Analysis
-
max time kernel
150s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe
Resource
win10v2004-20221111-en
General
-
Target
62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe
-
Size
50KB
-
MD5
a4ebdf5e0acd62a0e53c0fc226b6eeb0
-
SHA1
46a00b667ad34a6370f063881ecdad4e0efa7173
-
SHA256
62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3
-
SHA512
8dec33a36dd4830f5ac8f74a7e7295bccdb1a0e06063325ac3b6d95637ccdd21e3489495a8ebc00dd7d1ca8373026788c9d0cd26f97181e6086151aa41d744db
-
SSDEEP
768:g/KHOcZ2/3BlrKiQixpFvBgNY3MCiTDVF5yUhIz7zWn169lfy5WzKr9UxmTq6K9U:gncZc3BlrKXi4mlNmUATqhGHEm3
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Icgfke32.exeAkoflm32.exeJgokmnoh.exePncjnh32.exeFoalpd32.exeKmhjim32.exeGchcja32.exeEboigp32.exeIkhbjg32.exePeijnh32.exeEcmikcfd.exeBbgonofm.exePckikpqc.exeAblfhkkn.exeAlidopkp.exeAmkeci32.exeBmemki32.exePnnabibl.exePqdcoc32.exeBicnnh32.exeKokpphgk.exeBnofkjdk.exeApmcfe32.exeHdedoi32.exeCiljomdk.exeJfgipk32.exeLmhfhp32.exeLiogma32.exeBfaeah32.exeBakfbf32.exeAkjlanhm.exeBllbpdph.exeEffllp32.exeEcjled32.exeDacnon32.exeKogfeh32.exePllnegaj.exeDgmjae32.exePggeko32.exeBhmdjd32.exeDbigbb32.exeDhmflhoe.exeHilemp32.exeDpjkfg32.exeBdkodabc.exeOcpggljb.exeAnqjgl32.exeAifnde32.exeEbhkak32.exeHigegkgg.exeQapkcico.exeHhlgeh32.exeHfimmqgl.exeAckkld32.exeNaqnnfpd.exeLemacn32.exeBdgfdf32.exeAjgklmhi.exeMjlcqhpm.exeNblapi32.exeNeljadfd.exeAibfhjka.exeDmngcjbl.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icgfke32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akoflm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgokmnoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pncjnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Foalpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmhjim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gchcja32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eboigp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikhbjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peijnh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecmikcfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbgonofm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pckikpqc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ablfhkkn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alidopkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amkeci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmemki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnnabibl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqdcoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bicnnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kokpphgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnofkjdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apmcfe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdedoi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciljomdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfgipk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmhfhp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liogma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfaeah32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bakfbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akjlanhm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bllbpdph.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Effllp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecjled32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dacnon32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kogfeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pllnegaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgmjae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pggeko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhmdjd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbigbb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmflhoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hilemp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpjkfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdkodabc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocpggljb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anqjgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aifnde32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebhkak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Higegkgg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qapkcico.