Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 08:59
Static task
static1
Behavioral task
behavioral1
Sample
1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exe
Resource
win10v2004-20220812-en
General
-
Target
1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exe
-
Size
50KB
-
MD5
451f213dccb6810657adb8aa1eca1280
-
SHA1
68c5580e3dee3067840e37f6932093b80dcb6fcc
-
SHA256
1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e
-
SHA512
5abb165dab90007d116e304b0015a4b6dbde560b3fa43daecf5971390e22e38751ec548dd809fcdded405e2e66d47c67266ccb471680da88ce35a3e8e6390a99
-
SSDEEP
768:AgguXLQinriiA4Hb+y7D/1LP/Y2zd0aQ0tliojmznBh3sEttfttsttfttfttSttJ:UOQiu677hn1d0B84ojKPcPJtM
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Fdnjgmle.exeNmgjia32.exePehjfm32.exeDcgcgk32.exeIafalg32.exeBoohjjap.exeCklaknjd.exeBqdlmo32.exeDgelni32.exeLleaflkd.exeFhgjblfq.exeIdhiii32.exeCkpbnb32.exeCkjbhmad.exeAfockelf.exeCbqlfkmi.exeGhopckpi.exeHeocnk32.exeNckndeni.exeJklphekp.exeCcbadp32.exeCmmbbejp.exeCcppmc32.exeKmieae32.exeAnobgl32.exe1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exeDqdnppjf.exeBcahmb32.exeJcgnbaeo.exeGfheof32.exeGdobnj32.exeMopmnf32.exeEkcpbj32.exeIbcmom32.exeIqipio32.exeAamknj32.exeJjnaaa32.exeMepnaf32.exeBkhceh32.exeDcegbk32.exeBajjli32.exeMebcop32.exeBjmpfdhb.exeCgjmbkeh.exeFlnlhk32.exeIjcahd32.exeNcmaai32.exeIefioj32.exeLbdolh32.exeLgepom32.exePbljoafi.exeIdcepgmg.exeBilcol32.exeFdegandp.exeHmhhehlb.exeDdmaok32.exeElbhjp32.exeFacchlpc.exeMelnob32.exeOddmdf32.exePoliea32.exeOlhlhjpd.exeInmpcc32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdnjgmle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmgjia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pehjfm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcgcgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iafalg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boohjjap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cklaknjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bqdlmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgelni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lleaflkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhgjblfq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idhiii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckpbnb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckjbhmad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afockelf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbqlfkmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghopckpi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Heocnk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nckndeni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jklphekp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccbadp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmmbbejp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccppmc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmieae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anobgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqdnppjf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcahmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcgnbaeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfheof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gdobnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mopmnf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekcpbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibcmom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iqipio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aamknj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjnaaa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mepnaf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkhceh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcegbk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bajjli32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckpbnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mebcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjmpfdhb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgjmbkeh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flnlhk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijcahd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncmaai32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iefioj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbdolh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgepom32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbljoafi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idcepgmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bilcol32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdegandp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmhhehlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddmaok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elbhjp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Facchlpc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Melnob32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oddmdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Poliea32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olhlhjpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inmpcc32.exe -
