Analysis
-
max time kernel
233s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-10-2023 21:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe
Resource
win7-20231020-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe
-
Size
442KB
-
MD5
c3bf84318d23c2bcba320fd9fece8a70
-
SHA1
e72993a1413c32ea0398f145e1bdf78e80d9acc0
-
SHA256
c1410446f66a0c27f826723d439d31c8ee7e6065644da79907a0cf48eacd54d3
-
SHA512
9996748442404a6f6ff8635799240f545cf6cc4e90d91a100cfb05b4730da614fa0261cc0e4b68ff108aa40cd68c6d8700d483ae2bc17ac42b8ca65175070cd6
-
SSDEEP
3072:a8QzJ1Byi7wPgPJSjkqrifbdB7dYk1Bx8DpsV68RfPi4meqByN2DmtXGTtiOd/VZ:a8eIi74SSjkym/89bifPidzIEZ/VZ
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gkmabdfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kipfhbmo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pciknh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Opdkgj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iianjl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llhejldh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pdloib32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cacedd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcmdlgoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mlndfa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjfghl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Babdhlmh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neagan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qqiqam32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oiolfo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmpedk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plonoq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfllce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lebcdd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmbbjjhj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkpoahgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pckcajfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbeemi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amgggm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmfdfpih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Amepoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfpnlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lpnlid32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogjjie32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmiqlpge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fedinobh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hbpomb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbmjai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nfjnja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Anjqdd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbdegeei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jankcafl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpohplpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmiqlpge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgolmbnq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jicgoohq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgmlljgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lfhdeoqh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcgqoech.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Khmmkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Plonoq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdpcgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hjggnp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lecfiahe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Necpopfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nmqbib32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lebcdd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogcaaahi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dmbbjjhj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flldei32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imgmonga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfnaglfn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qnmfmoaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cdejpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qnedbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfnaglfn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Babdhlmh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfpnlk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmfdfpih.exe -
