Analysis
-
max time kernel
152s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.d70ea92e7d5ba120fcbacfb8229a7560.exe
Resource
win7-20230831-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.d70ea92e7d5ba120fcbacfb8229a7560.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
NEAS.d70ea92e7d5ba120fcbacfb8229a7560.exe
-
Size
704KB
-
MD5
d70ea92e7d5ba120fcbacfb8229a7560
-
SHA1
cdf2a2b7efa4897036f11b87a0ec34042dd57c14
-
SHA256
4e70875a9184940737638018a069b15861ebaeec30bd80cd171a7772ec7eaa7b
-
SHA512
a68ad46b50c5fc2e7035ad5fb273ab1d1b3191ce3d389584f075cc3f0ba1a362bbb29bbd4f17dfed5d5183ce07a0f4971a464e061649929b7aad1746e9fed10e
-
SSDEEP
12288:z8A7urYAnrQg5W/+zrWAI5KFum/+zrWAIAqWim/+zrWAI5KFHTP7rXFr/+zrWAIp:dabnrQg5Wm0BmmvFimm0MTP7hm0b
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jginej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpcpei32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Habndbpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Alfkli32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flekihpc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cojqdhid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Didnmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hfjmajbc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgidgakk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajfobfaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgfmeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jjemle32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elojej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkncno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pqihgcma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bhdbaihi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cliahf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Habndbpf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkmapc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbgiibja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lbabpn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aenpeoom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hjbhph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ffbnin32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfjmajbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jdhigk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pgjfdm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pabknbef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bagmpoco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbifobho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bfpkbfdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cojqdhid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbegakcb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiffoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Obdkfg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baepjpea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eennefib.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjemle32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jqofippg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okcmingd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmmmnp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpjqaldi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqihgcma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Andghd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imfmgcdn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdhigk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ankdbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cellfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kkelmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kcehejic.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iippne32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlgmjdlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fgfmeg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eekjep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjbhph32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcnnjoam.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mncmck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Andghd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Okgfdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" NEAS.d70ea92e7d5ba120fcbacfb8229a7560.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iiaein32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hplimpdi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clfdcgkj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehbihj32.exe -
