Analysis
-
max time kernel
146s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exe
Resource
win10v2004-20220901-en
General
-
Target
9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exe
-
Size
50KB
-
MD5
b1c5e4d0db32fda52d42d3af3dc87440
-
SHA1
70d26345090880f94432d1948a7f2c5fff30068d
-
SHA256
9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7
-
SHA512
848ff40befa9a0619ca0a77a3f315bbb38dc0045ce1bd34463b03e3501e50b538e64cf8690cf4fb7ff560d14a8d9d6ab904ca61bcd9b665f2c36b3e832005114
-
SSDEEP
768:8BDoXYZFTiz0LhSNtYewXrP299FbNyCYu4v9Kmzvr6WZC88R/1H5V:YDoXYZRMtYB299FhyCkvf4b
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Gkfgml32.exeNplijg32.exeLfnpao32.exeQaknapag.exeLnabqf32.exeApgbql32.exeEhlofoca.exeBkaaji32.exeNgngdp32.exeNbegiaio.exeAbhiibgm.exeHkndja32.exeKjnmfo32.exeKoiecaqb.exeFalnad32.exeKjinonhk.exeAehbkndn.exeCoolkl32.exeAfdldg32.exeInljjk32.exeAkabdi32.exeBhokbnqf.exeEmccgbfk.exeKmjfqi32.exeAamfko32.exeNkpmihmd.exePlilnj32.exeIifpgi32.exeMbccfphn.exeCabnkngn.exeCplehihq.exeOkooihne.exeDoacdj32.exeDhldcp32.exeMihjelgc.exeAldobnnf.exePdphcaoq.exeNopgec32.exeMjabemaq.exeQmmelbka.exeLbcdqphp.exeLcqkoj32.exeFjlofkce.exeLmhiaifl.exePbfgpf32.exePfdpedqg.exeAabjaaip.exeEdeamp32.exeKmcalo32.exeImgpbkkp.exeOaajkm32.exeCmlbmdqd.exeNeoipm32.exeCjmpjcll.exeFfbidf32.exeEmepmbdh.exeJoifna32.exeKfbkiokl.exeKhmpngma.exeBdlhdp32.exeFgamco32.exeQgioneod.exeAlkdgiac.exePpnbnjff.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkfgml32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nplijg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfnpao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qaknapag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnabqf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apgbql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehlofoca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkaaji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngngdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbegiaio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abhiibgm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkndja32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjnmfo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koiecaqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Falnad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjinonhk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aehbkndn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Coolkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afdldg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inljjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akabdi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhokbnqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emccgbfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmjfqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aamfko32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkpmihmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plilnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iifpgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbccfphn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cabnkngn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cplehihq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okooihne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doacdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhldcp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mihjelgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aldobnnf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdphcaoq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nopgec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjabemaq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmmelbka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbcdqphp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcqkoj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjlofkce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmhiaifl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbfgpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfdpedqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aabjaaip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edeamp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmcalo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Imgpbkkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oaajkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmlbmdqd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neoipm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjmpjcll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffbidf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emepmbdh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joifna32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfbkiokl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khmpngma.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdlhdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgamco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qgioneod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Alkdgiac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppnbnjff.exe -
