Analysis
-
max time kernel
112s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe
Resource
win10v2004-20220812-en
General
-
Target
7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe
-
Size
50KB
-
MD5
b053b4e97e0b15725b0a11d823f85f50
-
SHA1
45f83ed9fd1e8274575fb5db680ecbee655b5662
-
SHA256
7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e
-
SHA512
bb98e03939ca5fdd4bfc31d128a22c94ff26a4ad29a9effb6da3729e312197bb653d9f08667fd341dd07a784349ea2051ee11e86cd60b722d66541351cde0f2b
-
SSDEEP
768:T4EpI2xCFURWO947coJKk4HlW3CX1x8KZTJuOrheRvr/TPLfzeDXr/Tn7Pj3LfzZ:TE+CFfm4IfHY3aASd9eRBMAXTwf
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Aqbepc32.exeLbqdhgbl.exePaolmidq.exeOnkopd32.exeNpijknpl.exeJkkifeof.exeOoicfh32.exeMgpifn32.exeGbfnokqf.exeKdejdkcc.exeAnlpalfh.exeAdiddf32.exeJbmhlc32.exeEolonh32.exePjagbjkc.exePifdnfec.exeMfdoldpm.exeOflhfmpm.exeLmobda32.exeBjemlm32.exeJmiebani.exeLghlki32.exeLgbjlj32.exeQjfqmj32.exeQkqclm32.exePaaibi32.exePddojcml.exeHfmhbq32.exeDgaadl32.exeAggqpa32.exeAbfomkqd.exeMelicpbb.exeMmakidic.exeJhlmjjpb.exeBmffnhgk.exeJhgcok32.exeEbbheibp.exeKncocfij.exeMahnocea.exeMppgephg.exeAdfhof32.exeMdndmk32.exeOkooihne.exeKgkmae32.exeOgqbal32.exeJbodac32.exeLfbfha32.exeOjiifqll.exeMmdhodgq.exeMfglbdnk.exeBalifcca.exeMmoncd32.exeLaigmbei.exeOenbgc32.exeOfpjka32.exeCignkeql.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aqbepc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbqdhgbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Paolmidq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onkopd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npijknpl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkkifeof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ooicfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgpifn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aqbepc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbfnokqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdejdkcc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anlpalfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adiddf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbmhlc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eolonh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjagbjkc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pifdnfec.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfdoldpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onkopd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oflhfmpm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmobda32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjemlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmiebani.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lghlki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgbjlj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjfqmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbfnokqf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qkqclm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjagbjkc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Paaibi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pddojcml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfmhbq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgaadl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aggqpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkkifeof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abfomkqd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Melicpbb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmakidic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhlmjjpb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abfomkqd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmffnhgk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhgcok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebbheibp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kncocfij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mahnocea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mppgephg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adfhof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdndmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Okooihne.