Analysis
-
max time kernel
159s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 14:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.94c3a7fa8de4071ddd1bd4e4ab51d565.exe
Resource
win7-20231025-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.94c3a7fa8de4071ddd1bd4e4ab51d565.exe
Resource
win10v2004-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.94c3a7fa8de4071ddd1bd4e4ab51d565.exe
-
Size
364KB
-
MD5
94c3a7fa8de4071ddd1bd4e4ab51d565
-
SHA1
ea3ffbad97b202747b30ec9a075f355085b32a4d
-
SHA256
b477a493b48be34256d6e710ae2735d578b6b6471f12d73d84d705867cf31b05
-
SHA512
e6e2cfe1df95a624ad24f657abdc11f08264a44c083095fa5a77f33376708ae502782f6765059659735ff8bc932fda31b3554c78fbbfd8f334e3b1283aedc2e9
-
SSDEEP
6144:1H7cpF6sFj5tT3sFDg2KIZAZCZTyjsFj5tT3sF:h7hs15tLs1g2KIZAZCZ+s15tLs
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkoaagmh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbjlpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efccfojn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekggijge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fenhcnaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gklcpqab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbjhelnp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egkgljkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dahmoefm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbcnmogm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Diknnlbi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbgbpp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nphhfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adfnhlfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkgekock.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nobldfio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddolpkhm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilcbhm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Einckibc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ephlgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plbfohbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eopjakkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekcplp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcepfj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pkhofold.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cplceg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eenfff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmpclnof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hnfohj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbnngi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbjeei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkpgooim.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddolpkhm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pigfdcoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agojdnng.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghnibj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Liocgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnlloj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmofmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iljhhlgo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aihoka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjqkel32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iljhhlgo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eleiffho.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnkhcjbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lknjbdad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhpjbgne.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bcddlhgo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbicjlji.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egfdhokj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhppcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffclml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jelogq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcmjaloi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pllppnnm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dildibfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kaophp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Peqcodce.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nojagf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egqeckkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eleiffho.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ephlgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfbkijdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjneec32.exe -
