Analysis
-
max time kernel
265s -
max time network
290s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 00:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe
Resource
win7-20231023-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe
Resource
win10v2004-20231023-en
6 signatures
150 seconds
General
-
Target
NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe
-
Size
194KB
-
MD5
cc31169b4bf7b175de7328845dac26e0
-
SHA1
b21ec1096266cebc7674318624349473ff62dfd0
-
SHA256
98bf8e1abaea507142f46f3e681984ee22b539431106325f5586e11b0a38bf2f
-
SHA512
385108d757ed610255aed0467b97d87d825be7552ef3c796eba17bde031aac192443012a918a85cbf1762457d97a1c6259c8467dd30edf8fd065dada241c9e07
-
SSDEEP
6144:s2BWbBVi7dSfUNRbCeKpNYxWlJ7mkD6pNY:NBiBV
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eljihn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnahoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qfpggjdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnmpdmpb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pikcfhji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbpbklpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjgjmipf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmceihco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkgahpdk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boekqn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmdnefpe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgdippej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnanbijd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgbochop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llkfan32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moioml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjfaok32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfgdhkki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohkbkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbccimlp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Olcjbd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eebnqcjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enmbeehg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlkcjadb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpjnlhbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejfpofkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjhogj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbqabl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bioddj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Demhhmfg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjaiip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahqmfhal.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfpggjdh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjfaok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkqqmanl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggjmhn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocgemb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckklfoah.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjcflkdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odkhmhcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncqomc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aohhnb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcpcppfh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfjfhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akekaakp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cakbojch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eafapd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnoacjlm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aglkfb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmbcdkil.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mocjha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idabbpgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Boekqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjqigkfp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnlegj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbcnhkmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjmfaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jhbclbhc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnoacjlm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baaoiklb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkgahpdk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Paiepj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbmgip32.exe -
