Analysis
-
max time kernel
243s -
max time network
283s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 08:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.fbe1c35cbeababd68626128ee9942290.exe
Resource
win7-20230831-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.fbe1c35cbeababd68626128ee9942290.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
NEAS.fbe1c35cbeababd68626128ee9942290.exe
-
Size
121KB
-
MD5
fbe1c35cbeababd68626128ee9942290
-
SHA1
ca935b8000a3bc37d8b51f67894eb3e4acf48368
-
SHA256
aea7b6d789a23f5c966992879d2746e80dca4408df3e781539318274ed6920d8
-
SHA512
74cdfa00a764599dfa11799bf575399e6c925cc9f8933cb79310d4bd19c1a1655029b2977eec6e265a902acc333e0b77d66a617a7f69ba913b0b8da354085dc3
-
SSDEEP
1536:Gx9tvleLtssiFUUa35D1otYuQJke93iOklOdCV19zQYOd5ijJnD5ir3oGuiWDD:GDt9ebiFUp5hOik+FmOMO7AJnD5tvv
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eligoe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anepooja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eoefea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cihqdoaa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flfaigpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ekndpa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppjjpoih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmnmih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fbjeao32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gekncjfe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiichkog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Njfnlahb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ledpjdid.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmdehgcf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmhfpmee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hcpbalaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Clnnhq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgbncdmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pjhcphkf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cohaimea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iefenj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfhial32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bqhffj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Njikba32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adhnillo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enmplm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Okcjphdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dcciiope.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Anlkakqa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hqmmja32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhoochcq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdflepqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nqnicl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cohaimea.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnipop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ggnojc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpggnfap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hcbogk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gichng32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbqfbl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjnhlnmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Clbdobpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hbokkagk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Alglin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmhfpmee.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnqafn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Idgmch32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbbacdfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpfblh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmjknb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddchlj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dajkjphd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddnmhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dafchi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Efakhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Anepooja.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onmmad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akafff32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbokkagk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgoikj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcpjea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gkphecpa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egedebgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ajladp32.exe -
Executes dropped EXE 64 IoCs
