Analysis
-
max time kernel
170s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2023 16:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
027ed3d8af897d82d64f442785ba6b0c.exe
Resource
win7-20231025-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
027ed3d8af897d82d64f442785ba6b0c.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
027ed3d8af897d82d64f442785ba6b0c.exe
-
Size
304KB
-
MD5
027ed3d8af897d82d64f442785ba6b0c
-
SHA1
c398fb571297bf18a73d4d34e9c9f83d7834906b
-
SHA256
33ac8c586959969b2657814daa1afb569d36d21c37a0e859ce32919f1057126d
-
SHA512
36a4157ed6f14569955772866b7130b8f698e614be035ca329abd74cb2a069e8cd4dc1f78277cd4f0151b6a12550a29a3daa1f8a5f1a95b3a469f5d6f9761b61
-
SSDEEP
6144:7FrH9XNcO7JfnrFVoXJtpNr1RgAaa6FlFlcOuLr2/24qXPAbgPBFpYrFVO/fnrF8:RZJfnYdsWfna
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdhemn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aecnmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cehdbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Epbkbnjj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blnoad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcmdkbok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Faeihogj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ginnokej.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlcgam32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbfkmk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eihcedcm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olbdacbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khpgmqpp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocjgcd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hddbmedc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmkiqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njcnafpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enhpje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgddlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dememj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mniafbfn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mehcnlie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iolhdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eocohkcg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kagimmol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmmppc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmcilgco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dibmfb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjbopcip.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfbpnjjd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjfmda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Diknnlbi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jenedhaa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daqbbe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbpjbe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpmcfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eoghcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pqbdclak.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dklhmlac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okjcdq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nifldj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhdqfbjp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flpbgnjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pceglamm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kblpnall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Keaibpap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oeahap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iioplg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Klbgpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feifpcpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oehldi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehpjdepi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcbngeqo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdjqienq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfqdbj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epbkbnjj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqdbbelf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjaqih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phlqlgmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Keaibpap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dimjdlqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iqmgpnie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhfogiff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flinddpj.exe -
Executes dropped EXE 64 IoCs
