Analysis
-
max time kernel
146s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 09:03
Static task
static1
Behavioral task
behavioral1
Sample
6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe
Resource
win10v2004-20220812-en
General
-
Target
6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe
-
Size
51KB
-
MD5
e8c6f26b2df68b3d6cc118a9d5171a20
-
SHA1
e05a8b86863c824648f7a2fd08a61ddf1e28cdce
-
SHA256
6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c
-
SHA512
acef7d5f5e8c456d7571a40289330b097d376719767eaea963258d6b26bab26ba942f7f20f83bd0a58077662695b60ff6a2c79dc049b8744c8b4eee519e9f190
-
SSDEEP
768:VXBYHKZ22gaIdZWicx1eIOuL9caJol4PttfozY/HPnFgDKxFXHZSmWIzz/1H5w:VxnZ2kAQx7L3J64PttAzY/PjH4IzBa
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Kemhkd32.exeBgjbgchl.exeQmdkopdl.exeGbecbdjm.exeLonnqm32.exeKipaedgf.exeDjpqcqcc.exeIgpilnnh.exeJgjlbmfm.exeDfkkcaea.exePgnppjnp.exeDemdbgjo.exeGenimh32.exeHdmgfp32.exeHlehkllp.exeGglfid32.exeDmljnj32.exeGdlaij32.exeApeggd32.exeMbaeclhg.exeLcboej32.exeCdebjpkh.exeNmdgdcfo.exeMakjdcco.exeDcebjd32.exeEiadjaai.exeHmjcoq32.exeLmmfjfph.exeCchimc32.exeCfkndnbf.exeElffglje.exeBoomcqjq.exePcqheqnd.exeDbbimm32.exeFgmnlb32.exeJilpnc32.exeDjjjceod.exeIdppkcqg.exeNccnho32.exeDjdjnp32.exeDhlqnb32.exeQbmkgl32.exeJihgcdof.exeBeiepk32.exeNblapi32.exeKdlmqmpm.exeIclfnkmk.exeGogkhj32.exeHaagpd32.exeJmdgedfg.exeMdihlchn.exeNfmkmimo.exeQhicpc32.exeDighog32.exeGgbggaak.exeCoccmc32.exeFfbmbcae.exeCoocjngg.exeCjflbm32.exeLoaphndc.exeBgmombei.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kemhkd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgjbgchl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qmdkopdl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbecbdjm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lonnqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kipaedgf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djpqcqcc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igpilnnh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgjlbmfm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfkkcaea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgnppjnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Demdbgjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Genimh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdmgfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlehkllp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gglfid32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmljnj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdlaij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apeggd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbaeclhg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcboej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdebjpkh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmdgdcfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Makjdcco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcebjd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eiadjaai.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmjcoq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmmfjfph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cchimc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfkndnbf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elffglje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Boomcqjq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcqheqnd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbbimm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgmnlb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jilpnc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlehkllp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmdgdcfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djjjceod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idppkcqg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nccnho32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djdjnp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhlqnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbmkgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jihgcdof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beiepk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nblapi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgnppjnp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdlmqmpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iclfnkmk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gogkhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Haagpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmdgedfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdihlchn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfmkmimo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhicpc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dighog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggbggaak.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Coccmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffbmbcae.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Coocjngg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjflbm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Loaphndc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgmombei.exe -
Executes dropped EXE 64 IoCs
Processes:
Gbdnfbkb.exeHmedhoai.exeHhkiehqo.exeImgamo32.exeIinbbpdk.exeImlkhnka.exeIegpmqhl.exeIckpfegf.exeJacjmajk.exeJaefbq32.exeJgdkpg32.exeKqomol32.exeKodjpimc.exeKhmnhndc.exeKnlcfeph.exeKiagcn32.exeLjeqaecj.exeLaaecoid.exeLjjjle32.exeLcboej32.exeLpiojkli.exeMnpipgno.exeMlicek32.exeNblapi32.exeNogkpjkb.exeOcedfh32.exeOoleki32.exeOajagd32.exeOkbepjla.exeOglckkpb.exeOlhkcanj.exePgnppjnp.exePnhhmdem.exePcepeldd.exePlmena32.exeQmdkopdl.exeQdppcb32.exeQkihpmid.exeQqfphcgl.exeAjoeai32.exeAqimnc32.exeAknakl32.exeAnmngg32.exeAeffcakp.exeAmajhdik.exeAfjoaiok.exeAcnpjnne.exeCjmmaj32.exeClnjibjf.exeCdebjpkh.exeCfcnfkjl.exeClpfnbhc.exeCoocjngg.exeCehkgh32.exeChggccng.exeCpnodqnj.exeCblkqlmm.exeDekhmgla.exeDlepia32.exeDoclem32.exeDemdbgjo.exeDhlqnb32.exeDkjmjn32.exeDoeikmao.exepid process 1352 Gbdnfbkb.exe 1240 Hmedhoai.exe 2000 Hhkiehqo.exe 848 Imgamo32.exe 2008 Iinbbpdk.exe 912 Imlkhnka.exe 1300 Iegpmqhl.exe 1396 Ickpfegf.exe 808 Jacjmajk.exe 1804 Jaefbq32.exe 396 Jgdkpg32.exe 1876 Kqomol32.exe 1944 Kodjpimc.exe 1148 Khmnhndc.exe 772 Knlcfeph.exe 332 Kiagcn32.exe 1324 Ljeqaecj.exe 1576 Laaecoid.exe 1820 Ljjjle32.exe 928 Lcboej32.exe 1564 Lpiojkli.exe 1800 Mnpipgno.exe 1336 Mlicek32.exe 2024 Nblapi32.exe 1768 Nogkpjkb.exe 1756 Ocedfh32.exe 956 Ooleki32.exe 2004 Oajagd32.exe 1232 Okbepjla.exe 1700 Oglckkpb.exe 1512 Olhkcanj.exe 1160 Pgnppjnp.exe 1716 Pnhhmdem.exe 272 Pcepeldd.exe 1624 Plmena32.exe 292 Qmdkopdl.exe 2032 Qdppcb32.exe 684 Qkihpmid.exe 1552 Qqfphcgl.exe 1952 Ajoeai32.exe 1244 Aqimnc32.exe 1092 Aknakl32.exe 624 Anmngg32.exe 1520 Aeffcakp.exe 584 Amajhdik.exe 1824 Afjoaiok.exe 1272 Acnpjnne.exe 2044 Cjmmaj32.exe 1052 Clnjibjf.exe 952 Cdebjpkh.exe 1932 Cfcnfkjl.exe 1620 Clpfnbhc.exe 1372 Coocjngg.exe 1412 Cehkgh32.exe 588 Chggccng.exe 1656 Cpnodqnj.exe 1140 Cblkqlmm.exe 836 Dekhmgla.exe 1428 Dlepia32.exe 1772 Doclem32.exe 876 Demdbgjo.exe 1060 Dhlqnb32.exe 1376 Dkjmjn32.exe 1968 Doeikmao.exe -
Loads dropped DLL 64 IoCs
Processes:
6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exeGbdnfbkb.exeHmedhoai.exeHhkiehqo.exeImgamo32.exeIinbbpdk.exeImlkhnka.exeIegpmqhl.exeIckpfegf.exeJacjmajk.exeJaefbq32.exeJgdkpg32.exeKqomol32.exeKodjpimc.exeKhmnhndc.exeKnlcfeph.exeKiagcn32.exeLjeqaecj.exeLaaecoid.exeLjjjle32.exeLcboej32.exeLpiojkli.exeMnpipgno.exeMlicek32.exeNblapi32.exeNogkpjkb.exeOcedfh32.exeOoleki32.exeOajagd32.exeOkbepjla.exeOglckkpb.exeOlhkcanj.exepid process 1392 6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe 1392 6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe 1352 Gbdnfbkb.exe 1352 Gbdnfbkb.exe 1240 Hmedhoai.exe 1240 Hmedhoai.exe 2000 Hhkiehqo.exe 2000 Hhkiehqo.exe 848 Imgamo32.exe 848 Imgamo32.exe 2008 Iinbbpdk.exe 2008 Iinbbpdk.exe 912 Imlkhnka.exe 912 Imlkhnka.exe 1300 Iegpmqhl.exe 1300 Iegpmqhl.exe 1396 Ickpfegf.exe 1396 Ickpfegf.exe 808 Jacjmajk.exe 808 Jacjmajk.exe 1804 Jaefbq32.exe 1804 Jaefbq32.exe 396 Jgdkpg32.exe 396 Jgdkpg32.exe 1876 Kqomol32.exe 1876 Kqomol32.exe 1944 Kodjpimc.exe 1944 Kodjpimc.exe 1148 Khmnhndc.exe 1148 Khmnhndc.exe 772 Knlcfeph.exe 772 Knlcfeph.exe 332 Kiagcn32.exe 332 Kiagcn32.exe 1324 Ljeqaecj.exe 1324 Ljeqaecj.exe 1576 Laaecoid.exe 1576 Laaecoid.exe 1820 Ljjjle32.exe 1820 Ljjjle32.exe 928 Lcboej32.exe 928 Lcboej32.exe 1564 Lpiojkli.exe 1564 Lpiojkli.exe 1800 Mnpipgno.exe 1800 Mnpipgno.exe 1336 Mlicek32.exe 1336 Mlicek32.exe 2024 Nblapi32.exe 2024 Nblapi32.exe 1768 Nogkpjkb.exe 1768 Nogkpjkb.exe 1756 Ocedfh32.exe 1756 Ocedfh32.exe 956 Ooleki32.exe 956 Ooleki32.exe 2004 Oajagd32.exe 2004 Oajagd32.exe 1232 Okbepjla.exe 1232 Okbepjla.exe 1700 Oglckkpb.exe 1700 Oglckkpb.exe 1512 Olhkcanj.exe 1512 Olhkcanj.exe -
