Analysis
-
max time kernel
67s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 09:04
Static task
static1
Behavioral task
behavioral1
Sample
39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc.exe
Resource
win10v2004-20220901-en
General
-
Target
39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc.exe
-
Size
50KB
-
MD5
023e9499f720d462725b89e9094dadd0
-
SHA1
819fd9ab80bca668a5afb65921c328135742eae3
-
SHA256
39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc
-
SHA512
160d16950f9494fccb0849b4e534d5f3ab4b844ad241369eb4ae6379672d94d83842a9a877b12bed708c3a852a8d3df5cec0cd6ebf1228c999516d1a7a15c07a
-
SSDEEP
768:Z4XC7q73f8ZLARJ4L5sYJSINlFmybVVG0z4K5Gp7Z8Jhl/R6/1H5j:Z4n8qOsoDCy4Ksp7ZdN
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Hemkjill.exeHklpho32.exeEcpocc32.exeGpaleq32.exeKnoaboco.exeLohpcq32.exeEmndao32.exeIdkkad32.exeIaahqheq.exeComdkh32.exeDmankjff.exeJnenlpki.exeKoekfc32.exeKdegopbl.exeCgbpgf32.exeCmfejbdp.exeQmnbkdjd.exeHmnoec32.exeHmacejam.exeIeoagflg.exeKohnfide.exeGmimcg32.exeLhiokg32.exeFhmkef32.exeFjkqgk32.exeGalfokgi.exeLodnbg32.exeCjnomaik.exeDmoafjhi.exeFapohf32.exeFcnlda32.exeEgoodhcp.exeLbbjnc32.exeAmibgbpg.exeGmnfnfnf.exeEjkojddf.exePmkffd32.exeClohom32.exeLialfl32.exeJdmjck32.exeJpdjhljm.exeJhlidp32.exeLofjhg32.exeFqkfmgbp.exeGchnkp32.exeHhmmameb.exeHdfklnic.exeAepmpe32.exeCnndipmo.exeCflfca32.exeFcgedbcf.exeFcloob32.exeLgcegc32.exeMfnofo32.exeAomkdjcb.exeBibpacch.exeBoikpiie.exeGfaallhl.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hemkjill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hklpho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecpocc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpaleq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knoaboco.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lohpcq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emndao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idkkad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iaahqheq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Comdkh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmankjff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnenlpki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Koekfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdegopbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgbpgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Comdkh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmfejbdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qmnbkdjd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmnoec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmacejam.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ieoagflg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kohnfide.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmimcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhiokg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhmkef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjkqgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Galfokgi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lodnbg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjnomaik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmoafjhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fapohf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcnlda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egoodhcp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emndao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbbjnc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amibgbpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmnfnfnf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejkojddf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kohnfide.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmkffd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clohom32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lialfl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdmjck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpdjhljm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhlidp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lofjhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fqkfmgbp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjkqgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gchnkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhmmameb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdfklnic.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aepmpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnndipmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cflfca32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcgedbcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcloob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgcegc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfnofo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aomkdjcb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bibpacch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Boikpiie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fapohf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfaallhl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgcegc32.exe -
Executes dropped EXE 64 IoCs
Processes:
Cmfejbdp.exeDkhehilo.exeDqdnppjf.exeDkjbnijl.exeDmkoea32.exeDcegbk32.exeDqigkp32.exeDmphpqle.exeDgelni32.exeDeimgn32.exeEelimm32.exeEcafnj32.exeEjkojddf.exeEeqbhmdl.exeEgoodhcp.exeEmlglo32.exeElmhjfig.exeEmndao32.exeFlodpfgd.exeFmpagnmb.exeFcjidh32.exeFanimm32.exeFjfnfbji.exeFaqfclaf.exeFdobohaj.exeFmgghm32.exeFhmkef32.exeGdcljg32.exeGlmqad32.exeGeeejj32.exeGalfokgi.exeGejoei32.exeHemkjill.exeHoepcn32.exeHeohphjj.exeHklpho32.exeHddeaeoa.exeHmlijj32.exeHlnihbma.exeHajbpi32.exeHhdjmcce.exeHkbfinbi.exeHmacejam.exeIdkkad32.exeIoqoomhp.exeIaokkhgc.exeIldphqgi.exeIaahqheq.exeIhkpma32.exeIoeijldj.exeIeoagflg.exeJndhagqg.exeJhimopqn.exeJnfeggoe.exeJhlidp32.exeKadnmeek.exeKhnfjo32.exeKohnfide.exeKdegopbl.exeKbighd32.exeKhcpenhc.exeKomhah32.exeKfgpnbgl.exeKoodghnm.exepid process 3640 Cmfejbdp.exe 2276 Dkhehilo.exe 3356 Dqdnppjf.exe 2624 Dkjbnijl.exe 4800 Dmkoea32.exe 3408 Dcegbk32.exe 1292 Dqigkp32.exe 5012 Dmphpqle.exe 1168 Dgelni32.exe 2484 Deimgn32.exe 3128 Eelimm32.exe 4540 Ecafnj32.exe 220 Ejkojddf.exe 4472 Eeqbhmdl.exe 3936 Egoodhcp.exe 5064 Emlglo32.exe 628 Elmhjfig.exe 648 Emndao32.exe 2252 Flodpfgd.exe 2896 Fmpagnmb.exe 2284 Fcjidh32.exe 4100 Fanimm32.exe 540 Fjfnfbji.exe 4240 Faqfclaf.exe 2168 Fdobohaj.exe 4252 Fmgghm32.exe 5108 Fhmkef32.exe 4784 Gdcljg32.exe 3064 Glmqad32.exe 4072 Geeejj32.exe 4700 Galfokgi.exe 2420 Gejoei32.exe 4308 Hemkjill.exe 4216 Hoepcn32.exe 3296 Heohphjj.exe 1120 Hklpho32.exe 4896 Hddeaeoa.exe 996 Hmlijj32.exe 3220 Hlnihbma.exe 4568 Hajbpi32.exe 4284 Hhdjmcce.exe 3944 Hkbfinbi.exe 4232 Hmacejam.exe 3924 Idkkad32.exe 1348 Ioqoomhp.exe 1780 Iaokkhgc.exe 720 Ildphqgi.exe 1208 Iaahqheq.exe 3260 Ihkpma32.exe 1612 Ioeijldj.exe 5048 Ieoagflg.exe 4104 Jndhagqg.exe 976 Jhimopqn.exe 904 Jnfeggoe.exe 4352 Jhlidp32.exe 760 Kadnmeek.exe 4756 Khnfjo32.exe 1380 Kohnfide.exe 4196 Kdegopbl.exe 4292 Kbighd32.exe 3204 Khcpenhc.exe 1892 Komhah32.exe 4912 Kfgpnbgl.exe 4920 Koodghnm.exe -
Drops file in System32 directory 64 IoCs
Processes:
Knoaboco.exeKonnmb32.exeDcegbk32.exeDmphpqle.exeIaahqheq.exeClcajlbf.exeDmkgkk32.exeGjojbkoc.exeMoljnpna.exeNmomchdg.exeAphncnoj.exeDfeiip32.exeLgcegc32.exeHhmmameb.exeJkplpfbn.exeAmdilc32.exeAomkdjcb.exeEopjge32.exeEcpocc32.exeEoimndmp.exeJalabpgh.exeKhmooi32.exeLhiokg32.exeJgiijffo.exeEgoodhcp.exeEmndao32.exeHhdjmcce.exeFmmmgh32.exeHaeajc32.exeIonlof32.exeDqdnppjf.exeMndjobdb.exeLbhidloh.exeFjfnfbji.exeHmacejam.exeAgkqoilo.exeGpaleq32.exeIalhkb32.exeFmgghm32.exeKomhah32.exeLialfl32.exeAljfmp32.exeBljodmja.exeDfheop32.exeDqigkp32.exeIeoagflg.exeLodnbg32.exeKdfmji32.exeLfkiib32.exeMblmdaqq.exeHabeec32.exeIaqafaae.exeCobnfgaj.exeDfqonada.exe39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc.exeDkjbnijl.exedescription ioc process File created C:\Windows\SysWOW64\Kggekd32.exe Knoaboco.exe File opened for modification C:\Windows\SysWOW64\Kamjim32.exe Konnmb32.exe File created C:\Windows\SysWOW64\Ppojnb32.dll Dcegbk32.exe File created C:\Windows\SysWOW64\Bpqkjoqj.dll Dmphpqle.exe File created C:\Windows\SysWOW64\Ihkpma32.exe Iaahqheq.exe File created C:\Windows\SysWOW64\Fjiijo32.dll Clcajlbf.exe File created C:\Windows\SysWOW64\Aliiblln.dll Dmkgkk32.exe File opened for modification C:\Windows\SysWOW64\Gmnfnfnf.exe Gjojbkoc.exe File opened for modification C:\Windows\SysWOW64\Mbkfjkme.exe