pid Process 2776 Ledpjdid.exe 2884 Anlkakqa.exe 2744 Bjclfmfe.exe 2980 Bmdehgcf.exe 1980 Bpbadcbj.exe 2792 Bmfamg32.exe 2864 Bbcjfn32.exe 1628 Bgablmfa.exe 2512 Cmkkhfmn.exe 856 Cbhcankf.exe 1620 Clbdobpc.exe 1480 Dpggnfap.exe 1156 Dklkkoqf.exe 2868 Dafchi32.exe 2308 Ddgljced.exe 1988 Dfhial32.exe 432 Dnoqbi32.exe 2340 Eoefea32.exe 1912 Edbonh32.exe 940 Eligoe32.exe 2332 Enjcfm32.exe 1804 Efakhk32.exe 1588 Ekndpa32.exe 2260 Enmplm32.exe 1920 Eqklhh32.exe 388 Egedebgc.exe 2956 Ejcaanfg.exe 744 Eqninhmc.exe 1680 Ekcmkamj.exe 2588 Fipdci32.exe 1152 Fmnmih32.exe 820 Fbjeao32.exe 1572 Feiamj32.exe 2584 Fpnekc32.exe 2468 Gekncjfe.exe 2572 Ghcmedmo.exe 2632 Hpnbjfjj.exe 2520 Hbmnfajm.exe 1736 Hjdfgojp.exe 2984 Hbokkagk.exe 2844 Hiichkog.exe 340 Hoflpbmo.exe 884 Hbcdfq32.exe 2196 Hojeka32.exe 664 Idgmch32.exe 2644 Iomaaa32.exe 1976 Jcfmkcdn.exe 2960 Pnhhpaio.exe 456 Fojnhlch.exe 1456 Imgjfe32.exe 2056 Qlmnfh32.exe 1836 Adjoqjfc.exe 2036 Anbcio32.exe 2412 Admlfida.exe 2356 Akfdcckn.exe 1032 Anepooja.exe 2064 Abqlpn32.exe 904 Agmehd32.exe 1352 Ajladp32.exe 2024 Aqfiqjgb.exe 2180 Acdemegf.exe 2292 Ajnnipnc.exe 2392 Bqhffj32.exe 936 Bgbncdmm.exe -
Loads dropped DLL 64 IoCs
pid Process 2760 NEAS.fbe1c35cbeababd68626128ee9942290.exe 2760 NEAS.fbe1c35cbeababd68626128ee9942290.exe 2776 Ledpjdid.exe 2776 Ledpjdid.exe 2884 Anlkakqa.exe 2884 Anlkakqa.exe 2744 Bjclfmfe.exe 2744 Bjclfmfe.exe 2980 Bmdehgcf.exe 2980 Bmdehgcf.exe 1980 Bpbadcbj.exe 1980 Bpbadcbj.exe 2792 Bmfamg32.exe 2792 Bmfamg32.exe 2864 Bbcjfn32.exe 2864 Bbcjfn32.exe 1628 Bgablmfa.exe 1628 Bgablmfa.exe 2512 Cmkkhfmn.exe 2512 Cmkkhfmn.exe 856 Cbhcankf.exe 856 Cbhcankf.exe 1620 Clbdobpc.exe 1620 Clbdobpc.exe 1480 Dpggnfap.exe 1480 Dpggnfap.exe 1156 Dklkkoqf.exe 1156 Dklkkoqf.exe 2868 Dafchi32.exe 2868 Dafchi32.exe 2308 Ddgljced.exe 2308 Ddgljced.exe 1988 Dfhial32.exe 1988 Dfhial32.exe 432 Dnoqbi32.exe 432 Dnoqbi32.exe 2340 Eoefea32.exe 2340 Eoefea32.exe 1912 Edbonh32.exe 1912 Edbonh32.exe 940 Eligoe32.exe 940 Eligoe32.exe 2332 Enjcfm32.exe 2332 Enjcfm32.exe 1804 Efakhk32.exe 1804 Efakhk32.exe 1588 Ekndpa32.exe 1588 Ekndpa32.exe 2260 Enmplm32.exe 2260 Enmplm32.exe 1920 Eqklhh32.exe 1920 Eqklhh32.exe 388 Egedebgc.exe 388 Egedebgc.exe 2956 Ejcaanfg.exe 2956 Ejcaanfg.exe 744 Eqninhmc.exe 744 Eqninhmc.exe 1680 Ekcmkamj.exe 1680 Ekcmkamj.exe 2588 Fipdci32.exe 2588 Fipdci32.exe 1152 Fmnmih32.exe 1152 Fmnmih32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Cngebd32.exe Cjkiaffj.exe File opened for modification C:\Windows\SysWOW64\Gjjnao32.exe Ggieoddc.exe File created C:\Windows\SysWOW64\Fddfbm32.dll Edbonh32.exe File created C:\Windows\SysWOW64\Enmplm32.exe Ekndpa32.exe File created C:\Windows\SysWOW64\Oeibcnmf.exe Obkegbnb.exe File opened for modification C:\Windows\SysWOW64\Aendldnh.exe Abogpiod.exe File opened for modification C:\Windows\SysWOW64\Cjkiaffj.exe Cfpmqg32.exe File created C:\Windows\SysWOW64\Paejod32.dll Dpggnfap.exe File opened for modification C:\Windows\SysWOW64\Ndgiok32.exe Nlpamn32.exe File opened for modification C:\Windows\SysWOW64\Dbbmaf32.exe Ddnmhb32.exe File created C:\Windows\SysWOW64\Dnifkfoj.dll Cohaimea.exe File opened for modification C:\Windows\SysWOW64\Dhjkai32.exe Enkgkj32.exe File created C:\Windows\SysWOW64\Hkgphkej.dll Fcbfka32.exe File created C:\Windows\SysWOW64\Qoeidfog.dll Bmfamg32.exe File created C:\Windows\SysWOW64\Focpclmi.dll Haafepbn.exe File opened for modification C:\Windows\SysWOW64\Gdiode32.exe Nmjknb32.exe File created C:\Windows\SysWOW64\Kqegbnnl.dll Ndgiok32.exe File opened for modification C:\Windows\SysWOW64\Nocfdhfi.exe Nlejhmge.exe File created C:\Windows\SysWOW64\Lalolkei.dll Ggnojc32.exe File created C:\Windows\SysWOW64\Feiamj32.exe Fbjeao32.exe File opened for modification C:\Windows\SysWOW64\Eopehg32.exe Dajkjphd.exe File created C:\Windows\SysWOW64\Jdbfpq32.dll Nmjknb32.exe File created C:\Windows\SysWOW64\Aibonhfb.dll Obkegbnb.exe File opened for modification C:\Windows\SysWOW64\Dffopi32.exe Dmnkgddc.exe File created C:\Windows\SysWOW64\Dkigme32.exe Dhjkai32.exe File created C:\Windows\SysWOW64\Aiinjbqk.dll Fkdeao32.exe File opened for modification C:\Windows\SysWOW64\Iolmapfa.exe Ilnqed32.exe File opened for modification C:\Windows\SysWOW64\Haafepbn.exe Hncjiecj.exe File created C:\Windows\SysWOW64\Okcjphdc.exe Oeibcnmf.exe File created C:\Windows\SysWOW64\Dcciiope.exe Dbbmaf32.exe File created C:\Windows\SysWOW64\Jfplbaim.dll Dnoqbi32.exe File created C:\Windows\SysWOW64\Efakhk32.exe Enjcfm32.exe File created C:\Windows\SysWOW64\Maedlmdn.dll Hpnbjfjj.exe File opened for modification C:\Windows\SysWOW64\Cgfdmf32.exe Cecnflpd.exe File created C:\Windows\SysWOW64\Dmhfpmee.exe Dbbacdfo.exe File created C:\Windows\SysWOW64\Dikipp32.dll Hgbheblh.exe File created C:\Windows\SysWOW64\Jemciflo.dll Iafpbl32.exe File created C:\Windows\SysWOW64\Imajbl32.exe Ifgaebcl.exe File created C:\Windows\SysWOW64\Defbjb32.dll Dafchi32.exe File created C:\Windows\SysWOW64\Dfhial32.exe Ddgljced.exe File opened for modification C:\Windows\SysWOW64\Eligoe32.exe Edbonh32.exe File created C:\Windows\SysWOW64\Mchldhej.exe Gdiode32.exe File opened for modification C:\Windows\SysWOW64\Ggieoddc.exe Gfhihl32.exe File created C:\Windows\SysWOW64\Bkkeaimb.dll