Analysis
-
max time kernel
265s -
max time network
279s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 17:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.3ac1acf8cace949db9c2f8164beccb90.exe
Resource
win7-20231020-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.3ac1acf8cace949db9c2f8164beccb90.exe
Resource
win10v2004-20231020-en
6 signatures
150 seconds
General
-
Target
NEAS.3ac1acf8cace949db9c2f8164beccb90.exe
-
Size
244KB
-
MD5
3ac1acf8cace949db9c2f8164beccb90
-
SHA1
7d7137ff358071abd804cad840fd2f1803040ab4
-
SHA256
958b3dac67aa7734a21e6800fbd5826e1c3c0da62e37e51838c151ed03774ec9
-
SHA512
741fed146df84788e2ca3c533c7f969a0adc9113f65bfff45dbddf1b1f86e5a1b7d6ebabfe69894c7fb6f83a875aa2f6fa4bad1c768593e1f0890c47d1fb9eed
-
SSDEEP
3072:EepfflGcthUaxgtRQe/9pui6yYPaI7DehizrVtNe3eBU053xQL8eY9rm5LQH:EtGLArFpui6yYPaIGckSU05836S5
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oijnib32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmfbohal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bppcac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bjkjkfgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Okefjcle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Klnpke32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcnmdend.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pacgcijn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjahnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aohhnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bnkapm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eikmkbeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ngjnhbbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bcnmdend.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifkecl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aipipkho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djiddp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eikmkbeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nfjpcjhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ahdqdahc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aobblkkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pmbaof32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjmpnppg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bjdojm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cqlgqkbp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imgjfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ifhinl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Naoaig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pacgcijn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Doelab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gceghn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhobnqlg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkjbhlpf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnkkeg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdckgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qbelfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aefijghh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phlgle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Phlgle32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akcbnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eomoohoi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gigllafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hilbfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pjahnk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cadlnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cnmjdpcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dlbcgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Clmdliko.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phqqgdnq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aikpek32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgnfgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gigllafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nmhodg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bfcemn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddeammok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ojmdom32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pikcfhji.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqbbqh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clmdliko.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmbaof32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aeigkklp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgcfib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fcodhl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Madepihc.exe -
