Analysis
-
max time kernel
243s -
max time network
299s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 16:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe
-
Size
362KB
-
MD5
9bcac77fdeccc77897ee87e53c833e08
-
SHA1
e74035c1c246be06cb1e61e98344c6d4b379cb39
-
SHA256
15dcf4f10a9a197285d80d01c5d57a911cad34a7ea0dc59447368d570ebffe5b
-
SHA512
793866958dd201e59b1f6ebe06c2e12168052897496edfcee300fc8f5d303ae460417cc21b54a5410f85082b17482aa40c1a50238519a5a09c0d105db75fa29d
-
SSDEEP
6144:bSpSK7UgArtGDuMEUrQVad7nG3mbDp2o+SsmiMyhtHEyr5psPc1aj8DOvlvuZxrB:3ztmuMtrQ07nGWxWSsmiMyh95r5OPGa6
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcchfjmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lmefnqih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkhnlfkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pcdmak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kdckgc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agngqmhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bhkcdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dfcigk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcfifk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dghlcehj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Deebknpg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jajqka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kckeno32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckeekp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdkhihdn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iolojejd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkjjaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cbhcankf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qappbgkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hnhjok32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khgnff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dnnnlmob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nenccdmn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npcgpmmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oillib32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pllajaca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dghlcehj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnfnlk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhkcdd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibklbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ejdghdll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kckill32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdckgc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhfjid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Boboknnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iolojejd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jkjjaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Popgal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bbeemi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idojlngn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kdaoacif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bjcimhab.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcfdlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Djdkiqiq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nhombc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkhfhaea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Imppciin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ckonhddh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnmjdpcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Flaclkgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dpicceon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdehmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lqjhkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iipkcpke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Djiddp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Janijh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pljddaed.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Popgal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Idojlngn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjbecgbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kenbjd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jomnpdjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Inmdjjok.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbmjai32.exe -
