Analysis
-
max time kernel
153s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe
Resource
win10v2004-20240226-en
General
-
Target
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe
-
Size
128KB
-
MD5
0853840bd78999fb653966990875e2d0
-
SHA1
42431b86ab78710bd94ec53f2a631b114270c608
-
SHA256
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398
-
SHA512
670d7f196606437d5971f8f6759cb661f9d1d3e70eb0bacf6423ad87bdf90da99093119f4dc9f9170499722c2e500183469f2be5c7b70a7e657223356c1ab93a
-
SSDEEP
3072:S1l978RGcSroM8ieIN908uFafmHURHAVgnvedh6:ED78RGroxiz908uF8YU8gnve7
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Cefolk32.exeNppkkj32.exeQjiaak32.exeFiggnm32.exe6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exeGgoaje32.exeMcbpcm32.exeMmkdlbea.exeDpfcpcam.exeDoeifpkk.exeGkjocm32.exeObgccn32.exePmoabn32.exeMilinkgf.exeNebmnqdf.exeFdcjfg32.exeIooimi32.exeOendaipn.exeAhpdcn32.exeOhahkojp.exeDdklnh32.exeAjkgmd32.exeFmikoggm.exeKnlbipjb.exeMmjlkb32.exeFlgadake.exeQimfoe32.exeQpikao32.exeJbdbcl32.exeAichng32.exeMacdgn32.exeHkpqdifa.exeIcqmncof.exeHpchdf32.exeBhhiocdg.exeEcoahmhd.exeQgmbkp32.exeEhlhbn32.exeAijeme32.exePmlmdd32.exeDpnbhl32.exeInlibb32.exeBjfjee32.exeImofip32.exeFfahnd32.exeLkdgqbag.exeDkedjbgg.exeBagfeioc.exeLfeaegdi.exeQlggcp32.exeCqkkcghn.exeLkhbko32.exeNlnbqjjq.exeFmdach32.exeJebfgl32.exeJmdjha32.exeGmkbgf32.exeFelbhdgd.exeLpapiipo.exeGpcffalc.exeHfiffd32.exeFkiobhac.exeGbecljnl.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cefolk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nppkkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qjiaak32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Figgnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggoaje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcbpcm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmkdlbea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpfcpcam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Doeifpkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gkjocm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obgccn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmoabn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Milinkgf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nebmnqdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fdcjfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iooimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oendaipn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahpdcn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohahkojp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ddklnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajkgmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fmikoggm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Knlbipjb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmjlkb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flgadake.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qimfoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qpikao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbdbcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aichng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Macdgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hkpqdifa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Icqmncof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hpchdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bhhiocdg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecoahmhd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgmbkp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehlhbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aijeme32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmlmdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpnbhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Inlibb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Figgnm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjfjee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Imofip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ffahnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lkdgqbag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkedjbgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bagfeioc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lfeaegdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qlggcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cqkkcghn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lkhbko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nlnbqjjq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmdach32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jebfgl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmdjha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gmkbgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Felbhdgd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpapiipo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gpcffalc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hfiffd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fkiobhac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gbecljnl.exe -
Executes dropped EXE 64 IoCs
Processes:
Infhebbh.exeLkqgno32.exeMclhjkfa.exeMoefdljc.exeMllccpfj.exeNkapelka.exeNfiagd32.exeNdpjnq32.exePodkmgop.exePmjhlklg.exePehjfm32.exeAfqifo32.exeBblcfo32.exeBedbhi32.exeCleqfb32.exeCmgjee32.exeDdhhbngi.exeEmgblc32.exeElolco32.exeFfpcbchm.exeGloejmld.exeGnckooob.exeHcbpme32.exeHcembe32.exeHcifmdeo.exeIcqmncof.exeJgcooaah.exeJmgmhgig.exeKnmpbi32.exeLjncnhhk.exeMdmngm32.exeMmjlkb32.exeNhdicjfp.exeNaaghoik.exeOacdmo32.exeOklifdmi.exeOgcike32.exeOdkcpi32.exePdpmkhjl.exePdeffgff.exeQomghp32.exeAijeme32.exeBkadoo32.exeBfieagka.exeCfbhhfbg.exeCehdib32.exeCejaobel.exeEldbbjof.exeEipilmgh.exeFcodfa32.exeGebimmco.exeGplged32.exeGhgljg32.exeHjieii32.exeHhobjf32.exeHcdfho32.exeHphfac32.exeHgbonm32.exeHlogfd32.exeHjbhph32.exeIjedehgm.exeIcminm32.exeJokpcmmj.exeJicdlc32.exepid process 3576 Infhebbh.exe 3356 Lkqgno32.exe 4232 Mclhjkfa.exe 1548 Moefdljc.exe 1284 Mllccpfj.exe 2628 Nkapelka.exe 912 Nfiagd32.exe 1504 Ndpjnq32.exe 1040 Podkmgop.exe 5012 Pmjhlklg.exe 2764 Pehjfm32.exe 4284 Afqifo32.exe 3348 Bblcfo32.exe 1112 Bedbhi32.exe 3944 Cleqfb32.exe 4472 Cmgjee32.exe 4660 Ddhhbngi.exe 2208 Emgblc32.exe 3488 Elolco32.exe 800 Ffpcbchm.exe 3704 Gloejmld.exe 3152 Gnckooob.exe 1752 Hcbpme32.exe 4300 Hcembe32.exe 4016 Hcifmdeo.exe 4936 Icqmncof.exe 3460 Jgcooaah.exe 3144 Jmgmhgig.exe 556 Knmpbi32.exe 872 Ljncnhhk.exe 1324 Mdmngm32.exe 1396 Mmjlkb32.exe 4772 Nhdicjfp.exe 1312 Naaghoik.exe 4500 Oacdmo32.exe 2900 Oklifdmi.exe 2536 Ogcike32.exe 2344 Odkcpi32.exe 3580 Pdpmkhjl.exe 2992 Pdeffgff.exe 3836 Qomghp32.exe 3956 Aijeme32.exe 3300 Bkadoo32.exe 1152 Bfieagka.exe 4956 Cfbhhfbg.exe 1552 Cehdib32.exe 1028 Cejaobel.exe 3604 Eldbbjof.exe 2280 Eipilmgh.exe 1020 Fcodfa32.exe 2464 Gebimmco.exe 4912 Gplged32.exe 4276 Ghgljg32.exe 4448 Hjieii32.exe 4204 Hhobjf32.exe 228 Hcdfho32.exe 1708 Hphfac32.exe 4700 Hgbonm32.exe 4252 Hlogfd32.exe 3968 Hjbhph32.exe 1848 Ijedehgm.exe 312 Icminm32.exe 2616 Jokpcmmj.exe 3168 Jicdlc32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fkgbli32.exeNlnbqjjq.exeGfgnnedj.exeMglhgg32.exeOeffip32.exeBcpblo32.exeEoepohml.exeHphfac32.exeEkcplp32.exeHgieipmo.exeGmojep32.exeKjblcj32.exeMfnojh32.exeFeofmf32.exeLfnfhg32.exeNppfnige.exeAakelfhg.exeFngcfikb.exeBdmpljlj.exeJncfmgfi.exeInlibb32.exePhodlm32.exeEehime32.exeHcdfho32.exePnplqn32.exeOlfolp32.exeMceccbpj.exePlpjhk32.exeMcbpcm32.exeEacaej32.exeIaqapggb.exeDocckfai.exeEbpjjk32.exeInfhebbh.exePehjfm32.exeCleqfb32.exeDdhhbngi.exePbbnbkpe.exeEnfjdh32.exeCllkcbnl.exeFfahnd32.exeGokdoj32.exeHcpcehko.exePggbdgmm.exeCfdhdn32.exeEhndhn32.exeKnmpbi32.exeFcodfa32.exeHlogfd32.exePdoofl32.exeGikkof32.exeDigeaenp.exeFiggnm32.exeCjdfgc32.exeKagimmol.exeCknbkpif.exeCleeafbi.exeJhqqlmba.exeNnlhod32.exeJkjclk32.exeOaqbdc32.exeJjhjae32.exeKimgba32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Femgia32.exe Fkgbli32.exe File opened for modification C:\Windows\SysWOW64\Oeffip32.exe Nlnbqjjq.exe File created C:\Windows\SysWOW64\Ipnbhc32.dll Gfgnnedj.exe File opened for modification C:\Windows\SysWOW64\Nnfpcada.exe Mglhgg32.exe File created C:\Windows\SysWOW64\Ocjgcd32.exe Oeffip32.exe File created C:\Windows\SysWOW64\Ploojp32.dll Bcpblo32.exe File opened for modification C:\Windows\SysWOW64\Eqgmgq32.exe Eoepohml.exe File created C:\Windows\SysWOW64\Hgbonm32.exe Hphfac32.exe File created C:\Windows\SysWOW64\Cplpalhg.dll Ekcplp32.exe File opened for modification C:\Windows\SysWOW64\Haoighmd.exe Hgieipmo.exe File created C:\Windows\SysWOW64\Gfgnnedj.exe Gmojep32.exe File opened for modification C:\Windows\SysWOW64\Kckqlpck.exe Kjblcj32.exe File created C:\Windows\SysWOW64\Fhhgdagj.dll Mfnojh32.exe File created C:\Windows\SysWOW64\Qhnpleki.dll Feofmf32.exe File created C:\Windows\SysWOW64\Lfpcngdo.exe Lfnfhg32.exe File opened for modification C:\Windows\SysWOW64\Ofjokc32.exe Nppfnige.exe File created C:\Windows\SysWOW64\Alqjiohm.exe Aakelfhg.exe File created C:\Windows\SysWOW64\Clbhqcam.dll Fngcfikb.exe File created C:\Windows\SysWOW64\Pkmfbjni.dll Bdmpljlj.exe File created C:\Windows\SysWOW64\Jnfcbg32.exe Jncfmgfi.exe File created C:\Windows\SysWOW64\Igdnkhoe.exe Inlibb32.exe File created C:\Windows\SysWOW64\Oipnkcnm.dll Phodlm32.exe File created C:\Windows\SysWOW64\Fblifijc.exe Eehime32.exe File opened for modification C:\Windows\SysWOW64\Hphfac32.exe Hcdfho32.exe File opened for modification C:\Windows\SysWOW64\Phkmoc32.exe Pnplqn32.exe File created C:\Windows\SysWOW64\Khdbam32.dll Olfolp32.exe File created C:\Windows\SysWOW64\Khnhkdjh.dll Mceccbpj.exe File created C:\Windows\SysWOW64\Pdkolm32.exe Plpjhk32.exe File created C:\Windows\SysWOW64\Mmkdlbea.exe Mcbpcm32.exe File opened for modification C:\Windows\SysWOW64\Eaenkj32.exe Eacaej32.exe File created C:\Windows\SysWOW64\Jopaejlo.exe Iaqapggb.exe File created C:\Windows\SysWOW64\Dljqjjnp.exe Docckfai.exe File opened for modification C:\Windows\SysWOW64\Eodjdocj.exe Ebpjjk32.exe File opened for modification C:\Windows\SysWOW64\Lkqgno32.exe Infhebbh.exe File opened for modification C:\Windows\SysWOW64\Afqifo32.exe Pehjfm32.exe File created C:\Windows\SysWOW64\Cmgjee32.exe Cleqfb32.exe File opened for modification C:\Windows\SysWOW64\Emgblc32.exe Ddhhbngi.exe File opened for modification C:\Windows\SysWOW64\Qimfoe32.exe Pbbnbkpe.exe File opened for modification C:\Windows\SysWOW64\Fmhcda32.exe Fngcfikb.exe File opened for modification C:\Windows\SysWOW64\Ecccmo32.exe Enfjdh32.exe File created C:\Windows\SysWOW64\Dnekcd32.exe Cllkcbnl.exe File created C:\Windows\SysWOW64\Bjqafj32.dll Ffahnd32.exe File created C:\Windows\SysWOW64\Ampdej32.dll Gokdoj32.exe File created C:\Windows\SysWOW64\Hillnoif.exe Hcpcehko.exe File opened for modification C:\Windows\SysWOW64\Pcncjh32.exe Pggbdgmm.exe File created C:\Windows\SysWOW64\Dmpmfg32.exe Cfdhdn32.exe File created