Executes dropped EXE 64 IoCs
Processes:
Qckbnalg.exeQlcfgg32.exeBldond32.exeBmkencnm.exeCmblob32.exeCcldlm32.exeCgjmbkeh.exeCmfejbdp.exeCcqmglkl.exeDqdnppjf.exeDnhnjdip.exeDcegbk32.exeDcgcgk32.exeDegpanlg.exeDgelni32.exeDghici32.exeEapmlopi.exeEgjeii32.exeEabjan32.exeEeqbhmdl.exeEjmkpcbd.exeEcepiiid.exeFjbdkc32.exeFlaaef32.exeFnpmaa32.exeFldnke32.exeFdobohaj.exeFjiklb32.exeFacchlpc.exeFlhgfeoi.exeFealojfj.exeGjndgada.exeGaaojj32.exeHkicbpjd.exeHlipmbag.exeHoglinpj.exeHafieion.exeHddeaeoa.exeHknmno32.exeHahejimk.exeHhbngc32.exeHkpjcodl.exeHdinld32.exeHmacejam.exeIkecnnpf.exeIocldlfm.exeIaahqheq.exeIhkpma32.exeInhiei32.exeIafalg32.exeJnfeggoe.exeKlnkem32.exeKkchfi32.exeKdlmoold.exeLdnjeoja.exeLleaflkd.exeLhlbkmph.exeLnikcdop.exeLkmkmhmi.exeLbgcibef.exeLialfl32.exeLokdcfcp.exeLfelpq32.exeMomqhfam.exepid process 1652 Qckbnalg.exe 2056 Qlcfgg32.exe 1096 Bldond32.exe 3824 Bmkencnm.exe 4628 Cmblob32.exe 4688 Ccldlm32.exe 4988 Cgjmbkeh.exe 4960 Cmfejbdp.exe 4972 Ccqmglkl.exe 4256 Dqdnppjf.exe 5112 Dnhnjdip.exe 5076 Dcegbk32.exe 420 Dcgcgk32.exe 4272 Degpanlg.exe 1340 Dgelni32.exe 1712 Dghici32.exe 2908 Eapmlopi.exe 3420 Egjeii32.exe 4204 Eabjan32.exe 652 Eeqbhmdl.exe 176 Ejmkpcbd.exe 2268 Ecepiiid.exe 1716 Fjbdkc32.exe 748 Flaaef32.exe 3796 Fnpmaa32.exe 2208 Fldnke32.exe 4336 Fdobohaj.exe 3636 Fjiklb32.exe 4392 Facchlpc.exe 4940 Flhgfeoi.exe 4300 Fealojfj.exe 4400 Gjndgada.exe 2272 Gaaojj32.exe 4668 Hkicbpjd.exe 520 Hlipmbag.exe 384 Hoglinpj.exe 4564 Hafieion.exe 1412 Hddeaeoa.exe 3244 Hknmno32.exe 3324 Hahejimk.exe 1572 Hhbngc32.exe 2632 Hkpjcodl.exe 2320 Hdinld32.exe 3384 Hmacejam.exe 488 Ikecnnpf.exe 632 Iocldlfm.exe 1940 Iaahqheq.exe 1196 Ihkpma32.exe 3308 Inhiei32.exe 2196 Iafalg32.exe 2976 Jnfeggoe.exe 2604 Klnkem32.exe 1068 Kkchfi32.exe 4056 Kdlmoold.exe 736 Ldnjeoja.exe 2776 Lleaflkd.exe 2168 Lhlbkmph.exe 2120 Lnikcdop.exe 1876 Lkmkmhmi.exe 1996 Lbgcibef.exe 760 Lialfl32.exe 3916 Lokdcfcp.exe 4088 Lfelpq32.exe 460 Momqhfam.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fmfnpa32.exeFijkdmhn.exeIdhiii32.exeHoglinpj.exeEkjfcipa.exeDfefkkqp.exeLnmkfh32.exeCpljehpo.exeKblpcndd.exeIafalg32.exeEabbjc32.exeGdeqhl32.exeDkbocbog.exeChpada32.exeDkbgjo32.exeMahklf32.exeLqndhcdc.exeNljofl32.exeOgkcpbam.exeBjicdmmd.exeCmjemflb.exeDkfadkgf.exeAgmmeijl.exeMoefdljc.exeKdmlkfjb.exePmbegqjk.exeCfbkeh32.exeEgkddo32.exeMibpda32.exeHpcodihc.exeLgqfdnah.exeLgccinoe.exeLllcen32.exeCdolgfbp.exeOqbamo32.exeFkopnh32.exeLepncd32.exeAbpcja32.exeDcgcgk32.exeCjgpfk32.exeEfjimhnh.exeJibmgi32.exeFkffog32.exeQceiaa32.exeJqdoem32.exeDpgnjo32.exeIjqmhnko.exeHepgkohh.exeDghici32.exeCmmbbejp.exeEofgpikj.exeLokdcfcp.exeAoabad32.exeLcjcnoej.exeLekmnajj.exeOdalmibl.exeAcccdj32.exeMhknhabf.exeCmfejbdp.exeLkqgno32.exeCleegp32.exeIjadbdoj.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Fmpqfq32.exe Fmfnpa32.exe File opened for modification C:\Windows\SysWOW64\Fngcmcfe.exe Fijkdmhn.exe File opened for modification C:\Windows\SysWOW64\Jbijgp32.exe Idhiii32.exe File created C:\Windows\SysWOW64\Hafieion.exe Hoglinpj.exe File created C:\Windows\SysWOW64\Fhpili32.dll Ekjfcipa.exe File created C:\Windows\SysWOW64\Memfnodb.dll Dfefkkqp.exe File created C:\Windows\SysWOW64\Lqkgbcff.exe Lnmkfh32.exe File created C:\Windows\SysWOW64\Ckbncapd.exe Cpljehpo.exe File created C:\Windows\SysWOW64\Fbkcnp32.dll Kblpcndd.exe File created C:\Windows\SysWOW64\Kbcggj32.dll Iafalg32.exe File opened for modification C:\Windows\SysWOW64\Edpnfo32.exe Eabbjc32.exe File opened for modification C:\Windows\SysWOW64\Gmlhii32.exe Gdeqhl32.exe File opened for modification C:\Windows\SysWOW64\Dcigeooj.exe Dkbocbog.exe File opened for modification C:\Windows\SysWOW64\Chbnia32.exe Chpada32.exe File created C:\Windows\SysWOW64\Dalofi32.exe Dkbgjo32.exe File created C:\Windows\SysWOW64\Ndidna32.exe Mahklf32.exe File created C:\Windows\SysWOW64\Lggldm32.exe Lqndhcdc.exe File opened for modification C:\Windows\SysWOW64\Ndaggimg.exe Nljofl32.exe File opened for modification C:\Windows\SysWOW64\Olhlhjpd.exe Ogkcpbam.exe File created C:\Windows\SysWOW64\Bcahmb32.exe Bjicdmmd.exe File created C:\Windows\SysWOW64\Jdqlliil.dll Cmjemflb.exe File opened for modification C:\Windows\SysWOW64\Doaneiop.exe Dkfadkgf.exe File created C:\Windows\SysWOW64\Dakeiaoh.dll Agmmeijl.exe File opened for modification C:\Windows\SysWOW64\Mepnaf32.exe Moefdljc.exe File opened for modification C:\Windows\SysWOW64\Kkgdhp32.exe Kdmlkfjb.exe File created C:\Windows\SysWOW64\Ljkdeeod.dll Pmbegqjk.exe File created C:\Windows\SysWOW64\Cnicfe32.exe Cfbkeh32.exe File created C:\Windows\SysWOW64\Eaaiahei.exe Egkddo32.exe File opened for modification C:\Windows\SysWOW64\Mlampmdo.exe Mibpda32.exe File opened for modification C:\Windows\SysWOW64\Hcblpdgg.exe Hpcodihc.exe File opened for modification C:\Windows\SysWOW64\Ljobpiql.exe Lgqfdnah.exe File created C:\Windows\SysWOW64\Ahiiai32.dll Lgccinoe.exe File created C:\Windows\SysWOW64\Mdckfk32.exe Lllcen32.exe File created C:\Windows\SysWOW64\Cmgqpkip.exe Cdolgfbp.exe File created C:\Windows\SysWOW64\Ncfmpnfb.dll Oqbamo32.exe File created C:\Windows\SysWOW64\Epbahkcp.dll Fkopnh32.exe File opened for modification