Executes dropped EXE 64 IoCs
pid Process 2516 Pjgiad32.exe 3020 Eljihn32.exe 2860 Eafapd32.exe 3012 Eebnqcjl.exe 772 Enmbeehg.exe 1756 Ehbgbngm.exe 2812 Ejfpofkh.exe 2720 Ffdgef32.exe 1160 Fmnoapba.exe 1252 Gnahoh32.exe 2340 Ggjmhn32.exe 1496 Genmab32.exe 1592 Hiieqd32.exe 1748 Hljnbo32.exe 1824 Ibfcei32.exe 1152 Ifmbilhq.exe 564 Idabbpgj.exe 348 Jiphpf32.exe 852 Jpjpmqjl.exe 1728 Jaklei32.exe 3040 Jckiolgm.exe 2664 Jkfncn32.exe 840 Lbdljk32.exe 2236 Lgadba32.exe 1732 Lbghpjih.exe 1708 Iehejc32.exe 3004 Ojckmm32.exe 2276 Hgdagelg.exe 2888 Palincli.exe 1564 Phfaknce.exe 2832 Paoedc32.exe 2464 Pbpbklpd.exe 1532 Pjgjmipf.exe 396 Qlkcjadb.exe 1408 Qfpggjdh.exe 1216 Ahdqdahc.exe 2936 Boekqn32.exe 756 Cfocmhcq.exe 880 Ckklfoah.exe 2160 Cqhdnfpp.exe 2128 Cjqigkfp.exe 1148 Cnlegj32.exe 1144 Cgdippej.exe 1780 Cjcflkdm.exe 1500 Cmabhfca.exe 2264 Cdhjjddc.exe 2260 Cnanbijd.exe 2988 Cjhogj32.exe 1680 Dmfkcf32.exe 2732 Dcpcppfh.exe 2792 Ecppoc32.exe 924 Efnlko32.exe 2672 Ehnieaoj.exe 2804 Eafmng32.exe 2084 Ejoagm32.exe 2852 Fdbidfjm.exe 2580 Gclopbjo.exe 2892 Gdklje32.exe 1064 Gpdide32.exe 2856 Hahbam32.exe 2424 Cgbochop.exe 2420 Eoiihf32.exe 1076 Llkfan32.exe 812 Lbeonhhj.exe -
Loads dropped DLL 64 IoCs
pid Process 2652 NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe 2652 NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe 2516 Pjgiad32.exe 2516 Pjgiad32.exe 3020 Eljihn32.exe 3020 Eljihn32.exe 2860 Eafapd32.exe 2860 Eafapd32.exe 3012 Eebnqcjl.exe 3012 Eebnqcjl.exe 772 Enmbeehg.exe 772 Enmbeehg.exe 1756 Ehbgbngm.exe 1756 Ehbgbngm.exe 2812 Ejfpofkh.exe 2812 Ejfpofkh.exe 2720 Ffdgef32.exe 2720 Ffdgef32.exe 1160 Fmnoapba.exe 1160 Fmnoapba.exe 1252 Gnahoh32.exe 1252 Gnahoh32.exe 2340 Ggjmhn32.exe 2340 Ggjmhn32.exe 1496 Genmab32.exe 1496 Genmab32.exe 1592 Hiieqd32.exe 1592 Hiieqd32.exe 1748 Hljnbo32.exe 1748 Hljnbo32.exe 1824 Ibfcei32.exe 1824 Ibfcei32.exe 1152 Ifmbilhq.exe 1152 Ifmbilhq.exe 564 Idabbpgj.exe 564 Idabbpgj.exe 348 Jiphpf32.exe 348 Jiphpf32.exe 852 Jpjpmqjl.exe 852 Jpjpmqjl.exe 1728 Jaklei32.exe 1728 Jaklei32.exe 3040 Jckiolgm.exe 3040 Jckiolgm.exe 2664 Jkfncn32.exe 2664 Jkfncn32.exe 840 Lbdljk32.exe 840 Lbdljk32.exe 2236 Lgadba32.exe 2236 Lgadba32.exe 1732 Lbghpjih.exe 1732 Lbghpjih.exe 1708 Iehejc32.exe 1708 Iehejc32.exe 3004 Ojckmm32.exe 3004 Ojckmm32.exe 2276 Hgdagelg.exe 2276 Hgdagelg.exe 2888 Palincli.exe 2888 Palincli.exe 1564 Phfaknce.exe 1564 Phfaknce.exe 2832 Paoedc32.exe 2832 Paoedc32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Cjcflkdm.exe Cgdippej.exe File created C:\Windows\SysWOW64\Eoiihf32.exe Cgbochop.exe File created C:\Windows\SysWOW64\Doggbagm.dll Lgelolak.exe File created C:\Windows\SysWOW64\Genmab32.exe Ggjmhn32.exe File created C:\Windows\SysWOW64\Mdbido32.dll Phfaknce.exe File opened for modification C:\Windows\SysWOW64\Qfpggjdh.exe Qlkcjadb.exe File created C:\Windows\SysWOW64\Mdfljc32.dll Dmfkcf32.exe File opened for modification C:\Windows\SysWOW64\Baaoiklb.exe Bioddj32.exe File created C:\Windows\SysWOW64\Aebfof32.dll Ibfcei32.exe File created C:\Windows\SysWOW64\Lbghpjih.exe Lgadba32.exe File created C:\Windows\SysWOW64\Mogefmni.dll Pjgjmipf.exe File created C:\Windows\SysWOW64\Dlldgd32.dll Gdklje32.exe File created C:\Windows\SysWOW64\Mbqabl32.exe Mckdaojc.exe File opened for modification C:\Windows\SysWOW64\Phlgle32.exe Pncbcple.exe File opened for modification C:\Windows\SysWOW64\Akafhc32.exe Ahcilg32.exe File created C:\Windows\SysWOW64\Ffqkon32.dll Aaknemej.exe File created C:\Windows\SysWOW64\Dcpcppfh.exe Dmfkcf32.exe File created C:\Windows\SysWOW64\Ehnieaoj.exe Efnlko32.exe File created C:\Windows\SysWOW64\Aglkfb32.exe Aabcjhig.exe File created C:\Windows\SysWOW64\Hmggja32.dll Cliplc32.exe File created C:\Windows\SysWOW64\Negeelle.dll Mbccimlp.exe File created C:\Windows\SysWOW64\Lefdjmig.dll Cnlegj32.exe File created C:\Windows\SysWOW64\Lanhkloq.dll Lkgahpdk.exe File opened for modification C:\Windows\SysWOW64\Nddlkh32.exe Nklgbb32.exe File created C:\Windows\SysWOW64\Bbmgip32.exe Bfffdopo.exe File opened for modification C:\Windows\SysWOW64\Cjhogj32.exe Cnanbijd.exe File opened for modification C:\Windows\SysWOW64\Cblogb32.exe