Analysis
-
max time kernel
81s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 09:03
Static task
static1
Behavioral task
behavioral1
Sample
7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393.exe
Resource
win10v2004-20220901-en
General
-
Target
7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393.exe
-
Size
50KB
-
MD5
b11d21e919d167f3860b1e126f497540
-
SHA1
fdb23e8f96d87eb41e154b3a6912f12bf50d5965
-
SHA256
7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393
-
SHA512
ee2a9eb666ec28e121542cb24a5b30ea60ffdd386b1303456aa16a92fc4675f330e963a88b6694ae8a7d93592dab11734ec2e2ade10871e44f09f6cf6d8e6751
-
SSDEEP
1536:piHbz2oJABpzQ6aBBFDKlPo+dQiEpdVssVg:UHv2oczXavwlgIQjdssVg
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Oignimod.exeFhfedgmh.exeFhkopf32.exeGechdjdg.exeGldgac32.exeIknfdmhl.exeKkookjii.exeKhcpenhc.exeNiadmjnp.exeNmdgnhpa.exeDfheop32.exeIocldlfm.exePmefplej.exeQgfnop32.exeNemomjpo.exePbahmlpf.exeCckmaflf.exeBqahdcjk.exeGhohkfen.exeGdkbkfgl.exeAmgeac32.exeBpcnoldm.exeCnjknp32.exeIemdaf32.exeQeigpfgo.exeApqhbo32.exeAomkdjcb.exeBigimb32.exeDnhgoned.exeKblkhjbo.exeLbgjdiha.exeOfcahl32.exePolbmmbe.exeInhiei32.exePimmpfep.exeBpoddm32.exeBpaaimgp.exeMjhekdai.exeQpmfbfmc.exeElmhjfig.exeLoaamhlj.exeNpefji32.exeHlkmbbod.exeNnnmealg.exeBnphha32.exeBcmqphhf.exeLjaokega.exeBdpajaqb.exeEkfaig32.exeKklbfj32.exeJkhpeacm.exeNlpaiemd.exeAgkqoilo.exePgmkha32.exeAnlfgh32.exeGmcfcl32.exeJofaaifh.exeNfjoan32.exeCfgmhbml.exeEmndao32.exeFjkgaa32.exeHahejimk.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oignimod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhfedgmh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhkopf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gechdjdg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gldgac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iknfdmhl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkookjii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khcpenhc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niadmjnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmdgnhpa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfheop32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iocldlfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmefplej.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgfnop32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nemomjpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbahmlpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cckmaflf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bqahdcjk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghohkfen.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdkbkfgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amgeac32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpcnoldm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnjknp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iemdaf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qeigpfgo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apqhbo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aomkdjcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bigimb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnhgoned.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kblkhjbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbgjdiha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofcahl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Polbmmbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inhiei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pimmpfep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpoddm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpaaimgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjhekdai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qpmfbfmc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elmhjfig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Loaamhlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npefji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlkmbbod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnnmealg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pimmpfep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnphha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bcmqphhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljaokega.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdpajaqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekfaig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kklbfj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkhpeacm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljaokega.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlpaiemd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agkqoilo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgmkha32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anlfgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmcfcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jofaaifh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfjoan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfgmhbml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emndao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjkgaa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hahejimk.exe -
Executes dropped EXE 64 IoCs
