Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 15:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.NEAS200de4d159112e94dbe8941bc7d5d002exe_JC.exe
Resource
win7-20230831-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.NEAS200de4d159112e94dbe8941bc7d5d002exe_JC.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
NEAS.NEAS200de4d159112e94dbe8941bc7d5d002exe_JC.exe
-
Size
197KB
-
MD5
200de4d159112e94dbe8941bc7d5d002
-
SHA1
e82b355bb7e91de3e3880fc4d49363a07f069962
-
SHA256
44e151c34763e552722ca6043640437fcd61c5b25c282ecd933e79fe72b56c40
-
SHA512
625ffb5f917ad87a7805447738172d3c243f203a4fd1d2fd53148065a69a0467707dfa7a325aa3be550d2f1cc4b7eeb522f324f3440685351f8136762aa1e477
-
SSDEEP
6144:zb/kWqP4yg4fQkjxqvak+PH/RARMHGb3fJt4X:P/kWff4IyxqCfRARR6
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ocldhqgb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nophfa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pacfdila.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eplgod32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epndddnk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Injcginc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knmicfnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kiejfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Neafdjak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plbmhadm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfofjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oinkmdml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Haefqjeo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Halmaiog.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdnipbbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Poomom32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aadokg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efepln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbcfan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pacfdila.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmbdnhme.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emgnje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfiiggpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfnbbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knmicfnn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdgapp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oocmcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihpgda32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikcmklih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jicdlc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qlajkm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdfhil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gdfhil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmhkoaco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hknkiokp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phnoac32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pimkkfka.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjhaml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jokpcmmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nklbfaae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akffjkme.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djcoko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmfplibd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhaope32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgecpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fibocnnj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkaimj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajbmmcii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oinkmdml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plcmiofg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipdfheal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjhccf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oemephgn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pojccmii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmjlpnpb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmblhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkeajn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idbonc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pamikh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bcfabgel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmmqhl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpcmfchg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbinlp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecjpfp32.exe -
Executes dropped EXE 64 IoCs
pid Process 5092 Gmfplibd.exe 2668 Gbeejp32.exe 2092 Holfoqcm.exe 3224 Hpchib32.exe 4852 Mmmqhl32.exe 3136 Noaeqjpe.exe 3760 Nfnjbdep.exe 1240 Gebimmco.exe 3844 Hpcmfchg.exe 4352 Hohjgpmo.exe 2524 Hhaope32.exe 3008 Hhckeeam.exe 1136 Jokpcmmj.exe 1356 Jicdlc32.exe 2792 Jbghpc32.exe 1000 Kbinlp32.exe 2852 Kcikfcab.exe 3772 Kmaooihb.exe 2836 Lbqdmodg.exe 1464 Mfjlolpp.exe 3088 Mfofjk32.exe 4336 Nlphmafm.exe 796 Nidhffef.exe 1336 Npqmipjq.exe 956 Obafjk32.exe 3796 Oinkmdml.exe 3948 Obfpejcl.exe 4324 Odhiemil.exe 3364 Plcmiofg.exe 1964 Ppccemjk.exe 1368 Pkkdhe32.exe 4960 Qipqibmf.exe 3096 Qlajkm32.exe 3916 Akbjidbf.exe 4668 Cklffq32.exe 4172 Cgecpa32.exe 3936 Cmblhh32.exe 3216 Dqdnjfpc.exe 4052 Dklomnmf.exe 3120 Ecjpfp32.exe 1268 Emgnje32.exe 3952 Febogbhg.exe 4508 Goipae32.exe 332 Gdfhil32.exe 1184 Mfiedfmd.exe 2844 Cfiiggpg.exe 372 Dcmjpl32.exe 1148 Djgbmffn.exe 1796 Dodjemee.exe 2832 Dfnbbg32.exe 1260 Dmhkoaco.exe 3836 Ibojgikg.exe 3356 Ocldhqgb.exe 3612 Oiglen32.exe 4872 Pplcnf32.exe 2260 Pckpja32.exe 2768 Ppopcf32.exe 3144 Pflikm32.exe 4144 Fibocnnj.exe 4548 Gighom32.exe 4356 Ghhhmebd.exe 3756 Haefqjeo.exe 1124 Hhoomd32.exe 4052 Hknkiokp.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Pqdako32.dll Lihpdj32.exe File created C:\Windows\SysWOW64\Bcfabgel.exe Bhqmdoef.exe File created C:\Windows\SysWOW64\Mglkge32.dll Fjhaml32.exe File created C:\Windows\SysWOW64\Kcikfcab.exe Kbinlp32.exe File created C:\Windows\SysWOW64\Ghhhmebd.exe Gighom32.exe File created C:\Windows\SysWOW64\Lhfinh32.dll Kjffngap.exe File created C:\Windows\SysWOW64\Egflpjbk.dll Macdgn32.exe File created C:\Windows\SysWOW64\Oocmcn32.exe Oaomij32.exe File created C:\Windows\SysWOW64\Plbmhadm.exe Pamikh32.exe File created C:\Windows\SysWOW64\Npqmipjq.exe Nidhffef.exe File created C:\Windows\SysWOW64\Gdfhil32.exe Goipae32.exe File created C:\Windows\SysWOW64\Bckkpd32.dll Jokpcmmj.exe File opened for modification C:\Windows\SysWOW64\Dmhkoaco.exe Dfnbbg32.exe File created C:\Windows\SysWOW64\Iabhnedc.dll Mjkipdpg.exe File opened for modification C:\Windows\SysWOW64\Qkjgomgb.exe Qjijgead.exe File created C:\Windows\SysWOW64\Ajkgmd32.exe Aadokg32.exe File created C:\Windows\SysWOW64\Cklffq32.exe Akbjidbf.exe File created C:\Windows\SysWOW64\Jpcgoa32.dll Qaofphbd.exe File created C:\Windows\SysWOW64\Gihqbc32.dll Bcfabgel.exe File opened for modification C:\Windows\SysWOW64\Fjhaml32.exe Fdnipbbo.exe File created C:\Windows\SysWOW64\Kbinlp32.exe Jbghpc32.exe File created C:\Windows\SysWOW64\Gighom32.exe Fibocnnj.exe File created C:\Windows\SysWOW64\Jqihjbod.exe Jkejalge.exe File opened for modification C:\Windows\SysWOW64\Pacfdila.exe Okjnhpee.exe File opened for modification C:\Windows\SysWOW64\Pahppihl.exe Pojccmii.exe File created C:\Windows\SysWOW64\Pgmnogpn.dll Akffjkme.exe File opened for modification C:\Windows\SysWOW64\Fbcfan32.exe Fmfnig32.exe File opened for modification C:\Windows\SysWOW64\Qlajkm32.exe Qipqibmf.exe File opened for modification C:\Windows\SysWOW64\Hkeajn32.exe