C:\Windows\SysWOW64\Likjcbkc.exe Lepncd32.exe File created C:\Windows\SysWOW64\Acicqigg.dll Mahklf32.exe File opened for modification C:\Windows\SysWOW64\Apddce32.exe Abpcja32.exe File created C:\Windows\SysWOW64\Nlnbhh32.dll Dcgcgk32.exe File created C:\Windows\SysWOW64\Codhnb32.exe Cjgpfk32.exe File created C:\Windows\SysWOW64\Eiieicml.exe Efjimhnh.exe File opened for modification C:\Windows\SysWOW64\Jjdjoane.exe Jibmgi32.exe File created C:\Windows\SysWOW64\Aikiadip.exe Agmmeijl.exe File opened for modification C:\Windows\SysWOW64\Fcmnpe32.exe Fkffog32.exe File opened for modification C:\Windows\SysWOW64\Chmndlge.exe Qceiaa32.exe File created C:\Windows\SysWOW64\Fpbfpack.dll Jqdoem32.exe File created C:\Windows\SysWOW64\Efafgifc.exe Dpgnjo32.exe File opened for modification C:\Windows\SysWOW64\Iloidijb.exe Ijqmhnko.exe File opened for modification C:\Windows\SysWOW64\Hgapmj32.exe Hepgkohh.exe File opened for modification C:\Windows\SysWOW64\Eapmlopi.exe Dghici32.exe File opened for modification C:\Windows\SysWOW64\Ckpbnb32.exe Cmmbbejp.exe File created C:\Windows\SysWOW64\Eodolnaf.dll Eofgpikj.exe File created C:\Windows\SysWOW64\Lfelpq32.exe Lokdcfcp.exe File created C:\Windows\SysWOW64\Ajggomog.exe Aoabad32.exe File opened for modification C:\Windows\SysWOW64\Lgepom32.exe Lcjcnoej.exe File created C:\Windows\SysWOW64\Gjmgfljg.dll Lekmnajj.exe File opened for modification C:\Windows\SysWOW64\Olicnfco.exe Odalmibl.exe File created C:\Windows\SysWOW64\Abjmkf32.exe Acccdj32.exe File opened for modification C:\Windows\SysWOW64\Moefdljc.exe Mhknhabf.exe File created C:\Windows\SysWOW64\Cmdcni32.dll Cmfejbdp.exe File created C:\Windows\SysWOW64\Lbhool32.exe Lkqgno32.exe File created C:\Windows\SysWOW64\Cghane32.dll Cleegp32.exe File created C:\Windows\SysWOW64\Inmpcc32.exe Ijadbdoj.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5176 7996 WerFault.exe Eldlhckj.exe -
Modifies registry class 64 IoCs
Processes:
Mhknhabf.exeMhpgca32.exeBobcpmfc.exeOjbacd32.exeQlgpod32.exeAoabad32.exeBjlpjm32.exe1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exeFkalchij.exeCalhnpgn.exeHbnjmp32.exeMkgmoncl.exeFcmnpe32.exeGhopckpi.exeAojefobm.exePefabkej.exeQmckbjdl.exeIpdqba32.exeLekehdgp.exeMmlpoqpg.exeJklphekp.exeDflmlj32.exeFdobohaj.exeHkicbpjd.exeHcbpab32.exeBmggingc.exeDkhnjk32.exeBmabggdm.exeDfefkkqp.exeOmjpeo32.exeJlfhke32.exeNkcmjlio.exePfncia32.exeJnhpoamf.exeCofnik32.exeChnbbqpn.exeOmegjomb.exeMebkge32.exeGbdgfa32.exeMibpda32.exeJknfcofa.exeMkhapk32.exeGndbie32.exeOcknbglo.exeIcgjmapi.exeLllcen32.exeHpjmnjqn.exeLekmnajj.exeBepmoh32.exeMcmabg32.exeIhbdplfi.exeGdaociml.exeAdfnofpd.exeHmacejam.exeAikiadip.exeJlkagbej.exeKcbnnpka.exeAamknj32.exeFlkdfh32.exeHoglinpj.exeHddeaeoa.exeKcndbp32.exeKjccdkki.exeDkceokii.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjigocdh.dll" Mhknhabf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhpgca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bobcpmfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojbacd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qlgpod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjdiliki.dll" Aoabad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qfcnkn32.dll" Bjlpjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fkalchij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Calhnpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hbnjmp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkgmoncl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcmnpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnkfcl32.dll" Ghopckpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aojefobm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pefabkej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qmckbjdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ipdqba32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lekehdgp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmlpoqpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jklphekp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dflmlj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdobohaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkicbpjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hcbpab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmggingc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhjmpfcl.dll" Dkhnjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bmabggdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Memfnodb.dll" Dfefkkqp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omjpeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jlfhke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Daphho32.dll" Nkcmjlio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfncia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jnhpoamf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cofnik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clgbhl32.dll" Chnbbqpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbdqegoi.dll" Omegjomb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mebkge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbdgfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mibpda