Analysis
-
max time kernel
131s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 11:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.bc5d3b08a820c77b89530b793c44bde0_JC.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.bc5d3b08a820c77b89530b793c44bde0_JC.exe
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
NEAS.bc5d3b08a820c77b89530b793c44bde0_JC.exe
-
Size
315KB
-
MD5
bc5d3b08a820c77b89530b793c44bde0
-
SHA1
f6870917dec839198197b0b26bba3fa5e80bad6a
-
SHA256
0d77bc9304de65fa0f9aaa0da28b13248d5b9c87f3662320fa667b198e6771af
-
SHA512
0e275b141c1a29794bcfce87bebf145634fe7612728290c76779ae8c2a62d5b3799b1f1c281e29a76e504a7b18cf0705ce3aad71f95e6b674a034a41875a1713
-
SSDEEP
3072:Xadg5uHXE4tq749+f4auvZ7LC4ZR4mqmnKBstqBiPXPAPePdfVQ:6U4tqI+stesMmG
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfkenogb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qemoff32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbfjljhf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpnoigpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcepem32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbgdef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfbebpdq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Okbhgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pknghk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbjlbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Philfgdh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhdlbp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nabpiocm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kaflio32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oiakpheo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhfcbfdl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnnjgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpnoigpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ompmie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oeloebcb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pacojc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijnqld32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oloaamqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddkpoelb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bodfkpfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bciebm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcbdph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idbonc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Meepne32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbpmbipk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djjobedk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jahgpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggpbcaei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bflagg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iphihnjk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlcchn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnmqegle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbibeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnjjpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkdcffci.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbnhjn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gonnhf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glbjpmdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdclbopg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oakbonkb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpljdjnd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odkaac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmglmpkn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kijcanhl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deliaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebagdddp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Endnohdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bpkllo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpaqkgba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neqoidmo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjabgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gajibq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niadfpcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hingefqa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhpjbgne.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olcbfp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdaajkfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmeagjbo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbnobf32.exe -
Executes dropped EXE 64 IoCs
pid Process 2376 Philfgdh.exe 3672 Agaoca32.exe 2780 Bghddp32.exe 3196 Belemd32.exe 4036 Bflagg32.exe 1164 Bngfli32.exe 1384 Biljib32.exe 1248 Cfbhhfbg.exe 1028 Clbmfm32.exe 228 Cfjnhe32.exe 3096 Deagoa32.exe 3948 Dfemdcba.exe 3296 Ebagdddp.exe 4148 Fibfbm32.exe 2744 Hjbhph32.exe 3076 Igieoleg.exe 4056 Imfmgcdn.exe 4988 Icdoolge.exe 3716 Jmamba32.exe 3268 Jfokff32.exe 1152 Kaflio32.exe 3608 Kcgekjgp.exe 1484 Kppbejka.exe 2096 Mmpbkm32.exe 496 Mfkcibdl.exe 4048 Nfaijand.exe 4304 Ohobebig.exe 3180 Pknghk32.exe 5060 Qjcdih32.exe 768 Qkcackeb.exe 1276 Adkelplc.exe 2336 Ahkkhnpg.exe 1724 Agcdnjcl.exe 4180 Bqpbboeg.exe 1884 Biigildg.exe 232 Bqdlmo32.exe 244 Bkjpkg32.exe 1880 Cjaiac32.exe 928 Canocm32.exe 4572 Cnboma32.exe 3364 Dbphcpog.exe 2272 Dgmpkg32.exe 3388 Decmjjie.exe 528 Eliecc32.exe 4644 Fajgfiag.exe 4356 Falcli32.exe 5116 Flgadake.exe 2968 Gahcgg32.exe 1636 Hleneo32.exe 1756 Hohcmjic.exe 2092 Hkaqgjme.exe 5068 Ijdnka32.exe 3212 Ioafchai.exe 5084 Iabodcnj.exe 3176 