Analysis
-
max time kernel
193s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 14:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.f6418eb915d48bc950093a717f2da550.exe
Resource
win7-20231023-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.f6418eb915d48bc950093a717f2da550.exe
Resource
win10v2004-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.f6418eb915d48bc950093a717f2da550.exe
-
Size
55KB
-
MD5
f6418eb915d48bc950093a717f2da550
-
SHA1
5c966df9aa0a55d7e610df4b03fd5a388b88e602
-
SHA256
31585c7a103e7663e6de46328daa1862c8f67fcafb84d2424385bd7afd48ebe4
-
SHA512
3d83d270abbc2814bb757f1ac1ede038e4dc25c579508ef8498611ac6c41d85f33dfdbce71c1694ca8217e6227fdb50579def38c484cac87dd351e38849b3e57
-
SSDEEP
768:2JZgWcgx/OK1lzqS4u1zCIzy2jlo9vBl9Ey66s7d4/eLMs/1H54Xdnhg:M6gUK7qSdzCIGYloZBl9E9L7+e7k
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phneqf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opgciodi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfdlif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhglhi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afgame32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boabkj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flbhia32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cllkcbnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjlpcbqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjpkjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Liqibm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkjegb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppccemjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppepkmhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doidql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnpopcni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aomipkic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ackbfioj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgnolj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjpbkc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlooef32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ackbfioj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajjjjghg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Micheb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnpopcni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Poggnnkk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhglhi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbbhjc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljmmnf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbgjlq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjhihm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofalfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifefbbdj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Miofcked.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anjikoip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajdjcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfkkhdlk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajjjjghg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjpllgme.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Legjgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbpdkabl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pllggbje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pilgnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcdlghgl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbbaaapj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afgame32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mokdllim.