Processes:
Jchafp32.exeJjbjbjad.exeJbnogl32.exeJhhgcffl.exeJjgcni32.exeJkhpeacm.exeJjjpcikl.exeKcfngnng.exeKmobpc32.exeKblkhjbo.exeKifced32.exeKcndhm32.exeLkiiloej.exeLimiecdd.exeLiofkc32.exeLpinhmin.exeLbgjdiha.exeLjobefid.exeLcggnl32.exeLjaokega.exeLlblbnmp.exeMfhppfme.exeMldhhnkm.exeMjfhfe32.exeMpbanlac.exeMjhekdai.exeMliacm32.exeMfofpe32.exeMllnhm32.exeMbefef32.exeMlnknlcb.exeNlphclqp.exeNjahacio.exeNdjlji32.exeNdliph32.exeNdofehkj.exeNpefji32.exeOpgcpiok.exeObhladll.exeOlqqjibm.exeObkigc32.exeOidadnaf.exeOpoiqh32.exeOignimod.exeOpaffggq.exePkfjcpfg.exePmefplej.exePgmkha32.exePmgcek32.exePpepag32.exePkkdop32.exePdchgeib.exePgbdcqhe.exePpjilfof.exePibmel32.exeQpmfbfmc.exeQgfnop32.exeQpobgekq.exeQnccaj32.exeAgkgjopk.exeAgndoo32.exeAdadic32.exeAphendbf.exeAnlfgh32.exepid process 2976 Jchafp32.exe 2228 Jjbjbjad.exe 2940 Jbnogl32.exe 2356 Jhhgcffl.exe 3256 Jjgcni32.exe 1404 Jkhpeacm.exe 3592 Jjjpcikl.exe 4792 Kcfngnng.exe 3132 Kmobpc32.exe 404 Kblkhjbo.exe 2484 Kifced32.exe 3844 Kcndhm32.exe 1908 Lkiiloej.exe 2832 Limiecdd.exe 4056 Liofkc32.exe 368 Lpinhmin.exe 628 Lbgjdiha.exe 4268 Ljobefid.exe 4664 Lcggnl32.exe 2284 Ljaokega.exe 4688 Llblbnmp.exe 1264 Mfhppfme.exe 4240 Mldhhnkm.exe 2584 Mjfhfe32.exe 3448 Mpbanlac.exe 836 Mjhekdai.exe 3808 Mliacm32.exe 4508 Mfofpe32.exe 4524 Mllnhm32.exe 5060 Mbefef32.exe 4420 Mlnknlcb.exe 4404 Nlphclqp.exe 3564 Njahacio.exe 2596 Ndjlji32.exe 2200 Ndliph32.exe 2900 Ndofehkj.exe 4896 Npefji32.exe 5084 Opgcpiok.exe 860 Obhladll.exe 1748 Olqqjibm.exe 3896 Obkigc32.exe 3460 Oidadnaf.exe 3304 Opoiqh32.exe 1880 Oignimod.exe 2456 Opaffggq.exe 1804 Pkfjcpfg.exe 4344 Pmefplej.exe 2876 Pgmkha32.exe 1784 Pmgcek32.exe 4128 Ppepag32.exe 1724 Pkkdop32.exe 2608 Pdchgeib.exe 2392 Pgbdcqhe.exe 4428 Ppjilfof.exe 5072 Pibmel32.exe 4352 Qpmfbfmc.exe 760 Qgfnop32.exe 4260 Qpobgekq.exe 2068 Qnccaj32.exe 3204 Agkgjopk.exe 5040 Agndoo32.exe 388 Adadic32.exe 1000 Aphendbf.exe 3284 Anlfgh32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Nfchaool.exe7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393.exeJlpodoml.exePppola32.exeQeigpfgo.exeOnnflo32.exeOpoiqh32.exeAgndoo32.exeBdpajaqb.exeJekpbdaj.exeJhlidp32.exeMiohgjpc.exeOfhkclmd.exeDnlqjn32.exeHhkgfdkp.exeOpgcpiok.exeKhqcoo32.exeOoqcanlb.exeLkiiloej.exePdchgeib.exeAmblfc32.exeDcdpgeck.exeHlipmbag.exeOiandh32.exeBgkifg32.exeCcnjgf32.exeJkhpeacm.exePpjilfof.exeKhnfjo32.exeKnkobf32.exeNdofehkj.exeBpokncln.exeDjdhje32.exeFlodpfgd.exePepdihoj.exeKcndhm32.exeLpinhmin.exeNicabjln.exeObclln32.exeDgkbmdpj.exeDonmbfgm.exeNpipdd32.exeBeipfd32.exeFhkopf32.exeHlkmbbod.exeAipclc32.exeMlnknlcb.exeGldgac32.exePbolhm32.exeLjobefid.exeNlpaiemd.exeLimiecdd.exeMllnhm32.exeNdliph32.exeFalmhm32.exeHlnihbma.exeIocldlfm.exeIafalg32.exeJofaaifh.exeJchafp32.exedescription ioc process File created C:\Windows\SysWOW64\Kaddfk32.dll Nfchaool.exe File opened for modification C:\Windows\SysWOW64\Jchafp32.exe 7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393.exe File created C:\Windows\SysWOW64\Jnallg32.exe Jlpodoml.exe File opened for modification C:\Windows\SysWOW64\Pbolhm32.exe Pppola32.exe File created C:\Windows\SysWOW64\Heaipk32.dll Qeigpfgo.exe File opened for modification C:\Windows\SysWOW64\Objbmm32.exe Onnflo32.exe File opened for modification C:\Windows\SysWOW64\Oignimod.exe Opoiqh32.exe File created C:\Windows\SysWOW64\Adadic32.exe Agndoo32.exe File opened for modification C:\Windows\SysWOW64\Bjlibhoi.exe Bdpajaqb.exe File opened for modification C:\Windows\SysWOW64\Jkhikkpa.exe Jekpbdaj.exe File opened for modification C:\Windows\SysWOW64\Jofaaifh.exe Jhlidp32.exe File created C:\Windows\SysWOW64\Npipdd32.exe Miohgjpc.exe File opened for modification C:\Windows\SysWOW64\Pmbcpf32.exe Ofhkclmd.exe File opened for modification C:\Windows\SysWOW64\Donmbfgm.exe Dnlqjn32.exe File created C:\Windows\SysWOW64\Fjjoajah.dll Hhkgfdkp.exe File created C:\Windows\SysWOW64\Obhladll.exe Opgcpiok.exe File created C:\Windows\SysWOW64\Kkookjii.exe Khqcoo32.exe File opened for modification C:\Windows\SysWOW64\Ofhkclmd.exe Ooqcanlb.exe File opened for modification C:\Windows\SysWOW64\Limiecdd.exe Lkiiloej.exe File created C:\Windows\SysWOW64\Qapkff32.dll Pdchgeib.exe File created C:\Windows\SysWOW64\Apqhbo32.exe Amblfc32.exe File opened for modification C:\Windows\SysWOW64\Dnjdenca.exe Dcdpgeck.exe File opened for modification C:\Windows\SysWOW64\Hoglinpj.exe Hlipmbag.exe File opened for modification C:\Windows\SysWOW64\Olpjpc32.exe Oiandh32.exe File created C:\Windows\SysWOW64\Hjmalqko.dll Bgkifg32.exe File created C:\Windows\SysWOW64\Cflfca32.exe Ccnjgf32.exe File created C:\Windows\SysWOW64\Jjjpcikl.exe Jkhpeacm.exe File created C:\Windows\SysWOW64\Pibmel32.exe Ppjilfof.exe File created C:\Windows\SysWOW64\Dqfgbp32.dll Hlipmbag.exe File opened for modification C:\Windows\SysWOW64\Kklbfj32.exe Khnfjo32.exe File created C:\Windows\SysWOW64\Kafjbdci.exe Knkobf32.exe File opened for modification C:\Windows\SysWOW64\Npefji32.exe Ndofehkj.exe File created C:\Windows\SysWOW64\Jbloipcp.dll Bpokncln.exe File created C:\Windows\SysWOW64\Deimgn32.exe Djdhje32.exe File created C:\Windows\SysWOW64\Fnnqla32.exe Flodpfgd.exe File opened for modification C:\Windows\SysWOW64\Pmflkepl.exe Pepdihoj.exe File created C:\Windows\SysWOW64\Lkiiloej.exe Kcndhm32.exe File created C:\Windows\SysWOW64\Emkhde32.dll Lpinhmin.exe File opened for