Analysis
-
max time kernel
155s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 09:03
Static task
static1
Behavioral task
behavioral1
Sample
f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe
Resource
win10v2004-20220812-en
General
-
Target
f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe
-
Size
50KB
-
MD5
a72d1322e3f7124a691f0685b4cf4290
-
SHA1
18e4edaff9ec85bb1cf1b0f6c81a9f267d53a29b
-
SHA256
f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c
-
SHA512
8013ea6828bda4905ba84839d1d73c08d3768e2c5f516a7f0bca22dd76d62e64d59a8d61bcabc6e9303e1b5961890d5501cd0ab51004c6ff7ea7a351c1845d4f
-
SSDEEP
768:OExxg8dBqMP8D/gg2hJA7zlSpZRczQXk9Bm5y/pa99MY6yzWmjNxH5s8pw/1H5g:OE8/g9hJA7zcfRAkyq9MBOWmjNxZ9pK
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Acfbadkb.exeNjhgnh32.exeAdgjecjh.exeAgffanik.exeMlnifb32.exeOaijokmf.exeLdnfep32.exeMeclhg32.exePcffba32.exeMplalaoj.exeNhaigbdj.exeOakfdjkc.exeAgoalc32.exeBqmnfh32.exeFdaeplhf.exeGpkcjm32.exeNoccqoeb.exeLkealjje.exeNmnaoiba.exeAdnhkhim.exeCobkgdlp.exeObocbolc.exeOebijj32.exeOnnnnl32.exeFmogdn32.exeKjaqdi32.exeLooagidq.exeKclabnoe.exeLjffnkim.exeCljfki32.exeMonmfl32.exeOindodjp.exeAafachmg.exeQfikilde.exeAchogdip.exeNigojifc.exeCnghhaag.exeFlfqkj32.exeIpkkfkim.exeGnjjhb32.exeJjoomhma.exeMkenkmlp.exeMigbkfcg.exeAcgeha32.exeAdenpclj.exeOkanhp32.exeOdjcqf32.exeBajojl32.exeJddgpn32.exeGcjdcn32.exeLanaef32.exeNpjafdch.exeAqjbkijl.exeCallol32.exeLgoogkmf.exeOmippc32.exePkakfcfb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acfbadkb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njhgnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adgjecjh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agffanik.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlnifb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oaijokmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldnfep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Meclhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlnifb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcffba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njhgnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mplalaoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhaigbdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oakfdjkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agoalc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bqmnfh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdaeplhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpkcjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Noccqoeb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkealjje.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmnaoiba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adnhkhim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cobkgdlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obocbolc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oebijj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onnnnl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oakfdjkc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmogdn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjaqdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Looagidq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adgjecjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kclabnoe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljffnkim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cljfki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Monmfl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oindodjp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aafachmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cljfki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qfikilde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Achogdip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bqmnfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nigojifc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnghhaag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flfqkj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipkkfkim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnjjhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjoomhma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkenkmlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Migbkfcg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acgeha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adenpclj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okanhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odjcqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bajojl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jddgpn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcjdcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcjdcn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lanaef32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npjafdch.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aqjbkijl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Callol32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgoogkmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omippc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkakfcfb.exe -
