Analysis
-
max time kernel
129s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 08:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.f4fc49115ead3aa25e2f9e110abadc70.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.f4fc49115ead3aa25e2f9e110abadc70.exe
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
NEAS.f4fc49115ead3aa25e2f9e110abadc70.exe
-
Size
404KB
-
MD5
f4fc49115ead3aa25e2f9e110abadc70
-
SHA1
86c7974565228f0c5e21ab810ad0c798b023b794
-
SHA256
820fa177dd4863b89ebe41154e2e604efd62202cdb22d336944ae01167555a35
-
SHA512
9a80849b953da895665a311d0cb6f9783005d6fa5ab43d828704e9446b70d0188a2f6e108e9dc88edd263a0ed99d16f3faf25168f38adfd520952eaa82da40aa
-
SSDEEP
12288:2FlMWWKewcMpV6yYP4rbpV6yYPg058KS:ymWXewcMW4XWleKS
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lankloml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqlbqlmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iklgkmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jcdjka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ppiklc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdkkjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cppfgnlj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Digeaenp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pndlca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lohqgj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okkidceh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eeagnc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apeabg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pidamcgd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efamkepl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaqmej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckhlgilp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kgflmo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpodhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dpnbhl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgnfpp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fecmjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hiomppkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mkcjlf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbqkfhfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Colklb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fgdbgbof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Klddgfbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oepipo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mndapl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlclnhho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jmjojh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Abkjnd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Locbpi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edjgpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Njkklk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ihhmaehj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ehlhbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bagmpoco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhqaokcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Olgdgibf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnahmo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghcjedcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baanhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nfnafpni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fllplajo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Llbinnbq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jlgeig32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjlfkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fchdnkpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ifpemmdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pmnbpm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hagodlge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nqhfhjhl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adadbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gmnfglcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qleahgff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkmbbajb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fnipliip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fmdcamko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eknpfj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppjghgdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ojgjhicl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Clmjcfdb.exe -
Executes dropped EXE 64 IoCs
pid Process 4716 Kiajck32.exe 3100 Mmfaafej.exe 1000 Ncbfcp32.exe 2452 Npnqcpmc.exe 3520 Olgnnqpe.exe 2508 Oiphbd32.exe 4436 Pidamcgd.exe 4292 Ppafpm32.exe 500 Pkigbfja.exe 2636 Pgbdmfnc.exe 2596 Aiejda32.exe 1260 Agikne32.exe 4656 Adadbi32.exe 3888 Bjcfeola.exe 848 Cgpjebcp.exe 4528 Ckqoapgd.exe 4488 Djhiglji.exe 2216 Ddpjjd32.exe 4884 Dcegkamd.exe 2928 Egjebn32.exe 3400 Eljknl32.exe 3676 Fmndkd32.exe 2092 Fjdajhbi.exe 1864 Fnbjpf32.exe 4532 Gjkgkg32.exe 4432 Gmlplbib.exe 4772 Hmecba32.exe 3824 Haclio32.exe 3936 Hlkmlhea.exe 436 Ilbclg32.exe 2336 Ihicah32.exe 3872 Jnjednnp.exe 3636 Jahnkl32.exe 2228 Jndhkmfe.exe 4344 Koeajo32.exe 1324 Kkaljpmd.exe 1160 Ldqfddml.exe 2692 Miqlpbap.exe 3800 Mnbnchlb.exe 1944 Mndjhhjp.exe 2488 Nmmqgo32.exe 4828 Nmajbnha.exe 5068 Olkqnjhd.exe 2988 Pblolb32.exe 2540 Peodcmeg.exe 5080 Qlpcpffl.exe 532 Ampojimo.exe 4628 Amdiei32.exe 3844 Aepmjk32.exe 5052 Agojdnng.exe 1600 Bcmqin32.exe 1656 Bjielh32.exe 212 Cohkinob.exe 3772 Cjpllgme.exe 4420 Cfglahbj.exe 2056 Dnjdncio.exe 4172 Eqdpfm32.exe 4060 Fmbflm32.exe 1120 Fggkifmg.exe 964 Fmdcamko.exe 2952 Gndpkp32.exe 4308 Gcceifof.exe 3964 Gceaofmc.exe 1980 Gmnfglcd.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Icoail32.dll Cbcieqpd.exe File opened for modification C:\Windows\SysWOW64\Bfkkhdlk.exe Akffjkme.exe File created C:\Windows\SysWOW64\Gckghp32.dll Colklb32.exe File created C:\Windows\SysWOW64\Cndecn32.exe Chglkg32.exe File opened for modification C:\Windows\SysWOW64\Efnbqi32.exe Emenhcdf.exe File created C:\Windows\SysWOW64\Immhdc32.exe Ipihkobl.exe File created C:\Windows\SysWOW64\Aiedaoip.dll Aalndaml.exe File created C:\Windows\SysWOW64\Aiipca32.dll Jnhinq32.exe File opened for modification C:\Windows\SysWOW64\Kdfjej32.exe Kddnpj32.exe File created C:\Windows\SysWOW64\Jleicg32.exe Jghpkq32.exe File created C:\Windows\SysWOW64\Peodcmeg.exe Pblolb32.exe File created C:\Windows\SysWOW64\Iepepgmo.dll Djqbeonf.exe File created C:\Windows\SysWOW64\Pgoijppn.dll Dpfcpcam.exe File opened for modification C:\Windows\SysWOW64\Aapnfe32.exe Afjjil32.exe File opened for modification C:\Windows\SysWOW64\Akcjel32.exe Afgame32.exe File created C:\Windows\SysWOW64\Loedajao.exe Liikiccg.exe File created C:\Windows\SysWOW64\Pceihj32.dll Ombcdo32.exe File created C:\Windows\SysWOW64\Ppdbqchi.exe Pjhihm32.exe File created C:\Windows\SysWOW64\Fjdajhbi.exe Fmndkd32.exe File opened for modification C:\Windows\SysWOW64\Fqcilgji.exe Eqalfgll.exe File created C:\Windows\SysWOW64\Qnklcn32.dll Jdpkoalc.exe File created C:\Windows\SysWOW64\Lohqgj32.exe Leplndhk.exe File opened for modification C:\Windows\SysWOW64\Jahnkl32.exe Jnjednnp.exe File created C:\Windows\SysWOW64\Lcakilpk.dll Amdiei32.exe File created C:\Windows\SysWOW64\Fdimglke.dll Pkngco32.exe File created C:\Windows\SysWOW64\Kddnpj32.exe Jkligd32.exe File created C:\Windows\SysWOW64\Kpnden32.dll Hlblmd32.exe File opened for modification C:\Windows\SysWOW64\Ilbclg32.exe Hlkmlhea.exe File opened for