Analysis
-
max time kernel
165s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 16:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.fc64a7b8a579184ca08b89dc51086320.exe
Resource
win7-20231020-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.fc64a7b8a579184ca08b89dc51086320.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
NEAS.fc64a7b8a579184ca08b89dc51086320.exe
-
Size
101KB
-
MD5
fc64a7b8a579184ca08b89dc51086320
-
SHA1
226302cdbe095810f3f977ecfbbedcf05992dc6b
-
SHA256
ab61ac39162ba74a32dcf6007a3da4f62f67f233001073b263893e02eeabce17
-
SHA512
b74e17f94b03e6dd6e13846d6238257a9c194f23c75fc73385b4f3540ba65cbbe50ccf836e084a7d38894490b6ca8b5ea64d43029460d243c223e85c8beb327a
-
SSDEEP
3072:1xVw7NrNoGZQq7gg1UNe3T3/zrB3g3k8p4qI4/HQCC:1xVqoa7ggqQbPBZs/HNC
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejmild32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpcdji32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glenpb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cknbkpif.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpkliaol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imonol32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpjcnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddbfkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cgbppknb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcdbmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Libnapmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikpjkf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdpckbli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ilglgfjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bekmei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jnqbmadp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cninnnfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nmipnp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lekeajmm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nepgcgje.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgkooeen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pnkbdqpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dbllkohi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jofaeb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mphfjhjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Beefenie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pmmelo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hcmbnk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cknlln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ldhbnhlm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kpbmme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ikpjkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jghpkq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ommjipel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pbpall32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eigohp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fklcbocl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgbijg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Capbaacl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlnqfanb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ikfgeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cocamaam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qkpmcddi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lbmqmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caojigoh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnkbdqpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bopefnnf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkepeaaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ebapednb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpbmme32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcjioknl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Flgaodbm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqigee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fhonpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ndcoeq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eofgioah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iomood32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqkmkb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Libnapmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mncmck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebapednb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ckidoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pploli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Heochp32.exe -
Executes dropped EXE 64 IoCs
