Analysis
-
max time kernel
93s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2023, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
24c9dc928460adf40fd51ff55eacfc5a.exe
Resource
win7-20230220-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
24c9dc928460adf40fd51ff55eacfc5a.exe
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
24c9dc928460adf40fd51ff55eacfc5a.exe
-
Size
90KB
-
MD5
24c9dc928460adf40fd51ff55eacfc5a
-
SHA1
4a00584cea952453dae6c2b7262a0f1f23d3efc7
-
SHA256
15e9809d4c45841c47c0cc6d3f68f4fe940feb6f9aa0dd633e988e412bd8b4e1
-
SHA512
f97ae0107825e62fb6b94b71b5703532835c0dc44aeac12183a045a75620c3a1ea89632cfdd07c194a5e0ba299e39fbc33b6f0ca447cabbfbd71e1e99b7e38ba
-
SSDEEP
1536:daTi8L7is975KqLB2nbL4rKcbWx8L3cy6gS17DwPB/Lk:daEsnMbErKcKx8rcy6gSGQ
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfamok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akopec32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfbiplhf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apclbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fehpcbap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcpdpnio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnikcdop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hnddlgkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkbffppf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlcqhnpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omogic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Paaikq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofaebm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phhqpn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdcijcke.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbpgbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dlqphkqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppfflm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajaqapmb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifdall32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afhdji32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddladh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggkich32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdfafdlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onnflo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Capchmmb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liabqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdgjmbnl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnpjkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmfagppm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlpaiemd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpojcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cngoiabj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmefplej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obclln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Imakkfdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngjdopkg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agcdedno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcknkphd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kobhgnof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gjbnbq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jopakdfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Loecma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkeghqac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hboagf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laobal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oknebn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fochlmjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nplddj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jondfdhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdemhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fkmchi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igqbplnm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikjmim32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jplmmfmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpojcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Appcfnac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgajmpcl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cqmhpa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jcknkphd.exe -
Executes dropped EXE 64 IoCs
