Analysis
-
max time kernel
153s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 09:03
Static task
static1
Behavioral task
behavioral1
Sample
6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe
Resource
win10v2004-20220812-en
General
-
Target
6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe
-
Size
50KB
-
MD5
168b0c2a6c84ca9180ec126926dd9400
-
SHA1
a14e2271a559333afb926563cf2d0f602c2d87ff
-
SHA256
6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b
-
SHA512
b324d9150d7e36518c71c1b4ae75c1879ec9fdc494443d7e1bf205c8fffa4d82f19af4005fa637148b6ef712c892dba57fe46dd7a944deb280bfbd9ef7e70ba4
-
SSDEEP
768:MtHYcPYaKpcMJZ3Fn3EG4lnC8hRSQgl/XsqCO+THZaHAW2bTFB0YNTX/1H5N:6HYaKpn3F3EGYMEPOaZaeFBdT9
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Dflpbbfh.exeIjdelbap.exeCdofhd32.exeEamimg32.exeGphacpab.exeIofminak.exeMgfnki32.exePqbnbn32.exeLnjcklln.exeQhfppm32.exeAdkpnace.exeHppkmhaa.exeCknjif32.exeHedmgk32.exeLppimcng.exeFlgcdcbo.exeFphedm32.exeKbllellb.exeMhinea32.exeOapodeac.exeHooepf32.exeEcbkibmn.exeHefjmkeb.exeLmcigh32.exeMcjigkoe.exeBcipem32.exeMpgfhikk.exeEhgplmjf.exeJncgep32.exeBjqicn32.exeOnphkckf.exeIeqffh32.exeJcmjeh32.exeHnoakm32.exeBomale32.exeBgnfel32.exePmdelppn.exeCjmbbl32.exeKjndadla.exeFocbkoce.exeGdddne32.exeBhahhnoc.exeEfkgph32.exeLpkobd32.exeAaldbfda.exeEadomfnk.exeIjoefm32.exeOkaloglb.exeGmicnl32.exeCkgaookj.exeFihfhgck.exeGlameh32.exeLmnncp32.exeDcbojojc.exeEjememkc.exeHpeock32.exeFblafn32.exeAgkggdia.exeGkhfkd32.exeDfakfjjf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dflpbbfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijdelbap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdofhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eamimg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gphacpab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iofminak.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgfnki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqbnbn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnjcklln.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qhfppm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adkpnace.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hppkmhaa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cknjif32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hedmgk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lppimcng.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flgcdcbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fphedm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbllellb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhinea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oapodeac.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hooepf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecbkibmn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hefjmkeb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmcigh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcjigkoe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcipem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpgfhikk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehgplmjf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jncgep32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjqicn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onphkckf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieqffh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcmjeh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnoakm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bomale32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcmjeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgnfel32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmdelppn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjmbbl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjndadla.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Focbkoce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gdddne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhahhnoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efkgph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpkobd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaldbfda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eadomfnk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijoefm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okaloglb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ieqffh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmicnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckgaookj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fihfhgck.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glameh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmnncp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcbojojc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejememkc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fphedm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpeock32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fblafn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agkggdia.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkhfkd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgnfel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfakfjjf.exe -
Executes dropped EXE 64 IoCs
Processes:
