Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
f41143f15d73f7e790c883187e221bd81623f013a72a4ab479f0c33604dad23a.exe
Resource
win7-20220901-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
f41143f15d73f7e790c883187e221bd81623f013a72a4ab479f0c33604dad23a.exe
Resource
win10v2004-20220901-en
6 signatures
150 seconds
General
-
Target
f41143f15d73f7e790c883187e221bd81623f013a72a4ab479f0c33604dad23a.exe
-
Size
51KB
-
MD5
088022f0a6c166ded93ba8e5bb9d1a80
-
SHA1
79cdb8a632a70d7575cd7e6de8e0249a7f5ffa87
-
SHA256
f41143f15d73f7e790c883187e221bd81623f013a72a4ab479f0c33604dad23a
-
SHA512
57de5510575ed695fc27827d0ccc5155910de9d38b7d078720f17aa511a193fe61343c088e02ffd092b07461225c6fd3cc755e479d02e115462b80be09c80867
-
SSDEEP
1536:V5iG4SVX4oxfeEL0ERZFcwDzZyFg5V05zB:bT+oxfeEL7+wDP2T
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgelni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cflfca32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbnkdjkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pllpfhhp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghadpeck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plgpqb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cggibe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgkbmdpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikjcdcom.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgphnajh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aijcfkoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acbhopeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adadic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Almime32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gjdjgp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cokgehgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cggibe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkcmcdee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ieknfm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjqfdh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgcohjmn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glkdkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gehboi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dqhpai32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhphlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mminmpnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkfjcpfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emikfocj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghfnke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amlombnd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgajmpcl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjninh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmcfcl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amlombnd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doidgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gembeooh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjninh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbinbk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acgajpaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oplfqbgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hikkkmfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hccodc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkigipdd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pindjlil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgdaip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkjigk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgabbjpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Facchlpc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klceqlmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omhpig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qefkjg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mccfjjeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbaohbda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccgjqmcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nppfecah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clcajlbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmmgho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgdaip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjecai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekcedhaa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjbdkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lohgmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Polbmmbe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Giaheoni.exe -
Executes dropped EXE 64 IoCs
