Analysis
-
max time kernel
129s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 01:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f245b0152ec63f440c77651f5bc4ebcf_JC.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
f245b0152ec63f440c77651f5bc4ebcf_JC.exe
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
f245b0152ec63f440c77651f5bc4ebcf_JC.exe
-
Size
93KB
-
MD5
f245b0152ec63f440c77651f5bc4ebcf
-
SHA1
fd8d9ab7c632e6d51e297ca8fe21162d84b3b241
-
SHA256
8e649cc8cd1740d981f6b08d67315ae52c55458101c51d8051030e9729a057fc
-
SHA512
ed0029a6a774ec559982702cde2b480de59234254762178fb97ff3153a911e2b5fc7324ff14c0688ed5d00281b42b2b0e18a65c31b903002a8b9f731d41df8fe
-
SSDEEP
1536:DGcdhkOoC637CcWkEPR7DjC66QNnTxa5DsaMiwihtIbbpkp:DGc7od37CcWkEVC668T85DdMiwaIbbp4
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omdnbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Njlcdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cofemg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fmapag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cilmpmki.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmppmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Combgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpmknf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgkeep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpoagb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dclknkfp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqpqghgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbhplnca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddfbgelh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mbpoop32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iomcqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iaaflh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emknmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deagoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hbiakf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aggean32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fajgekol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ihfglhfp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgnief32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckmmpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eehnnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cgijnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Emkeho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dkokbn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pflpfcbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iklgkmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aolbedeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gcqjal32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnmfdpni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Adockl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nddkaddm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndpafe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Baepolni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qopbjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kcphpdil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cncnhh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bodfkpfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mqpqghgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Djaipe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djqbeonf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pgllad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Omdnbd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kobnji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mipchg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bdmpljlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Knoonphp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eeelge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaqmej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jokpcmmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Odhppclh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hfnpacjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cidgdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jlnnfghd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icfediio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ammnclcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gffhbljh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifihckmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qbddmejf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipkneh32.exe -
Executes dropped EXE 64 IoCs
pid Process 4788 Baepolni.exe 4240 Bbfmgd32.exe 3288 Cmpjoloh.exe 2212 Ckidcpjl.exe 4424 Ddfbgelh.exe 4400 Djgdkk32.exe 4700 Ecdbop32.exe 4292 Fnalmh32.exe 4636 Fgiaemic.exe 4528 Mllcocna.exe 5084 Gqnejaff.exe 5100 Gcqjal32.exe 2912 Hjaioe32.exe 1212 Igmoih32.exe 2092 Iccpniqp.exe 1148 Claenb32.exe 1336 Jldkeeig.exe 2520 Jhoeef32.exe 3744 Holjjd32.exe 2072 Odjmdocp.exe 4764 Pcfmneaa.exe 1328 Mdkhkflh.exe 3912 Pbljoafi.exe 2844 Kpdjbapj.exe 2228 Acgfec32.exe 4488 Bbcignbo.exe 3936 Nnmfdpni.exe 4352 Cidgdg32.exe 2148 Debnjgcp.exe 5040 Dcmedk32.exe 2428 Giofggia.exe 3972 Eegqldqg.exe 3780 Fjgfgbek.exe 4928 Gcgqag32.exe 2792 Pikqcl32.exe 1704 Gdfmkjlg.exe 3140 Foekbg32.exe 4012 Jjhalkjc.exe 1988 Keekjc32.exe 4828 Lhjnfn32.exe 2556 Leedqa32.exe 1752 Mkgfdgpq.exe 1324 Oacdmo32.exe 3920 Oojalb32.exe 5032 Pgllad32.exe 3832 Pnhacn32.exe 180 Ailabddb.exe 3216 Chphhn32.exe 4300 Ngjcgdba.exe 3988 Deagoa32.exe 4992 Qgkeep32.exe 752 Kdfmcobk.exe 724 Eoconenj.exe 1548 Ebeapc32.exe 3976 Nfhfbedd.exe 1192 Fgmllpng.exe 2104 Fomohc32.exe 4216 Ghqeihbb.exe 3468 Gojnfb32.exe 2100 Gegchl32.exe 5088 Olqofjhn.exe 2052 Hfniikha.exe 4988 Lkjhfh32.exe 4076 Oocdme32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Pahdfp32.dll Nlhbja32.exe File created C:\Windows\SysWOW64\Ifofkacc.dll Leedqa32.exe File opened for modification C:\Windows\SysWOW64\Neaokboj.exe Pdkcnklf.exe File opened for modification C:\Windows\SysWOW64\Giofggia.exe Gmclgghc.exe File opened for modification C:\Windows\SysWOW64\Lbekjipe.exe Khmjga32.exe File created C:\Windows\SysWOW64\Ejofacfb.exe Edemdine.exe File opened for modification C:\Windows\SysWOW64\Iddlccfp.exe Iklgkmop.exe File created C:\Windows\SysWOW64\Glgjfb32.exe Gbmigm32.exe File opened for modification C:\Windows\SysWOW64\Ailabddb.exe Pnhacn32.exe File created C:\Windows\SysWOW64\Bliioqol.dll Pimmil32.exe File opened for modification C:\Windows\SysWOW64\Fneohd32.exe Eehnnb32.exe File created C:\Windows\SysWOW64\Oepnld32.dll Ghqeihbb.exe File created C:\Windows\SysWOW64\Imneeb32.dll Ipqnknld.exe File opened for modification C:\Windows\SysWOW64\Alcfpm32.exe Agfnhf32.exe File created C:\Windows\SysWOW64\Jookjpam.exe Ihfglhfp.exe File opened for modification C:\Windows\SysWOW64\Mgokflpj.exe Mpebjb32.exe File created C:\Windows\SysWOW64\Baepolni.exe f245b0152ec63f440c77651f5bc4ebcf_JC.exe File opened for modification C:\Windows\SysWOW64\Baepolni.exe f245b0152ec63f440c77651f5bc4ebcf_JC.exe File created C:\Windows\SysWOW64\Ocadkb32.dll Oacdmo32.exe File created C:\Windows\SysWOW64\Fbhplnca.exe Fmikoggm.exe File opened for modification C:\Windows\SysWOW64\Oflfoepg.exe Odkjgm32.exe File opened for modification C:\Windows\SysWOW64\Bjlgnh32.exe Bcboan32.exe File created C:\Windows\SysWOW64\Lmhnea32.exe Ocbdni32.exe File created C:\Windows\SysWOW64\Hdhjqnap.dll Mdkhkflh.exe File opened for modification C:\Windows\SysWOW64\Fojlhmic.exe Ecmebm32.exe File created C:\Windows\SysWOW64\Fghhpq32.dll Gqhknd32.exe File created C:\Windows\SysWOW64\Afmfhcff.dll Odkjgm32.exe File opened for modification C:\Windows\SysWOW64\Pdkcnklf.exe Eeelge32.exe File created