Analysis
-
max time kernel
80s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 20:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.da154965a5b85f14cba715123a8bd300.exe
Resource
win7-20231023-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.da154965a5b85f14cba715123a8bd300.exe
Resource
win10v2004-20231023-en
6 signatures
150 seconds
General
-
Target
NEAS.da154965a5b85f14cba715123a8bd300.exe
-
Size
265KB
-
MD5
da154965a5b85f14cba715123a8bd300
-
SHA1
786443d64f3d7c4a8e41d677e1d5a26188889e5d
-
SHA256
9e0889ca3f42d8b01d25c83d5941288bb55d8fd1fac347353cc2891ccde92761
-
SHA512
dbc75e5e9801ee3e7ce1e36d0923999b0ef98c2560188f44ac7f2710a1b58732da8d95390fb64366615dc73403b156469bed879fb6a657692b54a7cb5a5fc39d
-
SSDEEP
6144:Vz5rKTaGTLp103ETiZ0moGP/2dga1mcyw7I:FpejpScXwuR1mK7
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qfjcep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkicjgnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kilphk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klmnkdal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dipgpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdjnolfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nhdicjfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Decdeama.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opfnne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mldhacpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lnfngj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oimdbnip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Djkdnool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Anfmeldl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bndjfjhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lpilcnoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgnbol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ngifef32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qajlje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmbpeiaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Agiagn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Phbolflm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oiphbd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmmqgo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdgdeppb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cldjkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fikihlmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cjindm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opbean32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Enedio32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbqdmodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mbcjimda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nnkioq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apndloif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ejagaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Amkabind.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gqohge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ellicihn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Feella32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Affgno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Obdbqm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkepeaaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jmnheggo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pngbam32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pndhhnda.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jloibkhh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fafddb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nocphd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oooodcci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qhbcpb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cicqja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fjdajhbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Keinepch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kafcadej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Knmicfnn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qclmck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkmkfncf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihfpabbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jeanfkob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Omkmhlpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehifpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Efopjbjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Djeegf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fcbehbim.exe -
Executes dropped EXE 64 IoCs
pid Process 1824 Ojqcnhkl.exe 4808 Opbean32.exe 2744 Pbekii32.exe 3528 Pbjddh32.exe 5004 Pfhmjf32.exe 3576 Qclmck32.exe 4244 Aabkbono.exe 4568 Aagdnn32.exe 4420 Bdocph32.exe 1128 Binhnomg.exe 440 Cgfbbb32.exe 4116 Cdmoafdb.exe 3232 Ccdihbgg.exe 2560 Ddfbgelh.exe 1948 Dgihop32.exe 3788 Ejagaj32.exe 1508 Famhmfkl.exe 3564 Fdmaoahm.exe 3276 Fklcgk32.exe 1912 Gdgdeppb.exe 756 Gggmgk32.exe 4492 Ggjjlk32.exe 2716 Hkjohi32.exe 2496 Hjolie32.exe 5028 Hkohchko.exe 4180 Hjfbjdnd.exe 4316 Ijkled32.exe 4484 Icfmci32.exe 4384 Jogqlpde.exe 3652 Jddiegbm.exe 2296 Klmnkdal.exe 3668 Kehojiej.exe 1616 Lajokiaa.exe 3572 Mkjjdmaj.exe 2940 Mahklf32.exe 4136 Nlqloo32.exe 4012 Ofbdncaj.exe 2896 Ooangh32.exe 884 Pijcpmhc.exe 1816 Piolkm32.exe 936 Pokanf32.exe 4368 Qfjcep32.exe 1968 Acbmjcgd.exe 4392 Amkabind.exe 3508 Aiabhj32.exe 1288 Bmagch32.exe 3204 Cpnpqakp.exe 4352 Cdlhgpag.exe 4652 Cbaehl32.exe 2228 Dipgpf32.exe 4968 Dekapfke.exe 4596 Emioab32.exe 2444 Epjhcnbp.exe 4068 Eibmlc32.exe 3488 Fdjnolfd.exe 4664 Fneoma32.exe 4872 Fgpplf32.exe 2288 Glmhdm32.exe 400 Gqkajk32.exe 2520 Gdhjpjjd.exe 5112 Gnanioad.exe 1304 Gflcnanp.exe 4620 Gqagkjne.exe 4060 Hmkeekag.