Analysis
-
max time kernel
152s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 09:04
Static task
static1
Behavioral task
behavioral1
Sample
50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe
Resource
win10v2004-20220812-en
General
-
Target
50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe
-
Size
50KB
-
MD5
fce9148493315ca2d1650cb6f22882d0
-
SHA1
661929a6602af34c11a55a155d8a52c531c29988
-
SHA256
50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430
-
SHA512
d7afab27eb2adca34b621c76c239cd864ef92187f3f8943939142014aa2da7bf652bd24acec0b29b892274e156f2c0a5aad35d507f1880209bf5ec2614b0ba24
-
SSDEEP
768:++jx/Qc5QtHKaNlKanbuVv1rbERwif21kIZe2YtuFkkvj5V99999999aieCHRe/T:1jx/Qcut/qanIFbDif2LZe2YkaeEFN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Bamgfc32.exeOnpnge32.exeAbdelipf.exeDkmbpldl.exeAbfbah32.exeNoahch32.exeAhoock32.exeDkkpok32.exeQdhfljac.exeNkpmihmd.exeIgflip32.exeQmankmaq.exeMfoogo32.exeChlioa32.exeFgkeep32.exeHggojmge.exeQclkih32.exeCmgeah32.exeDofbkk32.exePjeben32.exeKdmihihk.exeFfpbfl32.exeGfdhpoib.exeOgioke32.exeOnhkpn32.exeOaboln32.exeDgmgimpn.exeLldnhi32.exeGmnqmi32.exeBpnibp32.exeNdpjhe32.exeApbhhldm.exeNfbmkb32.exeAagclq32.exeKdhllh32.exePjcaoa32.exeKoqapajd.exeEfnjaijc.exeFgmbjpda.exeNpioml32.exeNmhoajkg.exeQkcbjf32.exeGbpfalhe.exeQigemoke.exeLelafj32.exeEokgenmn.exeNcjhogie.exeKcdomclh.exeMgeejf32.exeQgejdg32.exeBhjqjnfb.exeEhlfndig.exeMokjffec.exeBenbqc32.exeFfpqkghf.exeEfijjh32.exeBfkdpk32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bamgfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onpnge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abdelipf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkmbpldl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abfbah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Noahch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahoock32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkpok32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qdhfljac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkpmihmd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igflip32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmankmaq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfoogo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chlioa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgkeep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hggojmge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qclkih32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmgeah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dofbkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjeben32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdmihihk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffpbfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfdhpoib.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogioke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onhkpn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oaboln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgmgimpn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lldnhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmnqmi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpnibp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndpjhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apbhhldm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmgeah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfbmkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aagclq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdhllh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjcaoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Koqapajd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efnjaijc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgmbjpda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmnqmi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npioml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdhllh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmhoajkg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkcbjf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbpfalhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efnjaijc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qigemoke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lelafj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eokgenmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncjhogie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcdomclh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgeejf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgejdg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhjqjnfb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehlfndig.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mokjffec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noahch32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Benbqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffpqkghf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apbhhldm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efijjh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffpqkghf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfkdpk32.exe -
Executes dropped EXE 64 IoCs
Processes:
Hmdnmimn.exeJccojc32.exeJipdlm32.exeJeiagmej.exeMalamm32.exeMnbokaip.exeMachml32.exeNfbmkb32.exeNpjadh32.exeNankaplb.exeOdhfij32.exeOgioke32.exeBdogphhk.exeMokjffec.exeMgonof32.exeNpgbgl32.exeNkmfee32.exeNpioml32.exeNdeknjdm.exeNjbcfabd.exeNlppbmah.exeNcjhogie.exeNjdpka32.exeNoahch32.exeNclddfgb.exeQnaapf32.exeQigemoke.exeQndnefjl.exeAhoock32.exeAagclq32.exeAaipbp32.exeAlcabnog.exeAekfkc32.exeBodjdilh.exeBenbqc32.exeBlhknm32.exeBhahhnoc.exeBeehab32.exeBommjhdm.exeBpnibp32.exeDanbkf32.exeDapoqfag.exeDgmgimpn.exeDqelab32.exeDkkpok32.exeDdcdhq32.exeEkmmdkdb.exeEqjemabj.exeEnnfffac.exeEfijjh32.exeEqooha32.exeEfkgph32.exeEodlimcl.exeEfndegki.exeEmhlba32.exeFfpqkghf.exeFiajmb32.exeGbfnokqf.exeHagjlfkq.exeHggojmge.exeIhjhgdka.exeIeqffh32.exeIgflip32.exeJjgdjk32.exepid process 1908 Hmdnmimn.exe 880 Jccojc32.exe 956 Jipdlm32.exe 1736 Jeiagmej.exe 1360 Malamm32.exe 2044 Mnbokaip.exe 1220 Machml32.exe 1968 Nfbmkb32.exe 1896 Npjadh32.exe 1676 Nankaplb.exe 592 Odhfij32.exe 1924 Ogioke32.exe 1196 Bdogphhk.exe 1488 Mokjffec.exe 1192 Mgonof32.exe 1404 Npgbgl32.exe 936 Nkmfee32.exe 980 Npioml32.exe 1136 Ndeknjdm.exe 1840 Njbcfabd.exe 1956 Nlppbmah.exe 1456 Ncjhogie.exe 2028 Njdpka32.exe 1572 Noahch32.exe 1124 Nclddfgb.exe 1244 Qnaapf32.exe 1740 Qigemoke.exe 1076 Qndnefjl.exe 1800 Ahoock32.exe 524 Aagclq32.exe 836 Aaipbp32.exe 1472 Alcabnog.exe 552 Aekfkc32.exe 780 Bodjdilh.exe 1948 Benbqc32.exe 848 Blhknm32.exe 616 Bhahhnoc.exe 1296 Beehab32.exe 1520 Bommjhdm.exe 784 Bpnibp32.exe 956 Danbkf32.exe 1184 Dapoqfag.exe 2044 Dgmgimpn.exe 316 Dqelab32.exe 1896 Dkkpok32.exe 1036 Ddcdhq32.exe 1684 Ekmmdkdb.exe 1216 Eqjemabj.exe 432 Ennfffac.exe 1128 Efijjh32.exe 2012 Eqooha32.exe 1904 Efkgph32.exe 1668 Eodlimcl.exe 1916 Efndegki.exe 1780 Emhlba32.exe 1648 Ffpqkghf.exe 1620 Fiajmb32.exe 2016 Gbfnokqf.exe 1000 Hagjlfkq.exe 1724 Hggojmge.exe 1736 Ihjhgdka.exe 688 Ieqffh32.exe 1936 Igflip32.exe 960 Jjgdjk32.exe -
Loads dropped DLL 64 IoCs
Processes:
50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exeHmdnmimn.exeJccojc32.exeJipdlm32.exeJeiagmej.exeMalamm32.exeMnbokaip.exeMachml32.exeNfbmkb32.exeNpjadh32.exeNankaplb.exeOdhfij32.exeOgioke32.exeBdogphhk.exeMokjffec.exeMgonof32.exeNpgbgl32.exeNkmfee32.exeNpioml32.exeNdeknjdm.exeNjbcfabd.exeNlppbmah.exeNcjhogie.exeNjdpka32.exeNoahch32.exeNclddfgb.exeQnaapf32.exeQigemoke.exeQndnefjl.exeAhoock32.exeAagclq32.exeAaipbp32.exepid process 748 50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe 748 50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe 1908 Hmdnmimn.exe 1908 Hmdnmimn.exe 880 Jccojc32.exe 880 Jccojc32.exe 956 Jipdlm32.exe 956 Jipdlm32.exe 1736 Jeiagmej.exe 1736 Jeiagmej.exe 1360 Malamm32.exe 1360 Malamm32.exe 2044 Mnbokaip.exe 2044 Mnbokaip.exe 1220 Machml32.exe 1220 Machml32.exe 1968 Nfbmkb32.exe 1968 Nfbmkb32.exe 1896 Npjadh32.exe 1896 Npjadh32.exe 1676 Nankaplb.exe 1676 Nankaplb.exe 592 Odhfij32.exe 592 Odhfij32.exe 1924 Ogioke32.exe 1924 Ogioke32.exe 1196 Bdogphhk.exe 1196 Bdogphhk.exe 1488 Mokjffec.exe 1488 Mokjffec.exe 1192 Mgonof32.exe 1192 Mgonof32.exe 1404 Npgbgl32.exe 1404 Npgbgl32.exe 936 Nkmfee32.exe 936 Nkmfee32.exe 980 Npioml32.exe 980 Npioml32.exe 1136 Ndeknjdm.exe 1136 Ndeknjdm.exe 1840 Njbcfabd.exe 1840 Njbcfabd.exe 1956 Nlppbmah.exe 1956 Nlppbmah.exe 1456 Ncjhogie.exe 1456 Ncjhogie.exe 2028 Njdpka32.exe 2028 Njdpka32.exe 1572 Noahch32.exe 1572 Noahch32.exe 1124 Nclddfgb.exe 1124 Nclddfgb.exe 1244 Qnaapf32.exe 1244 Qnaapf32.exe 1740 Qigemoke.exe 1740 Qigemoke.exe 1076 Qndnefjl.exe 1076 Qndnefjl.exe 1800 Ahoock32.exe 1800 Ahoock32.exe 524 Aagclq32.exe 524 Aagclq32.exe 836 Aaipbp32.exe 836 