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajfmkfhq.dll" Jknfcofa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkhapk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gndbie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ocknbglo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icgjmapi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lllcen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ladfllde.dll" Hpjmnjqn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lekmnajj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bepmoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eghpcp32.dll" Mcmabg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihbdplfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjelhg32.dll" Gdaociml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Adfnofpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djbednce.dll" Hmacejam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aikiadip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jlkagbej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijdabh32.dll" Kcbnnpka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aamknj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Flkdfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hoglinpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plljgj32.dll" Hddeaeoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcndbp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjccdkki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkceokii.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exeQckbnalg.exeQlcfgg32.exeBldond32.exeBmkencnm.exeCmblob32.exeCcldlm32.exeCgjmbkeh.exeCmfejbdp.exeCcqmglkl.exeDqdnppjf.exeDnhnjdip.exeDcegbk32.exeDcgcgk32.exeDegpanlg.exeDgelni32.exeDghici32.exeEapmlopi.exeEgjeii32.exeEabjan32.exeEeqbhmdl.exeEjmkpcbd.exedescription pid process target process PID 4996 wrote to memory of 1652 4996 1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exe Qckbnalg.exe PID 4996 wrote to memory of 1652 4996 1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exe Qckbnalg.exe PID 4996 wrote to memory of 1652 4996 1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exe Qckbnalg.exe PID 1652 wrote to memory of 2056 1652 Qckbnalg.exe Qlcfgg32.exe PID 1652 wrote to memory of 2056 1652 Qckbnalg.exe Qlcfgg32.exe PID 1652 wrote to memory of 2056 1652 Qckbnalg.exe Qlcfgg32.exe PID 2056 wrote to memory of 1096 2056 Qlcfgg32.exe Bldond32.exe PID 2056 wrote to memory of 1096 2056 Qlcfgg32.exe Bldond32.exe PID 2056 wrote to memory of 1096 2056 Qlcfgg32.exe Bldond32.exe PID 1096 wrote to memory of 3824 1096 Bldond32.exe Bmkencnm.exe PID 1096 wrote to memory of 3824 1096 Bldond32.exe Bmkencnm.exe PID 1096 wrote to memory of 3824 1096 Bldond32.exe Bmkencnm.exe PID 3824 wrote to memory of 4628 3824 Bmkencnm.exe Cmblob32.exe PID 3824 wrote to memory of 4628 3824 Bmkencnm.exe Cmblob32.exe PID 3824 wrote to memory of 4628 3824 Bmkencnm.exe Cmblob32.exe PID 4628 wrote to memory of 4688 4628 Cmblob32.exe Ccldlm32.exe PID 4628 wrote to memory of 4688 4628 Cmblob32.exe Ccldlm32.exe PID 4628 wrote to memory of 4688 4628 Cmblob32.exe Ccldlm32.exe PID 4688 wrote to memory of 4988 4688 Ccldlm32.exe Cgjmbkeh.exe PID 4688 wrote to memory of 4988 4688 Ccldlm32.exe Cgjmbkeh.exe PID 4688 wrote to memory of 4988 4688 Ccldlm32.exe Cgjmbkeh.exe PID 4988 wrote to memory of 4960 4988 Cgjmbkeh.exe Cmfejbdp.exe PID 4988 wrote to memory of 4960 4988 Cgjmbkeh.exe Cmfejbdp.exe PID 4988 wrote to memory of 4960 4988 Cgjmbkeh.exe Cmfejbdp.exe PID 4960 wrote to memory of 4972 4960 Cmfejbdp.exe Ccqmglkl.exe PID 4960 wrote to memory of 4972 4960 Cmfejbdp.exe Ccqmglkl.exe PID 4960 wrote to memory of 4972 4960 Cmfejbdp.exe Ccqmglkl.exe PID 4972 wrote to memory of 4256 4972 Ccqmglkl.exe Dqdnppjf.exe PID 4972 wrote to memory of 4256 4972 Ccqmglkl.exe Dqdnppjf.exe PID 4972 wrote to memory of 4256 4972 Ccqmglkl.exe Dqdnppjf.exe PID 4256 wrote to memory of 5112 4256 Dqdnppjf.exe Dnhnjdip.exe PID 4256 wrote to memory of 5112 4256 Dqdnppjf.exe Dnhnjdip.exe PID 4256 wrote to memory of 5112 4256 Dqdnppjf.exe Dnhnjdip.exe PID 5112 wrote to memory of 5076 5112 Dnhnjdip.exe Dcegbk32.exe PID 5112 wrote to memory of 5076 5112 Dnhnjdip.exe Dcegbk32.exe PID 5112 wrote to memory of 5076 5112 Dnhnjdip.exe Dcegbk32.exe PID 5076 wrote to memory of 420 5076 Dcegbk32.exe Dcgcgk32.exe PID 5076 wrote to memory of 420 5076 Dcegbk32.exe Dcgcgk32.exe PID 5076 wrote to memory of 420 5076 Dcegbk32.exe Dcgcgk32.exe PID 420 wrote to memory of 4272 420 Dcgcgk32.exe Degpanlg.exe PID 420 wrote to memory of 4272 420 Dcgcgk32.exe Degpanlg.exe PID 420 wrote to memory of 4272 420 Dcgcgk32.exe Degpanlg.exe PID 4272 wrote to memory of 1340 4272 Degpanlg.exe Dgelni32.exe PID 4272 wrote to memory of 1340 4272 Degpanlg.exe Dgelni32.exe PID 4272 wrote to memory of 1340 4272 Degpanlg.exe Dgelni32.exe PID 1340 wrote to memory of 1712 1340 Dgelni32.exe Dghici32.exe PID 1340 wrote to memory of 1712 1340 Dgelni32.exe Dghici32.exe PID 1340 wrote to memory of 1712 1340 Dgelni32.exe Dghici32.exe PID 1712 wrote to memory of 2908 1712 Dghici32.exe Eapmlopi.exe PID 1712 wrote to memory of 2908 1712 Dghici32.exe Eapmlopi.exe PID 1712 wrote