Analysis
-
max time kernel
188s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 08:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.d1186ab296e0ab01975c42fda6483d90.exe
Resource
win7-20231020-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.d1186ab296e0ab01975c42fda6483d90.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NEAS.d1186ab296e0ab01975c42fda6483d90.exe
-
Size
272KB
-
MD5
d1186ab296e0ab01975c42fda6483d90
-
SHA1
5d83fdaee6875822771e03b53ab3a27b28f3e5cf
-
SHA256
ac14b3b02d6aba8f35981ed775763860d6a78102174bdec674af680eb540927c
-
SHA512
dbb01d5b13a49491c2c259fd8728ca4bec2bda5521951c0d61470d59bc819afa18ee489c9429a89c08f5fc94cdf9e48d2d200718b9cf41f13ea0f80aac47db3b
-
SSDEEP
6144:33v8Evok2OTByvZ6Mxv5Rar3O6B9fZSLhZmzbByvZ6Mxv5R:33v8Ev126ByvNv54B9f01ZmHByvNv5
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgdphm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olgdgibf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hipdjfoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ikickgnf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmnheggo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llmhkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfqmbf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkaimj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fllkjd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgnldkgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnmmleja.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnojad32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oceepj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ilibmcln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Madbagif.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eanqpdgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Blecdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gkhkdjli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lfeldj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Endnohdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lgdinmod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lckicnei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mckbhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Djhiglji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jgonfcnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ngbeok32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kibmqond.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpnmka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hipdjfoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikfgeh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmmqbb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddjecalo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkomgkoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jalakeme.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jqihjbod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Glgjfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mnhdae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fkempa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccendc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nigjifgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hgdedj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Icdhojka.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqpccp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfnbbg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihhmgaqb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jalakeme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Npepdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Npgmjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bbgbjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dqajjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jgdphm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbmigm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqmfnp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgbfka32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgliapic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dfnbbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Olgdgibf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kiejfo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igbaeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Igbaeh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilibmcln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bndblcdq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cddjofbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ccldebeo.exe -
