Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
169s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 14:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.51425f30a5b902ed3eca72637da11550.exe
Resource
win7-20231025-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.51425f30a5b902ed3eca72637da11550.exe
Resource
win10v2004-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.51425f30a5b902ed3eca72637da11550.exe
-
Size
52KB
-
MD5
51425f30a5b902ed3eca72637da11550
-
SHA1
637eda93df123308ee67e66c36ecfaeb23fd82fb
-
SHA256
8127046c6f91337d2e5ec0ed1ec55889dec333c6c85f1bede49a0c740f107406
-
SHA512
ed2d19f3becc6e971db967257cabd3a9ca687345c2a4ba6c4fff97e69135ff6077cffc77fdfaa45d2b9ab0e28a26f02dccc3e3d8cd2413aa735c661f8183243f
-
SSDEEP
768:YR6rkCp3KFw13xV4Z7Rm0vAkrTVB5+JsL0GbL3I/1H5F/sscMABvKWe:PNWw1TBkrTVn+JsDb6iMAdKZ
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jefbomoe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccmgbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpcajflb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdeijmph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ednajepe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aochga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mnhdae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbgbgalj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eliecc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pidaleei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkokma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlhidg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abjkmqni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgdphm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glgckl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcnhfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khnfce32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbcpkjkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekqcfpmj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gehbio32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edemdine.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kglmbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Keifneoc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdbiphhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejiqom32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfkamk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnmhim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Igcgpalj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edqdij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eglbhnkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mglfibmh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oafido32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jchaoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aochga32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpapiipo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glgckl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obcled32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcjkje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhibgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edemdine.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dooaip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klekpodn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Indkih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nfdfoala.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phdngljk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnlhhi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkkhbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Paelpcgc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhijjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Klpjad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phmjdbpo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpnhoqmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fihecici.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mccfnc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blabakle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjneec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhnlapbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iihilhol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mihikgod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbeaib32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kedcml32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afpjoaeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajfejknb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecdbhe32.exe -
Executes dropped EXE 64 IoCs
