Analysis
-
max time kernel
184s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.41c017635343021c328259eec60031c0.exe
Resource
win7-20231020-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.41c017635343021c328259eec60031c0.exe
Resource
win10v2004-20231020-en
5 signatures
150 seconds
General
-
Target
NEAS.41c017635343021c328259eec60031c0.exe
-
Size
340KB
-
MD5
41c017635343021c328259eec60031c0
-
SHA1
611a03f5582f2b267b7d92c083896cfaa2d120fc
-
SHA256
5b7edca5b4f9ec21ff6f65fa4a3264efc6d8fd8ae44fe90e368c1be9e632c1f0
-
SHA512
427004bdc291b709cf38fb8087fa4e89991e5aae321c92a96c78b0c05d1ba7f4bbde98ea7c3029f0d1b3001951b6405cb5d6e92dcda863dabd0564121c295660
-
SSDEEP
6144:oe7s++Yu3/fc/UmKyIxLDXXoq9FJZCUmKyIxLjh:oeJ32XXf9Do3i
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcagdj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmpido32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fdgdpdgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkfnnjnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eaklcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lpghfi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Femigg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Foebmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofhkgeij.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjhmbihg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eddodfhp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glebbpbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jgqdal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gjadck32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gikkof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.41c017635343021c328259eec60031c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ehbgjenf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fkopgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Heapmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ihnkobpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jhgneqha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jqihjbod.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkcfbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cahffmel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hcmgphma.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghdhja32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfhehlhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bbjmih32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dacebkko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fdpnpe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfoihalp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gpqjaanf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljffccjh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ickcaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jqpfccgo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipflcnln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cglbanmo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifgbhbbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jhlgpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gfhehlhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bdapon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kmhccpci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jlnbhe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckpjob32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcmnijkd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhlgpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gpeclq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eimelg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Njjmil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dejhgkgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dkjmea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fafkoiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bhdilold.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kgngqico.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kpilekqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pbbnbkpe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpidhmoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jnfcbg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knmicfnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fjhmbihg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifjoma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilfhfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eqbcqnph.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqbcqnph.exe -
