Analysis
-
max time kernel
185s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 18:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.968167a207494bf4c200b867dfced860.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.968167a207494bf4c200b867dfced860.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
NEAS.968167a207494bf4c200b867dfced860.exe
-
Size
143KB
-
MD5
968167a207494bf4c200b867dfced860
-
SHA1
13f42ff0eb07fe9ac335879174fa6e44a2863241
-
SHA256
0a76fe3fcc3e387d2ca6e6b1128b9463903076f320c290ed466d763cbed8f397
-
SHA512
9d35916120eafe1d77fa294709bbc74708830ec36937cee0bf9d9c54a5918b4f7d6e5bdd6aaf3da7187618ba61b427920013b87f3cd473664eed9fcadc3860b9
-
SSDEEP
3072:+KkEvYZB0eqD6CmrrCa3N93bsGfhv0vt3y:tkUY5Cmr+a3vLsGZv0vti
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfgklkoc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egkddo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjafha32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mceccbpj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnkgakpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emenhcdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofckhj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckdkhq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dblgja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Addabl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfdgcmqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dblgja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lknocb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeodapcl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gccmaack.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpikao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cebllbcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lljked32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knbaoh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acmchj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfngcdhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Naaqhlmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mceccbpj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Holfhfij.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joahjcgb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnhegp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flfjdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghgljg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lglopjkg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkhdgfen.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnkioq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Madjbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkencn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbecgned.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igcgpalj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcgdhkem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qppaclio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adjjeieh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goadfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bedpjdoc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjbopcip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnbjkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hoaocf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Noppeaed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Imnjbhaa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Diamko32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpeaeedg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hljnkdnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebpjjk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fefjanml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahnclp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijqmacpl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bllbkg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chlffghn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knoonphp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lknocb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnhkklbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfqnbjfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ockdmmoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eipilmgh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Giinjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcmkehcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnhkklbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gemkobia.exe -
Executes dropped EXE 64 IoCs