Executes dropped EXE 64 IoCs
pid Process 2696 Ddoiei32.exe 2588 Okefjcle.exe 2896 Ddeammok.exe 2972 Dlbcgo32.exe 2824 Dghgdg32.exe 2644 Eikmkbeg.exe 2812 Ehpjmoio.exe 1644 Eomoohoi.exe 564 Fcodhl32.exe 1820 Fjkije32.exe 2136 Fgojdj32.exe 2944 Fkaomm32.exe 3028 Gigllafc.exe 2352 Gceghn32.exe 1172 Gnkkeg32.exe 1616 Gaigab32.exe 2176 Hilbfc32.exe 856 Hbdfoiki.exe 1612 Hhaogp32.exe 2332 Idhplaoe.exe 544 Ialpfeno.exe 2424 Ifhinl32.exe 2100 Ifkecl32.exe 2544 Imenpfap.exe 2532 Ipcjlaqd.exe 624 Imgjfe32.exe 2704 Kdckgc32.exe 2912 Klnpke32.exe 2412 Kfgedkko.exe 2892 Klqmaebl.exe 2344 Nfjpcjhe.exe 2604 Mofnek32.exe 2748 Mgnfgh32.exe 2268 Mhobnqlg.exe 1684 Moijkk32.exe 2952 Mjnohc32.exe 268 Mmmkdo32.exe 1732 Mokgqjaa.exe 1344 Opkcpndm.exe 2792 Ofellh32.exe 2800 Omodibcg.exe 532 Ocilfljc.exe 2920 Obnigi32.exe 1272 Opbjpm32.exe 1076 Obpflhmi.exe 1828 Oijnib32.exe 2108 Phpkjoim.exe 2104 Qeakmg32.exe 968 Qbelfk32.exe 2472 Abghlk32.exe 2776 Ahdqdahc.exe 776 Aalemg32.exe 972 Ahfmjafa.exe 2416 Aopffk32.exe 2032 Agkjknji.exe 596 Aobblkkk.exe 2656 Aacknfhl.exe 1780 Adagjagp.exe 1564 Bcnmdend.exe 2848 Madepihc.exe 1520 Clmdliko.exe 2528 Emhpfk32.exe 2168 Nonhhlog.exe 2992 Nbjdhj32.exe -
Loads dropped DLL 64 IoCs
pid Process 2832 NEAS.3ac1acf8cace949db9c2f8164beccb90.exe 2832 NEAS.3ac1acf8cace949db9c2f8164beccb90.exe 2696 Ddoiei32.exe 2696 Ddoiei32.exe 2588 Okefjcle.exe 2588 Okefjcle.exe 2896 Ddeammok.exe 2896 Ddeammok.exe 2972 Dlbcgo32.exe 2972 Dlbcgo32.exe 2824 Dghgdg32.exe 2824 Dghgdg32.exe 2644 Eikmkbeg.exe 2644 Eikmkbeg.exe 2812 Ehpjmoio.exe 2812 Ehpjmoio.exe 1644 Eomoohoi.exe 1644 Eomoohoi.exe 564 Fcodhl32.exe 564 Fcodhl32.exe 1820 Fjkije32.exe 1820 Fjkije32.exe 2136 Fgojdj32.exe 2136 Fgojdj32.exe 2944 Fkaomm32.exe 2944 Fkaomm32.exe 3028 Gigllafc.exe 3028 Gigllafc.exe 2352 Gceghn32.exe 2352 Gceghn32.exe 1172 Gnkkeg32.exe 1172 Gnkkeg32.exe 1616 Gaigab32.exe 1616 Gaigab32.exe 2176 Hilbfc32.exe 2176 Hilbfc32.exe 856 Hbdfoiki.exe 856 Hbdfoiki.exe 1612 Hhaogp32.exe 1612 Hhaogp32.exe 2332 Idhplaoe.exe 2332 Idhplaoe.exe 544 Ialpfeno.exe 544 Ialpfeno.exe 2424 Ifhinl32.exe 2424 Ifhinl32.exe 2100 Ifkecl32.exe 2100 Ifkecl32.exe 2544 Imenpfap.exe 2544 Imenpfap.exe 2532 Ipcjlaqd.exe 2532 Ipcjlaqd.exe 624 Imgjfe32.exe 624 Imgjfe32.exe 2704 Kdckgc32.exe 2704 Kdckgc32.exe 2912 Klnpke32.exe 2912 Klnpke32.exe 2412 Kfgedkko.exe 2412 Kfgedkko.exe 2892 Klqmaebl.exe 2892 Klqmaebl.exe 2344 Nfjpcjhe.exe 2344 Nfjpcjhe.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Qhgqehfk.dll Aalemg32.exe File created C:\Windows\SysWOW64\Pomqdd32.dll Dfklnb32.exe File opened for modification C:\Windows\SysWOW64\Fjkije32.exe Fcodhl32.exe File created C:\Windows\SysWOW64\Hehmjb32.dll Naoaig32.exe File created C:\Windows\SysWOW64\Jaecablg.dll Bplifcji.exe File created C:\Windows\SysWOW64\Fmohjkep.dll Nndfdl32.exe File created C:\Windows\SysWOW64\Gkgmhnkb.dll Hhaogp32.exe File opened for modification C:\Windows\SysWOW64\Blbjkdpn.exe Bfeacnaf.exe File created C:\Windows\SysWOW64\Ncneimgn.dll Ojmdom32.exe File opened for modification C:\Windows\SysWOW64\Ofhnom32.exe Oagllgdh.exe File created C:\Windows\SysWOW64\Bcfmbd32.exe Aeigkklp.exe File created C:\Windows\SysWOW64\Dikpokmn.exe Doelab32.exe File opened for modification C:\Windows\SysWOW64\Mmmkdo32.exe Mjnohc32.exe File created C:\Windows\SysWOW64\Bfcemn32.exe Ancgnljc.exe File created C:\Windows\SysWOW64\Cnpnlc32.dll Klqmaebl.exe File created C:\Windows\SysWOW64\Bfeacnaf.exe Bplifcji.exe File created C:\Windows\SysWOW64\Okcgbben.dll Cbgjpo32.exe File opened for modification C:\Windows\SysWOW64\Dbbmccdi.exe