pid Process 4368 Jfehpg32.exe 2076 Lipmoo32.exe 4184 Mapgfk32.exe 528 Nkboeobh.exe 384 Nalgbi32.exe 3680 Ophjdehd.exe 872 Mphfjhjf.exe 740 Bjfjee32.exe 2220 Cbfema32.exe 2452 Dendok32.exe 392 Eejcki32.exe 3352 Eeailhme.exe 3084 Fkehdnee.exe 1944 Gkqhpmkg.exe 2140 Ghgeoq32.exe 4632 Hcofbifb.exe 2656 Hikkdc32.exe 2256 Iefedcmk.exe 3024 Ikjcmi32.exe 4224 Jokiig32.exe 1956 Jfdafa32.exe 4500 Jkfcigkm.exe 744 Kmhlijpm.exe 1816 Lobhqdec.exe 3724 Mikepg32.exe 2596 Nbhcdl32.exe 3564 Ndjldo32.exe 1000 Omnqhbap.exe 4220 Plhgdn32.exe 920 Qkpmcddi.exe 5000 Anqfepaj.exe 1720 Aneppo32.exe 2472 Ajlpepbi.exe 2468 Aphegjhc.exe 980 Bkepeaaa.exe 3176 Cknbkpif.exe 3912 Dqigee32.exe 452 Eanqpdgi.exe 2344 Ejfeij32.exe 4792 Eelifc32.exe 4232 Ghfnej32.exe 4472 Hhmdeink.exe 1272 Hoiihcde.exe 1216 Ilglgfjd.exe 2776 Jhgpbf32.exe 2868 Kdeghfhj.exe 3524 Kkooep32.exe 3400 Lbmqmi32.exe 1276 Ldqfddml.exe 2464 Meobeb32.exe 4140 Nnpjdfpb.exe 3364 Obcled32.exe 1596 Oianmm32.exe 4120 Pikqcl32.exe 2136 Apcead32.exe 204 Aepmjk32.exe 4752 Boaeioej.exe 3048 Bekmei32.exe 2652 Cgbppknb.exe 3824 Cnlhme32.exe 1756 Dcpffk32.exe 2012 Eopjakkg.exe 5052 Ejjgic32.exe 4264 Fpbpmhjb.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dhfhnfhc.exe Clknnf32.exe File created C:\Windows\SysWOW64\Polcin32.dll Fihnhc32.exe File created C:\Windows\SysWOW64\Elepei32.exe Dphipidf.exe File created C:\Windows\SysWOW64\Ikjcmi32.exe Iefedcmk.exe File created C:\Windows\SysWOW64\Amqfdcji.dll Nbhcdl32.exe File created C:\Windows\SysWOW64\Bclgnh32.dll Meobeb32.exe File created C:\Windows\SysWOW64\Libnapmg.exe Kdophj32.exe File created C:\Windows\SysWOW64\Bojogb32.exe Bafnmnjn.exe File created C:\Windows\SysWOW64\Eejcki32.exe Dendok32.exe File opened for modification C:\Windows\SysWOW64\Pafcjijo.exe Oifekg32.exe File opened for modification C:\Windows\SysWOW64\Ahpdnaci.exe Pcjioknl.exe File created C:\Windows\SysWOW64\Akamol32.exe Acfhkj32.exe File created C:\Windows\SysWOW64\Iibclmkn.exe Iomood32.exe File created C:\Windows\SysWOW64\Clknnf32.exe Caeiam32.exe File created C:\Windows\SysWOW64\Ipiaphop.exe Hpfdkiac.exe File created C:\Windows\SysWOW64\Mjnnmn32.exe Mcdepd32.exe File created C:\Windows\SysWOW64\Fnjked32.dll Ngkjbkem.exe File opened for modification C:\Windows\SysWOW64\Pgiojf32.exe Pgbijg32.exe File created C:\Windows\SysWOW64\Capbaacl.exe Cppfgnlj.exe File created C:\Windows\SysWOW64\Dfefeq32.exe Dkpbgh32.exe File created C:\Windows\SysWOW64\Jnqbmadp.exe Jdhndlno.exe File created C:\Windows\SysWOW64\Hplbbipm.exe Hefneq32.exe File created C:\Windows\SysWOW64\Odpjml32.dll Jlclnhho.exe File created C:\Windows\SysWOW64\Hjnlgckh.dll Lgmnqmam.exe File created C:\Windows\SysWOW64\Lppgkh32.dll Dkcnnk32.exe File created C:\Windows\SysWOW64\Obcled32.exe Nnpjdfpb.exe File opened for modification C:\Windows\SysWOW64\Liimgh32.exe Lekeajmm.exe File created C:\Windows\SysWOW64\Ejfeij32.exe Eanqpdgi.exe File created C:\Windows\SysWOW64\Fchdnkpi.exe Flnlaahl.exe File opened for modification C:\Windows\SysWOW64\Lgmnqmam.exe Liimgh32.exe File created C:\Windows\SysWOW64\Egqhob32.dll Cknbkpif.exe File opened for modification C:\Windows\SysWOW64\Kjambg32.exe Ihdaoajd.exe File created C:\Windows\SysWOW64\Annbli32.dll Llbphdfl.exe File created C:\Windows\SysWOW64\Mkhelp32.dll Kmhlijpm.exe File opened for modification C:\Windows\SysWOW64\Cjgpoq32.exe Cobkbhgk.exe File created C:\Windows\SysWOW64\Aecnmo32.exe Anmfkane.exe File created C:\Windows\SysWOW64\Cbfema32.exe Bjfjee32.exe File created C:\Windows\SysWOW64\Pljama32.dll Bdcmfkde.exe File created C:\Windows\SysWOW64\Kimnnbaj.dll Ogqaqigd.exe File created C:\Windows\SysWOW64\Bopefnnf.exe Bhfmic32.exe File created C:\Windows\SysWOW64\Kmmibk32.dll Hihimfag.exe File opened for modification C:\Windows\SysWOW64\Kmfmfigl.exe Kpbmme32.exe File opened for modification C:\Windows\SysWOW64\Onqbjccl.exe Njploeoi.exe File created C:\Windows\SysWOW64\Eidbbp32.exe Emnbmoef.exe File opened for modification C:\Windows\SysWOW64\Gfhehlhe.exe Gideogil.exe File created C:\Windows\SysWOW64\Cocamaam.exe Coadgacp.exe File created C:\Windows\SysWOW64\Dnhemllq.dll Hboaql32.exe File created C:\Windows\SysWOW64\Oikaeb32.dll Kpbmme32.exe File opened for modification C:\Windows\SysWOW64\Bhehmbbj.exe Badipiae.exe File created C:\Windows\SysWOW64\Gfomfo32.exe Cfmacoep.exe File opened for modification C:\Windows\SysWOW64\Ffqhmf32.exe Fmfgoa32.exe File created C:\Windows\SysWOW64\Knpeii32.exe Jljbogaf.exe File created C:\Windows\SysWOW64\Npjlfcgj.dll Ldqfddml.exe File created C:\Windows\SysWOW64\Mnheca32.dll Canlfh32.exe File created C:\Windows\SysWOW64\Iklgkmop.exe Idbonc32.exe File opened for modification C:\Windows\SysWOW64\Ojmqgd32.exe Nmipnp32.exe File opened for modification C:\Windows\SysWOW64\Canlfh32.exe Bhehmbbj.exe File created C:\Windows\SysWOW64\Hboaql32.exe Gpkliaol.exe File created C:\Windows\SysWOW64\Mnfege32.dll Mpebjb32.exe File created C:\Windows\SysWOW64\Ndcdfnpa.exe Ncdgmkio.exe File opened for modification C:\Windows\SysWOW64\Bnfiapfj.exe Aehghn32.exe File created C:\Windows\SysWOW64\Lcakilpk.dll Apcead32.exe File created C:\Windows\SysWOW64\Jgaldkid.dll Glenpb32.exe File opened for modification C:\Windows\SysWOW64\Fnegqjne.exe Fihnhc32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 6604 3812 WerFault.exe 463 