Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
12d66107671eb4b2ce864fad98fda18e37240ecb759c8b3aead1c836a926f2c9.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
12d66107671eb4b2ce864fad98fda18e37240ecb759c8b3aead1c836a926f2c9.exe
Resource
win10v2004-20240508-en
General
-
Target
12d66107671eb4b2ce864fad98fda18e37240ecb759c8b3aead1c836a926f2c9.exe
-
Size
163KB
-
MD5
052ba2f03f6467543333b644839c95ff
-
SHA1
f4994128177be9ee481ec8da194953c9d5793834
-
SHA256
12d66107671eb4b2ce864fad98fda18e37240ecb759c8b3aead1c836a926f2c9
-
SHA512
57834bca12207d9c1205d424921979a665d3dcc015018550d96c3f112fb8d5e8139e59ad8005926700eada6e982a2116c6e32d4ada83779bd07eaa1776a40928
-
SSDEEP
3072:JcWhPcX3hPvB1uztzeMeCBltOrWKDBr+yJb:iWouztzECBLOf
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Medgncoe.exeGgeboaob.exeQljjjqlc.exeNimbkc32.exeLgpagm32.exeClpgpp32.exeFoabofnn.exeJcllonma.exeGkkgpc32.exeLnnikdnj.exeBihjfnmm.exeCfadkb32.exeEadopc32.exeIlidbbgl.exeEggmge32.exeGafmaj32.exeCbphdn32.exeGdobnj32.exeDllfkn32.exeKedoge32.exeKfckahdj.exeAccfbokl.exeBifmqo32.exeGlcaambb.exeLdoaklml.exeOgnpebpj.exeDgbdlf32.exePpamophb.exeEhailbaa.exeFalcae32.exeGnjjfegi.exeAleckinj.exeFfimfqgm.exeDodbbdbb.exeHhlejcpm.exeEmlenj32.exePgopffec.exeEdfdej32.exeFojedapj.exeHammhcij.exeHpdfnolo.exePapfgbmg.exeIcnpmp32.exeKlkcdj32.exeAhchda32.exeAanjpk32.exeDkkcge32.exeHjchaf32.exeMahbje32.exeLikcilhh.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Medgncoe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggeboaob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qljjjqlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nimbkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgpagm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clpgpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Foabofnn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcllonma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkkgpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnnikdnj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bihjfnmm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfadkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eadopc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilidbbgl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eggmge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gafmaj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbphdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdobnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dllfkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kedoge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfckahdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Accfbokl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bifmqo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glcaambb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldoaklml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ognpebpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbdlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppamophb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehailbaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Falcae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnjjfegi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aleckinj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffimfqgm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dodbbdbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhlejcpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emlenj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgopffec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edfdej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fojedapj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hammhcij.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpdfnolo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Papfgbmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icnpmp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klkcdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahchda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aanjpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjchaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mahbje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Likcilhh.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Kckbqpnj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Liekmj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lcmofolg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lgikfn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ldmlpbbj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lgkhlnbn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lnepih32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4892-56-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lgneampk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lilanioo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Laciofpa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lgpagm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lnjjdgee.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lphfpbdi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lcgblncm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mahbje32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mciobn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mkpgck32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Majopeii.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mdiklqhm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mnapdf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mgidml32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mdmegp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mpdelajl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nnhfee32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nceonl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nqiogp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ndghmo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nnolfdcn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nnaikd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncnadk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ojhiqefo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oqbamo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oqgkhnjf.