Analysis
-
max time kernel
148s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 23:11
Static task
static1
Behavioral task
behavioral1
Sample
e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82.exe
Resource
win10v2004-20220812-en
General
-
Target
e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82.exe
-
Size
98KB
-
MD5
4eaca9eca40ae5aaf39a8168d250adb0
-
SHA1
2bf6b8d1c7fbba71b7c0cffbb784dca841bb99bd
-
SHA256
e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82
-
SHA512
831aac44d2c1f16c038ae1368f15222990388bb3469577b793ba9762589fdadf7be6b9cc8f69691b3993da646c7a348399071187326e42a47008b9e7afcafb84
-
SSDEEP
768:x+lnNeZT3TLTqquEU6SlM5Hm2qRQMvag6gKK6aFGXIdQrfqF27OnV/1H56gn71st:x+LeNLTqZ6ScxMvT6g7GRfqgwUE1QZ+
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hglcpo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njbcfabd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajpmggjc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcgnap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emkenici.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgpfjeej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofkalfla.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahhjnpjm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfplajjh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cajbni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Joqgjcll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Annemfqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djmmck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpfepdif.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmkefi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahkkeagb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbbcjl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljhponik.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciegblhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqkkjggm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kijpfjdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpblde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnflnile.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmabkjal.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jocdpcji.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obgllgnp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpnlkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcgnap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lglphbhe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fifjbhen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccpcoo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epocib32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnaclj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Albnkqda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhmcppeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffhpaahp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hncfekac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kaeejmbh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhjdog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmgcmcdf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pokljk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bilphc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmafdgnp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpdhjeki.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gikehl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcnldaol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahpdqq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koiecaqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lonoop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikbodefe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbjkpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odoggh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfiefg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldmdlgia.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgpica32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abnbmjik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oclqcj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bilphc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Epocib32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abnbmjik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iehaei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilkemicp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifcifnja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmfmgnnj.exe -
