Analysis
-
max time kernel
166s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 20:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.cd6138a5ede32dbb989fa38a349fdf60.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.cd6138a5ede32dbb989fa38a349fdf60.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NEAS.cd6138a5ede32dbb989fa38a349fdf60.exe
-
Size
374KB
-
MD5
cd6138a5ede32dbb989fa38a349fdf60
-
SHA1
5c87f8377396430e6c4ff2e99a50eb28c437d922
-
SHA256
7efaf17e9afa77577bbd8f974bf62d39a278e6163cd35a84fb84bd836e3d9a60
-
SHA512
326a54c46ed72b77c8998e502dd07d553e5f2d229344dd85e97f6dc3ffa6c64b131062833e408a296547efe1bc5acec71640e36947d86269540095ce0d7e9dca
-
SSDEEP
6144:uF9pbbwbsdYa6HYW0VBLaZ/nRG+G6T/pV4vBcie+ZtSVBOdLoT71JHCvkJ8eIQt9:uFLvL290V8Vnc+Gu/j45cd+ZtSVBOdL+
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mnanpfdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gkofpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jialbf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oghgbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hddbmedc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgblhmag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akiijq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaibcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gjhdkajh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcdbmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iiblcdil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fhpckb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Elnoifjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hiomppkc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qciebg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khimhefk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hajkjkdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gndima32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhenpk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gflapl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fechhcal.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beaced32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bacjmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pmpmnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhjknljl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abbiej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gcfjfqah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Opefdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Filailgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Goqkne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nqkihpie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdjqienq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmiidnko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pploli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qlomemlj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpocciba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfchehla.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Helfbqeb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkacff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Npjelo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Igmgji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cjmgomjc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkimae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbchnfei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Koodka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" NEAS.cd6138a5ede32dbb989fa38a349fdf60.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpdfpmoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ligglo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mjbopcip.