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Chlomnfl.exe Piknfgmd.exe File opened for modification C:\Windows\SysWOW64\Djbbhafj.exe Deejpjgc.exe File opened for modification C:\Windows\SysWOW64\Bloflk32.exe Bknidbhi.exe File created C:\Windows\SysWOW64\Kdgcne32.exe Nloikqnl.exe File created C:\Windows\SysWOW64\Ibqaoebi.dll Cpljdjnd.exe File opened for modification C:\Windows\SysWOW64\Cjnoggoh.exe Cnealfkf.exe File opened for modification C:\Windows\SysWOW64\Fcbehbim.exe Eqalfgll.exe File opened for modification C:\Windows\SysWOW64\Kfanflne.exe Jaefne32.exe File opened for modification C:\Windows\SysWOW64\Anfmeldl.exe Adnilfnl.exe File created C:\Windows\SysWOW64\Demcjgop.dll Kdgcne32.exe File created C:\Windows\SysWOW64\Amkabind.exe Acbmjcgd.exe File created C:\Windows\SysWOW64\Kclkocfe.dll Oelhljaq.exe File created C:\Windows\SysWOW64\Ebeapc32.exe Ellicihn.exe File opened for modification C:\Windows\SysWOW64\Qajlje32.exe Pknghk32.exe File opened for modification C:\Windows\SysWOW64\Hklglk32.exe Hkgnalep.exe File created C:\Windows\SysWOW64\Cgffmigc.dll Qednnm32.exe File created C:\Windows\SysWOW64\Ghjjdkjd.dll Ngekmf32.exe File created C:\Windows\SysWOW64\Emioab32.exe Dekapfke.exe File created C:\Windows\SysWOW64\Ilfjfdhp.dll Pdbiphhi.exe File opened for modification C:\Windows\SysWOW64\Cldjkl32.exe Cejaobel.exe File created C:\Windows\SysWOW64\Ohcakk32.dll Ehbihj32.exe File opened for modification C:\Windows\SysWOW64\Dgqblp32.exe Djhiglji.exe File created C:\Windows\SysWOW64\Iepaieii.dll Cdfgdf32.exe File created C:\Windows\SysWOW64\Gccccb32.dll Jlponebi.exe File created C:\Windows\SysWOW64\Peodcmeg.exe Ddhhnana.exe File created C:\Windows\SysWOW64\Kpanmb32.exe Jalakeme.exe File opened for modification C:\Windows\SysWOW64\Nhdicjfp.exe Nnoefagj.exe File created C:\Windows\SysWOW64\Lfpiamoj.dll Ejglcq32.exe File opened for modification C:\Windows\SysWOW64\Lmmokgne.exe Lfqjhmhk.exe File created C:\Windows\SysWOW64\Aeeomegd.exe Aohfdnil.exe File created C:\Windows\SysWOW64\Fcqlqnpo.dll Cejaobel.exe File opened for modification C:\Windows\SysWOW64\Nmmqgo32.exe Nfpled32.exe File opened for modification C:\Windows\SysWOW64\Bgafin32.exe Algiaepd.exe File opened for modification C:\Windows\SysWOW64\Oelhljaq.exe Oooodcci.exe File created C:\Windows\SysWOW64\Aojmda32.dll Dekapfke.exe File created C:\Windows\SysWOW64\Qhjgfkpf.dll Hmbkfjko.exe File created C:\Windows\SysWOW64\Fdipfq32.dll Jgekdq32.exe File created C:\Windows\SysWOW64\Nfkdkddn.dll Dpnfjjla.exe File created C:\Windows\SysWOW64\Kpfggang.exe Kgnbol32.exe File created C:\Windows\SysWOW64\Haaamjgi.dll Pgbdmfnc.exe File created C:\Windows\SysWOW64\Bkepeaaa.exe Bldogjib.exe File created C:\Windows\SysWOW64\Bcmqin32.exe Fafddb32.exe File opened for modification C:\Windows\SysWOW64\Lhdeinhb.exe Kgeiokao.exe File created C:\Windows\SysWOW64\Ifadqd32.dll Piknfgmd.exe File created C:\Windows\SysWOW64\Jcihcbcl.dll Enedio32.exe File created C:\Windows\SysWOW64\Cmqljn32.dll Feofmf32.exe File created C:\Windows\SysWOW64\Fdmfcn32.exe Fjdajhbi.exe File created C:\Windows\SysWOW64\Cjlilndf.exe Bqdechnf.exe File created C:\Windows\SysWOW64\Ibgkgjnj.dll Enoddi32.exe File created C:\Windows\SysWOW64\Dkheoa32.dll Lajokiaa.exe File created C:\Windows\SysWOW64\Chkgcq32.dll Fmbflm32.exe File opened for modification C:\Windows\SysWOW64\Bichcc32.exe Abipfifn.exe File created C:\Windows\SysWOW64\Jhgpbf32.exe Jnalem32.exe File opened for modification C:\Windows\SysWOW64\Nieggill.exe Ngekmf32.exe File opened for modification C:\Windows\SysWOW64\Pbekii32.exe Opbean32.exe File created C:\Windows\SysWOW64\Qpiidi32.dll Aiabhj32.exe File opened for modification C:\Windows\SysWOW64\Pkjegb32.exe Pdpmkhjl.exe File opened for modification C:\Windows\SysWOW64\Hcflch32.exe Hklglk32.exe File opened for modification C:\Windows\SysWOW64\Apndloif.exe Abjdbj32.exe File created C:\Windows\SysWOW64\Inmalg32.dll Qclmck32.exe File opened for modification C:\Windows\SysWOW64\Onakco32.exe Ohdbkh32.exe File created C:\Windows\SysWOW64\Oefaplcm.dll Fekclnif.exe File created C:\Windows\SysWOW64\Kfgdae32.dll Fafddb32.exe File opened for modification C:\Windows\SysWOW64\Ejglcq32.exe Ejdonq32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2168 7288 WerFault.exe 1031 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aagdnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecdleo32.dll" Mahklf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alfall32.dll" Jqklnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Feofmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jlnnfghd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmqljn32.dll" Feofmf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Akipdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bjcfeola.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fbiooolb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npoehn32.dll" Ljijci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Meoggpmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fhefmjlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pggnnqmk.dll" Fhefmjlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifpjgg32.dll" Jcnbekok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fjikeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hahedoci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hfonfp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gdhjpjjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Onmahojj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dpglmjoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eeomfioh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hommhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fpnkdfko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eenflbll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mjkbemll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Apndloif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Deiblamk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ojqcnhkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jfehpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pgbdmfnc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Niqnli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffdcne32.dll" Gohapb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