Ihlgan32.exe 2804 Icakofel.exe 2044 Jcknee32.exe 264 Lmfhjhdm.exe 4992 Npgjbabk.exe 1584 Oiphbd32.exe 5092 Pcaoahio.exe 1732 Pgphggpe.exe 2884 Qlajkm32.exe 3128 Anqfepaj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Adoamfhn.exe Ameipl32.exe File created C:\Windows\SysWOW64\Oiohgjga.dll Hkaqgjme.exe File created C:\Windows\SysWOW64\Bhgnka32.dll Iabodcnj.exe File opened for modification C:\Windows\SysWOW64\Lkqliaki.exe Lqkgli32.exe File created C:\Windows\SysWOW64\Faadgoom.dll Pkigmiai.exe File created C:\Windows\SysWOW64\Bhgfodak.dll Pmkfjn32.exe File opened for modification C:\Windows\SysWOW64\Fdmfcn32.exe Fnmqegle.exe File opened for modification C:\Windows\SysWOW64\Bidqddgp.exe Bfedhihl.exe File created C:\Windows\SysWOW64\Hhlpkkmk.dll Pchljlpo.exe File created C:\Windows\SysWOW64\Lmeapbpa.exe Lbpmbipk.exe File created C:\Windows\SysWOW64\Jdcplkoe.exe Iapjeq32.exe File opened for modification C:\Windows\SysWOW64\Kikafjoc.exe Kdnincal.exe File created C:\Windows\SysWOW64\Dncehk32.exe Ddkpoelb.exe File created C:\Windows\SysWOW64\Fcedap32.dll Bajjeo32.exe File created C:\Windows\SysWOW64\Knmaomdp.dll Pacojc32.exe File opened for modification C:\Windows\SysWOW64\Pfmdbd32.exe Omdpio32.exe File created C:\Windows\SysWOW64\Bgkijp32.exe Bopefnnf.exe File created C:\Windows\SysWOW64\Pgbijg32.exe Pnjeqbkb.exe File created C:\Windows\SysWOW64\Nijeoikf.exe Nkieab32.exe File created C:\Windows\SysWOW64\Hkpigk32.dll Ioafchai.exe File created C:\Windows\SysWOW64\Ncecfm32.dll Jkdcffci.exe File created C:\Windows\SysWOW64\Chepehne.exe Cakghn32.exe File created C:\Windows\SysWOW64\Hoglmg32.exe Gmfpeoga.exe File opened for modification C:\Windows\SysWOW64\Bnbeggmi.exe Aemqdk32.exe File opened for modification C:\Windows\SysWOW64\Iphihnjk.exe Ijnqld32.exe File created C:\Windows\SysWOW64\Clnhlfmc.dll Knfeoobh.exe File created C:\Windows\SysWOW64\Cfbhhfbg.exe Biljib32.exe File created C:\Windows\SysWOW64\Hoocbakd.dll Kbfjljhf.exe File created C:\Windows\SysWOW64\Jgcanm32.dll Ffclml32.exe File created C:\Windows\SysWOW64\Ahpnbdnc.dll Gpeclq32.exe File created C:\Windows\SysWOW64\Glndff32.dll Hojibgkm.exe File created C:\Windows\SysWOW64\Oajoaj32.exe Ogajid32.exe File created C:\Windows\SysWOW64\Fqfeag32.exe Ffpadn32.exe File created C:\Windows\SysWOW64\Eaoimpil.dll Cjaiac32.exe File created C:\Windows\SysWOW64\Iabodcnj.exe Ioafchai.exe File opened for modification C:\Windows\SysWOW64\Deiblamk.exe Cpljdjnd.exe File opened for modification C:\Windows\SysWOW64\Daqbbe32.exe Dhhnipbe.exe File created C:\Windows\SysWOW64\Fdimglke.dll Pojccmii.exe File opened for modification C:\Windows\SysWOW64\Adanbffk.exe Aodejohd.exe File opened for modification C:\Windows\SysWOW64\Nnlqig32.exe Mnbnchlb.exe File created C:\Windows\SysWOW64\Ffahnd32.exe Emhdeoel.exe File opened for modification C:\Windows\SysWOW64\Qaegcb32.exe Pjkofh32.exe File opened for modification C:\Windows\SysWOW64\Chbcphph.exe Bahkcn32.exe File opened for modification C:\Windows\SysWOW64\Imfill32.exe Igmqpbab.exe File created C:\Windows\SysWOW64\Gpaqkgba.exe Gkdhcqcj.exe File created C:\Windows\SysWOW64\Jncfmgfi.exe Iqklhd32.exe File created C:\Windows\SysWOW64\Onimmoeg.dll Imfmgcdn.exe File created C:\Windows\SysWOW64\Lmfhjhdm.exe Jcknee32.exe File created C:\Windows\SysWOW64\Dfphmp32.exe Deiblamk.exe File created C:\Windows\SysWOW64\Ppagmd32.dll Lbinkb32.exe File created C:\Windows\SysWOW64\Gjkadiif.dll Pmoijcje.exe File created C:\Windows\SysWOW64\Acemjd32.dll Endnohdp.exe File opened for modification C:\Windows\SysWOW64\Dfhjefhf.exe Bciebm32.exe File opened for modification C:\Windows\SysWOW64\Omldnfkj.exe Nljgfn32.exe File created C:\Windows\SysWOW64\Qalkfl32.exe Pffghc32.exe File opened for modification C:\Windows\SysWOW64\Baldmiom.exe Akblpo32.exe File created C:\Windows\SysWOW64\Fnjmea32.exe Ffahnd32.exe File opened for modification C:\Windows\SysWOW64\Koggehff.exe Khmoionj.exe File created C:\Windows\SysWOW64\Alpgcg32.dll Olcbfp32.exe File created C:\Windows\SysWOW64\Fkopgn32.exe Eleikb32.exe File created C:\Windows\SysWOW64\Jlpefa32.dll Plkpmlfi.exe File created C:\Windows\SysWOW64\Pcagjndj.exe Odkaac32.exe File created C:\Windows\SysWOW64\Hmhmko32.exe Headjael.exe File opened for modification C:\Windows\SysWOW64\Igmqpbab.exe Ipbhch32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1972 5976 WerFault.exe 708 5544 5976 WerFault.exe 708 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knenffqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbjlbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iphihnjk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmjqjqao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcmdjgqg.dll" Hkkhjj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lclpmdhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dqhpjohb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bgkijp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qcepem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omjmli32.dll" Pehekgmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jqhaolli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnbeggmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enlbbj32.dll" Djhpqdlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgenlldo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgalfa32.dll" Jlhlcnge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfgpblda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icakofel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fhbpqb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hiajeoip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