Executes dropped EXE 64 IoCs
Processes:
Qenkcmma.exeAoilbbbo.exeAcgeha32.exeAkdfbccn.exeBneocn32.exeBachjlge.exeBcfagdkq.exeBomale32.exeBqmnfh32.exeCobkgdlp.exeCnghhaag.exeCogdbd32.exeCbgmdoek.exeDamjek32.exeDcmcffgd.exeDcpplfea.exeDpfqagke.exeDnlnbc32.exeEalgdomo.exeEblcna32.exeEocdcbie.exeEdplki32.exeEklamcmg.exeFlpjkkab.exeFmogdn32.exeFggkmc32.exeFobpbf32.exeFlfqkj32.exeFoemge32.exeFacicaib.exeFdaeplhf.exeGnjjhb32.exeGddbelfc.exeGpkcjm32.exeGjcgcb32.exeGajodp32.exeGdikpk32.exeGkbcmeij.exeGdkhfk32.exeGgidbfoo.exeGpbikl32.exeHkpcfini.exeHdhhoo32.exeHkbpli32.exeHncind32.exeIcpafk32.exeImhfoq32.exeIgnjli32.exeIqfoeode.exeIfcgmebm.exeIpkkfkim.exeIjapcdic.exeIpnhlkgk.exeIbldhffn.exeJldiqlmo.exeJddgpn32.exeJjoomhma.exeJdgdem32.exeJmohnc32.exeJpndkn32.exeKmdaibfm.exeKbqjbidd.exeKikboc32.exeKfochg32.exepid process 892 Qenkcmma.exe 1604 Aoilbbbo.exe 1336 Acgeha32.exe 1588 Akdfbccn.exe 1296 Bneocn32.exe 1340 Bachjlge.exe 676 Bcfagdkq.exe 768 Bomale32.exe 1352 Bqmnfh32.exe 1776 Cobkgdlp.exe 1540 Cnghhaag.exe 1824 Cogdbd32.exe 1644 Cbgmdoek.exe 964 Damjek32.exe 804 Dcmcffgd.exe 1992 Dcpplfea.exe 1872 Dpfqagke.exe 1740 Dnlnbc32.exe 2024 Ealgdomo.exe 288 Eblcna32.exe 748 Eocdcbie.exe 1012 Edplki32.exe 1532 Eklamcmg.exe 848 Flpjkkab.exe 1512 Fmogdn32.exe 1676 Fggkmc32.exe 1284 Fobpbf32.exe 1812 Flfqkj32.exe 1708 Foemge32.exe 1272 Facicaib.exe 308 Fdaeplhf.exe 436 Gnjjhb32.exe 1984 Gddbelfc.exe 1380 Gpkcjm32.exe 1660 Gjcgcb32.exe 776 Gajodp32.exe 1536 Gdikpk32.exe 972 Gkbcmeij.exe 1592 Gdkhfk32.exe 1580 Ggidbfoo.exe 1720 Gpbikl32.exe 984 Hkpcfini.exe 1384 Hdhhoo32.exe 1320 Hkbpli32.exe 268 Hncind32.exe 864 Icpafk32.exe 1828 Imhfoq32.exe 1528 Ignjli32.exe 784 Iqfoeode.exe 968 Ifcgmebm.exe 1240 Ipkkfkim.exe 108 Ijapcdic.exe 1692 Ipnhlkgk.exe 1500 Ibldhffn.exe 1004 Jldiqlmo.exe 1612 Jddgpn32.exe 1656 Jjoomhma.exe 1844 Jdgdem32.exe 1124 Jmohnc32.exe 868 Jpndkn32.exe 1800 Kmdaibfm.exe 1944 Kbqjbidd.exe 1112 Kikboc32.exe 1868 Kfochg32.exe -
Loads dropped DLL 64 IoCs
Processes:
f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exeQenkcmma.exeAoilbbbo.exeAcgeha32.exeAkdfbccn.exeBneocn32.exeBachjlge.exeBcfagdkq.exeBomale32.exeBqmnfh32.exeCobkgdlp.exeCnghhaag.exeCogdbd32.exeCbgmdoek.exeDamjek32.exeDcmcffgd.exeDcpplfea.exeDpfqagke.exeDnlnbc32.exeEalgdomo.exeEblcna32.exeEocdcbie.exeEdplki32.exeEklamcmg.exeFlpjkkab.exeFmogdn32.exeFggkmc32.exeFobpbf32.exeFlfqkj32.exeFoemge32.exeFacicaib.exeFdaeplhf.exepid process 1724 f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe 1724 f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe 892 Qenkcmma.exe 892 Qenkcmma.exe 1604 Aoilbbbo.exe 1604 Aoilbbbo.exe 1336 Acgeha32.exe 1336 Acgeha32.exe 1588 Akdfbccn.exe 1588 Akdfbccn.exe 1296 Bneocn32.exe 1296 Bneocn32.exe 1340 Bachjlge.exe 1340 Bachjlge.exe 676 Bcfagdkq.exe 676 Bcfagdkq.exe 768 Bomale32.exe 768 Bomale32.exe 1352 Bqmnfh32.exe 1352 Bqmnfh32.exe 1776 Cobkgdlp.exe 1776 Cobkgdlp.exe 1540 Cnghhaag.exe 1540 Cnghhaag.exe 1824 Cogdbd32.exe 1824 Cogdbd32.exe 1644 Cbgmdoek.exe 1644 Cbgmdoek.exe 964 Damjek32.exe 964 Damjek32.exe 804 Dcmcffgd.exe 804 Dcmcffgd.exe 1992 Dcpplfea.exe 1992 Dcpplfea.exe 1872 Dpfqagke.exe 1872 Dpfqagke.exe 1740 Dnlnbc32.exe 1740 Dnlnbc32.exe 2024 Ealgdomo.exe 2024 Ealgdomo.exe 288 Eblcna32.exe 288 Eblcna32.exe 748 Eocdcbie.exe 748 Eocdcbie.exe 1012 Edplki32.exe 1012 Edplki32.exe 1532 Eklamcmg.exe 1532 Eklamcmg.exe 848 Flpjkkab.exe 848 Flpjkkab.exe 1512 Fmogdn32.exe 1512 Fmogdn32.exe 1676 Fggkmc32.exe 1676 Fggkmc32.exe 1284 Fobpbf32.exe 1284 Fobpbf32.exe 1812 Flfqkj32.exe 1812 Flfqkj32.exe 1708 Foemge32.exe 1708 Foemge32.exe 1272 Facicaib.exe 1272 Facicaib.exe 308 Fdaeplhf.exe 308 Fdaeplhf.exe -
Drops file in System32 directory 64 IoCs
Processes:
