Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
204s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f881784d7520490d5d4a00ceab205070.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.f881784d7520490d5d4a00ceab205070.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.f881784d7520490d5d4a00ceab205070.exe
-
Size
273KB
-
MD5
f881784d7520490d5d4a00ceab205070
-
SHA1
5409c8b7f44b6cb78f2f69d389da8516bc741b20
-
SHA256
fb034a8fb835a5f6cd5771e53d8f4f9a93bf5aecc63e1e0ca6c4d29a2d8c9c44
-
SHA512
50832ecd42ec8a9d931a39fcc55cd84e25fe9239bbd140f962408d88dabbc20bd13bebe99c89f4209dfa085656cc3ed849fb97fdb2621e6411fcb3e512b74cc6
-
SSDEEP
6144:saB8q1JYV1iL+9MD/nLSIV8yw7U3FtDgc67nTGbNOspACO63+VGzJnw9wIgcvcQA:sUs1iL2KPL7Syw72dpSQos2c+VGzJw9U
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfaodclg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaodlode.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbfcje32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdljaa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcpcjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egepce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fklohgie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhfckc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfanlpff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajgidejf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceoffq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dqdfbmmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gikcqd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnegod32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqknfq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ijgfflae.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhfckc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfeadjlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmmmdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckqhigeg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhbhloho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhnlqjha.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lehfcc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlkmeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inhfmmfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Donmohni.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejjjef32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfeadjlo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfhniijm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fldbnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hqmmja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hqdeciho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpbohooj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fadoqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.f881784d7520490d5d4a00ceab205070.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpbgghhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fklohgie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egepce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khpqkq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inhfmmfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mganfp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kaojiqej.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpbohooj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhhiqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dolpiipk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebofpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkgpmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gggihhkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmkgqncd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klpffn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdkkkqlk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckjaih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdfpmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbfcje32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmabegde.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iqhhin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcnfllcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knabngen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgghoh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqdfbmmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epipbmdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hdonpjbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhbnjpic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmmmdd32.exe -
