Analysis
-
max time kernel
162s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 08:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.d7e594a438bd7f55486f63b50b234c80_JC.exe
Resource
win7-20231020-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.d7e594a438bd7f55486f63b50b234c80_JC.exe
Resource
win10v2004-20231023-en
6 signatures
150 seconds
General
-
Target
NEAS.d7e594a438bd7f55486f63b50b234c80_JC.exe
-
Size
80KB
-
MD5
d7e594a438bd7f55486f63b50b234c80
-
SHA1
f2faf89568a1ea7fad46157712de2ae91f0ca20c
-
SHA256
207d3d0d4fc43dfb212c6970a486d4fdaa944f558b7a81591bc5584611635717
-
SHA512
8fd541784dc5397ee45960379ab9da141eef03b6aeb83502e8276f4afeec0930c127f373a2284c9e77c430194f1da40969a536c29387ff9f998a5041bc0ba434
-
SSDEEP
1536:aFyYsNumxS8dLk9wFVZGe2LWNJ9VqDlzVxyh+CbxMa:aRYSKtVZWcJ9IDlRxyhTb7
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iiaein32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhjpnibf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oocmcn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omnqcfig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjafoapj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcfhhk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qahkch32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oampdkbj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmmmoppl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Opiipkfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aemqdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbhgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blhhaigj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jecejm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhgneqha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcgdcome.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blhhaigj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opjnai32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkgnpn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cqghcn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kinefp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aihaifam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ogndki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckaolcol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iioplg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eaqdpjia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhhlog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndagao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjmeaafi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jphcmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkechjib.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejchbmna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjafoapj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pneelmjo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jncfmgfi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohahkojp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnahmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckeigc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnfiia32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmajbnha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpeibdfp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnlgekkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdfopf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nedjdp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgqfmcge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jialbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdnnjane.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elnoifjg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ickcaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjehflie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mecjbl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnkkcmdb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jafaem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Coijja32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khmjga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deliaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmabnnhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nphhfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idebniil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emkeho32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kglcmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acfhkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahbacq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bcahgh32.exe -
Executes dropped EXE 64 IoCs