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncjmob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ngbeok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjhdkajh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Biolkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Opnglhnd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eaoenjqa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Legjgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Beefenie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oolgbpei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dkfanqmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbnflihq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilibmcln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lpbokjho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Beaced32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lpmfnj32.exe -
Executes dropped EXE 64 IoCs
pid Process 1296 Pcfmneaa.exe 4036 Ammnhilb.exe 2828 Bcpika32.exe 3712 Cplckbmc.exe 4604 Cehlcikj.exe 4732 Cifdjg32.exe 3660 Cfmahknh.exe 2240 Dbcbnlcl.exe 4716 Dlncla32.exe 4740 Edcgnmml.exe 1528 Glabolja.exe 452 Gcngafol.exe 4644 Hqddqj32.exe 2664 Hcgjhega.exe 3688 Ljncnhhk.exe 2748 Mejnlpai.exe 2600 Maehlqch.exe 1732 Necqbo32.exe 916 Nnfkgp32.exe 1008 Oolnabal.exe 2128 Phlikg32.exe 2120 Pgaelcgm.exe 1300 Pfdbpjmi.exe 2576 Abbiej32.exe 2108 Bnbmqjjo.exe 1920 Bpdfpmoo.exe 4260 Cehdib32.exe 3128 Cbnbhfde.exe 1940 Dngobghg.exe 2724 Foakpc32.exe 4264 Gcfjfqah.exe 2768 Kmkpipaf.exe 4668 Kcehejic.exe 3528 Lpbokjho.exe 1772 Laiafl32.exe 3788 Mdjjgggk.exe 4948 Mabdlk32.exe 2448 Nibbklke.exe 4916 Ndhgie32.exe 1724 Nkghqo32.exe 4960 Ohaokbfd.exe 3820 Odhppclh.exe 2328 Phfhfa32.exe 1676 Phiekaql.exe 1632 Paaidf32.exe 5088 Phmnfp32.exe 4312 Qgehml32.exe 2032 Aaofedkl.exe 64 Bqdlmo32.exe 1804 Cqghcn32.exe 1172 Cnmebblf.exe 1784 Elaobdmm.exe 1844 Gkcdfl32.exe 3168 Hchihhng.exe 1824 Iooimi32.exe 1856 Iocchhof.exe 2196 Ikmpcicg.exe 1796 Jfbdpabn.exe 4512 Jhejgl32.exe 2972 Jfikaqme.exe 2540 Kkkldg32.exe 3440 Kcdakd32.exe 4204 Kmmedi32.exe 3848 Kjqfmn32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nigjifgc.exe Kmfmfigl.exe File created C:\Windows\SysWOW64\Apncei32.dll Fdijkmbl.exe File created C:\Windows\SysWOW64\Klpifhbm.dll Jjgcbb32.exe File created C:\Windows\SysWOW64\Lqcjqcnp.exe Koodka32.exe File opened for modification C:\Windows\SysWOW64\Oceepj32.exe Onhmhc32.exe File opened for modification C:\Windows\SysWOW64\Hnnlcpcl.exe Hajkjkdb.exe File created C:\Windows\SysWOW64\Gkcdfl32.exe Elaobdmm.exe File created C:\Windows\SysWOW64\Oimdbnip.exe Niohap32.exe File created C:\Windows\SysWOW64\Oghpib32.exe Opnglhnd.exe File created C:\Windows\SysWOW64\Bgilfl32.dll Jekqgnno.exe File opened for modification C:\Windows\SysWOW64\Cqghcn32.exe Bqdlmo32.exe File created C:\Windows\SysWOW64\Kpkqldee.dll Anqfepaj.exe File opened for modification C:\Windows\SysWOW64\Elccpife.exe Ebifha32.exe File created C:\Windows\SysWOW64\Cbnbhfde.exe Cehdib32.exe File opened for modification C:\Windows\SysWOW64\Mhenpk32.exe Mbkfcabb.exe File opened for modification C:\Windows\SysWOW64\Eopbghnb.exe Eoneah32.exe File created C:\Windows\SysWOW64\Qbfbhnnh.dll Hlbcgj32.exe File opened for modification C:\Windows\SysWOW64\Gkacff32.exe Gkofpf32.exe File created C:\Windows\SysWOW64\Cjbnqa32.dll Paaidf32.exe File opened for modification C:\Windows\SysWOW64\Jfikaqme.exe Jhejgl32.exe File created C:\Windows\SysWOW64\Ccgjjc32.exe Bgdjicmn.exe File opened for modification C:\Windows\SysWOW64\Ekcemmgo.exe Eegpkcbd.exe File opened for modification C:\Windows\SysWOW64\Biolkc32.exe Bojhnjgf.exe File created C:\Windows\SysWOW64\Diblgnen.dll