Analysis
-
max time kernel
100s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 20:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.de32a076670b073d69543c7f35633f60.exe
Resource
win7-20231020-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.de32a076670b073d69543c7f35633f60.exe
Resource
win10v2004-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.de32a076670b073d69543c7f35633f60.exe
-
Size
144KB
-
MD5
de32a076670b073d69543c7f35633f60
-
SHA1
44d1d740969a1963365debfd9d0aa46407c4c104
-
SHA256
492bb9570e1065e49206b70668f60f9095b2519b2eaa5fd1b462e8d6975a0f6a
-
SHA512
61a6885dad80d8476cf02fd43a425a63450cf08185a3d74afe5be6ee90366896d8a23d197bbab51b32fd5f83fabee412d252498eaeae82ec14af718fc444207b
-
SSDEEP
3072:vjqnQ5k+OA+KXo1Jff6K0U1gTxzdH13+EE+RaZ6r+GDZnBcVU:/5rzEJ6K0zxzd5IF6rfBBcVU
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Odelpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eiahhdee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aggean32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbqmbo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Peokkbao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mimphakb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bqpbboeg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmbdkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpdoqp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Imnoni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fmapag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cahffmel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eejjdb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odaiodbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eejjdb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgdjicmn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpfnqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mgoboake.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hmfbcd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Loaafnah.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnndhi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikbphn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkkbnl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dejamdca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oeammbbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lbghpinc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iacbbh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llngmeja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pgihppgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gfmhjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ahfmka32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amaqde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bifblbad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjqgpl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfnkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lpkiim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" NEAS.de32a076670b073d69543c7f35633f60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Majjgmco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cknnjcmo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njnpie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdaajd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahfmka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmqggncn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alaaajmb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhljpcfk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oeopgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbljoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Odaiodbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dkkcqj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Keapmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jpjqaldi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfjhocij.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdjeklfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fkqebg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Keapmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lnoalehl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hbnjfefo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pecpddab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ejjgic32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cafpkc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Medggidb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jndenjmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nnafgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nihiiimi.exe -
Executes dropped EXE 64 IoCs
pid Process 3336 Jelhcd32.exe 728 Ldckan32.exe 936 Moiheebb.exe 4348 Nhdicjfp.exe 1256 Ndpcdjho.exe 2144 Ejjgic32.exe 2052 Oeffnl32.exe 4708 Qnpgdmjd.exe 1700 Mlooef32.exe 3088 Bkhjpn32.exe 2992 Cafpkc32.exe 1152 Ebokodfc.exe 3748 Mimphakb.exe 2508 Fofdkcmd.exe 3368 Gchflq32.exe 3036 Hjieii32.exe 4520 Mfkcibdl.exe 3516 Ngipjp32.exe 3460 Odaiodbp.exe 4896 Pjjaci32.exe 548 Gpioca32.exe 4324 Nklbfaae.exe 1876 Bqpbboeg.exe 2148 Bgodjiio.exe 3544 Cegnol32.exe 848 Iacbbh32.exe 2812 Dgmpkg32.exe 5068 Hmfbcd32.exe 3044 Mlmbofdh.exe 2916 Fejlbgek.exe 2824 Nihiiimi.exe 440 Majjgmco.exe 456 Donlkjng.exe 1400 Iooimi32.exe 3192 Joobdfei.exe 3352 Jjefao32.exe 4656 Lcbmlbig.exe 4640 Gdhcagnp.exe 4636 Odelpm32.exe 4644 Pdjeklfj.exe 452 Bgdjicmn.exe 4476 Bcpdidol.exe 2688 Llngmeja.exe 64 Ccldebeo.exe 3852 Dkokbn32.exe 4280 Eiahhdee.exe 3048 Ecjpfp32.exe 1644 Ejmkiiha.exe 5044 Kngcdkjo.exe 4480 Gochceml.exe 4916 Eggmqk32.exe 324 Bjddinbn.exe 2184 Jogeia32.exe 2720 Jlblcdpf.exe 3000 Fkqebg32.exe 3108 Kffphhmj.exe 4184 Llqhdb32.exe 2972 Dopiqj32.exe 1964 Loaafnah.exe 4836 Mnndhi32.exe 4312 Mmodfqhf.exe 1440 Mfgiof32.exe 3476 Dkkcqj32.exe 3184 Hhoomd32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Edldoc32.dll Mlooef32.exe File created C:\Windows\SysWOW64\Cniekq32.dll Eiahhdee.exe File created C:\Windows\SysWOW64\Hjimaole.exe Gfodpbpl.exe File opened for modification C:\Windows\SysWOW64\Gcneca32.exe Ihpgda32.exe File created C:\Windows\SysWOW64\Gfcgpkhk.exe Gpioca32.exe File created C:\Windows\SysWOW64\Fcejnpck.dll Ljmmnf32.exe File created C:\Windows\SysWOW64\Jmjkhghe.dll Bgodjiio.exe File opened for modification C:\Windows\SysWOW64\Jknocljn.exe Keapmf32.exe File created C:\Windows\SysWOW64\Lechfeoi.exe Anadcbno.exe File created C:\Windows\SysWOW64\Hnbbpd32.dll Llbinnbq.exe File opened for modification C:\Windows\SysWOW64\Kgbepdpf.exe Omjfij32.exe File created C:\Windows\SysWOW64\Hkdmmfmn.dll Kfnkeh32.exe File opened for modification C:\Windows\SysWOW64\Lkdgqbag.exe Noijmp32.exe File created C:\Windows\SysWOW64\Endbmcal.dll Mgoboake.exe File created C:\Windows\SysWOW64\Ldacnaoi.dll Hpkcafjg.exe File created C:\Windows\SysWOW64\Doepod32.dll Eggmqk32.exe File created C:\Windows\SysWOW64\Kfoapo32.exe Klimbf32.exe File created C:\Windows\SysWOW64\Hndini32.dll Jljbogaf.exe File opened for modification C:\Windows\SysWOW64\Lbekjipe.exe Cbeokmbn.exe File opened for modification C:\Windows\SysWOW64\Jjefao32.exe Joobdfei.exe File opened for modification C:\Windows\SysWOW64\Lnoalehl.exe Jopaejlo.exe File opened for modification C:\Windows\SysWOW64\Fbnhjn32.exe Fmapag32.exe File opened for modification C:\Windows\SysWOW64\Alaaajmb.exe Aegidp32.exe File created C:\Windows\SysWOW64\Gpdkjdfa.dll Kmhejk32.exe File opened for