Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 03:39
Static task
static1
Behavioral task
behavioral1
Sample
fa7874905ed2057e3df3ea526b32474cb1953517515a77c7f20f25390a0f9cfb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fa7874905ed2057e3df3ea526b32474cb1953517515a77c7f20f25390a0f9cfb.exe
Resource
win10v2004-20220901-en
General
-
Target
fa7874905ed2057e3df3ea526b32474cb1953517515a77c7f20f25390a0f9cfb.exe
-
Size
92KB
-
MD5
11c14668a63c8102e1ce06ef6d72cbb0
-
SHA1
0848ce7602bdc1a87bf7695857c7ce90794fb45a
-
SHA256
fa7874905ed2057e3df3ea526b32474cb1953517515a77c7f20f25390a0f9cfb
-
SHA512
866cbdd54a739bce328025c32c9756d9a01faaa37ca80835b389b0657589a3b1b1f2351ca5b00ebdf41d9299dbed5dad368e9a55dd297afe1cc5e2045337783e
-
SSDEEP
1536:VhlKg00+50ZS3nYhWXxXOh20c/sJ9DR5kzBm3jLV3BGnMPJKEsztuJO:fYKZqYhWXxXOh20ckJ9DR5eKjLlBRh10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agafph32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odednmpm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omfcdg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apbnnh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjmfch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngcnnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pabkdmpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flnlhk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plgpqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjqlca32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqbpqgpj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkhdnppp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apbnnh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibjqcd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmoahijl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fngcbpom.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Haphoc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecccci32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpenfjad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipckgh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chghdqbf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jndhagqg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfiekpgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbqlfkmi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffddka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fejenklb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgdbkohf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peajdajk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdfjifjo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hioiji32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmgfda32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmphpqle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gplbjamj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djpnohej.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Domfgpca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndghmo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmidog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfiafg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmpagnmb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahkflk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkchfi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdhphkin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpcmec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dopigd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mejiqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbfiep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amgeac32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbibki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aahdqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Immapg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jlpodoml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnpadc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moofcp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flnlhk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhjfhl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aekdefel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jhifdimb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edkdkplj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbgmcnhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bgickm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpkbebbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaoaja32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcalgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhmkef32.exe -