Executes dropped EXE 64 IoCs
pid Process 1200 Lklmoccl.exe 2652 Lebcdd32.exe 2972 Lmpdoffo.exe 2996 Mpegka32.exe 456 Mojdlm32.exe 1244 Mlndfa32.exe 760 Ocjfgo32.exe 1484 Ooaflp32.exe 564 Ofphdi32.exe 308 Ogcaaahi.exe 2932 Pjfghl32.exe 1952 Pcokaa32.exe 2120 Qnmfmoaa.exe 2060 Bmnbjill.exe 2408 Boakgapg.exe 1808 Babdhlmh.exe 940 Cdejpg32.exe 2008 Dkookd32.exe 888 Fiomhc32.exe 840 Gijplg32.exe 2552 Lgnnicpe.exe 2040 Lpnlid32.exe 2424 Lfhdeoqh.exe 2504 Lkdmneoo.exe 1452 Mgkncfdc.exe 2456 Meonlkcm.exe 1944 Mbcofobg.exe 2760 Nfjnja32.exe 2288 Nogodcli.exe 2488 Neagan32.exe 1596 Nlkonhkb.exe 2752 Niopgljl.exe 2876 Obhdpaqm.exe 2888 Oooeeb32.exe 2628 Ogjjie32.exe 1960 Opbnbj32.exe 1988 Opdkgj32.exe 2792 Onhkan32.exe 2908 Oiolfo32.exe 1372 Pcgqoech.exe 1324 Piaiko32.exe 532 Pdpcgl32.exe 2928 Pnhhpaio.exe 2124 Qjoheb32.exe 1248 Qqiqam32.exe 2056 Amgggm32.exe 2272 Afolpb32.exe 968 Anjqdd32.exe 3068 Bggohi32.exe 2776 Bmdgqp32.exe 816 Bmfdfpih.exe 972 Bpepbkhk.exe 2544 Bmiqlpge.exe 856 Pnedpl32.exe 832 Mnfhhicd.exe 2660 Dnikno32.exe 1220 Dmpedk32.exe 2716 Ddjmaebi.exe 1760 Dmbbjjhj.exe 2220 Ebojbaga.exe 2404 Epckkeek.exe 2996 Eepccldb.exe 1728 Eohhmbjc.exe 2860 Ellhffim.exe -
Loads dropped DLL 64 IoCs
pid Process 2892 NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe 2892 NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe 1200 Lklmoccl.exe 1200 Lklmoccl.exe 2652 Lebcdd32.exe 2652 Lebcdd32.exe 2972 Lmpdoffo.exe 2972 Lmpdoffo.exe 2996 Mpegka32.exe 2996 Mpegka32.exe 456 Mojdlm32.exe 456 Mojdlm32.exe 1244 Mlndfa32.exe 1244 Mlndfa32.exe 760 Ocjfgo32.exe 760 Ocjfgo32.exe 1484 Ooaflp32.exe 1484 Ooaflp32.exe 564 Ofphdi32.exe 564 Ofphdi32.exe 308 Ogcaaahi.exe 308 Ogcaaahi.exe 2932 Pjfghl32.exe 2932 Pjfghl32.exe 1952 Pcokaa32.exe 1952 Pcokaa32.exe 2120 Qnmfmoaa.exe 2120 Qnmfmoaa.exe 2060 Bmnbjill.exe 2060 Bmnbjill.exe 2408 Boakgapg.exe 2408 Boakgapg.exe 1808 Babdhlmh.exe 1808 Babdhlmh.exe 940 Cdejpg32.exe 940 Cdejpg32.exe 2008 Dkookd32.exe 2008 Dkookd32.exe 888 Fiomhc32.exe 888 Fiomhc32.exe 840 Gijplg32.exe 840 Gijplg32.exe 2552 Lgnnicpe.exe 2552 Lgnnicpe.exe 2040 Lpnlid32.exe 2040 Lpnlid32.exe 2424 Lfhdeoqh.exe 2424 Lfhdeoqh.exe 2504 Lkdmneoo.exe 2504 Lkdmneoo.exe 1452 Mgkncfdc.exe 1452 Mgkncfdc.exe 2456 Meonlkcm.exe 2456 Meonlkcm.exe 1944 Mbcofobg.exe 1944 Mbcofobg.exe 2760 Nfjnja32.exe 2760 Nfjnja32.exe 2288 Nogodcli.exe 2288 Nogodcli.exe 2488 Neagan32.exe 2488 Neagan32.exe 1596 Nlkonhkb.exe 1596 Nlkonhkb.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cmfnedeb.dll Bmiqlpge.exe File opened for modification C:\Windows\SysWOW64\Icjokidf.exe Ibibcanh.exe File opened for modification C:\Windows\SysWOW64\Ppeqdp32.exe Pilhhffp.exe File created C:\Windows\SysWOW64\Ifafmpnn.dll Amepoc32.exe File created C:\Windows\SysWOW64\Iaalaglm.dll Cbdalmlb.exe File opened for modification C:\Windows\SysWOW64\Babdhlmh.exe Boakgapg.exe File created C:\Windows\SysWOW64\Bbkgbo32.dll Lgnnicpe.exe File opened for modification C:\Windows\SysWOW64\Epckkeek.exe Ebojbaga.exe File created C:\Windows\SysWOW64\Fiiono32.exe Eegidknj.exe File created C:\Windows\SysWOW64\Gelonn32.exe Gndgmq32.exe File created C:\Windows\SysWOW64\Dglcoefp.dll Ibibcanh.exe File opened for modification C:\Windows\SysWOW64\Ellhffim.exe Eohhmbjc.exe File opened for modification C:\Windows\SysWOW64\Iianjl32.exe Ibgenaqk.exe File created C:\Windows\SysWOW64\Lbqhmkhq.dll Cdejpg32.exe File created C:\Windows\SysWOW64\Lfhdeoqh.exe Lpnlid32.exe File opened for