pid Process 2900 Aimogakj.exe 3008 Banjnm32.exe 4668 Bkkhbb32.exe 1436 Ckpamabg.exe 4968 Ciihjmcj.exe 556 Ddhomdje.exe 3308 Hccggl32.exe 4900 Hnbnjc32.exe 640 Jdmcdhhe.exe 4244 Jhoeef32.exe 220 Klpjad32.exe 3380 Lddble32.exe 416 Maoifh32.exe 3616 Ncjdki32.exe 3432 Odgqopeb.exe 5044 Qkdohg32.exe 644 Abgjkpll.exe 1640 Beaecjab.exe 1200 Cdlhgpag.exe 2504 Ephlnn32.exe 2472 Flcfnn32.exe 4044 Gddqejni.exe 2584 Hqkjaifk.exe 4600 Icciccmd.exe 4236 Jgekdq32.exe 748 Jnfjbj32.exe 1188 Kfkamk32.exe 3604 Mkicjgnn.exe 1728 Nkbfpeec.exe 4740 Ngnppfgb.exe 2304 Pdbiphhi.exe 1680 Afkipi32.exe 3340 Adqeaf32.exe 1112 Cbnbhfde.exe 4684 Dbckcf32.exe 3460 Dbehienn.exe 712 Fpqgjf32.exe 572 Fpeaeedg.exe 1140 Gllajf32.exe 4816 Glnnofhi.exe 844 Glchjedc.exe 2396 Hjlaoioh.exe 4184 Hjbhph32.exe 2092 Ifqoehhl.exe 1576 Jmmcgbnf.exe 4180 Kjlcmdbb.exe 496 Kifjip32.exe 4308 Lfcmhc32.exe 2976 Mffjnc32.exe 1608 Mfmpob32.exe 1404 Nfdfoala.exe 3720 Nmpkakak.exe 4512 Nkdlkope.exe 376 Nhhldc32.exe 2680 Ophjdehd.exe 1588 Opmcod32.exe 2796 Pkinmlnm.exe 2440 Qnopjfgi.exe 2100 Ckafkfkp.exe 5112 Enpknplq.exe 2532 Enedio32.exe 736 Eliecc32.exe 4316 Fbjcplhj.exe 2232 Fkgejncb.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Hgnlgdfg.dll Glchjedc.exe File created C:\Windows\SysWOW64\Pkinmlnm.exe Opmcod32.exe File created C:\Windows\SysWOW64\Nhhabe32.dll Edkddeag.exe File created C:\Windows\SysWOW64\Nibaah32.dll Apjdbqfa.exe File created C:\Windows\SysWOW64\Maghgg32.dll Cpofdndi.exe File created C:\Windows\SysWOW64\Ijdenj32.exe Hgeiao32.exe File created C:\Windows\SysWOW64\Necembic.dll Ieijkcej.exe File created C:\Windows\SysWOW64\Hgboiq32.exe Ggpbcaei.exe File opened for modification C:\Windows\SysWOW64\Pmgcidqm.exe Oloaamqf.exe File opened for modification C:\Windows\SysWOW64\Iioplg32.exe Ioikon32.exe File created C:\Windows\SysWOW64\Olhajffl.dll Jacggh32.exe File created C:\Windows\SysWOW64\Jnmkfd32.dll Cfiiggpg.exe File created C:\Windows\SysWOW64\Bijnai32.dll Lbngfbdo.exe File created C:\Windows\SysWOW64\Fbecgned.exe Fihecici.exe File opened for modification C:\Windows\SysWOW64\Plkpmlfi.exe Paelpcgc.exe File opened for modification C:\Windows\SysWOW64\Koonak32.exe Kibeid32.exe File created C:\Windows\SysWOW64\Njjmgo32.exe Nhckmmeg.exe File opened for modification C:\Windows\SysWOW64\Odgqopeb.exe Ncjdki32.exe File created C:\Windows\SysWOW64\Glnnofhi.exe Gllajf32.exe File opened for modification C:\Windows\SysWOW64\Dmpfla32.exe Daiegp32.exe File created C:\Windows\SysWOW64\Hmfoocoi.dll Dqkmkb32.exe File created C:\Windows\SysWOW64\Apmpkall.dll Aimogakj.exe File created C:\Windows\SysWOW64\Qpboqfjk.dll Bkbcpb32.exe File opened for modification C:\Windows\SysWOW64\Mjneec32.exe Meqmmm32.exe File created C:\Windows\SysWOW64\Aagemnef.dll Naecieef.exe File opened for modification C:\Windows\SysWOW64\Khnfce32.exe Gehbio32.exe File created C:\Windows\SysWOW64\Hmbpbk32.exe Hcjkje32.exe File opened for modification C:\Windows\SysWOW64\Mglfibmh.exe Mjhepnno.exe File opened for modification C:\Windows\SysWOW64\Ciihjmcj.exe Ckpamabg.exe File created C:\Windows\SysWOW64\Nbaefacb.dll Mimbfg32.exe File created C:\Windows\SysWOW64\Eopbgf32.dll Dmpfla32.exe File opened for modification C:\Windows\SysWOW64\Hkeajn32.exe Hgboiq32.exe File created C:\Windows\SysWOW64\Ipflcnln.exe Ikickgnf.exe File created C:\Windows\SysWOW64\Ifabik32.dll Nhokeolc.exe File created C:\Windows\SysWOW64\Fmapgp32.dll Gbgbgalj.exe File created C:\Windows\SysWOW64\Knlook32.dll Dgbagf32.exe File created C:\Windows\SysWOW64\Jlqmgaad.dll Qnopjfgi.exe File created C:\Windows\SysWOW64\Hejlqiki.dll Koonak32.exe File opened for modification C:\Windows\SysWOW64\Lpapiipo.exe Kmgdaokh.exe File created C:\Windows\SysWOW64\Jcgbmd32.exe Jefbomoe.exe File created C:\Windows\SysWOW64\Iigkkjhk.dll Oidopn32.exe File created C:\Windows\SysWOW64\Necphcfk.dll Miofcked.exe File created C:\Windows\SysWOW64\Ncapbnlk.dll Lcdcbokq.exe File opened for modification C:\Windows\SysWOW64\Mplfll32.exe Lfgboc32.exe File created C:\Windows\SysWOW64\Jnfjbj32.exe Jgekdq32.exe File created C:\Windows\SysWOW64\Adqeaf32.exe Afkipi32.exe File created C:\Windows\SysWOW64\Jmmcgbnf.exe Ifqoehhl.exe File created C:\Windows\SysWOW64\Qgfidb32.dll Bldogjib.exe File created C:\Windows\SysWOW64\Kmgdaokh.exe Kbocng32.exe File opened for modification C:\Windows\SysWOW64\Oiihkncb.exe Ocmchdmh.exe File created C:\Windows\SysWOW64\Mccfnc32.exe Mglfibmh.exe File opened for modification C:\Windows\SysWOW64\Offnae32.exe Oaifin32.exe File created C:\Windows\SysWOW64\Lcpjjinf.dll Hnkhcjbc.exe File created C:\Windows\SysWOW64\Daopfc32.dll Hgeiao32.exe File created C:\Windows\SysWOW64\Icciccmd.exe Hqkjaifk.exe File created C:\Windows\SysWOW64\Oecego32.exe Obcled32.exe File created C:\Windows\SysWOW64\Gpjfng32.exe Gfaaebnj.exe File created C:\Windows\SysWOW64\Cppfgnlj.exe Bciebm32.exe File created C:\Windows\SysWOW64\Pahiebeq.exe Plkpmlfi.exe File opened for modification C:\Windows\SysWOW64\Boeelcmm.exe Bnfiapfj.exe File created C:\Windows\SysWOW64\Giialc32.dll Cnokhonp.exe File created C:\Windows\SysWOW64\Faeihogj.exe Fijdcljo.exe File opened for modification C:\Windows\SysWOW64\Kibeid32.exe Kpiqpo32.exe File created C:\Windows\SysWOW64\Kahqbgjp.exe Kojdflkl.