Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:21
Behavioral task
behavioral1
Sample
60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exe
Resource
win10v2004-20240508-en
General
-
Target
60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exe
-
Size
1.3MB
-
MD5
0d39a2cb2ffc4a66569bfffa26829c40
-
SHA1
48511af2de1e9c7e2fa29a4300707023422a19a3
-
SHA256
60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a
-
SHA512
7a1dc474f7c0573352f0b21aef1a71251a26da2e728e8174e9bb17baa36db74d5eab8ba6384f2e7423ddc80e7247cfa4c1a620d3eecfbdbc0154d4f31e42bb45
-
SSDEEP
24576:5hDIvr4B9f01ZmQvrb91v92W9C05wkEPSOdKkrzEoxrC9toC9Dq9onk8:XIkB9f0VP91v92W805IPSOdKgzEoxrl0
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Dhpiojfb.exeAiinen32.exeDogefd32.exeBoqbfb32.exeCkafbbph.exeOiellh32.exeJehkodcm.exeJifdebic.exeDkcofe32.exeEgjpkffe.exeHkpnhgge.exeJnqphi32.exeEnihne32.exeBafidiio.exeAiedjneg.exeEnakbp32.exeAhokfj32.exeCjlgiqbk.exeIggkllpe.exeMbpnanch.exeOcimgp32.exeAmfcikek.exeLekhfgfc.exeFpdhklkl.exeLbeknj32.exeBmpfojmp.exeIajcde32.exePjenhm32.exeLihmjejl.exePpmdbe32.exeBaakhm32.exeAfkbib32.exeAmfcikek.exeMgqcmlgl.exeDlkepi32.exeGogangdc.exeEqijej32.exeQhooggdn.exeBhndldcn.exeBemgilhh.exeDpbheh32.exeEgllae32.exeEplkpgnh.exeCciemedf.exeAfcenm32.exeAnafhopc.exeEfaibbij.exeCdikkg32.exePqkmjh32.exeJgidao32.exeOkikfagn.exeAaaoij32.exeCohigamf.exeDlnbeh32.exeIcpigm32.exeAdnopfoj.exeEbmgcohn.exeHellne32.exeDcenlceh.exeCkoilb32.exeDccagcgk.exeEgoife32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhpiojfb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aiinen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dogefd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boqbfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ckafbbph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oiellh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jehkodcm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jifdebic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkcofe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Egjpkffe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hkpnhgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jnqphi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enihne32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bafidiio.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aiedjneg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enakbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ahokfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cjlgiqbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iggkllpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mbpnanch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ocimgp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amfcikek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Enakbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lekhfgfc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpdhklkl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbeknj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bmpfojmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iajcde32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjenhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lihmjejl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ppmdbe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baakhm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afkbib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Amfcikek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lbeknj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgqcmlgl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlkepi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gogangdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eqijej32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qhooggdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bhndldcn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bemgilhh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dpbheh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Egllae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eplkpgnh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cciemedf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Afcenm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anafhopc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efaibbij.