Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe
Resource
win10v2004-20240226-en
General
-
Target
a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe
-
Size
377KB
-
MD5
38b4ca6f77a24afaf6c00fbf316cd1dc
-
SHA1
4d898b684902ed8ff1f7c33efcea77e271233b64
-
SHA256
a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08
-
SHA512
3f143fa0e1a0913dcda6473c948f9f5b2b4e125ab98871ea23a37300e95ea7d5926f93a31f0469ef008bc9cc746dfac965f2a7fda63826127b7a7957051172ec
-
SSDEEP
6144:ovH+AQJgfQcNp5O4KxVdGGSgnohijgAUv5fKx/SgnohignC5V:ngfNO5HdjdMTv5i1dayV
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpcgpihi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnljkk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enopghee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icogcjde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abfdpfaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekimjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Noaeqjpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hannao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdhbpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbngeadf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmjhlklg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcnjijoe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abfdpfaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmbgdl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llimgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afhfaddk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kemhei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nooikj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qfgfpp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leoejh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlefjnno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odbgdp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcjjhdjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enopghee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Leoejh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lddble32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnffhgon.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbcedmnl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afbgkl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acqgojmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnnnfalp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkiamp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iccpniqp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmoagk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qmanljfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mebkge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mahklf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjfogbjb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdhffg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecgodpgb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjdokb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jogqlpde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldfoad32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbbnbemf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Famhmfkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hgapmj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nooikj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcnjijoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aiplmq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mebkge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfgfpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdqcenmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnffhgon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcqjal32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hannao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odbgdp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obkahddl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmoagk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afbgkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ampaho32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcpgmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdhffg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddhomdje.exe -
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023337-8.dat UPX behavioral2/files/0x000b000000022ff8-17.dat UPX behavioral2/files/0x000800000002333d-27.dat UPX behavioral2/files/0x0007000000023341-36.dat UPX behavioral2/memory/4632-34-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023345-43.dat UPX behavioral2/memory/3944-49-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x000800000002330e-52.dat UPX behavioral2/files/0x00080000000231fe-60.dat UPX behavioral2/files/0x000700000002334a-68.dat UPX behavioral2/files/0x000700000002334c-75.dat UPX behavioral2/memory/3088-78-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x000800000002334f-84.dat UPX behavioral2/memory/4400-85-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023351-92.dat UPX behavioral2/memory/4908-97-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023353-102.dat UPX behavioral2/memory/1724-104-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023355-111.dat UPX behavioral2/files/0x0007000000023357-118.dat UPX behavioral2/memory/652-119-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023359-127.dat UPX behavioral2/memory/3796-128-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x000700000002335c-134.dat