Analysis
-
max time kernel
173s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe
Resource
win10v2004-20221111-en
General
-
Target
dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe
-
Size
50KB
-
MD5
21eeb86f9d923532cc1a0c7f891ffc90
-
SHA1
e65f778a576b9cc22fcf244941d67906d26fb0c1
-
SHA256
dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490
-
SHA512
21eb0ce416fda5e310b5389ab4fcb58e4fb6bad3e762f584441c5041def371d26d9717f2c08d3383292e43bebc759709ba59288ad0a4d670a6b603ba78df687e
-
SSDEEP
768:ZBD2nRHSffE0sx0ZFwbIIBmbyARsW1zR0SKPDFthyyfgC2/1H5:OnQHE0cbrcRsWiFthyYgCs
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Kqhebi32.exeLnlaka32.exeLhkdilag.exeCmbimdfg.exeHfodgpaf.exeKlgeil32.exeHeqkbj32.exeMoopoenp.exeHlkcodoo.exeLlgpjkiq.exeObmdfg32.exeOemmhb32.exeOpenkjoh.exePinbcp32.exeHedahm32.exeMjjhqaln.exeKifghp32.exeNdbnhkfp.exeJodhadia.exeIilcal32.exeKgbmocbi.exeMaadhk32.exeKfhkld32.exeLnocbbig.exeMqejon32.exeMqggdmaf.exeNpmpdmii.exeNkgieiff.exeBlejdqbi.exeNpioml32.exeLfbfha32.exeKcindd32.exeNgqfpijh.exeOfmibe32.exePcgcdnbh.exeHhgbnfbd.exeKiglha32.exePamqcaoo.exeMicomm32.exeLoelffhd.exeOjaobdgi.exeOnfaqghf.exeClggiq32.exeIjhpab32.exeMiehnomn.exeNjmkff32.exeLeapmlhc.exePjhaagcm.exeKpemdf32.exeFbkmfm32.exeJecdfmhk.exeJgbapp32.exeNpijmk32.exeMogeji32.exeNbjkaddk.exeJgnide32.exeKllnig32.exeQjhbdg32.exeOfhpgemm.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kqhebi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnlaka32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhkdilag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmbimdfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfodgpaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Klgeil32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Heqkbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moopoenp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlkcodoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llgpjkiq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obmdfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oemmhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Openkjoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pinbcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hedahm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjjhqaln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kifghp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndbnhkfp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jodhadia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iilcal32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgbmocbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Maadhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfhkld32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnocbbig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mqejon32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqggdmaf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npmpdmii.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkgieiff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blejdqbi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npioml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmbimdfg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfbfha32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcindd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngqfpijh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofmibe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcgcdnbh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhgbnfbd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hedahm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kiglha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pamqcaoo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Micomm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Loelffhd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojaobdgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onfaqghf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clggiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijhpab32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Miehnomn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njmkff32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leapmlhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkgieiff.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjhaagcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpemdf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbkmfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jecdfmhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgbapp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnlaka32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npijmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mogeji32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbjkaddk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgnide32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kllnig32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjhbdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofhpgemm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klgeil32.exe -