Executes dropped EXE 64 IoCs
pid Process 2768 Mganfp32.exe 2536 Fgnfpm32.exe 2508 Fldbnb32.exe 3012 Ocdohdfc.exe 2696 Dpbgghhl.exe 1676 Cnbhcl32.exe 1784 Hanenoeh.exe 2720 Hdonpjbi.exe 560 Ihfmdm32.exe 1368 Icnngeof.exe 1984 Ikibkhla.exe 2292 Iqhhin32.exe 1960 Jdhmel32.exe 2936 Jimodo32.exe 1736 Kbedmedg.exe 968 Kiaiooja.exe 1240 Kaojiqej.exe 2380 Kcpcjl32.exe 736 Lhnlqjha.exe 2128 Lpiqel32.exe 1484 Llpajmkq.exe 2168 Lehfcc32.exe 2208 Npdlpnnj.exe 1324 Nlkmeo32.exe 1040 Nhbnjpic.exe 1688 Nefncd32.exe 1788 Polbemck.exe 2640 Pcikllja.exe 2532 Egepce32.exe 2296 Ehfmkmqj.exe 2540 Eclqhfpp.exe 1260 Fhhiqm32.exe 2840 Fhkffl32.exe 2860 Fdafkm32.exe 1032 Fklohgie.exe 2016 Fnjkdcii.exe 2700 Gggihhkd.exe 472 Godjaj32.exe 284 Ghmokomm.exe 1272 Gfaodclg.exe 1628 Gmkgqncd.exe 2004 Gnldhf32.exe 1084 Holqbipe.exe 432 Hqmmja32.exe 2460 Hkbagjfi.exe 972 Hnanceem.exe 368 Hcnfllcd.exe 1720 Hncjiecj.exe 596 Hcpbalaa.exe 3020 Hnegod32.exe 2316 Hgnkgjgh.exe 1028 Hmkdpafo.exe 984 Iacojc32.exe 1592 Ihnhfmjc.exe 1772 Jaflocqd.exe 2536 Jllpmlqj.exe 1568 Jmmmdd32.exe 1984 Jfeamimh.exe 2664 Jmoijc32.exe 2128 Jdibfn32.exe 2912 Jppbkoaf.exe 2712 Jkegigal.exe 1728 Jmdcecpp.exe 2580 Kglgnhgq.exe -
Loads dropped DLL 64 IoCs
pid Process 3056 NEAS.f881784d7520490d5d4a00ceab205070.exe 3056 NEAS.f881784d7520490d5d4a00ceab205070.exe 2768 Mganfp32.exe 2768 Mganfp32.exe 2536 Fgnfpm32.exe 2536 Fgnfpm32.exe 2508 Fldbnb32.exe 2508 Fldbnb32.exe 3012 Ocdohdfc.exe 3012 Ocdohdfc.exe 2696 Dpbgghhl.exe 2696 Dpbgghhl.exe 1676 Cnbhcl32.exe 1676 Cnbhcl32.exe 1784 Hanenoeh.exe 1784 Hanenoeh.exe 2720 Hdonpjbi.exe 2720 Hdonpjbi.exe 560 Ihfmdm32.exe 560 Ihfmdm32.exe 1368 Icnngeof.exe 1368 Icnngeof.exe 1984 Ikibkhla.exe 1984 Ikibkhla.exe 2292 Iqhhin32.exe 2292 Iqhhin32.exe 1960 Jdhmel32.exe 1960 Jdhmel32.exe 2936 Jimodo32.exe 2936 Jimodo32.exe 1736 Kbedmedg.exe 1736 Kbedmedg.exe 968 Kiaiooja.exe 968 Kiaiooja.exe 1240 Kaojiqej.exe 1240 Kaojiqej.exe 2380 Kcpcjl32.exe 2380 Kcpcjl32.exe 736 Lhnlqjha.exe 736 Lhnlqjha.exe 2128 Lpiqel32.exe 2128 Lpiqel32.exe 1484 Llpajmkq.exe 1484 Llpajmkq.exe 2168 Lehfcc32.exe 2168 Lehfcc32.exe 2208 Npdlpnnj.exe 2208 Npdlpnnj.exe 1324 Nlkmeo32.exe 1324 Nlkmeo32.exe 1040 Nhbnjpic.exe 1040 Nhbnjpic.exe 1688 Nefncd32.exe 1688 Nefncd32.exe 1788 Polbemck.exe 1788 Polbemck.exe 2640 Pcikllja.exe 2640 Pcikllja.exe 2532 Egepce32.exe 2532 Egepce32.exe 2296 Ehfmkmqj.exe 2296 Ehfmkmqj.exe 2540 Eclqhfpp.exe 2540 Eclqhfpp.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Lkgpmj32.exe Ldngqqjh.exe File opened for modification C:\Windows\SysWOW64\Fhkffl32.exe Fhhiqm32.exe File created C:\Windows\SysWOW64\Jjjoef32.dll Iqhhin32.exe File opened for modification C:\Windows\SysWOW64\Hanenoeh.exe Cnbhcl32.exe File created C:\Windows\SysWOW64\Chlifcag.dll Fdafkm32.exe File created C:\Windows\SysWOW64\Hkbagjfi.exe Hqmmja32.exe File created C:\Windows\SysWOW64\Pcfmhn32.dll Gikcqd32.exe File opened for modification C:\Windows\SysWOW64\Dpbgghhl.exe Ocdohdfc.exe File created C:\Windows\SysWOW64\Pbmoghij.dll Hmabegde.exe File created C:\Windows\SysWOW64\Jkegigal.exe Jppbkoaf.exe File opened for modification C:\Windows\SysWOW64\Laokdekd.exe Kdkkkqlk.exe File opened for modification C:\Windows\SysWOW64\Hnfigmhk.exe Mhklfbcj.exe File created C:\Windows\SysWOW64\Cdkihlid.exe Cnaqkb32.exe File opened for modification C:\Windows\SysWOW64\Gfjjoi32.exe Gamafbjb.exe File created C:\Windows\SysWOW64\Geenlkeo.dll Hdonpjbi.exe File created C:\Windows\SysWOW64\Qmancc32.dll