Analysis
-
max time kernel
151s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 09:03
Static task
static1
Behavioral task
behavioral1
Sample
00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe
Resource
win10v2004-20220812-en
General
-
Target
00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe
-
Size
51KB
-
MD5
a9e68fb3503b59949936864d461a29d0
-
SHA1
13afecca3f3acd548ac40b6e6fe8b695e02131d5
-
SHA256
00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1
-
SHA512
63660d2074ff91e153a08f5d84b35dac926465cbcf9eb793df85572f8e2bdc492cf549c823d091c313ed469995a887b3be0649623e646721026946095dec6ec6
-
SSDEEP
1536:Vx7t32ISSX+5cYX+srDHucmi7HpshAzB:H7rm+yLuYehy
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Ddloga32.exeIllgfa32.exeGkjdkd32.exeDfmephkk.exeIgqkeg32.exeGnojkgqf.exePmilnfde.exeKinamkab.exeDoicbihm.exeLnehgi32.exeMppgephg.exeKklcei32.exeCngcfcep.exeFiflkq32.exeKkophlcl.exeEebonkhm.exeAqcljj32.exeOfnell32.exeBfnclg32.exeGofdmdfe.exeFmpkfpgn.exeDphkpk32.exeOnpnge32.exeLnaboj32.exeLjkpik32.exeQeimgqeo.exeEmqfab32.exeHakpeedn.exeHjpandie.exeFpimjg32.exeCcopkb32.exeAlcabnog.exeEobceodg.exeJjmepq32.exePccgdice.exeOaijokmf.exeOkmemahl.exeOlmcom32.exeOhcddnlg.exeLmpeinfi.exeFfnfpmmo.exeNmpneh32.exeCmgfolld.exeCphoagie.exeDpjkfg32.exeCmlnog32.exeFallhlkn.exeHlnlnk32.exeJjankpbc.exePbkqkefk.exeIdpbao32.exeNagccqda.exeJkfqfjif.exeIjcplmof.exeEqoqbfqj.exeQleaijki.exeEodpjo32.exeMjggld32.exeOgcogl32.exeNiegfkgn.exeLdqech32.exeLmijlmlg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddloga32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Illgfa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkjdkd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfmephkk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igqkeg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnojkgqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmilnfde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kinamkab.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doicbihm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnehgi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mppgephg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kklcei32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cngcfcep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fiflkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkophlcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eebonkhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aqcljj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofnell32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfnclg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gofdmdfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmpkfpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dphkpk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onpnge32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnaboj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljkpik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qeimgqeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emqfab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hakpeedn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjpandie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpimjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccopkb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alcabnog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eobceodg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjmepq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pccgdice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oaijokmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okmemahl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Olmcom32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohcddnlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfmephkk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmpeinfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffnfpmmo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmpneh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmgfolld.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cphoagie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpjkfg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmlnog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fallhlkn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlnlnk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjankpbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbkqkefk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idpbao32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nagccqda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkfqfjif.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oaijokmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijcplmof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqoqbfqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qleaijki.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eodpjo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjggld32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogcogl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niegfkgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldqech32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmijlmlg.exe -
Executes dropped EXE 64 IoCs
Processes:
Nkohlb32.exePbbonnjo.exePlkcgd32.exePggamakl.exeQcpogbnm.exeQpcoqfmg.exeAhcmphfm.exeBpckpi32.exeBlmijj32.exeBjcfinpk.exeCihcjj32.exeCobkgdlp.exeCcijkg32.exeDnqknpim.exeDpfqagke.exeEalgdomo.exeElbkagld.exeEhilfh32.exeFknncc32.exeFehocq32.exeFihdoo32.exeGdikpk32.exeHhdcpm32.exeHblhiccc.exeIcidli32.exeKbnmli32.exeKimodc32.exeKedpid32.exeLbhpbh32.exeLglbak32.exeLnfknegf.exeLkjkgi32.exeMeclhg32.exeMjdace32.exeMkgkam32.exeMnfgmh32.exeMoecgkqd.exeNgeafmjj.exeOfohbijl.exeOgeneple.exePfmgllok.exePmilnfde.exePipmcg32.exePdeaqp32.exePefnhhpm.exePmnfie32.exePeijnh32.exeQoaogmdk.exeQleppa32.exeAaddnh32.exeAmkeci32.exeAkoflm32.exeAdgjecjh.exeAlboje32.exeAochkp32.exeBhlldfkd.exeBepmnj32.exeBebjcj32.exeBkaoapdp.exeCjflbm32.exeCcopkb32.exeCjihglge.exeCjkemleb.exeCmiaigdf.exepid process 1964 Nkohlb32.exe 1976 Pbbonnjo.exe 1472 Plkcgd32.exe 1944 Pggamakl.exe 1324 Qcpogbnm.exe 1108 Qpcoqfmg.exe 1768 Ahcmphfm.exe 664 Bpckpi32.exe 1040 Blmijj32.exe 1708 Bjcfinpk.exe 1296 Cihcjj32.exe 1200 Cobkgdlp.exe 1612 Ccijkg32.exe 1992 Dnqknpim.exe 2040 Dpfqagke.exe 1620 Ealgdomo.exe 1228 Elbkagld.exe 576 Ehilfh32.exe 1484 Fknncc32.exe 1656 Fehocq32.exe 328 Fihdoo32.exe 1832 Gdikpk32.exe 2004 Hhdcpm32.exe 1600 Hblhiccc.exe 1740 Icidli32.exe 1712 Kbnmli32.exe 1456 Kimodc32.exe 984 Kedpid32.exe 976 Lbhpbh32.exe 1516 Lglbak32.exe 828 Lnfknegf.exe 1068 Lkjkgi32.exe 2020 Meclhg32.exe 1732 Mjdace32.exe 520 Mkgkam32.exe 468 Mnfgmh32.exe 584 Moecgkqd.exe 1280 Ngeafmjj.exe 676 Ofohbijl.exe 1812 Ogeneple.exe 596 Pfmgllok.exe 832 Pmilnfde.exe 1556 Pipmcg32.exe 1624 Pdeaqp32.exe 1584 Pefnhhpm.exe 284 Pmnfie32.exe 1468 Peijnh32.exe 1100 Qoaogmdk.exe 1576 Qleppa32.exe 884 Aaddnh32.exe 1568 Amkeci32.exe 1760 Akoflm32.exe 1696 Adgjecjh.exe 1940 Alboje32.exe 1536 Aochkp32.exe 2036 Bhlldfkd.exe 1628 Bepmnj32.exe 568 Bebjcj32.exe 992 Bkaoapdp.exe 1592 Cjflbm32.exe 1772 Ccopkb32.exe 944 Cjihglge.exe 2016 Cjkemleb.exe 1752 Cmiaigdf.exe -
Loads dropped DLL 64 IoCs
Processes:
00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exeNkohlb32.exePbbonnjo.exePlkcgd32.exePggamakl.exeQcpogbnm.exeQpcoqfmg.exeAhcmphfm.exeBpckpi32.exeBlmijj32.exeBjcfinpk.exeCihcjj32.exeCobkgdlp.exeCcijkg32.exeDnqknpim.exeDpfqagke.exeEalgdomo.exeElbkagld.exeEhilfh32.exeFknncc32.exeFehocq32.exeFihdoo32.exeGdikpk32.exeHhdcpm32.exeHblhiccc.exeIcidli32.exeKbnmli32.exeKimodc32.exeKedpid32.exeLbhpbh32.exeLglbak32.exeLnfknegf.exepid process 1608 00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe 1608 00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe 1964 Nkohlb32.exe 1964 Nkohlb32.exe 1976 Pbbonnjo.exe 1976 Pbbonnjo.exe 1472 Plkcgd32.exe 1472 Plkcgd32.exe 1944 Pggamakl.exe 1944 Pggamakl.exe 1324 Qcpogbnm.exe 1324 Qcpogbnm.exe 1108 Qpcoqfmg.exe 1108 Qpcoqfmg.exe 1768 Ahcmphfm.exe 1768 Ahcmphfm.exe 664 Bpckpi32.exe 664 Bpckpi32.exe 1040 Blmijj32.exe 1040 Blmijj32.exe 1708 Bjcfinpk.exe 1708 Bjcfinpk.exe 1296 Cihcjj32.exe 1296 Cihcjj32.exe 1200 Cobkgdlp.exe 1200 Cobkgdlp.exe 1612 Ccijkg32.exe 1612 Ccijkg32.exe 1992 Dnqknpim.exe 1992 Dnqknpim.exe 2040 Dpfqagke.exe 2040 Dpfqagke.exe 1620 Ealgdomo.exe 1620 Ealgdomo.exe 1228 Elbkagld.exe 1228 Elbkagld.exe 576 Ehilfh32.exe 576 Ehilfh32.exe 1484 Fknncc32.exe 1484 Fknncc32.exe 1656 Fehocq32.exe 1656 Fehocq32.exe 328 Fihdoo32.exe 328 Fihdoo32.exe 1832 Gdikpk32.exe 1832 Gdikpk32.exe 2004 Hhdcpm32.exe 2004 Hhdcpm32.exe 1600 Hblhiccc.exe 1600 Hblhiccc.exe 1740 Icidli32.exe 1740 Icidli32.exe 1712 Kbnmli32.exe 1712 Kbnmli32.exe 1456 Kimodc32.exe 1456 Kimodc32.exe 984 Kedpid32.exe 984 Kedpid32.exe 976 Lbhpbh32.exe 976 Lbhpbh32.exe 1516 Lglbak32.exe 1516 Lglbak32.exe 828 Lnfknegf.exe 828 Lnfknegf.exe -
Drops file in System32 directory 64 IoCs
Processes:
Eebonkhm.exeOklnbkdp.exeGcheefjm.exeDjihkm32.exeHhhqnf32.exeCfklke32.exeMoecgkqd.exeCchcaa32.exeGklqqc32.exeBoidkm32.exeEodpjo32.exeKajmfg32.exeFjogfbfd.exeNdjfabgl.exeDgmjae32.exeEckqgego.exeDhnoogje.exeHfegfnhp.exeMkhahc32.exeAopdkjck.exePfpicm32.exeAjhkjqng.exeCinfdm32.exeDdomej32.exeQpcoqfmg.exeKphqdllk.exeKeiain32.exeDkfgdljj.exeHenlcb32.exeCphoagie.exeHblhiccc.exeHmfnfb32.exeEnanhm32.exeJnohko32.exeQjahnoao.exeOfjihh32.exeLijjlibe.exeFkgeml32.exeBmkabpjj.exeDfmephkk.exeLdgcindl.exeIjcplmof.exeLllodkfa.exeBlbjjd32.exeQgioneod.exeDbigbb32.exePcniglkc.exeIjnlej32.exeLnfknegf.exeHcqgpplg.exeMeffdbkh.exeDmbaij32.exeBqonoank.exeEhpejqdg.exeEellai32.exeGimbnlak.exeJilocode.exeAlpnbh32.exeAglmnj32.exeEiqaai32.exeMbjfpb32.exeIaoggk32.exeIagfkinl.exeGfpmjjkb.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Fhakjfgq.exe Eebonkhm.exe File opened for modification C:\Windows\SysWOW64\Omjjnfcd.exe Oklnbkdp.exe File created C:\Windows\SysWOW64\Gjanbp32.exe Gcheefjm.exe File created C:\Windows\SysWOW64\Dacpggom.exe Djihkm32.exe File opened for modification C:\Windows\SysWOW64\Hjjmfnga.exe Hhhqnf32.exe File opened for modification C:\Windows\SysWOW64\Cilemp32.exe Cfklke32.exe File opened for modification C:\Windows\SysWOW64\Ngeafmjj.exe Moecgkqd.exe File created C:\Windows\SysWOW64\Lkghod32.dll Cchcaa32.exe File created C:\Windows\SysWOW64\Gnkmmole.exe Gklqqc32.exe File opened for modification C:\Windows\SysWOW64\Bbgagh32.exe Boidkm32.exe File created C:\Windows\SysWOW64\Flfpmf32.exe Eodpjo32.exe File created C:\Windows\SysWOW64\Hhiqpode.dll Kajmfg32.exe File created C:\Windows\SysWOW64\Feekckfj.exe Fjogfbfd.exe File opened for modification C:\Windows\SysWOW64\Nekcik32.exe Ndjfabgl.exe File opened for modification C:\Windows\SysWOW64\Dodabb32.exe Dgmjae32.exe File created C:\Windows\SysWOW64\Efimcqfb.exe Eckqgego.exe File created C:\Windows\SysWOW64\Dohgka32.exe Dhnoogje.exe File created C:\Windows\SysWOW64\Hmoobh32.exe Hfegfnhp.exe File created C:\Windows\SysWOW64\Knhihbcg.dll