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3340-344-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pcojkhap.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3960-420-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1700-422-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qajadlja.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2508-448-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/5004-491-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4284-524-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2504-526-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2308-594-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ckpjfm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ckedalaj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Docmgjhp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dojcgi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dlncan32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ecjhcg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eoaihhlp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ehljfnpn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fdgdgnbm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gdeqhl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hcpclbfa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hecmijim.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Icifbang.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Imfdff32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jcbihpel.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jfeopj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jblpek32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jcllonma.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kemhff32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kpeiioac.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Kckbqpnj.exe UPX C:\Windows\SysWOW64\Liekmj32.exe UPX C:\Windows\SysWOW64\Lcmofolg.exe UPX C:\Windows\SysWOW64\Lgikfn32.exe UPX C:\Windows\SysWOW64\Ldmlpbbj.exe UPX C:\Windows\SysWOW64\Lgkhlnbn.exe UPX C:\Windows\SysWOW64\Lnepih32.exe UPX behavioral2/memory/4892-56-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Lgneampk.exe UPX C:\Windows\SysWOW64\Lilanioo.exe UPX behavioral2/memory/1808-72-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Laciofpa.exe UPX behavioral2/memory/3752-79-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Lgpagm32.exe UPX behavioral2/memory/2088-88-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Lnjjdgee.exe UPX behavioral2/memory/4116-96-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Lphfpbdi.exe UPX C:\Windows\SysWOW64\Lcgblncm.exe UPX C:\Windows\SysWOW64\Mahbje32.exe UPX C:\Windows\SysWOW64\Mciobn32.exe UPX C:\Windows\SysWOW64\Mkpgck32.exe UPX C:\Windows\SysWOW64\Majopeii.exe UPX C:\Windows\SysWOW64\Mdiklqhm.exe UPX C:\Windows\SysWOW64\Mnapdf32.exe UPX C:\Windows\SysWOW64\Mgidml32.exe UPX C:\Windows\SysWOW64\Mdmegp32.exe UPX C:\Windows\SysWOW64\Mpdelajl.exe UPX C:\Windows\SysWOW64\Nnhfee32.exe UPX behavioral2/memory/776-192-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Nceonl32.exe UPX behavioral2/memory/1792-200-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Nqiogp32.exe UPX behavioral2/memory/3032-208-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Ndghmo32.exe UPX behavioral2/memory/672-216-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Nnolfdcn.exe UPX behavioral2/memory/4940-223-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Nnaikd32.exe UPX behavioral2/memory/4980-232-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Ncnadk32.exe UPX behavioral2/memory/1416-240-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Ojhiqefo.exe UPX behavioral2/memory/1844-247-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Oqbamo32.exe UPX behavioral2/memory/1296-256-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4740-262-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4332-268-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4340-274-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4008-280-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Oqgkhnjf.exe UPX behavioral2/memory/2404-286-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3704-292-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4264-298-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3340-344-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Pcojkhap.exe UPX behavioral2/memory/3960-420-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1700-422-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Qajadlja.exe UPX behavioral2/memory/2508-448-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5004-491-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4284-524-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2504-526-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2308-594-0x0000000000400000-0x0000000000453000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