Executes dropped EXE 64 IoCs
pid Process 2268 Cbhcankf.exe 2532 Ckeekp32.exe 2996 Cnfnlk32.exe 2876 Dpicceon.exe 836 Jomnpdjb.exe 2204 Kdhlmhgj.exe 2664 Fffckf32.exe 1472 Gkehhlef.exe 580 Gfdcdi32.exe 1304 Henipenb.exe 860 Hnhjok32.exe 2092 Inmdjjok.exe 296 Ipqmgbbf.exe 680 Jfoookfn.exe 980 Janijh32.exe 1340 Kdaoacif.exe 1088 Kdckgc32.exe 628 Kdehmb32.exe 2388 Kckeno32.exe 2176 Khgnff32.exe 868 Lkhfhaea.exe 1504 Ldqkqf32.exe 2080 Lqjhkg32.exe 2680 Lnnidk32.exe 936 Mdjnge32.exe 2184 Mjgfol32.exe 2396 Mqckaf32.exe 2736 Naqkki32.exe 2512 Ndadld32.exe 2272 Nhombc32.exe 2372 Ojpedn32.exe 2860 Aobblkkk.exe 1616 Aaaohfjo.exe 2284 Agngqmhf.exe 1680 Apflic32.exe 600 Agpdfmfc.exe 2784 Bjcimhab.exe 1104 Bhfjid32.exe 1396 Bclnfm32.exe 2944 Boboknnf.exe 1328 Bhkcdd32.exe 2364 Boekqn32.exe 2276 Cgppep32.exe 312 Cggffocg.exe 1652 Cmdonf32.exe 884 Cikocggb.exe 2432 Dbcdlm32.exe 1944 Dfcigk32.exe 2548 Dnnnlmob.exe 2096 Dggbeb32.exe 2572 Ehiojb32.exe 2016 Eempcfbi.exe 2720 Edbmec32.exe 800 Ejleamon.exe 1596 Ejoagm32.exe 852 Elpnoebj.exe 2532 Foqgqppk.exe 2792 Ggeoka32.exe 808 Gkcgaoka.exe 1676 Ggjhfpqf.exe 524 Glfqngom.exe 2536 Ggldlpoc.exe 2984 Gjmnmk32.exe 2788 Hahbam32.exe -
Loads dropped DLL 64 IoCs
pid Process 2352 NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe 2352 NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe 2268 Cbhcankf.exe 2268 Cbhcankf.exe 2532 Ckeekp32.exe 2532 Ckeekp32.exe 2996 Cnfnlk32.exe 2996 Cnfnlk32.exe 2876 Dpicceon.exe 2876 Dpicceon.exe 836 Jomnpdjb.exe 836 Jomnpdjb.exe 2204 Kdhlmhgj.exe 2204 Kdhlmhgj.exe 2664 Fffckf32.exe 2664 Fffckf32.exe 1472 Gkehhlef.exe 1472 Gkehhlef.exe 580 Gfdcdi32.exe 580 Gfdcdi32.exe 1304 Henipenb.exe 1304 Henipenb.exe 860 Hnhjok32.exe 860 Hnhjok32.exe 2092 Inmdjjok.exe 2092 Inmdjjok.exe 296 Ipqmgbbf.exe 296 Ipqmgbbf.exe 680 Jfoookfn.exe 680 Jfoookfn.exe 980 Janijh32.exe 980 Janijh32.exe 1340 Kdaoacif.exe 1340 Kdaoacif.exe 1088 Kdckgc32.exe 1088 Kdckgc32.exe 628 Kdehmb32.exe 628 Kdehmb32.exe 2388 Kckeno32.exe 2388 Kckeno32.exe 2176 Khgnff32.exe 2176 Khgnff32.exe 868 Lkhfhaea.exe 868 Lkhfhaea.exe 1504 Ldqkqf32.exe 1504 Ldqkqf32.exe 2080 Lqjhkg32.exe 2080 Lqjhkg32.exe 2680 Lnnidk32.exe 2680 Lnnidk32.exe 936 Mdjnge32.exe 936 Mdjnge32.exe 2184 Mjgfol32.exe 2184 Mjgfol32.exe 2396 Mqckaf32.exe 2396 Mqckaf32.exe 2736 Naqkki32.exe 2736 Naqkki32.exe 2512 Ndadld32.exe 2512 Ndadld32.exe 2272 Nhombc32.exe 2272 Nhombc32.exe 2372 Ojpedn32.exe 2372 Ojpedn32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Fbhoceal.exe Flogfk32.exe File created C:\Windows\SysWOW64\Kdehmb32.exe Kdckgc32.exe File created C:\Windows\SysWOW64\Nfnoed32.dll Lnnidk32.exe File created C:\Windows\SysWOW64\Ikjaggfq.dll Edbmec32.exe File created C:\Windows\SysWOW64\Gljaehlb.exe Abhmnlhd.exe File opened for modification C:\Windows\SysWOW64\Jabfhq32.exe Jkhnlfkk.exe File opened for modification C:\Windows\SysWOW64\Popgal32.exe Pomjkl32.exe File created C:\Windows\SysWOW64\Flaclkgm.exe Fbhoceal.exe File created C:\Windows\SysWOW64\Jlkdbehn.dll Iiqpeajm.exe File opened for modification C:\Windows\SysWOW64\Iplpfi32.exe Ibhple32.exe File opened for modification C:\Windows\SysWOW64\Lcchfjmo.exe Linciami.exe File created C:\Windows\SysWOW64\Oillib32.exe Npcgpmmd.exe File created C:\Windows\SysWOW64\Enmgcc32.exe Dgcogiok.exe File opened for modification C:\Windows\SysWOW64\Kenbjd32.exe Kcmfblfg.exe File created C:\Windows\SysWOW64\Cmghoe32.dll Naqkki32.exe File opened for modification C:\Windows\SysWOW64\Agpdfmfc.exe Apflic32.exe File created