pid Process 4264 Qkihjacg.exe 2028 Qfnlgjcm.exe 4128 Akkeoq32.exe 2024 Afqili32.exe 1892 Alnaep32.exe 3924 Afcebi32.exe 3272 Apkjko32.exe 3156 Aehbce32.exe 4600 Albkppkl.exe 1672 Aifkidjf.exe 2396 Appcfnac.exe 4048 Aemlnepj.exe 3784 Bbalhind.exe 384 Bliaqo32.exe 2464 Bimajcdn.exe 3332 Bbefch32.exe 1464 Bcebmkaa.exe 3172 Ceiljcem.exe 1368 Cpnpglec.exe 3024 Cmbpqp32.exe 2184 Ciiaeajq.exe 4188 Cdnecjig.exe 3796 Cmgjlppg.exe 4876 Cebnpbmb.exe 3240 Cllfml32.exe 4548 Dlqphkqj.exe 792 Dbmejefd.exe 2660 Ddladh32.exe 4500 Epeooh32.exe 4236 Emiohm32.exe 1640 Egbdab32.exe 2836 Epjhjhmc.exe 1536 Eibmbn32.exe 4528 Eckalcjd.exe 4524 Elcfdhpd.exe 5024 Flfbjhna.exe 1076 Fjjccl32.exe 2668 Fpckpfdh.exe 4860 Fgncmq32.exe 4160 Fgppbp32.exe 3800 Ffemcm32.exe 3852 Gcinma32.exe 2400 Glabff32.exe 1692 Gfjfolke.exe 2072 Ggicho32.exe 1272 Glfkafpo.exe 2688 Gcpcnp32.exe 3712 Gnfhki32.exe 4020 Gdppgcoo.exe 3208 Gfamok32.exe 2808 Hqfqmddc.exe 3632 Hfciekbj.exe 4132 Hfhbpj32.exe 4852 Hdicnafd.exe 4848 Hjfkfhek.exe 908 Hcnpon32.exe 840 Hnddlgkb.exe 5028 Idnlia32.exe 1924 Imiamc32.exe 4812 Ignejlpp.exe 2312 Inhngf32.exe 620 Iqgjca32.exe 1096 Igqbplnm.exe 3256 Ieebiplg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Iqlfjnan.dll Khbhjheg.exe File created C:\Windows\SysWOW64\Pelaib32.exe Paaeiceg.exe File created C:\Windows\SysWOW64\Epopgbia.exe Ehekqe32.exe File opened for modification C:\Windows\SysWOW64\Bcenkn32.exe Bqfaob32.exe File created C:\Windows\SysWOW64\Lbfnipfn.dll Gmqjnl32.exe File created C:\Windows\SysWOW64\Hajbpi32.exe Hdfafdlo.exe File created C:\Windows\SysWOW64\Cibpadmh.dll Knhblf32.exe File created C:\Windows\SysWOW64\Chokikeb.exe Process not Found File opened for modification C:\Windows\SysWOW64\Hkcmcdee.exe Haileo32.exe File created C:\Windows\SysWOW64\Kmobpc32.exe Kbinbk32.exe File opened for modification C:\Windows\SysWOW64\Jkjepk32.exe Jdpmcq32.exe File opened for modification C:\Windows\SysWOW64\Kdffocib.exe Kgbefoji.exe File opened for modification C:\Windows\SysWOW64\Jfdida32.exe Jbhmdbnp.exe File opened for modification C:\Windows\SysWOW64\Danecp32.exe Process not Found File opened for modification C:\Windows\SysWOW64\Mijolk32.exe Mflbpp32.exe File created C:\Windows\SysWOW64\Ofhkclmd.exe Oblobm32.exe File created C:\Windows\SysWOW64\Mdphgffq.exe Mqelfg32.exe File created C:\Windows\SysWOW64\Obikbgbb.exe Onnoah32.exe File created C:\Windows\SysWOW64\Fkciihgg.exe Ffgqqaip.exe File opened for modification C:\Windows\SysWOW64\Gcfqfc32.exe Gkoiefmj.exe File opened for modification C:\Windows\SysWOW64\Ngpfaj32.exe Nkiemi32.exe File created C:\Windows\SysWOW64\Depabmqe.dll Jhgpipbp.exe File created C:\Windows\SysWOW64\Aahdqp32.exe Alkkhi32.exe File opened for modification C:\Windows\SysWOW64\Pqpnombl.exe Pjffbc32.exe File created C:\Windows\SysWOW64\Djepmmng.dll Nihkni32.exe File created C:\Windows\SysWOW64\Nikgcife.exe Nbqofo32.exe File created C:\Windows\SysWOW64\Icenan32.dll Onnflo32.exe File opened for modification C:\Windows\SysWOW64\Mkhdnppp.exe Mhihbeql.exe File created C:\Windows\SysWOW64\Gcinma32.exe Ffemcm32.exe File created C:\Windows\SysWOW64\Iodjii32.exe Ihjamo32.exe File created C:\Windows\SysWOW64\Bhejdedm.dll Naqqdcpb.exe File created C:\Windows\SysWOW64\Ajcgdhmp.dll Cmblob32.exe File opened for modification C:\Windows\SysWOW64\Ecphimfb.exe Eleplc32.exe File created C:\Windows\SysWOW64\Jgengpmj.dll Mkbchk32.exe File opened for modification C:\Windows\SysWOW64\Gfgjgo32.exe Gkaejf32.exe File created C:\Windows\SysWOW64\Gilnhifk.dll Process not Found File created C:\Windows\SysWOW64\Iefhpdji.dll Onfddh32.exe File created C:\Windows\SysWOW64\Cfogjo32.exe Cngoiabj.exe File opened for modification C:\Windows\SysWOW64\Aqnecjbl.exe Ajdmfpkp.exe File opened for modification C:\Windows\SysWOW64\Lphfpbdi.exe Laefdf32.exe File created C:\Windows\SysWOW64\Pohkbc32.dll Gkaejf32.exe File created C:\Windows\SysWOW64\Chhhdh32.dll Qgjaofei.exe File created C:\Windows\SysWOW64\Ioqoomhp.exe Ikecnnpf.exe File created C:\Windows\SysWOW64\Lhgbeg32.exe Kppjdjpp.exe File opened for modification C:\Windows\SysWOW64\Hjolnb32.exe Haggelfd.exe File created C:\Windows\SysWOW64\Fgdchnpl.dll Onjmao32.exe File created C:\Windows\SysWOW64\Fqohnp32.exe Fjepaecb.exe File opened for modification C:\Windows\SysWOW64\Kajfig32.exe Kgdbkohf.exe File created C:\Windows\SysWOW64\Dalchnkg.dll Obfhba32.exe File created C:\Windows\SysWOW64\Hlkefpan.dll Pjdilcla.exe File created C:\Windows\SysWOW64\Filmeaek.dll Qalnjkgo.exe File opened for modification C:\Windows\SysWOW64\Bgpjllnc.exe Bcenkn32.exe File opened for modification C:\Windows\SysWOW64\Fhfedgmh.exe Falmhm32.exe File created C:\Windows\SysWOW64\Mgmbeg32.dll Knphmefj.exe File created C:\Windows\SysWOW64\Mbgaem32.dll Hfofbd32.exe File opened for modification C:\Windows\SysWOW64\Ijkljp32.exe Idacmfkj.exe File opened for modification C:\Windows\SysWOW64\Kkkdan32.exe Kdaldd32.exe File created C:\Windows\SysWOW64\Mdmegp32.exe Maohkd32.exe File opened for modification C:\Windows\SysWOW64\Pcjapi32.exe Obidhaog.exe File opened for modification C:\Windows\SysWOW64\Alnaep32.exe Afqili32.exe File opened for modification C:\Windows\SysWOW64\Dgajmpcl.exe Decmaedh.exe File opened for modification C:\Windows\SysWOW64\Apbnnh32.exe Ahkflk32.exe File created