Analysis
-
max time kernel
151s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 08:58
Static task
static1
Behavioral task
behavioral1
Sample
62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe
Resource
win10v2004-20221111-en
General
-
Target
62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe
-
Size
50KB
-
MD5
a4ebdf5e0acd62a0e53c0fc226b6eeb0
-
SHA1
46a00b667ad34a6370f063881ecdad4e0efa7173
-
SHA256
62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3
-
SHA512
8dec33a36dd4830f5ac8f74a7e7295bccdb1a0e06063325ac3b6d95637ccdd21e3489495a8ebc00dd7d1ca8373026788c9d0cd26f97181e6086151aa41d744db
-
SSDEEP
768:g/KHOcZ2/3BlrKiQixpFvBgNY3MCiTDVF5yUhIz7zWn169lfy5WzKr9UxmTq6K9U:gncZc3BlrKXi4mlNmUATqhGHEm3
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Pcpikkge.exeEppjfgcp.exeEncgkmkg.exeNdflak32.exeOeheqm32.exeCbfgkffn.exeEfpomccg.exeEoideh32.exeGbdoof32.exeCjnomaik.exeEcblic32.exeNijeec32.exeDhclmp32.exeEmhkdmlg.exeEblimcdf.exeChnlgjlb.exeAebjfeod.exeDoaneiop.exeFndpbjmd.exeOlanmgig.exeOjigdcll.exeCdpjlb32.exeOpglebkp.exeGmkihfpi.exeChlflabp.exeDmcain32.exeEbgpad32.exeEnnqfenp.exeDkndie32.exeOpiikbim.exeGceaeq32.exeOanfen32.exeCklhcfle.exePocpfphe.exeDfdpad32.exeIakaql32.exePaoollik.exeBcbjkhdq.exeAgmmeijl.exeEmanjldl.exeOblobm32.exeOiandh32.exeFqiihgdb.exeNgpjnkpf.exeOedeniig.exeNqiogp32.exeFfgqqaip.exeDojqjdbl.exeBnphha32.exeDfeiip32.exeEggbic32.exeNnjbke32.exeNnicid32.exeAlgigpkf.exeDbkqfe32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcpikkge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eppjfgcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Encgkmkg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndflak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oeheqm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbfgkffn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efpomccg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eoideh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbdoof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjnomaik.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecblic32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nijeec32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhclmp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emhkdmlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eblimcdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chnlgjlb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aebjfeod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doaneiop.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fndpbjmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Olanmgig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojigdcll.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdpjlb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Opglebkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmkihfpi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chlflabp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmcain32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebgpad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ennqfenp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkndie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opiikbim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gceaeq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oanfen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cklhcfle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecblic32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olanmgig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pocpfphe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfdpad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iakaql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Paoollik.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcbjkhdq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agmmeijl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fndpbjmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndflak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhclmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emanjldl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oblobm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oiandh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqiihgdb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngpjnkpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emhkdmlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oedeniig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqiogp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqiogp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffgqqaip.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebgpad32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dojqjdbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnphha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nijeec32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfeiip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eggbic32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnjbke32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnicid32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Algigpkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbkqfe32.exe -
Executes dropped EXE 64 IoCs
Processes:
Nnecfpfp.exeOpdppc32.exeObclln32.exeOpglebkp.exeOedeniig.exeOpiikbim.exeOiandh32.exeOblobm32.exePmbcpf32.exePlgpqb32.exePmkffd32.exeQmnbkdjd.exeAmblfc32.exeApqhbo32.exeAenqkf32.exeAlgigpkf.exeAgmmeijl.exeAljfmp32.exeAebjfeod.exeAllbbo32.exeAipclc32.exeBmnlbb32.exeBnphha32.exeBiifbb32.exeBcbjkhdq.exeBpfkdl32.exeCjnomaik.exeCgbpgf32.exeCnqaoo32.exeCgifgebl.exeCjgbcpap.exeCqajpj32.exeDlhkek32.exeDnhgoned.exeDjohdo32.exeDokqlfip.exeDfeiip32.exeDmoafjhi.exeDgeeccho.exeDnompm32.exeEopjge32.exeEggbic32.exeEnajemmi.exeEgionb32.exeEncgkmkg.exeEcpocc32.exeEnfcql32.exeEcblic32.exeEjmdemoh.exeEoimndmp.exeEjoakm32.exeFqiihgdb.exeFcgedbcf.exeFmpjmh32.exeFfhnen32.exeFpqcncgg.exeFmdchgfa.exeFndpbjmd.exeGnfmgjka.exeGmkihfpi.exeGceaeq32.exeGnkfbi32.exeGplbjamj.exeIakaql32.exepid process 4300 Nnecfpfp.exe 3284 Opdppc32.exe 4272 Obclln32.exe 2732 Opglebkp.exe 5084 Oedeniig.exe 4524 Opiikbim.exe 2864 Oiandh32.exe 4304 Oblobm32.exe 4584 Pmbcpf32.exe 1612 Plgpqb32.exe 1804 Pmkffd32.exe 2088 Qmnbkdjd.exe 3076 Amblfc32.exe 1268 Apqhbo32.exe 3880 Aenqkf32.exe 4680 Algigpkf.exe 1956 Agmmeijl.exe 2112 Aljfmp32.exe 4872 Aebjfeod.exe 3928 Allbbo32.exe 3460 Aipclc32.exe 3668 Bmnlbb32.exe 3548 Bnphha32.exe 1376 Biifbb32.exe 3384 Bcbjkhdq.exe 804 Bpfkdl32.exe 5004 Cjnomaik.exe 4868 Cgbpgf32.exe 3576 Cnqaoo32.exe 1468 Cgifgebl.exe 3136 Cjgbcpap.exe 3832 Cqajpj32.exe 4636 Dlhkek32.exe 1132 Dnhgoned.exe 1316 Djohdo32.exe 636 Dokqlfip.exe 4588 Dfeiip32.exe 1112 Dmoafjhi.exe 4748 Dgeeccho.exe 3692 Dnompm32.exe 4308 Eopjge32.exe 3192 Eggbic32.exe 3508 Enajemmi.exe 3040 Egionb32.exe 2256 Encgkmkg.exe 388 Ecpocc32.exe 3816 Enfcql32.exe 1544 Ecblic32.exe 3208 Ejmdemoh.exe 4312 Eoimndmp.exe 4336 Ejoakm32.exe 1752 Fqiihgdb.exe 1632 Fcgedbcf.exe 2328 Fmpjmh32.exe 3636 Ffhnen32.exe 4076 Fpqcncgg.exe 216 Fmdchgfa.exe 5100 Fndpbjmd.exe 4516 Gnfmgjka.exe 444 Gmkihfpi.exe 4608 Gceaeq32.exe 1556 Gnkfbi32.exe 1988 Gplbjamj.exe 2184 Iakaql32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Aenqkf32.exeCgifgebl.exeDokqlfip.exeEggbic32.exeEoimndmp.exeEjoakm32.exeQaalblgi.exeEpmmqheb.exeEmanjldl.exeOblobm32.exeEnfcql32.exeGmkihfpi.exePaoollik.exeEoideh32.exeDdgibkpc.exeCjgbcpap.exeGnkfbi32.exeNddkgonp.exeFkciihgg.exeDkndie32.exeNnecfpfp.exeOpiikbim.exeDmoafjhi.exeEcblic32.exeEblimcdf.exeCogddd32.exeDlhkek32.exeEnajemmi.exeGplbjamj.exeOanfen32.exeDojqjdbl.exeAmblfc32.exeAebjfeod.exeBnphha32.exeBpfkdl32.exeFqiihgdb.exeIakaql32.exeNijeec32.exeNnicid32.exeDngjff32.exeEecphp32.exeOedeniig.exeBcbjkhdq.exeCgbpgf32.exeDmcain32.exeEicedn32.exeAllbbo32.exeBiifbb32.exeDfeiip32.exeFcgedbcf.exeCkmonl32.exeCklhcfle.exeAlgigpkf.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Algigpkf.exe Aenqkf32.exe File created C:\Windows\SysWOW64\Jeeanmoj.dll Cgifgebl.exe File opened for modification C:\Windows\SysWOW64\Dfeiip32.exe Dokqlfip.exe File created C:\Windows\SysWOW64\Enajemmi.exe Eggbic32.exe File created C:\Windows\SysWOW64\Afqmfp32.dll Eoimndmp.exe File created C:\Windows\SysWOW64\Fqiihgdb.exe Ejoakm32.exe File created C:\Windows\SysWOW64\Jiibaffb.dll Qaalblgi.exe File created C:\Windows\SysWOW64\Eblimcdf.exe Epmmqheb.exe File opened for modification C:\Windows\SysWOW64\Eppjfgcp.exe Emanjldl.exe File created C:\Windows\SysWOW64\Pmbcpf32.exe Oblobm32.exe File created C:\Windows\SysWOW64\Cjcndcoh.dll Enfcql32.exe File created C:\Windows\SysWOW64\Gceaeq32.exe