modification C:\Windows\SysWOW64\Llqhdb32.exe Kffphhmj.exe File created C:\Windows\SysWOW64\Bbljoh32.exe Nhpbpepo.exe File created C:\Windows\SysWOW64\Gpjmbhch.dll Llqhdb32.exe File created C:\Windows\SysWOW64\Gbobeg32.dll Gpkiklop.exe File created C:\Windows\SysWOW64\Ffggdmbi.exe Fjqgpl32.exe File opened for modification C:\Windows\SysWOW64\Hmfbcd32.exe Ccopfi32.exe File opened for modification C:\Windows\SysWOW64\Eleikb32.exe Deanhj32.exe File opened for modification C:\Windows\SysWOW64\Egijfjmp.exe Jfjhocij.exe File opened for modification C:\Windows\SysWOW64\Kfnkeh32.exe Kngcdkjo.exe File created C:\Windows\SysWOW64\Nhdicjfp.exe Moiheebb.exe File opened for modification C:\Windows\SysWOW64\Ikbphn32.exe Idhgkcln.exe File created C:\Windows\SysWOW64\Gfggld32.dll Gqaeme32.exe File created C:\Windows\SysWOW64\Lmqggncn.exe Lckbje32.exe File created C:\Windows\SysWOW64\Lbhojo32.exe Llngmeja.exe File opened for modification C:\Windows\SysWOW64\Gfmhjb32.exe Epgpajdp.exe File opened for modification C:\Windows\SysWOW64\Fihqfh32.exe Fbnhjn32.exe File created C:\Windows\SysWOW64\Mqhjakai.dll Omjfij32.exe File created C:\Windows\SysWOW64\Ealanc32.exe Eggmqk32.exe File created C:\Windows\SysWOW64\Lecnkice.dll Lbghpinc.exe File opened for modification C:\Windows\SysWOW64\Bcpdidol.exe Bgdjicmn.exe File created C:\Windows\SysWOW64\Hmfbcd32.exe Ccopfi32.exe File created C:\Windows\SysWOW64\Cqoecpej.dll Gpelchhp.exe File created C:\Windows\SysWOW64\Pqchjm32.dll Ahfmka32.exe File created C:\Windows\SysWOW64\Jcogphcn.dll Llmpco32.exe File opened for modification C:\Windows\SysWOW64\Pphckb32.exe Pjjaci32.exe File created C:\Windows\SysWOW64\Nphhlj32.dll Ccldebeo.exe File created C:\Windows\SysWOW64\Kdiobd32.exe Jehoemmb.exe File created C:\Windows\SysWOW64\Mlnpdc32.exe Medggidb.exe File created C:\Windows\SysWOW64\Kfiajinf.exe Nnafgd32.exe File created C:\Windows\SysWOW64\Mfgiof32.exe Mmodfqhf.exe File created C:\Windows\SysWOW64\Jkkbnl32.exe Jpfnqc32.exe File created C:\Windows\SysWOW64\Pnoand32.dll Amaqde32.exe File opened for modification C:\Windows\SysWOW64\Mgddal32.exe Mlnpdc32.exe File opened for modification C:\Windows\SysWOW64\Joobdfei.exe Iooimi32.exe File created C:\Windows\SysWOW64\Qeddkilb.dll Dkokbn32.exe File opened for modification C:\Windows\SysWOW64\Mphoob32.exe Libggiik.exe File created C:\Windows\SysWOW64\Cnffjl32.exe Mgphjk32.exe File created C:\Windows\SysWOW64\Gehfepio.exe Gkcbhgii.exe File opened for modification C:\Windows\SysWOW64\Ebokodfc.exe Cafpkc32.exe File created C:\Windows\SysWOW64\Pphckb32.exe Pjjaci32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eqmjen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gfodpbpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Idhgkcln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mlnpdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbobeg32.dll" Gpkiklop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node NEAS.de32a076670b073d69543c7f35633f60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Daiodkff.dll" Lcbmlbig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cpcnhbjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbkdla32.dll" Keapmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emnjnaja.dll" Deanhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mkhkblii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jpfnqc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mlnpdc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cnffjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bldcodde.dll" Ebokodfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jhficc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mafbec32.dll" Bgfhhfjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmhhbnla.dll" Mlooef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmlfjj32.dll" Kffphhmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mfgiof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifkfgiph.dll" Llngmeja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Emllbe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cafpkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mfkcibdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nhmejf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aegidp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Blmjdmok.dll" Gqaeme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gclnidpl.dll" Gpioca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nncqojmh.dll" Gfcgpkhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpeone32.dll" Ahhbfkbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dejamdca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ikbphn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jopaejlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cahffmel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Odjeepna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kdiobd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emojjn32.dll" Kfanen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Medggidb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hpkcafjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hjieii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcpkmo32.dll" Fkqebg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Emdjjo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gfmhjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ahnclp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mlmbofdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkpdfdaa.dll" Bgdjicmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekficilg.dll" Cpcnhbjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hkaoiemi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Loaafnah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aipapifi.dll" Hmfbcd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hilkfajn.dll" Lkdgqbag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kfanen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iepako32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iimjan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojmmch32.dll" Lpkiim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ndpcdjho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ngipjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hndini32.dll" Jljbogaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dgmpkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ecjpfp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jkkbnl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Noijmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldphjaof.dll" Cbeokmbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cqoecpej.dll" Gpelchhp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 3336 4380 NEAS.de32a076670b073d69543c7f35633f60.exe 91 PID 4380 wrote to memory of 3336 4380 NEAS.de32a076670b073d69543c7f35633f60.exe 91 PID 4380 wrote to memory of 3336 4380 NEAS.de32a076670b073d69543c7f35633f60.exe 91 PID 3336 wrote to memory of 728 3336 Jelhcd32.exe 92 PID 3336 wrote to memory of 728 3336 Jelhcd32.exe 92 PID 3336 wrote to memory of 728 3336 Jelhcd32.exe 92 PID 728 wrote to memory of 936 728 Ldckan32.exe 93 PID 728 wrote to memory of 936 728 Ldckan32.exe 93 PID 728 wrote to memory of 936 728 Ldckan32.exe 93 PID 936 wrote to memory of 4348 936 Moiheebb.exe 94 PID 936 wrote to memory of 4348 936 Moiheebb.exe 94 PID 936 wrote