oooodcci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mngocq32.dll" Jnalem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnkeod32.dll" Jkligd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eodlkdco.dll" Lhnhplpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eeodqocd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gohapb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jckeokan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ifphkbep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Enoddi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Akipdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djojepof.dll" Famhmfkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ofbdncaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Efopjbjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdinpc32.dll" Jpdbjleo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bloflk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ejglcq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ionbcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hoggdelo.dll" Cjnoggoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Chiipg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Maaoaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oefaplcm.dll" Fekclnif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kcbded32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dgqblp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iokgno32.dll" Fnkdpgnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aefdge32.dll" Jgcooaah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mklpof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Enedio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghpkld32.dll" Aabkbono.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gdgdeppb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fdjnolfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdiebk32.dll" Gdhjpjjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hgpibdam.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2828 wrote to memory of 1824 2828 NEAS.da154965a5b85f14cba715123a8bd300.exe 89 PID 2828 wrote to memory of 1824 2828 NEAS.da154965a5b85f14cba715123a8bd300.exe 89 PID 2828 wrote to memory of 1824 2828 NEAS.da154965a5b85f14cba715123a8bd300.exe 89 PID 1824 wrote to memory of 4808 1824 Ojqcnhkl.exe 90 PID 1824 wrote to memory of 4808 1824 Ojqcnhkl.exe 90 PID 1824 wrote to memory of 4808 1824 Ojqcnhkl.exe 90 PID 4808 wrote to memory of 2744 4808 Opbean32.exe 91 PID 4808 wrote to memory of 2744 4808 Opbean32.exe 91 PID 4808 wrote to memory of 2744 4808 Opbean32.exe 91 PID 2744 wrote to memory of 3528 2744 Pbekii32.exe 92 PID 2744 wrote to memory of 3528 2744 Pbekii32.exe 92 PID 2744 wrote to memory of 3528 2744 Pbekii32.exe 92 PID 3528 wrote to memory of 5004 3528 Pbjddh32.exe 93 PID 3528 wrote to memory of 5004 3528 Pbjddh32.exe 93 PID 3528 wrote to memory of 5004 3528 Pbjddh32.exe 93 PID 5004 wrote to memory of 3576 5004 Pfhmjf32.exe 94 PID 5004 wrote to memory of 3576 5004 Pfhmjf32.exe 94 PID 5004 wrote to memory of 3576 5004 Pfhmjf32.exe 94 PID 3576 wrote to memory of 4244 3576 Qclmck32.exe 95 PID 3576 wrote to memory of 4244 3576 Qclmck32.exe 95 PID 3576 wrote to memory of 4244 3576 Qclmck32.exe 95 PID 4244 wrote to memory of 4568 4244 Aabkbono.exe 96 PID 4244 wrote to memory of 4568 4244 Aabkbono.exe 96 PID 4244 wrote to memory of 4568 4244 Aabkbono.exe 96 PID 4568 wrote to memory of 4420 4568 Aagdnn32.exe 97 PID 4568 wrote to memory of 4420 4568 Aagdnn32.exe 97 PID 4568 wrote to memory of 4420 4568 Aagdnn32.exe 97 PID 4420 wrote to memory of 1128 4420 Bdocph32.exe 98 PID 4420 wrote to memory of 1128 4420 Bdocph32.exe 98 PID 4420 wrote to memory of 1128 4420 Bdocph32.exe 98 PID 1128 wrote to memory of 440 1128 Binhnomg.exe 99 PID 1128 wrote to memory of 440 1128 Binhnomg.exe 99 PID 1128 wrote to memory of 440 1128 Binhnomg.exe 99 PID 440 wrote to memory of 4116 440 Cgfbbb32.exe 100 PID 440 wrote to memory of 4116 440 Cgfbbb32.exe 100 PID 440 wrote to memory of 4116 440 Cgfbbb32.exe 100 PID 4116 wrote to memory of 3232 4116 Cdmoafdb.exe 101 PID 4116 wrote to memory of 3232 4116 Cdmoafdb.exe 101 PID 4116 wrote to memory of 3232 4116 Cdmoafdb.exe 101 PID 3232 wrote to memory of 2560 3232 Ccdihbgg.exe 102 PID 3232 wrote to memory of 2560 3232 Ccdihbgg.exe 102 PID 3232 wrote to memory of 2560 3232 Ccdihbgg.exe 102 PID 2560 wrote to memory of 1948 2560 Ddfbgelh.exe 103 PID 2560 wrote to memory of 1948 2560 Ddfbgelh.exe 103 PID 2560 wrote to memory of 1948 2560 Ddfbgelh.exe 103 PID 1948 wrote to memory of 3788 1948 Dgihop32.exe 104 PID 1948 wrote to memory of 3788 1948 Dgihop32.exe 104 PID 1948 wrote to memory of 3788 1948 Dgihop32.exe 104 PID 3788 wrote to memory of 1508 3788 Ejagaj32.exe 105 PID 3788 wrote to memory of 1508 3788 Ejagaj32.exe 105 PID 3788 wrote to memory of 1508 3788 Ejagaj32.exe 105 PID 1508 wrote to memory of 3564 1508 Famhmfkl.exe 106 PID 1508 wrote to memory of 3564 1508 Famhmfkl.exe 106 PID 1508 wrote to memory of 3564 1508 Famhmfkl.exe 106 PID 3564 wrote to memory of 3276 3564 Fdmaoahm.exe 107 PID 3564 wrote to memory of 3276 3564 Fdmaoahm.exe 107 PID 3564 wrote to memory of 3276 3564 Fdmaoahm.exe 107 PID 3276 wrote to memory of 1912 3276 Fklcgk32.exe 108 PID 3276 wrote to memory of 1912 3276 Fklcgk32.exe 108 PID 3276 wrote to memory of 1912 3276 Fklcgk32.exe 108 PID 1912 wrote to memory of 756 1912 Gdgdeppb.exe 109 PID 1912 wrote to memory of 756 1912 Gdgdeppb.exe 109 PID 1912 wrote to memory of 756 1912 Gdgdeppb.exe 109 PID 756 wrote to memory of 4492 756 Gggmgk32.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.da154965a5b85f14cba715123a8bd300.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.da154965a5b85f14cba715123a8bd300.