pid Process 4072 Cjbihn32.exe 4228 Cegnef32.exe 4692 Cnpbnl32.exe 1168 Cghggakf.exe 2404 Cbnkdjkl.exe 2244 Ckfpmpam.exe 4656 Cendfe32.exe 4428 Daedkfna.exe 2228 Dniedk32.exe 3944 Dgajmpcl.exe 3800 Diafgc32.exe 2224 Djbbokpm.exe 3824 Dalkkegj.exe 2912 Ghbkklgf.exe 4864 Goldgfnc.exe 3572 Giaheoni.exe 2604 Glpdajmm.exe 4736 Gammiakd.exe 4280 Gkeabf32.exe 4192 Glenli32.exe 4452 Gembeooh.exe 1708 Hcabnc32.exe 868 Hikkkmfo.exe 880 Hliggieb.exe 4684 Hccodc32.exe 4084 Hhphlj32.exe 4840 Hcflib32.exe 2596 Hhbdaihd.exe 4824 Hkaqnegg.exe 3896 Hchiobhj.exe 2548 Hiball32.exe 1556 Hkcmcdee.exe 628 Heiaqm32.exe 1448 Hhgnmi32.exe 1484 Icmbja32.exe 1072 Ieknfm32.exe 2644 Ilefcgke.exe 4356 Icoopa32.exe 3672 Ijiglk32.exe 2004 Ikjcdcom.exe 2852 Iadlqn32.exe 2212 Ikmpicmj.exe 536 Ijnqgk32.exe 2996 Ifdall32.exe 3836 Jomeeaan.exe 2020 Jfikgkgh.exe 2472 Joaopq32.exe 2680 Jhjcifdi.exe 2128 Jcphfo32.exe 2444 Jcbdlo32.exe 1852 Khomde32.exe 4888 Kcdaanpj.exe 1184 Kmmejd32.exe 220 Kbinbk32.exe 1116 Kjqfdh32.exe 4760 Komolo32.exe 1128 Kfggii32.exe 3548 Kopkaoai.exe 3756 Kfjcni32.exe 556 Kihpjd32.exe 1312 Kbqdcjoj.exe 3816 Lijlpdff.exe 1060 Lkiiloej.exe 828 Ljjijf32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dkhehilo.exe Cqbakq32.exe File created C:\Windows\SysWOW64\Anochc32.dll Kdgcdp32.exe File created C:\Windows\SysWOW64\Fponli32.dll Lkkoghol.exe File created C:\Windows\SysWOW64\Jdcdkfjd.dll Bngnhq32.exe File created C:\Windows\SysWOW64\Dqdgfjfj.exe Dnekjogg.exe File created C:\Windows\SysWOW64\Lqmmci32.dll Glpdajmm.exe File opened for modification C:\Windows\SysWOW64\Agkgjopk.exe Acpkiq32.exe File created C:\Windows\SysWOW64\Faeaoe32.dll Cknbbkdi.exe File created C:\Windows\SysWOW64\Deimgn32.exe Dmbdfp32.exe File created C:\Windows\SysWOW64\Ggcgoa32.dll Lndahd32.exe File created C:\Windows\SysWOW64\Mbepkphf.exe Mkkgnf32.exe File created C:\Windows\SysWOW64\Fgdchnpl.dll Opglebkp.exe File opened for modification C:\Windows\SysWOW64\Cgdlle32.exe Cpjdpkoe.exe File created C:\Windows\SysWOW64\Jdjjfodp.dll Odabkhig.exe File created C:\Windows\SysWOW64\Bnobmh32.exe Akpfqm32.exe File opened for modification C:\Windows\SysWOW64\Cjchha32.exe Cgdlle32.exe File created C:\Windows\SysWOW64\Fopdml32.dll Hhgnmi32.exe File opened for modification C:\Windows\SysWOW64\Olejei32.exe Oignimod.exe File created C:\Windows\SysWOW64\Dqodliaa.dll Fjbdkc32.exe File created C:\Windows\SysWOW64\Mflhjk32.dll Bgdcehdd.exe File opened for modification C:\Windows\SysWOW64\Clmkimho.exe Cjnomaik.exe File opened for modification C:\Windows\SysWOW64\Cegnef32.exe Cjbihn32.exe File created C:\Windows\SysWOW64\Piabam32.dll Ckfpmpam.exe File created C:\Windows\SysWOW64\Pdgken32.dll Ofdhbb32.exe File created C:\Windows\SysWOW64\Faepnlnq.exe Fmjcmm32.exe File opened for modification C:\Windows\SysWOW64\Adfndbil.exe Ajqjfjif.exe File created C:\Windows\SysWOW64\Bjecai32.exe Bgggenfn.exe File created C:\Windows\SysWOW64\Fpblnn32.dll Bdbnpaoo.exe File opened for modification C:\Windows\SysWOW64\Opglebkp.exe Omhpig32.exe File created C:\Windows\SysWOW64\Bgfpkgbb.exe Bckdji32.exe File created C:\Windows\SysWOW64\Mjkeli32.dll Anepfi32.exe File created C:\Windows\SysWOW64\Adfndbil.exe Ajqjfjif.exe File opened for modification C:\Windows\SysWOW64\Oignimod.exe Okbaha32.exe File created C:\Windows\SysWOW64\Eagcmnjq.exe Enigqbkm.exe File created C:\Windows\SysWOW64\Lkjljpba.dll Fgchog32.exe File opened for modification C:\Windows\SysWOW64\Acgajpaj.exe Aphendbf.exe File created C:\Windows\SysWOW64\Ccgjqmcg.exe Cmmbdc32.exe File created C:\Windows\SysWOW64\Qolmddfd.dll Lbipobbc.exe File created C:\Windows\SysWOW64\Mcdmcl32.dll Mnpadc32.exe File created C:\Windows\SysWOW64\Eejhph32.dll Cnlhcppa.exe File created C:\Windows\SysWOW64\Cjeenqcc.exe Cggibe32.exe File opened for modification C:\Windows\SysWOW64\Mccfjjeg.exe Mminmpnj.exe File created C:\Windows\SysWOW64\Kpdadgme.dll Bnfhmg32.exe File created C:\Windows\SysWOW64\Kllopm32.exe Kdegopbl.exe File created C:\Windows\SysWOW64\Opfoopeh.dll Pleckbkl.exe File opened for modification C:\Windows\SysWOW64\Pepdihoj.exe Poelmn32.exe File opened for modification C:\Windows\SysWOW64\Ilefcgke.exe Ieknfm32.exe File opened for modification C:\Windows\SysWOW64\Bcpdpnio.exe Bqahdcjk.exe File created C:\Windows\SysWOW64\Dnekjogg.exe Dfnbha32.exe File created C:\Windows\SysWOW64\Hccodc32.exe Hliggieb.exe File created C:\Windows\SysWOW64\Apiikmgh.dll Bcpmehfc.exe File opened for modification C:\Windows\SysWOW64\Mjhekdai.exe Mcnmoj32.exe File opened for modification C:\Windows\SysWOW64\Bpcnoldm.exe Blhbnn32.exe File opened for modification C:\Windows\SysWOW64\Cendfe32.exe Ckfpmpam.exe File created C:\Windows\SysWOW64\Nibbihck.dll Lcdjhl32.exe File