Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.c08eaa4e142c624d76a5f10f28849560.exe
Resource
win7-20230831-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.c08eaa4e142c624d76a5f10f28849560.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
NEAS.c08eaa4e142c624d76a5f10f28849560.exe
-
Size
459KB
-
MD5
c08eaa4e142c624d76a5f10f28849560
-
SHA1
5c5d1919910aaabc51e73e07c4cf6406b4ecde47
-
SHA256
d6e2c09c8162c270aae18ebf4e7dcf44e5a3b64f5aa47a77159f282b0183b82f
-
SHA512
2aeb43ac797f1097f6b1a3b457f7e25164098977424c3a60a1a2fa7c88494d02737e8eab0c9f77ce55c52a38f455783dbdf2ab3254e9e5b8808f9d508017440b
-
SSDEEP
12288:Oe6MuUo8MmmpNs/VXMmmg8MmmpNs/VXMmm:nuUqEdAgxEdA
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Miaica32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jklpakam.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnpmej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnjqhcno.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oidopn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oaajoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qdphgmlj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Galfhpmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqdeefpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Heapmp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdijkmbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kibmqond.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plndma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efpofi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bajqpe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpojml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qqamieno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amaqde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmmifaci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peaokh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gemkobia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpbojlfd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkmmkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpggkbfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffaogm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffiblg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abcgdm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aahblp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anobaa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfffcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gadqepkn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajqgbjoh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkomgkoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnpopcni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oanfodmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chepehne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnipliip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahpdnaci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Moajmk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lggeej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhgkfkhl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nildajdg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qiocde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpkiim32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnblmnfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdiohhbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcaefo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dildibfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cimckcoe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pedlpgqe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omgjhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djoohk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edmjpoli.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaadpqmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ioopfa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfjnch32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abhqolee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdmahgnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhalcm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlpcpffl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Alaaajmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fchdnkpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cifmjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gjjjfkdj.exe -