Kckbqpnj.exeLiekmj32.exeLcmofolg.exeLgikfn32.exeLdmlpbbj.exeLgkhlnbn.exeLnepih32.exeLgneampk.exeLilanioo.exeLaciofpa.exeLgpagm32.exeLnjjdgee.exeLphfpbdi.exeLcgblncm.exeMahbje32.exeMciobn32.exeMkpgck32.exeMajopeii.exeMdiklqhm.exeMnapdf32.exeMgidml32.exeMdmegp32.exeMpdelajl.exeNnhfee32.exeNceonl32.exeNqiogp32.exeNdghmo32.exeNnolfdcn.exeNnaikd32.exeNcnadk32.exeOjhiqefo.exeOqbamo32.exeOjjffddl.exeObangb32.exeOcckojkm.exeOnholckc.exeOqgkhnjf.exeOkloegjl.exeObfhba32.exeOgcpjhoq.exeOjalgcnd.exeOqkdcn32.exePgemphmn.exePnpemb32.exePeimil32.exePghieg32.exePjffbc32.exePnbbbabh.exePcojkhap.exePkfblfab.exePndohaqe.exePabkdmpi.exePgmcqggf.exePjkombfj.exePbbgnpgl.exePeqcjkfp.exePgopffec.exePjmlbbdg.exePnihcq32.exePbddcoei.exeQgallfcq.exeQjpiha32.exeQnkdhpjn.exeQajadlja.exepid process 732 Kckbqpnj.exe 4220 Liekmj32.exe 4984 Lcmofolg.exe 1540 Lgikfn32.exe 1548 Ldmlpbbj.exe 4860 Lgkhlnbn.exe 4892 Lnepih32.exe 2308 Lgneampk.exe 1808 Lilanioo.exe 3752 Laciofpa.exe 2088 Lgpagm32.exe 4116 Lnjjdgee.exe 5092 Lphfpbdi.exe 1904 Lcgblncm.exe 1196 Mahbje32.exe 4632 Mciobn32.exe 3028 Mkpgck32.exe 2500 Majopeii.exe 1460 Mdiklqhm.exe 1932 Mnapdf32.exe 1800 Mgidml32.exe 4016 Mdmegp32.exe 4688 Mpdelajl.exe 776 Nnhfee32.exe 1792 Nceonl32.exe 3032 Nqiogp32.exe 672 Ndghmo32.exe 4940 Nnolfdcn.exe 4980 Nnaikd32.exe 1416 Ncnadk32.exe 1844 Ojhiqefo.exe 1296 Oqbamo32.exe 4740 Ojjffddl.exe 4332 Obangb32.exe 4340 Occkojkm.exe 4008 Onholckc.exe 2404 Oqgkhnjf.exe 3704 Okloegjl.exe 4264 Obfhba32.exe 3556 Ogcpjhoq.exe 4896 Ojalgcnd.exe 2608 Oqkdcn32.exe 3612 Pgemphmn.exe 4436 Pnpemb32.exe 3756 Peimil32.exe 3340 Pghieg32.exe 4644 Pjffbc32.exe 4960 Pnbbbabh.exe 1720 Pcojkhap.exe 4856 Pkfblfab.exe 4668 Pndohaqe.exe 992 Pabkdmpi.exe 3176 Pgmcqggf.exe 824 Pjkombfj.exe 4396 Pbbgnpgl.exe 1364 Peqcjkfp.exe 1960 Pgopffec.exe 1392 Pjmlbbdg.exe 3960 Pnihcq32.exe 1700 Pbddcoei.exe 2884 Qgallfcq.exe 4568 Qjpiha32.exe 2516 Qnkdhpjn.exe 2508 Qajadlja.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ofeilobp.exeFipbdikp.exeMedqcmki.exeDcjnoece.exeLldopb32.exeEmbkoi32.exeJcefno32.exeChjaol32.exeNhkikq32.exeGpecbk32.exeGkiaej32.exeJdnoplhh.exeJjamia32.exeClkndpag.exeOlgemcli.exeGahcmd32.exeKaehljpj.exePlbmokop.exeGdeqhl32.exeEaonjngh.exeMeamcg32.exeFmfnpa32.exeBihjfnmm.exeCgqqdeod.exeNjghbl32.exeMigjoaaf.exeAjdjin32.exeGbdgfa32.exeJedeph32.exeJnnpdg32.exeLepncd32.exeOneklm32.exeEdhakj32.exeKfjhkjle.exeJdgafjpn.exeHibafp32.exeCogmkl32.exeEcoangbg.exeCalhnpgn.exeEkhjmiad.exeAkamff32.exeBkkple32.exeBheffh32.exeCfqmpl32.exeChpada32.exeOcpgod32.exeKfqgab32.exeNajceeoo.exedescription ioc process File created C:\Windows\SysWOW64\Kjpgii32.dll Ofeilobp.exe File created C:\Windows\SysWOW64\Fagjfflb.exe Fipbdikp.exe File created C:\Windows\SysWOW64\Ejlekaqd.dll Medqcmki.exe File created C:\Windows\SysWOW64\Ecjbbo32.dll Dcjnoece.exe File created C:\Windows\SysWOW64\Ljgpkonp.exe Lldopb32.exe File created C:\Windows\SysWOW64\Phigif32.exe File opened for modification C:\Windows\SysWOW64\Fflohaij.exe File created C:\Windows\SysWOW64\Hehhjm32.dll File created C:\Windows\SysWOW64\Edmclccp.exe Embkoi32.exe File created C:\Windows\SysWOW64\Nndjndbh.exe File opened for modification C:\Windows\SysWOW64\Jefbfgig.exe Jcefno32.exe File created C:\Windows\SysWOW64\Ogfilp32.dll Chjaol32.exe File created C:\Windows\SysWOW64\Njiegl32.exe Nhkikq32.exe File created C:\Windows\SysWOW64\Gbdoof32.exe Gpecbk32.exe File created C:\Windows\SysWOW64\Gnhnaf32.exe Gkiaej32.exe File created C:\Windows\SysWOW64\Paihbi32.dll Jdnoplhh.exe File created C:\Windows\SysWOW64\Jnmijq32.exe Jjamia32.exe File created C:\Windows\SysWOW64\Gidnkkpc.exe File created C:\Windows\SysWOW64\Mfhbga32.exe File created C:\Windows\SysWOW64\Hnigkegh.dll Clkndpag.exe File created C:\Windows\SysWOW64\Dobhii32.dll Olgemcli.exe File opened for modification C:\Windows\SysWOW64\Hhbkinel.exe Gahcmd32.exe File created C:\Windows\SysWOW64\Pmaffnce.exe File created C:\Windows\SysWOW64\Pdpjda32.dll Kaehljpj.exe File created C:\Windows\SysWOW64\Ofimgb32.dll Plbmokop.exe File created C:\Windows\SysWOW64\Hhjamhbn.dll File opened for modification C:\Windows\SysWOW64\Gokdeeec.exe Gdeqhl32.exe File created C:\Windows\SysWOW64\Aaafckfg.dll Eaonjngh.exe File created C:\Windows\SysWOW64\Mlkepaam.exe Meamcg32.exe File created C:\Windows\SysWOW64\Kolkod32.dll Fmfnpa32.exe File created C:\Windows\SysWOW64\Johnamkm.exe File created C:\Windows\SysWOW64\Pmiikh32.exe File opened for modification C:\Windows\SysWOW64\Cqpbglno.exe Bihjfnmm.exe File created C:\Windows\SysWOW64\Mennkfdm.dll Cgqqdeod.exe File created C:\Windows\SysWOW64\Kaaial32.dll Njghbl32.exe File created C:\Windows\SysWOW64\Mlefklpj.exe Migjoaaf.exe File created C:\Windows\SysWOW64\Ahgjejhd.exe Ajdjin32.exe File opened for modification C:\Windows\SysWOW64\Fpdcag32.exe File created C:\Windows\SysWOW64\Gmjlcj32.exe Gbdgfa32.exe File created C:\Windows\SysWOW64\Cefofm32.dll Jedeph32.exe File created C:\Windows\SysWOW64\Jehhaaci.exe Jnnpdg32.exe File created C:\Windows\SysWOW64\Ogibpb32.dll Lepncd32.exe File created C:\Windows\SysWOW64\Njpdnedf.exe File created C:\Windows\SysWOW64\Olhlhjpd.exe Oneklm32.exe File created C:\Windows\SysWOW64\Eqjbohhg.dll Edhakj32.exe File created C:\Windows\SysWOW64\Bjjplc32.dll Kfjhkjle.exe File opened for modification C:\Windows\SysWOW64\Jgenbfoa.exe Jdgafjpn.exe File opened for modification C:\Windows\SysWOW64\Hplicjok.exe Hibafp32.exe File created C:\Windows\SysWOW64\Ahoemi32.dll File opened for modification C:\Windows\SysWOW64\Jghpbk32.exe File created C:\Windows\SysWOW64\Afpjel32.exe File created C:\Windows\SysWOW64\Jidpnp32.dll Cogmkl32.exe File created C:\Windows\SysWOW64\Lfjehk32.dll Ecoangbg.exe File created C:\Windows\SysWOW64\Ddjejl32.exe Calhnpgn.exe File created C:\Windows\SysWOW64\Ncofplba.exe File created C:\Windows\SysWOW64\Kpjgop32.dll Ekhjmiad.exe File opened for modification C:\Windows\SysWOW64\Achegd32.exe Akamff32.exe File opened for modification C:\Windows\SysWOW64\Bbdhiojo.exe Bkkple32.exe File opened for modification C:\Windows\SysWOW64\Bopocbcq.exe Bheffh32.exe File created C:\Windows\SysWOW64\Fabibb32.dll Cfqmpl32.exe File created C:\Windows\SysWOW64\Clkndpag.exe Chpada32.exe File created C:\Windows\SysWOW64\Ofnckp32.exe Ocpgod32.exe File created C:\Windows\SysWOW64\Kiodmn32.exe Kfqgab32.exe File opened for modification C:\Windows\SysWOW64\Niakfbpa.exe Najceeoo.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 13592 13916 -
Modifies registry class 64 IoCs
Processes:
Bfjnjcni.exeLljfpnjg.exePhelcc32.exeLelchgne.exeFmfnpa32.exeFpejlmcf.exeQgallfcq.exeOlckbd32.exeCadlbk32.exeKjmmepfj.exeBjlpjm32.exeFcniglmb.exeDmfeidbe.exeDbllbibl.exeJkkjmlan.exeLnnikdnj.exeBpnihiio.exeMibpda32.exeHdmein32.exeEgijmegb.exeLicfngjd.exeHkjafn32.exeMhdjehhj.exeOgklelna.exeIklgah32.exeEhimanbq.exeHglipp32.exeIoopml32.exeJnnpdg32.exeGohhpe32.exeMolelb32.exeFdffbake.exeOjjffddl.exeJlbgha32.exeKemhff32.exeOlhlhjpd.exeNijeec32.exeOgcpjhoq.exePbbgnpgl.exePhlacbfm.exeFpeafcfa.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfjnjcni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhgfglco.dll" Lljfpnjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phelcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lelchgne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kolkod32.dll" Fmfnpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpejlmcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Difebl32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qgallfcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Olckbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgmchiim.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cadlbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iaejbl32.dll" Kjmmepfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjlpjm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcniglmb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmfeidbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iahici32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dbllbibl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhgngp32.dll" Jkkjmlan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idmdhm32.dll" Lnnikdnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpnihiio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mibpda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdmein32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egijmegb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djaiilmd.dll" Licfngjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Minqeaad.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohcpka32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abhemohm.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkjafn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kejiqphj.dll" Mhdjehhj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogklelna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iklgah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehimanbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pokhgc32.dll" Hglipp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eignmpke.dll" Ioopml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Algpao32.dll" Jnnpdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gohhpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdcebook.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Molelb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Achhaode.dll" Fdffbake.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hffpdd32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecalcl32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojjffddl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jlbgha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kemhff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llmglb32.dll" Olhlhjpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nijeec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogcpjhoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbbgnpgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phlacbfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kednfemc.dll" Fpeafcfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qdhogopn.dll" -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
12d66107671eb4b2ce864fad98fda18e37240ecb759c8b3aead1c836a926f2c9.exeKckbqpnj.exeLiekmj32.exeLcmofolg.exeLgikfn32.exeLdmlpbbj.exeLgkhlnbn.exeLnepih32.exeLgneampk.exeLilanioo.exeLaciofpa.exeLgpagm32.exeLnjjdgee.exeLphfpbdi.exeLcgblncm.exeMahbje32.exeMciobn32.exeMkpgck32.exeMajopeii.exeMdiklqhm.exeMnapdf32.exeMgidml32.exedescription pid process target process PID 636 wrote to memory of 732 636 12d66107671eb4b2ce864fad98fda18e37240ecb759c8b3aead1c836a926f2c9.exe Kckbqpnj.exe PID 636 wrote to memory of 732 636 12d66107671eb4b2ce864fad98fda18e37240ecb759c8b3aead1c836a926f2c9.exe Kckbqpnj.exe PID 636 wrote to memory of 732 636 12d66107671eb4b2ce864fad98fda18e37240ecb759c8b3aead1c836a926f2c9.exe Kckbqpnj.exe PID 732 wrote to memory of 4220 732 Kckbqpnj.exe Liekmj32.exe PID 732 wrote to memory of 4220 732 Kckbqpnj.exe Liekmj32.exe PID 732 wrote to memory of 4220 732 Kckbqpnj.exe Liekmj32.exe PID 4220 wrote to memory of 4984 4220 Liekmj32.exe Lcmofolg.exe PID 4220 wrote to memory of 4984 4220 Liekmj32.exe Lcmofolg.exe PID 4220 wrote to memory of 4984 4220 Liekmj32.exe Lcmofolg.exe PID 4984 wrote to memory of 1540 4984 Lcmofolg.exe Lgikfn32.exe PID 4984 wrote to memory of 1540 4984 Lcmofolg.exe Lgikfn32.exe PID 4984 wrote to memory of 1540 4984 Lcmofolg.exe Lgikfn32.exe PID 1540 wrote to memory of 1548 1540 Lgikfn32.exe Ldmlpbbj.exe PID 1540 wrote to memory of 1548 1540 Lgikfn32.exe Ldmlpbbj.exe PID 1540 wrote to memory of 1548 1540 Lgikfn32.exe Ldmlpbbj.exe PID 1548 wrote to memory of 4860 1548 Ldmlpbbj.exe Lgkhlnbn.exe PID 1548 wrote to memory of 4860 1548 Ldmlpbbj.exe Lgkhlnbn.exe PID 1548 wrote to memory of 4860 1548 Ldmlpbbj.exe Lgkhlnbn.exe PID 4860 wrote to memory of 4892 4860 Lgkhlnbn.exe Lnepih32.exe PID 4860 wrote to memory of 4892 4860 Lgkhlnbn.exe Lnepih32.exe PID 4860 wrote to memory of 4892 4860 Lgkhlnbn.exe Lnepih32.exe PID 4892 wrote to memory of 2308 4892 Lnepih32.exe Lgneampk.exe PID 4892 wrote to memory of 2308 4892 Lnepih32.exe Lgneampk.exe PID 4892 wrote to memory of 2308 4892 Lnepih32.exe Lgneampk.exe PID 2308 wrote to memory of 1808 2308 Lgneampk.exe Lilanioo.exe PID 2308 wrote to memory of 1808 2308 Lgneampk.exe Lilanioo.exe PID 2308 wrote to memory of 1808 2308 Lgneampk.exe