Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 09:03
Static task
static1
Behavioral task
behavioral1
Sample
d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exe
Resource
win10v2004-20220812-en
General
-
Target
d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exe
-
Size
50KB
-
MD5
af79931866e11813349a6b7c3748e390
-
SHA1
a231d35414a3f08488639aec5385d52a06752375
-
SHA256
d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136
-
SHA512
f36f95ab849a8914bb506b5f5bd4402bb1d9499c85935196e78da977aae6689a5eb35c472d4a57a38ad13ef68fd69109c8371f855b1e7b65de5901a60cc62333
-
SSDEEP
768:kmbPvkdtfSIhhcG/SYYVVaOfmIWd9g/WEGOCOK+7k0id/1H5j:7bPv+tfSIhhceE/1/WEzTkHXx
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jpdnnf32.exeAcempg32.exeDklnoked.exeCommldoo.exeHmjafhej.exeEafpdchp.exeGglhbmqh.exeMhbcbeej.exeDbjmch32.exeNoikib32.exeKefpamff.exeLcnfeccf.exeNbjefb32.exeOnafkc32.exePpnbnjff.exePohhje32.exeFnbkphpi.exeAifcfbob.exeQmmelbka.exeKgpknb32.exeLfgddn32.exeMameajih.exeNmkphl32.exeAlnbhmfk.exeEegnel32.exeGmldgi32.exeGnfpoghd.exeLmflhi32.exeJnjlgkim.exeFgmlcinl.exeHqlbka32.exeGpmkno32.exeNgngdp32.exeApbhhldm.exeFokddaoj.exeJdmkbiim.exeFakjpc32.exeLjeoea32.exeLcgpdd32.exeNibammna.exeOaboln32.exeOafhgnca.exePdeabl32.exeAcaddhcp.exeHepiiaqn.exeFjbfdjle.exeHkeclo32.exeGmjegdbo.exeLfehon32.exeJfnfkqca.exeCcjebb32.exeGbpdhc32.exeNejjflbj.exeGnqpkmcp.exeLdpbml32.exeOekngmab.exeAafaed32.exeJjpkccgm.exeKopmnpkl.exeEnpbnbjb.exeMhpgmegm.exeFppgqpib.exeOgppicdc.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpdnnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acempg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dklnoked.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Commldoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmjafhej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eafpdchp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gglhbmqh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhbcbeej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbjmch32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noikib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kefpamff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcnfeccf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbjefb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onafkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppnbnjff.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pohhje32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnbkphpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aifcfbob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qmmelbka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgpknb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfgddn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mameajih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmkphl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alnbhmfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eegnel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmldgi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnfpoghd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmflhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnjlgkim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgmlcinl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hqlbka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpmkno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngngdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apbhhldm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fokddaoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdmkbiim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fakjpc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljeoea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcgpdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nibammna.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oaboln32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oafhgnca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdeabl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acaddhcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hepiiaqn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjbfdjle.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkeclo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmjegdbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfehon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfnfkqca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccjebb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbpdhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hqlbka32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nejjflbj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnqpkmcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldpbml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oekngmab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aafaed32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjpkccgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kopmnpkl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enpbnbjb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhpgmegm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fppgqpib.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogppicdc.exe -
Executes dropped EXE 64 IoCs
Processes:
Dhlcgkaf.exeDagdep32.exeDaiakpca.exeDbjmch32.exeElbblnpp.exeEfhfifpf.exeEfjbof32.exeEofgch32.exeEhnlln32.exeEafpdchp.exeEojanhgi.exeFdgifoeq.exeFomncg32.exeFakjpc32.exeFkcnhhkk.exeFnbjddjn.exeFppgqpib.exeFcocmkhf.exeFkfknh32.exeFgmlcinl.exeFngdpc32.exeGhpepa32.exeGojmmk32.exeGjpajd32.exeGbkfof32.exeGdibkb32.exeGlqjlo32.exeGoofhkeo.exeGdlopacg.exeGkfgml32.exeGndcig32.exeGdnlfaad.exeGglhbmqh.exeGnfpoghd.exeHccignfl.exeHkjqhkgn.exeHmlmpc32.exeHqlbka32.exeHkeclo32.exeHbplii32.exeIbbhni32.exeIinmqb32.exePnodjf32.exeQigemoke.exeDjbnfd32.exeDapoqfag.exeEnnfffac.exeFnkepifa.exeFjbfdjle.exeFegjbckl.exeFmcofeif.exeFcmgcp32.exeFnbkphpi.exeFpchhq32.exeFfnpdkmd.exeFillqflh.exeGiniff32.exeGmjegdbo.exeGphacpab.exeGmlbldql.exeGpknhppp.exeGpmkno32.exeGbkgjk32.exeGejcff32.exepid process 952 Dhlcgkaf.exe 1740 Dagdep32.exe 628 Daiakpca.exe 1204 Dbjmch32.exe 896 Elbblnpp.exe 1640 Efhfifpf.exe 1768 Efjbof32.exe 1608 Eofgch32.exe 1756 Ehnlln32.exe 1824 Eafpdchp.exe 584 Eojanhgi.exe 240 Fdgifoeq.exe 1744 Fomncg32.exe 544 Fakjpc32.exe 1260 Fkcnhhkk.exe 1632 Fnbjddjn.exe 1680 Fppgqpib.exe 1336 Fcocmkhf.exe 1224 Fkfknh32.exe 848 Fgmlcinl.exe 1060 Fngdpc32.exe 1056 Ghpepa32.exe 1792 Gojmmk32.exe 1396 Gjpajd32.exe 968 Gbkfof32.exe 1972 Gdibkb32.exe 556 Glqjlo32.exe 1040 Goofhkeo.exe 1168 Gdlopacg.exe 1436 Gkfgml32.exe 1344 Gndcig32.exe 1372 Gdnlfaad.exe 1200 Gglhbmqh.exe 1376 Gnfpoghd.exe 1976 Hccignfl.exe 1692 Hkjqhkgn.exe 1712 Hmlmpc32.exe 1144 Hqlbka32.exe 280 Hkeclo32.exe 908 Hbplii32.exe 316 Ibbhni32.exe 1076 Iinmqb32.exe 1552 Pnodjf32.exe 1980 Qigemoke.exe 1644 Djbnfd32.exe 1132 Dapoqfag.exe 1856 Ennfffac.exe 1716 Fnkepifa.exe 832 Fjbfdjle.exe 1536 Fegjbckl.exe 1548 Fmcofeif.exe 1008 Fcmgcp32.exe 332 Fnbkphpi.exe 692 Fpchhq32.exe 1160 Ffnpdkmd.exe 344 Fillqflh.exe 640 Giniff32.exe 1784 Gmjegdbo.exe 1148 Gphacpab.exe 2020 Gmlbldql.exe 1940 Gpknhppp.exe 1596 Gpmkno32.exe 1600 Gbkgjk32.exe 1696 Gejcff32.exe -
Loads dropped DLL 64 IoCs
Processes:
d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exeDhlcgkaf.exeDagdep32.exeDaiakpca.exeDbjmch32.exeElbblnpp.exeEfhfifpf.exeEfjbof32.exeEofgch32.exeEhnlln32.exeEafpdchp.exeEojanhgi.exeFdgifoeq.exeFomncg32.exeFakjpc32.exeFkcnhhkk.exeFnbjddjn.exeFppgqpib.exeFcocmkhf.exeFkfknh32.exeFgmlcinl.exeFngdpc32.exeGhpepa32.exeGojmmk32.exeGjpajd32.exeGbkfof32.exeGdibkb32.exeGlqjlo32.exeGfioed32.exeGdlopacg.exeGkfgml32.exeGndcig32.exepid process 1928 d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exe 1928 d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exe 952 Dhlcgkaf.exe 952 Dhlcgkaf.exe 1740 Dagdep32.exe 1740 Dagdep32.exe 628 Daiakpca.exe 628 Daiakpca.exe 1204 Dbjmch32.exe 1204 Dbjmch32.exe 896 Elbblnpp.exe 896 Elbblnpp.exe 1640 Efhfifpf.exe 1640 Efhfifpf.exe 1768 Efjbof32.exe 1768 Efjbof32.exe 1608 Eofgch32.exe 1608 Eofgch32.exe 1756 Ehnlln32.exe 1756 Ehnlln32.exe 1824 Eafpdchp.exe 1824 Eafpdchp.exe 584 Eojanhgi.exe 584 Eojanhgi.exe 240 Fdgifoeq.exe 240 Fdgifoeq.exe 1744 Fomncg32.exe 1744 Fomncg32.exe 544 Fakjpc32.exe 544 Fakjpc32.exe 1260 Fkcnhhkk.exe 1260 Fkcnhhkk.exe 1632 Fnbjddjn.exe 1632 Fnbjddjn.exe 1680 Fppgqpib.exe 1680 Fppgqpib.exe 1336 Fcocmkhf.exe 1336 Fcocmkhf.exe 1224 Fkfknh32.exe 1224 Fkfknh32.exe 848 Fgmlcinl.exe 848 Fgmlcinl.exe 1060 Fngdpc32.exe 1060 Fngdpc32.exe 1056 Ghpepa32.exe 1056 Ghpepa32.exe 1792 Gojmmk32.exe 1792 Gojmmk32.exe 1396 Gjpajd32.exe 1396 Gjpajd32.exe 968 Gbkfof32.exe 968 Gbkfof32.exe 1972 Gdibkb32.exe 1972 Gdibkb32.exe 556 Glqjlo32.exe 556 Glqjlo32.exe 1524 Gfioed32.exe 1524 Gfioed32.exe 1168 Gdlopacg.exe 1168 Gdlopacg.exe 1436 Gkfgml32.exe 1436 Gkfgml32.exe 1344 Gndcig32.exe 1344 Gndcig32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Cfkndnbf.exeFgmpag32.exeJimbglbd.exeKglfddgo.exeNfcdaaom.exeOiamlp32.exeAafaed32.exeFcafjq32.exeIijeag32.exeGfbljoke.exeGdlopacg.exeGnfpoghd.exePkjpdg32.exePbahed32.exeGhpepa32.exeJgihnp32.exeLaojkq32.exeMhbcbeej.exeNbhipb32.exeBccobckm.exeEelgplol.exeFngdpc32.exePnodjf32.exeNgngdp32.exeOgnccc32.exeOjloooei.exeMciiigjg.exeOgikciqf.exePocoofjn.exeCcjebb32.exeGigopnja.exeEnboca32.exeGbkfof32.exeFillqflh.exeHlakldho.exeNbcoecji.exeAiklab32.exeCapbco32.exeKefpamff.exeBabcjk32.exeGeaocg32.exeJhcmhhel.exeEafpdchp.exeMijfkl32.exeJjgefo32.exeKhbohhgm.exeNbjefb32.exeHkeclo32.exeGpmkno32.exeMjbmdp32.exeQclkih32.exeAifcfbob.exeObicofgo.exeLnjcklln.exeLmcigh32.exeIifpgi32.exeIafngkog.exeFgjclgop.exeFmihjn32.exeCedhcohn.exedescription ioc process File created C:\Windows\SysWOW64\Iljnoo32.dll Cfkndnbf.exe File opened for modification C:\Windows\SysWOW64\Ffppmcch.exe Fgmpag32.exe File created C:\Windows\SysWOW64\Ifpmhp32.dll Jimbglbd.exe File created C:\Windows\SysWOW64\Kmfnanol.exe Kglfddgo.exe File created C:\Windows\SysWOW64\Nibammna.exe Nfcdaaom.exe File created C:\Windows\SysWOW64\Dkchhe32.dll Nfcdaaom.exe File created C:\Windows\SysWOW64\Olpihk32.exe Oiamlp32.exe File created C:\Windows\SysWOW64\Lboffajc.dll Aafaed32.exe File created C:\Windows\SysWOW64\Fjnkljab.exe Fcafjq32.exe File created C:\Windows\SysWOW64\Qgemhpai.dll Iijeag32.exe File created C:\Windows\SysWOW64\Cgcdnmfd.dll Gfbljoke.exe File created C:\Windows\SysWOW64\Gkfgml32.exe Gdlopacg.exe File opened for modification C:\Windows\SysWOW64\Hccignfl.exe Gnfpoghd.exe File created C:\Windows\SysWOW64\Lmpichpl.dll Pkjpdg32.exe File created C:\Windows\SysWOW64\Padhaago.exe Pbahed32.exe File created C:\Windows\SysWOW64\Gojmmk32.exe Ghpepa32.exe File created C:\Windows\SysWOW64\Jncqkjpk.exe Jgihnp32.exe File created C:\Windows\SysWOW64\Lcnfeccf.exe Laojkq32.exe File opened for modification C:\Windows\SysWOW64\Molloo32.exe Mhbcbeej.exe File opened for modification C:\Windows\SysWOW64\Nfcdaaom.exe Nbhipb32.exe File created C:\Windows\SysWOW64\Pcnbmnkp.dll Bccobckm.exe File created C:\Windows\SysWOW64\Ekninf32.dll Eelgplol.exe File created C:\Windows\SysWOW64\Jjlfeb32.dll Fngdpc32.exe File opened for modification C:\Windows\SysWOW64\Qigemoke.exe Pnodjf32.exe File opened for modification C:\Windows\SysWOW64\Neagpmje.exe Ngngdp32.exe File opened for modification C:\Windows\SysWOW64\Ojloooei.exe Ognccc32.exe File created C:\Windows\SysWOW64\Glekjgna.dll Ojloooei.exe File created C:\Windows\SysWOW64\Ngelelbn.dll Mciiigjg.exe File created C:\Windows\SysWOW64\Ojhgpdpj.exe Ogikciqf.exe File created C:\Windows\SysWOW64\Pbokpe32.exe Pocoofjn.exe File created C:\Windows\SysWOW64\Ppkahgpi.dll Ccjebb32.exe File opened for modification C:\Windows\SysWOW64\Glflliid.exe Gigopnja.exe File created C:\Windows\SysWOW64\Caabbleh.dll Enboca32.exe File created C:\Windows\SysWOW64\Aefopn32.dll Gbkfof32.exe File created C:\Windows\SysWOW64\Giniff32.exe Fillqflh.exe File created C:\Windows\SysWOW64\Hielfhgi.exe Hlakldho.exe File created C:\Windows\SysWOW64\Lfjpcgif.dll Nbcoecji.exe File opened for modification C:\Windows\SysWOW64\Ahnmmoah.exe Aiklab32.exe File created C:\Windows\SysWOW64\Ffiioo32.dll Capbco32.exe File created C:\Windows\SysWOW64\Kialbk32.exe Kefpamff.exe File opened for modification C:\Windows\SysWOW64\Kialbk32.exe Kefpamff.exe File opened for modification C:\Windows\SysWOW64\Bdqofg32.exe Babcjk32.exe File created C:\Windows\SysWOW64\Ffppmcch.exe Fgmpag32.exe File opened for modification C:\Windows\SysWOW64\Gfbljoke.exe Geaocg32.exe File created C:\Windows\SysWOW64\Jdmkbiim.exe Jhcmhhel.exe File created C:\Windows\SysWOW64\Obqcdf32.dll Eafpdchp.exe File created C:\Windows\SysWOW64\Gdibkb32.exe Gbkfof32.exe File created C:\Windows\SysWOW64\Ljajbc32.dll Mijfkl32.exe File created C:\Windows\SysWOW64\Kalnidgk.dll Jjgefo32.exe File created C:\Windows\SysWOW64\Kolheb32.exe Khbohhgm.exe File created C:\Windows\SysWOW64\Llbmbi32.dll Nbjefb32.exe File created C:\Windows\SysWOW64\Jhdfdjip.dll Hkeclo32.exe File created C:\Windows\SysWOW64\Gbkgjk32.exe Gpmkno32.exe File opened for modification C:\Windows\SysWOW64\Mameajih.exe Mjbmdp32.exe File opened for modification C:\Windows\SysWOW64\Qkcbjf32.exe Qclkih32.exe File created C:\Windows\SysWOW64\Aldobnnf.exe Aifcfbob.exe File created C:\Windows\SysWOW64\Oicklp32.exe Obicofgo.exe File created C:\Windows\SysWOW64\Lfehon32.exe Lnjcklln.exe File opened for modification C:\Windows\SysWOW64\Llfibdck.exe Lmcigh32.exe File opened for modification C:\Windows\SysWOW64\Ildlce32.exe Iifpgi32.exe File created C:\Windows\SysWOW64\Adiefhga.dll Iafngkog.exe File opened for modification C:\Windows\SysWOW64\Fndlia32.exe Fgjclgop.exe File opened for modification C:\Windows\SysWOW64\Gobkbe32.exe Fmihjn32.exe File opened for modification C:\Windows\SysWOW64\Cipddm32.exe Cedhcohn.exe -
Modifies registry class 64 IoCs
Processes:
Pklmjgnp.exeDklnoked.exeFfppmcch.exeGigopnja.exeHagjlfkq.exeNikkln32.exeKqaifh32.exeLicdkj32.exePhlchl32.exeGfioed32.exeHqlbka32.exeGlqjlo32.exeGoofhkeo.exeNmkphl32.exeEfjbof32.exeFppgqpib.exeNoikib32.exeKdpfnh32.exeLnjglnkf.exeOjhgpdpj.exeEegnel32.exeJcfbgi32.exeDjbnfd32.exeEnnfffac.exeLgbinged.exeLmcigh32.exeMameajih.exeMihjelgc.exeMijfkl32.exeKefpamff.exeLcecoekq.exeLmamahoc.exeLelafj32.exeEhobcdgd.exeIldlce32.exeIafngkog.exePpnbnjff.exeFmihjn32.exeJgihnp32.exeNejjflbj.exeMggaof32.exeGaqjgiab.exeEafpdchp.exeKialbk32.exeGmjegdbo.exeKbqepkhm.exeLnjcklln.exeGlflliid.exeFkcnhhkk.exeIbbhni32.exeLlifhdai.exeMpabbf32.exeIckdeb32.exeJfnfkqca.exeKnhkgnmi.exeNbhipb32.exeIpaqhblc.exeLeonkj32.exeOnafkc32.exeAnonpe32.exeLppimcng.exeOkgbnbqa.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pklmjgnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dklnoked.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffppmcch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gigopnja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hagjlfkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imhbll32.dll" Nikkln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kqaifh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Licdkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phlchl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jajean32.dll" Gfioed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hqlbka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmblfg32.dll" Glqjlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddjllkba.dll" Goofhkeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdhcec32.dll" Nmkphl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efjbof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fppgqpib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Noikib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdpfnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnjglnkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojhgpdpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eegnel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jcfbgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djbnfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ennfffac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgbinged.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipljoiac.dll" Lmcigh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mameajih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mihjelgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mijfkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kefpamff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcecoekq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eokjkbfc.dll" Lmamahoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lelafj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alajpn32.dll" Lnjglnkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehobcdgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kojfbf32.dll" Ildlce32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iafngkog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dobeko32.dll" Ppnbnjff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmihjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jgihnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcmdgg32.dll" Nejjflbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kooffahn.dll" Mggaof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gaqjgiab