Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
181s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEAS178a69f62d319a15079780e3e0e645e0exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.NEAS178a69f62d319a15079780e3e0e645e0exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.NEAS178a69f62d319a15079780e3e0e645e0exe_JC.exe
-
Size
459KB
-
MD5
178a69f62d319a15079780e3e0e645e0
-
SHA1
bb2895f155246eeff7a444c983f01860ad86f201
-
SHA256
f358b1efc4b255f65af31c81806abe2cc3de6ac676d5b72c7497c92060d31cdd
-
SHA512
cd92cdf0fe0746397a29b34a19aa195a5e4d71cdadd996846c9fd14225ddc14c5c98962be873268e1f40aa50efa1e4ae5707834c949b51236fab9422cde71844
-
SSDEEP
6144:L3JIriK/MwGsmLrZNs/VKi/MwGsmLr5+Nod/MwGsmLrZNs/VKi/MwGsmLrRo68lS:L3EMmmpNs/VXMmmg8MmmpNs/VXMmm
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnqcop32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fggdic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Epeohn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgcooaah.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqipeboj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkabeng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkabeng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlcidopb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjimaole.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cefolk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmafjp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojmcej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcebadof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iimjan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcefbhpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldbefe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qfgfpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpefaq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okcccdkp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bccfleqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gefencoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffngfi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqjqab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfnhpblk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeffgkkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjeibc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnmbao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Neebkkgi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Komhfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnqcfjae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbeibo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcembe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fihnhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmfkin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcdiahme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijhhocnc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijjedc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ledoegkm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oloipmfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfhlpnfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Caapfnkd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojajbdde.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neebkkgi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ondleo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccpkblqn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngikpjml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpimflqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dqipeboj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcmndncl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpfhianp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnedgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Klbgfc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcpgmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flnlaahl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhbciqln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bikeni32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlpcpffl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onapnbhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inkjfk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Diclff32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmafjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjabnd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmkgmlko.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llpchaqg.exe -
Executes dropped EXE 64 IoCs
pid Process 3832 Dmjmekgn.exe 2600 Dcffnbee.exe 1936 Dknnoofg.exe 4984 Dpjfgf32.exe 3756 Dkpjdo32.exe 4216 Dpmcmf32.exe 1980 Dggkipii.exe 2788 Dnqcfjae.exe 4460 Dgihop32.exe 2440 Dncpkjoc.exe 4252 Dpalgenf.exe 4192 Egkddo32.exe 2592 Ejjaqk32.exe 4332 Egpnooan.exe 4996 Enjfli32.exe 1096 Ecgodpgb.exe 2188 Egegjn32.exe 5020 Jnedgq32.exe 2508 Kbeibo32.exe 324 Khdoqefq.exe 1200 Klbgfc32.exe 2692 Kbnlim32.exe 4656 Loemnnhe.exe 2916 Ldbefe32.exe 2628 Llkjmb32.exe 3460 Ledoegkm.exe 1968 Lajokiaa.exe 3900 Llpchaqg.exe 4176 Lamlphoo.exe 1468 Mekdffee.exe 5016 Mklfjm32.exe 4436 Mddkbbfg.exe 3736 Nhbciqln.exe 3776 Nakhaf32.exe 1412 Nlcidopb.exe 1588 Ncmaai32.exe 3240 Nconfh32.exe 1536 Nbdkhe32.exe 1548 Okmpqjad.exe 3680 Obfhmd32.exe 4196 Ohqpjo32.exe 1416 Ofdqcc32.exe 4064 Oloipmfd.exe 1836 Obkahddl.exe 3768 Oooaah32.exe 4756 Odljjo32.exe 4908 Oflfdbip.exe 3880 Pkholi32.exe 4004 Pcpgmf32.exe 1284 Pdqcenmg.exe 5064 Pmhkflnj.exe 1356 Poidhg32.exe 112 Pmmeak32.exe 2576 Pbimjb32.exe 2872 Qfgfpp32.exe 1696 Aeffgkkp.exe 1492 Aehbmk32.exe 2984 Bfhofnpp.exe 4264 Bldgoeog.exe 4732 Bmddihfj.exe 5060 Bikeni32.exe 4388 Bcpika32.exe 4080 Blknpdho.exe 956 Cdebfago.