Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exe
Resource
win10v2004-20240508-en
General
-
Target
f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exe
-
Size
100KB
-
MD5
4172e82dfc35ef8b03b5ca9dae9ab9ff
-
SHA1
11a041b9f87058a916a2727ee23fc481cd512e8e
-
SHA256
f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca
-
SHA512
e3c996edb481142c6dd3e4dd26991bfb252632adfef9b43ed7cb068a37dc7d816d98689f11a739109c042885053c6f5cfdd28d407f4bcaa12b111dde038f2b5b
-
SSDEEP
3072:+JbEY9V/BnNDqqbDvjRVKLSJgb3a3+X13XRzT:+xEYLBND9vv1kLS27aOl3BzT
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Mggabaea.exeNbpghl32.exeHajfgnjc.exeImmjnj32.exeIipejmko.exeNhepoaif.exeOgliemkk.exeBphooc32.exeEbknblho.exeNddcimag.exeNnmlcp32.exeJfdhmk32.exeKcmdjgbh.exeOnldqejb.exeCpbkhabp.exeEhpalp32.exeNfahomfd.exeFkkfgi32.exeKdbepm32.exeEelgcg32.exeEaednh32.exeOepjoa32.exeKngekdnf.exeOhcdhi32.exeGqdefddb.exeHakkgc32.exeDpjbgh32.exeLmcilp32.exeNjnokdaq.exeBhbmip32.exeFjjpjgjj.exeEmdmjamj.exeJdcpkp32.exeFhdmph32.exeCfeepelg.exeHcgjmo32.exeGhacfmic.exeAnjnnk32.exePpopja32.exeBehilopf.exeFcbecl32.exeKkjnnn32.exeMnmpdlac.exeHfepod32.exeCmmcpi32.exeEojlbb32.exeJpdnbbah.exeLkgngb32.exeOjomdoof.exeDdaemh32.exeGlklejoo.exeEeohkeoe.exeNjjcip32.exePnbojmmp.exeEihjolae.exeJedehaea.exePpkhhjei.exeLhfnkqgk.exeDilchhgg.exeCgnpjkhj.exeLlbqfe32.exeMqehjecl.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mggabaea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nbpghl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hajfgnjc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Immjnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iipejmko.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhepoaif.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogliemkk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bphooc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebknblho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nddcimag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nnmlcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jfdhmk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcmdjgbh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onldqejb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpbkhabp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ehpalp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfahomfd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkkfgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kdbepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eelgcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eaednh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oepjoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kngekdnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nddcimag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ohcdhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqdefddb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hakkgc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpjbgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmcilp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njnokdaq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhbmip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fjjpjgjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mggabaea.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emdmjamj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdcpkp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhdmph32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfeepelg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcgjmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ghacfmic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Anjnnk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppopja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Behilopf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcbecl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkjnnn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnmpdlac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hfepod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cmmcpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eojlbb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpdnbbah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lkgngb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojomdoof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ddaemh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glklejoo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eeohkeoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Njjcip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pnbojmmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eihjolae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jedehaea.