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Glchjedc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjfppe32.dll" Mcggga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lfjjqg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amnimglb.dll" Edemdine.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmnhgdjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fiekhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Henajkcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iihilhol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Joqapmcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnoenaho.dll" Ihmobn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfhdch32.dll" Ahofidlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bddcocff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Faeihogj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmbpbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hfacai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekejap32.dll" Mjpbkc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gplpfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlcjaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocmchdmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjneec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pidpnknl.dll" Bnmobopb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Klpjad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Maoifh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mejijcea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aochga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgffci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Glgckl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kacobp32.dll" Bfhfjjii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bnfiapfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eepbpfaj.dll" Lmaafcml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knoibbcg.dll" Ejojepfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enedio32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kblkap32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndmepe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gepkfejp.dll" Cckkmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icdclifh.dll" Ginnokej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfhfjjii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iniiin32.dll" Enedio32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eglbhnkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clihcm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Edkddeag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Koonak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Beaecjab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlnqln32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahmqnkbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmbmffan.dll" Onapnbhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbjpohpp.dll" Pfanmcao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hbiaih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddhomdje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gfbpfedp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Plmmbkdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gegkilik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijebdjgb.dll" Gkciapkj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkcdbi32.dll" Hqkjaifk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgbqlaea.dll" Nhhlog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbcpkjkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ciihjmcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hepoddcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iecmlknh.dll" Cgecpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nfdmag32.dll" Gpcffalc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcfimheb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.51425f30a5b902ed3eca72637da11550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdbiphhi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hgboiq32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 244 wrote to memory of 