Analysis
-
max time kernel
180s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 19:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.c98cf9e509c56e35da6a3086e2a89780.exe
Resource
win7-20231020-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.c98cf9e509c56e35da6a3086e2a89780.exe
Resource
win10v2004-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.c98cf9e509c56e35da6a3086e2a89780.exe
-
Size
95KB
-
MD5
c98cf9e509c56e35da6a3086e2a89780
-
SHA1
d0a7a1b33c0e08dcd50ffd1b7aab9de69a4bbc68
-
SHA256
2e7908dd87cefc5429925363da041b0fdbc15b3704449a1fb8207fe8ac61aeec
-
SHA512
9e4a0e6e77ba111c711e348e90231cae81ac78fe7b686374dbc1a0ed3b451191a10ba37731ceae72515d2e7c4b6628b5fcb05103c4367882d46f417e44bb8900
-
SSDEEP
1536:6KDyH15Ls90OmPAUud6vS7pK1S11/keNI7xMRQrhRVRoRch1dROrwpOudRirVtF/:6KuPINmPAUuUvkpN18eNI7xMetTWM1dK
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lqdcio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cecbgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cafhap32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbqlkdio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Benbli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pmiijjcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Diicfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gnohgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgcdhp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldgkdbia.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfchcijo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iaodek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fefjkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdiobd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mgagll32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgngkmkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dmfjok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Olgnnqpe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgagll32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akmjmefq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bpdfjbel.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chkokq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Impeib32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kijjldkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gbkkbp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cephgcoh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Impeib32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlqljb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Doeghk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hnjaic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oaejbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mkadam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nenjng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Binhgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aepekk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpghpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ljmlmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ffjkdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mlqljb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dijgdfom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pajcmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lnjgpgkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bmqhlk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bideafko.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qaecikhd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgjggkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbchnfei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mjqjbn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igbhpned.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmbhhkoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lfbggp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pklkla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Galoin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohmeih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajeahm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iajkohmj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjqjbn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aofjhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dogolmmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bbacekmj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leenanik.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ednolp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gogjobmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hgmelc32.exe -