Executes dropped EXE 64 IoCs
Processes:
Ildghc32.exeJaclej32.exeJlipcb32.exeJafhkiom.exeJhpahc32.exeJdfamdln.exeJicjekje.exeJdinbd32.exeKiegkk32.exeKcnkcqoc.exeKpblme32.exeKlilbfca.exeKeaakk32.exeKoiecaqb.exeKkpfhbff.exeLkbbnadc.exeLhfcgf32.exeLbohpkjn.exeLdmdlgia.exeLmhiaifl.exeLgnmnb32.exeLnheklmo.exeLqfagglc.exeLfcjonkj.exeLiafkjjn.exeMcgjib32.exeMjabemaq.exeMcignb32.exeMifpfi32.exeMbaqen32.exeMikiahac.exeMjleiq32.exeMbcmjn32.exeNgpfbefk.exeNnjnoo32.exeNahjkj32.exeNgbbhddh.exeNnlkeo32.exeNakgaj32.exeNgeond32.exeNiflelhd.exeNclpbehj.exeNjehpo32.exeNlgdggee.exeNeoipm32.exeOfoejp32.exeOojjnb32.exeOjqkcc32.exeOefoql32.exeOmaden32.exeOdklahje.exeOaomkm32.exePaaiql32.exePmhjem32.exePiokknbe.exePgckdbao.exePonphe32.exePoqmnd32.exeQlemgi32.exeQemapn32.exeApgbql32.exeAklgne32.exeAkoccdlc.exeAnmpppkg.exepid process 240 Ildghc32.exe 940 Jaclej32.exe 1340 Jlipcb32.exe 1232 Jafhkiom.exe 1704 Jhpahc32.exe 1920 Jdfamdln.exe 1756 Jicjekje.exe 468 Jdinbd32.exe 1072 Kiegkk32.exe 272 Kcnkcqoc.exe 820 Kpblme32.exe 1780 Klilbfca.exe 828 Keaakk32.exe 108 Koiecaqb.exe 568 Kkpfhbff.exe 1120 Lkbbnadc.exe 1356 Lhfcgf32.exe 1492 Lbohpkjn.exe 540 Ldmdlgia.exe 952 Lmhiaifl.exe 836 Lgnmnb32.exe 948 Lnheklmo.exe 1724 Lqfagglc.exe 1696 Lfcjonkj.exe 1992 Liafkjjn.exe 1360 Mcgjib32.exe 608 Mjabemaq.exe 1304 Mcignb32.exe 1716 Mifpfi32.exe 2036 Mbaqen32.exe 1912 Mikiahac.exe 1172 Mjleiq32.exe 1012 Mbcmjn32.exe 268 Ngpfbefk.exe 652 Nnjnoo32.exe 1504 Nahjkj32.exe 1564 Ngbbhddh.exe 1412 Nnlkeo32.exe 1460 Nakgaj32.exe 1644 Ngeond32.exe 296 Niflelhd.exe 1168 Nclpbehj.exe 556 Njehpo32.exe 1744 Nlgdggee.exe 1956 Neoipm32.exe 1636 Ofoejp32.exe 1640 Oojjnb32.exe 1676 Ojqkcc32.exe 1028 Oefoql32.exe 1616 Omaden32.exe 1584 Odklahje.exe 996 Oaomkm32.exe 520 Paaiql32.exe 1864 Pmhjem32.exe 1892 Piokknbe.exe 920 Pgckdbao.exe 1480 Ponphe32.exe 1612 Poqmnd32.exe 1988 Qlemgi32.exe 2028 Qemapn32.exe 1084 Apgbql32.exe 1176 Aklgne32.exe 1180 Akoccdlc.exe 2012 Anmpppkg.exe -
Loads dropped DLL 64 IoCs
Processes:
9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exeIldghc32.exeJaclej32.exeJlipcb32.exeJafhkiom.exeJhpahc32.exeJdfamdln.exeJicjekje.exeJdinbd32.exeKiegkk32.exeKcnkcqoc.exeKpblme32.exeKlilbfca.exeKeaakk32.exeKoiecaqb.exeKkpfhbff.exeLkbbnadc.exeLhfcgf32.exeLbohpkjn.exeLdmdlgia.exeLmhiaifl.exeLgnmnb32.exeLnheklmo.exeLqfagglc.exeLfcjonkj.exeLiafkjjn.exeMcgjib32.exeMjabemaq.exeMcignb32.exeMifpfi32.exeMbaqen32.exeMikiahac.exepid process 1900 9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exe 1900 9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exe 240 Ildghc32.exe 240 Ildghc32.exe 940 Jaclej32.exe 940 Jaclej32.exe 1340 Jlipcb32.exe 1340 Jlipcb32.exe 1232 Jafhkiom.exe 1232 Jafhkiom.exe 1704 Jhpahc32.exe 1704 Jhpahc32.exe 1920 Jdfamdln.exe 1920 Jdfamdln.exe 1756 Jicjekje.exe 1756 Jicjekje.exe 468 Jdinbd32.exe 468 Jdinbd32.exe 1072 Kiegkk32.exe 1072 Kiegkk32.exe 272 Kcnkcqoc.exe 272 Kcnkcqoc.exe 820 Kpblme32.exe 820 Kpblme32.exe 1780 Klilbfca.exe 1780 Klilbfca.exe 828 Keaakk32.exe 828 Keaakk32.exe 108 Koiecaqb.exe 108 Koiecaqb.exe 568 Kkpfhbff.exe 568 Kkpfhbff.exe 1120 Lkbbnadc.exe 1120 Lkbbnadc.exe 1356 Lhfcgf32.exe 1356 Lhfcgf32.exe 1492 Lbohpkjn.exe 1492 Lbohpkjn.exe 540 Ldmdlgia.exe 540 Ldmdlgia.exe 952 Lmhiaifl.exe 952 Lmhiaifl.exe 836 Lgnmnb32.exe 836 Lgnmnb32.exe 948 Lnheklmo.exe 948 Lnheklmo.exe 1724 Lqfagglc.exe 1724 Lqfagglc.exe 1696 Lfcjonkj.exe 1696 Lfcjonkj.exe 1992 Liafkjjn.exe 1992 Liafkjjn.exe 1360 Mcgjib32.exe 1360 Mcgjib32.exe 608 Mjabemaq.exe 608 Mjabemaq.exe 1304 Mcignb32.exe 1304 Mcignb32.exe 1716 Mifpfi32.exe 1716 Mifpfi32.exe 2036 Mbaqen32.exe 2036 Mbaqen32.exe 1912 Mikiahac.exe 1912 Mikiahac.exe -
Drops file in System32 directory 64 IoCs
Processes:
Bdgdkmeo.exeBkmhojpi.exeLkgndfbc.exeNafjbncc.exeBjfiidad.exeFkcnhhkk.exeAaipbp32.exeEbbheibp.exeLnheklmo.exePipolpam.exeBbacjgbn.exeBhjqjnfb.exeDdcjcb32.exeKcindd32.exeLqfagglc.exeCepkefdn.exeDoacdj32.exeEfnjaijc.exeNnlkeo32.exeMeakqjhi.exeFakjpc32.exeIcpmdmkg.exeKqcflhog.exeJlibnhck.exeMdgmol32.exeOgaefiif.exeHdkeob32.exeNnjnoo32.exeEiggfc32.exeFnnbei32.exeBhcjio32.exeFfbokl32.exeKiegkk32.exeMjabemaq.exePepdap32.exePhnpnkol.exeAakjqcdc.exeEgfljqji.exeKcnkcqoc.exeEofgch32.exeLicdkj32.exeLlmhhjaa.exeOfcapd32.exeChjmia32.exeAnmpppkg.exePpjgij32.exeMmcefk32.exePdfigj32.exeMmpahahe.exeHbplii32.exeKihagf32.exeNgngdp32.exeAjjhpp32.exeAlkdgiac.exeHkndja32.exeDpnami32.exeImpcjfkb.exeAmbnla32.exeAimiga32.exeLfadae32.exePocpkj32.exeNadblogl.exeKmcalo32.exeBaphmd32.exedescription ioc process File created C:\Windows\SysWOW64\Bibpll32.exe Bdgdkmeo.exe File created C:\Windows\SysWOW64\Bbdppgql.exe Bkmhojpi.exe File opened for modification C:\Windows\SysWOW64\Moegjd32.exe Lkgndfbc.exe File created C:\Windows\SysWOW64\Nddfnicg.exe Nafjbncc.exe File opened for modification C:\Windows\SysWOW64\Bmdfeoqg.exe Bjfiidad.exe File