Lilanioo.exe PID 1808 wrote to memory of 3752 1808 Lilanioo.exe Laciofpa.exe PID 1808 wrote to memory of 3752 1808 Lilanioo.exe Laciofpa.exe PID 1808 wrote to memory of 3752 1808 Lilanioo.exe Laciofpa.exe PID 3752 wrote to memory of 2088 3752 Laciofpa.exe Lgpagm32.exe PID 3752 wrote to memory of 2088 3752 Laciofpa.exe Lgpagm32.exe PID 3752 wrote to memory of 2088 3752 Laciofpa.exe Lgpagm32.exe PID 2088 wrote to memory of 4116 2088 Lgpagm32.exe Lnjjdgee.exe PID 2088 wrote to memory of 4116 2088 Lgpagm32.exe Lnjjdgee.exe PID 2088 wrote to memory of 4116 2088 Lgpagm32.exe Lnjjdgee.exe PID 4116 wrote to memory of 5092 4116 Lnjjdgee.exe Lphfpbdi.exe PID 4116 wrote to memory of 5092 4116 Lnjjdgee.exe Lphfpbdi.exe PID 4116 wrote to memory of 5092 4116 Lnjjdgee.exe Lphfpbdi.exe PID 5092 wrote to memory of 1904 5092 Lphfpbdi.exe Lcgblncm.exe PID 5092 wrote to memory of 1904 5092 Lphfpbdi.exe Lcgblncm.exe PID 5092 wrote to memory of 1904 5092 Lphfpbdi.exe Lcgblncm.exe PID 1904 wrote to memory of 1196 1904 Lcgblncm.exe Mahbje32.exe PID 1904 wrote to memory of 1196 1904 Lcgblncm.exe Mahbje32.exe PID 1904 wrote to memory of 1196 1904 Lcgblncm.exe Mahbje32.exe PID 1196 wrote to memory of 4632 1196 Mahbje32.exe Mciobn32.exe PID 1196 wrote to memory of 4632 1196 Mahbje32.exe Mciobn32.exe PID 1196 wrote to memory of 4632 1196 Mahbje32.exe Mciobn32.exe PID 4632 wrote to memory of 3028 4632 Mciobn32.exe Mkpgck32.exe PID 4632 wrote to memory of 3028 4632 Mciobn32.exe Mkpgck32.exe PID 4632 wrote to memory of 3028 4632 Mciobn32.exe Mkpgck32.exe PID 3028 wrote to memory of 2500 3028 Mkpgck32.exe Majopeii.exe PID 3028 wrote to memory of 2500 3028 Mkpgck32.exe Majopeii.exe PID 3028 wrote to memory of 2500 3028 Mkpgck32.exe Majopeii.exe PID 2500 wrote to memory of 1460 2500 Majopeii.exe Mdiklqhm.exe PID 2500 wrote to memory of 1460 2500 Majopeii.exe Mdiklqhm.exe PID 2500 wrote to memory of 1460 2500 Majopeii.exe Mdiklqhm.exe PID 1460 wrote to memory of 1932 1460 Mdiklqhm.exe Mnapdf32.exe PID 1460 wrote to memory of 1932 1460 Mdiklqhm.exe Mnapdf32.exe PID 1460 wrote to memory of 1932 1460 Mdiklqhm.exe Mnapdf32.exe PID 1932 wrote to memory of 1800 1932 Mnapdf32.exe Mgidml32.exe PID 1932 wrote to memory of 1800 1932 Mnapdf32.exe Mgidml32.exe PID 1932 wrote to memory of 1800 1932 Mnapdf32.exe Mgidml32.exe PID 1800 wrote to memory of 4016 1800 Mgidml32.exe Mdmegp32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12d66107671eb4b2ce864fad98fda18e37240ecb759c8b3aead1c836a926f2c9.exe"C:\Users\Admin\AppData\Local\Temp\12d66107671eb4b2ce864fad98fda18e37240ecb759c8b3aead1c836a926f2c9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\Kckbqpnj.exeC:\Windows\system32\Kckbqpnj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\Liekmj32.exeC:\Windows\system32\Liekmj32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\Lcmofolg.exeC:\Windows\system32\Lcmofolg.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\Lgikfn32.exeC:\Windows\system32\Lgikfn32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\Ldmlpbbj.exeC:\Windows\system32\Ldmlpbbj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\Lgkhlnbn.exeC:\Windows\system32\Lgkhlnbn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\Lnepih32.exeC:\Windows\system32\Lnepih32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\Lgneampk.exeC:\Windows\system32\Lgneampk.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\Lilanioo.exeC:\Windows\system32\Lilanioo.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\Laciofpa.exeC:\Windows\system32\Laciofpa.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\Lgpagm32.exeC:\Windows\system32\Lgpagm32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Lnjjdgee.exeC:\Windows\system32\Lnjjdgee.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\Lphfpbdi.exeC:\Windows\system32\Lphfpbdi.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\Lcgblncm.exeC:\Windows\system32\Lcgblncm.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\Mahbje32.exeC:\Windows\system32\Mahbje32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\Mciobn32.exeC:\Windows\system32\Mciobn32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\Mkpgck32.exeC:\Windows\system32\Mkpgck32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\Majopeii.exeC:\Windows\system32\Majopeii.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\Mnapdf32.exeC:\Windows\system32\Mnapdf32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\Mgidml32.exeC:\Windows\system32\Mgidml32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\Mdmegp32.exeC:\Windows\system32\Mdmegp32.exe23⤵
- Executes dropped EXE
PID:4016 -
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe24⤵
- Executes dropped EXE
PID:4688 -
C:\Windows\SysWOW64\Nnhfee32.exeC:\Windows\system32\Nnhfee32.exe25⤵
- Executes dropped EXE
PID:776 -
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe26⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe27⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\SysWOW64\Ndghmo32.exeC:\Windows\system32\Ndghmo32.exe28⤵
- Executes dropped EXE
PID:672 -
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe29⤵
- Executes dropped EXE
PID:4940 -
C:\Windows\SysWOW64\Nnaikd32.exeC:\Windows\system32\Nnaikd32.exe30⤵
- Executes dropped EXE
PID:4980 -
C:\Windows\SysWOW64\Ncnadk32.exeC:\Windows\system32\Ncnadk32.exe31⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\Ojhiqefo.exeC:\Windows\system32\Ojhiqefo.exe32⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\Oqbamo32.exeC:\Windows\system32\Oqbamo32.exe33⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\Ojjffddl.exeC:\Windows\system32\Ojjffddl.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:4740 -
C:\Windows\SysWOW64\Obangb32.exeC:\Windows\system32\Obangb32.exe35⤵
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\Occkojkm.exeC:\Windows\system32\Occkojkm.exe36⤵
- Executes dropped EXE
PID:4340 -
C:\Windows\SysWOW64\Onholckc.exeC:\Windows\system32\Onholckc.exe37⤵