Akafff32.exe File created C:\Windows\SysWOW64\Fnihkp32.dll Abogpiod.exe File opened for modification C:\Windows\SysWOW64\Cfpmqg32.exe Bllednao.exe File opened for modification C:\Windows\SysWOW64\Anlkakqa.exe Ledpjdid.exe File opened for modification C:\Windows\SysWOW64\Edbonh32.exe Eoefea32.exe File created C:\Windows\SysWOW64\Lngblqbj.dll Ejcaanfg.exe File created C:\Windows\SysWOW64\Jmdlpebe.dll Feiamj32.exe File created C:\Windows\SysWOW64\Qgggmq32.dll Pdqhin32.exe File created C:\Windows\SysWOW64\Jlajbl32.dll Clqknppe.exe File opened for modification C:\Windows\SysWOW64\Fpnekc32.exe Feiamj32.exe File created C:\Windows\SysWOW64\Dbbacdfo.exe Clhifj32.exe File opened for modification C:\Windows\SysWOW64\Dpfblh32.exe Dmhfpmee.exe File opened for modification C:\Windows\SysWOW64\Qhoqolhm.exe Qmilachg.exe File opened for modification C:\Windows\SysWOW64\Clqknppe.exe Cfgcaf32.exe File created C:\Windows\SysWOW64\Nhdhboaf.dll Hcpbalaa.exe File opened for modification C:\Windows\SysWOW64\Hjnhlnmo.exe Heaodg32.exe File opened for modification C:\Windows\SysWOW64\Idkbofbe.exe Imajbl32.exe File created C:\Windows\SysWOW64\Dhagaj32.exe Dpfblh32.exe File created C:\Windows\SysWOW64\Iebpakgf.dll Ogeajjnl.exe File created C:\Windows\SysWOW64\Aciiofbg.dll Dfilfiia.exe File opened for modification C:\Windows\SysWOW64\Dngcjp32.exe Dkigme32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2520 1612 WerFault.exe 224 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ghcmedmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ajladp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bgbncdmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dhagaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pdqhin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fcpjea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibbbhe32.dll" Bjclfmfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dklkkoqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gbecce32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oqkimp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aendldnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnifkfoj.dll" Cohaimea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mokfkini.dll" Bqhffj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngebbepl.dll" Dmhfpmee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nmjknb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Njdagbjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ocoodjan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ppjjpoih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hoflpbmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajladp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ddnmhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nocfdhfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qoeidfog.dll" Bmfamg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckifcl32.dll" Anepooja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dhagaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbkoam32.dll" Nqnicl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nghbpfin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Enkgkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmgebnqf.dll" Eihini32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cmkkhfmn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dafchi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dfhial32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmdlpebe.dll" Feiamj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Omdfgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dmnkgddc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bjclfmfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Acdemegf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ingcfq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cohaimea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccdegada.dll" Hifacjpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eligoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qofnnj32.dll" Enmplm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfdanc32.dll" Gekncjfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fojnhlch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbdgok32.dll" Glaejokn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmqbqb32.dll" Njikba32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dfhial32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Enjcfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hblidd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aelkhbii.dll" Cgfdmf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bohejibe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iafpbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Egedebgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnldai32.dll" Ogcddjpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ebpmkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ddchlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nglcbafp.dll" Enjcfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Enmplm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofdqmm32.dll" Hoflpbmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aqfiqjgb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gkkkgkla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ccfjpkkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kppfndoh.dll" Ffnfam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ggnojc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2776 