Analysis
-
max time kernel
159s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 20:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.ed12820a7dac16bd3bc576d2f507aa40.exe
Resource
win7-20231023-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.ed12820a7dac16bd3bc576d2f507aa40.exe
Resource
win10v2004-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.ed12820a7dac16bd3bc576d2f507aa40.exe
-
Size
1.5MB
-
MD5
ed12820a7dac16bd3bc576d2f507aa40
-
SHA1
34785deca8a2a67ac899fcc3f5db80a52570fc72
-
SHA256
1aad11bb3d9ac908162d2386ce3d6025dfeeb3b4c83466b3261825f4133b4b09
-
SHA512
ea5524319438f385e47d861e56225cee1e0f8bed95007716c590483c2f9f54a6170806e2d3c0206bd2de7fc4df26cb713c2e6d13655c1a1436413646f7b27095
-
SSDEEP
12288:Ts69JfPbWGRdA6sQxuEuZH8WF50+OJ3BHCXwpnsKvNA+XTvZHWuEo3oWB+:TF9JzecI50+YNpsKv2EvZHp3oWB+
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbfeoohe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jabgkpad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edhado32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Meepne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idbalhho.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdeijmph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkgekock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hoadecal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjkbemll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lqhdlc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkdieo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ampkil32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqomdppm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emhmkh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elnoifjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fldnoo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Coigllel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcnmhpoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flfjdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fglndbmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebgpkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hiljpi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecmemp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igajka32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfenncdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebimqi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipjocgdm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbldinjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Koimkegp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pidaleei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnibhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jehmgg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aagkaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfoebq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Menimfnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ogndki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Haclio32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjbddh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glfmaemc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdadip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajjcoqdl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbabblkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfojmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppgofcff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lepnli32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdnlmj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpehikja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebdcejpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcbllh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gclapb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfcmpdjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gdadip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddnefeda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhinmb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hibape32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dggkbeof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peaokh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpgqik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkaimj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odmbkolo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqfpma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iacnpjmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlmiagbo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Naejcl32.exe -
Executes dropped EXE 64 IoCs
pid Process 4772 Iadljc32.exe 1172 Lkflpe32.exe 208 Mfeccm32.exe 4980 Mcnmhpoj.exe 4960 Njokei32.exe 4808 Omnqhbap.exe 4024 Pbmffi32.exe 572 Ajjcoqdl.exe 1808 Bckknd32.exe 2484 Dqigee32.exe 3904 Fjbddh32.exe 3552 Ghdaokfe.exe 568 Haclio32.exe 2348 Hlmiagbo.exe 4696 Idbalhho.exe 4620 Jookjpam.exe 4668 Kkooep32.exe 4524 Lkchpoka.exe 1148 Micheb32.exe 3444 Ofjokc32.exe 4804 Pmdpok32.exe 656 Qipjokik.exe 1028 Aifpoj32.exe 2300 Boaeioej.exe 3908 Bodano32.exe 1500 Dqomdppm.exe 3540 Dmhkoaco.exe 2924 Emoaopnf.exe 4092 Eglkmh32.exe 3220 Fanbll32.exe 1168 Gndpkp32.exe 4684 Gplbcgbg.exe 1968 Hmdlhk32.exe 3504 Ikdlmmbh.exe 3448 Iodaikfl.exe 4412 Kpkqbq32.exe 3616 Lhgbomfo.exe 2904 Nbfeoohe.exe 3892 Pngbam32.exe 2424 Qlkbka32.exe 1700 Befmpdmq.exe 2028 Bhibgo32.exe 2112 Cpgqik32.exe 856 Eplckh32.exe 2536 Emhmkh32.exe 1680 Fqhbgf32.exe 3524 Gbcaemdg.exe 4792 Gmkbgf32.exe 2204 Hjeiai32.exe 1332 Hjjbmhfg.exe 1492 Ipldpo32.exe 3712 Jabgkpad.exe 3160 Pkebekgo.exe 5116 Qgalelin.exe 4812 Acmfel32.exe 4904 Baepjpea.exe 4780 Clknnf32.exe 548 Dogfkpih.exe 4540 Eedkniob.exe 1976 Ehddpdlc.exe 3928 Ehgqed32.exe 3356 Flnlaahl.exe 1900 Goabhl32.exe 880 Hoakpi32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Haclio32.exe Ghdaokfe.exe File created C:\Windows\SysWOW64\Elfggmom.dll Dkfanqmd.exe File created C:\Windows\SysWOW64\Oipnkcnm.dll Peokkbao.exe File created C:\Windows\SysWOW64\Piknfgmd.exe Olgnlb32.exe File created C:\Windows\SysWOW64\Cfnqdale.exe Ckhlgilp.exe File opened for modification C:\Windows\SysWOW64\Gfhehlhe.exe Gjadck32.exe File created C:\Windows\SysWOW64\Kqpoja32.exe Kkcfbj32.exe File opened for modification C:\Windows\SysWOW64\Pjlcclfl.exe Ppgofcff.exe File created C:\Windows\SysWOW64\Dbpljo32.dll Naejcl32.exe File created C:\Windows\SysWOW64\Jponii32.dll Ebgpkj32.exe File created C:\Windows\SysWOW64\Qcbmegol.exe Qjjhla32.exe File created C:\Windows\SysWOW64\Glafdn32.dll Bcddlhgo.exe File created C:\Windows\SysWOW64\Ckdoikhh.dll Ckdcli32.exe File created C:\Windows\SysWOW64\Eoiano32.dll Nppfimnm.exe File created C:\Windows\SysWOW64\Ldodop32.dll Hdnlmj32.exe File opened for modification C:\Windows\SysWOW64\Oagpne32.exe Nnfgmjfb.exe File created C:\Windows\SysWOW64\Oaclhq32.dll Mjodff32.exe File opened for modification C:\Windows\SysWOW64\Dnljdqkh.exe Ddcekk32.exe File created C:\Windows\SysWOW64\Ijjombcn.dll Nconal32.exe File created C:\Windows\SysWOW64\Lljked32.exe Lgmbmn32.exe File created C:\Windows\SysWOW64\Hagkpl32.dll Hjkbhlno.exe File opened for modification C:\Windows\SysWOW64\Kddinm32.exe Kdalim32.exe File created C:\Windows\SysWOW64\Jcanfakf.exe Jenmlmll.exe File created C:\Windows\SysWOW64\Ecmemp32.exe Emplei32.exe File created C:\Windows\SysWOW64\Pnggcnld.dll Bmggbcmp.exe File opened for modification C:\Windows\SysWOW64\Imfill32.exe Ioeineap.exe File created C:\Windows\SysWOW64\Ofmcfq32.dll Omdpio32.exe File created C:\Windows\SysWOW64\Afclpk32.exe Aagdgd32.exe File created C:\Windows\SysWOW64\Emkeho32.exe Ehomph32.exe File created C:\Windows\SysWOW64\Ijilbdnp.dll Fbajlo32.exe File created C:\Windows\SysWOW64\Gnkfgb32.exe Ginnokej.exe File created C:\Windows\SysWOW64\Babfgo32.dll Mamljndl.exe File opened for modification C:\Windows\SysWOW64\Ddhhldlf.exe Dibdok32.exe