C:\Windows\SysWOW64\Oibocbah.dll Qcppogqo.exe File created C:\Windows\SysWOW64\Dcinmjji.dll Ifihckmi.exe File created C:\Windows\SysWOW64\Gckjdhni.dll Pbljoafi.exe File opened for modification C:\Windows\SysWOW64\Nmhglopl.exe Neaokboj.exe File opened for modification C:\Windows\SysWOW64\Mkegbfgp.exe Mhgkfkhl.exe File opened for modification C:\Windows\SysWOW64\Gaqmej32.exe Ggkiha32.exe File opened for modification C:\Windows\SysWOW64\Fikbhiaf.exe Elbhde32.exe File created C:\Windows\SysWOW64\Flinddpj.exe Fikbhiaf.exe File created C:\Windows\SysWOW64\Njjmil32.exe Nglala32.exe File created C:\Windows\SysWOW64\Mlkfcmki.dll Njjmil32.exe File opened for modification C:\Windows\SysWOW64\Nlhbja32.exe Niifnf32.exe File opened for modification C:\Windows\SysWOW64\Hhfenc32.exe Hnaqqj32.exe File created C:\Windows\SysWOW64\Cfqmjajc.exe Cofemg32.exe File created C:\Windows\SysWOW64\Gqnejaff.exe Mllcocna.exe File created C:\Windows\SysWOW64\Ckefeicm.dll Qjjhla32.exe File opened for modification C:\Windows\SysWOW64\Pimmil32.exe Pfoamp32.exe File created C:\Windows\SysWOW64\Bckdggcn.dll Cofemg32.exe File created C:\Windows\SysWOW64\Ggfombmd.exe Fajgekol.exe File opened for modification C:\Windows\SysWOW64\Dcnqid32.exe Dpmknf32.exe File opened for modification C:\Windows\SysWOW64\Jgigfg32.exe Jlcchn32.exe File created C:\Windows\SysWOW64\Aplgij32.dll Gajibq32.exe File opened for modification C:\Windows\SysWOW64\Nqaipgal.exe Mgidgakk.exe File created C:\Windows\SysWOW64\Kqlbncjp.dll Edemdine.exe File created C:\Windows\SysWOW64\Lofjam32.exe Lmhnea32.exe File opened for modification C:\Windows\SysWOW64\Ecmebm32.exe Hplimpdi.exe File opened for modification C:\Windows\SysWOW64\Pflikm32.exe Poaqocgl.exe File created C:\Windows\SysWOW64\Qgkeep32.exe Pflikm32.exe File opened for modification C:\Windows\SysWOW64\Keekjc32.exe Jjhalkjc.exe File opened for modification C:\Windows\SysWOW64\Mdaqhf32.exe Ficgkico.exe File created C:\Windows\SysWOW64\Phiekaql.exe Odhppclh.exe File created C:\Windows\SysWOW64\Jmlkpgia.exe Fqiiamjp.exe File created C:\Windows\SysWOW64\Mohplf32.exe Dclknkfp.exe File created C:\Windows\SysWOW64\Bhdcgc32.dll Ibffbnjh.exe File opened for modification C:\Windows\SysWOW64\Kengqo32.exe Kjdjhgdb.exe File opened for modification C:\Windows\SysWOW64\Gdaomobj.exe Gmggpekm.exe File created C:\Windows\SysWOW64\Igpkok32.exe Iqfcbahb.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3460 5104 WerFault.exe 820 4316 5104 WerFault.exe 820 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aaccdp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ibijbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppemkhaa.dll" Bfenncdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Elienf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eoconenj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgekepjo.dll" Obqopddf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pglcqmml.dll" Jgiiclkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lqdcio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Elbhde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Coepob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Falmabki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Olgdgibf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mhgkfkhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nqaipgal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 RuntimeBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gaqmej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fomohc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hfniikha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kcphpdil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kobnji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bjpaheio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmedcqge.dll" Qgkeep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ggfombmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ahenip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bbfmgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jldkeeig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nppkkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cfaddg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bkoiqjdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Inlibb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lofjam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cekmph32.dll" Meepoc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fipbnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eecfjhpp.dll" Hlcjaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mllcocna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Agcdnjcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bgeadjai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Haaocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bagmpoco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qdpmij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbecgn32.dll" Djgbmffn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fmapag32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gcqjal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghikqj32.dll" Hjaioe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbmbebgo.dll" Foekbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhgdahgp.dll" Gcdkdpih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ciqdoj32.dll" Ceoillaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agchhlbc.dll" Gpodfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fkpoha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kengqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgamdnme.dll" Ihfglhfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jgkdkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hfnpacjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnfege32.dll" Oaliidon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elbffmlj.dll" Pncggqbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Chdikajj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ankaglme.dll" Kibmqond.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kkhpmigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agecdgmk.dll" Ckidcpjl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Djgdkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mkgfdgpq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qbekgknb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cofemg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hbiakf32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 4788 4524 f245b0152ec63f440c77651f5bc4ebcf_JC.exe 88 PID 4524 wrote to memory of 4788 4524 f245b0152ec63f440c77651f5bc4ebcf_JC.exe 88 PID 4524 wrote to memory of 4788 4524 f245b0152ec63f440c77651f5bc4ebcf_JC.exe 88 PID 4788 wrote to memory of 4240 4788 Baepolni.exe 89 PID 4788 wrote to memory of 4240 4788 Baepolni.exe 89 PID 4788 wrote to memory of 4240 4788 Baepolni.exe 89 PID 4240 wrote to memory of 3288 4240 Bbfmgd32.exe 90 PID 4240 wrote to memory of 3288 4240 Bbfmgd32.exe 90 PID 4240 wrote to memory of 3288 4240 Bbfmgd32.exe 90 PID 3288 wrote to memory of 2212 3288 Cmpjoloh.exe 91 PID 3288 wrote to memory of 2212 3288 Cmpjoloh.exe 91 PID 3288 wrote to memory of 2212 3288 Cmpjoloh.exe 91 PID 2212 wrote to memory of 4424 2212 Ckidcpjl.exe 92 PID 2212 wrote to memory of 4424 2212 Ckidcpjl.exe 92 PID 2212 wrote to memory of 4424 2212 Ckidcpjl.exe 92 PID 4424 wrote to memory of 4400 4424 Ddfbgelh.exe 93 PID 4424 wrote to memory of 4400 4424 Ddfbgelh.exe 93 PID 4424 wrote to memory of 4400 4424 Ddfbgelh.exe 93 PID 4400 wrote to memory of 4700 4400 Djgdkk32.exe 95 PID 4400 wrote to memory of 4700 4400 Djgdkk32.exe 95 PID 4400 wrote to memory