Executes dropped EXE 64 IoCs
pid Process 3564 Mhfppabl.exe 2172 Odbgdp32.exe 1684 Deidjf32.exe 4464 Eennefib.exe 2196 Elhfbp32.exe 1652 Ellpmolj.exe 1460 Eibmlc32.exe 1864 Fgfmeg32.exe 4992 Fpckjlje.exe 1116 Glmhdm32.exe 2296 Qghlmbae.exe 4732 Agmehamp.exe 224 Akmjdpac.exe 4944 Bfieagka.exe 1420 Bfpkbfdi.exe 2484 Cfedmfqd.exe 408 Eekjep32.exe 1272 Eikpan32.exe 4020 Ellicihn.exe 4744 Ehbihj32.exe 2716 Fibfbm32.exe 4816 Fcmgpbjc.exe 4700 Flekihpc.exe 4264 Fempbm32.exe 1576 Gccmaack.exe 4124 Ggdbmoho.exe 5096 Glchjedc.exe 3888 Hgkimn32.exe 4572 Hcaibo32.exe 3392 Hqjcgbbo.exe 1432 Hjbhph32.exe 3168 Iobmmoed.exe 1268 Imfmgcdn.exe 2448 Imjgbb32.exe 4080 Jjemle32.exe 3616 Jqofippg.exe 5088 Jginej32.exe 4448 Jcpojk32.exe 2520 Jjjggede.exe 4612 Kfaglf32.exe 4460 Kcehejic.exe 3512 Kmmmnp32.exe 2228 Kgcqlh32.exe 4952 Eacaej32.exe 5100 Olidijjf.exe 2800 Fgencf32.exe 648 Koggehff.exe 928 Cemcqcgi.exe 3088 Chlomnfl.exe 4720 Coegih32.exe 1156 Clldhljp.exe 3224 Cojqdhid.exe 3352 Cipebqij.exe 752 Cchikf32.exe 1252 Clqncl32.exe 4316 Damflb32.exe 1272 Didnmp32.exe 4836 Dlckik32.exe 1684 Doageg32.exe 3424 Djgkbp32.exe 1864 Dpcpei32.exe 2484 Dadlmanj.exe 4880 Dohmff32.exe 1160 Dphipidf.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Hcnnjoam.exe Hfjmajbc.exe File opened for modification C:\Windows\SysWOW64\Clfdcgkj.exe Cellfm32.exe File created C:\Windows\SysWOW64\Clfdhpfj.dll Iiaein32.exe File opened for modification C:\Windows\SysWOW64\Dlckik32.exe Didnmp32.exe File opened for modification C:\Windows\SysWOW64\Fcbehbim.exe Ebbinp32.exe File created C:\Windows\SysWOW64\Gbdgjj32.dll Gobicbgf.exe File created C:\Windows\SysWOW64\Ebbinp32.exe Eoapldei.exe File created C:\Windows\SysWOW64\Fcjpffmj.dll Foifmcoa.exe File created C:\Windows\SysWOW64\Dlefhe32.dll Bjpaheio.exe File opened for modification C:\Windows\SysWOW64\Fpckjlje.exe Fgfmeg32.exe File opened for modification C:\Windows\SysWOW64\Qghlmbae.exe Glmhdm32.exe File created C:\Windows\SysWOW64\Kmmmnp32.exe Kcehejic.exe File created C:\Windows\SysWOW64\Podhaopm.dll Clfdcgkj.exe File opened for modification C:\Windows\SysWOW64\Kkelmc32.exe Hplimpdi.exe File created C:\Windows\SysWOW64\Onnmnfpg.dll Plkpmlfi.exe File created C:\Windows\SysWOW64\Pmidfo32.dll Fgfmeg32.exe File created C:\Windows\SysWOW64\Nodqpf32.dll Fibfbm32.exe File created C:\Windows\SysWOW64\Icmaan32.dll Dlckik32.exe File opened for modification C:\Windows\SysWOW64\Okcmingd.exe Oqmhlego.exe File created C:\Windows\SysWOW64\Knjcjjfj.dll Pjalpida.exe File opened for modification C:\Windows\SysWOW64\Papnhbgi.exe Pjffkhpl.exe File created C:\Windows\SysWOW64\Blqnfcom.dll Cliahf32.exe File opened for modification C:\Windows\SysWOW64\Lbabpn32.exe Iiaein32.exe File created C:\Windows\SysWOW64\Doageg32.exe Dlckik32.exe File opened for modification C:\Windows\SysWOW64\Hbegakcb.exe Hadkib32.exe File created C:\Windows\SysWOW64\Oqmhlego.exe Nkncno32.exe File created C:\Windows\SysWOW64\Ognqah32.dll Hplimpdi.exe File created C:\Windows\SysWOW64\Cmmbmhdc.dll Hqjcgbbo.exe File opened for modification C:\Windows\SysWOW64\Giofggia.exe Gmhfbf32.exe File created C:\Windows\SysWOW64\Lojgbmpm.dll Lgnekcei.exe File created C:\Windows\SysWOW64\Kbapdfkb.exe Kiikkada.exe File opened for modification C:\Windows\SysWOW64\Laqlclga.exe Lcpledob.exe File opened for modification C:\Windows\SysWOW64\Mgimmkgp.exe Lbabpn32.exe File created C:\Windows\SysWOW64\Fibfbm32.exe Ehbihj32.exe File created C:\Windows\SysWOW64\Dhiljk32.dll Hcaibo32.exe File created C:\Windows\SysWOW64\Cchikf32.exe Cipebqij.exe File opened for modification