Executes dropped EXE 64 IoCs
pid Process 4924 Ejkenpnp.exe 2104 Golcak32.exe 3080 Glpdjpbj.exe 4080 Hikkdc32.exe 4388 Iheaqolo.exe 4964 Komoed32.exe 3656 Lpdefc32.exe 316 Mcicma32.exe 1672 Njokei32.exe 4644 Omgjhc32.exe 2508 Pmpmnb32.exe 2396 Qmlmjq32.exe 3404 Ccigpbga.exe 1732 Djoohk32.exe 4976 Ekahhn32.exe 3124 Fhalcm32.exe 3192 Gdfhil32.exe 2824 Galfhpmf.exe 4412 Ihfglhfp.exe 556 Jhpjbgne.exe 3320 Moajmk32.exe 3596 Oefamoma.exe 4864 Pikqcl32.exe 3896 Qlpcpffl.exe 3276 Acaanp32.exe 852 Blqlgdhi.exe 3936 Emhdeoel.exe 2172 Fnofpqff.exe 2636 Gcceifof.exe 3916 Gmkibl32.exe 2612 Hnblmnfa.exe 936 Ikdlmmbh.exe 2836 Jddggb32.exe 3528 Joikdk32.exe 2656 Knenffqf.exe 100 Knldfe32.exe 4980 Kgeiokao.exe 3968 Lggeej32.exe 2120 Lqfpoope.exe 2300 Mnjqhcno.exe 4212 Moofmeal.exe 4764 Mhgkfkhl.exe 456 Nildajdg.exe 892 Nnkioq32.exe 2712 Oendaipn.exe 1504 Qiocde32.exe 3996 Qajhigcj.exe 3684 Aaldngqg.exe 2004 Apbngn32.exe 1152 Bhblfpng.exe 4260 Bajqpe32.exe 1584 Cbofdg32.exe 1364 Ceppfbef.exe 1944 Cchikf32.exe 1852 Dlckik32.exe 3812 Dadlmanj.exe 3828 Djnaco32.exe 5036 Echbad32.exe 4408 Ebnocpfp.exe 4780 Eqalfgll.exe 3328 Ebbinp32.exe 320 Ffekom32.exe 3980 Fqjolfda.exe 4304 Gflapl32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Bikojc32.dll Ffekom32.exe File created C:\Windows\SysWOW64\Hjfehn32.dll Liekgo32.exe File created C:\Windows\SysWOW64\Clibgl32.dll Gnkajapa.exe File created C:\Windows\SysWOW64\Oikaeb32.dll Jfaenqjm.exe File created C:\Windows\SysWOW64\Qmlmjq32.exe Pmpmnb32.exe File created C:\Windows\SysWOW64\Gaadpqmp.exe Gkglcfec.exe File created C:\Windows\SysWOW64\Ajhboj32.exe Acnjbpdb.exe File opened for modification C:\Windows\SysWOW64\Oendaipn.exe Nnkioq32.exe File created C:\Windows\SysWOW64\Dcnqid32.exe Dblgja32.exe File created C:\Windows\SysWOW64\Abhqolee.exe Aadgadai.exe File created C:\Windows\SysWOW64\Omgjhc32.exe Njokei32.exe File created C:\Windows\SysWOW64\Mhncnodp.exe Mflgff32.exe File opened for modification C:\Windows\SysWOW64\Ahpdnaci.exe Ajkgmd32.exe File created C:\Windows\SysWOW64\Abhaaf32.dll Fchdnkpi.exe File created C:\Windows\SysWOW64\Gccbgclj.dll Pllggbje.exe File opened for modification C:\Windows\SysWOW64\Nqdeefpi.exe Mnapnl32.exe File created C:\Windows\SysWOW64\Fbgnbigb.dll Mnapnl32.exe File opened for modification C:\Windows\SysWOW64\Bcebadof.exe Bepeph32.exe File opened for modification C:\Windows\SysWOW64\Haebol32.exe Felkmnci.exe File opened for modification C:\Windows\SysWOW64\Lqfpoope.exe Lggeej32.exe File opened for modification C:\Windows\SysWOW64\Clmjcfdb.exe Cldgmgml.exe File created C:\Windows\SysWOW64\Ifqikhho.dll Pqhammje.exe File created C:\Windows\SysWOW64\Qoboofnb.exe Qdmkbmnl.exe File opened for modification C:\Windows\SysWOW64\Qmlmjq32.exe Pmpmnb32.exe File opened for modification C:\Windows\SysWOW64\Cooolhin.exe Cjbfdakf.exe File created C:\Windows\SysWOW64\Mpoepa32.exe Medggidb.exe File created C:\Windows\SysWOW64\Capkhnhb.dll Bgknlmgi.exe File opened for modification C:\Windows\SysWOW64\Fpggkbfq.exe Fdnipbbo.exe File opened for modification C:\Windows\SysWOW64\Dadlmanj.exe Dlckik32.exe File opened for modification C:\Windows\SysWOW64\Emkeho32.exe Dpckclld.exe File created C:\Windows\SysWOW64\Ikdlmmbh.exe Hnblmnfa.exe File created C:\Windows\SysWOW64\Lndlhhep.dll Hnblmnfa.exe File created C:\Windows\SysWOW64\Kaghho32.dll Oidopn32.exe File created C:\Windows\SysWOW64\Gbnhok32.dll Jejjlg32.exe File created C:\Windows\SysWOW64\Ekiplf32.dll Acaanp32.exe File opened for modification C:\Windows\SysWOW64\Aaldngqg.exe Qajhigcj.exe File created C:\Windows\SysWOW64\Bhgmobka.dll Ngombd32.exe File opened for modification C:\Windows\SysWOW64\Cfaddg32.exe Cimckcoe.exe File opened for modification C:\Windows\SysWOW64\Bkmmkj32.exe Bjgghc32.exe File created C:\Windows\SysWOW64\Galfhpmf.exe Gdfhil32.exe File created C:\Windows\SysWOW64\Bgknlmgi.exe Amaqde32.exe File created C:\Windows\SysWOW64\Gackgo32.dll Ajkgmd32.exe File created C:\Windows\SysWOW64\Hlalhlfd.dll Ebpjjk32.exe File created C:\Windows\SysWOW64\Bnbphh32.dll Dpjfqljl.exe File opened for modification C:\Windows\SysWOW64\Joikdk32.exe Jddggb32.exe File opened for modification C:\Windows\SysWOW64\Pcdjic32.exe Ohnelj32.exe File opened for modification C:\Windows\SysWOW64\Aoeleelp.exe Qdphgmlj.exe File created C:\Windows\SysWOW64\Dopkkhlp.dll Hojibgkm.exe File opened for modification C:\Windows\SysWOW64\Dnhgcgbi.exe Bgbpkoej.exe File created C:\Windows\SysWOW64\Nbpiochc.dll Bjgghc32.exe File created C:\Windows\SysWOW64\Nqkiog32.dll