modification C:\Windows\SysWOW64\Qleahgff.exe Poodicio.exe File opened for modification C:\Windows\SysWOW64\Bbbkmebo.exe Blecdn32.exe File created C:\Windows\SysWOW64\Epgobe32.dll Ilbclg32.exe File created C:\Windows\SysWOW64\Feegfd32.dll Neqoidmo.exe File created C:\Windows\SysWOW64\Addabl32.exe Aklmjfad.exe File created C:\Windows\SysWOW64\Filailgl.exe Fbbhla32.exe File created C:\Windows\SysWOW64\Edkddeag.exe Eoollocp.exe File created C:\Windows\SysWOW64\Fmifnhap.dll Olgdgibf.exe File created C:\Windows\SysWOW64\Nkodld32.dll Ppiklc32.exe File created C:\Windows\SysWOW64\Ggfgegho.exe Gpkbaekd.exe File created C:\Windows\SysWOW64\Cgpjebcp.exe Bjcfeola.exe File created C:\Windows\SysWOW64\Dngdfc32.dll Peodcmeg.exe File created C:\Windows\SysWOW64\Fiilmofe.exe Eigohp32.exe File created C:\Windows\SysWOW64\Djqbeonf.exe Dkpbgh32.exe File created C:\Windows\SysWOW64\Aqhopg32.dll Lqfgfclm.exe File created C:\Windows\SysWOW64\Ggnolcfa.dll Ehlhbn32.exe File created C:\Windows\SysWOW64\Iopghggd.dll Mlnijmhc.exe File created C:\Windows\SysWOW64\Pkoneo32.dll Iqmincia.exe File created C:\Windows\SysWOW64\Gdaomobj.exe Glgjfb32.exe File opened for modification C:\Windows\SysWOW64\Clgbfe32.exe Cnfahn32.exe File opened for modification C:\Windows\SysWOW64\Hfodnd32.exe Hlipal32.exe File opened for modification C:\Windows\SysWOW64\Pplhab32.exe Pjopil32.exe File created C:\Windows\SysWOW64\Npnqcpmc.exe Ncbfcp32.exe File opened for modification C:\Windows\SysWOW64\Mlnijmhc.exe Medqmb32.exe File created C:\Windows\SysWOW64\Gmbmefob.exe Gfhehlhe.exe File opened for modification C:\Windows\SysWOW64\Dohmff32.exe Djihhoao.exe File opened for modification C:\Windows\SysWOW64\Eeeaibid.exe Ekpmljin.exe File created C:\Windows\SysWOW64\Olgnnqpe.exe Npnqcpmc.exe File created C:\Windows\SysWOW64\Iikdpi32.dll Egjebn32.exe File opened for modification C:\Windows\SysWOW64\Fmjjqhpn.exe Fqcilgji.exe File created C:\Windows\SysWOW64\Ombcdo32.exe Opnbjk32.exe File created C:\Windows\SysWOW64\Cpajdc32.exe Ckealm32.exe File opened for modification C:\Windows\SysWOW64\Ojjfpjjj.exe Ocnampdp.exe File created C:\Windows\SysWOW64\Bipjbe32.dll Gnaodbhl.exe File opened for modification C:\Windows\SysWOW64\Fdcjfg32.exe Fhmiqfma.exe File opened for modification C:\Windows\SysWOW64\Mamcddhg.exe Ljbnpbkl.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 10880 10824 WerFault.exe 872 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kchmljab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gjlfkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oepipo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bcdlgnkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjdegg32.dll" Lnohemjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ngeaej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pjopil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhhiff32.dll" Kcfiof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npckcb32.dll" Miofcked.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gdaomobj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Modgnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mqpcdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Knpmcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekejap32.dll" Nophfa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mekmgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbbpfpgf.dll" Hajkjkdb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nihdhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnmihgic.dll" Aapnfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kopmaddf.dll" Ikpjkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjbleonn.dll" Olkqnjhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cafhap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ciebfc32.dll" Allpnplb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpfmidbh.dll" Fdiohnek.