Hjcllilo.exe File opened for modification C:\Windows\SysWOW64\Ipmbcm32.exe Igmgji32.exe File created C:\Windows\SysWOW64\Nkqdlg32.dll Pdcaahbk.exe File created C:\Windows\SysWOW64\Jjhobl32.dll Mejnlpai.exe File opened for modification C:\Windows\SysWOW64\Ofalfi32.exe Opefdo32.exe File opened for modification C:\Windows\SysWOW64\Hajkjkdb.exe Hpiobc32.exe File created C:\Windows\SysWOW64\Eqiilp32.exe Eohmdhki.exe File created C:\Windows\SysWOW64\Lfhideka.dll Enmjedpa.exe File opened for modification C:\Windows\SysWOW64\Pbjbfclk.exe Oimdbnip.exe File created C:\Windows\SysWOW64\Mgebfhcl.exe Mqkijnkp.exe File created C:\Windows\SysWOW64\Mkckfk32.dll Dfiaomkb.exe File created C:\Windows\SysWOW64\Necqbo32.exe Maehlqch.exe File opened for modification C:\Windows\SysWOW64\Mmokpglb.exe Lfqjhmhk.exe File created C:\Windows\SysWOW64\Efnolmmb.dll Fflobgng.exe File created C:\Windows\SysWOW64\Mhekfhho.dll Gkofpf32.exe File created C:\Windows\SysWOW64\Pgemimck.exe Ojhijjll.exe File opened for modification C:\Windows\SysWOW64\Dfjgjf32.exe Cmklaaek.exe File created C:\Windows\SysWOW64\Mjbopcip.exe Maealn32.exe File created C:\Windows\SysWOW64\Fechhcal.exe Flkdpnjl.exe File created C:\Windows\SysWOW64\Pnnbdn32.dll Mncjffbl.exe File created C:\Windows\SysWOW64\Fhpckb32.exe Ffbgog32.exe File created C:\Windows\SysWOW64\Fhmpkmpm.exe Fnhlndqg.exe File created C:\Windows\SysWOW64\Iimcgg32.exe Iogoinka.exe File created C:\Windows\SysWOW64\Cnealfkf.exe Bgimjmfl.exe File created C:\Windows\SysWOW64\Kdpfbp32.exe Hnfehm32.exe File created C:\Windows\SysWOW64\Nacmjf32.dll Pjhpccnn.exe File opened for modification C:\Windows\SysWOW64\Ieojqi32.exe Ipbahb32.exe File opened for modification C:\Windows\SysWOW64\Boipfp32.exe Ajlngk32.exe File opened for modification C:\Windows\SysWOW64\Dcnqid32.exe Difpflco.exe File created C:\Windows\SysWOW64\Ojhijjll.exe Mknjgajl.exe File created C:\Windows\SysWOW64\Hddbmedc.exe Ehecpgbi.exe File created C:\Windows\SysWOW64\Iocliecb.exe Ilepmjdo.exe File created C:\Windows\SysWOW64\Pbjbfclk.exe Oimdbnip.exe File opened for modification C:\Windows\SysWOW64\Mbkfcabb.exe Mgebfhcl.exe File created C:\Windows\SysWOW64\Llhcag32.dll Iikmlnae.exe File opened for modification C:\Windows\SysWOW64\Njekfenc.exe Nppfimnm.exe File created C:\Windows\SysWOW64\Hiofeigg.exe Hbenio32.exe File created C:\Windows\SysWOW64\Glpblg32.dll Hhfplejl.exe File opened for modification C:\Windows\SysWOW64\Glabolja.exe Edcgnmml.exe File created C:\Windows\SysWOW64\Oiiimhqc.dll Oemephgn.exe File created C:\Windows\SysWOW64\Fckhnaab.exe Fifdqhal.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dfpfokfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hplbbipm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibjanpje.dll" Akiijq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.cd6138a5ede32dbb989fa38a349fdf60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cnmebblf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifefggbd.dll" Cbcieqpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fnhlndqg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Malgmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hbenio32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iimcgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eaeboq32.dll" Hpgigj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Maocdibm.dll" Ljcejhnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iahgki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kkkldg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jdkdbgpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mphfjhjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Beefenie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cgijnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gkofpf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kdipce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dnadmp32.dll" Ckladcoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dmglmpkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pjhpccnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Akiijq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nbepdfnc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hiomppkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lfjchn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ccgjjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imhdbi32.dll" Ebifha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cplckbmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mmdekf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Biolkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Npjelo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oepipo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fhngfcdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocoonp32.dll" Hiofeigg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkckfk32.dll" Dfiaomkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nppfimnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mncjffbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Filailgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgagnd32.dll" Iooimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfhimdmi.dll" Commjgga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fcfhhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljqhaa32.dll" Goqkne32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oaliidon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Abbiej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Obnlpnbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ahnghafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gkacff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jfbdpabn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nipokfil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nfplmb32.dll" Gdncfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hienee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Onhmhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhkeofak.dll" Kdpfbp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddhhnana.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eimegk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hcneiljl.dll" Ilnlhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Himjjb32.dll" Amloakki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Iogoinka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jeoqhi32.dll" Nfjeej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qlomemlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Npcokpln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Legjgn32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4108 wrote to memory of 1296 4108 NEAS.cd6138a5ede32dbb989fa38a349fdf60.exe 90 PID 4108 wrote to memory of 1296 4108 NEAS.cd6138a5ede32dbb989fa38a349fdf60.exe 90 PID 4108 wrote to memory of 1296 4108 NEAS.cd6138a5ede32dbb989fa38a349fdf60.exe 90 PID 1296 wrote to memory of 4036 1296 Pcfmneaa.exe 91 PID 1296 wrote to memory of 4036 1296 Pcfmneaa.exe 91 PID 1296 wrote to memory of 4036 1296 Pcfmneaa.exe 91 PID 4036 wrote to memory of 2828 4036 Ammnhilb.exe 92 PID 4036 wrote to memory of 2828 4036 Ammnhilb.exe 92 PID 4036 wrote to memory of 2828 4036 Ammnhilb.exe 92 PID 2828 wrote to memory of 3712 2828 Bcpika32.exe 93 PID 2828 wrote to memory of 3712 2828 Bcpika32.exe 93 PID 2828 wrote to memory of 3712 2828 