Analysis
-
max time kernel
137s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719.exe
Resource
win10v2004-20240226-en
General
-
Target
6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719.exe
-
Size
280KB
-
MD5
0539ff67afad4db255b04d766ffded90
-
SHA1
6016381dfa81f5186aac252f06b8e88bb4bd6a4d
-
SHA256
6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719
-
SHA512
ff70279f72ae879e524c49af4ae5d3fd49364e36149a2a38ec27db832956d47b010394b87d056ccf94f535a26d6bd9de60f7b6cb103ac932b435d4ee48effba4
-
SSDEEP
6144:IkwBM3zuwq5i/GOORjMmRUoooooooooooooooooooooooooy/G3:Ij6uw8i//OVLCoooooooooooooooooo0
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Piphaf32.exeIgkkdigp.exeAdfgne32.exeHaeadi32.exeMbkfcabb.exeHcpjpn32.exeBiadoeib.exeOampdkbj.exeKlahof32.exeMbbcofpf.exeFpnfbi32.exeMkegbfgp.exeMilinkgf.exeHmpclnof.exeMkcjlf32.exeBdkgckal.exeChbcphph.exeHbeece32.exeAjlngk32.exeIgpkjo32.exeNljgfn32.exeFejebdig.exeFmcjiagf.exeNggnjjoo.exeFqhbgf32.exeBhnqoo32.exePlkpmlfi.exeBldljh32.exeIiipfnch.exePdbbfadn.exePkbjchio.exeEmhkmcbd.exeEeelge32.exeBmceaj32.exeDeanhj32.exeKieaqe32.exeInecac32.exeAlimnj32.exeCffcilob.exeCknlln32.exeAnaofa32.exeDhqoaf32.exeDnpdom32.exeKiodha32.exeCcigpbga.exeOdpjmcjp.exeNpjelo32.exeCapbaacl.exeJmnomk32.exeBooaii32.exeJmkdeaee.exeDqpffaib.exeKlloichl.exeEbbinp32.exeCkladcoa.exeKckqlpck.exeEblpqono.exeHdclbopg.exeHkbmjhdo.exeEmanepld.exeLgnekcei.exeBjaqih32.exeDmbbaq32.exeEcefjckj.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Piphaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Igkkdigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adfgne32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Haeadi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mbkfcabb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcpjpn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Biadoeib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oampdkbj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klahof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbbcofpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fpnfbi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkegbfgp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Milinkgf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmpclnof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkcjlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bdkgckal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Chbcphph.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbeece32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajlngk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igpkjo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nljgfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fejebdig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmcjiagf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nggnjjoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqhbgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bhnqoo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plkpmlfi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bldljh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiipfnch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pdbbfadn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkbjchio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Emhkmcbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eeelge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmceaj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deanhj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kieaqe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Inecac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Alimnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cffcilob.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cknlln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anaofa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhqoaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dnpdom32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kiodha32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccigpbga.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odpjmcjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Npjelo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Capbaacl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmnomk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Booaii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmkdeaee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqpffaib.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klloichl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebbinp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckladcoa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kckqlpck.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eblpqono.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdclbopg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkbmjhdo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emanepld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lgnekcei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bjaqih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmbbaq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecefjckj.exe -
Executes dropped EXE 64 IoCs
Processes:
Kiodha32.exeMpchbhjl.exeNplkhf32.exeOinbgk32.exeOiqomj32.exeOkbhlm32.exePdbbfadn.exeBbkeacqo.exeCjfclcpg.exeDiafqi32.exeEihlahjd.exeEahjqicj.exeFbjcplhj.exeHhlnjpdi.exeIeiajckh.exeKiajck32.exeLkflpe32.exeLbenho32.exeMcggga32.exeMfofjk32.exeNlphmafm.exeOikngeoo.exeObfpejcl.exeOdhiemil.exePgknlg32.exePkigbfja.exeQnniopcm.exeAnqfepaj.exeAjjcoqdl.exeBkbcpb32.exeBjhpqn32.exeCgnmpbec.exeCklffq32.exeCcigpbga.exeDkjbgooi.exeDmknog32.exeEjhanj32.exeFhalcm32.exeFmbnfcam.exeHaobnpkc.exeHklpaeno.exeIncpdodg.exeIaahjmkn.exeIeoapl32.exeJedjkkmo.exeJefgak32.exeKlloichl.exeKlnkoc32.exeLkfeeo32.exeLfpcngdo.exeMeepoc32.exeMbbcofpf.exeNeclpamg.exeNfgbec32.exeNmajbnha.exeOemofpel.exePifghmae.exePfjgbapo.exeQmkfoj32.exeCjlbag32.exeCfeplh32.exeCjbhbf32.exeDncnnd32.exeDgkbfjeg.exepid process 2448 Kiodha32.exe 2904 Mpchbhjl.exe 1656 Nplkhf32.exe 3680 Oinbgk32.exe 2236 Oiqomj32.exe 1592 Okbhlm32.exe 412 Pdbbfadn.exe 1844 Bbkeacqo.exe 3608 Cjfclcpg.exe 4460 Diafqi32.exe 4444 Eihlahjd.exe 2224 Eahjqicj.exe 3932 Fbjcplhj.exe 5084 Hhlnjpdi.exe 2864 Ieiajckh.exe 4524 Kiajck32.exe 1508 Lkflpe32.exe 4320 Lbenho32.exe 3880 Mcggga32.exe 3156 Mfofjk32.exe 2880 Nlphmafm.exe 1360 Oikngeoo.exe 4600 Obfpejcl.exe 3892 Odhiemil.exe 3028 Pgknlg32.exe 1176 Pkigbfja.exe 1680 Qnniopcm.exe 4636 Anqfepaj.exe 2344 Ajjcoqdl.exe 3584 Bkbcpb32.exe 764 Bjhpqn32.exe 4536 Cgnmpbec.exe 1104 Cklffq32.exe 1344 Ccigpbga.exe 432 Dkjbgooi.exe 4496 Dmknog32.exe 4964 Ejhanj32.exe 3884 Fhalcm32.exe 4816 Fmbnfcam.exe 4144 Haobnpkc.exe 3432 Hklpaeno.exe 220 Incpdodg.exe 1324 Iaahjmkn.exe 4916 Ieoapl32.exe 4624 Jedjkkmo.exe 2072 Jefgak32.exe 3820 Klloichl.exe 1520 Klnkoc32.exe 4660 Lkfeeo32.exe 4576 Lfpcngdo.exe 3324 Meepoc32.exe 1836 Mbbcofpf.exe 2320 Neclpamg.exe 4348 Nfgbec32.exe 2416 Nmajbnha.exe 3316 Oemofpel.exe 4332 Pifghmae.exe 3556 Pfjgbapo.exe 1016 Qmkfoj32.exe 4608 Cjlbag32.exe 4464 Cfeplh32.exe 5024 Cjbhbf32.exe 2392 Dncnnd32.exe 2492 Dgkbfjeg.exe -
Drops file in System32 directory 64 IoCs
Processes:
Okpkaqmp.exeMgaoda32.exeNnpcjplf.exeLfhdem32.exeNfhfbedd.exeNeafdjak.exeDfefeq32.exePmpoemef.exeQnniopcm.exeNbfoeiei.exeMibpng32.exeBemqcngl.exeAnaofa32.exeOikngeoo.exeMkkmaalo.exeGdhcagnp.exeIbhlmgdj.exeMmdefi32.exePkpmnh32.exeMflbdibj.exeLmbhqj32.exeHaeadi32.exeOiglen32.exeElpknehe.exeIpjenn32.exeNfgbec32.exeIpldpo32.exeOjommdfh.exeJggmnmmo.exeCagolf32.exeCglbanmo.exeCahdhhep.exePdbbfadn.exeHcidoo32.exeMmkkgh32.exeEnhpje32.exeMqpcdn32.exeLcifde32.exeFfnkggld.exeJgfcfajg.exeLngmhm32.exeEmhkmcbd.exeHlnjlkjf.exeGgpbcaei.exeDffdjmme.exeCglgck32.exeFagjolao.exeHlpfak32.exePoggnnkk.exeEeelge32.exeEbimqi32.exeHbhbie32.exeFapobl32.exeCkealm32.exeJfnbnk32.exeAmodnenk.exePpjbfi32.exeLfpcngdo.exeKagimmol.exeLgikpc32.exeIlbnkiba.exedescription ioc process File created C:\Windows\SysWOW64\Olphlcdb.exe Okpkaqmp.exe File created C:\Windows\SysWOW64\Pkhaph32.dll Mgaoda32.exe File opened for modification C:\Windows\SysWOW64\Ondleo32.exe Nnpcjplf.exe File opened for modification C:\Windows\SysWOW64\Lmbmbgmo.exe Lfhdem32.exe File created C:\Windows\SysWOW64\Bllabpck.dll Nfhfbedd.exe File opened for modification C:\Windows\SysWOW64\Nknolaob.exe Neafdjak.exe File opened for modification C:\Windows\SysWOW64\Dkbomgde.exe Dfefeq32.exe File created C:\Windows\SysWOW64\Qdldgg32.exe Pmpoemef.exe File created C:\Windows\SysWOW64\Nidlpi32.dll Qnniopcm.exe File created C:\Windows\SysWOW64\Eipmlo32.dll Nbfoeiei.exe File created C:\Windows\SysWOW64\Mdhdkp32.exe Mibpng32.exe File created C:\Windows\SysWOW64\Qckcoi32.dll Bemqcngl.exe File created C:\Windows\SysWOW64\Ghbccc32.dll Anaofa32.exe File created C:\Windows\SysWOW64\Obfpejcl.exe Oikngeoo.exe File opened for modification C:\Windows\SysWOW64\Mphfjhjf.exe Mkkmaalo.exe File created C:\Windows\SysWOW64\Ghhhmebd.exe Gdhcagnp.exe File created C:\Windows\SysWOW64\Nmgkih32.dll Ibhlmgdj.exe File created C:\Windows\SysWOW64\Mndapl32.exe Mmdefi32.exe File created C:\Windows\SysWOW64\Lqghdk32.dll Pkpmnh32.exe File created C:\Windows\SysWOW64\Bibngh32.dll Mflbdibj.exe File created C:\Windows\SysWOW64\Mmdefi32.exe Lmbhqj32.exe File created C:\Windows\SysWOW64\Ipjoee32.exe Haeadi32.exe File created C:\Windows\SysWOW64\Llfmba32.dll Oiglen32.exe File created C:\Windows\SysWOW64\Jjlgpgbf.dll Elpknehe.exe File opened for modification C:\Windows\SysWOW64\Ikpjkf32.exe Ipjenn32.exe File created C:\Windows\SysWOW64\Nmajbnha.exe Nfgbec32.exe File created C:\Windows\SysWOW64\Iffmmihf.exe Ipldpo32.exe File created C:\Windows\SysWOW64\Oaifin32.exe Ojommdfh.exe File created C:\Windows\SysWOW64\Chfbhe32.dll Jggmnmmo.exe File created C:\Windows\SysWOW64\Dffdjmme.exe Cagolf32.exe File opened for modification C:\Windows\SysWOW64\Cneknh32.exe Cglbanmo.exe File created C:\Windows\SysWOW64\Kapijhaf.dll Cahdhhep.exe File opened for modification C:\Windows\SysWOW64\Bbkeacqo.exe Pdbbfadn.exe File created C:\Windows\SysWOW64\Gebkco32.dll Hcidoo32.exe File opened for modification C:\Windows\SysWOW64\Olphlcdb.exe Okpkaqmp.exe File opened for modification C:\Windows\SysWOW64\Mgaoda32.exe Mmkkgh32.exe File created C:\Windows\SysWOW64\Ggnolcfa.dll Enhpje32.exe File opened for modification C:\Windows\SysWOW64\Mkegbfgp.exe Mqpcdn32.exe File created C:\Windows\SysWOW64\Lajpbbei.dll Lcifde32.exe File created C:\Windows\SysWOW64\Hjfeidbm.dll Ffnkggld.exe File created C:\Windows\SysWOW64\Caefnl32.dll Jgfcfajg.exe File opened for modification C:\Windows\SysWOW64\Mdaedgdb.exe Lngmhm32.exe File created C:\Windows\SysWOW64\Mllabgnk.dll Emhkmcbd.exe File opened for modification C:\Windows\SysWOW64\Hbhbie32.exe Hlnjlkjf.exe File created C:\Windows\SysWOW64\Lpopnf32.dll Ggpbcaei.exe File created C:\Windows\SysWOW64\Cogllb32.dll Mkkmaalo.exe File created C:\Windows\SysWOW64\Feocoaai.exe Dffdjmme.exe