to memory of 4348 936 Moiheebb.exe 94 PID 4348 wrote to memory of 1256 4348 Nhdicjfp.exe 95 PID 4348 wrote to memory of 1256 4348 Nhdicjfp.exe 95 PID 4348 wrote to memory of 1256 4348 Nhdicjfp.exe 95 PID 1256 wrote to memory of 2144 1256 Ndpcdjho.exe 172 PID 1256 wrote to memory of 2144 1256 Ndpcdjho.exe 172 PID 1256 wrote to memory of 2144 1256 Ndpcdjho.exe 172 PID 2144 wrote to memory of 2052 2144 Ejjgic32.exe 97 PID 2144 wrote to memory of 2052 2144 Ejjgic32.exe 97 PID 2144 wrote to memory of 2052 2144 Ejjgic32.exe 97 PID 2052 wrote to memory of 4708 2052 Hpkcafjg.exe 98 PID 2052 wrote to memory of 4708 2052 Hpkcafjg.exe 98 PID 2052 wrote to memory of 4708 2052 Hpkcafjg.exe 98 PID 4708 wrote to memory of 1700 4708 Qnpgdmjd.exe 384 PID 4708 wrote to memory of 1700 4708 Qnpgdmjd.exe 384 PID 4708 wrote to memory of 1700 4708 Qnpgdmjd.exe 384 PID 1700 wrote to memory of 3088 1700 Mlooef32.exe 100 PID 1700 wrote to memory of 3088 1700 Mlooef32.exe 100 PID 1700 wrote to memory of 3088 1700 Mlooef32.exe 100 PID 3088 wrote to memory of 2992 3088 Bkhjpn32.exe 204 PID 3088 wrote to memory of 2992 3088 Bkhjpn32.exe 204 PID 3088 wrote to memory of 2992 3088 Bkhjpn32.exe 204 PID 2992 wrote to memory of 1152 2992 Cafpkc32.exe 102 PID 2992 wrote to memory of 1152 2992 Cafpkc32.exe 102 PID 2992 wrote to memory of 1152 2992 Cafpkc32.exe 102 PID 1152 wrote to memory of 3748 1152 Ebokodfc.exe 322 PID 1152 wrote to memory of 3748 1152 Ebokodfc.exe 322 PID 1152 wrote to memory of 3748 1152 Ebokodfc.exe 322 PID 3748 wrote to memory of 2508 3748 Mimphakb.exe 104 PID 3748 wrote to memory of 2508 3748 Mimphakb.exe 104 PID 3748 wrote to memory of 2508 3748 Mimphakb.exe 104 PID 2508 wrote to memory of 3368 2508 Fofdkcmd.exe 105 PID 2508 wrote to memory of 3368 2508 Fofdkcmd.exe 105 PID 2508 wrote to memory of 3368 2508 Fofdkcmd.exe 105 PID 3368 wrote to memory of 3036 3368 Gchflq32.exe 106 PID 3368 wrote to memory of 3036 3368 Gchflq32.exe 106 PID 3368 wrote to memory of 3036 3368 Gchflq32.exe 106 PID 3036 wrote to memory of 4520 3036 Hjieii32.exe 107 PID 3036 wrote to memory of 4520 3036 Hjieii32.exe 107 PID 3036 wrote to memory of 4520 3036 Hjieii32.exe 107 PID 4520 wrote to memory of 3516 4520 Mfkcibdl.exe 108 PID 4520 wrote to memory of 3516 4520 Mfkcibdl.exe 108 PID 4520 wrote to memory of 3516 4520 Mfkcibdl.exe 108 PID 3516 wrote to memory of 3460 3516 Ngipjp32.exe 109 PID 3516 wrote to memory of 3460 3516 Ngipjp32.exe 109 PID 3516 wrote to memory of 3460 3516 Ngipjp32.exe 109 PID 3460 wrote to memory of 4896 3460 Odaiodbp.exe 110 PID 3460 wrote to memory of 4896 3460 Odaiodbp.exe 110 PID 3460 wrote to memory of 4896 3460 Odaiodbp.exe 110 PID 4896 wrote to memory of 548 4896 Pjjaci32.exe 216 PID 4896 wrote to memory of 548 4896 Pjjaci32.exe 216 PID 4896 wrote to memory of 548 4896 Pjjaci32.exe 216 PID 548 wrote to memory of 4324 548 Gpioca32.exe 393
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.de32a076670b073d69543c7f35633f60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.de32a076670b073d69543c7f35633f60.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\Jelhcd32.exeC:\Windows\system32\Jelhcd32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\Ldckan32.exeC:\Windows\system32\Ldckan32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\Moiheebb.exeC:\Windows\system32\Moiheebb.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\Nhdicjfp.exeC:\Windows\system32\Nhdicjfp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\Ndpcdjho.exeC:\Windows\system32\Ndpcdjho.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\Ohpiphlb.exeC:\Windows\system32\Ohpiphlb.exe7⤵PID:2144
-
C:\Windows\SysWOW64\Oeffnl32.exeC:\Windows\system32\Oeffnl32.exe8⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\SysWOW64\Qnpgdmjd.exeC:\Windows\system32\Qnpgdmjd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\Ankgpk32.exeC:\Windows\system32\Ankgpk32.exe10⤵PID:1700
-
C:\Windows\SysWOW64\Bkhjpn32.exeC:\Windows\system32\Bkhjpn32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\Dpdogj32.exeC:\Windows\system32\Dpdogj32.exe12⤵PID:2992
-
C:\Windows\SysWOW64\Ebokodfc.exeC:\Windows\system32\Ebokodfc.exe13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\Epiaig32.exeC:\Windows\system32\Epiaig32.exe14⤵PID:3748
-
C:\Windows\SysWOW64\Fofdkcmd.exeC:\Windows\system32\Fofdkcmd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Gchflq32.exeC:\Windows\system32\Gchflq32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\Hjieii32.exeC:\Windows\system32\Hjieii32.exe17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\Mfkcibdl.exeC:\Windows\system32\Mfkcibdl.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\Ngipjp32.exeC:\Windows\system32\Ngipjp32.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\Odaiodbp.exeC:\Windows\system32\Odaiodbp.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\Pjjaci32.exeC:\Windows\system32\Pjjaci32.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\Pphckb32.exeC:\Windows\system32\Pphckb32.exe22⤵PID:548
-
C:\Windows\SysWOW64\Qpmmfbfl.exeC:\Windows\system32\Qpmmfbfl.exe23⤵PID:4324
-
C:\Windows\SysWOW64\Addhbo32.exeC:\Windows\system32\Addhbo32.exe24⤵PID:4212
-
C:\Windows\SysWOW64\Bqpbboeg.exeC:\Windows\system32\Bqpbboeg.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1876 -
C:\Windows\SysWOW64\Bgodjiio.exeC:\Windows\system32\Bgodjiio.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2148 -
C:\Windows\SysWOW64\Cegnol32.exeC:\Windows\system32\Cegnol32.exe27⤵
- Executes dropped EXE
PID:3544 -
C:\Windows\SysWOW64\Dndlba32.exeC:\Windows\system32\Dndlba32.exe28⤵PID:848
-
C:\Windows\SysWOW64\Dgmpkg32.exeC:\Windows\system32\Dgmpkg32.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:2812 -
C:\Windows\SysWOW64\Enbhdojn.exeC:\Windows\system32\Enbhdojn.exe30⤵PID:5068
-
C:\Windows\SysWOW64\Eiobbgcl.exeC:\Windows\system32\Eiobbgcl.exe31⤵PID:3044
-
C:\Windows\SysWOW64\Fejlbgek.exeC:\Windows\system32\Fejlbgek.exe32⤵
- Executes dropped EXE
PID:2916
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Gfcgpkhk.exeC:\Windows\system32\Gfcgpkhk.exe23⤵
- Modifies registry class
PID:3756 -
C:\Windows\SysWOW64\Gmmome32.exeC:\Windows\system32\Gmmome32.exe24⤵PID:1084
-
C:\Windows\SysWOW64\Gcggjp32.exeC:\Windows\system32\Gcggjp32.exe25⤵PID:1468
-
C:\Windows\SysWOW64\Hidpbf32.exeC:\Windows\system32\Hidpbf32.exe26⤵PID:1136
-
C:\Windows\SysWOW64\Hmfbcd32.exeC:\Windows\system32\Hmfbcd32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:5068 -
C:\Windows\SysWOW64\Jpjqaldi.exeC:\Windows\system32\Jpjqaldi.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:464 -
C:\Windows\SysWOW64\Jjoeoedo.exeC:\Windows\system32\Jjoeoedo.exe29⤵PID:2824
-
C:\Windows\SysWOW64\Kmiqfoie.exeC:\Windows\system32\Kmiqfoie.exe30⤵PID:884
-
C:\Windows\SysWOW64\Kgbepdpf.exeC:\Windows\system32\Kgbepdpf.exe31⤵PID:3764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Geabbfoc.exeC:\Windows\system32\Geabbfoc.exe1⤵PID:2824
-
C:\Windows\SysWOW64\Gojgkl32.exeC:\Windows\system32\Gojgkl32.exe2⤵PID:440
-
C:\Windows\SysWOW64\Hadcce32.exeC:\Windows\system32\Hadcce32.exe3⤵PID:456
-
C:\Windows\SysWOW64\Iooimi32.exeC:\Windows\system32\Iooimi32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1400
-
-
-
-
C:\Windows\SysWOW64\Joobdfei.exeC:\Windows\system32\Joobdfei.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3192 -
C:\Windows\SysWOW64\Jjefao32.exeC:\Windows\system32\Jjefao32.exe2⤵
- Executes dropped EXE
PID:3352 -