C:\Windows\SysWOW64\Nefhec32.dll Qdolobjd.exe File created C:\Windows\SysWOW64\Ckonhddh.exe Cdeflj32.exe File opened for modification C:\Windows\SysWOW64\Hhljknlg.exe Gcoabgmp.exe File opened for modification C:\Windows\SysWOW64\Hnhjok32.exe Henipenb.exe File created C:\Windows\SysWOW64\Glpbfb32.dll Djiddp32.exe File created C:\Windows\SysWOW64\Ibelci32.dll Dgcogiok.exe File created C:\Windows\SysWOW64\Iiqpeajm.exe Iohklk32.exe File opened for modification C:\Windows\SysWOW64\Ibkacfok.exe Iiclkqhk.exe File created C:\Windows\SysWOW64\Henipenb.exe Gfdcdi32.exe File opened for modification C:\Windows\SysWOW64\Boboknnf.exe Bclnfm32.exe File created C:\Windows\SysWOW64\Ediaia32.dll Bhkcdd32.exe File created C:\Windows\SysWOW64\Mmnidoam.exe Megacbqk.exe File created C:\Windows\SysWOW64\Mkjepj32.dll Nbmjai32.exe File created C:\Windows\SysWOW64\Qplomoge.dll Phhkja32.exe File created C:\Windows\SysWOW64\Flogfk32.exe Fjmjocca.exe File created C:\Windows\SysWOW64\Bnampe32.dll Fbhoceal.exe File created C:\Windows\SysWOW64\Jbnnifmh.exe Iieipp32.exe File created C:\Windows\SysWOW64\Iiddoo32.exe Ibklbd32.exe File opened for modification C:\Windows\SysWOW64\Fjmjocca.exe Ebkpjaln.exe File opened for modification C:\Windows\SysWOW64\Joanbjkb.exe Jbnnifmh.exe File created C:\Windows\SysWOW64\Nenccdmn.exe Ndmgkl32.exe File created C:\Windows\SysWOW64\Iiclkqhk.exe Icfdbjjc.exe File created C:\Windows\SysWOW64\Coapim32.dll Dpicceon.exe File created C:\Windows\SysWOW64\Bndhmj32.dll Gdjdak32.exe File created C:\Windows\SysWOW64\Ibkacfok.exe Iiclkqhk.exe File created C:\Windows\SysWOW64\Dpadlqfi.dll Ejoagm32.exe File opened for modification C:\Windows\SysWOW64\Mmnidoam.exe Megacbqk.exe File created C:\Windows\SysWOW64\Pokmlj32.dll Idojlngn.exe File created C:\Windows\SysWOW64\Jccclmna.exe Jgmbgl32.exe File opened for modification C:\Windows\SysWOW64\Kbbcch32.exe Kenbjd32.exe File created C:\Windows\SysWOW64\Mdppqdfl.dll Cnfnlk32.exe File created C:\Windows\SysWOW64\Naqkki32.exe Mqckaf32.exe File created C:\Windows\SysWOW64\Bjcimhab.exe Agpdfmfc.exe File created C:\Windows\SysWOW64\Abhmnlhd.exe Imppciin.exe File created C:\Windows\SysWOW64\Ibdhgpcn.dll Pomjkl32.exe File created C:\Windows\SysWOW64\Cnmjdpcl.exe Ckonhddh.exe File created C:\Windows\SysWOW64\Jcojdojo.dll Deebknpg.exe File created C:\Windows\SysWOW64\Gcmdbl32.dll Ldqkqf32.exe File created C:\Windows\SysWOW64\Mafpqbfi.dll Popgal32.exe File created C:\Windows\SysWOW64\Feihep32.exe Flaclkgm.exe File created C:\Windows\SysWOW64\Paojjk32.dll Pljddaed.exe File opened for modification C:\Windows\SysWOW64\Flaclkgm.exe Fbhoceal.exe File opened for modification C:\Windows\SysWOW64\Idojlngn.exe Haihoc32.exe File created C:\Windows\SysWOW64\Ehiojb32.exe Dggbeb32.exe File opened for modification C:\Windows\SysWOW64\Pcfifk32.exe Pllajaca.exe File opened for modification C:\Windows\SysWOW64\Djdkiqiq.exe Dcjcmg32.exe File created C:\Windows\SysWOW64\Lnoagg32.dll Ipqmgbbf.exe File created C:\Windows\SysWOW64\Kdckgc32.exe Kdaoacif.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kdhlmhgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dfcigk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Joanbjkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klgnci32.dll" Foqgqppk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nefhec32.dll" Qdolobjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dmedklfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mflhmocg.dll" Ebkpjaln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Flogfk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kcmfblfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jomnpdjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Khgnff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Naqkki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Boekqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikjaggfq.dll" Edbmec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Holcka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