File created C:\Windows\SysWOW64\Pgebnc32.dll Cglgck32.exe File created C:\Windows\SysWOW64\Ndigmnkj.dll Fagjolao.exe File created C:\Windows\SysWOW64\Lbddnj32.dll Hlpfak32.exe File opened for modification C:\Windows\SysWOW64\Pimkkfka.exe Poggnnkk.exe File created C:\Windows\SysWOW64\Ekoddodi.exe Eeelge32.exe File opened for modification C:\Windows\SysWOW64\Eicemccc.exe Ebimqi32.exe File created C:\Windows\SysWOW64\Pqghbd32.dll Hbhbie32.exe File created C:\Windows\SysWOW64\Gmimll32.exe Fapobl32.exe File opened for modification C:\Windows\SysWOW64\Blgiphni.exe Bemqcngl.exe File created C:\Windows\SysWOW64\Cpajdc32.exe Ckealm32.exe File opened for modification C:\Windows\SysWOW64\Kieaqe32.exe Jfnbnk32.exe File created C:\Windows\SysWOW64\Cmedcqge.dll Amodnenk.exe File created C:\Windows\SysWOW64\Pfdjccol.exe Ppjbfi32.exe File opened for modification C:\Windows\SysWOW64\Meepoc32.exe Lfpcngdo.exe File opened for modification C:\Windows\SysWOW64\Lcifde32.exe Kagimmol.exe File created C:\Windows\SysWOW64\Lanpml32.exe Lgikpc32.exe File created C:\Windows\SysWOW64\Ifgbhbbh.exe Ilbnkiba.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1740 10356 WerFault.exe Fkjmeggp.exe 10936 10356 WerFault.exe Fkjmeggp.exe -
Modifies registry class 64 IoCs
Processes:
Jgbccm32.exeOjgbpd32.exeQkegiggl.exeQemhlp32.exeDndnjllg.exeDafpjf32.exeMpchbhjl.exeAnqfepaj.exeMndapl32.exeEjhanj32.exeDffdjmme.exeJalakeme.exeFhalcm32.exeIeoapl32.exeEmanepld.exePjkofh32.exeHejjmage.exeDpbdiehi.exeEmenhcdf.exeIeiajckh.exeIaahjmkn.exeCfdgcmqd.exeHbchnfei.exeHpnohinj.exeIgmjhnej.exeJcknpi32.exeIepako32.exeKckqlpck.exeGjgmpkfl.exeKfiajinf.exeIafogggl.exeDfdpjj32.exeNqpccp32.exeAemjjeek.exeOggjni32.exeLnhadnpe.exeNlfnkoia.exe6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719.exeOiglen32.exeFggkifmg.exeObfpejcl.exeAjjcoqdl.exeOiagcg32.exeFicgkico.exeMlbbel32.exeKiodha32.exePdbbfadn.exeCglgck32.exeBhnqoo32.exeAjlngk32.exeJqfejl32.exeLgqfmcge.exeFplimi32.exeElccpife.exeNmajbnha.exeNngoddkg.exeHigjkehf.exeMfofjk32.exeJedjkkmo.exeEainnn32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odejmglm.dll" Jgbccm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ojgbpd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qkegiggl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qemhlp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dndnjllg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dafpjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjqgfmbl.dll" Mpchbhjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejbonb32.dll" Anqfepaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nldhbggg.dll" Mndapl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjlobkie.dll" Ejhanj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdlfonlf.dll" Dffdjmme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jalakeme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cplhopqe.dll" Fhalcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbcpibgf.dll" Ieoapl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhpoieid.dll" Emanepld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nagbcg32.dll" Pjkofh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hejjmage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dpbdiehi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlalhlfd.dll" Emenhcdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ieiajckh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnoanl32.dll" Iaahjmkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjodgmlo.dll" Cfdgcmqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hbchnfei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hpnohinj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Igmjhnej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jcknpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iepako32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hldbfp32.dll" Kckqlpck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmmohhoj.dll" Gjgmpkfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dndnjllg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ennikm32.dll" Kfiajinf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iafogggl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dfdpjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oifigkqc.dll" Nqpccp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aemjjeek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oggjni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inhgja32.dll" Jcknpi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lnhadnpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aqdolf32.dll" Nlfnkoia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oiglen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fggkifmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdiloa32.dll" Obfpejcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ajjcoqdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jgbccm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hledpl32.dll" Oiagcg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ficgkico.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Daodecgb.dll" Mlbbel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fepbfj32.dll" Kiodha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjqelb32.dll" Pdbbfadn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cglgck32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bhnqoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajlngk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jqfejl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofpfmaai.dll" Lgqfmcge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fplimi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Elccpife.