pid Process 3068 Mjafoapj.exe 712 Cqghcn32.exe 4572 Eaqdpjia.exe 1456 Hhnkppbf.exe 1128 Ifphkbep.exe 1700 Jkajnh32.exe 3124 Kfndlphp.exe 3928 Kkabefqp.exe 3456 Mmokpglb.exe 2904 Bjhpqn32.exe 2176 Ekeacmel.exe 3616 Feella32.exe 4652 Gechnpid.exe 3964 Hddejjdo.exe 2864 Jafaem32.exe 2324 Jedjkkmo.exe 4200 Koceep32.exe 4180 Ldnjndpo.exe 4340 Mokdllim.exe 2344 Mflbjejb.exe 3500 Nmajbnha.exe 3652 Ofadlbhj.exe 4560 Qfanbpjg.exe 2308 Aochga32.exe 972 Aemqdk32.exe 3336 Ccajdmin.exe 4392 Dgbhgi32.exe 864 Fnhppa32.exe 2656 Ggjgofkd.exe 3396 Hhhdpd32.exe 408 Hdodeedi.exe 3684 Ihfpabbd.exe 1952 Iandjg32.exe 2236 Jgdphm32.exe 4660 Kojdkhdd.exe 212 Lpmmhpgp.exe 2124 Nnimia32.exe 420 Nqlbqlmm.exe 4060 Ooalibaf.exe 380 Pneelmjo.exe 3588 Qahkch32.exe 2728 Aemjjeek.exe 2380 Bpidhmoi.exe 5004 Bocjdiol.exe 2720 Ejegdngb.exe 4416 Impeib32.exe 2420 Jiphebml.exe 4068 Jfffcf32.exe 3696 Kmbkfp32.exe 656 Kinefp32.exe 4336 Lcifde32.exe 3576 Ldhbnhlm.exe 824 Liekgo32.exe 1348 Mdfopf32.exe 1164 Ndpafe32.exe 4316 Pcgdcome.exe 4224 Peljha32.exe 1964 Pkebekgo.exe 2688 Qbddmejf.exe 3836 Aaccdp32.exe 2928 Blhhaigj.exe 852 Bbemdb32.exe 4940 Bdfilkbb.exe 672 Bejoqm32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Opmaaodc.exe Ojcidelf.exe File created C:\Windows\SysWOW64\Eahhcd32.exe Daqbbe32.exe File created C:\Windows\SysWOW64\Hddejjdo.exe Gechnpid.exe File created C:\Windows\SysWOW64\Bbemdb32.exe Blhhaigj.exe File created C:\Windows\SysWOW64\Gihlge32.dll Gcmnijkd.exe File created C:\Windows\SysWOW64\Nbnmmaoj.dll Hnodkjhq.exe File opened for modification C:\Windows\SysWOW64\Kmhejk32.exe Kglmbd32.exe File opened for modification C:\Windows\SysWOW64\Pcgdcome.exe Ndpafe32.exe File created C:\Windows\SysWOW64\Occnjp32.dll Hfgjad32.exe File created C:\Windows\SysWOW64\Abdbef32.dll Filailgl.exe File created C:\Windows\SysWOW64\Mmjkcl32.dll Bmqhlk32.exe File created C:\Windows\SysWOW64\Ekekpd32.dll Jedjkkmo.exe File created C:\Windows\SysWOW64\Fcfhhk32.exe Edkddeag.exe File opened for modification C:\Windows\SysWOW64\Lqkgli32.exe Lcggbd32.exe File created C:\Windows\SysWOW64\Efpofi32.exe Ekkkip32.exe File created C:\Windows\SysWOW64\Aaflag32.exe Ajkgmd32.exe File created C:\Windows\SysWOW64\Ojdeqckb.dll Afgame32.exe File created C:\Windows\SysWOW64\Phldlh32.dll Ckkilhjm.exe File created C:\Windows\SysWOW64\Ohahkojp.exe Onicbi32.exe File created C:\Windows\SysWOW64\Ncfmhecp.exe Medqmb32.exe File created C:\Windows\SysWOW64\Emkeho32.exe Cadllq32.exe File created C:\Windows\SysWOW64\Noeaaqlq.exe Nihiiimi.exe File opened for modification C:\Windows\SysWOW64\Dmdhmj32.exe Djelqo32.exe File created C:\Windows\SysWOW64\Gdimaigf.dll Cnahmo32.exe File created C:\Windows\SysWOW64\Nmajbnha.exe Mflbjejb.exe File created C:\Windows\SysWOW64\Ejegdngb.exe Bocjdiol.exe File opened for modification C:\Windows\SysWOW64\Opmaaodc.exe Ojcidelf.exe File opened for modification C:\Windows\SysWOW64\Ofadlbhj.exe Nmajbnha.exe File created C:\Windows\SysWOW64\Gdmmlf32.exe Ggfombmd.exe File opened for modification C:\Windows\SysWOW64\Gbjlbm32.exe Fjjnblhi.exe File opened for modification C:\Windows\SysWOW64\Pqmjhm32.exe Pjnipc32.exe File opened for modification C:\Windows\SysWOW64\Gdmmlf32.exe Ggfombmd.exe File opened for modification C:\Windows\SysWOW64\Jncfmgfi.exe Jhgneqha.exe File created C:\Windows\SysWOW64\Lnbkeclf.exe Kaehepeg.exe File opened for modification C:\Windows\SysWOW64\Efpofi32.exe Ekkkip32.exe File created C:\Windows\SysWOW64\Qfanbpjg.exe Ofadlbhj.exe File created C:\Windows\SysWOW64\Pkfkomhq.dll Lcifde32.exe File created C:\Windows\SysWOW64\Nebdighb.exe Ndagao32.exe File created C:\Windows\SysWOW64\Fnfmlchf.exe Egjobl32.exe File created C:\Windows\SysWOW64\Paakccpj.dll Iioplg32.exe File opened for modification C:\Windows\SysWOW64\Jialbf32.exe Ipihiaqa.exe File created C:\Windows\SysWOW64\Ggappk32.dll Ppopcf32.exe File created C:\Windows\SysWOW64\Faejhf32.dll Aaflag32.exe File opened for modification C:\Windows\SysWOW64\Dmjole32.exe Dbdjol32.exe File created C:\Windows\SysWOW64\Kkbhkj32.dll Acnefoac.exe File created C:\Windows\SysWOW64\Pneakj32.dll Djhifnho.exe File created C:\Windows\SysWOW64\Qigefl32.dll Bocjdiol.exe File created C:\Windows\SysWOW64\Bejoqm32.exe Bdfilkbb.exe File created C:\Windows\SysWOW64\Mbenfq32.exe Mhjpnibf.exe File created C:\Windows\SysWOW64\Mllqpaej.dll Ckaolcol.exe File created C:\Windows\SysWOW64\Emfnpejl.dll Kpeibdfp.exe File created C:\Windows\SysWOW64\Ikokkc32.exe Idebniil.exe File opened for modification C:\Windows\SysWOW64\Efccfojn.exe Elnoifjg.exe File opened for modification C:\Windows\SysWOW64\Elpknehe.exe Efccfojn.exe File created C:\Windows\SysWOW64\Mlohjpoi.exe Mkeeda32.exe File created C:\Windows\SysWOW64\Nqlbqlmm.exe Nnimia32.exe File opened for modification C:\Windows\SysWOW64\Ldhbnhlm.exe Lcifde32.exe File created C:\Windows\SysWOW64\Aomipkic.exe Ahbacq32.exe File created C:\Windows\SysWOW64\Agncocnp.dll Jljbogaf.exe File opened for modification C:\Windows\SysWOW64\Dlbcoe32.exe Coijja32.exe File created C:\Windows\SysWOW64\Ioakpf32.dll Nijeoikf.exe File created C:\Windows\SysWOW64\Efccfojn.exe Elnoifjg.exe File opened for modification C:\Windows\SysWOW64\Oampdkbj.exe Oondhocf.exe File created C:\Windows\SysWOW64\Ckeigc32.exe Cdlpjicj.