pid Process 1364 Faiplcmk.exe 888 Ikgpmc32.exe 760 Kdpmmf32.exe 780 Llqhdb32.exe 3140 Lfbpcgbl.exe 2156 Neeifa32.exe 3832 Oeahap32.exe 2768 Oefamoma.exe 1516 Qbeaba32.exe 1176 Albpff32.exe 3336 Apcead32.exe 940 Blnoad32.exe 3884 Bpodmb32.exe 4876 Bnbeggmi.exe 2480 Dnqaheai.exe 216 Gaibhj32.exe 3028 Hnpognhd.exe 4604 Impldi32.exe 4528 Jphkfc32.exe 2524 Kknhjj32.exe 2036 Lkenkhec.exe 2972 Lnhdbc32.exe 1544 Mohplf32.exe 1924 Mhgkfkhl.exe 3864 Niqnli32.exe 544 Oabiak32.exe 1672 Oiojmgcb.exe 704 Oajoaj32.exe 4408 Pnnokn32.exe 3312 Plfipakk.exe 3936 Ahdpea32.exe 4776 Bhppap32.exe 2332 Ccfmef32.exe 4548 Cibagpgg.exe 3128 Eokjke32.exe 3848 Gqdbbelf.exe 2276 Hpbajp32.exe 1548 Hmfbcd32.exe 4076 Hmioicek.exe 4572 Ipldpo32.exe 692 Iidiidgj.exe 1664 Ipckqnja.exe 4944 Kgmlde32.exe 2976 Kagimmol.exe 676 Ldjodh32.exe 4500 Mallojmd.exe 2108 Nkgmmpab.exe 4676 Ogljcokf.exe 4892 Pnmhqh32.exe 3036 Pkaijl32.exe 1264 Pbpjbe32.exe 2924 Ankdbf32.exe 3252 Agcikk32.exe 2364 Bdcmfkde.exe 5020 Bhdbaihi.exe 4344 Bhfogiff.exe 1392 Cdaigi32.exe 1908 Dememj32.exe 5004 Ddbbngjb.exe 3904 Ehpjdepi.exe 3544 Eolpfo32.exe 2224 Eoollocp.exe 2028 Elbmebbj.exe 1764 Ednajepe.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ipckqnja.exe Iidiidgj.exe File created C:\Windows\SysWOW64\Dmcilgco.exe Djbpjl32.exe File created C:\Windows\SysWOW64\Npnpko32.dll Ohkbldfa.exe File created C:\Windows\SysWOW64\Jnhoaogc.dll Gloecbaa.exe File opened for modification C:\Windows\SysWOW64\Iqmgpnie.exe Hdbmpnhf.exe File opened for modification C:\Windows\SysWOW64\Jghhcf32.exe Jmbdfm32.exe File created C:\Windows\SysWOW64\Fghcjf32.exe Fpnknlpl.exe File opened for modification C:\Windows\SysWOW64\Iidiidgj.exe Ipldpo32.exe File created C:\Windows\SysWOW64\Menbaomc.dll Pbpjbe32.exe File created C:\Windows\SysWOW64\Lekeajmm.exe Keabkkdg.exe File created C:\Windows\SysWOW64\Ccnbfi32.dll Fmdach32.exe File opened for modification C:\Windows\SysWOW64\Aiplff32.exe Piapehkd.exe File opened for modification C:\Windows\SysWOW64\Mallojmd.exe Ldjodh32.exe File created C:\Windows\SysWOW64\Hcknlq32.dll Jnkchmdl.exe File created C:\Windows\SysWOW64\Ejmild32.exe Dfmcpf32.exe File created C:\Windows\SysWOW64\Bfpedlcp.dll Oeccijoh.exe File opened for modification C:\Windows\SysWOW64\Nnccmddi.exe Nppfimnm.exe File opened for modification C:\Windows\SysWOW64\Ojnfbnbl.exe Ncpejd32.exe File created C:\Windows\SysWOW64\Dpiaolnn.dll Lekeajmm.exe File created C:\Windows\SysWOW64\Iickdgpb.exe Iojgkbib.exe File created C:\Windows\SysWOW64\Chgagfdd.dll Lbekjipe.exe File created C:\Windows\SysWOW64\Gkjcegnh.dll Oefpoi32.exe File created C:\Windows\SysWOW64\Bnnank32.dll Pnmhqh32.exe File created C:\Windows\SysWOW64\Chjaha32.exe Cmdmki32.exe File created C:\Windows\SysWOW64\Lhhakddm.exe Kffhkaom.exe File created C:\Windows\SysWOW64\Jmafbj32.dll Dememj32.exe File opened for modification C:\Windows\SysWOW64\Nacmnlkd.exe Nihiiimi.exe File created C:\Windows\SysWOW64\Nliakd32.exe Nacmnlkd.exe File created C:\Windows\SysWOW64\Qacnjegb.dll Beomhm32.exe File created C:\Windows\SysWOW64\Oihkjl32.dll Faeihogj.exe File created C:\Windows\SysWOW64\Iaaakj32.exe Ildibc32.exe File created C:\Windows\SysWOW64\Kmncbl32.exe Jmdqlm32.exe File created C:\Windows\SysWOW64\Oikbgh32.dll Mplhjabe.exe File opened for modification C:\Windows\SysWOW64\Aggean32.exe Aifdcgcp.exe File created C:\Windows\SysWOW64\Qfhdnb32.exe Qalkfl32.exe File created C:\Windows\SysWOW64\Bfjlecdj.exe Bldghjdd.exe File created C:\Windows\SysWOW64\Pedhjllh.dll Jffodc32.exe File created C:\Windows\SysWOW64\Jdnngc32.dll Jmbdfm32.exe File created C:\Windows\SysWOW64\Dabjjipm.dll Dmqdmd32.exe File opened for modification C:\Windows\SysWOW64\Mcoeiqil.exe Mhialhjf.exe File created C:\Windows\SysWOW64\Nedgfk32.exe Nhpgmg32.exe File created C:\Windows\SysWOW64\Bicogo32.exe Abpcdfha.exe File created C:\Windows\SysWOW64\Mbjdnm32.dll Mgokflpj.exe File created C:\Windows\SysWOW64\Cmdmki32.exe Ceihffad.exe File created C:\Windows\SysWOW64\Ckpghq32.dll Jgonfcnb.exe File created C:\Windows\SysWOW64\Aoepchfj.dll Pnifoaba.exe File created C:\Windows\SysWOW64\Aokkknbl.exe Adfgne32.exe File created C:\Windows\SysWOW64\Bldghjdd.exe Bicogo32.exe File created C:\Windows\SysWOW64\Kglila32.dll Bnbeggmi.exe File created C:\Windows\SysWOW64\Bjimok32.dll Niqnli32.exe File created C:\Windows\SysWOW64\Ofqiil32.dll Bqdbec32.exe File created C:\Windows\SysWOW64\Akiijq32.exe Apcemh32.exe File created C:\Windows\SysWOW64\Hgjmen32.dll Afnepojl.exe File created C:\Windows\SysWOW64\Kmbhlfil.dll Oefamoma.exe File created C:\Windows\SysWOW64\Jngjmm32.exe Jenedhaa.exe File created C:\Windows\SysWOW64\Agpiceon.dll Apcemh32.exe File created C:\Windows\SysWOW64\Cbfmpj32.exe Bkkhlhlj.exe File created C:\Windows\SysWOW64\Cbhifj32.exe Cmlamb32.exe File created C:\Windows\SysWOW64\Knlook32.dll Ckfggf32.exe File created C:\Windows\SysWOW64\Nggjim32.exe Najaqe32.exe File created C:\Windows\SysWOW64\Mpmqae32.dll Jphkfc32.exe File opened for modification C:\Windows\SysWOW64\Jpkfmfok.exe Jbcmhb32.exe File created C:\Windows\SysWOW64\Oiihkncb.exe Ocjgcd32.exe File opened for modification C:\Windows\SysWOW64\Nndjgjhe.exe Mjkbemll.