Mkhahc32.exe File opened for modification C:\Windows\SysWOW64\Aaoqgfbo.exe Aopdkjck.exe File created C:\Windows\SysWOW64\Ppemqf32.exe Pfpicm32.exe File opened for modification C:\Windows\SysWOW64\Aqacgked.exe Ajhkjqng.exe File created C:\Windows\SysWOW64\Cphoagie.exe Cinfdm32.exe File created C:\Windows\SysWOW64\Hfgekmii.dll Ddomej32.exe File created C:\Windows\SysWOW64\Bpmldpbl.dll Qpcoqfmg.exe File opened for modification C:\Windows\SysWOW64\Khoheimm.exe Kphqdllk.exe File created C:\Windows\SysWOW64\Hbollpgb.dll Keiain32.exe File created C:\Windows\SysWOW64\Dndcpgin.exe Dkfgdljj.exe File created C:\Windows\SysWOW64\Ojcllo32.dll Henlcb32.exe File opened for modification C:\Windows\SysWOW64\Cfbgna32.exe Cphoagie.exe File created C:\Windows\SysWOW64\Icidli32.exe Hblhiccc.exe File created C:\Windows\SysWOW64\Hbcfniah.exe Hmfnfb32.exe File opened for modification C:\Windows\SysWOW64\Eppjdh32.exe Enanhm32.exe File created C:\Windows\SysWOW64\Jijfaldg.exe Jnohko32.exe File created C:\Windows\SysWOW64\Pmphfgbm.dll Qjahnoao.exe File created C:\Windows\SysWOW64\Bhomacee.dll Ofjihh32.exe File opened for modification C:\Windows\SysWOW64\Llifhdai.exe Lijjlibe.exe File created C:\Windows\SysWOW64\Gnmgjf32.exe Fkgeml32.exe File created C:\Windows\SysWOW64\Bcejoj32.exe Bmkabpjj.exe File created C:\Windows\SysWOW64\Ebhophmj.exe Dfmephkk.exe File created C:\Windows\SysWOW64\Ldjpom32.exe Ldgcindl.exe File created C:\Windows\SysWOW64\Edappqfk.dll Ijcplmof.exe File created C:\Windows\SysWOW64\Lokkqgfe.exe Lllodkfa.exe File opened for modification C:\Windows\SysWOW64\Bifjch32.exe Blbjjd32.exe File opened for modification C:\Windows\SysWOW64\Ajhkjqng.exe Qgioneod.exe File opened for modification C:\Windows\SysWOW64\Dicpolnc.exe Dbigbb32.exe File opened for modification C:\Windows\SysWOW64\Qldmie32.exe Pcniglkc.exe File created C:\Windows\SysWOW64\Kbajcbni.dll Ijnlej32.exe File created C:\Windows\SysWOW64\Lkjkgi32.exe Lnfknegf.exe File created C:\Windows\SysWOW64\Aohhhdcf.dll Hcqgpplg.exe File created C:\Windows\SysWOW64\Mgdbamjl.exe Meffdbkh.exe File created C:\Windows\SysWOW64\Odlmiokn.dll Dmbaij32.exe File created C:\Windows\SysWOW64\Omhnhi32.dll Bqonoank.exe File created C:\Windows\SysWOW64\Eiqaai32.exe Ehpejqdg.exe File opened for modification C:\Windows\SysWOW64\Ehkhnd32.exe Eellai32.exe File created C:\Windows\SysWOW64\Hgobqdec.exe Gimbnlak.exe File created C:\Windows\SysWOW64\Lcepbg32.dll Jilocode.exe File created C:\Windows\SysWOW64\Abjfobek.exe Alpnbh32.exe File created C:\Windows\SysWOW64\Kpkjja32.dll Aglmnj32.exe File opened for modification C:\Windows\SysWOW64\Eahjbf32.exe Eiqaai32.exe File opened for modification C:\Windows\SysWOW64\Nejpbnbd.exe Mbjfpb32.exe File created C:\Windows\SysWOW64\Coibbfee.dll Iaoggk32.exe File created C:\Windows\SysWOW64\Ipofeaid.dll Iagfkinl.exe File opened for modification C:\Windows\SysWOW64\Gmjegdbo.exe Gfpmjjkb.exe -
Modifies registry class 64 IoCs
Processes:
Hilgbipk.exeHhgbnfbd.exePfmjee32.exeLcokga32.exeCjiicq32.exeHmoobh32.exeJegnam32.exeIbjjko32.exePccgdice.exeIcmponmi.exeAnqfdc32.exeEonkch32.exeAglmnj32.exeGpmkno32.exeCmkkhk32.exeDohgka32.exeEefick32.exeIclkoi32.exeLjkpik32.exeNlnnkp32.exeIbfakdje.exeBondenhi.exeMocijd32.exeNafoaoei.exeFillqflh.exeIdfbgemp.exeEobceodg.exeIgpbbhjl.exeNiiakk32.exeOjadcb32.exeGnmgjf32.exeDmbaij32.exeMljlejfl.exeHnnhhniq.exePqekhndb.exeDophgclj.exeEbbjnajd.exeNjmkff32.exeCjoodh32.exeNdemfc32.exeMfjpbj32.exeGcbepp32.exeBlbjjd32.exeOhcddnlg.exeDejefo32.exeBkaoapdp.exeGpnahe32.exeKliacgbi.exeAplqmmib.exeHfmeihld.exe00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exeCkfjehho.exeDppnee32.exeJkfqfjif.exeFkjgnmgj.exeHlmefaid.exeCelemgkp.exePcalgb32.exeMmoncd32.exeIckdeb32.exeJkbjbg32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hilgbipk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhgbnfbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfmjee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcokga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjiicq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmoobh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jegnam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibjjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pccgdice.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldaomj32.dll" Icmponmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhimojho.dll" Anqfdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lngjdame.dll" Eonkch32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aglmnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfhppagl.dll" Gpmkno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmkkhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dohgka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffbejf32.dll" Eefick32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpphjide.dll" Iclkoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iokhdd32.dll" Ljkpik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Noaebe32.dll" Nlnnkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibfakdje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bondenhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgdigqin.dll" Mocijd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nafoaoei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fillqflh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idfbgemp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eobceodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igpbbhjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Niiakk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojadcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkhglg32.dll" Gnmgjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmbaij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mljlejfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hnnhhniq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pqekhndb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dophgclj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebbjnajd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkneek32.dll" Njmkff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjoodh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ndemfc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjiicq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfjpbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gcbepp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blbjjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffklli32.dll" Ohcddnlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmnmbn32.dll" Dejefo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jegnam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkaoapdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gpnahe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kliacgbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aplqmmib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hfmeihld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Henmjbjl.dll" Ckfjehho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dppnee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkfqfjif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkobieoe.dll" Fkjgnmgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlmefaid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Celemgkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccdjccml.dll" Nafoaoei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcalgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gchgokfh.dll" Mmoncd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbijikph.dll" Ickdeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkbjbg32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exeNkohlb32.exePbbonnjo.exePlkcgd32.exePggamakl.exeQcpogbnm.exeQpcoqfmg.exeAhcmphfm.exeBpckpi32.exeBlmijj32.exeBjcfinpk.exeCihcjj32.exeCobkgdlp.exeCcijkg32.exeDnqknpim.exeDpfqagke.exedescription pid process target process PID 1608 wrote to memory of 1964 1608 00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe Nkohlb32.exe PID 1608 wrote to memory of 1964 1608 00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe Nkohlb32.exe PID 1608 wrote to memory of 1964 1608 00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe Nkohlb32.exe PID 1608 wrote to memory of 1964 1608 00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe Nkohlb32.exe PID 1964 wrote to memory of 1976 1964 Nkohlb32.exe Pbbonnjo.exe PID 1964 wrote to memory of 1976 1964 Nkohlb32.exe Pbbonnjo.exe PID 1964 wrote to memory of 1976 1964 Nkohlb32.exe Pbbonnjo.exe PID 1964 wrote to memory of 1976 1964 Nkohlb32.exe Pbbonnjo.exe PID 1976 wrote to memory of 1472 1976 Pbbonnjo.exe Plkcgd32.exe PID 1976 wrote to memory of 1472 1976 Pbbonnjo.exe Plkcgd32.exe PID 1976 wrote to memory of 1472 1976 Pbbonnjo.exe Plkcgd32.exe PID 1976 wrote to memory of 1472 1976 Pbbonnjo.exe Plkcgd32.exe PID 1472 wrote to memory of 1944 1472 Plkcgd32.exe Pggamakl.exe PID 1472 wrote to memory of 1944 1472 Plkcgd32.exe Pggamakl.exe PID 1472 wrote to memory of 1944 1472 Plkcgd32.exe Pggamakl.exe PID 1472 wrote to memory of 1944 1472 Plkcgd32.exe Pggamakl.exe PID 1944 wrote to memory of 1324 1944 Pggamakl.exe Qcpogbnm.exe PID 1944 wrote to memory of 1324 1944 Pggamakl.exe Qcpogbnm.exe PID 1944 wrote to memory of 1324 1944 Pggamakl.exe Qcpogbnm.exe PID 1944 wrote to memory of 1324 1944 Pggamakl.exe Qcpogbnm.exe PID 1324 wrote to memory of 1108 1324 Qcpogbnm.exe Qpcoqfmg.exe PID 1324 wrote to memory of 1108 1324 Qcpogbnm.exe Qpcoqfmg.exe PID 1324 wrote to memory of 1108 1324 Qcpogbnm.exe Qpcoqfmg.exe PID 1324 wrote to memory of 1108 1324 Qcpogbnm.exe Qpcoqfmg.exe PID 1108 wrote to memory of 1768 1108 Qpcoqfmg.exe Ahcmphfm.exe PID 1108 wrote to memory of 1768 1108 Qpcoqfmg.exe Ahcmphfm.exe PID 1108 wrote to memory of 1768 1108 Qpcoqfmg.exe Ahcmphfm.exe PID 1108 wrote to memory of 1768 1108 Qpcoqfmg.exe Ahcmphfm.exe PID 1768 wrote to memory of 664 1768 Ahcmphfm.exe Bpckpi32.exe PID 1768 wrote to memory of 664 1768 Ahcmphfm.exe Bpckpi32.exe PID 1768 wrote to memory of 664 1768 Ahcmphfm.exe Bpckpi32.exe PID 1768 wrote to memory of 664 1768 Ahcmphfm.exe Bpckpi32.exe PID 664 wrote to memory of 1040 664 Bpckpi32.exe Blmijj32.exe PID 664 wrote to memory of 1040 664 Bpckpi32.exe Blmijj32.exe PID 664 wrote to memory of 1040 664 Bpckpi32.exe Blmijj32.exe PID 664 wrote to memory of 1040 664 Bpckpi32.exe Blmijj32.exe PID 1040 wrote to memory of 1708 1040 Blmijj32.exe Bjcfinpk.exe PID 1040 wrote to memory of 1708 1040 Blmijj32.exe Bjcfinpk.exe PID 1040 wrote to memory of 1708 1040 Blmijj32.exe Bjcfinpk.exe PID 1040 wrote to memory of 1708 1040 Blmijj32.exe Bjcfinpk.exe PID 1708 wrote to memory of 1296 1708 Bjcfinpk.exe Cihcjj32.exe PID 1708 wrote to memory of 1296 1708 Bjcfinpk.exe Cihcjj32.exe PID 1708 wrote to memory of 1296 1708 Bjcfinpk.exe Cihcjj32.exe PID 1708 wrote to memory of 1296 1708 Bjcfinpk.exe Cihcjj32.exe PID 1296 wrote to memory of 1200 1296 Cihcjj32.exe