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgkmae32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogqbal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbodac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfbfha32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojiifqll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbqdhgbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmdhodgq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adiddf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfglbdnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Balifcca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmoncd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laigmbei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oenbgc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofpjka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cignkeql.exe -
Executes dropped EXE 64 IoCs
Processes:
Ccildpbn.exeMdndmk32.exeMemagnah.exeOjiifqll.exeOfpjka32.exeOnkopd32.exeOkooihne.exeOnphkckf.exePccgdice.exeQlceck32.exeAfaoohee.exeAlcabnog.exeBadcfd32.exeBalifcca.exeCignkeql.exeCkfjehho.exeCohpnlkn.exeCphlho32.exeCpjinnpn.exeDanbkf32.exeDngpeg32.exeDjnpjhmp.exeDgaadl32.exeEjbjeg32.exeEcmkdl32.exeEmepmbdh.exeEbbheibp.exeFiomgbhj.exeFalnad32.exeFnpoki32.exeFmelle32.exeFfnpdkmd.exeGpfemp32.exeGiniff32.exeGbfnokqf.exeGbijdkoc.exeGicbaefp.exeGlclcpca.exeJkddonpg.exeEolonh32.exeIkhnijgi.exeJpaopnfb.exeJglgmh32.exeJilpnc32.exeKlmipnha.exeKcgamh32.exeKeenid32.exeKlpfeneo.exeKdkkjp32.exeKncocfij.exeKqakoain.exeKkgpljhd.exeKnelhegh.exeKqdhda32.exeKqfejq32.exeLmmeoajm.exeLgbjlj32.exeLmobda32.exeLonnqm32.exeLfgfmgok.exeLopkfl32.exeLbngbhdo.exeLobhllci.exeLbqdhgbl.exepid process 1768 Ccildpbn.exe 2020 Mdndmk32.exe 2016 Memagnah.exe 1344 Ojiifqll.exe 768 Ofpjka32.exe 1868 Onkopd32.exe 852 Okooihne.exe 288 Onphkckf.exe 1764 Pccgdice.exe 1068 Qlceck32.exe 1472 Afaoohee.exe 1752 Alcabnog.exe 1372 Badcfd32.exe 1628 Balifcca.exe 1072 Cignkeql.exe 1772 Ckfjehho.exe 844 Cohpnlkn.exe 268 Cphlho32.exe 1660 Cpjinnpn.exe 240 Danbkf32.exe 1964 Dngpeg32.exe 1584 Djnpjhmp.exe 1612 Dgaadl32.exe 1064 Ejbjeg32.exe 1988 Ecmkdl32.exe 2024 Emepmbdh.exe 1980 Ebbheibp.exe 868 Fiomgbhj.exe 1160 Falnad32.exe 832 Fnpoki32.exe 1320 Fmelle32.exe 932 Ffnpdkmd.exe 1900 Gpfemp32.exe 1348 Giniff32.exe 1316 Gbfnokqf.exe 1296 Gbijdkoc.exe 316 Gicbaefp.exe 760 Glclcpca.exe 828 Jkddonpg.exe 1608 Eolonh32.exe 1736 Ikhnijgi.exe 1008 Jpaopnfb.exe 900 Jglgmh32.exe 524 Jilpnc32.exe 668 Klmipnha.exe 848 Kcgamh32.exe 1292 Keenid32.exe 1572 Klpfeneo.exe 1364 Kdkkjp32.exe 1116 Kncocfij.exe 1880 Kqakoain.exe 572 Kkgpljhd.exe 1468 Knelhegh.exe 1684 Kqdhda32.exe 1352 Kqfejq32.exe 1500 Lmmeoajm.exe 1888 Lgbjlj32.exe 2000 Lmobda32.exe 1996 Lonnqm32.exe 1404 Lfgfmgok.exe 1820 Lopkfl32.exe 1784 Lbngbhdo.exe 1616 Lobhllci.exe 2004 Lbqdhgbl.exe -
Loads dropped DLL 64 IoCs
Processes:
7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exeCcildpbn.exeMdndmk32.exeMemagnah.exeOjiifqll.exeOfpjka32.exeOnkopd32.exeOkooihne.exeOnphkckf.exePccgdice.exeQlceck32.exeAfaoohee.exeAlcabnog.exeBadcfd32.exeBalifcca.exeCignkeql.exeCkfjehho.exeCohpnlkn.exeCphlho32.exeCpjinnpn.exeDanbkf32.exeDngpeg32.exeDjnpjhmp.exeDgaadl32.exeEjbjeg32.exeEcmkdl32.exeEmepmbdh.exeEbbheibp.exeFiomgbhj.exeFalnad32.exeFnpoki32.exeFmelle32.exepid process 2044 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe 2044 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe 1768 Ccildpbn.exe 1768 Ccildpbn.exe 2020 Mdndmk32.exe 2020 Mdndmk32.exe 2016 Memagnah.exe 2016 Memagnah.exe 1344 Ojiifqll.exe 1344 Ojiifqll.exe 768 Ofpjka32.exe 768 Ofpjka32.exe 1868 Onkopd32.exe 1868 Onkopd32.exe 852 Okooihne.exe 852 Okooihne.exe 288 Onphkckf.exe 288 Onphkckf.exe 1764 Pccgdice.exe 1764 Pccgdice.exe 1068 Qlceck32.exe 1068 Qlceck32.exe 1472 Afaoohee.exe 1472 Afaoohee.exe 1752 Alcabnog.exe 1752 Alcabnog.exe 1372 Badcfd32.exe 1372 Badcfd32.exe 1628 Balifcca.exe 1628 Balifcca.exe 1072 Cignkeql.exe 1072 Cignkeql.exe 1772 Ckfjehho.exe 1772 Ckfjehho.exe 844 Cohpnlkn.exe 844 Cohpnlkn.exe 268 Cphlho32.exe 268 Cphlho32.exe 1660 Cpjinnpn.exe 1660 Cpjinnpn.exe 240 Danbkf32.exe 240 Danbkf32.exe 1964 Dngpeg32.exe 1964 Dngpeg32.exe 1584 Djnpjhmp.exe 1584 Djnpjhmp.exe 1612 Dgaadl32.exe 1612 Dgaadl32.exe 1064 Ejbjeg32.exe 1064 Ejbjeg32.exe 1988 Ecmkdl32.exe 1988 Ecmkdl32.exe 2024 Emepmbdh.exe 2024 Emepmbdh.exe 1980 Ebbheibp.exe 1980 Ebbheibp.exe 868 Fiomgbhj.exe 868 Fiomgbhj.exe 1160 Falnad32.exe 1160 Falnad32.exe 832 Fnpoki32.exe 832 Fnpoki32.exe 1320 Fmelle32.exe 1320 