2900 244 NEAS.51425f30a5b902ed3eca72637da11550.exe 93 PID 244 wrote to memory of 2900 244 NEAS.51425f30a5b902ed3eca72637da11550.exe 93 PID 244 wrote to memory of 2900 244 NEAS.51425f30a5b902ed3eca72637da11550.exe 93 PID 2900 wrote to memory of 3008 2900 Aimogakj.exe 94 PID 2900 wrote to memory of 3008 2900 Aimogakj.exe 94 PID 2900 wrote to memory of 3008 2900 Aimogakj.exe 94 PID 3008 wrote to memory of 4668 3008 Banjnm32.exe 95 PID 3008 wrote to memory of 4668 3008 Banjnm32.exe 95 PID 3008 wrote to memory of 4668 3008 Banjnm32.exe 95 PID 4668 wrote to memory of 1436 4668 Bkkhbb32.exe 96 PID 4668 wrote to memory of 1436 4668 Bkkhbb32.exe 96 PID 4668 wrote to memory of 1436 4668 Bkkhbb32.exe 96 PID 1436 wrote to memory of 4968 1436 Ckpamabg.exe 97 PID 1436 wrote to memory of 4968 1436 Ckpamabg.exe 97 PID 1436 wrote to memory of 4968 1436 Ckpamabg.exe 97 PID 4968 wrote to memory of 556 4968 Ciihjmcj.exe 98 PID 4968 wrote to memory of 556 4968 Ciihjmcj.exe 98 PID 4968 wrote to memory of 556 4968 Ciihjmcj.exe 98 PID 556 wrote to memory of 3308 556 Ddhomdje.exe 99 PID 556 wrote to memory of 3308 556 Ddhomdje.exe 99 PID 556 wrote to memory of 3308 556 Ddhomdje.exe 99 PID 3308 wrote to memory of 4900 3308 Hccggl32.exe 100 PID 3308 wrote to memory of 4900 3308 Hccggl32.exe 100 PID 3308 wrote to memory of 4900 3308 Hccggl32.exe 100 PID 4900 wrote to memory of 640 4900 Hnbnjc32.exe 101 PID 4900 wrote to memory of 640 4900 Hnbnjc32.exe 101 PID 4900 wrote to memory of 640 4900 Hnbnjc32.exe 101 PID 640 wrote to memory of 4244 640 Jdmcdhhe.exe 102 PID 640 wrote to memory of 4244 640 Jdmcdhhe.exe 102 PID 640 wrote to memory of 4244 640 Jdmcdhhe.exe 102 PID 4244 wrote to memory of 220 4244 Jhoeef32.exe 103 PID 4244 wrote to memory of 220 4244 Jhoeef32.exe 103 PID 4244 wrote to memory of 220 4244 Jhoeef32.exe 103 PID 220 wrote to memory of 3380 220 Klpjad32.exe 104 PID 220 wrote to memory of 3380 220 Klpjad32.exe 104 PID 220 wrote to memory of 3380 220 Klpjad32.exe 104 PID 3380 wrote to memory of 416 3380 Lddble32.exe 105 PID 3380 wrote to memory of 416 3380 Lddble32.exe 105 PID 3380 wrote to memory of 416 3380 Lddble32.exe 105 PID 416 wrote to memory of 3616 416 Maoifh32.exe 106 PID 416 wrote to memory of 3616 416 Maoifh32.exe 106 PID 416 wrote to memory of 3616 416 Maoifh32.exe 106 PID 3616 wrote to memory of 3432 3616 Ncjdki32.exe 107 PID 3616 wrote to memory of 3432 3616 Ncjdki32.exe 107 PID 3616 wrote to memory of 3432 3616 Ncjdki32.exe 107 PID 3432 wrote to memory of 5044 3432 Odgqopeb.exe 108 PID 3432 wrote to memory of 5044 3432 Odgqopeb.exe 108 PID 3432 wrote to memory of 5044 3432 Odgqopeb.exe 108 PID 5044 wrote to memory of 644 5044 Qkdohg32.exe 109 PID 5044 wrote to memory of 644 5044 Qkdohg32.exe 109 PID 5044 wrote to memory of 644 5044 Qkdohg32.exe 109 PID 644 wrote to memory of 1640 644 Abgjkpll.exe 110 PID 644 wrote to memory of 1640 644 Abgjkpll.exe 110 PID 644 wrote to memory of 1640 644 Abgjkpll.exe 110 PID 1640 wrote to memory of 1200 1640 Beaecjab.exe 111 PID 1640 wrote to memory of 1200 1640 Beaecjab.exe 111 PID 1640 wrote to memory of 1200 1640 Beaecjab.exe 111 PID 1200 wrote to memory of 2504 1200 Cdlhgpag.exe 112 PID 1200 wrote to memory of 2504 1200 Cdlhgpag.exe 112 PID 1200 wrote to memory of 2504 1200 Cdlhgpag.exe 112 PID 2504 wrote to memory of 2472 2504 Ephlnn32.exe 113 PID 2504 wrote to memory of 2472 2504 Ephlnn32.exe 113 PID 2504 wrote to memory of 2472 2504 Ephlnn32.exe 113 PID 2472 wrote to memory of 4044 2472 Flcfnn32.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.51425f30a5b902ed3eca72637da11550.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.51425f30a5b902ed3eca72637da11550.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\SysWOW64\Aimogakj.exeC:\Windows\system32\Aimogakj.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\Banjnm32.exeC:\Windows\system32\Banjnm32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Bkkhbb32.exeC:\Windows\system32\Bkkhbb32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\Ckpamabg.exeC:\Windows\system32\Ckpamabg.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\Ciihjmcj.exeC:\Windows\system32\Ciihjmcj.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\Ddhomdje.exeC:\Windows\system32\Ddhomdje.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\Hccggl32.exeC:\Windows\system32\Hccggl32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\Hnbnjc32.exeC:\Windows\system32\Hnbnjc32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\Jdmcdhhe.exeC:\Windows\system32\Jdmcdhhe.