Halmaiog.exe File created C:\Windows\SysWOW64\Pbdcac32.dll Lelcbmcc.exe File opened for modification C:\Windows\SysWOW64\Oaomij32.exe Ooqqmoac.exe File opened for modification C:\Windows\SysWOW64\Poomom32.exe Pibdff32.exe File created C:\Windows\SysWOW64\Lqkpiiof.dll Fbcfan32.exe File created C:\Windows\SysWOW64\Idmjoidf.dll Pkkdhe32.exe File created C:\Windows\SysWOW64\Kbikghkc.dll Kdgapp32.exe File opened for modification C:\Windows\SysWOW64\Kbkaiddd.exe Kkaimj32.exe File created C:\Windows\SysWOW64\Kjffngap.exe Kiejfo32.exe File created C:\Windows\SysWOW64\Lelcbmcc.exe Kaehepeg.exe File opened for modification C:\Windows\SysWOW64\Holfoqcm.exe Gbeejp32.exe File created C:\Windows\SysWOW64\Ngkpgkbd.dll Mmmqhl32.exe File created C:\Windows\SysWOW64\Ffdcne32.dll Nfnjbdep.exe File created C:\Windows\SysWOW64\Plphjbim.dll Hohjgpmo.exe File opened for modification C:\Windows\SysWOW64\Npqmipjq.exe Nidhffef.exe File opened for modification C:\Windows\SysWOW64\Ijadljdg.exe Ihpgda32.exe File opened for modification C:\Windows\SysWOW64\Mmmqhl32.exe Hpchib32.exe File created C:\Windows\SysWOW64\Gebimmco.exe Nfnjbdep.exe File created C:\Windows\SysWOW64\Pckpja32.exe Pplcnf32.exe File created C:\Windows\SysWOW64\Jfnnap32.dll Ijadljdg.exe File created C:\Windows\SysWOW64\Nklimgbb.dll Ihpgda32.exe File created C:\Windows\SysWOW64\Egdnmbif.dll Oemephgn.exe File created C:\Windows\SysWOW64\Hcgmmogb.dll Efhlan32.exe File opened for modification C:\Windows\SysWOW64\Mfofjk32.exe Mfjlolpp.exe File created C:\Windows\SysWOW64\Igioikpj.dll Cgecpa32.exe File opened for modification C:\Windows\SysWOW64\Dfnbbg32.exe Dodjemee.exe File created C:\Windows\SysWOW64\Jijebjmm.dll Pamikh32.exe File created C:\Windows\SysWOW64\Mlnpjf32.dll Dldlbgbb.exe File created C:\Windows\SysWOW64\Dqkmkb32.exe Qpahghbg.exe File created C:\Windows\SysWOW64\Gbeejp32.exe Gmfplibd.exe File opened for modification C:\Windows\SysWOW64\Hpchib32.exe Holfoqcm.exe File created C:\Windows\SysWOW64\Jbghpc32.exe Jicdlc32.exe File created C:\Windows\SysWOW64\Hknkiokp.exe Hhoomd32.exe File created C:\Windows\SysWOW64\Lcaiacdi.dll Mhoiih32.exe File created C:\Windows\SysWOW64\Eplgod32.exe Dflmep32.exe File created C:\Windows\SysWOW64\Dmhkoaco.exe Dfnbbg32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcmflj32.dll" Hhoomd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjhccf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caidhlcb.dll" Pojccmii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pamikh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkgqdb32.dll" Acclejeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppihoe32.dll" Gmfplibd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cgecpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ikijenab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djqbeonf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lniphngj.dll" Nidhffef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pkkdhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnemabne.dll" Dpknhfoq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pckpja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkhcpkkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akbjidbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhoomd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkeajn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhlpkkmk.dll" Pibdff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akcjel32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bcahgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Holfoqcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lbqdmodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eadgok32.dll" Dcigneeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oinkmdml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qlajkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njghkb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbcfan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abohmm32.dll" Noaeqjpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpcmfchg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pojccmii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgfidb32.dll" Cklffq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Micdgi32.dll" Cmblhh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qocfjlan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkhcpkkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oiglen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nihiiimi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlflog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nophfa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pamikh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijadljdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pifodifq.dll" Ikcmklih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pojccmii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmfnig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqdako32.dll" Lihpdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbfiklno.dll" Oiglen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmoefdap.dll" Halmaiog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihpgda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjhccf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbnpmp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oemephgn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pibdff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfnbbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fibocnnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajbmmcii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Injcginc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qllohhlh.dll" Poomom32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lelcbmcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibogbimm.dll" Emphhhoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dklomnmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkaimj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Olnkfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djcoko32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkhpmigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kaehepeg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 5092 4144 NEAS.NEAS200de4d159112e94dbe8941bc7d5d002exe_JC.exe 86 PID 4144 wrote to memory of 5092 4144 NEAS.NEAS200de4d159112e94dbe8941bc7d5d002exe_JC.exe 86 PID 4144 wrote to memory of 5092 4144 NEAS.NEAS200de4d159112e94dbe8941bc7d5d002exe_JC.exe 86 PID 5092 wrote to memory of 2668 5092 Gmfplibd.exe 87 PID 5092 wrote to memory of 2668 5092 Gmfplibd.exe 87 PID 5092 wrote to memory of 2668 5092 Gmfplibd.exe 87 PID 2668 wrote to memory of 2092 2668 Gbeejp32.exe 88 PID 2668 wrote to memory of 2092 2668 Gbeejp32.exe 88 PID 2668 wrote to memory of 2092 2668 Gbeejp32.exe 88 PID 2092 wrote to memory of 3224 2092 Holfoqcm.exe 89 PID 2092 wrote to memory of 3224 2092 Holfoqcm.exe 89 PID 2092 wrote to memory of 3224 2092 Holfoqcm.exe 89 PID 3224 wrote to memory of 4852 3224 Hpchib32.exe 90 PID 3224 wrote to memory of 4852 3224 Hpchib32.exe 90 PID 3224 wrote to memory of 4852 3224 Hpchib32.exe 90 PID 4852 wrote to memory of 3136 4852 Mmmqhl32.exe 91 PID 4852 wrote to memory of 3136 4852 Mmmqhl32.exe 91 PID 4852 wrote to memory of 3136 4852 Mmmqhl32.exe 91 PID 3136 wrote to memory of 3760 3136 Noaeqjpe.exe 93 PID 3136 wrote to memory of 3760 3136 Noaeqjpe.exe 93 PID 3136 wrote to memory of 3760 3136 Noaeqjpe.exe 93 PID 3760 wrote to memory of 1240 3760 Nfnjbdep.exe 94 PID 3760 wrote to