created C:\Windows\SysWOW64\Fppgqpib.exe Fkcnhhkk.exe File opened for modification C:\Windows\SysWOW64\Adhmnl32.exe Aaipbp32.exe File created C:\Windows\SysWOW64\Lmijhn32.dll Ebbheibp.exe File created C:\Windows\SysWOW64\Lqfagglc.exe Lnheklmo.exe File created C:\Windows\SysWOW64\Bnfcfbpi.dll Pipolpam.exe File opened for modification C:\Windows\SysWOW64\Bepofcab.exe Bbacjgbn.exe File created C:\Windows\SysWOW64\Bilmaflq.exe Bhjqjnfb.exe File opened for modification C:\Windows\SysWOW64\Dgafpn32.exe Ddcjcb32.exe File opened for modification C:\Windows\SysWOW64\Kgdjecpf.exe Kcindd32.exe File opened for modification C:\Windows\SysWOW64\Lfcjonkj.exe Lqfagglc.exe File created C:\Windows\SysWOW64\Fleffd32.dll Cepkefdn.exe File opened for modification C:\Windows\SysWOW64\Dndcpgin.exe Doacdj32.exe File created C:\Windows\SysWOW64\Dcfdoi32.dll Efnjaijc.exe File created C:\Windows\SysWOW64\Nakgaj32.exe Nnlkeo32.exe File created C:\Windows\SysWOW64\Mimgah32.exe Meakqjhi.exe File opened for modification C:\Windows\SysWOW64\Fheblmkg.exe Fakjpc32.exe File created C:\Windows\SysWOW64\Icbijm32.exe Icpmdmkg.exe File created C:\Windows\SysWOW64\Lcmdkjfn.dll Kqcflhog.exe File opened for modification C:\Windows\SysWOW64\Jmhohjjn.exe Jlibnhck.exe File created C:\Windows\SysWOW64\Pjphcb32.dll Mdgmol32.exe File created C:\Windows\SysWOW64\Pchfkj32.exe Ogaefiif.exe File created C:\Windows\SysWOW64\Hfiakn32.exe Hdkeob32.exe File created C:\Windows\SysWOW64\Nahjkj32.exe Nnjnoo32.exe File created C:\Windows\SysWOW64\Alignmjh.dll Eiggfc32.exe File opened for modification C:\Windows\SysWOW64\Falnad32.exe Fnnbei32.exe File created C:\Windows\SysWOW64\Mofhfa32.dll Bhcjio32.exe File opened for modification C:\Windows\SysWOW64\Fiqlhg32.exe Ffbokl32.exe File created C:\Windows\SysWOW64\Kcnkcqoc.exe Kiegkk32.exe File created C:\Windows\SysWOW64\Ealdnc32.dll Mjabemaq.exe File opened for modification C:\Windows\SysWOW64\Phnpnkol.exe Pepdap32.exe File opened for modification C:\Windows\SysWOW64\Plilnj32.exe Phnpnkol.exe File opened for modification C:\Windows\SysWOW64\Bhebmn32.exe Aakjqcdc.exe File created C:\Windows\SysWOW64\Aockbq32.dll Egfljqji.exe File created C:\Windows\SysWOW64\Incnif32.dll Kcnkcqoc.exe File created C:\Windows\SysWOW64\Nchqho32.dll Eofgch32.exe File opened for modification C:\Windows\SysWOW64\Lpmlhdpj.exe Licdkj32.exe File created C:\Windows\SysWOW64\Lpkpni32.exe Llmhhjaa.exe File created C:\Windows\SysWOW64\Pldcbh32.dll Ofcapd32.exe File created C:\Windows\SysWOW64\Lqdgie32.dll Chjmia32.exe File opened for modification C:\Windows\SysWOW64\Bhkjkm32.exe Anmpppkg.exe File created C:\Windows\SysWOW64\Pfdpedqg.exe Ppjgij32.exe File opened for modification C:\Windows\SysWOW64\Mdmnbefi.exe Mmcefk32.exe File created C:\Windows\SysWOW64\Ndjplpnh.dll Pdfigj32.exe File created C:\Windows\SysWOW64\Hmmepc32.dll Mmpahahe.exe File created C:\Windows\SysWOW64\Henhed32.exe Hbplii32.exe File opened for modification C:\Windows\SysWOW64\Kjinonhk.exe Kihagf32.exe File created C:\Windows\SysWOW64\Nilcpl32.exe Ngngdp32.exe File opened for modification C:\Windows\SysWOW64\Aimhkmbp.exe Ajjhpp32.exe File created C:\Windows\SysWOW64\Pcgddklg.dll Alkdgiac.exe File created C:\Windows\SysWOW64\Hoipkpob.exe Hkndja32.exe File opened for modification C:\Windows\SysWOW64\Dbmnid32.exe Dpnami32.exe File created C:\Windows\SysWOW64\Icjkfpcp.exe Impcjfkb.exe File opened for modification C:\Windows\SysWOW64\Bodjdilh.exe Ambnla32.exe File created C:\Windows\SysWOW64\Allecmhn.exe Aimiga32.exe File created C:\Windows\SysWOW64\Abjghn32.dll Lfadae32.exe File opened for modification C:\Windows\SysWOW64\Pbblgf32.exe Pocpkj32.exe File created C:\Windows\SysWOW64\Lehjpp32.dll Nadblogl.exe File created C:\Windows\SysWOW64\Kekiml32.exe Kmcalo32.exe File created C:\Windows\SysWOW64\Bhjqjnfb.exe Baphmd32.exe -
Modifies registry class 64 IoCs
Processes:
Ojiifqll.exeQghicldb.exeQclkih32.exeLcgapioi.exeBhjqjnfb.exeBdgdkmeo.exeGdlopacg.exeMdpabk32.exeGfbljoke.exeKmcobj32.exeImgpbkkp.exeGllaap32.exeApomcm32.exeOnfdgdeh.exeAphfem32.exeCeggbgnp.exeNopgec32.exeGkfgml32.exeNjofpadg.exeAjhkjqng.exePjbngdfg.exeOaomkm32.exeKelqefjk.exePdfigj32.exeBilmaflq.exeGgkbdchp.exeKihcbkdb.exeNlppbmah.exeFgamco32.exeMmolklcb.exeQeimgqeo.exeKqcflhog.exeOkfkfi32.exeNldhoh32.exeKeaakk32.exeNgpfbefk.exeAnmpppkg.exeNcgdoa32.exeAimiga32.exeMcgjib32.exeHbplii32.exeNchkig32.exeEdhpnekf.exeNkidpd32.exeFakjpc32.exeIilqkcjf.exeJajhbj32.exeJcpicq32.exeNinhma32.exePhgkiqko.exeHpoindnp.exeLnheklmo.exeOkcidg32.exeLihmfidh.exeApimmg32.exeAbbhfibh.exeFnmaid32.exeJkddonpg.exeLfjelodl.exeAldobnnf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlfbhdng.dll" Ojiifqll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Keenjg32.dll" Qghicldb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qclkih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcgapioi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmhbmclh.dll" Bhjqjnfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdgdkmeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gdlopacg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmqefpof.dll" Mdpabk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gfbljoke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmcobj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Imgpbkkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gllaap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihnlmp32.dll" Apomcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mojcha32.dll" Onfdgdeh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aphfem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlijngoo.dll" Ceggbgnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nopgec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkfgml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fellcgcc.dll" Njofpadg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajhkjqng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjbngdfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qinlfboo.dll" Oaomkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kelqefjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndjplpnh.dll" Pdfigj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bilmaflq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ggkbdchp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kihcbkdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nlppbmah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fgamco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmolklcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Logdfcjj.dll" Qeimgqeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kqcflhog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iaidnanq.dll" Okfkfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kipbcd32.dll" Nldhoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Keaakk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngpfbefk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Anmpppkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncgdoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aimiga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npbbhf32.dll" Nopgec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcgjib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckdepghl.dll" Hbplii32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nchkig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Edhpnekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkidpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fakjpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohighb32.dll" Iilqkcjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jajhbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Geaopq32.dll" Jcpicq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lejbon32.dll" Ninhma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phgkiqko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpoindnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnheklmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okcidg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgamco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lihmfidh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apimmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kfiljm32.dll" Abbhfibh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcgjib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fnmaid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jncjoffd.dll" Jkddonpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdfigj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekcplfib.dll" Lfjelodl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hddfkkbg.dll" Aldobnnf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exeIldghc32.exeJaclej32.exeJlipcb32.exeJafhkiom.exeJhpahc32.exeJdfamdln.exeJicjekje.exeJdinbd32.exeKiegkk32.exeKcnkcqoc.exeKpblme32.exeKlilbfca.exeKeaakk32.exeKoiecaqb.exeKkpfhbff.exedescription pid process target process PID 1900 wrote to memory of 240 1900 9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exe Ildghc32.exe PID 1900 wrote to memory of 240 1900 9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exe Ildghc32.exe PID 1900 wrote to memory of 240 1900 9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exe Ildghc32.exe PID 1900 wrote to memory of 240 1900 9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exe Ildghc32.exe PID 240 wrote to memory of 940 240 Ildghc32.exe Jaclej32.exe PID 240 wrote to memory of 940 240 Ildghc32.exe Jaclej32.exe PID 240 wrote to memory of 940 240 Ildghc32.exe Jaclej32.exe PID 240 wrote to memory of 940 240 Ildghc32.exe Jaclej32.exe PID 940 wrote to memory of 1340 940 Jaclej32.exe Jlipcb32.exe PID 940 wrote to memory of 1340 940 Jaclej32.exe Jlipcb32.exe PID 940 wrote to memory of 1340 940 Jaclej32.exe Jlipcb32.exe PID 940 wrote to memory of 1340 940 Jaclej32.exe Jlipcb32.exe PID 1340 wrote to memory of 1232 1340 Jlipcb32.exe Jafhkiom.exe PID 1340 wrote to memory of 1232 1340 Jlipcb32.exe Jafhkiom.exe PID 1340 wrote to memory of 1232 1340 