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdikkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pqkmjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jgidao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Okikfagn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aaaoij32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cohigamf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlnbeh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icpigm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adnopfoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ebmgcohn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hellne32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcenlceh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ckoilb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dccagcgk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egoife32.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule \Windows\SysWOW64\Llccmb32.exe family_berbew \Windows\SysWOW64\Lekhfgfc.exe family_berbew C:\Windows\SysWOW64\Lkhpnnej.exe family_berbew \Windows\SysWOW64\Lkkmdn32.exe family_berbew C:\Windows\SysWOW64\Lkkmdn32.exe family_berbew C:\Windows\SysWOW64\Labhkh32.exe family_berbew \Windows\SysWOW64\Lkhpnnej.exe family_berbew C:\Windows\SysWOW64\Lplogdmj.exe family_berbew C:\Windows\SysWOW64\Lplogdmj.exe family_berbew \Windows\SysWOW64\Lplogdmj.exe family_berbew \Windows\SysWOW64\Mpolmdkg.exe family_berbew C:\Windows\SysWOW64\Mpolmdkg.exe family_berbew \Windows\SysWOW64\Mhjpaf32.exe family_berbew C:\Windows\SysWOW64\Mabejlob.exe family_berbew \Windows\SysWOW64\Mofecpnl.exe family_berbew C:\Windows\SysWOW64\Mlgigdoh.exe family_berbew C:\Windows\SysWOW64\Mlgigdoh.exe family_berbew C:\Windows\SysWOW64\Naikkk32.exe family_berbew C:\Windows\SysWOW64\Ncjgbcoi.exe family_berbew \Windows\SysWOW64\Ncjgbcoi.exe family_berbew C:\Windows\SysWOW64\Nhnfkigh.exe family_berbew C:\Windows\SysWOW64\Nfpjomgd.exe family_berbew C:\Windows\SysWOW64\Oicpfh32.exe family_berbew C:\Windows\SysWOW64\Pgobhcac.exe family_berbew C:\Windows\SysWOW64\Pcfcmd32.exe family_berbew C:\Windows\SysWOW64\Pfdpip32.exe family_berbew C:\Windows\SysWOW64\Pfflopdh.exe family_berbew C:\Windows\SysWOW64\Ppoqge32.exe family_berbew C:\Windows\SysWOW64\Pnbacbac.exe family_berbew C:\Windows\SysWOW64\Ahakmf32.exe family_berbew C:\Windows\SysWOW64\Adeplhib.exe family_berbew C:\Windows\SysWOW64\Ahchbf32.exe family_berbew C:\Windows\SysWOW64\Aiedjneg.exe family_berbew C:\Windows\SysWOW64\Adjigg32.exe family_berbew C:\Windows\SysWOW64\Aigaon32.exe family_berbew C:\Windows\SysWOW64\Admemg32.exe family_berbew C:\Windows\SysWOW64\Aenbdoii.exe family_berbew C:\Windows\SysWOW64\Aiinen32.exe family_berbew C:\Windows\SysWOW64\Ahokfj32.exe family_berbew C:\Windows\SysWOW64\Bingpmnl.exe family_berbew C:\Windows\SysWOW64\Boiccdnf.exe family_berbew C:\Windows\SysWOW64\Bhcdaibd.exe family_berbew C:\Windows\SysWOW64\Bkaqmeah.exe family_berbew C:\Windows\SysWOW64\Banepo32.exe family_berbew C:\Windows\SysWOW64\Bkfjhd32.exe family_berbew C:\Windows\SysWOW64\Bjijdadm.exe family_berbew C:\Windows\SysWOW64\Cjlgiqbk.exe family_berbew C:\Windows\SysWOW64\Cphlljge.exe family_berbew C:\Windows\SysWOW64\Clomqk32.exe family_berbew C:\Windows\SysWOW64\Cpjiajeb.exe family_berbew C:\Windows\SysWOW64\Cciemedf.exe family_berbew C:\Windows\SysWOW64\Cfinoq32.exe family_berbew C:\Windows\SysWOW64\Dflkdp32.exe family_berbew C:\Windows\SysWOW64\Dodonf32.exe family_berbew C:\Windows\SysWOW64\Dbbkja32.exe family_berbew C:\Windows\SysWOW64\Dkkpbgli.exe family_berbew C:\Windows\SysWOW64\Dmoipopd.exe family_berbew C:\Windows\SysWOW64\Doobajme.exe family_berbew C:\Windows\SysWOW64\Dgfjbgmh.exe family_berbew C:\Windows\SysWOW64\Eqonkmdh.exe family_berbew C:\Windows\SysWOW64\Eflgccbp.exe family_berbew C:\Windows\SysWOW64\Eijcpoac.exe family_berbew C:\Windows\SysWOW64\Ebbgid32.exe family_berbew C:\Windows\SysWOW64\Eilpeooq.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Llccmb32.exeLekhfgfc.exeLkhpnnej.exeLabhkh32.exeLkkmdn32.exeLplogdmj.exeMpolmdkg.exeMhjpaf32.exeMochnppo.exeMabejlob.exeMlgigdoh.exeMofecpnl.exeMhqfbebj.exeNjbcim32.exeNaikkk32.exeNcjgbcoi.exeNocemcbj.exeNgkmnacm.exeNjiijlbp.exeNofabc32.exeNfpjomgd.exeNhnfkigh.exeOicpfh32.exeOiellh32.exeOkchhc32.exeOgjimd32.exeOndajnme.exePgobhcac.exePipopl32.exePaggai32.exePcfcmd32.exePfdpip32.exePmnhfjmg.exePpmdbe32.exePfflopdh.exePiehkkcl.exePpoqge32.exePnbacbac.exePelipl32.exePijbfj32.exeQjknnbed.exeQeqbkkej.exeQhooggdn.exeQjmkcbcb.exeQmlgonbe.exeAdeplhib.exeAhakmf32.exeAhchbf32.exeAiedjneg.exeAmpqjm32.exeAdjigg32.exeAigaon32.exeApajlhka.exeAdmemg32.exeAfkbib32.exeAenbdoii.exeAiinen32.exeAoffmd32.exeAhokfj32.exeBoiccdnf.exeBingpmnl.exeBhcdaibd.exeBkaqmeah.exeBdjefj32.exepid process 2248 Llccmb32.exe 1320 Lekhfgfc.exe 2676 Lkhpnnej.exe 2744 Labhkh32.exe 2728 Lkkmdn32.exe 2524 Lplogdmj.exe 2176 Mpolmdkg.exe 952 Mhjpaf32.exe 956 Mochnppo.exe 2532 Mabejlob.exe 2840 Mlgigdoh.exe 640 Mofecpnl.exe 2012 Mhqfbebj.exe 2276 Njbcim32.exe 1020 Naikkk32.exe 1512 Ncjgbcoi.exe 648 Nocemcbj.exe 1060 Ngkmnacm.exe 3060 Njiijlbp.exe 2188 Nofabc32.exe 1208 Nfpjomgd.exe 1092 Nhnfkigh.exe 2292 Oicpfh32.exe 2552 Oiellh32.exe 3040 Okchhc32.exe 1772 Ogjimd32.exe 2940 Ondajnme.exe 2380 Pgobhcac.exe 2896 Pipopl32.exe 2516 Paggai32.exe 2880 Pcfcmd32.exe 2252 Pfdpip32.exe 856 Pmnhfjmg.exe 1668 Ppmdbe32.exe 1324 Pfflopdh.exe 1884 Piehkkcl.exe 2448 Ppoqge32.exe 572 Pnbacbac.exe 2592 Pelipl32.exe 2976 Pijbfj32.exe 2168 Qjknnbed.exe 1672 Qeqbkkej.exe 1924 Qhooggdn.exe 296 Qjmkcbcb.exe 2284 Qmlgonbe.exe 892 Adeplhib.exe 2948 Ahakmf32.exe 2616 Ahchbf32.exe 1448 Aiedjneg.exe 2980 Ampqjm32.exe 2824 Adjigg32.exe 2564 Aigaon32.exe 2716 Apajlhka.exe 1568 Admemg32.exe 1164 Afkbib32.exe 560 Aenbdoii.exe 2648 Aiinen32.exe 1624 Aoffmd32.exe 2972 Ahokfj32.exe 1696 Boiccdnf.exe 2316 Bingpmnl.exe 904 Bhcdaibd.exe 1428 Bkaqmeah.exe 1180 Bdjefj32.exe -