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mpebjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkhmgp32.dll" Nepgcgje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Afeblb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cppfgnlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Polcin32.dll" Fihnhc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lbmqmi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aepmjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qcepem32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ppgeqijb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgohgkgm.dll" Adhdcepc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eopjakkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fkopgn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hpfdkiac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdjmme32.dll" Dhfhnfhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gfomfo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Anmfkane.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eigohp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddbfkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdfgaa32.dll" Cafpkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Heochp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Emnbmoef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fpcdji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ajlpepbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpejop32.dll" Hoiihcde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emhmgmph.dll" Lbmqmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npjlfcgj.dll" Ldqfddml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gplbcgbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hhiacb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngjdfn32.dll" Kmfmfigl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fpcdji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aceijg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obphmnpb.dll" Pafcjijo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gfnnel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mncmck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oikallbg.dll" Ndfgfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jfeoip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fabqdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fegeke32.dll" Onmfcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkkmgl32.dll" Mapgfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cnlhme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nbibeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bfoebq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Peajhk32.dll" Liimgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fieacc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Idbonc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iqklhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Coadgacp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hplbbipm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Npbcollj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bopefnnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Canlfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Acfhkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Clnopg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ngkjbkem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dakieedj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cjjlep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Flgaodbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmcbac32.dll" Cbmdnmdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fabqdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Beefenie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ceoillaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fbcfan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bgeabloo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pcjioknl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4760 wrote to memory of 4368 4760 NEAS.fc64a7b8a579184ca08b89dc51086320.exe 92 PID 4760 wrote to memory of 4368 4760 NEAS.fc64a7b8a579184ca08b89dc51086320.exe 92 PID 4760 wrote to memory of 4368 4760 NEAS.fc64a7b8a579184ca08b89dc51086320.exe 92 PID 4368 wrote to memory of 2076 4368 Jfehpg32.exe 93 PID 4368 wrote to memory of 2076 4368 Jfehpg32.exe 93 PID 4368 wrote to memory of 2076 4368 Jfehpg32.exe 93 PID 2076 wrote to memory of 4184 2076 Lipmoo32.exe 94 PID 2076 wrote to memory of 4184 2076 Lipmoo32.exe 94 PID 2076 wrote to memory of 4184 2076 Lipmoo32.exe 94 PID 4184 wrote to memory of 528 4184 Mapgfk32.exe 95 PID 4184 wrote to memory of 528 4184 Mapgfk32.exe 95 PID 4184 wrote to memory of 528 4184 Mapgfk32.exe 95 PID 528 wrote to memory of 384 528 Nkboeobh.exe 96 PID 528 wrote to memory of 384 528 Nkboeobh.exe 96 PID 528 wrote to memory of 384 528 Nkboeobh.exe 96 PID 384 wrote to memory of 3680 384 Nalgbi32.exe 97 PID 384 wrote to memory of 3680 384 Nalgbi32.exe 97 PID 384 