Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:40
Behavioral task
behavioral1
Sample
15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe
Resource
win10v2004-20240426-en
General
-
Target
15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe
-
Size
416KB
-
MD5
0bbb81b3ec9ac9f98b466d4766ba4570
-
SHA1
39016d8a43398197fc1becda0a04ab3e1a86dde8
-
SHA256
15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6
-
SHA512
47b3042abdd859bd5f35e945c73345a0190f681d0c0613e3ce1b8f5d34451168cd398e1db7eb8e39753a8b3dd78dade1a92e88aa65482c7181444c76169e2675
-
SSDEEP
12288:hhSSWGHYJ07kE0KoFtw2gu9RxrBIUbPLwH96/I0lOZ0vbqFB:VWGHYJ07kE0KoFtw2gu9RxrBIUbPLwHh
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Hqnapb32.exeAapemc32.exeLjieppcb.exeBqeqqk32.exeCnfqccna.exeEodicd32.exeKdjccf32.exeHnhgha32.exeGlbaei32.exeFamope32.exeAdlcfjgh.exeFhljkm32.exeKgcnahoo.exeBcmfmlen.exeEgikjh32.exeEoiiijcc.exeFeggob32.exeIiqldc32.exeEafkhn32.exeBcgdom32.exeJlelhe32.exeLlomfpag.exeGfhnjm32.exeBefmfpbi.exeDacpkc32.exeDknajh32.exeFcjeon32.exeHihlqeib.exeIbhndp32.exeOjeobm32.exePahogc32.exeNcnngfna.exeIoeclg32.exe15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exeGqcnln32.exeJieaofmp.exeMpgobc32.exeKbpbmkan.exeGagkjbaf.exeOmhhke32.exeLgoboc32.exeIacjjacb.exeIgebkiof.exeEcploipa.exeNlnpgd32.exeCbffoabe.exeKgkleabc.exeIebldo32.exeHiioin32.exeElajgpmj.exeKdhcli32.exeHokhbj32.exeFdpkbf32.exeHgeelf32.exeFeiddbbj.exeJaeafklf.exeLmjnak32.exeGqnbhf32.exeHbiaemkk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hqnapb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aapemc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljieppcb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bqeqqk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnfqccna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eodicd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kdjccf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hnhgha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Glbaei32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aapemc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Famope32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adlcfjgh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhljkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kgcnahoo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcmfmlen.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egikjh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eoiiijcc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Feggob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiqldc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eafkhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bcgdom32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlelhe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llomfpag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gfhnjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Befmfpbi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dacpkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dknajh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fcjeon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hihlqeib.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibhndp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Egikjh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojeobm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pahogc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ncnngfna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ioeclg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gqcnln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jieaofmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mpgobc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kbpbmkan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gagkjbaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Omhhke32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcjeon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lgoboc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iacjjacb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igebkiof.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecploipa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nlnpgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cbffoabe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kgkleabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iebldo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiioin32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgcnahoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jlelhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Elajgpmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kdhcli32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hokhbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fdpkbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hgeelf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Feiddbbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jaeafklf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lmjnak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gqnbhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hbiaemkk.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\Pahogc32.exe family_berbew C:\Windows\SysWOW64\Peoalc32.exe family_berbew C:\Windows\SysWOW64\Oaaifdhb.exe family_berbew C:\Windows\SysWOW64\Qfonkfqd.exe family_berbew C:\Windows\SysWOW64\Ajmfad32.exe family_berbew C:\Windows\SysWOW64\Acekjjmk.exe family_berbew C:\Windows\SysWOW64\Aapemc32.exe family_berbew C:\Windows\SysWOW64\Acqnnndl.exe family_berbew C:\Windows\SysWOW64\Bfccei32.exe family_berbew C:\Windows\SysWOW64\Bcgdom32.exe family_berbew C:\Windows\SysWOW64\Bcjqdmla.exe family_berbew C:\Windows\SysWOW64\Bnhoag32.exe family_berbew C:\Windows\SysWOW64\Bepjha32.exe family_berbew C:\Windows\SysWOW64\Aidphq32.exe family_berbew C:\Windows\SysWOW64\Amnocpdk.exe family_berbew C:\Windows\SysWOW64\Qmgibqjc.exe family_berbew C:\Windows\SysWOW64\Bfkifhib.exe family_berbew C:\Windows\SysWOW64\Pjfpafmb.exe family_berbew C:\Windows\SysWOW64\Dohgomgf.exe family_berbew C:\Windows\SysWOW64\Ejkkfjkj.exe family_berbew