\Windows\system32\Dcneoo32.exe6⤵PID:1908
-
-
-
-
-
-
C:\Windows\SysWOW64\Chpkdb32.exeC:\Windows\system32\Chpkdb32.exe1⤵
- Executes dropped EXE
PID:1548
-
C:\Windows\SysWOW64\Dodfdpdl.exeC:\Windows\system32\Dodfdpdl.exe1⤵PID:1796
-
C:\Windows\SysWOW64\Dcpbeo32.exeC:\Windows\system32\Dcpbeo32.exe2⤵PID:1740
-
C:\Windows\SysWOW64\Dfooaj32.exeC:\Windows\system32\Dfooaj32.exe3⤵PID:1040
-
C:\Windows\SysWOW64\Diogceij.exeC:\Windows\system32\Diogceij.exe4⤵PID:1104
-
C:\Windows\SysWOW64\Doippp32.exeC:\Windows\system32\Doippp32.exe5⤵PID:1044
-
C:\Windows\SysWOW64\Dbhllk32.exeC:\Windows\system32\Dbhllk32.exe6⤵PID:1640
-
C:\Windows\SysWOW64\Eiadhegg.exeC:\Windows\system32\Eiadhegg.exe7⤵PID:2056
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Egdddb32.exeC:\Windows\system32\Egdddb32.exe1⤵PID:2072
-
C:\Windows\SysWOW64\Eolleond.exeC:\Windows\system32\Eolleond.exe2⤵PID:2088
-
-
C:\Windows\SysWOW64\Enomql32.exeC:\Windows\system32\Enomql32.exe1⤵PID:2104
-
C:\Windows\SysWOW64\Eamimg32.exeC:\Windows\system32\Eamimg32.exe2⤵PID:2192
-
C:\Windows\SysWOW64\Ekbmjp32.exeC:\Windows\system32\Ekbmjp32.exe3⤵
- Drops file in System32 directory
- Modifies registry class
PID:2204
-
-
-
C:\Windows\SysWOW64\Enaifl32.exeC:\Windows\system32\Enaifl32.exe1⤵PID:2220
-
C:\Windows\SysWOW64\Eblegjke.exeC:\Windows\system32\Eblegjke.exe2⤵PID:2276
-
C:\Windows\SysWOW64\Ecnbnb32.exeC:\Windows\system32\Ecnbnb32.exe3⤵PID:2312
-
C:\Windows\SysWOW64\Eginoaim.exeC:\Windows\system32\Eginoaim.exe4⤵PID:2400
-
-
-
-
C:\Windows\SysWOW64\Gmmigjdh.exeC:\Windows\system32\Gmmigjdh.exe1⤵
- Drops file in System32 directory
PID:2408 -
C:\Windows\SysWOW64\Gpkecf32.exeC:\Windows\system32\Gpkecf32.exe2⤵PID:2416
-
C:\Windows\SysWOW64\Gdgacdld.exeC:\Windows\system32\Gdgacdld.exe3⤵PID:2424
-
C:\Windows\SysWOW64\Gicilkjl.exeC:\Windows\system32\Gicilkjl.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2504 -
C:\Windows\SysWOW64\Pipolpam.exeC:\Windows\system32\Pipolpam.exe5⤵PID:2520
-
C:\Windows\SysWOW64\Dakokpbq.exeC:\Windows\system32\Dakokpbq.exe6⤵
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\Fkehgl32.exeC:\Windows\system32\Fkehgl32.exe7⤵PID:2544
-
C:\Windows\SysWOW64\Hlqdbndc.exeC:\Windows\system32\Hlqdbndc.exe8⤵PID:2552
-
C:\Windows\SysWOW64\Ichlhk32.exeC:\Windows\system32\Ichlhk32.exe9⤵PID:2560
-
C:\Windows\SysWOW64\Ilpqaago.exeC:\Windows\system32\Ilpqaago.exe10⤵PID:2568
-
C:\Windows\SysWOW64\Jcjink32.exeC:\Windows\system32\Jcjink32.exe11⤵PID:2576
-
