Analysis
-
max time kernel
247s -
max time network
275s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 20:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe
-
Size
109KB
-
MD5
d84aaf9acd8c9e82ebd52e74d7cb7a60
-
SHA1
02c181078d70300f7b6d087bc98709911f12ecde
-
SHA256
9248b8d8ee29395c33c7c095669a1e7ff570059ca269fe430c0808f4fddae521
-
SHA512
0c5b25daf022eae56ceb759b51c288c93d81fd78687170cee41d4032e2f205b3187313ac630f97a9b88c89f82f6d696c4c625614d42820346c11c315b604a1d0
-
SSDEEP
3072:RsMRakk6ViPJViPkf2/C3iOJ9aLCqwzBu1DjHLMVDqqkSpR:340iniT/hOJ9uwtu1DjrFqhz
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ahgqnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mhjdpgic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceeibbgn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndhpiapi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aajhhgpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bjamhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pjceck32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nagobp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkbhfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Llmandgf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cifgcl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfpflenm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckgkfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aajhhgpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pqmmpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fchjacbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Noffadai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ckbakiee.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdnfalea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bpkedbka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bfahhn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpeike32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mabihm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nnpdbg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adokdbib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pddped32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbaano32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahgqnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Blpnee32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebhani32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nphbhm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llmandgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kjnjng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Poekgnkk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfcemn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fnhabphk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oljbil32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmefidoj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aollklac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pojkmc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjnjng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pcimfalg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oemfoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Poggmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bnjlcgnp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqpjee32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmjohoej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkapla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nnenmfbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Njlnbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pihnbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pmefidoj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbodhpdi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdeepf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nkbhfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nkddkk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdbcpeib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pdbcpeib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pgpplphe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abjiclfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mibgho32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmegbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ndhpiapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nqamcbcj.exe -
