Analysis
-
max time kernel
170s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 01:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.a648fc8120d844ae3f1e2f6ca0cd6340_JC.exe
Resource
win7-20231020-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.a648fc8120d844ae3f1e2f6ca0cd6340_JC.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NEAS.a648fc8120d844ae3f1e2f6ca0cd6340_JC.exe
-
Size
52KB
-
MD5
a648fc8120d844ae3f1e2f6ca0cd6340
-
SHA1
6dc60e0cba30da751dfca585442d15cbe24dc72b
-
SHA256
9a5faec2edb67b7fb58890d8c157b4b89c83fd548cbd0c1e6c23b27071e9a57a
-
SHA512
d8f186365f3a565d9172a937d032a64d9cd6d18b2444b78c60b9d30138768a58f2efa94e75cfb84ff76bd179b4341bd12c3093871a150cb61a68662d579d6c83
-
SSDEEP
768:3t/M5TQKpPrwpJHjeYdbtb3B1N7Y/yumYP1zgxFyF4/1H5F/snSMABvKWe:3UwpJHjBRtSaCcjMAdKZ
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amhdfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghpebngp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhdfgo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bqkiqe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifhibhfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjkhme32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdkadb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Napjnfik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkndbkop.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcgoha32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkqepi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcoeiqil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khfdedfp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eehnifoi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jqhpafll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahddqell.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Falceoda.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnmgea32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fofiff32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjmomkll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmmjkngo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eflhiolf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhegjdag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fohobmke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jaodkk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdpaai32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffqhmf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbeild32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abngngjd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kaiocjae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fahjjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mojmbf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnjmoqmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hndbbkhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aflpde32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnmcop32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgalelin.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlkldmjf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qifiph32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Keabkkdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clnjoilj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ongijo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oddmhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fplnhmbo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkndbkop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dlijjgbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpcdil32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilnlhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Capbaacl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajeahm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iifodmak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbbhla32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clpgdijg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjhgdj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmgkja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdkadb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fldeie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dqmjqb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhnhplpg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abngngjd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjlaho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Napjnfik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilnlhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfmabqce.exe -
Executes dropped EXE 64 IoCs
pid Process 408 Lkkekdhe.exe 1512 Qlajkm32.exe 3828 Cjabgm32.exe 672 Enaaiifb.exe 1920 Fmejlcoj.exe 3948 Hopfadlp.exe 3952 Ioqohb32.exe 4700 Jdgjgh32.exe 3748 Jaodkk32.exe 908 Knkokl32.exe 1476 Lhjeoc32.exe 1116 Lnfngj32.exe 4800 Mokdllim.exe 4488 Mndjhhjp.exe 3332 Nicalpak.exe 2204 Oijgmokc.exe 1120 Pbjbfclk.exe 4444 Pldcdhpi.exe 2088 Aekdolkj.exe 4032 Bpjkbcbe.exe 1908 Blchmdff.exe 4892 Dmmdjp32.exe 1152 Eodclj32.exe 1272 Ejjgic32.exe 2552 Fnacfp32.exe 3964 Hhegjdag.exe 4832 Imnoni32.exe 2720 Iaqapggb.exe 4768 Jhocgqjj.exe 4804 Jkbhok32.exe 4324 Jalakeme.exe 3192 Khmoionj.exe 1276 Kkqepi32.exe 4948 Laacmbkm.exe 712 Lhnhplpg.exe 3668 Mojmbf32.exe 4520 Mqnfon32.exe 4088 Ongijo32.exe 4396 Paqebike.exe 2380 Pijiif32.exe 1832 Abcgii32.exe 4244 Bhdilold.exe 3364 Ccacjgfb.exe 4936 Dabpgbpm.exe 2028 Ecfeldcj.exe 1716 Eflhiolf.exe 2264 Fhonpi32.exe 2040 Fqmlbfbo.exe 4152 Gcbnopkj.exe 1696 Hppedpkf.exe 4188 Ifhibhfc.exe 988 Jmgkja32.exe 4156 Jidbpa32.exe 4252 Kdcicipb.exe 3092 Ldmlih32.exe 2052 Mnapnl32.exe 2876 Nbfoeiei.exe 2384 Pgcpdn32.exe 2312 Qgalelin.exe 4116 Ahffqk32.exe 3120 Bjkhme32.exe 2344 Ckpjob32.exe 2596 Dhnnoe32.exe 376 Eehdii32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Qpnegbpo.exe Qjalok32.exe File opened for modification C:\Windows\SysWOW64\Eacaopml.exe Enddcdmi.exe File created C:\Windows\SysWOW64\Ckboalem.dll Biiole32.exe File created C:\Windows\SysWOW64\Hccgqa32.exe Hbakiina.exe File created C:\Windows\SysWOW64\Pinpkbqb.dll Ldleje32.exe File created C:\Windows\SysWOW64\Dhkjjchj.exe Dfjnbk32.exe File created C:\Windows\SysWOW64\Feifpcpf.exe Fplnhmbo.exe File opened for modification C:\Windows\SysWOW64\Fnacfp32.exe Ejjgic32.exe File created C:\Windows\SysWOW64\Lhnhplpg.exe Laacmbkm.exe File created C:\Windows\SysWOW64\Mojmbf32.exe Lhnhplpg.exe File created C:\Windows\SysWOW64\Pomgcc32.exe Pcdjic32.exe File opened for modification C:\Windows\SysWOW64\Jalakeme.exe Jkbhok32.exe File opened for modification C:\Windows\SysWOW64\Hppedpkf.exe Gcbnopkj.exe File created C:\Windows\SysWOW64\Pgcpdn32.exe Nbfoeiei.exe File created C:\Windows\SysWOW64\Kikgkn32.dll Gdafgefe.exe File opened for modification C:\Windows\SysWOW64\Lcjchd32.exe Kcpqafba.exe File created C:\Windows\SysWOW64\Canjpp32.dll Aoioeo32.exe File opened for modification C:\Windows\SysWOW64\Fiekhm32.exe Eqiilp32.exe File opened for modification C:\Windows\SysWOW64\Piocoi32.exe Padnkf32.exe File opened for modification C:\Windows\SysWOW64\Ahffqk32.exe Qgalelin.exe File opened for modification C:\Windows\SysWOW64\Cabofaaj.exe Cjhfjg32.exe File opened for modification C:\Windows\SysWOW64\Efamkepl.exe Dfhjefhf.exe File opened for modification C:\Windows\SysWOW64\Bqboadia.exe Bjhgdj32.exe File created C:\Windows\SysWOW64\Hjmomkll.exe Hccgqa32.exe File created C:\Windows\SysWOW64\Oomncg32.dll