C:\Windows\SysWOW64\Ebeejijj.exe Ecbenm32.exe File created C:\Windows\SysWOW64\Haileo32.exe Hebkpn32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 11160 5300 Process not Found 1170 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pejabpik.dll" Ffemcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dedndh32.dll" Kcdaanpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddbffopl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdbjiqdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbiklpin.dll" Dlegeemh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plilol32.dll" Lphfpbdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdmegp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdgpjm32.dll" Haidklda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ladhag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmnnbenq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Flbhpl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecoihjol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jobnac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eofinnkf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Giofnacd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibjqcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epbahkcp.dll" Fhqcam32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfifmnij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkbkamnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndkjoeff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnccffji.dll" Nkiemi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahoiaf32.dll" Ofhkclmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qlcplq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eecngcdn.dll" Nicjhchb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nndlkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olapkmic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Okolkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkdhlo32.dll" Beehjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhmaam32.dll" Blhiidpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifclaeem.dll" Ndkahnhh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pengdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmcojh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ginadcnl.dll" Afcebi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbmejefd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnconi32.dll" Jjcqmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmqkhekn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Opnbfa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbibki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eleplc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Flfbjhna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkfbdc32.dll" Bcbaen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgkghl32.dll" Gppekj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkikkeeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkfeli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gjapmdid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbfiep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kajfig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aombqa32.dll" Ilgchg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Illmcfdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgcpkool.dll" Lmfhqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cakpjk32.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nfibfjgl.dll" Knanhoal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qbjdiedp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Helfik32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Plifll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Peogmn32.dll" Laglam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npiamk32.dll" Gooqmelq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gooqmelq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccgjqmcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkhehilo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fanimm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfgpnbgl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4244 wrote to memory of 4264 4244 24c9dc928460adf40fd51ff55eacfc5a.exe 83 PID 4244 wrote to memory of 4264 4244 24c9dc928460adf40fd51ff55eacfc5a.exe 83 PID 4244 wrote to memory of 4264 4244 24c9dc928460adf40fd51ff55eacfc5a.exe 83 PID 4264 wrote to memory of 2028 4264 Qkihjacg.exe 84 PID 4264 wrote to memory of 2028 4264 Qkihjacg.exe 84 PID 4264 wrote to memory of 2028 4264 Qkihjacg.exe 84 PID 2028 wrote to memory of 4128 2028 Qfnlgjcm.exe 85 PID 2028 wrote to memory of 4128 2028 Qfnlgjcm.exe 85 PID 2028 wrote to memory of 4128 2028 Qfnlgjcm.exe 85 PID 4128 wrote to memory of 2024 4128 Akkeoq32.exe 