Executes dropped EXE 64 IoCs
pid Process 4960 Nidhmp32.exe 5028 Npnqjjgf.exe 652 Nleaok32.exe 1116 Nmdnin32.exe 4580 Nfmbacjn.exe 3172 Ofoogc32.exe 3936 Ollgoj32.exe 3460 Ofalmc32.exe 1536 Odelfg32.exe 1444 Omnqom32.exe 2260 Offehbbc.exe 1924 Opoiqh32.exe 3260 Oignimod.exe 3656 Pbobbcfd.exe 4248 Plhgkh32.exe 212 Pljcqhjb.exe 4392 Pcfhcb32.exe 3180 Pdfeme32.exe 840 Plajag32.exe 748 Qkbjooli.exe 4156 Qkdgen32.exe 4328 Admkndag.exe 1828 Anepfi32.exe 3996 Apclbe32.exe 4688 Anhlliee.exe 484 Agpqeo32.exe 3332 Almime32.exe 3368 Aknikm32.exe 2824 Apkbcd32.exe 3540 Bnobmh32.exe 4116 Bckkeo32.exe 988 Bnaobhmj.exe 3512 Bpokncln.exe 1884 Bgickm32.exe 4208 Bnclhgkh.exe 924 Bglpqm32.exe 3780 Bgnmfmpe.exe 1084 Bdbnpaoo.exe 4612 Dkhehilo.exe 1240 Ddpjao32.exe 3060 Dnhnjdip.exe 1356 Ddbffopl.exe 3804 Dgabbjpp.exe 3416 Dmnkkang.exe 4192 Dcgcgk32.exe 3752 Dkokih32.exe 3252 Dmphpqle.exe 4040 Degpanlg.exe 2856 Dgelni32.exe 4772 Dmbdfp32.exe 3564 Dclmbjao.exe 3588 Ekcedhaa.exe 3508 Emdakp32.exe 636 Ejhbedfi.exe 2436 Egmbnhec.exe 3208 Ecccci32.exe 2920 Emlglo32.exe 2104 Ejphec32.exe 4508 Fgchog32.exe 4052 Fmpagnmb.exe 4060 Fnpmaa32.exe 3616 Fejenklb.exe 3960 Fldnke32.exe 1760 Fnbjga32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Jookpjlp.exe Jlpodoml.exe File opened for modification C:\Windows\SysWOW64\Kkalajgf.exe Kdgcdp32.exe File created C:\Windows\SysWOW64\Kfdqgelq.dll Pedndg32.exe File created C:\Windows\SysWOW64\Paadnmaq.dll Ndghmo32.exe File created C:\Windows\SysWOW64\Nngokoej.exe Nepgjaeg.exe File opened for modification C:\Windows\SysWOW64\Bgnmfmpe.exe Bglpqm32.exe File created C:\Windows\SysWOW64\Gejoei32.exe Gmcfcl32.exe File opened for modification C:\Windows\SysWOW64\Ganljdbj.exe Gfhglkbd.exe File created C:\Windows\SysWOW64\Jfpkahde.dll Lhkkqgml.exe File opened for modification C:\Windows\SysWOW64\Pahkjbop.exe Pbekne32.exe File created C:\Windows\SysWOW64\Ffekegon.exe Fcgoilpj.exe File opened for modification C:\Windows\SysWOW64\Ekcpbj32.exe Ehedfo32.exe File created C:\Windows\SysWOW64\Bejfanad.dll Elgfgl32.exe File opened for modification C:\Windows\SysWOW64\Ioeijldj.exe Ihkpma32.exe File opened for modification C:\Windows\SysWOW64\Ffodfmjo.exe Fcqhjakk.exe File created C:\Windows\SysWOW64\Qceiaa32.exe Qqfmde32.exe File opened for modification C:\Windows\SysWOW64\Kfankifm.exe Kpgfooop.exe File created C:\Windows\SysWOW64\Onkhhapm.dll Pbobbcfd.exe File created C:\Windows\SysWOW64\Kfankifm.exe Kpgfooop.exe File created C:\Windows\SysWOW64\Aifkpk32.dll Qbggce32.exe File created C:\Windows\SysWOW64\Pgemphmn.exe Oqkdcn32.exe File created C:\Windows\SysWOW64\Afmhck32.exe Amddjegd.exe File opened for modification C:\Windows\SysWOW64\Bljodmja.exe Bjlbhbkn.exe File created C:\Windows\SysWOW64\Opmllk32.exe Ogfcjnaj.exe File opened for modification C:\Windows\SysWOW64\Ldanqkki.exe Lljfpnjg.exe File created C:\Windows\SysWOW64\Ekakkkla.dll Fnaclk32.exe File opened for modification C:\Windows\SysWOW64\Hfpnmj32.exe Hdaaao32.exe File created C:\Windows\SysWOW64\Allbbo32.exe Aebjfeod.exe File created C:\Windows\SysWOW64\Hmeloe32.exe Hjfpbi32.exe File created C:\Windows\SysWOW64\Jondfdhd.exe Jggmdgha.exe File created C:\Windows\SysWOW64\Njogjfoj.exe Nceonl32.exe File created C:\Windows\SysWOW64\Fiknll32.dll Febgea32.exe File opened for modification C:\Windows\SysWOW64\Gmoeoidl.exe Gdhmnlcj.exe File created C:\Windows\SysWOW64\Bnaobhmj.exe Bckkeo32.exe File created C:\Windows\SysWOW64\Nblfkobn.exe Npnjodcj.exe File created C:\Windows\SysWOW64\Ikifog32.exe Ihkick32.exe File opened for modification C:\Windows\SysWOW64\Fljcmlfd.exe Edbklofb.exe File opened for modification C:\Windows\SysWOW64\Qidcpe32.exe Qffgdj32.exe File created C:\Windows\SysWOW64\Oldfmkia.dll Haphoc32.exe File created C:\Windows\SysWOW64\Febgea32.exe Fcckif32.exe File created C:\Windows\SysWOW64\Fooeif32.exe Flqimk32.exe File created C:\Windows\SysWOW64\Nnqbanmo.exe Nckndeni.exe File created C:\Windows\SysWOW64\Japqjf32.dll Ddbffopl.exe File opened for modification C:\Windows\SysWOW64\Gqfooodg.exe Gmkbnp32.exe File opened for modification C:\Windows\SysWOW64\Kpeiioac.exe Jianff32.exe File opened for modification C:\Windows\SysWOW64\Ieanleid.exe Injekhib.exe File opened for modification C:\Windows\SysWOW64\Fobiilai.exe Fmclmabe.exe File created C:\Windows\SysWOW64\Ppmeid32.dll Hbeghene.exe File opened for modification C:\Windows\SysWOW64\Nafokcol.exe Njogjfoj.exe File created C:\Windows\SysWOW64\Flceckoj.exe Ffimfqgm.exe File created C:\Windows\SysWOW64\Pnfeqknj.dll Gkoiefmj.exe File opened for modification C:\Windows\SysWOW64\Kmkfhc32.exe Kfankifm.exe File created