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhlgeh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfimmqgl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ackkld32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Naqnnfpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lemacn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdgfdf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pggeko32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajgklmhi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjlcqhpm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nblapi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neljadfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aibfhjka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmngcjbl.exe -
Executes dropped EXE 64 IoCs
Processes:
Dfeamlhb.exeEhejog32.exeEnbcgn32.exeEhhgdg32.exeEdohih32.exeEqehoini.exeEjnmgo32.exeEicjhk32.exeFfgjbo32.exeFfiggofh.exeFoalpd32.exeFpdhfd32.exeFeaank32.exeFahacl32.exeGmnbhmdf.exeGnnobpli.exeGfkplbga.exeGbbaacme.exeGilinm32.exeGpfajgko.exeHiofcm32.exeHbgjlb32.exeHiabilpm.exeHbigab32.exeHdjcijll.exeHmchbpcl.exeHdmpoj32.exeHmedhoai.exeHilemp32.exeIgpffdeg.exeIcgfke32.exeIpkgdjje.exeIickmo32.exeIlddoj32.exeJkiapg32.exeJjchlb32.exeKcpepgel.exeKmhjim32.exeKogfeh32.exeKfqobbbm.exeKmkgom32.exeKnlcfeph.exeKdfkcoge.exeKokpphgk.exeKbjllcfo.exeKgfddjdf.exeLjeqaecj.exeLqoinp32.exeLcmejkjj.exeLjgmfe32.exeLncigdjp.exeLemacn32.exeLgknpi32.exeLmhfhp32.exeLgnkeinn.exeLiogma32.exeLafono32.exeLfcgfe32.exeLlppol32.exeMfedleac.exeMmolio32.exeMpniek32.exeMnpipgno.exeMfgaaeoq.exepid process 1160 Dfeamlhb.exe 1676 Ehejog32.exe 1316 Enbcgn32.exe 1312 Ehhgdg32.exe 948 Edohih32.exe 1132 Eqehoini.exe 336 Ejnmgo32.exe 568 Eicjhk32.exe 108 Ffgjbo32.exe 1176 Ffiggofh.exe 1800 Foalpd32.exe 364 Fpdhfd32.exe 1772 Feaank32.exe 1908 Fahacl32.exe 1548 Gmnbhmdf.exe 560 Gnnobpli.exe 1028 Gfkplbga.exe 1892 Gbbaacme.exe 924 Gilinm32.exe 1472 Gpfajgko.exe 1476 Hiofcm32.exe 1088 Hbgjlb32.exe 1084 Hiabilpm.exe 1140 Hbigab32.exe 1988 Hdjcijll.exe 1520 Hmchbpcl.exe 1588 Hdmpoj32.exe 1380 Hmedhoai.exe 1508 Hilemp32.exe 1740 Igpffdeg.exe 1356 Icgfke32.exe 988 Ipkgdjje.exe 1692 Iickmo32.exe 468 Ilddoj32.exe 1352 Jkiapg32.exe 1544 Jjchlb32.exe 268 Kcpepgel.exe 304 Kmhjim32.exe 1576 Kogfeh32.exe 1144 Kfqobbbm.exe 864 Kmkgom32.exe 956 Knlcfeph.exe 1596 Kdfkcoge.exe 1600 Kokpphgk.exe 1164 Kbjllcfo.exe 536 Kgfddjdf.exe 996 Ljeqaecj.exe 1032 Lqoinp32.exe 1912 Lcmejkjj.exe 1100 Ljgmfe32.exe 1536 Lncigdjp.exe 1732 Lemacn32.exe 1992 Lgknpi32.exe 1216 Lmhfhp32.exe 1204 Lgnkeinn.exe 1212 Liogma32.exe 1404 Lafono32.exe 976 Lfcgfe32.exe 1248 Llppol32.exe 824 Mfedleac.exe 1528 Mmolio32.exe 1632 Mpniek32.exe 1928 Mnpipgno.exe 1344 Mfgaaeoq.exe -
Loads dropped DLL 64 IoCs
Processes:
62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exeDfeamlhb.exeEhejog32.exeEnbcgn32.exeEhhgdg32.exeEdohih32.exeEqehoini.exeEjnmgo32.exeEicjhk32.exeFfgjbo32.exeFfiggofh.exeFoalpd32.exeFpdhfd32.exeFeaank32.exeFahacl32.exeGmnbhmdf.exeGnnobpli.exeGfkplbga.exeGbbaacme.exeGilinm32.exeGpfajgko.exeHiofcm32.exeHbgjlb32.exeHiabilpm.exeHbigab32.exeHdjcijll.exeHmchbpcl.exeHdmpoj32.exeHmedhoai.exeHilemp32.exeIgpffdeg.exeIcgfke32.exepid process 1976 62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe 1976 62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe 1160 Dfeamlhb.exe 1160 Dfeamlhb.exe 1676 Ehejog32.exe 1676 Ehejog32.exe 1316 Enbcgn32.exe 1316 Enbcgn32.exe 1312 Ehhgdg32.exe 1312 Ehhgdg32.exe 948 Edohih32.exe 948 Edohih32.exe 1132 Eqehoini.exe 1132 Eqehoini.exe 336 Ejnmgo32.exe 336 Ejnmgo32.exe 568 Eicjhk32.exe 568 Eicjhk32.exe 108 Ffgjbo32.exe 108 Ffgjbo32.exe 1176 Ffiggofh.exe 1176 Ffiggofh.exe 1800 Foalpd32.exe 1800 Foalpd32.exe 364 Fpdhfd32.exe 364 Fpdhfd32.exe 1772 Feaank32.exe 1772 Feaank32.exe 1908 Fahacl32.exe 1908 Fahacl32.exe 1548 Gmnbhmdf.exe 1548 Gmnbhmdf.exe 560 Gnnobpli.exe 560 Gnnobpli.exe 1028 Gfkplbga.exe 1028 Gfkplbga.exe 1892 Gbbaacme.exe 1892 Gbbaacme.exe 924 Gilinm32.exe 924 Gilinm32.exe 1472 Gpfajgko.exe 1472 Gpfajgko.exe 1476 Hiofcm32.exe 1476 Hiofcm32.exe 1088 Hbgjlb32.exe 1088 Hbgjlb32.exe 1084 Hiabilpm.exe 1084 Hiabilpm.exe 1140 Hbigab32.exe 1140 Hbigab32.exe 1988 Hdjcijll.exe 1988 Hdjcijll.exe 1520 Hmchbpcl.exe 1520 Hmchbpcl.exe 1588 Hdmpoj32.exe 1588 Hdmpoj32.exe 1380 Hmedhoai.exe 1380 Hmedhoai.exe 1508 Hilemp32.exe 1508 Hilemp32.exe 1740 Igpffdeg.exe 1740 Igpffdeg.exe 1356 Icgfke32.exe 1356 