C:\Windows\SysWOW64\Cknjjlee.dll Ehndhn32.exe File created C:\Windows\SysWOW64\Mqhali32.dll Knmpbi32.exe File created C:\Windows\SysWOW64\Gebimmco.exe Fcodfa32.exe File opened for modification C:\Windows\SysWOW64\Hjbhph32.exe Hlogfd32.exe File opened for modification C:\Windows\SysWOW64\Pljcjn32.exe Pdoofl32.exe File created C:\Windows\SysWOW64\Pappijpj.dll Gikkof32.exe File opened for modification C:\Windows\SysWOW64\Ebpjjk32.exe Digeaenp.exe File opened for modification C:\Windows\SysWOW64\Fijdcljo.exe Figgnm32.exe File opened for modification C:\Windows\SysWOW64\Cejjdlap.exe Cjdfgc32.exe File created C:\Windows\SysWOW64\Lcifde32.exe Kagimmol.exe File created C:\Windows\SysWOW64\Cqkkcghn.exe Cknbkpif.exe File created C:\Windows\SysWOW64\Clgbfe32.exe Cleeafbi.exe File created C:\Windows\SysWOW64\Bdchhk32.dll Jhqqlmba.exe File created C:\Windows\SysWOW64\Ngdmhimb.exe Nnlhod32.exe File opened for modification C:\Windows\SysWOW64\Jgqdal32.exe Jkjclk32.exe File opened for modification C:\Windows\SysWOW64\Olfgbl32.exe Oaqbdc32.exe File opened for modification C:\Windows\SysWOW64\Kimgba32.exe Jjhjae32.exe File opened for modification C:\Windows\SysWOW64\Ljhchc32.exe Kimgba32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5256 8780 WerFault.exe Fkjmeggp.exe -
Modifies registry class 64 IoCs
Processes:
Ebpjjk32.exePnmojp32.exeNkapelka.exeKeoeel32.exeAhbacq32.exeGikkof32.exePlpjhk32.exeKdipce32.exeJcphkhad.exeCdbmifdl.exeDiffabgj.exePaelpcgc.exeBhennm32.exePlcmiofg.exeEhocjo32.exeGdaomobj.exeGhgljg32.exeOickbjmb.exeMjneec32.exeFiggnm32.exe6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exeGbecljnl.exeLpcedbjp.exeHalmaiog.exeHgieipmo.exeQgmbkp32.exeDpfcpcam.exeCjomldfp.exeCjdfgc32.exeOqdgan32.exePggbdgmm.exeMlipomli.exeQdihfq32.exeOgkcihgj.exeAegbji32.exeFkgbli32.exePgfljqia.exeKanffogf.exePdkolm32.exeAabafkgh.exeHcdfho32.exePhekliab.exeOlfgbl32.exeIpflcnln.exeKglmbd32.exeQobhepjf.exeJjhjae32.exeHmjmnpmb.exeFbihdhhf.exeAfcffb32.exeDpmknf32.exeCpbgnlfo.exeQjmeaafi.exeEfpofi32.exeEmgblc32.exeHcembe32.exeHoibmmpi.exeEdihof32.exeQqamieno.exeOdkcpi32.exeGmimll32.exeMngepb32.exeQemoff32.exeOaqbdc32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlalhlfd.dll" Ebpjjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdlkho32.dll" Pnmojp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mokjbgbf.dll" Nkapelka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Keoeel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbfkhg32.dll" Ahbacq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gikkof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glkien32.dll" Plpjhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kdipce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlbkklqq.dll" Jcphkhad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cdbmifdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qjkjgl32.dll" Diffabgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fielal32.dll" Paelpcgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkbdph32.dll" Bhennm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Edjmknkk.dll" Plcmiofg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ehocjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahpnbdnc.dll" Gdaomobj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbhmepaa.dll" Ghgljg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdgdii32.dll" Oickbjmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhcgba32.dll" Mjneec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Figgnm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gbecljnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lpcedbjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Halmaiog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hgieipmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qgmbkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dpfcpcam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cjomldfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cjdfgc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oqdgan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pggbdgmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejohcl32.dll" Mlipomli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qdihfq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naaeedej.dll" Ogkcihgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aegbji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fkgbli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hqpnmlqd.dll" Pgfljqia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfpfhg32.dll" Kanffogf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pdkolm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aabafkgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hcdfho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oobknhji.dll" Phekliab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehonkbcm.dll" Olfgbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ipflcnln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Homkem32.dll" Kglmbd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qobhepjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jjhjae32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hmjmnpmb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fbihdhhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahnkoaah.dll" Afcffb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dpmknf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohiajebm.dll" Cpbgnlfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qjmeaafi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Efpofi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbpedmcb.dll" Emgblc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hcembe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcheaong.dll" Hoibmmpi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Edihof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qqamieno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Odkcpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcflcnam.dll" Gmimll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mngepb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bggijc32.dll" Qemoff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohfjcckk.dll" Oaqbdc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exeInfhebbh.exeLkqgno32.exeMclhjkfa.exeMoefdljc.exeMllccpfj.exeNkapelka.exeNfiagd32.exeNdpjnq32.exePodkmgop.exePmjhlklg.exePehjfm32.exeAfqifo32.exeBblcfo32.exeBedbhi32.exeCleqfb32.exeCmgjee32.exeDdhhbngi.exeEmgblc32.exeElolco32.exeFfpcbchm.exeGloejmld.exedescription pid process target process PID 4656 wrote to memory of 3576 4656 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Infhebbh.exe PID 4656 wrote to memory of 3576 4656 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Infhebbh.exe PID 4656 wrote to memory of 3576 4656 6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe Infhebbh.exe PID 3576 wrote to memory of 3356 3576 Infhebbh.exe Lkqgno32.exe PID 3576 wrote to memory of 3356 3576 Infhebbh.exe Lkqgno32.exe PID 3576 wrote to memory of 3356 3576 Infhebbh.exe Lkqgno32.exe PID 3356 wrote to memory of 4232 3356 Lkqgno32.exe Mclhjkfa.exe PID 3356 wrote to memory of 4232 3356 Lkqgno32.exe Mclhjkfa.exe PID 3356 wrote to memory of 4232 3356 Lkqgno32.exe Mclhjkfa.exe PID 4232 wrote to memory of 1548 4232 Mclhjkfa.exe Moefdljc.exe PID 4232 wrote to memory of 1548 4232 Mclhjkfa.exe Moefdljc.exe PID 4232 wrote to memory of 1548 4232 Mclhjkfa.exe Moefdljc.exe PID 1548 wrote to memory of 1284 1548 Moefdljc.exe Mllccpfj.exe PID 1548 wrote to memory of 1284 1548 Moefdljc.exe Mllccpfj.exe PID 1548 wrote to memory of 1284 1548 Moefdljc.exe Mllccpfj.exe PID 1284 wrote to memory of 2628 1284 Mllccpfj.exe Nkapelka.exe PID 1284 wrote to memory of 2628 1284 Mllccpfj.exe Nkapelka.exe PID 1284 wrote to memory of 2628 1284 Mllccpfj.exe Nkapelka.exe PID 2628 wrote to memory of 912 2628 Nkapelka.exe Nfiagd32.exe PID 2628 wrote to memory of 912 2628 Nkapelka.exe Nfiagd32.exe PID 2628 wrote to memory of 912 2628 Nkapelka.exe Nfiagd32.exe PID 912 wrote to memory of 1504 912 Nfiagd32.exe Ndpjnq32.exe PID 912 wrote to memory of 1504 912 Nfiagd32.exe Ndpjnq32.exe PID 912 wrote to memory of 1504 912 Nfiagd32.exe Ndpjnq32.exe PID 1504 wrote to memory of 1040 1504 Ndpjnq32.exe Podkmgop.exe PID 1504 wrote to memory of 1040 1504 Ndpjnq32.exe Podkmgop.exe PID 1504 wrote to memory of 1040 1504 Ndpjnq32.exe Podkmgop.exe PID 1040 wrote to memory of 5012 1040 Podkmgop.exe Pmjhlklg.exe PID 1040 wrote to memory of 5012 1040 Podkmgop.exe Pmjhlklg.exe PID 1040 wrote to memory of 5012 1040 Podkmgop.exe Pmjhlklg.exe PID 5012 wrote to memory of 2764 5012 Pmjhlklg.exe Pehjfm32.exe PID 5012 wrote to memory of 2764 5012 Pmjhlklg.exe Pehjfm32.exe PID 5012 wrote to memory of 2764 5012 Pmjhlklg.exe Pehjfm32.exe PID 2764 wrote to memory of 4284 2764 Pehjfm32.exe Afqifo32.exe PID 2764 wrote to memory of 4284 2764 Pehjfm32.exe Afqifo32.exe PID 2764 wrote to memory of 4284 2764 Pehjfm32.exe Afqifo32.exe PID 4284 wrote to memory of 3348 4284 Afqifo32.exe Bblcfo32.exe PID 4284 wrote to memory of 3348 4284 Afqifo32.exe Bblcfo32.exe PID 4284 wrote to memory of 3348 4284 Afqifo32.exe Bblcfo32.exe PID 3348 wrote to memory of 1112 3348 Bblcfo32.exe Bedbhi32.exe PID 3348 wrote to memory of 1112 3348 Bblcfo32.exe Bedbhi32.exe PID 3348 wrote to memory of 1112 3348 Bblcfo32.exe Bedbhi32.exe PID 1112 wrote to memory of 3944 1112 Bedbhi32.exe Cleqfb32.exe PID 1112 wrote to memory of 3944 1112 Bedbhi32.exe Cleqfb32.exe PID 1112 wrote to memory of 3944 1112 Bedbhi32.exe Cleqfb32.exe PID 3944 wrote to memory of 4472 3944 Cleqfb32.exe Cmgjee32.exe PID 3944 wrote to memory of 4472 3944 Cleqfb32.exe Cmgjee32.exe PID 3944 wrote to memory of 4472 3944 Cleqfb32.exe Cmgjee32.exe PID 4472 wrote to memory of 4660 4472 Cmgjee32.exe Ddhhbngi.exe PID 4472 wrote to memory of 4660 4472 Cmgjee32.exe Ddhhbngi.exe PID 4472 wrote to memory of 4660 4472 Cmgjee32.exe Ddhhbngi.exe PID 4660 wrote to memory of 2208 4660 Ddhhbngi.exe Emgblc32.exe PID 4660 wrote to memory of 2208 4660 Ddhhbngi.exe Emgblc32.exe PID 4660 wrote to memory of 2208 4660 Ddhhbngi.exe Emgblc32.exe PID 2208 wrote to memory of 3488 2208 Emgblc32.exe Elolco32.exe PID 2208 wrote to memory of 3488 2208 Emgblc32.exe Elolco32.exe PID 2208 wrote to memory of 3488 2208 Emgblc32.exe Elolco32.exe PID 3488 wrote to memory of 800 3488 Elolco32.exe Ffpcbchm.exe PID 3488 wrote to memory of 800 3488 Elolco32.exe Ffpcbchm.exe PID 3488 wrote to memory of 800 3488 Elolco32.exe Ffpcbchm.exe PID 800 wrote to memory of 3704 800 Ffpcbchm.exe Gloejmld.exe PID 800 wrote to memory of 3704 800 Ffpcbchm.exe Gloejmld.exe PID 800 wrote to memory of 3704 800 Ffpcbchm.exe Gloejmld.exe PID 3704 wrote to memory of 3152 3704 Gloejmld.exe Gnckooob.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe"C:\Users\Admin\AppData\Local\Temp\6932aa1620adaf79a22126660707ab14e68f5a48b13b442b3ece1f81c02a9398.