memory of 1240 3760 Nfnjbdep.exe 94 PID 3760 wrote to memory of 1240 3760 Nfnjbdep.exe 94 PID 1240 wrote to memory of 3844 1240 Gebimmco.exe 95 PID 1240 wrote to memory of 3844 1240 Gebimmco.exe 95 PID 1240 wrote to memory of 3844 1240 Gebimmco.exe 95 PID 3844 wrote to memory of 4352 3844 Hpcmfchg.exe 97 PID 3844 wrote to memory of 4352 3844 Hpcmfchg.exe 97 PID 3844 wrote to memory of 4352 3844 Hpcmfchg.exe 97 PID 4352 wrote to memory of 2524 4352 Hohjgpmo.exe 98 PID 4352 wrote to memory of 2524 4352 Hohjgpmo.exe 98 PID 4352 wrote to memory of 2524 4352 Hohjgpmo.exe 98 PID 2524 wrote to memory of 3008 2524 Hhaope32.exe 99 PID 2524 wrote to memory of 3008 2524 Hhaope32.exe 99 PID 2524 wrote to memory of 3008 2524 Hhaope32.exe 99 PID 3008 wrote to memory of 1136 3008 Hhckeeam.exe 100 PID 3008 wrote to memory of 1136 3008 Hhckeeam.exe 100 PID 3008 wrote to memory of 1136 3008 Hhckeeam.exe 100 PID 1136 wrote to memory of 1356 1136 Jokpcmmj.exe 101 PID 1136 wrote to memory of 1356 1136 Jokpcmmj.exe 101 PID 1136 wrote to memory of 1356 1136 Jokpcmmj.exe 101 PID 1356 wrote to memory of 2792 1356 Jicdlc32.exe 103 PID 1356 wrote to memory of 2792 1356 Jicdlc32.exe 103 PID 1356 wrote to memory of 2792 1356 Jicdlc32.exe 103 PID 2792 wrote to memory of 1000 2792 Jbghpc32.exe 104 PID 2792 wrote to memory of 1000 2792 Jbghpc32.exe 104 PID 2792 wrote to memory of 1000 2792 Jbghpc32.exe 104 PID 1000 wrote to memory of 2852 1000 Kbinlp32.exe 105 PID 1000 wrote to memory of 2852 1000 Kbinlp32.exe 105 PID 1000 wrote to memory of 2852 1000 Kbinlp32.exe 105 PID 2852 wrote to memory of 3772 2852 Kcikfcab.exe 106 PID 2852 wrote to memory of 3772 2852 Kcikfcab.exe 106 PID 2852 wrote to memory of 3772 2852 Kcikfcab.exe 106 PID 3144 wrote to memory of 2836 3144 Lihpdj32.exe 108 PID 3144 wrote to memory of 2836 3144 Lihpdj32.exe 108 PID 3144 wrote to memory of 2836 3144 Lihpdj32.exe 108 PID 2836 wrote to memory of 1464 2836 Lbqdmodg.exe 109 PID 2836 wrote to memory of 1464 2836 Lbqdmodg.exe 109 PID 2836 wrote to memory of 1464 2836 Lbqdmodg.exe 109 PID 1464 wrote to memory of 3088 1464 Mfjlolpp.exe 110 PID 1464 wrote to memory of 3088 1464 Mfjlolpp.exe 110 PID 1464 wrote to memory of 3088 1464 Mfjlolpp.exe 110 PID 3088 wrote to memory of 4336 3088 Mfofjk32.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS200de4d159112e94dbe8941bc7d5d002exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.NEAS200de4d159112e94dbe8941bc7d5d002exe_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\Gmfplibd.exeC:\Windows\system32\Gmfplibd.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\Gbeejp32.exeC:\Windows\system32\Gbeejp32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Holfoqcm.exeC:\Windows\system32\Holfoqcm.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Hpchib32.exeC:\Windows\system32\Hpchib32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\Mmmqhl32.exeC:\Windows\system32\Mmmqhl32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\Noaeqjpe.exeC:\Windows\system32\Noaeqjpe.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\Nfnjbdep.exeC:\Windows\system32\Nfnjbdep.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\Gebimmco.exeC:\Windows\system32\Gebimmco.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\Hpcmfchg.exeC:\Windows\system32\Hpcmfchg.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\Hohjgpmo.exeC:\Windows\system32\Hohjgpmo.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\Hhaope32.exeC:\Windows\system32\Hhaope32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\Hhckeeam.exeC:\Windows\system32\Hhckeeam.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Jokpcmmj.exeC:\Windows\system32\Jokpcmmj.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\Jicdlc32.exeC:\Windows\system32\Jicdlc32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\Jbghpc32.exeC:\Windows\system32\Jbghpc32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\Kbinlp32.exeC:\Windows\system32\Kbinlp32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\Kcikfcab.exeC:\Windows\system32\Kcikfcab.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\Kmaooihb.exeC:\Windows\system32\Kmaooihb.exe19⤵