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eafpdchp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kialbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gmjegdbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbqepkhm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnjcklln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Glflliid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkcnhhkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imjajc32.dll" Ibbhni32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llifhdai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpabbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ickdeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihhlie32.dll" Jfnfkqca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knhkgnmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogefon32.dll" Nbhipb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cglkakjk.dll" Ipaqhblc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Leonkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hodpcccm.dll" Onafkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Anonpe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbhipb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lppimcng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okgbnbqa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exeDhlcgkaf.exeDagdep32.exeDaiakpca.exeDbjmch32.exeElbblnpp.exeEfhfifpf.exeEfjbof32.exeEofgch32.exeEhnlln32.exeEafpdchp.exeEojanhgi.exeFdgifoeq.exeFomncg32.exeFakjpc32.exeFkcnhhkk.exedescription pid process target process PID 1928 wrote to memory of 952 1928 d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exe Dhlcgkaf.exe PID 1928 wrote to memory of 952 1928 d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exe Dhlcgkaf.exe PID 1928 wrote to memory of 952 1928 d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exe Dhlcgkaf.exe PID 1928 wrote to memory of 952 1928 d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exe Dhlcgkaf.exe PID 952 wrote to memory of 1740 952 Dhlcgkaf.exe Dagdep32.exe PID 952 wrote to memory of 1740 952 Dhlcgkaf.exe Dagdep32.exe PID 952 wrote to memory of 1740 952 Dhlcgkaf.exe Dagdep32.exe PID 952 wrote to memory of 1740 952 Dhlcgkaf.exe Dagdep32.exe PID 1740 wrote to memory of 628 1740 Dagdep32.exe Daiakpca.exe PID 1740 wrote to memory of 628 1740 Dagdep32.exe Daiakpca.exe PID 1740 wrote to memory of 628 1740 Dagdep32.exe Daiakpca.exe PID 1740 wrote to memory of 628 1740 Dagdep32.exe Daiakpca.exe PID 628 wrote to memory of 1204 628 Daiakpca.exe Dbjmch32.exe PID 628 wrote to memory of 1204 628 Daiakpca.exe Dbjmch32.exe PID 628 wrote to memory of 1204 628 Daiakpca.exe Dbjmch32.exe PID 628 wrote to memory of 1204 628 Daiakpca.exe Dbjmch32.exe PID 1204 wrote to memory of 896 1204 Dbjmch32.exe Elbblnpp.exe PID 1204 wrote to memory of 896 1204 Dbjmch32.exe Elbblnpp.exe PID 1204 wrote to memory of 896 1204 Dbjmch32.exe Elbblnpp.exe PID 1204 wrote to memory of 896 1204 Dbjmch32.exe Elbblnpp.exe PID 896 wrote to memory of 1640 896 Elbblnpp.exe Efhfifpf.exe PID 896 wrote to memory of 1640 896 Elbblnpp.exe Efhfifpf.exe PID 896 wrote to memory of 1640 896 Elbblnpp.exe Efhfifpf.exe PID 896 wrote to memory of 1640 896 Elbblnpp.exe Efhfifpf.exe PID 1640 wrote to memory of 1768 1640 Efhfifpf.exe Efjbof32.exe PID 1640 wrote to memory of 1768 1640 Efhfifpf.exe Efjbof32.exe PID 1640 wrote to memory of 1768 1640 Efhfifpf.exe Efjbof32.exe PID 1640 wrote to memory of 1768 1640 Efhfifpf.exe Efjbof32.exe PID 1768 wrote to memory of 1608 1768 Efjbof32.exe Eofgch32.exe PID 1768 wrote to memory of 1608 1768 Efjbof32.exe Eofgch32.exe PID 1768 wrote to memory of 1608 1768 Efjbof32.exe Eofgch32.exe PID 1768 wrote to memory of 1608 1768 Efjbof32.exe Eofgch32.exe PID 1608 wrote to memory of 1756 1608 Eofgch32.exe Ehnlln32.exe PID 1608 wrote to memory of 1756 1608 Eofgch32.exe Ehnlln32.exe PID 1608 wrote to memory of 1756 1608 Eofgch32.exe Ehnlln32.exe PID 1608 wrote to memory of 1756 1608 Eofgch32.exe Ehnlln32.exe PID 1756 wrote to memory of 1824 1756 Ehnlln32.exe Eafpdchp.exe PID 1756 wrote to memory of 1824 1756 Ehnlln32.exe Eafpdchp.exe PID 1756 wrote to memory of 1824 1756 Ehnlln32.exe Eafpdchp.exe PID 1756 wrote to memory of 1824 1756 Ehnlln32.exe Eafpdchp.exe PID 1824 wrote to memory of 584 1824 Eafpdchp.exe Eojanhgi.exe PID 1824 wrote to memory of 584 1824 Eafpdchp.exe Eojanhgi.exe PID 1824 wrote to memory of 584 1824 Eafpdchp.exe Eojanhgi.exe PID 1824 wrote to memory of 584 1824 Eafpdchp.exe Eojanhgi.exe PID 584 wrote to memory of 240 584 Eojanhgi.exe Fdgifoeq.exe PID 584 wrote to memory of 240 584 Eojanhgi.exe Fdgifoeq.exe PID 584 wrote to memory of 240 584 Eojanhgi.exe Fdgifoeq.exe PID 584 wrote to memory of 240 584 Eojanhgi.exe Fdgifoeq.exe PID 240 wrote to memory of 1744 240 Fdgifoeq.exe Fomncg32.exe PID 240 wrote to memory of 1744 240 Fdgifoeq.exe Fomncg32.exe PID 240 wrote to memory of 1744 240 Fdgifoeq.exe Fomncg32.exe PID 240 wrote to memory of 1744 240 Fdgifoeq.exe Fomncg32.exe PID 1744 wrote to memory of 544 1744 Fomncg32.exe Fakjpc32.exe PID 1744 wrote to memory of 544 1744 Fomncg32.exe Fakjpc32.exe PID 1744 wrote to memory of 544 1744 Fomncg32.exe Fakjpc32.exe PID 1744 wrote to memory of 544 1744 Fomncg32.exe Fakjpc32.exe PID 544 wrote to memory of 1260 544 Fakjpc32.exe Fkcnhhkk.exe PID 544 wrote to memory of 1260 544 Fakjpc32.exe Fkcnhhkk.exe PID 544 wrote to memory of 1260 544 Fakjpc32.exe Fkcnhhkk.exe PID 544 wrote to memory of 1260 544 Fakjpc32.exe Fkcnhhkk.exe PID 1260 wrote to memory of 1632 1260 Fkcnhhkk.exe Fnbjddjn.exe PID 1260 wrote to memory of 1632 1260 Fkcnhhkk.exe Fnbjddjn.exe PID 1260 wrote to memory of 1632 1260 Fkcnhhkk.exe Fnbjddjn.exe PID 1260 wrote to memory of 1632 1260 Fkcnhhkk.exe Fnbjddjn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exe"C:\Users\Admin\AppData\Local\Temp\d4a257e078e187478a509e095cf19581946b1184ee6b9cfaa5b5048dd3fb4136.