UPX behavioral2/memory/2132-136-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023360-150.dat UPX behavioral2/files/0x000700000002335e-143.dat UPX behavioral2/files/0x0007000000023362-159.dat UPX behavioral2/memory/3780-164-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023364-166.dat UPX behavioral2/files/0x0007000000023366-174.dat UPX behavioral2/memory/1236-167-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/memory/3768-175-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023368-182.dat UPX behavioral2/files/0x000700000002336a-191.dat UPX behavioral2/memory/4192-192-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x000700000002336c-198.dat UPX behavioral2/memory/948-199-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x000700000002336e-206.dat UPX behavioral2/memory/1508-208-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023371-214.dat UPX behavioral2/memory/1404-215-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023373-222.dat UPX behavioral2/memory/2808-224-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023375-230.dat UPX behavioral2/files/0x0007000000023377-239.dat UPX behavioral2/memory/3432-240-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/memory/1744-248-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x0007000000023379-247.dat UPX behavioral2/files/0x000700000002337b-254.dat UPX behavioral2/files/0x000700000002337d-262.dat UPX behavioral2/memory/3996-276-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/memory/1632-325-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/memory/4712-337-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/memory/2452-343-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/memory/4572-349-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/memory/3744-359-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/memory/2432-419-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/memory/4700-421-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x00070000000233b8-422.dat UPX behavioral2/memory/3060-427-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/memory/3328-433-0x0000000000400000-0x000000000048A000-memory.dmp UPX behavioral2/files/0x00070000000233bc-434.dat UPX behavioral2/memory/2356-439-0x0000000000400000-0x000000000048A000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
pid Process 4132 Bgeaifia.exe 3632 Afbgkl32.exe 4632 Aoioli32.exe 1536 Edionhpn.exe 3944 Fndpmndl.exe 1472 Kcjjhdjb.exe 2584 Ofgdcipq.exe 3772 Pbcncibp.exe 3088 Pjaleemj.exe 4400 Qppaclio.exe 4908 Qcnjijoe.exe 1724 Acqgojmb.exe 4092 Abfdpfaj.exe 652 Aiplmq32.exe 3796 Amnebo32.exe 2132 Ampaho32.exe 1580 Afhfaddk.exe 1200 Bdlfjh32.exe 3780 Bjfogbjb.exe 1236 Bpcgpihi.exe 3768 Bipecnkd.exe 4144 Ckpamabg.exe 4192 Cdhffg32.exe 948 Cpogkhnl.exe 1508 Cmbgdl32.exe 1404 Cpcpfg32.exe 2808 Dkkaiphj.exe 2108 Dphiaffa.exe 3432 Dnljkk32.exe 1744 Dgdncplk.exe 2448 Ddhomdje.exe 4268 Djgdkk32.exe 1636 Eaaiahei.exe 3996 Ekimjn32.exe 3908 Eaceghcg.exe 4624 Ekljpm32.exe 812 Ecgodpgb.exe 1912 Eqkondfl.exe 4704 Enopghee.exe 2332 Fkcpql32.exe 964 Famhmfkl.exe 1632 Fncibg32.exe 4924 Fnffhgon.exe 4712 Fgqgfl32.exe 2452 Gjficg32.exe 4572 Gkefmjcj.exe 3744 Gcqjal32.exe 2968 Hnhkdd32.exe 3228 Hgapmj32.exe 2064 Hjaioe32.exe 1052 Hcjmhk32.exe 1844 Hannao32.exe 5060 Hjfbjdnd.exe 4804 Icogcjde.exe 4384 Ibpgqa32.exe 4948 Icachjbb.exe 2432 Iaedanal.exe 4700 Iccpniqp.exe 3060 Idhiii32.exe 3328 Jnnnfalp.exe 2356 Jjdokb32.exe 4492 Jhkljfok.exe 1068 Jogqlpde.exe 5136 Jddiegbm.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Edionhpn.exe Aoioli32.exe File opened for modification C:\Windows\SysWOW64\Fndpmndl.exe Edionhpn.exe File created C:\Windows\SysWOW64\Gjficg32.exe Fgqgfl32.exe File created C:\Windows\SysWOW64\Inkqjp32.dll Ohcmpn32.exe File created C:\Windows\SysWOW64\Fhmeii32.dll Odbgdp32.exe File created C:\Windows\SysWOW64\Iilpao32.dll Qihoak32.exe File opened for modification C:\Windows\SysWOW64\Afbgkl32.exe Bgeaifia.exe File opened for modification C:\Windows\SysWOW64\Acqgojmb.exe Qcnjijoe.exe File opened for modification C:\Windows\SysWOW64\Noaeqjpe.exe Nooikj32.exe File created C:\Windows\SysWOW64\Ncaklhdi.exe Nbbnbemf.exe File created C:\Windows\SysWOW64\Qihoak32.exe Qbngeadf.exe File created C:\Windows\SysWOW64\Aiplmq32.exe Abfdpfaj.exe File created C:\Windows\SysWOW64\Kojkgebl.dll Ekljpm32.exe File created C:\Windows\SysWOW64\Hjfbjdnd.exe Hannao32.exe File created C:\Windows\SysWOW64\Eiebmbnn.dll Nlefjnno.exe File opened for modification C:\Windows\SysWOW64\Icogcjde.exe Hjfbjdnd.exe File created C:\Windows\SysWOW64\Pmejnpqp.dll Qbngeadf.exe File created C:\Windows\SysWOW64\Ikfbpdlg.dll Dnljkk32.exe File created C:\Windows\SysWOW64\Celipg32.dll Hjfbjdnd.exe File created C:\Windows\SysWOW64\Pbimjb32.exe Peempn32.exe File opened for modification C:\Windows\SysWOW64\Qppaclio.exe Pjaleemj.exe File created C:\Windows\SysWOW64\Anijgd32.dll Eaaiahei.exe File created C:\Windows\SysWOW64\Ejioqkck.dll Hjaioe32.exe File created C:\Windows\SysWOW64\Gcdfnq32.dll Ofbdncaj.exe File created C:\Windows\SysWOW64\Hcjmhk32.exe Hjaioe32.exe File created C:\Windows\SysWOW64\Kopcbo32.exe Khfkfedn.exe File opened for modification C:\Windows\SysWOW64\Ohcmpn32.exe Okolfj32.exe File created C:\Windows\SysWOW64\Cdhffg32.exe Ckpamabg.exe File opened for modification C:\Windows\SysWOW64\Fkcpql32.exe Enopghee.exe File created C:\Windows\SysWOW64\Hlnecf32.dll Icachjbb.exe File created C:\Windows\SysWOW64\Jogqlpde.exe Jhkljfok.exe File created