Analysis
-
max time kernel
173s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 20:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.c0980d2021adc273eb95efb9ac971a20.exe
Resource
win7-20231023-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.c0980d2021adc273eb95efb9ac971a20.exe
Resource
win10v2004-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.c0980d2021adc273eb95efb9ac971a20.exe
-
Size
171KB
-
MD5
c0980d2021adc273eb95efb9ac971a20
-
SHA1
520b508fc0ec05edbba8c69c686d60aaf4171d67
-
SHA256
e03fa155c73aa35e4921831268a13b5baa563b0d4c53d05ba340c45eb677f9ba
-
SHA512
00daa8712897c7eceedff527f9e403766b6243fe5af29afe8e5af84b3486f4926f876208c63dd224584555c436c95e39246b365cb0c6a13b766660a95485db69
-
SSDEEP
3072:8ik47IMZngu+tAcrbFAJc+RsUi1aVDkOvhJjvJ:Xk40MZOrtMsQB
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnanbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmkopgep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbinkb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgdedj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kefiheqf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpnlicne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnbkeclf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpfbmcaf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Likhoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecnlhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhlenlmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckghid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hgghdp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojnfbnbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffljpibp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bcpblo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjlgnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Elpknehe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppgeqijb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qalkfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbfomagf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkbmbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dihjnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmncgh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkchoaif.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmblkmcd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koonak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofmjlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bblcda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Femndhgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjnipc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpniaool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qlggcp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aepklffh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhdaao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcffggkb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipckqnja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcngkldi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfcompnj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nelfnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cagmnaad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpmcfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccfcpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmbhqj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fkempa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Philomje.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Miaica32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccbanfko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlpfak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Henajkcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idicqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhjegh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efepln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqkgli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plhcglil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcknlmal.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijcaaibe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqaini32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jondojna.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhlenlmb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Incdob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aepklffh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gndima32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnbkeclf.exe -