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2096 5804 WerFault.exe 387 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jleeqm32.dll" Efccfojn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpmgjf32.dll" Aochga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkdhjjqh.dll" Ldhbnhlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkmlilej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nneboemj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ciqbmf32.dll" Jiphebml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nogcjmhj.dll" Hnlgekkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckeigc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipfqak32.dll" Mflbjejb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajndbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkahhe32.dll" Fblifijc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdigqnmd.dll" Ajkgmd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdodeedi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojcidelf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khmjga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofadlbhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Feceig32.dll" Kcikagij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlbcoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cffcilob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jiakllhf.dll" Cobkbhgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihccpqcl.dll" Phodlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbnpmp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejchbmna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afjoeo32.dll" Hhhdpd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mecjbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmjole32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihgqiiph.dll" Hdodeedi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eodjdocj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eblpqono.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmhejk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iqklhd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Onicbi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deliaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enopgj32.dll" Elnoifjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pphjbgfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jdnnjane.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nebdighb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjnbfmom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkabefqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knfliefc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nhhlog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpeibdfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nhjbjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmfmbpco.dll" Nhjbjp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjafoapj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfffcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jecejm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnhjgphd.dll" Opiipkfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egjobl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kojdkhdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahbacq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chiipg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Imkbglei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icdmqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gihlge32.dll" Gcmnijkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djhifnho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chlffghn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aemjjeek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjpmabce.dll" Nndjgjhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omnqcfig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dehcjghn.dll" Chlffghn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Elpknehe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nndjgjhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpbbmc32.dll" Bkgleegf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3740 wrote to memory of 3068 3740 NEAS.d7e594a438bd7f55486f63b50b234c80_JC.exe 93 PID 3740 wrote to memory of 3068 3740 NEAS.d7e594a438bd7f55486f63b50b234c80_JC.exe 93 PID 3740 wrote to memory of 3068 3740 NEAS.d7e594a438bd7f55486f63b50b234c80_JC.exe 93 PID 3068 wrote to memory of 712 3068 Mjafoapj.exe 94 PID 3068 wrote to memory of 712 3068 Mjafoapj.exe 94 PID 3068 wrote to memory of 712 3068 Mjafoapj.exe 94 PID 712 wrote to memory of 4572 712 Cqghcn32.exe 95 PID 712 wrote to memory of 4572 712 Cqghcn32.exe 95 PID 712 wrote to memory of 4572 712 