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Meiabh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnjgnq32.dll" Anjngp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jelioh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oefpoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Olbdacbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Elkbcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcphkhad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmhggbgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkgmmpab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fimgonmc.dll" Hddbmedc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nophfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Adfgne32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dklhmlac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Klpjji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddekfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmkjlc32.dll" Pdkcinco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jngjmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Klapgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Leplndhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkapnbqo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cehkmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnhdbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfdqdf32.dll" Gqdbbelf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbbcmdai.dll" Enfceefi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmlojd32.dll" Cpajdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbfmpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgbjmpbg.dll" Odfjno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpnknlpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ankdbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpcahb32.dll" Lpneom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Didmclli.dll" Nihiiimi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgonfcnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpmhmbko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oondhocf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Boqlqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hnpognhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Joamlacj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhlmqkjh.dll" Khmjga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbnkhcha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emphhhoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cllfcdpd.dll" Hpofbobf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckclacmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icjiimbm.dll" Ncplekbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Plfipakk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhdbaihi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Naejcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Biiole32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgdnmfai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lajodnfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhhaknqj.dll" Najaqe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eeodjeha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jnelha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ggjqqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpmhmbko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kieeoj32.dll" Kgmlde32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fghcjf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Flekbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcdfggmg.dll" Aecnmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ieiepo32.dll" Eaebfmga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dibdok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahinei32.dll" Jlmenl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfbqdb32.dll" Kknhjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbekjipe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agpiceon.dll" Apcemh32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 1364 3460 027ed3d8af897d82d64f442785ba6b0c.exe 87 PID 3460 wrote to memory of 1364 3460 027ed3d8af897d82d64f442785ba6b0c.exe 87 PID 3460 wrote to memory of 1364 3460 027ed3d8af897d82d64f442785ba6b0c.exe 87 PID 1364 wrote to memory of 888 1364 Faiplcmk.exe 88 PID 1364 wrote to memory of 888 1364 Faiplcmk.exe 88 PID 1364 wrote to memory of 888 1364 Faiplcmk.exe 88 PID 888 wrote to memory of 760 888 Ikgpmc32.exe 89 PID 888 wrote to memory of 760 888 Ikgpmc32.exe 89 PID 888 wrote to memory of 760 888 Ikgpmc32.exe 89 PID 760 wrote to memory of 780 760 Kdpmmf32.exe 90 PID 760 wrote to memory of 780 760 Kdpmmf32.exe 90 PID 760 wrote to memory of 780 760 Kdpmmf32.exe 90 PID 780 wrote to memory of 3140 780 Llqhdb32.exe 91 PID 780 wrote to memory of 3140 780 Llqhdb32.exe 91 PID 780 wrote to memory of 3140 780 Llqhdb32.exe 91 PID 3140 wrote to memory of 2156 3140 Lfbpcgbl.exe 92 PID 3140 wrote to memory of 2156 3140 Lfbpcgbl.exe 92 PID 3140 wrote to memory of 2156 3140 Lfbpcgbl.exe 92 PID 2156 wrote to memory of 3832 2156 Neeifa32.exe 93 PID 2156 wrote to memory of 3832 2156 Neeifa32.exe 93 PID 2156 wrote to memory of 3832 2156 Neeifa32.exe 93 PID 3832 wrote to