Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 09:03
Static task
static1
Behavioral task
behavioral1
Sample
6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe
Resource
win10v2004-20220812-en
General
-
Target
6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe
-
Size
51KB
-
MD5
e8c6f26b2df68b3d6cc118a9d5171a20
-
SHA1
e05a8b86863c824648f7a2fd08a61ddf1e28cdce
-
SHA256
6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c
-
SHA512
acef7d5f5e8c456d7571a40289330b097d376719767eaea963258d6b26bab26ba942f7f20f83bd0a58077662695b60ff6a2c79dc049b8744c8b4eee519e9f190
-
SSDEEP
768:VXBYHKZ22gaIdZWicx1eIOuL9caJol4PttfozY/HPnFgDKxFXHZSmWIzz/1H5w:VxnZ2kAQx7L3J64PttAzY/PjH4IzBa
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Kgdbkohf.exeDpgnjo32.exeQmeigg32.exeAocmio32.exeCiogobcm.exePgnbcgpf.exeIfjfnb32.exeHgdejd32.exeBeobcdoi.exeHllkqdli.exeEbeapc32.exeMoacio32.exeGjclbc32.exeIbagcc32.exeJkdnpo32.exeJbocea32.exeCiaddaaj.exeBbfeck32.exeKaqcbi32.exeKdaldd32.exeFfaong32.exeMcecjmkl.exeHlhaee32.exeBbpocl32.exeCejjkflc.exeAliobieh.exeIjdeiaio.exeIfnbph32.exeQhhpop32.exeHqkjaifk.exeLokldg32.exeCpklql32.exeImpepm32.exeLqikmc32.exeHofmaq32.exeApbnnh32.exeMcjmel32.exeOacige32.exeJbmfoa32.exeDlkbjqgm.exePhpbffnp.exeFlghognq.exeAnmmao32.exePihmjqfj.exeIncdem32.exeJmgmhgig.exeBbklli32.exeCgcmlb32.exeFflaff32.exeDbckcf32.exeEpiaig32.exeJkimho32.exeMnfnlf32.exeGohapb32.exeGcpapkgp.exeMglfplgk.exeCejaobel.exeIoicnn32.exeCbqonf32.exeDimcppgm.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgdbkohf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpgnjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qmeigg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aocmio32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciogobcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgnbcgpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifjfnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifjfnb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgdejd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beobcdoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hllkqdli.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebeapc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Moacio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gjclbc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibagcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkdnpo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbocea32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciaddaaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbfeck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kaqcbi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdaldd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffaong32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcecjmkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlhaee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbpocl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cejjkflc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aliobieh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijdeiaio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kaqcbi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifnbph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhhpop32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hqkjaifk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lokldg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpklql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjclbc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Impepm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqikmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hofmaq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apbnnh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcjmel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beobcdoi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oacige32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbmfoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dlkbjqgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phpbffnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flghognq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anmmao