Dfklnb32.exe File created C:\Windows\SysWOW64\Manhdpha.dll Ialpfeno.exe File opened for modification C:\Windows\SysWOW64\Emhpfk32.exe Clmdliko.exe File created C:\Windows\SysWOW64\Jhpfkman.dll Ombflg32.exe File opened for modification C:\Windows\SysWOW64\Nndfdl32.exe Ngjnhbbm.exe File created C:\Windows\SysWOW64\Pgldogbp.dll Okloml32.exe File created C:\Windows\SysWOW64\Aohhnb32.exe Aikpek32.exe File created C:\Windows\SysWOW64\Ddeammok.exe Okefjcle.exe File created C:\Windows\SysWOW64\Ngjnhbbm.exe Ndkblgci.exe File created C:\Windows\SysWOW64\Bjdojm32.exe Bookmd32.exe File created C:\Windows\SysWOW64\Cpokca32.dll Ddeammok.exe File opened for modification C:\Windows\SysWOW64\Hilbfc32.exe Gaigab32.exe File created C:\Windows\SysWOW64\Imenpfap.exe Ifkecl32.exe File created C:\Windows\SysWOW64\Nbjdhj32.exe Nonhhlog.exe File created C:\Windows\SysWOW64\Eomoohoi.exe Ehpjmoio.exe File created C:\Windows\SysWOW64\Bcnmdend.exe Adagjagp.exe File created C:\Windows\SysWOW64\Bchgmhec.dll Qjhonjoo.exe File created C:\Windows\SysWOW64\Hbbnep32.dll Onfcjlgg.exe File created C:\Windows\SysWOW64\Pgaphb32.dll Hilbfc32.exe File created C:\Windows\SysWOW64\Madepihc.exe Bcnmdend.exe File created C:\Windows\SysWOW64\Okloml32.exe Nmhodg32.exe File created C:\Windows\SysWOW64\Nccaiaed.dll Doelab32.exe File opened for modification C:\Windows\SysWOW64\Edoigipj.exe Dfpeiako.exe File opened for modification C:\Windows\SysWOW64\Ddoiei32.exe NEAS.3ac1acf8cace949db9c2f8164beccb90.exe File created C:\Windows\SysWOW64\Nfjpcjhe.exe Klqmaebl.exe File created C:\Windows\SysWOW64\Fbadkk32.dll Bboomn32.exe File opened for modification C:\Windows\SysWOW64\Bjkjkfgl.exe Eoooga32.exe File created C:\Windows\SysWOW64\Dkmlca32.dll Fkaomm32.exe File created C:\Windows\SysWOW64\Dojelbib.exe Dhpmph32.exe File created C:\Windows\SysWOW64\Ggbclj32.dll Mgnfgh32.exe File created C:\Windows\SysWOW64\Mokgqjaa.exe Mmmkdo32.exe File created C:\Windows\SysWOW64\Hjkcpgom.dll Aamjoh32.exe File opened for modification C:\Windows\SysWOW64\Aikpek32.exe Phqqgdnq.exe File created C:\Windows\SysWOW64\Godliapc.dll Phqqgdnq.exe File created C:\Windows\SysWOW64\Mphhbbja.dll Dfpeiako.exe File opened for modification C:\Windows\SysWOW64\Okefjcle.exe Ddoiei32.exe File created C:\Windows\SysWOW64\Filfpd32.dll Ddoiei32.exe File created C:\Windows\SysWOW64\Hilbfc32.exe Gaigab32.exe File created C:\Windows\SysWOW64\Jcknnonh.dll Gaigab32.exe File opened for modification C:\Windows\SysWOW64\Mokgqjaa.exe Mmmkdo32.exe File opened for modification C:\Windows\SysWOW64\Bjdojm32.exe Bookmd32.exe File opened for modification C:\Windows\SysWOW64\Cbgjpo32.exe Cfnlen32.exe File created C:\Windows\SysWOW64\Klnpke32.exe Kdckgc32.exe File opened for modification C:\Windows\SysWOW64\Bplifcji.exe Bfcemn32.exe File opened for modification C:\Windows\SysWOW64\Oagllgdh.exe Ojmdom32.exe File created C:\Windows\SysWOW64\Fkdmed32.dll Aeigkklp.exe File created C:\Windows\SysWOW64\Ofhnom32.exe Oagllgdh.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Madepihc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Abmfikdo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kdckgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bjkjkfgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Occlbceo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aipipkho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjdbon32.dll" Qbelfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cnmjdpcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kfgedkko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qbenaghd.dll" Oijnib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" NEAS.3ac1acf8cace949db9c2f8164beccb90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhlkbbnm.dll" Mokgqjaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Emhpfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lckldi32.dll" Nmfbohal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlablleh.dll" Abmfikdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgnjlo32.dll" Bfeacnaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gaigab