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Pefhfgoc.exe Lhhchi32.exe File opened for modification C:\Windows\SysWOW64\Ncmaai32.exe Nlcidopb.exe File created C:\Windows\SysWOW64\Hjimaole.exe Hhjqec32.exe File created C:\Windows\SysWOW64\Obfhmd32.exe Okmpqjad.exe File created C:\Windows\SysWOW64\Famnbgil.dll Qfgfpp32.exe File created C:\Windows\SysWOW64\Hnhjcpmd.dll Icciccmd.exe File opened for modification C:\Windows\SysWOW64\Omkmhlpf.exe Ildpbfmf.exe File opened for modification C:\Windows\SysWOW64\Komhfa32.exe Kphkee32.exe File created C:\Windows\SysWOW64\Dkkabeng.exe Dcdiahme.exe File created C:\Windows\SysWOW64\Dkpjdo32.exe Dpjfgf32.exe File created C:\Windows\SysWOW64\Dggkipii.exe Dpmcmf32.exe File created C:\Windows\SysWOW64\Ceehhk32.dll Dnqcop32.exe File created C:\Windows\SysWOW64\Cdgolq32.exe Cdebfago.exe File created C:\Windows\SysWOW64\Fmancbji.exe Ekaaio32.exe File created C:\Windows\SysWOW64\Fggdic32.exe Fdihmh32.exe File opened for modification C:\Windows\SysWOW64\Pocpqcpm.exe Pldcdhpi.exe File opened for modification C:\Windows\SysWOW64\Pemhmn32.exe Pbokab32.exe File created C:\Windows\SysWOW64\Ddcekk32.exe Daeioo32.exe File created C:\Windows\SysWOW64\Cifhmeli.dll Padeem32.exe File created C:\Windows\SysWOW64\Qkloqefm.dll Qfhdnb32.exe File created C:\Windows\SysWOW64\Diclff32.exe Dkokma32.exe File opened for modification C:\Windows\SysWOW64\Gjqigg32.exe Gddqop32.exe File created C:\Windows\SysWOW64\Omdpejfm.dll Ijhhocnc.exe File opened for modification C:\Windows\SysWOW64\Negoaj32.exe Nojfic32.exe File created C:\Windows\SysWOW64\Aqkgikip.exe Aqijdk32.exe File created C:\Windows\SysWOW64\Lennjaej.dll Jakchf32.exe File created C:\Windows\SysWOW64\Odfjpcbb.dll Fbaabk32.exe File created C:\Windows\SysWOW64\Dpjfgf32.exe Dknnoofg.exe File created C:\Windows\SysWOW64\Qebeaf32.dll Pbimjb32.exe File opened for modification C:\Windows\SysWOW64\Dnqcop32.exe Dknnhekd.exe File created C:\Windows\SysWOW64\Mbgjlq32.dll Bldgoeog.exe File created C:\Windows\SysWOW64\Edfaonkb.dll Neebkkgi.exe File created C:\Windows\SysWOW64\Ocooahdo.dll Ellpmolj.exe File created C:\Windows\SysWOW64\Jfhlpnfp.exe Jakchf32.exe File created C:\Windows\SysWOW64\Qlpcpffl.exe Pemhmn32.exe File created C:\Windows\SysWOW64\Leecmgpa.dll Nejkfj32.exe File created C:\Windows\SysWOW64\Ibicgmhe.exe Bcebadof.exe File created C:\Windows\SysWOW64\Cpokgb32.dll Mfpeeb32.exe File created C:\Windows\SysWOW64\Ledoegkm.exe Llkjmb32.exe File created C:\Windows\SysWOW64\Honmnc32.dll Oflfdbip.exe File created C:\Windows\SysWOW64\Ljfmgocq.exe Kaiocjae.exe File opened for modification C:\Windows\SysWOW64\Oalpigkb.exe Jjfdfl32.exe File created C:\Windows\SysWOW64\Ejjaqk32.exe Egkddo32.exe File opened for modification C:\Windows\SysWOW64\Kbeibo32.exe Jnedgq32.exe File opened for modification C:\Windows\SysWOW64\Hdaajd32.exe Hmginjki.exe File created C:\Windows\SysWOW64\Hkpnljdj.dll Dccbln32.exe File created C:\Windows\SysWOW64\Mcmongoj.exe Ljpajbmo.exe File created C:\Windows\SysWOW64\Cdebfago.exe Blknpdho.exe File created C:\Windows\SysWOW64\Fmnfcojj.dll Flaiho32.exe File created C:\Windows\SysWOW64\Pmbcik32.exe Pekkhn32.exe File opened for modification C:\Windows\SysWOW64\Pgdgodhj.exe Oagbljcp.exe File created C:\Windows\SysWOW64\Dbbjkf32.dll Caapfnkd.exe File created C:\Windows\SysWOW64\Hokmgfjb.dll Oohkko32.exe File opened for modification C:\Windows\SysWOW64\Nakhaf32.exe Nhbciqln.exe File created C:\Windows\SysWOW64\Glmhdm32.exe Fdadpk32.exe File created C:\Windows\SysWOW64\Jafjfmak.exe Inhmjabg.exe File opened for modification C:\Windows\SysWOW64\Oagbljcp.exe Okkidceh.exe File created C:\Windows\SysWOW64\Gcagdj32.exe Ghgjlaln.exe File opened for modification C:\Windows\SysWOW64\Aqkgikip.exe Aqijdk32.exe File created C:\Windows\SysWOW64\Lfpmgnmk.dll Emhkmcbd.exe File opened for modification C:\Windows\SysWOW64\Efbllhfb.exe Emjgcc32.exe File created C:\Windows\SysWOW64\Efhodebp.dll Lamlphoo.exe File opened for modification C:\Windows\SysWOW64\Bmddihfj.exe Bldgoeog.exe File created C:\Windows\SysWOW64\Hgghdp32.exe Ccpkblqn.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oalpigkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nejkfj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmcabd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iqbpkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlqgpnjq.dll" Pdqcenmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmmqbb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfnpca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifmldo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gcagdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfmijkhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdmahgnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpoahbdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncmaai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpandm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jajocm32.dll" Fhngfcdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Polcin32.dll" Fihnhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkgacp32.dll" Imdgeooj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odljjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcmnkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dejfbl32.dll" Gmfkjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jnkjpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpalgenf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Megdmhbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpjdkd32.dll" Fggdic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jedblkga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dcgkljog.dll" Kmkgmlko.