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nmajbnha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nngoddkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgoaln32.dll" Higjkehf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mfofjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbbfag32.dll" Jedjkkmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kfiajinf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcjdoo32.dll" Eainnn32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719.exeKiodha32.exeMpchbhjl.exeNplkhf32.exeOinbgk32.exeOiqomj32.exeOkbhlm32.exePdbbfadn.exeBbkeacqo.exeCjfclcpg.exeDiafqi32.exeEihlahjd.exeEahjqicj.exeFbjcplhj.exeHhlnjpdi.exeIeiajckh.exeKiajck32.exeLkflpe32.exeLbenho32.exeMcggga32.exeMfofjk32.exeNlphmafm.exedescription pid process target process PID 5016 wrote to memory of 2448 5016 6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719.exe Kiodha32.exe PID 5016 wrote to memory of 2448 5016 6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719.exe Kiodha32.exe PID 5016 wrote to memory of 2448 5016 6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719.exe Kiodha32.exe PID 2448 wrote to memory of 2904 2448 Kiodha32.exe Mpchbhjl.exe PID 2448 wrote to memory of 2904 2448 Kiodha32.exe Mpchbhjl.exe PID 2448 wrote to memory of 2904 2448 Kiodha32.exe Mpchbhjl.exe PID 2904 wrote to memory of 1656 2904 Mpchbhjl.exe Nplkhf32.exe PID 2904 wrote to memory of 1656 2904 Mpchbhjl.exe Nplkhf32.exe PID 2904 wrote to memory of 1656 2904 Mpchbhjl.exe Nplkhf32.exe PID 1656 wrote to memory of 3680 1656 Nplkhf32.exe Oinbgk32.exe PID 1656 wrote to memory of 3680 1656 Nplkhf32.exe Oinbgk32.exe PID 1656 wrote to memory of 3680 1656 Nplkhf32.exe Oinbgk32.exe PID 3680 wrote to memory of 2236 3680 Oinbgk32.exe Oiqomj32.exe PID 3680 wrote to memory of 2236 3680 Oinbgk32.exe Oiqomj32.exe PID 3680 wrote to memory of 2236 3680 Oinbgk32.exe Oiqomj32.exe PID 2236 wrote to memory of 1592 2236 Oiqomj32.exe Okbhlm32.exe PID 2236 wrote to memory of 1592 2236 Oiqomj32.exe Okbhlm32.exe PID 2236 wrote to memory of 1592 2236 Oiqomj32.exe Okbhlm32.exe PID 1592 wrote to memory of 412 1592 Okbhlm32.exe Pdbbfadn.exe PID 1592 wrote to memory of 412 1592 Okbhlm32.exe Pdbbfadn.exe PID 1592 wrote to memory of 412 1592 Okbhlm32.exe Pdbbfadn.exe PID 412 wrote to memory of 1844 412 Pdbbfadn.exe Bbkeacqo.exe PID 412 wrote to memory of 1844 412 Pdbbfadn.exe Bbkeacqo.exe PID 412 wrote to memory of 1844 412 Pdbbfadn.exe Bbkeacqo.exe PID 1844 wrote to memory of 3608 1844 Bbkeacqo.exe Cjfclcpg.exe PID 1844 wrote to memory of 3608 1844 Bbkeacqo.exe Cjfclcpg.exe PID 1844 wrote to memory of 3608 1844 Bbkeacqo.exe Cjfclcpg.exe PID 3608 wrote to memory of 4460 3608 Cjfclcpg.exe Diafqi32.exe PID 3608 wrote to memory of 4460 3608 Cjfclcpg.exe Diafqi32.exe PID 3608 wrote to memory of 4460 3608 Cjfclcpg.exe Diafqi32.exe PID 4460 wrote to memory of 4444 4460 Diafqi32.exe Eihlahjd.exe PID 4460 wrote to memory of 4444 4460 Diafqi32.exe Eihlahjd.exe PID 4460 wrote to memory of 4444 4460 Diafqi32.exe Eihlahjd.exe PID 4444 wrote to memory of 2224 4444 Eihlahjd.exe Eahjqicj.exe PID 4444 wrote to memory of 2224 4444 Eihlahjd.exe Eahjqicj.exe PID 4444 wrote to memory of 2224 4444 Eihlahjd.exe Eahjqicj.exe PID 2224 wrote to memory of 3932 2224 Eahjqicj.exe Fbjcplhj.exe PID 2224 wrote to memory of 3932 2224 Eahjqicj.exe Fbjcplhj.exe PID 2224 wrote to memory of 3932 2224 Eahjqicj.exe Fbjcplhj.exe PID 3932 wrote to memory of 5084 3932 Fbjcplhj.exe Hhlnjpdi.exe PID 3932 wrote to memory of 5084 3932 Fbjcplhj.exe Hhlnjpdi.exe PID 3932 wrote to memory of 5084 3932 Fbjcplhj.exe Hhlnjpdi.exe PID 5084 wrote to memory of 2864 5084 Hhlnjpdi.exe Ieiajckh.exe PID 5084 wrote to memory of 2864 5084 Hhlnjpdi.exe Ieiajckh.exe PID 5084 wrote to memory of 2864 5084 Hhlnjpdi.exe Ieiajckh.exe PID 2864 wrote to memory of 4524 2864 Ieiajckh.exe Kiajck32.exe PID 2864 wrote to memory of 4524 2864 Ieiajckh.exe Kiajck32.exe PID 2864 wrote to memory of 4524 2864 Ieiajckh.exe Kiajck32.exe PID 4524 wrote to memory of 1508 4524 Kiajck32.exe Lkflpe32.exe PID 4524 wrote to memory of 1508 4524 Kiajck32.exe Lkflpe32.exe PID 4524 wrote to memory of 1508 4524 Kiajck32.exe Lkflpe32.exe PID 1508 wrote to memory of 4320 1508 Lkflpe32.exe Lbenho32.exe PID 1508 wrote to memory of 4320 1508 Lkflpe32.exe Lbenho32.exe PID 1508 wrote to memory of 4320 1508 Lkflpe32.exe Lbenho32.exe PID 4320 wrote to memory of 3880 4320 Lbenho32.exe Mcggga32.exe PID 4320 wrote to memory of 3880 4320 Lbenho32.exe Mcggga32.exe PID 4320 wrote to memory of 3880 4320 Lbenho32.exe Mcggga32.exe PID 3880 wrote to memory of 3156 3880 Mcggga32.exe Mfofjk32.exe PID 3880 wrote to memory of 3156 3880 Mcggga32.exe Mfofjk32.exe PID 3880 wrote to memory of 3156 3880 Mcggga32.exe Mfofjk32.exe PID 3156 wrote to memory of 2880 3156 Mfofjk32.exe Nlphmafm.exe PID 3156 wrote to memory of 2880 3156 Mfofjk32.exe Nlphmafm.exe PID 3156 wrote to memory of 2880 3156 Mfofjk32.exe Nlphmafm.exe PID 2880 wrote to memory of 1360 2880 Nlphmafm.exe Oikngeoo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719.exe"C:\Users\Admin\AppData\Local\Temp\6ec1d2f802b6f69a029210411da9141a630467ac7cf29ed67f4184f148089719.