Hccgqa32.exe File opened for modification C:\Windows\SysWOW64\Khdojk32.exe Kbgfad32.exe File created C:\Windows\SysWOW64\Plpjhk32.exe Pkkdci32.exe File created C:\Windows\SysWOW64\Cipemkgf.dll Jqhpafll.exe File created C:\Windows\SysWOW64\Ifgjkl32.dll Bbflpi32.exe File created C:\Windows\SysWOW64\Chfbhe32.dll Jkbhok32.exe File created C:\Windows\SysWOW64\Jgabnp32.dll Fohobmke.exe File created C:\Windows\SysWOW64\Oqjfniad.dll Ogfccchd.exe File created C:\Windows\SysWOW64\Fiilladj.exe Fcodog32.exe File created C:\Windows\SysWOW64\Jjgcbb32.exe Injmlbkh.exe File created C:\Windows\SysWOW64\Jldkokod.exe Jangaboo.exe File opened for modification C:\Windows\SysWOW64\Ldoape32.exe Ldleje32.exe File created C:\Windows\SysWOW64\Cpnpjgpn.exe Clpgdijg.exe File created C:\Windows\SysWOW64\Oijgmokc.exe Nicalpak.exe File opened for modification C:\Windows\SysWOW64\Qlejnqbj.exe Plijbblh.exe File created C:\Windows\SysWOW64\Lmaafcml.exe Lngkjhmi.exe File created C:\Windows\SysWOW64\Cpklja32.exe Bfdkpn32.exe File created C:\Windows\SysWOW64\Pjbkbg32.dll Ghpebngp.exe File created C:\Windows\SysWOW64\Midhgmfj.dll Aqpiegig.exe File created C:\Windows\SysWOW64\Dfangk32.dll NEAS.a648fc8120d844ae3f1e2f6ca0cd6340_JC.exe File created C:\Windows\SysWOW64\Qgpkkf32.dll Kkqepi32.exe File created C:\Windows\SysWOW64\Apggma32.exe Afocdkac.exe File opened for modification C:\Windows\SysWOW64\Lhogkc32.exe Lmgfhj32.exe File created C:\Windows\SysWOW64\Okiljj32.exe Odpcmpnl.exe File created C:\Windows\SysWOW64\Adnilk32.dll Gafmkp32.exe File created C:\Windows\SysWOW64\Pcdjic32.exe Opcqgh32.exe File created C:\Windows\SysWOW64\Ankaglme.dll Jbaocfmo.exe File created C:\Windows\SysWOW64\Ihdegddo.dll Oddmhp32.exe File created C:\Windows\SysWOW64\Fomnlelh.dll Jmgkja32.exe File created C:\Windows\SysWOW64\Hqlpbjhp.dll Ekimdc32.exe File created C:\Windows\SysWOW64\Omqeobjo.exe Odjmneim.exe File opened for modification C:\Windows\SysWOW64\Oldagc32.exe Oajcnkdl.exe File created C:\Windows\SysWOW64\Qifiph32.exe Qpnegbpo.exe File created C:\Windows\SysWOW64\Jangaboo.exe Hcedfa32.exe File opened for modification C:\Windows\SysWOW64\Aihoka32.exe Abngngjd.exe File created C:\Windows\SysWOW64\Edokeifn.dll Cimamn32.exe File created C:\Windows\SysWOW64\Hopfadlp.exe Fmejlcoj.exe File created C:\Windows\SysWOW64\Dhnnoe32.exe Ckpjob32.exe File created C:\Windows\SysWOW64\Lnbcfp32.dll Mjpbkc32.exe File created C:\Windows\SysWOW64\Jgpkiq32.exe Hjlaho32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdhemn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggfoldki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eacaopml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fhdoli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jhocgqjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bjgncihp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ookokeqd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjhgdj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mjpbkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhkkcfnf.dll" Lngkjhmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ceanplbl.dll" Ookokeqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nddklhke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omqeobjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Biqkgi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahinld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckpjob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cabofaaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ioebdomd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnpman32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmipld32.dll" Dnebfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjapelnf.dll" Jdgjgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mqnfon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apncei32.dll" Fdijkmbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aeodkfcm.dll" Afocdkac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghdeac32.dll" Aqhcid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lngkjhmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fiekhm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acmchj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chhndcjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qaecikhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njedlojg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ekimdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khabdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Babfgo32.dll" Amhdfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oojaeh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhdfgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgfkaf32.dll" Jalakeme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ammnclcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlkldmjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cjcmognb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iaepea32.dll" Cbkncd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pfdjccol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qobhepjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Onjelebj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cebdmbme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nleojlbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pgjoejbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aocmbdco.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node NEAS.a648fc8120d844ae3f1e2f6ca0cd6340_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jkbhok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pgcpdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmcabd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Khfkpjjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Foldnn32.dll" Enddcdmi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmejlcoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khmoionj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjdjhgdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjmomkll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ongafqfg.dll" Gepmab32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldmlih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkechjib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbdckd32.dll" Fmcjiagf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Enaaiifb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhjeoc32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3980 wrote to memory of 408 3980 NEAS.a648fc8120d844ae3f1e2f6ca0cd6340_JC.exe 92 PID 3980 wrote to memory of 408 3980 NEAS.a648fc8120d844ae3f1e2f6ca0cd6340_JC.exe 92 PID 3980 wrote to memory of 408 3980 NEAS.a648fc8120d844ae3f1e2f6ca0cd6340_JC.exe 92 PID 408 wrote to memory of 1512 408 Lkkekdhe.exe 93 PID 408 wrote to memory of 1512 408 Lkkekdhe.exe 93 PID 408 wrote to memory of 1512 408 Lkkekdhe.exe 93 PID 1512 wrote to memory of 3828 1512 Qlajkm32.exe 94 PID 1512 wrote to memory of 3828 1512 Qlajkm32.exe 94 PID 1512 wrote to memory of 3828 1512 Qlajkm32.exe 94 PID 3828 wrote to memory of 672 3828 Cjabgm32.exe 95 PID 3828 wrote to memory of 672 3828 Cjabgm32.exe 95 PID 3828 wrote to memory of 672 3828 Cjabgm32.exe 95 PID 672 wrote to memory of 1920 672 Enaaiifb.exe 97 PID 672 wrote to memory of 1920 672 Enaaiifb.exe 97 PID 672 wrote to memory of 1920 672 Enaaiifb.exe 97 PID 1920 wrote to memory of 3948 1920 Fmejlcoj.exe 99 PID 1920 