C:\Windows\SysWOW64\Lmgfda32.exe Lmppcbjd.exe File created C:\Windows\SysWOW64\Abmafgei.dll Boldjd32.exe File opened for modification C:\Windows\SysWOW64\Ejgdpg32.exe Ecmlcmhe.exe File opened for modification C:\Windows\SysWOW64\Aadifclh.exe Ajkaii32.exe File created C:\Windows\SysWOW64\Eonefj32.dll Megdccmb.exe File created C:\Windows\SysWOW64\Pfjcgn32.exe Pdifoehl.exe File created C:\Windows\SysWOW64\Jkdnpo32.exe Jpojcf32.exe File opened for modification C:\Windows\SysWOW64\Ngedij32.exe Ndghmo32.exe File created C:\Windows\SysWOW64\Ehoolikk.dll Alelbpmi.exe File opened for modification C:\Windows\SysWOW64\Hmnoec32.exe Hfdghihg.exe File created C:\Windows\SysWOW64\Ljmpfbln.dll Chphoh32.exe File opened for modification C:\Windows\SysWOW64\Kgdbkohf.exe Kpjjod32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 7264 7172 WerFault.exe 975 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dohfbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkfoeega.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nebdoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghhdfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lddikg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfmifaji.dll" Nnpcpjfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmejoenk.dll" Hmlbod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Foabofnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpeaka32.dll" Hhdjmcce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Opglebkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmdaji32.dll" Amgeac32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldkojb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paadnmaq.dll" Ndghmo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddbbeade.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pejjde32.dll" Ehedfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Galooolh.dll" Fldnke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nejbgkaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcikolnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kefkme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjadha32.dll" Hajbpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elflbfej.dll" Pohibm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbfpobpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Agpqeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfelpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iokdnk32.dll" Ialhkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pkfblfab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ffimfqgm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmkfhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amdilc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndebbe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogjmdigk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfifmnij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pljodf32.dll" Kbkdnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gcjkppcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qbggce32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnaobhmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Plimfb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecmlcmhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fobdihjo.dll" Chghdqbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlcifmbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjmehkqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlnbhh32.dll" Dmphpqle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbiklpin.dll" Dabpnlkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejbkehcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjmnoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abmafgei.dll" Boldjd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hbanme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmdlbjng.dll" Afmhck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmnlpfhd.dll" Fcikolnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkpdfdpi.dll" Nfmbacjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmhgbijo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hfpnmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifmcdblq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okjbpglo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgdcehdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mbdipjej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmapha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gmlpcmce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jdigcalj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ceqnmpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lifnhnno.dll" Bgfpkgbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ffmhqm32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 