Executes dropped EXE 64 IoCs
pid Process 1884 Mhknhabf.exe 1872 Madbagif.exe 2424 Mohbjkgp.exe 3736 Mebkge32.exe 1124 Mhpgca32.exe 4588 Mdghhb32.exe 4416 Hmkeekag.exe 4560 Odgjdibf.exe 4544 Eipilmgh.exe 4448 Mankaked.exe 4352 Bndblcdq.exe 4164 Bjhpqn32.exe 4456 Cnhell32.exe 1932 Ccendc32.exe 1804 Cnjbbl32.exe 4792 Cddjofbj.exe 2952 Cgbfka32.exe 1592 Cnmoglij.exe 2884 Cqkkcghn.exe 3108 Ccldebeo.exe 1720 Cjflblll.exe 5040 Djhiglji.exe 4260 Dgliapic.exe 940 Dmiaig32.exe 1500 Dgnffp32.exe 1756 Dklomnmf.exe 2472 Dedceddg.exe 4084 Dnmgni32.exe 2532 Ecjpfp32.exe 2620 Eanqpdgi.exe 4540 Eelifc32.exe 4100 Endnohdp.exe 1656 Ejkndijd.exe 2876 Ecccmo32.exe 2612 Ejmkiiha.exe 1888 Dlcaca32.exe 468 Dflflg32.exe 1476 Dqajjp32.exe 4252 Dfnbbg32.exe 3832 Imbhiial.exe 400 Ihhmgaqb.exe 2932 Imeeohoi.exe 2824 Ihkila32.exe 524 Iodaikfl.exe 3972 Jacnegep.exe 3232 Jaekkfcm.exe 4300 Jgbccm32.exe 5076 Jmlkpgia.exe 3720 Jpjhlche.exe 2504 Jgdphm32.exe 1112 Jmnheggo.exe 2552 Jalakeme.exe 2780 Qnfkgfdp.exe 540 Jbqpbbfi.exe 3524 Nigjifgc.exe 4584 Ddjecalo.exe 4256 Jgonfcnb.exe 1144 Olgdgibf.exe 3048 Emkeho32.exe 4832 Jqdoob32.exe 1928 Jgngkmkf.exe 1656 Jnhphg32.exe 4152 Jqgldb32.exe 228 Jhndepbi.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Nnojad32.exe Ngeaej32.exe File created C:\Windows\SysWOW64\Fdccka32.exe Fllkjd32.exe File created C:\Windows\SysWOW64\Hgokikan.exe Gkhkdjli.exe File opened for modification C:\Windows\SysWOW64\Ikfgeh32.exe Hckeikcl.exe File created C:\Windows\SysWOW64\Dimciemj.exe Bbgbjo32.exe File created C:\Windows\SysWOW64\Bfnknk32.dll Dgnffp32.exe File opened for modification C:\Windows\SysWOW64\Qnfkgfdp.exe Jalakeme.exe File opened for modification C:\Windows\SysWOW64\Gjadck32.exe Gplpfb32.exe File created C:\Windows\SysWOW64\Inecac32.exe Ikfgeh32.exe File created C:\Windows\SysWOW64\Ilibmcln.exe Oceepj32.exe File created C:\Windows\SysWOW64\Bbgbjo32.exe Ldanedho.exe File opened for modification C:\Windows\SysWOW64\Dnmgni32.exe Dedceddg.exe File opened for modification C:\Windows\SysWOW64\Kkaimj32.exe Kibmqond.exe File created C:\Windows\SysWOW64\Nnfpbcbf.exe Npepdl32.exe File opened for modification C:\Windows\SysWOW64\Bjhpqn32.exe Bndblcdq.exe File created C:\Windows\SysWOW64\Opagla32.dll Oceepj32.exe File opened for modification C:\Windows\SysWOW64\Mqdcga32.exe Mjjkkghp.exe File created C:\Windows\SysWOW64\Jlcdjfpl.dll Jgdphm32.exe File opened for modification C:\Windows\SysWOW64\Hckeikcl.exe Hmnmqdee.exe File created C:\Windows\SysWOW64\Ejmkiiha.exe Ecccmo32.exe File created C:\Windows\SysWOW64\Ejkndijd.exe Endnohdp.exe File opened for modification C:\Windows\SysWOW64\Dfnbbg32.exe Dqajjp32.exe File opened for modification C:\Windows\SysWOW64\Lmaafcml.exe Lgdinmod.exe File created C:\Windows\SysWOW64\Akoqqc32.dll Hfqmbf32.exe File created C:\Windows\SysWOW64\Dnnbbf32.dll Dklomnmf.exe File created C:\Windows\SysWOW64\Mdghhb32.exe Mhpgca32.exe File created C:\Windows\SysWOW64\Hkcadbbg.dll Eelifc32.exe File opened for modification C:\Windows\SysWOW64\Ejkndijd.exe Endnohdp.exe File created C:\Windows\SysWOW64\Hipdjfoo.exe Hmicee32.exe File created C:\Windows\SysWOW64\Igbaeh32.exe Iphihnjk.exe File created C:\Windows\SysWOW64\Mlffgmbd.dll Nqmfnp32.exe File created C:\Windows\SysWOW64\Nngihj32.dll Mhknhabf.exe File created C:\Windows\SysWOW64\Caikpked.dll Jacnegep.exe File created C:\Windows\SysWOW64\Lceajc32.dll Ccendc32.exe File created C:\Windows\SysWOW64\Qhhgib32.dll Dflflg32.exe File created C:\Windows\SysWOW64\Hgenmfnm.dll Jgonfcnb.exe File created C:\Windows\SysWOW64\Gkhkdjli.exe Glgjfb32.exe File opened for modification C:\Windows\SysWOW64\Iphihnjk.exe Ijnqld32.exe File opened for modification C:\Windows\SysWOW64\Npepdl32.exe