Executes dropped EXE 64 IoCs
pid Process 2716 Ebhani32.exe 2788 Ogpkhb32.exe 2540 Hnapja32.exe 1080 Ajipmocp.exe 1932 Clphjc32.exe 1904 Mmepboin.exe 1964 Mhjdpgic.exe 1356 Mabihm32.exe 572 Mbfbfe32.exe 1056 Mbiokdam.exe 1600 Mibgho32.exe 2532 Nanlla32.exe 1928 Nkfpefme.exe 1940 Napibq32.exe 1736 Nhlndj32.exe 1424 Noffadai.exe 1364 Nphbhm32.exe 1376 Nagobp32.exe 1660 Oljbil32.exe 2996 Pdegnn32.exe 2148 Pqcncnpe.exe 548 Pfpflenm.exe 1796 Pmjohoej.exe 1776 Cmnqae32.exe 2460 Ceeibbgn.exe 2056 Ckbakiee.exe 2968 Cpojcpcm.exe 2620 Chfadndo.exe 2764 Ckgkfi32.exe 2972 Cmegbd32.exe 2028 Dkggel32.exe 2524 Pdnfalea.exe 1008 Ohoiaf32.exe 2808 Bkapla32.exe 1852 Mcfcai32.exe 1944 Ndhpiapi.exe 660 Nkbhfk32.exe 2836 Nnpdbg32.exe 2824 Nkddkk32.exe 1208 Nnbagfdg.exe 2816 Nqamcbcj.exe 2800 Ngkepl32.exe 1988 Nnenmfbd.exe 2356 Njlnbg32.exe 888 Nmjknb32.exe 1168 Neabophn.exe 1848 Nnjghe32.exe 2016 Nmlgcbei.exe 1300 Ogbkakeo.exe 3004 Oichhc32.exe 1040 Oajpjq32.exe 1536 Obllai32.exe 2328 Oieencik.exe 2124 Oldajoho.exe 1936 Obnigi32.exe 1960 Pihnbf32.exe 2176 Pjgjmipf.exe 1732 Pmefidoj.exe 2584 Qbboakna.exe 2792 Qfnkajfk.exe 2244 Qmhcnd32.exe 2640 Qpfojp32.exe 2928 Qiodcecl.exe 1048 Qlmpoqbo.exe -
Loads dropped DLL 64 IoCs
pid Process 1204 NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe 1204 NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe 2716 Ebhani32.exe 2716 Ebhani32.exe 2788 Ogpkhb32.exe 2788 Ogpkhb32.exe 2540 Hnapja32.exe 2540 Hnapja32.exe 1080 Ajipmocp.exe 1080 Ajipmocp.exe 1932 Clphjc32.exe 1932 Clphjc32.exe 1904 Mmepboin.exe 1904 Mmepboin.exe 1964 Mhjdpgic.exe 1964 Mhjdpgic.exe 1356 Mabihm32.exe 1356 Mabihm32.exe 572 Mbfbfe32.exe 572 Mbfbfe32.exe 1056 Mbiokdam.exe 1056 Mbiokdam.exe 1600 Mibgho32.exe 1600 Mibgho32.exe 2532 Nanlla32.exe 2532 Nanlla32.exe 1928 Nkfpefme.exe 1928 Nkfpefme.exe 1940 Napibq32.exe 1940 Napibq32.exe 1736 Nhlndj32.exe 1736 Nhlndj32.exe 1424 Noffadai.exe 1424 Noffadai.exe 1364 Nphbhm32.exe 1364 Nphbhm32.exe 1376 Nagobp32.exe 1376 Nagobp32.exe 1660 Oljbil32.exe 1660 Oljbil32.exe 2996 Pdegnn32.exe 2996 Pdegnn32.exe 2148 Pqcncnpe.exe 2148 Pqcncnpe.exe 548 Pfpflenm.exe 548 Pfpflenm.exe 1796 Pmjohoej.exe 1796 Pmjohoej.exe 1776 Cmnqae32.exe 1776 Cmnqae32.exe 2460 Ceeibbgn.exe 2460 Ceeibbgn.exe 2056 Ckbakiee.exe 2056 Ckbakiee.exe 2968 Cpojcpcm.exe 2968 Cpojcpcm.exe 2620 Chfadndo.exe 2620 Chfadndo.exe 2764 Ckgkfi32.exe 2764 Ckgkfi32.exe 2972 Cmegbd32.exe 2972 Cmegbd32.exe 2028 Dkggel32.exe 2028 Dkggel32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ogpkhb32.exe Ebhani32.exe File opened for modification C:\Windows\SysWOW64\Djjlmj32.exe Dodhpa32.exe File created C:\Windows\SysWOW64\Ihddim32.dll Dbeqalkp.exe File created C:\Windows\SysWOW64\Enaefl32.dll Badpoggd.exe File opened for modification C:\Windows\SysWOW64\Ddlkqe32.exe Cifgcl32.exe File opened for modification C:\Windows\SysWOW64\Ahgqnn32.exe Aqpima32.exe File opened for modification C:\Windows\SysWOW64\Mmepboin.exe Clphjc32.exe File created C:\Windows\SysWOW64\Ckgkfi32.exe Chfadndo.exe File opened for modification C:\Windows\SysWOW64\Njlnbg32.exe Nnenmfbd.exe File created C:\Windows\SysWOW64\Jhmbim32.dll Cakbojch.exe File created C:\Windows\SysWOW64\Dkkhdbdc.exe Djjlmj32.exe File opened for modification C:\Windows\SysWOW64\Fmpoji32.exe Fjacnn32.exe File created C:\Windows\SysWOW64\Bopbeopi.exe Bfhnmiii.exe File created C:\Windows\SysWOW64\Inihnndl.dll Obllai32.exe File opened for modification C:\Windows\SysWOW64\Oldajoho.exe Oieencik.exe File created C:\Windows\SysWOW64\Ohkbkd32.exe Oemfoh32.exe File created C:\Windows\SysWOW64\Poggmn32.exe Pgpplphe.exe File created C:\Windows\SysWOW64\Banddeoo.dll Pgpplphe.exe File created C:\Windows\SysWOW64\Ckbakiee.exe Ceeibbgn.exe File opened for modification C:\Windows\SysWOW64\Aaaohfjo.exe Agkjknji.exe File created C:\Windows\SysWOW64\Qolenepf.dll Bopbeopi.exe File created