Executes dropped EXE 64 IoCs
pid Process 416 Peaahmcd.exe 4648 Bidlqhgc.exe 3196 Ccfcpm32.exe 220 Dobnpm32.exe 3860 Ejaecdnc.exe 4560 Eqpfknbj.exe 4364 Fnhppa32.exe 1336 Gpjfng32.exe 4568 Hjdcfp32.exe 2352 Ihagfb32.exe 3060 Ikbphn32.exe 4800 Iobecl32.exe 2564 Jondojna.exe 4184 Knhkkfod.exe 4960 Kpkqbq32.exe 3548 Lqfpoope.exe 3612 Mhenpk32.exe 3328 Nnfpcada.exe 2820 Nohicdia.exe 3868 Nkagndmc.exe 4044 Onifpodl.exe 4784 Oeekbhif.exe 4140 Phmjdbpo.exe 3608 Qhofjbnl.exe 4972 Alplfpbp.exe 2008 Aiclodaj.exe 4464 Aoqegk32.exe 3768 Bimoecio.exe 4760 Booaii32.exe 4088 Bekfkc32.exe 2948 Ceppfbef.exe 1368 Commjgga.exe 4932 Clqncl32.exe 3016 Dhgoimlo.exe 4624 Dlegokbe.exe 1448 Dagiba32.exe 4936 Efgono32.exe 1708 Eckogc32.exe 1760 Ebbinp32.exe 1144 Fqcilgji.exe 3568 Fjccel32.exe 3572 Fmapag32.exe 5052 Hbldkllm.exe 1008 Hikfbeod.exe 2772 Himche32.exe 780 Hpgkeodo.exe 3508 Iannpa32.exe 468 Ipckqnja.exe 1740 Pengna32.exe 2912 Blmamh32.exe 3480 Beefenie.exe 1692 Bbifobho.exe 3764 Bhfogiff.exe 1424 Bblcda32.exe 4456 Ckghid32.exe 1276 Ckidoc32.exe 372 Ckladcoa.exe 5104 Dkedjbgg.exe 3836 Dldpde32.exe 4064 Ecmebm32.exe 412 Femndhgh.exe 1432 Ffpjihee.exe 3496 Fcckcl32.exe 4460 Gfkjef32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Bohfmn32.dll Mnhkklbb.exe File opened for modification C:\Windows\SysWOW64\Kefiheqf.exe Kahqbgjp.exe File created C:\Windows\SysWOW64\Inmplh32.exe Idpbhc32.exe File created C:\Windows\SysWOW64\Liickdeg.dll Liqibm32.exe File created C:\Windows\SysWOW64\Bdojdd32.exe Bobalm32.exe File opened for modification C:\Windows\SysWOW64\Hjlaho32.exe Hcailemh.exe File opened for modification C:\Windows\SysWOW64\Dannbogl.exe Dfhjefhf.exe File opened for modification C:\Windows\SysWOW64\Benbli32.exe Bpaidb32.exe File created C:\Windows\SysWOW64\Iaffkdlc.dll Nljopa32.exe File created C:\Windows\SysWOW64\Ihpinq32.dll Kieaqe32.exe File created C:\Windows\SysWOW64\Kjafha32.exe Jqhaolli.exe File opened for modification C:\Windows\SysWOW64\Mklkepal.exe Mceccbpj.exe File created C:\Windows\SysWOW64\Lmlpcjll.exe Lhogkc32.exe File created C:\Windows\SysWOW64\Cpipea32.exe Blhjic32.exe File created C:\Windows\SysWOW64\Oconip32.dll Deokcg32.exe File opened for modification C:\Windows\SysWOW64\Jondojna.exe Iobecl32.exe File created C:\Windows\SysWOW64\Gcfjpfge.exe Ghpebngp.exe File created C:\Windows\SysWOW64\Dhjcdimf.exe Djfckenm.exe File created C:\Windows\SysWOW64\Dbfjep32.dll Ciihcbhg.exe File opened for modification C:\Windows\SysWOW64\Incdob32.exe Iqpcfn32.exe File created C:\Windows\SysWOW64\Jmbdfm32.exe Jcjonh32.exe File created C:\Windows\SysWOW64\Fnpapfnf.dll Qcbmegol.exe File opened for modification C:\Windows\SysWOW64\Aancojgn.exe Aegbji32.exe File created C:\Windows\SysWOW64\Qodmdb32.exe Qhjegh32.exe File opened for modification C:\Windows\SysWOW64\Inmplh32.exe Idpbhc32.exe File opened for modification C:\Windows\SysWOW64\Jkbfafel.exe Jdhndlno.exe File opened for modification C:\Windows\SysWOW64\Fldnoo32.exe Dkahba32.exe File opened for modification C:\Windows\SysWOW64\Qhofjbnl.exe Phmjdbpo.exe File created C:\Windows\SysWOW64\Oobknhji.dll Pllnbh32.exe File created C:\Windows\SysWOW64\Llabchoe.exe Lbinkb32.exe File created C:\Windows\SysWOW64\Hfggoh32.dll Oeehdcij.exe File created C:\Windows\SysWOW64\Gmojep32.exe Gpkiklop.exe File opened for modification C:\Windows\SysWOW64\Iaekfjje.exe Ilibmcln.exe File created C:\Windows\SysWOW64\Mmmhfaab.dll Omjfij32.exe File opened for modification C:\Windows\SysWOW64\Oojhpo32.exe Odedcf32.exe File created C:\Windows\SysWOW64\Dpogkqjo.dll Iioicn32.exe File opened for modification C:\Windows\SysWOW64\Hhlenlmb.exe Hcomfeok.exe File opened for modification C:\Windows\SysWOW64\Ojmhaklf.exe Nelfnd32.exe File created C:\Windows\SysWOW64\Omooiflc.dll Lgblhmag.exe File created C:\Windows\SysWOW64\Egkdne32.exe Encpeodp.exe File opened for modification C:\Windows\SysWOW64\Fkjfkacd.exe Fglndbmn.exe File opened for modification C:\Windows\SysWOW64\Ndddaahi.exe Noglik32.exe File created C:\Windows\SysWOW64\Bidfhgld.dll Dannbogl.exe File opened for modification