Moljnpna.exe File created C:\Windows\SysWOW64\Dqigkp32.exe Dcegbk32.exe File created C:\Windows\SysWOW64\Oehcaqhh.dll Nmomchdg.exe File created C:\Windows\SysWOW64\Aedgkema.exe Aphncnoj.exe File created C:\Windows\SysWOW64\Dmoafjhi.exe Dfeiip32.exe File created C:\Windows\SysWOW64\Lojmhppd.exe Lgcegc32.exe File created C:\Windows\SysWOW64\Ddgbpkcj.dll Hhmmameb.exe File opened for modification C:\Windows\SysWOW64\Jalabpgh.exe Jkplpfbn.exe File opened for modification C:\Windows\SysWOW64\Apceho32.exe Amdilc32.exe File opened for modification C:\Windows\SysWOW64\Bibpacch.exe Aomkdjcb.exe File opened for modification C:\Windows\SysWOW64\Dmoafjhi.exe Dfeiip32.exe File created C:\Windows\SysWOW64\Emfgfi32.exe Eopjge32.exe File created C:\Windows\SysWOW64\Mbijeq32.dll Ecpocc32.exe File opened for modification C:\Windows\SysWOW64\Efcejndl.exe Eoimndmp.exe File created C:\Windows\SysWOW64\Jgiijffo.exe Jalabpgh.exe File opened for modification C:\Windows\SysWOW64\Kklkkd32.exe Khmooi32.exe File opened for modification C:\Windows\SysWOW64\Locghafl.exe Lhiokg32.exe File created C:\Windows\SysWOW64\Hcodhicm.dll Jgiijffo.exe File created C:\Windows\SysWOW64\Gdgpgqih.dll Egoodhcp.exe File created C:\Windows\SysWOW64\Flodpfgd.exe Emndao32.exe File created C:\Windows\SysWOW64\Hkbfinbi.exe Hhdjmcce.exe File opened for modification C:\Windows\SysWOW64\Fcgedbcf.exe Fmmmgh32.exe File opened for modification C:\Windows\SysWOW64\Hdcnfnkf.exe Haeajc32.exe File created C:\Windows\SysWOW64\Haihjl32.dll Ionlof32.exe File opened for modification C:\Windows\SysWOW64\Dkjbnijl.exe Dqdnppjf.exe File created C:\Windows\SysWOW64\Efcejndl.exe Eoimndmp.exe File created C:\Windows\SysWOW64\Gckangoo.dll Mndjobdb.exe File opened for modification C:\Windows\SysWOW64\Mdgeqgnk.exe Lbhidloh.exe File opened for modification C:\Windows\SysWOW64\Faqfclaf.exe Fjfnfbji.exe File created C:\Windows\SysWOW64\Idkkad32.exe Hmacejam.exe File created C:\Windows\SysWOW64\Amdilc32.exe Agkqoilo.exe File opened for modification C:\Windows\SysWOW64\Ghhdfn32.exe Gpaleq32.exe File created C:\Windows\SysWOW64\Ihfphlmg.exe Ialhkb32.exe File created C:\Windows\SysWOW64\Kqfdfblo.dll Jalabpgh.exe File created C:\Windows\SysWOW64\Fhmkef32.exe Fmgghm32.exe File created C:\Windows\SysWOW64\Mgmbeg32.dll Komhah32.exe File created C:\Windows\SysWOW64\Lokdcfcp.exe Lialfl32.exe File opened for modification C:\Windows\SysWOW64\Aohbik32.exe Aljfmp32.exe File created C:\Windows\SysWOW64\Jdcdkfjd.dll Bljodmja.exe File created C:\Windows\SysWOW64\Dmankjff.exe Dfheop32.exe File created C:\Windows\SysWOW64\Dmphpqle.exe Dqigkp32.exe File created C:\Windows\SysWOW64\Glekbb32.dll Ieoagflg.exe File created C:\Windows\SysWOW64\Lbbjnc32.exe Lodnbg32.exe File created C:\Windows\SysWOW64\Jdcoic32.dll Gpaleq32.exe File created C:\Windows\SysWOW64\Kkqefcdk.exe Kdfmji32.exe File opened for modification C:\Windows\SysWOW64\Kkqefcdk.exe Kdfmji32.exe File created C:\Windows\SysWOW64\Dfkpbl32.dll Lfkiib32.exe File created C:\Windows\SysWOW64\Phaickcg.dll Mblmdaqq.exe File opened for modification C:\Windows\SysWOW64\Boikpiie.exe Bljodmja.exe File created C:\Windows\SysWOW64\Khpbll32.dll Fmmmgh32.exe File opened for modification C:\Windows\SysWOW64\Hhmmameb.exe Habeec32.exe File opened for modification C:\Windows\SysWOW64\Ihkick32.exe Iaqafaae.exe File created C:\Windows\SysWOW64\Cflfca32.exe Cobnfgaj.exe File opened for modification C:\Windows\SysWOW64\Dmkgkk32.exe Dfqonada.exe File created C:\Windows\SysWOW64\Cmfejbdp.exe 39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc.exe File opened for modification C:\Windows\SysWOW64\Dmkoea32.exe Dkjbnijl.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 7552 7472 WerFault.exe Mbkfjkme.exe -
Modifies registry class 64 IoCs
Processes:
Cmfejbdp.exeEmlglo32.exeKadnmeek.exeApceho32.exeBigimb32.exeDqhpai32.exeIdajhlof.exeLpbgjj32.exeLodnbg32.exeLialfl32.exeBoohjjap.exeBoikpiie.exeFjanqm32.exeFjcjflip.exeFgldkp32.exeHhccbloj.exeKhpleh32.exeDkhehilo.exeFcjidh32.exeGdcljg32.exeAgkqoilo.exeEopjge32.exeFmmmgh32.exeGganfooo.exeIonlof32.exeLbbjnc32.exeAmibgbpg.exeFanbcf32.exeJopakdfa.exeHhmmameb.exeKklkkd32.exeLkenac32.exeHlnihbma.exeDmoafjhi.exeGccepqii.exeJkplpfbn.exeLdkfei32.exeLddikg32.exeIdkkad32.exeQffgdj32.exeAohbik32.exeIandqa32.exeFaqfclaf.exeHemkjill.exeBeipfd32.exeCobnfgaj.exeEoimndmp.exeGjojbkoc.exeKamjim32.exeLncjnn32.exeDmkoea32.exeKhcpenhc.exeApqhbo32.exeImjoqbef.exeJnenlpki.exeLkjhmblp.exeMdgeqgnk.exeIldphqgi.exeMmhgbijo.exeQlcplq32.exeBcmqphhf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajqffagc.dll" Cmfejbdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Emlglo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kadnmeek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apceho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bigimb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dqhpai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idajhlof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpbgjj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lodnbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcclgomi.dll" Lialfl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Boohjjap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggkenlaa.dll" Boikpiie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjanqm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjcjflip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgldkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elmlklhp.dll" Hhccbloj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khpleh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klklclaf.dll" Dkhehilo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Behppo32.dll" Fcjidh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gdcljg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lppjnm32.dll" Agkqoilo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eopjge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmmmgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gganfooo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ionlof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbbjnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amibgbpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Moaojcag.dll" Fanbcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jopakdfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhmmameb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eolkla32.dll" Kklkkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkenac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Peehib32.dll" Hlnihbma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apceho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmoafjhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gccepqii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkplpfbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idmiqlom.dll" Ldkfei32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lddikg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idkkad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qffgdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aohbik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Boikpiie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iandqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igancp32.dll" Faqfclaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hemkjill.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajlqejom.dll" Beipfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cobnfgaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eoimndmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpakjj32.dll" Gjojbkoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kamjim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lncjnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmkoea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fameaj32.dll" Khcpenhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apqhbo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Imjoqbef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnenlpki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkjhmblp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imcphcfn.dll" Mdgeqgnk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ildphqgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhggih32.dll" Mmhgbijo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qlcplq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Boohjjap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bcmqphhf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc.exeCmfejbdp.exeDkhehilo.exeDqdnppjf.exeDkjbnijl.exeDmkoea32.exeDcegbk32.exeDqigkp32.exeDmphpqle.exeDgelni32.exeDeimgn32.exeEelimm32.exeEcafnj32.exeEjkojddf.exeEeqbhmdl.exeEgoodhcp.exeEmlglo32.exeElmhjfig.exeEmndao32.exeFlodpfgd.exeFmpagnmb.exeFcjidh32.exedescription