Loads dropped DLL 64 IoCs
Processes:
60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exeLlccmb32.exeLekhfgfc.exeLkhpnnej.exeLabhkh32.exeLkkmdn32.exeLplogdmj.exeMpolmdkg.exeMhjpaf32.exeMochnppo.exeMabejlob.exeMlgigdoh.exeMofecpnl.exeMhqfbebj.exeNjbcim32.exeNaikkk32.exeNcjgbcoi.exeNocemcbj.exeNgkmnacm.exeNjiijlbp.exeNofabc32.exeNfpjomgd.exeNhnfkigh.exeOicpfh32.exeOiellh32.exeOkchhc32.exeOgjimd32.exeOenifh32.exePgobhcac.exePipopl32.exePaggai32.exePcfcmd32.exepid process 2220 60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exe 2220 60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exe 2248 Llccmb32.exe 2248 Llccmb32.exe 1320 Lekhfgfc.exe 1320 Lekhfgfc.exe 2676 Lkhpnnej.exe 2676 Lkhpnnej.exe 2744 Labhkh32.exe 2744 Labhkh32.exe 2728 Lkkmdn32.exe 2728 Lkkmdn32.exe 2524 Lplogdmj.exe 2524 Lplogdmj.exe 2176 Mpolmdkg.exe 2176 Mpolmdkg.exe 952 Mhjpaf32.exe 952 Mhjpaf32.exe 956 Mochnppo.exe 956 Mochnppo.exe 2532 Mabejlob.exe 2532 Mabejlob.exe 2840 Mlgigdoh.exe 2840 Mlgigdoh.exe 640 Mofecpnl.exe 640 Mofecpnl.exe 2012 Mhqfbebj.exe 2012 Mhqfbebj.exe 2276 Njbcim32.exe 2276 Njbcim32.exe 1020 Naikkk32.exe 1020 Naikkk32.exe 1512 Ncjgbcoi.exe 1512 Ncjgbcoi.exe 648 Nocemcbj.exe 648 Nocemcbj.exe 1060 Ngkmnacm.exe 1060 Ngkmnacm.exe 3060 Njiijlbp.exe 3060 Njiijlbp.exe 2188 Nofabc32.exe 2188 Nofabc32.exe 1208 Nfpjomgd.exe 1208 Nfpjomgd.exe 1092 Nhnfkigh.exe 1092 Nhnfkigh.exe 2292 Oicpfh32.exe 2292 Oicpfh32.exe 2552 Oiellh32.exe 2552 Oiellh32.exe 3040 Okchhc32.exe 3040 Okchhc32.exe 1772 Ogjimd32.exe 1772 Ogjimd32.exe 1704 Oenifh32.exe 1704 Oenifh32.exe 2380 Pgobhcac.exe 2380 Pgobhcac.exe 2896 Pipopl32.exe 2896 Pipopl32.exe 2516 Paggai32.exe 2516 Paggai32.exe 2880 Pcfcmd32.exe 2880 Pcfcmd32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fhkpmjln.exeGgpimica.exeHhjhkq32.exeHlfdkoin.exeDpbheh32.exeDfamcogo.exeDdokpmfo.exeFjilieka.exeKeoapb32.exeClilkfnb.exeCddaphkn.exeDojald32.exeNocemcbj.exeAdeplhib.exeIblpjdpk.exeIqopea32.exeMlibjc32.exePgeefbhm.exeClomqk32.exeKkgmgmfd.exeKmmcjehm.exeIfnechbj.exeNjiijlbp.exePipopl32.exeEflgccbp.exeGejcjbah.exeHnagjbdf.exeIncpoe32.exeKaaijdgn.exeAhokfj32.exeBingpmnl.exeBhcdaibd.exeFfkcbgek.exeGfefiemq.exeLbcnhjnj.exeCkdjbh32.exeGpknlk32.exeAnojbobe.exeFidoim32.exeLkkmdn32.exeAhakmf32.exeCciemedf.exeGeolea32.exeIkddbj32.exeBdjefj32.exeEiaiqn32.exeFacdeo32.exeGonnhhln.exeAnafhopc.exeMhqfbebj.exePelipl32.exeDfgmhd32.exeIajcde32.exeKblhgk32.exeLkhpnnej.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ffnphf32.exe Fhkpmjln.exe File created C:\Windows\SysWOW64\Gkkemh32.exe Ggpimica.exe File created C:\Windows\SysWOW64\Oiogaqdb.dll Hhjhkq32.exe File created C:\Windows\SysWOW64\Alogkm32.dll Hlfdkoin.exe File created C:\Windows\SysWOW64\Dcadac32.exe Dpbheh32.exe File created C:\Windows\SysWOW64\Djmicm32.exe Dfamcogo.exe File created C:\Windows\SysWOW64\Mcbndm32.dll Ddokpmfo.exe File created C:\Windows\SysWOW64\Jkamkfgh.dll Fjilieka.exe File created C:\Windows\SysWOW64\Kgnnln32.exe Keoapb32.exe File created C:\Windows\SysWOW64\Cklmgb32.exe Clilkfnb.exe File created C:\Windows\SysWOW64\Olkbjhpi.dll Clilkfnb.exe File opened for modification C:\Windows\SysWOW64\Ckoilb32.exe Cddaphkn.exe File opened for modification C:\Windows\SysWOW64\Dcenlceh.exe Dojald32.exe File created C:\Windows\SysWOW64\Nplhpb32.dll Nocemcbj.exe File created C:\Windows\SysWOW64\Bmhljm32.dll Adeplhib.exe File opened for modification C:\Windows\SysWOW64\Iqopea32.exe Iblpjdpk.exe File opened for modification C:\Windows\SysWOW64\Icmlam32.exe Iqopea32.exe File created C:\Windows\SysWOW64\Obdkcckg.dll Mlibjc32.exe File opened for modification C:\Windows\SysWOW64\Peiepfgg.exe Pgeefbhm.exe File opened for modification C:\Windows\SysWOW64\Cpjiajeb.exe Clomqk32.exe File created C:\Windows\SysWOW64\Afldcl32.dll Kkgmgmfd.exe File opened for modification C:\Windows\SysWOW64\Kmopod32.exe Kmmcjehm.exe File opened for modification C:\Windows\SysWOW64\Jjjacf32.exe Ifnechbj.exe File created C:\Windows\SysWOW64\Bnebmi32.dll Njiijlbp.exe File opened for modification C:\Windows\SysWOW64\Paggai32.exe Pipopl32.exe File opened for modification C:\Windows\SysWOW64\Ahakmf32.exe Adeplhib.exe File created C:\Windows\SysWOW64\Eijcpoac.exe Eflgccbp.exe