Bcpika32.exe 93 PID 3712 wrote to memory of 4604 3712 Cplckbmc.exe 94 PID 3712 wrote to memory of 4604 3712 Cplckbmc.exe 94 PID 3712 wrote to memory of 4604 3712 Cplckbmc.exe 94 PID 4604 wrote to memory of 4732 4604 Cehlcikj.exe 95 PID 4604 wrote to memory of 4732 4604 Cehlcikj.exe 95 PID 4604 wrote to memory of 4732 4604 Cehlcikj.exe 95 PID 4732 wrote to memory of 3660 4732 Cifdjg32.exe 96 PID 4732 wrote to memory of 3660 4732 Cifdjg32.exe 96 PID 4732 wrote to memory of 3660 4732 Cifdjg32.exe 96 PID 3660 wrote to memory of 2240 3660 Cfmahknh.exe 97 PID 3660 wrote to memory of 2240 3660 Cfmahknh.exe 97 PID 3660 wrote to memory of 2240 3660 Cfmahknh.exe 97 PID 2240 wrote to memory of 4716 2240 Dbcbnlcl.exe 99 PID 2240 wrote to memory of 4716 2240 Dbcbnlcl.exe 99 PID 2240 wrote to memory of 4716 2240 Dbcbnlcl.exe 99 PID 4716 wrote to memory of 4740 4716 Dlncla32.exe 100 PID 4716 wrote to memory of 4740 4716 Dlncla32.exe 100 PID 4716 wrote to memory of 4740 4716 Dlncla32.exe 100 PID 4740 wrote to memory of 1528 4740 Edcgnmml.exe 101 PID 4740 wrote to memory of 1528 4740 Edcgnmml.exe 101 PID 4740 wrote to memory of 1528 4740 Edcgnmml.exe 101 PID 1528 wrote to memory of 452 1528 Glabolja.exe 102 PID 1528 wrote to memory of 452 1528 Glabolja.exe 102 PID 1528 wrote to memory of 452 1528 Glabolja.exe 102 PID 452 wrote to memory of 4644 452 Gcngafol.exe 103 PID 452 wrote to memory of 4644 452 Gcngafol.exe 103 PID 452 wrote to memory of 4644 452 Gcngafol.exe 103 PID 4644 wrote to memory of 2664 4644 Hqddqj32.exe 104 PID 4644 wrote to memory of 2664 4644 Hqddqj32.exe 104 PID 4644 wrote to memory of 2664 4644 Hqddqj32.exe 104 PID 2664 wrote to memory of 3688 2664 Hcgjhega.exe 105 PID 2664 wrote to memory of 3688 2664 Hcgjhega.exe 105 PID 2664 wrote to memory of 3688 2664 Hcgjhega.exe 105 PID 3688 wrote to memory of 2748 3688 Ljncnhhk.exe 106 PID 3688 wrote to memory of 2748 3688 Ljncnhhk.exe 106 PID 3688 wrote to memory of 2748 3688 Ljncnhhk.exe 106 PID 2748 wrote to memory of 2600 2748 Mejnlpai.exe 107 PID 2748 wrote to memory of 2600 2748 Mejnlpai.exe 107 PID 2748 wrote to memory of 2600 2748 Mejnlpai.exe 107 PID 2600 wrote to memory of 1732 2600 Maehlqch.exe 108 PID 2600 wrote to memory of 1732 2600 Maehlqch.exe 108 PID 2600 wrote to memory of 1732 2600 Maehlqch.exe 108 PID 1732 wrote to memory of 916 1732 Necqbo32.exe 109 PID 1732 wrote to memory of 916 1732 Necqbo32.exe 109 PID 1732 wrote to memory of 916 1732 Necqbo32.exe 109 PID 916 wrote to memory of 1008 916 Nnfkgp32.exe 110 PID 916 wrote to memory of 1008 916 Nnfkgp32.exe 110 PID 916 wrote to memory of 1008 916 Nnfkgp32.exe 110 PID 1008 wrote to memory of 2128 1008 Oolnabal.exe 111 PID 1008 wrote to memory of 2128 1008 Oolnabal.exe 111 PID 1008 wrote to memory of 2128 1008 Oolnabal.exe 111 PID 2128 wrote to memory of 2120 2128 Phlikg32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.cd6138a5ede32dbb989fa38a349fdf60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.cd6138a5ede32dbb989fa38a349fdf60.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\Pcfmneaa.exeC:\Windows\system32\Pcfmneaa.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\Ammnhilb.exeC:\Windows\system32\Ammnhilb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\Bcpika32.exeC:\Windows\system32\Bcpika32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Cplckbmc.exeC:\Windows\system32\Cplckbmc.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\Cehlcikj.exeC:\Windows\system32\Cehlcikj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\Cifdjg32.exeC:\Windows\system32\Cifdjg32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\Cfmahknh.exeC:\Windows\system32\Cfmahknh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\Dbcbnlcl.exeC:\Windows\system32\Dbcbnlcl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\Dlncla32.exeC:\Windows\system32\Dlncla32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\Edcgnmml.exeC:\Windows\system32\Edcgnmml.