pid process target process PID 2960 wrote to memory of 3640 2960 39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc.exe Cmfejbdp.exe PID 2960 wrote to memory of 3640 2960 39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc.exe Cmfejbdp.exe PID 2960 wrote to memory of 3640 2960 39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc.exe Cmfejbdp.exe PID 3640 wrote to memory of 2276 3640 Cmfejbdp.exe Dkhehilo.exe PID 3640 wrote to memory of 2276 3640 Cmfejbdp.exe Dkhehilo.exe PID 3640 wrote to memory of 2276 3640 Cmfejbdp.exe Dkhehilo.exe PID 2276 wrote to memory of 3356 2276 Dkhehilo.exe Dqdnppjf.exe PID 2276 wrote to memory of 3356 2276 Dkhehilo.exe Dqdnppjf.exe PID 2276 wrote to memory of 3356 2276 Dkhehilo.exe Dqdnppjf.exe PID 3356 wrote to memory of 2624 3356 Dqdnppjf.exe Dkjbnijl.exe PID 3356 wrote to memory of 2624 3356 Dqdnppjf.exe Dkjbnijl.exe PID 3356 wrote to memory of 2624 3356 Dqdnppjf.exe Dkjbnijl.exe PID 2624 wrote to memory of 4800 2624 Dkjbnijl.exe Dmkoea32.exe PID 2624 wrote to memory of 4800 2624 Dkjbnijl.exe Dmkoea32.exe PID 2624 wrote to memory of 4800 2624 Dkjbnijl.exe Dmkoea32.exe PID 4800 wrote to memory of 3408 4800 Dmkoea32.exe Dcegbk32.exe PID 4800 wrote to memory of 3408 4800 Dmkoea32.exe Dcegbk32.exe PID 4800 wrote to memory of 3408 4800 Dmkoea32.exe Dcegbk32.exe PID 3408 wrote to memory of 1292 3408 Dcegbk32.exe Dqigkp32.exe PID 3408 wrote to memory of 1292 3408 Dcegbk32.exe Dqigkp32.exe PID 3408 wrote to memory of 1292 3408 Dcegbk32.exe Dqigkp32.exe PID 1292 wrote to memory of 5012 1292 Dqigkp32.exe Dmphpqle.exe PID 1292 wrote to memory of 5012 1292 Dqigkp32.exe Dmphpqle.exe PID 1292 wrote to memory of 5012 1292 Dqigkp32.exe Dmphpqle.exe PID 5012 wrote to memory of 1168 5012 Dmphpqle.exe Dgelni32.exe PID 5012 wrote to memory of 1168 5012 Dmphpqle.exe Dgelni32.exe PID 5012 wrote to memory of 1168 5012 Dmphpqle.exe Dgelni32.exe PID 1168 wrote to memory of 2484 1168 Dgelni32.exe Deimgn32.exe PID 1168 wrote to memory of 2484 1168 Dgelni32.exe Deimgn32.exe PID 1168 wrote to memory of 2484 1168 Dgelni32.exe Deimgn32.exe PID 2484 wrote to memory of 3128 2484 Deimgn32.exe Eelimm32.exe PID 2484 wrote to memory of 3128 2484 Deimgn32.exe Eelimm32.exe PID 2484 wrote to memory of 3128 2484 Deimgn32.exe Eelimm32.exe PID 3128 wrote to memory of 4540 3128 Eelimm32.exe Ecafnj32.exe PID 3128 wrote to memory of 4540 3128 Eelimm32.exe Ecafnj32.exe PID 3128 wrote to memory of 4540 3128 Eelimm32.exe Ecafnj32.exe PID 4540 wrote to memory of 220 4540 Ecafnj32.exe Ejkojddf.exe PID 4540 wrote to memory of 220 4540 Ecafnj32.exe Ejkojddf.exe PID 4540 wrote to memory of 220 4540 Ecafnj32.exe Ejkojddf.exe PID 220 wrote to memory of 4472 220 Ejkojddf.exe Eeqbhmdl.exe PID 220 wrote to memory of 4472 220 Ejkojddf.exe Eeqbhmdl.exe PID 220 wrote to memory of 4472 220 Ejkojddf.exe Eeqbhmdl.exe PID 4472 wrote to memory of 3936 4472 Eeqbhmdl.exe Egoodhcp.exe PID 4472 wrote to memory of 3936 4472 Eeqbhmdl.exe Egoodhcp.exe PID 4472 wrote to memory of 3936 4472 Eeqbhmdl.exe Egoodhcp.exe PID 3936 wrote to memory of 5064 3936 Egoodhcp.exe Emlglo32.exe PID 3936 wrote to memory of 5064 3936 Egoodhcp.exe Emlglo32.exe PID 3936 wrote to memory of 5064 3936 Egoodhcp.exe Emlglo32.exe PID 5064 wrote to memory of 628 5064 Emlglo32.exe Elmhjfig.exe PID 5064 wrote to memory of 628 5064 Emlglo32.exe Elmhjfig.exe PID 5064 wrote to memory of 628 5064 Emlglo32.exe Elmhjfig.exe PID 628 wrote to memory of 648 628 Elmhjfig.exe Emndao32.exe PID 628 wrote to memory of 648 628 Elmhjfig.exe Emndao32.exe PID 628 wrote to memory of 648 628 Elmhjfig.exe Emndao32.exe PID 648 wrote to memory of 2252 648 Emndao32.exe Flodpfgd.exe PID 648 wrote to memory of 2252 648 Emndao32.exe Flodpfgd.exe PID 648 wrote to memory of 2252 648 Emndao32.exe Flodpfgd.exe PID 2252 wrote to memory of 2896 2252 Flodpfgd.exe Fmpagnmb.exe PID 2252 wrote to memory of 2896 2252 Flodpfgd.exe Fmpagnmb.exe PID 2252 wrote to memory of 2896 2252 Flodpfgd.exe Fmpagnmb.exe PID 2896 wrote to memory of 2284 2896 Fmpagnmb.exe Fcjidh32.exe PID 2896 wrote to memory of 2284 2896 Fmpagnmb.exe Fcjidh32.exe PID 2896 wrote to memory of 2284 2896 Fmpagnmb.exe Fcjidh32.exe PID 2284 wrote to memory of 4100 2284 Fcjidh32.exe Fanimm32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc.exe"C:\Users\Admin\AppData\Local\Temp\39230cc062376ec245dd7177993727e598d9351c5635266949a62797361eadfc.