C:\Windows\SysWOW64\Pnakaa32.exe Pddmml32.exe File created C:\Windows\SysWOW64\Bfcompnj.exe Aancojgn.exe File created C:\Windows\SysWOW64\Nllekk32.exe Npedfjfo.exe File opened for modification C:\Windows\SysWOW64\Ijcaaibe.exe Ihbdja32.exe File opened for modification C:\Windows\SysWOW64\Lmbhqj32.exe Lqkgli32.exe File opened for modification C:\Windows\SysWOW64\Illfmi32.exe Hbjonepq.exe File created C:\Windows\SysWOW64\Ofdmgkln.dll Cagmnaad.exe File created C:\Windows\SysWOW64\Flooaied.dll Llngmeja.exe File opened for modification C:\Windows\SysWOW64\Cagmnaad.exe Banjhbio.exe File opened for modification C:\Windows\SysWOW64\Eebgjk32.exe Dcjhhq32.exe File created C:\Windows\SysWOW64\Booaii32.exe Bimoecio.exe File created C:\Windows\SysWOW64\Mkjnop32.exe Mepfbflb.exe File created C:\Windows\SysWOW64\Nalhph32.dll Mgibil32.exe File created C:\Windows\SysWOW64\Ndgndepc.dll Ppeikjle.exe File created C:\Windows\SysWOW64\Jehmgg32.exe Jialbf32.exe File opened for modification C:\Windows\SysWOW64\Pmcbdb32.exe Pcknlmal.exe File created C:\Windows\SysWOW64\Bfqblcgo.dll Jcniighd.exe File created C:\Windows\SysWOW64\Hdclbopg.exe Hkkgii32.exe File created C:\Windows\SysWOW64\Kqojah32.dll Ljnloi32.exe File created C:\Windows\SysWOW64\Bjgklqop.dll Jgqbcg32.exe File created C:\Windows\SysWOW64\Nldhbggg.dll Mmfalimb.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njkiaa32.dll" Mcqjhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jobomo32.dll" Dhgoimlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Beefenie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Haefqjeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdclbopg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckpagg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecnlhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dabjobpf.dll" Nkeiia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jgcoigfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mhafak32.dll" Ilnbch32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kcfgaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gndima32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfbjkc32.dll" Lcfimheb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghpebngp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qhjegh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjafha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnalfmhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onmaaepg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pmkopgep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhbkkipn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nlefcddl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Feimkjdb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Knhkkfod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bimoecio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jpkfmfok.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kodnfqgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldnkeajq.dll" Jfeoip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jgnqafgk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnifoaba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gpjjikfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjdcfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odadlpdf.dll" Himche32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jpbdfgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hcomfeok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgjhlbnd.dll" Pmkopgep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nojagf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbnbgcei.dll" Hdclbopg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hbjonepq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omjfij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgnqafgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Objelghl.dll" Ioebdomd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mocihb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Moalod32.dll" Feimkjdb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbifobho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpnbhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dannbogl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnpfje32.dll" Jncobabm