wrote to memory of 3680 384 Nalgbi32.exe 97 PID 3680 wrote to memory of 872 3680 Ophjdehd.exe 216 PID 3680 wrote to memory of 872 3680 Ophjdehd.exe 216 PID 3680 wrote to memory of 872 3680 Ophjdehd.exe 216 PID 872 wrote to memory of 740 872 Mphfjhjf.exe 99 PID 872 wrote to memory of 740 872 Mphfjhjf.exe 99 PID 872 wrote to memory of 740 872 Mphfjhjf.exe 99 PID 740 wrote to memory of 2220 740 Bjfjee32.exe 100 PID 740 wrote to memory of 2220 740 Bjfjee32.exe 100 PID 740 wrote to memory of 2220 740 Bjfjee32.exe 100 PID 2220 wrote to memory of 2452 2220 Cbfema32.exe 101 PID 2220 wrote to memory of 2452 2220 Cbfema32.exe 101 PID 2220 wrote to memory of 2452 2220 Cbfema32.exe 101 PID 2452 wrote to memory of 392 2452 Dendok32.exe 102 PID 2452 wrote to memory of 392 2452 Dendok32.exe 102 PID 2452 wrote to memory of 392 2452 Dendok32.exe 102 PID 392 wrote to memory of 3352 392 Eejcki32.exe 103 PID 392 wrote to memory of 3352 392 Eejcki32.exe 103 PID 392 wrote to memory of 3352 392 Eejcki32.exe 103 PID 3352 wrote to memory of 3084 3352 Eeailhme.exe 104 PID 3352 wrote to memory of 3084 3352 Eeailhme.exe 104 PID 3352 wrote to memory of 3084 3352 Eeailhme.exe 104 PID 3084 wrote to memory of 1944 3084 Fkehdnee.exe 105 PID 3084 wrote to memory of 1944 3084 Fkehdnee.exe 105 PID 3084 wrote to memory of 1944 3084 Fkehdnee.exe 105 PID 1944 wrote to memory of 2140 1944 Gkqhpmkg.exe 106 PID 1944 wrote to memory of 2140 1944 Gkqhpmkg.exe 106 PID 1944 wrote to memory of 2140 1944 Gkqhpmkg.exe 106 PID 2140 wrote to memory of 4632 2140 Ghgeoq32.exe 108 PID 2140 wrote to memory of 4632 2140 Ghgeoq32.exe 108 PID 2140 wrote to memory of 4632 2140 Ghgeoq32.exe 108 PID 4632 wrote to memory of 2656 4632 Hcofbifb.exe 109 PID 4632 wrote to memory of 2656 4632 Hcofbifb.exe 109 PID 4632 wrote to memory of 2656 4632 Hcofbifb.exe 109 PID 2656 wrote to memory of 2256 2656 Hikkdc32.exe 111 PID 2656 wrote to memory of 2256 2656 Hikkdc32.exe 111 PID 2656 wrote to memory of 2256 2656 Hikkdc32.exe 111 PID 2256 wrote to memory of 3024 2256 Iefedcmk.exe 112 PID 2256 wrote to memory of 3024 2256 Iefedcmk.exe 112 PID 2256 wrote to memory of 3024 2256 Iefedcmk.exe 112 PID 3024 wrote to memory of 4224 3024 Ikjcmi32.exe 113 PID 3024 wrote to memory of 4224 3024 Ikjcmi32.exe 113 PID 3024 wrote to memory of 4224 3024 Ikjcmi32.exe 113 PID 4224 wrote to memory of 1956 4224 Jokiig32.exe 114 PID 4224 wrote to memory of 1956 4224 Jokiig32.exe 114 PID 4224 wrote to memory of 1956 4224 Jokiig32.exe 114 PID 1956 wrote to memory of 4500 1956 Jfdafa32.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fc64a7b8a579184ca08b89dc51086320.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fc64a7b8a579184ca08b89dc51086320.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\Jfehpg32.exeC:\Windows\system32\Jfehpg32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\Lipmoo32.exeC:\Windows\system32\Lipmoo32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\Mapgfk32.exeC:\Windows\system32\Mapgfk32.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Nkboeobh.exeC:\Windows\system32\Nkboeobh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\Nalgbi32.exeC:\Windows\system32\Nalgbi32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\Ophjdehd.exeC:\Windows\system32\Ophjdehd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\Anffje32.exeC:\Windows\system32\Anffje32.exe8⤵PID:872
-
C:\Windows\SysWOW64\Bjfjee32.exeC:\Windows\system32\Bjfjee32.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\Cbfema32.exeC:\Windows\system32\Cbfema32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\Dendok32.exeC:\Windows\system32\Dendok32.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\Eejcki32.exeC:\Windows\system32\Eejcki32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\Eeailhme.exeC:\Windows\system32\Eeailhme.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\Fkehdnee.exeC:\Windows\system32\Fkehdnee.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\Gkqhpmkg.exeC:\Windows\system32\Gkqhpmkg.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\Ghgeoq32.exeC:\Windows\system32\Ghgeoq32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\Hcofbifb.exeC:\Windows\system32\Hcofbifb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\Hikkdc32.exeC:\Windows\system32\Hikkdc32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Iefedcmk.exeC:\Windows\system32\Iefedcmk.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\Ikjcmi32.exeC:\Windows\system32\Ikjcmi32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Jokiig32.exeC:\Windows\system32\Jokiig32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\Jfdafa32.exeC:\Windows\system32\Jfdafa32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\Jkfcigkm.exeC:\Windows\system32\Jkfcigkm.exe23⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\SysWOW64\Kmhlijpm.exeC:\Windows\system32\Kmhlijpm.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:744 -