Hkbagjfi.exe File created C:\Windows\SysWOW64\Imbohioq.dll Iacojc32.exe File opened for modification C:\Windows\SysWOW64\Jllpmlqj.exe Jaflocqd.exe File created C:\Windows\SysWOW64\Ldngqqjh.exe Laokdekd.exe File opened for modification C:\Windows\SysWOW64\Gfmgdi32.exe Gpbohooj.exe File created C:\Windows\SysWOW64\Gnhffghb.dll Fhhiqm32.exe File created C:\Windows\SysWOW64\Hnfigmhk.exe Mhklfbcj.exe File created C:\Windows\SysWOW64\Bogmmc32.dll Ceoffq32.exe File opened for modification C:\Windows\SysWOW64\Cnmgpbfm.exe Cgbochop.exe File created C:\Windows\SysWOW64\Fhkffl32.exe Fhhiqm32.exe File opened for modification C:\Windows\SysWOW64\Egqgdjel.exe Epipbmdj.exe File created C:\Windows\SysWOW64\Cnmgpbfm.exe Cgbochop.exe File created C:\Windows\SysWOW64\Klipfpeh.exe Kglgnhgq.exe File created C:\Windows\SysWOW64\Cjobnf32.dll Jaflocqd.exe File created C:\Windows\SysWOW64\Aemmanjl.exe Ajgidejf.exe File created C:\Windows\SysWOW64\Kkonmooq.dll Ahkiniip.exe File opened for modification C:\Windows\SysWOW64\Cdfpmm32.exe Cnmgpbfm.exe File created C:\Windows\SysWOW64\Ghemnm32.exe Gnmiegma.exe File opened for modification C:\Windows\SysWOW64\Egepce32.exe Pcikllja.exe File opened for modification C:\Windows\SysWOW64\Dkngckie.exe Dbfcje32.exe File created C:\Windows\SysWOW64\Hpfffqpc.dll Gamafbjb.exe File created C:\Windows\SysWOW64\Hjnjnd32.dll Hkebokco.exe File created C:\Windows\SysWOW64\Mdaobl32.dll Cdkihlid.exe File created C:\Windows\SysWOW64\Fbfojl32.exe Inhfmmfi.exe File opened for modification C:\Windows\SysWOW64\Lehfcc32.exe Llpajmkq.exe File opened for modification C:\Windows\SysWOW64\Nhbnjpic.exe Nlkmeo32.exe File opened for modification C:\Windows\SysWOW64\Nefncd32.exe Nhbnjpic.exe File created C:\Windows\SysWOW64\Blmiia32.dll Inhfmmfi.exe File opened for modification C:\Windows\SysWOW64\Kcpcjl32.exe Kaojiqej.exe File created C:\Windows\SysWOW64\Khpqkq32.exe Klipfpeh.exe File opened for modification C:\Windows\SysWOW64\Cdkihlid.exe Cnaqkb32.exe File created C:\Windows\SysWOW64\Diipha32.dll Gfhniijm.exe File created C:\Windows\SysWOW64\Gahcbbhl.dll Kglgnhgq.exe File created C:\Windows\SysWOW64\Laokdekd.exe Kdkkkqlk.exe File created C:\Windows\SysWOW64\Admqhk32.exe Aaodlode.exe File opened for modification C:\Windows\SysWOW64\Fjopoifk.exe Fdehbo32.exe File created C:\Windows\SysWOW64\Knaocm32.dll Lehfcc32.exe File created C:\Windows\SysWOW64\Hcpbalaa.exe Hncjiecj.exe File created C:\Windows\SysWOW64\Mhklfbcj.exe Mochmm32.exe File opened for modification C:\Windows\SysWOW64\Dfmepd32.exe Cdkihlid.exe File created C:\Windows\SysWOW64\Lkmhbpqc.dll Fklohgie.exe File created C:\Windows\SysWOW64\Eeeadefe.dll Aaodlode.exe File created C:\Windows\SysWOW64\Nckmqnaa.dll Ckjaih32.exe File opened for modification C:\Windows\SysWOW64\Gikcqd32.exe Gfmgdi32.exe File created C:\Windows\SysWOW64\Ecfckn32.dll Hmkdpafo.exe File created C:\Windows\SysWOW64\Adallm32.dll Hnanceem.exe File created C:\Windows\SysWOW64\Ihnhfmjc.exe Iacojc32.exe File created C:\Windows\SysWOW64\Klpffn32.exe Kolemj32.exe File opened for modification C:\Windows\SysWOW64\Mfkcdgfi.exe Mkeogn32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhbhloho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gikcqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhnlqjha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Immkokcl.dll" Lpiqel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hnegod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdacfp32.dll" Khpqkq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbhppd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkmhbpqc.dll" Fklohgie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gfhniijm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihfmdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnjkdcii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kolemj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgjkcdoi.dll" Hhicho32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikibkhla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjobnf32.dll" Jaflocqd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Donmohni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gfhniijm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pijglpjp.dll" Cdfpmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdmkpenk.dll" Fhngmnij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khpqkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amepophm.dll" Cnmgpbfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdkihlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmlkbpno.dll" Dpbjmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cgbochop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehgagn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbmfpdcn.dll" Cnbhcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmkdpafo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpagikgi.dll" Dbhppd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdehbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbhhcplg.dll" Gnmiegma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkebokco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceoffq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knaocm32.dll" Lehfcc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hnfigmhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dolpiipk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdafkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bepllj32.dll" Kiomec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkeogn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbckjfip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iefiphie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nllbaloh.dll" Hanenoeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iqhhin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcpcjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Faihlcnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcfmhn32.dll" Gikcqd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdkihlid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhngmnij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hapkke32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iefiphie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llpajmkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gmkgqncd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hnegod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jllpmlqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjbhfk32.dll" Klipfpeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dmllanbg.dll" Npdlpnnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkegigal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmhabbgi.dll" Fbfojl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enhckdnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjbbpfmo.dll" Giifkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aefipolf.dll" Ocdohdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kiomec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mogckqib.dll" Gfeadjlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Giemme32.dll" Ghmokomm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aaodlode.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2768 3056 NEAS.f881784d7520490d5d4a00ceab205070.exe 29 PID 3056 wrote to memory of 2768 3056 NEAS.f881784d7520490d5d4a00ceab205070.exe 29 PID 3056 wrote to memory of 2768 3056 NEAS.f881784d7520490d5d4a00ceab205070.exe 29 PID 3056 wrote to memory of 2768 3056 NEAS.f881784d7520490d5d4a00ceab205070.exe 29 PID 2768 wrote to memory of 2536 2768 Mganfp32.exe 30 PID 2768 wrote to memory of 2536 2768 Mganfp32.exe 30 PID 2768 wrote to memory of 2536 2768 Mganfp32.exe 30 PID 2768 wrote to memory of 2536 2768 Mganfp32.exe 30 PID 2536 wrote to memory of 2508 2536 Fgnfpm32.exe 31 PID 2536 wrote to memory of 2508 2536 Fgnfpm32.exe 31 PID 2536 wrote to memory of 2508 2536 Fgnfpm32.exe 31 PID 2536 wrote to memory of 2508 2536 Fgnfpm32.exe 31 PID 2508 wrote to memory of 3012 2508 Fldbnb32.exe 