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Ojqcnhkl.exeC:\Windows\system32\Ojqcnhkl.exe2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\Opbean32.exeC:\Windows\system32\Opbean32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\Pbekii32.exeC:\Windows\system32\Pbekii32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Pbjddh32.exeC:\Windows\system32\Pbjddh32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\Pfhmjf32.exeC:\Windows\system32\Pfhmjf32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\Qclmck32.exeC:\Windows\system32\Qclmck32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\Aabkbono.exeC:\Windows\system32\Aabkbono.exe8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\Aagdnn32.exeC:\Windows\system32\Aagdnn32.exe9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\Bdocph32.exeC:\Windows\system32\Bdocph32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\Binhnomg.exeC:\Windows\system32\Binhnomg.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\Cgfbbb32.exeC:\Windows\system32\Cgfbbb32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\Cdmoafdb.exeC:\Windows\system32\Cdmoafdb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\Ccdihbgg.exeC:\Windows\system32\Ccdihbgg.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\Ddfbgelh.exeC:\Windows\system32\Ddfbgelh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\Dgihop32.exeC:\Windows\system32\Dgihop32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\Ejagaj32.exeC:\Windows\system32\Ejagaj32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\Famhmfkl.exeC:\Windows\system32\Famhmfkl.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\Fdmaoahm.exeC:\Windows\system32\Fdmaoahm.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\Fklcgk32.exeC:\Windows\system32\Fklcgk32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\Gdgdeppb.exeC:\Windows\system32\Gdgdeppb.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\Gggmgk32.exeC:\Windows\system32\Gggmgk32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\Ggjjlk32.exeC:\Windows\system32\Ggjjlk32.exe23⤵
- Executes dropped EXE
PID:4492 -
C:\Windows\SysWOW64\Hkjohi32.exeC:\Windows\system32\Hkjohi32.exe24⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Hjolie32.exeC:\Windows\system32\Hjolie32.exe25⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\Hkohchko.exeC:\Windows\system32\Hkohchko.exe26⤵
- Executes dropped EXE
PID:5028 -
C:\Windows\SysWOW64\Hjfbjdnd.exeC:\Windows\system32\Hjfbjdnd.exe27⤵
- Executes dropped EXE
PID:4180 -
C:\Windows\SysWOW64\Ijkled32.exeC:\Windows\system32\Ijkled32.exe28⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\Icfmci32.exeC:\Windows\system32\Icfmci32.exe29⤵
- Executes dropped EXE
PID:4484 -
C:\Windows\SysWOW64\Jogqlpde.exeC:\Windows\system32\Jogqlpde.exe30⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Jddiegbm.exeC:\Windows\system32\Jddiegbm.exe31⤵
- Executes dropped EXE
PID:3652 -
C:\Windows\SysWOW64\Klmnkdal.exeC:\Windows\system32\Klmnkdal.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\Kehojiej.exeC:\Windows\system32\Kehojiej.exe33⤵
- Executes dropped EXE
PID:3668 -
C:\Windows\SysWOW64\Lajokiaa.exeC:\Windows\system32\Lajokiaa.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1616 -
C:\Windows\SysWOW64\Mkjjdmaj.exeC:\Windows\system32\Mkjjdmaj.exe35⤵
- Executes dropped EXE
PID:3572 -
C:\Windows\SysWOW64\Mahklf32.exeC:\Windows\system32\Mahklf32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:2940 -
C:\Windows\SysWOW64\Nlqloo32.exeC:\Windows\system32\Nlqloo32.exe37⤵
- Executes dropped EXE
PID:4136 -
C:\Windows\SysWOW64\Ofbdncaj.exeC:\Windows\system32\Ofbdncaj.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:4012 -
C:\Windows\SysWOW64\Ooangh32.exeC:\Windows\system32\Ooangh32.exe39⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\Pijcpmhc.exeC:\Windows\system32\Pijcpmhc.exe40⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\Piolkm32.exeC:\Windows\system32\Piolkm32.exe41⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\Pokanf32.exeC:\Windows\system32\Pokanf32.exe42⤵
- Executes dropped EXE
PID:936 -
C:\Windows\SysWOW64\Qfjcep32.exeC:\Windows\system32\Qfjcep32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\Acbmjcgd.exeC:\Windows\system32\Acbmjcgd.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1968 -
C:\Windows\SysWOW64\Amkabind.exeC:\Windows\system32\Amkabind.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4392 -
C:\Windows\SysWOW64\Aiabhj32.exeC:\Windows\system32\Aiabhj32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3508 -
C:\Windows\SysWOW64\Bmagch32.exeC:\Windows\system32\Bmagch32.exe47⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\Cpnpqakp.exeC:\Windows\system32\Cpnpqakp.exe48⤵
- Executes dropped EXE
PID:3204 -
C:\Windows\SysWOW64\Cdlhgpag.exeC:\Windows\system32\Cdlhgpag.exe49⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\Cbaehl32.exeC:\Windows\system32\Cbaehl32.exe50⤵
- Executes dropped EXE
PID:4652 -
C:\Windows\SysWOW64\Dipgpf32.exeC:\Windows\system32\Dipgpf32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\Dekapfke.exeC:\Windows\system32\Dekapfke.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4968 -
C:\Windows\SysWOW64\Emioab32.exeC:\Windows\system32\Emioab32.exe53⤵
- Executes dropped EXE
PID:4596 -
C:\Windows\SysWOW64\Epjhcnbp.exeC:\Windows\system32\Epjhcnbp.exe54⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\Eibmlc32.exeC:\Windows\system32\Eibmlc32.exe55⤵
- Executes dropped EXE
PID:4068 -
C:\Windows\SysWOW64\Fdjnolfd.exeC:\Windows\system32\Fdjnolfd.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3488 -
C:\Windows\SysWOW64\Fneoma32.exeC:\Windows\system32\Fneoma32.exe57⤵
- Executes dropped EXE
PID:4664 -
C:\Windows\SysWOW64\Fgpplf32.exeC:\Windows\system32\Fgpplf32.exe58⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\Glmhdm32.exeC:\Windows\system32\Glmhdm32.exe59⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\Gqkajk32.exeC:\Windows\system32\Gqkajk32.exe60⤵
- Executes dropped EXE
PID:400 -
C:\Windows\SysWOW64\Gdhjpjjd.exeC:\Windows\system32\Gdhjpjjd.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Gnanioad.exeC:\Windows\system32\Gnanioad.exe62⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\Gflcnanp.exeC:\Windows\system32\Gflcnanp.exe63⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\Gqagkjne.exeC:\Windows\system32\Gqagkjne.exe64⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\Hmkeekag.exeC:\Windows\system32\Hmkeekag.exe65⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\SysWOW64\Hgpibdam.exeC:\Windows\system32\Hgpibdam.exe66⤵