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\Kiodha32.exeC:\Windows\system32\Kiodha32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\Mpchbhjl.exeC:\Windows\system32\Mpchbhjl.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Nplkhf32.exeC:\Windows\system32\Nplkhf32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\Oinbgk32.exeC:\Windows\system32\Oinbgk32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\Oiqomj32.exeC:\Windows\system32\Oiqomj32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Okbhlm32.exeC:\Windows\system32\Okbhlm32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\Pdbbfadn.exeC:\Windows\system32\Pdbbfadn.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\Bbkeacqo.exeC:\Windows\system32\Bbkeacqo.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\Cjfclcpg.exeC:\Windows\system32\Cjfclcpg.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\Diafqi32.exeC:\Windows\system32\Diafqi32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\Eihlahjd.exeC:\Windows\system32\Eihlahjd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\Eahjqicj.exeC:\Windows\system32\Eahjqicj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\Fbjcplhj.exeC:\Windows\system32\Fbjcplhj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\Hhlnjpdi.exeC:\Windows\system32\Hhlnjpdi.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\Ieiajckh.exeC:\Windows\system32\Ieiajckh.exe16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Kiajck32.exeC:\Windows\system32\Kiajck32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\Lkflpe32.exeC:\Windows\system32\Lkflpe32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\Lbenho32.exeC:\Windows\system32\Lbenho32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\Mcggga32.exeC:\Windows\system32\Mcggga32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\Mfofjk32.exeC:\Windows\system32\Mfofjk32.exe21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\Nlphmafm.exeC:\Windows\system32\Nlphmafm.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\Oikngeoo.exeC:\Windows\system32\Oikngeoo.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\Obfpejcl.exeC:\Windows\system32\Obfpejcl.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:4600 -
C:\Windows\SysWOW64\Odhiemil.exeC:\Windows\system32\Odhiemil.exe25⤵
- Executes dropped EXE
PID:3892 -
C:\Windows\SysWOW64\Pgknlg32.exeC:\Windows\system32\Pgknlg32.exe26⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\Pkigbfja.exeC:\Windows\system32\Pkigbfja.exe27⤵
- Executes dropped EXE
PID:1176 -
C:\Windows\SysWOW64\Qnniopcm.exeC:\Windows\system32\Qnniopcm.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\Anqfepaj.exeC:\Windows\system32\Anqfepaj.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:4636 -
C:\Windows\SysWOW64\Ajjcoqdl.exeC:\Windows\system32\Ajjcoqdl.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\Bkbcpb32.exeC:\Windows\system32\Bkbcpb32.exe31⤵
- Executes dropped EXE
PID:3584 -
C:\Windows\SysWOW64\Bjhpqn32.exeC:\Windows\system32\Bjhpqn32.exe32⤵
- Executes dropped EXE
PID:764 -
C:\Windows\SysWOW64\Cgnmpbec.exeC:\Windows\system32\Cgnmpbec.exe33⤵
- Executes dropped EXE
PID:4536 -
C:\Windows\SysWOW64\Cklffq32.exeC:\Windows\system32\Cklffq32.exe34⤵
- Executes dropped EXE
PID:1104 -
C:\Windows\SysWOW64\Ccigpbga.exeC:\Windows\system32\Ccigpbga.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\Dkjbgooi.exeC:\Windows\system32\Dkjbgooi.exe36⤵
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\Dmknog32.exeC:\Windows\system32\Dmknog32.exe37⤵
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\Ejhanj32.exeC:\Windows\system32\Ejhanj32.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:4964 -
C:\Windows\SysWOW64\Fhalcm32.exeC:\Windows\system32\Fhalcm32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:3884 -
C:\Windows\SysWOW64\Fmbnfcam.exeC:\Windows\system32\Fmbnfcam.exe40⤵
- Executes dropped EXE
PID:4816 -
C:\Windows\SysWOW64\Haobnpkc.exeC:\Windows\system32\Haobnpkc.exe41⤵
- Executes dropped EXE
PID:4144 -
C:\Windows\SysWOW64\Hklpaeno.exeC:\Windows\system32\Hklpaeno.exe42⤵
- Executes dropped EXE
PID:3432 -
C:\Windows\SysWOW64\Incpdodg.exeC:\Windows\system32\Incpdodg.exe43⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\Iaahjmkn.exeC:\Windows\system32\Iaahjmkn.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:1324 -
C:\Windows\SysWOW64\Ieoapl32.exeC:\Windows\system32\Ieoapl32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:4916 -
C:\Windows\SysWOW64\Jedjkkmo.exeC:\Windows\system32\Jedjkkmo.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:4624 -
C:\Windows\SysWOW64\Jefgak32.exeC:\Windows\system32\Jefgak32.exe47⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\Klloichl.exeC:\Windows\system32\Klloichl.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3820 -
C:\Windows\SysWOW64\Klnkoc32.exeC:\Windows\system32\Klnkoc32.exe49⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\Lkfeeo32.exeC:\Windows\system32\Lkfeeo32.exe50⤵
- Executes dropped EXE
PID:4660 -
C:\Windows\SysWOW64\Lfpcngdo.exeC:\Windows\system32\Lfpcngdo.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4576 -
C:\Windows\SysWOW64\Meepoc32.exeC:\Windows\system32\Meepoc32.exe52⤵
- Executes dropped EXE
PID:3324 -
C:\Windows\SysWOW64\Mbbcofpf.exeC:\Windows\system32\Mbbcofpf.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1836 -
C:\Windows\SysWOW64\Neclpamg.exeC:\Windows\system32\Neclpamg.exe54⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Nfgbec32.exeC:\Windows\system32\Nfgbec32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4348 -