Qmecdknc.exeAkdfbccn.exeAgkggdia.exeBachjlge.exeBddqkg32.exeBjqicn32.exeBomale32.exeCknege32.exeDflpbbfh.exeDmfhpl32.exeDcpplfea.exeDfcfca32.exeEhilfh32.exeFbibge32.exeGhbkkjli.exeHjhmmean.exeIfedbe32.exeKbnmli32.exeLkcegj32.exeLaojid32.exeLpgcpp32.exeMcjigkoe.exeMlbnpq32.exeMhinea32.exeMnhcbh32.exeNqnfob32.exeOpjianoj.exeOeinodko.exeOapodeac.exePoobanfn.exeQocllm32.exeAkjlanhm.exeBdgfdf32.exeCjmbbl32.exeEmpdijqj.exeFllgke32.exeFallhlkn.exeFaninkil.exeFmeiclop.exeFdoapf32.exeGgpkaa32.exeGmicnl32.exeGlameh32.exeGckeabem.exeGanemo32.exeGelncmbn.exeGkhfkd32.exeHpeock32.exeHjnclpem.exeHdcgjiec.exeHnnhhniq.exeHooepf32.exeIdqgcmja.exeIohhfe32.exeIqjdnmmb.exeIjdelbap.exeJqnnim32.exeJcmjeh32.exeJmjhim32.exeJcdpeg32.exeKejfho32.exeKjndadla.exeKmlampke.exeLmnncp32.exepid process 1964 Qmecdknc.exe 1612 Akdfbccn.exe 980 Agkggdia.exe 904 Bachjlge.exe 456 Bddqkg32.exe 1924 Bjqicn32.exe 1816 Bomale32.exe 1828 Cknege32.exe 908 Dflpbbfh.exe 592 Dmfhpl32.exe 1736 Dcpplfea.exe 1480 Dfcfca32.exe 1692 Ehilfh32.exe 1992 Fbibge32.exe 808 Ghbkkjli.exe 1448 Hjhmmean.exe 572 Ifedbe32.exe 688 Kbnmli32.exe 580 Lkcegj32.exe 1372 Laojid32.exe 1708 Lpgcpp32.exe 836 Mcjigkoe.exe 1960 Mlbnpq32.exe 364 Mhinea32.exe 1596 Mnhcbh32.exe 612 Nqnfob32.exe 1548 Opjianoj.exe 1416 Oeinodko.exe 2032 Oapodeac.exe 940 Poobanfn.exe 324 Qocllm32.exe 952 Akjlanhm.exe 1764 Bdgfdf32.exe 1812 Cjmbbl32.exe 1020 Empdijqj.exe 1544 Fllgke32.exe 768 Fallhlkn.exe 1732 Faninkil.exe 432 Fmeiclop.exe 1128 Fdoapf32.exe 1744 Ggpkaa32.exe 1160 Gmicnl32.exe 1576 Glameh32.exe 1092 Gckeabem.exe 880 Ganemo32.exe 464 Gelncmbn.exe 656 Gkhfkd32.exe 1568 Hpeock32.exe 1348 Hjnclpem.exe 532 Hdcgjiec.exe 1772 Hnnhhniq.exe 1640 Hooepf32.exe 988 Idqgcmja.exe 1080 Iohhfe32.exe 900 Iqjdnmmb.exe 1648 Ijdelbap.exe 1188 Jqnnim32.exe 1696 Jcmjeh32.exe 332 Jmjhim32.exe 384 Jcdpeg32.exe 840 Kejfho32.exe 1616 Kjndadla.exe 1096 Kmlampke.exe 956 Lmnncp32.exe -
Loads dropped DLL 64 IoCs
Processes:
6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exeQmecdknc.exeAkdfbccn.exeAgkggdia.exeBachjlge.exeBddqkg32.exeBjqicn32.exeBomale32.exeCknege32.exeDflpbbfh.exeDmfhpl32.exeDcpplfea.exeDfcfca32.exeEhilfh32.exeFbibge32.exeGhbkkjli.exeHjhmmean.exeIfedbe32.exeKbnmli32.exeLkcegj32.exeLaojid32.exeLpgcpp32.exeMcjigkoe.exeMlbnpq32.exeMhinea32.exeMnhcbh32.exeNqnfob32.exeOpjianoj.exeOeinodko.exeOapodeac.exePoobanfn.exeQocllm32.exepid process 1452 6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe 1452 6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe 1964 Qmecdknc.exe 1964 Qmecdknc.exe 1612 Akdfbccn.exe 1612 Akdfbccn.exe 980 Agkggdia.exe 980 Agkggdia.exe 904 Bachjlge.exe 904 Bachjlge.exe 456 Bddqkg32.exe 456 Bddqkg32.exe 1924 Bjqicn32.exe 1924 Bjqicn32.exe 1816 Bomale32.exe 1816 Bomale32.exe 1828 Cknege32.exe 1828 Cknege32.exe 908 Dflpbbfh.exe 908 Dflpbbfh.exe 592 Dmfhpl32.exe 592 Dmfhpl32.exe 1736 Dcpplfea.exe 1736 Dcpplfea.exe 1480 Dfcfca32.exe 1480 Dfcfca32.exe 1692 Ehilfh32.exe 1692 Ehilfh32.exe 1992 Fbibge32.exe 1992 Fbibge32.exe 808 Ghbkkjli.exe 808 Ghbkkjli.exe 1448 Hjhmmean.exe 1448 Hjhmmean.exe 572 Ifedbe32.exe 572 Ifedbe32.exe 688 Kbnmli32.exe 688 Kbnmli32.exe 580 Lkcegj32.exe 580 Lkcegj32.exe 1372 Laojid32.exe 1372 Laojid32.exe 1708 Lpgcpp32.exe 1708 Lpgcpp32.exe 836 Mcjigkoe.exe 836 Mcjigkoe.exe 1960 Mlbnpq32.exe 1960 Mlbnpq32.exe 364 Mhinea32.exe 364 Mhinea32.exe 1596 Mnhcbh32.exe 1596 Mnhcbh32.exe 612 Nqnfob32.exe 612 Nqnfob32.exe 1548 Opjianoj.exe 1548 Opjianoj.exe 1416 Oeinodko.exe 1416 Oeinodko.exe 2032 Oapodeac.exe 2032 Oapodeac.exe 940 Poobanfn.exe 940 Poobanfn.exe 324 Qocllm32.exe 324 Qocllm32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Laojid32.exeHnnhhniq.exeEjememkc.exeLppimcng.exeDjmipaid.exeIdqgcmja.exeBgbopljn.exeFhijnd32.exeAlhnojhf.exeDdkhmk32.exeMnhcbh32.exeKjndadla.exeOicgmbqk.exeEnecakog.exeHnanambn.exeHedmgk32.exeHielfhgi.exeMhinea32.exeOeinodko.exeAdkpnace.exeBilbah32.exeBiaklgia.exeOkaloglb.exeBjqicn32.exeKbnmli32.exeJncgep32.exeMpgfhikk.exeOhpcmmoa.exeCldclkld.exeHmfnfb32.exeBdgfdf32.exeCjmbbl32.exeGdddne32.exeJmbknhmh.exeCphlho32.exeLpmlhdpj.exeDmfjheei.exeEjlcfl32.exeLnjcklln.exeLbpboo32.exeCmmfeb32.exeQocllm32.exeEggaiakp.exeFpneib32.exeInhdal32.exeLpbecc32.exeDcpplfea.exeGhbkkjli.exeKmlampke.exeEcpodboa.exeObfkqbge.exeOkooihne.exeIeqffh32.exeEmpdijqj.exeIjmhamdm.exeEcbkibmn.exeFeknbi32.exeLblhdoon.exedescription ioc process File created C:\Windows\SysWOW64\Onmiff32.dll Laojid32.exe File created C:\Windows\SysWOW64\Hooepf32.exe Hnnhhniq.exe File created C:\Windows\SysWOW64\Eaabhgpm.exe Ejememkc.exe File created C:\Windows\SysWOW64\Lckenb32.exe Lppimcng.exe File opened for modification C:\Windows\SysWOW64\Eqphkpid.exe Djmipaid.exe File created C:\Windows\SysWOW64\Iohhfe32.exe Idqgcmja.exe File created C:\Windows\SysWOW64\Biaklgia.exe Bgbopljn.exe File opened for modification C:\Windows\SysWOW64\Fldfocda.exe Fhijnd32.exe File created C:\Windows\SysWOW64\Icjjgi32.dll Alhnojhf.exe File opened for modification C:\Windows\SysWOW64\Dgjdig32.exe Ddkhmk32.exe File created C:\Windows\SysWOW64\Nqnfob32.exe Mnhcbh32.exe File created C:\Windows\SysWOW64\Kmlampke.exe Kjndadla.exe File created C:\Windows\SysWOW64\Ppqpap32.dll Oicgmbqk.exe File opened for modification C:\Windows\SysWOW64\Eadomfnk.exe Enecakog.exe File created C:\Windows\SysWOW64\Hppkmhaa.exe Hnanambn.exe File opened for modification C:\Windows\SysWOW64\Hdfmbhnp.exe Hedmgk32.exe File opened for modification C:\Windows\SysWOW64\Ihmemdin.exe Hielfhgi.exe File created C:\Windows\SysWOW64\Mnhcbh32.exe Mhinea32.exe File opened for modification C:\Windows\SysWOW64\Oapodeac.exe Oeinodko.exe File created C:\Windows\SysWOW64\Bdpiia32.exe Adkpnace.exe File opened for modification C:\Windows\SysWOW64\Bddcdpkj.exe Bilbah32.exe File opened for modification C:\Windows\SysWOW64\Bcipem32.exe Biaklgia.exe File created C:\Windows\SysWOW64\Fldfocda.exe Fhijnd32.exe File opened for modification C:\Windows\SysWOW64\Onphkckf.exe Okaloglb.exe File created C:\Windows\SysWOW64\Bomale32.exe Bjqicn32.exe File opened for modification C:\Windows\SysWOW64\Lkcegj32.exe Kbnmli32.exe File created C:\Windows\SysWOW64\Pahdehlc.dll Jncgep32.exe File opened for modification C:\Windows\SysWOW64\Nnmofp32.exe Mpgfhikk.exe File opened for modification C:\Windows\SysWOW64\Okooihne.exe Ohpcmmoa.exe File created C:\Windows\SysWOW64\Icbdkb32.dll Cldclkld.exe File created C:\Windows\SysWOW64\Haicoe32.exe Hmfnfb32.exe File created C:\Windows\SysWOW64\Oapodeac.exe Oeinodko.exe File created C:\Windows\SysWOW64\Cjmbbl32.exe Bdgfdf32.exe File created C:\Windows\SysWOW64\Dpigmkei.dll