Fmelle32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Mmoncd32.exePdbbdd32.exeMnbqff32.exeEcmkdl32.exeLmmeoajm.exeMgpifn32.exeAhpgie32.exeBcnaeb32.exeJepmcnol.exeOkooihne.exeAfaoohee.exeGicbaefp.exePcllal32.exeJhojojno.exeOoicfh32.exeGiniff32.exePlbdebfi.exeQjfqmj32.exeJlcpoilq.exeJbodac32.exeLdjpom32.exeMgjeolaf.exe7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exeNnjnakhi.exeKdejdkcc.exeLaigmbei.exeLkfeqg32.exeMkcdjk32.exeLgnmpnqd.exeQlbpde32.exeKcmdkg32.exeKjiimq32.exeKdkkjp32.exeNlkaepif.exeNbejbj32.exeLfbfha32.exeJenqnoqn.exeLmobda32.exeJidccnmm.exeKekpgbem.exeMcfcpiqj.exeFiomgbhj.exeMiehnomn.exeCohpnlkn.exeLonnqm32.exeMnokng32.exePldqjb32.exePjagbjkc.exeLljbolid.exeDjnpjhmp.exeEmepmbdh.exeGbfnokqf.exeMahnocea.exeNpijknpl.exeEjbjeg32.exeHfmhbq32.exeBalifcca.exedescription ioc process File created C:\Windows\SysWOW64\Icmmjejg.dll Mmoncd32.exe File created C:\Windows\SysWOW64\Pkljan32.exe Pdbbdd32.exe File opened for modification C:\Windows\SysWOW64\Melicpbb.exe Mnbqff32.exe File opened for modification C:\Windows\SysWOW64\Emepmbdh.exe Ecmkdl32.exe File opened for modification C:\Windows\SysWOW64\Lgbjlj32.exe Lmmeoajm.exe File created C:\Windows\SysWOW64\Gedknn32.dll Mgpifn32.exe File created C:\Windows\SysWOW64\Kbiakl32.dll Ahpgie32.exe File created C:\Windows\SysWOW64\Bjhjbmhg.exe Bcnaeb32.exe File created C:\Windows\SysWOW64\Jhojojno.exe Jepmcnol.exe File created C:\Windows\SysWOW64\Hgiini32.dll Okooihne.exe File created C:\Windows\SysWOW64\Ffccbc32.dll Afaoohee.exe File created C:\Windows\SysWOW64\Clkqdg32.dll Gicbaefp.exe File created C:\Windows\SysWOW64\Paolmidq.exe Pcllal32.exe File opened for modification C:\Windows\SysWOW64\Jkmflemc.exe Jhojojno.exe File created C:\Windows\SysWOW64\Blljnf32.dll Ooicfh32.exe File opened for modification C:\Windows\SysWOW64\Gbfnokqf.exe Giniff32.exe File created C:\Windows\SysWOW64\Nkfadm32.dll Plbdebfi.exe File created C:\Windows\SysWOW64\Nigeccen.dll Qjfqmj32.exe File opened for modification C:\Windows\SysWOW64\Joalkekd.exe Jlcpoilq.exe File opened for modification C:\Windows\SysWOW64\Jenqnoqn.exe Jbodac32.exe File opened for modification C:\Windows\SysWOW64\Lghlki32.exe Ldjpom32.exe File opened for modification C:\Windows\SysWOW64\Ocmepkmm.exe Mgjeolaf.exe File opened for modification C:\Windows\SysWOW64\Ccildpbn.exe 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe File created C:\Windows\SysWOW64\Nbejbj32.exe Nnjnakhi.exe File created C:\Windows\SysWOW64\Lgggnijh.dll Pdbbdd32.exe File created C:\Windows\SysWOW64\Klclnmol.exe Kdejdkcc.exe File opened for modification C:\Windows\SysWOW64\Ldgcindl.exe Laigmbei.exe File created C:\Windows\SysWOW64\Lmgahomb.exe Lkfeqg32.exe File created C:\Windows\SysWOW64\Mnbqff32.exe Mkcdjk32.exe File created C:\Windows\SysWOW64\Kajecfgm.dll Lgnmpnqd.exe File created C:\Windows\SysWOW64\Bhiahdcf.dll Pcllal32.exe File opened for modification C:\Windows\SysWOW64\Qjfqmj32.exe Qlbpde32.exe File created C:\Windows\SysWOW64\Kekpgbem.exe Kcmdkg32.exe File created C:\Windows\SysWOW64\Pbigenfl.dll Kjiimq32.exe File opened for modification C:\Windows\SysWOW64\Kncocfij.exe Kdkkjp32.exe File opened for modification C:\Windows\SysWOW64\Nnjnakhi.exe Nlkaepif.exe File opened for modification C:\Windows\SysWOW64\Necfnepf.exe Nbejbj32.exe File created C:\Windows\SysWOW64\Ajcabdgc.dll Lfbfha32.exe File opened for modification C:\Windows\SysWOW64\Jhlmjjpb.exe Jenqnoqn.exe File created C:\Windows\SysWOW64\Lonnqm32.exe Lmobda32.exe File opened for modification C:\Windows\SysWOW64\Jhgcok32.exe Jidccnmm.exe File created C:\Windows\SysWOW64\Knbhhpfo.exe Kekpgbem.exe File created C:\Windows\SysWOW64\Mfdoldpm.exe Mcfcpiqj.exe File created C:\Windows\SysWOW64\Ahdggdaf.dll Fiomgbhj.exe File created C:\Windows\SysWOW64\Mafaidgd.exe Lgnmpnqd.exe File created C:\Windows\SysWOW64\Necfnepf.exe Nbejbj32.exe File created C:\Windows\SysWOW64\Mhielgjk.dll Kdejdkcc.exe File created C:\Windows\SysWOW64\Ioncgh32.dll Miehnomn.exe File created C:\Windows\SysWOW64\Jonobafd.dll Cohpnlkn.exe File opened for modification C:\Windows\SysWOW64\Lfgfmgok.exe Lonnqm32.exe File opened for modification C:\Windows\SysWOW64\Mmakidic.exe Mnokng32.exe File created C:\Windows\SysWOW64\Paaibi32.exe Pldqjb32.exe File created C:\Windows\SysWOW64\Kdfjodpj.dll Pjagbjkc.exe File created C:\Windows\SysWOW64\Dgjegc32.dll Jlcpoilq.exe File created C:\Windows\SysWOW64\Lcdjlf32.exe Lljbolid.exe File opened for modification C:\Windows\SysWOW64\Dgaadl32.exe Djnpjhmp.exe File created C:\Windows\SysWOW64\Ebbheibp.exe Emepmbdh.exe File opened for modification C:\Windows\SysWOW64\Gbijdkoc.exe Gbfnokqf.exe File opened for modification C:\Windows\SysWOW64\Mmoncd32.exe Mahnocea.exe File opened for modification C:\Windows\SysWOW64\Nefbcenc.exe Npijknpl.exe File created C:\Windows\SysWOW64\Ecmkdl32.exe Ejbjeg32.exe File opened for modification C:\Windows\SysWOW64\Jegjmpgf.exe Hfmhbq32.exe File created C:\Windows\SysWOW64\Nggmdn32.dll 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe File opened for modification C:\Windows\SysWOW64\Cignkeql.exe Balifcca.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1824 1896 WerFault.exe Oagobd32.exe -