modification C:\Windows\SysWOW64\Hfgbbb32.exe Gkmabdfb.exe File created C:\Windows\SysWOW64\Eofekf32.dll Imccco32.exe File created C:\Windows\SysWOW64\Mhopelgd.exe Mnfkmfac.exe File created C:\Windows\SysWOW64\Kgalhoip.dll Nplapn32.exe File created C:\Windows\SysWOW64\Ogjjie32.exe Oooeeb32.exe File created C:\Windows\SysWOW64\Fifane32.dll Pcgqoech.exe File created C:\Windows\SysWOW64\Ffajkmnj.dll Bpepbkhk.exe File created C:\Windows\SysWOW64\Npnoikej.dll Jbnhmdmn.exe File created C:\Windows\SysWOW64\Ccbmdq32.dll Kogehdqp.exe File opened for modification C:\Windows\SysWOW64\Kiepca32.exe Kdhgkk32.exe File opened for modification C:\Windows\SysWOW64\Pdloib32.exe Pckcajfi.exe File created C:\Windows\SysWOW64\Lgnnicpe.exe Gijplg32.exe File created C:\Windows\SysWOW64\Nogodcli.exe Nfjnja32.exe File created C:\Windows\SysWOW64\Oooeeb32.exe Obhdpaqm.exe File created C:\Windows\SysWOW64\Ocbndgof.dll Amgggm32.exe File opened for modification C:\Windows\SysWOW64\Bpepbkhk.exe Bmfdfpih.exe File opened for modification C:\Windows\SysWOW64\Lkpoahgm.exe Lecfiahe.exe File created C:\Windows\SysWOW64\Bclpmc32.dll Lcmdlgoj.exe File created C:\Windows\SysWOW64\Lkpoahgm.exe Lecfiahe.exe File opened for modification C:\Windows\SysWOW64\Mnfhhicd.exe Pnedpl32.exe File created C:\Windows\SysWOW64\Dnikno32.exe Mnfhhicd.exe File created C:\Windows\SysWOW64\Moebgb32.dll Hofmlf32.exe File created C:\Windows\SysWOW64\Nigbncgj.exe Nbmjai32.exe File created C:\Windows\SysWOW64\Cfpnlk32.exe Cbdalmlb.exe File opened for modification C:\Windows\SysWOW64\Cbanlg32.exe Dkiifnab.exe File created C:\Windows\SysWOW64\Gnjmmlfg.dll Babdhlmh.exe File created C:\Windows\SysWOW64\Bpepbkhk.exe Bmfdfpih.exe File created C:\Windows\SysWOW64\Dlkchjnb.dll Eegidknj.exe File created C:\Windows\SysWOW64\Cpolaagl.dll Khojqj32.exe File created C:\Windows\SysWOW64\Pciflkhk.exe Plonoq32.exe File created C:\Windows\SysWOW64\Gmaddl32.dll Qfllce32.exe File opened for modification C:\Windows\SysWOW64\Oooeeb32.exe Obhdpaqm.exe File created C:\Windows\SysWOW64\Nmqbib32.exe Nplapn32.exe File created C:\Windows\SysWOW64\Jgmjmeol.dll Dldlealk.exe File opened for modification C:\Windows\SysWOW64\Pjbnie32.exe Pciflkhk.exe File opened for modification C:\Windows\SysWOW64\Pckcajfi.exe Pjbnie32.exe File created C:\Windows\SysWOW64\Aomgmgle.dll Bmnbjill.exe File created C:\Windows\SysWOW64\Fbledk32.dll Pnedpl32.exe File created C:\Windows\SysWOW64\Iikonh32.dll Gkmabdfb.exe File opened for modification C:\Windows\SysWOW64\Hfioha32.exe Hqlfpk32.exe File created C:\Windows\SysWOW64\Cdekml32.dll Mppiqq32.exe File created C:\Windows\SysWOW64\Pdloib32.exe Pckcajfi.exe File opened for modification C:\Windows\SysWOW64\Ooaflp32.exe Ocjfgo32.exe File opened for modification C:\Windows\SysWOW64\Lkdmneoo.exe Lfhdeoqh.exe File opened for modification C:\Windows\SysWOW64\Jbdegeei.exe Imgmonga.exe File opened for modification C:\Windows\SysWOW64\Dkiifnab.exe Dbndbkdh.exe File created C:\Windows\SysWOW64\Jeckce32.dll Nlkonhkb.exe File opened for modification C:\Windows\SysWOW64\Ddjmaebi.exe Dmpedk32.exe File created C:\Windows\SysWOW64\Ellhffim.exe Eohhmbjc.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Opdkgj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jbnhmdmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Keiijb32.dll" Lcakqjob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebcmok32.dll" Qhmeeqpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cbgnaljp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Babdhlmh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Obhdpaqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glnqfd32.dll" Ebojbaga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjfallhc.dll" Hbpomb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hjggnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adknlh32.dll" Qngqgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mojdlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipbqpika.dll" Oooeeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acmlqg32.dll" Bggohi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bpepbkhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Neagahnp.dll" Mnfkmfac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pjpace32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lfhdeoqh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nfjnja32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmbbjjhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikajoegb.dll" Aiofln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Njpiggde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmdknf32.dll" Chkqko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lklmoccl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Geibin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akafqmpa.dll" Kdhgkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Laenccbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nlkonhkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Damhij32.dll" Afolpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Opagjqab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anedfn32.dll" Dkookd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jknojcec.dll" Nfjnja32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bggohi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hkjqkhkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkjepj32.dll" Nbmjai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bbeemi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlneglae.dll" Gijplg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Afolpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffajkmnj.dll" Bpepbkhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lkdmneoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Niopgljl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eofekf32.dll" Imccco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Peepcj32.dll" Linciami.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pjbnie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oiolfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Piaiko32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pciknh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pjfghl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpfpgbnn.dll" Qjoheb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hfgbbb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hkjqkhkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcpgdbfn.dll" Laenccbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cfpnlk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nigbncgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ogjjie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohgopl32.dll" Opdkgj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Plonoq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpmnln32.dll" Jicgoohq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pilhhffp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddaipe32.dll" Pgpiajdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qnedbh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Chfcoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmnbjill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2892 wrote to memory of 1200 2892 NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe 28 PID 2892 wrote to memory of 1200 2892 NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe 28 PID 2892 wrote to memory of 1200 2892 NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe 28 PID 2892 wrote to memory of 1200 2892 NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe 28 PID 1200 wrote to memory of 2652 1200 Lklmoccl.exe 29 PID 1200 wrote to memory of 2652 1200 Lklmoccl.exe 29 PID 1200 wrote to memory of 2652 1200 Lklmoccl.exe 29 PID 1200 wrote to memory of 2652 1200 Lklmoccl.exe 29 PID 2652 wrote to memory of 2972 2652 Lebcdd32.exe 30 PID 2652 