Analysis
-
max time kernel
146s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2023 10:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.21b378b6fe7847fa94a8fbd98781e7e0_JC.exe
Resource
win7-20231023-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.21b378b6fe7847fa94a8fbd98781e7e0_JC.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NEAS.21b378b6fe7847fa94a8fbd98781e7e0_JC.exe
-
Size
71KB
-
MD5
21b378b6fe7847fa94a8fbd98781e7e0
-
SHA1
a5f21034a71688cd5b799de0b06f5a45f0f0f974
-
SHA256
ae8078eec9c030f89e289f74fb66feeaeb0b2f0386d5bf4853345f0630a6982e
-
SHA512
c13ab89091d7519b84419d305c4670184b49c55ff1ec554887d29302abfe2d009f2e03d3c5e3e06fe33223c7aafe4cb5598cb48cf19eb00fe6c8fac05d50450f
-
SSDEEP
1536:HNke7lQvHHSBkNO0it7DG5QhHukqDDwCNC11qUnRQ01DbEyRCRRRoR4Rk:+e74SX0it7KahHuVD0CNSXneEEy032ya
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bimoecio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baickimp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oifekg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdclbopg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goepgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dckobg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndidgg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fegiba32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bojhnjgf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agbkfood.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cmpjhbee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Haghje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ellpgeag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mmfjfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ceqngekl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jnpjegpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bfoeqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Depanm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgdgodhj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbgaecjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pimfji32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aimhfqmk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Adockl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Behbkmgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Olgdgibf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pjgellfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dffmogji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Efhcld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qdphgmlj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goccbhae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cnhell32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmkopgep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddcekk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fcneod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Alihmlna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hehkjpod.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oakbonkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mljmblae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hmhhia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Edcqojqh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdalni32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohjlqklp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iahgki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgdqjm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjgohf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqgjoenq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lngkjhmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