File created C:\Windows\SysWOW64\Anhgefec.dll Jmpgfjmd.exe File created C:\Windows\SysWOW64\Anjngp32.exe Qcbmegol.exe File created C:\Windows\SysWOW64\Kjclmbhq.dll Aachaa32.exe File created C:\Windows\SysWOW64\Keifneoc.exe Klpaep32.exe File opened for modification C:\Windows\SysWOW64\Ckdkbfco.exe Calfiq32.exe File created C:\Windows\SysWOW64\Jihcig32.dll Ifjdjbdd.exe File created C:\Windows\SysWOW64\Ffdbjn32.dll Ieqplb32.exe File created C:\Windows\SysWOW64\Kdkool32.exe Kkbkffka.exe File opened for modification C:\Windows\SysWOW64\Khplia32.exe Jpegeo32.exe File created C:\Windows\SysWOW64\Mjnlfk32.dll Locgljca.exe File created C:\Windows\SysWOW64\Ngdcjqhe.dll Gclapb32.exe File created C:\Windows\SysWOW64\Bmaejnbe.dll Miomnaip.exe File opened for modification C:\Windows\SysWOW64\Ambgnl32.exe Ampkil32.exe File created C:\Windows\SysWOW64\Majejoie.dll Lhihejhi.exe File created C:\Windows\SysWOW64\Dmmifaci.exe Dgqqnjea.exe File opened for modification C:\Windows\SysWOW64\Ckealm32.exe Cponodge.exe File created C:\Windows\SysWOW64\Mccefjja.dll Gbabblkg.exe File created C:\Windows\SysWOW64\Icacbohp.exe Ielfqcch.exe File created C:\Windows\SysWOW64\Iobeno32.exe Hbldinjb.exe File created C:\Windows\SysWOW64\Ellpgeag.exe Eljcae32.exe File created C:\Windows\SysWOW64\Oplkgi32.exe Oeffip32.exe File created C:\Windows\SysWOW64\Iqqpmc32.dll Hbbacobm.exe File created C:\Windows\SysWOW64\Cdmokljp.exe Ckdkbfco.exe File created C:\Windows\SysWOW64\Daopfc32.dll Hchqlqpj.exe File opened for modification C:\Windows\SysWOW64\Koimkegp.exe Kddinm32.exe File opened for modification C:\Windows\SysWOW64\Jnklnfpq.exe Jhndepbi.exe File created C:\Windows\SysWOW64\Oclkqihc.exe Omkmcpgo.exe File created C:\Windows\SysWOW64\Aojljkkf.exe Acclejeb.exe File opened for modification C:\Windows\SysWOW64\Ngbeok32.exe Mjodff32.exe File opened for modification C:\Windows\SysWOW64\Hbbacobm.exe Hijmjj32.exe File opened for modification C:\Windows\SysWOW64\Fkjfkacd.exe Fnffam32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qaokak32.dll" Gnaemkjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jeeigakm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcpcqh32.dll" Kpkqbq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Odipjk32.dll" Nbfeoohe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbcaemdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bqhlpbjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfnqdale.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Egnacd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Emoaopnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckdoikhh.dll" Ckdcli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbgnobpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnendhol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khplia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnkajg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmoijcje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Imfill32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lqhdlc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgokbjip.dll" Fnffam32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kdkool32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogkcihgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kapijhaf.dll" Coigllel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbcpkjkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nflkkf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Alfpijll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oepiipcc.dll" Ckdkbfco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ielfqcch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbojnmhg.dll" Mgnldkgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Klpaep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Keonml32.dll" Olbdacbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jleicg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmggbcmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbjoac32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhibgo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nimioo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gfhehlhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phjdggoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Locgljca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ljqhdhpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjjbmhfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oibocbah.dll" Pfcmpdjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojpdgjid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ohfafn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nakgec32.dll" Ffaogm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hchqlqpj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acbmcima.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ampkil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hoadecal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Elnoifjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acdpkj32.dll" Fnlcknle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kikafjoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmijdh32.dll" Bjddinbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Peokkbao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" NEAS.ed12820a7dac16bd3bc576d2f507aa40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmfiheah.dll" Ginnokej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ginnokej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqpccp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpkjnjqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iiigjp32.dll" Ajjcoqdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olbdacbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adkghk32.dll" Oeehdcij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgilfl32.dll" Jekqgnno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fqhbgf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nipedokm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ngaiilfq.dll" Bfchcijo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2836 wrote to memory of 4772 2836 NEAS.ed12820a7dac16bd3bc576d2f507aa40.exe 91 PID 2836 wrote to memory of 4772 2836 NEAS.ed12820a7dac16bd3bc576d2f507aa40.exe 91 PID 2836 wrote to memory of 4772 2836 NEAS.ed12820a7dac16bd3bc576d2f507aa40.exe 91 PID 4772 wrote to memory of 1172 4772 Iadljc32.exe 92 PID 4772 wrote to memory of 1172 4772 Iadljc32.exe 92 PID 4772 wrote to memory of 1172 4772 Iadljc32.exe 92 PID 1172 wrote to memory of 208 1172 Lkflpe32.exe 93 PID 1172 wrote to memory of 208 1172 Lkflpe32.exe 93 PID 1172 wrote to memory of 208 1172 Lkflpe32.exe 93 PID 208 wrote to memory of 4980 208 Mfeccm32.exe 94 PID 208 wrote to memory of 4980 208 Mfeccm32.exe 94 PID 208 wrote to memory of 4980 208 Mfeccm32.exe 94 PID 4980 wrote to memory of 4960 4980 Mcnmhpoj.exe 95 PID 4980 wrote to memory of 4960 4980 Mcnmhpoj.exe 95 PID 4980 wrote to memory of 4960 4980 Mcnmhpoj.exe 95 PID 4960 wrote to memory of 4808 4960 Njokei32.exe 96 PID 4960 wrote to memory of 4808 4960 Njokei32.exe 96 PID 4960 wrote to memory of 4808 4960 Njokei32.exe 96 PID 4808 wrote to memory of 4024 4808 Omnqhbap.exe 97 PID 4808 wrote to memory of 4024 4808 Omnqhbap.exe 97 PID 4808 wrote to memory of 4024 4808 Omnqhbap.exe 97 PID 4024 wrote to memory of 572 4024 Pbmffi32.exe 98 PID 4024 wrote to memory of 572 4024 Pbmffi32.exe 98 PID 4024 wrote to memory of 572 4024 Pbmffi32.exe 98 PID 572 wrote to memory of 1808 572 Ajjcoqdl.exe 99 PID 572 wrote to memory of 1808 572 Ajjcoqdl.exe 99 PID 572 wrote to memory of 1808 572 Ajjcoqdl.exe 99 PID 1808 wrote to memory of 2484 1808 Bckknd32.exe 100 PID 1808 wrote to memory of 2484 1808 Bckknd32.exe 100 PID 1808 wrote to memory of 2484 1808 Bckknd32.exe 100 PID 2484 wrote to memory of 3904 2484 Dqigee32.exe 101 PID 2484 wrote to