File created C:\Windows\SysWOW64\Ghhofmql.exe Gejcjbah.exe File created C:\Windows\SysWOW64\Hobcak32.exe Hnagjbdf.exe File opened for modification C:\Windows\SysWOW64\Icpigm32.exe Incpoe32.exe File created C:\Windows\SysWOW64\Kjjndgdk.dll Kaaijdgn.exe File opened for modification C:\Windows\SysWOW64\Boiccdnf.exe Ahokfj32.exe File opened for modification C:\Windows\SysWOW64\Bhcdaibd.exe Bingpmnl.exe File opened for modification C:\Windows\SysWOW64\Bkaqmeah.exe Bhcdaibd.exe File created C:\Windows\SysWOW64\Ongbcmlc.dll Ffkcbgek.exe File created C:\Windows\SysWOW64\Ghfbqn32.exe Gfefiemq.exe File created C:\Windows\SysWOW64\Lkncmmle.exe Lbcnhjnj.exe File created C:\Windows\SysWOW64\Ckoilb32.exe Cddaphkn.exe File created C:\Windows\SysWOW64\Bioggp32.dll Ckdjbh32.exe File created C:\Windows\SysWOW64\Gonnhhln.exe Gpknlk32.exe File created C:\Windows\SysWOW64\Ifjeknjd.dll Anojbobe.exe File created C:\Windows\SysWOW64\Clkmne32.dll Fidoim32.exe File created C:\Windows\SysWOW64\Effdfo32.dll Lkkmdn32.exe File created C:\Windows\SysWOW64\Ahchbf32.exe Ahakmf32.exe File opened for modification C:\Windows\SysWOW64\Ckdjbh32.exe Cciemedf.exe File created C:\Windows\SysWOW64\Ghmiam32.exe Geolea32.exe File opened for modification C:\Windows\SysWOW64\Incpoe32.exe Ikddbj32.exe File created C:\Windows\SysWOW64\Bghabf32.exe Bdjefj32.exe File created C:\Windows\SysWOW64\Cgqjffca.dll Eflgccbp.exe File created C:\Windows\SysWOW64\Acpmei32.dll Eiaiqn32.exe File created C:\Windows\SysWOW64\Fdapak32.exe Facdeo32.exe File opened for modification C:\Windows\SysWOW64\Gfefiemq.exe Gonnhhln.exe File created C:\Windows\SysWOW64\Abmbhn32.exe Anafhopc.exe File opened for modification C:\Windows\SysWOW64\Njbcim32.exe Mhqfbebj.exe File opened for modification C:\Windows\SysWOW64\Pijbfj32.exe Pelipl32.exe File created C:\Windows\SysWOW64\Dnneja32.exe Dfgmhd32.exe File created C:\Windows\SysWOW64\Jepgqikf.dll Iajcde32.exe File created C:\Windows\SysWOW64\Icpigm32.exe Incpoe32.exe File created C:\Windows\SysWOW64\Kfimidmd.dll Kblhgk32.exe File created C:\Windows\SysWOW64\Paggai32.exe Pipopl32.exe File created C:\Windows\SysWOW64\Ahakmf32.exe Adeplhib.exe File opened for modification C:\Windows\SysWOW64\Hlfdkoin.exe Hhjhkq32.exe File opened for modification C:\Windows\SysWOW64\Lkncmmle.exe Lbcnhjnj.exe File created C:\Windows\SysWOW64\Ieepoa32.dll Lkhpnnej.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 4728 4560 WerFault.exe -
Modifies registry class 64 IoCs
Processes:
Hkkalk32.exeOfhick32.exeQjjgclai.exeAjhgmpfg.exeAaaoij32.exeEqijej32.exeCngcjo32.exeKgnnln32.exeMpdnkb32.exeAlegac32.exeEdnpej32.exeEnhacojl.exeOenifh32.exePelipl32.exeCphlljge.exeDgodbh32.exeIcpigm32.exeNjbcim32.exeDdokpmfo.exePbfpik32.exeEjobhppq.exeDbhnhp32.exeEdkcojga.exeEhgppi32.exeEccmffjf.exeBjijdadm.exeGeolea32.exeBhigphio.exeAiinen32.exeHgilchkf.exeJjjacf32.exeCgejac32.exeMlgigdoh.exeDmoipopd.exeEilpeooq.exeIoijbj32.exePgbhabjp.exeAipddi32.exeAhgnke32.exeEbjglbml.exeBifgdk32.exeNofabc32.exeCpjiajeb.exeGfefiemq.exeInngcfid.exePeiepfgg.exeAdnopfoj.exeBioqclil.exeDcadac32.exeJbllihbf.exeJbnhng32.exeAplifb32.exeBiicik32.exePnbacbac.exeQfokbnip.exeDkqbaecc.exeDnneja32.exeGkkemh32.exeHnagjbdf.exeDhpiojfb.exePiehkkcl.exeGhfbqn32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hkkalk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ofhick32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpioaoic.dll" Qjjgclai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jneohcll.dll" Ajhgmpfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aaaoij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eqijej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cngcjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kgnnln32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mpdnkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Alegac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ednpej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgllco32.dll" Enhacojl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oenifh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pelipl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jaqlckoi.dll" Cphlljge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mghjoa32.dll" Dgodbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Icpigm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Njbcim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddokpmfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pbfpik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ejobhppq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dbhnhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Edkcojga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ehgppi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eccmffjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmeohn32.dll" Bjijdadm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Geolea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okphjd32.dll" Bhigphio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aiinen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hgilchkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jjjacf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjhfbach.dll" Cgejac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mlgigdoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dmoipopd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eilpeooq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcpdmj32.dll" Ioijbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pgbhabjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eilpeooq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfojbj32.dll" Icpigm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aipddi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ahgnke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ebjglbml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bifgdk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nofabc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cpjiajeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gfefiemq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehllae32.dll" Inngcfid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Peiepfgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Adnopfoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bioqclil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dcadac32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jbllihbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmngmj32.dll" Jbnhng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aplifb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Biicik32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pnbacbac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qfokbnip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dkqbaecc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dnneja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gkkemh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hnagjbdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajfaqa32.dll" Dhpiojfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmdmeemc.dll" Piehkkcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ghfbqn32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exeLlccmb32.exeLekhfgfc.exeLkhpnnej.exeLabhkh32.exeLkkmdn32.exeLplogdmj.exeMpolmdkg.exeMhjpaf32.exeMochnppo.exeMabejlob.exeMlgigdoh.exeMofecpnl.exeMhqfbebj.exeNjbcim32.exeNaikkk32.exedescription pid process target process PID 2220 wrote to memory of 2248 2220 60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exe Llccmb32.exe PID 2220 wrote to memory of 2248 2220 60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exe Llccmb32.exe PID 2220 wrote to memory of 2248 2220 60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exe Llccmb32.exe PID 2220 wrote to memory of 2248 2220 60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exe Llccmb32.exe PID 2248 wrote to memory of 1320 2248 Llccmb32.exe Lekhfgfc.exe PID 2248 wrote to memory of 1320 2248 Llccmb32.exe Lekhfgfc.exe PID 2248 wrote to memory of 1320 2248 Llccmb32.exe Lekhfgfc.exe PID 2248 wrote to memory of 1320 2248 Llccmb32.exe Lekhfgfc.exe PID 1320 wrote to memory of 2676 1320 Lekhfgfc.exe Lkhpnnej.exe PID 1320 wrote to memory of 2676 1320 Lekhfgfc.exe Lkhpnnej.exe PID 1320 wrote to memory of 2676 1320 Lekhfgfc.exe Lkhpnnej.exe PID 1320 wrote to memory of 2676 1320 Lekhfgfc.exe Lkhpnnej.exe PID 2676 wrote to memory of 2744 2676 Lkhpnnej.exe Labhkh32.exe PID 2676 wrote to memory of 2744 2676 Lkhpnnej.exe Labhkh32.exe PID 2676 wrote to memory of 2744 2676 Lkhpnnej.exe Labhkh32.exe PID 2676 wrote to memory of 2744 2676 Lkhpnnej.exe Labhkh32.exe PID 2744 wrote to memory of 2728 2744 Labhkh32.exe Lkkmdn32.exe PID 2744 wrote to memory of 2728 2744 Labhkh32.exe Lkkmdn32.exe PID 2744 wrote to memory of 2728 2744 Labhkh32.exe Lkkmdn32.exe PID 2744 wrote to memory of 2728 2744 Labhkh32.exe Lkkmdn32.exe PID 2728 wrote to memory of 2524 2728 Lkkmdn32.exe Lplogdmj.exe PID 2728 wrote to memory of 2524 2728 Lkkmdn32.exe Lplogdmj.exe PID 2728 wrote to memory of 2524 2728 Lkkmdn32.exe Lplogdmj.exe PID 2728 wrote to memory of 2524 2728 Lkkmdn32.exe Lplogdmj.exe PID 2524 wrote to memory of 2176 2524 Lplogdmj.exe Mpolmdkg.exe PID 2524 wrote to memory of 2176 2524 Lplogdmj.exe Mpolmdkg.exe PID 2524 wrote to memory of 2176 2524 Lplogdmj.exe Mpolmdkg.exe PID 2524 wrote to memory of 2176 2524 Lplogdmj.exe Mpolmdkg.exe PID 2176 wrote to memory of 952 2176 Mpolmdkg.exe Mhjpaf32.exe PID 2176 wrote to memory of 952 2176 Mpolmdkg.exe Mhjpaf32.exe PID 2176 wrote to memory of 952 2176 