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppkhhjei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhfnkqgk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dilchhgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cgnpjkhj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llbqfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mqehjecl.exe -
Executes dropped EXE 64 IoCs
Processes:
Jckgicnp.exeKjglkm32.exeKfnmpn32.exeKfpifm32.exeKllnhg32.exeKdhcli32.exeLjghjpfe.exeLgkhdddo.exeLcaiiejc.exeLgoboc32.exeLmljgj32.exeMiehak32.exeMpamde32.exeMeoell32.exeMlkjne32.exeNcfoch32.exeNfghdcfj.exeNallalep.exeNmcmgm32.exeNfkapb32.exeNpdfhhhe.exeOagoep32.exeOhcdhi32.exeOopijc32.exeOdmabj32.exePcbncfjd.exePdakniag.exePeedka32.exePpkhhjei.exePjcmap32.exePldebkhj.exeQfljkp32.exeQqfkln32.exeAkkoig32.exeAdcdbl32.exeAnlhkbhq.exeAdfqgl32.exeAopahjll.exeAmcbankf.exeBiolanld.exeBbgqjdce.exeBefmfpbi.exeBehilopf.exeBejfao32.exeCjgoje32.exeCcpcckck.exeCillkbac.exeCcbphk32.exeCiohqa32.exeClmdmm32.exeCbgmigeq.exeCiaefa32.exeCpkmcldj.exeCfeepelg.exeChfbgn32.exeCpmjhk32.exeDifnaqih.exeDjgkii32.exeDbncjf32.exeDoecog32.exeDacpkc32.exeDogpdg32.exeDafmqb32.exeDhpemm32.exepid process 1628 Jckgicnp.exe 2888 Kjglkm32.exe 2908 Kfnmpn32.exe 2572 Kfpifm32.exe 2532 Kllnhg32.exe 2544 Kdhcli32.exe 2732 Ljghjpfe.exe 2392 Lgkhdddo.exe 2844 Lcaiiejc.exe 2360 Lgoboc32.exe 1032 Lmljgj32.exe 2144 Miehak32.exe 1348 Mpamde32.exe 768 Meoell32.exe 788 Mlkjne32.exe 2748 Ncfoch32.exe 2708 Nfghdcfj.exe 2628 Nallalep.exe 552 Nmcmgm32.exe 1860 Nfkapb32.exe 956 Npdfhhhe.exe 576 Oagoep32.exe 736 Ohcdhi32.exe 2864 Oopijc32.exe 560 Odmabj32.exe 2276 Pcbncfjd.exe 1344 Pdakniag.exe 1608 Peedka32.exe 2880 Ppkhhjei.exe 2468 Pjcmap32.exe 3028 Pldebkhj.exe 2916 Qfljkp32.exe 2956 Qqfkln32.exe 1428 Akkoig32.exe 2548 Adcdbl32.exe 2456 Anlhkbhq.exe 3064 Adfqgl32.exe 604 Aopahjll.exe 1280 Amcbankf.exe 2344 Biolanld.exe 2140 Bbgqjdce.exe 528 Befmfpbi.exe 2684 Behilopf.exe 336 Bejfao32.exe 3052 Cjgoje32.exe 1600 Ccpcckck.exe 1920 Cillkbac.exe 1028 Ccbphk32.exe 2736 Ciohqa32.exe 1764 Clmdmm32.exe 1852 Cbgmigeq.exe 2972 Ciaefa32.exe 2212 Cpkmcldj.exe 2200 Cfeepelg.exe 2240 Chfbgn32.exe 2812 Cpmjhk32.exe 2896 Difnaqih.exe 2028 Djgkii32.exe 1296 Dbncjf32.exe 2404 Doecog32.exe 1888 Dacpkc32.exe 2848 Dogpdg32.exe 1940 Dafmqb32.exe 2284 Dhpemm32.exe -
Loads dropped DLL 64 IoCs
Processes:
f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exeJckgicnp.exeKjglkm32.exeKfnmpn32.exeKfpifm32.exeKllnhg32.exeKdhcli32.exeLjghjpfe.exeLgkhdddo.exeLcaiiejc.exeLgoboc32.exeLmljgj32.exeMiehak32.exeMpamde32.exeMeoell32.exeMlkjne32.exeNcfoch32.exeNfghdcfj.exeNallalep.exeNmcmgm32.exeNfkapb32.exeNpdfhhhe.exeOagoep32.exeOhcdhi32.exeOopijc32.exeOdmabj32.exePcbncfjd.exePdakniag.exePeedka32.exePpkhhjei.exePjcmap32.exePldebkhj.exepid process 1556 f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exe 1556 f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exe 1628 Jckgicnp.exe 1628 Jckgicnp.exe 2888 Kjglkm32.exe 2888 Kjglkm32.exe 2908 Kfnmpn32.exe 2908 Kfnmpn32.exe 2572 Kfpifm32.exe 2572 Kfpifm32.exe 2532 Kllnhg32.exe 2532 Kllnhg32.exe 2544 Kdhcli32.exe 2544 Kdhcli32.exe 2732 Ljghjpfe.exe 2732 Ljghjpfe.exe 2392 Lgkhdddo.exe 2392 Lgkhdddo.exe 2844 Lcaiiejc.exe 2844 Lcaiiejc.exe 2360 Lgoboc32.exe 2360 Lgoboc32.exe 1032 Lmljgj32.exe 1032 Lmljgj32.exe 2144 Miehak32.exe 2144 Miehak32.exe 1348 Mpamde32.exe 1348 Mpamde32.exe 768 Meoell32.exe 768 Meoell32.exe 788 Mlkjne32.exe 788 Mlkjne32.exe 2748 Ncfoch32.exe 2748 Ncfoch32.exe 2708 Nfghdcfj.exe 2708 Nfghdcfj.exe 2628 Nallalep.exe 2628 Nallalep.exe 552 Nmcmgm32.exe 552 Nmcmgm32.exe 1860 Nfkapb32.exe 1860 Nfkapb32.exe 956 Npdfhhhe.exe 956 Npdfhhhe.exe 576 Oagoep32.exe 576 Oagoep32.exe 736 Ohcdhi32.exe 736 Ohcdhi32.exe 2864 Oopijc32.exe 2864 Oopijc32.exe 560 Odmabj32.exe 560 Odmabj32.exe 2276 Pcbncfjd.exe 2276 Pcbncfjd.exe 1344 Pdakniag.exe 1344 Pdakniag.exe 1608 Peedka32.exe 1608 Peedka32.exe 2880 Ppkhhjei.exe 2880 Ppkhhjei.exe 2468 Pjcmap32.exe 2468 Pjcmap32.exe 3028 Pldebkhj.exe 3028 Pldebkhj.exe -