Executes dropped EXE 64 IoCs
pid Process 1640 Gbbcjl32.exe 2004 Hicage32.exe 2008 Hcmbgbbm.exe 1984 Hncfekac.exe 1980 Ijjgjlgg.exe 1092 Ifphom32.exe 980 Iafllf32.exe 1664 Immmag32.exe 1812 Iehaei32.exe 324 Ilbjbcgm.exe 856 Iblbon32.exe 1420 Ippbhbmd.exe 1820 Jemkqilk.exe 460 Jlfcmc32.exe 2028 Jdbhae32.exe 560 Jafhkiom.exe 1296 Jaheqimj.exe 1380 Jhbnmc32.exe 1544 Jmofejcn.exe 1572 Kmabkjal.exe 740 Kdkkhd32.exe 1824 Kihcpk32.exe 1748 Kpblme32.exe 900 Kgldjoei.exe 1708 Kijpfjdm.exe 996 Kpdhbd32.exe 944 Kaeejmbh.exe 1704 Klkigean.exe 1988 Koiecaqb.exe 1716 Khbjlfgb.exe 1936 Kkpfhbff.exe 108 Lonoop32.exe 796 Lamkkllp.exe 1292 Lhfcgf32.exe 888 Ljhponik.exe 696 Ldmdlgia.exe 1668 Lglphbhe.exe 1740 Ljjlengi.exe 624 Ldpqbf32.exe 1116 Lgnmnb32.exe 1528 Lmkefi32.exe 544 Loiabd32.exe 580 Lgpica32.exe 268 Liafkjjn.exe 1592 Mqinmgjp.exe 1672 Mkelbd32.exe 964 Mbodooli.exe 1272 Mneddpbm.exe 564 Madapkaa.exe 1792 Dbhllk32.exe 1584 Fmoimgpi.exe 1444 Fifjbhen.exe 2024 Gklpeogf.exe 1896 Gmmigjdh.exe 1132 Gggjepie.exe 884 Hcqgpplg.exe 1604 Hglcpo32.exe 1816 Hlneceob.exe 1520 Hdkgng32.exe 1540 Ipbgbhpo.exe 1104 Icqcoc32.exe 1196 Ifamqo32.exe 1752 Ifcifnja.exe 596 Ijablm32.exe -
Loads dropped DLL 64 IoCs
pid Process 1376 e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82.exe 1376 e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82.exe 1640 Gbbcjl32.exe 1640 Gbbcjl32.exe 2004 Hicage32.exe 2004 Hicage32.exe 2008 Hcmbgbbm.exe 2008 Hcmbgbbm.exe 1984 Hncfekac.exe 1984 Hncfekac.exe 1980 Ijjgjlgg.exe 1980 Ijjgjlgg.exe 1092 Ifphom32.exe 1092 Ifphom32.exe 980 Iafllf32.exe 980 Iafllf32.exe 1664 Immmag32.exe 1664 Immmag32.exe 1812 Iehaei32.exe 1812 Iehaei32.exe 324 Ilbjbcgm.exe 324 Ilbjbcgm.exe 856 Iblbon32.exe 856 Iblbon32.exe 1420 Ippbhbmd.exe 1420 Ippbhbmd.exe 1820 Jemkqilk.exe 1820 Jemkqilk.exe 460 Jlfcmc32.exe 460 Jlfcmc32.exe 2028 Jdbhae32.exe 2028 Jdbhae32.exe 560 Jafhkiom.exe 560 Jafhkiom.exe 1296 Jaheqimj.exe 1296 Jaheqimj.exe 1380 Jhbnmc32.exe 1380 Jhbnmc32.exe 1544 Jmofejcn.exe 1544 Jmofejcn.exe 1572 Kmabkjal.exe 1572 Kmabkjal.exe 740 Kdkkhd32.exe 740 Kdkkhd32.exe 1824 Kihcpk32.exe 1824 Kihcpk32.exe 1748 Kpblme32.exe 1748 Kpblme32.exe 900 Kgldjoei.exe 900 Kgldjoei.exe 1708 Kijpfjdm.exe 1708 Kijpfjdm.exe 996 Kpdhbd32.exe 996 Kpdhbd32.exe 944 Kaeejmbh.exe 944 Kaeejmbh.exe 1704 Klkigean.exe 1704 Klkigean.exe 1988 Koiecaqb.exe 1988 Koiecaqb.exe 1716 Khbjlfgb.exe 1716 Khbjlfgb.exe 1936 Kkpfhbff.exe 1936 Kkpfhbff.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Eeohgiia.exe Ebplkmjn.exe File created C:\Windows\SysWOW64\Dkpfpb32.exe Dhbjdg32.exe File created C:\Windows\SysWOW64\Ebmmbheo.dll Dhbjdg32.exe File created C:\Windows\SysWOW64\Gihhbm32.exe Gfjlfa32.exe File opened for modification C:\Windows\SysWOW64\Kaeejmbh.exe Kpdhbd32.exe File opened for modification C:\Windows\SysWOW64\Aqjeca32.exe Ajpmggjc.exe File opened for modification C:\Windows\SysWOW64\Ffhpaahp.exe Fefcii32.exe File created C:\Windows\SysWOW64\Gikehl32.exe Gbamlbla.exe File created C:\Windows\SysWOW64\Kqkllc32.dll Ojloooei.exe File opened for modification C:\Windows\SysWOW64\Bmafdgnp.exe Bfgngm32.exe File created C:\Windows\SysWOW64\Jbdman32.exe Jikhhhaj.exe File opened for modification C:\Windows\SysWOW64\Mhlmcjqk.exe Memagnah.exe File opened for modification C:\Windows\SysWOW64\Ompmmdjn.exe Obgllgnp.exe File created C:\Windows\SysWOW64\Fcnldaol.exe Fpopheph.exe File created C:\Windows\SysWOW64\Jmbknhmh.exe Ikbodefe.exe File opened for modification C:\Windows\SysWOW64\Lhjdog32.exe Laplbmif.exe File opened for modification C:\Windows\SysWOW64\Eellai32.exe Eobceodg.exe File opened for modification C:\Windows\SysWOW64\Cppooe32.exe Ciegblhb.exe File created C:\Windows\SysWOW64\Bpmfjbof.exe Bicnnh32.exe File created C:\Windows\SysWOW64\Bemkhi32.exe Bbnoln32.exe File opened for modification C:\Windows\SysWOW64\Loiabd32.exe Lmkefi32.exe File created C:\Windows\SysWOW64\Kmddbk32.exe Jjankpbc.exe File created C:\Windows\SysWOW64\Bkhooo32.exe Bqonoank.exe File created C:\Windows\SysWOW64\Ddmddg32.exe Dqahcipg.exe File created C:\Windows\SysWOW64\Koiecaqb.exe Klkigean.exe File created C:\Windows\SysWOW64\Ghqnak32.dll Lgpica32.exe File opened for modification C:\Windows\SysWOW64\Djgkem32.exe Dnpjpl32.exe File created C:\Windows\SysWOW64\Ofmkmj32.dll Cncphj32.exe File created