Gmkihfpi.exe File created C:\Windows\SysWOW64\Phigif32.exe Paoollik.exe File created C:\Windows\SysWOW64\Ebgpad32.exe Eoideh32.exe File opened for modification C:\Windows\SysWOW64\Dkqaoe32.exe Ddgibkpc.exe File created C:\Windows\SysWOW64\Odkmipbk.dll Cjgbcpap.exe File opened for modification C:\Windows\SysWOW64\Gplbjamj.exe Gnkfbi32.exe File opened for modification C:\Windows\SysWOW64\Fomhdg32.exe Nddkgonp.exe File created C:\Windows\SysWOW64\Ffimfqgm.exe Fkciihgg.exe File opened for modification C:\Windows\SysWOW64\Cdpjlb32.exe Qaalblgi.exe File created C:\Windows\SysWOW64\Dllfqd32.dll Dkndie32.exe File opened for modification C:\Windows\SysWOW64\Opdppc32.exe Nnecfpfp.exe File created C:\Windows\SysWOW64\Dcaock32.dll Opiikbim.exe File created C:\Windows\SysWOW64\Epalclhk.dll Dmoafjhi.exe File created C:\Windows\SysWOW64\Ejmdemoh.exe Ecblic32.exe File opened for modification C:\Windows\SysWOW64\Efgemb32.exe Eblimcdf.exe File created C:\Windows\SysWOW64\Ekppjn32.dll Cogddd32.exe File created C:\Windows\SysWOW64\Qccoeglp.dll Dlhkek32.exe File opened for modification C:\Windows\SysWOW64\Egionb32.exe Enajemmi.exe File opened for modification C:\Windows\SysWOW64\Iakaql32.exe Gplbjamj.exe File opened for modification C:\Windows\SysWOW64\Ohhnbhok.exe Oanfen32.exe File created C:\Windows\SysWOW64\Kcmgob32.dll Eoideh32.exe File created C:\Windows\SysWOW64\Jipegn32.dll Eblimcdf.exe File created C:\Windows\SysWOW64\Ddgibkpc.exe Dojqjdbl.exe File opened for modification C:\Windows\SysWOW64\Apqhbo32.exe Amblfc32.exe File opened for modification C:\Windows\SysWOW64\Allbbo32.exe Aebjfeod.exe File opened for modification C:\Windows\SysWOW64\Biifbb32.exe Bnphha32.exe File created C:\Windows\SysWOW64\Jiljnjgl.dll Bpfkdl32.exe File created C:\Windows\SysWOW64\Fcgedbcf.exe Fqiihgdb.exe File created C:\Windows\SysWOW64\Khpbll32.dll Fqiihgdb.exe File created C:\Windows\SysWOW64\Nacbfdao.exe Iakaql32.exe File created C:\Windows\SysWOW64\Plkcijka.dll Nijeec32.exe File created C:\Windows\SysWOW64\Fpkefnho.dll Nnicid32.exe File opened for modification C:\Windows\SysWOW64\Eiloco32.exe Dngjff32.exe File opened for modification C:\Windows\SysWOW64\Eoideh32.exe Eecphp32.exe File opened for modification C:\Windows\SysWOW64\Dhphmj32.exe Cogddd32.exe File opened for modification C:\Windows\SysWOW64\Opiikbim.exe Oedeniig.exe File created C:\Windows\SysWOW64\Hjgnplon.dll Bcbjkhdq.exe File opened for modification C:\Windows\SysWOW64\Cnqaoo32.exe Cgbpgf32.exe File created C:\Windows\SysWOW64\Ecblic32.exe Enfcql32.exe File created C:\Windows\SysWOW64\Ilchfdgp.dll Dmcain32.exe File opened for modification C:\Windows\SysWOW64\Epmmqheb.exe Eicedn32.exe File created C:\Windows\SysWOW64\Ljjbpapp.dll Oblobm32.exe File created C:\Windows\SysWOW64\Heodcg32.dll Allbbo32.exe File opened for modification C:\Windows\SysWOW64\Bcbjkhdq.exe Biifbb32.exe File created C:\Windows\SysWOW64\Pihldhaa.dll Dfeiip32.exe File created C:\Windows\SysWOW64\Dgeeccho.exe Dmoafjhi.exe File opened for modification C:\Windows\SysWOW64\Fmpjmh32.exe Fcgedbcf.exe File created C:\Windows\SysWOW64\Ffjlpoob.dll Gmkihfpi.exe File created C:\Windows\SysWOW64\Cbfgkffn.exe Ckmonl32.exe File created C:\Windows\SysWOW64\Cogddd32.exe Cklhcfle.exe File created C:\Windows\SysWOW64\Dkqaoe32.exe Ddgibkpc.exe File created C:\Windows\SysWOW64\Agmmeijl.exe Algigpkf.exe File created C:\Windows\SysWOW64\Cjgbcpap.exe Cgifgebl.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4688 4648 WerFault.exe Dkqaoe32.exe -
Modifies registry class 64 IoCs
Processes:
Eecphp32.exeCklhcfle.exeDojqjdbl.exeObclln32.exeOiandh32.exeNacbfdao.exeFomhdg32.exeOhhnbhok.exeNijeec32.exeOaqbkn32.exeDoaneiop.exeEggbic32.exeEgionb32.exeGceaeq32.exeNddkgonp.exeDmcain32.exeEoideh32.exeEnnqfenp.exeFkciihgg.exeFfimfqgm.exePcpikkge.exeNnicid32.exeAllbbo32.exeBmnlbb32.exeBiifbb32.exeGmkihfpi.exeEncgkmkg.exeDbkqfe32.exeOblobm32.exePmkffd32.exeApqhbo32.exeDokqlfip.exeDgeeccho.exeChnbbqpn.exeEicedn32.exeEcpocc32.exeEjoakm32.exeOjigdcll.exeCofnik32.exeDnompm32.exeCgifgebl.exeCjgbcpap.exeDnhgoned.exeDfeiip32.exeOanfen32.exeChlflabp.exeDhclmp32.exeEmhkdmlg.exeEfgemb32.exePmbcpf32.exeAgmmeijl.exeAipclc32.exeCqajpj32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eecphp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cklhcfle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nchkcb32.dll" Dojqjdbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhmbidgl.dll" Obclln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhbfnida.dll" Oiandh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nacbfdao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fomhdg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ohhnbhok.