Executes dropped EXE 64 IoCs
pid Process 3256 Gbjlgj32.exe 1012 Npighq32.exe 4204 Ofalfi32.exe 3512 Pllppnnm.exe 3948 Cqfahh32.exe 2696 Dqdnjfpc.exe 4944 Fjdajhbi.exe 4872 Hmcfma32.exe 4624 Ikbfbdgf.exe 2296 Jhpjbgne.exe 4848 Kkjejqcl.exe 2372 Llqhdb32.exe 4816 Nbepdfnc.exe 4868 Plbfohbl.exe 2012 Agojdnng.exe 1776 Dnjdncio.exe 4276 Eopjakkg.exe 1660 Eqbcqnph.exe 4844 Ecblbi32.exe 2444 Gablgk32.exe 1080 Gaibhj32.exe 4496 Hdlhoefk.exe 2556 Igmjhnej.exe 2732 Jpoagb32.exe 4572 Kgkfil32.exe 3356 Kgbljkca.exe 2240 Ladpcb32.exe 3564 Mkoaagmh.exe 4536 Mnojcb32.exe 2336 Nkjqme32.exe 4724 Peonhg32.exe 5096 Cediab32.exe 4388 Dcdifdem.exe 2000 Eoocfegl.exe 3228 Efnennjc.exe 4524 Foifmcoa.exe 2480 Gbjhelnp.exe 4760 Hjeiai32.exe 3808 Hcnnjoam.exe 3616 Iiffoc32.exe 1312 Mgggaamn.exe 3888 Peimcaae.exe 3852 Ajikhfpg.exe 4036 Cellfm32.exe 1256 Chbncg32.exe 3672 Cbgbpp32.exe 3812 Dogfkpih.exe 3748 Elkfed32.exe 524 Ekcplp32.exe 4432 Ecjhmm32.exe 4252 Ekhjgoga.exe 1364 Ickcaf32.exe 4164 Jcefgeif.exe 3772 Jpkfmfok.exe 4312 Kihdqkaf.exe 4996 Kfmejopp.exe 2836 Libggiik.exe 4632 Lbjlpo32.exe 4176 Mdckpqod.exe 560 Nphhfp32.exe 1672 Nfeqnf32.exe 4748 Odmgmmhf.exe 2224 Ocbdni32.exe 4948 Pfeiedhm.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Anodai32.dll Nobldfio.exe File opened for modification C:\Windows\SysWOW64\Nojagf32.exe Nockfgao.exe File created C:\Windows\SysWOW64\Cllhdh32.dll Kahihagd.exe File created C:\Windows\SysWOW64\Hebpje32.dll Kilpgnfi.exe File created C:\Windows\SysWOW64\Hlnqfanb.exe Gkfnnjnl.exe File opened for modification C:\Windows\SysWOW64\Aajggjap.exe Akkfop32.exe File created C:\Windows\SysWOW64\Kqinhi32.dll Ppgofcff.exe File created C:\Windows\SysWOW64\Dcdifdem.exe Cediab32.exe File created C:\Windows\SysWOW64\Lcpjjinf.dll Hnkhcjbc.exe File created C:\Windows\SysWOW64\Pgoijppn.dll Cdhmjc32.exe File created C:\Windows\SysWOW64\Ndpelmaa.dll Ihlechfj.exe File created C:\Windows\SysWOW64\Kahihagd.exe Kknakg32.exe File created C:\Windows\SysWOW64\Dbklan32.dll Ldbepklj.exe File created C:\Windows\SysWOW64\Gbjhelnp.exe Foifmcoa.exe File opened for modification C:\Windows\SysWOW64\Enmjedpa.exe Eqiilp32.exe File created C:\Windows\SysWOW64\Loekic32.dll Ccmcaicm.exe File created C:\Windows\SysWOW64\Jlanikqg.exe Jaljlb32.exe File opened for modification C:\Windows\SysWOW64\Gcbgom32.exe Flhobcgj.exe File created C:\Windows\SysWOW64\Dogfkpih.exe Cbgbpp32.exe File opened for modification C:\Windows\SysWOW64\Eajehd32.exe Daqbbe32.exe File opened for modification C:\Windows\SysWOW64\Bemqcngl.exe Aefjbo32.exe File created C:\Windows\SysWOW64\Ekggijge.exe Eqbclagp.exe File created C:\Windows\SysWOW64\Nfgekkna.dll Kogqff32.exe File created C:\Windows\SysWOW64\Dllfpg32.exe Dfongpab.exe File created C:\Windows\SysWOW64\Ffihqa32.dll Kgkfil32.exe File created C:\Windows\SysWOW64\Ffclml32.exe Fdccka32.exe File opened for modification C:\Windows\SysWOW64\Mmkkgh32.exe Kgipmdmn.exe File created C:\Windows\SysWOW64\Jebfgl32.exe Ilglbjbl.exe File created C:\Windows\SysWOW64\Mnojcb32.exe Mkoaagmh.exe File opened for modification C:\Windows\SysWOW64\Lnbkeclf.exe Lbinkb32.exe File opened for modification C:\Windows\SysWOW64\Gpmofe32.exe Gegkilik.exe File opened for modification C:\Windows\SysWOW64\Ilcbhm32.exe Ibknohff.exe File created C:\Windows\SysWOW64\Gfpdoj32.dll Lbjeei32.exe File created C:\Windows\SysWOW64\Mmkkgh32.exe Kgipmdmn.exe File opened for modification C:\Windows\SysWOW64\Acdiii32.exe Acbmcima.exe File created C:\Windows\SysWOW64\Njebknkf.dll Bmddbm32.exe File