modification C:\Windows\SysWOW64\Nlbnoe32.exe Nicabjln.exe File created C:\Windows\SysWOW64\Oeahhj32.exe Obclln32.exe File opened for modification C:\Windows\SysWOW64\Djjoipon.exe Dgkbmdpj.exe File created C:\Windows\SysWOW64\Gbhing32.dll Donmbfgm.exe File created C:\Windows\SysWOW64\Bopfhl32.dll Miohgjpc.exe File created C:\Windows\SysWOW64\Kofgnl32.dll Npipdd32.exe File created C:\Windows\SysWOW64\Jojgmdbj.dll Beipfd32.exe File created C:\Windows\SysWOW64\Qpkjok32.dll Fhkopf32.exe File created C:\Windows\SysWOW64\Hojinnnh.exe Hlkmbbod.exe File created C:\Windows\SysWOW64\Nncchb32.dll Aipclc32.exe File created C:\Windows\SysWOW64\Nlphclqp.exe Mlnknlcb.exe File created C:\Windows\SysWOW64\Gobcno32.exe Gldgac32.exe File opened for modification C:\Windows\SysWOW64\Pemhdhal.exe Pbolhm32.exe File created C:\Windows\SysWOW64\Olmime32.dll Amblfc32.exe File opened for modification C:\Windows\SysWOW64\Lcggnl32.exe Ljobefid.exe File opened for modification C:\Windows\SysWOW64\Nnnmealg.exe Nlpaiemd.exe File opened for modification C:\Windows\SysWOW64\Liofkc32.exe Limiecdd.exe File created C:\Windows\SysWOW64\Plfhpf32.dll Mllnhm32.exe File opened for modification C:\Windows\SysWOW64\Ndofehkj.exe Ndliph32.exe File opened for modification C:\Windows\SysWOW64\Fhfedgmh.exe Falmhm32.exe File opened for modification C:\Windows\SysWOW64\Holfdm32.exe Hlnihbma.exe File opened for modification C:\Windows\SysWOW64\Iemdaf32.exe Iocldlfm.exe File created C:\Windows\SysWOW64\Nakbjjaq.dll Iafalg32.exe File created C:\Windows\SysWOW64\Lpjjmhll.dll Jofaaifh.exe File created C:\Windows\SysWOW64\Jjbjbjad.exe Jchafp32.exe File opened for modification C:\Windows\SysWOW64\Lkiiloej.exe Kcndhm32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 8828 8668 WerFault.exe Djcaoogc.exe -
Modifies registry class 64 IoCs
Processes:
Dgkbmdpj.exeFhmkef32.exeNemomjpo.exeObjbmm32.exeHojinnnh.exeNmdgnhpa.exePpblaaab.exeAnlfgh32.exeElmhjfig.exeKklbfj32.exeBpfkdl32.exeOidadnaf.exeFlodpfgd.exeOpdppc32.exePibmel32.exeNikgcife.exePppola32.exeCnqaoo32.exeCpomkk32.exeJdigcalj.exeKdegopbl.exeQooocl32.exeCgpcafjg.exeQnccaj32.exeNppfecah.exeOlbfecmo.exeNdofehkj.exeObhegnhq.exeNfjoan32.exeQpnlmoge.exeMliacm32.exePpjilfof.exeEkfaig32.exeHdfafdlo.exeHlnihbma.exeJlpodoml.exeOlqqjibm.exePkkdop32.exeEndnec32.exeIemdaf32.exeBpokncln.exeGmcfcl32.exeDodjlgog.exeEabjan32.exeEcepiiid.exeKhnfjo32.exeFcmfih32.exePbahmlpf.exeCcfcfg32.exeCgdlle32.exeMjfhfe32.exeMpbanlac.exeGhohkfen.exeNlpaiemd.exeBcmqphhf.exeCjofhhmf.exeKmobpc32.exeMfhppfme.exeNdjlji32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnkfqqfl.dll" Dgkbmdpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pikibd32.dll" Fhmkef32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nemomjpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Objbmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oipadj32.dll" Hojinnnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gadcqcmc.dll" Nmdgnhpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppblaaab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Anlfgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Elmhjfig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kklbfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdcdkfjd.dll" Bpfkdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcaomfee.dll" Oidadnaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdndlc32.dll" Flodpfgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Opdppc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pibmel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nikgcife.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahoiaf32.dll" Pppola32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnqaoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkieqb32.dll" Cpomkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdigcalj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kdegopbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmdgnhpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnojdkmh.dll" Qooocl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cgpcafjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iahckm32.dll" Qnccaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nppfecah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Olbfecmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcoank32.dll" Ndofehkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obhegnhq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfjoan32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qpnlmoge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mliacm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbigka32.dll" Ppjilfof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gohomjem.dll" Ekfaig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdfafdlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlnihbma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jlpodoml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkqqcgqc.dll" Olqqjibm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pkkdop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Endnec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cadmpppq.dll" Iemdaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbloipcp.dll" Bpokncln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gmcfcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjkgdcgp.dll" Dodjlgog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eabjan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oijoib32.dll" Ecepiiid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khnfjo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcmfih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbahmlpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccfcfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cqkdbo32.dll" Cgdlle32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjfhfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpbanlac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eabjan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpmbod32.dll" Cnqaoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghohkfen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlpaiemd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bcmqphhf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olqqjibm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjofhhmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bcmqphhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmobpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmgofe32.dll" Mfhppfme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndjlji32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393.exeJchafp32.exeJjbjbjad.exeJbnogl32.exeJhhgcffl.exeJjgcni32.exeJkhpeacm.exeJjjpcikl.exeKcfngnng.exeKmobpc32.exeKblkhjbo.exeKifced32.exeKcndhm32.exeLkiiloej.exeLimiecdd.exeLiofkc32.exeLpinhmin.exeLbgjdiha.exeLjobefid.exeLcggnl32.exeLjaokega.exeLlblbnmp.exedescription pid process target process PID 2148 wrote to memory of 2976 2148 7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393.exe Jchafp32.exe PID 2148 wrote to memory of 2976 2148 7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393.exe Jchafp32.exe PID 2148 wrote to memory of 2976 2148 7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393.exe Jchafp32.exe PID 2976 wrote to memory of 2228 2976 Jchafp32.exe Jjbjbjad.exe PID 2976 wrote to memory of 2228 2976 Jchafp32.exe Jjbjbjad.exe PID 2976 wrote to memory of 2228 2976 Jchafp32.exe Jjbjbjad.exe PID 2228 wrote to memory of 2940 2228 Jjbjbjad.exe Jbnogl32.exe PID 2228 wrote to memory of 2940 2228 Jjbjbjad.exe Jbnogl32.exe PID 2228 wrote to memory of 2940 2228 Jjbjbjad.exe Jbnogl32.exe PID 2940 wrote to memory of 2356 2940 Jbnogl32.exe Jhhgcffl.exe PID 2940 wrote to memory of 2356 2940 Jbnogl32.exe Jhhgcffl.exe PID 2940 wrote to memory of 2356 2940 Jbnogl32.exe Jhhgcffl.exe PID 2356 wrote to memory of 3256 2356 Jhhgcffl.exe Jjgcni32.exe PID 2356 wrote to memory of 3256 2356 Jhhgcffl.exe Jjgcni32.exe PID 2356 wrote to memory of 3256 2356 Jhhgcffl.exe Jjgcni32.exe PID 3256 wrote to memory of 1404 3256 Jjgcni32.exe Jkhpeacm.exe PID 3256 wrote to memory of 1404 3256 Jjgcni32.exe Jkhpeacm.exe PID 3256 wrote to memory of 1404 3256 Jjgcni32.exe Jkhpeacm.exe PID 1404 wrote to memory of 3592 1404 Jkhpeacm.exe Jjjpcikl.exe PID 1404 wrote to memory of 3592 1404 Jkhpeacm.exe Jjjpcikl.exe PID 1404 wrote to memory of 3592 1404 Jkhpeacm.exe Jjjpcikl.exe PID 3592 wrote to memory of 4792 3592 Jjjpcikl.exe Kcfngnng.exe PID 3592 wrote to memory of 4792 3592 Jjjpcikl.exe Kcfngnng.exe PID 3592 wrote to memory of 4792 3592 Jjjpcikl.exe Kcfngnng.exe PID 4792 wrote to memory of 3132 4792 Kcfngnng.exe Kmobpc32.exe PID 4792 wrote to memory of 3132 4792 Kcfngnng.exe Kmobpc32.exe PID 4792 wrote to memory of 3132 4792 Kcfngnng.exe Kmobpc32.exe PID 3132 wrote to memory of 404 3132 Kmobpc32.exe Kblkhjbo.exe PID 3132 wrote to memory of 404 3132 Kmobpc32.exe Kblkhjbo.exe PID 3132 wrote to memory of 404 3132 Kmobpc32.exe Kblkhjbo.exe PID 404 wrote to memory of 2484 404 Kblkhjbo.exe Kifced32.exe PID 404 wrote to memory of 2484 404 Kblkhjbo.exe Kifced32.exe PID 404 wrote to memory of 2484 404 Kblkhjbo.exe Kifced32.exe PID 2484 wrote to memory of 3844 2484 Kifced32.exe Kcndhm32.exe PID 2484 wrote to memory of 3844 2484 Kifced32.exe Kcndhm32.exe PID 2484 wrote to memory of 3844 2484 Kifced32.exe Kcndhm32.exe PID 3844 wrote to memory of 1908 3844 Kcndhm32.exe Lkiiloej.exe PID 3844 wrote to memory of 1908 3844 Kcndhm32.exe Lkiiloej.exe PID 3844 wrote to memory of 1908 3844 Kcndhm32.exe Lkiiloej.exe PID 1908 wrote to memory of 2832 1908 Lkiiloej.exe Limiecdd.exe PID 1908 wrote to memory of 2832 1908 Lkiiloej.exe Limiecdd.exe PID 1908 wrote to memory of 2832 1908 Lkiiloej.exe Limiecdd.exe PID 2832 wrote to memory of 4056 2832 Limiecdd.exe Liofkc32.exe PID 2832 wrote to memory of 4056 2832 Limiecdd.exe Liofkc32.exe PID 2832 wrote to memory of 4056 2832 Limiecdd.exe Liofkc32.exe PID 4056 wrote to memory of 368 4056 Liofkc32.exe Lpinhmin.exe PID 4056 wrote to memory of 368 4056 Liofkc32.exe Lpinhmin.exe PID 4056 wrote to memory of 368 4056 Liofkc32.exe Lpinhmin.exe PID 368 wrote to memory of 628 368 Lpinhmin.exe Lbgjdiha.exe PID 368 wrote to memory of 628 368 Lpinhmin.exe Lbgjdiha.exe PID 368 wrote to memory of 628 368 Lpinhmin.exe Lbgjdiha.exe PID 628 wrote to memory of 4268 628 Lbgjdiha.exe Ljobefid.exe PID 628 wrote to memory of 4268 628 Lbgjdiha.exe Ljobefid.exe PID 628 wrote to memory of 4268 628 Lbgjdiha.exe Ljobefid.exe PID 4268 wrote to memory of 4664 4268 Ljobefid.exe Lcggnl32.exe PID 4268 wrote to memory of 4664 4268 Ljobefid.exe Lcggnl32.exe PID 4268 wrote to memory of 4664 4268 Ljobefid.exe Lcggnl32.exe PID 4664 wrote to memory of 2284 4664 Lcggnl32.exe Ljaokega.exe PID 4664 wrote to memory of 2284 4664 Lcggnl32.exe Ljaokega.exe PID 4664 wrote to memory of 2284 4664 Lcggnl32.exe Ljaokega.exe PID 2284 wrote to memory of 4688 2284 Ljaokega.exe Llblbnmp.exe PID 2284 wrote to memory of 4688 2284 Ljaokega.exe Llblbnmp.exe PID 2284 wrote to memory of 4688 2284 Ljaokega.exe Llblbnmp.exe PID 4688 wrote to memory of 1264 4688 Llblbnmp.exe Mfhppfme.