Nnccmddi.exe File created C:\Windows\SysWOW64\Lggfcd32.dll NEAS.d1186ab296e0ab01975c42fda6483d90.exe File opened for modification C:\Windows\SysWOW64\Lqjqab32.exe Lfeldj32.exe File created C:\Windows\SysWOW64\Qnfkgfdp.exe Jalakeme.exe File created C:\Windows\SysWOW64\Ecccmo32.exe Ejkndijd.exe File opened for modification C:\Windows\SysWOW64\Cnmoglij.exe Cgbfka32.exe File created C:\Windows\SysWOW64\Mgphjk32.exe Moiphnde.exe File opened for modification C:\Windows\SysWOW64\Fllkjd32.exe Blecdn32.exe File created C:\Windows\SysWOW64\Bjeele32.dll Hgdedj32.exe File opened for modification C:\Windows\SysWOW64\Endnohdp.exe Eelifc32.exe File created C:\Windows\SysWOW64\Kjffngap.exe Kiejfo32.exe File created C:\Windows\SysWOW64\Bgjoghhk.dll Gpnmka32.exe File created C:\Windows\SysWOW64\Enmnqeei.dll Hmicee32.exe File created C:\Windows\SysWOW64\Ikfgeh32.exe Hckeikcl.exe File opened for modification C:\Windows\SysWOW64\Icdhojka.exe Ipflcnln.exe File created C:\Windows\SysWOW64\Ehmemonf.dll Mlpcagfd.exe File opened for modification C:\Windows\SysWOW64\Mohbjkgp.exe Madbagif.exe File created C:\Windows\SysWOW64\Jqihjbod.exe Jnklnfpq.exe File opened for modification C:\Windows\SysWOW64\Cnhell32.exe Bjhpqn32.exe File created C:\Windows\SysWOW64\Gcjcok32.dll Endnohdp.exe File opened for modification C:\Windows\SysWOW64\Ecccmo32.exe Ejkndijd.exe File created C:\Windows\SysWOW64\Jalakeme.exe Jmnheggo.exe File created C:\Windows\SysWOW64\Epoqal32.dll Gjadck32.exe File created C:\Windows\SysWOW64\Cnjbbl32.exe Ccendc32.exe File created C:\Windows\SysWOW64\Ebbndndm.dll Kkomgkoj.exe File opened for modification C:\Windows\SysWOW64\Kibmqond.exe Knmicfnn.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nqmfnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihlcmi32.dll" Kiejfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kibmqond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nnagdmdh.dll" Kjffngap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fdccka32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gbmigm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hfqmbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Imeeohoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ogndki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jgbccm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lgdinmod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mhknhabf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cchpke32.dll" Qnfkgfdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gkhkdjli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lckicnei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkekkccb.dll" Madbagif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncqjbaco.dll" Inecac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jijpnp32.dll" Lqjqab32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mjeaph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opagla32.dll" Oceepj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cnjbbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehfljn32.dll" Jaekkfcm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Cqkkcghn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Endnohdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dflflg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dqajjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eekcho32.dll" Jgbccm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dimciemj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Madfepmc.dll" Odgjdibf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehmemonf.dll" Mlpcagfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dnmgni32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jhndepbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mmmqbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ecccmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hmicee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebbndndm.dll" Kkomgkoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Madbagif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jpjhlche.