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\Jhoeef32.exeC:\Windows\system32\Jhoeef32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\Klpjad32.exeC:\Windows\system32\Klpjad32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\Lddble32.exeC:\Windows\system32\Lddble32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\Maoifh32.exeC:\Windows\system32\Maoifh32.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\SysWOW64\Ncjdki32.exeC:\Windows\system32\Ncjdki32.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\Odgqopeb.exeC:\Windows\system32\Odgqopeb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\Qkdohg32.exeC:\Windows\system32\Qkdohg32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\Abgjkpll.exeC:\Windows\system32\Abgjkpll.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\Beaecjab.exeC:\Windows\system32\Beaecjab.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Cdlhgpag.exeC:\Windows\system32\Cdlhgpag.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\Ephlnn32.exeC:\Windows\system32\Ephlnn32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\Flcfnn32.exeC:\Windows\system32\Flcfnn32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\Gddqejni.exeC:\Windows\system32\Gddqejni.exe23⤵
- Executes dropped EXE
PID:4044 -
C:\Windows\SysWOW64\Hqkjaifk.exeC:\Windows\system32\Hqkjaifk.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2584 -
C:\Windows\SysWOW64\Icciccmd.exeC:\Windows\system32\Icciccmd.exe25⤵
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\Jgekdq32.exeC:\Windows\system32\Jgekdq32.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4236 -
C:\Windows\SysWOW64\Jnfjbj32.exeC:\Windows\system32\Jnfjbj32.exe27⤵
- Executes dropped EXE
PID:748 -
C:\Windows\SysWOW64\Kfkamk32.exeC:\Windows\system32\Kfkamk32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1188 -
C:\Windows\SysWOW64\Mkicjgnn.exeC:\Windows\system32\Mkicjgnn.exe29⤵
- Executes dropped EXE
PID:3604 -
C:\Windows\SysWOW64\Nkbfpeec.exeC:\Windows\system32\Nkbfpeec.exe30⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\Ngnppfgb.exeC:\Windows\system32\Ngnppfgb.exe31⤵
- Executes dropped EXE
PID:4740 -
C:\Windows\SysWOW64\Pdbiphhi.exeC:\Windows\system32\Pdbiphhi.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\Afkipi32.exeC:\Windows\system32\Afkipi32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\Adqeaf32.exeC:\Windows\system32\Adqeaf32.exe34⤵
- Executes dropped EXE
PID:3340 -
C:\Windows\SysWOW64\Cbnbhfde.exeC:\Windows\system32\Cbnbhfde.exe35⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\Dbckcf32.exeC:\Windows\system32\Dbckcf32.exe36⤵
- Executes dropped EXE
PID:4684 -
C:\Windows\SysWOW64\Dbehienn.exeC:\Windows\system32\Dbehienn.exe37⤵
- Executes dropped EXE
PID:3460 -
C:\Windows\SysWOW64\Fpqgjf32.exeC:\Windows\system32\Fpqgjf32.exe38⤵
- Executes dropped EXE
PID:712 -
C:\Windows\SysWOW64\Fpeaeedg.exeC:\Windows\system32\Fpeaeedg.exe39⤵
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\Gllajf32.exeC:\Windows\system32\Gllajf32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1140 -
C:\Windows\SysWOW64\Glnnofhi.exeC:\Windows\system32\Glnnofhi.exe41⤵
- Executes dropped EXE
PID:4816 -
C:\Windows\SysWOW64\Glchjedc.exeC:\Windows\system32\Glchjedc.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:844 -
C:\Windows\SysWOW64\Hjlaoioh.exeC:\Windows\system32\Hjlaoioh.exe43⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\Hjbhph32.exeC:\Windows\system32\Hjbhph32.exe44⤵
- Executes dropped EXE
PID:4184 -
C:\Windows\SysWOW64\Ifqoehhl.exeC:\Windows\system32\Ifqoehhl.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2092 -
C:\Windows\SysWOW64\Jmmcgbnf.exeC:\Windows\system32\Jmmcgbnf.exe46⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\SysWOW64\Kjlcmdbb.exeC:\Windows\system32\Kjlcmdbb.exe47⤵
- Executes dropped EXE
PID:4180 -
C:\Windows\SysWOW64\Kifjip32.exeC:\Windows\system32\Kifjip32.exe48⤵
- Executes dropped EXE
PID:496 -
C:\Windows\SysWOW64\Lfcmhc32.exeC:\Windows\system32\Lfcmhc32.exe49⤵
- Executes dropped EXE
PID:4308 -
C:\Windows\SysWOW64\Mffjnc32.exeC:\Windows\system32\Mffjnc32.exe50⤵
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\Mfmpob32.exeC:\Windows\system32\Mfmpob32.exe51⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\Nfdfoala.exeC:\Windows\system32\Nfdfoala.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Nmpkakak.exeC:\Windows\system32\Nmpkakak.exe53⤵
- Executes dropped EXE
PID:3720 -
C:\Windows\SysWOW64\Nkdlkope.exeC:\Windows\system32\Nkdlkope.exe54⤵
- Executes dropped EXE
PID:4512 -
C:\Windows\SysWOW64\Nhhldc32.exeC:\Windows\system32\Nhhldc32.exe55⤵
- Executes dropped EXE
PID:376 -
C:\Windows\SysWOW64\Ophjdehd.exeC:\Windows\system32\Ophjdehd.exe56⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\Opmcod32.exeC:\Windows\system32\Opmcod32.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1588 -