of 4700 4400 Djgdkk32.exe 95 PID 4700 wrote to memory of 4292 4700 Ecdbop32.exe 94 PID 4700 wrote to memory of 4292 4700 Ecdbop32.exe 94 PID 4700 wrote to memory of 4292 4700 Ecdbop32.exe 94 PID 4292 wrote to memory of 4636 4292 Fnalmh32.exe 96 PID 4292 wrote to memory of 4636 4292 Fnalmh32.exe 96 PID 4292 wrote to memory of 4636 4292 Fnalmh32.exe 96 PID 4636 wrote to memory of 4528 4636 Fgiaemic.exe 414 PID 4636 wrote to memory of 4528 4636 Fgiaemic.exe 414 PID 4636 wrote to memory of 4528 4636 Fgiaemic.exe 414 PID 4528 wrote to memory of 5084 4528 Mllcocna.exe 98 PID 4528 wrote to memory of 5084 4528 Mllcocna.exe 98 PID 4528 wrote to memory of 5084 4528 Mllcocna.exe 98 PID 5084 wrote to memory of 5100 5084 Gqnejaff.exe 99 PID 5084 wrote to memory of 5100 5084 Gqnejaff.exe 99 PID 5084 wrote to memory of 5100 5084 Gqnejaff.exe 99 PID 5100 wrote to memory of 2912 5100 Gcqjal32.exe 101 PID 5100 wrote to memory of 2912 5100 Gcqjal32.exe 101 PID 5100 wrote to memory of 2912 5100 Gcqjal32.exe 101 PID 2912 wrote to memory of 1212 2912 Hjaioe32.exe 100 PID 2912 wrote to memory of 1212 2912 Hjaioe32.exe 100 PID 2912 wrote to memory of 1212 2912 Hjaioe32.exe 100 PID 1212 wrote to memory of 2092 1212 Igmoih32.exe 102 PID 1212 wrote to memory of 2092 1212 Igmoih32.exe 102 PID 1212 wrote to memory of 2092 1212 Igmoih32.exe 102 PID 2092 wrote to memory of 1148 2092 Iccpniqp.exe 265 PID 2092 wrote to memory of 1148 2092 Iccpniqp.exe 265 PID 2092 wrote to memory of 1148 2092 Iccpniqp.exe 265 PID 1148 wrote to memory of 1336 1148 Claenb32.exe 104 PID 1148 wrote to memory of 1336 1148 Claenb32.exe 104 PID 1148 wrote to memory of 1336 1148 Claenb32.exe 104 PID 1336 wrote to memory of 2520 1336 Jldkeeig.exe 105 PID 1336 wrote to memory of 2520 1336 Jldkeeig.exe 105 PID 1336 wrote to memory of 2520 1336 Jldkeeig.exe 105 PID 2520 wrote to memory of 3744 2520 Jhoeef32.exe 463 PID 2520 wrote to memory of 3744 2520 Jhoeef32.exe 463 PID 2520 wrote to memory of 3744 2520 Jhoeef32.exe 463 PID 3744 wrote to memory of 2072 3744 Holjjd32.exe 110 PID 3744 wrote to memory of 2072 3744 Holjjd32.exe 110 PID 3744 wrote to memory of 2072 3744 Holjjd32.exe 110 PID 2072 wrote to memory of 4764 2072 Odjmdocp.exe 108 PID 2072 wrote to memory of 4764 2072 Odjmdocp.exe 108 PID 2072 wrote to memory of 4764 2072 Odjmdocp.exe 108 PID 4764 wrote to memory of 1328 4764 Pcfmneaa.exe 339
Processes
-
C:\Users\Admin\AppData\Local\Temp\f245b0152ec63f440c77651f5bc4ebcf_JC.exe"C:\Users\Admin\AppData\Local\Temp\f245b0152ec63f440c77651f5bc4ebcf_JC.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\Baepolni.exeC:\Windows\system32\Baepolni.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Bbfmgd32.exeC:\Windows\system32\Bbfmgd32.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\Cmpjoloh.exeC:\Windows\system32\Cmpjoloh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\Ckidcpjl.exeC:\Windows\system32\Ckidcpjl.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\Ddfbgelh.exeC:\Windows\system32\Ddfbgelh.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\Djgdkk32.exeC:\Windows\system32\Djgdkk32.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\Ecdbop32.exeC:\Windows\system32\Ecdbop32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Lmhnea32.exeC:\Windows\system32\Lmhnea32.exe2⤵
- Drops file in System32 directory
PID:5532 -
C:\Windows\SysWOW64\Lofjam32.exeC:\Windows\system32\Lofjam32.exe3⤵
- Modifies registry class
PID:5108 -
C:\Windows\SysWOW64\Lnkgbibj.exeC:\Windows\system32\Lnkgbibj.exe4⤵PID:4204
-
C:\Windows\SysWOW64\Meepoc32.exeC:\Windows\system32\Meepoc32.exe5⤵
- Modifies registry class
PID:1500 -
C:\Windows\SysWOW64\Mbnjcg32.exeC:\Windows\system32\Mbnjcg32.exe6⤵PID:5624
-
C:\Windows\SysWOW64\Neaokboj.exeC:\Windows\system32\Neaokboj.exe7⤵
- Drops file in System32 directory
PID:4924 -
C:\Windows\SysWOW64\Nmhglopl.exeC:\Windows\system32\Nmhglopl.exe8⤵PID:4624
-
C:\Windows\SysWOW64\Oihkgo32.exeC:\Windows\system32\Oihkgo32.exe9⤵PID:5768
-
C:\Windows\SysWOW64\Opbcdieb.exeC:\Windows\system32\Opbcdieb.exe10⤵PID:3592
-
C:\Windows\SysWOW64\Obqopddf.exeC:\Windows\system32\Obqopddf.exe11⤵
- Modifies registry class
PID:5864 -
C:\Windows\SysWOW64\Oijgmokc.exeC:\Windows\system32\Oijgmokc.exe12⤵PID:1164
-
C:\Windows\SysWOW64\Ongpeejj.exeC:\Windows\system32\Ongpeejj.exe13⤵PID:5928
-
C:\Windows\SysWOW64\Ofnhfbjl.exeC:\Windows\system32\Ofnhfbjl.exe14⤵PID:6024
-
C:\Windows\SysWOW64\Omhpcm32.exeC:\Windows\system32\Omhpcm32.exe15⤵PID:808
-
C:\Windows\SysWOW64\Onjmjegg.exeC:\Windows\system32\Onjmjegg.exe16⤵PID:5132
-
C:\Windows\SysWOW64\Ofadlbhj.exeC:\Windows\system32\Ofadlbhj.exe17⤵PID:5304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Fnalmh32.exeC:\Windows\system32\Fnalmh32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\Fgiaemic.exeC:\Windows\system32\Fgiaemic.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\Fbfkceca.exeC:\Windows\system32\Fbfkceca.exe3⤵PID:4528
-
C:\Windows\SysWOW64\Gqnejaff.exeC:\Windows\system32\Gqnejaff.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\Gcqjal32.exeC:\Windows\system32\Gcqjal32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\Hjaioe32.exeC:\Windows\system32\Hjaioe32.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912
-
-
-
-
-
-
C:\Windows\SysWOW64\Igmoih32.exeC:\Windows\system32\Igmoih32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\Iccpniqp.exeC:\Windows\system32\Iccpniqp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Ihceigec.exeC:\Windows\system32\Ihceigec.exe3⤵PID:1148
-
C:\Windows\SysWOW64\Jldkeeig.exeC:\Windows\system32\Jldkeeig.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\Jhoeef32.exeC:\Windows\system32\Jhoeef32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\Kbjbnnfg.exeC:\Windows\system32\Kbjbnnfg.exe6⤵PID:3744
-
C:\Windows\SysWOW64\Odjmdocp.exeC:\Windows\system32\Odjmdocp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Pmoagk32.exeC:\Windows\system32\Pmoagk32.exe1⤵PID:1328
-
C:\Windows\SysWOW64\Pbljoafi.exeC:\Windows\system32\Pbljoafi.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3912 -
C:\Windows\SysWOW64\Amfhgj32.exeC:\Windows\system32\Amfhgj32.exe3⤵PID:2844
-
C:\Windows\SysWOW64\Acgfec32.exeC:\Windows\system32\Acgfec32.exe4⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\Bbcignbo.exeC:\Windows\system32\Bbcignbo.exe5⤵
- Executes dropped EXE
PID:4488
-
-
-
-
-
C:\Windows\SysWOW64\Mgidgakk.exeC:\Windows\system32\Mgidgakk.exe2⤵
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\Nqaipgal.exeC:\Windows\system32\Nqaipgal.exe3⤵
- Modifies registry class
PID:2400 -
C:\Windows\SysWOW64\Nglala32.exeC:\Windows\system32\Nglala32.exe4⤵
- Drops file in System32 directory
PID:2932 -
C:\Windows\SysWOW64\Njjmil32.exeC:\Windows\system32\Njjmil32.exe5⤵
- Drops file in System32 directory
PID:1672 -
C:\Windows\SysWOW64\Ndpafe32.exeC:\Windows\system32\Ndpafe32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5496
-
-
-
-
-
-
C:\Windows\SysWOW64\Pcfmneaa.exeC:\Windows\system32\Pcfmneaa.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764
-
C:\Windows\SysWOW64\Cdgolq32.exeC:\Windows\system32\Cdgolq32.exe1⤵PID:3936
-
C:\Windows\SysWOW64\Cidgdg32.exeC:\Windows\system32\Cidgdg32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\Debnjgcp.exeC:\Windows\system32\Debnjgcp.exe3⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\Dcmedk32.exeC:\Windows\system32\Dcmedk32.exe4⤵
- Executes dropped EXE
PID:5040 -
C:\Windows\SysWOW64\Eepkkefp.exeC:\Windows\system32\Eepkkefp.exe5⤵PID:2428
-
C:\Windows\SysWOW64\Eegqldqg.exeC:\Windows\system32\Eegqldqg.exe6⤵
- Executes dropped EXE
PID:3972 -
C:\Windows\SysWOW64\Fjgfgbek.exeC:\Windows\system32\Fjgfgbek.exe7⤵
- Executes dropped EXE
PID:3780 -
C:\Windows\SysWOW64\Gcgqag32.exeC:\Windows\system32\Gcgqag32.exe8⤵
