Analysis
-
max time kernel
240s -
max time network
285s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15-10-2023 19:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe
-
Size
120KB
-
MD5
8adec27c5ba95ce5534d654e5d0a0d80
-
SHA1
67ebeb9fed7f994c1af26de246113d35d5dcd405
-
SHA256
72dd6799f0607858c69cca92bdbfd34ec6e18e1831cff424984d10781f743bf3
-
SHA512
c2e9b9623cc8ed1e8d14737eb1f0f9eafc43a950a6d9422cb3207cd643684fb71241638a6f5855bd4c57a195950528553a50d472d81b4d734b43c30c3d4b6991
-
SSDEEP
3072:8gEDsHUJcwyoFOtgz0Rk2KWe2203H/6TC+qF1SsB1bw4AVRrd9:rEDs0JhloRzKt29C81NBy9
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eojpqpih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ilneef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jankcafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lnnkmdfq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dejdhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dmgebipf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hlebog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hkhdfhmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ccdnep32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpgjob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hpckee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hbblbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aikine32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apeakonl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfkkmaol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jbnhmdmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ceekmhic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkiifnab.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpdnjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hmnmil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pcfifk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ciojhg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdhmmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jmjidneo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qhjhoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dlpdifda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hfmcapna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hohhfbkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jjkmhbek.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppjjpoih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddanoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bpgjob32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkdbmblb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgmogcpc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkhdfhmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kagnipna.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghqqpd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbmnfajm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hiffbl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjbncqkj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmjidneo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bghdeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cnblbiic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edbonh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hbmnfajm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kkkigf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qobcfklm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnblbiic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Algida32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bpdnjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dklkkoqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kibcnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcbngf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qdolobjd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilneef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hjbncqkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pomjkl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciojhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dejdhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bdhmmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Enmplm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ppjjpoih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qappbgkq.exe -