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hmbpbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oflfdbip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pidjcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pidjcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Caapfnkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojblpdbb.dll" Phcgmffo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fqphbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjajfaif.dll" Knfjlp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkpjdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmnfcojj.dll" Flaiho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nfeekgjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckjpamkc.dll" Pjkmhblk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcmongoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbppll32.dll" Gjmffn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Odljjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdgmga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojommdfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmhedgff.dll" Phajgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hikqno32.dll" Edmhai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjoehefn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Omkmhlpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iclcljhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbdjfo32.dll" Hpnohinj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjgklqop.dll" Jfcbodpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ipldpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mddkbbfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abdagi32.dll" Aehbmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjbleonn.dll" Pidjcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Epkpdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnjdigpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnqcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnqcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abocgb32.dll" Dpjfgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfhjhgnc.dll" Kdeoifbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ggmcplgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbjdeo32.dll" Hnehdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oceepj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abqldike.dll" Iqbpkn32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4516 wrote to memory of 3832 4516 NEAS.NEAS178a69f62d319a15079780e3e0e645e0exe_JC.exe 85 PID 4516 wrote to memory of 3832 4516 NEAS.NEAS178a69f62d319a15079780e3e0e645e0exe_JC.exe 85 PID 4516 wrote to memory of 3832 4516 NEAS.NEAS178a69f62d319a15079780e3e0e645e0exe_JC.exe 85 PID 3832 wrote to memory of 2600 3832 Dmjmekgn.exe 102 PID 3832 wrote to memory of 2600 3832 Dmjmekgn.exe 102 PID 3832 wrote to memory of 2600 3832 Dmjmekgn.exe 102 PID 2600 wrote to memory of 1936 2600 Dcffnbee.exe 86 PID 2600 wrote to memory of 1936 2600 Dcffnbee.exe 86 PID 2600 wrote to memory of 1936 2600 Dcffnbee.exe 86 PID 1936 wrote to memory of 4984 1936 Dknnoofg.exe 100 PID 1936 wrote to memory of 4984 1936 Dknnoofg.exe 100 PID 1936 wrote to memory of 4984 1936 Dknnoofg.exe 100 PID 4984 wrote to memory of 3756 4984 Dpjfgf32.exe 99 PID 4984 wrote to memory of 3756 4984 Dpjfgf32.exe 99 PID 4984 wrote to memory of 3756 4984 Dpjfgf32.exe 99 PID 3756 wrote to memory of 4216 3756 Dkpjdo32.exe 98 PID 3756 wrote to memory of 4216 3756 Dkpjdo32.exe 98 PID 3756 wrote to memory of 4216 3756 Dkpjdo32.exe 98 PID 4216 wrote to memory of 1980 4216 Dpmcmf32.exe 97 PID 4216 wrote to memory of 1980 4216 Dpmcmf32.exe 97 PID 4216 wrote to memory of 1980 4216 Dpmcmf32.exe 97 PID 1980 wrote to memory of 2788 1980 Dggkipii.exe 87 PID 1980 wrote to memory of 2788 1980 Dggkipii.exe 87 PID 1980 wrote to memory of 2788 1980 Dggkipii.exe 87 PID 2788 wrote to memory of 4460 2788 Dnqcfjae.exe 88 PID 2788 wrote to memory of 4460 2788 Dnqcfjae.exe 88 PID 2788 wrote to memory of 4460 2788 Dnqcfjae.exe 88 PID 4460 wrote to memory of 2440 4460 Dgihop32.exe 96 PID 4460 wrote to memory of 2440 4460 Dgihop32.exe 96 PID 4460 wrote to memory of 2440 4460 Dgihop32.exe 96 PID 2440 wrote to memory of 4252 2440 Dncpkjoc.exe 95 PID 2440 wrote to memory of 4252 2440 Dncpkjoc.exe 95 PID 2440 wrote to memory of 4252 2440 Dncpkjoc.exe 95 PID 4252 wrote to memory of 4192 4252 Dpalgenf.exe 89 PID 4252 wrote to memory of 4192 4252 Dpalgenf.exe 89 PID 4252 wrote to memory of 4192 4252 Dpalgenf.exe 89 PID 4192 wrote to memory of 2592 4192 Egkddo32.exe 91 PID 4192 wrote to memory of 2592 4192 Egkddo32.exe 91 PID 4192 wrote to memory of 2592 4192 Egkddo32.exe 91 PID 2592 wrote to memory of 4332 2592 Ejjaqk32.exe 94 PID 2592 wrote to memory of 4332 2592 Ejjaqk32.exe 94 PID 2592 wrote to memory of 4332 2592 Ejjaqk32.exe 94 PID 4332 wrote to memory of 4996 4332 Egpnooan.exe 92 PID 4332 wrote to memory of 4996 4332 Egpnooan.exe 92 PID 4332 wrote to memory of 4996 4332 Egpnooan.exe 92 PID 4996 wrote to memory of 1096 4996 Enjfli32.exe 93 PID 4996 wrote to memory of 1096 4996 Enjfli32.exe 93 PID 4996 wrote to memory of 1096 4996 Enjfli32.exe 93 PID 1096 wrote to memory of 2188 1096 Ecgodpgb.exe 103 PID 1096 wrote to memory of 2188 1096 Ecgodpgb.exe 103 PID 1096 wrote to memory of 2188 1096 Ecgodpgb.exe 103 PID 2188 wrote to memory of 5020 2188 Egegjn32.exe 104 PID 2188 wrote to memory of 5020 2188 Egegjn32.exe 104 PID 2188 wrote to memory of 5020 2188 Egegjn32.exe 104 PID 5020 wrote to memory of 2508 5020 Jnedgq32.exe 105 PID 5020 wrote to memory of 2508 5020 Jnedgq32.exe 105 PID 5020 wrote to memory of 2508 5020 Jnedgq32.exe 105 PID 2508 wrote to memory of 324 2508 Kbeibo32.exe 106 PID 2508 wrote to memory of 324 2508 Kbeibo32.exe 106 PID 2508 wrote to memory of 324 2508 Kbeibo32.exe 106 PID 324 wrote to memory of 1200 324 Khdoqefq.exe 107 PID 324 wrote to memory of 1200 324 Khdoqefq.exe 107 PID 324 wrote to memory of 1200 324 Khdoqefq.exe 107 PID 1200 wrote to memory of 2692 1200 Klbgfc32.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS178a69f62d319a15079780e3e0e645e0exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS178a69f62d319a15079780e3e0e645e0exe_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\Dmjmekgn.exeC:\Windows\system32\Dmjmekgn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\Dcffnbee.exeC:\Windows\system32\Dcffnbee.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600