C:\Windows\SysWOW64\Jamiihef.exeC:\Windows\system32\Jamiihef.exe12⤵PID:2584
-
C:\Windows\SysWOW64\Jhgafblc.exeC:\Windows\system32\Jhgafblc.exe13⤵PID:2592
-
C:\Windows\SysWOW64\Jdnbkc32.exeC:\Windows\system32\Jdnbkc32.exe14⤵PID:2600
-
C:\Windows\SysWOW64\Jkjgmm32.exeC:\Windows\system32\Jkjgmm32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2668 -
C:\Windows\SysWOW64\Knmmdgbp.exeC:\Windows\system32\Knmmdgbp.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2676 -
C:\Windows\SysWOW64\Kqliqcad.exeC:\Windows\system32\Kqliqcad.exe17⤵PID:2684
-
C:\Windows\SysWOW64\Kmgcqccb.exeC:\Windows\system32\Kmgcqccb.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2692 -
C:\Windows\SysWOW64\Koeomobf.exeC:\Windows\system32\Koeomobf.exe19⤵PID:2700
-
C:\Windows\SysWOW64\Lnklnkgn.exeC:\Windows\system32\Lnklnkgn.exe20⤵PID:2708
-
C:\Windows\SysWOW64\Lfbdohhq.exeC:\Windows\system32\Lfbdohhq.exe21⤵PID:2716
-
C:\Windows\SysWOW64\Lkomgofh.exeC:\Windows\system32\Lkomgofh.exe22⤵PID:2724
-
C:\Windows\SysWOW64\Lnmickek.exeC:\Windows\system32\Lnmickek.exe23⤵PID:2732
-
C:\Windows\SysWOW64\Lgemlp32.exeC:\Windows\system32\Lgemlp32.exe24⤵PID:2744
-
C:\Windows\SysWOW64\Lanaef32.exeC:\Windows\system32\Lanaef32.exe25⤵
- Drops file in System32 directory
PID:2752 -
C:\Windows\SysWOW64\Lnaboj32.exeC:\Windows\system32\Lnaboj32.exe26⤵
- Modifies registry class
PID:2760 -
C:\Windows\SysWOW64\Lapnke32.exeC:\Windows\system32\Lapnke32.exe27⤵PID:2768
-
C:\Windows\SysWOW64\Lpeklb32.exeC:\Windows\system32\Lpeklb32.exe28⤵PID:2776
-
C:\Windows\SysWOW64\Ljkpik32.exeC:\Windows\system32\Ljkpik32.exe29⤵PID:2784
-
C:\Windows\SysWOW64\Minpdgkb.exeC:\Windows\system32\Minpdgkb.exe30⤵PID:2792
-
C:\Windows\SysWOW64\Mphhaa32.exeC:\Windows\system32\Mphhaa32.exe31⤵PID:2800
-
C:\Windows\SysWOW64\Mccdbpkh.exeC:\Windows\system32\Mccdbpkh.exe32⤵PID:2808
-
C:\Windows\SysWOW64\Mfdmck32.exeC:\Windows\system32\Mfdmck32.exe33⤵PID:2816
-
C:\Windows\SysWOW64\Mbknhlnm.exeC:\Windows\system32\Mbknhlnm.exe34⤵PID:2824
-
C:\Windows\SysWOW64\Mapkjibe.exeC:\Windows\system32\Mapkjibe.exe35⤵PID:2888
-
C:\Windows\SysWOW64\Nencpg32.exeC:\Windows\system32\Nencpg32.exe36⤵PID:2996
-
C:\Windows\SysWOW64\Naddeh32.exeC:\Windows\system32\Naddeh32.exe37⤵PID:3004
-
C:\Windows\SysWOW64\Nholabfm.exeC:\Windows\system32\Nholabfm.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3012 -
C:\Windows\SysWOW64\Nagajh32.exeC:\Windows\system32\Nagajh32.exe39⤵PID:3020
-
C:\Windows\SysWOW64\Nainpgjk.exeC:\Windows\system32\Nainpgjk.exe40⤵PID:3028