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hfnpacjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oloaamqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cahdhhep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pjopil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibfafq32.dll" Mqpcdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nfjofg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eqgmgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppljlh32.dll" Ppdbqchi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nqlbqlmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Klddgfbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emkhonph.dll" Oceepj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdlmmmim.dll" Pndlca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjbafp32.dll" Mbdiecbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pijiif32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mebkbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cjecjahd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dpfcpcam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Olgnnqpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aklmjfad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Blihca32.dll" Fllkjd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Haclio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qjakpc32.dll" Cgijnk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dhgfoioi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mlkejgfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mkhajq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbppah32.dll" Bdmmnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kaehlb32.dll" Inpclnnj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jdkadb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dkpbgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lmkbpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fnbjpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kfhkop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Elccpife.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggcgjk32.dll" Ncmhee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Baocpnmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cbkncd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iomood32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nnmmleja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmhqef32.dll" Medqmb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gfcebf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paceoa32.dll" Bonhqnpi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 680 wrote to memory of 4716 680 NEAS.f4fc49115ead3aa25e2f9e110abadc70.exe 85 PID 680 wrote to memory of 4716 680 NEAS.f4fc49115ead3aa25e2f9e110abadc70.exe 85 PID 680 wrote to memory of 4716 680 NEAS.f4fc49115ead3aa25e2f9e110abadc70.exe 85 PID 4716 wrote to memory of 3100 4716 Kiajck32.exe 86 PID 4716 wrote to memory of 3100 4716 Kiajck32.exe 86 PID 4716 wrote to memory of 3100 4716 Kiajck32.exe 86 PID 3100 wrote to memory of 1000 3100 Mmfaafej.exe 87 PID 3100 wrote to memory of 1000 3100 Mmfaafej.exe 87 PID 3100 wrote to memory of 1000 3100 Mmfaafej.exe 87 PID 1000 wrote to memory of 2452 1000 Ncbfcp32.exe 89 PID 1000 wrote to memory of 2452 1000 Ncbfcp32.exe 89 PID 1000 wrote to memory of 2452 1000 Ncbfcp32.exe 89 PID 2452 wrote to memory of 3520 2452 Npnqcpmc.exe 90 PID 2452 wrote to memory of 3520 2452 Npnqcpmc.exe 90 PID 2452 wrote to memory of 3520 2452 Npnqcpmc.exe 90 PID 3520 wrote to memory of 2508 3520 Olgnnqpe.exe 91 PID 3520 wrote to memory of 2508 3520 Olgnnqpe.exe 91 PID 3520 wrote to memory of 