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmngeg32.dll" Qeakmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pikcfhji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Doelab32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gceghn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gadmafnd.dll" Obnigi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ndkblgci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojgckb32.dll" Aopffk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nkjbhlpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eikmkbeg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Phpkjoim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ianfacjk.dll" Ahdqdahc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Phqqgdnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bnkapm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oehkkgkb.dll" Emhpfk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jgeahd32.dll" Bjkjkfgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ddeammok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gigllafc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aacknfhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hehmjb32.dll" Naoaig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dbbmccdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gnkkeg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ngljbn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Godliapc.dll" Phqqgdnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pcimfalg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ancgnljc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fkaomm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Moijkk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bboomn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eomoohoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aanjeokl.dll" Fgojdj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Naoaig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffqkon32.dll" Aipipkho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ddoiei32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ancgnljc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bnkapm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ialpfeno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bjdojm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aeigkklp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Djiddp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node NEAS.3ac1acf8cace949db9c2f8164beccb90.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dhpmph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Occlbceo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ojmdom32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ddoiei32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Okefjcle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qjhonjoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkdmed32.dll" Aeigkklp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2696 2832 NEAS.3ac1acf8cace949db9c2f8164beccb90.exe 27 PID 2832 wrote to memory of 2696 2832 NEAS.3ac1acf8cace949db9c2f8164beccb90.exe 27 PID 2832 wrote to memory of 2696 2832 NEAS.3ac1acf8cace949db9c2f8164beccb90.exe 27 PID 2832 wrote to memory of 2696 2832 NEAS.3ac1acf8cace949db9c2f8164beccb90.exe 27 PID 2696 wrote to memory of 2588 2696 Ddoiei32.exe 28 PID 2696 wrote to memory of 2588 2696 Ddoiei32.exe 28 PID 2696 wrote to memory of 2588 2696 Ddoiei32.exe 28 PID 2696 wrote to memory of 2588 2696 Ddoiei32.exe 28 PID 2588 wrote to memory of 2896 2588 Okefjcle.exe 29 PID 2588 wrote to memory of 2896 2588 Okefjcle.exe 29 PID 2588 wrote to memory of 2896 2588 Okefjcle.exe 29 PID 2588 wrote to memory of 2896 2588 Okefjcle.exe 29 PID 2896 wrote to memory of 2972 2896 Ddeammok.exe 30 PID 2896 wrote to memory of 2972 2896 Ddeammok.exe 30 PID 2896 wrote to memory of 2972 2896 Ddeammok.exe 30 PID 2896 wrote to memory of 2972 2896 Ddeammok.exe 30 PID 2972 wrote to memory of 2824 2972 Dlbcgo32.exe 31 PID 2972 wrote to memory of 2824 2972 Dlbcgo32.exe 31 PID 2972 