Gmkibl32.exe File created C:\Windows\SysWOW64\Qgakgc32.dll Bhblfpng.exe File created C:\Windows\SysWOW64\Dadlmanj.exe Dlckik32.exe File opened for modification C:\Windows\SysWOW64\Ddklnh32.exe Cdiohhbm.exe File created C:\Windows\SysWOW64\Bidfhgld.dll Dpnbhl32.exe File created C:\Windows\SysWOW64\Cqgojchn.dll Kkomgkoj.exe File created C:\Windows\SysWOW64\Piknfgmd.exe Oaajoj32.exe File opened for modification C:\Windows\SysWOW64\Iimjan32.exe Iiipfnch.exe File created C:\Windows\SysWOW64\Qgjdnffl.dll Epdaneff.exe File created C:\Windows\SysWOW64\Ekkkip32.exe Eodjdocj.exe File created C:\Windows\SysWOW64\Iiipfnch.exe Hojibgkm.exe File created C:\Windows\SysWOW64\Jejjlg32.exe Jlphnbfe.exe File created C:\Windows\SysWOW64\Hnblmnfa.exe Gmkibl32.exe File created C:\Windows\SysWOW64\Cfoece32.dll Echbad32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Emkeho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfmpbnhf.dll" Dblgja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hngaibfg.dll" Hcimei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qdmkbmnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjkmhblk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnkioq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jicckpjk.dll" Dcaefo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gdnjabab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkiqla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdmnge32.dll" Djfckenm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahpdnaci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pqmjhm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ohnelj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmpmnb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Amaqde32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acfhkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdahga32.dll" Cjbfdakf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qdphgmlj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jejjlg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncfdbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cooolhin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcqdhq32.dll" Mjneec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffnkggld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Giaaoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Doqpkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkfela32.dll" Ddklnh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hoadecal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gemkobia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgbpkoej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Admhlq32.dll" Moofmeal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Doqpkq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjokno32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkjhif32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mnjqhcno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mplfll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aogije32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfojmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Caqpdpii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gaadpqmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgpaqbcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpoepa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eemmae32.dll" Ccinggcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bakmbcka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkeehp32.dll" Dlckik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pemfefqc.dll" Oendaipn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gccbgclj.dll" Pllggbje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aimpafok.dll" Lggeej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mehjhbma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kaadhg32.dll" Pajekb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abhqolee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Egeabl32.dll" Mpoepa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbekjipe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpbojlfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dekioo32.dll" Bgbpkoej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Joikdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Liekgo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdckpqod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jklpakam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjjlij32.dll" Pklkmo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abcgdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fddnkoig.dll" Ebnocpfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bpniaool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfaddg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkmmkj32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1264 