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnolojhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Homcbo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bocjdiol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbbhjc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecgone32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnmcop32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdpmkhjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peaokh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pojccmii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjicnbba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jaljbmkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Imcqacfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Micheb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doidql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbgaecjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlflog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icklhnop.exe -
Executes dropped EXE 64 IoCs
pid Process 840 Jaljbmkd.exe 4184 Nooikj32.exe 1616 Bldgoeog.exe 3960 Gjebiq32.exe 4788 Odkcpi32.exe 1944 Poagma32.exe 684 Pdnpeh32.exe 1984 Pocdba32.exe 1208 Pdpmkhjl.exe 2724 Pkjegb32.exe 1612 Pbdmdlie.exe 528 Phneqf32.exe 4776 Pfbfjk32.exe 2984 Hjpkjh32.exe 4936 Homcbo32.exe 4648 Hhehkepj.exe 868 Icklhnop.exe 4908 Imcqacfq.exe 4560 Ajjjjghg.exe 3456 Flbhia32.exe 4352 Kokbpe32.exe 4980 Opgciodi.exe 2996 Ofalfi32.exe 440 Ppccemjk.exe 948 Pcaoahio.exe 4832 Pilgnb32.exe 4860 Ppepkmhi.exe 5020 Pcdlghgl.exe 3080 Pindcboi.exe 4076 Pphlpl32.exe 4340 Pgbdmfnc.exe 2176 Apfhajjf.exe 3984 Acdeneij.exe 1216 Anjikoip.exe 1296 Mokdllim.exe 3748 Mfdlif32.exe 4724 Micheb32.exe 3972 Momqblgj.exe 4380 Mejijcea.exe 2480 Moomgl32.exe 808 Mihbpalh.exe 3596 Cpfkna32.exe 4468 Cgpcklpd.exe 1444 Cllkcbnl.exe 4696 Cjpllgme.exe 4876 Ccipelcf.exe 3560 Cjbhbf32.exe 1168 Copajm32.exe 1496 Cggikk32.exe 4068 Dqomdppm.exe 4528 Dgnolj32.exe 4788 Doidql32.exe 2648 Bocjdiol.exe 1636 Caagpdop.exe 4252 Clgkmm32.exe 4188 Jbkjcgaj.exe 384 Nnolojhk.exe 2032 Bhdbaihi.exe 3804 Ifefbbdj.exe 1800 Onekeb32.exe 4344 Hhglhi32.exe 4456 Hgjldfqj.exe 440 Hoadecal.exe 2532 Hbppaopp.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Agjhcp32.dll Kokbpe32.exe File created C:\Windows\SysWOW64\Gbmhkn32.dll Doidql32.exe File created C:\Windows\SysWOW64\Mijlhl32.exe Mbpdkabl.exe File created C:\Windows\SysWOW64\Mofbki32.dll Ecgone32.exe File opened for modification C:\Windows\SysWOW64\Linmlm32.exe Lbddpclj.exe File created C:\Windows\SysWOW64\Jfigdl32.dll Ackbfioj.exe File opened for modification C:\Windows\SysWOW64\Blhpjnbe.exe Bjicnbba.exe File created C:\Windows\SysWOW64\Nbpiochc.dll Bjlpcbqo.exe File created C:\Windows\SysWOW64\Mbgjlq32.exe Mjpbkc32.exe File opened for modification C:\Windows\SysWOW64\Nblcgpho.exe Nlbkjf32.exe File created C:\Windows\SysWOW64\Poggnnkk.exe Nblcgpho.exe File opened for modification C:\Windows\SysWOW64\Bjlpcbqo.exe Bbdhbepl.exe File created C:\Windows\SysWOW64\Hhehkepj.exe Homcbo32.exe File created C:\Windows\SysWOW64\Oflfda32.dll Ofalfi32.exe File created C:\Windows\SysWOW64\Hkfjagad.dll Lbinkb32.exe File created C:\Windows\SysWOW64\Pocdba32.exe Pdnpeh32.exe File created C:\Windows\SysWOW64\Opgciodi.exe Kokbpe32.exe File created C:\Windows\SysWOW64\Ddhefceh.dll Mihbpalh.exe File created C:\Windows\SysWOW64\Afgame32.exe Aomipkic.exe File created C:\Windows\SysWOW64\Imcqacfq.exe Icklhnop.exe File opened for modification C:\Windows\SysWOW64\Cgpcklpd.exe Cpfkna32.exe File opened for modification C:\Windows\SysWOW64\Pakleh32.exe Polpim32.exe File opened for modification C:\Windows\SysWOW64\Miofcked.exe Mbenfq32.exe File created C:\Windows\SysWOW64\Njghcg32.dll Miabik32.exe File opened for modification C:\Windows\SysWOW64\Fiilladj.exe Fcodog32.exe File created C:\Windows\SysWOW64\Knkkoggp.dll Bldgoeog.exe File created C:\Windows\SysWOW64\Ifefbbdj.exe Bhdbaihi.exe File opened for modification C:\Windows\SysWOW64\Kilpgnfi.exe Kbbhjc32.exe File created C:\Windows\SysWOW64\Idfkmkhe.dll Linmlm32.exe File opened for modification C:\Windows\SysWOW64\Phneqf32.exe Pbdmdlie.exe File created