C:\Windows\SysWOW64\Hicage32.exe Gbbcjl32.exe File created C:\Windows\SysWOW64\Lajaqb32.dll Dkpfpb32.exe File created C:\Windows\SysWOW64\Bpacmg32.dll Ooicfh32.exe File created C:\Windows\SysWOW64\Eqipmk32.dll Eicngh32.exe File opened for modification C:\Windows\SysWOW64\Fgbbpe32.exe Fedfdj32.exe File created C:\Windows\SysWOW64\Pegenb32.exe Ompmmdjn.exe File opened for modification C:\Windows\SysWOW64\Ldpqbf32.exe Ljjlengi.exe File created C:\Windows\SysWOW64\Fnaclj32.exe Fkbgpo32.exe File opened for modification C:\Windows\SysWOW64\Icqcoc32.exe Ipbgbhpo.exe File opened for modification C:\Windows\SysWOW64\Ahmcip32.exe Akffjlia.exe File opened for modification C:\Windows\SysWOW64\Mqinmgjp.exe Liafkjjn.exe File created C:\Windows\SysWOW64\Ghpdbc32.dll Kebelm32.exe File created C:\Windows\SysWOW64\Fjmkjbnb.dll Abnbmjik.exe File created C:\Windows\SysWOW64\Ilihedgi.dll Baficjnl.exe File created C:\Windows\SysWOW64\Bfiipp32.dll Hglcpo32.exe File created C:\Windows\SysWOW64\Ojloooei.exe Odoggh32.exe File created C:\Windows\SysWOW64\Aqjeca32.exe Ajpmggjc.exe File opened for modification C:\Windows\SysWOW64\Oqlhaolm.exe Onmlecmi.exe File created C:\Windows\SysWOW64\Npbcnf32.dll Doieka32.exe File created C:\Windows\SysWOW64\Ecgjpc32.exe Emmbciaf.exe File created C:\Windows\SysWOW64\Hlikgi32.dll Ipbgbhpo.exe File created C:\Windows\SysWOW64\Djbejk32.dll Bmafdgnp.exe File created C:\Windows\SysWOW64\Fdqjjq32.dll Fkieed32.exe File created C:\Windows\SysWOW64\Flkmib32.exe Fogmpn32.exe File opened for modification C:\Windows\SysWOW64\Liafkjjn.exe Lgpica32.exe File opened for modification C:\Windows\SysWOW64\Nfiefg32.exe Kpjndlkj.exe File created C:\Windows\SysWOW64\Fogmpn32.exe Eeohgiia.exe File opened for modification C:\Windows\SysWOW64\Ecgjpc32.exe Emmbciaf.exe File opened for modification C:\Windows\SysWOW64\Nadblogl.exe Mhlmcjqk.exe File opened for modification C:\Windows\SysWOW64\Akffjlia.exe Ahhjnpjm.exe File created C:\Windows\SysWOW64\Jjajakan.dll Ckpjaocj.exe File created C:\Windows\SysWOW64\Edpqjg32.exe Dnehmmoa.exe File created C:\Windows\SysWOW64\Ekiifa32.exe Edpqjg32.exe File created C:\Windows\SysWOW64\Eqkkjggm.exe Ejabmm32.exe File created C:\Windows\SysWOW64\Knodfm32.dll Fikiii32.exe File opened for modification C:\Windows\SysWOW64\Ghfdhfcf.exe Fjgdak32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2176 2168 WerFault.exe 314 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mijadk32.dll" Icqcoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmcomehm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjgdak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Foamgg32.dll" Ddmddg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnbclh32.dll" Ajigamff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jlfcmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjankpbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ofnnafjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gfjlfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbmlqm32.dll" Ckeclo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dqahcipg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Piijgenp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olemdbol.dll" Bhkgdd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmfmgnnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ogepni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhcmeikf.dll" Afgmlhph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mqinmgjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmdelppn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eobceodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akqdlh32.dll" Dkbcfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmlifa32.dll" Fnogbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elhcmn32.dll" Ijablm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apoogk32.dll" Memagnah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmdelppn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhkgdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hglcpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpinqm32.dll" Cmcomehm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpopheph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obdnkbjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Baficjnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceodmlkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilfikb32.dll" Llljhj