- Executes dropped EXE
PID:4928
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Gjqinamq.exeC:\Windows\system32\Gjqinamq.exe1⤵PID:2792
-
C:\Windows\SysWOW64\Gdfmkjlg.exeC:\Windows\system32\Gdfmkjlg.exe2⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\SysWOW64\Gjhonp32.exeC:\Windows\system32\Gjhonp32.exe3⤵PID:3140
-
C:\Windows\SysWOW64\Jjhalkjc.exeC:\Windows\system32\Jjhalkjc.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4012 -
C:\Windows\SysWOW64\Keekjc32.exeC:\Windows\system32\Keekjc32.exe5⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\Lhjnfn32.exeC:\Windows\system32\Lhjnfn32.exe6⤵
- Executes dropped EXE
PID:4828 -
C:\Windows\SysWOW64\Leedqa32.exeC:\Windows\system32\Leedqa32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2556 -
C:\Windows\SysWOW64\Mkgfdgpq.exeC:\Windows\system32\Mkgfdgpq.exe8⤵
- Executes dropped EXE
- Modifies registry class
PID:1752 -
C:\Windows\SysWOW64\Nnabladg.exeC:\Windows\system32\Nnabladg.exe9⤵PID:2364
-
C:\Windows\SysWOW64\Oacdmo32.exeC:\Windows\system32\Oacdmo32.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1324 -
C:\Windows\SysWOW64\Oojalb32.exeC:\Windows\system32\Oojalb32.exe11⤵
- Executes dropped EXE
PID:3920 -
C:\Windows\SysWOW64\Pgllad32.exeC:\Windows\system32\Pgllad32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5032 -
C:\Windows\SysWOW64\Pnhacn32.exeC:\Windows\system32\Pnhacn32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3832 -
C:\Windows\SysWOW64\Ailabddb.exeC:\Windows\system32\Ailabddb.exe14⤵
- Executes dropped EXE
PID:180 -
C:\Windows\SysWOW64\Cblebgfh.exeC:\Windows\system32\Cblebgfh.exe15⤵PID:3216
-
C:\Windows\SysWOW64\Dngobghg.exeC:\Windows\system32\Dngobghg.exe16⤵PID:4300
-
C:\Windows\SysWOW64\Deagoa32.exeC:\Windows\system32\Deagoa32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3988 -
C:\Windows\SysWOW64\Diopep32.exeC:\Windows\system32\Diopep32.exe18⤵PID:4992
-
C:\Windows\SysWOW64\Dfemdcba.exeC:\Windows\system32\Dfemdcba.exe19⤵PID:752
-
C:\Windows\SysWOW64\Eoconenj.exeC:\Windows\system32\Eoconenj.exe20⤵
- Executes dropped EXE
- Modifies registry class
PID:724 -
C:\Windows\SysWOW64\Ebeapc32.exeC:\Windows\system32\Ebeapc32.exe21⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\Fifomlap.exeC:\Windows\system32\Fifomlap.exe22⤵PID:3976
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Fgmllpng.exeC:\Windows\system32\Fgmllpng.exe1⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\SysWOW64\Ggoiap32.exeC:\Windows\system32\Ggoiap32.exe2⤵PID:2104
-
C:\Windows\SysWOW64\Ghqeihbb.exeC:\Windows\system32\Ghqeihbb.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4216 -
C:\Windows\SysWOW64\Gojnfb32.exeC:\Windows\system32\Gojnfb32.exe4⤵
- Executes dropped EXE
PID:3468 -
C:\Windows\SysWOW64\Gegchl32.exeC:\Windows\system32\Gegchl32.exe5⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\Gheodg32.exeC:\Windows\system32\Gheodg32.exe6⤵PID:5088
-
C:\Windows\SysWOW64\Hfniikha.exeC:\Windows\system32\Hfniikha.exe7⤵
- Executes dropped EXE
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\Hfpenj32.exeC:\Windows\system32\Hfpenj32.exe8⤵PID:4988
-
C:\Windows\SysWOW64\Ifihdi32.exeC:\Windows\system32\Ifihdi32.exe9⤵PID:4076
-
C:\Windows\SysWOW64\Igieoleg.exeC:\Windows\system32\Igieoleg.exe10⤵PID:2164
-
C:\Windows\SysWOW64\Iqfcbahb.exeC:\Windows\system32\Iqfcbahb.exe11⤵
- Drops file in System32 directory
PID:5000
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Igpkok32.exeC:\Windows\system32\Igpkok32.exe1⤵PID:4476
-
C:\Windows\SysWOW64\Jokpcmmj.exeC:\Windows\system32\Jokpcmmj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1052 -
C:\Windows\SysWOW64\Jjqdafmp.exeC:\Windows\system32\Jjqdafmp.exe3⤵PID:2744
-
C:\Windows\SysWOW64\Jcihjl32.exeC:\Windows\system32\Jcihjl32.exe4⤵PID:4520
-
C:\Windows\SysWOW64\Jjhjae32.exeC:\Windows\system32\Jjhjae32.exe5⤵PID:5016
-
C:\Windows\SysWOW64\Kqdodo32.exeC:\Windows\system32\Kqdodo32.exe6⤵PID:2328
-
C:\Windows\SysWOW64\Kgngqico.exeC:\Windows\system32\Kgngqico.exe7⤵PID:932
-
C:\Windows\SysWOW64\Kjamhd32.exeC:\Windows\system32\Kjamhd32.exe8⤵PID:2248
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kmpido32.exeC:\Windows\system32\Kmpido32.exe1⤵PID:2440
-
C:\Windows\SysWOW64\Kifjip32.exeC:\Windows\system32\Kifjip32.exe2⤵PID:3228
-
C:\Windows\SysWOW64\Lfcmhc32.exeC:\Windows\system32\Lfcmhc32.exe3⤵PID:2988
-
C:\Windows\SysWOW64\Mhhcne32.exeC:\Windows\system32\Mhhcne32.exe4⤵PID:3820
-
C:\Windows\SysWOW64\Mmghklif.exeC:\Windows\system32\Mmghklif.exe5⤵PID:2396
-
C:\Windows\SysWOW64\Mdaqhf32.exeC:\Windows\system32\Mdaqhf32.exe6⤵PID:4908
-
C:\Windows\SysWOW64\Nhafcd32.exeC:\Windows\system32\Nhafcd32.exe7⤵PID:2544
-
C:\Windows\SysWOW64\Nandhi32.exeC:\Windows\system32\Nandhi32.exe8⤵PID:2836
-
C:\Windows\SysWOW64\Ndmpddfe.exeC:\Windows\system32\Ndmpddfe.exe9⤵PID:2776
-
C:\Windows\SysWOW64\Oileakbj.exeC:\Windows\system32\Oileakbj.exe10⤵PID:4200
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Oahgnh32.exeC:\Windows\system32\Oahgnh32.exe1⤵PID:3604
-
C:\Windows\SysWOW64\Ohaokbfd.exeC:\Windows\system32\Ohaokbfd.exe2⤵PID:408
-
C:\Windows\SysWOW64\Odhppclh.exeC:\Windows\system32\Odhppclh.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3136 -
C:\Windows\SysWOW64\Phiekaql.exeC:\Windows\system32\Phiekaql.exe4⤵PID:1236
-
-
-
-
C:\Windows\SysWOW64\Pjlnhi32.exeC:\Windows\system32\Pjlnhi32.exe1⤵PID:4164
-
C:\Windows\SysWOW64\Ppffec32.exeC:\Windows\system32\Ppffec32.exe2⤵PID:4548
-
C:\Windows\SysWOW64\Pgpobmca.exeC:\Windows\system32\Pgpobmca.exe3⤵PID:3320
-
C:\Windows\SysWOW64\Aaofedkl.exeC:\Windows\system32\Aaofedkl.exe4⤵PID:988
-
C:\Windows\SysWOW64\Ajodef32.exeC:\Windows\system32\Ajodef32.exe5⤵PID:5136
-
C:\Windows\SysWOW64\Addhbo32.exeC:\Windows\system32\Addhbo32.exe6⤵PID:5176
-
C:\Windows\SysWOW64\Agcdnjcl.exeC:\Windows\system32\Agcdnjcl.exe7⤵
- Modifies registry class
PID:5220 -
C:\Windows\SysWOW64\Bgeadjai.exeC:\Windows\system32\Bgeadjai.exe8⤵
- Modifies registry class
PID:5260
-
-
-
-
-
-
C:\Windows\SysWOW64\Aaccdp32.exeC:\Windows\system32\Aaccdp32.exe4⤵
- Modifies registry class
PID:5884 -
C:\Windows\SysWOW64\Ahmlaj32.exeC:\Windows\system32\Ahmlaj32.exe5⤵PID:6004
-
C:\Windows\SysWOW64\Bjkhme32.exeC:\Windows\system32\Bjkhme32.exe6⤵PID:5168
-
C:\Windows\SysWOW64\Baepjpea.exeC:\Windows\system32\Baepjpea.exe7⤵PID:4240
-
C:\Windows\SysWOW64\Bhohfj32.exeC:\Windows\system32\Bhohfj32.exe8⤵PID:212
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Gqhknd32.exeC:\Windows\system32\Gqhknd32.exe2⤵
- Drops file in System32 directory
PID:4548 -
C:\Windows\SysWOW64\Gbjhelnp.exeC:\Windows\system32\Gbjhelnp.exe3⤵PID:5156
-
C:\Windows\SysWOW64\Ipqnknld.exeC:\Windows\system32\Ipqnknld.exe4⤵
- Drops file in System32 directory
PID:3228 -
C:\Windows\SysWOW64\Mdhkefnj.exeC:\Windows\system32\Mdhkefnj.exe5⤵PID:5264
-
C:\Windows\SysWOW64\Mjednmla.exeC:\Windows\system32\Mjednmla.exe6⤵PID:5488
-
C:\Windows\SysWOW64\Mdkhkflh.exeC:\Windows\system32\Mdkhkflh.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1328
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Bkjpkg32.exeC:\Windows\system32\Bkjpkg32.exe1⤵PID:5308
-
C:\Windows\SysWOW64\Cnhlgc32.exeC:\Windows\system32\Cnhlgc32.exe2⤵PID:5344
-
C:\Windows\SysWOW64\Cebdcmhh.exeC:\Windows\system32\Cebdcmhh.exe3⤵PID:5388
-
C:\Windows\SysWOW64\Ckmmpg32.exeC:\Windows\system32\Ckmmpg32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5432 -
C:\Windows\SysWOW64\Cnkilbni.exeC:\Windows\system32\Cnkilbni.exe5⤵PID:5480
-
-
-
-
-
C:\Windows\SysWOW64\Focakm32.exeC:\Windows\system32\Focakm32.exe1⤵PID:5516
-
C:\Windows\SysWOW64\Fiheheka.exeC:\Windows\system32\Fiheheka.exe2⤵PID:5568
-
-
C:\Windows\SysWOW64\Geabbfoc.exeC:\Windows\system32\Geabbfoc.exe1⤵PID:5604
-
C:\Windows\SysWOW64\Ghpooanf.exeC:\Windows\system32\Ghpooanf.exe2⤵PID:5656