2760 NEAS.fbe1c35cbeababd68626128ee9942290.exe 27 PID 2760 wrote to memory of 2776 2760 NEAS.fbe1c35cbeababd68626128ee9942290.exe 27 PID 2760 wrote to memory of 2776 2760 NEAS.fbe1c35cbeababd68626128ee9942290.exe 27 PID 2760 wrote to memory of 2776 2760 NEAS.fbe1c35cbeababd68626128ee9942290.exe 27 PID 2776 wrote to memory of 2884 2776 Ledpjdid.exe 28 PID 2776 wrote to memory of 2884 2776 Ledpjdid.exe 28 PID 2776 wrote to memory of 2884 2776 Ledpjdid.exe 28 PID 2776 wrote to memory of 2884 2776 Ledpjdid.exe 28 PID 2884 wrote to memory of 2744 2884 Anlkakqa.exe 29 PID 2884 wrote to memory of 2744 2884 Anlkakqa.exe 29 PID 2884 wrote to memory of 2744 2884 Anlkakqa.exe 29 PID 2884 wrote to memory of 2744 2884 Anlkakqa.exe 29 PID 2744 wrote to memory of 2980 2744 Bjclfmfe.exe 30 PID 2744 wrote to memory of 2980 2744 Bjclfmfe.exe 30 PID 2744 wrote to memory of 2980 2744 Bjclfmfe.exe 30 PID 2744 wrote to memory of 2980 2744 Bjclfmfe.exe 30 PID 2980 wrote to memory of 1980 2980 Bmdehgcf.exe 31 PID 2980 wrote to memory of 1980 2980 Bmdehgcf.exe 31 PID 2980 wrote to memory of 1980 2980 Bmdehgcf.exe 31 PID 2980 wrote to memory of 1980 2980 Bmdehgcf.exe 31 PID 1980 wrote to memory of 2792 1980 Bpbadcbj.exe 32 PID 1980 wrote to memory of 2792 1980 Bpbadcbj.exe 32 PID 1980 wrote to memory of 2792 1980 Bpbadcbj.exe 32 PID 1980 wrote to memory of 2792 1980 Bpbadcbj.exe 32 PID 2792 wrote to memory of 2864 2792 Bmfamg32.exe 33 PID 2792 wrote to memory of 2864 2792 Bmfamg32.exe 33 PID 2792 wrote to memory of 2864 2792 Bmfamg32.exe 33 PID 2792 wrote to memory of 2864 2792 Bmfamg32.exe 33 PID 2864 wrote to memory of 1628 2864 Bbcjfn32.exe 34 PID 2864 wrote to memory of 1628 2864 Bbcjfn32.exe 34 PID 2864 wrote to memory of 1628 2864 Bbcjfn32.exe 34 PID 2864 wrote to memory of 1628 2864 Bbcjfn32.exe 34 PID 1628 wrote to memory of 2512 1628 Bgablmfa.exe 35 PID 1628 wrote to memory of 2512 1628 Bgablmfa.exe 35 PID 1628 wrote to memory of 2512 1628 Bgablmfa.exe 35 PID 1628 wrote to memory of 2512 1628 Bgablmfa.exe 35 PID 2512 wrote to memory of 856 2512 Cmkkhfmn.exe 36 PID 2512 wrote to memory of 856 2512 Cmkkhfmn.exe 36 PID 2512 wrote to memory of 856 2512 Cmkkhfmn.exe 36 PID 2512 wrote to memory of 856 2512 Cmkkhfmn.exe 36 PID 856 wrote to memory of 1620 856 Cbhcankf.exe 37 PID 856 wrote to memory of 1620 856 Cbhcankf.exe 37 PID 856 wrote to memory of 1620 856 Cbhcankf.exe 37 PID 856 wrote to memory of 1620 856 Cbhcankf.exe 37 PID 1620 wrote to memory of 1480 1620 Clbdobpc.exe 38 PID 1620 wrote to memory of 1480 1620 Clbdobpc.exe 38 PID 1620 wrote to memory of 1480 1620 Clbdobpc.exe 38 PID 1620 wrote to memory of 1480 1620 Clbdobpc.exe 38 PID 1480 wrote to memory of 1156 1480 Dpggnfap.exe 39 PID 1480 wrote to memory of 1156 1480 Dpggnfap.exe 39 PID 1480 wrote to memory of 1156 1480 Dpggnfap.exe 39 PID 1480 wrote to memory of 1156 1480 Dpggnfap.exe 39 PID 1156 wrote to memory of 2868 1156 Dklkkoqf.exe 40 PID 1156 wrote to memory of 2868 1156 Dklkkoqf.exe 40 PID 1156 wrote to memory of 2868 1156 Dklkkoqf.exe 40 PID 1156 wrote to memory of 2868 1156 Dklkkoqf.exe 40 PID 2868 wrote to memory of 2308 2868 Dafchi32.exe 41 PID 2868 wrote to memory of 2308 2868 Dafchi32.exe 41 PID 2868 wrote to memory of 2308 2868 Dafchi32.exe 41 PID 2868 wrote to memory of 2308 2868 Dafchi32.exe 41 PID 2308 wrote to memory of 1988 2308 Ddgljced.exe 42 PID 2308 wrote to memory of 1988 2308 Ddgljced.exe 42 PID 2308 wrote to memory of 1988 2308 Ddgljced.exe 42 PID 2308 wrote to memory of 1988 2308 Ddgljced.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fbe1c35cbeababd68626128ee9942290.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fbe1c35cbeababd68626128ee9942290.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Ledpjdid.exeC:\Windows\system32\Ledpjdid.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\Anlkakqa.exeC:\Windows\system32\Anlkakqa.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\Bjclfmfe.exeC:\Windows\system32\Bjclfmfe.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Bmdehgcf.exeC:\Windows\system32\Bmdehgcf.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\Bpbadcbj.exeC:\Windows\system32\Bpbadcbj.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\Bmfamg32.exeC:\Windows\system32\Bmfamg32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\Bbcjfn32.exeC:\Windows\system32\Bbcjfn32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Bgablmfa.exeC:\Windows\system32\Bgablmfa.