C:\Windows\SysWOW64\Pkinmlnm.exeC:\Windows\system32\Pkinmlnm.exe58⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\Qnopjfgi.exeC:\Windows\system32\Qnopjfgi.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\Ckafkfkp.exeC:\Windows\system32\Ckafkfkp.exe60⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\Enpknplq.exeC:\Windows\system32\Enpknplq.exe61⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\Enedio32.exeC:\Windows\system32\Enedio32.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\Eliecc32.exeC:\Windows\system32\Eliecc32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:736 -
C:\Windows\SysWOW64\Fbjcplhj.exeC:\Windows\system32\Fbjcplhj.exe64⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\Fkgejncb.exeC:\Windows\system32\Fkgejncb.exe65⤵
- Executes dropped EXE
PID:2232 -
C:\Windows\SysWOW64\Gklnem32.exeC:\Windows\system32\Gklnem32.exe66⤵PID:2852
-
C:\Windows\SysWOW64\Gbjlgj32.exeC:\Windows\system32\Gbjlgj32.exe67⤵PID:1080
-
C:\Windows\SysWOW64\Hepoddcc.exeC:\Windows\system32\Hepoddcc.exe68⤵
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\Hebkid32.exeC:\Windows\system32\Hebkid32.exe69⤵PID:1980
-
C:\Windows\SysWOW64\Hlnqln32.exeC:\Windows\system32\Hlnqln32.exe70⤵
- Modifies registry class
PID:4484 -
C:\Windows\SysWOW64\Hchihhng.exeC:\Windows\system32\Hchihhng.exe71⤵PID:3968
-
C:\Windows\SysWOW64\Iljpgl32.exeC:\Windows\system32\Iljpgl32.exe72⤵PID:880
-
C:\Windows\SysWOW64\Jchaoe32.exeC:\Windows\system32\Jchaoe32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1664 -
C:\Windows\SysWOW64\Kilphk32.exeC:\Windows\system32\Kilphk32.exe74⤵PID:2104
-
C:\Windows\SysWOW64\Kiajck32.exeC:\Windows\system32\Kiajck32.exe75⤵PID:2192
-
C:\Windows\SysWOW64\Kblkap32.exeC:\Windows\system32\Kblkap32.exe76⤵
- Modifies registry class
PID:528 -
C:\Windows\SysWOW64\Kmaooihb.exeC:\Windows\system32\Kmaooihb.exe77⤵PID:4724
-
C:\Windows\SysWOW64\Ljephmgl.exeC:\Windows\system32\Ljephmgl.exe78⤵PID:3436
-
C:\Windows\SysWOW64\Mcggga32.exeC:\Windows\system32\Mcggga32.exe79⤵
- Modifies registry class
PID:4960 -
C:\Windows\SysWOW64\Mihikgod.exeC:\Windows\system32\Mihikgod.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5128 -
C:\Windows\SysWOW64\Mjheejff.exeC:\Windows\system32\Mjheejff.exe81⤵PID:5176
-
C:\Windows\SysWOW64\Mcpjnp32.exeC:\Windows\system32\Mcpjnp32.exe82⤵PID:5216
-
C:\Windows\SysWOW64\Mimbfg32.exeC:\Windows\system32\Mimbfg32.exe83⤵
- Drops file in System32 directory
PID:5284 -
C:\Windows\SysWOW64\Nfcoekhe.exeC:\Windows\system32\Nfcoekhe.exe84⤵PID:5332
-
C:\Windows\SysWOW64\Ofmbkipk.exeC:\Windows\system32\Ofmbkipk.exe85⤵PID:5380
-
C:\Windows\SysWOW64\Pidamcgd.exeC:\Windows\system32\Pidamcgd.exe86⤵PID:5424
-
C:\Windows\SysWOW64\Ppoijn32.exeC:\Windows\system32\Ppoijn32.exe87⤵PID:5468
-
C:\Windows\SysWOW64\Pmipdq32.exeC:\Windows\system32\Pmipdq32.exe88⤵PID:5540
-
C:\Windows\SysWOW64\Apobakpn.exeC:\Windows\system32\Apobakpn.exe89⤵PID:5612
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Blabakle.exeC:\Windows\system32\Blabakle.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5652 -
C:\Windows\SysWOW64\Bkbcpb32.exeC:\Windows\system32\Bkbcpb32.exe2⤵
- Drops file in System32 directory
PID:5696 -
C:\Windows\SysWOW64\Bldogjib.exeC:\Windows\system32\Bldogjib.exe3⤵
- Drops file in System32 directory
PID:5740 -
C:\Windows\SysWOW64\Cgecpa32.exeC:\Windows\system32\Cgecpa32.exe4⤵
- Modifies registry class
PID:5784 -
C:\Windows\SysWOW64\Dgjmkqke.exeC:\Windows\system32\Dgjmkqke.exe5⤵PID:5832
-
C:\Windows\SysWOW64\Dgcoaock.exeC:\Windows\system32\Dgcoaock.exe6⤵PID:5876
-
C:\Windows\SysWOW64\Eclmlpfl.exeC:\Windows\system32\Eclmlpfl.exe7⤵PID:5920
-
C:\Windows\SysWOW64\Eglbhnkp.exeC:\Windows\system32\Eglbhnkp.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5964 -
C:\Windows\SysWOW64\Enigjh32.exeC:\Windows\system32\Enigjh32.exe9⤵PID:6004
-
C:\Windows\SysWOW64\Feella32.exeC:\Windows\system32\Feella32.exe10⤵PID:6048
-
C:\Windows\SysWOW64\Fhhaclqc.exeC:\Windows\system32\Fhhaclqc.exe11⤵PID:6092
-
C:\Windows\SysWOW64\Gehbio32.exeC:\Windows\system32\Gehbio32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4716 -
C:\Windows\SysWOW64\Khnfce32.exeC:\Windows\system32\Khnfce32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5164 -
C:\Windows\SysWOW64\Mejijcea.exeC:\Windows\system32\Mejijcea.exe14⤵
- Modifies registry class
PID:5188 -
C:\Windows\SysWOW64\Moomgl32.exeC:\Windows\system32\Moomgl32.exe15⤵PID:5276
-
C:\Windows\SysWOW64\Mfiedfmd.exeC:\Windows\system32\Mfiedfmd.exe16⤵PID:5308
-
C:\Windows\SysWOW64\Onecof32.exeC:\Windows\system32\Onecof32.exe17⤵PID:5388
-
C:\Windows\SysWOW64\Obcled32.exeC:\Windows\system32\Obcled32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5436 -