-
C:\Windows\SysWOW64\Gbjlgj32.exeC:\Windows\system32\Gbjlgj32.exe3⤵PID:5728
-
C:\Windows\SysWOW64\Hccomh32.exeC:\Windows\system32\Hccomh32.exe4⤵PID:5788
-
C:\Windows\SysWOW64\Ilqmam32.exeC:\Windows\system32\Ilqmam32.exe5⤵PID:5868
-
C:\Windows\SysWOW64\Kcphpdil.exeC:\Windows\system32\Kcphpdil.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5912 -
C:\Windows\SysWOW64\Kokbpe32.exeC:\Windows\system32\Kokbpe32.exe7⤵PID:5956
-
C:\Windows\SysWOW64\Lmfhjhdm.exeC:\Windows\system32\Lmfhjhdm.exe8⤵PID:6000
-
C:\Windows\SysWOW64\Lbcabo32.exeC:\Windows\system32\Lbcabo32.exe9⤵PID:6048
-
C:\Windows\SysWOW64\Nfjeej32.exeC:\Windows\system32\Nfjeej32.exe10⤵PID:6092
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Omdnbd32.exeC:\Windows\system32\Omdnbd32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6132 -
C:\Windows\SysWOW64\Odnfonag.exeC:\Windows\system32\Odnfonag.exe2⤵PID:5164
-
C:\Windows\SysWOW64\Ojhnlh32.exeC:\Windows\system32\Ojhnlh32.exe3⤵PID:5240
-
C:\Windows\SysWOW64\Omgjhc32.exeC:\Windows\system32\Omgjhc32.exe4⤵PID:5244
-
C:\Windows\SysWOW64\Qdfefkll.exeC:\Windows\system32\Qdfefkll.exe5⤵PID:5372
-
C:\Windows\SysWOW64\Ibijbc32.exeC:\Windows\system32\Ibijbc32.exe6⤵
- Modifies registry class
PID:6168 -
C:\Windows\SysWOW64\Iicboncn.exeC:\Windows\system32\Iicboncn.exe7⤵PID:6196
-
C:\Windows\SysWOW64\Ilbnkiba.exeC:\Windows\system32\Ilbnkiba.exe8⤵PID:6232
-
C:\Windows\SysWOW64\Iblfgc32.exeC:\Windows\system32\Iblfgc32.exe9⤵PID:3928
-
C:\Windows\SysWOW64\Iihkjm32.exeC:\Windows\system32\Iihkjm32.exe10⤵PID:6388
-
C:\Windows\SysWOW64\Jimeelkc.exeC:\Windows\system32\Jimeelkc.exe11⤵PID:6444
-
C:\Windows\SysWOW64\Jcbibeki.exeC:\Windows\system32\Jcbibeki.exe12⤵PID:6476
-
C:\Windows\SysWOW64\Jecejm32.exeC:\Windows\system32\Jecejm32.exe13⤵PID:6552
-
C:\Windows\SysWOW64\Jlnnfghd.exeC:\Windows\system32\Jlnnfghd.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:920 -
C:\Windows\SysWOW64\Lfckjnjh.exeC:\Windows\system32\Lfckjnjh.exe15⤵PID:5952
-
C:\Windows\SysWOW64\Lmncgh32.exeC:\Windows\system32\Lmncgh32.exe16⤵PID:6616
-
C:\Windows\SysWOW64\Ldgkdbia.exeC:\Windows\system32\Ldgkdbia.exe17⤵PID:6724
-
C:\Windows\SysWOW64\Lffhpnhe.exeC:\Windows\system32\Lffhpnhe.exe18⤵PID:4140
-
C:\Windows\SysWOW64\Lmppmh32.exeC:\Windows\system32\Lmppmh32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6824
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Cliahf32.exeC:\Windows\system32\Cliahf32.exe5⤵PID:5436
-
C:\Windows\SysWOW64\Cbcieqpd.exeC:\Windows\system32\Cbcieqpd.exe6⤵PID:3396
-
C:\Windows\SysWOW64\Cddemi32.exeC:\Windows\system32\Cddemi32.exe7⤵PID:4980
-
C:\Windows\SysWOW64\Clknnf32.exeC:\Windows\system32\Clknnf32.exe8⤵PID:1220
-
C:\Windows\SysWOW64\Cbefkp32.exeC:\Windows\system32\Cbefkp32.exe9⤵PID:5472
-
C:\Windows\SysWOW64\Dbjofp32.exeC:\Windows\system32\Dbjofp32.exe10⤵PID:1424
-
C:\Windows\SysWOW64\Ddklnh32.exeC:\Windows\system32\Ddklnh32.exe11⤵PID:2528
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Qkpmcddi.exeC:\Windows\system32\Qkpmcddi.exe1⤵PID:5424
-
C:\Windows\SysWOW64\Qnniopcm.exeC:\Windows\system32\Qnniopcm.exe2⤵PID:976
-
-
C:\Windows\SysWOW64\Qdhalj32.exeC:\Windows\system32\Qdhalj32.exe1⤵PID:4408
-
C:\Windows\SysWOW64\Agfnhf32.exeC:\Windows\system32\Agfnhf32.exe2⤵
- Drops file in System32 directory
PID:3328 -
C:\Windows\SysWOW64\Alcfpm32.exeC:\Windows\system32\Alcfpm32.exe3⤵PID:5552
-
C:\Windows\SysWOW64\Blabakle.exeC:\Windows\system32\Blabakle.exe4⤵PID:5540
-
C:\Windows\SysWOW64\Dncehk32.exeC:\Windows\system32\Dncehk32.exe5⤵PID:5652
-
-
-
-
-
C:\Windows\SysWOW64\Ddnmeejo.exeC:\Windows\system32\Ddnmeejo.exe1⤵PID:5672
-
C:\Windows\SysWOW64\Dkgeao32.exeC:\Windows\system32\Dkgeao32.exe2⤵PID:3532
-
C:\Windows\SysWOW64\Dkokbn32.exeC:\Windows\system32\Dkokbn32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5752 -
C:\Windows\SysWOW64\Enaaiifb.exeC:\Windows\system32\Enaaiifb.exe4⤵PID:920
-
C:\Windows\SysWOW64\Falmabki.exeC:\Windows\system32\Falmabki.exe5⤵
- Modifies registry class
PID:1612 -
C:\Windows\SysWOW64\Fmejlcoj.exeC:\Windows\system32\Fmejlcoj.exe6⤵PID:3204
-
C:\Windows\SysWOW64\Gaccbaeq.exeC:\Windows\system32\Gaccbaeq.exe7⤵PID:3388
-
C:\Windows\SysWOW64\Ghmkol32.exeC:\Windows\system32\Ghmkol32.exe8⤵PID:5984
-
C:\Windows\SysWOW64\Gngckfdj.exeC:\Windows\system32\Gngckfdj.exe9⤵PID:3444
-
C:\Windows\SysWOW64\Gaepgacn.exeC:\Windows\system32\Gaepgacn.exe10⤵PID:6088
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Gajibq32.exeC:\Windows\system32\Gajibq32.exe1⤵
- Drops file in System32 directory
PID:6140 -
C:\Windows\SysWOW64\Ghdaokfe.exeC:\Windows\system32\Ghdaokfe.exe2⤵PID:5216
-
C:\Windows\SysWOW64\Gonilenb.exeC:\Windows\system32\Gonilenb.exe3⤵PID:5288
-
C:\Windows\SysWOW64\Haaocp32.exeC:\Windows\system32\Haaocp32.exe4⤵
- Modifies registry class
PID:5400 -
C:\Windows\SysWOW64\Ihfglhfp.exeC:\Windows\system32\Ihfglhfp.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2088 -
C:\Windows\SysWOW64\Jookjpam.exeC:\Windows\system32\Jookjpam.exe6⤵PID:4524
-
-
-
-
-
C:\Windows\SysWOW64\Niifnf32.exeC:\Windows\system32\Niifnf32.exe3⤵
- Drops file in System32 directory
PID:4276 -
C:\Windows\SysWOW64\Nlhbja32.exeC:\Windows\system32\Nlhbja32.exe4⤵
- Drops file in System32 directory
PID:7156 -
C:\Windows\SysWOW64\Ngmggj32.exeC:\Windows\system32\Ngmggj32.exe5⤵PID:6300
-
C:\Windows\SysWOW64\Njlcdf32.exeC:\Windows\system32\Njlcdf32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5544 -
C:\Windows\SysWOW64\Onneeceo.exeC:\Windows\system32\Onneeceo.exe7⤵PID:4424
-
C:\Windows\SysWOW64\Odhman32.exeC:\Windows\system32\Odhman32.exe8⤵PID:2040
-
C:\Windows\SysWOW64\Ofijifbj.exeC:\Windows\system32\Ofijifbj.exe9⤵PID:6704
-
C:\Windows\SysWOW64\Onqbjccl.exeC:\Windows\system32\Onqbjccl.exe10⤵PID:6912
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Omkmhlpf.exeC:\Windows\system32\Omkmhlpf.exe1⤵PID:5780
-
C:\Windows\SysWOW64\Onlipd32.exeC:\Windows\system32\Onlipd32.exe2⤵PID:5856
-
-
C:\Windows\SysWOW64\Pikqcl32.exeC:\Windows\system32\Pikqcl32.exe1⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\Ppeipfdm.exeC:\Windows\system32\Ppeipfdm.exe2⤵PID:4308
-
C:\Windows\SysWOW64\Pfoamp32.exeC:\Windows\system32\Pfoamp32.exe3⤵
- Drops file in System32 directory
PID:1096 -
C:\Windows\SysWOW64\Pimmil32.exeC:\Windows\system32\Pimmil32.exe4⤵
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\Aeigilml.exeC:\Windows\system32\Aeigilml.exe5⤵PID:5512
-
C:\Windows\SysWOW64\Agmmnnpj.exeC:\Windows\system32\Agmmnnpj.exe6⤵PID:4496
-
C:\Windows\SysWOW64\Bpgnmcdh.exeC:\Windows\system32\Bpgnmcdh.exe7⤵PID:2704
-
C:\Windows\SysWOW64\Beippj32.exeC:\Windows\system32\Beippj32.exe8⤵PID:3264
-
C:\Windows\SysWOW64\Bcmqin32.exeC:\Windows\system32\Bcmqin32.exe9⤵PID:4364
-
C:\Windows\SysWOW64\Bjgifhep.exeC:\Windows\system32\Bjgifhep.exe10⤵PID:5820
-
C:\Windows\SysWOW64\Ccajdmin.exeC:\Windows\system32\Ccajdmin.exe11⤵PID:4272
-
C:\Windows\SysWOW64\Cfpfqiha.exeC:\Windows\system32\Cfpfqiha.exe12⤵PID:3180
-
C:\Windows\SysWOW64\Cljomc32.exeC:\Windows\system32\Cljomc32.exe13⤵PID:5944
-
C:\Windows\SysWOW64\Cpjdiadb.exeC:\Windows\system32\Cpjdiadb.exe14⤵PID:6072
-
C:\Windows\SysWOW64\Claenb32.exeC:\Windows\system32\Claenb32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\Dlcaca32.exeC:\Windows\system32\Dlcaca32.exe16⤵PID:5712
-
C:\Windows\SysWOW64\Dcmjpl32.exeC:\Windows\system32\Dcmjpl32.exe17⤵PID:5844
-
C:\Windows\SysWOW64\Djgbmffn.exeC:\Windows\system32\Djgbmffn.exe18⤵
- Modifies registry class
PID:5448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Doidql32.exeC:\Windows\system32\Doidql32.exe1⤵PID:3744
-
C:\Windows\SysWOW64\Dfclmfhl.exeC:\Windows\system32\Dfclmfhl.exe2⤵PID:4852
-
-
C:\Windows\SysWOW64\Dmmdjp32.exeC:\Windows\system32\Dmmdjp32.exe1⤵PID:5492
-
C:\Windows\SysWOW64\Dcglfjgf.exeC:\Windows\system32\Dcglfjgf.exe2⤵PID:5564