memory of 2768 3832 Oeahap32.exe 94 PID 3832 wrote to memory of 2768 3832 Oeahap32.exe 94 PID 3832 wrote to memory of 2768 3832 Oeahap32.exe 94 PID 2768 wrote to memory of 1516 2768 Oefamoma.exe 95 PID 2768 wrote to memory of 1516 2768 Oefamoma.exe 95 PID 2768 wrote to memory of 1516 2768 Oefamoma.exe 95 PID 1516 wrote to memory of 1176 1516 Qbeaba32.exe 96 PID 1516 wrote to memory of 1176 1516 Qbeaba32.exe 96 PID 1516 wrote to memory of 1176 1516 Qbeaba32.exe 96 PID 1176 wrote to memory of 3336 1176 Albpff32.exe 97 PID 1176 wrote to memory of 3336 1176 Albpff32.exe 97 PID 1176 wrote to memory of 3336 1176 Albpff32.exe 97 PID 3336 wrote to memory of 940 3336 Apcead32.exe 98 PID 3336 wrote to memory of 940 3336 Apcead32.exe 98 PID 3336 wrote to memory of 940 3336 Apcead32.exe 98 PID 940 wrote to memory of 3884 940 Blnoad32.exe 99 PID 940 wrote to memory of 3884 940 Blnoad32.exe 99 PID 940 wrote to memory of 3884 940 Blnoad32.exe 99 PID 3884 wrote to memory of 4876 3884 Bpodmb32.exe 100 PID 3884 wrote to memory of 4876 3884 Bpodmb32.exe 100 PID 3884 wrote to memory of 4876 3884 Bpodmb32.exe 100 PID 4876 wrote to memory of 2480 4876 Bnbeggmi.exe 101 PID 4876 wrote to memory of 2480 4876 Bnbeggmi.exe 101 PID 4876 wrote to memory of 2480 4876 Bnbeggmi.exe 101 PID 2480 wrote to memory of 216 2480 Dnqaheai.exe 102 PID 2480 wrote to memory of 216 2480 Dnqaheai.exe 102 PID 2480 wrote to memory of 216 2480 Dnqaheai.exe 102 PID 216 wrote to memory of 3028 216 Gaibhj32.exe 103 PID 216 wrote to memory of 3028 216 Gaibhj32.exe 103 PID 216 wrote to memory of 3028 216 Gaibhj32.exe 103 PID 3028 wrote to memory of 4604 3028 Hnpognhd.exe 104 PID 3028 wrote to memory of 4604 3028 Hnpognhd.exe 104 PID 3028 wrote to memory of 4604 3028 Hnpognhd.exe 104 PID 4604 wrote to memory of 4528 4604 Impldi32.exe 105 PID 4604 wrote to memory of 4528 4604 Impldi32.exe 105 PID 4604 wrote to memory of 4528 4604 Impldi32.exe 105 PID 4528 wrote to memory of 2524 4528 Jphkfc32.exe 106 PID 4528 wrote to memory of 2524 4528 Jphkfc32.exe 106 PID 4528 wrote to memory of 2524 4528 Jphkfc32.exe 106 PID 2524 wrote to memory of 2036 2524 Kknhjj32.exe 107 PID 2524 wrote to memory of 2036 2524 Kknhjj32.exe 107 PID 2524 wrote to memory of 2036 2524 Kknhjj32.exe 107 PID 2036 wrote to memory of 2972 2036 Lkenkhec.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\027ed3d8af897d82d64f442785ba6b0c.exe"C:\Users\Admin\AppData\Local\Temp\027ed3d8af897d82d64f442785ba6b0c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\Faiplcmk.exeC:\Windows\system32\Faiplcmk.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\Ikgpmc32.exeC:\Windows\system32\Ikgpmc32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\Kdpmmf32.exeC:\Windows\system32\Kdpmmf32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\Llqhdb32.exeC:\Windows\system32\Llqhdb32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\Lfbpcgbl.exeC:\Windows\system32\Lfbpcgbl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\Neeifa32.exeC:\Windows\system32\Neeifa32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\Oeahap32.exeC:\Windows\system32\Oeahap32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\Oefamoma.exeC:\Windows\system32\Oefamoma.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\Qbeaba32.exeC:\Windows\system32\Qbeaba32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\Albpff32.exeC:\Windows\system32\Albpff32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\Apcead32.exeC:\Windows\system32\Apcead32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\Blnoad32.exeC:\Windows\system32\Blnoad32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\Bpodmb32.exeC:\Windows\system32\Bpodmb32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\Bnbeggmi.exeC:\Windows\system32\Bnbeggmi.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\Dnqaheai.exeC:\Windows\system32\Dnqaheai.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\Gaibhj32.exeC:\Windows\system32\Gaibhj32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\Hnpognhd.exeC:\Windows\system32\Hnpognhd.exe18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\Impldi32.exeC:\Windows\system32\Impldi32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\Jphkfc32.exeC:\Windows\system32\Jphkfc32.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\Kknhjj32.exeC:\Windows\system32\Kknhjj32.exe21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\Lkenkhec.exeC:\Windows\system32\Lkenkhec.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\Lnhdbc32.exeC:\Windows\system32\Lnhdbc32.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:2972 -
C:\Windows\SysWOW64\Mohplf32.exeC:\Windows\system32\Mohplf32.exe24⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\Mhgkfkhl.exeC:\Windows\system32\Mhgkfkhl.exe25⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\Niqnli32.exeC:\Windows\system32\Niqnli32.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3864 -
C:\Windows\SysWOW64\Oabiak32.exeC:\Windows\system32\Oabiak32.exe27⤵
- Executes dropped EXE