Icgfke32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Bdnlia32.exeNdojjaoh.exePncjnh32.exeEbhkak32.exeHooepf32.exeBblbgnni.exeGpmmghea.exeMnbffgll.exeNojlfffd.exeOcedfh32.exeHdcgjiec.exeCjiicq32.exeFhbcnefe.exeCpfbkgkg.exeAojdha32.exeKcpepgel.exeKbjllcfo.exeLjgmfe32.exePdpcdool.exeAjcnlhjg.exeBddeoe32.exeAnijinmk.exeBfihho32.exeCdoafffc.exeDlepia32.exeEhnjce32.exeEpffedje.exeDpjkfg32.exeNkkolkeb.exeKogfeh32.exeMeijdhma.exeHmjcoq32.exeGigihgdl.exeHpldie32.exeEhondgic.exeFeaank32.exeCadihe32.exeCfaaqllo.exeDoeikmao.exeEfajljid.exeHkkcac32.exeHjbmgp32.exeQbnpim32.exeBagbdloj.exeBeekjkea.exeEliecd32.exeGiiengbi.exePeijnh32.exeIpbcak32.exeNobabjaq.exeMfedleac.exeBnmnglef.exeObqjmi32.exeBbchgm32.exeEfimcqfb.exeOkkkkn32.exeEqehoini.exeNldfio32.exeDnfmmnpg.exeCfbgna32.exedescription ioc process File created C:\Windows\SysWOW64\Mcglegah.dll Bdnlia32.exe File opened for modification C:\Windows\SysWOW64\Nodngj32.exe Ndojjaoh.exe File created C:\Windows\SysWOW64\Lgconaoi.dll Pncjnh32.exe File created C:\Windows\SysWOW64\Fhbcnefe.exe Ebhkak32.exe File created C:\Windows\SysWOW64\Nknnbb32.dll Hooepf32.exe File created C:\Windows\SysWOW64\Bifjch32.exe Bblbgnni.exe File created C:\Windows\SysWOW64\Hmhgia32.exe Gpmmghea.exe File created C:\Windows\SysWOW64\Klofam32.dll Mnbffgll.exe File opened for modification C:\Windows\SysWOW64\Nahhbaeg.exe Nojlfffd.exe File created C:\Windows\SysWOW64\Njbcdhdi.dll Ocedfh32.exe File created C:\Windows\SysWOW64\Hgacfddf.exe Hdcgjiec.exe File created C:\Windows\SysWOW64\Apofob32.dll Cjiicq32.exe File opened for modification C:\Windows\SysWOW64\Fbkggjmf.exe Fhbcnefe.exe File created C:\Windows\SysWOW64\Cbdngckk.exe Cpfbkgkg.exe File created C:\Windows\SysWOW64\Nckami32.exe Aojdha32.exe File created C:\Windows\SysWOW64\Kmhjim32.exe Kcpepgel.exe File opened for modification C:\Windows\SysWOW64\Kgfddjdf.exe Kbjllcfo.exe File created C:\Windows\SysWOW64\Lncigdjp.exe Ljgmfe32.exe File opened for modification C:\Windows\SysWOW64\Pcbcpl32.exe Pdpcdool.exe File created C:\Windows\SysWOW64\Pemafm32.dll Ajcnlhjg.exe File created C:\Windows\SysWOW64\Bhpapdfi.exe Bddeoe32.exe File created C:\Windows\SysWOW64\Aqgfeilo.exe Anijinmk.exe File opened for modification C:\Windows\SysWOW64\Bjddinoj.exe Bfihho32.exe File created C:\Windows\SysWOW64\Ofcochak.dll Cdoafffc.exe File created C:\Windows\SysWOW64\Ccedhh32.dll Nojlfffd.exe File opened for modification C:\Windows\SysWOW64\Dbohflkk.exe Dlepia32.exe File created C:\Windows\SysWOW64\Jpoicnfm.dll Ehnjce32.exe File opened for modification C:\Windows\SysWOW64\Enhfaa32.exe Epffedje.exe File created C:\Windows\SysWOW64\Gjokdi32.dll Hdcgjiec.exe File created C:\Windows\SysWOW64\Dbigbb32.exe Dpjkfg32.exe File opened for modification C:\Windows\SysWOW64\Ngbpal32.exe Nkkolkeb.exe File created C:\Windows\SysWOW64\Mkgkbfmk.dll Kogfeh32.exe File created C:\Windows\SysWOW64\Lbffko32.dll Meijdhma.exe File created C:\Windows\SysWOW64\Hhphli32.exe Hmjcoq32.exe File opened for modification C:\Windows\SysWOW64\Ggjicd32.exe Gigihgdl.exe File opened for modification C:\Windows\SysWOW64\Hcgpidkb.exe Hpldie32.exe File created C:\Windows\SysWOW64\Epffedje.exe Ehondgic.exe File opened for modification C:\Windows\SysWOW64\Fahacl32.exe Feaank32.exe File opened for modification C:\Windows\SysWOW64\Cfaaqllo.exe Cadihe32.exe File opened for modification C:\Windows\SysWOW64\Dekhmgla.exe Cfaaqllo.exe File created C:\Windows\SysWOW64\Depahg32.exe Doeikmao.exe File created C:\Windows\SysWOW64\Ellbid32.exe Efajljid.exe File opened for modification C:\Windows\SysWOW64\Haeknnfo.exe Hkkcac32.exe File created C:\Windows\SysWOW64\Hlqick32.exe Hjbmgp32.exe File opened for modification C:\Windows\SysWOW64\Andpnn32.exe Qbnpim32.exe File opened for modification C:\Windows\SysWOW64\Binjejpm.exe Bagbdloj.exe File created C:\Windows\SysWOW64\Fcjdgdeh.dll Beekjkea.exe File created C:\Windows\SysWOW64\Odmlmd32.dll Eliecd32.exe File created C:\Windows\SysWOW64\Hmkkgjeh.exe Giiengbi.exe File created C:\Windows\SysWOW64\Dahicf32.dll Peijnh32.exe File created C:\Windows\SysWOW64\Ibpomf32.exe Ipbcak32.exe File opened for modification C:\Windows\SysWOW64\Naqnnfpd.exe Nobabjaq.exe File created C:\Windows\SysWOW64\Mmolio32.exe Mfedleac.exe File created C:\Windows\SysWOW64\Bkioao32.dll Bnmnglef.exe File created C:\Windows\SysWOW64\Olfnjb32.exe Obqjmi32.exe File created C:\Windows\SysWOW64\Beadchge.exe Bbchgm32.exe File opened for modification C:\Windows\SysWOW64\Efliiqdp.exe Efimcqfb.exe File opened for modification C:\Windows\SysWOW64\Hmhgia32.exe Gpmmghea.exe File opened for modification C:\Windows\SysWOW64\Oogglmpg.exe Okkkkn32.exe File created C:\Windows\SysWOW64\Ejnmgo32.exe Eqehoini.exe File opened for modification C:\Windows\SysWOW64\Neljadfd.exe Nldfio32.exe File created C:\Windows\SysWOW64\Pcbcpl32.exe Pdpcdool.exe File created C:\Windows\SysWOW64\Jdcjpfki.dll Dnfmmnpg.exe File created C:\Windows\SysWOW64\Dhccejgp.exe Cfbgna32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3528 3816 WerFault.exe Bknmlpem.exe -