pid Process 4260 Nfgklkoc.exe 4608 Noppeaed.exe 3680 Nqoloc32.exe 4188 Nimmifgo.exe 3120 Nfqnbjfi.exe 2500 Ofckhj32.exe 4436 Ocihgnam.exe 2452 Ockdmmoj.exe 4008 Oqoefand.exe 3600 Pcpnhl32.exe 4684 Pimfpc32.exe 3988 Pfagighf.exe 3652 Pafkgphl.exe 2932 Piapkbeg.exe 4432 Pcgdhkem.exe 4656 Pmphaaln.exe 3352 Pblajhje.exe 4520 Qppaclio.exe 2188 Qpbnhl32.exe 4708 Qjhbfd32.exe 992 Ajjokd32.exe 2548 Apggckbf.exe 1192 Afcmfe32.exe 2024 Ajaelc32.exe 2128 Adjjeieh.exe 1020 Bpqjjjjl.exe 208 Bmdkcnie.exe 2628 Bdocph32.exe 4216 Biklho32.exe 232 Bfolacnc.exe 1060 Bdcmkgmm.exe 2916 Bagmdllg.exe 3068 Cajjjk32.exe 5044 Cgfbbb32.exe 5072 Cpogkhnl.exe 3312 Ckdkhq32.exe 1684 Daollh32.exe 652 Egkddo32.exe 3040 Kajfdk32.exe 3420 Khdoqefq.exe 1648 Kongmo32.exe 2288 Kehojiej.exe 520 Klbgfc32.exe 4988 Kblpcndd.exe 2036 Khihld32.exe 4680 Kbnlim32.exe 4852 Iebfmfdg.exe 2828 Ijonfmbn.exe 2376 Imnjbhaa.exe 4192 Jgcooaah.exe 2684 Jjakkmpk.exe 4252 Jegohe32.exe 3140 Jnocakfb.exe 2644 Cfljnejl.exe 1244 Dfngcdhi.exe 3588 Dimcppgm.exe 1860 Dbehienn.exe 2084 Dlnlak32.exe 32 Dfcqod32.exe 4276 Diamko32.exe 3044 Dpkehi32.exe 3908 Dehnpp32.exe 2176 Efhjjcpo.exe 2568 Ehifak32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ijqmacpl.exe Iphihnjk.exe File opened for modification C:\Windows\SysWOW64\Bbgehd32.exe Bhnqoo32.exe File opened for modification C:\Windows\SysWOW64\Pkngco32.exe Pcccol32.exe File created C:\Windows\SysWOW64\Qhjiao32.dll Bjagcndq.exe File opened for modification C:\Windows\SysWOW64\Jjjpgb32.exe Jpalomaq.exe File created C:\Windows\SysWOW64\Kcndlf32.exe Kjepcqnd.exe File created C:\Windows\SysWOW64\Imbhiial.exe Ihmnldib.exe File created C:\Windows\SysWOW64\Kljhfc32.dll Hfpenj32.exe File created C:\Windows\SysWOW64\Ohfhqd32.exe Obgccn32.exe File created C:\Windows\SysWOW64\Oleiga32.dll Ckkilhjm.exe File opened for modification C:\Windows\SysWOW64\Epdaneff.exe Emfebjgb.exe File opened for modification C:\Windows\SysWOW64\Ipmbcm32.exe Ijcjgcni.exe File created C:\Windows\SysWOW64\Hidgko32.exe Hbjonepq.exe File opened for modification C:\Windows\SysWOW64\Gebimmco.exe Gccmaack.exe File opened for modification C:\Windows\SysWOW64\Fhllni32.exe Fcodfa32.exe File opened for modification C:\Windows\SysWOW64\Oihapg32.exe Oocmcn32.exe File created C:\Windows\SysWOW64\Clgbfe32.exe Chlffghn.exe File created C:\Windows\SysWOW64\Fefjanml.exe Epiaig32.exe File created C:\Windows\SysWOW64\Hlhmjl32.dll Pafkgphl.exe File created C:\Windows\SysWOW64\Olijkhjb.dll Ehifak32.exe File opened for modification C:\Windows\SysWOW64\Ghgljg32.exe Ghqeihbb.exe File opened for modification C:\Windows\SysWOW64\Ahnclp32.exe Aoenbkll.exe File created C:\Windows\SysWOW64\Efhdlael.dll Deiblamk.exe File opened for modification C:\Windows\SysWOW64\Kjafha32.exe Kgbjlf32.exe File created C:\Windows\SysWOW64\Pafkgphl.exe Pfagighf.exe File created C:\Windows\SysWOW64\Ipenifka.dll Ihmnldib.exe File created C:\Windows\SysWOW64\Nbdijpjh.exe Nkjqme32.exe File created C:\Windows\SysWOW64\Aohpek32.exe Ajkgmd32.exe File created C:\Windows\SysWOW64\Clnhlfmc.dll Knfeoobh.exe File created C:\Windows\SysWOW64\Hjbajokj.dll Aogije32.exe File opened for modification C:\Windows\SysWOW64\Oqoefand.exe Ockdmmoj.exe File created C:\Windows\SysWOW64\Jidoefag.dll Iiigqdfd.exe File created C:\Windows\SysWOW64\Aogije32.exe Ahmqnkbp.exe File created C:\Windows\SysWOW64\Biklho32.exe Bdocph32.exe File created C:\Windows\SysWOW64\Bqboal32.dll Ccfmef32.exe File created C:\Windows\SysWOW64\Lknocb32.exe Lmmoekem.exe File created C:\Windows\SysWOW64\Nimmifgo.exe Nqoloc32.exe File opened for modification C:\Windows\SysWOW64\Ebeapc32.exe Epgdch32.exe File created C:\Windows\SysWOW64\Efhlan32.exe Eplgod32.exe File created C:\Windows\SysWOW64\Cnokhonp.exe Ckaolcol.exe File opened for modification C:\Windows\SysWOW64\Nimmifgo.exe Nqoloc32.exe File created C:\Windows\SysWOW64\Cfljnejl.exe Jnocakfb.exe File created C:\Windows\SysWOW64\Kalmid32.dll Fcaqka32.exe File created C:\Windows\SysWOW64\Giinjg32.exe Gbmigm32.exe File opened for modification C:\Windows\SysWOW64\Hoaocf32.exe Hidgko32.exe File created C:\Windows\SysWOW64\Opjjgdim.dll Kcfgaq32.exe File opened for modification C:\Windows\SysWOW64\Jjakkmpk.exe Jgcooaah.exe File opened for modification C:\Windows\SysWOW64\Emknmi32.exe Epdaneff.exe File created C:\Windows\SysWOW64\Cojpmaqp.dll Bllbkg32.exe File created C:\Windows\SysWOW64\Imbpam32.exe Hekgppma.exe File created C:\Windows\SysWOW64\Idbepmok.dll Pbndgl32.exe File created C:\Windows\SysWOW64\Ipflcnln.exe Ikickgnf.exe File created C:\Windows\SysWOW64\Ffgegh32.exe Emoanbll.exe File opened for modification C:\Windows\SysWOW64\Hbjonepq.exe Holfhfij.exe File created C:\Windows\SysWOW64\Obnlpnbm.exe Oooodcci.exe File created C:\Windows\SysWOW64\Jpgcpo32.dll Jgcooaah.exe File opened for modification C:\Windows\SysWOW64\Bjicnbba.exe Bcmolimg.exe File opened for modification C:\Windows\SysWOW64\Kmaojl32.exe Knoonphp.exe File created C:\Windows\SysWOW64\Kkbohc32.exe Kdigkjpl.exe File opened for modification C:\Windows\SysWOW64\Bllbkg32.exe Bafnmnjn.exe File created C:\Windows\SysWOW64\Hoaocf32.exe Hidgko32.exe File opened for modification C:\Windows\SysWOW64\Abngngjd.exe Nfiaajob.exe File created C:\Windows\SysWOW64\Fknofqcc.dll Pfagighf.exe File created C:\Windows\SysWOW64\Nffaen32.dll Pimfpc32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iphihnjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmpkkjcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjokpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjpido32.dll" Gfgnnedj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpgcpo32.dll" Jgcooaah.