86 PID 4128 wrote to memory of 2024 4128 Akkeoq32.exe 86 PID 4128 wrote to memory of 2024 4128 Akkeoq32.exe 86 PID 2024 wrote to memory of 1892 2024 Afqili32.exe 87 PID 2024 wrote to memory of 1892 2024 Afqili32.exe 87 PID 2024 wrote to memory of 1892 2024 Afqili32.exe 87 PID 1892 wrote to memory of 3924 1892 Alnaep32.exe 88 PID 1892 wrote to memory of 3924 1892 Alnaep32.exe 88 PID 1892 wrote to memory of 3924 1892 Alnaep32.exe 88 PID 3924 wrote to memory of 3272 3924 Afcebi32.exe 89 PID 3924 wrote to memory of 3272 3924 Afcebi32.exe 89 PID 3924 wrote to memory of 3272 3924 Afcebi32.exe 89 PID 3272 wrote to memory of 3156 3272 Apkjko32.exe 90 PID 3272 wrote to memory of 3156 3272 Apkjko32.exe 90 PID 3272 wrote to memory of 3156 3272 Apkjko32.exe 90 PID 3156 wrote to memory of 4600 3156 Aehbce32.exe 91 PID 3156 wrote to memory of 4600 3156 Aehbce32.exe 91 PID 3156 wrote to memory of 4600 3156 Aehbce32.exe 91 PID 4600 wrote to memory of 1672 4600 Albkppkl.exe 92 PID 4600 wrote to memory of 1672 4600 Albkppkl.exe 92 PID 4600 wrote to memory of 1672 4600 Albkppkl.exe 92 PID 1672 wrote to memory of 2396 1672 Aifkidjf.exe 93 PID 1672 wrote to memory of 2396 1672 Aifkidjf.exe 93 PID 1672 wrote to memory of 2396 1672 Aifkidjf.exe 93 PID 2396 wrote to memory of 4048 2396 Appcfnac.exe 94 PID 2396 wrote to memory of 4048 2396 Appcfnac.exe 94 PID 2396 wrote to memory of 4048 2396 Appcfnac.exe 94 PID 4048 wrote to memory of 3784 4048 Aemlnepj.exe 95 PID 4048 wrote to memory of 3784 4048 Aemlnepj.exe 95 PID 4048 wrote to memory of 3784 4048 Aemlnepj.exe 95 PID 3784 wrote to memory of 384 3784 Bbalhind.exe 96 PID 3784 wrote to memory of 384 3784 Bbalhind.exe 96 PID 3784 wrote to memory of 384 3784 Bbalhind.exe 96 PID 384 wrote to memory of 2464 384 Bliaqo32.exe 97 PID 384 wrote to memory of 2464 384 Bliaqo32.exe 97 PID 384 wrote to memory of 2464 384 Bliaqo32.exe 97 PID 2464 wrote to memory of 3332 2464 Bimajcdn.exe 98 PID 2464 wrote to memory of 3332 2464 Bimajcdn.exe 98 PID 2464 wrote to memory of 3332 2464 Bimajcdn.exe 98 PID 3332 wrote to memory of 1464 3332 Bbefch32.exe 99 PID 3332 wrote to memory of 1464 3332 Bbefch32.exe 99 PID 3332 wrote to memory of 1464 3332 Bbefch32.exe 99 PID 1464 wrote to memory of 3172 1464 Bcebmkaa.exe 100 PID 1464 wrote to memory of 3172 1464 Bcebmkaa.exe 100 PID 1464 wrote to memory of 3172 1464 Bcebmkaa.exe 100 PID 3172 wrote to memory of 1368 3172 Ceiljcem.exe 101 PID 3172 wrote to memory of 1368 3172 Ceiljcem.exe 101 PID 3172 wrote to memory of 1368 3172 Ceiljcem.exe 101 PID 1368 wrote to memory of 3024 1368 Cpnpglec.exe 102 PID 1368 wrote to memory of 3024 1368 Cpnpglec.exe 102 PID 1368 wrote to memory of 3024 1368 Cpnpglec.exe 102 PID 3024 wrote to memory of 2184 3024 Cmbpqp32.exe 103 PID 3024 wrote to memory of 2184 3024 Cmbpqp32.exe 103 PID 3024 wrote to memory of 2184 3024 Cmbpqp32.exe 103 PID 2184 wrote to memory of 4188 2184 Ciiaeajq.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c9dc928460adf40fd51ff55eacfc5a.exe"C:\Users\Admin\AppData\Local\Temp\24c9dc928460adf40fd51ff55eacfc5a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\Qkihjacg.exeC:\Windows\system32\Qkihjacg.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\Qfnlgjcm.exeC:\Windows\system32\Qfnlgjcm.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\Akkeoq32.exeC:\Windows\system32\Akkeoq32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\Afqili32.exeC:\Windows\system32\Afqili32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\Alnaep32.exeC:\Windows\system32\Alnaep32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\Afcebi32.exeC:\Windows\system32\Afcebi32.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\Apkjko32.exeC:\Windows\system32\Apkjko32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\Aehbce32.exeC:\Windows\system32\Aehbce32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\Albkppkl.exeC:\Windows\system32\Albkppkl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\Aifkidjf.exeC:\Windows\system32\Aifkidjf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\Appcfnac.exeC:\Windows\system32\Appcfnac.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\Aemlnepj.exeC:\Windows\system32\Aemlnepj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\Bbalhind.exeC:\Windows\system32\Bbalhind.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\Bliaqo32.exeC:\Windows\system32\Bliaqo32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\Bimajcdn.exeC:\Windows\system32\Bimajcdn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\Bbefch32.exeC:\Windows\system32\Bbefch32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\Bcebmkaa.exeC:\Windows\system32\Bcebmkaa.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\Ceiljcem.exeC:\Windows\system32\Ceiljcem.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\Cpnpglec.exeC:\Windows\system32\Cpnpglec.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\Cmbpqp32.exeC:\Windows\system32\Cmbpqp32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Ciiaeajq.exeC:\Windows\system32\Ciiaeajq.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\Cdnecjig.exeC:\Windows\system32\Cdnecjig.exe23⤵