Executes dropped EXE 64 IoCs
pid Process 1700 Gooqfkan.exe 4544 Iapbodql.exe 4816 Ihndgmdd.exe 3456 Jcfejfag.exe 2904 Jcmkjeko.exe 4332 Lcndab32.exe 4016 Npighq32.exe 4256 Njokei32.exe 1832 Olgnnqpe.exe 1696 Plcmiofg.exe 1560 Qipqibmf.exe 908 Alfcflfb.exe 4412 Aphegjhc.exe 2236 Bnlfqngm.exe 1160 Bdmdng32.exe 1716 Cnjbbl32.exe 60 Cgbfka32.exe 3244 Dgjmkqke.exe 2912 Djmbbk32.exe 2344 Ejdhcjpl.exe 4404 Ejfeij32.exe 4680 Fmbnfcam.exe 3416 Hoepmd32.exe 4388 Hknmgd32.exe 1296 Jedjkkmo.exe 2548 Jkqccbkf.exe 5028 Kkhidaeo.exe 4020 Kdpmmf32.exe 3348 Koeajo32.exe 444 Mkadam32.exe 4300 Mbnjcg32.exe 3616 Pmiijjcf.exe 4700 Qfanbpjg.exe 1332 Aekdolkj.exe 1368 Bplhhc32.exe 1116 Bnbeggmi.exe 3364 Dfqogfjo.exe 1108 Fjanjb32.exe 4424 Ffjkdc32.exe 2464 Hnpognhd.exe 4288 Iajkohmj.exe 4320 Ihcclb32.exe 3816 Ionlhlld.exe 3428 Jmnheggo.exe 3192 Jdhpba32.exe 492 Kaonaekb.exe 656 Khifno32.exe 2380 Lqdcio32.exe 3360 Mgceqh32.exe 5008 Mggolhaj.exe 2096 Mbpoop32.exe 4684 Oghgbe32.exe 4992 Obbekn32.exe 4536 Alplfpbp.exe 2120 Bafgdfim.exe 4976 Bhgeao32.exe 2744 Boanniao.exe 5088 Cpedckdl.exe 4556 Chbenm32.exe 4524 Dofpqfof.exe 1404 Dfbebpdq.exe 2324 Ejiqom32.exe 3648 Fqcilgji.exe 2832 Fjlmdmqj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Agjhadmh.exe Amdddkma.exe File created C:\Windows\SysWOW64\Hpafpn32.dll Mbppjd32.exe File created C:\Windows\SysWOW64\Lhqlic32.dll Nahdkffc.exe File opened for modification C:\Windows\SysWOW64\Mkbmbn32.exe Majhjh32.exe File created C:\Windows\SysWOW64\Ddnfnn32.dll Eijipm32.exe File opened for modification C:\Windows\SysWOW64\Fdbked32.exe Cecbgl32.exe File opened for modification C:\Windows\SysWOW64\Ghgjlaln.exe Fdbked32.exe File created C:\Windows\SysWOW64\Hadlaehe.dll Mjidpa32.exe File created C:\Windows\SysWOW64\Bbacekmj.exe Biiole32.exe File created C:\Windows\SysWOW64\Amneleek.exe Abhqolee.exe File created C:\Windows\SysWOW64\Loiohm32.exe Lfbggp32.exe File created C:\Windows\SysWOW64\Gqnpfdfl.dll Mhmcmqbe.exe File created C:\Windows\SysWOW64\Mggolhaj.exe Mgceqh32.exe File created C:\Windows\SysWOW64\Lbngfbdo.exe Lankloml.exe File created C:\Windows\SysWOW64\Dbojnmhg.dll Mfqlph32.exe File opened for modification C:\Windows\SysWOW64\Iaodek32.exe Gldpkfoe.exe File created C:\Windows\SysWOW64\Qahpnkfb.exe Qgbkabgl.exe File created C:\Windows\SysWOW64\Ihndgmdd.exe Iapbodql.exe File created C:\Windows\SysWOW64\Depadoem.dll Kdpmmf32.exe File opened for modification C:\Windows\SysWOW64\Ggqingie.exe Gamjea32.exe File created C:\Windows\SysWOW64\Mhmcmqbe.exe Mackpg32.exe File opened for modification C:\Windows\SysWOW64\Bbacekmj.exe Biiole32.exe File opened for modification C:\Windows\SysWOW64\Jkqccbkf.exe Jedjkkmo.exe File created C:\Windows\SysWOW64\Chnnfa32.dll Aekdolkj.exe File opened for modification C:\Windows\SysWOW64\Foifmcoa.exe Fjlmdmqj.exe File created C:\Windows\SysWOW64\Pddmml32.exe Pjnipc32.exe File created C:\Windows\SysWOW64\Malohibh.dll Nodijffl.exe File created C:\Windows\SysWOW64\Phdbdm32.exe Onekqf32.exe File opened for modification C:\Windows\SysWOW64\Jmamlgon.exe Jgdddpaf.exe File created C:\Windows\SysWOW64\Beijem32.dll Pajcmm32.exe File created C:\Windows\SysWOW64\Kdpmmf32.exe Kkhidaeo.exe File opened for modification C:\Windows\SysWOW64\Lcmopeae.exe Lalchm32.exe File created C:\Windows\SysWOW64\Lgoaln32.dll Hgahnjpk.exe File created C:\Windows\SysWOW64\Mokmnm32.exe Mfchehla.exe File opened for modification C:\Windows\SysWOW64\Dbbdbe32.exe Dgmpelbl.exe File created C:\Windows\SysWOW64\Mdnbkdoh.dll Gfgjlh32.exe File created C:\Windows\SysWOW64\Najaqe32.exe Noledjel.exe File opened for modification C:\Windows\SysWOW64\Dnbfam32.exe Chhndcjm.exe File opened for modification C:\Windows\SysWOW64\Lmnjan32.exe Lcifde32.exe File created C:\Windows\SysWOW64\Mlkhga32.dll Nenjng32.exe File opened for modification C:\Windows\SysWOW64\Cpmajdig.exe Cnlhhi32.exe File opened for modification C:\Windows\SysWOW64\Mbppjd32.exe Mlcgam32.exe File created C:\Windows\SysWOW64\Khifno32.exe Kaonaekb.exe File created C:\Windows\SysWOW64\Bbofpk32.exe Bmbngd32.exe File created C:\Windows\SysWOW64\Edklljnp.exe Dinanb32.exe File created C:\Windows\SysWOW64\Naigkm32.dll Hfnpmgaj.exe File created C:\Windows\SysWOW64\Pqbegb32.dll Fgoadi32.exe File opened for modification C:\Windows\SysWOW64\Anadcbno.exe Adiojl32.exe File opened for modification C:\Windows\SysWOW64\Ejglmf32.exe Elaolj32.exe File created