Executes dropped EXE 64 IoCs
pid Process 4012 Fjhmbihg.exe 4276 Fglnkm32.exe 4560 Gbkdod32.exe 1488 Podkmgop.exe 3984 Ecdkdj32.exe 1296 Ijhhenhf.exe 1048 Mopeofjl.exe 4212 Fifomlap.exe 2424 Jjjggede.exe 3940 Kmhccpci.exe 2468 Kgngqico.exe 2760 Kpilekqj.exe 3620 Kmpido32.exe 2152 Ljffccjh.exe 1176 Lcnkli32.exe 4108 Lpghfi32.exe 496 Eimelg32.exe 268 Fkehdnee.exe 1280 Femigg32.exe 3336 Flgadake.exe 3468 Geabbfoc.exe 2688 Gknkkmmj.exe 2720 Ghdhja32.exe 5084 Jlnbhe32.exe 3836 Jakkplbc.exe 1208 Jhdcmf32.exe 3176 Kfpjgi32.exe 4380 Eqbcqnph.exe 2792 Knjhae32.exe 2240 Plifea32.exe 1420 Pbbnbkpe.exe 2124 Qhofjbnl.exe 4120 Qecgcfmf.exe 2848 Qpikao32.exe 1440 Aiapjecl.exe 2004 Alioloje.exe 4060 Bafgdfim.exe 5052 Bpggbm32.exe 3140 Bedpjdoc.exe 3420 Bpidhmoi.exe 2932 Bbhqdhnm.exe 1032 Bhdilold.exe 4948 Bbjmih32.exe 3252 Mphfjhjf.exe 1852 Njjmil32.exe 1276 Qcccom32.exe 2796 Cahffmel.exe 2836 Ckpjob32.exe 4308 Dlpgiebo.exe 4408 Ddklnh32.exe 4876 Dkedjbgg.exe 3800 Dejhgkgm.exe 5104 Docmqp32.exe 224 Dkjmea32.exe 1688 Dacebkko.exe 3936 Dogfkpih.exe 1676 Eddodfhp.exe 472 Ehbgjenf.exe 1564 Eaklcj32.exe 4028 Ekcplp32.exe 3444 Eamhhjbd.exe 2436 Fdpnpe32.exe 1416 Foebmn32.exe 4360 Fadoii32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Afdmjk32.dll Kmpido32.exe File opened for modification C:\Windows\SysWOW64\Imonol32.exe Heapmp32.exe File opened for modification C:\Windows\SysWOW64\Nfnafpni.exe Chkokq32.exe File opened for modification C:\Windows\SysWOW64\Gpqjaanf.exe Gfhehlhe.exe File opened for modification C:\Windows\SysWOW64\Dgmhmggq.exe Ciihcbhg.exe File created C:\Windows\SysWOW64\Llmghjen.dll Aiapjecl.exe File created C:\Windows\SysWOW64\Gfhehlhe.exe Gjadck32.exe File created C:\Windows\SysWOW64\Ipflcnln.exe Iildfd32.exe File created C:\Windows\SysWOW64\Qecgcfmf.exe Qhofjbnl.exe File created C:\Windows\SysWOW64\Bkkgddkp.dll Gpeclq32.exe File created C:\Windows\SysWOW64\Kfpjgi32.exe Jhdcmf32.exe File created C:\Windows\SysWOW64\Pqfjpc32.dll Ifgbhbbh.exe File opened for modification C:\Windows\SysWOW64\Kgenlldo.exe Knmicfnn.exe File opened for modification C:\Windows\SysWOW64\Ljffccjh.exe Kmpido32.exe File opened for modification C:\Windows\SysWOW64\Plifea32.exe Knjhae32.exe File created C:\Windows\SysWOW64\Cmqljn32.dll Flgadake.exe File opened for modification C:\Windows\SysWOW64\Gknkkmmj.exe Geabbfoc.exe File opened for modification C:\Windows\SysWOW64\Jqihjbod.exe Jgqdal32.exe File opened for modification C:\Windows\SysWOW64\Gbbkjgpl.exe Glebbpbd.exe File created C:\Windows\SysWOW64\Jjjggede.exe Fifomlap.exe File opened for modification C:\Windows\SysWOW64\Gjadck32.exe Kgopbj32.exe File created C:\Windows\SysWOW64\Ebbndndm.dll Jgcafl32.exe File created C:\Windows\SysWOW64\Phoaeipj.dll Gikkof32.exe File created C:\Windows\SysWOW64\Alhbab32.dll Gcagdj32.exe File created C:\Windows\SysWOW64\Imakdl32.exe Ifgbhbbh.exe File created C:\Windows\SysWOW64\Cneknh32.exe Cglbanmo.exe File opened for modification C:\Windows\SysWOW64\Podkmgop.exe Gbkdod32.exe File created C:\Windows\SysWOW64\Bqpqlhmf.dll Gbkdod32.exe File created C:\Windows\SysWOW64\Bcebkcic.dll Gbbkjgpl.exe File created C:\Windows\SysWOW64\Kkjlmn32.dll Jdnnjane.exe File created C:\Windows\SysWOW64\Hpdifh32.dll Cancoqkl.exe File created C:\Windows\SysWOW64\Keqeeg32.dll Cgklggic.exe File created C:\Windows\SysWOW64\Ifcbedom.dll Qcccom32.exe File created C:\Windows\SysWOW64\Hngaibfg.dll Hkhkdjkl.exe File created