Gpkcjm32.exeKoeomobf.exeMleogabk.exeGdkhfk32.exeNjhgnh32.exeAepqoghb.exeNholabfm.exeQoocmb32.exeCmeijl32.exeEklamcmg.exeLglbak32.exeMhgaobmm.exeLcokga32.exeAkhqgb32.exeIfbpelib.exeBachjlge.exeKlnhfngp.exeLbhpbh32.exeMceagp32.exeNfammo32.exeAjpjno32.exeChfdlfbb.exeFkfmim32.exeDpfqagke.exeOcqlfmki.exeQbohmlka.exeLmgopf32.exeMjhobn32.exeNagajh32.exeBhcgffdd.exeJddgpn32.exeLnhgce32.exeJmohnc32.exeKahdhegj.exeLgoogkmf.exeObclbj32.exeKclabnoe.exeNbkjgp32.exePhcnjhgn.exeCaqejkgp.exeEalgdomo.exeFacicaib.exeHkbpli32.exeJdgdem32.exeAdgjecjh.exeMigbkfcg.exeOlekfeeg.exeEblcna32.exeOipadd32.exeAghcgn32.exeFibcpaqg.exeOdjcqf32.exePcffba32.exeAdnhkhim.exeCdmdaghf.exeQenkcmma.exeFobpbf32.exeKkqhak32.exeQhicpc32.exeQleppa32.exedescription ioc process File created C:\Windows\SysWOW64\Khaklnln.dll Gpkcjm32.exe File created C:\Windows\SysWOW64\Kbdkijaj.exe Koeomobf.exe File created C:\Windows\SysWOW64\Codbhn32.dll Mleogabk.exe File opened for modification C:\Windows\SysWOW64\Ggidbfoo.exe Gdkhfk32.exe File created C:\Windows\SysWOW64\Mgkplj32.dll Njhgnh32.exe File opened for modification C:\Windows\SysWOW64\Ahnmkbgf.exe Aepqoghb.exe File created C:\Windows\SysWOW64\Bjengaba.dll Nholabfm.exe File created C:\Windows\SysWOW64\Qfikilde.exe Qoocmb32.exe File created C:\Windows\SysWOW64\Kigqbpkg.dll Cmeijl32.exe File created C:\Windows\SysWOW64\Adopfe32.dll Eklamcmg.exe File created C:\Windows\SysWOW64\Jpjjplne.dll Lglbak32.exe File created C:\Windows\SysWOW64\Allnnplj.dll Mhgaobmm.exe File opened for modification C:\Windows\SysWOW64\Lfmgcl32.exe Lcokga32.exe File opened for modification C:\Windows\SysWOW64\Adqephfk.exe Akhqgb32.exe File created C:\Windows\SysWOW64\Iiplagif.exe Ifbpelib.exe File created C:\Windows\SysWOW64\Flghghfj.dll Bachjlge.exe File created C:\Windows\SysWOW64\Hgephfdd.dll Klnhfngp.exe File created C:\Windows\SysWOW64\Jnjddo32.dll Lbhpbh32.exe File created C:\Windows\SysWOW64\Idjiok32.dll Mceagp32.exe File opened for modification C:\Windows\SysWOW64\Mjhobn32.exe Mleogabk.exe File opened for modification C:\Windows\SysWOW64\Nagajh32.exe Nfammo32.exe File created C:\Windows\SysWOW64\Aqjbkijl.exe Ajpjno32.exe File created C:\Windows\SysWOW64\Cjdpha32.exe Chfdlfbb.exe File created C:\Windows\SysWOW64\Gcjdcn32.exe Fkfmim32.exe File created C:\Windows\SysWOW64\Dnlnbc32.exe Dpfqagke.exe File created C:\Windows\SysWOW64\Obclbj32.exe Ocqlfmki.exe File opened for modification C:\Windows\SysWOW64\Qdpddd32.exe Qbohmlka.exe File created C:\Windows\SysWOW64\Fidcmofb.dll Lmgopf32.exe File opened for modification C:\Windows\SysWOW64\Ndqckdpf.exe Mjhobn32.exe File created C:\Windows\SysWOW64\Ebiljn32.dll Nagajh32.exe File opened for modification C:\Windows\SysWOW64\Bnnocp32.exe Bhcgffdd.exe File opened for modification C:\Windows\SysWOW64\Jjoomhma.exe Jddgpn32.exe File opened for modification C:\Windows\SysWOW64\Lpgcpp32.exe Lnhgce32.exe File created C:\Windows\SysWOW64\Jpndkn32.exe Jmohnc32.exe File created C:\Windows\SysWOW64\Ljibelbn.dll Kahdhegj.exe File created C:\Windows\SysWOW64\Hpgiaa32.dll Lgoogkmf.exe File opened for modification C:\Windows\SysWOW64\Oindodjp.exe Obclbj32.exe File created C:\Windows\SysWOW64\Kghncm32.exe Kclabnoe.exe File opened for modification C:\Windows\SysWOW64\Nkabim32.exe Nbkjgp32.exe File opened for modification C:\Windows\SysWOW64\Pkakfcfb.exe Phcnjhgn.exe File opened for modification C:\Windows\SysWOW64\Cpcefh32.exe Caqejkgp.exe File created C:\Windows\SysWOW64\Eblcna32.exe Ealgdomo.exe File created C:\Windows\SysWOW64\Fdaeplhf.exe Facicaib.exe File opened for modification C:\Windows\SysWOW64\Hncind32.exe Hkbpli32.exe File opened for modification C:\Windows\SysWOW64\Jmohnc32.exe Jdgdem32.exe File created C:\Windows\SysWOW64\Agffanik.exe Adgjecjh.exe File created C:\Windows\SysWOW64\Aehkmcqk.dll Migbkfcg.exe File opened for modification C:\Windows\SysWOW64\Oocgbp32.exe Olekfeeg.exe File created C:\Windows\SysWOW64\Oflfpcdd.dll Eblcna32.exe File created C:\Windows\SysWOW64\Qfngfnlm.dll Jdgdem32.exe File opened for modification C:\Windows\SysWOW64\Lefloc32.exe Lbhpbh32.exe File created C:\Windows\SysWOW64\Efkblh32.dll Oipadd32.exe File created C:\Windows\SysWOW64\Pojoea32.dll Aghcgn32.exe File opened for modification C:\Windows\SysWOW64\Hbfcchpf.exe Fibcpaqg.exe File created C:\Windows\SysWOW64\Pheoadbp.exe Odjcqf32.exe File created C:\Windows\SysWOW64\Pfdbnmhk.exe Pcffba32.exe File opened for modification C:\Windows\SysWOW64\Akhqgb32.exe Adnhkhim.exe File created C:\Windows\SysWOW64\Chhqae32.exe Cdmdaghf.exe File created C:\Windows\SysWOW64\Aoilbbbo.exe Qenkcmma.exe File created C:\Windows\SysWOW64\Kpablmli.dll Fobpbf32.exe File created C:\Windows\SysWOW64\Ajjfha32.dll Kkqhak32.exe File created C:\Windows\SysWOW64\Bnnggcqh.dll Qhicpc32.exe File created C:\Windows\SysWOW64\Ieianddk.dll Qleppa32.exe File created C:\Windows\SysWOW64\Iomiel32.dll Aepqoghb.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1768 1576 WerFault.exe Iiplagif.exe -