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahnclp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khdoqefq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kniggnim.dll" Jjgcbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdhbpkgj.dll" Lgqfmcge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efdenq32.dll" Hidgko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Noppeaed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcgdhkem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Klbgfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfhlbmpm.dll" Hjieii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mnhkklbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmphaaln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahkdgl32.dll" Ckdkhq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aachaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aafefq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdpanj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjnklh32.dll" Gldgflba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhbghb32.dll" Ehkcgkdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjlijp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bedpjdoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcjchd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlipal32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iecmabmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} NEAS.968167a207494bf4c200b867dfced860.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihmnldib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjabbqjp.dll" Bedpjdoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gepkahmm.dll" Emknmi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kglmbd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkjehbaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bojogb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fieacc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdfcgdbc.dll" Kbnlim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Appaangd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcgdhkem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mnkgakpp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Clqncl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldpmlh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlnlak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcmeff32.dll" Epgdch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjepcqnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aamkgpbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebpjjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofckhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbhmepaa.dll" Hodqlq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aafefq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjodgmlo.dll" Cfdgcmqd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oocmcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Faklheqo.dll" Mkhajq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daollh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgcijglg.dll" Jegohe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efhjjcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmfnig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bekdmnio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eijgnnhg.dll" Hfaaddlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlhmjl32.dll" Pafkgphl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmdkcnie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbipejob.dll" Giinjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejhnmcpc.dll" Kjblcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deiblamk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Doiabgqc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 976 wrote to memory of 4260 976 NEAS.968167a207494bf4c200b867dfced860.exe 86 PID 976 wrote to memory of 4260 976 NEAS.968167a207494bf4c200b867dfced860.exe 86 PID 976 wrote to memory of 4260 976 NEAS.968167a207494bf4c200b867dfced860.exe 86 PID 4260 wrote to memory of 4608 4260 Nfgklkoc.exe 87 PID 4260 wrote to memory of 4608 4260 Nfgklkoc.exe 87 PID 4260 wrote to memory of 4608 4260 Nfgklkoc.exe 87 PID 4608 wrote to memory of 3680 4608 Noppeaed.exe 88 PID 