- Executes dropped EXE
PID:4188 -
C:\Windows\SysWOW64\Cmgjlppg.exeC:\Windows\system32\Cmgjlppg.exe24⤵
- Executes dropped EXE
PID:3796 -
C:\Windows\SysWOW64\Cebnpbmb.exeC:\Windows\system32\Cebnpbmb.exe25⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\SysWOW64\Cllfml32.exeC:\Windows\system32\Cllfml32.exe26⤵
- Executes dropped EXE
PID:3240 -
C:\Windows\SysWOW64\Dlqphkqj.exeC:\Windows\system32\Dlqphkqj.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4548 -
C:\Windows\SysWOW64\Dbmejefd.exeC:\Windows\system32\Dbmejefd.exe28⤵
- Executes dropped EXE
- Modifies registry class
PID:792 -
C:\Windows\SysWOW64\Ddladh32.exeC:\Windows\system32\Ddladh32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\Epeooh32.exeC:\Windows\system32\Epeooh32.exe30⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\SysWOW64\Emiohm32.exeC:\Windows\system32\Emiohm32.exe31⤵
- Executes dropped EXE
PID:4236 -
C:\Windows\SysWOW64\Egbdab32.exeC:\Windows\system32\Egbdab32.exe32⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Epjhjhmc.exeC:\Windows\system32\Epjhjhmc.exe33⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Eibmbn32.exeC:\Windows\system32\Eibmbn32.exe34⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\Eckalcjd.exeC:\Windows\system32\Eckalcjd.exe35⤵
- Executes dropped EXE
PID:4528 -
C:\Windows\SysWOW64\Elcfdhpd.exeC:\Windows\system32\Elcfdhpd.exe36⤵
- Executes dropped EXE
PID:4524 -
C:\Windows\SysWOW64\Flfbjhna.exeC:\Windows\system32\Flfbjhna.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:5024 -
C:\Windows\SysWOW64\Fjjccl32.exeC:\Windows\system32\Fjjccl32.exe38⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\Fpckpfdh.exeC:\Windows\system32\Fpckpfdh.exe39⤵
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\Fgncmq32.exeC:\Windows\system32\Fgncmq32.exe40⤵
- Executes dropped EXE
PID:4860 -
C:\Windows\SysWOW64\Fgppbp32.exeC:\Windows\system32\Fgppbp32.exe41⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\Ffemcm32.exeC:\Windows\system32\Ffemcm32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3800 -
C:\Windows\SysWOW64\Gcinma32.exeC:\Windows\system32\Gcinma32.exe43⤵
- Executes dropped EXE
PID:3852 -
C:\Windows\SysWOW64\Glabff32.exeC:\Windows\system32\Glabff32.exe44⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\Gfjfolke.exeC:\Windows\system32\Gfjfolke.exe45⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\Ggicho32.exeC:\Windows\system32\Ggicho32.exe46⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\Glfkafpo.exeC:\Windows\system32\Glfkafpo.exe47⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\Gcpcnp32.exeC:\Windows\system32\Gcpcnp32.exe48⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Gnfhki32.exeC:\Windows\system32\Gnfhki32.exe49⤵
- Executes dropped EXE
PID:3712 -
C:\Windows\SysWOW64\Gdppgcoo.exeC:\Windows\system32\Gdppgcoo.exe50⤵
- Executes dropped EXE
PID:4020 -
C:\Windows\SysWOW64\Gfamok32.exeC:\Windows\system32\Gfamok32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3208 -
C:\Windows\SysWOW64\Hqfqmddc.exeC:\Windows\system32\Hqfqmddc.exe52⤵
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\Hfciekbj.exeC:\Windows\system32\Hfciekbj.exe53⤵
- Executes dropped EXE
PID:3632 -
C:\Windows\SysWOW64\Hfhbpj32.exeC:\Windows\system32\Hfhbpj32.exe54⤵
- Executes dropped EXE
PID:4132 -
C:\Windows\SysWOW64\Hdicnafd.exeC:\Windows\system32\Hdicnafd.exe55⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\Hjfkfhek.exeC:\Windows\system32\Hjfkfhek.exe56⤵
- Executes dropped EXE
PID:4848 -
C:\Windows\SysWOW64\Hcnpon32.exeC:\Windows\system32\Hcnpon32.exe57⤵
- Executes dropped EXE
PID:908 -
C:\Windows\SysWOW64\Hnddlgkb.exeC:\Windows\system32\Hnddlgkb.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\Idnlia32.exeC:\Windows\system32\Idnlia32.exe59⤵
- Executes dropped EXE
PID:5028 -
C:\Windows\SysWOW64\Imiamc32.exeC:\Windows\system32\Imiamc32.exe60⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\Ignejlpp.exeC:\Windows\system32\Ignejlpp.exe61⤵
- Executes dropped EXE
PID:4812 -
C:\Windows\SysWOW64\Inhngf32.exeC:\Windows\system32\Inhngf32.exe62⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\Iqgjca32.exeC:\Windows\system32\Iqgjca32.exe63⤵
- Executes dropped EXE
PID:620 -
C:\Windows\SysWOW64\Igqbplnm.exeC:\Windows\system32\Igqbplnm.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1096 -
C:\Windows\SysWOW64\Ieebiplg.exeC:\Windows\system32\Ieebiplg.exe65⤵
- Executes dropped EXE
PID:3256 -
C:\Windows\SysWOW64\Jmbdcb32.exeC:\Windows\system32\Jmbdcb32.exe66⤵PID:4704
