Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 20:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.bbd87f7e1e62b69d2201431e2abfa2a0.exe
Resource
win7-20231023-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.bbd87f7e1e62b69d2201431e2abfa2a0.exe
Resource
win10v2004-20231023-en
6 signatures
150 seconds
General
-
Target
NEAS.bbd87f7e1e62b69d2201431e2abfa2a0.exe
-
Size
391KB
-
MD5
bbd87f7e1e62b69d2201431e2abfa2a0
-
SHA1
8d8ff94ef924a5dea0afa3d4bf60a52863bfdf4a
-
SHA256
903071a9304647ee06319d047220cf0d5032176ca6724818e185c7df81f75a72
-
SHA512
5dbceb7da32750397b2dd21b0b8d73c1f9f4a86d469177228ac5638df599b5d70920a69533cf257b7bcc4ccee469eb990c75a2d87ab3dd5c8131fb52e5f9d0e6
-
SSDEEP
6144:GpcTE5QsDzaAfbAfNtTAfMAfFAfNPUmKyIxLfYeOO9UmKyIxL:G95QsrmNtuhUNP3cOK3
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Phgagb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojcpmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Epokojbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dbqqeahl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgefae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmfgoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bdjqienq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipihiaqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kcjjajop.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obnebp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bganac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ijlkqj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfnqdale.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hphpap32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aifpoj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ohhnln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lnihod32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oplfekdp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aiclodaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aiclodaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlmhfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dclknkfp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lggeej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gljgkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Felkmnci.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcjjajop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iicboncn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbabblkg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plhcglil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knbaoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dldlbgbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gbofmmmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pjofcb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klpaep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdhkefnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eejjdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hggonfbm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgkeep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbgejcpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pihmojco.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgopplkq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gngnjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kaofcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nfenpafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iohede32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ghdoae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oanfodmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oanfodmk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pahiebeq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mkcjlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fgbfbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pcmeek32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Diclff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mlkejgfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lngkjhmi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkbmjhdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nenbdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" NEAS.bbd87f7e1e62b69d2201431e2abfa2a0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfffcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfjhdobb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ifbbbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gimjag32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcapbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lajfbmmi.exe -
Executes dropped EXE 64 IoCs
pid Process 3380 Mflbjejb.exe 1772 Oimdbnip.exe 2480 Pifghmae.exe 652 Aifpoj32.exe 4888 Hfhgfaha.exe 4676 Kddpnpdn.exe 3408 Kgeiokao.exe 3168 Lggeej32.exe 4044 Mkcjlf32.exe 1412 Mbpoop32.exe 4432 Nqnofkkj.exe 3544 Oilmhhfd.exe 1292 Piepnfnj.exe 4844 Aiclodaj.exe 4016 Apdkmn32.exe 4832 Blnhgn32.exe 5064 Booaii32.exe 1792 Ccacjgfb.exe 4992 Djgkbp32.exe 2088 Gimjag32.exe 3116 Gcdkdpih.exe 3600 Gfedfk32.exe 4252 Hjjbmhfg.exe 2132 Ifhibhfc.exe 1884 Jabgkpad.exe 3160 Jdembk32.exe 4604 Jfffcf32.exe 4712 Kiikkada.exe 1852 Kphmbjhi.exe 3840 Lajfbmmi.exe 812 Mdhkefnj.exe 3440 Njljnl32.exe 4544 Ocldhqgb.exe 5096 Okeinn32.exe 3340 Ocegnoog.exe 5000 Pghiomqi.exe 3992 Qgopplkq.exe 632 Qlmhfj32.exe 4728 Ankdbf32.exe 3748 Abngccbl.exe 844 Boknic32.exe 2324 Dldpde32.exe 1424 Dkljka32.exe 5024 Ehpjdepi.exe 2244 Eefhcimp.exe 708 Ehimkd32.exe 3676 Gkjocm32.exe 1152 Ilpaei32.exe 4836 Ibijbc32.exe 3120 Iicboncn.exe 2020 Ibncmchl.exe 1820 Iihkjm32.exe 2044 Jfoihalp.exe 4900 Jcbibeki.exe 4284 Kfjhdobb.exe 4916 Liddligi.exe 4596 Lmdihgkl.exe 492 Lepnli32.exe 4408 Mccofn32.exe 3088 Nconal32.exe 4632 Npfkqpjk.exe 2544 Qqfmnk32.exe 3740 Afhoaahg.exe 4064 Bglefdke.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Pakleh32.exe Pcepdl32.exe File opened for modification C:\Windows\SysWOW64\Klndopje.exe Kahqbgjp.exe File created C:\Windows\SysWOW64\Fmnkdm32.exe Fhablf32.exe File created C:\Windows\SysWOW64\Cinghhip.dll Iomood32.exe File opened for modification C:\Windows\SysWOW64\Lngkjhmi.exe Knbaoh32.exe File opened for modification C:\Windows\SysWOW64\Qfhdnb32.exe Paioplob.exe File opened for modification C:\Windows\SysWOW64\Qanhkk32.exe Qfhdnb32.exe File created C:\Windows\SysWOW64\Cglbanmo.exe Cdkipb32.exe File opened for modification C:\Windows\SysWOW64\Mdhkefnj.exe Lajfbmmi.exe File created C:\Windows\SysWOW64\Ceqngekl.exe Cfonin32.exe File opened for modification C:\Windows\SysWOW64\Jejjlg32.exe Jpnadp32.exe File created C:\Windows\SysWOW64\Pepafcii.dll Bdjqienq.exe File created C:\Windows\SysWOW64\Jeocgfgn.exe Jhkbnbhd.exe File created C:\Windows\SysWOW64\Icgbmjqh.dll Dkljka32.exe File created C:\Windows\SysWOW64\Afhoaahg.exe Qqfmnk32.exe File created C:\Windows\SysWOW64\Diclff32.exe Cbmdnmdf.exe File opened for modification C:\Windows\SysWOW64\Ahacndjo.exe Ahofidlb.exe File created C:\Windows\SysWOW64\Aklgbhpo.dll Dalhgfmk.exe File created C:\Windows\SysWOW64\Mdhbpkgj.dll Kdmqfi32.exe File opened for modification C:\Windows\SysWOW64\Ohahkojp.exe Ojmhaklf.exe File created C:\Windows\SysWOW64\Cpbbmc32.dll Qoboofnb.exe File created C:\Windows\SysWOW64\Kphmbjhi.exe Kiikkada.exe File opened for modification C:\Windows\SysWOW64\Cfakon32.exe Ceqngekl.exe File opened for modification C:\Windows\SysWOW64\Ibijbc32.exe Ilpaei32.exe File opened for modification C:\Windows\SysWOW64\Gflhie32.exe Gemkobia.exe File created C:\Windows\SysWOW64\Iafogggl.exe Ihnkobpl.exe File created C:\Windows\SysWOW64\Kcjjajop.exe Klpaep32.exe File created C:\Windows\SysWOW64\Ankdbf32.exe