Executes dropped EXE 64 IoCs
pid Process 2480 Nidhfgpl.exe 2448 Qgeckn32.exe 2928 Algida32.exe 2676 Aikine32.exe 2688 Apeakonl.exe 1732 Aeajcf32.exe 1964 Aahkhgag.exe 528 Bdiciboh.exe 1372 Bmdehgcf.exe 1104 Bdnmda32.exe 636 Bkheal32.exe 2824 Bpdnjb32.exe 1176 Bpgjob32.exe 1388 Cgcoal32.exe 1552 Cocnanmd.exe 920 Cemfnh32.exe 848 Cgnbepjp.exe 2420 Dklkkoqf.exe 2000 Dpicceon.exe 2852 Dgclpp32.exe 532 Dlpdifda.exe 1244 Edbonh32.exe 460 Eligoe32.exe 2564 Ebfpglkn.exe 2536 Eojpqpih.exe 2956 Enmplm32.exe 2892 Edghighp.exe 2616 Ekqqea32.exe 2556 Ebkibk32.exe 2628 Eqpfchka.exe 2504 Fgjnpb32.exe 2764 Fqbbig32.exe 1960 Fidmniqa.exe 2184 Flcjjdpe.exe 768 Gabohk32.exe 2520 Gjjcqpbj.exe 344 Ghndjd32.exe 592 Gmklbk32.exe 1232 Ghqqpd32.exe 1344 Hbmnfajm.exe 1752 Hiffbl32.exe 1632 Hlebog32.exe 940 Hpckee32.exe 1180 Hfmcapna.exe 2224 Hohhfbkl.exe 1940 Hbcdfq32.exe 2076 Hhqmogam.exe 2036 Hlliof32.exe 888 Hbfalpab.exe 1428 Ilneef32.exe 2016 Eghflc32.exe 3000 Fkdbmblb.exe 2500 Fanjil32.exe 2508 Fhhbffkk.exe 2960 Fiiono32.exe 1404 Fgmogcpc.exe 2652 Fkhkha32.exe 1628 Fmggdm32.exe 832 Fcdpld32.exe 1612 Ggaeae32.exe 2820 Gjpama32.exe 1520 Hmnmil32.exe 852 Hqjijk32.exe 2188 Hgdagelg.exe -
Loads dropped DLL 64 IoCs
pid Process 3016 8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe 3016 8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe 2480 Nidhfgpl.exe 2480 Nidhfgpl.exe 2448 Qgeckn32.exe 2448 Qgeckn32.exe 2928 Algida32.exe 2928 Algida32.exe 2676 Aikine32.exe 2676 Aikine32.exe 2688 Apeakonl.exe 2688 Apeakonl.exe 1732 Aeajcf32.exe 1732 Aeajcf32.exe 1964 Aahkhgag.exe 1964 Aahkhgag.exe 528 Bdiciboh.exe 528 Bdiciboh.exe 1372 Bmdehgcf.exe 1372 Bmdehgcf.exe 1104 Bdnmda32.exe 1104 Bdnmda32.exe 636 Bkheal32.exe 636 Bkheal32.exe 2824 Bpdnjb32.exe 2824 Bpdnjb32.exe 1176 Bpgjob32.exe 1176 Bpgjob32.exe 1388 Cgcoal32.exe 1388 Cgcoal32.exe 1552 Cocnanmd.exe 1552 Cocnanmd.exe 920 Cemfnh32.exe 920 Cemfnh32.exe 848 Cgnbepjp.exe 848 Cgnbepjp.exe 2420 Dklkkoqf.exe 2420 Dklkkoqf.exe 2000 Dpicceon.exe 2000 Dpicceon.exe 2852 Dgclpp32.exe 2852 Dgclpp32.exe 532 Dlpdifda.exe 532 Dlpdifda.exe 1244 Edbonh32.exe 1244 Edbonh32.exe 460 Eligoe32.exe 460 Eligoe32.exe 2564 Ebfpglkn.exe 2564 Ebfpglkn.exe 2536 Eojpqpih.exe 2536 Eojpqpih.exe 2956 Enmplm32.exe 2956 Enmplm32.exe 2892 Edghighp.exe 2892 Edghighp.exe 2616 Ekqqea32.exe 2616 Ekqqea32.exe 2556 Ebkibk32.exe 2556 Ebkibk32.exe 2628 Eqpfchka.exe 2628 Eqpfchka.exe 2504 Fgjnpb32.exe 2504 Fgjnpb32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ghndjd32.exe Gjjcqpbj.exe File created C:\Windows\SysWOW64\Fgmogcpc.exe Fiiono32.exe File created C:\Windows\SysWOW64\Lmnecb32.dll Ddanoc32.exe File opened for modification C:\Windows\SysWOW64\Dklkkoqf.exe Cgnbepjp.exe File opened for modification C:\Windows\SysWOW64\Edghighp.exe Enmplm32.exe File opened for modification C:\Windows\SysWOW64\Hijgimnp.exe Hfkkmaol.exe File created C:\Windows\SysWOW64\Ekqqea32.exe Edghighp.exe File created C:\Windows\SysWOW64\Ibcoimjn.dll Gabohk32.exe File created C:\Windows\SysWOW64\Jfnnkidj.dll Eghflc32.exe File opened for modification C:\Windows\SysWOW64\Cgnbepjp.exe Cemfnh32.exe File opened for modification C:\Windows\SysWOW64\Gjpama32.exe Ggaeae32.exe File opened for modification C:\Windows\SysWOW64\Hbblbb32.exe Hkhdfhmc.exe File created C:\Windows\SysWOW64\Jegknp32.exe Jbinbd32.exe File created C:\Windows\SysWOW64\Pahqoi32.exe Iddieoqi.exe File created C:\Windows\SysWOW64\Pmpfjpji.dll Qdolobjd.exe File created C:\Windows\SysWOW64\Ghqqpd32.exe Gmklbk32.exe File opened for modification C:\Windows\SysWOW64\Kpmkjlbi.exe Kibcnb32.exe File opened for modification C:\Windows\SysWOW64\Cfnaglfn.exe Cpdija32.exe File created C:\Windows\SysWOW64\Mkbjgp32.dll Bdnmda32.exe File created C:\Windows\SysWOW64\Hiffbl32.exe Hbmnfajm.exe File created C:\Windows\SysWOW64\Kkqgemem.dll Dejdhg32.exe File opened for modification C:\Windows\SysWOW64\Hbmnfajm.exe Ghqqpd32.exe File opened for modification C:\Windows\SysWOW64\Fhhbffkk.exe Fanjil32.exe File opened