wrote to memory of 4924 1264 NEAS.c08eaa4e142c624d76a5f10f28849560.exe 90 PID 1264 wrote to memory of 4924 1264 NEAS.c08eaa4e142c624d76a5f10f28849560.exe 90 PID 1264 wrote to memory of 4924 1264 NEAS.c08eaa4e142c624d76a5f10f28849560.exe 90 PID 4924 wrote to memory of 2104 4924 Ejkenpnp.exe 91 PID 4924 wrote to memory of 2104 4924 Ejkenpnp.exe 91 PID 4924 wrote to memory of 2104 4924 Ejkenpnp.exe 91 PID 2104 wrote to memory of 3080 2104 Golcak32.exe 92 PID 2104 wrote to memory of 3080 2104 Golcak32.exe 92 PID 2104 wrote to memory of 3080 2104 Golcak32.exe 92 PID 3080 wrote to memory of 4080 3080 Glpdjpbj.exe 93 PID 3080 wrote to memory of 4080 3080 Glpdjpbj.exe 93 PID 3080 wrote to memory of 4080 3080 Glpdjpbj.exe 93 PID 4080 wrote to memory of 4388 4080 Hikkdc32.exe 94 PID 4080 wrote to memory of 4388 4080 Hikkdc32.exe 94 PID 4080 wrote to memory of 4388 4080 Hikkdc32.exe 94 PID 4388 wrote to memory of 4964 4388 Iheaqolo.exe 95 PID 4388 wrote to memory of 4964 4388 Iheaqolo.exe 95 PID 4388 wrote to memory of 4964 4388 Iheaqolo.exe 95 PID 4964 wrote to memory of 3656 4964 Komoed32.exe 96 PID 4964 wrote to memory of 3656 4964 Komoed32.exe 96 PID 4964 wrote to memory of 3656 4964 Komoed32.exe 96 PID 3656 wrote to memory of 316 3656 Lpdefc32.exe 97 PID 3656 wrote to memory of 316 3656 Lpdefc32.exe 97 PID 3656 wrote to memory of 316 3656 Lpdefc32.exe 97 PID 316 wrote to memory of 1672 316 Mcicma32.exe 98 PID 316 wrote to memory of 1672 316 Mcicma32.exe 98 PID 316 wrote to memory of 1672 316 Mcicma32.exe 98 PID 1672 wrote to memory of 4644 1672 Njokei32.exe 99 PID 1672 wrote to memory of 4644 1672 Njokei32.exe 99 PID 1672 wrote to memory of 4644 1672 Njokei32.exe 99 PID 4644 wrote to memory of 2508 4644 Omgjhc32.exe 100 PID 4644 wrote to memory of 2508 4644 Omgjhc32.exe 100 PID 4644 wrote to memory of 2508 4644 Omgjhc32.exe 100 PID 2508 wrote to memory of 2396 2508 Pmpmnb32.exe 101 PID 2508 wrote to memory of 2396 2508 Pmpmnb32.exe 101 PID 2508 wrote to memory of 2396 2508 Pmpmnb32.exe 101 PID 2396 wrote to memory of 3404 2396 Qmlmjq32.exe 102 PID 2396 wrote to memory of 3404 2396 Qmlmjq32.exe 102 PID 2396 wrote to memory of 3404 2396 Qmlmjq32.exe 102 PID 3404 wrote to memory of 1732 3404 Ccigpbga.exe 103 PID 3404 wrote to memory of 1732 3404 Ccigpbga.exe 103 PID 3404 wrote to memory of 1732 3404 Ccigpbga.exe 103 PID 1732 wrote to memory of 4976 1732 Djoohk32.exe 104 PID 1732 wrote to memory of 4976 1732 Djoohk32.exe 104 PID 1732 wrote to memory of 4976 1732 Djoohk32.exe 104 PID 4976 wrote to memory of 3124 4976 Ekahhn32.exe 105 PID 4976 wrote to memory of 3124 4976 Ekahhn32.exe 105 PID 4976 wrote to memory of 3124 4976 Ekahhn32.exe 105 PID 3124 wrote to memory of 3192 3124 Fhalcm32.exe 106 PID 3124 wrote to memory of 3192 3124 Fhalcm32.exe 106 PID 3124 wrote to memory of 3192 3124 Fhalcm32.exe 106 PID 3192 wrote to memory of 2824 3192 Gdfhil32.exe 107 PID 3192 wrote to memory of 2824 3192 Gdfhil32.exe 107 PID 3192 wrote to memory of 2824 3192 Gdfhil32.exe 107 PID 2824 wrote to memory of 4412 2824 Galfhpmf.exe 108 PID 2824 wrote to memory of 4412 2824 Galfhpmf.exe 108 PID 2824 wrote to memory of 4412 2824 Galfhpmf.exe 108 PID 4412 wrote to memory of 556 4412 Ihfglhfp.exe 109 PID 4412 wrote to memory of 556 4412 Ihfglhfp.exe 109 PID 4412 wrote to memory of 556 4412 Ihfglhfp.exe 109 PID 556 wrote to memory of 3320 556 Jhpjbgne.exe 110 PID 556 wrote to memory of 3320 556 Jhpjbgne.exe 110 PID 556 wrote to memory of 3320 556 Jhpjbgne.exe 110 PID 3320 wrote to memory of 3596 3320 Moajmk32.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c08eaa4e142c624d76a5f10f28849560.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c08eaa4e142c624d76a5f10f28849560.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\Ejkenpnp.exeC:\Windows\system32\Ejkenpnp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\Golcak32.exeC:\Windows\system32\Golcak32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\Glpdjpbj.exeC:\Windows\system32\Glpdjpbj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\Hikkdc32.exeC:\Windows\system32\Hikkdc32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\Iheaqolo.exeC:\Windows\system32\Iheaqolo.