Executes dropped EXE 64 IoCs
Processes:
Hhgbnfbd.exeJgnide32.exeJebimi32.exeJedfci32.exeJffbjajj.exeKgeoddal.exeKmddbk32.exeKfmhkpda.exeKpemdf32.exeKllnig32.exeKedbblgg.exeLhekcgdh.exeMoopoenp.exeMiddlnnf.exeMlbphimj.exeMekdaocj.exeMkhmjeab.exeMhlmcjqk.exeNnifkqoc.exeNdbnhkfp.exeNkmfee32.exeNpioml32.exeNgcgjfcq.exePpjgij32.exePbkqkefk.exeQpoadied.exeQjhbdg32.exeCcaoikej.exeOpfjebdj.exeOklnbkdp.exeEnoabm32.exeFjmhhmcc.exeFcemqc32.exeFjpemmaq.exeFolmedph.exeFgcegapj.exeFhdanifh.exeFlbjdh32.exeGbapbnid.exeGoeplbgm.exeGklqqc32.exeGnmjbojb.exeGfhngagn.exeHghkadoq.exeHmecikmh.exeHfodgpaf.exeIjfclcqp.exeIjhpab32.exeIbhnadhb.exeJbkkfd32.exeJodhadia.exeJdcnok32.exeKkaogd32.exeKpnhok32.exeKghple32.exeKiglha32.exeKlgeil32.exeLfbfha32.exeMgmefhmh.exeMqejon32.exeMqggdmaf.exeMomdej32.exeMiehnomn.exeNijaio32.exepid process 1988 Hhgbnfbd.exe 560 Jgnide32.exe 268 Jebimi32.exe 824 Jedfci32.exe 1880 Jffbjajj.exe 872 Kgeoddal.exe 1824 Kmddbk32.exe 1280 Kfmhkpda.exe 1436 Kpemdf32.exe 1544 Kllnig32.exe 288 Kedbblgg.exe 1984 Lhekcgdh.exe 1564 Moopoenp.exe 1960 Middlnnf.exe 1776 Mlbphimj.exe 1832 Mekdaocj.exe 972 Mkhmjeab.exe 1936 Mhlmcjqk.exe 1932 Nnifkqoc.exe 1624 Ndbnhkfp.exe 1352 Nkmfee32.exe 324 Npioml32.exe 544 Ngcgjfcq.exe 1640 Ppjgij32.exe 928 Pbkqkefk.exe 568 Qpoadied.exe 1560 Qjhbdg32.exe 908 Ccaoikej.exe 1036 Opfjebdj.exe 1728 Oklnbkdp.exe 1100 Enoabm32.exe 832 Fjmhhmcc.exe 1664 Fcemqc32.exe 1540 Fjpemmaq.exe 860 Folmedph.exe 992 Fgcegapj.exe 1500 Fhdanifh.exe 1704 Flbjdh32.exe 764 Gbapbnid.exe 1452 Goeplbgm.exe 1488 Gklqqc32.exe 1948 Gnmjbojb.exe 892 Gfhngagn.exe 2000 Hghkadoq.exe 1340 Hmecikmh.exe 1976 Hfodgpaf.exe 1676 Ijfclcqp.exe 572 Ijhpab32.exe 380 Ibhnadhb.exe 1516 Jbkkfd32.exe 1576 Jodhadia.exe 1492 Jdcnok32.exe 268 Kkaogd32.exe 1168 Kpnhok32.exe 872 Kghple32.exe 552 Kiglha32.exe 1436 Klgeil32.exe 900 Lfbfha32.exe 1444 Mgmefhmh.exe 288 Mqejon32.exe 1832 Mqggdmaf.exe 1700 Momdej32.exe 1740 Miehnomn.exe 624 Nijaio32.exe -
Loads dropped DLL 64 IoCs
Processes:
dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exeHhgbnfbd.exeJgnide32.exeJebimi32.exeJedfci32.exeJffbjajj.exeKgeoddal.exeKmddbk32.exeKfmhkpda.exeKpemdf32.exeKllnig32.exeKedbblgg.exeLhekcgdh.exeMoopoenp.exeMiddlnnf.exeMlbphimj.exeMekdaocj.exeMkhmjeab.exeMhlmcjqk.exeNnifkqoc.exeNdbnhkfp.exeNkmfee32.exeNpioml32.exeNgcgjfcq.exePpjgij32.exePbkqkefk.exeQpoadied.exeQjhbdg32.exeCcaoikej.exeOpfjebdj.exeOklnbkdp.exeEnoabm32.exepid process 2028 dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe 2028 dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe 1988 Hhgbnfbd.exe 1988 Hhgbnfbd.exe 560 Jgnide32.exe 560 Jgnide32.exe 268 Jebimi32.exe 268 Jebimi32.exe 824 Jedfci32.exe 824 Jedfci32.exe 1880 Jffbjajj.exe 1880 Jffbjajj.exe 872 Kgeoddal.exe 872 Kgeoddal.exe 1824 Kmddbk32.exe 1824 Kmddbk32.exe 1280 Kfmhkpda.exe 1280 Kfmhkpda.exe 1436 Kpemdf32.exe 1436 Kpemdf32.exe 1544 Kllnig32.exe 1544 Kllnig32.exe 288 Kedbblgg.exe 288 Kedbblgg.exe 1984 Lhekcgdh.exe 1984 Lhekcgdh.exe 1564 Moopoenp.exe 1564 Moopoenp.exe 1960 Middlnnf.exe 1960 Middlnnf.exe 1776 Mlbphimj.exe 1776 Mlbphimj.exe 1832 Mekdaocj.exe 1832 Mekdaocj.exe 972 Mkhmjeab.exe 972 Mkhmjeab.exe 1936 Mhlmcjqk.exe 1936 Mhlmcjqk.exe 1932 Nnifkqoc.exe 1932 Nnifkqoc.exe 1624 Ndbnhkfp.exe 1624 Ndbnhkfp.exe 1352 Nkmfee32.exe 1352 Nkmfee32.exe 324 Npioml32.exe 324 Npioml32.exe 544 Ngcgjfcq.exe 544 Ngcgjfcq.exe 1640 Ppjgij32.exe 1640 Ppjgij32.exe 928 Pbkqkefk.exe 928 Pbkqkefk.exe 568 Qpoadied.exe 568 Qpoadied.exe 1560 Qjhbdg32.exe 1560 Qjhbdg32.exe 908 Ccaoikej.exe 908 Ccaoikej.exe 1036 Opfjebdj.exe 1036 Opfjebdj.exe 1728 Oklnbkdp.exe 1728 Oklnbkdp.exe 1100 Enoabm32.exe 1100 Enoabm32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Kedbblgg.exeMomdej32.exeIdokiedo.exeCmbimdfg.exeMkhmjeab.exeGklqqc32.exeMdikol32.exeAooqfi32.exeNpioml32.exeGnbmknbo.exeHfgeeo32.exeLeapmlhc.exeNgqfpijh.exeIbhnadhb.exeKghple32.exeMmjabl32.exeLlgpjkiq.exeLogikffa.exePbkqkefk.exeKlgeil32.exeKgbmocbi.exeLhpndk32.exePakdnbaa.exeJbkkfd32.exeGmnqmi32.exePinbcp32.exeMhlmcjqk.exeGoeplbgm.exeIkpqpadg.exeBcjielmk.exeLhekcgdh.exeNagccqda.exeHigngj32.exeAibhnb32.exeBlejdqbi.exeHhgbnfbd.exeKfmhkpda.exeJodhadia.exeIkbmeqbd.exeIaobgjgn.exeLpppejcl.exeMfqiebaa.exeOcceedod.exeLhbjjkkp.exeFcemqc32.exeJgbapp32.exeLgejeh32.exeLpmonmhj.exeNgnjkj32.exeOnfaqghf.exePbfglelj.exeApjcem32.exeChqddach.exeJgnide32.exeJdcnok32.exeIkggpp32.exeLfjhad32.exeKgeoddal.exeFlbjdh32.exedescription