C:\Windows\SysWOW64\Cpedckdl.exe Boanniao.exe File opened for modification C:\Windows\SysWOW64\Idjmfmgp.exe Impeib32.exe File opened for modification C:\Windows\SysWOW64\Bcqife32.exe Amfqikko.exe File created C:\Windows\SysWOW64\Bfkecd32.dll Oeffip32.exe File created C:\Windows\SysWOW64\Gmabiboo.exe Gfgjlh32.exe File opened for modification C:\Windows\SysWOW64\Kjhjkk32.exe Jcnbnqdh.exe File opened for modification C:\Windows\SysWOW64\Elaolj32.exe Dhomjl32.exe File created C:\Windows\SysWOW64\Bamjoj32.dll Gijbgkol.exe File opened for modification C:\Windows\SysWOW64\Bnppim32.exe Bcjlld32.exe File opened for modification C:\Windows\SysWOW64\Plhcglil.exe Ojbamj32.exe File opened for modification C:\Windows\SysWOW64\Gpkiklop.exe Fieacc32.exe File opened for modification C:\Windows\SysWOW64\Gqjada32.exe Epqegd32.exe File created C:\Windows\SysWOW64\Onjkooai.dll Lagejbaj.exe File opened for modification C:\Windows\SysWOW64\Golcja32.exe Ghbkngaa.exe File opened for modification C:\Windows\SysWOW64\Bnbeggmi.exe Bplhhc32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fkgbli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fllilonk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Olgnnqpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bdmdng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bnbeggmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljbcnm32.dll" Hapancai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jendlnof.dll" Emniheha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Amkhfegn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dinanb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Akhabf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pdklohpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bicjfcoh.dll" Dlfopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Emmkci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mlcgam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kadomd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onjkooai.dll" Lagejbaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Adpoqenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jmamlgon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlcdjfpl.dll" Ionlhlld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hbanfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkilik32.dll" Mjqjbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kpdbhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkpikilm.dll" Gmabiboo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naigkm32.dll" Hfnpmgaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hnjaic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Odfcci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fllilonk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jdhpba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Femgia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nekgna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncaknngn.dll" Mkhajq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dbkpokhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jekmmf32.dll" Kpnjknni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mlcaej32.dll" Ajhboj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kjhjkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhgkhi32.dll" Ffjkdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdphjchg.dll" Lqdcio32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Manaegon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mdehep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mppapchl.dll" Epfflj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nknlnl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Flnebnli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nblohqjd.dll" Ggqingie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fpagdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qlmejnga.dll" Bpdfjbel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Opadmkcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pkgaabem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Abpmipde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cplhopqe.dll" Ejfeij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dfqogfjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ejiqom32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fahajbek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Igbhpned.