Cqghcn32.exe 95 PID 4572 wrote to memory of 1456 4572 Eaqdpjia.exe 96 PID 4572 wrote to memory of 1456 4572 Eaqdpjia.exe 96 PID 4572 wrote to memory of 1456 4572 Eaqdpjia.exe 96 PID 1456 wrote to memory of 1128 1456 Hhnkppbf.exe 97 PID 1456 wrote to memory of 1128 1456 Hhnkppbf.exe 97 PID 1456 wrote to memory of 1128 1456 Hhnkppbf.exe 97 PID 1128 wrote to memory of 1700 1128 Ifphkbep.exe 98 PID 1128 wrote to memory of 1700 1128 Ifphkbep.exe 98 PID 1128 wrote to memory of 1700 1128 Ifphkbep.exe 98 PID 1700 wrote to memory of 3124 1700 Jkajnh32.exe 99 PID 1700 wrote to memory of 3124 1700 Jkajnh32.exe 99 PID 1700 wrote to memory of 3124 1700 Jkajnh32.exe 99 PID 3124 wrote to memory of 3928 3124 Kfndlphp.exe 100 PID 3124 wrote to memory of 3928 3124 Kfndlphp.exe 100 PID 3124 wrote to memory of 3928 3124 Kfndlphp.exe 100 PID 3928 wrote to memory of 3456 3928 Kkabefqp.exe 101 PID 3928 wrote to memory of 3456 3928 Kkabefqp.exe 101 PID 3928 wrote to memory of 3456 3928 Kkabefqp.exe 101 PID 3456 wrote to memory of 2904 3456 Mmokpglb.exe 102 PID 3456 wrote to memory of 2904 3456 Mmokpglb.exe 102 PID 3456 wrote to memory of 2904 3456 Mmokpglb.exe 102 PID 2904 wrote to memory of 2176 2904 Bjhpqn32.exe 103 PID 2904 wrote to memory of 2176 2904 Bjhpqn32.exe 103 PID 2904 wrote to memory of 2176 2904 Bjhpqn32.exe 103 PID 2176 wrote to memory of 3616 2176 Ekeacmel.exe 104 PID 2176 wrote to memory of 3616 2176 Ekeacmel.exe 104 PID 2176 wrote to memory of 3616 2176 Ekeacmel.exe 104 PID 3616 wrote to memory of 4652 3616 Feella32.exe 105 PID 3616 wrote to memory of 4652 3616 Feella32.exe 105 PID 3616 wrote to memory of 4652 3616 Feella32.exe 105 PID 4652 wrote to memory of 3964 4652 Gechnpid.exe 106 PID 4652 wrote to memory of 3964 4652 Gechnpid.exe 106 PID 4652 wrote to memory of 3964 4652 Gechnpid.exe 106 PID 3964 wrote to memory of 2864 3964 Hddejjdo.exe 107 PID 3964 wrote to memory of 2864 3964 Hddejjdo.exe 107 PID 3964 wrote to memory of 2864 3964 Hddejjdo.exe 107 PID 2864 wrote to memory of 2324 2864 Jafaem32.exe 108 PID 2864 wrote to memory of 2324 2864 Jafaem32.exe 108 PID 2864 wrote to memory of 2324 2864 Jafaem32.exe 108 PID 2324 wrote to memory of 4200 2324 Jedjkkmo.exe 109 PID 2324 wrote to memory of 4200 2324 Jedjkkmo.exe 109 PID 2324 wrote to memory of 4200 2324 Jedjkkmo.exe 109 PID 4200 wrote to memory of 4180 4200 Koceep32.exe 110 PID 4200 wrote to memory of 4180 4200 Koceep32.exe 110 PID 4200 wrote to memory of 4180 4200 Koceep32.exe 110 PID 4180 wrote to memory of 4340 4180 Ldnjndpo.exe 111 PID 4180 wrote to memory of 4340 4180 Ldnjndpo.exe 111 PID 4180 wrote to memory of 4340 4180 Ldnjndpo.exe 111 PID 4340 wrote to memory of 2344 4340 Mokdllim.exe 112 PID 4340 wrote to memory of 2344 4340 Mokdllim.exe 112 PID 4340 wrote to memory of 2344 4340 Mokdllim.exe 112 PID 2344 wrote to memory of 3500 2344 Mflbjejb.exe 113 PID 2344 wrote to memory of 3500 2344 Mflbjejb.exe 113 PID 2344 wrote to memory of 3500 2344 Mflbjejb.exe 113 PID 3500 wrote to memory of 3652 3500 Nmajbnha.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d7e594a438bd7f55486f63b50b234c80_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d7e594a438bd7f55486f63b50b234c80_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\Mjafoapj.exeC:\Windows\system32\Mjafoapj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\Cqghcn32.exeC:\Windows\system32\Cqghcn32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\Eaqdpjia.exeC:\Windows\system32\Eaqdpjia.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\Hhnkppbf.exeC:\Windows\system32\Hhnkppbf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\Ifphkbep.exeC:\Windows\system32\Ifphkbep.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\Jkajnh32.exeC:\Windows\system32\Jkajnh32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\Kfndlphp.exeC:\Windows\system32\Kfndlphp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\Kkabefqp.exeC:\Windows\system32\Kkabefqp.exe9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\Mmokpglb.exeC:\Windows\system32\Mmokpglb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\Bjhpqn32.exeC:\Windows\system32\Bjhpqn32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Ekeacmel.exeC:\Windows\system32\Ekeacmel.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\Feella32.exeC:\Windows\system32\Feella32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\Gechnpid.exeC:\Windows\system32\Gechnpid.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\Hddejjdo.exeC:\Windows\system32\Hddejjdo.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\Jafaem32.exeC:\Windows\system32\Jafaem32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\Jedjkkmo.exeC:\Windows\system32\Jedjkkmo.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\Koceep32.exeC:\Windows\system32\Koceep32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\Ldnjndpo.exeC:\Windows\system32\Ldnjndpo.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\Mokdllim.exeC:\Windows\system32\Mokdllim.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\Mflbjejb.exeC:\Windows\system32\Mflbjejb.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Nmajbnha.exeC:\Windows\system32\Nmajbnha.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\Ofadlbhj.exeC:\Windows\system32\Ofadlbhj.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3652 -