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pihmjqfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Incdem32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmgmhgig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbklli32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgcmlb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fflaff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbckcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epiaig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkimho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnfnlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gohapb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcpapkgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mglfplgk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cejaobel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ioicnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbqonf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dimcppgm.exe -
Executes dropped EXE 64 IoCs
Processes:
Hpfjbn32.exePgnbcgpf.exeQhgaci32.exeQncjkp32.exeQhinii32.exeAaaban32.exeAnhcfoiq.exeAdbkci32.exeAnkplo32.exeAhpdih32.exeAnmmao32.exeAhbaog32.exeAnoign32.exeBhendgbo.exeBbmbmm32.exeBbpocl32.exeBnfphm32.exeBkjpaa32.exeBinpkfjd.exeBbfeck32.exeCgcmlb32.exeCbiaik32.exeCicjfe32.exeCjdfmmlm.exeCejjkflc.exeCjfccmjj.exeCaqkpg32.exeFiclcq32.exeFlddelgj.exeFiheopfd.exeLqgpeijg.exeMnojim32.exeMoacio32.exeMbblkjgm.exeMdphgffq.exeMofmdofg.exeNdebbe32.exeNqlbgfhp.exeNbnlfimp.exeOacige32.exeOiojdb32.exeOajohd32.exeOehgnbbf.exePihmjqfj.exeApbnnh32.exeAliobieh.exeAlkkhi32.exeAhblmjhj.exeBbhqjchp.exeBhdibj32.exeBooaodnd.exeBoanecla.exeCipehkcl.exeCpljkdig.exeCcjfgphj.exeDigkijmd.exeDcalgo32.exeDagiil32.exeDphifcoi.exeDfdbojmq.exeDakbckbe.exeEbploj32.exeEhlaaddj.exeEofinnkf.exepid process 2116 Hpfjbn32.exe 1988 Pgnbcgpf.exe 3832 Qhgaci32.exe 1112 Qncjkp32.exe 5072 Qhinii32.exe 4960 Aaaban32.exe 5016 Anhcfoiq.exe 4964 Adbkci32.exe 3680 Ankplo32.exe 4936 Ahpdih32.exe 4448 Anmmao32.exe 1520 Ahbaog32.exe 3424 Anoign32.exe 4416 Bhendgbo.exe 1648 Bbmbmm32.exe 764 Bbpocl32.exe 2108 Bnfphm32.exe 3472 Bkjpaa32.exe 2664 Binpkfjd.exe 5088 Bbfeck32.exe 2484 Cgcmlb32.exe 1076 Cbiaik32.exe 4496 Cicjfe32.exe 1428 Cjdfmmlm.exe 368 Cejjkflc.exe 404 Cjfccmjj.exe 1864 Caqkpg32.exe 4588 Ficlcq32.exe 4500 Flddelgj.exe 3068 Fiheopfd.exe 1472 Lqgpeijg.exe 5100 Mnojim32.exe 4480 Moacio32.exe 3128 Mbblkjgm.exe 5056 Mdphgffq.exe 5060 Mofmdofg.exe 4192 Ndebbe32.exe 3504 Nqlbgfhp.exe 2988 Nbnlfimp.exe 3712 Oacige32.exe 4468 Oiojdb32.exe 2276 Oajohd32.exe 2456 Oehgnbbf.exe 2896 Pihmjqfj.exe 3500 Apbnnh32.exe 3520 Aliobieh.exe 4072 Alkkhi32.exe 1808 Ahblmjhj.exe 2852 Bbhqjchp.exe 1780 Bhdibj32.exe 3960 Booaodnd.exe 3688 Boanecla.exe 1188 Cipehkcl.exe 1512 Cpljkdig.exe 1600 Ccjfgphj.exe 3888 Digkijmd.exe 1784 Dcalgo32.exe 4860 Dagiil32.exe 1536 Dphifcoi.exe 3240 Dfdbojmq.exe 2808 Dakbckbe.exe 3940 Ebploj32.exe 3952 Ehlaaddj.exe 800 Eofinnkf.exe -
Drops file in System32 directory 64 IoCs
Processes:
Gmkbnp32.exePhpbffnp.exeGmiclo32.exeFlekihpc.exeHgkimn32.exeAaaban32.exeBnicai32.exeMhfmbl32.exeChinkndp.exeDblnid32.exeBnfphm32.exeMnojim32.exePanhbfep.exeAndqol32.exeBkadoo32.exeDeokja32.exeBngfli32.exeIcpecm32.exeIqdfmajd.exeQmeigg32.exeDbehienn.exeGohapb32.exeEeaqfo32.exeCjfccmjj.exeKmdlffhj.exeKmkbfeab.exeMeoggpmd.exeMhppik32.exeNaaghoik.exeKmgdgjek.exeQjfmkk32.exeCnbfgh32.exeFoakpc32.exeAhpdih32.exeFfekegon.exeLokldg32.exePfkpiled.exeQnpgdmjd.exeGlqkefff.exeOkneldkf.exeBeobcdoi.exeEpiaig32.exeHlhaee32.exeAfkipi32.exeCpklql32.exeIiibkn32.exeJkfkfohj.exeJgpmmp32.exeMglfplgk.exeKmlgcf32.exeDpgnjo32.exeJmgmhgig.exeAfnefieo.exeCnlpgibd.exeCfjnhe32.exeOacige32.exeGppekj32.exeLkalplel.exeCpmifkgd.exeNqlbgfhp.exeEofinnkf.exeJmnaakne.