C:\Windows\SysWOW64\Pgpjde32.dll Hphpap32.exe File created C:\Windows\SysWOW64\Ofhkgeij.exe Idceim32.exe File created C:\Windows\SysWOW64\Cbpppcid.dll Lcnkli32.exe File opened for modification C:\Windows\SysWOW64\Fafkoiji.exe Fadoii32.exe File created C:\Windows\SysWOW64\Fengfmaj.dll Jqihjbod.exe File created C:\Windows\SysWOW64\Mbhpjd32.dll Kkcfbj32.exe File opened for modification C:\Windows\SysWOW64\Aiapjecl.exe Qpikao32.exe File opened for modification C:\Windows\SysWOW64\Eaklcj32.exe Ehbgjenf.exe File created C:\Windows\SysWOW64\Ffmkieab.dll Ekcplp32.exe File opened for modification C:\Windows\SysWOW64\Gcmnijkd.exe Flqigq32.exe File opened for modification C:\Windows\SysWOW64\Mopeofjl.exe Ijhhenhf.exe File created C:\Windows\SysWOW64\Mphfjhjf.exe Bbjmih32.exe File created C:\Windows\SysWOW64\Cdjnpj32.dll Fafkoiji.exe File opened for modification C:\Windows\SysWOW64\Ihpgda32.exe Injcginc.exe File created C:\Windows\SysWOW64\Kkcfbj32.exe Kiejfo32.exe File opened for modification C:\Windows\SysWOW64\Jhdcmf32.exe Jakkplbc.exe File created C:\Windows\SysWOW64\Bbhqdhnm.exe Bpidhmoi.exe File opened for modification C:\Windows\SysWOW64\Ddklnh32.exe Dlpgiebo.exe File created C:\Windows\SysWOW64\Limdkpgg.dll Jgqdal32.exe File created C:\Windows\SysWOW64\Anmfaf32.dll Fifomlap.exe File opened for modification C:\Windows\SysWOW64\Kkcfbj32.exe Kiejfo32.exe File opened for modification C:\Windows\SysWOW64\Geabbfoc.exe Flgadake.exe File created C:\Windows\SysWOW64\Kiejfo32.exe Kqnbea32.exe File created C:\Windows\SysWOW64\Nnefpdco.dll Ipflcnln.exe File created C:\Windows\SysWOW64\Nfnafpni.exe Chkokq32.exe File created C:\Windows\SysWOW64\Cinbhb32.dll Kgopbj32.exe File created C:\Windows\SysWOW64\Nneilmna.dll Fglnkm32.exe File opened for modification C:\Windows\SysWOW64\Gcddjiel.exe Gmjlmo32.exe File created C:\Windows\SysWOW64\Pknhff32.dll Hcmgphma.exe File opened for modification C:\Windows\SysWOW64\Ihbdja32.exe Ikndpm32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ceeojndk.dll" Geabbfoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dkjmea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hfiffd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ganikk32.dll" Dacebkko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fengfmaj.dll" Jqihjbod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cancoqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ijhhenhf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jhdcmf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bhdilold.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Heimmh32.dll" Eamhhjbd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gbkdod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Panemeei.dll" Bhdilold.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ihnkobpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Befkma32.dll" Qecgcfmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gcagdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Knoghk32.dll" Ilfhfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afdmjk32.dll" Kmpido32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eqbcqnph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qalejm32.dll" Njjmil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fajanl32.dll" Jfoihalp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cahffmel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dlpgiebo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dejhgkgm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ihbdja32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Alioloje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Iqmincia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gikkof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmlojd32.dll" Ofhkgeij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Injcginc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jjjggede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dogfkpih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