Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
179s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2023, 20:02
Behavioral task
behavioral1
Sample
069abf2de5f3be8977c4aa87ebd2e3a0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
069abf2de5f3be8977c4aa87ebd2e3a0.exe
Resource
win10v2004-20231023-en
General
-
Target
069abf2de5f3be8977c4aa87ebd2e3a0.exe
-
Size
374KB
-
MD5
069abf2de5f3be8977c4aa87ebd2e3a0
-
SHA1
dd6505fd01569379c2f8af825956e8ef968a74dc
-
SHA256
b35038d24a471ccbf06e4bf213e39c2f7a534cee7893b8f17243b8a97b083297
-
SHA512
afb42453979640df04373389c771335af702068fed31f03a59cb5a474cca6ffbeb3eeb602f924d659641d34a1a6e652bec20f09ba172ea8796ac3a6f225a52df
-
SSDEEP
6144:A3Q0djMIb/XKP1zoQWixXwrw7+Eu6QnFw5+0pU8oStTf3runG/qoxfIkeI1SHkFl:UQEjMc/XSzoQBBjE6uidyzwr6AxfLeIR
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eohcon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hocjaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fgpilc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdkimdnk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ignndo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aoofej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndcdfnpa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogcfncjf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pedlpgqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gmbmefob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lqndahiq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ehmibdol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dffdjmme.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jemfbgiq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aghlfh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnndhi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmoabn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Olqofjhn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Clbdjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ikbfbdgf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emcbcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Edoegi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgjace32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akblpo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgeibicb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ldgclgcl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phfjmlhh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Libnapmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkijbooo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfnnhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ifjfhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jabgkpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Chokcakp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdfapjbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deanhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpnbhl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfcolblp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hocjaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ooalibaf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlikdq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmihpa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egijfjmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgijnk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijekidpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbgbjo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmphjfab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hdfapjbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ceaealoh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Medggidb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfcolblp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkiclepa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imdndbkn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceaealoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Niklip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Glbapoqh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkcjlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oeopgc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdmpck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ohahkojp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbdeba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Moqlcbce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbgbjo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 069abf2de5f3be8977c4aa87ebd2e3a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bchogd32.