qcfkmb32.dll" Nenccdmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlnjngmi.dll" Lkhfhaea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ndadld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hhbkngpl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kdehmb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mdjnge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bhkcdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hdneohbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kopclo32.dll" Eempcfbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qplomoge.dll" Phhkja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Figqkodd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gcoabgmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jkjjaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ejdghdll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jccclmna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Apflic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Decgpadp.dll" Ggjhfpqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jabfhq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bclnfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mmnidoam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Flaclkgm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Feihep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ndadld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Boekqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgaonhkj.dll" Cmdonf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Noqgaa32.dll" Fffckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pllajaca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glqoagqf.dll" Iohklk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nigbncgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oillib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pokmlj32.dll" Idojlngn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Icfdbjjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lqjhkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cgppep32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cikocggb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lmefnqih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iipkcpke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Liiljpjm.dll" Ibmigdnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ealcpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmphbakd.dll" Gnpleaak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Edbmec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ndmgkl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kigbdcfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Abhmnlhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Djiddp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljbpmlki.dll" Ealcpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chlhom32.dll" Hohomhaa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gfdcdi32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2268 2352 NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe 27 PID 2352 wrote to memory of 2268 2352 NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe 27 PID 2352 wrote to memory of 2268 2352 NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe 27 PID 2352 wrote to memory of 2268 2352 NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe 27 PID 2268 wrote to memory of 2532 2268 Cbhcankf.exe 28 PID 2268 wrote to memory of 2532 2268 Cbhcankf.exe 28 PID 2268 wrote to memory of 2532 2268 Cbhcankf.exe 28 PID 2268 wrote to memory of 2532 2268 Cbhcankf.exe 28 PID 2532 wrote to memory of 2996 2532 Ckeekp32.exe 29 PID 2532 wrote to memory of 2996 2532 Ckeekp32.exe 29 PID 2532 wrote to memory of 2996 2532 Ckeekp32.exe 29 PID 2532 wrote to memory of 2996 2532 Ckeekp32.exe 29 PID 2996 wrote to memory of 2876 2996 Cnfnlk32.exe 30 PID 2996 wrote to memory of 2876 2996 Cnfnlk32.exe 30 PID 