C:\Windows\SysWOW64\Qfanbpjg.exeC:\Windows\system32\Qfanbpjg.exe24⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\Aochga32.exeC:\Windows\system32\Aochga32.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:2308 -
C:\Windows\SysWOW64\Aemqdk32.exeC:\Windows\system32\Aemqdk32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:972 -
C:\Windows\SysWOW64\Ccajdmin.exeC:\Windows\system32\Ccajdmin.exe27⤵
- Executes dropped EXE
PID:3336 -
C:\Windows\SysWOW64\Dgbhgi32.exeC:\Windows\system32\Dgbhgi32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4392 -
C:\Windows\SysWOW64\Fnhppa32.exeC:\Windows\system32\Fnhppa32.exe29⤵
- Executes dropped EXE
PID:864 -
C:\Windows\SysWOW64\Ggjgofkd.exeC:\Windows\system32\Ggjgofkd.exe30⤵
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\Hhhdpd32.exeC:\Windows\system32\Hhhdpd32.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:3396 -
C:\Windows\SysWOW64\Hdodeedi.exeC:\Windows\system32\Hdodeedi.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:408 -
C:\Windows\SysWOW64\Ihfpabbd.exeC:\Windows\system32\Ihfpabbd.exe33⤵
- Executes dropped EXE
PID:3684 -
C:\Windows\SysWOW64\Iandjg32.exeC:\Windows\system32\Iandjg32.exe34⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\Jgdphm32.exeC:\Windows\system32\Jgdphm32.exe35⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\Kojdkhdd.exeC:\Windows\system32\Kojdkhdd.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:4660 -
C:\Windows\SysWOW64\Lpmmhpgp.exeC:\Windows\system32\Lpmmhpgp.exe37⤵
- Executes dropped EXE
PID:212 -
C:\Windows\SysWOW64\Nnimia32.exeC:\Windows\system32\Nnimia32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\Nqlbqlmm.exeC:\Windows\system32\Nqlbqlmm.exe39⤵
- Executes dropped EXE
PID:420 -
C:\Windows\SysWOW64\Ooalibaf.exeC:\Windows\system32\Ooalibaf.exe40⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\SysWOW64\Pneelmjo.exeC:\Windows\system32\Pneelmjo.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:380 -
C:\Windows\SysWOW64\Qahkch32.exeC:\Windows\system32\Qahkch32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3588 -
C:\Windows\SysWOW64\Aemjjeek.exeC:\Windows\system32\Aemjjeek.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:2728 -
C:\Windows\SysWOW64\Bpidhmoi.exeC:\Windows\system32\Bpidhmoi.exe44⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\Bocjdiol.exeC:\Windows\system32\Bocjdiol.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5004 -
C:\Windows\SysWOW64\Ejegdngb.exeC:\Windows\system32\Ejegdngb.exe46⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\Impeib32.exeC:\Windows\system32\Impeib32.exe47⤵
- Executes dropped EXE
PID:4416 -
C:\Windows\SysWOW64\Jiphebml.exeC:\Windows\system32\Jiphebml.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:2420 -
C:\Windows\SysWOW64\Jfffcf32.exeC:\Windows\system32\Jfffcf32.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:4068 -
C:\Windows\SysWOW64\Kmbkfp32.exeC:\Windows\system32\Kmbkfp32.exe50⤵
- Executes dropped EXE
PID:3696 -
C:\Windows\SysWOW64\Kinefp32.exeC:\Windows\system32\Kinefp32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:656 -
C:\Windows\SysWOW64\Lcifde32.exeC:\Windows\system32\Lcifde32.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ldhbnhlm.exeC:\Windows\system32\Ldhbnhlm.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:3576 -
C:\Windows\SysWOW64\Liekgo32.exeC:\Windows\system32\Liekgo32.exe2⤵
- Executes dropped EXE
PID:824 -
C:\Windows\SysWOW64\Mdfopf32.exeC:\Windows\system32\Mdfopf32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1348 -
C:\Windows\SysWOW64\Ndpafe32.exeC:\Windows\system32\Ndpafe32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1164 -
C:\Windows\SysWOW64\Pcgdcome.exeC:\Windows\system32\Pcgdcome.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\Peljha32.exeC:\Windows\system32\Peljha32.exe6⤵
- Executes dropped EXE
PID:4224 -
C:\Windows\SysWOW64\Pkebekgo.exeC:\Windows\system32\Pkebekgo.exe7⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\Qbddmejf.exeC:\Windows\system32\Qbddmejf.exe8⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Aaccdp32.exeC:\Windows\system32\Aaccdp32.exe9⤵
- Executes dropped EXE
PID:3836 -
C:\Windows\SysWOW64\Blhhaigj.exeC:\Windows\system32\Blhhaigj.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2928 -
C:\Windows\SysWOW64\Bbemdb32.exeC:\Windows\system32\Bbemdb32.exe11⤵
- Executes dropped EXE
PID:852 -
C:\Windows\SysWOW64\Bdfilkbb.exeC:\Windows\system32\Bdfilkbb.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4940 -