-
C:\Windows\SysWOW64\Jjfdmf32.exeC:\Windows\system32\Jjfdmf32.exe67⤵PID:2524
-
C:\Windows\SysWOW64\Jjknhebc.exeC:\Windows\system32\Jjknhebc.exe68⤵PID:1904
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Dnkkod32.exeC:\Windows\system32\Dnkkod32.exe15⤵PID:10252
-
C:\Windows\SysWOW64\Deeclnnj.exeC:\Windows\system32\Deeclnnj.exe16⤵PID:10304
-
C:\Windows\SysWOW64\Djaldema.exeC:\Windows\system32\Djaldema.exe17⤵PID:10352
-
C:\Windows\SysWOW64\Dqkdao32.exeC:\Windows\system32\Dqkdao32.exe18⤵PID:10396
-
C:\Windows\SysWOW64\Degpanlg.exeC:\Windows\system32\Degpanlg.exe19⤵PID:10440
-
C:\Windows\SysWOW64\Dgelni32.exeC:\Windows\system32\Dgelni32.exe20⤵PID:10488
-
C:\Windows\SysWOW64\Dmbdfp32.exeC:\Windows\system32\Dmbdfp32.exe21⤵PID:10536
-
C:\Windows\SysWOW64\Deimgn32.exeC:\Windows\system32\Deimgn32.exe22⤵PID:10580
-
C:\Windows\SysWOW64\Dghici32.exeC:\Windows\system32\Dghici32.exe23⤵PID:10620
-
C:\Windows\SysWOW64\Ekcedhaa.exeC:\Windows\system32\Ekcedhaa.exe24⤵PID:10668
-
C:\Windows\SysWOW64\Emdakp32.exeC:\Windows\system32\Emdakp32.exe25⤵PID:10728
-
C:\Windows\SysWOW64\Ecoihjol.exeC:\Windows\system32\Ecoihjol.exe26⤵
- Modifies registry class
PID:10780 -
C:\Windows\SysWOW64\Ekfaig32.exeC:\Windows\system32\Ekfaig32.exe27⤵PID:10832
-
C:\Windows\SysWOW64\Endnec32.exeC:\Windows\system32\Endnec32.exe28⤵PID:10876
-
C:\Windows\SysWOW64\Eenfbmfo.exeC:\Windows\system32\Eenfbmfo.exe29⤵PID:10924
-
C:\Windows\SysWOW64\Ejkojddf.exeC:\Windows\system32\Ejkojddf.exe30⤵PID:10968
-
C:\Windows\SysWOW64\Ejmkpcbd.exeC:\Windows\system32\Ejmkpcbd.exe31⤵PID:11032
-
C:\Windows\SysWOW64\Enigqbkm.exeC:\Windows\system32\Enigqbkm.exe32⤵PID:11072
-
C:\Windows\SysWOW64\Eecoml32.exeC:\Windows\system32\Eecoml32.exe33⤵PID:11120
-
C:\Windows\SysWOW64\Ecepiiid.exeC:\Windows\system32\Ecepiiid.exe34⤵PID:11160
-
C:\Windows\SysWOW64\Ejphec32.exeC:\Windows\system32\Ejphec32.exe35⤵PID:11208
-
C:\Windows\SysWOW64\Echlniga.exeC:\Windows\system32\Echlniga.exe36⤵PID:11252
-
C:\Windows\SysWOW64\Falmhm32.exeC:\Windows\system32\Falmhm32.exe37⤵
- Drops file in System32 directory
PID:4128 -
C:\Windows\SysWOW64\Fhfedgmh.exeC:\Windows\system32\Fhfedgmh.exe38⤵PID:3840
-
C:\Windows\SysWOW64\Fanimm32.exeC:\Windows\system32\Fanimm32.exe39⤵
- Modifies registry class
PID:10316 -
C:\Windows\SysWOW64\Felbck32.exeC:\Windows\system32\Felbck32.exe40⤵PID:10360
-
C:\Windows\SysWOW64\Fhkopf32.exeC:\Windows\system32\Fhkopf32.exe41⤵PID:10388
-
C:\Windows\SysWOW64\Fhmkef32.exeC:\Windows\system32\Fhmkef32.exe42⤵PID:10456
-
C:\Windows\SysWOW64\Fmjcmm32.exeC:\Windows\system32\Fmjcmm32.exe43⤵PID:10520
-
C:\Windows\SysWOW64\Gdheefio.exeC:\Windows\system32\Gdheefio.exe44⤵PID:10592
-
C:\Windows\SysWOW64\Gjbnbq32.exeC:\Windows\system32\Gjbnbq32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:10648 -
C:\Windows\SysWOW64\Gmqjnl32.exeC:\Windows\system32\Gmqjnl32.exe46⤵
- Drops file in System32 directory
PID:10720 -
C:\Windows\SysWOW64\Ghfnke32.exeC:\Windows\system32\Ghfnke32.exe47⤵PID:3240
-
C:\Windows\SysWOW64\Gopfhofb.exeC:\Windows\system32\Gopfhofb.exe48⤵PID:10820
-
C:\Windows\SysWOW64\Gaobdjef.exeC:\Windows\system32\Gaobdjef.exe49⤵PID:10864
-
C:\Windows\SysWOW64\Gldgac32.exeC:\Windows\system32\Gldgac32.exe50⤵PID:4980
-
C:\Windows\SysWOW64\Gkggmplf.exeC:\Windows\system32\Gkggmplf.exe51⤵PID:3264
-
C:\Windows\SysWOW64\Gobcno32.exeC:\Windows\system32\Gobcno32.exe52⤵PID:11008
-
C:\Windows\SysWOW64\Hemkjill.exeC:\Windows\system32\Hemkjill.exe53⤵PID:2536
-
C:\Windows\SysWOW64\Hhkgfdkp.exeC:\Windows\system32\Hhkgfdkp.exe54⤵PID:11144
-
C:\Windows\SysWOW64\Hkicbpjd.exeC:\Windows\system32\Hkicbpjd.exe55⤵PID:11216
-
C:\Windows\SysWOW64\Hoepcn32.exeC:\Windows\system32\Hoepcn32.exe56⤵PID:4960
-
C:\Windows\SysWOW64\Hmhpokig.exeC:\Windows\system32\Hmhpokig.exe57⤵PID:2592
-
C:\Windows\SysWOW64\Heohphjj.exeC:\Windows\system32\Heohphjj.exe58⤵PID:4236
-
C:\Windows\SysWOW64\Hhmdldin.exeC:\Windows\system32\Hhmdldin.exe59⤵PID:3404
-
C:\Windows\SysWOW64\Hklpho32.exeC:\Windows\system32\Hklpho32.exe60⤵PID:4936
-
C:\Windows\SysWOW64\Hoglinpj.exeC:\Windows\system32\Hoglinpj.exe61⤵PID:3708
-
C:\Windows\SysWOW64\Hafieion.exeC:\Windows\system32\Hafieion.exe62⤵PID:10484
-
C:\Windows\SysWOW64\Hhpaac32.exeC:\Windows\system32\Hhpaac32.exe63⤵PID:4416
-
C:\Windows\SysWOW64\Hmlijj32.exeC:\Windows\system32\Hmlijj32.exe64⤵PID:10568
-
C:\Windows\SysWOW64\Hdfafdlo.exeC:\Windows\system32\Hdfafdlo.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:10636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Jaefdpjp.exeC:\Windows\system32\Jaefdpjp.exe1⤵PID:3384
-
C:\Windows\SysWOW64\Jagbjohn.exeC:\Windows\system32\Jagbjohn.exe2⤵PID:4420
-
C:\Windows\SysWOW64\Kmncop32.exeC:\Windows\system32\Kmncop32.exe3⤵PID:3140
-
C:\Windows\SysWOW64\Khchlimh.exeC:\Windows\system32\Khchlimh.exe4⤵PID:768
-
C:\Windows\SysWOW64\Kcjhaj32.exeC:\Windows\system32\Kcjhaj32.exe5⤵PID:1440