Drops file in System32 directory 64 IoCs
Processes:
Anjnnk32.exeInmmbc32.exeOfaolcmh.exeOopijc32.exeDcohghbk.exeHclfag32.exeDbdagg32.exeQfkelkkd.exeAipgifcp.exeNnafnopi.exeKfodfh32.exeIomcpe32.exeDhhhbg32.exePhklaacg.exeGkalhgfd.exeAhmefdcp.exeJpjifjdg.exeCqleifna.exeAmafgc32.exeDoecog32.exeFajbke32.exePlpqim32.exeCiohqa32.exeFapeic32.exeCpbkhabp.exeCcpcckck.exeIgpaec32.exePdecoa32.exeMclqqeaq.exeIjidfpci.exeFkhibino.exeJdhifooi.exePcljmdmj.exePnchhllf.exeKfpifm32.exeMobaef32.exeDnjalhpp.exeKmqmod32.exeGcedad32.exeAeghng32.exeBoljgg32.exeAompambg.exeMakkcc32.exeCgjgol32.exeDglpdomh.exeFaijggao.exeDljmlj32.exeLafahdcc.exeImhqbkbm.exeEicpcm32.exeNllbdp32.exeDogpdg32.exeIfpcchai.exeQkielpdf.exeOdmabj32.exeMfmndn32.exeBoogmgkl.exeOgliemkk.exeJeoeclek.exeHjcppidk.exeOpnbbe32.exeHajfgnjc.exeEmifeqid.exedescription ioc process File created C:\Windows\SysWOW64\Flfifa32.dll Anjnnk32.exe File created C:\Windows\SysWOW64\Igebkiof.exe Inmmbc32.exe File opened for modification C:\Windows\SysWOW64\Onldqejb.exe Ofaolcmh.exe File created C:\Windows\SysWOW64\Mapecq32.dll Oopijc32.exe File opened for modification C:\Windows\SysWOW64\Djiqdb32.exe Dcohghbk.exe File created C:\Windows\SysWOW64\Hjfnnajl.exe Hclfag32.exe File created C:\Windows\SysWOW64\Elfkmcdp.dll Dbdagg32.exe File created C:\Windows\SysWOW64\Qlgndbil.exe Qfkelkkd.exe File opened for modification C:\Windows\SysWOW64\Aompambg.exe Aipgifcp.exe File opened for modification C:\Windows\SysWOW64\Nlefhcnc.exe Nnafnopi.exe File opened for modification C:\Windows\SysWOW64\Kdbepm32.exe Kfodfh32.exe File created C:\Windows\SysWOW64\Ifgklp32.exe Iomcpe32.exe File created C:\Windows\SysWOW64\Dmepkn32.exe Dhhhbg32.exe File opened for modification C:\Windows\SysWOW64\Pacajg32.exe Phklaacg.exe File created C:\Windows\SysWOW64\Hpdgka32.dll Gkalhgfd.exe File opened for modification C:\Windows\SysWOW64\Agbbgqhh.exe Anjnnk32.exe File created C:\Windows\SysWOW64\Anjnnk32.exe Ahmefdcp.exe File opened for modification C:\Windows\SysWOW64\Jibnop32.exe Jpjifjdg.exe File created C:\Windows\SysWOW64\Dfinam32.exe Cqleifna.exe File created C:\Windows\SysWOW64\Eidmboob.dll Amafgc32.exe File created C:\Windows\SysWOW64\Dacpkc32.exe Doecog32.exe File opened for modification C:\Windows\SysWOW64\Fdiogq32.exe Fajbke32.exe File created C:\Windows\SysWOW64\Pfeeff32.exe Plpqim32.exe File created C:\Windows\SysWOW64\Clmdmm32.exe Ciohqa32.exe File opened for modification C:\Windows\SysWOW64\Fkhibino.exe Fapeic32.exe File opened for modification C:\Windows\SysWOW64\Clilmbhd.exe Cpbkhabp.exe File created C:\Windows\SysWOW64\Coalledf.dll Ccpcckck.exe File created C:\Windows\SysWOW64\Klfgipmk.dll Igpaec32.exe File opened for modification C:\Windows\SysWOW64\Pmnghfhi.exe Pdecoa32.exe File opened for modification C:\Windows\SysWOW64\Mhhiiloh.exe Mclqqeaq.exe File created C:\Windows\SysWOW64\Imhqbkbm.exe Ijidfpci.exe File created C:\Windows\SysWOW64\Fkkfgi32.exe Fkhibino.exe File created C:\Windows\SysWOW64\Kdhdfgep.dll Jdhifooi.exe File opened for modification C:\Windows\SysWOW64\Pnbojmmp.exe Pcljmdmj.exe File opened for modification C:\Windows\SysWOW64\Phklaacg.exe Pnchhllf.exe File opened for modification C:\Windows\SysWOW64\Kllnhg32.exe Kfpifm32.exe File created C:\Windows\SysWOW64\Njnokdaq.exe Mobaef32.exe File created C:\Windows\SysWOW64\Olahgd32.dll Dnjalhpp.exe File opened for modification C:\Windows\SysWOW64\Kbmfgk32.exe Kmqmod32.exe File created C:\Windows\SysWOW64\Pdfndl32.dll Gcedad32.exe File created C:\Windows\SysWOW64\Anbmbi32.exe Aeghng32.exe File created C:\Windows\SysWOW64\Bjbndpmd.exe Boljgg32.exe File created C:\Windows\SysWOW64\Aeghng32.exe Aompambg.exe File created C:\Windows\SysWOW64\Mkcplien.exe Makkcc32.exe File opened for modification C:\Windows\SysWOW64\Cpbkhabp.exe Cgjgol32.exe File created C:\Windows\SysWOW64\Khqplf32.dll Dglpdomh.exe File opened for modification C:\Windows\SysWOW64\Flnndp32.exe Faijggao.exe File created C:\Windows\SysWOW64\Ddaemh32.exe Dljmlj32.exe File opened for modification C:\Windows\SysWOW64\Makkcc32.exe Lafahdcc.exe File opened for modification C:\Windows\SysWOW64\Idohdhbo.exe Imhqbkbm.exe File created C:\Windows\SysWOW64\Jcnllk32.dll Eicpcm32.exe File opened for modification C:\Windows\SysWOW64\Nfdfmfle.exe Nllbdp32.exe File created C:\Windows\SysWOW64\Fjkgob32.dll Dogpdg32.exe File created C:\Windows\SysWOW64\Ijnkifgp.exe Ifpcchai.exe File created C:\Windows\SysWOW64\Ahmefdcp.exe Qkielpdf.exe File created C:\Windows\SysWOW64\Afoddn32.dll Odmabj32.exe File opened for modification C:\Windows\SysWOW64\Mcqombic.exe Mfmndn32.exe File created C:\Windows\SysWOW64\Bjdkjpkb.exe Boogmgkl.exe File created C:\Windows\SysWOW64\Mhklji32.dll Ogliemkk.exe File created C:\Windows\SysWOW64\Amoaeb32.dll Jeoeclek.exe File opened for modification C:\Windows\SysWOW64\Hldlga32.exe Hjcppidk.exe File created C:\Windows\SysWOW64\Oiffkkbk.exe Opnbbe32.exe File created C:\Windows\SysWOW64\Hnpgloog.exe Hajfgnjc.exe File created C:\Windows\SysWOW64\Gcceba32.dll Emifeqid.