C:\Windows\SysWOW64\Nmajbnha.exeC:\Windows\system32\Nmajbnha.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:2416 -
C:\Windows\SysWOW64\Oemofpel.exeC:\Windows\system32\Oemofpel.exe57⤵
- Executes dropped EXE
PID:3316 -
C:\Windows\SysWOW64\Pifghmae.exeC:\Windows\system32\Pifghmae.exe58⤵
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\Pfjgbapo.exeC:\Windows\system32\Pfjgbapo.exe59⤵
- Executes dropped EXE
PID:3556 -
C:\Windows\SysWOW64\Qmkfoj32.exeC:\Windows\system32\Qmkfoj32.exe60⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\SysWOW64\Cjlbag32.exeC:\Windows\system32\Cjlbag32.exe61⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\Cfeplh32.exeC:\Windows\system32\Cfeplh32.exe62⤵
- Executes dropped EXE
PID:4464 -
C:\Windows\SysWOW64\Cjbhbf32.exeC:\Windows\system32\Cjbhbf32.exe63⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\Dncnnd32.exeC:\Windows\system32\Dncnnd32.exe64⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\Dgkbfjeg.exeC:\Windows\system32\Dgkbfjeg.exe65⤵
- Executes dropped EXE
PID:2492 -
C:\Windows\SysWOW64\Dgnolj32.exeC:\Windows\system32\Dgnolj32.exe66⤵PID:2584
-
C:\Windows\SysWOW64\Egeemiml.exeC:\Windows\system32\Egeemiml.exe67⤵PID:2984
-
C:\Windows\SysWOW64\Emanepld.exeC:\Windows\system32\Emanepld.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4620 -
C:\Windows\SysWOW64\Eqpfknbj.exeC:\Windows\system32\Eqpfknbj.exe69⤵PID:2532
-
C:\Windows\SysWOW64\Eglkmh32.exeC:\Windows\system32\Eglkmh32.exe70⤵PID:2792
-
C:\Windows\SysWOW64\Egnhcgeb.exeC:\Windows\system32\Egnhcgeb.exe71⤵PID:4020
-
C:\Windows\SysWOW64\Fceihh32.exeC:\Windows\system32\Fceihh32.exe72⤵PID:4148
-
C:\Windows\SysWOW64\Fplimi32.exeC:\Windows\system32\Fplimi32.exe73⤵
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Fpnfbi32.exeC:\Windows\system32\Fpnfbi32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4908 -
C:\Windows\SysWOW64\Fggkifmg.exeC:\Windows\system32\Fggkifmg.exe75⤵
- Modifies registry class
PID:2940 -
C:\Windows\SysWOW64\Fapobl32.exeC:\Windows\system32\Fapobl32.exe76⤵
- Drops file in System32 directory
PID:3508 -
C:\Windows\SysWOW64\Gmimll32.exeC:\Windows\system32\Gmimll32.exe77⤵PID:3204
-
C:\Windows\SysWOW64\Ghcjedcj.exeC:\Windows\system32\Ghcjedcj.exe78⤵PID:2016
-
C:\Windows\SysWOW64\Haeadi32.exeC:\Windows\system32\Haeadi32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4256 -
C:\Windows\SysWOW64\Ipjoee32.exeC:\Windows\system32\Ipjoee32.exe80⤵PID:828
-
C:\Windows\SysWOW64\Imnoni32.exeC:\Windows\system32\Imnoni32.exe81⤵PID:5144
-
C:\Windows\SysWOW64\Ikbphn32.exeC:\Windows\system32\Ikbphn32.exe82⤵PID:5184
-
C:\Windows\SysWOW64\Ihfpabbd.exeC:\Windows\system32\Ihfpabbd.exe83⤵PID:5224
-
C:\Windows\SysWOW64\Igmjhnej.exeC:\Windows\system32\Igmjhnej.exe84⤵
- Modifies registry class
PID:5264 -
C:\Windows\SysWOW64\Jaekkfcm.exeC:\Windows\system32\Jaekkfcm.exe85⤵PID:5304
-
C:\Windows\SysWOW64\Jgbccm32.exeC:\Windows\system32\Jgbccm32.exe86⤵
- Modifies registry class
PID:5344 -
C:\Windows\SysWOW64\Jhapmphg.exeC:\Windows\system32\Jhapmphg.exe87⤵PID:5384
-
C:\Windows\SysWOW64\Jggmnmmo.exeC:\Windows\system32\Jggmnmmo.exe88⤵
- Drops file in System32 directory
PID:5424 -
C:\Windows\SysWOW64\Jalakeme.exeC:\Windows\system32\Jalakeme.exe89⤵
- Modifies registry class
PID:5464 -
C:\Windows\SysWOW64\Jopaejlo.exeC:\Windows\system32\Jopaejlo.exe90⤵PID:5508
-
C:\Windows\SysWOW64\Knenffqf.exeC:\Windows\system32\Knenffqf.exe91⤵PID:5552
-
C:\Windows\SysWOW64\Khplnn32.exeC:\Windows\system32\Khplnn32.exe92⤵PID:5592
-
C:\Windows\SysWOW64\Kolaqh32.exeC:\Windows\system32\Kolaqh32.exe93⤵PID:5636
-
C:\Windows\SysWOW64\Lhdeinhb.exeC:\Windows\system32\Lhdeinhb.exe94⤵PID:5676
-
C:\Windows\SysWOW64\Lamjbc32.exeC:\Windows\system32\Lamjbc32.exe95⤵PID:5720
-
C:\Windows\SysWOW64\Locgagli.exeC:\Windows\system32\Locgagli.exe96⤵PID:5768
-
C:\Windows\SysWOW64\Ldpoinjq.exeC:\Windows\system32\Ldpoinjq.exe97⤵PID:5820
-
C:\Windows\SysWOW64\Mqkijnkp.exeC:\Windows\system32\Mqkijnkp.exe98⤵PID:5860
-
C:\Windows\SysWOW64\Mgebfhcl.exeC:\Windows\system32\Mgebfhcl.exe99⤵PID:5900
-
C:\Windows\SysWOW64\Mbkfcabb.exeC:\Windows\system32\Mbkfcabb.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5940 -
C:\Windows\SysWOW64\Mhenpk32.exeC:\Windows\system32\Mhenpk32.exe101⤵PID:5980
-
C:\Windows\SysWOW64\Mkcjlf32.exeC:\Windows\system32\Mkcjlf32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6024 -
C:\Windows\SysWOW64\Mqpcdn32.exeC:\Windows\system32\Mqpcdn32.exe103⤵
- Drops file in System32 directory
PID:6064 -
C:\Windows\SysWOW64\Mkegbfgp.exeC:\Windows\system32\Mkegbfgp.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6104 -
C:\Windows\SysWOW64\Mqbpjmeg.exeC:\Windows\system32\Mqbpjmeg.exe105⤵PID:736
-
C:\Windows\SysWOW64\Nnpcjplf.exeC:\Windows\system32\Nnpcjplf.exe106⤵
- Drops file in System32 directory
PID:5200 -
C:\Windows\SysWOW64\Ondleo32.exeC:\Windows\system32\Ondleo32.exe107⤵PID:5336
-
C:\Windows\SysWOW64\Ophbja32.exeC:\Windows\system32\Ophbja32.exe108⤵PID:5408
-
C:\Windows\SysWOW64\Oiagcg32.exeC:\Windows\system32\Oiagcg32.exe109⤵
- Modifies registry class
PID:5480 -
C:\Windows\SysWOW64\Pnnokn32.exeC:\Windows\system32\Pnnokn32.exe110⤵PID:5560
-
C:\Windows\SysWOW64\Picchg32.exeC:\Windows\system32\Picchg32.exe111⤵PID:5632
-
C:\Windows\SysWOW64\Pblhalfm.exeC:\Windows\system32\Pblhalfm.exe112⤵PID:5700
-
C:\Windows\SysWOW64\Pelacg32.exeC:\Windows\system32\Pelacg32.exe113⤵PID:5800
-
C:\Windows\SysWOW64\Pneelmjo.exeC:\Windows\system32\Pneelmjo.exe114⤵PID:5844
-
C:\Windows\SysWOW64\Pbbnbkpe.exeC:\Windows\system32\Pbbnbkpe.exe115⤵PID:5928
-