4960 3592 fa7874905ed2057e3df3ea526b32474cb1953517515a77c7f20f25390a0f9cfb.exe 81 PID 3592 wrote to memory of 4960 3592 fa7874905ed2057e3df3ea526b32474cb1953517515a77c7f20f25390a0f9cfb.exe 81 PID 3592 wrote to memory of 4960 3592 fa7874905ed2057e3df3ea526b32474cb1953517515a77c7f20f25390a0f9cfb.exe 81 PID 4960 wrote to memory of 5028 4960 Nidhmp32.exe 82 PID 4960 wrote to memory of 5028 4960 Nidhmp32.exe 82 PID 4960 wrote to memory of 5028 4960 Nidhmp32.exe 82 PID 5028 wrote to memory of 652 5028 Npnqjjgf.exe 83 PID 5028 wrote to memory of 652 5028 Npnqjjgf.exe 83 PID 5028 wrote to memory of 652 5028 Npnqjjgf.exe 83 PID 652 wrote to memory of 1116 652 Nleaok32.exe 84 PID 652 wrote to memory of 1116 652 Nleaok32.exe 84 PID 652 wrote to memory of 1116 652 Nleaok32.exe 84 PID 1116 wrote to memory of 4580 1116 Nmdnin32.exe 85 PID 1116 wrote to memory of 4580 1116 Nmdnin32.exe 85 PID 1116 wrote to memory of 4580 1116 Nmdnin32.exe 85 PID 4580 wrote to memory of 3172 4580 Nfmbacjn.exe 86 PID 4580 wrote to memory of 3172 4580 Nfmbacjn.exe 86 PID 4580 wrote to memory of 3172 4580 Nfmbacjn.exe 86 PID 3172 wrote to memory of 3936 3172 Ofoogc32.exe 87 PID 3172 wrote to memory of 3936 3172 Ofoogc32.exe 87 PID 3172 wrote to memory of 3936 3172 Ofoogc32.exe 87 PID 3936 wrote to memory of 3460 3936 Ollgoj32.exe 88 PID 3936 wrote to memory of 3460 3936 Ollgoj32.exe 88 PID 3936 wrote to memory of 3460 3936 Ollgoj32.exe 88 PID 3460 wrote to memory of 1536 3460 Ofalmc32.exe 89 PID 3460 wrote to memory of 1536 3460 Ofalmc32.exe 89 PID 3460 wrote to memory of 1536 3460 Ofalmc32.exe 89 PID 1536 wrote to memory of 1444 1536 Odelfg32.exe 90 PID 1536 wrote to memory of 1444 1536 Odelfg32.exe 90 PID 1536 wrote to memory of 1444 1536 Odelfg32.exe 90 PID 1444 wrote to memory of 2260 1444 Omnqom32.exe 91 PID 1444 wrote to memory of 2260 1444 Omnqom32.exe 91 PID 1444 wrote to memory of 2260 1444 Omnqom32.exe 91 PID 2260 wrote to memory of 1924 2260 Offehbbc.exe 92 PID 2260 wrote to memory of 1924 2260 Offehbbc.exe 92 PID 2260 wrote to memory of 1924 2260 Offehbbc.exe 92 PID 1924 wrote to memory of 3260 1924 Opoiqh32.exe 93 PID 1924 wrote to memory of 3260 1924 Opoiqh32.exe 93 PID 1924 wrote to memory of 3260 1924 Opoiqh32.exe 93 PID 3260 wrote to memory of 3656 3260 Oignimod.exe 94 PID 3260 wrote to memory of 3656 3260 Oignimod.exe 94 PID 3260 wrote to memory of 3656 3260 Oignimod.exe 94 PID 3656 wrote to memory of 4248 3656 Pbobbcfd.exe 95 PID 3656 wrote to memory of 4248 3656 Pbobbcfd.exe 95 PID 3656 wrote to memory of 4248 3656 Pbobbcfd.exe 95 PID 4248 wrote to memory of 212 4248 Plhgkh32.exe 96 PID 4248 wrote to memory of 212 4248 Plhgkh32.exe 96 PID 4248 wrote to memory of 212 4248 Plhgkh32.exe 96 PID 212 wrote to memory of 4392 212 Pljcqhjb.exe 97 PID 212 wrote to memory of 4392 212 Pljcqhjb.exe 97 PID 212 wrote to memory of 4392 212 Pljcqhjb.exe 97 PID 4392 wrote to memory of 3180 4392 Pcfhcb32.exe 99 PID 4392 wrote to memory of 3180 4392 Pcfhcb32.exe 99 PID 4392 wrote to memory of 3180 4392 Pcfhcb32.exe 99 PID 3180 wrote to memory of 840 3180 Pdfeme32.exe 98 PID 3180 wrote to memory of 840 3180 Pdfeme32.exe 98 PID 3180 wrote to memory of 840 3180 Pdfeme32.exe 98 PID 840 wrote to memory of 748 840 Plajag32.exe 100 PID 840 wrote to memory of 748 840 Plajag32.exe 100 PID 840 wrote to memory of 748 840 Plajag32.exe 100 PID 748 wrote to memory of 4156 748 Qkbjooli.exe 101 PID 748 wrote to memory of 4156 748 Qkbjooli.exe 101 PID 748 wrote to memory of 4156 748 Qkbjooli.exe 101 PID 4156 wrote to memory of 4328 4156 Qkdgen32.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa7874905ed2057e3df3ea526b32474cb1953517515a77c7f20f25390a0f9cfb.exe"C:\Users\Admin\AppData\Local\Temp\fa7874905ed2057e3df3ea526b32474cb1953517515a77c7f20f25390a0f9cfb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\Nidhmp32.exeC:\Windows\system32\Nidhmp32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Npnqjjgf.exeC:\Windows\system32\Npnqjjgf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\Nleaok32.exeC:\Windows\system32\Nleaok32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\Nmdnin32.exeC:\Windows\system32\Nmdnin32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\Nfmbacjn.exeC:\Windows\system32\Nfmbacjn.