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\Cmfejbdp.exeC:\Windows\system32\Cmfejbdp.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\Dkhehilo.exeC:\Windows\system32\Dkhehilo.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\Dqdnppjf.exeC:\Windows\system32\Dqdnppjf.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\Dkjbnijl.exeC:\Windows\system32\Dkjbnijl.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Dmkoea32.exeC:\Windows\system32\Dmkoea32.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\Dcegbk32.exeC:\Windows\system32\Dcegbk32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\Dqigkp32.exeC:\Windows\system32\Dqigkp32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\Dmphpqle.exeC:\Windows\system32\Dmphpqle.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\Dgelni32.exeC:\Windows\system32\Dgelni32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\Deimgn32.exeC:\Windows\system32\Deimgn32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Eelimm32.exeC:\Windows\system32\Eelimm32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\Ecafnj32.exeC:\Windows\system32\Ecafnj32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\Ejkojddf.exeC:\Windows\system32\Ejkojddf.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\Eeqbhmdl.exeC:\Windows\system32\Eeqbhmdl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\Egoodhcp.exeC:\Windows\system32\Egoodhcp.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\Emlglo32.exeC:\Windows\system32\Emlglo32.exe17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\Elmhjfig.exeC:\Windows\system32\Elmhjfig.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\Emndao32.exeC:\Windows\system32\Emndao32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\Flodpfgd.exeC:\Windows\system32\Flodpfgd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Fmpagnmb.exeC:\Windows\system32\Fmpagnmb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\Fcjidh32.exeC:\Windows\system32\Fcjidh32.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\Fanimm32.exeC:\Windows\system32\Fanimm32.exe23⤵
- Executes dropped EXE
PID:4100 -
C:\Windows\SysWOW64\Fjfnfbji.exeC:\Windows\system32\Fjfnfbji.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:540 -
C:\Windows\SysWOW64\Faqfclaf.exeC:\Windows\system32\Faqfclaf.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:4240 -
C:\Windows\SysWOW64\Fdobohaj.exeC:\Windows\system32\Fdobohaj.exe26⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\Fmgghm32.exeC:\Windows\system32\Fmgghm32.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4252 -
C:\Windows\SysWOW64\Fhmkef32.exeC:\Windows\system32\Fhmkef32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5108 -
C:\Windows\SysWOW64\Gdcljg32.exeC:\Windows\system32\Gdcljg32.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:4784 -
C:\Windows\SysWOW64\Glmqad32.exeC:\Windows\system32\Glmqad32.exe30⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\Geeejj32.exeC:\Windows\system32\Geeejj32.exe31⤵
- Executes dropped EXE
PID:4072 -
C:\Windows\SysWOW64\Galfokgi.exeC:\Windows\system32\Galfokgi.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4700 -
C:\Windows\SysWOW64\Gejoei32.exeC:\Windows\system32\Gejoei32.exe33⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\Hemkjill.exeC:\Windows\system32\Hemkjill.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4308 -
C:\Windows\SysWOW64\Hoepcn32.exeC:\Windows\system32\Hoepcn32.exe35⤵
- Executes dropped EXE
PID:4216 -
C:\Windows\SysWOW64\Heohphjj.exeC:\Windows\system32\Heohphjj.exe36⤵
- Executes dropped EXE
PID:3296 -
C:\Windows\SysWOW64\Hklpho32.exeC:\Windows\system32\Hklpho32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1120 -
C:\Windows\SysWOW64\Hddeaeoa.exeC:\Windows\system32\Hddeaeoa.exe38⤵
- Executes dropped EXE
PID:4896 -
C:\Windows\SysWOW64\Hmlijj32.exeC:\Windows\system32\Hmlijj32.exe39⤵
- Executes dropped EXE