wrote to memory of 3948 1920 Fmejlcoj.exe 99 PID 1920 wrote to memory of 3948 1920 Fmejlcoj.exe 99 PID 3948 wrote to memory of 3952 3948 Hopfadlp.exe 100 PID 3948 wrote to memory of 3952 3948 Hopfadlp.exe 100 PID 3948 wrote to memory of 3952 3948 Hopfadlp.exe 100 PID 3952 wrote to memory of 4700 3952 Ioqohb32.exe 101 PID 3952 wrote to memory of 4700 3952 Ioqohb32.exe 101 PID 3952 wrote to memory of 4700 3952 Ioqohb32.exe 101 PID 4700 wrote to memory of 3748 4700 Jdgjgh32.exe 103 PID 4700 wrote to memory of 3748 4700 Jdgjgh32.exe 103 PID 4700 wrote to memory of 3748 4700 Jdgjgh32.exe 103 PID 3748 wrote to memory of 908 3748 Jaodkk32.exe 104 PID 3748 wrote to memory of 908 3748 Jaodkk32.exe 104 PID 3748 wrote to memory of 908 3748 Jaodkk32.exe 104 PID 908 wrote to memory of 1476 908 Knkokl32.exe 105 PID 908 wrote to memory of 1476 908 Knkokl32.exe 105 PID 908 wrote to memory of 1476 908 Knkokl32.exe 105 PID 1476 wrote to memory of 1116 1476 Lhjeoc32.exe 106 PID 1476 wrote to memory of 1116 1476 Lhjeoc32.exe 106 PID 1476 wrote to memory of 1116 1476 Lhjeoc32.exe 106 PID 1116 wrote to memory of 4800 1116 Lnfngj32.exe 107 PID 1116 wrote to memory of 4800 1116 Lnfngj32.exe 107 PID 1116 wrote to memory of 4800 1116 Lnfngj32.exe 107 PID 4800 wrote to memory of 4488 4800 Mokdllim.exe 108 PID 4800 wrote to memory of 4488 4800 Mokdllim.exe 108 PID 4800 wrote to memory of 4488 4800 Mokdllim.exe 108 PID 4488 wrote to memory of 3332 4488 Mndjhhjp.exe 109 PID 4488 wrote to memory of 3332 4488 Mndjhhjp.exe 109 PID 4488 wrote to memory of 3332 4488 Mndjhhjp.exe 109 PID 3332 wrote to memory of 2204 3332 Nicalpak.exe 110 PID 3332 wrote to memory of 2204 3332 Nicalpak.exe 110 PID 3332 wrote to memory of 2204 3332 Nicalpak.exe 110 PID 2204 wrote to memory of 1120 2204 Oijgmokc.exe 111 PID 2204 wrote to memory of 1120 2204 Oijgmokc.exe 111 PID 2204 wrote to memory of 1120 2204 Oijgmokc.exe 111 PID 1120 wrote to memory of 4444 1120 Pbjbfclk.exe 112 PID 1120 wrote to memory of 4444 1120 Pbjbfclk.exe 112 PID 1120 wrote to memory of 4444 1120 Pbjbfclk.exe 112 PID 4444 wrote to memory of 2088 4444 Pldcdhpi.exe 113 PID 4444 wrote to memory of 2088 4444 Pldcdhpi.exe 113 PID 4444 wrote to memory of 2088 4444 Pldcdhpi.exe 113 PID 2088 wrote to memory of 4032 2088 Aekdolkj.exe 114 PID 2088 wrote to memory of 4032 2088 Aekdolkj.exe 114 PID 2088 wrote to memory of 4032 2088 Aekdolkj.exe 114 PID 4032 wrote to memory of 1908 4032 Bpjkbcbe.exe 115 PID 4032 wrote to memory of 1908 4032 Bpjkbcbe.exe 115 PID 4032 wrote to memory of 1908 4032 Bpjkbcbe.exe 115 PID 1908 wrote to memory of 4892 1908 Blchmdff.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a648fc8120d844ae3f1e2f6ca0cd6340_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a648fc8120d844ae3f1e2f6ca0cd6340_JC.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\Lkkekdhe.exeC:\Windows\system32\Lkkekdhe.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\Qlajkm32.exeC:\Windows\system32\Qlajkm32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\Cjabgm32.exeC:\Windows\system32\Cjabgm32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\Enaaiifb.exeC:\Windows\system32\Enaaiifb.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\Fmejlcoj.exeC:\Windows\system32\Fmejlcoj.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\Hopfadlp.exeC:\Windows\system32\Hopfadlp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\Ioqohb32.exeC:\Windows\system32\Ioqohb32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\Jdgjgh32.exeC:\Windows\system32\Jdgjgh32.exe9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\Jaodkk32.exeC:\Windows\system32\Jaodkk32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\Knkokl32.exeC:\Windows\system32\Knkokl32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\Lhjeoc32.exeC:\Windows\system32\Lhjeoc32.