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nijeec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oaqbkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Doaneiop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eggbic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmqpmi32.dll" Egionb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmgamf32.dll" Gceaeq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nddkgonp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knkffk32.dll" Fomhdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eggbic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmcain32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcmgob32.dll" Eoideh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ennqfenp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhclbphg.dll" Fkciihgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffimfqgm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcpikkge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nijeec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnicid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Heodcg32.dll" Allbbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jojgmdbj.dll" Bmnlbb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Biifbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gmkihfpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpmhce32.dll" Eecphp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Encgkmkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbkqfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dbkqfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljjbpapp.dll" Oblobm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkmmbg32.dll" Pmkffd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apqhbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldbbpg32.dll" Dokqlfip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fodlep32.dll" Dgeeccho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chnbbqpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eicedn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jebjhg32.dll" Ecpocc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejoakm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlhblb32.dll" Nacbfdao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofonqd32.dll" Ojigdcll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cofnik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnompm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gmkihfpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffjlpoob.dll" Gmkihfpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jeeanmoj.dll" Cgifgebl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjgbcpap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phnppmna.dll" Dnhgoned.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dokqlfip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfeiip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnicid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oanfen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Micgbemj.dll" Chlflabp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ankkea32.dll" Ennqfenp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhclmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emhkdmlg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efgemb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmbcpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfgahp32.dll" Agmmeijl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aipclc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cqajpj32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exeNnecfpfp.exeOpdppc32.exeObclln32.exeOpglebkp.exeOedeniig.exeOpiikbim.exeOiandh32.exeOblobm32.exePmbcpf32.exePlgpqb32.exePmkffd32.exeQmnbkdjd.exeAmblfc32.exeApqhbo32.exeAenqkf32.exeAlgigpkf.exeAgmmeijl.exeAljfmp32.exeAebjfeod.exeAllbbo32.exeAipclc32.exedescription pid process target process PID 