Jlipcb32.exe Jafhkiom.exe PID 1340 wrote to memory of 1232 1340 Jlipcb32.exe Jafhkiom.exe PID 1232 wrote to memory of 1704 1232 Jafhkiom.exe Jhpahc32.exe PID 1232 wrote to memory of 1704 1232 Jafhkiom.exe Jhpahc32.exe PID 1232 wrote to memory of 1704 1232 Jafhkiom.exe Jhpahc32.exe PID 1232 wrote to memory of 1704 1232 Jafhkiom.exe Jhpahc32.exe PID 1704 wrote to memory of 1920 1704 Jhpahc32.exe Jdfamdln.exe PID 1704 wrote to memory of 1920 1704 Jhpahc32.exe Jdfamdln.exe PID 1704 wrote to memory of 1920 1704 Jhpahc32.exe Jdfamdln.exe PID 1704 wrote to memory of 1920 1704 Jhpahc32.exe Jdfamdln.exe PID 1920 wrote to memory of 1756 1920 Jdfamdln.exe Jicjekje.exe PID 1920 wrote to memory of 1756 1920 Jdfamdln.exe Jicjekje.exe PID 1920 wrote to memory of 1756 1920 Jdfamdln.exe Jicjekje.exe PID 1920 wrote to memory of 1756 1920 Jdfamdln.exe Jicjekje.exe PID 1756 wrote to memory of 468 1756 Jicjekje.exe Jdinbd32.exe PID 1756 wrote to memory of 468 1756 Jicjekje.exe Jdinbd32.exe PID 1756 wrote to memory of 468 1756 Jicjekje.exe Jdinbd32.exe PID 1756 wrote to memory of 468 1756 Jicjekje.exe Jdinbd32.exe PID 468 wrote to memory of 1072 468 Jdinbd32.exe Kiegkk32.exe PID 468 wrote to memory of 1072 468 Jdinbd32.exe Kiegkk32.exe PID 468 wrote to memory of 1072 468 Jdinbd32.exe Kiegkk32.exe PID 468 wrote to memory of 1072 468 Jdinbd32.exe Kiegkk32.exe PID 1072 wrote to memory of 272 1072 Kiegkk32.exe Kcnkcqoc.exe PID 1072 wrote to memory of 272 1072 Kiegkk32.exe Kcnkcqoc.exe PID 1072 wrote to memory of 272 1072 Kiegkk32.exe Kcnkcqoc.exe PID 1072 wrote to memory of 272 1072 Kiegkk32.exe Kcnkcqoc.exe PID 272 wrote to memory of 820 272 Kcnkcqoc.exe Kpblme32.exe PID 272 wrote to memory of 820 272 Kcnkcqoc.exe Kpblme32.exe PID 272 wrote to memory of 820 272 Kcnkcqoc.exe Kpblme32.exe PID 272 wrote to memory of 820 272 Kcnkcqoc.exe Kpblme32.exe PID 820 wrote to memory of 1780 820 Kpblme32.exe Klilbfca.exe PID 820 wrote to memory of 1780 820 Kpblme32.exe Klilbfca.exe PID 820 wrote to memory of 1780 820 Kpblme32.exe Klilbfca.exe PID 820 wrote to memory of 1780 820 Kpblme32.exe Klilbfca.exe PID 1780 wrote to memory of 828 1780 Klilbfca.exe Keaakk32.exe PID 1780 wrote to memory of 828 1780 Klilbfca.exe Keaakk32.exe PID 1780 wrote to memory of 828 1780 Klilbfca.exe Keaakk32.exe PID 1780 wrote to memory of 828 1780 Klilbfca.exe Keaakk32.exe PID 828 wrote to memory of 108 828 Keaakk32.exe Koiecaqb.exe PID 828 wrote to memory of 108 828 Keaakk32.exe Koiecaqb.exe PID 828 wrote to memory of 108 828 Keaakk32.exe Koiecaqb.exe PID 828 wrote to memory of 108 828 Keaakk32.exe Koiecaqb.exe PID 108 wrote to memory of 568 108 Koiecaqb.exe Kkpfhbff.exe PID 108 wrote to memory of 568 108 Koiecaqb.exe Kkpfhbff.exe PID 108 wrote to memory of 568 108 Koiecaqb.exe Kkpfhbff.exe PID 108 wrote to memory of 568 108 Koiecaqb.exe Kkpfhbff.exe PID 568 wrote to memory of 1120 568 Kkpfhbff.exe Lkbbnadc.exe PID 568 wrote to memory of 1120 568 Kkpfhbff.exe Lkbbnadc.exe PID 568 wrote to memory of 1120 568 Kkpfhbff.exe Lkbbnadc.exe PID 568 wrote to memory of 1120 568 Kkpfhbff.exe Lkbbnadc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exe"C:\Users\Admin\AppData\Local\Temp\9c47a2941094306423eecfd9b356e80f5911ad93324086f9ad60c8133b8738b7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\Ildghc32.exeC:\Windows\system32\Ildghc32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\Jaclej32.exeC:\Windows\system32\Jaclej32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\Jlipcb32.exeC:\Windows\system32\Jlipcb32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\Jafhkiom.exeC:\Windows\system32\Jafhkiom.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\Jhpahc32.exeC:\Windows\system32\Jhpahc32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\Jdfamdln.exeC:\Windows\system32\Jdfamdln.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\Jicjekje.exeC:\Windows\system32\Jicjekje.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\Jdinbd32.exeC:\Windows\system32\Jdinbd32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\Kiegkk32.exeC:\Windows\system32\Kiegkk32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\Kcnkcqoc.exeC:\Windows\system32\Kcnkcqoc.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\SysWOW64\Kpblme32.exeC:\Windows\system32\Kpblme32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\Klilbfca.exeC:\Windows\system32\Klilbfca.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Keaakk32.exeC:\Windows\system32\Keaakk32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\Koiecaqb.exeC:\Windows\system32\Koiecaqb.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\Kkpfhbff.exeC:\Windows\system32\Kkpfhbff.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\Lkbbnadc.exeC:\Windows\system32\Lkbbnadc.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1120 -
C:\Windows\SysWOW64\Lhfcgf32.exeC:\Windows\system32\Lhfcgf32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1356 -
C:\Windows\SysWOW64\Lbohpkjn.exeC:\Windows\system32\Lbohpkjn.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1492 -