-
-
-
C:\Windows\SysWOW64\Dknnoofg.exeC:\Windows\system32\Dknnoofg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\Dpjfgf32.exeC:\Windows\system32\Dpjfgf32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4984
-
-
C:\Windows\SysWOW64\Dnqcfjae.exeC:\Windows\system32\Dnqcfjae.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\Dgihop32.exeC:\Windows\system32\Dgihop32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\Dncpkjoc.exeC:\Windows\system32\Dncpkjoc.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440
-
-
-
C:\Windows\SysWOW64\Egkddo32.exeC:\Windows\system32\Egkddo32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\Ejjaqk32.exeC:\Windows\system32\Ejjaqk32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\Egpnooan.exeC:\Windows\system32\Egpnooan.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4332
-
-
-
C:\Windows\SysWOW64\Enjfli32.exeC:\Windows\system32\Enjfli32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\Ecgodpgb.exeC:\Windows\system32\Ecgodpgb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\Egegjn32.exeC:\Windows\system32\Egegjn32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Jnedgq32.exeC:\Windows\system32\Jnedgq32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\Kbeibo32.exeC:\Windows\system32\Kbeibo32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Khdoqefq.exeC:\Windows\system32\Khdoqefq.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\Klbgfc32.exeC:\Windows\system32\Klbgfc32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\Kbnlim32.exeC:\Windows\system32\Kbnlim32.exe8⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\Loemnnhe.exeC:\Windows\system32\Loemnnhe.exe9⤵
- Executes dropped EXE
PID:4656 -
C:\Windows\SysWOW64\Ldbefe32.exeC:\Windows\system32\Ldbefe32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\Llkjmb32.exeC:\Windows\system32\Llkjmb32.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2628 -
C:\Windows\SysWOW64\Ledoegkm.exeC:\Windows\system32\Ledoegkm.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3460 -
C:\Windows\SysWOW64\Lajokiaa.exeC:\Windows\system32\Lajokiaa.exe13⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\Llpchaqg.exeC:\Windows\system32\Llpchaqg.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3900 -
C:\Windows\SysWOW64\Lamlphoo.exeC:\Windows\system32\Lamlphoo.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4176 -
C:\Windows\SysWOW64\Mekdffee.exeC:\Windows\system32\Mekdffee.exe16⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\Mklfjm32.exeC:\Windows\system32\Mklfjm32.exe17⤵
- Executes dropped EXE
PID:5016
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Dpalgenf.exeC:\Windows\system32\Dpalgenf.exe1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4252
-
C:\Windows\SysWOW64\Dggkipii.exeC:\Windows\system32\Dggkipii.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980
-
C:\Windows\SysWOW64\Dpmcmf32.exeC:\Windows\system32\Dpmcmf32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4216
-
C:\Windows\SysWOW64\Dkpjdo32.exeC:\Windows\system32\Dkpjdo32.exe1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3756
-
C:\Windows\SysWOW64\Mddkbbfg.exeC:\Windows\system32\Mddkbbfg.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:4436 -
C:\Windows\SysWOW64\Nhbciqln.exeC:\Windows\system32\Nhbciqln.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3736 -
C:\Windows\SysWOW64\Nakhaf32.exeC:\Windows\system32\Nakhaf32.exe3⤵
- Executes dropped EXE
PID:3776 -
C:\Windows\SysWOW64\Nlcidopb.exeC:\Windows\system32\Nlcidopb.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1412 -
C:\Windows\SysWOW64\Ncmaai32.exeC:\Windows\system32\Ncmaai32.exe5⤵
- Executes dropped EXE
- Modifies registry class
PID:1588 -
C:\Windows\SysWOW64\Nconfh32.exeC:\Windows\system32\Nconfh32.exe6⤵
- Executes dropped EXE
PID:3240 -
C:\Windows\SysWOW64\Nbdkhe32.exeC:\Windows\system32\Nbdkhe32.exe7⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\Okmpqjad.exeC:\Windows\system32\Okmpqjad.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1548 -
C:\Windows\SysWOW64\Obfhmd32.exeC:\Windows\system32\Obfhmd32.exe9⤵
- Executes dropped EXE
PID:3680 -
C:\Windows\SysWOW64\Ohqpjo32.exeC:\Windows\system32\Ohqpjo32.exe10⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\SysWOW64\Ofdqcc32.exeC:\Windows\system32\Ofdqcc32.exe11⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\Oloipmfd.exeC:\Windows\system32\Oloipmfd.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\Obkahddl.exeC:\Windows\system32\Obkahddl.exe13⤵
- Executes dropped EXE
PID:1836 -
C:\Windows\SysWOW64\Oooaah32.exeC:\Windows\system32\Oooaah32.exe14⤵
- Executes dropped EXE
PID:3768 -
C:\Windows\SysWOW64\Odljjo32.exeC:\Windows\system32\Odljjo32.exe15⤵
- Executes dropped EXE
- Modifies registry class
PID:4756 -
C:\Windows\SysWOW64\Oflfdbip.exeC:\Windows\system32\Oflfdbip.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4908 -
C:\Windows\SysWOW64\Pkholi32.exeC:\Windows\system32\Pkholi32.exe17⤵
- Executes dropped EXE
PID:3880 -
C:\Windows\SysWOW64\Pcpgmf32.exeC:\Windows\system32\Pcpgmf32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4004 -
C:\Windows\SysWOW64\Pdqcenmg.exeC:\Windows\system32\Pdqcenmg.exe19⤵
- Executes dropped EXE
- Modifies registry class
PID:1284 -
C:\Windows\SysWOW64\Pmhkflnj.exeC:\Windows\system32\Pmhkflnj.exe20⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\SysWOW64\Poidhg32.exeC:\Windows\system32\Poidhg32.exe21⤵
- Executes dropped EXE
PID:1356 -
C:\Windows\SysWOW64\Pmmeak32.exeC:\Windows\system32\Pmmeak32.exe22⤵
- Executes dropped EXE
PID:112 -
C:\Windows\SysWOW64\Pbimjb32.exeC:\Windows\system32\Pbimjb32.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2576 -
C:\Windows\SysWOW64\Qfgfpp32.exeC:\Windows\system32\Qfgfpp32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2872 -
C:\Windows\SysWOW64\Aeffgkkp.exeC:\Windows\system32\Aeffgkkp.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\Aehbmk32.exeC:\Windows\system32\Aehbmk32.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:1492 -