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejabmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Confgm32.dll" Fmokhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcndhicn.dll" Eophkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjopondh.dll" Lmkefi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnapfaib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggimfi32.dll" Kdkkhd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghfdhfcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Meihlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndpqmplo.dll" Mkepdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bilphc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deeibg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljhponik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mqinmgjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Goekppni.dll" Bpbpeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmokhl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmgcmcdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aqjeca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aafldflq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nfhdkbhh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adqpogqi.dll" Aqhhnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbnoln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Damkblkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Biaicben.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onmlecmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmqengqm.dll" Famdnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijjgjlgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aaofcg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhipefpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhggho32.dll" Jdmpbjkc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbfffahc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nadblogl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpnlkd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1640 1376 e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82.exe 28 PID 1376 wrote to memory of 1640 1376 e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82.exe 28 PID 1376 wrote to memory of 1640 1376 e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82.exe 28 PID 1376 wrote to memory of 1640 1376 e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82.exe 28 PID 1640 wrote to memory of 2004 1640 Gbbcjl32.exe 29 PID 1640 wrote to memory of 2004 1640 Gbbcjl32.exe 29 PID 1640 wrote to memory of 2004 1640 Gbbcjl32.exe 29 PID 1640 wrote to memory of 2004 1640 Gbbcjl32.exe 29 PID 2004 wrote to memory of 2008 2004 Hicage32.exe 30 PID 2004 wrote to memory of 2008 2004 Hicage32.exe 30 PID 2004 wrote to memory of 2008 2004 Hicage32.exe 30 PID 2004 wrote to memory of 2008 2004 Hicage32.exe 30 PID 2008 wrote to memory of 1984 2008 Hcmbgbbm.exe 31 PID 2008 wrote to memory of 1984 2008 Hcmbgbbm.exe 31 PID 2008 wrote to memory of 1984 2008 Hcmbgbbm.exe 31 PID 2008 wrote to memory of 1984 2008 Hcmbgbbm.exe 31 PID 1984 wrote to memory of 1980 1984 Hncfekac.exe 32 PID 1984 wrote to memory of 1980 1984 Hncfekac.exe 32 PID 1984 wrote to memory of 1980 1984 Hncfekac.exe 32 PID 1984 wrote to memory of 1980 1984 Hncfekac.exe 32 PID 1980 wrote to memory of 1092 1980 Ijjgjlgg.exe 33 PID 1980 wrote to memory of 1092 1980 Ijjgjlgg.exe 33 PID 1980 wrote to memory of 1092 1980 Ijjgjlgg.exe 33 PID 1980 wrote to memory of 1092 1980 Ijjgjlgg.exe 33 PID 1092 wrote to memory of 980 1092 Ifphom32.exe 34 PID 1092 wrote to memory of 980 1092 Ifphom32.exe 34 PID 1092 wrote to memory of 980 1092 Ifphom32.exe 34 PID 1092 wrote to memory of 980 1092 Ifphom32.exe 34 PID 980 wrote to memory of 1664 980 Iafllf32.exe 75 PID 980 wrote to memory of 1664 980 Iafllf32.exe 75 PID 980 wrote to memory of 1664 980 Iafllf32.exe 75 PID 980 wrote to memory of 1664 980 Iafllf32.exe 75 PID 1664 wrote to memory of 1812 1664 Immmag32.exe 74 PID 1664 wrote to memory of 1812 1664 Immmag32.exe 74 PID 1664 wrote to memory of 1812 1664 Immmag32.exe 74 PID 1664 wrote to memory of 1812 1664 Immmag32.exe 74 PID 1812 wrote to memory of 324 1812 Iehaei32.exe 73 PID 1812 wrote to memory of 324 1812 Iehaei32.exe 73 PID 1812 wrote to memory of 324 1812 Iehaei32.exe 73 PID 1812 wrote to memory of 324 1812 Iehaei32.exe 73 PID 324 wrote to memory of 856 324 Ilbjbcgm.exe 72 PID 324 wrote to