- Executes dropped EXE
PID:3772 -
C:\Windows\SysWOW64\Lihpdj32.exeC:\Windows\system32\Lihpdj32.exe20⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\Lbqdmodg.exeC:\Windows\system32\Lbqdmodg.exe21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\Mfjlolpp.exeC:\Windows\system32\Mfjlolpp.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\Mfofjk32.exeC:\Windows\system32\Mfofjk32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\Nlphmafm.exeC:\Windows\system32\Nlphmafm.exe24⤵
- Executes dropped EXE
PID:4336 -
C:\Windows\SysWOW64\Nidhffef.exeC:\Windows\system32\Nidhffef.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:796 -
C:\Windows\SysWOW64\Npqmipjq.exeC:\Windows\system32\Npqmipjq.exe26⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\Obafjk32.exeC:\Windows\system32\Obafjk32.exe27⤵
- Executes dropped EXE
PID:956 -
C:\Windows\SysWOW64\Oinkmdml.exeC:\Windows\system32\Oinkmdml.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3796 -
C:\Windows\SysWOW64\Obfpejcl.exeC:\Windows\system32\Obfpejcl.exe29⤵
- Executes dropped EXE
PID:3948 -
C:\Windows\SysWOW64\Odhiemil.exeC:\Windows\system32\Odhiemil.exe30⤵
- Executes dropped EXE
PID:4324 -
C:\Windows\SysWOW64\Plcmiofg.exeC:\Windows\system32\Plcmiofg.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3364 -
C:\Windows\SysWOW64\Ppccemjk.exeC:\Windows\system32\Ppccemjk.exe32⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\Pkkdhe32.exeC:\Windows\system32\Pkkdhe32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1368 -
C:\Windows\SysWOW64\Qipqibmf.exeC:\Windows\system32\Qipqibmf.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4960 -
C:\Windows\SysWOW64\Qlajkm32.exeC:\Windows\system32\Qlajkm32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3096 -
C:\Windows\SysWOW64\Akbjidbf.exeC:\Windows\system32\Akbjidbf.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3916 -
C:\Windows\SysWOW64\Cklffq32.exeC:\Windows\system32\Cklffq32.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:4668 -
C:\Windows\SysWOW64\Cgecpa32.exeC:\Windows\system32\Cgecpa32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4172 -
C:\Windows\SysWOW64\Cmblhh32.exeC:\Windows\system32\Cmblhh32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3936 -
C:\Windows\SysWOW64\Dqdnjfpc.exeC:\Windows\system32\Dqdnjfpc.exe40⤵
- Executes dropped EXE
PID:3216 -
C:\Windows\SysWOW64\Dklomnmf.exeC:\Windows\system32\Dklomnmf.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:4052 -
C:\Windows\SysWOW64\Ecjpfp32.exeC:\Windows\system32\Ecjpfp32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3120 -
C:\Windows\SysWOW64\Emgnje32.exeC:\Windows\system32\Emgnje32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1268 -
C:\Windows\SysWOW64\Febogbhg.exeC:\Windows\system32\Febogbhg.exe44⤵
- Executes dropped EXE
PID:3952 -
C:\Windows\SysWOW64\Goipae32.exeC:\Windows\system32\Goipae32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4508 -
C:\Windows\SysWOW64\Gdfhil32.exeC:\Windows\system32\Gdfhil32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:332 -
C:\Windows\SysWOW64\Mfiedfmd.exeC:\Windows\system32\Mfiedfmd.exe47⤵
- Executes dropped EXE
PID:1184 -
C:\Windows\SysWOW64\Cfiiggpg.exeC:\Windows\system32\Cfiiggpg.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2844 -
C:\Windows\SysWOW64\Dcmjpl32.exeC:\Windows\system32\Dcmjpl32.exe49⤵
- Executes dropped EXE
PID:372 -