C:\Windows\SysWOW64\Bfhofnpp.exeC:\Windows\system32\Bfhofnpp.exe27⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\Bldgoeog.exeC:\Windows\system32\Bldgoeog.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4264 -
C:\Windows\SysWOW64\Bmddihfj.exeC:\Windows\system32\Bmddihfj.exe29⤵
- Executes dropped EXE
PID:4732 -
C:\Windows\SysWOW64\Bikeni32.exeC:\Windows\system32\Bikeni32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5060 -
C:\Windows\SysWOW64\Bcpika32.exeC:\Windows\system32\Bcpika32.exe31⤵
- Executes dropped EXE
PID:4388 -
C:\Windows\SysWOW64\Blknpdho.exeC:\Windows\system32\Blknpdho.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4080 -
C:\Windows\SysWOW64\Cdebfago.exeC:\Windows\system32\Cdebfago.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:956 -
C:\Windows\SysWOW64\Cdgolq32.exeC:\Windows\system32\Cdgolq32.exe34⤵PID:4424
-
C:\Windows\SysWOW64\Ciknefmk.exeC:\Windows\system32\Ciknefmk.exe35⤵PID:936
-
C:\Windows\SysWOW64\Dpefaq32.exeC:\Windows\system32\Dpefaq32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3620 -
C:\Windows\SysWOW64\Dfonnk32.exeC:\Windows\system32\Dfonnk32.exe37⤵PID:4392
-
C:\Windows\SysWOW64\Dmifkecb.exeC:\Windows\system32\Dmifkecb.exe38⤵PID:3332
-
C:\Windows\SysWOW64\Dbfoclai.exeC:\Windows\system32\Dbfoclai.exe39⤵PID:380
-
C:\Windows\SysWOW64\Dedkogqm.exeC:\Windows\system32\Dedkogqm.exe40⤵PID:788
-
C:\Windows\SysWOW64\Dlncla32.exeC:\Windows\system32\Dlncla32.exe41⤵PID:4804
-
C:\Windows\SysWOW64\Defheg32.exeC:\Windows\system32\Defheg32.exe42⤵PID:4612
-
C:\Windows\SysWOW64\Dmnpfd32.exeC:\Windows\system32\Dmnpfd32.exe43⤵PID:2996
-
C:\Windows\SysWOW64\Didqkeeq.exeC:\Windows\system32\Didqkeeq.exe44⤵PID:5132
-
C:\Windows\SysWOW64\Epeohn32.exeC:\Windows\system32\Epeohn32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5172 -
C:\Windows\SysWOW64\Egpgehnb.exeC:\Windows\system32\Egpgehnb.exe46⤵PID:5216
-
C:\Windows\SysWOW64\Eincadmf.exeC:\Windows\system32\Eincadmf.exe47⤵PID:5264
-
C:\Windows\SysWOW64\Ellpmolj.exeC:\Windows\system32\Ellpmolj.exe48⤵
- Drops file in System32 directory
PID:5324 -
C:\Windows\SysWOW64\Egbdjhlp.exeC:\Windows\system32\Egbdjhlp.exe49⤵PID:5364
-
C:\Windows\SysWOW64\Elolco32.exeC:\Windows\system32\Elolco32.exe50⤵PID:5404
-
C:\Windows\SysWOW64\Flaiho32.exeC:\Windows\system32\Flaiho32.exe51⤵
- Drops file in System32 directory
- Modifies registry class
PID:5460 -
C:\Windows\SysWOW64\Fjeibc32.exeC:\Windows\system32\Fjeibc32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5500 -
C:\Windows\SysWOW64\Fcmnkh32.exeC:\Windows\system32\Fcmnkh32.exe53⤵
- Modifies registry class
PID:5568 -
C:\Windows\SysWOW64\Fpandm32.exeC:\Windows\system32\Fpandm32.exe54⤵
- Modifies registry class
PID:5636 -
C:\Windows\SysWOW64\Fneoma32.exeC:\Windows\system32\Fneoma32.exe55⤵PID:5680
-
C:\Windows\SysWOW64\Fgncff32.exeC:\Windows\system32\Fgncff32.exe56⤵PID:5720
-
C:\Windows\SysWOW64\Fnglcqio.exeC:\Windows\system32\Fnglcqio.exe57⤵PID:5756
-
C:\Windows\SysWOW64\Fdadpk32.exeC:\Windows\system32\Fdadpk32.exe58⤵
- Drops file in System32 directory
PID:5804 -
C:\Windows\SysWOW64\Glmhdm32.exeC:\Windows\system32\Glmhdm32.exe59⤵PID:5876
-
C:\Windows\SysWOW64\Gfemmb32.exeC:\Windows\system32\Gfemmb32.exe60⤵PID:5916
-
C:\Windows\SysWOW64\Gcngafol.exeC:\Windows\system32\Gcngafol.exe61⤵PID:5976
-
C:\Windows\SysWOW64\Gmfkjl32.exeC:\Windows\system32\Gmfkjl32.exe62⤵
- Modifies registry class
PID:6020 -
C:\Windows\SysWOW64\Hfnpca32.exeC:\Windows\system32\Hfnpca32.exe63⤵
- Modifies registry class
PID:6060 -
C:\Windows\SysWOW64\Hnehdo32.exeC:\Windows\system32\Hnehdo32.exe64⤵
- Modifies registry class
PID:6104 -
C:\Windows\SysWOW64\Hdppaidl.exeC:\Windows\system32\Hdppaidl.exe65⤵PID:1348
-
C:\Windows\SysWOW64\Hjlhipbc.exeC:\Windows\system32\Hjlhipbc.exe66⤵PID:5180
-
C:\Windows\SysWOW64\Hcembe32.exeC:\Windows\system32\Hcembe32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5232 -
C:\Windows\SysWOW64\Hgbfhc32.exeC:\Windows\system32\Hgbfhc32.exe68⤵PID:5292
-
C:\Windows\SysWOW64\Hdffah32.exeC:\Windows\system32\Hdffah32.exe69⤵PID:5352
-
C:\Windows\SysWOW64\Hfhbipdb.exeC:\Windows\system32\Hfhbipdb.exe70⤵PID:5452
-
C:\Windows\SysWOW64\Hqmggi32.exeC:\Windows\system32\Hqmggi32.exe71⤵PID:5556
-
C:\Windows\SysWOW64\Ifjoop32.exeC:\Windows\system32\Ifjoop32.exe72⤵PID:5668
-
C:\Windows\SysWOW64\Imdgljil.exeC:\Windows\system32\Imdgljil.exe73⤵PID:5736
-
C:\Windows\SysWOW64\Ifmldo32.exeC:\Windows\system32\Ifmldo32.exe74⤵
- Modifies registry class
PID:5816 -
C:\Windows\SysWOW64\Iglhob32.exeC:\Windows\system32\Iglhob32.exe75⤵PID:4784
-
C:\Windows\SysWOW64\Ijjekn32.exeC:\Windows\system32\Ijjekn32.exe76⤵PID:6008
-
C:\Windows\SysWOW64\Icciccmd.exeC:\Windows\system32\Icciccmd.exe77⤵
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\Iqgjmg32.exeC:\Windows\system32\Iqgjmg32.exe78⤵PID:6112
-
C:\Windows\SysWOW64\Igqbiacj.exeC:\Windows\system32\Igqbiacj.exe79⤵PID:5164
-
C:\Windows\SysWOW64\Inkjfk32.exeC:\Windows\system32\Inkjfk32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5284 -
C:\Windows\SysWOW64\Jgcooaah.exeC:\Windows\system32\Jgcooaah.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5396 -
C:\Windows\SysWOW64\Jnmglk32.exeC:\Windows\system32\Jnmglk32.exe82⤵PID:5552
-
C:\Windows\SysWOW64\Jakchf32.exeC:\Windows\system32\Jakchf32.exe83⤵
- Drops file in System32 directory
PID:5688 -
C:\Windows\SysWOW64\Jfhlpnfp.exeC:\Windows\system32\Jfhlpnfp.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5836 -
C:\Windows\SysWOW64\Jeilne32.exeC:\Windows\system32\Jeilne32.exe85⤵PID:6016
-
C:\Windows\SysWOW64\Jjfdfl32.exeC:\Windows\system32\Jjfdfl32.exe86⤵
- Drops file in System32 directory
PID:4280 -
C:\Windows\SysWOW64\Oalpigkb.exeC:\Windows\system32\Oalpigkb.exe87⤵
- Modifies registry class
PID:5960 -
C:\Windows\SysWOW64\Qdfefkll.exeC:\Windows\system32\Qdfefkll.exe88⤵PID:632
-
C:\Windows\SysWOW64\Emikpeig.exeC:\Windows\system32\Emikpeig.exe89⤵PID:5512
-
C:\Windows\SysWOW64\Ildpbfmf.exeC:\Windows\system32\Ildpbfmf.exe90⤵