wrote to memory of 2824 2972 Dlbcgo32.exe 31 PID 2972 wrote to memory of 2824 2972 Dlbcgo32.exe 31 PID 2824 wrote to memory of 2644 2824 Dghgdg32.exe 33 PID 2824 wrote to memory of 2644 2824 Dghgdg32.exe 33 PID 2824 wrote to memory of 2644 2824 Dghgdg32.exe 33 PID 2824 wrote to memory of 2644 2824 Dghgdg32.exe 33 PID 2644 wrote to memory of 2812 2644 Eikmkbeg.exe 32 PID 2644 wrote to memory of 2812 2644 Eikmkbeg.exe 32 PID 2644 wrote to memory of 2812 2644 Eikmkbeg.exe 32 PID 2644 wrote to memory of 2812 2644 Eikmkbeg.exe 32 PID 2812 wrote to memory of 1644 2812 Ehpjmoio.exe 34 PID 2812 wrote to memory of 1644 2812 Ehpjmoio.exe 34 PID 2812 wrote to memory of 1644 2812 Ehpjmoio.exe 34 PID 2812 wrote to memory of 1644 2812 Ehpjmoio.exe 34 PID 1644 wrote to memory of 564 1644 Eomoohoi.exe 35 PID 1644 wrote to memory of 564 1644 Eomoohoi.exe 35 PID 1644 wrote to memory of 564 1644 Eomoohoi.exe 35 PID 1644 wrote to memory of 564 1644 Eomoohoi.exe 35 PID 564 wrote to memory of 1820 564 Fcodhl32.exe 36 PID 564 wrote to memory of 1820 564 Fcodhl32.exe 36 PID 564 wrote to memory of 1820 564 Fcodhl32.exe 36 PID 564 wrote to memory of 1820 564 Fcodhl32.exe 36 PID 1820 wrote to memory of 2136 1820 Fjkije32.exe 37 PID 1820 wrote to memory of 2136 1820 Fjkije32.exe 37 PID 1820 wrote to memory of 2136 1820 Fjkije32.exe 37 PID 1820 wrote to memory of 2136 1820 Fjkije32.exe 37 PID 2136 wrote to memory of 2944 2136 Fgojdj32.exe 38 PID 2136 wrote to memory of 2944 2136 Fgojdj32.exe 38 PID 2136 wrote to memory of 2944 2136 Fgojdj32.exe 38 PID 2136 wrote to memory of 2944 2136 Fgojdj32.exe 38 PID 2944 wrote to memory of 3028 2944 Fkaomm32.exe 39 PID 2944 wrote to memory of 3028 2944 Fkaomm32.exe 39 PID 2944 wrote to memory of 3028 2944 Fkaomm32.exe 39 PID 2944 wrote to memory of 3028 2944 Fkaomm32.exe 39 PID 3028 wrote to memory of 2352 3028 Gigllafc.exe 40 PID 3028 wrote to memory of 2352 3028 Gigllafc.exe 40 PID 3028 wrote to memory of 2352 3028 Gigllafc.exe 40 PID 3028 wrote to memory of 2352 3028 Gigllafc.exe 40 PID 2352 wrote to memory of 1172 2352 Gceghn32.exe 41 PID 2352 wrote to memory of 1172 2352 Gceghn32.exe 41 PID 2352 wrote to memory of 1172 2352 Gceghn32.exe 41 PID 2352 wrote to memory of 1172 2352 Gceghn32.exe 41 PID 1172 wrote to memory of 1616 1172 Gnkkeg32.exe 42 PID 1172 wrote to memory of 1616 1172 Gnkkeg32.exe 42 PID 1172 wrote to memory of 1616 1172 Gnkkeg32.exe 42 PID 1172 wrote to memory of 1616 1172 Gnkkeg32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.3ac1acf8cace949db9c2f8164beccb90.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.3ac1acf8cace949db9c2f8164beccb90.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\Ddoiei32.exeC:\Windows\system32\Ddoiei32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Okefjcle.exeC:\Windows\system32\Okefjcle.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Ddeammok.exeC:\Windows\system32\Ddeammok.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\Dlbcgo32.exeC:\Windows\system32\Dlbcgo32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\Dghgdg32.exeC:\Windows\system32\Dghgdg32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\Eikmkbeg.exeC:\Windows\system32\Eikmkbeg.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2644
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ehpjmoio.exeC:\Windows\system32\Ehpjmoio.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\Eomoohoi.exeC:\Windows\system32\Eomoohoi.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\Fcodhl32.exeC:\Windows\system32\Fcodhl32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\Fjkije32.exeC:\Windows\system32\Fjkije32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\Fgojdj32.exeC:\Windows\system32\Fgojdj32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\Fkaomm32.exeC:\Windows\system32\Fkaomm32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Gigllafc.exeC:\Windows\system32\Gigllafc.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\Gceghn32.exeC:\Windows\system32\Gceghn32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\Gnkkeg32.exeC:\Windows\system32\Gnkkeg32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\Gaigab32.exeC:\Windows\system32\Gaigab32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1616 -
C:\Windows\SysWOW64\Hilbfc32.exeC:\Windows\system32\Hilbfc32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\Hbdfoiki.exeC:\Windows\system32\Hbdfoiki.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:856 -
C:\Windows\SysWOW64\Hhaogp32.exeC:\Windows\system32\Hhaogp32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1612 -
C:\Windows\SysWOW64\Idhplaoe.exeC:\Windows\system32\Idhplaoe.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2332 -
C:\Windows\SysWOW64\Ialpfeno.exeC:\Windows\system32\Ialpfeno.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:544 -
C:\Windows\SysWOW64\Ifhinl32.exeC:\Windows\system32\Ifhinl32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2424 -
C:\Windows\SysWOW64\Ifkecl32.exeC:\Windows\system32\Ifkecl32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\Imenpfap.exeC:\Windows\system32\Imenpfap.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2544 -
C:\Windows\SysWOW64\Ipcjlaqd.exeC:\Windows\system32\Ipcjlaqd.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Windows\SysWOW64\Imgjfe32.exeC:\Windows\system32\Imgjfe32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:624 -
C:\Windows\SysWOW64\Kdckgc32.exeC:\Windows\system32\Kdckgc32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2704 -
C:\Windows\SysWOW64\Klnpke32.exeC:\Windows\system32\Klnpke32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2912 -
C:\Windows\SysWOW64\Kfgedkko.exeC:\Windows\system32\Kfgedkko.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2412 -
C:\Windows\SysWOW64\Klqmaebl.exeC:\Windows\system32\Klqmaebl.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\Nfjpcjhe.exeC:\Windows\system32\Nfjpcjhe.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2344 -
C:\Windows\SysWOW64\Mofnek32.exeC:\Windows\system32\Mofnek32.exe26⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\Mgnfgh32.exeC:\Windows\system32\Mgnfgh32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\Mhobnqlg.exeC:\Windows\system32\Mhobnqlg.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\Moijkk32.exeC:\Windows\system32\Moijkk32.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\Mjnohc32.exeC:\Windows\system32\Mjnohc32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\Mmmkdo32.exeC:\Windows\system32\Mmmkdo32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:268 -
C:\Windows\SysWOW64\Mokgqjaa.exeC:\Windows\system32\Mokgqjaa.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\Opkcpndm.exeC:\Windows\system32\Opkcpndm.exe33⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\Ofellh32.exeC:\Windows\system32\Ofellh32.exe34⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\Omodibcg.exeC:\Windows\system32\Omodibcg.exe35⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Ocilfljc.exeC:\Windows\system32\Ocilfljc.exe36⤵
- Executes dropped EXE
PID:532 -
C:\Windows\SysWOW64\Obnigi32.exeC:\Windows\system32\Obnigi32.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:2920 -
C:\Windows\SysWOW64\Opbjpm32.exeC:\Windows\system32\Opbjpm32.exe38⤵
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\Obpflhmi.exeC:\Windows\system32\Obpflhmi.exe39⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\Oijnib32.exeC:\Windows\system32\Oijnib32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1828 -
C:\Windows\SysWOW64\Phpkjoim.exeC:\Windows\system32\Phpkjoim.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:2108 -
C:\Windows\SysWOW64\Qeakmg32.exeC:\Windows\system32\Qeakmg32.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:2104 -
C:\Windows\SysWOW64\Qbelfk32.exeC:\Windows\system32\Qbelfk32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:968 -
C:\Windows\SysWOW64\Abghlk32.exeC:\Windows\system32\Abghlk32.exe44⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\Ahdqdahc.exeC:\Windows\system32\Ahdqdahc.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2776 -
C:\Windows\SysWOW64\Aalemg32.exeC:\Windows\system32\Aalemg32.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:776 -