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\Infhebbh.exeC:\Windows\system32\Infhebbh.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\Lkqgno32.exeC:\Windows\system32\Lkqgno32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\Mclhjkfa.exeC:\Windows\system32\Mclhjkfa.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\Moefdljc.exeC:\Windows\system32\Moefdljc.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\Mllccpfj.exeC:\Windows\system32\Mllccpfj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\Nkapelka.exeC:\Windows\system32\Nkapelka.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\Nfiagd32.exeC:\Windows\system32\Nfiagd32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\Ndpjnq32.exeC:\Windows\system32\Ndpjnq32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\Podkmgop.exeC:\Windows\system32\Podkmgop.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\Pmjhlklg.exeC:\Windows\system32\Pmjhlklg.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\Pehjfm32.exeC:\Windows\system32\Pehjfm32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\Afqifo32.exeC:\Windows\system32\Afqifo32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\Bblcfo32.exeC:\Windows\system32\Bblcfo32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\Bedbhi32.exeC:\Windows\system32\Bedbhi32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\Cleqfb32.exeC:\Windows\system32\Cleqfb32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\Cmgjee32.exeC:\Windows\system32\Cmgjee32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\Ddhhbngi.exeC:\Windows\system32\Ddhhbngi.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\Emgblc32.exeC:\Windows\system32\Emgblc32.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\Elolco32.exeC:\Windows\system32\Elolco32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\Ffpcbchm.exeC:\Windows\system32\Ffpcbchm.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\Gloejmld.exeC:\Windows\system32\Gloejmld.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\Gnckooob.exeC:\Windows\system32\Gnckooob.exe23⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\SysWOW64\Hcbpme32.exeC:\Windows\system32\Hcbpme32.exe24⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\Hcembe32.exeC:\Windows\system32\Hcembe32.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:4300 -
C:\Windows\SysWOW64\Hcifmdeo.exeC:\Windows\system32\Hcifmdeo.exe26⤵
- Executes dropped EXE
PID:4016 -
C:\Windows\SysWOW64\Icqmncof.exeC:\Windows\system32\Icqmncof.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4936 -
C:\Windows\SysWOW64\Jgcooaah.exeC:\Windows\system32\Jgcooaah.exe28⤵
- Executes dropped EXE
PID:3460 -
C:\Windows\SysWOW64\Jmgmhgig.exeC:\Windows\system32\Jmgmhgig.exe29⤵
- Executes dropped EXE
PID:3144 -
C:\Windows\SysWOW64\Knmpbi32.exeC:\Windows\system32\Knmpbi32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\Ljncnhhk.exeC:\Windows\system32\Ljncnhhk.exe31⤵
- Executes dropped EXE
PID:872 -
C:\Windows\SysWOW64\Mdmngm32.exeC:\Windows\system32\Mdmngm32.exe32⤵
- Executes dropped EXE
PID:1324 -
C:\Windows\SysWOW64\Mmjlkb32.exeC:\Windows\system32\Mmjlkb32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\Nhdicjfp.exeC:\Windows\system32\Nhdicjfp.exe34⤵
- Executes dropped EXE
PID:4772 -
C:\Windows\SysWOW64\Naaghoik.exeC:\Windows\system32\Naaghoik.exe35⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SysWOW64\Oacdmo32.exeC:\Windows\system32\Oacdmo32.exe36⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\SysWOW64\Oklifdmi.exeC:\Windows\system32\Oklifdmi.exe37⤵
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\Ogcike32.exeC:\Windows\system32\Ogcike32.exe38⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\Odkcpi32.exeC:\Windows\system32\Odkcpi32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\Pdpmkhjl.exeC:\Windows\system32\Pdpmkhjl.exe40⤵
- Executes dropped EXE
PID:3580 -
C:\Windows\SysWOW64\Pdeffgff.exeC:\Windows\system32\Pdeffgff.exe41⤵
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\Qomghp32.exeC:\Windows\system32\Qomghp32.exe42⤵
- Executes dropped EXE
PID:3836 -
C:\Windows\SysWOW64\Aijeme32.exeC:\Windows\system32\Aijeme32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3956 -
C:\Windows\SysWOW64\Bkadoo32.exeC:\Windows\system32\Bkadoo32.exe44⤵
- Executes dropped EXE
PID:3300 -
C:\Windows\SysWOW64\Bfieagka.exeC:\Windows\system32\Bfieagka.exe45⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\Cfbhhfbg.exeC:\Windows\system32\Cfbhhfbg.exe46⤵
- Executes dropped EXE
PID:4956 -
C:\Windows\SysWOW64\Cehdib32.exeC:\Windows\system32\Cehdib32.exe47⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\Cejaobel.exeC:\Windows\system32\Cejaobel.exe48⤵
- Executes dropped EXE
PID:1028 -
C:\Windows\SysWOW64\Eldbbjof.exeC:\Windows\system32\Eldbbjof.exe49⤵
- Executes dropped EXE
PID:3604 -
C:\Windows\SysWOW64\Eipilmgh.exeC:\Windows\system32\Eipilmgh.exe50⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\Fcodfa32.exeC:\Windows\system32\Fcodfa32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1020 -
C:\Windows\SysWOW64\Gebimmco.exeC:\Windows\system32\Gebimmco.exe52⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\Gplged32.exeC:\Windows\system32\Gplged32.exe53⤵
- Executes dropped EXE
PID:4912 -
C:\Windows\SysWOW64\Ghgljg32.exeC:\Windows\system32\Ghgljg32.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:4276 -
C:\Windows\SysWOW64\Hjieii32.exeC:\Windows\system32\Hjieii32.exe55⤵
- Executes dropped EXE
PID:4448 -