-
C:\Windows\SysWOW64\Ndhjlcjn.exeC:\Windows\system32\Ndhjlcjn.exe41⤵PID:3036
-
C:\Windows\SysWOW64\Oocgbp32.exeC:\Windows\system32\Oocgbp32.exe42⤵PID:3044
-
C:\Windows\SysWOW64\Oenpojkg.exeC:\Windows\system32\Oenpojkg.exe43⤵PID:3052
-
C:\Windows\SysWOW64\Oljdad32.exeC:\Windows\system32\Oljdad32.exe44⤵PID:3060
-
C:\Windows\SysWOW64\Oebijj32.exeC:\Windows\system32\Oebijj32.exe45⤵PID:3068
-
C:\Windows\SysWOW64\Ohqefe32.exeC:\Windows\system32\Ohqefe32.exe46⤵PID:2080
-
C:\Windows\SysWOW64\Ooknbonb.exeC:\Windows\system32\Ooknbonb.exe47⤵PID:2096
-
C:\Windows\SysWOW64\Onnnnl32.exeC:\Windows\system32\Onnnnl32.exe48⤵PID:2112
-
C:\Windows\SysWOW64\Oedfoi32.exeC:\Windows\system32\Oedfoi32.exe49⤵PID:2120
-
C:\Windows\SysWOW64\Odgfkflj.exeC:\Windows\system32\Odgfkflj.exe50⤵PID:2128
-
C:\Windows\SysWOW64\Ogfbgakn.exeC:\Windows\system32\Ogfbgakn.exe51⤵PID:2136
-
C:\Windows\SysWOW64\Pnbgikqh.exeC:\Windows\system32\Pnbgikqh.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2144 -
C:\Windows\SysWOW64\Pjihnl32.exeC:\Windows\system32\Pjihnl32.exe53⤵
- Drops file in System32 directory
- Modifies registry class
PID:2152 -
C:\Windows\SysWOW64\Pfpicm32.exeC:\Windows\system32\Pfpicm32.exe54⤵PID:2160
-
C:\Windows\SysWOW64\Pjkddldi.exeC:\Windows\system32\Pjkddldi.exe55⤵PID:2168
-
C:\Windows\SysWOW64\Pljapgcm.exeC:\Windows\system32\Pljapgcm.exe56⤵PID:2176
-
C:\Windows\SysWOW64\Pohmlcbq.exeC:\Windows\system32\Pohmlcbq.exe57⤵PID:2184
-
C:\Windows\SysWOW64\Pfbeim32.exeC:\Windows\system32\Pfbeim32.exe58⤵PID:2200
-
C:\Windows\SysWOW64\Phqaeh32.exeC:\Windows\system32\Phqaeh32.exe59⤵PID:2216
-
C:\Windows\SysWOW64\Pqhjff32.exeC:\Windows\system32\Pqhjff32.exe60⤵PID:2232
-
C:\Windows\SysWOW64\Pbifnnpa.exeC:\Windows\system32\Pbifnnpa.exe61⤵
- Drops file in System32 directory
PID:2240 -
C:\Windows\SysWOW64\Pkakfcfb.exeC:\Windows\system32\Pkakfcfb.exe62⤵PID:2384
-
C:\Windows\SysWOW64\Qfikilde.exeC:\Windows\system32\Qfikilde.exe63⤵PID:2440
-
C:\Windows\SysWOW64\Qhgheg32.exeC:\Windows\system32\Qhgheg32.exe64⤵
- Modifies registry class
PID:840 -
C:\Windows\SysWOW64\Akhqgb32.exeC:\Windows\system32\Akhqgb32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2044 -
C:\Windows\SysWOW64\Anijinmk.exeC:\Windows\system32\Anijinmk.exe66⤵PID:760
-
C:\Windows\SysWOW64\Aqgfeilo.exeC:\Windows\system32\Aqgfeilo.exe67⤵PID:1468
-
C:\Windows\SysWOW64\Aecbfh32.exeC:\Windows\system32\Aecbfh32.exe68⤵
- Modifies registry class
PID:1632 -