created C:\Windows\SysWOW64\Mggndidj.dll Pljcqhjb.exe File created C:\Windows\SysWOW64\Oiandh32.exe Ofcahl32.exe File created C:\Windows\SysWOW64\Ncgjcobd.dll Oiandh32.exe File created C:\Windows\SysWOW64\Jhijbojk.dll Qmnbkdjd.exe File created C:\Windows\SysWOW64\Kmmejd32.exe Kjninh32.exe File created C:\Windows\SysWOW64\Onkhhapm.dll Pkfjcpfg.exe File opened for modification C:\Windows\SysWOW64\Fjbdkc32.exe Fgchog32.exe File opened for modification C:\Windows\SysWOW64\Fegihlnd.exe Fmpagnmb.exe File opened for modification C:\Windows\SysWOW64\Liabqc32.exe Lcdjhl32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 10720 10540 WerFault.exe 499 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bcpdpnio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Polbmmbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gkeabf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcminpcm.dll" Hkaqnegg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Linhbk32.dll" Icoopa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijifop32.dll" Ojkkhbqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emmejnib.dll" Pbobbcfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcdbmmee.dll" Bleein32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjchha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eahcld32.dll" Glenli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgaflheb.dll" Hcabnc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djoooeod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Klnkem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkfeli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjnjfela.dll" Nefilk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nfeefnmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bckdji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcnmoj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qkbjooli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djoooeod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccloll32.dll" Ejphec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjdaqbll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfknjb32.dll" Ijiglk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khomde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pikibd32.dll" Fhmkef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kojkli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldependj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cppjoc32.dll" Knhblf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjnomaik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Komolo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pkfjcpfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Plomlgfm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pibmel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gehboi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfjlefkc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gaglck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hghmjmog.dll" Ghadpeck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmiipe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkiiloej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Boikpiie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agkgjopk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bciqljli.dll" Ccigfmad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ablgno32.dll" Fejenklb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcbcmjfb.dll" Qpnlmoge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpkmgnip.dll" Hccodc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ieknfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnpoof32.dll" Njahacio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Olqqjibm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbobbcfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hliggieb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbjppfhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eeelcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anochc32.dll" Kdgcdp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Klceqlmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pncmelfh.dll" Kkalajgf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oedeniig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppdpff32.dll" Aljfmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijnqgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oeahhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Omkmogji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Heaipk32.dll" Qmpoadha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kopkaoai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nibbihck.dll" Lcdjhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qmqfkjkm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4148 