Analysis
-
max time kernel
172s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 20:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.bc08c490e29c5f4249158e59ef6ba790.exe
Resource
win7-20231020-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.bc08c490e29c5f4249158e59ef6ba790.exe
Resource
win10v2004-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.bc08c490e29c5f4249158e59ef6ba790.exe
-
Size
98KB
-
MD5
bc08c490e29c5f4249158e59ef6ba790
-
SHA1
3dc595469af44ee0d9dc0e4f60ec5f64d8683f6e
-
SHA256
1f65764816872e72ba88a43801c2b517576f956a65200a40878264e9be671214
-
SHA512
67ff4794567fd323f63397ce73b1d33078cf68124e9dcc724b6a4c1d17e1d0a8fcc2f74923a63918356efb15d2e647ff519241cc12a3b1f695391498ffae6350
-
SSDEEP
3072:yY8HW8zKOaGC5wXPcPgV+LYMbEXeFKPD375lHzpa1P:yY8LBCAcEXeYr75lHzpaF
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkqggdoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ejchmpei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hoibmmpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iapbhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mlhidg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aojljkkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ekmhnpfl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpbfnb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkgecdip.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggqingie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fimhcbkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Knpeii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lllaqn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhpceb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icoobl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pelacg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aebhaede.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnbjkj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omhicj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Omhicj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnnfjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ekngob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fgegdc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbqmmb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojmcej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pllnbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mkdihm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lddbej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ljepbbli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Knfepldb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgdodq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Chiipg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Feimkjdb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjjjanla.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chddid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ihmfmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lkflik32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgpqhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aekdolkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cljomc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icalij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkigmiai.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chiipg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fgbfbc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdddjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Feimkjdb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cicqcgee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Deqqnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhkghofb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnpdom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgacaopj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Efbllhfb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilhkcmib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmhcmfif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gokmfe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doeifpkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eoilfidj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jpnhof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ibhlmgdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oanodnip.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Manaegon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Heoomjhp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmbcik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ipdfheal.exe -
Executes dropped EXE 64 IoCs
pid Process 3548 Gokmfe32.exe 4368 Knfepldb.exe 2076 Lhgiic32.exe 4184 Locnlmoe.exe 528 Neaokboj.exe 384 Ofjokc32.exe 2476 Pmbcik32.exe 1124 Aekdolkj.exe 464 Acaanp32.exe 4140 Bipcei32.exe 720 Cljomc32.exe 64 Dlcaca32.exe 4400 Dncnnd32.exe 4320 Dnjdncio.exe 3084 Ggldde32.exe 4432 Gfaaebnj.exe 3424 Hfhgfaha.exe 204 Hoibmmpi.exe 1792 Ihfpabbd.exe 1280 Imeeohoi.exe 4924 Igmjhnej.exe 3092 Jgpfmncg.exe 564 Jhdlbp32.exe 1472 Khplnn32.exe 3292 Lhkkjl32.exe 2316 Mbkfcabb.exe 4684 Ninafj32.exe 3452 Nbfeoohe.exe 2368 Obgofmjb.exe 4828 Pelacg32.exe 1440 Qnlkllcf.exe 4556 Bpggbm32.exe 4524 Cpedckdl.exe 3924 Djnaco32.exe 3932 Fiajfi32.exe 1868 Kkdnjd32.exe 5064 Kmgdaokh.exe 2452 Mgidgakk.exe 3444 Nbhkjicf.exe 1096 Odpjmcjp.exe 4520 Ojmcej32.exe 1340 Pjffkhpl.exe 3736 Qgopplkq.exe 4880 Ajbegg32.exe 5084 Caeiam32.exe 4832 Doeifpkk.exe 4448 Edkddeag.exe 3688 Hbiakf32.exe 4612 Jpbdfgge.exe 3956 Kpncbemh.exe 2756 Kpeibdfp.exe 1948 Ofgmdf32.exe 2868 Canlfh32.exe 920 Cfdhdn32.exe 4628 Dacohegc.exe 1744 Eoilfidj.exe 3520 Eajehd32.exe 3496 Femgia32.exe 1328 Fefjpp32.exe 2444 Gkcbhgii.exe 1812 Gamjea32.exe 3896 Gdncfl32.exe 4160 Ggqingie.exe 3456 Hhbbmjne.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mlmkkk32.dll Femgia32.exe File created C:\Windows\SysWOW64\Kqojah32.dll Kodnfqgm.exe File created C:\Windows\SysWOW64\Edkddeag.exe Doeifpkk.exe File created C:\Windows\SysWOW64\Cocamaam.exe Chiipg32.exe File created C:\Windows\SysWOW64\Mdiqpp32.dll Knlknigf.exe File created C:\Windows\SysWOW64\Omdpio32.exe Ofjgmdgg.exe File created C:\Windows\SysWOW64\Khcgpd32.exe Knkcfobb.exe File created C:\Windows\SysWOW64\Modbcj32.dll Mbldbcog.exe File created C:\Windows\SysWOW64\Gldgflba.exe Gfgnnedj.exe File created C:\Windows\SysWOW64\Lfmmfakl.dll Eieoenad.exe File created C:\Windows\SysWOW64\Mlcpmgek.dll Ihijec32.exe File created C:\Windows\SysWOW64\Gehlmnma.dll Lkflik32.exe File opened for modification C:\Windows\SysWOW64\Jfkehk32.exe Ikmnec32.exe File created C:\Windows\SysWOW64\Hkfhkhnb.dll Agdcja32.exe File opened for modification C:\Windows\SysWOW64\Nmfmnjgh.exe Ncmhee32.exe File created C:\Windows\SysWOW64\Lgopofnb.dll Jpbdfgge.exe File created C:\Windows\SysWOW64\Eglkhk32.exe Dafpjf32.exe File created C:\Windows\SysWOW64\Clbbhd32.dll Fcpkjn32.exe File created C:\Windows\SysWOW64\Ihllqb32.dll Kcgnkgkl.exe File opened for modification C:\Windows\SysWOW64\Agdcja32.exe Amloakki.exe File created C:\Windows\SysWOW64\Jnomkf32.dll Mikcbb32.exe File created C:\Windows\SysWOW64\Icoobl32.exe Ihijec32.exe File created C:\Windows\SysWOW64\Fjicfhhf.exe Fcpkjn32.exe File created C:\Windows\SysWOW64\Lapoic32.exe Ljfflipe.exe File created C:\Windows\SysWOW64\Nmpdqj32.exe Nfeldplp.exe File opened for modification C:\Windows\SysWOW64\Oboinqoa.exe Ombafjaj.exe File opened for modification C:\Windows\SysWOW64\Qobhepjf.exe Qhhphebj.exe File created C:\Windows\SysWOW64\Jehmgg32.exe Jialbf32.exe File created C:\Windows\SysWOW64\Mqgpigdf.dll Lojfbc32.exe File created C:\Windows\SysWOW64\Kqqjfe32.dll Iaaakj32.exe File opened for modification C:\Windows\SysWOW64\Hclifo32.exe Hlbaiefe.exe File opened for modification C:\Windows\SysWOW64\Gkcbhgii.exe Fefjpp32.exe File created C:\Windows\SysWOW64\Dbikdbnd.exe Dkpbgh32.exe File created C:\Windows\SysWOW64\Lacicolf.exe Lkiage32.exe File created C:\Windows\SysWOW64\Cacdhnqh.dll Lapoic32.exe File created C:\Windows\SysWOW64\Bndbjd32.dll Efbllhfb.exe File opened for modification C:\Windows\SysWOW64\Ffgegh32.exe Epmmjnkp.exe File created C:\Windows\SysWOW64\Olphlcdb.exe Oefpoi32.exe File created C:\Windows\SysWOW64\Dbphmedd.exe Dgjcomdo.exe File opened for modification C:\Windows\SysWOW64\Bpfhkp32.exe Ajlpnfhf.exe File created C:\Windows\SysWOW64\Bbmbkj32.dll Pcacll32.exe File opened for modification C:\Windows\SysWOW64\Khcgpd32.exe Knkcfobb.exe File opened for modification C:\Windows\SysWOW64\Koaaaaip.exe Knpeii32.exe File created C:\Windows\SysWOW64\Lennih32.exe Ljfmgocq.exe File created C:\Windows\SysWOW64\Ibcckm32.dll Hembhjjc.exe File created C:\Windows\SysWOW64\Iapbhi32.exe Ikodkq32.exe File opened for modification C:\Windows\SysWOW64\Nblmia32.exe Nmpdqj32.exe File created C:\Windows\SysWOW64\Ccckoq32.dll Bpggbm32.exe File opened for modification C:\Windows\SysWOW64\Imbpam32.exe Hoaocf32.exe File created C:\Windows\SysWOW64\Ppeikjle.exe Phjdggoj.exe File created C:\Windows\SysWOW64\Iolhdn32.exe Ihbphcpo.exe File opened for modification C:\Windows\SysWOW64\Cngfeo32.exe Bfdkpn32.exe File created C:\Windows\SysWOW64\Ikabqmaj.dll Gijbgkol.exe File created C:\Windows\SysWOW64\Epdigjaa.exe Enemjobn.exe File opened for modification C:\Windows\SysWOW64\Lapoic32.exe Ljfflipe.exe File created C:\Windows\SysWOW64\Ibhlmgdj.exe Ihknibbo.exe File opened for modification C:\Windows\SysWOW64\Eblpqono.exe Ejlban32.exe File opened for modification C:\Windows\SysWOW64\Phombg32.exe Pmiidnko.exe File opened for modification C:\Windows\SysWOW64\Cjomeikm.exe Ciigbbjd.exe File created C:\Windows\SysWOW64\Ddbepo32.dll Npgjlfhi.exe File created C:\Windows\SysWOW64\Pjfckh32.dll