C:\Windows\SysWOW64\Ajbgcnqm.exeC:\Windows\system32\Ajbgcnqm.exe69⤵PID:988
-
C:\Windows\SysWOW64\Bmcpeinn.exeC:\Windows\system32\Bmcpeinn.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1036 -
C:\Windows\SysWOW64\Beneilki.exeC:\Windows\system32\Beneilki.exe71⤵PID:1828
-
C:\Windows\SysWOW64\Bpfeld32.exeC:\Windows\system32\Bpfeld32.exe72⤵PID:572
-
C:\Windows\SysWOW64\Bnifhapg.exeC:\Windows\system32\Bnifhapg.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1480 -
C:\Windows\SysWOW64\Bagbdloj.exeC:\Windows\system32\Bagbdloj.exe74⤵PID:1284
-
C:\Windows\SysWOW64\Binjejpm.exeC:\Windows\system32\Binjejpm.exe75⤵PID:1732
-
C:\Windows\SysWOW64\Blmfae32.exeC:\Windows\system32\Blmfae32.exe76⤵PID:788
-
C:\Windows\SysWOW64\Bjpfmbek.exeC:\Windows\system32\Bjpfmbek.exe77⤵
- Drops file in System32 directory
PID:2512 -
C:\Windows\SysWOW64\Bnkbnq32.exeC:\Windows\system32\Bnkbnq32.exe78⤵PID:268
-
C:\Windows\SysWOW64\Cfmmbbeg.exeC:\Windows\system32\Cfmmbbeg.exe79⤵PID:2528
-
C:\Windows\SysWOW64\Cebjcojo.exeC:\Windows\system32\Cebjcojo.exe80⤵PID:2868
-
C:\Windows\SysWOW64\Dbigbb32.exeC:\Windows\system32\Dbigbb32.exe81⤵
- Modifies registry class
PID:2924 -
C:\Windows\SysWOW64\Dkdlgd32.exeC:\Windows\system32\Dkdlgd32.exe82⤵PID:2932
-
C:\Windows\SysWOW64\Dkfimd32.exeC:\Windows\system32\Dkfimd32.exe83⤵
- Drops file in System32 directory
PID:2940 -
C:\Windows\SysWOW64\Dmeeipab.exeC:\Windows\system32\Dmeeipab.exe84⤵PID:2948
-
C:\Windows\SysWOW64\Dgmjae32.exeC:\Windows\system32\Dgmjae32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2956 -
C:\Windows\SysWOW64\Dodabb32.exeC:\Windows\system32\Dodabb32.exe86⤵PID:2964
-
C:\Windows\SysWOW64\Dgpfge32.exeC:\Windows\system32\Dgpfge32.exe87⤵PID:2972
-
C:\Windows\SysWOW64\Dkkbhcni.exeC:\Windows\system32\Dkkbhcni.exe88⤵
- Drops file in System32 directory
PID:2980 -
C:\Windows\SysWOW64\Daekdnef.exeC:\Windows\system32\Daekdnef.exe89⤵PID:2988
-
C:\Windows\SysWOW64\Enlkio32.exeC:\Windows\system32\Enlkio32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:744 -
C:\Windows\SysWOW64\Edfcfibg.exeC:\Windows\system32\Edfcfibg.exe91⤵PID:848
-
C:\Windows\SysWOW64\Ecidaf32.exeC:\Windows\system32\Ecidaf32.exe92⤵PID:1156
-
C:\Windows\SysWOW64\Eegpna32.exeC:\Windows\system32\Eegpna32.exe93⤵PID:1308
-
C:\Windows\SysWOW64\Egfmhd32.exeC:\Windows\system32\Egfmhd32.exe94⤵
- Modifies registry class
PID:1696 -
C:\Windows\SysWOW64\Ejgeio32.exeC:\Windows\system32\Ejgeio32.exe95⤵PID:1192
-