wrote to memory of 4072 4148 f41143f15d73f7e790c883187e221bd81623f013a72a4ab479f0c33604dad23a.exe 84 PID 4148 wrote to memory of 4072 4148 f41143f15d73f7e790c883187e221bd81623f013a72a4ab479f0c33604dad23a.exe 84 PID 4148 wrote to memory of 4072 4148 f41143f15d73f7e790c883187e221bd81623f013a72a4ab479f0c33604dad23a.exe 84 PID 4072 wrote to memory of 4228 4072 Cjbihn32.exe 85 PID 4072 wrote to memory of 4228 4072 Cjbihn32.exe 85 PID 4072 wrote to memory of 4228 4072 Cjbihn32.exe 85 PID 4228 wrote to memory of 4692 4228 Cegnef32.exe 86 PID 4228 wrote to memory of 4692 4228 Cegnef32.exe 86 PID 4228 wrote to memory of 4692 4228 Cegnef32.exe 86 PID 4692 wrote to memory of 1168 4692 Cnpbnl32.exe 87 PID 4692 wrote to memory of 1168 4692 Cnpbnl32.exe 87 PID 4692 wrote to memory of 1168 4692 Cnpbnl32.exe 87 PID 1168 wrote to memory of 2404 1168 Cghggakf.exe 88 PID 1168 wrote to memory of 2404 1168 Cghggakf.exe 88 PID 1168 wrote to memory of 2404 1168 Cghggakf.exe 88 PID 2404 wrote to memory of 2244 2404 Cbnkdjkl.exe 89 PID 2404 wrote to memory of 2244 2404 Cbnkdjkl.exe 89 PID 2404 wrote to memory of 2244 2404 Cbnkdjkl.exe 89 PID 2244 wrote to memory of 4656 2244 Ckfpmpam.exe 90 PID 2244 wrote to memory of 4656 2244 Ckfpmpam.exe 90 PID 2244 wrote to memory of 4656 2244 Ckfpmpam.exe 90 PID 4656 wrote to memory of 4428 4656 Cendfe32.exe 91 PID 4656 wrote to memory of 4428 4656 Cendfe32.exe 91 PID 4656 wrote to memory of 4428 4656 Cendfe32.exe 91 PID 4428 wrote to memory of 2228 4428 Daedkfna.exe 92 PID 4428 wrote to memory of 2228 4428 Daedkfna.exe 92 PID 4428 wrote to memory of 2228 4428 Daedkfna.exe 92 PID 2228 wrote to memory of 3944 2228 Dniedk32.exe 93 PID 2228 wrote to memory of 3944 2228 Dniedk32.exe 93 PID 2228 wrote to memory of 3944 2228 Dniedk32.exe 93 PID 3944 wrote to memory of 3800 3944 Dgajmpcl.exe 94 PID 3944 wrote to memory of 3800 3944 Dgajmpcl.exe 94 PID 3944 wrote to memory of 3800 3944 Dgajmpcl.exe 94 PID 3800 wrote to memory of 2224 3800 Diafgc32.exe 95 PID 3800 wrote to memory of 2224 3800 Diafgc32.exe 95 PID 3800 wrote to memory of 2224 3800 Diafgc32.exe 95 PID 2224 wrote to memory of 3824 2224 Djbbokpm.exe 96 PID 2224 wrote to memory of 3824 2224 Djbbokpm.exe 96 PID 2224 wrote to memory of 3824 2224 Djbbokpm.exe 96 PID 3824 wrote to memory of 2912 3824 Dalkkegj.exe 97 PID 3824 wrote to memory of 2912 3824 Dalkkegj.exe 97 PID 3824 wrote to memory of 2912 3824 Dalkkegj.exe 97 PID 2912 wrote to memory of 4864 2912 Ghbkklgf.exe 99 PID 2912 wrote to memory of 4864 2912 Ghbkklgf.exe 99 PID 2912 wrote to memory of 4864 2912 Ghbkklgf.exe 99 PID 4864 wrote to memory of 3572 4864 Goldgfnc.exe 100 PID 4864 wrote to memory of 3572 4864 Goldgfnc.exe 100 PID 4864 wrote to memory of 3572 4864 Goldgfnc.exe 100 PID 3572 wrote to memory of 2604 3572 Giaheoni.exe 101 PID 3572 wrote to memory of 2604 3572 Giaheoni.exe 101 PID 3572 wrote to memory of 2604 3572 Giaheoni.exe 101 PID 2604 wrote to memory of 4736 2604 Glpdajmm.exe 102 PID 2604 wrote to memory of 4736 2604 Glpdajmm.exe 102 PID 2604 wrote to memory of 4736 2604 Glpdajmm.exe 102 PID 4736 wrote to memory of 4280 4736 Gammiakd.exe 103 PID 4736 wrote to memory of 4280 4736 Gammiakd.exe 103 PID 4736 wrote to memory of 4280 4736 Gammiakd.exe 103 PID 4280 wrote to memory of 4192 4280 Gkeabf32.exe 104 PID 4280 wrote to memory of 4192 4280 Gkeabf32.exe 104 PID 4280 wrote to memory of 4192 4280 Gkeabf32.exe 104 PID 4192 wrote to memory of 4452 4192 Glenli32.exe 105 PID 4192 wrote to memory of 4452 4192 Glenli32.exe 105 PID 4192 wrote to memory of 4452 4192 Glenli32.exe 105 PID 4452 wrote to memory of 1708 4452 Gembeooh.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\f41143f15d73f7e790c883187e221bd81623f013a72a4ab479f0c33604dad23a.exe"C:\Users\Admin\AppData\Local\Temp\f41143f15d73f7e790c883187e221bd81623f013a72a4ab479f0c33604dad23a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\Cjbihn32.exeC:\Windows\system32\Cjbihn32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\Cegnef32.exeC:\Windows\system32\Cegnef32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\Cnpbnl32.exeC:\Windows\system32\Cnpbnl32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\Cghggakf.exeC:\Windows\system32\Cghggakf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\Cbnkdjkl.exeC:\Windows\system32\Cbnkdjkl.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\Ckfpmpam.exeC:\Windows\system32\Ckfpmpam.