C:\Windows\SysWOW64\Gpdjkk32.dll Bkgbkp32.exe File opened for modification C:\Windows\SysWOW64\Cdeepf32.exe Blpnee32.exe File created C:\Windows\SysWOW64\Nanlla32.exe Mibgho32.exe File opened for modification C:\Windows\SysWOW64\Nnenmfbd.exe Ngkepl32.exe File created C:\Windows\SysWOW64\Pddped32.exe Pafdii32.exe File created C:\Windows\SysWOW64\Fegbklbe.dll Ahgqnn32.exe File created C:\Windows\SysWOW64\Ngkepl32.exe Nqamcbcj.exe File opened for modification C:\Windows\SysWOW64\Fchjacbd.exe Dojelbib.exe File created C:\Windows\SysWOW64\Napibq32.exe Nkfpefme.exe File created C:\Windows\SysWOW64\Pmefidoj.exe Pjgjmipf.exe File created C:\Windows\SysWOW64\Ehpeibla.dll Nkfpefme.exe File opened for modification C:\Windows\SysWOW64\Dojelbib.exe Dpeike32.exe File created C:\Windows\SysWOW64\Gpdlgcif.dll Ddlkqe32.exe File created C:\Windows\SysWOW64\Mbiokdam.exe Mbfbfe32.exe File opened for modification C:\Windows\SysWOW64\Cmegbd32.exe Ckgkfi32.exe File created C:\Windows\SysWOW64\Dbeqalkp.exe Dkkhdbdc.exe File created C:\Windows\SysWOW64\Afolbogn.exe Acpofchk.exe File opened for modification C:\Windows\SysWOW64\Fmblpifb.exe Fhgpoj32.exe File opened for modification C:\Windows\SysWOW64\Ebhani32.exe NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe File created C:\Windows\SysWOW64\Qbboakna.exe Pmefidoj.exe File opened for modification C:\Windows\SysWOW64\Bciaqnje.exe Bpkedbka.exe File opened for modification C:\Windows\SysWOW64\Ckgkfi32.exe Chfadndo.exe File created C:\Windows\SysWOW64\Pdbcpeib.exe Poekgnkk.exe File created C:\Windows\SysWOW64\Mglihlok.dll Nanlla32.exe File opened for modification C:\Windows\SysWOW64\Nphbhm32.exe Noffadai.exe File created C:\Windows\SysWOW64\Eikjgc32.dll Pjceck32.exe File created C:\Windows\SysWOW64\Dhhhbi32.dll Cojimofg.exe File created C:\Windows\SysWOW64\Ojgckb32.dll Aajhhgpg.exe File created C:\Windows\SysWOW64\Ccngkphk.exe Bkgbkp32.exe File opened for modification C:\Windows\SysWOW64\Pddped32.exe Pafdii32.exe File created C:\Windows\SysWOW64\Pcimfalg.exe Pdfmkd32.exe File created C:\Windows\SysWOW64\Bfmagnig.dll Pqpjee32.exe File opened for modification C:\Windows\SysWOW64\Aboegdjq.exe Ajhmffin.exe File opened for modification C:\Windows\SysWOW64\Fbmgbpgl.exe Fmpoji32.exe File opened for modification C:\Windows\SysWOW64\Demhhmfg.exe Ddlkqe32.exe File created C:\Windows\SysWOW64\Kglhbijp.dll Pdegnn32.exe File opened for modification C:\Windows\SysWOW64\Dkggel32.exe Cmegbd32.exe File opened for modification C:\Windows\SysWOW64\Obnigi32.exe Oldajoho.exe File created C:\Windows\SysWOW64\Pihnbf32.exe Obnigi32.exe File created C:\Windows\SysWOW64\Dodhpa32.exe Cflcglho.exe File opened for modification C:\Windows\SysWOW64\Dbeqalkp.exe Dkkhdbdc.exe File created C:\Windows\SysWOW64\Ngglonnc.dll Pmbaof32.exe File created C:\Windows\SysWOW64\Hipodl32.exe Fnhabphk.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mmepboin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pfpflenm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pihnbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pmbaof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Blpnee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fegbklbe.dll" Ahgqnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcmafnhi.dll" Noffadai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acpocbie.dll" Nnjghe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nannaa32.dll" Pdbcpeib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alcgnmcl.dll" Pqmmpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pamdfbjn.dll" Afolbogn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cojimofg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkbggj32.dll" Bnjlcgnp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Agioab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ajhmffin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Djjlmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Poggmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Abjiclfa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fmpoji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccgdeo32.dll" Fmpoji