C:\Windows\SysWOW64\Ekjgpm32.exe family_berbew C:\Windows\SysWOW64\Elnqmd32.exe family_berbew C:\Windows\SysWOW64\Fchijone.exe family_berbew C:\Windows\SysWOW64\Fjdnlhco.exe family_berbew C:\Windows\SysWOW64\Fcjeon32.exe family_berbew C:\Windows\SysWOW64\Foafdoag.exe family_berbew C:\Windows\SysWOW64\Foccjood.exe family_berbew C:\Windows\SysWOW64\Fnipkkdl.exe family_berbew C:\Windows\SysWOW64\Fdpkbf32.exe family_berbew C:\Windows\SysWOW64\Geeemeif.exe family_berbew C:\Windows\SysWOW64\Gnkmqkbi.exe family_berbew C:\Windows\SysWOW64\Findhdcb.exe family_berbew C:\Windows\SysWOW64\Gjbmelgm.exe family_berbew C:\Windows\SysWOW64\Gcjbna32.exe family_berbew C:\Windows\SysWOW64\Gfhnjm32.exe family_berbew C:\Windows\SysWOW64\Gqnbhf32.exe family_berbew C:\Windows\SysWOW64\Gaqomeke.exe family_berbew C:\Windows\SysWOW64\Fqlicclo.exe family_berbew C:\Windows\SysWOW64\Fjbafi32.exe family_berbew C:\Windows\SysWOW64\Gbdhjm32.exe family_berbew C:\Windows\SysWOW64\Gjicfk32.exe family_berbew C:\Windows\SysWOW64\Hbfepmmn.exe family_berbew C:\Windows\SysWOW64\Hhcmhdke.exe family_berbew C:\Windows\SysWOW64\Hbiaemkk.exe family_berbew C:\Windows\SysWOW64\Egahen32.exe family_berbew C:\Windows\SysWOW64\Hibjbgbh.exe family_berbew C:\Windows\SysWOW64\Hanogipc.exe family_berbew C:\Windows\SysWOW64\Endjaief.exe family_berbew C:\Windows\SysWOW64\Hapklimq.exe family_berbew C:\Windows\SysWOW64\Hjipenda.exe family_berbew C:\Windows\SysWOW64\Ihmpobck.exe family_berbew C:\Windows\SysWOW64\Imleli32.exe family_berbew C:\Windows\SysWOW64\Idcacc32.exe family_berbew C:\Windows\SysWOW64\Eamilh32.exe family_berbew C:\Windows\SysWOW64\Ibhndp32.exe family_berbew C:\Windows\SysWOW64\Ilabmedg.exe family_berbew C:\Windows\SysWOW64\Degiggjm.exe family_berbew C:\Windows\SysWOW64\Domqjm32.exe family_berbew C:\Windows\SysWOW64\Daipqhdg.exe family_berbew C:\Windows\SysWOW64\Ipokcdjn.exe family_berbew C:\Windows\SysWOW64\Jlelhe32.exe family_berbew C:\Windows\SysWOW64\Jbpdeogo.exe family_berbew C:\Windows\SysWOW64\Jhlmmfef.exe family_berbew C:\Windows\SysWOW64\Jaeafklf.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Lopkjhko.exeLfolaang.exeMbhjlbbh.exeMmakmp32.exeMcnpojca.exeMlkail32.exeMedeaaej.exeNefbga32.exeNaopaa32.exeNaalga32.exeNpgihn32.exeOklnff32.exeOnocmadb.exeOifdbb32.exeOaaifdhb.exePeoalc32.exePahogc32.exePjfpafmb.exeQmgibqjc.exeQfonkfqd.exeAjmfad32.exeAcekjjmk.exeAmnocpdk.exeAidphq32.exeAapemc32.exeAcqnnndl.exeBepjha32.exeBnhoag32.exeBfccei32.exeBcgdom32.exeBcjqdmla.exeBfkifhib.exeDohgomgf.exeDaipqhdg.exeDomqjm32.exeDegiggjm.exeEamilh32.exeEndjaief.exeEjkkfjkj.exeEkjgpm32.exeEgahen32.exeElnqmd32.exeFchijone.exeFjbafi32.exeFqlicclo.exeFcjeon32.exeFjdnlhco.exeFoafdoag.exeFoccjood.exeFdpkbf32.exeFnipkkdl.exeFindhdcb.exeGnkmqkbi.exeGeeemeif.exeGjbmelgm.exeGcjbna32.exeGfhnjm32.exeGqnbhf32.exeGaqomeke.exeGjicfk32.exeGbdhjm32.exeHbfepmmn.exeHhcmhdke.exeHbiaemkk.exepid process 2248 Lopkjhko.exe 2608 Lfolaang.exe 2504 Mbhjlbbh.exe 2756 Mmakmp32.exe 2508 Mcnpojca.exe 2904 Mlkail32.exe 576 Medeaaej.exe 1272 Nefbga32.exe 2464 Naopaa32.exe 292 Naalga32.exe 1756 Npgihn32.exe 2320 Oklnff32.exe 2220 Onocmadb.exe 1536 Oifdbb32.exe 2740 Oaaifdhb.exe 792 Peoalc32.exe 1056 Pahogc32.exe 2984 Pjfpafmb.exe 1804 Qmgibqjc.exe 1624 Qfonkfqd.exe 1648 Ajmfad32.exe 2176 Acekjjmk.exe 2116 Amnocpdk.exe 2492 Aidphq32.exe 1932 Aapemc32.exe 2052 Acqnnndl.exe 1584 Bepjha32.exe 2584 Bnhoag32.exe 2660 Bfccei32.exe 2404 Bcgdom32.exe 3040 Bcjqdmla.exe 2836 Bfkifhib.exe 2348 Dohgomgf.exe 572 Daipqhdg.exe 3012 Domqjm32.exe 2848 Degiggjm.exe 2336 Eamilh32.exe 2008 Endjaief.exe 1976 Ejkkfjkj.exe 1524 Ekjgpm32.exe 2776 Egahen32.exe 2200 Elnqmd32.exe 2700 Fchijone.exe 1900 Fjbafi32.exe 340 Fqlicclo.exe 2344 Fcjeon32.exe 1620 Fjdnlhco.exe 828 Foafdoag.exe 2948 Foccjood.exe 2092 Fdpkbf32.exe 2476 Fnipkkdl.exe 2828 Findhdcb.exe 2552 Gnkmqkbi.exe 2556 Geeemeif.exe 2592 Gjbmelgm.exe 2548 Gcjbna32.exe 1512 Gfhnjm32.exe 556 Gqnbhf32.exe 636 Gaqomeke.exe 2732 Gjicfk32.exe 1744 Gbdhjm32.exe 1540 Hbfepmmn.exe 2736 Hhcmhdke.exe 1920 Hbiaemkk.exe -
Loads dropped DLL 64 IoCs
Processes:
15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exeLopkjhko.exeLfolaang.exeMbhjlbbh.exeMmakmp32.exeMcnpojca.exeMlkail32.exeMedeaaej.exeNefbga32.exeNaopaa32.exeNaalga32.exeNpgihn32.exeOklnff32.exeOnocmadb.exeOifdbb32.exeOaaifdhb.exePeoalc32.exePahogc32.exePjfpafmb.exeQmgibqjc.exeQfonkfqd.exeAjmfad32.exeAcekjjmk.exeAmnocpdk.exeAidphq32.exeAapemc32.exeAcqnnndl.exeBepjha32.exeBnhoag32.exeBfccei32.exeBcgdom32.exeBcjqdmla.exepid process 1532 15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe 1532 15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe 2248 Lopkjhko.exe 2248 Lopkjhko.exe 2608 Lfolaang.exe 2608 Lfolaang.exe 2504 Mbhjlbbh.exe 2504 Mbhjlbbh.exe 2756 Mmakmp32.exe 2756 Mmakmp32.exe 2508 Mcnpojca.exe 2508 Mcnpojca.exe 2904 Mlkail32.exe 2904 Mlkail32.exe 576 Medeaaej.exe 576 Medeaaej.exe 1272 Nefbga32.exe 1272 Nefbga32.exe 2464 Naopaa32.exe 2464 Naopaa32.exe 292 Naalga32.exe 292 Naalga32.exe 1756 Npgihn32.exe 1756 Npgihn32.exe 2320 Oklnff32.exe 2320 Oklnff32.exe 2220 Onocmadb.exe 2220 Onocmadb.exe 1536 Oifdbb32.exe 1536 Oifdbb32.exe 2740 Oaaifdhb.exe 2740 Oaaifdhb.exe 792 Peoalc32.exe 792 Peoalc32.exe 1056 Pahogc32.exe 1056 Pahogc32.exe 2984 Pjfpafmb.exe 2984 Pjfpafmb.exe 1804 Qmgibqjc.exe 1804 Qmgibqjc.exe 1624 Qfonkfqd.exe 1624 Qfonkfqd.exe 1648 Ajmfad32.exe 1648 Ajmfad32.exe 2176 Acekjjmk.exe 2176 Acekjjmk.exe 2116 Amnocpdk.exe 2116 Amnocpdk.exe 2492 Aidphq32.exe 2492 Aidphq32.exe 1932 Aapemc32.exe 1932 Aapemc32.exe 2052 Acqnnndl.exe 2052 Acqnnndl.exe 1584 Bepjha32.exe 1584 Bepjha32.exe 2584 Bnhoag32.exe 2584 Bnhoag32.exe 2660 Bfccei32.exe 2660 Bfccei32.exe 2404 Bcgdom32.exe 2404 Bcgdom32.exe 3040 Bcjqdmla.exe 3040 Bcjqdmla.exe -
Drops file in System32 directory 64 IoCs
Processes:
Aapemc32.exeElnqmd32.exeElipgofb.exeKjokokha.exeNihcog32.exeOpialpld.exeBbhccm32.exeOklnff32.exeNeqnqofm.exeHiclkp32.exeGkgoff32.exeJmnqje32.exeLomgjb32.exeEodicd32.exeHinbppna.exeCkpckece.exeFpdkpiik.exeIoeclg32.exeIhpfgalh.exeLgqkbb32.exeOpglafab.exeKlhgfq32.exeKohnoc32.exeEggndi32.exeGdcjpncm.exeDegiggjm.exeGqnbhf32.exeOjomdoof.exePifbjn32.exeDpjbgh32.exeBgghac32.exeHqkmplen.exeHqnjek32.exeMbhjlbbh.exeLjkaeo32.exePejmfqan.exeCebeem32.exeInbnhihl.exeJcnoejch.exeCgcnghpl.exePfbfhm32.exeQfonkfqd.exeBnhoag32.exeFcjeon32.exeKdjccf32.exeNallalep.exeIfdlng32.exeJhlmmfef.exeJbefcm32.exeEoblnd32.exeOnocmadb.exeIbhndp32.exeLjieppcb.exeFeggob32.exeOlpbaa32.exeCmhjdiap.exeImleli32.exeBnnaoe32.exeLjigih32.exeLjfapjbi.exeNnjicjbf.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Acqnnndl.exe Aapemc32.exe File opened for modification C:\Windows\SysWOW64\Fchijone.exe Elnqmd32.exe File opened for modification C:\Windows\SysWOW64\Elkmmodo.exe Elipgofb.exe File created C:\Windows\SysWOW64\Kffldlne.exe Kjokokha.exe File created C:\Windows\SysWOW64\Kioljfll.dll Nihcog32.exe File opened for modification C:\Windows\SysWOW64\Olpbaa32.exe Opialpld.exe File created C:\Windows\SysWOW64\Bbjpil32.exe Bbhccm32.exe File created C:\Windows\SysWOW64\Hkojbh32.dll Oklnff32.exe File created C:\Windows\SysWOW64\Jegime32.dll Neqnqofm.exe File opened for modification C:\Windows\SysWOW64\Hqnapb32.exe Hiclkp32.exe File created C:\Windows\SysWOW64\Hffhec32.dll Gkgoff32.exe File created C:\Windows\SysWOW64\Ekdledbi.dll Jmnqje32.exe File created C:\Windows\SysWOW64\Lqncaj32.exe Lomgjb32.exe File created C:\Windows\SysWOW64\Mifnodlj.dll Eodicd32.exe File created C:\Windows\SysWOW64\Hokhbj32.exe Hinbppna.exe File created C:\Windows\SysWOW64\Jakcpl32.dll Ckpckece.exe File created C:\Windows\SysWOW64\Fimoiopk.exe Fpdkpiik.exe File opened for modification C:\Windows\SysWOW64\Iebldo32.exe Ioeclg32.exe File created C:\Windows\SysWOW64\Ihbcmaje.exe Ihpfgalh.exe File created C:\Windows\SysWOW64\Mjaddn32.exe Lgqkbb32.exe File opened for modification C:\Windows\SysWOW64\Oaghki32.exe Opglafab.exe File created C:\Windows\SysWOW64\Aehlpleg.dll Klhgfq32.exe File created C:\Windows\SysWOW64\Kbgjkn32.exe Kohnoc32.exe File opened for modification C:\Windows\SysWOW64\Eppcmncq.exe Eggndi32.exe File created C:\Windows\SysWOW64\Gagkjbaf.exe Gdcjpncm.exe File created C:\Windows\SysWOW64\Pjgacnjm.dll Degiggjm.exe File created C:\Windows\SysWOW64\Jkcfcend.dll Gqnbhf32.exe File created C:\Windows\SysWOW64\Pqbolhmg.dll Ojomdoof.exe File created C:\Windows\SysWOW64\Peblpbgn.dll Pifbjn32.exe File created C:\Windows\SysWOW64\Eibgpnjk.exe Dpjbgh32.exe File created C:\Windows\SysWOW64\Flkeabdg.dll Bgghac32.exe File opened for modification C:\Windows\SysWOW64\Hgeelf32.exe Hqkmplen.exe File created C:\Windows\SysWOW64\Hiioin32.exe Hqnjek32.exe File created C:\Windows\SysWOW64\Neeoep32.dll Mbhjlbbh.exe File opened for modification C:\Windows\SysWOW64\Lmjnak32.exe Ljkaeo32.exe File created C:\Windows\SysWOW64\Ncocffdb.dll Pejmfqan.exe File created C:\Windows\SysWOW64\Hbocphim.dll Cebeem32.exe File created C:\Windows\SysWOW64\Bbhmhk32.dll Inbnhihl.exe File opened for modification C:\Windows\SysWOW64\Fimoiopk.exe Fpdkpiik.exe File created C:\Windows\SysWOW64\Oiahkhpo.dll Jcnoejch.exe File opened for modification C:\Windows\SysWOW64\Cmpgpond.exe Cgcnghpl.exe File opened for modification C:\Windows\SysWOW64\Akpkmo32.exe Pfbfhm32.exe File created C:\Windows\SysWOW64\Ajmfad32.exe Qfonkfqd.exe File created C:\Windows\SysWOW64\Bmcopp32.dll Bnhoag32.exe File created C:\Windows\SysWOW64\Fjdnlhco.exe Fcjeon32.exe File opened for modification C:\Windows\SysWOW64\Knbhlkkc.exe Kdjccf32.exe File created C:\Windows\SysWOW64\Nfkapb32.exe Nallalep.exe File created C:\Windows\SysWOW64\Jfeflj32.dll Ifdlng32.exe File created C:\Windows\SysWOW64\Iddiakkl.dll Hqkmplen.exe File opened for modification C:\Windows\SysWOW64\Gaqomeke.exe Gqnbhf32.exe File created C:\Windows\SysWOW64\Jaeafklf.exe Jhlmmfef.exe File created C:\Windows\SysWOW64\Pipnmn32.dll Jbefcm32.exe File created C:\Windows\SysWOW64\Cnoegakl.dll Eoblnd32.exe File opened for modification C:\Windows\SysWOW64\Oifdbb32.exe Onocmadb.exe File opened for modification C:\Windows\SysWOW64\Ilabmedg.exe Ibhndp32.exe File opened for modification C:\Windows\SysWOW64\Ldoimh32.exe Ljieppcb.exe File created C:\Windows\SysWOW64\Flapkmlj.exe Feggob32.exe File created C:\Windows\SysWOW64\Oalkih32.exe Olpbaa32.exe File opened for modification C:\Windows\SysWOW64\Cjljnn32.exe Cmhjdiap.exe File created C:\Windows\SysWOW64\Ibhndp32.exe Imleli32.exe File created C:\Windows\SysWOW64\Idgcbbda.dll Bnnaoe32.exe File created C:\Windows\SysWOW64\Bdmpfa32.dll Ljigih32.exe File created C:\Windows\SysWOW64\Locjhqpa.exe Ljfapjbi.exe File created C:\Windows\SysWOW64\Nnleiipc.exe Nnjicjbf.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4828 4804 WerFault.exe Lbjofi32.exe -
Modifies registry class 64 IoCs
Processes:
Hinbppna.exeNihcog32.exeMbhlek32.exeOjomdoof.exeAlihaioe.exeCfmhdpnc.exeFlapkmlj.exeCfeepelg.exeDjgkii32.exeAmnocpdk.exeFdpkbf32.exeHapklimq.exeNfkapb32.exeBnqned32.exeMlkail32.exeKpcqnf32.exeElkmmodo.exeFpbnjjkm.exeHcldhnkk.exePpnnai32.exePifbjn32.exeFhljkm32.exeHokhbj32.exeFcjeon32.exeKhoebi32.exeAdfqgl32.exePiicpk32.exeNaopaa32.exePahogc32.exeFamope32.exeDokfme32.exeJmnqje32.exeOnocmadb.exeNlhjhi32.exePplaki32.exeHeliepmn.exeIacjjacb.exeJieaofmp.exeFkhbgbkc.exeLkjjma32.exeIiqldc32.exeLjnqdhga.exeHnhgha32.exeIbfmmb32.exePeoalc32.exeFoafdoag.exeBnnaoe32.exeAapemc32.exeJgaiobjn.exeCnfqccna.exeGiolnomh.exeIgebkiof.exeIclbpj32.exeBfccei32.exeAndgop32.exeCebeem32.exeGdcjpncm.exeJoggci32.exeJjdofm32.exeAqmamm32.exeDaplkmbg.exeNpgihn32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjdepgcg.dll" Hinbppna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kioljfll.dll" Nihcog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mbhlek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqbolhmg.dll" Ojomdoof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Alihaioe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nefamd32.dll" Cfmhdpnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Flapkmlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cfeepelg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Djgkii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Amnocpdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ildnklen.dll" Fdpkbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hapklimq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imlmlm32.dll" Nfkapb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dklqidif.dll