C:\Windows\SysWOW64\Lcbmlbig.exeC:\Windows\system32\Lcbmlbig.exe3⤵
- Executes dropped EXE
- Modifies registry class
PID:4656 -
C:\Windows\SysWOW64\Nboiekjd.exeC:\Windows\system32\Nboiekjd.exe4⤵PID:4640
-
C:\Windows\SysWOW64\Odelpm32.exeC:\Windows\system32\Odelpm32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4636 -
C:\Windows\SysWOW64\Pdjeklfj.exeC:\Windows\system32\Pdjeklfj.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4644 -
C:\Windows\SysWOW64\Bgdjicmn.exeC:\Windows\system32\Bgdjicmn.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:452
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Bcpdidol.exeC:\Windows\system32\Bcpdidol.exe1⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\SysWOW64\Bjjmfn32.exeC:\Windows\system32\Bjjmfn32.exe2⤵PID:2688
-
C:\Windows\SysWOW64\Ccldebeo.exeC:\Windows\system32\Ccldebeo.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:64
-
-
-
C:\Windows\SysWOW64\Dkokbn32.exeC:\Windows\system32\Dkokbn32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3852 -
C:\Windows\SysWOW64\Dnmgni32.exeC:\Windows\system32\Dnmgni32.exe2⤵PID:4280
-
C:\Windows\SysWOW64\Ecjpfp32.exeC:\Windows\system32\Ecjpfp32.exe3⤵
- Executes dropped EXE
- Modifies registry class
PID:3048 -
C:\Windows\SysWOW64\Ejmkiiha.exeC:\Windows\system32\Ejmkiiha.exe4⤵
- Executes dropped EXE
PID:1644 -
C:\Windows\SysWOW64\Fmejlcoj.exeC:\Windows\system32\Fmejlcoj.exe5⤵PID:5044
-
C:\Windows\SysWOW64\Gaepgacn.exeC:\Windows\system32\Gaepgacn.exe6⤵PID:4480
-
C:\Windows\SysWOW64\Hecadm32.exeC:\Windows\system32\Hecadm32.exe7⤵PID:4916
-
C:\Windows\SysWOW64\Hlmiagbo.exeC:\Windows\system32\Hlmiagbo.exe8⤵PID:324
-
C:\Windows\SysWOW64\Jogeia32.exeC:\Windows\system32\Jogeia32.exe9⤵
- Executes dropped EXE
PID:2184 -
C:\Windows\SysWOW64\Jlblcdpf.exeC:\Windows\system32\Jlblcdpf.exe10⤵
- Executes dropped EXE
PID:2720
-
-
-
-
-
-
C:\Windows\SysWOW64\Kfnkeh32.exeC:\Windows\system32\Kfnkeh32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1180 -
C:\Windows\SysWOW64\Klkcmo32.exeC:\Windows\system32\Klkcmo32.exe7⤵PID:5452
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kkaljpmd.exeC:\Windows\system32\Kkaljpmd.exe1⤵PID:3000
-
C:\Windows\SysWOW64\Kffphhmj.exeC:\Windows\system32\Kffphhmj.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3108
-
-
C:\Windows\SysWOW64\Llqhdb32.exeC:\Windows\system32\Llqhdb32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4184 -
C:\Windows\SysWOW64\Lnbdlkje.exeC:\Windows\system32\Lnbdlkje.exe2⤵PID:2972
-
C:\Windows\SysWOW64\Loaafnah.exeC:\Windows\system32\Loaafnah.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1964 -
C:\Windows\SysWOW64\Mnndhi32.exeC:\Windows\system32\Mnndhi32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4836 -
C:\Windows\SysWOW64\Mmodfqhf.exeC:\Windows\system32\Mmodfqhf.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4312 -
C:\Windows\SysWOW64\Mfgiof32.exeC:\Windows\system32\Mfgiof32.exe6⤵
- Executes dropped EXE
- Modifies registry class
PID:1440 -
C:\Windows\SysWOW64\Moomgl32.exeC:\Windows\system32\Moomgl32.exe7⤵PID:3476
-
C:\Windows\SysWOW64\Mihbpalh.exeC:\Windows\system32\Mihbpalh.exe8⤵PID:3184
-
C:\Windows\SysWOW64\Mkhkblii.exeC:\Windows\system32\Mkhkblii.exe9⤵
- Modifies registry class
PID:3612 -
C:\Windows\SysWOW64\Nfnooe32.exeC:\Windows\system32\Nfnooe32.exe10⤵PID:1296
-
C:\Windows\SysWOW64\Nlbnhkqo.exeC:\Windows\system32\Nlbnhkqo.exe11⤵PID:4652
-
C:\Windows\SysWOW64\Onecof32.exeC:\Windows\system32\Onecof32.exe12⤵PID:3588
-
C:\Windows\SysWOW64\Ofnhfbjl.exeC:\Windows\system32\Ofnhfbjl.exe13⤵PID:1348
-
C:\Windows\SysWOW64\Poelfc32.exeC:\Windows\system32\Poelfc32.exe14⤵PID:1292
-
C:\Windows\SysWOW64\Cpcnhbjj.exeC:\Windows\system32\Cpcnhbjj.exe15⤵
- Modifies registry class
PID:4852 -
C:\Windows\SysWOW64\Dcpffk32.exeC:\Windows\system32\Dcpffk32.exe16⤵PID:4728
-
C:\Windows\SysWOW64\Dqfceoje.exeC:\Windows\system32\Dqfceoje.exe17⤵PID:3336
-
C:\Windows\SysWOW64\Dcdpakii.exeC:\Windows\system32\Dcdpakii.exe18⤵PID:3024
-
C:\Windows\SysWOW64\Eciilj32.exeC:\Windows\system32\Eciilj32.exe19⤵PID:1360
-
C:\Windows\SysWOW64\Eqmjen32.exeC:\Windows\system32\Eqmjen32.exe20⤵
- Modifies registry class
PID:3420 -
C:\Windows\SysWOW64\Emdjjo32.exeC:\Windows\system32\Emdjjo32.exe21⤵
- Modifies registry class
PID:2128 -
C:\Windows\SysWOW64\Ecpomiok.exeC:\Windows\system32\Ecpomiok.exe22⤵PID:2604
-
C:\Windows\SysWOW64\Ejjgic32.exeC:\Windows\system32\Ejjgic32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\Epgpajdp.exeC:\Windows\system32\Epgpajdp.exe24⤵
- Drops file in System32 directory
PID:2416 -
C:\Windows\SysWOW64\Gfmhjb32.exeC:\Windows\system32\Gfmhjb32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1716 -
C:\Windows\SysWOW64\Gpelchhp.exeC:\Windows\system32\Gpelchhp.exe26⤵
- Drops file in System32 directory
- Modifies registry class
PID:676 -
C:\Windows\SysWOW64\Gfodpbpl.exeC:\Windows\system32\Gfodpbpl.exe27⤵
- Drops file in System32 directory
- Modifies registry class
PID:1984 -
C:\Windows\SysWOW64\Hjimaole.exeC:\Windows\system32\Hjimaole.exe28⤵PID:3656
-
C:\Windows\SysWOW64\Hdaajd32.exeC:\Windows\system32\Hdaajd32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4072 -
C:\Windows\SysWOW64\Imnoni32.exeC:\Windows\system32\Imnoni32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1540 -
C:\Windows\SysWOW64\Idhgkcln.exeC:\Windows\system32\Idhgkcln.exe31⤵
- Drops file in System32 directory
- Modifies registry class
PID:3124 -
C:\Windows\SysWOW64\Ikbphn32.exeC:\Windows\system32\Ikbphn32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3276 -
C:\Windows\SysWOW64\Jpfnqc32.exeC:\Windows\system32\Jpfnqc32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3116 -
C:\Windows\SysWOW64\Jkkbnl32.exeC:\Windows\system32\Jkkbnl32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1064 -
C:\Windows\SysWOW64\Jphkfc32.exeC:\Windows\system32\Jphkfc32.exe35⤵PID:3404
-
C:\Windows\SysWOW64\Jknocljn.exeC:\Windows\system32\Jknocljn.exe36⤵PID:3748
-
C:\Windows\SysWOW64\Jahgpf32.exeC:\Windows\system32\Jahgpf32.exe37⤵PID:2652
-
C:\Windows\SysWOW64\Jopaejlo.exeC:\Windows\system32\Jopaejlo.exe38⤵
- Drops file in System32 directory
- Modifies registry class
PID:4332 -
C:\Windows\SysWOW64\Lnoalehl.exeC:\Windows\system32\Lnoalehl.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1000 -
C:\Windows\SysWOW64\Lhgbomfo.exeC:\Windows\system32\Lhgbomfo.exe40⤵PID:4704
-
C:\Windows\SysWOW64\Ophbja32.exeC:\Windows\system32\Ophbja32.exe41⤵PID:3548
-
C:\Windows\SysWOW64\Ahfmka32.exeC:\Windows\system32\Ahfmka32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4972 -
C:\Windows\SysWOW64\Aoqegk32.exeC:\Windows\system32\Aoqegk32.exe43⤵PID:3148
-
C:\Windows\SysWOW64\Aified32.exeC:\Windows\system32\Aified32.exe44⤵PID:1480
-
C:\Windows\SysWOW64\Ahnclp32.exeC:\Windows\system32\Ahnclp32.exe45⤵
- Modifies registry class
PID:3880 -
C:\Windows\SysWOW64\Abcgii32.exeC:\Windows\system32\Abcgii32.exe46⤵PID:4664
-
C:\Windows\SysWOW64\Bimoecio.exeC:\Windows\system32\Bimoecio.exe47⤵PID:224
-
C:\Windows\SysWOW64\Bpggbm32.exeC:\Windows\system32\Bpggbm32.exe48⤵PID:2668
-
C:\Windows\SysWOW64\Bbjmih32.exeC:\Windows\system32\Bbjmih32.exe49⤵PID:812
-
C:\Windows\SysWOW64\Bhgeao32.exeC:\Windows\system32\Bhgeao32.exe50⤵PID:2584
-
C:\Windows\SysWOW64\Bbljoh32.exeC:\Windows\system32\Bbljoh32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3888 -
C:\Windows\SysWOW64\Bifblbad.exeC:\Windows\system32\Bifblbad.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3096 -