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\Komoed32.exeC:\Windows\system32\Komoed32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\Lpdefc32.exeC:\Windows\system32\Lpdefc32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\Mcicma32.exeC:\Windows\system32\Mcicma32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\Njokei32.exeC:\Windows\system32\Njokei32.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\Omgjhc32.exeC:\Windows\system32\Omgjhc32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\Pmpmnb32.exeC:\Windows\system32\Pmpmnb32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Qmlmjq32.exeC:\Windows\system32\Qmlmjq32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\Ccigpbga.exeC:\Windows\system32\Ccigpbga.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\Djoohk32.exeC:\Windows\system32\Djoohk32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\Ekahhn32.exeC:\Windows\system32\Ekahhn32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\Fhalcm32.exeC:\Windows\system32\Fhalcm32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\Gdfhil32.exeC:\Windows\system32\Gdfhil32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\Galfhpmf.exeC:\Windows\system32\Galfhpmf.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\Ihfglhfp.exeC:\Windows\system32\Ihfglhfp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\Jhpjbgne.exeC:\Windows\system32\Jhpjbgne.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\Moajmk32.exeC:\Windows\system32\Moajmk32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\Oefamoma.exeC:\Windows\system32\Oefamoma.exe23⤵
- Executes dropped EXE
PID:3596 -
C:\Windows\SysWOW64\Pikqcl32.exeC:\Windows\system32\Pikqcl32.exe24⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\Qlpcpffl.exeC:\Windows\system32\Qlpcpffl.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3896 -
C:\Windows\SysWOW64\Acaanp32.exeC:\Windows\system32\Acaanp32.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3276 -
C:\Windows\SysWOW64\Blqlgdhi.exeC:\Windows\system32\Blqlgdhi.exe27⤵
- Executes dropped EXE
PID:852 -
C:\Windows\SysWOW64\Emhdeoel.exeC:\Windows\system32\Emhdeoel.exe28⤵
- Executes dropped EXE
PID:3936 -
C:\Windows\SysWOW64\Fnofpqff.exeC:\Windows\system32\Fnofpqff.exe29⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\Gcceifof.exeC:\Windows\system32\Gcceifof.exe30⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\Gmkibl32.exeC:\Windows\system32\Gmkibl32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3916 -
C:\Windows\SysWOW64\Hnblmnfa.exeC:\Windows\system32\Hnblmnfa.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2612 -
C:\Windows\SysWOW64\Ikdlmmbh.exeC:\Windows\system32\Ikdlmmbh.exe33⤵
- Executes dropped EXE
PID:936 -
C:\Windows\SysWOW64\Jddggb32.exeC:\Windows\system32\Jddggb32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2836 -
C:\Windows\SysWOW64\Joikdk32.exeC:\Windows\system32\Joikdk32.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:3528 -
C:\Windows\SysWOW64\Knenffqf.exeC:\Windows\system32\Knenffqf.exe36⤵
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\Knldfe32.exeC:\Windows\system32\Knldfe32.exe37⤵
- Executes dropped EXE
PID:100 -
C:\Windows\SysWOW64\Kgeiokao.exeC:\Windows\system32\Kgeiokao.exe38⤵
- Executes dropped EXE
PID:4980 -
C:\Windows\SysWOW64\Lggeej32.exeC:\Windows\system32\Lggeej32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3968 -
C:\Windows\SysWOW64\Lqfpoope.exeC:\Windows\system32\Lqfpoope.exe40⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\Mnjqhcno.exeC:\Windows\system32\Mnjqhcno.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2300 -
C:\Windows\SysWOW64\Moofmeal.exeC:\Windows\system32\Moofmeal.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:4212 -
C:\Windows\SysWOW64\Mhgkfkhl.exeC:\Windows\system32\Mhgkfkhl.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4764 -
C:\Windows\SysWOW64\Nildajdg.exeC:\Windows\system32\Nildajdg.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:456 -
C:\Windows\SysWOW64\Nnkioq32.exeC:\Windows\system32\Nnkioq32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:892 -
C:\Windows\SysWOW64\Oendaipn.exeC:\Windows\system32\Oendaipn.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Qiocde32.exeC:\Windows\system32\Qiocde32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\Qajhigcj.exeC:\Windows\system32\Qajhigcj.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3996 -