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Gcekkjcj.exe Gmkbnp32.exe File created C:\Windows\SysWOW64\Ofdnkcof.dll Phpbffnp.exe File created C:\Windows\SysWOW64\Hpjmnjqn.exe Gmiclo32.exe File created C:\Windows\SysWOW64\Fempbm32.exe Flekihpc.exe File opened for modification C:\Windows\SysWOW64\Hfniikha.exe Hgkimn32.exe File created C:\Windows\SysWOW64\Anhcfoiq.exe Aaaban32.exe File created C:\Windows\SysWOW64\Bfpkbfdi.exe Bnicai32.exe File created C:\Windows\SysWOW64\Mgkjch32.exe Mhfmbl32.exe File opened for modification C:\Windows\SysWOW64\Cnbfgh32.exe Chinkndp.exe File opened for modification C:\Windows\SysWOW64\Ehifak32.exe Dblnid32.exe File created C:\Windows\SysWOW64\Bkjpaa32.exe Bnfphm32.exe File created C:\Windows\SysWOW64\Moacio32.exe Mnojim32.exe File created C:\Windows\SysWOW64\Qhhpop32.exe Panhbfep.exe File opened for modification C:\Windows\SysWOW64\Afkipi32.exe Andqol32.exe File created C:\Windows\SysWOW64\Plmamn32.dll Bkadoo32.exe File created C:\Windows\SysWOW64\Dhmgfm32.exe Deokja32.exe File opened for modification C:\Windows\SysWOW64\Bgokdomj.exe Bngfli32.exe File opened for modification C:\Windows\SysWOW64\Ifnbph32.exe Icpecm32.exe File opened for modification C:\Windows\SysWOW64\Ijlkfg32.exe Iqdfmajd.exe File created C:\Windows\SysWOW64\Bnlhncgi.exe Qmeigg32.exe File opened for modification C:\Windows\SysWOW64\Dpnbmi32.exe Dbehienn.exe File created C:\Windows\SysWOW64\Ffdcne32.dll Gohapb32.exe File created C:\Windows\SysWOW64\Epgdch32.exe Eeaqfo32.exe File created C:\Windows\SysWOW64\Ijlkfg32.exe Iqdfmajd.exe File opened for modification C:\Windows\SysWOW64\Caqkpg32.exe Cjfccmjj.exe File created C:\Windows\SysWOW64\Kdkdgchl.exe Kmdlffhj.exe File opened for modification C:\Windows\SysWOW64\Lqikmc32.exe Kmkbfeab.exe File created C:\Windows\SysWOW64\Oicimc32.dll Meoggpmd.exe File created C:\Windows\SysWOW64\Dddmqp32.dll Mhppik32.exe File opened for modification C:\Windows\SysWOW64\Noehac32.exe Naaghoik.exe File created C:\Windows\SysWOW64\Kdaldd32.exe Kmgdgjek.exe File opened for modification C:\Windows\SysWOW64\Qmeigg32.exe Qjfmkk32.exe File opened for modification C:\Windows\SysWOW64\Cfjnhe32.exe Cnbfgh32.exe File opened for modification C:\Windows\SysWOW64\Flekihpc.exe Foakpc32.exe File created C:\Windows\SysWOW64\Ijdike32.dll Ahpdih32.exe File created C:\Windows\SysWOW64\Fcikolnh.exe Ffekegon.exe File created C:\Windows\SysWOW64\Mhkcpd32.dll Lokldg32.exe File created C:\Windows\SysWOW64\Qjoenl32.dll Pfkpiled.exe File created C:\Windows\SysWOW64\Ndcamoeh.dll Qnpgdmjd.exe File opened for modification C:\Windows\SysWOW64\Gckcap32.exe Glqkefff.exe File opened for modification C:\Windows\SysWOW64\Oolnabal.exe Okneldkf.exe File created C:\Windows\SysWOW64\Bngfli32.exe Beobcdoi.exe File created C:\Windows\SysWOW64\Oaegbm32.dll Epiaig32.exe File created C:\Windows\SysWOW64\Hofmaq32.exe Hlhaee32.exe File created C:\Windows\SysWOW64\Hijjpjqc.dll Afkipi32.exe File opened for modification C:\Windows\SysWOW64\Cnnllhpa.exe Cpklql32.exe File created C:\Windows\SysWOW64\Ipckgh32.exe Iiibkn32.exe File created C:\Windows\SysWOW64\Kaqcbi32.exe Jkfkfohj.exe File opened for modification C:\Windows\SysWOW64\Jknfcofa.exe Jgpmmp32.exe File created C:\Windows\SysWOW64\Ajihlijd.dll Mglfplgk.exe File opened for modification C:\Windows\SysWOW64\Kjpgmj32.exe Kmlgcf32.exe File created C:\Windows\SysWOW64\Enabbk32.dll Dpgnjo32.exe File created C:\Windows\SysWOW64\Mcfeffcd.dll Jmgmhgig.exe File created C:\Windows\SysWOW64\Jikjlg32.dll Afnefieo.exe File created C:\Windows\SysWOW64\Ciaddaaj.exe Cnlpgibd.exe File opened for modification C:\Windows\SysWOW64\Cihjeq32.exe Cfjnhe32.exe File created C:\Windows\SysWOW64\Gbfqedah.dll Oacige32.exe File created C:\Windows\SysWOW64\Eagncfoj.dll Gppekj32.exe File created C:\Windows\SysWOW64\Lnohlgep.exe Lkalplel.exe File opened for modification C:\Windows\SysWOW64\Cblebgfh.exe Cpmifkgd.exe File opened for modification C:\Windows\SysWOW64\Nbnlfimp.exe Nqlbgfhp.exe File created C:\Windows\SysWOW64\Hkcdljbo.dll Eofinnkf.exe File created C:\Windows\SysWOW64\Ikjmhmfd.dll Iiibkn32.exe File created C:\Windows\SysWOW64\Jplmmfmi.exe Jmnaakne.exe -
Modifies registry class 64 IoCs
Processes:
Mdokmm32.exePdbiphhi.exeHokgmpkl.exeFhgccijm.exeCcjfgphj.exeIfopiajn.exeGdaociml.exeHpaqqdjj.exeCiogobcm.exeDpnbmi32.exeElilmi32.exeIqfcbahb.exe6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exeJbocea32.exeIqmplbpl.exeBngfli32.exeDblnid32.exeEblpgjha.exeCbiaik32.exeJplmmfmi.exeGcekkjcj.exeIcljbg32.exeHlambk32.exeLnohlgep.exeQfilkj32.exeCicjfe32.exeAlkkhi32.exeDfdbojmq.exeFoonjd32.exeGjdknjep.exeNgifef32.exeGiboijgb.exeAliobieh.exeIjhodq32.exeLkalplel.exePohnnqgo.exeHfbbdj32.exeIcpecm32.exeMbblkjgm.exeEiaoid32.exeBgokdomj.exePfkpiled.exeMdphgffq.exeBooaodnd.exeJbmfoa32.exeIiibkn32.exeIcklhnop.exeMcjmel32.exeCnnllhpa.exeCnbfgh32.exeCfjnhe32.exeIpckgh32.exeJdaaaeqg.exeCiaddaaj.exeNoehac32.exeAbgcqjhp.exeBkadoo32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdokmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oidfpeba.dll" Pdbiphhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hokgmpkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oifglb32.dll" Fhgccijm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccjfgphj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifopiajn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gdaociml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpaqqdjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhoimi32.dll" Ciogobcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dpnbmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Elilmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnnodhei.dll" Iqfcbahb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbocea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Appgnf32.dll" Iqmplbpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bngfli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dblnid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efeifngp.dll" Eblpgjha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbiaik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jplmmfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gcekkjcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aaqnkb32.dll" Icljbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gologg32.dll" Hlambk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnohlgep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oennph32.dll" Qfilkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clbfii32.dll" Cicjfe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Alkkhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfdbojmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npliag32.dll" Foonjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjdknjep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngifef32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Giboijgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cijddbon.dll" Aliobieh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gibgla32.dll" Ccjfgphj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijhodq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhbghb32.dll" Elilmi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cicjfe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkalplel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oaamjnbg.dll" Pohnnqgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hfbbdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgfajp32.dll" Icpecm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbblkjgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcoong32.dll" Eiaoid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgokdomj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qjoenl32.dll" Pfkpiled.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdphgffq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Booaodnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qknpkqim.dll" Jbmfoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iiibkn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Icklhnop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmhkgijk.dll" Mcjmel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnnllhpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efqigigj.dll" Cnbfgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfjnhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpfihl32.dll" Ipckgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdaaaeqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oigcebdh.dll" Ciaddaaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Noehac32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qfilkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abgcqjhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkadoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icpecm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acnhdhbp.dll" Mbblkjgm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccjfgphj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exeHpfjbn32.exePgnbcgpf.exeQhgaci32.exeQncjkp32.exeQhinii32.exeAaaban32.exeAnhcfoiq.exeAdbkci32.exeAnkplo32.exeAhpdih32.exeAnmmao32.exeAhbaog32.exeAnoign32.exeBhendgbo.exeBbmbmm32.exeBbpocl32.exeBnfphm32.exeBkjpaa32.exeBinpkfjd.exeBbfeck32.exeCgcmlb32.exedescription