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aiclodaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbjqcf32.dll" Nedjdp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iadmamcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eqjolmea.dll" Jnkjpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bblcda32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Plhcglil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcfgaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hodphf32.dll" Moklnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gciclcmc.dll" Hhlenlmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbebdpca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bqafpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hgghdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efepln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iokbekgb.dll" Ihagfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpmpgfhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ichkpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gicgjk32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 416 4580 NEAS.c0980d2021adc273eb95efb9ac971a20.exe 92 PID 4580 wrote to memory of 416 4580 NEAS.c0980d2021adc273eb95efb9ac971a20.exe 92 PID 4580 wrote to memory of 416 4580 NEAS.c0980d2021adc273eb95efb9ac971a20.exe 92 PID 416 wrote to memory of 4648 416 Peaahmcd.exe 93 PID 416 wrote to memory of 4648 416 Peaahmcd.exe 93 PID 416 wrote to memory of 4648 416 Peaahmcd.exe 93 PID 4648 wrote to memory of 3196 4648 Bidlqhgc.exe 94 PID 4648 wrote to memory of 3196 4648 Bidlqhgc.exe 94 PID 4648 wrote to memory of 3196 4648 Bidlqhgc.exe 94 PID 3196 wrote to memory of 220 3196 Ccfcpm32.exe 95 PID 3196 wrote to memory of 220 3196 Ccfcpm32.exe 95 PID 3196 wrote to memory of 220 3196 Ccfcpm32.exe 95 PID 220 wrote to memory of 3860 220 Dobnpm32.exe 96 PID 220 wrote to memory of 3860 220 Dobnpm32.exe 96 PID 220 wrote to memory of 3860 220 Dobnpm32.exe 96 PID 3860 wrote to memory of 4560 3860 Ejaecdnc.exe 97 PID 3860 wrote to memory of 4560 3860 Ejaecdnc.exe 97 PID 3860 wrote to memory of 4560 3860 Ejaecdnc.exe 97 PID 4560 wrote to memory of 4364 4560 Eqpfknbj.exe 98 PID 4560 wrote to memory of 4364 4560 Eqpfknbj.exe 98 PID 4560 wrote to memory of 4364 4560 Eqpfknbj.exe 98 PID 4364 wrote to memory of 1336 4364 Fnhppa32.exe 99 PID 4364 wrote to memory of 1336 4364 Fnhppa32.exe 99 PID 4364 wrote to memory of 1336 4364 Fnhppa32.exe 99 PID 1336 wrote to memory of 4568 1336 Gpjfng32.exe 100 PID 1336 wrote to memory of 4568 1336 Gpjfng32.exe 100 PID 1336 wrote to memory of 4568 1336 Gpjfng32.exe 100 PID 4568 wrote to memory of 2352 4568 Hjdcfp32.exe 101 PID 4568 wrote to memory of 2352 4568 Hjdcfp32.exe 101 PID 4568 wrote to memory of 2352 4568 Hjdcfp32.exe 101 PID 2352 wrote to memory of 3060 2352 Ihagfb32.exe 102 PID 2352 wrote to memory of 3060 2352 Ihagfb32.exe 102 PID 2352 wrote to memory of 3060 2352 Ihagfb32.exe 102 PID 3060 wrote to memory of 4800 3060 Ikbphn32.exe 103 PID 3060 wrote to memory of 4800 3060 Ikbphn32.exe 103 PID 3060 wrote to memory of 4800 3060 Ikbphn32.exe 103 PID 4800 wrote to memory of 2564 4800 Iobecl32.exe 104 PID 4800 wrote to memory of 2564 4800 Iobecl32.exe 104 PID 4800 wrote to memory of 2564 4800 Iobecl32.exe 104 PID 2564 wrote to memory of 4184 2564 Jondojna.exe 105 PID 2564 wrote to memory of 4184 2564 Jondojna.exe 105 PID 2564 wrote to memory of 4184 2564 Jondojna.exe 105 PID 4184 wrote to memory of 4960 4184 Knhkkfod.exe 106 PID 4184 wrote to memory of 4960 4184 Knhkkfod.exe 106 PID 4184 wrote to memory of 4960 4184 Knhkkfod.exe 106 PID 4960 wrote to memory of 3548 4960 Kpkqbq32.exe 107 PID 4960 wrote to memory of 3548 4960 Kpkqbq32.exe 107 PID 4960 wrote to memory of 3548 4960 Kpkqbq32.exe 107 PID 3548 wrote to memory of 3612 3548 Lqfpoope.exe 108 PID 3548 wrote to memory of 3612 3548 Lqfpoope.exe 108 PID 3548 wrote to memory of 3612 3548 Lqfpoope.exe 108 PID 3612 wrote to memory of 3328 3612 Mhenpk32.exe 109 PID 3612 wrote to memory of 3328 3612 Mhenpk32.exe 109 PID 3612 wrote to memory of 3328 3612 Mhenpk32.exe 109 PID 3328 wrote to memory of 2820 3328 Nnfpcada.exe 110 PID 3328 wrote to memory of 2820 3328 Nnfpcada.exe 110 PID 3328 wrote to memory of 2820 3328 Nnfpcada.exe 110 PID 2820 wrote to memory of 3868 2820 Nohicdia.exe 111 PID 2820 wrote to memory of 3868 2820 Nohicdia.exe 111 PID 2820 wrote to memory of 3868 2820 Nohicdia.exe 111 PID 3868 wrote to memory of 4044 3868 Nkagndmc.exe 112 PID 3868 wrote to memory of 4044 3868 Nkagndmc.exe 112 PID 3868 wrote to memory of 4044 3868 Nkagndmc.exe 112 PID 4044 wrote to memory of 4784 4044 Onifpodl.