C:\Windows\SysWOW64\Ahfmjafa.exeC:\Windows\system32\Ahfmjafa.exe47⤵
- Executes dropped EXE
PID:972 -
C:\Windows\SysWOW64\Aopffk32.exeC:\Windows\system32\Aopffk32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:2416 -
C:\Windows\SysWOW64\Agkjknji.exeC:\Windows\system32\Agkjknji.exe49⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\Aobblkkk.exeC:\Windows\system32\Aobblkkk.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:596 -
C:\Windows\SysWOW64\Aacknfhl.exeC:\Windows\system32\Aacknfhl.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:2656 -
C:\Windows\SysWOW64\Adagjagp.exeC:\Windows\system32\Adagjagp.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1780 -
C:\Windows\SysWOW64\Bcnmdend.exeC:\Windows\system32\Bcnmdend.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1564 -
C:\Windows\SysWOW64\Madepihc.exeC:\Windows\system32\Madepihc.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2848 -
C:\Windows\SysWOW64\Clmdliko.exeC:\Windows\system32\Clmdliko.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1520 -
C:\Windows\SysWOW64\Emhpfk32.exeC:\Windows\system32\Emhpfk32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:2528 -
C:\Windows\SysWOW64\Nonhhlog.exeC:\Windows\system32\Nonhhlog.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\Nbjdhj32.exeC:\Windows\system32\Nbjdhj32.exe58⤵
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\Naoaig32.exeC:\Windows\system32\Naoaig32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:556 -
C:\Windows\SysWOW64\Ngljbn32.exeC:\Windows\system32\Ngljbn32.exe60⤵
- Modifies registry class
PID:456 -
C:\Windows\SysWOW64\Nmfbohal.exeC:\Windows\system32\Nmfbohal.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Nkjbhlpf.exeC:\Windows\system32\Nkjbhlpf.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1324 -
C:\Windows\SysWOW64\Nmhodg32.exeC:\Windows\system32\Nmhodg32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\Okloml32.exeC:\Windows\system32\Okloml32.exe64⤵
- Drops file in System32 directory
PID:780 -
C:\Windows\SysWOW64\Odddfadd.exeC:\Windows\system32\Odddfadd.exe65⤵PID:3044
-
C:\Windows\SysWOW64\Pacgcijn.exeC:\Windows\system32\Pacgcijn.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2200 -
C:\Windows\SysWOW64\Phmopc32.exeC:\Windows\system32\Phmopc32.exe67⤵PID:2468
-
C:\Windows\SysWOW64\Pafdii32.exeC:\Windows\system32\Pafdii32.exe68⤵PID:1208
-
C:\Windows\SysWOW64\Pjahnk32.exeC:\Windows\system32\Pjahnk32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1704 -
C:\Windows\SysWOW64\Pcimfalg.exeC:\Windows\system32\Pcimfalg.exe70⤵
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Pmbaof32.exeC:\Windows\system32\Pmbaof32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:840 -
C:\Windows\SysWOW64\Pjfbikaa.exeC:\Windows\system32\Pjfbikaa.exe72⤵PID:1740
-
C:\Windows\SysWOW64\Qjhonjoo.exeC:\Windows\system32\Qjhonjoo.exe73⤵
- Drops file in System32 directory
- Modifies registry class
PID:2896 -
C:\Windows\SysWOW64\Aefijghh.exeC:\Windows\system32\Aefijghh.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2812 -
C:\Windows\SysWOW64\Aamjoh32.exeC:\Windows\system32\Aamjoh32.exe75⤵
- Drops file in System32 directory
PID:2136 -
C:\Windows\SysWOW64\Abmfikdo.exeC:\Windows\system32\Abmfikdo.exe76⤵
- Modifies registry class
PID:1172 -
C:\Windows\SysWOW64\Ancgnljc.exeC:\Windows\system32\Ancgnljc.exe77⤵
- Drops file in System32 directory
- Modifies registry class
PID:2332 -
C:\Windows\SysWOW64\Bfcemn32.exeC:\Windows\system32\Bfcemn32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\Bplifcji.exeC:\Windows\system32\Bplifcji.exe79⤵
- Drops file in System32 directory
PID:1256 -
C:\Windows\SysWOW64\Bfeacnaf.exeC:\Windows\system32\Bfeacnaf.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:2464 -
C:\Windows\SysWOW64\Blbjkdpn.exeC:\Windows\system32\Blbjkdpn.exe81⤵PID:2328
-
C:\Windows\SysWOW64\Bblbho32.exeC:\Windows\system32\Bblbho32.exe82⤵PID:2960
-
C:\Windows\SysWOW64\Bppcac32.exeC:\Windows\system32\Bppcac32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2792 -
C:\Windows\SysWOW64\Bboomn32.exeC:\Windows\system32\Bboomn32.exe84⤵
- Drops file in System32 directory
- Modifies registry class