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\Glabolja.exeC:\Windows\system32\Glabolja.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\Gcngafol.exeC:\Windows\system32\Gcngafol.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\Hqddqj32.exeC:\Windows\system32\Hqddqj32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\Hcgjhega.exeC:\Windows\system32\Hcgjhega.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Ljncnhhk.exeC:\Windows\system32\Ljncnhhk.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\Mejnlpai.exeC:\Windows\system32\Mejnlpai.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\Maehlqch.exeC:\Windows\system32\Maehlqch.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Necqbo32.exeC:\Windows\system32\Necqbo32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\Nnfkgp32.exeC:\Windows\system32\Nnfkgp32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\Oolnabal.exeC:\Windows\system32\Oolnabal.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\Phlikg32.exeC:\Windows\system32\Phlikg32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\Pgaelcgm.exeC:\Windows\system32\Pgaelcgm.exe23⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\Pfdbpjmi.exeC:\Windows\system32\Pfdbpjmi.exe24⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\Abbiej32.exeC:\Windows\system32\Abbiej32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2576 -
C:\Windows\SysWOW64\Bnbmqjjo.exeC:\Windows\system32\Bnbmqjjo.exe26⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\Bpdfpmoo.exeC:\Windows\system32\Bpdfpmoo.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\Cehdib32.exeC:\Windows\system32\Cehdib32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4260 -
C:\Windows\SysWOW64\Cbnbhfde.exeC:\Windows\system32\Cbnbhfde.exe29⤵
- Executes dropped EXE
PID:3128 -
C:\Windows\SysWOW64\Dngobghg.exeC:\Windows\system32\Dngobghg.exe30⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\SysWOW64\Foakpc32.exeC:\Windows\system32\Foakpc32.exe31⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\Gcfjfqah.exeC:\Windows\system32\Gcfjfqah.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4264 -
C:\Windows\SysWOW64\Kmkpipaf.exeC:\Windows\system32\Kmkpipaf.exe33⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\Kcehejic.exeC:\Windows\system32\Kcehejic.exe34⤵
- Executes dropped EXE
PID:4668 -
C:\Windows\SysWOW64\Lpbokjho.exeC:\Windows\system32\Lpbokjho.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3528 -
C:\Windows\SysWOW64\Laiafl32.exeC:\Windows\system32\Laiafl32.exe36⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\Mdjjgggk.exeC:\Windows\system32\Mdjjgggk.exe37⤵
- Executes dropped EXE
PID:3788 -
C:\Windows\SysWOW64\Mabdlk32.exeC:\Windows\system32\Mabdlk32.exe38⤵
- Executes dropped EXE
PID:4948 -
C:\Windows\SysWOW64\Nibbklke.exeC:\Windows\system32\Nibbklke.exe39⤵
- Executes dropped EXE
PID:2448 -
C:\Windows\SysWOW64\Ndhgie32.exeC:\Windows\system32\Ndhgie32.exe40⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\SysWOW64\Nkghqo32.exeC:\Windows\system32\Nkghqo32.exe41⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\Ohaokbfd.exeC:\Windows\system32\Ohaokbfd.exe42⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\SysWOW64\Odhppclh.exeC:\Windows\system32\Odhppclh.exe43⤵
- Executes dropped EXE
PID:3820 -