Qlmhfj32.exe File created C:\Windows\SysWOW64\Pnnlopdg.dll Qqfmnk32.exe File opened for modification C:\Windows\SysWOW64\Ojmhaklf.exe Njkklk32.exe File created C:\Windows\SysWOW64\Ppkieoal.dll Hfekoc32.exe File created C:\Windows\SysWOW64\Cbfjin32.dll Qhjegh32.exe File created C:\Windows\SysWOW64\Iqklhd32.exe Igbhpned.exe File created C:\Windows\SysWOW64\Dcldcd32.dll Dfcjoa32.exe File opened for modification C:\Windows\SysWOW64\Cglbanmo.exe Cdkipb32.exe File opened for modification C:\Windows\SysWOW64\Poaqocgl.exe Pgaboa32.exe File created C:\Windows\SysWOW64\Hmnmqdee.exe Hdehho32.exe File opened for modification C:\Windows\SysWOW64\Gdaomobj.exe Gljgkb32.exe File created C:\Windows\SysWOW64\Gblbmg32.exe Gicndaep.exe File created C:\Windows\SysWOW64\Qjjblpmk.dll Cglbanmo.exe File opened for modification C:\Windows\SysWOW64\Okeinn32.exe Ocldhqgb.exe File created C:\Windows\SysWOW64\Acmhgq32.dll Dldlbgbb.exe File opened for modification C:\Windows\SysWOW64\Bmkjdj32.exe Bnfmcn32.exe File created C:\Windows\SysWOW64\Jliffj32.dll Fdfmfmdo.exe File opened for modification C:\Windows\SysWOW64\Pimkkfka.exe Nahgik32.exe File created C:\Windows\SysWOW64\Lqmmgb32.exe Lngkjhmi.exe File opened for modification C:\Windows\SysWOW64\Pjofcb32.exe Pjmjnb32.exe File created C:\Windows\SysWOW64\Ndfgdmpi.dll Hkobdeok.exe File opened for modification C:\Windows\SysWOW64\Midfiq32.exe Ifbbbl32.exe File created C:\Windows\SysWOW64\Foagel32.dll Gmmmoppl.exe File opened for modification C:\Windows\SysWOW64\Klpaep32.exe Kchmljab.exe File created C:\Windows\SysWOW64\Ladekn32.dll Opphed32.exe File created C:\Windows\SysWOW64\Mkcjlf32.exe Lggeej32.exe File opened for modification C:\Windows\SysWOW64\Idahcm32.exe Hkbmjhdo.exe File opened for modification C:\Windows\SysWOW64\Illfmi32.exe Iebnqofj.exe File created C:\Windows\SysWOW64\Jamafidm.exe Jhdlncnl.exe File created C:\Windows\SysWOW64\Jhpckehm.dll Gdppllld.exe File created C:\Windows\SysWOW64\Jfigdl32.dll Aakelfhg.exe File created C:\Windows\SysWOW64\Okeinn32.exe Ocldhqgb.exe File created C:\Windows\SysWOW64\Ahofidlb.exe Apeabg32.exe File opened for modification C:\Windows\SysWOW64\Dpfcpcam.exe Cglbanmo.exe File opened for modification C:\Windows\SysWOW64\Lepnli32.exe Lmdihgkl.exe File created C:\Windows\SysWOW64\Fahhdg32.dll Dodbkiho.exe File opened for modification C:\Windows\SysWOW64\Gmqgjl32.exe Ghdoae32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1204 1232 WerFault.exe 414 5796 1232 WerFault.exe 414 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lqkpiiof.dll" Fmfgoa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pifghmae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Piepnfnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Njljnl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajdjcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmceaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibdffcmj.dll" Klndopje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nfeqnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hiobif32.dll" Qfpbfljd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mbgjlq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dldlbgbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkhbaj32.dll" Kjafha32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Illfmi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fggfghap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Diffabgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cfgjcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Appcqpob.dll" Ajfejknb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjfbnpkg.dll" Ccacjgfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plaebilk.dll" Boknic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fnqblcae.dll" Gkeonggf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kcgnkgkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dpfcpcam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nepmnppf.dll" Eoccii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mbpoop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jabgkpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hggqniih.dll" Fagjolao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Igbhpned.