PID:996 -
C:\Windows\SysWOW64\Hlnihbma.exeC:\Windows\system32\Hlnihbma.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:3220 -
C:\Windows\SysWOW64\Hajbpi32.exeC:\Windows\system32\Hajbpi32.exe41⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\Hhdjmcce.exeC:\Windows\system32\Hhdjmcce.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4284 -
C:\Windows\SysWOW64\Hkbfinbi.exeC:\Windows\system32\Hkbfinbi.exe43⤵
- Executes dropped EXE
PID:3944 -
C:\Windows\SysWOW64\Hmacejam.exeC:\Windows\system32\Hmacejam.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4232 -
C:\Windows\SysWOW64\Idkkad32.exeC:\Windows\system32\Idkkad32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3924 -
C:\Windows\SysWOW64\Ioqoomhp.exeC:\Windows\system32\Ioqoomhp.exe46⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\SysWOW64\Iaokkhgc.exeC:\Windows\system32\Iaokkhgc.exe47⤵
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\Ildphqgi.exeC:\Windows\system32\Ildphqgi.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:720 -
C:\Windows\SysWOW64\Iaahqheq.exeC:\Windows\system32\Iaahqheq.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1208 -
C:\Windows\SysWOW64\Ihkpma32.exeC:\Windows\system32\Ihkpma32.exe50⤵
- Executes dropped EXE
PID:3260 -
C:\Windows\SysWOW64\Ioeijldj.exeC:\Windows\system32\Ioeijldj.exe51⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\Ieoagflg.exeC:\Windows\system32\Ieoagflg.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:5048 -
C:\Windows\SysWOW64\Jndhagqg.exeC:\Windows\system32\Jndhagqg.exe53⤵
- Executes dropped EXE
PID:4104 -
C:\Windows\SysWOW64\Jhimopqn.exeC:\Windows\system32\Jhimopqn.exe54⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\Jnfeggoe.exeC:\Windows\system32\Jnfeggoe.exe55⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\Jhlidp32.exeC:\Windows\system32\Jhlidp32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\Kadnmeek.exeC:\Windows\system32\Kadnmeek.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:760 -
C:\Windows\SysWOW64\Khnfjo32.exeC:\Windows\system32\Khnfjo32.exe58⤵
- Executes dropped EXE
PID:4756 -
C:\Windows\SysWOW64\Kohnfide.exeC:\Windows\system32\Kohnfide.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1380 -
C:\Windows\SysWOW64\Kdegopbl.exeC:\Windows\system32\Kdegopbl.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4196 -
C:\Windows\SysWOW64\Kbighd32.exeC:\Windows\system32\Kbighd32.exe61⤵
- Executes dropped EXE
PID:4292 -
C:\Windows\SysWOW64\Khcpenhc.exeC:\Windows\system32\Khcpenhc.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:3204 -
C:\Windows\SysWOW64\Komhah32.exeC:\Windows\system32\Komhah32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1892 -
C:\Windows\SysWOW64\Kfgpnbgl.exeC:\Windows\system32\Kfgpnbgl.exe64⤵
- Executes dropped EXE
PID:4912 -
C:\Windows\SysWOW64\Koodghnm.exeC:\Windows\system32\Koodghnm.exe65⤵
- Executes dropped EXE
PID:4920 -
C:\Windows\SysWOW64\Lfkiib32.exeC:\Windows\system32\Lfkiib32.exe66⤵
- Drops file in System32 directory
PID:1248 -
C:\Windows\SysWOW64\Lodnbg32.exeC:\Windows\system32\Lodnbg32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4020 -
C:\Windows\SysWOW64\Lbbjnc32.exeC:\Windows\system32\Lbbjnc32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\Lhlbkmph.exeC:\Windows\system32\Lhlbkmph.exe69⤵PID:2356
-
C:\Windows\SysWOW64\Lofjhg32.exeC:\Windows\system32\Lofjhg32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4824 -
C:\Windows\SysWOW64\Lfbpja32.exeC:\Windows\system32\Lfbpja32.exe71⤵PID:4636
-
C:\Windows\SysWOW64\Lialfl32.exeC:\Windows\system32\Lialfl32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1080 -
C:\Windows\SysWOW64\Lokdcfcp.exeC:\Windows\system32\Lokdcfcp.exe73⤵PID:3580
-
C:\Windows\SysWOW64\Momqhfam.exeC:\Windows\system32\Momqhfam.exe74⤵PID:4760
-
C:\Windows\SysWOW64\Mblmdaqq.exeC:\Windows\system32\Mblmdaqq.exe75⤵
- Drops file in System32 directory
PID:1448 -
C:\Windows\SysWOW64\Mieealhn.exeC:\Windows\system32\Mieealhn.exe76⤵PID:3888
-
C:\Windows\SysWOW64\Melffm32.exeC:\Windows\system32\Melffm32.exe77⤵PID:2260
-
C:\Windows\SysWOW64\Mndjobdb.exeC:\Windows\system32\Mndjobdb.exe78⤵
- Drops file in System32 directory
PID:228 -
C:\Windows\SysWOW64\Meoblllo.exeC:\Windows\system32\Meoblllo.exe79⤵PID:1196
-