C:\Windows\SysWOW64\Aaldngqg.exeC:\Windows\system32\Aaldngqg.exe49⤵
- Executes dropped EXE
PID:3684 -
C:\Windows\SysWOW64\Apbngn32.exeC:\Windows\system32\Apbngn32.exe50⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\Bhblfpng.exeC:\Windows\system32\Bhblfpng.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1152 -
C:\Windows\SysWOW64\Bajqpe32.exeC:\Windows\system32\Bajqpe32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4260 -
C:\Windows\SysWOW64\Cbofdg32.exeC:\Windows\system32\Cbofdg32.exe53⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\Ceppfbef.exeC:\Windows\system32\Ceppfbef.exe54⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\Cchikf32.exeC:\Windows\system32\Cchikf32.exe55⤵
- Executes dropped EXE
PID:1944 -
C:\Windows\SysWOW64\Dlckik32.exeC:\Windows\system32\Dlckik32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1852 -
C:\Windows\SysWOW64\Dadlmanj.exeC:\Windows\system32\Dadlmanj.exe57⤵
- Executes dropped EXE
PID:3812 -
C:\Windows\SysWOW64\Djnaco32.exeC:\Windows\system32\Djnaco32.exe58⤵
- Executes dropped EXE
PID:3828 -
C:\Windows\SysWOW64\Echbad32.exeC:\Windows\system32\Echbad32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5036 -
C:\Windows\SysWOW64\Ebnocpfp.exeC:\Windows\system32\Ebnocpfp.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:4408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Eqalfgll.exeC:\Windows\system32\Eqalfgll.exe1⤵
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\Ebbinp32.exeC:\Windows\system32\Ebbinp32.exe2⤵
- Executes dropped EXE
PID:3328 -
C:\Windows\SysWOW64\Ffekom32.exeC:\Windows\system32\Ffekom32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:320 -
C:\Windows\SysWOW64\Fqjolfda.exeC:\Windows\system32\Fqjolfda.exe4⤵
- Executes dropped EXE
PID:3980 -
C:\Windows\SysWOW64\Gflapl32.exeC:\Windows\system32\Gflapl32.exe5⤵
- Executes dropped EXE
PID:4304 -
C:\Windows\SysWOW64\Gjjjfkdj.exeC:\Windows\system32\Gjjjfkdj.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2632 -
C:\Windows\SysWOW64\Jpjqaldi.exeC:\Windows\system32\Jpjqaldi.exe7⤵PID:4992
-
C:\Windows\SysWOW64\Jfffcf32.exeC:\Windows\system32\Jfffcf32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2808 -
C:\Windows\SysWOW64\Jpojml32.exeC:\Windows\system32\Jpojml32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1712 -
C:\Windows\SysWOW64\Kfhbifgq.exeC:\Windows\system32\Kfhbifgq.exe10⤵PID:4164
-
C:\Windows\SysWOW64\Kbocng32.exeC:\Windows\system32\Kbocng32.exe11⤵PID:2316
-
C:\Windows\SysWOW64\Kapclned.exeC:\Windows\system32\Kapclned.exe12⤵PID:1792
-
C:\Windows\SysWOW64\Ldhbnhlm.exeC:\Windows\system32\Ldhbnhlm.exe13⤵PID:968
-
C:\Windows\SysWOW64\Liekgo32.exeC:\Windows\system32\Liekgo32.exe14⤵
- Drops file in System32 directory
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Lkiqla32.exeC:\Windows\system32\Lkiqla32.exe15⤵
- Modifies registry class
PID:2624 -
C:\Windows\SysWOW64\Mgpaqbcf.exeC:\Windows\system32\Mgpaqbcf.exe16⤵
- Modifies registry class
PID:4372 -
C:\Windows\SysWOW64\Mkpglqgj.exeC:\Windows\system32\Mkpglqgj.exe17⤵PID:2364
-
C:\Windows\SysWOW64\Mnapnl32.exeC:\Windows\system32\Mnapnl32.exe18⤵
- Drops file in System32 directory
PID:848 -
C:\Windows\SysWOW64\Nqdeefpi.exeC:\Windows\system32\Nqdeefpi.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4048 -
C:\Windows\SysWOW64\Ankdbf32.exeC:\Windows\system32\Ankdbf32.exe20⤵PID:3420
-
C:\Windows\SysWOW64\Alaaajmb.exeC:\Windows\system32\Alaaajmb.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4728 -
C:\Windows\SysWOW64\Aaccdp32.exeC:\Windows\system32\Aaccdp32.exe22⤵PID:2576
-
C:\Windows\SysWOW64\Boknic32.exeC:\Windows\system32\Boknic32.exe23⤵PID:4388
-
C:\Windows\SysWOW64\Cldgmgml.exeC:\Windows\system32\Cldgmgml.exe24⤵
- Drops file in System32 directory
PID:1420 -
C:\Windows\SysWOW64\Clmjcfdb.exeC:\Windows\system32\Clmjcfdb.exe25⤵PID:4476
-
C:\Windows\SysWOW64\Cdiohhbm.exeC:\Windows\system32\Cdiohhbm.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:912 -
C:\Windows\SysWOW64\Ddklnh32.exeC:\Windows\system32\Ddklnh32.exe27⤵
- Modifies registry class
PID:4656 -
C:\Windows\SysWOW64\Doqpkq32.exeC:\Windows\system32\Doqpkq32.exe28⤵
- Modifies registry class
PID:4648 -
C:\Windows\SysWOW64\Dboiaoff.exeC:\Windows\system32\Dboiaoff.exe29⤵PID:4680
-
C:\Windows\SysWOW64\Dcaefo32.exeC:\Windows\system32\Dcaefo32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4880 -
C:\Windows\SysWOW64\Dkljka32.exeC:\Windows\system32\Dkljka32.exe31⤵PID:768
-