-
C:\Windows\SysWOW64\Ejaecdnc.exeC:\Windows\system32\Ejaecdnc.exe3⤵PID:2216
-
C:\Windows\SysWOW64\Fqiiamjp.exeC:\Windows\system32\Fqiiamjp.exe4⤵
- Drops file in System32 directory
PID:4184 -
C:\Windows\SysWOW64\Jmlkpgia.exeC:\Windows\system32\Jmlkpgia.exe5⤵PID:4112
-
-
-
-
-
C:\Windows\SysWOW64\Jmnheggo.exeC:\Windows\system32\Jmnheggo.exe1⤵PID:4824
-
C:\Windows\SysWOW64\Jhdlbp32.exeC:\Windows\system32\Jhdlbp32.exe2⤵PID:4084
-
C:\Windows\SysWOW64\Jondojna.exeC:\Windows\system32\Jondojna.exe3⤵PID:6116
-
-
-
C:\Windows\SysWOW64\Jgiiclkl.exeC:\Windows\system32\Jgiiclkl.exe1⤵
- Modifies registry class
PID:444 -
C:\Windows\SysWOW64\Kaonaekb.exeC:\Windows\system32\Kaonaekb.exe2⤵PID:2916
-
C:\Windows\SysWOW64\Khifno32.exeC:\Windows\system32\Khifno32.exe3⤵PID:4756
-
C:\Windows\SysWOW64\Kobnji32.exeC:\Windows\system32\Kobnji32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3636 -
C:\Windows\SysWOW64\Kpdjbapj.exeC:\Windows\system32\Kpdjbapj.exe5⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\Kahpgcch.exeC:\Windows\system32\Kahpgcch.exe6⤵PID:4404
-
C:\Windows\SysWOW64\Kdfmcobk.exeC:\Windows\system32\Kdfmcobk.exe7⤵
- Executes dropped EXE
PID:752 -
C:\Windows\SysWOW64\Kkqepi32.exeC:\Windows\system32\Kkqepi32.exe8⤵PID:3172
-
C:\Windows\SysWOW64\Locgagli.exeC:\Windows\system32\Locgagli.exe9⤵PID:2260
-
C:\Windows\SysWOW64\Lqdcio32.exeC:\Windows\system32\Lqdcio32.exe10⤵
- Modifies registry class
PID:700 -
C:\Windows\SysWOW64\Lkjhfh32.exeC:\Windows\system32\Lkjhfh32.exe11⤵
- Executes dropped EXE
PID:4988 -
C:\Windows\SysWOW64\Lgqhki32.exeC:\Windows\system32\Lgqhki32.exe12⤵PID:5808
-
C:\Windows\SysWOW64\Mohplf32.exeC:\Windows\system32\Mohplf32.exe13⤵PID:1720
-
C:\Windows\SysWOW64\Mqimdomb.exeC:\Windows\system32\Mqimdomb.exe14⤵PID:4500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Jpoagb32.exeC:\Windows\system32\Jpoagb32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3256
-
C:\Windows\SysWOW64\Mbmbiqqp.exeC:\Windows\system32\Mbmbiqqp.exe1⤵PID:5940
-
C:\Windows\SysWOW64\Mhgkfkhl.exeC:\Windows\system32\Mhgkfkhl.exe2⤵
- Drops file in System32 directory
- Modifies registry class
PID:968 -
C:\Windows\SysWOW64\Mkegbfgp.exeC:\Windows\system32\Mkegbfgp.exe3⤵PID:5852
-
C:\Windows\SysWOW64\Mbpoop32.exeC:\Windows\system32\Mbpoop32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5384 -
C:\Windows\SysWOW64\Ngodlgka.exeC:\Windows\system32\Ngodlgka.exe5⤵PID:2492
-
C:\Windows\SysWOW64\Nnimia32.exeC:\Windows\system32\Nnimia32.exe6⤵PID:3616
-
C:\Windows\SysWOW64\Nqgiel32.exeC:\Windows\system32\Nqgiel32.exe7⤵PID:2500
-
C:\Windows\SysWOW64\Nnmfdpni.exeC:\Windows\system32\Nnmfdpni.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3936 -
C:\Windows\SysWOW64\Negoaj32.exeC:\Windows\system32\Negoaj32.exe9⤵PID:4296
-
C:\Windows\SysWOW64\Oaeegjeb.exeC:\Windows\system32\Oaeegjeb.exe10⤵PID:4704
-
C:\Windows\SysWOW64\Phfcdcfg.exeC:\Windows\system32\Phfcdcfg.exe11⤵PID:3504
-
C:\Windows\SysWOW64\Qpfokpoo.exeC:\Windows\system32\Qpfokpoo.exe12⤵PID:1760
-
C:\Windows\SysWOW64\Qbekgknb.exeC:\Windows\system32\Qbekgknb.exe13⤵
- Modifies registry class
PID:5980
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 79254c0308ecab14b2e4a11a528aabb9 k59FN3PJpUi9eW4McYw1Vw.0.1.0.0.01⤵PID:2328
-
C:\Windows\SysWOW64\Qhbcpb32.exeC:\Windows\system32\Qhbcpb32.exe1⤵PID:4388
-
C:\Windows\SysWOW64\Qbggmk32.exeC:\Windows\system32\Qbggmk32.exe2⤵PID:4608
-
C:\Windows\SysWOW64\Chphhn32.exeC:\Windows\system32\Chphhn32.exe3⤵
- Executes dropped EXE
PID:3216 -
C:\Windows\SysWOW64\Eckogc32.exeC:\Windows\system32\Eckogc32.exe4⤵PID:5056
-
C:\Windows\SysWOW64\Ejegdngb.exeC:\Windows\system32\Ejegdngb.exe5⤵PID:4024
-
-
-
-
-
C:\Windows\SysWOW64\Ficgkico.exeC:\Windows\system32\Ficgkico.exe1⤵
- Drops file in System32 directory
PID:2396 -
C:\Windows\SysWOW64\Fomohc32.exeC:\Windows\system32\Fomohc32.exe2⤵
- Executes dropped EXE
- Modifies registry class
PID:2104 -
C:\Windows\SysWOW64\Ffggdmbi.exeC:\Windows\system32\Ffggdmbi.exe3⤵PID:116
-
C:\Windows\SysWOW64\Fmapag32.exeC:\Windows\system32\Fmapag32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4248
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:2776
-
C:\Windows\SysWOW64\Ffjdjmpf.exeC:\Windows\system32\Ffjdjmpf.exe1⤵PID:2708
-
C:\Windows\SysWOW64\Gmclgghc.exeC:\Windows\system32\Gmclgghc.exe2⤵
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\Giofggia.exeC:\Windows\system32\Giofggia.exe3⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\Gcdkdpih.exeC:\Windows\system32\Gcdkdpih.exe4⤵
- Modifies registry class
PID:4164
-
-
-
-
C:\Windows\SysWOW64\Foplnb32.exeC:\Windows\system32\Foplnb32.exe1⤵PID:2156
-
C:\Windows\SysWOW64\Nkijbooo.exeC:\Windows\system32\Nkijbooo.exe1⤵PID:840
-
C:\Windows\SysWOW64\Ndbnkefp.exeC:\Windows\system32\Ndbnkefp.exe2⤵PID:5232
-
C:\Windows\SysWOW64\Nklfho32.exeC:\Windows\system32\Nklfho32.exe3⤵PID:5740
-
C:\Windows\SysWOW64\Nnjbdj32.exeC:\Windows\system32\Nnjbdj32.exe4⤵PID:5180
-
C:\Windows\SysWOW64\Nddkaddm.exeC:\Windows\system32\Nddkaddm.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5456 -
C:\Windows\SysWOW64\Ndfgfd32.exeC:\Windows\system32\Ndfgfd32.exe6⤵PID:1400
-
C:\Windows\SysWOW64\Qbddmejf.exeC:\Windows\system32\Qbddmejf.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5388 -
C:\Windows\SysWOW64\Ankdbf32.exeC:\Windows\system32\Ankdbf32.exe8⤵PID:2544
-
C:\Windows\SysWOW64\Alcofi32.exeC:\Windows\system32\Alcofi32.exe9⤵PID:928
-
C:\Windows\SysWOW64\Abngccbl.exeC:\Windows\system32\Abngccbl.exe10⤵PID:5528
-
C:\Windows\SysWOW64\Adockl32.exeC:\Windows\system32\Adockl32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5516 -
C:\Windows\SysWOW64\Ajikhfpg.exeC:\Windows\system32\Ajikhfpg.exe12⤵PID:3320
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Bniacddk.exeC:\Windows\system32\Bniacddk.exe1⤵PID:3656
-
C:\Windows\SysWOW64\Bagmpoco.exeC:\Windows\system32\Bagmpoco.exe2⤵
- Modifies registry class
PID:976 -
C:\Windows\SysWOW64\Bjpaheio.exeC:\Windows\system32\Bjpaheio.exe3⤵
- Modifies registry class
PID:5764 -
C:\Windows\SysWOW64\Bdmpljlj.exeC:\Windows\system32\Bdmpljlj.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5972 -
C:\Windows\SysWOW64\Clfdcgkj.exeC:\Windows\system32\Clfdcgkj.exe5⤵PID:5200
-
C:\Windows\SysWOW64\Coepob32.exeC:\Windows\system32\Coepob32.exe6⤵
- Modifies registry class
PID:5344 -
C:\Windows\SysWOW64\Ceoillaj.exeC:\Windows\system32\Ceoillaj.exe7⤵
- Modifies registry class
PID:5244
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Doeifpkk.exeC:\Windows\system32\Doeifpkk.exe1⤵PID:4384
-
C:\Windows\SysWOW64\Deoabj32.exeC:\Windows\system32\Deoabj32.exe2⤵PID:884
-
C:\Windows\SysWOW64\Dkljka32.exeC:\Windows\system32\Dkljka32.exe3⤵PID:6180
-
-
-
C:\Windows\SysWOW64\Ecjhmm32.exeC:\Windows\system32\Ecjhmm32.exe1⤵PID:6216
-
C:\Windows\SysWOW64\Edkddeag.exeC:\Windows\system32\Edkddeag.exe2⤵PID:6260
-
C:\Windows\SysWOW64\Ecmebm32.exeC:\Windows\system32\Ecmebm32.exe3⤵
- Drops file in System32 directory
PID:6320 -
C:\Windows\SysWOW64\Fojlhmic.exeC:\Windows\system32\Fojlhmic.exe4⤵PID:6360
-
-
-
-
C:\Windows\SysWOW64\Ffdddg32.exeC:\Windows\system32\Ffdddg32.exe1⤵PID:6400
-
C:\Windows\SysWOW64\Fhbpqb32.exeC:\Windows\system32\Fhbpqb32.exe2⤵PID:6448
-
C:\Windows\SysWOW64\Goabhl32.exeC:\Windows\system32\Goabhl32.exe3⤵PID:6488
-
-
-
C:\Windows\SysWOW64\Gdnjabab.exeC:\Windows\system32\Gdnjabab.exe1⤵PID:6544
-
C:\Windows\SysWOW64\Gkhbnm32.exeC:\Windows\system32\Gkhbnm32.exe2⤵PID:6588
-
C:\Windows\SysWOW64\Gdqgfbop.exeC:\Windows\system32\Gdqgfbop.exe3⤵PID:6656
-
C:\Windows\SysWOW64\Gkoinlbg.exeC:\Windows\system32\Gkoinlbg.exe4⤵PID:6692
-
-
-
-
C:\Windows\SysWOW64\Hbiakf32.exeC:\Windows\system32\Hbiakf32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6736 -
C:\Windows\SysWOW64\Hicihp32.exeC:\Windows\system32\Hicihp32.exe2⤵PID:6788