C:\Windows\SysWOW64\Lobhqdec.exeC:\Windows\system32\Lobhqdec.exe25⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\Mikepg32.exeC:\Windows\system32\Mikepg32.exe26⤵
- Executes dropped EXE
PID:3724 -
C:\Windows\SysWOW64\Nbhcdl32.exeC:\Windows\system32\Nbhcdl32.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\Ndjldo32.exeC:\Windows\system32\Ndjldo32.exe28⤵
- Executes dropped EXE
PID:3564 -
C:\Windows\SysWOW64\Omnqhbap.exeC:\Windows\system32\Omnqhbap.exe29⤵
- Executes dropped EXE
PID:1000 -
C:\Windows\SysWOW64\Plhgdn32.exeC:\Windows\system32\Plhgdn32.exe30⤵
- Executes dropped EXE
PID:4220 -
C:\Windows\SysWOW64\Qkpmcddi.exeC:\Windows\system32\Qkpmcddi.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:920 -
C:\Windows\SysWOW64\Anqfepaj.exeC:\Windows\system32\Anqfepaj.exe32⤵
- Executes dropped EXE
PID:5000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ajlpepbi.exeC:\Windows\system32\Ajlpepbi.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:2472 -
C:\Windows\SysWOW64\Aphegjhc.exeC:\Windows\system32\Aphegjhc.exe2⤵
- Executes dropped EXE
PID:2468 -
C:\Windows\SysWOW64\Bkepeaaa.exeC:\Windows\system32\Bkepeaaa.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:980 -
C:\Windows\SysWOW64\Cknbkpif.exeC:\Windows\system32\Cknbkpif.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3176 -
C:\Windows\SysWOW64\Dqigee32.exeC:\Windows\system32\Dqigee32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\Eanqpdgi.exeC:\Windows\system32\Eanqpdgi.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:452
-
-
-
-
-
-
C:\Windows\SysWOW64\Aneppo32.exeC:\Windows\system32\Aneppo32.exe1⤵
- Executes dropped EXE
PID:1720
-
C:\Windows\SysWOW64\Ejfeij32.exeC:\Windows\system32\Ejfeij32.exe1⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\SysWOW64\Eelifc32.exeC:\Windows\system32\Eelifc32.exe2⤵
- Executes dropped EXE
PID:4792 -
C:\Windows\SysWOW64\Ghfnej32.exeC:\Windows\system32\Ghfnej32.exe3⤵
- Executes dropped EXE
PID:4232 -
C:\Windows\SysWOW64\Hhmdeink.exeC:\Windows\system32\Hhmdeink.exe4⤵
- Executes dropped EXE
PID:4472 -
C:\Windows\SysWOW64\Hoiihcde.exeC:\Windows\system32\Hoiihcde.exe5⤵
- Executes dropped EXE
- Modifies registry class
PID:1272 -
C:\Windows\SysWOW64\Ilglgfjd.exeC:\Windows\system32\Ilglgfjd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1216 -
C:\Windows\SysWOW64\Jhgpbf32.exeC:\Windows\system32\Jhgpbf32.exe7⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\Kdeghfhj.exeC:\Windows\system32\Kdeghfhj.exe8⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\Kkooep32.exeC:\Windows\system32\Kkooep32.exe9⤵
- Executes dropped EXE
PID:3524 -
C:\Windows\SysWOW64\Lbmqmi32.exeC:\Windows\system32\Lbmqmi32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3400 -
C:\Windows\SysWOW64\Ldqfddml.exeC:\Windows\system32\Ldqfddml.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1276 -
C:\Windows\SysWOW64\Meobeb32.exeC:\Windows\system32\Meobeb32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\Nnpjdfpb.exeC:\Windows\system32\Nnpjdfpb.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4140 -
C:\Windows\SysWOW64\Obcled32.exeC:\Windows\system32\Obcled32.exe14⤵
- Executes dropped EXE
PID:3364 -
C:\Windows\SysWOW64\Oianmm32.exeC:\Windows\system32\Oianmm32.exe15⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\Pikqcl32.exeC:\Windows\system32\Pikqcl32.exe16⤵
- Executes dropped EXE
PID:4120 -
C:\Windows\SysWOW64\Apcead32.exeC:\Windows\system32\Apcead32.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2136 -
C:\Windows\SysWOW64\Aepmjk32.exeC:\Windows\system32\Aepmjk32.exe18⤵
- Executes dropped EXE
- Modifies registry class
PID:204
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Boaeioej.exeC:\Windows\system32\Boaeioej.exe1⤵
- Executes dropped EXE
PID:4752 -
C:\Windows\SysWOW64\Bekmei32.exeC:\Windows\system32\Bekmei32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3048
-
-
C:\Windows\SysWOW64\Cgbppknb.exeC:\Windows\system32\Cgbppknb.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2652 -
C:\Windows\SysWOW64\Cnlhme32.exeC:\Windows\system32\Cnlhme32.exe2⤵
- Executes dropped EXE
- Modifies registry class
PID:3824 -
C:\Windows\SysWOW64\Dcpffk32.exeC:\Windows\system32\Dcpffk32.exe3⤵
- Executes dropped EXE
PID:1756 -
C:\Windows\SysWOW64\Eopjakkg.exeC:\Windows\system32\Eopjakkg.exe4⤵
- Executes dropped EXE
- Modifies registry class
PID:2012 -
C:\Windows\SysWOW64\Ejjgic32.exeC:\Windows\system32\Ejjgic32.exe5⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\Fpbpmhjb.exeC:\Windows\system32\Fpbpmhjb.exe6⤵
- Executes dropped EXE
PID:4264 -
C:\Windows\SysWOW64\Gplbcgbg.exeC:\Windows\system32\Gplbcgbg.exe7⤵
- Modifies registry class
PID:4212 -
C:\Windows\SysWOW64\Hdodeedi.exeC:\Windows\system32\Hdodeedi.exe8⤵PID:1096
-
C:\Windows\SysWOW64\Jncapf32.exeC:\Windows\system32\Jncapf32.exe9⤵PID:4820
-
C:\Windows\SysWOW64\Kdmjmqjf.exeC:\Windows\system32\Kdmjmqjf.exe10⤵PID:1084
-
C:\Windows\SysWOW64\Khmoionj.exeC:\Windows\system32\Khmoionj.exe11⤵PID:5140
-
C:\Windows\SysWOW64\Knldfe32.exeC:\Windows\system32\Knldfe32.exe12⤵PID:5188
-