Cjmbbl32.exe File opened for modification C:\Windows\SysWOW64\Gfcqjp32.exe Gdddne32.exe File opened for modification C:\Windows\SysWOW64\Jncgep32.exe Jmbknhmh.exe File created C:\Windows\SysWOW64\Chcama32.exe Cphlho32.exe File opened for modification C:\Windows\SysWOW64\Lblhdoon.exe Lpmlhdpj.exe File created C:\Windows\SysWOW64\Fabnebpl.dll Dmfjheei.exe File created C:\Windows\SysWOW64\Fpneib32.exe Ejlcfl32.exe File created C:\Windows\SysWOW64\Lmlcfi32.exe Lnjcklln.exe File created C:\Windows\SysWOW64\Oddhpkgj.dll Lbpboo32.exe File created C:\Windows\SysWOW64\Dnobja32.exe Cmmfeb32.exe File created C:\Windows\SysWOW64\Akjlanhm.exe Qocllm32.exe File created C:\Windows\SysWOW64\Djapmlnn.dll Bdgfdf32.exe File created C:\Windows\SysWOW64\Ejememkc.exe Eggaiakp.exe File created C:\Windows\SysWOW64\Qinnnc32.dll Fpneib32.exe File opened for modification C:\Windows\SysWOW64\Iojaidbd.exe Inhdal32.exe File created C:\Windows\SysWOW64\Pcdpjiep.dll Cphlho32.exe File created C:\Windows\SysWOW64\Declla32.dll Lpbecc32.exe File opened for modification C:\Windows\SysWOW64\Dfcfca32.exe Dcpplfea.exe File opened for modification C:\Windows\SysWOW64\Hjhmmean.exe Ghbkkjli.exe File created C:\Windows\SysWOW64\Icqkcbfm.dll Kmlampke.exe File created C:\Windows\SysWOW64\Efnkpnnd.exe Ecpodboa.exe File created C:\Windows\SysWOW64\Ohpcmmoa.exe Obfkqbge.exe File opened for modification C:\Windows\SysWOW64\Okaloglb.exe Okooihne.exe File created C:\Windows\SysWOW64\Pcfodc32.dll Ieqffh32.exe File created C:\Windows\SysWOW64\Emoamiob.dll Empdijqj.exe File created C:\Windows\SysWOW64\Gcjjldgm.dll Ijmhamdm.exe File created C:\Windows\SysWOW64\Gelgej32.dll Lnjcklln.exe File created C:\Windows\SysWOW64\Egngjq32.exe Ecbkibmn.exe File created C:\Windows\SysWOW64\Ackaagdp.dll Feknbi32.exe File opened for modification C:\Windows\SysWOW64\Chcama32.exe Cphlho32.exe File created C:\Windows\SysWOW64\Lieqqi32.exe Lblhdoon.exe -
Modifies registry class 64 IoCs
Processes:
Hmnkag32.exeJokcca32.exeLpgcpp32.exeQocllm32.exeKjndadla.exeHppkmhaa.exeHdkgng32.exeIojaidbd.exePfmjee32.exeCphlho32.exeLbncqf32.exeBddcdpkj.exeCkgaookj.exeGojhkn32.exeHielfhgi.exeCldclkld.exeHedmgk32.exeLelafj32.exeMlbnpq32.exeGlameh32.exeCcildpbn.exeDcbojojc.exeHjhmmean.exeJqnnim32.exeOghmdibg.exeLbpboo32.exeDfcfca32.exeEadomfnk.exeCbolid32.exeDflpbbfh.exeKgpknb32.exeCdbefm32.exeEgniciml.exeEjememkc.exeFihfhgck.exeFlgcdcbo.exeHkihdmhi.exe6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exeKbnmli32.exeOpjianoj.exeCknjif32.exeDpnofm32.exeDoehmi32.exeFallhlkn.exeJcmjeh32.exeDfakfjjf.exeGfcqjp32.exeDkccdfia.exeJmbknhmh.exeKpemdf32.exeLpkobd32.exeLpbecc32.exeIgqija32.exeJbmgqo32.exeLgbgcabo.exeDjmipaid.exeFcjccj32.exeEjlcfl32.exeFldfocda.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgnhaipc.dll" Hmnkag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmpddnhn.dll" Jokcca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbgofe32.dll" Lpgcpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djekol32.dll" Qocllm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjndadla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hppkmhaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdkgng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iojaidbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pfmjee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcdpjiep.dll" Cphlho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbncqf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bddcdpkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilpcdj32.dll" Ckgaookj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gojhkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhqkqljd.dll" Hielfhgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icbdkb32.dll" Cldclkld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hedmgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lelafj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlbnpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oafoij32.dll" Glameh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccildpbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcbojojc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjhmmean.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kemmfphe.dll" Jqnnim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oghmdibg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbpboo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfcfca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eadomfnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hedmgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfbcgo32.dll" Cbolid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dflpbbfh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgpknb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cghgka32.dll" Cdbefm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egniciml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejememkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fihfhgck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Flgcdcbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkihdmhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjhmmean.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbnmli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjlkgffd.dll" Opjianoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okqhgg32.dll" Cknjif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dpnofm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdbcnj32.dll" Doehmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fallhlkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcmjeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoldomjh.dll" Dfakfjjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbkkkg32.dll" Gfcqjp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkccdfia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmbknhmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpemdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpkobd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Declla32.dll" Lpbecc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flgcdcbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhpbagck.dll" Igqija32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbmgqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oddhpkgj.dll" Lbpboo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgpknb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjaojidh.dll" Lgbgcabo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdabaenm.dll" Djmipaid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcjccj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejlcfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fldfocda.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exeQmecdknc.exeAkdfbccn.exeAgkggdia.exeBachjlge.exeBddqkg32.exeBjqicn32.exeBomale32.exeCknege32.exeDflpbbfh.exeDmfhpl32.exeDcpplfea.exeDfcfca32.exeEhilfh32.exeFbibge32.exeGhbkkjli.exedescription pid process target process PID 1452 wrote to memory of 1964 1452 6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe Qmecdknc.exe PID 1452 wrote to memory of 1964 1452 6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe Qmecdknc.exe PID 1452 wrote to memory of 1964 1452 6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe Qmecdknc.exe PID 1452 wrote to memory of 1964 1452 6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe Qmecdknc.exe PID 1964 wrote to memory of 1612 1964 Qmecdknc.exe Akdfbccn.exe PID 1964 wrote to memory of 1612 1964 Qmecdknc.exe Akdfbccn.exe PID 1964 wrote to memory of 1612 1964 Qmecdknc.exe Akdfbccn.exe PID 1964 wrote to memory of 1612 1964 Qmecdknc.exe Akdfbccn.exe PID 1612 wrote to memory of 980 1612 Akdfbccn.exe Agkggdia.exe PID 1612 wrote to memory of 980 1612 Akdfbccn.exe Agkggdia.exe PID 1612 wrote to memory of 980 1612 Akdfbccn.exe Agkggdia.exe PID 1612 wrote to memory of 980 1612 Akdfbccn.exe Agkggdia.exe PID 980 wrote to memory of 904 980 Agkggdia.exe Bachjlge.exe PID 980 wrote to memory of 904 980 Agkggdia.exe Bachjlge.exe PID 980 wrote to memory of 904 980 Agkggdia.exe Bachjlge.exe PID 980 wrote to memory of 904 980 Agkggdia.exe Bachjlge.exe PID 904 wrote to memory of 456 904 Bachjlge.exe Bddqkg32.exe PID 904 wrote to memory of 456 904 Bachjlge.exe Bddqkg32.exe PID 904 wrote to memory of 456 904 Bachjlge.exe Bddqkg32.exe PID 904 wrote to memory of 456 904 Bachjlge.exe Bddqkg32.exe PID 456 wrote to memory of 1924 456 Bddqkg32.exe Bjqicn32.exe PID 456 wrote to memory of 1924 456 Bddqkg32.exe Bjqicn32.exe PID 456 wrote to memory of 1924 456 Bddqkg32.exe Bjqicn32.exe PID 456 wrote to memory of 1924 456 Bddqkg32.exe Bjqicn32.exe PID 1924 wrote to memory of 1816 1924 Bjqicn32.exe Bomale32.exe PID 1924 wrote to memory of 1816 1924 Bjqicn32.exe Bomale32.exe PID 1924 wrote to memory of 1816 1924 Bjqicn32.exe Bomale32.exe PID 1924 wrote to memory of 1816 1924 Bjqicn32.exe Bomale32.exe PID 1816 wrote to memory of 1828 1816 Bomale32.exe Cknege32.exe PID 1816 wrote to memory of 1828 1816 Bomale32.exe Cknege32.exe PID 1816 wrote to memory of 1828 1816 Bomale32.exe Cknege32.exe PID 1816 wrote to memory of 1828 1816 Bomale32.exe Cknege32.exe PID 1828 wrote to memory of 908 1828 Cknege32.exe Dflpbbfh.exe PID 1828 wrote to memory of 908 1828 Cknege32.exe Dflpbbfh.exe PID 1828 wrote to memory of 908 1828 Cknege32.exe Dflpbbfh.exe PID 1828 wrote to memory of 908 1828 Cknege32.exe Dflpbbfh.exe PID 908 wrote to memory of 592 908 Dflpbbfh.exe Dmfhpl32.exe PID 908 wrote to memory of 592 908 Dflpbbfh.exe Dmfhpl32.exe PID 908 wrote to memory of 592 908 Dflpbbfh.exe Dmfhpl32.exe PID 908 wrote to memory of 592 908 Dflpbbfh.exe Dmfhpl32.exe PID 592 wrote to memory of 1736 592 Dmfhpl32.exe Dcpplfea.exe PID 592 wrote to memory of 1736 592 Dmfhpl32.exe Dcpplfea.exe PID 592 wrote to memory of 1736 592 Dmfhpl32.exe Dcpplfea.exe PID 592 wrote to memory of 1736 592 Dmfhpl32.exe Dcpplfea.exe PID 1736 wrote to memory of 1480 1736 Dcpplfea.exe Dfcfca32.exe PID 1736 wrote to memory of 1480 1736 Dcpplfea.exe Dfcfca32.exe PID 1736 wrote to memory of 1480 1736 Dcpplfea.exe Dfcfca32.exe PID 1736 wrote to memory of 1480 1736 Dcpplfea.exe Dfcfca32.exe PID 1480 wrote to memory of 1692 1480 Dfcfca32.exe Ehilfh32.exe PID 1480 wrote to memory of 1692 1480 Dfcfca32.exe Ehilfh32.exe PID 1480 wrote to memory of 1692 1480 Dfcfca32.exe Ehilfh32.exe PID 1480 wrote to memory of 1692 1480 Dfcfca32.exe Ehilfh32.exe PID 1692 wrote to memory of 1992 1692 Ehilfh32.exe Fbibge32.exe PID 1692 wrote to memory of 1992 1692 Ehilfh32.exe Fbibge32.exe PID 1692 wrote to memory of 1992 1692 Ehilfh32.exe Fbibge32.exe PID 1692 wrote to memory of 1992 1692 Ehilfh32.exe Fbibge32.exe PID 1992 wrote to memory of 808 1992 Fbibge32.exe Ghbkkjli.exe PID 1992 wrote to memory of 808 1992 Fbibge32.exe Ghbkkjli.exe PID 1992 wrote to memory of 808 1992 Fbibge32.exe Ghbkkjli.exe PID 1992 wrote to memory of 808 1992 Fbibge32.exe Ghbkkjli.exe PID 808 wrote to memory of 1448 808 Ghbkkjli.exe Hjhmmean.exe PID 808 wrote to memory of 1448 808 Ghbkkjli.exe Hjhmmean.exe PID 808 wrote to memory of 1448 808 Ghbkkjli.exe Hjhmmean.exe PID 808 wrote to memory of 1448 808 Ghbkkjli.exe Hjhmmean.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe"C:\Users\Admin\AppData\Local\Temp\6e5d9e6267f18c2c47fb725c0ca638c0fc1781e354a7dc9b1927e361e7ea049b.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\Qmecdknc.exeC:\Windows\system32\Qmecdknc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\Akdfbccn.exeC:\Windows\system32\Akdfbccn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\Agkggdia.exeC:\Windows\system32\Agkggdia.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\Bachjlge.exeC:\Windows\system32\Bachjlge.