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\Cendfe32.exeC:\Windows\system32\Cendfe32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\Daedkfna.exeC:\Windows\system32\Daedkfna.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\Dniedk32.exeC:\Windows\system32\Dniedk32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\Dgajmpcl.exeC:\Windows\system32\Dgajmpcl.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\Diafgc32.exeC:\Windows\system32\Diafgc32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\Djbbokpm.exeC:\Windows\system32\Djbbokpm.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\Dalkkegj.exeC:\Windows\system32\Dalkkegj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\Ghbkklgf.exeC:\Windows\system32\Ghbkklgf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\Goldgfnc.exeC:\Windows\system32\Goldgfnc.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\Giaheoni.exeC:\Windows\system32\Giaheoni.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\Glpdajmm.exeC:\Windows\system32\Glpdajmm.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\Gammiakd.exeC:\Windows\system32\Gammiakd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\Gkeabf32.exeC:\Windows\system32\Gkeabf32.exe20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\Glenli32.exeC:\Windows\system32\Glenli32.exe21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\Gembeooh.exeC:\Windows\system32\Gembeooh.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\Hcabnc32.exeC:\Windows\system32\Hcabnc32.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Hikkkmfo.exeC:\Windows\system32\Hikkkmfo.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:868 -
C:\Windows\SysWOW64\Hliggieb.exeC:\Windows\system32\Hliggieb.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:880 -
C:\Windows\SysWOW64\Hccodc32.exeC:\Windows\system32\Hccodc32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4684 -
C:\Windows\SysWOW64\Hhphlj32.exeC:\Windows\system32\Hhphlj32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4084 -
C:\Windows\SysWOW64\Hcflib32.exeC:\Windows\system32\Hcflib32.exe28⤵
- Executes dropped EXE
PID:4840 -
C:\Windows\SysWOW64\Hhbdaihd.exeC:\Windows\system32\Hhbdaihd.exe29⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\SysWOW64\Hkaqnegg.exeC:\Windows\system32\Hkaqnegg.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:4824 -
C:\Windows\SysWOW64\Hchiobhj.exeC:\Windows\system32\Hchiobhj.exe31⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\SysWOW64\Hiball32.exeC:\Windows\system32\Hiball32.exe32⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Hkcmcdee.exeC:\Windows\system32\Hkcmcdee.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\Heiaqm32.exeC:\Windows\system32\Heiaqm32.exe34⤵
- Executes dropped EXE
PID:628 -
C:\Windows\SysWOW64\Hhgnmi32.exeC:\Windows\system32\Hhgnmi32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1448 -
C:\Windows\SysWOW64\Icmbja32.exeC:\Windows\system32\Icmbja32.exe36⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\Ieknfm32.exeC:\Windows\system32\Ieknfm32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1072 -
C:\Windows\SysWOW64\Ilefcgke.exeC:\Windows\system32\Ilefcgke.exe38⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\Icoopa32.exeC:\Windows\system32\Icoopa32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:4356 -
C:\Windows\SysWOW64\Ijiglk32.exeC:\Windows\system32\Ijiglk32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:3672 -
C:\Windows\SysWOW64\Ikjcdcom.exeC:\Windows\system32\Ikjcdcom.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\Iadlqn32.exeC:\Windows\system32\Iadlqn32.exe42⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\Ikmpicmj.exeC:\Windows\system32\Ikmpicmj.exe43⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\SysWOW64\Ijnqgk32.exeC:\Windows\system32\Ijnqgk32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:536 -
C:\Windows\SysWOW64\Ifdall32.exeC:\Windows\system32\Ifdall32.exe45⤵
- Executes dropped EXE
PID:2996 -
C:\Windows\SysWOW64\Jomeeaan.exeC:\Windows\system32\Jomeeaan.exe46⤵
- Executes dropped EXE
PID:3836 -
C:\Windows\SysWOW64\Jfikgkgh.exeC:\Windows\system32\Jfikgkgh.exe47⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\Joaopq32.exeC:\Windows\system32\Joaopq32.exe48⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\Jhjcifdi.exeC:\Windows\system32\Jhjcifdi.exe49⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\Jcphfo32.exeC:\Windows\system32\Jcphfo32.exe50⤵
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\Jcbdlo32.exeC:\Windows\system32\Jcbdlo32.exe51⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\Khomde32.exeC:\Windows\system32\Khomde32.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:1852 -