Modifies registry class 64 IoCs
Processes:
Oimpmbkh.exeBfaeah32.exeDbohflkk.exeNghnlmhg.exeHjbmgp32.exeIbnbgf32.exeBldgpc32.exeCncpfj32.exeCadihe32.exeDpjkfg32.exePcbpko32.exeBemkhi32.exeMihjcp32.exeBheojdcj.exeEffllp32.exeEenecl32.exeHaeknnfo.exeAckkld32.exeCdoafffc.exeEfimcqfb.exeGfnbmc32.exeIpbcak32.exeOlfnjb32.exeAddipbkd.exeBblbgnni.exeKnlcfeph.exeAndpnn32.exeHlamem32.exeNgbpal32.exeFahacl32.exeMnebkg32.exeDhlqnb32.exeIkhbjg32.exeBeekjkea.exeFjeecc32.exePimknf32.exeBdnlia32.exeDenidh32.exeCiljomdk.exeCfbgna32.exeOogglmpg.exeQkmdpahf.exeBdkodabc.exeEccnpnja.exeDcebjd32.exeNodngj32.exeObechhoj.exePqdcoc32.exeBpmfjbof.exeEnbcgn32.exeGfkplbga.exeIcgfke32.exeLncigdjp.exeNldfio32.exeBimdhd32.exeDelmjmad.exeEfmqaj32.exeFhakjfgq.exeFeekckfj.exeBmemki32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oimpmbkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohkfboec.dll" Bfaeah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pipefg32.dll" Dbohflkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Loaagnfg.dll" Nghnlmhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjbmgp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibnbgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djbejk32.dll" Bldgpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhapnk32.dll" Cncpfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhfmpnec.dll" Cadihe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpjkfg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcbpko32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bemkhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mihjcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hefeglmi.dll" Bheojdcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kldele32.dll" Effllp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eenecl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Haeknnfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ackkld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofcochak.dll" Cdoafffc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efimcqfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Doindokq.dll" Gfnbmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipbcak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmbcjjli.dll" Olfnjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imhgdmdk.dll" Addipbkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bblbgnni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghhjhhgk.dll" Knlcfeph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Andpnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iqchie32.dll" Hlamem32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngbpal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fahacl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkgblhba.dll" Mnebkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhlqnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikhbjg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Beekjkea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjeecc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdbeii32.dll" Pimknf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcglegah.dll" Bdnlia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cadihe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdidogda.dll" Denidh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icpdkp32.dll" Ciljomdk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfbgna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oogglmpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dndodg32.dll" Qkmdpahf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdkodabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnbkmkbh.dll" Eccnpnja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkhikagk.dll" Dcebjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clolea32.dll" Nodngj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obechhoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chbdef32.dll" Pqdcoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idbaacec.dll" Bpmfjbof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enbcgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gfkplbga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eahkgpgd.dll" Icgfke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lncigdjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkmpbn32.dll" Nldfio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bimdhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dbohflkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enagbq32.dll" Delmjmad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lncigdjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cadihe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpjiad32.dll" Efmqaj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhakjfgq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfcdkf32.dll" Feekckfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmemki32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exeDfeamlhb.exeEhejog32.exeEnbcgn32.exeEhhgdg32.exeEdohih32.exeEqehoini.exeEjnmgo32.exeEicjhk32.exeFfgjbo32.exeFfiggofh.exeFoalpd32.exeFpdhfd32.exeFeaank32.exeFahacl32.exeGmnbhmdf.exedescription pid process target process PID 1976 wrote to memory of 1160 1976 62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe Dfeamlhb.exe PID 1976 wrote to memory of 1160 1976 62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe Dfeamlhb.exe PID 1976 wrote to memory of 1160 1976 62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe Dfeamlhb.exe PID 1976 wrote to memory of 1160 1976 62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe Dfeamlhb.exe PID 1160 wrote to memory of 1676 1160 Dfeamlhb.exe Ehejog32.exe PID 1160 wrote to memory of 1676 1160 Dfeamlhb.exe Ehejog32.exe PID 1160 wrote to memory of 1676 1160 Dfeamlhb.exe Ehejog32.exe PID 1160 wrote to memory of 1676 1160 Dfeamlhb.exe Ehejog32.exe PID 1676 wrote to memory of 1316 1676 Ehejog32.exe Enbcgn32.exe PID 1676 wrote to memory of 1316 1676 Ehejog32.exe Enbcgn32.exe PID 1676 wrote to memory of 1316 1676 Ehejog32.exe Enbcgn32.exe PID 1676 wrote to memory of 1316 1676 Ehejog32.exe Enbcgn32.exe PID 1316 wrote to memory of 1312 1316 Enbcgn32.exe Ehhgdg32.exe PID 1316 wrote to memory of 1312 1316 Enbcgn32.exe Ehhgdg32.exe PID 1316 wrote to memory of 1312 1316 Enbcgn32.exe Ehhgdg32.exe PID 1316 wrote to memory of 1312 1316 Enbcgn32.exe Ehhgdg32.exe PID 1312 wrote to memory of 948 1312 Ehhgdg32.exe Edohih32.exe PID 1312 wrote to memory of 948 1312 Ehhgdg32.exe Edohih32.exe PID 1312 wrote to memory of 948 1312 Ehhgdg32.exe Edohih32.exe PID 1312 wrote to memory of 948 1312 Ehhgdg32.exe Edohih32.exe PID 948 wrote to memory of 1132 948 Edohih32.exe Eqehoini.exe PID 948 wrote to memory of 1132 948 Edohih32.exe Eqehoini.exe PID 948 wrote to memory of 1132 948 Edohih32.exe Eqehoini.exe PID 948 wrote to memory of 1132 948 Edohih32.exe Eqehoini.exe PID 1132 wrote to memory of 336 1132 Eqehoini.exe Ejnmgo32.exe PID 1132 wrote to memory of 336 1132 Eqehoini.exe Ejnmgo32.exe PID 1132 wrote to memory of 336 1132 Eqehoini.exe Ejnmgo32.exe PID 1132 wrote to memory of 336 1132 Eqehoini.exe Ejnmgo32.exe PID 336 wrote to memory of 568 336 Ejnmgo32.exe Eicjhk32.exe PID 336 wrote to memory of 568 336 Ejnmgo32.exe Eicjhk32.exe PID 336 wrote to memory of 568 336 Ejnmgo32.exe Eicjhk32.exe PID 336 wrote to memory of 568 336 Ejnmgo32.exe Eicjhk32.exe PID 568 wrote to memory of 108 568 Eicjhk32.exe Ffgjbo32.exe PID 568 wrote to memory of 108 568 Eicjhk32.exe Ffgjbo32.exe PID 568 wrote to memory of 108 568 Eicjhk32.exe Ffgjbo32.exe PID 568 wrote to memory of 108 568 Eicjhk32.exe Ffgjbo32.exe PID 108 wrote to memory of 1176 108 Ffgjbo32.exe Ffiggofh.exe PID 108 wrote to memory of 1176 108 Ffgjbo32.exe Ffiggofh.exe PID 108 wrote to memory of 1176 108 Ffgjbo32.exe Ffiggofh.exe PID 108 wrote to memory of 1176 108 Ffgjbo32.exe Ffiggofh.exe PID 1176 wrote to memory of 1800 1176 Ffiggofh.exe Foalpd32.exe PID 1176 wrote to memory of 1800 1176 Ffiggofh.exe Foalpd32.exe PID 1176 wrote to memory of 1800 1176 Ffiggofh.exe Foalpd32.exe PID 1176 wrote to memory of 1800 1176 Ffiggofh.exe Foalpd32.exe PID 1800 wrote to memory of 364 1800 Foalpd32.exe Fpdhfd32.exe PID 1800 wrote to memory of 364 