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0008000000022cd1-6.dat family_berbew behavioral2/files/0x0008000000022cd1-8.dat family_berbew behavioral2/files/0x0008000000022cdc-14.dat family_berbew behavioral2/files/0x0008000000022cdc-16.dat family_berbew behavioral2/files/0x0006000000022cf0-22.dat family_berbew behavioral2/files/0x0006000000022cf0-24.dat family_berbew behavioral2/files/0x0006000000022cf2-25.dat family_berbew behavioral2/files/0x0006000000022cf2-30.dat family_berbew behavioral2/files/0x0006000000022cf2-31.dat family_berbew behavioral2/files/0x0006000000022cf4-37.dat family_berbew behavioral2/files/0x0006000000022cf4-40.dat family_berbew behavioral2/files/0x0006000000022cf6-46.dat family_berbew behavioral2/files/0x0006000000022cf6-48.dat family_berbew behavioral2/files/0x0006000000022cf8-54.dat family_berbew behavioral2/files/0x0006000000022cf8-56.dat family_berbew behavioral2/files/0x0006000000022cfa-62.dat family_berbew behavioral2/files/0x0006000000022cfa-63.dat family_berbew behavioral2/files/0x0006000000022cfc-70.dat family_berbew behavioral2/files/0x0006000000022cfc-72.dat family_berbew behavioral2/files/0x0006000000022cfe-78.dat family_berbew behavioral2/files/0x0006000000022cfe-79.dat family_berbew behavioral2/files/0x0006000000022d00-81.dat family_berbew behavioral2/files/0x0006000000022d00-86.dat family_berbew behavioral2/files/0x0006000000022d00-88.dat family_berbew behavioral2/files/0x0006000000022d02-94.dat family_berbew behavioral2/files/0x0006000000022d02-96.dat family_berbew behavioral2/files/0x0006000000022d04-104.dat family_berbew behavioral2/files/0x0006000000022d06-110.dat family_berbew behavioral2/files/0x0006000000022d04-102.dat family_berbew behavioral2/files/0x0006000000022d06-111.dat family_berbew behavioral2/files/0x0006000000022d08-113.dat family_berbew behavioral2/files/0x0006000000022d08-118.dat family_berbew behavioral2/files/0x0006000000022d08-120.dat family_berbew behavioral2/files/0x0006000000022d0a-127.dat family_berbew behavioral2/files/0x0006000000022d0a-126.dat family_berbew behavioral2/files/0x0006000000022d0c-134.dat family_berbew behavioral2/files/0x0006000000022d0c-136.dat family_berbew behavioral2/files/0x0006000000022d0e-142.dat family_berbew behavioral2/files/0x0006000000022d10-150.dat family_berbew behavioral2/files/0x0006000000022d10-151.dat family_berbew behavioral2/files/0x0006000000022d0e-143.dat family_berbew behavioral2/files/0x0006000000022d14-168.dat family_berbew behavioral2/files/0x0006000000022d14-166.dat family_berbew behavioral2/files/0x0006000000022d18-177.dat family_berbew behavioral2/files/0x0006000000022d16-175.dat family_berbew behavioral2/files/0x0006000000022d16-174.dat family_berbew behavioral2/files/0x0006000000022d18-183.dat family_berbew behavioral2/files/0x0006000000022d18-182.dat family_berbew behavioral2/files/0x0006000000022d1a-191.dat family_berbew behavioral2/files/0x0006000000022d1a-190.dat family_berbew behavioral2/files/0x0006000000022d12-159.dat family_berbew behavioral2/files/0x0006000000022d12-158.dat family_berbew behavioral2/files/0x0006000000022d0e-137.dat family_berbew behavioral2/files/0x0006000000022d1c-198.dat family_berbew behavioral2/files/0x0006000000022d1c-199.dat family_berbew behavioral2/files/0x0006000000022d1e-208.dat family_berbew behavioral2/files/0x0006000000022d20-215.dat family_berbew behavioral2/files/0x0006000000022d20-214.dat family_berbew behavioral2/files/0x0006000000022d1e-206.dat family_berbew behavioral2/files/0x0006000000022d22-223.dat family_berbew behavioral2/files/0x0006000000022d22-222.dat family_berbew behavioral2/files/0x0006000000022d24-231.dat family_berbew behavioral2/files/0x0006000000022d24-230.dat family_berbew behavioral2/files/0x0006000000022d26-238.