Aaipbp32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Capdlgaa.exeCgojjnnf.exeEohkpnoa.exeKgkacbhg.exeNhapah32.exeLopmoe32.exeLlpdmjpo.exeDkmbpldl.exePlecckkk.exeAlhpio32.exeFkkaophh.exeMfjbkbgh.exeGgokob32.exeHlcmne32.exeAaipbp32.exeEnnfffac.exeGghenc32.exeQqofak32.exeKkgbeb32.exeLclipdei.exeDhofdaei.exeBeehab32.exeOpiicj32.exeBniafc32.exeNfbmkb32.exeNkmfee32.exeNameaokl.exeNcclof32.exeHigngj32.exeBlhknm32.exeJbegpaie.exeLgeikbod.exeCffbpeog.exeEljocc32.exeGkfnda32.exeNoahch32.exeEmhlba32.exeBglldj32.exeCoolkl32.exeCiephe32.exeNalapmlc.exeAimiga32.exePaakkaib.exeCibcbe32.exeEhlfndig.exeNjbcfabd.exePdfigj32.exeDckdjn32.exeGihahf32.exeHmcjhhmi.exeQndnefjl.exeKlbedfkp.exeKpdjmjnp.exeQkcbjf32.exeAbdelipf.exeMjadpbcf.exeMjfnka32.exeFmjkbfbi.exedescription ioc process File created C:\Windows\SysWOW64\Mdhdam32.dll Capdlgaa.exe File created C:\Windows\SysWOW64\Dofbkk32.exe Cgojjnnf.exe File created C:\Windows\SysWOW64\Enkkkk32.exe Eohkpnoa.exe File created C:\Windows\SysWOW64\Ablgpd32.dll Kgkacbhg.exe File created C:\Windows\SysWOW64\Ienmcjpj.dll Nhapah32.exe File created C:\Windows\SysWOW64\Mhmkpn32.dll Lopmoe32.exe File created C:\Windows\SysWOW64\Lcjmjd32.exe Llpdmjpo.exe File opened for modification C:\Windows\SysWOW64\Dipcli32.exe Dkmbpldl.exe File created C:\Windows\SysWOW64\Paakkaib.exe Plecckkk.exe File created C:\Windows\SysWOW64\Afmdfh32.exe Alhpio32.exe File opened for modification C:\Windows\SysWOW64\Nlmlbgpo.exe Nhapah32.exe File created C:\Windows\SysWOW64\Ehgjpg32.dll Fkkaophh.exe File created C:\Windows\SysWOW64\Eeknendg.dll Mfjbkbgh.exe File opened for modification C:\Windows\SysWOW64\Gahphhkk.exe Ggokob32.exe File created C:\Windows\SysWOW64\Gmqljo32.dll Hlcmne32.exe File created C:\Windows\SysWOW64\Ffccbc32.dll Aaipbp32.exe File created C:\Windows\SysWOW64\Efijjh32.exe Ennfffac.exe File created C:\Windows\SysWOW64\Fpmdnhbf.dll Gghenc32.exe File created C:\Windows\SysWOW64\Qgioneod.exe Qqofak32.exe File opened for modification C:\Windows\SysWOW64\Kaajam32.exe Kkgbeb32.exe File opened for modification C:\Windows\SysWOW64\Laojkq32.exe Lclipdei.exe File created C:\Windows\SysWOW64\Iknnil32.dll Dhofdaei.exe File created C:\Windows\SysWOW64\Gmbfpi32.dll Beehab32.exe File opened for modification C:\Windows\SysWOW64\Plbfnk32.exe Opiicj32.exe File opened for modification C:\Windows\SysWOW64\Bjobkdic.exe Bniafc32.exe File created C:\Windows\SysWOW64\Npjadh32.exe Nfbmkb32.exe File opened for modification C:\Windows\SysWOW64\Npioml32.exe Nkmfee32.exe File opened for modification C:\Windows\SysWOW64\Ojejjdal.exe Nameaokl.exe File created C:\Windows\SysWOW64\Dpqchbom.dll Ncclof32.exe File created C:\Windows\SysWOW64\Hmcjhhmi.exe Higngj32.exe File opened for modification C:\Windows\SysWOW64\Bhahhnoc.exe Blhknm32.exe File opened for modification C:\Windows\SysWOW64\Klnkig32.exe Jbegpaie.exe File created C:\Windows\SysWOW64\Lopmoe32.exe Lgeikbod.exe File created C:\Windows\SysWOW64\Kdpajild.dll Cffbpeog.exe File created C:\Windows\SysWOW64\Jmdhdg32.dll Eljocc32.exe File created C:\Windows\SysWOW64\Ffhnmmel.dll Gkfnda32.exe File created C:\Windows\SysWOW64\Nclddfgb.exe Noahch32.exe File created C:\Windows\SysWOW64\Ncfmkjep.dll Emhlba32.exe File created C:\Windows\SysWOW64\Bjkhpe32.exe Bglldj32.exe File created C:\Windows\SysWOW64\Oblcbjbg.dll Coolkl32.exe File created C:\Windows\SysWOW64\Fnkkfdmh.dll Ciephe32.exe File opened for modification C:\Windows\SysWOW64\Ndkmlikg.exe Nalapmlc.exe File opened for modification C:\Windows\SysWOW64\Lcjmjd32.exe Llpdmjpo.exe File created C:\Windows\SysWOW64\Ahpibnpe.exe Aimiga32.exe File created C:\Windows\SysWOW64\Piicmojd.exe Paakkaib.exe File created C:\Windows\SysWOW64\Lmpgcjmn.dll Cibcbe32.exe File created C:\Windows\SysWOW64\Ekkbjphj.exe Ehlfndig.exe File created C:\Windows\SysWOW64\Nlppbmah.exe Njbcfabd.exe File created C:\Windows\SysWOW64\Pgdecf32.exe Pdfigj32.exe File opened for modification C:\Windows\SysWOW64\Hfegfnhp.exe Fkkaophh.exe File created C:\Windows\SysWOW64\Qeggdg32.dll Dckdjn32.exe File created C:\Windows\SysWOW64\Eohkpnoa.exe Eljocc32.exe File opened for modification C:\Windows\SysWOW64\Gkfnda32.exe Gihahf32.exe File created C:\Windows\SysWOW64\Hbpbpoka.exe Hmcjhhmi.exe File opened for modification C:\Windows\SysWOW64\Ahoock32.exe Qndnefjl.exe File created C:\Windows\SysWOW64\Fhpaom32.dll Klbedfkp.exe File created C:\Windows\SysWOW64\Mqqkiblf.dll Kpdjmjnp.exe File created C:\Windows\SysWOW64\Ljfqanng.dll Qkcbjf32.exe File opened for modification C:\Windows\SysWOW64\Aebahdoi.exe Abdelipf.exe File created C:\Windows\SysWOW64\Dkfdon32.dll Kkgbeb32.exe File created C:\Windows\SysWOW64\Laojkq32.exe Lclipdei.exe File created C:\Windows\SysWOW64\Fgmkcbne.dll Mjadpbcf.exe File created C:\Windows\SysWOW64\Kooffahn.dll Mjfnka32.exe File created C:\Windows\SysWOW64\Gnppbehi.dll Fmjkbfbi.exe -