C:\Windows\SysWOW64\Lqfpoope.exeC:\Windows\system32\Lqfpoope.exe13⤵PID:5228
-
C:\Windows\SysWOW64\Lgqhki32.exeC:\Windows\system32\Lgqhki32.exe14⤵PID:5268
-
C:\Windows\SysWOW64\Mhpeelnd.exeC:\Windows\system32\Mhpeelnd.exe15⤵PID:5320
-
C:\Windows\SysWOW64\Mqkijnkp.exeC:\Windows\system32\Mqkijnkp.exe16⤵PID:5444
-
C:\Windows\SysWOW64\Mglhgg32.exeC:\Windows\system32\Mglhgg32.exe17⤵PID:5484
-
C:\Windows\SysWOW64\Nbbldp32.exeC:\Windows\system32\Nbbldp32.exe18⤵PID:5524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ngodlgka.exeC:\Windows\system32\Ngodlgka.exe1⤵PID:5568
-
C:\Windows\SysWOW64\Nnimia32.exeC:\Windows\system32\Nnimia32.exe2⤵PID:5648
-
C:\Windows\SysWOW64\Nbibeo32.exeC:\Windows\system32\Nbibeo32.exe3⤵
- Modifies registry class
PID:5720 -
C:\Windows\SysWOW64\Oooodcci.exeC:\Windows\system32\Oooodcci.exe4⤵PID:5784
-
C:\Windows\SysWOW64\Ongijo32.exeC:\Windows\system32\Ongijo32.exe5⤵PID:5832
-
C:\Windows\SysWOW64\Okkidceh.exeC:\Windows\system32\Okkidceh.exe6⤵PID:5880
-
C:\Windows\SysWOW64\Pbpall32.exeC:\Windows\system32\Pbpall32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5940 -
C:\Windows\SysWOW64\Clihcm32.exeC:\Windows\system32\Clihcm32.exe8⤵PID:5984
-
C:\Windows\SysWOW64\Cafpkc32.exeC:\Windows\system32\Cafpkc32.exe9⤵
- Modifies registry class
PID:6048 -
C:\Windows\SysWOW64\Dcdifdem.exeC:\Windows\system32\Dcdifdem.exe10⤵PID:6092
-
C:\Windows\SysWOW64\Dphipidf.exeC:\Windows\system32\Dphipidf.exe11⤵
- Drops file in System32 directory
PID:5164 -
C:\Windows\SysWOW64\Elepei32.exeC:\Windows\system32\Elepei32.exe12⤵PID:5236
-
C:\Windows\SysWOW64\Fhonpi32.exeC:\Windows\system32\Fhonpi32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5308 -
C:\Windows\SysWOW64\Fcdbmb32.exeC:\Windows\system32\Fcdbmb32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4684 -
C:\Windows\SysWOW64\Fjnjjlog.exeC:\Windows\system32\Fjnjjlog.exe15⤵PID:5440
-
C:\Windows\SysWOW64\Gfnnel32.exeC:\Windows\system32\Gfnnel32.exe16⤵
- Modifies registry class
PID:5380 -
C:\Windows\SysWOW64\Gqdbbelf.exeC:\Windows\system32\Gqdbbelf.exe17⤵PID:400
-
C:\Windows\SysWOW64\Gbenjm32.exeC:\Windows\system32\Gbenjm32.exe18⤵PID:5600
-
C:\Windows\SysWOW64\Giofggia.exeC:\Windows\system32\Giofggia.exe19⤵PID:5632
-
C:\Windows\SysWOW64\Gqfohdjd.exeC:\Windows\system32\Gqfohdjd.exe20⤵PID:5760
-
C:\Windows\SysWOW64\Gfcgpkhk.exeC:\Windows\system32\Gfcgpkhk.exe21⤵PID:5712
-
C:\Windows\SysWOW64\Gmmome32.exeC:\Windows\system32\Gmmome32.exe22⤵PID:5804
-
C:\Windows\SysWOW64\Gpkliaol.exeC:\Windows\system32\Gpkliaol.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:552 -
C:\Windows\SysWOW64\Hboaql32.exeC:\Windows\system32\Hboaql32.exe24⤵
- Drops file in System32 directory
PID:916 -
C:\Windows\SysWOW64\Hihimfag.exeC:\Windows\system32\Hihimfag.exe25⤵
- Drops file in System32 directory
PID:6084 -
C:\Windows\SysWOW64\Imbaobmp.exeC:\Windows\system32\Imbaobmp.exe26⤵PID:6076
-
C:\Windows\SysWOW64\Ibojgikg.exeC:\Windows\system32\Ibojgikg.exe27⤵PID:5304
-
C:\Windows\SysWOW64\Kgkooeen.exeC:\Windows\system32\Kgkooeen.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5336 -
C:\Windows\SysWOW64\Kmegkp32.exeC:\Windows\system32\Kmegkp32.exe29⤵PID:5420
-
C:\Windows\SysWOW64\Kdophj32.exeC:\Windows\system32\Kdophj32.exe30⤵
- Drops file in System32 directory
PID:5552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Libnapmg.exeC:\Windows\system32\Libnapmg.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5564 -
C:\Windows\SysWOW64\Ldhbnhlm.exeC:\Windows\system32\Ldhbnhlm.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5644 -
C:\Windows\SysWOW64\Lgfojd32.exeC:\Windows\system32\Lgfojd32.exe3⤵PID:2176
-
C:\Windows\SysWOW64\Lgnekcei.exeC:\Windows\system32\Lgnekcei.exe4⤵PID:5776
-
C:\Windows\SysWOW64\Lacihleo.exeC:\Windows\system32\Lacihleo.exe5⤵PID:2964
-
C:\Windows\SysWOW64\Mcdepd32.exeC:\Windows\system32\Mcdepd32.exe6⤵
- Drops file in System32 directory
PID:2424 -
C:\Windows\SysWOW64\Mjnnmn32.exeC:\Windows\system32\Mjnnmn32.exe7⤵PID:3940
-
C:\Windows\SysWOW64\Mphfjhjf.exeC:\Windows\system32\Mphfjhjf.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\Mgbnfb32.exeC:\Windows\system32\Mgbnfb32.exe9⤵PID:6060
-
C:\Windows\SysWOW64\Mncmck32.exeC:\Windows\system32\Mncmck32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1328 -
C:\Windows\SysWOW64\Ndmepe32.exeC:\Windows\system32\Ndmepe32.exe11⤵PID:6120
-
C:\Windows\SysWOW64\Njjmil32.exeC:\Windows\system32\Njjmil32.exe12⤵PID:5216
-
C:\Windows\SysWOW64\Ndfgfd32.exeC:\Windows\system32\Ndfgfd32.exe13⤵
- Modifies registry class
PID:3480 -
C:\Windows\SysWOW64\Qcepem32.exeC:\Windows\system32\Qcepem32.exe14⤵
- Modifies registry class
PID:5472 -
C:\Windows\SysWOW64\Bdcmfkde.exeC:\Windows\system32\Bdcmfkde.exe15⤵
- Drops file in System32 directory
PID:1800 -
C:\Windows\SysWOW64\Bjnece32.exeC:\Windows\system32\Bjnece32.exe16⤵PID:5560
-
C:\Windows\SysWOW64\Bdfilkbb.exeC:\Windows\system32\Bdfilkbb.exe17⤵PID:5764
-
C:\Windows\SysWOW64\Beefenie.exeC:\Windows\system32\Beefenie.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5704 -
