Analysis
-
max time kernel
164s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe
Resource
win10v2004-20220812-en
General
-
Target
7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe
-
Size
50KB
-
MD5
b053b4e97e0b15725b0a11d823f85f50
-
SHA1
45f83ed9fd1e8274575fb5db680ecbee655b5662
-
SHA256
7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e
-
SHA512
bb98e03939ca5fdd4bfc31d128a22c94ff26a4ad29a9effb6da3729e312197bb653d9f08667fd341dd07a784349ea2051ee11e86cd60b722d66541351cde0f2b
-
SSDEEP
768:T4EpI2xCFURWO947coJKk4HlW3CX1x8KZTJuOrheRvr/TPLfzeDXr/Tn7Pj3LfzZ:TE+CFfm4IfHY3aASd9eRBMAXTwf
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jamhflqq.exeAohbbqme.exeEfeihb32.exeJklihbol.exeLqojclne.exeMqfpckhm.exeHmhphqoe.exeLdlmieaa.exeIkfabm32.exeMhbmphjm.exeAdapgfqj.exeJphkkpbp.exeJcfggkac.exeGphddlfp.exe7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exeKamjim32.exeEpmmqheb.exeJjpode32.exeLkhbko32.exeNblfee32.exePabkdmpi.exeFggocmhf.exeDmihij32.exeMelfpb32.exeBgkipl32.exeKklkkd32.exeObangb32.exeAnncek32.exeMmaakpfd.exeMmcnap32.exeEfkphnbd.exePgaelcgm.exeCkclfp32.exeNldjnk32.exeOfadlbhj.exeOcohmc32.exeOpeiadfg.exeEeimqc32.exeBichcc32.exeCcbaoc32.exeNaaghoik.exeAohfdnil.exeNpmjij32.exePcjapi32.exeFmcjpl32.exePbokab32.exeJpmlnjco.exeFimhjl32.exeFlpmagqi.exeMjlhgaqp.exeEihcln32.exeKlloichl.exeLlqhdb32.exeMnbnchlb.exeOcqnij32.exeFajgkfio.exeNfchjddj.exeEcjpfp32.exeGlajeiml.exeHanlcjgh.exeNopfpgip.exePkjegb32.exeJhpjbgne.exeEcpomiok.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jamhflqq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aohbbqme.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efeihb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jklihbol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lqojclne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mqfpckhm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmhphqoe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldlmieaa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikfabm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhbmphjm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adapgfqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jphkkpbp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcfggkac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gphddlfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kamjim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Epmmqheb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjpode32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkhbko32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nblfee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pabkdmpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fggocmhf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmihij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Melfpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgkipl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kklkkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obangb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anncek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmaakpfd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmcnap32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efkphnbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgaelcgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckclfp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nldjnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofadlbhj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocohmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Opeiadfg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eeimqc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bichcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccbaoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Naaghoik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aohfdnil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npmjij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcjapi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmcjpl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbokab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpmlnjco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fimhjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flpmagqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjlhgaqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eihcln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klloichl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llqhdb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnbnchlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ocqnij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fajgkfio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfchjddj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecjpfp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glajeiml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hanlcjgh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nopfpgip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkjegb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhpjbgne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecpomiok.exe -
Executes dropped EXE 64 IoCs
Processes:
Knmkgeim.exeJajdlpij.exeKgnbef32.exeKacgboap.exeKklkkd32.exeKddpdjoq.exeKamjim32.exeLgjbadgl.exeLpbgjj32.exeLglofdej.exeLnfgcn32.exeLhkkqgml.exeLoecma32.exeLdbleh32.exeLohpcq32.exeLddikg32.exeNnkiek32.exeNcgkcl32.exeNnmopdep.exeNdghmo32.exeOndeac32.exeOcqnij32.exeObangb32.exeOgogoi32.exeOqgkhnjf.exeObidhaog.exePcjapi32.exePnpemb32.exePghieg32.exePgjfkg32.exePabkdmpi.exeAelcfilb.exeAjiknpjj.exeAdapgfqj.exeAjkhdp32.exeAaepqjpd.exeFkcboack.exeGgcfja32.exeGdgfce32.exeGgeboaob.exeHgjljpkm.exeHfningai.exeIbkpcg32.exeIkfabm32.exeJeqbpb32.exeJnifigpa.exeJkodhk32.exeJpmlnjco.exeKelalp32.exeKpgodhkd.exeLhfmdj32.exeLifjnm32.exeLbchba32.exeMimpolee.exeMhbmphjm.exeMbjnbqhp.exeMhicpg32.exeNpchgdcd.exeNiklpj32.exeNedjjj32.exeAfelhf32.exeAihaoqlp.exeAijnep32.exeBqdblmhl.exepid process 5032 Knmkgeim.exe 3064 Jajdlpij.exe 2412 Kgnbef32.exe 1240 Kacgboap.exe 1364 Kklkkd32.exe 5108 Kddpdjoq.exe 4940 Kamjim32.exe 4092 Lgjbadgl.exe 5076 Lpbgjj32.exe 4740 Lglofdej.exe 3100 Lnfgcn32.exe 1116 Lhkkqgml.exe 3224 Loecma32.exe 1916 Ldbleh32.exe 3848 Lohpcq32.exe 2328 Lddikg32.exe 208 Nnkiek32.exe 4056 Ncgkcl32.exe 4352 Nnmopdep.exe 4268 Ndghmo32.exe 4368 Ondeac32.exe 1368 Ocqnij32.exe 4508 Obangb32.exe 2676 Ogogoi32.exe 2800 Oqgkhnjf.exe 5116 Obidhaog.exe 2056 Pcjapi32.exe 3508 Pnpemb32.exe 4604 Pghieg32.exe 1188 Pgjfkg32.exe 3700 Pabkdmpi.exe 1964 Aelcfilb.exe 4040 Ajiknpjj.exe 944 Adapgfqj.exe 2816 Ajkhdp32.exe 1688 Aaepqjpd.exe 2924 Fkcboack.exe 4912 Ggcfja32.exe 3676 Gdgfce32.exe 1160 Ggeboaob.exe 1520 Hgjljpkm.exe 60 Hfningai.exe 528 Ibkpcg32.exe 2112 Ikfabm32.exe 1524 Jeqbpb32.exe 4988 Jnifigpa.exe 736 Jkodhk32.exe 3340 Jpmlnjco.exe 740 Kelalp32.exe 2596 Kpgodhkd.exe 3596 Lhfmdj32.exe 4704 Lifjnm32.exe 3556 Lbchba32.exe 2028 Mimpolee.exe 3552 Mhbmphjm.exe 5084 Mbjnbqhp.exe 1708 Mhicpg32.exe 444 Npchgdcd.exe 1420 Niklpj32.exe 408 Nedjjj32.exe 4960 Afelhf32.exe 3152 Aihaoqlp.exe 3520 Aijnep32.exe 4840 Bqdblmhl.exe -
Drops file in System32 directory 64 IoCs
Processes:
Mmlhpaji.exeLohpcq32.exeJekqmhia.exeQhghge32.exeHejono32.exeKnfepldb.exeLfkich32.exeObidhaog.exeJljbeali.exeFbjena32.exeIkbfbdgf.exeKklbop32.exeEncgdbqd.exeHmginjki.exeLgjbadgl.exeNefmgogl.exeCqfahh32.exeJeqbpb32.exeEihcln32.exeBkepeaaa.exeDgqblp32.exeEnoddi32.exeJocefm32.exeDpgbgpbe.exeEcjpfp32.exeFjikeg32.exeMokdllim.exeDmiaig32.exeOgogoi32.exeJjpode32.exeOafacn32.exePgaelcgm.exeQhekaejj.exeEhifak32.exeGjmmfq32.exeLnfgcn32.exeNiklpj32.exeOpeiadfg.exeOioahn32.exeDjeegf32.exeDmhkoaco.exeJphkkpbp.exeIdkpmgjo.exePohnnqgo.exeLkmkfncf.exeCggikk32.exeEciilj32.exeGdmcki32.exeEgiohh32.exeGaibhj32.exeBcnleb32.exeNldjnk32.exeLpbgjj32.exeDdadpdmn.exeDnpdegjp.exeCbqonf32.exeOkaabg32.exeFlpmagqi.exeEghimo32.exeIejgelej.exeAmgekh32.exeKddpdjoq.