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2164 1832 WerFault.exe Flnndp32.exe -
Modifies registry class 64 IoCs
Processes:
Adcdbl32.exeDljmlj32.exePadjmfdg.exeHljaigmo.exeKfnmpn32.exeOagoep32.exeFjhcegll.exeLpdankjg.exeCbjlhpkb.exeCiohqa32.exeHjfnnajl.exeNfkapb32.exeDfinam32.exeFpjaodmj.exeBklpjlmc.exeDbdagg32.exeBfdenafn.exeGjgiidkl.exeKfodfh32.exeFmlbjq32.exeLpabpcdf.exeIbacbcgg.exeInmmbc32.exeBhbmip32.exeLmljgj32.exeOdmabj32.exeLlbqfe32.exeAccqnc32.exePfhhflmg.exeKfggkc32.exeOqojhp32.exeIhniaa32.exeKnkgpi32.exeHjlbdc32.exeJelfdc32.exeJdhifooi.exeHifbdnbi.exeDmmmfc32.exeKkpqlm32.exeKdnkdmec.exeEddjhb32.exeElipgofb.exePkjphcff.exeFepjea32.exeGodaakic.exeLklikj32.exeBkhjamcf.exeIjqjgo32.exeEhpalp32.exeBbhccm32.exeDafmqb32.exeDmepkn32.exeFpjofl32.exeNjbfnjeg.exeDbabho32.exeKfpifm32.exeEhhdaj32.exeQdlipplq.exeIdkpganf.exeMmicfh32.exeFlabdecn.exeAnecfgdc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Adcdbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dljmlj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Padjmfdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eojkndbh.dll" Hljaigmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eiahmmdf.dll" Kfnmpn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oagoep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmfpeb32.dll" Fjhcegll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lpdankjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cbjlhpkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ciohqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffbpca32.dll" Hjfnnajl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfpemp32.dll" Nfkapb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbpbbd32.dll" Dfinam32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fpjaodmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bklpjlmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dbdagg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bfdenafn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gjgiidkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alhpic32.dll" Kfodfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fmlbjq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lpabpcdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ibacbcgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Inmmbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bhbmip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lmljgj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Odmabj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Llbqfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Accqnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imfopc32.dll" Pfhhflmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kfggkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkebqmfj.dll" Oqojhp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fjhcegll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ihniaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Knkgpi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hjlbdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jelfdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jdhifooi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hifbdnbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmmmfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pacmhh32.dll" Kkpqlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kdnkdmec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eddjhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nqcglmgd.dll" Elipgofb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecinnn32.dll" Pkjphcff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fepjea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jflomd32.dll" Godaakic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lklikj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phlnho32.dll" Bkhjamcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgiolk32.dll" Ijqjgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ehpalp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lqhkjacc.dll" Bbhccm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dafmqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmepkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fpjofl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Njbfnjeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dbabho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kfpifm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnoegakl.dll" Ehhdaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qdlipplq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Idkpganf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cddoqj32.dll" Mmicfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fepjea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qccnpi32.dll" Flabdecn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Anecfgdc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exeJckgicnp.exeKjglkm32.exeKfnmpn32.exeKfpifm32.exeKllnhg32.exeKdhcli32.exeLjghjpfe.exeLgkhdddo.exeLcaiiejc.exeLgoboc32.exeLmljgj32.exeMiehak32.exeMpamde32.exeMeoell32.exeMlkjne32.exedescription pid process target process PID 1556 wrote to memory of 1628 1556 f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exe Jckgicnp.exe PID 1556 wrote to memory of 1628 1556 f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exe Jckgicnp.exe PID 1556 wrote to memory of 1628 1556 f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exe Jckgicnp.exe PID 1556 wrote to memory of 1628 1556 f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exe Jckgicnp.exe PID 1628 wrote to memory of 2888 1628 Jckgicnp.exe Kjglkm32.exe PID 1628 wrote to memory of 2888 1628 Jckgicnp.exe Kjglkm32.exe PID 1628 wrote to memory of 2888 1628 Jckgicnp.exe Kjglkm32.exe PID 1628 wrote to memory of 2888 1628 Jckgicnp.exe Kjglkm32.exe PID 2888 wrote to memory of 2908 2888 Kjglkm32.exe Kfnmpn32.exe PID 2888 wrote to memory of 2908 2888 Kjglkm32.exe Kfnmpn32.exe PID 2888 wrote to memory of 2908 2888 Kjglkm32.exe Kfnmpn32.exe PID 2888 wrote to memory of 2908 2888 Kjglkm32.exe Kfnmpn32.exe PID 2908 wrote to memory of 2572 2908 Kfnmpn32.exe Kfpifm32.exe PID 2908 wrote to memory of 2572 2908 Kfnmpn32.exe Kfpifm32.exe PID 2908 wrote to memory of 2572 2908 Kfnmpn32.exe Kfpifm32.exe PID 2908 wrote to memory of 2572 2908 Kfnmpn32.exe Kfpifm32.exe PID 2572 wrote to memory of 2532 2572 Kfpifm32.exe Kllnhg32.exe PID 2572 wrote to memory of 2532 2572 Kfpifm32.exe Kllnhg32.exe PID 2572 wrote to memory of 2532 2572 Kfpifm32.exe Kllnhg32.exe PID 2572 wrote to memory of 2532 2572 Kfpifm32.exe Kllnhg32.exe PID 2532 wrote to memory of 2544 2532 Kllnhg32.exe Kdhcli32.exe PID 2532 wrote to memory of 2544 2532 Kllnhg32.exe Kdhcli32.exe PID 2532 wrote to memory of 2544 2532 Kllnhg32.exe Kdhcli32.exe PID 2532 wrote to memory of 2544 2532 Kllnhg32.exe Kdhcli32.exe PID 2544 wrote to memory of 2732 2544 Kdhcli32.exe Ljghjpfe.exe PID 2544 wrote to memory of 2732 2544 Kdhcli32.exe Ljghjpfe.exe PID 2544 wrote to memory of 2732 2544 Kdhcli32.exe Ljghjpfe.exe PID 2544 wrote to memory of 2732 2544 Kdhcli32.exe Ljghjpfe.exe PID 2732 wrote to memory of 2392 2732 Ljghjpfe.exe Lgkhdddo.exe PID 2732 wrote to memory of 2392 2732 Ljghjpfe.exe Lgkhdddo.exe PID 2732 wrote to memory of 2392 2732 Ljghjpfe.exe Lgkhdddo.exe PID 2732 wrote to memory of 2392 2732 Ljghjpfe.exe Lgkhdddo.exe PID 2392 wrote to memory of 2844 2392 Lgkhdddo.exe Lcaiiejc.exe PID 2392 wrote to memory of 2844 2392 Lgkhdddo.exe Lcaiiejc.exe PID 2392 wrote to memory of 2844 2392 Lgkhdddo.exe Lcaiiejc.exe PID 2392 wrote to memory of 2844 2392 Lgkhdddo.exe Lcaiiejc.exe PID 2844 wrote to memory of 2360 2844 Lcaiiejc.exe Lgoboc32.exe PID 2844 wrote to memory of 2360 2844 Lcaiiejc.exe Lgoboc32.exe PID 2844 wrote to memory of 2360 2844 Lcaiiejc.exe Lgoboc32.exe PID 2844 wrote to memory of 2360 2844 Lcaiiejc.exe Lgoboc32.exe PID 2360 wrote to memory of 1032 2360 Lgoboc32.exe Lmljgj32.exe PID 2360 wrote to memory of 1032 2360 Lgoboc32.exe Lmljgj32.exe PID 2360 wrote to memory of 1032 2360 Lgoboc32.exe Lmljgj32.exe PID 2360 wrote to memory of 1032 2360 