" Bnqned32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mlkail32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kpcqnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Elkmmodo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fpbnjjkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgapeogq.dll" Hcldhnkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eibkmp32.dll" Ppnnai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pifbjn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fhljkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oikbkegk.dll" Hokhbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojbkibad.dll" Fcjeon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Khoebi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Adfqgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Piicpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpfhgcpi.dll" Naopaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pahogc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Famope32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjaiehik.dll" Dokfme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekdledbi.dll" Jmnqje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Onocmadb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jinafidh.dll" Nlhjhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pplaki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Heliepmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iacjjacb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jieaofmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fkhbgbkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lkjjma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iiqldc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ljnqdhga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hnhgha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ibfmmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfhkkdnp.dll" Peoalc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Peoalc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekbkpe32.dll" Foafdoag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bnnaoe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aapemc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndjhkqcb.dll" Jgaiobjn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cnfqccna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Giolnomh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Igebkiof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibnhnc32.dll" Iclbpj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bfccei32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Andgop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cebeem32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gdcjpncm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Capocbbb.dll" Joggci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jjdofm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aqmamm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Daplkmbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iiqldc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qdgpabaa.dll" Npgihn32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exeLopkjhko.exeLfolaang.exeMbhjlbbh.exeMmakmp32.exeMcnpojca.exeMlkail32.exeMedeaaej.exeNefbga32.exeNaopaa32.exeNaalga32.exeNpgihn32.exeOklnff32.exeOnocmadb.exeOifdbb32.exeOaaifdhb.exedescription pid process target process PID 1532 wrote to memory of 2248 1532 15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe Lopkjhko.exe PID 1532 wrote to memory of 2248 1532 15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe Lopkjhko.exe PID 1532 wrote to memory of 2248 1532 15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe Lopkjhko.exe PID 1532 wrote to memory of 2248 1532 15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe Lopkjhko.exe PID 2248 wrote to memory of 2608 2248 Lopkjhko.exe Lfolaang.exe PID 2248 wrote to memory of 2608 2248 Lopkjhko.exe Lfolaang.exe PID 2248 wrote to memory of 2608 2248 Lopkjhko.exe Lfolaang.exe PID 2248 wrote to memory of 2608 2248 Lopkjhko.exe Lfolaang.exe PID 2608 wrote to memory of 2504 2608 Lfolaang.exe Mbhjlbbh.exe PID 2608 wrote to memory of 2504 2608 Lfolaang.exe Mbhjlbbh.exe PID 2608 wrote to memory of 2504 2608 Lfolaang.exe Mbhjlbbh.exe PID 2608 wrote to memory of 2504 2608 Lfolaang.exe Mbhjlbbh.exe PID 2504 wrote to memory of 2756 2504 Mbhjlbbh.exe Mmakmp32.exe PID 2504 wrote to memory of 2756 2504 Mbhjlbbh.exe Mmakmp32.exe PID 2504 wrote to memory of 2756 2504 Mbhjlbbh.exe Mmakmp32.exe PID 2504 wrote to memory of 2756 2504 Mbhjlbbh.exe Mmakmp32.exe PID 2756 wrote to memory of 2508 2756 Mmakmp32.exe Mcnpojca.exe PID 2756 wrote to memory of 2508 2756 Mmakmp32.exe Mcnpojca.exe PID 2756 wrote to memory of 2508 2756 Mmakmp32.exe Mcnpojca.exe PID 2756 wrote to memory of 2508 2756 Mmakmp32.exe Mcnpojca.exe PID 2508 wrote to memory of 2904 2508 Mcnpojca.exe Mlkail32.exe PID 2508 wrote to memory of 2904 2508 Mcnpojca.exe Mlkail32.exe PID 2508 wrote to memory of 2904 2508 Mcnpojca.exe Mlkail32.exe PID 2508 wrote to memory of 2904 2508 Mcnpojca.exe Mlkail32.exe PID 2904 wrote to memory of 576 2904 Mlkail32.exe Medeaaej.exe PID 2904 wrote to memory of 576 2904 Mlkail32.exe Medeaaej.exe PID 2904 wrote to memory of 576 2904 Mlkail32.exe Medeaaej.exe PID 2904 wrote to memory of 576 2904 Mlkail32.exe Medeaaej.exe PID 576 wrote to memory of 1272 576 Medeaaej.exe Nefbga32.exe PID 576 wrote to memory of 1272 576 Medeaaej.exe Nefbga32.exe PID 576 wrote to memory of 1272 576 Medeaaej.exe Nefbga32.exe PID 576 wrote to memory of 1272 576 Medeaaej.exe Nefbga32.exe PID 1272 wrote to memory of 2464 1272 Nefbga32.exe Naopaa32.exe PID 1272 wrote to memory of 2464 1272 Nefbga32.exe Naopaa32.exe PID 1272 wrote to memory of 2464 1272 Nefbga32.exe Naopaa32.exe PID 1272 wrote to memory of 2464 1272 Nefbga32.exe Naopaa32.exe PID 2464 wrote to memory of 292 2464 Naopaa32.exe Naalga32.exe PID 2464 wrote to memory of 292 2464 Naopaa32.exe Naalga32.exe PID 2464 wrote to memory of 292 2464 Naopaa32.exe Naalga32.exe PID 2464 wrote to memory of 292 2464 Naopaa32.exe Naalga32.exe PID 292 wrote to memory