memory of 856 324 Ilbjbcgm.exe 72 PID 324 wrote to memory of 856 324 Ilbjbcgm.exe 72 PID 324 wrote to memory of 856 324 Ilbjbcgm.exe 72 PID 856 wrote to memory of 1420 856 Iblbon32.exe 71 PID 856 wrote to memory of 1420 856 Iblbon32.exe 71 PID 856 wrote to memory of 1420 856 Iblbon32.exe 71 PID 856 wrote to memory of 1420 856 Iblbon32.exe 71 PID 1420 wrote to memory of 1820 1420 Ippbhbmd.exe 70 PID 1420 wrote to memory of 1820 1420 Ippbhbmd.exe 70 PID 1420 wrote to memory of 1820 1420 Ippbhbmd.exe 70 PID 1420 wrote to memory of 1820 1420 Ippbhbmd.exe 70 PID 1820 wrote to memory of 460 1820 Jemkqilk.exe 69 PID 1820 wrote to memory of 460 1820 Jemkqilk.exe 69 PID 1820 wrote to memory of 460 1820 Jemkqilk.exe 69 PID 1820 wrote to memory of 460 1820 Jemkqilk.exe 69 PID 460 wrote to memory of 2028 460 Jlfcmc32.exe 35 PID 460 wrote to memory of 2028 460 Jlfcmc32.exe 35 PID 460 wrote to memory of 2028 460 Jlfcmc32.exe 35 PID 460 wrote to memory of 2028 460 Jlfcmc32.exe 35 PID 2028 wrote to memory of 560 2028 Jdbhae32.exe 36 PID 2028 wrote to memory of 560 2028 Jdbhae32.exe 36 PID 2028 wrote to memory of 560 2028 Jdbhae32.exe 36 PID 2028 wrote to memory of 560 2028 Jdbhae32.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82.exe"C:\Users\Admin\AppData\Local\Temp\e73355e646bbfd9fa79481e29db92adf1c9812188d32c1479803f6700139fb82.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\Gbbcjl32.exeC:\Windows\system32\Gbbcjl32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Hicage32.exeC:\Windows\system32\Hicage32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\Hcmbgbbm.exeC:\Windows\system32\Hcmbgbbm.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\Hncfekac.exeC:\Windows\system32\Hncfekac.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Ijjgjlgg.exeC:\Windows\system32\Ijjgjlgg.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\Ifphom32.exeC:\Windows\system32\Ifphom32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\Iafllf32.exeC:\Windows\system32\Iafllf32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\Immmag32.exeC:\Windows\system32\Immmag32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1664
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Jdbhae32.exeC:\Windows\system32\Jdbhae32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\Jafhkiom.exeC:\Windows\system32\Jafhkiom.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560 -
C:\Windows\SysWOW64\Jaheqimj.exeC:\Windows\system32\Jaheqimj.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1296
-
-
-
C:\Windows\SysWOW64\Jhbnmc32.exeC:\Windows\system32\Jhbnmc32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1380 -
C:\Windows\SysWOW64\Jmofejcn.exeC:\Windows\system32\Jmofejcn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544
-
-
C:\Windows\SysWOW64\Kmabkjal.exeC:\Windows\system32\Kmabkjal.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1572 -
C:\Windows\SysWOW64\Kdkkhd32.exeC:\Windows\system32\Kdkkhd32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:740 -
C:\Windows\SysWOW64\Kihcpk32.exeC:\Windows\system32\Kihcpk32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824 -
C:\Windows\SysWOW64\Kpblme32.exeC:\Windows\system32\Kpblme32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Windows\SysWOW64\Kgldjoei.exeC:\Windows\system32\Kgldjoei.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:900
-
-
-
-
-
C:\Windows\SysWOW64\Kijpfjdm.exeC:\Windows\system32\Kijpfjdm.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1708 -
C:\Windows\SysWOW64\Kpdhbd32.exeC:\Windows\system32\Kpdhbd32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:996
-
-
C:\Windows\SysWOW64\Kaeejmbh.exeC:\Windows\system32\Kaeejmbh.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:944 -
C:\Windows\SysWOW64\Klkigean.exeC:\Windows\system32\Klkigean.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1704 -
C:\Windows\SysWOW64\Koiecaqb.exeC:\Windows\system32\Koiecaqb.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Windows\SysWOW64\Khbjlfgb.exeC:\Windows\system32\Khbjlfgb.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716 -
C:\Windows\SysWOW64\Kkpfhbff.exeC:\Windows\system32\Kkpfhbff.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1936 -
C:\Windows\SysWOW64\Lonoop32.exeC:\Windows\system32\Lonoop32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:108 -
C:\Windows\SysWOW64\Lamkkllp.exeC:\Windows\system32\Lamkkllp.exe7⤵
- Executes dropped EXE
PID:796 -