C:\Windows\SysWOW64\Qhofjbnl.exeC:\Windows\system32\Qhofjbnl.exe116⤵PID:6032
-
C:\Windows\SysWOW64\Aiapjecl.exeC:\Windows\system32\Aiapjecl.exe117⤵PID:5032
-
C:\Windows\SysWOW64\Abjdbj32.exeC:\Windows\system32\Abjdbj32.exe118⤵PID:5244
-
C:\Windows\SysWOW64\Ahiiqafa.exeC:\Windows\system32\Ahiiqafa.exe119⤵PID:5016
-
C:\Windows\SysWOW64\Aemjjeek.exeC:\Windows\system32\Aemjjeek.exe120⤵
- Modifies registry class
PID:5352 -
C:\Windows\SysWOW64\Abqjci32.exeC:\Windows\system32\Abqjci32.exe121⤵PID:5420
-
C:\Windows\SysWOW64\Alioloje.exeC:\Windows\system32\Alioloje.exe122⤵PID:5548
-
C:\Windows\SysWOW64\Beaced32.exeC:\Windows\system32\Beaced32.exe123⤵PID:5644
-
C:\Windows\SysWOW64\Bojhnjgf.exeC:\Windows\system32\Bojhnjgf.exe124⤵PID:5684
-
C:\Windows\SysWOW64\Bhblfpng.exeC:\Windows\system32\Bhblfpng.exe125⤵PID:5756
-
C:\Windows\SysWOW64\Bajqpe32.exeC:\Windows\system32\Bajqpe32.exe126⤵PID:5912
-
C:\Windows\SysWOW64\Booaii32.exeC:\Windows\system32\Booaii32.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6040 -
C:\Windows\SysWOW64\Cpbgnlfo.exeC:\Windows\system32\Cpbgnlfo.exe128⤵PID:5208
-
C:\Windows\SysWOW64\Cikkga32.exeC:\Windows\system32\Cikkga32.exe129⤵PID:5288
-
C:\Windows\SysWOW64\Cohdoh32.exeC:\Windows\system32\Cohdoh32.exe130⤵PID:2920
-
C:\Windows\SysWOW64\Cebllbcc.exeC:\Windows\system32\Cebllbcc.exe131⤵PID:4872
-
C:\Windows\SysWOW64\Dhgoimlo.exeC:\Windows\system32\Dhgoimlo.exe132⤵PID:5760
-
C:\Windows\SysWOW64\Dcmcfeke.exeC:\Windows\system32\Dcmcfeke.exe133⤵PID:5892
-
C:\Windows\SysWOW64\Dhjknljl.exeC:\Windows\system32\Dhjknljl.exe134⤵PID:1252
-
C:\Windows\SysWOW64\Dcopke32.exeC:\Windows\system32\Dcopke32.exe135⤵PID:4380
-
C:\Windows\SysWOW64\Djihhoao.exeC:\Windows\system32\Djihhoao.exe136⤵PID:5456
-
C:\Windows\SysWOW64\Dpcpei32.exeC:\Windows\system32\Dpcpei32.exe137⤵PID:5716
-
C:\Windows\SysWOW64\Dpemjifi.exeC:\Windows\system32\Dpemjifi.exe138⤵PID:5936
-
C:\Windows\SysWOW64\Dfbebpdq.exeC:\Windows\system32\Dfbebpdq.exe139⤵PID:6060
-
C:\Windows\SysWOW64\Ecfeldcj.exeC:\Windows\system32\Ecfeldcj.exe140⤵PID:880
-
C:\Windows\SysWOW64\Ehcndkaa.exeC:\Windows\system32\Ehcndkaa.exe141⤵PID:5544
-
C:\Windows\SysWOW64\Echbad32.exeC:\Windows\system32\Echbad32.exe142⤵PID:5988
-
C:\Windows\SysWOW64\Ebnocpfp.exeC:\Windows\system32\Ebnocpfp.exe143⤵PID:4420
-
C:\Windows\SysWOW64\Elccpife.exeC:\Windows\system32\Elccpife.exe144⤵
- Modifies registry class
PID:4056 -
C:\Windows\SysWOW64\Ecmlmcmb.exeC:\Windows\system32\Ecmlmcmb.exe145⤵PID:2904
-
C:\Windows\SysWOW64\Ehjdejkj.exeC:\Windows\system32\Ehjdejkj.exe146⤵PID:5028
-
C:\Windows\SysWOW64\Ebbinp32.exeC:\Windows\system32\Ebbinp32.exe147⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5880 -
C:\Windows\SysWOW64\Fqhbgf32.exeC:\Windows\system32\Fqhbgf32.exe148⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6148 -
C:\Windows\SysWOW64\Ficgkico.exeC:\Windows\system32\Ficgkico.exe149⤵
- Modifies registry class
PID:6232 -
C:\Windows\SysWOW64\Fbnhjn32.exeC:\Windows\system32\Fbnhjn32.exe150⤵PID:6284
-
C:\Windows\SysWOW64\Gjgmpkfl.exeC:\Windows\system32\Gjgmpkfl.exe151⤵
- Modifies registry class
PID:6328 -
C:\Windows\SysWOW64\Godehbed.exeC:\Windows\system32\Godehbed.exe152⤵PID:6396
-
C:\Windows\SysWOW64\Hmolbene.exeC:\Windows\system32\Hmolbene.exe153⤵PID:6448
-
C:\Windows\SysWOW64\Hcidoo32.exeC:\Windows\system32\Hcidoo32.exe154⤵
- Drops file in System32 directory
PID:6504 -
C:\Windows\SysWOW64\Hifmhf32.exeC:\Windows\system32\Hifmhf32.exe155⤵PID:6580
-
C:\Windows\SysWOW64\Hcpjpn32.exeC:\Windows\system32\Hcpjpn32.exe156⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6628 -
C:\Windows\SysWOW64\Hjjbmhfg.exeC:\Windows\system32\Hjjbmhfg.exe157⤵PID:6688
-
C:\Windows\SysWOW64\Ipldpo32.exeC:\Windows\system32\Ipldpo32.exe158⤵
- Drops file in System32 directory
PID:6736 -
C:\Windows\SysWOW64\Iffmmihf.exeC:\Windows\system32\Iffmmihf.exe159⤵PID:6784
-
C:\Windows\SysWOW64\Iakajagl.exeC:\Windows\system32\Iakajagl.exe160⤵PID:6852
-
C:\Windows\SysWOW64\Jdqcglqh.exeC:\Windows\system32\Jdqcglqh.exe161⤵PID:6904
-
C:\Windows\SysWOW64\Jinloboo.exeC:\Windows\system32\Jinloboo.exe162⤵PID:6952
-
C:\Windows\SysWOW64\Jdcplkoe.exeC:\Windows\system32\Jdcplkoe.exe163⤵PID:6996
-
C:\Windows\SysWOW64\Jjmhie32.exeC:\Windows\system32\Jjmhie32.exe164⤵PID:7040
-
C:\Windows\SysWOW64\Jmkdeaee.exeC:\Windows\system32\Jmkdeaee.exe165⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7092 -
C:\Windows\SysWOW64\Kmgdaokh.exeC:\Windows\system32\Kmgdaokh.exe166⤵PID:7140
-
C:\Windows\SysWOW64\Kphmbjhi.exeC:\Windows\system32\Kphmbjhi.exe167⤵PID:3608
-
C:\Windows\SysWOW64\Kipalpoj.exeC:\Windows\system32\Kipalpoj.exe168⤵PID:5896
-
C:\Windows\SysWOW64\Kagimmol.exeC:\Windows\system32\Kagimmol.exe169⤵
- Drops file in System32 directory
PID:6240 -
C:\Windows\SysWOW64\Lcifde32.exeC:\Windows\system32\Lcifde32.exe170⤵
- Drops file in System32 directory
PID:6320 -
C:\Windows\SysWOW64\Lmnjan32.exeC:\Windows\system32\Lmnjan32.exe171⤵PID:4888
-
C:\Windows\SysWOW64\Lckbje32.exeC:\Windows\system32\Lckbje32.exe172⤵PID:6472
-
C:\Windows\SysWOW64\Liekgo32.exeC:\Windows\system32\Liekgo32.exe173⤵PID:4860
-
C:\Windows\SysWOW64\Lpocciba.exeC:\Windows\system32\Lpocciba.exe174⤵PID:6540
-
C:\Windows\SysWOW64\Lgikpc32.exeC:\Windows\system32\Lgikpc32.exe175⤵
- Drops file in System32 directory
PID:6644 -
C:\Windows\SysWOW64\Lanpml32.exeC:\Windows\system32\Lanpml32.exe176⤵PID:6680
-
C:\Windows\SysWOW64\Lcpledob.exeC:\Windows\system32\Lcpledob.exe177⤵PID:6760
-
C:\Windows\SysWOW64\Lijdbofo.exeC:\Windows\system32\Lijdbofo.exe178⤵PID:6840
-