-
-
C:\Windows\SysWOW64\Hfiffd32.exeC:\Windows\system32\Hfiffd32.exe1⤵PID:6828
-
C:\Windows\SysWOW64\Hmcocn32.exeC:\Windows\system32\Hmcocn32.exe2⤵PID:6876
-
-
C:\Windows\SysWOW64\Hcpcehko.exeC:\Windows\system32\Hcpcehko.exe1⤵PID:6920
-
C:\Windows\SysWOW64\Hfnpacjb.exeC:\Windows\system32\Hfnpacjb.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6960
-
-
C:\Windows\SysWOW64\Hmhhnmao.exeC:\Windows\system32\Hmhhnmao.exe1⤵PID:7004
-
C:\Windows\SysWOW64\Icbpkg32.exeC:\Windows\system32\Icbpkg32.exe2⤵PID:7044
-
C:\Windows\SysWOW64\Iecmcpoj.exeC:\Windows\system32\Iecmcpoj.exe3⤵PID:7088
-
C:\Windows\SysWOW64\Iiaein32.exeC:\Windows\system32\Iiaein32.exe4⤵PID:7128
-
C:\Windows\SysWOW64\Ipkneh32.exeC:\Windows\system32\Ipkneh32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5372
-
-
-
-
-
C:\Windows\SysWOW64\Lgkakm32.exeC:\Windows\system32\Lgkakm32.exe1⤵PID:6900
-
C:\Windows\SysWOW64\Llgjcd32.exeC:\Windows\system32\Llgjcd32.exe2⤵PID:6972
-
C:\Windows\SysWOW64\Ldoadabi.exeC:\Windows\system32\Ldoadabi.exe3⤵PID:7052
-
C:\Windows\SysWOW64\Lepnli32.exeC:\Windows\system32\Lepnli32.exe4⤵PID:7080
-
C:\Windows\SysWOW64\Mpebjb32.exeC:\Windows\system32\Mpebjb32.exe5⤵
- Drops file in System32 directory
PID:460 -
C:\Windows\SysWOW64\Mgokflpj.exeC:\Windows\system32\Mgokflpj.exe6⤵PID:6204
-
C:\Windows\SysWOW64\Mllcocna.exeC:\Windows\system32\Mllcocna.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\Mcfkkmeo.exeC:\Windows\system32\Mcfkkmeo.exe8⤵PID:6352
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Mipchg32.exeC:\Windows\system32\Mipchg32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5796 -
C:\Windows\SysWOW64\Mpjleadh.exeC:\Windows\system32\Mpjleadh.exe2⤵PID:6520
-
C:\Windows\SysWOW64\Mgddal32.exeC:\Windows\system32\Mgddal32.exe3⤵PID:4784
-
-
-
C:\Windows\SysWOW64\Meiabh32.exeC:\Windows\system32\Meiabh32.exe1⤵PID:6732
-
C:\Windows\SysWOW64\Nigjifgc.exeC:\Windows\system32\Nigjifgc.exe2⤵PID:6764
-
C:\Windows\SysWOW64\Npabeq32.exeC:\Windows\system32\Npabeq32.exe3⤵PID:6940
-
C:\Windows\SysWOW64\Nconal32.exeC:\Windows\system32\Nconal32.exe4⤵PID:5216
-
-
-
-
C:\Windows\SysWOW64\Odkjgm32.exeC:\Windows\system32\Odkjgm32.exe1⤵
- Drops file in System32 directory
PID:6996 -
C:\Windows\SysWOW64\Oflfoepg.exeC:\Windows\system32\Oflfoepg.exe2⤵PID:7164
-
C:\Windows\SysWOW64\Olfolp32.exeC:\Windows\system32\Olfolp32.exe3⤵PID:3288
-
C:\Windows\SysWOW64\Ocbdni32.exeC:\Windows\system32\Ocbdni32.exe4⤵
- Drops file in System32 directory
PID:4524 -
C:\Windows\SysWOW64\Omjhgoco.exeC:\Windows\system32\Omjhgoco.exe5⤵PID:4304
-
-
-
-
-
C:\Windows\SysWOW64\Pgpmdh32.exeC:\Windows\system32\Pgpmdh32.exe1⤵PID:1272
-
C:\Windows\SysWOW64\Pnjeqbkb.exeC:\Windows\system32\Pnjeqbkb.exe2⤵PID:6852
-
-
C:\Windows\SysWOW64\Pcgmiiii.exeC:\Windows\system32\Pcgmiiii.exe1⤵PID:6992
-
C:\Windows\SysWOW64\Pjaefc32.exeC:\Windows\system32\Pjaefc32.exe2⤵PID:6812
-
C:\Windows\SysWOW64\Pgefogop.exeC:\Windows\system32\Pgefogop.exe3⤵PID:4144
-
-
-
C:\Windows\SysWOW64\Pdkcnklf.exeC:\Windows\system32\Pdkcnklf.exe1⤵
- Drops file in System32 directory
PID:5624 -
C:\Windows\SysWOW64\Pflpfcbe.exeC:\Windows\system32\Pflpfcbe.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6456 -
C:\Windows\SysWOW64\Pncggqbg.exeC:\Windows\system32\Pncggqbg.exe3⤵
- Modifies registry class
PID:2068 -
C:\Windows\SysWOW64\Qcppogqo.exeC:\Windows\system32\Qcppogqo.exe4⤵
- Drops file in System32 directory
PID:6688
-
-
-
-
C:\Windows\SysWOW64\Qjjhla32.exeC:\Windows\system32\Qjjhla32.exe1⤵
- Drops file in System32 directory
PID:6024 -
C:\Windows\SysWOW64\Qdpmij32.exeC:\Windows\system32\Qdpmij32.exe2⤵
- Modifies registry class
PID:5132 -
C:\Windows\SysWOW64\Qgnief32.exeC:\Windows\system32\Qgnief32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5352
-
-
-
C:\Windows\SysWOW64\Afcffb32.exeC:\Windows\system32\Afcffb32.exe1⤵PID:4368
-
C:\Windows\SysWOW64\Ammnclcj.exeC:\Windows\system32\Ammnclcj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:808 -
C:\Windows\SysWOW64\Cdoegcfl.exeC:\Windows\system32\Cdoegcfl.exe3⤵PID:5288
-
C:\Windows\SysWOW64\Emllbe32.exeC:\Windows\system32\Emllbe32.exe4⤵PID:5628
-
-
-
-
C:\Windows\SysWOW64\Eggmqk32.exeC:\Windows\system32\Eggmqk32.exe1⤵PID:3592
-
C:\Windows\SysWOW64\Eehnnb32.exeC:\Windows\system32\Eehnnb32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6032 -
C:\Windows\SysWOW64\Fneohd32.exeC:\Windows\system32\Fneohd32.exe3⤵PID:6052
-
C:\Windows\SysWOW64\Foekbg32.exeC:\Windows\system32\Foekbg32.exe4⤵
- Executes dropped EXE
- Modifies registry class
PID:3140 -
C:\Windows\SysWOW64\Feocoaai.exeC:\Windows\system32\Feocoaai.exe5⤵PID:6020
-
-
-
-
-
C:\Windows\SysWOW64\Fgppgi32.exeC:\Windows\system32\Fgppgi32.exe1⤵PID:4452
-
C:\Windows\SysWOW64\Foghhg32.exeC:\Windows\system32\Foghhg32.exe2⤵PID:5184
-
C:\Windows\SysWOW64\Feapdaof.exeC:\Windows\system32\Feapdaof.exe3⤵PID:3180
-
C:\Windows\SysWOW64\Goqkne32.exeC:\Windows\system32\Goqkne32.exe4⤵PID:5268
-
C:\Windows\SysWOW64\Ghpehjph.exeC:\Windows\system32\Ghpehjph.exe5⤵PID:5780
-
C:\Windows\SysWOW64\Holjjd32.exeC:\Windows\system32\Holjjd32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\Hbppaopp.exeC:\Windows\system32\Hbppaopp.exe7⤵PID:660
-
C:\Windows\SysWOW64\Ibffbnjh.exeC:\Windows\system32\Ibffbnjh.exe8⤵
- Drops file in System32 directory
PID:5280 -
C:\Windows\SysWOW64\Ibicgmhe.exeC:\Windows\system32\Ibicgmhe.exe9⤵PID:6068
-
C:\Windows\SysWOW64\Iickdgpb.exeC:\Windows\system32\Iickdgpb.exe10⤵PID:2696
-
C:\Windows\SysWOW64\Iomcqa32.exeC:\Windows\system32\Iomcqa32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6012 -
C:\Windows\SysWOW64\Ifihckmi.exeC:\Windows\system32\Ifihckmi.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4236 -
C:\Windows\SysWOW64\Jgonfcnb.exeC:\Windows\system32\Jgonfcnb.exe13⤵PID:1188
-
C:\Windows\SysWOW64\Jpffgp32.exeC:\Windows\system32\Jpffgp32.exe14⤵PID:5720
-
C:\Windows\SysWOW64\Jfpocjfa.exeC:\Windows\system32\Jfpocjfa.exe15⤵PID:2272
-
C:\Windows\SysWOW64\Jphcmp32.exeC:\Windows\system32\Jphcmp32.exe16⤵PID:5792
-
C:\Windows\SysWOW64\Jpkpbpko.exeC:\Windows\system32\Jpkpbpko.exe17⤵PID:3948
-
C:\Windows\SysWOW64\Kbneij32.exeC:\Windows\system32\Kbneij32.exe18⤵PID:5644
-
C:\Windows\SysWOW64\Kflnpild.exeC:\Windows\system32\Kflnpild.exe19⤵PID:5564
-
C:\Windows\SysWOW64\Khmjga32.exeC:\Windows\system32\Khmjga32.exe20⤵
- Drops file in System32 directory
PID:628 -
C:\Windows\SysWOW64\Lbekjipe.exeC:\Windows\system32\Lbekjipe.exe21⤵PID:5064
-
C:\Windows\SysWOW64\Lnlloj32.exeC:\Windows\system32\Lnlloj32.exe22⤵PID:6432
-
C:\Windows\SysWOW64\Liaqlcep.exeC:\Windows\system32\Liaqlcep.exe23⤵PID:3392
-
C:\Windows\SysWOW64\Lnnidjcg.exeC:\Windows\system32\Lnnidjcg.exe24⤵PID:936
-
C:\Windows\SysWOW64\Lifjgb32.exeC:\Windows\system32\Lifjgb32.exe25⤵PID:5440
-
C:\Windows\SysWOW64\Mlnijmhc.exeC:\Windows\system32\Mlnijmhc.exe26⤵PID:5052
-
C:\Windows\SysWOW64\Mbjnlfnn.exeC:\Windows\system32\Mbjnlfnn.exe27⤵PID:5700
-
C:\Windows\SysWOW64\Midfiq32.exeC:\Windows\system32\Midfiq32.exe28⤵PID:3220
-
C:\Windows\SysWOW64\Mlbbel32.exeC:\Windows\system32\Mlbbel32.exe29⤵PID:5592
-
C:\Windows\SysWOW64\Nfhfbedd.exeC:\Windows\system32\Nfhfbedd.exe30⤵
- Executes dropped EXE
PID:3976 -
C:\Windows\SysWOW64\Nppkkj32.exeC:\Windows\system32\Nppkkj32.exe31⤵
- Modifies registry class
PID:4824 -
C:\Windows\SysWOW64\Ngjcgdba.exeC:\Windows\system32\Ngjcgdba.exe32⤵
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\Niklip32.exeC:\Windows\system32\Niklip32.exe33⤵PID:2312
-
C:\Windows\SysWOW64\Olqofjhn.exeC:\Windows\system32\Olqofjhn.exe34⤵
- Executes dropped EXE
PID:5088 -
C:\Windows\SysWOW64\Oocdme32.exeC:\Windows\system32\Oocdme32.exe35⤵
- Executes dropped EXE
PID:4076 -
C:\Windows\SysWOW64\Olgdgibf.exeC:\Windows\system32\Olgdgibf.exe36⤵
- Modifies registry class
PID:2916 -