dhdaao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Paihffkf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggppel32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnkjpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Embkhn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjgellfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mhafoh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neiiiecg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mbbloc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddaifk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dinanb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eocegn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jdkkjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fnbjkj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjaihk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Feddpj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppjghgdg.exe -
Executes dropped EXE 64 IoCs
pid Process 220 Mminfech.exe 3860 Opjponbf.exe 4560 Pljcjn32.exe 4364 Aiejda32.exe 1336 Ajggjq32.exe 4568 Apfhajjf.exe 2352 Bpmobi32.exe 3060 Cnhell32.exe 4800 Cmpoch32.exe 2564 Dqgjoenq.exe 4184 Ekahhn32.exe 4960 Fegiba32.exe 2992 Haobnpkc.exe 2392 Hknmgd32.exe 4120 Ioclnblj.exe 4668 Jnoopm32.exe 4616 Knfepldb.exe 1624 Knhbflbp.exe 4316 Kdbjbfjl.exe 2280 Llqhdb32.exe 3316 Lmjkka32.exe 1928 Mmfjfp32.exe 3780 Nppfnige.exe 4156 Oioahn32.exe 4700 Pidjcm32.exe 3100 Qojeabie.exe 4196 Albpff32.exe 3080 Bomknp32.exe 4436 Bnbeggmi.exe 4860 Cgbppknb.exe 2040 Dcpffk32.exe 1136 Enomic32.exe 2860 Enfcjb32.exe 1056 Fppchile.exe 3332 Gmnfglcd.exe 400 Hmdlhk32.exe 4900 Hpeejfjm.exe 1648 Idmafc32.exe 3932 Jdfcla32.exe 4596 Knhkkfod.exe 3880 Lonnfg32.exe 4812 Locgagli.exe 2828 Mqnfon32.exe 64 Pgdgodhj.exe 2152 Qahkch32.exe 1924 Aehpof32.exe 1268 Appaangd.exe 1740 Bimoecio.exe 3540 Bojhnjgf.exe 116 Ceppfbef.exe 1688 Djgkbp32.exe 4876 Ebnocpfp.exe 4492 Fmmffhnk.exe 4712 Gfnnel32.exe 1344 Iaiddajo.exe 1008 Kdalni32.exe 2252 Mpoljg32.exe 3548 Njjmil32.exe 4064 Nkijbooo.exe 3736 Onhoehpp.exe 1580 Onklkhnn.exe 3512 Pkoldl32.exe 372 Qcccom32.exe 4756 Adockl32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Cgbppknb.exe Bnbeggmi.exe File created C:\Windows\SysWOW64\Cmgijc32.dll Bhgcdjje.exe File created C:\Windows\SysWOW64\Khgbjqng.exe Keifneoc.exe File opened for modification C:\Windows\SysWOW64\Ackiqpce.exe Aifdcgcp.exe File opened for modification C:\Windows\SysWOW64\Pnfiia32.exe Pdqelh32.exe File created C:\Windows\SysWOW64\Gomjklnq.dll Alfkgm32.exe File created C:\Windows\SysWOW64\Hdclbopg.exe Gdaomobj.exe File created C:\Windows\SysWOW64\Ljkfjnfd.dll Pahiebeq.exe File opened for modification C:\Windows\SysWOW64\Kcpjgo32.exe Kflink32.exe File created C:\Windows\SysWOW64\Icmgjj32.dll Epoplk32.exe File created C:\Windows\SysWOW64\Mdhanfoi.dll Hcmbnk32.exe File created C:\Windows\SysWOW64\Kqbdej32.exe Jdkkjl32.exe File created C:\Windows\SysWOW64\Bgbcilhf.dll Nndjgjhe.exe File opened for modification C:\Windows\SysWOW64\Gcjdjb32.exe Gddgifgb.exe File created C:\Windows\SysWOW64\Ohjlqklp.exe Oghpib32.exe File created C:\Windows\SysWOW64\Fpngaa32.dll Pkmhan32.exe File created C:\Windows\SysWOW64\Flmmmo32.dll Dmefafql.exe File opened for modification C:\Windows\SysWOW64\Fkiobhac.exe Edhado32.exe File opened for modification C:\Windows\SysWOW64\Kmpphk32.exe Kffhkaom.exe File created C:\Windows\SysWOW64\Elkpmlab.dll Bjokno32.exe File created C:\Windows\SysWOW64\Jnfcbg32.exe Jkggfl32.exe File created C:\Windows\SysWOW64\Hpbaccfe.dll Mcnmccfa.exe File created C:\Windows\SysWOW64\Mhlnii32.dll Aojepe32.exe File created C:\Windows\SysWOW64\Ahenip32.exe Aljcip32.exe