Cobkgdlp.exe PID 1296 wrote to memory of 1200 1296 Cihcjj32.exe Cobkgdlp.exe PID 1296 wrote to memory of 1200 1296 Cihcjj32.exe Cobkgdlp.exe PID 1296 wrote to memory of 1200 1296 Cihcjj32.exe Cobkgdlp.exe PID 1200 wrote to memory of 1612 1200 Cobkgdlp.exe Ccijkg32.exe PID 1200 wrote to memory of 1612 1200 Cobkgdlp.exe Ccijkg32.exe PID 1200 wrote to memory of 1612 1200 Cobkgdlp.exe Ccijkg32.exe PID 1200 wrote to memory of 1612 1200 Cobkgdlp.exe Ccijkg32.exe PID 1612 wrote to memory of 1992 1612 Ccijkg32.exe Dnqknpim.exe PID 1612 wrote to memory of 1992 1612 Ccijkg32.exe Dnqknpim.exe PID 1612 wrote to memory of 1992 1612 Ccijkg32.exe Dnqknpim.exe PID 1612 wrote to memory of 1992 1612 Ccijkg32.exe Dnqknpim.exe PID 1992 wrote to memory of 2040 1992 Dnqknpim.exe Dpfqagke.exe PID 1992 wrote to memory of 2040 1992 Dnqknpim.exe Dpfqagke.exe PID 1992 wrote to memory of 2040 1992 Dnqknpim.exe Dpfqagke.exe PID 1992 wrote to memory of 2040 1992 Dnqknpim.exe Dpfqagke.exe PID 2040 wrote to memory of 1620 2040 Dpfqagke.exe Ealgdomo.exe PID 2040 wrote to memory of 1620 2040 Dpfqagke.exe Ealgdomo.exe PID 2040 wrote to memory of 1620 2040 Dpfqagke.exe Ealgdomo.exe PID 2040 wrote to memory of 1620 2040 Dpfqagke.exe Ealgdomo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe"C:\Users\Admin\AppData\Local\Temp\00ab364e4bf8a392bcfb94262075c4ae7c1a60982bce5920a0b228af9d54e7d1.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Nkohlb32.exeC:\Windows\system32\Nkohlb32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pbbonnjo.exeC:\Windows\system32\Pbbonnjo.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Plkcgd32.exeC:\Windows\system32\Plkcgd32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Pggamakl.exeC:\Windows\system32\Pggamakl.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qcpogbnm.exeC:\Windows\system32\Qcpogbnm.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Qpcoqfmg.exeC:\Windows\system32\Qpcoqfmg.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ahcmphfm.exeC:\Windows\system32\Ahcmphfm.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bpckpi32.exeC:\Windows\system32\Bpckpi32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Cihcjj32.exeC:\Windows\system32\Cihcjj32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Cobkgdlp.exeC:\Windows\system32\Cobkgdlp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ccijkg32.exeC:\Windows\system32\Ccijkg32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dnqknpim.exeC:\Windows\system32\Dnqknpim.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Dpfqagke.exeC:\Windows\system32\Dpfqagke.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Bjcfinpk.exeC:\Windows\system32\Bjcfinpk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Blmijj32.exeC:\Windows\system32\Blmijj32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ealgdomo.exeC:\Windows\system32\Ealgdomo.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Elbkagld.exeC:\Windows\system32\Elbkagld.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Ehilfh32.exeC:\Windows\system32\Ehilfh32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fknncc32.exeC:\Windows\system32\Fknncc32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fehocq32.exeC:\Windows\system32\Fehocq32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Fihdoo32.exeC:\Windows\system32\Fihdoo32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Gdikpk32.exeC:\Windows\system32\Gdikpk32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Hhdcpm32.exeC:\Windows\system32\Hhdcpm32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Hblhiccc.exeC:\Windows\system32\Hblhiccc.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Icidli32.exeC:\Windows\system32\Icidli32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Kbnmli32.exeC:\Windows\system32\Kbnmli32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Kimodc32.exeC:\Windows\system32\Kimodc32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Kedpid32.exeC:\Windows\system32\Kedpid32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Lbhpbh32.exeC:\Windows\system32\Lbhpbh32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Lglbak32.exeC:\Windows\system32\Lglbak32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Lnfknegf.exeC:\Windows\system32\Lnfknegf.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Lkjkgi32.exeC:\Windows\system32\Lkjkgi32.exe17⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Meclhg32.exeC:\Windows\system32\Meclhg32.exe18⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mjdace32.exeC:\Windows\system32\Mjdace32.exe19⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mkgkam32.exeC:\Windows\system32\Mkgkam32.exe20⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mnfgmh32.exeC:\Windows\system32\Mnfgmh32.exe21⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Moecgkqd.exeC:\Windows\system32\Moecgkqd.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Ngeafmjj.exeC:\Windows\system32\Ngeafmjj.exe23⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ofohbijl.exeC:\Windows\system32\Ofohbijl.exe24⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ogeneple.exeC:\Windows\system32\Ogeneple.exe25⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pfmgllok.exeC:\Windows\system32\Pfmgllok.exe26⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pmilnfde.exeC:\Windows\system32\Pmilnfde.