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 1520 Capkim32.exe 1560 Ehmibdol.exe 4724 Femigg32.exe 3928 Glbapoqh.exe 1220 Hocjaj32.exe 1188 Hahlnefd.exe 2240 Pmpmnb32.exe 3312 Acmomgoa.exe 4396 Ajggjq32.exe 2840 Bdfnmhnj.exe 2360 Dmphjfab.exe 3020 Fagcfc32.exe 2224 Fhchhm32.exe 1344 Fhfenmbe.exe 2980 Flcndk32.exe 496 Gngckfdj.exe 2088 Gdclcmba.exe 3208 Hkiclepa.exe 3616 Heohinog.exe 2264 Haeino32.exe 3000 Hoiihcde.exe 704 Hdfapjbl.exe 1628 Ikbfbdgf.exe 4576 Iejgelej.exe 4672 Ikgpmc32.exe 3992 Jhpjbgne.exe 4452 Kaaaak32.exe 2244 Khlinedh.exe 4368 Lfnfhg32.exe 1980 Mnndhi32.exe 928 Bpjkbcbe.exe 1072 Dcpffk32.exe 1588 Enlqdc32.exe 2400 Enomic32.exe 1936 Egnhcgeb.exe 3012 Fpimgjbm.exe 4856 Ggoaje32.exe 4044 Gagebknp.exe 3116 Ghcjedcj.exe 4860 Hmginjki.exe 2332 Hfonfp32.exe 3280 Ifdgaond.exe 716 Iffcgoka.exe 736 Jdajabdc.exe 4968 Jolhjj32.exe 4616 Jpmdabfb.exe 3880 Ldiiio32.exe 3436 Lamjbc32.exe 1932 Lgibjj32.exe 2652 Lnhdbc32.exe 1044 Mbkfcabb.exe 4220 Mkcjlf32.exe 3632 Mqpcdn32.exe 572 Nocphd32.exe 4260 Oelhljaq.exe 1180 Ooalibaf.exe 2156 Gimjag32.exe 5028 Iiblcdil.exe 568 Iannpa32.exe 2612 Ifjfhh32.exe 1864 Imdndbkn.exe 4956 Jabgkpad.exe 1000 Jmihpa32.exe 4088 Libnapmg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Amcpkpmh.dll Kiejfo32.exe File created C:\Windows\SysWOW64\Gemkobia.exe Eohcon32.exe File created C:\Windows\SysWOW64\Jplcocfn.dll Mdehep32.exe File created C:\Windows\SysWOW64\Hnicbmod.dll Lqndahiq.exe File created C:\Windows\SysWOW64\Ahpmckpn.exe Aachaa32.exe File created C:\Windows\SysWOW64\Jeocgfgn.exe Jlgooa32.exe File opened for modification C:\Windows\SysWOW64\Mhdgqh32.exe Ldfokj32.exe File opened for modification C:\Windows\SysWOW64\Kaaaak32.exe Jhpjbgne.exe File opened for modification C:\Windows\SysWOW64\Aflabj32.exe Aqoijcbo.exe File opened for modification C:\Windows\SysWOW64\Ifjfhh32.exe Iannpa32.exe File opened for modification C:\Windows\SysWOW64\Ggnlhgkg.exe Fgeibicb.exe File created C:\Windows\SysWOW64\Didjkbim.exe Cabofaaj.exe File created C:\Windows\SysWOW64\Mpofnj32.dll Aoofej32.exe File created C:\Windows\SysWOW64\Dcjhhq32.exe Dpgbqfhc.exe File created C:\Windows\SysWOW64\Ldgclgcl.exe Jnelha32.exe File opened for modification C:\Windows\SysWOW64\Dcjhhq32.exe Dpgbqfhc.exe File created C:\Windows\SysWOW64\Gmdaen32.dll Eiijpj32.exe File opened for modification C:\Windows\SysWOW64\Oeopgc32.exe Okiljj32.exe File opened for modification C:\Windows\SysWOW64\Cppfgnlj.exe Bgeabloo.exe File created C:\Windows\SysWOW64\Nmcbofdh.dll Daccdf32.exe File created C:\Windows\SysWOW64\Fpjfikkn.dll Eglkhk32.exe File created C:\Windows\SysWOW64\Jlgooa32.exe Jemfbgiq.exe File created C:\Windows\SysWOW64\Icmgjj32.dll Ckpagg32.exe File opened for modification C:\Windows\SysWOW64\Qnfkgfdp.exe Pglcjl32.exe File created C:\Windows\SysWOW64\Acilcb32.dll Lpqioclc.exe File created C:\Windows\SysWOW64\Bodfkpfg.exe Aflabj32.exe File created C:\Windows\SysWOW64\Pedlpgqe.exe Ooejhn32.exe File created C:\Windows\SysWOW64\Pomjhg32.dll Kbibgcld.exe File created C:\Windows\SysWOW64\Ajggjq32.exe Acmomgoa.exe File opened for modification C:\Windows\SysWOW64\Niklip32.exe Mlkldmjf.exe File created C:\Windows\SysWOW64\Dapnokng.dll Bmomecoi.exe File created C:\Windows\SysWOW64\Gmbmefob.exe Dpbdiehi.exe File created C:\Windows\SysWOW64\Ekcqji32.dll Mkhajq32.exe File created C:\Windows\SysWOW64\Khmhilbf.exe Ilcbhm32.exe File opened for modification C:\Windows\SysWOW64\Oakjgcfn.exe Odfjno32.exe File created C:\Windows\SysWOW64\Jieoac32.dll Omnqcfig.exe File created C:\Windows\SysWOW64\Hpkmajcn.dll Iffcgoka.exe File created C:\Windows\SysWOW64\Pjpboibb.dll Hajpli32.exe File created C:\Windows\SysWOW64\Kbibgcld.exe Khmhilbf.exe File created C:\Windows\SysWOW64\Hgjmen32.dll Aghlfh32.exe File opened for modification C:\Windows\SysWOW64\Hajpli32.exe Gkbkna32.exe File created C:\Windows\SysWOW64\Ncfmhecp.exe Nimioo32.exe File opened for modification C:\Windows\SysWOW64\Ckpagg32.exe Paihffkf.exe File opened for modification C:\Windows\SysWOW64\Mdmnacna.exe Mopeilpj.exe File created C:\Windows\SysWOW64\Jckcfocl.dll Iiblcdil.exe File created C:\Windows\SysWOW64\Fiimfo32.dll Imdndbkn.exe File created C:\Windows\SysWOW64\Nocphd32.exe Mqpcdn32.exe File created C:\Windows\SysWOW64\Qhbnicgk.dll Mklfcb32.exe File created C:\Windows\SysWOW64\Gjbkbnle.dll Oakjgcfn.exe File created C:\Windows\SysWOW64\Qcepem32.exe Qnfkgfdp.exe File created C:\Windows\SysWOW64\Pnakaa32.exe Pnonla32.exe File created C:\Windows\SysWOW64\Gnnejp32.dll Chokcakp.exe File created C:\Windows\SysWOW64\Aqoijcbo.exe Qjiaak32.exe File opened for modification C:\Windows\SysWOW64\Clnjoilj.exe Cpgjjhfe.exe File opened for modification C:\Windows\SysWOW64\Gejhol32.exe Fbdeba32.exe File opened for modification C:\Windows\SysWOW64\Fagcfc32.exe Dmphjfab.exe File created C:\Windows\SysWOW64\Cppfgnlj.exe Bgeabloo.exe File created C:\Windows\SysWOW64\Jlikdq32.exe Jeocgfgn.exe File opened for modification C:\Windows\SysWOW64\Egpnidgk.exe Ekimdc32.exe File created C:\Windows\SysWOW64\Igjnamkp.dll Nkebokin.exe File created C:\Windows\SysWOW64\Bhcdcbcl.dll 069abf2de5f3be8977c4aa87ebd2e3a0.exe File created C:\Windows\SysWOW64\Mkcjdfne.dll Ndmepe32.exe File created C:\Windows\SysWOW64\Okeinn32.exe Nqklfe32.exe File created C:\Windows\SysWOW64\Pgpjde32.dll Gmbmefob.