File created C:\Windows\SysWOW64\Pfanmcao.exe Pnfiia32.exe File created C:\Windows\SysWOW64\Hhojlfpd.exe Hlhife32.exe File opened for modification C:\Windows\SysWOW64\Opjponbf.exe Mminfech.exe File created C:\Windows\SysWOW64\Pahiebeq.exe Pknqhh32.exe File created C:\Windows\SysWOW64\Mljmblae.exe Mfpeeb32.exe File opened for modification C:\Windows\SysWOW64\Epoplk32.exe Dckobg32.exe File created C:\Windows\SysWOW64\Llimqhll.exe Leoedn32.exe File created C:\Windows\SysWOW64\Locgagli.exe Lonnfg32.exe File opened for modification C:\Windows\SysWOW64\Lfeaegdi.exe Llpmhodc.exe File opened for modification C:\Windows\SysWOW64\Dffmogji.exe Dplebmbl.exe File created C:\Windows\SysWOW64\Olpcim32.dll Hgghdp32.exe File created C:\Windows\SysWOW64\Obgoaq32.exe Oiojhkkj.exe File created C:\Windows\SysWOW64\Abcdicol.dll Hqbnofgo.exe File created C:\Windows\SysWOW64\Lgkakm32.exe Kedoqkbe.exe File created C:\Windows\SysWOW64\Pgkmhn32.dll Kgfdfbhj.exe File created C:\Windows\SysWOW64\Chbjoe32.dll Dndnjllg.exe File created C:\Windows\SysWOW64\Klpjji32.exe Jdopcmlp.exe File opened for modification C:\Windows\SysWOW64\Kopcld32.exe Klbgpi32.exe File opened for modification C:\Windows\SysWOW64\Baickimp.exe Bjokno32.exe File created C:\Windows\SysWOW64\Fkamfl32.dll Lnendhol.exe File created C:\Windows\SysWOW64\Mckbhg32.exe Mlqjlmjp.exe File opened for modification C:\Windows\SysWOW64\Fncilm32.exe Fcneod32.exe File opened for modification C:\Windows\SysWOW64\Nkijbooo.exe Njjmil32.exe File created C:\Windows\SysWOW64\Efhcld32.exe Efdjqeni.exe File created C:\Windows\SysWOW64\Hnnlcpcl.exe Hpiobc32.exe File opened for modification C:\Windows\SysWOW64\Gbkkbp32.exe Gegkilik.exe File created C:\Windows\SysWOW64\Qcbhdmai.dll Khgbjqng.exe File created C:\Windows\SysWOW64\Kfbokahl.dll Qmphkg32.exe File opened for modification C:\Windows\SysWOW64\Cgfblh32.exe Cmnncb32.exe File created C:\Windows\SysWOW64\Pljcjn32.exe Opjponbf.exe File opened for modification C:\Windows\SysWOW64\Llqhdb32.exe Kdbjbfjl.exe File created C:\Windows\SysWOW64\Hpeejfjm.exe Hmdlhk32.exe File opened for modification C:\Windows\SysWOW64\Lgkakm32.exe Kedoqkbe.exe File created C:\Windows\SysWOW64\Eipigqop.exe Edcqojqh.exe File opened for modification C:\Windows\SysWOW64\Bmbngd32.exe Bbmjjk32.exe File created C:\Windows\SysWOW64\Pfpphg32.exe Pkklkn32.exe File created C:\Windows\SysWOW64\Chpangnk.exe Behbkmgb.exe File opened for modification C:\Windows\SysWOW64\Iqmincia.exe Iqfcmdpj.exe File created C:\Windows\SysWOW64\Aamkgpbi.exe Aefjbo32.exe File opened for modification C:\Windows\SysWOW64\Mckbhg32.exe Mlqjlmjp.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Llpmhodc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onlbdmpg.dll" Qfneamlf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhkkdenm.dll" Dpbdiehi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kcpjgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opdomjnf.dll" Coigllel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icmgjj32.dll" Epoplk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iaiddajo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Enkdjkep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fgjhiibl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aelcjbig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gngnjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkelbl32.dll" Njjdae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ppemmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mckbhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnogdqme.dll" Cmpjhbee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aifdcgcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcojkgea.dll" Qlejnqbj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hepgedme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Klpjji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Llimqhll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pgaboa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jnkajg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Alfkgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nhnlelfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmfmbpco.dll" Nelfnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lcbfmomc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kojdflkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ojcpmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Infhohhe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Djgkbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kpbfbo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jhlgpp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qojeabie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cgbppknb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qhigbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hkjoao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hnkhcjbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acgjch32.dll" Klbgpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Baokejco.dll" Ekahhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iqmincia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kbiede32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klmomihj.dll" Difpflco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jaepgm32.dll" Fbplgbbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ibnaonhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ohkkanbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Glfmaemc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcodgf32.dll" Mminfech.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gkeonggf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plpfga32.dll" Fggdic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oehnjddn.dll" Lejlioie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gdlnkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bfkkhdlk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mminaikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mljmblae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kfanpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kppphe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qhlkbaho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Icoglp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ebnocpfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnheca32.dll" Celelf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lcjchd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Qoboofnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kflink32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qdjgbg32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3408 wrote to memory of 220 3408 NEAS.21b378b6fe7847fa94a8fbd98781e7e0_JC.exe 93 PID 3408 wrote to memory of 220 3408 NEAS.21b378b6fe7847fa94a8fbd98781e7e0_JC.exe 93 PID 3408 wrote to memory of 220 3408 NEAS.21b378b6fe7847fa94a8fbd98781e7e0_JC.exe 93 PID 220 wrote to memory of 3860 220 Mminfech.exe 94 PID 220 wrote to memory of 3860 220 Mminfech.exe 94 PID 220 wrote to memory of 3860 220 Mminfech.exe 94 PID 3860 wrote to memory of 4560 3860 Opjponbf.exe 95 PID 3860 wrote to memory of 4560 3860 Opjponbf.exe 95 PID 3860 wrote to memory of 4560 3860 Opjponbf.exe 95 PID 4560 wrote to memory of 4364 4560 Pljcjn32.exe 96 PID 4560 wrote to memory of 