Modifies registry class 64 IoCs
Processes:
Emepmbdh.exeBalifcca.exeCohpnlkn.exeAmifddbm.exeKekpgbem.exeLmgahomb.exeOoicfh32.exeOnphkckf.exeQkqclm32.exeAfmabkmb.exeAhpgie32.exeLdlmdm32.exeIkhnijgi.exeOflhfmpm.exeBjemlm32.exeMelicpbb.exePhidjc32.exeAggqpa32.exeJbkkfd32.exeAbcbglbg.exeOocqgjqo.exeOpfjebdj.exePjagbjkc.exeAhknnflf.exeKpcajkcp.exeDanbkf32.exeNlkaepif.exeOhkeqpgo.exePkljan32.exeJegjmpgf.exeDngpeg32.exeMbqpgk32.exeLgbjlj32.exeMmoncd32.exeBmffnhgk.exeGiniff32.exeFchifb32.exeJoalkekd.exeKcmdkg32.exeOcmepkmm.exeJglgmh32.exeMnokng32.exeJepmcnol.exeOhokin32.exeOnkopd32.exeOpifjabh.exeAnolglde.exeBbmemjjl.exeJhlmjjpb.exeKqdhda32.exePifdnfec.exeLljbolid.exeMmlkco32.exePafbnhni.exeBgljkaga.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfqael32.dll" Emepmbdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Balifcca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jonobafd.dll" Cohpnlkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amifddbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gaokph32.dll" Kekpgbem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmgahomb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Blljnf32.dll" Ooicfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egpneq32.dll" Onphkckf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Balifcca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qkqclm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmegmjbf.dll" Afmabkmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afmabkmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahpgie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldlmdm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikhnijgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oflhfmpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjemlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfdnmp32.dll" Melicpbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phidjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aggqpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pljdlagc.dll" Jbkkfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abcbglbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oocqgjqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fckpcm32.dll" Opfjebdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjagbjkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iabbenii.dll" Ahknnflf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kekpgbem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfifakeh.dll" Kpcajkcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjmpnf32.dll" Balifcca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Danbkf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlkaepif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ohkeqpgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Opfjebdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bploolmo.dll" Pkljan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmdchn32.dll" Jegjmpgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dngpeg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbqpgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgbjlj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmoncd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bchcie32.dll" Aggqpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paolfo32.dll" Bmffnhgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emepmbdh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Giniff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aggqpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fchifb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kaonif32.dll" Joalkekd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcmdkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocmepkmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jglgmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mnokng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifohad32.dll" Jepmcnol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ohokin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onkopd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Opifjabh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahknnflf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Anolglde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbmemjjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jhlmjjpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgbgjn32.dll" Kqdhda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pifdnfec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lljbolid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmlkco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdelicif.dll" Pafbnhni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgljkaga.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exeCcildpbn.exeMdndmk32.exeMemagnah.exeOjiifqll.exeOfpjka32.exeOnkopd32.exeOkooihne.exeOnphkckf.exePccgdice.exeQlceck32.exeAfaoohee.exeAlcabnog.exeBadcfd32.exeBalifcca.exeCignkeql.exedescription pid process target process PID 2044 wrote to memory of 1768 2044 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe Ccildpbn.exe PID 2044 wrote to memory of 1768 2044 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe Ccildpbn.exe PID 2044 wrote to memory of 1768 2044 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe Ccildpbn.exe PID 2044 wrote to memory of 1768 2044 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe Ccildpbn.exe PID 1768 wrote to memory of 2020 1768 Ccildpbn.exe Mdndmk32.exe PID 1768 wrote to memory of 2020 1768 Ccildpbn.exe Mdndmk32.exe PID 1768 wrote to memory of 2020 1768 Ccildpbn.exe Mdndmk32.exe PID 1768 wrote to memory of 2020 1768 Ccildpbn.exe Mdndmk32.exe PID 2020 wrote to memory of 2016 2020 Mdndmk32.exe Memagnah.exe PID 2020 wrote to memory of 2016 2020 Mdndmk32.exe Memagnah.exe PID 2020 wrote to memory of 2016 2020 Mdndmk32.exe Memagnah.exe PID 2020 wrote to memory of 2016 2020 Mdndmk32.exe Memagnah.exe PID 2016 wrote to memory of 1344 2016 Memagnah.exe Ojiifqll.exe PID 2016 wrote to memory of 1344 2016 Memagnah.exe Ojiifqll.exe PID 2016 wrote to memory of 1344 2016 Memagnah.exe Ojiifqll.exe PID 2016 wrote to memory of 1344 2016 Memagnah.exe Ojiifqll.exe PID 1344 wrote to memory of 768 1344 Ojiifqll.exe Ofpjka32.exe PID 1344 wrote to memory of 768 1344 Ojiifqll.exe Ofpjka32.exe PID 1344 wrote to memory of 768 1344 Ojiifqll.exe Ofpjka32.exe PID 1344 wrote to memory of 768 1344 Ojiifqll.exe Ofpjka32.exe PID 768 wrote to memory of 1868 768 Ofpjka32.exe Onkopd32.exe PID 768 wrote to memory of 1868 768 Ofpjka32.exe Onkopd32.exe PID 768 wrote to memory of 1868 768 Ofpjka32.exe Onkopd32.exe PID 768 wrote to memory of 1868 768 Ofpjka32.exe Onkopd32.exe PID 1868 wrote to memory of 852 1868 Onkopd32.exe Okooihne.exe PID 1868 wrote to memory of 852 1868 Onkopd32.exe Okooihne.exe PID 1868 wrote to memory of 852 1868 Onkopd32.exe Okooihne.exe PID 1868 wrote to memory of 852 1868 Onkopd32.exe Okooihne.exe PID 852 wrote to memory of 288 852 Okooihne.exe Onphkckf.exe PID 852 wrote to memory of 288 852 Okooihne.exe Onphkckf.exe PID 852 wrote to memory of 288 852 Okooihne.exe Onphkckf.exe PID 852 wrote to memory of 288 852 Okooihne.exe Onphkckf.exe PID 288 wrote to memory of 1764 288 Onphkckf.exe Pccgdice.exe PID 288 wrote to memory of 1764 288 Onphkckf.exe Pccgdice.exe PID 288 wrote to memory of 1764 288 Onphkckf.exe Pccgdice.exe PID 288 wrote to memory of 1764 288 Onphkckf.exe Pccgdice.exe PID 1764 wrote to memory of 1068 1764 Pccgdice.exe Qlceck32.exe PID 1764 wrote to memory of 1068 1764 Pccgdice.exe Qlceck32.exe PID 1764 wrote to memory of 1068 1764 Pccgdice.exe Qlceck32.exe PID 1764 wrote to memory of 1068 1764 Pccgdice.exe Qlceck32.exe PID 1068 wrote to memory of 1472 1068 Qlceck32.exe Afaoohee.exe PID 1068 wrote to memory of 1472 1068 Qlceck32.exe Afaoohee.exe PID 1068 wrote to memory of 1472 1068 Qlceck32.exe Afaoohee.exe PID 1068 wrote to memory of 1472 1068 Qlceck32.exe Afaoohee.exe PID 1472 wrote to memory of 1752 1472 Afaoohee.exe Alcabnog.exe PID 1472 wrote to memory of 1752 1472 Afaoohee.exe Alcabnog.exe PID 1472 wrote to memory of 1752 1472 Afaoohee.exe Alcabnog.exe PID 1472 wrote to memory of 1752 1472 Afaoohee.exe Alcabnog.exe PID 1752 wrote to memory of 1372 1752 Alcabnog.exe Badcfd32.exe PID 1752 wrote to memory of 1372 1752 Alcabnog.exe Badcfd32.exe PID 1752 