Modifies registry class 64 IoCs
Processes:
Klkkpn32.exeBcodlomm.exeJamiihef.exePhcnjhgn.exeBneocn32.exeLdnfep32.exeAhnmkbgf.exeFibcpaqg.exePheoadbp.exeCmeijl32.exeFkfmim32.exeImhfoq32.exeNjhgnh32.exeNfammo32.exeOnnnnl32.exeAqjbkijl.exeGpbikl32.exeJpndkn32.exeLbiedi32.exeOhllkfkk.exePkakfcfb.exeCogdbd32.exeGdkhfk32.exeLpdgjq32.exeNmpneh32.exeBnnocp32.exeGpkcjm32.exeMeclhg32.exeNbaomjdf.exeOmgcjc32.exeOcqlfmki.exeLfmgcl32.exeAkdfbccn.exeIpkkfkim.exeJdgdem32.exeLkhnbjhb.exeAofhbm32.exeAdgjecjh.exeLcokga32.exeOedfoi32.exeOdjcqf32.exeGkbcmeij.exeBemphjlq.exeCallol32.exef0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exeHkpcfini.exeLndnheih.exeAepqoghb.exeNkoecmcn.exeFoemge32.exeJddgpn32.exeLgjflk32.exeMleogabk.exeNhaigbdj.exeQfgodlfh.exeAdnhkhim.exeKghncm32.exeKjifdhdo.exePcopaboo.exeBhcgffdd.exeCmbldm32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Klkkpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfogae32.dll" Bcodlomm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jamiihef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hijkhcfn.dll" Phcnjhgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kingkbgh.dll" Bneocn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldnfep32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahnmkbgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fibcpaqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pheoadbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmeijl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kqlgelde.dll" Fkfmim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aholao32.dll" Imhfoq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njhgnh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfammo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gomofa32.dll" Onnnnl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aqjbkijl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpbikl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkmphmdl.dll" Jpndkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldnaal32.dll" Lbiedi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjnnlj32.dll" Ohllkfkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pkakfcfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cogdbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gdkhfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmhamlkc.dll" Lpdgjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iokcmnja.dll" Nmpneh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnnocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpkcjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikqcic32.dll" Meclhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbaomjdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omgcjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abjkaj32.dll" Ocqlfmki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lfmgcl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akdfbccn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipkkfkim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdgdem32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkhnbjhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aofhbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnilbjnk.dll" Adgjecjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcokga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qlpnac32.dll" Oedfoi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Odjcqf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khaklnln.dll" Gpkcjm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkbcmeij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bemphjlq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcjdgdeh.dll" Callol32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkpcfini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lndnheih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iomiel32.dll" Aepqoghb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qkahlehf.dll" Nkoecmcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kfjbeegj.dll" Aqjbkijl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Foemge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jddgpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbdpeg32.dll" Lgjflk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mleogabk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nhaigbdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mccaegim.dll" Qfgodlfh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adnhkhim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kghncm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjifdhdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcopaboo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inphmcne.dll" Bhcgffdd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmbldm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmeijl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exeQenkcmma.exeAoilbbbo.exeAcgeha32.exeAkdfbccn.exeBneocn32.exeBachjlge.exeBcfagdkq.exeBomale32.exeBqmnfh32.exeCobkgdlp.exeCnghhaag.exeCogdbd32.exeCbgmdoek.exeDamjek32.exeDcmcffgd.exedescription pid process target process PID 1724 wrote to memory of 892 1724 f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe Qenkcmma.exe PID 1724 wrote to memory of 892 1724 f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe Qenkcmma.exe PID 1724 wrote to memory of 892 1724 f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe Qenkcmma.exe PID 1724 wrote to memory of 892 1724 f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe Qenkcmma.exe PID 892 wrote to memory of 1604 892 Qenkcmma.exe Aoilbbbo.exe PID 892 wrote to memory of 1604 892 Qenkcmma.exe Aoilbbbo.exe PID 892 wrote to memory of 1604 892 Qenkcmma.exe Aoilbbbo.exe PID 892 wrote to memory of 1604 892 Qenkcmma.exe Aoilbbbo.exe PID 1604 wrote to memory of 1336 1604 Aoilbbbo.exe Acgeha32.exe PID 1604 wrote to memory of 1336 1604 Aoilbbbo.exe Acgeha32.exe PID 1604 wrote to memory of 1336 1604 Aoilbbbo.exe Acgeha32.exe PID 1604 wrote to memory of 1336 1604 Aoilbbbo.exe Acgeha32.exe PID 1336 wrote to memory of 1588 1336 Acgeha32.exe Akdfbccn.exe PID 1336 wrote to memory of 1588 1336 Acgeha32.exe Akdfbccn.exe PID 1336 wrote to memory of 1588 1336 Acgeha32.exe Akdfbccn.exe PID 1336 wrote to memory of 1588 1336 Acgeha32.exe Akdfbccn.exe PID 1588 wrote to memory of 1296 1588 Akdfbccn.exe Bneocn32.exe PID 1588 wrote to memory of 1296 1588 Akdfbccn.exe Bneocn32.exe PID 1588 wrote to memory of 1296 1588 Akdfbccn.exe Bneocn32.exe PID 1588 wrote to memory of 1296 1588 Akdfbccn.exe Bneocn32.exe PID 1296 wrote to memory of 1340 1296 Bneocn32.exe Bachjlge.exe PID 1296 wrote to memory of 1340 1296 Bneocn32.exe Bachjlge.exe PID 1296 wrote to memory of 1340 1296 Bneocn32.exe Bachjlge.exe PID 1296 wrote to memory of 1340 1296 Bneocn32.exe Bachjlge.exe PID 1340 wrote to memory of 676 1340 Bachjlge.exe Bcfagdkq.exe PID 1340 wrote to memory of 676 1340 Bachjlge.exe Bcfagdkq.exe PID 1340 wrote to memory of 676 1340 Bachjlge.exe Bcfagdkq.exe PID 1340 wrote to memory of 676 1340 Bachjlge.exe Bcfagdkq.exe PID 676 wrote to memory of 768 676 Bcfagdkq.exe Bomale32.exe PID 676 wrote to memory of 768 676 Bcfagdkq.exe Bomale32.exe PID 676 wrote to memory of 768 676 Bcfagdkq.exe Bomale32.exe PID 676 wrote to memory of 768 676 Bcfagdkq.exe Bomale32.exe PID 768 wrote to memory of 1352 768 Bomale32.exe Bqmnfh32.exe PID 768 wrote to memory of 1352 768 Bomale32.exe Bqmnfh32.exe PID 768 wrote to memory of 1352 768 Bomale32.exe Bqmnfh32.exe PID 768 wrote to memory of 1352 768 Bomale32.exe Bqmnfh32.exe PID 1352 wrote to memory of 1776 1352 Bqmnfh32.exe Cobkgdlp.exe PID 1352 wrote to memory of 1776 1352 Bqmnfh32.exe Cobkgdlp.exe PID 1352 wrote to memory of 1776 1352 Bqmnfh32.exe Cobkgdlp.exe PID 1352 wrote to memory of 1776 1352 Bqmnfh32.exe Cobkgdlp.exe PID 1776 wrote to memory of 1540 1776 Cobkgdlp.exe Cnghhaag.exe PID 1776 wrote to memory of 1540 1776 Cobkgdlp.exe Cnghhaag.exe PID 1776 wrote to memory of 1540 1776 Cobkgdlp.exe Cnghhaag.exe PID 1776 wrote to memory of 1540 1776 Cobkgdlp.exe Cnghhaag.exe PID 1540 wrote to memory of 1824 1540 Cnghhaag.exe Cogdbd32.exe PID 1540 wrote to memory of 1824 1540 Cnghhaag.exe Cogdbd32.exe PID 1540 wrote to memory of 1824 1540 Cnghhaag.exe Cogdbd32.exe PID 1540 wrote to memory of 1824 1540 Cnghhaag.exe Cogdbd32.exe PID 1824 wrote to memory of 1644 1824 Cogdbd32.exe Cbgmdoek.exe PID 1824 wrote to memory of 1644 1824 Cogdbd32.exe Cbgmdoek.exe PID 1824 wrote to memory of 1644 1824 Cogdbd32.exe Cbgmdoek.exe PID 1824 wrote to memory of 1644 1824 Cogdbd32.exe Cbgmdoek.exe PID 1644 wrote to memory of 964 1644 Cbgmdoek.exe Damjek32.exe PID 1644 wrote to memory of 964 1644 Cbgmdoek.exe Damjek32.exe PID 1644 wrote to memory of 964 1644 Cbgmdoek.exe Damjek32.exe PID 1644 wrote to memory of 964 1644 Cbgmdoek.exe Damjek32.exe PID 964 wrote to memory of 804 964 Damjek32.exe Dcmcffgd.exe PID 964 wrote to memory of 804 964 Damjek32.exe Dcmcffgd.exe PID 964 wrote to memory of 804 964 Damjek32.exe Dcmcffgd.exe PID 964 wrote to memory of 804 964 Damjek32.exe Dcmcffgd.exe PID 804 wrote to memory of 1992 804 Dcmcffgd.exe Dcpplfea.exe PID 804 wrote to memory of 1992 804 Dcmcffgd.exe Dcpplfea.exe PID 804 wrote to memory of 1992 804 Dcmcffgd.exe Dcpplfea.exe PID 804 wrote to memory of 1992 804 Dcmcffgd.exe Dcpplfea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe"C:\Users\Admin\AppData\Local\Temp\f0becaac0eefa3fd9293c8cac25c36a316f594aa88d3025a58f76c98b7ef1b6c.