C:\Windows\SysWOW64\Blakhgoo.exe Behbkmgb.exe File created C:\Windows\SysWOW64\Cefolk32.exe Colfpace.exe File created C:\Windows\SysWOW64\Iiaein32.exe Dkljka32.exe File created C:\Windows\SysWOW64\Akmjdpac.exe Agmehamp.exe File created C:\Windows\SysWOW64\Damflb32.exe Clqncl32.exe File opened for modification C:\Windows\SysWOW64\Bjbnndgl.exe Bhdbaihi.exe File opened for modification C:\Windows\SysWOW64\Ebbinp32.exe Eoapldei.exe File created C:\Windows\SysWOW64\Mbbmchll.dll Kbapdfkb.exe File opened for modification C:\Windows\SysWOW64\Mgbnfb32.exe Lpfidh32.exe File created C:\Windows\SysWOW64\Ocqncp32.exe Onceji32.exe File opened for modification C:\Windows\SysWOW64\Cldgmgml.exe Bejoqm32.exe File created C:\Windows\SysWOW64\Gknohl32.dll Bfpkbfdi.exe File created C:\Windows\SysWOW64\Naennejb.dll Cfedmfqd.exe File created C:\Windows\SysWOW64\Kiiigchq.dll Jqofippg.exe File created C:\Windows\SysWOW64\Eipmlo32.dll Nddkaddm.exe File opened for modification C:\Windows\SysWOW64\Okgfdm32.exe Ocqncp32.exe File created C:\Windows\SysWOW64\Bhohfj32.exe Baepjpea.exe File created C:\Windows\SysWOW64\Ocimikpg.dll Bhaeli32.exe File created C:\Windows\SysWOW64\Cfonin32.exe Bnkgomnl.exe File created C:\Windows\SysWOW64\Kgcqlh32.exe Kmmmnp32.exe File created C:\Windows\SysWOW64\Fbiooolb.exe Ffbnin32.exe File created C:\Windows\SysWOW64\Hadkib32.exe Hfoflj32.exe File opened for modification C:\Windows\SysWOW64\Bhdbaihi.exe Bbgiibja.exe File created C:\Windows\SysWOW64\Jicckpjk.dll Dlgmjdlg.exe File opened for modification C:\Windows\SysWOW64\Bnkgomnl.exe Mgimmkgp.exe File opened for modification C:\Windows\SysWOW64\Jiglgl32.exe Gikdep32.exe File opened for modification C:\Windows\SysWOW64\Deidjf32.exe Odbgdp32.exe File created C:\Windows\SysWOW64\Iiffoc32.exe Ijaimg32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnqgek32.dll" Jpjqaldi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nacboi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cddemi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nodqpf32.dll" Fibfbm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kmmmnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cipebqij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ejegdngb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ejegdngb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ellpmolj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jqofippg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lpmfnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Elojej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ebkbmqhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ffbnin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bhdbaihi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gikdep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnaiaagp.dll" Pabknbef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjlalacf.dll" Coegih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Elojej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aocbgkic.dll" Kkmapc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nddkaddm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ocnampdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Chlomnfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dohmff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Foifmcoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lpocciba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cknnjcmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbddah32.dll" Fempbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lebpfepo.dll" Kmmmnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcmbia32.dll" Pgjfdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgfceo32.dll" Kkkdjcjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pjalpida.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pclnon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Behbkmgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bbbqbo32.dll" Cldgmgml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pbhdafdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ognqah32.dll" Hplimpdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Femdjbab.dll" Iobmmoed.