Analysis
-
max time kernel
206s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12-11-2023 09:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe
Resource
win7-20231023-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe
-
Size
56KB
-
MD5
05259ea4cbf704ba38e8fb8ef78e4210
-
SHA1
51cb010cde91d2f3bfc4dfdd26e4edd1368c92d9
-
SHA256
74adac43430179d5268ebca1dd57090ee839b448d692bbdcd094b2b35ac6d147
-
SHA512
e57b28527931b2e66642b0f49ff06282316fe6f3e50ad7bfd26595fa68f41090737c0a027ae278d8ef91a699e55aa2746e520c0d3459989d845c3414677fd6cc
-
SSDEEP
1536:WMHOKZA8M3ADn84LGjG4/aVvy+Ro0SHdc/:8NoD8eGjyywoFHdc/
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahhhgh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afbbiafj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bblocaik.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plfhdlfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpegka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcccglnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Miphjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Okhgaqfj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okhgaqfj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpdihedp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddmaak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkkkgkla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmiaad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkcllmhb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbhfojgg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljmnjkmh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omjeba32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdffcn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahancp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjgdfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgkanomj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhjdadde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odnngfpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Labllf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpgimbmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anikdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oegflcbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmlngdhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckmfbf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acfcme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfccmini.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llnjac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acfcme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbgpip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pelpgb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkphcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dglmmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gckmgi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oandekcd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odlqafbg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baipemgk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bblpae32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ledpjdid.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aofhcmig.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odbhofjh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofmknifp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eobenc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fknlmggc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qjkbnp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onkmhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppacfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lellfe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mekhehea.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ookonp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plfhdlfb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qdkpomkb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqomqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfbgdndp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bngicb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmfnen32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkonbp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apanmf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnigcb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moomgmpm.exe -
Executes dropped EXE 64 IoCs
pid Process 2376 Dhlapc32.exe 2592 Nnpofe32.exe 2512 Ojgokflc.exe 2916 Oelcho32.exe 696 Opfdim32.exe 1700 Ofpmegpe.exe 872 Omjeba32.exe 1680 Omlahqeo.exe 2156 Obijpgcf.exe 1496 Oegflcbj.exe 2188 Plaoim32.exe 1628 Pfgcff32.exe 2268 Pldknmhd.exe 1656 Pbnckg32.exe 2364 Pelpgb32.exe 288 Plfhdlfb.exe 1144 Peolmb32.exe 1544 Pkkeeikj.exe 1620 Phoeomjc.exe 2108 Pmlngdhk.exe 608 Pdffcn32.exe 2368 Qkpnph32.exe 864 Qpmgho32.exe 2032 Qggoeilh.exe 1880 Qlcgmpkp.exe 1600 Qdkpomkb.exe 832 Ajghgd32.exe 2628 Alfdcp32.exe 2632 Aogmdk32.exe 2488 Aaeiqf32.exe 2900 Alknnodh.exe 524 Ahancp32.exe 2164 Aokfpjai.exe 2788 Afeold32.exe 1308 Aggkdlod.exe 2036 Bblpae32.exe 2000 Bdklnq32.exe 1736 Bjgdfg32.exe 1640 Bcpiombe.exe 2288 Bkgqpjch.exe 2328 Bqhbcqmj.exe 2060 Bbjoki32.exe 2340 Cjqglf32.exe 2180 Cmocha32.exe 1848 Conpdm32.exe 1272 Cejhld32.exe 1792 Cmapna32.exe 3044 Copljmpo.exe 1060 Cbnhfhoc.exe 2100 Cgkanomj.exe 1100 Cpbiolnl.exe 2836 Cbqekhmp.exe 672 Ceoagcld.exe 2432 Ndfppije.exe 1484 Bpfhfjgq.exe 1684 Ijmfiefj.exe 1524 Iojoalda.exe 2300 Jcekbk32.exe 1264 Jfdgnf32.exe 1888 Jjocoedg.exe 2680 Jkqpfmje.exe 2020 Jollgl32.exe 780 Jbkhcg32.exe 984 Jidppaio.exe -