Iqmincia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jnfcbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ciihcbhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jhlgpp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cancoqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Knmicfnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajqfhdik.dll" Cglbanmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npjjnkkh.dll" Ikndpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbfjep32.dll" Ciihcbhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jamenc32.dll" Jjjggede.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bafgdfim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gcmnijkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jnhphg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mopeofjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fadoii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gbcohl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node NEAS.41c017635343021c328259eec60031c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbpppcid.dll" Lcnkli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mphfjhjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmiajk32.dll" Cneknh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jakkplbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ipflcnln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cneknh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gknkkmmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ihnkobpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jqihjbod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Knmicfnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnefpdco.dll" Ipflcnln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifcbedom.dll" Qcccom32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gmhogppb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kekcjc32.dll" Gfhehlhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jqpfccgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Laanbjdf.dll" Ljffccjh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 4012 1788 NEAS.41c017635343021c328259eec60031c0.exe 87 PID 1788 wrote to memory of 4012 1788 NEAS.41c017635343021c328259eec60031c0.exe 87 PID 1788 wrote to memory of 4012 1788 NEAS.41c017635343021c328259eec60031c0.exe 87 PID 4012 wrote to memory of 4276 4012 Fjhmbihg.exe 88 PID 4012 wrote to memory of 4276 4012 Fjhmbihg.exe 88 PID 4012 wrote to memory of 4276 4012 Fjhmbihg.exe 88 PID 4276 wrote to memory of 4560 4276 Fglnkm32.exe 89 PID 4276 wrote to memory of 4560 4276 Fglnkm32.exe 89 PID 4276 wrote to memory of 4560 4276 Fglnkm32.exe 89 PID 4560 wrote to memory of 1488 4560 Gbkdod32.exe 90 PID 4560 wrote to memory of 1488 4560 Gbkdod32.exe 90 PID 4560 wrote to memory of 1488 4560 Gbkdod32.exe 90 PID 1488 wrote to memory of 3984 1488 Podkmgop.exe 91 PID 1488 wrote to memory of 3984 1488 Podkmgop.exe 91 PID 1488 wrote to memory of 3984 1488 Podkmgop.exe 91 PID 3984 wrote to memory of 1296 3984 Ecdkdj32.exe 92 PID 3984 wrote to memory of 1296 3984 Ecdkdj32.exe 92 PID 3984 wrote to memory of 1296 3984 Ecdkdj32.exe 92 PID 1296 wrote to memory of 1048 1296 Ijhhenhf.exe 93 PID 1296 wrote to memory of 1048 1296 Ijhhenhf.exe 93 PID 1296 wrote to memory of 1048 1296 Ijhhenhf.exe 93 PID 1048 wrote to memory of 4212 1048 Mopeofjl.exe 94 PID 1048 wrote to memory of 4212 1048 Mopeofjl.exe 94 PID 1048 wrote to memory of 4212 1048 Mopeofjl.exe 94 PID 4212 wrote to memory of 2424 4212 Fifomlap.exe 97 PID 4212 wrote to memory of 2424 4212 Fifomlap.exe 97 PID 4212 wrote to memory of 2424 4212 Fifomlap.exe 97 PID 2424 wrote to memory of 3940 2424 Jjjggede.exe 96 PID 2424 wrote to memory of 3940 2424 Jjjggede.exe 96 PID 2424 wrote to memory of 3940 2424 Jjjggede.exe 96 PID 3940 wrote to memory of 2468 3940 Kmhccpci.exe 95 PID 3940 wrote to memory of 2468 3940 Kmhccpci.exe 95 PID 3940 wrote to memory of 2468 3940 Kmhccpci.exe 