- Executes dropped EXE
PID:4008 -
C:\Windows\SysWOW64\Oqgkhnjf.exeC:\Windows\system32\Oqgkhnjf.exe38⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\Okloegjl.exeC:\Windows\system32\Okloegjl.exe39⤵
- Executes dropped EXE
PID:3704 -
C:\Windows\SysWOW64\Obfhba32.exeC:\Windows\system32\Obfhba32.exe40⤵
- Executes dropped EXE
PID:4264 -
C:\Windows\SysWOW64\Ogcpjhoq.exeC:\Windows\system32\Ogcpjhoq.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:3556 -
C:\Windows\SysWOW64\Ojalgcnd.exeC:\Windows\system32\Ojalgcnd.exe42⤵
- Executes dropped EXE
PID:4896 -
C:\Windows\SysWOW64\Oqkdcn32.exeC:\Windows\system32\Oqkdcn32.exe43⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\Pgemphmn.exeC:\Windows\system32\Pgemphmn.exe44⤵
- Executes dropped EXE
PID:3612 -
C:\Windows\SysWOW64\Pnpemb32.exeC:\Windows\system32\Pnpemb32.exe45⤵
- Executes dropped EXE
PID:4436 -
C:\Windows\SysWOW64\Peimil32.exeC:\Windows\system32\Peimil32.exe46⤵
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\Pghieg32.exeC:\Windows\system32\Pghieg32.exe47⤵
- Executes dropped EXE
PID:3340 -
C:\Windows\SysWOW64\Pjffbc32.exeC:\Windows\system32\Pjffbc32.exe48⤵
- Executes dropped EXE
PID:4644 -
C:\Windows\SysWOW64\Pnbbbabh.exeC:\Windows\system32\Pnbbbabh.exe49⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\Pcojkhap.exeC:\Windows\system32\Pcojkhap.exe50⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\Pkfblfab.exeC:\Windows\system32\Pkfblfab.exe51⤵
- Executes dropped EXE
PID:4856 -
C:\Windows\SysWOW64\Pndohaqe.exeC:\Windows\system32\Pndohaqe.exe52⤵
- Executes dropped EXE
PID:4668 -
C:\Windows\SysWOW64\Pabkdmpi.exeC:\Windows\system32\Pabkdmpi.exe53⤵
- Executes dropped EXE
PID:992 -
C:\Windows\SysWOW64\Pgmcqggf.exeC:\Windows\system32\Pgmcqggf.exe54⤵
- Executes dropped EXE
PID:3176 -
C:\Windows\SysWOW64\Pjkombfj.exeC:\Windows\system32\Pjkombfj.exe55⤵
- Executes dropped EXE
PID:824 -
C:\Windows\SysWOW64\Pbbgnpgl.exeC:\Windows\system32\Pbbgnpgl.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:4396 -
C:\Windows\SysWOW64\Peqcjkfp.exeC:\Windows\system32\Peqcjkfp.exe57⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\Pgopffec.exeC:\Windows\system32\Pgopffec.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Pjmlbbdg.exeC:\Windows\system32\Pjmlbbdg.exe59⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\Pnihcq32.exeC:\Windows\system32\Pnihcq32.exe60⤵
- Executes dropped EXE
PID:3960 -
C:\Windows\SysWOW64\Pbddcoei.exeC:\Windows\system32\Pbddcoei.exe61⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\Qgallfcq.exeC:\Windows\system32\Qgallfcq.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Qjpiha32.exeC:\Windows\system32\Qjpiha32.exe63⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\Qnkdhpjn.exeC:\Windows\system32\Qnkdhpjn.exe64⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\Qajadlja.exeC:\Windows\system32\Qajadlja.exe65⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\Qchmagie.exeC:\Windows\system32\Qchmagie.exe66⤵PID:5028
-
C:\Windows\SysWOW64\Qloebdig.exeC:\Windows\system32\Qloebdig.exe67⤵PID:624
-
C:\Windows\SysWOW64\Qjbena32.exeC:\Windows\system32\Qjbena32.exe68⤵PID:752
-
C:\Windows\SysWOW64\Qbimoo32.exeC:\Windows\system32\Qbimoo32.exe69⤵PID:3896
-
C:\Windows\SysWOW64\Aegikj32.exeC:\Windows\system32\Aegikj32.exe70⤵PID:2352
-
C:\Windows\SysWOW64\Agffge32.exeC:\Windows\system32\Agffge32.exe71⤵PID:1876
-
C:\Windows\SysWOW64\Anpncp32.exeC:\Windows\system32\Anpncp32.exe72⤵PID:2752
-
C:\Windows\SysWOW64\Aanjpk32.exeC:\Windows\system32\Aanjpk32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5004 -
C:\Windows\SysWOW64\Ahhblemi.exeC:\Windows\system32\Ahhblemi.exe74⤵PID:1656
-
C:\Windows\SysWOW64\Ajfoiqll.exeC:\Windows\system32\Ajfoiqll.exe75⤵PID:4652
-
C:\Windows\SysWOW64\Abngjnmo.exeC:\Windows\system32\Abngjnmo.exe76⤵PID:2640
-
C:\Windows\SysWOW64\Acocaf32.exeC:\Windows\system32\Acocaf32.exe77⤵PID:4976
-
C:\Windows\SysWOW64\Alfkbc32.exeC:\Windows\system32\Alfkbc32.exe78⤵PID:4284
-
C:\Windows\SysWOW64\Andgoobc.exeC:\Windows\system32\Andgoobc.exe79⤵PID:2504
-
C:\Windows\SysWOW64\Ajkhdp32.exeC:\Windows\system32\Ajkhdp32.exe80⤵PID:1168
-
C:\Windows\SysWOW64\Aaepqjpd.exeC:\Windows\system32\Aaepqjpd.exe81⤵PID:4164
-
C:\Windows\SysWOW64\Ahoimd32.exeC:\Windows\system32\Ahoimd32.exe82⤵PID:4104
-
C:\Windows\SysWOW64\Ajneip32.exeC:\Windows\system32\Ajneip32.exe83⤵PID:2748
-
C:\Windows\SysWOW64\Becifhfj.exeC:\Windows\system32\Becifhfj.exe84⤵PID:1508
-
C:\Windows\SysWOW64\Bjpaooda.exeC:\Windows\system32\Bjpaooda.exe85⤵PID:1704
-
C:\Windows\SysWOW64\Bbgipldd.exeC:\Windows\system32\Bbgipldd.exe86⤵PID:1384
-
C:\Windows\SysWOW64\Beeflhdh.exeC:\Windows\system32\Beeflhdh.exe87⤵PID:2724
-
C:\Windows\SysWOW64\Bnnjen32.exeC:\Windows\system32\Bnnjen32.exe88⤵PID:4060
-
C:\Windows\SysWOW64\Balfaiil.exeC:\Windows\system32\Balfaiil.exe89⤵PID:524
-
C:\Windows\SysWOW64\Blbknaib.exeC:\Windows\system32\Blbknaib.exe90⤵PID:2796
-
C:\Windows\SysWOW64\Bjdkjo32.exeC:\Windows\system32\Bjdkjo32.exe91⤵PID:4608
-
C:\Windows\SysWOW64\Bblckl32.exeC:\Windows\system32\Bblckl32.exe92⤵PID:3520
-
C:\Windows\SysWOW64\Bjghpn32.exeC:\Windows\system32\Bjghpn32.exe93⤵PID:408
-
C:\Windows\SysWOW64\Bbnpqk32.exeC:\Windows\system32\Bbnpqk32.exe94⤵PID:1632
-
C:\Windows\SysWOW64\Bemlmgnp.exeC:\Windows\system32\Bemlmgnp.exe95⤵PID:1516
-
C:\Windows\SysWOW64\Bhkhibmc.exeC:\Windows\system32\Bhkhibmc.exe96⤵PID:3512
-
C:\Windows\SysWOW64\Bkidenlg.exeC:\Windows\system32\Bkidenlg.exe97⤵PID:3228
-
C:\Windows\SysWOW64\Boepel32.exeC:\Windows\system32\Boepel32.exe98⤵PID:4112
-
C:\Windows\SysWOW64\Cacmah32.exeC:\Windows\system32\Cacmah32.exe99⤵PID:1584
-
C:\Windows\SysWOW64\Ceoibflm.exeC:\Windows\system32\Ceoibflm.exe100⤵PID:2168
-
C:\Windows\SysWOW64\Chmeobkq.exeC:\Windows\system32\Chmeobkq.exe101⤵PID:4424
-
C:\Windows\SysWOW64\Cklaknjd.exeC:\Windows\system32\Cklaknjd.exe102⤵PID:4820
-
C:\Windows\SysWOW64\Cogmkl32.exeC:\Windows\system32\Cogmkl32.exe103⤵
- Drops file in System32 directory
PID:3332 -