C:\Windows\SysWOW64\Hhobjf32.exeC:\Windows\system32\Hhobjf32.exe56⤵
- Executes dropped EXE
PID:4204 -
C:\Windows\SysWOW64\Hcdfho32.exeC:\Windows\system32\Hcdfho32.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:228 -
C:\Windows\SysWOW64\Hphfac32.exeC:\Windows\system32\Hphfac32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1708 -
C:\Windows\SysWOW64\Hgbonm32.exeC:\Windows\system32\Hgbonm32.exe59⤵
- Executes dropped EXE
PID:4700 -
C:\Windows\SysWOW64\Hlogfd32.exeC:\Windows\system32\Hlogfd32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4252 -
C:\Windows\SysWOW64\Hjbhph32.exeC:\Windows\system32\Hjbhph32.exe61⤵
- Executes dropped EXE
PID:3968 -
C:\Windows\SysWOW64\Ijedehgm.exeC:\Windows\system32\Ijedehgm.exe62⤵
- Executes dropped EXE
PID:1848 -
C:\Windows\SysWOW64\Icminm32.exeC:\Windows\system32\Icminm32.exe63⤵
- Executes dropped EXE
PID:312 -
C:\Windows\SysWOW64\Jokpcmmj.exeC:\Windows\system32\Jokpcmmj.exe64⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\Jicdlc32.exeC:\Windows\system32\Jicdlc32.exe65⤵
- Executes dropped EXE
PID:3168 -
C:\Windows\SysWOW64\Jfgefg32.exeC:\Windows\system32\Jfgefg32.exe66⤵PID:4060
-
C:\Windows\SysWOW64\Jckeokan.exeC:\Windows\system32\Jckeokan.exe67⤵PID:1012
-
C:\Windows\SysWOW64\Jmdjha32.exeC:\Windows\system32\Jmdjha32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1964 -
C:\Windows\SysWOW64\Jjhjae32.exeC:\Windows\system32\Jjhjae32.exe69⤵
- Drops file in System32 directory
- Modifies registry class
PID:652 -
C:\Windows\SysWOW64\Kimgba32.exeC:\Windows\system32\Kimgba32.exe70⤵
- Drops file in System32 directory
PID:3180 -
C:\Windows\SysWOW64\Ljhchc32.exeC:\Windows\system32\Ljhchc32.exe71⤵PID:1388
-
C:\Windows\SysWOW64\Ljjpnb32.exeC:\Windows\system32\Ljjpnb32.exe72⤵PID:4056
-
C:\Windows\SysWOW64\Lccdghmc.exeC:\Windows\system32\Lccdghmc.exe73⤵PID:1968
-
C:\Windows\SysWOW64\Migcpneb.exeC:\Windows\system32\Migcpneb.exe74⤵PID:1544
-
C:\Windows\SysWOW64\Mfomda32.exeC:\Windows\system32\Mfomda32.exe75⤵PID:1248
-
C:\Windows\SysWOW64\Nmlafk32.exeC:\Windows\system32\Nmlafk32.exe76⤵PID:5132
-
C:\Windows\SysWOW64\Niihlkdm.exeC:\Windows\system32\Niihlkdm.exe77⤵PID:5176
-
C:\Windows\SysWOW64\Oileakbj.exeC:\Windows\system32\Oileakbj.exe78⤵PID:5216
-
C:\Windows\SysWOW64\Odaiodbp.exeC:\Windows\system32\Odaiodbp.exe79⤵PID:5252
-
C:\Windows\SysWOW64\Omjnhiiq.exeC:\Windows\system32\Omjnhiiq.exe80⤵PID:5296
-
C:\Windows\SysWOW64\Ohobebig.exeC:\Windows\system32\Ohobebig.exe81⤵PID:5336
-
C:\Windows\SysWOW64\Oickbjmb.exeC:\Windows\system32\Oickbjmb.exe82⤵
- Modifies registry class
PID:5376 -
C:\Windows\SysWOW64\Oiehhjjp.exeC:\Windows\system32\Oiehhjjp.exe83⤵PID:5420
-
C:\Windows\SysWOW64\Pkedbmab.exeC:\Windows\system32\Pkedbmab.exe84⤵PID:5476
-
C:\Windows\SysWOW64\Pklkbl32.exeC:\Windows\system32\Pklkbl32.exe85⤵PID:5520
-
C:\Windows\SysWOW64\Qdihfq32.exeC:\Windows\system32\Qdihfq32.exe86⤵
- Modifies registry class
PID:5596 -
C:\Windows\SysWOW64\Aglnnkid.exeC:\Windows\system32\Aglnnkid.exe87⤵PID:5636
-
C:\Windows\SysWOW64\Akjgdjoj.exeC:\Windows\system32\Akjgdjoj.exe88⤵PID:5684
-
C:\Windows\SysWOW64\Agqhik32.exeC:\Windows\system32\Agqhik32.exe89⤵PID:5728
-
C:\Windows\SysWOW64\Ahpdcn32.exeC:\Windows\system32\Ahpdcn32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5772 -
C:\Windows\SysWOW64\Bhennm32.exeC:\Windows\system32\Bhennm32.exe91⤵
- Modifies registry class
PID:5824 -
C:\Windows\SysWOW64\Bjfjee32.exeC:\Windows\system32\Bjfjee32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5868 -
C:\Windows\SysWOW64\Bdlncn32.exeC:\Windows\system32\Bdlncn32.exe93⤵PID:5916
-
C:\Windows\SysWOW64\Cebdcmhh.exeC:\Windows\system32\Cebdcmhh.exe94⤵PID:5960
-
C:\Windows\SysWOW64\Cjomldfp.exeC:\Windows\system32\Cjomldfp.exe95⤵
- Modifies registry class
PID:6004 -
C:\Windows\SysWOW64\Cqiehnml.exeC:\Windows\system32\Cqiehnml.exe96⤵PID:6084
-
C:\Windows\SysWOW64\Cjdfgc32.exeC:\Windows\system32\Cjdfgc32.exe97⤵
- Drops file in System32 directory
- Modifies registry class
PID:6140 -
C:\Windows\SysWOW64\Cejjdlap.exeC:\Windows\system32\Cejjdlap.exe98⤵PID:5164
-
C:\Windows\SysWOW64\Cigcjj32.exeC:\Windows\system32\Cigcjj32.exe99⤵PID:5240
-
C:\Windows\SysWOW64\Dndlba32.exeC:\Windows\system32\Dndlba32.exe100⤵PID:5332
-
C:\Windows\SysWOW64\Dgomaf32.exeC:\Windows\system32\Dgomaf32.exe101⤵PID:5360
-
C:\Windows\SysWOW64\Decmjjie.exeC:\Windows\system32\Decmjjie.exe102⤵PID:5456
-
C:\Windows\SysWOW64\Dlobmd32.exeC:\Windows\system32\Dlobmd32.exe103⤵PID:5584
-
C:\Windows\SysWOW64\Ejglcq32.exeC:\Windows\system32\Ejglcq32.exe104⤵PID:5616
-
C:\Windows\SysWOW64\Eaqdpjia.exeC:\Windows\system32\Eaqdpjia.exe105⤵PID:5736
-
C:\Windows\SysWOW64\Eacaej32.exeC:\Windows\system32\Eacaej32.exe106⤵
- Drops file in System32 directory
PID:5780 -
C:\Windows\SysWOW64\Eaenkj32.exeC:\Windows\system32\Eaenkj32.exe107⤵PID:5864
-
C:\Windows\SysWOW64\Eahjqicj.exeC:\Windows\system32\Eahjqicj.exe108⤵PID:5940
-
C:\Windows\SysWOW64\Fjpoio32.exeC:\Windows\system32\Fjpoio32.exe109⤵PID:6000
-
C:\Windows\SysWOW64\Fiaogfai.exeC:\Windows\system32\Fiaogfai.exe110⤵PID:6096
-
C:\Windows\SysWOW64\Falcli32.exeC:\Windows\system32\Falcli32.exe111⤵PID:5160
-
C:\Windows\SysWOW64\Foqdem32.exeC:\Windows\system32\Foqdem32.exe112⤵PID:5192
-
C:\Windows\SysWOW64\Fejlbgek.exeC:\Windows\system32\Fejlbgek.exe113⤵PID:5372
-
C:\Windows\SysWOW64\Fbnmkk32.exeC:\Windows\system32\Fbnmkk32.exe114⤵PID:5448
-
C:\Windows\SysWOW64\Flgadake.exeC:\Windows\system32\Flgadake.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5648 -
C:\Windows\SysWOW64\Feofmf32.exeC:\Windows\system32\Feofmf32.exe116⤵