Loads dropped DLL 64 IoCs
pid Process 2712 NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe 2712 NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe 2376 Dhlapc32.exe 2376 Dhlapc32.exe 2592 Nnpofe32.exe 2592 Nnpofe32.exe 2512 Ojgokflc.exe 2512 Ojgokflc.exe 2916 Oelcho32.exe 2916 Oelcho32.exe 696 Opfdim32.exe 696 Opfdim32.exe 1700 Ofpmegpe.exe 1700 Ofpmegpe.exe 872 Omjeba32.exe 872 Omjeba32.exe 1680 Omlahqeo.exe 1680 Omlahqeo.exe 2156 Obijpgcf.exe 2156 Obijpgcf.exe 1496 Oegflcbj.exe 1496 Oegflcbj.exe 2188 Plaoim32.exe 2188 Plaoim32.exe 1628 Pfgcff32.exe 1628 Pfgcff32.exe 2268 Pldknmhd.exe 2268 Pldknmhd.exe 1656 Pbnckg32.exe 1656 Pbnckg32.exe 2364 Pelpgb32.exe 2364 Pelpgb32.exe 288 Plfhdlfb.exe 288 Plfhdlfb.exe 1144 Peolmb32.exe 1144 Peolmb32.exe 1544 Pkkeeikj.exe 1544 Pkkeeikj.exe 1620 Phoeomjc.exe 1620 Phoeomjc.exe 2108 Pmlngdhk.exe 2108 Pmlngdhk.exe 608 Pdffcn32.exe 608 Pdffcn32.exe 2368 Qkpnph32.exe 2368 Qkpnph32.exe 864 Qpmgho32.exe 864 Qpmgho32.exe 2032 Qggoeilh.exe 2032 Qggoeilh.exe 1880 Qlcgmpkp.exe 1880 Qlcgmpkp.exe 1600 Qdkpomkb.exe 1600 Qdkpomkb.exe 832 Ajghgd32.exe 832 Ajghgd32.exe 2628 Alfdcp32.exe 2628 Alfdcp32.exe 2632 Aogmdk32.exe 2632 Aogmdk32.exe 2488 Aaeiqf32.exe 2488 Aaeiqf32.exe 2900 Alknnodh.exe 2900 Alknnodh.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Jollgl32.exe Jkqpfmje.exe File created C:\Windows\SysWOW64\Kjfkjipd.exe Jghonnaa.exe File created C:\Windows\SysWOW64\Bimdkidd.dll Aggkdlod.exe File opened for modification C:\Windows\SysWOW64\Ledpjdid.exe Kmdbkbpn.exe File opened for modification C:\Windows\SysWOW64\Fdfpfm32.exe Fknlmggc.exe File created C:\Windows\SysWOW64\Pcfgnbcj.exe Pqgkagcf.exe File created C:\Windows\SysWOW64\Cjqglf32.exe Bbjoki32.exe File opened for modification C:\Windows\SysWOW64\Copljmpo.exe Cmapna32.exe File created C:\Windows\SysWOW64\Mhfdgf32.dll Jkqpfmje.exe File opened for modification C:\Windows\SysWOW64\Lpgimbmb.exe Laeiaf32.exe File opened for modification C:\Windows\SysWOW64\Aijbekne.exe Afkfipna.exe File opened for modification C:\Windows\SysWOW64\Alfdcp32.exe Ajghgd32.exe File created C:\Windows\SysWOW64\Mcjihk32.exe Moomgmpm.exe File created C:\Windows\SysWOW64\Doblhg32.dll Eopehg32.exe File created C:\Windows\SysWOW64\Jandoelg.dll Madepihc.exe File created C:\Windows\SysWOW64\Bdhlahfn.exe Baipemgk.exe File created C:\Windows\SysWOW64\Pdffcn32.exe Pmlngdhk.exe File created C:\Windows\SysWOW64\Lndejb32.dll Ejmgjf32.exe File opened for modification C:\Windows\SysWOW64\Jqngac32.exe Jnpjeh32.exe File opened for modification C:\Windows\SysWOW64\Bebpplaf.exe Bagcom32.exe File opened for modification C:\Windows\SysWOW64\Mhlagcbb.exe Mdqege32.exe File created C:\Windows\SysWOW64\Ohdfdh32.dll Pjkfom32.exe File created C:\Windows\SysWOW64\Cemocilc.dll Baipemgk.exe File created C:\Windows\SysWOW64\Nnpbpemn.dll Omlahqeo.exe File created C:\Windows\SysWOW64\Ogdbjhgb.dll Qpmgho32.exe File created C:\Windows\SysWOW64\Bpfhfjgq.exe Ndfppije.exe File created C:\Windows\SysWOW64\Obpbhk32.exe Nndjhi32.exe File created C:\Windows\SysWOW64\Bjcgdojn.exe Bblocaik.exe File created C:\Windows\SysWOW64\Obijpgcf.exe Omlahqeo.exe File created C:\Windows\SysWOW64\Mpnncope.dll Jidppaio.exe File opened for modification C:\Windows\SysWOW64\Bagcom32.exe Bnigcb32.exe File created C:\Windows\SysWOW64\Imqkdcib.dll Kfhmhi32.exe File opened for modification C:\Windows\SysWOW64\Mmigdend.exe Mebpchmb.exe File created C:\Windows\SysWOW64\Kbdmdk32.exe Koeqhp32.exe File created C:\Windows\SysWOW64\Pkalbd32.exe Pjpojljg.exe File opened for modification C:\Windows\SysWOW64\Bokfaflj.exe Ammjekmg.exe File created C:\Windows\SysWOW64\Jcjfho32.exe Ejmgjf32.exe File created C:\Windows\SysWOW64\Manlhobe.dll Oandekcd.exe File opened for modification C:\Windows\SysWOW64\Afeold32.exe Aokfpjai.exe File opened for modification C:\Windows\SysWOW64\Abnpjnem.exe Akdgmd32.exe File created C:\Windows\SysWOW64\Eiocdand.exe Egpfheoa.exe File created C:\Windows\SysWOW64\Dfjqakek.dll Mhjdadde.exe File created C:\Windows\SysWOW64\Omjeba32.exe Ofpmegpe.exe File created C:\Windows\SysWOW64\Edpnfjap.exe Eobenc32.exe File opened for modification C:\Windows\SysWOW64\Linaph32.exe Lfoedm32.exe File created C:\Windows\SysWOW64\Pmbaklha.dll Cnlcoage.exe File created C:\Windows\SysWOW64\Afkfipna.exe Apanmf32.exe File created C:\Windows\SysWOW64\Ognoodja.dll Qdkpomkb.exe File created C:\Windows\SysWOW64\Mpgdaqmh.exe Mmigdend.exe File created C:\Windows\SysWOW64\Afbbiafj.exe Ajidnp32.exe File opened for modification C:\Windows\SysWOW64\Baeepm32.exe Bngicb32.exe File created C:\Windows\SysWOW64\Pdgmhigm.dll Jigmeagl.exe File opened for modification C:\Windows\SysWOW64\Peqidn32.exe Pcbmhb32.exe File opened for modification C:\Windows\SysWOW64\Kpjjcohd.exe Kkonbp32.exe File created C:\Windows\SysWOW64\Nhlmfg32.exe Ncoenpff.exe File created C:\Windows\SysWOW64\Aaggqj32.exe Anikdo32.exe File opened for modification C:\Windows\SysWOW64\Kfkjnh32.exe Kclmbm32.exe File created C:\Windows\SysWOW64\Ecidbfbb.exe Epkhfkco.exe File created