2508 3520 Olgnnqpe.exe 91 PID 2508 wrote to memory of 4436 2508 Oiphbd32.exe 92 PID 2508 wrote to memory of 4436 2508 Oiphbd32.exe 92 PID 2508 wrote to memory of 4436 2508 Oiphbd32.exe 92 PID 4436 wrote to memory of 4292 4436 Pidamcgd.exe 93 PID 4436 wrote to memory of 4292 4436 Pidamcgd.exe 93 PID 4436 wrote to memory of 4292 4436 Pidamcgd.exe 93 PID 4292 wrote to memory of 500 4292 Ppafpm32.exe 94 PID 4292 wrote to memory of 500 4292 Ppafpm32.exe 94 PID 4292 wrote to memory of 500 4292 Ppafpm32.exe 94 PID 500 wrote to memory of 2636 500 Pkigbfja.exe 95 PID 500 wrote to memory of 2636 500 Pkigbfja.exe 95 PID 500 wrote to memory of 2636 500 Pkigbfja.exe 95 PID 2636 wrote to memory of 2596 2636 Pgbdmfnc.exe 96 PID 2636 wrote to memory of 2596 2636 Pgbdmfnc.exe 96 PID 2636 wrote to memory of 2596 2636 Pgbdmfnc.exe 96 PID 2596 wrote to memory of 1260 2596 Aiejda32.exe 97 PID 2596 wrote to memory of 1260 2596 Aiejda32.exe 97 PID 2596 wrote to memory of 1260 2596 Aiejda32.exe 97 PID 1260 wrote to memory of 4656 1260 Agikne32.exe 98 PID 1260 wrote to memory of 4656 1260 Agikne32.exe 98 PID 1260 wrote to memory of 4656 1260 Agikne32.exe 98 PID 4656 wrote to memory of 3888 4656 Adadbi32.exe 99 PID 4656 wrote to memory of 3888 4656 Adadbi32.exe 99 PID 4656 wrote to memory of 3888 4656 Adadbi32.exe 99 PID 3888 wrote to memory of 848 3888 Bjcfeola.exe 100 PID 3888 wrote to memory of 848 3888 Bjcfeola.exe 100 PID 3888 wrote to memory of 848 3888 Bjcfeola.exe 100 PID 848 wrote to memory of 4528 848 Cgpjebcp.exe 101 PID 848 wrote to memory of 4528 848 Cgpjebcp.exe 101 PID 848 wrote to memory of 4528 848 Cgpjebcp.exe 101 PID 4528 wrote to memory of 4488 4528 Ckqoapgd.exe 102 PID 4528 wrote to memory of 4488 4528 Ckqoapgd.exe 102 PID 4528 wrote to memory of 4488 4528 Ckqoapgd.exe 102 PID 4488 wrote to memory of 2216 4488 Djhiglji.exe 103 PID 4488 wrote to memory of 2216 4488 Djhiglji.exe 103 PID 4488 wrote to memory of 2216 4488 Djhiglji.exe 103 PID 2216 wrote to memory of 4884 2216 Ddpjjd32.exe 104 PID 2216 wrote to memory of 4884 2216 Ddpjjd32.exe 104 PID 2216 wrote to memory of 4884 2216 Ddpjjd32.exe 104 PID 4884 wrote to memory of 2928 4884 Dcegkamd.exe 105 PID 4884 wrote to memory of 2928 4884 Dcegkamd.exe 105 PID 4884 wrote to memory of 2928 4884 Dcegkamd.exe 105 PID 2928 wrote to memory of 3400 2928 Egjebn32.exe 106 PID 2928 wrote to memory of 3400 2928 Egjebn32.exe 106 PID 2928 wrote to memory of 3400 2928 Egjebn32.exe 106 PID 3400 wrote to memory of 3676 3400 Eljknl32.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f4fc49115ead3aa25e2f9e110abadc70.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f4fc49115ead3aa25e2f9e110abadc70.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\Kiajck32.exeC:\Windows\system32\Kiajck32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\Mmfaafej.exeC:\Windows\system32\Mmfaafej.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\Ncbfcp32.exeC:\Windows\system32\Ncbfcp32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\Npnqcpmc.exeC:\Windows\system32\Npnqcpmc.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\Olgnnqpe.exeC:\Windows\system32\Olgnnqpe.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\Oiphbd32.exeC:\Windows\system32\Oiphbd32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Pidamcgd.exeC:\Windows\system32\Pidamcgd.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\Ppafpm32.exeC:\Windows\system32\Ppafpm32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\Pkigbfja.exeC:\Windows\system32\Pkigbfja.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\SysWOW64\Pgbdmfnc.exeC:\Windows\system32\Pgbdmfnc.