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pipmcg32.exeC:\Windows\system32\Pipmcg32.exe28⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pdeaqp32.exeC:\Windows\system32\Pdeaqp32.exe29⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pefnhhpm.exeC:\Windows\system32\Pefnhhpm.exe30⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Pmnfie32.exeC:\Windows\system32\Pmnfie32.exe31⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Peijnh32.exeC:\Windows\system32\Peijnh32.exe32⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qoaogmdk.exeC:\Windows\system32\Qoaogmdk.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Qleppa32.exeC:\Windows\system32\Qleppa32.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Aaddnh32.exeC:\Windows\system32\Aaddnh32.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Amkeci32.exeC:\Windows\system32\Amkeci32.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Akoflm32.exeC:\Windows\system32\Akoflm32.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Adgjecjh.exeC:\Windows\system32\Adgjecjh.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Alboje32.exeC:\Windows\system32\Alboje32.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Aochkp32.exeC:\Windows\system32\Aochkp32.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bhlldfkd.exeC:\Windows\system32\Bhlldfkd.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bepmnj32.exeC:\Windows\system32\Bepmnj32.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bebjcj32.exeC:\Windows\system32\Bebjcj32.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Bkaoapdp.exeC:\Windows\system32\Bkaoapdp.exe44⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Cjflbm32.exeC:\Windows\system32\Cjflbm32.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ccopkb32.exeC:\Windows\system32\Ccopkb32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cjihglge.exeC:\Windows\system32\Cjihglge.exe47⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cjkemleb.exeC:\Windows\system32\Cjkemleb.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cmiaigdf.exeC:\Windows\system32\Cmiaigdf.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Cmlnog32.exeC:\Windows\system32\Cmlnog32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Cojjkb32.exeC:\Windows\system32\Cojjkb32.exe51⤵
-
C:\Windows\SysWOW64\Cjpohk32.exeC:\Windows\system32\Cjpohk32.exe52⤵
-
C:\Windows\SysWOW64\Ckakpcgk.exeC:\Windows\system32\Ckakpcgk.exe53⤵
-
C:\Windows\SysWOW64\Cchcaa32.exeC:\Windows\system32\Cchcaa32.exe54⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Dgobec32.exeC:\Windows\system32\Dgobec32.exe55⤵
-
C:\Windows\SysWOW64\Dnijbnnd.exeC:\Windows\system32\Dnijbnnd.exe56⤵
-
C:\Windows\SysWOW64\Ealpih32.exeC:\Windows\system32\Ealpih32.exe57⤵
-
C:\Windows\SysWOW64\Ememdi32.exeC:\Windows\system32\Ememdi32.exe58⤵
-
C:\Windows\SysWOW64\Eepbhkjp.exeC:\Windows\system32\Eepbhkjp.exe59⤵
-
C:\Windows\SysWOW64\Ehondgic.exeC:\Windows\system32\Ehondgic.exe60⤵
-
C:\Windows\SysWOW64\Eebonkhm.exeC:\Windows\system32\Eebonkhm.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Fhakjfgq.exeC:\Windows\system32\Fhakjfgq.exe62⤵
-
C:\Windows\SysWOW64\Fjogfbfd.exeC:\Windows\system32\Fjogfbfd.exe63⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Feekckfj.exeC:\Windows\system32\Feekckfj.exe64⤵
-
C:\Windows\SysWOW64\Flocpemg.exeC:\Windows\system32\Flocpemg.exe65⤵
-
C:\Windows\SysWOW64\Fomplplk.exeC:\Windows\system32\Fomplplk.exe66⤵
-
C:\Windows\SysWOW64\Fallhlkn.exeC:\Windows\system32\Fallhlkn.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Fopmbpjh.exeC:\Windows\system32\Fopmbpjh.exe68⤵
-
C:\Windows\SysWOW64\Ffkafbhc.exeC:\Windows\system32\Ffkafbhc.exe69⤵
-
C:\Windows\SysWOW64\Fapeck32.exeC:\Windows\system32\Fapeck32.exe70⤵
-
C:\Windows\SysWOW64\Fljfdi32.exeC:\Windows\system32\Fljfdi32.exe71⤵
-
C:\Windows\SysWOW64\Gebkmnjh.exeC:\Windows\system32\Gebkmnjh.exe72⤵
-
C:\Windows\SysWOW64\Ggbggaak.exeC:\Windows\system32\Ggbggaak.exe73⤵
-
C:\Windows\SysWOW64\Gndfbpak.exeC:\Windows\system32\Gndfbpak.exe74⤵
-
C:\Windows\SysWOW64\Hlnlnk32.exeC:\Windows\system32\Hlnlnk32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Hchdkejk.exeC:\Windows\system32\Hchdkejk.exe76⤵
-
C:\Windows\SysWOW64\Hfgqgain.exeC:\Windows\system32\Hfgqgain.exe77⤵
-
C:\Windows\SysWOW64\Hnnhhniq.exeC:\Windows\system32\Hnnhhniq.exe78⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Hooepf32.exeC:\Windows\system32\Hooepf32.exe79⤵
-
C:\Windows\SysWOW64\Hgfmad32.exeC:\Windows\system32\Hgfmad32.exe80⤵
-
C:\Windows\SysWOW64\Ikkopg32.exeC:\Windows\system32\Ikkopg32.exe81⤵
-
C:\Windows\SysWOW64\Jpckji32.exeC:\Windows\system32\Jpckji32.exe82⤵
-
C:\Windows\SysWOW64\Jgkckf32.exeC:\Windows\system32\Jgkckf32.exe83⤵
-
C:\Windows\SysWOW64\Jjiogb32.exeC:\Windows\system32\Jjiogb32.exe84⤵
-
C:\Windows\SysWOW64\Jilocode.exeC:\Windows\system32\Jilocode.exe85⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Jacgdleh.exeC:\Windows\system32\Jacgdleh.exe86⤵
-
C:\Windows\SysWOW64\Jcacpgdl.exeC:\Windows\system32\Jcacpgdl.exe87⤵
-
C:\Windows\SysWOW64\Jfpplcco.exeC:\Windows\system32\Jfpplcco.exe88⤵
-
C:\Windows\SysWOW64\Jcdpeg32.exeC:\Windows\system32\Jcdpeg32.exe89⤵
-
C:\Windows\SysWOW64\Jpkakhhm.exeC:\Windows\system32\Jpkakhhm.exe90⤵
-
C:\Windows\SysWOW64\Klaapi32.exeC:\Windows\system32\Klaapi32.exe91⤵
-
C:\Windows\SysWOW64\Knpnld32.exeC:\Windows\system32\Knpnld32.exe92⤵
-
C:\Windows\SysWOW64\Kmggbq32.exeC:\Windows\system32\Kmggbq32.exe93⤵
-
C:\Windows\SysWOW64\Kdapok32.exeC:\Windows\system32\Kdapok32.exe94⤵
-
C:\Windows\SysWOW64\Kfplkf32.exeC:\Windows\system32\Kfplkf32.exe95⤵
-
C:\Windows\SysWOW64\Kmjdhqmg.exeC:\Windows\system32\Kmjdhqmg.exe96⤵
-