95 PID 2468 wrote to memory of 2760 2468 Kgngqico.exe 98 PID 2468 wrote to memory of 2760 2468 Kgngqico.exe 98 PID 2468 wrote to memory of 2760 2468 Kgngqico.exe 98 PID 2760 wrote to memory of 3620 2760 Kpilekqj.exe 99 PID 2760 wrote to memory of 3620 2760 Kpilekqj.exe 99 PID 2760 wrote to memory of 3620 2760 Kpilekqj.exe 99 PID 3620 wrote to memory of 2152 3620 Kmpido32.exe 100 PID 3620 wrote to memory of 2152 3620 Kmpido32.exe 100 PID 3620 wrote to memory of 2152 3620 Kmpido32.exe 100 PID 2152 wrote to memory of 1176 2152 Ljffccjh.exe 101 PID 2152 wrote to memory of 1176 2152 Ljffccjh.exe 101 PID 2152 wrote to memory of 1176 2152 Ljffccjh.exe 101 PID 1176 wrote to memory of 4108 1176 Lcnkli32.exe 102 PID 1176 wrote to memory of 4108 1176 Lcnkli32.exe 102 PID 1176 wrote to memory of 4108 1176 Lcnkli32.exe 102 PID 4108 wrote to memory of 496 4108 Lpghfi32.exe 103 PID 4108 wrote to memory of 496 4108 Lpghfi32.exe 103 PID 4108 wrote to memory of 496 4108 Lpghfi32.exe 103 PID 496 wrote to memory of 268 496 Eimelg32.exe 104 PID 496 wrote to memory of 268 496 Eimelg32.exe 104 PID 496 wrote to memory of 268 496 Eimelg32.exe 104 PID 268 wrote to memory of 1280 268 Fkehdnee.exe 105 PID 268 wrote to memory of 1280 268 Fkehdnee.exe 105 PID 268 wrote to memory of 1280 268 Fkehdnee.exe 105 PID 1280 wrote to memory of 3336 1280 Femigg32.exe 106 PID 1280 wrote to memory of 3336 1280 Femigg32.exe 106 PID 1280 wrote to memory of 3336 1280 Femigg32.exe 106 PID 3336 wrote to memory of 3468 3336 Flgadake.exe 107 PID 3336 wrote to memory of 3468 3336 Flgadake.exe 107 PID 3336 wrote to memory of 3468 3336 Flgadake.exe 107 PID 3468 wrote to memory of 2688 3468 Geabbfoc.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.41c017635343021c328259eec60031c0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.41c017635343021c328259eec60031c0.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\Fjhmbihg.exeC:\Windows\system32\Fjhmbihg.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\Fglnkm32.exeC:\Windows\system32\Fglnkm32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\Gbkdod32.exeC:\Windows\system32\Gbkdod32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Podkmgop.exeC:\Windows\system32\Podkmgop.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\Ecdkdj32.exeC:\Windows\system32\Ecdkdj32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\Ijhhenhf.exeC:\Windows\system32\Ijhhenhf.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\Mopeofjl.exeC:\Windows\system32\Mopeofjl.exe8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\Fifomlap.exeC:\Windows\system32\Fifomlap.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\Jjjggede.exeC:\Windows\system32\Jjjggede.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kgngqico.exeC:\Windows\system32\Kgngqico.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\Kpilekqj.exeC:\Windows\system32\Kpilekqj.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Kmpido32.exeC:\Windows\system32\Kmpido32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\Ljffccjh.exeC:\Windows\system32\Ljffccjh.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\Lcnkli32.exeC:\Windows\system32\Lcnkli32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\Lpghfi32.exeC:\Windows\system32\Lpghfi32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\Eimelg32.exeC:\Windows\system32\Eimelg32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\Fkehdnee.exeC:\Windows\system32\Fkehdnee.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\Femigg32.exeC:\Windows\system32\Femigg32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\Flgadake.exeC:\Windows\system32\Flgadake.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\Geabbfoc.exeC:\Windows\system32\Geabbfoc.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\Gknkkmmj.exeC:\Windows\system32\Gknkkmmj.exe12⤵
- Executes dropped EXE