C:\Windows\SysWOW64\Fkphcg32.exe Fdfpfm32.exe File created C:\Windows\SysWOW64\Glaejokn.exe Fnodob32.exe File opened for modification C:\Windows\SysWOW64\Bcpiombe.exe Bjgdfg32.exe File created C:\Windows\SysWOW64\Dplpln32.dll Pmqkellk.exe File created C:\Windows\SysWOW64\Peqidn32.exe Pcbmhb32.exe File created C:\Windows\SysWOW64\Jfgaknbb.dll Fnodob32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kclmbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Glaejokn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gmdapoil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohdfdh32.dll" Pjkfom32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpgdaqmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Miphjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mibeofaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Goomcc32.dll" Mhlagcbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pohngd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdlfpcnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfeonq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgfimf32.dll" Cnifia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbkmmi32.dll" Kqpcgcga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibbjgneh.dll" Pbnckg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfabkg32.dll" Makmnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Camlpldf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhlehppg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pelpgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caeaoj32.dll" Epfnkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfaeji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpedoh32.dll" Lgjfmlkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qlcgmpkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bpfhfjgq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmdnjf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jcjfho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcpkli32.dll" Aokfpjai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdklnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbienj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkegdfnd.dll" Abnpjnem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Elmoqlmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Koeqhp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lappffjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oegflcbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kapemg32.dll" Bcklmdqn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egpfheoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkkkgkla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efaglp32.dll" Opfdim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Diackmif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndkqom32.dll" Jqngac32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lfaaim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmphpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aepipcbp.dll" Lanmde32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bagcom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajghgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Anjjjn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omgefipb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knkkngol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ammjekmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddmaak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Copljmpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjocoedg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bihdfkoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jclcno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pkkeeikj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ceoagcld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ljfgil32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Camlpldf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfhbdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdcaldhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Plaoim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mheekb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bokfaflj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcadedfd.dll" Copljmpo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2376 2712 NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe 29 PID 2712 wrote to memory of 2376 2712 NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe 29 PID 2712 wrote to memory of 2376 2712 NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe 29 PID 2712 wrote to memory of 2376 2712 NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe 29 PID 2376 wrote to memory of 2592 2376 Dhlapc32.exe 30 PID 2376 wrote to memory of 2592 2376 Dhlapc32.exe 30 PID 2376 wrote to memory of 2592 2376 Dhlapc32.exe 30 PID 2376 wrote to memory of 2592 2376 Dhlapc32.exe 30 PID 2592 wrote to memory of 2512 2592 Nnpofe32.exe 31 PID 2592 wrote to memory of 2512 2592 Nnpofe32.exe 31 PID 2592 wrote to memory of 2512 2592 Nnpofe32.exe 31 PID 2592 wrote to memory of 2512 2592 Nnpofe32.exe 31 PID 2512 wrote to memory of 2916 2512 Ojgokflc.exe 32 PID 2512 wrote to memory of 2916 2512 Ojgokflc.exe 32 PID 2512 wrote to memory of 2916 2512 Ojgokflc.exe 32 PID 