C:\Windows\SysWOW64\Kphqdllk.exeC:\Windows\system32\Kphqdllk.exe97⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Khoheimm.exeC:\Windows\system32\Khoheimm.exe98⤵
-
C:\Windows\SysWOW64\Lpofdk32.exeC:\Windows\system32\Lpofdk32.exe99⤵
-
C:\Windows\SysWOW64\Ligknq32.exeC:\Windows\system32\Ligknq32.exe100⤵
-
C:\Windows\SysWOW64\Laelgb32.exeC:\Windows\system32\Laelgb32.exe101⤵
-
C:\Windows\SysWOW64\Magimbfi.exeC:\Windows\system32\Magimbfi.exe102⤵
-
C:\Windows\SysWOW64\Mgfnki32.exeC:\Windows\system32\Mgfnki32.exe103⤵
-
C:\Windows\SysWOW64\Mcmopjhb.exeC:\Windows\system32\Mcmopjhb.exe104⤵
-
C:\Windows\SysWOW64\Mjggld32.exeC:\Windows\system32\Mjggld32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mpclon32.exeC:\Windows\system32\Mpclon32.exe106⤵
-
C:\Windows\SysWOW64\Nkbfjkmc.exeC:\Windows\system32\Nkbfjkmc.exe107⤵
-
C:\Windows\SysWOW64\Ofbnkgci.exeC:\Windows\system32\Ofbnkgci.exe108⤵
-
C:\Windows\SysWOW64\Onjfmedl.exeC:\Windows\system32\Onjfmedl.exe109⤵
-
C:\Windows\SysWOW64\Ofjdlf32.exeC:\Windows\system32\Ofjdlf32.exe110⤵
-
C:\Windows\SysWOW64\Pkfldm32.exeC:\Windows\system32\Pkfldm32.exe111⤵
-
C:\Windows\SysWOW64\Pbpdag32.exeC:\Windows\system32\Pbpdag32.exe112⤵
-
C:\Windows\SysWOW64\Pgbfdnmh.exeC:\Windows\system32\Pgbfdnmh.exe113⤵
-
C:\Windows\SysWOW64\Pmoomdko.exeC:\Windows\system32\Pmoomdko.exe114⤵
-
C:\Windows\SysWOW64\Qhfppm32.exeC:\Windows\system32\Qhfppm32.exe115⤵
-
C:\Windows\SysWOW64\Qfipkjpm.exeC:\Windows\system32\Qfipkjpm.exe116⤵
-
C:\Windows\SysWOW64\Qihlgeoq.exeC:\Windows\system32\Qihlgeoq.exe117⤵
-
C:\Windows\SysWOW64\Qflmqinj.exeC:\Windows\system32\Qflmqinj.exe118⤵
-
C:\Windows\SysWOW64\Qijimemn.exeC:\Windows\system32\Qijimemn.exe119⤵
-
C:\Windows\SysWOW64\Apdaio32.exeC:\Windows\system32\Apdaio32.exe120⤵
-
C:\Windows\SysWOW64\Abbnejco.exeC:\Windows\system32\Abbnejco.exe121⤵
-
C:\Windows\SysWOW64\Ailfbd32.exeC:\Windows\system32\Ailfbd32.exe122⤵
-
C:\Windows\SysWOW64\Alkbop32.exeC:\Windows\system32\Alkbop32.exe123⤵
-
C:\Windows\SysWOW64\Abejkjal.exeC:\Windows\system32\Abejkjal.exe124⤵
-
C:\Windows\SysWOW64\Aecfgeqp.exeC:\Windows\system32\Aecfgeqp.exe125⤵
-
C:\Windows\SysWOW64\Abggqjpi.exeC:\Windows\system32\Abggqjpi.exe126⤵
-
C:\Windows\SysWOW64\Aopdkjck.exeC:\Windows\system32\Aopdkjck.exe127⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Aaoqgfbo.exeC:\Windows\system32\Aaoqgfbo.exe128⤵
-
C:\Windows\SysWOW64\Admmca32.exeC:\Windows\system32\Admmca32.exe129⤵
-
C:\Windows\SysWOW64\Bdpiia32.exeC:\Windows\system32\Bdpiia32.exe130⤵
-
C:\Windows\SysWOW64\Bondenhi.exeC:\Windows\system32\Bondenhi.exe131⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Celemgkp.exeC:\Windows\system32\Celemgkp.exe132⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Dqpicd32.exeC:\Windows\system32\Dqpicd32.exe133⤵
-
C:\Windows\SysWOW64\Dcpbeo32.exeC:\Windows\system32\Dcpbeo32.exe134⤵
-
C:\Windows\SysWOW64\Dimkmf32.exeC:\Windows\system32\Dimkmf32.exe135⤵
-
C:\Windows\SysWOW64\Dcbojojc.exeC:\Windows\system32\Dcbojojc.exe136⤵
-
C:\Windows\SysWOW64\Dfakfjjf.exeC:\Windows\system32\Dfakfjjf.exe137⤵
-
C:\Windows\SysWOW64\Diogceij.exeC:\Windows\system32\Diogceij.exe138⤵
-
C:\Windows\SysWOW64\Doippp32.exeC:\Windows\system32\Doippp32.exe139⤵
-
C:\Windows\SysWOW64\Eehemfll.exeC:\Windows\system32\Eehemfll.exe140⤵
-
C:\Windows\SysWOW64\Eggaiakp.exeC:\Windows\system32\Eggaiakp.exe141⤵
-
C:\Windows\SysWOW64\Eglkda32.exeC:\Windows\system32\Eglkda32.exe142⤵
-
C:\Windows\SysWOW64\Ejlcfl32.exeC:\Windows\system32\Ejlcfl32.exe143⤵
-
C:\Windows\SysWOW64\Faflcf32.exeC:\Windows\system32\Faflcf32.exe144⤵
-
C:\Windows\SysWOW64\Ffeaqm32.exeC:\Windows\system32\Ffeaqm32.exe145⤵
-
C:\Windows\SysWOW64\Fmoimgpi.exeC:\Windows\system32\Fmoimgpi.exe146⤵
-
C:\Windows\SysWOW64\Fpneib32.exeC:\Windows\system32\Fpneib32.exe147⤵
-
C:\Windows\SysWOW64\Fblafn32.exeC:\Windows\system32\Fblafn32.exe148⤵
-
C:\Windows\SysWOW64\Fjjcpp32.exeC:\Windows\system32\Fjjcpp32.exe149⤵
-
C:\Windows\SysWOW64\Fadklj32.exeC:\Windows\system32\Fadklj32.exe150⤵
-
C:\Windows\SysWOW64\Fdbghe32.exeC:\Windows\system32\Fdbghe32.exe151⤵
-
C:\Windows\SysWOW64\Glipjb32.exeC:\Windows\system32\Glipjb32.exe152⤵
-
C:\Windows\SysWOW64\Gmjlakfj.exeC:\Windows\system32\Gmjlakfj.exe153⤵
-
C:\Windows\SysWOW64\Geadbhgm.exeC:\Windows\system32\Geadbhgm.exe154⤵
-
C:\Windows\SysWOW64\Gmmigjdh.exeC:\Windows\system32\Gmmigjdh.exe155⤵
-
C:\Windows\SysWOW64\Gpkecf32.exeC:\Windows\system32\Gpkecf32.exe156⤵
-
C:\Windows\SysWOW64\Ggemppkh.exeC:\Windows\system32\Ggemppkh.exe157⤵
-
C:\Windows\SysWOW64\Gpnahe32.exeC:\Windows\system32\Gpnahe32.exe158⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Gblnda32.exeC:\Windows\system32\Gblnda32.exe159⤵
-
C:\Windows\SysWOW64\Gmabbj32.exeC:\Windows\system32\Gmabbj32.exe160⤵
-
C:\Windows\SysWOW64\Gppnne32.exeC:\Windows\system32\Gppnne32.exe161⤵
-
C:\Windows\SysWOW64\Gemgflmm.exeC:\Windows\system32\Gemgflmm.exe162⤵
-
C:\Windows\SysWOW64\Gmdoginp.exeC:\Windows\system32\Gmdoginp.exe163⤵
-
C:\Windows\SysWOW64\Hcqgpplg.exeC:\Windows\system32\Hcqgpplg.exe164⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Heocllkk.exeC:\Windows\system32\Heocllkk.exe165⤵
-
C:\Windows\SysWOW64\Heapak32.exeC:\Windows\system32\Heapak32.exe166⤵
-
C:\Windows\SysWOW64\Hhpmng32.exeC:\Windows\system32\Hhpmng32.exe167⤵
-
C:\Windows\SysWOW64\Hojejaph.exeC:\Windows\system32\Hojejaph.exe168⤵
-
C:\Windows\SysWOW64\Holapqnf.exeC:\Windows\system32\Holapqnf.exe169⤵
-
C:\Windows\SysWOW64\Hajnllmj.exeC:\Windows\system32\Hajnllmj.exe170⤵
-
C:\Windows\SysWOW64\Hdijhg32.exeC:\Windows\system32\Hdijhg32.exe171⤵