memory of 3904 2484 Dqigee32.exe 101 PID 2484 wrote to memory of 3904 2484 Dqigee32.exe 101 PID 3904 wrote to memory of 3552 3904 Fjbddh32.exe 102 PID 3904 wrote to memory of 3552 3904 Fjbddh32.exe 102 PID 3904 wrote to memory of 3552 3904 Fjbddh32.exe 102 PID 3552 wrote to memory of 568 3552 Ghdaokfe.exe 103 PID 3552 wrote to memory of 568 3552 Ghdaokfe.exe 103 PID 3552 wrote to memory of 568 3552 Ghdaokfe.exe 103 PID 568 wrote to memory of 2348 568 Haclio32.exe 104 PID 568 wrote to memory of 2348 568 Haclio32.exe 104 PID 568 wrote to memory of 2348 568 Haclio32.exe 104 PID 2348 wrote to memory of 4696 2348 Hlmiagbo.exe 105 PID 2348 wrote to memory of 4696 2348 Hlmiagbo.exe 105 PID 2348 wrote to memory of 4696 2348 Hlmiagbo.exe 105 PID 4696 wrote to memory of 4620 4696 Idbalhho.exe 106 PID 4696 wrote to memory of 4620 4696 Idbalhho.exe 106 PID 4696 wrote to memory of 4620 4696 Idbalhho.exe 106 PID 4620 wrote to memory of 4668 4620 Jookjpam.exe 107 PID 4620 wrote to memory of 4668 4620 Jookjpam.exe 107 PID 4620 wrote to memory of 4668 4620 Jookjpam.exe 107 PID 4668 wrote to memory of 4524 4668 Kkooep32.exe 108 PID 4668 wrote to memory of 4524 4668 Kkooep32.exe 108 PID 4668 wrote to memory of 4524 4668 Kkooep32.exe 108 PID 4524 wrote to memory of 1148 4524 Lkchpoka.exe 109 PID 4524 wrote to memory of 1148 4524 Lkchpoka.exe 109 PID 4524 wrote to memory of 1148 4524 Lkchpoka.exe 109 PID 1148 wrote to memory of 3444 1148 Micheb32.exe 110 PID 1148 wrote to memory of 3444 1148 Micheb32.exe 110 PID 1148 wrote to memory of 3444 1148 Micheb32.exe 110 PID 3444 wrote to memory of 4804 3444 Ofjokc32.exe 111 PID 3444 wrote to memory of 4804 3444 Ofjokc32.exe 111 PID 3444 wrote to memory of 4804 3444 Ofjokc32.exe 111 PID 4804 wrote to memory of 656 4804 Pmdpok32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ed12820a7dac16bd3bc576d2f507aa40.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ed12820a7dac16bd3bc576d2f507aa40.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\Iadljc32.exeC:\Windows\system32\Iadljc32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\Lkflpe32.exeC:\Windows\system32\Lkflpe32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\Mfeccm32.exeC:\Windows\system32\Mfeccm32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\Mcnmhpoj.exeC:\Windows\system32\Mcnmhpoj.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\Njokei32.exeC:\Windows\system32\Njokei32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Omnqhbap.exeC:\Windows\system32\Omnqhbap.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\Pbmffi32.exeC:\Windows\system32\Pbmffi32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\Ajjcoqdl.exeC:\Windows\system32\Ajjcoqdl.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\Bckknd32.exeC:\Windows\system32\Bckknd32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\Dqigee32.exeC:\Windows\system32\Dqigee32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Fjbddh32.exeC:\Windows\system32\Fjbddh32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\Ghdaokfe.exeC:\Windows\system32\Ghdaokfe.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\Haclio32.exeC:\Windows\system32\Haclio32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\Hlmiagbo.exeC:\Windows\system32\Hlmiagbo.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\Idbalhho.exeC:\Windows\system32\Idbalhho.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\Jookjpam.exeC:\Windows\system32\Jookjpam.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\Kkooep32.exeC:\Windows\system32\Kkooep32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\Lkchpoka.exeC:\Windows\system32\Lkchpoka.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\Micheb32.exeC:\Windows\system32\Micheb32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\Ofjokc32.exeC:\Windows\system32\Ofjokc32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\Pmdpok32.exeC:\Windows\system32\Pmdpok32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\Qipjokik.exeC:\Windows\system32\Qipjokik.exe23⤵