Drops file in System32 directory 64 IoCs
Processes:
Nogkpjkb.exeGlmign32.exeQmdkopdl.exeJjaani32.exeKbjbdild.exeKnlcfeph.exeEffllp32.exeIihjdqlj.exeJnagjg32.exeKefbje32.exeCehkgh32.exeOoepfo32.exeBedfiifi.exeGigihgdl.exePbfegmbl.exeAmkeci32.exeFdlejgho.exeJqmfpcpc.exeOhepkecb.exeCnbhbkaa.exeNnaldh32.exeBlghed32.exeGgbggaak.exeEckqgego.exeGlklao32.exeHdbpaoli.exeAmajhdik.exePcqheqnd.exeGhcdoi32.exeAmnfjj32.exeDocolf32.exeHcmcbg32.exeLaaecoid.exeJiejndqh.exeBpcfph32.exeMnpipgno.exeFjadla32.exeHphpkl32.exeHahleo32.exeMafbdh32.exeEbdhnahc.exeEohhgfgm.exeBnpkmlcc.exeJcpklief.exeJhamop32.exeLaffee32.exeDcmngefn.exeBghpfa32.exeEplcpebp.exeJgbebn32.exeKhenfqln.exeLidgpg32.exeNgjqmn32.exeBnmnglef.exeDhndkh32.exeHlehkllp.exeGkchoc32.exeKlmipnha.exeLbqdhgbl.exeKhhcpoiq.exeMepapggk.exeGejeooch.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ocedfh32.exe Nogkpjkb.exe File created C:\Windows\SysWOW64\Apackeac.dll Glmign32.exe File created C:\Windows\SysWOW64\Qdppcb32.exe Qmdkopdl.exe File created C:\Windows\SysWOW64\Ffcchg32.dll Jjaani32.exe File created C:\Windows\SysWOW64\Keiopekg.exe Kbjbdild.exe File created C:\Windows\SysWOW64\Anbpgn32.dll Knlcfeph.exe File created C:\Windows\SysWOW64\Mfqlho32.dll Effllp32.exe File opened for modification C:\Windows\SysWOW64\Ihkkpm32.exe Iihjdqlj.exe File created C:\Windows\SysWOW64\Pnbmllim.dll Jnagjg32.exe File opened for modification C:\Windows\SysWOW64\Khenfqln.exe Kefbje32.exe File created C:\Windows\SysWOW64\Kdomlhcf.dll Cehkgh32.exe File created C:\Windows\SysWOW64\Abjkaj32.dll Ooepfo32.exe File opened for modification C:\Windows\SysWOW64\Bhcbeeel.exe Bedfiifi.exe File opened for modification C:\Windows\SysWOW64\Gkeedccp.exe Gigihgdl.exe File created C:\Windows\SysWOW64\Nhpcja32.dll Pbfegmbl.exe File opened for modification C:\Windows\SysWOW64\Ahqjpb32.exe Amkeci32.exe File opened for modification C:\Windows\SysWOW64\Ffkafbhc.exe Fdlejgho.exe File created C:\Windows\SysWOW64\Gdapmnce.dll Jqmfpcpc.exe File created C:\Windows\SysWOW64\Okclgpbf.exe Ohepkecb.exe File opened for modification C:\Windows\SysWOW64\Cqpdog32.exe Cnbhbkaa.exe File opened for modification C:\Windows\SysWOW64\Npphqdnb.exe Nnaldh32.exe File opened for modification C:\Windows\SysWOW64\Bofdapca.exe Blghed32.exe File opened for modification C:\Windows\SysWOW64\Ghcdoi32.exe Ggbggaak.exe File created C:\Windows\SysWOW64\Ehhiolef.exe Eckqgego.exe File created C:\Windows\SysWOW64\Giolkc32.exe Glklao32.exe File created C:\Windows\SysWOW64\Jkpabh32.dll Hdbpaoli.exe File created C:\Windows\SysWOW64\Afjoaiok.exe Amajhdik.exe File created C:\Windows\SysWOW64\Pfodalmh.exe Pcqheqnd.exe File opened for modification C:\Windows\SysWOW64\Glopohpb.exe Ghcdoi32.exe File created C:\Windows\SysWOW64\Bljjleqc.exe Amnfjj32.exe File created C:\Windows\SysWOW64\Gkbaph32.dll Docolf32.exe File created C:\Windows\SysWOW64\Higloaml.exe Hcmcbg32.exe File opened for modification C:\Windows\SysWOW64\Ljjjle32.exe Laaecoid.exe File opened for modification C:\Windows\SysWOW64\Eidhhk32.exe Effllp32.exe File created C:\Windows\SysWOW64\Jalboaak.exe Jiejndqh.exe File opened for modification C:\Windows\SysWOW64\Bdnbqgfe.exe Bpcfph32.exe File opened for modification C:\Windows\SysWOW64\Mlicek32.exe Mnpipgno.exe File created C:\Windows\SysWOW64\Ogeeij32.dll Fjadla32.exe File created C:\Windows\SysWOW64\Gfgael32.dll Hphpkl32.exe File created C:\Windows\SysWOW64\Hdfiaj32.exe Hahleo32.exe File created C:\Windows\SysWOW64\Mddnqc32.exe Mafbdh32.exe File created C:\Windows\SysWOW64\Eebdjmgg.exe Ebdhnahc.exe File created C:\Windows\SysWOW64\Gembol32.dll Eohhgfgm.exe File opened for modification C:\Windows\SysWOW64\Bdicjf32.exe Bnpkmlcc.exe File opened for modification C:\Windows\SysWOW64\Jglgmh32.exe Jcpklief.exe File created C:\Windows\SysWOW64\Enhpbpja.dll Jhamop32.exe File created C:\Windows\SysWOW64\Dgbbiddl.dll Laffee32.exe File created C:\Windows\SysWOW64\Pcibhl32.dll Dcmngefn.exe File opened for modification C:\Windows\SysWOW64\Cjflbm32.exe Bghpfa32.exe File opened for modification C:\Windows\SysWOW64\Egckqcbb.exe Eplcpebp.exe File created C:\Windows\SysWOW64\Ifclkb32.dll Jgbebn32.exe File created C:\Windows\SysWOW64\Kplfhnmp.exe Khenfqln.exe File created C:\Windows\SysWOW64\Mnamnicl.dll Lidgpg32.exe