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dedkimfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nahdkffc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kpdbhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjaadjcc.dll" Bfchcijo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dmfjok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hcbpfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eghgibqk.dll" Jjemek32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bbflpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dobffj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Adiojl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aofjhd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 1700 4512 NEAS.c98cf9e509c56e35da6a3086e2a89780.exe 94 PID 4512 wrote to memory of 1700 4512 NEAS.c98cf9e509c56e35da6a3086e2a89780.exe 94 PID 4512 wrote to memory of 1700 4512 NEAS.c98cf9e509c56e35da6a3086e2a89780.exe 94 PID 1700 wrote to memory of 4544 1700 Gooqfkan.exe 95 PID 1700 wrote to memory of 4544 1700 Gooqfkan.exe 95 PID 1700 wrote to memory of 4544 1700 Gooqfkan.exe 95 PID 4544 wrote to memory of 4816 4544 Iapbodql.exe 96 PID 4544 wrote to memory of 4816 4544 Iapbodql.exe 96 PID 4544 wrote to memory of 4816 4544 Iapbodql.exe 96 PID 4816 wrote to memory of 3456 4816 Ihndgmdd.exe 97 PID 4816 wrote to memory of 3456 4816 Ihndgmdd.exe 97 PID 4816 wrote to memory of 3456 4816 Ihndgmdd.exe 97 PID 3456 wrote to memory of 2904 3456 Jcfejfag.exe 98 PID 3456 wrote to memory of 2904 3456 Jcfejfag.exe 98 PID 3456 wrote to memory of 2904 3456 Jcfejfag.exe 98 PID 2904 wrote to memory of 4332 2904 Jcmkjeko.exe 100 PID 2904 wrote to memory of 4332 2904 Jcmkjeko.exe 100 PID 2904 wrote to memory of 4332 2904 Jcmkjeko.exe 100 PID 4332 wrote to memory of 4016 4332 Lcndab32.exe 99 PID 4332 wrote to memory of 4016 4332 Lcndab32.exe 99 PID 4332 wrote to memory of 4016 4332 Lcndab32.exe 99 PID 4016 wrote to memory of 4256 4016 Npighq32.exe 101 PID 4016 wrote to memory of 4256 4016 Npighq32.exe 101 PID 4016 wrote to memory of 4256 4016 Npighq32.exe 101 PID 4256 wrote to memory of 1832 4256 Njokei32.exe 102 PID 4256 wrote to memory of 1832 4256 Njokei32.exe 102 PID 4256 wrote to memory of 1832 4256 Njokei32.exe 102 PID 1832 wrote to memory of 1696 1832 Olgnnqpe.exe 103 PID 1832 wrote to memory of 1696 1832 Olgnnqpe.exe 103 PID 1832 wrote to memory of 1696 1832 Olgnnqpe.exe 103 PID 1696 wrote to memory of 1560 1696 Plcmiofg.exe 104 PID 1696 wrote to memory of 1560 1696 Plcmiofg.exe 104 PID 1696 wrote to memory of 1560 1696 Plcmiofg.exe 104 PID 1560 wrote to memory of 908 1560 Qipqibmf.exe 105 PID 1560 wrote to memory of 908 1560 Qipqibmf.exe 105 PID 1560 wrote to memory of 908 1560 Qipqibmf.exe 105 PID 908 wrote to memory of 4412 908 Alfcflfb.exe 106 PID 908 wrote to memory of 4412 908 Alfcflfb.exe 106 PID 908 wrote to memory of 4412 908 Alfcflfb.exe 106 PID 4412 wrote to memory of 2236 4412 Aphegjhc.exe 107 PID 4412 wrote to memory of 2236 4412 Aphegjhc.exe 107 PID 4412 wrote to memory of 2236 4412 Aphegjhc.exe 107 PID 2236 wrote to memory of 1160 2236 Bnlfqngm.exe 108 PID 2236 wrote to memory of 1160 2236 Bnlfqngm.exe 108 PID 2236 wrote to memory of 1160 2236 Bnlfqngm.exe 108 PID 1160 wrote to memory of 1716 1160 Bdmdng32.exe 109 PID 1160 wrote to memory of 1716 1160 Bdmdng32.exe 109 PID 1160 wrote to memory of 1716 1160 Bdmdng32.exe 109 PID 1716 wrote to memory of 60 1716 Cnjbbl32.exe 110 PID 1716 wrote to memory of 60 1716 Cnjbbl32.exe 110 PID 1716 wrote to memory of 60 1716 Cnjbbl32.exe 110 PID 60 wrote to memory of 3244 60 Cgbfka32.exe 111 PID 60 wrote to memory of 3244 60 Cgbfka32.exe 111 PID 60 wrote to memory of 3244 60 Cgbfka32.exe 111 PID 3244 wrote to memory of 2912 3244 Dgjmkqke.exe 113 PID 3244 wrote to memory of 2912 3244 Dgjmkqke.exe 113 PID 3244 wrote to memory of 2912 3244 Dgjmkqke.exe 113 PID 2912 wrote to memory of 2344 2912 Djmbbk32.exe 112 PID 2912 wrote to memory of 2344 2912 Djmbbk32.exe 112 PID 2912 wrote to memory of 2344 2912 Djmbbk32.exe 112 PID 2344 wrote to memory of 4404 2344 Ejdhcjpl.exe 114 PID 2344 wrote to memory of 4404 2344 Ejdhcjpl.exe 114 PID 2344 wrote to memory of 4404 2344 Ejdhcjpl.exe 114 PID 4404 wrote to memory of 4680 4404 Ejfeij32.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c98cf9e509c56e35da6a3086e2a89780.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c98cf9e509c56e35da6a3086e2a89780.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\Gooqfkan.exeC:\Windows\system32\Gooqfkan.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\Iapbodql.exeC:\Windows\system32\Iapbodql.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\Ihndgmdd.exeC:\Windows\system32\Ihndgmdd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\Jcfejfag.exeC:\Windows\system32\Jcfejfag.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\Jcmkjeko.exeC:\Windows\system32\Jcmkjeko.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Lcndab32.exeC:\Windows\system32\Lcndab32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4332