C:\Windows\SysWOW64\Bkclkjqn.dll Lbcedmnl.exe File created C:\Windows\SysWOW64\Oohkai32.exe Odbgdp32.exe File opened for modification C:\Windows\SysWOW64\Ofijnbkb.exe Omaeem32.exe File created C:\Windows\SysWOW64\Bgeaifia.exe a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe File opened for modification C:\Windows\SysWOW64\Bjfogbjb.exe Bdlfjh32.exe File created C:\Windows\SysWOW64\Jgjjlakk.dll Eqkondfl.exe File opened for modification C:\Windows\SysWOW64\Gkefmjcj.exe Gjficg32.exe File created C:\Windows\SysWOW64\Eepbdodb.dll Jnnnfalp.exe File created C:\Windows\SysWOW64\Ehilac32.dll Kopcbo32.exe File created C:\Windows\SysWOW64\Fcnhog32.dll Kemhei32.exe File opened for modification C:\Windows\SysWOW64\Ncaklhdi.exe Nbbnbemf.exe File created C:\Windows\SysWOW64\Gejimf32.dll Kcjjhdjb.exe File opened for modification C:\Windows\SysWOW64\Afhfaddk.exe Ampaho32.exe File created C:\Windows\SysWOW64\Mjbaohka.dll Dphiaffa.exe File created C:\Windows\SysWOW64\Enopghee.exe Eqkondfl.exe File created C:\Windows\SysWOW64\Cogcho32.dll Pbddobla.exe File created C:\Windows\SysWOW64\Hblaceei.dll Pbimjb32.exe File opened for modification C:\Windows\SysWOW64\Ampaho32.exe Amnebo32.exe File created C:\Windows\SysWOW64\Njonjm32.dll Amnebo32.exe File created C:\Windows\SysWOW64\Mahklf32.exe Mebkge32.exe File created C:\Windows\SysWOW64\Hlkjom32.dll Qmanljfo.exe File created C:\Windows\SysWOW64\Bllolf32.dll Oohkai32.exe File created C:\Windows\SysWOW64\Pbddobla.exe Pdqcenmg.exe File created C:\Windows\SysWOW64\Aanpie32.dll Qcnjijoe.exe File opened for modification C:\Windows\SysWOW64\Eqkondfl.exe Ecgodpgb.exe File created C:\Windows\SysWOW64\Fkcpql32.exe Enopghee.exe File created C:\Windows\SysWOW64\Odanidih.dll Enopghee.exe File opened for modification C:\Windows\SysWOW64\Kalcik32.exe Kkbkmqed.exe File created C:\Windows\SysWOW64\Okolfj32.exe Ofbdncaj.exe File created C:\Windows\SysWOW64\Ohcmpn32.exe Okolfj32.exe File created C:\Windows\SysWOW64\Cmbgdl32.exe Cpogkhnl.exe File opened for modification C:\Windows\SysWOW64\Gjficg32.exe Fgqgfl32.exe File opened for modification C:\Windows\SysWOW64\Gcqjal32.exe Gkefmjcj.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Edionhpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acqgojmb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oohkai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghnkilod.dll" Ofijnbkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnljkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnimkcjf.dll" Fncibg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhodke32.dll" Koimbpbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Odbgdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iilpao32.dll" Qihoak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lddble32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Labnlj32.dll" Bipecnkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dikifc32.dll" Djgdkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eaaiahei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjaioe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Celipg32.dll" Hjfbjdnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idhiii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifkqol32.dll" Jddiegbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbbnbemf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofbdncaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qcnjijoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnlhmpgg.dll" Ckpamabg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddhomdje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecgodpgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hcjmhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmlpen32.dll" Ddhomdje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkhpmopi.dll" Fnffhgon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okahhpqj.dll" Lddble32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmjhlklg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Looknpmn.dll" a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qdqaqhbj.dll" Bpcgpihi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmbgdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnljkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eqkondfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Famhmfkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hnhkdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjamidgd.dll" Afbgkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aiplmq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgdcdg32.dll" Ampaho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjfbjdnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odbgdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmejnpqp.dll" Qbngeadf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbcncibp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qcnjijoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjcblekh.dll" Dgdncplk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkcghg32.dll" Ecgodpgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehilac32.dll" Kopcbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aanpie32.dll" Qcnjijoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njonjm32.dll" Amnebo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djgdkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odanidih.dll" Enopghee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enopghee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jddiegbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mebkge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Llfgke32.dll" Khfkfedn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afhfaddk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddhomdje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjficg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejahec32.dll" Hannao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjfbjdnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Icogcjde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldfoad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngkpgkbd.dll" Nooikj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inkqjp32.dll" Ohcmpn32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4132 