4292 wrote to memory of 4300 4292 62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe Nnecfpfp.exe PID 4292 wrote to memory of 4300 4292 62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe Nnecfpfp.exe PID 4292 wrote to memory of 4300 4292 62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe Nnecfpfp.exe PID 4300 wrote to memory of 3284 4300 Nnecfpfp.exe Opdppc32.exe PID 4300 wrote to memory of 3284 4300 Nnecfpfp.exe Opdppc32.exe PID 4300 wrote to memory of 3284 4300 Nnecfpfp.exe Opdppc32.exe PID 3284 wrote to memory of 4272 3284 Opdppc32.exe Obclln32.exe PID 3284 wrote to memory of 4272 3284 Opdppc32.exe Obclln32.exe PID 3284 wrote to memory of 4272 3284 Opdppc32.exe Obclln32.exe PID 4272 wrote to memory of 2732 4272 Obclln32.exe Opglebkp.exe PID 4272 wrote to memory of 2732 4272 Obclln32.exe Opglebkp.exe PID 4272 wrote to memory of 2732 4272 Obclln32.exe Opglebkp.exe PID 2732 wrote to memory of 5084 2732 Opglebkp.exe Oedeniig.exe PID 2732 wrote to memory of 5084 2732 Opglebkp.exe Oedeniig.exe PID 2732 wrote to memory of 5084 2732 Opglebkp.exe Oedeniig.exe PID 5084 wrote to memory of 4524 5084 Oedeniig.exe Opiikbim.exe PID 5084 wrote to memory of 4524 5084 Oedeniig.exe Opiikbim.exe PID 5084 wrote to memory of 4524 5084 Oedeniig.exe Opiikbim.exe PID 4524 wrote to memory of 2864 4524 Opiikbim.exe Oiandh32.exe PID 4524 wrote to memory of 2864 4524 Opiikbim.exe Oiandh32.exe PID 4524 wrote to memory of 2864 4524 Opiikbim.exe Oiandh32.exe PID 2864 wrote to memory of 4304 2864 Oiandh32.exe Oblobm32.exe PID 2864 wrote to memory of 4304 2864 Oiandh32.exe Oblobm32.exe PID 2864 wrote to memory of 4304 2864 Oiandh32.exe Oblobm32.exe PID 4304 wrote to memory of 4584 4304 Oblobm32.exe Pmbcpf32.exe PID 4304 wrote to memory of 4584 4304 Oblobm32.exe Pmbcpf32.exe PID 4304 wrote to memory of 4584 4304 Oblobm32.exe Pmbcpf32.exe PID 4584 wrote to memory of 1612 4584 Pmbcpf32.exe Plgpqb32.exe PID 4584 wrote to memory of 1612 4584 Pmbcpf32.exe Plgpqb32.exe PID 4584 wrote to memory of 1612 4584 Pmbcpf32.exe Plgpqb32.exe PID 1612 wrote to memory of 1804 1612 Plgpqb32.exe Pmkffd32.exe PID 1612 wrote to memory of 1804 1612 Plgpqb32.exe Pmkffd32.exe PID 1612 wrote to memory of 1804 1612 Plgpqb32.exe Pmkffd32.exe PID 1804 wrote to memory of 2088 1804 Pmkffd32.exe Qmnbkdjd.exe PID 1804 wrote to memory of 2088 1804 Pmkffd32.exe Qmnbkdjd.exe PID 1804 wrote to memory of 2088 1804 Pmkffd32.exe Qmnbkdjd.exe PID 2088 wrote to memory of 3076 2088 Qmnbkdjd.exe Amblfc32.exe PID 2088 wrote to memory of 3076 2088 Qmnbkdjd.exe Amblfc32.exe PID 2088 wrote to memory of 3076 2088 Qmnbkdjd.exe Amblfc32.exe PID 3076 wrote to memory of 1268 3076 Amblfc32.exe Apqhbo32.exe PID 3076 wrote to memory of 1268 3076 Amblfc32.exe Apqhbo32.exe PID 3076 wrote to memory of 1268 3076 Amblfc32.exe Apqhbo32.exe PID 1268 wrote to memory of 3880 1268 Apqhbo32.exe Aenqkf32.exe PID 1268 wrote to memory of 3880 1268 Apqhbo32.exe Aenqkf32.exe PID 1268 wrote to memory of 3880 1268 Apqhbo32.exe Aenqkf32.exe PID 3880 wrote to memory of 4680 3880 Aenqkf32.exe Algigpkf.exe PID 3880 wrote to memory of 4680 3880 Aenqkf32.exe Algigpkf.exe PID 3880 wrote to memory of 4680 3880 Aenqkf32.exe Algigpkf.exe PID 4680 wrote to memory of 1956 4680 Algigpkf.exe Agmmeijl.exe PID 4680 wrote to memory of 1956 4680 Algigpkf.exe Agmmeijl.exe PID 4680 wrote to memory of 1956 4680 Algigpkf.exe Agmmeijl.exe PID 1956 wrote to memory of 2112 1956 Agmmeijl.exe Aljfmp32.exe PID 1956 wrote to memory of 2112 1956 Agmmeijl.exe Aljfmp32.exe PID 1956 wrote to memory of 2112 1956 Agmmeijl.exe Aljfmp32.exe PID 2112 wrote to memory of 4872 2112 Aljfmp32.exe Aebjfeod.exe PID 2112 wrote to memory of 4872 2112 Aljfmp32.exe Aebjfeod.exe PID 2112 wrote to memory of 4872 2112 Aljfmp32.exe Aebjfeod.exe PID 4872 wrote to memory of 3928 4872 Aebjfeod.exe Allbbo32.exe PID 4872 wrote to memory of 3928 4872 Aebjfeod.exe Allbbo32.exe PID 4872 wrote to memory of 3928 4872 Aebjfeod.exe Allbbo32.exe PID 3928 wrote to memory of 3460 3928 Allbbo32.exe Aipclc32.exe PID 3928 wrote to memory of 3460 3928 Allbbo32.exe Aipclc32.exe PID 3928 wrote to memory of 3460 3928 Allbbo32.exe Aipclc32.exe PID 3460 wrote to memory of 3668 3460 Aipclc32.exe Bmnlbb32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe"C:\Users\Admin\AppData\Local\Temp\62262f7d02451afda03cdf21afd1cf1ed33af564330421b0429fa79aa9979be3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\Nnecfpfp.exeC:\Windows\system32\Nnecfpfp.