- Executes dropped EXE
PID:656 -
C:\Windows\SysWOW64\Aifpoj32.exeC:\Windows\system32\Aifpoj32.exe24⤵
- Executes dropped EXE
PID:1028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Boaeioej.exeC:\Windows\system32\Boaeioej.exe1⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\Bodano32.exeC:\Windows\system32\Bodano32.exe2⤵
- Executes dropped EXE
PID:3908 -
C:\Windows\SysWOW64\Dqomdppm.exeC:\Windows\system32\Dqomdppm.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1500 -
C:\Windows\SysWOW64\Dmhkoaco.exeC:\Windows\system32\Dmhkoaco.exe4⤵
- Executes dropped EXE
PID:3540 -
C:\Windows\SysWOW64\Emoaopnf.exeC:\Windows\system32\Emoaopnf.exe5⤵
- Executes dropped EXE
- Modifies registry class
PID:2924 -
C:\Windows\SysWOW64\Eglkmh32.exeC:\Windows\system32\Eglkmh32.exe6⤵
- Executes dropped EXE
PID:4092 -
C:\Windows\SysWOW64\Fanbll32.exeC:\Windows\system32\Fanbll32.exe7⤵
- Executes dropped EXE
PID:3220 -
C:\Windows\SysWOW64\Gndpkp32.exeC:\Windows\system32\Gndpkp32.exe8⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\SysWOW64\Gplbcgbg.exeC:\Windows\system32\Gplbcgbg.exe9⤵
- Executes dropped EXE
PID:4684 -
C:\Windows\SysWOW64\Hmdlhk32.exeC:\Windows\system32\Hmdlhk32.exe10⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\Ikdlmmbh.exeC:\Windows\system32\Ikdlmmbh.exe11⤵
- Executes dropped EXE
PID:3504 -
C:\Windows\SysWOW64\Iodaikfl.exeC:\Windows\system32\Iodaikfl.exe12⤵
- Executes dropped EXE
PID:3448 -
C:\Windows\SysWOW64\Kpkqbq32.exeC:\Windows\system32\Kpkqbq32.exe13⤵
- Executes dropped EXE
- Modifies registry class
PID:4412 -
C:\Windows\SysWOW64\Lhgbomfo.exeC:\Windows\system32\Lhgbomfo.exe14⤵
- Executes dropped EXE
PID:3616 -
C:\Windows\SysWOW64\Nbfeoohe.exeC:\Windows\system32\Nbfeoohe.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2904 -
C:\Windows\SysWOW64\Pngbam32.exeC:\Windows\system32\Pngbam32.exe16⤵
- Executes dropped EXE
PID:3892 -
C:\Windows\SysWOW64\Qlkbka32.exeC:\Windows\system32\Qlkbka32.exe17⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\Befmpdmq.exeC:\Windows\system32\Befmpdmq.exe18⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\Bhibgo32.exeC:\Windows\system32\Bhibgo32.exe19⤵
- Executes dropped EXE
- Modifies registry class
PID:2028 -
C:\Windows\SysWOW64\Cpgqik32.exeC:\Windows\system32\Cpgqik32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2112 -
C:\Windows\SysWOW64\Eplckh32.exeC:\Windows\system32\Eplckh32.exe21⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\Emhmkh32.exeC:\Windows\system32\Emhmkh32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2536 -
C:\Windows\SysWOW64\Fqhbgf32.exeC:\Windows\system32\Fqhbgf32.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:1680 -
C:\Windows\SysWOW64\Gbcaemdg.exeC:\Windows\system32\Gbcaemdg.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:3524 -
C:\Windows\SysWOW64\Gmkbgf32.exeC:\Windows\system32\Gmkbgf32.exe25⤵
- Executes dropped EXE
PID:4792 -
C:\Windows\SysWOW64\Hjeiai32.exeC:\Windows\system32\Hjeiai32.exe26⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\Hjjbmhfg.exeC:\Windows\system32\Hjjbmhfg.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1332 -
C:\Windows\SysWOW64\Ipldpo32.exeC:\Windows\system32\Ipldpo32.exe28⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\SysWOW64\Jabgkpad.exeC:\Windows\system32\Jabgkpad.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3712 -
C:\Windows\SysWOW64\Pkebekgo.exeC:\Windows\system32\Pkebekgo.exe30⤵
- Executes dropped EXE
PID:3160 -
C:\Windows\SysWOW64\Qgalelin.exeC:\Windows\system32\Qgalelin.exe31⤵
- Executes dropped EXE
PID:5116 -
C:\Windows\SysWOW64\Acmfel32.exeC:\Windows\system32\Acmfel32.exe32⤵
- Executes dropped EXE
PID:4812 -
C:\Windows\SysWOW64\Baepjpea.exeC:\Windows\system32\Baepjpea.exe33⤵
- Executes dropped EXE
PID:4904 -
C:\Windows\SysWOW64\Clknnf32.exeC:\Windows\system32\Clknnf32.exe34⤵