C:\Windows\SysWOW64\Oecego32.exeC:\Windows\system32\Oecego32.exe19⤵PID:5496
-
C:\Windows\SysWOW64\Onlipd32.exeC:\Windows\system32\Onlipd32.exe20⤵PID:5592
-
C:\Windows\SysWOW64\Ommjnlnd.exeC:\Windows\system32\Ommjnlnd.exe21⤵PID:5636
-
C:\Windows\SysWOW64\Pfmdgq32.exeC:\Windows\system32\Pfmdgq32.exe22⤵PID:5732
-
C:\Windows\SysWOW64\Abjkmqni.exeC:\Windows\system32\Abjkmqni.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5768 -
C:\Windows\SysWOW64\Ampojimo.exeC:\Windows\system32\Ampojimo.exe24⤵PID:644
-
C:\Windows\SysWOW64\Aghdco32.exeC:\Windows\system32\Aghdco32.exe25⤵PID:5884
-
C:\Windows\SysWOW64\Aochga32.exeC:\Windows\system32\Aochga32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5960 -
C:\Windows\SysWOW64\Aemqdk32.exeC:\Windows\system32\Aemqdk32.exe27⤵PID:4408
-
C:\Windows\SysWOW64\Apcead32.exeC:\Windows\system32\Apcead32.exe28⤵PID:6088
-
C:\Windows\SysWOW64\Boaeioej.exeC:\Windows\system32\Boaeioej.exe29⤵PID:6076
-
C:\Windows\SysWOW64\Benjkijd.exeC:\Windows\system32\Benjkijd.exe30⤵PID:6132
-
C:\Windows\SysWOW64\Cpcnhbjj.exeC:\Windows\system32\Cpcnhbjj.exe31⤵PID:6140
-
C:\Windows\SysWOW64\Cpmqoqbp.exeC:\Windows\system32\Cpmqoqbp.exe32⤵PID:4236
-
C:\Windows\SysWOW64\Cfiiggpg.exeC:\Windows\system32\Cfiiggpg.exe33⤵
- Drops file in System32 directory
PID:5200 -
C:\Windows\SysWOW64\Dcbckk32.exeC:\Windows\system32\Dcbckk32.exe34⤵PID:5296
-
C:\Windows\SysWOW64\Emoaopnf.exeC:\Windows\system32\Emoaopnf.exe35⤵PID:1064
-
C:\Windows\SysWOW64\Ejjgic32.exeC:\Windows\system32\Ejjgic32.exe36⤵PID:1676
-
C:\Windows\SysWOW64\Fgcang32.exeC:\Windows\system32\Fgcang32.exe37⤵PID:3132
-
C:\Windows\SysWOW64\Fakfglhm.exeC:\Windows\system32\Fakfglhm.exe38⤵PID:5560
-
C:\Windows\SysWOW64\Ggldde32.exeC:\Windows\system32\Ggldde32.exe39⤵PID:4804
-
C:\Windows\SysWOW64\Gfaaebnj.exeC:\Windows\system32\Gfaaebnj.exe40⤵
- Drops file in System32 directory
PID:5708 -
C:\Windows\SysWOW64\Gpjfng32.exeC:\Windows\system32\Gpjfng32.exe41⤵PID:5792
-
C:\Windows\SysWOW64\Hcjkje32.exeC:\Windows\system32\Hcjkje32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5872 -
C:\Windows\SysWOW64\Hmbpbk32.exeC:\Windows\system32\Hmbpbk32.exe43⤵
- Modifies registry class
PID:4380 -
C:\Windows\SysWOW64\Iffcgoka.exeC:\Windows\system32\Iffcgoka.exe44⤵PID:976
-
C:\Windows\SysWOW64\Jgdphm32.exeC:\Windows\system32\Jgdphm32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5416 -
C:\Windows\SysWOW64\Mqbpjmeg.exeC:\Windows\system32\Mqbpjmeg.exe46⤵PID:4784
-
C:\Windows\SysWOW64\Onifpodl.exeC:\Windows\system32\Onifpodl.exe47⤵PID:5812
-
C:\Windows\SysWOW64\Phmjdbpo.exeC:\Windows\system32\Phmjdbpo.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:840 -
C:\Windows\SysWOW64\Qbekgknb.exeC:\Windows\system32\Qbekgknb.exe49⤵PID:2548
-
C:\Windows\SysWOW64\Ahdpea32.exeC:\Windows\system32\Ahdpea32.exe50⤵PID:1548
-
C:\Windows\SysWOW64\Bhibgo32.exeC:\Windows\system32\Bhibgo32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3944 -
C:\Windows\SysWOW64\Clihcm32.exeC:\Windows\system32\Clihcm32.exe52⤵
- Modifies registry class
PID:4972 -
C:\Windows\SysWOW64\Dcdifdem.exeC:\Windows\system32\Dcdifdem.exe53⤵PID:6120
-
C:\Windows\SysWOW64\Efgono32.exeC:\Windows\system32\Efgono32.exe54⤵PID:4492
-
C:\Windows\SysWOW64\Elepei32.exeC:\Windows\system32\Elepei32.exe55⤵PID:5092
-
C:\Windows\SysWOW64\Ejiqom32.exeC:\Windows\system32\Ejiqom32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3512 -
C:\Windows\SysWOW64\Hpnhoqmi.exeC:\Windows\system32\Hpnhoqmi.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3332 -
C:\Windows\SysWOW64\Hcnnjoam.exeC:\Windows\system32\Hcnnjoam.exe58⤵PID:5420
-
C:\Windows\SysWOW64\Hadkib32.exeC:\Windows\system32\Hadkib32.exe59⤵PID:1112
-
C:\Windows\SysWOW64\Hfacai32.exeC:\Windows\system32\Hfacai32.exe60⤵
- Modifies registry class
PID:2000 -
C:\Windows\SysWOW64\Kbocng32.exeC:\Windows\system32\Kbocng32.exe61⤵
- Drops file in System32 directory
PID:2208 -
C:\Windows\SysWOW64\Kmgdaokh.exeC:\Windows\system32\Kmgdaokh.exe62⤵
- Drops file in System32 directory
PID:1428 -
C:\Windows\SysWOW64\Lpapiipo.exeC:\Windows\system32\Lpapiipo.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2836 -
C:\Windows\SysWOW64\Lgnekcei.exeC:\Windows\system32\Lgnekcei.exe64⤵PID:5728
-
C:\Windows\SysWOW64\Mknjgajl.exeC:\Windows\system32\Mknjgajl.exe65⤵PID:1656
-
C:\Windows\SysWOW64\Ndmepe32.exeC:\Windows\system32\Ndmepe32.exe66⤵
- Modifies registry class
PID:2244 -
C:\Windows\SysWOW64\Bjbnndgl.exeC:\Windows\system32\Bjbnndgl.exe67⤵PID:1588
-
C:\Windows\SysWOW64\Ekqcfpmj.exeC:\Windows\system32\Ekqcfpmj.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3640 -
C:\Windows\SysWOW64\Edkddeag.exeC:\Windows\system32\Edkddeag.exe69⤵
- Drops file in System32 directory
- Modifies registry class
PID:4032 -