ialhdh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbjmih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npgalidl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Plmmbkdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncldajki.dll" Gldgflba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Plkpmlfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chepehne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Epkpdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkjlcell.dll" Hlnjlkjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qjcdih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Falcli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gajibq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgpmffeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifqikhho.dll" Pnlafaio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iaicpdqi.dll" Npgalidl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lqfgfclm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijdnka32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eciilj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iophnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibojgikg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khknaa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpnnek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ighnpeig.dll" Dmglmpkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Efqigigj.dll" Clbmfm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djjemlhf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfglpjqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cihhpm32.dll" Anaofa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fneohd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oifekg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lqfnqjpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmhckmlc.dll" Nmpdbh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgmlde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Olmdln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmnpoa32.dll" Gmdcpoid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qfkqcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omeocm32.dll" Iojbid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iemdkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Licmbccm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjbjci32.dll" Ojdnbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iohjle32.dll" Ekhncp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gldgflba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hehkjpod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccldebeo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnlqig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpmlhoil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 2376 4556 NEAS.bc5d3b08a820c77b89530b793c44bde0_JC.exe 88 PID 4556 wrote to memory of 2376 4556 NEAS.bc5d3b08a820c77b89530b793c44bde0_JC.exe 88 PID 4556 wrote to memory of 2376 4556 NEAS.bc5d3b08a820c77b89530b793c44bde0_JC.exe 88 PID 2376 wrote to memory of 3672 2376 Philfgdh.exe 89 PID 2376 wrote to memory of 3672 2376 Philfgdh.exe 89 PID 2376 wrote to memory of 3672 2376 Philfgdh.exe 89 PID 3672 wrote to memory of 2780 3672 Agaoca32.exe 90 PID 3672 wrote to memory of 2780 3672 Agaoca32.exe 90 PID 3672 wrote to memory of 2780 3672 Agaoca32.exe 90 PID 2780 wrote to memory of 3196 2780 Bghddp32.exe 93 PID 2780 wrote to memory of 3196 2780 Bghddp32.exe 93 PID 2780 wrote to memory of 3196 2780 Bghddp32.exe 93 PID 3196 wrote to memory of 4036 3196 Belemd32.exe 91 PID 3196 wrote to memory of 4036 3196 Belemd32.exe 91 PID 3196 wrote to memory of 4036 3196 Belemd32.exe 91 PID 4036 wrote to memory of 1164 4036 Bflagg32.exe 92 PID 4036 wrote to memory of 1164 4036 Bflagg32.exe 92 PID 4036 wrote to memory of 1164 4036 Bflagg32.exe 92 PID 1164 wrote to memory of 1384 1164 Bngfli32.exe 94 PID 1164 wrote to memory of 1384 1164 Bngfli32.exe 94 PID 1164 wrote to memory of 1384 1164 Bngfli32.exe 94 PID 1384 wrote to memory of 1248 1384 Biljib32.exe 95 PID 1384 wrote to memory of 1248 1384 Biljib32.exe 95 PID 1384 wrote to memory of 1248 1384 Biljib32.exe 95 PID 1248 wrote to memory of 1028 1248 Cfbhhfbg.exe 96 PID 1248 wrote to memory of 1028 1248 Cfbhhfbg.exe 96 PID 1248 wrote to memory of 1028 1248 Cfbhhfbg.exe 96 PID 1028 wrote to memory of 228 1028 Clbmfm32.exe 97 PID 1028 wrote to memory of 228 1028 Clbmfm32.exe 97 PID 1028 wrote to memory of 228 1028 Clbmfm32.exe 97 PID 228 wrote to memory of 3096 228 Cfjnhe32.exe 98 PID 228 wrote to memory of 3096 228 Cfjnhe32.exe 98 PID 228 wrote to memory of 3096 228 Cfjnhe32.exe 98 PID 3096 wrote to memory of 3948 3096 Deagoa32.exe 99 PID 3096 wrote to memory of 3948 3096 Deagoa32.exe 99 PID 3096 wrote to memory of 3948 3096 Deagoa32.exe 99 PID 3948 wrote to memory of 3296 3948 Dfemdcba.exe 100 PID 3948 wrote to memory of 3296 3948 Dfemdcba.exe 100 PID 3948 wrote to memory of 3296 3948 Dfemdcba.exe 100 PID 3296 wrote to memory of 4148 3296 Ebagdddp.exe 103 PID 3296 wrote to memory of 4148 3296 Ebagdddp.exe 103 PID 3296 wrote to memory of 4148 3296 Ebagdddp.exe 103 PID 4148 wrote to memory of 2744 4148 Fibfbm32.exe 104 PID 4148 wrote to memory of 2744 4148 Fibfbm32.exe 104 PID 4148 wrote to memory of 2744 4148 Fibfbm32.exe 104 PID 2744 wrote to memory of 3076 2744 Hjbhph32.exe 105 PID 2744 wrote to memory of 3076 2744 Hjbhph32.exe 105 PID 2744 wrote to memory of 3076 2744 Hjbhph32.exe 105 PID 3076 wrote to memory of 4056 3076 Igieoleg.exe 106 PID 3076 wrote to memory of 4056 3076 Igieoleg.exe 106 PID 3076 wrote to memory of 4056 3076 Igieoleg.exe 106 PID 4056 wrote to memory of 4988 4056 Imfmgcdn.exe 107 PID 4056 wrote to memory of 4988 4056 Imfmgcdn.exe 107 PID 4056 wrote to memory of 4988 4056 Imfmgcdn.exe 107 PID 4988 wrote to memory of 3716 4988 Icdoolge.exe 108 PID 4988 wrote to memory of 3716 4988 Icdoolge.exe 108 PID 4988 wrote to memory of 3716 4988 Icdoolge.exe 108 PID 3716 wrote to memory of 3268 3716 Jmamba32.exe 109 PID 3716 wrote to memory of 3268 3716 Jmamba32.exe 109 PID 3716 wrote to memory of 3268 3716 Jmamba32.exe 109 PID 3268 wrote to memory of 1152 3268 Jfokff32.exe 110 PID 3268 wrote to memory of 1152 3268 Jfokff32.exe 110 PID 3268 wrote to memory of 1152 3268 Jfokff32.exe 110 PID 1152 wrote to memory of 3608 1152 Kaflio32.