Mijlhl32.exe File created C:\Windows\SysWOW64\Efdenq32.dll Hmpclnof.exe File created C:\Windows\SysWOW64\Cfhkolhc.dll Aaenlj32.exe File opened for modification C:\Windows\SysWOW64\Gnlege32.exe Ggbmkk32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eagmlf32.dll" Mdjjamlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oidbqoii.dll" Bbflpi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ihkigd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Naeakp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gojgea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Locnlmoe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pfoahd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iacnbc32.dll" Hkohmnal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cbihfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ejdogfie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mmddel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlafbnic.dll" Fieacc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omkdqgbq.dll" Fmjqjqao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddpgko32.dll" Mdlgflje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lflpgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ggldde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcmlcb32.dll" Djklah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nljeagnn.dll" Oehldi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oimceg32.dll" Epgndedc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibhjkk32.dll" Ibhlmgdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ojmcej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Femgia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iildfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lllaqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dpjfqljl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cgejdm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} NEAS.bc08c490e29c5f4249158e59ef6ba790.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gbcfpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbipqd32.dll" Mbjglcaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Amloakki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ahbjij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kgacaopj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgfalfne.dll" Ibqndm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbheaj32.dll" Bkpfch32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nimbipim.dll" Nbhkjicf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kliieekf.dll" Diamde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hlbaiefe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Klndopje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Phombg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oondhocf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cjomeikm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ibhlmgdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aabafkgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjcmlj32.dll" Lllaqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knoibbcg.dll" Fgegdc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hlgjdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmciko32.dll" Mldhkifg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oloaamqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ghpohg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mjaonabl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bdmmnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fongicen.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Flinddpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nhfpjghi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ffnkggld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hkohmnal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lkqggdoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mikcbb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Agdcja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnlijb32.dll" Dlffja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gciclcmc.dll" Hgkigd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofgmdf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cpdgjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Icacbohp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3804 wrote to memory of 3548 3804 NEAS.bc08c490e29c5f4249158e59ef6ba790.exe 92 PID 3804 wrote to memory of 3548 3804 NEAS.bc08c490e29c5f4249158e59ef6ba790.exe 92 PID 3804 wrote to memory of 3548 3804 NEAS.bc08c490e29c5f4249158e59ef6ba790.exe 92 PID 3548 wrote to memory of 4368 3548 Gokmfe32.exe 93 PID 3548 wrote to memory of 4368 3548 Gokmfe32.exe 93 PID 3548 wrote to memory of 4368 3548 Gokmfe32.exe 93 PID 4368 wrote to memory of 2076 4368 Knfepldb.exe 94 PID 4368 