C:\Windows\SysWOW64\Aomipkic.exe Akamol32.exe File opened for modification C:\Windows\SysWOW64\Hhehkepj.exe Homcbo32.exe File created C:\Windows\SysWOW64\Bdekleaj.dll Bocoqj32.exe File created C:\Windows\SysWOW64\Gifcfc32.dll Bkmmkj32.exe File opened for modification C:\Windows\SysWOW64\Bnmcop32.exe Nhbcbfak.exe File opened for modification C:\Windows\SysWOW64\Ppepkmhi.exe Pilgnb32.exe File opened for modification C:\Windows\SysWOW64\Cjpllgme.exe Cllkcbnl.exe File opened for modification C:\Windows\SysWOW64\Mbigapjb.exe Mlooef32.exe File opened for modification C:\Windows\SysWOW64\Pjhihm32.exe Kchmljab.exe File opened for modification C:\Windows\SysWOW64\Bfkkhdlk.exe Boabkj32.exe File created C:\Windows\SysWOW64\Ecgone32.exe Pjhihm32.exe File opened for modification C:\Windows\SysWOW64\Pkjegb32.exe Pdpmkhjl.exe File created C:\Windows\SysWOW64\Faecedlb.dll Hjpkjh32.exe File created C:\Windows\SysWOW64\Dehbljnp.dll Meqmmm32.exe File opened for modification C:\Windows\SysWOW64\Ackbfioj.exe Akcjel32.exe File opened for modification C:\Windows\SysWOW64\Acdeneij.exe Apfhajjf.exe File created C:\Windows\SysWOW64\Niehnccd.dll Hhglhi32.exe File created C:\Windows\SysWOW64\Blqhlo32.dll Plpqba32.exe File created C:\Windows\SysWOW64\Pmfnamhl.dll Bnmcop32.exe File opened for modification C:\Windows\SysWOW64\Ifefbbdj.exe Bhdbaihi.exe File created C:\Windows\SysWOW64\Hiimpa32.dll Cllkcbnl.exe File opened for modification C:\Windows\SysWOW64\Mjkipdpg.exe Mijlhl32.exe File created C:\Windows\SysWOW64\Egflpjbk.dll Mijlhl32.exe File created C:\Windows\SysWOW64\Plcndmki.dll Glghhmdn.exe File opened for modification C:\Windows\SysWOW64\Kbbhjc32.exe Hbppaopp.exe File opened for modification C:\Windows\SysWOW64\Legjgn32.exe Lbinkb32.exe File opened for modification C:\Windows\SysWOW64\Mbpdkabl.exe Mlflog32.exe File created C:\Windows\SysWOW64\Kchmljab.exe Bjnmib32.exe File created C:\Windows\SysWOW64\Kihnhc32.dll Icklhnop.exe File opened for modification C:\Windows\SysWOW64\Ofalfi32.exe Opgciodi.exe File created C:\Windows\SysWOW64\Mfdlif32.exe Mokdllim.exe File opened for modification C:\Windows\SysWOW64\Bocjdiol.exe Doidql32.exe File opened for modification C:\Windows\SysWOW64\Glghhmdn.exe Fiilladj.exe File opened for modification C:\Windows\SysWOW64\Mbenfq32.exe Mlkejgfj.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Niconj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Polpim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pocdba32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgnolj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mijlhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mbigapjb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fplnhmbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Anjikoip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Onekeb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbbaaapj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajdjcc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cllkcbnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flbhia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oflfda32.dll" Ofalfi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dqomdppm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clgkmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhglhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjpkjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecgidn32.dll" Cpfkna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlooef32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahbacq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akcjel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bfkkhdlk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkmmkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pakleh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Plpqba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