C:\Windows\SysWOW64\Phfhfa32.exeC:\Windows\system32\Phfhfa32.exe44⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\Phiekaql.exeC:\Windows\system32\Phiekaql.exe45⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\SysWOW64\Paaidf32.exeC:\Windows\system32\Paaidf32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1632 -
C:\Windows\SysWOW64\Phmnfp32.exeC:\Windows\system32\Phmnfp32.exe47⤵
- Executes dropped EXE
PID:5088 -
C:\Windows\SysWOW64\Qgehml32.exeC:\Windows\system32\Qgehml32.exe48⤵
- Executes dropped EXE
PID:4312 -
C:\Windows\SysWOW64\Aaofedkl.exeC:\Windows\system32\Aaofedkl.exe49⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\Bqdlmo32.exeC:\Windows\system32\Bqdlmo32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:64 -
C:\Windows\SysWOW64\Cqghcn32.exeC:\Windows\system32\Cqghcn32.exe51⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\Cnmebblf.exeC:\Windows\system32\Cnmebblf.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:1172 -
C:\Windows\SysWOW64\Elaobdmm.exeC:\Windows\system32\Elaobdmm.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1784 -
C:\Windows\SysWOW64\Gkcdfl32.exeC:\Windows\system32\Gkcdfl32.exe54⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\Hchihhng.exeC:\Windows\system32\Hchihhng.exe55⤵
- Executes dropped EXE
PID:3168 -
C:\Windows\SysWOW64\Iooimi32.exeC:\Windows\system32\Iooimi32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:1824 -
C:\Windows\SysWOW64\Iocchhof.exeC:\Windows\system32\Iocchhof.exe57⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\SysWOW64\Ikmpcicg.exeC:\Windows\system32\Ikmpcicg.exe58⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\Jfbdpabn.exeC:\Windows\system32\Jfbdpabn.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:1796 -
C:\Windows\SysWOW64\Jhejgl32.exeC:\Windows\system32\Jhejgl32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4512 -
C:\Windows\SysWOW64\Jfikaqme.exeC:\Windows\system32\Jfikaqme.exe61⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\Kkkldg32.exeC:\Windows\system32\Kkkldg32.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:2540 -
C:\Windows\SysWOW64\Kcdakd32.exeC:\Windows\system32\Kcdakd32.exe63⤵
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\Kmmedi32.exeC:\Windows\system32\Kmmedi32.exe64⤵
- Executes dropped EXE
PID:4204 -
C:\Windows\SysWOW64\Kjqfmn32.exeC:\Windows\system32\Kjqfmn32.exe65⤵
- Executes dropped EXE
PID:3848 -
C:\Windows\SysWOW64\Kmaooihb.exeC:\Windows\system32\Kmaooihb.exe66⤵PID:3400
-
C:\Windows\SysWOW64\Lfjchn32.exeC:\Windows\system32\Lfjchn32.exe67⤵
- Modifies registry class
PID:3384 -
C:\Windows\SysWOW64\Lflpmn32.exeC:\Windows\system32\Lflpmn32.exe68⤵PID:4952
-
C:\Windows\SysWOW64\Lfqjhmhk.exeC:\Windows\system32\Lfqjhmhk.exe69⤵
- Drops file in System32 directory
PID:3632 -
C:\Windows\SysWOW64\Mmokpglb.exeC:\Windows\system32\Mmokpglb.exe70⤵PID:2296
-
C:\Windows\SysWOW64\Mclpbqal.exeC:\Windows\system32\Mclpbqal.exe71⤵PID:2904
-
C:\Windows\SysWOW64\Mmdekf32.exeC:\Windows\system32\Mmdekf32.exe72⤵
- Modifies registry class
PID:2312 -
C:\Windows\SysWOW64\Nipokfil.exeC:\Windows\system32\Nipokfil.exe73⤵
- Modifies registry class
PID:3180 -
C:\Windows\SysWOW64\Nlbdba32.exeC:\Windows\system32\Nlbdba32.exe74⤵PID:1332
-
C:\Windows\SysWOW64\Npqmipjq.exeC:\Windows\system32\Npqmipjq.exe75⤵PID:1388
-
C:\Windows\SysWOW64\Nfjeej32.exeC:\Windows\system32\Nfjeej32.exe76⤵
- Modifies registry class
PID:2088 -
C:\Windows\SysWOW64\Opcjno32.exeC:\Windows\system32\Opcjno32.exe77⤵PID:1684
-
C:\Windows\SysWOW64\Oikngeoo.exeC:\Windows\system32\Oikngeoo.exe78⤵PID:2472
-
C:\Windows\SysWOW64\Opefdo32.exeC:\Windows\system32\Opefdo32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2232 -
C:\Windows\SysWOW64\Ofalfi32.exeC:\Windows\system32\Ofalfi32.exe80⤵PID:3756
-
C:\Windows\SysWOW64\Obkiqi32.exeC:\Windows\system32\Obkiqi32.exe81⤵PID:1992
-