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dlcaca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ecccmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Moaojmpa.dll" Nnojad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dmiaig32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jmnheggo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mgnldkgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lceajc32.dll" Ccendc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mqdcga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fjmkhkff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Inecac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hihbma32.dll" Npepdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jipqkopf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emjdmj32.dll" Nigjifgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oednclpf.dll" Fdccka32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qnfkgfdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hipdjfoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mhknhabf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fllkjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acamhnjh.dll" Gbofmmmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hckeikcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Moiphnde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmpmbfcd.dll" Nhijce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbikghkc.dll" Kibmqond.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhkkcfnf.dll" Lgdinmod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Npgmjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ijnqld32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 1884 4396 NEAS.d1186ab296e0ab01975c42fda6483d90.exe 83 PID 4396 wrote to memory of 1884 4396 NEAS.d1186ab296e0ab01975c42fda6483d90.exe 83 PID 4396 wrote to memory of 1884 4396 NEAS.d1186ab296e0ab01975c42fda6483d90.exe 83 PID 1884 wrote to memory of 1872 1884 Mhknhabf.exe 84 PID 1884 wrote to memory of 1872 1884 Mhknhabf.exe 84 PID 1884 wrote to memory of 1872 1884 Mhknhabf.exe 84 PID 1872 wrote to memory of 2424 1872 Madbagif.exe 85 PID 1872 wrote to memory of 2424 1872 Madbagif.exe 85 PID 1872 wrote to memory of 2424 1872 Madbagif.exe 85 PID 2424 wrote to memory of 3736 2424 Mohbjkgp.exe 86 PID 2424 wrote to memory of 3736 2424 Mohbjkgp.exe 86 PID 2424 wrote to memory of 3736 2424 Mohbjkgp.exe 86 PID 3736 wrote to memory of 1124 3736 Mebkge32.exe 87 PID 3736 wrote to memory of 1124 3736 Mebkge32.exe 87 PID 3736 wrote to memory of 1124 3736 Mebkge32.exe 87 PID 1124 wrote to memory of 4588 1124 Mhpgca32.exe 90 PID 1124 wrote to memory of 4588 1124 Mhpgca32.exe 90 PID 1124 wrote to memory of 4588 1124 Mhpgca32.exe 90 PID 4588 wrote to memory of 4416 4588 Mdghhb32.exe 92 PID 4588 wrote to memory of 4416 4588 Mdghhb32.exe 92 PID 4588 wrote to memory of 4416 4588 Mdghhb32.exe 92 PID 4416 wrote to memory of 4560 4416 Hmkeekag.exe 94 PID 4416 wrote to memory of 4560 4416 Hmkeekag.exe 94 PID 4416 wrote to memory of 4560 4416 Hmkeekag.exe 94 PID 4560 wrote to memory of 4544 4560 Odgjdibf.exe 95 PID 4560 wrote to memory of 4544 4560 Odgjdibf.exe 95 PID 4560 wrote to memory of 4544 4560 Odgjdibf.exe 95 PID 4544 wrote to memory of 4448 4544 Eipilmgh.exe 96 PID 4544 wrote to memory of 4448 4544 Eipilmgh.exe 96 PID 4544 wrote to memory of 4448 4544 Eipilmgh.exe 96 PID 4448 wrote to memory of 4352 4448 Mankaked.exe 97 PID 4448 wrote to memory of 4352 4448 Mankaked.exe 97 PID 4448 wrote to memory of 4352 4448 Mankaked.exe 97 PID 4352 wrote to memory of 4164 4352 Bndblcdq.exe 99 PID 4352 wrote to memory of 4164 4352 Bndblcdq.exe 99 PID 4352 wrote to memory of 4164 4352 Bndblcdq.exe 99 PID 4164 wrote to memory of 4456 4164 Bjhpqn32.exe 100 PID 4164 wrote to memory of 4456 4164 Bjhpqn32.exe 100 PID 4164 wrote to memory of 4456 4164 Bjhpqn32.exe 100 PID 4456 wrote to memory of 1932 4456 Cnhell32.exe 101 PID 4456 wrote to memory of 1932 4456 Cnhell32.exe 101 PID 4456 wrote to memory of 1932 4456 Cnhell32.exe 101 PID 1932 wrote to memory of 1804 1932 Ccendc32.exe 102 PID 1932 wrote to memory of 1804 1932 Ccendc32.exe 102 PID 1932 wrote to memory of 1804 1932 