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393.exe"C:\Users\Admin\AppData\Local\Temp\7396a177aba14168f20fe6e0035e5fa8413903d6c32b86d9af456e1d45863393.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jchafp32.exeC:\Windows\system32\Jchafp32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jjbjbjad.exeC:\Windows\system32\Jjbjbjad.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jbnogl32.exeC:\Windows\system32\Jbnogl32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jhhgcffl.exeC:\Windows\system32\Jhhgcffl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jjgcni32.exeC:\Windows\system32\Jjgcni32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jkhpeacm.exeC:\Windows\system32\Jkhpeacm.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jjjpcikl.exeC:\Windows\system32\Jjjpcikl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kcfngnng.exeC:\Windows\system32\Kcfngnng.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kmobpc32.exeC:\Windows\system32\Kmobpc32.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kblkhjbo.exeC:\Windows\system32\Kblkhjbo.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kifced32.exeC:\Windows\system32\Kifced32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kcndhm32.exeC:\Windows\system32\Kcndhm32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lkiiloej.exeC:\Windows\system32\Lkiiloej.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Limiecdd.exeC:\Windows\system32\Limiecdd.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Liofkc32.exeC:\Windows\system32\Liofkc32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lpinhmin.exeC:\Windows\system32\Lpinhmin.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lbgjdiha.exeC:\Windows\system32\Lbgjdiha.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ljobefid.exeC:\Windows\system32\Ljobefid.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Lcggnl32.exeC:\Windows\system32\Lcggnl32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ljaokega.exeC:\Windows\system32\Ljaokega.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Llblbnmp.exeC:\Windows\system32\Llblbnmp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Mfhppfme.exeC:\Windows\system32\Mfhppfme.exe23⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mldhhnkm.exeC:\Windows\system32\Mldhhnkm.exe24⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mjfhfe32.exeC:\Windows\system32\Mjfhfe32.exe25⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mpbanlac.exeC:\Windows\system32\Mpbanlac.exe26⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mjhekdai.exeC:\Windows\system32\Mjhekdai.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mliacm32.exeC:\Windows\system32\Mliacm32.exe28⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mfofpe32.exeC:\Windows\system32\Mfofpe32.exe29⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mllnhm32.exeC:\Windows\system32\Mllnhm32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mbefef32.exeC:\Windows\system32\Mbefef32.exe31⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mlnknlcb.exeC:\Windows\system32\Mlnknlcb.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nlphclqp.exeC:\Windows\system32\Nlphclqp.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Njahacio.exeC:\Windows\system32\Njahacio.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ndjlji32.exeC:\Windows\system32\Ndjlji32.exe35⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ndliph32.exeC:\Windows\system32\Ndliph32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ndofehkj.exeC:\Windows\system32\Ndofehkj.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Npefji32.exeC:\Windows\system32\Npefji32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Opgcpiok.exeC:\Windows\system32\Opgcpiok.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Obhladll.exeC:\Windows\system32\Obhladll.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Olqqjibm.exeC:\Windows\system32\Olqqjibm.exe41⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Obkigc32.exeC:\Windows\system32\Obkigc32.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Oidadnaf.exeC:\Windows\system32\Oidadnaf.exe43⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Opoiqh32.exeC:\Windows\system32\Opoiqh32.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Oignimod.exeC:\Windows\system32\Oignimod.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Opaffggq.exeC:\Windows\system32\Opaffggq.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pkfjcpfg.exeC:\Windows\system32\Pkfjcpfg.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pmefplej.exeC:\Windows\system32\Pmefplej.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pgmkha32.exeC:\Windows\system32\Pgmkha32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pmgcek32.exeC:\Windows\system32\Pmgcek32.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ppepag32.exeC:\Windows\system32\Ppepag32.