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\Qenkcmma.exeC:\Windows\system32\Qenkcmma.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\Aoilbbbo.exeC:\Windows\system32\Aoilbbbo.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\Acgeha32.exeC:\Windows\system32\Acgeha32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\Akdfbccn.exeC:\Windows\system32\Akdfbccn.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\Bneocn32.exeC:\Windows\system32\Bneocn32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\Bachjlge.exeC:\Windows\system32\Bachjlge.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1340
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Bcfagdkq.exeC:\Windows\system32\Bcfagdkq.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\Bomale32.exeC:\Windows\system32\Bomale32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\Bqmnfh32.exeC:\Windows\system32\Bqmnfh32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\Cobkgdlp.exeC:\Windows\system32\Cobkgdlp.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\Cnghhaag.exeC:\Windows\system32\Cnghhaag.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\Cogdbd32.exeC:\Windows\system32\Cogdbd32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\Cbgmdoek.exeC:\Windows\system32\Cbgmdoek.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\Damjek32.exeC:\Windows\system32\Damjek32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\Dcmcffgd.exeC:\Windows\system32\Dcmcffgd.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\Dcpplfea.exeC:\Windows\system32\Dcpplfea.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1992 -
C:\Windows\SysWOW64\Dpfqagke.exeC:\Windows\system32\Dpfqagke.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1872 -
C:\Windows\SysWOW64\Dnlnbc32.exeC:\Windows\system32\Dnlnbc32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740 -
C:\Windows\SysWOW64\Ealgdomo.exeC:\Windows\system32\Ealgdomo.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2024 -
C:\Windows\SysWOW64\Eblcna32.exeC:\Windows\system32\Eblcna32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:288 -
C:\Windows\SysWOW64\Eocdcbie.exeC:\Windows\system32\Eocdcbie.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:748 -
C:\Windows\SysWOW64\Edplki32.exeC:\Windows\system32\Edplki32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012 -
C:\Windows\SysWOW64\Eklamcmg.exeC:\Windows\system32\Eklamcmg.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\Flpjkkab.exeC:\Windows\system32\Flpjkkab.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:848 -
C:\Windows\SysWOW64\Fmogdn32.exeC:\Windows\system32\Fmogdn32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1512 -
C:\Windows\SysWOW64\Fggkmc32.exeC:\Windows\system32\Fggkmc32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Windows\SysWOW64\Fobpbf32.exeC:\Windows\system32\Fobpbf32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1284 -
C:\Windows\SysWOW64\Flfqkj32.exeC:\Windows\system32\Flfqkj32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1812 -
C:\Windows\SysWOW64\Foemge32.exeC:\Windows\system32\Foemge32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Facicaib.exeC:\Windows\system32\Facicaib.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1272 -
C:\Windows\SysWOW64\Fdaeplhf.exeC:\Windows\system32\Fdaeplhf.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:308 -
C:\Windows\SysWOW64\Gnjjhb32.exeC:\Windows\system32\Gnjjhb32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:436 -
C:\Windows\SysWOW64\Gddbelfc.exeC:\Windows\system32\Gddbelfc.exe27⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\Gpkcjm32.exeC:\Windows\system32\Gpkcjm32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1380 -
C:\Windows\SysWOW64\Gjcgcb32.exeC:\Windows\system32\Gjcgcb32.exe29⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\Gajodp32.exeC:\Windows\system32\Gajodp32.exe30⤵
- Executes dropped EXE
PID:776 -
C:\Windows\SysWOW64\Gdikpk32.exeC:\Windows\system32\Gdikpk32.exe31⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\Gkbcmeij.exeC:\Windows\system32\Gkbcmeij.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\Gdkhfk32.exeC:\Windows\system32\Gdkhfk32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1592 -