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kaaaak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gildicea.dll" Ogmidbal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ejjqjp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gkqlkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmphjfab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gffnkjcl.dll" Libnapmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ojgjhicl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Egnhcgeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ooalibaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pgefogop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cppfgnlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Baegchgb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Okeinn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fkgbli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfhbpf32.dll" Gnhdea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hoebhpfd.dll" Niklip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbfdpb32.dll" Iildfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gkbkna32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mjeaph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Adbiojfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hdnlmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onaokmmm.dll" Jlgooa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Khmhilbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Imiapo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajggjq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qcepem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onhmlljp.dll" Ncmajo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aqoijcbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocmfjf32.dll" Cgijnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amcpkpmh.dll" Kiejfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Odhipp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gogohpgm.dll" Ldfokj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dffdjmme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Olqofjhn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aqoijcbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ajggjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhodilni.dll" Ggoaje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qmhdhm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Emcbcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qcpieamc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kgalfg32.dll" Jlikdq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cfcolblp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mbkfcabb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icmgjj32.dll" Ckpagg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gdclcmba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bdfnmhnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aiedaoip.dll" Ajphagha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iildfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cpgjjhfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aocbgkic.dll" Jmihpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bdcmfkde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pgefogop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hhdhhchf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ckgnbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohlhfa32.dll" Jemfbgiq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ldfokj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iejgelej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mdehep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bodfkpfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iolhdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nehjfdkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjfakoad.dll" Oockeiod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 069abf2de5f3be8977c4aa87ebd2e3a0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmphjfab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1520 1432 069abf2de5f3be8977c4aa87ebd2e3a0.exe 