Modifies registry class 64 IoCs
Processes:
Pebqgpnf.exeDlchcdfe.exePobkndkf.exePgplhfgo.exePjcaoa32.exeKamqfnkj.exeMalamm32.exeNjdpka32.exeOjejjdal.exeJcbfip32.exeMjadpbcf.exeGahphhkk.exeGfdhpoib.exeNeeqkl32.exeOnhkpn32.exeDagkmf32.exeEnkkkk32.exeHfegfnhp.exeMgbhdfdb.exeAebahdoi.exeBmifhe32.exeHagjlfkq.exeLeflqp32.exeMhkomjam.exeDekmli32.exeDipcli32.exeFcdcoq32.exeFeglmh32.exeHlcmne32.exeOmipao32.exeAgmpef32.exeBphbdp32.exeDofbkk32.exeEfijjh32.exeFfpqkghf.exeBdaaoolg.exeCfbjqjih.exeClobia32.exeNmhoajkg.exeQqofak32.exeKdmihihk.exeMfoogo32.exeOgioke32.exeAkoenj32.exeBkcoii32.exeBhjqjnfb.exeDqelab32.exeEfndegki.exeNcclof32.exeQkcbjf32.exeMnbokaip.exeBeehab32.exeEhlfndig.exeDhjihe32.exeFichmgfj.exePbepeo32.exeCjmadhna.exeBnblai32.exeCkhiem32.exeEkdepopp.exeNgjndenk.exeNnoieclh.exeOglgih32.exeEgdpdqll.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fopjcijl.dll" Pebqgpnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlchcdfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pobkndkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkehk32.dll" Pgplhfgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjcaoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjnljl32.dll" Kamqfnkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Malamm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekhpjkih.dll" Njdpka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojejjdal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oillknmk.dll" Jcbfip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgmkcbne.dll" Mjadpbcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gahphhkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpbhhcdf.dll" Gfdhpoib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Biopbh32.dll" Neeqkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onhkpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjmhcjjl.dll" Dagkmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijipah32.dll" Enkkkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iieiekmg.dll" Hfegfnhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgbhdfdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnhfnbjg.dll" Aebahdoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkhimf32.dll" Bmifhe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hagjlfkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcqdig32.dll" Leflqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Koijjn32.dll" Mhkomjam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dekmli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dipcli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmhcifll.dll" Fcdcoq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Feglmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmqljo32.dll" Hlcmne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knpank32.dll" Omipao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agmpef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akpdhj32.dll" Bphbdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkgnfbmn.dll" Dofbkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efijjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffpqkghf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdaaoolg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpmphi32.dll" Cfbjqjih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Clobia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmhoajkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qqofak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnhgje32.dll" Kdmihihk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfoogo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ogioke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjckih32.dll" Akoenj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkcoii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhjqjnfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dqelab32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efndegki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpqchbom.dll" Ncclof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qkcbjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgdecf32.dll" Mnbokaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Beehab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ieiokp32.dll" Ehlfndig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhjihe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fichmgfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbepeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjmadhna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajghme32.dll" Bnblai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glflmemn.dll" Ckhiem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ekdepopp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbbhchof.dll" Ngjndenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opfhbm32.dll" Nnoieclh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oglgih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjdlgm32.dll" Egdpdqll.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exeHmdnmimn.exeJccojc32.exeJipdlm32.exeJeiagmej.exeMalamm32.exeMnbokaip.exeMachml32.exeNfbmkb32.exeNpjadh32.exeNankaplb.exeOdhfij32.exeOgioke32.exeBdogphhk.exeMokjffec.exeMgonof32.exedescription pid process target process PID 748 wrote to memory of 1908 748 50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe Hmdnmimn.exe PID 748 wrote to memory of 1908 748 50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe Hmdnmimn.exe PID 748 wrote to memory of 1908 748 50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe Hmdnmimn.exe PID 748 wrote to memory of 1908 748 50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe Hmdnmimn.exe PID 1908 wrote to memory of 880 1908 Hmdnmimn.exe Jccojc32.exe PID 1908 wrote to memory of 880 1908 Hmdnmimn.exe Jccojc32.exe PID 1908 wrote to memory of 880 1908 Hmdnmimn.exe Jccojc32.exe PID 1908 wrote to memory of 880 1908 Hmdnmimn.exe Jccojc32.exe PID 880 wrote to memory of 956 880 Jccojc32.exe Jipdlm32.exe PID 880 wrote to memory of 956 880 Jccojc32.exe Jipdlm32.exe PID 880 wrote to memory of 956 880 Jccojc32.exe Jipdlm32.exe PID 880 wrote to memory of 956 880 Jccojc32.exe Jipdlm32.exe PID 956 wrote to memory of 1736 956 Jipdlm32.exe Jeiagmej.exe PID 956 wrote to memory of 1736 956 Jipdlm32.exe Jeiagmej.exe PID 956 wrote to memory of 1736 956 Jipdlm32.exe Jeiagmej.exe PID 956 wrote to memory of 1736 956 Jipdlm32.exe Jeiagmej.exe PID 1736 wrote to memory of 1360 1736 Jeiagmej.exe Malamm32.exe PID 1736 wrote to memory of 1360 1736 Jeiagmej.exe Malamm32.exe PID 1736 wrote to memory of 1360 1736 Jeiagmej.exe Malamm32.exe PID 1736 wrote to memory of 1360 1736 Jeiagmej.exe Malamm32.exe PID 1360 wrote to memory of 2044 1360 Malamm32.exe Mnbokaip.exe PID 1360 wrote to memory of 2044 1360 Malamm32.exe Mnbokaip.exe PID 1360 wrote to memory of 2044 1360 Malamm32.exe Mnbokaip.exe PID 1360 wrote to memory of 2044 1360 Malamm32.exe Mnbokaip.exe PID 2044 wrote to memory of 1220 2044 Mnbokaip.exe Machml32.exe PID 2044 wrote to memory of 1220 2044 Mnbokaip.exe Machml32.exe PID 2044 wrote to memory of 1220 2044 Mnbokaip.exe Machml32.exe PID 2044 wrote to memory of 1220 2044 Mnbokaip.exe Machml32.exe PID 1220 wrote to memory of 1968 1220 Machml32.exe Nfbmkb32.exe PID 1220 wrote to memory of 1968 1220 Machml32.exe Nfbmkb32.exe PID 1220 wrote to memory of 1968 1220 Machml32.exe Nfbmkb32.exe PID 1220 wrote to memory of 1968 1220 Machml32.exe Nfbmkb32.exe PID 1968 wrote to memory of 1896 1968 Nfbmkb32.exe Npjadh32.exe PID 1968 wrote to memory of 1896 1968 Nfbmkb32.exe Npjadh32.exe PID 1968 wrote to memory of 1896 1968 Nfbmkb32.exe Npjadh32.exe PID 1968 wrote to memory of 1896 1968 Nfbmkb32.exe Npjadh32.exe PID 1896 wrote to memory of 1676 1896 Npjadh32.exe Nankaplb.exe PID 1896 wrote to memory of 1676 1896 Npjadh32.exe Nankaplb.exe PID 1896 wrote to memory of 1676 1896 Npjadh32.exe Nankaplb.exe PID 1896 wrote to memory of 1676 1896 Npjadh32.exe Nankaplb.exe PID 1676 wrote to memory of 592 1676 Nankaplb.exe Odhfij32.exe PID 1676 wrote to memory of 592 1676 Nankaplb.exe Odhfij32.exe PID 1676 wrote to memory of 592 1676 Nankaplb.exe Odhfij32.exe PID 1676 wrote to memory of 592 1676 Nankaplb.exe Odhfij32.exe PID 592 wrote to memory of 1924 592 Odhfij32.exe Ogioke32.exe PID 592 wrote to memory of 1924 592 Odhfij32.exe Ogioke32.exe PID 592 wrote to memory of 1924 592 Odhfij32.exe Ogioke32.exe PID 592 wrote to memory of 1924 592 Odhfij32.exe Ogioke32.exe PID 1924 wrote to memory of 1196 1924 Ogioke32.exe