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\Lnfngj32.exeC:\Windows\system32\Lnfngj32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\Mokdllim.exeC:\Windows\system32\Mokdllim.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\Mndjhhjp.exeC:\Windows\system32\Mndjhhjp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\Nicalpak.exeC:\Windows\system32\Nicalpak.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\Oijgmokc.exeC:\Windows\system32\Oijgmokc.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\Pbjbfclk.exeC:\Windows\system32\Pbjbfclk.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\Pldcdhpi.exeC:\Windows\system32\Pldcdhpi.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\Aekdolkj.exeC:\Windows\system32\Aekdolkj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Bpjkbcbe.exeC:\Windows\system32\Bpjkbcbe.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\Blchmdff.exeC:\Windows\system32\Blchmdff.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\Dmmdjp32.exeC:\Windows\system32\Dmmdjp32.exe23⤵
- Executes dropped EXE
PID:4892 -
C:\Windows\SysWOW64\Eodclj32.exeC:\Windows\system32\Eodclj32.exe24⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\Ejjgic32.exeC:\Windows\system32\Ejjgic32.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1272 -
C:\Windows\SysWOW64\Fnacfp32.exeC:\Windows\system32\Fnacfp32.exe26⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\Hhegjdag.exeC:\Windows\system32\Hhegjdag.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3964 -
C:\Windows\SysWOW64\Imnoni32.exeC:\Windows\system32\Imnoni32.exe28⤵
- Executes dropped EXE
PID:4832 -
C:\Windows\SysWOW64\Iaqapggb.exeC:\Windows\system32\Iaqapggb.exe29⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\Jhocgqjj.exeC:\Windows\system32\Jhocgqjj.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:4768 -
C:\Windows\SysWOW64\Jkbhok32.exeC:\Windows\system32\Jkbhok32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4804 -
C:\Windows\SysWOW64\Jalakeme.exeC:\Windows\system32\Jalakeme.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:4324 -
C:\Windows\SysWOW64\Khmoionj.exeC:\Windows\system32\Khmoionj.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:3192 -
C:\Windows\SysWOW64\Kkqepi32.exeC:\Windows\system32\Kkqepi32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1276 -
C:\Windows\SysWOW64\Laacmbkm.exeC:\Windows\system32\Laacmbkm.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4948 -
C:\Windows\SysWOW64\Lhnhplpg.exeC:\Windows\system32\Lhnhplpg.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:712 -
C:\Windows\SysWOW64\Mojmbf32.exeC:\Windows\system32\Mojmbf32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3668 -
C:\Windows\SysWOW64\Mqnfon32.exeC:\Windows\system32\Mqnfon32.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:4520 -
C:\Windows\SysWOW64\Ongijo32.exeC:\Windows\system32\Ongijo32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4088 -
C:\Windows\SysWOW64\Paqebike.exeC:\Windows\system32\Paqebike.exe40⤵
- Executes dropped EXE
PID:4396 -
C:\Windows\SysWOW64\Pijiif32.exeC:\Windows\system32\Pijiif32.exe41⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\Abcgii32.exeC:\Windows\system32\Abcgii32.exe42⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\Bhdilold.exeC:\Windows\system32\Bhdilold.exe43⤵
- Executes dropped EXE
PID:4244 -
C:\Windows\SysWOW64\Ccacjgfb.exeC:\Windows\system32\Ccacjgfb.exe44⤵
- Executes dropped EXE
PID:3364 -
C:\Windows\SysWOW64\Dabpgbpm.exeC:\Windows\system32\Dabpgbpm.exe45⤵
- Executes dropped EXE
PID:4936 -