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Npighq32.exeC:\Windows\system32\Npighq32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\Njokei32.exeC:\Windows\system32\Njokei32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\Olgnnqpe.exeC:\Windows\system32\Olgnnqpe.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\Plcmiofg.exeC:\Windows\system32\Plcmiofg.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\Qipqibmf.exeC:\Windows\system32\Qipqibmf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\Alfcflfb.exeC:\Windows\system32\Alfcflfb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\Aphegjhc.exeC:\Windows\system32\Aphegjhc.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\Bnlfqngm.exeC:\Windows\system32\Bnlfqngm.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Bdmdng32.exeC:\Windows\system32\Bdmdng32.exe9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\Cnjbbl32.exeC:\Windows\system32\Cnjbbl32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\Cgbfka32.exeC:\Windows\system32\Cgbfka32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\Dgjmkqke.exeC:\Windows\system32\Dgjmkqke.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\Djmbbk32.exeC:\Windows\system32\Djmbbk32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ejdhcjpl.exeC:\Windows\system32\Ejdhcjpl.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\Ejfeij32.exeC:\Windows\system32\Ejfeij32.exe2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\Fmbnfcam.exeC:\Windows\system32\Fmbnfcam.exe3⤵
- Executes dropped EXE
PID:4680 -
C:\Windows\SysWOW64\Hoepmd32.exeC:\Windows\system32\Hoepmd32.exe4⤵
- Executes dropped EXE
PID:3416 -
C:\Windows\SysWOW64\Hknmgd32.exeC:\Windows\system32\Hknmgd32.exe5⤵
- Executes dropped EXE
PID:4388 -
C:\Windows\SysWOW64\Jedjkkmo.exeC:\Windows\system32\Jedjkkmo.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1296 -
C:\Windows\SysWOW64\Jkqccbkf.exeC:\Windows\system32\Jkqccbkf.exe7⤵
- Executes dropped EXE
PID:2548
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kdpmmf32.exeC:\Windows\system32\Kdpmmf32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4020 -
C:\Windows\SysWOW64\Koeajo32.exeC:\Windows\system32\Koeajo32.exe2⤵
- Executes dropped EXE
PID:3348
-
-
C:\Windows\SysWOW64\Kkhidaeo.exeC:\Windows\system32\Kkhidaeo.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5028
-
C:\Windows\SysWOW64\Mkadam32.exeC:\Windows\system32\Mkadam32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:444 -
C:\Windows\SysWOW64\Mbnjcg32.exeC:\Windows\system32\Mbnjcg32.exe2⤵
- Executes dropped EXE
PID:4300
-
-
C:\Windows\SysWOW64\Pmiijjcf.exeC:\Windows\system32\Pmiijjcf.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3616 -
C:\Windows\SysWOW64\Qfanbpjg.exeC:\Windows\system32\Qfanbpjg.exe2⤵
- Executes dropped EXE
PID:4700 -
C:\Windows\SysWOW64\Aekdolkj.exeC:\Windows\system32\Aekdolkj.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1332 -
C:\Windows\SysWOW64\Bplhhc32.exeC:\Windows\system32\Bplhhc32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1368 -
C:\Windows\SysWOW64\Bnbeggmi.exeC:\Windows\system32\Bnbeggmi.exe5⤵
- Executes dropped EXE
- Modifies registry class
PID:1116 -
C:\Windows\SysWOW64\Dfqogfjo.exeC:\Windows\system32\Dfqogfjo.exe6⤵
- Executes dropped EXE
- Modifies registry class
PID:3364 -
C:\Windows\SysWOW64\Fjanjb32.exeC:\Windows\system32\Fjanjb32.exe7⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\SysWOW64\Ffjkdc32.exeC:\Windows\system32\Ffjkdc32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4424 -
C:\Windows\SysWOW64\Hnpognhd.exeC:\Windows\system32\Hnpognhd.exe9⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\Iajkohmj.exeC:\Windows\system32\Iajkohmj.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4288 -
C:\Windows\SysWOW64\Ihcclb32.exeC:\Windows\system32\Ihcclb32.exe11⤵
- Executes dropped EXE
PID:4320 -
C:\Windows\SysWOW64\Ionlhlld.exeC:\Windows\system32\Ionlhlld.exe12⤵
- Executes dropped EXE
- Modifies registry class
PID:3816 -
C:\Windows\SysWOW64\Jmnheggo.exeC:\Windows\system32\Jmnheggo.exe13⤵