2512 wrote to memory of 2916 2512 Ojgokflc.exe 32 PID 2916 wrote to memory of 696 2916 Oelcho32.exe 33 PID 2916 wrote to memory of 696 2916 Oelcho32.exe 33 PID 2916 wrote to memory of 696 2916 Oelcho32.exe 33 PID 2916 wrote to memory of 696 2916 Oelcho32.exe 33 PID 696 wrote to memory of 1700 696 Opfdim32.exe 34 PID 696 wrote to memory of 1700 696 Opfdim32.exe 34 PID 696 wrote to memory of 1700 696 Opfdim32.exe 34 PID 696 wrote to memory of 1700 696 Opfdim32.exe 34 PID 1700 wrote to memory of 872 1700 Ofpmegpe.exe 35 PID 1700 wrote to memory of 872 1700 Ofpmegpe.exe 35 PID 1700 wrote to memory of 872 1700 Ofpmegpe.exe 35 PID 1700 wrote to memory of 872 1700 Ofpmegpe.exe 35 PID 872 wrote to memory of 1680 872 Omjeba32.exe 36 PID 872 wrote to memory of 1680 872 Omjeba32.exe 36 PID 872 wrote to memory of 1680 872 Omjeba32.exe 36 PID 872 wrote to memory of 1680 872 Omjeba32.exe 36 PID 1680 wrote to memory of 2156 1680 Omlahqeo.exe 37 PID 1680 wrote to memory of 2156 1680 Omlahqeo.exe 37 PID 1680 wrote to memory of 2156 1680 Omlahqeo.exe 37 PID 1680 wrote to memory of 2156 1680 Omlahqeo.exe 37 PID 2156 wrote to memory of 1496 2156 Obijpgcf.exe 38 PID 2156 wrote to memory of 1496 2156 Obijpgcf.exe 38 PID 2156 wrote to memory of 1496 2156 Obijpgcf.exe 38 PID 2156 wrote to memory of 1496 2156 Obijpgcf.exe 38 PID 1496 wrote to memory of 2188 1496 Oegflcbj.exe 39 PID 1496 wrote to memory of 2188 1496 Oegflcbj.exe 39 PID 1496 wrote to memory of 2188 1496 Oegflcbj.exe 39 PID 1496 wrote to memory of 2188 1496 Oegflcbj.exe 39 PID 2188 wrote to memory of 1628 2188 Plaoim32.exe 40 PID 2188 wrote to memory of 1628 2188 Plaoim32.exe 40 PID 2188 wrote to memory of 1628 2188 Plaoim32.exe 40 PID 2188 wrote to memory of 1628 2188 Plaoim32.exe 40 PID 1628 wrote to memory of 2268 1628 Pfgcff32.exe 41 PID 1628 wrote to memory of 2268 1628 Pfgcff32.exe 41 PID 1628 wrote to memory of 2268 1628 Pfgcff32.exe 41 PID 1628 wrote to memory of 2268 1628 Pfgcff32.exe 41 PID 2268 wrote to memory of 1656 2268 Pldknmhd.exe 42 PID 2268 wrote to memory of 1656 2268 Pldknmhd.exe 42 PID 2268 wrote to memory of 1656 2268 Pldknmhd.exe 42 PID 2268 wrote to memory of 1656 2268 Pldknmhd.exe 42 PID 1656 wrote to memory of 2364 1656 Pbnckg32.exe 43 PID 1656 wrote to memory of 2364 1656 Pbnckg32.exe 43 PID 1656 wrote to memory of 2364 1656 Pbnckg32.exe 43 PID 1656 wrote to memory of 2364 1656 Pbnckg32.exe 43 PID 2364 wrote to memory of 288 2364 Pelpgb32.exe 44 PID 2364 wrote to memory of 288 2364 Pelpgb32.exe 44 PID 2364 wrote to memory of 288 2364 Pelpgb32.exe 44 PID 2364 wrote to memory of 288 2364 Pelpgb32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.05259ea4cbf704ba38e8fb8ef78e4210.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Dhlapc32.exeC:\Windows\system32\Dhlapc32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Nnpofe32.exeC:\Windows\system32\Nnpofe32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\Ojgokflc.exeC:\Windows\system32\Ojgokflc.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\Oelcho32.exeC:\Windows\system32\Oelcho32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\Opfdim32.exeC:\Windows\system32\Opfdim32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\Ofpmegpe.exeC:\Windows\system32\Ofpmegpe.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\Omjeba32.exeC:\Windows\system32\Omjeba32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\Omlahqeo.exeC:\Windows\system32\Omlahqeo.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\Obijpgcf.exeC:\Windows\system32\Obijpgcf.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\Oegflcbj.exeC:\Windows\system32\Oegflcbj.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\Plaoim32.exeC:\Windows\system32\Plaoim32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Pfgcff32.exeC:\Windows\system32\Pfgcff32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Pldknmhd.exeC:\Windows\system32\Pldknmhd.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\Pbnckg32.exeC:\Windows\system32\Pbnckg32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\Pelpgb32.exeC:\Windows\system32\Pelpgb32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\Plfhdlfb.exeC:\Windows\system32\Plfhdlfb.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:288 -
C:\Windows\SysWOW64\Peolmb32.exeC:\Windows\system32\Peolmb32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1144 -
C:\Windows\SysWOW64\Pkkeeikj.exeC:\Windows\system32\Pkkeeikj.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1544 -
C:\Windows\SysWOW64\Phoeomjc.exeC:\Windows\system32\Phoeomjc.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Windows\SysWOW64\Pmlngdhk.exeC:\Windows\system32\Pmlngdhk.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2108 -
C:\Windows\SysWOW64\Pdffcn32.exeC:\Windows\system32\Pdffcn32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:608 -
C:\Windows\SysWOW64\Qkpnph32.exeC:\Windows\system32\Qkpnph32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2368 -
C:\Windows\SysWOW64\Qpmgho32.exeC:\Windows\system32\Qpmgho32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:864 -
C:\Windows\SysWOW64\Qggoeilh.exeC:\Windows\system32\Qggoeilh.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Windows\SysWOW64\Qlcgmpkp.exeC:\Windows\system32\Qlcgmpkp.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1880 -