PID:1076 -
C:\Windows\SysWOW64\Clgcfd32.exeC:\Windows\system32\Clgcfd32.exe85⤵PID:2308
-
C:\Windows\SysWOW64\Cadlnk32.exeC:\Windows\system32\Cadlnk32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1560 -
C:\Windows\SysWOW64\Doelab32.exeC:\Windows\system32\Doelab32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2840 -
C:\Windows\SysWOW64\Dikpokmn.exeC:\Windows\system32\Dikpokmn.exe88⤵PID:2652
-
C:\Windows\SysWOW64\Dhpmph32.exeC:\Windows\system32\Dhpmph32.exe89⤵
- Drops file in System32 directory
- Modifies registry class
PID:2700 -
C:\Windows\SysWOW64\Dojelbib.exeC:\Windows\system32\Dojelbib.exe90⤵PID:1640
-
C:\Windows\SysWOW64\Eoooga32.exeC:\Windows\system32\Eoooga32.exe91⤵
- Drops file in System32 directory
PID:784 -
C:\Windows\SysWOW64\Bjkjkfgl.exeC:\Windows\system32\Bjkjkfgl.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1676 -
C:\Windows\SysWOW64\Ndkblgci.exeC:\Windows\system32\Ndkblgci.exe93⤵
- Drops file in System32 directory
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\Ngjnhbbm.exeC:\Windows\system32\Ngjnhbbm.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\Nndfdl32.exeC:\Windows\system32\Nndfdl32.exe95⤵
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\Nqbbqh32.exeC:\Windows\system32\Nqbbqh32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2876 -
C:\Windows\SysWOW64\Onfcjlgg.exeC:\Windows\system32\Onfcjlgg.exe97⤵
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\Occlbceo.exeC:\Windows\system32\Occlbceo.exe98⤵
- Modifies registry class
PID:660 -
C:\Windows\SysWOW64\Ojmdom32.exeC:\Windows\system32\Ojmdom32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1344 -
C:\Windows\SysWOW64\Oagllgdh.exeC:\Windows\system32\Oagllgdh.exe100⤵
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\Ofhnom32.exeC:\Windows\system32\Ofhnom32.exe101⤵PID:1980
-
C:\Windows\SysWOW64\Ombflg32.exeC:\Windows\system32\Ombflg32.exe102⤵
- Drops file in System32 directory
PID:972 -
C:\Windows\SysWOW64\Pboodn32.exeC:\Windows\system32\Pboodn32.exe103⤵PID:2232
-
C:\Windows\SysWOW64\Phlgle32.exeC:\Windows\system32\Phlgle32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2280 -
C:\Windows\SysWOW64\Pikcfhji.exeC:\Windows\system32\Pikcfhji.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2508 -
C:\Windows\SysWOW64\Pjmpnppg.exeC:\Windows\system32\Pjmpnppg.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2664 -
C:\Windows\SysWOW64\Phqqgdnq.exeC:\Windows\system32\Phqqgdnq.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1084 -
C:\Windows\SysWOW64\Aikpek32.exeC:\Windows\system32\Aikpek32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\Aohhnb32.exeC:\Windows\system32\Aohhnb32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2564 -
C:\Windows\SysWOW64\Aebqjlbh.exeC:\Windows\system32\Aebqjlbh.exe110⤵PID:1244
-
C:\Windows\SysWOW64\Alligf32.exeC:\Windows\system32\Alligf32.exe111⤵PID:1104
-
C:\Windows\SysWOW64\Aipipkho.exeC:\Windows\system32\Aipipkho.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2124 -
C:\Windows\SysWOW64\Akcbnb32.exeC:\Windows\system32\Akcbnb32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2380 -
C:\Windows\SysWOW64\Aeigkklp.exeC:\Windows\system32\Aeigkklp.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:536 -
C:\Windows\SysWOW64\Bcfmbd32.exeC:\Windows\system32\Bcfmbd32.exe115⤵PID:2272
-
C:\Windows\SysWOW64\Bnkapm32.exeC:\Windows\system32\Bnkapm32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2312 -
C:\Windows\SysWOW64\Bgcfib32.exeC:\Windows\system32\Bgcfib32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1668 -
C:\Windows\SysWOW64\Bookmd32.exeC:\Windows\system32\Bookmd32.exe118⤵
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\Bjdojm32.exeC:\Windows\system32\Bjdojm32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Ccmccc32.exeC:\Windows\system32\Ccmccc32.exe120⤵PID:2204
-
C:\Windows\SysWOW64\Cfnlen32.exeC:\Windows\system32\Cfnlen32.exe121⤵
- Drops file in System32 directory
PID:1380 -
C:\Windows\SysWOW64\Cbgjpo32.exeC:\Windows\system32\Cbgjpo32.exe122⤵
- Drops file in System32 directory
PID:2016
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-