- Executes dropped EXE
PID:3428 -
C:\Windows\SysWOW64\Jdhpba32.exeC:\Windows\system32\Jdhpba32.exe14⤵
- Executes dropped EXE
- Modifies registry class
PID:3192 -
C:\Windows\SysWOW64\Kaonaekb.exeC:\Windows\system32\Kaonaekb.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:492 -
C:\Windows\SysWOW64\Khifno32.exeC:\Windows\system32\Khifno32.exe16⤵
- Executes dropped EXE
PID:656 -
C:\Windows\SysWOW64\Lqdcio32.exeC:\Windows\system32\Lqdcio32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2380 -
C:\Windows\SysWOW64\Mgceqh32.exeC:\Windows\system32\Mgceqh32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3360 -
C:\Windows\SysWOW64\Mggolhaj.exeC:\Windows\system32\Mggolhaj.exe19⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\Mbpoop32.exeC:\Windows\system32\Mbpoop32.exe20⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\SysWOW64\Oghgbe32.exeC:\Windows\system32\Oghgbe32.exe21⤵
- Executes dropped EXE
PID:4684 -
C:\Windows\SysWOW64\Obbekn32.exeC:\Windows\system32\Obbekn32.exe22⤵
- Executes dropped EXE
PID:4992 -
C:\Windows\SysWOW64\Alplfpbp.exeC:\Windows\system32\Alplfpbp.exe23⤵
- Executes dropped EXE
PID:4536 -
C:\Windows\SysWOW64\Bafgdfim.exeC:\Windows\system32\Bafgdfim.exe24⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\Bhgeao32.exeC:\Windows\system32\Bhgeao32.exe25⤵
- Executes dropped EXE
PID:4976 -
C:\Windows\SysWOW64\Boanniao.exeC:\Windows\system32\Boanniao.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2744 -
C:\Windows\SysWOW64\Cpedckdl.exeC:\Windows\system32\Cpedckdl.exe27⤵
- Executes dropped EXE
PID:5088 -
C:\Windows\SysWOW64\Chbenm32.exeC:\Windows\system32\Chbenm32.exe28⤵
- Executes dropped EXE
PID:4556 -
C:\Windows\SysWOW64\Dofpqfof.exeC:\Windows\system32\Dofpqfof.exe29⤵
- Executes dropped EXE
PID:4524 -
C:\Windows\SysWOW64\Dfbebpdq.exeC:\Windows\system32\Dfbebpdq.exe30⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Ejiqom32.exeC:\Windows\system32\Ejiqom32.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:2324 -
C:\Windows\SysWOW64\Fqcilgji.exeC:\Windows\system32\Fqcilgji.exe32⤵
- Executes dropped EXE
PID:3648 -
C:\Windows\SysWOW64\Fjlmdmqj.exeC:\Windows\system32\Fjlmdmqj.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\Foifmcoa.exeC:\Windows\system32\Foifmcoa.exe34⤵PID:404
-
C:\Windows\SysWOW64\Ffbnin32.exeC:\Windows\system32\Ffbnin32.exe35⤵PID:3264
-
C:\Windows\SysWOW64\Ffggdmbi.exeC:\Windows\system32\Ffggdmbi.exe36⤵PID:408
-
C:\Windows\SysWOW64\Gqhknd32.exeC:\Windows\system32\Gqhknd32.exe37⤵PID:2356
-
C:\Windows\SysWOW64\Hjeiai32.exeC:\Windows\system32\Hjeiai32.exe38⤵PID:4568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Hapancai.exeC:\Windows\system32\Hapancai.exe1⤵
- Modifies registry class
PID:2420 -
C:\Windows\SysWOW64\Hbanfk32.exeC:\Windows\system32\Hbanfk32.exe2⤵
- Modifies registry class
PID:500 -
C:\Windows\SysWOW64\Hikfbeod.exeC:\Windows\system32\Hikfbeod.exe3⤵PID:1952
-
C:\Windows\SysWOW64\Ijolhg32.exeC:\Windows\system32\Ijolhg32.exe4⤵PID:2040
-
C:\Windows\SysWOW64\Impeib32.exeC:\Windows\system32\Impeib32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4012 -
C:\Windows\SysWOW64\Idjmfmgp.exeC:\Windows\system32\Idjmfmgp.exe6⤵PID:1668
-
C:\Windows\SysWOW64\Jpgdlm32.exeC:\Windows\system32\Jpgdlm32.exe7⤵PID:3344
-
C:\Windows\SysWOW64\Jaimko32.exeC:\Windows\system32\Jaimko32.exe8⤵PID:3764
-
C:\Windows\SysWOW64\Kpagbk32.exeC:\Windows\system32\Kpagbk32.exe9⤵PID:1980
-
C:\Windows\SysWOW64\Kkfkod32.exeC:\Windows\system32\Kkfkod32.exe10⤵PID:3124
-
C:\Windows\SysWOW64\Lcifde32.exeC:\Windows\system32\Lcifde32.exe11⤵
- Drops file in System32 directory
PID:1628 -
C:\Windows\SysWOW64\Lmnjan32.exeC:\Windows\system32\Lmnjan32.exe12⤵PID:3368
-
C:\Windows\SysWOW64\Lckbje32.exeC:\Windows\system32\Lckbje32.exe13⤵PID:3108
-
C:\Windows\SysWOW64\Lalchm32.exeC:\Windows\system32\Lalchm32.exe14⤵
- Drops file in System32 directory
PID:5172 -
C:\Windows\SysWOW64\Lcmopeae.exeC:\Windows\system32\Lcmopeae.exe15⤵PID:5212
-
C:\Windows\SysWOW64\Mjqjbn32.exeC:\Windows\system32\Mjqjbn32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5328 -
C:\Windows\SysWOW64\Mkbcbp32.exeC:\Windows\system32\Mkbcbp32.exe17⤵PID:5432
-
C:\Windows\SysWOW64\Nnjbdj32.exeC:\Windows\system32\Nnjbdj32.exe18⤵PID:5484
-
C:\Windows\SysWOW64\Bejoqm32.exeC:\Windows\system32\Bejoqm32.exe19⤵PID:5568
-
C:\Windows\SysWOW64\Cecbgl32.exeC:\Windows\system32\Cecbgl32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5660 -
C:\Windows\SysWOW64\Fdbked32.exeC:\Windows\system32\Fdbked32.exe21⤵
- Drops file in System32 directory