- Drops file in System32 directory
PID:5796 -
C:\Windows\SysWOW64\Gbecljnl.exeC:\Windows\system32\Gbecljnl.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5352 -
C:\Windows\SysWOW64\Hligqnjp.exeC:\Windows\system32\Hligqnjp.exe118⤵PID:6036
-
C:\Windows\SysWOW64\Iooimi32.exeC:\Windows\system32\Iooimi32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5168 -
C:\Windows\SysWOW64\Ijdnka32.exeC:\Windows\system32\Ijdnka32.exe120⤵PID:5268
-
C:\Windows\SysWOW64\Icmbcg32.exeC:\Windows\system32\Icmbcg32.exe121⤵PID:5644
-
C:\Windows\SysWOW64\Jhqqlmba.exeC:\Windows\system32\Jhqqlmba.exe122⤵
- Drops file in System32 directory
PID:5908 -
C:\Windows\SysWOW64\Jcfejfag.exeC:\Windows\system32\Jcfejfag.exe123⤵PID:6064
-
C:\Windows\SysWOW64\Jcknee32.exeC:\Windows\system32\Jcknee32.exe124⤵PID:5284
-
C:\Windows\SysWOW64\Jhjcbljf.exeC:\Windows\system32\Jhjcbljf.exe125⤵PID:5548
-
C:\Windows\SysWOW64\Kcphpdil.exeC:\Windows\system32\Kcphpdil.exe126⤵PID:5980
-
C:\Windows\SysWOW64\Lckglc32.exeC:\Windows\system32\Lckglc32.exe127⤵PID:5428
-
C:\Windows\SysWOW64\Ljephmgl.exeC:\Windows\system32\Ljephmgl.exe128⤵PID:3020
-
C:\Windows\SysWOW64\Nfcoekhe.exeC:\Windows\system32\Nfcoekhe.exe129⤵PID:116
-
C:\Windows\SysWOW64\Nbmmoklg.exeC:\Windows\system32\Nbmmoklg.exe130⤵PID:5724
-
C:\Windows\SysWOW64\Opcjno32.exeC:\Windows\system32\Opcjno32.exe131⤵PID:6160
-
C:\Windows\SysWOW64\Ojhnlh32.exeC:\Windows\system32\Ojhnlh32.exe132⤵PID:6204
-
C:\Windows\SysWOW64\Omigmc32.exeC:\Windows\system32\Omigmc32.exe133⤵PID:6260
-
C:\Windows\SysWOW64\Omnqhbap.exeC:\Windows\system32\Omnqhbap.exe134⤵PID:6300
-
C:\Windows\SysWOW64\Obkiqi32.exeC:\Windows\system32\Obkiqi32.exe135⤵PID:6364
-
C:\Windows\SysWOW64\Plcmiofg.exeC:\Windows\system32\Plcmiofg.exe136⤵
- Modifies registry class
PID:6408 -
C:\Windows\SysWOW64\Pkdngf32.exeC:\Windows\system32\Pkdngf32.exe137⤵PID:6448
-
C:\Windows\SysWOW64\Pgknlg32.exeC:\Windows\system32\Pgknlg32.exe138⤵PID:6496
-
C:\Windows\SysWOW64\Pdoofl32.exeC:\Windows\system32\Pdoofl32.exe139⤵
- Drops file in System32 directory
PID:6536 -
C:\Windows\SysWOW64\Pljcjn32.exeC:\Windows\system32\Pljcjn32.exe140⤵PID:6584
-
C:\Windows\SysWOW64\Qkpmcddi.exeC:\Windows\system32\Qkpmcddi.exe141⤵PID:6624
-
C:\Windows\SysWOW64\Qpmfklbq.exeC:\Windows\system32\Qpmfklbq.exe142⤵PID:6668
-
C:\Windows\SysWOW64\Agfnhf32.exeC:\Windows\system32\Agfnhf32.exe143⤵PID:6716
-
C:\Windows\SysWOW64\Alfcflfb.exeC:\Windows\system32\Alfcflfb.exe144⤵PID:6760
-
C:\Windows\SysWOW64\Akgcdc32.exeC:\Windows\system32\Akgcdc32.exe145⤵PID:6804
-
C:\Windows\SysWOW64\Acdeneij.exeC:\Windows\system32\Acdeneij.exe146⤵PID:6852
-
C:\Windows\SysWOW64\Cdbmifdl.exeC:\Windows\system32\Cdbmifdl.exe147⤵
- Modifies registry class
PID:6892 -
C:\Windows\SysWOW64\Cnjbbl32.exeC:\Windows\system32\Cnjbbl32.exe148⤵PID:6940
-
C:\Windows\SysWOW64\Cknbkpif.exeC:\Windows\system32\Cknbkpif.exe149⤵
- Drops file in System32 directory
PID:6984 -
C:\Windows\SysWOW64\Cqkkcghn.exeC:\Windows\system32\Cqkkcghn.exe150⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7028 -
C:\Windows\SysWOW64\Cmdhnhkp.exeC:\Windows\system32\Cmdhnhkp.exe151⤵PID:7068
-
C:\Windows\SysWOW64\Dncehk32.exeC:\Windows\system32\Dncehk32.exe152⤵PID:7112
-
C:\Windows\SysWOW64\Ddnmeejo.exeC:\Windows\system32\Ddnmeejo.exe153⤵PID:1572
-
C:\Windows\SysWOW64\Dgqblp32.exeC:\Windows\system32\Dgqblp32.exe154⤵PID:6168
-
C:\Windows\SysWOW64\Dcgcaq32.exeC:\Windows\system32\Dcgcaq32.exe155⤵PID:6244
-
C:\Windows\SysWOW64\Eakdje32.exeC:\Windows\system32\Eakdje32.exe156⤵PID:6348
-
C:\Windows\SysWOW64\Ecafgo32.exeC:\Windows\system32\Ecafgo32.exe157⤵PID:6440
-
C:\Windows\SysWOW64\Enfjdh32.exeC:\Windows\system32\Enfjdh32.exe158⤵
- Drops file in System32 directory
PID:6520 -
C:\Windows\SysWOW64\Ecccmo32.exeC:\Windows\system32\Ecccmo32.exe159⤵PID:4272
-
C:\Windows\SysWOW64\Emlgedge.exeC:\Windows\system32\Emlgedge.exe160⤵PID:6636
-
C:\Windows\SysWOW64\Gaepgacn.exeC:\Windows\system32\Gaepgacn.exe161⤵PID:6696
-
C:\Windows\SysWOW64\Hdokok32.exeC:\Windows\system32\Hdokok32.exe162⤵PID:6744
-
C:\Windows\SysWOW64\Hhmdeink.exeC:\Windows\system32\Hhmdeink.exe163⤵PID:1772
-
C:\Windows\SysWOW64\Hmjmnpmb.exeC:\Windows\system32\Hmjmnpmb.exe164⤵
- Modifies registry class
PID:2764 -
C:\Windows\SysWOW64\Hoiihcde.exeC:\Windows\system32\Hoiihcde.exe165⤵PID:6920
-
C:\Windows\SysWOW64\Hecadm32.exeC:\Windows\system32\Hecadm32.exe166⤵PID:6948
-
C:\Windows\SysWOW64\Imofip32.exeC:\Windows\system32\Imofip32.exe167⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7016 -
C:\Windows\SysWOW64\Ilpfgg32.exeC:\Windows\system32\Ilpfgg32.exe168⤵PID:7080
-
C:\Windows\SysWOW64\Idkkki32.exeC:\Windows\system32\Idkkki32.exe169⤵PID:3348
-
C:\Windows\SysWOW64\Ikechced.exeC:\Windows\system32\Ikechced.exe170⤵PID:6148
-
C:\Windows\SysWOW64\Iaokdn32.exeC:\Windows\system32\Iaokdn32.exe171⤵PID:6236
-
C:\Windows\SysWOW64\Ihicah32.exeC:\Windows\system32\Ihicah32.exe172⤵PID:4392
-
C:\Windows\SysWOW64\Inflio32.exeC:\Windows\system32\Inflio32.exe173⤵PID:6488
-
C:\Windows\SysWOW64\Ihkpgg32.exeC:\Windows\system32\Ihkpgg32.exe174⤵PID:4964
-
C:\Windows\SysWOW64\Inhion32.exeC:\Windows\system32\Inhion32.exe175⤵PID:6608
-
C:\Windows\SysWOW64\Idbalhho.exeC:\Windows\system32\Idbalhho.exe176⤵PID:6640
-
C:\Windows\SysWOW64\Jlponebi.exeC:\Windows\system32\Jlponebi.exe177⤵PID:6660
-
C:\Windows\SysWOW64\Jdkdbgpd.exeC:\Windows\system32\Jdkdbgpd.exe178⤵PID:6792
-
C:\Windows\SysWOW64\Kfbfmi32.exeC:\Windows\system32\Kfbfmi32.exe179⤵PID:6860
-