pid process target process PID 1708 wrote to memory of 2116 1708 6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe Hpfjbn32.exe PID 1708 wrote to memory of 2116 1708 6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe Hpfjbn32.exe PID 1708 wrote to memory of 2116 1708 6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe Hpfjbn32.exe PID 2116 wrote to memory of 1988 2116 Hpfjbn32.exe Pgnbcgpf.exe PID 2116 wrote to memory of 1988 2116 Hpfjbn32.exe Pgnbcgpf.exe PID 2116 wrote to memory of 1988 2116 Hpfjbn32.exe Pgnbcgpf.exe PID 1988 wrote to memory of 3832 1988 Pgnbcgpf.exe Qhgaci32.exe PID 1988 wrote to memory of 3832 1988 Pgnbcgpf.exe Qhgaci32.exe PID 1988 wrote to memory of 3832 1988 Pgnbcgpf.exe Qhgaci32.exe PID 3832 wrote to memory of 1112 3832 Qhgaci32.exe Qncjkp32.exe PID 3832 wrote to memory of 1112 3832 Qhgaci32.exe Qncjkp32.exe PID 3832 wrote to memory of 1112 3832 Qhgaci32.exe Qncjkp32.exe PID 1112 wrote to memory of 5072 1112 Qncjkp32.exe Qhinii32.exe PID 1112 wrote to memory of 5072 1112 Qncjkp32.exe Qhinii32.exe PID 1112 wrote to memory of 5072 1112 Qncjkp32.exe Qhinii32.exe PID 5072 wrote to memory of 4960 5072 Qhinii32.exe Aaaban32.exe PID 5072 wrote to memory of 4960 5072 Qhinii32.exe Aaaban32.exe PID 5072 wrote to memory of 4960 5072 Qhinii32.exe Aaaban32.exe PID 4960 wrote to memory of 5016 4960 Aaaban32.exe Anhcfoiq.exe PID 4960 wrote to memory of 5016 4960 Aaaban32.exe Anhcfoiq.exe PID 4960 wrote to memory of 5016 4960 Aaaban32.exe Anhcfoiq.exe PID 5016 wrote to memory of 4964 5016 Anhcfoiq.exe Adbkci32.exe PID 5016 wrote to memory of 4964 5016 Anhcfoiq.exe Adbkci32.exe PID 5016 wrote to memory of 4964 5016 Anhcfoiq.exe Adbkci32.exe PID 4964 wrote to memory of 3680 4964 Adbkci32.exe Ankplo32.exe PID 4964 wrote to memory of 3680 4964 Adbkci32.exe Ankplo32.exe PID 4964 wrote to memory of 3680 4964 Adbkci32.exe Ankplo32.exe PID 3680 wrote to memory of 4936 3680 Ankplo32.exe Ahpdih32.exe PID 3680 wrote to memory of 4936 3680 Ankplo32.exe Ahpdih32.exe PID 3680 wrote to memory of 4936 3680 Ankplo32.exe Ahpdih32.exe PID 4936 wrote to memory of 4448 4936 Ahpdih32.exe Anmmao32.exe PID 4936 wrote to memory of 4448 4936 Ahpdih32.exe Anmmao32.exe PID 4936 wrote to memory of 4448 4936 Ahpdih32.exe Anmmao32.exe PID 4448 wrote to memory of 1520 4448 Anmmao32.exe Ahbaog32.exe PID 4448 wrote to memory of 1520 4448 Anmmao32.exe Ahbaog32.exe PID 4448 wrote to memory of 1520 4448 Anmmao32.exe Ahbaog32.exe PID 1520 wrote to memory of 3424 1520 Ahbaog32.exe Anoign32.exe PID 1520 wrote to memory of 3424 1520 Ahbaog32.exe Anoign32.exe PID 1520 wrote to memory of 3424 1520 Ahbaog32.exe Anoign32.exe PID 3424 wrote to memory of 4416 3424 Anoign32.exe Bhendgbo.exe PID 3424 wrote to memory of 4416 3424 Anoign32.exe Bhendgbo.exe PID 3424 wrote to memory of 4416 3424 Anoign32.exe Bhendgbo.exe PID 4416 wrote to memory of 1648 4416 Bhendgbo.exe Bbmbmm32.exe PID 4416 wrote to memory of 1648 4416 Bhendgbo.exe Bbmbmm32.exe PID 4416 wrote to memory of 1648 4416 Bhendgbo.exe Bbmbmm32.exe PID 1648 wrote to memory of 764 1648 Bbmbmm32.exe Bbpocl32.exe PID 1648 wrote to memory of 764 1648 Bbmbmm32.exe Bbpocl32.exe PID 1648 wrote to memory of 764 1648 Bbmbmm32.exe Bbpocl32.exe PID 764 wrote to memory of 2108 764 Bbpocl32.exe Bnfphm32.exe PID 764 wrote to memory of 2108 764 Bbpocl32.exe Bnfphm32.exe PID 764 wrote to memory of 2108 764 Bbpocl32.exe Bnfphm32.exe PID 2108 wrote to memory of 3472 2108 Bnfphm32.exe Bkjpaa32.exe PID 2108 wrote to memory of 3472 2108 Bnfphm32.exe Bkjpaa32.exe PID 2108 wrote to memory of 3472 2108 Bnfphm32.exe Bkjpaa32.exe PID 3472 wrote to memory of 2664 3472 Bkjpaa32.exe Binpkfjd.exe PID 3472 wrote to memory of 2664 3472 Bkjpaa32.exe Binpkfjd.exe PID 3472 wrote to memory of 2664 3472 Bkjpaa32.exe Binpkfjd.exe PID 2664 wrote to memory of 5088 2664 Binpkfjd.exe Bbfeck32.exe PID 2664 wrote to memory of 5088 2664 Binpkfjd.exe Bbfeck32.exe PID 2664 wrote to memory of 5088 2664 Binpkfjd.exe Bbfeck32.exe PID 5088 wrote to memory of 2484 5088 Bbfeck32.exe Cgcmlb32.exe PID 5088 wrote to memory of 2484 5088 Bbfeck32.exe Cgcmlb32.exe PID 5088 wrote to memory of 2484 5088 Bbfeck32.exe Cgcmlb32.exe PID 2484 wrote to memory of 1076 2484 Cgcmlb32.exe Cbiaik32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe"C:\Users\Admin\AppData\Local\Temp\6993c41a0468b81477828140aee33c17798943e63053aae0688a52c3dbfd4d2c.