C:\Windows\SysWOW64\Qdkpomkb.exeC:\Windows\system32\Qdkpomkb.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1600
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ajghgd32.exeC:\Windows\system32\Ajghgd32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:832 -
C:\Windows\SysWOW64\Alfdcp32.exeC:\Windows\system32\Alfdcp32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2628 -
C:\Windows\SysWOW64\Aogmdk32.exeC:\Windows\system32\Aogmdk32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2632 -
C:\Windows\SysWOW64\Aaeiqf32.exeC:\Windows\system32\Aaeiqf32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2488 -
C:\Windows\SysWOW64\Alknnodh.exeC:\Windows\system32\Alknnodh.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2900 -
C:\Windows\SysWOW64\Ahancp32.exeC:\Windows\system32\Ahancp32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:524 -
C:\Windows\SysWOW64\Aokfpjai.exeC:\Windows\system32\Aokfpjai.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2164
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Afeold32.exeC:\Windows\system32\Afeold32.exe1⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Aggkdlod.exeC:\Windows\system32\Aggkdlod.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1308 -
C:\Windows\SysWOW64\Bblpae32.exeC:\Windows\system32\Bblpae32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\Bdklnq32.exeC:\Windows\system32\Bdklnq32.exe4⤵
- Executes dropped EXE
- Modifies registry class
PID:2000 -
C:\Windows\SysWOW64\Bjgdfg32.exeC:\Windows\system32\Bjgdfg32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1736 -
C:\Windows\SysWOW64\Bcpiombe.exeC:\Windows\system32\Bcpiombe.exe6⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Bkgqpjch.exeC:\Windows\system32\Bkgqpjch.exe7⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\Bqhbcqmj.exeC:\Windows\system32\Bqhbcqmj.exe8⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\Bbjoki32.exeC:\Windows\system32\Bbjoki32.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2060 -
C:\Windows\SysWOW64\Cjqglf32.exeC:\Windows\system32\Cjqglf32.exe10⤵
- Executes dropped EXE
PID:2340 -
C:\Windows\SysWOW64\Cmocha32.exeC:\Windows\system32\Cmocha32.exe11⤵
- Executes dropped EXE
PID:2180 -
C:\Windows\SysWOW64\Conpdm32.exeC:\Windows\system32\Conpdm32.exe12⤵
- Executes dropped EXE
PID:1848 -
C:\Windows\SysWOW64\Cejhld32.exeC:\Windows\system32\Cejhld32.exe13⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\Cmapna32.exeC:\Windows\system32\Cmapna32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1792 -
C:\Windows\SysWOW64\Copljmpo.exeC:\Windows\system32\Copljmpo.exe15⤵
- Executes dropped EXE
- Modifies registry class
PID:3044 -
C:\Windows\SysWOW64\Cbnhfhoc.exeC:\Windows\system32\Cbnhfhoc.exe16⤵
- Executes dropped EXE
PID:1060 -
C:\Windows\SysWOW64\Cgkanomj.exeC:\Windows\system32\Cgkanomj.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\Cpbiolnl.exeC:\Windows\system32\Cpbiolnl.exe18⤵
- Executes dropped EXE
PID:1100 -
C:\Windows\SysWOW64\Cbqekhmp.exeC:\Windows\system32\Cbqekhmp.exe19⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Ceoagcld.exeC:\Windows\system32\Ceoagcld.exe20⤵
- Executes dropped EXE
- Modifies registry class
PID:672 -
C:\Windows\SysWOW64\Ndfppije.exeC:\Windows\system32\Ndfppije.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\Bpfhfjgq.exeC:\Windows\system32\Bpfhfjgq.exe22⤵
- Executes dropped EXE
- Modifies registry class
PID:1484 -
C:\Windows\SysWOW64\Ijmfiefj.exeC:\Windows\system32\Ijmfiefj.exe23⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\Iojoalda.exeC:\Windows\system32\Iojoalda.exe24⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\SysWOW64\Jcekbk32.exeC:\Windows\system32\Jcekbk32.exe25⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\Jfdgnf32.exeC:\Windows\system32\Jfdgnf32.exe26⤵
- Executes dropped EXE
PID:1264 -
C:\Windows\SysWOW64\Jjocoedg.exeC:\Windows\system32\Jjocoedg.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\Jkqpfmje.exeC:\Windows\system32\Jkqpfmje.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\Jollgl32.exeC:\Windows\system32\Jollgl32.exe29⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\Jbkhcg32.exeC:\Windows\system32\Jbkhcg32.exe30⤵
- Executes dropped EXE
PID:780 -
C:\Windows\SysWOW64\Jidppaio.exeC:\Windows\system32\Jidppaio.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:984 -
C:\Windows\SysWOW64\Jkcllmhb.exeC:\Windows\system32\Jkcllmhb.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2072 -
C:\Windows\SysWOW64\Joohmk32.exeC:\Windows\system32\Joohmk32.exe33⤵PID:2932
-
C:\Windows\SysWOW64\Jbmdig32.exeC:\Windows\system32\Jbmdig32.exe34⤵PID:2724
-
C:\Windows\SysWOW64\Jigmeagl.exeC:\Windows\system32\Jigmeagl.exe35⤵
- Drops file in System32 directory
PID:924 -
C:\Windows\SysWOW64\Kgqcam32.exeC:\Windows\system32\Kgqcam32.exe36⤵PID:2528
-
C:\Windows\SysWOW64\Kfccmini.exeC:\Windows\system32\Kfccmini.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2536 -
C:\Windows\SysWOW64\Knkkngol.exeC:\Windows\system32\Knkkngol.exe38⤵
- Modifies registry class
PID:2560 -
C:\Windows\SysWOW64\Kmnljc32.exeC:\Windows\system32\Kmnljc32.exe39⤵PID:2604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kcgdgnmc.exeC:\Windows\system32\Kcgdgnmc.exe1⤵PID:584
-
C:\Windows\SysWOW64\Kffpcilf.exeC:\Windows\system32\Kffpcilf.exe2⤵PID:1652
-