wrote to memory of 1372 1752 Alcabnog.exe Badcfd32.exe PID 1752 wrote to memory of 1372 1752 Alcabnog.exe Badcfd32.exe PID 1372 wrote to memory of 1628 1372 Badcfd32.exe Balifcca.exe PID 1372 wrote to memory of 1628 1372 Badcfd32.exe Balifcca.exe PID 1372 wrote to memory of 1628 1372 Badcfd32.exe Balifcca.exe PID 1372 wrote to memory of 1628 1372 Badcfd32.exe Balifcca.exe PID 1628 wrote to memory of 1072 1628 Balifcca.exe Cignkeql.exe PID 1628 wrote to memory of 1072 1628 Balifcca.exe Cignkeql.exe PID 1628 wrote to memory of 1072 1628 Balifcca.exe Cignkeql.exe PID 1628 wrote to memory of 1072 1628 Balifcca.exe Cignkeql.exe PID 1072 wrote to memory of 1772 1072 Cignkeql.exe Ckfjehho.exe PID 1072 wrote to memory of 1772 1072 Cignkeql.exe Ckfjehho.exe PID 1072 wrote to memory of 1772 1072 Cignkeql.exe Ckfjehho.exe PID 1072 wrote to memory of 1772 1072 Cignkeql.exe Ckfjehho.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe"C:\Users\Admin\AppData\Local\Temp\7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\Ccildpbn.exeC:\Windows\system32\Ccildpbn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\Mdndmk32.exeC:\Windows\system32\Mdndmk32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\Memagnah.exeC:\Windows\system32\Memagnah.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\Ojiifqll.exeC:\Windows\system32\Ojiifqll.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\Ofpjka32.exeC:\Windows\system32\Ofpjka32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\Onkopd32.exeC:\Windows\system32\Onkopd32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\Okooihne.exeC:\Windows\system32\Okooihne.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\Onphkckf.exeC:\Windows\system32\Onphkckf.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\Pccgdice.exeC:\Windows\system32\Pccgdice.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\Qlceck32.exeC:\Windows\system32\Qlceck32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\Afaoohee.exeC:\Windows\system32\Afaoohee.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\Alcabnog.exeC:\Windows\system32\Alcabnog.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\Badcfd32.exeC:\Windows\system32\Badcfd32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\Balifcca.exeC:\Windows\system32\Balifcca.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Cignkeql.exeC:\Windows\system32\Cignkeql.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\Ckfjehho.exeC:\Windows\system32\Ckfjehho.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772 -
C:\Windows\SysWOW64\Cohpnlkn.exeC:\Windows\system32\Cohpnlkn.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:844 -
C:\Windows\SysWOW64\Cphlho32.exeC:\Windows\system32\Cphlho32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:268 -
C:\Windows\SysWOW64\Cpjinnpn.exeC:\Windows\system32\Cpjinnpn.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1660 -
C:\Windows\SysWOW64\Danbkf32.exeC:\Windows\system32\Danbkf32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:240 -
C:\Windows\SysWOW64\Dngpeg32.exeC:\Windows\system32\Dngpeg32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1964 -
C:\Windows\SysWOW64\Djnpjhmp.exeC:\Windows\system32\Djnpjhmp.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\Dgaadl32.exeC:\Windows\system32\Dgaadl32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1612 -
C:\Windows\SysWOW64\Ejbjeg32.exeC:\Windows\system32\Ejbjeg32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1064 -
C:\Windows\SysWOW64\Ecmkdl32.exeC:\Windows\system32\Ecmkdl32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1988 -
C:\Windows\SysWOW64\Emepmbdh.exeC:\Windows\system32\Emepmbdh.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2024 -
C:\Windows\SysWOW64\Ebbheibp.exeC:\Windows\system32\Ebbheibp.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1980 -
C:\Windows\SysWOW64\Fiomgbhj.exeC:\Windows\system32\Fiomgbhj.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:868 -
C:\Windows\SysWOW64\Falnad32.exeC:\Windows\system32\Falnad32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1160 -
C:\Windows\SysWOW64\Fnpoki32.exeC:\Windows\system32\Fnpoki32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:832 -
C:\Windows\SysWOW64\Fmelle32.exeC:\Windows\system32\Fmelle32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1320 -
C:\Windows\SysWOW64\Ffnpdkmd.exeC:\Windows\system32\Ffnpdkmd.exe33⤵
- Executes dropped EXE
PID:932 -
C:\Windows\SysWOW64\Gpfemp32.exeC:\Windows\system32\Gpfemp32.exe34⤵