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jginej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Clqncl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dphipidf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jmgkja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hplimpdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmidfo32.dll" Fgfmeg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ellicihn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hqjcgbbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Coegih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cobciblp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhbkgiif.dll" Gccmaack.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idfedoei.dll" Jjjggede.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fmapag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qgalelin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipmcld32.dll" Papnhbgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Aeemop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Andghd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ellpmolj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijiflg32.dll" Agmehamp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eikpan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eoapldei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Beglin32.dll" Fihqfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bniacddk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bhaeli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Colfpace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gikdep32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 3564 1504 NEAS.d70ea92e7d5ba120fcbacfb8229a7560.exe 86 PID 1504 wrote to memory of 3564 1504 NEAS.d70ea92e7d5ba120fcbacfb8229a7560.exe 86 PID 1504 wrote to memory of 3564 1504 NEAS.d70ea92e7d5ba120fcbacfb8229a7560.exe 86 PID 3564 wrote to memory of 2172 3564 Mhfppabl.exe 89 PID 3564 wrote to memory of 2172 3564 Mhfppabl.exe 89 PID 3564 wrote to memory of 2172 3564 Mhfppabl.exe 89 PID 2172 wrote to memory of 1684 2172 Odbgdp32.exe 90 PID 2172 wrote to memory of 1684 2172 Odbgdp32.exe 90 PID 2172 wrote to memory of 1684 2172 Odbgdp32.exe 90 PID 1684 wrote to memory of 4464 1684 Deidjf32.exe 91 PID 1684 wrote to memory of 4464 1684 Deidjf32.exe 91 PID 1684 wrote to memory of 4464 1684 Deidjf32.exe 91 PID 4464 wrote to memory of 2196 4464 Eennefib.exe 93 PID 4464 wrote to memory of 2196 4464 Eennefib.exe 93 PID 4464 wrote to memory of 2196 4464 Eennefib.exe 93 PID 2196 wrote to memory of 1652 2196 Elhfbp32.exe 94 PID 2196 wrote to memory of 1652 2196 Elhfbp32.exe 94 PID 2196 wrote to memory of 1652 2196 Elhfbp32.exe 94 PID 1652 wrote to memory of 1460 1652 Ellpmolj.exe 95 PID 1652 wrote to memory of 1460 1652 Ellpmolj.exe 95 PID 1652 wrote to memory of 1460 1652 Ellpmolj.exe 95 PID 1460 wrote to memory of 1864 1460 Eibmlc32.exe 96 PID 1460 wrote to memory of 1864 1460 Eibmlc32.exe 96 PID 1460 wrote to memory of 1864 1460 Eibmlc32.exe 96 PID 1864 wrote to memory of 4992 1864 Fgfmeg32.exe 97 PID 1864 wrote to memory of 4992 1864 Fgfmeg32.exe 97 PID 1864 wrote to memory of 4992 1864 Fgfmeg32.exe 97 PID 4992 wrote to memory of 1116 4992 Fpckjlje.exe 98 PID 4992 wrote to memory of 1116 4992 Fpckjlje.exe 98 PID 4992 wrote to memory of 1116 4992 Fpckjlje.exe 98 PID 1116 wrote to memory of 2296 1116 Glmhdm32.exe 100 PID 1116 wrote to memory of 2296 1116 Glmhdm32.exe 100 PID 1116 wrote to memory of 2296 1116 Glmhdm32.exe 100 PID 2296 wrote to memory of 4732 2296 Qghlmbae.exe 101 PID 2296 wrote to memory of 4732 2296 Qghlmbae.exe 101 PID 2296 wrote to memory of 4732 2296 Qghlmbae.exe 101 PID 4732 wrote to memory of 224 4732 Agmehamp.exe 102 PID 4732 wrote to memory of 224 4732 Agmehamp.exe 102 PID 4732 wrote to memory of 224 4732 Agmehamp.exe 102 PID 224 wrote to memory of 4944 224 Akmjdpac.exe 103 PID 224 wrote to memory of 4944 224 