wrote to memory of 2972 2652 Lebcdd32.exe 30 PID 2652 wrote to memory of 2972 2652 Lebcdd32.exe 30 PID 2652 wrote to memory of 2972 2652 Lebcdd32.exe 30 PID 2972 wrote to memory of 2996 2972 Lmpdoffo.exe 31 PID 2972 wrote to memory of 2996 2972 Lmpdoffo.exe 31 PID 2972 wrote to memory of 2996 2972 Lmpdoffo.exe 31 PID 2972 wrote to memory of 2996 2972 Lmpdoffo.exe 31 PID 2996 wrote to memory of 456 2996 Mpegka32.exe 32 PID 2996 wrote to memory of 456 2996 Mpegka32.exe 32 PID 2996 wrote to memory of 456 2996 Mpegka32.exe 32 PID 2996 wrote to memory of 456 2996 Mpegka32.exe 32 PID 456 wrote to memory of 1244 456 Mojdlm32.exe 33 PID 456 wrote to memory of 1244 456 Mojdlm32.exe 33 PID 456 wrote to memory of 1244 456 Mojdlm32.exe 33 PID 456 wrote to memory of 1244 456 Mojdlm32.exe 33 PID 1244 wrote to memory of 760 1244 Mlndfa32.exe 34 PID 1244 wrote to memory of 760 1244 Mlndfa32.exe 34 PID 1244 wrote to memory of 760 1244 Mlndfa32.exe 34 PID 1244 wrote to memory of 760 1244 Mlndfa32.exe 34 PID 760 wrote to memory of 1484 760 Ocjfgo32.exe 35 PID 760 wrote to memory of 1484 760 Ocjfgo32.exe 35 PID 760 wrote to memory of 1484 760 Ocjfgo32.exe 35 PID 760 wrote to memory of 1484 760 Ocjfgo32.exe 35 PID 1484 wrote to memory of 564 1484 Ooaflp32.exe 36 PID 1484 wrote to memory of 564 1484 Ooaflp32.exe 36 PID 1484 wrote to memory of 564 1484 Ooaflp32.exe 36 PID 1484 wrote to memory of 564 1484 Ooaflp32.exe 36 PID 564 wrote to memory of 308 564 Ofphdi32.exe 37 PID 564 wrote to memory of 308 564 Ofphdi32.exe 37 PID 564 wrote to memory of 308 564 Ofphdi32.exe 37 PID 564 wrote to memory of 308 564 Ofphdi32.exe 37 PID 308 wrote to memory of 2932 308 Ogcaaahi.exe 38 PID 308 wrote to memory of 2932 308 Ogcaaahi.exe 38 PID 308 wrote to memory of 2932 308 Ogcaaahi.exe 38 PID 308 wrote to memory of 2932 308 Ogcaaahi.exe 38 PID 2932 wrote to memory of 1952 2932 Pjfghl32.exe 39 PID 2932 wrote to memory of 1952 2932 Pjfghl32.exe 39 PID 2932 wrote to memory of 1952 2932 Pjfghl32.exe 39 PID 2932 wrote to memory of 1952 2932 Pjfghl32.exe 39 PID 1952 wrote to memory of 2120 1952 Pcokaa32.exe 40 PID 1952 wrote to memory of 2120 1952 Pcokaa32.exe 40 PID 1952 wrote to memory of 2120 1952 Pcokaa32.exe 40 PID 1952 wrote to memory of 2120 1952 Pcokaa32.exe 40 PID 2120 wrote to memory of 2060 2120 Qnmfmoaa.exe 41 PID 2120 wrote to memory of 2060 2120 Qnmfmoaa.exe 41 PID 2120 wrote to memory of 2060 2120 Qnmfmoaa.exe 41 PID 2120 wrote to memory of 2060 2120 Qnmfmoaa.exe 41 PID 2060 wrote to memory of 2408 2060 Bmnbjill.exe 42 PID 2060 wrote to memory of 2408 2060 Bmnbjill.exe 42 PID 2060 wrote to memory of 2408 2060 Bmnbjill.exe 42 PID 2060 wrote to memory of 2408 2060 Bmnbjill.exe 42 PID 2408 wrote to memory of 1808 2408 Boakgapg.exe 43 PID 2408 wrote to memory of 1808 2408 Boakgapg.exe 43 PID 2408 wrote to memory of 1808 2408 Boakgapg.exe 43 PID 2408 wrote to memory of 1808 2408 Boakgapg.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c3bf84318d23c2bcba320fd9fece8a70.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\Lklmoccl.exeC:\Windows\system32\Lklmoccl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\Lebcdd32.exeC:\Windows\system32\Lebcdd32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\Lmpdoffo.exeC:\Windows\system32\Lmpdoffo.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\Mpegka32.exeC:\Windows\system32\Mpegka32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Mojdlm32.exeC:\Windows\system32\Mojdlm32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\Mlndfa32.exeC:\Windows\system32\Mlndfa32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\Ocjfgo32.exeC:\Windows\system32\Ocjfgo32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\Ooaflp32.exeC:\Windows\system32\Ooaflp32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\Ofphdi32.exeC:\Windows\system32\Ofphdi32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\Ogcaaahi.exeC:\Windows\system32\Ogcaaahi.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\Pjfghl32.exeC:\Windows\system32\Pjfghl32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Pcokaa32.exeC:\Windows\system32\Pcokaa32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\Qnmfmoaa.exeC:\Windows\system32\Qnmfmoaa.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Bmnbjill.exeC:\Windows\system32\Bmnbjill.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\Boakgapg.exeC:\Windows\system32\Boakgapg.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\Babdhlmh.exeC:\Windows\system32\Babdhlmh.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1808 -