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pkkdop32.exeC:\Windows\system32\Pkkdop32.exe52⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Pdchgeib.exeC:\Windows\system32\Pdchgeib.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pgbdcqhe.exeC:\Windows\system32\Pgbdcqhe.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ppjilfof.exeC:\Windows\system32\Ppjilfof.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Pibmel32.exeC:\Windows\system32\Pibmel32.exe56⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Qpmfbfmc.exeC:\Windows\system32\Qpmfbfmc.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qgfnop32.exeC:\Windows\system32\Qgfnop32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qpobgekq.exeC:\Windows\system32\Qpobgekq.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qnccaj32.exeC:\Windows\system32\Qnccaj32.exe60⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Agkgjopk.exeC:\Windows\system32\Agkgjopk.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Agndoo32.exeC:\Windows\system32\Agndoo32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Adadic32.exeC:\Windows\system32\Adadic32.exe63⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Aphendbf.exeC:\Windows\system32\Aphendbf.exe64⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Anlfgh32.exeC:\Windows\system32\Anlfgh32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Bnobmh32.exeC:\Windows\system32\Bnobmh32.exe66⤵
-
C:\Windows\SysWOW64\Bckkeo32.exeC:\Windows\system32\Bckkeo32.exe67⤵
-
C:\Windows\SysWOW64\Bpokncln.exeC:\Windows\system32\Bpokncln.exe68⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Bcngjoka.exeC:\Windows\system32\Bcngjoka.exe69⤵
-
C:\Windows\SysWOW64\Bjhpgi32.exeC:\Windows\system32\Bjhpgi32.exe70⤵
-
C:\Windows\SysWOW64\Bqahdcjk.exeC:\Windows\system32\Bqahdcjk.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bkglalja.exeC:\Windows\system32\Bkglalja.exe72⤵
-
C:\Windows\SysWOW64\Blhiidpp.exeC:\Windows\system32\Blhiidpp.exe73⤵
-
C:\Windows\SysWOW64\Bdpajaqb.exeC:\Windows\system32\Bdpajaqb.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bjlibhoi.exeC:\Windows\system32\Bjlibhoi.exe75⤵
-
C:\Windows\SysWOW64\Bmkencnm.exeC:\Windows\system32\Bmkencnm.exe76⤵
-
C:\Windows\SysWOW64\Bgpjllnc.exeC:\Windows\system32\Bgpjllnc.exe77⤵
-
C:\Windows\SysWOW64\Cjofhhmf.exeC:\Windows\system32\Cjofhhmf.exe78⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cqindbdc.exeC:\Windows\system32\Cqindbdc.exe79⤵
-
C:\Windows\SysWOW64\Cnmonfcm.exeC:\Windows\system32\Cnmonfcm.exe80⤵
-
C:\Windows\SysWOW64\Dmnkkang.exeC:\Windows\system32\Dmnkkang.exe81⤵
-
C:\Windows\SysWOW64\Deeclnnj.exeC:\Windows\system32\Deeclnnj.exe82⤵
-
C:\Windows\SysWOW64\Dkokih32.exeC:\Windows\system32\Dkokih32.exe83⤵
-
C:\Windows\SysWOW64\Dmphpqle.exeC:\Windows\system32\Dmphpqle.exe84⤵
-
C:\Windows\SysWOW64\Dcjpmk32.exeC:\Windows\system32\Dcjpmk32.exe85⤵
-
C:\Windows\SysWOW64\Djdhje32.exeC:\Windows\system32\Djdhje32.exe86⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Deimgn32.exeC:\Windows\system32\Deimgn32.exe87⤵
-
C:\Windows\SysWOW64\Ekcedhaa.exeC:\Windows\system32\Ekcedhaa.exe88⤵
-
C:\Windows\SysWOW64\Eapmlopi.exeC:\Windows\system32\Eapmlopi.exe89⤵
-
C:\Windows\SysWOW64\Ecoihjol.exeC:\Windows\system32\Ecoihjol.exe90⤵
-
C:\Windows\SysWOW64\Ekfaig32.exeC:\Windows\system32\Ekfaig32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Endnec32.exeC:\Windows\system32\Endnec32.exe92⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Eabjan32.exeC:\Windows\system32\Eabjan32.exe93⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ecafnj32.exeC:\Windows\system32\Ecafnj32.exe94⤵
-
C:\Windows\SysWOW64\Ekhnog32.exeC:\Windows\system32\Ekhnog32.exe95⤵
-
C:\Windows\SysWOW64\Eaeggn32.exeC:\Windows\system32\Eaeggn32.exe96⤵
-
C:\Windows\SysWOW64\Ecccci32.exeC:\Windows\system32\Ecccci32.exe97⤵
-
C:\Windows\SysWOW64\Ekjkdg32.exeC:\Windows\system32\Ekjkdg32.exe98⤵
-
C:\Windows\SysWOW64\Eagcmnjq.exeC:\Windows\system32\Eagcmnjq.exe99⤵
-
C:\Windows\SysWOW64\Ecepiiid.exeC:\Windows\system32\Ecepiiid.exe100⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Elmhjfig.exeC:\Windows\system32\Elmhjfig.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Emndao32.exeC:\Windows\system32\Emndao32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Eeelcl32.exeC:\Windows\system32\Eeelcl32.exe103⤵
-
C:\Windows\SysWOW64\Flodpfgd.exeC:\Windows\system32\Flodpfgd.exe104⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Fnnqla32.exeC:\Windows\system32\Fnnqla32.exe105⤵
-
C:\Windows\SysWOW64\Falmhm32.exeC:\Windows\system32\Falmhm32.exe106⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fhfedgmh.exeC:\Windows\system32\Fhfedgmh.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fanimm32.exeC:\Windows\system32\Fanimm32.exe108⤵
-
C:\Windows\SysWOW64\Fcmfih32.exeC:\Windows\system32\Fcmfih32.exe109⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fjfnfbji.exeC:\Windows\system32\Fjfnfbji.exe110⤵
-
C:\Windows\SysWOW64\Faqfclaf.exeC:\Windows\system32\Faqfclaf.exe111⤵
-
C:\Windows\SysWOW64\Fhkopf32.exeC:\Windows\system32\Fhkopf32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Facchlpc.exeC:\Windows\system32\Facchlpc.exe113⤵
-
C:\Windows\SysWOW64\Fhmkef32.exeC:\Windows\system32\Fhmkef32.exe114⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fjkgaa32.exeC:\Windows\system32\Fjkgaa32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fmjcmm32.exeC:\Windows\system32\Fmjcmm32.exe116⤵