- Drops file in System32 directory
PID:1632 -
C:\Windows\SysWOW64\Omkmhlpf.exeC:\Windows\system32\Omkmhlpf.exe91⤵
- Modifies registry class
PID:5448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Pidjcm32.exeC:\Windows\system32\Pidjcm32.exe1⤵
- Modifies registry class
PID:116 -
C:\Windows\SysWOW64\Pblolb32.exeC:\Windows\system32\Pblolb32.exe2⤵PID:4864
-
C:\Windows\SysWOW64\Pekkhn32.exeC:\Windows\system32\Pekkhn32.exe3⤵
- Drops file in System32 directory
PID:3780 -
C:\Windows\SysWOW64\Pmbcik32.exeC:\Windows\system32\Pmbcik32.exe4⤵PID:3344
-
C:\Windows\SysWOW64\Pldcdhpi.exeC:\Windows\system32\Pldcdhpi.exe5⤵
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\Pocpqcpm.exeC:\Windows\system32\Pocpqcpm.exe6⤵PID:3876
-
C:\Windows\SysWOW64\Pbokab32.exeC:\Windows\system32\Pbokab32.exe7⤵
- Drops file in System32 directory
PID:768 -
C:\Windows\SysWOW64\Pemhmn32.exeC:\Windows\system32\Pemhmn32.exe8⤵
- Drops file in System32 directory
PID:4820 -
C:\Windows\SysWOW64\Qlpcpffl.exeC:\Windows\system32\Qlpcpffl.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4608 -
C:\Windows\SysWOW64\Aeigilml.exeC:\Windows\system32\Aeigilml.exe10⤵PID:3296
-
C:\Windows\SysWOW64\Gpjfng32.exeC:\Windows\system32\Gpjfng32.exe11⤵PID:5912
-
C:\Windows\SysWOW64\Gfcnka32.exeC:\Windows\system32\Gfcnka32.exe12⤵PID:5368
-
C:\Windows\SysWOW64\Gmnfglcd.exeC:\Windows\system32\Gmnfglcd.exe13⤵PID:3240
-
C:\Windows\SysWOW64\Gplbcgbg.exeC:\Windows\system32\Gplbcgbg.exe14⤵PID:2876
-
C:\Windows\SysWOW64\Gcgndf32.exeC:\Windows\system32\Gcgndf32.exe15⤵PID:4984
-
C:\Windows\SysWOW64\Gffkpa32.exeC:\Windows\system32\Gffkpa32.exe16⤵PID:2508
-
C:\Windows\SysWOW64\Gnmbao32.exeC:\Windows\system32\Gnmbao32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5180 -
C:\Windows\SysWOW64\Gpnoigpe.exeC:\Windows\system32\Gpnoigpe.exe18⤵PID:5500
-
C:\Windows\SysWOW64\Hjdcfp32.exeC:\Windows\system32\Hjdcfp32.exe19⤵PID:3732
-
C:\Windows\SysWOW64\Hmbpbk32.exeC:\Windows\system32\Hmbpbk32.exe20⤵
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Hpqlof32.exeC:\Windows\system32\Hpqlof32.exe21⤵PID:4352
-
C:\Windows\SysWOW64\Hhjqec32.exeC:\Windows\system32\Hhjqec32.exe22⤵
- Drops file in System32 directory
PID:4016 -
C:\Windows\SysWOW64\Hjimaole.exeC:\Windows\system32\Hjimaole.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4368 -
C:\Windows\SysWOW64\Hmginjki.exeC:\Windows\system32\Hmginjki.exe24⤵
- Drops file in System32 directory
PID:5992 -
C:\Windows\SysWOW64\Hdaajd32.exeC:\Windows\system32\Hdaajd32.exe25⤵PID:5668
-
C:\Windows\SysWOW64\Neebkkgi.exeC:\Windows\system32\Neebkkgi.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5336 -
C:\Windows\SysWOW64\Nojfic32.exeC:\Windows\system32\Nojfic32.exe27⤵
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\Negoaj32.exeC:\Windows\system32\Negoaj32.exe28⤵PID:2144
-
C:\Windows\SysWOW64\Nkagndmc.exeC:\Windows\system32\Nkagndmc.exe29⤵PID:1540
-
C:\Windows\SysWOW64\Nejkfj32.exeC:\Windows\system32\Nejkfj32.exe30⤵
- Drops file in System32 directory
- Modifies registry class
PID:5456 -
C:\Windows\SysWOW64\Okcccdkp.exeC:\Windows\system32\Okcccdkp.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:112 -
C:\Windows\SysWOW64\Ondleo32.exeC:\Windows\system32\Ondleo32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2864 -
C:\Windows\SysWOW64\Oaeegjeb.exeC:\Windows\system32\Oaeegjeb.exe33⤵PID:952
-
C:\Windows\SysWOW64\Okkidceh.exeC:\Windows\system32\Okkidceh.exe34⤵
- Drops file in System32 directory
PID:2208 -
C:\Windows\SysWOW64\Oagbljcp.exeC:\Windows\system32\Oagbljcp.exe35⤵
- Drops file in System32 directory
PID:6076 -
C:\Windows\SysWOW64\Pgdgodhj.exeC:\Windows\system32\Pgdgodhj.exe36⤵PID:6140
-
C:\Windows\SysWOW64\Efnennjc.exeC:\Windows\system32\Efnennjc.exe37⤵PID:5316
-
C:\Windows\SysWOW64\Ipldpo32.exeC:\Windows\system32\Ipldpo32.exe38⤵
- Modifies registry class
PID:1404 -
C:\Windows\SysWOW64\Kgkooeen.exeC:\Windows\system32\Kgkooeen.exe39⤵PID:2464
-
C:\Windows\SysWOW64\Ojmcej32.exeC:\Windows\system32\Ojmcej32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4244 -
C:\Windows\SysWOW64\Aeemop32.exeC:\Windows\system32\Aeemop32.exe41⤵PID:3556
-
C:\Windows\SysWOW64\Bjnece32.exeC:\Windows\system32\Bjnece32.exe42⤵PID:3696
-
C:\Windows\SysWOW64\Blmamh32.exeC:\Windows\system32\Blmamh32.exe43⤵PID:4924
-
C:\Windows\SysWOW64\Caapfnkd.exeC:\Windows\system32\Caapfnkd.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5048 -
C:\Windows\SysWOW64\Chmehhpn.exeC:\Windows\system32\Chmehhpn.exe45⤵PID:4072
-
C:\Windows\SysWOW64\Cefolk32.exeC:\Windows\system32\Cefolk32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2056 -
C:\Windows\SysWOW64\Dlbcoe32.exeC:\Windows\system32\Dlbcoe32.exe47⤵PID:5124
-
C:\Windows\SysWOW64\Dboiaoff.exeC:\Windows\system32\Dboiaoff.exe48⤵PID:5760
-
C:\Windows\SysWOW64\Dccbln32.exeC:\Windows\system32\Dccbln32.exe49⤵
- Drops file in System32 directory
PID:4184 -
C:\Windows\SysWOW64\Eceoanpo.exeC:\Windows\system32\Eceoanpo.exe50⤵PID:3460
-
C:\Windows\SysWOW64\Edihof32.exeC:\Windows\system32\Edihof32.exe51⤵PID:4136
-
C:\Windows\SysWOW64\Ekemap32.exeC:\Windows\system32\Ekemap32.exe52⤵PID:5756
-
C:\Windows\SysWOW64\Flgfqb32.exeC:\Windows\system32\Flgfqb32.exe53⤵PID:3916
-
C:\Windows\SysWOW64\Fhngfcdi.exeC:\Windows\system32\Fhngfcdi.exe54⤵
- Modifies registry class
PID:3680 -
C:\Windows\SysWOW64\Fhpckb32.exeC:\Windows\system32\Fhpckb32.exe55⤵PID:3860
-
C:\Windows\SysWOW64\Fcfhhk32.exeC:\Windows\system32\Fcfhhk32.exe56⤵PID:2536
-
C:\Windows\SysWOW64\Flnlaahl.exeC:\Windows\system32\Flnlaahl.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4492 -
C:\Windows\SysWOW64\Ghgjlaln.exeC:\Windows\system32\Ghgjlaln.exe58⤵
- Drops file in System32 directory
PID:3636 -
C:\Windows\SysWOW64\Gcagdj32.exeC:\Windows\system32\Gcagdj32.exe59⤵
- Modifies registry class
PID:4976 -
C:\Windows\SysWOW64\Gohhik32.exeC:\Windows\system32\Gohhik32.exe60⤵PID:5608
-
C:\Windows\SysWOW64\Giqlbqcc.exeC:\Windows\system32\Giqlbqcc.exe61⤵PID:4944
-
C:\Windows\SysWOW64\Hdgmga32.exeC:\Windows\system32\Hdgmga32.exe62⤵