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pmoijcje.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ankdbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbaihddp.dll" Gmqgjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Feegfd32.dll" Njkklk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aklgbhpo.dll" Dalhgfmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Emihbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fagjolao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jpdhdl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pifghmae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjmnib32.dll" Jfffcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kphmbjhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oedbaphl.dll" Ibijbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpmmcncm.dll" Bglefdke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dodbkiho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdhbpkgj.dll" Kdmqfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eddemo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jejjlg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Klpaep32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kfjhdobb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppkieoal.dll" Hfekoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lijdfcgg.dll" Iohede32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pakleh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dldlbgbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fiimfo32.dll" Ifhibhfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epbbim32.dll" Ajdjcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jdembk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmhdcm32.dll" Dpckclld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jpcajflb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hjjbmhfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bnffai32.dll" Fggfghap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kgefae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jeocgfgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfgidngk.dll" Jfoihalp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cfonin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Djfckenm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jjfngi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ohhnln32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3208 wrote to memory of 3380 3208 NEAS.bbd87f7e1e62b69d2201431e2abfa2a0.exe 95 PID 3208 wrote to memory of 3380 3208 NEAS.bbd87f7e1e62b69d2201431e2abfa2a0.exe 95 PID 3208 wrote to memory of 3380 3208 NEAS.bbd87f7e1e62b69d2201431e2abfa2a0.exe 95 PID 3380 wrote to memory of 1772 3380 Mflbjejb.exe 96 PID 3380 wrote to memory of 1772 3380 Mflbjejb.exe 96 PID 3380 wrote to memory of 1772 3380 Mflbjejb.exe 96 PID 1772 wrote to memory of 2480 1772 Oimdbnip.exe 97 PID 1772 wrote to memory of 2480 1772 Oimdbnip.exe 97 PID 1772 wrote to memory of 2480 1772 Oimdbnip.exe 97 PID 2480 wrote to memory of 652 2480 Pifghmae.exe 98 PID 2480 wrote to memory of 652 2480 Pifghmae.exe 98 PID 2480 wrote to memory of 652 2480 Pifghmae.exe 98 PID 652 wrote to memory of 4888 652 Aifpoj32.exe 99 PID 652 wrote to memory of 4888 652 Aifpoj32.exe 99 PID 652 wrote to memory of 4888 652 Aifpoj32.exe 99 PID 4888 wrote to memory of 4676 4888 Hfhgfaha.exe 100 PID 4888 wrote to memory of 