Cakbojch.exe File created C:\Windows\SysWOW64\Bccqmd32.exe Akcbnb32.exe File created C:\Windows\SysWOW64\Bllefjlq.exe Bccqmd32.exe File opened for modification C:\Windows\SysWOW64\Bjdojm32.exe Bbmgip32.exe File opened for modification C:\Windows\SysWOW64\Palincli.exe Hgdagelg.exe File opened for modification C:\Windows\SysWOW64\Pbpbklpd.exe Paoedc32.exe File opened for modification C:\Windows\SysWOW64\Cdhjjddc.exe Cmabhfca.exe File created C:\Windows\SysWOW64\Fdbidfjm.exe Ejoagm32.exe File created C:\Windows\SysWOW64\Oidmei32.exe Ocgemb32.exe File created C:\Windows\SysWOW64\Mocjha32.exe Mjfaok32.exe File opened for modification C:\Windows\SysWOW64\Olcjbd32.exe Oidmei32.exe File created C:\Windows\SysWOW64\Elcfmlgl.dll Jkfncn32.exe File created C:\Windows\SysWOW64\Ckeqca32.dll Cqhdnfpp.exe File created C:\Windows\SysWOW64\Bgnplmep.dll Lbeonhhj.exe File created C:\Windows\SysWOW64\Qaakki32.dll Mmalde32.exe File created C:\Windows\SysWOW64\Bkkjjd32.dll Qikojg32.exe File opened for modification C:\Windows\SysWOW64\Lbdljk32.exe Jkfncn32.exe File created C:\Windows\SysWOW64\Npikgo32.exe Moioml32.exe File created C:\Windows\SysWOW64\Aaknemej.exe Akafhc32.exe File created C:\Windows\SysWOW64\Akcbnb32.exe Aaknemej.exe File created C:\Windows\SysWOW64\Ogjdndbf.dll Iehejc32.exe File opened for modification C:\Windows\SysWOW64\Boekqn32.exe Ahdqdahc.exe File created C:\Windows\SysWOW64\Ifkelb32.dll Mbqabl32.exe File created C:\Windows\SysWOW64\Ceghdn32.dll Pqiddfof.exe File created C:\Windows\SysWOW64\Jqdlngek.dll Aohhnb32.exe File created C:\Windows\SysWOW64\Ffdgef32.exe Ejfpofkh.exe File opened for modification C:\Windows\SysWOW64\Ejoagm32.exe Eafmng32.exe File created C:\Windows\SysWOW64\Bjdojm32.exe Bbmgip32.exe File created C:\Windows\SysWOW64\Gjkoha32.dll Cmkmclod.exe File created C:\Windows\SysWOW64\Nkkdbcln.dll Cakbojch.exe File created C:\Windows\SysWOW64\Goinbpgb.dll Oidmei32.exe File opened for modification C:\Windows\SysWOW64\Ahcilg32.exe Ahqmfhal.exe File created C:\Windows\SysWOW64\Eqoebgeq.dll Moioml32.exe File opened for modification C:\Windows\SysWOW64\Cdeepf32.exe Cmkmclod.exe File created C:\Windows\SysWOW64\Fmnoapba.exe Ffdgef32.exe File created C:\Windows\SysWOW64\Cnanbijd.exe Cdhjjddc.exe File created C:\Windows\SysWOW64\Pnoacjlm.exe Pgeigp32.exe File opened for modification C:\Windows\SysWOW64\Bjmfaf32.exe Ekeplb32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmabhfca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdgbeeen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qiffjlpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfffdopo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogadha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkpmnk32.dll" Pjaiip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ggjmhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlldgd32.dll" Gdklje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pobjaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfldid32.dll" Mocjha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahqmfhal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngmgfpki.dll" Ifmbilhq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcndqobj.dll" Jpjpmqjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eifehecg.dll" Jaklei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aaknemej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kegflkfk.dll" Ggjmhn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hiieqd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eafmng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nklgbb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejfpofkh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ffdgef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffdgef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mogefmni.dll" Pjgjmipf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckklfoah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iebaphie.dll" Cgbochop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdeepf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpaaoi32.dll" Pnoacjlm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mannkkka.dll" Akekaakp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kidlfdlm.dll" Dmdpjjgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjaiip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elcfmlgl.dll" Jkfncn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Olcjbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdobeogh.dll" Bllefjlq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbpbklpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iifojn32.dll" Pobjaapi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eommkd32.dll" Aglkfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkkdbcln.dll" Cakbojch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmndfh32.dll" Nddlkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nfdhekpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pbakjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hahbam32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eafapd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iehejc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chlheeco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmjhod32.dll" Ojckmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfdhekpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlkjfm32.dll" Nkqqmanl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccfcic32.dll" Ejoagm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjmfaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Haekmidp.dll" Eogqdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkqqmanl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocgemb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jiphpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjfaok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlabee32.dll" Bpjnlhbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jckiolgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cqhdnfpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmceihco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojckmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mfgdhkki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ohkbkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckajbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfqgld32.dll" NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2516 2652 NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe 27 PID 2652 wrote to memory of 2516 2652 NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe 27 PID 2652 wrote to memory of 2516 2652 NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe 27 PID 2652 wrote to memory of 2516 2652 NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe 27 PID 2516 wrote to memory of 3020 2516 Pjgiad32.exe 28 PID 2516 wrote to memory of 3020 2516 Pjgiad32.exe 28 PID 2516 wrote to memory of 3020 2516 Pjgiad32.exe 28 PID 2516 wrote to memory of 3020 2516 Pjgiad32.exe 28 PID 3020 wrote to memory of 2860 3020 Eljihn32.exe 29 PID 3020 wrote to memory of 2860 3020 Eljihn32.exe 29 PID 3020 wrote to memory of 2860 3020 Eljihn32.exe 29 PID 3020 wrote to memory of 2860 3020 Eljihn32.exe 29 PID 2860 wrote to memory of 3012 2860 Eafapd32.exe 31 PID 2860 wrote to memory of 3012 2860 Eafapd32.exe 31 PID 2860 wrote to memory of 3012 2860 Eafapd32.exe 31 PID 2860 wrote to memory of 3012 2860 Eafapd32.exe 31 PID 3012 wrote to memory of 772 3012 Eebnqcjl.exe 30 PID 3012 wrote to memory of 772 3012 Eebnqcjl.exe 30 PID 3012 wrote to memory of 772 3012 Eebnqcjl.exe 30 PID 3012 wrote to memory of 772 3012 Eebnqcjl.exe 30 PID 772 wrote to memory of 1756 772 Enmbeehg.exe 32 PID 772 wrote to memory of 1756 772 Enmbeehg.exe 32 PID 772 wrote to memory of 1756 772 Enmbeehg.exe 32 PID 772 wrote to memory of 1756 772 Enmbeehg.exe 32 PID 1756 wrote to memory of 2812 1756 Ehbgbngm.exe 33 PID 1756 wrote to memory of 2812 1756 Ehbgbngm.exe 33 PID 1756 wrote to memory of 2812 1756 Ehbgbngm.exe 33 PID 1756 wrote to memory of 2812 1756 Ehbgbngm.exe 33 PID 2812 wrote to memory of 2720 2812 Ejfpofkh.exe 34 PID 2812 wrote to memory of 2720 2812 Ejfpofkh.exe 34 PID 2812 wrote to memory of 2720 2812 Ejfpofkh.exe 34 PID 2812 wrote to memory of 2720 2812 Ejfpofkh.exe 34 PID 2720 wrote to memory of 1160 2720 Ffdgef32.exe 35 PID 2720 wrote to memory of 1160 2720 Ffdgef32.exe 35 PID 2720 wrote to memory of 1160 2720 Ffdgef32.exe 35 PID 2720 wrote to memory of 1160 2720 Ffdgef32.exe 35 PID 1160 wrote to memory of 1252 1160 Fmnoapba.exe 37 PID 1160 wrote to memory