2996 wrote to memory of 2876 2996 Cnfnlk32.exe 30 PID 2996 wrote to memory of 2876 2996 Cnfnlk32.exe 30 PID 2876 wrote to memory of 836 2876 Dpicceon.exe 31 PID 2876 wrote to memory of 836 2876 Dpicceon.exe 31 PID 2876 wrote to memory of 836 2876 Dpicceon.exe 31 PID 2876 wrote to memory of 836 2876 Dpicceon.exe 31 PID 836 wrote to memory of 2204 836 Jomnpdjb.exe 32 PID 836 wrote to memory of 2204 836 Jomnpdjb.exe 32 PID 836 wrote to memory of 2204 836 Jomnpdjb.exe 32 PID 836 wrote to memory of 2204 836 Jomnpdjb.exe 32 PID 2204 wrote to memory of 2664 2204 Kdhlmhgj.exe 33 PID 2204 wrote to memory of 2664 2204 Kdhlmhgj.exe 33 PID 2204 wrote to memory of 2664 2204 Kdhlmhgj.exe 33 PID 2204 wrote to memory of 2664 2204 Kdhlmhgj.exe 33 PID 2664 wrote to memory of 1472 2664 Fffckf32.exe 34 PID 2664 wrote to memory of 1472 2664 Fffckf32.exe 34 PID 2664 wrote to memory of 1472 2664 Fffckf32.exe 34 PID 2664 wrote to memory of 1472 2664 Fffckf32.exe 34 PID 1472 wrote to memory of 580 1472 Gkehhlef.exe 35 PID 1472 wrote to memory of 580 1472 Gkehhlef.exe 35 PID 1472 wrote to memory of 580 1472 Gkehhlef.exe 35 PID 1472 wrote to memory of 580 1472 Gkehhlef.exe 35 PID 580 wrote to memory of 1304 580 Gfdcdi32.exe 36 PID 580 wrote to memory of 1304 580 Gfdcdi32.exe 36 PID 580 wrote to memory of 1304 580 Gfdcdi32.exe 36 PID 580 wrote to memory of 1304 580 Gfdcdi32.exe 36 PID 1304 wrote to memory of 860 1304 Henipenb.exe 37 PID 1304 wrote to memory of 860 1304 Henipenb.exe 37 PID 1304 wrote to memory of 860 1304 Henipenb.exe 37 PID 1304 wrote to memory of 860 1304 Henipenb.exe 37 PID 860 wrote to memory of 2092 860 Hnhjok32.exe 38 PID 860 wrote to memory of 2092 860 Hnhjok32.exe 38 PID 860 wrote to memory of 2092 860 Hnhjok32.exe 38 PID 860 wrote to memory of 2092 860 Hnhjok32.exe 38 PID 2092 wrote to memory of 296 2092 Inmdjjok.exe 39 PID 2092 wrote to memory of 296 2092 Inmdjjok.exe 39 PID 2092 wrote to memory of 296 2092 Inmdjjok.exe 39 PID 2092 wrote to memory of 296 2092 Inmdjjok.exe 39 PID 296 wrote to memory of 680 296 Ipqmgbbf.exe 40 PID 296 wrote to memory of 680 296 Ipqmgbbf.exe 40 PID 296 wrote to memory of 680 296 Ipqmgbbf.exe 40 PID 296 wrote to memory of 680 296 Ipqmgbbf.exe 40 PID 680 wrote to memory of 980 680 Jfoookfn.exe 41 PID 680 wrote to memory of 980 680 Jfoookfn.exe 41 PID 680 wrote to memory of 980 680 Jfoookfn.exe 41 PID 680 wrote to memory of 980 680 Jfoookfn.exe 41 PID 980 wrote to memory of 1340 980 Janijh32.exe 42 PID 980 wrote to memory of 1340 980 Janijh32.exe 42 PID 980 wrote to memory of 1340 980 Janijh32.exe 42 PID 980 wrote to memory of 1340 980 Janijh32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.9bcac77fdeccc77897ee87e53c833e08_JC.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\Cbhcankf.exeC:\Windows\system32\Cbhcankf.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\Ckeekp32.exeC:\Windows\system32\Ckeekp32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\Cnfnlk32.exeC:\Windows\system32\Cnfnlk32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Dpicceon.exeC:\Windows\system32\Dpicceon.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\Jomnpdjb.exeC:\Windows\system32\Jomnpdjb.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\Kdhlmhgj.exeC:\Windows\system32\Kdhlmhgj.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\Fffckf32.exeC:\Windows\system32\Fffckf32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Gkehhlef.exeC:\Windows\system32\Gkehhlef.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\Gfdcdi32.exeC:\Windows\system32\Gfdcdi32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\Henipenb.exeC:\Windows\system32\Henipenb.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\Hnhjok32.exeC:\Windows\system32\Hnhjok32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\Inmdjjok.exeC:\Windows\system32\Inmdjjok.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Ipqmgbbf.exeC:\Windows\system32\Ipqmgbbf.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\Jfoookfn.exeC:\Windows\system32\Jfoookfn.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\Janijh32.exeC:\Windows\system32\Janijh32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\Kdaoacif.exeC:\Windows\system32\Kdaoacif.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1340 -