C:\Windows\SysWOW64\Cbnpja32.exeC:\Windows\system32\Cbnpja32.exe19⤵PID:2356
-
C:\Windows\SysWOW64\Ckidoc32.exeC:\Windows\system32\Ckidoc32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2044 -
C:\Windows\SysWOW64\Ceoillaj.exeC:\Windows\system32\Ceoillaj.exe21⤵
- Modifies registry class
PID:3396 -
C:\Windows\SysWOW64\Cliahf32.exeC:\Windows\system32\Cliahf32.exe22⤵PID:5908
-
C:\Windows\SysWOW64\Caeiam32.exeC:\Windows\system32\Caeiam32.exe23⤵
- Drops file in System32 directory
PID:2988 -
C:\Windows\SysWOW64\Clknnf32.exeC:\Windows\system32\Clknnf32.exe24⤵
- Drops file in System32 directory
PID:4808 -
C:\Windows\SysWOW64\Dhfhnfhc.exeC:\Windows\system32\Dhfhnfhc.exe25⤵
- Modifies registry class
PID:1284 -
C:\Windows\SysWOW64\Dbllkohi.exeC:\Windows\system32\Dbllkohi.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1780 -
C:\Windows\SysWOW64\Dldpde32.exeC:\Windows\system32\Dldpde32.exe27⤵PID:3148
-
C:\Windows\SysWOW64\Dememj32.exeC:\Windows\system32\Dememj32.exe28⤵PID:5436
-
C:\Windows\SysWOW64\Ecjhmm32.exeC:\Windows\system32\Ecjhmm32.exe29⤵PID:5800
-
C:\Windows\SysWOW64\Fklcbocl.exeC:\Windows\system32\Fklcbocl.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4912 -
C:\Windows\SysWOW64\Ffbgog32.exeC:\Windows\system32\Ffbgog32.exe31⤵PID:1720
-
C:\Windows\SysWOW64\Fkopgn32.exeC:\Windows\system32\Fkopgn32.exe32⤵
- Modifies registry class
PID:3352 -
C:\Windows\SysWOW64\Ffdddg32.exeC:\Windows\system32\Ffdddg32.exe33⤵PID:4380
-
C:\Windows\SysWOW64\Flnlaahl.exeC:\Windows\system32\Flnlaahl.exe34⤵
- Drops file in System32 directory
PID:5888 -
C:\Windows\SysWOW64\Fchdnkpi.exeC:\Windows\system32\Fchdnkpi.exe35⤵PID:3080
-
C:\Windows\SysWOW64\Heochp32.exeC:\Windows\system32\Heochp32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:488 -
C:\Windows\SysWOW64\Hodgei32.exeC:\Windows\system32\Hodgei32.exe37⤵PID:2212
-
C:\Windows\SysWOW64\Hfnpacjb.exeC:\Windows\system32\Hfnpacjb.exe38⤵PID:2008
-
C:\Windows\SysWOW64\Hpfdkiac.exeC:\Windows\system32\Hpfdkiac.exe39⤵
- Drops file in System32 directory
- Modifies registry class
PID:4880 -
C:\Windows\SysWOW64\Ipiaphop.exeC:\Windows\system32\Ipiaphop.exe40⤵PID:4144
-
C:\Windows\SysWOW64\Ieeihomg.exeC:\Windows\system32\Ieeihomg.exe41⤵PID:3464
-
C:\Windows\SysWOW64\Ilpaei32.exeC:\Windows\system32\Ilpaei32.exe42⤵PID:4500
-
C:\Windows\SysWOW64\Imonol32.exeC:\Windows\system32\Imonol32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5096 -
C:\Windows\SysWOW64\Iempingp.exeC:\Windows\system32\Iempingp.exe44⤵PID:2756
-
C:\Windows\SysWOW64\Ilfhfh32.exeC:\Windows\system32\Ilfhfh32.exe45⤵PID:1480
-
C:\Windows\SysWOW64\Jeolonem.exeC:\Windows\system32\Jeolonem.exe46⤵PID:2656
-
C:\Windows\SysWOW64\Jlidkh32.exeC:\Windows\system32\Jlidkh32.exe47⤵PID:6080
-
C:\Windows\SysWOW64\Jimeelkc.exeC:\Windows\system32\Jimeelkc.exe48⤵PID:3452
-
C:\Windows\SysWOW64\Jpkfmfok.exeC:\Windows\system32\Jpkfmfok.exe49⤵PID:5392
-
C:\Windows\SysWOW64\Jfeoip32.exeC:\Windows\system32\Jfeoip32.exe50⤵
- Modifies registry class
PID:5744 -
C:\Windows\SysWOW64\Kemhpl32.exeC:\Windows\system32\Kemhpl32.exe51⤵PID:4852
-
C:\Windows\SysWOW64\Kpbmme32.exeC:\Windows\system32\Kpbmme32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:888 -
C:\Windows\SysWOW64\Kmfmfigl.exeC:\Windows\system32\Kmfmfigl.exe53⤵
- Modifies registry class
PID:1816 -
C:\Windows\SysWOW64\Kfanen32.exeC:\Windows\system32\Kfanen32.exe54⤵PID:3880
-
C:\Windows\SysWOW64\Lpjcnd32.exeC:\Windows\system32\Lpjcnd32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2308 -
C:\Windows\SysWOW64\Llbphdfl.exeC:\Windows\system32\Llbphdfl.exe56⤵
- Drops file in System32 directory
PID:4224 -
C:\Windows\SysWOW64\Lekeajmm.exeC:\Windows\system32\Lekeajmm.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1744 -
C:\Windows\SysWOW64\Liimgh32.exeC:\Windows\system32\Liimgh32.exe58⤵
- Drops file in System32 directory
- Modifies registry class
PID:3084 -
C:\Windows\SysWOW64\Lgmnqmam.exeC:\Windows\system32\Lgmnqmam.exe59⤵
- Drops file in System32 directory
PID:3560 -
C:\Windows\SysWOW64\Mpebjb32.exeC:\Windows\system32\Mpebjb32.exe60⤵
- Drops file in System32 directory
- Modifies registry class
PID:1476 -
C:\Windows\SysWOW64\Mgddal32.exeC:\Windows\system32\Mgddal32.exe61⤵PID:3912
-
C:\Windows\SysWOW64\Mckefmai.exeC:\Windows\system32\Mckefmai.exe62⤵PID:2184
-
C:\Windows\SysWOW64\Meknhh32.exeC:\Windows\system32\Meknhh32.exe63⤵PID:3332
-
C:\Windows\SysWOW64\Ngkjbkem.exeC:\Windows\system32\Ngkjbkem.exe64⤵
- Drops file in System32 directory
- Modifies registry class
PID:3948 -
C:\Windows\SysWOW64\Nepgcgje.exeC:\Windows\system32\Nepgcgje.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3812 -
C:\Windows\SysWOW64\Ncdgmkio.exeC:\Windows\system32\Ncdgmkio.exe66⤵
- Drops file in System32 directory
PID:4200 -
C:\Windows\SysWOW64\Ndcdfnpa.exeC:\Windows\system32\Ndcdfnpa.exe67⤵PID:4472
-
C:\Windows\SysWOW64\Njploeoi.exeC:\Windows\system32\Njploeoi.exe68⤵
- Drops file in System32 directory
PID:3924 -
C:\Windows\SysWOW64\Onqbjccl.exeC:\Windows\system32\Onqbjccl.exe69⤵PID:2776