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Mokdllim.exe Mmlhpaji.exe File created C:\Windows\SysWOW64\Lddikg32.exe Lohpcq32.exe File opened for modification C:\Windows\SysWOW64\Jocefm32.exe Jekqmhia.exe File created C:\Windows\SysWOW64\Afkipi32.exe Qhghge32.exe File created C:\Windows\SysWOW64\Hhhkjj32.exe Hejono32.exe File created C:\Windows\SysWOW64\Pabojh32.dll Knfepldb.exe File opened for modification C:\Windows\SysWOW64\Lhjeoc32.exe Lfkich32.exe File opened for modification C:\Windows\SysWOW64\Pcjapi32.exe Obidhaog.exe File created C:\Windows\SysWOW64\Jobfelii.dll Jljbeali.exe File opened for modification C:\Windows\SysWOW64\Gehbjm32.exe Fbjena32.exe File created C:\Windows\SysWOW64\Cpfoehnm.dll Ikbfbdgf.exe File created C:\Windows\SysWOW64\Kbfjljhf.exe Kklbop32.exe File opened for modification C:\Windows\SysWOW64\Eqbcqnph.exe Encgdbqd.exe File created C:\Windows\SysWOW64\Hdaajd32.exe Hmginjki.exe File created C:\Windows\SysWOW64\Gecpobhn.dll Lgjbadgl.exe File opened for modification C:\Windows\SysWOW64\Nkbfpeec.exe Nefmgogl.exe File opened for modification C:\Windows\SysWOW64\Ccendc32.exe Cqfahh32.exe File created C:\Windows\SysWOW64\Jnifigpa.exe Jeqbpb32.exe File opened for modification C:\Windows\SysWOW64\Afkipi32.exe Qhghge32.exe File created C:\Windows\SysWOW64\Olijkhjb.dll Eihcln32.exe File opened for modification C:\Windows\SysWOW64\Blflmj32.exe Bkepeaaa.exe File created C:\Windows\SysWOW64\Adbfel32.dll Dgqblp32.exe File created C:\Windows\SysWOW64\Ceeehf32.dll Enoddi32.exe File opened for modification C:\Windows\SysWOW64\Jenmcggo.exe Jocefm32.exe File opened for modification C:\Windows\SysWOW64\Dbfoclai.exe Dpgbgpbe.exe File created C:\Windows\SysWOW64\Ejdhcjpl.exe Ecjpfp32.exe File created C:\Windows\SysWOW64\Gaccbaeq.exe Fjikeg32.exe File opened for modification C:\Windows\SysWOW64\Mbiphhhq.exe Mokdllim.exe File opened for modification C:\Windows\SysWOW64\Dccjfaog.exe Dmiaig32.exe File created C:\Windows\SysWOW64\Oqgkhnjf.exe Ogogoi32.exe File created C:\Windows\SysWOW64\Lmjhab32.dll Jjpode32.exe File created C:\Windows\SysWOW64\Blpmkn32.dll Oafacn32.exe File created C:\Windows\SysWOW64\Oidfpeba.dll Pgaelcgm.exe File created C:\Windows\SysWOW64\Dnginbho.dll Qhekaejj.exe File created C:\Windows\SysWOW64\Eppobi32.exe Ehifak32.exe File created C:\Windows\SysWOW64\Caakehij.dll Gjmmfq32.exe File created C:\Windows\SysWOW64\Gopdphgb.dll Lnfgcn32.exe File created C:\Windows\SysWOW64\Menbeg32.dll Niklpj32.exe File created C:\Windows\SysWOW64\Ohlqcagj.exe Opeiadfg.exe File created C:\Windows\SysWOW64\Jcohej32.dll Oioahn32.exe File created C:\Windows\SysWOW64\Acnokeqm.dll Djeegf32.exe File created C:\Windows\SysWOW64\Dofgklcb.exe Dmhkoaco.exe File created C:\Windows\SysWOW64\Jcfggkac.exe Jphkkpbp.exe File created C:\Windows\SysWOW64\Ijjekn32.exe Idkpmgjo.exe File opened for modification C:\Windows\SysWOW64\Pkonbamc.exe Pohnnqgo.exe File opened for modification C:\Windows\SysWOW64\Lnkgbibj.exe Lkmkfncf.exe File opened for modification C:\Windows\SysWOW64\Djeegf32.exe Cggikk32.exe File opened for modification C:\Windows\SysWOW64\Efgehe32.exe Eciilj32.exe File opened for modification C:\Windows\SysWOW64\Hcbpme32.exe Gdmcki32.exe File opened for modification C:\Windows\SysWOW64\Eflocepa.exe Egiohh32.exe File created C:\Windows\SysWOW64\Gcgndf32.exe Gaibhj32.exe File opened for modification C:\Windows\SysWOW64\Bikeni32.exe Bcnleb32.exe File created C:\Windows\SysWOW64\Cabgompp.dll Nldjnk32.exe File opened for modification C:\Windows\SysWOW64\Lglofdej.exe Lpbgjj32.exe File created C:\Windows\SysWOW64\Laniklje.dll Ddadpdmn.exe File created C:\Windows\SysWOW64\Dfglfdkb.exe Dnpdegjp.exe File opened for modification C:\Windows\SysWOW64\Oddmoj32.exe Oafacn32.exe File created C:\Windows\SysWOW64\Dijgjpip.exe Cbqonf32.exe File created C:\Windows\SysWOW64\Jfnfmmnc.dll Okaabg32.exe File created C:\Windows\SysWOW64\Fbjena32.exe Flpmagqi.exe File created C:\Windows\SysWOW64\Pakaab32.dll Eghimo32.exe File opened for modification C:\Windows\SysWOW64\Ildpbfmf.exe Iejgelej.exe File opened for modification C:\Windows\SysWOW64\Aohbbqme.exe Amgekh32.exe File created C:\Windows\SysWOW64\Kamjim32.exe Kddpdjoq.exe -
Modifies registry class 64 IoCs
Processes:
Kdgcne32.exeAaepqjpd.exeDfoplpla.exePohnnqgo.exeGdgfce32.exeJcfggkac.exeKpcjgnhb.exeOgqmee32.exeEfjgpc32.exeEgjebn32.exeEppjfgcp.exeAbdfkj32.exeBipcei32.exeGablgk32.exeNhicoi32.exePkonbamc.exeCjcolm32.exeNldjnk32.exeJljbeali.exeLcnfohmi.exeAijeme32.exeDlbfmjqi.exeGilapgqb.exeQoocnpag.exeEppobi32.exeCdicje32.exeLkmkfncf.exeNnmopdep.exeLqkqhm32.exeOpeiadfg.exeDdjehneg.exeBcomonkq.exeIoeicajh.exeNmhglopl.exeDmennnni.exeAkjnnpcf.exeGgoaje32.exeDabhdinj.exeMfchlbfd.exeDpefaq32.exeAfkipi32.exeCldjkl32.exeEqmjen32.exeEfkphnbd.exeEiahnnph.exeEjdhcjpl.exeEfolidno.exeKpgodhkd.exeCqinng32.exeIldpbfmf.exePbokab32.exeAfboah32.exeNpmjij32.exeEncgdbqd.exeNdmgnkja.exeDblnid32.exeBgdjicmn.exeJliimf32.exeMmaakpfd.exeDmhkoaco.exeBghddp32.exeBikeni32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjjikjfk.dll" Kdgcne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhagfo32.dll" Aaepqjpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfoplpla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgniimhp.dll" Pohnnqgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gdgfce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcfggkac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpcjgnhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ogqmee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efjgpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egjebn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eppjfgcp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abdfkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bipcei32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gablgk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nhicoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjemgpnb.dll" Pkonbamc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjcolm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nldjnk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jljbeali.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clahmb32.dll" Lcnfohmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aijeme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ingkdn32.dll" Dlbfmjqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpgiggmj.dll" Gilapgqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qoocnpag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eppobi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdicje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkmkfncf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdknoa32.dll" Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lqkqhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afhgoj32.dll" Abdfkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Opeiadfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppbjhj32.dll" Ddjehneg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bcomonkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ioeicajh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmhglopl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmennnni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akjnnpcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ggoaje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eejlephc.dll" Dabhdinj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfchlbfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dpefaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afkipi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmlafe32.dll" Cldjkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eqmjen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efkphnbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eiahnnph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibojmejf.dll" Ejdhcjpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipndco32.dll" Efolidno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpgodhkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cqinng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ildpbfmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clqcll32.dll" Pbokab32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afboah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npmjij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Encgdbqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apqddgbj.dll" Ndmgnkja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naennejb.dll" Dblnid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdmkka32.dll" Bgdjicmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilaiaejg.dll" Jliimf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glagpmgi.dll" Mmaakpfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdhcea32.dll" Dmhkoaco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bghddp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bikeni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcacqeaf.dll" Nhicoi32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exeKnmkgeim.exeJajdlpij.exeKgnbef32.exeKacgboap.exeKklkkd32.exeKddpdjoq.exeKamjim32.exeLgjbadgl.exeLpbgjj32.exeLglofdej.exeLnfgcn32.exeLhkkqgml.exeLoecma32.exeLdbleh32.exeLohpcq32.exeLddikg32.exeNnkiek32.exeNcgkcl32.exeNnmopdep.exeNdghmo32.exeOndeac32.exedescription pid process target process PID 2580 wrote to memory of 5032 2580 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe Knmkgeim.exe PID 2580 wrote to memory of 5032 2580 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe Knmkgeim.exe PID 2580 wrote to memory of 5032 2580 7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe Knmkgeim.exe PID 5032 wrote to memory of 3064 5032 Knmkgeim.exe Jajdlpij.exe PID 5032 wrote to memory of 3064 5032 Knmkgeim.exe Jajdlpij.exe PID 5032 wrote to memory of 3064 5032 Knmkgeim.exe Jajdlpij.exe PID 3064 wrote to memory of 2412 3064 Jajdlpij.exe Kgnbef32.exe PID 3064 wrote to memory of 2412 3064 Jajdlpij.exe Kgnbef32.exe PID 3064 wrote to memory of 2412 3064 Jajdlpij.exe Kgnbef32.exe PID 2412 wrote to memory of 1240 2412 Kgnbef32.exe Kacgboap.exe PID 2412 wrote to memory of 1240 2412 Kgnbef32.exe Kacgboap.exe PID 2412 wrote to memory of 1240 2412 Kgnbef32.exe Kacgboap.exe PID 1240 wrote to memory of 1364 1240 Kacgboap.exe Kklkkd32.exe PID 1240 wrote to memory of 1364 1240 Kacgboap.exe Kklkkd32.exe PID 1240 wrote to memory of 1364 1240 Kacgboap.exe Kklkkd32.exe PID 1364 wrote to memory of 5108 1364 Kklkkd32.exe Kddpdjoq.exe PID 1364 wrote to memory of 5108 1364 Kklkkd32.exe Kddpdjoq.exe PID 1364 wrote to memory of 5108 1364 Kklkkd32.exe Kddpdjoq.exe PID 5108 wrote to memory of 4940 5108 Kddpdjoq.exe Kamjim32.exe PID 5108 wrote to memory of 4940 5108 Kddpdjoq.exe Kamjim32.exe PID 5108 wrote to memory of 4940 5108 Kddpdjoq.exe Kamjim32.exe PID 4940 wrote to memory of 4092 4940 Kamjim32.exe Lgjbadgl.exe PID 4940 wrote to memory of 4092 4940 Kamjim32.exe Lgjbadgl.exe PID 4940 wrote to memory of 4092 4940 Kamjim32.exe Lgjbadgl.exe PID 4092 wrote to memory of 5076 4092 Lgjbadgl.exe Lpbgjj32.exe PID 4092 wrote to memory of 5076 4092 Lgjbadgl.exe Lpbgjj32.exe PID 4092 wrote to memory of 5076 4092 Lgjbadgl.exe Lpbgjj32.exe PID 5076 wrote to memory of 4740 5076 Lpbgjj32.exe Lglofdej.exe PID 5076 wrote to memory of 4740 5076 Lpbgjj32.exe Lglofdej.exe PID 5076 wrote to memory of 4740 5076 Lpbgjj32.exe Lglofdej.exe PID 4740 wrote to memory of 3100 4740 Lglofdej.exe Lnfgcn32.exe PID 4740 wrote to memory of 3100 4740 Lglofdej.exe Lnfgcn32.exe PID 4740 wrote to memory of 3100 4740 Lglofdej.exe Lnfgcn32.exe PID 3100 wrote to memory of 1116 3100 Lnfgcn32.exe Lhkkqgml.exe PID 3100 wrote to memory of 1116 3100 Lnfgcn32.exe Lhkkqgml.exe PID 3100 wrote to memory of 1116 3100 Lnfgcn32.exe Lhkkqgml.exe PID 1116 wrote to memory of 3224 1116 Lhkkqgml.exe Loecma32.exe PID 1116 wrote to memory of 3224 1116 Lhkkqgml.exe Loecma32.exe PID 1116 wrote to memory of 3224 1116 Lhkkqgml.exe Loecma32.exe PID 3224 wrote to memory of 1916 3224 Loecma32.exe Ldbleh32.exe PID 3224 wrote to memory of 1916 3224 Loecma32.exe Ldbleh32.exe PID 3224 wrote to memory of 1916 3224 Loecma32.exe Ldbleh32.exe PID 1916 wrote to memory of 3848 1916 Ldbleh32.exe Lohpcq32.exe PID 1916 wrote to memory of 3848 1916 Ldbleh32.exe Lohpcq32.exe PID 1916 wrote to memory of 3848 1916 Ldbleh32.exe Lohpcq32.exe PID 3848 wrote to memory of 2328 3848 Lohpcq32.exe Lddikg32.exe PID 3848 wrote to memory of 2328 3848 Lohpcq32.exe Lddikg32.exe PID 3848 wrote to memory of 2328 3848 Lohpcq32.exe Lddikg32.exe PID 2328 wrote to memory of 208 2328 Lddikg32.exe Nnkiek32.exe PID 2328 wrote to memory of 208 2328 Lddikg32.exe Nnkiek32.exe PID 2328 wrote to memory of 208 2328 Lddikg32.exe Nnkiek32.exe