C:\Windows\SysWOW64\Cafigg32.exeC:\Windows\system32\Cafigg32.exe104⤵PID:3720
-
C:\Windows\SysWOW64\Chpada32.exeC:\Windows\system32\Chpada32.exe105⤵
- Drops file in System32 directory
PID:5124 -
C:\Windows\SysWOW64\Clkndpag.exeC:\Windows\system32\Clkndpag.exe106⤵
- Drops file in System32 directory
PID:5168 -
C:\Windows\SysWOW64\Cojjqlpk.exeC:\Windows\system32\Cojjqlpk.exe107⤵PID:5208
-
C:\Windows\SysWOW64\Cahfmgoo.exeC:\Windows\system32\Cahfmgoo.exe108⤵PID:5248
-
C:\Windows\SysWOW64\Cecbmf32.exeC:\Windows\system32\Cecbmf32.exe109⤵PID:5288
-
C:\Windows\SysWOW64\Chbnia32.exeC:\Windows\system32\Chbnia32.exe110⤵PID:5324
-
C:\Windows\SysWOW64\Ckpjfm32.exeC:\Windows\system32\Ckpjfm32.exe111⤵PID:5368
-
C:\Windows\SysWOW64\Cbgbgj32.exeC:\Windows\system32\Cbgbgj32.exe112⤵PID:5408
-
C:\Windows\SysWOW64\Cajcbgml.exeC:\Windows\system32\Cajcbgml.exe113⤵PID:5448
-
C:\Windows\SysWOW64\Cefoce32.exeC:\Windows\system32\Cefoce32.exe114⤵PID:5484
-
C:\Windows\SysWOW64\Chdkoa32.exeC:\Windows\system32\Chdkoa32.exe115⤵PID:5528
-
C:\Windows\SysWOW64\Clpgpp32.exeC:\Windows\system32\Clpgpp32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5564 -
C:\Windows\SysWOW64\Conclk32.exeC:\Windows\system32\Conclk32.exe117⤵PID:5612
-
C:\Windows\SysWOW64\Camphf32.exeC:\Windows\system32\Camphf32.exe118⤵PID:5648
-
C:\Windows\SysWOW64\Cehkhecb.exeC:\Windows\system32\Cehkhecb.exe119⤵PID:5688
-
C:\Windows\SysWOW64\Cdkldb32.exeC:\Windows\system32\Cdkldb32.exe120⤵PID:5732
-
C:\Windows\SysWOW64\Chghdqbf.exeC:\Windows\system32\Chghdqbf.exe121⤵PID:5780
-
C:\Windows\SysWOW64\Ckedalaj.exeC:\Windows\system32\Ckedalaj.exe122⤵PID:5820
-
C:\Windows\SysWOW64\Dbllbibl.exeC:\Windows\system32\Dbllbibl.exe123⤵
- Modifies registry class
PID:5860 -
C:\Windows\SysWOW64\Daolnf32.exeC:\Windows\system32\Daolnf32.exe124⤵PID:5900
-
C:\Windows\SysWOW64\Dhidjpqc.exeC:\Windows\system32\Dhidjpqc.exe125⤵PID:5944
-
C:\Windows\SysWOW64\Docmgjhp.exeC:\Windows\system32\Docmgjhp.exe126⤵PID:5988
-
C:\Windows\SysWOW64\Daaicfgd.exeC:\Windows\system32\Daaicfgd.exe127⤵PID:6032
-
C:\Windows\SysWOW64\Demecd32.exeC:\Windows\system32\Demecd32.exe128⤵PID:6076
-
C:\Windows\SysWOW64\Dhkapp32.exeC:\Windows\system32\Dhkapp32.exe129⤵PID:6116
-
C:\Windows\SysWOW64\Doeiljfn.exeC:\Windows\system32\Doeiljfn.exe130⤵PID:3924
-
C:\Windows\SysWOW64\Dadeieea.exeC:\Windows\system32\Dadeieea.exe131⤵PID:5204
-
C:\Windows\SysWOW64\Deoaid32.exeC:\Windows\system32\Deoaid32.exe132⤵PID:5268
-
C:\Windows\SysWOW64\Ddbbeade.exeC:\Windows\system32\Ddbbeade.exe133⤵PID:5336
-
C:\Windows\SysWOW64\Dohfbj32.exeC:\Windows\system32\Dohfbj32.exe134⤵PID:5416
-
C:\Windows\SysWOW64\Dddojq32.exeC:\Windows\system32\Dddojq32.exe135⤵PID:5472
-
C:\Windows\SysWOW64\Dllfkn32.exeC:\Windows\system32\Dllfkn32.exe136⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5556 -
C:\Windows\SysWOW64\Dojcgi32.exeC:\Windows\system32\Dojcgi32.exe137⤵PID:5620
-
C:\Windows\SysWOW64\Ddgkpp32.exeC:\Windows\system32\Ddgkpp32.exe138⤵PID:5684
-
C:\Windows\SysWOW64\Dlncan32.exeC:\Windows\system32\Dlncan32.exe139⤵PID:5776
-
C:\Windows\SysWOW64\Eefhjc32.exeC:\Windows\system32\Eefhjc32.exe140⤵PID:5848
-
C:\Windows\SysWOW64\Ehedfo32.exeC:\Windows\system32\Ehedfo32.exe141⤵PID:5912
-
C:\Windows\SysWOW64\Ekcpbj32.exeC:\Windows\system32\Ekcpbj32.exe142⤵PID:5984
-
C:\Windows\SysWOW64\Ecjhcg32.exeC:\Windows\system32\Ecjhcg32.exe143⤵PID:6040
-
C:\Windows\SysWOW64\Elbmlmml.exeC:\Windows\system32\Elbmlmml.exe144⤵PID:6108
-
C:\Windows\SysWOW64\Eoaihhlp.exeC:\Windows\system32\Eoaihhlp.exe145⤵PID:5188
-
C:\Windows\SysWOW64\Eapedd32.exeC:\Windows\system32\Eapedd32.exe146⤵PID:5276
-
C:\Windows\SysWOW64\Ednaqo32.exeC:\Windows\system32\Ednaqo32.exe147⤵PID:5400
-
C:\Windows\SysWOW64\Ehimanbq.exeC:\Windows\system32\Ehimanbq.exe148⤵
- Modifies registry class
PID:5520 -
C:\Windows\SysWOW64\Ekhjmiad.exeC:\Windows\system32\Ekhjmiad.exe149⤵
- Drops file in System32 directory
PID:5636 -
C:\Windows\SysWOW64\Ecoangbg.exeC:\Windows\system32\Ecoangbg.exe150⤵
- Drops file in System32 directory
PID:5720 -
C:\Windows\SysWOW64\Ehljfnpn.exeC:\Windows\system32\Ehljfnpn.exe151⤵PID:5844
-
C:\Windows\SysWOW64\Eofbch32.exeC:\Windows\system32\Eofbch32.exe152⤵PID:5956
-
C:\Windows\SysWOW64\Eadopc32.exeC:\Windows\system32\Eadopc32.exe153⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6084 -
C:\Windows\SysWOW64\Ehnglm32.exeC:\Windows\system32\Ehnglm32.exe154⤵PID:5160
-
C:\Windows\SysWOW64\Fkmchi32.exeC:\Windows\system32\Fkmchi32.exe155⤵PID:5404
-
C:\Windows\SysWOW64\Fdegandp.exeC:\Windows\system32\Fdegandp.exe156⤵PID:5572
-
C:\Windows\SysWOW64\Fllpbldb.exeC:\Windows\system32\Fllpbldb.exe157⤵PID:5756
-
C:\Windows\SysWOW64\Fcfhof32.exeC:\Windows\system32\Fcfhof32.exe158⤵PID:5952
-
C:\Windows\SysWOW64\Fdgdgnbm.exeC:\Windows\system32\Fdgdgnbm.exe159⤵PID:3852
-
C:\Windows\SysWOW64\Fchddejl.exeC:\Windows\system32\Fchddejl.exe160⤵PID:1832
-
C:\Windows\SysWOW64\Fakdpb32.exeC:\Windows\system32\Fakdpb32.exe161⤵PID:4228
-
C:\Windows\SysWOW64\Fhemmlhc.exeC:\Windows\system32\Fhemmlhc.exe162⤵PID:5352
-
C:\Windows\SysWOW64\Fooeif32.exeC:\Windows\system32\Fooeif32.exe163⤵PID:5596
-
C:\Windows\SysWOW64\Ffimfqgm.exeC:\Windows\system32\Ffimfqgm.exe164⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5928 -
C:\Windows\SysWOW64\Foabofnn.exeC:\Windows\system32\Foabofnn.exe165⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1376 -
C:\Windows\SysWOW64\Fdnjgmle.exeC:\Windows\system32\Fdnjgmle.exe166⤵PID:6072
-
C:\Windows\SysWOW64\Gododflk.exeC:\Windows\system32\Gododflk.exe167⤵PID:5760
-
C:\Windows\SysWOW64\Gkkojgao.exeC:\Windows\system32\Gkkojgao.exe168⤵PID:5788
-
C:\Windows\SysWOW64\Gbdgfa32.exeC:\Windows\system32\Gbdgfa32.exe169⤵
- Drops file in System32 directory
PID:3724 -
C:\Windows\SysWOW64\Gmjlcj32.exeC:\Windows\system32\Gmjlcj32.exe170⤵PID:5548
-
C:\Windows\SysWOW64\Gohhpe32.exeC:\Windows\system32\Gohhpe32.exe171⤵
- Modifies registry class
PID:1924 -
C:\Windows\SysWOW64\Gdeqhl32.exeC:\Windows\system32\Gdeqhl32.exe172⤵