C:\Windows\SysWOW64\Djgbmffn.exeC:\Windows\system32\Djgbmffn.exe50⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\Dodjemee.exeC:\Windows\system32\Dodjemee.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1796 -
C:\Windows\SysWOW64\Dfnbbg32.exeC:\Windows\system32\Dfnbbg32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2832 -
C:\Windows\SysWOW64\Dmhkoaco.exeC:\Windows\system32\Dmhkoaco.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1260 -
C:\Windows\SysWOW64\Ibojgikg.exeC:\Windows\system32\Ibojgikg.exe54⤵
- Executes dropped EXE
PID:3836 -
C:\Windows\SysWOW64\Ocldhqgb.exeC:\Windows\system32\Ocldhqgb.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3356 -
C:\Windows\SysWOW64\Oiglen32.exeC:\Windows\system32\Oiglen32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:3612 -
C:\Windows\SysWOW64\Pplcnf32.exeC:\Windows\system32\Pplcnf32.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4872 -
C:\Windows\SysWOW64\Pckpja32.exeC:\Windows\system32\Pckpja32.exe58⤵
- Executes dropped EXE
- Modifies registry class
PID:2260 -
C:\Windows\SysWOW64\Ppopcf32.exeC:\Windows\system32\Ppopcf32.exe59⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\Pflikm32.exeC:\Windows\system32\Pflikm32.exe60⤵
- Executes dropped EXE
PID:3144 -
C:\Windows\SysWOW64\Fibocnnj.exeC:\Windows\system32\Fibocnnj.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4144 -
C:\Windows\SysWOW64\Gighom32.exeC:\Windows\system32\Gighom32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4548 -
C:\Windows\SysWOW64\Ghhhmebd.exeC:\Windows\system32\Ghhhmebd.exe63⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\SysWOW64\Haefqjeo.exeC:\Windows\system32\Haefqjeo.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\Hhoomd32.exeC:\Windows\system32\Hhoomd32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1124 -
C:\Windows\SysWOW64\Hknkiokp.exeC:\Windows\system32\Hknkiokp.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4052 -
C:\Windows\SysWOW64\Hkpgooim.exeC:\Windows\system32\Hkpgooim.exe67⤵PID:3344
-
C:\Windows\SysWOW64\Hdhlhd32.exeC:\Windows\system32\Hdhlhd32.exe68⤵PID:4984
-
C:\Windows\SysWOW64\Halmaiog.exeC:\Windows\system32\Halmaiog.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1100 -
C:\Windows\SysWOW64\Hkeajn32.exeC:\Windows\system32\Hkeajn32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3416 -
C:\Windows\SysWOW64\Hjjnkkjp.exeC:\Windows\system32\Hjjnkkjp.exe71⤵PID:4592
-
C:\Windows\SysWOW64\Ipdfheal.exeC:\Windows\system32\Ipdfheal.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2168 -
C:\Windows\SysWOW64\Ikijenab.exeC:\Windows\system32\Ikijenab.exe73⤵
- Modifies registry class
PID:3712 -
C:\Windows\SysWOW64\Iacbbh32.exeC:\Windows\system32\Iacbbh32.exe74⤵PID:3400
-
C:\Windows\SysWOW64\Idbonc32.exeC:\Windows\system32\Idbonc32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4112 -
C:\Windows\SysWOW64\Igpkjo32.exeC:\Windows\system32\Igpkjo32.exe76⤵PID:1028
-
C:\Windows\SysWOW64\Injcginc.exeC:\Windows\system32\Injcginc.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1256 -
C:\Windows\SysWOW64\Ihpgda32.exeC:\Windows\system32\Ihpgda32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1368 -
C:\Windows\SysWOW64\Ijadljdg.exeC:\Windows\system32\Ijadljdg.exe79⤵
- Drops file in System32 directory
- Modifies registry class
PID:928 -
C:\Windows\SysWOW64\Ibhlmgdj.exeC:\Windows\system32\Ibhlmgdj.exe80⤵PID:3956
-
C:\Windows\SysWOW64\Ibjibg32.exeC:\Windows\system32\Ibjibg32.exe81⤵PID:1268
-
C:\Windows\SysWOW64\Ihdaoajd.exeC:\Windows\system32\Ihdaoajd.exe82⤵PID:4764
-
C:\Windows\SysWOW64\Ikcmklih.exeC:\Windows\system32\Ikcmklih.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3348 -
C:\Windows\SysWOW64\Jkejalge.exeC:\Windows\system32\Jkejalge.exe84⤵
- Drops file in System32 directory
PID:4320 -
C:\Windows\SysWOW64\Jqihjbod.exeC:\Windows\system32\Jqihjbod.exe85⤵PID:4560
-
C:\Windows\SysWOW64\Jgcafl32.exeC:\Windows\system32\Jgcafl32.exe86⤵PID:4564