C:\Windows\SysWOW64\Kmphpc32.exeC:\Windows\system32\Kmphpc32.exe3⤵
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\Kpndlobg.exeC:\Windows\system32\Kpndlobg.exe4⤵PID:1984
-
C:\Windows\SysWOW64\Kbmahjbk.exeC:\Windows\system32\Kbmahjbk.exe5⤵PID:588
-
-
-
-
-
C:\Windows\SysWOW64\Kfhmhi32.exeC:\Windows\system32\Kfhmhi32.exe1⤵
- Drops file in System32 directory
PID:2912 -
C:\Windows\SysWOW64\Kmbeecaq.exeC:\Windows\system32\Kmbeecaq.exe2⤵PID:2220
-
C:\Windows\SysWOW64\Kclmbm32.exeC:\Windows\system32\Kclmbm32.exe3⤵
- Drops file in System32 directory
- Modifies registry class
PID:2280 -
C:\Windows\SysWOW64\Kfkjnh32.exeC:\Windows\system32\Kfkjnh32.exe4⤵PID:2148
-
C:\Windows\SysWOW64\Kmdbkbpn.exeC:\Windows\system32\Kmdbkbpn.exe5⤵
- Drops file in System32 directory
PID:1808 -
C:\Windows\SysWOW64\Ledpjdid.exeC:\Windows\system32\Ledpjdid.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1804 -
C:\Windows\SysWOW64\Llnhgn32.exeC:\Windows\system32\Llnhgn32.exe7⤵PID:1408
-
C:\Windows\SysWOW64\Lmpdoffo.exeC:\Windows\system32\Lmpdoffo.exe8⤵PID:1732
-
C:\Windows\SysWOW64\Lkcehkeh.exeC:\Windows\system32\Lkcehkeh.exe9⤵PID:2924
-
C:\Windows\SysWOW64\Lanmde32.exeC:\Windows\system32\Lanmde32.exe10⤵
- Modifies registry class
PID:928 -
C:\Windows\SysWOW64\Ldljqpli.exeC:\Windows\system32\Ldljqpli.exe11⤵PID:2820
-
C:\Windows\SysWOW64\Lgjfmlkm.exeC:\Windows\system32\Lgjfmlkm.exe12⤵
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Lmdnjf32.exeC:\Windows\system32\Lmdnjf32.exe13⤵
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\Mpcjfa32.exeC:\Windows\system32\Mpcjfa32.exe14⤵PID:2448
-
C:\Windows\SysWOW64\Mdnffpif.exeC:\Windows\system32\Mdnffpif.exe15⤵PID:2672
-
C:\Windows\SysWOW64\Mkhocj32.exeC:\Windows\system32\Mkhocj32.exe16⤵PID:2480
-
C:\Windows\SysWOW64\Mmgkoe32.exeC:\Windows\system32\Mmgkoe32.exe17⤵PID:1088
-
C:\Windows\SysWOW64\Mpegka32.exeC:\Windows\system32\Mpegka32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1248 -
C:\Windows\SysWOW64\Mcccglnn.exeC:\Windows\system32\Mcccglnn.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1112 -
C:\Windows\SysWOW64\Mebpchmb.exeC:\Windows\system32\Mebpchmb.exe20⤵
- Drops file in System32 directory
PID:2284 -
C:\Windows\SysWOW64\Mmigdend.exeC:\Windows\system32\Mmigdend.exe21⤵
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\Mpgdaqmh.exeC:\Windows\system32\Mpgdaqmh.exe22⤵
- Modifies registry class
PID:836 -
C:\Windows\SysWOW64\Mcfpmlll.exeC:\Windows\system32\Mcfpmlll.exe23⤵PID:1172
-
C:\Windows\SysWOW64\Miphjf32.exeC:\Windows\system32\Miphjf32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:912 -
C:\Windows\SysWOW64\Mlndfa32.exeC:\Windows\system32\Mlndfa32.exe25⤵PID:1876
-
C:\Windows\SysWOW64\Makmnh32.exeC:\Windows\system32\Makmnh32.exe26⤵
- Modifies registry class
PID:2468 -
C:\Windows\SysWOW64\Mibeofaf.exeC:\Windows\system32\Mibeofaf.exe27⤵
- Modifies registry class
PID:628 -
C:\Windows\SysWOW64\Mheekb32.exeC:\Windows\system32\Mheekb32.exe28⤵
- Modifies registry class
PID:2808 -
C:\Windows\SysWOW64\Moomgmpm.exeC:\Windows\system32\Moomgmpm.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\Mcjihk32.exeC:\Windows\system32\Mcjihk32.exe30⤵PID:2572
-
C:\Windows\SysWOW64\Mdlfpcnd.exeC:\Windows\system32\Mdlfpcnd.exe31⤵
- Modifies registry class
PID:392 -
C:\Windows\SysWOW64\Nlcnaaog.exeC:\Windows\system32\Nlcnaaog.exe32⤵PID:1388
-
C:\Windows\SysWOW64\Nndjhi32.exeC:\Windows\system32\Nndjhi32.exe33⤵
- Drops file in System32 directory
PID:2320 -
C:\Windows\SysWOW64\Obpbhk32.exeC:\Windows\system32\Obpbhk32.exe34⤵PID:2304
-
C:\Windows\SysWOW64\Ojgkih32.exeC:\Windows\system32\Ojgkih32.exe35⤵PID:2116
-
C:\Windows\SysWOW64\Okhgaqfj.exeC:\Windows\system32\Okhgaqfj.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3016 -
C:\Windows\SysWOW64\Ocoobngl.exeC:\Windows\system32\Ocoobngl.exe37⤵PID:1928
-
C:\Windows\SysWOW64\Ofmknifp.exeC:\Windows\system32\Ofmknifp.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2928 -
C:\Windows\SysWOW64\Oilgje32.exeC:\Windows\system32\Oilgje32.exe39⤵PID:276
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ofphdi32.exeC:\Windows\system32\Ofphdi32.exe1⤵PID:1728
-
C:\Windows\SysWOW64\Odbhofjh.exeC:\Windows\system32\Odbhofjh.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2504 -
C:\Windows\SysWOW64\Okmqlp32.exeC:\Windows\system32\Okmqlp32.exe3⤵PID:2112
-
C:\Windows\SysWOW64\Onkmhl32.exeC:\Windows\system32\Onkmhl32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2772 -
C:\Windows\SysWOW64\Oiqaed32.exeC:\Windows\system32\Oiqaed32.exe5⤵PID:2420
-
-
-
-
-
C:\Windows\SysWOW64\Okomappb.exeC:\Windows\system32\Okomappb.exe1⤵PID:1480
-
C:\Windows\SysWOW64\Pbienj32.exeC:\Windows\system32\Pbienj32.exe2⤵
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Aofhcmig.exeC:\Windows\system32\Aofhcmig.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1800 -
C:\Windows\SysWOW64\Bfgikgjq.exeC:\Windows\system32\Bfgikgjq.exe4⤵PID:1348
-
C:\Windows\SysWOW64\Liaggk32.exeC:\Windows\system32\Liaggk32.exe5⤵PID:2840
-
C:\Windows\SysWOW64\Ppmjkhma.exeC:\Windows\system32\Ppmjkhma.exe6⤵PID:2388
-
C:\Windows\SysWOW64\Phcbmend.exeC:\Windows\system32\Phcbmend.exe7⤵PID:2156
-
C:\Windows\SysWOW64\Pmqkellk.exeC:\Windows\system32\Pmqkellk.exe8⤵
- Drops file in System32 directory
PID:1052 -
C:\Windows\SysWOW64\Pdjcaf32.exeC:\Windows\system32\Pdjcaf32.exe9⤵PID:556
-