of 1252 1160 Fmnoapba.exe 37 PID 1160 wrote to memory of 1252 1160 Fmnoapba.exe 37 PID 1160 wrote to memory of 1252 1160 Fmnoapba.exe 37 PID 1252 wrote to memory of 2340 1252 Gnahoh32.exe 36 PID 1252 wrote to memory of 2340 1252 Gnahoh32.exe 36 PID 1252 wrote to memory of 2340 1252 Gnahoh32.exe 36 PID 1252 wrote to memory of 2340 1252 Gnahoh32.exe 36 PID 2340 wrote to memory of 1496 2340 Ggjmhn32.exe 38 PID 2340 wrote to memory of 1496 2340 Ggjmhn32.exe 38 PID 2340 wrote to memory of 1496 2340 Ggjmhn32.exe 38 PID 2340 wrote to memory of 1496 2340 Ggjmhn32.exe 38 PID 1496 wrote to memory of 1592 1496 Genmab32.exe 39 PID 1496 wrote to memory of 1592 1496 Genmab32.exe 39 PID 1496 wrote to memory of 1592 1496 Genmab32.exe 39 PID 1496 wrote to memory of 1592 1496 Genmab32.exe 39 PID 1592 wrote to memory of 1748 1592 Hiieqd32.exe 40 PID 1592 wrote to memory of 1748 1592 Hiieqd32.exe 40 PID 1592 wrote to memory of 1748 1592 Hiieqd32.exe 40 PID 1592 wrote to memory of 1748 1592 Hiieqd32.exe 40 PID 1748 wrote to memory of 1824 1748 Hljnbo32.exe 41 PID 1748 wrote to memory of 1824 1748 Hljnbo32.exe 41 PID 1748 wrote to memory of 1824 1748 Hljnbo32.exe 41 PID 1748 wrote to memory of 1824 1748 Hljnbo32.exe 41 PID 1824 wrote to memory of 1152 1824 Ibfcei32.exe 42 PID 1824 wrote to memory of 1152 1824 Ibfcei32.exe 42 PID 1824 wrote to memory of 1152 1824 Ibfcei32.exe 42 PID 1824 wrote to memory of 1152 1824 Ibfcei32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.cc31169b4bf7b175de7328845dac26e0_JC.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\Pjgiad32.exeC:\Windows\system32\Pjgiad32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\Eljihn32.exeC:\Windows\system32\Eljihn32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\Eafapd32.exeC:\Windows\system32\Eafapd32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\Eebnqcjl.exeC:\Windows\system32\Eebnqcjl.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012
-
-
-
-
-
C:\Windows\SysWOW64\Enmbeehg.exeC:\Windows\system32\Enmbeehg.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\Ehbgbngm.exeC:\Windows\system32\Ehbgbngm.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\Ejfpofkh.exeC:\Windows\system32\Ejfpofkh.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\Ffdgef32.exeC:\Windows\system32\Ffdgef32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Fmnoapba.exeC:\Windows\system32\Fmnoapba.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\Gnahoh32.exeC:\Windows\system32\Gnahoh32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252
-
-
-
-
-
-
C:\Windows\SysWOW64\Ggjmhn32.exeC:\Windows\system32\Ggjmhn32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\Genmab32.exeC:\Windows\system32\Genmab32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\Hiieqd32.exeC:\Windows\system32\Hiieqd32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\Hljnbo32.exeC:\Windows\system32\Hljnbo32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\Ibfcei32.exeC:\Windows\system32\Ibfcei32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\Ifmbilhq.exeC:\Windows\system32\Ifmbilhq.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1152 -
C:\Windows\SysWOW64\Idabbpgj.exeC:\Windows\system32\Idabbpgj.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:564 -
C:\Windows\SysWOW64\Jiphpf32.exeC:\Windows\system32\Jiphpf32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:348 -
C:\Windows\SysWOW64\Jpjpmqjl.exeC:\Windows\system32\Jpjpmqjl.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:852 -
C:\Windows\SysWOW64\Jaklei32.exeC:\Windows\system32\Jaklei32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1728 -
C:\Windows\SysWOW64\Jckiolgm.exeC:\Windows\system32\Jckiolgm.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Jkfncn32.exeC:\Windows\system32\Jkfncn32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Lbdljk32.exeC:\Windows\system32\Lbdljk32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:840 -
C:\Windows\SysWOW64\Lgadba32.exeC:\Windows\system32\Lgadba32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2236 -
C:\Windows\SysWOW64\Lbghpjih.exeC:\Windows\system32\Lbghpjih.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1732 -