C:\Windows\SysWOW64\Bppjhl32.exeC:\Windows\system32\Bppjhl32.exe53⤵PID:3608
-
C:\Windows\SysWOW64\Clihcm32.exeC:\Windows\system32\Clihcm32.exe54⤵PID:4220
-
C:\Windows\SysWOW64\Cafpkc32.exeC:\Windows\system32\Cafpkc32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\Fjqgpl32.exeC:\Windows\system32\Fjqgpl32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:808 -
C:\Windows\SysWOW64\Ffggdmbi.exeC:\Windows\system32\Ffggdmbi.exe57⤵PID:1700
-
C:\Windows\SysWOW64\Fmapag32.exeC:\Windows\system32\Fmapag32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4216 -
C:\Windows\SysWOW64\Fbnhjn32.exeC:\Windows\system32\Fbnhjn32.exe59⤵
- Drops file in System32 directory
PID:404 -
C:\Windows\SysWOW64\Fihqfh32.exeC:\Windows\system32\Fihqfh32.exe60⤵PID:2204
-
C:\Windows\SysWOW64\Gcneca32.exeC:\Windows\system32\Gcneca32.exe61⤵PID:2092
-
C:\Windows\SysWOW64\Gflapl32.exeC:\Windows\system32\Gflapl32.exe62⤵PID:648
-
C:\Windows\SysWOW64\Gqaeme32.exeC:\Windows\system32\Gqaeme32.exe63⤵
- Drops file in System32 directory
- Modifies registry class
PID:4212 -
C:\Windows\SysWOW64\Gpioca32.exeC:\Windows\system32\Gpioca32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:548
-
-
-
-
-
C:\Windows\SysWOW64\Ijadljdg.exeC:\Windows\system32\Ijadljdg.exe61⤵PID:4540
-
C:\Windows\SysWOW64\Idfhibdn.exeC:\Windows\system32\Idfhibdn.exe62⤵PID:1148
-
C:\Windows\SysWOW64\Ikqqfm32.exeC:\Windows\system32\Ikqqfm32.exe63⤵PID:4492
-
C:\Windows\SysWOW64\Jglkfmmi.exeC:\Windows\system32\Jglkfmmi.exe64⤵PID:520
-
C:\Windows\SysWOW64\Jnfcbg32.exeC:\Windows\system32\Jnfcbg32.exe65⤵PID:3824
-
C:\Windows\SysWOW64\Ljmmnf32.exeC:\Windows\system32\Ljmmnf32.exe66⤵
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\Lelcbmcc.exeC:\Windows\system32\Lelcbmcc.exe67⤵PID:2608
-
C:\Windows\SysWOW64\Mijlhl32.exeC:\Windows\system32\Mijlhl32.exe68⤵PID:4804
-
C:\Windows\SysWOW64\Meqmmm32.exeC:\Windows\system32\Meqmmm32.exe69⤵PID:2932
-
C:\Windows\SysWOW64\Mlkejgfj.exeC:\Windows\system32\Mlkejgfj.exe70⤵PID:1496
-
C:\Windows\SysWOW64\Mecjbl32.exeC:\Windows\system32\Mecjbl32.exe71⤵PID:2252
-
C:\Windows\SysWOW64\Mlmbofdh.exeC:\Windows\system32\Mlmbofdh.exe72⤵
- Executes dropped EXE
- Modifies registry class
PID:3044 -
C:\Windows\SysWOW64\Majjgmco.exeC:\Windows\system32\Majjgmco.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:440 -
C:\Windows\SysWOW64\Mlooef32.exeC:\Windows\system32\Mlooef32.exe74⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1700
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Malgmm32.exeC:\Windows\system32\Malgmm32.exe58⤵PID:5128
-
C:\Windows\SysWOW64\Nlbkjf32.exeC:\Windows\system32\Nlbkjf32.exe59⤵PID:1388
-
C:\Windows\SysWOW64\Nblcgpho.exeC:\Windows\system32\Nblcgpho.exe60⤵PID:4840
-
C:\Windows\SysWOW64\Nhhlog32.exeC:\Windows\system32\Nhhlog32.exe61⤵PID:4868
-
C:\Windows\SysWOW64\Nbnpmp32.exeC:\Windows\system32\Nbnpmp32.exe62⤵PID:2028
-
C:\Windows\SysWOW64\Nihiiimi.exeC:\Windows\system32\Nihiiimi.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Nkieab32.exeC:\Windows\system32\Nkieab32.exe64⤵PID:2092
-
C:\Windows\SysWOW64\Nbqmbo32.exeC:\Windows\system32\Nbqmbo32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4704 -
C:\Windows\SysWOW64\Nhmejf32.exeC:\Windows\system32\Nhmejf32.exe66⤵
- Modifies registry class
PID:3148 -
C:\Windows\SysWOW64\Nklbfaae.exeC:\Windows\system32\Nklbfaae.exe67⤵
- Executes dropped EXE
PID:4324 -
C:\Windows\SysWOW64\Naejcl32.exeC:\Windows\system32\Naejcl32.exe68⤵PID:4968
-
C:\Windows\SysWOW64\Nhpbpepo.exeC:\Windows\system32\Nhpbpepo.exe69⤵
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\Noijmp32.exeC:\Windows\system32\Noijmp32.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:5172 -
C:\Windows\SysWOW64\Oioojh32.exeC:\Windows\system32\Oioojh32.exe71⤵PID:3416
-
C:\Windows\SysWOW64\Oolgbpei.exeC:\Windows\system32\Oolgbpei.exe72⤵PID:228
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Aggean32.exeC:\Windows\system32\Aggean32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3336 -
C:\Windows\SysWOW64\Aqoijcbo.exeC:\Windows\system32\Aqoijcbo.exe13⤵PID:1032
-
C:\Windows\SysWOW64\Cjcmognb.exeC:\Windows\system32\Cjcmognb.exe14⤵PID:2876
-
C:\Windows\SysWOW64\Cclagm32.exeC:\Windows\system32\Cclagm32.exe15⤵PID:5316
-
C:\Windows\SysWOW64\Cpglgmfa.exeC:\Windows\system32\Cpglgmfa.exe16⤵PID:2272
-
C:\Windows\SysWOW64\Epgenk32.exeC:\Windows\system32\Epgenk32.exe17⤵PID:3844
-
C:\Windows\SysWOW64\Ejmild32.exeC:\Windows\system32\Ejmild32.exe18⤵PID:4612
-
C:\Windows\SysWOW64\Edemdine.exeC:\Windows\system32\Edemdine.exe19⤵PID:1544
-
C:\Windows\SysWOW64\Ejofacfb.exeC:\Windows\system32\Ejofacfb.exe20⤵PID:3436
-
C:\Windows\SysWOW64\Fhhpfg32.exeC:\Windows\system32\Fhhpfg32.exe21⤵PID:4104
-
C:\Windows\SysWOW64\Fmehnn32.exeC:\Windows\system32\Fmehnn32.exe22⤵PID:4560
-
C:\Windows\SysWOW64\Fdopkhfk.exeC:\Windows\system32\Fdopkhfk.exe23⤵PID:776
-
C:\Windows\SysWOW64\Faemjl32.exeC:\Windows\system32\Faemjl32.exe24⤵PID:2984
-
C:\Windows\SysWOW64\Fgbfbc32.exeC:\Windows\system32\Fgbfbc32.exe25⤵PID:5024
-
C:\Windows\SysWOW64\Fmlnomif.exeC:\Windows\system32\Fmlnomif.exe26⤵PID:5100
-
C:\Windows\SysWOW64\Fhablf32.exeC:\Windows\system32\Fhablf32.exe27⤵PID:4600
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Lckbje32.exeC:\Windows\system32\Lckbje32.exe1⤵
- Drops file in System32 directory
PID:4660 -
C:\Windows\SysWOW64\Lmqggncn.exeC:\Windows\system32\Lmqggncn.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5124 -
C:\Windows\SysWOW64\Ldjodh32.exeC:\Windows\system32\Ldjodh32.exe3⤵PID:5172
-
C:\Windows\SysWOW64\Lkdgqbag.exeC:\Windows\system32\Lkdgqbag.exe4⤵
- Modifies registry class
PID:5220 -
C:\Windows\SysWOW64\Lgkhec32.exeC:\Windows\system32\Lgkhec32.exe5⤵PID:5304
-
C:\Windows\SysWOW64\Peljha32.exeC:\Windows\system32\Peljha32.exe6⤵PID:5392
-
C:\Windows\SysWOW64\Aeemop32.exeC:\Windows\system32\Aeemop32.exe7⤵PID:5440
-
C:\Windows\SysWOW64\Aegidp32.exeC:\Windows\system32\Aegidp32.exe8⤵
- Drops file in System32 directory
- Modifies registry class
PID:5484 -
C:\Windows\SysWOW64\Alaaajmb.exeC:\Windows\system32\Alaaajmb.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5528 -
C:\Windows\SysWOW64\Aanjiqki.exeC:\Windows\system32\Aanjiqki.exe10⤵PID:5572
-
C:\Windows\SysWOW64\Ahhbfkbf.exeC:\Windows\system32\Ahhbfkbf.exe11⤵
- Modifies registry class
PID:5616 -
C:\Windows\SysWOW64\Bjkhme32.exeC:\Windows\system32\Bjkhme32.exe12⤵PID:5664
-
C:\Windows\SysWOW64\Bjnece32.exeC:\Windows\system32\Bjnece32.exe13⤵PID:5716
-
C:\Windows\SysWOW64\Caeiam32.exeC:\Windows\system32\Caeiam32.exe14⤵PID:5756
-
C:\Windows\SysWOW64\Cknnjcmo.exeC:\Windows\system32\Cknnjcmo.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5800 -
C:\Windows\SysWOW64\Cahffmel.exeC:\Windows\system32\Cahffmel.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5876 -
C:\Windows\SysWOW64\Dogfkpih.exeC:\Windows\system32\Dogfkpih.exe17⤵PID:5924
-
C:\Windows\SysWOW64\Deanhj32.exeC:\Windows\system32\Deanhj32.exe18⤵
- Drops file in System32 directory
- Modifies registry class
PID:6000 -
C:\Windows\SysWOW64\Eleikb32.exeC:\Windows\system32\Eleikb32.exe19⤵PID:6044
-
C:\Windows\SysWOW64\Ecoahmhd.exeC:\Windows\system32\Ecoahmhd.exe20⤵PID:6092
-
C:\Windows\SysWOW64\Fhljpcfk.exeC:\Windows\system32\Fhljpcfk.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5168 -
C:\Windows\SysWOW64\Giqlbqcc.exeC:\Windows\system32\Giqlbqcc.exe22⤵PID:5264
-
C:\Windows\SysWOW64\Hbnjfefo.exeC:\Windows\system32\Hbnjfefo.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3020 -
C:\Windows\SysWOW64\Immaimnj.exeC:\Windows\system32\Immaimnj.exe24⤵PID:5248