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\Dogfkpih.exeC:\Windows\system32\Dogfkpih.exe35⤵
- Executes dropped EXE
PID:548 -
C:\Windows\SysWOW64\Eedkniob.exeC:\Windows\system32\Eedkniob.exe36⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\SysWOW64\Ehddpdlc.exeC:\Windows\system32\Ehddpdlc.exe37⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\Ehgqed32.exeC:\Windows\system32\Ehgqed32.exe38⤵
- Executes dropped EXE
PID:3928 -
C:\Windows\SysWOW64\Flnlaahl.exeC:\Windows\system32\Flnlaahl.exe39⤵
- Executes dropped EXE
PID:3356 -
C:\Windows\SysWOW64\Goabhl32.exeC:\Windows\system32\Goabhl32.exe40⤵
- Executes dropped EXE
PID:1900 -
C:\Windows\SysWOW64\Hoakpi32.exeC:\Windows\system32\Hoakpi32.exe41⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\Jfaenqjm.exeC:\Windows\system32\Jfaenqjm.exe42⤵PID:1552
-
C:\Windows\SysWOW64\Jcefgeif.exeC:\Windows\system32\Jcefgeif.exe43⤵PID:1184
-
C:\Windows\SysWOW64\Jlpklg32.exeC:\Windows\system32\Jlpklg32.exe44⤵PID:740
-
C:\Windows\SysWOW64\Jmpgfjmd.exeC:\Windows\system32\Jmpgfjmd.exe45⤵
- Drops file in System32 directory
PID:3584 -
C:\Windows\SysWOW64\Kmbdkj32.exeC:\Windows\system32\Kmbdkj32.exe46⤵PID:2824
-
C:\Windows\SysWOW64\Kemhpl32.exeC:\Windows\system32\Kemhpl32.exe47⤵PID:4200
-
C:\Windows\SysWOW64\Kdnincal.exeC:\Windows\system32\Kdnincal.exe48⤵PID:3396
-
C:\Windows\SysWOW64\Kikafjoc.exeC:\Windows\system32\Kikafjoc.exe49⤵
- Modifies registry class
PID:2380 -
C:\Windows\SysWOW64\Kfoapo32.exeC:\Windows\system32\Kfoapo32.exe50⤵PID:3796
-
C:\Windows\SysWOW64\Lpnlicne.exeC:\Windows\system32\Lpnlicne.exe51⤵PID:500
-
C:\Windows\SysWOW64\Lmdihgkl.exeC:\Windows\system32\Lmdihgkl.exe52⤵PID:640
-
C:\Windows\SysWOW64\Lepnli32.exeC:\Windows\system32\Lepnli32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3408 -
C:\Windows\SysWOW64\Mgokflpj.exeC:\Windows\system32\Mgokflpj.exe54⤵PID:436
-
C:\Windows\SysWOW64\Mcfkkmeo.exeC:\Windows\system32\Mcfkkmeo.exe55⤵PID:3816
-
C:\Windows\SysWOW64\Mckefmai.exeC:\Windows\system32\Mckefmai.exe56⤵PID:1600
-
C:\Windows\SysWOW64\Mpoepa32.exeC:\Windows\system32\Mpoepa32.exe57⤵PID:3812
-
C:\Windows\SysWOW64\Meknhh32.exeC:\Windows\system32\Meknhh32.exe58⤵PID:4208
-
C:\Windows\SysWOW64\Nconal32.exeC:\Windows\system32\Nconal32.exe59⤵
- Drops file in System32 directory
PID:1356 -
C:\Windows\SysWOW64\Opmaaodc.exeC:\Windows\system32\Opmaaodc.exe60⤵PID:4508
-
C:\Windows\SysWOW64\Ogkcihgj.exeC:\Windows\system32\Ogkcihgj.exe61⤵
- Modifies registry class
PID:2444 -
C:\Windows\SysWOW64\Pfcmpdjp.exeC:\Windows\system32\Pfcmpdjp.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2348 -
C:\Windows\SysWOW64\Qjjhla32.exeC:\Windows\system32\Qjjhla32.exe63⤵
- Drops file in System32 directory
PID:3228 -
C:\Windows\SysWOW64\Qcbmegol.exeC:\Windows\system32\Qcbmegol.exe64⤵
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\Anjngp32.exeC:\Windows\system32\Anjngp32.exe65⤵PID:212
-
C:\Windows\SysWOW64\Agcbqecp.exeC:\Windows\system32\Agcbqecp.exe66⤵PID:3964
-
C:\Windows\SysWOW64\Ampkil32.exeC:\Windows\system32\Ampkil32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4932 -
C:\Windows\SysWOW64\Ambgnl32.exeC:\Windows\system32\Ambgnl32.exe68⤵PID:1576
-
C:\Windows\SysWOW64\Afmhma32.exeC:\Windows\system32\Afmhma32.exe69⤵PID:4056
-
C:\Windows\SysWOW64\Bfoebq32.exeC:\Windows\system32\Bfoebq32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1428 -
C:\Windows\SysWOW64\Bccfleqi.exeC:\Windows\system32\Bccfleqi.exe71⤵PID:208
-
C:\Windows\SysWOW64\Bjmnho32.exeC:\Windows\system32\Bjmnho32.exe72⤵PID:4524
-
C:\Windows\SysWOW64\Bcebadof.exeC:\Windows\system32\Bcebadof.exe73⤵PID:3660
-
C:\Windows\SysWOW64\Bjddinbn.exeC:\Windows\system32\Bjddinbn.exe74⤵
- Modifies registry class
PID:3332 -
C:\Windows\SysWOW64\Celelf32.exeC:\Windows\system32\Celelf32.exe75⤵PID:4492
-
C:\Windows\SysWOW64\Cagolf32.exeC:\Windows\system32\Cagolf32.exe76⤵PID:2220
-
C:\Windows\SysWOW64\Dajlafon.exeC:\Windows\system32\Dajlafon.exe77⤵PID:2988
-