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c0980d2021adc273eb95efb9ac971a20.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c0980d2021adc273eb95efb9ac971a20.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\Peaahmcd.exeC:\Windows\system32\Peaahmcd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\SysWOW64\Bidlqhgc.exeC:\Windows\system32\Bidlqhgc.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\Ccfcpm32.exeC:\Windows\system32\Ccfcpm32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\Dobnpm32.exeC:\Windows\system32\Dobnpm32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\Ejaecdnc.exeC:\Windows\system32\Ejaecdnc.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\Eqpfknbj.exeC:\Windows\system32\Eqpfknbj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Fnhppa32.exeC:\Windows\system32\Fnhppa32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\Gpjfng32.exeC:\Windows\system32\Gpjfng32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\Hjdcfp32.exeC:\Windows\system32\Hjdcfp32.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\Ihagfb32.exeC:\Windows\system32\Ihagfb32.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\Ikbphn32.exeC:\Windows\system32\Ikbphn32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\Iobecl32.exeC:\Windows\system32\Iobecl32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\Jondojna.exeC:\Windows\system32\Jondojna.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\Knhkkfod.exeC:\Windows\system32\Knhkkfod.exe15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Kpkqbq32.exeC:\Windows\system32\Kpkqbq32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Lqfpoope.exeC:\Windows\system32\Lqfpoope.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\Mhenpk32.exeC:\Windows\system32\Mhenpk32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\Nnfpcada.exeC:\Windows\system32\Nnfpcada.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\Nohicdia.exeC:\Windows\system32\Nohicdia.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Nkagndmc.exeC:\Windows\system32\Nkagndmc.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\Onifpodl.exeC:\Windows\system32\Onifpodl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\Oeekbhif.exeC:\Windows\system32\Oeekbhif.exe23⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\Phmjdbpo.exeC:\Windows\system32\Phmjdbpo.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4140 -
C:\Windows\SysWOW64\Qhofjbnl.exeC:\Windows\system32\Qhofjbnl.exe25⤵
- Executes dropped EXE
PID:3608 -
C:\Windows\SysWOW64\Alplfpbp.exeC:\Windows\system32\Alplfpbp.exe26⤵
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\Aiclodaj.exeC:\Windows\system32\Aiclodaj.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Aoqegk32.exeC:\Windows\system32\Aoqegk32.exe28⤵
- Executes dropped EXE
PID:4464 -
C:\Windows\SysWOW64\Bimoecio.exeC:\Windows\system32\Bimoecio.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3768 -
C:\Windows\SysWOW64\Booaii32.exeC:\Windows\system32\Booaii32.exe30⤵
- Executes dropped EXE
PID:4760 -
C:\Windows\SysWOW64\Bekfkc32.exeC:\Windows\system32\Bekfkc32.exe31⤵
- Executes dropped EXE
PID:4088 -
C:\Windows\SysWOW64\Ceppfbef.exeC:\Windows\system32\Ceppfbef.exe32⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\Commjgga.exeC:\Windows\system32\Commjgga.exe33⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\SysWOW64\Clqncl32.exeC:\Windows\system32\Clqncl32.exe34⤵
- Executes dropped EXE
PID:4932 -
C:\Windows\SysWOW64\Dhgoimlo.exeC:\Windows\system32\Dhgoimlo.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:3016 -
C:\Windows\SysWOW64\Dlegokbe.exeC:\Windows\system32\Dlegokbe.exe36⤵
- Executes dropped EXE
PID:4624 -
C:\Windows\SysWOW64\Dagiba32.exeC:\Windows\system32\Dagiba32.exe37⤵
- Executes dropped EXE
PID:1448 -
C:\Windows\SysWOW64\Efgono32.exeC:\Windows\system32\Efgono32.exe38⤵
- Executes dropped EXE
PID:4936 -