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\Dhlcgkaf.exeC:\Windows\system32\Dhlcgkaf.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\Dagdep32.exeC:\Windows\system32\Dagdep32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\Daiakpca.exeC:\Windows\system32\Daiakpca.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\Dbjmch32.exeC:\Windows\system32\Dbjmch32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\Elbblnpp.exeC:\Windows\system32\Elbblnpp.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\Efhfifpf.exeC:\Windows\system32\Efhfifpf.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Efjbof32.exeC:\Windows\system32\Efjbof32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\Eofgch32.exeC:\Windows\system32\Eofgch32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\Ehnlln32.exeC:\Windows\system32\Ehnlln32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\Eafpdchp.exeC:\Windows\system32\Eafpdchp.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\Eojanhgi.exeC:\Windows\system32\Eojanhgi.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\Fdgifoeq.exeC:\Windows\system32\Fdgifoeq.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\Fomncg32.exeC:\Windows\system32\Fomncg32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\Fakjpc32.exeC:\Windows\system32\Fakjpc32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\Fkcnhhkk.exeC:\Windows\system32\Fkcnhhkk.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\Fnbjddjn.exeC:\Windows\system32\Fnbjddjn.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Windows\SysWOW64\Fppgqpib.exeC:\Windows\system32\Fppgqpib.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1680 -
C:\Windows\SysWOW64\Fcocmkhf.exeC:\Windows\system32\Fcocmkhf.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1336 -
C:\Windows\SysWOW64\Fkfknh32.exeC:\Windows\system32\Fkfknh32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1224 -
C:\Windows\SysWOW64\Fgmlcinl.exeC:\Windows\system32\Fgmlcinl.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:848 -
C:\Windows\SysWOW64\Fngdpc32.exeC:\Windows\system32\Fngdpc32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1060 -
C:\Windows\SysWOW64\Ghpepa32.exeC:\Windows\system32\Ghpepa32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1056 -
C:\Windows\SysWOW64\Gojmmk32.exeC:\Windows\system32\Gojmmk32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1792 -
C:\Windows\SysWOW64\Gjpajd32.exeC:\Windows\system32\Gjpajd32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1396 -
C:\Windows\SysWOW64\Gbkfof32.exeC:\Windows\system32\Gbkfof32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:968 -
C:\Windows\SysWOW64\Gdibkb32.exeC:\Windows\system32\Gdibkb32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Windows\SysWOW64\Glqjlo32.exeC:\Windows\system32\Glqjlo32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:556 -
C:\Windows\SysWOW64\Goofhkeo.exeC:\Windows\system32\Goofhkeo.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:1040 -
C:\Windows\SysWOW64\Gfioed32.exeC:\Windows\system32\Gfioed32.exe30⤵
- Loads dropped DLL
- Modifies registry class
PID:1524 -
C:\Windows\SysWOW64\Gdlopacg.exeC:\Windows\system32\Gdlopacg.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1168 -
C:\Windows\SysWOW64\Gkfgml32.exeC:\Windows\system32\Gkfgml32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436 -
C:\Windows\SysWOW64\Gndcig32.exeC:\Windows\system32\Gndcig32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1344 -
C:\Windows\SysWOW64\Gdnlfaad.exeC:\Windows\system32\Gdnlfaad.exe34⤵
- Executes dropped EXE
PID:1372 -
C:\Windows\SysWOW64\Gglhbmqh.exeC:\Windows\system32\Gglhbmqh.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1200 -
C:\Windows\SysWOW64\Gnfpoghd.exeC:\Windows\system32\Gnfpoghd.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1376 -
C:\Windows\SysWOW64\Hccignfl.exeC:\Windows\system32\Hccignfl.exe37⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\Hkjqhkgn.exeC:\Windows\system32\Hkjqhkgn.exe38⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\Hmlmpc32.exeC:\Windows\system32\Hmlmpc32.exe39⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\Hqlbka32.exeC:\Windows\system32\Hqlbka32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1144 -
C:\Windows\SysWOW64\Hkeclo32.exeC:\Windows\system32\Hkeclo32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:280 -
C:\Windows\SysWOW64\Hbplii32.exeC:\Windows\system32\Hbplii32.exe42⤵
- Executes dropped EXE
PID:908 -
C:\Windows\SysWOW64\Ibbhni32.exeC:\Windows\system32\Ibbhni32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:316 -
C:\Windows\SysWOW64\Iinmqb32.exeC:\Windows\system32\Iinmqb32.exe44⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\Pnodjf32.exeC:\Windows\system32\Pnodjf32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1552 -
C:\Windows\SysWOW64\Qigemoke.exeC:\Windows\system32\Qigemoke.exe46⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\Djbnfd32.exeC:\Windows\system32\Djbnfd32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:1644 -
C:\Windows\SysWOW64\Dapoqfag.exeC:\Windows\system32\Dapoqfag.exe48⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\Ennfffac.exeC:\Windows\system32\Ennfffac.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:1856 -
C:\Windows\SysWOW64\Fnkepifa.exeC:\Windows\system32\Fnkepifa.exe50⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\Fjbfdjle.exeC:\Windows\system32\Fjbfdjle.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:832 -