32 PID 2508 wrote to memory of 3012 2508 Fldbnb32.exe 32 PID 2508 wrote to memory of 3012 2508 Fldbnb32.exe 32 PID 2508 wrote to memory of 3012 2508 Fldbnb32.exe 32 PID 3012 wrote to memory of 2696 3012 Ocdohdfc.exe 33 PID 3012 wrote to memory of 2696 3012 Ocdohdfc.exe 33 PID 3012 wrote to memory of 2696 3012 Ocdohdfc.exe 33 PID 3012 wrote to memory of 2696 3012 Ocdohdfc.exe 33 PID 2696 wrote to memory of 1676 2696 Dpbgghhl.exe 34 PID 2696 wrote to memory of 1676 2696 Dpbgghhl.exe 34 PID 2696 wrote to memory of 1676 2696 Dpbgghhl.exe 34 PID 2696 wrote to memory of 1676 2696 Dpbgghhl.exe 34 PID 1676 wrote to memory of 1784 1676 Cnbhcl32.exe 35 PID 1676 wrote to memory of 1784 1676 Cnbhcl32.exe 35 PID 1676 wrote to memory of 1784 1676 Cnbhcl32.exe 35 PID 1676 wrote to memory of 1784 1676 Cnbhcl32.exe 35 PID 1784 wrote to memory of 2720 1784 Hanenoeh.exe 36 PID 1784 wrote to memory of 2720 1784 Hanenoeh.exe 36 PID 1784 wrote to memory of 2720 1784 Hanenoeh.exe 36 PID 1784 wrote to memory of 2720 1784 Hanenoeh.exe 36 PID 2720 wrote to memory of 560 2720 Hdonpjbi.exe 37 PID 2720 wrote to memory of 560 2720 Hdonpjbi.exe 37 PID 2720 wrote to memory of 560 2720 Hdonpjbi.exe 37 PID 2720 wrote to memory of 560 2720 Hdonpjbi.exe 37 PID 560 wrote to memory of 1368 560 Ihfmdm32.exe 38 PID 560 wrote to memory of 1368 560 Ihfmdm32.exe 38 PID 560 wrote to memory of 1368 560 Ihfmdm32.exe 38 PID 560 wrote to memory of 1368 560 Ihfmdm32.exe 38 PID 1368 wrote to memory of 1984 1368 Icnngeof.exe 39 PID 1368 wrote to memory of 1984 1368 Icnngeof.exe 39 PID 1368 wrote to memory of 1984 1368 Icnngeof.exe 39 PID 1368 wrote to memory of 1984 1368 Icnngeof.exe 39 PID 1984 wrote to memory of 2292 1984 Ikibkhla.exe 40 PID 1984 wrote to memory of 2292 1984 Ikibkhla.exe 40 PID 1984 wrote to memory of 2292 1984 Ikibkhla.exe 40 PID 1984 wrote to memory of 2292 1984 Ikibkhla.exe 40 PID 2292 wrote to memory of 1960 2292 Iqhhin32.exe 41 PID 2292 wrote to memory of 1960 2292 Iqhhin32.exe 41 PID 2292 wrote to memory of 1960 2292 Iqhhin32.exe 41 PID 2292 wrote to memory of 1960 2292 Iqhhin32.exe 41 PID 1960 wrote to memory of 2936 1960 Jdhmel32.exe 42 PID 1960 wrote to memory of 2936 1960 Jdhmel32.exe 42 PID 1960 wrote to memory of 2936 1960 Jdhmel32.exe 42 PID 1960 wrote to memory of 2936 1960 Jdhmel32.exe 42 PID 2936 wrote to memory of 1736 2936 Jimodo32.exe 43 PID 2936 wrote to memory of 1736 2936 Jimodo32.exe 43 PID 2936 wrote to memory of 1736 2936 Jimodo32.exe 43 PID 2936 wrote to memory of 1736 2936 Jimodo32.exe 43 PID 1736 wrote to memory of 968 1736 Kbedmedg.exe 44 PID 1736 wrote to memory of 968 1736 Kbedmedg.exe 44 PID 1736 wrote to memory of 968 1736 Kbedmedg.exe 44 PID 1736 wrote to memory of 968 1736 Kbedmedg.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f881784d7520490d5d4a00ceab205070.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f881784d7520490d5d4a00ceab205070.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\Mganfp32.exeC:\Windows\system32\Mganfp32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\Fgnfpm32.exeC:\Windows\system32\Fgnfpm32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Fldbnb32.exeC:\Windows\system32\Fldbnb32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Ocdohdfc.exeC:\Windows\system32\Ocdohdfc.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\Dpbgghhl.exeC:\Windows\system32\Dpbgghhl.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Cnbhcl32.exeC:\Windows\system32\Cnbhcl32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\Hanenoeh.exeC:\Windows\system32\Hanenoeh.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\Hdonpjbi.exeC:\Windows\system32\Hdonpjbi.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Ihfmdm32.exeC:\Windows\system32\Ihfmdm32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\Icnngeof.exeC:\Windows\system32\Icnngeof.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\Ikibkhla.exeC:\Windows\system32\Ikibkhla.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Iqhhin32.exeC:\Windows\system32\Iqhhin32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\Jdhmel32.exeC:\Windows\system32\Jdhmel32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\Jimodo32.exeC:\Windows\system32\Jimodo32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\Kbedmedg.exeC:\Windows\system32\Kbedmedg.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\Kiaiooja.exeC:\Windows\system32\Kiaiooja.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:968 -