PID:544 -
C:\Windows\SysWOW64\Oiojmgcb.exeC:\Windows\system32\Oiojmgcb.exe28⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\Oajoaj32.exeC:\Windows\system32\Oajoaj32.exe29⤵
- Executes dropped EXE
PID:704 -
C:\Windows\SysWOW64\Pnnokn32.exeC:\Windows\system32\Pnnokn32.exe30⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\Plfipakk.exeC:\Windows\system32\Plfipakk.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:3312 -
C:\Windows\SysWOW64\Ahdpea32.exeC:\Windows\system32\Ahdpea32.exe32⤵
- Executes dropped EXE
PID:3936 -
C:\Windows\SysWOW64\Bhppap32.exeC:\Windows\system32\Bhppap32.exe33⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\SysWOW64\Ccfmef32.exeC:\Windows\system32\Ccfmef32.exe34⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\Cibagpgg.exeC:\Windows\system32\Cibagpgg.exe35⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\SysWOW64\Eokjke32.exeC:\Windows\system32\Eokjke32.exe36⤵
- Executes dropped EXE
PID:3128 -
C:\Windows\SysWOW64\Gqdbbelf.exeC:\Windows\system32\Gqdbbelf.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3848 -
C:\Windows\SysWOW64\Hpbajp32.exeC:\Windows\system32\Hpbajp32.exe38⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\Hmfbcd32.exeC:\Windows\system32\Hmfbcd32.exe39⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\Hmioicek.exeC:\Windows\system32\Hmioicek.exe40⤵
- Executes dropped EXE
PID:4076 -
C:\Windows\SysWOW64\Ipldpo32.exeC:\Windows\system32\Ipldpo32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4572 -
C:\Windows\SysWOW64\Iidiidgj.exeC:\Windows\system32\Iidiidgj.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:692 -
C:\Windows\SysWOW64\Ipckqnja.exeC:\Windows\system32\Ipckqnja.exe43⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\Kgmlde32.exeC:\Windows\system32\Kgmlde32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:4944 -
C:\Windows\SysWOW64\Kagimmol.exeC:\Windows\system32\Kagimmol.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\Ldjodh32.exeC:\Windows\system32\Ldjodh32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:676 -
C:\Windows\SysWOW64\Mallojmd.exeC:\Windows\system32\Mallojmd.exe47⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\SysWOW64\Nkgmmpab.exeC:\Windows\system32\Nkgmmpab.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:2108 -
C:\Windows\SysWOW64\Ogljcokf.exeC:\Windows\system32\Ogljcokf.exe49⤵
- Executes dropped EXE
PID:4676 -
C:\Windows\SysWOW64\Pnmhqh32.exeC:\Windows\system32\Pnmhqh32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4892 -
C:\Windows\SysWOW64\Pkaijl32.exeC:\Windows\system32\Pkaijl32.exe51⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\Pbpjbe32.exeC:\Windows\system32\Pbpjbe32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1264 -
C:\Windows\SysWOW64\Ankdbf32.exeC:\Windows\system32\Ankdbf32.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:2924 -
C:\Windows\SysWOW64\Agcikk32.exeC:\Windows\system32\Agcikk32.exe54⤵
- Executes dropped EXE
PID:3252 -
C:\Windows\SysWOW64\Bdcmfkde.exeC:\Windows\system32\Bdcmfkde.exe55⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\Bhdbaihi.exeC:\Windows\system32\Bhdbaihi.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:5020 -
C:\Windows\SysWOW64\Bhfogiff.exeC:\Windows\system32\Bhfogiff.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\Bejoqm32.exeC:\Windows\system32\Bejoqm32.exe58⤵PID:2436
-
C:\Windows\SysWOW64\Cdaigi32.exeC:\Windows\system32\Cdaigi32.exe59⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\SysWOW64\Dememj32.exeC:\Windows\system32\Dememj32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1908 -
C:\Windows\SysWOW64\Ddbbngjb.exeC:\Windows\system32\Ddbbngjb.exe61⤵
- Executes dropped EXE
PID:5004 -
C:\Windows\SysWOW64\Ehpjdepi.exeC:\Windows\system32\Ehpjdepi.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3904 -
C:\Windows\SysWOW64\Eolpfo32.exeC:\Windows\system32\Eolpfo32.exe63⤵
- Executes dropped EXE
PID:3544 -
C:\Windows\SysWOW64\Eoollocp.exeC:\Windows\system32\Eoollocp.exe64⤵
- Executes dropped EXE
PID:2224 -
C:\Windows\SysWOW64\Elbmebbj.exeC:\Windows\system32\Elbmebbj.exe65⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Ednajepe.exeC:\Windows\system32\Ednajepe.exe66⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\Hoakpi32.exeC:\Windows\system32\Hoakpi32.exe67⤵PID:3732
-
C:\Windows\SysWOW64\Heochp32.exeC:\Windows\system32\Heochp32.exe68⤵PID:388
-
C:\Windows\SysWOW64\Hcpcehko.exeC:\Windows\system32\Hcpcehko.exe69⤵PID:4616
-
C:\Windows\SysWOW64\Heapmp32.exeC:\Windows\system32\Heapmp32.exe70⤵PID:3956
-
C:\Windows\SysWOW64\Hpfdkiac.exeC:\Windows\system32\Hpfdkiac.exe71⤵PID:2868
-
C:\Windows\SysWOW64\Ifplgc32.exeC:\Windows\system32\Ifplgc32.exe72⤵PID:4504
-
C:\Windows\SysWOW64\Ikmepj32.exeC:\Windows\system32\Ikmepj32.exe73⤵PID:3316
-
C:\Windows\SysWOW64\Ifcimb32.exeC:\Windows\system32\Ifcimb32.exe74⤵PID:3020
-
C:\Windows\SysWOW64\Jeolonem.exeC:\Windows\system32\Jeolonem.exe75⤵PID:1916
-
C:\Windows\SysWOW64\Jbcmhb32.exeC:\Windows\system32\Jbcmhb32.exe76⤵
- Drops file in System32 directory