kokbpe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Miabik32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnmcop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mpcjce32.dll" Gcaqeg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdpmkhjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdpmkhjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfipfo32.dll" Ppccemjk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mihbpalh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Micheb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbbhjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kilpgnfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Legjgn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjpbkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bjnmib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mofbki32.dll" Ecgone32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbdgkjib.dll" Pocdba32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcdlghgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mokdllim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjbhbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbecgn32.dll" Dgnolj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmelgi32.dll" Alcfoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Opgciodi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjlpcbqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lchood32.dll" Copajm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fiilladj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pakfglam.dll" NEAS.f6418eb915d48bc950093a717f2da550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eipbcl32.dll" Odkcpi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Moomgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjpllgme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbgaecjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjpbkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icldmjph.dll" Nooikj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfbfjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlondh32.dll" Caagpdop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jfnfmmnc.dll" Pilgnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ljbfiegb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcejlj32.dll" Hbppaopp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fibhja32.dll" Ljpideje.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 840 2124 NEAS.f6418eb915d48bc950093a717f2da550.exe 89 PID 2124 wrote to memory of 840 2124 NEAS.f6418eb915d48bc950093a717f2da550.exe 89 PID 2124 wrote to memory of 840 2124 NEAS.f6418eb915d48bc950093a717f2da550.exe 89 PID 840 wrote to memory of 4184 840 Jaljbmkd.exe 90 PID 840 wrote to memory of 4184 840 Jaljbmkd.exe 90 PID 840 wrote to memory of 4184 840 Jaljbmkd.exe 90 PID 4184 wrote to memory of 1616 4184 Nooikj32.exe 91 PID 4184 wrote to memory of 1616 4184 Nooikj32.exe 91 PID 4184 wrote to memory of 1616 4184 Nooikj32.exe 91 PID 1616 wrote to memory of 3960 1616 Bldgoeog.exe 92 PID 1616 wrote to memory of 3960 1616 Bldgoeog.exe 92 PID 1616 wrote to memory of 3960 1616 Bldgoeog.exe 92 PID 3960 wrote to memory of 4788 3960 Gjebiq32.exe 93 PID 3960 wrote to memory of 4788 3960 Gjebiq32.exe 93 PID 3960 wrote to memory of 4788 3960 Gjebiq32.exe 93 PID 4788 wrote to memory of 1944 4788 Odkcpi32.exe 94 PID 4788 wrote to memory of 1944 4788 Odkcpi32.exe 94 PID 4788 wrote to memory of 1944 4788 Odkcpi32.exe 94 PID 1944 wrote to memory of 684 1944 Poagma32.exe 95 PID 1944 wrote to memory of 684 1944 Poagma32.exe 95 PID 1944 wrote to memory of 684 1944 Poagma32.exe 95 PID 684 wrote to memory of 1984 684 Pdnpeh32.exe 96 PID 684 wrote to memory of 1984 684 Pdnpeh32.exe 96 PID 684 wrote to memory of 1984 684 Pdnpeh32.exe 96 PID 1984 wrote to memory of 1208 1984 Pocdba32.exe 97 PID 