C:\Windows\SysWOW64\Kdckgc32.exeC:\Windows\system32\Kdckgc32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1088 -
C:\Windows\SysWOW64\Kdehmb32.exeC:\Windows\system32\Kdehmb32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:628 -
C:\Windows\SysWOW64\Kckeno32.exeC:\Windows\system32\Kckeno32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2388 -
C:\Windows\SysWOW64\Khgnff32.exeC:\Windows\system32\Khgnff32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2176 -
C:\Windows\SysWOW64\Lkhfhaea.exeC:\Windows\system32\Lkhfhaea.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:868 -
C:\Windows\SysWOW64\Ldqkqf32.exeC:\Windows\system32\Ldqkqf32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1504 -
C:\Windows\SysWOW64\Lqjhkg32.exeC:\Windows\system32\Lqjhkg32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2080 -
C:\Windows\SysWOW64\Lnnidk32.exeC:\Windows\system32\Lnnidk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\Mdjnge32.exeC:\Windows\system32\Mdjnge32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:936 -
C:\Windows\SysWOW64\Mjgfol32.exeC:\Windows\system32\Mjgfol32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2184 -
C:\Windows\SysWOW64\Mqckaf32.exeC:\Windows\system32\Mqckaf32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2396 -
C:\Windows\SysWOW64\Naqkki32.exeC:\Windows\system32\Naqkki32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2736 -
C:\Windows\SysWOW64\Ndadld32.exeC:\Windows\system32\Ndadld32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2512 -
C:\Windows\SysWOW64\Nhombc32.exeC:\Windows\system32\Nhombc32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2272 -
C:\Windows\SysWOW64\Ojpedn32.exeC:\Windows\system32\Ojpedn32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2372 -
C:\Windows\SysWOW64\Aobblkkk.exeC:\Windows\system32\Aobblkkk.exe33⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\Aaaohfjo.exeC:\Windows\system32\Aaaohfjo.exe34⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Agngqmhf.exeC:\Windows\system32\Agngqmhf.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\Apflic32.exeC:\Windows\system32\Apflic32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1680 -
C:\Windows\SysWOW64\Agpdfmfc.exeC:\Windows\system32\Agpdfmfc.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:600 -
C:\Windows\SysWOW64\Bjcimhab.exeC:\Windows\system32\Bjcimhab.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\Bhfjid32.exeC:\Windows\system32\Bhfjid32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1104 -
C:\Windows\SysWOW64\Bclnfm32.exeC:\Windows\system32\Bclnfm32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1396 -
C:\Windows\SysWOW64\Boboknnf.exeC:\Windows\system32\Boboknnf.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\Bhkcdd32.exeC:\Windows\system32\Bhkcdd32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1328 -
C:\Windows\SysWOW64\Boekqn32.exeC:\Windows\system32\Boekqn32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:2364 -
C:\Windows\SysWOW64\Cgppep32.exeC:\Windows\system32\Cgppep32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:2276 -
C:\Windows\SysWOW64\Cggffocg.exeC:\Windows\system32\Cggffocg.exe45⤵
- Executes dropped EXE
PID:312 -
C:\Windows\SysWOW64\Cmdonf32.exeC:\Windows\system32\Cmdonf32.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:1652 -
C:\Windows\SysWOW64\Cikocggb.exeC:\Windows\system32\Cikocggb.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:884 -
C:\Windows\SysWOW64\Dbcdlm32.exeC:\Windows\system32\Dbcdlm32.exe48⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\Dfcigk32.exeC:\Windows\system32\Dfcigk32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1944 -