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mibgho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nkfpefme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nnenmfbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oldajoho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cgenbadb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nnbagfdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qfnkajfk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bjamhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pddped32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhhhbi32.dll" Cojimofg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cgenbadb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nhlndj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alodkfoh.dll" Pihnbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dodhpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pdbcpeib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fnhabphk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Manknb32.dll" Mmepboin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oejllo32.dll" Bciaqnje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdlgnl32.dll" Poggmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgkkfgqp.dll" Bfahhn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nhlndj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ceeibbgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nnjghe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oajpjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bnjlcgnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pjceck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mmepboin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dkggel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pdnfalea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mcfcai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pmefidoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idblbjen.dll" Bgbqlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bkgbkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qaeklljj.dll" Djjlmj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Poggmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajipmocp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dpeike32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Focdad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nmlgcbei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afolbogn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djkofj32.dll" Oldajoho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbaakoab.dll" Bfhnmiii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fjacnn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2716 1204 NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe 28 PID 1204 wrote to memory of 2716 1204 NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe 28 PID 1204 wrote to memory of 2716 1204 NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe 28 PID 1204 wrote to memory of 2716 1204 NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe 28 PID 2716 wrote to memory of 2788 2716 Ebhani32.exe 29 PID 2716 wrote to memory of 2788 2716 Ebhani32.exe 29 PID 2716 wrote to memory of 2788 2716 Ebhani32.exe 29 PID 2716 wrote to memory of 2788 2716 Ebhani32.exe 29 PID 2788 wrote to memory of 2540 2788 Ogpkhb32.exe 30 PID 2788 wrote to memory of 2540 2788 Ogpkhb32.exe 30 PID 2788 wrote to memory of 2540 2788 Ogpkhb32.exe 30 PID 2788 wrote to memory of 2540 2788 Ogpkhb32.exe 30 PID 2540 wrote to memory of 1080 2540 Hnapja32.exe 31 PID 2540 wrote to memory of 1080 2540 Hnapja32.exe 31 PID 2540 wrote to memory of 1080 2540 Hnapja32.exe 31 PID 2540 wrote to memory of 1080 2540 Hnapja32.exe 31 PID 1080 wrote to memory of 1932 1080 Ajipmocp.exe 32 PID 1080 wrote to memory of 1932 1080 Ajipmocp.exe 32 PID 1080 wrote to memory of 1932 1080 Ajipmocp.exe 32 PID 1080 wrote to memory of 1932 1080 Ajipmocp.exe 32 PID 1932 wrote to memory of 1904 1932 Clphjc32.exe 33 PID 1932 wrote to memory of 1904 1932 Clphjc32.exe 33 PID 1932 wrote to memory of 1904 1932 