created C:\Windows\SysWOW64\Peonhg32.exe Nkjqme32.exe File created C:\Windows\SysWOW64\Eiacljhl.dll Mmkkgh32.exe File created C:\Windows\SysWOW64\Meaghmgc.dll Hnfohj32.exe File created C:\Windows\SysWOW64\Leabincm.exe Lklnle32.exe File created C:\Windows\SysWOW64\Njjmgo32.exe Nijqml32.exe File created C:\Windows\SysWOW64\Fbolkgkl.dll Njjmgo32.exe File created C:\Windows\SysWOW64\Ojnfbnbl.exe Obebla32.exe File created C:\Windows\SysWOW64\Gqfochal.exe Fkjfkacd.exe File created C:\Windows\SysWOW64\Hmbfom32.dll Dcdifdem.exe File opened for modification C:\Windows\SysWOW64\Badipiae.exe Aclpkffa.exe File created C:\Windows\SysWOW64\Kllhqkbm.dll Gpmofe32.exe File created C:\Windows\SysWOW64\Nijqml32.exe Nobldfio.exe File opened for modification C:\Windows\SysWOW64\Eennoknp.exe Eleiffho.exe File created C:\Windows\SysWOW64\Hjnnbo32.dll Einckibc.exe File created C:\Windows\SysWOW64\Kdalim32.exe Jjihpgcl.exe File created C:\Windows\SysWOW64\Mmfgln32.dll Cplceg32.exe File opened for modification C:\Windows\SysWOW64\Hcnnjoam.exe Hjeiai32.exe File created C:\Windows\SysWOW64\Kikgkn32.dll Hpkcafjg.exe File created C:\Windows\SysWOW64\Hepqag32.dll Fnffam32.exe File created C:\Windows\SysWOW64\Jelogq32.exe Jldkokod.exe File opened for modification C:\Windows\SysWOW64\Cqfahh32.exe Pllppnnm.exe File opened for modification C:\Windows\SysWOW64\Dqdnjfpc.exe Cqfahh32.exe File opened for modification C:\Windows\SysWOW64\Fenhcnaf.exe Fbkblb32.exe File created C:\Windows\SysWOW64\Idmfoj32.dll Mlpeol32.exe File created C:\Windows\SysWOW64\Ghmbhd32.exe Gdmmlf32.exe File opened for modification C:\Windows\SysWOW64\Bkjpek32.exe Bjicnbba.exe File opened for modification C:\Windows\SysWOW64\Ojnfbnbl.exe Obebla32.exe File opened for modification C:\Windows\SysWOW64\Pllppnnm.exe Ofalfi32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldbepklj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcekkh32.dll" Cehkmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Plbfohbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmimgd32.dll" Gnjjpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Belgbbnd.dll" Ibnaonhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfqjhj32.dll" Jejbba32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eikfej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gaibhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Poackh32.dll" Jphcmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnffam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aageodnp.dll" Aiabap32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bicogo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecblbi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkehdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pcabkgce.dll" Cpjmjn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfiobm32.dll" Fqbehh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enbhpkpn.dll" Jhpjbgne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dildibfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipabdl32.dll" Iiffoc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdpgen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hajpli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdkcggam.dll" Acbmcima.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gogiac32.dll" Gaibhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjnccd32.dll" Ecjhmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idbmkn32.dll" Daqbbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkjoao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jphcmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmfqhmid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ephlgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkjejqcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Foclpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddolpkhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iqmincia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbcnmogm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkjqme32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Holjjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndpelmaa.dll" Ihlechfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nijqml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fflngpbn.dll" Bkgekock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agmeld32.dll" Dildibfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecnednbm.dll" Peqcodce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjfdcbhf.dll" Pbddhhbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Plbfohbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pfeiedhm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kqkeoama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgfkfg32.dll" Geohdago.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjpppipq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kgipmdmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Obebla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dejnbf32.dll" Hajpli32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mldmlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pcmjaloi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Agojdnng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pacfdila.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phlqlgmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkgekock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fodkoepa.dll" Aefjbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agmheb32.dll" Pbcnmogm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kogqff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dipgik32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chbncg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caadnc32.dll" Kgipmdmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iakadh32.dll" Qicepaef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hegmec32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 3256 4704 NEAS.94c3a7fa8de4071ddd1bd4e4ab51d565.exe 93 PID 4704 wrote to memory of 3256 4704 NEAS.94c3a7fa8de4071ddd1bd4e4ab51d565.exe 93 PID 4704 wrote to memory of 3256 4704 NEAS.94c3a7fa8de4071ddd1bd4e4ab51d565.exe 93 PID 3256 wrote to memory of 1012 3256 Gbjlgj32.exe 94 PID 3256 wrote to memory of 1012 3256 Gbjlgj32.exe 94 PID 3256 wrote to memory of 1012 3256 Gbjlgj32.exe 94 PID 1012 wrote to memory of 4204 1012 Npighq32.exe 96 PID 1012 wrote to memory of 4204 1012 Npighq32.exe 96 PID 1012 wrote to memory of 4204 1012 Npighq32.exe 96 PID 4204 wrote to memory of 3512 4204 Ofalfi32.exe 97 PID 4204 wrote to memory of 3512 4204 Ofalfi32.exe 97 PID 4204 wrote to memory of 3512 4204 Ofalfi32.exe 97 PID 3512 wrote to memory of 3948 3512 Pllppnnm.exe 98 PID 3512 wrote to memory of 3948 3512 Pllppnnm.exe 98 PID 3512 wrote to memory of 3948 3512 Pllppnnm.exe 98 PID 3948 wrote to memory of 2696 3948 Cqfahh32.exe 99 PID 3948 wrote to memory of 2696 3948 Cqfahh32.exe 99 PID 3948 wrote to memory of 2696 3948 Cqfahh32.exe 99 PID 2696 wrote to memory of 4944 2696 Dqdnjfpc.exe 100 PID 2696 wrote to memory of 4944 2696 Dqdnjfpc.exe 100 PID 2696 wrote to memory of 4944 2696 Dqdnjfpc.exe 100 PID 4944 wrote to memory of 4872 4944 Fjdajhbi.exe 101 PID 4944 wrote to memory of 4872 4944 Fjdajhbi.exe 101 PID 4944 wrote to memory of 4872 4944 Fjdajhbi.exe 101 PID 4872 wrote to memory of 4624 4872 Hmcfma32.exe 102 PID 4872 wrote to memory of 4624 4872 Hmcfma32.exe 102 PID 4872 wrote to memory of 4624 4872 Hmcfma32.exe 102 PID 4624 wrote to memory of 2296 4624 Ikbfbdgf.exe 103 PID 4624 wrote to memory of 2296 4624 Ikbfbdgf.exe 103 PID 4624 wrote to memory of 2296 4624 Ikbfbdgf.exe 103 PID 2296 wrote to memory of 4848 2296 Jhpjbgne.exe 104 PID 2296 wrote to memory of 4848 2296 Jhpjbgne.exe 104 PID 2296 wrote to memory of 4848 2296 Jhpjbgne.exe 104 PID 4848 wrote to memory of 2372 4848 Kkjejqcl.exe 105 PID 4848 wrote to memory of 2372 4848 Kkjejqcl.exe 105 PID 4848 wrote to memory of 2372 4848 Kkjejqcl.exe 105 PID 2372 wrote to memory of 4816 2372 Llqhdb32.exe 106 PID 2372 wrote to memory of 4816 2372 Llqhdb32.exe 106 PID 2372 wrote to memory