PID:1344 -
C:\Windows\SysWOW64\Jpkfmfok.exeC:\Windows\system32\Jpkfmfok.exe77⤵PID:4288
-
C:\Windows\SysWOW64\Kblpnall.exeC:\Windows\system32\Kblpnall.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1560 -
C:\Windows\SysWOW64\Keabkkdg.exeC:\Windows\system32\Keabkkdg.exe79⤵
- Drops file in System32 directory
PID:4264 -
C:\Windows\SysWOW64\Lekeajmm.exeC:\Windows\system32\Lekeajmm.exe80⤵
- Drops file in System32 directory
PID:4924 -
C:\Windows\SysWOW64\Mgokflpj.exeC:\Windows\system32\Mgokflpj.exe81⤵
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\Mplhjabe.exeC:\Windows\system32\Mplhjabe.exe82⤵
- Drops file in System32 directory
PID:1700 -
C:\Windows\SysWOW64\Meiabh32.exeC:\Windows\system32\Meiabh32.exe83⤵
- Modifies registry class
PID:3092 -
C:\Windows\SysWOW64\Odkjgm32.exeC:\Windows\system32\Odkjgm32.exe84⤵PID:4624
-
C:\Windows\SysWOW64\Pqknbmhc.exeC:\Windows\system32\Pqknbmhc.exe85⤵PID:3204
-
C:\Windows\SysWOW64\Pdifhkni.exeC:\Windows\system32\Pdifhkni.exe86⤵PID:1508
-
C:\Windows\SysWOW64\Pgiojf32.exeC:\Windows\system32\Pgiojf32.exe87⤵PID:1356
-
C:\Windows\SysWOW64\Pqbdclak.exeC:\Windows\system32\Pqbdclak.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4820 -
C:\Windows\SysWOW64\Adbiojfo.exeC:\Windows\system32\Adbiojfo.exe89⤵PID:1112
-
C:\Windows\SysWOW64\Anjngp32.exeC:\Windows\system32\Anjngp32.exe90⤵
- Modifies registry class
PID:1368 -
C:\Windows\SysWOW64\Agcbqecp.exeC:\Windows\system32\Agcbqecp.exe91⤵PID:4936
-
C:\Windows\SysWOW64\Aqkgikip.exeC:\Windows\system32\Aqkgikip.exe92⤵PID:2844
-
C:\Windows\SysWOW64\Ajckbp32.exeC:\Windows\system32\Ajckbp32.exe93⤵PID:4020
-
C:\Windows\SysWOW64\Ajfhhp32.exeC:\Windows\system32\Ajfhhp32.exe94⤵PID:2024
-
C:\Windows\SysWOW64\Aekleind.exeC:\Windows\system32\Aekleind.exe95⤵PID:5084
-
C:\Windows\SysWOW64\Ajhdmplk.exeC:\Windows\system32\Ajhdmplk.exe96⤵PID:1844
-
C:\Windows\SysWOW64\Bfcompnj.exeC:\Windows\system32\Bfcompnj.exe97⤵PID:1408
-
C:\Windows\SysWOW64\Bhehmbbj.exeC:\Windows\system32\Bhehmbbj.exe98⤵PID:1948
-
C:\Windows\SysWOW64\Ceihffad.exeC:\Windows\system32\Ceihffad.exe99⤵
- Drops file in System32 directory
PID:3440 -
C:\Windows\SysWOW64\Cmdmki32.exeC:\Windows\system32\Cmdmki32.exe100⤵
- Drops file in System32 directory
PID:3768 -
C:\Windows\SysWOW64\Chjaha32.exeC:\Windows\system32\Chjaha32.exe101⤵PID:3512
-
C:\Windows\SysWOW64\Caebfg32.exeC:\Windows\system32\Caebfg32.exe102⤵PID:3008
-
C:\Windows\SysWOW64\Djbpjl32.exeC:\Windows\system32\Djbpjl32.exe103⤵
- Drops file in System32 directory
PID:3648 -
C:\Windows\SysWOW64\Dmcilgco.exeC:\Windows\system32\Dmcilgco.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3172 -
C:\Windows\SysWOW64\Dfknem32.exeC:\Windows\system32\Dfknem32.exe105⤵PID:4172
-
C:\Windows\SysWOW64\Daqbbe32.exeC:\Windows\system32\Daqbbe32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3624 -
C:\Windows\SysWOW64\Eaonccme.exeC:\Windows\system32\Eaonccme.exe107⤵PID:2128
-
C:\Windows\SysWOW64\Fdfmfmdo.exeC:\Windows\system32\Fdfmfmdo.exe108⤵PID:3832
-
C:\Windows\SysWOW64\Fajnoabh.exeC:\Windows\system32\Fajnoabh.exe109⤵PID:740
-
C:\Windows\SysWOW64\Gnckjbfj.exeC:\Windows\system32\Gnckjbfj.exe110⤵PID:4104
-
C:\Windows\SysWOW64\Hfklamii.exeC:\Windows\system32\Hfklamii.exe111⤵PID:520
-
C:\Windows\SysWOW64\Ininloda.exeC:\Windows\system32\Ininloda.exe112⤵PID:4652
-
C:\Windows\SysWOW64\Ihnbih32.exeC:\Windows\system32\Ihnbih32.exe113⤵PID:1120
-
C:\Windows\SysWOW64\Iohjebkd.exeC:\Windows\system32\Iohjebkd.exe114⤵PID:1232
-
C:\Windows\SysWOW64\Ifbbbl32.exeC:\Windows\system32\Ifbbbl32.exe115⤵PID:1148
-
C:\Windows\SysWOW64\Iojgkbib.exeC:\Windows\system32\Iojgkbib.exe116⤵
- Drops file in System32 directory
PID:5160 -
C:\Windows\SysWOW64\Iickdgpb.exeC:\Windows\system32\Iickdgpb.exe117⤵PID:5220
-
C:\Windows\SysWOW64\Ibkpmm32.exeC:\Windows\system32\Ibkpmm32.exe118⤵PID:5280
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ikcdfbmc.exeC:\Windows\system32\Ikcdfbmc.exe1⤵PID:5320
-
C:\Windows\SysWOW64\Jelioh32.exeC:\Windows\system32\Jelioh32.exe2⤵
- Modifies registry class
PID:5372 -
C:\Windows\SysWOW64\Joamlacj.exeC:\Windows\system32\Joamlacj.exe3⤵
- Modifies registry class
PID:5432 -
C:\Windows\SysWOW64\Jenedhaa.exeC:\Windows\system32\Jenedhaa.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5488 -
C:\Windows\SysWOW64\Jngjmm32.exeC:\Windows\system32\Jngjmm32.exe5⤵
- Modifies registry class
PID:5536 -
C:\Windows\SysWOW64\Jgonfcnb.exeC:\Windows\system32\Jgonfcnb.exe6⤵
- Drops file in System32 directory
- Modifies registry class
PID:5596 -
C:\Windows\SysWOW64\Jgakkb32.exeC:\Windows\system32\Jgakkb32.exe7⤵PID:5636
-
C:\Windows\SysWOW64\Jnkchmdl.exeC:\Windows\system32\Jnkchmdl.exe8⤵
- Drops file in System32 directory
PID:5688 -
C:\Windows\SysWOW64\Klapgq32.exeC:\Windows\system32\Klapgq32.exe9⤵
- Modifies registry class
PID:5748 -
C:\Windows\SysWOW64\Kbpboj32.exeC:\Windows\system32\Kbpboj32.exe10⤵PID:5796
-
C:\Windows\SysWOW64\Khmjga32.exeC:\Windows\system32\Khmjga32.exe11⤵
- Modifies registry class
PID:5840 -
C:\Windows\SysWOW64\Kbbodj32.exeC:\Windows\system32\Kbbodj32.exe12⤵PID:5880