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\Bddqkg32.exeC:\Windows\system32\Bddqkg32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\Bjqicn32.exeC:\Windows\system32\Bjqicn32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\Bomale32.exeC:\Windows\system32\Bomale32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\Cknege32.exeC:\Windows\system32\Cknege32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\Dflpbbfh.exeC:\Windows\system32\Dflpbbfh.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\Dmfhpl32.exeC:\Windows\system32\Dmfhpl32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\Dcpplfea.exeC:\Windows\system32\Dcpplfea.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\Dfcfca32.exeC:\Windows\system32\Dfcfca32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\Ehilfh32.exeC:\Windows\system32\Ehilfh32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\Fbibge32.exeC:\Windows\system32\Fbibge32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\Ghbkkjli.exeC:\Windows\system32\Ghbkkjli.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\Hjhmmean.exeC:\Windows\system32\Hjhmmean.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1448 -
C:\Windows\SysWOW64\Ifedbe32.exeC:\Windows\system32\Ifedbe32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:572 -
C:\Windows\SysWOW64\Kbnmli32.exeC:\Windows\system32\Kbnmli32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:688 -
C:\Windows\SysWOW64\Lkcegj32.exeC:\Windows\system32\Lkcegj32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:580 -
C:\Windows\SysWOW64\Laojid32.exeC:\Windows\system32\Laojid32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1372 -
C:\Windows\SysWOW64\Lpgcpp32.exeC:\Windows\system32\Lpgcpp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Mcjigkoe.exeC:\Windows\system32\Mcjigkoe.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:836 -
C:\Windows\SysWOW64\Mlbnpq32.exeC:\Windows\system32\Mlbnpq32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1960 -
C:\Windows\SysWOW64\Mhinea32.exeC:\Windows\system32\Mhinea32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:364 -
C:\Windows\SysWOW64\Mnhcbh32.exeC:\Windows\system32\Mnhcbh32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1596 -
C:\Windows\SysWOW64\Nqnfob32.exeC:\Windows\system32\Nqnfob32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:612 -
C:\Windows\SysWOW64\Opjianoj.exeC:\Windows\system32\Opjianoj.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1548 -
C:\Windows\SysWOW64\Oeinodko.exeC:\Windows\system32\Oeinodko.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1416 -
C:\Windows\SysWOW64\Oapodeac.exeC:\Windows\system32\Oapodeac.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Windows\SysWOW64\Poobanfn.exeC:\Windows\system32\Poobanfn.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:940 -
C:\Windows\SysWOW64\Qocllm32.exeC:\Windows\system32\Qocllm32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:324 -
C:\Windows\SysWOW64\Akjlanhm.exeC:\Windows\system32\Akjlanhm.exe33⤵
- Executes dropped EXE
PID:952 -
C:\Windows\SysWOW64\Bdgfdf32.exeC:\Windows\system32\Bdgfdf32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\Cjmbbl32.exeC:\Windows\system32\Cjmbbl32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1812 -
C:\Windows\SysWOW64\Empdijqj.exeC:\Windows\system32\Empdijqj.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1020 -
C:\Windows\SysWOW64\Fllgke32.exeC:\Windows\system32\Fllgke32.exe37⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\Fallhlkn.exeC:\Windows\system32\Fallhlkn.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:768 -
C:\Windows\SysWOW64\Faninkil.exeC:\Windows\system32\Faninkil.exe39⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\Fmeiclop.exeC:\Windows\system32\Fmeiclop.exe40⤵
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\Fdoapf32.exeC:\Windows\system32\Fdoapf32.exe41⤵
- Executes dropped EXE
PID:1128 -
C:\Windows\SysWOW64\Ggpkaa32.exeC:\Windows\system32\Ggpkaa32.exe42⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\Gmicnl32.exeC:\Windows\system32\Gmicnl32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\Glameh32.exeC:\Windows\system32\Glameh32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1576 -
C:\Windows\SysWOW64\Gckeabem.exeC:\Windows\system32\Gckeabem.exe45⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Ganemo32.exeC:\Windows\system32\Ganemo32.exe46⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\Gelncmbn.exeC:\Windows\system32\Gelncmbn.exe47⤵
- Executes dropped EXE
PID:464 -
C:\Windows\SysWOW64\Gkhfkd32.exeC:\Windows\system32\Gkhfkd32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:656 -
C:\Windows\SysWOW64\Hpeock32.exeC:\Windows\system32\Hpeock32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1568 -
C:\Windows\SysWOW64\Hjnclpem.exeC:\Windows\system32\Hjnclpem.exe50⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\SysWOW64\Hdcgjiec.exeC:\Windows\system32\Hdcgjiec.exe51⤵
- Executes dropped EXE
PID:532 -
C:\Windows\SysWOW64\Hnnhhniq.exeC:\Windows\system32\Hnnhhniq.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1772 -
C:\Windows\SysWOW64\Hooepf32.exeC:\Windows\system32\Hooepf32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Idqgcmja.exeC:\Windows\system32\Idqgcmja.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:988 -
C:\Windows\SysWOW64\Iohhfe32.exeC:\Windows\system32\Iohhfe32.exe55⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\Iqjdnmmb.exeC:\Windows\system32\Iqjdnmmb.exe56⤵
- Executes dropped EXE
PID:900 -
C:\Windows\SysWOW64\Ijdelbap.exeC:\Windows\system32\Ijdelbap.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\Jqnnim32.exeC:\Windows\system32\Jqnnim32.exe58⤵
- Executes dropped EXE
- Modifies registry class
PID:1188 -
C:\Windows\SysWOW64\Jcmjeh32.exeC:\Windows\system32\Jcmjeh32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1696 -
C:\Windows\SysWOW64\Jmjhim32.exeC:\Windows\system32\Jmjhim32.exe60⤵
- Executes dropped EXE
PID:332 -
C:\Windows\SysWOW64\Jcdpeg32.exeC:\Windows\system32\Jcdpeg32.exe61⤵
- Executes dropped EXE
PID:384 -
C:\Windows\SysWOW64\Kejfho32.exeC:\Windows\system32\Kejfho32.exe62⤵