1984 wrote to memory of 1208 1984 Pocdba32.exe 97 PID 1984 wrote to memory of 1208 1984 Pocdba32.exe 97 PID 1208 wrote to memory of 2724 1208 Pdpmkhjl.exe 98 PID 1208 wrote to memory of 2724 1208 Pdpmkhjl.exe 98 PID 1208 wrote to memory of 2724 1208 Pdpmkhjl.exe 98 PID 2724 wrote to memory of 1612 2724 Pkjegb32.exe 100 PID 2724 wrote to memory of 1612 2724 Pkjegb32.exe 100 PID 2724 wrote to memory of 1612 2724 Pkjegb32.exe 100 PID 1612 wrote to memory of 528 1612 Pbdmdlie.exe 101 PID 1612 wrote to memory of 528 1612 Pbdmdlie.exe 101 PID 1612 wrote to memory of 528 1612 Pbdmdlie.exe 101 PID 528 wrote to memory of 4776 528 Phneqf32.exe 102 PID 528 wrote to memory of 4776 528 Phneqf32.exe 102 PID 528 wrote to memory of 4776 528 Phneqf32.exe 102 PID 4776 wrote to memory of 2984 4776 Pfbfjk32.exe 103 PID 4776 wrote to memory of 2984 4776 Pfbfjk32.exe 103 PID 4776 wrote to memory of 2984 4776 Pfbfjk32.exe 103 PID 2984 wrote to memory of 4936 2984 Hjpkjh32.exe 104 PID 2984 wrote to memory of 4936 2984 Hjpkjh32.exe 104 PID 2984 wrote to memory of 4936 2984 Hjpkjh32.exe 104 PID 4936 wrote to memory of 4648 4936 Homcbo32.exe 105 PID 4936 wrote to memory of 4648 4936 Homcbo32.exe 105 PID 4936 wrote to memory of 4648 4936 Homcbo32.exe 105 PID 4648 wrote to memory of 868 4648 Hhehkepj.exe 106 PID 4648 wrote to memory of 868 4648 Hhehkepj.exe 106 PID 4648 wrote to memory of 868 4648 Hhehkepj.exe 106 PID 868 wrote to memory of 4908 868 Icklhnop.exe 107 PID 868 wrote to memory of 4908 868 Icklhnop.exe 107 PID 868 wrote to memory of 4908 868 Icklhnop.exe 107 PID 4908 wrote to memory of 4560 4908 Imcqacfq.exe 108 PID 4908 wrote to memory of 4560 4908 Imcqacfq.exe 108 PID 4908 wrote to memory of 4560 4908 Imcqacfq.exe 108 PID 4560 wrote to memory of 3456 4560 Ajjjjghg.exe 109 PID 4560 wrote to memory of 3456 4560 Ajjjjghg.exe 109 PID 4560 wrote to memory of 3456 4560 Ajjjjghg.exe 109 PID 3456 wrote to memory of 4352 3456 Flbhia32.exe 110 PID 3456 wrote to memory of 4352 3456 Flbhia32.exe 110 PID 3456 wrote to memory of 4352 3456 Flbhia32.exe 110 PID 4352 wrote to memory of 4980 4352 Kokbpe32.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f6418eb915d48bc950093a717f2da550.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f6418eb915d48bc950093a717f2da550.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\Jaljbmkd.exeC:\Windows\system32\Jaljbmkd.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\Nooikj32.exeC:\Windows\system32\Nooikj32.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Bldgoeog.exeC:\Windows\system32\Bldgoeog.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\Gjebiq32.exeC:\Windows\system32\Gjebiq32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\Odkcpi32.exeC:\Windows\system32\Odkcpi32.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Poagma32.exeC:\Windows\system32\Poagma32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\Pdnpeh32.exeC:\Windows\system32\Pdnpeh32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\Pocdba32.exeC:\Windows\system32\Pocdba32.exe9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\Pdpmkhjl.exeC:\Windows\system32\Pdpmkhjl.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\Pkjegb32.exeC:\Windows\system32\Pkjegb32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\Pbdmdlie.exeC:\Windows\system32\Pbdmdlie.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\Phneqf32.exeC:\Windows\system32\Phneqf32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\Pfbfjk32.exeC:\Windows\system32\Pfbfjk32.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\Hjpkjh32.exeC:\Windows\system32\Hjpkjh32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\Homcbo32.exeC:\Windows\system32\Homcbo32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\Hhehkepj.exeC:\Windows\system32\Hhehkepj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\Icklhnop.exeC:\Windows\system32\Icklhnop.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\Imcqacfq.exeC:\Windows\system32\Imcqacfq.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\Ajjjjghg.exeC:\Windows\system32\Ajjjjghg.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Flbhia32.exeC:\Windows\system32\Flbhia32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\Kokbpe32.exeC:\Windows\system32\Kokbpe32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\Opgciodi.exeC:\Windows\system32\Opgciodi.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4980 -