C:\Windows\SysWOW64\Lhfcgf32.exeC:\Windows\system32\Lhfcgf32.exe8⤵
- Executes dropped EXE
PID:1292 -
C:\Windows\SysWOW64\Ljhponik.exeC:\Windows\system32\Ljhponik.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:888 -
C:\Windows\SysWOW64\Ldmdlgia.exeC:\Windows\system32\Ldmdlgia.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:696
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ljjlengi.exeC:\Windows\system32\Ljjlengi.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1740 -
C:\Windows\SysWOW64\Ldpqbf32.exeC:\Windows\system32\Ldpqbf32.exe2⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\Lgnmnb32.exeC:\Windows\system32\Lgnmnb32.exe3⤵
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\Lmkefi32.exeC:\Windows\system32\Lmkefi32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\Loiabd32.exeC:\Windows\system32\Loiabd32.exe5⤵
- Executes dropped EXE
PID:544
-
-
-
-
-
C:\Windows\SysWOW64\Lglphbhe.exeC:\Windows\system32\Lglphbhe.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1668
-
C:\Windows\SysWOW64\Lgpica32.exeC:\Windows\system32\Lgpica32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:580 -
C:\Windows\SysWOW64\Liafkjjn.exeC:\Windows\system32\Liafkjjn.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:268 -
C:\Windows\SysWOW64\Mqinmgjp.exeC:\Windows\system32\Mqinmgjp.exe3⤵
- Executes dropped EXE
- Modifies registry class
PID:1592
-
-
-
C:\Windows\SysWOW64\Mkelbd32.exeC:\Windows\system32\Mkelbd32.exe1⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\Mbodooli.exeC:\Windows\system32\Mbodooli.exe2⤵
- Executes dropped EXE
PID:964 -
C:\Windows\SysWOW64\Mneddpbm.exeC:\Windows\system32\Mneddpbm.exe3⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\Madapkaa.exeC:\Windows\system32\Madapkaa.exe4⤵
- Executes dropped EXE
PID:564 -
C:\Windows\SysWOW64\Dbhllk32.exeC:\Windows\system32\Dbhllk32.exe5⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\Fmoimgpi.exeC:\Windows\system32\Fmoimgpi.exe6⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\Fifjbhen.exeC:\Windows\system32\Fifjbhen.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\Gklpeogf.exeC:\Windows\system32\Gklpeogf.exe8⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\Gmmigjdh.exeC:\Windows\system32\Gmmigjdh.exe9⤵
- Executes dropped EXE
PID:1896 -
C:\Windows\SysWOW64\Gggjepie.exeC:\Windows\system32\Gggjepie.exe10⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\Hcqgpplg.exeC:\Windows\system32\Hcqgpplg.exe11⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\Hglcpo32.exeC:\Windows\system32\Hglcpo32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1604 -
C:\Windows\SysWOW64\Hlneceob.exeC:\Windows\system32\Hlneceob.exe13⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\Hdkgng32.exeC:\Windows\system32\Hdkgng32.exe14⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\Ipbgbhpo.exeC:\Windows\system32\Ipbgbhpo.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1540 -
C:\Windows\SysWOW64\Icqcoc32.exeC:\Windows\system32\Icqcoc32.exe16⤵
- Executes dropped EXE
- Modifies registry class
PID:1104 -
C:\Windows\SysWOW64\Ifamqo32.exeC:\Windows\system32\Ifamqo32.exe17⤵
- Executes dropped EXE
PID:1196 -
C:\Windows\SysWOW64\Ilkemicp.exeC:\Windows\system32\Ilkemicp.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1888 -
C:\Windows\SysWOW64\Ifcifnja.exeC:\Windows\system32\Ifcifnja.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\Ijablm32.exeC:\Windows\system32\Ijablm32.exe20⤵
- Executes dropped EXE
- Modifies registry class
PID:596 -
C:\Windows\SysWOW64\Ikbodefe.exeC:\Windows\system32\Ikbodefe.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1376 -
C:\Windows\SysWOW64\Jmbknhmh.exeC:\Windows\system32\Jmbknhmh.exe22⤵PID:544
-
C:\Windows\SysWOW64\Joqgjcll.exeC:\Windows\system32\Joqgjcll.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:964 -
C:\Windows\SysWOW64\Jdmpbjkc.exeC:\Windows\system32\Jdmpbjkc.exe24⤵
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\Jocdpcji.exeC:\Windows\system32\Jocdpcji.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1936 -
C:\Windows\SysWOW64\Jikhhhaj.exeC:\Windows\system32\Jikhhhaj.exe26⤵
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\Jbdman32.exeC:\Windows\system32\Jbdman32.exe27⤵PID:1740
-
C:\Windows\SysWOW64\Jklajcnk.exeC:\Windows\system32\Jklajcnk.exe28⤵PID:324
-
C:\Windows\SysWOW64\Jmmnal32.exeC:\Windows\system32\Jmmnal32.exe29⤵PID:2008
-
C:\Windows\SysWOW64\Jgcbod32.exeC:\Windows\system32\Jgcbod32.exe30⤵PID:2004