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Cmkkhfmn.exeC:\Windows\system32\Cmkkhfmn.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\Cbhcankf.exeC:\Windows\system32\Cbhcankf.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\Clbdobpc.exeC:\Windows\system32\Clbdobpc.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\Dpggnfap.exeC:\Windows\system32\Dpggnfap.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\Dklkkoqf.exeC:\Windows\system32\Dklkkoqf.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\Dafchi32.exeC:\Windows\system32\Dafchi32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\Ddgljced.exeC:\Windows\system32\Ddgljced.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\Dfhial32.exeC:\Windows\system32\Dfhial32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1988 -
C:\Windows\SysWOW64\Dnoqbi32.exeC:\Windows\system32\Dnoqbi32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:432 -
C:\Windows\SysWOW64\Eoefea32.exeC:\Windows\system32\Eoefea32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2340 -
C:\Windows\SysWOW64\Edbonh32.exeC:\Windows\system32\Edbonh32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1912 -
C:\Windows\SysWOW64\Eligoe32.exeC:\Windows\system32\Eligoe32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:940 -
C:\Windows\SysWOW64\Enjcfm32.exeC:\Windows\system32\Enjcfm32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2332 -
C:\Windows\SysWOW64\Efakhk32.exeC:\Windows\system32\Efakhk32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Windows\SysWOW64\Ekndpa32.exeC:\Windows\system32\Ekndpa32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1588 -
C:\Windows\SysWOW64\Enmplm32.exeC:\Windows\system32\Enmplm32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2260 -
C:\Windows\SysWOW64\Eqklhh32.exeC:\Windows\system32\Eqklhh32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1920
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Egedebgc.exeC:\Windows\system32\Egedebgc.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:388 -
C:\Windows\SysWOW64\Ejcaanfg.exeC:\Windows\system32\Ejcaanfg.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2956 -
C:\Windows\SysWOW64\Eqninhmc.exeC:\Windows\system32\Eqninhmc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:744 -
C:\Windows\SysWOW64\Ekcmkamj.exeC:\Windows\system32\Ekcmkamj.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1680 -
C:\Windows\SysWOW64\Fipdci32.exeC:\Windows\system32\Fipdci32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2588 -
C:\Windows\SysWOW64\Fmnmih32.exeC:\Windows\system32\Fmnmih32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1152 -
C:\Windows\SysWOW64\Fbjeao32.exeC:\Windows\system32\Fbjeao32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:820 -
C:\Windows\SysWOW64\Feiamj32.exeC:\Windows\system32\Feiamj32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1572 -
C:\Windows\SysWOW64\Fpnekc32.exeC:\Windows\system32\Fpnekc32.exe9⤵
- Executes dropped EXE
PID:2584 -
C:\Windows\SysWOW64\Gekncjfe.exeC:\Windows\system32\Gekncjfe.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2468 -
C:\Windows\SysWOW64\Ghcmedmo.exeC:\Windows\system32\Ghcmedmo.exe11⤵
- Executes dropped EXE
- Modifies registry class
PID:2572 -
C:\Windows\SysWOW64\Hpnbjfjj.exeC:\Windows\system32\Hpnbjfjj.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2632 -
C:\Windows\SysWOW64\Hbmnfajm.exeC:\Windows\system32\Hbmnfajm.exe13⤵
- Executes dropped EXE
PID:2520 -
C:\Windows\SysWOW64\Hjdfgojp.exeC:\Windows\system32\Hjdfgojp.exe14⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\SysWOW64\Hbokkagk.exeC:\Windows\system32\Hbokkagk.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\Hiichkog.exeC:\Windows\system32\Hiichkog.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\Hoflpbmo.exeC:\Windows\system32\Hoflpbmo.exe17⤵
- Executes dropped EXE
- Modifies registry class
PID:340 -
C:\Windows\SysWOW64\Hbcdfq32.exeC:\Windows\system32\Hbcdfq32.exe18⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\Hojeka32.exeC:\Windows\system32\Hojeka32.exe19⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\Idgmch32.exeC:\Windows\system32\Idgmch32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:664 -
C:\Windows\SysWOW64\Iomaaa32.exeC:\Windows\system32\Iomaaa32.exe21⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\SysWOW64\Jcfmkcdn.exeC:\Windows\system32\Jcfmkcdn.exe22⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\Pnhhpaio.exeC:\Windows\system32\Pnhhpaio.exe23⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\Fojnhlch.exeC:\Windows\system32\Fojnhlch.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:456 -
C:\Windows\SysWOW64\Imgjfe32.exeC:\Windows\system32\Imgjfe32.exe25⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\Qlmnfh32.exeC:\Windows\system32\Qlmnfh32.exe26⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\Adjoqjfc.exeC:\Windows\system32\Adjoqjfc.exe27⤵