of 1756 292 Naalga32.exe Npgihn32.exe PID 292 wrote to memory of 1756 292 Naalga32.exe Npgihn32.exe PID 292 wrote to memory of 1756 292 Naalga32.exe Npgihn32.exe PID 292 wrote to memory of 1756 292 Naalga32.exe Npgihn32.exe PID 1756 wrote to memory of 2320 1756 Npgihn32.exe Oklnff32.exe PID 1756 wrote to memory of 2320 1756 Npgihn32.exe Oklnff32.exe PID 1756 wrote to memory of 2320 1756 Npgihn32.exe Oklnff32.exe PID 1756 wrote to memory of 2320 1756 Npgihn32.exe Oklnff32.exe PID 2320 wrote to memory of 2220 2320 Oklnff32.exe Onocmadb.exe PID 2320 wrote to memory of 2220 2320 Oklnff32.exe Onocmadb.exe PID 2320 wrote to memory of 2220 2320 Oklnff32.exe Onocmadb.exe PID 2320 wrote to memory of 2220 2320 Oklnff32.exe Onocmadb.exe PID 2220 wrote to memory of 1536 2220 Onocmadb.exe Oifdbb32.exe PID 2220 wrote to memory of 1536 2220 Onocmadb.exe Oifdbb32.exe PID 2220 wrote to memory of 1536 2220 Onocmadb.exe Oifdbb32.exe PID 2220 wrote to memory of 1536 2220 Onocmadb.exe Oifdbb32.exe PID 1536 wrote to memory of 2740 1536 Oifdbb32.exe Oaaifdhb.exe PID 1536 wrote to memory of 2740 1536 Oifdbb32.exe Oaaifdhb.exe PID 1536 wrote to memory of 2740 1536 Oifdbb32.exe Oaaifdhb.exe PID 1536 wrote to memory of 2740 1536 Oifdbb32.exe Oaaifdhb.exe PID 2740 wrote to memory of 792 2740 Oaaifdhb.exe Peoalc32.exe PID 2740 wrote to memory of 792 2740 Oaaifdhb.exe Peoalc32.exe PID 2740 wrote to memory of 792 2740 Oaaifdhb.exe Peoalc32.exe PID 2740 wrote to memory of 792 2740 Oaaifdhb.exe Peoalc32.exe
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe"C:\Users\Admin\AppData\Local\Temp\15a4ddb02a88523cfbb345cc386bbfdd85a6452fa46eefa942a58011a7df6ed6.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\Lopkjhko.exeC:\Windows\system32\Lopkjhko.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\Lfolaang.exeC:\Windows\system32\Lfolaang.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\Mbhjlbbh.exeC:\Windows\system32\Mbhjlbbh.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\Mmakmp32.exeC:\Windows\system32\Mmakmp32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\Mcnpojca.exeC:\Windows\system32\Mcnpojca.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Mlkail32.exeC:\Windows\system32\Mlkail32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Medeaaej.exeC:\Windows\system32\Medeaaej.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\Nefbga32.exeC:\Windows\system32\Nefbga32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\Naopaa32.exeC:\Windows\system32\Naopaa32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\Naalga32.exeC:\Windows\system32\Naalga32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\SysWOW64\Npgihn32.exeC:\Windows\system32\Npgihn32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\Oklnff32.exeC:\Windows\system32\Oklnff32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Onocmadb.exeC:\Windows\system32\Onocmadb.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\Oifdbb32.exeC:\Windows\system32\Oifdbb32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\Oaaifdhb.exeC:\Windows\system32\Oaaifdhb.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Peoalc32.exeC:\Windows\system32\Peoalc32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:792 -
C:\Windows\SysWOW64\Pahogc32.exeC:\Windows\system32\Pahogc32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Pjfpafmb.exeC:\Windows\system32\Pjfpafmb.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984 -
C:\Windows\SysWOW64\Qmgibqjc.exeC:\Windows\system32\Qmgibqjc.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Windows\SysWOW64\Qfonkfqd.exeC:\Windows\system32\Qfonkfqd.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\Ajmfad32.exeC:\Windows\system32\Ajmfad32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1648 -
C:\Windows\SysWOW64\Acekjjmk.exeC:\Windows\system32\Acekjjmk.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2176 -
C:\Windows\SysWOW64\Amnocpdk.exeC:\Windows\system32\Amnocpdk.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Aidphq32.exeC:\Windows\system32\Aidphq32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2492 -
C:\Windows\SysWOW64\Aapemc32.exeC:\Windows\system32\Aapemc32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1932 -
C:\Windows\SysWOW64\Acqnnndl.exeC:\Windows\system32\Acqnnndl.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2052 -
C:\Windows\SysWOW64\Bepjha32.exeC:\Windows\system32\Bepjha32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584 -
C:\Windows\SysWOW64\Bnhoag32.exeC:\Windows\system32\Bnhoag32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\Bfccei32.exeC:\Windows\system32\Bfccei32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\Bcgdom32.exeC:\Windows\system32\Bcgdom32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2404 -
C:\Windows\SysWOW64\Bcjqdmla.exeC:\Windows\system32\Bcjqdmla.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3040 -
C:\Windows\SysWOW64\Bfkifhib.exeC:\Windows\system32\Bfkifhib.exe33⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Dohgomgf.exeC:\Windows\system32\Dohgomgf.exe34⤵
- Executes dropped EXE
PID:2348 -
C:\Windows\SysWOW64\Daipqhdg.exeC:\Windows\system32\Daipqhdg.exe35⤵
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\Domqjm32.exeC:\Windows\system32\Domqjm32.exe36⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\Degiggjm.exeC:\Windows\system32\Degiggjm.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Eamilh32.exeC:\Windows\system32\Eamilh32.exe38⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\Endjaief.exeC:\Windows\system32\Endjaief.exe39⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\Ejkkfjkj.exeC:\Windows\system32\Ejkkfjkj.exe40⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\Ekjgpm32.exeC:\Windows\system32\Ekjgpm32.exe41⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\SysWOW64\Egahen32.exeC:\Windows\system32\Egahen32.exe42⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\Elnqmd32.exeC:\Windows\system32\Elnqmd32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\Fchijone.exeC:\Windows\system32\Fchijone.exe44⤵
- Executes dropped EXE
PID:2700 -
C:\Windows\SysWOW64\Fjbafi32.exeC:\Windows\system32\Fjbafi32.exe45⤵
- Executes dropped EXE