4364 4560 Pljcjn32.exe 96 PID 4560 wrote to memory of 4364 4560 Pljcjn32.exe 96 PID 4364 wrote to memory of 1336 4364 Aiejda32.exe 97 PID 4364 wrote to memory of 1336 4364 Aiejda32.exe 97 PID 4364 wrote to memory of 1336 4364 Aiejda32.exe 97 PID 1336 wrote to memory of 4568 1336 Ajggjq32.exe 98 PID 1336 wrote to memory of 4568 1336 Ajggjq32.exe 98 PID 1336 wrote to memory of 4568 1336 Ajggjq32.exe 98 PID 4568 wrote to memory of 2352 4568 Apfhajjf.exe 99 PID 4568 wrote to memory of 2352 4568 Apfhajjf.exe 99 PID 4568 wrote to memory of 2352 4568 Apfhajjf.exe 99 PID 2352 wrote to memory of 3060 2352 Bpmobi32.exe 100 PID 2352 wrote to memory of 3060 2352 Bpmobi32.exe 100 PID 2352 wrote to memory of 3060 2352 Bpmobi32.exe 100 PID 3060 wrote to memory of 4800 3060 Cnhell32.exe 101 PID 3060 wrote to memory of 4800 3060 Cnhell32.exe 101 PID 3060 wrote to memory of 4800 3060 Cnhell32.exe 101 PID 4800 wrote to memory of 2564 4800 Cmpoch32.exe 102 PID 4800 wrote to memory of 2564 4800 Cmpoch32.exe 102 PID 4800 wrote to memory of 2564 4800 Cmpoch32.exe 102 PID 2564 wrote to memory of 4184 2564 Dqgjoenq.exe 103 PID 2564 wrote to memory of 4184 2564 Dqgjoenq.exe 103 PID 2564 wrote to memory of 4184 2564 Dqgjoenq.exe 103 PID 4184 wrote to memory of 4960 4184 Ekahhn32.exe 104 PID 4184 wrote to memory of 4960 4184 Ekahhn32.exe 104 PID 4184 wrote to memory of 4960 4184 Ekahhn32.exe 104 PID 4960 wrote to memory of 2992 4960 Fegiba32.exe 105 PID 4960 wrote to memory of 2992 4960 Fegiba32.exe 105 PID 4960 wrote to memory of 2992 4960 Fegiba32.exe 105 PID 2992 wrote to memory of 2392 2992 Haobnpkc.exe 106 PID 2992 wrote to memory of 2392 2992 Haobnpkc.exe 106 PID 2992 wrote to memory of 2392 2992 Haobnpkc.exe 106 PID 2392 wrote to memory of 4120 2392 Hknmgd32.exe 107 PID 2392 wrote to memory of 4120 2392 Hknmgd32.exe 107 PID 2392 wrote to memory of 4120 2392 Hknmgd32.exe 107 PID 4120 wrote to memory of 4668 4120 Ioclnblj.exe 108 PID 4120 wrote to memory of 4668 4120 Ioclnblj.exe 108 PID 4120 wrote to memory of 4668 4120 Ioclnblj.exe 108 PID 4668 wrote to memory of 4616 4668 Jnoopm32.exe 109 PID 4668 wrote to memory of 4616 4668 Jnoopm32.exe 109 PID 4668 wrote to memory of 4616 4668 Jnoopm32.exe 109 PID 4616 wrote to memory of 1624 4616 Knfepldb.exe 110 PID 4616 wrote to memory of 1624 4616 Knfepldb.exe 110 PID 4616 wrote to memory of 1624 4616 Knfepldb.exe 110 PID 1624 wrote to memory of 4316 1624 Knhbflbp.exe 111 PID 1624 wrote to memory of 4316 1624 Knhbflbp.exe 111 PID 1624 wrote to memory of 4316 1624 Knhbflbp.exe 111 PID 4316 wrote to memory of 2280 4316 Kdbjbfjl.exe 112 PID 4316 wrote to memory of 2280 4316 Kdbjbfjl.exe 112 PID 4316 wrote to memory of 2280 4316 Kdbjbfjl.exe 112 PID 2280 wrote to memory of 3316 2280 Llqhdb32.exe 113 PID 2280 wrote to memory of 3316 2280 Llqhdb32.exe 113 PID 2280 wrote to memory of 3316 2280 Llqhdb32.exe 113 PID 3316 wrote to memory of 1928 3316 Lmjkka32.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.21b378b6fe7847fa94a8fbd98781e7e0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.21b378b6fe7847fa94a8fbd98781e7e0_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\Mminfech.exeC:\Windows\system32\Mminfech.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\Opjponbf.exeC:\Windows\system32\Opjponbf.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\Pljcjn32.exeC:\Windows\system32\Pljcjn32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Aiejda32.exeC:\Windows\system32\Aiejda32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\Ajggjq32.exeC:\Windows\system32\Ajggjq32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\Apfhajjf.exeC:\Windows\system32\Apfhajjf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\Bpmobi32.exeC:\Windows\system32\Bpmobi32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\Cnhell32.exeC:\Windows\system32\Cnhell32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\Cmpoch32.exeC:\Windows\system32\Cmpoch32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\Dqgjoenq.exeC:\Windows\system32\Dqgjoenq.