File created C:\Windows\SysWOW64\Nlgife32.exe Ngjqmn32.exe File created C:\Windows\SysWOW64\Edhfdc32.dll Ngjqmn32.exe File created C:\Windows\SysWOW64\Bedfiifi.exe Bnmnglef.exe File created C:\Windows\SysWOW64\Dgadgedo.exe Dhndkh32.exe File created C:\Windows\SysWOW64\Hoddghkd.exe Hlehkllp.exe File created C:\Windows\SysWOW64\Gbmqkm32.exe Gkchoc32.exe File created C:\Windows\SysWOW64\Hdqilegd.dll Klmipnha.exe File created C:\Windows\SysWOW64\Pkkbcb32.dll Lbqdhgbl.exe File created C:\Windows\SysWOW64\Kgkclk32.exe Khhcpoiq.exe File created C:\Windows\SysWOW64\Mdbakd32.exe Mepapggk.exe File opened for modification C:\Windows\SysWOW64\Gnbjhd32.exe Gejeooch.exe -
Modifies registry class 64 IoCs
Processes:
Amnfjj32.exePplbea32.exeDjmnao32.exeNolkboma.exeDnniio32.exeDqleejim.exeDjdjnp32.exePpgikach.exeKajahefi.exeDgadgedo.exeHhffao32.exeJjhhohea.exeHphpkl32.exeIahidb32.exeAfkehp32.exeGncapnbc.exeKhihaphi.exeCchimc32.exeIgpbbhjl.exeGbmqkm32.exePefnhhpm.exeMjhobn32.exeJcpklief.exeNfonojjf.exeGajjdo32.exeHdkjqpbq.exeHddmgojf.exeDocolf32.exeBklefa32.exeEiadjaai.exeKfoeblmq.exeCjflbm32.exeFbgciqfo.exeJikhje32.exeJgdkpg32.exeMeamib32.exeLkglkm32.exeQqfphcgl.exeDekhmgla.exePbjnbl32.exeAepqoghb.exeGcfkfb32.exeGlmign32.exeImgamo32.exeNbdpcgph.exeBafnbkpb.exeJhamop32.exeEiqmpknm.exeDnadao32.exeIkkdahpf.exeBpecehli.exeFgmnlb32.exeJihgcdof.exeHjlldf32.exeDgcalebl.exePgnppjnp.exeHhqodcen.exeEpamke32.exeHieoiaoo.exeGepfbhhm.exeCnddhk32.exeEhmbjl32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amnfjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cppdegkf.dll" Pplbea32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djmnao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adplkj32.dll" Nolkboma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgfkmkgo.dll" Dnniio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfcqeblb.dll" Dqleejim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iinppi32.dll" Djdjnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eemiekbp.dll" Ppgikach.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kajahefi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgadgedo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnjegl32.dll" Hhffao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfifcd32.dll" Jjhhohea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hphpkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iahidb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afkehp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djdjnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gncapnbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khihaphi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cchimc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Majmfbgg.dll" Igpbbhjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbmqkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pefnhhpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjhobn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcpklief.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfonojjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gajjdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdkjqpbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehjbla32.dll" Hddmgojf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkbaph32.dll" Docolf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdgjml32.dll" Bklefa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eiadjaai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihapai32.dll" Kfoeblmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjflbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbgciqfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jikhje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlonbldb.dll" Jgdkpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Meamib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkglkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qqfphcgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dekhmgla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihfhdl32.dll" Pbjnbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iomiel32.dll" Aepqoghb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gcfkfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apackeac.dll" Glmign32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Imgamo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbdpcgph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bafnbkpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jhamop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eiqmpknm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amdpka32.dll" Dnadao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikkdahpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpecehli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bheahamm.dll" Fgmnlb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jihgcdof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjlldf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eaipnl32.dll" Dgcalebl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgnppjnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkecg32.dll" Hhqodcen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aepqoghb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Epamke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jeliko32.dll" Hieoiaoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gepfbhhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnddhk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehmbjl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exeGbdnfbkb.exeHmedhoai.exeHhkiehqo.exeImgamo32.exeIinbbpdk.exeImlkhnka.exeIegpmqhl.exeIckpfegf.exeJacjmajk.exeJaefbq32.exeJgdkpg32.exeKqomol32.exeKodjpimc.exeKhmnhndc.exeKnlcfeph.exedescription pid process target process PID 1392 wrote to memory of 1352 1392 6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe Gbdnfbkb.exe PID 1392 wrote to memory of 1352 1392 6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe Gbdnfbkb.exe PID 1392 wrote to memory of 1352 1392 6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe Gbdnfbkb.exe PID 1392 wrote to memory of 1352 1392 6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe Gbdnfbkb.exe PID 1352 wrote to memory of 1240 1352 Gbdnfbkb.exe Hmedhoai.exe PID 1352 wrote to memory of 1240 1352 Gbdnfbkb.exe Hmedhoai.exe PID 1352 wrote to memory of 1240 1352 Gbdnfbkb.exe Hmedhoai.exe PID 1352 wrote to memory of 1240 1352 Gbdnfbkb.exe Hmedhoai.exe PID 1240 wrote to memory of 2000 1240 Hmedhoai.exe Hhkiehqo.exe PID 1240 wrote to memory of 2000 1240 Hmedhoai.exe Hhkiehqo.exe PID 1240 wrote to memory of 2000 1240 Hmedhoai.exe Hhkiehqo.exe PID 1240 wrote to memory of 2000 1240 Hmedhoai.exe Hhkiehqo.exe PID 2000 wrote to memory of 848 2000 Hhkiehqo.exe Imgamo32.exe PID 2000 wrote to memory of 848 2000 Hhkiehqo.exe Imgamo32.exe PID 2000 wrote to memory of 848 2000 Hhkiehqo.exe Imgamo32.exe PID 2000 wrote to memory of 848 2000 Hhkiehqo.exe Imgamo32.exe PID 848 wrote to memory of 2008 848 Imgamo32.exe Iinbbpdk.exe PID 848 wrote to memory of 2008 848 Imgamo32.exe Iinbbpdk.exe PID 848 wrote to memory of 2008 848 Imgamo32.exe Iinbbpdk.exe PID 848 wrote to memory of 2008 848 Imgamo32.exe Iinbbpdk.exe PID 2008 wrote to memory of 912 2008 Iinbbpdk.exe Imlkhnka.exe PID 2008 wrote to memory of 912 2008 Iinbbpdk.exe Imlkhnka.exe PID 2008 wrote to memory of 912 2008 Iinbbpdk.exe Imlkhnka.exe PID 2008 wrote to memory of 912 2008 Iinbbpdk.exe Imlkhnka.exe PID 912 wrote to memory of 1300 912 Imlkhnka.exe Iegpmqhl.exe PID 912 wrote to memory of 1300 912 Imlkhnka.exe Iegpmqhl.exe PID 912 wrote to memory of 1300 912 Imlkhnka.exe Iegpmqhl.exe PID 912 wrote to memory of 1300 912 Imlkhnka.exe Iegpmqhl.exe PID 1300 wrote to memory of 1396 1300 Iegpmqhl.exe Ickpfegf.exe PID 1300 wrote to memory of 1396 1300 Iegpmqhl.exe Ickpfegf.exe PID 1300 wrote to memory of 1396 1300 Iegpmqhl.exe Ickpfegf.exe PID 1300 wrote to memory of 1396 1300 Iegpmqhl.exe Ickpfegf.exe PID 1396 wrote to memory of 808 1396 Ickpfegf.exe Jacjmajk.exe PID 1396 wrote to memory of 808 1396 Ickpfegf.exe Jacjmajk.exe PID 1396 wrote to memory of 808 1396 Ickpfegf.exe Jacjmajk.exe PID 1396 wrote to memory of 808 1396 Ickpfegf.exe Jacjmajk.exe PID 808 wrote to memory of 1804 808 Jacjmajk.exe Jaefbq32.exe PID 808 wrote to memory of 1804 808 Jacjmajk.exe Jaefbq32.exe PID 808 wrote to memory of 1804 808 Jacjmajk.exe Jaefbq32.exe PID 808 wrote to memory of 1804 808 Jacjmajk.exe Jaefbq32.exe PID 1804 wrote to memory of 396 1804 Jaefbq32.exe Jgdkpg32.exe PID 1804 wrote to memory of 396 1804 Jaefbq32.exe Jgdkpg32.exe PID 1804 wrote to memory of 396 1804 Jaefbq32.exe Jgdkpg32.exe PID 1804 wrote to memory of 396 1804 Jaefbq32.exe Jgdkpg32.exe PID 396 wrote to memory of 1876 