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\Ofoogc32.exeC:\Windows\system32\Ofoogc32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\Ollgoj32.exeC:\Windows\system32\Ollgoj32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\Ofalmc32.exeC:\Windows\system32\Ofalmc32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\Odelfg32.exeC:\Windows\system32\Odelfg32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\Omnqom32.exeC:\Windows\system32\Omnqom32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\Offehbbc.exeC:\Windows\system32\Offehbbc.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\Opoiqh32.exeC:\Windows\system32\Opoiqh32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\Oignimod.exeC:\Windows\system32\Oignimod.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\Pbobbcfd.exeC:\Windows\system32\Pbobbcfd.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\Plhgkh32.exeC:\Windows\system32\Plhgkh32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\Pljcqhjb.exeC:\Windows\system32\Pljcqhjb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\Pcfhcb32.exeC:\Windows\system32\Pcfhcb32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\Pdfeme32.exeC:\Windows\system32\Pdfeme32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3180
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Plajag32.exeC:\Windows\system32\Plajag32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\Qkbjooli.exeC:\Windows\system32\Qkbjooli.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\Qkdgen32.exeC:\Windows\system32\Qkdgen32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\Admkndag.exeC:\Windows\system32\Admkndag.exe4⤵
- Executes dropped EXE
PID:4328 -
C:\Windows\SysWOW64\Anepfi32.exeC:\Windows\system32\Anepfi32.exe5⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\Apclbe32.exeC:\Windows\system32\Apclbe32.exe6⤵
- Executes dropped EXE
PID:3996 -
C:\Windows\SysWOW64\Anhlliee.exeC:\Windows\system32\Anhlliee.exe7⤵
- Executes dropped EXE
PID:4688 -
C:\Windows\SysWOW64\Agpqeo32.exeC:\Windows\system32\Agpqeo32.exe8⤵
- Executes dropped EXE
- Modifies registry class
PID:484 -
C:\Windows\SysWOW64\Almime32.exeC:\Windows\system32\Almime32.exe9⤵
- Executes dropped EXE
PID:3332 -
C:\Windows\SysWOW64\Aknikm32.exeC:\Windows\system32\Aknikm32.exe10⤵
- Executes dropped EXE
PID:3368 -
C:\Windows\SysWOW64\Apkbcd32.exeC:\Windows\system32\Apkbcd32.exe11⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Bnobmh32.exeC:\Windows\system32\Bnobmh32.exe12⤵
- Executes dropped EXE
PID:3540 -
C:\Windows\SysWOW64\Bckkeo32.exeC:\Windows\system32\Bckkeo32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4116 -
C:\Windows\SysWOW64\Bnaobhmj.exeC:\Windows\system32\Bnaobhmj.exe14⤵
- Executes dropped EXE
- Modifies registry class
PID:988 -
C:\Windows\SysWOW64\Bpokncln.exeC:\Windows\system32\Bpokncln.exe15⤵
- Executes dropped EXE
PID:3512 -
C:\Windows\SysWOW64\Bgickm32.exeC:\Windows\system32\Bgickm32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\Bnclhgkh.exeC:\Windows\system32\Bnclhgkh.exe17⤵
- Executes dropped EXE
PID:4208 -
C:\Windows\SysWOW64\Bglpqm32.exeC:\Windows\system32\Bglpqm32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:924 -
C:\Windows\SysWOW64\Bgnmfmpe.exeC:\Windows\system32\Bgnmfmpe.exe19⤵
- Executes dropped EXE
PID:3780 -
C:\Windows\SysWOW64\Bdbnpaoo.exeC:\Windows\system32\Bdbnpaoo.exe20⤵
- Executes dropped EXE
PID:1084 -
C:\Windows\SysWOW64\Dkhehilo.exeC:\Windows\system32\Dkhehilo.exe21⤵
- Executes dropped EXE
PID:4612 -
C:\Windows\SysWOW64\Ddpjao32.exeC:\Windows\system32\Ddpjao32.exe22⤵
- Executes dropped EXE
PID:1240 -
C:\Windows\SysWOW64\Dnhnjdip.exeC:\Windows\system32\Dnhnjdip.exe23⤵
- Executes dropped EXE
PID:3060 -
C:\Windows\SysWOW64\Ddbffopl.exeC:\Windows\system32\Ddbffopl.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1356 -
C:\Windows\SysWOW64\Dgabbjpp.exeC:\Windows\system32\Dgabbjpp.exe25⤵
- Executes dropped EXE
PID:3804 -
C:\Windows\SysWOW64\Dmnkkang.exeC:\Windows\system32\Dmnkkang.exe26⤵
- Executes dropped EXE
PID:3416 -
C:\Windows\SysWOW64\Dcgcgk32.exeC:\Windows\system32\Dcgcgk32.exe27⤵
- Executes dropped EXE
PID:4192 -
C:\Windows\SysWOW64\Dkokih32.exeC:\Windows\system32\Dkokih32.exe28⤵
- Executes dropped EXE
PID:3752 -
C:\Windows\SysWOW64\Dmphpqle.exeC:\Windows\system32\Dmphpqle.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3252 -
C:\Windows\SysWOW64\Degpanlg.exeC:\Windows\system32\Degpanlg.exe30⤵
- Executes dropped EXE
PID:4040 -
C:\Windows\SysWOW64\Dgelni32.exeC:\Windows\system32\Dgelni32.exe31⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\SysWOW64\Dmbdfp32.exeC:\Windows\system32\Dmbdfp32.exe32⤵
- Executes dropped EXE
PID:4772 -
C:\Windows\SysWOW64\Dclmbjao.exeC:\Windows\system32\Dclmbjao.exe33⤵
- Executes dropped EXE
PID:3564 -
C:\Windows\SysWOW64\Ekcedhaa.exeC:\Windows\system32\Ekcedhaa.exe34⤵