ioc process File created C:\Windows\SysWOW64\Lhekcgdh.exe Kedbblgg.exe File created C:\Windows\SysWOW64\Miehnomn.exe Momdej32.exe File created C:\Windows\SysWOW64\Iilcal32.exe Idokiedo.exe File opened for modification C:\Windows\SysWOW64\Cfknfj32.exe Cmbimdfg.exe File created C:\Windows\SysWOW64\Apoogk32.dll Mkhmjeab.exe File opened for modification C:\Windows\SysWOW64\Gnmjbojb.exe Gklqqc32.exe File opened for modification C:\Windows\SysWOW64\Mglqfglb.exe Mdikol32.exe File created C:\Windows\SysWOW64\Kldqianb.dll Aooqfi32.exe File created C:\Windows\SysWOW64\Ngcgjfcq.exe Npioml32.exe File opened for modification C:\Windows\SysWOW64\Gjinpohc.exe Gnbmknbo.exe File created C:\Windows\SysWOW64\Higngj32.exe Hfgeeo32.exe File opened for modification C:\Windows\SysWOW64\Lbeafpfm.exe Leapmlhc.exe File created C:\Windows\SysWOW64\Ojobleil.exe Ngqfpijh.exe File opened for modification C:\Windows\SysWOW64\Jbkkfd32.exe Ibhnadhb.exe File created C:\Windows\SysWOW64\Ljpfbqci.dll Ibhnadhb.exe File created C:\Windows\SysWOW64\Hkaalc32.dll Kghple32.exe File created C:\Windows\SysWOW64\Mcdjofpk.exe Mmjabl32.exe File opened for modification C:\Windows\SysWOW64\Loelffhd.exe Llgpjkiq.exe File opened for modification C:\Windows\SysWOW64\Lhpndk32.exe Logikffa.exe File opened for modification C:\Windows\SysWOW64\Qpoadied.exe Pbkqkefk.exe File opened for modification C:\Windows\SysWOW64\Lfbfha32.exe Klgeil32.exe File created C:\Windows\SysWOW64\Knleln32.exe Kgbmocbi.exe File created C:\Windows\SysWOW64\Anegiqeg.dll Lhpndk32.exe File opened for modification C:\Windows\SysWOW64\Pegpnq32.exe Pakdnbaa.exe File opened for modification C:\Windows\SysWOW64\Jodhadia.exe Jbkkfd32.exe File created C:\Windows\SysWOW64\Chfjpdkc.dll Gmnqmi32.exe File opened for modification C:\Windows\SysWOW64\Pbfglelj.exe Pinbcp32.exe File created C:\Windows\SysWOW64\Nnifkqoc.exe Mhlmcjqk.exe File opened for modification C:\Windows\SysWOW64\Gklqqc32.exe Goeplbgm.exe File created C:\Windows\SysWOW64\Ikbmeqbd.exe Ikpqpadg.exe File created C:\Windows\SysWOW64\Bgfefj32.exe Bcjielmk.exe File created C:\Windows\SysWOW64\Qalqqqnm.dll Llgpjkiq.exe File opened for modification C:\Windows\SysWOW64\Moopoenp.exe Lhekcgdh.exe File opened for modification C:\Windows\SysWOW64\Npmpdmii.exe Nagccqda.exe File created C:\Windows\SysWOW64\Hlfjce32.exe Higngj32.exe File created C:\Windows\SysWOW64\Aooqfi32.exe Aibhnb32.exe File created C:\Windows\SysWOW64\Bdpohcod.exe Blejdqbi.exe File created C:\Windows\SysWOW64\Jgnide32.exe Hhgbnfbd.exe File created C:\Windows\SysWOW64\Igglgh32.dll Kfmhkpda.exe File created C:\Windows\SysWOW64\Jdcnok32.exe Jodhadia.exe File created C:\Windows\SysWOW64\Dnlchm32.dll Ikbmeqbd.exe File opened for modification C:\Windows\SysWOW64\Ikggpp32.exe Iaobgjgn.exe File created C:\Windows\SysWOW64\Dnnbbi32.dll Lpppejcl.exe File created C:\Windows\SysWOW64\Hgnacbbp.dll Mfqiebaa.exe File created C:\Windows\SysWOW64\Jadpdk32.exe Occeedod.exe File created C:\Windows\SysWOW64\Lgejeh32.exe Lhbjjkkp.exe File opened for modification C:\Windows\SysWOW64\Fjpemmaq.exe Fcemqc32.exe File opened for modification C:\Windows\SysWOW64\Joneebmi.exe Jgbapp32.exe File created C:\Windows\SysWOW64\Lbeafpfm.exe Leapmlhc.exe File opened for modification C:\Windows\SysWOW64\Lolbfe32.exe Lgejeh32.exe File created C:\Windows\SysWOW64\Hhdekb32.dll Lpmonmhj.exe File created C:\Windows\SysWOW64\Njmfge32.exe Ngnjkj32.exe File opened for modification C:\Windows\SysWOW64\Ofmibe32.exe Onfaqghf.exe File created C:\Windows\SysWOW64\Gnigil32.dll Pbfglelj.exe File created C:\Windows\SysWOW64\Aibhnb32.exe Apjcem32.exe File opened for modification C:\Windows\SysWOW64\Cnmmlh32.exe Chqddach.exe File created C:\Windows\SysWOW64\Jebimi32.exe Jgnide32.exe File created C:\Windows\SysWOW64\Gnmjbojb.exe Gklqqc32.exe File opened for modification C:\Windows\SysWOW64\Kkaogd32.exe Jdcnok32.exe File created C:\Windows\SysWOW64\Hgcbefhg.dll Klgeil32.exe File created C:\Windows\SysWOW64\Bhongjcn.dll Ikggpp32.exe File opened for modification C:\Windows\SysWOW64\Lhkdilag.exe Lfjhad32.exe File created C:\Windows\SysWOW64\Kmddbk32.exe Kgeoddal.exe File created C:\Windows\SysWOW64\Ijpopp32.dll Flbjdh32.exe -
Modifies registry class 64 IoCs
Processes:
Hijkmibn.exeKgeoddal.exeKfmhkpda.exeKpemdf32.exeGbapbnid.exeJibifgfc.exeJhhgch32.exeJgmcdd32.exeLmflhi32.exeKmddbk32.exeHedahm32.exeOjdagefm.exeOfnnafjn.exeOcceedod.exeOepjmapb.exeMmjabl32.exeNkgieiff.exePbfglelj.exeQjhbdg32.exeHmecikmh.exeKiglha32.exeMqejon32.exeLiafhjlg.exeMjlefq32.exeJadpdk32.exePinbcp32.exeNnifkqoc.exeQpoadied.exeHfodgpaf.exeJdcnok32.exeLbnlaebp.exeLlgpjkiq.exeLhbjjkkp.exePcgcdnbh.exedce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exeMiddlnnf.exeHlfjce32.exeAibhnb32.exeAdlinq32.exeCaflgg32.exeNgqfpijh.exeMkhmjeab.exeIjhpab32.exeMcmcng32.exeLnocbbig.exeEnoabm32.exeMomdej32.exePamqcaoo.exeKifghp32.exeQimobchd.exeMekdaocj.exeIaobgjgn.exeIilcal32.exeChngnaek.exeJgbapp32.exeNbjkaddk.exeMaadhk32.exeLhkdilag.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkdefi32.dll" Hijkmibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgeoddal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igglgh32.dll" Kfmhkpda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpemdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpallm32.dll" Gbapbnid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jibifgfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbglqboc.dll" Jhhgch32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgmcdd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmflhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmddbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hedahm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnbannep.dll" Ojdagefm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofnnafjn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Occeedod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oepjmapb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dijoke32.dll" Mmjabl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkgieiff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbfglelj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qjhbdg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmecikmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kiglha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mqejon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbacei32.dll" Liafhjlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkcnlkkl.dll" Mjlefq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jadpdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Albegldd.dll" Pinbcp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnifkqoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qpoadied.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mobpkcda.dll" Hfodgpaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgkbnccq.dll" Jdcnok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbnlaebp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llgpjkiq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhbjjkkp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcgcdnbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Middlnnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcmkoppm.dll" Hlfjce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lekjqbmj.dll" Jadpdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcgcdnbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aibhnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adlinq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Caflgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poijkj32.dll" Ngqfpijh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkhmjeab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlicpd32.dll" Ijhpab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mqieappe.dll" Mcmcng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnocbbig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qpoadied.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enoabm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Momdej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pamqcaoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahbfcjoi.dll" Kifghp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qimobchd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mekdaocj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iaobgjgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdihka32.dll" Iilcal32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjlefq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chngnaek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgbapp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Occeedod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llgpjkiq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbjkaddk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdhgqiba.dll" Maadhk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhkdilag.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exeHhgbnfbd.exeJgnide32.exeJebimi32.exeJedfci32.exeJffbjajj.exeKgeoddal.exeKmddbk32.exeKfmhkpda.exeKpemdf32.exeKllnig32.exeKedbblgg.exeLhekcgdh.exeMoopoenp.exeMiddlnnf.exeMlbphimj.exedescription pid process target process PID 2028 wrote to memory of 1988 2028 dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe Hhgbnfbd.exe PID 2028 wrote to memory of 1988 2028 dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe Hhgbnfbd.exe PID 2028 wrote to memory of 1988 2028 dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe Hhgbnfbd.exe PID 2028 wrote to memory of 1988 2028 dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe Hhgbnfbd.exe PID 1988 wrote to memory of 560 1988 Hhgbnfbd.exe Jgnide32.exe PID 1988 wrote to memory of 560 1988 Hhgbnfbd.exe Jgnide32.exe PID 1988 wrote to memory of 560 1988 Hhgbnfbd.exe Jgnide32.exe PID 1988 wrote to memory of 560 1988 Hhgbnfbd.exe Jgnide32.exe PID 560 wrote to memory of 268 560 Jgnide32.exe Jebimi32.exe PID 560 wrote to memory of 268 560 Jgnide32.exe Jebimi32.exe PID 560 wrote to memory of 268 560 Jgnide32.exe Jebimi32.exe PID 560 wrote to memory of 268 560 Jgnide32.exe Jebimi32.exe PID 268 wrote to memory of 824 268 Jebimi32.exe Jedfci32.exe PID 268 wrote to memory of 824 268 Jebimi32.exe Jedfci32.exe PID 268 wrote to memory of 824 268 Jebimi32.exe Jedfci32.exe PID 268 wrote to memory of 824 268 Jebimi32.exe Jedfci32.exe PID 824 wrote to memory of 1880 824 Jedfci32.exe Jffbjajj.exe PID 824 wrote to memory of 1880 824 Jedfci32.exe Jffbjajj.exe PID 824 wrote to memory of 1880 824 Jedfci32.exe Jffbjajj.exe PID 824 wrote to memory of 1880 824 Jedfci32.exe Jffbjajj.exe PID 1880 wrote to memory of 872 1880 Jffbjajj.exe Kgeoddal.exe PID 1880 wrote to memory of 872 1880 Jffbjajj.exe Kgeoddal.exe PID 1880 wrote to memory of 872 1880 Jffbjajj.exe Kgeoddal.exe PID 1880 wrote to memory of 872 1880 Jffbjajj.exe Kgeoddal.exe PID 872 wrote to memory of 1824 872 Kgeoddal.exe Kmddbk32.exe PID 872 wrote to memory of 1824 872 Kgeoddal.exe Kmddbk32.exe PID 872 wrote to memory of 1824 872 Kgeoddal.exe Kmddbk32.exe PID 872 wrote to memory of 1824 872 Kgeoddal.exe Kmddbk32.exe PID 1824 wrote to memory of 1280 1824 Kmddbk32.exe Kfmhkpda.exe PID 1824 wrote to memory of 1280 1824 Kmddbk32.exe Kfmhkpda.exe PID 1824 wrote to memory of 1280 1824 Kmddbk32.exe Kfmhkpda.exe PID 1824 wrote to memory of 1280 1824 Kmddbk32.exe Kfmhkpda.exe PID 1280 wrote to memory of 1436 1280 Kfmhkpda.exe Kpemdf32.exe PID 1280 wrote to memory of 1436 1280 Kfmhkpda.exe Kpemdf32.exe PID 1280 wrote to memory of 1436 1280 Kfmhkpda.exe Kpemdf32.exe PID 1280 wrote to memory of 1436 1280 Kfmhkpda.exe Kpemdf32.exe PID 1436 wrote to memory of 1544 1436 Kpemdf32.exe Kllnig32.exe PID 1436 wrote to memory of 1544 1436 Kpemdf32.exe Kllnig32.exe PID 1436 wrote to memory of 1544 1436 Kpemdf32.exe Kllnig32.exe PID 1436 wrote to memory of 1544 1436 Kpemdf32.exe Kllnig32.exe PID 1544 wrote to memory of 288 1544 Kllnig32.exe Kedbblgg.exe PID 1544 wrote to memory of 288 1544 Kllnig32.exe Kedbblgg.exe PID 1544 wrote to memory of 288 1544 Kllnig32.exe Kedbblgg.exe PID 1544 wrote to memory of 288 1544 Kllnig32.exe Kedbblgg.exe PID 288 wrote to memory of 1984 288 Kedbblgg.exe Lhekcgdh.exe PID 288 wrote to memory of 1984 288 Kedbblgg.exe Lhekcgdh.exe PID 288 wrote to memory of 1984 288 Kedbblgg.exe Lhekcgdh.exe PID 288 wrote to memory of 1984 288 Kedbblgg.exe Lhekcgdh.exe PID 1984 wrote to memory of 1564 1984 Lhekcgdh.exe Moopoenp.exe PID 1984 wrote to memory of 1564 1984 Lhekcgdh.exe Moopoenp.exe PID 1984 wrote to memory of 1564 1984 Lhekcgdh.exe Moopoenp.exe PID 1984 wrote to memory of 1564 1984 Lhekcgdh.exe Moopoenp.exe PID 1564 wrote to memory of 1960 1564 Moopoenp.exe Middlnnf.exe PID 1564 wrote to memory of 1960 1564 Moopoenp.exe Middlnnf.exe PID 1564 wrote to memory of 1960 1564 Moopoenp.exe Middlnnf.exe PID 1564 wrote to memory of 1960 1564 Moopoenp.exe Middlnnf.exe PID 1960 wrote to memory of 1776 1960 Middlnnf.exe Mlbphimj.exe PID 1960 wrote to memory of 1776 1960 Middlnnf.exe Mlbphimj.exe PID 1960 wrote to memory of 1776 1960 Middlnnf.exe Mlbphimj.exe PID 1960 wrote to memory of 1776 1960 Middlnnf.exe Mlbphimj.exe PID 1776 wrote to memory of 1832 1776 Mlbphimj.exe Mekdaocj.exe PID 1776 wrote to memory of 1832 1776 Mlbphimj.exe Mekdaocj.exe PID 1776 wrote to memory of 1832 1776 Mlbphimj.exe Mekdaocj.exe PID 1776 wrote to memory of 1832 1776 Mlbphimj.exe Mekdaocj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe"C:\Users\Admin\AppData\Local\Temp\dce987a0d6a9d733e42b438cb10de233474ccef00734abceaa463673e9f0a490.