4676 4888 Hfhgfaha.exe 100 PID 4888 wrote to memory of 4676 4888 Hfhgfaha.exe 100 PID 4676 wrote to memory of 3408 4676 Kddpnpdn.exe 101 PID 4676 wrote to memory of 3408 4676 Kddpnpdn.exe 101 PID 4676 wrote to memory of 3408 4676 Kddpnpdn.exe 101 PID 3408 wrote to memory of 3168 3408 Kgeiokao.exe 102 PID 3408 wrote to memory of 3168 3408 Kgeiokao.exe 102 PID 3408 wrote to memory of 3168 3408 Kgeiokao.exe 102 PID 3168 wrote to memory of 4044 3168 Lggeej32.exe 103 PID 3168 wrote to memory of 4044 3168 Lggeej32.exe 103 PID 3168 wrote to memory of 4044 3168 Lggeej32.exe 103 PID 4044 wrote to memory of 1412 4044 Mkcjlf32.exe 104 PID 4044 wrote to memory of 1412 4044 Mkcjlf32.exe 104 PID 4044 wrote to memory of 1412 4044 Mkcjlf32.exe 104 PID 1412 wrote to memory of 4432 1412 Mbpoop32.exe 105 PID 1412 wrote to memory of 4432 1412 Mbpoop32.exe 105 PID 1412 wrote to memory of 4432 1412 Mbpoop32.exe 105 PID 4432 wrote to memory of 3544 4432 Nqnofkkj.exe 106 PID 4432 wrote to memory of 3544 4432 Nqnofkkj.exe 106 PID 4432 wrote to memory of 3544 4432 Nqnofkkj.exe 106 PID 3544 wrote to memory of 1292 3544 Oilmhhfd.exe 107 PID 3544 wrote to memory of 1292 3544 Oilmhhfd.exe 107 PID 3544 wrote to memory of 1292 3544 Oilmhhfd.exe 107 PID 1292 wrote to memory of 4844 1292 Piepnfnj.exe 108 PID 1292 wrote to memory of 4844 1292 Piepnfnj.exe 108 PID 1292 wrote to memory of 4844 1292 Piepnfnj.exe 108 PID 4844 wrote to memory of 4016 4844 Aiclodaj.exe 109 PID 4844 wrote to memory of 4016 4844 Aiclodaj.exe 109 PID 4844 wrote to memory of 4016 4844 Aiclodaj.exe 109 PID 4016 wrote to memory of 4832 4016 Apdkmn32.exe 110 PID 4016 wrote to memory of 4832 4016 Apdkmn32.exe 110 PID 4016 wrote to memory of 4832 4016 Apdkmn32.exe 110 PID 4832 wrote to memory of 5064 4832 Blnhgn32.exe 111 PID 4832 wrote to memory of 5064 4832 Blnhgn32.exe 111 PID 4832 wrote to memory of 5064 4832 Blnhgn32.exe 111 PID 5064 wrote to memory of 1792 5064 Booaii32.exe 112 PID 5064 wrote to memory of 1792 5064 Booaii32.exe 112 PID 5064 wrote to memory of 1792 5064 Booaii32.exe 112 PID 1792 wrote to memory of 4992 1792 Ccacjgfb.exe 113 PID 1792 wrote to memory of 4992 1792 Ccacjgfb.exe 113 PID 1792 wrote to memory of 4992 1792 Ccacjgfb.exe 113 PID 4992 wrote to memory of 2088 4992 Djgkbp32.exe 114 PID 4992 wrote to memory of 2088 4992 Djgkbp32.exe 114 PID 4992 wrote to memory of 2088 4992 Djgkbp32.exe 114 PID 2088 wrote to memory of 3116 2088 Gimjag32.exe 115 PID 2088 wrote to memory of 3116 2088 Gimjag32.exe 115 PID 2088 wrote to memory of 3116 2088 Gimjag32.exe 115 PID 3116 wrote to memory of 3600 3116 Gcdkdpih.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.bbd87f7e1e62b69d2201431e2abfa2a0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.bbd87f7e1e62b69d2201431e2abfa2a0.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\Mflbjejb.exeC:\Windows\system32\Mflbjejb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\Oimdbnip.exeC:\Windows\system32\Oimdbnip.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\Pifghmae.exeC:\Windows\system32\Pifghmae.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\Aifpoj32.exeC:\Windows\system32\Aifpoj32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\Hfhgfaha.exeC:\Windows\system32\Hfhgfaha.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\Kddpnpdn.exeC:\Windows\system32\Kddpnpdn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\Kgeiokao.exeC:\Windows\system32\Kgeiokao.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\Lggeej32.exeC:\Windows\system32\Lggeej32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\Mkcjlf32.exeC:\Windows\system32\Mkcjlf32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\Mbpoop32.exeC:\Windows\system32\Mbpoop32.