PID 208 wrote to memory of 4056 208 Nnkiek32.exe Ncgkcl32.exe PID 208 wrote to memory of 4056 208 Nnkiek32.exe Ncgkcl32.exe PID 208 wrote to memory of 4056 208 Nnkiek32.exe Ncgkcl32.exe PID 4056 wrote to memory of 4352 4056 Ncgkcl32.exe Nnmopdep.exe PID 4056 wrote to memory of 4352 4056 Ncgkcl32.exe Nnmopdep.exe PID 4056 wrote to memory of 4352 4056 Ncgkcl32.exe Nnmopdep.exe PID 4352 wrote to memory of 4268 4352 Nnmopdep.exe Ndghmo32.exe PID 4352 wrote to memory of 4268 4352 Nnmopdep.exe Ndghmo32.exe PID 4352 wrote to memory of 4268 4352 Nnmopdep.exe Ndghmo32.exe PID 4268 wrote to memory of 4368 4268 Ndghmo32.exe Ondeac32.exe PID 4268 wrote to memory of 4368 4268 Ndghmo32.exe Ondeac32.exe PID 4268 wrote to memory of 4368 4268 Ndghmo32.exe Ondeac32.exe PID 4368 wrote to memory of 1368 4368 Ondeac32.exe Ocqnij32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe"C:\Users\Admin\AppData\Local\Temp\7a5bd9a19205c092e07546b9d59bb15542b66b0eced308eda58e5a41f39f648e.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\Knmkgeim.exeC:\Windows\system32\Knmkgeim.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\Jajdlpij.exeC:\Windows\system32\Jajdlpij.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\Kgnbef32.exeC:\Windows\system32\Kgnbef32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\Kacgboap.exeC:\Windows\system32\Kacgboap.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\Kklkkd32.exeC:\Windows\system32\Kklkkd32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\Kddpdjoq.exeC:\Windows\system32\Kddpdjoq.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\Kamjim32.exeC:\Windows\system32\Kamjim32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\Lgjbadgl.exeC:\Windows\system32\Lgjbadgl.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\Lpbgjj32.exeC:\Windows\system32\Lpbgjj32.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\Lglofdej.exeC:\Windows\system32\Lglofdej.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\Lnfgcn32.exeC:\Windows\system32\Lnfgcn32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\Lhkkqgml.exeC:\Windows\system32\Lhkkqgml.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\Loecma32.exeC:\Windows\system32\Loecma32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\Ldbleh32.exeC:\Windows\system32\Ldbleh32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\Lohpcq32.exeC:\Windows\system32\Lohpcq32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\Lddikg32.exeC:\Windows\system32\Lddikg32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\Nnkiek32.exeC:\Windows\system32\Nnkiek32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\Ndghmo32.exeC:\Windows\system32\Ndghmo32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\Ondeac32.exeC:\Windows\system32\Ondeac32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\Ocqnij32.exeC:\Windows\system32\Ocqnij32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1368 -
C:\Windows\SysWOW64\Obangb32.exeC:\Windows\system32\Obangb32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\Ogogoi32.exeC:\Windows\system32\Ogogoi32.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2676 -
C:\Windows\SysWOW64\Oqgkhnjf.exeC:\Windows\system32\Oqgkhnjf.exe26⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Obidhaog.exeC:\Windows\system32\Obidhaog.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5116 -
C:\Windows\SysWOW64\Pcjapi32.exeC:\Windows\system32\Pcjapi32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\Pnpemb32.exeC:\Windows\system32\Pnpemb32.exe29⤵
- Executes dropped EXE
PID:3508 -
C:\Windows\SysWOW64\Pghieg32.exeC:\Windows\system32\Pghieg32.exe30⤵
- Executes dropped EXE
PID:4604 -
C:\Windows\SysWOW64\Pgjfkg32.exeC:\Windows\system32\Pgjfkg32.exe31⤵
- Executes dropped EXE
PID:1188 -
C:\Windows\SysWOW64\Pabkdmpi.exeC:\Windows\system32\Pabkdmpi.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3700 -
C:\Windows\SysWOW64\Aelcfilb.exeC:\Windows\system32\Aelcfilb.exe33⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\Ajiknpjj.exeC:\Windows\system32\Ajiknpjj.exe34⤵
- Executes dropped EXE
PID:4040 -
C:\Windows\SysWOW64\Adapgfqj.exeC:\Windows\system32\Adapgfqj.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:944 -