- Executes dropped EXE
PID:1836 -
C:\Windows\SysWOW64\Anbcio32.exeC:\Windows\system32\Anbcio32.exe28⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\Admlfida.exeC:\Windows\system32\Admlfida.exe29⤵
- Executes dropped EXE
PID:2412 -
C:\Windows\SysWOW64\Akfdcckn.exeC:\Windows\system32\Akfdcckn.exe30⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\Anepooja.exeC:\Windows\system32\Anepooja.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1032 -
C:\Windows\SysWOW64\Abqlpn32.exeC:\Windows\system32\Abqlpn32.exe32⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\Agmehd32.exeC:\Windows\system32\Agmehd32.exe33⤵
- Executes dropped EXE
PID:904 -
C:\Windows\SysWOW64\Ajladp32.exeC:\Windows\system32\Ajladp32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1352 -
C:\Windows\SysWOW64\Aqfiqjgb.exeC:\Windows\system32\Aqfiqjgb.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:2024 -
C:\Windows\SysWOW64\Acdemegf.exeC:\Windows\system32\Acdemegf.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\Ajnnipnc.exeC:\Windows\system32\Ajnnipnc.exe37⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\Bqhffj32.exeC:\Windows\system32\Bqhffj32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2392 -
C:\Windows\SysWOW64\Bgbncdmm.exeC:\Windows\system32\Bgbncdmm.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:936 -
C:\Windows\SysWOW64\Bickkl32.exeC:\Windows\system32\Bickkl32.exe40⤵PID:2732
-
C:\Windows\SysWOW64\Bmogkkkd.exeC:\Windows\system32\Bmogkkkd.exe41⤵PID:3052
-
C:\Windows\SysWOW64\Bciohe32.exeC:\Windows\system32\Bciohe32.exe42⤵PID:1584
-
C:\Windows\SysWOW64\Cecnflpd.exeC:\Windows\system32\Cecnflpd.exe43⤵
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\Cgfdmf32.exeC:\Windows\system32\Cgfdmf32.exe44⤵
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\Cihqdoaa.exeC:\Windows\system32\Cihqdoaa.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2172 -
C:\Windows\SysWOW64\Cjgmoahd.exeC:\Windows\system32\Cjgmoahd.exe46⤵PID:2408
-
C:\Windows\SysWOW64\Clhifj32.exeC:\Windows\system32\Clhifj32.exe47⤵
- Drops file in System32 directory
PID:2000 -
C:\Windows\SysWOW64\Dbbacdfo.exeC:\Windows\system32\Dbbacdfo.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\Dmhfpmee.exeC:\Windows\system32\Dmhfpmee.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Dpfblh32.exeC:\Windows\system32\Dpfblh32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:768 -
C:\Windows\SysWOW64\Dhagaj32.exeC:\Windows\system32\Dhagaj32.exe2⤵
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\Dajkjphd.exeC:\Windows\system32\Dajkjphd.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:836 -
C:\Windows\SysWOW64\Eopehg32.exeC:\Windows\system32\Eopehg32.exe4⤵PID:2032
-
C:\Windows\SysWOW64\Foencfda.exeC:\Windows\system32\Foencfda.exe5⤵PID:2228
-
C:\Windows\SysWOW64\Glaejokn.exeC:\Windows\system32\Glaejokn.exe6⤵
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\Gkkkgkla.exeC:\Windows\system32\Gkkkgkla.exe7⤵
- Modifies registry class
PID:2044 -
C:\Windows\SysWOW64\Gbecce32.exeC:\Windows\system32\Gbecce32.exe8⤵
- Modifies registry class
PID:2104 -
C:\Windows\SysWOW64\Gbhpidak.exeC:\Windows\system32\Gbhpidak.exe9⤵PID:1924
-
C:\Windows\SysWOW64\Gdflepqo.exeC:\Windows\system32\Gdflepqo.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2816 -
C:\Windows\SysWOW64\Hnoane32.exeC:\Windows\system32\Hnoane32.exe11⤵PID:2988
-
C:\Windows\SysWOW64\Hqmmja32.exeC:\Windows\system32\Hqmmja32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2740 -
C:\Windows\SysWOW64\Hblidd32.exeC:\Windows\system32\Hblidd32.exe13⤵
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Hncjiecj.exeC:\Windows\system32\Hncjiecj.exe14⤵
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\Haafepbn.exeC:\Windows\system32\Haafepbn.exe15⤵
- Drops file in System32 directory
PID:2580 -
C:\Windows\SysWOW64\Hcpbalaa.exeC:\Windows\system32\Hcpbalaa.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1948 -
C:\Windows\SysWOW64\Hnegod32.exeC:\Windows\system32\Hnegod32.exe17⤵PID:2512
-
C:\Windows\SysWOW64\Hcbogk32.exeC:\Windows\system32\Hcbogk32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:464 -
C:\Windows\SysWOW64\Nmjknb32.exeC:\Windows\system32\Nmjknb32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2976 -
C:\Windows\SysWOW64\Gdiode32.exeC:\Windows\system32\Gdiode32.exe20⤵
- Drops file in System32 directory
PID:620 -
C:\Windows\SysWOW64\Mchldhej.exeC:\Windows\system32\Mchldhej.exe21⤵PID:2920
-
C:\Windows\SysWOW64\Nlpamn32.exeC:\Windows\system32\Nlpamn32.exe22⤵
- Drops file in System32 directory
PID:2068 -
C:\Windows\SysWOW64\Ndgiok32.exeC:\Windows\system32\Ndgiok32.exe23⤵
- Drops file in System32 directory
PID:568 -
C:\Windows\SysWOW64\Njdagbjd.exeC:\Windows\system32\Njdagbjd.exe24⤵
- Modifies registry class
PID:1348 -
C:\Windows\SysWOW64\Nqnicl32.exeC:\Windows\system32\Nqnicl32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\Nghbpfin.exeC:\Windows\system32\Nghbpfin.exe26⤵
- Modifies registry class