C:\Windows\SysWOW64\Kcdaanpj.exeC:\Windows\system32\Kcdaanpj.exe53⤵
- Executes dropped EXE
PID:4888 -
C:\Windows\SysWOW64\Kjninh32.exeC:\Windows\system32\Kjninh32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1972 -
C:\Windows\SysWOW64\Kmmejd32.exeC:\Windows\system32\Kmmejd32.exe55⤵
- Executes dropped EXE
PID:1184 -
C:\Windows\SysWOW64\Kbinbk32.exeC:\Windows\system32\Kbinbk32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\Kjqfdh32.exeC:\Windows\system32\Kjqfdh32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\Komolo32.exeC:\Windows\system32\Komolo32.exe58⤵
- Executes dropped EXE
- Modifies registry class
PID:4760 -
C:\Windows\SysWOW64\Kfggii32.exeC:\Windows\system32\Kfggii32.exe59⤵
- Executes dropped EXE
PID:1128 -
C:\Windows\SysWOW64\Kopkaoai.exeC:\Windows\system32\Kopkaoai.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:3548 -
C:\Windows\SysWOW64\Kfjcni32.exeC:\Windows\system32\Kfjcni32.exe61⤵
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\Kihpjd32.exeC:\Windows\system32\Kihpjd32.exe62⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\Kbqdcjoj.exeC:\Windows\system32\Kbqdcjoj.exe63⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SysWOW64\Lijlpdff.exeC:\Windows\system32\Lijlpdff.exe64⤵
- Executes dropped EXE
PID:3816 -
C:\Windows\SysWOW64\Lkiiloej.exeC:\Windows\system32\Lkiiloej.exe65⤵
- Executes dropped EXE
- Modifies registry class
PID:1060 -
C:\Windows\SysWOW64\Ljjijf32.exeC:\Windows\system32\Ljjijf32.exe66⤵
- Executes dropped EXE
PID:828 -
C:\Windows\SysWOW64\Lmhefb32.exeC:\Windows\system32\Lmhefb32.exe67⤵PID:3252
-
C:\Windows\SysWOW64\Lpgabn32.exeC:\Windows\system32\Lpgabn32.exe68⤵PID:808
-
C:\Windows\SysWOW64\Lfqjohbn.exeC:\Windows\system32\Lfqjohbn.exe69⤵PID:5004
-
C:\Windows\SysWOW64\Liofkc32.exeC:\Windows\system32\Liofkc32.exe70⤵PID:4332
-
C:\Windows\SysWOW64\Lcdjhl32.exeC:\Windows\system32\Lcdjhl32.exe71⤵
- Drops file in System32 directory
- Modifies registry class
PID:3392 -
C:\Windows\SysWOW64\Liabqc32.exeC:\Windows\system32\Liabqc32.exe72⤵PID:1164
-
C:\Windows\SysWOW64\Lpkkmmgk.exeC:\Windows\system32\Lpkkmmgk.exe73⤵PID:4168
-
C:\Windows\SysWOW64\Ljaokega.exeC:\Windows\system32\Ljaokega.exe74⤵PID:960
-
C:\Windows\SysWOW64\Lpngcm32.exeC:\Windows\system32\Lpngcm32.exe75⤵PID:4524
-
C:\Windows\SysWOW64\Mfhppfme.exeC:\Windows\system32\Mfhppfme.exe76⤵PID:4252
-
C:\Windows\SysWOW64\Mmahlq32.exeC:\Windows\system32\Mmahlq32.exe77⤵PID:2148
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Mfjlefkc.exeC:\Windows\system32\Mfjlefkc.exe1⤵
- Modifies registry class
PID:2328 -
C:\Windows\SysWOW64\Mmdebqbp.exeC:\Windows\system32\Mmdebqbp.exe2⤵PID:1488
-
C:\Windows\SysWOW64\Mcnmoj32.exeC:\Windows\system32\Mcnmoj32.exe3⤵
- Drops file in System32 directory
- Modifies registry class
PID:3160 -
C:\Windows\SysWOW64\Mjhekdai.exeC:\Windows\system32\Mjhekdai.exe4⤵PID:1820
-
C:\Windows\SysWOW64\Mcpjdj32.exeC:\Windows\system32\Mcpjdj32.exe5⤵PID:932
-
C:\Windows\SysWOW64\Mminmpnj.exeC:\Windows\system32\Mminmpnj.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5060 -
C:\Windows\SysWOW64\Mccfjjeg.exeC:\Windows\system32\Mccfjjeg.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3656 -
C:\Windows\SysWOW64\Mmkkbo32.exeC:\Windows\system32\Mmkkbo32.exe8⤵PID:4564
-
C:\Windows\SysWOW64\Nfcokebh.exeC:\Windows\system32\Nfcokebh.exe9⤵PID:5128
-
C:\Windows\SysWOW64\Nmmgho32.exeC:\Windows\system32\Nmmgho32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5144 -
C:\Windows\SysWOW64\Nplddj32.exeC:\Windows\system32\Nplddj32.exe11⤵PID:5168
-
C:\Windows\SysWOW64\Nbjppfhl.exeC:\Windows\system32\Nbjppfhl.exe12⤵
- Modifies registry class
PID:5208 -
C:\Windows\SysWOW64\Njahacio.exeC:\Windows\system32\Njahacio.exe13⤵
- Modifies registry class
PID:5240 -
C:\Windows\SysWOW64\Nlbdik32.exeC:\Windows\system32\Nlbdik32.exe14⤵PID:5264
-
C:\Windows\SysWOW64\Ndjlji32.exeC:\Windows\system32\Ndjlji32.exe15⤵PID:5284
-
C:\Windows\SysWOW64\Nfhifd32.exeC:\Windows\system32\Nfhifd32.exe16⤵PID:5300
-
C:\Windows\SysWOW64\Nifebp32.exeC:\Windows\system32\Nifebp32.exe17⤵PID:5324
-
C:\Windows\SysWOW64\Npqmojec.exeC:\Windows\system32\Npqmojec.exe18⤵PID:5344
-
C:\Windows\SysWOW64\Nfjeldlp.exeC:\Windows\system32\Nfjeldlp.exe19⤵PID:5376
-
C:\Windows\SysWOW64\Nlgndkkg.exeC:\Windows\system32\Nlgndkkg.exe20⤵PID:5392
-
C:\Windows\SysWOW64\Nbafae32.exeC:\Windows\system32\Nbafae32.exe21⤵PID:5408
-
C:\Windows\SysWOW64\Njhnbb32.exeC:\Windows\system32\Njhnbb32.exe22⤵PID:5424
-
C:\Windows\SysWOW64\Niknnoia.exeC:\Windows\system32\Niknnoia.exe23⤵PID:5440
-
C:\Windows\SysWOW64\Nljkjjhe.exeC:\Windows\system32\Nljkjjhe.exe24⤵PID:5456
-
C:\Windows\SysWOW64\Odabkhig.exeC:\Windows\system32\Odabkhig.exe25⤵