C:\Windows\SysWOW64\Eckogc32.exeC:\Windows\system32\Eckogc32.exe39⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SysWOW64\Ebbinp32.exeC:\Windows\system32\Ebbinp32.exe40⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\Fqcilgji.exeC:\Windows\system32\Fqcilgji.exe41⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\Fjccel32.exeC:\Windows\system32\Fjccel32.exe42⤵
- Executes dropped EXE
PID:3568 -
C:\Windows\SysWOW64\Fmapag32.exeC:\Windows\system32\Fmapag32.exe43⤵
- Executes dropped EXE
PID:3572 -
C:\Windows\SysWOW64\Hbldkllm.exeC:\Windows\system32\Hbldkllm.exe44⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\Hikfbeod.exeC:\Windows\system32\Hikfbeod.exe45⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\Himche32.exeC:\Windows\system32\Himche32.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:2772 -
C:\Windows\SysWOW64\Hpgkeodo.exeC:\Windows\system32\Hpgkeodo.exe47⤵
- Executes dropped EXE
PID:780 -
C:\Windows\SysWOW64\Iannpa32.exeC:\Windows\system32\Iannpa32.exe48⤵
- Executes dropped EXE
PID:3508 -
C:\Windows\SysWOW64\Ipckqnja.exeC:\Windows\system32\Ipckqnja.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:468 -
C:\Windows\SysWOW64\Pengna32.exeC:\Windows\system32\Pengna32.exe50⤵
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\Blmamh32.exeC:\Windows\system32\Blmamh32.exe51⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\Beefenie.exeC:\Windows\system32\Beefenie.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:3480 -
C:\Windows\SysWOW64\Bbifobho.exeC:\Windows\system32\Bbifobho.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:1692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Bhfogiff.exeC:\Windows\system32\Bhfogiff.exe1⤵
- Executes dropped EXE
PID:3764 -
C:\Windows\SysWOW64\Bblcda32.exeC:\Windows\system32\Bblcda32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1424 -
C:\Windows\SysWOW64\Ckghid32.exeC:\Windows\system32\Ckghid32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\Ckidoc32.exeC:\Windows\system32\Ckidoc32.exe4⤵
- Executes dropped EXE
PID:1276 -
C:\Windows\SysWOW64\Ckladcoa.exeC:\Windows\system32\Ckladcoa.exe5⤵
- Executes dropped EXE
PID:372 -
C:\Windows\SysWOW64\Dkedjbgg.exeC:\Windows\system32\Dkedjbgg.exe6⤵
- Executes dropped EXE
PID:5104 -
C:\Windows\SysWOW64\Dldpde32.exeC:\Windows\system32\Dldpde32.exe7⤵
- Executes dropped EXE
PID:3836 -
C:\Windows\SysWOW64\Ecmebm32.exeC:\Windows\system32\Ecmebm32.exe8⤵
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\Femndhgh.exeC:\Windows\system32\Femndhgh.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:412 -
C:\Windows\SysWOW64\Ffpjihee.exeC:\Windows\system32\Ffpjihee.exe10⤵
- Executes dropped EXE
PID:1432 -
C:\Windows\SysWOW64\Fcckcl32.exeC:\Windows\system32\Fcckcl32.exe11⤵
- Executes dropped EXE
PID:3496 -
C:\Windows\SysWOW64\Gfkjef32.exeC:\Windows\system32\Gfkjef32.exe12⤵
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\Hcimei32.exeC:\Windows\system32\Hcimei32.exe13⤵PID:2216
-
C:\Windows\SysWOW64\Hcpcehko.exeC:\Windows\system32\Hcpcehko.exe14⤵PID:3884
-
C:\Windows\SysWOW64\Icbpkg32.exeC:\Windows\system32\Icbpkg32.exe15⤵PID:4812
-
C:\Windows\SysWOW64\Iioicn32.exeC:\Windows\system32\Iioicn32.exe16⤵
- Drops file in System32 directory
PID:3456 -
C:\Windows\SysWOW64\Ilpaei32.exeC:\Windows\system32\Ilpaei32.exe17⤵PID:1140
-
C:\Windows\SysWOW64\Jpbdfgge.exeC:\Windows\system32\Jpbdfgge.exe18⤵
- Modifies registry class
PID:4892 -
C:\Windows\SysWOW64\Jijhom32.exeC:\Windows\system32\Jijhom32.exe19⤵PID:2228
-
C:\Windows\SysWOW64\Jeaidn32.exeC:\Windows\system32\Jeaidn32.exe20⤵PID:1048
-
C:\Windows\SysWOW64\Jpkfmfok.exeC:\Windows\system32\Jpkfmfok.exe21⤵
- Modifies registry class
PID:4744 -
C:\Windows\SysWOW64\Jfeoip32.exeC:\Windows\system32\Jfeoip32.exe22⤵
- Modifies registry class
PID:4492 -
C:\Windows\SysWOW64\Kihdqkaf.exeC:\Windows\system32\Kihdqkaf.exe23⤵PID:4836
-
C:\Windows\SysWOW64\Kbebdpca.exeC:\Windows\system32\Kbebdpca.exe24⤵
- Modifies registry class
PID:3992 -
C:\Windows\SysWOW64\Llngmeja.exeC:\Windows\system32\Llngmeja.exe25⤵
- Drops file in System32 directory
PID:3876 -
C:\Windows\SysWOW64\Lmncgh32.exeC:\Windows\system32\Lmncgh32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4880 -
C:\Windows\SysWOW64\Lpnlicne.exeC:\Windows\system32\Lpnlicne.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3000 -
C:\Windows\SysWOW64\Mgfqgkib.exeC:\Windows\system32\Mgfqgkib.exe28⤵PID:1168
-
C:\Windows\SysWOW64\Nigjifgc.exeC:\Windows\system32\Nigjifgc.exe29⤵PID:116