88 PID 1432 wrote to memory of 1520 1432 069abf2de5f3be8977c4aa87ebd2e3a0.exe 88 PID 1432 wrote to memory of 1520 1432 069abf2de5f3be8977c4aa87ebd2e3a0.exe 88 PID 1520 wrote to memory of 1560 1520 Capkim32.exe 89 PID 1520 wrote to memory of 1560 1520 Capkim32.exe 89 PID 1520 wrote to memory of 1560 1520 Capkim32.exe 89 PID 1560 wrote to memory of 4724 1560 Ehmibdol.exe 90 PID 1560 wrote to memory of 4724 1560 Ehmibdol.exe 90 PID 1560 wrote to memory of 4724 1560 Ehmibdol.exe 90 PID 4724 wrote to memory of 3928 4724 Femigg32.exe 91 PID 4724 wrote to memory of 3928 4724 Femigg32.exe 91 PID 4724 wrote to memory of 3928 4724 Femigg32.exe 91 PID 3928 wrote to memory of 1220 3928 Glbapoqh.exe 92 PID 3928 wrote to memory of 1220 3928 Glbapoqh.exe 92 PID 3928 wrote to memory of 1220 3928 Glbapoqh.exe 92 PID 1220 wrote to memory of 1188 1220 Hocjaj32.exe 93 PID 1220 wrote to memory of 1188 1220 Hocjaj32.exe 93 PID 1220 wrote to memory of 1188 1220 Hocjaj32.exe 93 PID 1188 wrote to memory of 2240 1188 Hahlnefd.exe 94 PID 1188 wrote to memory of 2240 1188 Hahlnefd.exe 94 PID 1188 wrote to memory of 2240 1188 Hahlnefd.exe 94 PID 2240 wrote to memory of 3312 2240 Pmpmnb32.exe 95 PID 2240 wrote to memory of 3312 2240 Pmpmnb32.exe 95 PID 2240 wrote to memory of 3312 2240 Pmpmnb32.exe 95 PID 3312 wrote to memory of 4396 3312 Acmomgoa.exe 96 PID 3312 wrote to memory of 4396 3312 Acmomgoa.exe 96 PID 3312 wrote to memory of 4396 3312 Acmomgoa.exe 96 PID 4396 wrote to memory of 2840 4396 Ajggjq32.exe 97 PID 4396 wrote to memory of 2840 4396 Ajggjq32.exe 97 PID 4396 wrote to memory of 2840 4396 Ajggjq32.exe 97 PID 2840 wrote to memory of 2360 2840 Bdfnmhnj.exe 98 PID 2840 wrote to memory of 2360 2840 Bdfnmhnj.exe 98 PID 2840 wrote to memory of 2360 2840 Bdfnmhnj.exe 98 PID 2360 wrote to memory of 3020 2360 Dmphjfab.exe 99 PID 2360 wrote to memory of 3020 2360 Dmphjfab.exe 99 PID 2360 wrote to memory of 3020 2360 Dmphjfab.exe 99 PID 3020 wrote to memory of 2224 3020 Fagcfc32.exe 100 PID 3020 wrote to memory of 2224 3020 Fagcfc32.exe 100 PID 3020 wrote to memory of 2224 3020 Fagcfc32.exe 100 PID 2224 wrote to memory of 1344 2224 Fhchhm32.exe 101 PID 2224 wrote to memory of 1344 2224 Fhchhm32.exe 101 PID 2224 wrote to memory of 1344 2224 Fhchhm32.exe 101 PID 1344 wrote to memory of 2980 1344 Fhfenmbe.exe 102 PID 1344 wrote to memory of 2980 1344 Fhfenmbe.exe 102 PID 1344 wrote to memory of 2980 1344 Fhfenmbe.exe 102 PID 2980 wrote to memory of 496 2980 Flcndk32.exe 103 PID 2980 wrote to memory of 496 2980 Flcndk32.exe 103 PID 2980 wrote to memory of 496 2980 Flcndk32.exe 103 PID 496 wrote to memory of 2088 496 Gngckfdj.exe 104 PID 496 wrote to memory of 2088 496 Gngckfdj.exe 104 PID 496 wrote to memory of 2088 496 Gngckfdj.exe 104 PID 2088 wrote to memory of 3208 2088 Gdclcmba.exe 111 PID 2088 wrote to memory of 3208 2088 Gdclcmba.exe 111 PID 2088 wrote to memory of 3208 2088 Gdclcmba.exe 111 PID 3208 wrote to memory of 3616 3208 Hkiclepa.exe 105 PID 3208 wrote to memory of 3616 3208 Hkiclepa.exe 105 PID 3208 wrote to memory of 3616 3208 Hkiclepa.exe 105 PID 3616 wrote to memory of 2264 3616 Heohinog.exe 106 PID 3616 wrote to memory of 2264 3616 Heohinog.exe 106 PID 3616 wrote to memory of 2264 3616 Heohinog.exe 106 PID 2264 wrote to memory of 3000 2264 Haeino32.exe 107 PID 2264 wrote to memory of 3000 2264 Haeino32.exe 107 PID 2264 wrote to memory of 3000 2264 Haeino32.exe 107 PID 3000 wrote to memory of 704 3000 Hoiihcde.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\069abf2de5f3be8977c4aa87ebd2e3a0.exe"C:\Users\Admin\AppData\Local\Temp\069abf2de5f3be8977c4aa87ebd2e3a0.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\Capkim32.exeC:\Windows\system32\Capkim32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\Ehmibdol.exeC:\Windows\system32\Ehmibdol.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\Femigg32.exeC:\Windows\system32\Femigg32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\Glbapoqh.exeC:\Windows\system32\Glbapoqh.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\Hocjaj32.exeC:\Windows\system32\Hocjaj32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\Hahlnefd.exeC:\Windows\system32\Hahlnefd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\Pmpmnb32.exeC:\Windows\system32\Pmpmnb32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\Acmomgoa.exeC:\Windows\system32\Acmomgoa.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\Ajggjq32.exeC:\Windows\system32\Ajggjq32.