- Modifies registry class
PID:4360 -
C:\Windows\SysWOW64\Hmmakk32.exeC:\Windows\system32\Hmmakk32.exe67⤵PID:2380
-
C:\Windows\SysWOW64\Hgbfhc32.exeC:\Windows\system32\Hgbfhc32.exe68⤵PID:2256
-
C:\Windows\SysWOW64\Hmbkfjko.exeC:\Windows\system32\Hmbkfjko.exe69⤵
- Drops file in System32 directory
PID:1636 -
C:\Windows\SysWOW64\Ifjoop32.exeC:\Windows\system32\Ifjoop32.exe70⤵PID:3784
-
C:\Windows\SysWOW64\Iqgjmg32.exeC:\Windows\system32\Iqgjmg32.exe71⤵PID:5044
-
C:\Windows\SysWOW64\Jgcooaah.exeC:\Windows\system32\Jgcooaah.exe72⤵
- Modifies registry class
PID:1300 -
C:\Windows\SysWOW64\Jmpgghoo.exeC:\Windows\system32\Jmpgghoo.exe73⤵PID:216
-
C:\Windows\SysWOW64\Jgekdq32.exeC:\Windows\system32\Jgekdq32.exe74⤵
- Drops file in System32 directory
PID:2524 -
C:\Windows\SysWOW64\Jeilne32.exeC:\Windows\system32\Jeilne32.exe75⤵PID:2532
-
C:\Windows\SysWOW64\Jjfdfl32.exeC:\Windows\system32\Jjfdfl32.exe76⤵PID:3216
-
C:\Windows\SysWOW64\Jfmekm32.exeC:\Windows\system32\Jfmekm32.exe77⤵PID:1120
-
C:\Windows\SysWOW64\Jjknakhq.exeC:\Windows\system32\Jjknakhq.exe78⤵PID:3196
-
C:\Windows\SysWOW64\Jaefne32.exeC:\Windows\system32\Jaefne32.exe79⤵
- Drops file in System32 directory
PID:4768 -
C:\Windows\SysWOW64\Kfanflne.exeC:\Windows\system32\Kfanflne.exe80⤵PID:3696
-
C:\Windows\SysWOW64\Kebodc32.exeC:\Windows\system32\Kebodc32.exe81⤵PID:640
-
C:\Windows\SysWOW64\Kjpgmj32.exeC:\Windows\system32\Kjpgmj32.exe82⤵PID:1520
-
C:\Windows\SysWOW64\Kdjhkp32.exeC:\Windows\system32\Kdjhkp32.exe83⤵PID:2712
-
C:\Windows\SysWOW64\Kejeebpl.exeC:\Windows\system32\Kejeebpl.exe84⤵PID:2076
-
C:\Windows\SysWOW64\Kmeiie32.exeC:\Windows\system32\Kmeiie32.exe85⤵PID:4796
-
C:\Windows\SysWOW64\Ljijci32.exeC:\Windows\system32\Ljijci32.exe86⤵
- Modifies registry class
PID:4672 -
C:\Windows\SysWOW64\Lhmjlm32.exeC:\Windows\system32\Lhmjlm32.exe87⤵PID:4496
-
C:\Windows\SysWOW64\Lhogamih.exeC:\Windows\system32\Lhogamih.exe88⤵PID:1464
-
C:\Windows\SysWOW64\Lmlpjdgo.exeC:\Windows\system32\Lmlpjdgo.exe89⤵PID:4304
-
C:\Windows\SysWOW64\Lmnlpcel.exeC:\Windows\system32\Lmnlpcel.exe90⤵PID:4152
-
C:\Windows\SysWOW64\Ldhdlnli.exeC:\Windows\system32\Ldhdlnli.exe91⤵PID:3456
-
C:\Windows\SysWOW64\Mgkjch32.exeC:\Windows\system32\Mgkjch32.exe92⤵PID:5136
-
C:\Windows\SysWOW64\Maaoaa32.exeC:\Windows\system32\Maaoaa32.exe93⤵
- Modifies registry class
PID:5176 -
C:\Windows\SysWOW64\Mkicjgnn.exeC:\Windows\system32\Mkicjgnn.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5216 -
C:\Windows\SysWOW64\Meoggpmd.exeC:\Windows\system32\Meoggpmd.exe95⤵
- Modifies registry class
PID:5256 -
C:\Windows\SysWOW64\Mklpof32.exeC:\Windows\system32\Mklpof32.exe96⤵
- Modifies registry class
PID:5300 -
C:\Windows\SysWOW64\Mhppik32.exeC:\Windows\system32\Mhppik32.exe97⤵PID:5340
-
C:\Windows\SysWOW64\Nmlhaa32.exeC:\Windows\system32\Nmlhaa32.exe98⤵PID:5384
-
C:\Windows\SysWOW64\Nnoefagj.exeC:\Windows\system32\Nnoefagj.exe99⤵
- Drops file in System32 directory
PID:5428 -
C:\Windows\SysWOW64\Nhdicjfp.exeC:\Windows\system32\Nhdicjfp.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5472 -
C:\Windows\SysWOW64\Nehjmnei.exeC:\Windows\system32\Nehjmnei.exe101⤵PID:5516
-
C:\Windows\SysWOW64\Ngifef32.exeC:\Windows\system32\Ngifef32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5560 -
C:\Windows\SysWOW64\Naokbokn.exeC:\Windows\system32\Naokbokn.exe103⤵PID:5604
-
C:\Windows\SysWOW64\Odbpij32.exeC:\Windows\system32\Odbpij32.exe104⤵PID:5648
-
C:\Windows\SysWOW64\Oogdfc32.exeC:\Windows\system32\Oogdfc32.exe105⤵PID:5692
-
C:\Windows\SysWOW64\Onmahojj.exeC:\Windows\system32\Onmahojj.exe106⤵
- Modifies registry class
PID:5732 -
C:\Windows\SysWOW64\Ohbfeh32.exeC:\Windows\system32\Ohbfeh32.exe107⤵PID:5780
-
C:\Windows\SysWOW64\Ononmo32.exeC:\Windows\system32\Ononmo32.exe108⤵PID:5824
-
C:\Windows\SysWOW64\Ohdbkh32.exeC:\Windows\system32\Ohdbkh32.exe109⤵
- Drops file in System32 directory
PID:5868 -
C:\Windows\SysWOW64\Onakco32.exeC:\Windows\system32\Onakco32.exe110⤵PID:5912
-
C:\Windows\SysWOW64\Ohgopgfj.exeC:\Windows\system32\Ohgopgfj.exe111⤵PID:5952
-
C:\Windows\SysWOW64\Pndhhnda.exeC:\Windows\system32\Pndhhnda.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5996 -
C:\Windows\SysWOW64\Philfgdh.exeC:\Windows\system32\Philfgdh.exe113⤵PID:6036
-
C:\Windows\SysWOW64\Pnfdnnbo.exeC:\Windows\system32\Pnfdnnbo.exe114⤵PID:6076
-
C:\Windows\SysWOW64\Pdpmkhjl.exeC:\Windows\system32\Pdpmkhjl.exe115⤵
- Drops file in System32 directory
PID:6124 -
C:\Windows\SysWOW64\Pkjegb32.exeC:\Windows\system32\Pkjegb32.exe116⤵PID:5160
-
C:\Windows\SysWOW64\Pdbiphhi.exeC:\Windows\system32\Pdbiphhi.exe117⤵
- Drops file in System32 directory
PID:5228 -
C:\Windows\SysWOW64\Pklamb32.exeC:\Windows\system32\Pklamb32.exe118⤵PID:5308
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Holfhfij.exeC:\Windows\system32\Holfhfij.exe10⤵PID:7620
-
C:\Windows\SysWOW64\Hplbbipm.exeC:\Windows\system32\Hplbbipm.exe11⤵PID:4936
-
C:\Windows\SysWOW64\Iemdep32.exeC:\Windows\system32\Iemdep32.exe12⤵PID:2280
-
C:\Windows\SysWOW64\Iliihipi.exeC:\Windows\system32\Iliihipi.exe13⤵PID:6384
-
C:\Windows\SysWOW64\Illfmi32.exeC:\Windows\system32\Illfmi32.exe14⤵PID:2100
-
C:\Windows\SysWOW64\Iefgln32.exeC:\Windows\system32\Iefgln32.exe15⤵PID:7840
-
C:\Windows\SysWOW64\Jmplbk32.exeC:\Windows\system32\Jmplbk32.exe16⤵PID:4352
-
C:\Windows\SysWOW64\Jcmdkbok.exeC:\Windows\system32\Jcmdkbok.exe17⤵PID:7748
-
C:\Windows\SysWOW64\Jcoapami.exeC:\Windows\system32\Jcoapami.exe18⤵PID:7320
-
C:\Windows\SysWOW64\Jpenoe32.exeC:\Windows\system32\Jpenoe32.exe19⤵PID:7916
-
C:\Windows\SysWOW64\Kgacaopj.exeC:\Windows\system32\Kgacaopj.exe20⤵PID:2292
-
C:\Windows\SysWOW64\Kloljf32.exeC:\Windows\system32\Kloljf32.exe21⤵PID:6828
-
C:\Windows\SysWOW64\Klahof32.exeC:\Windows\system32\Klahof32.exe22⤵PID:3276
-
C:\Windows\SysWOW64\Knpeii32.exeC:\Windows\system32\Knpeii32.exe23⤵PID:7492