396 Jgdkpg32.exe Kqomol32.exe PID 396 wrote to memory of 1876 396 Jgdkpg32.exe Kqomol32.exe PID 396 wrote to memory of 1876 396 Jgdkpg32.exe Kqomol32.exe PID 396 wrote to memory of 1876 396 Jgdkpg32.exe Kqomol32.exe PID 1876 wrote to memory of 1944 1876 Kqomol32.exe Kodjpimc.exe PID 1876 wrote to memory of 1944 1876 Kqomol32.exe Kodjpimc.exe PID 1876 wrote to memory of 1944 1876 Kqomol32.exe Kodjpimc.exe PID 1876 wrote to memory of 1944 1876 Kqomol32.exe Kodjpimc.exe PID 1944 wrote to memory of 1148 1944 Kodjpimc.exe Khmnhndc.exe PID 1944 wrote to memory of 1148 1944 Kodjpimc.exe Khmnhndc.exe PID 1944 wrote to memory of 1148 1944 Kodjpimc.exe Khmnhndc.exe PID 1944 wrote to memory of 1148 1944 Kodjpimc.exe Khmnhndc.exe PID 1148 wrote to memory of 772 1148 Khmnhndc.exe Knlcfeph.exe PID 1148 wrote to memory of 772 1148 Khmnhndc.exe Knlcfeph.exe PID 1148 wrote to memory of 772 1148 Khmnhndc.exe Knlcfeph.exe PID 1148 wrote to memory of 772 1148 Khmnhndc.exe Knlcfeph.exe PID 772 wrote to memory of 332 772 Knlcfeph.exe Kiagcn32.exe PID 772 wrote to memory of 332 772 Knlcfeph.exe Kiagcn32.exe PID 772 wrote to memory of 332 772 Knlcfeph.exe Kiagcn32.exe PID 772 wrote to memory of 332 772 Knlcfeph.exe Kiagcn32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe"C:\Users\Admin\AppData\Local\Temp\6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\Gbdnfbkb.exeC:\Windows\system32\Gbdnfbkb.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\Hmedhoai.exeC:\Windows\system32\Hmedhoai.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\Hhkiehqo.exeC:\Windows\system32\Hhkiehqo.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\Imgamo32.exeC:\Windows\system32\Imgamo32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\Iinbbpdk.exeC:\Windows\system32\Iinbbpdk.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\Imlkhnka.exeC:\Windows\system32\Imlkhnka.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\Iegpmqhl.exeC:\Windows\system32\Iegpmqhl.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\Ickpfegf.exeC:\Windows\system32\Ickpfegf.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\Jacjmajk.exeC:\Windows\system32\Jacjmajk.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\Jaefbq32.exeC:\Windows\system32\Jaefbq32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Jgdkpg32.exeC:\Windows\system32\Jgdkpg32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\Kqomol32.exeC:\Windows\system32\Kqomol32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\Kodjpimc.exeC:\Windows\system32\Kodjpimc.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\Khmnhndc.exeC:\Windows\system32\Khmnhndc.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\Knlcfeph.exeC:\Windows\system32\Knlcfeph.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\Kiagcn32.exeC:\Windows\system32\Kiagcn32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:332 -
C:\Windows\SysWOW64\Ljeqaecj.exeC:\Windows\system32\Ljeqaecj.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1324 -
C:\Windows\SysWOW64\Laaecoid.exeC:\Windows\system32\Laaecoid.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\Ljjjle32.exeC:\Windows\system32\Ljjjle32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1820 -
C:\Windows\SysWOW64\Lcboej32.exeC:\Windows\system32\Lcboej32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Windows\SysWOW64\Lpiojkli.exeC:\Windows\system32\Lpiojkli.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1564 -
C:\Windows\SysWOW64\Mnpipgno.exeC:\Windows\system32\Mnpipgno.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1800 -
C:\Windows\SysWOW64\Mlicek32.exeC:\Windows\system32\Mlicek32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1336 -
C:\Windows\SysWOW64\Nblapi32.exeC:\Windows\system32\Nblapi32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2024 -
C:\Windows\SysWOW64\Nogkpjkb.exeC:\Windows\system32\Nogkpjkb.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1768 -
C:\Windows\SysWOW64\Ocedfh32.exeC:\Windows\system32\Ocedfh32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Windows\SysWOW64\Ooleki32.exeC:\Windows\system32\Ooleki32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:956 -
C:\Windows\SysWOW64\Oajagd32.exeC:\Windows\system32\Oajagd32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004 -
C:\Windows\SysWOW64\Okbepjla.exeC:\Windows\system32\Okbepjla.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1232 -