to memory of 2908 1712 Dghici32.exe Eapmlopi.exe PID 2908 wrote to memory of 3420 2908 Eapmlopi.exe Egjeii32.exe PID 2908 wrote to memory of 3420 2908 Eapmlopi.exe Egjeii32.exe PID 2908 wrote to memory of 3420 2908 Eapmlopi.exe Egjeii32.exe PID 3420 wrote to memory of 4204 3420 Egjeii32.exe Eabjan32.exe PID 3420 wrote to memory of 4204 3420 Egjeii32.exe Eabjan32.exe PID 3420 wrote to memory of 4204 3420 Egjeii32.exe Eabjan32.exe PID 4204 wrote to memory of 652 4204 Eabjan32.exe Eeqbhmdl.exe PID 4204 wrote to memory of 652 4204 Eabjan32.exe Eeqbhmdl.exe PID 4204 wrote to memory of 652 4204 Eabjan32.exe Eeqbhmdl.exe PID 652 wrote to memory of 176 652 Eeqbhmdl.exe Ejmkpcbd.exe PID 652 wrote to memory of 176 652 Eeqbhmdl.exe Ejmkpcbd.exe PID 652 wrote to memory of 176 652 Eeqbhmdl.exe Ejmkpcbd.exe PID 176 wrote to memory of 2268 176 Ejmkpcbd.exe Ecepiiid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exe"C:\Users\Admin\AppData\Local\Temp\1ef12678ae7d6f872a67ba48a262f07cb3c02cd5de268d9a9833b4bf9dc7c23e.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qckbnalg.exeC:\Windows\system32\Qckbnalg.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qlcfgg32.exeC:\Windows\system32\Qlcfgg32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bldond32.exeC:\Windows\system32\Bldond32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bmkencnm.exeC:\Windows\system32\Bmkencnm.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Cmblob32.exeC:\Windows\system32\Cmblob32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ccldlm32.exeC:\Windows\system32\Ccldlm32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Cgjmbkeh.exeC:\Windows\system32\Cgjmbkeh.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Cmfejbdp.exeC:\Windows\system32\Cmfejbdp.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ccqmglkl.exeC:\Windows\system32\Ccqmglkl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dqdnppjf.exeC:\Windows\system32\Dqdnppjf.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dnhnjdip.exeC:\Windows\system32\Dnhnjdip.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dcegbk32.exeC:\Windows\system32\Dcegbk32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dcgcgk32.exeC:\Windows\system32\Dcgcgk32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Degpanlg.exeC:\Windows\system32\Degpanlg.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dgelni32.exeC:\Windows\system32\Dgelni32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dghici32.exeC:\Windows\system32\Dghici32.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Eapmlopi.exeC:\Windows\system32\Eapmlopi.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Egjeii32.exeC:\Windows\system32\Egjeii32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Eabjan32.exeC:\Windows\system32\Eabjan32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Eeqbhmdl.exeC:\Windows\system32\Eeqbhmdl.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ejmkpcbd.exeC:\Windows\system32\Ejmkpcbd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ecepiiid.exeC:\Windows\system32\Ecepiiid.exe23⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fjbdkc32.exeC:\Windows\system32\Fjbdkc32.exe24⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Flaaef32.exeC:\Windows\system32\Flaaef32.exe25⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fnpmaa32.exeC:\Windows\system32\Fnpmaa32.exe26⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fldnke32.exeC:\Windows\system32\Fldnke32.exe27⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fdobohaj.exeC:\Windows\system32\Fdobohaj.exe28⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Fjiklb32.exeC:\Windows\system32\Fjiklb32.exe29⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Facchlpc.exeC:\Windows\system32\Facchlpc.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Flhgfeoi.exeC:\Windows\system32\Flhgfeoi.exe31⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Fealojfj.exeC:\Windows\system32\Fealojfj.exe32⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gjndgada.exeC:\Windows\system32\Gjndgada.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Gaaojj32.exeC:\Windows\system32\Gaaojj32.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hkicbpjd.exeC:\Windows\system32\Hkicbpjd.exe35⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Hlipmbag.exeC:\Windows\system32\Hlipmbag.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hoglinpj.exeC:\Windows\system32\Hoglinpj.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Hafieion.exeC:\Windows\system32\Hafieion.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hddeaeoa.exeC:\Windows\system32\Hddeaeoa.exe39⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Hknmno32.exeC:\Windows\system32\Hknmno32.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hahejimk.exeC:\Windows\system32\Hahejimk.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hhbngc32.exeC:\Windows\system32\Hhbngc32.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hkpjcodl.exeC:\Windows\system32\Hkpjcodl.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hdinld32.exeC:\Windows\system32\Hdinld32.