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\Aiejda32.exeC:\Windows\system32\Aiejda32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\Agikne32.exeC:\Windows\system32\Agikne32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\Adadbi32.exeC:\Windows\system32\Adadbi32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\Bjcfeola.exeC:\Windows\system32\Bjcfeola.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\Cgpjebcp.exeC:\Windows\system32\Cgpjebcp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\Ckqoapgd.exeC:\Windows\system32\Ckqoapgd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\Djhiglji.exeC:\Windows\system32\Djhiglji.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\Ddpjjd32.exeC:\Windows\system32\Ddpjjd32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\Dcegkamd.exeC:\Windows\system32\Dcegkamd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\Egjebn32.exeC:\Windows\system32\Egjebn32.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\Eljknl32.exeC:\Windows\system32\Eljknl32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\Fmndkd32.exeC:\Windows\system32\Fmndkd32.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3676 -
C:\Windows\SysWOW64\Fjdajhbi.exeC:\Windows\system32\Fjdajhbi.exe24⤵
- Executes dropped EXE
PID:2092 -
C:\Windows\SysWOW64\Fnbjpf32.exeC:\Windows\system32\Fnbjpf32.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:1864 -
C:\Windows\SysWOW64\Gjkgkg32.exeC:\Windows\system32\Gjkgkg32.exe26⤵
- Executes dropped EXE
PID:4532 -
C:\Windows\SysWOW64\Gmlplbib.exeC:\Windows\system32\Gmlplbib.exe27⤵
- Executes dropped EXE
PID:4432 -
C:\Windows\SysWOW64\Gmqjga32.exeC:\Windows\system32\Gmqjga32.exe28⤵PID:2552
-
C:\Windows\SysWOW64\Hmecba32.exeC:\Windows\system32\Hmecba32.exe29⤵
- Executes dropped EXE
PID:4772 -
C:\Windows\SysWOW64\Haclio32.exeC:\Windows\system32\Haclio32.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:3824 -
C:\Windows\SysWOW64\Hlkmlhea.exeC:\Windows\system32\Hlkmlhea.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3936 -
C:\Windows\SysWOW64\Ilbclg32.exeC:\Windows\system32\Ilbclg32.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:436 -
C:\Windows\SysWOW64\Ihicah32.exeC:\Windows\system32\Ihicah32.exe33⤵
- Executes dropped EXE
PID:2336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kloljf32.exeC:\Windows\system32\Kloljf32.exe17⤵PID:2600
-
C:\Windows\SysWOW64\Kchdfpen.exeC:\Windows\system32\Kchdfpen.exe18⤵PID:6188
-
C:\Windows\SysWOW64\Knnhdied.exeC:\Windows\system32\Knnhdied.exe19⤵PID:2196
-
C:\Windows\SysWOW64\Kgflmo32.exeC:\Windows\system32\Kgflmo32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2740 -
C:\Windows\SysWOW64\Knpeii32.exeC:\Windows\system32\Knpeii32.exe21⤵PID:8516
-
C:\Windows\SysWOW64\Kcmmap32.exeC:\Windows\system32\Kcmmap32.exe22⤵PID:4932
-
C:\Windows\SysWOW64\Knbaoh32.exeC:\Windows\system32\Knbaoh32.exe23⤵PID:2592
-
C:\Windows\SysWOW64\Kcpjgo32.exeC:\Windows\system32\Kcpjgo32.exe24⤵PID:1728
-
C:\Windows\SysWOW64\Ljibdifc.exeC:\Windows\system32\Ljibdifc.exe25⤵PID:9256
-
C:\Windows\SysWOW64\Lofklp32.exeC:\Windows\system32\Lofklp32.exe26⤵PID:9292
-
C:\Windows\SysWOW64\Ljloii32.exeC:\Windows\system32\Ljloii32.exe27⤵PID:9332
-
C:\Windows\SysWOW64\Lqfgfclm.exeC:\Windows\system32\Lqfgfclm.exe28⤵
- Drops file in System32 directory
PID:9384 -
C:\Windows\SysWOW64\Lokdgpqe.exeC:\Windows\system32\Lokdgpqe.exe29⤵PID:9424
-
C:\Windows\SysWOW64\Ljqhdhpk.exeC:\Windows\system32\Ljqhdhpk.exe30⤵PID:9464
-
C:\Windows\SysWOW64\Lomqmoob.exeC:\Windows\system32\Lomqmoob.exe31⤵PID:9508
-
C:\Windows\SysWOW64\Lckicnei.exeC:\Windows\system32\Lckicnei.exe32⤵PID:9552
-
C:\Windows\SysWOW64\Mqojlbcb.exeC:\Windows\system32\Mqojlbcb.exe33⤵PID:9596
-
C:\Windows\SysWOW64\Mflbdibj.exeC:\Windows\system32\Mflbdibj.exe34⤵PID:9636
-
C:\Windows\SysWOW64\Modgnn32.exeC:\Windows\system32\Modgnn32.exe35⤵
- Modifies registry class
PID:9672 -
C:\Windows\SysWOW64\Mjjkkghp.exeC:\Windows\system32\Mjjkkghp.exe36⤵PID:9720