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.bc5d3b08a820c77b89530b793c44bde0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.bc5d3b08a820c77b89530b793c44bde0_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\Philfgdh.exeC:\Windows\system32\Philfgdh.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Agaoca32.exeC:\Windows\system32\Agaoca32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\Bghddp32.exeC:\Windows\system32\Bghddp32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Belemd32.exeC:\Windows\system32\Belemd32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3196
-
-
-
-
-
C:\Windows\SysWOW64\Bflagg32.exeC:\Windows\system32\Bflagg32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\Bngfli32.exeC:\Windows\system32\Bngfli32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\Biljib32.exeC:\Windows\system32\Biljib32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\Cfbhhfbg.exeC:\Windows\system32\Cfbhhfbg.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\Clbmfm32.exeC:\Windows\system32\Clbmfm32.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\Cfjnhe32.exeC:\Windows\system32\Cfjnhe32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\Deagoa32.exeC:\Windows\system32\Deagoa32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\Dfemdcba.exeC:\Windows\system32\Dfemdcba.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\Ebagdddp.exeC:\Windows\system32\Ebagdddp.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\Fibfbm32.exeC:\Windows\system32\Fibfbm32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\Hjbhph32.exeC:\Windows\system32\Hjbhph32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Igieoleg.exeC:\Windows\system32\Igieoleg.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\Imfmgcdn.exeC:\Windows\system32\Imfmgcdn.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\Icdoolge.exeC:\Windows\system32\Icdoolge.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\Jmamba32.exeC:\Windows\system32\Jmamba32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\Jfokff32.exeC:\Windows\system32\Jfokff32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\Kaflio32.exeC:\Windows\system32\Kaflio32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\Kcgekjgp.exeC:\Windows\system32\Kcgekjgp.exe18⤵
- Executes dropped EXE
PID:3608 -
C:\Windows\SysWOW64\Kppbejka.exeC:\Windows\system32\Kppbejka.exe19⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\Mmpbkm32.exeC:\Windows\system32\Mmpbkm32.exe20⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\SysWOW64\Mfkcibdl.exeC:\Windows\system32\Mfkcibdl.exe21⤵
- Executes dropped EXE
PID:496 -
C:\Windows\SysWOW64\Nfaijand.exeC:\Windows\system32\Nfaijand.exe22⤵
- Executes dropped EXE
PID:4048 -
C:\Windows\SysWOW64\Ohobebig.exeC:\Windows\system32\Ohobebig.exe23⤵
- Executes dropped EXE
PID:4304 -
C:\Windows\SysWOW64\Pknghk32.exeC:\Windows\system32\Pknghk32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3180 -
C:\Windows\SysWOW64\Qjcdih32.exeC:\Windows\system32\Qjcdih32.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:5060 -
C:\Windows\SysWOW64\Qkcackeb.exeC:\Windows\system32\Qkcackeb.exe26⤵
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\Adkelplc.exeC:\Windows\system32\Adkelplc.exe27⤵
- Executes dropped EXE
PID:1276 -
C:\Windows\SysWOW64\Ahkkhnpg.exeC:\Windows\system32\Ahkkhnpg.exe28⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\Agcdnjcl.exeC:\Windows\system32\Agcdnjcl.exe29⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\Bqpbboeg.exeC:\Windows\system32\Bqpbboeg.exe30⤵
- Executes dropped EXE
PID:4180 -
C:\Windows\SysWOW64\Biigildg.exeC:\Windows\system32\Biigildg.exe31⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\Bqdlmo32.exeC:\Windows\system32\Bqdlmo32.exe32⤵
- Executes dropped EXE
PID:232 -
C:\Windows\SysWOW64\Bkjpkg32.exeC:\Windows\system32\Bkjpkg32.exe33⤵
- Executes dropped EXE
PID:244 -
C:\Windows\SysWOW64\Cjaiac32.exeC:\Windows\system32\Cjaiac32.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1880 -
C:\Windows\SysWOW64\Canocm32.exeC:\Windows\system32\Canocm32.exe35⤵
- Executes dropped EXE
PID:928 -
C:\Windows\SysWOW64\Cnboma32.exeC:\Windows\system32\Cnboma32.exe36⤵
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\Dbphcpog.exeC:\Windows\system32\Dbphcpog.exe37⤵
- Executes dropped EXE
PID:3364 -
C:\Windows\SysWOW64\Dgmpkg32.exeC:\Windows\system32\Dgmpkg32.exe38⤵
- Executes dropped EXE
PID:2272 -
C:\Windows\SysWOW64\Decmjjie.exeC:\Windows\system32\Decmjjie.exe39⤵
- Executes dropped EXE
PID:3388 -
C:\Windows\SysWOW64\Eliecc32.exeC:\Windows\system32\Eliecc32.exe40⤵
- Executes dropped EXE
PID:528 -
C:\Windows\SysWOW64\Fajgfiag.exeC:\Windows\system32\Fajgfiag.exe41⤵
- Executes dropped EXE
PID:4644 -
C:\Windows\SysWOW64\Falcli32.exeC:\Windows\system32\Falcli32.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:4356 -