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\Kjndadla.exeC:\Windows\system32\Kjndadla.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1616 -
C:\Windows\SysWOW64\Kmlampke.exeC:\Windows\system32\Kmlampke.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1096 -
C:\Windows\SysWOW64\Lmnncp32.exeC:\Windows\system32\Lmnncp32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:956 -
C:\Windows\SysWOW64\Lpmjok32.exeC:\Windows\system32\Lpmjok32.exe66⤵PID:1792
-
C:\Windows\SysWOW64\Lbkfkf32.exeC:\Windows\system32\Lbkfkf32.exe67⤵PID:1840
-
C:\Windows\SysWOW64\Lbncqf32.exeC:\Windows\system32\Lbncqf32.exe68⤵
- Modifies registry class
PID:1180 -
C:\Windows\SysWOW64\Mgfnki32.exeC:\Windows\system32\Mgfnki32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:328 -
C:\Windows\SysWOW64\Ncgbfhph.exeC:\Windows\system32\Ncgbfhph.exe70⤵PID:1600
-
C:\Windows\SysWOW64\Oicgmbqk.exeC:\Windows\system32\Oicgmbqk.exe71⤵
- Drops file in System32 directory
PID:1684 -
C:\Windows\SysWOW64\Qhfppm32.exeC:\Windows\system32\Qhfppm32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:992 -
C:\Windows\SysWOW64\Ahdoiq32.exeC:\Windows\system32\Ahdoiq32.exe73⤵PID:1496
-
C:\Windows\SysWOW64\Akblel32.exeC:\Windows\system32\Akblel32.exe74⤵PID:1928
-
C:\Windows\SysWOW64\Aaldbfda.exeC:\Windows\system32\Aaldbfda.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1820 -
C:\Windows\SysWOW64\Adkpnace.exeC:\Windows\system32\Adkpnace.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1808 -
C:\Windows\SysWOW64\Bdpiia32.exeC:\Windows\system32\Bdpiia32.exe77⤵PID:408
-
C:\Windows\SysWOW64\Bgnfel32.exeC:\Windows\system32\Bgnfel32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1720 -
C:\Windows\SysWOW64\Bilbah32.exeC:\Windows\system32\Bilbah32.exe79⤵
- Drops file in System32 directory
PID:1556 -
C:\Windows\SysWOW64\Bddcdpkj.exeC:\Windows\system32\Bddcdpkj.exe80⤵
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\Bgbopljn.exeC:\Windows\system32\Bgbopljn.exe81⤵
- Drops file in System32 directory
PID:1524 -
C:\Windows\SysWOW64\Biaklgia.exeC:\Windows\system32\Biaklgia.exe82⤵
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\Bcipem32.exeC:\Windows\system32\Bcipem32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1536 -
C:\Windows\SysWOW64\Ckgaookj.exeC:\Windows\system32\Ckgaookj.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1748 -
C:\Windows\SysWOW64\Cdofhd32.exeC:\Windows\system32\Cdofhd32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1700 -
C:\Windows\SysWOW64\Ccildpbn.exeC:\Windows\system32\Ccildpbn.exe86⤵
- Modifies registry class
PID:548 -
C:\Windows\SysWOW64\Dggejn32.exeC:\Windows\system32\Dggejn32.exe87⤵PID:1520
-
C:\Windows\SysWOW64\Dmfjheei.exeC:\Windows\system32\Dmfjheei.exe88⤵
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\Dodfdpdl.exeC:\Windows\system32\Dodfdpdl.exe89⤵PID:2056
-
C:\Windows\SysWOW64\Dbcbqlcp.exeC:\Windows\system32\Dbcbqlcp.exe90⤵PID:2064
-
C:\Windows\SysWOW64\Djjkaidb.exeC:\Windows\system32\Djjkaidb.exe91⤵PID:2072
-
C:\Windows\SysWOW64\Dmhgnd32.exeC:\Windows\system32\Dmhgnd32.exe92⤵PID:2080
-
C:\Windows\SysWOW64\Dcbojojc.exeC:\Windows\system32\Dcbojojc.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2088 -
C:\Windows\SysWOW64\Dfakfjjf.exeC:\Windows\system32\Dfakfjjf.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2096 -
C:\Windows\SysWOW64\Enomql32.exeC:\Windows\system32\Enomql32.exe95⤵PID:2104
-
C:\Windows\SysWOW64\Eamimg32.exeC:\Windows\system32\Eamimg32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2112 -
C:\Windows\SysWOW64\Eggaiakp.exeC:\Windows\system32\Eggaiakp.exe97⤵
- Drops file in System32 directory
PID:2120 -
C:\Windows\SysWOW64\Ejememkc.exeC:\Windows\system32\Ejememkc.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2128 -
C:\Windows\SysWOW64\Eaabhgpm.exeC:\Windows\system32\Eaabhgpm.exe99⤵PID:2136
-
C:\Windows\SysWOW64\Ecpodboa.exeC:\Windows\system32\Ecpodboa.exe100⤵
- Drops file in System32 directory
PID:2144 -
C:\Windows\SysWOW64\Efnkpnnd.exeC:\Windows\system32\Efnkpnnd.exe101⤵PID:2152
-
C:\Windows\SysWOW64\Enecakog.exeC:\Windows\system32\Enecakog.exe102⤵
- Drops file in System32 directory
PID:2160 -
C:\Windows\SysWOW64\Eadomfnk.exeC:\Windows\system32\Eadomfnk.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\Ecbkibmn.exeC:\Windows\system32\Ecbkibmn.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\Egngjq32.exeC:\Windows\system32\Egngjq32.exe105⤵PID:2184
-
C:\Windows\SysWOW64\Ejlcfl32.exeC:\Windows\system32\Ejlcfl32.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:2396 -
C:\Windows\SysWOW64\Fpneib32.exeC:\Windows\system32\Fpneib32.exe107⤵
- Drops file in System32 directory
PID:2404 -
C:\Windows\SysWOW64\Fblafn32.exeC:\Windows\system32\Fblafn32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2412 -
C:\Windows\SysWOW64\Feknbi32.exeC:\Windows\system32\Feknbi32.exe109⤵
- Drops file in System32 directory
PID:2420 -
C:\Windows\SysWOW64\Fhijnd32.exeC:\Windows\system32\Fhijnd32.exe110⤵
- Drops file in System32 directory
PID:2428 -
C:\Windows\SysWOW64\Fldfocda.exeC:\Windows\system32\Fldfocda.exe111⤵
- Modifies registry class
PID:2436 -
C:\Windows\SysWOW64\Focbkoce.exeC:\Windows\system32\Focbkoce.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2444 -
C:\Windows\SysWOW64\Faaogjbi.exeC:\Windows\system32\Faaogjbi.exe113⤵PID:2452
-
C:\Windows\SysWOW64\Fihfhgck.exeC:\Windows\system32\Fihfhgck.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2460 -
C:\Windows\SysWOW64\Flgcdcbo.exeC:\Windows\system32\Flgcdcbo.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2468 -
C:\Windows\SysWOW64\Glipjb32.exeC:\Windows\system32\Glipjb32.exe116⤵PID:2476
-
C:\Windows\SysWOW64\Gohlfn32.exeC:\Windows\system32\Gohlfn32.exe117⤵PID:2484
-
C:\Windows\SysWOW64\Gafhbi32.exeC:\Windows\system32\Gafhbi32.exe118⤵PID:2492
-
C:\Windows\SysWOW64\Gdddne32.exeC:\Windows\system32\Gdddne32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2500 -
C:\Windows\SysWOW64\Gfcqjp32.exeC:\Windows\system32\Gfcqjp32.exe120⤵