C:\Windows\SysWOW64\Ldmdlgia.exeC:\Windows\system32\Ldmdlgia.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:540 -
C:\Windows\SysWOW64\Lmhiaifl.exeC:\Windows\system32\Lmhiaifl.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:952 -
C:\Windows\SysWOW64\Lgnmnb32.exeC:\Windows\system32\Lgnmnb32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:836 -
C:\Windows\SysWOW64\Lnheklmo.exeC:\Windows\system32\Lnheklmo.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:948 -
C:\Windows\SysWOW64\Lqfagglc.exeC:\Windows\system32\Lqfagglc.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1724 -
C:\Windows\SysWOW64\Lfcjonkj.exeC:\Windows\system32\Lfcjonkj.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1696 -
C:\Windows\SysWOW64\Liafkjjn.exeC:\Windows\system32\Liafkjjn.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1992 -
C:\Windows\SysWOW64\Mcgjib32.exeC:\Windows\system32\Mcgjib32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1360 -
C:\Windows\SysWOW64\Mjabemaq.exeC:\Windows\system32\Mjabemaq.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:608 -
C:\Windows\SysWOW64\Mcignb32.exeC:\Windows\system32\Mcignb32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1304 -
C:\Windows\SysWOW64\Mifpfi32.exeC:\Windows\system32\Mifpfi32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716 -
C:\Windows\SysWOW64\Mbaqen32.exeC:\Windows\system32\Mbaqen32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2036 -
C:\Windows\SysWOW64\Mikiahac.exeC:\Windows\system32\Mikiahac.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1912 -
C:\Windows\SysWOW64\Mjleiq32.exeC:\Windows\system32\Mjleiq32.exe20⤵
- Executes dropped EXE
PID:1172 -
C:\Windows\SysWOW64\Mbcmjn32.exeC:\Windows\system32\Mbcmjn32.exe21⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\Ngpfbefk.exeC:\Windows\system32\Ngpfbefk.exe22⤵
- Executes dropped EXE
- Modifies registry class
PID:268 -
C:\Windows\SysWOW64\Nnjnoo32.exeC:\Windows\system32\Nnjnoo32.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:652 -
C:\Windows\SysWOW64\Nahjkj32.exeC:\Windows\system32\Nahjkj32.exe24⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\Ngbbhddh.exeC:\Windows\system32\Ngbbhddh.exe25⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\Nnlkeo32.exeC:\Windows\system32\Nnlkeo32.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1412 -
C:\Windows\SysWOW64\Nakgaj32.exeC:\Windows\system32\Nakgaj32.exe27⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\Ngeond32.exeC:\Windows\system32\Ngeond32.exe28⤵
- Executes dropped EXE
PID:1644 -
C:\Windows\SysWOW64\Niflelhd.exeC:\Windows\system32\Niflelhd.exe29⤵
- Executes dropped EXE
PID:296 -
C:\Windows\SysWOW64\Nclpbehj.exeC:\Windows\system32\Nclpbehj.exe30⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\SysWOW64\Njehpo32.exeC:\Windows\system32\Njehpo32.exe31⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\Nlgdggee.exeC:\Windows\system32\Nlgdggee.exe32⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\Neoipm32.exeC:\Windows\system32\Neoipm32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\Ofoejp32.exeC:\Windows\system32\Ofoejp32.exe34⤵
- Executes dropped EXE
PID:1636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Oojjnb32.exeC:\Windows\system32\Oojjnb32.exe1⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Ojqkcc32.exeC:\Windows\system32\Ojqkcc32.exe2⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\SysWOW64\Oefoql32.exeC:\Windows\system32\Oefoql32.exe3⤵
- Executes dropped EXE
PID:1028 -
C:\Windows\SysWOW64\Omaden32.exeC:\Windows\system32\Omaden32.exe4⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Odklahje.exeC:\Windows\system32\Odklahje.exe5⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\Oaomkm32.exeC:\Windows\system32\Oaomkm32.exe6⤵
- Executes dropped EXE
- Modifies registry class
PID:996 -
C:\Windows\SysWOW64\Oglecc32.exeC:\Windows\system32\Oglecc32.exe7⤵PID:1344
-
C:\Windows\SysWOW64\Paaiql32.exeC:\Windows\system32\Paaiql32.exe8⤵
- Executes dropped EXE
PID:520 -
C:\Windows\SysWOW64\Pmhjem32.exeC:\Windows\system32\Pmhjem32.exe9⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\Piokknbe.exeC:\Windows\system32\Piokknbe.exe10⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\Pgckdbao.exeC:\Windows\system32\Pgckdbao.exe11⤵
- Executes dropped EXE
PID:920 -
C:\Windows\SysWOW64\Ponphe32.exeC:\Windows\system32\Ponphe32.exe12⤵
- Executes dropped EXE
PID:1480
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Poqmnd32.exeC:\Windows\system32\Poqmnd32.exe1⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\Qlemgi32.exeC:\Windows\system32\Qlemgi32.exe2⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\Qemapn32.exeC:\Windows\system32\Qemapn32.exe3⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Apgbql32.exeC:\Windows\system32\Apgbql32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1084 -
C:\Windows\SysWOW64\Aklgne32.exeC:\Windows\system32\Aklgne32.exe5⤵
- Executes dropped EXE
PID:1176 -
C:\Windows\SysWOW64\Akoccdlc.exeC:\Windows\system32\Akoccdlc.exe6⤵