- Executes dropped EXE
PID:3588 -
C:\Windows\SysWOW64\Emdakp32.exeC:\Windows\system32\Emdakp32.exe35⤵
- Executes dropped EXE
PID:3508 -
C:\Windows\SysWOW64\Ejhbedfi.exeC:\Windows\system32\Ejhbedfi.exe36⤵
- Executes dropped EXE
PID:636 -
C:\Windows\SysWOW64\Egmbnhec.exeC:\Windows\system32\Egmbnhec.exe37⤵
- Executes dropped EXE
PID:2436 -
C:\Windows\SysWOW64\Ecccci32.exeC:\Windows\system32\Ecccci32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3208 -
C:\Windows\SysWOW64\Emlglo32.exeC:\Windows\system32\Emlglo32.exe39⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\Ejphec32.exeC:\Windows\system32\Ejphec32.exe40⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\Fgchog32.exeC:\Windows\system32\Fgchog32.exe41⤵
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\Fmpagnmb.exeC:\Windows\system32\Fmpagnmb.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4052 -
C:\Windows\SysWOW64\Fnpmaa32.exeC:\Windows\system32\Fnpmaa32.exe43⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\SysWOW64\Fejenklb.exeC:\Windows\system32\Fejenklb.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3616 -
C:\Windows\SysWOW64\Fldnke32.exeC:\Windows\system32\Fldnke32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:3960 -
C:\Windows\SysWOW64\Fnbjga32.exeC:\Windows\system32\Fnbjga32.exe46⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\Felbck32.exeC:\Windows\system32\Felbck32.exe47⤵PID:1716
-
C:\Windows\SysWOW64\Fhkopf32.exeC:\Windows\system32\Fhkopf32.exe48⤵PID:2448
-
C:\Windows\SysWOW64\Fndglqqp.exeC:\Windows\system32\Fndglqqp.exe49⤵PID:3860
-
C:\Windows\SysWOW64\Facchlpc.exeC:\Windows\system32\Facchlpc.exe50⤵PID:2964
-
C:\Windows\SysWOW64\Feooik32.exeC:\Windows\system32\Feooik32.exe51⤵PID:1428
-
C:\Windows\SysWOW64\Fhmkef32.exeC:\Windows\system32\Fhmkef32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3532 -
C:\Windows\SysWOW64\Fngcbpom.exeC:\Windows\system32\Fngcbpom.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3940 -
C:\Windows\SysWOW64\Faepnlnq.exeC:\Windows\system32\Faepnlnq.exe54⤵PID:432
-
C:\Windows\SysWOW64\Gdcljg32.exeC:\Windows\system32\Gdcljg32.exe55⤵PID:3596
-
C:\Windows\SysWOW64\Ghohkfen.exeC:\Windows\system32\Ghohkfen.exe56⤵PID:2180
-
C:\Windows\SysWOW64\Gmlpcmce.exeC:\Windows\system32\Gmlpcmce.exe57⤵
- Modifies registry class
PID:3628 -
C:\Windows\SysWOW64\Gdfipg32.exeC:\Windows\system32\Gdfipg32.exe58⤵PID:968
-
C:\Windows\SysWOW64\Glmqad32.exeC:\Windows\system32\Glmqad32.exe59⤵PID:1480
-
C:\Windows\SysWOW64\Golmmp32.exeC:\Windows\system32\Golmmp32.exe60⤵PID:5000
-
C:\Windows\SysWOW64\Geeejj32.exeC:\Windows\system32\Geeejj32.exe61⤵PID:4292
-
C:\Windows\SysWOW64\Ghdafe32.exeC:\Windows\system32\Ghdafe32.exe62⤵PID:2456
-
C:\Windows\SysWOW64\Gjbnbq32.exeC:\Windows\system32\Gjbnbq32.exe63⤵PID:4136
-
C:\Windows\SysWOW64\Gehboi32.exeC:\Windows\system32\Gehboi32.exe64⤵PID:2444
-
C:\Windows\SysWOW64\Gjdjgp32.exeC:\Windows\system32\Gjdjgp32.exe65⤵PID:1148
-
C:\Windows\SysWOW64\Gmcfcl32.exeC:\Windows\system32\Gmcfcl32.exe66⤵
- Drops file in System32 directory
PID:4984 -
C:\Windows\SysWOW64\Gejoei32.exeC:\Windows\system32\Gejoei32.exe67⤵PID:3716
-
C:\Windows\SysWOW64\Gldgac32.exeC:\Windows\system32\Gldgac32.exe68⤵PID:1560
-
C:\Windows\SysWOW64\Gmecikkj.exeC:\Windows\system32\Gmecikkj.exe69⤵PID:3412
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Dddojq32.exeC:\Windows\system32\Dddojq32.exe3⤵PID:4372
-
C:\Windows\SysWOW64\Dllfkn32.exeC:\Windows\system32\Dllfkn32.exe4⤵PID:2336
-
C:\Windows\SysWOW64\Dojcgi32.exeC:\Windows\system32\Dojcgi32.exe5⤵PID:4832
-
C:\Windows\SysWOW64\Dahode32.exeC:\Windows\system32\Dahode32.exe6⤵PID:4768
-
C:\Windows\SysWOW64\Ddgkpp32.exeC:\Windows\system32\Ddgkpp32.exe7⤵PID:3120
-
C:\Windows\SysWOW64\Ekacmjgl.exeC:\Windows\system32\Ekacmjgl.exe8⤵PID:1304
-
C:\Windows\SysWOW64\Echknh32.exeC:\Windows\system32\Echknh32.exe9⤵PID:3776
-
C:\Windows\SysWOW64\Eefhjc32.exeC:\Windows\system32\Eefhjc32.exe10⤵PID:3972
-
C:\Windows\SysWOW64\Ehedfo32.exeC:\Windows\system32\Ehedfo32.exe11⤵
- Drops file in System32 directory
- Modifies registry class
PID:3540 -
C:\Windows\SysWOW64\Ekcpbj32.exeC:\Windows\system32\Ekcpbj32.exe12⤵PID:3512
-
C:\Windows\SysWOW64\Ecjhcg32.exeC:\Windows\system32\Ecjhcg32.exe13⤵PID:4648
-
C:\Windows\SysWOW64\Edkdkplj.exeC:\Windows\system32\Edkdkplj.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:924 -
C:\Windows\SysWOW64\Eoaihhlp.exeC:\Windows\system32\Eoaihhlp.exe15⤵PID:2264
-
C:\Windows\SysWOW64\Ednaqo32.exeC:\Windows\system32\Ednaqo32.exe16⤵PID:2140
-
C:\Windows\SysWOW64\Ekhjmiad.exeC:\Windows\system32\Ekhjmiad.exe17⤵PID:3560
-