C:\Windows\SysWOW64\Flgadake.exeC:\Windows\system32\Flgadake.exe43⤵
- Executes dropped EXE
PID:5116 -
C:\Windows\SysWOW64\Gahcgg32.exeC:\Windows\system32\Gahcgg32.exe44⤵
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\Hleneo32.exeC:\Windows\system32\Hleneo32.exe45⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\Hohcmjic.exeC:\Windows\system32\Hohcmjic.exe46⤵
- Executes dropped EXE
PID:1756 -
C:\Windows\SysWOW64\Hkaqgjme.exeC:\Windows\system32\Hkaqgjme.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2092 -
C:\Windows\SysWOW64\Ijdnka32.exeC:\Windows\system32\Ijdnka32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:5068 -
C:\Windows\SysWOW64\Ioafchai.exeC:\Windows\system32\Ioafchai.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3212 -
C:\Windows\SysWOW64\Iabodcnj.exeC:\Windows\system32\Iabodcnj.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5084 -
C:\Windows\SysWOW64\Ihlgan32.exeC:\Windows\system32\Ihlgan32.exe51⤵
- Executes dropped EXE
PID:3176 -
C:\Windows\SysWOW64\Icakofel.exeC:\Windows\system32\Icakofel.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\Jcknee32.exeC:\Windows\system32\Jcknee32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\Lmfhjhdm.exeC:\Windows\system32\Lmfhjhdm.exe54⤵
- Executes dropped EXE
PID:264 -
C:\Windows\SysWOW64\Npgjbabk.exeC:\Windows\system32\Npgjbabk.exe55⤵
- Executes dropped EXE
PID:4992 -
C:\Windows\SysWOW64\Oiphbd32.exeC:\Windows\system32\Oiphbd32.exe56⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\Pcaoahio.exeC:\Windows\system32\Pcaoahio.exe57⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\Pgphggpe.exeC:\Windows\system32\Pgphggpe.exe58⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\Qlajkm32.exeC:\Windows\system32\Qlajkm32.exe59⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\SysWOW64\Anqfepaj.exeC:\Windows\system32\Anqfepaj.exe60⤵
- Executes dropped EXE
PID:3128 -
C:\Windows\SysWOW64\Bcngddao.exeC:\Windows\system32\Bcngddao.exe61⤵PID:4740
-
C:\Windows\SysWOW64\Cjabgm32.exeC:\Windows\system32\Cjabgm32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4432 -
C:\Windows\SysWOW64\Ckqoapgd.exeC:\Windows\system32\Ckqoapgd.exe63⤵PID:388
-
C:\Windows\SysWOW64\Ccldebeo.exeC:\Windows\system32\Ccldebeo.exe64⤵
- Modifies registry class
PID:3544 -
C:\Windows\SysWOW64\Cnahbk32.exeC:\Windows\system32\Cnahbk32.exe65⤵PID:4612
-
C:\Windows\SysWOW64\Ddkpoelb.exeC:\Windows\system32\Ddkpoelb.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2836 -
C:\Windows\SysWOW64\Dncehk32.exeC:\Windows\system32\Dncehk32.exe67⤵PID:1972
-
C:\Windows\SysWOW64\Ddnmeejo.exeC:\Windows\system32\Ddnmeejo.exe68⤵PID:4720
-
C:\Windows\SysWOW64\Djjemlhf.exeC:\Windows\system32\Djjemlhf.exe69⤵
- Modifies registry class
PID:4416 -
C:\Windows\SysWOW64\Dqdnjfpc.exeC:\Windows\system32\Dqdnjfpc.exe70⤵PID:1336
-
C:\Windows\SysWOW64\Dkokbn32.exeC:\Windows\system32\Dkokbn32.exe71⤵PID:4472
-
C:\Windows\SysWOW64\Enaaiifb.exeC:\Windows\system32\Enaaiifb.exe72⤵PID:1200
-
C:\Windows\SysWOW64\Ecoiapdj.exeC:\Windows\system32\Ecoiapdj.exe73⤵PID:4600
-
C:\Windows\SysWOW64\Endnohdp.exeC:\Windows\system32\Endnohdp.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4880 -
C:\Windows\SysWOW64\Fhchhm32.exeC:\Windows\system32\Fhchhm32.exe75⤵PID:4580
-
C:\Windows\SysWOW64\Fnmqegle.exeC:\Windows\system32\Fnmqegle.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\Fdmfcn32.exeC:\Windows\system32\Fdmfcn32.exe77⤵PID:4272
-
C:\Windows\SysWOW64\Genobp32.exeC:\Windows\system32\Genobp32.exe78⤵PID:3428
-
C:\Windows\SysWOW64\Gjkgkg32.exeC:\Windows\system32\Gjkgkg32.exe79⤵PID:1864
-
C:\Windows\SysWOW64\Gdclcmba.exeC:\Windows\system32\Gdclcmba.exe80⤵PID:1160
-
C:\Windows\SysWOW64\Gajibq32.exeC:\Windows\system32\Gajibq32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3368 -
C:\Windows\SysWOW64\Hmcfma32.exeC:\Windows\system32\Hmcfma32.exe82⤵PID:4596
-
C:\Windows\SysWOW64\Haaocp32.exeC:\Windows\system32\Haaocp32.exe83⤵PID:4832
-
C:\Windows\SysWOW64\Hhmdeink.exeC:\Windows\system32\Hhmdeink.exe84⤵PID:4328
-
C:\Windows\SysWOW64\Haeino32.exeC:\Windows\system32\Haeino32.exe85⤵PID:3704
-
C:\Windows\SysWOW64\Hhpaki32.exeC:\Windows\system32\Hhpaki32.exe86⤵PID:1324
-
C:\Windows\SysWOW64\Ikechced.exeC:\Windows\system32\Ikechced.exe87⤵PID:1092
-
C:\Windows\SysWOW64\Ihicah32.exeC:\Windows\system32\Ihicah32.exe88⤵PID:4332
-
C:\Windows\SysWOW64\Iemdkl32.exeC:\Windows\system32\Iemdkl32.exe89⤵
- Modifies registry class
PID:1260 -
C:\Windows\SysWOW64\Jogeia32.exeC:\Windows\system32\Jogeia32.exe90⤵PID:368
-
C:\Windows\SysWOW64\Jhpjbgne.exeC:\Windows\system32\Jhpjbgne.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1244 -
C:\Windows\SysWOW64\Jhdcmf32.exeC:\Windows\system32\Jhdcmf32.exe92⤵PID:4692
-
C:\Windows\SysWOW64\Kkjejqcl.exeC:\Windows\system32\Kkjejqcl.exe93⤵PID:3252
-
C:\Windows\SysWOW64\Kfpjgi32.exeC:\Windows\system32\Kfpjgi32.exe94⤵PID:3744
-
C:\Windows\SysWOW64\Kklbop32.exeC:\Windows\system32\Kklbop32.exe95⤵PID:3676
-
C:\Windows\SysWOW64\Kbfjljhf.exeC:\Windows\system32\Kbfjljhf.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5160 -
C:\Windows\SysWOW64\Klloichl.exeC:\Windows\system32\Klloichl.exe97⤵PID:5204
-
C:\Windows\SysWOW64\Kdgcne32.exeC:\Windows\system32\Kdgcne32.exe98⤵PID:5252
-
C:\Windows\SysWOW64\Lbpmbipk.exeC:\Windows\system32\Lbpmbipk.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5292 -
C:\Windows\SysWOW64\Lmeapbpa.exeC:\Windows\system32\Lmeapbpa.exe100⤵PID:5336
-
C:\Windows\SysWOW64\Lfpcngdo.exeC:\Windows\system32\Lfpcngdo.exe101⤵PID:5376
-
C:\Windows\SysWOW64\Mkohln32.exeC:\Windows\system32\Mkohln32.exe102⤵PID:5412