C:\Windows\SysWOW64\Pkdknq32.exeC:\Windows\system32\Pkdknq32.exe10⤵PID:1616
-
C:\Windows\SysWOW64\Pigkjmap.exeC:\Windows\system32\Pigkjmap.exe11⤵PID:2868
-
C:\Windows\SysWOW64\Pncgjl32.exeC:\Windows\system32\Pncgjl32.exe12⤵PID:1980
-
C:\Windows\SysWOW64\Ppacfg32.exeC:\Windows\system32\Ppacfg32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1524 -
C:\Windows\SysWOW64\Pcppbc32.exeC:\Windows\system32\Pcppbc32.exe14⤵PID:2680
-
C:\Windows\SysWOW64\Penlon32.exeC:\Windows\system32\Penlon32.exe15⤵PID:904
-
C:\Windows\SysWOW64\Pnedpl32.exeC:\Windows\system32\Pnedpl32.exe16⤵PID:2752
-
C:\Windows\SysWOW64\Plhdkhoq.exeC:\Windows\system32\Plhdkhoq.exe17⤵PID:2108
-
C:\Windows\SysWOW64\Pcbmhb32.exeC:\Windows\system32\Pcbmhb32.exe18⤵
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\Peqidn32.exeC:\Windows\system32\Peqidn32.exe19⤵PID:2608
-
C:\Windows\SysWOW64\Qcgfcbbh.exeC:\Windows\system32\Qcgfcbbh.exe20⤵PID:2296
-
C:\Windows\SysWOW64\Akbkhd32.exeC:\Windows\system32\Akbkhd32.exe21⤵PID:2892
-
C:\Windows\SysWOW64\Anpgdp32.exeC:\Windows\system32\Anpgdp32.exe22⤵PID:2764
-
C:\Windows\SysWOW64\Afgoem32.exeC:\Windows\system32\Afgoem32.exe23⤵PID:2716
-
C:\Windows\SysWOW64\Agikmeeg.exeC:\Windows\system32\Agikmeeg.exe24⤵PID:2224
-
C:\Windows\SysWOW64\Akdgmd32.exeC:\Windows\system32\Akdgmd32.exe25⤵
- Drops file in System32 directory
PID:1572 -
C:\Windows\SysWOW64\Abnpjnem.exeC:\Windows\system32\Abnpjnem.exe26⤵
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\Aqapek32.exeC:\Windows\system32\Aqapek32.exe27⤵PID:2924
-
C:\Windows\SysWOW64\Ahhhgh32.exeC:\Windows\system32\Ahhhgh32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2460 -
C:\Windows\SysWOW64\Akfdcckn.exeC:\Windows\system32\Akfdcckn.exe29⤵PID:1848
-
C:\Windows\SysWOW64\Ajidnp32.exeC:\Windows\system32\Ajidnp32.exe30⤵
- Drops file in System32 directory
PID:1776 -
C:\Windows\SysWOW64\Afbbiafj.exeC:\Windows\system32\Afbbiafj.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3044 -
C:\Windows\SysWOW64\Anjjjn32.exeC:\Windows\system32\Anjjjn32.exe32⤵
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\Ammjekmg.exeC:\Windows\system32\Ammjekmg.exe33⤵
- Drops file in System32 directory
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Bokfaflj.exeC:\Windows\system32\Bokfaflj.exe34⤵
- Modifies registry class
PID:2928 -
C:\Windows\SysWOW64\Bfeonq32.exeC:\Windows\system32\Bfeonq32.exe35⤵
- Modifies registry class
PID:2112 -
C:\Windows\SysWOW64\Bmogkkkd.exeC:\Windows\system32\Bmogkkkd.exe36⤵PID:2404
-
C:\Windows\SysWOW64\Bomcgfjh.exeC:\Windows\system32\Bomcgfjh.exe37⤵PID:1892
-
C:\Windows\SysWOW64\Bblocaik.exeC:\Windows\system32\Bblocaik.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2068 -
C:\Windows\SysWOW64\Bjcgdojn.exeC:\Windows\system32\Bjcgdojn.exe39⤵PID:2776
-
C:\Windows\SysWOW64\Biegpl32.exeC:\Windows\system32\Biegpl32.exe40⤵PID:2636
-
C:\Windows\SysWOW64\Boppmf32.exeC:\Windows\system32\Boppmf32.exe41⤵PID:2444
-
C:\Windows\SysWOW64\Bcklmdqn.exeC:\Windows\system32\Bcklmdqn.exe42⤵
- Modifies registry class
PID:1104 -
C:\Windows\SysWOW64\Belhem32.exeC:\Windows\system32\Belhem32.exe43⤵PID:2124
-
C:\Windows\SysWOW64\Bihdfkoe.exeC:\Windows\system32\Bihdfkoe.exe44⤵
- Modifies registry class
PID:288 -
C:\Windows\SysWOW64\Bfldopno.exeC:\Windows\system32\Bfldopno.exe45⤵PID:1556
-
C:\Windows\SysWOW64\Bijakkmc.exeC:\Windows\system32\Bijakkmc.exe46⤵PID:1020
-
C:\Windows\SysWOW64\Bpdihedp.exeC:\Windows\system32\Bpdihedp.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2084 -
C:\Windows\SysWOW64\Bngicb32.exeC:\Windows\system32\Bngicb32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2604 -
C:\Windows\SysWOW64\Baeepm32.exeC:\Windows\system32\Baeepm32.exe49⤵PID:2964
-
C:\Windows\SysWOW64\Cgpnlgak.exeC:\Windows\system32\Cgpnlgak.exe50⤵PID:2976
-
C:\Windows\SysWOW64\Cnifia32.exeC:\Windows\system32\Cnifia32.exe51⤵
- Modifies registry class
PID:2584 -
C:\Windows\SysWOW64\Cahbem32.exeC:\Windows\system32\Cahbem32.exe52⤵PID:1880
-
C:\Windows\SysWOW64\Ccfoah32.exeC:\Windows\system32\Ccfoah32.exe53⤵PID:2488
-
C:\Windows\SysWOW64\Ckmfbf32.exeC:\Windows\system32\Ckmfbf32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2768 -
C:\Windows\SysWOW64\Cnlcoage.exeC:\Windows\system32\Cnlcoage.exe55⤵
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\Cajokmfi.exeC:\Windows\system32\Cajokmfi.exe56⤵PID:2060
-
C:\Windows\SysWOW64\Ccikghel.exeC:\Windows\system32\Ccikghel.exe57⤵PID:2664
-
C:\Windows\SysWOW64\Cjbccb32.exeC:\Windows\system32\Cjbccb32.exe58⤵PID:1248
-
C:\Windows\SysWOW64\Camlpldf.exeC:\Windows\system32\Camlpldf.exe59⤵
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Dajkjphd.exeC:\Windows\system32\Dajkjphd.exe60⤵PID:1592
-
C:\Windows\SysWOW64\Diackmif.exeC:\Windows\system32\Diackmif.exe61⤵
- Modifies registry class
PID:916 -
C:\Windows\SysWOW64\Dlppgihj.exeC:\Windows\system32\Dlppgihj.exe62⤵PID:1988
-
C:\Windows\SysWOW64\Ddmaak32.exeC:\Windows\system32\Ddmaak32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1012 -
C:\Windows\SysWOW64\Dglmmf32.exeC:\Windows\system32\Dglmmf32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1364 -
C:\Windows\SysWOW64\Eobenc32.exeC:\Windows\system32\Eobenc32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1608 -
C:\Windows\SysWOW64\Edpnfjap.exeC:\Windows\system32\Edpnfjap.exe66⤵PID:752
-
C:\Windows\SysWOW64\Ekifcd32.exeC:\Windows\system32\Ekifcd32.exe67⤵PID:900