- Modifies registry class
PID:2508 -
C:\Windows\SysWOW64\Gojhkn32.exeC:\Windows\system32\Gojhkn32.exe121⤵
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Gpbkcemc.exeC:\Windows\system32\Gpbkcemc.exe122⤵PID:2528
-
C:\Windows\SysWOW64\Hlkhneqe.exeC:\Windows\system32\Hlkhneqe.exe123⤵PID:2536
-
C:\Windows\SysWOW64\Hojejaph.exeC:\Windows\system32\Hojejaph.exe124⤵PID:2544
-
C:\Windows\SysWOW64\Hedmgk32.exeC:\Windows\system32\Hedmgk32.exe125⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2552 -
C:\Windows\SysWOW64\Hdfmbhnp.exeC:\Windows\system32\Hdfmbhnp.exe126⤵PID:2560
-
C:\Windows\SysWOW64\Hkqeob32.exeC:\Windows\system32\Hkqeob32.exe127⤵PID:2568
-
C:\Windows\SysWOW64\Hnoakm32.exeC:\Windows\system32\Hnoakm32.exe128⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2576 -
C:\Windows\SysWOW64\Hefjmkeb.exeC:\Windows\system32\Hefjmkeb.exe129⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2584 -
C:\Windows\SysWOW64\Hdijhg32.exeC:\Windows\system32\Hdijhg32.exe130⤵PID:2592
-
C:\Windows\SysWOW64\Hkcbeacj.exeC:\Windows\system32\Hkcbeacj.exe131⤵PID:2600
-
C:\Windows\SysWOW64\Hnanambn.exeC:\Windows\system32\Hnanambn.exe132⤵
- Drops file in System32 directory
PID:2608 -
C:\Windows\SysWOW64\Hppkmhaa.exeC:\Windows\system32\Hppkmhaa.exe133⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\Hdkgng32.exeC:\Windows\system32\Hdkgng32.exe134⤵
- Modifies registry class
PID:2748 -
C:\Windows\SysWOW64\Ijmhamdm.exeC:\Windows\system32\Ijmhamdm.exe135⤵
- Drops file in System32 directory
PID:2768 -
C:\Windows\SysWOW64\Inhdal32.exeC:\Windows\system32\Inhdal32.exe136⤵
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\Iojaidbd.exeC:\Windows\system32\Iojaidbd.exe137⤵
- Modifies registry class
PID:2788 -
C:\Windows\SysWOW64\Igqija32.exeC:\Windows\system32\Igqija32.exe138⤵
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Ijoefm32.exeC:\Windows\system32\Ijoefm32.exe139⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2808 -
C:\Windows\SysWOW64\Jbmgqo32.exeC:\Windows\system32\Jbmgqo32.exe140⤵
- Modifies registry class
PID:2816 -
C:\Windows\SysWOW64\Jdkcmj32.exeC:\Windows\system32\Jdkcmj32.exe141⤵PID:2824
-
C:\Windows\SysWOW64\Jmbknhmh.exeC:\Windows\system32\Jmbknhmh.exe142⤵
- Drops file in System32 directory
- Modifies registry class
PID:2832 -
C:\Windows\SysWOW64\Jncgep32.exeC:\Windows\system32\Jncgep32.exe143⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2844 -
C:\Windows\SysWOW64\Jedfci32.exeC:\Windows\system32\Jedfci32.exe144⤵PID:2852
-
C:\Windows\SysWOW64\Kepigm32.exeC:\Windows\system32\Kepigm32.exe145⤵PID:2860
-
C:\Windows\SysWOW64\Kpemdf32.exeC:\Windows\system32\Kpemdf32.exe146⤵
- Modifies registry class
PID:2868 -
C:\Windows\SysWOW64\Labigl32.exeC:\Windows\system32\Labigl32.exe147⤵PID:2876
-
C:\Windows\SysWOW64\Mpgfhikk.exeC:\Windows\system32\Mpgfhikk.exe148⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2884 -
C:\Windows\SysWOW64\Nnmofp32.exeC:\Windows\system32\Nnmofp32.exe149⤵PID:2892
-
C:\Windows\SysWOW64\Ndggcj32.exeC:\Windows\system32\Ndggcj32.exe150⤵PID:2900
-
C:\Windows\SysWOW64\Ojiifqll.exeC:\Windows\system32\Ojiifqll.exe151⤵PID:2908
-
C:\Windows\SysWOW64\Oohodgha.exeC:\Windows\system32\Oohodgha.exe152⤵PID:2916
-
C:\Windows\SysWOW64\Obfkqbge.exeC:\Windows\system32\Obfkqbge.exe153⤵
- Drops file in System32 directory
PID:2924 -
C:\Windows\SysWOW64\Ohpcmmoa.exeC:\Windows\system32\Ohpcmmoa.exe154⤵
- Drops file in System32 directory
PID:2932 -
C:\Windows\SysWOW64\Okooihne.exeC:\Windows\system32\Okooihne.exe155⤵
- Drops file in System32 directory
PID:2940 -
C:\Windows\SysWOW64\Okaloglb.exeC:\Windows\system32\Okaloglb.exe156⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2948 -
C:\Windows\SysWOW64\Onphkckf.exeC:\Windows\system32\Onphkckf.exe157⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2956 -
C:\Windows\SysWOW64\Odiqhmbc.exeC:\Windows\system32\Odiqhmbc.exe158⤵PID:2964
-
C:\Windows\SysWOW64\Oghmdibg.exeC:\Windows\system32\Oghmdibg.exe159⤵
- Modifies registry class
PID:2972 -
C:\Windows\SysWOW64\Okcidg32.exeC:\Windows\system32\Okcidg32.exe160⤵PID:2980
-
C:\Windows\SysWOW64\Pmdelppn.exeC:\Windows\system32\Pmdelppn.exe161⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2988 -
C:\Windows\SysWOW64\Pcomij32.exeC:\Windows\system32\Pcomij32.exe162⤵PID:2996
-
C:\Windows\SysWOW64\Pfmjee32.exeC:\Windows\system32\Pfmjee32.exe163⤵
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\Pndafb32.exeC:\Windows\system32\Pndafb32.exe164⤵PID:3012
-
C:\Windows\SysWOW64\Pqbnbn32.exeC:\Windows\system32\Pqbnbn32.exe165⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3020 -
C:\Windows\SysWOW64\Alhnojhf.exeC:\Windows\system32\Alhnojhf.exe166⤵
- Drops file in System32 directory
PID:3028 -
C:\Windows\SysWOW64\Anfkkehj.exeC:\Windows\system32\Anfkkehj.exe167⤵PID:3036
-
C:\Windows\SysWOW64\Aaeggagm.exeC:\Windows\system32\Aaeggagm.exe168⤵PID:3044
-
C:\Windows\SysWOW64\Afaoohee.exeC:\Windows\system32\Afaoohee.exe169⤵PID:3052
-
C:\Windows\SysWOW64\Ampaga32.exeC:\Windows\system32\Ampaga32.exe170⤵PID:3060
-
C:\Windows\SysWOW64\Blhknm32.exeC:\Windows\system32\Blhknm32.exe171⤵PID:3068
-
C:\Windows\SysWOW64\Bhahhnoc.exeC:\Windows\system32\Bhahhnoc.exe172⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2196 -
C:\Windows\SysWOW64\Cphlho32.exeC:\Windows\system32\Cphlho32.exe173⤵
- Drops file in System32 directory
- Modifies registry class
PID:2204 -
C:\Windows\SysWOW64\Chcama32.exeC:\Windows\system32\Chcama32.exe174⤵PID:2216
-
C:\Windows\SysWOW64\Dlcfho32.exeC:\Windows\system32\Dlcfho32.exe175⤵PID:2224
-
C:\Windows\SysWOW64\Efgnehqa.exeC:\Windows\system32\Efgnehqa.exe176⤵PID:2232
-
C:\Windows\SysWOW64\Emqfab32.exeC:\Windows\system32\Emqfab32.exe177⤵PID:2240
-
C:\Windows\SysWOW64\Efkgph32.exeC:\Windows\system32\Efkgph32.exe178⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2248 -
C:\Windows\SysWOW64\Fphedm32.exeC:\Windows\system32\Fphedm32.exe179⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2256 -