4608 wrote to memory of 3680 4608 Noppeaed.exe 88 PID 4608 wrote to memory of 3680 4608 Noppeaed.exe 88 PID 3680 wrote to memory of 4188 3680 Nqoloc32.exe 89 PID 3680 wrote to memory of 4188 3680 Nqoloc32.exe 89 PID 3680 wrote to memory of 4188 3680 Nqoloc32.exe 89 PID 4188 wrote to memory of 3120 4188 Nimmifgo.exe 90 PID 4188 wrote to memory of 3120 4188 Nimmifgo.exe 90 PID 4188 wrote to memory of 3120 4188 Nimmifgo.exe 90 PID 3120 wrote to memory of 2500 3120 Nfqnbjfi.exe 91 PID 3120 wrote to memory of 2500 3120 Nfqnbjfi.exe 91 PID 3120 wrote to memory of 2500 3120 Nfqnbjfi.exe 91 PID 2500 wrote to memory of 4436 2500 Ofckhj32.exe 92 PID 2500 wrote to memory of 4436 2500 Ofckhj32.exe 92 PID 2500 wrote to memory of 4436 2500 Ofckhj32.exe 92 PID 4436 wrote to memory of 2452 4436 Ocihgnam.exe 93 PID 4436 wrote to memory of 2452 4436 Ocihgnam.exe 93 PID 4436 wrote to memory of 2452 4436 Ocihgnam.exe 93 PID 2452 wrote to memory of 4008 2452 Ockdmmoj.exe 95 PID 2452 wrote to memory of 4008 2452 Ockdmmoj.exe 95 PID 2452 wrote to memory of 4008 2452 Ockdmmoj.exe 95 PID 4008 wrote to memory of 3600 4008 Oqoefand.exe 96 PID 4008 wrote to memory of 3600 4008 Oqoefand.exe 96 PID 4008 wrote to memory of 3600 4008 Oqoefand.exe 96 PID 3600 wrote to memory of 4684 3600 Pcpnhl32.exe 97 PID 3600 wrote to memory of 4684 3600 Pcpnhl32.exe 97 PID 3600 wrote to memory of 4684 3600 Pcpnhl32.exe 97 PID 4684 wrote to memory of 3988 4684 Pimfpc32.exe 98 PID 4684 wrote to memory of 3988 4684 Pimfpc32.exe 98 PID 4684 wrote to memory of 3988 4684 Pimfpc32.exe 98 PID 3988 wrote to memory of 3652 3988 Pfagighf.exe 99 PID 3988 wrote to memory of 3652 3988 Pfagighf.exe 99 PID 3988 wrote to memory of 3652 3988 Pfagighf.exe 99 PID 3652 wrote to memory of 2932 3652 Pafkgphl.exe 100 PID 3652 wrote to memory of 2932 3652 Pafkgphl.exe 100 PID 3652 wrote to memory of 2932 3652 Pafkgphl.exe 100 PID 2932 wrote to memory of 4432 2932 Piapkbeg.exe 101 PID 2932 wrote to memory of 4432 2932 Piapkbeg.exe 101 PID 2932 wrote to memory of 4432 2932 Piapkbeg.exe 101 PID 4432 wrote to memory of 4656 4432 Pcgdhkem.exe 102 PID 4432 wrote to memory of 4656 4432 Pcgdhkem.exe 102 PID 4432 wrote to memory of 4656 4432 Pcgdhkem.exe 102 PID 4656 wrote to memory of 3352 4656 Pmphaaln.exe 103 PID 4656 wrote to memory of 3352 4656 Pmphaaln.exe 103 PID 4656 wrote to memory of 3352 4656 Pmphaaln.exe 103 PID 3352 wrote to memory of 4520 3352 Pblajhje.exe 104 PID 3352 wrote to memory of 4520 3352 Pblajhje.exe 104 PID 3352 wrote to memory of 4520 3352 Pblajhje.exe 104 PID 4520 wrote to memory of 2188 4520 Qppaclio.exe 105 PID 4520 wrote to memory of 2188 4520 Qppaclio.exe 105 PID 4520 wrote to memory of 2188 4520 Qppaclio.exe 105 PID 2188 wrote to memory of 4708 2188 Qpbnhl32.exe 106 PID 2188 wrote to memory of 4708 2188 Qpbnhl32.exe 106 PID 2188 wrote to memory of 4708 2188 Qpbnhl32.exe 106 PID 4708 wrote to memory of 992 4708 Qjhbfd32.exe 107 PID 4708 wrote to memory of 992 4708 Qjhbfd32.exe 107 PID 4708 wrote to memory of 992 4708 Qjhbfd32.exe 107 PID 992 wrote to memory of 2548 992 Ajjokd32.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.968167a207494bf4c200b867dfced860.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.968167a207494bf4c200b867dfced860.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\Nfgklkoc.exeC:\Windows\system32\Nfgklkoc.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\Noppeaed.exeC:\Windows\system32\Noppeaed.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\Nqoloc32.exeC:\Windows\system32\Nqoloc32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\Nimmifgo.exeC:\Windows\system32\Nimmifgo.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\Nfqnbjfi.exeC:\Windows\system32\Nfqnbjfi.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\Ofckhj32.exeC:\Windows\system32\Ofckhj32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\Ocihgnam.exeC:\Windows\system32\Ocihgnam.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\Ockdmmoj.exeC:\Windows\system32\Ockdmmoj.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\Oqoefand.exeC:\Windows\system32\Oqoefand.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\Pcpnhl32.exeC:\Windows\system32\Pcpnhl32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\Pimfpc32.exeC:\Windows\system32\Pimfpc32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\Pfagighf.exeC:\Windows\system32\Pfagighf.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\Pafkgphl.exeC:\Windows\system32\Pafkgphl.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\Piapkbeg.exeC:\Windows\system32\Piapkbeg.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Pcgdhkem.exeC:\Windows\system32\Pcgdhkem.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\Pmphaaln.exeC:\Windows\system32\Pmphaaln.exe17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\Pblajhje.exeC:\Windows\system32\Pblajhje.