wrote to memory of 2076 4368 Knfepldb.exe 94 PID 4368 wrote to memory of 2076 4368 Knfepldb.exe 94 PID 2076 wrote to memory of 4184 2076 Lhgiic32.exe 95 PID 2076 wrote to memory of 4184 2076 Lhgiic32.exe 95 PID 2076 wrote to memory of 4184 2076 Lhgiic32.exe 95 PID 4184 wrote to memory of 528 4184 Locnlmoe.exe 96 PID 4184 wrote to memory of 528 4184 Locnlmoe.exe 96 PID 4184 wrote to memory of 528 4184 Locnlmoe.exe 96 PID 528 wrote to memory of 384 528 Neaokboj.exe 97 PID 528 wrote to memory of 384 528 Neaokboj.exe 97 PID 528 wrote to memory of 384 528 Neaokboj.exe 97 PID 384 wrote to memory of 2476 384 Ofjokc32.exe 98 PID 384 wrote to memory of 2476 384 Ofjokc32.exe 98 PID 384 wrote to memory of 2476 384 Ofjokc32.exe 98 PID 2476 wrote to memory of 1124 2476 Pmbcik32.exe 99 PID 2476 wrote to memory of 1124 2476 Pmbcik32.exe 99 PID 2476 wrote to memory of 1124 2476 Pmbcik32.exe 99 PID 1124 wrote to memory of 464 1124 Aekdolkj.exe 100 PID 1124 wrote to memory of 464 1124 Aekdolkj.exe 100 PID 1124 wrote to memory of 464 1124 Aekdolkj.exe 100 PID 464 wrote to memory of 4140 464 Acaanp32.exe 101 PID 464 wrote to memory of 4140 464 Acaanp32.exe 101 PID 464 wrote to memory of 4140 464 Acaanp32.exe 101 PID 4140 wrote to memory of 720 4140 Bipcei32.exe 102 PID 4140 wrote to memory of 720 4140 Bipcei32.exe 102 PID 4140 wrote to memory of 720 4140 Bipcei32.exe 102 PID 720 wrote to memory of 64 720 Cljomc32.exe 103 PID 720 wrote to memory of 64 720 Cljomc32.exe 103 PID 720 wrote to memory of 64 720 Cljomc32.exe 103 PID 64 wrote to memory of 4400 64 Dlcaca32.exe 104 PID 64 wrote to memory of 4400 64 Dlcaca32.exe 104 PID 64 wrote to memory of 4400 64 Dlcaca32.exe 104 PID 4400 wrote to memory of 4320 4400 Dncnnd32.exe 105 PID 4400 wrote to memory of 4320 4400 Dncnnd32.exe 105 PID 4400 wrote to memory of 4320 4400 Dncnnd32.exe 105 PID 4320 wrote to memory of 3084 4320 Dnjdncio.exe 106 PID 4320 wrote to memory of 3084 4320 Dnjdncio.exe 106 PID 4320 wrote to memory of 3084 4320 Dnjdncio.exe 106 PID 3084 wrote to memory of 4432 3084 Ggldde32.exe 107 PID 3084 wrote to memory of 4432 3084 Ggldde32.exe 107 PID 3084 wrote to memory of 4432 3084 Ggldde32.exe 107 PID 4432 wrote to memory of 3424 4432 Gfaaebnj.exe 108 PID 4432 wrote to memory of 3424 4432 Gfaaebnj.exe 108 PID 4432 wrote to memory of 3424 4432 Gfaaebnj.exe 108 PID 3424 wrote to memory of 204 3424 Hfhgfaha.exe 109 PID 3424 wrote to memory of 204 3424 Hfhgfaha.exe 109 PID 3424 wrote to memory of 204 3424 Hfhgfaha.exe 109 PID 204 wrote to memory of 1792 204 Hoibmmpi.exe 110 PID 204 wrote to memory of 1792 204 Hoibmmpi.exe 110 PID 204 wrote to memory of 1792 204 Hoibmmpi.exe 110 PID 1792 wrote to memory of 1280 1792 Ihfpabbd.exe 111 PID 1792 wrote to memory of 1280 1792 Ihfpabbd.exe 111 PID 1792 wrote to memory of 1280 1792 Ihfpabbd.exe 111 PID 1280 wrote to memory of 4924 1280 Imeeohoi.exe 112 PID 1280 wrote to memory of 4924 1280 Imeeohoi.exe 112 PID 1280 wrote to memory of 4924 1280 Imeeohoi.exe 112 PID 4924 wrote to memory of 3092 4924 Igmjhnej.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.bc08c490e29c5f4249158e59ef6ba790.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.bc08c490e29c5f4249158e59ef6ba790.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\Gokmfe32.exeC:\Windows\system32\Gokmfe32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\Knfepldb.exeC:\Windows\system32\Knfepldb.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\Lhgiic32.exeC:\Windows\system32\Lhgiic32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\Locnlmoe.exeC:\Windows\system32\Locnlmoe.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Neaokboj.exeC:\Windows\system32\Neaokboj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\Ofjokc32.exeC:\Windows\system32\Ofjokc32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\Pmbcik32.exeC:\Windows\system32\Pmbcik32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\Aekdolkj.exeC:\Windows\system32\Aekdolkj.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\Acaanp32.exeC:\Windows\system32\Acaanp32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\Bipcei32.exeC:\Windows\system32\Bipcei32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\Cljomc32.exeC:\Windows\system32\Cljomc32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\Dlcaca32.exeC:\Windows\system32\Dlcaca32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\Dncnnd32.exeC:\Windows\system32\Dncnnd32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\Dnjdncio.exeC:\Windows\system32\Dnjdncio.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\Ggldde32.exeC:\Windows\system32\Ggldde32.exe16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\Gfaaebnj.exeC:\Windows\system32\Gfaaebnj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\Hfhgfaha.exeC:\Windows\system32\Hfhgfaha.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\Hoibmmpi.exeC:\Windows\system32\Hoibmmpi.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\SysWOW64\Ihfpabbd.exeC:\Windows\system32\Ihfpabbd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\Imeeohoi.exeC:\Windows\system32\Imeeohoi.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\Igmjhnej.exeC:\Windows\system32\Igmjhnej.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\Jgpfmncg.exeC:\Windows\system32\Jgpfmncg.exe23⤵