5004 a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe 94 PID 5004 wrote to memory of 4132 5004 a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe 94 PID 5004 wrote to memory of 4132 5004 a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe 94 PID 4132 wrote to memory of 3632 4132 Bgeaifia.exe 96 PID 4132 wrote to memory of 3632 4132 Bgeaifia.exe 96 PID 4132 wrote to memory of 3632 4132 Bgeaifia.exe 96 PID 3632 wrote to memory of 4632 3632 Afbgkl32.exe 98 PID 3632 wrote to memory of 4632 3632 Afbgkl32.exe 98 PID 3632 wrote to memory of 4632 3632 Afbgkl32.exe 98 PID 4632 wrote to memory of 1536 4632 Aoioli32.exe 99 PID 4632 wrote to memory of 1536 4632 Aoioli32.exe 99 PID 4632 wrote to memory of 1536 4632 Aoioli32.exe 99 PID 1536 wrote to memory of 3944 1536 Edionhpn.exe 102 PID 1536 wrote to memory of 3944 1536 Edionhpn.exe 102 PID 1536 wrote to memory of 3944 1536 Edionhpn.exe 102 PID 3944 wrote to memory of 1472 3944 Fndpmndl.exe 103 PID 3944 wrote to memory of 1472 3944 Fndpmndl.exe 103 PID 3944 wrote to memory of 1472 3944 Fndpmndl.exe 103 PID 1472 wrote to memory of 2584 1472 Kcjjhdjb.exe 104 PID 1472 wrote to memory of 2584 1472 Kcjjhdjb.exe 104 PID 1472 wrote to memory of 2584 1472 Kcjjhdjb.exe 104 PID 2584 wrote to memory of 3772 2584 Ofgdcipq.exe 105 PID 2584 wrote to memory of 3772 2584 Ofgdcipq.exe 105 PID 2584 wrote to memory of 3772 2584 Ofgdcipq.exe 105 PID 3772 wrote to memory of 3088 3772 Pbcncibp.exe 106 PID 3772 wrote to memory of 3088 3772 Pbcncibp.exe 106 PID 3772 wrote to memory of 3088 3772 Pbcncibp.exe 106 PID 3088 wrote to memory of 4400 3088 Pjaleemj.exe 107 PID 3088 wrote to memory of 4400 3088 Pjaleemj.exe 107 PID 3088 wrote to memory of 4400 3088 Pjaleemj.exe 107 PID 4400 wrote to memory of 4908 4400 Qppaclio.exe 108 PID 4400 wrote to memory of 4908 4400 Qppaclio.exe 108 PID 4400 wrote to memory of 4908 4400 Qppaclio.exe 108 PID 4908 wrote to memory of 1724 4908 Qcnjijoe.exe 109 PID 4908 wrote to memory of 1724 4908 Qcnjijoe.exe 109 PID 4908 wrote to memory of 1724 4908 Qcnjijoe.exe 109 PID 1724 wrote to memory of 4092 1724 Acqgojmb.exe 110 PID 1724 wrote to memory of 4092 1724 Acqgojmb.exe 110 PID 1724 wrote to memory of 4092 1724 Acqgojmb.exe 110 PID 4092 wrote to memory of 652 4092 Abfdpfaj.exe 111 PID 4092 wrote to memory of 652 4092 Abfdpfaj.exe 111 PID 4092 wrote to memory of 652 4092 Abfdpfaj.exe 111 PID 652 wrote to memory of 3796 652 Aiplmq32.exe 112 PID 652 wrote to memory of 3796 652 Aiplmq32.exe 112 PID 652 wrote to memory of 3796 652 Aiplmq32.exe 112 PID 3796 wrote to memory of 2132 3796 Amnebo32.exe 113 PID 3796 wrote to memory of 2132 3796 Amnebo32.exe 113 PID 3796 wrote to memory of 2132 3796 Amnebo32.exe 113 PID 2132 wrote to memory of 1580 2132 Ampaho32.exe 114 PID 2132 wrote to memory of 1580 2132 Ampaho32.exe 114 PID 2132 wrote to memory of 1580 2132 Ampaho32.exe 114 PID 1580 wrote to memory of 1200 1580 Afhfaddk.exe 115 PID 1580 wrote to memory of 1200 1580 Afhfaddk.exe 115 PID 1580 wrote to memory of 1200 1580 Afhfaddk.exe 115 PID 1200 wrote to memory of 3780 1200 Bdlfjh32.exe 116 PID 1200 wrote to memory of 3780 1200 Bdlfjh32.exe 116 PID 1200 wrote to memory of 3780 1200 Bdlfjh32.exe 116 PID 3780 wrote to memory of 1236 3780 Bjfogbjb.exe 117 PID 3780 wrote to memory of 1236 3780 Bjfogbjb.exe 117 PID 3780 wrote to memory of 1236 3780 Bjfogbjb.exe 117 PID 1236 wrote to memory of 3768 1236 Bpcgpihi.exe 118 PID 1236 wrote to memory of 3768 1236 Bpcgpihi.exe 118 PID 1236 wrote to memory of 3768 1236 Bpcgpihi.exe 118 PID 3768 wrote to memory of 4144 3768 Bipecnkd.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe"C:\Users\Admin\AppData\Local\Temp\a431baead574c9a02e6a681169ff592f9bfe07a8ce7a2ae582e9600fe97def08.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\Bgeaifia.exeC:\Windows\system32\Bgeaifia.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\Afbgkl32.exeC:\Windows\system32\Afbgkl32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\Aoioli32.exeC:\Windows\system32\Aoioli32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\Edionhpn.exeC:\Windows\system32\Edionhpn.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\Fndpmndl.exeC:\Windows\system32\Fndpmndl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\Kcjjhdjb.exeC:\Windows\system32\Kcjjhdjb.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\Ofgdcipq.exeC:\Windows\system32\Ofgdcipq.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\Pbcncibp.exeC:\Windows\system32\Pbcncibp.exe9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\Pjaleemj.exeC:\Windows\system32\Pjaleemj.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\Qppaclio.exeC:\Windows\system32\Qppaclio.