C:\Windows\SysWOW64\Pchcdbck.exeC:\Windows\system32\Pchcdbck.exe37⤵PID:5336
-
C:\Windows\SysWOW64\Phhhbi32.exeC:\Windows\system32\Phhhbi32.exe38⤵PID:2992
-
C:\Windows\SysWOW64\Poaqocgl.exeC:\Windows\system32\Poaqocgl.exe39⤵
- Drops file in System32 directory
PID:844 -
C:\Windows\SysWOW64\Pflikm32.exeC:\Windows\system32\Pflikm32.exe40⤵
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\Qgkeep32.exeC:\Windows\system32\Qgkeep32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4992 -
C:\Windows\SysWOW64\Amaqde32.exeC:\Windows\system32\Amaqde32.exe42⤵PID:3568
-
C:\Windows\SysWOW64\Aggean32.exeC:\Windows\system32\Aggean32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4916 -
C:\Windows\SysWOW64\Aihaifam.exeC:\Windows\system32\Aihaifam.exe44⤵PID:5016
-
C:\Windows\SysWOW64\Aflabj32.exeC:\Windows\system32\Aflabj32.exe45⤵PID:4576
-
C:\Windows\SysWOW64\Bodfkpfg.exeC:\Windows\system32\Bodfkpfg.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3192 -
C:\Windows\SysWOW64\Bcboan32.exeC:\Windows\system32\Bcboan32.exe47⤵
- Drops file in System32 directory
PID:5316 -
C:\Windows\SysWOW64\Bjlgnh32.exeC:\Windows\system32\Bjlgnh32.exe48⤵PID:2964
-
C:\Windows\SysWOW64\Boipfp32.exeC:\Windows\system32\Boipfp32.exe49⤵PID:2728
-
C:\Windows\SysWOW64\Bqhlpbjd.exeC:\Windows\system32\Bqhlpbjd.exe50⤵PID:2080
-
C:\Windows\SysWOW64\Bgbdml32.exeC:\Windows\system32\Bgbdml32.exe51⤵PID:4564
-
C:\Windows\SysWOW64\Cfhani32.exeC:\Windows\system32\Cfhani32.exe52⤵PID:4316
-
C:\Windows\SysWOW64\Cihjpd32.exeC:\Windows\system32\Cihjpd32.exe53⤵PID:1964
-
C:\Windows\SysWOW64\Cgijnk32.exeC:\Windows\system32\Cgijnk32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3548 -
C:\Windows\SysWOW64\Cpeobn32.exeC:\Windows\system32\Cpeobn32.exe55⤵PID:3296
-
C:\Windows\SysWOW64\Cmipkb32.exeC:\Windows\system32\Cmipkb32.exe56⤵PID:2280
-
C:\Windows\SysWOW64\Cfaddg32.exeC:\Windows\system32\Cfaddg32.exe57⤵
- Modifies registry class
PID:3616 -
C:\Windows\SysWOW64\Dmmifaci.exeC:\Windows\system32\Dmmifaci.exe58⤵PID:3032
-
C:\Windows\SysWOW64\Dcgackke.exeC:\Windows\system32\Dcgackke.exe59⤵PID:4804
-
C:\Windows\SysWOW64\Djaipe32.exeC:\Windows\system32\Djaipe32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1144 -
C:\Windows\SysWOW64\Dfhjefhf.exeC:\Windows\system32\Dfhjefhf.exe61⤵PID:3952
-
C:\Windows\SysWOW64\Dmbbaq32.exeC:\Windows\system32\Dmbbaq32.exe62⤵PID:1524
-
C:\Windows\SysWOW64\Dclknkfp.exeC:\Windows\system32\Dclknkfp.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5808 -
C:\Windows\SysWOW64\Dpckclld.exeC:\Windows\system32\Dpckclld.exe64⤵PID:4388
-
C:\Windows\SysWOW64\Epgenk32.exeC:\Windows\system32\Epgenk32.exe65⤵PID:6680
-
C:\Windows\SysWOW64\Ehomph32.exeC:\Windows\system32\Ehomph32.exe66⤵PID:1148
-
C:\Windows\SysWOW64\Emkeho32.exeC:\Windows\system32\Emkeho32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5464 -
C:\Windows\SysWOW64\Edemdine.exeC:\Windows\system32\Edemdine.exe68⤵
- Drops file in System32 directory
PID:2736 -
C:\Windows\SysWOW64\Ejofacfb.exeC:\Windows\system32\Ejofacfb.exe69⤵PID:3820
-
C:\Windows\SysWOW64\Edhjji32.exeC:\Windows\system32\Edhjji32.exe70⤵PID:3876
-
C:\Windows\SysWOW64\Edjgpi32.exeC:\Windows\system32\Edjgpi32.exe71⤵PID:7268
-
C:\Windows\SysWOW64\Fipbnn32.exeC:\Windows\system32\Fipbnn32.exe72⤵
- Modifies registry class
PID:7304 -
C:\Windows\SysWOW64\Fpjjkh32.exeC:\Windows\system32\Fpjjkh32.exe73⤵PID:7344
-
C:\Windows\SysWOW64\Fkpoha32.exeC:\Windows\system32\Fkpoha32.exe74⤵
- Modifies registry class
PID:7392 -
C:\Windows\SysWOW64\Fajgekol.exeC:\Windows\system32\Fajgekol.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:7436 -
C:\Windows\SysWOW64\Ggfombmd.exeC:\Windows\system32\Ggfombmd.exe76⤵
- Modifies registry class
PID:7476 -
C:\Windows\SysWOW64\Gpodfh32.exeC:\Windows\system32\Gpodfh32.exe77⤵
- Modifies registry class
PID:7512 -
C:\Windows\SysWOW64\Gighom32.exeC:\Windows\system32\Gighom32.exe78⤵PID:7564
-
C:\Windows\SysWOW64\Ggkiha32.exeC:\Windows\system32\Ggkiha32.exe79⤵
- Drops file in System32 directory
PID:7600 -
C:\Windows\SysWOW64\Gaqmej32.exeC:\Windows\system32\Gaqmej32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:7644 -
C:\Windows\SysWOW64\Gilajmfp.exeC:\Windows\system32\Gilajmfp.exe81⤵PID:7684
-
C:\Windows\SysWOW64\Gacjkjgb.exeC:\Windows\system32\Gacjkjgb.exe82⤵PID:7724
-
C:\Windows\SysWOW64\Ghmbhd32.exeC:\Windows\system32\Ghmbhd32.exe83⤵PID:7828
-
C:\Windows\SysWOW64\Hknkiokp.exeC:\Windows\system32\Hknkiokp.exe84⤵PID:7864
-
C:\Windows\SysWOW64\Hahcfi32.exeC:\Windows\system32\Hahcfi32.exe85⤵PID:7908
-
C:\Windows\SysWOW64\Hhbkccji.exeC:\Windows\system32\Hhbkccji.exe86⤵PID:7952
-
C:\Windows\SysWOW64\Hajpli32.exeC:\Windows\system32\Hajpli32.exe87⤵PID:7996
-
C:\Windows\SysWOW64\Hhdhhchf.exeC:\Windows\system32\Hhdhhchf.exe88⤵PID:8040
-
C:\Windows\SysWOW64\Hnaqqj32.exeC:\Windows\system32\Hnaqqj32.exe89⤵
- Drops file in System32 directory
PID:8084 -
C:\Windows\SysWOW64\Hhfenc32.exeC:\Windows\system32\Hhfenc32.exe90⤵PID:8120
-
C:\Windows\SysWOW64\Hncmfj32.exeC:\Windows\system32\Hncmfj32.exe91⤵PID:8168
-
C:\Windows\SysWOW64\Hglaookl.exeC:\Windows\system32\Hglaookl.exe92⤵PID:7180
-
C:\Windows\SysWOW64\Iaaflh32.exeC:\Windows\system32\Iaaflh32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7220 -
C:\Windows\SysWOW64\Ihnkobpl.exeC:\Windows\system32\Ihnkobpl.exe94⤵PID:952
-
C:\Windows\SysWOW64\Iklgkmop.exeC:\Windows\system32\Iklgkmop.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3148 -
C:\Windows\SysWOW64\Iddlccfp.exeC:\Windows\system32\Iddlccfp.exe96⤵PID:7312
-
C:\Windows\SysWOW64\Iqklhd32.exeC:\Windows\system32\Iqklhd32.exe97⤵PID:7376
-
C:\Windows\SysWOW64\Jhgneqha.exeC:\Windows\system32\Jhgneqha.exe98⤵PID:7432
-
C:\Windows\SysWOW64\Jjhjli32.exeC:\Windows\system32\Jjhjli32.exe99⤵PID:5056
-
C:\Windows\SysWOW64\Jdnnjane.exeC:\Windows\system32\Jdnnjane.exe100⤵PID:3748
-
C:\Windows\SysWOW64\Jqgldb32.exeC:\Windows\system32\Jqgldb32.exe101⤵PID:1544
-
C:\Windows\SysWOW64\Jnklnfpq.exeC:\Windows\system32\Jnklnfpq.exe102⤵PID:2268
-
C:\Windows\SysWOW64\Jgcafl32.exeC:\Windows\system32\Jgcafl32.exe103⤵PID:7640
-
C:\Windows\SysWOW64\Kbiede32.exeC:\Windows\system32\Kbiede32.exe104⤵PID:7712
-
C:\Windows\SysWOW64\Kibmqond.exeC:\Windows\system32\Kibmqond.exe105⤵
- Modifies registry class
PID:7764 -
C:\Windows\SysWOW64\Kjdjhgdb.exeC:\Windows\system32\Kjdjhgdb.exe106⤵
- Drops file in System32 directory
PID:7824 -
C:\Windows\SysWOW64\Kengqo32.exeC:\Windows\system32\Kengqo32.exe107⤵
- Modifies registry class
PID:7892 -
C:\Windows\SysWOW64\Kkhpmigp.exeC:\Windows\system32\Kkhpmigp.exe108⤵
- Modifies registry class
PID:1376 -
C:\Windows\SysWOW64\Lnkedd32.exeC:\Windows\system32\Lnkedd32.exe109⤵PID:7988
-
C:\Windows\SysWOW64\Leenanik.exeC:\Windows\system32\Leenanik.exe110⤵PID:8028
-
C:\Windows\SysWOW64\Llofnh32.exeC:\Windows\system32\Llofnh32.exe111⤵PID:8092
-
C:\Windows\SysWOW64\Lalnfooo.exeC:\Windows\system32\Lalnfooo.exe112⤵PID:8152
-
C:\Windows\SysWOW64\Ljdboe32.exeC:\Windows\system32\Ljdboe32.exe113⤵PID:7188
-
C:\Windows\SysWOW64\Lejgln32.exeC:\Windows\system32\Lejgln32.exe114⤵PID:7256
-
C:\Windows\SysWOW64\Mhmmchpd.exeC:\Windows\system32\Mhmmchpd.exe115⤵PID:7276
-
C:\Windows\SysWOW64\Mngepb32.exeC:\Windows\system32\Mngepb32.exe116⤵PID:7340
-
C:\Windows\SysWOW64\Naaqhlmg.exeC:\Windows\system32\Naaqhlmg.exe117⤵PID:7484
-
C:\Windows\SysWOW64\Nlknqd32.exeC:\Windows\system32\Nlknqd32.exe118⤵PID:7504
-
C:\Windows\SysWOW64\Ahenip32.exeC:\Windows\system32\Ahenip32.exe119⤵
- Modifies registry class
PID:7588 -
C:\Windows\SysWOW64\Afinbdon.exeC:\Windows\system32\Afinbdon.exe120⤵PID:7636
-
C:\Windows\SysWOW64\Alcfoo32.exeC:\Windows\system32\Alcfoo32.exe121⤵PID:7732
-
C:\Windows\SysWOW64\Bcmolimg.exeC:\Windows\system32\Bcmolimg.exe122⤵PID:7792
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-