Lgoboc32.exe Lmljgj32.exe PID 1032 wrote to memory of 2144 1032 Lmljgj32.exe Miehak32.exe PID 1032 wrote to memory of 2144 1032 Lmljgj32.exe Miehak32.exe PID 1032 wrote to memory of 2144 1032 Lmljgj32.exe Miehak32.exe PID 1032 wrote to memory of 2144 1032 Lmljgj32.exe Miehak32.exe PID 2144 wrote to memory of 1348 2144 Miehak32.exe Mpamde32.exe PID 2144 wrote to memory of 1348 2144 Miehak32.exe Mpamde32.exe PID 2144 wrote to memory of 1348 2144 Miehak32.exe Mpamde32.exe PID 2144 wrote to memory of 1348 2144 Miehak32.exe Mpamde32.exe PID 1348 wrote to memory of 768 1348 Mpamde32.exe Meoell32.exe PID 1348 wrote to memory of 768 1348 Mpamde32.exe Meoell32.exe PID 1348 wrote to memory of 768 1348 Mpamde32.exe Meoell32.exe PID 1348 wrote to memory of 768 1348 Mpamde32.exe Meoell32.exe PID 768 wrote to memory of 788 768 Meoell32.exe Mlkjne32.exe PID 768 wrote to memory of 788 768 Meoell32.exe Mlkjne32.exe PID 768 wrote to memory of 788 768 Meoell32.exe Mlkjne32.exe PID 768 wrote to memory of 788 768 Meoell32.exe Mlkjne32.exe PID 788 wrote to memory of 2748 788 Mlkjne32.exe Ncfoch32.exe PID 788 wrote to memory of 2748 788 Mlkjne32.exe Ncfoch32.exe PID 788 wrote to memory of 2748 788 Mlkjne32.exe Ncfoch32.exe PID 788 wrote to memory of 2748 788 Mlkjne32.exe Ncfoch32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exe"C:\Users\Admin\AppData\Local\Temp\f8688de64f737674d8acb31a4b370cc9367df8ebf69baa6babe870a4f79182ca.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\Jckgicnp.exeC:\Windows\system32\Jckgicnp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Kjglkm32.exeC:\Windows\system32\Kjglkm32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\Kfnmpn32.exeC:\Windows\system32\Kfnmpn32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\Kfpifm32.exeC:\Windows\system32\Kfpifm32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\Kllnhg32.exeC:\Windows\system32\Kllnhg32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\Kdhcli32.exeC:\Windows\system32\Kdhcli32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\Ljghjpfe.exeC:\Windows\system32\Ljghjpfe.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\Lgkhdddo.exeC:\Windows\system32\Lgkhdddo.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\Lcaiiejc.exeC:\Windows\system32\Lcaiiejc.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Lgoboc32.exeC:\Windows\system32\Lgoboc32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\Lmljgj32.exeC:\Windows\system32\Lmljgj32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\Miehak32.exeC:\Windows\system32\Miehak32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\Mpamde32.exeC:\Windows\system32\Mpamde32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\Meoell32.exeC:\Windows\system32\Meoell32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\Mlkjne32.exeC:\Windows\system32\Mlkjne32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\Ncfoch32.exeC:\Windows\system32\Ncfoch32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2748 -
C:\Windows\SysWOW64\Nfghdcfj.exeC:\Windows\system32\Nfghdcfj.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2708 -
C:\Windows\SysWOW64\Nallalep.exeC:\Windows\system32\Nallalep.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2628 -
C:\Windows\SysWOW64\Nmcmgm32.exeC:\Windows\system32\Nmcmgm32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:552 -
C:\Windows\SysWOW64\Nfkapb32.exeC:\Windows\system32\Nfkapb32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1860 -
C:\Windows\SysWOW64\Npdfhhhe.exeC:\Windows\system32\Npdfhhhe.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:956 -
C:\Windows\SysWOW64\Oagoep32.exeC:\Windows\system32\Oagoep32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:576 -
C:\Windows\SysWOW64\Ohcdhi32.exeC:\Windows\system32\Ohcdhi32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:736 -
C:\Windows\SysWOW64\Oopijc32.exeC:\Windows\system32\Oopijc32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\Odmabj32.exeC:\Windows\system32\Odmabj32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:560 -
C:\Windows\SysWOW64\Pcbncfjd.exeC:\Windows\system32\Pcbncfjd.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2276 -
C:\Windows\SysWOW64\Pdakniag.exeC:\Windows\system32\Pdakniag.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1344 -
C:\Windows\SysWOW64\Peedka32.exeC:\Windows\system32\Peedka32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608 -