Akmjdpac.exe 103 PID 224 wrote to memory of 4944 224 Akmjdpac.exe 103 PID 4944 wrote to memory of 1420 4944 Bfieagka.exe 104 PID 4944 wrote to memory of 1420 4944 Bfieagka.exe 104 PID 4944 wrote to memory of 1420 4944 Bfieagka.exe 104 PID 1420 wrote to memory of 2484 1420 Bfpkbfdi.exe 105 PID 1420 wrote to memory of 2484 1420 Bfpkbfdi.exe 105 PID 1420 wrote to memory of 2484 1420 Bfpkbfdi.exe 105 PID 2484 wrote to memory of 408 2484 Cfedmfqd.exe 106 PID 2484 wrote to memory of 408 2484 Cfedmfqd.exe 106 PID 2484 wrote to memory of 408 2484 Cfedmfqd.exe 106 PID 408 wrote to memory of 1272 408 Eekjep32.exe 107 PID 408 wrote to memory of 1272 408 Eekjep32.exe 107 PID 408 wrote to memory of 1272 408 Eekjep32.exe 107 PID 1272 wrote to memory of 4020 1272 Eikpan32.exe 109 PID 1272 wrote to memory of 4020 1272 Eikpan32.exe 109 PID 1272 wrote to memory of 4020 1272 Eikpan32.exe 109 PID 4020 wrote to memory of 4744 4020 Ellicihn.exe 110 PID 4020 wrote to memory of 4744 4020 Ellicihn.exe 110 PID 4020 wrote to memory of 4744 4020 Ellicihn.exe 110 PID 4744 wrote to memory of 2716 4744 Ehbihj32.exe 111 PID 4744 wrote to memory of 2716 4744 Ehbihj32.exe 111 PID 4744 wrote to memory of 2716 4744 Ehbihj32.exe 111 PID 2716 wrote to memory of 4816 2716 Fibfbm32.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d70ea92e7d5ba120fcbacfb8229a7560.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d70ea92e7d5ba120fcbacfb8229a7560.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\Mhfppabl.exeC:\Windows\system32\Mhfppabl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\Odbgdp32.exeC:\Windows\system32\Odbgdp32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\Deidjf32.exeC:\Windows\system32\Deidjf32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\Eennefib.exeC:\Windows\system32\Eennefib.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\Elhfbp32.exeC:\Windows\system32\Elhfbp32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\Ellpmolj.exeC:\Windows\system32\Ellpmolj.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\Eibmlc32.exeC:\Windows\system32\Eibmlc32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\Fgfmeg32.exeC:\Windows\system32\Fgfmeg32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\Fpckjlje.exeC:\Windows\system32\Fpckjlje.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\Glmhdm32.exeC:\Windows\system32\Glmhdm32.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\Qghlmbae.exeC:\Windows\system32\Qghlmbae.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\Agmehamp.exeC:\Windows\system32\Agmehamp.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\Akmjdpac.exeC:\Windows\system32\Akmjdpac.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\Bfieagka.exeC:\Windows\system32\Bfieagka.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\Bfpkbfdi.exeC:\Windows\system32\Bfpkbfdi.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\Cfedmfqd.exeC:\Windows\system32\Cfedmfqd.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Eekjep32.exeC:\Windows\system32\Eekjep32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\Eikpan32.exeC:\Windows\system32\Eikpan32.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\Ellicihn.exeC:\Windows\system32\Ellicihn.exe20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\Ehbihj32.exeC:\Windows\system32\Ehbihj32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\Fibfbm32.exeC:\Windows\system32\Fibfbm32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\Fcmgpbjc.exeC:\Windows\system32\Fcmgpbjc.exe23⤵
- Executes dropped EXE
PID:4816
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Flekihpc.exeC:\Windows\system32\Flekihpc.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4700 -
C:\Windows\SysWOW64\Fempbm32.exeC:\Windows\system32\Fempbm32.exe2⤵
- Executes dropped EXE
- Modifies registry class
PID:4264 -
C:\Windows\SysWOW64\Gccmaack.exeC:\Windows\system32\Gccmaack.exe3⤵
- Executes dropped EXE
- Modifies registry class
PID:1576 -
C:\Windows\SysWOW64\Ggdbmoho.exeC:\Windows\system32\Ggdbmoho.exe4⤵
- Executes dropped EXE
PID:4124 -