C:\Windows\SysWOW64\Kojkeogp.exeC:\Windows\system32\Kojkeogp.exe180⤵PID:1452
-
C:\Windows\SysWOW64\Kdipce32.exeC:\Windows\system32\Kdipce32.exe181⤵
- Modifies registry class
PID:6924 -
C:\Windows\SysWOW64\Lkchpoka.exeC:\Windows\system32\Lkchpoka.exe182⤵PID:7056
-
C:\Windows\SysWOW64\Lkhbko32.exeC:\Windows\system32\Lkhbko32.exe183⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5028 -
C:\Windows\SysWOW64\Lfnfhg32.exeC:\Windows\system32\Lfnfhg32.exe184⤵
- Drops file in System32 directory
PID:4708 -
C:\Windows\SysWOW64\Lfpcngdo.exeC:\Windows\system32\Lfpcngdo.exe185⤵PID:4728
-
C:\Windows\SysWOW64\Lkmkfncf.exeC:\Windows\system32\Lkmkfncf.exe186⤵PID:6504
-
C:\Windows\SysWOW64\Meepoc32.exeC:\Windows\system32\Meepoc32.exe187⤵PID:516
-
C:\Windows\SysWOW64\Mokdllim.exeC:\Windows\system32\Mokdllim.exe188⤵PID:5040
-
C:\Windows\SysWOW64\Moomgl32.exeC:\Windows\system32\Moomgl32.exe189⤵PID:6656
-
C:\Windows\SysWOW64\Moajmk32.exeC:\Windows\system32\Moajmk32.exe190⤵PID:6544
-
C:\Windows\SysWOW64\Mpdgbkab.exeC:\Windows\system32\Mpdgbkab.exe191⤵PID:6884
-
C:\Windows\SysWOW64\Nfpled32.exeC:\Windows\system32\Nfpled32.exe192⤵PID:3460
-
C:\Windows\SysWOW64\Nejbaqgo.exeC:\Windows\system32\Nejbaqgo.exe193⤵PID:7120
-
C:\Windows\SysWOW64\Nppfnige.exeC:\Windows\system32\Nppfnige.exe194⤵
- Drops file in System32 directory
PID:5036 -
C:\Windows\SysWOW64\Ofjokc32.exeC:\Windows\system32\Ofjokc32.exe195⤵PID:6480
-
C:\Windows\SysWOW64\Oimdbnip.exeC:\Windows\system32\Oimdbnip.exe196⤵PID:4300
-
C:\Windows\SysWOW64\Affgno32.exeC:\Windows\system32\Affgno32.exe197⤵PID:4660
-
C:\Windows\SysWOW64\Aoalba32.exeC:\Windows\system32\Aoalba32.exe198⤵PID:4716
-
C:\Windows\SysWOW64\Cllkcbnl.exeC:\Windows\system32\Cllkcbnl.exe199⤵
- Drops file in System32 directory
PID:4012 -
C:\Windows\SysWOW64\Dnekcd32.exeC:\Windows\system32\Dnekcd32.exe200⤵PID:1052
-
C:\Windows\SysWOW64\Dfqogfjo.exeC:\Windows\system32\Dfqogfjo.exe201⤵PID:7064
-
C:\Windows\SysWOW64\Dgplai32.exeC:\Windows\system32\Dgplai32.exe202⤵PID:7124
-
C:\Windows\SysWOW64\Dnjdncio.exeC:\Windows\system32\Dnjdncio.exe203⤵PID:6320
-
C:\Windows\SysWOW64\Enajobbf.exeC:\Windows\system32\Enajobbf.exe204⤵PID:3120
-
C:\Windows\SysWOW64\Ecnbgian.exeC:\Windows\system32\Ecnbgian.exe205⤵PID:4632
-
C:\Windows\SysWOW64\Enfcjb32.exeC:\Windows\system32\Enfcjb32.exe206⤵PID:2344
-
C:\Windows\SysWOW64\Ffahnd32.exeC:\Windows\system32\Ffahnd32.exe207⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4424 -
C:\Windows\SysWOW64\Fceihh32.exeC:\Windows\system32\Fceihh32.exe208⤵PID:4304
-
C:\Windows\SysWOW64\Fjoadbbc.exeC:\Windows\system32\Fjoadbbc.exe209⤵PID:1260
-
C:\Windows\SysWOW64\Gfmhjb32.exeC:\Windows\system32\Gfmhjb32.exe210⤵PID:1152
-
C:\Windows\SysWOW64\Gcqhcgqi.exeC:\Windows\system32\Gcqhcgqi.exe211⤵PID:872
-
C:\Windows\SysWOW64\Gmimll32.exeC:\Windows\system32\Gmimll32.exe212⤵
- Modifies registry class
PID:1160 -
C:\Windows\SysWOW64\Ggoaje32.exeC:\Windows\system32\Ggoaje32.exe213⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1824 -
C:\Windows\SysWOW64\Gagebknp.exeC:\Windows\system32\Gagebknp.exe214⤵PID:4028
-
C:\Windows\SysWOW64\Gjojkpdp.exeC:\Windows\system32\Gjojkpdp.exe215⤵PID:2264
-
C:\Windows\SysWOW64\Gffkpa32.exeC:\Windows\system32\Gffkpa32.exe216⤵PID:6632
-
C:\Windows\SysWOW64\Gpnoigpe.exeC:\Windows\system32\Gpnoigpe.exe217⤵PID:3836
-
C:\Windows\SysWOW64\Hjdcfp32.exeC:\Windows\system32\Hjdcfp32.exe218⤵PID:800
-
C:\Windows\SysWOW64\Hpqlof32.exeC:\Windows\system32\Hpqlof32.exe219⤵PID:1524
-
C:\Windows\SysWOW64\Hpchdf32.exeC:\Windows\system32\Hpchdf32.exe220⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6992 -
C:\Windows\SysWOW64\Hmginjki.exeC:\Windows\system32\Hmginjki.exe221⤵PID:6432
-
C:\Windows\SysWOW64\Hhmmkcko.exeC:\Windows\system32\Hhmmkcko.exe222⤵PID:4388
-
C:\Windows\SysWOW64\Haeadi32.exeC:\Windows\system32\Haeadi32.exe223⤵PID:4692
-
C:\Windows\SysWOW64\Hoibmmpi.exeC:\Windows\system32\Hoibmmpi.exe224⤵
- Modifies registry class
PID:1384 -
C:\Windows\SysWOW64\Ihagfb32.exeC:\Windows\system32\Ihagfb32.exe225⤵PID:4896
-
C:\Windows\SysWOW64\Imnoni32.exeC:\Windows\system32\Imnoni32.exe226⤵PID:4828
-
C:\Windows\SysWOW64\Iaqapggb.exeC:\Windows\system32\Iaqapggb.exe227⤵
- Drops file in System32 directory
PID:4372 -
C:\Windows\SysWOW64\Jopaejlo.exeC:\Windows\system32\Jopaejlo.exe228⤵PID:1312
-
C:\Windows\SysWOW64\Khkbcopl.exeC:\Windows\system32\Khkbcopl.exe229⤵PID:4276
-
C:\Windows\SysWOW64\Mkegbfgp.exeC:\Windows\system32\Mkegbfgp.exe230⤵PID:4744
-
C:\Windows\SysWOW64\Mglhgg32.exeC:\Windows\system32\Mglhgg32.exe231⤵
- Drops file in System32 directory
PID:1976 -
C:\Windows\SysWOW64\Nnfpcada.exeC:\Windows\system32\Nnfpcada.exe232⤵PID:1708
-
C:\Windows\SysWOW64\Nofmndkd.exeC:\Windows\system32\Nofmndkd.exe233⤵PID:2984
-
C:\Windows\SysWOW64\Nkmmbe32.exeC:\Windows\system32\Nkmmbe32.exe234⤵PID:3864
-
C:\Windows\SysWOW64\Nkojheoe.exeC:\Windows\system32\Nkojheoe.exe235⤵PID:1848
-
C:\Windows\SysWOW64\Oendaipn.exeC:\Windows\system32\Oendaipn.exe236⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4952 -
C:\Windows\SysWOW64\Okhmnc32.exeC:\Windows\system32\Okhmnc32.exe237⤵PID:1308
-
C:\Windows\SysWOW64\Obbekn32.exeC:\Windows\system32\Obbekn32.exe238⤵PID:4760
-
C:\Windows\SysWOW64\Picchg32.exeC:\Windows\system32\Picchg32.exe239⤵PID:4672
-
C:\Windows\SysWOW64\Pnplqn32.exeC:\Windows\system32\Pnplqn32.exe240⤵
- Drops file in System32 directory
PID:3304 -
C:\Windows\SysWOW64\Phkmoc32.exeC:\Windows\system32\Phkmoc32.exe241⤵PID:232
-
C:\Windows\SysWOW64\Pbpall32.exeC:\Windows\system32\Pbpall32.exe242⤵PID:2784