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\Opdppc32.exeC:\Windows\system32\Opdppc32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\Obclln32.exeC:\Windows\system32\Obclln32.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\Opglebkp.exeC:\Windows\system32\Opglebkp.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\Oedeniig.exeC:\Windows\system32\Oedeniig.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\Opiikbim.exeC:\Windows\system32\Opiikbim.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\Oiandh32.exeC:\Windows\system32\Oiandh32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Oblobm32.exeC:\Windows\system32\Oblobm32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\Pmbcpf32.exeC:\Windows\system32\Pmbcpf32.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\Plgpqb32.exeC:\Windows\system32\Plgpqb32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\Pmkffd32.exeC:\Windows\system32\Pmkffd32.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Qmnbkdjd.exeC:\Windows\system32\Qmnbkdjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Amblfc32.exeC:\Windows\system32\Amblfc32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\Apqhbo32.exeC:\Windows\system32\Apqhbo32.exe15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Aenqkf32.exeC:\Windows\system32\Aenqkf32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\Algigpkf.exeC:\Windows\system32\Algigpkf.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\Agmmeijl.exeC:\Windows\system32\Agmmeijl.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\Aljfmp32.exeC:\Windows\system32\Aljfmp32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\Aebjfeod.exeC:\Windows\system32\Aebjfeod.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\Allbbo32.exeC:\Windows\system32\Allbbo32.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\Aipclc32.exeC:\Windows\system32\Aipclc32.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\Bmnlbb32.exeC:\Windows\system32\Bmnlbb32.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:3668 -
C:\Windows\SysWOW64\Bnphha32.exeC:\Windows\system32\Bnphha32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3548 -
C:\Windows\SysWOW64\Biifbb32.exeC:\Windows\system32\Biifbb32.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1376 -
C:\Windows\SysWOW64\Bcbjkhdq.exeC:\Windows\system32\Bcbjkhdq.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3384 -
C:\Windows\SysWOW64\Bpfkdl32.exeC:\Windows\system32\Bpfkdl32.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:804 -
C:\Windows\SysWOW64\Cjnomaik.exeC:\Windows\system32\Cjnomaik.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5004 -
C:\Windows\SysWOW64\Cgbpgf32.exeC:\Windows\system32\Cgbpgf32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4868 -
C:\Windows\SysWOW64\Cnqaoo32.exeC:\Windows\system32\Cnqaoo32.exe30⤵
- Executes dropped EXE
PID:3576 -
C:\Windows\SysWOW64\Cgifgebl.exeC:\Windows\system32\Cgifgebl.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1468 -
C:\Windows\SysWOW64\Cjgbcpap.exeC:\Windows\system32\Cjgbcpap.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3136 -
C:\Windows\SysWOW64\Cqajpj32.exeC:\Windows\system32\Cqajpj32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:3832 -
C:\Windows\SysWOW64\Dlhkek32.exeC:\Windows\system32\Dlhkek32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4636 -
C:\Windows\SysWOW64\Dnhgoned.exeC:\Windows\system32\Dnhgoned.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:1132 -
C:\Windows\SysWOW64\Djohdo32.exeC:\Windows\system32\Djohdo32.exe36⤵
- Executes dropped EXE
PID:1316 -
C:\Windows\SysWOW64\Dokqlfip.exeC:\Windows\system32\Dokqlfip.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:636 -
C:\Windows\SysWOW64\Dfeiip32.exeC:\Windows\system32\Dfeiip32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4588 -
C:\Windows\SysWOW64\Dmoafjhi.exeC:\Windows\system32\Dmoafjhi.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1112 -
C:\Windows\SysWOW64\Dgeeccho.exeC:\Windows\system32\Dgeeccho.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:4748 -
C:\Windows\SysWOW64\Dnompm32.exeC:\Windows\system32\Dnompm32.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:3692 -