C:\Windows\SysWOW64\Kaojiqej.exeC:\Windows\system32\Kaojiqej.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1240 -
C:\Windows\SysWOW64\Kcpcjl32.exeC:\Windows\system32\Kcpcjl32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2380 -
C:\Windows\SysWOW64\Lhnlqjha.exeC:\Windows\system32\Lhnlqjha.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:736 -
C:\Windows\SysWOW64\Lpiqel32.exeC:\Windows\system32\Lpiqel32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2128 -
C:\Windows\SysWOW64\Llpajmkq.exeC:\Windows\system32\Llpajmkq.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1484 -
C:\Windows\SysWOW64\Lehfcc32.exeC:\Windows\system32\Lehfcc32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\Npdlpnnj.exeC:\Windows\system32\Npdlpnnj.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2208 -
C:\Windows\SysWOW64\Nlkmeo32.exeC:\Windows\system32\Nlkmeo32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1324 -
C:\Windows\SysWOW64\Nhbnjpic.exeC:\Windows\system32\Nhbnjpic.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1040 -
C:\Windows\SysWOW64\Nefncd32.exeC:\Windows\system32\Nefncd32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688 -
C:\Windows\SysWOW64\Polbemck.exeC:\Windows\system32\Polbemck.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788 -
C:\Windows\SysWOW64\Pcikllja.exeC:\Windows\system32\Pcikllja.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2640 -
C:\Windows\SysWOW64\Egepce32.exeC:\Windows\system32\Egepce32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Windows\SysWOW64\Ehfmkmqj.exeC:\Windows\system32\Ehfmkmqj.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296 -
C:\Windows\SysWOW64\Eclqhfpp.exeC:\Windows\system32\Eclqhfpp.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2540 -
C:\Windows\SysWOW64\Fhhiqm32.exeC:\Windows\system32\Fhhiqm32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1260 -
C:\Windows\SysWOW64\Fhkffl32.exeC:\Windows\system32\Fhkffl32.exe34⤵
- Executes dropped EXE
PID:2840 -
C:\Windows\SysWOW64\Fdafkm32.exeC:\Windows\system32\Fdafkm32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2860 -
C:\Windows\SysWOW64\Fklohgie.exeC:\Windows\system32\Fklohgie.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1032 -
C:\Windows\SysWOW64\Fnjkdcii.exeC:\Windows\system32\Fnjkdcii.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\Gggihhkd.exeC:\Windows\system32\Gggihhkd.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2700 -
C:\Windows\SysWOW64\Godjaj32.exeC:\Windows\system32\Godjaj32.exe39⤵
- Executes dropped EXE
PID:472 -
C:\Windows\SysWOW64\Ghmokomm.exeC:\Windows\system32\Ghmokomm.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:284 -
C:\Windows\SysWOW64\Gfaodclg.exeC:\Windows\system32\Gfaodclg.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\Gmkgqncd.exeC:\Windows\system32\Gmkgqncd.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1628 -
C:\Windows\SysWOW64\Gnldhf32.exeC:\Windows\system32\Gnldhf32.exe43⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\Holqbipe.exeC:\Windows\system32\Holqbipe.exe44⤵
- Executes dropped EXE
PID:1084 -
C:\Windows\SysWOW64\Hqmmja32.exeC:\Windows\system32\Hqmmja32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:432 -
C:\Windows\SysWOW64\Hkbagjfi.exeC:\Windows\system32\Hkbagjfi.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2460 -
C:\Windows\SysWOW64\Hnanceem.exeC:\Windows\system32\Hnanceem.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:972 -
C:\Windows\SysWOW64\Hcnfllcd.exeC:\Windows\system32\Hcnfllcd.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:368 -