C:\Windows\SysWOW64\Mfnofo32.exeC:\Windows\system32\Mfnofo32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:796 -
C:\Windows\SysWOW64\Mmhgbijo.exeC:\Windows\system32\Mmhgbijo.exe81⤵
- Modifies registry class
PID:740 -
C:\Windows\SysWOW64\Meclglhj.exeC:\Windows\system32\Meclglhj.exe82⤵PID:3792
-
C:\Windows\SysWOW64\Nkmdcfof.exeC:\Windows\system32\Nkmdcfof.exe83⤵PID:2004
-
C:\Windows\SysWOW64\Nbglpp32.exeC:\Windows\system32\Nbglpp32.exe84⤵PID:2016
-
C:\Windows\SysWOW64\Nefilk32.exeC:\Windows\system32\Nefilk32.exe85⤵PID:912
-
C:\Windows\SysWOW64\Nlpaiemd.exeC:\Windows\system32\Nlpaiemd.exe86⤵PID:4580
-
C:\Windows\SysWOW64\Nmomchdg.exeC:\Windows\system32\Nmomchdg.exe87⤵
- Drops file in System32 directory
PID:2520 -
C:\Windows\SysWOW64\Nifnhi32.exeC:\Windows\system32\Nifnhi32.exe88⤵PID:1936
-
C:\Windows\SysWOW64\Pmkffd32.exeC:\Windows\system32\Pmkffd32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4492 -
C:\Windows\SysWOW64\Pbhnnk32.exeC:\Windows\system32\Pbhnnk32.exe90⤵PID:4280
-
C:\Windows\SysWOW64\Qmnbkdjd.exeC:\Windows\system32\Qmnbkdjd.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4316 -
C:\Windows\SysWOW64\Qooocl32.exeC:\Windows\system32\Qooocl32.exe92⤵PID:3928
-
C:\Windows\SysWOW64\Qffgdj32.exeC:\Windows\system32\Qffgdj32.exe93⤵
- Modifies registry class
PID:4848 -
C:\Windows\SysWOW64\Qlcplq32.exeC:\Windows\system32\Qlcplq32.exe94⤵
- Modifies registry class
PID:5088 -
C:\Windows\SysWOW64\Aekdefel.exeC:\Windows\system32\Aekdefel.exe95⤵PID:2456
-
C:\Windows\SysWOW64\Apqhbo32.exeC:\Windows\system32\Apqhbo32.exe96⤵
- Modifies registry class
PID:1784 -
C:\Windows\SysWOW64\Agkqoilo.exeC:\Windows\system32\Agkqoilo.exe97⤵
- Drops file in System32 directory
- Modifies registry class
PID:772 -
C:\Windows\SysWOW64\Amdilc32.exeC:\Windows\system32\Amdilc32.exe98⤵
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\Apceho32.exeC:\Windows\system32\Apceho32.exe99⤵
- Modifies registry class
PID:5028 -
C:\Windows\SysWOW64\Aepmpe32.exeC:\Windows\system32\Aepmpe32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4428 -
C:\Windows\SysWOW64\Aljfmp32.exeC:\Windows\system32\Aljfmp32.exe101⤵
- Drops file in System32 directory
PID:2512 -
C:\Windows\SysWOW64\Aohbik32.exeC:\Windows\system32\Aohbik32.exe102⤵
- Modifies registry class
PID:4652 -
C:\Windows\SysWOW64\Amibgbpg.exeC:\Windows\system32\Amibgbpg.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3144 -
C:\Windows\SysWOW64\Aphncnoj.exeC:\Windows\system32\Aphncnoj.exe104⤵
- Drops file in System32 directory
PID:1400 -
C:\Windows\SysWOW64\Aedgkema.exeC:\Windows\system32\Aedgkema.exe105⤵PID:2424
-
C:\Windows\SysWOW64\Aomkdjcb.exeC:\Windows\system32\Aomkdjcb.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4032 -
C:\Windows\SysWOW64\Bibpacch.exeC:\Windows\system32\Bibpacch.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2940 -
C:\Windows\SysWOW64\Boohjjap.exeC:\Windows\system32\Boohjjap.exe108⤵
- Modifies registry class
PID:952 -
C:\Windows\SysWOW64\Beipfd32.exeC:\Windows\system32\Beipfd32.exe109⤵
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Bcmqphhf.exeC:\Windows\system32\Bcmqphhf.exe110⤵
- Modifies registry class
PID:1384 -
C:\Windows\SysWOW64\Bigimb32.exeC:\Windows\system32\Bigimb32.exe111⤵
- Modifies registry class
PID:3868 -
C:\Windows\SysWOW64\Bpaaimgp.exeC:\Windows\system32\Bpaaimgp.exe112⤵PID:1984
-
C:\Windows\SysWOW64\Bgkifg32.exeC:\Windows\system32\Bgkifg32.exe113⤵PID:3552
-
C:\Windows\SysWOW64\Bneacaei.exeC:\Windows\system32\Bneacaei.exe114⤵PID:4128
-
C:\Windows\SysWOW64\Bcbjkhdq.exeC:\Windows\system32\Bcbjkhdq.exe115⤵PID:4972
-
C:\Windows\SysWOW64\Bepfgc32.exeC:\Windows\system32\Bepfgc32.exe116⤵PID:5124
-
C:\Windows\SysWOW64\Bljodmja.exeC:\Windows\system32\Bljodmja.exe117⤵
- Drops file in System32 directory
PID:5144 -
C:\Windows\SysWOW64\Boikpiie.exeC:\Windows\system32\Boikpiie.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5160 -
C:\Windows\SysWOW64\Cgpcafjg.exeC:\Windows\system32\Cgpcafjg.exe119⤵PID:5180
-
C:\Windows\SysWOW64\Cjnomaik.exeC:\Windows\system32\Cjnomaik.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5224 -
C:\Windows\SysWOW64\Clmkimho.exeC:\Windows\system32\Clmkimho.exe121⤵PID:5264
-
C:\Windows\SysWOW64\Cgbpgf32.exeC:\Windows\system32\Cgbpgf32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5284
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-