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\Qcnjijoe.exeC:\Windows\system32\Qcnjijoe.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\Acqgojmb.exeC:\Windows\system32\Acqgojmb.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\Abfdpfaj.exeC:\Windows\system32\Abfdpfaj.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\Aiplmq32.exeC:\Windows\system32\Aiplmq32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\Amnebo32.exeC:\Windows\system32\Amnebo32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\Ampaho32.exeC:\Windows\system32\Ampaho32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Afhfaddk.exeC:\Windows\system32\Afhfaddk.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\Bdlfjh32.exeC:\Windows\system32\Bdlfjh32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\Bjfogbjb.exeC:\Windows\system32\Bjfogbjb.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\Bpcgpihi.exeC:\Windows\system32\Bpcgpihi.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\Bipecnkd.exeC:\Windows\system32\Bipecnkd.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\Ckpamabg.exeC:\Windows\system32\Ckpamabg.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4144 -
C:\Windows\SysWOW64\Cdhffg32.exeC:\Windows\system32\Cdhffg32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4192 -
C:\Windows\SysWOW64\Cpogkhnl.exeC:\Windows\system32\Cpogkhnl.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:948 -
C:\Windows\SysWOW64\Cmbgdl32.exeC:\Windows\system32\Cmbgdl32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1508 -
C:\Windows\SysWOW64\Cpcpfg32.exeC:\Windows\system32\Cpcpfg32.exe27⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Dkkaiphj.exeC:\Windows\system32\Dkkaiphj.exe28⤵
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\Dphiaffa.exeC:\Windows\system32\Dphiaffa.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2108 -
C:\Windows\SysWOW64\Dnljkk32.exeC:\Windows\system32\Dnljkk32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3432 -
C:\Windows\SysWOW64\Dgdncplk.exeC:\Windows\system32\Dgdncplk.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:1744 -
C:\Windows\SysWOW64\Ddhomdje.exeC:\Windows\system32\Ddhomdje.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2448 -
C:\Windows\SysWOW64\Djgdkk32.exeC:\Windows\system32\Djgdkk32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:4268 -
C:\Windows\SysWOW64\Eaaiahei.exeC:\Windows\system32\Eaaiahei.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\Ekimjn32.exeC:\Windows\system32\Ekimjn32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3996 -
C:\Windows\SysWOW64\Eaceghcg.exeC:\Windows\system32\Eaceghcg.exe36⤵
- Executes dropped EXE
PID:3908 -
C:\Windows\SysWOW64\Ekljpm32.exeC:\Windows\system32\Ekljpm32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4624 -
C:\Windows\SysWOW64\Ecgodpgb.exeC:\Windows\system32\Ecgodpgb.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:812 -
C:\Windows\SysWOW64\Eqkondfl.exeC:\Windows\system32\Eqkondfl.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\Enopghee.exeC:\Windows\system32\Enopghee.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4704 -
C:\Windows\SysWOW64\Fkcpql32.exeC:\Windows\system32\Fkcpql32.exe41⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\Famhmfkl.exeC:\Windows\system32\Famhmfkl.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:964 -
C:\Windows\SysWOW64\Fncibg32.exeC:\Windows\system32\Fncibg32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:1632 -
C:\Windows\SysWOW64\Fnffhgon.exeC:\Windows\system32\Fnffhgon.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4924 -
C:\Windows\SysWOW64\Fgqgfl32.exeC:\Windows\system32\Fgqgfl32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4712 -
C:\Windows\SysWOW64\Gjficg32.exeC:\Windows\system32\Gjficg32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2452 -
C:\Windows\SysWOW64\Gkefmjcj.exeC:\Windows\system32\Gkefmjcj.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4572 -
C:\Windows\SysWOW64\Gcqjal32.exeC:\Windows\system32\Gcqjal32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3744 -
C:\Windows\SysWOW64\Hnhkdd32.exeC:\Windows\system32\Hnhkdd32.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:2968 -
C:\Windows\SysWOW64\Hgapmj32.exeC:\Windows\system32\Hgapmj32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3228 -
C:\Windows\SysWOW64\Hjaioe32.exeC:\Windows\system32\Hjaioe32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2064 -
C:\Windows\SysWOW64\Hcjmhk32.exeC:\Windows\system32\Hcjmhk32.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:1052 -
C:\Windows\SysWOW64\Hannao32.exeC:\Windows\system32\Hannao32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1844 -
C:\Windows\SysWOW64\Hjfbjdnd.exeC:\Windows\system32\Hjfbjdnd.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5060 -
C:\Windows\SysWOW64\Icogcjde.exeC:\Windows\system32\Icogcjde.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4804 -
C:\Windows\SysWOW64\Ibpgqa32.exeC:\Windows\system32\Ibpgqa32.exe56⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Icachjbb.exeC:\Windows\system32\Icachjbb.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4948 -
C:\Windows\SysWOW64\Iaedanal.exeC:\Windows\system32\Iaedanal.exe58⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\Iccpniqp.exeC:\Windows\system32\Iccpniqp.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4700 -
C:\Windows\SysWOW64\Idhiii32.exeC:\Windows\system32\Idhiii32.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:3060 -