C:\Windows\SysWOW64\Eemnjbaj.exeC:\Windows\system32\Eemnjbaj.exe18⤵PID:4632
-
C:\Windows\SysWOW64\Elgfgl32.exeC:\Windows\system32\Elgfgl32.exe19⤵
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\Ecandfpd.exeC:\Windows\system32\Ecandfpd.exe20⤵PID:3944
-
C:\Windows\SysWOW64\Edbklofb.exeC:\Windows\system32\Edbklofb.exe21⤵
- Drops file in System32 directory
PID:2144 -
C:\Windows\SysWOW64\Fljcmlfd.exeC:\Windows\system32\Fljcmlfd.exe22⤵PID:3212
-
C:\Windows\SysWOW64\Fcckif32.exeC:\Windows\system32\Fcckif32.exe23⤵
- Drops file in System32 directory
PID:4500 -
C:\Windows\SysWOW64\Febgea32.exeC:\Windows\system32\Febgea32.exe24⤵
- Drops file in System32 directory
PID:3788 -
C:\Windows\SysWOW64\Fllpbldb.exeC:\Windows\system32\Fllpbldb.exe25⤵PID:2636
-
C:\Windows\SysWOW64\Fcfhof32.exeC:\Windows\system32\Fcfhof32.exe26⤵PID:3160
-
C:\Windows\SysWOW64\Ffddka32.exeC:\Windows\system32\Ffddka32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:14264 -
C:\Windows\SysWOW64\Flnlhk32.exeC:\Windows\system32\Flnlhk32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1240 -
C:\Windows\SysWOW64\Fomhdg32.exeC:\Windows\system32\Fomhdg32.exe29⤵PID:4140
-
C:\Windows\SysWOW64\Ffgqqaip.exeC:\Windows\system32\Ffgqqaip.exe30⤵PID:872
-
C:\Windows\SysWOW64\Flqimk32.exeC:\Windows\system32\Flqimk32.exe31⤵
- Drops file in System32 directory
PID:3976 -
C:\Windows\SysWOW64\Fooeif32.exeC:\Windows\system32\Fooeif32.exe32⤵PID:3416
-
C:\Windows\SysWOW64\Ffimfqgm.exeC:\Windows\system32\Ffimfqgm.exe33⤵
- Drops file in System32 directory
- Modifies registry class
PID:404 -
C:\Windows\SysWOW64\Flceckoj.exeC:\Windows\system32\Flceckoj.exe34⤵PID:4620
-
C:\Windows\SysWOW64\Foabofnn.exeC:\Windows\system32\Foabofnn.exe35⤵
- Modifies registry class
PID:2856 -
C:\Windows\SysWOW64\Fbpnkama.exeC:\Windows\system32\Fbpnkama.exe36⤵PID:3440
-
C:\Windows\SysWOW64\Fhjfhl32.exeC:\Windows\system32\Fhjfhl32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3196 -
C:\Windows\SysWOW64\Gkhbdg32.exeC:\Windows\system32\Gkhbdg32.exe38⤵PID:3396
-
C:\Windows\SysWOW64\Gcojed32.exeC:\Windows\system32\Gcojed32.exe39⤵PID:4568
-
C:\Windows\SysWOW64\Gdqgmmjb.exeC:\Windows\system32\Gdqgmmjb.exe40⤵PID:2436
-
C:\Windows\SysWOW64\Glhonj32.exeC:\Windows\system32\Glhonj32.exe41⤵PID:1448
-
C:\Windows\SysWOW64\Gofkje32.exeC:\Windows\system32\Gofkje32.exe42⤵PID:3820
-
C:\Windows\SysWOW64\Gfpcgpae.exeC:\Windows\system32\Gfpcgpae.exe43⤵PID:4636
-
C:\Windows\SysWOW64\Ghopckpi.exeC:\Windows\system32\Ghopckpi.exe44⤵PID:5116
-
C:\Windows\SysWOW64\Gkmlofol.exeC:\Windows\system32\Gkmlofol.exe45⤵PID:4468
-
C:\Windows\SysWOW64\Gdeqhl32.exeC:\Windows\system32\Gdeqhl32.exe46⤵PID:480
-
C:\Windows\SysWOW64\Gkoiefmj.exeC:\Windows\system32\Gkoiefmj.exe47⤵
- Drops file in System32 directory
PID:4068 -
C:\Windows\SysWOW64\Gokdeeec.exeC:\Windows\system32\Gokdeeec.exe48⤵PID:1868
-
C:\Windows\SysWOW64\Gbiaapdf.exeC:\Windows\system32\Gbiaapdf.exe49⤵PID:428
-
C:\Windows\SysWOW64\Gdhmnlcj.exeC:\Windows\system32\Gdhmnlcj.exe50⤵
- Drops file in System32 directory
PID:364 -
C:\Windows\SysWOW64\Gmoeoidl.exeC:\Windows\system32\Gmoeoidl.exe51⤵PID:5076
-
C:\Windows\SysWOW64\Gblngpbd.exeC:\Windows\system32\Gblngpbd.exe52⤵PID:2552
-
C:\Windows\SysWOW64\Gdjjckag.exeC:\Windows\system32\Gdjjckag.exe53⤵PID:772
-
C:\Windows\SysWOW64\Hopnqdan.exeC:\Windows\system32\Hopnqdan.exe54⤵PID:4364
-
C:\Windows\SysWOW64\Hfifmnij.exeC:\Windows\system32\Hfifmnij.exe55⤵
- Modifies registry class
PID:2420 -
C:\Windows\SysWOW64\Hkfoeega.exeC:\Windows\system32\Hkfoeega.exe56⤵
- Modifies registry class
PID:1428 -
C:\Windows\SysWOW64\Hijooifk.exeC:\Windows\system32\Hijooifk.exe57⤵PID:3056
-
C:\Windows\SysWOW64\Hkikkeeo.exeC:\Windows\system32\Hkikkeeo.exe58⤵PID:5092
-
C:\Windows\SysWOW64\Hcpclbfa.exeC:\Windows\system32\Hcpclbfa.exe59⤵PID:4420
-
C:\Windows\SysWOW64\Hfnphn32.exeC:\Windows\system32\Hfnphn32.exe60⤵PID:432
-
C:\Windows\SysWOW64\Hofdacke.exeC:\Windows\system32\Hofdacke.exe61⤵PID:5108
-
C:\Windows\SysWOW64\Hfqlnm32.exeC:\Windows\system32\Hfqlnm32.exe62⤵PID:3960
-
C:\Windows\SysWOW64\Hioiji32.exeC:\Windows\system32\Hioiji32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3628 -
C:\Windows\SysWOW64\Hoiafcic.exeC:\Windows\system32\Hoiafcic.exe64⤵PID:3568
-
C:\Windows\SysWOW64\Hbgmcnhf.exeC:\Windows\system32\Hbgmcnhf.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2472 -
C:\Windows\SysWOW64\Immapg32.exeC:\Windows\system32\Immapg32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5000 -
C:\Windows\SysWOW64\Icgjmapi.exeC:\Windows\system32\Icgjmapi.exe67⤵PID:4784
-
C:\Windows\SysWOW64\Iehfdi32.exeC:\Windows\system32\Iehfdi32.exe68⤵PID:2776
-
C:\Windows\SysWOW64\Ikbnacmd.exeC:\Windows\system32\Ikbnacmd.exe69⤵PID:4924