Bdogphhk.exe PID 1924 wrote to memory of 1196 1924 Ogioke32.exe Bdogphhk.exe PID 1924 wrote to memory of 1196 1924 Ogioke32.exe Bdogphhk.exe PID 1924 wrote to memory of 1196 1924 Ogioke32.exe Bdogphhk.exe PID 1196 wrote to memory of 1488 1196 Bdogphhk.exe Mokjffec.exe PID 1196 wrote to memory of 1488 1196 Bdogphhk.exe Mokjffec.exe PID 1196 wrote to memory of 1488 1196 Bdogphhk.exe Mokjffec.exe PID 1196 wrote to memory of 1488 1196 Bdogphhk.exe Mokjffec.exe PID 1488 wrote to memory of 1192 1488 Mokjffec.exe Mgonof32.exe PID 1488 wrote to memory of 1192 1488 Mokjffec.exe Mgonof32.exe PID 1488 wrote to memory of 1192 1488 Mokjffec.exe Mgonof32.exe PID 1488 wrote to memory of 1192 1488 Mokjffec.exe Mgonof32.exe PID 1192 wrote to memory of 1404 1192 Mgonof32.exe Npgbgl32.exe PID 1192 wrote to memory of 1404 1192 Mgonof32.exe Npgbgl32.exe PID 1192 wrote to memory of 1404 1192 Mgonof32.exe Npgbgl32.exe PID 1192 wrote to memory of 1404 1192 Mgonof32.exe Npgbgl32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe"C:\Users\Admin\AppData\Local\Temp\50eb2939eb9dca0708c905e659c40cc4722eb2d178a69d23eb28023f5f330430.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\Hmdnmimn.exeC:\Windows\system32\Hmdnmimn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\Jccojc32.exeC:\Windows\system32\Jccojc32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\Jipdlm32.exeC:\Windows\system32\Jipdlm32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\Jeiagmej.exeC:\Windows\system32\Jeiagmej.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\Malamm32.exeC:\Windows\system32\Malamm32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\Mnbokaip.exeC:\Windows\system32\Mnbokaip.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\Machml32.exeC:\Windows\system32\Machml32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\Nfbmkb32.exeC:\Windows\system32\Nfbmkb32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\Npjadh32.exeC:\Windows\system32\Npjadh32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\Nankaplb.exeC:\Windows\system32\Nankaplb.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\Odhfij32.exeC:\Windows\system32\Odhfij32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\Ogioke32.exeC:\Windows\system32\Ogioke32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\Bdogphhk.exeC:\Windows\system32\Bdogphhk.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\Mokjffec.exeC:\Windows\system32\Mokjffec.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\Mgonof32.exeC:\Windows\system32\Mgonof32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\Npgbgl32.exeC:\Windows\system32\Npgbgl32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1404 -
C:\Windows\SysWOW64\Nkmfee32.exeC:\Windows\system32\Nkmfee32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:936 -
C:\Windows\SysWOW64\Npioml32.exeC:\Windows\system32\Npioml32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:980 -
C:\Windows\SysWOW64\Ndeknjdm.exeC:\Windows\system32\Ndeknjdm.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1136 -
C:\Windows\SysWOW64\Njbcfabd.exeC:\Windows\system32\Njbcfabd.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1840 -
C:\Windows\SysWOW64\Nlppbmah.exeC:\Windows\system32\Nlppbmah.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1956 -
C:\Windows\SysWOW64\Ncjhogie.exeC:\Windows\system32\Ncjhogie.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1456 -
C:\Windows\SysWOW64\Njdpka32.exeC:\Windows\system32\Njdpka32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2028 -
C:\Windows\SysWOW64\Noahch32.exeC:\Windows\system32\Noahch32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1572 -
C:\Windows\SysWOW64\Nclddfgb.exeC:\Windows\system32\Nclddfgb.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1124 -
C:\Windows\SysWOW64\Qnaapf32.exeC:\Windows\system32\Qnaapf32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1244 -
C:\Windows\SysWOW64\Qigemoke.exeC:\Windows\system32\Qigemoke.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1740 -
C:\Windows\SysWOW64\Qndnefjl.exeC:\Windows\system32\Qndnefjl.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1076 -
C:\Windows\SysWOW64\Ahoock32.exeC:\Windows\system32\Ahoock32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1800 -
C:\Windows\SysWOW64\Aagclq32.exeC:\Windows\system32\Aagclq32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:524 -
C:\Windows\SysWOW64\Aaipbp32.exeC:\Windows\system32\Aaipbp32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:836 -