C:\Windows\SysWOW64\Ggidbfoo.exeC:\Windows\system32\Ggidbfoo.exe34⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\Gpbikl32.exeC:\Windows\system32\Gpbikl32.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:1720 -
C:\Windows\SysWOW64\Hkpcfini.exeC:\Windows\system32\Hkpcfini.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:984 -
C:\Windows\SysWOW64\Hdhhoo32.exeC:\Windows\system32\Hdhhoo32.exe37⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\SysWOW64\Hkbpli32.exeC:\Windows\system32\Hkbpli32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1320 -
C:\Windows\SysWOW64\Hncind32.exeC:\Windows\system32\Hncind32.exe39⤵
- Executes dropped EXE
PID:268 -
C:\Windows\SysWOW64\Icpafk32.exeC:\Windows\system32\Icpafk32.exe40⤵
- Executes dropped EXE
PID:864 -
C:\Windows\SysWOW64\Imhfoq32.exeC:\Windows\system32\Imhfoq32.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:1828 -
C:\Windows\SysWOW64\Ignjli32.exeC:\Windows\system32\Ignjli32.exe42⤵
- Executes dropped EXE
PID:1528 -
C:\Windows\SysWOW64\Iqfoeode.exeC:\Windows\system32\Iqfoeode.exe43⤵
- Executes dropped EXE
PID:784 -
C:\Windows\SysWOW64\Ifcgmebm.exeC:\Windows\system32\Ifcgmebm.exe44⤵
- Executes dropped EXE
PID:968 -
C:\Windows\SysWOW64\Ipkkfkim.exeC:\Windows\system32\Ipkkfkim.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1240 -
C:\Windows\SysWOW64\Ijapcdic.exeC:\Windows\system32\Ijapcdic.exe46⤵
- Executes dropped EXE
PID:108 -
C:\Windows\SysWOW64\Ipnhlkgk.exeC:\Windows\system32\Ipnhlkgk.exe47⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\Ibldhffn.exeC:\Windows\system32\Ibldhffn.exe48⤵
- Executes dropped EXE
PID:1500 -
C:\Windows\SysWOW64\Jldiqlmo.exeC:\Windows\system32\Jldiqlmo.exe49⤵
- Executes dropped EXE
PID:1004 -
C:\Windows\SysWOW64\Jddgpn32.exeC:\Windows\system32\Jddgpn32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1612 -
C:\Windows\SysWOW64\Jjoomhma.exeC:\Windows\system32\Jjoomhma.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Jdgdem32.exeC:\Windows\system32\Jdgdem32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1844 -
C:\Windows\SysWOW64\Jmohnc32.exeC:\Windows\system32\Jmohnc32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1124 -
C:\Windows\SysWOW64\Jpndkn32.exeC:\Windows\system32\Jpndkn32.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:868 -
C:\Windows\SysWOW64\Kmdaibfm.exeC:\Windows\system32\Kmdaibfm.exe55⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\Kbqjbidd.exeC:\Windows\system32\Kbqjbidd.exe56⤵
- Executes dropped EXE
PID:1944 -
C:\Windows\SysWOW64\Kikboc32.exeC:\Windows\system32\Kikboc32.exe57⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\Kfochg32.exeC:\Windows\system32\Kfochg32.exe58⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\Khpoppqi.exeC:\Windows\system32\Khpoppqi.exe59⤵PID:1736
-
C:\Windows\SysWOW64\Klkkpn32.exeC:\Windows\system32\Klkkpn32.exe60⤵
- Modifies registry class
PID:284 -
C:\Windows\SysWOW64\Kojgljhf.exeC:\Windows\system32\Kojgljhf.exe61⤵PID:1780
-
C:\Windows\SysWOW64\Kahdhegj.exeC:\Windows\system32\Kahdhegj.exe62⤵
- Drops file in System32 directory
PID:952 -
C:\Windows\SysWOW64\Kioljbhl.exeC:\Windows\system32\Kioljbhl.exe63⤵PID:1048
-
C:\Windows\SysWOW64\Klnhfngp.exeC:\Windows\system32\Klnhfngp.exe64⤵
- Drops file in System32 directory
PID:1388 -
C:\Windows\SysWOW64\Kkqhak32.exeC:\Windows\system32\Kkqhak32.exe65⤵
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\Lbhpbh32.exeC:\Windows\system32\Lbhpbh32.exe66⤵
- Drops file in System32 directory
PID:588 -
C:\Windows\SysWOW64\Lefloc32.exeC:\Windows\system32\Lefloc32.exe67⤵PID:1148
-
C:\Windows\SysWOW64\Ldimjpdk.exeC:\Windows\system32\Ldimjpdk.exe68⤵PID:1560
-
C:\Windows\SysWOW64\Llpeknem.exeC:\Windows\system32\Llpeknem.exe69⤵PID:360
-
C:\Windows\SysWOW64\Looagidq.exeC:\Windows\system32\Looagidq.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1680 -
C:\Windows\SysWOW64\Lehidckm.exeC:\Windows\system32\Lehidckm.exe71⤵PID:580
-
C:\Windows\SysWOW64\Lgjflk32.exeC:\Windows\system32\Lgjflk32.exe72⤵
- Modifies registry class
PID:1484 -
C:\Windows\SysWOW64\Lkealjje.exeC:\Windows\system32\Lkealjje.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2056 -
C:\Windows\SysWOW64\Lndnheih.exeC:\Windows\system32\Lndnheih.exe74⤵
- Modifies registry class
PID:2064 -
C:\Windows\SysWOW64\Ldnfep32.exeC:\Windows\system32\Ldnfep32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2072 -
C:\Windows\SysWOW64\Lglbak32.exeC:\Windows\system32\Lglbak32.exe76⤵