1800 Foalpd32.exe Fpdhfd32.exe PID 1800 wrote to memory of 364 1800 Foalpd32.exe Fpdhfd32.exe PID 1800 wrote to memory of 364 1800 Foalpd32.exe Fpdhfd32.exe PID 364 wrote to memory of 1772 364 Fpdhfd32.exe Feaank32.exe PID 364 wrote to memory of 1772 364 Fpdhfd32.exe Feaank32.exe PID 364 wrote to memory of 1772 364 Fpdhfd32.exe Feaank32.exe PID 364 wrote to memory of 1772 364 Fpdhfd32.exe Feaank32.exe PID 1772 wrote to memory of 1908 1772 Feaank32.exe Fahacl32.exe PID 1772 wrote to memory of 1908 1772 Feaank32.exe Fahacl32.exe PID 1772 wrote to memory of 1908 1772 Feaank32.exe Fahacl32.exe PID 1772 wrote to memory of 1908 1772 Feaank32.exe Fahacl32.exe PID 1908 wrote to memory of 1548 1908 Fahacl32.exe Gmnbhmdf.exe PID 1908 wrote to memory of 1548 1908 Fahacl32.exe Gmnbhmdf.exe PID 1908 wrote to memory of 1548 1908 Fahacl32.exe Gmnbhmdf.exe PID 1908 wrote to memory of 1548 1908 Fahacl32.exe Gmnbhmdf.exe PID 1548 wrote to memory of 560 1548 Gmnbhmdf.exe Gnnobpli.exe PID 1548 wrote to memory of 560 1548 Gmnbhmdf.exe Gnnobpli.exe PID 1548 wrote to memory of 560 1548 Gmnbhmdf.exe Gnnobpli.exe PID 1548 wrote to memory of 560 1548 Gmnbhmdf.exe Gnnobpli.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe"C:\Users\Admin\AppData\Local\Temp\62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\Dfeamlhb.exeC:\Windows\system32\Dfeamlhb.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\Ehejog32.exeC:\Windows\system32\Ehejog32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\Enbcgn32.exeC:\Windows\system32\Enbcgn32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\Ehhgdg32.exeC:\Windows\system32\Ehhgdg32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\Edohih32.exeC:\Windows\system32\Edohih32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\Eqehoini.exeC:\Windows\system32\Eqehoini.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\Ejnmgo32.exeC:\Windows\system32\Ejnmgo32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\Eicjhk32.exeC:\Windows\system32\Eicjhk32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\Ffgjbo32.exeC:\Windows\system32\Ffgjbo32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\Ffiggofh.exeC:\Windows\system32\Ffiggofh.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\Foalpd32.exeC:\Windows\system32\Foalpd32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\Fpdhfd32.exeC:\Windows\system32\Fpdhfd32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\Feaank32.exeC:\Windows\system32\Feaank32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\Fahacl32.exeC:\Windows\system32\Fahacl32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\Gmnbhmdf.exeC:\Windows\system32\Gmnbhmdf.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\Gnnobpli.exeC:\Windows\system32\Gnnobpli.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560 -
C:\Windows\SysWOW64\Gfkplbga.exeC:\Windows\system32\Gfkplbga.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1028 -
C:\Windows\SysWOW64\Gbbaacme.exeC:\Windows\system32\Gbbaacme.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1892 -
C:\Windows\SysWOW64\Gilinm32.exeC:\Windows\system32\Gilinm32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:924 -
C:\Windows\SysWOW64\Gpfajgko.exeC:\Windows\system32\Gpfajgko.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1472 -
C:\Windows\SysWOW64\Hiofcm32.exeC:\Windows\system32\Hiofcm32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1476 -
C:\Windows\SysWOW64\Hbgjlb32.exeC:\Windows\system32\Hbgjlb32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088 -
C:\Windows\SysWOW64\Hiabilpm.exeC:\Windows\system32\Hiabilpm.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1084 -
C:\Windows\SysWOW64\Hbigab32.exeC:\Windows\system32\Hbigab32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1140 -
C:\Windows\SysWOW64\Hdjcijll.exeC:\Windows\system32\Hdjcijll.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Windows\SysWOW64\Hmchbpcl.exeC:\Windows\system32\Hmchbpcl.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1520 -
C:\Windows\SysWOW64\Hdmpoj32.exeC:\Windows\system32\Hdmpoj32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1588 -
C:\Windows\SysWOW64\Hmedhoai.exeC:\Windows\system32\Hmedhoai.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1380 -
C:\Windows\SysWOW64\Hilemp32.exeC:\Windows\system32\Hilemp32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1508 -