-
C:\Windows\SysWOW64\Kjgenjhe.exeC:\Windows\system32\Kjgenjhe.exe24⤵PID:5164
-
C:\Windows\SysWOW64\Kodnfqgm.exeC:\Windows\system32\Kodnfqgm.exe25⤵PID:8036
-
C:\Windows\SysWOW64\Mgnldkgj.exeC:\Windows\system32\Mgnldkgj.exe26⤵PID:3956
-
C:\Windows\SysWOW64\Moiphnde.exeC:\Windows\system32\Moiphnde.exe27⤵PID:7416
-
C:\Windows\SysWOW64\Mokmnm32.exeC:\Windows\system32\Mokmnm32.exe28⤵PID:2104
-
C:\Windows\SysWOW64\Ngeaej32.exeC:\Windows\system32\Ngeaej32.exe29⤵PID:2276
-
C:\Windows\SysWOW64\Nppfimnm.exeC:\Windows\system32\Nppfimnm.exe30⤵PID:6912
-
C:\Windows\SysWOW64\Nnafgd32.exeC:\Windows\system32\Nnafgd32.exe31⤵PID:7668
-
C:\Windows\SysWOW64\Ngikpjml.exeC:\Windows\system32\Ngikpjml.exe32⤵PID:2016
-
C:\Windows\SysWOW64\Nabpiocm.exeC:\Windows\system32\Nabpiocm.exe33⤵PID:7512
-
C:\Windows\SysWOW64\Onhmhc32.exeC:\Windows\system32\Onhmhc32.exe34⤵PID:7636
-
C:\Windows\SysWOW64\Ogqaqigd.exeC:\Windows\system32\Ogqaqigd.exe35⤵PID:7924
-
C:\Windows\SysWOW64\Ommjipel.exeC:\Windows\system32\Ommjipel.exe36⤵PID:7992
-
C:\Windows\SysWOW64\Opnbjk32.exeC:\Windows\system32\Opnbjk32.exe37⤵PID:3444
-
C:\Windows\SysWOW64\Ombcdo32.exeC:\Windows\system32\Ombcdo32.exe38⤵PID:2368
-
C:\Windows\SysWOW64\Ofjgmdgg.exeC:\Windows\system32\Ofjgmdgg.exe39⤵PID:2052
-
C:\Windows\SysWOW64\Phjdggoj.exeC:\Windows\system32\Phjdggoj.exe40⤵PID:5432
-
C:\Windows\SysWOW64\Pjkmhblk.exeC:\Windows\system32\Pjkmhblk.exe41⤵PID:6884
-
C:\Windows\SysWOW64\Pmkfjn32.exeC:\Windows\system32\Pmkfjn32.exe42⤵PID:8228
-
C:\Windows\SysWOW64\Pjaciafc.exeC:\Windows\system32\Pjaciafc.exe43⤵PID:5680
-
C:\Windows\SysWOW64\Qdjgbg32.exeC:\Windows\system32\Qdjgbg32.exe44⤵PID:8368
-
C:\Windows\SysWOW64\Qhhphebj.exeC:\Windows\system32\Qhhphebj.exe45⤵PID:8384
-
C:\Windows\SysWOW64\Aapeakij.exeC:\Windows\system32\Aapeakij.exe46⤵PID:8204
-
C:\Windows\SysWOW64\Aabafkgh.exeC:\Windows\system32\Aabafkgh.exe47⤵PID:8304
-
C:\Windows\SysWOW64\Aaenlj32.exeC:\Windows\system32\Aaenlj32.exe48⤵PID:7784
-
C:\Windows\SysWOW64\Amloakki.exeC:\Windows\system32\Amloakki.exe49⤵PID:8456
-
C:\Windows\SysWOW64\Akpojpic.exeC:\Windows\system32\Akpojpic.exe50⤵PID:7792
-
C:\Windows\SysWOW64\Adhdcepc.exeC:\Windows\system32\Adhdcepc.exe51⤵PID:1712
-
C:\Windows\SysWOW64\Baldmiom.exeC:\Windows\system32\Baldmiom.exe52⤵PID:4636
-
C:\Windows\SysWOW64\Bkdieo32.exeC:\Windows\system32\Bkdieo32.exe53⤵PID:8740
-
C:\Windows\SysWOW64\Bkgekock.exeC:\Windows\system32\Bkgekock.exe54⤵PID:5920
-
C:\Windows\SysWOW64\Bgpceogl.exeC:\Windows\system32\Bgpceogl.exe55⤵PID:1300
-
C:\Windows\SysWOW64\Bhpopb32.exeC:\Windows\system32\Bhpopb32.exe56⤵PID:8920
-
C:\Windows\SysWOW64\Cajqng32.exeC:\Windows\system32\Cajqng32.exe57⤵PID:2112
-
C:\Windows\SysWOW64\Cggifn32.exeC:\Windows\system32\Cggifn32.exe58⤵PID:6960
-
C:\Windows\SysWOW64\Cponodge.exeC:\Windows\system32\Cponodge.exe59⤵PID:1824
-
C:\Windows\SysWOW64\Cgiflnoa.exeC:\Windows\system32\Cgiflnoa.exe60⤵PID:2548
-
C:\Windows\SysWOW64\Cdmfebnk.exeC:\Windows\system32\Cdmfebnk.exe61⤵PID:8084
-
C:\Windows\SysWOW64\Cocjbkna.exeC:\Windows\system32\Cocjbkna.exe62⤵PID:4460
-
C:\Windows\SysWOW64\Dhnlapbo.exeC:\Windows\system32\Dhnlapbo.exe63⤵PID:7672
-
C:\Windows\SysWOW64\Dojqcjgi.exeC:\Windows\system32\Dojqcjgi.exe64⤵PID:7232
-
C:\Windows\SysWOW64\Dolmijef.exeC:\Windows\system32\Dolmijef.exe65⤵PID:2680
-
C:\Windows\SysWOW64\Doojni32.exeC:\Windows\system32\Doojni32.exe66⤵PID:8440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Pnmjomlg.exeC:\Windows\system32\Pnmjomlg.exe1⤵PID:5376
-
C:\Windows\SysWOW64\Phbolflm.exeC:\Windows\system32\Phbolflm.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5468 -
C:\Windows\SysWOW64\Qnpgdmjd.exeC:\Windows\system32\Qnpgdmjd.exe3⤵PID:5524
-
C:\Windows\SysWOW64\Qkchna32.exeC:\Windows\system32\Qkchna32.exe4⤵PID:5544
-
C:\Windows\SysWOW64\Qfilkj32.exeC:\Windows\system32\Qfilkj32.exe5⤵PID:5656
-
C:\Windows\SysWOW64\Adnilfnl.exeC:\Windows\system32\Adnilfnl.exe6⤵
- Drops file in System32 directory
PID:5724 -
C:\Windows\SysWOW64\Anfmeldl.exeC:\Windows\system32\Anfmeldl.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5788 -
C:\Windows\SysWOW64\Akjnnpcf.exeC:\Windows\system32\Akjnnpcf.exe8⤵PID:5852
-
C:\Windows\SysWOW64\Aecbge32.exeC:\Windows\system32\Aecbge32.exe9⤵PID:5920
-
C:\Windows\SysWOW64\Aohfdnil.exeC:\Windows\system32\Aohfdnil.exe10⤵
- Drops file in System32 directory
PID:5984 -
C:\Windows\SysWOW64\Aeeomegd.exeC:\Windows\system32\Aeeomegd.exe11⤵PID:5808
-
C:\Windows\SysWOW64\Abipfifn.exeC:\Windows\system32\Abipfifn.exe12⤵
- Drops file in System32 directory
PID:6116 -
C:\Windows\SysWOW64\Bichcc32.exeC:\Windows\system32\Bichcc32.exe13⤵PID:4276
-
C:\Windows\SysWOW64\Bomppneg.exeC:\Windows\system32\Bomppneg.exe14⤵PID:5332
-
C:\Windows\SysWOW64\Bejhhd32.exeC:\Windows\system32\Bejhhd32.exe15⤵PID:5436
-
C:\Windows\SysWOW64\Bndjfjhl.exeC:\Windows\system32\Bndjfjhl.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5484 -
C:\Windows\SysWOW64\Beobcdoi.exeC:\Windows\system32\Beobcdoi.exe17⤵PID:5612
-
C:\Windows\SysWOW64\Bfnnmg32.exeC:\Windows\system32\Bfnnmg32.exe18⤵PID:5744
-
C:\Windows\SysWOW64\Blkgen32.exeC:\Windows\system32\Blkgen32.exe19⤵PID:5632
-
C:\Windows\SysWOW64\Bbeobhlp.exeC:\Windows\system32\Bbeobhlp.exe20⤵PID:5972
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ceehcc32.exeC:\Windows\system32\Ceehcc32.exe1⤵PID:6092
-
C:\Windows\SysWOW64\Cnnllhpa.exeC:\Windows\system32\Cnnllhpa.exe2⤵PID:5200
-
C:\Windows\SysWOW64\Cicqja32.exeC:\Windows\system32\Cicqja32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5416 -
C:\Windows\SysWOW64\Cpmifkgd.exeC:\Windows\system32\Cpmifkgd.exe4⤵PID:5540
-
C:\Windows\SysWOW64\Cejaobel.exeC:\Windows\system32\Cejaobel.exe5⤵
- Drops file in System32 directory
PID:5700 -
C:\Windows\SysWOW64\Cldjkl32.exeC:\Windows\system32\Cldjkl32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5876 -
C:\Windows\SysWOW64\Cfjnhe32.exeC:\Windows\system32\Cfjnhe32.exe7⤵PID:6004
-
C:\Windows\SysWOW64\Clffalkf.exeC:\Windows\system32\Clffalkf.exe8⤵PID:5148
-
C:\Windows\SysWOW64\Cfljnejl.exeC:\Windows\system32\Cfljnejl.exe9⤵PID:5360