C:\Windows\SysWOW64\Ednajepe.exeC:\Windows\system32\Ednajepe.exe32⤵PID:856
-
C:\Windows\SysWOW64\Fchdnkpi.exeC:\Windows\system32\Fchdnkpi.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1724 -
C:\Windows\SysWOW64\Fdiafc32.exeC:\Windows\system32\Fdiafc32.exe34⤵PID:2956
-
C:\Windows\SysWOW64\Gdnjabab.exeC:\Windows\system32\Gdnjabab.exe35⤵
- Modifies registry class
PID:2036 -
C:\Windows\SysWOW64\Gdcdlb32.exeC:\Windows\system32\Gdcdlb32.exe36⤵PID:3556
-
C:\Windows\SysWOW64\Gfbpfedp.exeC:\Windows\system32\Gfbpfedp.exe37⤵PID:2280
-
C:\Windows\SysWOW64\Hicihp32.exeC:\Windows\system32\Hicihp32.exe38⤵PID:1716
-
C:\Windows\SysWOW64\Hcimei32.exeC:\Windows\system32\Hcimei32.exe39⤵
- Modifies registry class
PID:992 -
C:\Windows\SysWOW64\Heapmp32.exeC:\Windows\system32\Heapmp32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:112 -
C:\Windows\SysWOW64\Icbpkg32.exeC:\Windows\system32\Icbpkg32.exe41⤵PID:3392
-
C:\Windows\SysWOW64\Ilbnkiba.exeC:\Windows\system32\Ilbnkiba.exe42⤵PID:3144
-
C:\Windows\SysWOW64\Jfaenqjm.exeC:\Windows\system32\Jfaenqjm.exe43⤵
- Drops file in System32 directory
PID:1184 -
C:\Windows\SysWOW64\Kmfmfigl.exeC:\Windows\system32\Kmfmfigl.exe44⤵PID:3956
-
C:\Windows\SysWOW64\Lbjlpo32.exeC:\Windows\system32\Lbjlpo32.exe45⤵PID:4976
-
C:\Windows\SysWOW64\Lmppmh32.exeC:\Windows\system32\Lmppmh32.exe46⤵PID:3192
-
C:\Windows\SysWOW64\Lboeknkf.exeC:\Windows\system32\Lboeknkf.exe47⤵PID:4808
-
C:\Windows\SysWOW64\Ldoadabi.exeC:\Windows\system32\Ldoadabi.exe48⤵PID:2824
-
C:\Windows\SysWOW64\Mdckpqod.exeC:\Windows\system32\Mdckpqod.exe49⤵
- Modifies registry class
PID:1920 -
C:\Windows\SysWOW64\Medggidb.exeC:\Windows\system32\Medggidb.exe50⤵
- Drops file in System32 directory
PID:5128 -
C:\Windows\SysWOW64\Mpoepa32.exeC:\Windows\system32\Mpoepa32.exe51⤵
- Modifies registry class
PID:5184 -
C:\Windows\SysWOW64\Nphhfp32.exeC:\Windows\system32\Nphhfp32.exe52⤵PID:5228
-
C:\Windows\SysWOW64\Ncfdbk32.exeC:\Windows\system32\Ncfdbk32.exe53⤵
- Modifies registry class
PID:5280 -
C:\Windows\SysWOW64\Onekeb32.exeC:\Windows\system32\Onekeb32.exe54⤵PID:5328
-
C:\Windows\SysWOW64\Pqhammje.exeC:\Windows\system32\Pqhammje.exe55⤵
- Drops file in System32 directory
PID:5372 -
C:\Windows\SysWOW64\Pqmjhm32.exeC:\Windows\system32\Pqmjhm32.exe56⤵
- Modifies registry class
PID:5480 -
C:\Windows\SysWOW64\Bepeph32.exeC:\Windows\system32\Bepeph32.exe57⤵
- Drops file in System32 directory
PID:5572 -
C:\Windows\SysWOW64\Bcebadof.exeC:\Windows\system32\Bcebadof.exe58⤵PID:5612
-
C:\Windows\SysWOW64\Bjokno32.exeC:\Windows\system32\Bjokno32.exe59⤵
- Modifies registry class
PID:5680 -
C:\Windows\SysWOW64\Cmiffhkj.exeC:\Windows\system32\Cmiffhkj.exe60⤵PID:5796
-
C:\Windows\SysWOW64\Ceckleii.exeC:\Windows\system32\Ceckleii.exe61⤵PID:5864
-
C:\Windows\SysWOW64\Edmjpoli.exeC:\Windows\system32\Edmjpoli.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5924 -
C:\Windows\SysWOW64\Fdijkmbl.exeC:\Windows\system32\Fdijkmbl.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5984 -
C:\Windows\SysWOW64\Gkglcfec.exeC:\Windows\system32\Gkglcfec.exe64⤵
- Drops file in System32 directory
PID:6028 -
C:\Windows\SysWOW64\Gaadpqmp.exeC:\Windows\system32\Gaadpqmp.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6076 -
C:\Windows\SysWOW64\Gkjhif32.exeC:\Windows\system32\Gkjhif32.exe66⤵
- Modifies registry class
PID:6124 -
C:\Windows\SysWOW64\Gadqepkn.exeC:\Windows\system32\Gadqepkn.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5136 -
C:\Windows\SysWOW64\Gnkajapa.exeC:\Windows\system32\Gnkajapa.exe68⤵
- Drops file in System32 directory
PID:5196 -
C:\Windows\SysWOW64\Hfioln32.exeC:\Windows\system32\Hfioln32.exe69⤵PID:5252
-
C:\Windows\SysWOW64\Hoadecal.exeC:\Windows\system32\Hoadecal.exe70⤵
- Modifies registry class
PID:4148 -
C:\Windows\SysWOW64\Ibffbnjh.exeC:\Windows\system32\Ibffbnjh.exe71⤵PID:3488
-
C:\Windows\SysWOW64\Iiehjgnp.exeC:\Windows\system32\Iiehjgnp.exe72⤵PID:5384
-
C:\Windows\SysWOW64\Ioopfa32.exeC:\Windows\system32\Ioopfa32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3596 -
C:\Windows\SysWOW64\Jkkjfa32.exeC:\Windows\system32\Jkkjfa32.exe74⤵PID:3364
-
C:\Windows\SysWOW64\Jlocaabf.exeC:\Windows\system32\Jlocaabf.exe75⤵PID:5532
-
C:\Windows\SysWOW64\Klapgq32.exeC:\Windows\system32\Klapgq32.exe76⤵PID:5640
-
C:\Windows\SysWOW64\Kbpboj32.exeC:\Windows\system32\Kbpboj32.exe77⤵PID:5724
-
C:\Windows\SysWOW64\Lbekjipe.exeC:\Windows\system32\Lbekjipe.exe78⤵
- Modifies registry class
PID:5844 -
C:\Windows\SysWOW64\Lhbdbpnm.exeC:\Windows\system32\Lhbdbpnm.exe79⤵PID:2112