-
C:\Windows\SysWOW64\Kmbmjpil.exeC:\Windows\system32\Kmbmjpil.exe6⤵PID:3848
-
C:\Windows\SysWOW64\Kfkacepm.exeC:\Windows\system32\Kfkacepm.exe7⤵PID:1584
-
C:\Windows\SysWOW64\Kmeipo32.exeC:\Windows\system32\Kmeipo32.exe8⤵PID:3988
-
C:\Windows\SysWOW64\Kndfjbom.exeC:\Windows\system32\Kndfjbom.exe9⤵PID:548
-
C:\Windows\SysWOW64\Kdaobimd.exeC:\Windows\system32\Kdaobimd.exe10⤵PID:1796
-
C:\Windows\SysWOW64\Lmjckocd.exeC:\Windows\system32\Lmjckocd.exe11⤵PID:4512
-
C:\Windows\SysWOW64\Lhoghgcj.exeC:\Windows\system32\Lhoghgcj.exe12⤵PID:4440
-
C:\Windows\SysWOW64\Laglam32.exeC:\Windows\system32\Laglam32.exe13⤵
- Modifies registry class
PID:3952 -
C:\Windows\SysWOW64\Lhadng32.exeC:\Windows\system32\Lhadng32.exe14⤵PID:4996
-
C:\Windows\SysWOW64\Lmnlfn32.exeC:\Windows\system32\Lmnlfn32.exe15⤵PID:2932
-
C:\Windows\SysWOW64\Lfindcdm.exeC:\Windows\system32\Lfindcdm.exe16⤵PID:512
-
C:\Windows\SysWOW64\Laobal32.exeC:\Windows\system32\Laobal32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1648 -
C:\Windows\SysWOW64\Mkgfkajc.exeC:\Windows\system32\Mkgfkajc.exe18⤵PID:4700
-
C:\Windows\SysWOW64\Memjhjji.exeC:\Windows\system32\Memjhjji.exe19⤵PID:2044
-
C:\Windows\SysWOW64\Moeoqpqj.exeC:\Windows\system32\Moeoqpqj.exe20⤵PID:112
-
C:\Windows\SysWOW64\Mhmcie32.exeC:\Windows\system32\Mhmcie32.exe21⤵PID:2928
-
C:\Windows\SysWOW64\Maehbknk.exeC:\Windows\system32\Maehbknk.exe22⤵PID:4076
-
C:\Windows\SysWOW64\Mojhlold.exeC:\Windows\system32\Mojhlold.exe23⤵PID:4576
-
C:\Windows\SysWOW64\Mhbmdece.exeC:\Windows\system32\Mhbmdece.exe24⤵PID:1392
-
C:\Windows\SysWOW64\Mkpiapbi.exeC:\Windows\system32\Mkpiapbi.exe25⤵PID:2100
-
C:\Windows\SysWOW64\Nkbffppf.exeC:\Windows\system32\Nkbffppf.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5128 -
C:\Windows\SysWOW64\Ndkjoeff.exeC:\Windows\system32\Ndkjoeff.exe27⤵
- Modifies registry class
PID:5164 -
C:\Windows\SysWOW64\Noqolnfm.exeC:\Windows\system32\Noqolnfm.exe28⤵PID:5224
-
C:\Windows\SysWOW64\Nekgih32.exeC:\Windows\system32\Nekgih32.exe29⤵PID:5288
-
C:\Windows\SysWOW64\Nockbndj.exeC:\Windows\system32\Nockbndj.exe30⤵PID:5324
-
C:\Windows\SysWOW64\Ndpcje32.exeC:\Windows\system32\Ndpcje32.exe31⤵PID:5360
-
C:\Windows\SysWOW64\Nadddi32.exeC:\Windows\system32\Nadddi32.exe32⤵PID:5396
-
C:\Windows\SysWOW64\Nhnlqcih.exeC:\Windows\system32\Nhnlqcih.exe33⤵PID:5432
-
C:\Windows\SysWOW64\Nafaii32.exeC:\Windows\system32\Nafaii32.exe34⤵PID:5468
-
C:\Windows\SysWOW64\Oknebn32.exeC:\Windows\system32\Oknebn32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5504 -
C:\Windows\SysWOW64\Odgjkdli.exeC:\Windows\system32\Odgjkdli.exe36⤵PID:5544
-
C:\Windows\SysWOW64\Oolnhmlo.exeC:\Windows\system32\Oolnhmlo.exe37⤵PID:5580
-
C:\Windows\SysWOW64\Ohebabbp.exeC:\Windows\system32\Ohebabbp.exe38⤵PID:5616
-
C:\Windows\SysWOW64\Oamgjh32.exeC:\Windows\system32\Oamgjh32.exe39⤵PID:5652
-
C:\Windows\SysWOW64\Okekcmpq.exeC:\Windows\system32\Okekcmpq.exe40⤵PID:5688
-
C:\Windows\SysWOW64\Oekppfpg.exeC:\Windows\system32\Oekppfpg.exe41⤵PID:5724
-
C:\Windows\SysWOW64\Onfddh32.exeC:\Windows\system32\Onfddh32.exe42⤵
- Drops file in System32 directory
PID:5760 -
C:\Windows\SysWOW64\Phliaa32.exeC:\Windows\system32\Phliaa32.exe43⤵PID:5808
-
C:\Windows\SysWOW64\Pkjenm32.exeC:\Windows\system32\Pkjenm32.exe44⤵PID:5872
-
C:\Windows\SysWOW64\Pnhajh32.exeC:\Windows\system32\Pnhajh32.exe45⤵PID:5916
-
C:\Windows\SysWOW64\Pdbigbbl.exeC:\Windows\system32\Pdbigbbl.exe46⤵PID:5972
-
C:\Windows\SysWOW64\Pojjik32.exeC:\Windows\system32\Pojjik32.exe47⤵PID:6008
-
C:\Windows\SysWOW64\Pdgcba32.exeC:\Windows\system32\Pdgcba32.exe48⤵PID:6044
-
C:\Windows\SysWOW64\Pbkckfmp.exeC:\Windows\system32\Pbkckfmp.exe49⤵PID:6080
-
C:\Windows\SysWOW64\Poocdjlj.exeC:\Windows\system32\Poocdjlj.exe50⤵PID:6116
-
C:\Windows\SysWOW64\Qdllmaja.exeC:\Windows\system32\Qdllmaja.exe51⤵PID:1568
-
C:\Windows\SysWOW64\Qndqff32.exeC:\Windows\system32\Qndqff32.exe52⤵PID:5192
-
C:\Windows\SysWOW64\Qkhaokpk.exeC:\Windows\system32\Qkhaokpk.exe53⤵PID:5232
-
C:\Windows\SysWOW64\Anijafml.exeC:\Windows\system32\Anijafml.exe54⤵PID:5264
-
C:\Windows\SysWOW64\Agaojkcm.exeC:\Windows\system32\Agaojkcm.exe55⤵PID:5048
-
C:\Windows\SysWOW64\Agckokaj.exeC:\Windows\system32\Agckokaj.exe56⤵PID:5392
-
C:\Windows\SysWOW64\Anncle32.exeC:\Windows\system32\Anncle32.exe57⤵PID:5460
-
C:\Windows\SysWOW64\Aichinhm.exeC:\Windows\system32\Aichinhm.exe58⤵PID:3424
-
C:\Windows\SysWOW64\Akadeigq.exeC:\Windows\system32\Akadeigq.exe59⤵PID:5588
-
C:\Windows\SysWOW64\Abllbc32.exeC:\Windows\system32\Abllbc32.exe60⤵PID:2800
-
C:\Windows\SysWOW64\Aiedonfj.exeC:\Windows\system32\Aiedonfj.exe61⤵PID:5772
-
C:\Windows\SysWOW64\Aopmkg32.exeC:\Windows\system32\Aopmkg32.exe62⤵PID:5844
-
C:\Windows\SysWOW64\Bgkapjkb.exeC:\Windows\system32\Bgkapjkb.exe63⤵PID:5884
-
C:\Windows\SysWOW64\Bpdffgjb.exeC:\Windows\system32\Bpdffgjb.exe64⤵PID:6004
-