C:\Windows\SysWOW64\Alcabnog.exeC:\Windows\system32\Alcabnog.exe33⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\Aekfkc32.exeC:\Windows\system32\Aekfkc32.exe34⤵
- Executes dropped EXE
PID:552 -
C:\Windows\SysWOW64\Bodjdilh.exeC:\Windows\system32\Bodjdilh.exe35⤵
- Executes dropped EXE
PID:780 -
C:\Windows\SysWOW64\Benbqc32.exeC:\Windows\system32\Benbqc32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1948 -
C:\Windows\SysWOW64\Blhknm32.exeC:\Windows\system32\Blhknm32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:848 -
C:\Windows\SysWOW64\Bhahhnoc.exeC:\Windows\system32\Bhahhnoc.exe38⤵
- Executes dropped EXE
PID:616 -
C:\Windows\SysWOW64\Beehab32.exeC:\Windows\system32\Beehab32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1296 -
C:\Windows\SysWOW64\Bommjhdm.exeC:\Windows\system32\Bommjhdm.exe40⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\Bpnibp32.exeC:\Windows\system32\Bpnibp32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:784 -
C:\Windows\SysWOW64\Danbkf32.exeC:\Windows\system32\Danbkf32.exe42⤵
- Executes dropped EXE
PID:956 -
C:\Windows\SysWOW64\Dapoqfag.exeC:\Windows\system32\Dapoqfag.exe43⤵
- Executes dropped EXE
PID:1184 -
C:\Windows\SysWOW64\Dgmgimpn.exeC:\Windows\system32\Dgmgimpn.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\Dqelab32.exeC:\Windows\system32\Dqelab32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:316 -
C:\Windows\SysWOW64\Dkkpok32.exeC:\Windows\system32\Dkkpok32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1896 -
C:\Windows\SysWOW64\Ddcdhq32.exeC:\Windows\system32\Ddcdhq32.exe47⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\SysWOW64\Ekmmdkdb.exeC:\Windows\system32\Ekmmdkdb.exe48⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\Eqjemabj.exeC:\Windows\system32\Eqjemabj.exe49⤵
- Executes dropped EXE
PID:1216 -
C:\Windows\SysWOW64\Ennfffac.exeC:\Windows\system32\Ennfffac.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:432 -
C:\Windows\SysWOW64\Efijjh32.exeC:\Windows\system32\Efijjh32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1128 -
C:\Windows\SysWOW64\Eqooha32.exeC:\Windows\system32\Eqooha32.exe52⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\Efkgph32.exeC:\Windows\system32\Efkgph32.exe53⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\SysWOW64\Eodlimcl.exeC:\Windows\system32\Eodlimcl.exe54⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\Efndegki.exeC:\Windows\system32\Efndegki.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:1916 -
C:\Windows\SysWOW64\Emhlba32.exeC:\Windows\system32\Emhlba32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1780 -
C:\Windows\SysWOW64\Ffpqkghf.exeC:\Windows\system32\Ffpqkghf.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1648 -
C:\Windows\SysWOW64\Fiajmb32.exeC:\Windows\system32\Fiajmb32.exe58⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Gbfnokqf.exeC:\Windows\system32\Gbfnokqf.exe59⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\Hagjlfkq.exeC:\Windows\system32\Hagjlfkq.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:1000 -
C:\Windows\SysWOW64\Hggojmge.exeC:\Windows\system32\Hggojmge.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\Ihjhgdka.exeC:\Windows\system32\Ihjhgdka.exe62⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\Ieqffh32.exeC:\Windows\system32\Ieqffh32.exe63⤵
- Executes dropped EXE
PID:688 -
C:\Windows\SysWOW64\Igflip32.exeC:\Windows\system32\Igflip32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\Jjgdjk32.exeC:\Windows\system32\Jjgdjk32.exe65⤵
- Executes dropped EXE
PID:960 -
C:\Windows\SysWOW64\Jcbfip32.exeC:\Windows\system32\Jcbfip32.exe66⤵
- Modifies registry class
PID:1760 -
C:\Windows\SysWOW64\Jjnkkj32.exeC:\Windows\system32\Jjnkkj32.exe67⤵PID:1788
-
C:\Windows\SysWOW64\Kdhllh32.exeC:\Windows\system32\Kdhllh32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1756 -
C:\Windows\SysWOW64\Kgkacbhg.exeC:\Windows\system32\Kgkacbhg.exe69⤵
- Drops file in System32 directory
PID:1396 -
C:\Windows\SysWOW64\Kneipm32.exeC:\Windows\system32\Kneipm32.exe70⤵PID:528
-
C:\Windows\SysWOW64\Kcdomclh.exeC:\Windows\system32\Kcdomclh.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1432 -
C:\Windows\SysWOW64\Lelafj32.exeC:\Windows\system32\Lelafj32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1504 -
C:\Windows\SysWOW64\Mecgfifg.exeC:\Windows\system32\Mecgfifg.exe73⤵PID:748
-
C:\Windows\SysWOW64\Mpoelg32.exeC:\Windows\system32\Mpoelg32.exe74⤵PID:1220