C:\Windows\SysWOW64\Jnnnfalp.exeC:\Windows\system32\Jnnnfalp.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3328 -
C:\Windows\SysWOW64\Jjdokb32.exeC:\Windows\system32\Jjdokb32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\Jhkljfok.exeC:\Windows\system32\Jhkljfok.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4492 -
C:\Windows\SysWOW64\Jogqlpde.exeC:\Windows\system32\Jogqlpde.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1068 -
C:\Windows\SysWOW64\Jddiegbm.exeC:\Windows\system32\Jddiegbm.exe65⤵
- Executes dropped EXE
- Modifies registry class
PID:5136 -
C:\Windows\SysWOW64\Koimbpbc.exeC:\Windows\system32\Koimbpbc.exe66⤵
- Modifies registry class
PID:5176 -
C:\Windows\SysWOW64\Kkpnga32.exeC:\Windows\system32\Kkpnga32.exe67⤵PID:5216
-
C:\Windows\SysWOW64\Kdhbpf32.exeC:\Windows\system32\Kdhbpf32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5252 -
C:\Windows\SysWOW64\Kkbkmqed.exeC:\Windows\system32\Kkbkmqed.exe69⤵
- Drops file in System32 directory
PID:5304 -
C:\Windows\SysWOW64\Kalcik32.exeC:\Windows\system32\Kalcik32.exe70⤵PID:5348
-
C:\Windows\SysWOW64\Khfkfedn.exeC:\Windows\system32\Khfkfedn.exe71⤵
- Drops file in System32 directory
- Modifies registry class
PID:5408 -
C:\Windows\SysWOW64\Kopcbo32.exeC:\Windows\system32\Kopcbo32.exe72⤵
- Drops file in System32 directory
- Modifies registry class
PID:5444 -
C:\Windows\SysWOW64\Khihld32.exeC:\Windows\system32\Khihld32.exe73⤵PID:5484
-
C:\Windows\SysWOW64\Kemhei32.exeC:\Windows\system32\Kemhei32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5524 -
C:\Windows\SysWOW64\Lkiamp32.exeC:\Windows\system32\Lkiamp32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5576 -
C:\Windows\SysWOW64\Leoejh32.exeC:\Windows\system32\Leoejh32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5612 -
C:\Windows\SysWOW64\Llimgb32.exeC:\Windows\system32\Llimgb32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5668 -
C:\Windows\SysWOW64\Lbcedmnl.exeC:\Windows\system32\Lbcedmnl.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5712 -
C:\Windows\SysWOW64\Lddble32.exeC:\Windows\system32\Lddble32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5752 -
C:\Windows\SysWOW64\Ldfoad32.exeC:\Windows\system32\Ldfoad32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5792 -
C:\Windows\SysWOW64\Mebkge32.exeC:\Windows\system32\Mebkge32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5844 -
C:\Windows\SysWOW64\Mahklf32.exeC:\Windows\system32\Mahklf32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5884 -
C:\Windows\SysWOW64\Nooikj32.exeC:\Windows\system32\Nooikj32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5928 -
C:\Windows\SysWOW64\Noaeqjpe.exeC:\Windows\system32\Noaeqjpe.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5968 -
C:\Windows\SysWOW64\Nlefjnno.exeC:\Windows\system32\Nlefjnno.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6008 -
C:\Windows\SysWOW64\Nbbnbemf.exeC:\Windows\system32\Nbbnbemf.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:6056 -
C:\Windows\SysWOW64\Ncaklhdi.exeC:\Windows\system32\Ncaklhdi.exe87⤵PID:6096
-
C:\Windows\SysWOW64\Odbgdp32.exeC:\Windows\system32\Odbgdp32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:6140 -
C:\Windows\SysWOW64\Oohkai32.exeC:\Windows\system32\Oohkai32.exe89⤵
- Drops file in System32 directory
- Modifies registry class
PID:5156 -
C:\Windows\SysWOW64\Ofbdncaj.exeC:\Windows\system32\Ofbdncaj.exe90⤵
- Drops file in System32 directory
- Modifies registry class
PID:5236 -
C:\Windows\SysWOW64\Okolfj32.exeC:\Windows\system32\Okolfj32.exe91⤵
- Drops file in System32 directory
PID:5268 -
C:\Windows\SysWOW64\Ohcmpn32.exeC:\Windows\system32\Ohcmpn32.exe92⤵
- Drops file in System32 directory
- Modifies registry class
PID:5440 -
C:\Windows\SysWOW64\Obkahddl.exeC:\Windows\system32\Obkahddl.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5508 -
C:\Windows\SysWOW64\Omaeem32.exeC:\Windows\system32\Omaeem32.exe94⤵
- Drops file in System32 directory
PID:5596 -
C:\Windows\SysWOW64\Ofijnbkb.exeC:\Windows\system32\Ofijnbkb.exe95⤵
- Modifies registry class
PID:5692 -
C:\Windows\SysWOW64\Obpkcc32.exeC:\Windows\system32\Obpkcc32.exe96⤵PID:5772
-
C:\Windows\SysWOW64\Pcpgmf32.exeC:\Windows\system32\Pcpgmf32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5832 -
C:\Windows\SysWOW64\Pdqcenmg.exeC:\Windows\system32\Pdqcenmg.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5920 -
C:\Windows\SysWOW64\Pbddobla.exeC:\Windows\system32\Pbddobla.exe99⤵
- Drops file in System32 directory
PID:5980 -
C:\Windows\SysWOW64\Pmjhlklg.exeC:\Windows\system32\Pmjhlklg.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6080 -
C:\Windows\SysWOW64\Peempn32.exeC:\Windows\system32\Peempn32.exe101⤵
- Drops file in System32 directory
PID:6132 -
C:\Windows\SysWOW64\Pbimjb32.exeC:\Windows\system32\Pbimjb32.exe102⤵
- Drops file in System32 directory
PID:5204 -
C:\Windows\SysWOW64\Pmoagk32.exeC:\Windows\system32\Pmoagk32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5392 -
C:\Windows\SysWOW64\Pcijce32.exeC:\Windows\system32\Pcijce32.exe104⤵PID:5548
-
C:\Windows\SysWOW64\Qfgfpp32.exeC:\Windows\system32\Qfgfpp32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5700 -
C:\Windows\SysWOW64\Qmanljfo.exeC:\Windows\system32\Qmanljfo.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5820 -
C:\Windows\SysWOW64\Qbngeadf.exeC:\Windows\system32\Qbngeadf.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5948 -
C:\Windows\SysWOW64\Qihoak32.exeC:\Windows\system32\Qihoak32.exe108⤵
- Drops file in System32 directory