C:\Windows\SysWOW64\Ppkhhjei.exeC:\Windows\system32\Ppkhhjei.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2880 -
C:\Windows\SysWOW64\Pjcmap32.exeC:\Windows\system32\Pjcmap32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2468 -
C:\Windows\SysWOW64\Pldebkhj.exeC:\Windows\system32\Pldebkhj.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3028 -
C:\Windows\SysWOW64\Qfljkp32.exeC:\Windows\system32\Qfljkp32.exe33⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\Qqfkln32.exeC:\Windows\system32\Qqfkln32.exe34⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\Akkoig32.exeC:\Windows\system32\Akkoig32.exe35⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\SysWOW64\Adcdbl32.exeC:\Windows\system32\Adcdbl32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:2548 -
C:\Windows\SysWOW64\Anlhkbhq.exeC:\Windows\system32\Anlhkbhq.exe37⤵
- Executes dropped EXE
PID:2456 -
C:\Windows\SysWOW64\Adfqgl32.exeC:\Windows\system32\Adfqgl32.exe38⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\Aopahjll.exeC:\Windows\system32\Aopahjll.exe39⤵
- Executes dropped EXE
PID:604 -
C:\Windows\SysWOW64\Amcbankf.exeC:\Windows\system32\Amcbankf.exe40⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\Biolanld.exeC:\Windows\system32\Biolanld.exe41⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\SysWOW64\Bbgqjdce.exeC:\Windows\system32\Bbgqjdce.exe42⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\Befmfpbi.exeC:\Windows\system32\Befmfpbi.exe43⤵
- Executes dropped EXE
PID:528 -
C:\Windows\SysWOW64\Behilopf.exeC:\Windows\system32\Behilopf.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\Bejfao32.exeC:\Windows\system32\Bejfao32.exe45⤵
- Executes dropped EXE
PID:336 -
C:\Windows\SysWOW64\Cjgoje32.exeC:\Windows\system32\Cjgoje32.exe46⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\Ccpcckck.exeC:\Windows\system32\Ccpcckck.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1600 -
C:\Windows\SysWOW64\Cillkbac.exeC:\Windows\system32\Cillkbac.exe48⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\Ccbphk32.exeC:\Windows\system32\Ccbphk32.exe49⤵
- Executes dropped EXE
PID:1028 -
C:\Windows\SysWOW64\Ciohqa32.exeC:\Windows\system32\Ciohqa32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2736 -
C:\Windows\SysWOW64\Clmdmm32.exeC:\Windows\system32\Clmdmm32.exe51⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\Cbgmigeq.exeC:\Windows\system32\Cbgmigeq.exe52⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\Ciaefa32.exeC:\Windows\system32\Ciaefa32.exe53⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\Cpkmcldj.exeC:\Windows\system32\Cpkmcldj.exe54⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\Cfeepelg.exeC:\Windows\system32\Cfeepelg.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2200 -
C:\Windows\SysWOW64\Chfbgn32.exeC:\Windows\system32\Chfbgn32.exe56⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\Cpmjhk32.exeC:\Windows\system32\Cpmjhk32.exe57⤵
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\Difnaqih.exeC:\Windows\system32\Difnaqih.exe58⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\Djgkii32.exeC:\Windows\system32\Djgkii32.exe59⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Dbncjf32.exeC:\Windows\system32\Dbncjf32.exe60⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\Doecog32.exeC:\Windows\system32\Doecog32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2404 -
C:\Windows\SysWOW64\Dacpkc32.exeC:\Windows\system32\Dacpkc32.exe62⤵
- Executes dropped EXE
PID:1888 -
C:\Windows\SysWOW64\Dogpdg32.exeC:\Windows\system32\Dogpdg32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Dafmqb32.exeC:\Windows\system32\Dafmqb32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:1940 -
C:\Windows\SysWOW64\Dhpemm32.exeC:\Windows\system32\Dhpemm32.exe65⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\Dmmmfc32.exeC:\Windows\system32\Dmmmfc32.exe66⤵
- Modifies registry class
PID:2208 -
C:\Windows\SysWOW64\Ddfebnoo.exeC:\Windows\system32\Ddfebnoo.exe67⤵PID:2440
-
C:\Windows\SysWOW64\Dkqnoh32.exeC:\Windows\system32\Dkqnoh32.exe68⤵PID:684
-
C:\Windows\SysWOW64\Elajgpmj.exeC:\Windows\system32\Elajgpmj.exe69⤵PID:2056
-
C:\Windows\SysWOW64\Eejopecj.exeC:\Windows\system32\Eejopecj.exe70⤵PID:1320
-
C:\Windows\SysWOW64\Eobchk32.exeC:\Windows\system32\Eobchk32.exe71⤵PID:1624
-
C:\Windows\SysWOW64\Eihgfd32.exeC:\Windows\system32\Eihgfd32.exe72⤵PID:880
-