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\Ekahhn32.exeC:\Windows\system32\Ekahhn32.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Fegiba32.exeC:\Windows\system32\Fegiba32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Haobnpkc.exeC:\Windows\system32\Haobnpkc.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\Hknmgd32.exeC:\Windows\system32\Hknmgd32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\Ioclnblj.exeC:\Windows\system32\Ioclnblj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\Jnoopm32.exeC:\Windows\system32\Jnoopm32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\Knfepldb.exeC:\Windows\system32\Knfepldb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\Knhbflbp.exeC:\Windows\system32\Knhbflbp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\Kdbjbfjl.exeC:\Windows\system32\Kdbjbfjl.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\Llqhdb32.exeC:\Windows\system32\Llqhdb32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\Lmjkka32.exeC:\Windows\system32\Lmjkka32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\Mmfjfp32.exeC:\Windows\system32\Mmfjfp32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\Nppfnige.exeC:\Windows\system32\Nppfnige.exe24⤵
- Executes dropped EXE
PID:3780 -
C:\Windows\SysWOW64\Oioahn32.exeC:\Windows\system32\Oioahn32.exe25⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\Pidjcm32.exeC:\Windows\system32\Pidjcm32.exe26⤵
- Executes dropped EXE
PID:4700 -
C:\Windows\SysWOW64\Qojeabie.exeC:\Windows\system32\Qojeabie.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:3100 -
C:\Windows\SysWOW64\Albpff32.exeC:\Windows\system32\Albpff32.exe28⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\SysWOW64\Bomknp32.exeC:\Windows\system32\Bomknp32.exe29⤵
- Executes dropped EXE
PID:3080 -
C:\Windows\SysWOW64\Bnbeggmi.exeC:\Windows\system32\Bnbeggmi.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4436 -
C:\Windows\SysWOW64\Cgbppknb.exeC:\Windows\system32\Cgbppknb.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:4860 -
C:\Windows\SysWOW64\Dcpffk32.exeC:\Windows\system32\Dcpffk32.exe32⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\Enomic32.exeC:\Windows\system32\Enomic32.exe33⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\Enfcjb32.exeC:\Windows\system32\Enfcjb32.exe34⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\Fppchile.exeC:\Windows\system32\Fppchile.exe35⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\Gmnfglcd.exeC:\Windows\system32\Gmnfglcd.exe36⤵
- Executes dropped EXE
PID:3332 -
C:\Windows\SysWOW64\Hmdlhk32.exeC:\Windows\system32\Hmdlhk32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:400 -
C:\Windows\SysWOW64\Hpeejfjm.exeC:\Windows\system32\Hpeejfjm.exe38⤵
- Executes dropped EXE
PID:4900 -
C:\Windows\SysWOW64\Idmafc32.exeC:\Windows\system32\Idmafc32.exe39⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\SysWOW64\Jdfcla32.exeC:\Windows\system32\Jdfcla32.exe40⤵
- Executes dropped EXE
PID:3932 -
C:\Windows\SysWOW64\Knhkkfod.exeC:\Windows\system32\Knhkkfod.exe41⤵
- Executes dropped EXE
PID:4596 -
C:\Windows\SysWOW64\Lonnfg32.exeC:\Windows\system32\Lonnfg32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3880 -
C:\Windows\SysWOW64\Locgagli.exeC:\Windows\system32\Locgagli.exe43⤵
- Executes dropped EXE
PID:4812 -