C:\Windows\SysWOW64\Ofalfi32.exeC:\Windows\system32\Ofalfi32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2996 -
C:\Windows\SysWOW64\Ppccemjk.exeC:\Windows\system32\Ppccemjk.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:440 -
C:\Windows\SysWOW64\Pcaoahio.exeC:\Windows\system32\Pcaoahio.exe26⤵
- Executes dropped EXE
PID:948 -
C:\Windows\SysWOW64\Pilgnb32.exeC:\Windows\system32\Pilgnb32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4832 -
C:\Windows\SysWOW64\Ppepkmhi.exeC:\Windows\system32\Ppepkmhi.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4860 -
C:\Windows\SysWOW64\Pcdlghgl.exeC:\Windows\system32\Pcdlghgl.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:5020 -
C:\Windows\SysWOW64\Pindcboi.exeC:\Windows\system32\Pindcboi.exe30⤵
- Executes dropped EXE
PID:3080 -
C:\Windows\SysWOW64\Pphlpl32.exeC:\Windows\system32\Pphlpl32.exe31⤵
- Executes dropped EXE
PID:4076 -
C:\Windows\SysWOW64\Pgbdmfnc.exeC:\Windows\system32\Pgbdmfnc.exe32⤵
- Executes dropped EXE
PID:4340 -
C:\Windows\SysWOW64\Apfhajjf.exeC:\Windows\system32\Apfhajjf.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\Acdeneij.exeC:\Windows\system32\Acdeneij.exe34⤵
- Executes dropped EXE
PID:3984 -
C:\Windows\SysWOW64\Anjikoip.exeC:\Windows\system32\Anjikoip.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1216 -
C:\Windows\SysWOW64\Mokdllim.exeC:\Windows\system32\Mokdllim.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1296 -
C:\Windows\SysWOW64\Mfdlif32.exeC:\Windows\system32\Mfdlif32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\Micheb32.exeC:\Windows\system32\Micheb32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4724 -
C:\Windows\SysWOW64\Momqblgj.exeC:\Windows\system32\Momqblgj.exe39⤵
- Executes dropped EXE
PID:3972 -
C:\Windows\SysWOW64\Mejijcea.exeC:\Windows\system32\Mejijcea.exe40⤵
- Executes dropped EXE
PID:4380 -
C:\Windows\SysWOW64\Moomgl32.exeC:\Windows\system32\Moomgl32.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Mihbpalh.exeC:\Windows\system32\Mihbpalh.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:808 -
C:\Windows\SysWOW64\Cpfkna32.exeC:\Windows\system32\Cpfkna32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3596 -
C:\Windows\SysWOW64\Cgpcklpd.exeC:\Windows\system32\Cgpcklpd.exe44⤵
- Executes dropped EXE
PID:4468 -
C:\Windows\SysWOW64\Cllkcbnl.exeC:\Windows\system32\Cllkcbnl.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1444 -
C:\Windows\SysWOW64\Cjpllgme.exeC:\Windows\system32\Cjpllgme.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4696 -
C:\Windows\SysWOW64\Ccipelcf.exeC:\Windows\system32\Ccipelcf.exe47⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\SysWOW64\Cjbhbf32.exeC:\Windows\system32\Cjbhbf32.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:3560 -
C:\Windows\SysWOW64\Copajm32.exeC:\Windows\system32\Copajm32.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:1168 -
C:\Windows\SysWOW64\Cggikk32.exeC:\Windows\system32\Cggikk32.exe50⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\SysWOW64\Dqomdppm.exeC:\Windows\system32\Dqomdppm.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:4068 -
C:\Windows\SysWOW64\Dgnolj32.exeC:\Windows\system32\Dgnolj32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4528 -
C:\Windows\SysWOW64\Doidql32.exeC:\Windows\system32\Doidql32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4788 -