- Executes dropped EXE
PID:1180 -
C:\Windows\SysWOW64\Anmpppkg.exeC:\Windows\system32\Anmpppkg.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2012 -
C:\Windows\SysWOW64\Bhkjkm32.exeC:\Windows\system32\Bhkjkm32.exe8⤵PID:696
-
C:\Windows\SysWOW64\Bbcodb32.exeC:\Windows\system32\Bbcodb32.exe9⤵PID:760
-
C:\Windows\SysWOW64\Bhngambn.exeC:\Windows\system32\Bhngambn.exe10⤵PID:1512
-
C:\Windows\SysWOW64\Bklcmhaa.exeC:\Windows\system32\Bklcmhaa.exe11⤵PID:1108
-
C:\Windows\SysWOW64\Bnjoicpe.exeC:\Windows\system32\Bnjoicpe.exe12⤵PID:592
-
C:\Windows\SysWOW64\Bddgfn32.exeC:\Windows\system32\Bddgfn32.exe13⤵PID:808
-
C:\Windows\SysWOW64\Bgcdbi32.exeC:\Windows\system32\Bgcdbi32.exe14⤵PID:432
-
C:\Windows\SysWOW64\Bnmlocnb.exeC:\Windows\system32\Bnmlocnb.exe15⤵PID:1856
-
C:\Windows\SysWOW64\Bdgdkmeo.exeC:\Windows\system32\Bdgdkmeo.exe16⤵
- Drops file in System32 directory
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\Bibpll32.exeC:\Windows\system32\Bibpll32.exe17⤵PID:1752
-
C:\Windows\SysWOW64\Bjcmcdcf.exeC:\Windows\system32\Bjcmcdcf.exe18⤵PID:1712
-
C:\Windows\SysWOW64\Bqnepn32.exeC:\Windows\system32\Bqnepn32.exe19⤵PID:2056
-
C:\Windows\SysWOW64\Bclamj32.exeC:\Windows\system32\Bclamj32.exe20⤵PID:2064
-
C:\Windows\SysWOW64\Bjfiidad.exeC:\Windows\system32\Bjfiidad.exe21⤵
- Drops file in System32 directory
PID:2072 -
C:\Windows\SysWOW64\Bmdfeoqg.exeC:\Windows\system32\Bmdfeoqg.exe22⤵PID:2080
-
C:\Windows\SysWOW64\Ccnnbihd.exeC:\Windows\system32\Ccnnbihd.exe23⤵PID:2088
-
C:\Windows\SysWOW64\Cfmjnegh.exeC:\Windows\system32\Cfmjnegh.exe24⤵PID:2096
-
C:\Windows\SysWOW64\Cabnkngn.exeC:\Windows\system32\Cabnkngn.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2104 -
C:\Windows\SysWOW64\Ccqkgifa.exeC:\Windows\system32\Ccqkgifa.exe26⤵PID:2112
-
C:\Windows\SysWOW64\Cjkcdc32.exeC:\Windows\system32\Cjkcdc32.exe27⤵PID:2120
-
C:\Windows\SysWOW64\Cadkamek.exeC:\Windows\system32\Cadkamek.exe28⤵PID:2128
-
C:\Windows\SysWOW64\Cjmpjcll.exeC:\Windows\system32\Cjmpjcll.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2136 -
C:\Windows\SysWOW64\Clnlak32.exeC:\Windows\system32\Clnlak32.exe30⤵PID:2144
-
C:\Windows\SysWOW64\Cfdpod32.exeC:\Windows\system32\Cfdpod32.exe31⤵PID:2152
-
C:\Windows\SysWOW64\Clqigk32.exeC:\Windows\system32\Clqigk32.exe32⤵PID:2160
-
C:\Windows\SysWOW64\Cplehihq.exeC:\Windows\system32\Cplehihq.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2168 -
C:\Windows\SysWOW64\Cffmdcom.exeC:\Windows\system32\Cffmdcom.exe34⤵PID:2176
-
C:\Windows\SysWOW64\Cidiqona.exeC:\Windows\system32\Cidiqona.exe35⤵PID:2184
-
C:\Windows\SysWOW64\Dpnami32.exeC:\Windows\system32\Dpnami32.exe36⤵
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\Dbmnid32.exeC:\Windows\system32\Dbmnid32.exe37⤵PID:2200
-
C:\Windows\SysWOW64\Digffoln.exeC:\Windows\system32\Digffoln.exe38⤵PID:2208
-
C:\Windows\SysWOW64\Dlebbjkb.exeC:\Windows\system32\Dlebbjkb.exe39⤵PID:2216
-
C:\Windows\SysWOW64\Dbojod32.exeC:\Windows\system32\Dbojod32.exe40⤵PID:2224
-
C:\Windows\SysWOW64\Dabkjaji.exeC:\Windows\system32\Dabkjaji.exe41⤵PID:2232
-
C:\Windows\SysWOW64\Ddqgfl32.exeC:\Windows\system32\Ddqgfl32.exe42⤵PID:2240
-
C:\Windows\SysWOW64\Djjocfpj.exeC:\Windows\system32\Djjocfpj.exe43⤵PID:2248
-
C:\Windows\SysWOW64\Dmikpbon.exeC:\Windows\system32\Dmikpbon.exe44⤵PID:2256
-
C:\Windows\SysWOW64\Ddccll32.exeC:\Windows\system32\Ddccll32.exe45⤵PID:2264
-
C:\Windows\SysWOW64\Dohhie32.exeC:\Windows\system32\Dohhie32.exe46⤵PID:2292
-
C:\Windows\SysWOW64\Dpidamlo.exeC:\Windows\system32\Dpidamlo.exe47⤵PID:2316
-
C:\Windows\SysWOW64\Ddepal32.exeC:\Windows\system32\Ddepal32.exe48⤵PID:2328
-
C:\Windows\SysWOW64\Djoinf32.exeC:\Windows\system32\Djoinf32.exe49⤵PID:2740
-
C:\Windows\SysWOW64\Ebogngej.exeC:\Windows\system32\Ebogngej.exe50⤵PID:2780
-
C:\Windows\SysWOW64\Ehlofoca.exeC:\Windows\system32\Ehlofoca.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2788 -
C:\Windows\SysWOW64\Eofgch32.exeC:\Windows\system32\Eofgch32.exe52⤵
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\Eadcod32.exeC:\Windows\system32\Eadcod32.exe53⤵PID:2804
-
C:\Windows\SysWOW64\Ehnlln32.exeC:\Windows\system32\Ehnlln32.exe54⤵PID:2812
-
C:\Windows\SysWOW64\Ekmhhj32.exeC:\Windows\system32\Ekmhhj32.exe55⤵PID:2820
-
C:\Windows\SysWOW64\Eohdhhil.exeC:\Windows\system32\Eohdhhil.exe56⤵PID:2828
-
C:\Windows\SysWOW64\Eebleb32.exeC:\Windows\system32\Eebleb32.exe57⤵PID:2836
-
C:\Windows\SysWOW64\Ekoemi32.exeC:\Windows\system32\Ekoemi32.exe58⤵PID:2844
-
C:\Windows\SysWOW64\Fnmaid32.exeC:\Windows\system32\Fnmaid32.exe59⤵
- Modifies registry class
PID:2852 -
C:\Windows\SysWOW64\Fedikb32.exeC:\Windows\system32\Fedikb32.exe60⤵PID:2860
-
C:\Windows\SysWOW64\Fgeebjdd.exeC:\Windows\system32\Fgeebjdd.exe61⤵PID:2868
-
C:\Windows\SysWOW64\Fakjpc32.exeC:\Windows\system32\Fakjpc32.exe62⤵
- Drops file in System32 directory
- Modifies registry class
PID:2876 -
C:\Windows\SysWOW64\Fheblmkg.exeC:\Windows\system32\Fheblmkg.exe63⤵PID:2884
-
C:\Windows\SysWOW64\Fkcnhhkk.exeC:\Windows\system32\Fkcnhhkk.exe64⤵