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\Nqnofkkj.exeC:\Windows\system32\Nqnofkkj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\Oilmhhfd.exeC:\Windows\system32\Oilmhhfd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\Piepnfnj.exeC:\Windows\system32\Piepnfnj.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\Aiclodaj.exeC:\Windows\system32\Aiclodaj.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\Apdkmn32.exeC:\Windows\system32\Apdkmn32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\Blnhgn32.exeC:\Windows\system32\Blnhgn32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\Booaii32.exeC:\Windows\system32\Booaii32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\Ccacjgfb.exeC:\Windows\system32\Ccacjgfb.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\Djgkbp32.exeC:\Windows\system32\Djgkbp32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\Gimjag32.exeC:\Windows\system32\Gimjag32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Gcdkdpih.exeC:\Windows\system32\Gcdkdpih.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\Gfedfk32.exeC:\Windows\system32\Gfedfk32.exe23⤵
- Executes dropped EXE
PID:3600 -
C:\Windows\SysWOW64\Hjjbmhfg.exeC:\Windows\system32\Hjjbmhfg.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:4252 -
C:\Windows\SysWOW64\Ifhibhfc.exeC:\Windows\system32\Ifhibhfc.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:2132 -
C:\Windows\SysWOW64\Jabgkpad.exeC:\Windows\system32\Jabgkpad.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:1884 -
C:\Windows\SysWOW64\Jdembk32.exeC:\Windows\system32\Jdembk32.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:3160 -
C:\Windows\SysWOW64\Jfffcf32.exeC:\Windows\system32\Jfffcf32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4604 -
C:\Windows\SysWOW64\Kiikkada.exeC:\Windows\system32\Kiikkada.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4712 -
C:\Windows\SysWOW64\Kphmbjhi.exeC:\Windows\system32\Kphmbjhi.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:1852 -
C:\Windows\SysWOW64\Lajfbmmi.exeC:\Windows\system32\Lajfbmmi.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3840 -
C:\Windows\SysWOW64\Mdhkefnj.exeC:\Windows\system32\Mdhkefnj.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:812 -
C:\Windows\SysWOW64\Njljnl32.exeC:\Windows\system32\Njljnl32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:3440 -
C:\Windows\SysWOW64\Ocldhqgb.exeC:\Windows\system32\Ocldhqgb.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4544 -
C:\Windows\SysWOW64\Okeinn32.exeC:\Windows\system32\Okeinn32.exe35⤵
- Executes dropped EXE
PID:5096 -
C:\Windows\SysWOW64\Ocegnoog.exeC:\Windows\system32\Ocegnoog.exe36⤵
- Executes dropped EXE
PID:3340 -
C:\Windows\SysWOW64\Pghiomqi.exeC:\Windows\system32\Pghiomqi.exe37⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\Qgopplkq.exeC:\Windows\system32\Qgopplkq.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3992 -
C:\Windows\SysWOW64\Qlmhfj32.exeC:\Windows\system32\Qlmhfj32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:632 -
C:\Windows\SysWOW64\Ankdbf32.exeC:\Windows\system32\Ankdbf32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:4728 -
C:\Windows\SysWOW64\Abngccbl.exeC:\Windows\system32\Abngccbl.exe41⤵
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\Boknic32.exeC:\Windows\system32\Boknic32.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:844 -
C:\Windows\SysWOW64\Dldpde32.exeC:\Windows\system32\Dldpde32.exe43⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\Dkljka32.exeC:\Windows\system32\Dkljka32.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1424 -
C:\Windows\SysWOW64\Ehpjdepi.exeC:\Windows\system32\Ehpjdepi.exe45⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\Eefhcimp.exeC:\Windows\system32\Eefhcimp.exe46⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\Ehimkd32.exeC:\Windows\system32\Ehimkd32.exe47⤵
- Executes dropped EXE
PID:708 -