-
C:\Windows\SysWOW64\Khpgmqpp.exeC:\Windows\system32\Khpgmqpp.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5920 -
C:\Windows\SysWOW64\Lbekjipe.exeC:\Windows\system32\Lbekjipe.exe14⤵
- Drops file in System32 directory
- Modifies registry class
PID:5956 -
C:\Windows\SysWOW64\Lhbdbpnm.exeC:\Windows\system32\Lhbdbpnm.exe15⤵PID:6004
-
C:\Windows\SysWOW64\Lbghpinc.exeC:\Windows\system32\Lbghpinc.exe16⤵PID:6056
-
C:\Windows\SysWOW64\Lfeaegdi.exeC:\Windows\system32\Lfeaegdi.exe17⤵PID:6100
-
C:\Windows\SysWOW64\Lpneom32.exeC:\Windows\system32\Lpneom32.exe18⤵
- Modifies registry class
PID:4520 -
C:\Windows\SysWOW64\Mfoclflo.exeC:\Windows\system32\Mfoclflo.exe19⤵PID:5200
-
C:\Windows\SysWOW64\Mhppcn32.exeC:\Windows\system32\Mhppcn32.exe20⤵PID:5292
-
C:\Windows\SysWOW64\Mbedag32.exeC:\Windows\system32\Mbedag32.exe21⤵PID:5404
-
C:\Windows\SysWOW64\Mplapkoj.exeC:\Windows\system32\Mplapkoj.exe22⤵PID:5480
-
C:\Windows\SysWOW64\Mehjhbma.exeC:\Windows\system32\Mehjhbma.exe23⤵PID:5568
-
C:\Windows\SysWOW64\Ngmpmd32.exeC:\Windows\system32\Ngmpmd32.exe24⤵PID:5656
-
C:\Windows\SysWOW64\Oeffip32.exeC:\Windows\system32\Oeffip32.exe25⤵PID:5764
-
C:\Windows\SysWOW64\Ocjgcd32.exeC:\Windows\system32\Ocjgcd32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5868 -
C:\Windows\SysWOW64\Oiihkncb.exeC:\Windows\system32\Oiihkncb.exe27⤵PID:5948
-
C:\Windows\SysWOW64\Oofacdaj.exeC:\Windows\system32\Oofacdaj.exe28⤵PID:6076
-
C:\Windows\SysWOW64\Pomgcc32.exeC:\Windows\system32\Pomgcc32.exe29⤵PID:3244
-
C:\Windows\SysWOW64\Pjbkal32.exeC:\Windows\system32\Pjbkal32.exe30⤵PID:5216
-
C:\Windows\SysWOW64\Qcpieamc.exeC:\Windows\system32\Qcpieamc.exe31⤵PID:3188
-
C:\Windows\SysWOW64\Qofjjb32.exeC:\Windows\system32\Qofjjb32.exe32⤵PID:5368
-
C:\Windows\SysWOW64\Aifdcgcp.exeC:\Windows\system32\Aifdcgcp.exe33⤵
- Drops file in System32 directory
PID:5476 -
C:\Windows\SysWOW64\Aggean32.exeC:\Windows\system32\Aggean32.exe34⤵PID:5548
-
C:\Windows\SysWOW64\Aihaifam.exeC:\Windows\system32\Aihaifam.exe35⤵PID:5680
-
C:\Windows\SysWOW64\Aobieq32.exeC:\Windows\system32\Aobieq32.exe36⤵PID:5716
-
C:\Windows\SysWOW64\Bijnnf32.exeC:\Windows\system32\Bijnnf32.exe37⤵PID:5856
-
C:\Windows\SysWOW64\Bfnnhj32.exeC:\Windows\system32\Bfnnhj32.exe38⤵PID:5900
-
C:\Windows\SysWOW64\Bqdbec32.exeC:\Windows\system32\Bqdbec32.exe39⤵
- Drops file in System32 directory
PID:6020 -
C:\Windows\SysWOW64\Bjlgnh32.exeC:\Windows\system32\Bjlgnh32.exe40⤵PID:6064
-
C:\Windows\SysWOW64\Bcdlgnkk.exeC:\Windows\system32\Bcdlgnkk.exe41⤵PID:6088
-
C:\Windows\SysWOW64\Bmmppc32.exeC:\Windows\system32\Bmmppc32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3396 -
C:\Windows\SysWOW64\Bjaqih32.exeC:\Windows\system32\Bjaqih32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4800 -
C:\Windows\SysWOW64\Cipppc32.exeC:\Windows\system32\Cipppc32.exe44⤵PID:5328
-
C:\Windows\SysWOW64\Ccednl32.exeC:\Windows\system32\Ccednl32.exe45⤵PID:4756
-
C:\Windows\SysWOW64\Dibmfb32.exeC:\Windows\system32\Dibmfb32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5528 -
C:\Windows\SysWOW64\Dfhjefhf.exeC:\Windows\system32\Dfhjefhf.exe47⤵PID:4832
-
C:\Windows\SysWOW64\Dannbogl.exeC:\Windows\system32\Dannbogl.exe48⤵PID:3784
-
C:\Windows\SysWOW64\Dfmcpf32.exeC:\Windows\system32\Dfmcpf32.exe49⤵
- Drops file in System32 directory
PID:5836 -
C:\Windows\SysWOW64\Ejmild32.exeC:\Windows\system32\Ejmild32.exe50⤵PID:2716
-
C:\Windows\SysWOW64\Epjadk32.exeC:\Windows\system32\Epjadk32.exe51⤵PID:6112
-
C:\Windows\SysWOW64\Ejofacfb.exeC:\Windows\system32\Ejofacfb.exe52⤵PID:6132
-
C:\Windows\SysWOW64\Fiilmofe.exeC:\Windows\system32\Fiilmofe.exe53⤵PID:1036
-
C:\Windows\SysWOW64\Hddbmedc.exeC:\Windows\system32\Hddbmedc.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4420 -
C:\Windows\SysWOW64\Inhgaipf.exeC:\Windows\system32\Inhgaipf.exe55⤵PID:1188
-
C:\Windows\SysWOW64\Ijadljdg.exeC:\Windows\system32\Ijadljdg.exe56⤵PID:5944
-
C:\Windows\SysWOW64\Lnihod32.exeC:\Windows\system32\Lnihod32.exe57⤵PID:4708
-
C:\Windows\SysWOW64\Lbgaecjg.exeC:\Windows\system32\Lbgaecjg.exe58⤵PID:4256
-
C:\Windows\SysWOW64\Meqmmm32.exeC:\Windows\system32\Meqmmm32.exe59⤵PID:416
-
C:\Windows\SysWOW64\Mniafbfn.exeC:\Windows\system32\Mniafbfn.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:924 -
C:\Windows\SysWOW64\Miofcked.exeC:\Windows\system32\Miofcked.exe61⤵PID:972
-
C:\Windows\SysWOW64\Mjpbkc32.exeC:\Windows\system32\Mjpbkc32.exe62⤵PID:4860
-
C:\Windows\SysWOW64\Meefhl32.exeC:\Windows\system32\Meefhl32.exe63⤵PID:464
-
C:\Windows\SysWOW64\Mjbopcip.exeC:\Windows\system32\Mjbopcip.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5788 -
C:\Windows\SysWOW64\Mehcnlie.exeC:\Windows\system32\Mehcnlie.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4384 -
C:\Windows\SysWOW64\Nophfa32.exeC:\Windows\system32\Nophfa32.exe66⤵
- Modifies registry class
PID:2700 -
C:\Windows\SysWOW64\Nifldj32.exeC:\Windows\system32\Nifldj32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6116 -
C:\Windows\SysWOW64\Nbnpmp32.exeC:\Windows\system32\Nbnpmp32.exe68⤵PID:4948