-
C:\Windows\SysWOW64\Lpkiim32.exeC:\Windows\system32\Lpkiim32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3696 -
C:\Windows\SysWOW64\Lpbojlfd.exeC:\Windows\system32\Lpbojlfd.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6024 -
C:\Windows\SysWOW64\Mflgff32.exeC:\Windows\system32\Mflgff32.exe82⤵
- Drops file in System32 directory
PID:6056 -
C:\Windows\SysWOW64\Mhncnodp.exeC:\Windows\system32\Mhncnodp.exe83⤵PID:5148
-
C:\Windows\SysWOW64\Miaica32.exeC:\Windows\system32\Miaica32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4412 -
C:\Windows\SysWOW64\Moobkh32.exeC:\Windows\system32\Moobkh32.exe85⤵PID:5344
-
C:\Windows\SysWOW64\Mehjhbma.exeC:\Windows\system32\Mehjhbma.exe86⤵
- Modifies registry class
PID:1760 -
C:\Windows\SysWOW64\Mpnnek32.exeC:\Windows\system32\Mpnnek32.exe87⤵PID:4668
-
C:\Windows\SysWOW64\Npedfjfo.exeC:\Windows\system32\Npedfjfo.exe88⤵PID:3916
-
C:\Windows\SysWOW64\Ngombd32.exeC:\Windows\system32\Ngombd32.exe89⤵
- Drops file in System32 directory
PID:4468 -
C:\Windows\SysWOW64\Oidopn32.exeC:\Windows\system32\Oidopn32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:552 -
C:\Windows\SysWOW64\Ohnelj32.exeC:\Windows\system32\Ohnelj32.exe91⤵
- Drops file in System32 directory
- Modifies registry class
PID:64 -
C:\Windows\SysWOW64\Pcdjic32.exeC:\Windows\system32\Pcdjic32.exe92⤵PID:5656
-
C:\Windows\SysWOW64\Pplcnf32.exeC:\Windows\system32\Pplcnf32.exe93⤵PID:5720
-
C:\Windows\SysWOW64\Qqamieno.exeC:\Windows\system32\Qqamieno.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5916 -
C:\Windows\SysWOW64\Ajqgbjoh.exeC:\Windows\system32\Ajqgbjoh.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4908 -
C:\Windows\SysWOW64\Amaqde32.exeC:\Windows\system32\Amaqde32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:6088 -
C:\Windows\SysWOW64\Bgknlmgi.exeC:\Windows\system32\Bgknlmgi.exe97⤵
- Drops file in System32 directory
PID:2304 -
C:\Windows\SysWOW64\Bgbdml32.exeC:\Windows\system32\Bgbdml32.exe98⤵PID:6132
-
C:\Windows\SysWOW64\Bpniaool.exeC:\Windows\system32\Bpniaool.exe99⤵
- Modifies registry class
PID:5316 -
C:\Windows\SysWOW64\Cifmjd32.exeC:\Windows\system32\Cifmjd32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2740 -
C:\Windows\SysWOW64\Cfjnch32.exeC:\Windows\system32\Cfjnch32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1508 -
C:\Windows\SysWOW64\Cimckcoe.exeC:\Windows\system32\Cimckcoe.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5404 -
C:\Windows\SysWOW64\Cfaddg32.exeC:\Windows\system32\Cfaddg32.exe103⤵
- Modifies registry class
PID:4764 -
C:\Windows\SysWOW64\Dmmifaci.exeC:\Windows\system32\Dmmifaci.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5488 -
C:\Windows\SysWOW64\Dffmogji.exeC:\Windows\system32\Dffmogji.exe105⤵PID:2816
-
C:\Windows\SysWOW64\Dpnbhl32.exeC:\Windows\system32\Dpnbhl32.exe106⤵
- Drops file in System32 directory
PID:3112 -
C:\Windows\SysWOW64\Djfckenm.exeC:\Windows\system32\Djfckenm.exe107⤵
- Modifies registry class
PID:3632 -
C:\Windows\SysWOW64\Dpckclld.exeC:\Windows\system32\Dpckclld.exe108⤵
- Drops file in System32 directory
PID:4620 -
C:\Windows\SysWOW64\Emkeho32.exeC:\Windows\system32\Emkeho32.exe109⤵
- Modifies registry class
PID:5156 -
C:\Windows\SysWOW64\Jqgldb32.exeC:\Windows\system32\Jqgldb32.exe110⤵PID:6116
-
C:\Windows\SysWOW64\Jklpakam.exeC:\Windows\system32\Jklpakam.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5260 -
C:\Windows\SysWOW64\Jdddjq32.exeC:\Windows\system32\Jdddjq32.exe112⤵PID:2636
-
C:\Windows\SysWOW64\Kkomgkoj.exeC:\Windows\system32\Kkomgkoj.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3368 -
C:\Windows\SysWOW64\Kibmqond.exeC:\Windows\system32\Kibmqond.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1152 -
C:\Windows\SysWOW64\Kbkaiddd.exeC:\Windows\system32\Kbkaiddd.exe115⤵PID:4180
-
C:\Windows\SysWOW64\Kjkpif32.exeC:\Windows\system32\Kjkpif32.exe116⤵PID:5500
-
C:\Windows\SysWOW64\Kaehepeg.exeC:\Windows\system32\Kaehepeg.exe117⤵PID:3896
-
C:\Windows\SysWOW64\Lkmihi32.exeC:\Windows\system32\Lkmihi32.exe118⤵PID:3480
-
C:\Windows\SysWOW64\Lnmbjd32.exeC:\Windows\system32\Lnmbjd32.exe119⤵PID:4496
-
C:\Windows\SysWOW64\Lnpopcni.exeC:\Windows\system32\Lnpopcni.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4444 -
C:\Windows\SysWOW64\Mjneec32.exeC:\Windows\system32\Mjneec32.exe121⤵
- Modifies registry class
PID:4408 -
C:\Windows\SysWOW64\Miabik32.exeC:\Windows\system32\Miabik32.exe122⤵PID:6000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-