-
C:\Windows\SysWOW64\Megldcgd.exeC:\Windows\system32\Megldcgd.exe103⤵PID:5464
-
C:\Windows\SysWOW64\Mnbnchlb.exeC:\Windows\system32\Mnbnchlb.exe104⤵
- Drops file in System32 directory
PID:5508 -
C:\Windows\SysWOW64\Nnlqig32.exeC:\Windows\system32\Nnlqig32.exe105⤵
- Modifies registry class
PID:5548 -
C:\Windows\SysWOW64\Niadfpcn.exeC:\Windows\system32\Niadfpcn.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5592 -
C:\Windows\SysWOW64\Opbcdieb.exeC:\Windows\system32\Opbcdieb.exe107⤵PID:5632
-
C:\Windows\SysWOW64\Oijgmokc.exeC:\Windows\system32\Oijgmokc.exe108⤵PID:5680
-
C:\Windows\SysWOW64\Ommjnlnd.exeC:\Windows\system32\Ommjnlnd.exe109⤵PID:5724
-
C:\Windows\SysWOW64\Plgpjhnf.exeC:\Windows\system32\Plgpjhnf.exe110⤵PID:5760
-
C:\Windows\SysWOW64\Pfmdgq32.exeC:\Windows\system32\Pfmdgq32.exe111⤵PID:5812
-
C:\Windows\SysWOW64\Qfcjhphd.exeC:\Windows\system32\Qfcjhphd.exe112⤵PID:5920
-
C:\Windows\SysWOW64\Aifpoj32.exeC:\Windows\system32\Aifpoj32.exe113⤵PID:5964
-
C:\Windows\SysWOW64\Apqhldjp.exeC:\Windows\system32\Apqhldjp.exe114⤵PID:6008
-
C:\Windows\SysWOW64\Aemqdk32.exeC:\Windows\system32\Aemqdk32.exe115⤵
- Drops file in System32 directory
PID:6056 -
C:\Windows\SysWOW64\Bnbeggmi.exeC:\Windows\system32\Bnbeggmi.exe116⤵
- Modifies registry class
PID:6136 -
C:\Windows\SysWOW64\Djjobedk.exeC:\Windows\system32\Djjobedk.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5136
-
-
-
-
-
-
C:\Windows\SysWOW64\Gfcebf32.exeC:\Windows\system32\Gfcebf32.exe113⤵PID:4472
-
C:\Windows\SysWOW64\Gmmmoppl.exeC:\Windows\system32\Gmmmoppl.exe114⤵PID:6992
-
C:\Windows\SysWOW64\Gnnjgh32.exeC:\Windows\system32\Gnnjgh32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6224 -
C:\Windows\SysWOW64\Gehbcb32.exeC:\Windows\system32\Gehbcb32.exe116⤵PID:3136
-
C:\Windows\SysWOW64\Glbjpmdd.exeC:\Windows\system32\Glbjpmdd.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6964 -
C:\Windows\SysWOW64\Gnqflhcg.exeC:\Windows\system32\Gnqflhcg.exe118⤵PID:1388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Mjkbemll.exeC:\Windows\system32\Mjkbemll.exe82⤵PID:3760
-
C:\Windows\SysWOW64\Madjbg32.exeC:\Windows\system32\Madjbg32.exe83⤵PID:4804
-
C:\Windows\SysWOW64\Mgoboake.exeC:\Windows\system32\Mgoboake.exe84⤵PID:3552
-
C:\Windows\SysWOW64\Mmkkgh32.exeC:\Windows\system32\Mmkkgh32.exe85⤵PID:4768
-
C:\Windows\SysWOW64\Mmnglh32.exeC:\Windows\system32\Mmnglh32.exe86⤵PID:2368
-
C:\Windows\SysWOW64\Meepne32.exeC:\Windows\system32\Meepne32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1008 -
C:\Windows\SysWOW64\Mlohjpoi.exeC:\Windows\system32\Mlohjpoi.exe88⤵PID:1848
-
C:\Windows\SysWOW64\Nmpdbh32.exeC:\Windows\system32\Nmpdbh32.exe89⤵
- Modifies registry class
PID:4656 -
C:\Windows\SysWOW64\Ncjmob32.exeC:\Windows\system32\Ncjmob32.exe90⤵PID:1880
-
C:\Windows\SysWOW64\Nladpo32.exeC:\Windows\system32\Nladpo32.exe91⤵PID:116
-
C:\Windows\SysWOW64\Nnpalk32.exeC:\Windows\system32\Nnpalk32.exe92⤵PID:4840
-
C:\Windows\SysWOW64\Neiiiecg.exeC:\Windows\system32\Neiiiecg.exe93⤵PID:5272
-
C:\Windows\SysWOW64\Nlcaeo32.exeC:\Windows\system32\Nlcaeo32.exe94⤵PID:3088
-
C:\Windows\SysWOW64\Nhjbjp32.exeC:\Windows\system32\Nhjbjp32.exe95⤵PID:4568
-
C:\Windows\SysWOW64\Nmighf32.exeC:\Windows\system32\Nmighf32.exe96⤵PID:3944
-
C:\Windows\SysWOW64\Neqoidmo.exeC:\Windows\system32\Neqoidmo.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6644 -
C:\Windows\SysWOW64\Nljgfn32.exeC:\Windows\system32\Nljgfn32.exe98⤵
- Drops file in System32 directory
PID:6668 -
C:\Windows\SysWOW64\Omldnfkj.exeC:\Windows\system32\Omldnfkj.exe99⤵PID:5932
-
C:\Windows\SysWOW64\Odfljp32.exeC:\Windows\system32\Odfljp32.exe100⤵PID:6052
-
C:\Windows\SysWOW64\Olmdln32.exeC:\Windows\system32\Olmdln32.exe101⤵
- Modifies registry class
PID:6924 -
C:\Windows\SysWOW64\Omnqcfig.exeC:\Windows\system32\Omnqcfig.exe102⤵PID:1120
-
C:\Windows\SysWOW64\Oloaamqf.exeC:\Windows\system32\Oloaamqf.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1924 -
C:\Windows\SysWOW64\Ompmie32.exeC:\Windows\system32\Ompmie32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2184
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Jcphkhad.exeC:\Windows\system32\Jcphkhad.exe57⤵PID:1076
-
C:\Windows\SysWOW64\Jjjpgb32.exeC:\Windows\system32\Jjjpgb32.exe58⤵PID:3976
-
C:\Windows\SysWOW64\Jlhlcnge.exeC:\Windows\system32\Jlhlcnge.exe59⤵
- Modifies registry class
PID:3964 -
C:\Windows\SysWOW64\Jcbdph32.exeC:\Windows\system32\Jcbdph32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1236 -
C:\Windows\SysWOW64\Jjlmmbfo.exeC:\Windows\system32\Jjlmmbfo.exe61⤵PID:3572
-
C:\Windows\SysWOW64\Jdaajkfd.exeC:\Windows\system32\Jdaajkfd.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:772 -
C:\Windows\SysWOW64\Jgpmffeh.exeC:\Windows\system32\Jgpmffeh.exe63⤵
- Modifies registry class
PID:5108 -
C:\Windows\SysWOW64\Jqhaolli.exeC:\Windows\system32\Jqhaolli.exe64⤵
- Modifies registry class
PID:4740 -
C:\Windows\SysWOW64\Kgbjlf32.exeC:\Windows\system32\Kgbjlf32.exe65⤵PID:5364
-
C:\Windows\SysWOW64\Knlbipjb.exeC:\Windows\system32\Knlbipjb.exe66⤵PID:6252
-
C:\Windows\SysWOW64\Kgefae32.exeC:\Windows\system32\Kgefae32.exe67⤵PID:5844
-
C:\Windows\SysWOW64\Knoonphp.exeC:\Windows\system32\Knoonphp.exe68⤵PID:3288
-
C:\Windows\SysWOW64\Kdigkjpl.exeC:\Windows\system32\Kdigkjpl.exe69⤵PID:4936
-
C:\Windows\SysWOW64\Knfeoobh.exeC:\Windows\system32\Knfeoobh.exe70⤵
- Drops file in System32 directory
PID:1852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Colklb32.exeC:\Windows\system32\Colklb32.exe16⤵PID:6556
-
C:\Windows\SysWOW64\Cakghn32.exeC:\Windows\system32\Cakghn32.exe17⤵
- Drops file in System32 directory
PID:5500 -