C:\Windows\SysWOW64\Fnpoki32.exeC:\Windows\system32\Fnpoki32.exe180⤵PID:2264
-
C:\Windows\SysWOW64\Gphacpab.exeC:\Windows\system32\Gphacpab.exe181⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2272 -
C:\Windows\SysWOW64\Giqfle32.exeC:\Windows\system32\Giqfle32.exe182⤵PID:2280
-
C:\Windows\SysWOW64\Hlfhhp32.exeC:\Windows\system32\Hlfhhp32.exe183⤵PID:2284
-
C:\Windows\SysWOW64\Hkihdmhi.exeC:\Windows\system32\Hkihdmhi.exe184⤵
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\Hkpoel32.exeC:\Windows\system32\Hkpoel32.exe185⤵PID:2296
-
C:\Windows\SysWOW64\Hmnkag32.exeC:\Windows\system32\Hmnkag32.exe186⤵
- Modifies registry class
PID:2312 -
C:\Windows\SysWOW64\Hpmgmb32.exeC:\Windows\system32\Hpmgmb32.exe187⤵PID:2320
-
C:\Windows\SysWOW64\Hckcin32.exeC:\Windows\system32\Hckcin32.exe188⤵PID:2328
-
C:\Windows\SysWOW64\Hielfhgi.exeC:\Windows\system32\Hielfhgi.exe189⤵
- Drops file in System32 directory
- Modifies registry class
PID:2336 -
C:\Windows\SysWOW64\Ihmemdin.exeC:\Windows\system32\Ihmemdin.exe190⤵PID:2344
-
C:\Windows\SysWOW64\Iofminak.exeC:\Windows\system32\Iofminak.exe191⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2352 -
C:\Windows\SysWOW64\Ieqffh32.exeC:\Windows\system32\Ieqffh32.exe192⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\Jokcca32.exeC:\Windows\system32\Jokcca32.exe193⤵
- Modifies registry class
PID:2368 -
C:\Windows\SysWOW64\Jcfodphj.exeC:\Windows\system32\Jcfodphj.exe194⤵PID:2376
-
C:\Windows\SysWOW64\Kbllellb.exeC:\Windows\system32\Kbllellb.exe195⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2384 -
C:\Windows\SysWOW64\Kejhagkf.exeC:\Windows\system32\Kejhagkf.exe196⤵PID:2392
-
C:\Windows\SysWOW64\Kgidmcki.exeC:\Windows\system32\Kgidmcki.exe197⤵PID:2628
-
C:\Windows\SysWOW64\Kmjfqi32.exeC:\Windows\system32\Kmjfqi32.exe198⤵PID:2636
-
C:\Windows\SysWOW64\Keaobf32.exeC:\Windows\system32\Keaobf32.exe199⤵PID:2644
-
C:\Windows\SysWOW64\Kgpknb32.exeC:\Windows\system32\Kgpknb32.exe200⤵
- Modifies registry class
PID:2652 -
C:\Windows\SysWOW64\Lnjcklln.exeC:\Windows\system32\Lnjcklln.exe201⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2660 -
C:\Windows\SysWOW64\Lmlcfi32.exeC:\Windows\system32\Lmlcfi32.exe202⤵PID:2668
-
C:\Windows\SysWOW64\Lpkobd32.exeC:\Windows\system32\Lpkobd32.exe203⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2676 -
C:\Windows\SysWOW64\Lgbgcabo.exeC:\Windows\system32\Lgbgcabo.exe204⤵
- Modifies registry class
PID:2684 -
C:\Windows\SysWOW64\Ljpcpmab.exeC:\Windows\system32\Ljpcpmab.exe205⤵PID:2692
-
C:\Windows\SysWOW64\Lmoplhqf.exeC:\Windows\system32\Lmoplhqf.exe206⤵PID:2700
-
C:\Windows\SysWOW64\Lpmlhdpj.exeC:\Windows\system32\Lpmlhdpj.exe207⤵
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\Lblhdoon.exeC:\Windows\system32\Lblhdoon.exe208⤵
- Drops file in System32 directory
PID:2716 -
C:\Windows\SysWOW64\Lieqqi32.exeC:\Windows\system32\Lieqqi32.exe209⤵PID:2724
-
C:\Windows\SysWOW64\Lppimcng.exeC:\Windows\system32\Lppimcng.exe210⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2732 -
C:\Windows\SysWOW64\Lckenb32.exeC:\Windows\system32\Lckenb32.exe211⤵PID:2740
-
C:\Windows\SysWOW64\Lelafj32.exeC:\Windows\system32\Lelafj32.exe212⤵
- Modifies registry class
PID:2756 -
C:\Windows\SysWOW64\Lmcigh32.exeC:\Windows\system32\Lmcigh32.exe213⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2764 -
C:\Windows\SysWOW64\Lpbecc32.exeC:\Windows\system32\Lpbecc32.exe214⤵
- Drops file in System32 directory
- Modifies registry class
PID:1148 -
C:\Windows\SysWOW64\Lbpboo32.exeC:\Windows\system32\Lbpboo32.exe215⤵
- Drops file in System32 directory
- Modifies registry class
PID:1964 -
C:\Windows\SysWOW64\Cldclkld.exeC:\Windows\system32\Cldclkld.exe216⤵
- Drops file in System32 directory
- Modifies registry class
PID:1612 -
C:\Windows\SysWOW64\Cbolid32.exeC:\Windows\system32\Cbolid32.exe217⤵
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\Cemhepbd.exeC:\Windows\system32\Cemhepbd.exe218⤵PID:904
-
C:\Windows\SysWOW64\Clgpbj32.exeC:\Windows\system32\Clgpbj32.exe219⤵PID:456
-
C:\Windows\SysWOW64\Coelnf32.exeC:\Windows\system32\Coelnf32.exe220⤵PID:1924
-
C:\Windows\SysWOW64\Cachja32.exeC:\Windows\system32\Cachja32.exe221⤵PID:1816
-
C:\Windows\SysWOW64\Cdbefm32.exeC:\Windows\system32\Cdbefm32.exe222⤵
- Modifies registry class
PID:1828 -
C:\Windows\SysWOW64\Climgj32.exeC:\Windows\system32\Climgj32.exe223⤵PID:908
-
C:\Windows\SysWOW64\Cmjiobnm.exeC:\Windows\system32\Cmjiobnm.exe224⤵PID:592
-
C:\Windows\SysWOW64\Ceaaqpoo.exeC:\Windows\system32\Ceaaqpoo.exe225⤵PID:1736
-
C:\Windows\SysWOW64\Chpnmk32.exeC:\Windows\system32\Chpnmk32.exe226⤵PID:1480
-
C:\Windows\SysWOW64\Cknjif32.exeC:\Windows\system32\Cknjif32.exe227⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1692 -
C:\Windows\SysWOW64\Cmmfeb32.exeC:\Windows\system32\Cmmfeb32.exe228⤵
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\Dnobja32.exeC:\Windows\system32\Dnobja32.exe229⤵PID:808
-
C:\Windows\SysWOW64\Dpnofm32.exeC:\Windows\system32\Dpnofm32.exe230⤵
- Modifies registry class
PID:1448 -
C:\Windows\SysWOW64\Dgggcg32.exeC:\Windows\system32\Dgggcg32.exe231⤵PID:572
-
C:\Windows\SysWOW64\Dkccdfia.exeC:\Windows\system32\Dkccdfia.exe232⤵
- Modifies registry class
PID:320 -
C:\Windows\SysWOW64\Dldpkn32.exeC:\Windows\system32\Dldpkn32.exe233⤵PID:1200
-
C:\Windows\SysWOW64\Ddkhmk32.exeC:\Windows\system32\Ddkhmk32.exe234⤵
- Drops file in System32 directory
PID:1756 -
C:\Windows\SysWOW64\Dgjdig32.exeC:\Windows\system32\Dgjdig32.exe235⤵PID:752
-
C:\Windows\SysWOW64\Dndleqfb.exeC:\Windows\system32\Dndleqfb.exe236⤵PID:812
-
C:\Windows\SysWOW64\Doehmi32.exeC:\Windows\system32\Doehmi32.exe237⤵
- Modifies registry class
PID:1856 -
C:\Windows\SysWOW64\Dglqnf32.exeC:\Windows\system32\Dglqnf32.exe238⤵PID:748
-
C:\Windows\SysWOW64\Dhmmfo32.exeC:\Windows\system32\Dhmmfo32.exe239⤵PID:1624
-
C:\Windows\SysWOW64\Dpdegl32.exeC:\Windows\system32\Dpdegl32.exe240⤵PID:1644
-
C:\Windows\SysWOW64\Dafaodia.exeC:\Windows\system32\Dafaodia.exe241⤵PID:2008
-