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Hmacejam.exeC:\Windows\system32\Hmacejam.exe45⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Ikecnnpf.exeC:\Windows\system32\Ikecnnpf.exe46⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iocldlfm.exeC:\Windows\system32\Iocldlfm.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iaahqheq.exeC:\Windows\system32\Iaahqheq.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ihkpma32.exeC:\Windows\system32\Ihkpma32.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Inhiei32.exeC:\Windows\system32\Inhiei32.exe50⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Iafalg32.exeC:\Windows\system32\Iafalg32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jnfeggoe.exeC:\Windows\system32\Jnfeggoe.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Klnkem32.exeC:\Windows\system32\Klnkem32.exe53⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kkchfi32.exeC:\Windows\system32\Kkchfi32.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kdlmoold.exeC:\Windows\system32\Kdlmoold.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ldnjeoja.exeC:\Windows\system32\Ldnjeoja.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lleaflkd.exeC:\Windows\system32\Lleaflkd.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lhlbkmph.exeC:\Windows\system32\Lhlbkmph.exe58⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lnikcdop.exeC:\Windows\system32\Lnikcdop.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lkmkmhmi.exeC:\Windows\system32\Lkmkmhmi.exe60⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lbgcibef.exeC:\Windows\system32\Lbgcibef.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lialfl32.exeC:\Windows\system32\Lialfl32.exe62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lokdcfcp.exeC:\Windows\system32\Lokdcfcp.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lfelpq32.exeC:\Windows\system32\Lfelpq32.exe64⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Momqhfam.exeC:\Windows\system32\Momqhfam.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mejiqm32.exeC:\Windows\system32\Mejiqm32.exe66⤵
-
C:\Windows\SysWOW64\Mmaabj32.exeC:\Windows\system32\Mmaabj32.exe67⤵
-
C:\Windows\SysWOW64\Mopmnf32.exeC:\Windows\system32\Mopmnf32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mmcngj32.exeC:\Windows\system32\Mmcngj32.exe69⤵
-
C:\Windows\SysWOW64\Mkikhf32.exeC:\Windows\system32\Mkikhf32.exe70⤵
-
C:\Windows\SysWOW64\Mbbceqki.exeC:\Windows\system32\Mbbceqki.exe71⤵
-
C:\Windows\SysWOW64\Mimkbk32.exeC:\Windows\system32\Mimkbk32.exe72⤵
-
C:\Windows\SysWOW64\Mbepkphf.exeC:\Windows\system32\Mbepkphf.exe73⤵
-
C:\Windows\SysWOW64\Nefilk32.exeC:\Windows\system32\Nefilk32.exe74⤵
-
C:\Windows\SysWOW64\Nmmqni32.exeC:\Windows\system32\Nmmqni32.exe75⤵
-
C:\Windows\SysWOW64\Nmomchdg.exeC:\Windows\system32\Nmomchdg.exe76⤵
-
C:\Windows\SysWOW64\Aiimkdkc.exeC:\Windows\system32\Aiimkdkc.exe77⤵
-
C:\Windows\SysWOW64\Amdilc32.exeC:\Windows\system32\Amdilc32.exe78⤵
-
C:\Windows\SysWOW64\Aofeckjj.exeC:\Windows\system32\Aofeckjj.exe79⤵
-
C:\Windows\SysWOW64\Agmmeijl.exeC:\Windows\system32\Agmmeijl.exe80⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Aikiadip.exeC:\Windows\system32\Aikiadip.exe81⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Apeannam.exeC:\Windows\system32\Apeannam.exe82⤵
-
C:\Windows\SysWOW64\Agojjh32.exeC:\Windows\system32\Agojjh32.exe83⤵
-
C:\Windows\SysWOW64\Ainffd32.exeC:\Windows\system32\Ainffd32.exe84⤵
-
C:\Windows\SysWOW64\Allbbo32.exeC:\Windows\system32\Allbbo32.exe85⤵
-
C:\Windows\SysWOW64\Agafph32.exeC:\Windows\system32\Agafph32.exe86⤵
-
C:\Windows\SysWOW64\Alooho32.exeC:\Windows\system32\Alooho32.exe87⤵
-
C:\Windows\SysWOW64\Bchgei32.exeC:\Windows\system32\Bchgei32.exe88⤵
-
C:\Windows\SysWOW64\Bibpacch.exeC:\Windows\system32\Bibpacch.exe89⤵
-
C:\Windows\SysWOW64\Boohjjap.exeC:\Windows\system32\Boohjjap.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bgfpkgbb.exeC:\Windows\system32\Bgfpkgbb.exe91⤵
-
C:\Windows\SysWOW64\Bnphha32.exeC:\Windows\system32\Bnphha32.exe92⤵
-
C:\Windows\SysWOW64\Boaeojpm.exeC:\Windows\system32\Boaeojpm.exe93⤵
-
C:\Windows\SysWOW64\Bgimqg32.exeC:\Windows\system32\Bgimqg32.exe94⤵
-
C:\Windows\SysWOW64\Bnbemagl.exeC:\Windows\system32\Bnbemagl.exe95⤵
-
C:\Windows\SysWOW64\Bodaei32.exeC:\Windows\system32\Bodaei32.exe96⤵
-
C:\Windows\SysWOW64\Oqbamo32.exeC:\Windows\system32\Oqbamo32.exe97⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bajjli32.exeC:\Windows\system32\Bajjli32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Blpnib32.exeC:\Windows\system32\Blpnib32.exe99⤵
-
C:\Windows\SysWOW64\Bnnjen32.exeC:\Windows\system32\Bnnjen32.exe100⤵
-
C:\Windows\SysWOW64\Balfaiil.exeC:\Windows\system32\Balfaiil.exe101⤵
-
C:\Windows\SysWOW64\Bdkcmdhp.exeC:\Windows\system32\Bdkcmdhp.exe102⤵
-
C:\Windows\SysWOW64\Bjdkjo32.exeC:\Windows\system32\Bjdkjo32.exe103⤵
-
C:\Windows\SysWOW64\Bejogg32.exeC:\Windows\system32\Bejogg32.exe104⤵
-
C:\Windows\SysWOW64\Bobcpmfc.exeC:\Windows\system32\Bobcpmfc.exe105⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Blfdia32.exeC:\Windows\system32\Blfdia32.exe106⤵
-
C:\Windows\SysWOW64\Cbqlfkmi.exeC:\Windows\system32\Cbqlfkmi.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cliaoq32.exeC:\Windows\system32\Cliaoq32.exe108⤵
-