C:\Windows\SysWOW64\Bfnnca32.exeC:\Windows\system32\Bfnnca32.exe65⤵PID:6064
-
C:\Windows\SysWOW64\Beaoonhi.exeC:\Windows\system32\Beaoonhi.exe66⤵PID:5212
-
C:\Windows\SysWOW64\Bnichcnj.exeC:\Windows\system32\Bnichcnj.exe67⤵PID:5284
-
C:\Windows\SysWOW64\Biogelnp.exeC:\Windows\system32\Biogelnp.exe68⤵PID:5368
-
C:\Windows\SysWOW64\Blmcagmc.exeC:\Windows\system32\Blmcagmc.exe69⤵PID:5496
-
C:\Windows\SysWOW64\Bbglna32.exeC:\Windows\system32\Bbglna32.exe70⤵PID:5640
-
C:\Windows\SysWOW64\Beehjm32.exeC:\Windows\system32\Beehjm32.exe71⤵
- Modifies registry class
PID:5744 -
C:\Windows\SysWOW64\Bgddfi32.exeC:\Windows\system32\Bgddfi32.exe72⤵PID:5804
-
C:\Windows\SysWOW64\Cpklgfcj.exeC:\Windows\system32\Cpklgfcj.exe73⤵PID:5904
-
C:\Windows\SysWOW64\Cbjhcabn.exeC:\Windows\system32\Cbjhcabn.exe74⤵PID:6040
-
C:\Windows\SysWOW64\Cehdpmba.exeC:\Windows\system32\Cehdpmba.exe75⤵PID:5240
-
C:\Windows\SysWOW64\Cpnimeag.exeC:\Windows\system32\Cpnimeag.exe76⤵PID:5332
-
C:\Windows\SysWOW64\Cnebcadl.exeC:\Windows\system32\Cnebcadl.exe77⤵PID:5672
-
C:\Windows\SysWOW64\Ceokpl32.exeC:\Windows\system32\Ceokpl32.exe78⤵PID:5852
-
C:\Windows\SysWOW64\Chmglg32.exeC:\Windows\system32\Chmglg32.exe79⤵PID:5992
-
C:\Windows\SysWOW64\Clicmfcf.exeC:\Windows\system32\Clicmfcf.exe80⤵PID:5684
-
C:\Windows\SysWOW64\Cngoiabj.exeC:\Windows\system32\Cngoiabj.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5896 -
C:\Windows\SysWOW64\Cfogjo32.exeC:\Windows\system32\Cfogjo32.exe82⤵PID:5348
-
C:\Windows\SysWOW64\Ceagfkjf.exeC:\Windows\system32\Ceagfkjf.exe83⤵PID:6036
-
C:\Windows\SysWOW64\Dlkpbe32.exeC:\Windows\system32\Dlkpbe32.exe84⤵PID:5820
-
C:\Windows\SysWOW64\Dpglcdim.exeC:\Windows\system32\Dpglcdim.exe85⤵PID:6156
-
C:\Windows\SysWOW64\Dhbqgfgg.exeC:\Windows\system32\Dhbqgfgg.exe86⤵PID:6220
-
C:\Windows\SysWOW64\Dnlidq32.exeC:\Windows\system32\Dnlidq32.exe87⤵PID:6268
-
C:\Windows\SysWOW64\Dfcqenog.exeC:\Windows\system32\Dfcqenog.exe88⤵PID:6312
-
C:\Windows\SysWOW64\Dhdmmf32.exeC:\Windows\system32\Dhdmmf32.exe89⤵PID:6352
-
C:\Windows\SysWOW64\Dplenc32.exeC:\Windows\system32\Dplenc32.exe90⤵PID:6400
-
C:\Windows\SysWOW64\Dbjajo32.exeC:\Windows\system32\Dbjajo32.exe91⤵PID:6444
-
C:\Windows\SysWOW64\Didjgilh.exeC:\Windows\system32\Didjgilh.exe92⤵PID:6492
-
C:\Windows\SysWOW64\Dhifheqp.exeC:\Windows\system32\Dhifheqp.exe93⤵PID:6528
-
C:\Windows\SysWOW64\Elgond32.exeC:\Windows\system32\Elgond32.exe94⤵PID:6564
-
C:\Windows\SysWOW64\Eoekjo32.exeC:\Windows\system32\Eoekjo32.exe95⤵PID:6608
-
C:\Windows\SysWOW64\Eimlmhdm.exeC:\Windows\system32\Eimlmhdm.exe96⤵PID:6644
-
C:\Windows\SysWOW64\Efamflbg.exeC:\Windows\system32\Efamflbg.exe97⤵PID:6680
-
C:\Windows\SysWOW64\Eibfhg32.exeC:\Windows\system32\Eibfhg32.exe98⤵PID:6720
-
C:\Windows\SysWOW64\Fpqgpq32.exeC:\Windows\system32\Fpqgpq32.exe99⤵PID:6764
-
C:\Windows\SysWOW64\Fochlmjj.exeC:\Windows\system32\Fochlmjj.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6808 -
C:\Windows\SysWOW64\Fiilifjp.exeC:\Windows\system32\Fiilifjp.exe101⤵PID:6852
-
C:\Windows\SysWOW64\Fhlldc32.exeC:\Windows\system32\Fhlldc32.exe102⤵PID:6908
-
C:\Windows\SysWOW64\Fofdam32.exeC:\Windows\system32\Fofdam32.exe103⤵PID:6964
-
C:\Windows\SysWOW64\Fgmlbj32.exeC:\Windows\system32\Fgmlbj32.exe104⤵PID:7016
-
C:\Windows\SysWOW64\Finede32.exeC:\Windows\system32\Finede32.exe105⤵PID:7052
-
C:\Windows\SysWOW64\Fcfjmk32.exeC:\Windows\system32\Fcfjmk32.exe106⤵PID:7088
-
C:\Windows\SysWOW64\Ghcbeb32.exeC:\Windows\system32\Ghcbeb32.exe107⤵PID:7124
-
C:\Windows\SysWOW64\Ggdbciba.exeC:\Windows\system32\Ggdbciba.exe108⤵PID:7160
-
C:\Windows\SysWOW64\Gplglo32.exeC:\Windows\system32\Gplglo32.exe109⤵PID:4124
-
C:\Windows\SysWOW64\Ggfohi32.exeC:\Windows\system32\Ggfohi32.exe110⤵PID:6228
-
C:\Windows\SysWOW64\Glchap32.exeC:\Windows\system32\Glchap32.exe111⤵PID:6256
-
C:\Windows\SysWOW64\Gjghjd32.exeC:\Windows\system32\Gjghjd32.exe112⤵PID:6332
-
C:\Windows\SysWOW64\Gledfp32.exeC:\Windows\system32\Gledfp32.exe113⤵PID:6384
-
C:\Windows\SysWOW64\Ggkich32.exeC:\Windows\system32\Ggkich32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6460 -
C:\Windows\SysWOW64\Hfpfee32.exeC:\Windows\system32\Hfpfee32.exe115⤵PID:6512
-
C:\Windows\SysWOW64\Hhaofpnb.exeC:\Windows\system32\Hhaofpnb.exe116⤵PID:6600
-
C:\Windows\SysWOW64\Hokgcj32.exeC:\Windows\system32\Hokgcj32.exe117⤵PID:6636
-
C:\Windows\SysWOW64\Hfeopdml.exeC:\Windows\system32\Hfeopdml.exe118⤵PID:6748
-
C:\Windows\SysWOW64\Hlogmn32.exeC:\Windows\system32\Hlogmn32.exe119⤵PID:6772
-
C:\Windows\SysWOW64\Hjchfb32.exeC:\Windows\system32\Hjchfb32.exe120⤵PID:6860
-
C:\Windows\SysWOW64\Hlcqhnpc.exeC:\Windows\system32\Hlcqhnpc.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6920 -
C:\Windows\SysWOW64\Ihjamo32.exeC:\Windows\system32\Ihjamo32.exe122⤵
- Drops file in System32 directory
PID:6972
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-