PID:1900 -
C:\Windows\SysWOW64\Fqlicclo.exeC:\Windows\system32\Fqlicclo.exe46⤵
- Executes dropped EXE
PID:340 -
C:\Windows\SysWOW64\Fcjeon32.exeC:\Windows\system32\Fcjeon32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\Fjdnlhco.exeC:\Windows\system32\Fjdnlhco.exe48⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Foafdoag.exeC:\Windows\system32\Foafdoag.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:828 -
C:\Windows\SysWOW64\Foccjood.exeC:\Windows\system32\Foccjood.exe50⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\Fdpkbf32.exeC:\Windows\system32\Fdpkbf32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2092 -
C:\Windows\SysWOW64\Fnipkkdl.exeC:\Windows\system32\Fnipkkdl.exe52⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\SysWOW64\Findhdcb.exeC:\Windows\system32\Findhdcb.exe53⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Gnkmqkbi.exeC:\Windows\system32\Gnkmqkbi.exe54⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\Geeemeif.exeC:\Windows\system32\Geeemeif.exe55⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\Gjbmelgm.exeC:\Windows\system32\Gjbmelgm.exe56⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\Gcjbna32.exeC:\Windows\system32\Gcjbna32.exe57⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Gfhnjm32.exeC:\Windows\system32\Gfhnjm32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1512 -
C:\Windows\SysWOW64\Gqnbhf32.exeC:\Windows\system32\Gqnbhf32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\Gaqomeke.exeC:\Windows\system32\Gaqomeke.exe60⤵
- Executes dropped EXE
PID:636 -
C:\Windows\SysWOW64\Gjicfk32.exeC:\Windows\system32\Gjicfk32.exe61⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\Gbdhjm32.exeC:\Windows\system32\Gbdhjm32.exe62⤵
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\Hbfepmmn.exeC:\Windows\system32\Hbfepmmn.exe63⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\Hhcmhdke.exeC:\Windows\system32\Hhcmhdke.exe64⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\Hbiaemkk.exeC:\Windows\system32\Hbiaemkk.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\Hibjbgbh.exeC:\Windows\system32\Hibjbgbh.exe66⤵PID:3060
-
C:\Windows\SysWOW64\Hanogipc.exeC:\Windows\system32\Hanogipc.exe67⤵PID:1784
-
C:\Windows\SysWOW64\Hapklimq.exeC:\Windows\system32\Hapklimq.exe68⤵
- Modifies registry class
PID:2136 -
C:\Windows\SysWOW64\Hjipenda.exeC:\Windows\system32\Hjipenda.exe69⤵PID:2264
-
C:\Windows\SysWOW64\Ihmpobck.exeC:\Windows\system32\Ihmpobck.exe70⤵PID:2708
-
C:\Windows\SysWOW64\Idcacc32.exeC:\Windows\system32\Idcacc32.exe71⤵PID:2796
-
C:\Windows\SysWOW64\Imleli32.exeC:\Windows\system32\Imleli32.exe72⤵
- Drops file in System32 directory
PID:1212 -
C:\Windows\SysWOW64\Ibhndp32.exeC:\Windows\system32\Ibhndp32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2668 -
C:\Windows\SysWOW64\Ilabmedg.exeC:\Windows\system32\Ilabmedg.exe74⤵PID:2900
-
C:\Windows\SysWOW64\Ipokcdjn.exeC:\Windows\system32\Ipokcdjn.exe75⤵PID:2400
-
C:\Windows\SysWOW64\Jlelhe32.exeC:\Windows\system32\Jlelhe32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1096 -
C:\Windows\SysWOW64\Jbpdeogo.exeC:\Windows\system32\Jbpdeogo.exe77⤵PID:1484
-
C:\Windows\SysWOW64\Jhlmmfef.exeC:\Windows\system32\Jhlmmfef.exe78⤵
- Drops file in System32 directory
PID:1888 -
C:\Windows\SysWOW64\Jaeafklf.exeC:\Windows\system32\Jaeafklf.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2228 -
C:\Windows\SysWOW64\Jgaiobjn.exeC:\Windows\system32\Jgaiobjn.exe80⤵
- Modifies registry class
PID:2460 -
C:\Windows\SysWOW64\Joiappkp.exeC:\Windows\system32\Joiappkp.exe81⤵PID:2316
-
C:\Windows\SysWOW64\Jgdfdbhk.exeC:\Windows\system32\Jgdfdbhk.exe82⤵PID:2760
-
C:\Windows\SysWOW64\Jjbbpmgo.exeC:\Windows\system32\Jjbbpmgo.exe83⤵PID:2976
-
C:\Windows\SysWOW64\Jjdofm32.exeC:\Windows\system32\Jjdofm32.exe84⤵
- Modifies registry class
PID:2268 -
C:\Windows\SysWOW64\Kdjccf32.exeC:\Windows\system32\Kdjccf32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\Knbhlkkc.exeC:\Windows\system32\Knbhlkkc.exe86⤵PID:2016
-
C:\Windows\SysWOW64\Kgkleabc.exeC:\Windows\system32\Kgkleabc.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1428 -
C:\Windows\SysWOW64\Kpcqnf32.exeC:\Windows\system32\Kpcqnf32.exe88⤵
- Modifies registry class
PID:1820 -
C:\Windows\SysWOW64\Khoebi32.exeC:\Windows\system32\Khoebi32.exe89⤵
- Modifies registry class
PID:2408 -
C:\Windows\SysWOW64\Kohnoc32.exeC:\Windows\system32\Kohnoc32.exe90⤵
- Drops file in System32 directory
PID:2764 -
C:\Windows\SysWOW64\Kbgjkn32.exeC:\Windows\system32\Kbgjkn32.exe91⤵PID:2684
-
C:\Windows\SysWOW64\Khabghdl.exeC:\Windows\system32\Khabghdl.exe92⤵PID:2168
-
C:\Windows\SysWOW64\Knnkpobc.exeC:\Windows\system32\Knnkpobc.exe93⤵PID:2612
-
C:\Windows\SysWOW64\Kdhcli32.exeC:\Windows\system32\Kdhcli32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2532 -
C:\Windows\SysWOW64\Lomgjb32.exeC:\Windows\system32\Lomgjb32.exe95⤵
- Drops file in System32 directory
PID:2712 -
C:\Windows\SysWOW64\Lqncaj32.exeC:\Windows\system32\Lqncaj32.exe96⤵PID:2108
-
C:\Windows\SysWOW64\Lbnpkmfg.exeC:\Windows\system32\Lbnpkmfg.exe97⤵PID:1016
-
C:\Windows\SysWOW64\Ljieppcb.exeC:\Windows\system32\Ljieppcb.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2640 -
C:\Windows\SysWOW64\Ldoimh32.exeC:\Windows\system32\Ldoimh32.exe99⤵PID:1712
-
C:\Windows\SysWOW64\Ljkaeo32.exeC:\Windows\system32\Ljkaeo32.exe100⤵
- Drops file in System32 directory
PID:2688 -
C:\Windows\SysWOW64\Lmjnak32.exeC:\Windows\system32\Lmjnak32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1672 -
C:\Windows\SysWOW64\Lgoboc32.exeC:\Windows\system32\Lgoboc32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1060 -
C:\Windows\SysWOW64\Mngjeamd.exeC:\Windows\system32\Mngjeamd.exe103⤵PID:1644
-
C:\Windows\SysWOW64\Ndhlhg32.exeC:\Windows\system32\Ndhlhg32.exe104⤵PID:2260
-
C:\Windows\SysWOW64\Nallalep.exeC:\Windows\system32\Nallalep.exe105⤵
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\Nfkapb32.exeC:\Windows\system32\Nfkapb32.exe106⤵
- Modifies registry class
PID:1012 -
C:\Windows\SysWOW64\Nlhjhi32.exeC:\Windows\system32\Nlhjhi32.exe107⤵
- Modifies registry class
PID:2020 -
C:\Windows\SysWOW64\Neqnqofm.exeC:\Windows\system32\Neqnqofm.exe108⤵
- Drops file in System32 directory