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\Qppaclio.exeC:\Windows\system32\Qppaclio.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\Qpbnhl32.exeC:\Windows\system32\Qpbnhl32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Qjhbfd32.exeC:\Windows\system32\Qjhbfd32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\Ajjokd32.exeC:\Windows\system32\Ajjokd32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\Apggckbf.exeC:\Windows\system32\Apggckbf.exe23⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Afcmfe32.exeC:\Windows\system32\Afcmfe32.exe24⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\SysWOW64\Ajaelc32.exeC:\Windows\system32\Ajaelc32.exe25⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\Adjjeieh.exeC:\Windows\system32\Adjjeieh.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\Bpqjjjjl.exeC:\Windows\system32\Bpqjjjjl.exe27⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\Bmdkcnie.exeC:\Windows\system32\Bmdkcnie.exe28⤵
- Executes dropped EXE
- Modifies registry class
PID:208 -
C:\Windows\SysWOW64\Bdocph32.exeC:\Windows\system32\Bdocph32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2628 -
C:\Windows\SysWOW64\Biklho32.exeC:\Windows\system32\Biklho32.exe30⤵
- Executes dropped EXE
PID:4216 -
C:\Windows\SysWOW64\Bfolacnc.exeC:\Windows\system32\Bfolacnc.exe31⤵
- Executes dropped EXE
PID:232 -
C:\Windows\SysWOW64\Bdcmkgmm.exeC:\Windows\system32\Bdcmkgmm.exe32⤵
- Executes dropped EXE
PID:1060 -
C:\Windows\SysWOW64\Bagmdllg.exeC:\Windows\system32\Bagmdllg.exe33⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\Cajjjk32.exeC:\Windows\system32\Cajjjk32.exe34⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\Cgfbbb32.exeC:\Windows\system32\Cgfbbb32.exe35⤵
- Executes dropped EXE
PID:5044 -
C:\Windows\SysWOW64\Cpogkhnl.exeC:\Windows\system32\Cpogkhnl.exe36⤵
- Executes dropped EXE
PID:5072 -
C:\Windows\SysWOW64\Ckdkhq32.exeC:\Windows\system32\Ckdkhq32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3312 -
C:\Windows\SysWOW64\Daollh32.exeC:\Windows\system32\Daollh32.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\Egkddo32.exeC:\Windows\system32\Egkddo32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:652 -
C:\Windows\SysWOW64\Kajfdk32.exeC:\Windows\system32\Kajfdk32.exe40⤵
- Executes dropped EXE
PID:3040 -
C:\Windows\SysWOW64\Khdoqefq.exeC:\Windows\system32\Khdoqefq.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:3420 -
C:\Windows\SysWOW64\Kongmo32.exeC:\Windows\system32\Kongmo32.exe42⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\Kehojiej.exeC:\Windows\system32\Kehojiej.exe43⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\Klbgfc32.exeC:\Windows\system32\Klbgfc32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:520 -
C:\Windows\SysWOW64\Kblpcndd.exeC:\Windows\system32\Kblpcndd.exe45⤵
- Executes dropped EXE
PID:4988 -
C:\Windows\SysWOW64\Khihld32.exeC:\Windows\system32\Khihld32.exe46⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\Kbnlim32.exeC:\Windows\system32\Kbnlim32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:4680 -
C:\Windows\SysWOW64\Iebfmfdg.exeC:\Windows\system32\Iebfmfdg.exe48⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\Ijonfmbn.exeC:\Windows\system32\Ijonfmbn.exe49⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Imnjbhaa.exeC:\Windows\system32\Imnjbhaa.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2376 -
C:\Windows\SysWOW64\Jgcooaah.exeC:\Windows\system32\Jgcooaah.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4192 -
C:\Windows\SysWOW64\Jjakkmpk.exeC:\Windows\system32\Jjakkmpk.exe52⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\Jegohe32.exeC:\Windows\system32\Jegohe32.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:4252 -
C:\Windows\SysWOW64\Jnocakfb.exeC:\Windows\system32\Jnocakfb.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3140 -
C:\Windows\SysWOW64\Cfljnejl.exeC:\Windows\system32\Cfljnejl.exe55⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\Dfngcdhi.exeC:\Windows\system32\Dfngcdhi.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1244 -
C:\Windows\SysWOW64\Dimcppgm.exeC:\Windows\system32\Dimcppgm.exe57⤵
- Executes dropped EXE
PID:3588 -
C:\Windows\SysWOW64\Dbehienn.exeC:\Windows\system32\Dbehienn.exe58⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\SysWOW64\Dlnlak32.exeC:\Windows\system32\Dlnlak32.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:2084 -
C:\Windows\SysWOW64\Dfcqod32.exeC:\Windows\system32\Dfcqod32.exe60⤵
- Executes dropped EXE
PID:32 -
C:\Windows\SysWOW64\Diamko32.exeC:\Windows\system32\Diamko32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4276 -
C:\Windows\SysWOW64\Dpkehi32.exeC:\Windows\system32\Dpkehi32.exe62⤵
- Executes dropped EXE
PID:3044 -
C:\Windows\SysWOW64\Dehnpp32.exeC:\Windows\system32\Dehnpp32.exe63⤵