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\Ghdhja32.exeC:\Windows\system32\Ghdhja32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\Jlnbhe32.exeC:\Windows\system32\Jlnbhe32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\Jakkplbc.exeC:\Windows\system32\Jakkplbc.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3836 -
C:\Windows\SysWOW64\Jhdcmf32.exeC:\Windows\system32\Jhdcmf32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1208 -
C:\Windows\SysWOW64\Kfpjgi32.exeC:\Windows\system32\Kfpjgi32.exe17⤵
- Executes dropped EXE
PID:3176 -
C:\Windows\SysWOW64\Eqbcqnph.exeC:\Windows\system32\Eqbcqnph.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4380 -
C:\Windows\SysWOW64\Knjhae32.exeC:\Windows\system32\Knjhae32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2792 -
C:\Windows\SysWOW64\Plifea32.exeC:\Windows\system32\Plifea32.exe20⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\Pbbnbkpe.exeC:\Windows\system32\Pbbnbkpe.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1420 -
C:\Windows\SysWOW64\Qhofjbnl.exeC:\Windows\system32\Qhofjbnl.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\Qecgcfmf.exeC:\Windows\system32\Qecgcfmf.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:4120 -
C:\Windows\SysWOW64\Qpikao32.exeC:\Windows\system32\Qpikao32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2848 -
C:\Windows\SysWOW64\Aiapjecl.exeC:\Windows\system32\Aiapjecl.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1440 -
C:\Windows\SysWOW64\Alioloje.exeC:\Windows\system32\Alioloje.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:2004 -
C:\Windows\SysWOW64\Bafgdfim.exeC:\Windows\system32\Bafgdfim.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:4060 -
C:\Windows\SysWOW64\Bpggbm32.exeC:\Windows\system32\Bpggbm32.exe28⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\Bedpjdoc.exeC:\Windows\system32\Bedpjdoc.exe29⤵
- Executes dropped EXE
PID:3140 -
C:\Windows\SysWOW64\Bpidhmoi.exeC:\Windows\system32\Bpidhmoi.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3420 -
C:\Windows\SysWOW64\Bbhqdhnm.exeC:\Windows\system32\Bbhqdhnm.exe31⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\Bhdilold.exeC:\Windows\system32\Bhdilold.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1032 -
C:\Windows\SysWOW64\Bbjmih32.exeC:\Windows\system32\Bbjmih32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4948 -
C:\Windows\SysWOW64\Mphfjhjf.exeC:\Windows\system32\Mphfjhjf.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:3252 -
C:\Windows\SysWOW64\Njjmil32.exeC:\Windows\system32\Njjmil32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1852 -
C:\Windows\SysWOW64\Qcccom32.exeC:\Windows\system32\Qcccom32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1276 -
C:\Windows\SysWOW64\Cahffmel.exeC:\Windows\system32\Cahffmel.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2796 -
C:\Windows\SysWOW64\Ckpjob32.exeC:\Windows\system32\Ckpjob32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Dlpgiebo.exeC:\Windows\system32\Dlpgiebo.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4308 -
C:\Windows\SysWOW64\Ddklnh32.exeC:\Windows\system32\Ddklnh32.exe40⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\Dkedjbgg.exeC:\Windows\system32\Dkedjbgg.exe41⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\SysWOW64\Dejhgkgm.exeC:\Windows\system32\Dejhgkgm.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3800 -
C:\Windows\SysWOW64\Docmqp32.exeC:\Windows\system32\Docmqp32.exe43⤵
- Executes dropped EXE
PID:5104 -
C:\Windows\SysWOW64\Dkjmea32.exeC:\Windows\system32\Dkjmea32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:224 -
C:\Windows\SysWOW64\Dacebkko.exeC:\Windows\system32\Dacebkko.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Dogfkpih.exeC:\Windows\system32\Dogfkpih.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:3936 -
C:\Windows\SysWOW64\Eddodfhp.exeC:\Windows\system32\Eddodfhp.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1676 -
C:\Windows\SysWOW64\Ehbgjenf.exeC:\Windows\system32\Ehbgjenf.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:472 -