C:\Windows\SysWOW64\Cklaknjd.exeC:\Windows\system32\Cklaknjd.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cafigg32.exeC:\Windows\system32\Cafigg32.exe110⤵
-
C:\Windows\SysWOW64\Chpada32.exeC:\Windows\system32\Chpada32.exe111⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Chbnia32.exeC:\Windows\system32\Chbnia32.exe112⤵
-
C:\Windows\SysWOW64\Ckpjfm32.exeC:\Windows\system32\Ckpjfm32.exe113⤵
-
C:\Windows\SysWOW64\Dhbgqohi.exeC:\Windows\system32\Dhbgqohi.exe114⤵
-
C:\Windows\SysWOW64\Echknh32.exeC:\Windows\system32\Echknh32.exe115⤵
-
C:\Windows\SysWOW64\Edihepnm.exeC:\Windows\system32\Edihepnm.exe116⤵
-
C:\Windows\SysWOW64\Ekcpbj32.exeC:\Windows\system32\Ekcpbj32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Eoolbinc.exeC:\Windows\system32\Eoolbinc.exe118⤵
-
C:\Windows\SysWOW64\Eamhodmf.exeC:\Windows\system32\Eamhodmf.exe119⤵
-
C:\Windows\SysWOW64\Ehgqln32.exeC:\Windows\system32\Ehgqln32.exe120⤵
-
C:\Windows\SysWOW64\Eoaihhlp.exeC:\Windows\system32\Eoaihhlp.exe121⤵
-
C:\Windows\SysWOW64\Ednaqo32.exeC:\Windows\system32\Ednaqo32.exe122⤵
-
C:\Windows\SysWOW64\Ekhjmiad.exeC:\Windows\system32\Ekhjmiad.exe123⤵
-
C:\Windows\SysWOW64\Eabbjc32.exeC:\Windows\system32\Eabbjc32.exe124⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Edpnfo32.exeC:\Windows\system32\Edpnfo32.exe125⤵
-
C:\Windows\SysWOW64\Ekjfcipa.exeC:\Windows\system32\Ekjfcipa.exe126⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Eadopc32.exeC:\Windows\system32\Eadopc32.exe127⤵
-
C:\Windows\SysWOW64\Ehnglm32.exeC:\Windows\system32\Ehnglm32.exe128⤵
-
C:\Windows\SysWOW64\Fohoigfh.exeC:\Windows\system32\Fohoigfh.exe129⤵
-
C:\Windows\SysWOW64\Fdegandp.exeC:\Windows\system32\Fdegandp.exe130⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fkopnh32.exeC:\Windows\system32\Fkopnh32.exe131⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fcfhof32.exeC:\Windows\system32\Fcfhof32.exe132⤵
-
C:\Windows\SysWOW64\Fdgdgnbm.exeC:\Windows\system32\Fdgdgnbm.exe133⤵
-
C:\Windows\SysWOW64\Flnlhk32.exeC:\Windows\system32\Flnlhk32.exe134⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fkalchij.exeC:\Windows\system32\Fkalchij.exe135⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fchddejl.exeC:\Windows\system32\Fchddejl.exe136⤵
-
C:\Windows\SysWOW64\Ffgqqaip.exeC:\Windows\system32\Ffgqqaip.exe137⤵
-
C:\Windows\SysWOW64\Flqimk32.exeC:\Windows\system32\Flqimk32.exe138⤵
-
C:\Windows\SysWOW64\Fooeif32.exeC:\Windows\system32\Fooeif32.exe139⤵
-
C:\Windows\SysWOW64\Fbnafb32.exeC:\Windows\system32\Fbnafb32.exe140⤵
-
C:\Windows\SysWOW64\Ffimfqgm.exeC:\Windows\system32\Ffimfqgm.exe141⤵
-
C:\Windows\SysWOW64\Fhgjblfq.exeC:\Windows\system32\Fhgjblfq.exe142⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fkffog32.exeC:\Windows\system32\Fkffog32.exe143⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fcmnpe32.exeC:\Windows\system32\Fcmnpe32.exe144⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fdnjgmle.exeC:\Windows\system32\Fdnjgmle.exe145⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Glebhjlg.exeC:\Windows\system32\Glebhjlg.exe146⤵
-
C:\Windows\SysWOW64\Gododflk.exeC:\Windows\system32\Gododflk.exe147⤵
-
C:\Windows\SysWOW64\Gdqgmmjb.exeC:\Windows\system32\Gdqgmmjb.exe148⤵
-
C:\Windows\SysWOW64\Ghlcnk32.exeC:\Windows\system32\Ghlcnk32.exe149⤵
-
C:\Windows\SysWOW64\Gbdgfa32.exeC:\Windows\system32\Gbdgfa32.exe150⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ghopckpi.exeC:\Windows\system32\Ghopckpi.exe151⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Gohhpe32.exeC:\Windows\system32\Gohhpe32.exe152⤵
-
C:\Windows\SysWOW64\Gdeqhl32.exeC:\Windows\system32\Gdeqhl32.exe153⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gmlhii32.exeC:\Windows\system32\Gmlhii32.exe154⤵
-
C:\Windows\SysWOW64\Gbiaapdf.exeC:\Windows\system32\Gbiaapdf.exe155⤵
-
C:\Windows\SysWOW64\Gicinj32.exeC:\Windows\system32\Gicinj32.exe156⤵
-
C:\Windows\SysWOW64\Gblngpbd.exeC:\Windows\system32\Gblngpbd.exe157⤵
-
C:\Windows\SysWOW64\Gdjjckag.exeC:\Windows\system32\Gdjjckag.exe158⤵
-
C:\Windows\SysWOW64\Hkdbpe32.exeC:\Windows\system32\Hkdbpe32.exe159⤵
-
C:\Windows\SysWOW64\Hbnjmp32.exeC:\Windows\system32\Hbnjmp32.exe160⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Helfik32.exeC:\Windows\system32\Helfik32.exe161⤵
-
C:\Windows\SysWOW64\Hcmgfbhd.exeC:\Windows\system32\Hcmgfbhd.exe162⤵
-
C:\Windows\SysWOW64\Heocnk32.exeC:\Windows\system32\Heocnk32.exe163⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hmfkoh32.exeC:\Windows\system32\Hmfkoh32.exe164⤵
-
C:\Windows\SysWOW64\Hodgkc32.exeC:\Windows\system32\Hodgkc32.exe165⤵
-
C:\Windows\SysWOW64\Hbbdholl.exeC:\Windows\system32\Hbbdholl.exe166⤵
-
C:\Windows\SysWOW64\Himldi32.exeC:\Windows\system32\Himldi32.exe167⤵
-
C:\Windows\SysWOW64\Hmhhehlb.exeC:\Windows\system32\Hmhhehlb.exe168⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hcbpab32.exeC:\Windows\system32\Hcbpab32.exe169⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hioiji32.exeC:\Windows\system32\Hioiji32.exe170⤵
-
C:\Windows\SysWOW64\Hcdmga32.exeC:\Windows\system32\Hcdmga32.exe171⤵
-
C:\Windows\SysWOW64\Hbgmcnhf.exeC:\Windows\system32\Hbgmcnhf.exe172⤵
-
C:\Windows\SysWOW64\Iefioj32.exeC:\Windows\system32\Iefioj32.exe173⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Immapg32.exeC:\Windows\system32\Immapg32.exe174⤵
-
C:\Windows\SysWOW64\Icgjmapi.exeC:\Windows\system32\Icgjmapi.exe175⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Iicbehnq.exeC:\Windows\system32\Iicbehnq.exe176⤵
-
C:\Windows\SysWOW64\Iifokh32.exeC:\Windows\system32\Iifokh32.exe177⤵
-
C:\Windows\SysWOW64\Iemppiab.exeC:\Windows\system32\Iemppiab.exe178⤵
-
C:\Windows\SysWOW64\Ipbdmaah.exeC:\Windows\system32\Ipbdmaah.exe179⤵
-
C:\Windows\SysWOW64\Ipdqba32.exeC:\Windows\system32\Ipdqba32.exe180⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ibcmom32.exeC:\Windows\system32\Ibcmom32.exe181⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jeaikh32.exeC:\Windows\system32\Jeaikh32.exe182⤵
-
C:\Windows\SysWOW64\Jlkagbej.exeC:\Windows\system32\Jlkagbej.exe183⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jedeph32.exeC:\Windows\system32\Jedeph32.exe184⤵
-
C:\Windows\SysWOW64\Jmknaell.exeC:\Windows\system32\Jmknaell.exe185⤵
-
C:\Windows\SysWOW64\Jpijnqkp.exeC:\Windows\system32\Jpijnqkp.exe186⤵
-
C:\Windows\SysWOW64\Jbhfjljd.exeC:\Windows\system32\Jbhfjljd.exe187⤵
-
C:\Windows\SysWOW64\Jmmjgejj.exeC:\Windows\system32\Jmmjgejj.exe188⤵
-
C:\Windows\SysWOW64\Jlpkba32.exeC:\Windows\system32\Jlpkba32.exe189⤵
-
C:\Windows\SysWOW64\Kbhoqj32.exeC:\Windows\system32\Kbhoqj32.exe190⤵
-
C:\Windows\SysWOW64\Kibgmdcn.exeC:\Windows\system32\Kibgmdcn.exe191⤵
-
C:\Windows\SysWOW64\Klqcioba.exeC:\Windows\system32\Klqcioba.exe192⤵
-
C:\Windows\SysWOW64\Kdgljmcd.exeC:\Windows\system32\Kdgljmcd.exe193⤵
-
C:\Windows\SysWOW64\Leihbeib.exeC:\Windows\system32\Leihbeib.exe194⤵
-
C:\Windows\SysWOW64\Lmppcbjd.exeC:\Windows\system32\Lmppcbjd.exe195⤵
-
C:\Windows\SysWOW64\Lpnlpnih.exeC:\Windows\system32\Lpnlpnih.exe196⤵
-
C:\Windows\SysWOW64\Lekehdgp.exeC:\Windows\system32\Lekehdgp.exe197⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Lmbmibhb.exeC:\Windows\system32\Lmbmibhb.exe198⤵
-
C:\Windows\SysWOW64\Lpqiemge.exeC:\Windows\system32\Lpqiemge.exe199⤵
-
C:\Windows\SysWOW64\Lfkaag32.exeC:\Windows\system32\Lfkaag32.exe200⤵
-
C:\Windows\SysWOW64\Lenamdem.exeC:\Windows\system32\Lenamdem.exe201⤵
-
C:\Windows\SysWOW64\Lmdina32.exeC:\Windows\system32\Lmdina32.exe202⤵
-
C:\Windows\SysWOW64\Ldoaklml.exeC:\Windows\system32\Ldoaklml.exe203⤵
-
C:\Windows\SysWOW64\Lepncd32.exeC:\Windows\system32\Lepncd32.exe204⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Likjcbkc.exeC:\Windows\system32\Likjcbkc.exe205⤵
-
C:\Windows\SysWOW64\Lmgfda32.exeC:\Windows\system32\Lmgfda32.exe206⤵
-
C:\Windows\SysWOW64\Lpebpm32.exeC:\Windows\system32\Lpebpm32.exe207⤵
-
C:\Windows\SysWOW64\Lbdolh32.exeC:\Windows\system32\Lbdolh32.exe208⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Lebkhc32.exeC:\Windows\system32\Lebkhc32.exe209⤵
-
C:\Windows\SysWOW64\Lingibiq.exeC:\Windows\system32\Lingibiq.exe210⤵
-
C:\Windows\SysWOW64\Lllcen32.exeC:\Windows\system32\Lllcen32.exe211⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mdckfk32.exeC:\Windows\system32\Mdckfk32.exe212⤵
-
C:\Windows\SysWOW64\Mmlpoqpg.exeC:\Windows\system32\Mmlpoqpg.exe213⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mdehlk32.exeC:\Windows\system32\Mdehlk32.exe214⤵
-
C:\Windows\SysWOW64\Mibpda32.exeC:\Windows\system32\Mibpda32.exe215⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Mlampmdo.exeC:\Windows\system32\Mlampmdo.exe216⤵
-
C:\Windows\SysWOW64\Mdhdajea.exeC:\Windows\system32\Mdhdajea.exe217⤵
-
C:\Windows\SysWOW64\Meiaib32.exeC:\Windows\system32\Meiaib32.exe218⤵
-
C:\Windows\SysWOW64\Mmpijp32.exeC:\Windows\system32\Mmpijp32.exe219⤵
-
C:\Windows\SysWOW64\Mpoefk32.exeC:\Windows\system32\Mpoefk32.exe220⤵
-
C:\Windows\SysWOW64\Mcmabg32.exeC:\Windows\system32\Mcmabg32.exe221⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Melnob32.exeC:\Windows\system32\Melnob32.exe222⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mmbfpp32.exeC:\Windows\system32\Mmbfpp32.exe223⤵
-
C:\Windows\SysWOW64\Mpablkhc.exeC:\Windows\system32\Mpablkhc.exe224⤵
-
C:\Windows\SysWOW64\Mcpnhfhf.exeC:\Windows\system32\Mcpnhfhf.exe225⤵
-
C:\Windows\SysWOW64\Menjdbgj.exeC:\Windows\system32\Menjdbgj.exe226⤵
-
C:\Windows\SysWOW64\Mnebeogl.exeC:\Windows\system32\Mnebeogl.exe227⤵
-
C:\Windows\SysWOW64\Mlhbal32.exeC:\Windows\system32\Mlhbal32.exe228⤵
-
C:\Windows\SysWOW64\Ndokbi32.exeC:\Windows\system32\Ndokbi32.exe229⤵
-
C:\Windows\SysWOW64\Ngmgne32.exeC:\Windows\system32\Ngmgne32.exe230⤵
-
C:\Windows\SysWOW64\Nilcjp32.exeC:\Windows\system32\Nilcjp32.exe231⤵
-
C:\Windows\SysWOW64\Nljofl32.exeC:\Windows\system32\Nljofl32.exe232⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ndaggimg.exeC:\Windows\system32\Ndaggimg.exe233⤵
-
C:\Windows\SysWOW64\Ncdgcf32.exeC:\Windows\system32\Ncdgcf32.exe234⤵
-
C:\Windows\SysWOW64\Njnpppkn.exeC:\Windows\system32\Njnpppkn.exe235⤵
-
C:\Windows\SysWOW64\Nphhmj32.exeC:\Windows\system32\Nphhmj32.exe236⤵
-
C:\Windows\SysWOW64\Neeqea32.exeC:\Windows\system32\Neeqea32.exe237⤵
-
C:\Windows\SysWOW64\Nnlhfn32.exeC:\Windows\system32\Nnlhfn32.exe238⤵
-
C:\Windows\SysWOW64\Npjebj32.exeC:\Windows\system32\Npjebj32.exe239⤵
-
C:\Windows\SysWOW64\Nfgmjqop.exeC:\Windows\system32\Nfgmjqop.exe240⤵
-
C:\Windows\SysWOW64\Nlaegk32.exeC:\Windows\system32\Nlaegk32.exe241⤵