PID:5700 -
C:\Windows\SysWOW64\Ghgjlaln.exeC:\Windows\system32\Ghgjlaln.exe22⤵PID:5860
-
C:\Windows\SysWOW64\Heapmp32.exeC:\Windows\system32\Heapmp32.exe23⤵PID:5904
-
C:\Windows\SysWOW64\Jfllca32.exeC:\Windows\system32\Jfllca32.exe24⤵PID:5948
-
C:\Windows\SysWOW64\Kdiobd32.exeC:\Windows\system32\Kdiobd32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6028 -
C:\Windows\SysWOW64\Ldgkdbia.exeC:\Windows\system32\Ldgkdbia.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6072 -
C:\Windows\SysWOW64\Mgagll32.exeC:\Windows\system32\Mgagll32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6116 -
C:\Windows\SysWOW64\Mdehep32.exeC:\Windows\system32\Mdehep32.exe28⤵
- Modifies registry class
PID:1728 -
C:\Windows\SysWOW64\Mlqljb32.exeC:\Windows\system32\Mlqljb32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5156 -
C:\Windows\SysWOW64\Mlciobhj.exeC:\Windows\system32\Mlciobhj.exe30⤵PID:5196
-
C:\Windows\SysWOW64\Nenjng32.exeC:\Windows\system32\Nenjng32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5336 -
C:\Windows\SysWOW64\Ndokko32.exeC:\Windows\system32\Ndokko32.exe32⤵PID:2016
-
C:\Windows\SysWOW64\Nngoddkg.exeC:\Windows\system32\Nngoddkg.exe33⤵PID:4608
-
C:\Windows\SysWOW64\Nllleapo.exeC:\Windows\system32\Nllleapo.exe34⤵PID:1652
-
C:\Windows\SysWOW64\Ofijifbj.exeC:\Windows\system32\Ofijifbj.exe35⤵PID:5352
-
C:\Windows\SysWOW64\Olcbfp32.exeC:\Windows\system32\Olcbfp32.exe36⤵PID:1828
-
C:\Windows\SysWOW64\Pjnipc32.exeC:\Windows\system32\Pjnipc32.exe37⤵
- Drops file in System32 directory
PID:3976 -
C:\Windows\SysWOW64\Pddmml32.exeC:\Windows\system32\Pddmml32.exe38⤵PID:4916
-
C:\Windows\SysWOW64\Pfjcpc32.exeC:\Windows\system32\Pfjcpc32.exe39⤵PID:5536
-
C:\Windows\SysWOW64\Pdkcnklf.exeC:\Windows\system32\Pdkcnklf.exe40⤵PID:4620
-
C:\Windows\SysWOW64\Amdddkma.exeC:\Windows\system32\Amdddkma.exe41⤵
- Drops file in System32 directory
PID:5648 -
C:\Windows\SysWOW64\Agjhadmh.exeC:\Windows\system32\Agjhadmh.exe42⤵PID:3316
-
C:\Windows\SysWOW64\Amfqikko.exeC:\Windows\system32\Amfqikko.exe43⤵
- Drops file in System32 directory
PID:5696 -
C:\Windows\SysWOW64\Bcqife32.exeC:\Windows\system32\Bcqife32.exe44⤵PID:5852
-
C:\Windows\SysWOW64\Bcjlld32.exeC:\Windows\system32\Bcjlld32.exe45⤵
- Drops file in System32 directory
PID:3564 -
C:\Windows\SysWOW64\Bnppim32.exeC:\Windows\system32\Bnppim32.exe46⤵PID:5912
-
C:\Windows\SysWOW64\Cfkenogb.exeC:\Windows\system32\Cfkenogb.exe47⤵PID:2548
-
C:\Windows\SysWOW64\Cnicpk32.exeC:\Windows\system32\Cnicpk32.exe48⤵PID:4932
-
C:\Windows\SysWOW64\Dobffj32.exeC:\Windows\system32\Dobffj32.exe49⤵
- Modifies registry class
PID:6132 -
C:\Windows\SysWOW64\Eoilfidj.exeC:\Windows\system32\Eoilfidj.exe50⤵PID:5152
-
C:\Windows\SysWOW64\Emniheha.exeC:\Windows\system32\Emniheha.exe51⤵
- Modifies registry class
PID:2156 -
C:\Windows\SysWOW64\Fkgbli32.exeC:\Windows\system32\Fkgbli32.exe52⤵
- Modifies registry class
PID:5428 -
C:\Windows\SysWOW64\Femgia32.exeC:\Windows\system32\Femgia32.exe53⤵
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Fknimh32.exeC:\Windows\system32\Fknimh32.exe54⤵PID:2112
-
C:\Windows\SysWOW64\Fahajbek.exeC:\Windows\system32\Fahajbek.exe55⤵
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\Gamjea32.exeC:\Windows\system32\Gamjea32.exe56⤵
- Drops file in System32 directory
PID:4092 -
C:\Windows\SysWOW64\Ggqingie.exeC:\Windows\system32\Ggqingie.exe57⤵
- Modifies registry class
PID:224 -
C:\Windows\SysWOW64\Ghpehjph.exeC:\Windows\system32\Ghpehjph.exe58⤵PID:3840
-
C:\Windows\SysWOW64\Hkaoiemi.exeC:\Windows\system32\Hkaoiemi.exe59⤵PID:5520
-
C:\Windows\SysWOW64\Inmggo32.exeC:\Windows\system32\Inmggo32.exe60⤵PID:5652
-
C:\Windows\SysWOW64\Jbbfnlpk.exeC:\Windows\system32\Jbbfnlpk.exe61⤵PID:5684
-
C:\Windows\SysWOW64\Jpffgp32.exeC:\Windows\system32\Jpffgp32.exe62⤵PID:5832
-
C:\Windows\SysWOW64\Jfpocjfa.exeC:\Windows\system32\Jfpocjfa.exe63⤵PID:5892
-
C:\Windows\SysWOW64\Jnkchmdl.exeC:\Windows\system32\Jnkchmdl.exe64⤵PID:5972
-
C:\Windows\SysWOW64\Jlocaabf.exeC:\Windows\system32\Jlocaabf.exe65⤵PID:6100
-
C:\Windows\SysWOW64\Kehhjfif.exeC:\Windows\system32\Kehhjfif.exe66⤵PID:4356
-
C:\Windows\SysWOW64\Klapgq32.exeC:\Windows\system32\Klapgq32.exe67⤵PID:5268
-
C:\Windows\SysWOW64\Knbiil32.exeC:\Windows\system32\Knbiil32.exe68⤵PID:2648
-
C:\Windows\SysWOW64\Kpbfbo32.exeC:\Windows\system32\Kpbfbo32.exe69⤵PID:2820
-
C:\Windows\SysWOW64\Kijjldkh.exeC:\Windows\system32\Kijjldkh.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:908 -
C:\Windows\SysWOW64\Kpdbhn32.exeC:\Windows\system32\Kpdbhn32.exe71⤵