for modification C:\Windows\SysWOW64\Bkheal32.exe Bdnmda32.exe File created C:\Windows\SysWOW64\Nkafoflh.dll Gjjcqpbj.exe File created C:\Windows\SysWOW64\Kflcbgmf.dll Jeenip32.exe File created C:\Windows\SysWOW64\Igqebb32.dll Nmohjopk.exe File created C:\Windows\SysWOW64\Bmjhod32.dll Hqjijk32.exe File opened for modification C:\Windows\SysWOW64\Loinlg32.exe Lljbpl32.exe File opened for modification C:\Windows\SysWOW64\Ebkibk32.exe Ekqqea32.exe File created C:\Windows\SysWOW64\Gabohk32.exe Flcjjdpe.exe File created C:\Windows\SysWOW64\Eghflc32.exe Ilneef32.exe File created C:\Windows\SysWOW64\Fajkdejh.dll Hkhdfhmc.exe File created C:\Windows\SysWOW64\Eolegi32.dll Bpdnjb32.exe File created C:\Windows\SysWOW64\Habgan32.dll Ebfpglkn.exe File created C:\Windows\SysWOW64\Edjjfpjc.dll Bdhmmm32.exe File created C:\Windows\SysWOW64\Nphbcgje.dll Ccdnep32.exe File created C:\Windows\SysWOW64\Pkfbibki.dll Algida32.exe File created C:\Windows\SysWOW64\Imoqbo32.dll Apeakonl.exe File created C:\Windows\SysWOW64\Iqkkbhoi.dll Fmggdm32.exe File opened for modification C:\Windows\SysWOW64\Ggaeae32.exe Fcdpld32.exe File created C:\Windows\SysWOW64\Noiljd32.dll Higkdm32.exe File created C:\Windows\SysWOW64\Bogmfb32.dll Pcfifk32.exe File created C:\Windows\SysWOW64\Jncqjjog.dll Pahqoi32.exe File opened for modification C:\Windows\SysWOW64\Hgdagelg.exe Hqjijk32.exe File opened for modification C:\Windows\SysWOW64\Higkdm32.exe Hgfnlejd.exe File opened for modification C:\Windows\SysWOW64\Hfkkmaol.exe Hoacqggo.exe File created C:\Windows\SysWOW64\Omanfl32.dll Hbblbb32.exe File created C:\Windows\SysWOW64\Fqbbig32.exe Fgjnpb32.exe File opened for modification C:\Windows\SysWOW64\Gabohk32.exe Flcjjdpe.exe File created C:\Windows\SysWOW64\Hbcdfq32.exe Hohhfbkl.exe File created C:\Windows\SysWOW64\Odbhgfci.dll Hfkkmaol.exe File created C:\Windows\SysWOW64\Pfionfel.exe Pheodafc.exe File opened for modification C:\Windows\SysWOW64\Bjefedjq.exe Bdhmmm32.exe File created C:\Windows\SysWOW64\Pedgbn32.dll Enmplm32.exe File opened for modification C:\Windows\SysWOW64\Jlackjgd.exe Jegknp32.exe File created C:\Windows\SysWOW64\Cbikgl32.exe Clocjb32.exe File created C:\Windows\SysWOW64\Poaopl32.dll Dmgebipf.exe File created C:\Windows\SysWOW64\Bdiciboh.exe Aahkhgag.exe File created C:\Windows\SysWOW64\Pomjkl32.exe Ppjjpoih.exe File created C:\Windows\SysWOW64\Dmeemifp.dll Aahkhgag.exe File created C:\Windows\SysWOW64\Gqcbihdb.dll Flcjjdpe.exe File created C:\Windows\SysWOW64\Fdjcjebn.dll Hiffbl32.exe File created C:\Windows\SysWOW64\Inlfcmip.dll Gimpfdch.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hkhdfhmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jeenip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ieegpg32.dll" Fkdbmblb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hmnmil32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cpdija32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Algida32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bdnmda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbkhjjg.dll" Cocnanmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cocnanmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbnleo32.dll" Hfmcapna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cemfnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Edbonh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jphepidb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inlfcmip.dll" Gimpfdch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qnedbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obbdgajq.dll" Ghndjd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fanjil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Higkdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eklmimec.dll" Ciojhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imcafcpf.dll" Ebkibk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmdhkn32.dll" Ilneef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fanjil32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hoofkgib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lljbpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfjbqafo.dll" Kdaajl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kdaajl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbmlkcac.dll" Pjbnie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odfloh32.dll" Jegknp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gimpfdch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cbikgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fomflmlg.dll" Nidhfgpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eojpqpih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onjjidlo.dll" Fcdpld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcdjqd32.dll" Kpmkjlbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pfionfel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hbcdfq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cgcoal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkommh32.dll" Eojpqpih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hbfalpab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kkkigf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gghcjdmg.dll" Dlpdifda.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fkhkha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bmdehgcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gjjcqpbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eghflc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fmggdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hingpo32.dll" Dkgmqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Daqemh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhljbpfd.dll" 8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdjcjebn.dll" Hiffbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iqkkbhoi.dll" Fmggdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjjpbn32.dll" Jbinbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jncqjjog.dll" Pahqoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aeajcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgfblqne.dll" Fidmniqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hbmnfajm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hlebog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fkdbmblb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hoofkgib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ghndjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bdhmmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmaphoqe.dll" Gmklbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hfmcapna.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2480 3016 8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe 27 PID 3016 wrote to memory of 2480 3016 8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe 27 PID 3016 wrote to memory of 2480 3016 8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe 27 PID 3016 wrote to memory of 2480 3016 8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe 27 PID 2480 wrote to memory of 2448 2480 Nidhfgpl.exe 28 PID 2480 wrote to memory of 2448 2480 Nidhfgpl.exe 28 PID 2480 wrote to memory of 2448 2480 Nidhfgpl.exe 28 PID 2480 wrote to memory of 2448 2480 Nidhfgpl.exe 28 PID 2448 wrote to memory of 2928 2448 Qgeckn32.exe 29 PID 2448 wrote to memory of 2928 2448 Qgeckn32.exe 29 PID 2448 wrote to memory of 2928 2448 Qgeckn32.exe 29 PID 2448 wrote to memory of 2928 2448 Qgeckn32.exe 29 PID 2928 wrote to memory of 2676 2928 Algida32.exe 30 PID 2928 wrote to memory of 2676 2928 Algida32.exe 30 PID 2928 wrote to memory of 2676 2928 Algida32.exe 30 PID 2928 wrote to memory of 2676 2928 Algida32.exe 30 PID 2676 wrote to memory of 2688 2676 Aikine32.exe 32 PID 2676 wrote to memory of 2688 2676 Aikine32.exe 32 PID 2676 wrote to memory of 2688 2676 Aikine32.exe 32 PID 2676 wrote to memory of 2688 2676 Aikine32.exe 32 PID 2688 wrote to memory of 1732 2688 Apeakonl.exe 31 PID 2688 wrote to memory of 1732 2688 Apeakonl.exe 31 PID 2688 wrote to memory of 1732 2688 Apeakonl.exe 31 PID 2688 wrote to memory of 1732 2688 Apeakonl.exe 31 PID 1732 wrote to memory of 1964 1732 Aeajcf32.exe 33 PID 1732 wrote to memory of 1964 1732 Aeajcf32.exe 33 PID 1732 wrote to memory of 1964 1732 Aeajcf32.exe 33 PID 1732 wrote to memory of 1964 1732 Aeajcf32.exe 