-
C:\Windows\SysWOW64\Ibijbc32.exeC:\Windows\system32\Ibijbc32.exe25⤵PID:5372
-
C:\Windows\SysWOW64\Jmmjpjpg.exeC:\Windows\system32\Jmmjpjpg.exe26⤵PID:5472
-
C:\Windows\SysWOW64\Jcgbmd32.exeC:\Windows\system32\Jcgbmd32.exe27⤵PID:5552
-
C:\Windows\SysWOW64\Jehoemmb.exeC:\Windows\system32\Jehoemmb.exe28⤵
- Drops file in System32 directory
PID:5628 -
C:\Windows\SysWOW64\Kdiobd32.exeC:\Windows\system32\Kdiobd32.exe29⤵
- Modifies registry class
PID:2724 -
C:\Windows\SysWOW64\Kmbdkj32.exeC:\Windows\system32\Kmbdkj32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5712 -
C:\Windows\SysWOW64\Klimbf32.exeC:\Windows\system32\Klimbf32.exe31⤵
- Drops file in System32 directory
PID:5752 -
C:\Windows\SysWOW64\Kfoapo32.exeC:\Windows\system32\Kfoapo32.exe32⤵PID:5852
-
C:\Windows\SysWOW64\Klljhe32.exeC:\Windows\system32\Klljhe32.exe33⤵PID:5840
-
C:\Windows\SysWOW64\Kfanen32.exeC:\Windows\system32\Kfanen32.exe34⤵
- Modifies registry class
PID:5932 -
C:\Windows\SysWOW64\Llngmeja.exeC:\Windows\system32\Llngmeja.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\Lbhojo32.exeC:\Windows\system32\Lbhojo32.exe36⤵PID:5960
-
C:\Windows\SysWOW64\Libggiik.exeC:\Windows\system32\Libggiik.exe37⤵
- Drops file in System32 directory
PID:6080 -
C:\Windows\SysWOW64\Mphoob32.exeC:\Windows\system32\Mphoob32.exe38⤵PID:1744
-
C:\Windows\SysWOW64\Medggidb.exeC:\Windows\system32\Medggidb.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1624 -
C:\Windows\SysWOW64\Mlnpdc32.exeC:\Windows\system32\Mlnpdc32.exe40⤵
- Drops file in System32 directory
- Modifies registry class
PID:1336 -
C:\Windows\SysWOW64\Mgddal32.exeC:\Windows\system32\Mgddal32.exe41⤵PID:5296
-
C:\Windows\SysWOW64\Npfkqpjk.exeC:\Windows\system32\Npfkqpjk.exe42⤵PID:5256
-
C:\Windows\SysWOW64\Njnpie32.exeC:\Windows\system32\Njnpie32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5404 -
C:\Windows\SysWOW64\Pmmelo32.exeC:\Windows\system32\Pmmelo32.exe44⤵PID:5536
-
C:\Windows\SysWOW64\Qfaiabnp.exeC:\Windows\system32\Qfaiabnp.exe45⤵PID:5692
-
C:\Windows\SysWOW64\Bjddinbn.exeC:\Windows\system32\Bjddinbn.exe46⤵
- Executes dropped EXE
PID:324 -
C:\Windows\SysWOW64\Canlfh32.exeC:\Windows\system32\Canlfh32.exe47⤵PID:5812
-
C:\Windows\SysWOW64\Cjfaon32.exeC:\Windows\system32\Cjfaon32.exe48⤵PID:5836
-
C:\Windows\SysWOW64\Cdoegcfl.exeC:\Windows\system32\Cdoegcfl.exe49⤵PID:5996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Cnffjl32.exeC:\Windows\system32\Cnffjl32.exe1⤵
- Modifies registry class
PID:6020 -
C:\Windows\SysWOW64\Cnicpk32.exeC:\Windows\system32\Cnicpk32.exe2⤵PID:6076
-
-
C:\Windows\SysWOW64\Dajlafon.exeC:\Windows\system32\Dajlafon.exe1⤵PID:6136
-
C:\Windows\SysWOW64\Dhcdnq32.exeC:\Windows\system32\Dhcdnq32.exe2⤵PID:1308
-
C:\Windows\SysWOW64\Donlkjng.exeC:\Windows\system32\Donlkjng.exe3⤵
- Executes dropped EXE
PID:456 -
C:\Windows\SysWOW64\Ddjecalo.exeC:\Windows\system32\Ddjecalo.exe4⤵PID:5244
-
C:\Windows\SysWOW64\Dopiqj32.exeC:\Windows\system32\Dopiqj32.exe5⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\Dejamdca.exeC:\Windows\system32\Dejamdca.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1384 -
C:\Windows\SysWOW64\Dkgjekai.exeC:\Windows\system32\Dkgjekai.exe7⤵PID:2424
-
C:\Windows\SysWOW64\Dkkcqj32.exeC:\Windows\system32\Dkkcqj32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3476 -
C:\Windows\SysWOW64\Eaekmdep.exeC:\Windows\system32\Eaekmdep.exe9⤵PID:5364
-
C:\Windows\SysWOW64\Emllbe32.exeC:\Windows\system32\Emllbe32.exe10⤵
- Modifies registry class
PID:1212
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Eggmqk32.exeC:\Windows\system32\Eggmqk32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4916 -
C:\Windows\SysWOW64\Ealanc32.exeC:\Windows\system32\Ealanc32.exe2⤵PID:5560
-
C:\Windows\SysWOW64\Egijfjmp.exeC:\Windows\system32\Egijfjmp.exe3⤵PID:5648
-
C:\Windows\SysWOW64\Eejjdb32.exeC:\Windows\system32\Eejjdb32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5740 -
C:\Windows\SysWOW64\Faakickc.exeC:\Windows\system32\Faakickc.exe5⤵PID:6028
-
C:\Windows\SysWOW64\Fkqebg32.exeC:\Windows\system32\Fkqebg32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3000 -
C:\Windows\SysWOW64\Fefjpp32.exeC:\Windows\system32\Fefjpp32.exe7⤵PID:6032
-
C:\Windows\SysWOW64\Gkcbhgii.exeC:\Windows\system32\Gkcbhgii.exe8⤵
- Drops file in System32 directory
PID:2404 -
C:\Windows\SysWOW64\Gehfepio.exeC:\Windows\system32\Gehfepio.exe9⤵PID:3728
-
C:\Windows\SysWOW64\Gaogja32.exeC:\Windows\system32\Gaogja32.exe10⤵PID:4144
-
C:\Windows\SysWOW64\Ghiogkfp.exeC:\Windows\system32\Ghiogkfp.exe11⤵PID:1948
-
C:\Windows\SysWOW64\Gochceml.exeC:\Windows\system32\Gochceml.exe12⤵
- Executes dropped EXE
PID:4480 -
C:\Windows\SysWOW64\Hgcfcg32.exeC:\Windows\system32\Hgcfcg32.exe13⤵PID:1328
-
C:\Windows\SysWOW64\Hbhjqp32.exeC:\Windows\system32\Hbhjqp32.exe14⤵PID:3168
-
C:\Windows\SysWOW64\Hkaoiemi.exeC:\Windows\system32\Hkaoiemi.exe15⤵
- Modifies registry class
PID:5496 -
C:\Windows\SysWOW64\Hbkgfode.exeC:\Windows\system32\Hbkgfode.exe16⤵PID:5656
-
C:\Windows\SysWOW64\Hkehdd32.exeC:\Windows\system32\Hkehdd32.exe17⤵PID:5644
-
C:\Windows\SysWOW64\Hdnlmj32.exeC:\Windows\system32\Hdnlmj32.exe18⤵PID:3024
-
C:\Windows\SysWOW64\Hocqkc32.exeC:\Windows\system32\Hocqkc32.exe19⤵PID:5912
-
C:\Windows\SysWOW64\Ifglmlol.exeC:\Windows\system32\Ifglmlol.exe20⤵PID:488
-
C:\Windows\SysWOW64\Jgdhab32.exeC:\Windows\system32\Jgdhab32.exe21⤵PID:5208
-
C:\Windows\SysWOW64\Kfiajinf.exeC:\Windows\system32\Kfiajinf.exe22⤵PID:3080
-
C:\Windows\SysWOW64\Kngcdkjo.exeC:\Windows\system32\Kngcdkjo.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Lbekjipe.exeC:\Windows\system32\Lbekjipe.exe1⤵PID:1688
-
C:\Windows\SysWOW64\Lechfeoi.exeC:\Windows\system32\Lechfeoi.exe2⤵PID:2904
-
C:\Windows\SysWOW64\Llmpco32.exeC:\Windows\system32\Llmpco32.exe3⤵
- Drops file in System32 directory
PID:4716 -
C:\Windows\SysWOW64\Lbghpinc.exeC:\Windows\system32\Lbghpinc.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:384 -
C:\Windows\SysWOW64\Liaqlcep.exeC:\Windows\system32\Liaqlcep.exe5⤵PID:1868
-
C:\Windows\SysWOW64\Lpkiim32.exeC:\Windows\system32\Lpkiim32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:524 -
C:\Windows\SysWOW64\Lfeaegdi.exeC:\Windows\system32\Lfeaegdi.exe7⤵PID:3300
-
C:\Windows\SysWOW64\Llbinnbq.exeC:\Windows\system32\Llbinnbq.exe8⤵
- Drops file in System32 directory
PID:4156 -
C:\Windows\SysWOW64\Lblakh32.exeC:\Windows\system32\Lblakh32.exe9⤵PID:6124
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Lifjgb32.exeC:\Windows\system32\Lifjgb32.exe1⤵PID:2960
-
C:\Windows\SysWOW64\Lbnnphhk.exeC:\Windows\system32\Lbnnphhk.exe2⤵PID:5200
-
C:\Windows\SysWOW64\Lihfmb32.exeC:\Windows\system32\Lihfmb32.exe3⤵PID:4524
-
C:\Windows\SysWOW64\Moglkikl.exeC:\Windows\system32\Moglkikl.exe4⤵PID:4748
-
C:\Windows\SysWOW64\Mimphakb.exeC:\Windows\system32\Mimphakb.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\Mlbbel32.exeC:\Windows\system32\Mlbbel32.exe6⤵PID:4132
-
C:\Windows\SysWOW64\Ohebek32.exeC:\Windows\system32\Ohebek32.exe7⤵PID:4728
-
C:\Windows\SysWOW64\Oookbega.exeC:\Windows\system32\Oookbega.exe8⤵PID:3492
-
C:\Windows\SysWOW64\Oidopn32.exeC:\Windows\system32\Oidopn32.exe9⤵PID:1740
-
C:\Windows\SysWOW64\Ooaghe32.exeC:\Windows\system32\Ooaghe32.exe10⤵PID:968
-
C:\Windows\SysWOW64\Ohjlqklp.exeC:\Windows\system32\Ohjlqklp.exe11⤵PID:5820
-
C:\Windows\SysWOW64\Ohnelj32.exeC:\Windows\system32\Ohnelj32.exe12⤵PID:1864
-