- Drops file in System32 directory
PID:5472 -
C:\Windows\SysWOW64\Ojkkhbqd.exeC:\Windows\system32\Ojkkhbqd.exe26⤵
- Modifies registry class
PID:5492 -
C:\Windows\SysWOW64\Obfpldno.exeC:\Windows\system32\Obfpldno.exe27⤵PID:5512
-
C:\Windows\SysWOW64\Opjpehmi.exeC:\Windows\system32\Opjpehmi.exe28⤵PID:5524
-
C:\Windows\SysWOW64\Ofdhbb32.exeC:\Windows\system32\Ofdhbb32.exe29⤵
- Drops file in System32 directory
PID:5548 -
C:\Windows\SysWOW64\Oibdnnci.exeC:\Windows\system32\Oibdnnci.exe30⤵PID:5568
-
C:\Windows\SysWOW64\Olqqjibm.exeC:\Windows\system32\Olqqjibm.exe31⤵
- Modifies registry class
PID:5584 -
C:\Windows\SysWOW64\Obkigc32.exeC:\Windows\system32\Obkigc32.exe32⤵PID:5612
-
C:\Windows\SysWOW64\Okbaha32.exeC:\Windows\system32\Okbaha32.exe33⤵
- Drops file in System32 directory
PID:5772 -
C:\Windows\SysWOW64\Oignimod.exeC:\Windows\system32\Oignimod.exe34⤵
- Drops file in System32 directory
PID:5788 -
C:\Windows\SysWOW64\Olejei32.exeC:\Windows\system32\Olejei32.exe35⤵PID:5804
-
C:\Windows\SysWOW64\Pbobbcfd.exeC:\Windows\system32\Pbobbcfd.exe36⤵
- Modifies registry class
PID:5820 -
C:\Windows\SysWOW64\Pkfjcpfg.exeC:\Windows\system32\Pkfjcpfg.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5840 -
C:\Windows\SysWOW64\Plhgkh32.exeC:\Windows\system32\Plhgkh32.exe38⤵PID:5856
-
C:\Windows\SysWOW64\Pbaohbda.exeC:\Windows\system32\Pbaohbda.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5876 -
C:\Windows\SysWOW64\Pkigipdd.exeC:\Windows\system32\Pkigipdd.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5892 -
C:\Windows\SysWOW64\Pljcqhjb.exeC:\Windows\system32\Pljcqhjb.exe41⤵
- Drops file in System32 directory
PID:5908 -
C:\Windows\SysWOW64\Pgphnajh.exeC:\Windows\system32\Pgphnajh.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5924 -
C:\Windows\SysWOW64\Pindjlil.exeC:\Windows\system32\Pindjlil.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5940 -
C:\Windows\SysWOW64\Pllpfhhp.exeC:\Windows\system32\Pllpfhhp.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5956 -
C:\Windows\SysWOW64\Pcfhcb32.exeC:\Windows\system32\Pcfhcb32.exe45⤵PID:5972
-
C:\Windows\SysWOW64\Pknqdo32.exeC:\Windows\system32\Pknqdo32.exe46⤵PID:5988
-
C:\Windows\SysWOW64\Plomlgfm.exeC:\Windows\system32\Plomlgfm.exe47⤵
- Modifies registry class
PID:6004 -
C:\Windows\SysWOW64\Pgdaip32.exeC:\Windows\system32\Pgdaip32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6020 -
C:\Windows\SysWOW64\Pibmel32.exeC:\Windows\system32\Pibmel32.exe49⤵
- Modifies registry class
PID:6036 -
C:\Windows\SysWOW64\Qdhabd32.exeC:\Windows\system32\Qdhabd32.exe50⤵PID:6052
-
C:\Windows\SysWOW64\Qkbjooli.exeC:\Windows\system32\Qkbjooli.exe51⤵
- Modifies registry class
PID:6068 -
C:\Windows\SysWOW64\Qmqfkjkm.exeC:\Windows\system32\Qmqfkjkm.exe52⤵
- Modifies registry class
PID:6084 -
C:\Windows\SysWOW64\Qcmoca32.exeC:\Windows\system32\Qcmoca32.exe53⤵PID:6100
-
C:\Windows\SysWOW64\Qiggpkaa.exeC:\Windows\system32\Qiggpkaa.exe54⤵PID:6120
-
C:\Windows\SysWOW64\Acpkiq32.exeC:\Windows\system32\Acpkiq32.exe55⤵
- Drops file in System32 directory
PID:6136 -
C:\Windows\SysWOW64\Agkgjopk.exeC:\Windows\system32\Agkgjopk.exe56⤵
- Modifies registry class
PID:5604 -
C:\Windows\SysWOW64\Aijcfkoo.exeC:\Windows\system32\Aijcfkoo.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5636 -
C:\Windows\SysWOW64\Anepfi32.exeC:\Windows\system32\Anepfi32.exe58⤵
- Drops file in System32 directory
PID:5672 -
C:\Windows\SysWOW64\Acbhopeo.exeC:\Windows\system32\Acbhopeo.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5692 -
C:\Windows\SysWOW64\Agndoo32.exeC:\Windows\system32\Agndoo32.exe60⤵PID:5732
-
C:\Windows\SysWOW64\Anhlliee.exeC:\Windows\system32\Anhlliee.exe61⤵PID:5756
-
C:\Windows\SysWOW64\Apfhhddi.exeC:\Windows\system32\Apfhhddi.exe62⤵PID:5720
-
C:\Windows\SysWOW64\Adadic32.exeC:\Windows\system32\Adadic32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3784 -
C:\Windows\SysWOW64\Agpqeo32.exeC:\Windows\system32\Agpqeo32.exe64⤵PID:5656
-
C:\Windows\SysWOW64\Ajnmaj32.exeC:\Windows\system32\Ajnmaj32.exe65⤵PID:5684
-
C:\Windows\SysWOW64\Almime32.exeC:\Windows\system32\Almime32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5728 -
C:\Windows\SysWOW64\Aphendbf.exeC:\Windows\system32\Aphendbf.exe67⤵
- Drops file in System32 directory
PID:2384 -
C:\Windows\SysWOW64\Acgajpaj.exeC:\Windows\system32\Acgajpaj.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6148 -
C:\Windows\SysWOW64\Ajqjfjif.exeC:\Windows\system32\Ajqjfjif.exe69⤵
- Drops file in System32 directory
PID:6168 -
C:\Windows\SysWOW64\Adfndbil.exeC:\Windows\system32\Adfndbil.exe70⤵PID:6184
-
C:\Windows\SysWOW64\Akpfqm32.exeC:\Windows\system32\Akpfqm32.exe71⤵
- Drops file in System32 directory