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\Hhgbnfbd.exeC:\Windows\system32\Hhgbnfbd.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\Jgnide32.exeC:\Windows\system32\Jgnide32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\Jebimi32.exeC:\Windows\system32\Jebimi32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\Jedfci32.exeC:\Windows\system32\Jedfci32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\Jffbjajj.exeC:\Windows\system32\Jffbjajj.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\Kgeoddal.exeC:\Windows\system32\Kgeoddal.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\Kmddbk32.exeC:\Windows\system32\Kmddbk32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\Kfmhkpda.exeC:\Windows\system32\Kfmhkpda.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\Kpemdf32.exeC:\Windows\system32\Kpemdf32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\Kllnig32.exeC:\Windows\system32\Kllnig32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1544
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kedbblgg.exeC:\Windows\system32\Kedbblgg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\Lhekcgdh.exeC:\Windows\system32\Lhekcgdh.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Moopoenp.exeC:\Windows\system32\Moopoenp.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\Middlnnf.exeC:\Windows\system32\Middlnnf.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\Mlbphimj.exeC:\Windows\system32\Mlbphimj.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\Mekdaocj.exeC:\Windows\system32\Mekdaocj.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1832 -
C:\Windows\SysWOW64\Mkhmjeab.exeC:\Windows\system32\Mkhmjeab.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\Mhlmcjqk.exeC:\Windows\system32\Mhlmcjqk.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\Nnifkqoc.exeC:\Windows\system32\Nnifkqoc.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1932 -
C:\Windows\SysWOW64\Ndbnhkfp.exeC:\Windows\system32\Ndbnhkfp.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1624 -
C:\Windows\SysWOW64\Nkmfee32.exeC:\Windows\system32\Nkmfee32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1352 -
C:\Windows\SysWOW64\Npioml32.exeC:\Windows\system32\Npioml32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:324 -
C:\Windows\SysWOW64\Ngcgjfcq.exeC:\Windows\system32\Ngcgjfcq.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:544 -
C:\Windows\SysWOW64\Ppjgij32.exeC:\Windows\system32\Ppjgij32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Windows\SysWOW64\Pbkqkefk.exeC:\Windows\system32\Pbkqkefk.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:928 -
C:\Windows\SysWOW64\Qpoadied.exeC:\Windows\system32\Qpoadied.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:568 -
C:\Windows\SysWOW64\Qjhbdg32.exeC:\Windows\system32\Qjhbdg32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1560 -
C:\Windows\SysWOW64\Ccaoikej.exeC:\Windows\system32\Ccaoikej.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:908 -
C:\Windows\SysWOW64\Opfjebdj.exeC:\Windows\system32\Opfjebdj.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1036 -
C:\Windows\SysWOW64\Oklnbkdp.exeC:\Windows\system32\Oklnbkdp.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1728 -
C:\Windows\SysWOW64\Enoabm32.exeC:\Windows\system32\Enoabm32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1100 -
C:\Windows\SysWOW64\Fjmhhmcc.exeC:\Windows\system32\Fjmhhmcc.exe22⤵
- Executes dropped EXE
PID:832 -
C:\Windows\SysWOW64\Fcemqc32.exeC:\Windows\system32\Fcemqc32.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1664 -
C:\Windows\SysWOW64\Fjpemmaq.exeC:\Windows\system32\Fjpemmaq.exe24⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\Folmedph.exeC:\Windows\system32\Folmedph.exe25⤵
- Executes dropped EXE
PID:860 -
C:\Windows\SysWOW64\Fgcegapj.exeC:\Windows\system32\Fgcegapj.exe26⤵
- Executes dropped EXE
PID:992 -
C:\Windows\SysWOW64\Fhdanifh.exeC:\Windows\system32\Fhdanifh.exe27⤵
- Executes dropped EXE
PID:1500 -
C:\Windows\SysWOW64\Flbjdh32.exeC:\Windows\system32\Flbjdh32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1704 -
C:\Windows\SysWOW64\Gbapbnid.exeC:\Windows\system32\Gbapbnid.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:764 -
C:\Windows\SysWOW64\Goeplbgm.exeC:\Windows\system32\Goeplbgm.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1452 -
C:\Windows\SysWOW64\Gklqqc32.exeC:\Windows\system32\Gklqqc32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1488 -
C:\Windows\SysWOW64\Gnmjbojb.exeC:\Windows\system32\Gnmjbojb.exe32⤵
- Executes dropped EXE
PID:1948 -
C:\Windows\SysWOW64\Gfhngagn.exeC:\Windows\system32\Gfhngagn.exe33⤵
- Executes dropped EXE
PID:892 -