-
C:\Windows\SysWOW64\Dlicflic.exeC:\Windows\system32\Dlicflic.exe10⤵PID:5684
-
C:\Windows\SysWOW64\Deagoa32.exeC:\Windows\system32\Deagoa32.exe11⤵PID:5960
-
C:\Windows\SysWOW64\Dpglmjoj.exeC:\Windows\system32\Dpglmjoj.exe12⤵
- Modifies registry class
PID:5280 -
C:\Windows\SysWOW64\Decdeama.exeC:\Windows\system32\Decdeama.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5740 -
C:\Windows\SysWOW64\Eldbbjof.exeC:\Windows\system32\Eldbbjof.exe14⤵PID:6136
-
C:\Windows\SysWOW64\Efjgpc32.exeC:\Windows\system32\Efjgpc32.exe15⤵PID:1880
-
C:\Windows\SysWOW64\Elgohj32.exeC:\Windows\system32\Elgohj32.exe16⤵PID:6028
-
C:\Windows\SysWOW64\Eeodqocd.exeC:\Windows\system32\Eeodqocd.exe17⤵
- Modifies registry class
PID:3080 -
C:\Windows\SysWOW64\Epehnhbj.exeC:\Windows\system32\Epehnhbj.exe18⤵PID:5900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Efopjbjg.exeC:\Windows\system32\Efopjbjg.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6156 -
C:\Windows\SysWOW64\Ellicihn.exeC:\Windows\system32\Ellicihn.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6200 -
C:\Windows\SysWOW64\Ebeapc32.exeC:\Windows\system32\Ebeapc32.exe3⤵PID:6248
-
C:\Windows\SysWOW64\Ehbihj32.exeC:\Windows\system32\Ehbihj32.exe4⤵
- Drops file in System32 directory
PID:6288 -
C:\Windows\SysWOW64\Fhefmjlp.exeC:\Windows\system32\Fhefmjlp.exe5⤵
- Modifies registry class
PID:6332 -
C:\Windows\SysWOW64\Fpnkdfko.exeC:\Windows\system32\Fpnkdfko.exe6⤵
- Modifies registry class
PID:6376 -
C:\Windows\SysWOW64\Fekclnif.exeC:\Windows\system32\Fekclnif.exe7⤵
- Drops file in System32 directory
- Modifies registry class
PID:6424 -
C:\Windows\SysWOW64\Fiilblom.exeC:\Windows\system32\Fiilblom.exe8⤵PID:6468
-
C:\Windows\SysWOW64\Fofdkcmd.exeC:\Windows\system32\Fofdkcmd.exe9⤵PID:6508
-
C:\Windows\SysWOW64\Fikihlmj.exeC:\Windows\system32\Fikihlmj.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6548 -
C:\Windows\SysWOW64\Gohapb32.exeC:\Windows\system32\Gohapb32.exe11⤵
- Modifies registry class
PID:6588 -
C:\Windows\SysWOW64\Gebimmco.exeC:\Windows\system32\Gebimmco.exe12⤵PID:6628
-
C:\Windows\SysWOW64\Gpgnjebd.exeC:\Windows\system32\Gpgnjebd.exe13⤵PID:6668
-
C:\Windows\SysWOW64\Gipbck32.exeC:\Windows\system32\Gipbck32.exe14⤵PID:6712
-
C:\Windows\SysWOW64\Gomkkagl.exeC:\Windows\system32\Gomkkagl.exe15⤵PID:6748
-
C:\Windows\SysWOW64\Giboijgb.exeC:\Windows\system32\Giboijgb.exe16⤵PID:6792
-
C:\Windows\SysWOW64\Googaaej.exeC:\Windows\system32\Googaaej.exe17⤵PID:6832
-
C:\Windows\SysWOW64\Goadfa32.exeC:\Windows\system32\Goadfa32.exe18⤵PID:6896
-
C:\Windows\SysWOW64\Ignnjk32.exeC:\Windows\system32\Ignnjk32.exe19⤵PID:6936
-
C:\Windows\SysWOW64\Imjgbb32.exeC:\Windows\system32\Imjgbb32.exe20⤵PID:6976
-
C:\Windows\SysWOW64\Ijngkf32.exeC:\Windows\system32\Ijngkf32.exe21⤵PID:7016
-
C:\Windows\SysWOW64\Jfehpg32.exeC:\Windows\system32\Jfehpg32.exe22⤵
- Modifies registry class
PID:7056 -
C:\Windows\SysWOW64\Jqklnp32.exeC:\Windows\system32\Jqklnp32.exe23⤵
- Modifies registry class
PID:7096 -
C:\Windows\SysWOW64\Jckeokan.exeC:\Windows\system32\Jckeokan.exe24⤵
- Modifies registry class
PID:7136 -
C:\Windows\SysWOW64\Jcnbekok.exeC:\Windows\system32\Jcnbekok.exe25⤵
- Modifies registry class
PID:6148 -
C:\Windows\SysWOW64\Jpdbjleo.exeC:\Windows\system32\Jpdbjleo.exe26⤵
- Modifies registry class
PID:6212 -
C:\Windows\SysWOW64\Jfokff32.exeC:\Windows\system32\Jfokff32.exe27⤵PID:6284
-
C:\Windows\SysWOW64\Kpgoolbl.exeC:\Windows\system32\Kpgoolbl.exe28⤵PID:6320
-
C:\Windows\SysWOW64\Kfaglf32.exeC:\Windows\system32\Kfaglf32.exe29⤵PID:6396
-
C:\Windows\SysWOW64\Kaflio32.exeC:\Windows\system32\Kaflio32.exe30⤵PID:6460
-
C:\Windows\SysWOW64\Kcgekjgp.exeC:\Windows\system32\Kcgekjgp.exe31⤵PID:6544
-
C:\Windows\SysWOW64\Kakednfj.exeC:\Windows\system32\Kakednfj.exe32⤵PID:6596
-
C:\Windows\SysWOW64\Kfhnme32.exeC:\Windows\system32\Kfhnme32.exe33⤵PID:6664
-
C:\Windows\SysWOW64\Lglcag32.exeC:\Windows\system32\Lglcag32.exe34⤵PID:6736
-
C:\Windows\SysWOW64\Lmiljn32.exeC:\Windows\system32\Lmiljn32.exe35⤵PID:6780
-
C:\Windows\SysWOW64\Ljoiibbm.exeC:\Windows\system32\Ljoiibbm.exe36⤵PID:6852
-
C:\Windows\SysWOW64\Mmpbkm32.exeC:\Windows\system32\Mmpbkm32.exe37⤵PID:4908
-
C:\Windows\SysWOW64\Mankaked.exeC:\Windows\system32\Mankaked.exe38⤵PID:6924
-
C:\Windows\SysWOW64\Nalgbi32.exeC:\Windows\system32\Nalgbi32.exe39⤵PID:6988
-
C:\Windows\SysWOW64\Ngipjp32.exeC:\Windows\system32\Ngipjp32.exe40⤵PID:7052
-
C:\Windows\SysWOW64\Oileakbj.exeC:\Windows\system32\Oileakbj.exe41⤵PID:1656
-
C:\Windows\SysWOW64\Opfnne32.exeC:\Windows\system32\Opfnne32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5588 -
C:\Windows\SysWOW64\Ophjdehd.exeC:\Windows\system32\Ophjdehd.exe43⤵PID:6244
-
C:\Windows\SysWOW64\Phiekaql.exeC:\Windows\system32\Phiekaql.exe44⤵PID:6344
-
C:\Windows\SysWOW64\Ppdjpcng.exeC:\Windows\system32\Ppdjpcng.exe45⤵PID:6444
-
C:\Windows\SysWOW64\Pknghk32.exeC:\Windows\system32\Pknghk32.exe46⤵
- Drops file in System32 directory
PID:3672 -
C:\Windows\SysWOW64\Qajlje32.exeC:\Windows\system32\Qajlje32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6660 -
C:\Windows\SysWOW64\Akenij32.exeC:\Windows\system32\Akenij32.exe48⤵PID:6960
-
C:\Windows\SysWOW64\Bjfjee32.exeC:\Windows\system32\Bjfjee32.exe49⤵PID:6196
-
C:\Windows\SysWOW64\Deejpjgc.exeC:\Windows\system32\Deejpjgc.exe50⤵
- Drops file in System32 directory
PID:2900 -
C:\Windows\SysWOW64\Djbbhafj.exeC:\Windows\system32\Djbbhafj.exe51⤵PID:6496
-
C:\Windows\SysWOW64\Dehgejep.exeC:\Windows\system32\Dehgejep.exe52⤵PID:6652
-
C:\Windows\SysWOW64\Ejdonq32.exeC:\Windows\system32\Ejdonq32.exe53⤵
- Drops file in System32 directory
PID:6644 -
C:\Windows\SysWOW64\Ejglcq32.exeC:\Windows\system32\Ejglcq32.exe54⤵
- Drops file in System32 directory
- Modifies registry class
PID:6776 -
C:\Windows\SysWOW64\Eihlahjd.exeC:\Windows\system32\Eihlahjd.exe55⤵PID:2344
-
C:\Windows\SysWOW64\Enedio32.exeC:\Windows\system32\Enedio32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4480 -
C:\Windows\SysWOW64\Eeomfioh.exeC:\Windows\system32\Eeomfioh.exe57⤵
- Modifies registry class
PID:7004 -