-
C:\Windows\SysWOW64\Hggfdc32.exeC:\Windows\system32\Hggfdc32.exe172⤵
-
C:\Windows\SysWOW64\Hhgbnfbd.exeC:\Windows\system32\Hhgbnfbd.exe173⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Ikeojaag.exeC:\Windows\system32\Ikeojaag.exe174⤵
-
C:\Windows\SysWOW64\Iaoggk32.exeC:\Windows\system32\Iaoggk32.exe175⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Idnccg32.exeC:\Windows\system32\Idnccg32.exe176⤵
-
C:\Windows\SysWOW64\Idppiffe.exeC:\Windows\system32\Idppiffe.exe177⤵
-
C:\Windows\SysWOW64\Ifcifnja.exeC:\Windows\system32\Ifcifnja.exe178⤵
-
C:\Windows\SysWOW64\Ihbebjid.exeC:\Windows\system32\Ihbebjid.exe179⤵
-
C:\Windows\SysWOW64\Iqincgjg.exeC:\Windows\system32\Iqincgjg.exe180⤵
-
C:\Windows\SysWOW64\Ibjjko32.exeC:\Windows\system32\Ibjjko32.exe181⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Jhgomi32.exeC:\Windows\system32\Jhgomi32.exe182⤵
-
C:\Windows\SysWOW64\Jkekid32.exeC:\Windows\system32\Jkekid32.exe183⤵
-
C:\Windows\SysWOW64\Jbocfokp.exeC:\Windows\system32\Jbocfokp.exe184⤵
-
C:\Windows\SysWOW64\Jkghod32.exeC:\Windows\system32\Jkghod32.exe185⤵
-
C:\Windows\SysWOW64\Jjmepq32.exeC:\Windows\system32\Jjmepq32.exe186⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Jbdman32.exeC:\Windows\system32\Jbdman32.exe187⤵
-
C:\Windows\SysWOW64\Jgqeie32.exeC:\Windows\system32\Jgqeie32.exe188⤵
-
C:\Windows\SysWOW64\Jjoaep32.exeC:\Windows\system32\Jjoaep32.exe189⤵
-
C:\Windows\SysWOW64\Jcgfnfkf.exeC:\Windows\system32\Jcgfnfkf.exe190⤵
-
C:\Windows\SysWOW64\Jjankpbc.exeC:\Windows\system32\Jjankpbc.exe191⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kfhopa32.exeC:\Windows\system32\Kfhopa32.exe192⤵
-
C:\Windows\SysWOW64\Kiihaleh.exeC:\Windows\system32\Kiihaleh.exe193⤵
-
C:\Windows\SysWOW64\Kfmhkpda.exeC:\Windows\system32\Kfmhkpda.exe194⤵
-
C:\Windows\SysWOW64\Kikdglce.exeC:\Windows\system32\Kikdglce.exe195⤵
-
C:\Windows\SysWOW64\Kliacgbi.exeC:\Windows\system32\Kliacgbi.exe196⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Kinamkab.exeC:\Windows\system32\Kinamkab.exe197⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Kaifan32.exeC:\Windows\system32\Kaifan32.exe198⤵
-
C:\Windows\SysWOW64\Lipnbk32.exeC:\Windows\system32\Lipnbk32.exe199⤵
-
C:\Windows\SysWOW64\Ldioci32.exeC:\Windows\system32\Ldioci32.exe200⤵
-
C:\Windows\SysWOW64\Ljcgpccl.exeC:\Windows\system32\Ljcgpccl.exe201⤵
-
C:\Windows\SysWOW64\Lfjhddip.exeC:\Windows\system32\Lfjhddip.exe202⤵
-
C:\Windows\SysWOW64\Lnapfaib.exeC:\Windows\system32\Lnapfaib.exe203⤵
-
C:\Windows\SysWOW64\Ldnhnhhi.exeC:\Windows\system32\Ldnhnhhi.exe204⤵
-
C:\Windows\SysWOW64\Ldqech32.exeC:\Windows\system32\Ldqech32.exe205⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Ljjmpbmc.exeC:\Windows\system32\Ljjmpbmc.exe206⤵
-
C:\Windows\SysWOW64\Lmijlmlg.exeC:\Windows\system32\Lmijlmlg.exe207⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Mednqpib.exeC:\Windows\system32\Mednqpib.exe208⤵
-
C:\Windows\SysWOW64\Mpjbnh32.exeC:\Windows\system32\Mpjbnh32.exe209⤵
-
C:\Windows\SysWOW64\Mefkfo32.exeC:\Windows\system32\Mefkfo32.exe210⤵
-
C:\Windows\SysWOW64\Mhgdhj32.exeC:\Windows\system32\Mhgdhj32.exe211⤵
-
C:\Windows\SysWOW64\Moaled32.exeC:\Windows\system32\Moaled32.exe212⤵
-
C:\Windows\SysWOW64\Mekdaocj.exeC:\Windows\system32\Mekdaocj.exe213⤵
-
C:\Windows\SysWOW64\Mocijd32.exeC:\Windows\system32\Mocijd32.exe214⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Mdpabk32.exeC:\Windows\system32\Mdpabk32.exe215⤵
-
C:\Windows\SysWOW64\Nafoaoei.exeC:\Windows\system32\Nafoaoei.exe216⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Onkopd32.exeC:\Windows\system32\Onkopd32.exe217⤵
-
C:\Windows\SysWOW64\Odegmn32.exeC:\Windows\system32\Odegmn32.exe218⤵
-
C:\Windows\SysWOW64\Pfmjee32.exeC:\Windows\system32\Pfmjee32.exe219⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pndafb32.exeC:\Windows\system32\Pndafb32.exe220⤵
-
C:\Windows\SysWOW64\Pqbnbn32.exeC:\Windows\system32\Pqbnbn32.exe221⤵
-
C:\Windows\SysWOW64\Pjkbkc32.exeC:\Windows\system32\Pjkbkc32.exe222⤵
-
C:\Windows\SysWOW64\Pqekhndb.exeC:\Windows\system32\Pqekhndb.exe223⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pccgdice.exeC:\Windows\system32\Pccgdice.exe224⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
-
C:\Windows\SysWOW64\Pjmoqc32.exeC:\Windows\system32\Pjmoqc32.exe225⤵
-
C:\Windows\SysWOW64\Pmlkmo32.exeC:\Windows\system32\Pmlkmo32.exe226⤵
-
C:\Windows\SysWOW64\Pceciiac.exeC:\Windows\system32\Pceciiac.exe227⤵
-
C:\Windows\SysWOW64\Pfdpedqg.exeC:\Windows\system32\Pfdpedqg.exe228⤵
-
C:\Windows\SysWOW64\Piblap32.exeC:\Windows\system32\Piblap32.exe229⤵
-
C:\Windows\SysWOW64\Ppldnjgg.exeC:\Windows\system32\Ppldnjgg.exe230⤵
-
C:\Windows\SysWOW64\Pbkqkefk.exeC:\Windows\system32\Pbkqkefk.exe231⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Qeimgqeo.exeC:\Windows\system32\Qeimgqeo.exe232⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Qlceck32.exeC:\Windows\system32\Qlceck32.exe233⤵
-
C:\Windows\SysWOW64\Qnaapf32.exeC:\Windows\system32\Qnaapf32.exe234⤵
-
C:\Windows\SysWOW64\Qleaijki.exeC:\Windows\system32\Qleaijki.exe235⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Qbpjfd32.exeC:\Windows\system32\Qbpjfd32.exe236⤵
-
C:\Windows\SysWOW64\Aenfbp32.exeC:\Windows\system32\Aenfbp32.exe237⤵
-
C:\Windows\SysWOW64\Ahlbnk32.exeC:\Windows\system32\Ahlbnk32.exe238⤵
-
C:\Windows\SysWOW64\Ajkojg32.exeC:\Windows\system32\Ajkojg32.exe239⤵
-
C:\Windows\SysWOW64\Aaeggagm.exeC:\Windows\system32\Aaeggagm.exe240⤵
-
C:\Windows\SysWOW64\Ahoock32.exeC:\Windows\system32\Ahoock32.exe241⤵