Clphjc32.exe 33 PID 1932 wrote to memory of 1904 1932 Clphjc32.exe 33 PID 1904 wrote to memory of 1964 1904 Mmepboin.exe 34 PID 1904 wrote to memory of 1964 1904 Mmepboin.exe 34 PID 1904 wrote to memory of 1964 1904 Mmepboin.exe 34 PID 1904 wrote to memory of 1964 1904 Mmepboin.exe 34 PID 1964 wrote to memory of 1356 1964 Mhjdpgic.exe 35 PID 1964 wrote to memory of 1356 1964 Mhjdpgic.exe 35 PID 1964 wrote to memory of 1356 1964 Mhjdpgic.exe 35 PID 1964 wrote to memory of 1356 1964 Mhjdpgic.exe 35 PID 1356 wrote to memory of 572 1356 Mabihm32.exe 36 PID 1356 wrote to memory of 572 1356 Mabihm32.exe 36 PID 1356 wrote to memory of 572 1356 Mabihm32.exe 36 PID 1356 wrote to memory of 572 1356 Mabihm32.exe 36 PID 572 wrote to memory of 1056 572 Mbfbfe32.exe 37 PID 572 wrote to memory of 1056 572 Mbfbfe32.exe 37 PID 572 wrote to memory of 1056 572 Mbfbfe32.exe 37 PID 572 wrote to memory of 1056 572 Mbfbfe32.exe 37 PID 1056 wrote to memory of 1600 1056 Mbiokdam.exe 40 PID 1056 wrote to memory of 1600 1056 Mbiokdam.exe 40 PID 1056 wrote to memory of 1600 1056 Mbiokdam.exe 40 PID 1056 wrote to memory of 1600 1056 Mbiokdam.exe 40 PID 1600 wrote to memory of 2532 1600 Mibgho32.exe 39 PID 1600 wrote to memory of 2532 1600 Mibgho32.exe 39 PID 1600 wrote to memory of 2532 1600 Mibgho32.exe 39 PID 1600 wrote to memory of 2532 1600 Mibgho32.exe 39 PID 2532 wrote to memory of 1928 2532 Nanlla32.exe 38 PID 2532 wrote to memory of 1928 2532 Nanlla32.exe 38 PID 2532 wrote to memory of 1928 2532 Nanlla32.exe 38 PID 2532 wrote to memory of 1928 2532 Nanlla32.exe 38 PID 1928 wrote to memory of 1940 1928 Nkfpefme.exe 41 PID 1928 wrote to memory of 1940 1928 Nkfpefme.exe 41 PID 1928 wrote to memory of 1940 1928 Nkfpefme.exe 41 PID 1928 wrote to memory of 1940 1928 Nkfpefme.exe 41 PID 1940 wrote to memory of 1736 1940 Napibq32.exe 42 PID 1940 wrote to memory of 1736 1940 Napibq32.exe 42 PID 1940 wrote to memory of 1736 1940 Napibq32.exe 42 PID 1940 wrote to memory of 1736 1940 Napibq32.exe 42 PID 1736 wrote to memory of 1424 1736 Nhlndj32.exe 43 PID 1736 wrote to memory of 1424 1736 Nhlndj32.exe 43 PID 1736 wrote to memory of 1424 1736 Nhlndj32.exe 43 PID 1736 wrote to memory of 1424 1736 Nhlndj32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d84aaf9acd8c9e82ebd52e74d7cb7a60.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\Ebhani32.exeC:\Windows\system32\Ebhani32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\Ogpkhb32.exeC:\Windows\system32\Ogpkhb32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\Hnapja32.exeC:\Windows\system32\Hnapja32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Ajipmocp.exeC:\Windows\system32\Ajipmocp.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\Clphjc32.exeC:\Windows\system32\Clphjc32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\Mmepboin.exeC:\Windows\system32\Mmepboin.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\Mhjdpgic.exeC:\Windows\system32\Mhjdpgic.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\Mabihm32.exeC:\Windows\system32\Mabihm32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\Mbfbfe32.exeC:\Windows\system32\Mbfbfe32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\Mbiokdam.exeC:\Windows\system32\Mbiokdam.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\Mibgho32.exeC:\Windows\system32\Mibgho32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1600
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Nkfpefme.exeC:\Windows\system32\Nkfpefme.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\Napibq32.exeC:\Windows\system32\Napibq32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\Nhlndj32.exeC:\Windows\system32\Nhlndj32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\Noffadai.exeC:\Windows\system32\Noffadai.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1424 -
C:\Windows\SysWOW64\Nphbhm32.exeC:\Windows\system32\Nphbhm32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1364 -
C:\Windows\SysWOW64\Nagobp32.exeC:\Windows\system32\Nagobp32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1376 -
C:\Windows\SysWOW64\Oljbil32.exeC:\Windows\system32\Oljbil32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1660 -