- Modifies registry class
PID:6092 -
C:\Windows\SysWOW64\Qkfkng32.exeC:\Windows\system32\Qkfkng32.exe109⤵PID:5292
-
C:\Windows\SysWOW64\Amhdmi32.exeC:\Windows\system32\Amhdmi32.exe110⤵PID:5544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=3112,i,1786399861560734457,5606877702857066305,262144 --variations-seed-version /prefetch:81⤵PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD566ba53c475f3a1da06984355e9756dc2
SHA1c2dda45b6f1b8fc4313e020be5f4491b5b7d63e8
SHA256d05a69ccc65f54298ad09f555c60c032c8c6d3145c453609bdd68fc1b74d02a3
SHA512eadab397dd7155d312637d3aa4b3ac8a7cd332ef77c9e5c6d60a8e6efd5eb2253d47920b167cfb69fd623119efee4f26ca77689aac6f3d65d3a1efab17a01e8f
-
Filesize
377KB
MD593f1a3b334b809f0d264d005d0f48bf4
SHA159cea35b778b45297dac328f3844909a6ca56bd1
SHA25603681f2d9b1d85b899adbeb2d13d2ffbb83023851366ef7b522e8d30cc301dc1
SHA5128c9b192a46a81eb54c036235975ba1abd68f0ad6dabbeedf20f4a472149ec11736f2bce01ceda61581e735d9262ca7d620737caf6e0493f503b9c9a3ed01a89a
-
Filesize
377KB
MD58a069b27e1451eed95ff761904717f92
SHA13e36262c166a91b70de8714c4428817c01ac953e
SHA256197445cbe0b19291c44ec8a3b42a3d9ad08e10c0c02bb035b932db37f01466c7
SHA51230b165a7650be737ab36096fdfa06ad1f16b7866b6bce334c2f6b248896448d8380e288d9c4b707b94f1837cb0636780bb048035e1e5e8007b45a205ed73b1a0
-
Filesize
377KB
MD514eb5c0682a8282a06ac134a964f36bb
SHA1c0abc20097a639eff4b2906ce5dd8dac456d3e7e
SHA25620470ddcdd04bd101a7229c3f77bc99c1e3c3955b35d2efc7dbb6455b9559e38
SHA5126062bf0452d024294a8b436c34707c8ca55c1712ef380739b6d6a68993855c808c5d2064095ba4cc12bf7a22ba1f1dc6810ff60a9d860a0655e97aaf316e28b9
-
Filesize
377KB
MD57a697f290f12db2465b3f908365c414c
SHA130d7c879bd580d310e3f50d9509be6fafdbea775
SHA2567066cb075d7f7c20b0e5b3acba2df574b63318a422422a0911fbc604be5be5ae
SHA512bf6a2606233e993a3999cd576d8a19e70ffb60abb144e5d7463d34315876476f40142fe26cb82121b62697b907d53adde77f17aad3e09516cfdfb4417c1d1829
-
Filesize
377KB
MD5237cd3fbc39d976a2f0f39b23ac2a666
SHA1297afb3eda793fb1cfb8c37d3c6099203307dd1a
SHA256ee4d2bfb61929f91a5702cfe0976d484e492440e7da23da84bbd5deaebc7a9d5
SHA512d3271658752ee6ec40432dd6791f0be85fce0a28f3479cf2bb8caad2669bfdbaf61b00c9f4a7f249925b1ebd0c16ec810ae31e0255dd833c84710c47b7d339fc
-
Filesize
377KB
MD5f0666be764da235d0716db48b8419772
SHA118cfbdc25cd42fa1e64914e9fb2babfba269ef4f
SHA2560b917415200e67023725e5f7dcc9da9969455fd83a0f4abd3d38e09f8a88ef2d
SHA512284076b2318382fe15da032be869a018e63e22a1ef7e83f2940e2df98f64aa55dfe525a475e5937939a63ecba2a6de29300643c20892aad1e63d58e6431cdcb5
-
Filesize
377KB
MD5b6dc53cc841c88227c5aae4ac477c79d
SHA15a8c41c42c5d478e48b208dba921389f83c36662
SHA256c186d19d550cf4b99c5d40f4bda4c5cc2a4b2ab379a4066fc391bf21ee14a658
SHA5126ee286e630ff582a6c528d5cbfa5c662b46f977e8dbf42325faad6cd625327cc542831e52f094e85c8ab2e12df72ecef3b0393fdfbd9643fa011b003a146f7cb
-
Filesize
377KB
MD5442a9bf1637316b076881cbc70f808e4
SHA1cd237fda4565c59b3fdc2cf76d1486078bb01dca
SHA256ccb092c4be68372a1292d9280a66fadb8476e5d96076fe9bc21233e5c4219aff
SHA512afefe43e6b419574bf3acc2b3c7bf28597d9b2b4e9c93254fca65499fa4dc9c07ef02a7c6ce462f427ea8a4a1a605d89de30222238bbf0097159f4c2345ea04a
-
Filesize
377KB
MD53e0c358f1b2086fb5f08ccbec4cfb385
SHA1ba5ba716f011e720732393cf27de9cff1b810691
SHA2560e812c5bad1fb1262114fe66f25e37ea695add966eade5b02966dccf28299dda
SHA5128ac63f3c2280906d56ecdc8f8da2578d57fc0aab451a92659e63dbb625be3b21f3fb1fe94506fc986658806c2e07013625165b0eb1b9ab1aff02824a68c999b4
-
Filesize
377KB
MD513dd48337f68c66122d80782568434e5
SHA1fb59d97c6bf62f1a94e44b451b34b99dfa8fb36f
SHA25646c4ac9d71470938e0692c58a87d3fabe362a02a6c84ff6572f5e35360d4009f
SHA5121dd56ff2362a9c622c97ea5bb9074c623d44b7ff8f230b8b38215b37e3a6927fe0779e9fb6b5994435a85cc48500d5de809d064dd66a2daedc1c030b786ec025
-
Filesize
377KB
MD56855d356ab5858efe5969268291701f4
SHA1f7754b93d8840a981fecddc28feec290f8593da8
SHA25621901b33bdcbf03ff6392389e83ecffd940da2557a631fc507d6bc324dedcf29
SHA5120c47955d5fa17a7a3c02dc733a7c6bbd1abb88e003645ea45eb4a0adb717966c02a66c7d601b46e260dc64e60b84153556a9072ddf5a57398cd28dc6f323c5de
-
Filesize
377KB
MD5f0f8cd2f322d60623af91624fdf76b71
SHA14cb39734fca3abe8a33dacb4c33316d7d81ef40e
SHA256a4543d27a8e75c24600fb2287df48697ecd35618cf000e779702b01bdbb9cb01
SHA512dfdedcc852e0d614ad537df596aec5a040d4d047954ff5c594014c4ae50d33f8251523465b9da0befb45db93818e8905e1778dc85f8e938fe6f9a8f63030cc12
-
Filesize
377KB
MD5b01b30f479fde520704d4cfe80eb56b7
SHA1bbdaf6279748899ea734b9c20dcd39d8ceda2247
SHA256af36dc39e5cac011f45f3058d169fd345f52fff1a668979672f738252fafb057
SHA5129dd6cf99178b9d133e73fc8f1e2e4ccaafa5b40f51a67f6796dd52b988e5b7391053c0cf86ff55086173eafec98c8eeaec07b72033cbf0f0f564d1830e20bc5e
-
Filesize
377KB
MD59638e5102a195dcca2cde542d7412bb5
SHA1f1f1e5609790867e840832a72330e7d17d7b372b
SHA256cb0762b916291238930143fbf7de43e53543357170e93af1d4728429161bd909
SHA51233c67e8fb013ecd76967a6fff085a4e4046ddb35a8a56907ebdcff824c0eb148c0ddd3125ba8d5d0b7c3d751707c7ef9570a78c87068b8a05545c71c5e76d1a6
-
Filesize
377KB
MD5d9e35c2b7d57f64c4a31e17a928d482b
SHA14e716c2754a5fc0c53782f2026382a2855c3f2df
SHA25692960d6320058a06064ae9cd2a3f5d9cf10cdb9e644a9aa3f2f23f2e73fa107c
SHA512e806f590d6772a00e794de2cf6c2352b08d3a35fe9cc75df7ca923a797ffb3f47fc8e3ebfc109cc0d833a6e7b875114bb45c13df9b7f4254d4c6dc99b5f2ebe5
-
Filesize
377KB
MD54f2b44af602a0df2c353b546bcadcb67
SHA1000b6fac01f1e3899c12238469ae8ff61841125f
SHA2563be04ada080336ad16e3950b9614352b5060a67ba70ece3d549766e4dcbbf51b
SHA512c63504a163d53ffa086b92ee0503c66400cb2868a8500c092a3abac5d238bb17cefe3401f7d72ef58158d9978b11fc7caf10252b912e5f50074dbb2bd647c36d