-
C:\Windows\SysWOW64\Jjankpbc.exeC:\Windows\system32\Jjankpbc.exe31⤵
- Drops file in System32 directory
- Modifies registry class
PID:1980 -
C:\Windows\SysWOW64\Kmddbk32.exeC:\Windows\system32\Kmddbk32.exe32⤵PID:740
-
C:\Windows\SysWOW64\Kebelm32.exeC:\Windows\system32\Kebelm32.exe33⤵
- Drops file in System32 directory
PID:1084 -
C:\Windows\SysWOW64\Kbfffahc.exeC:\Windows\system32\Kbfffahc.exe34⤵
- Modifies registry class
PID:1996 -
C:\Windows\SysWOW64\Llqgdf32.exeC:\Windows\system32\Llqgdf32.exe35⤵PID:892
-
C:\Windows\SysWOW64\Lamplmkh.exeC:\Windows\system32\Lamplmkh.exe36⤵PID:2016
-
C:\Windows\SysWOW64\Ldllhhjl.exeC:\Windows\system32\Ldllhhjl.exe37⤵PID:516
-
C:\Windows\SysWOW64\Lfjhddip.exeC:\Windows\system32\Lfjhddip.exe38⤵PID:1416
-
C:\Windows\SysWOW64\Lnapfaib.exeC:\Windows\system32\Lnapfaib.exe39⤵
- Modifies registry class
PID:1184 -
C:\Windows\SysWOW64\Laplbmif.exeC:\Windows\system32\Laplbmif.exe40⤵
- Drops file in System32 directory
PID:1976 -
C:\Windows\SysWOW64\Lhjdog32.exeC:\Windows\system32\Lhjdog32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:976 -
C:\Windows\SysWOW64\Ljhqkb32.exeC:\Windows\system32\Ljhqkb32.exe42⤵PID:1720
-
C:\Windows\SysWOW64\Lmfmgnnj.exeC:\Windows\system32\Lmfmgnnj.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1224 -
C:\Windows\SysWOW64\Lfoapc32.exeC:\Windows\system32\Lfoapc32.exe44⤵PID:1192
-
C:\Windows\SysWOW64\Llljhj32.exeC:\Windows\system32\Llljhj32.exe45⤵
- Modifies registry class
PID:1172 -
C:\Windows\SysWOW64\Mipjan32.exeC:\Windows\system32\Mipjan32.exe46⤵PID:1596
-
C:\Windows\SysWOW64\Mfckkbqe.exeC:\Windows\system32\Mfckkbqe.exe47⤵PID:556
-
C:\Windows\SysWOW64\Mbjkpc32.exeC:\Windows\system32\Mbjkpc32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1440 -
C:\Windows\SysWOW64\Meihlo32.exeC:\Windows\system32\Meihlo32.exe49⤵
- Modifies registry class
PID:836 -
C:\Windows\SysWOW64\Mkepdf32.exeC:\Windows\system32\Mkepdf32.exe50⤵
- Modifies registry class
PID:1908 -
C:\Windows\SysWOW64\Maphap32.exeC:\Windows\system32\Maphap32.exe51⤵PID:1124
-
C:\Windows\SysWOW64\Mdndmk32.exeC:\Windows\system32\Mdndmk32.exe52⤵PID:1128
-
C:\Windows\SysWOW64\Mocijd32.exeC:\Windows\system32\Mocijd32.exe53⤵PID:1568
-
C:\Windows\SysWOW64\Memagnah.exeC:\Windows\system32\Memagnah.exe54⤵
- Drops file in System32 directory
- Modifies registry class
PID:628 -
C:\Windows\SysWOW64\Mhlmcjqk.exeC:\Windows\system32\Mhlmcjqk.exe55⤵
- Drops file in System32 directory
PID:1056 -
C:\Windows\SysWOW64\Nadblogl.exeC:\Windows\system32\Nadblogl.exe56⤵
- Modifies registry class
PID:1900 -
C:\Windows\SysWOW64\Nafoaoei.exeC:\Windows\system32\Nafoaoei.exe57⤵PID:1972
-
C:\Windows\SysWOW64\Njbcfabd.exeC:\Windows\system32\Njbcfabd.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1460 -
C:\Windows\SysWOW64\Nfhdkbhh.exeC:\Windows\system32\Nfhdkbhh.exe59⤵
- Modifies registry class
PID:1260 -
C:\Windows\SysWOW64\Nclddfgb.exeC:\Windows\system32\Nclddfgb.exe60⤵PID:1452
-
C:\Windows\SysWOW64\Obaaeclj.exeC:\Windows\system32\Obaaeclj.exe61⤵PID:452
-
C:\Windows\SysWOW64\Ojiifqll.exeC:\Windows\system32\Ojiifqll.exe62⤵PID:828
-
C:\Windows\SysWOW64\Obdnkbjg.exeC:\Windows\system32\Obdnkbjg.exe63⤵
- Modifies registry class
PID:1020 -
C:\Windows\SysWOW64\Ofpjka32.exeC:\Windows\system32\Ofpjka32.exe64⤵PID:1544
-
C:\Windows\SysWOW64\Onmlecmi.exeC:\Windows\system32\Onmlecmi.exe65⤵
- Drops file in System32 directory
- Modifies registry class
PID:1380 -
C:\Windows\SysWOW64\Oqlhaolm.exeC:\Windows\system32\Oqlhaolm.exe66⤵PID:1748
-
C:\Windows\SysWOW64\Ohbpclmo.exeC:\Windows\system32\Ohbpclmo.exe67⤵PID:1708
-
C:\Windows\SysWOW64\Ogepni32.exeC:\Windows\system32\Ogepni32.exe68⤵
- Modifies registry class
PID:1572 -
C:\Windows\SysWOW64\Ojdljd32.exeC:\Windows\system32\Ojdljd32.exe69⤵PID:944
-
C:\Windows\SysWOW64\Oclqcj32.exeC:\Windows\system32\Oclqcj32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:664 -
C:\Windows\SysWOW64\Okcidg32.exeC:\Windows\system32\Okcidg32.exe71⤵PID:1944
-
C:\Windows\SysWOW64\Pnbeqb32.exeC:\Windows\system32\Pnbeqb32.exe72⤵PID:960
-
C:\Windows\SysWOW64\Pmdelppn.exeC:\Windows\system32\Pmdelppn.exe73⤵
- Modifies registry class
PID:572 -
C:\Windows\SysWOW64\Pgjiihpd.exeC:\Windows\system32\Pgjiihpd.exe74⤵PID:1092
-
C:\Windows\SysWOW64\Pmiogo32.exeC:\Windows\system32\Pmiogo32.exe75⤵PID:856
-
C:\Windows\SysWOW64\Odoggh32.exeC:\Windows\system32\Odoggh32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1664 -
C:\Windows\SysWOW64\Ojloooei.exeC:\Windows\system32\Ojloooei.exe77⤵