-
C:\Windows\SysWOW64\Mogccnfg.exeC:\Windows\system32\Mogccnfg.exe37⤵PID:9764
-
C:\Windows\SysWOW64\Mjlhpgfn.exeC:\Windows\system32\Mjlhpgfn.exe38⤵PID:9808
-
C:\Windows\SysWOW64\Moiphnde.exeC:\Windows\system32\Moiphnde.exe39⤵PID:9852
-
C:\Windows\SysWOW64\Mfchehla.exeC:\Windows\system32\Mfchehla.exe40⤵PID:9896
-
C:\Windows\SysWOW64\Mokmnm32.exeC:\Windows\system32\Mokmnm32.exe41⤵PID:9936
-
C:\Windows\SysWOW64\Nnmmleja.exeC:\Windows\system32\Nnmmleja.exe42⤵
- Modifies registry class
PID:9980 -
C:\Windows\SysWOW64\Ngeaej32.exeC:\Windows\system32\Ngeaej32.exe43⤵
- Modifies registry class
PID:10024 -
C:\Windows\SysWOW64\Nmajmaoi.exeC:\Windows\system32\Nmajmaoi.exe44⤵PID:10064
-
C:\Windows\SysWOW64\Nfjofg32.exeC:\Windows\system32\Nfjofg32.exe45⤵
- Modifies registry class
PID:10112 -
C:\Windows\SysWOW64\Ncnook32.exeC:\Windows\system32\Ncnook32.exe46⤵PID:10152
-
C:\Windows\SysWOW64\Npepdl32.exeC:\Windows\system32\Npepdl32.exe47⤵PID:10200
-
C:\Windows\SysWOW64\Nfohafad.exeC:\Windows\system32\Nfohafad.exe48⤵PID:3636
-
C:\Windows\SysWOW64\Nmipnp32.exeC:\Windows\system32\Nmipnp32.exe49⤵PID:9252
-
C:\Windows\SysWOW64\Ogndki32.exeC:\Windows\system32\Ogndki32.exe50⤵PID:9344
-
C:\Windows\SysWOW64\Oafido32.exeC:\Windows\system32\Oafido32.exe51⤵PID:9380
-
C:\Windows\SysWOW64\Oceepj32.exeC:\Windows\system32\Oceepj32.exe52⤵
- Modifies registry class
PID:4972 -
C:\Windows\SysWOW64\Onkimc32.exeC:\Windows\system32\Onkimc32.exe53⤵PID:9456
-
C:\Windows\SysWOW64\Ocgbej32.exeC:\Windows\system32\Ocgbej32.exe54⤵PID:9500
-
C:\Windows\SysWOW64\Onmfcb32.exeC:\Windows\system32\Onmfcb32.exe55⤵PID:9560
-
C:\Windows\SysWOW64\Opnbjk32.exeC:\Windows\system32\Opnbjk32.exe56⤵
- Drops file in System32 directory
PID:4172 -
C:\Windows\SysWOW64\Ombcdo32.exeC:\Windows\system32\Ombcdo32.exe57⤵
- Drops file in System32 directory
PID:4464 -
C:\Windows\SysWOW64\Ofjgmdgg.exeC:\Windows\system32\Ofjgmdgg.exe58⤵PID:9688
-
C:\Windows\SysWOW64\Omdpio32.exeC:\Windows\system32\Omdpio32.exe59⤵PID:9732
-
C:\Windows\SysWOW64\Phjdggoj.exeC:\Windows\system32\Phjdggoj.exe60⤵PID:9780
-
C:\Windows\SysWOW64\Pndlca32.exeC:\Windows\system32\Pndlca32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3796 -
C:\Windows\SysWOW64\Phlqlgmg.exeC:\Windows\system32\Phlqlgmg.exe62⤵PID:9884
-
C:\Windows\SysWOW64\Padeem32.exeC:\Windows\system32\Padeem32.exe63⤵PID:9932
-
C:\Windows\SysWOW64\Pmkfjn32.exeC:\Windows\system32\Pmkfjn32.exe64⤵PID:10008
-
C:\Windows\SysWOW64\Phajgf32.exeC:\Windows\system32\Phajgf32.exe65⤵PID:4872
-
C:\Windows\SysWOW64\Pmnbpm32.exeC:\Windows\system32\Pmnbpm32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:10104 -
C:\Windows\SysWOW64\Phcgmffo.exeC:\Windows\system32\Phcgmffo.exe67⤵PID:10136
-
C:\Windows\SysWOW64\Qdjgbg32.exeC:\Windows\system32\Qdjgbg32.exe68⤵PID:10184
-
C:\Windows\SysWOW64\Qanhkk32.exeC:\Windows\system32\Qanhkk32.exe69⤵PID:980
-
C:\Windows\SysWOW64\Qfkqcb32.exeC:\Windows\system32\Qfkqcb32.exe70⤵PID:9268
-
C:\Windows\SysWOW64\Apcemh32.exeC:\Windows\system32\Apcemh32.exe71⤵PID:9364
-
C:\Windows\SysWOW64\Aodejohd.exeC:\Windows\system32\Aodejohd.exe72⤵PID:9476
-
C:\Windows\SysWOW64\Apeabg32.exeC:\Windows\system32\Apeabg32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2424 -
C:\Windows\SysWOW64\Aogbpo32.exeC:\Windows\system32\Aogbpo32.exe74⤵PID:9592
-
C:\Windows\SysWOW64\Agbgda32.exeC:\Windows\system32\Agbgda32.exe75⤵PID:6720
-
C:\Windows\SysWOW64\Apjkmgjm.exeC:\Windows\system32\Apjkmgjm.exe76⤵PID:9700
-
C:\Windows\SysWOW64\Adhdcepc.exeC:\Windows\system32\Adhdcepc.exe77⤵PID:5084
-
C:\Windows\SysWOW64\Bonhqnpi.exeC:\Windows\system32\Bonhqnpi.exe78⤵
- Modifies registry class
PID:9824 -
C:\Windows\SysWOW64\Bpodhf32.exeC:\Windows\system32\Bpodhf32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3640 -