-
C:\Windows\SysWOW64\Nljopa32.exeC:\Windows\system32\Nljopa32.exe30⤵
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\Ngpcmj32.exeC:\Windows\system32\Ngpcmj32.exe31⤵PID:3384
-
C:\Windows\SysWOW64\Nnjljd32.exeC:\Windows\system32\Nnjljd32.exe32⤵PID:3872
-
C:\Windows\SysWOW64\Odkjgm32.exeC:\Windows\system32\Odkjgm32.exe33⤵PID:4116
-
C:\Windows\SysWOW64\Oncopcqj.exeC:\Windows\system32\Oncopcqj.exe34⤵PID:4964
-
C:\Windows\SysWOW64\Oqfdgn32.exeC:\Windows\system32\Oqfdgn32.exe35⤵PID:4552
-
C:\Windows\SysWOW64\Pjnipc32.exeC:\Windows\system32\Pjnipc32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4120 -
C:\Windows\SysWOW64\Pddmml32.exeC:\Windows\system32\Pddmml32.exe37⤵
- Drops file in System32 directory
PID:3272 -
C:\Windows\SysWOW64\Pnakaa32.exeC:\Windows\system32\Pnakaa32.exe38⤵PID:3576
-
C:\Windows\SysWOW64\Pgiojf32.exeC:\Windows\system32\Pgiojf32.exe39⤵PID:1376
-
C:\Windows\SysWOW64\Qnfdlpqd.exeC:\Windows\system32\Qnfdlpqd.exe40⤵PID:4564
-
C:\Windows\SysWOW64\Qcbmegol.exeC:\Windows\system32\Qcbmegol.exe41⤵
- Drops file in System32 directory
PID:4244 -
C:\Windows\SysWOW64\Aegbji32.exeC:\Windows\system32\Aegbji32.exe42⤵
- Drops file in System32 directory
PID:5152 -
C:\Windows\SysWOW64\Aancojgn.exeC:\Windows\system32\Aancojgn.exe43⤵
- Drops file in System32 directory
PID:5216 -
C:\Windows\SysWOW64\Bfcompnj.exeC:\Windows\system32\Bfcompnj.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5352 -
C:\Windows\SysWOW64\Ikagpcof.exeC:\Windows\system32\Ikagpcof.exe45⤵PID:5528
-
C:\Windows\SysWOW64\Kieaqe32.exeC:\Windows\system32\Kieaqe32.exe46⤵
- Drops file in System32 directory
PID:5628 -
C:\Windows\SysWOW64\Mbqkfhfh.exeC:\Windows\system32\Mbqkfhfh.exe47⤵PID:5704
-
C:\Windows\SysWOW64\Miaica32.exeC:\Windows\system32\Miaica32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5744 -
C:\Windows\SysWOW64\Mplapkoj.exeC:\Windows\system32\Mplapkoj.exe49⤵PID:5804
-
C:\Windows\SysWOW64\Npedfjfo.exeC:\Windows\system32\Npedfjfo.exe50⤵
- Drops file in System32 directory
PID:5852 -
C:\Windows\SysWOW64\Nllekk32.exeC:\Windows\system32\Nllekk32.exe51⤵PID:5900
-
C:\Windows\SysWOW64\Nojagf32.exeC:\Windows\system32\Nojagf32.exe52⤵
- Modifies registry class
PID:5940 -
C:\Windows\SysWOW64\Nedjdp32.exeC:\Windows\system32\Nedjdp32.exe53⤵
- Modifies registry class
PID:5980 -
C:\Windows\SysWOW64\Opjnai32.exeC:\Windows\system32\Opjnai32.exe54⤵PID:6028
-
C:\Windows\SysWOW64\Oibbjoij.exeC:\Windows\system32\Oibbjoij.exe55⤵PID:6072
-
C:\Windows\SysWOW64\Oookbega.exeC:\Windows\system32\Oookbega.exe56⤵PID:6112
-
C:\Windows\SysWOW64\Oidopn32.exeC:\Windows\system32\Oidopn32.exe57⤵PID:5144
-
C:\Windows\SysWOW64\Ooaghe32.exeC:\Windows\system32\Ooaghe32.exe58⤵PID:2952
-
C:\Windows\SysWOW64\Ojkepmqp.exeC:\Windows\system32\Ojkepmqp.exe59⤵PID:4636
-
C:\Windows\SysWOW64\Ppemmg32.exeC:\Windows\system32\Ppemmg32.exe60⤵PID:5232
-
C:\Windows\SysWOW64\Pllnbh32.exeC:\Windows\system32\Pllnbh32.exe61⤵
- Drops file in System32 directory
PID:5344 -
C:\Windows\SysWOW64\Pgfljqia.exeC:\Windows\system32\Pgfljqia.exe62⤵PID:1084
-
C:\Windows\SysWOW64\Plcdbghi.exeC:\Windows\system32\Plcdbghi.exe63⤵PID:4288
-
C:\Windows\SysWOW64\Pgihppgo.exeC:\Windows\system32\Pgihppgo.exe64⤵PID:5436
-
C:\Windows\SysWOW64\Qhjegh32.exeC:\Windows\system32\Qhjegh32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1268 -
C:\Windows\SysWOW64\Qodmdb32.exeC:\Windows\system32\Qodmdb32.exe66⤵PID:5400
-
C:\Windows\SysWOW64\Qfneamlf.exeC:\Windows\system32\Qfneamlf.exe67⤵PID:5448
-
C:\Windows\SysWOW64\Ajcdhj32.exeC:\Windows\system32\Ajcdhj32.exe68⤵PID:5600
-
C:\Windows\SysWOW64\Bqafpc32.exeC:\Windows\system32\Bqafpc32.exe69⤵
- Modifies registry class
PID:4848 -
C:\Windows\SysWOW64\Bcpblo32.exeC:\Windows\system32\Bcpblo32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5656 -
C:\Windows\SysWOW64\Bogcqpdd.exeC:\Windows\system32\Bogcqpdd.exe71⤵PID:4184
-
C:\Windows\SysWOW64\Bjlgnh32.exeC:\Windows\system32\Bjlgnh32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4572 -
C:\Windows\SysWOW64\Bpniaool.exeC:\Windows\system32\Bpniaool.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5844 -
C:\Windows\SysWOW64\Cjjcof32.exeC:\Windows\system32\Cjjcof32.exe74⤵PID:5888
-
C:\Windows\SysWOW64\Ccbhhl32.exeC:\Windows\system32\Ccbhhl32.exe75⤵PID:6020
-
C:\Windows\SysWOW64\Dplebmbl.exeC:\Windows\system32\Dplebmbl.exe76⤵PID:6064