-
C:\Windows\SysWOW64\Nihiiimi.exeC:\Windows\system32\Nihiiimi.exe69⤵
- Drops file in System32 directory
- Modifies registry class
PID:4944 -
C:\Windows\SysWOW64\Nacmnlkd.exeC:\Windows\system32\Nacmnlkd.exe70⤵
- Drops file in System32 directory
PID:3848 -
C:\Windows\SysWOW64\Nliakd32.exeC:\Windows\system32\Nliakd32.exe71⤵PID:412
-
C:\Windows\SysWOW64\Naejcl32.exeC:\Windows\system32\Naejcl32.exe72⤵
- Modifies registry class
PID:5668 -
C:\Windows\SysWOW64\Noijmp32.exeC:\Windows\system32\Noijmp32.exe73⤵PID:4572
-
C:\Windows\SysWOW64\Oeccijoh.exeC:\Windows\system32\Oeccijoh.exe74⤵
- Drops file in System32 directory
PID:4584 -
C:\Windows\SysWOW64\Okpkaqmp.exeC:\Windows\system32\Okpkaqmp.exe75⤵PID:2928
-
C:\Windows\SysWOW64\Oefpoi32.exeC:\Windows\system32\Oefpoi32.exe76⤵
- Drops file in System32 directory
- Modifies registry class
PID:5352 -
C:\Windows\SysWOW64\Oondhocf.exeC:\Windows\system32\Oondhocf.exe77⤵
- Modifies registry class
PID:4052 -
C:\Windows\SysWOW64\Oehldi32.exeC:\Windows\system32\Oehldi32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5744 -
C:\Windows\SysWOW64\Olbdacbp.exeC:\Windows\system32\Olbdacbp.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2252 -
C:\Windows\SysWOW64\Ohkbldfa.exeC:\Windows\system32\Ohkbldfa.exe80⤵
- Drops file in System32 directory
PID:3584 -
C:\Windows\SysWOW64\Poggnnkk.exeC:\Windows\system32\Poggnnkk.exe81⤵PID:2964
-
C:\Windows\SysWOW64\Qoecol32.exeC:\Windows\system32\Qoecol32.exe82⤵PID:1996
-
C:\Windows\SysWOW64\Ajpqhdkl.exeC:\Windows\system32\Ajpqhdkl.exe83⤵PID:4532
-
C:\Windows\SysWOW64\Bhjgdplo.exeC:\Windows\system32\Bhjgdplo.exe84⤵PID:4412
-
C:\Windows\SysWOW64\Boflfiai.exeC:\Windows\system32\Boflfiai.exe85⤵PID:3124
-
C:\Windows\SysWOW64\Cbnkhcha.exeC:\Windows\system32\Cbnkhcha.exe86⤵
- Modifies registry class
PID:1264 -
C:\Windows\SysWOW64\Ccmgbf32.exeC:\Windows\system32\Ccmgbf32.exe87⤵PID:1404
-
C:\Windows\SysWOW64\Dcdnce32.exeC:\Windows\system32\Dcdnce32.exe88⤵PID:4888
-
C:\Windows\SysWOW64\Djelqo32.exeC:\Windows\system32\Djelqo32.exe89⤵PID:396
-
C:\Windows\SysWOW64\Dcnqid32.exeC:\Windows\system32\Dcnqid32.exe90⤵PID:1704
-
C:\Windows\SysWOW64\Elkbcf32.exeC:\Windows\system32\Elkbcf32.exe91⤵
- Modifies registry class
PID:2188 -
C:\Windows\SysWOW64\Eiobmjkd.exeC:\Windows\system32\Eiobmjkd.exe92⤵PID:5992
-
C:\Windows\SysWOW64\Ejoogm32.exeC:\Windows\system32\Ejoogm32.exe93⤵PID:3992
-
C:\Windows\SysWOW64\Emphhhoh.exeC:\Windows\system32\Emphhhoh.exe94⤵
- Modifies registry class
PID:4576 -
C:\Windows\SysWOW64\Fmdach32.exeC:\Windows\system32\Fmdach32.exe95⤵
- Drops file in System32 directory
PID:5508 -
C:\Windows\SysWOW64\Flinddpj.exeC:\Windows\system32\Flinddpj.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4196 -
C:\Windows\SysWOW64\Ffobbmpp.exeC:\Windows\system32\Ffobbmpp.exe97⤵PID:3676
-
C:\Windows\SysWOW64\Fllkjd32.exeC:\Windows\system32\Fllkjd32.exe98⤵PID:4556
-
C:\Windows\SysWOW64\Ffaogm32.exeC:\Windows\system32\Ffaogm32.exe99⤵PID:3504
-
C:\Windows\SysWOW64\Gbmigm32.exeC:\Windows\system32\Gbmigm32.exe100⤵PID:2224
-
C:\Windows\SysWOW64\Glenpb32.exeC:\Windows\system32\Glenpb32.exe101⤵PID:4344
-
C:\Windows\SysWOW64\Hgahnjpk.exeC:\Windows\system32\Hgahnjpk.exe102⤵PID:2068
-
C:\Windows\SysWOW64\Hdhemn32.exeC:\Windows\system32\Hdhemn32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3544 -
C:\Windows\SysWOW64\Hpofbobf.exeC:\Windows\system32\Hpofbobf.exe104⤵
- Modifies registry class
PID:4232 -
C:\Windows\SysWOW64\Iljpbp32.exeC:\Windows\system32\Iljpbp32.exe105⤵PID:2028
-
C:\Windows\SysWOW64\Innfgb32.exeC:\Windows\system32\Innfgb32.exe106⤵PID:3112
-
C:\Windows\SysWOW64\Jcmkehcg.exeC:\Windows\system32\Jcmkehcg.exe107⤵PID:2856
-
C:\Windows\SysWOW64\Jncobabm.exeC:\Windows\system32\Jncobabm.exe108⤵PID:180
-
C:\Windows\SysWOW64\Jcphkhad.exeC:\Windows\system32\Jcphkhad.exe109⤵
- Modifies registry class
PID:3968 -
C:\Windows\SysWOW64\Jnelha32.exeC:\Windows\system32\Jnelha32.exe110⤵
- Modifies registry class
PID:1304 -
C:\Windows\SysWOW64\Lcbngeqo.exeC:\Windows\system32\Lcbngeqo.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:752 -
C:\Windows\SysWOW64\Mjkbemll.exeC:\Windows\system32\Mjkbemll.exe112⤵
- Drops file in System32 directory
PID:208 -
C:\Windows\SysWOW64\Nndjgjhe.exeC:\Windows\system32\Nndjgjhe.exe113⤵PID:4000
-
C:\Windows\SysWOW64\Odooqo32.exeC:\Windows\system32\Odooqo32.exe114⤵PID:2356
-
C:\Windows\SysWOW64\Pmjpod32.exeC:\Windows\system32\Pmjpod32.exe115⤵PID:4896
-
C:\Windows\SysWOW64\Pknqhh32.exeC:\Windows\system32\Pknqhh32.exe116⤵PID:2952
-
C:\Windows\SysWOW64\Pdfeandd.exeC:\Windows\system32\Pdfeandd.exe117⤵PID:4144
-
C:\Windows\SysWOW64\Poliog32.exeC:\Windows\system32\Poliog32.exe118⤵PID:4272
-
C:\Windows\SysWOW64\Qkegiggl.exeC:\Windows\system32\Qkegiggl.exe119⤵PID:3080
-
C:\Windows\SysWOW64\Qdmkbmnl.exeC:\Windows\system32\Qdmkbmnl.exe120⤵PID:4064
-
C:\Windows\SysWOW64\Alfpijll.exeC:\Windows\system32\Alfpijll.exe121⤵PID:3092
-
C:\Windows\SysWOW64\Adbdml32.exeC:\Windows\system32\Adbdml32.exe122⤵PID:2864
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-