C:\Windows\SysWOW64\Bejoqm32.exeC:\Windows\system32\Bejoqm32.exe13⤵
- Executes dropped EXE
PID:672 -
C:\Windows\SysWOW64\Cldgmgml.exeC:\Windows\system32\Cldgmgml.exe14⤵PID:4596
-
C:\Windows\SysWOW64\Coijja32.exeC:\Windows\system32\Coijja32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4804 -
C:\Windows\SysWOW64\Dlbcoe32.exeC:\Windows\system32\Dlbcoe32.exe16⤵
- Modifies registry class
PID:4892 -
C:\Windows\SysWOW64\Dogfkpih.exeC:\Windows\system32\Dogfkpih.exe17⤵PID:4184
-
C:\Windows\SysWOW64\Eolpfo32.exeC:\Windows\system32\Eolpfo32.exe18⤵PID:4188
-
C:\Windows\SysWOW64\Edkddeag.exeC:\Windows\system32\Edkddeag.exe19⤵
- Drops file in System32 directory
PID:4220 -
C:\Windows\SysWOW64\Fcfhhk32.exeC:\Windows\system32\Fcfhhk32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1976 -
C:\Windows\SysWOW64\Fdgdpdgj.exeC:\Windows\system32\Fdgdpdgj.exe21⤵PID:3124
-
C:\Windows\SysWOW64\Gcmnijkd.exeC:\Windows\system32\Gcmnijkd.exe22⤵
- Drops file in System32 directory
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Gkmlilej.exeC:\Windows\system32\Gkmlilej.exe23⤵
- Modifies registry class
PID:232 -
C:\Windows\SysWOW64\Hfgjad32.exeC:\Windows\system32\Hfgjad32.exe24⤵
- Drops file in System32 directory
PID:4084 -
C:\Windows\SysWOW64\Hmabnnhg.exeC:\Windows\system32\Hmabnnhg.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2464 -
C:\Windows\SysWOW64\Icdmqg32.exeC:\Windows\system32\Icdmqg32.exe26⤵
- Modifies registry class
PID:1184 -
C:\Windows\SysWOW64\Iiaein32.exeC:\Windows\system32\Iiaein32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1628 -
C:\Windows\SysWOW64\Ickcaf32.exeC:\Windows\system32\Ickcaf32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2448 -
C:\Windows\SysWOW64\Jecejm32.exeC:\Windows\system32\Jecejm32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1400 -
C:\Windows\SysWOW64\Jmknkk32.exeC:\Windows\system32\Jmknkk32.exe30⤵PID:2548
-
C:\Windows\SysWOW64\Jcefgeif.exeC:\Windows\system32\Jcefgeif.exe31⤵PID:4696
-
C:\Windows\SysWOW64\Kmfmfigl.exeC:\Windows\system32\Kmfmfigl.exe32⤵PID:1836
-
C:\Windows\SysWOW64\Kpeibdfp.exeC:\Windows\system32\Kpeibdfp.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1692 -
C:\Windows\SysWOW64\Nneboemj.exeC:\Windows\system32\Nneboemj.exe34⤵
- Modifies registry class
PID:1832 -
C:\Windows\SysWOW64\Ndagao32.exeC:\Windows\system32\Ndagao32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4688 -
C:\Windows\SysWOW64\Nebdighb.exeC:\Windows\system32\Nebdighb.exe36⤵
- Modifies registry class
PID:2324 -
C:\Windows\SysWOW64\Nphhfp32.exeC:\Windows\system32\Nphhfp32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4700 -
C:\Windows\SysWOW64\Ngbpbjoe.exeC:\Windows\system32\Ngbpbjoe.exe38⤵PID:1116
-
C:\Windows\SysWOW64\Nnlhod32.exeC:\Windows\system32\Nnlhod32.exe39⤵PID:3732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ojcidelf.exeC:\Windows\system32\Ojcidelf.exe1⤵
- Drops file in System32 directory
- Modifies registry class
PID:4652 -
C:\Windows\SysWOW64\Opmaaodc.exeC:\Windows\system32\Opmaaodc.exe2⤵PID:4620
-
C:\Windows\SysWOW64\Pjnipc32.exeC:\Windows\system32\Pjnipc32.exe3⤵
- Drops file in System32 directory
PID:3900 -
C:\Windows\SysWOW64\Pqmjhm32.exeC:\Windows\system32\Pqmjhm32.exe4⤵PID:5128
-
C:\Windows\SysWOW64\Qjmeaafi.exeC:\Windows\system32\Qjmeaafi.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5176 -
C:\Windows\SysWOW64\Afhoaahg.exeC:\Windows\system32\Afhoaahg.exe6⤵PID:5236
-
C:\Windows\SysWOW64\Badipiae.exeC:\Windows\system32\Badipiae.exe7⤵PID:5280
-
C:\Windows\SysWOW64\Celelf32.exeC:\Windows\system32\Celelf32.exe8⤵PID:5320
-
C:\Windows\SysWOW64\Cndidlfb.exeC:\Windows\system32\Cndidlfb.exe9⤵PID:5416
-
C:\Windows\SysWOW64\Daqbbe32.exeC:\Windows\system32\Daqbbe32.exe10⤵
- Drops file in System32 directory
PID:5456 -
C:\Windows\SysWOW64\Eahhcd32.exeC:\Windows\system32\Eahhcd32.exe11⤵PID:5544
-
C:\Windows\SysWOW64\Idebniil.exeC:\Windows\system32\Idebniil.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5584 -
C:\Windows\SysWOW64\Ikokkc32.exeC:\Windows\system32\Ikokkc32.exe13⤵PID:5624
-
C:\Windows\SysWOW64\Ifihckmi.exeC:\Windows\system32\Ifihckmi.exe14⤵PID:5660
-
C:\Windows\SysWOW64\Joamlacj.exeC:\Windows\system32\Joamlacj.exe15⤵PID:5740
-
C:\Windows\SysWOW64\Jphcmp32.exeC:\Windows\system32\Jphcmp32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5804 -
C:\Windows\SysWOW64\Kbpboj32.exeC:\Windows\system32\Kbpboj32.exe17⤵PID:5848
-
C:\Windows\SysWOW64\Khmjga32.exeC:\Windows\system32\Khmjga32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5888 -
C:\Windows\SysWOW64\Kngcdkjo.exeC:\Windows\system32\Kngcdkjo.exe19⤵PID:5936
-
C:\Windows\SysWOW64\Lpbojlfd.exeC:\Windows\system32\Lpbojlfd.exe20⤵PID:5976
-
C:\Windows\SysWOW64\Medqmb32.exeC:\Windows\system32\Medqmb32.exe21⤵
- Drops file in System32 directory
PID:6028 -
C:\Windows\SysWOW64\Ncfmhecp.exeC:\Windows\system32\Ncfmhecp.exe22⤵PID:6060