C:\Windows\SysWOW64\Chepehne.exeC:\Windows\system32\Chepehne.exe18⤵
- Modifies registry class
PID:4880 -
C:\Windows\SysWOW64\Coohbbeb.exeC:\Windows\system32\Coohbbeb.exe19⤵PID:6884
-
C:\Windows\SysWOW64\Cbmdnmdf.exeC:\Windows\system32\Cbmdnmdf.exe20⤵PID:6720
-
C:\Windows\SysWOW64\Clbhkfdl.exeC:\Windows\system32\Clbhkfdl.exe21⤵PID:6892
-
C:\Windows\SysWOW64\Coadgacp.exeC:\Windows\system32\Coadgacp.exe22⤵PID:7060
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Dqhpjohb.exeC:\Windows\system32\Dqhpjohb.exe1⤵
- Modifies registry class
PID:5328 -
C:\Windows\SysWOW64\Emoaopnf.exeC:\Windows\system32\Emoaopnf.exe2⤵PID:5408
-
C:\Windows\SysWOW64\Eciilj32.exeC:\Windows\system32\Eciilj32.exe3⤵
- Modifies registry class
PID:5476 -
C:\Windows\SysWOW64\Enomic32.exeC:\Windows\system32\Enomic32.exe4⤵PID:5544
-
C:\Windows\SysWOW64\Eckfaj32.exeC:\Windows\system32\Eckfaj32.exe5⤵PID:5640
-
C:\Windows\SysWOW64\Efjbne32.exeC:\Windows\system32\Efjbne32.exe6⤵PID:5796
-
C:\Windows\SysWOW64\Emhdeoel.exeC:\Windows\system32\Emhdeoel.exe7⤵
- Drops file in System32 directory
PID:5948 -
C:\Windows\SysWOW64\Ffahnd32.exeC:\Windows\system32\Ffahnd32.exe8⤵
- Drops file in System32 directory
PID:6040 -
C:\Windows\SysWOW64\Fnjmea32.exeC:\Windows\system32\Fnjmea32.exe9⤵PID:1956
-
C:\Windows\SysWOW64\Gpnoigpe.exeC:\Windows\system32\Gpnoigpe.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5192 -
C:\Windows\SysWOW64\Hndibn32.exeC:\Windows\system32\Hndibn32.exe11⤵PID:2452
-
C:\Windows\SysWOW64\Hdaajd32.exeC:\Windows\system32\Hdaajd32.exe12⤵PID:5184
-
C:\Windows\SysWOW64\Ialhdh32.exeC:\Windows\system32\Ialhdh32.exe13⤵
- Modifies registry class
PID:5196 -
C:\Windows\SysWOW64\Iophnl32.exeC:\Windows\system32\Iophnl32.exe14⤵
- Modifies registry class
PID:5244 -
C:\Windows\SysWOW64\Imeeohoi.exeC:\Windows\system32\Imeeohoi.exe15⤵PID:5460
-
C:\Windows\SysWOW64\Jahgpf32.exeC:\Windows\system32\Jahgpf32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5536 -
C:\Windows\SysWOW64\Jmnheggo.exeC:\Windows\system32\Jmnheggo.exe17⤵PID:5644
-
C:\Windows\SysWOW64\Jhdlbp32.exeC:\Windows\system32\Jhdlbp32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5660 -
C:\Windows\SysWOW64\Knenffqf.exeC:\Windows\system32\Knenffqf.exe19⤵
- Modifies registry class
PID:4296 -
C:\Windows\SysWOW64\Khkbcopl.exeC:\Windows\system32\Khkbcopl.exe20⤵PID:5960
-
C:\Windows\SysWOW64\Khmoionj.exeC:\Windows\system32\Khmoionj.exe21⤵
- Drops file in System32 directory
PID:6004 -
C:\Windows\SysWOW64\Koggehff.exeC:\Windows\system32\Koggehff.exe22⤵PID:3948
-
C:\Windows\SysWOW64\Kddpnpdn.exeC:\Windows\system32\Kddpnpdn.exe23⤵PID:1996
-
C:\Windows\SysWOW64\Ldiiio32.exeC:\Windows\system32\Ldiiio32.exe24⤵PID:4712
-
C:\Windows\SysWOW64\Lnanadfi.exeC:\Windows\system32\Lnanadfi.exe25⤵PID:5276
-
C:\Windows\SysWOW64\Lhgbomfo.exeC:\Windows\system32\Lhgbomfo.exe26⤵PID:5052
-
C:\Windows\SysWOW64\Lhiodm32.exeC:\Windows\system32\Lhiodm32.exe27⤵PID:5492
-
C:\Windows\SysWOW64\Ldpoinjq.exeC:\Windows\system32\Ldpoinjq.exe28⤵PID:5720
-
C:\Windows\SysWOW64\Mdloelpc.exeC:\Windows\system32\Mdloelpc.exe29⤵PID:4056
-
C:\Windows\SysWOW64\Moacbe32.exeC:\Windows\system32\Moacbe32.exe30⤵PID:4908
-
C:\Windows\SysWOW64\Mdnlkl32.exeC:\Windows\system32\Mdnlkl32.exe31⤵PID:3144
-
C:\Windows\SysWOW64\Nbbldp32.exeC:\Windows\system32\Nbbldp32.exe32⤵PID:6116
-
C:\Windows\SysWOW64\Nildajdg.exeC:\Windows\system32\Nildajdg.exe33⤵PID:2072
-
C:\Windows\SysWOW64\Nnimia32.exeC:\Windows\system32\Nnimia32.exe34⤵PID:2488
-
C:\Windows\SysWOW64\Niqnli32.exeC:\Windows\system32\Niqnli32.exe35⤵PID:2356
-
C:\Windows\SysWOW64\Nbibeo32.exeC:\Windows\system32\Nbibeo32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2528 -
C:\Windows\SysWOW64\Oabiak32.exeC:\Windows\system32\Oabiak32.exe37⤵PID:5624
-
C:\Windows\SysWOW64\Okhmnc32.exeC:\Windows\system32\Okhmnc32.exe38⤵PID:344
-
C:\Windows\SysWOW64\Ogajid32.exeC:\Windows\system32\Ogajid32.exe39⤵
- Drops file in System32 directory
PID:5800 -
C:\Windows\SysWOW64\Oajoaj32.exeC:\Windows\system32\Oajoaj32.exe40⤵PID:4516
-
C:\Windows\SysWOW64\Qimfoe32.exeC:\Windows\system32\Qimfoe32.exe41⤵PID:3792
-
C:\Windows\SysWOW64\Aiapjecl.exeC:\Windows\system32\Aiapjecl.exe42⤵PID:2376
-
C:\Windows\SysWOW64\Abjdbj32.exeC:\Windows\system32\Abjdbj32.exe43⤵PID:2600
-
C:\Windows\SysWOW64\Abnnnjfh.exeC:\Windows\system32\Abnnnjfh.exe44⤵PID:3724
-
C:\Windows\SysWOW64\Ahkffqdo.exeC:\Windows\system32\Ahkffqdo.exe45⤵PID:5944
-
C:\Windows\SysWOW64\Bajqpe32.exeC:\Windows\system32\Bajqpe32.exe46⤵PID:4020
-
C:\Windows\SysWOW64\Bbjmih32.exeC:\Windows\system32\Bbjmih32.exe47⤵
- Modifies registry class
PID:1028 -
C:\Windows\SysWOW64\Cpbgnlfo.exeC:\Windows\system32\Cpbgnlfo.exe48⤵PID:5360
-
C:\Windows\SysWOW64\Cadcfd32.exeC:\Windows\system32\Cadcfd32.exe49⤵PID:5824
-
C:\Windows\SysWOW64\Cpljdjnd.exeC:\Windows\system32\Cpljdjnd.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:768 -
C:\Windows\SysWOW64\Deiblamk.exeC:\Windows\system32\Deiblamk.exe51⤵
- Drops file in System32 directory
PID:4668 -
C:\Windows\SysWOW64\Dfphmp32.exeC:\Windows\system32\Dfphmp32.exe52⤵PID:3376
-
C:\Windows\SysWOW64\Dfbebpdq.exeC:\Windows\system32\Dfbebpdq.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5620 -
C:\Windows\SysWOW64\Efikco32.exeC:\Windows\system32\Efikco32.exe54⤵PID:4160
-
C:\Windows\SysWOW64\Ecmlmcmb.exeC:\Windows\system32\Ecmlmcmb.exe55⤵PID:2420
-
C:\Windows\SysWOW64\Elepei32.exeC:\Windows\system32\Elepei32.exe56⤵PID:2876
-
C:\Windows\SysWOW64\Ecphbckp.exeC:\Windows\system32\Ecphbckp.exe57⤵PID:244
-
C:\Windows\SysWOW64\Ejiqom32.exeC:\Windows\system32\Ejiqom32.exe58⤵PID:5016
-
C:\Windows\SysWOW64\Fqcilgji.exeC:\Windows\system32\Fqcilgji.exe59⤵PID:5232