- Drops file in System32 directory
PID:316 -
C:\Windows\SysWOW64\Lkglkm32.exeC:\Windows\system32\Lkglkm32.exe78⤵PID:2020
-
C:\Windows\SysWOW64\Kpjndlkj.exeC:\Windows\system32\Kpjndlkj.exe79⤵
- Drops file in System32 directory
PID:1932 -
C:\Windows\SysWOW64\Nfiefg32.exeC:\Windows\system32\Nfiefg32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1180 -
C:\Windows\SysWOW64\Ofkalfla.exeC:\Windows\system32\Ofkalfla.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1864 -
C:\Windows\SysWOW64\Ofnnafjn.exeC:\Windows\system32\Ofnnafjn.exe82⤵
- Modifies registry class
PID:1700 -
C:\Windows\SysWOW64\Ooicfh32.exeC:\Windows\system32\Ooicfh32.exe83⤵
- Drops file in System32 directory
PID:1484 -
C:\Windows\SysWOW64\Obgllgnp.exeC:\Windows\system32\Obgllgnp.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:768 -
C:\Windows\SysWOW64\Ompmmdjn.exeC:\Windows\system32\Ompmmdjn.exe85⤵
- Drops file in System32 directory
PID:1168 -
C:\Windows\SysWOW64\Pegenb32.exeC:\Windows\system32\Pegenb32.exe86⤵PID:1872
-
C:\Windows\SysWOW64\Pkfjlh32.exeC:\Windows\system32\Pkfjlh32.exe87⤵PID:1208
-
C:\Windows\SysWOW64\Piijgenp.exeC:\Windows\system32\Piijgenp.exe88⤵
- Modifies registry class
PID:860 -
C:\Windows\SysWOW64\Pmgcmcdf.exeC:\Windows\system32\Pmgcmcdf.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1916 -
C:\Windows\SysWOW64\Plmpnp32.exeC:\Windows\system32\Plmpnp32.exe90⤵PID:364
-
C:\Windows\SysWOW64\Pokljk32.exeC:\Windows\system32\Pokljk32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:840 -
C:\Windows\SysWOW64\Pgbdliid.exeC:\Windows\system32\Pgbdliid.exe92⤵PID:2012
-
C:\Windows\SysWOW64\Peedge32.exeC:\Windows\system32\Peedge32.exe93⤵PID:1448
-
C:\Windows\SysWOW64\Qkdiel32.exeC:\Windows\system32\Qkdiel32.exe94⤵PID:2040
-
C:\Windows\SysWOW64\Qanaafcp.exeC:\Windows\system32\Qanaafcp.exe95⤵PID:1480
-
C:\Windows\SysWOW64\Ahhjnpjm.exeC:\Windows\system32\Ahhjnpjm.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1396 -
C:\Windows\SysWOW64\Akffjlia.exeC:\Windows\system32\Akffjlia.exe97⤵
- Drops file in System32 directory
PID:1564 -
C:\Windows\SysWOW64\Ahmcip32.exeC:\Windows\system32\Ahmcip32.exe98⤵PID:1688
-
C:\Windows\SysWOW64\Anilaf32.exeC:\Windows\system32\Anilaf32.exe99⤵PID:1144
-
C:\Windows\SysWOW64\Aqhhnb32.exeC:\Windows\system32\Aqhhnb32.exe100⤵
- Modifies registry class
PID:964 -
C:\Windows\SysWOW64\Acfdjm32.exeC:\Windows\system32\Acfdjm32.exe101⤵PID:1672
-
C:\Windows\SysWOW64\Ajpmggjc.exeC:\Windows\system32\Ajpmggjc.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\Aqjeca32.exeC:\Windows\system32\Aqjeca32.exe103⤵
- Modifies registry class
PID:1640 -
C:\Windows\SysWOW64\Aciapm32.exeC:\Windows\system32\Aciapm32.exe104⤵PID:1740
-
C:\Windows\SysWOW64\Afgmlhph.exeC:\Windows\system32\Afgmlhph.exe105⤵
- Modifies registry class
PID:324 -
C:\Windows\SysWOW64\Annemfqj.exeC:\Windows\system32\Annemfqj.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2008 -
C:\Windows\SysWOW64\Bcknemoa.exeC:\Windows\system32\Bcknemoa.exe107⤵PID:2004
-
C:\Windows\SysWOW64\Bqonoank.exeC:\Windows\system32\Bqonoank.exe108⤵
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\Bkhooo32.exeC:\Windows\system32\Bkhooo32.exe109⤵PID:1824
-
C:\Windows\SysWOW64\Bilphc32.exeC:\Windows\system32\Bilphc32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1440 -
C:\Windows\SysWOW64\Bfppbg32.exeC:\Windows\system32\Bfppbg32.exe111⤵PID:948
-
C:\Windows\SysWOW64\Boidkm32.exeC:\Windows\system32\Boidkm32.exe112⤵PID:1460
-
C:\Windows\SysWOW64\Bqjabedl.exeC:\Windows\system32\Bqjabedl.exe113⤵PID:1260
-
C:\Windows\SysWOW64\Biaicben.exeC:\Windows\system32\Biaicben.exe114⤵
- Modifies registry class
PID:1452 -
C:\Windows\SysWOW64\Cbinlh32.exeC:\Windows\system32\Cbinlh32.exe115⤵PID:452
-
C:\Windows\SysWOW64\Cckjdpam.exeC:\Windows\system32\Cckjdpam.exe116⤵PID:828
-
C:\Windows\SysWOW64\Cmcomehm.exeC:\Windows\system32\Cmcomehm.exe117⤵
- Modifies registry class
PID:1020 -
C:\Windows\SysWOW64\Cgicjngc.exeC:\Windows\system32\Cgicjngc.exe118⤵PID:1544
-
C:\Windows\SysWOW64\Ccpcoo32.exeC:\Windows\system32\Ccpcoo32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1380 -
C:\Windows\SysWOW64\Ccbpeoke.exeC:\Windows\system32\Ccbpeoke.exe120⤵PID:1748
-
C:\Windows\SysWOW64\Cfplajjh.exeC:\Windows\system32\Cfplajjh.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1708 -
C:\Windows\SysWOW64\Ccdmjoib.exeC:\Windows\system32\Ccdmjoib.exe122⤵PID:1572
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-