C:\Windows\SysWOW64\Ecfeldcj.exeC:\Windows\system32\Ecfeldcj.exe46⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Eflhiolf.exeC:\Windows\system32\Eflhiolf.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\Fhonpi32.exeC:\Windows\system32\Fhonpi32.exe48⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\SysWOW64\Fqmlbfbo.exeC:\Windows\system32\Fqmlbfbo.exe49⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\Gcbnopkj.exeC:\Windows\system32\Gcbnopkj.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4152 -
C:\Windows\SysWOW64\Hppedpkf.exeC:\Windows\system32\Hppedpkf.exe51⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\Ifhibhfc.exeC:\Windows\system32\Ifhibhfc.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4188 -
C:\Windows\SysWOW64\Jmgkja32.exeC:\Windows\system32\Jmgkja32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:988 -
C:\Windows\SysWOW64\Jidbpa32.exeC:\Windows\system32\Jidbpa32.exe54⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\Kdcicipb.exeC:\Windows\system32\Kdcicipb.exe55⤵
- Executes dropped EXE
PID:4252 -
C:\Windows\SysWOW64\Ldmlih32.exeC:\Windows\system32\Ldmlih32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:3092 -
C:\Windows\SysWOW64\Mnapnl32.exeC:\Windows\system32\Mnapnl32.exe57⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\SysWOW64\Nbfoeiei.exeC:\Windows\system32\Nbfoeiei.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2876 -
C:\Windows\SysWOW64\Pgcpdn32.exeC:\Windows\system32\Pgcpdn32.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:2384 -
C:\Windows\SysWOW64\Qgalelin.exeC:\Windows\system32\Qgalelin.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2312 -
C:\Windows\SysWOW64\Ahffqk32.exeC:\Windows\system32\Ahffqk32.exe61⤵
- Executes dropped EXE
PID:4116 -
C:\Windows\SysWOW64\Bjkhme32.exeC:\Windows\system32\Bjkhme32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3120 -
C:\Windows\SysWOW64\Ckpjob32.exeC:\Windows\system32\Ckpjob32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\Dhnnoe32.exeC:\Windows\system32\Dhnnoe32.exe64⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\SysWOW64\Eehdii32.exeC:\Windows\system32\Eehdii32.exe65⤵
- Executes dropped EXE
PID:376 -
C:\Windows\SysWOW64\Fohobmke.exeC:\Windows\system32\Fohobmke.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1784 -
C:\Windows\SysWOW64\Iifodmak.exeC:\Windows\system32\Iifodmak.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2068 -
C:\Windows\SysWOW64\Ibncmchl.exeC:\Windows\system32\Ibncmchl.exe68⤵PID:4408
-
C:\Windows\SysWOW64\Jioajliq.exeC:\Windows\system32\Jioajliq.exe69⤵PID:4288
-
C:\Windows\SysWOW64\Jidkek32.exeC:\Windows\system32\Jidkek32.exe70⤵PID:3140
-
C:\Windows\SysWOW64\Kemhpl32.exeC:\Windows\system32\Kemhpl32.exe71⤵PID:1752
-
C:\Windows\SysWOW64\Keabkkdg.exeC:\Windows\system32\Keabkkdg.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3828 -
C:\Windows\SysWOW64\Lmncgh32.exeC:\Windows\system32\Lmncgh32.exe73⤵PID:892
-
C:\Windows\SysWOW64\Lplpcc32.exeC:\Windows\system32\Lplpcc32.exe74⤵PID:2776
-
C:\Windows\SysWOW64\Mckefmai.exeC:\Windows\system32\Mckefmai.exe75⤵PID:3244
-
C:\Windows\SysWOW64\Ncfdbk32.exeC:\Windows\system32\Ncfdbk32.exe76⤵PID:4960
-
C:\Windows\SysWOW64\Pddmml32.exeC:\Windows\system32\Pddmml32.exe77⤵PID:1700
-
C:\Windows\SysWOW64\Ammnclcj.exeC:\Windows\system32\Ammnclcj.exe78⤵
- Modifies registry class
PID:5100 -
C:\Windows\SysWOW64\Caebfg32.exeC:\Windows\system32\Caebfg32.exe79⤵PID:3128
-
C:\Windows\SysWOW64\Cjpcel32.exeC:\Windows\system32\Cjpcel32.exe80⤵PID:1720
-
C:\Windows\SysWOW64\Dmgbgf32.exeC:\Windows\system32\Dmgbgf32.exe81⤵PID:2856
-
C:\Windows\SysWOW64\Eaonccme.exeC:\Windows\system32\Eaonccme.exe82⤵PID:4816
-
C:\Windows\SysWOW64\Fdijkmbl.exeC:\Windows\system32\Fdijkmbl.exe83⤵
- Modifies registry class
PID:4204 -
C:\Windows\SysWOW64\Goqkne32.exeC:\Windows\system32\Goqkne32.exe84⤵PID:3980