- Executes dropped EXE
PID:3092 -
C:\Windows\SysWOW64\Jhdlbp32.exeC:\Windows\system32\Jhdlbp32.exe24⤵
- Executes dropped EXE
PID:564 -
C:\Windows\SysWOW64\Khplnn32.exeC:\Windows\system32\Khplnn32.exe25⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\Lhkkjl32.exeC:\Windows\system32\Lhkkjl32.exe26⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\SysWOW64\Mbkfcabb.exeC:\Windows\system32\Mbkfcabb.exe27⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\Ninafj32.exeC:\Windows\system32\Ninafj32.exe28⤵
- Executes dropped EXE
PID:4684 -
C:\Windows\SysWOW64\Nbfeoohe.exeC:\Windows\system32\Nbfeoohe.exe29⤵
- Executes dropped EXE
PID:3452 -
C:\Windows\SysWOW64\Obgofmjb.exeC:\Windows\system32\Obgofmjb.exe30⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\Pelacg32.exeC:\Windows\system32\Pelacg32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4828 -
C:\Windows\SysWOW64\Qnlkllcf.exeC:\Windows\system32\Qnlkllcf.exe32⤵
- Executes dropped EXE
PID:1440 -
C:\Windows\SysWOW64\Bpggbm32.exeC:\Windows\system32\Bpggbm32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4556 -
C:\Windows\SysWOW64\Cpedckdl.exeC:\Windows\system32\Cpedckdl.exe34⤵
- Executes dropped EXE
PID:4524 -
C:\Windows\SysWOW64\Djnaco32.exeC:\Windows\system32\Djnaco32.exe35⤵
- Executes dropped EXE
PID:3924 -
C:\Windows\SysWOW64\Fiajfi32.exeC:\Windows\system32\Fiajfi32.exe36⤵
- Executes dropped EXE
PID:3932 -
C:\Windows\SysWOW64\Kkdnjd32.exeC:\Windows\system32\Kkdnjd32.exe37⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\Kmgdaokh.exeC:\Windows\system32\Kmgdaokh.exe38⤵
- Executes dropped EXE
PID:5064 -
C:\Windows\SysWOW64\Mgidgakk.exeC:\Windows\system32\Mgidgakk.exe39⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\Nbhkjicf.exeC:\Windows\system32\Nbhkjicf.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:3444 -
C:\Windows\SysWOW64\Odpjmcjp.exeC:\Windows\system32\Odpjmcjp.exe41⤵
- Executes dropped EXE
PID:1096 -
C:\Windows\SysWOW64\Ojmcej32.exeC:\Windows\system32\Ojmcej32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4520 -
C:\Windows\SysWOW64\Pjffkhpl.exeC:\Windows\system32\Pjffkhpl.exe43⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\Qgopplkq.exeC:\Windows\system32\Qgopplkq.exe44⤵
- Executes dropped EXE
PID:3736 -
C:\Windows\SysWOW64\Ajbegg32.exeC:\Windows\system32\Ajbegg32.exe45⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\Caeiam32.exeC:\Windows\system32\Caeiam32.exe46⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\Doeifpkk.exeC:\Windows\system32\Doeifpkk.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4832 -
C:\Windows\SysWOW64\Edkddeag.exeC:\Windows\system32\Edkddeag.exe48⤵
- Executes dropped EXE
PID:4448 -
C:\Windows\SysWOW64\Hbiakf32.exeC:\Windows\system32\Hbiakf32.exe49⤵
- Executes dropped EXE
PID:3688 -
C:\Windows\SysWOW64\Jpbdfgge.exeC:\Windows\system32\Jpbdfgge.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4612 -
C:\Windows\SysWOW64\Kpncbemh.exeC:\Windows\system32\Kpncbemh.exe51⤵
- Executes dropped EXE
PID:3956 -
C:\Windows\SysWOW64\Kpeibdfp.exeC:\Windows\system32\Kpeibdfp.exe52⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\Ofgmdf32.exeC:\Windows\system32\Ofgmdf32.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:1948 -
C:\Windows\SysWOW64\Canlfh32.exeC:\Windows\system32\Canlfh32.exe54⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\Cfdhdn32.exeC:\Windows\system32\Cfdhdn32.exe55⤵
- Executes dropped EXE
PID:920 -
C:\Windows\SysWOW64\Dacohegc.exeC:\Windows\system32\Dacohegc.exe56⤵
- Executes dropped EXE
PID:4628 -
C:\Windows\SysWOW64\Eoilfidj.exeC:\Windows\system32\Eoilfidj.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\Eajehd32.exeC:\Windows\system32\Eajehd32.exe58⤵
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\Femgia32.exeC:\Windows\system32\Femgia32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3496 -
C:\Windows\SysWOW64\Fefjpp32.exeC:\Windows\system32\Fefjpp32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1328 -
C:\Windows\SysWOW64\Gkcbhgii.exeC:\Windows\system32\Gkcbhgii.exe61⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\Gamjea32.exeC:\Windows\system32\Gamjea32.exe62⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\Gdncfl32.exeC:\Windows\system32\Gdncfl32.exe63⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\SysWOW64\Ggqingie.exeC:\Windows\system32\Ggqingie.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\Hhbbmjne.exeC:\Windows\system32\Hhbbmjne.exe65⤵