C:\Windows\SysWOW64\Edhado32.exeC:\Windows\system32\Edhado32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4312 -
C:\Windows\SysWOW64\Egijfjmp.exeC:\Windows\system32\Egijfjmp.exe79⤵PID:4696
-
C:\Windows\SysWOW64\Edmjpoli.exeC:\Windows\system32\Edmjpoli.exe80⤵PID:1884
-
C:\Windows\SysWOW64\Fobomglo.exeC:\Windows\system32\Fobomglo.exe81⤵PID:4260
-
C:\Windows\SysWOW64\Gddigk32.exeC:\Windows\system32\Gddigk32.exe82⤵PID:4956
-
C:\Windows\SysWOW64\Hbhjqp32.exeC:\Windows\system32\Hbhjqp32.exe83⤵PID:348
-
C:\Windows\SysWOW64\Hgebif32.exeC:\Windows\system32\Hgebif32.exe84⤵PID:4252
-
C:\Windows\SysWOW64\Hkckoe32.exeC:\Windows\system32\Hkckoe32.exe85⤵PID:3760
-
C:\Windows\SysWOW64\Hoadecal.exeC:\Windows\system32\Hoadecal.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:928 -
C:\Windows\SysWOW64\Hdnlmj32.exeC:\Windows\system32\Hdnlmj32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5068 -
C:\Windows\SysWOW64\Hkhdjdgq.exeC:\Windows\system32\Hkhdjdgq.exe88⤵PID:4736
-
C:\Windows\SysWOW64\Igabdekb.exeC:\Windows\system32\Igabdekb.exe89⤵PID:1120
-
C:\Windows\SysWOW64\Ibffbnjh.exeC:\Windows\system32\Ibffbnjh.exe90⤵PID:412
-
C:\Windows\SysWOW64\Mojhphij.exeC:\Windows\system32\Mojhphij.exe91⤵PID:2584
-
C:\Windows\SysWOW64\Miomnaip.exeC:\Windows\system32\Miomnaip.exe92⤵
- Drops file in System32 directory
PID:2248 -
C:\Windows\SysWOW64\Mpiejkql.exeC:\Windows\system32\Mpiejkql.exe93⤵PID:5072
-
C:\Windows\SysWOW64\Mhdjonng.exeC:\Windows\system32\Mhdjonng.exe94⤵PID:4888
-
C:\Windows\SysWOW64\Nifcnpch.exeC:\Windows\system32\Nifcnpch.exe95⤵PID:4744
-
C:\Windows\SysWOW64\Nohdaf32.exeC:\Windows\system32\Nohdaf32.exe96⤵PID:4756
-
C:\Windows\SysWOW64\Nimioo32.exeC:\Windows\system32\Nimioo32.exe97⤵
- Modifies registry class
PID:4648 -
C:\Windows\SysWOW64\Nojagf32.exeC:\Windows\system32\Nojagf32.exe98⤵PID:4684
-
C:\Windows\SysWOW64\Nipedokm.exeC:\Windows\system32\Nipedokm.exe99⤵
- Modifies registry class
PID:4084 -
C:\Windows\SysWOW64\Oeffip32.exeC:\Windows\system32\Oeffip32.exe100⤵
- Drops file in System32 directory
PID:3220 -
C:\Windows\SysWOW64\Oplkgi32.exeC:\Windows\system32\Oplkgi32.exe101⤵PID:2180
-
C:\Windows\SysWOW64\Bqdbec32.exeC:\Windows\system32\Bqdbec32.exe102⤵PID:4412
-
C:\Windows\SysWOW64\Bgnkamef.exeC:\Windows\system32\Bgnkamef.exe103⤵PID:4408
-
C:\Windows\SysWOW64\Bqfokblg.exeC:\Windows\system32\Bqfokblg.exe104⤵PID:5080
-
C:\Windows\SysWOW64\Bfchcijo.exeC:\Windows\system32\Bfchcijo.exe105⤵
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Bqhlpbjd.exeC:\Windows\system32\Bqhlpbjd.exe106⤵
- Modifies registry class
PID:1168 -
C:\Windows\SysWOW64\Bjaqih32.exeC:\Windows\system32\Bjaqih32.exe107⤵PID:4192
-
C:\Windows\SysWOW64\Capbaacl.exeC:\Windows\system32\Capbaacl.exe108⤵PID:4948
-
C:\Windows\SysWOW64\Cafhap32.exeC:\Windows\system32\Cafhap32.exe109⤵PID:3972
-
C:\Windows\SysWOW64\Dgqqnjea.exeC:\Windows\system32\Dgqqnjea.exe110⤵
- Drops file in System32 directory
PID:3708 -
C:\Windows\SysWOW64\Dmmifaci.exeC:\Windows\system32\Dmmifaci.exe111⤵PID:2300
-
C:\Windows\SysWOW64\Dgcmdj32.exeC:\Windows\system32\Dgcmdj32.exe112⤵PID:1020
-
C:\Windows\SysWOW64\Dmpfla32.exeC:\Windows\system32\Dmpfla32.exe113⤵PID:752
-
C:\Windows\SysWOW64\Dhejij32.exeC:\Windows\system32\Dhejij32.exe114⤵PID:5164
-
C:\Windows\SysWOW64\Dmbbaq32.exeC:\Windows\system32\Dmbbaq32.exe115⤵PID:5204
-
C:\Windows\SysWOW64\Dhgfoioi.exeC:\Windows\system32\Dhgfoioi.exe116⤵PID:5244
-
C:\Windows\SysWOW64\Dmdogpmq.exeC:\Windows\system32\Dmdogpmq.exe117⤵PID:5284
-
C:\Windows\SysWOW64\Dfmcpf32.exeC:\Windows\system32\Dfmcpf32.exe118⤵PID:5332
-
C:\Windows\SysWOW64\Dpehikja.exeC:\Windows\system32\Dpehikja.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5376 -
C:\Windows\SysWOW64\Einmaaqb.exeC:\Windows\system32\Einmaaqb.exe120⤵PID:5420
-
C:\Windows\SysWOW64\Ehomph32.exeC:\Windows\system32\Ehomph32.exe121⤵
- Drops file in System32 directory
PID:5468 -
C:\Windows\SysWOW64\Emkeho32.exeC:\Windows\system32\Emkeho32.exe122⤵PID:5512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-