-
C:\Windows\SysWOW64\Ghohkfen.exeC:\Windows\system32\Ghohkfen.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Gnipgp32.exeC:\Windows\system32\Gnipgp32.exe118⤵
-
C:\Windows\SysWOW64\Gechdjdg.exeC:\Windows\system32\Gechdjdg.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Glmqad32.exeC:\Windows\system32\Glmqad32.exe120⤵
-
C:\Windows\SysWOW64\Golmmp32.exeC:\Windows\system32\Golmmp32.exe121⤵
-
C:\Windows\SysWOW64\Geeejj32.exeC:\Windows\system32\Geeejj32.exe122⤵
-
C:\Windows\SysWOW64\Gjbnbq32.exeC:\Windows\system32\Gjbnbq32.exe123⤵
-
C:\Windows\SysWOW64\Gmqjnl32.exeC:\Windows\system32\Gmqjnl32.exe124⤵
-
C:\Windows\SysWOW64\Gdkbkfgl.exeC:\Windows\system32\Gdkbkfgl.exe125⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Glbjlcgo.exeC:\Windows\system32\Glbjlcgo.exe126⤵
-
C:\Windows\SysWOW64\Gmcfcl32.exeC:\Windows\system32\Gmcfcl32.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Gdmopfdj.exeC:\Windows\system32\Gdmopfdj.exe128⤵
-
C:\Windows\SysWOW64\Gldgac32.exeC:\Windows\system32\Gldgac32.exe129⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gobcno32.exeC:\Windows\system32\Gobcno32.exe130⤵
-
C:\Windows\SysWOW64\Hemkjill.exeC:\Windows\system32\Hemkjill.exe131⤵
-
C:\Windows\SysWOW64\Hhkgfdkp.exeC:\Windows\system32\Hhkgfdkp.exe132⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hoepcn32.exeC:\Windows\system32\Hoepcn32.exe133⤵
-
C:\Windows\SysWOW64\Hacloj32.exeC:\Windows\system32\Hacloj32.exe134⤵
-
C:\Windows\SysWOW64\Hdahke32.exeC:\Windows\system32\Hdahke32.exe135⤵
-
C:\Windows\SysWOW64\Hlipmbag.exeC:\Windows\system32\Hlipmbag.exe136⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hoglinpj.exeC:\Windows\system32\Hoglinpj.exe137⤵
-
C:\Windows\SysWOW64\Hafieion.exeC:\Windows\system32\Hafieion.exe138⤵
-
C:\Windows\SysWOW64\Hddeaeoa.exeC:\Windows\system32\Hddeaeoa.exe139⤵
-
C:\Windows\SysWOW64\Hlkmbbod.exeC:\Windows\system32\Hlkmbbod.exe140⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Hojinnnh.exeC:\Windows\system32\Hojinnnh.exe141⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hahejimk.exeC:\Windows\system32\Hahejimk.exe142⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hdfafdlo.exeC:\Windows\system32\Hdfafdlo.exe143⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hlnihbma.exeC:\Windows\system32\Hlnihbma.exe144⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Holfdm32.exeC:\Windows\system32\Holfdm32.exe145⤵
-
C:\Windows\SysWOW64\Hajbpi32.exeC:\Windows\system32\Hajbpi32.exe146⤵
-
C:\Windows\SysWOW64\Honbim32.exeC:\Windows\system32\Honbim32.exe147⤵
-
C:\Windows\SysWOW64\Ilbcca32.exeC:\Windows\system32\Ilbcca32.exe148⤵
-
C:\Windows\SysWOW64\Ioqoomhp.exeC:\Windows\system32\Ioqoomhp.exe149⤵
-
C:\Windows\SysWOW64\Iekglg32.exeC:\Windows\system32\Iekglg32.exe150⤵
-
C:\Windows\SysWOW64\Iocldlfm.exeC:\Windows\system32\Iocldlfm.exe151⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Iemdaf32.exeC:\Windows\system32\Iemdaf32.exe152⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Ilglnqeg.exeC:\Windows\system32\Ilglnqeg.exe153⤵
-
C:\Windows\SysWOW64\Inhiei32.exeC:\Windows\system32\Inhiei32.exe154⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Idbabc32.exeC:\Windows\system32\Idbabc32.exe155⤵
-
C:\Windows\SysWOW64\Iliicp32.exeC:\Windows\system32\Iliicp32.exe156⤵
-
C:\Windows\SysWOW64\Iafalg32.exeC:\Windows\system32\Iafalg32.exe157⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Iknfdmhl.exeC:\Windows\system32\Iknfdmhl.exe158⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Inmbqhgp.exeC:\Windows\system32\Inmbqhgp.exe159⤵
-
C:\Windows\SysWOW64\Jedjbe32.exeC:\Windows\system32\Jedjbe32.exe160⤵
-
C:\Windows\SysWOW64\Jlnbopoo.exeC:\Windows\system32\Jlnbopoo.exe161⤵
-
C:\Windows\SysWOW64\Jnoofh32.exeC:\Windows\system32\Jnoofh32.exe162⤵
-
C:\Windows\SysWOW64\Jdigcalj.exeC:\Windows\system32\Jdigcalj.exe163⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jlpodoml.exeC:\Windows\system32\Jlpodoml.exe164⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Jnallg32.exeC:\Windows\system32\Jnallg32.exe165⤵
-
C:\Windows\SysWOW64\Jdkdha32.exeC:\Windows\system32\Jdkdha32.exe166⤵
-
C:\Windows\SysWOW64\Jhgpipbp.exeC:\Windows\system32\Jhgpipbp.exe167⤵
-
C:\Windows\SysWOW64\Jkelelad.exeC:\Windows\system32\Jkelelad.exe168⤵
-
C:\Windows\SysWOW64\Jndhagqg.exeC:\Windows\system32\Jndhagqg.exe169⤵
-
C:\Windows\SysWOW64\Jekpbdaj.exeC:\Windows\system32\Jekpbdaj.exe170⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jkhikkpa.exeC:\Windows\system32\Jkhikkpa.exe171⤵
-
C:\Windows\SysWOW64\Jnfeggoe.exeC:\Windows\system32\Jnfeggoe.exe172⤵
-
C:\Windows\SysWOW64\Jemmhdog.exeC:\Windows\system32\Jemmhdog.exe173⤵
-
C:\Windows\SysWOW64\Jhlidp32.exeC:\Windows\system32\Jhlidp32.exe174⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jofaaifh.exeC:\Windows\system32\Jofaaifh.exe175⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Knhblf32.exeC:\Windows\system32\Knhblf32.exe176⤵
-
C:\Windows\SysWOW64\Khnfjo32.exeC:\Windows\system32\Khnfjo32.exe177⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Kklbfj32.exeC:\Windows\system32\Kklbfj32.exe178⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Knkobf32.exeC:\Windows\system32\Knkobf32.exe179⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kafjbdci.exeC:\Windows\system32\Kafjbdci.exe180⤵