C:\Windows\SysWOW64\Igpffdeg.exeC:\Windows\system32\Igpffdeg.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740 -
C:\Windows\SysWOW64\Icgfke32.exeC:\Windows\system32\Icgfke32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1356 -
C:\Windows\SysWOW64\Ipkgdjje.exeC:\Windows\system32\Ipkgdjje.exe33⤵
- Executes dropped EXE
PID:988 -
C:\Windows\SysWOW64\Iickmo32.exeC:\Windows\system32\Iickmo32.exe34⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\Ilddoj32.exeC:\Windows\system32\Ilddoj32.exe35⤵
- Executes dropped EXE
PID:468 -
C:\Windows\SysWOW64\Jkiapg32.exeC:\Windows\system32\Jkiapg32.exe36⤵
- Executes dropped EXE
PID:1352 -
C:\Windows\SysWOW64\Jjchlb32.exeC:\Windows\system32\Jjchlb32.exe37⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\Kcpepgel.exeC:\Windows\system32\Kcpepgel.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:268 -
C:\Windows\SysWOW64\Kmhjim32.exeC:\Windows\system32\Kmhjim32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:304 -
C:\Windows\SysWOW64\Kogfeh32.exeC:\Windows\system32\Kogfeh32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\Kfqobbbm.exeC:\Windows\system32\Kfqobbbm.exe41⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\Kmkgom32.exeC:\Windows\system32\Kmkgom32.exe42⤵
- Executes dropped EXE
PID:864 -
C:\Windows\SysWOW64\Knlcfeph.exeC:\Windows\system32\Knlcfeph.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:956 -
C:\Windows\SysWOW64\Kdfkcoge.exeC:\Windows\system32\Kdfkcoge.exe44⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\Kokpphgk.exeC:\Windows\system32\Kokpphgk.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\Kbjllcfo.exeC:\Windows\system32\Kbjllcfo.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1164 -
C:\Windows\SysWOW64\Kgfddjdf.exeC:\Windows\system32\Kgfddjdf.exe47⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\Ljeqaecj.exeC:\Windows\system32\Ljeqaecj.exe48⤵
- Executes dropped EXE
PID:996 -
C:\Windows\SysWOW64\Lqoinp32.exeC:\Windows\system32\Lqoinp32.exe49⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\SysWOW64\Lcmejkjj.exeC:\Windows\system32\Lcmejkjj.exe50⤵
- Executes dropped EXE
PID:1912 -
C:\Windows\SysWOW64\Ljgmfe32.exeC:\Windows\system32\Ljgmfe32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1100 -
C:\Windows\SysWOW64\Lncigdjp.exeC:\Windows\system32\Lncigdjp.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:1536 -
C:\Windows\SysWOW64\Lemacn32.exeC:\Windows\system32\Lemacn32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\Lgknpi32.exeC:\Windows\system32\Lgknpi32.exe54⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\Lmhfhp32.exeC:\Windows\system32\Lmhfhp32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1216 -
C:\Windows\SysWOW64\Lgnkeinn.exeC:\Windows\system32\Lgnkeinn.exe56⤵
- Executes dropped EXE
PID:1204 -
C:\Windows\SysWOW64\Liogma32.exeC:\Windows\system32\Liogma32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1212 -
C:\Windows\SysWOW64\Lafono32.exeC:\Windows\system32\Lafono32.exe58⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Lfcgfe32.exeC:\Windows\system32\Lfcgfe32.exe59⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\Llppol32.exeC:\Windows\system32\Llppol32.exe60⤵
- Executes dropped EXE
PID:1248 -
C:\Windows\SysWOW64\Mfedleac.exeC:\Windows\system32\Mfedleac.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:824 -
C:\Windows\SysWOW64\Mmolio32.exeC:\Windows\system32\Mmolio32.exe62⤵
- Executes dropped EXE
PID:1528 -
C:\Windows\SysWOW64\Mpniek32.exeC:\Windows\system32\Mpniek32.exe63⤵
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\Mnpipgno.exeC:\Windows\system32\Mnpipgno.exe64⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\Mfgaaeoq.exeC:\Windows\system32\Mfgaaeoq.exe65⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\Mifmnpnd.exeC:\Windows\system32\Mifmnpnd.exe66⤵PID:840
-
C:\Windows\SysWOW64\Mldijlmh.exeC:\Windows\system32\Mldijlmh.exe67⤵PID:520
-
C:\Windows\SysWOW64\Mnbffgll.exeC:\Windows\system32\Mnbffgll.exe68⤵
- Drops file in System32 directory
PID:1224 -
C:\Windows\SysWOW64\Maabbbkp.exeC:\Windows\system32\Maabbbkp.exe69⤵PID:1748
-
C:\Windows\SysWOW64\Mihjcp32.exeC:\Windows\system32\Mihjcp32.exe70⤵
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\Mnebkg32.exeC:\Windows\system32\Mnebkg32.exe71⤵
- Modifies registry class
PID:1996 -
C:\Windows\SysWOW64\Macogb32.exeC:\Windows\system32\Macogb32.exe72⤵PID:1484
-
C:\Windows\SysWOW64\Mdbkdn32.exeC:\Windows\system32\Mdbkdn32.exe73⤵PID:788
-