C:\Windows\SysWOW64\Hncjiecj.exeC:\Windows\system32\Hncjiecj.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1720 -
C:\Windows\SysWOW64\Hcpbalaa.exeC:\Windows\system32\Hcpbalaa.exe50⤵
- Executes dropped EXE
PID:596 -
C:\Windows\SysWOW64\Hnegod32.exeC:\Windows\system32\Hnegod32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3020 -
C:\Windows\SysWOW64\Hgnkgjgh.exeC:\Windows\system32\Hgnkgjgh.exe52⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\Hmkdpafo.exeC:\Windows\system32\Hmkdpafo.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1028 -
C:\Windows\SysWOW64\Iacojc32.exeC:\Windows\system32\Iacojc32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:984 -
C:\Windows\SysWOW64\Ihnhfmjc.exeC:\Windows\system32\Ihnhfmjc.exe55⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\Jaflocqd.exeC:\Windows\system32\Jaflocqd.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1772 -
C:\Windows\SysWOW64\Jllpmlqj.exeC:\Windows\system32\Jllpmlqj.exe57⤵
- Executes dropped EXE
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\Jmmmdd32.exeC:\Windows\system32\Jmmmdd32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1568 -
C:\Windows\SysWOW64\Jfeamimh.exeC:\Windows\system32\Jfeamimh.exe59⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\Jmoijc32.exeC:\Windows\system32\Jmoijc32.exe60⤵
- Executes dropped EXE
PID:2664 -
C:\Windows\SysWOW64\Jdibfn32.exeC:\Windows\system32\Jdibfn32.exe61⤵
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\Jppbkoaf.exeC:\Windows\system32\Jppbkoaf.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2912 -
C:\Windows\SysWOW64\Jkegigal.exeC:\Windows\system32\Jkegigal.exe63⤵
- Executes dropped EXE
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Jmdcecpp.exeC:\Windows\system32\Jmdcecpp.exe64⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\SysWOW64\Kglgnhgq.exeC:\Windows\system32\Kglgnhgq.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2580 -
C:\Windows\SysWOW64\Klipfpeh.exeC:\Windows\system32\Klipfpeh.exe66⤵
- Drops file in System32 directory
- Modifies registry class
PID:1600 -
C:\Windows\SysWOW64\Khpqkq32.exeC:\Windows\system32\Khpqkq32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1432 -
C:\Windows\SysWOW64\Kceehijb.exeC:\Windows\system32\Kceehijb.exe68⤵PID:1196
-
C:\Windows\SysWOW64\Kiomec32.exeC:\Windows\system32\Kiomec32.exe69⤵
- Modifies registry class
PID:2188 -
C:\Windows\SysWOW64\Kolemj32.exeC:\Windows\system32\Kolemj32.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Klpffn32.exeC:\Windows\system32\Klpffn32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1136 -
C:\Windows\SysWOW64\Knabngen.exeC:\Windows\system32\Knabngen.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1104 -
C:\Windows\SysWOW64\Kdkkkqlk.exeC:\Windows\system32\Kdkkkqlk.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1200 -
C:\Windows\SysWOW64\Laokdekd.exeC:\Windows\system32\Laokdekd.exe74⤵
- Drops file in System32 directory
PID:1228 -
C:\Windows\SysWOW64\Ldngqqjh.exeC:\Windows\system32\Ldngqqjh.exe75⤵
- Drops file in System32 directory
PID:2204 -
C:\Windows\SysWOW64\Lkgpmj32.exeC:\Windows\system32\Lkgpmj32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2176 -
C:\Windows\SysWOW64\Lpdhea32.exeC:\Windows\system32\Lpdhea32.exe77⤵PID:1768
-
C:\Windows\SysWOW64\Lqknfq32.exeC:\Windows\system32\Lqknfq32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1236 -
C:\Windows\SysWOW64\Mhfckc32.exeC:\Windows\system32\Mhfckc32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:880 -
C:\Windows\SysWOW64\Mkeogn32.exeC:\Windows\system32\Mkeogn32.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:2976 -
C:\Windows\SysWOW64\Mfkcdgfi.exeC:\Windows\system32\Mfkcdgfi.exe81⤵PID:2392
-
C:\Windows\SysWOW64\Mochmm32.exeC:\Windows\system32\Mochmm32.exe82⤵
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\Mhklfbcj.exeC:\Windows\system32\Mhklfbcj.exe83⤵
- Drops file in System32 directory
PID:2756 -
C:\Windows\SysWOW64\Hnfigmhk.exeC:\Windows\system32\Hnfigmhk.exe84⤵
- Modifies registry class
PID:1644 -