PID:2096 -
C:\Windows\SysWOW64\Njfnlahb.exeC:\Windows\system32\Njfnlahb.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1780 -
C:\Windows\SysWOW64\Nlejhmge.exeC:\Windows\system32\Nlejhmge.exe28⤵
- Drops file in System32 directory
PID:1792 -
C:\Windows\SysWOW64\Nocfdhfi.exeC:\Windows\system32\Nocfdhfi.exe29⤵
- Modifies registry class
PID:2112 -
C:\Windows\SysWOW64\Nbacqdem.exeC:\Windows\system32\Nbacqdem.exe30⤵PID:1596
-
C:\Windows\SysWOW64\Njikba32.exeC:\Windows\system32\Njikba32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\Nhlkmnmj.exeC:\Windows\system32\Nhlkmnmj.exe32⤵PID:2268
-
C:\Windows\SysWOW64\Nbdpfc32.exeC:\Windows\system32\Nbdpfc32.exe33⤵PID:2304
-
C:\Windows\SysWOW64\Oddhho32.exeC:\Windows\system32\Oddhho32.exe34⤵PID:816
-
C:\Windows\SysWOW64\Ogcddjpo.exeC:\Windows\system32\Ogcddjpo.exe35⤵
- Modifies registry class
PID:1788 -
C:\Windows\SysWOW64\Onmmad32.exeC:\Windows\system32\Onmmad32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1732 -
C:\Windows\SysWOW64\Oqkimp32.exeC:\Windows\system32\Oqkimp32.exe37⤵
- Modifies registry class
PID:2540 -
C:\Windows\SysWOW64\Ogeajjnl.exeC:\Windows\system32\Ogeajjnl.exe38⤵
- Drops file in System32 directory
PID:2812 -
C:\Windows\SysWOW64\Obkegbnb.exeC:\Windows\system32\Obkegbnb.exe39⤵
- Drops file in System32 directory
PID:2252 -
C:\Windows\SysWOW64\Oeibcnmf.exeC:\Windows\system32\Oeibcnmf.exe40⤵
- Drops file in System32 directory
PID:2620 -
C:\Windows\SysWOW64\Okcjphdc.exeC:\Windows\system32\Okcjphdc.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2488 -
C:\Windows\SysWOW64\Omdfgq32.exeC:\Windows\system32\Omdfgq32.exe42⤵
- Modifies registry class
PID:1604 -
C:\Windows\SysWOW64\Ocoodjan.exeC:\Windows\system32\Ocoodjan.exe43⤵
- Modifies registry class
PID:2784 -
C:\Windows\SysWOW64\Ondcacad.exeC:\Windows\system32\Ondcacad.exe44⤵PID:564
-
C:\Windows\SysWOW64\Oabonopg.exeC:\Windows\system32\Oabonopg.exe45⤵PID:2824
-
C:\Windows\SysWOW64\Pjhcphkf.exeC:\Windows\system32\Pjhcphkf.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1592 -
C:\Windows\SysWOW64\Pdqhin32.exeC:\Windows\system32\Pdqhin32.exe47⤵
- Drops file in System32 directory
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\Qlhpjk32.exeC:\Windows\system32\Qlhpjk32.exe48⤵PID:2984
-
C:\Windows\SysWOW64\Qmilachg.exeC:\Windows\system32\Qmilachg.exe49⤵
- Drops file in System32 directory
PID:664 -
C:\Windows\SysWOW64\Qhoqolhm.exeC:\Windows\system32\Qhoqolhm.exe50⤵PID:2940
-
C:\Windows\SysWOW64\Qmkigb32.exeC:\Windows\system32\Qmkigb32.exe51⤵PID:1192
-
C:\Windows\SysWOW64\Ajoiqg32.exeC:\Windows\system32\Ajoiqg32.exe52⤵PID:2960
-
C:\Windows\SysWOW64\Adhnillo.exeC:\Windows\system32\Adhnillo.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2672 -
C:\Windows\SysWOW64\Akafff32.exeC:\Windows\system32\Akafff32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:432 -
C:\Windows\SysWOW64\Abogpiod.exeC:\Windows\system32\Abogpiod.exe55⤵
- Drops file in System32 directory
PID:3060 -
C:\Windows\SysWOW64\Aendldnh.exeC:\Windows\system32\Aendldnh.exe56⤵
- Modifies registry class
PID:1588 -
C:\Windows\SysWOW64\Alglin32.exeC:\Windows\system32\Alglin32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:388 -
C:\Windows\SysWOW64\Aepqac32.exeC:\Windows\system32\Aepqac32.exe58⤵PID:2336
-
C:\Windows\SysWOW64\Bkmijk32.exeC:\Windows\system32\Bkmijk32.exe59⤵PID:1028
-
C:\Windows\SysWOW64\Bohejibe.exeC:\Windows\system32\Bohejibe.exe60⤵
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\Bllednao.exeC:\Windows\system32\Bllednao.exe61⤵
- Drops file in System32 directory
PID:2080 -
C:\Windows\SysWOW64\Cfpmqg32.exeC:\Windows\system32\Cfpmqg32.exe62⤵
- Drops file in System32 directory
PID:2040 -
C:\Windows\SysWOW64\Cjkiaffj.exeC:\Windows\system32\Cjkiaffj.exe63⤵
- Drops file in System32 directory
PID:1084 -
C:\Windows\SysWOW64\Cngebd32.exeC:\Windows\system32\Cngebd32.exe64⤵PID:1572
-
C:\Windows\SysWOW64\Cohaimea.exeC:\Windows\system32\Cohaimea.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Cgoikj32.exeC:\Windows\system32\Cgoikj32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1356 -
C:\Windows\SysWOW64\Ccfjpkkg.exeC:\Windows\system32\Ccfjpkkg.exe67⤵
- Modifies registry class
PID:2720 -
C:\Windows\SysWOW64\Clnnhq32.exeC:\Windows\system32\Clnnhq32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2744 -
C:\Windows\SysWOW64\Cfgcaf32.exeC:\Windows\system32\Cfgcaf32.exe69⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\Clqknppe.exeC:\Windows\system32\Clqknppe.exe70⤵
- Drops file in System32 directory
PID:3068 -
C:\Windows\SysWOW64\Ddnmhb32.exeC:\Windows\system32\Ddnmhb32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1972 -
C:\Windows\SysWOW64\Dbbmaf32.exeC:\Windows\system32\Dbbmaf32.exe72⤵
- Drops file in System32 directory
PID:2640 -
C:\Windows\SysWOW64\Dcciiope.exeC:\Windows\system32\Dcciiope.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3064 -
C:\Windows\SysWOW64\Dkkajlph.exeC:\Windows\system32\Dkkajlph.exe74⤵PID:2632
-