- Executes dropped EXE
PID:1900 -
C:\Windows\SysWOW64\Giniff32.exeC:\Windows\system32\Giniff32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1348 -
C:\Windows\SysWOW64\Gbfnokqf.exeC:\Windows\system32\Gbfnokqf.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1316 -
C:\Windows\SysWOW64\Gbijdkoc.exeC:\Windows\system32\Gbijdkoc.exe37⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\Gicbaefp.exeC:\Windows\system32\Gicbaefp.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:316 -
C:\Windows\SysWOW64\Glclcpca.exeC:\Windows\system32\Glclcpca.exe39⤵
- Executes dropped EXE
PID:760 -
C:\Windows\SysWOW64\Jkddonpg.exeC:\Windows\system32\Jkddonpg.exe40⤵
- Executes dropped EXE
PID:828 -
C:\Windows\SysWOW64\Eolonh32.exeC:\Windows\system32\Eolonh32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\Ikhnijgi.exeC:\Windows\system32\Ikhnijgi.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:1736 -
C:\Windows\SysWOW64\Jpaopnfb.exeC:\Windows\system32\Jpaopnfb.exe43⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\Jglgmh32.exeC:\Windows\system32\Jglgmh32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:900 -
C:\Windows\SysWOW64\Jilpnc32.exeC:\Windows\system32\Jilpnc32.exe45⤵
- Executes dropped EXE
PID:524 -
C:\Windows\SysWOW64\Klmipnha.exeC:\Windows\system32\Klmipnha.exe46⤵
- Executes dropped EXE
PID:668 -
C:\Windows\SysWOW64\Kcgamh32.exeC:\Windows\system32\Kcgamh32.exe47⤵
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\Keenid32.exeC:\Windows\system32\Keenid32.exe48⤵
- Executes dropped EXE
PID:1292 -
C:\Windows\SysWOW64\Klpfeneo.exeC:\Windows\system32\Klpfeneo.exe49⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\SysWOW64\Kdkkjp32.exeC:\Windows\system32\Kdkkjp32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1364 -
C:\Windows\SysWOW64\Kncocfij.exeC:\Windows\system32\Kncocfij.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\Kqakoain.exeC:\Windows\system32\Kqakoain.exe52⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\Kkgpljhd.exeC:\Windows\system32\Kkgpljhd.exe53⤵
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\Knelhegh.exeC:\Windows\system32\Knelhegh.exe54⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\Kqdhda32.exeC:\Windows\system32\Kqdhda32.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\Kqfejq32.exeC:\Windows\system32\Kqfejq32.exe56⤵
- Executes dropped EXE
PID:1352 -
C:\Windows\SysWOW64\Lmmeoajm.exeC:\Windows\system32\Lmmeoajm.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\Lgbjlj32.exeC:\Windows\system32\Lgbjlj32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\Lmobda32.exeC:\Windows\system32\Lmobda32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2000 -
C:\Windows\SysWOW64\Lonnqm32.exeC:\Windows\system32\Lonnqm32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1996 -
C:\Windows\SysWOW64\Lfgfmgok.exeC:\Windows\system32\Lfgfmgok.exe61⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Lopkfl32.exeC:\Windows\system32\Lopkfl32.exe62⤵
- Executes dropped EXE
PID:1820 -
C:\Windows\SysWOW64\Lbngbhdo.exeC:\Windows\system32\Lbngbhdo.exe63⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\Lobhllci.exeC:\Windows\system32\Lobhllci.exe64⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Lbqdhgbl.exeC:\Windows\system32\Lbqdhgbl.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\Lgnmpnqd.exeC:\Windows\system32\Lgnmpnqd.exe66⤵
- Drops file in System32 directory
PID:1948 -
C:\Windows\SysWOW64\Mafaidgd.exeC:\Windows\system32\Mafaidgd.exe67⤵PID:1984
-
C:\Windows\SysWOW64\Mgpifn32.exeC:\Windows\system32\Mgpifn32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1056 -
C:\Windows\SysWOW64\Mahnocea.exeC:\Windows\system32\Mahnocea.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1696 -
C:\Windows\SysWOW64\Mmoncd32.exeC:\Windows\system32\Mmoncd32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1388 -
C:\Windows\SysWOW64\Mnokng32.exeC:\Windows\system32\Mnokng32.exe71⤵
- Drops file in System32 directory
- Modifies registry class
PID:472 -
C:\Windows\SysWOW64\Mmakidic.exeC:\Windows\system32\Mmakidic.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1152 -
C:\Windows\SysWOW64\Mppgephg.exeC:\Windows\system32\Mppgephg.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1312 -
C:\Windows\SysWOW64\Mmdhodgq.exeC:\Windows\system32\Mmdhodgq.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1200 -
C:\Windows\SysWOW64\Mbqpgk32.exeC:\Windows\system32\Mbqpgk32.exe75⤵
- Modifies registry class