C:\Windows\SysWOW64\Eaklcj32.exeC:\Windows\system32\Eaklcj32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\Ekcplp32.exeC:\Windows\system32\Ekcplp32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4028 -
C:\Windows\SysWOW64\Eamhhjbd.exeC:\Windows\system32\Eamhhjbd.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:3444 -
C:\Windows\SysWOW64\Fdpnpe32.exeC:\Windows\system32\Fdpnpe32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2436 -
C:\Windows\SysWOW64\Foebmn32.exeC:\Windows\system32\Foebmn32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\Fadoii32.exeC:\Windows\system32\Fadoii32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4360 -
C:\Windows\SysWOW64\Fafkoiji.exeC:\Windows\system32\Fafkoiji.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3540 -
C:\Windows\SysWOW64\Fkopgn32.exeC:\Windows\system32\Fkopgn32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:876 -
C:\Windows\SysWOW64\Fdgdpdgj.exeC:\Windows\system32\Fdgdpdgj.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1872 -
C:\Windows\SysWOW64\Fchdnkpi.exeC:\Windows\system32\Fchdnkpi.exe58⤵PID:2964
-
C:\Windows\SysWOW64\Flqigq32.exeC:\Windows\system32\Flqigq32.exe59⤵
- Drops file in System32 directory
PID:3084 -
C:\Windows\SysWOW64\Gcmnijkd.exeC:\Windows\system32\Gcmnijkd.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Glebbpbd.exeC:\Windows\system32\Glebbpbd.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4808 -
C:\Windows\SysWOW64\Gbbkjgpl.exeC:\Windows\system32\Gbbkjgpl.exe62⤵
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\Gmhogppb.exeC:\Windows\system32\Gmhogppb.exe63⤵
- Modifies registry class
PID:3560 -
C:\Windows\SysWOW64\Gcagdj32.exeC:\Windows\system32\Gcagdj32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4908 -
C:\Windows\SysWOW64\Gmjlmo32.exeC:\Windows\system32\Gmjlmo32.exe65⤵
- Drops file in System32 directory
PID:1352 -
C:\Windows\SysWOW64\Gcddjiel.exeC:\Windows\system32\Gcddjiel.exe66⤵PID:3336
-
C:\Windows\SysWOW64\Hfiffd32.exeC:\Windows\system32\Hfiffd32.exe67⤵
- Modifies registry class
PID:716 -
C:\Windows\SysWOW64\Hcmgphma.exeC:\Windows\system32\Hcmgphma.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3604 -
C:\Windows\SysWOW64\Heochp32.exeC:\Windows\system32\Heochp32.exe69⤵PID:396
-
C:\Windows\SysWOW64\Hkhkdjkl.exeC:\Windows\system32\Hkhkdjkl.exe70⤵
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\Heapmp32.exeC:\Windows\system32\Heapmp32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1728 -
C:\Windows\SysWOW64\Imonol32.exeC:\Windows\system32\Imonol32.exe72⤵PID:4664
-
C:\Windows\SysWOW64\Ifgbhbbh.exeC:\Windows\system32\Ifgbhbbh.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4740 -
C:\Windows\SysWOW64\Imakdl32.exeC:\Windows\system32\Imakdl32.exe74⤵PID:2344
-
C:\Windows\SysWOW64\Ickcaf32.exeC:\Windows\system32\Ickcaf32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4676 -
C:\Windows\SysWOW64\Ifjoma32.exeC:\Windows\system32\Ifjoma32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2424 -
C:\Windows\SysWOW64\Ilfhfh32.exeC:\Windows\system32\Ilfhfh32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4016 -
C:\Windows\SysWOW64\Jfoihalp.exeC:\Windows\system32\Jfoihalp.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1428 -
C:\Windows\SysWOW64\Kelaef32.exeC:\Windows\system32\Kelaef32.exe79⤵PID:2952
-
C:\Windows\SysWOW64\Ejmild32.exeC:\Windows\system32\Ejmild32.exe80⤵PID:3828
-
C:\Windows\SysWOW64\Ihnkobpl.exeC:\Windows\system32\Ihnkobpl.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3752 -
C:\Windows\SysWOW64\Injcginc.exeC:\Windows\system32\Injcginc.exe82⤵
- Drops file in System32 directory
- Modifies registry class
PID:1280 -
C:\Windows\SysWOW64\Ihpgda32.exeC:\Windows\system32\Ihpgda32.exe83⤵PID:4220
-
C:\Windows\SysWOW64\Ikndpm32.exeC:\Windows\system32\Ikndpm32.exe84⤵
- Drops file in System32 directory
- Modifies registry class
PID:3044 -
C:\Windows\SysWOW64\Ihbdja32.exeC:\Windows\system32\Ihbdja32.exe85⤵
- Modifies registry class
PID:1108 -
C:\Windows\SysWOW64\Iqmincia.exeC:\Windows\system32\Iqmincia.exe86⤵