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\Fppgqpib.exeC:\Windows\system32\Fppgqpib.exe65⤵PID:2900
-
C:\Windows\SysWOW64\Fgmlcinl.exeC:\Windows\system32\Fgmlcinl.exe66⤵PID:2908
-
C:\Windows\SysWOW64\Fngdpc32.exeC:\Windows\system32\Fngdpc32.exe67⤵PID:2916
-
C:\Windows\SysWOW64\Fohqglkg.exeC:\Windows\system32\Fohqglkg.exe68⤵PID:2924
-
C:\Windows\SysWOW64\Ffbidf32.exeC:\Windows\system32\Ffbidf32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2932 -
C:\Windows\SysWOW64\Gllaap32.exeC:\Windows\system32\Gllaap32.exe70⤵
- Modifies registry class
PID:2940 -
C:\Windows\SysWOW64\Gbiiig32.exeC:\Windows\system32\Gbiiig32.exe71⤵PID:2948
-
C:\Windows\SysWOW64\Gjpajd32.exeC:\Windows\system32\Gjpajd32.exe72⤵PID:2956
-
C:\Windows\SysWOW64\Ghbafqpe.exeC:\Windows\system32\Ghbafqpe.exe73⤵PID:2964
-
C:\Windows\SysWOW64\Gkanbloi.exeC:\Windows\system32\Gkanbloi.exe74⤵PID:2972
-
C:\Windows\SysWOW64\Gbkfof32.exeC:\Windows\system32\Gbkfof32.exe75⤵PID:2980
-
C:\Windows\SysWOW64\Gdibkb32.exeC:\Windows\system32\Gdibkb32.exe76⤵PID:2988
-
C:\Windows\SysWOW64\Gkckglmf.exeC:\Windows\system32\Gkckglmf.exe77⤵PID:2996
-
C:\Windows\SysWOW64\Gbmcdfdc.exeC:\Windows\system32\Gbmcdfdc.exe78⤵PID:3004
-
C:\Windows\SysWOW64\Gdlopacg.exeC:\Windows\system32\Gdlopacg.exe79⤵
- Modifies registry class
PID:3012 -
C:\Windows\SysWOW64\Gkfgml32.exeC:\Windows\system32\Gkfgml32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\Hiekjd32.exeC:\Windows\system32\Hiekjd32.exe81⤵PID:2464
-
C:\Windows\SysWOW64\Hfikdh32.exeC:\Windows\system32\Hfikdh32.exe82⤵PID:2488
-
C:\Windows\SysWOW64\Higgpc32.exeC:\Windows\system32\Higgpc32.exe83⤵PID:2504
-
C:\Windows\SysWOW64\Hpapmn32.exeC:\Windows\system32\Hpapmn32.exe84⤵PID:2528
-
C:\Windows\SysWOW64\Hbplii32.exeC:\Windows\system32\Hbplii32.exe85⤵
- Drops file in System32 directory
- Modifies registry class
PID:2544 -
C:\Windows\SysWOW64\Henhed32.exeC:\Windows\system32\Henhed32.exe86⤵PID:2632
-
C:\Windows\SysWOW64\Iepejd32.exeC:\Windows\system32\Iepejd32.exe87⤵PID:2648
-
C:\Windows\SysWOW64\Iilqkcjf.exeC:\Windows\system32\Iilqkcjf.exe88⤵
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Ipfihm32.exeC:\Windows\system32\Ipfihm32.exe89⤵PID:2680
-
C:\Windows\SysWOW64\Iebapdpj.exeC:\Windows\system32\Iebapdpj.exe90⤵PID:2688
-
C:\Windows\SysWOW64\Ihanloon.exeC:\Windows\system32\Ihanloon.exe91⤵PID:2696
-
C:\Windows\SysWOW64\Inkfii32.exeC:\Windows\system32\Inkfii32.exe92⤵PID:2704
-
C:\Windows\SysWOW64\Ichnap32.exeC:\Windows\system32\Ichnap32.exe93⤵PID:2712
-
C:\Windows\SysWOW64\Ilofbn32.exeC:\Windows\system32\Ilofbn32.exe94⤵PID:2720
-
C:\Windows\SysWOW64\Impcjfkb.exeC:\Windows\system32\Impcjfkb.exe95⤵
- Drops file in System32 directory
PID:2728 -
C:\Windows\SysWOW64\Icjkfpcp.exeC:\Windows\system32\Icjkfpcp.exe96⤵PID:2736
-
C:\Windows\SysWOW64\Ifhgbkbc.exeC:\Windows\system32\Ifhgbkbc.exe97⤵PID:2752
-
C:\Windows\SysWOW64\Inpodibe.exeC:\Windows\system32\Inpodibe.exe98⤵PID:2760
-
C:\Windows\SysWOW64\Kkflhmke.exeC:\Windows\system32\Kkflhmke.exe99⤵PID:2768
-
C:\Windows\SysWOW64\Kelqefjk.exeC:\Windows\system32\Kelqefjk.exe100⤵
- Modifies registry class
PID:2776 -
C:\Windows\SysWOW64\Kgmmmn32.exeC:\Windows\system32\Kgmmmn32.exe101⤵PID:3024
-
C:\Windows\SysWOW64\Kkhimmib.exeC:\Windows\system32\Kkhimmib.exe102⤵PID:3036
-
C:\Windows\SysWOW64\Kmgeihhf.exeC:\Windows\system32\Kmgeihhf.exe103⤵PID:3044
-
C:\Windows\SysWOW64\Khliga32.exeC:\Windows\system32\Khliga32.exe104⤵PID:2484
-
C:\Windows\SysWOW64\Kepigm32.exeC:\Windows\system32\Kepigm32.exe105⤵PID:2524
-
C:\Windows\SysWOW64\Mhegbk32.exeC:\Windows\system32\Mhegbk32.exe106⤵PID:2540
-
C:\Windows\SysWOW64\Mkhmjeab.exeC:\Windows\system32\Mkhmjeab.exe107⤵PID:2560
-
C:\Windows\SysWOW64\Mocijd32.exeC:\Windows\system32\Mocijd32.exe108⤵PID:2568
-
C:\Windows\SysWOW64\Mabefp32.exeC:\Windows\system32\Mabefp32.exe109⤵PID:2576
-
C:\Windows\SysWOW64\Mdpabk32.exeC:\Windows\system32\Mdpabk32.exe110⤵
- Modifies registry class
PID:2584 -
C:\Windows\SysWOW64\Mgonof32.exeC:\Windows\system32\Mgonof32.exe111⤵PID:2592
-
C:\Windows\SysWOW64\Nofepd32.exeC:\Windows\system32\Nofepd32.exe112⤵PID:2600
-
C:\Windows\SysWOW64\Nadblogl.exeC:\Windows\system32\Nadblogl.exe113⤵
- Drops file in System32 directory
PID:2608 -
C:\Windows\SysWOW64\Ndbnhkfp.exeC:\Windows\system32\Ndbnhkfp.exe114⤵PID:2616
-
C:\Windows\SysWOW64\Nkmfee32.exeC:\Windows\system32\Nkmfee32.exe115⤵PID:2624
-
C:\Windows\SysWOW64\Njofpadg.exeC:\Windows\system32\Njofpadg.exe116⤵
- Modifies registry class
PID:2640 -
C:\Windows\SysWOW64\Nafoaoei.exeC:\Windows\system32\Nafoaoei.exe117⤵PID:2656
-
C:\Windows\SysWOW64\Npioml32.exeC:\Windows\system32\Npioml32.exe118⤵PID:2672
-
C:\Windows\SysWOW64\Nchkig32.exeC:\Windows\system32\Nchkig32.exe119⤵
- Modifies registry class
PID:1748 -
C:\Windows\SysWOW64\Nkocjd32.exeC:\Windows\system32\Nkocjd32.exe120⤵PID:3056
-
C:\Windows\SysWOW64\Njbcfabd.exeC:\Windows\system32\Njbcfabd.exe121⤵PID:3064
-
C:\Windows\SysWOW64\Nlppbmah.exeC:\Windows\system32\Nlppbmah.exe122⤵
- Modifies registry class
PID:2272
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-