PID:6200 -
C:\Windows\SysWOW64\Bnobmh32.exeC:\Windows\system32\Bnobmh32.exe72⤵PID:6216
-
C:\Windows\SysWOW64\Bdikibgj.exeC:\Windows\system32\Bdikibgj.exe73⤵PID:6232
-
C:\Windows\SysWOW64\Bgggenfn.exeC:\Windows\system32\Bgggenfn.exe74⤵
- Drops file in System32 directory
PID:6248 -
C:\Windows\SysWOW64\Bjecai32.exeC:\Windows\system32\Bjecai32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6264 -
C:\Windows\SysWOW64\Bldond32.exeC:\Windows\system32\Bldond32.exe76⤵PID:6280
-
C:\Windows\SysWOW64\Bcngjoka.exeC:\Windows\system32\Bcngjoka.exe77⤵PID:6296
-
C:\Windows\SysWOW64\Bnclhgkh.exeC:\Windows\system32\Bnclhgkh.exe78⤵PID:6312
-
C:\Windows\SysWOW64\Bqahdcjk.exeC:\Windows\system32\Bqahdcjk.exe79⤵
- Drops file in System32 directory
PID:6336 -
C:\Windows\SysWOW64\Bcpdpnio.exeC:\Windows\system32\Bcpdpnio.exe80⤵
- Modifies registry class
PID:6364 -
C:\Windows\SysWOW64\Bjjmmh32.exeC:\Windows\system32\Bjjmmh32.exe81⤵PID:6396
-
C:\Windows\SysWOW64\Bnfhmg32.exeC:\Windows\system32\Bnfhmg32.exe82⤵
- Drops file in System32 directory
PID:6412 -
C:\Windows\SysWOW64\Bqdeib32.exeC:\Windows\system32\Bqdeib32.exe83⤵PID:6428
-
C:\Windows\SysWOW64\Bcbaen32.exeC:\Windows\system32\Bcbaen32.exe84⤵PID:6444
-
C:\Windows\SysWOW64\Bkjigk32.exeC:\Windows\system32\Bkjigk32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6460 -
C:\Windows\SysWOW64\Bmkencnm.exeC:\Windows\system32\Bmkencnm.exe86⤵PID:6476
-
C:\Windows\SysWOW64\Bdbnpaoo.exeC:\Windows\system32\Bdbnpaoo.exe87⤵
- Drops file in System32 directory
PID:6492 -
C:\Windows\SysWOW64\Bgpjllnc.exeC:\Windows\system32\Bgpjllnc.exe88⤵PID:6508
-
C:\Windows\SysWOW64\Cjofhhmf.exeC:\Windows\system32\Cjofhhmf.exe89⤵PID:6524
-
C:\Windows\SysWOW64\Cmmbdc32.exeC:\Windows\system32\Cmmbdc32.exe90⤵
- Drops file in System32 directory
PID:6544 -
C:\Windows\SysWOW64\Ccgjqmcg.exeC:\Windows\system32\Ccgjqmcg.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6560 -
C:\Windows\SysWOW64\Cknbbkdi.exeC:\Windows\system32\Cknbbkdi.exe92⤵
- Drops file in System32 directory
PID:6576 -
C:\Windows\SysWOW64\Cnmonfcm.exeC:\Windows\system32\Cnmonfcm.exe93⤵PID:6592
-
C:\Windows\SysWOW64\Cqkkjabq.exeC:\Windows\system32\Cqkkjabq.exe94⤵PID:6608
-
C:\Windows\SysWOW64\Ccigfmad.exeC:\Windows\system32\Ccigfmad.exe95⤵
- Modifies registry class
PID:6628 -
C:\Windows\SysWOW64\Cgecgl32.exeC:\Windows\system32\Cgecgl32.exe96⤵PID:6644
-
C:\Windows\SysWOW64\Cnokcfaj.exeC:\Windows\system32\Cnokcfaj.exe97⤵PID:6668
-
C:\Windows\SysWOW64\Cqmhpa32.exeC:\Windows\system32\Cqmhpa32.exe98⤵PID:6696
-
C:\Windows\SysWOW64\Cggplkgk.exeC:\Windows\system32\Cggplkgk.exe99⤵PID:6736
-
C:\Windows\SysWOW64\Cjflhggo.exeC:\Windows\system32\Cjflhggo.exe100⤵PID:6760
-
C:\Windows\SysWOW64\Cmdhdbfb.exeC:\Windows\system32\Cmdhdbfb.exe101⤵PID:6792
-
C:\Windows\SysWOW64\Ccnqal32.exeC:\Windows\system32\Ccnqal32.exe102⤵PID:6812
-
C:\Windows\SysWOW64\Cjhinfdl.exeC:\Windows\system32\Cjhinfdl.exe103⤵PID:6840
-
C:\Windows\SysWOW64\Cqbakq32.exeC:\Windows\system32\Cqbakq32.exe104⤵
- Drops file in System32 directory
PID:6868 -
C:\Windows\SysWOW64\Dkhehilo.exeC:\Windows\system32\Dkhehilo.exe105⤵PID:6908
-
C:\Windows\SysWOW64\Dmiapa32.exeC:\Windows\system32\Dmiapa32.exe106⤵PID:6924
-
C:\Windows\SysWOW64\Dccjllij.exeC:\Windows\system32\Dccjllij.exe107⤵PID:6944
-
C:\Windows\SysWOW64\Dgnfmj32.exeC:\Windows\system32\Dgnfmj32.exe108⤵PID:6964
-
C:\Windows\SysWOW64\Djmbif32.exeC:\Windows\system32\Djmbif32.exe109⤵PID:6992
-
C:\Windows\SysWOW64\Ddbffopl.exeC:\Windows\system32\Ddbffopl.exe110⤵PID:7016
-
C:\Windows\SysWOW64\Dgabbjpp.exeC:\Windows\system32\Dgabbjpp.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7036 -
C:\Windows\SysWOW64\Djoooeod.exeC:\Windows\system32\Djoooeod.exe112⤵
- Modifies registry class
PID:7072 -
C:\Windows\SysWOW64\Deeclnnj.exeC:\Windows\system32\Deeclnnj.exe113⤵PID:7088
-
C:\Windows\SysWOW64\Dgcohjmn.exeC:\Windows\system32\Dgcohjmn.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7116 -
C:\Windows\SysWOW64\Djaldema.exeC:\Windows\system32\Djaldema.exe115⤵PID:7132
-
C:\Windows\SysWOW64\Dmphpqle.exeC:\Windows\system32\Dmphpqle.exe116⤵PID:7152
-
C:\Windows\SysWOW64\Degpanlg.exeC:\Windows\system32\Degpanlg.exe117⤵PID:6392
-
C:\Windows\SysWOW64\Dgelni32.exeC:\Windows\system32\Dgelni32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6664 -
C:\Windows\SysWOW64\Djdhje32.exeC:\Windows\system32\Djdhje32.exe119⤵PID:6780
-
C:\Windows\SysWOW64\Dmbdfp32.exeC:\Windows\system32\Dmbdfp32.exe120⤵
- Drops file in System32 directory
PID:6848 -
C:\Windows\SysWOW64\Deimgn32.exeC:\Windows\system32\Deimgn32.exe121⤵PID:6936
-
C:\Windows\SysWOW64\Ekcedhaa.exeC:\Windows\system32\Ekcedhaa.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-