C:\Windows\SysWOW64\Ajkhdp32.exeC:\Windows\system32\Ajkhdp32.exe36⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\Aaepqjpd.exeC:\Windows\system32\Aaepqjpd.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Fkcboack.exeC:\Windows\system32\Fkcboack.exe38⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\SysWOW64\Ggcfja32.exeC:\Windows\system32\Ggcfja32.exe39⤵
- Executes dropped EXE
PID:4912 -
C:\Windows\SysWOW64\Gdgfce32.exeC:\Windows\system32\Gdgfce32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:3676 -
C:\Windows\SysWOW64\Ggeboaob.exeC:\Windows\system32\Ggeboaob.exe41⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\Hgjljpkm.exeC:\Windows\system32\Hgjljpkm.exe42⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\Hfningai.exeC:\Windows\system32\Hfningai.exe43⤵
- Executes dropped EXE
PID:60 -
C:\Windows\SysWOW64\Ibkpcg32.exeC:\Windows\system32\Ibkpcg32.exe44⤵
- Executes dropped EXE
PID:528 -
C:\Windows\SysWOW64\Ikfabm32.exeC:\Windows\system32\Ikfabm32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2112 -
C:\Windows\SysWOW64\Jeqbpb32.exeC:\Windows\system32\Jeqbpb32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1524 -
C:\Windows\SysWOW64\Jnifigpa.exeC:\Windows\system32\Jnifigpa.exe47⤵
- Executes dropped EXE
PID:4988 -
C:\Windows\SysWOW64\Jkodhk32.exeC:\Windows\system32\Jkodhk32.exe48⤵
- Executes dropped EXE
PID:736 -
C:\Windows\SysWOW64\Jpmlnjco.exeC:\Windows\system32\Jpmlnjco.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3340 -
C:\Windows\SysWOW64\Kelalp32.exeC:\Windows\system32\Kelalp32.exe50⤵
- Executes dropped EXE
PID:740 -
C:\Windows\SysWOW64\Kpgodhkd.exeC:\Windows\system32\Kpgodhkd.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:2596 -
C:\Windows\SysWOW64\Lhfmdj32.exeC:\Windows\system32\Lhfmdj32.exe52⤵
- Executes dropped EXE
PID:3596 -
C:\Windows\SysWOW64\Lifjnm32.exeC:\Windows\system32\Lifjnm32.exe53⤵
- Executes dropped EXE
PID:4704 -
C:\Windows\SysWOW64\Lbchba32.exeC:\Windows\system32\Lbchba32.exe54⤵
- Executes dropped EXE
PID:3556 -
C:\Windows\SysWOW64\Mimpolee.exeC:\Windows\system32\Mimpolee.exe55⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Mhbmphjm.exeC:\Windows\system32\Mhbmphjm.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3552 -
C:\Windows\SysWOW64\Mbjnbqhp.exeC:\Windows\system32\Mbjnbqhp.exe57⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\Mhicpg32.exeC:\Windows\system32\Mhicpg32.exe58⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SysWOW64\Npchgdcd.exeC:\Windows\system32\Npchgdcd.exe59⤵
- Executes dropped EXE
PID:444 -
C:\Windows\SysWOW64\Niklpj32.exeC:\Windows\system32\Niklpj32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1420 -
C:\Windows\SysWOW64\Nedjjj32.exeC:\Windows\system32\Nedjjj32.exe61⤵
- Executes dropped EXE
PID:408 -
C:\Windows\SysWOW64\Afelhf32.exeC:\Windows\system32\Afelhf32.exe62⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\Aihaoqlp.exeC:\Windows\system32\Aihaoqlp.exe63⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\SysWOW64\Aijnep32.exeC:\Windows\system32\Aijnep32.exe64⤵
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\Bqdblmhl.exeC:\Windows\system32\Bqdblmhl.exe65⤵
- Executes dropped EXE
PID:4840 -
C:\Windows\SysWOW64\Bmkcqn32.exeC:\Windows\system32\Bmkcqn32.exe66⤵PID:1028
-
C:\Windows\SysWOW64\Bfchidda.exeC:\Windows\system32\Bfchidda.exe67⤵PID:2684
-
C:\Windows\SysWOW64\Boklbi32.exeC:\Windows\system32\Boklbi32.exe68⤵PID:5040
-
C:\Windows\SysWOW64\Dgejpd32.exeC:\Windows\system32\Dgejpd32.exe69⤵PID:4532
-
C:\Windows\SysWOW64\Dpqodfij.exeC:\Windows\system32\Dpqodfij.exe70⤵PID:1976
-
C:\Windows\SysWOW64\Dfjgaq32.exeC:\Windows\system32\Dfjgaq32.exe71⤵PID:3196
-
C:\Windows\SysWOW64\Dapkni32.exeC:\Windows\system32\Dapkni32.exe72⤵PID:4228
-
C:\Windows\SysWOW64\Dabhdinj.exeC:\Windows\system32\Dabhdinj.exe73⤵
- Modifies registry class
PID:3236 -
C:\Windows\SysWOW64\Ddadpdmn.exeC:\Windows\system32\Ddadpdmn.exe74⤵
- Drops file in System32 directory
PID:4072 -
C:\Windows\SysWOW64\Dfoplpla.exeC:\Windows\system32\Dfoplpla.exe75⤵
- Modifies registry class
PID:1396 -