C:\Windows\SysWOW64\Mqnfon32.exeC:\Windows\system32\Mqnfon32.exe44⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Pgdgodhj.exeC:\Windows\system32\Pgdgodhj.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:64 -
C:\Windows\SysWOW64\Qahkch32.exeC:\Windows\system32\Qahkch32.exe46⤵
- Executes dropped EXE
PID:2152 -
C:\Windows\SysWOW64\Aehpof32.exeC:\Windows\system32\Aehpof32.exe47⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\Appaangd.exeC:\Windows\system32\Appaangd.exe48⤵
- Executes dropped EXE
PID:1268 -
C:\Windows\SysWOW64\Bimoecio.exeC:\Windows\system32\Bimoecio.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\Bojhnjgf.exeC:\Windows\system32\Bojhnjgf.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3540 -
C:\Windows\SysWOW64\Ceppfbef.exeC:\Windows\system32\Ceppfbef.exe51⤵
- Executes dropped EXE
PID:116 -
C:\Windows\SysWOW64\Djgkbp32.exeC:\Windows\system32\Djgkbp32.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Ebnocpfp.exeC:\Windows\system32\Ebnocpfp.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:4876 -
C:\Windows\SysWOW64\Fmmffhnk.exeC:\Windows\system32\Fmmffhnk.exe54⤵
- Executes dropped EXE
PID:4492 -
C:\Windows\SysWOW64\Gfnnel32.exeC:\Windows\system32\Gfnnel32.exe55⤵
- Executes dropped EXE
PID:4712 -
C:\Windows\SysWOW64\Iaiddajo.exeC:\Windows\system32\Iaiddajo.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:1344 -
C:\Windows\SysWOW64\Kdalni32.exeC:\Windows\system32\Kdalni32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\Mpoljg32.exeC:\Windows\system32\Mpoljg32.exe58⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\Njjmil32.exeC:\Windows\system32\Njjmil32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3548 -
C:\Windows\SysWOW64\Nkijbooo.exeC:\Windows\system32\Nkijbooo.exe60⤵
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\Onhoehpp.exeC:\Windows\system32\Onhoehpp.exe61⤵
- Executes dropped EXE
PID:3736 -
C:\Windows\SysWOW64\Onklkhnn.exeC:\Windows\system32\Onklkhnn.exe62⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\Pkoldl32.exeC:\Windows\system32\Pkoldl32.exe63⤵
- Executes dropped EXE
PID:3512 -
C:\Windows\SysWOW64\Qcccom32.exeC:\Windows\system32\Qcccom32.exe64⤵
- Executes dropped EXE
PID:372 -
C:\Windows\SysWOW64\Adockl32.exeC:\Windows\system32\Adockl32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4756 -
C:\Windows\SysWOW64\Bagmpoco.exeC:\Windows\system32\Bagmpoco.exe66⤵PID:4936
-
C:\Windows\SysWOW64\Bhaeli32.exeC:\Windows\system32\Bhaeli32.exe67⤵PID:3232
-
C:\Windows\SysWOW64\Behbkmgb.exeC:\Windows\system32\Behbkmgb.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\Chpangnk.exeC:\Windows\system32\Chpangnk.exe69⤵PID:2436
-
C:\Windows\SysWOW64\Cajblmci.exeC:\Windows\system32\Cajblmci.exe70⤵PID:4264
-
C:\Windows\SysWOW64\Ddklnh32.exeC:\Windows\system32\Ddklnh32.exe71⤵PID:1896
-
C:\Windows\SysWOW64\Docmqp32.exeC:\Windows\system32\Docmqp32.exe72⤵PID:4724
-
C:\Windows\SysWOW64\Dccbln32.exeC:\Windows\system32\Dccbln32.exe73⤵PID:2496
-
C:\Windows\SysWOW64\Eddodfhp.exeC:\Windows\system32\Eddodfhp.exe74⤵PID:4364
-
C:\Windows\SysWOW64\Eocegn32.exeC:\Windows\system32\Eocegn32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1264 -
C:\Windows\SysWOW64\Gdlnkc32.exeC:\Windows\system32\Gdlnkc32.exe76⤵
- Modifies registry class
PID:4312 -
C:\Windows\SysWOW64\Goconkah.exeC:\Windows\system32\Goconkah.exe77⤵PID:5068
-
C:\Windows\SysWOW64\Hmoehojj.exeC:\Windows\system32\Hmoehojj.exe78⤵PID:2756
-
C:\Windows\SysWOW64\Hmhhnmao.exeC:\Windows\system32\Hmhhnmao.exe79⤵PID:1820
-
C:\Windows\SysWOW64\Jbgfca32.exeC:\Windows\system32\Jbgfca32.exe80⤵PID:4964
-
C:\Windows\SysWOW64\Kppphe32.exeC:\Windows\system32\Kppphe32.exe81⤵
- Modifies registry class
PID:528 -