C:\Windows\SysWOW64\Oglckkpb.exeC:\Windows\system32\Oglckkpb.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700 -
C:\Windows\SysWOW64\Olhkcanj.exeC:\Windows\system32\Olhkcanj.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1512 -
C:\Windows\SysWOW64\Pgnppjnp.exeC:\Windows\system32\Pgnppjnp.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1160 -
C:\Windows\SysWOW64\Pnhhmdem.exeC:\Windows\system32\Pnhhmdem.exe34⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\Pcepeldd.exeC:\Windows\system32\Pcepeldd.exe35⤵
- Executes dropped EXE
PID:272 -
C:\Windows\SysWOW64\Plmena32.exeC:\Windows\system32\Plmena32.exe36⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Qmdkopdl.exeC:\Windows\system32\Qmdkopdl.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:292 -
C:\Windows\SysWOW64\Qdppcb32.exeC:\Windows\system32\Qdppcb32.exe38⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\Qkihpmid.exeC:\Windows\system32\Qkihpmid.exe39⤵
- Executes dropped EXE
PID:684 -
C:\Windows\SysWOW64\Qqfphcgl.exeC:\Windows\system32\Qqfphcgl.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:1552 -
C:\Windows\SysWOW64\Ajoeai32.exeC:\Windows\system32\Ajoeai32.exe41⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Aqimnc32.exeC:\Windows\system32\Aqimnc32.exe42⤵
- Executes dropped EXE
PID:1244 -
C:\Windows\SysWOW64\Aknakl32.exeC:\Windows\system32\Aknakl32.exe43⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Anmngg32.exeC:\Windows\system32\Anmngg32.exe44⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\Aeffcakp.exeC:\Windows\system32\Aeffcakp.exe45⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\Amajhdik.exeC:\Windows\system32\Amajhdik.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:584 -
C:\Windows\SysWOW64\Afjoaiok.exeC:\Windows\system32\Afjoaiok.exe47⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\Acnpjnne.exeC:\Windows\system32\Acnpjnne.exe48⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\Cjmmaj32.exeC:\Windows\system32\Cjmmaj32.exe49⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\Clnjibjf.exeC:\Windows\system32\Clnjibjf.exe50⤵
- Executes dropped EXE
PID:1052 -
C:\Windows\SysWOW64\Cdebjpkh.exeC:\Windows\system32\Cdebjpkh.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:952 -
C:\Windows\SysWOW64\Cfcnfkjl.exeC:\Windows\system32\Cfcnfkjl.exe52⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\Clpfnbhc.exeC:\Windows\system32\Clpfnbhc.exe53⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Coocjngg.exeC:\Windows\system32\Coocjngg.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1372 -
C:\Windows\SysWOW64\Cehkgh32.exeC:\Windows\system32\Cehkgh32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1412 -
C:\Windows\SysWOW64\Chggccng.exeC:\Windows\system32\Chggccng.exe56⤵
- Executes dropped EXE
PID:588 -
C:\Windows\SysWOW64\Cpnodqnj.exeC:\Windows\system32\Cpnodqnj.exe57⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Cblkqlmm.exeC:\Windows\system32\Cblkqlmm.exe58⤵
- Executes dropped EXE
PID:1140 -
C:\Windows\SysWOW64\Dekhmgla.exeC:\Windows\system32\Dekhmgla.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:836 -
C:\Windows\SysWOW64\Dlepia32.exeC:\Windows\system32\Dlepia32.exe60⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\SysWOW64\Doclem32.exeC:\Windows\system32\Doclem32.exe61⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\Demdbgjo.exeC:\Windows\system32\Demdbgjo.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\Dhlqnb32.exeC:\Windows\system32\Dhlqnb32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1060 -
C:\Windows\SysWOW64\Dkjmjn32.exeC:\Windows\system32\Dkjmjn32.exe64⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\Doeikmao.exeC:\Windows\system32\Doeikmao.exe65⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\Depahg32.exeC:\Windows\system32\Depahg32.exe66⤵PID:1808
-
C:\Windows\SysWOW64\Dhnmdb32.exeC:\Windows\system32\Dhnmdb32.exe67⤵PID:608
-
C:\Windows\SysWOW64\Dkljpn32.exeC:\Windows\system32\Dkljpn32.exe68⤵PID:988
-
C:\Windows\SysWOW64\Dnkfli32.exeC:\Windows\system32\Dnkfli32.exe69⤵PID:1668
-
C:\Windows\SysWOW64\Dpibhd32.exeC:\Windows\system32\Dpibhd32.exe70⤵PID:1964
-
C:\Windows\SysWOW64\Fqdncfmi.exeC:\Windows\system32\Fqdncfmi.exe71⤵PID:1600
-
C:\Windows\SysWOW64\Fgofpp32.exeC:\Windows\system32\Fgofpp32.exe72⤵PID:1828
-
C:\Windows\SysWOW64\Fjmbll32.exeC:\Windows\system32\Fjmbll32.exe73⤵PID:1136
-