C:\Windows\SysWOW64\Eopjge32.exeC:\Windows\system32\Eopjge32.exe42⤵
- Executes dropped EXE
PID:4308 -
C:\Windows\SysWOW64\Eggbic32.exeC:\Windows\system32\Eggbic32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3192 -
C:\Windows\SysWOW64\Enajemmi.exeC:\Windows\system32\Enajemmi.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3508 -
C:\Windows\SysWOW64\Egionb32.exeC:\Windows\system32\Egionb32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Encgkmkg.exeC:\Windows\system32\Encgkmkg.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Ecpocc32.exeC:\Windows\system32\Ecpocc32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:388 -
C:\Windows\SysWOW64\Enfcql32.exeC:\Windows\system32\Enfcql32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3816 -
C:\Windows\SysWOW64\Ecblic32.exeC:\Windows\system32\Ecblic32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1544 -
C:\Windows\SysWOW64\Ejmdemoh.exeC:\Windows\system32\Ejmdemoh.exe50⤵
- Executes dropped EXE
PID:3208 -
C:\Windows\SysWOW64\Eoimndmp.exeC:\Windows\system32\Eoimndmp.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4312 -
C:\Windows\SysWOW64\Ejoakm32.exeC:\Windows\system32\Ejoakm32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4336 -
C:\Windows\SysWOW64\Fqiihgdb.exeC:\Windows\system32\Fqiihgdb.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\Fcgedbcf.exeC:\Windows\system32\Fcgedbcf.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1632 -
C:\Windows\SysWOW64\Fmpjmh32.exeC:\Windows\system32\Fmpjmh32.exe55⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\Ffhnen32.exeC:\Windows\system32\Ffhnen32.exe56⤵
- Executes dropped EXE
PID:3636 -
C:\Windows\SysWOW64\Fpqcncgg.exeC:\Windows\system32\Fpqcncgg.exe57⤵
- Executes dropped EXE
PID:4076 -
C:\Windows\SysWOW64\Fmdchgfa.exeC:\Windows\system32\Fmdchgfa.exe58⤵
- Executes dropped EXE
PID:216 -
C:\Windows\SysWOW64\Fndpbjmd.exeC:\Windows\system32\Fndpbjmd.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5100 -
C:\Windows\SysWOW64\Gnfmgjka.exeC:\Windows\system32\Gnfmgjka.exe60⤵
- Executes dropped EXE
PID:4516 -
C:\Windows\SysWOW64\Gmkihfpi.exeC:\Windows\system32\Gmkihfpi.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:444 -
C:\Windows\SysWOW64\Gceaeq32.exeC:\Windows\system32\Gceaeq32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4608 -
C:\Windows\SysWOW64\Gnkfbi32.exeC:\Windows\system32\Gnkfbi32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1556 -
C:\Windows\SysWOW64\Gplbjamj.exeC:\Windows\system32\Gplbjamj.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1988 -
C:\Windows\SysWOW64\Iakaql32.exeC:\Windows\system32\Iakaql32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2184 -
C:\Windows\SysWOW64\Nacbfdao.exeC:\Windows\system32\Nacbfdao.exe66⤵
- Modifies registry class
PID:3596 -
C:\Windows\SysWOW64\Ngpjnkpf.exeC:\Windows\system32\Ngpjnkpf.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2372 -
C:\Windows\SysWOW64\Nnjbke32.exeC:\Windows\system32\Nnjbke32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4656 -
C:\Windows\SysWOW64\Nqiogp32.exeC:\Windows\system32\Nqiogp32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5056 -
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:3112 -
C:\Windows\SysWOW64\Fomhdg32.exeC:\Windows\system32\Fomhdg32.exe71⤵
- Modifies registry class
PID:4980 -
C:\Windows\SysWOW64\Ffgqqaip.exeC:\Windows\system32\Ffgqqaip.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4592 -
C:\Windows\SysWOW64\Fkciihgg.exeC:\Windows\system32\Fkciihgg.exe73⤵
- Drops file in System32 directory
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Ffimfqgm.exeC:\Windows\system32\Ffimfqgm.exe74⤵
- Modifies registry class
PID:772 -
C:\Windows\SysWOW64\Pcpikkge.exeC:\Windows\system32\Pcpikkge.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3452 -
C:\Windows\SysWOW64\Nijeec32.exeC:\Windows\system32\Nijeec32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\Poomegpf.exeC:\Windows\system32\Poomegpf.exe77⤵PID:1996
-
C:\Windows\SysWOW64\Gbdoof32.exeC:\Windows\system32\Gbdoof32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4212 -
C:\Windows\SysWOW64\Nnicid32.exeC:\Windows\system32\Nnicid32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:392 -
C:\Windows\SysWOW64\Ndflak32.exeC:\Windows\system32\Ndflak32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4248 -