PID:2488 -
C:\Windows\SysWOW64\Opfbngfb.exeC:\Windows\system32\Opfbngfb.exe109⤵PID:2896
-
C:\Windows\SysWOW64\Oagoep32.exeC:\Windows\system32\Oagoep32.exe110⤵PID:2852
-
C:\Windows\SysWOW64\Olmcchlg.exeC:\Windows\system32\Olmcchlg.exe111⤵PID:1908
-
C:\Windows\SysWOW64\Okbpde32.exeC:\Windows\system32\Okbpde32.exe112⤵PID:2324
-
C:\Windows\SysWOW64\Oehdan32.exeC:\Windows\system32\Oehdan32.exe113⤵PID:1572
-
C:\Windows\SysWOW64\Oanefo32.exeC:\Windows\system32\Oanefo32.exe114⤵PID:2496
-
C:\Windows\SysWOW64\Ogknoe32.exeC:\Windows\system32\Ogknoe32.exe115⤵PID:2816
-
C:\Windows\SysWOW64\Pgnjde32.exeC:\Windows\system32\Pgnjde32.exe116⤵PID:700
-
C:\Windows\SysWOW64\Ppfomk32.exeC:\Windows\system32\Ppfomk32.exe117⤵PID:2076
-
C:\Windows\SysWOW64\Pincfpoo.exeC:\Windows\system32\Pincfpoo.exe118⤵PID:2720
-
C:\Windows\SysWOW64\Pgbdodnh.exeC:\Windows\system32\Pgbdodnh.exe119⤵PID:1000
-
C:\Windows\SysWOW64\Pomhcg32.exeC:\Windows\system32\Pomhcg32.exe120⤵PID:2432
-
C:\Windows\SysWOW64\Plaimk32.exeC:\Windows\system32\Plaimk32.exe121⤵PID:2872
-
C:\Windows\SysWOW64\Pejmfqan.exeC:\Windows\system32\Pejmfqan.exe122⤵
- Drops file in System32 directory
PID:1708 -
C:\Windows\SysWOW64\Qkffng32.exeC:\Windows\system32\Qkffng32.exe123⤵PID:1480
-
C:\Windows\SysWOW64\Qhjfgl32.exeC:\Windows\system32\Qhjfgl32.exe124⤵PID:868
-
C:\Windows\SysWOW64\Qhmcmk32.exeC:\Windows\system32\Qhmcmk32.exe125⤵PID:3048
-
C:\Windows\SysWOW64\Anjlebjc.exeC:\Windows\system32\Anjlebjc.exe126⤵PID:2312
-
C:\Windows\SysWOW64\Aknlofim.exeC:\Windows\system32\Aknlofim.exe127⤵PID:824
-
C:\Windows\SysWOW64\Adfqgl32.exeC:\Windows\system32\Adfqgl32.exe128⤵
- Modifies registry class
PID:400 -
C:\Windows\SysWOW64\Aqmamm32.exeC:\Windows\system32\Aqmamm32.exe129⤵
- Modifies registry class
PID:976 -
C:\Windows\SysWOW64\Aobnniji.exeC:\Windows\system32\Aobnniji.exe130⤵PID:2964
-
C:\Windows\SysWOW64\Aijbfo32.exeC:\Windows\system32\Aijbfo32.exe131⤵PID:1020
-
C:\Windows\SysWOW64\Bbbgod32.exeC:\Windows\system32\Bbbgod32.exe132⤵PID:2820
-
C:\Windows\SysWOW64\Bbeded32.exeC:\Windows\system32\Bbeded32.exe133⤵PID:2528
-
C:\Windows\SysWOW64\Befmfpbi.exeC:\Windows\system32\Befmfpbi.exe134⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2724 -
C:\Windows\SysWOW64\Bnnaoe32.exeC:\Windows\system32\Bnnaoe32.exe135⤵
- Drops file in System32 directory
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\Bnqned32.exeC:\Windows\system32\Bnqned32.exe136⤵
- Modifies registry class
PID:2924 -
C:\Windows\SysWOW64\Bcmfmlen.exeC:\Windows\system32\Bcmfmlen.exe137⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2188 -
C:\Windows\SysWOW64\Caaggpdh.exeC:\Windows\system32\Caaggpdh.exe138⤵PID:2928
-
C:\Windows\SysWOW64\Cacclpae.exeC:\Windows\system32\Cacclpae.exe139⤵PID:2696
-
C:\Windows\SysWOW64\Cfpldf32.exeC:\Windows\system32\Cfpldf32.exe140⤵PID:808
-
C:\Windows\SysWOW64\Cpiqmlfm.exeC:\Windows\system32\Cpiqmlfm.exe141⤵PID:2256
-
C:\Windows\SysWOW64\Cfeepelg.exeC:\Windows\system32\Cfeepelg.exe142⤵
- Modifies registry class
PID:2084 -
C:\Windows\SysWOW64\Dejbqb32.exeC:\Windows\system32\Dejbqb32.exe143⤵PID:2276
-
C:\Windows\SysWOW64\Djgkii32.exeC:\Windows\system32\Djgkii32.exe144⤵
- Modifies registry class
PID:2564 -
C:\Windows\SysWOW64\Demofaol.exeC:\Windows\system32\Demofaol.exe145⤵PID:1368
-
C:\Windows\SysWOW64\Dacpkc32.exeC:\Windows\system32\Dacpkc32.exe146⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2728 -
C:\Windows\SysWOW64\Dhmhhmlm.exeC:\Windows\system32\Dhmhhmlm.exe147⤵PID:1692
-
C:\Windows\SysWOW64\Dafmqb32.exeC:\Windows\system32\Dafmqb32.exe148⤵PID:1652
-
C:\Windows\SysWOW64\Dknajh32.exeC:\Windows\system32\Dknajh32.exe149⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2856 -
C:\Windows\SysWOW64\Dpkibo32.exeC:\Windows\system32\Dpkibo32.exe150⤵PID:1608
-
C:\Windows\SysWOW64\Elajgpmj.exeC:\Windows\system32\Elajgpmj.exe151⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2120 -
C:\Windows\SysWOW64\Eggndi32.exeC:\Windows\system32\Eggndi32.exe152⤵
- Drops file in System32 directory
PID:2236 -
C:\Windows\SysWOW64\Eppcmncq.exeC:\Windows\system32\Eppcmncq.exe153⤵PID:2004
-
C:\Windows\SysWOW64\Egikjh32.exeC:\Windows\system32\Egikjh32.exe154⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2780 -
C:\Windows\SysWOW64\Elfcbo32.exeC:\Windows\system32\Elfcbo32.exe155⤵PID:2192
-
C:\Windows\SysWOW64\Ecploipa.exeC:\Windows\system32\Ecploipa.exe156⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2140 -
C:\Windows\SysWOW64\Elipgofb.exeC:\Windows\system32\Elipgofb.exe157⤵
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\Elkmmodo.exeC:\Windows\system32\Elkmmodo.exe158⤵
- Modifies registry class
PID:780 -
C:\Windows\SysWOW64\Eoiiijcc.exeC:\Windows\system32\Eoiiijcc.exe159⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1592 -
C:\Windows\SysWOW64\Edfbaabj.exeC:\Windows\system32\Edfbaabj.exe160⤵PID:2216
-
C:\Windows\SysWOW64\Fajbke32.exeC:\Windows\system32\Fajbke32.exe161⤵PID:756
-
C:\Windows\SysWOW64\Famope32.exeC:\Windows\system32\Famope32.exe162⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2952 -
C:\Windows\SysWOW64\Fdkklp32.exeC:\Windows\system32\Fdkklp32.exe163⤵PID:2252
-
C:\Windows\SysWOW64\Fdmhbplb.exeC:\Windows\system32\Fdmhbplb.exe164⤵PID:1412
-
C:\Windows\SysWOW64\Gdkgkcpq.exeC:\Windows\system32\Gdkgkcpq.exe165⤵PID:1780
-
C:\Windows\SysWOW64\Gncldi32.exeC:\Windows\system32\Gncldi32.exe166⤵PID:2392
-
C:\Windows\SysWOW64\Gjjmijme.exeC:\Windows\system32\Gjjmijme.exe167⤵PID:2372
-
C:\Windows\SysWOW64\Hmkeke32.exeC:\Windows\system32\Hmkeke32.exe168⤵PID:1588
-
C:\Windows\SysWOW64\Hmmbqegc.exeC:\Windows\system32\Hmmbqegc.exe169⤵PID:932
-
C:\Windows\SysWOW64\Hakkgc32.exeC:\Windows\system32\Hakkgc32.exe170⤵PID:1340
-
C:\Windows\SysWOW64\Hcldhnkk.exeC:\Windows\system32\Hcldhnkk.exe171⤵
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Hihlqeib.exeC:\Windows\system32\Hihlqeib.exe172⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2624 -
C:\Windows\SysWOW64\Iliebpfc.exeC:\Windows\system32\Iliebpfc.exe173⤵PID:2240
-
C:\Windows\SysWOW64\Ihpfgalh.exeC:\Windows\system32\Ihpfgalh.exe174⤵
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\Ihbcmaje.exeC:\Windows\system32\Ihbcmaje.exe175⤵PID:1916
-
C:\Windows\SysWOW64\Iakgefqe.exeC:\Windows\system32\Iakgefqe.exe176⤵PID:2940