- Modifies registry class
PID:1572 -
C:\Windows\SysWOW64\Hiefmp32.exeC:\Windows\system32\Hiefmp32.exe63⤵PID:5376
-
C:\Windows\SysWOW64\Hfiffd32.exeC:\Windows\system32\Hfiffd32.exe64⤵PID:3944
-
C:\Windows\SysWOW64\Hmfkin32.exeC:\Windows\system32\Hmfkin32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2780 -
C:\Windows\SysWOW64\Iempingp.exeC:\Windows\system32\Iempingp.exe66⤵PID:6028
-
C:\Windows\SysWOW64\Megdmhbp.exeC:\Windows\system32\Megdmhbp.exe67⤵
- Modifies registry class
PID:4280 -
C:\Windows\SysWOW64\Qgllpf32.exeC:\Windows\system32\Qgllpf32.exe68⤵PID:5672
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Qmhdhm32.exeC:\Windows\system32\Qmhdhm32.exe1⤵PID:5524
-
C:\Windows\SysWOW64\Qnhabp32.exeC:\Windows\system32\Qnhabp32.exe2⤵PID:6116
-
C:\Windows\SysWOW64\Aceijg32.exeC:\Windows\system32\Aceijg32.exe3⤵PID:5764
-
C:\Windows\SysWOW64\Afcffb32.exeC:\Windows\system32\Afcffb32.exe4⤵PID:4992
-
C:\Windows\SysWOW64\Aqijdk32.exeC:\Windows\system32\Aqijdk32.exe5⤵
- Drops file in System32 directory
PID:6040 -
C:\Windows\SysWOW64\Aqkgikip.exeC:\Windows\system32\Aqkgikip.exe6⤵PID:5224
-
C:\Windows\SysWOW64\Afhoaahg.exeC:\Windows\system32\Afhoaahg.exe7⤵PID:5732
-
C:\Windows\SysWOW64\Anogbohj.exeC:\Windows\system32\Anogbohj.exe8⤵PID:5720
-
C:\Windows\SysWOW64\Aancojgn.exeC:\Windows\system32\Aancojgn.exe9⤵PID:4592
-
C:\Windows\SysWOW64\Aclpkffa.exeC:\Windows\system32\Aclpkffa.exe10⤵PID:5880
-
C:\Windows\SysWOW64\Bccfleqi.exeC:\Windows\system32\Bccfleqi.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1416 -
C:\Windows\SysWOW64\Bjmnho32.exeC:\Windows\system32\Bjmnho32.exe12⤵PID:1096
-
C:\Windows\SysWOW64\Bcebadof.exeC:\Windows\system32\Bcebadof.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5040 -
C:\Windows\SysWOW64\Ibicgmhe.exeC:\Windows\system32\Ibicgmhe.exe14⤵PID:736
-
C:\Windows\SysWOW64\Ccpkblqn.exeC:\Windows\system32\Ccpkblqn.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5380 -
C:\Windows\SysWOW64\Hgghdp32.exeC:\Windows\system32\Hgghdp32.exe16⤵PID:5440
-
C:\Windows\SysWOW64\Hjedpkne.exeC:\Windows\system32\Hjedpkne.exe17⤵PID:1144
-
C:\Windows\SysWOW64\Lhhchi32.exeC:\Windows\system32\Lhhchi32.exe18⤵
- Drops file in System32 directory
PID:4784 -
C:\Windows\SysWOW64\Pefhfgoc.exeC:\Windows\system32\Pefhfgoc.exe19⤵PID:4820
-
C:\Windows\SysWOW64\Dfjpppbh.exeC:\Windows\system32\Dfjpppbh.exe20⤵PID:5884
-
C:\Windows\SysWOW64\Idoknmfj.exeC:\Windows\system32\Idoknmfj.exe21⤵PID:5432
-
C:\Windows\SysWOW64\Knfeoobh.exeC:\Windows\system32\Knfeoobh.exe22⤵PID:2868
-
C:\Windows\SysWOW64\Bhnidi32.exeC:\Windows\system32\Bhnidi32.exe23⤵PID:3996
-
C:\Windows\SysWOW64\Clplff32.exeC:\Windows\system32\Clplff32.exe24⤵PID:6120
-
C:\Windows\SysWOW64\Cfmijkhj.exeC:\Windows\system32\Cfmijkhj.exe25⤵
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Dbdjol32.exeC:\Windows\system32\Dbdjol32.exe26⤵PID:4188
-
C:\Windows\SysWOW64\Dohkhq32.exeC:\Windows\system32\Dohkhq32.exe27⤵PID:2632
-
C:\Windows\SysWOW64\Dkokma32.exeC:\Windows\system32\Dkokma32.exe28⤵
- Drops file in System32 directory
PID:4392 -
C:\Windows\SysWOW64\Diclff32.exeC:\Windows\system32\Diclff32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5988 -
C:\Windows\SysWOW64\Dieilepc.exeC:\Windows\system32\Dieilepc.exe30⤵PID:5092
-
C:\Windows\SysWOW64\Dmcabd32.exeC:\Windows\system32\Dmcabd32.exe31⤵
- Modifies registry class
PID:3620 -
C:\Windows\SysWOW64\Eijbge32.exeC:\Windows\system32\Eijbge32.exe32⤵PID:1420
-
C:\Windows\SysWOW64\Emhkmcbd.exeC:\Windows\system32\Emhkmcbd.exe33⤵
- Drops file in System32 directory
PID:4792 -
C:\Windows\SysWOW64\Emjgcc32.exeC:\Windows\system32\Emjgcc32.exe34⤵
- Drops file in System32 directory
PID:952 -
C:\Windows\SysWOW64\Efbllhfb.exeC:\Windows\system32\Efbllhfb.exe35⤵PID:5512
-
C:\Windows\SysWOW64\Epkpdn32.exeC:\Windows\system32\Epkpdn32.exe36⤵
- Modifies registry class
PID:3568 -
C:\Windows\SysWOW64\Ekaaio32.exeC:\Windows\system32\Ekaaio32.exe37⤵
- Drops file in System32 directory
PID:4020 -
C:\Windows\SysWOW64\Fmancbji.exeC:\Windows\system32\Fmancbji.exe38⤵PID:3340
-
C:\Windows\SysWOW64\Fihnhc32.exeC:\Windows\system32\Fihnhc32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6076 -
C:\Windows\SysWOW64\Fnegqjne.exeC:\Windows\system32\Fnegqjne.exe40⤵PID:184
-
C:\Windows\SysWOW64\Fngcfikb.exeC:\Windows\system32\Fngcfikb.exe41⤵PID:4864
-
C:\Windows\SysWOW64\Fpfppl32.exeC:\Windows\system32\Fpfppl32.exe42⤵PID:5312
-
C:\Windows\SysWOW64\Gpimflqb.exeC:\Windows\system32\Gpimflqb.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2912 -
C:\Windows\SysWOW64\Gefencoj.exeC:\Windows\system32\Gefencoj.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4144 -
C:\Windows\SysWOW64\Gbjegg32.exeC:\Windows\system32\Gbjegg32.exe45⤵PID:5892
-
C:\Windows\SysWOW64\Gblbmg32.exeC:\Windows\system32\Gblbmg32.exe46⤵PID:1320
-
C:\Windows\SysWOW64\Gmafjp32.exeC:\Windows\system32\Gmafjp32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6128 -
C:\Windows\SysWOW64\Hiajeoip.exeC:\Windows\system32\Hiajeoip.exe48⤵PID:4768
-
C:\Windows\SysWOW64\Hpnohinj.exeC:\Windows\system32\Hpnohinj.exe49⤵
- Modifies registry class
PID:388 -
C:\Windows\SysWOW64\Iimjan32.exeC:\Windows\system32\Iimjan32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5836 -
C:\Windows\SysWOW64\Jplkig32.exeC:\Windows\system32\Jplkig32.exe51⤵PID:2524
-
C:\Windows\SysWOW64\Jpnhof32.exeC:\Windows\system32\Jpnhof32.exe52⤵PID:1240
-
C:\Windows\SysWOW64\Jekqgnno.exeC:\Windows\system32\Jekqgnno.exe53⤵PID:768
-
C:\Windows\SysWOW64\Kphkee32.exeC:\Windows\system32\Kphkee32.exe54⤵
- Drops file in System32 directory
PID:4220 -
C:\Windows\SysWOW64\Komhfa32.exeC:\Windows\system32\Komhfa32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5564 -
C:\Windows\SysWOW64\Koodka32.exeC:\Windows\system32\Koodka32.exe56⤵PID:5920
-
C:\Windows\SysWOW64\Klceeejl.exeC:\Windows\system32\Klceeejl.exe57⤵PID:5124
-
C:\Windows\SysWOW64\Lqjqab32.exeC:\Windows\system32\Lqjqab32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5516 -