C:\Windows\SysWOW64\Pmpmnb32.exeC:\Windows\system32\Pmpmnb32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3592 -
C:\Windows\SysWOW64\Pgmkbg32.exeC:\Windows\system32\Pgmkbg32.exe83⤵PID:1580
-
C:\Windows\SysWOW64\Qlomemlj.exeC:\Windows\system32\Qlomemlj.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5044 -
C:\Windows\SysWOW64\Qciebg32.exeC:\Windows\system32\Qciebg32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1556 -
C:\Windows\SysWOW64\Anqfepaj.exeC:\Windows\system32\Anqfepaj.exe86⤵
- Drops file in System32 directory
PID:1496 -
C:\Windows\SysWOW64\Adjnaj32.exeC:\Windows\system32\Adjnaj32.exe87⤵PID:1092
-
C:\Windows\SysWOW64\Agndidce.exeC:\Windows\system32\Agndidce.exe88⤵PID:4592
-
C:\Windows\SysWOW64\Bgdjicmn.exeC:\Windows\system32\Bgdjicmn.exe89⤵
- Drops file in System32 directory
PID:4688 -
C:\Windows\SysWOW64\Ccgjjc32.exeC:\Windows\system32\Ccgjjc32.exe90⤵
- Modifies registry class
PID:4120 -
C:\Windows\SysWOW64\Cnmoglij.exeC:\Windows\system32\Cnmoglij.exe91⤵PID:4628
-
C:\Windows\SysWOW64\Dnmgni32.exeC:\Windows\system32\Dnmgni32.exe92⤵PID:2536
-
C:\Windows\SysWOW64\Eegpkcbd.exeC:\Windows\system32\Eegpkcbd.exe93⤵
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\Ekcemmgo.exeC:\Windows\system32\Ekcemmgo.exe94⤵PID:4880
-
C:\Windows\SysWOW64\Eljknl32.exeC:\Windows\system32\Eljknl32.exe95⤵PID:3320
-
C:\Windows\SysWOW64\Fnbjpf32.exeC:\Windows\system32\Fnbjpf32.exe96⤵PID:2872
-
C:\Windows\SysWOW64\Felbmqpl.exeC:\Windows\system32\Felbmqpl.exe97⤵PID:4732
-
C:\Windows\SysWOW64\Gonilenb.exeC:\Windows\system32\Gonilenb.exe98⤵PID:2916
-
C:\Windows\SysWOW64\Jdkdbgpd.exeC:\Windows\system32\Jdkdbgpd.exe99⤵
- Modifies registry class
PID:2376 -
C:\Windows\SysWOW64\Jkeloa32.exeC:\Windows\system32\Jkeloa32.exe100⤵PID:3960
-
C:\Windows\SysWOW64\Jaodkk32.exeC:\Windows\system32\Jaodkk32.exe101⤵PID:4556
-
C:\Windows\SysWOW64\Khimhefk.exeC:\Windows\system32\Khimhefk.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3660 -
C:\Windows\SysWOW64\Klgend32.exeC:\Windows\system32\Klgend32.exe103⤵PID:2856
-
C:\Windows\SysWOW64\Knhbflbp.exeC:\Windows\system32\Knhbflbp.exe104⤵PID:3840
-
C:\Windows\SysWOW64\Klibdcjo.exeC:\Windows\system32\Klibdcjo.exe105⤵PID:4748
-
C:\Windows\SysWOW64\Kdipce32.exeC:\Windows\system32\Kdipce32.exe106⤵
- Modifies registry class
PID:4780 -
C:\Windows\SysWOW64\Loodqn32.exeC:\Windows\system32\Loodqn32.exe107⤵PID:1244
-
C:\Windows\SysWOW64\Mokdllim.exeC:\Windows\system32\Mokdllim.exe108⤵PID:3324
-
C:\Windows\SysWOW64\Nbepdfnc.exeC:\Windows\system32\Nbepdfnc.exe109⤵
- Modifies registry class
PID:4676 -
C:\Windows\SysWOW64\Niohap32.exeC:\Windows\system32\Niohap32.exe110⤵
- Drops file in System32 directory
PID:5020 -
C:\Windows\SysWOW64\Oimdbnip.exeC:\Windows\system32\Oimdbnip.exe111⤵
- Drops file in System32 directory
PID:632 -
C:\Windows\SysWOW64\Pbjbfclk.exeC:\Windows\system32\Pbjbfclk.exe112⤵PID:1444
-
C:\Windows\SysWOW64\Pohilc32.exeC:\Windows\system32\Pohilc32.exe113⤵PID:1812
-
C:\Windows\SysWOW64\Abjkmqni.exeC:\Windows\system32\Abjkmqni.exe114⤵PID:2600
-
C:\Windows\SysWOW64\Albpff32.exeC:\Windows\system32\Albpff32.exe115⤵PID:1572
-
C:\Windows\SysWOW64\Aghdco32.exeC:\Windows\system32\Aghdco32.exe116⤵PID:1008
-
C:\Windows\SysWOW64\Aochga32.exeC:\Windows\system32\Aochga32.exe117⤵PID:4772
-
C:\Windows\SysWOW64\Algiaepd.exeC:\Windows\system32\Algiaepd.exe118⤵PID:5164
-
C:\Windows\SysWOW64\Aikijjon.exeC:\Windows\system32\Aikijjon.exe119⤵PID:5204
-
C:\Windows\SysWOW64\Accnco32.exeC:\Windows\system32\Accnco32.exe120⤵PID:5248
-
C:\Windows\SysWOW64\Amibqhed.exeC:\Windows\system32\Amibqhed.exe121⤵PID:5288
-
C:\Windows\SysWOW64\Bojohp32.exeC:\Windows\system32\Bojohp32.exe122⤵PID:5332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-