Mpolmdkg.exe Mhjpaf32.exe PID 2176 wrote to memory of 952 2176 Mpolmdkg.exe Mhjpaf32.exe PID 952 wrote to memory of 956 952 Mhjpaf32.exe Mochnppo.exe PID 952 wrote to memory of 956 952 Mhjpaf32.exe Mochnppo.exe PID 952 wrote to memory of 956 952 Mhjpaf32.exe Mochnppo.exe PID 952 wrote to memory of 956 952 Mhjpaf32.exe Mochnppo.exe PID 956 wrote to memory of 2532 956 Mochnppo.exe Mabejlob.exe PID 956 wrote to memory of 2532 956 Mochnppo.exe Mabejlob.exe PID 956 wrote to memory of 2532 956 Mochnppo.exe Mabejlob.exe PID 956 wrote to memory of 2532 956 Mochnppo.exe Mabejlob.exe PID 2532 wrote to memory of 2840 2532 Mabejlob.exe Mlgigdoh.exe PID 2532 wrote to memory of 2840 2532 Mabejlob.exe Mlgigdoh.exe PID 2532 wrote to memory of 2840 2532 Mabejlob.exe Mlgigdoh.exe PID 2532 wrote to memory of 2840 2532 Mabejlob.exe Mlgigdoh.exe PID 2840 wrote to memory of 640 2840 Mlgigdoh.exe Mofecpnl.exe PID 2840 wrote to memory of 640 2840 Mlgigdoh.exe Mofecpnl.exe PID 2840 wrote to memory of 640 2840 Mlgigdoh.exe Mofecpnl.exe PID 2840 wrote to memory of 640 2840 Mlgigdoh.exe Mofecpnl.exe PID 640 wrote to memory of 2012 640 Mofecpnl.exe Mhqfbebj.exe PID 640 wrote to memory of 2012 640 Mofecpnl.exe Mhqfbebj.exe PID 640 wrote to memory of 2012 640 Mofecpnl.exe Mhqfbebj.exe PID 640 wrote to memory of 2012 640 Mofecpnl.exe Mhqfbebj.exe PID 2012 wrote to memory of 2276 2012 Mhqfbebj.exe Njbcim32.exe PID 2012 wrote to memory of 2276 2012 Mhqfbebj.exe Njbcim32.exe PID 2012 wrote to memory of 2276 2012 Mhqfbebj.exe Njbcim32.exe PID 2012 wrote to memory of 2276 2012 Mhqfbebj.exe Njbcim32.exe PID 2276 wrote to memory of 1020 2276 Njbcim32.exe Naikkk32.exe PID 2276 wrote to memory of 1020 2276 Njbcim32.exe Naikkk32.exe PID 2276 wrote to memory of 1020 2276 Njbcim32.exe Naikkk32.exe PID 2276 wrote to memory of 1020 2276 Njbcim32.exe Naikkk32.exe PID 1020 wrote to memory of 1512 1020 Naikkk32.exe Ncjgbcoi.exe PID 1020 wrote to memory of 1512 1020 Naikkk32.exe Ncjgbcoi.exe PID 1020 wrote to memory of 1512 1020 Naikkk32.exe Ncjgbcoi.exe PID 1020 wrote to memory of 1512 1020 Naikkk32.exe Ncjgbcoi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exe"C:\Users\Admin\AppData\Local\Temp\60f8ed71c54793f7915cd87864256cdc5e4af3daf7b55e82511cc49143413e8a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\Llccmb32.exeC:\Windows\system32\Llccmb32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\Lekhfgfc.exeC:\Windows\system32\Lekhfgfc.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\Lkhpnnej.exeC:\Windows\system32\Lkhpnnej.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\Labhkh32.exeC:\Windows\system32\Labhkh32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Lkkmdn32.exeC:\Windows\system32\Lkkmdn32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\Lplogdmj.exeC:\Windows\system32\Lplogdmj.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\Mpolmdkg.exeC:\Windows\system32\Mpolmdkg.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\Mhjpaf32.exeC:\Windows\system32\Mhjpaf32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\Mochnppo.exeC:\Windows\system32\Mochnppo.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\Mabejlob.exeC:\Windows\system32\Mabejlob.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\Mlgigdoh.exeC:\Windows\system32\Mlgigdoh.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Mofecpnl.exeC:\Windows\system32\Mofecpnl.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\Mhqfbebj.exeC:\Windows\system32\Mhqfbebj.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\Njbcim32.exeC:\Windows\system32\Njbcim32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\Naikkk32.exeC:\Windows\system32\Naikkk32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\Ncjgbcoi.exeC:\Windows\system32\Ncjgbcoi.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1512 -
C:\Windows\SysWOW64\Nocemcbj.exeC:\Windows\system32\Nocemcbj.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:648 -
C:\Windows\SysWOW64\Ngkmnacm.exeC:\Windows\system32\Ngkmnacm.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1060 -
C:\Windows\SysWOW64\Njiijlbp.exeC:\Windows\system32\Njiijlbp.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3060 -
C:\Windows\SysWOW64\Nofabc32.exeC:\Windows\system32\Nofabc32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2188 -
C:\Windows\SysWOW64\Nfpjomgd.exeC:\Windows\system32\Nfpjomgd.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1208 -
C:\Windows\SysWOW64\Nhnfkigh.exeC:\Windows\system32\Nhnfkigh.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Windows\SysWOW64\Oicpfh32.exeC:\Windows\system32\Oicpfh32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2292 -
C:\Windows\SysWOW64\Oiellh32.exeC:\Windows\system32\Oiellh32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Windows\SysWOW64\Okchhc32.exeC:\Windows\system32\Okchhc32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3040 -