PID:1268 -
C:\Windows\SysWOW64\Npdqpo32.exeC:\Windows\system32\Npdqpo32.exe76⤵PID:1812
-
C:\Windows\SysWOW64\Neaihf32.exeC:\Windows\system32\Neaihf32.exe77⤵PID:1884
-
C:\Windows\SysWOW64\Nlkaepif.exeC:\Windows\system32\Nlkaepif.exe78⤵
- Drops file in System32 directory
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\Nnjnakhi.exeC:\Windows\system32\Nnjnakhi.exe79⤵
- Drops file in System32 directory
PID:1580 -
C:\Windows\SysWOW64\Nbejbj32.exeC:\Windows\system32\Nbejbj32.exe80⤵
- Drops file in System32 directory
PID:1636 -
C:\Windows\SysWOW64\Necfnepf.exeC:\Windows\system32\Necfnepf.exe81⤵PID:2052
-
C:\Windows\SysWOW64\Niobod32.exeC:\Windows\system32\Niobod32.exe82⤵PID:2060
-
C:\Windows\SysWOW64\Npijknpl.exeC:\Windows\system32\Npijknpl.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2068 -
C:\Windows\SysWOW64\Nefbcenc.exeC:\Windows\system32\Nefbcenc.exe84⤵PID:2076
-
C:\Windows\SysWOW64\Nhdopqmg.exeC:\Windows\system32\Nhdopqmg.exe85⤵PID:2084
-
C:\Windows\SysWOW64\Namcif32.exeC:\Windows\system32\Namcif32.exe86⤵PID:2092
-
C:\Windows\SysWOW64\Nlbgfocn.exeC:\Windows\system32\Nlbgfocn.exe87⤵PID:2100
-
C:\Windows\SysWOW64\Noqdbjba.exeC:\Windows\system32\Noqdbjba.exe88⤵PID:2108
-
C:\Windows\SysWOW64\Oflhfmpm.exeC:\Windows\system32\Oflhfmpm.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Oocqgjqo.exeC:\Windows\system32\Oocqgjqo.exe90⤵
- Modifies registry class
PID:2124 -
C:\Windows\SysWOW64\Oaamdepb.exeC:\Windows\system32\Oaamdepb.exe91⤵PID:2132
-
C:\Windows\SysWOW64\Ohkeqpgo.exeC:\Windows\system32\Ohkeqpgo.exe92⤵
- Modifies registry class
PID:2140 -
C:\Windows\SysWOW64\Okjamkfc.exeC:\Windows\system32\Okjamkfc.exe93⤵PID:2148
-
C:\Windows\SysWOW64\Omhnifeg.exeC:\Windows\system32\Omhnifeg.exe94⤵PID:2156
-
C:\Windows\SysWOW64\Opfjebdj.exeC:\Windows\system32\Opfjebdj.exe95⤵
- Modifies registry class
PID:2164 -
C:\Windows\SysWOW64\Ogqbal32.exeC:\Windows\system32\Ogqbal32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2172 -
C:\Windows\SysWOW64\Oionng32.exeC:\Windows\system32\Oionng32.exe97⤵PID:2180
-
C:\Windows\SysWOW64\Omjjnfcd.exeC:\Windows\system32\Omjjnfcd.exe98⤵PID:2188
-
C:\Windows\SysWOW64\Opifjabh.exeC:\Windows\system32\Opifjabh.exe99⤵
- Modifies registry class
PID:2196 -
C:\Windows\SysWOW64\Oddbkp32.exeC:\Windows\system32\Oddbkp32.exe100⤵PID:2204
-
C:\Windows\SysWOW64\Oefobhqo.exeC:\Windows\system32\Oefobhqo.exe101⤵PID:2212
-
C:\Windows\SysWOW64\Oonckngp.exeC:\Windows\system32\Oonckngp.exe102⤵PID:2220
-
C:\Windows\SysWOW64\Plbdebfi.exeC:\Windows\system32\Plbdebfi.exe103⤵
- Drops file in System32 directory
PID:2228 -
C:\Windows\SysWOW64\Ppnpea32.exeC:\Windows\system32\Ppnpea32.exe104⤵PID:2236
-
C:\Windows\SysWOW64\Pcllal32.exeC:\Windows\system32\Pcllal32.exe105⤵
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\Paolmidq.exeC:\Windows\system32\Paolmidq.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2256 -
C:\Windows\SysWOW64\Pifdnfec.exeC:\Windows\system32\Pifdnfec.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\Phidjc32.exeC:\Windows\system32\Phidjc32.exe108⤵
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\Pldqjb32.exeC:\Windows\system32\Pldqjb32.exe109⤵
- Drops file in System32 directory
PID:2308 -
C:\Windows\SysWOW64\Paaibi32.exeC:\Windows\system32\Paaibi32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2324 -
C:\Windows\SysWOW64\Pemecgjg.exeC:\Windows\system32\Pemecgjg.exe111⤵PID:2340
-
C:\Windows\SysWOW64\Phkaocik.exeC:\Windows\system32\Phkaocik.exe112⤵PID:2360
-
C:\Windows\SysWOW64\Plgmpa32.exeC:\Windows\system32\Plgmpa32.exe113⤵PID:2376
-
C:\Windows\SysWOW64\Pnhjhjhb.exeC:\Windows\system32\Pnhjhjhb.exe114⤵PID:2400
-
C:\Windows\SysWOW64\Pacfhh32.exeC:\Windows\system32\Pacfhh32.exe115⤵PID:2412
-
C:\Windows\SysWOW64\Pdbbdd32.exeC:\Windows\system32\Pdbbdd32.exe116⤵
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\Pkljan32.exeC:\Windows\system32\Pkljan32.exe117⤵
- Modifies registry class
PID:2456 -
C:\Windows\SysWOW64\Pogfamoe.exeC:\Windows\system32\Pogfamoe.exe118⤵PID:2484
-
C:\Windows\SysWOW64\Pafbnhni.exeC:\Windows\system32\Pafbnhni.exe119⤵
- Modifies registry class
PID:2508 -
C:\Windows\SysWOW64\Pddojcml.exeC:\Windows\system32\Pddojcml.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2552 -
C:\Windows\SysWOW64\Pjagbjkc.exeC:\Windows\system32\Pjagbjkc.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2604 -
C:\Windows\SysWOW64\Pdgkpckj.exeC:\Windows\system32\Pdgkpckj.exe122⤵PID:2632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-