Ccendc32.exe 102 PID 1804 wrote to memory of 4792 1804 Cnjbbl32.exe 103 PID 1804 wrote to memory of 4792 1804 Cnjbbl32.exe 103 PID 1804 wrote to memory of 4792 1804 Cnjbbl32.exe 103 PID 4792 wrote to memory of 2952 4792 Cddjofbj.exe 104 PID 4792 wrote to memory of 2952 4792 Cddjofbj.exe 104 PID 4792 wrote to memory of 2952 4792 Cddjofbj.exe 104 PID 2952 wrote to memory of 1592 2952 Cgbfka32.exe 107 PID 2952 wrote to memory of 1592 2952 Cgbfka32.exe 107 PID 2952 wrote to memory of 1592 2952 Cgbfka32.exe 107 PID 1592 wrote to memory of 2884 1592 Cnmoglij.exe 105 PID 1592 wrote to memory of 2884 1592 Cnmoglij.exe 105 PID 1592 wrote to memory of 2884 1592 Cnmoglij.exe 105 PID 2884 wrote to memory of 3108 2884 Cqkkcghn.exe 108 PID 2884 wrote to memory of 3108 2884 Cqkkcghn.exe 108 PID 2884 wrote to memory of 3108 2884 Cqkkcghn.exe 108 PID 3108 wrote to memory of 1720 3108 Ccldebeo.exe 110 PID 3108 wrote to memory of 1720 3108 Ccldebeo.exe 110 PID 3108 wrote to memory of 1720 3108 Ccldebeo.exe 110 PID 1720 wrote to memory of 5040 1720 Cjflblll.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d1186ab296e0ab01975c42fda6483d90.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d1186ab296e0ab01975c42fda6483d90.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\Mhknhabf.exeC:\Windows\system32\Mhknhabf.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\Madbagif.exeC:\Windows\system32\Madbagif.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\Mohbjkgp.exeC:\Windows\system32\Mohbjkgp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\Mebkge32.exeC:\Windows\system32\Mebkge32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\Mhpgca32.exeC:\Windows\system32\Mhpgca32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\Mdghhb32.exeC:\Windows\system32\Mdghhb32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\Hmkeekag.exeC:\Windows\system32\Hmkeekag.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\Odgjdibf.exeC:\Windows\system32\Odgjdibf.exe9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Eipilmgh.exeC:\Windows\system32\Eipilmgh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\Mankaked.exeC:\Windows\system32\Mankaked.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\Bndblcdq.exeC:\Windows\system32\Bndblcdq.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\Bjhpqn32.exeC:\Windows\system32\Bjhpqn32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\Cnhell32.exeC:\Windows\system32\Cnhell32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\Ccendc32.exeC:\Windows\system32\Ccendc32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\Cnjbbl32.exeC:\Windows\system32\Cnjbbl32.exe16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Cddjofbj.exeC:\Windows\system32\Cddjofbj.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\Cgbfka32.exeC:\Windows\system32\Cgbfka32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\Cnmoglij.exeC:\Windows\system32\Cnmoglij.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1592
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Cqkkcghn.exeC:\Windows\system32\Cqkkcghn.exe1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\Ccldebeo.exeC:\Windows\system32\Ccldebeo.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\Cjflblll.exeC:\Windows\system32\Cjflblll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\Djhiglji.exeC:\Windows\system32\Djhiglji.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5040 -
C:\Windows\SysWOW64\Dgliapic.exeC:\Windows\system32\Dgliapic.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4260 -
C:\Windows\SysWOW64\Dmiaig32.exeC:\Windows\system32\Dmiaig32.exe6⤵
- Executes dropped EXE
- Modifies registry class
PID:940 -
C:\Windows\SysWOW64\Dgnffp32.exeC:\Windows\system32\Dgnffp32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\Dklomnmf.exeC:\Windows\system32\Dklomnmf.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1756 -
C:\Windows\SysWOW64\Dedceddg.exeC:\Windows\system32\Dedceddg.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2472 -
C:\Windows\SysWOW64\Dnmgni32.exeC:\Windows\system32\Dnmgni32.exe10⤵
- Executes dropped EXE
- Modifies registry class
PID:4084 -