C:\Windows\SysWOW64\Ohcegi32.exeC:\Windows\system32\Ohcegi32.exe81⤵PID:1580
-
C:\Windows\SysWOW64\Omqmop32.exeC:\Windows\system32\Omqmop32.exe82⤵PID:2264
-
C:\Windows\SysWOW64\Oeheqm32.exeC:\Windows\system32\Oeheqm32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3616 -
C:\Windows\SysWOW64\Olanmgig.exeC:\Windows\system32\Olanmgig.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1216 -
C:\Windows\SysWOW64\Oanfen32.exeC:\Windows\system32\Oanfen32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5032 -
C:\Windows\SysWOW64\Ohhnbhok.exeC:\Windows\system32\Ohhnbhok.exe86⤵
- Modifies registry class
PID:808 -
C:\Windows\SysWOW64\Ojgjndno.exeC:\Windows\system32\Ojgjndno.exe87⤵PID:4468
-
C:\Windows\SysWOW64\Oaqbkn32.exeC:\Windows\system32\Oaqbkn32.exe88⤵
- Modifies registry class
PID:2376 -
C:\Windows\SysWOW64\Ohkkhhmh.exeC:\Windows\system32\Ohkkhhmh.exe89⤵PID:4244
-
C:\Windows\SysWOW64\Ojigdcll.exeC:\Windows\system32\Ojigdcll.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4000 -
C:\Windows\SysWOW64\Peahgl32.exeC:\Windows\system32\Peahgl32.exe91⤵PID:5108
-
C:\Windows\SysWOW64\Pkbjjbda.exeC:\Windows\system32\Pkbjjbda.exe92⤵PID:4224
-
C:\Windows\SysWOW64\Pehngkcg.exeC:\Windows\system32\Pehngkcg.exe93⤵PID:956
-
C:\Windows\SysWOW64\Paoollik.exeC:\Windows\system32\Paoollik.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4052 -
C:\Windows\SysWOW64\Phigif32.exeC:\Windows\system32\Phigif32.exe95⤵PID:3400
-
C:\Windows\SysWOW64\Pocpfphe.exeC:\Windows\system32\Pocpfphe.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:616 -
C:\Windows\SysWOW64\Qaalblgi.exeC:\Windows\system32\Qaalblgi.exe97⤵
- Drops file in System32 directory
PID:636 -
C:\Windows\SysWOW64\Cdpjlb32.exeC:\Windows\system32\Cdpjlb32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4636 -
C:\Windows\SysWOW64\Chlflabp.exeC:\Windows\system32\Chlflabp.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1376 -
C:\Windows\SysWOW64\Cofnik32.exeC:\Windows\system32\Cofnik32.exe100⤵
- Modifies registry class
PID:4608 -
C:\Windows\SysWOW64\Chnbbqpn.exeC:\Windows\system32\Chnbbqpn.exe101⤵
- Modifies registry class
PID:1956 -
C:\Windows\SysWOW64\Ckmonl32.exeC:\Windows\system32\Ckmonl32.exe102⤵
- Drops file in System32 directory
PID:4584 -
C:\Windows\SysWOW64\Cbfgkffn.exeC:\Windows\system32\Cbfgkffn.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:32 -
C:\Windows\SysWOW64\Chqogq32.exeC:\Windows\system32\Chqogq32.exe104⤵PID:2788
-
C:\Windows\SysWOW64\Dkokcl32.exeC:\Windows\system32\Dkokcl32.exe105⤵PID:752
-
C:\Windows\SysWOW64\Dfdpad32.exeC:\Windows\system32\Dfdpad32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1760 -
C:\Windows\SysWOW64\Dhclmp32.exeC:\Windows\system32\Dhclmp32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4552 -
C:\Windows\SysWOW64\Dkahilkl.exeC:\Windows\system32\Dkahilkl.exe108⤵PID:1608
-
C:\Windows\SysWOW64\Dbkqfe32.exeC:\Windows\system32\Dbkqfe32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1820 -
C:\Windows\SysWOW64\Dheibpje.exeC:\Windows\system32\Dheibpje.exe110⤵PID:2008
-
C:\Windows\SysWOW64\Dnbakghm.exeC:\Windows\system32\Dnbakghm.exe111⤵PID:2548
-
C:\Windows\SysWOW64\Dmcain32.exeC:\Windows\system32\Dmcain32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\Doaneiop.exeC:\Windows\system32\Doaneiop.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4656 -
C:\Windows\SysWOW64\Dndnpf32.exeC:\Windows\system32\Dndnpf32.exe114⤵PID:4660
-
C:\Windows\SysWOW64\Dmennnni.exeC:\Windows\system32\Dmennnni.exe115⤵PID:2012
-
C:\Windows\SysWOW64\Dngjff32.exeC:\Windows\system32\Dngjff32.exe116⤵
- Drops file in System32 directory
PID:4976 -
C:\Windows\SysWOW64\Eiloco32.exeC:\Windows\system32\Eiloco32.exe117⤵PID:4592
-
C:\Windows\SysWOW64\Emhkdmlg.exeC:\Windows\system32\Emhkdmlg.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2676 -
C:\Windows\SysWOW64\Efpomccg.exeC:\Windows\system32\Efpomccg.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2520 -
C:\Windows\SysWOW64\Eecphp32.exeC:\Windows\system32\Eecphp32.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:4768 -
C:\Windows\SysWOW64\Eoideh32.exeC:\Windows\system32\Eoideh32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:888 -
C:\Windows\SysWOW64\Ebgpad32.exeC:\Windows\system32\Ebgpad32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:800
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-