C:\Windows\SysWOW64\Iehejc32.exeC:\Windows\system32\Iehejc32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Ojckmm32.exeC:\Windows\system32\Ojckmm32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\Hgdagelg.exeC:\Windows\system32\Hgdagelg.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2276 -
C:\Windows\SysWOW64\Palincli.exeC:\Windows\system32\Palincli.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Windows\SysWOW64\Phfaknce.exeC:\Windows\system32\Phfaknce.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1564
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Paoedc32.exeC:\Windows\system32\Paoedc32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\Pbpbklpd.exeC:\Windows\system32\Pbpbklpd.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2464 -
C:\Windows\SysWOW64\Pjgjmipf.exeC:\Windows\system32\Pjgjmipf.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1532 -
C:\Windows\SysWOW64\Qlkcjadb.exeC:\Windows\system32\Qlkcjadb.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:396 -
C:\Windows\SysWOW64\Qfpggjdh.exeC:\Windows\system32\Qfpggjdh.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\Ahdqdahc.exeC:\Windows\system32\Ahdqdahc.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1216 -
C:\Windows\SysWOW64\Boekqn32.exeC:\Windows\system32\Boekqn32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\Cfocmhcq.exeC:\Windows\system32\Cfocmhcq.exe8⤵
- Executes dropped EXE
PID:756 -
C:\Windows\SysWOW64\Ckklfoah.exeC:\Windows\system32\Ckklfoah.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:880 -
C:\Windows\SysWOW64\Cqhdnfpp.exeC:\Windows\system32\Cqhdnfpp.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2160 -
C:\Windows\SysWOW64\Cjqigkfp.exeC:\Windows\system32\Cjqigkfp.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\Cnlegj32.exeC:\Windows\system32\Cnlegj32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1148 -
C:\Windows\SysWOW64\Cgdippej.exeC:\Windows\system32\Cgdippej.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1144 -
C:\Windows\SysWOW64\Cjcflkdm.exeC:\Windows\system32\Cjcflkdm.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\Cmabhfca.exeC:\Windows\system32\Cmabhfca.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1500 -
C:\Windows\SysWOW64\Cdhjjddc.exeC:\Windows\system32\Cdhjjddc.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\Cnanbijd.exeC:\Windows\system32\Cnanbijd.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\Cjhogj32.exeC:\Windows\system32\Cjhogj32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2988 -
C:\Windows\SysWOW64\Dmfkcf32.exeC:\Windows\system32\Dmfkcf32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\Dcpcppfh.exeC:\Windows\system32\Dcpcppfh.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\Ecppoc32.exeC:\Windows\system32\Ecppoc32.exe21⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\Efnlko32.exeC:\Windows\system32\Efnlko32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:924 -
C:\Windows\SysWOW64\Ehnieaoj.exeC:\Windows\system32\Ehnieaoj.exe23⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\SysWOW64\Eafmng32.exeC:\Windows\system32\Eafmng32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\Ejoagm32.exeC:\Windows\system32\Ejoagm32.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2084 -
C:\Windows\SysWOW64\Fdbidfjm.exeC:\Windows\system32\Fdbidfjm.exe26⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\Gclopbjo.exeC:\Windows\system32\Gclopbjo.exe27⤵
- Executes dropped EXE
PID:2580 -
C:\Windows\SysWOW64\Gdklje32.exeC:\Windows\system32\Gdklje32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\Gpdide32.exeC:\Windows\system32\Gpdide32.exe29⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\Hahbam32.exeC:\Windows\system32\Hahbam32.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:2856 -
C:\Windows\SysWOW64\Cgbochop.exeC:\Windows\system32\Cgbochop.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2424 -
C:\Windows\SysWOW64\Eoiihf32.exeC:\Windows\system32\Eoiihf32.exe32⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\Llkfan32.exeC:\Windows\system32\Llkfan32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\Lbeonhhj.exeC:\Windows\system32\Lbeonhhj.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:812 -
C:\Windows\SysWOW64\Lcfkfp32.exeC:\Windows\system32\Lcfkfp32.exe35⤵PID:2024
-
C:\Windows\SysWOW64\Ljqcbjee.exeC:\Windows\system32\Ljqcbjee.exe36⤵PID:2972
-
C:\Windows\SysWOW64\Majlod32.exeC:\Windows\system32\Majlod32.exe37⤵PID:1716