-
C:\Windows\SysWOW64\Ifgpnmom.exeC:\Windows\system32\Ifgpnmom.exe177⤵PID:1444
-
C:\Windows\SysWOW64\Idkpganf.exeC:\Windows\system32\Idkpganf.exe178⤵PID:2540
-
C:\Windows\SysWOW64\Jbqmhnbo.exeC:\Windows\system32\Jbqmhnbo.exe179⤵PID:1884
-
C:\Windows\SysWOW64\Jdpjba32.exeC:\Windows\system32\Jdpjba32.exe180⤵PID:2888
-
C:\Windows\SysWOW64\Jbefcm32.exeC:\Windows\system32\Jbefcm32.exe181⤵
- Drops file in System32 directory
PID:1968 -
C:\Windows\SysWOW64\Jlnklcej.exeC:\Windows\system32\Jlnklcej.exe182⤵PID:2648
-
C:\Windows\SysWOW64\Jefpeh32.exeC:\Windows\system32\Jefpeh32.exe183⤵PID:1560
-
C:\Windows\SysWOW64\Jehlkhig.exeC:\Windows\system32\Jehlkhig.exe184⤵PID:436
-
C:\Windows\SysWOW64\Kncaojfb.exeC:\Windows\system32\Kncaojfb.exe185⤵PID:2972
-
C:\Windows\SysWOW64\Kglehp32.exeC:\Windows\system32\Kglehp32.exe186⤵PID:2080
-
C:\Windows\SysWOW64\Kgnbnpkp.exeC:\Windows\system32\Kgnbnpkp.exe187⤵PID:2656
-
C:\Windows\SysWOW64\Knhjjj32.exeC:\Windows\system32\Knhjjj32.exe188⤵PID:840
-
C:\Windows\SysWOW64\Kjokokha.exeC:\Windows\system32\Kjokokha.exe189⤵
- Drops file in System32 directory
PID:3004 -
C:\Windows\SysWOW64\Kffldlne.exeC:\Windows\system32\Kffldlne.exe190⤵PID:2468
-
C:\Windows\SysWOW64\Lonpma32.exeC:\Windows\system32\Lonpma32.exe191⤵PID:1196
-
C:\Windows\SysWOW64\Llbqfe32.exeC:\Windows\system32\Llbqfe32.exe192⤵PID:1812
-
C:\Windows\SysWOW64\Ljfapjbi.exeC:\Windows\system32\Ljfapjbi.exe193⤵
- Drops file in System32 directory
PID:1816 -
C:\Windows\SysWOW64\Locjhqpa.exeC:\Windows\system32\Locjhqpa.exe194⤵PID:2280
-
C:\Windows\SysWOW64\Lhknaf32.exeC:\Windows\system32\Lhknaf32.exe195⤵PID:2568
-
C:\Windows\SysWOW64\Lkjjma32.exeC:\Windows\system32\Lkjjma32.exe196⤵
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\Lgqkbb32.exeC:\Windows\system32\Lgqkbb32.exe197⤵
- Drops file in System32 directory
PID:2884 -
C:\Windows\SysWOW64\Mjaddn32.exeC:\Windows\system32\Mjaddn32.exe198⤵PID:2156
-
C:\Windows\SysWOW64\Mbhlek32.exeC:\Windows\system32\Mbhlek32.exe199⤵
- Modifies registry class
PID:1768 -
C:\Windows\SysWOW64\Mmbmeifk.exeC:\Windows\system32\Mmbmeifk.exe200⤵PID:1492
-
C:\Windows\SysWOW64\Mjfnomde.exeC:\Windows\system32\Mjfnomde.exe201⤵PID:3104
-
C:\Windows\SysWOW64\Mmdjkhdh.exeC:\Windows\system32\Mmdjkhdh.exe202⤵PID:3144
-
C:\Windows\SysWOW64\Mjhjdm32.exeC:\Windows\system32\Mjhjdm32.exe203⤵PID:3184
-
C:\Windows\SysWOW64\Mpgobc32.exeC:\Windows\system32\Mpgobc32.exe204⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3224 -
C:\Windows\SysWOW64\Nlnpgd32.exeC:\Windows\system32\Nlnpgd32.exe205⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3264 -
C:\Windows\SysWOW64\Nibqqh32.exeC:\Windows\system32\Nibqqh32.exe206⤵PID:3304
-
C:\Windows\SysWOW64\Njfjnpgp.exeC:\Windows\system32\Njfjnpgp.exe207⤵PID:3344
-
C:\Windows\SysWOW64\Ncnngfna.exeC:\Windows\system32\Ncnngfna.exe208⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3384 -
C:\Windows\SysWOW64\Nenkqi32.exeC:\Windows\system32\Nenkqi32.exe209⤵PID:3428
-
C:\Windows\SysWOW64\Opglafab.exeC:\Windows\system32\Opglafab.exe210⤵
- Drops file in System32 directory
PID:3468 -
C:\Windows\SysWOW64\Oaghki32.exeC:\Windows\system32\Oaghki32.exe211⤵PID:3508
-
C:\Windows\SysWOW64\Ojomdoof.exeC:\Windows\system32\Ojomdoof.exe212⤵
- Drops file in System32 directory
- Modifies registry class
PID:3548 -
C:\Windows\SysWOW64\Oidiekdn.exeC:\Windows\system32\Oidiekdn.exe213⤵PID:3588
-
C:\Windows\SysWOW64\Piicpk32.exeC:\Windows\system32\Piicpk32.exe214⤵
- Modifies registry class
PID:3628 -
C:\Windows\SysWOW64\Pkmlmbcd.exeC:\Windows\system32\Pkmlmbcd.exe215⤵PID:3668
-
C:\Windows\SysWOW64\Pdeqfhjd.exeC:\Windows\system32\Pdeqfhjd.exe216⤵PID:3708
-
C:\Windows\SysWOW64\Pplaki32.exeC:\Windows\system32\Pplaki32.exe217⤵
- Modifies registry class
PID:3748 -
C:\Windows\SysWOW64\Phcilf32.exeC:\Windows\system32\Phcilf32.exe218⤵PID:3788
-
C:\Windows\SysWOW64\Ppnnai32.exeC:\Windows\system32\Ppnnai32.exe219⤵
- Modifies registry class
PID:3828 -
C:\Windows\SysWOW64\Pifbjn32.exeC:\Windows\system32\Pifbjn32.exe220⤵
- Drops file in System32 directory
- Modifies registry class
PID:3872 -
C:\Windows\SysWOW64\Qcogbdkg.exeC:\Windows\system32\Qcogbdkg.exe221⤵PID:3912
-
C:\Windows\SysWOW64\Qndkpmkm.exeC:\Windows\system32\Qndkpmkm.exe222⤵PID:3952
-
C:\Windows\SysWOW64\Qjklenpa.exeC:\Windows\system32\Qjklenpa.exe223⤵PID:3992
-
C:\Windows\SysWOW64\Alihaioe.exeC:\Windows\system32\Alihaioe.exe224⤵
- Modifies registry class
PID:4032 -
C:\Windows\SysWOW64\Ahpifj32.exeC:\Windows\system32\Ahpifj32.exe225⤵PID:4072
-
C:\Windows\SysWOW64\Aojabdlf.exeC:\Windows\system32\Aojabdlf.exe226⤵PID:3080
-
C:\Windows\SysWOW64\Aomnhd32.exeC:\Windows\system32\Aomnhd32.exe227⤵PID:3076
-
C:\Windows\SysWOW64\Ahebaiac.exeC:\Windows\system32\Ahebaiac.exe228⤵PID:3172
-
C:\Windows\SysWOW64\Adlcfjgh.exeC:\Windows\system32\Adlcfjgh.exe229⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3232 -
C:\Windows\SysWOW64\Andgop32.exeC:\Windows\system32\Andgop32.exe230⤵
- Modifies registry class
PID:3272 -
C:\Windows\SysWOW64\Bqeqqk32.exeC:\Windows\system32\Bqeqqk32.exe231⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3324 -
C:\Windows\SysWOW64\Bjmeiq32.exeC:\Windows\system32\Bjmeiq32.exe232⤵PID:3368
-
C:\Windows\SysWOW64\Boljgg32.exeC:\Windows\system32\Boljgg32.exe233⤵PID:3420
-
C:\Windows\SysWOW64\Bjbndpmd.exeC:\Windows\system32\Bjbndpmd.exe234⤵PID:3488
-
C:\Windows\SysWOW64\Bjdkjpkb.exeC:\Windows\system32\Bjdkjpkb.exe235⤵PID:3532
-
C:\Windows\SysWOW64\Ccmpce32.exeC:\Windows\system32\Ccmpce32.exe236⤵PID:3576
-
C:\Windows\SysWOW64\Cnfqccna.exeC:\Windows\system32\Cnfqccna.exe237⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3636 -
C:\Windows\SysWOW64\Cfmhdpnc.exeC:\Windows\system32\Cfmhdpnc.exe238⤵
- Modifies registry class
PID:3684 -
C:\Windows\SysWOW64\Cpfmmf32.exeC:\Windows\system32\Cpfmmf32.exe239⤵PID:3680
-
C:\Windows\SysWOW64\Cebeem32.exeC:\Windows\system32\Cebeem32.exe240⤵
- Drops file in System32 directory
- Modifies registry class
PID:3796 -
C:\Windows\SysWOW64\Cbffoabe.exeC:\Windows\system32\Cbffoabe.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3860 -
C:\Windows\SysWOW64\Cgcnghpl.exeC:\Windows\system32\Cgcnghpl.exe242⤵
- Drops file in System32 directory
PID:3920