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\Bdfnmhnj.exeC:\Windows\system32\Bdfnmhnj.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Dmphjfab.exeC:\Windows\system32\Dmphjfab.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\Fagcfc32.exeC:\Windows\system32\Fagcfc32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\Fhchhm32.exeC:\Windows\system32\Fhchhm32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\Fhfenmbe.exeC:\Windows\system32\Fhfenmbe.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\Flcndk32.exeC:\Windows\system32\Flcndk32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Gngckfdj.exeC:\Windows\system32\Gngckfdj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\Gdclcmba.exeC:\Windows\system32\Gdclcmba.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Hkiclepa.exeC:\Windows\system32\Hkiclepa.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Heohinog.exeC:\Windows\system32\Heohinog.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\Haeino32.exeC:\Windows\system32\Haeino32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\Hoiihcde.exeC:\Windows\system32\Hoiihcde.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\Hdfapjbl.exeC:\Windows\system32\Hdfapjbl.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:704 -
C:\Windows\SysWOW64\Ikbfbdgf.exeC:\Windows\system32\Ikbfbdgf.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1628 -
C:\Windows\SysWOW64\Iejgelej.exeC:\Windows\system32\Iejgelej.exe6⤵
- Executes dropped EXE
- Modifies registry class
PID:4576 -
C:\Windows\SysWOW64\Ikgpmc32.exeC:\Windows\system32\Ikgpmc32.exe7⤵
- Executes dropped EXE
PID:4672 -
C:\Windows\SysWOW64\Jhpjbgne.exeC:\Windows\system32\Jhpjbgne.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3992 -
C:\Windows\SysWOW64\Kaaaak32.exeC:\Windows\system32\Kaaaak32.exe9⤵
- Executes dropped EXE
- Modifies registry class
PID:4452 -
C:\Windows\SysWOW64\Khlinedh.exeC:\Windows\system32\Khlinedh.exe10⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\Lfnfhg32.exeC:\Windows\system32\Lfnfhg32.exe11⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\Mnndhi32.exeC:\Windows\system32\Mnndhi32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\Bpjkbcbe.exeC:\Windows\system32\Bpjkbcbe.exe13⤵
- Executes dropped EXE
PID:928 -
C:\Windows\SysWOW64\Dcpffk32.exeC:\Windows\system32\Dcpffk32.exe14⤵
- Executes dropped EXE
PID:1072 -
C:\Windows\SysWOW64\Enlqdc32.exeC:\Windows\system32\Enlqdc32.exe15⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\Enomic32.exeC:\Windows\system32\Enomic32.exe16⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\Egnhcgeb.exeC:\Windows\system32\Egnhcgeb.exe17⤵
- Executes dropped EXE
- Modifies registry class
PID:1936 -
C:\Windows\SysWOW64\Fpimgjbm.exeC:\Windows\system32\Fpimgjbm.exe18⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\Ggoaje32.exeC:\Windows\system32\Ggoaje32.exe19⤵
- Executes dropped EXE
- Modifies registry class
PID:4856 -
C:\Windows\SysWOW64\Gagebknp.exeC:\Windows\system32\Gagebknp.exe20⤵
- Executes dropped EXE
PID:4044 -
C:\Windows\SysWOW64\Ghcjedcj.exeC:\Windows\system32\Ghcjedcj.exe21⤵
- Executes dropped EXE
PID:3116 -
C:\Windows\SysWOW64\Hmginjki.exeC:\Windows\system32\Hmginjki.exe22⤵
- Executes dropped EXE
PID:4860 -
C:\Windows\SysWOW64\Hfonfp32.exeC:\Windows\system32\Hfonfp32.exe23⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\Ifdgaond.exeC:\Windows\system32\Ifdgaond.exe24⤵
- Executes dropped EXE
PID:3280 -
C:\Windows\SysWOW64\Iffcgoka.exeC:\Windows\system32\Iffcgoka.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:716 -
C:\Windows\SysWOW64\Jdajabdc.exeC:\Windows\system32\Jdajabdc.exe26⤵
- Executes dropped EXE
PID:736 -
C:\Windows\SysWOW64\Jolhjj32.exeC:\Windows\system32\Jolhjj32.exe27⤵
- Executes dropped EXE
PID:4968 -
C:\Windows\SysWOW64\Jpmdabfb.exeC:\Windows\system32\Jpmdabfb.exe28⤵
- Executes dropped EXE
PID:4616 -
C:\Windows\SysWOW64\Ldiiio32.exeC:\Windows\system32\Ldiiio32.exe29⤵
- Executes dropped EXE
PID:3880 -
C:\Windows\SysWOW64\Lamjbc32.exeC:\Windows\system32\Lamjbc32.exe30⤵
- Executes dropped EXE
PID:3436 -
C:\Windows\SysWOW64\Lgibjj32.exeC:\Windows\system32\Lgibjj32.exe31⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\Lnhdbc32.exeC:\Windows\system32\Lnhdbc32.exe32⤵
- Executes dropped EXE
PID:2652 -
C:\Windows\SysWOW64\Mbkfcabb.exeC:\Windows\system32\Mbkfcabb.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:1044 -