-
C:\Windows\SysWOW64\Ndpjhe32.exeC:\Windows\system32\Ndpjhe32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:592 -
C:\Windows\SysWOW64\Nmhoajkg.exeC:\Windows\system32\Nmhoajkg.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1444 -
C:\Windows\SysWOW64\Nbegiaio.exeC:\Windows\system32\Nbegiaio.exe77⤵PID:1236
-
C:\Windows\SysWOW64\Neccemhb.exeC:\Windows\system32\Neccemhb.exe78⤵PID:268
-
C:\Windows\SysWOW64\Nhapah32.exeC:\Windows\system32\Nhapah32.exe79⤵
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\Nlmlbgpo.exeC:\Windows\system32\Nlmlbgpo.exe80⤵PID:1708
-
C:\Windows\SysWOW64\Ncgdoa32.exeC:\Windows\system32\Ncgdoa32.exe81⤵PID:1652
-
C:\Windows\SysWOW64\Neeqkl32.exeC:\Windows\system32\Neeqkl32.exe82⤵
- Modifies registry class
PID:912 -
C:\Windows\SysWOW64\Nalapmlc.exeC:\Windows\system32\Nalapmlc.exe83⤵
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\Ndkmlikg.exeC:\Windows\system32\Ndkmlikg.exe84⤵PID:1028
-
C:\Windows\SysWOW64\Nkeeicbd.exeC:\Windows\system32\Nkeeicbd.exe85⤵PID:560
-
C:\Windows\SysWOW64\Nncbenbh.exeC:\Windows\system32\Nncbenbh.exe86⤵PID:856
-
C:\Windows\SysWOW64\Ndmjah32.exeC:\Windows\system32\Ndmjah32.exe87⤵PID:1452
-
C:\Windows\SysWOW64\Okgbnbqa.exeC:\Windows\system32\Okgbnbqa.exe88⤵PID:1636
-
C:\Windows\SysWOW64\Oneojnpe.exeC:\Windows\system32\Oneojnpe.exe89⤵PID:1592
-
C:\Windows\SysWOW64\Opdkfioi.exeC:\Windows\system32\Opdkfioi.exe90⤵PID:2008
-
C:\Windows\SysWOW64\Ognccc32.exeC:\Windows\system32\Ognccc32.exe91⤵PID:1268
-
C:\Windows\SysWOW64\Onhkpn32.exeC:\Windows\system32\Onhkpn32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\Odacmheo.exeC:\Windows\system32\Odacmheo.exe93⤵PID:2064
-
C:\Windows\SysWOW64\Pbojdp32.exeC:\Windows\system32\Pbojdp32.exe94⤵PID:2084
-
C:\Windows\SysWOW64\Pjeben32.exeC:\Windows\system32\Pjeben32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2100 -
C:\Windows\SysWOW64\Pldnailb.exeC:\Windows\system32\Pldnailb.exe96⤵PID:2116
-
C:\Windows\SysWOW64\Pobkndkf.exeC:\Windows\system32\Pobkndkf.exe97⤵
- Modifies registry class
PID:2132 -
C:\Windows\SysWOW64\Pflcjo32.exeC:\Windows\system32\Pflcjo32.exe98⤵PID:2152
-
C:\Windows\SysWOW64\Plfkgijp.exeC:\Windows\system32\Plfkgijp.exe99⤵PID:2204
-
C:\Windows\SysWOW64\Pfoppn32.exeC:\Windows\system32\Pfoppn32.exe100⤵PID:2220
-
C:\Windows\SysWOW64\Pgplhfgo.exeC:\Windows\system32\Pgplhfgo.exe101⤵
- Modifies registry class
PID:2232 -
C:\Windows\SysWOW64\Pogdid32.exeC:\Windows\system32\Pogdid32.exe102⤵PID:2248
-
C:\Windows\SysWOW64\Pbepeo32.exeC:\Windows\system32\Pbepeo32.exe103⤵
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Pddlak32.exeC:\Windows\system32\Pddlak32.exe104⤵PID:2292
-
C:\Windows\SysWOW64\Pgbimf32.exeC:\Windows\system32\Pgbimf32.exe105⤵PID:2316
-
C:\Windows\SysWOW64\Pjqeia32.exeC:\Windows\system32\Pjqeia32.exe106⤵PID:2328
-
C:\Windows\SysWOW64\Pnlajpli.exeC:\Windows\system32\Pnlajpli.exe107⤵PID:2348
-
C:\Windows\SysWOW64\Pdfigj32.exeC:\Windows\system32\Pdfigj32.exe108⤵
- Drops file in System32 directory
PID:2364 -
C:\Windows\SysWOW64\Pgdecf32.exeC:\Windows\system32\Pgdecf32.exe109⤵PID:2380
-
C:\Windows\SysWOW64\Pjcaoa32.exeC:\Windows\system32\Pjcaoa32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2396 -
C:\Windows\SysWOW64\Qmankmaq.exeC:\Windows\system32\Qmankmaq.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2412 -
C:\Windows\SysWOW64\Qdhfljac.exeC:\Windows\system32\Qdhfljac.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2436 -
C:\Windows\SysWOW64\Qfjbdb32.exeC:\Windows\system32\Qfjbdb32.exe113⤵PID:2460
-
C:\Windows\SysWOW64\Qqofak32.exeC:\Windows\system32\Qqofak32.exe114⤵
- Drops file in System32 directory
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Qgioneod.exeC:\Windows\system32\Qgioneod.exe115⤵PID:2588
-
C:\Windows\SysWOW64\Cldclkld.exeC:\Windows\system32\Cldclkld.exe116⤵PID:2708
-
C:\Windows\SysWOW64\Fkkaophh.exeC:\Windows\system32\Fkkaophh.exe117⤵
- Drops file in System32 directory
PID:2720 -
C:\Windows\SysWOW64\Hfegfnhp.exeC:\Windows\system32\Hfegfnhp.exe118⤵
- Modifies registry class
PID:2728 -
C:\Windows\SysWOW64\Jjeiqp32.exeC:\Windows\system32\Jjeiqp32.exe119⤵PID:2748
-
C:\Windows\SysWOW64\Jdpjoedm.exeC:\Windows\system32\Jdpjoedm.exe120⤵PID:2756
-
C:\Windows\SysWOW64\Jpgkdfia.exeC:\Windows\system32\Jpgkdfia.exe121⤵PID:2764
-
C:\Windows\SysWOW64\Jbegpaie.exeC:\Windows\system32\Jbegpaie.exe122⤵
- Drops file in System32 directory
PID:2772
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-