C:\Windows\SysWOW64\Fegjbckl.exeC:\Windows\system32\Fegjbckl.exe52⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\Fmcofeif.exeC:\Windows\system32\Fmcofeif.exe53⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\Fcmgcp32.exeC:\Windows\system32\Fcmgcp32.exe54⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\Fnbkphpi.exeC:\Windows\system32\Fnbkphpi.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:332 -
C:\Windows\SysWOW64\Fpchhq32.exeC:\Windows\system32\Fpchhq32.exe56⤵
- Executes dropped EXE
PID:692 -
C:\Windows\SysWOW64\Ffnpdkmd.exeC:\Windows\system32\Ffnpdkmd.exe57⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\Fillqflh.exeC:\Windows\system32\Fillqflh.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:344 -
C:\Windows\SysWOW64\Giniff32.exeC:\Windows\system32\Giniff32.exe59⤵
- Executes dropped EXE
PID:640 -
C:\Windows\SysWOW64\Gmjegdbo.exeC:\Windows\system32\Gmjegdbo.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1784 -
C:\Windows\SysWOW64\Gphacpab.exeC:\Windows\system32\Gphacpab.exe61⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\Gmlbldql.exeC:\Windows\system32\Gmlbldql.exe62⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\Gpknhppp.exeC:\Windows\system32\Gpknhppp.exe63⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\SysWOW64\Gpmkno32.exeC:\Windows\system32\Gpmkno32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1596 -
C:\Windows\SysWOW64\Gbkgjk32.exeC:\Windows\system32\Gbkgjk32.exe65⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\Gejcff32.exeC:\Windows\system32\Gejcff32.exe66⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\Gaqdkgah.exeC:\Windows\system32\Gaqdkgah.exe67⤵PID:1948
-
C:\Windows\SysWOW64\Hdopgbql.exeC:\Windows\system32\Hdopgbql.exe68⤵PID:1560
-
C:\Windows\SysWOW64\Hacqag32.exeC:\Windows\system32\Hacqag32.exe69⤵PID:1164
-
C:\Windows\SysWOW64\Hogajk32.exeC:\Windows\system32\Hogajk32.exe70⤵PID:628
-
C:\Windows\SysWOW64\Hmjafhej.exeC:\Windows\system32\Hmjafhej.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:708 -
C:\Windows\SysWOW64\Hiqbkikn.exeC:\Windows\system32\Hiqbkikn.exe72⤵PID:1952
-
C:\Windows\SysWOW64\Hagjlfkq.exeC:\Windows\system32\Hagjlfkq.exe73⤵
- Modifies registry class
PID:1932 -
C:\Windows\SysWOW64\Hicophil.exeC:\Windows\system32\Hicophil.exe74⤵PID:1332
-
C:\Windows\SysWOW64\Hlakldho.exeC:\Windows\system32\Hlakldho.exe75⤵
- Drops file in System32 directory
PID:1180 -
C:\Windows\SysWOW64\Hielfhgi.exeC:\Windows\system32\Hielfhgi.exe76⤵PID:436
-
C:\Windows\SysWOW64\Hlchbc32.exeC:\Windows\system32\Hlchbc32.exe77⤵PID:1620
-
C:\Windows\SysWOW64\Iobdno32.exeC:\Windows\system32\Iobdno32.exe78⤵PID:1504
-
C:\Windows\SysWOW64\Ipaqhblc.exeC:\Windows\system32\Ipaqhblc.exe79⤵
- Modifies registry class
PID:560 -
C:\Windows\SysWOW64\Iodqco32.exeC:\Windows\system32\Iodqco32.exe80⤵PID:1048
-
C:\Windows\SysWOW64\Iijeag32.exeC:\Windows\system32\Iijeag32.exe81⤵
- Drops file in System32 directory
PID:1264 -
C:\Windows\SysWOW64\Ieqffh32.exeC:\Windows\system32\Ieqffh32.exe82⤵PID:1212
-
C:\Windows\SysWOW64\Iagfkinl.exeC:\Windows\system32\Iagfkinl.exe83⤵PID:2036
-
C:\Windows\SysWOW64\Igdocplc.exeC:\Windows\system32\Igdocplc.exe84⤵PID:1584
-
C:\Windows\SysWOW64\Ipmclfbd.exeC:\Windows\system32\Ipmclfbd.exe85⤵PID:1628
-
C:\Windows\SysWOW64\Ihckmccf.exeC:\Windows\system32\Ihckmccf.exe86⤵PID:1340
-
C:\Windows\SysWOW64\Jdjlbd32.exeC:\Windows\system32\Jdjlbd32.exe87⤵PID:1808
-
C:\Windows\SysWOW64\Jgihnp32.exeC:\Windows\system32\Jgihnp32.exe88⤵
- Drops file in System32 directory
- Modifies registry class
PID:1416 -
C:\Windows\SysWOW64\Jncqkjpk.exeC:\Windows\system32\Jncqkjpk.exe89⤵PID:1520
-
C:\Windows\SysWOW64\Jqamge32.exeC:\Windows\system32\Jqamge32.exe90⤵PID:1320
-
C:\Windows\SysWOW64\Jofjhacf.exeC:\Windows\system32\Jofjhacf.exe91⤵PID:860
-
C:\Windows\SysWOW64\Jmjjafbp.exeC:\Windows\system32\Jmjjafbp.exe92⤵PID:2044
-
C:\Windows\SysWOW64\Jcdbnpjm.exeC:\Windows\system32\Jcdbnpjm.exe93⤵PID:2028
-
C:\Windows\SysWOW64\Jfbojkiq.exeC:\Windows\system32\Jfbojkiq.exe94⤵PID:820
-
C:\Windows\SysWOW64\Jiakfghd.exeC:\Windows\system32\Jiakfghd.exe95⤵PID:1648
-
C:\Windows\SysWOW64\Jkpgcbgh.exeC:\Windows\system32\Jkpgcbgh.exe96⤵PID:1736
-
C:\Windows\SysWOW64\Jokcca32.exeC:\Windows\system32\Jokcca32.exe97⤵PID:1216
-
C:\Windows\SysWOW64\Kkbdhbee.exeC:\Windows\system32\Kkbdhbee.exe98⤵PID:1764
-
C:\Windows\SysWOW64\Kbllellb.exeC:\Windows\system32\Kbllellb.exe99⤵PID:1988
-
C:\Windows\SysWOW64\Kopmnpkl.exeC:\Windows\system32\Kopmnpkl.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1500 -
C:\Windows\SysWOW64\Kqaifh32.exeC:\Windows\system32\Kqaifh32.exe101⤵
- Modifies registry class
PID:1744 -
C:\Windows\SysWOW64\Kbqepkhm.exeC:\Windows\system32\Kbqepkhm.exe102⤵
- Modifies registry class
PID:1384 -
C:\Windows\SysWOW64\Kqcflhog.exeC:\Windows\system32\Kqcflhog.exe103⤵PID:1112
-
C:\Windows\SysWOW64\Keoalg32.exeC:\Windows\system32\Keoalg32.exe104⤵PID:1144
-
C:\Windows\SysWOW64\Kgpknb32.exeC:\Windows\system32\Kgpknb32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:908 -
C:\Windows\SysWOW64\Kfbkiokl.exeC:\Windows\system32\Kfbkiokl.exe106⤵PID:952
-
C:\Windows\SysWOW64\Lnjcklln.exeC:\Windows\system32\Lnjcklln.exe107⤵
- Drops file in System32 directory
- Modifies registry class
PID:1204 -
C:\Windows\SysWOW64\Lfehon32.exeC:\Windows\system32\Lfehon32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:896 -
C:\Windows\SysWOW64\Licdkj32.exeC:\Windows\system32\Licdkj32.exe109⤵
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\Lfgddn32.exeC:\Windows\system32\Lfgddn32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:584 -
C:\Windows\SysWOW64\Ljcpempp.exeC:\Windows\system32\Ljcpempp.exe111⤵PID:1640
-
C:\Windows\SysWOW64\Lmamahoc.exeC:\Windows\system32\Lmamahoc.exe112⤵
- Modifies registry class
PID:1260 -
C:\Windows\SysWOW64\Lppimcng.exeC:\Windows\system32\Lppimcng.exe113⤵
- Modifies registry class
PID:976 -
C:\Windows\SysWOW64\Lbneiomk.exeC:\Windows\system32\Lbneiomk.exe114⤵PID:516