C:\Windows\SysWOW64\Bocjdiol.exeC:\Windows\system32\Bocjdiol.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\Caagpdop.exeC:\Windows\system32\Caagpdop.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\Clgkmm32.exeC:\Windows\system32\Clgkmm32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:4252 -
C:\Windows\SysWOW64\Jbkjcgaj.exeC:\Windows\system32\Jbkjcgaj.exe57⤵
- Executes dropped EXE
PID:4188 -
C:\Windows\SysWOW64\Nnolojhk.exeC:\Windows\system32\Nnolojhk.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:384 -
C:\Windows\SysWOW64\Bhdbaihi.exeC:\Windows\system32\Bhdbaihi.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2032 -
C:\Windows\SysWOW64\Ifefbbdj.exeC:\Windows\system32\Ifefbbdj.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3804 -
C:\Windows\SysWOW64\Onekeb32.exeC:\Windows\system32\Onekeb32.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\Hhglhi32.exeC:\Windows\system32\Hhglhi32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4344 -
C:\Windows\SysWOW64\Hgjldfqj.exeC:\Windows\system32\Hgjldfqj.exe63⤵
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\Hoadecal.exeC:\Windows\system32\Hoadecal.exe64⤵
- Executes dropped EXE
PID:440 -
C:\Windows\SysWOW64\Hbppaopp.exeC:\Windows\system32\Hbppaopp.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\Kbbhjc32.exeC:\Windows\system32\Kbbhjc32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1368 -
C:\Windows\SysWOW64\Kilpgnfi.exeC:\Windows\system32\Kilpgnfi.exe67⤵
- Modifies registry class
PID:3196 -
C:\Windows\SysWOW64\Ljmmnf32.exeC:\Windows\system32\Ljmmnf32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3540 -
C:\Windows\SysWOW64\Lbddpclj.exeC:\Windows\system32\Lbddpclj.exe69⤵
- Drops file in System32 directory
PID:3748 -
C:\Windows\SysWOW64\Linmlm32.exeC:\Windows\system32\Linmlm32.exe70⤵
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\Ljpideje.exeC:\Windows\system32\Ljpideje.exe71⤵
- Modifies registry class
PID:3608 -
C:\Windows\SysWOW64\Lbgaecjg.exeC:\Windows\system32\Lbgaecjg.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\Liqibm32.exeC:\Windows\system32\Liqibm32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2284 -
C:\Windows\SysWOW64\Ljbfiegb.exeC:\Windows\system32\Ljbfiegb.exe74⤵
- Modifies registry class
PID:3864 -
C:\Windows\SysWOW64\Lbinkb32.exeC:\Windows\system32\Lbinkb32.exe75⤵
- Drops file in System32 directory
PID:1032 -
C:\Windows\SysWOW64\Legjgn32.exeC:\Windows\system32\Legjgn32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1484 -
C:\Windows\SysWOW64\Lnpopcni.exeC:\Windows\system32\Lnpopcni.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:840 -
C:\Windows\SysWOW64\Mlflog32.exeC:\Windows\system32\Mlflog32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3560 -
C:\Windows\SysWOW64\Mbpdkabl.exeC:\Windows\system32\Mbpdkabl.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4072 -
C:\Windows\SysWOW64\Mijlhl32.exeC:\Windows\system32\Mijlhl32.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\Mjkipdpg.exeC:\Windows\system32\Mjkipdpg.exe81⤵PID:3096
-
C:\Windows\SysWOW64\Mbbaaapj.exeC:\Windows\system32\Mbbaaapj.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3456 -
C:\Windows\SysWOW64\Meqmmm32.exeC:\Windows\system32\Meqmmm32.exe83⤵
- Drops file in System32 directory
PID:1788 -
C:\Windows\SysWOW64\Mlkejgfj.exeC:\Windows\system32\Mlkejgfj.exe84⤵
- Drops file in System32 directory
PID:4828 -
C:\Windows\SysWOW64\Mbenfq32.exeC:\Windows\system32\Mbenfq32.exe85⤵
- Drops file in System32 directory
PID:1524 -
C:\Windows\SysWOW64\Miofcked.exeC:\Windows\system32\Miofcked.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1700 -
C:\Windows\SysWOW64\Mjpbkc32.exeC:\Windows\system32\Mjpbkc32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:472 -
C:\Windows\SysWOW64\Mbgjlq32.exeC:\Windows\system32\Mbgjlq32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1416 -