C:\Windows\SysWOW64\Pdegnn32.exeC:\Windows\system32\Pdegnn32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2996 -
C:\Windows\SysWOW64\Pqcncnpe.exeC:\Windows\system32\Pqcncnpe.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2148 -
C:\Windows\SysWOW64\Pfpflenm.exeC:\Windows\system32\Pfpflenm.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:548 -
C:\Windows\SysWOW64\Pmjohoej.exeC:\Windows\system32\Pmjohoej.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1796 -
C:\Windows\SysWOW64\Cmnqae32.exeC:\Windows\system32\Cmnqae32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1776 -
C:\Windows\SysWOW64\Ceeibbgn.exeC:\Windows\system32\Ceeibbgn.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2460 -
C:\Windows\SysWOW64\Ckbakiee.exeC:\Windows\system32\Ckbakiee.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2056 -
C:\Windows\SysWOW64\Cpojcpcm.exeC:\Windows\system32\Cpojcpcm.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2968 -
C:\Windows\SysWOW64\Chfadndo.exeC:\Windows\system32\Chfadndo.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2620 -
C:\Windows\SysWOW64\Ckgkfi32.exeC:\Windows\system32\Ckgkfi32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2764 -
C:\Windows\SysWOW64\Cmegbd32.exeC:\Windows\system32\Cmegbd32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\Dkggel32.exeC:\Windows\system32\Dkggel32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2028 -
C:\Windows\SysWOW64\Pdnfalea.exeC:\Windows\system32\Pdnfalea.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\Ohoiaf32.exeC:\Windows\system32\Ohoiaf32.exe21⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\Bkapla32.exeC:\Windows\system32\Bkapla32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\Mcfcai32.exeC:\Windows\system32\Mcfcai32.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:1852 -
C:\Windows\SysWOW64\Ndhpiapi.exeC:\Windows\system32\Ndhpiapi.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1944 -
C:\Windows\SysWOW64\Nkbhfk32.exeC:\Windows\system32\Nkbhfk32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:660 -
C:\Windows\SysWOW64\Nnpdbg32.exeC:\Windows\system32\Nnpdbg32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Nkddkk32.exeC:\Windows\system32\Nkddkk32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Nnbagfdg.exeC:\Windows\system32\Nnbagfdg.exe28⤵
- Executes dropped EXE
- Modifies registry class
PID:1208 -
C:\Windows\SysWOW64\Nqamcbcj.exeC:\Windows\system32\Nqamcbcj.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2816 -
C:\Windows\SysWOW64\Ngkepl32.exeC:\Windows\system32\Ngkepl32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2800 -
C:\Windows\SysWOW64\Nnenmfbd.exeC:\Windows\system32\Nnenmfbd.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1988 -
C:\Windows\SysWOW64\Njlnbg32.exeC:\Windows\system32\Njlnbg32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\Nmjknb32.exeC:\Windows\system32\Nmjknb32.exe33⤵
- Executes dropped EXE
PID:888 -
C:\Windows\SysWOW64\Neabophn.exeC:\Windows\system32\Neabophn.exe34⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\SysWOW64\Nnjghe32.exeC:\Windows\system32\Nnjghe32.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:1848 -
C:\Windows\SysWOW64\Nmlgcbei.exeC:\Windows\system32\Nmlgcbei.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\Ogbkakeo.exeC:\Windows\system32\Ogbkakeo.exe37⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\Oichhc32.exeC:\Windows\system32\Oichhc32.exe38⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\Oajpjq32.exeC:\Windows\system32\Oajpjq32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:1040 -
C:\Windows\SysWOW64\Obllai32.exeC:\Windows\system32\Obllai32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1536 -
C:\Windows\SysWOW64\Oieencik.exeC:\Windows\system32\Oieencik.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2328 -
C:\Windows\SysWOW64\Oldajoho.exeC:\Windows\system32\Oldajoho.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2124 -
C:\Windows\SysWOW64\Obnigi32.exeC:\Windows\system32\Obnigi32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\Pihnbf32.exeC:\Windows\system32\Pihnbf32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1960 -