-
C:\Windows\SysWOW64\Icifbang.exeC:\Windows\system32\Icifbang.exe70⤵PID:3360
-
C:\Windows\SysWOW64\Iejcji32.exeC:\Windows\system32\Iejcji32.exe71⤵PID:5180
-
C:\Windows\SysWOW64\Jimekgff.exeC:\Windows\system32\Jimekgff.exe72⤵PID:2568
-
C:\Windows\SysWOW64\Jlnnmb32.exeC:\Windows\system32\Jlnnmb32.exe73⤵PID:4184
-
C:\Windows\SysWOW64\Jcefno32.exeC:\Windows\system32\Jcefno32.exe74⤵PID:5232
-
C:\Windows\SysWOW64\Jianff32.exeC:\Windows\system32\Jianff32.exe75⤵
- Drops file in System32 directory
PID:5260 -
C:\Windows\SysWOW64\Kpeiioac.exeC:\Windows\system32\Kpeiioac.exe76⤵PID:5276
-
C:\Windows\SysWOW64\Kbceejpf.exeC:\Windows\system32\Kbceejpf.exe77⤵PID:4820
-
C:\Windows\SysWOW64\Kimnbd32.exeC:\Windows\system32\Kimnbd32.exe78⤵PID:5308
-
C:\Windows\SysWOW64\Kpgfooop.exeC:\Windows\system32\Kpgfooop.exe79⤵
- Drops file in System32 directory
PID:1212 -
C:\Windows\SysWOW64\Kfankifm.exeC:\Windows\system32\Kfankifm.exe80⤵
- Drops file in System32 directory
PID:2060 -
C:\Windows\SysWOW64\Kmkfhc32.exeC:\Windows\system32\Kmkfhc32.exe81⤵
- Modifies registry class
PID:4692 -
C:\Windows\SysWOW64\Kpjcdn32.exeC:\Windows\system32\Kpjcdn32.exe82⤵PID:4948
-
C:\Windows\SysWOW64\Kbhoqj32.exeC:\Windows\system32\Kbhoqj32.exe83⤵PID:5372
-
C:\Windows\SysWOW64\Kefkme32.exeC:\Windows\system32\Kefkme32.exe84⤵
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\Kplpjn32.exeC:\Windows\system32\Kplpjn32.exe85⤵PID:5136
-
C:\Windows\SysWOW64\Lbjlfi32.exeC:\Windows\system32\Lbjlfi32.exe86⤵PID:5128
-
C:\Windows\SysWOW64\Leihbeib.exeC:\Windows\system32\Leihbeib.exe87⤵PID:5140
-
C:\Windows\SysWOW64\Lmppcbjd.exeC:\Windows\system32\Lmppcbjd.exe88⤵
- Drops file in System32 directory
PID:5156 -
C:\Windows\SysWOW64\Lmgfda32.exeC:\Windows\system32\Lmgfda32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:948 -
C:\Windows\SysWOW64\Lljfpnjg.exeC:\Windows\system32\Lljfpnjg.exe90⤵
- Drops file in System32 directory
PID:5164 -
C:\Windows\SysWOW64\Ldanqkki.exeC:\Windows\system32\Ldanqkki.exe91⤵PID:5436
-
C:\Windows\SysWOW64\Lebkhc32.exeC:\Windows\system32\Lebkhc32.exe92⤵PID:5472
-
C:\Windows\SysWOW64\Lmiciaaj.exeC:\Windows\system32\Lmiciaaj.exe93⤵PID:5224
-
C:\Windows\SysWOW64\Lphoelqn.exeC:\Windows\system32\Lphoelqn.exe94⤵PID:5236
-
C:\Windows\SysWOW64\Mipcob32.exeC:\Windows\system32\Mipcob32.exe95⤵PID:5252
-
C:\Windows\SysWOW64\Mpjlklok.exeC:\Windows\system32\Mpjlklok.exe96⤵PID:5268
-
C:\Windows\SysWOW64\Mchhggno.exeC:\Windows\system32\Mchhggno.exe97⤵PID:5644
-
C:\Windows\SysWOW64\Megdccmb.exeC:\Windows\system32\Megdccmb.exe98⤵
- Drops file in System32 directory
PID:5316 -
C:\Windows\SysWOW64\Mmnldp32.exeC:\Windows\system32\Mmnldp32.exe99⤵PID:5724
-
C:\Windows\SysWOW64\Mdhdajea.exeC:\Windows\system32\Mdhdajea.exe100⤵PID:5756
-
C:\Windows\SysWOW64\Mgfqmfde.exeC:\Windows\system32\Mgfqmfde.exe101⤵PID:5804
-
C:\Windows\SysWOW64\Mmpijp32.exeC:\Windows\system32\Mmpijp32.exe102⤵PID:5564
-
C:\Windows\SysWOW64\Mlcifmbl.exeC:\Windows\system32\Mlcifmbl.exe103⤵
- Modifies registry class
PID:5348 -
C:\Windows\SysWOW64\Mdjagjco.exeC:\Windows\system32\Mdjagjco.exe104⤵PID:5364
-
C:\Windows\SysWOW64\Migjoaaf.exeC:\Windows\system32\Migjoaaf.exe105⤵PID:5416
-
C:\Windows\SysWOW64\Mpablkhc.exeC:\Windows\system32\Mpablkhc.exe106⤵PID:5444
-
C:\Windows\SysWOW64\Mcpnhfhf.exeC:\Windows\system32\Mcpnhfhf.exe107⤵PID:5304
-
C:\Windows\SysWOW64\Menjdbgj.exeC:\Windows\system32\Menjdbgj.exe108⤵PID:5872
-
C:\Windows\SysWOW64\Mnebeogl.exeC:\Windows\system32\Mnebeogl.exe109⤵PID:5660
-
C:\Windows\SysWOW64\Npcoakfp.exeC:\Windows\system32\Npcoakfp.exe110⤵PID:5708
-
C:\Windows\SysWOW64\Ncbknfed.exeC:\Windows\system32\Ncbknfed.exe111⤵PID:5752
-
C:\Windows\SysWOW64\Nepgjaeg.exeC:\Windows\system32\Nepgjaeg.exe112⤵
- Drops file in System32 directory
PID:5984 -
C:\Windows\SysWOW64\Nngokoej.exeC:\Windows\system32\Nngokoej.exe113⤵PID:6004
-
C:\Windows\SysWOW64\Npfkgjdn.exeC:\Windows\system32\Npfkgjdn.exe114⤵PID:6016
-
C:\Windows\SysWOW64\Ngpccdlj.exeC:\Windows\system32\Ngpccdlj.exe115⤵PID:5780
-
C:\Windows\SysWOW64\Nebdoa32.exeC:\Windows\system32\Nebdoa32.exe116⤵
- Modifies registry class
PID:5816 -
C:\Windows\SysWOW64\Nnjlpo32.exeC:\Windows\system32\Nnjlpo32.exe117⤵PID:5132
-
C:\Windows\SysWOW64\Nphhmj32.exeC:\Windows\system32\Nphhmj32.exe118⤵PID:5844
-
C:\Windows\SysWOW64\Nnlhfn32.exeC:\Windows\system32\Nnlhfn32.exe119⤵PID:5888
-
C:\Windows\SysWOW64\Npjebj32.exeC:\Windows\system32\Npjebj32.exe120⤵PID:5928
-
C:\Windows\SysWOW64\Ncianepl.exeC:\Windows\system32\Ncianepl.exe121⤵PID:5976
-
C:\Windows\SysWOW64\Nfgmjqop.exeC:\Windows\system32\Nfgmjqop.exe122⤵PID:6028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-