33 PID 1964 wrote to memory of 528 1964 Aahkhgag.exe 34 PID 1964 wrote to memory of 528 1964 Aahkhgag.exe 34 PID 1964 wrote to memory of 528 1964 Aahkhgag.exe 34 PID 1964 wrote to memory of 528 1964 Aahkhgag.exe 34 PID 528 wrote to memory of 1372 528 Bdiciboh.exe 35 PID 528 wrote to memory of 1372 528 Bdiciboh.exe 35 PID 528 wrote to memory of 1372 528 Bdiciboh.exe 35 PID 528 wrote to memory of 1372 528 Bdiciboh.exe 35 PID 1372 wrote to memory of 1104 1372 Bmdehgcf.exe 37 PID 1372 wrote to memory of 1104 1372 Bmdehgcf.exe 37 PID 1372 wrote to memory of 1104 1372 Bmdehgcf.exe 37 PID 1372 wrote to memory of 1104 1372 Bmdehgcf.exe 37 PID 1104 wrote to memory of 636 1104 Bdnmda32.exe 36 PID 1104 wrote to memory of 636 1104 Bdnmda32.exe 36 PID 1104 wrote to memory of 636 1104 Bdnmda32.exe 36 PID 1104 wrote to memory of 636 1104 Bdnmda32.exe 36 PID 636 wrote to memory of 2824 636 Bkheal32.exe 38 PID 636 wrote to memory of 2824 636 Bkheal32.exe 38 PID 636 wrote to memory of 2824 636 Bkheal32.exe 38 PID 636 wrote to memory of 2824 636 Bkheal32.exe 38 PID 2824 wrote to memory of 1176 2824 Bpdnjb32.exe 39 PID 2824 wrote to memory of 1176 2824 Bpdnjb32.exe 39 PID 2824 wrote to memory of 1176 2824 Bpdnjb32.exe 39 PID 2824 wrote to memory of 1176 2824 Bpdnjb32.exe 39 PID 1176 wrote to memory of 1388 1176 Bpgjob32.exe 40 PID 1176 wrote to memory of 1388 1176 Bpgjob32.exe 40 PID 1176 wrote to memory of 1388 1176 Bpgjob32.exe 40 PID 1176 wrote to memory of 1388 1176 Bpgjob32.exe 40 PID 1388 wrote to memory of 1552 1388 Cgcoal32.exe 41 PID 1388 wrote to memory of 1552 1388 Cgcoal32.exe 41 PID 1388 wrote to memory of 1552 1388 Cgcoal32.exe 41 PID 1388 wrote to memory of 1552 1388 Cgcoal32.exe 41 PID 1552 wrote to memory of 920 1552 Cocnanmd.exe 42 PID 1552 wrote to memory of 920 1552 Cocnanmd.exe 42 PID 1552 wrote to memory of 920 1552 Cocnanmd.exe 42 PID 1552 wrote to memory of 920 1552 Cocnanmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe"C:\Users\Admin\AppData\Local\Temp\8adec27c5ba95ce5534d654e5d0a0d80_exe32.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\Nidhfgpl.exeC:\Windows\system32\Nidhfgpl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\Qgeckn32.exeC:\Windows\system32\Qgeckn32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\Algida32.exeC:\Windows\system32\Algida32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\Aikine32.exeC:\Windows\system32\Aikine32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\Apeakonl.exeC:\Windows\system32\Apeakonl.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2688
-
-
-
-
-
-
C:\Windows\SysWOW64\Aeajcf32.exeC:\Windows\system32\Aeajcf32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\Aahkhgag.exeC:\Windows\system32\Aahkhgag.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\Bdiciboh.exeC:\Windows\system32\Bdiciboh.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\Bmdehgcf.exeC:\Windows\system32\Bmdehgcf.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\Bdnmda32.exeC:\Windows\system32\Bdnmda32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1104
-
-
-
-
-
C:\Windows\SysWOW64\Bkheal32.exeC:\Windows\system32\Bkheal32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\Bpdnjb32.exeC:\Windows\system32\Bpdnjb32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\Bpgjob32.exeC:\Windows\system32\Bpgjob32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\Cgcoal32.exeC:\Windows\system32\Cgcoal32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\Cocnanmd.exeC:\Windows\system32\Cocnanmd.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\Cemfnh32.exeC:\Windows\system32\Cemfnh32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:920 -
C:\Windows\SysWOW64\Cgnbepjp.exeC:\Windows\system32\Cgnbepjp.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:848 -
C:\Windows\SysWOW64\Dklkkoqf.exeC:\Windows\system32\Dklkkoqf.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2420 -
C:\Windows\SysWOW64\Dpicceon.exeC:\Windows\system32\Dpicceon.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2000 -
C:\Windows\SysWOW64\Dgclpp32.exeC:\Windows\system32\Dgclpp32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Windows\SysWOW64\Dlpdifda.exeC:\Windows\system32\Dlpdifda.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:532 -