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\Hpfjbn32.exeC:\Windows\system32\Hpfjbn32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\Pgnbcgpf.exeC:\Windows\system32\Pgnbcgpf.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\Qhgaci32.exeC:\Windows\system32\Qhgaci32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\Qncjkp32.exeC:\Windows\system32\Qncjkp32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\Qhinii32.exeC:\Windows\system32\Qhinii32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\Aaaban32.exeC:\Windows\system32\Aaaban32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Anhcfoiq.exeC:\Windows\system32\Anhcfoiq.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\Adbkci32.exeC:\Windows\system32\Adbkci32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\Ankplo32.exeC:\Windows\system32\Ankplo32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\Ahpdih32.exeC:\Windows\system32\Ahpdih32.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\Anmmao32.exeC:\Windows\system32\Anmmao32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\Ahbaog32.exeC:\Windows\system32\Ahbaog32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\Anoign32.exeC:\Windows\system32\Anoign32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\Bhendgbo.exeC:\Windows\system32\Bhendgbo.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\Bbmbmm32.exeC:\Windows\system32\Bbmbmm32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\Bbpocl32.exeC:\Windows\system32\Bbpocl32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\Bnfphm32.exeC:\Windows\system32\Bnfphm32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\Bkjpaa32.exeC:\Windows\system32\Bkjpaa32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\Binpkfjd.exeC:\Windows\system32\Binpkfjd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Bbfeck32.exeC:\Windows\system32\Bbfeck32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\Cgcmlb32.exeC:\Windows\system32\Cgcmlb32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Cbiaik32.exeC:\Windows\system32\Cbiaik32.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:1076 -
C:\Windows\SysWOW64\Cicjfe32.exeC:\Windows\system32\Cicjfe32.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:4496 -
C:\Windows\SysWOW64\Cjdfmmlm.exeC:\Windows\system32\Cjdfmmlm.exe25⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\SysWOW64\Cejjkflc.exeC:\Windows\system32\Cejjkflc.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:368 -
C:\Windows\SysWOW64\Cjfccmjj.exeC:\Windows\system32\Cjfccmjj.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:404 -
C:\Windows\SysWOW64\Caqkpg32.exeC:\Windows\system32\Caqkpg32.exe28⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\Ficlcq32.exeC:\Windows\system32\Ficlcq32.exe29⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\Flddelgj.exeC:\Windows\system32\Flddelgj.exe30⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\SysWOW64\Fiheopfd.exeC:\Windows\system32\Fiheopfd.exe31⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\Lqgpeijg.exeC:\Windows\system32\Lqgpeijg.exe32⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\Mnojim32.exeC:\Windows\system32\Mnojim32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5100 -
C:\Windows\SysWOW64\Moacio32.exeC:\Windows\system32\Moacio32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4480 -
C:\Windows\SysWOW64\Mbblkjgm.exeC:\Windows\system32\Mbblkjgm.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:3128 -
C:\Windows\SysWOW64\Mdphgffq.exeC:\Windows\system32\Mdphgffq.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:5056 -
C:\Windows\SysWOW64\Mofmdofg.exeC:\Windows\system32\Mofmdofg.exe37⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\SysWOW64\Ndebbe32.exeC:\Windows\system32\Ndebbe32.exe38⤵
- Executes dropped EXE