- Drops file in System32 directory
PID:2080 -
C:\Windows\SysWOW64\Lkhnbjhb.exeC:\Windows\system32\Lkhnbjhb.exe77⤵
- Modifies registry class
PID:2088 -
C:\Windows\SysWOW64\Laafodoo.exeC:\Windows\system32\Laafodoo.exe78⤵PID:2096
-
C:\Windows\SysWOW64\Lpdgjq32.exeC:\Windows\system32\Lpdgjq32.exe79⤵
- Modifies registry class
PID:2104 -
C:\Windows\SysWOW64\Lcccfl32.exeC:\Windows\system32\Lcccfl32.exe80⤵PID:2112
-
C:\Windows\SysWOW64\Lgoogkmf.exeC:\Windows\system32\Lgoogkmf.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2120 -
C:\Windows\SysWOW64\Lnhgce32.exeC:\Windows\system32\Lnhgce32.exe82⤵
- Drops file in System32 directory
PID:2128 -
C:\Windows\SysWOW64\Lpgcpp32.exeC:\Windows\system32\Lpgcpp32.exe83⤵PID:2136
-
C:\Windows\SysWOW64\Lcepll32.exeC:\Windows\system32\Lcepll32.exe84⤵PID:2144
-
C:\Windows\SysWOW64\Meclhg32.exeC:\Windows\system32\Meclhg32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2152 -
C:\Windows\SysWOW64\Mpipep32.exeC:\Windows\system32\Mpipep32.exe86⤵PID:2160
-
C:\Windows\SysWOW64\Mgchbj32.exeC:\Windows\system32\Mgchbj32.exe87⤵PID:2168
-
C:\Windows\SysWOW64\Mlpaja32.exeC:\Windows\system32\Mlpaja32.exe88⤵PID:2176
-
C:\Windows\SysWOW64\Monmfl32.exeC:\Windows\system32\Monmfl32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2184 -
C:\Windows\SysWOW64\Mfhecfni.exeC:\Windows\system32\Mfhecfni.exe90⤵PID:2192
-
C:\Windows\SysWOW64\Mhgaobmm.exeC:\Windows\system32\Mhgaobmm.exe91⤵
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\Mkenkmlp.exeC:\Windows\system32\Mkenkmlp.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2572 -
C:\Windows\SysWOW64\Nfjnhi32.exeC:\Windows\system32\Nfjnhi32.exe93⤵PID:2604
-
C:\Windows\SysWOW64\Nqpbeb32.exeC:\Windows\system32\Nqpbeb32.exe94⤵PID:2624
-
C:\Windows\SysWOW64\Noccqoeb.exeC:\Windows\system32\Noccqoeb.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2640 -
C:\Windows\SysWOW64\Nbaomjdf.exeC:\Windows\system32\Nbaomjdf.exe96⤵
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\Njhgnh32.exeC:\Windows\system32\Njhgnh32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Omgcjc32.exeC:\Windows\system32\Omgcjc32.exe98⤵
- Modifies registry class
PID:2700 -
C:\Windows\SysWOW64\Ocqlfmki.exeC:\Windows\system32\Ocqlfmki.exe99⤵
- Drops file in System32 directory
- Modifies registry class
PID:2716 -
C:\Windows\SysWOW64\Obclbj32.exeC:\Windows\system32\Obclbj32.exe100⤵
- Drops file in System32 directory
PID:2732 -
C:\Windows\SysWOW64\Oindodjp.exeC:\Windows\system32\Oindodjp.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2752 -
C:\Windows\SysWOW64\Omippc32.exeC:\Windows\system32\Omippc32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2768 -
C:\Windows\SysWOW64\Oklpkpid.exeC:\Windows\system32\Oklpkpid.exe103⤵PID:2784
-
C:\Windows\SysWOW64\Opglln32.exeC:\Windows\system32\Opglln32.exe104⤵PID:2800
-
C:\Windows\SysWOW64\Obfhhj32.exeC:\Windows\system32\Obfhhj32.exe105⤵PID:2816
-
C:\Windows\SysWOW64\Ofadhhhj.exeC:\Windows\system32\Ofadhhhj.exe106⤵PID:2836
-
C:\Windows\SysWOW64\Oipadd32.exeC:\Windows\system32\Oipadd32.exe107⤵
- Drops file in System32 directory
PID:2856 -
C:\Windows\SysWOW64\Oknmqo32.exeC:\Windows\system32\Oknmqo32.exe108⤵PID:2884
-
C:\Windows\SysWOW64\Qoaogmdk.exeC:\Windows\system32\Qoaogmdk.exe109⤵PID:2892
-
C:\Windows\SysWOW64\Qekgcg32.exeC:\Windows\system32\Qekgcg32.exe110⤵PID:2900
-
C:\Windows\SysWOW64\Qhicpc32.exeC:\Windows\system32\Qhicpc32.exe111⤵
- Drops file in System32 directory
PID:2908 -
C:\Windows\SysWOW64\Qleppa32.exeC:\Windows\system32\Qleppa32.exe112⤵
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\Qbohmlka.exeC:\Windows\system32\Qbohmlka.exe113⤵
- Drops file in System32 directory
PID:2924 -
C:\Windows\SysWOW64\Qdpddd32.exeC:\Windows\system32\Qdpddd32.exe114⤵PID:2932
-
C:\Windows\SysWOW64\Qhlpebii.exeC:\Windows\system32\Qhlpebii.exe115⤵PID:2940
-
C:\Windows\SysWOW64\Aofhbm32.exeC:\Windows\system32\Aofhbm32.exe116⤵
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\Aepqoghb.exeC:\Windows\system32\Aepqoghb.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:2956 -
C:\Windows\SysWOW64\Ahnmkbgf.exeC:\Windows\system32\Ahnmkbgf.exe118⤵
- Modifies registry class
PID:2964 -
C:\Windows\SysWOW64\Aoheglnc.exeC:\Windows\system32\Aoheglnc.exe119⤵PID:2972
-
C:\Windows\SysWOW64\Aafachmg.exeC:\Windows\system32\Aafachmg.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2980 -
C:\Windows\SysWOW64\Adenpclj.exeC:\Windows\system32\Adenpclj.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2988 -
C:\Windows\SysWOW64\Aibfhjka.exeC:\Windows\system32\Aibfhjka.exe122⤵PID:2996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-