C:\Windows\SysWOW64\Dnnnlmob.exeC:\Windows\system32\Dnnnlmob.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Dggbeb32.exeC:\Windows\system32\Dggbeb32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2096 -
C:\Windows\SysWOW64\Ehiojb32.exeC:\Windows\system32\Ehiojb32.exe52⤵
- Executes dropped EXE
PID:2572 -
C:\Windows\SysWOW64\Eempcfbi.exeC:\Windows\system32\Eempcfbi.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\Edbmec32.exeC:\Windows\system32\Edbmec32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2720 -
C:\Windows\SysWOW64\Ejleamon.exeC:\Windows\system32\Ejleamon.exe55⤵
- Executes dropped EXE
PID:800 -
C:\Windows\SysWOW64\Ejoagm32.exeC:\Windows\system32\Ejoagm32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1596 -
C:\Windows\SysWOW64\Elpnoebj.exeC:\Windows\system32\Elpnoebj.exe57⤵
- Executes dropped EXE
PID:852 -
C:\Windows\SysWOW64\Foqgqppk.exeC:\Windows\system32\Foqgqppk.exe58⤵
- Executes dropped EXE
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\Ggeoka32.exeC:\Windows\system32\Ggeoka32.exe59⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\Gkcgaoka.exeC:\Windows\system32\Gkcgaoka.exe60⤵
- Executes dropped EXE
PID:808 -
C:\Windows\SysWOW64\Ggjhfpqf.exeC:\Windows\system32\Ggjhfpqf.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Glfqngom.exeC:\Windows\system32\Glfqngom.exe62⤵
- Executes dropped EXE
PID:524 -
C:\Windows\SysWOW64\Ggldlpoc.exeC:\Windows\system32\Ggldlpoc.exe63⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\Gjmnmk32.exeC:\Windows\system32\Gjmnmk32.exe64⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\Hahbam32.exeC:\Windows\system32\Hahbam32.exe65⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Hhbkngpl.exeC:\Windows\system32\Hhbkngpl.exe66⤵
- Modifies registry class
PID:1588 -
C:\Windows\SysWOW64\Holcka32.exeC:\Windows\system32\Holcka32.exe67⤵
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\Honpqaff.exeC:\Windows\system32\Honpqaff.exe68⤵PID:2232
-
C:\Windows\SysWOW64\Hdkhihdn.exeC:\Windows\system32\Hdkhihdn.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1188 -
C:\Windows\SysWOW64\Hdneohbk.exeC:\Windows\system32\Hdneohbk.exe70⤵
- Modifies registry class
PID:1432 -
C:\Windows\SysWOW64\Iolojejd.exeC:\Windows\system32\Iolojejd.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1740 -
C:\Windows\SysWOW64\Ibjkfpih.exeC:\Windows\system32\Ibjkfpih.exe72⤵PID:1716
-
C:\Windows\SysWOW64\Imppciin.exeC:\Windows\system32\Imppciin.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1512 -
C:\Windows\SysWOW64\Abhmnlhd.exeC:\Windows\system32\Abhmnlhd.exe74⤵
- Drops file in System32 directory
- Modifies registry class
PID:2964 -
C:\Windows\SysWOW64\Gljaehlb.exeC:\Windows\system32\Gljaehlb.exe75⤵PID:1100
-
C:\Windows\SysWOW64\Iipkcpke.exeC:\Windows\system32\Iipkcpke.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:880 -
C:\Windows\SysWOW64\Ibhple32.exeC:\Windows\system32\Ibhple32.exe77⤵
- Drops file in System32 directory
PID:1876 -
C:\Windows\SysWOW64\Iplpfi32.exeC:\Windows\system32\Iplpfi32.exe78⤵PID:2068
-
C:\Windows\SysWOW64\Ibklbd32.exeC:\Windows\system32\Ibklbd32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1364 -
C:\Windows\SysWOW64\Iiddoo32.exeC:\Windows\system32\Iiddoo32.exe80⤵PID:2744
-
C:\Windows\SysWOW64\Ibmigdnp.exeC:\Windows\system32\Ibmigdnp.exe81⤵
- Modifies registry class
PID:1928 -
C:\Windows\SysWOW64\Iekecpmd.exeC:\Windows\system32\Iekecpmd.exe82⤵PID:2668
-
C:\Windows\SysWOW64\Jkhnlfkk.exeC:\Windows\system32\Jkhnlfkk.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1572 -
C:\Windows\SysWOW64\Jabfhq32.exeC:\Windows\system32\Jabfhq32.exe84⤵
- Modifies registry class
PID:2588 -
C:\Windows\SysWOW64\Jkjjaf32.exeC:\Windows\system32\Jkjjaf32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2448 -
C:\Windows\SysWOW64\Lmefnqih.exeC:\Windows\system32\Lmefnqih.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1640 -
C:\Windows\SysWOW64\Lfmjgf32.exeC:\Windows\system32\Lfmjgf32.exe87⤵PID:1872
-