- Modifies registry class
PID:1720 -
C:\Windows\SysWOW64\Noaoagca.exeC:\Windows\system32\Noaoagca.exe72⤵PID:3060
-
C:\Windows\SysWOW64\Nekgna32.exeC:\Windows\system32\Nekgna32.exe73⤵
- Modifies registry class
PID:4152 -
C:\Windows\SysWOW64\Nockfgao.exeC:\Windows\system32\Nockfgao.exe74⤵PID:1104
-
C:\Windows\SysWOW64\Oeffip32.exeC:\Windows\system32\Oeffip32.exe75⤵
- Drops file in System32 directory
PID:1124 -
C:\Windows\SysWOW64\Pgdodq32.exeC:\Windows\system32\Pgdodq32.exe76⤵PID:1332
-
C:\Windows\SysWOW64\Plagmh32.exeC:\Windows\system32\Plagmh32.exe77⤵PID:864
-
C:\Windows\SysWOW64\Pckpja32.exeC:\Windows\system32\Pckpja32.exe78⤵PID:3348
-
C:\Windows\SysWOW64\Pjehflie.exeC:\Windows\system32\Pjehflie.exe79⤵PID:1464
-
C:\Windows\SysWOW64\Bjjjhifm.exeC:\Windows\system32\Bjjjhifm.exe80⤵PID:1568
-
C:\Windows\SysWOW64\Bogcqpdd.exeC:\Windows\system32\Bogcqpdd.exe81⤵PID:4576
-
C:\Windows\SysWOW64\Bjlgnh32.exeC:\Windows\system32\Bjlgnh32.exe82⤵PID:492
-
C:\Windows\SysWOW64\Boipfp32.exeC:\Windows\system32\Boipfp32.exe83⤵PID:3644
-
C:\Windows\SysWOW64\Bfchcijo.exeC:\Windows\system32\Bfchcijo.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2412 -
C:\Windows\SysWOW64\Bcghlnih.exeC:\Windows\system32\Bcghlnih.exe85⤵PID:5680
-
C:\Windows\SysWOW64\Bidqddgp.exeC:\Windows\system32\Bidqddgp.exe86⤵PID:3320
-
C:\Windows\SysWOW64\Bpniaool.exeC:\Windows\system32\Bpniaool.exe87⤵PID:2348
-
C:\Windows\SysWOW64\Cafhap32.exeC:\Windows\system32\Cafhap32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4020 -
C:\Windows\SysWOW64\Dibmfb32.exeC:\Windows\system32\Dibmfb32.exe89⤵PID:1028
-
C:\Windows\SysWOW64\Dcgackke.exeC:\Windows\system32\Dcgackke.exe90⤵PID:2392
-
C:\Windows\SysWOW64\Dannbogl.exeC:\Windows\system32\Dannbogl.exe91⤵PID:3804
-
C:\Windows\SysWOW64\Diicfa32.exeC:\Windows\system32\Diicfa32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1108 -
C:\Windows\SysWOW64\Dhjcdimf.exeC:\Windows\system32\Dhjcdimf.exe93⤵PID:3652
-
C:\Windows\SysWOW64\Dmglmpkn.exeC:\Windows\system32\Dmglmpkn.exe94⤵PID:3360
-
C:\Windows\SysWOW64\Ehlpjikd.exeC:\Windows\system32\Ehlpjikd.exe95⤵PID:344
-
C:\Windows\SysWOW64\Ehaieh32.exeC:\Windows\system32\Ehaieh32.exe96⤵PID:3004
-
C:\Windows\SysWOW64\Emnbmoef.exeC:\Windows\system32\Emnbmoef.exe97⤵PID:5148
-
C:\Windows\SysWOW64\Ehcfkhel.exeC:\Windows\system32\Ehcfkhel.exe98⤵PID:1804
-
C:\Windows\SysWOW64\Ealkcm32.exeC:\Windows\system32\Ealkcm32.exe99⤵PID:2552
-
C:\Windows\SysWOW64\Ekdolcbm.exeC:\Windows\system32\Ekdolcbm.exe100⤵PID:456
-
C:\Windows\SysWOW64\Fpagdj32.exeC:\Windows\system32\Fpagdj32.exe101⤵
- Modifies registry class
PID:3640 -
C:\Windows\SysWOW64\Ganppk32.exeC:\Windows\system32\Ganppk32.exe102⤵PID:5812
-
C:\Windows\SysWOW64\Ghhhmebd.exeC:\Windows\system32\Ghhhmebd.exe103⤵PID:872
-
C:\Windows\SysWOW64\Iddlccfp.exeC:\Windows\system32\Iddlccfp.exe104⤵PID:4320
-
C:\Windows\SysWOW64\Igbhpned.exeC:\Windows\system32\Igbhpned.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4960 -
C:\Windows\SysWOW64\Jnfcbg32.exeC:\Windows\system32\Jnfcbg32.exe106⤵PID:3120
-
C:\Windows\SysWOW64\Jgngkmkf.exeC:\Windows\system32\Jgngkmkf.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4028 -
C:\Windows\SysWOW64\Jqgldb32.exeC:\Windows\system32\Jqgldb32.exe108⤵PID:4280
-
C:\Windows\SysWOW64\Jklpakam.exeC:\Windows\system32\Jklpakam.exe109⤵PID:976
-
C:\Windows\SysWOW64\Kgjggkqi.exeC:\Windows\system32\Kgjggkqi.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2872 -
C:\Windows\SysWOW64\Kbpkdd32.exeC:\Windows\system32\Kbpkdd32.exe111⤵PID:2356
-
C:\Windows\SysWOW64\Lnkedd32.exeC:\Windows\system32\Lnkedd32.exe112⤵PID:3144
-
C:\Windows\SysWOW64\Leenanik.exeC:\Windows\system32\Leenanik.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2576 -
C:\Windows\SysWOW64\Lbinkb32.exeC:\Windows\system32\Lbinkb32.exe114⤵PID:1952
-
C:\Windows\SysWOW64\Ljdboe32.exeC:\Windows\system32\Ljdboe32.exe115⤵PID:1540
-
C:\Windows\SysWOW64\Lankloml.exeC:\Windows\system32\Lankloml.exe116⤵
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\Lbngfbdo.exeC:\Windows\system32\Lbngfbdo.exe117⤵PID:1152
-
C:\Windows\SysWOW64\Mhjpnibf.exeC:\Windows\system32\Mhjpnibf.exe118⤵PID:3448
-
C:\Windows\SysWOW64\Mniafbfn.exeC:\Windows\system32\Mniafbfn.exe119⤵PID:5032
-
C:\Windows\SysWOW64\Mlmbofdh.exeC:\Windows\system32\Mlmbofdh.exe120⤵PID:3452
-
C:\Windows\SysWOW64\Majjgmco.exeC:\Windows\system32\Majjgmco.exe121⤵PID:2784
-
C:\Windows\SysWOW64\Mehcnlie.exeC:\Windows\system32\Mehcnlie.exe122⤵PID:1980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-