C:\Windows\SysWOW64\Pjgjmipf.exeC:\Windows\system32\Pjgjmipf.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\Pmefidoj.exeC:\Windows\system32\Pmefidoj.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\Qbboakna.exeC:\Windows\system32\Qbboakna.exe47⤵
- Executes dropped EXE
PID:2584 -
C:\Windows\SysWOW64\Qfnkajfk.exeC:\Windows\system32\Qfnkajfk.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:2792 -
C:\Windows\SysWOW64\Qmhcnd32.exeC:\Windows\system32\Qmhcnd32.exe49⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\Qpfojp32.exeC:\Windows\system32\Qpfojp32.exe50⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\Qiodcecl.exeC:\Windows\system32\Qiodcecl.exe51⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\SysWOW64\Qlmpoqbo.exeC:\Windows\system32\Qlmpoqbo.exe52⤵
- Executes dropped EXE
PID:1048 -
C:\Windows\SysWOW64\Aollklac.exeC:\Windows\system32\Aollklac.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2788 -
C:\Windows\SysWOW64\Aajhhgpg.exeC:\Windows\system32\Aajhhgpg.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2568 -
C:\Windows\SysWOW64\Agkjknji.exeC:\Windows\system32\Agkjknji.exe55⤵
- Drops file in System32 directory
PID:2776 -
C:\Windows\SysWOW64\Aaaohfjo.exeC:\Windows\system32\Aaaohfjo.exe56⤵PID:844
-
C:\Windows\SysWOW64\Adokdbib.exeC:\Windows\system32\Adokdbib.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2532 -
C:\Windows\SysWOW64\Aacknfhl.exeC:\Windows\system32\Aacknfhl.exe58⤵PID:1424
-
C:\Windows\SysWOW64\Adagjagp.exeC:\Windows\system32\Adagjagp.exe59⤵PID:2472
-
C:\Windows\SysWOW64\Agpdfmfc.exeC:\Windows\system32\Agpdfmfc.exe60⤵PID:2844
-
C:\Windows\SysWOW64\Bnjlcgnp.exeC:\Windows\system32\Bnjlcgnp.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:976 -
C:\Windows\SysWOW64\Bcgdknlh.exeC:\Windows\system32\Bcgdknlh.exe62⤵PID:2624
-
C:\Windows\SysWOW64\Bgbqlm32.exeC:\Windows\system32\Bgbqlm32.exe63⤵
- Modifies registry class
PID:1556 -
C:\Windows\SysWOW64\Bjamhh32.exeC:\Windows\system32\Bjamhh32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2404 -
C:\Windows\SysWOW64\Bpkedbka.exeC:\Windows\system32\Bpkedbka.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2580 -
C:\Windows\SysWOW64\Bciaqnje.exeC:\Windows\system32\Bciaqnje.exe66⤵
- Modifies registry class
PID:1668 -
C:\Windows\SysWOW64\Bfhnmiii.exeC:\Windows\system32\Bfhnmiii.exe67⤵
- Drops file in System32 directory
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Bopbeopi.exeC:\Windows\system32\Bopbeopi.exe68⤵
- Drops file in System32 directory
PID:2860 -
C:\Windows\SysWOW64\Bfjjbi32.exeC:\Windows\system32\Bfjjbi32.exe69⤵PID:2916
-
C:\Windows\SysWOW64\Bkgbkp32.exeC:\Windows\system32\Bkgbkp32.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:2932 -
C:\Windows\SysWOW64\Ccngkphk.exeC:\Windows\system32\Ccngkphk.exe71⤵PID:2912
-
C:\Windows\SysWOW64\Cflcglho.exeC:\Windows\system32\Cflcglho.exe72⤵
- Drops file in System32 directory
PID:2316 -
C:\Windows\SysWOW64\Dodhpa32.exeC:\Windows\system32\Dodhpa32.exe73⤵
- Drops file in System32 directory
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\Djjlmj32.exeC:\Windows\system32\Djjlmj32.exe74⤵
- Drops file in System32 directory
- Modifies registry class
PID:2392 -
C:\Windows\SysWOW64\Dkkhdbdc.exeC:\Windows\system32\Dkkhdbdc.exe75⤵
- Drops file in System32 directory
PID:2992 -
C:\Windows\SysWOW64\Dbeqalkp.exeC:\Windows\system32\Dbeqalkp.exe76⤵
- Drops file in System32 directory
PID:884 -
C:\Windows\SysWOW64\Llmandgf.exeC:\Windows\system32\Llmandgf.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1980 -
C:\Windows\SysWOW64\Pojkmc32.exeC:\Windows\system32\Pojkmc32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2564 -
C:\Windows\SysWOW64\Kjnjng32.exeC:\Windows\system32\Kjnjng32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1764 -
C:\Windows\SysWOW64\Okgbapdd.exeC:\Windows\system32\Okgbapdd.exe80⤵PID:1600
-
C:\Windows\SysWOW64\Oemfoh32.exeC:\Windows\system32\Oemfoh32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1704 -
C:\Windows\SysWOW64\Ohkbkd32.exeC:\Windows\system32\Ohkbkd32.exe82⤵PID:740