-
C:\Windows\SysWOW64\Kdegopbl.exeC:\Windows\system32\Kdegopbl.exe181⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Khqcoo32.exeC:\Windows\system32\Khqcoo32.exe182⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Kkookjii.exeC:\Windows\system32\Kkookjii.exe183⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Knmkgeim.exeC:\Windows\system32\Knmkgeim.exe184⤵
-
C:\Windows\SysWOW64\Khcpenhc.exeC:\Windows\system32\Khcpenhc.exe185⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kkalajgf.exeC:\Windows\system32\Kkalajgf.exe186⤵
-
C:\Windows\SysWOW64\Kbkdnd32.exeC:\Windows\system32\Kbkdnd32.exe187⤵
-
C:\Windows\SysWOW64\Kdipjp32.exeC:\Windows\system32\Kdipjp32.exe188⤵
-
C:\Windows\SysWOW64\Kkchfi32.exeC:\Windows\system32\Kkchfi32.exe189⤵
-
C:\Windows\SysWOW64\Kfimdb32.exeC:\Windows\system32\Kfimdb32.exe190⤵
-
C:\Windows\SysWOW64\Khgipn32.exeC:\Windows\system32\Khgipn32.exe191⤵
-
C:\Windows\SysWOW64\Loaamhlj.exeC:\Windows\system32\Loaamhlj.exe192⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mimkbk32.exeC:\Windows\system32\Mimkbk32.exe193⤵
-
C:\Windows\SysWOW64\Miohgjpc.exeC:\Windows\system32\Miohgjpc.exe194⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Npipdd32.exeC:\Windows\system32\Npipdd32.exe195⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nfchaool.exeC:\Windows\system32\Nfchaool.exe196⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Niadmjnp.exeC:\Windows\system32\Niadmjnp.exe197⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nlpaiemd.exeC:\Windows\system32\Nlpaiemd.exe198⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Nnnmealg.exeC:\Windows\system32\Nnnmealg.exe199⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nfeefnmj.exeC:\Windows\system32\Nfeefnmj.exe200⤵
-
C:\Windows\SysWOW64\Nicabjln.exeC:\Windows\system32\Nicabjln.exe201⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Nlbnoe32.exeC:\Windows\system32\Nlbnoe32.exe202⤵
-
C:\Windows\SysWOW64\Npnjodcj.exeC:\Windows\system32\Npnjodcj.exe203⤵
-
C:\Windows\SysWOW64\Nfgbln32.exeC:\Windows\system32\Nfgbln32.exe204⤵
-
C:\Windows\SysWOW64\Nppfecah.exeC:\Windows\system32\Nppfecah.exe205⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Nfjoan32.exeC:\Windows\system32\Nfjoan32.exe206⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Nemomjpo.exeC:\Windows\system32\Nemomjpo.exe207⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Nmdgnhpa.exeC:\Windows\system32\Nmdgnhpa.exe208⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Npbcjc32.exeC:\Windows\system32\Npbcjc32.exe209⤵
-
C:\Windows\SysWOW64\Nbqofo32.exeC:\Windows\system32\Nbqofo32.exe210⤵
-
C:\Windows\SysWOW64\Nikgcife.exeC:\Windows\system32\Nikgcife.exe211⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Opdppc32.exeC:\Windows\system32\Opdppc32.exe212⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Obclln32.exeC:\Windows\system32\Obclln32.exe213⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Oeahhj32.exeC:\Windows\system32\Oeahhj32.exe214⤵
-
C:\Windows\SysWOW64\Olkqedcf.exeC:\Windows\system32\Olkqedcf.exe215⤵
-
C:\Windows\SysWOW64\Ofaebm32.exeC:\Windows\system32\Ofaebm32.exe216⤵
-
C:\Windows\SysWOW64\Oioanh32.exeC:\Windows\system32\Oioanh32.exe217⤵
-
C:\Windows\SysWOW64\Opiikbim.exeC:\Windows\system32\Opiikbim.exe218⤵
-
C:\Windows\SysWOW64\Obhegnhq.exeC:\Windows\system32\Obhegnhq.exe219⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ofcahl32.exeC:\Windows\system32\Ofcahl32.exe220⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Oiandh32.exeC:\Windows\system32\Oiandh32.exe221⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Olpjpc32.exeC:\Windows\system32\Olpjpc32.exe222⤵
-
C:\Windows\SysWOW64\Onnflo32.exeC:\Windows\system32\Onnflo32.exe223⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Objbmm32.exeC:\Windows\system32\Objbmm32.exe224⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Olbfecmo.exeC:\Windows\system32\Olbfecmo.exe225⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ooqcanlb.exeC:\Windows\system32\Ooqcanlb.exe226⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ofhkclmd.exeC:\Windows\system32\Ofhkclmd.exe227⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pmbcpf32.exeC:\Windows\system32\Pmbcpf32.exe228⤵
-
C:\Windows\SysWOW64\Pppola32.exeC:\Windows\system32\Pppola32.exe229⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Pbolhm32.exeC:\Windows\system32\Pbolhm32.exe230⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pemhdhal.exeC:\Windows\system32\Pemhdhal.exe231⤵
-
C:\Windows\SysWOW64\Pmdpeebo.exeC:\Windows\system32\Pmdpeebo.exe232⤵
-
C:\Windows\SysWOW64\Ppblaaab.exeC:\Windows\system32\Ppblaaab.exe233⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pbahmlpf.exeC:\Windows\system32\Pbahmlpf.exe234⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Pepdihoj.exeC:\Windows\system32\Pepdihoj.exe235⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pmflkepl.exeC:\Windows\system32\Pmflkepl.exe236⤵
-
C:\Windows\SysWOW64\Ppeigqop.exeC:\Windows\system32\Ppeigqop.exe237⤵
-
C:\Windows\SysWOW64\Pbceclnc.exeC:\Windows\system32\Pbceclnc.exe238⤵
-
C:\Windows\SysWOW64\Pebaog32.exeC:\Windows\system32\Pebaog32.exe239⤵
-
C:\Windows\SysWOW64\Pimmpfep.exeC:\Windows\system32\Pimmpfep.exe240⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ppgelp32.exeC:\Windows\system32\Ppgelp32.exe241⤵