C:\Windows\SysWOW64\Miabik32.exeC:\Windows\system32\Miabik32.exe89⤵
- Drops file in System32 directory
- Modifies registry class
PID:2176 -
C:\Windows\SysWOW64\Mlooef32.exeC:\Windows\system32\Mlooef32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:700 -
C:\Windows\SysWOW64\Mbigapjb.exeC:\Windows\system32\Mbigapjb.exe91⤵
- Modifies registry class
PID:2224 -
C:\Windows\SysWOW64\Niconj32.exeC:\Windows\system32\Niconj32.exe92⤵
- Modifies registry class
PID:408 -
C:\Windows\SysWOW64\Nlbkjf32.exeC:\Windows\system32\Nlbkjf32.exe93⤵
- Drops file in System32 directory
PID:4440 -
C:\Windows\SysWOW64\Nblcgpho.exeC:\Windows\system32\Nblcgpho.exe94⤵
- Drops file in System32 directory
PID:4972 -
C:\Windows\SysWOW64\Poggnnkk.exeC:\Windows\system32\Poggnnkk.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3100 -
C:\Windows\SysWOW64\Peaokh32.exeC:\Windows\system32\Peaokh32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4184 -
C:\Windows\SysWOW64\Pllggbje.exeC:\Windows\system32\Pllggbje.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2940 -
C:\Windows\SysWOW64\Pojccmii.exeC:\Windows\system32\Pojccmii.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3020 -
C:\Windows\SysWOW64\Pedlpgqe.exeC:\Windows\system32\Pedlpgqe.exe99⤵PID:1224
-
C:\Windows\SysWOW64\Phbhlcpi.exeC:\Windows\system32\Phbhlcpi.exe100⤵PID:3552
-
C:\Windows\SysWOW64\Polpim32.exeC:\Windows\system32\Polpim32.exe101⤵
- Drops file in System32 directory
- Modifies registry class
PID:3340 -
C:\Windows\SysWOW64\Pakleh32.exeC:\Windows\system32\Pakleh32.exe102⤵
- Modifies registry class
PID:4316 -
C:\Windows\SysWOW64\Pibdff32.exeC:\Windows\system32\Pibdff32.exe103⤵PID:4312
-
C:\Windows\SysWOW64\Plpqba32.exeC:\Windows\system32\Plpqba32.exe104⤵
- Drops file in System32 directory
- Modifies registry class
PID:3596 -
C:\Windows\SysWOW64\Ahbacq32.exeC:\Windows\system32\Ahbacq32.exe105⤵
- Modifies registry class
PID:1108 -
C:\Windows\SysWOW64\Akamol32.exeC:\Windows\system32\Akamol32.exe106⤵
- Drops file in System32 directory
PID:3512 -
C:\Windows\SysWOW64\Aomipkic.exeC:\Windows\system32\Aomipkic.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:812 -
C:\Windows\SysWOW64\Afgame32.exeC:\Windows\system32\Afgame32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3640 -
C:\Windows\SysWOW64\Akcjel32.exeC:\Windows\system32\Akcjel32.exe109⤵
- Drops file in System32 directory
- Modifies registry class
PID:1256 -
C:\Windows\SysWOW64\Ackbfioj.exeC:\Windows\system32\Ackbfioj.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2008 -
C:\Windows\SysWOW64\Ajdjcc32.exeC:\Windows\system32\Ajdjcc32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3580 -
C:\Windows\SysWOW64\Alcfoo32.exeC:\Windows\system32\Alcfoo32.exe112⤵
- Modifies registry class
PID:2356 -
C:\Windows\SysWOW64\Boabkj32.exeC:\Windows\system32\Boabkj32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4424 -
C:\Windows\SysWOW64\Bfkkhdlk.exeC:\Windows\system32\Bfkkhdlk.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3472 -
C:\Windows\SysWOW64\Bhjgdplo.exeC:\Windows\system32\Bhjgdplo.exe115⤵PID:2812
-
C:\Windows\SysWOW64\Bocoqj32.exeC:\Windows\system32\Bocoqj32.exe116⤵
- Drops file in System32 directory
PID:4432 -
C:\Windows\SysWOW64\Bjicnbba.exeC:\Windows\system32\Bjicnbba.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2536 -
C:\Windows\SysWOW64\Blhpjnbe.exeC:\Windows\system32\Blhpjnbe.exe118⤵PID:4408
-
C:\Windows\SysWOW64\Boflfiai.exeC:\Windows\system32\Boflfiai.exe119⤵PID:4552
-
C:\Windows\SysWOW64\Bbdhbepl.exeC:\Windows\system32\Bbdhbepl.exe120⤵
- Drops file in System32 directory
PID:4332 -
C:\Windows\SysWOW64\Bjlpcbqo.exeC:\Windows\system32\Bjlpcbqo.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5128 -
C:\Windows\SysWOW64\Bkmmkj32.exeC:\Windows\system32\Bkmmkj32.exe122⤵
- Drops file in System32 directory
- Modifies registry class
PID:5172
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-