C:\Windows\SysWOW64\Lckicnei.exeC:\Windows\system32\Lckicnei.exe59⤵PID:5436
-
C:\Windows\SysWOW64\Modgnn32.exeC:\Windows\system32\Modgnn32.exe60⤵PID:904
-
C:\Windows\SysWOW64\Mnhdae32.exeC:\Windows\system32\Mnhdae32.exe61⤵PID:5640
-
C:\Windows\SysWOW64\Mmmqbb32.exeC:\Windows\system32\Mmmqbb32.exe62⤵
- Modifies registry class
PID:4436 -
C:\Windows\SysWOW64\Nfeekgjo.exeC:\Windows\system32\Nfeekgjo.exe63⤵
- Modifies registry class
PID:2440 -
C:\Windows\SysWOW64\Nclbjk32.exeC:\Windows\system32\Nclbjk32.exe64⤵PID:5404
-
C:\Windows\SysWOW64\Ngikpjml.exeC:\Windows\system32\Ngikpjml.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2648 -
C:\Windows\SysWOW64\Nabpiocm.exeC:\Windows\system32\Nabpiocm.exe66⤵PID:5664
-
C:\Windows\SysWOW64\Njjdae32.exeC:\Windows\system32\Njjdae32.exe67⤵PID:3060
-
C:\Windows\SysWOW64\Ocbhjjqn.exeC:\Windows\system32\Ocbhjjqn.exe68⤵PID:224
-
C:\Windows\SysWOW64\Onhmhc32.exeC:\Windows\system32\Onhmhc32.exe69⤵PID:1492
-
C:\Windows\SysWOW64\Oceepj32.exeC:\Windows\system32\Oceepj32.exe70⤵
- Modifies registry class
PID:3944 -
C:\Windows\SysWOW64\Ojommdfh.exeC:\Windows\system32\Ojommdfh.exe71⤵
- Modifies registry class
PID:3744 -
C:\Windows\SysWOW64\Ojajbdde.exeC:\Windows\system32\Ojajbdde.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5068 -
C:\Windows\SysWOW64\Ompfnoci.exeC:\Windows\system32\Ompfnoci.exe73⤵PID:3316
-
C:\Windows\SysWOW64\Opnbjk32.exeC:\Windows\system32\Opnbjk32.exe74⤵PID:5632
-
C:\Windows\SysWOW64\Ombcdo32.exeC:\Windows\system32\Ombcdo32.exe75⤵PID:5784
-
C:\Windows\SysWOW64\Oclkqihc.exeC:\Windows\system32\Oclkqihc.exe76⤵PID:2620
-
C:\Windows\SysWOW64\Onapnbhi.exeC:\Windows\system32\Onapnbhi.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4684 -
C:\Windows\SysWOW64\Pabhpm32.exeC:\Windows\system32\Pabhpm32.exe78⤵PID:5944
-
C:\Windows\SysWOW64\Pjkmhblk.exeC:\Windows\system32\Pjkmhblk.exe79⤵
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Padeem32.exeC:\Windows\system32\Padeem32.exe80⤵
- Drops file in System32 directory
PID:5880 -
C:\Windows\SysWOW64\Pmkfjn32.exeC:\Windows\system32\Pmkfjn32.exe81⤵PID:3972
-
C:\Windows\SysWOW64\Phajgf32.exeC:\Windows\system32\Phajgf32.exe82⤵
- Modifies registry class
PID:5304 -
C:\Windows\SysWOW64\Phcgmffo.exeC:\Windows\system32\Phcgmffo.exe83⤵
- Modifies registry class
PID:5572 -
C:\Windows\SysWOW64\Qfhdnb32.exeC:\Windows\system32\Qfhdnb32.exe84⤵
- Drops file in System32 directory
PID:1292 -
C:\Windows\SysWOW64\Dnjdigpf.exeC:\Windows\system32\Dnjdigpf.exe85⤵
- Modifies registry class
PID:2144 -
C:\Windows\SysWOW64\Dqipeboj.exeC:\Windows\system32\Dqipeboj.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5996 -
C:\Windows\SysWOW64\Fnacqc32.exeC:\Windows\system32\Fnacqc32.exe87⤵PID:3880
-
C:\Windows\SysWOW64\Fqpomo32.exeC:\Windows\system32\Fqpomo32.exe88⤵PID:5176
-
C:\Windows\SysWOW64\Fenhcnaf.exeC:\Windows\system32\Fenhcnaf.exe89⤵PID:5484
-
C:\Windows\SysWOW64\Kplmenpl.exeC:\Windows\system32\Kplmenpl.exe90⤵PID:984
-
C:\Windows\SysWOW64\Klbnjo32.exeC:\Windows\system32\Klbnjo32.exe91⤵PID:5316
-
C:\Windows\SysWOW64\Kcmfgimm.exeC:\Windows\system32\Kcmfgimm.exe92⤵PID:5032
-
C:\Windows\SysWOW64\Lpccfm32.exeC:\Windows\system32\Lpccfm32.exe93⤵PID:4400
-
C:\Windows\SysWOW64\Ladpnepb.exeC:\Windows\system32\Ladpnepb.exe94⤵PID:5396
-
C:\Windows\SysWOW64\Lohqgj32.exeC:\Windows\system32\Lohqgj32.exe95⤵PID:5148
-
C:\Windows\SysWOW64\Ljnddb32.exeC:\Windows\system32\Ljnddb32.exe96⤵PID:4244
-
C:\Windows\SysWOW64\Ljpajbmo.exeC:\Windows\system32\Ljpajbmo.exe97⤵
- Drops file in System32 directory
PID:3904 -
C:\Windows\SysWOW64\Mcmongoj.exeC:\Windows\system32\Mcmongoj.exe98⤵
- Modifies registry class
PID:5816 -
C:\Windows\SysWOW64\Mledgm32.exeC:\Windows\system32\Mledgm32.exe99⤵PID:4072
-
C:\Windows\SysWOW64\Mfnhpblk.exeC:\Windows\system32\Mfnhpblk.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5548 -
C:\Windows\SysWOW64\Mfpeeb32.exeC:\Windows\system32\Mfpeeb32.exe101⤵
- Drops file in System32 directory
PID:4656 -
C:\Windows\SysWOW64\Dacmjpgf.exeC:\Windows\system32\Dacmjpgf.exe102⤵PID:2004
-
C:\Windows\SysWOW64\Dcdiahme.exeC:\Windows\system32\Dcdiahme.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2252 -
C:\Windows\SysWOW64\Dkkabeng.exeC:\Windows\system32\Dkkabeng.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5932 -
C:\Windows\SysWOW64\Daeioo32.exeC:\Windows\system32\Daeioo32.exe105⤵
- Drops file in System32 directory
PID:5964 -
C:\Windows\SysWOW64\Ddcekk32.exeC:\Windows\system32\Ddcekk32.exe106⤵PID:4000
-
C:\Windows\SysWOW64\Dknnhekd.exeC:\Windows\system32\Dknnhekd.exe107⤵
- Drops file in System32 directory
PID:5364 -
C:\Windows\SysWOW64\Dnqcop32.exeC:\Windows\system32\Dnqcop32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4168 -
C:\Windows\SysWOW64\Edklljnp.exeC:\Windows\system32\Edklljnp.exe109⤵PID:5216
-
C:\Windows\SysWOW64\Egihhe32.exeC:\Windows\system32\Egihhe32.exe110⤵PID:4104
-
C:\Windows\SysWOW64\Encpeodp.exeC:\Windows\system32\Encpeodp.exe111⤵PID:3716
-
C:\Windows\SysWOW64\Edmhai32.exeC:\Windows\system32\Edmhai32.exe112⤵
- Modifies registry class
PID:5568 -
C:\Windows\SysWOW64\Egkdne32.exeC:\Windows\system32\Egkdne32.exe113⤵PID:220
-
C:\Windows\SysWOW64\Faholm32.exeC:\Windows\system32\Faholm32.exe114⤵PID:772
-
C:\Windows\SysWOW64\Fcikcekm.exeC:\Windows\system32\Fcikcekm.exe115⤵PID:1620
-
C:\Windows\SysWOW64\Fkpcdbko.exeC:\Windows\system32\Fkpcdbko.exe116⤵PID:6048
-
C:\Windows\SysWOW64\Fdihmh32.exeC:\Windows\system32\Fdihmh32.exe117⤵
- Drops file in System32 directory
PID:3344 -
C:\Windows\SysWOW64\Fggdic32.exeC:\Windows\system32\Fggdic32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1264 -
C:\Windows\SysWOW64\Fjepfo32.exeC:\Windows\system32\Fjepfo32.exe119⤵PID:1916
-
C:\Windows\SysWOW64\Fqphbi32.exeC:\Windows\system32\Fqphbi32.exe120⤵
- Modifies registry class
PID:228 -
C:\Windows\SysWOW64\Fdkdcgpm.exeC:\Windows\system32\Fdkdcgpm.exe121⤵PID:2844
-
C:\Windows\SysWOW64\Fjhmknnd.exeC:\Windows\system32\Fjhmknnd.exe122⤵PID:1888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-