C:\Windows\SysWOW64\Mkcjlf32.exeC:\Windows\system32\Mkcjlf32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4220 -
C:\Windows\SysWOW64\Mqpcdn32.exeC:\Windows\system32\Mqpcdn32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3632 -
C:\Windows\SysWOW64\Nocphd32.exeC:\Windows\system32\Nocphd32.exe36⤵
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\Oelhljaq.exeC:\Windows\system32\Oelhljaq.exe37⤵
- Executes dropped EXE
PID:4260 -
C:\Windows\SysWOW64\Ooalibaf.exeC:\Windows\system32\Ooalibaf.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1180 -
C:\Windows\SysWOW64\Gimjag32.exeC:\Windows\system32\Gimjag32.exe39⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\Iiblcdil.exeC:\Windows\system32\Iiblcdil.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5028 -
C:\Windows\SysWOW64\Iannpa32.exeC:\Windows\system32\Iannpa32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:568 -
C:\Windows\SysWOW64\Ifjfhh32.exeC:\Windows\system32\Ifjfhh32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\Imdndbkn.exeC:\Windows\system32\Imdndbkn.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1864 -
C:\Windows\SysWOW64\Jabgkpad.exeC:\Windows\system32\Jabgkpad.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4956 -
C:\Windows\SysWOW64\Jmihpa32.exeC:\Windows\system32\Jmihpa32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1000 -
C:\Windows\SysWOW64\Libnapmg.exeC:\Windows\system32\Libnapmg.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4088 -
C:\Windows\SysWOW64\Lgikpc32.exeC:\Windows\system32\Lgikpc32.exe47⤵PID:1712
-
C:\Windows\SysWOW64\Lcpledob.exeC:\Windows\system32\Lcpledob.exe48⤵PID:2772
-
C:\Windows\SysWOW64\Mnapnl32.exeC:\Windows\system32\Mnapnl32.exe49⤵PID:4628
-
C:\Windows\SysWOW64\Ndmepe32.exeC:\Windows\system32\Ndmepe32.exe50⤵
- Drops file in System32 directory
PID:3760 -
C:\Windows\SysWOW64\Nkijbooo.exeC:\Windows\system32\Nkijbooo.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1436 -
C:\Windows\SysWOW64\Nkncno32.exeC:\Windows\system32\Nkncno32.exe52⤵PID:2280
-
C:\Windows\SysWOW64\Nqklfe32.exeC:\Windows\system32\Nqklfe32.exe53⤵
- Drops file in System32 directory
PID:1368 -
C:\Windows\SysWOW64\Okeinn32.exeC:\Windows\system32\Okeinn32.exe54⤵
- Modifies registry class
PID:4900 -
C:\Windows\SysWOW64\Okjbimal.exeC:\Windows\system32\Okjbimal.exe55⤵PID:2904
-
C:\Windows\SysWOW64\Pglcjl32.exeC:\Windows\system32\Pglcjl32.exe56⤵
- Drops file in System32 directory
PID:4788 -
C:\Windows\SysWOW64\Qnfkgfdp.exeC:\Windows\system32\Qnfkgfdp.exe57⤵
- Drops file in System32 directory
PID:4712 -
C:\Windows\SysWOW64\Qcepem32.exeC:\Windows\system32\Qcepem32.exe58⤵
- Modifies registry class
PID:5092 -
C:\Windows\SysWOW64\Ajphagha.exeC:\Windows\system32\Ajphagha.exe59⤵
- Modifies registry class
PID:1892 -
C:\Windows\SysWOW64\Abkjnd32.exeC:\Windows\system32\Abkjnd32.exe60⤵PID:3836
-
C:\Windows\SysWOW64\Acmfel32.exeC:\Windows\system32\Acmfel32.exe61⤵PID:4004
-
C:\Windows\SysWOW64\Bdcmfkde.exeC:\Windows\system32\Bdcmfkde.exe62⤵
- Modifies registry class
PID:2192 -
C:\Windows\SysWOW64\Blkdgheg.exeC:\Windows\system32\Blkdgheg.exe63⤵PID:4688
-
C:\Windows\SysWOW64\Ceaealoh.exeC:\Windows\system32\Ceaealoh.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4944 -
C:\Windows\SysWOW64\Cknnjcmo.exeC:\Windows\system32\Cknnjcmo.exe65⤵PID:2044
-
C:\Windows\SysWOW64\Ddmhcg32.exeC:\Windows\system32\Ddmhcg32.exe66⤵PID:5064
-
C:\Windows\SysWOW64\Dhkaif32.exeC:\Windows\system32\Dhkaif32.exe67⤵PID:492
-
C:\Windows\SysWOW64\Deanhj32.exeC:\Windows\system32\Deanhj32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4484 -
C:\Windows\SysWOW64\Fcckcl32.exeC:\Windows\system32\Fcckcl32.exe69⤵PID:4708
-
C:\Windows\SysWOW64\Lpqioclc.exeC:\Windows\system32\Lpqioclc.exe70⤵
- Drops file in System32 directory
PID:3432 -
C:\Windows\SysWOW64\Mdckpqod.exeC:\Windows\system32\Mdckpqod.exe71⤵PID:820
-
C:\Windows\SysWOW64\Medggidb.exeC:\Windows\system32\Medggidb.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1188 -
C:\Windows\SysWOW64\Mdehep32.exeC:\Windows\system32\Mdehep32.exe73⤵
- Drops file in System32 directory
- Modifies registry class
PID:1196 -
C:\Windows\SysWOW64\Mibpng32.exeC:\Windows\system32\Mibpng32.exe74⤵PID:3672
-
C:\Windows\SysWOW64\Nigjifgc.exeC:\Windows\system32\Nigjifgc.exe75⤵PID:4372
-
C:\Windows\SysWOW64\Ndmnfofi.exeC:\Windows\system32\Ndmnfofi.exe76⤵PID:1744
-
C:\Windows\SysWOW64\Ndcdfnpa.exeC:\Windows\system32\Ndcdfnpa.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1020 -