C:\Windows\SysWOW64\Bopefnnf.exeC:\Windows\system32\Bopefnnf.exe80⤵PID:3944
-
C:\Windows\SysWOW64\Bdmmnd32.exeC:\Windows\system32\Bdmmnd32.exe81⤵
- Modifies registry class
PID:5080 -
C:\Windows\SysWOW64\Baanhi32.exeC:\Windows\system32\Baanhi32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:10000 -
C:\Windows\SysWOW64\Bgnfpp32.exeC:\Windows\system32\Bgnfpp32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:10080 -
C:\Windows\SysWOW64\Bacjmh32.exeC:\Windows\system32\Bacjmh32.exe84⤵PID:10148
-
C:\Windows\SysWOW64\Bogkgmho.exeC:\Windows\system32\Bogkgmho.exe85⤵PID:7156
-
C:\Windows\SysWOW64\Bddcocff.exeC:\Windows\system32\Bddcocff.exe86⤵PID:9280
-
C:\Windows\SysWOW64\Cknlln32.exeC:\Windows\system32\Cknlln32.exe87⤵PID:2160
-
C:\Windows\SysWOW64\Cahdhhep.exeC:\Windows\system32\Cahdhhep.exe88⤵
- Modifies registry class
PID:2200 -
C:\Windows\SysWOW64\Cgdlqo32.exeC:\Windows\system32\Cgdlqo32.exe89⤵PID:2280
-
C:\Windows\SysWOW64\Cponodge.exeC:\Windows\system32\Cponodge.exe90⤵PID:900
-
C:\Windows\SysWOW64\Ckealm32.exeC:\Windows\system32\Ckealm32.exe91⤵
- Drops file in System32 directory
PID:6836 -
C:\Windows\SysWOW64\Cpajdc32.exeC:\Windows\system32\Cpajdc32.exe92⤵PID:4944
-
C:\Windows\SysWOW64\Ckgnbl32.exeC:\Windows\system32\Ckgnbl32.exe93⤵PID:2416
-
C:\Windows\SysWOW64\Cpdgjc32.exeC:\Windows\system32\Cpdgjc32.exe94⤵PID:3332
-
C:\Windows\SysWOW64\Cgnogmkl.exeC:\Windows\system32\Cgnogmkl.exe95⤵PID:4040
-
C:\Windows\SysWOW64\Dpfcpcam.exeC:\Windows\system32\Dpfcpcam.exe96⤵
- Drops file in System32 directory
- Modifies registry class
PID:9976 -
C:\Windows\SysWOW64\Dgpllm32.exeC:\Windows\system32\Dgpllm32.exe97⤵PID:10092
-
C:\Windows\SysWOW64\Dafpjf32.exeC:\Windows\system32\Dafpjf32.exe98⤵PID:7020
-
C:\Windows\SysWOW64\Dgbhbm32.exeC:\Windows\system32\Dgbhbm32.exe99⤵PID:2636
-
C:\Windows\SysWOW64\Dahmoefm.exeC:\Windows\system32\Dahmoefm.exe100⤵PID:9376
-
C:\Windows\SysWOW64\Dkqahk32.exeC:\Windows\system32\Dkqahk32.exe101⤵PID:1804
-
C:\Windows\SysWOW64\Dqmjqb32.exeC:\Windows\system32\Dqmjqb32.exe102⤵PID:4740
-
C:\Windows\SysWOW64\Doojni32.exeC:\Windows\system32\Doojni32.exe103⤵PID:552
-
C:\Windows\SysWOW64\Ddkbfp32.exeC:\Windows\system32\Ddkbfp32.exe104⤵PID:1272
-
C:\Windows\SysWOW64\Eoagdi32.exeC:\Windows\system32\Eoagdi32.exe105⤵PID:9716
-
C:\Windows\SysWOW64\Ehikmohb.exeC:\Windows\system32\Ehikmohb.exe106⤵PID:412
-
C:\Windows\SysWOW64\Enfceefi.exeC:\Windows\system32\Enfceefi.exe107⤵PID:3080
-
C:\Windows\SysWOW64\Ehlhbn32.exeC:\Windows\system32\Ehlhbn32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:9960 -
C:\Windows\SysWOW64\Eqgmgq32.exeC:\Windows\system32\Eqgmgq32.exe109⤵
- Modifies registry class
PID:4960 -
C:\Windows\SysWOW64\Enkmpe32.exeC:\Windows\system32\Enkmpe32.exe110⤵PID:9236
-
C:\Windows\SysWOW64\Ekoniian.exeC:\Windows\system32\Ekoniian.exe111⤵PID:1584
-
C:\Windows\SysWOW64\Eqkfapoe.exeC:\Windows\system32\Eqkfapoe.exe112⤵PID:9432
-
C:\Windows\SysWOW64\Fgenoj32.exeC:\Windows\system32\Fgenoj32.exe113⤵PID:5988
-
C:\Windows\SysWOW64\Fdiohnek.exeC:\Windows\system32\Fdiohnek.exe114⤵
- Modifies registry class
PID:440 -
C:\Windows\SysWOW64\Foocegea.exeC:\Windows\system32\Foocegea.exe115⤵PID:6256
-
C:\Windows\SysWOW64\Fqpomo32.exeC:\Windows\system32\Fqpomo32.exe116⤵PID:4880
-
C:\Windows\SysWOW64\Fkfcjh32.exeC:\Windows\system32\Fkfcjh32.exe117⤵PID:2260
-
C:\Windows\SysWOW64\Fbplgbbb.exeC:\Windows\system32\Fbplgbbb.exe118⤵PID:4000
-
C:\Windows\SysWOW64\Fgldoi32.exeC:\Windows\system32\Fgldoi32.exe119⤵PID:4796
-
C:\Windows\SysWOW64\Fbbhla32.exeC:\Windows\system32\Fbbhla32.exe120⤵
- Drops file in System32 directory
PID:4348 -
C:\Windows\SysWOW64\Filailgl.exeC:\Windows\system32\Filailgl.exe121⤵PID:4524
-
C:\Windows\SysWOW64\Fniiabfd.exeC:\Windows\system32\Fniiabfd.exe122⤵PID:9248
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-