-
C:\Windows\SysWOW64\Emhbop32.exeC:\Windows\system32\Emhbop32.exe68⤵PID:1656
-
C:\Windows\SysWOW64\Epfnkk32.exeC:\Windows\system32\Epfnkk32.exe69⤵
- Modifies registry class
PID:2576 -
C:\Windows\SysWOW64\Egpfheoa.exeC:\Windows\system32\Egpfheoa.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:1512 -
C:\Windows\SysWOW64\Eiocdand.exeC:\Windows\system32\Eiocdand.exe71⤵PID:1264
-
C:\Windows\SysWOW64\Elmoqlmh.exeC:\Windows\system32\Elmoqlmh.exe72⤵
- Modifies registry class
PID:984 -
C:\Windows\SysWOW64\Eddgaj32.exeC:\Windows\system32\Eddgaj32.exe73⤵PID:2736
-
C:\Windows\SysWOW64\Egbcne32.exeC:\Windows\system32\Egbcne32.exe74⤵PID:2012
-
C:\Windows\SysWOW64\Eiapjq32.exeC:\Windows\system32\Eiapjq32.exe75⤵PID:636
-
C:\Windows\SysWOW64\Epkhfkco.exeC:\Windows\system32\Epkhfkco.exe76⤵
- Drops file in System32 directory
PID:2056 -
C:\Windows\SysWOW64\Ecidbfbb.exeC:\Windows\system32\Ecidbfbb.exe77⤵PID:1560
-
C:\Windows\SysWOW64\Eehpoaaf.exeC:\Windows\system32\Eehpoaaf.exe78⤵PID:2216
-
C:\Windows\SysWOW64\Elahkl32.exeC:\Windows\system32\Elahkl32.exe79⤵PID:524
-
C:\Windows\SysWOW64\Eopehg32.exeC:\Windows\system32\Eopehg32.exe80⤵
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\Fknlmggc.exeC:\Windows\system32\Fknlmggc.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3048 -
C:\Windows\SysWOW64\Fdfpfm32.exeC:\Windows\system32\Fdfpfm32.exe82⤵
- Drops file in System32 directory
PID:2616 -
C:\Windows\SysWOW64\Fkphcg32.exeC:\Windows\system32\Fkphcg32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2480 -
C:\Windows\SysWOW64\Fnodob32.exeC:\Windows\system32\Fnodob32.exe84⤵
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\Glaejokn.exeC:\Windows\system32\Glaejokn.exe85⤵
- Modifies registry class
PID:1140 -
C:\Windows\SysWOW64\Gckmgi32.exeC:\Windows\system32\Gckmgi32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2568 -
C:\Windows\SysWOW64\Gjeedcjh.exeC:\Windows\system32\Gjeedcjh.exe87⤵PID:320
-
C:\Windows\SysWOW64\Gmdapoil.exeC:\Windows\system32\Gmdapoil.exe88⤵
- Modifies registry class
PID:1704 -
C:\Windows\SysWOW64\Gqomqm32.exeC:\Windows\system32\Gqomqm32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2008 -
C:\Windows\SysWOW64\Gcnjmi32.exeC:\Windows\system32\Gcnjmi32.exe90⤵PID:2248
-
C:\Windows\SysWOW64\Gmfnen32.exeC:\Windows\system32\Gmfnen32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2104 -
C:\Windows\SysWOW64\Gqajfmpb.exeC:\Windows\system32\Gqajfmpb.exe92⤵PID:1532
-
C:\Windows\SysWOW64\Gbcgne32.exeC:\Windows\system32\Gbcgne32.exe93⤵PID:1868
-
C:\Windows\SysWOW64\Gjjoob32.exeC:\Windows\system32\Gjjoob32.exe94⤵PID:1488
-
C:\Windows\SysWOW64\Gkkkgkla.exeC:\Windows\system32\Gkkkgkla.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2136 -
C:\Windows\SysWOW64\Ejmgjf32.exeC:\Windows\system32\Ejmgjf32.exe96⤵
- Drops file in System32 directory
PID:1492 -
C:\Windows\SysWOW64\Jcjfho32.exeC:\Windows\system32\Jcjfho32.exe97⤵
- Modifies registry class
PID:1388 -
C:\Windows\SysWOW64\Jfhbdk32.exeC:\Windows\system32\Jfhbdk32.exe98⤵
- Modifies registry class
PID:2512 -
C:\Windows\SysWOW64\Jnpjeh32.exeC:\Windows\system32\Jnpjeh32.exe99⤵
- Drops file in System32 directory
PID:276 -
C:\Windows\SysWOW64\Jqngac32.exeC:\Windows\system32\Jqngac32.exe100⤵
- Modifies registry class
PID:2916 -
C:\Windows\SysWOW64\Jclcno32.exeC:\Windows\system32\Jclcno32.exe101⤵
- Modifies registry class
PID:1664 -
C:\Windows\SysWOW64\Jghonnaa.exeC:\Windows\system32\Jghonnaa.exe102⤵
- Drops file in System32 directory
PID:2760 -
C:\Windows\SysWOW64\Kjfkjipd.exeC:\Windows\system32\Kjfkjipd.exe103⤵PID:440
-
C:\Windows\SysWOW64\Kmdgfd32.exeC:\Windows\system32\Kmdgfd32.exe104⤵PID:2196
-
C:\Windows\SysWOW64\Kqpcgcga.exeC:\Windows\system32\Kqpcgcga.exe105⤵
- Modifies registry class
PID:2840 -
C:\Windows\SysWOW64\Kcopcofe.exeC:\Windows\system32\Kcopcofe.exe106⤵PID:848
-
C:\Windows\SysWOW64\Kbapok32.exeC:\Windows\system32\Kbapok32.exe107⤵PID:2680
-
C:\Windows\SysWOW64\Kmgdld32.exeC:\Windows\system32\Kmgdld32.exe108⤵PID:1328
-
C:\Windows\SysWOW64\Koeqhp32.exeC:\Windows\system32\Koeqhp32.exe109⤵
- Drops file in System32 directory
- Modifies registry class
PID:2108 -
C:\Windows\SysWOW64\Kbdmdk32.exeC:\Windows\system32\Kbdmdk32.exe110⤵PID:2412
-
C:\Windows\SysWOW64\Kebipf32.exeC:\Windows\system32\Kebipf32.exe111⤵PID:2032
-
C:\Windows\SysWOW64\Kmiaad32.exeC:\Windows\system32\Kmiaad32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2676 -
C:\Windows\SysWOW64\Knkmil32.exeC:\Windows\system32\Knkmil32.exe113⤵PID:2648
-
C:\Windows\SysWOW64\Kfaeji32.exeC:\Windows\system32\Kfaeji32.exe114⤵
- Modifies registry class
PID:768 -
C:\Windows\SysWOW64\Kipafe32.exeC:\Windows\system32\Kipafe32.exe115⤵PID:2932
-
C:\Windows\SysWOW64\Kkonbp32.exeC:\Windows\system32\Kkonbp32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\Kpjjcohd.exeC:\Windows\system32\Kpjjcohd.exe117⤵PID:2532
-
C:\Windows\SysWOW64\Kbhfojgg.exeC:\Windows\system32\Kbhfojgg.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2712 -
C:\Windows\SysWOW64\Kakfkg32.exeC:\Windows\system32\Kakfkg32.exe119⤵PID:1508
-
C:\Windows\SysWOW64\Kibnld32.exeC:\Windows\system32\Kibnld32.exe120⤵PID:2660
-
C:\Windows\SysWOW64\Klakhp32.exeC:\Windows\system32\Klakhp32.exe121⤵PID:2036
-
C:\Windows\SysWOW64\Llcgnple.exeC:\Windows\system32\Llcgnple.exe122⤵PID:2672
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-