C:\Windows\SysWOW64\Eoaianan.exeC:\Windows\system32\Eoaianan.exe70⤵PID:4404
-
C:\Windows\SysWOW64\Ednajepe.exeC:\Windows\system32\Ednajepe.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2132 -
C:\Windows\SysWOW64\Femndhgh.exeC:\Windows\system32\Femndhgh.exe72⤵PID:6060
-
C:\Windows\SysWOW64\Fhemfbnq.exeC:\Windows\system32\Fhemfbnq.exe73⤵PID:1508
-
C:\Windows\SysWOW64\Gfbpfedp.exeC:\Windows\system32\Gfbpfedp.exe74⤵
- Modifies registry class
PID:1300 -
C:\Windows\SysWOW64\Hihbco32.exeC:\Windows\system32\Hihbco32.exe75⤵PID:4612
-
C:\Windows\SysWOW64\Ifefbbdj.exeC:\Windows\system32\Ifefbbdj.exe76⤵PID:2100
-
C:\Windows\SysWOW64\Jfllca32.exeC:\Windows\system32\Jfllca32.exe77⤵PID:1684
-
C:\Windows\SysWOW64\Jlidkh32.exeC:\Windows\system32\Jlidkh32.exe78⤵PID:5316
-
C:\Windows\SysWOW64\Jefbomoe.exeC:\Windows\system32\Jefbomoe.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5356 -
C:\Windows\SysWOW64\Jcgbmd32.exeC:\Windows\system32\Jcgbmd32.exe80⤵PID:3340
-
C:\Windows\SysWOW64\Klgqmfpj.exeC:\Windows\system32\Klgqmfpj.exe81⤵PID:3996
-
C:\Windows\SysWOW64\Mlnpdc32.exeC:\Windows\system32\Mlnpdc32.exe82⤵PID:1248
-
C:\Windows\SysWOW64\Mnpice32.exeC:\Windows\system32\Mnpice32.exe83⤵PID:2668
-
C:\Windows\SysWOW64\Mcmall32.exeC:\Windows\system32\Mcmall32.exe84⤵PID:3352
-
C:\Windows\SysWOW64\Nnbeie32.exeC:\Windows\system32\Nnbeie32.exe85⤵PID:2264
-
C:\Windows\SysWOW64\Pnonla32.exeC:\Windows\system32\Pnonla32.exe86⤵PID:4076
-
C:\Windows\SysWOW64\Bglefdke.exeC:\Windows\system32\Bglefdke.exe87⤵PID:5012
-
C:\Windows\SysWOW64\Ceihffad.exeC:\Windows\system32\Ceihffad.exe88⤵PID:5300
-
C:\Windows\SysWOW64\Ghiogkfp.exeC:\Windows\system32\Ghiogkfp.exe89⤵PID:5444
-
C:\Windows\SysWOW64\Igcojdhp.exeC:\Windows\system32\Igcojdhp.exe90⤵PID:5484
-
C:\Windows\SysWOW64\Jiokpfee.exeC:\Windows\system32\Jiokpfee.exe91⤵PID:5544
-
C:\Windows\SysWOW64\Lfjjqg32.exeC:\Windows\system32\Lfjjqg32.exe92⤵
- Modifies registry class
PID:5744 -
C:\Windows\SysWOW64\Llgcin32.exeC:\Windows\system32\Llgcin32.exe93⤵PID:1640
-
C:\Windows\SysWOW64\Neppiagi.exeC:\Windows\system32\Neppiagi.exe94⤵PID:4488
-
C:\Windows\SysWOW64\Npgalidl.exeC:\Windows\system32\Npgalidl.exe95⤵PID:844
-
C:\Windows\SysWOW64\Oidopn32.exeC:\Windows\system32\Oidopn32.exe96⤵
- Drops file in System32 directory
PID:1784 -
C:\Windows\SysWOW64\Ocmchdmh.exeC:\Windows\system32\Ocmchdmh.exe97⤵
- Drops file in System32 directory
- Modifies registry class
PID:5936 -
C:\Windows\SysWOW64\Oiihkncb.exeC:\Windows\system32\Oiihkncb.exe98⤵PID:3656
-
C:\Windows\SysWOW64\Pckpja32.exeC:\Windows\system32\Pckpja32.exe99⤵PID:2928
-
C:\Windows\SysWOW64\Biadoeib.exeC:\Windows\system32\Biadoeib.exe100⤵PID:852
-
C:\Windows\SysWOW64\Bgbdml32.exeC:\Windows\system32\Bgbdml32.exe101⤵PID:4376
-
C:\Windows\SysWOW64\Bciebm32.exeC:\Windows\system32\Bciebm32.exe102⤵
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\Cppfgnlj.exeC:\Windows\system32\Cppfgnlj.exe103⤵PID:1468
-
C:\Windows\SysWOW64\Cpeobn32.exeC:\Windows\system32\Cpeobn32.exe104⤵PID:2852
-
C:\Windows\SysWOW64\Cfogohpa.exeC:\Windows\system32\Cfogohpa.exe105⤵PID:3680
-
C:\Windows\SysWOW64\Cadllq32.exeC:\Windows\system32\Cadllq32.exe106⤵PID:4932
-
C:\Windows\SysWOW64\Cfaddg32.exeC:\Windows\system32\Cfaddg32.exe107⤵PID:5224
-
C:\Windows\SysWOW64\Daiegp32.exeC:\Windows\system32\Daiegp32.exe108⤵
- Drops file in System32 directory
PID:3980 -
C:\Windows\SysWOW64\Dmpfla32.exeC:\Windows\system32\Dmpfla32.exe109⤵
- Drops file in System32 directory
PID:5324 -
C:\Windows\SysWOW64\Dmdogpmq.exeC:\Windows\system32\Dmdogpmq.exe110⤵PID:5476
-
C:\Windows\SysWOW64\Ddngdj32.exeC:\Windows\system32\Ddngdj32.exe111⤵PID:5596
-
C:\Windows\SysWOW64\Djhpqdlj.exeC:\Windows\system32\Djhpqdlj.exe112⤵PID:5636
-
C:\Windows\SysWOW64\Edqdij32.exeC:\Windows\system32\Edqdij32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2576 -
C:\Windows\SysWOW64\Edemdine.exeC:\Windows\system32\Edemdine.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5912 -
C:\Windows\SysWOW64\Eibfmp32.exeC:\Windows\system32\Eibfmp32.exe115⤵PID:5144
-
C:\Windows\SysWOW64\Effffd32.exeC:\Windows\system32\Effffd32.exe116⤵PID:6088
-
C:\Windows\SysWOW64\Ehecpgbi.exeC:\Windows\system32\Ehecpgbi.exe117⤵PID:1460
-
C:\Windows\SysWOW64\Fiilmofe.exeC:\Windows\system32\Fiilmofe.exe118⤵PID:4344
-
C:\Windows\SysWOW64\Gmcdolbn.exeC:\Windows\system32\Gmcdolbn.exe119⤵PID:184
-
C:\Windows\SysWOW64\Ggpbcaei.exeC:\Windows\system32\Ggpbcaei.exe120⤵
- Drops file in System32 directory
PID:5044 -
C:\Windows\SysWOW64\Hgboiq32.exeC:\Windows\system32\Hgboiq32.exe121⤵
- Drops file in System32 directory
- Modifies registry class
PID:1152 -
C:\Windows\SysWOW64\Hkeajn32.exeC:\Windows\system32\Hkeajn32.exe122⤵PID:5548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-