C:\Windows\SysWOW64\Hghkadoq.exeC:\Windows\system32\Hghkadoq.exe34⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\Hmecikmh.exeC:\Windows\system32\Hmecikmh.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:1340 -
C:\Windows\SysWOW64\Hfodgpaf.exeC:\Windows\system32\Hfodgpaf.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1976 -
C:\Windows\SysWOW64\Hedahm32.exeC:\Windows\system32\Hedahm32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1744 -
C:\Windows\SysWOW64\Ijfclcqp.exeC:\Windows\system32\Ijfclcqp.exe38⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\SysWOW64\Ijhpab32.exeC:\Windows\system32\Ijhpab32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:572 -
C:\Windows\SysWOW64\Ibhnadhb.exeC:\Windows\system32\Ibhnadhb.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:380 -
C:\Windows\SysWOW64\Jbkkfd32.exeC:\Windows\system32\Jbkkfd32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1516 -
C:\Windows\SysWOW64\Jodhadia.exeC:\Windows\system32\Jodhadia.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\Jdcnok32.exeC:\Windows\system32\Jdcnok32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1492 -
C:\Windows\SysWOW64\Kkaogd32.exeC:\Windows\system32\Kkaogd32.exe44⤵
- Executes dropped EXE
PID:268 -
C:\Windows\SysWOW64\Kpnhok32.exeC:\Windows\system32\Kpnhok32.exe45⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\SysWOW64\Kghple32.exeC:\Windows\system32\Kghple32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:872 -
C:\Windows\SysWOW64\Kiglha32.exeC:\Windows\system32\Kiglha32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:552 -
C:\Windows\SysWOW64\Klgeil32.exeC:\Windows\system32\Klgeil32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1436 -
C:\Windows\SysWOW64\Lfbfha32.exeC:\Windows\system32\Lfbfha32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:900 -
C:\Windows\SysWOW64\Mgmefhmh.exeC:\Windows\system32\Mgmefhmh.exe50⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\Mqejon32.exeC:\Windows\system32\Mqejon32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:288 -
C:\Windows\SysWOW64\Mqggdmaf.exeC:\Windows\system32\Mqggdmaf.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\Momdej32.exeC:\Windows\system32\Momdej32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1700 -
C:\Windows\SysWOW64\Miehnomn.exeC:\Windows\system32\Miehnomn.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\Nijaio32.exeC:\Windows\system32\Nijaio32.exe55⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\Njmkff32.exeC:\Windows\system32\Njmkff32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1964 -
C:\Windows\SysWOW64\Nagccqda.exeC:\Windows\system32\Nagccqda.exe57⤵
- Drops file in System32 directory
PID:680 -
C:\Windows\SysWOW64\Npmpdmii.exeC:\Windows\system32\Npmpdmii.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1632 -
C:\Windows\SysWOW64\Njbdafho.exeC:\Windows\system32\Njbdafho.exe59⤵PID:108
-
C:\Windows\SysWOW64\Ojdagefm.exeC:\Windows\system32\Ojdagefm.exe60⤵
- Modifies registry class
PID:656 -
C:\Windows\SysWOW64\Ofnnafjn.exeC:\Windows\system32\Ofnnafjn.exe61⤵
- Modifies registry class
PID:1904 -
C:\Windows\SysWOW64\Jibifgfc.exeC:\Windows\system32\Jibifgfc.exe62⤵
- Modifies registry class
PID:1988 -
C:\Windows\SysWOW64\Fbkmfm32.exeC:\Windows\system32\Fbkmfm32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:856 -
C:\Windows\SysWOW64\Gnbmknbo.exeC:\Windows\system32\Gnbmknbo.exe64⤵
- Drops file in System32 directory
PID:1112 -
C:\Windows\SysWOW64\Gjinpohc.exeC:\Windows\system32\Gjinpohc.exe65⤵PID:1984
-
C:\Windows\SysWOW64\Gbpfalhe.exeC:\Windows\system32\Gbpfalhe.exe66⤵PID:1564
-
C:\Windows\SysWOW64\Gaecbh32.exeC:\Windows\system32\Gaecbh32.exe67⤵PID:1960
-
C:\Windows\SysWOW64\Gmldgi32.exeC:\Windows\system32\Gmldgi32.exe68⤵PID:1776
-
C:\Windows\SysWOW64\Gmnqmi32.exeC:\Windows\system32\Gmnqmi32.exe69⤵
- Drops file in System32 directory
PID:972 -
C:\Windows\SysWOW64\Hchiichl.exeC:\Windows\system32\Hchiichl.exe70⤵PID:316
-
C:\Windows\SysWOW64\Hfgeeo32.exeC:\Windows\system32\Hfgeeo32.exe71⤵
- Drops file in System32 directory
PID:1932 -
C:\Windows\SysWOW64\Higngj32.exeC:\Windows\system32\Higngj32.exe72⤵
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\Hlfjce32.exeC:\Windows\system32\Hlfjce32.exe73⤵
- Modifies registry class
PID:1352 -
C:\Windows\SysWOW64\Hijkmibn.exeC:\Windows\system32\Hijkmibn.exe74⤵
- Modifies registry class
PID:1884 -
C:\Windows\SysWOW64\Heqkbj32.exeC:\Windows\system32\Heqkbj32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1640 -
C:\Windows\SysWOW64\Hlkcodoo.exeC:\Windows\system32\Hlkcodoo.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:928 -