C:\Windows\SysWOW64\Poodicio.exeC:\Windows\system32\Poodicio.exe13⤵PID:3996
-
C:\Windows\SysWOW64\Pgihppgo.exeC:\Windows\system32\Pgihppgo.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1348 -
C:\Windows\SysWOW64\Qqamieno.exeC:\Windows\system32\Qqamieno.exe15⤵PID:5028
-
C:\Windows\SysWOW64\Qjiaak32.exeC:\Windows\system32\Qjiaak32.exe16⤵PID:5088
-
C:\Windows\SysWOW64\Qofjjb32.exeC:\Windows\system32\Qofjjb32.exe17⤵PID:1920
-
C:\Windows\SysWOW64\Qfpbfljd.exeC:\Windows\system32\Qfpbfljd.exe18⤵PID:1484
-
C:\Windows\SysWOW64\Amaqde32.exeC:\Windows\system32\Amaqde32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Fibocnnj.exeC:\Windows\system32\Fibocnnj.exe1⤵PID:2396
-
C:\Windows\SysWOW64\Gdhcagnp.exeC:\Windows\system32\Gdhcagnp.exe2⤵
- Executes dropped EXE
PID:4640 -
C:\Windows\SysWOW64\Gkbkna32.exeC:\Windows\system32\Gkbkna32.exe3⤵PID:748
-
C:\Windows\SysWOW64\Gdjpff32.exeC:\Windows\system32\Gdjpff32.exe4⤵PID:1360
-
C:\Windows\SysWOW64\Gkdhcqcj.exeC:\Windows\system32\Gkdhcqcj.exe5⤵PID:4472
-
C:\Windows\SysWOW64\Ghhhmebd.exeC:\Windows\system32\Ghhhmebd.exe6⤵PID:3140
-
-
-
-
-
-
C:\Windows\SysWOW64\Gaqmej32.exeC:\Windows\system32\Gaqmej32.exe1⤵PID:4444
-
C:\Windows\SysWOW64\Ghmbhd32.exeC:\Windows\system32\Ghmbhd32.exe2⤵PID:3112
-
-
C:\Windows\SysWOW64\Haefqjeo.exeC:\Windows\system32\Haefqjeo.exe1⤵PID:4824
-
C:\Windows\SysWOW64\Hhoomd32.exeC:\Windows\system32\Hhoomd32.exe2⤵
- Executes dropped EXE
PID:3184 -
C:\Windows\SysWOW64\Hjqkel32.exeC:\Windows\system32\Hjqkel32.exe3⤵PID:4736
-
C:\Windows\SysWOW64\Hpkcafjg.exeC:\Windows\system32\Hpkcafjg.exe4⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\Hgdlnp32.exeC:\Windows\system32\Hgdlnp32.exe5⤵PID:4908
-
C:\Windows\SysWOW64\Ikijenab.exeC:\Windows\system32\Ikijenab.exe6⤵PID:4468
-
C:\Windows\SysWOW64\Iacbbh32.exeC:\Windows\system32\Iacbbh32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\Iafogggl.exeC:\Windows\system32\Iafogggl.exe8⤵PID:1116
-
C:\Windows\SysWOW64\Ihpgda32.exeC:\Windows\system32\Ihpgda32.exe9⤵
- Drops file in System32 directory
PID:2204
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Oefpoi32.exeC:\Windows\system32\Oefpoi32.exe1⤵PID:2900
-
C:\Windows\SysWOW64\Okbhgq32.exeC:\Windows\system32\Okbhgq32.exe2⤵PID:5148
-
C:\Windows\SysWOW64\Oampdkbj.exeC:\Windows\system32\Oampdkbj.exe3⤵PID:6156
-
C:\Windows\SysWOW64\Okedmp32.exeC:\Windows\system32\Okedmp32.exe4⤵PID:6196
-
C:\Windows\SysWOW64\Ohiefdhd.exeC:\Windows\system32\Ohiefdhd.exe5⤵PID:6244
-
C:\Windows\SysWOW64\Aadokg32.exeC:\Windows\system32\Aadokg32.exe6⤵PID:6296
-
C:\Windows\SysWOW64\Aljcip32.exeC:\Windows\system32\Aljcip32.exe7⤵PID:6352
-
C:\Windows\SysWOW64\Afinbdon.exeC:\Windows\system32\Afinbdon.exe8⤵PID:6400
-
C:\Windows\SysWOW64\Bcmolimg.exeC:\Windows\system32\Bcmolimg.exe9⤵PID:6452
-
C:\Windows\SysWOW64\Bbbkmebo.exeC:\Windows\system32\Bbbkmebo.exe10⤵PID:6500
-
C:\Windows\SysWOW64\Bkjpek32.exeC:\Windows\system32\Bkjpek32.exe11⤵PID:6544
-
C:\Windows\SysWOW64\Bbdhbepl.exeC:\Windows\system32\Bbdhbepl.exe12⤵PID:6640
-
C:\Windows\SysWOW64\Cbbdcc32.exeC:\Windows\system32\Cbbdcc32.exe13⤵PID:6680
-
C:\Windows\SysWOW64\Cilmpmki.exeC:\Windows\system32\Cilmpmki.exe14⤵PID:6728
-
C:\Windows\SysWOW64\Ccbanfko.exeC:\Windows\system32\Ccbanfko.exe15⤵PID:6772
-
C:\Windows\SysWOW64\Cjlijp32.exeC:\Windows\system32\Cjlijp32.exe16⤵PID:6840
-
C:\Windows\SysWOW64\Dcgjie32.exeC:\Windows\system32\Dcgjie32.exe17⤵PID:6908
-
C:\Windows\SysWOW64\Dpphcf32.exeC:\Windows\system32\Dpphcf32.exe18⤵PID:6948
-
C:\Windows\SysWOW64\Dbndoa32.exeC:\Windows\system32\Dbndoa32.exe19⤵PID:6996
-
C:\Windows\SysWOW64\Dmdhmj32.exeC:\Windows\system32\Dmdhmj32.exe20⤵PID:7040
-
C:\Windows\SysWOW64\Dbqqeahl.exeC:\Windows\system32\Dbqqeahl.exe21⤵PID:7088
-
C:\Windows\SysWOW64\Elienf32.exeC:\Windows\system32\Elienf32.exe22⤵PID:7132
-
C:\Windows\SysWOW64\Ebggep32.exeC:\Windows\system32\Ebggep32.exe23⤵PID:6152
-
C:\Windows\SysWOW64\Eplgod32.exeC:\Windows\system32\Eplgod32.exe24⤵PID:6256
-
C:\Windows\SysWOW64\Fmdach32.exeC:\Windows\system32\Fmdach32.exe25⤵PID:6284
-
C:\Windows\SysWOW64\Fjhaml32.exeC:\Windows\system32\Fjhaml32.exe26⤵PID:5308
-
C:\Windows\SysWOW64\Glenpb32.exeC:\Windows\system32\Glenpb32.exe27⤵PID:6380
-
C:\Windows\SysWOW64\Gbofmmmj.exeC:\Windows\system32\Gbofmmmj.exe28⤵PID:5532
-
C:\Windows\SysWOW64\Giinjg32.exeC:\Windows\system32\Giinjg32.exe29⤵PID:6484
-
C:\Windows\SysWOW64\Gpcffalc.exeC:\Windows\system32\Gpcffalc.exe30⤵PID:6532
-
C:\Windows\SysWOW64\Ggmock32.exeC:\Windows\system32\Ggmock32.exe31⤵PID:6604
-
C:\Windows\SysWOW64\Gmggpekm.exeC:\Windows\system32\Gmggpekm.exe32⤵PID:5572
-
C:\Windows\SysWOW64\Gpeclq32.exeC:\Windows\system32\Gpeclq32.exe33⤵PID:6664
-
C:\Windows\SysWOW64\Hkkgii32.exeC:\Windows\system32\Hkkgii32.exe34⤵PID:6740
-
C:\Windows\SysWOW64\Hmicee32.exeC:\Windows\system32\Hmicee32.exe35⤵PID:6820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Hdclbopg.exeC:\Windows\system32\Hdclbopg.exe1⤵PID:6848
-
C:\Windows\SysWOW64\Hkmdoi32.exeC:\Windows\system32\Hkmdoi32.exe2⤵PID:5716
-
C:\Windows\SysWOW64\Hlnqfanb.exeC:\Windows\system32\Hlnqfanb.exe3⤵PID:6928
-
C:\Windows\SysWOW64\Hchickeo.exeC:\Windows\system32\Hchickeo.exe4⤵PID:6980
-
C:\Windows\SysWOW64\Hibape32.exeC:\Windows\system32\Hibape32.exe5⤵PID:7020
-
C:\Windows\SysWOW64\Hplimpdi.exeC:\Windows\system32\Hplimpdi.exe6⤵PID:7128
-
C:\Windows\SysWOW64\Hienee32.exeC:\Windows\system32\Hienee32.exe7⤵PID:6148
-
C:\Windows\SysWOW64\Hpofbobf.exeC:\Windows\system32\Hpofbobf.exe8⤵PID:5880
-
C:\Windows\SysWOW64\Hginoiic.exeC:\Windows\system32\Hginoiic.exe9⤵PID:6232
-
C:\Windows\SysWOW64\Hmbflc32.exeC:\Windows\system32\Hmbflc32.exe10⤵PID:5500
-
C:\Windows\SysWOW64\Idoknmfj.exeC:\Windows\system32\Idoknmfj.exe11⤵PID:6280
-
C:\Windows\SysWOW64\Ingpgcmj.exeC:\Windows\system32\Ingpgcmj.exe12⤵PID:6408
-
C:\Windows\SysWOW64\Idahcm32.exeC:\Windows\system32\Idahcm32.exe13⤵PID:6432
-
C:\Windows\SysWOW64\Ijnqld32.exeC:\Windows\system32\Ijnqld32.exe14⤵PID:6524
-
C:\Windows\SysWOW64\Iphihnjk.exeC:\Windows\system32\Iphihnjk.exe15⤵PID:6632
-
C:\Windows\SysWOW64\Jdhndlno.exeC:\Windows\system32\Jdhndlno.exe16⤵PID:6672
-
C:\Windows\SysWOW64\Jlcchn32.exeC:\Windows\system32\Jlcchn32.exe17⤵PID:6828
-
C:\Windows\SysWOW64\Jcmkehcg.exeC:\Windows\system32\Jcmkehcg.exe18⤵PID:5732
-
C:\Windows\SysWOW64\Jncobabm.exeC:\Windows\system32\Jncobabm.exe19⤵PID:6920
-
C:\Windows\SysWOW64\Jdmgok32.exeC:\Windows\system32\Jdmgok32.exe20⤵PID:7064
-
C:\Windows\SysWOW64\Jqhaolli.exeC:\Windows\system32\Jqhaolli.exe21⤵PID:380
-
C:\Windows\SysWOW64\Kmobdm32.exeC:\Windows\system32\Kmobdm32.exe22⤵PID:7164
-
C:\Windows\SysWOW64\Kcikagij.exeC:\Windows\system32\Kcikagij.exe23⤵PID:6308
-
C:\Windows\SysWOW64\Kmhejk32.exeC:\Windows\system32\Kmhejk32.exe24⤵
- Drops file in System32 directory
PID:5924 -
C:\Windows\SysWOW64\Lcbngeqo.exeC:\Windows\system32\Lcbngeqo.exe25⤵PID:6360
-
C:\Windows\SysWOW64\Lkjehbaa.exeC:\Windows\system32\Lkjehbaa.exe26⤵PID:6468
-
C:\Windows\SysWOW64\Lqfnqjpi.exeC:\Windows\system32\Lqfnqjpi.exe27⤵PID:5664
-
C:\Windows\SysWOW64\Lclpmdhd.exeC:\Windows\system32\Lclpmdhd.exe28⤵PID:7048
-
C:\Windows\SysWOW64\Madjbg32.exeC:\Windows\system32\Madjbg32.exe29⤵PID:5900
-
C:\Windows\SysWOW64\Mgoboake.exeC:\Windows\system32\Mgoboake.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6092 -
C:\Windows\SysWOW64\Maggggaf.exeC:\Windows\system32\Maggggaf.exe31⤵PID:5312
-
C:\Windows\SysWOW64\Mklkepal.exeC:\Windows\system32\Mklkepal.exe32⤵PID:5896
-
C:\Windows\SysWOW64\Nhokeolc.exeC:\Windows\system32\Nhokeolc.exe33⤵PID:5188