C:\Windows\SysWOW64\Glchjedc.exeC:\Windows\system32\Glchjedc.exe5⤵
- Executes dropped EXE
PID:5096 -
C:\Windows\SysWOW64\Hgkimn32.exeC:\Windows\system32\Hgkimn32.exe6⤵
- Executes dropped EXE
PID:3888 -
C:\Windows\SysWOW64\Hcaibo32.exeC:\Windows\system32\Hcaibo32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4572 -
C:\Windows\SysWOW64\Hqjcgbbo.exeC:\Windows\system32\Hqjcgbbo.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3392 -
C:\Windows\SysWOW64\Hjbhph32.exeC:\Windows\system32\Hjbhph32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1432 -
C:\Windows\SysWOW64\Iobmmoed.exeC:\Windows\system32\Iobmmoed.exe10⤵
- Executes dropped EXE
- Modifies registry class
PID:3168 -
C:\Windows\SysWOW64\Imfmgcdn.exeC:\Windows\system32\Imfmgcdn.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1268 -
C:\Windows\SysWOW64\Imjgbb32.exeC:\Windows\system32\Imjgbb32.exe12⤵
- Executes dropped EXE
PID:2448 -
C:\Windows\SysWOW64\Jjemle32.exeC:\Windows\system32\Jjemle32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4080 -
C:\Windows\SysWOW64\Jqofippg.exeC:\Windows\system32\Jqofippg.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3616 -
C:\Windows\SysWOW64\Jginej32.exeC:\Windows\system32\Jginej32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:5088 -
C:\Windows\SysWOW64\Jcpojk32.exeC:\Windows\system32\Jcpojk32.exe16⤵
- Executes dropped EXE
PID:4448 -
C:\Windows\SysWOW64\Jjjggede.exeC:\Windows\system32\Jjjggede.exe17⤵
- Executes dropped EXE
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Kfaglf32.exeC:\Windows\system32\Kfaglf32.exe18⤵
- Executes dropped EXE
PID:4612 -
C:\Windows\SysWOW64\Kcehejic.exeC:\Windows\system32\Kcehejic.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4460 -
C:\Windows\SysWOW64\Kmmmnp32.exeC:\Windows\system32\Kmmmnp32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3512 -
C:\Windows\SysWOW64\Kgcqlh32.exeC:\Windows\system32\Kgcqlh32.exe21⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\Eacaej32.exeC:\Windows\system32\Eacaej32.exe22⤵
- Executes dropped EXE
PID:4952 -
C:\Windows\SysWOW64\Olidijjf.exeC:\Windows\system32\Olidijjf.exe23⤵
- Executes dropped EXE
PID:5100 -
C:\Windows\SysWOW64\Fgencf32.exeC:\Windows\system32\Fgencf32.exe24⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Koggehff.exeC:\Windows\system32\Koggehff.exe25⤵
- Executes dropped EXE
PID:648 -
C:\Windows\SysWOW64\Cemcqcgi.exeC:\Windows\system32\Cemcqcgi.exe26⤵
- Executes dropped EXE
PID:928 -
C:\Windows\SysWOW64\Chlomnfl.exeC:\Windows\system32\Chlomnfl.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:3088 -
C:\Windows\SysWOW64\Coegih32.exeC:\Windows\system32\Coegih32.exe28⤵
- Executes dropped EXE
- Modifies registry class
PID:4720 -
C:\Windows\SysWOW64\Clldhljp.exeC:\Windows\system32\Clldhljp.exe29⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\SysWOW64\Cojqdhid.exeC:\Windows\system32\Cojqdhid.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3224 -
C:\Windows\SysWOW64\Cipebqij.exeC:\Windows\system32\Cipebqij.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3352 -
C:\Windows\SysWOW64\Cchikf32.exeC:\Windows\system32\Cchikf32.exe32⤵
- Executes dropped EXE
PID:752 -
C:\Windows\SysWOW64\Clqncl32.exeC:\Windows\system32\Clqncl32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1252 -
C:\Windows\SysWOW64\Damflb32.exeC:\Windows\system32\Damflb32.exe34⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\Didnmp32.exeC:\Windows\system32\Didnmp32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1272 -
C:\Windows\SysWOW64\Dlckik32.exeC:\Windows\system32\Dlckik32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4836 -
C:\Windows\SysWOW64\Doageg32.exeC:\Windows\system32\Doageg32.exe37⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\Djgkbp32.exeC:\Windows\system32\Djgkbp32.exe38⤵
- Executes dropped EXE
PID:3424 -
C:\Windows\SysWOW64\Dpcpei32.exeC:\Windows\system32\Dpcpei32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\Dadlmanj.exeC:\Windows\system32\Dadlmanj.exe40⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\Dohmff32.exeC:\Windows\system32\Dohmff32.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:4880 -