-
C:\Windows\SysWOW64\Nedjdp32.exeC:\Windows\system32\Nedjdp32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6100 -
C:\Windows\SysWOW64\Opjnai32.exeC:\Windows\system32\Opjnai32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1772 -
C:\Windows\SysWOW64\Ohgokknb.exeC:\Windows\system32\Ohgokknb.exe25⤵PID:5164
-
C:\Windows\SysWOW64\Ocmchdmh.exeC:\Windows\system32\Ocmchdmh.exe26⤵PID:2196
-
C:\Windows\SysWOW64\Pjnbfmom.exeC:\Windows\system32\Pjnbfmom.exe27⤵
- Modifies registry class
PID:5288 -
C:\Windows\SysWOW64\Pphjbgfj.exeC:\Windows\system32\Pphjbgfj.exe28⤵
- Modifies registry class
PID:2308 -
C:\Windows\SysWOW64\Pjehflie.exeC:\Windows\system32\Pjehflie.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5444 -
C:\Windows\SysWOW64\Ppopcf32.exeC:\Windows\system32\Ppopcf32.exe30⤵
- Drops file in System32 directory
PID:5088 -
C:\Windows\SysWOW64\Ackiqpce.exeC:\Windows\system32\Ackiqpce.exe31⤵PID:4392
-
C:\Windows\SysWOW64\Aihaifam.exeC:\Windows\system32\Aihaifam.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5524 -
C:\Windows\SysWOW64\Acnefoac.exeC:\Windows\system32\Acnefoac.exe33⤵
- Drops file in System32 directory
PID:2656 -
C:\Windows\SysWOW64\Bmfjodgc.exeC:\Windows\system32\Bmfjodgc.exe34⤵PID:5644
-
C:\Windows\SysWOW64\Bmhfddeq.exeC:\Windows\system32\Bmhfddeq.exe35⤵PID:5704
-
C:\Windows\SysWOW64\Cjhfjg32.exeC:\Windows\system32\Cjhfjg32.exe36⤵PID:5772
-
C:\Windows\SysWOW64\Cadllq32.exeC:\Windows\system32\Cadllq32.exe37⤵
- Drops file in System32 directory
PID:5792 -
C:\Windows\SysWOW64\Emkeho32.exeC:\Windows\system32\Emkeho32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5872 -
C:\Windows\SysWOW64\Ealkcm32.exeC:\Windows\system32\Ealkcm32.exe39⤵PID:5932
-
C:\Windows\SysWOW64\Fgdbgbof.exeC:\Windows\system32\Fgdbgbof.exe40⤵PID:5968
-
C:\Windows\SysWOW64\Fajgekol.exeC:\Windows\system32\Fajgekol.exe41⤵PID:6024
-
C:\Windows\SysWOW64\Ggfombmd.exeC:\Windows\system32\Ggfombmd.exe42⤵
- Drops file in System32 directory
PID:6108 -
C:\Windows\SysWOW64\Gdmmlf32.exeC:\Windows\system32\Gdmmlf32.exe43⤵PID:4904
-
C:\Windows\SysWOW64\Gacjkjgb.exeC:\Windows\system32\Gacjkjgb.exe44⤵PID:3716
-
C:\Windows\SysWOW64\Hnlgekkc.exeC:\Windows\system32\Hnlgekkc.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5232 -
C:\Windows\SysWOW64\Hnodkjhq.exeC:\Windows\system32\Hnodkjhq.exe46⤵
- Drops file in System32 directory
PID:5388 -
C:\Windows\SysWOW64\Halmaiog.exeC:\Windows\system32\Halmaiog.exe47⤵PID:2832
-
C:\Windows\SysWOW64\Haoighmd.exeC:\Windows\system32\Haoighmd.exe48⤵PID:376
-
C:\Windows\SysWOW64\Hkgnpn32.exeC:\Windows\system32\Hkgnpn32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2572 -
C:\Windows\SysWOW64\Ihknibbo.exeC:\Windows\system32\Ihknibbo.exe50⤵PID:864
-
C:\Windows\SysWOW64\Ihnkobpl.exeC:\Windows\system32\Ihnkobpl.exe51⤵PID:5600
-
C:\Windows\SysWOW64\Iafogggl.exeC:\Windows\system32\Iafogggl.exe52⤵PID:5696
-
C:\Windows\SysWOW64\Iqklhd32.exeC:\Windows\system32\Iqklhd32.exe53⤵
- Modifies registry class
PID:5764 -
C:\Windows\SysWOW64\Ikqqfm32.exeC:\Windows\system32\Ikqqfm32.exe54⤵PID:3684
-
C:\Windows\SysWOW64\Ibjibg32.exeC:\Windows\system32\Ibjibg32.exe55⤵PID:452
-
C:\Windows\SysWOW64\Jjfngi32.exeC:\Windows\system32\Jjfngi32.exe56⤵PID:5988
-
C:\Windows\SysWOW64\Jhgneqha.exeC:\Windows\system32\Jhgneqha.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6088 -
C:\Windows\SysWOW64\Jncfmgfi.exeC:\Windows\system32\Jncfmgfi.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5168 -
C:\Windows\SysWOW64\Jdnnjane.exeC:\Windows\system32\Jdnnjane.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5200 -
C:\Windows\SysWOW64\Jjjgbhlm.exeC:\Windows\system32\Jjjgbhlm.exe60⤵PID:3464
-
C:\Windows\SysWOW64\Jdpkoalc.exeC:\Windows\system32\Jdpkoalc.exe61⤵PID:2748
-
C:\Windows\SysWOW64\Kkechjib.exeC:\Windows\system32\Kkechjib.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5528 -
C:\Windows\SysWOW64\Kglcmk32.exeC:\Windows\system32\Kglcmk32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5748 -
C:\Windows\SysWOW64\Knfliefc.exeC:\Windows\system32\Knfliefc.exe64⤵
- Modifies registry class
PID:4704 -
C:\Windows\SysWOW64\Kaehepeg.exeC:\Windows\system32\Kaehepeg.exe65⤵
- Drops file in System32 directory
PID:5916 -
C:\Windows\SysWOW64\Lnbkeclf.exeC:\Windows\system32\Lnbkeclf.exe66⤵PID:6056
-
C:\Windows\SysWOW64\Laqhao32.exeC:\Windows\system32\Laqhao32.exe67⤵PID:3888
-
C:\Windows\SysWOW64\Mhjpnibf.exeC:\Windows\system32\Mhjpnibf.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5272 -
C:\Windows\SysWOW64\Mbenfq32.exeC:\Windows\system32\Mbenfq32.exe69⤵PID:4748
-
C:\Windows\SysWOW64\Mecjbl32.exeC:\Windows\system32\Mecjbl32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2112 -
C:\Windows\SysWOW64\Mlmbofdh.exeC:\Windows\system32\Mlmbofdh.exe71⤵PID:5768
-
C:\Windows\SysWOW64\Nhhlog32.exeC:\Windows\system32\Nhhlog32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4232 -