C:\Windows\SysWOW64\Gkjocm32.exeC:\Windows\system32\Gkjocm32.exe48⤵
- Executes dropped EXE
PID:3676 -
C:\Windows\SysWOW64\Ilpaei32.exeC:\Windows\system32\Ilpaei32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1152 -
C:\Windows\SysWOW64\Ibijbc32.exeC:\Windows\system32\Ibijbc32.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:4836 -
C:\Windows\SysWOW64\Iicboncn.exeC:\Windows\system32\Iicboncn.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3120 -
C:\Windows\SysWOW64\Ibncmchl.exeC:\Windows\system32\Ibncmchl.exe52⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\Iihkjm32.exeC:\Windows\system32\Iihkjm32.exe53⤵
- Executes dropped EXE
PID:1820 -
C:\Windows\SysWOW64\Jfoihalp.exeC:\Windows\system32\Jfoihalp.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:2044 -
C:\Windows\SysWOW64\Jcbibeki.exeC:\Windows\system32\Jcbibeki.exe55⤵
- Executes dropped EXE
PID:4900 -
C:\Windows\SysWOW64\Kfjhdobb.exeC:\Windows\system32\Kfjhdobb.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4284 -
C:\Windows\SysWOW64\Liddligi.exeC:\Windows\system32\Liddligi.exe57⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\SysWOW64\Lmdihgkl.exeC:\Windows\system32\Lmdihgkl.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4596 -
C:\Windows\SysWOW64\Lepnli32.exeC:\Windows\system32\Lepnli32.exe59⤵
- Executes dropped EXE
PID:492 -
C:\Windows\SysWOW64\Mccofn32.exeC:\Windows\system32\Mccofn32.exe60⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\Nconal32.exeC:\Windows\system32\Nconal32.exe61⤵
- Executes dropped EXE
PID:3088 -
C:\Windows\SysWOW64\Npfkqpjk.exeC:\Windows\system32\Npfkqpjk.exe62⤵
- Executes dropped EXE
PID:4632 -
C:\Windows\SysWOW64\Nfeqnf32.exeC:\Windows\system32\Nfeqnf32.exe63⤵
- Modifies registry class
PID:2984 -
C:\Windows\SysWOW64\Qqfmnk32.exeC:\Windows\system32\Qqfmnk32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\Afhoaahg.exeC:\Windows\system32\Afhoaahg.exe65⤵
- Executes dropped EXE
PID:3740 -
C:\Windows\SysWOW64\Bglefdke.exeC:\Windows\system32\Bglefdke.exe66⤵
- Executes dropped EXE
- Modifies registry class
PID:4064 -
C:\Windows\SysWOW64\Bnfmcn32.exeC:\Windows\system32\Bnfmcn32.exe67⤵
- Drops file in System32 directory
PID:3872 -
C:\Windows\SysWOW64\Bmkjdj32.exeC:\Windows\system32\Bmkjdj32.exe68⤵PID:2476
-
C:\Windows\SysWOW64\Bganac32.exeC:\Windows\system32\Bganac32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4928 -
C:\Windows\SysWOW64\Bnkgomnl.exeC:\Windows\system32\Bnkgomnl.exe70⤵PID:3208
-
C:\Windows\SysWOW64\Cmdmki32.exeC:\Windows\system32\Cmdmki32.exe71⤵PID:1208
-
C:\Windows\SysWOW64\Cfonin32.exeC:\Windows\system32\Cfonin32.exe72⤵
- Drops file in System32 directory
- Modifies registry class
PID:4360 -
C:\Windows\SysWOW64\Ceqngekl.exeC:\Windows\system32\Ceqngekl.exe73⤵
- Drops file in System32 directory
PID:3464 -
C:\Windows\SysWOW64\Cfakon32.exeC:\Windows\system32\Cfakon32.exe74⤵PID:3904
-
C:\Windows\SysWOW64\Dalhgfmk.exeC:\Windows\system32\Dalhgfmk.exe75⤵
- Drops file in System32 directory
- Modifies registry class
PID:5132 -
C:\Windows\SysWOW64\Dmefafql.exeC:\Windows\system32\Dmefafql.exe76⤵PID:5172
-
C:\Windows\SysWOW64\Dodbkiho.exeC:\Windows\system32\Dodbkiho.exe77⤵
- Drops file in System32 directory
- Modifies registry class
PID:5220 -
C:\Windows\SysWOW64\Eejjdb32.exeC:\Windows\system32\Eejjdb32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5260 -
C:\Windows\SysWOW64\Fhpmql32.exeC:\Windows\system32\Fhpmql32.exe79⤵PID:5300
-
C:\Windows\SysWOW64\Fdfmfmdo.exeC:\Windows\system32\Fdfmfmdo.exe80⤵
- Drops file in System32 directory
PID:5340 -
C:\Windows\SysWOW64\Fggfghap.exeC:\Windows\system32\Fggfghap.exe81⤵
- Modifies registry class
PID:5380 -
C:\Windows\SysWOW64\Gehfepio.exeC:\Windows\system32\Gehfepio.exe82⤵PID:5424
-
C:\Windows\SysWOW64\Gkeonggf.exeC:\Windows\system32\Gkeonggf.exe83⤵
- Modifies registry class