C:\Windows\SysWOW64\Elhnkjij.exeC:\Windows\system32\Elhnkjij.exe96⤵
- Modifies registry class
PID:1080 -
C:\Windows\SysWOW64\Fbegcaha.exeC:\Windows\system32\Fbegcaha.exe97⤵
- Drops file in System32 directory
PID:1596 -
C:\Windows\SysWOW64\Fdccpmge.exeC:\Windows\system32\Fdccpmge.exe98⤵PID:1704
-
C:\Windows\SysWOW64\Fnlhhb32.exeC:\Windows\system32\Fnlhhb32.exe99⤵PID:1200
-
C:\Windows\SysWOW64\Fbgciqfo.exeC:\Windows\system32\Fbgciqfo.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2248 -
C:\Windows\SysWOW64\Fdfpel32.exeC:\Windows\system32\Fdfpel32.exe101⤵PID:2256
-
C:\Windows\SysWOW64\Fgdlah32.exeC:\Windows\system32\Fgdlah32.exe102⤵PID:2264
-
C:\Windows\SysWOW64\Fbjpnq32.exeC:\Windows\system32\Fbjpnq32.exe103⤵PID:2272
-
C:\Windows\SysWOW64\Fdhmkl32.exeC:\Windows\system32\Fdhmkl32.exe104⤵PID:1452
-
C:\Windows\SysWOW64\Fgfigg32.exeC:\Windows\system32\Fgfigg32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2288 -
C:\Windows\SysWOW64\Fnpacaip.exeC:\Windows\system32\Fnpacaip.exe106⤵PID:2296
-
C:\Windows\SysWOW64\Fqompmhd.exeC:\Windows\system32\Fqompmhd.exe107⤵PID:2304
-
C:\Windows\SysWOW64\Fcmilh32.exeC:\Windows\system32\Fcmilh32.exe108⤵PID:576
-
C:\Windows\SysWOW64\Hphpkl32.exeC:\Windows\system32\Hphpkl32.exe109⤵PID:1964
-
C:\Windows\SysWOW64\Hhphli32.exeC:\Windows\system32\Hhphli32.exe110⤵PID:2016
-
C:\Windows\SysWOW64\Hahleo32.exeC:\Windows\system32\Hahleo32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1400 -
C:\Windows\SysWOW64\Hbiilgic.exeC:\Windows\system32\Hbiilgic.exe112⤵
- Drops file in System32 directory
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Hicaia32.exeC:\Windows\system32\Hicaia32.exe113⤵PID:1084
-
C:\Windows\SysWOW64\Hpmifkgm.exeC:\Windows\system32\Hpmifkgm.exe114⤵PID:904
-
C:\Windows\SysWOW64\Hfgabe32.exeC:\Windows\system32\Hfgabe32.exe115⤵PID:1056
-
C:\Windows\SysWOW64\Ildjklmq.exeC:\Windows\system32\Ildjklmq.exe116⤵PID:1540
-
C:\Windows\SysWOW64\Iobfghld.exeC:\Windows\system32\Iobfghld.exe117⤵PID:1376
-
C:\Windows\SysWOW64\Iihjdqlj.exeC:\Windows\system32\Iihjdqlj.exe118⤵PID:1720
-
C:\Windows\SysWOW64\Iodclgjb.exeC:\Windows\system32\Iodclgjb.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2608 -
C:\Windows\SysWOW64\Ibpomf32.exeC:\Windows\system32\Ibpomf32.exe120⤵
- Drops file in System32 directory
PID:2616 -
C:\Windows\SysWOW64\Iacoicie.exeC:\Windows\system32\Iacoicie.exe121⤵PID:2624
-
C:\Windows\SysWOW64\Ieokia32.exeC:\Windows\system32\Ieokia32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-