- Executes dropped EXE
PID:3908 -
C:\Windows\SysWOW64\Efhjjcpo.exeC:\Windows\system32\Efhjjcpo.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:2176 -
C:\Windows\SysWOW64\Ehifak32.exeC:\Windows\system32\Ehifak32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2568 -
C:\Windows\SysWOW64\Ehkcgkdj.exeC:\Windows\system32\Ehkcgkdj.exe66⤵
- Modifies registry class
PID:3092 -
C:\Windows\SysWOW64\Eeaqfo32.exeC:\Windows\system32\Eeaqfo32.exe67⤵PID:3892
-
C:\Windows\SysWOW64\Epgdch32.exeC:\Windows\system32\Epgdch32.exe68⤵
- Drops file in System32 directory
- Modifies registry class
PID:3412 -
C:\Windows\SysWOW64\Ebeapc32.exeC:\Windows\system32\Ebeapc32.exe69⤵PID:3812
-
C:\Windows\SysWOW64\Eipilmgh.exeC:\Windows\system32\Eipilmgh.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3132 -
C:\Windows\SysWOW64\Epiaig32.exeC:\Windows\system32\Epiaig32.exe71⤵
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\Fefjanml.exeC:\Windows\system32\Fefjanml.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1468 -
C:\Windows\SysWOW64\Flpbnh32.exeC:\Windows\system32\Flpbnh32.exe73⤵PID:4560
-
C:\Windows\SysWOW64\Fbjjkble.exeC:\Windows\system32\Fbjjkble.exe74⤵PID:3376
-
C:\Windows\SysWOW64\Feifgnki.exeC:\Windows\system32\Feifgnki.exe75⤵PID:1560
-
C:\Windows\SysWOW64\Fcodfa32.exeC:\Windows\system32\Fcodfa32.exe76⤵
- Drops file in System32 directory
PID:1344 -
C:\Windows\SysWOW64\Fhllni32.exeC:\Windows\system32\Fhllni32.exe77⤵PID:5128
-
C:\Windows\SysWOW64\Fcaqka32.exeC:\Windows\system32\Fcaqka32.exe78⤵
- Drops file in System32 directory
PID:5168 -
C:\Windows\SysWOW64\Fepmgm32.exeC:\Windows\system32\Fepmgm32.exe79⤵PID:5220
-
C:\Windows\SysWOW64\Fikihlmj.exeC:\Windows\system32\Fikihlmj.exe80⤵PID:5272
-
C:\Windows\SysWOW64\Fpeaeedg.exeC:\Windows\system32\Fpeaeedg.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5320 -
C:\Windows\SysWOW64\Gccmaack.exeC:\Windows\system32\Gccmaack.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5364 -
C:\Windows\SysWOW64\Gebimmco.exeC:\Windows\system32\Gebimmco.exe83⤵PID:5408
-
C:\Windows\SysWOW64\Ghqeihbb.exeC:\Windows\system32\Ghqeihbb.exe84⤵
- Drops file in System32 directory
PID:5460 -
C:\Windows\SysWOW64\Ghgljg32.exeC:\Windows\system32\Ghgljg32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5504 -
C:\Windows\SysWOW64\Goadfa32.exeC:\Windows\system32\Goadfa32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5552 -
C:\Windows\SysWOW64\Ggilgn32.exeC:\Windows\system32\Ggilgn32.exe87⤵PID:5596
-
C:\Windows\SysWOW64\Ghjhofjg.exeC:\Windows\system32\Ghjhofjg.exe88⤵PID:5652
-
C:\Windows\SysWOW64\Hodqlq32.exeC:\Windows\system32\Hodqlq32.exe89⤵
- Modifies registry class
PID:5696 -
C:\Windows\SysWOW64\Hjieii32.exeC:\Windows\system32\Hjieii32.exe90⤵
- Modifies registry class
PID:5736 -
C:\Windows\SysWOW64\Hlhaee32.exeC:\Windows\system32\Hlhaee32.exe91⤵PID:5784
-
C:\Windows\SysWOW64\Hfpenj32.exeC:\Windows\system32\Hfpenj32.exe92⤵
- Drops file in System32 directory
PID:5828 -
C:\Windows\SysWOW64\Hljnkdnk.exeC:\Windows\system32\Hljnkdnk.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5872 -
C:\Windows\SysWOW64\Ihjafd32.exeC:\Windows\system32\Ihjafd32.exe94⤵PID:5916
-
C:\Windows\SysWOW64\Iodjcnca.exeC:\Windows\system32\Iodjcnca.exe95⤵PID:5956
-
C:\Windows\SysWOW64\Ihmnldib.exeC:\Windows\system32\Ihmnldib.exe96⤵
- Drops file in System32 directory
- Modifies registry class
PID:6076 -
C:\Windows\SysWOW64\Imbhiial.exeC:\Windows\system32\Imbhiial.exe97⤵PID:6112
-
C:\Windows\SysWOW64\Jdajabdc.exeC:\Windows\system32\Jdajabdc.exe98⤵PID:3372
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Lnanadfi.exeC:\Windows\system32\Lnanadfi.exe1⤵PID:5592
-
C:\Windows\SysWOW64\Loqjlg32.exeC:\Windows\system32\Loqjlg32.exe2⤵PID:5636
-
C:\Windows\SysWOW64\Laofhbmp.exeC:\Windows\system32\Laofhbmp.exe3⤵PID:5724
-
C:\Windows\SysWOW64\Lglopjkg.exeC:\Windows\system32\Lglopjkg.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5808 -
C:\Windows\SysWOW64\Locgagli.exeC:\Windows\system32\Locgagli.exe5⤵PID:4444
-
C:\Windows\SysWOW64\Lqdcio32.exeC:\Windows\system32\Lqdcio32.exe6⤵PID:5908
-
C:\Windows\SysWOW64\Lgnleiid.exeC:\Windows\system32\Lgnleiid.exe7⤵PID:2708
-
C:\Windows\SysWOW64\Ladpcb32.exeC:\Windows\system32\Ladpcb32.exe8⤵PID:464
-
C:\Windows\SysWOW64\Lhnhplpg.exeC:\Windows\system32\Lhnhplpg.exe9⤵PID:6008
-
C:\Windows\SysWOW64\Mbfmha32.exeC:\Windows\system32\Mbfmha32.exe10⤵PID:3384
-
C:\Windows\SysWOW64\Mddidm32.exeC:\Windows\system32\Mddidm32.exe11⤵PID:3624
-
C:\Windows\SysWOW64\Mkoaagmh.exeC:\Windows\system32\Mkoaagmh.exe12⤵PID:4832
-
C:\Windows\SysWOW64\Mkangg32.exeC:\Windows\system32\Mkangg32.exe13⤵PID:2956
-
C:\Windows\SysWOW64\Mhgkfkhl.exeC:\Windows\system32\Mhgkfkhl.exe14⤵PID:3700
-
C:\Windows\SysWOW64\Mhihkjfj.exeC:\Windows\system32\Mhihkjfj.exe15⤵PID:3716
-
C:\Windows\SysWOW64\Nkhdgfen.exeC:\Windows\system32\Nkhdgfen.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2224 -