C:\Windows\SysWOW64\Ogjimd32.exeC:\Windows\system32\Ogjimd32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772 -
C:\Windows\SysWOW64\Ondajnme.exeC:\Windows\system32\Ondajnme.exe28⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\SysWOW64\Oenifh32.exeC:\Windows\system32\Oenifh32.exe29⤵
- Loads dropped DLL
- Modifies registry class
PID:1704 -
C:\Windows\SysWOW64\Pgobhcac.exeC:\Windows\system32\Pgobhcac.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2380 -
C:\Windows\SysWOW64\Pipopl32.exeC:\Windows\system32\Pipopl32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2896 -
C:\Windows\SysWOW64\Paggai32.exeC:\Windows\system32\Paggai32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2516 -
C:\Windows\SysWOW64\Pcfcmd32.exeC:\Windows\system32\Pcfcmd32.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2880 -
C:\Windows\SysWOW64\Pfdpip32.exeC:\Windows\system32\Pfdpip32.exe34⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\Pmnhfjmg.exeC:\Windows\system32\Pmnhfjmg.exe35⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\Ppmdbe32.exeC:\Windows\system32\Ppmdbe32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\Pfflopdh.exeC:\Windows\system32\Pfflopdh.exe37⤵
- Executes dropped EXE
PID:1324 -
C:\Windows\SysWOW64\Piehkkcl.exeC:\Windows\system32\Piehkkcl.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:1884 -
C:\Windows\SysWOW64\Ppoqge32.exeC:\Windows\system32\Ppoqge32.exe39⤵
- Executes dropped EXE
PID:2448 -
C:\Windows\SysWOW64\Pnbacbac.exeC:\Windows\system32\Pnbacbac.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:572 -
C:\Windows\SysWOW64\Pelipl32.exeC:\Windows\system32\Pelipl32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2592 -
C:\Windows\SysWOW64\Pijbfj32.exeC:\Windows\system32\Pijbfj32.exe42⤵
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\Qjknnbed.exeC:\Windows\system32\Qjknnbed.exe43⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\Qeqbkkej.exeC:\Windows\system32\Qeqbkkej.exe44⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\Qhooggdn.exeC:\Windows\system32\Qhooggdn.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\Qjmkcbcb.exeC:\Windows\system32\Qjmkcbcb.exe46⤵
- Executes dropped EXE
PID:296 -
C:\Windows\SysWOW64\Qmlgonbe.exeC:\Windows\system32\Qmlgonbe.exe47⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\Adeplhib.exeC:\Windows\system32\Adeplhib.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:892 -
C:\Windows\SysWOW64\Ahakmf32.exeC:\Windows\system32\Ahakmf32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2948 -
C:\Windows\SysWOW64\Ahchbf32.exeC:\Windows\system32\Ahchbf32.exe50⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\Aiedjneg.exeC:\Windows\system32\Aiedjneg.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1448 -
C:\Windows\SysWOW64\Ampqjm32.exeC:\Windows\system32\Ampqjm32.exe52⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\Adjigg32.exeC:\Windows\system32\Adjigg32.exe53⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Aigaon32.exeC:\Windows\system32\Aigaon32.exe54⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\Apajlhka.exeC:\Windows\system32\Apajlhka.exe55⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Admemg32.exeC:\Windows\system32\Admemg32.exe56⤵
- Executes dropped EXE
PID:1568 -
C:\Windows\SysWOW64\Afkbib32.exeC:\Windows\system32\Afkbib32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1164 -
C:\Windows\SysWOW64\Aenbdoii.exeC:\Windows\system32\Aenbdoii.exe58⤵
- Executes dropped EXE
PID:560 -
C:\Windows\SysWOW64\Aiinen32.exeC:\Windows\system32\Aiinen32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2648 -
C:\Windows\SysWOW64\Aoffmd32.exeC:\Windows\system32\Aoffmd32.exe60⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\Ahokfj32.exeC:\Windows\system32\Ahokfj32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\Boiccdnf.exeC:\Windows\system32\Boiccdnf.exe62⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\Bingpmnl.exeC:\Windows\system32\Bingpmnl.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2316 -
C:\Windows\SysWOW64\Bhcdaibd.exeC:\Windows\system32\Bhcdaibd.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:904 -
C:\Windows\SysWOW64\Bkaqmeah.exeC:\Windows\system32\Bkaqmeah.exe65⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\SysWOW64\Bdjefj32.exeC:\Windows\system32\Bdjefj32.exe66⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1180 -
C:\Windows\SysWOW64\Bghabf32.exeC:\Windows\system32\Bghabf32.exe67⤵PID:2684
-
C:\Windows\SysWOW64\Bopicc32.exeC:\Windows\system32\Bopicc32.exe68⤵PID:2432
-
C:\Windows\SysWOW64\Banepo32.exeC:\Windows\system32\Banepo32.exe69⤵PID:2612
-
C:\Windows\SysWOW64\Bkfjhd32.exeC:\Windows\system32\Bkfjhd32.exe70⤵PID:1564
-
C:\Windows\SysWOW64\Bjijdadm.exeC:\Windows\system32\Bjijdadm.exe71⤵