C:\Windows\SysWOW64\Hqdeciho.exeC:\Windows\system32\Hqdeciho.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2988 -
C:\Windows\SysWOW64\Hfanlpff.exeC:\Windows\system32\Hfanlpff.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1368 -
C:\Windows\SysWOW64\Inhfmmfi.exeC:\Windows\system32\Inhfmmfi.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2180 -
C:\Windows\SysWOW64\Fbfojl32.exeC:\Windows\system32\Fbfojl32.exe88⤵
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Ijgfflae.exeC:\Windows\system32\Ijgfflae.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2556 -
C:\Windows\SysWOW64\Aaodlode.exeC:\Windows\system32\Aaodlode.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2780 -
C:\Windows\SysWOW64\Admqhk32.exeC:\Windows\system32\Admqhk32.exe91⤵PID:1796
-
C:\Windows\SysWOW64\Ajgidejf.exeC:\Windows\system32\Ajgidejf.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2788 -
C:\Windows\SysWOW64\Aemmanjl.exeC:\Windows\system32\Aemmanjl.exe93⤵PID:312
-
C:\Windows\SysWOW64\Ahkiniip.exeC:\Windows\system32\Ahkiniip.exe94⤵
- Drops file in System32 directory
PID:2732 -
C:\Windows\SysWOW64\Ckjaih32.exeC:\Windows\system32\Ckjaih32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:268 -
C:\Windows\SysWOW64\Ceoffq32.exeC:\Windows\system32\Ceoffq32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2596 -
C:\Windows\SysWOW64\Cklnog32.exeC:\Windows\system32\Cklnog32.exe97⤵PID:1980
-
C:\Windows\SysWOW64\Ceablp32.exeC:\Windows\system32\Ceablp32.exe98⤵PID:2876
-
C:\Windows\SysWOW64\Cgbochop.exeC:\Windows\system32\Cgbochop.exe99⤵
- Drops file in System32 directory
- Modifies registry class
PID:1996 -
C:\Windows\SysWOW64\Cnmgpbfm.exeC:\Windows\system32\Cnmgpbfm.exe100⤵
- Drops file in System32 directory
- Modifies registry class
PID:2108 -
C:\Windows\SysWOW64\Cdfpmm32.exeC:\Windows\system32\Cdfpmm32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Ckqhigeg.exeC:\Windows\system32\Ckqhigeg.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2408 -
C:\Windows\SysWOW64\Cpmpbncn.exeC:\Windows\system32\Cpmpbncn.exe103⤵PID:2120
-
C:\Windows\SysWOW64\Cgghoh32.exeC:\Windows\system32\Cgghoh32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:916 -
C:\Windows\SysWOW64\Cnaqkb32.exeC:\Windows\system32\Cnaqkb32.exe105⤵
- Drops file in System32 directory
PID:2112 -
C:\Windows\SysWOW64\Cdkihlid.exeC:\Windows\system32\Cdkihlid.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\Dfmepd32.exeC:\Windows\system32\Dfmepd32.exe107⤵PID:1744
-
C:\Windows\SysWOW64\Dpbjmm32.exeC:\Windows\system32\Dpbjmm32.exe108⤵
- Modifies registry class
PID:2200 -
C:\Windows\SysWOW64\Dglbjgff.exeC:\Windows\system32\Dglbjgff.exe109⤵PID:2096
-
C:\Windows\SysWOW64\Djjnfbei.exeC:\Windows\system32\Djjnfbei.exe110⤵PID:1968
-
C:\Windows\SysWOW64\Dqdfbmmf.exeC:\Windows\system32\Dqdfbmmf.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2972 -
C:\Windows\SysWOW64\Dbfcje32.exeC:\Windows\system32\Dbfcje32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2240 -
C:\Windows\SysWOW64\Dkngckie.exeC:\Windows\system32\Dkngckie.exe113⤵PID:2864
-
C:\Windows\SysWOW64\Dbhppd32.exeC:\Windows\system32\Dbhppd32.exe114⤵
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Dhbhloho.exeC:\Windows\system32\Dhbhloho.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2380 -
C:\Windows\SysWOW64\Dolpiipk.exeC:\Windows\system32\Dolpiipk.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\Ddihapnc.exeC:\Windows\system32\Ddihapnc.exe117⤵PID:2280
-
C:\Windows\SysWOW64\Donmohni.exeC:\Windows\system32\Donmohni.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1032 -
C:\Windows\SysWOW64\Ehgagn32.exeC:\Windows\system32\Ehgagn32.exe119⤵
- Modifies registry class
PID:284 -
C:\Windows\SysWOW64\Ejhnofjg.exeC:\Windows\system32\Ejhnofjg.exe120⤵PID:432
-
C:\Windows\SysWOW64\Ebofpc32.exeC:\Windows\system32\Ebofpc32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2724 -
C:\Windows\SysWOW64\Ejjjef32.exeC:\Windows\system32\Ejjjef32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2620
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-