C:\Windows\SysWOW64\Nbnpmp32.exeC:\Windows\system32\Nbnpmp32.exe73⤵
- Modifies registry class
PID:656 -
C:\Windows\SysWOW64\Nihiiimi.exeC:\Windows\system32\Nihiiimi.exe74⤵
- Drops file in System32 directory
PID:6140 -
C:\Windows\SysWOW64\Noeaaqlq.exeC:\Windows\system32\Noeaaqlq.exe75⤵PID:5300
-
C:\Windows\SysWOW64\Nijeoikf.exeC:\Windows\system32\Nijeoikf.exe76⤵
- Drops file in System32 directory
PID:5436 -
C:\Windows\SysWOW64\Nogngp32.exeC:\Windows\system32\Nogngp32.exe77⤵PID:2388
-
C:\Windows\SysWOW64\Oiakpheo.exeC:\Windows\system32\Oiakpheo.exe78⤵PID:3068
-
C:\Windows\SysWOW64\Oondhocf.exeC:\Windows\system32\Oondhocf.exe79⤵
- Drops file in System32 directory
PID:1948 -
C:\Windows\SysWOW64\Oampdkbj.exeC:\Windows\system32\Oampdkbj.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4552 -
C:\Windows\SysWOW64\Olbdacbp.exeC:\Windows\system32\Olbdacbp.exe81⤵PID:5184
-
C:\Windows\SysWOW64\Oocmcn32.exeC:\Windows\system32\Oocmcn32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:824 -
C:\Windows\SysWOW64\Pedlpgqe.exeC:\Windows\system32\Pedlpgqe.exe83⤵PID:3576
-
C:\Windows\SysWOW64\Phbhlcpi.exeC:\Windows\system32\Phbhlcpi.exe84⤵PID:6084
-
C:\Windows\SysWOW64\Qaabfgpa.exeC:\Windows\system32\Qaabfgpa.exe85⤵PID:2264
-
C:\Windows\SysWOW64\Acaopjgd.exeC:\Windows\system32\Acaopjgd.exe86⤵PID:4828
-
C:\Windows\SysWOW64\Ajkgmd32.exeC:\Windows\system32\Ajkgmd32.exe87⤵
- Drops file in System32 directory
- Modifies registry class
PID:3648 -
C:\Windows\SysWOW64\Aaflag32.exeC:\Windows\system32\Aaflag32.exe88⤵
- Drops file in System32 directory
PID:3856 -
C:\Windows\SysWOW64\Ajndbd32.exeC:\Windows\system32\Ajndbd32.exe89⤵
- Modifies registry class
PID:4400 -
C:\Windows\SysWOW64\Acfhkj32.exeC:\Windows\system32\Acfhkj32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1504 -
C:\Windows\SysWOW64\Ahbacq32.exeC:\Windows\system32\Ahbacq32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1028 -
C:\Windows\SysWOW64\Aomipkic.exeC:\Windows\system32\Aomipkic.exe92⤵PID:4224
-
C:\Windows\SysWOW64\Afgame32.exeC:\Windows\system32\Afgame32.exe93⤵
- Drops file in System32 directory
PID:3292 -
C:\Windows\SysWOW64\Akcjel32.exeC:\Windows\system32\Akcjel32.exe94⤵PID:6172
-
C:\Windows\SysWOW64\Blhpjnbe.exeC:\Windows\system32\Blhpjnbe.exe95⤵PID:6208
-
C:\Windows\SysWOW64\Bcahgh32.exeC:\Windows\system32\Bcahgh32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6248 -
C:\Windows\SysWOW64\Bbgehd32.exeC:\Windows\system32\Bbgehd32.exe97⤵PID:6300
-
C:\Windows\SysWOW64\Bmliem32.exeC:\Windows\system32\Bmliem32.exe98⤵PID:6360
-
C:\Windows\SysWOW64\Cobkbhgk.exeC:\Windows\system32\Cobkbhgk.exe99⤵
- Modifies registry class
PID:6396 -
C:\Windows\SysWOW64\Cjgpoq32.exeC:\Windows\system32\Cjgpoq32.exe100⤵PID:6436
-
C:\Windows\SysWOW64\Cjjlep32.exeC:\Windows\system32\Cjjlep32.exe101⤵PID:6484
-
C:\Windows\SysWOW64\Ckkilhjm.exeC:\Windows\system32\Ckkilhjm.exe102⤵
- Drops file in System32 directory
PID:6616 -
C:\Windows\SysWOW64\Djelqo32.exeC:\Windows\system32\Djelqo32.exe103⤵
- Drops file in System32 directory
PID:6656 -
C:\Windows\SysWOW64\Dmdhmj32.exeC:\Windows\system32\Dmdhmj32.exe104⤵PID:6700
-
C:\Windows\SysWOW64\Dcnqid32.exeC:\Windows\system32\Dcnqid32.exe105⤵PID:6740
-
C:\Windows\SysWOW64\Djhifnho.exeC:\Windows\system32\Djhifnho.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:6804 -
C:\Windows\SysWOW64\Elnoifjg.exeC:\Windows\system32\Elnoifjg.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:6840 -
C:\Windows\SysWOW64\Efccfojn.exeC:\Windows\system32\Efccfojn.exe108⤵
- Drops file in System32 directory
- Modifies registry class
PID:6884 -
C:\Windows\SysWOW64\Elpknehe.exeC:\Windows\system32\Elpknehe.exe109⤵
- Modifies registry class
PID:6924 -
C:\Windows\SysWOW64\Efepln32.exeC:\Windows\system32\Efepln32.exe110⤵PID:6976
-
C:\Windows\SysWOW64\Emphhhoh.exeC:\Windows\system32\Emphhhoh.exe111⤵PID:7016
-
C:\Windows\SysWOW64\Eblpqono.exeC:\Windows\system32\Eblpqono.exe112⤵
- Modifies registry class
PID:7060 -
C:\Windows\SysWOW64\Ejchbmna.exeC:\Windows\system32\Ejchbmna.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:7148 -
C:\Windows\SysWOW64\Fjjnblhi.exeC:\Windows\system32\Fjjnblhi.exe114⤵
- Drops file in System32 directory
PID:3364 -
C:\Windows\SysWOW64\Gbjlbm32.exeC:\Windows\system32\Gbjlbm32.exe115⤵PID:6340
-
C:\Windows\SysWOW64\Hkpqdifa.exeC:\Windows\system32\Hkpqdifa.exe116⤵PID:396
-
C:\Windows\SysWOW64\Jcknpi32.exeC:\Windows\system32\Jcknpi32.exe117⤵PID:4840
-
C:\Windows\SysWOW64\Kcikagij.exeC:\Windows\system32\Kcikagij.exe118⤵
- Modifies registry class
PID:6388 -
C:\Windows\SysWOW64\Kggcgeop.exeC:\Windows\system32\Kggcgeop.exe119⤵PID:6432
-
C:\Windows\SysWOW64\Kjhlipla.exeC:\Windows\system32\Kjhlipla.exe120⤵PID:6480
-
C:\Windows\SysWOW64\Kqbdej32.exeC:\Windows\system32\Kqbdej32.exe121⤵PID:6576
-
C:\Windows\SysWOW64\Kglmbd32.exeC:\Windows\system32\Kglmbd32.exe122⤵
- Drops file in System32 directory
PID:6612
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-