PID:4192 -
C:\Windows\SysWOW64\Nqlbgfhp.exeC:\Windows\system32\Nqlbgfhp.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3504 -
C:\Windows\SysWOW64\Nbnlfimp.exeC:\Windows\system32\Nbnlfimp.exe40⤵
- Executes dropped EXE
PID:2988 -
C:\Windows\SysWOW64\Oacige32.exeC:\Windows\system32\Oacige32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3712 -
C:\Windows\SysWOW64\Oiojdb32.exeC:\Windows\system32\Oiojdb32.exe42⤵
- Executes dropped EXE
PID:4468 -
C:\Windows\SysWOW64\Oajohd32.exeC:\Windows\system32\Oajohd32.exe43⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\Oehgnbbf.exeC:\Windows\system32\Oehgnbbf.exe44⤵
- Executes dropped EXE
PID:2456 -
C:\Windows\SysWOW64\Pihmjqfj.exeC:\Windows\system32\Pihmjqfj.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\Apbnnh32.exeC:\Windows\system32\Apbnnh32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3500 -
C:\Windows\SysWOW64\Aliobieh.exeC:\Windows\system32\Aliobieh.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3520 -
C:\Windows\SysWOW64\Alkkhi32.exeC:\Windows\system32\Alkkhi32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:4072 -
C:\Windows\SysWOW64\Ahblmjhj.exeC:\Windows\system32\Ahblmjhj.exe49⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\Bbhqjchp.exeC:\Windows\system32\Bbhqjchp.exe50⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\Bhdibj32.exeC:\Windows\system32\Bhdibj32.exe51⤵
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\Booaodnd.exeC:\Windows\system32\Booaodnd.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:3960 -
C:\Windows\SysWOW64\Boanecla.exeC:\Windows\system32\Boanecla.exe53⤵
- Executes dropped EXE
PID:3688 -
C:\Windows\SysWOW64\Cipehkcl.exeC:\Windows\system32\Cipehkcl.exe54⤵
- Executes dropped EXE
PID:1188 -
C:\Windows\SysWOW64\Cpljkdig.exeC:\Windows\system32\Cpljkdig.exe55⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\SysWOW64\Ccjfgphj.exeC:\Windows\system32\Ccjfgphj.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:1600 -
C:\Windows\SysWOW64\Digkijmd.exeC:\Windows\system32\Digkijmd.exe57⤵
- Executes dropped EXE
PID:3888 -
C:\Windows\SysWOW64\Dcalgo32.exeC:\Windows\system32\Dcalgo32.exe58⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\Dagiil32.exeC:\Windows\system32\Dagiil32.exe59⤵
- Executes dropped EXE
PID:4860 -
C:\Windows\SysWOW64\Dphifcoi.exeC:\Windows\system32\Dphifcoi.exe60⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\Dfdbojmq.exeC:\Windows\system32\Dfdbojmq.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:3240 -
C:\Windows\SysWOW64\Dakbckbe.exeC:\Windows\system32\Dakbckbe.exe62⤵
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\Ebploj32.exeC:\Windows\system32\Ebploj32.exe63⤵
- Executes dropped EXE
PID:3940 -
C:\Windows\SysWOW64\Ehlaaddj.exeC:\Windows\system32\Ehlaaddj.exe64⤵
- Executes dropped EXE
PID:3952 -
C:\Windows\SysWOW64\Eofinnkf.exeC:\Windows\system32\Eofinnkf.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:800 -
C:\Windows\SysWOW64\Ehonfc32.exeC:\Windows\system32\Ehonfc32.exe66⤵PID:860
-
C:\Windows\SysWOW64\Fokbim32.exeC:\Windows\system32\Fokbim32.exe67⤵PID:4404
-
C:\Windows\SysWOW64\Ffekegon.exeC:\Windows\system32\Ffekegon.exe68⤵
- Drops file in System32 directory
PID:1836 -
C:\Windows\SysWOW64\Fcikolnh.exeC:\Windows\system32\Fcikolnh.exe69⤵PID:5008
-
C:\Windows\SysWOW64\Fjepaecb.exeC:\Windows\system32\Fjepaecb.exe70⤵PID:3208
-
C:\Windows\SysWOW64\Fmclmabe.exeC:\Windows\system32\Fmclmabe.exe71⤵PID:1348
-
C:\Windows\SysWOW64\Fflaff32.exeC:\Windows\system32\Fflaff32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4328 -
C:\Windows\SysWOW64\Fmficqpc.exeC:\Windows\system32\Fmficqpc.exe73⤵PID:4284
-
C:\Windows\SysWOW64\Gcpapkgp.exeC:\Windows\system32\Gcpapkgp.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1292 -
C:\Windows\SysWOW64\Gqdbiofi.exeC:\Windows\system32\Gqdbiofi.exe75⤵PID:3192
-
C:\Windows\SysWOW64\Gmkbnp32.exeC:\Windows\system32\Gmkbnp32.exe76⤵
- Drops file in System32 directory
PID:1116 -
C:\Windows\SysWOW64\Gcekkjcj.exeC:\Windows\system32\Gcekkjcj.exe77⤵
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\Gqikdn32.exeC:\Windows\system32\Gqikdn32.exe78⤵PID:3592
-
C:\Windows\SysWOW64\Gjapmdid.exeC:\Windows\system32\Gjapmdid.exe79⤵PID:2344
-
C:\Windows\SysWOW64\Gbldaffp.exeC:\Windows\system32\Gbldaffp.exe80⤵PID:1440