-
C:\Windows\SysWOW64\Didjkbim.exeC:\Windows\system32\Didjkbim.exe77⤵PID:5136
-
C:\Windows\SysWOW64\Dpnbhl32.exeC:\Windows\system32\Dpnbhl32.exe78⤵
- Modifies registry class
PID:5212 -
C:\Windows\SysWOW64\Dfhjefhf.exeC:\Windows\system32\Dfhjefhf.exe79⤵
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\Dannbogl.exeC:\Windows\system32\Dannbogl.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:1488 -
C:\Windows\SysWOW64\Djfckenm.exeC:\Windows\system32\Djfckenm.exe81⤵
- Drops file in System32 directory
PID:1720 -
C:\Windows\SysWOW64\Dhjcdimf.exeC:\Windows\system32\Dhjcdimf.exe82⤵PID:5384
-
C:\Windows\SysWOW64\Dmglmpkn.exeC:\Windows\system32\Dmglmpkn.exe83⤵PID:2264
-
C:\Windows\SysWOW64\Gkdhcqcj.exeC:\Windows\system32\Gkdhcqcj.exe84⤵PID:5504
-
C:\Windows\SysWOW64\Ganppk32.exeC:\Windows\system32\Ganppk32.exe85⤵PID:4140
-
C:\Windows\SysWOW64\Haefqjeo.exeC:\Windows\system32\Haefqjeo.exe86⤵
- Modifies registry class
PID:5592 -
C:\Windows\SysWOW64\Hgboiq32.exeC:\Windows\system32\Hgboiq32.exe87⤵PID:1548
-
C:\Windows\SysWOW64\Hnlgekkc.exeC:\Windows\system32\Hnlgekkc.exe88⤵PID:5664
-
C:\Windows\SysWOW64\Hpmpgfhd.exeC:\Windows\system32\Hpmpgfhd.exe89⤵
- Modifies registry class
PID:5696 -
C:\Windows\SysWOW64\Hgghdp32.exeC:\Windows\system32\Hgghdp32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Halmaiog.exeC:\Windows\system32\Halmaiog.exe91⤵PID:5788
-
C:\Windows\SysWOW64\Idpbhc32.exeC:\Windows\system32\Idpbhc32.exe92⤵
- Drops file in System32 directory
PID:5896 -
C:\Windows\SysWOW64\Inmplh32.exeC:\Windows\system32\Inmplh32.exe93⤵PID:1152
-
C:\Windows\SysWOW64\Ihbdja32.exeC:\Windows\system32\Ihbdja32.exe94⤵
- Drops file in System32 directory
PID:1696 -
C:\Windows\SysWOW64\Ijcaaibe.exeC:\Windows\system32\Ijcaaibe.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6128 -
C:\Windows\SysWOW64\Iqmincia.exeC:\Windows\system32\Iqmincia.exe96⤵PID:1472
-
C:\Windows\SysWOW64\Jkggfl32.exeC:\Windows\system32\Jkggfl32.exe97⤵PID:184
-
C:\Windows\SysWOW64\Lbddpclj.exeC:\Windows\system32\Lbddpclj.exe98⤵PID:3212
-
C:\Windows\SysWOW64\Lgamhjja.exeC:\Windows\system32\Lgamhjja.exe99⤵PID:4724
-
C:\Windows\SysWOW64\Lbgaecjg.exeC:\Windows\system32\Lbgaecjg.exe100⤵PID:2800
-
C:\Windows\SysWOW64\Liqibm32.exeC:\Windows\system32\Liqibm32.exe101⤵
- Drops file in System32 directory
PID:208 -
C:\Windows\SysWOW64\Lbinkb32.exeC:\Windows\system32\Lbinkb32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5404 -
C:\Windows\SysWOW64\Llabchoe.exeC:\Windows\system32\Llabchoe.exe103⤵PID:5440
-
C:\Windows\SysWOW64\Lnbkeclf.exeC:\Windows\system32\Lnbkeclf.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1452 -
C:\Windows\SysWOW64\Qlggcp32.exeC:\Windows\system32\Qlggcp32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4316 -
C:\Windows\SysWOW64\Aepklffh.exeC:\Windows\system32\Aepklffh.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4972 -
C:\Windows\SysWOW64\Blecdn32.exeC:\Windows\system32\Blecdn32.exe107⤵PID:2844
-
C:\Windows\SysWOW64\Ccinggcj.exeC:\Windows\system32\Ccinggcj.exe108⤵PID:2300
-
C:\Windows\SysWOW64\Cooolhin.exeC:\Windows\system32\Cooolhin.exe109⤵PID:4960
-
C:\Windows\SysWOW64\Cobkbhgk.exeC:\Windows\system32\Cobkbhgk.exe110⤵PID:3540
-
C:\Windows\SysWOW64\Cjgpoq32.exeC:\Windows\system32\Cjgpoq32.exe111⤵PID:5912
-
C:\Windows\SysWOW64\Cbbdcc32.exeC:\Windows\system32\Cbbdcc32.exe112⤵PID:3512
-
C:\Windows\SysWOW64\Ccbanfko.exeC:\Windows\system32\Ccbanfko.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6096 -
C:\Windows\SysWOW64\Doiabgqc.exeC:\Windows\system32\Doiabgqc.exe114⤵PID:2776
-
C:\Windows\SysWOW64\Dkpbgh32.exeC:\Windows\system32\Dkpbgh32.exe115⤵PID:4748
-
C:\Windows\SysWOW64\Dbikdbnd.exeC:\Windows\system32\Dbikdbnd.exe116⤵PID:1988
-
C:\Windows\SysWOW64\Dmooak32.exeC:\Windows\system32\Dmooak32.exe117⤵PID:4624
-
C:\Windows\SysWOW64\Elkbcf32.exeC:\Windows\system32\Elkbcf32.exe118⤵PID:3904
-
C:\Windows\SysWOW64\Ejoogm32.exeC:\Windows\system32\Ejoogm32.exe119⤵PID:532
-
C:\Windows\SysWOW64\Elpknehe.exeC:\Windows\system32\Elpknehe.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:852 -
C:\Windows\SysWOW64\Efepln32.exeC:\Windows\system32\Efepln32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5584 -
C:\Windows\SysWOW64\Elbhde32.exeC:\Windows\system32\Elbhde32.exe122⤵PID:4268
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-