C:\Windows\SysWOW64\Ecjpfp32.exeC:\Windows\system32\Ecjpfp32.exe11⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\Eanqpdgi.exeC:\Windows\system32\Eanqpdgi.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2620 -
C:\Windows\SysWOW64\Eelifc32.exeC:\Windows\system32\Eelifc32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4540 -
C:\Windows\SysWOW64\Endnohdp.exeC:\Windows\system32\Endnohdp.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4100 -
C:\Windows\SysWOW64\Ejkndijd.exeC:\Windows\system32\Ejkndijd.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\Ecccmo32.exeC:\Windows\system32\Ecccmo32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2876 -
C:\Windows\SysWOW64\Ejmkiiha.exeC:\Windows\system32\Ejmkiiha.exe17⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\Dlcaca32.exeC:\Windows\system32\Dlcaca32.exe18⤵
- Executes dropped EXE
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\Dflflg32.exeC:\Windows\system32\Dflflg32.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:468 -
C:\Windows\SysWOW64\Dqajjp32.exeC:\Windows\system32\Dqajjp32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1476 -
C:\Windows\SysWOW64\Dfnbbg32.exeC:\Windows\system32\Dfnbbg32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4252 -
C:\Windows\SysWOW64\Imbhiial.exeC:\Windows\system32\Imbhiial.exe22⤵
- Executes dropped EXE
PID:3832 -
C:\Windows\SysWOW64\Ihhmgaqb.exeC:\Windows\system32\Ihhmgaqb.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:400 -
C:\Windows\SysWOW64\Imeeohoi.exeC:\Windows\system32\Imeeohoi.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:2932 -
C:\Windows\SysWOW64\Ihkila32.exeC:\Windows\system32\Ihkila32.exe25⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Iodaikfl.exeC:\Windows\system32\Iodaikfl.exe26⤵
- Executes dropped EXE
PID:524 -
C:\Windows\SysWOW64\Jacnegep.exeC:\Windows\system32\Jacnegep.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3972 -
C:\Windows\SysWOW64\Jaekkfcm.exeC:\Windows\system32\Jaekkfcm.exe28⤵
- Executes dropped EXE
- Modifies registry class
PID:3232 -
C:\Windows\SysWOW64\Jgbccm32.exeC:\Windows\system32\Jgbccm32.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:4300 -
C:\Windows\SysWOW64\Jmlkpgia.exeC:\Windows\system32\Jmlkpgia.exe30⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\SysWOW64\Jpjhlche.exeC:\Windows\system32\Jpjhlche.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:3720 -
C:\Windows\SysWOW64\Jgdphm32.exeC:\Windows\system32\Jgdphm32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\Jmnheggo.exeC:\Windows\system32\Jmnheggo.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1112 -
C:\Windows\SysWOW64\Jalakeme.exeC:\Windows\system32\Jalakeme.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2552 -
C:\Windows\SysWOW64\Qnfkgfdp.exeC:\Windows\system32\Qnfkgfdp.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:2780 -
C:\Windows\SysWOW64\Jbqpbbfi.exeC:\Windows\system32\Jbqpbbfi.exe36⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\Nigjifgc.exeC:\Windows\system32\Nigjifgc.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3524 -
C:\Windows\SysWOW64\Ddjecalo.exeC:\Windows\system32\Ddjecalo.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\Jgonfcnb.exeC:\Windows\system32\Jgonfcnb.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4256 -
C:\Windows\SysWOW64\Olgdgibf.exeC:\Windows\system32\Olgdgibf.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\Emkeho32.exeC:\Windows\system32\Emkeho32.exe41⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\Jqdoob32.exeC:\Windows\system32\Jqdoob32.exe42⤵
- Executes dropped EXE
PID:4832 -
C:\Windows\SysWOW64\Jgngkmkf.exeC:\Windows\system32\Jgngkmkf.exe43⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\Jnhphg32.exeC:\Windows\system32\Jnhphg32.exe44⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Jqgldb32.exeC:\Windows\system32\Jqgldb32.exe45⤵
- Executes dropped EXE
PID:4152 -
C:\Windows\SysWOW64\Jhndepbi.exeC:\Windows\system32\Jhndepbi.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:228 -
C:\Windows\SysWOW64\Jklpakam.exeC:\Windows\system32\Jklpakam.exe47⤵PID:2032
-
C:\Windows\SysWOW64\Jnklnfpq.exeC:\Windows\system32\Jnklnfpq.exe48⤵