C:\Windows\SysWOW64\Dmihij32.exeC:\Windows\system32\Dmihij32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2228 -
C:\Windows\SysWOW64\Eplnpeol.exeC:\Windows\system32\Eplnpeol.exe77⤵PID:3548
-
C:\Windows\SysWOW64\Ejbbmnnb.exeC:\Windows\system32\Ejbbmnnb.exe78⤵PID:1256
-
C:\Windows\SysWOW64\Empoiimf.exeC:\Windows\system32\Empoiimf.exe79⤵PID:3564
-
C:\Windows\SysWOW64\Ehfcfb32.exeC:\Windows\system32\Ehfcfb32.exe80⤵PID:3432
-
C:\Windows\SysWOW64\Embkoi32.exeC:\Windows\system32\Embkoi32.exe81⤵PID:4620
-
C:\Windows\SysWOW64\Efkphnbd.exeC:\Windows\system32\Efkphnbd.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3352 -
C:\Windows\SysWOW64\Fajgkfio.exeC:\Windows\system32\Fajgkfio.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2060 -
C:\Windows\SysWOW64\Fdhcgaic.exeC:\Windows\system32\Fdhcgaic.exe84⤵PID:1972
-
C:\Windows\SysWOW64\Fggocmhf.exeC:\Windows\system32\Fggocmhf.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3252 -
C:\Windows\SysWOW64\Fmqgpgoc.exeC:\Windows\system32\Fmqgpgoc.exe86⤵PID:2044
-
C:\Windows\SysWOW64\Fdkpma32.exeC:\Windows\system32\Fdkpma32.exe87⤵PID:2380
-
C:\Windows\SysWOW64\Gigheh32.exeC:\Windows\system32\Gigheh32.exe88⤵PID:4680
-
C:\Windows\SysWOW64\Gpaqbbld.exeC:\Windows\system32\Gpaqbbld.exe89⤵PID:2184
-
C:\Windows\SysWOW64\Gdmmbq32.exeC:\Windows\system32\Gdmmbq32.exe90⤵PID:332
-
C:\Windows\SysWOW64\Gkgeoklj.exeC:\Windows\system32\Gkgeoklj.exe91⤵PID:1580
-
C:\Windows\SysWOW64\Gaamlecg.exeC:\Windows\system32\Gaamlecg.exe92⤵PID:1312
-
C:\Windows\SysWOW64\Ggnedlao.exeC:\Windows\system32\Ggnedlao.exe93⤵PID:4744
-
C:\Windows\SysWOW64\Gilapgqb.exeC:\Windows\system32\Gilapgqb.exe94⤵
- Modifies registry class
PID:4892 -
C:\Windows\SysWOW64\Hpdfnolo.exeC:\Windows\system32\Hpdfnolo.exe95⤵PID:2604
-
C:\Windows\SysWOW64\Hhknpmma.exeC:\Windows\system32\Hhknpmma.exe96⤵PID:2868
-
C:\Windows\SysWOW64\Hkjjlhle.exeC:\Windows\system32\Hkjjlhle.exe97⤵PID:1060
-
C:\Windows\SysWOW64\Hacbhb32.exeC:\Windows\system32\Hacbhb32.exe98⤵PID:4920
-
C:\Windows\SysWOW64\Cfbcke32.exeC:\Windows\system32\Cfbcke32.exe99⤵PID:1140
-
C:\Windows\SysWOW64\Dnpdegjp.exeC:\Windows\system32\Dnpdegjp.exe100⤵
- Drops file in System32 directory
PID:976 -
C:\Windows\SysWOW64\Dfglfdkb.exeC:\Windows\system32\Dfglfdkb.exe101⤵PID:4944
-
C:\Windows\SysWOW64\Dnbakghm.exeC:\Windows\system32\Dnbakghm.exe102⤵PID:1584
-
C:\Windows\SysWOW64\Doaneiop.exeC:\Windows\system32\Doaneiop.exe103⤵PID:4252
-
C:\Windows\SysWOW64\Dmennnni.exeC:\Windows\system32\Dmennnni.exe104⤵
- Modifies registry class
PID:4536 -
C:\Windows\SysWOW64\Eiloco32.exeC:\Windows\system32\Eiloco32.exe105⤵PID:4872
-
C:\Windows\SysWOW64\Enigke32.exeC:\Windows\system32\Enigke32.exe106⤵PID:3104
-
C:\Windows\SysWOW64\Eoideh32.exeC:\Windows\system32\Eoideh32.exe107⤵PID:2232
-
C:\Windows\SysWOW64\Eiahnnph.exeC:\Windows\system32\Eiahnnph.exe108⤵
- Modifies registry class
PID:4588 -
C:\Windows\SysWOW64\Efeihb32.exeC:\Windows\system32\Efeihb32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:788 -
C:\Windows\SysWOW64\Eicedn32.exeC:\Windows\system32\Eicedn32.exe110⤵PID:5108
-
C:\Windows\SysWOW64\Epmmqheb.exeC:\Windows\system32\Epmmqheb.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4644 -
C:\Windows\SysWOW64\Eejeiocj.exeC:\Windows\system32\Eejeiocj.exe112⤵PID:1556
-
C:\Windows\SysWOW64\Emanjldl.exeC:\Windows\system32\Emanjldl.exe113⤵PID:1720
-
C:\Windows\SysWOW64\Eppjfgcp.exeC:\Windows\system32\Eppjfgcp.exe114⤵
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Fmcjpl32.exeC:\Windows\system32\Fmcjpl32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2620 -
C:\Windows\SysWOW64\Fijkdmhn.exeC:\Windows\system32\Fijkdmhn.exe116⤵PID:3848
-
C:\Windows\SysWOW64\Fligqhga.exeC:\Windows\system32\Fligqhga.exe117⤵PID:4048
-
C:\Windows\SysWOW64\Fngcmcfe.exeC:\Windows\system32\Fngcmcfe.exe118⤵PID:4144
-
C:\Windows\SysWOW64\Fimhjl32.exeC:\Windows\system32\Fimhjl32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4884 -
C:\Windows\SysWOW64\Fmkqpkla.exeC:\Windows\system32\Fmkqpkla.exe120⤵PID:1864
-
C:\Windows\SysWOW64\Fiaael32.exeC:\Windows\system32\Fiaael32.exe121⤵PID:4520
-
C:\Windows\SysWOW64\Flpmagqi.exeC:\Windows\system32\Flpmagqi.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-