C:\Windows\SysWOW64\Loeopl32.exeC:\Windows\system32\Loeopl32.exe88⤵PID:1020
-
C:\Windows\SysWOW64\Linciami.exeC:\Windows\system32\Linciami.exe89⤵
- Drops file in System32 directory
PID:564 -
C:\Windows\SysWOW64\Lcchfjmo.exeC:\Windows\system32\Lcchfjmo.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1480 -
C:\Windows\SysWOW64\Lkoljl32.exeC:\Windows\system32\Lkoljl32.exe91⤵PID:320
-
C:\Windows\SysWOW64\Lcfdlj32.exeC:\Windows\system32\Lcfdlj32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2940 -
C:\Windows\SysWOW64\Megacbqk.exeC:\Windows\system32\Megacbqk.exe93⤵
- Drops file in System32 directory
PID:1912 -
C:\Windows\SysWOW64\Mmnidoam.exeC:\Windows\system32\Mmnidoam.exe94⤵
- Modifies registry class
PID:2072 -
C:\Windows\SysWOW64\Nbmjai32.exeC:\Windows\system32\Nbmjai32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\Nigbncgj.exeC:\Windows\system32\Nigbncgj.exe96⤵
- Modifies registry class
PID:1304 -
C:\Windows\SysWOW64\Ndmgkl32.exeC:\Windows\system32\Ndmgkl32.exe97⤵
- Drops file in System32 directory
- Modifies registry class
PID:1624 -
C:\Windows\SysWOW64\Nenccdmn.exeC:\Windows\system32\Nenccdmn.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2748 -
C:\Windows\SysWOW64\Npcgpmmd.exeC:\Windows\system32\Npcgpmmd.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:936 -
C:\Windows\SysWOW64\Oillib32.exeC:\Windows\system32\Oillib32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1728 -
C:\Windows\SysWOW64\Pljddaed.exeC:\Windows\system32\Pljddaed.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\Pcdmak32.exeC:\Windows\system32\Pcdmak32.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1000 -
C:\Windows\SysWOW64\Pllajaca.exeC:\Windows\system32\Pllajaca.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2508 -
C:\Windows\SysWOW64\Pcfifk32.exeC:\Windows\system32\Pcfifk32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1556 -
C:\Windows\SysWOW64\Pomjkl32.exeC:\Windows\system32\Pomjkl32.exe105⤵
- Drops file in System32 directory
PID:2976 -
C:\Windows\SysWOW64\Popgal32.exeC:\Windows\system32\Popgal32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2720 -
C:\Windows\SysWOW64\Phhkja32.exeC:\Windows\system32\Phhkja32.exe107⤵
- Drops file in System32 directory
- Modifies registry class
PID:2620 -
C:\Windows\SysWOW64\Qappbgkq.exeC:\Windows\system32\Qappbgkq.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1476 -
C:\Windows\SysWOW64\Qdolobjd.exeC:\Windows\system32\Qdolobjd.exe109⤵
- Drops file in System32 directory
- Modifies registry class
PID:1960 -
C:\Windows\SysWOW64\Bbeemi32.exeC:\Windows\system32\Bbeemi32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2368 -
C:\Windows\SysWOW64\Cdeflj32.exeC:\Windows\system32\Cdeflj32.exe111⤵
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\Ckonhddh.exeC:\Windows\system32\Ckonhddh.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\Cnmjdpcl.exeC:\Windows\system32\Cnmjdpcl.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2116 -
C:\Windows\SysWOW64\Dcjcmg32.exeC:\Windows\system32\Dcjcmg32.exe114⤵
- Drops file in System32 directory
PID:2188 -
C:\Windows\SysWOW64\Djdkiqiq.exeC:\Windows\system32\Djdkiqiq.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1576 -
C:\Windows\SysWOW64\Dghlcehj.exeC:\Windows\system32\Dghlcehj.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2524 -
C:\Windows\SysWOW64\Djfhoqgn.exeC:\Windows\system32\Djfhoqgn.exe117⤵PID:3000
-
C:\Windows\SysWOW64\Dmedklfa.exeC:\Windows\system32\Dmedklfa.exe118⤵
- Modifies registry class
PID:2352 -
C:\Windows\SysWOW64\Djiddp32.exeC:\Windows\system32\Djiddp32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2556 -
C:\Windows\SysWOW64\Deebknpg.exeC:\Windows\system32\Deebknpg.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1804 -
C:\Windows\SysWOW64\Dgcogiok.exeC:\Windows\system32\Dgcogiok.exe121⤵
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\Enmgcc32.exeC:\Windows\system32\Enmgcc32.exe122⤵PID:836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-