- Drops file in System32 directory
PID:2076 -
C:\Windows\SysWOW64\Jqihjbod.exeC:\Windows\system32\Jqihjbod.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2616 -
C:\Windows\SysWOW64\Jipqkopf.exeC:\Windows\system32\Jipqkopf.exe50⤵
- Modifies registry class
PID:4788 -
C:\Windows\SysWOW64\Kkomgkoj.exeC:\Windows\system32\Kkomgkoj.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3980 -
C:\Windows\SysWOW64\Knmicfnn.exeC:\Windows\system32\Knmicfnn.exe52⤵
- Drops file in System32 directory
PID:4548 -
C:\Windows\SysWOW64\Kibmqond.exeC:\Windows\system32\Kibmqond.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2452 -
C:\Windows\SysWOW64\Kkaimj32.exeC:\Windows\system32\Kkaimj32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4420 -
C:\Windows\SysWOW64\Kiejfo32.exeC:\Windows\system32\Kiejfo32.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3876 -
C:\Windows\SysWOW64\Kjffngap.exeC:\Windows\system32\Kjffngap.exe56⤵
- Modifies registry class
PID:3112 -
C:\Windows\SysWOW64\Blecdn32.exeC:\Windows\system32\Blecdn32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1672 -
C:\Windows\SysWOW64\Fllkjd32.exeC:\Windows\system32\Fllkjd32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\Fdccka32.exeC:\Windows\system32\Fdccka32.exe59⤵
- Modifies registry class
PID:4908 -
C:\Windows\SysWOW64\Fjmkhkff.exeC:\Windows\system32\Fjmkhkff.exe60⤵
- Modifies registry class
PID:2252 -
C:\Windows\SysWOW64\Gplpfb32.exeC:\Windows\system32\Gplpfb32.exe61⤵
- Drops file in System32 directory
PID:1228 -
C:\Windows\SysWOW64\Gjadck32.exeC:\Windows\system32\Gjadck32.exe62⤵
- Drops file in System32 directory
PID:1520 -
C:\Windows\SysWOW64\Gpnmka32.exeC:\Windows\system32\Gpnmka32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:860 -
C:\Windows\SysWOW64\Gbmigm32.exeC:\Windows\system32\Gbmigm32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2040 -
C:\Windows\SysWOW64\Gbofmmmj.exeC:\Windows\system32\Gbofmmmj.exe65⤵
- Modifies registry class
PID:4912 -
C:\Windows\SysWOW64\Gkfnnjnl.exeC:\Windows\system32\Gkfnnjnl.exe66⤵PID:4672
-
C:\Windows\SysWOW64\Glgjfb32.exeC:\Windows\system32\Glgjfb32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4084 -
C:\Windows\SysWOW64\Gkhkdjli.exeC:\Windows\system32\Gkhkdjli.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4100 -
C:\Windows\SysWOW64\Hgokikan.exeC:\Windows\system32\Hgokikan.exe69⤵PID:4204
-
C:\Windows\SysWOW64\Hmicee32.exeC:\Windows\system32\Hmicee32.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:4200 -
C:\Windows\SysWOW64\Hipdjfoo.exeC:\Windows\system32\Hipdjfoo.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3964 -
C:\Windows\SysWOW64\Hgdedj32.exeC:\Windows\system32\Hgdedj32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2236 -
C:\Windows\SysWOW64\Hmnmqdee.exeC:\Windows\system32\Hmnmqdee.exe73⤵
- Drops file in System32 directory
PID:4768 -
C:\Windows\SysWOW64\Hckeikcl.exeC:\Windows\system32\Hckeikcl.exe74⤵
- Drops file in System32 directory
- Modifies registry class
PID:1252 -
C:\Windows\SysWOW64\Ikfgeh32.exeC:\Windows\system32\Ikfgeh32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4164 -
C:\Windows\SysWOW64\Inecac32.exeC:\Windows\system32\Inecac32.exe76⤵
- Modifies registry class
PID:1572 -
C:\Windows\SysWOW64\Ikickgnf.exeC:\Windows\system32\Ikickgnf.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2736 -
C:\Windows\SysWOW64\Ipflcnln.exeC:\Windows\system32\Ipflcnln.exe78⤵
- Drops file in System32 directory
PID:436 -
C:\Windows\SysWOW64\Icdhojka.exeC:\Windows\system32\Icdhojka.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3624 -
C:\Windows\SysWOW64\Ijnqld32.exeC:\Windows\system32\Ijnqld32.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:2836 -
C:\Windows\SysWOW64\Iphihnjk.exeC:\Windows\system32\Iphihnjk.exe81⤵
- Drops file in System32 directory
PID:752 -
C:\Windows\SysWOW64\Igbaeh32.exeC:\Windows\system32\Igbaeh32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4804 -
C:\Windows\SysWOW64\Inlibb32.exeC:\Windows\system32\Inlibb32.exe83⤵PID:2148
-
C:\Windows\SysWOW64\Llmhkd32.exeC:\Windows\system32\Llmhkd32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2276 -