C:\Windows\SysWOW64\Dgabomfl.exeC:\Windows\system32\Dgabomfl.exe75⤵PID:2196
-
C:\Windows\SysWOW64\Dmnkgddc.exeC:\Windows\system32\Dmnkgddc.exe76⤵
- Drops file in System32 directory
- Modifies registry class
PID:2692 -
C:\Windows\SysWOW64\Dffopi32.exeC:\Windows\system32\Dffopi32.exe77⤵PID:1284
-
C:\Windows\SysWOW64\Dqlcnb32.exeC:\Windows\system32\Dqlcnb32.exe78⤵PID:2028
-
C:\Windows\SysWOW64\Dfilfiia.exeC:\Windows\system32\Dfilfiia.exe79⤵
- Drops file in System32 directory
PID:456 -
C:\Windows\SysWOW64\Ebpmkj32.exeC:\Windows\system32\Ebpmkj32.exe80⤵
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Enkgkj32.exeC:\Windows\system32\Enkgkj32.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:2060 -
C:\Windows\SysWOW64\Dhjkai32.exeC:\Windows\system32\Dhjkai32.exe82⤵
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\Dkigme32.exeC:\Windows\system32\Dkigme32.exe83⤵
- Drops file in System32 directory
PID:2156 -
C:\Windows\SysWOW64\Dngcjp32.exeC:\Windows\system32\Dngcjp32.exe84⤵PID:2356
-
C:\Windows\SysWOW64\Dnipop32.exeC:\Windows\system32\Dnipop32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2024 -
C:\Windows\SysWOW64\Ddchlj32.exeC:\Windows\system32\Ddchlj32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2496 -
C:\Windows\SysWOW64\Ppjjpoih.exeC:\Windows\system32\Ppjjpoih.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2472 -
C:\Windows\SysWOW64\Eihini32.exeC:\Windows\system32\Eihini32.exe88⤵
- Modifies registry class
PID:2856 -
C:\Windows\SysWOW64\Fkdeao32.exeC:\Windows\system32\Fkdeao32.exe89⤵
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\Flfaigpo.exeC:\Windows\system32\Flfaigpo.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2396 -
C:\Windows\SysWOW64\Fcpjea32.exeC:\Windows\system32\Fcpjea32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\Ffnfam32.exeC:\Windows\system32\Ffnfam32.exe92⤵
- Modifies registry class
PID:884 -
C:\Windows\SysWOW64\Fmhnngnl.exeC:\Windows\system32\Fmhnngnl.exe93⤵PID:3016
-
C:\Windows\SysWOW64\Fqdjof32.exeC:\Windows\system32\Fqdjof32.exe94⤵PID:2000
-
C:\Windows\SysWOW64\Fcbfka32.exeC:\Windows\system32\Fcbfka32.exe95⤵
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\Fhoochcq.exeC:\Windows\system32\Fhoochcq.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2012 -
C:\Windows\SysWOW64\Gialihan.exeC:\Windows\system32\Gialihan.exe97⤵PID:1932
-
C:\Windows\SysWOW64\Gkphecpa.exeC:\Windows\system32\Gkphecpa.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2688 -
C:\Windows\SysWOW64\Gfelblph.exeC:\Windows\system32\Gfelblph.exe99⤵PID:1716
-
C:\Windows\SysWOW64\Gichng32.exeC:\Windows\system32\Gichng32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2260 -
C:\Windows\SysWOW64\Gnqafn32.exeC:\Windows\system32\Gnqafn32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2208 -
C:\Windows\SysWOW64\Gfhihl32.exeC:\Windows\system32\Gfhihl32.exe102⤵
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Ggieoddc.exeC:\Windows\system32\Ggieoddc.exe103⤵
- Drops file in System32 directory
PID:2880 -
C:\Windows\SysWOW64\Gjjnao32.exeC:\Windows\system32\Gjjnao32.exe104⤵PID:1064
-
C:\Windows\SysWOW64\Gbqfbl32.exeC:\Windows\system32\Gbqfbl32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1528 -
C:\Windows\SysWOW64\Ggnojc32.exeC:\Windows\system32\Ggnojc32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:556 -
C:\Windows\SysWOW64\Heaodg32.exeC:\Windows\system32\Heaodg32.exe107⤵
- Drops file in System32 directory
PID:608 -
C:\Windows\SysWOW64\Hjnhlnmo.exeC:\Windows\system32\Hjnhlnmo.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1412 -
C:\Windows\SysWOW64\Hgbheblh.exeC:\Windows\system32\Hgbheblh.exe109⤵
- Drops file in System32 directory
PID:2068 -
C:\Windows\SysWOW64\Hakmnh32.exeC:\Windows\system32\Hakmnh32.exe110⤵PID:888
-
C:\Windows\SysWOW64\Hfgego32.exeC:\Windows\system32\Hfgego32.exe111⤵PID:1052
-
C:\Windows\SysWOW64\Hifacjpd.exeC:\Windows\system32\Hifacjpd.exe112⤵
- Modifies registry class
PID:2588 -
C:\Windows\SysWOW64\Hckepcoj.exeC:\Windows\system32\Hckepcoj.exe113⤵PID:1788
-
C:\Windows\SysWOW64\Hmdjii32.exeC:\Windows\system32\Hmdjii32.exe114⤵PID:2252
-
C:\Windows\SysWOW64\Ingcfq32.exeC:\Windows\system32\Ingcfq32.exe115⤵
- Modifies registry class
PID:1604 -
C:\Windows\SysWOW64\Iafpbl32.exeC:\Windows\system32\Iafpbl32.exe116⤵
- Drops file in System32 directory
- Modifies registry class
PID:1892 -
C:\Windows\SysWOW64\Ibellopm.exeC:\Windows\system32\Ibellopm.exe117⤵PID:1852
-
C:\Windows\SysWOW64\Iahlhl32.exeC:\Windows\system32\Iahlhl32.exe118⤵PID:2132
-
C:\Windows\SysWOW64\Ilnqed32.exeC:\Windows\system32\Ilnqed32.exe119⤵
- Drops file in System32 directory
PID:2320 -
C:\Windows\SysWOW64\Iolmapfa.exeC:\Windows\system32\Iolmapfa.exe120⤵PID:1028
-
C:\Windows\SysWOW64\Iefenj32.exeC:\Windows\system32\Iefenj32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2148 -
C:\Windows\SysWOW64\Ifgaebcl.exeC:\Windows\system32\Ifgaebcl.exe122⤵
- Drops file in System32 directory
PID:2544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-