PID:5464 -
C:\Windows\SysWOW64\Gdppllld.exeC:\Windows\system32\Gdppllld.exe84⤵
- Drops file in System32 directory
PID:5508 -
C:\Windows\SysWOW64\Gafmkp32.exeC:\Windows\system32\Gafmkp32.exe85⤵PID:5556
-
C:\Windows\SysWOW64\Hkobdeok.exeC:\Windows\system32\Hkobdeok.exe86⤵
- Drops file in System32 directory
PID:5596 -
C:\Windows\SysWOW64\Hhbbmjne.exeC:\Windows\system32\Hhbbmjne.exe87⤵PID:5636
-
C:\Windows\SysWOW64\Hggonfbm.exeC:\Windows\system32\Hggonfbm.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5684 -
C:\Windows\SysWOW64\Ifbbbl32.exeC:\Windows\system32\Ifbbbl32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5940 -
C:\Windows\SysWOW64\Midfiq32.exeC:\Windows\system32\Midfiq32.exe90⤵PID:6036
-
C:\Windows\SysWOW64\Pgaboa32.exeC:\Windows\system32\Pgaboa32.exe91⤵
- Drops file in System32 directory
PID:6124 -
C:\Windows\SysWOW64\Poaqocgl.exeC:\Windows\system32\Poaqocgl.exe92⤵PID:184
-
C:\Windows\SysWOW64\Qhjegh32.exeC:\Windows\system32\Qhjegh32.exe93⤵
- Drops file in System32 directory
PID:5200 -
C:\Windows\SysWOW64\Qgkeep32.exeC:\Windows\system32\Qgkeep32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5308 -
C:\Windows\SysWOW64\Qfpbfljd.exeC:\Windows\system32\Qfpbfljd.exe95⤵
- Modifies registry class
PID:5452 -
C:\Windows\SysWOW64\Cihjpd32.exeC:\Windows\system32\Cihjpd32.exe96⤵PID:5580
-
C:\Windows\SysWOW64\Dplebmbl.exeC:\Windows\system32\Dplebmbl.exe97⤵PID:5632
-
C:\Windows\SysWOW64\Djaipe32.exeC:\Windows\system32\Djaipe32.exe98⤵PID:5692
-
C:\Windows\SysWOW64\Dpnbhl32.exeC:\Windows\system32\Dpnbhl32.exe99⤵PID:1880
-
C:\Windows\SysWOW64\Diffabgj.exeC:\Windows\system32\Diffabgj.exe100⤵
- Modifies registry class
PID:5788 -
C:\Windows\SysWOW64\Dclknkfp.exeC:\Windows\system32\Dclknkfp.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5824 -
C:\Windows\SysWOW64\Djfckenm.exeC:\Windows\system32\Djfckenm.exe102⤵
- Modifies registry class
PID:4556 -
C:\Windows\SysWOW64\Dpckclld.exeC:\Windows\system32\Dpckclld.exe103⤵
- Modifies registry class
PID:4852 -
C:\Windows\SysWOW64\Ejklfd32.exeC:\Windows\system32\Ejklfd32.exe104⤵PID:5916
-
C:\Windows\SysWOW64\Emihbp32.exeC:\Windows\system32\Emihbp32.exe105⤵
- Modifies registry class
PID:5960 -
C:\Windows\SysWOW64\Ejmild32.exeC:\Windows\system32\Ejmild32.exe106⤵PID:6004
-
C:\Windows\SysWOW64\Edhjji32.exeC:\Windows\system32\Edhjji32.exe107⤵PID:4732
-
C:\Windows\SysWOW64\Ejabgcdp.exeC:\Windows\system32\Ejabgcdp.exe108⤵PID:6044
-
C:\Windows\SysWOW64\Epokojbg.exeC:\Windows\system32\Epokojbg.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6092 -
C:\Windows\SysWOW64\Efhcld32.exeC:\Windows\system32\Efhcld32.exe110⤵PID:5128
-
C:\Windows\SysWOW64\Embkhn32.exeC:\Windows\system32\Embkhn32.exe111⤵PID:5256
-
C:\Windows\SysWOW64\Fkihgb32.exeC:\Windows\system32\Fkihgb32.exe112⤵PID:5296
-
C:\Windows\SysWOW64\Fpeapilo.exeC:\Windows\system32\Fpeapilo.exe113⤵PID:5412
-
C:\Windows\SysWOW64\Fgbfbc32.exeC:\Windows\system32\Fgbfbc32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1292 -
C:\Windows\SysWOW64\Fagjolao.exeC:\Windows\system32\Fagjolao.exe115⤵
- Modifies registry class
PID:4020 -
C:\Windows\SysWOW64\Fhablf32.exeC:\Windows\system32\Fhablf32.exe116⤵
- Drops file in System32 directory
PID:5480 -
C:\Windows\SysWOW64\Fmnkdm32.exeC:\Windows\system32\Fmnkdm32.exe117⤵PID:5564
-
C:\Windows\SysWOW64\Ghdoae32.exeC:\Windows\system32\Ghdoae32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5616 -
C:\Windows\SysWOW64\Gmqgjl32.exeC:\Windows\system32\Gmqgjl32.exe119⤵
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Gdjpff32.exeC:\Windows\system32\Gdjpff32.exe120⤵PID:940
-
C:\Windows\SysWOW64\Gngnjk32.exeC:\Windows\system32\Gngnjk32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5064 -
C:\Windows\SysWOW64\Hahcfi32.exeC:\Windows\system32\Hahcfi32.exe122⤵PID:5716
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-