-
Filesize
377KB
MD5b994e51f1647aeca2eed05427ceafd1c
SHA193e167dab2693c0fb2442a723c0e13bc50765a7c
SHA2562bdbb3b4b32f75c63c3cba385b556d549ddd83fe5010bfadf3e3843397736d47
SHA512a66ddd284ef1fa7a5f73e217ba7fa10b60ad19e5eef242d46a448061ed82d432029c43d48e546086d1f875473351277b555c7be50eb8e4e325ad053b29fc1745
-
Filesize
377KB
MD570ee01349681a7e0d88190be94a26152
SHA1d5a158b11b1a4da824bbb629acb6a6e32e9038a0
SHA2567f6dde57e368f81f90f8fb46fcf964237c85a4105bcdcfabdbc26c22c5fe8343
SHA5121496a3de65c5cfaa20465957a7a6418349a15d28327cb5519fd13325a2bf34799fe3df6c2435007f15bcd6293d3cca03d280fa72d5e40138c976d1a21d147870
-
Filesize
377KB
MD5f597fada194d483a9b4c2c7d80dda8cc
SHA11a505b5ac24428e93cb78218d1da2d9342f4726a
SHA256842faab95f86a783711a6d799f1a7559556058f857fbe50df0d2650790223a16
SHA512c25dd2cc0bfc1bd2d36b77606272dd0312b3d5330c7f49c1e30ea9ca780bc50516cff4b8b445a8656629290f66394dc782620002fff6469a6ea6da6399a92335
-
Filesize
377KB
MD5dbea0981f4fb503034350b5249dbd659
SHA1ced4dc5adcb710d8db67458a1cb250f32764dc4c
SHA256085f23d3743fa77b39d472a3ea8cdd01878f3b3854d26f6c26cb9a1457f086e5
SHA512dc03bca6a2d7d3bfc246fae2c024d04f97e3c0fa7a2e4dcf92e4cf55aeeb4ad9c22d066bc8cdf65be7d775f86707a5e452fe2e6b430d8096659872188cb08e57
-
Filesize
377KB
MD59c731e8fc6f11c84da1ebaafffa302bd
SHA124f27e969cc62f90c19354612a8d9a44b7e5ada7
SHA25612a9bf21b7b681d2d9e1b394bba5f4abd8d7d7be114d8dbb08d2535ebeac50c1
SHA51279e3c5509a32e2d2516b1f768d491e856e768a02fc10f432d3600d82cacbd1b442fd2889498f2b851f95ab06d9591d5b31738915fe9e1dccfba34d6118cc99bd
-
Filesize
377KB
MD599ecb6f6ed45f3be6d7489193cfc4b10
SHA10f905f4683d977a09bb166e3d35a1dddb1ff9b53
SHA2561f92f16902c0cf756500c558b729f45bee90aa3474522f28961f97d4bc7d1803
SHA5123a600f37ffa6d0cae14e80db5840f67d7776167d9dadd94f85a7c61616bb168060cf5f54ec3e000f48af0fc687b32d80949a24d925926d7bf5876cd22a9160e3
-
Filesize
377KB
MD5c4f177ccf3a8e6a2ac3bff17ff81caf6
SHA1bbbd82648d04d0e1b7fa9c71db3591f978155541
SHA25611fcbd0a714793a289f6c10853a306223bbecf990e72fc87425069fb08e6e5d4
SHA512a5f309ab0dde23b5323188ebbe0671c100607793f3cd9fb47129fcbb0ab632e39344a4aadf6c903a160244f7e5fa9ecd3daa1e55625e35f3060ef0439faec1d7
-
Filesize
377KB
MD56add2d95d999025d5845f16303f56e60
SHA1e53e026508a5fc48e8dcac71a0210111cd5ac455
SHA2564e9a146bdbca5fe36d77cd8b2841e2970b41caa80a7af9623b8f7daa115807bb
SHA512841ab4f263dbfe11493cfeef5137ae46937dd5f7be06cf8e244425689a27ba4bb4fdf7cb01a9aa9eeee12a314641285ce89fbf571e5fb89e2571fc9f79219db5
-
Filesize
377KB
MD5218d1168ef4f3a3f9e31e4769e32ea74
SHA14c888c50ff1aff6884c504664df535b965962796
SHA256b694abd0255a181d0960b5ddf1e3f3215cdc40e9f9de0188f30396394407d119
SHA5120494756b1b116669f00b1fffbc8574f864d0c5613d01d08f9e21ab7c3503b20ef31aa15e21a01706d0bc5fc3fa4cfe4ba056424ff8aac3e6bd51c96b74c0caca
-
Filesize
377KB
MD56dbbe302ada4352b21f8c2255cea84f7
SHA14d85e9d7dc0680d7f9a7822d91cc32aa7c5cc64b
SHA256a4464ac570da9de905c6c1bbbc0086b7ae3754ea40f68f8e58c9deaaed47e7b6
SHA512b1efc4599476416143f6a913593e37d48c33b48683bd07ecd87d12c5fe6a4320b1056ff467d09aea77fcb6847d08d3a4d5f9556f8d605ee10e4df3d510d089af
-
Filesize
377KB
MD51c1bd4706cff7c9726b1d648e23ee2ca
SHA1efabe5a7950278ae24817eb4dd73a4683c5081ce
SHA256ae4eb45ad27d5305214efa2427b1474b7b27db0ce0868ff24420c7fec6f4a90c
SHA5121490ed3c6419c2d31071ad8cb4d797500d6be38440761482b6d6e220a94c446ad39c92a20b65f1145ef05358af7ed63c790f73772cb88554385603c03aced16a
-
Filesize
377KB
MD52012d6413746ed08f33850a331113826
SHA1ca715ffaadc9c4d84537cb525feb032140acbcc3
SHA2569d4b5555fd285eb05d46c3118325024013020c0b6e4bf630b498b30c3de4017e
SHA5123a53d758931da8523b95231870b50a4242d5eb0f7f67a25cd72e94e38f89cdcdc29d095aece0180d7f4adfe97ef97e96c5a2cd366328c6aa87b2a799b033e865
-
Filesize
256KB
MD553dd42d7752caa1eca305e2c51424265
SHA1c711baa7517032db70d0fd7be555e7c41ec9cc33
SHA256e0427f84d26cb9d9754185c167af4321d315f73b9985dd65e2c97fd6f12d9c89
SHA5127f2c52e4db4704c0903472df3af9f883a577cf4bd14d94e060f29a4851d7f29b2603ff7eef5636fdac503006e20c828cceeef591e82c15c3cf8ccc4f73c70001
-
Filesize
377KB
MD5a32b0f6e6ca8bd2a91ad7eef8718a65c
SHA18a5ed244ab20922004cea756f395eb736f342697
SHA256aa54bcff89b2d1926085e3e7a003dbda80a5fcab2493394e9306c6d05f2978c9
SHA512060d2d324c830ab2e00058a8deb59ba796407d57ac497a119f3348e8b3b53b36398a2f93b1c98cf3864be20172dea07e234d5aa84eb2e70257fcd0a1988d6c0e
-
Filesize
377KB
MD5b36d1dafb68860b7d7831dda09f4a798
SHA1f5d1ecf7b866ee9f0d93d9e24ec289d4d2a9e7dd
SHA2565d389f32fa58c7b5f1bf844b924fdd807f93d3c2611b0a5b3e70bd9eff93e2dc
SHA512a7f5368d5b0a64a736d1c3859bfd8cc291a92399f6ea3357f04ddd4a7f1d10bb997c6efa5ac1f6da57aab77ecd0c1ba9fc9f75ce4056e8bc3829941f76daa11d
-
Filesize
377KB
MD5c9bf1f51776902c4c64c056743370ba6
SHA1724277c91d1249f46f690ece835f718d03450f3b
SHA25604819095c5e68231bf7dda81aa3471b6fe617ea79860b4d002399f6b9a6dbc0b
SHA5126afe51e824760f635842fc527ddc7fe4d36f09f7fc2c7134fb9ca2d0ed2f6c63f6c5ffa303a756c2d8dc19fe6ce73ccae1b401924671632bb7ce8f415953d88b
-
Filesize
377KB
MD5ab8b1afe4d0e955730a31abe8a40675e
SHA13cbb78987b8dcfadb69ba23a80da0ac2bffbe124
SHA25678f8e5822e72e0f94b817393af3f9723362d17f748b590841316634771bed310
SHA512521052ea59ef2220da3cac8a661ed0da59bfd5f21b92393bffa115a1b293f548161818d7b7234382d9d4e1b684f55698fe82398e6fa8f15b8c9c07ca03730cbc
-
Filesize
377KB
MD5b7b5874d33cafc910f3193d9d5d29409
SHA1745715dab71ffe9eb14d13a261bbef8ff09e8e76
SHA256ef4c8224fe827c1fb2c856b82d20fb8e94b4a3f910f8fae2d5fce643e098dfb0
SHA512d8eaf4a178fda8125df65dbd1de1424d65258659edd754ea1aca3bf7b10a8866f464b032d9612c6e5ae748a5c07dac3cc390652beda01e0c92acddc23888d904