-
C:\Windows\SysWOW64\Mfgdhkki.exeC:\Windows\system32\Mfgdhkki.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Mmalde32.exeC:\Windows\system32\Mmalde32.exe39⤵
- Drops file in System32 directory
PID:2488 -
C:\Windows\SysWOW64\Mckdaojc.exeC:\Windows\system32\Mckdaojc.exe40⤵
- Drops file in System32 directory
PID:1492 -
C:\Windows\SysWOW64\Mbqabl32.exeC:\Windows\system32\Mbqabl32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\Mijjof32.exeC:\Windows\system32\Mijjof32.exe42⤵PID:2020
-
C:\Windows\SysWOW64\Mbcnhkmh.exeC:\Windows\system32\Mbcnhkmh.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3020 -
C:\Windows\SysWOW64\Moioml32.exeC:\Windows\system32\Moioml32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1580 -
C:\Windows\SysWOW64\Npikgo32.exeC:\Windows\system32\Npikgo32.exe45⤵PID:2524
-
C:\Windows\SysWOW64\Nmceihco.exeC:\Windows\system32\Nmceihco.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3008 -
C:\Windows\SysWOW64\Ngljbn32.exeC:\Windows\system32\Ngljbn32.exe47⤵PID:1908
-
C:\Windows\SysWOW64\Ohkbkd32.exeC:\Windows\system32\Ohkbkd32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:672 -
C:\Windows\SysWOW64\Pfocdh32.exeC:\Windows\system32\Pfocdh32.exe49⤵PID:2408
-
C:\Windows\SysWOW64\Pgpplphe.exeC:\Windows\system32\Pgpplphe.exe50⤵PID:2560
-
C:\Windows\SysWOW64\Pqiddfof.exeC:\Windows\system32\Pqiddfof.exe51⤵
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\Phplfcoh.exeC:\Windows\system32\Phplfcoh.exe52⤵PID:2908
-
C:\Windows\SysWOW64\Pahqoi32.exeC:\Windows\system32\Pahqoi32.exe53⤵PID:348
-
C:\Windows\SysWOW64\Pgeigp32.exeC:\Windows\system32\Pgeigp32.exe54⤵
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\Pnoacjlm.exeC:\Windows\system32\Pnoacjlm.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:840 -
C:\Windows\SysWOW64\Pdiipdcj.exeC:\Windows\system32\Pdiipdcj.exe56⤵PID:1632
-
C:\Windows\SysWOW64\Pfjfhl32.exeC:\Windows\system32\Pfjfhl32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2184 -
C:\Windows\SysWOW64\Pmdnefpe.exeC:\Windows\system32\Pmdnefpe.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2884 -
C:\Windows\SysWOW64\Pobjaapi.exeC:\Windows\system32\Pobjaapi.exe59⤵
- Modifies registry class
PID:940 -
C:\Windows\SysWOW64\Qikojg32.exeC:\Windows\system32\Qikojg32.exe60⤵
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\Qqbgkd32.exeC:\Windows\system32\Qqbgkd32.exe61⤵PID:636
-
C:\Windows\SysWOW64\Qfoockec.exeC:\Windows\system32\Qfoockec.exe62⤵PID:1388
-
C:\Windows\SysWOW64\Akekaakp.exeC:\Windows\system32\Akekaakp.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2172 -
C:\Windows\SysWOW64\Aabcjhig.exeC:\Windows\system32\Aabcjhig.exe64⤵
- Drops file in System32 directory
PID:2332 -
C:\Windows\SysWOW64\Aglkfb32.exeC:\Windows\system32\Aglkfb32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3044 -
C:\Windows\SysWOW64\Bmidoi32.exeC:\Windows\system32\Bmidoi32.exe66⤵PID:2196
-
C:\Windows\SysWOW64\Bgnhlaoa.exeC:\Windows\system32\Bgnhlaoa.exe67⤵PID:1680
-
C:\Windows\SysWOW64\Bioddj32.exeC:\Windows\system32\Bioddj32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1724 -
C:\Windows\SysWOW64\Baaoiklb.exeC:\Windows\system32\Baaoiklb.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2804 -
C:\Windows\SysWOW64\Chlheeco.exeC:\Windows\system32\Chlheeco.exe70⤵
- Modifies registry class
PID:1880 -
C:\Windows\SysWOW64\Cliplc32.exeC:\Windows\system32\Cliplc32.exe71⤵
- Drops file in System32 directory
PID:976 -
C:\Windows\SysWOW64\Cmkmclod.exeC:\Windows\system32\Cmkmclod.exe72⤵
- Drops file in System32 directory
PID:1072 -
C:\Windows\SysWOW64\Cdeepf32.exeC:\Windows\system32\Cdeepf32.exe73⤵
- Modifies registry class
PID:2404 -
C:\Windows\SysWOW64\Cojimofg.exeC:\Windows\system32\Cojimofg.exe74⤵PID:2044
-
C:\Windows\SysWOW64\Cdgbeeen.exeC:\Windows\system32\Cdgbeeen.exe75⤵
- Modifies registry class
PID:2112 -
C:\Windows\SysWOW64\Ckajbp32.exeC:\Windows\system32\Ckajbp32.exe76⤵
- Modifies registry class
PID:2076 -
C:\Windows\SysWOW64\Cakbojch.exeC:\Windows\system32\Cakbojch.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:928 -
C:\Windows\SysWOW64\Cblogb32.exeC:\Windows\system32\Cblogb32.exe78⤵PID:2028
-
C:\Windows\SysWOW64\Cmbcdkil.exeC:\Windows\system32\Cmbcdkil.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1988 -
C:\Windows\SysWOW64\Demhhmfg.exeC:\Windows\system32\Demhhmfg.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2080 -