C:\Windows\SysWOW64\Edbonh32.exeC:\Windows\system32\Edbonh32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1244 -
C:\Windows\SysWOW64\Eligoe32.exeC:\Windows\system32\Eligoe32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:460 -
C:\Windows\SysWOW64\Ebfpglkn.exeC:\Windows\system32\Ebfpglkn.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2564 -
C:\Windows\SysWOW64\Eojpqpih.exeC:\Windows\system32\Eojpqpih.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\Enmplm32.exeC:\Windows\system32\Enmplm32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2956 -
C:\Windows\SysWOW64\Edghighp.exeC:\Windows\system32\Edghighp.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\Ekqqea32.exeC:\Windows\system32\Ekqqea32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2616 -
C:\Windows\SysWOW64\Ebkibk32.exeC:\Windows\system32\Ebkibk32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2556 -
C:\Windows\SysWOW64\Eqpfchka.exeC:\Windows\system32\Eqpfchka.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2628 -
C:\Windows\SysWOW64\Fgjnpb32.exeC:\Windows\system32\Fgjnpb32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\Fqbbig32.exeC:\Windows\system32\Fqbbig32.exe22⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\Fidmniqa.exeC:\Windows\system32\Fidmniqa.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:1960 -
C:\Windows\SysWOW64\Flcjjdpe.exeC:\Windows\system32\Flcjjdpe.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2184 -
C:\Windows\SysWOW64\Gabohk32.exeC:\Windows\system32\Gabohk32.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:768 -
C:\Windows\SysWOW64\Gjjcqpbj.exeC:\Windows\system32\Gjjcqpbj.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Ghndjd32.exeC:\Windows\system32\Ghndjd32.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:344 -
C:\Windows\SysWOW64\Gmklbk32.exeC:\Windows\system32\Gmklbk32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:592 -
C:\Windows\SysWOW64\Ghqqpd32.exeC:\Windows\system32\Ghqqpd32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1232 -
C:\Windows\SysWOW64\Hbmnfajm.exeC:\Windows\system32\Hbmnfajm.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1344 -
C:\Windows\SysWOW64\Hiffbl32.exeC:\Windows\system32\Hiffbl32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1752 -
C:\Windows\SysWOW64\Hlebog32.exeC:\Windows\system32\Hlebog32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1632 -
C:\Windows\SysWOW64\Hpckee32.exeC:\Windows\system32\Hpckee32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:940 -
C:\Windows\SysWOW64\Hfmcapna.exeC:\Windows\system32\Hfmcapna.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1180 -
C:\Windows\SysWOW64\Hohhfbkl.exeC:\Windows\system32\Hohhfbkl.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2224 -
C:\Windows\SysWOW64\Hbcdfq32.exeC:\Windows\system32\Hbcdfq32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:1940 -
C:\Windows\SysWOW64\Hhqmogam.exeC:\Windows\system32\Hhqmogam.exe37⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\Hlliof32.exeC:\Windows\system32\Hlliof32.exe38⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\Hbfalpab.exeC:\Windows\system32\Hbfalpab.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:888 -
C:\Windows\SysWOW64\Ilneef32.exeC:\Windows\system32\Ilneef32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1428 -
C:\Windows\SysWOW64\Eghflc32.exeC:\Windows\system32\Eghflc32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\Fkdbmblb.exeC:\Windows\system32\Fkdbmblb.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3000 -
C:\Windows\SysWOW64\Fanjil32.exeC:\Windows\system32\Fanjil32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2500 -
C:\Windows\SysWOW64\Fhhbffkk.exeC:\Windows\system32\Fhhbffkk.exe44⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\Fiiono32.exeC:\Windows\system32\Fiiono32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2960 -
C:\Windows\SysWOW64\Fgmogcpc.exeC:\Windows\system32\Fgmogcpc.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Fkhkha32.exeC:\Windows\system32\Fkhkha32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:2652 -