-
C:\Windows\SysWOW64\Oagpne32.exeC:\Windows\system32\Oagpne32.exe34⤵PID:5360
-
C:\Windows\SysWOW64\Ohceqo32.exeC:\Windows\system32\Ohceqo32.exe35⤵PID:6588
-
C:\Windows\SysWOW64\Oaliidon.exeC:\Windows\system32\Oaliidon.exe36⤵PID:6716
-
C:\Windows\SysWOW64\Odjeepna.exeC:\Windows\system32\Odjeepna.exe37⤵
- Modifies registry class
PID:5264 -
C:\Windows\SysWOW64\Ojdnbj32.exeC:\Windows\system32\Ojdnbj32.exe38⤵PID:5936
-
C:\Windows\SysWOW64\Oanfodmk.exeC:\Windows\system32\Oanfodmk.exe39⤵PID:5272
-
C:\Windows\SysWOW64\Oldjlm32.exeC:\Windows\system32\Oldjlm32.exe40⤵PID:6876
-
C:\Windows\SysWOW64\Omegdebp.exeC:\Windows\system32\Omegdebp.exe41⤵PID:7120
-
C:\Windows\SysWOW64\Odooqo32.exeC:\Windows\system32\Odooqo32.exe42⤵PID:5828
-
C:\Windows\SysWOW64\Podcnh32.exeC:\Windows\system32\Podcnh32.exe43⤵PID:5520
-
C:\Windows\SysWOW64\Peokkbao.exeC:\Windows\system32\Peokkbao.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5552 -
C:\Windows\SysWOW64\Pogpcghp.exeC:\Windows\system32\Pogpcghp.exe45⤵PID:6024
-
C:\Windows\SysWOW64\Paelpcgc.exeC:\Windows\system32\Paelpcgc.exe46⤵PID:5152
-
C:\Windows\SysWOW64\Plkpmlfi.exeC:\Windows\system32\Plkpmlfi.exe47⤵PID:4320
-
C:\Windows\SysWOW64\Pmlmdd32.exeC:\Windows\system32\Pmlmdd32.exe48⤵PID:5136
-
C:\Windows\SysWOW64\Pdfeandd.exeC:\Windows\system32\Pdfeandd.exe49⤵PID:5856
-
C:\Windows\SysWOW64\Pkpmnh32.exeC:\Windows\system32\Pkpmnh32.exe50⤵PID:3540
-
C:\Windows\SysWOW64\Pajekb32.exeC:\Windows\system32\Pajekb32.exe51⤵PID:5808
-
C:\Windows\SysWOW64\Pmafpchb.exeC:\Windows\system32\Pmafpchb.exe52⤵PID:7096
-
C:\Windows\SysWOW64\Phfjmlhh.exeC:\Windows\system32\Phfjmlhh.exe53⤵PID:5476
-
C:\Windows\SysWOW64\Qmccecfp.exeC:\Windows\system32\Qmccecfp.exe54⤵PID:1744
-
C:\Windows\SysWOW64\Qdmkbmnl.exeC:\Windows\system32\Qdmkbmnl.exe55⤵PID:6344
-
C:\Windows\SysWOW64\Cleeafbi.exeC:\Windows\system32\Cleeafbi.exe56⤵PID:1648
-
C:\Windows\SysWOW64\Dhnbkfek.exeC:\Windows\system32\Dhnbkfek.exe57⤵PID:6816
-
C:\Windows\SysWOW64\Dnkkcmdb.exeC:\Windows\system32\Dnkkcmdb.exe58⤵PID:6648
-
C:\Windows\SysWOW64\Dojgnpke.exeC:\Windows\system32\Dojgnpke.exe59⤵PID:5436
-
C:\Windows\SysWOW64\Dmnhgdjo.exeC:\Windows\system32\Dmnhgdjo.exe60⤵PID:5536
-
C:\Windows\SysWOW64\Efpofi32.exeC:\Windows\system32\Efpofi32.exe61⤵PID:5744
-
C:\Windows\SysWOW64\Ekmhnpfl.exeC:\Windows\system32\Ekmhnpfl.exe62⤵PID:6712
-
C:\Windows\SysWOW64\Eiahhdee.exeC:\Windows\system32\Eiahhdee.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4280 -
C:\Windows\SysWOW64\Fpfppl32.exeC:\Windows\system32\Fpfppl32.exe64⤵PID:6392
-
C:\Windows\SysWOW64\Giaaoa32.exeC:\Windows\system32\Giaaoa32.exe65⤵PID:5368
-
C:\Windows\SysWOW64\Gpkiklop.exeC:\Windows\system32\Gpkiklop.exe66⤵
- Drops file in System32 directory
- Modifies registry class
PID:2424 -
C:\Windows\SysWOW64\Hoobnf32.exeC:\Windows\system32\Hoobnf32.exe67⤵PID:6868
-
C:\Windows\SysWOW64\Hifcqo32.exeC:\Windows\system32\Hifcqo32.exe68⤵PID:5356
-
C:\Windows\SysWOW64\Ibohid32.exeC:\Windows\system32\Ibohid32.exe69⤵PID:560
-
C:\Windows\SysWOW64\Iiipfnch.exeC:\Windows\system32\Iiipfnch.exe70⤵PID:5548
-
C:\Windows\SysWOW64\Ioeineap.exeC:\Windows\system32\Ioeineap.exe71⤵PID:4772
-
C:\Windows\SysWOW64\Iepako32.exeC:\Windows\system32\Iepako32.exe72⤵
- Modifies registry class
PID:1308 -
C:\Windows\SysWOW64\Iohede32.exeC:\Windows\system32\Iohede32.exe73⤵PID:5844
-
C:\Windows\SysWOW64\Iimjan32.exeC:\Windows\system32\Iimjan32.exe74⤵
- Modifies registry class
PID:6028 -
C:\Windows\SysWOW64\Igajka32.exeC:\Windows\system32\Igajka32.exe75⤵PID:1564
-
C:\Windows\SysWOW64\Ilnbch32.exeC:\Windows\system32\Ilnbch32.exe76⤵PID:5812
-
C:\Windows\SysWOW64\Ichkpb32.exeC:\Windows\system32\Ichkpb32.exe77⤵PID:3588
-
C:\Windows\SysWOW64\Iibclmkn.exeC:\Windows\system32\Iibclmkn.exe78⤵PID:5708
-
C:\Windows\SysWOW64\Jookdcie.exeC:\Windows\system32\Jookdcie.exe79⤵PID:764
-
C:\Windows\SysWOW64\Jidpblik.exeC:\Windows\system32\Jidpblik.exe80⤵PID:5836
-
C:\Windows\SysWOW64\Joahjcgb.exeC:\Windows\system32\Joahjcgb.exe81⤵PID:5364
-
C:\Windows\SysWOW64\Jiglgl32.exeC:\Windows\system32\Jiglgl32.exe82⤵PID:5568
-
C:\Windows\SysWOW64\Jocepc32.exeC:\Windows\system32\Jocepc32.exe83⤵PID:6552
-
C:\Windows\SysWOW64\Jndenjmo.exeC:\Windows\system32\Jndenjmo.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6136 -
C:\Windows\SysWOW64\Jcanfakf.exeC:\Windows\system32\Jcanfakf.exe85⤵PID:5228
-
C:\Windows\SysWOW64\Jljbogaf.exeC:\Windows\system32\Jljbogaf.exe86⤵
- Drops file in System32 directory
- Modifies registry class
PID:5244 -
C:\Windows\SysWOW64\Jgoflpal.exeC:\Windows\system32\Jgoflpal.exe87⤵PID:5784
-
C:\Windows\SysWOW64\Kllodfpd.exeC:\Windows\system32\Kllodfpd.exe88⤵PID:5268
-
C:\Windows\SysWOW64\Kgacaopj.exeC:\Windows\system32\Kgacaopj.exe89⤵PID:4584
-
C:\Windows\SysWOW64\Kloljf32.exeC:\Windows\system32\Kloljf32.exe90⤵PID:5116
-
C:\Windows\SysWOW64\Knnhdied.exeC:\Windows\system32\Knnhdied.exe91⤵PID:3440
-
C:\Windows\SysWOW64\Kckqlpck.exeC:\Windows\system32\Kckqlpck.exe92⤵PID:6076
-
C:\Windows\SysWOW64\Kcpjgo32.exeC:\Windows\system32\Kcpjgo32.exe93⤵PID:456
-
C:\Windows\SysWOW64\Llhnpe32.exeC:\Windows\system32\Llhnpe32.exe94⤵PID:3372
-
C:\Windows\SysWOW64\Mqfpma32.exeC:\Windows\system32\Mqfpma32.exe95⤵PID:5416
-
C:\Windows\SysWOW64\Mgphjk32.exeC:\Windows\system32\Mgphjk32.exe96⤵
- Drops file in System32 directory
PID:5996 -
C:\Windows\SysWOW64\Mmmqbb32.exeC:\Windows\system32\Mmmqbb32.exe97⤵PID:2752
-
C:\Windows\SysWOW64\Nnafgd32.exeC:\Windows\system32\Nnafgd32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5208 -
C:\Windows\SysWOW64\Npbcollj.exeC:\Windows\system32\Npbcollj.exe99⤵PID:5584
-
C:\Windows\SysWOW64\Nnccmddi.exeC:\Windows\system32\Nnccmddi.exe100⤵PID:5908
-
C:\Windows\SysWOW64\Oplfekdp.exeC:\Windows\system32\Oplfekdp.exe101⤵PID:5848
-
C:\Windows\SysWOW64\Ogcnfheb.exeC:\Windows\system32\Ogcnfheb.exe102⤵PID:2960
-
C:\Windows\SysWOW64\Onapnbhi.exeC:\Windows\system32\Onapnbhi.exe103⤵PID:5864
-
C:\Windows\SysWOW64\Pfmdbd32.exeC:\Windows\system32\Pfmdbd32.exe104⤵PID:6880
-
C:\Windows\SysWOW64\Pabhpm32.exeC:\Windows\system32\Pabhpm32.exe105⤵PID:4524
-
C:\Windows\SysWOW64\Padeem32.exeC:\Windows\system32\Padeem32.exe106⤵PID:728
-
C:\Windows\SysWOW64\Phombg32.exeC:\Windows\system32\Phombg32.exe107⤵PID:4516
-
C:\Windows\SysWOW64\Pnifoaba.exeC:\Windows\system32\Pnifoaba.exe108⤵PID:5600
-
C:\Windows\SysWOW64\Ppjbfi32.exeC:\Windows\system32\Ppjbfi32.exe109⤵PID:5288
-
C:\Windows\SysWOW64\Pnkbdqpo.exeC:\Windows\system32\Pnkbdqpo.exe110⤵PID:2180
-
C:\Windows\SysWOW64\Pploli32.exeC:\Windows\system32\Pploli32.exe111⤵PID:2288
-
C:\Windows\SysWOW64\Pffghc32.exeC:\Windows\system32\Pffghc32.exe112⤵PID:2224
-
C:\Windows\SysWOW64\Afmmibga.exeC:\Windows\system32\Afmmibga.exe113⤵PID:1844
-
C:\Windows\SysWOW64\Amgefl32.exeC:\Windows\system32\Amgefl32.exe114⤵PID:3556
-
C:\Windows\SysWOW64\Afpjoaeo.exeC:\Windows\system32\Afpjoaeo.exe115⤵PID:5324
-
C:\Windows\SysWOW64\Adcjhf32.exeC:\Windows\system32\Adcjhf32.exe116⤵PID:1740
-
C:\Windows\SysWOW64\Amloakki.exeC:\Windows\system32\Amloakki.exe117⤵PID:216
-
C:\Windows\SysWOW64\Agdcja32.exeC:\Windows\system32\Agdcja32.exe118⤵PID:4248
-
C:\Windows\SysWOW64\Apmhbf32.exeC:\Windows\system32\Apmhbf32.exe119⤵PID:2208
-
C:\Windows\SysWOW64\Agfpoqog.exeC:\Windows\system32\Agfpoqog.exe120⤵PID:4384
-
C:\Windows\SysWOW64\Bmqhlk32.exeC:\Windows\system32\Bmqhlk32.exe121⤵PID:2676
-
C:\Windows\SysWOW64\Bgimepmd.exeC:\Windows\system32\Bgimepmd.exe122⤵PID:5820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-