C:\Windows\SysWOW64\Dmdpjjgi.exeC:\Windows\system32\Dmdpjjgi.exe81⤵
- Modifies registry class
PID:2144 -
C:\Windows\SysWOW64\Ekeplb32.exeC:\Windows\system32\Ekeplb32.exe82⤵
- Drops file in System32 directory
PID:2248 -
C:\Windows\SysWOW64\Bjmfaf32.exeC:\Windows\system32\Bjmfaf32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1404 -
C:\Windows\SysWOW64\Odkhmhcb.exeC:\Windows\system32\Odkhmhcb.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1452 -
C:\Windows\SysWOW64\Eogqdh32.exeC:\Windows\system32\Eogqdh32.exe85⤵
- Modifies registry class
PID:1516 -
C:\Windows\SysWOW64\Jhbclbhc.exeC:\Windows\system32\Jhbclbhc.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1780 -
C:\Windows\SysWOW64\Lgelolak.exeC:\Windows\system32\Lgelolak.exe87⤵
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\Lidhkhpo.exeC:\Windows\system32\Lidhkhpo.exe88⤵PID:836
-
C:\Windows\SysWOW64\Lekipiec.exeC:\Windows\system32\Lekipiec.exe89⤵PID:440
-
C:\Windows\SysWOW64\Lifepg32.exeC:\Windows\system32\Lifepg32.exe90⤵PID:2360
-
C:\Windows\SysWOW64\Lkgahpdk.exeC:\Windows\system32\Lkgahpdk.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1332 -
C:\Windows\SysWOW64\Locnin32.exeC:\Windows\system32\Locnin32.exe92⤵PID:464
-
C:\Windows\SysWOW64\Laajej32.exeC:\Windows\system32\Laajej32.exe93⤵PID:2892
-
C:\Windows\SysWOW64\Lkjnnobh.exeC:\Windows\system32\Lkjnnobh.exe94⤵PID:1792
-
C:\Windows\SysWOW64\Ladfjiie.exeC:\Windows\system32\Ladfjiie.exe95⤵PID:2040
-
C:\Windows\SysWOW64\Mclibqik.exeC:\Windows\system32\Mclibqik.exe96⤵PID:1944
-
C:\Windows\SysWOW64\Mjfaok32.exeC:\Windows\system32\Mjfaok32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2120 -
C:\Windows\SysWOW64\Mocjha32.exeC:\Windows\system32\Mocjha32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2100 -
C:\Windows\SysWOW64\Mqbfad32.exeC:\Windows\system32\Mqbfad32.exe99⤵PID:1704
-
C:\Windows\SysWOW64\Mbccimlp.exeC:\Windows\system32\Mbccimlp.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2192 -
C:\Windows\SysWOW64\Nklgbb32.exeC:\Windows\system32\Nklgbb32.exe101⤵
- Drops file in System32 directory
- Modifies registry class
PID:1612 -
C:\Windows\SysWOW64\Nddlkh32.exeC:\Windows\system32\Nddlkh32.exe102⤵
- Modifies registry class
PID:2216 -
C:\Windows\SysWOW64\Nnmpdmpb.exeC:\Windows\system32\Nnmpdmpb.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2880 -
C:\Windows\SysWOW64\Nfdhekpd.exeC:\Windows\system32\Nfdhekpd.exe104⤵
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\Nkqqmanl.exeC:\Windows\system32\Nkqqmanl.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:900 -
C:\Windows\SysWOW64\Ncqomc32.exeC:\Windows\system32\Ncqomc32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1188 -
C:\Windows\SysWOW64\Omicei32.exeC:\Windows\system32\Omicei32.exe107⤵PID:1716
-
C:\Windows\SysWOW64\Occlbceo.exeC:\Windows\system32\Occlbceo.exe108⤵PID:2432
-
C:\Windows\SysWOW64\Oagllgdh.exeC:\Windows\system32\Oagllgdh.exe109⤵PID:2764
-
C:\Windows\SysWOW64\Ogadha32.exeC:\Windows\system32\Ogadha32.exe110⤵
- Modifies registry class
PID:1496 -
C:\Windows\SysWOW64\Ocgemb32.exeC:\Windows\system32\Ocgemb32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2932 -
C:\Windows\SysWOW64\Oidmei32.exeC:\Windows\system32\Oidmei32.exe112⤵
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\Olcjbd32.exeC:\Windows\system32\Olcjbd32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Ombflg32.exeC:\Windows\system32\Ombflg32.exe114⤵PID:2116
-
C:\Windows\SysWOW64\Pncbcple.exeC:\Windows\system32\Pncbcple.exe115⤵
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\Phlgle32.exeC:\Windows\system32\Phlgle32.exe116⤵PID:2276
-
C:\Windows\SysWOW64\Pbakjn32.exeC:\Windows\system32\Pbakjn32.exe117⤵
- Modifies registry class
PID:2844 -
C:\Windows\SysWOW64\Pikcfhji.exeC:\Windows\system32\Pikcfhji.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2636 -
C:\Windows\SysWOW64\Pnhloo32.exeC:\Windows\system32\Pnhloo32.exe119⤵PID:1296
-
C:\Windows\SysWOW64\Paiepj32.exeC:\Windows\system32\Paiepj32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:576 -
C:\Windows\SysWOW64\Phcmmdln.exeC:\Windows\system32\Phcmmdln.exe121⤵PID:1388
-
C:\Windows\SysWOW64\Pjaiip32.exeC:\Windows\system32\Pjaiip32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1072
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-