C:\Windows\SysWOW64\Fmggdm32.exeC:\Windows\system32\Fmggdm32.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1628 -
C:\Windows\SysWOW64\Fcdpld32.exeC:\Windows\system32\Fcdpld32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:832 -
C:\Windows\SysWOW64\Ggaeae32.exeC:\Windows\system32\Ggaeae32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1612 -
C:\Windows\SysWOW64\Gjpama32.exeC:\Windows\system32\Gjpama32.exe51⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\SysWOW64\Hmnmil32.exeC:\Windows\system32\Hmnmil32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1520 -
C:\Windows\SysWOW64\Hqjijk32.exeC:\Windows\system32\Hqjijk32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:852 -
C:\Windows\SysWOW64\Hgdagelg.exeC:\Windows\system32\Hgdagelg.exe54⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\Hjbncqkj.exeC:\Windows\system32\Hjbncqkj.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1936 -
C:\Windows\SysWOW64\Hoofkgib.exeC:\Windows\system32\Hoofkgib.exe56⤵
- Modifies registry class
PID:2828 -
C:\Windows\SysWOW64\Hgfnlejd.exeC:\Windows\system32\Hgfnlejd.exe57⤵
- Drops file in System32 directory
PID:1660 -
C:\Windows\SysWOW64\Higkdm32.exeC:\Windows\system32\Higkdm32.exe58⤵
- Drops file in System32 directory
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Hoacqggo.exeC:\Windows\system32\Hoacqggo.exe59⤵
- Drops file in System32 directory
PID:2240 -
C:\Windows\SysWOW64\Hfkkmaol.exeC:\Windows\system32\Hfkkmaol.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1316 -
C:\Windows\SysWOW64\Hijgimnp.exeC:\Windows\system32\Hijgimnp.exe61⤵PID:1712
-
C:\Windows\SysWOW64\Hkhdfhmc.exeC:\Windows\system32\Hkhdfhmc.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1900 -
C:\Windows\SysWOW64\Hbblbb32.exeC:\Windows\system32\Hbblbb32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\Hmhppk32.exeC:\Windows\system32\Hmhppk32.exe64⤵PID:2996
-
C:\Windows\SysWOW64\Hfpehq32.exeC:\Windows\system32\Hfpehq32.exe65⤵PID:2316
-
C:\Windows\SysWOW64\Jpfikjfe.exeC:\Windows\system32\Jpfikjfe.exe66⤵PID:936
-
C:\Windows\SysWOW64\Jjkmhbek.exeC:\Windows\system32\Jjkmhbek.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1420 -
C:\Windows\SysWOW64\Jmjidneo.exeC:\Windows\system32\Jmjidneo.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2852 -
C:\Windows\SysWOW64\Jphepidb.exeC:\Windows\system32\Jphepidb.exe69⤵
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\Jeenip32.exeC:\Windows\system32\Jeenip32.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:2764 -
C:\Windows\SysWOW64\Jbinbd32.exeC:\Windows\system32\Jbinbd32.exe71⤵
- Drops file in System32 directory
- Modifies registry class
PID:1460 -
C:\Windows\SysWOW64\Jegknp32.exeC:\Windows\system32\Jegknp32.exe72⤵
- Drops file in System32 directory
- Modifies registry class
PID:940 -
C:\Windows\SysWOW64\Jlackjgd.exeC:\Windows\system32\Jlackjgd.exe73⤵PID:1704
-
C:\Windows\SysWOW64\Jankcafl.exeC:\Windows\system32\Jankcafl.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2720 -
C:\Windows\SysWOW64\Jbnhmdmn.exeC:\Windows\system32\Jbnhmdmn.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2740 -
C:\Windows\SysWOW64\Jhjpekkf.exeC:\Windows\system32\Jhjpekkf.exe76⤵PID:2516
-
C:\Windows\SysWOW64\Kdaajl32.exeC:\Windows\system32\Kdaajl32.exe77⤵
- Modifies registry class
PID:2668 -
C:\Windows\SysWOW64\Kkkigf32.exeC:\Windows\system32\Kkkigf32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\Kagnipna.exeC:\Windows\system32\Kagnipna.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1676 -
C:\Windows\SysWOW64\Kibcnb32.exeC:\Windows\system32\Kibcnb32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:904 -
C:\Windows\SysWOW64\Kpmkjlbi.exeC:\Windows\system32\Kpmkjlbi.exe81⤵
- Modifies registry class
PID:2636 -
C:\Windows\SysWOW64\Lcbngf32.exeC:\Windows\system32\Lcbngf32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:704 -
C:\Windows\SysWOW64\Lljbpl32.exeC:\Windows\system32\Lljbpl32.exe83⤵
- Drops file in System32 directory
- Modifies registry class
PID:1292 -
C:\Windows\SysWOW64\Loinlg32.exeC:\Windows\system32\Loinlg32.exe84⤵PID:1544
-
C:\Windows\SysWOW64\Lecfiahe.exeC:\Windows\system32\Lecfiahe.exe85⤵PID:1124