C:\Windows\SysWOW64\Lpcmoi32.exeC:\Windows\system32\Lpcmoi32.exe179⤵PID:6900
-
C:\Windows\SysWOW64\Lgnekcei.exeC:\Windows\system32\Lgnekcei.exe180⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6980 -
C:\Windows\SysWOW64\Lngmhm32.exeC:\Windows\system32\Lngmhm32.exe181⤵
- Drops file in System32 directory
PID:7048 -
C:\Windows\SysWOW64\Mdaedgdb.exeC:\Windows\system32\Mdaedgdb.exe182⤵PID:7128
-
C:\Windows\SysWOW64\Mkkmaalo.exeC:\Windows\system32\Mkkmaalo.exe183⤵
- Drops file in System32 directory
PID:4708 -
C:\Windows\SysWOW64\Mphfjhjf.exeC:\Windows\system32\Mphfjhjf.exe184⤵PID:6220
-
C:\Windows\SysWOW64\Mknjgajl.exeC:\Windows\system32\Mknjgajl.exe185⤵PID:6312
-
C:\Windows\SysWOW64\Mpkbohhd.exeC:\Windows\system32\Mpkbohhd.exe186⤵PID:6432
-
C:\Windows\SysWOW64\Nbfoeiei.exeC:\Windows\system32\Nbfoeiei.exe187⤵
- Drops file in System32 directory
PID:4384 -
C:\Windows\SysWOW64\Nkncno32.exeC:\Windows\system32\Nkncno32.exe188⤵PID:6528
-
C:\Windows\SysWOW64\Ojjfpjjj.exeC:\Windows\system32\Ojjfpjjj.exe189⤵PID:6776
-
C:\Windows\SysWOW64\Odpjmcjp.exeC:\Windows\system32\Odpjmcjp.exe190⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6888 -
C:\Windows\SysWOW64\Pjhbah32.exeC:\Windows\system32\Pjhbah32.exe191⤵PID:7032
-
C:\Windows\SysWOW64\Pengna32.exeC:\Windows\system32\Pengna32.exe192⤵PID:4848
-
C:\Windows\SysWOW64\Pjkofh32.exeC:\Windows\system32\Pjkofh32.exe193⤵
- Modifies registry class
PID:6372 -
C:\Windows\SysWOW64\Blkdgheg.exeC:\Windows\system32\Blkdgheg.exe194⤵PID:6516
-
C:\Windows\SysWOW64\Bdfilkbb.exeC:\Windows\system32\Bdfilkbb.exe195⤵PID:2572
-
C:\Windows\SysWOW64\Baocpnmf.exeC:\Windows\system32\Baocpnmf.exe196⤵PID:6744
-
C:\Windows\SysWOW64\Cbnpja32.exeC:\Windows\system32\Cbnpja32.exe197⤵PID:3156
-
C:\Windows\SysWOW64\Cbqlpabf.exeC:\Windows\system32\Cbqlpabf.exe198⤵PID:6820
-
C:\Windows\SysWOW64\Ckladcoa.exeC:\Windows\system32\Ckladcoa.exe199⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6992 -
C:\Windows\SysWOW64\Clknnf32.exeC:\Windows\system32\Clknnf32.exe200⤵PID:6120
-
C:\Windows\SysWOW64\Cdfbbhdp.exeC:\Windows\system32\Cdfbbhdp.exe201⤵PID:3592
-
C:\Windows\SysWOW64\Cefolk32.exeC:\Windows\system32\Cefolk32.exe202⤵PID:4560
-
C:\Windows\SysWOW64\Dlbcoe32.exeC:\Windows\system32\Dlbcoe32.exe203⤵PID:4208
-
C:\Windows\SysWOW64\Dboiaoff.exeC:\Windows\system32\Dboiaoff.exe204⤵PID:3880
-
C:\Windows\SysWOW64\Dcaefo32.exeC:\Windows\system32\Dcaefo32.exe205⤵PID:2916
-
C:\Windows\SysWOW64\Deanhj32.exeC:\Windows\system32\Deanhj32.exe206⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1676 -
C:\Windows\SysWOW64\Ekngqqol.exeC:\Windows\system32\Ekngqqol.exe207⤵PID:6988
-
C:\Windows\SysWOW64\Eedkniob.exeC:\Windows\system32\Eedkniob.exe208⤵PID:4452
-
C:\Windows\SysWOW64\Ekqcfpmj.exeC:\Windows\system32\Ekqcfpmj.exe209⤵PID:4404
-
C:\Windows\SysWOW64\Ehddpdlc.exeC:\Windows\system32\Ehddpdlc.exe210⤵PID:1616
-
C:\Windows\SysWOW64\Ecoahmhd.exeC:\Windows\system32\Ecoahmhd.exe211⤵PID:1260
-
C:\Windows\SysWOW64\Fkjfloeo.exeC:\Windows\system32\Fkjfloeo.exe212⤵PID:6656
-
C:\Windows\SysWOW64\Fkalmn32.exeC:\Windows\system32\Fkalmn32.exe213⤵PID:1104
-
C:\Windows\SysWOW64\Fhemfbnq.exeC:\Windows\system32\Fhemfbnq.exe214⤵PID:6916
-
C:\Windows\SysWOW64\Ghgjlaln.exeC:\Windows\system32\Ghgjlaln.exe215⤵PID:7148
-
C:\Windows\SysWOW64\Gcagdj32.exeC:\Windows\system32\Gcagdj32.exe216⤵PID:3028
-
C:\Windows\SysWOW64\Ghnpmqef.exeC:\Windows\system32\Ghnpmqef.exe217⤵PID:6420
-
C:\Windows\SysWOW64\Hdgmga32.exeC:\Windows\system32\Hdgmga32.exe218⤵PID:4288
-
C:\Windows\SysWOW64\Hejjmage.exeC:\Windows\system32\Hejjmage.exe219⤵
- Modifies registry class
PID:6728 -
C:\Windows\SysWOW64\Hckjjh32.exeC:\Windows\system32\Hckjjh32.exe220⤵PID:4476
-
C:\Windows\SysWOW64\Ibeqgdpf.exeC:\Windows\system32\Ibeqgdpf.exe221⤵PID:3892
-
C:\Windows\SysWOW64\Imjddmpl.exeC:\Windows\system32\Imjddmpl.exe222⤵PID:6624
-
C:\Windows\SysWOW64\Ilbnkiba.exeC:\Windows\system32\Ilbnkiba.exe223⤵
- Drops file in System32 directory
PID:6932 -
C:\Windows\SysWOW64\Ifgbhbbh.exeC:\Windows\system32\Ifgbhbbh.exe224⤵PID:4304
-
C:\Windows\SysWOW64\Imakdl32.exeC:\Windows\system32\Imakdl32.exe225⤵PID:4316
-
C:\Windows\SysWOW64\Jfcbcp32.exeC:\Windows\system32\Jfcbcp32.exe226⤵PID:6208
-
C:\Windows\SysWOW64\Jcgbmd32.exeC:\Windows\system32\Jcgbmd32.exe227⤵PID:6384
-
C:\Windows\SysWOW64\Kdcbic32.exeC:\Windows\system32\Kdcbic32.exe228⤵PID:7100
-
C:\Windows\SysWOW64\Kipkaj32.exeC:\Windows\system32\Kipkaj32.exe229⤵PID:6364
-
C:\Windows\SysWOW64\Ldeonbkd.exeC:\Windows\system32\Ldeonbkd.exe230⤵PID:3432
-
C:\Windows\SysWOW64\Lfhdem32.exeC:\Windows\system32\Lfhdem32.exe231⤵
- Drops file in System32 directory
PID:3616 -
C:\Windows\SysWOW64\Lmbmbgmo.exeC:\Windows\system32\Lmbmbgmo.exe232⤵PID:6860
-
C:\Windows\SysWOW64\Medggidb.exeC:\Windows\system32\Medggidb.exe233⤵PID:2804
-
C:\Windows\SysWOW64\Mpjleadh.exeC:\Windows\system32\Mpjleadh.exe234⤵PID:6340
-
C:\Windows\SysWOW64\Mibpng32.exeC:\Windows\system32\Mibpng32.exe235⤵
- Drops file in System32 directory
PID:2344 -
C:\Windows\SysWOW64\Mdhdkp32.exeC:\Windows\system32\Mdhdkp32.exe236⤵PID:4632
-
C:\Windows\SysWOW64\Meiabh32.exeC:\Windows\system32\Meiabh32.exe237⤵PID:2884
-
C:\Windows\SysWOW64\Mpoepa32.exeC:\Windows\system32\Mpoepa32.exe238⤵PID:4480
-
C:\Windows\SysWOW64\Meknhh32.exeC:\Windows\system32\Meknhh32.exe239⤵PID:2824
-
C:\Windows\SysWOW64\Nenjng32.exeC:\Windows\system32\Nenjng32.exe240⤵PID:7152
-
C:\Windows\SysWOW64\Ndokko32.exeC:\Windows\system32\Ndokko32.exe241⤵PID:7176
-
C:\Windows\SysWOW64\Nngoddkg.exeC:\Windows\system32\Nngoddkg.exe242⤵
- Modifies registry class
PID:7220