C:\Windows\SysWOW64\Eoindndf.exeC:\Windows\system32\Eoindndf.exe58⤵PID:3872
-
C:\Windows\SysWOW64\Eecfah32.exeC:\Windows\system32\Eecfah32.exe59⤵PID:4420
-
C:\Windows\SysWOW64\Flbhia32.exeC:\Windows\system32\Flbhia32.exe60⤵PID:6228
-
C:\Windows\SysWOW64\Feofmf32.exeC:\Windows\system32\Feofmf32.exe61⤵
- Drops file in System32 directory
- Modifies registry class
PID:6316 -
C:\Windows\SysWOW64\Geabbfoc.exeC:\Windows\system32\Geabbfoc.exe62⤵PID:1260
-
C:\Windows\SysWOW64\Giokid32.exeC:\Windows\system32\Giokid32.exe63⤵PID:1904
-
C:\Windows\SysWOW64\Gbhpajlj.exeC:\Windows\system32\Gbhpajlj.exe64⤵PID:6864
-
C:\Windows\SysWOW64\Ghdhja32.exeC:\Windows\system32\Ghdhja32.exe65⤵PID:1920
-
C:\Windows\SysWOW64\Ghgeoq32.exeC:\Windows\system32\Ghgeoq32.exe66⤵PID:6984
-
C:\Windows\SysWOW64\Gaoihfoo.exeC:\Windows\system32\Gaoihfoo.exe67⤵PID:7080
-
C:\Windows\SysWOW64\Hkgnalep.exeC:\Windows\system32\Hkgnalep.exe68⤵
- Drops file in System32 directory
PID:7160 -
C:\Windows\SysWOW64\Hklglk32.exeC:\Windows\system32\Hklglk32.exe69⤵
- Drops file in System32 directory
PID:3788 -
C:\Windows\SysWOW64\Hcflch32.exeC:\Windows\system32\Hcflch32.exe70⤵PID:6432
-
C:\Windows\SysWOW64\Hipdpbgf.exeC:\Windows\system32\Hipdpbgf.exe71⤵PID:3776
-
C:\Windows\SysWOW64\Hommhi32.exeC:\Windows\system32\Hommhi32.exe72⤵
- Modifies registry class
PID:3436 -
C:\Windows\SysWOW64\Ilgcblnp.exeC:\Windows\system32\Ilgcblnp.exe73⤵PID:3564
-
C:\Windows\SysWOW64\Ifphkbep.exeC:\Windows\system32\Ifphkbep.exe74⤵
- Modifies registry class
PID:3372 -
C:\Windows\SysWOW64\Jbghpc32.exeC:\Windows\system32\Jbghpc32.exe75⤵PID:7128
-
C:\Windows\SysWOW64\Jllmml32.exeC:\Windows\system32\Jllmml32.exe76⤵PID:2492
-
C:\Windows\SysWOW64\Jcfejfag.exeC:\Windows\system32\Jcfejfag.exe77⤵PID:1840
-
C:\Windows\SysWOW64\Jloibkhh.exeC:\Windows\system32\Jloibkhh.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1244 -
C:\Windows\SysWOW64\Jfgnka32.exeC:\Windows\system32\Jfgnka32.exe79⤵PID:3972
-
C:\Windows\SysWOW64\Jlafhkfe.exeC:\Windows\system32\Jlafhkfe.exe80⤵PID:2716
-
C:\Windows\SysWOW64\Kilphk32.exeC:\Windows\system32\Kilphk32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3452 -
C:\Windows\SysWOW64\Kcbded32.exeC:\Windows\system32\Kcbded32.exe82⤵
- Modifies registry class
PID:4916 -
C:\Windows\SysWOW64\Ljephmgl.exeC:\Windows\system32\Ljephmgl.exe83⤵PID:3956
-
C:\Windows\SysWOW64\Lbqdmodg.exeC:\Windows\system32\Lbqdmodg.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4328 -
C:\Windows\SysWOW64\Lmfhjhdm.exeC:\Windows\system32\Lmfhjhdm.exe85⤵PID:3340
-
C:\Windows\SysWOW64\Lmheph32.exeC:\Windows\system32\Lmheph32.exe86⤵PID:3160
-
C:\Windows\SysWOW64\Lfqjhmhk.exeC:\Windows\system32\Lfqjhmhk.exe87⤵
- Drops file in System32 directory
PID:4592 -
C:\Windows\SysWOW64\Lmmokgne.exeC:\Windows\system32\Lmmokgne.exe88⤵PID:3576
-
C:\Windows\SysWOW64\Mlbllc32.exeC:\Windows\system32\Mlbllc32.exe89⤵PID:3908
-
C:\Windows\SysWOW64\Mldhacpj.exeC:\Windows\system32\Mldhacpj.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4636 -
C:\Windows\SysWOW64\Mbcjimda.exeC:\Windows\system32\Mbcjimda.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4828 -
C:\Windows\SysWOW64\Ncbfcp32.exeC:\Windows\system32\Ncbfcp32.exe92⤵PID:6820
-
C:\Windows\SysWOW64\Nidhffef.exeC:\Windows\system32\Nidhffef.exe93⤵PID:5068
-
C:\Windows\SysWOW64\Ndjldo32.exeC:\Windows\system32\Ndjldo32.exe94⤵PID:2548
-
C:\Windows\SysWOW64\Nmbamdkm.exeC:\Windows\system32\Nmbamdkm.exe95⤵PID:1424
-
C:\Windows\SysWOW64\Ollgiplp.exeC:\Windows\system32\Ollgiplp.exe96⤵PID:1824
-
C:\Windows\SysWOW64\Oiphbd32.exeC:\Windows\system32\Oiphbd32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3064 -
C:\Windows\SysWOW64\Pbmffi32.exeC:\Windows\system32\Pbmffi32.exe98⤵PID:3572
-
C:\Windows\SysWOW64\Pmbjcb32.exeC:\Windows\system32\Pmbjcb32.exe99⤵PID:4676
-
C:\Windows\SysWOW64\Pgbdmfnc.exeC:\Windows\system32\Pgbdmfnc.exe100⤵
- Drops file in System32 directory
- Modifies registry class
PID:4488 -
C:\Windows\SysWOW64\Qpjifl32.exeC:\Windows\system32\Qpjifl32.exe101⤵PID:6448
-
C:\Windows\SysWOW64\Qkpmcddi.exeC:\Windows\system32\Qkpmcddi.exe102⤵PID:4008
-
C:\Windows\SysWOW64\Aiejda32.exeC:\Windows\system32\Aiejda32.exe103⤵PID:2176
-
C:\Windows\SysWOW64\Apobakpn.exeC:\Windows\system32\Apobakpn.exe104⤵PID:3052
-
C:\Windows\SysWOW64\Bknidbhi.exeC:\Windows\system32\Bknidbhi.exe105⤵
- Drops file in System32 directory
PID:2820 -
C:\Windows\SysWOW64\Bloflk32.exeC:\Windows\system32\Bloflk32.exe106⤵
- Modifies registry class
PID:7040 -
C:\Windows\SysWOW64\Bjcfeola.exeC:\Windows\system32\Bjcfeola.exe107⤵
- Modifies registry class
PID:3768 -
C:\Windows\SysWOW64\Bldogjib.exeC:\Windows\system32\Bldogjib.exe108⤵
- Drops file in System32 directory
PID:1648 -
C:\Windows\SysWOW64\Bkepeaaa.exeC:\Windows\system32\Bkepeaaa.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2940 -
C:\Windows\SysWOW64\Bdmdng32.exeC:\Windows\system32\Bdmdng32.exe110⤵PID:5060
-
C:\Windows\SysWOW64\Bqdechnf.exeC:\Windows\system32\Bqdechnf.exe111⤵
- Drops file in System32 directory
PID:3140 -
C:\Windows\SysWOW64\Cjlilndf.exeC:\Windows\system32\Cjlilndf.exe112⤵PID:7216
-
C:\Windows\SysWOW64\Cddjofbj.exeC:\Windows\system32\Cddjofbj.exe113⤵PID:7260
-
C:\Windows\SysWOW64\Cjabgm32.exeC:\Windows\system32\Cjabgm32.exe114⤵PID:7308
-
C:\Windows\SysWOW64\Cdfgdf32.exeC:\Windows\system32\Cdfgdf32.exe115⤵
- Drops file in System32 directory
PID:7348 -
C:\Windows\SysWOW64\Ccldebeo.exeC:\Windows\system32\Ccldebeo.exe116⤵PID:7388
-
C:\Windows\SysWOW64\Cnahbk32.exeC:\Windows\system32\Cnahbk32.exe117⤵PID:7428
-
C:\Windows\SysWOW64\Djhiglji.exeC:\Windows\system32\Djhiglji.exe118⤵
- Drops file in System32 directory
PID:7488 -
C:\Windows\SysWOW64\Dgqblp32.exeC:\Windows\system32\Dgqblp32.exe119⤵
- Modifies registry class
PID:7552 -
C:\Windows\SysWOW64\Dqigee32.exeC:\Windows\system32\Dqigee32.exe120⤵PID:7604
-
C:\Windows\SysWOW64\Dmphjfab.exeC:\Windows\system32\Dmphjfab.exe121⤵PID:7652
-
C:\Windows\SysWOW64\Enoddi32.exeC:\Windows\system32\Enoddi32.exe122⤵
- Drops file in System32 directory
- Modifies registry class
PID:7700
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-