-
C:\Windows\SysWOW64\Lelafj32.exeC:\Windows\system32\Lelafj32.exe115⤵
- Modifies registry class
PID:672 -
C:\Windows\SysWOW64\Lmcigh32.exeC:\Windows\system32\Lmcigh32.exe116⤵
- Drops file in System32 directory
- Modifies registry class
PID:2012 -
C:\Windows\SysWOW64\Llfibdck.exeC:\Windows\system32\Llfibdck.exe117⤵PID:1780
-
C:\Windows\SysWOW64\Lnefopbo.exeC:\Windows\system32\Lnefopbo.exe118⤵PID:1968
-
C:\Windows\SysWOW64\Leonkj32.exeC:\Windows\system32\Leonkj32.exe119⤵
- Modifies registry class
PID:272 -
C:\Windows\SysWOW64\Lhmjge32.exeC:\Windows\system32\Lhmjge32.exe120⤵PID:568
-
C:\Windows\SysWOW64\Llifhdai.exeC:\Windows\system32\Llifhdai.exe121⤵
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Lngbdpqm.exeC:\Windows\system32\Lngbdpqm.exe122⤵PID:996
-
C:\Windows\SysWOW64\Laeopkpp.exeC:\Windows\system32\Laeopkpp.exe123⤵PID:1240
-
C:\Windows\SysWOW64\Mimgah32.exeC:\Windows\system32\Mimgah32.exe124⤵PID:636
-
C:\Windows\SysWOW64\Mhpgmegm.exeC:\Windows\system32\Mhpgmegm.exe125⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1700 -
C:\Windows\SysWOW64\Mniojo32.exeC:\Windows\system32\Mniojo32.exe126⤵PID:2056
-
C:\Windows\SysWOW64\Mahkfk32.exeC:\Windows\system32\Mahkfk32.exe127⤵PID:2064
-
C:\Windows\SysWOW64\Mhbcbeej.exeC:\Windows\system32\Mhbcbeej.exe128⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2072 -
C:\Windows\SysWOW64\Molloo32.exeC:\Windows\system32\Molloo32.exe129⤵PID:2080
-
C:\Windows\SysWOW64\Majhkj32.exeC:\Windows\system32\Majhkj32.exe130⤵PID:2088
-
C:\Windows\SysWOW64\Mdhdgf32.exeC:\Windows\system32\Mdhdgf32.exe131⤵PID:2096
-
C:\Windows\SysWOW64\Mfgqcajb.exeC:\Windows\system32\Mfgqcajb.exe132⤵PID:2104
-
C:\Windows\SysWOW64\Mjbmdp32.exeC:\Windows\system32\Mjbmdp32.exe133⤵
- Drops file in System32 directory
PID:2112 -
C:\Windows\SysWOW64\Mameajih.exeC:\Windows\system32\Mameajih.exe134⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2120 -
C:\Windows\SysWOW64\Mdkameil.exeC:\Windows\system32\Mdkameil.exe135⤵PID:2128
-
C:\Windows\SysWOW64\Mfimiahp.exeC:\Windows\system32\Mfimiahp.exe136⤵PID:2136
-
C:\Windows\SysWOW64\Mihjelgc.exeC:\Windows\system32\Mihjelgc.exe137⤵
- Modifies registry class
PID:2144 -
C:\Windows\SysWOW64\Mpabbf32.exeC:\Windows\system32\Mpabbf32.exe138⤵
- Modifies registry class
PID:2152 -
C:\Windows\SysWOW64\Mbpnnb32.exeC:\Windows\system32\Mbpnnb32.exe139⤵PID:2160
-
C:\Windows\SysWOW64\Mijfkl32.exeC:\Windows\system32\Mijfkl32.exe140⤵
- Drops file in System32 directory
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\Mlhbgg32.exeC:\Windows\system32\Mlhbgg32.exe141⤵PID:2176
-
C:\Windows\SysWOW64\Npdogflm.exeC:\Windows\system32\Npdogflm.exe142⤵PID:2184
-
C:\Windows\SysWOW64\Ngngdp32.exeC:\Windows\system32\Ngngdp32.exe143⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\Neagpmje.exeC:\Windows\system32\Neagpmje.exe144⤵PID:2200
-
C:\Windows\SysWOW64\Nmhoajkg.exeC:\Windows\system32\Nmhoajkg.exe145⤵PID:2208
-
C:\Windows\SysWOW64\Npfkmfjk.exeC:\Windows\system32\Npfkmfjk.exe146⤵PID:2216
-
C:\Windows\SysWOW64\Noikib32.exeC:\Windows\system32\Noikib32.exe147⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2224 -
C:\Windows\SysWOW64\Niopfkak.exeC:\Windows\system32\Niopfkak.exe148⤵PID:2284
-
C:\Windows\SysWOW64\Nopaia32.exeC:\Windows\system32\Nopaia32.exe149⤵PID:2312
-
C:\Windows\SysWOW64\Nejjflbj.exeC:\Windows\system32\Nejjflbj.exe150⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2332 -
C:\Windows\SysWOW64\Nhifbgan.exeC:\Windows\system32\Nhifbgan.exe151⤵PID:2348
-
C:\Windows\SysWOW64\Okgbnbqa.exeC:\Windows\system32\Okgbnbqa.exe152⤵
- Modifies registry class
PID:2364 -
C:\Windows\SysWOW64\Oobnoa32.exeC:\Windows\system32\Oobnoa32.exe153⤵PID:2380
-
C:\Windows\SysWOW64\Oaajkm32.exeC:\Windows\system32\Oaajkm32.exe154⤵PID:2396
-
C:\Windows\SysWOW64\Opdkfioi.exeC:\Windows\system32\Opdkfioi.exe155⤵PID:2412
-
C:\Windows\SysWOW64\Ohkchgpk.exeC:\Windows\system32\Ohkchgpk.exe156⤵PID:2424
-
C:\Windows\SysWOW64\Ognccc32.exeC:\Windows\system32\Ognccc32.exe157⤵
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\Ojloooei.exeC:\Windows\system32\Ojloooei.exe158⤵
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\Onhkpn32.exeC:\Windows\system32\Onhkpn32.exe159⤵PID:2468
-
C:\Windows\SysWOW64\Opfgli32.exeC:\Windows\system32\Opfgli32.exe160⤵PID:2484
-
C:\Windows\SysWOW64\Odacmheo.exeC:\Windows\system32\Odacmheo.exe161⤵PID:2500
-
C:\Windows\SysWOW64\Ogppicdc.exeC:\Windows\system32\Ogppicdc.exe162⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2884 -
C:\Windows\SysWOW64\Ebplkmjn.exeC:\Windows\system32\Ebplkmjn.exe163⤵PID:2892
-
C:\Windows\SysWOW64\Fijdhg32.exeC:\Windows\system32\Fijdhg32.exe164⤵PID:2900
-
C:\Windows\SysWOW64\Ggnapocp.exeC:\Windows\system32\Ggnapocp.exe165⤵PID:2908
-
C:\Windows\SysWOW64\Ghonhg32.exeC:\Windows\system32\Ghonhg32.exe166⤵PID:2916
-
C:\Windows\SysWOW64\Gnqpkmcp.exeC:\Windows\system32\Gnqpkmcp.exe167⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2924 -
C:\Windows\SysWOW64\Gfhglkdb.exeC:\Windows\system32\Gfhglkdb.exe168⤵PID:2964
-
C:\Windows\SysWOW64\Hmoobh32.exeC:\Windows\system32\Hmoobh32.exe169⤵PID:2972
-
C:\Windows\SysWOW64\Hqkkcghf.exeC:\Windows\system32\Hqkkcghf.exe170⤵PID:2980
-
C:\Windows\SysWOW64\Iblhkp32.exeC:\Windows\system32\Iblhkp32.exe171⤵PID:2988
-
C:\Windows\SysWOW64\Iifpgi32.exeC:\Windows\system32\Iifpgi32.exe172⤵
- Drops file in System32 directory
PID:2996 -
C:\Windows\SysWOW64\Ildlce32.exeC:\Windows\system32\Ildlce32.exe173⤵
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\Ickdeb32.exeC:\Windows\system32\Ickdeb32.exe174⤵
- Modifies registry class
PID:3012 -
C:\Windows\SysWOW64\Ibndpola.exeC:\Windows\system32\Ibndpola.exe175⤵PID:3020
-
C:\Windows\SysWOW64\Imdinhlh.exeC:\Windows\system32\Imdinhlh.exe176⤵PID:3028
-
C:\Windows\SysWOW64\Ipbejckk.exeC:\Windows\system32\Ipbejckk.exe177⤵PID:3036