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\Gokdeeec.exeC:\Windows\system32\Gokdeeec.exe173⤵PID:5256
-
C:\Windows\SysWOW64\Gdhmnlcj.exeC:\Windows\system32\Gdhmnlcj.exe174⤵PID:6156
-
C:\Windows\SysWOW64\Gmoeoidl.exeC:\Windows\system32\Gmoeoidl.exe175⤵PID:6200
-
C:\Windows\SysWOW64\Gcimkc32.exeC:\Windows\system32\Gcimkc32.exe176⤵PID:6232
-
C:\Windows\SysWOW64\Gfgjgo32.exeC:\Windows\system32\Gfgjgo32.exe177⤵PID:6276
-
C:\Windows\SysWOW64\Hmabdibj.exeC:\Windows\system32\Hmabdibj.exe178⤵PID:6316
-
C:\Windows\SysWOW64\Hopnqdan.exeC:\Windows\system32\Hopnqdan.exe179⤵PID:6356
-
C:\Windows\SysWOW64\Hfifmnij.exeC:\Windows\system32\Hfifmnij.exe180⤵PID:6396
-
C:\Windows\SysWOW64\Helfik32.exeC:\Windows\system32\Helfik32.exe181⤵PID:6432
-
C:\Windows\SysWOW64\Hmcojh32.exeC:\Windows\system32\Hmcojh32.exe182⤵PID:6472
-
C:\Windows\SysWOW64\Hcmgfbhd.exeC:\Windows\system32\Hcmgfbhd.exe183⤵PID:6512
-
C:\Windows\SysWOW64\Heocnk32.exeC:\Windows\system32\Heocnk32.exe184⤵PID:6552
-
C:\Windows\SysWOW64\Hkikkeeo.exeC:\Windows\system32\Hkikkeeo.exe185⤵PID:6592
-
C:\Windows\SysWOW64\Hcpclbfa.exeC:\Windows\system32\Hcpclbfa.exe186⤵PID:6628
-
C:\Windows\SysWOW64\Heapdjlp.exeC:\Windows\system32\Heapdjlp.exe187⤵PID:6668
-
C:\Windows\SysWOW64\Hofdacke.exeC:\Windows\system32\Hofdacke.exe188⤵PID:6708
-
C:\Windows\SysWOW64\Hbeqmoji.exeC:\Windows\system32\Hbeqmoji.exe189⤵PID:6748
-
C:\Windows\SysWOW64\Hecmijim.exeC:\Windows\system32\Hecmijim.exe190⤵PID:6788
-
C:\Windows\SysWOW64\Hbgmcnhf.exeC:\Windows\system32\Hbgmcnhf.exe191⤵PID:6828
-
C:\Windows\SysWOW64\Iefioj32.exeC:\Windows\system32\Iefioj32.exe192⤵PID:6860
-
C:\Windows\SysWOW64\Ipknlb32.exeC:\Windows\system32\Ipknlb32.exe193⤵PID:6908
-
C:\Windows\SysWOW64\Iicbehnq.exeC:\Windows\system32\Iicbehnq.exe194⤵PID:6948
-
C:\Windows\SysWOW64\Icifbang.exeC:\Windows\system32\Icifbang.exe195⤵PID:6988
-
C:\Windows\SysWOW64\Ifgbnlmj.exeC:\Windows\system32\Ifgbnlmj.exe196⤵PID:7028
-
C:\Windows\SysWOW64\Ildkgc32.exeC:\Windows\system32\Ildkgc32.exe197⤵PID:7084
-
C:\Windows\SysWOW64\Iihkpg32.exeC:\Windows\system32\Iihkpg32.exe198⤵PID:7132
-
C:\Windows\SysWOW64\Icnpmp32.exeC:\Windows\system32\Icnpmp32.exe199⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6052 -
C:\Windows\SysWOW64\Imfdff32.exeC:\Windows\system32\Imfdff32.exe200⤵PID:6216
-
C:\Windows\SysWOW64\Ilidbbgl.exeC:\Windows\system32\Ilidbbgl.exe201⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6284 -
C:\Windows\SysWOW64\Jeaikh32.exeC:\Windows\system32\Jeaikh32.exe202⤵PID:6348
-
C:\Windows\SysWOW64\Jcbihpel.exeC:\Windows\system32\Jcbihpel.exe203⤵PID:6416
-
C:\Windows\SysWOW64\Jedeph32.exeC:\Windows\system32\Jedeph32.exe204⤵
- Drops file in System32 directory
PID:6484 -
C:\Windows\SysWOW64\Jmknaell.exeC:\Windows\system32\Jmknaell.exe205⤵PID:6536
-
C:\Windows\SysWOW64\Jpijnqkp.exeC:\Windows\system32\Jpijnqkp.exe206⤵PID:6616
-
C:\Windows\SysWOW64\Jcefno32.exeC:\Windows\system32\Jcefno32.exe207⤵
- Drops file in System32 directory
PID:6676 -
C:\Windows\SysWOW64\Jefbfgig.exeC:\Windows\system32\Jefbfgig.exe208⤵PID:6740
-
C:\Windows\SysWOW64\Jmmjgejj.exeC:\Windows\system32\Jmmjgejj.exe209⤵PID:6800
-
C:\Windows\SysWOW64\Jlpkba32.exeC:\Windows\system32\Jlpkba32.exe210⤵PID:6872
-
C:\Windows\SysWOW64\Jcgbco32.exeC:\Windows\system32\Jcgbco32.exe211⤵PID:6940
-
C:\Windows\SysWOW64\Jfeopj32.exeC:\Windows\system32\Jfeopj32.exe212⤵PID:7012
-
C:\Windows\SysWOW64\Jlbgha32.exeC:\Windows\system32\Jlbgha32.exe213⤵
- Modifies registry class
PID:7092 -
C:\Windows\SysWOW64\Jblpek32.exeC:\Windows\system32\Jblpek32.exe214⤵PID:7148
-
C:\Windows\SysWOW64\Jeklag32.exeC:\Windows\system32\Jeklag32.exe215⤵PID:6196
-
C:\Windows\SysWOW64\Jmbdbd32.exeC:\Windows\system32\Jmbdbd32.exe216⤵PID:6324
-
C:\Windows\SysWOW64\Jcllonma.exeC:\Windows\system32\Jcllonma.exe217⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6384 -
C:\Windows\SysWOW64\Kfjhkjle.exeC:\Windows\system32\Kfjhkjle.exe218⤵
- Drops file in System32 directory
PID:6528 -
C:\Windows\SysWOW64\Kemhff32.exeC:\Windows\system32\Kemhff32.exe219⤵
- Modifies registry class
PID:6636 -
C:\Windows\SysWOW64\Kpbmco32.exeC:\Windows\system32\Kpbmco32.exe220⤵PID:6772
-
C:\Windows\SysWOW64\Kfmepi32.exeC:\Windows\system32\Kfmepi32.exe221⤵PID:6848
-
C:\Windows\SysWOW64\Kikame32.exeC:\Windows\system32\Kikame32.exe222⤵PID:6976
-
C:\Windows\SysWOW64\Kpeiioac.exeC:\Windows\system32\Kpeiioac.exe223⤵PID:7124
-
C:\Windows\SysWOW64\Kbceejpf.exeC:\Windows\system32\Kbceejpf.exe224⤵PID:6188
-
C:\Windows\SysWOW64\Kebbafoj.exeC:\Windows\system32\Kebbafoj.exe225⤵PID:6460
-
C:\Windows\SysWOW64\Klljnp32.exeC:\Windows\system32\Klljnp32.exe226⤵PID:6600
-
C:\Windows\SysWOW64\Kdcbom32.exeC:\Windows\system32\Kdcbom32.exe227⤵PID:6836
-
C:\Windows\SysWOW64\Kedoge32.exeC:\Windows\system32\Kedoge32.exe228⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6996 -
C:\Windows\SysWOW64\Kmkfhc32.exeC:\Windows\system32\Kmkfhc32.exe229⤵PID:6240
-
C:\Windows\SysWOW64\Klngdpdd.exeC:\Windows\system32\Klngdpdd.exe230⤵PID:6544
-
C:\Windows\SysWOW64\Kfckahdj.exeC:\Windows\system32\Kfckahdj.exe231⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6892 -
C:\Windows\SysWOW64\Kibgmdcn.exeC:\Windows\system32\Kibgmdcn.exe232⤵PID:7120
-
C:\Windows\SysWOW64\Kmncnb32.exeC:\Windows\system32\Kmncnb32.exe233⤵PID:6728
-
C:\Windows\SysWOW64\Kdgljmcd.exeC:\Windows\system32\Kdgljmcd.exe234⤵PID:6732
-
C:\Windows\SysWOW64\Liddbc32.exeC:\Windows\system32\Liddbc32.exe235⤵PID:7080
-
C:\Windows\SysWOW64\Llcpoo32.exeC:\Windows\system32\Llcpoo32.exe236⤵PID:7180
-
C:\Windows\SysWOW64\Ldjhpl32.exeC:\Windows\system32\Ldjhpl32.exe237⤵PID:7220
-
C:\Windows\SysWOW64\Lekehdgp.exeC:\Windows\system32\Lekehdgp.exe238⤵PID:7260
-
C:\Windows\SysWOW64\Lmbmibhb.exeC:\Windows\system32\Lmbmibhb.exe239⤵PID:7296
-
C:\Windows\SysWOW64\Lpqiemge.exeC:\Windows\system32\Lpqiemge.exe240⤵PID:7336
-
C:\Windows\SysWOW64\Lboeaifi.exeC:\Windows\system32\Lboeaifi.exe241⤵PID:7372
-
C:\Windows\SysWOW64\Liimncmf.exeC:\Windows\system32\Liimncmf.exe242⤵PID:7416