-
C:\Windows\SysWOW64\Gjclbc32.exeC:\Windows\system32\Gjclbc32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:212 -
C:\Windows\SysWOW64\Gppekj32.exeC:\Windows\system32\Gppekj32.exe82⤵
- Drops file in System32 directory
PID:2376 -
C:\Windows\SysWOW64\Hboagf32.exeC:\Windows\system32\Hboagf32.exe83⤵PID:808
-
C:\Windows\SysWOW64\Hmdedo32.exeC:\Windows\system32\Hmdedo32.exe84⤵PID:1444
-
C:\Windows\SysWOW64\Icgqggce.exeC:\Windows\system32\Icgqggce.exe85⤵PID:3844
-
C:\Windows\SysWOW64\Iidipnal.exeC:\Windows\system32\Iidipnal.exe86⤵PID:3288
-
C:\Windows\SysWOW64\Impepm32.exeC:\Windows\system32\Impepm32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5076 -
C:\Windows\SysWOW64\Ibmmhdhm.exeC:\Windows\system32\Ibmmhdhm.exe88⤵PID:4208
-
C:\Windows\SysWOW64\Ijdeiaio.exeC:\Windows\system32\Ijdeiaio.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4064 -
C:\Windows\SysWOW64\Icljbg32.exeC:\Windows\system32\Icljbg32.exe90⤵
- Modifies registry class
PID:836 -
C:\Windows\SysWOW64\Ifjfnb32.exeC:\Windows\system32\Ifjfnb32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3692 -
C:\Windows\SysWOW64\Iiibkn32.exeC:\Windows\system32\Iiibkn32.exe92⤵
- Drops file in System32 directory
- Modifies registry class
PID:2408 -
C:\Windows\SysWOW64\Ipckgh32.exeC:\Windows\system32\Ipckgh32.exe93⤵
- Modifies registry class
PID:1304 -
C:\Windows\SysWOW64\Ibagcc32.exeC:\Windows\system32\Ibagcc32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3524 -
C:\Windows\SysWOW64\Ijhodq32.exeC:\Windows\system32\Ijhodq32.exe95⤵
- Modifies registry class
PID:4940 -
C:\Windows\SysWOW64\Ifopiajn.exeC:\Windows\system32\Ifopiajn.exe96⤵
- Modifies registry class
PID:1884 -
C:\Windows\SysWOW64\Imihfl32.exeC:\Windows\system32\Imihfl32.exe97⤵PID:4088
-
C:\Windows\SysWOW64\Jiphkm32.exeC:\Windows\system32\Jiphkm32.exe98⤵PID:3972
-
C:\Windows\SysWOW64\Jdemhe32.exeC:\Windows\system32\Jdemhe32.exe99⤵PID:5064
-
C:\Windows\SysWOW64\Jmnaakne.exeC:\Windows\system32\Jmnaakne.exe100⤵
- Drops file in System32 directory
PID:4988 -
C:\Windows\SysWOW64\Jplmmfmi.exeC:\Windows\system32\Jplmmfmi.exe101⤵
- Modifies registry class
PID:4768 -
C:\Windows\SysWOW64\Jidbflcj.exeC:\Windows\system32\Jidbflcj.exe102⤵PID:4608
-
C:\Windows\SysWOW64\Jaljgidl.exeC:\Windows\system32\Jaljgidl.exe103⤵PID:2116
-
C:\Windows\SysWOW64\Jbmfoa32.exeC:\Windows\system32\Jbmfoa32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1820 -
C:\Windows\SysWOW64\Jkdnpo32.exeC:\Windows\system32\Jkdnpo32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1988 -
C:\Windows\SysWOW64\Jbocea32.exeC:\Windows\system32\Jbocea32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3400 -
C:\Windows\SysWOW64\Jkfkfohj.exeC:\Windows\system32\Jkfkfohj.exe107⤵
- Drops file in System32 directory
PID:3640 -
C:\Windows\SysWOW64\Kaqcbi32.exeC:\Windows\system32\Kaqcbi32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4360 -
C:\Windows\SysWOW64\Kbapjafe.exeC:\Windows\system32\Kbapjafe.exe109⤵PID:5072
-
C:\Windows\SysWOW64\Kkihknfg.exeC:\Windows\system32\Kkihknfg.exe110⤵PID:4960
-
C:\Windows\SysWOW64\Kmgdgjek.exeC:\Windows\system32\Kmgdgjek.exe111⤵
- Drops file in System32 directory
PID:4856 -
C:\Windows\SysWOW64\Kdaldd32.exeC:\Windows\system32\Kdaldd32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2268 -
C:\Windows\SysWOW64\Kinemkko.exeC:\Windows\system32\Kinemkko.exe113⤵PID:4316
-
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5028 -
C:\Windows\SysWOW64\Kajfig32.exeC:\Windows\system32\Kajfig32.exe115⤵PID:1736
-
C:\Windows\SysWOW64\Gdoihpbk.exeC:\Windows\system32\Gdoihpbk.exe116⤵PID:1076
-
C:\Windows\SysWOW64\Bkoigdom.exeC:\Windows\system32\Bkoigdom.exe117⤵PID:4200
-
C:\Windows\SysWOW64\Dlkbjqgm.exeC:\Windows\system32\Dlkbjqgm.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3044 -
C:\Windows\SysWOW64\Dpgnjo32.exeC:\Windows\system32\Dpgnjo32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4652 -
C:\Windows\SysWOW64\Eiaoid32.exeC:\Windows\system32\Eiaoid32.exe120⤵
- Modifies registry class
PID:3996 -
C:\Windows\SysWOW64\Eblpgjha.exeC:\Windows\system32\Eblpgjha.exe121⤵
- Modifies registry class
PID:4908 -
C:\Windows\SysWOW64\Eleepoob.exeC:\Windows\system32\Eleepoob.exe122⤵PID:1864
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-