-
C:\Windows\SysWOW64\Poekgnkk.exeC:\Windows\system32\Poekgnkk.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1588 -
C:\Windows\SysWOW64\Pdbcpeib.exeC:\Windows\system32\Pdbcpeib.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1248 -
C:\Windows\SysWOW64\Pgpplphe.exeC:\Windows\system32\Pgpplphe.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:744 -
C:\Windows\SysWOW64\Poggmn32.exeC:\Windows\system32\Poggmn32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1624 -
C:\Windows\SysWOW64\Pafdii32.exeC:\Windows\system32\Pafdii32.exe87⤵
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\Pddped32.exeC:\Windows\system32\Pddped32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2940 -
C:\Windows\SysWOW64\Pgblap32.exeC:\Windows\system32\Pgblap32.exe89⤵PID:2868
-
C:\Windows\SysWOW64\Pdfmkd32.exeC:\Windows\system32\Pdfmkd32.exe90⤵
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\Pcimfalg.exeC:\Windows\system32\Pcimfalg.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1652 -
C:\Windows\SysWOW64\Pjceck32.exeC:\Windows\system32\Pjceck32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1804 -
C:\Windows\SysWOW64\Pmbaof32.exeC:\Windows\system32\Pmbaof32.exe93⤵
- Drops file in System32 directory
- Modifies registry class
PID:2944 -
C:\Windows\SysWOW64\Pqmmpe32.exeC:\Windows\system32\Pqmmpe32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\Pcljlq32.exeC:\Windows\system32\Pcljlq32.exe95⤵PID:1160
-
C:\Windows\SysWOW64\Pqpjee32.exeC:\Windows\system32\Pqpjee32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1008 -
C:\Windows\SysWOW64\Aibejf32.exeC:\Windows\system32\Aibejf32.exe97⤵PID:392
-
C:\Windows\SysWOW64\Akpafa32.exeC:\Windows\system32\Akpafa32.exe98⤵PID:1504
-
C:\Windows\SysWOW64\Abjiclfa.exeC:\Windows\system32\Abjiclfa.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\Aggbkbei.exeC:\Windows\system32\Aggbkbei.exe100⤵PID:2380
-
C:\Windows\SysWOW64\Agioab32.exeC:\Windows\system32\Agioab32.exe101⤵
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\Ancgnljc.exeC:\Windows\system32\Ancgnljc.exe102⤵PID:1912
-
C:\Windows\SysWOW64\Acpofchk.exeC:\Windows\system32\Acpofchk.exe103⤵
- Drops file in System32 directory
PID:2248 -
C:\Windows\SysWOW64\Afolbogn.exeC:\Windows\system32\Afolbogn.exe104⤵
- Modifies registry class
PID:1144 -
C:\Windows\SysWOW64\Bnfcclhq.exeC:\Windows\system32\Bnfcclhq.exe105⤵PID:2440
-
C:\Windows\SysWOW64\Badpoggd.exeC:\Windows\system32\Badpoggd.exe106⤵
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\Bfahhn32.exeC:\Windows\system32\Bfahhn32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\Bjmdhmne.exeC:\Windows\system32\Bjmdhmne.exe108⤵PID:2716
-
C:\Windows\SysWOW64\Bafmeg32.exeC:\Windows\system32\Bafmeg32.exe109⤵PID:2644
-
C:\Windows\SysWOW64\Bpimqdll.exeC:\Windows\system32\Bpimqdll.exe110⤵PID:2664
-
C:\Windows\SysWOW64\Bfcemn32.exeC:\Windows\system32\Bfcemn32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1936 -
C:\Windows\SysWOW64\Blpnee32.exeC:\Windows\system32\Blpnee32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2792 -
C:\Windows\SysWOW64\Cdeepf32.exeC:\Windows\system32\Cdeepf32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2788 -
C:\Windows\SysWOW64\Cojimofg.exeC:\Windows\system32\Cojimofg.exe114⤵
- Drops file in System32 directory
- Modifies registry class
PID:1424 -
C:\Windows\SysWOW64\Cgenbadb.exeC:\Windows\system32\Cgenbadb.exe115⤵
- Modifies registry class
PID:1556 -
C:\Windows\SysWOW64\Cakbojch.exeC:\Windows\system32\Cakbojch.exe116⤵
- Drops file in System32 directory
PID:2860 -
C:\Windows\SysWOW64\Cpnbkf32.exeC:\Windows\system32\Cpnbkf32.exe117⤵PID:1724
-
C:\Windows\SysWOW64\Cghkgqbo.exeC:\Windows\system32\Cghkgqbo.exe118⤵PID:2428
-
C:\Windows\SysWOW64\Cifgcl32.exeC:\Windows\system32\Cifgcl32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3060 -
C:\Windows\SysWOW64\Ddlkqe32.exeC:\Windows\system32\Ddlkqe32.exe120⤵
- Drops file in System32 directory
PID:1736 -
C:\Windows\SysWOW64\Demhhmfg.exeC:\Windows\system32\Demhhmfg.exe121⤵PID:2840
-
C:\Windows\SysWOW64\Dpeike32.exeC:\Windows\system32\Dpeike32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-