C:\Windows\SysWOW64\Nkjqme32.exeC:\Windows\system32\Nkjqme32.exe17⤵
- Drops file in System32 directory
PID:2476 -
C:\Windows\SysWOW64\Nbdijpjh.exeC:\Windows\system32\Nbdijpjh.exe18⤵PID:5380
-
C:\Windows\SysWOW64\Nkmmbe32.exeC:\Windows\system32\Nkmmbe32.exe19⤵PID:5844
-
C:\Windows\SysWOW64\Nnkioq32.exeC:\Windows\system32\Nnkioq32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3664 -
C:\Windows\SysWOW64\Nombnc32.exeC:\Windows\system32\Nombnc32.exe21⤵PID:6104
-
C:\Windows\SysWOW64\Nejkfj32.exeC:\Windows\system32\Nejkfj32.exe22⤵PID:376
-
C:\Windows\SysWOW64\Oooodcci.exeC:\Windows\system32\Oooodcci.exe23⤵
- Drops file in System32 directory
PID:4296 -
C:\Windows\SysWOW64\Obnlpnbm.exeC:\Windows\system32\Obnlpnbm.exe24⤵PID:544
-
C:\Windows\SysWOW64\Obgofmjb.exeC:\Windows\system32\Obgofmjb.exe25⤵PID:4520
-
C:\Windows\SysWOW64\Pehghhgc.exeC:\Windows\system32\Pehghhgc.exe26⤵PID:4512
-
C:\Windows\SysWOW64\Pejdmh32.exeC:\Windows\system32\Pejdmh32.exe27⤵PID:4044
-
C:\Windows\SysWOW64\Pbndgl32.exeC:\Windows\system32\Pbndgl32.exe28⤵
- Drops file in System32 directory
PID:1156 -
C:\Windows\SysWOW64\Ppbepp32.exeC:\Windows\system32\Ppbepp32.exe29⤵PID:5272
-
C:\Windows\SysWOW64\Pbpall32.exeC:\Windows\system32\Pbpall32.exe30⤵PID:4100
-
C:\Windows\SysWOW64\Pijiif32.exeC:\Windows\system32\Pijiif32.exe31⤵PID:5184
-
C:\Windows\SysWOW64\Plifea32.exeC:\Windows\system32\Plifea32.exe32⤵PID:5160
-
C:\Windows\SysWOW64\Pbbnbkpe.exeC:\Windows\system32\Pbbnbkpe.exe33⤵PID:5284
-
C:\Windows\SysWOW64\Qpikao32.exeC:\Windows\system32\Qpikao32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5392 -
C:\Windows\SysWOW64\Aejmdegn.exeC:\Windows\system32\Aejmdegn.exe35⤵PID:6132
-
C:\Windows\SysWOW64\Appaangd.exeC:\Windows\system32\Appaangd.exe36⤵
- Modifies registry class
PID:5916 -
C:\Windows\SysWOW64\Ahkffqdo.exeC:\Windows\system32\Ahkffqdo.exe37⤵PID:5568
-
C:\Windows\SysWOW64\Aoenbkll.exeC:\Windows\system32\Aoenbkll.exe38⤵
- Drops file in System32 directory
PID:3340 -
C:\Windows\SysWOW64\Ahnclp32.exeC:\Windows\system32\Ahnclp32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3772 -
C:\Windows\SysWOW64\Beaced32.exeC:\Windows\system32\Beaced32.exe40⤵PID:1648
-
C:\Windows\SysWOW64\Blkkaohc.exeC:\Windows\system32\Blkkaohc.exe41⤵PID:4460
-
C:\Windows\SysWOW64\Bedpjdoc.exeC:\Windows\system32\Bedpjdoc.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:216 -
C:\Windows\SysWOW64\Bbhqdhnm.exeC:\Windows\system32\Bbhqdhnm.exe43⤵PID:4732
-
C:\Windows\SysWOW64\Bplammmf.exeC:\Windows\system32\Bplammmf.exe44⤵PID:1036
-
C:\Windows\SysWOW64\Bifblbad.exeC:\Windows\system32\Bifblbad.exe45⤵PID:2060
-
C:\Windows\SysWOW64\Coegih32.exeC:\Windows\system32\Coegih32.exe46⤵PID:1740
-
C:\Windows\SysWOW64\Cpedckdl.exeC:\Windows\system32\Cpedckdl.exe47⤵PID:5220
-
C:\Windows\SysWOW64\Cebllbcc.exeC:\Windows\system32\Cebllbcc.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5740 -
C:\Windows\SysWOW64\Ccfmef32.exeC:\Windows\system32\Ccfmef32.exe49⤵
- Drops file in System32 directory
PID:5596 -
C:\Windows\SysWOW64\Cipebqij.exeC:\Windows\system32\Cipebqij.exe50⤵PID:5704
-
C:\Windows\SysWOW64\Cpjmok32.exeC:\Windows\system32\Cpjmok32.exe51⤵PID:5772
-
C:\Windows\SysWOW64\Clqncl32.exeC:\Windows\system32\Clqncl32.exe52⤵
- Modifies registry class
PID:5900 -
C:\Windows\SysWOW64\Deiblamk.exeC:\Windows\system32\Deiblamk.exe53⤵
- Drops file in System32 directory
- Modifies registry class
PID:1980 -
C:\Windows\SysWOW64\Niifnf32.exeC:\Windows\system32\Niifnf32.exe54⤵PID:4036
-
C:\Windows\SysWOW64\Bjagcndq.exeC:\Windows\system32\Bjagcndq.exe55⤵
- Drops file in System32 directory
PID:4416 -
C:\Windows\SysWOW64\Bnmcdm32.exeC:\Windows\system32\Bnmcdm32.exe56⤵PID:1660
-
C:\Windows\SysWOW64\Beglqgcf.exeC:\Windows\system32\Beglqgcf.exe57⤵PID:976
-
C:\Windows\SysWOW64\Pcffoben.exeC:\Windows\system32\Pcffoben.exe58⤵PID:4852
-
C:\Windows\SysWOW64\Ibhlmgdj.exeC:\Windows\system32\Ibhlmgdj.exe59⤵PID:5096
-
C:\Windows\SysWOW64\Mjiljdaj.exeC:\Windows\system32\Mjiljdaj.exe60⤵PID:5204
-
C:\Windows\SysWOW64\Macdgn32.exeC:\Windows\system32\Macdgn32.exe61⤵PID:4836
-
C:\Windows\SysWOW64\Mlhidg32.exeC:\Windows\system32\Mlhidg32.exe62⤵PID:5360
-
C:\Windows\SysWOW64\Miofcked.exeC:\Windows\system32\Miofcked.exe63⤵PID:3148
-
C:\Windows\SysWOW64\Mjbopcip.exeC:\Windows\system32\Mjbopcip.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5332 -
C:\Windows\SysWOW64\Mehcnlie.exeC:\Windows\system32\Mehcnlie.exe65⤵PID:5620
-
C:\Windows\SysWOW64\Naaqhlmg.exeC:\Windows\system32\Naaqhlmg.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2832 -
C:\Windows\SysWOW64\Nijeoikf.exeC:\Windows\system32\Nijeoikf.exe67⤵PID:412
-
C:\Windows\SysWOW64\Noijmp32.exeC:\Windows\system32\Noijmp32.exe68⤵PID:728
-
C:\Windows\SysWOW64\Obgccn32.exeC:\Windows\system32\Obgccn32.exe69⤵
- Drops file in System32 directory
PID:648 -