C:\Windows\SysWOW64\Dphipidf.exeC:\Windows\system32\Dphipidf.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:1160 -
C:\Windows\SysWOW64\Ebifha32.exeC:\Windows\system32\Ebifha32.exe43⤵PID:4684
-
C:\Windows\SysWOW64\Elojej32.exeC:\Windows\system32\Elojej32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2744 -
C:\Windows\SysWOW64\Ebkbmqhb.exeC:\Windows\system32\Ebkbmqhb.exe45⤵
- Modifies registry class
PID:1080 -
C:\Windows\SysWOW64\Eoocfegl.exeC:\Windows\system32\Eoocfegl.exe46⤵PID:4292
-
C:\Windows\SysWOW64\Ejegdngb.exeC:\Windows\system32\Ejegdngb.exe47⤵
- Modifies registry class
PID:4840 -
C:\Windows\SysWOW64\Eoapldei.exeC:\Windows\system32\Eoapldei.exe48⤵
- Drops file in System32 directory
- Modifies registry class
PID:3956 -
C:\Windows\SysWOW64\Ebbinp32.exeC:\Windows\system32\Ebbinp32.exe49⤵
- Drops file in System32 directory
PID:4460 -
C:\Windows\SysWOW64\Fcbehbim.exeC:\Windows\system32\Fcbehbim.exe50⤵PID:492
-
C:\Windows\SysWOW64\Foifmcoa.exeC:\Windows\system32\Foifmcoa.exe51⤵
- Drops file in System32 directory
- Modifies registry class
PID:3240 -
C:\Windows\SysWOW64\Ffbnin32.exeC:\Windows\system32\Ffbnin32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4616 -
C:\Windows\SysWOW64\Fbiooolb.exeC:\Windows\system32\Fbiooolb.exe53⤵PID:1772
-
C:\Windows\SysWOW64\Fmoclg32.exeC:\Windows\system32\Fmoclg32.exe54⤵PID:4552
-
C:\Windows\SysWOW64\Fmapag32.exeC:\Windows\system32\Fmapag32.exe55⤵
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\Fihqfh32.exeC:\Windows\system32\Fihqfh32.exe56⤵
- Modifies registry class
PID:3084 -
C:\Windows\SysWOW64\Gobicbgf.exeC:\Windows\system32\Gobicbgf.exe57⤵
- Drops file in System32 directory
PID:4464 -
C:\Windows\SysWOW64\Gjgmpkfl.exeC:\Windows\system32\Gjgmpkfl.exe58⤵PID:3692
-
C:\Windows\SysWOW64\Gcpaiq32.exeC:\Windows\system32\Gcpaiq32.exe59⤵PID:4084
-
C:\Windows\SysWOW64\Gmhfbf32.exeC:\Windows\system32\Gmhfbf32.exe60⤵
- Drops file in System32 directory
PID:2272 -
C:\Windows\SysWOW64\Giofggia.exeC:\Windows\system32\Giofggia.exe61⤵PID:2364
-
C:\Windows\SysWOW64\Hclaeocp.exeC:\Windows\system32\Hclaeocp.exe62⤵PID:776
-
C:\Windows\SysWOW64\Hfjmajbc.exeC:\Windows\system32\Hfjmajbc.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\Hcnnjoam.exeC:\Windows\system32\Hcnnjoam.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2488 -
C:\Windows\SysWOW64\Habndbpf.exeC:\Windows\system32\Habndbpf.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1464 -
C:\Windows\SysWOW64\Hfoflj32.exeC:\Windows\system32\Hfoflj32.exe66⤵
- Drops file in System32 directory
PID:460 -
C:\Windows\SysWOW64\Hadkib32.exeC:\Windows\system32\Hadkib32.exe67⤵
- Drops file in System32 directory
PID:1328 -
C:\Windows\SysWOW64\Hbegakcb.exeC:\Windows\system32\Hbegakcb.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4752 -
C:\Windows\SysWOW64\Iippne32.exeC:\Windows\system32\Iippne32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4324 -
C:\Windows\SysWOW64\Ipihkobl.exeC:\Windows\system32\Ipihkobl.exe70⤵PID:4936
-
C:\Windows\SysWOW64\Immhdc32.exeC:\Windows\system32\Immhdc32.exe71⤵PID:3160
-
C:\Windows\SysWOW64\Ijaimg32.exeC:\Windows\system32\Ijaimg32.exe72⤵
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\Iiffoc32.exeC:\Windows\system32\Iiffoc32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1740 -
C:\Windows\SysWOW64\Ibojgikg.exeC:\Windows\system32\Ibojgikg.exe74⤵PID:4164
-
C:\Windows\SysWOW64\Idnfal32.exeC:\Windows\system32\Idnfal32.exe75⤵PID:2716
-
C:\Windows\SysWOW64\Jmgkja32.exeC:\Windows\system32\Jmgkja32.exe76⤵
- Modifies registry class
PID:1620 -
C:\Windows\SysWOW64\Jbccbi32.exeC:\Windows\system32\Jbccbi32.exe77⤵PID:4428
-
C:\Windows\SysWOW64\Jjmhie32.exeC:\Windows\system32\Jjmhie32.exe78⤵PID:4932
-
C:\Windows\SysWOW64\Jpjqaldi.exeC:\Windows\system32\Jpjqaldi.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5052 -
C:\Windows\SysWOW64\Jfdinf32.exeC:\Windows\system32\Jfdinf32.exe80⤵PID:4040
-
C:\Windows\SysWOW64\Jdhigk32.exeC:\Windows\system32\Jdhigk32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:224 -
C:\Windows\SysWOW64\Jidbpa32.exeC:\Windows\system32\Jidbpa32.exe82⤵PID:2124