C:\Windows\SysWOW64\Fqgkif32.exeC:\Windows\system32\Fqgkif32.exe74⤵PID:1996
-
C:\Windows\SysWOW64\Gjooakaf.exeC:\Windows\system32\Gjooakaf.exe75⤵PID:1532
-
C:\Windows\SysWOW64\Gkqlic32.exeC:\Windows\system32\Gkqlic32.exe76⤵PID:1524
-
C:\Windows\SysWOW64\Gbkdfnoa.exeC:\Windows\system32\Gbkdfnoa.exe77⤵PID:1584
-
C:\Windows\SysWOW64\Gidlbh32.exeC:\Windows\system32\Gidlbh32.exe78⤵PID:1676
-
C:\Windows\SysWOW64\Gkchoc32.exeC:\Windows\system32\Gkchoc32.exe79⤵
- Drops file in System32 directory
PID:1328 -
C:\Windows\SysWOW64\Gbmqkm32.exeC:\Windows\system32\Gbmqkm32.exe80⤵
- Modifies registry class
PID:984 -
C:\Windows\SysWOW64\Gigihgdl.exeC:\Windows\system32\Gigihgdl.exe81⤵
- Drops file in System32 directory
PID:276 -
C:\Windows\SysWOW64\Gkeedccp.exeC:\Windows\system32\Gkeedccp.exe82⤵PID:2052
-
C:\Windows\SysWOW64\Gncapnbc.exeC:\Windows\system32\Gncapnbc.exe83⤵
- Modifies registry class
PID:2060 -
C:\Windows\SysWOW64\Genimh32.exeC:\Windows\system32\Genimh32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2068 -
C:\Windows\SysWOW64\Gglfid32.exeC:\Windows\system32\Gglfid32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2076 -
C:\Windows\SysWOW64\Glhajbam.exeC:\Windows\system32\Glhajbam.exe86⤵PID:2084
-
C:\Windows\SysWOW64\Gbajfmij.exeC:\Windows\system32\Gbajfmij.exe87⤵PID:2092
-
C:\Windows\SysWOW64\Gepfbhhm.exeC:\Windows\system32\Gepfbhhm.exe88⤵
- Modifies registry class
PID:2100 -
C:\Windows\SysWOW64\Ggnbocga.exeC:\Windows\system32\Ggnbocga.exe89⤵PID:2108
-
C:\Windows\SysWOW64\Hjmokofe.exeC:\Windows\system32\Hjmokofe.exe90⤵PID:2116
-
C:\Windows\SysWOW64\Hagggi32.exeC:\Windows\system32\Hagggi32.exe91⤵PID:2124
-
C:\Windows\SysWOW64\Hhqodcen.exeC:\Windows\system32\Hhqodcen.exe92⤵
- Modifies registry class
PID:2132 -
C:\Windows\SysWOW64\Hjokqodb.exeC:\Windows\system32\Hjokqodb.exe93⤵PID:2140
-
C:\Windows\SysWOW64\Hmngmjcf.exeC:\Windows\system32\Hmngmjcf.exe94⤵PID:2148
-
C:\Windows\SysWOW64\Hpldie32.exeC:\Windows\system32\Hpldie32.exe95⤵PID:2156
-
C:\Windows\SysWOW64\Hfflepjf.exeC:\Windows\system32\Hfflepjf.exe96⤵PID:2164
-
C:\Windows\SysWOW64\Hjahfn32.exeC:\Windows\system32\Hjahfn32.exe97⤵PID:2172
-
C:\Windows\SysWOW64\Hmpdbj32.exeC:\Windows\system32\Hmpdbj32.exe98⤵PID:2180
-
C:\Windows\SysWOW64\Hpnqne32.exeC:\Windows\system32\Hpnqne32.exe99⤵PID:2472
-
C:\Windows\SysWOW64\Kkjcjcol.exeC:\Windows\system32\Kkjcjcol.exe100⤵PID:2520
-
C:\Windows\SysWOW64\Kdlmqmpm.exeC:\Windows\system32\Kdlmqmpm.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2528 -
C:\Windows\SysWOW64\Llpeknem.exeC:\Windows\system32\Llpeknem.exe102⤵PID:2548
-
C:\Windows\SysWOW64\Mpipep32.exeC:\Windows\system32\Mpipep32.exe103⤵PID:2556
-
C:\Windows\SysWOW64\Nbdpcgph.exeC:\Windows\system32\Nbdpcgph.exe104⤵
- Modifies registry class
PID:2564 -
C:\Windows\SysWOW64\Nmdgdcfo.exeC:\Windows\system32\Nmdgdcfo.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2572 -
C:\Windows\SysWOW64\Ncnoan32.exeC:\Windows\system32\Ncnoan32.exe106⤵PID:2580
-
C:\Windows\SysWOW64\Nfmkmimo.exeC:\Windows\system32\Nfmkmimo.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2588 -
C:\Windows\SysWOW64\Ooepfo32.exeC:\Windows\system32\Ooepfo32.exe108⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\Obclbj32.exeC:\Windows\system32\Obclbj32.exe109⤵PID:2604
-
C:\Windows\SysWOW64\Oebhne32.exeC:\Windows\system32\Oebhne32.exe110⤵PID:2612
-
C:\Windows\SysWOW64\Oklpkpid.exeC:\Windows\system32\Oklpkpid.exe111⤵PID:2632
-
C:\Windows\SysWOW64\Ofadhhhj.exeC:\Windows\system32\Ofadhhhj.exe112⤵PID:2648
-
C:\Windows\SysWOW64\Oedede32.exeC:\Windows\system32\Oedede32.exe113⤵PID:2680
-
C:\Windows\SysWOW64\Obheminn.exeC:\Windows\system32\Obheminn.exe114⤵PID:2688
-
C:\Windows\SysWOW64\Oakeif32.exeC:\Windows\system32\Oakeif32.exe115⤵PID:2696
-
C:\Windows\SysWOW64\Onabhjap.exeC:\Windows\system32\Onabhjap.exe116⤵PID:2704
-
C:\Windows\SysWOW64\Pablieoq.exeC:\Windows\system32\Pablieoq.exe117⤵PID:2712
-
C:\Windows\SysWOW64\Pcqheqnd.exeC:\Windows\system32\Pcqheqnd.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2720 -
C:\Windows\SysWOW64\Pfodalmh.exeC:\Windows\system32\Pfodalmh.exe119⤵PID:2728
-
C:\Windows\SysWOW64\Pmilnfde.exeC:\Windows\system32\Pmilnfde.exe120⤵PID:2736
-
C:\Windows\SysWOW64\Ppgikach.exeC:\Windows\system32\Ppgikach.exe121⤵
- Modifies registry class
PID:2744 -
C:\Windows\SysWOW64\Pbfegmbl.exeC:\Windows\system32\Pbfegmbl.exe122⤵
- Drops file in System32 directory
PID:2752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-