- Executes dropped EXE
PID:3456 -
C:\Windows\SysWOW64\Hnfafpfd.exeC:\Windows\system32\Hnfafpfd.exe66⤵PID:4316
-
C:\Windows\SysWOW64\Ikmnec32.exeC:\Windows\system32\Ikmnec32.exe67⤵
- Drops file in System32 directory
PID:3656 -
C:\Windows\SysWOW64\Jfkehk32.exeC:\Windows\system32\Jfkehk32.exe68⤵PID:2596
-
C:\Windows\SysWOW64\Kblidkhp.exeC:\Windows\system32\Kblidkhp.exe69⤵PID:3992
-
C:\Windows\SysWOW64\Klfjbpmn.exeC:\Windows\system32\Klfjbpmn.exe70⤵PID:4184
-
C:\Windows\SysWOW64\Lhfmmp32.exeC:\Windows\system32\Lhfmmp32.exe71⤵PID:4472
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Lemjlcgo.exeC:\Windows\system32\Lemjlcgo.exe1⤵PID:5036
-
C:\Windows\SysWOW64\Lhkghofb.exeC:\Windows\system32\Lhkghofb.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4716 -
C:\Windows\SysWOW64\Mikcbb32.exeC:\Windows\system32\Mikcbb32.exe3⤵
- Drops file in System32 directory
- Modifies registry class
PID:812 -
C:\Windows\SysWOW64\Nekgna32.exeC:\Windows\system32\Nekgna32.exe4⤵PID:64
-
C:\Windows\SysWOW64\Npgalidl.exeC:\Windows\system32\Npgalidl.exe5⤵PID:4256
-
C:\Windows\SysWOW64\Ngaihcli.exeC:\Windows\system32\Ngaihcli.exe6⤵PID:1272
-
-
-
-
-
-
C:\Windows\SysWOW64\Nlnbqjjq.exeC:\Windows\system32\Nlnbqjjq.exe1⤵PID:8
-
C:\Windows\SysWOW64\Oomnmfid.exeC:\Windows\system32\Oomnmfid.exe2⤵PID:3824
-
C:\Windows\SysWOW64\Olgdgibf.exeC:\Windows\system32\Olgdgibf.exe3⤵PID:3964
-
C:\Windows\SysWOW64\Pllnbh32.exeC:\Windows\system32\Pllnbh32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3084 -
C:\Windows\SysWOW64\Pgdodq32.exeC:\Windows\system32\Pgdodq32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3396 -
C:\Windows\SysWOW64\Plagmh32.exeC:\Windows\system32\Plagmh32.exe6⤵PID:2212
-
C:\Windows\SysWOW64\Afboll32.exeC:\Windows\system32\Afboll32.exe7⤵PID:204
-
C:\Windows\SysWOW64\Aihaifam.exeC:\Windows\system32\Aihaifam.exe8⤵PID:4456
-
C:\Windows\SysWOW64\Dmdogpmq.exeC:\Windows\system32\Dmdogpmq.exe9⤵PID:2416
-
C:\Windows\SysWOW64\Fgbfbc32.exeC:\Windows\system32\Fgbfbc32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4356 -
C:\Windows\SysWOW64\Ipdfheal.exeC:\Windows\system32\Ipdfheal.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1468 -
C:\Windows\SysWOW64\Ihknibbo.exeC:\Windows\system32\Ihknibbo.exe12⤵
- Drops file in System32 directory
PID:1472 -
C:\Windows\SysWOW64\Ibhlmgdj.exeC:\Windows\system32\Ibhlmgdj.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2004 -
C:\Windows\SysWOW64\Jdddjq32.exeC:\Windows\system32\Jdddjq32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:768 -
C:\Windows\SysWOW64\Laqhao32.exeC:\Windows\system32\Laqhao32.exe15⤵PID:364
-
C:\Windows\SysWOW64\Mbpdkabl.exeC:\Windows\system32\Mbpdkabl.exe16⤵PID:2920
-
C:\Windows\SysWOW64\Mijlhl32.exeC:\Windows\system32\Mijlhl32.exe17⤵
- Drops file in System32 directory
PID:4040 -
C:\Windows\SysWOW64\Mlhidg32.exeC:\Windows\system32\Mlhidg32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3920 -
C:\Windows\SysWOW64\Mbbaaapj.exeC:\Windows\system32\Mbbaaapj.exe19⤵PID:4384
-
C:\Windows\SysWOW64\Meqmmm32.exeC:\Windows\system32\Meqmmm32.exe20⤵PID:2340
-
C:\Windows\SysWOW64\Malgmm32.exeC:\Windows\system32\Malgmm32.exe21⤵PID:1036
-
C:\Windows\SysWOW64\Nhfpjghi.exeC:\Windows\system32\Nhfpjghi.exe22⤵
- Modifies registry class
PID:1572 -
C:\Windows\SysWOW64\Nophfa32.exeC:\Windows\system32\Nophfa32.exe23⤵PID:4540
-
C:\Windows\SysWOW64\Naodbm32.exeC:\Windows\system32\Naodbm32.exe24⤵PID:4772
-
C:\Windows\SysWOW64\Oolgbpei.exeC:\Windows\system32\Oolgbpei.exe25⤵PID:4404
-
C:\Windows\SysWOW64\Oefpoi32.exeC:\Windows\system32\Oefpoi32.exe26⤵
- Drops file in System32 directory
PID:3680 -
C:\Windows\SysWOW64\Olphlcdb.exeC:\Windows\system32\Olphlcdb.exe27⤵PID:4640
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Oondhocf.exeC:\Windows\system32\Oondhocf.exe1⤵
- Modifies registry class
PID:4908 -
C:\Windows\SysWOW64\Oehldi32.exeC:\Windows\system32\Oehldi32.exe2⤵
- Modifies registry class
PID:3328 -
C:\Windows\SysWOW64\Ooqqmoac.exeC:\Windows\system32\Ooqqmoac.exe3⤵PID:2292
-
C:\Windows\SysWOW64\Oaomij32.exeC:\Windows\system32\Oaomij32.exe4⤵PID:3584
-
C:\Windows\SysWOW64\Ohiefdhd.exeC:\Windows\system32\Ohiefdhd.exe5⤵PID:3292
-
C:\Windows\SysWOW64\Pkngco32.exeC:\Windows\system32\Pkngco32.exe6⤵PID:4320
-
C:\Windows\SysWOW64\Pahppihl.exeC:\Windows\system32\Pahppihl.exe7⤵PID:4684
-
C:\Windows\SysWOW64\Aebhaede.exeC:\Windows\system32\Aebhaede.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3176 -
C:\Windows\SysWOW64\Aojljkkf.exeC:\Windows\system32\Aojljkkf.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3988 -
C:\Windows\SysWOW64\Akamol32.exeC:\Windows\system32\Akamol32.exe10⤵PID:744
-
C:\Windows\SysWOW64\Bfbahcfc.exeC:\Windows\system32\Bfbahcfc.exe11⤵PID:1476
-
C:\Windows\SysWOW64\Bmliem32.exeC:\Windows\system32\Bmliem32.exe12⤵PID:4524
-