C:\Windows\SysWOW64\Opmaaodc.exeC:\Windows\system32\Opmaaodc.exe78⤵PID:3308
-
C:\Windows\SysWOW64\Pcgmiiii.exeC:\Windows\system32\Pcgmiiii.exe79⤵PID:892
-
C:\Windows\SysWOW64\Pmoabn32.exeC:\Windows\system32\Pmoabn32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4296 -
C:\Windows\SysWOW64\Pgefogop.exeC:\Windows\system32\Pgefogop.exe81⤵
- Modifies registry class
PID:4216 -
C:\Windows\SysWOW64\Pnonla32.exeC:\Windows\system32\Pnonla32.exe82⤵
- Drops file in System32 directory
PID:2088 -
C:\Windows\SysWOW64\Pnakaa32.exeC:\Windows\system32\Pnakaa32.exe83⤵PID:740
-
C:\Windows\SysWOW64\Pdmpck32.exeC:\Windows\system32\Pdmpck32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:644 -
C:\Windows\SysWOW64\Qmhdhm32.exeC:\Windows\system32\Qmhdhm32.exe85⤵
- Modifies registry class
PID:2064 -
C:\Windows\SysWOW64\Qjmeaafi.exeC:\Windows\system32\Qjmeaafi.exe86⤵PID:1548
-
C:\Windows\SysWOW64\Adbiojfo.exeC:\Windows\system32\Adbiojfo.exe87⤵
- Modifies registry class
PID:2632 -
C:\Windows\SysWOW64\Ammnclcj.exeC:\Windows\system32\Ammnclcj.exe88⤵PID:448
-
C:\Windows\SysWOW64\Ajckbp32.exeC:\Windows\system32\Ajckbp32.exe89⤵PID:4976
-
C:\Windows\SysWOW64\Bgoalc32.exeC:\Windows\system32\Bgoalc32.exe90⤵PID:1144
-
C:\Windows\SysWOW64\Bchogd32.exeC:\Windows\system32\Bchogd32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2840 -
C:\Windows\SysWOW64\Bnmcdm32.exeC:\Windows\system32\Bnmcdm32.exe92⤵PID:2180
-
C:\Windows\SysWOW64\Cmdmki32.exeC:\Windows\system32\Cmdmki32.exe93⤵PID:2908
-
C:\Windows\SysWOW64\Chokcakp.exeC:\Windows\system32\Chokcakp.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\Ddhhnana.exeC:\Windows\system32\Ddhhnana.exe95⤵PID:4388
-
C:\Windows\SysWOW64\Dffdjmme.exeC:\Windows\system32\Dffdjmme.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1520 -
C:\Windows\SysWOW64\Deokhc32.exeC:\Windows\system32\Deokhc32.exe97⤵PID:2924
-
C:\Windows\SysWOW64\Egijfjmp.exeC:\Windows\system32\Egijfjmp.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1344 -
C:\Windows\SysWOW64\Emcbcd32.exeC:\Windows\system32\Emcbcd32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2000 -
C:\Windows\SysWOW64\Fkgbli32.exeC:\Windows\system32\Fkgbli32.exe100⤵
- Modifies registry class
PID:872 -
C:\Windows\SysWOW64\Faakickc.exeC:\Windows\system32\Faakickc.exe101⤵PID:2760
-
C:\Windows\SysWOW64\Fgeibicb.exeC:\Windows\system32\Fgeibicb.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3688 -
C:\Windows\SysWOW64\Ggnlhgkg.exeC:\Windows\system32\Ggnlhgkg.exe103⤵PID:2704
-
C:\Windows\SysWOW64\Gnhdea32.exeC:\Windows\system32\Gnhdea32.exe104⤵
- Modifies registry class
PID:4340 -
C:\Windows\SysWOW64\Hdnlmj32.exeC:\Windows\system32\Hdnlmj32.exe105⤵
- Modifies registry class
PID:3568 -
C:\Windows\SysWOW64\Mlkldmjf.exeC:\Windows\system32\Mlkldmjf.exe106⤵
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\Niklip32.exeC:\Windows\system32\Niklip32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2800 -
C:\Windows\SysWOW64\Npedfjfo.exeC:\Windows\system32\Npedfjfo.exe108⤵PID:2608
-
C:\Windows\SysWOW64\Nimioo32.exeC:\Windows\system32\Nimioo32.exe109⤵
- Drops file in System32 directory
PID:4652 -
C:\Windows\SysWOW64\Ncfmhecp.exeC:\Windows\system32\Ncfmhecp.exe110⤵PID:4860
-
C:\Windows\SysWOW64\Opjnai32.exeC:\Windows\system32\Opjnai32.exe111⤵PID:1756
-
C:\Windows\SysWOW64\Ogcfncjf.exeC:\Windows\system32\Ogcfncjf.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1576 -
C:\Windows\SysWOW64\Olqofjhn.exeC:\Windows\system32\Olqofjhn.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Oiihkncb.exeC:\Windows\system32\Oiihkncb.exe114⤵PID:3380
-
C:\Windows\SysWOW64\Ogmidbal.exeC:\Windows\system32\Ogmidbal.exe115⤵
- Modifies registry class
PID:4936 -
C:\Windows\SysWOW64\Qcpieamc.exeC:\Windows\system32\Qcpieamc.exe116⤵
- Modifies registry class
PID:3888 -
C:\Windows\SysWOW64\Qjiaak32.exeC:\Windows\system32\Qjiaak32.exe117⤵
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\Aqoijcbo.exeC:\Windows\system32\Aqoijcbo.exe118⤵
- Drops file in System32 directory
- Modifies registry class
PID:2768 -
C:\Windows\SysWOW64\Aflabj32.exeC:\Windows\system32\Aflabj32.exe119⤵
- Drops file in System32 directory
PID:3528 -
C:\Windows\SysWOW64\Bodfkpfg.exeC:\Windows\system32\Bodfkpfg.exe120⤵
- Modifies registry class
PID:1148 -
C:\Windows\SysWOW64\Bfnnhj32.exeC:\Windows\system32\Bfnnhj32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3880 -
C:\Windows\SysWOW64\Bcboan32.exeC:\Windows\system32\Bcboan32.exe122⤵PID:572
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-