C:\Windows\SysWOW64\Keabkkdg.exeC:\Windows\system32\Keabkkdg.exe82⤵PID:1288
-
C:\Windows\SysWOW64\Kedoqkbe.exeC:\Windows\system32\Kedoqkbe.exe83⤵
- Drops file in System32 directory
PID:988 -
C:\Windows\SysWOW64\Lgkakm32.exeC:\Windows\system32\Lgkakm32.exe84⤵PID:468
-
C:\Windows\SysWOW64\Mingbhon.exeC:\Windows\system32\Mingbhon.exe85⤵PID:4696
-
C:\Windows\SysWOW64\Ngmggj32.exeC:\Windows\system32\Ngmggj32.exe86⤵PID:4880
-
C:\Windows\SysWOW64\Opongobp.exeC:\Windows\system32\Opongobp.exe87⤵PID:3876
-
C:\Windows\SysWOW64\Pgpmdh32.exeC:\Windows\system32\Pgpmdh32.exe88⤵PID:1488
-
C:\Windows\SysWOW64\Pfgfkd32.exeC:\Windows\system32\Pfgfkd32.exe89⤵PID:4580
-
C:\Windows\SysWOW64\Qgllpf32.exeC:\Windows\system32\Qgllpf32.exe90⤵PID:2216
-
C:\Windows\SysWOW64\Afeblb32.exeC:\Windows\system32\Afeblb32.exe91⤵PID:3532
-
C:\Windows\SysWOW64\Bjokno32.exeC:\Windows\system32\Bjokno32.exe92⤵
- Drops file in System32 directory
PID:4800 -
C:\Windows\SysWOW64\Baickimp.exeC:\Windows\system32\Baickimp.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:228 -
C:\Windows\SysWOW64\Bmbpeiaa.exeC:\Windows\system32\Bmbpeiaa.exe94⤵PID:1720
-
C:\Windows\SysWOW64\Celelf32.exeC:\Windows\system32\Celelf32.exe95⤵
- Modifies registry class
PID:3344 -
C:\Windows\SysWOW64\Cfmacoep.exeC:\Windows\system32\Cfmacoep.exe96⤵PID:756
-
C:\Windows\SysWOW64\Cmgjpi32.exeC:\Windows\system32\Cmgjpi32.exe97⤵PID:3780
-
C:\Windows\SysWOW64\Ceqngekl.exeC:\Windows\system32\Ceqngekl.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4700 -
C:\Windows\SysWOW64\Dfknem32.exeC:\Windows\system32\Dfknem32.exe99⤵PID:4316
-
C:\Windows\SysWOW64\Dmefafql.exeC:\Windows\system32\Dmefafql.exe100⤵
- Drops file in System32 directory
PID:2112 -
C:\Windows\SysWOW64\Egbdekcg.exeC:\Windows\system32\Egbdekcg.exe101⤵PID:2144
-
C:\Windows\SysWOW64\Edhado32.exeC:\Windows\system32\Edhado32.exe102⤵
- Drops file in System32 directory
PID:4196 -
C:\Windows\SysWOW64\Fkiobhac.exeC:\Windows\system32\Fkiobhac.exe103⤵PID:5092
-
C:\Windows\SysWOW64\Fajnoabh.exeC:\Windows\system32\Fajnoabh.exe104⤵PID:2040
-
C:\Windows\SysWOW64\Gkeonggf.exeC:\Windows\system32\Gkeonggf.exe105⤵
- Modifies registry class
PID:2228 -
C:\Windows\SysWOW64\Goediekj.exeC:\Windows\system32\Goediekj.exe106⤵PID:2240
-
C:\Windows\SysWOW64\Gfomfo32.exeC:\Windows\system32\Gfomfo32.exe107⤵PID:4860
-
C:\Windows\SysWOW64\Hdlphjaf.exeC:\Windows\system32\Hdlphjaf.exe108⤵PID:784
-
C:\Windows\SysWOW64\Ikokkc32.exeC:\Windows\system32\Ikokkc32.exe109⤵PID:1168
-
C:\Windows\SysWOW64\Jbgoik32.exeC:\Windows\system32\Jbgoik32.exe110⤵PID:3076
-
C:\Windows\SysWOW64\Jlocaabf.exeC:\Windows\system32\Jlocaabf.exe111⤵PID:1056
-
C:\Windows\SysWOW64\Kfehoj32.exeC:\Windows\system32\Kfehoj32.exe112⤵PID:5124
-
C:\Windows\SysWOW64\Kgfdfbhj.exeC:\Windows\system32\Kgfdfbhj.exe113⤵
- Drops file in System32 directory
PID:5164 -
C:\Windows\SysWOW64\Knpmcl32.exeC:\Windows\system32\Knpmcl32.exe114⤵PID:5200
-
C:\Windows\SysWOW64\Kejepfgd.exeC:\Windows\system32\Kejepfgd.exe115⤵PID:5248
-
C:\Windows\SysWOW64\Kldmmp32.exeC:\Windows\system32\Kldmmp32.exe116⤵PID:5292
-
C:\Windows\SysWOW64\Kpbfbo32.exeC:\Windows\system32\Kpbfbo32.exe117⤵
- Modifies registry class
PID:5344 -
C:\Windows\SysWOW64\Lfcdph32.exeC:\Windows\system32\Lfcdph32.exe118⤵PID:5384
-
C:\Windows\SysWOW64\Llpmhodc.exeC:\Windows\system32\Llpmhodc.exe119⤵
- Drops file in System32 directory
- Modifies registry class
PID:5432 -
C:\Windows\SysWOW64\Lfeaegdi.exeC:\Windows\system32\Lfeaegdi.exe120⤵PID:5476
-
C:\Windows\SysWOW64\Mlpeol32.exeC:\Windows\system32\Mlpeol32.exe121⤵PID:5516
-
C:\Windows\SysWOW64\Mfejme32.exeC:\Windows\system32\Mfejme32.exe122⤵PID:5552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-