C:\Windows\SysWOW64\Cckkmg32.exeC:\Windows\system32\Cckkmg32.exe13⤵PID:3808
-
C:\Windows\SysWOW64\Dfcjoa32.exeC:\Windows\system32\Dfcjoa32.exe14⤵PID:5044
-
C:\Windows\SysWOW64\Dkpbgh32.exeC:\Windows\system32\Dkpbgh32.exe15⤵
- Drops file in System32 directory
PID:3408 -
C:\Windows\SysWOW64\Dbikdbnd.exeC:\Windows\system32\Dbikdbnd.exe16⤵PID:2452
-
C:\Windows\SysWOW64\Dmooak32.exeC:\Windows\system32\Dmooak32.exe17⤵PID:2136
-
C:\Windows\SysWOW64\Eimegk32.exeC:\Windows\system32\Eimegk32.exe18⤵PID:784
-
C:\Windows\SysWOW64\Epgndedc.exeC:\Windows\system32\Epgndedc.exe19⤵
- Modifies registry class
PID:4936 -
C:\Windows\SysWOW64\Ejlban32.exeC:\Windows\system32\Ejlban32.exe20⤵
- Drops file in System32 directory
PID:4520 -
C:\Windows\SysWOW64\Eblpqono.exeC:\Windows\system32\Eblpqono.exe21⤵PID:4008
-
C:\Windows\SysWOW64\Fifhmi32.exeC:\Windows\system32\Fifhmi32.exe22⤵PID:2348
-
C:\Windows\SysWOW64\Fppqjcli.exeC:\Windows\system32\Fppqjcli.exe23⤵PID:3788
-
C:\Windows\SysWOW64\Fmdach32.exeC:\Windows\system32\Fmdach32.exe24⤵PID:4608
-
C:\Windows\SysWOW64\Flinddpj.exeC:\Windows\system32\Flinddpj.exe25⤵
- Modifies registry class
PID:4060 -
C:\Windows\SysWOW64\Fimonh32.exeC:\Windows\system32\Fimonh32.exe26⤵PID:4120
-
C:\Windows\SysWOW64\Fbecgned.exeC:\Windows\system32\Fbecgned.exe27⤵PID:2776
-
C:\Windows\SysWOW64\Fipkch32.exeC:\Windows\system32\Fipkch32.exe28⤵PID:4328
-
C:\Windows\SysWOW64\Gkfnnjnl.exeC:\Windows\system32\Gkfnnjnl.exe29⤵PID:4564
-
C:\Windows\SysWOW64\Hlldaape.exeC:\Windows\system32\Hlldaape.exe30⤵PID:5084
-
C:\Windows\SysWOW64\Hbflnl32.exeC:\Windows\system32\Hbflnl32.exe31⤵PID:3464
-
C:\Windows\SysWOW64\Hmlpkd32.exeC:\Windows\system32\Hmlpkd32.exe32⤵PID:2852
-
C:\Windows\SysWOW64\Hdehho32.exeC:\Windows\system32\Hdehho32.exe33⤵PID:3772
-
C:\Windows\SysWOW64\Hkpqdifa.exeC:\Windows\system32\Hkpqdifa.exe34⤵PID:5088
-
C:\Windows\SysWOW64\Hlqmla32.exeC:\Windows\system32\Hlqmla32.exe35⤵PID:2572
-
C:\Windows\SysWOW64\Ilhcmpeg.exeC:\Windows\system32\Ilhcmpeg.exe36⤵PID:4604
-
C:\Windows\SysWOW64\Icalij32.exeC:\Windows\system32\Icalij32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3436 -
C:\Windows\SysWOW64\Iildfd32.exeC:\Windows\system32\Iildfd32.exe38⤵
- Modifies registry class
PID:4116 -
C:\Windows\SysWOW64\Idahcm32.exeC:\Windows\system32\Idahcm32.exe39⤵PID:4756
-
C:\Windows\SysWOW64\Ikkppgld.exeC:\Windows\system32\Ikkppgld.exe40⤵PID:3192
-
C:\Windows\SysWOW64\Illmho32.exeC:\Windows\system32\Illmho32.exe41⤵PID:3444
-
C:\Windows\SysWOW64\Igbaeh32.exeC:\Windows\system32\Igbaeh32.exe42⤵PID:1216
-
C:\Windows\SysWOW64\Jkligd32.exeC:\Windows\system32\Jkligd32.exe43⤵PID:4220
-
C:\Windows\SysWOW64\Kcgnkgkl.exeC:\Windows\system32\Kcgnkgkl.exe44⤵
- Drops file in System32 directory
PID:3552 -
C:\Windows\SysWOW64\Kmfhelke.exeC:\Windows\system32\Kmfhelke.exe45⤵PID:4232
-
C:\Windows\SysWOW64\Kglmbd32.exeC:\Windows\system32\Kglmbd32.exe46⤵PID:4288
-
C:\Windows\SysWOW64\Neqoidmo.exeC:\Windows\system32\Neqoidmo.exe47⤵PID:2008
-
C:\Windows\SysWOW64\Oloaamqf.exeC:\Windows\system32\Oloaamqf.exe48⤵
- Modifies registry class
PID:4736 -
C:\Windows\SysWOW64\Ompmie32.exeC:\Windows\system32\Ompmie32.exe49⤵PID:4712
-
C:\Windows\SysWOW64\Ohfafn32.exeC:\Windows\system32\Ohfafn32.exe50⤵PID:4272
-
C:\Windows\SysWOW64\Oanfodmk.exeC:\Windows\system32\Oanfodmk.exe51⤵PID:1904
-
C:\Windows\SysWOW64\Oldjlm32.exeC:\Windows\system32\Oldjlm32.exe52⤵PID:4968
-
C:\Windows\SysWOW64\Odooqo32.exeC:\Windows\system32\Odooqo32.exe53⤵PID:1560
-
C:\Windows\SysWOW64\Pkigmiai.exeC:\Windows\system32\Pkigmiai.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3688 -
C:\Windows\SysWOW64\Pdalfo32.exeC:\Windows\system32\Pdalfo32.exe55⤵PID:5148
-
C:\Windows\SysWOW64\Qopbjf32.exeC:\Windows\system32\Qopbjf32.exe56⤵PID:5192
-
C:\Windows\SysWOW64\Qoboofnb.exeC:\Windows\system32\Qoboofnb.exe57⤵PID:5236
-
C:\Windows\SysWOW64\Akniofoa.exeC:\Windows\system32\Akniofoa.exe58⤵PID:5272
-
C:\Windows\SysWOW64\Aahblp32.exeC:\Windows\system32\Aahblp32.exe59⤵PID:5320
-
C:\Windows\SysWOW64\Ahbjij32.exeC:\Windows\system32\Ahbjij32.exe60⤵
- Modifies registry class
PID:5360 -
C:\Windows\SysWOW64\Aajoapdk.exeC:\Windows\system32\Aajoapdk.exe61⤵PID:5404
-
C:\Windows\SysWOW64\Ahdgnj32.exeC:\Windows\system32\Ahdgnj32.exe62⤵PID:5444
-
C:\Windows\SysWOW64\Anaofa32.exeC:\Windows\system32\Anaofa32.exe63⤵PID:5492
-
C:\Windows\SysWOW64\Bnmobopb.exeC:\Windows\system32\Bnmobopb.exe64⤵PID:5540
-
C:\Windows\SysWOW64\Cakghn32.exeC:\Windows\system32\Cakghn32.exe65⤵PID:5580
-
C:\Windows\SysWOW64\Ckeigc32.exeC:\Windows\system32\Ckeigc32.exe66⤵PID:5620
-
C:\Windows\SysWOW64\Cbpacmbc.exeC:\Windows\system32\Cbpacmbc.exe67⤵PID:5664
-
C:\Windows\SysWOW64\Chiipg32.exeC:\Windows\system32\Chiipg32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5704 -
C:\Windows\SysWOW64\Cocamaam.exeC:\Windows\system32\Cocamaam.exe69⤵PID:5740
-
C:\Windows\SysWOW64\Cdpjeh32.exeC:\Windows\system32\Cdpjeh32.exe70⤵PID:5792