C:\Windows\SysWOW64\Hbdlko32.exeC:\Windows\system32\Hbdlko32.exe77⤵PID:272
-
C:\Windows\SysWOW64\Ikpqpadg.exeC:\Windows\system32\Ikpqpadg.exe78⤵
- Drops file in System32 directory
PID:844 -
C:\Windows\SysWOW64\Ikbmeqbd.exeC:\Windows\system32\Ikbmeqbd.exe79⤵
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\Idjanf32.exeC:\Windows\system32\Idjanf32.exe80⤵PID:540
-
C:\Windows\SysWOW64\Iginja32.exeC:\Windows\system32\Iginja32.exe81⤵PID:2044
-
C:\Windows\SysWOW64\Iaobgjgn.exeC:\Windows\system32\Iaobgjgn.exe82⤵
- Drops file in System32 directory
- Modifies registry class
PID:1560 -
C:\Windows\SysWOW64\Ikggpp32.exeC:\Windows\system32\Ikggpp32.exe83⤵
- Drops file in System32 directory
PID:908 -
C:\Windows\SysWOW64\Idokiedo.exeC:\Windows\system32\Idokiedo.exe84⤵
- Drops file in System32 directory
PID:1036 -
C:\Windows\SysWOW64\Iilcal32.exeC:\Windows\system32\Iilcal32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1164 -
C:\Windows\SysWOW64\Jecdfmhk.exeC:\Windows\system32\Jecdfmhk.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:812 -
C:\Windows\SysWOW64\Jgbapp32.exeC:\Windows\system32\Jgbapp32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1068 -
C:\Windows\SysWOW64\Joneebmi.exeC:\Windows\system32\Joneebmi.exe88⤵PID:1692
-
C:\Windows\SysWOW64\Jhhgch32.exeC:\Windows\system32\Jhhgch32.exe89⤵
- Modifies registry class
PID:1084 -
C:\Windows\SysWOW64\Jdoghi32.exeC:\Windows\system32\Jdoghi32.exe90⤵PID:904
-
C:\Windows\SysWOW64\Jgmcdd32.exeC:\Windows\system32\Jgmcdd32.exe91⤵
- Modifies registry class
PID:604 -
C:\Windows\SysWOW64\Khmpngma.exeC:\Windows\system32\Khmpngma.exe92⤵PID:1476
-
C:\Windows\SysWOW64\Kqhebi32.exeC:\Windows\system32\Kqhebi32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1732 -
C:\Windows\SysWOW64\Kgbmocbi.exeC:\Windows\system32\Kgbmocbi.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1628 -
C:\Windows\SysWOW64\Knleln32.exeC:\Windows\system32\Knleln32.exe95⤵PID:1156
-
C:\Windows\SysWOW64\Kcindd32.exeC:\Windows\system32\Kcindd32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2028 -
C:\Windows\SysWOW64\Kjebfn32.exeC:\Windows\system32\Kjebfn32.exe97⤵PID:1948
-
C:\Windows\SysWOW64\Lmflhi32.exeC:\Windows\system32\Lmflhi32.exe98⤵
- Modifies registry class
PID:1668 -
C:\Windows\SysWOW64\Leapmlhc.exeC:\Windows\system32\Leapmlhc.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\Lbeafpfm.exeC:\Windows\system32\Lbeafpfm.exe100⤵PID:1528
-
C:\Windows\SysWOW64\Lnlaka32.exeC:\Windows\system32\Lnlaka32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1144 -
C:\Windows\SysWOW64\Liafhjlg.exeC:\Windows\system32\Liafhjlg.exe102⤵
- Modifies registry class
PID:240 -
C:\Windows\SysWOW64\Lckgighf.exeC:\Windows\system32\Lckgighf.exe103⤵PID:1484
-
C:\Windows\SysWOW64\Maogblgp.exeC:\Windows\system32\Maogblgp.exe104⤵PID:1828
-
C:\Windows\SysWOW64\Mcmcng32.exeC:\Windows\system32\Mcmcng32.exe105⤵
- Modifies registry class
PID:1320 -
C:\Windows\SysWOW64\Maadhk32.exeC:\Windows\system32\Maadhk32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Mjjhqaln.exeC:\Windows\system32\Mjjhqaln.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1176 -
C:\Windows\SysWOW64\Mimiln32.exeC:\Windows\system32\Mimiln32.exe108⤵PID:1652
-
C:\Windows\SysWOW64\Mfqiebaa.exeC:\Windows\system32\Mfqiebaa.exe109⤵
- Drops file in System32 directory
PID:1736 -
C:\Windows\SysWOW64\Mjlefq32.exeC:\Windows\system32\Mjlefq32.exe110⤵
- Modifies registry class
PID:656 -
C:\Windows\SysWOW64\Mmjabl32.exeC:\Windows\system32\Mmjabl32.exe111⤵
- Drops file in System32 directory
- Modifies registry class
PID:824 -
C:\Windows\SysWOW64\Mcdjofpk.exeC:\Windows\system32\Mcdjofpk.exe112⤵PID:1124
-
C:\Windows\SysWOW64\Micomm32.exeC:\Windows\system32\Micomm32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:568 -
C:\Windows\SysWOW64\Nldhoh32.exeC:\Windows\system32\Nldhoh32.exe114⤵PID:1064
-
C:\Windows\SysWOW64\Npijmk32.exeC:\Windows\system32\Npijmk32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:896 -
C:\Windows\SysWOW64\Opbmci32.exeC:\Windows\system32\Opbmci32.exe116⤵PID:768
-
C:\Windows\SysWOW64\Occeedod.exeC:\Windows\system32\Occeedod.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:2148 -
C:\Windows\SysWOW64\Jadpdk32.exeC:\Windows\system32\Jadpdk32.exe118⤵
- Modifies registry class
PID:2164 -
C:\Windows\SysWOW64\Kjjdfdnp.exeC:\Windows\system32\Kjjdfdnp.exe119⤵PID:2172
-
C:\Windows\SysWOW64\Kfenfdoo.exeC:\Windows\system32\Kfenfdoo.exe120⤵PID:2180
-
C:\Windows\SysWOW64\Kblokeec.exeC:\Windows\system32\Kblokeec.exe121⤵PID:2188
-
C:\Windows\SysWOW64\Kfhkld32.exeC:\Windows\system32\Kfhkld32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2196
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-