C:\Windows\SysWOW64\Ohfhqd32.exeC:\Windows\system32\Ohfhqd32.exe70⤵PID:1344
-
C:\Windows\SysWOW64\Oocmcn32.exeC:\Windows\system32\Oocmcn32.exe71⤵
- Drops file in System32 directory
- Modifies registry class
PID:5476 -
C:\Windows\SysWOW64\Oihapg32.exeC:\Windows\system32\Oihapg32.exe72⤵PID:5776
-
C:\Windows\SysWOW64\Pcccol32.exeC:\Windows\system32\Pcccol32.exe73⤵
- Drops file in System32 directory
PID:5904 -
C:\Windows\SysWOW64\Pkngco32.exeC:\Windows\system32\Pkngco32.exe74⤵PID:2544
-
C:\Windows\SysWOW64\Polpim32.exeC:\Windows\system32\Polpim32.exe75⤵PID:2884
-
C:\Windows\SysWOW64\Pkencn32.exeC:\Windows\system32\Pkencn32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1144 -
C:\Windows\SysWOW64\Qemoff32.exeC:\Windows\system32\Qemoff32.exe77⤵PID:4908
-
C:\Windows\SysWOW64\Ajkgmd32.exeC:\Windows\system32\Ajkgmd32.exe78⤵
- Drops file in System32 directory
PID:2632 -
C:\Windows\SysWOW64\Aohpek32.exeC:\Windows\system32\Aohpek32.exe79⤵PID:1644
-
C:\Windows\SysWOW64\Allpnplb.exeC:\Windows\system32\Allpnplb.exe80⤵PID:6076
-
C:\Windows\SysWOW64\Ahbacq32.exeC:\Windows\system32\Ahbacq32.exe81⤵PID:3200
-
C:\Windows\SysWOW64\Ahenip32.exeC:\Windows\system32\Ahenip32.exe82⤵PID:1504
-
C:\Windows\SysWOW64\Alcfoo32.exeC:\Windows\system32\Alcfoo32.exe83⤵PID:1920
-
C:\Windows\SysWOW64\Bcmolimg.exeC:\Windows\system32\Bcmolimg.exe84⤵
- Drops file in System32 directory
PID:3224 -
C:\Windows\SysWOW64\Bjicnbba.exeC:\Windows\system32\Bjicnbba.exe85⤵PID:5680
-
C:\Windows\SysWOW64\Bkjpek32.exeC:\Windows\system32\Bkjpek32.exe86⤵PID:4424
-
C:\Windows\SysWOW64\Bhnqoo32.exeC:\Windows\system32\Bhnqoo32.exe87⤵
- Drops file in System32 directory
PID:5672 -
C:\Windows\SysWOW64\Bbgehd32.exeC:\Windows\system32\Bbgehd32.exe88⤵PID:6060
-
C:\Windows\SysWOW64\Bfenncdp.exeC:\Windows\system32\Bfenncdp.exe89⤵PID:368
-
C:\Windows\SysWOW64\Bmofkm32.exeC:\Windows\system32\Bmofkm32.exe90⤵PID:6056
-
C:\Windows\SysWOW64\Cfgjcb32.exeC:\Windows\system32\Cfgjcb32.exe91⤵PID:2976
-
C:\Windows\SysWOW64\Ccmgbf32.exeC:\Windows\system32\Ccmgbf32.exe92⤵PID:5892
-
C:\Windows\SysWOW64\Cjgpoq32.exeC:\Windows\system32\Cjgpoq32.exe93⤵PID:2728
-
C:\Windows\SysWOW64\Codhgg32.exeC:\Windows\system32\Codhgg32.exe94⤵PID:4516
-
C:\Windows\SysWOW64\Cilmpmki.exeC:\Windows\system32\Cilmpmki.exe95⤵PID:3552
-
C:\Windows\SysWOW64\Ckkilhjm.exeC:\Windows\system32\Ckkilhjm.exe96⤵
- Drops file in System32 directory
PID:4268 -
C:\Windows\SysWOW64\Cjlijp32.exeC:\Windows\system32\Cjlijp32.exe97⤵
- Modifies registry class
PID:1916 -
C:\Windows\SysWOW64\Doiabgqc.exeC:\Windows\system32\Doiabgqc.exe98⤵
- Modifies registry class
PID:4436 -
C:\Windows\SysWOW64\Dmooak32.exeC:\Windows\system32\Dmooak32.exe99⤵PID:3636
-
C:\Windows\SysWOW64\Dblgja32.exeC:\Windows\system32\Dblgja32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5512 -
C:\Windows\SysWOW64\Dcnqid32.exeC:\Windows\system32\Dcnqid32.exe101⤵PID:3192
-
C:\Windows\SysWOW64\Djhifnho.exeC:\Windows\system32\Djhifnho.exe102⤵PID:992
-
C:\Windows\SysWOW64\Emfebjgb.exeC:\Windows\system32\Emfebjgb.exe103⤵
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\Epdaneff.exeC:\Windows\system32\Epdaneff.exe104⤵
- Drops file in System32 directory
PID:5060 -
C:\Windows\SysWOW64\Emknmi32.exeC:\Windows\system32\Emknmi32.exe105⤵
- Modifies registry class
PID:396 -
C:\Windows\SysWOW64\Eplgod32.exeC:\Windows\system32\Eplgod32.exe106⤵
- Drops file in System32 directory
PID:5500 -
C:\Windows\SysWOW64\Efhlan32.exeC:\Windows\system32\Efhlan32.exe107⤵PID:5860
-
C:\Windows\SysWOW64\Fmfnig32.exeC:\Windows\system32\Fmfnig32.exe108⤵
- Modifies registry class
PID:3812 -
C:\Windows\SysWOW64\Fbecgned.exeC:\Windows\system32\Fbecgned.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1768 -
C:\Windows\SysWOW64\Fipkch32.exeC:\Windows\system32\Fipkch32.exe110⤵PID:5276
-
C:\Windows\SysWOW64\Gpnmka32.exeC:\Windows\system32\Gpnmka32.exe111⤵PID:4708
-
C:\Windows\SysWOW64\Gbmigm32.exeC:\Windows\system32\Gbmigm32.exe112⤵
- Drops file in System32 directory
PID:3604 -
C:\Windows\SysWOW64\Giinjg32.exeC:\Windows\system32\Giinjg32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4476 -
C:\Windows\SysWOW64\Gpcffalc.exeC:\Windows\system32\Gpcffalc.exe114⤵PID:5408
-
C:\Windows\SysWOW64\Hkkgii32.exeC:\Windows\system32\Hkkgii32.exe115⤵PID:520
-
C:\Windows\SysWOW64\Hlldaape.exeC:\Windows\system32\Hlldaape.exe116⤵PID:4544
-
C:\Windows\SysWOW64\Hkmdoi32.exeC:\Windows\system32\Hkmdoi32.exe117⤵PID:3092
-
C:\Windows\SysWOW64\Hpjlgp32.exeC:\Windows\system32\Hpjlgp32.exe118⤵PID:5696
-
C:\Windows\SysWOW64\Hchickeo.exeC:\Windows\system32\Hchickeo.exe119⤵PID:5796
-
C:\Windows\SysWOW64\Hmnmqdee.exeC:\Windows\system32\Hmnmqdee.exe120⤵PID:1284
-
C:\Windows\SysWOW64\Hdjbcnjo.exeC:\Windows\system32\Hdjbcnjo.exe121⤵PID:2996
-
C:\Windows\SysWOW64\Hlefgphj.exeC:\Windows\system32\Hlefgphj.exe122⤵PID:3728
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-