-
C:\Windows\SysWOW64\Iflmfm32.exeC:\Windows\system32\Iflmfm32.exe178⤵PID:3044
-
C:\Windows\SysWOW64\Iikibial.exeC:\Windows\system32\Iikibial.exe179⤵PID:3052
-
C:\Windows\SysWOW64\Ilifodqp.exeC:\Windows\system32\Ilifodqp.exe180⤵PID:3060
-
C:\Windows\SysWOW64\Ingbkppc.exeC:\Windows\system32\Ingbkppc.exe181⤵PID:3068
-
C:\Windows\SysWOW64\Iafngkog.exeC:\Windows\system32\Iafngkog.exe182⤵
- Drops file in System32 directory
- Modifies registry class
PID:2236 -
C:\Windows\SysWOW64\Ibekan32.exeC:\Windows\system32\Ibekan32.exe183⤵PID:2244
-
C:\Windows\SysWOW64\Ihbcie32.exeC:\Windows\system32\Ihbcie32.exe184⤵PID:2252
-
C:\Windows\SysWOW64\Jnlkfo32.exeC:\Windows\system32\Jnlkfo32.exe185⤵PID:2260
-
C:\Windows\SysWOW64\Jajhbj32.exeC:\Windows\system32\Jajhbj32.exe186⤵PID:2268
-
C:\Windows\SysWOW64\Jhdpodbn.exeC:\Windows\system32\Jhdpodbn.exe187⤵PID:2276
-
C:\Windows\SysWOW64\Jamdgj32.exeC:\Windows\system32\Jamdgj32.exe188⤵PID:2280
-
C:\Windows\SysWOW64\Jpbaif32.exeC:\Windows\system32\Jpbaif32.exe189⤵PID:2300
-
C:\Windows\SysWOW64\Jjgefo32.exeC:\Windows\system32\Jjgefo32.exe190⤵
- Drops file in System32 directory
PID:2308 -
C:\Windows\SysWOW64\Jlibnhck.exeC:\Windows\system32\Jlibnhck.exe191⤵PID:2324
-
C:\Windows\SysWOW64\Jpdnnf32.exeC:\Windows\system32\Jpdnnf32.exe192⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2344 -
C:\Windows\SysWOW64\Jfnfkqca.exeC:\Windows\system32\Jfnfkqca.exe193⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2356 -
C:\Windows\SysWOW64\Jimbglbd.exeC:\Windows\system32\Jimbglbd.exe194⤵
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\Jpgkdfia.exeC:\Windows\system32\Jpgkdfia.exe195⤵PID:2388
-
C:\Windows\SysWOW64\Jbegpaie.exeC:\Windows\system32\Jbegpaie.exe196⤵PID:2404
-
C:\Windows\SysWOW64\Khbohhgm.exeC:\Windows\system32\Khbohhgm.exe197⤵
- Drops file in System32 directory
PID:2420 -
C:\Windows\SysWOW64\Kolheb32.exeC:\Windows\system32\Kolheb32.exe198⤵PID:2460
-
C:\Windows\SysWOW64\Kefpamff.exeC:\Windows\system32\Kefpamff.exe199⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2448 -
C:\Windows\SysWOW64\Kialbk32.exeC:\Windows\system32\Kialbk32.exe200⤵
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Klphnfmc.exeC:\Windows\system32\Klphnfmc.exe201⤵PID:2628
-
C:\Windows\SysWOW64\Kehmgl32.exeC:\Windows\system32\Kehmgl32.exe202⤵PID:2648
-
C:\Windows\SysWOW64\Khfich32.exeC:\Windows\system32\Khfich32.exe203⤵PID:2680
-
C:\Windows\SysWOW64\Kkeeoc32.exeC:\Windows\system32\Kkeeoc32.exe204⤵PID:2712
-
C:\Windows\SysWOW64\Kaomlmih.exeC:\Windows\system32\Kaomlmih.exe205⤵PID:2776
-
C:\Windows\SysWOW64\Kglfddgo.exeC:\Windows\system32\Kglfddgo.exe206⤵
- Drops file in System32 directory
PID:2800 -
C:\Windows\SysWOW64\Kmfnanol.exeC:\Windows\system32\Kmfnanol.exe207⤵PID:2836
-
C:\Windows\SysWOW64\Kdpfnh32.exeC:\Windows\system32\Kdpfnh32.exe208⤵
- Modifies registry class
PID:1308 -
C:\Windows\SysWOW64\Knhkgnmi.exeC:\Windows\system32\Knhkgnmi.exe209⤵
- Modifies registry class
PID:1956 -
C:\Windows\SysWOW64\Lacggm32.exeC:\Windows\system32\Lacggm32.exe210⤵PID:472
-
C:\Windows\SysWOW64\Lcecoekq.exeC:\Windows\system32\Lcecoekq.exe211⤵
- Modifies registry class
PID:2872 -
C:\Windows\SysWOW64\Lnjglnkf.exeC:\Windows\system32\Lnjglnkf.exe212⤵
- Modifies registry class
PID:1076 -
C:\Windows\SysWOW64\Lddpihbc.exeC:\Windows\system32\Lddpihbc.exe213⤵PID:1400
-
C:\Windows\SysWOW64\Lcgpdd32.exeC:\Windows\system32\Lcgpdd32.exe214⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2040 -
C:\Windows\SysWOW64\Leflqp32.exeC:\Windows\system32\Leflqp32.exe215⤵PID:1912
-
C:\Windows\SysWOW64\Lnmdam32.exeC:\Windows\system32\Lnmdam32.exe216⤵PID:1540
-
C:\Windows\SysWOW64\Lonqieob.exeC:\Windows\system32\Lonqieob.exe217⤵PID:1728
-
C:\Windows\SysWOW64\Lehifp32.exeC:\Windows\system32\Lehifp32.exe218⤵PID:960
-
C:\Windows\SysWOW64\Laojkq32.exeC:\Windows\system32\Laojkq32.exe219⤵
- Drops file in System32 directory
PID:1852 -
C:\Windows\SysWOW64\Lcnfeccf.exeC:\Windows\system32\Lcnfeccf.exe220⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:980 -
C:\Windows\SysWOW64\Ldpbml32.exeC:\Windows\system32\Ldpbml32.exe221⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:780 -
C:\Windows\SysWOW64\Mlgjni32.exeC:\Windows\system32\Mlgjni32.exe222⤵PID:1672
-
C:\Windows\SysWOW64\Mfoogo32.exeC:\Windows\system32\Mfoogo32.exe223⤵PID:2008
-
C:\Windows\SysWOW64\Mdbobkga.exeC:\Windows\system32\Mdbobkga.exe224⤵PID:1428
-
C:\Windows\SysWOW64\Mklgoe32.exeC:\Windows\system32\Mklgoe32.exe225⤵PID:1788
-
C:\Windows\SysWOW64\Mnjdka32.exeC:\Windows\system32\Mnjdka32.exe226⤵PID:1684
-
C:\Windows\SysWOW64\Mddlhkeo.exeC:\Windows\system32\Mddlhkeo.exe227⤵PID:1572
-
C:\Windows\SysWOW64\Mhphhj32.exeC:\Windows\system32\Mhphhj32.exe228⤵PID:1544
-
C:\Windows\SysWOW64\Mkndde32.exeC:\Windows\system32\Mkndde32.exe229⤵PID:364
-
C:\Windows\SysWOW64\Mjadpbcf.exeC:\Windows\system32\Mjadpbcf.exe230⤵PID:1064
-
C:\Windows\SysWOW64\Mqkmmljc.exeC:\Windows\system32\Mqkmmljc.exe231⤵PID:1944
-
C:\Windows\SysWOW64\Mciiigjg.exeC:\Windows\system32\Mciiigjg.exe232⤵
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\Mgeejf32.exeC:\Windows\system32\Mgeejf32.exe233⤵PID:1604
-
C:\Windows\SysWOW64\Mjcafa32.exeC:\Windows\system32\Mjcafa32.exe234⤵PID:1708
-
C:\Windows\SysWOW64\Mqmiblhq.exeC:\Windows\system32\Mqmiblhq.exe235⤵PID:1668
-
C:\Windows\SysWOW64\Mggaof32.exeC:\Windows\system32\Mggaof32.exe236⤵
- Modifies registry class
PID:1804 -
C:\Windows\SysWOW64\Mnajlpgj.exeC:\Windows\system32\Mnajlpgj.exe237⤵PID:1740
-
C:\Windows\SysWOW64\Mmdjgm32.exeC:\Windows\system32\Mmdjgm32.exe238⤵PID:1300
-
C:\Windows\SysWOW64\Ncnbdg32.exeC:\Windows\system32\Ncnbdg32.exe239⤵PID:1608
-
C:\Windows\SysWOW64\Nikkln32.exeC:\Windows\system32\Nikkln32.exe240⤵
- Modifies registry class
PID:1680 -
C:\Windows\SysWOW64\Nqbcnk32.exeC:\Windows\system32\Nqbcnk32.exe241⤵PID:1224
-