-
C:\Windows\SysWOW64\Knmicfnn.exeC:\Windows\system32\Knmicfnn.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3052 -
C:\Windows\SysWOW64\Kdgapp32.exeC:\Windows\system32\Kdgapp32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2208 -
C:\Windows\SysWOW64\Kkaimj32.exeC:\Windows\system32\Kkaimj32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2844 -
C:\Windows\SysWOW64\Kbkaiddd.exeC:\Windows\system32\Kbkaiddd.exe90⤵PID:3228
-
C:\Windows\SysWOW64\Kiejfo32.exeC:\Windows\system32\Kiejfo32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4900 -
C:\Windows\SysWOW64\Kjffngap.exeC:\Windows\system32\Kjffngap.exe92⤵
- Drops file in System32 directory
PID:2020 -
C:\Windows\SysWOW64\Kelkkpae.exeC:\Windows\system32\Kelkkpae.exe93⤵PID:4620
-
C:\Windows\SysWOW64\Kjhccf32.exeC:\Windows\system32\Kjhccf32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4280 -
C:\Windows\SysWOW64\Kengqo32.exeC:\Windows\system32\Kengqo32.exe95⤵PID:1248
-
C:\Windows\SysWOW64\Kkhpmigp.exeC:\Windows\system32\Kkhpmigp.exe96⤵
- Modifies registry class
PID:1720 -
C:\Windows\SysWOW64\Kaehepeg.exeC:\Windows\system32\Kaehepeg.exe97⤵
- Drops file in System32 directory
- Modifies registry class
PID:184 -
C:\Windows\SysWOW64\Lelcbmcc.exeC:\Windows\system32\Lelcbmcc.exe98⤵
- Drops file in System32 directory
- Modifies registry class
PID:4664 -
C:\Windows\SysWOW64\Mlflog32.exeC:\Windows\system32\Mlflog32.exe99⤵
- Modifies registry class
PID:3812 -
C:\Windows\SysWOW64\Macdgn32.exeC:\Windows\system32\Macdgn32.exe100⤵
- Drops file in System32 directory
PID:4176 -
C:\Windows\SysWOW64\Mjkipdpg.exeC:\Windows\system32\Mjkipdpg.exe101⤵
- Drops file in System32 directory
PID:3028 -
C:\Windows\SysWOW64\Maealn32.exeC:\Windows\system32\Maealn32.exe102⤵PID:3232
-
C:\Windows\SysWOW64\Mhoiih32.exeC:\Windows\system32\Mhoiih32.exe103⤵
- Drops file in System32 directory
PID:3708 -
C:\Windows\SysWOW64\Niconj32.exeC:\Windows\system32\Niconj32.exe104⤵PID:5180
-
C:\Windows\SysWOW64\Nophfa32.exeC:\Windows\system32\Nophfa32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5232 -
C:\Windows\SysWOW64\Njghkb32.exeC:\Windows\system32\Njghkb32.exe106⤵
- Modifies registry class
PID:5268 -
C:\Windows\SysWOW64\Nbnpmp32.exeC:\Windows\system32\Nbnpmp32.exe107⤵
- Modifies registry class
PID:5316 -
C:\Windows\SysWOW64\Nihiiimi.exeC:\Windows\system32\Nihiiimi.exe108⤵
- Modifies registry class
PID:5364 -
C:\Windows\SysWOW64\Noeaaqlq.exeC:\Windows\system32\Noeaaqlq.exe109⤵PID:5412
-
C:\Windows\SysWOW64\Nhmejf32.exeC:\Windows\system32\Nhmejf32.exe110⤵PID:5488
-
C:\Windows\SysWOW64\Nklbfaae.exeC:\Windows\system32\Nklbfaae.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5532 -
C:\Windows\SysWOW64\Neafdjak.exeC:\Windows\system32\Neafdjak.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5580 -
C:\Windows\SysWOW64\Noijmp32.exeC:\Windows\system32\Noijmp32.exe113⤵PID:5632
-
C:\Windows\SysWOW64\Oeccijoh.exeC:\Windows\system32\Oeccijoh.exe114⤵PID:5676
-
C:\Windows\SysWOW64\Olnkfd32.exeC:\Windows\system32\Olnkfd32.exe115⤵
- Modifies registry class
PID:5720 -
C:\Windows\SysWOW64\Obgccn32.exeC:\Windows\system32\Obgccn32.exe116⤵PID:5768
-
C:\Windows\SysWOW64\Oondhocf.exeC:\Windows\system32\Oondhocf.exe117⤵PID:5808
-
C:\Windows\SysWOW64\Oampdkbj.exeC:\Windows\system32\Oampdkbj.exe118⤵PID:5852
-
C:\Windows\SysWOW64\Ooqqmoac.exeC:\Windows\system32\Ooqqmoac.exe119⤵
- Drops file in System32 directory
PID:5896 -
C:\Windows\SysWOW64\Oaomij32.exeC:\Windows\system32\Oaomij32.exe120⤵
- Drops file in System32 directory
PID:5948 -
C:\Windows\SysWOW64\Oocmcn32.exeC:\Windows\system32\Oocmcn32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5992 -
C:\Windows\SysWOW64\Oemephgn.exeC:\Windows\system32\Oemephgn.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:6040
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-