-
C:\Windows\SysWOW64\Gnhdea32.exeC:\Windows\system32\Gnhdea32.exe85⤵PID:1648
-
C:\Windows\SysWOW64\Gafmkp32.exeC:\Windows\system32\Gafmkp32.exe86⤵
- Drops file in System32 directory
PID:4700 -
C:\Windows\SysWOW64\Jfnbnk32.exeC:\Windows\system32\Jfnbnk32.exe87⤵PID:1772
-
C:\Windows\SysWOW64\Knbiil32.exeC:\Windows\system32\Knbiil32.exe88⤵PID:1272
-
C:\Windows\SysWOW64\Mlkldmjf.exeC:\Windows\system32\Mlkldmjf.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4880 -
C:\Windows\SysWOW64\Mbedag32.exeC:\Windows\system32\Mbedag32.exe90⤵PID:2388
-
C:\Windows\SysWOW64\Nleojlbk.exeC:\Windows\system32\Nleojlbk.exe91⤵
- Modifies registry class
PID:4800 -
C:\Windows\SysWOW64\Ogfccchd.exeC:\Windows\system32\Ogfccchd.exe92⤵
- Drops file in System32 directory
PID:444 -
C:\Windows\SysWOW64\Opcqgh32.exeC:\Windows\system32\Opcqgh32.exe93⤵
- Drops file in System32 directory
PID:344 -
C:\Windows\SysWOW64\Pcdjic32.exeC:\Windows\system32\Pcdjic32.exe94⤵
- Drops file in System32 directory
PID:1368 -
C:\Windows\SysWOW64\Pomgcc32.exeC:\Windows\system32\Pomgcc32.exe95⤵PID:3064
-
C:\Windows\SysWOW64\Qhlamhkj.exeC:\Windows\system32\Qhlamhkj.exe96⤵PID:4856
-
C:\Windows\SysWOW64\Aqhcid32.exeC:\Windows\system32\Aqhcid32.exe97⤵
- Modifies registry class
PID:3908 -
C:\Windows\SysWOW64\Bjgncihp.exeC:\Windows\system32\Bjgncihp.exe98⤵
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Biogieke.exeC:\Windows\system32\Biogieke.exe99⤵PID:4488
-
C:\Windows\SysWOW64\Cjcmognb.exeC:\Windows\system32\Cjcmognb.exe100⤵
- Modifies registry class
PID:3356 -
C:\Windows\SysWOW64\Cppfgnlj.exeC:\Windows\system32\Cppfgnlj.exe101⤵PID:3344
-
C:\Windows\SysWOW64\Cjejdglp.exeC:\Windows\system32\Cjejdglp.exe102⤵PID:3004
-
C:\Windows\SysWOW64\Capbaacl.exeC:\Windows\system32\Capbaacl.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3984 -
C:\Windows\SysWOW64\Cjhfjg32.exeC:\Windows\system32\Cjhfjg32.exe104⤵
- Drops file in System32 directory
PID:4456 -
C:\Windows\SysWOW64\Cabofaaj.exeC:\Windows\system32\Cabofaaj.exe105⤵
- Modifies registry class
PID:1332 -
C:\Windows\SysWOW64\Cfogohpa.exeC:\Windows\system32\Cfogohpa.exe106⤵PID:5132
-
C:\Windows\SysWOW64\Cpglgmfa.exeC:\Windows\system32\Cpglgmfa.exe107⤵PID:5180
-
C:\Windows\SysWOW64\Dfhjefhf.exeC:\Windows\system32\Dfhjefhf.exe108⤵
- Drops file in System32 directory
PID:5232 -
C:\Windows\SysWOW64\Efamkepl.exeC:\Windows\system32\Efamkepl.exe109⤵PID:5300
-
C:\Windows\SysWOW64\Ghflgedf.exeC:\Windows\system32\Ghflgedf.exe110⤵PID:5344
-
C:\Windows\SysWOW64\Gdafgefe.exeC:\Windows\system32\Gdafgefe.exe111⤵
- Drops file in System32 directory
PID:5440 -
C:\Windows\SysWOW64\Hkpgooim.exeC:\Windows\system32\Hkpgooim.exe112⤵PID:5524
-
C:\Windows\SysWOW64\Hjhaeklb.exeC:\Windows\system32\Hjhaeklb.exe113⤵PID:5684
-
C:\Windows\SysWOW64\Jjfngi32.exeC:\Windows\system32\Jjfngi32.exe114⤵PID:5728
-
C:\Windows\SysWOW64\Jdkadb32.exeC:\Windows\system32\Jdkadb32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5776 -
C:\Windows\SysWOW64\Jbaocfmo.exeC:\Windows\system32\Jbaocfmo.exe116⤵
- Drops file in System32 directory
PID:5828 -
C:\Windows\SysWOW64\Kjdjhgdb.exeC:\Windows\system32\Kjdjhgdb.exe117⤵
- Modifies registry class
PID:5940 -
C:\Windows\SysWOW64\Kkechjib.exeC:\Windows\system32\Kkechjib.exe118⤵
- Modifies registry class
PID:6040 -
C:\Windows\SysWOW64\Liqibm32.exeC:\Windows\system32\Liqibm32.exe119⤵PID:6096
-
C:\Windows\SysWOW64\Mjpbkc32.exeC:\Windows\system32\Mjpbkc32.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:6140 -
C:\Windows\SysWOW64\Oajcnkdl.exeC:\Windows\system32\Oajcnkdl.exe121⤵
- Drops file in System32 directory
PID:3976 -
C:\Windows\SysWOW64\Oldagc32.exeC:\Windows\system32\Oldagc32.exe122⤵PID:5212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-