C:\Windows\SysWOW64\Cdejpg32.exeC:\Windows\system32\Cdejpg32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:940 -
C:\Windows\SysWOW64\Dkookd32.exeC:\Windows\system32\Dkookd32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Fiomhc32.exeC:\Windows\system32\Fiomhc32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:888 -
C:\Windows\SysWOW64\Gijplg32.exeC:\Windows\system32\Gijplg32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:840 -
C:\Windows\SysWOW64\Lgnnicpe.exeC:\Windows\system32\Lgnnicpe.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2552 -
C:\Windows\SysWOW64\Lpnlid32.exeC:\Windows\system32\Lpnlid32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2040 -
C:\Windows\SysWOW64\Lfhdeoqh.exeC:\Windows\system32\Lfhdeoqh.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2424 -
C:\Windows\SysWOW64\Lkdmneoo.exeC:\Windows\system32\Lkdmneoo.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2504 -
C:\Windows\SysWOW64\Mgkncfdc.exeC:\Windows\system32\Mgkncfdc.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1452 -
C:\Windows\SysWOW64\Meonlkcm.exeC:\Windows\system32\Meonlkcm.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2456 -
C:\Windows\SysWOW64\Mbcofobg.exeC:\Windows\system32\Mbcofobg.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Windows\SysWOW64\Nfjnja32.exeC:\Windows\system32\Nfjnja32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2760 -
C:\Windows\SysWOW64\Nogodcli.exeC:\Windows\system32\Nogodcli.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2288 -
C:\Windows\SysWOW64\Neagan32.exeC:\Windows\system32\Neagan32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2488 -
C:\Windows\SysWOW64\Nlkonhkb.exeC:\Windows\system32\Nlkonhkb.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Niopgljl.exeC:\Windows\system32\Niopgljl.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Obhdpaqm.exeC:\Windows\system32\Obhdpaqm.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2876 -
C:\Windows\SysWOW64\Oooeeb32.exeC:\Windows\system32\Oooeeb32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Ogjjie32.exeC:\Windows\system32\Ogjjie32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2628 -
C:\Windows\SysWOW64\Opbnbj32.exeC:\Windows\system32\Opbnbj32.exe37⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Opdkgj32.exeC:\Windows\system32\Opdkgj32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1988 -
C:\Windows\SysWOW64\Onhkan32.exeC:\Windows\system32\Onhkan32.exe39⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\Oiolfo32.exeC:\Windows\system32\Oiolfo32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2908 -
C:\Windows\SysWOW64\Pcgqoech.exeC:\Windows\system32\Pcgqoech.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1372 -
C:\Windows\SysWOW64\Piaiko32.exeC:\Windows\system32\Piaiko32.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:1324 -
C:\Windows\SysWOW64\Pdpcgl32.exeC:\Windows\system32\Pdpcgl32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:532 -
C:\Windows\SysWOW64\Pnhhpaio.exeC:\Windows\system32\Pnhhpaio.exe44⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\SysWOW64\Qjoheb32.exeC:\Windows\system32\Qjoheb32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:2124 -
C:\Windows\SysWOW64\Qqiqam32.exeC:\Windows\system32\Qqiqam32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1248 -