C:\Windows\SysWOW64\Mjlcqhpm.exeC:\Windows\system32\Mjlcqhpm.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:764 -
C:\Windows\SysWOW64\Mafkmb32.exeC:\Windows\system32\Mafkmb32.exe75⤵PID:616
-
C:\Windows\SysWOW64\Meagnqpc.exeC:\Windows\system32\Meagnqpc.exe76⤵PID:600
-
C:\Windows\SysWOW64\Mhpcjl32.exeC:\Windows\system32\Mhpcjl32.exe77⤵PID:1776
-
C:\Windows\SysWOW64\Mjnpfg32.exeC:\Windows\system32\Mjnpfg32.exe78⤵PID:2016
-
C:\Windows\SysWOW64\Nojlfffd.exeC:\Windows\system32\Nojlfffd.exe79⤵
- Drops file in System32 directory
PID:1064 -
C:\Windows\SysWOW64\Nahhbaeg.exeC:\Windows\system32\Nahhbaeg.exe80⤵PID:1904
-
C:\Windows\SysWOW64\Nkqmlg32.exeC:\Windows\system32\Nkqmlg32.exe81⤵PID:2068
-
C:\Windows\SysWOW64\Nblapi32.exeC:\Windows\system32\Nblapi32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2088 -
C:\Windows\SysWOW64\Nifimc32.exeC:\Windows\system32\Nifimc32.exe83⤵PID:2100
-
C:\Windows\SysWOW64\Nldfio32.exeC:\Windows\system32\Nldfio32.exe84⤵
- Drops file in System32 directory
- Modifies registry class
PID:2120 -
C:\Windows\SysWOW64\Neljadfd.exeC:\Windows\system32\Neljadfd.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2140 -
C:\Windows\SysWOW64\Nglglg32.exeC:\Windows\system32\Nglglg32.exe86⤵PID:2156
-
C:\Windows\SysWOW64\Nhmccp32.exeC:\Windows\system32\Nhmccp32.exe87⤵PID:2172
-
C:\Windows\SysWOW64\Oimpmbkh.exeC:\Windows\system32\Oimpmbkh.exe88⤵
- Modifies registry class
PID:2200 -
C:\Windows\SysWOW64\Oknlek32.exeC:\Windows\system32\Oknlek32.exe89⤵PID:2212
-
C:\Windows\SysWOW64\Ocedfh32.exeC:\Windows\system32\Ocedfh32.exe90⤵
- Drops file in System32 directory
PID:2228 -
C:\Windows\SysWOW64\Oecpbc32.exeC:\Windows\system32\Oecpbc32.exe91⤵PID:2256
-
C:\Windows\SysWOW64\Olmhon32.exeC:\Windows\system32\Olmhon32.exe92⤵PID:2576
-
C:\Windows\SysWOW64\Odmgooao.exeC:\Windows\system32\Odmgooao.exe93⤵PID:2588
-
C:\Windows\SysWOW64\Okgoki32.exeC:\Windows\system32\Okgoki32.exe94⤵PID:2596
-
C:\Windows\SysWOW64\Olhkcanj.exeC:\Windows\system32\Olhkcanj.exe95⤵PID:2604
-
C:\Windows\SysWOW64\Pdpcdool.exeC:\Windows\system32\Pdpcdool.exe96⤵
- Drops file in System32 directory
PID:2612 -
C:\Windows\SysWOW64\Pcbcpl32.exeC:\Windows\system32\Pcbcpl32.exe97⤵PID:2620
-
C:\Windows\SysWOW64\Pjmllfmc.exeC:\Windows\system32\Pjmllfmc.exe98⤵PID:2628
-
C:\Windows\SysWOW64\Addinamb.exeC:\Windows\system32\Addinamb.exe99⤵PID:2636
-
C:\Windows\SysWOW64\Amonbdkm.exeC:\Windows\system32\Amonbdkm.exe100⤵PID:2644
-
C:\Windows\SysWOW64\Ajcnlhjg.exeC:\Windows\system32\Ajcnlhjg.exe101⤵
- Drops file in System32 directory
PID:2652 -
C:\Windows\SysWOW64\Amajhdik.exeC:\Windows\system32\Amajhdik.exe102⤵PID:2660
-
C:\Windows\SysWOW64\Amdgnc32.exeC:\Windows\system32\Amdgnc32.exe103⤵PID:2668
-
C:\Windows\SysWOW64\Acnpjnne.exeC:\Windows\system32\Acnpjnne.exe104⤵PID:2676
-
C:\Windows\SysWOW64\Afllfimh.exeC:\Windows\system32\Afllfimh.exe105⤵PID:2684
-
C:\Windows\SysWOW64\Amfdcc32.exeC:\Windows\system32\Amfdcc32.exe106⤵PID:2692
-
C:\Windows\SysWOW64\Alidopkp.exeC:\Windows\system32\Alidopkp.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2700 -
C:\Windows\SysWOW64\Bcplpm32.exeC:\Windows\system32\Bcplpm32.exe108⤵PID:2708
-
C:\Windows\SysWOW64\Bimdhd32.exeC:\Windows\system32\Bimdhd32.exe109⤵
- Modifies registry class
PID:2716 -
C:\Windows\SysWOW64\Blladp32.exeC:\Windows\system32\Blladp32.exe110⤵PID:2724
-
C:\Windows\SysWOW64\Bbeiajaj.exeC:\Windows\system32\Bbeiajaj.exe111⤵PID:2732
-
C:\Windows\SysWOW64\Bfaeah32.exeC:\Windows\system32\Bfaeah32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Bedemepn.exeC:\Windows\system32\Bedemepn.exe113⤵PID:2752
-
C:\Windows\SysWOW64\Bhbaiqoa.exeC:\Windows\system32\Bhbaiqoa.exe114⤵PID:2772
-
C:\Windows\SysWOW64\Bpijjnpc.exeC:\Windows\system32\Bpijjnpc.exe115⤵PID:2792
-
C:\Windows\SysWOW64\Bnljfk32.exeC:\Windows\system32\Bnljfk32.exe116⤵PID:2812
-
C:\Windows\SysWOW64\Bakfbf32.exeC:\Windows\system32\Bakfbf32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2836 -
C:\Windows\SysWOW64\Befbbe32.exeC:\Windows\system32\Befbbe32.exe118⤵PID:2856
-
C:\Windows\SysWOW64\Blpjooeh.exeC:\Windows\system32\Blpjooeh.exe119⤵PID:2868
-
C:\Windows\SysWOW64\Bnofkjdk.exeC:\Windows\system32\Bnofkjdk.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2888 -
C:\Windows\SysWOW64\Bamcgfco.exeC:\Windows\system32\Bamcgfco.exe121⤵PID:2904
-
C:\Windows\SysWOW64\Bdkodabc.exeC:\Windows\system32\Bdkodabc.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2920
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-