-
C:\Windows\SysWOW64\Dnpdom32.exeC:\Windows\system32\Dnpdom32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5836 -
C:\Windows\SysWOW64\Efpofi32.exeC:\Windows\system32\Efpofi32.exe72⤵PID:5880
-
C:\Windows\SysWOW64\Ekmhnpfl.exeC:\Windows\system32\Ekmhnpfl.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5920 -
C:\Windows\SysWOW64\Efbllhfb.exeC:\Windows\system32\Efbllhfb.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5968 -
C:\Windows\SysWOW64\Ennqpkcm.exeC:\Windows\system32\Ennqpkcm.exe75⤵PID:6012
-
C:\Windows\SysWOW64\Eehime32.exeC:\Windows\system32\Eehime32.exe76⤵PID:6048
-
C:\Windows\SysWOW64\Epmmjnkp.exeC:\Windows\system32\Epmmjnkp.exe77⤵
- Drops file in System32 directory
PID:6096 -
C:\Windows\SysWOW64\Ffgegh32.exeC:\Windows\system32\Ffgegh32.exe78⤵PID:6136
-
C:\Windows\SysWOW64\Fieacc32.exeC:\Windows\system32\Fieacc32.exe79⤵
- Modifies registry class
PID:5184 -
C:\Windows\SysWOW64\Fnbjkj32.exeC:\Windows\system32\Fnbjkj32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5244 -
C:\Windows\SysWOW64\Felbhdgd.exeC:\Windows\system32\Felbhdgd.exe81⤵PID:5304
-
C:\Windows\SysWOW64\Fbpcah32.exeC:\Windows\system32\Fbpcah32.exe82⤵PID:5352
-
C:\Windows\SysWOW64\Fijknbmk.exeC:\Windows\system32\Fijknbmk.exe83⤵PID:5432
-
C:\Windows\SysWOW64\Ffnkggld.exeC:\Windows\system32\Ffnkggld.exe84⤵
- Modifies registry class
PID:5516 -
C:\Windows\SysWOW64\Fimhcbkh.exeC:\Windows\system32\Fimhcbkh.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5568 -
C:\Windows\SysWOW64\Fpfppl32.exeC:\Windows\system32\Fpfppl32.exe86⤵PID:5672
-
C:\Windows\SysWOW64\Ffqhmf32.exeC:\Windows\system32\Ffqhmf32.exe87⤵PID:5684
-
C:\Windows\SysWOW64\Fmjqjqao.exeC:\Windows\system32\Fmjqjqao.exe88⤵
- Modifies registry class
PID:3488 -
C:\Windows\SysWOW64\Gpnfak32.exeC:\Windows\system32\Gpnfak32.exe89⤵PID:1172
-
C:\Windows\SysWOW64\Gfgnnedj.exeC:\Windows\system32\Gfgnnedj.exe90⤵
- Drops file in System32 directory
PID:2656 -
C:\Windows\SysWOW64\Gldgflba.exeC:\Windows\system32\Gldgflba.exe91⤵PID:5932
-
C:\Windows\SysWOW64\Hplbbipm.exeC:\Windows\system32\Hplbbipm.exe92⤵PID:6000
-
C:\Windows\SysWOW64\Hfekoc32.exeC:\Windows\system32\Hfekoc32.exe93⤵PID:6024
-
C:\Windows\SysWOW64\Hmpclnof.exeC:\Windows\system32\Hmpclnof.exe94⤵
- Drops file in System32 directory
PID:6084 -
C:\Windows\SysWOW64\Hoaocf32.exeC:\Windows\system32\Hoaocf32.exe95⤵
- Drops file in System32 directory
PID:5144 -
C:\Windows\SysWOW64\Imbpam32.exeC:\Windows\system32\Imbpam32.exe96⤵PID:5224
-
C:\Windows\SysWOW64\Iocliecb.exeC:\Windows\system32\Iocliecb.exe97⤵PID:5316
-
C:\Windows\SysWOW64\Jlqohhja.exeC:\Windows\system32\Jlqohhja.exe98⤵PID:5428
-
C:\Windows\SysWOW64\Jcjgeb32.exeC:\Windows\system32\Jcjgeb32.exe99⤵PID:5528
-
C:\Windows\SysWOW64\Jpnhof32.exeC:\Windows\system32\Jpnhof32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5604 -
C:\Windows\SysWOW64\Jikfbkbc.exeC:\Windows\system32\Jikfbkbc.exe101⤵PID:5696
-
C:\Windows\SysWOW64\Jcdjka32.exeC:\Windows\system32\Jcdjka32.exe102⤵PID:3368
-
C:\Windows\SysWOW64\Kjnbhkqp.exeC:\Windows\system32\Kjnbhkqp.exe103⤵PID:5820
-
C:\Windows\SysWOW64\Kokkqbog.exeC:\Windows\system32\Kokkqbog.exe104⤵PID:5912
-
C:\Windows\SysWOW64\Kgacaopj.exeC:\Windows\system32\Kgacaopj.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\Knlknigf.exeC:\Windows\system32\Knlknigf.exe106⤵
- Drops file in System32 directory
PID:5952 -
C:\Windows\SysWOW64\Kchdfpen.exeC:\Windows\system32\Kchdfpen.exe107⤵PID:2220
-
C:\Windows\SysWOW64\Knnhdied.exeC:\Windows\system32\Knnhdied.exe108⤵PID:4956
-
C:\Windows\SysWOW64\Kgflmo32.exeC:\Windows\system32\Kgflmo32.exe109⤵PID:5160
-
C:\Windows\SysWOW64\Knpeii32.exeC:\Windows\system32\Knpeii32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4992 -
C:\Windows\SysWOW64\Koaaaaip.exeC:\Windows\system32\Koaaaaip.exe111⤵PID:5344
-
C:\Windows\SysWOW64\Knbaoh32.exeC:\Windows\system32\Knbaoh32.exe112⤵PID:3936
-
C:\Windows\SysWOW64\Kodnfqgm.exeC:\Windows\system32\Kodnfqgm.exe113⤵
- Drops file in System32 directory
PID:5688 -
C:\Windows\SysWOW64\Llmhkd32.exeC:\Windows\system32\Llmhkd32.exe114⤵PID:3152
-
C:\Windows\SysWOW64\Mncjffbl.exeC:\Windows\system32\Mncjffbl.exe115⤵PID:5844
-
C:\Windows\SysWOW64\Mgkoolil.exeC:\Windows\system32\Mgkoolil.exe116⤵PID:3844
-
C:\Windows\SysWOW64\Nfjofg32.exeC:\Windows\system32\Nfjofg32.exe117⤵PID:1324
-
C:\Windows\SysWOW64\Opnbjk32.exeC:\Windows\system32\Opnbjk32.exe118⤵PID:6124
-
C:\Windows\SysWOW64\Ofhkgeij.exeC:\Windows\system32\Ofhkgeij.exe119⤵PID:5188
-
C:\Windows\SysWOW64\Oanodnip.exeC:\Windows\system32\Oanodnip.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2756 -
C:\Windows\SysWOW64\Ofjgmdgg.exeC:\Windows\system32\Ofjgmdgg.exe121⤵
- Drops file in System32 directory
PID:5500 -
C:\Windows\SysWOW64\Omdpio32.exeC:\Windows\system32\Omdpio32.exe122⤵PID:5612
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-