C:\Windows\SysWOW64\Amgggm32.exeC:\Windows\system32\Amgggm32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2056 -
C:\Windows\SysWOW64\Afolpb32.exeC:\Windows\system32\Afolpb32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\Anjqdd32.exeC:\Windows\system32\Anjqdd32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:968 -
C:\Windows\SysWOW64\Bggohi32.exeC:\Windows\system32\Bggohi32.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:3068 -
C:\Windows\SysWOW64\Bmdgqp32.exeC:\Windows\system32\Bmdgqp32.exe51⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\Bmfdfpih.exeC:\Windows\system32\Bmfdfpih.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:816 -
C:\Windows\SysWOW64\Bpepbkhk.exeC:\Windows\system32\Bpepbkhk.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\Bmiqlpge.exeC:\Windows\system32\Bmiqlpge.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\Pnedpl32.exeC:\Windows\system32\Pnedpl32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:856 -
C:\Windows\SysWOW64\Mnfhhicd.exeC:\Windows\system32\Mnfhhicd.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:832 -
C:\Windows\SysWOW64\Dnikno32.exeC:\Windows\system32\Dnikno32.exe57⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\Dmpedk32.exeC:\Windows\system32\Dmpedk32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1220 -
C:\Windows\SysWOW64\Ddjmaebi.exeC:\Windows\system32\Ddjmaebi.exe59⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Dmbbjjhj.exeC:\Windows\system32\Dmbbjjhj.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1760 -
C:\Windows\SysWOW64\Ebojbaga.exeC:\Windows\system32\Ebojbaga.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2220 -
C:\Windows\SysWOW64\Epckkeek.exeC:\Windows\system32\Epckkeek.exe62⤵
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\Eepccldb.exeC:\Windows\system32\Eepccldb.exe63⤵
- Executes dropped EXE
PID:2996 -
C:\Windows\SysWOW64\Eohhmbjc.exeC:\Windows\system32\Eohhmbjc.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1728 -
C:\Windows\SysWOW64\Ellhffim.exeC:\Windows\system32\Ellhffim.exe65⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\Eegidknj.exeC:\Windows\system32\Eegidknj.exe66⤵
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\Fiiono32.exeC:\Windows\system32\Fiiono32.exe67⤵PID:2516
-
C:\Windows\SysWOW64\Fpcgji32.exeC:\Windows\system32\Fpcgji32.exe68⤵PID:2624
-
C:\Windows\SysWOW64\Fgolmbnq.exeC:\Windows\system32\Fgolmbnq.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2640 -
C:\Windows\SysWOW64\Flldei32.exeC:\Windows\system32\Flldei32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1628 -
C:\Windows\SysWOW64\Fedinobh.exeC:\Windows\system32\Fedinobh.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2980 -
C:\Windows\SysWOW64\Floaji32.exeC:\Windows\system32\Floaji32.exe72⤵PID:2960
-
C:\Windows\SysWOW64\Fchigcab.exeC:\Windows\system32\Fchigcab.exe73⤵PID:1976
-
C:\Windows\SysWOW64\Glanpi32.exeC:\Windows\system32\Glanpi32.exe74⤵PID:836
-
C:\Windows\SysWOW64\Geibin32.exeC:\Windows\system32\Geibin32.exe75⤵
- Modifies registry class
PID:1788 -
C:\Windows\SysWOW64\Gndgmq32.exeC:\Windows\system32\Gndgmq32.exe76⤵
- Drops file in System32 directory
PID:868 -
C:\Windows\SysWOW64\Gelonn32.exeC:\Windows\system32\Gelonn32.exe77⤵PID:2948
-
C:\Windows\SysWOW64\Gkmabdfb.exeC:\Windows\system32\Gkmabdfb.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1828 -
C:\Windows\SysWOW64\Hfgbbb32.exeC:\Windows\system32\Hfgbbb32.exe79⤵
- Modifies registry class
PID:1076 -
C:\Windows\SysWOW64\Hqlfpk32.exeC:\Windows\system32\Hqlfpk32.exe80⤵
- Drops file in System32 directory
PID:2616 -
C:\Windows\SysWOW64\Hfioha32.exeC:\Windows\system32\Hfioha32.exe81⤵PID:2092
-
C:\Windows\SysWOW64\Hbpomb32.exeC:\Windows\system32\Hbpomb32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1712 -
C:\Windows\SysWOW64\Hjggnp32.exeC:\Windows\system32\Hjggnp32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:776 -
C:\Windows\SysWOW64\Hfnhcami.exeC:\Windows\system32\Hfnhcami.exe84⤵PID:2436
-