-
C:\Windows\SysWOW64\Ffpadn32.exeC:\Windows\system32\Ffpadn32.exe60⤵
- Drops file in System32 directory
PID:4484 -
C:\Windows\SysWOW64\Fqfeag32.exeC:\Windows\system32\Fqfeag32.exe61⤵PID:2796
-
C:\Windows\SysWOW64\Fbnhjn32.exeC:\Windows\system32\Fbnhjn32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3288 -
C:\Windows\SysWOW64\Gqfohdjd.exeC:\Windows\system32\Gqfohdjd.exe63⤵PID:824
-
C:\Windows\SysWOW64\Hfhqkk32.exeC:\Windows\system32\Hfhqkk32.exe64⤵PID:3300
-
C:\Windows\SysWOW64\Hmdend32.exeC:\Windows\system32\Hmdend32.exe65⤵PID:1168
-
C:\Windows\SysWOW64\Iffmmihf.exeC:\Windows\system32\Iffmmihf.exe66⤵PID:348
-
C:\Windows\SysWOW64\Ipnaen32.exeC:\Windows\system32\Ipnaen32.exe67⤵PID:4356
-
C:\Windows\SysWOW64\Ibojgikg.exeC:\Windows\system32\Ibojgikg.exe68⤵
- Modifies registry class
PID:5472 -
C:\Windows\SysWOW64\Iapjeq32.exeC:\Windows\system32\Iapjeq32.exe69⤵
- Drops file in System32 directory
PID:6132 -
C:\Windows\SysWOW64\Jdcplkoe.exeC:\Windows\system32\Jdcplkoe.exe70⤵PID:4568
-
C:\Windows\SysWOW64\Jbhmnhcm.exeC:\Windows\system32\Jbhmnhcm.exe71⤵PID:1492
-
C:\Windows\SysWOW64\Jibejb32.exeC:\Windows\system32\Jibejb32.exe72⤵PID:2912
-
C:\Windows\SysWOW64\Jfffcf32.exeC:\Windows\system32\Jfffcf32.exe73⤵PID:1096
-
C:\Windows\SysWOW64\Jmpnppap.exeC:\Windows\system32\Jmpnppap.exe74⤵PID:1484
-
C:\Windows\SysWOW64\Kgmlde32.exeC:\Windows\system32\Kgmlde32.exe75⤵
- Modifies registry class
PID:2088 -
C:\Windows\SysWOW64\Odkaac32.exeC:\Windows\system32\Odkaac32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3056 -
C:\Windows\SysWOW64\Pcagjndj.exeC:\Windows\system32\Pcagjndj.exe77⤵PID:2804
-
C:\Windows\SysWOW64\Pjkofh32.exeC:\Windows\system32\Pjkofh32.exe78⤵
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\Qaegcb32.exeC:\Windows\system32\Qaegcb32.exe79⤵PID:3976
-
C:\Windows\SysWOW64\Qgopplkq.exeC:\Windows\system32\Qgopplkq.exe80⤵PID:4132
-
C:\Windows\SysWOW64\Qnihlf32.exeC:\Windows\system32\Qnihlf32.exe81⤵PID:1296
-
C:\Windows\SysWOW64\Qcepem32.exeC:\Windows\system32\Qcepem32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Aegidp32.exeC:\Windows\system32\Aegidp32.exe83⤵PID:468
-
C:\Windows\SysWOW64\Abkjnd32.exeC:\Windows\system32\Abkjnd32.exe84⤵PID:2256
-
C:\Windows\SysWOW64\Aenpeoom.exeC:\Windows\system32\Aenpeoom.exe85⤵PID:408
-
C:\Windows\SysWOW64\Bjkhme32.exeC:\Windows\system32\Bjkhme32.exe86⤵PID:1732
-
C:\Windows\SysWOW64\Bajjeo32.exeC:\Windows\system32\Bajjeo32.exe87⤵
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\Bhdbaihi.exeC:\Windows\system32\Bhdbaihi.exe88⤵PID:6248
-
C:\Windows\SysWOW64\Deoabj32.exeC:\Windows\system32\Deoabj32.exe89⤵PID:6340
-
C:\Windows\SysWOW64\Eolpfo32.exeC:\Windows\system32\Eolpfo32.exe90⤵PID:6444
-
C:\Windows\SysWOW64\Eleikb32.exeC:\Windows\system32\Eleikb32.exe91⤵
- Drops file in System32 directory
PID:6588 -
C:\Windows\SysWOW64\Fkopgn32.exeC:\Windows\system32\Fkopgn32.exe92⤵PID:6624
-
C:\Windows\SysWOW64\Fbihdhhf.exeC:\Windows\system32\Fbihdhhf.exe93⤵PID:6664
-
C:\Windows\SysWOW64\Fhbpqb32.exeC:\Windows\system32\Fhbpqb32.exe94⤵
- Modifies registry class
PID:6732 -
C:\Windows\SysWOW64\Gfkjef32.exeC:\Windows\system32\Gfkjef32.exe95⤵PID:6824
-
C:\Windows\SysWOW64\Gbgdef32.exeC:\Windows\system32\Gbgdef32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6868 -
C:\Windows\SysWOW64\Gmlhbo32.exeC:\Windows\system32\Gmlhbo32.exe97⤵PID:6908
-
C:\Windows\SysWOW64\Hfemkdbm.exeC:\Windows\system32\Hfemkdbm.exe98⤵PID:6956
-
C:\Windows\SysWOW64\Hmoehojj.exeC:\Windows\system32\Hmoehojj.exe99⤵PID:7012
-
C:\Windows\SysWOW64\Hfgjad32.exeC:\Windows\system32\Hfgjad32.exe100⤵PID:7104
-
C:\Windows\SysWOW64\Hkkhjj32.exeC:\Windows\system32\Hkkhjj32.exe101⤵
- Modifies registry class
PID:316 -
C:\Windows\SysWOW64\Kdnincal.exeC:\Windows\system32\Kdnincal.exe102⤵
- Drops file in System32 directory
PID:3944 -
C:\Windows\SysWOW64\Kikafjoc.exeC:\Windows\system32\Kikafjoc.exe103⤵PID:6292
-
C:\Windows\SysWOW64\Kpeibdfp.exeC:\Windows\system32\Kpeibdfp.exe104⤵PID:6332
-
C:\Windows\SysWOW64\Ldleoa32.exeC:\Windows\system32\Ldleoa32.exe105⤵PID:6392
-
C:\Windows\SysWOW64\Lpcedbjp.exeC:\Windows\system32\Lpcedbjp.exe106⤵PID:6428
-
C:\Windows\SysWOW64\Mmgfmg32.exeC:\Windows\system32\Mmgfmg32.exe107⤵PID:6536
-
C:\Windows\SysWOW64\Midmcgif.exeC:\Windows\system32\Midmcgif.exe108⤵PID:6476
-
C:\Windows\SysWOW64\Mpoepa32.exeC:\Windows\system32\Mpoepa32.exe109⤵PID:2920
-
C:\Windows\SysWOW64\Olcbfp32.exeC:\Windows\system32\Olcbfp32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6784 -
C:\Windows\SysWOW64\Pnjeqbkb.exeC:\Windows\system32\Pnjeqbkb.exe111⤵
- Drops file in System32 directory
PID:6812 -
C:\Windows\SysWOW64\Pgbijg32.exeC:\Windows\system32\Pgbijg32.exe112⤵PID:6836
-
C:\Windows\SysWOW64\Pnlafaio.exeC:\Windows\system32\Pnlafaio.exe113⤵
- Modifies registry class
PID:6892 -
C:\Windows\SysWOW64\Pqmjhm32.exeC:\Windows\system32\Pqmjhm32.exe114⤵PID:3428
-
C:\Windows\SysWOW64\Qjjhla32.exeC:\Windows\system32\Qjjhla32.exe115⤵PID:4412
-
C:\Windows\SysWOW64\Ajanmqbc.exeC:\Windows\system32\Ajanmqbc.exe116⤵PID:7072
-
C:\Windows\SysWOW64\Aqkgikip.exeC:\Windows\system32\Aqkgikip.exe117⤵PID:3260
-
C:\Windows\SysWOW64\Acicefid.exeC:\Windows\system32\Acicefid.exe118⤵PID:1920
-
C:\Windows\SysWOW64\Bcqife32.exeC:\Windows\system32\Bcqife32.exe119⤵PID:3704
-
C:\Windows\SysWOW64\Cfkenogb.exeC:\Windows\system32\Cfkenogb.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6152 -
C:\Windows\SysWOW64\Cmdmki32.exeC:\Windows\system32\Cmdmki32.exe121⤵PID:6220
-
C:\Windows\SysWOW64\Ddhhnana.exeC:\Windows\system32\Ddhhnana.exe122⤵PID:368
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-