-
C:\Windows\SysWOW64\Jpojml32.exeC:\Windows\system32\Jpojml32.exe83⤵PID:2808
-
C:\Windows\SysWOW64\Kpagbk32.exeC:\Windows\system32\Kpagbk32.exe84⤵PID:4688
-
C:\Windows\SysWOW64\Kiikkada.exeC:\Windows\system32\Kiikkada.exe85⤵
- Drops file in System32 directory
PID:1580 -
C:\Windows\SysWOW64\Kbapdfkb.exeC:\Windows\system32\Kbapdfkb.exe86⤵
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\Kpepmkjl.exeC:\Windows\system32\Kpepmkjl.exe87⤵PID:4072
-
C:\Windows\SysWOW64\Kkkdjcjb.exeC:\Windows\system32\Kkkdjcjb.exe88⤵
- Modifies registry class
PID:3616 -
C:\Windows\SysWOW64\Kkmapc32.exeC:\Windows\system32\Kkmapc32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1028 -
C:\Windows\SysWOW64\Libnapmg.exeC:\Windows\system32\Libnapmg.exe90⤵PID:2892
-
C:\Windows\SysWOW64\Lpmfnj32.exeC:\Windows\system32\Lpmfnj32.exe91⤵
- Modifies registry class
PID:2832 -
C:\Windows\SysWOW64\Lpocciba.exeC:\Windows\system32\Lpocciba.exe92⤵
- Modifies registry class
PID:3564 -
C:\Windows\SysWOW64\Lkdgqbag.exeC:\Windows\system32\Lkdgqbag.exe93⤵PID:4652
-
C:\Windows\SysWOW64\Lcpledob.exeC:\Windows\system32\Lcpledob.exe94⤵
- Drops file in System32 directory
PID:1088 -
C:\Windows\SysWOW64\Laqlclga.exeC:\Windows\system32\Laqlclga.exe95⤵PID:4964
-
C:\Windows\SysWOW64\Lgnekcei.exeC:\Windows\system32\Lgnekcei.exe96⤵
- Drops file in System32 directory
PID:5140 -
C:\Windows\SysWOW64\Lpfidh32.exeC:\Windows\system32\Lpfidh32.exe97⤵
- Drops file in System32 directory
PID:5184 -
C:\Windows\SysWOW64\Mgbnfb32.exeC:\Windows\system32\Mgbnfb32.exe98⤵PID:5224
-
C:\Windows\SysWOW64\Mahbck32.exeC:\Windows\system32\Mahbck32.exe99⤵PID:5268
-
C:\Windows\SysWOW64\Mciokcgg.exeC:\Windows\system32\Mciokcgg.exe100⤵PID:5312
-
C:\Windows\SysWOW64\Mdhkefnj.exeC:\Windows\system32\Mdhkefnj.exe101⤵PID:5356
-
C:\Windows\SysWOW64\Mallojmd.exeC:\Windows\system32\Mallojmd.exe102⤵PID:5396
-
C:\Windows\SysWOW64\Mgidgakk.exeC:\Windows\system32\Mgidgakk.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5444 -
C:\Windows\SysWOW64\Mncmck32.exeC:\Windows\system32\Mncmck32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5488 -
C:\Windows\SysWOW64\Nglala32.exeC:\Windows\system32\Nglala32.exe105⤵PID:5532
-
C:\Windows\SysWOW64\Ndpafe32.exeC:\Windows\system32\Ndpafe32.exe106⤵PID:5576
-
C:\Windows\SysWOW64\Nacboi32.exeC:\Windows\system32\Nacboi32.exe107⤵
- Modifies registry class
PID:5620 -
C:\Windows\SysWOW64\Nddkaddm.exeC:\Windows\system32\Nddkaddm.exe108⤵
- Drops file in System32 directory
- Modifies registry class
PID:5664 -
C:\Windows\SysWOW64\Nkncno32.exeC:\Windows\system32\Nkncno32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5708 -
C:\Windows\SysWOW64\Oqmhlego.exeC:\Windows\system32\Oqmhlego.exe110⤵
- Drops file in System32 directory
PID:5760 -
C:\Windows\SysWOW64\Okcmingd.exeC:\Windows\system32\Okcmingd.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5824 -
C:\Windows\SysWOW64\Ocnampdp.exeC:\Windows\system32\Ocnampdp.exe112⤵
- Modifies registry class
PID:5884 -
C:\Windows\SysWOW64\Onceji32.exeC:\Windows\system32\Onceji32.exe113⤵
- Drops file in System32 directory
PID:5948 -
C:\Windows\SysWOW64\Ocqncp32.exeC:\Windows\system32\Ocqncp32.exe114⤵
- Drops file in System32 directory
PID:6020 -
C:\Windows\SysWOW64\Okgfdm32.exeC:\Windows\system32\Okgfdm32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6064 -
C:\Windows\SysWOW64\Oqdnld32.exeC:\Windows\system32\Oqdnld32.exe116⤵PID:6112
-
C:\Windows\SysWOW64\Occkhp32.exeC:\Windows\system32\Occkhp32.exe117⤵PID:5132
-
C:\Windows\SysWOW64\Ojmcej32.exeC:\Windows\system32\Ojmcej32.exe118⤵PID:5212
-
C:\Windows\SysWOW64\Obdkfg32.exeC:\Windows\system32\Obdkfg32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3292 -
C:\Windows\SysWOW64\Ogqcon32.exeC:\Windows\system32\Ogqcon32.exe120⤵PID:5332
-
C:\Windows\SysWOW64\Pqihgcma.exeC:\Windows\system32\Pqihgcma.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5388 -
C:\Windows\SysWOW64\Pjalpida.exeC:\Windows\system32\Pjalpida.exe122⤵
- Drops file in System32 directory
- Modifies registry class
PID:5480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-