-
C:\Windows\SysWOW64\Lnnkmdfq.exeC:\Windows\system32\Lnnkmdfq.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1424 -
C:\Windows\SysWOW64\Lhcpkmef.exeC:\Windows\system32\Lhcpkmef.exe87⤵PID:1716
-
C:\Windows\SysWOW64\Nmohjopk.exeC:\Windows\system32\Nmohjopk.exe88⤵
- Drops file in System32 directory
PID:2180 -
C:\Windows\SysWOW64\Gimpfdch.exeC:\Windows\system32\Gimpfdch.exe89⤵
- Drops file in System32 directory
- Modifies registry class
PID:1224 -
C:\Windows\SysWOW64\Iddieoqi.exeC:\Windows\system32\Iddieoqi.exe90⤵
- Drops file in System32 directory
PID:2688 -
C:\Windows\SysWOW64\Pahqoi32.exeC:\Windows\system32\Pahqoi32.exe91⤵
- Drops file in System32 directory
- Modifies registry class
PID:1104 -
C:\Windows\SysWOW64\Pcfifk32.exeC:\Windows\system32\Pcfifk32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2040 -
C:\Windows\SysWOW64\Ppjjpoih.exeC:\Windows\system32\Ppjjpoih.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:532 -
C:\Windows\SysWOW64\Pomjkl32.exeC:\Windows\system32\Pomjkl32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1036 -
C:\Windows\SysWOW64\Palfgg32.exeC:\Windows\system32\Palfgg32.exe95⤵PID:2184
-
C:\Windows\SysWOW64\Pjbnie32.exeC:\Windows\system32\Pjbnie32.exe96⤵
- Modifies registry class
PID:1232 -
C:\Windows\SysWOW64\Pheodafc.exeC:\Windows\system32\Pheodafc.exe97⤵
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\Pfionfel.exeC:\Windows\system32\Pfionfel.exe98⤵
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Qobcfklm.exeC:\Windows\system32\Qobcfklm.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2592 -
C:\Windows\SysWOW64\Qnedbh32.exeC:\Windows\system32\Qnedbh32.exe100⤵
- Modifies registry class
PID:2568 -
C:\Windows\SysWOW64\Qappbgkq.exeC:\Windows\system32\Qappbgkq.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2432 -
C:\Windows\SysWOW64\Qdolobjd.exeC:\Windows\system32\Qdolobjd.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1856 -
C:\Windows\SysWOW64\Qhjhoa32.exeC:\Windows\system32\Qhjhoa32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1772 -
C:\Windows\SysWOW64\Bghdeo32.exeC:\Windows\system32\Bghdeo32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:892 -
C:\Windows\SysWOW64\Cnblbiic.exeC:\Windows\system32\Cnblbiic.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1320 -
C:\Windows\SysWOW64\Cpdija32.exeC:\Windows\system32\Cpdija32.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:2244 -
C:\Windows\SysWOW64\Cfnaglfn.exeC:\Windows\system32\Cfnaglfn.exe107⤵PID:2104
-
C:\Windows\SysWOW64\Cilmcgeb.exeC:\Windows\system32\Cilmcgeb.exe108⤵PID:1152
-
C:\Windows\SysWOW64\Cbdalmlb.exeC:\Windows\system32\Cbdalmlb.exe109⤵PID:1608
-
C:\Windows\SysWOW64\Ciojhg32.exeC:\Windows\system32\Ciojhg32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1032 -
C:\Windows\SysWOW64\Ccdnep32.exeC:\Windows\system32\Ccdnep32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1040 -
C:\Windows\SysWOW64\Ceekmhic.exeC:\Windows\system32\Ceekmhic.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2092 -
C:\Windows\SysWOW64\Clocjb32.exeC:\Windows\system32\Clocjb32.exe113⤵
- Drops file in System32 directory
PID:1108 -
C:\Windows\SysWOW64\Cbikgl32.exeC:\Windows\system32\Cbikgl32.exe114⤵
- Modifies registry class
PID:1428 -
C:\Windows\SysWOW64\Copllmna.exeC:\Windows\system32\Copllmna.exe115⤵PID:2500
-
C:\Windows\SysWOW64\Dejdhg32.exeC:\Windows\system32\Dejdhg32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\Dkgmqn32.exeC:\Windows\system32\Dkgmqn32.exe117⤵
- Modifies registry class
PID:1052 -
C:\Windows\SysWOW64\Daqemh32.exeC:\Windows\system32\Daqemh32.exe118⤵
- Modifies registry class
PID:1520 -
C:\Windows\SysWOW64\Dkiifnab.exeC:\Windows\system32\Dkiifnab.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1660 -
C:\Windows\SysWOW64\Dmgebipf.exeC:\Windows\system32\Dmgebipf.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:572 -
C:\Windows\SysWOW64\Ddanoc32.exeC:\Windows\system32\Ddanoc32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1012 -
C:\Windows\SysWOW64\Bdhmmm32.exeC:\Windows\system32\Bdhmmm32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2192
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-