C:\Windows\SysWOW64\Hkjqkhkq.exeC:\Windows\system32\Hkjqkhkq.exe85⤵
- Modifies registry class
PID:332 -
C:\Windows\SysWOW64\Hofmlf32.exeC:\Windows\system32\Hofmlf32.exe86⤵
- Drops file in System32 directory
PID:1068 -
C:\Windows\SysWOW64\Iinadl32.exeC:\Windows\system32\Iinadl32.exe87⤵PID:1744
-
C:\Windows\SysWOW64\Ibgenaqk.exeC:\Windows\system32\Ibgenaqk.exe88⤵
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\Iianjl32.exeC:\Windows\system32\Iianjl32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1880 -
C:\Windows\SysWOW64\Ibibcanh.exeC:\Windows\system32\Ibibcanh.exe90⤵
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\Icjokidf.exeC:\Windows\system32\Icjokidf.exe91⤵PID:2332
-
C:\Windows\SysWOW64\Imccco32.exeC:\Windows\system32\Imccco32.exe92⤵
- Drops file in System32 directory
- Modifies registry class
PID:2248 -
C:\Windows\SysWOW64\Icmkpibd.exeC:\Windows\system32\Icmkpibd.exe93⤵PID:1412
-
C:\Windows\SysWOW64\Inbpnbbj.exeC:\Windows\system32\Inbpnbbj.exe94⤵PID:2880
-
C:\Windows\SysWOW64\Icohfi32.exeC:\Windows\system32\Icohfi32.exe95⤵PID:1780
-
C:\Windows\SysWOW64\Imgmonga.exeC:\Windows\system32\Imgmonga.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1768 -
C:\Windows\SysWOW64\Jbdegeei.exeC:\Windows\system32\Jbdegeei.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2212 -
C:\Windows\SysWOW64\Jmjidneo.exeC:\Windows\system32\Jmjidneo.exe98⤵PID:2744
-
C:\Windows\SysWOW64\Jicgoohq.exeC:\Windows\system32\Jicgoohq.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2576 -
C:\Windows\SysWOW64\Jankcafl.exeC:\Windows\system32\Jankcafl.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1968 -
C:\Windows\SysWOW64\Jhhcpkmh.exeC:\Windows\system32\Jhhcpkmh.exe101⤵PID:2988
-
C:\Windows\SysWOW64\Jbnhmdmn.exeC:\Windows\system32\Jbnhmdmn.exe102⤵
- Drops file in System32 directory
- Modifies registry class
PID:268 -
C:\Windows\SysWOW64\Jhjpekkf.exeC:\Windows\system32\Jhjpekkf.exe103⤵PID:2636
-
C:\Windows\SysWOW64\Kmginaim.exeC:\Windows\system32\Kmginaim.exe104⤵PID:1464
-
C:\Windows\SysWOW64\Khmmkj32.exeC:\Windows\system32\Khmmkj32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2800 -
C:\Windows\SysWOW64\Kogehdqp.exeC:\Windows\system32\Kogehdqp.exe106⤵
- Drops file in System32 directory
PID:2788 -
C:\Windows\SysWOW64\Khojqj32.exeC:\Windows\system32\Khojqj32.exe107⤵
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\Kipfhbmo.exeC:\Windows\system32\Kipfhbmo.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1532 -
C:\Windows\SysWOW64\Kibcnb32.exeC:\Windows\system32\Kibcnb32.exe109⤵PID:1608
-
C:\Windows\SysWOW64\Kdhgkk32.exeC:\Windows\system32\Kdhgkk32.exe110⤵
- Drops file in System32 directory
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Kiepca32.exeC:\Windows\system32\Kiepca32.exe111⤵PID:2200
-
C:\Windows\SysWOW64\Kpohplpf.exeC:\Windows\system32\Kpohplpf.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1668 -
C:\Windows\SysWOW64\Lcmdlgoj.exeC:\Windows\system32\Lcmdlgoj.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1536 -
C:\Windows\SysWOW64\Labamcdb.exeC:\Windows\system32\Labamcdb.exe114⤵PID:920
-
C:\Windows\SysWOW64\Llhejldh.exeC:\Windows\system32\Llhejldh.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2432 -
C:\Windows\SysWOW64\Laenccbo.exeC:\Windows\system32\Laenccbo.exe116⤵
- Modifies registry class
PID:3020 -
C:\Windows\SysWOW64\Lljbpl32.exeC:\Windows\system32\Lljbpl32.exe117⤵PID:2232
-
C:\Windows\SysWOW64\Lecfiahe.exeC:\Windows\system32\Lecfiahe.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1204 -
C:\Windows\SysWOW64\Lkpoahgm.exeC:\Windows\system32\Lkpoahgm.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1736 -
C:\Windows\SysWOW64\Pciknh32.exeC:\Windows\system32\Pciknh32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1556 -
C:\Windows\SysWOW64\Aiofln32.exeC:\Windows\system32\Aiofln32.exe121⤵
- Modifies registry class
PID:1808 -
C:\Windows\SysWOW64\Mfgdhkki.exeC:\Windows\system32\Mfgdhkki.exe122⤵PID:3060
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-