C:\Windows\SysWOW64\Epbpbnan.exeC:\Windows\system32\Epbpbnan.exe73⤵PID:1048
-
C:\Windows\SysWOW64\Eeohkeoe.exeC:\Windows\system32\Eeohkeoe.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1100 -
C:\Windows\SysWOW64\Elipgofb.exeC:\Windows\system32\Elipgofb.exe75⤵
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Eogmcjef.exeC:\Windows\system32\Eogmcjef.exe76⤵PID:2296
-
C:\Windows\SysWOW64\Eaeipfei.exeC:\Windows\system32\Eaeipfei.exe77⤵PID:2652
-
C:\Windows\SysWOW64\Ehpalp32.exeC:\Windows\system32\Ehpalp32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2952 -
C:\Windows\SysWOW64\Eoiiijcc.exeC:\Windows\system32\Eoiiijcc.exe79⤵PID:2668
-
C:\Windows\SysWOW64\Edfbaabj.exeC:\Windows\system32\Edfbaabj.exe80⤵PID:2400
-
C:\Windows\SysWOW64\Fgdnnl32.exeC:\Windows\system32\Fgdnnl32.exe81⤵PID:1944
-
C:\Windows\SysWOW64\Fajbke32.exeC:\Windows\system32\Fajbke32.exe82⤵
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\Fdiogq32.exeC:\Windows\system32\Fdiogq32.exe83⤵PID:1892
-
C:\Windows\SysWOW64\Fnacpffh.exeC:\Windows\system32\Fnacpffh.exe84⤵PID:1724
-
C:\Windows\SysWOW64\Fgigil32.exeC:\Windows\system32\Fgigil32.exe85⤵PID:660
-
C:\Windows\SysWOW64\Fjhcegll.exeC:\Windows\system32\Fjhcegll.exe86⤵
- Modifies registry class
PID:1824 -
C:\Windows\SysWOW64\Fdmhbplb.exeC:\Windows\system32\Fdmhbplb.exe87⤵PID:2060
-
C:\Windows\SysWOW64\Fjjpjgjj.exeC:\Windows\system32\Fjjpjgjj.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:948 -
C:\Windows\SysWOW64\Flhmfbim.exeC:\Windows\system32\Flhmfbim.exe89⤵PID:1376
-
C:\Windows\SysWOW64\Fcbecl32.exeC:\Windows\system32\Fcbecl32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1756 -
C:\Windows\SysWOW64\Fjlmpfhg.exeC:\Windows\system32\Fjlmpfhg.exe91⤵PID:2672
-
C:\Windows\SysWOW64\Fqfemqod.exeC:\Windows\system32\Fqfemqod.exe92⤵PID:760
-
C:\Windows\SysWOW64\Gceailog.exeC:\Windows\system32\Gceailog.exe93⤵PID:1588
-
C:\Windows\SysWOW64\Ghajacmo.exeC:\Windows\system32\Ghajacmo.exe94⤵PID:1508
-
C:\Windows\SysWOW64\Gkpfmnlb.exeC:\Windows\system32\Gkpfmnlb.exe95⤵PID:1604
-
C:\Windows\SysWOW64\Gfejjgli.exeC:\Windows\system32\Gfejjgli.exe96⤵PID:2528
-
C:\Windows\SysWOW64\Gkbcbn32.exeC:\Windows\system32\Gkbcbn32.exe97⤵PID:2920
-
C:\Windows\SysWOW64\Gnaooi32.exeC:\Windows\system32\Gnaooi32.exe98⤵PID:2712
-
C:\Windows\SysWOW64\Gfhgpg32.exeC:\Windows\system32\Gfhgpg32.exe99⤵PID:2436
-
C:\Windows\SysWOW64\Goplilpf.exeC:\Windows\system32\Goplilpf.exe100⤵PID:2624
-
C:\Windows\SysWOW64\Gqahqd32.exeC:\Windows\system32\Gqahqd32.exe101⤵PID:1696
-
C:\Windows\SysWOW64\Giipab32.exeC:\Windows\system32\Giipab32.exe102⤵PID:2336
-
C:\Windows\SysWOW64\Gjjmijme.exeC:\Windows\system32\Gjjmijme.exe103⤵PID:876
-
C:\Windows\SysWOW64\Gqdefddb.exeC:\Windows\system32\Gqdefddb.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2716 -
C:\Windows\SysWOW64\Ggnmbn32.exeC:\Windows\system32\Ggnmbn32.exe105⤵PID:2664
-
C:\Windows\SysWOW64\Hjlioj32.exeC:\Windows\system32\Hjlioj32.exe106⤵PID:240
-
C:\Windows\SysWOW64\Hmkeke32.exeC:\Windows\system32\Hmkeke32.exe107⤵PID:996
-
C:\Windows\SysWOW64\Hfcjdkpg.exeC:\Windows\system32\Hfcjdkpg.exe108⤵PID:3048
-
C:\Windows\SysWOW64\Hnjbeh32.exeC:\Windows\system32\Hnjbeh32.exe109⤵PID:872
-
C:\Windows\SysWOW64\Hcgjmo32.exeC:\Windows\system32\Hcgjmo32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1664 -
C:\Windows\SysWOW64\Hjacjifm.exeC:\Windows\system32\Hjacjifm.exe111⤵PID:2820
-
C:\Windows\SysWOW64\Hakkgc32.exeC:\Windows\system32\Hakkgc32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1800 -
C:\Windows\SysWOW64\Hblgnkdh.exeC:\Windows\system32\Hblgnkdh.exe113⤵PID:2640
-
C:\Windows\SysWOW64\Hjcppidk.exeC:\Windows\system32\Hjcppidk.exe114⤵
- Drops file in System32 directory
PID:2324 -
C:\Windows\SysWOW64\Hldlga32.exeC:\Windows\system32\Hldlga32.exe115⤵PID:1340
-
C:\Windows\SysWOW64\Hfjpdjjo.exeC:\Windows\system32\Hfjpdjjo.exe116⤵PID:1644
-
C:\Windows\SysWOW64\Hihlqeib.exeC:\Windows\system32\Hihlqeib.exe117⤵PID:2828
-
C:\Windows\SysWOW64\Hpbdmo32.exeC:\Windows\system32\Hpbdmo32.exe118⤵PID:2700
-
C:\Windows\SysWOW64\Hbaaik32.exeC:\Windows\system32\Hbaaik32.exe119⤵PID:1680
-
C:\Windows\SysWOW64\Ihniaa32.exeC:\Windows\system32\Ihniaa32.exe120⤵
- Modifies registry class
PID:1516 -
C:\Windows\SysWOW64\Inhanl32.exeC:\Windows\system32\Inhanl32.exe121⤵PID:1996
-
C:\Windows\SysWOW64\Ieajkfmd.exeC:\Windows\system32\Ieajkfmd.exe122⤵PID:1704
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-