- Modifies registry class
PID:308 -
C:\Windows\SysWOW64\Bcaomf32.exeC:\Windows\system32\Bcaomf32.exe72⤵PID:676
-
C:\Windows\SysWOW64\Cjlgiqbk.exeC:\Windows\system32\Cjlgiqbk.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2860 -
C:\Windows\SysWOW64\Cngcjo32.exeC:\Windows\system32\Cngcjo32.exe74⤵
- Modifies registry class
PID:3068 -
C:\Windows\SysWOW64\Cllpkl32.exeC:\Windows\system32\Cllpkl32.exe75⤵PID:1888
-
C:\Windows\SysWOW64\Cphlljge.exeC:\Windows\system32\Cphlljge.exe76⤵
- Modifies registry class
PID:2760 -
C:\Windows\SysWOW64\Cgbdhd32.exeC:\Windows\system32\Cgbdhd32.exe77⤵PID:1732
-
C:\Windows\SysWOW64\Clomqk32.exeC:\Windows\system32\Clomqk32.exe78⤵
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\Cpjiajeb.exeC:\Windows\system32\Cpjiajeb.exe79⤵
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Cciemedf.exeC:\Windows\system32\Cciemedf.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1344 -
C:\Windows\SysWOW64\Ckdjbh32.exeC:\Windows\system32\Ckdjbh32.exe81⤵
- Drops file in System32 directory
PID:2060 -
C:\Windows\SysWOW64\Cckace32.exeC:\Windows\system32\Cckace32.exe82⤵PID:2088
-
C:\Windows\SysWOW64\Cfinoq32.exeC:\Windows\system32\Cfinoq32.exe83⤵PID:2360
-
C:\Windows\SysWOW64\Dflkdp32.exeC:\Windows\system32\Dflkdp32.exe84⤵PID:2472
-
C:\Windows\SysWOW64\Ddokpmfo.exeC:\Windows\system32\Ddokpmfo.exe85⤵
- Drops file in System32 directory
- Modifies registry class
PID:604 -
C:\Windows\SysWOW64\Dgmglh32.exeC:\Windows\system32\Dgmglh32.exe86⤵PID:1964
-
C:\Windows\SysWOW64\Dodonf32.exeC:\Windows\system32\Dodonf32.exe87⤵PID:1788
-
C:\Windows\SysWOW64\Dbbkja32.exeC:\Windows\system32\Dbbkja32.exe88⤵PID:772
-
C:\Windows\SysWOW64\Dgodbh32.exeC:\Windows\system32\Dgodbh32.exe89⤵
- Modifies registry class
PID:1544 -
C:\Windows\SysWOW64\Dkkpbgli.exeC:\Windows\system32\Dkkpbgli.exe90⤵PID:3036
-
C:\Windows\SysWOW64\Dmoipopd.exeC:\Windows\system32\Dmoipopd.exe91⤵
- Modifies registry class
PID:820 -
C:\Windows\SysWOW64\Dfgmhd32.exeC:\Windows\system32\Dfgmhd32.exe92⤵
- Drops file in System32 directory
PID:1756 -
C:\Windows\SysWOW64\Dnneja32.exeC:\Windows\system32\Dnneja32.exe93⤵
- Modifies registry class
PID:2440 -
C:\Windows\SysWOW64\Dmafennb.exeC:\Windows\system32\Dmafennb.exe94⤵PID:2404
-
C:\Windows\SysWOW64\Doobajme.exeC:\Windows\system32\Doobajme.exe95⤵PID:860
-
C:\Windows\SysWOW64\Dgfjbgmh.exeC:\Windows\system32\Dgfjbgmh.exe96⤵PID:2400
-
C:\Windows\SysWOW64\Eqonkmdh.exeC:\Windows\system32\Eqonkmdh.exe97⤵PID:764
-
C:\Windows\SysWOW64\Eflgccbp.exeC:\Windows\system32\Eflgccbp.exe98⤵
- Drops file in System32 directory
PID:3016 -
C:\Windows\SysWOW64\Eijcpoac.exeC:\Windows\system32\Eijcpoac.exe99⤵PID:1764
-
C:\Windows\SysWOW64\Ebbgid32.exeC:\Windows\system32\Ebbgid32.exe100⤵PID:2352
-
C:\Windows\SysWOW64\Eilpeooq.exeC:\Windows\system32\Eilpeooq.exe101⤵
- Modifies registry class
PID:2812 -
C:\Windows\SysWOW64\Enihne32.exeC:\Windows\system32\Enihne32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1948 -
C:\Windows\SysWOW64\Ebedndfa.exeC:\Windows\system32\Ebedndfa.exe103⤵PID:1076
-
C:\Windows\SysWOW64\Egamfkdh.exeC:\Windows\system32\Egamfkdh.exe104⤵PID:2044
-
C:\Windows\SysWOW64\Enkece32.exeC:\Windows\system32\Enkece32.exe105⤵PID:1748
-
C:\Windows\SysWOW64\Ebgacddo.exeC:\Windows\system32\Ebgacddo.exe106⤵PID:2148
-
C:\Windows\SysWOW64\Eiaiqn32.exeC:\Windows\system32\Eiaiqn32.exe107⤵
- Drops file in System32 directory
PID:1736 -
C:\Windows\SysWOW64\Ennaieib.exeC:\Windows\system32\Ennaieib.exe108⤵PID:112
-
C:\Windows\SysWOW64\Ealnephf.exeC:\Windows\system32\Ealnephf.exe109⤵PID:3000
-
C:\Windows\SysWOW64\Fehjeo32.exeC:\Windows\system32\Fehjeo32.exe110⤵PID:2424
-
C:\Windows\SysWOW64\Flabbihl.exeC:\Windows\system32\Flabbihl.exe111⤵PID:1156
-
C:\Windows\SysWOW64\Fjdbnf32.exeC:\Windows\system32\Fjdbnf32.exe112⤵PID:2500
-
C:\Windows\SysWOW64\Fmcoja32.exeC:\Windows\system32\Fmcoja32.exe113⤵PID:1212
-
C:\Windows\SysWOW64\Ffkcbgek.exeC:\Windows\system32\Ffkcbgek.exe114⤵
- Drops file in System32 directory
PID:1232 -
C:\Windows\SysWOW64\Fmekoalh.exeC:\Windows\system32\Fmekoalh.exe115⤵PID:2936
-
C:\Windows\SysWOW64\Fpdhklkl.exeC:\Windows\system32\Fpdhklkl.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2160 -
C:\Windows\SysWOW64\Fhkpmjln.exeC:\Windows\system32\Fhkpmjln.exe117⤵
- Drops file in System32 directory
PID:584 -
C:\Windows\SysWOW64\Ffnphf32.exeC:\Windows\system32\Ffnphf32.exe118⤵PID:2700
-
C:\Windows\SysWOW64\Fjilieka.exeC:\Windows\system32\Fjilieka.exe119⤵
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\Facdeo32.exeC:\Windows\system32\Facdeo32.exe120⤵
- Drops file in System32 directory
PID:1708 -
C:\Windows\SysWOW64\Fdapak32.exeC:\Windows\system32\Fdapak32.exe121⤵PID:1656
-
C:\Windows\SysWOW64\Gpknlk32.exeC:\Windows\system32\Gpknlk32.exe122⤵
- Drops file in System32 directory
PID:2600
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-