- Modifies registry class
PID:4684 -
C:\Windows\SysWOW64\Iggakn32.exeC:\Windows\system32\Iggakn32.exe87⤵PID:2692
-
C:\Windows\SysWOW64\Jqpfccgo.exeC:\Windows\system32\Jqpfccgo.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4532 -
C:\Windows\SysWOW64\Jhgneqha.exeC:\Windows\system32\Jhgneqha.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2760 -
C:\Windows\SysWOW64\Jdnnjane.exeC:\Windows\system32\Jdnnjane.exe90⤵
- Drops file in System32 directory
PID:1476 -
C:\Windows\SysWOW64\Jnfcbg32.exeC:\Windows\system32\Jnfcbg32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5012 -
C:\Windows\SysWOW64\Jhlgpp32.exeC:\Windows\system32\Jhlgpp32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1208 -
C:\Windows\SysWOW64\Jnhphg32.exeC:\Windows\system32\Jnhphg32.exe93⤵
- Modifies registry class
PID:3216 -
C:\Windows\SysWOW64\Jgqdal32.exeC:\Windows\system32\Jgqdal32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1896 -
C:\Windows\SysWOW64\Jqihjbod.exeC:\Windows\system32\Jqihjbod.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3176 -
C:\Windows\SysWOW64\Jgcafl32.exeC:\Windows\system32\Jgcafl32.exe96⤵
- Drops file in System32 directory
PID:4248 -
C:\Windows\SysWOW64\Knmicfnn.exeC:\Windows\system32\Knmicfnn.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4084 -
C:\Windows\SysWOW64\Kgenlldo.exeC:\Windows\system32\Kgenlldo.exe98⤵PID:2240
-
C:\Windows\SysWOW64\Kqnbea32.exeC:\Windows\system32\Kqnbea32.exe99⤵
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\Kiejfo32.exeC:\Windows\system32\Kiejfo32.exe100⤵
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\Kkcfbj32.exeC:\Windows\system32\Kkcfbj32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4760 -
C:\Windows\SysWOW64\Kqpoja32.exeC:\Windows\system32\Kqpoja32.exe102⤵PID:3908
-
C:\Windows\SysWOW64\Kgopbj32.exeC:\Windows\system32\Kgopbj32.exe103⤵
- Drops file in System32 directory
PID:4584 -
C:\Windows\SysWOW64\Gjadck32.exeC:\Windows\system32\Gjadck32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3456 -
C:\Windows\SysWOW64\Gfhehlhe.exeC:\Windows\system32\Gfhehlhe.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3068 -
C:\Windows\SysWOW64\Gpqjaanf.exeC:\Windows\system32\Gpqjaanf.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3236 -
C:\Windows\SysWOW64\Gbofmmmj.exeC:\Windows\system32\Gbofmmmj.exe107⤵PID:4112
-
C:\Windows\SysWOW64\Gkfnnjnl.exeC:\Windows\system32\Gkfnnjnl.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4048 -
C:\Windows\SysWOW64\Gikkof32.exeC:\Windows\system32\Gikkof32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2132 -
C:\Windows\SysWOW64\Gpeclq32.exeC:\Windows\system32\Gpeclq32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3512 -
C:\Windows\SysWOW64\Gbcohl32.exeC:\Windows\system32\Gbcohl32.exe111⤵
- Modifies registry class
PID:3124 -
C:\Windows\SysWOW64\Hphpap32.exeC:\Windows\system32\Hphpap32.exe112⤵
- Drops file in System32 directory
PID:4172 -
C:\Windows\SysWOW64\Iildfd32.exeC:\Windows\system32\Iildfd32.exe113⤵
- Drops file in System32 directory
PID:1420 -
C:\Windows\SysWOW64\Ipflcnln.exeC:\Windows\system32\Ipflcnln.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2848 -
C:\Windows\SysWOW64\Injmlbkh.exeC:\Windows\system32\Injmlbkh.exe115⤵PID:4924
-
C:\Windows\SysWOW64\Idceim32.exeC:\Windows\system32\Idceim32.exe116⤵
- Drops file in System32 directory
PID:4948 -
C:\Windows\SysWOW64\Ofhkgeij.exeC:\Windows\system32\Ofhkgeij.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4528 -
C:\Windows\SysWOW64\Cglbanmo.exeC:\Windows\system32\Cglbanmo.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1276 -
C:\Windows\SysWOW64\Cneknh32.exeC:\Windows\system32\Cneknh32.exe119⤵
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\Chkokq32.exeC:\Windows\system32\Chkokq32.exe120⤵
- Drops file in System32 directory
PID:2936 -
C:\Windows\SysWOW64\Nfnafpni.exeC:\Windows\system32\Nfnafpni.exe121⤵PID:2248
-
C:\Windows\SysWOW64\Bdapon32.exeC:\Windows\system32\Bdapon32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-