-
C:\Windows\SysWOW64\Ocmjcjad.exeC:\Windows\system32\Ocmjcjad.exe70⤵PID:2468
-
C:\Windows\SysWOW64\Oncopcqj.exeC:\Windows\system32\Oncopcqj.exe71⤵PID:4908
-
C:\Windows\SysWOW64\Ogkcihgj.exeC:\Windows\system32\Ogkcihgj.exe72⤵PID:3956
-
C:\Windows\SysWOW64\Oqdgan32.exeC:\Windows\system32\Oqdgan32.exe73⤵PID:6152
-
C:\Windows\SysWOW64\Ofqpje32.exeC:\Windows\system32\Ofqpje32.exe74⤵PID:6192
-
C:\Windows\SysWOW64\Pmmelo32.exeC:\Windows\system32\Pmmelo32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6236 -
C:\Windows\SysWOW64\Pgbijg32.exeC:\Windows\system32\Pgbijg32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:6280 -
C:\Windows\SysWOW64\Pgiojf32.exeC:\Windows\system32\Pgiojf32.exe77⤵PID:6324
-
C:\Windows\SysWOW64\Pmfhbm32.exeC:\Windows\system32\Pmfhbm32.exe78⤵PID:6368
-
C:\Windows\SysWOW64\Aceijg32.exeC:\Windows\system32\Aceijg32.exe79⤵
- Modifies registry class
PID:6408 -
C:\Windows\SysWOW64\Aqijdk32.exeC:\Windows\system32\Aqijdk32.exe80⤵PID:6456
-
C:\Windows\SysWOW64\Afeblb32.exeC:\Windows\system32\Afeblb32.exe81⤵
- Modifies registry class
PID:6500 -
C:\Windows\SysWOW64\Aegbji32.exeC:\Windows\system32\Aegbji32.exe82⤵PID:6544
-
C:\Windows\SysWOW64\Ambgnl32.exeC:\Windows\system32\Ambgnl32.exe83⤵PID:6588
-
C:\Windows\SysWOW64\Ajfhhp32.exeC:\Windows\system32\Ajfhhp32.exe84⤵PID:6632
-
C:\Windows\SysWOW64\Andqnn32.exeC:\Windows\system32\Andqnn32.exe85⤵PID:6676
-
C:\Windows\SysWOW64\Bfoebq32.exeC:\Windows\system32\Bfoebq32.exe86⤵
- Modifies registry class
PID:6720 -
C:\Windows\SysWOW64\Badipiae.exeC:\Windows\system32\Badipiae.exe87⤵
- Drops file in System32 directory
PID:6764 -
C:\Windows\SysWOW64\Bhehmbbj.exeC:\Windows\system32\Bhehmbbj.exe88⤵
- Drops file in System32 directory
PID:6856 -
C:\Windows\SysWOW64\Canlfh32.exeC:\Windows\system32\Canlfh32.exe89⤵
- Drops file in System32 directory
- Modifies registry class
PID:6896 -
C:\Windows\SysWOW64\Cfmacoep.exeC:\Windows\system32\Cfmacoep.exe90⤵
- Drops file in System32 directory
PID:7068 -
C:\Windows\SysWOW64\Gfomfo32.exeC:\Windows\system32\Gfomfo32.exe91⤵
- Modifies registry class
PID:4716 -
C:\Windows\SysWOW64\Jndmgn32.exeC:\Windows\system32\Jndmgn32.exe92⤵PID:6228
-
C:\Windows\SysWOW64\Mbqkfhfh.exeC:\Windows\system32\Mbqkfhfh.exe93⤵PID:6268
-
C:\Windows\SysWOW64\Qjiaak32.exeC:\Windows\system32\Qjiaak32.exe94⤵PID:6356
-
C:\Windows\SysWOW64\Bgeabloo.exeC:\Windows\system32\Bgeabloo.exe95⤵
- Modifies registry class
PID:6392 -
C:\Windows\SysWOW64\Cppfgnlj.exeC:\Windows\system32\Cppfgnlj.exe96⤵
- Drops file in System32 directory
- Modifies registry class
PID:6536 -
C:\Windows\SysWOW64\Capbaacl.exeC:\Windows\system32\Capbaacl.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6696 -
C:\Windows\SysWOW64\Dhjcdimf.exeC:\Windows\system32\Dhjcdimf.exe98⤵PID:4292
-
C:\Windows\SysWOW64\Dikpla32.exeC:\Windows\system32\Dikpla32.exe99⤵PID:6840
-
C:\Windows\SysWOW64\Dpehikja.exeC:\Windows\system32\Dpehikja.exe100⤵PID:3012
-
C:\Windows\SysWOW64\Emihbp32.exeC:\Windows\system32\Emihbp32.exe101⤵PID:2476
-
C:\Windows\SysWOW64\Edcqojqh.exeC:\Windows\system32\Edcqojqh.exe102⤵PID:6948
-
C:\Windows\SysWOW64\Ejmild32.exeC:\Windows\system32\Ejmild32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3824 -
C:\Windows\SysWOW64\Edemdine.exeC:\Windows\system32\Edemdine.exe104⤵PID:1300
-
C:\Windows\SysWOW64\Emnbmoef.exeC:\Windows\system32\Emnbmoef.exe105⤵
- Drops file in System32 directory
- Modifies registry class
PID:2400 -
C:\Windows\SysWOW64\Eidbbp32.exeC:\Windows\system32\Eidbbp32.exe106⤵PID:5184
-
C:\Windows\SysWOW64\Edjgpi32.exeC:\Windows\system32\Edjgpi32.exe107⤵PID:7100
-
C:\Windows\SysWOW64\Eigohp32.exeC:\Windows\system32\Eigohp32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4448 -
C:\Windows\SysWOW64\Ffkpadga.exeC:\Windows\system32\Ffkpadga.exe109⤵PID:2004
-
C:\Windows\SysWOW64\Fpcdji32.exeC:\Windows\system32\Fpcdji32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1096 -
C:\Windows\SysWOW64\Fkihgb32.exeC:\Windows\system32\Fkihgb32.exe111⤵PID:1084
-
C:\Windows\SysWOW64\Fabqdl32.exeC:\Windows\system32\Fabqdl32.exe112⤵
- Modifies registry class
PID:4164 -
C:\Windows\SysWOW64\Fgpilc32.exeC:\Windows\system32\Fgpilc32.exe113⤵PID:4352
-
C:\Windows\SysWOW64\Faemjl32.exeC:\Windows\system32\Faemjl32.exe114⤵PID:5224
-
C:\Windows\SysWOW64\Fgbfbc32.exeC:\Windows\system32\Fgbfbc32.exe115⤵PID:5272
-
C:\Windows\SysWOW64\Fmlnomif.exeC:\Windows\system32\Fmlnomif.exe116⤵PID:5320
-
C:\Windows\SysWOW64\Hhiacb32.exeC:\Windows\system32\Hhiacb32.exe117⤵
- Modifies registry class
PID:4396 -
C:\Windows\SysWOW64\Inejlibi.exeC:\Windows\system32\Inejlibi.exe118⤵PID:5736
-
C:\Windows\SysWOW64\Ihknibbo.exeC:\Windows\system32\Ihknibbo.exe119⤵PID:6312
-
C:\Windows\SysWOW64\Idbonc32.exeC:\Windows\system32\Idbonc32.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:3364 -
C:\Windows\SysWOW64\Iklgkmop.exeC:\Windows\system32\Iklgkmop.exe121⤵PID:6524
-
C:\Windows\SysWOW64\Ikndpm32.exeC:\Windows\system32\Ikndpm32.exe122⤵PID:5884
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-