C:\Windows\SysWOW64\Lcfphn32.exeC:\Windows\system32\Lcfphn32.exe85⤵PID:3384
-
C:\Windows\SysWOW64\Lfeldj32.exeC:\Windows\system32\Lfeldj32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1544 -
C:\Windows\SysWOW64\Lqjqab32.exeC:\Windows\system32\Lqjqab32.exe87⤵
- Modifies registry class
PID:1576 -
C:\Windows\SysWOW64\Lgdinmod.exeC:\Windows\system32\Lgdinmod.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3908 -
C:\Windows\SysWOW64\Lmaafcml.exeC:\Windows\system32\Lmaafcml.exe89⤵PID:4308
-
C:\Windows\SysWOW64\Lckicnei.exeC:\Windows\system32\Lckicnei.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:472 -
C:\Windows\SysWOW64\Mjeaph32.exeC:\Windows\system32\Mjeaph32.exe91⤵
- Modifies registry class
PID:2828 -
C:\Windows\SysWOW64\Mjjkkghp.exeC:\Windows\system32\Mjjkkghp.exe92⤵
- Drops file in System32 directory
PID:2940 -
C:\Windows\SysWOW64\Mqdcga32.exeC:\Windows\system32\Mqdcga32.exe93⤵
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\Mgnldkgj.exeC:\Windows\system32\Mgnldkgj.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3960 -
C:\Windows\SysWOW64\Mnhdae32.exeC:\Windows\system32\Mnhdae32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2752 -
C:\Windows\SysWOW64\Moiphnde.exeC:\Windows\system32\Moiphnde.exe96⤵
- Drops file in System32 directory
- Modifies registry class
PID:1880 -
C:\Windows\SysWOW64\Mgphjk32.exeC:\Windows\system32\Mgphjk32.exe97⤵PID:2308
-
C:\Windows\SysWOW64\Mmmqbb32.exeC:\Windows\system32\Mmmqbb32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4428 -
C:\Windows\SysWOW64\Ngbeok32.exeC:\Windows\system32\Ngbeok32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2500 -
C:\Windows\SysWOW64\Nnmmleja.exeC:\Windows\system32\Nnmmleja.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2592 -
C:\Windows\SysWOW64\Nqkihpie.exeC:\Windows\system32\Nqkihpie.exe101⤵PID:1124
-
C:\Windows\SysWOW64\Ngeaej32.exeC:\Windows\system32\Ngeaej32.exe102⤵
- Drops file in System32 directory
PID:1176 -
C:\Windows\SysWOW64\Nnojad32.exeC:\Windows\system32\Nnojad32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2832 -
C:\Windows\SysWOW64\Nqmfnp32.exeC:\Windows\system32\Nqmfnp32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3848 -
C:\Windows\SysWOW64\Nggnjjoo.exeC:\Windows\system32\Nggnjjoo.exe105⤵PID:4448
-
C:\Windows\SysWOW64\Nqpccp32.exeC:\Windows\system32\Nqpccp32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1756 -
C:\Windows\SysWOW64\Nnccmddi.exeC:\Windows\system32\Nnccmddi.exe107⤵
- Drops file in System32 directory
PID:5144 -
C:\Windows\SysWOW64\Npepdl32.exeC:\Windows\system32\Npepdl32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5192 -
C:\Windows\SysWOW64\Nnfpbcbf.exeC:\Windows\system32\Nnfpbcbf.exe109⤵PID:5236
-
C:\Windows\SysWOW64\Npgmjl32.exeC:\Windows\system32\Npgmjl32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5280 -
C:\Windows\SysWOW64\Ogndki32.exeC:\Windows\system32\Ogndki32.exe111⤵
- Modifies registry class
PID:5324 -
C:\Windows\SysWOW64\Onhmhc32.exeC:\Windows\system32\Onhmhc32.exe112⤵PID:5368
-
C:\Windows\SysWOW64\Oceepj32.exeC:\Windows\system32\Oceepj32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5528 -
C:\Windows\SysWOW64\Ilibmcln.exeC:\Windows\system32\Ilibmcln.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5776 -
C:\Windows\SysWOW64\Mckbhg32.exeC:\Windows\system32\Mckbhg32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5832 -
C:\Windows\SysWOW64\Obnebp32.exeC:\Windows\system32\Obnebp32.exe116⤵PID:5904
-
C:\Windows\SysWOW64\Cmnncb32.exeC:\Windows\system32\Cmnncb32.exe117⤵PID:5976
-
C:\Windows\SysWOW64\Fkempa32.exeC:\Windows\system32\Fkempa32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2856 -
C:\Windows\SysWOW64\Mlpcagfd.exeC:\Windows\system32\Mlpcagfd.exe119⤵
- Drops file in System32 directory
- Modifies registry class
PID:5520 -
C:\Windows\SysWOW64\Nhijce32.exeC:\Windows\system32\Nhijce32.exe120⤵
- Modifies registry class
PID:4528 -
C:\Windows\SysWOW64\Hfqmbf32.exeC:\Windows\system32\Hfqmbf32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5584 -
C:\Windows\SysWOW64\Ldanedho.exeC:\Windows\system32\Ldanedho.exe122⤵
- Drops file in System32 directory
PID:4316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-