of 4816 2372 Llqhdb32.exe 106 PID 4816 wrote to memory of 4868 4816 Nbepdfnc.exe 107 PID 4816 wrote to memory of 4868 4816 Nbepdfnc.exe 107 PID 4816 wrote to memory of 4868 4816 Nbepdfnc.exe 107 PID 4868 wrote to memory of 2012 4868 Plbfohbl.exe 108 PID 4868 wrote to memory of 2012 4868 Plbfohbl.exe 108 PID 4868 wrote to memory of 2012 4868 Plbfohbl.exe 108 PID 2012 wrote to memory of 1776 2012 Agojdnng.exe 109 PID 2012 wrote to memory of 1776 2012 Agojdnng.exe 109 PID 2012 wrote to memory of 1776 2012 Agojdnng.exe 109 PID 1776 wrote to memory of 4276 1776 Dnjdncio.exe 110 PID 1776 wrote to memory of 4276 1776 Dnjdncio.exe 110 PID 1776 wrote to memory of 4276 1776 Dnjdncio.exe 110 PID 4276 wrote to memory of 1660 4276 Eopjakkg.exe 111 PID 4276 wrote to memory of 1660 4276 Eopjakkg.exe 111 PID 4276 wrote to memory of 1660 4276 Eopjakkg.exe 111 PID 1660 wrote to memory of 4844 1660 Eqbcqnph.exe 112 PID 1660 wrote to memory of 4844 1660 Eqbcqnph.exe 112 PID 1660 wrote to memory of 4844 1660 Eqbcqnph.exe 112 PID 4844 wrote to memory of 2444 4844 Ecblbi32.exe 113 PID 4844 wrote to memory of 2444 4844 Ecblbi32.exe 113 PID 4844 wrote to memory of 2444 4844 Ecblbi32.exe 113 PID 2444 wrote to memory of 1080 2444 Gablgk32.exe 114 PID 2444 wrote to memory of 1080 2444 Gablgk32.exe 114 PID 2444 wrote to memory of 1080 2444 Gablgk32.exe 114 PID 1080 wrote to memory of 4496 1080 Gaibhj32.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.94c3a7fa8de4071ddd1bd4e4ab51d565.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.94c3a7fa8de4071ddd1bd4e4ab51d565.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\Gbjlgj32.exeC:\Windows\system32\Gbjlgj32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\Npighq32.exeC:\Windows\system32\Npighq32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\Ofalfi32.exeC:\Windows\system32\Ofalfi32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\Pllppnnm.exeC:\Windows\system32\Pllppnnm.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\Cqfahh32.exeC:\Windows\system32\Cqfahh32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\Dqdnjfpc.exeC:\Windows\system32\Dqdnjfpc.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Fjdajhbi.exeC:\Windows\system32\Fjdajhbi.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\Hmcfma32.exeC:\Windows\system32\Hmcfma32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\Ikbfbdgf.exeC:\Windows\system32\Ikbfbdgf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\Jhpjbgne.exeC:\Windows\system32\Jhpjbgne.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\Kkjejqcl.exeC:\Windows\system32\Kkjejqcl.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\Llqhdb32.exeC:\Windows\system32\Llqhdb32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\Nbepdfnc.exeC:\Windows\system32\Nbepdfnc.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\Plbfohbl.exeC:\Windows\system32\Plbfohbl.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\Agojdnng.exeC:\Windows\system32\Agojdnng.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\Dnjdncio.exeC:\Windows\system32\Dnjdncio.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\Eopjakkg.exeC:\Windows\system32\Eopjakkg.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\Eqbcqnph.exeC:\Windows\system32\Eqbcqnph.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\Ecblbi32.exeC:\Windows\system32\Ecblbi32.exe20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\Gablgk32.exeC:\Windows\system32\Gablgk32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\Gaibhj32.exeC:\Windows\system32\Gaibhj32.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\Hdlhoefk.exeC:\Windows\system32\Hdlhoefk.exe23⤵
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\Igmjhnej.exeC:\Windows\system32\Igmjhnej.exe24⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\Jpoagb32.exeC:\Windows\system32\Jpoagb32.exe25⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\Kgkfil32.exeC:\Windows\system32\Kgkfil32.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4572 -
C:\Windows\SysWOW64\Kgbljkca.exeC:\Windows\system32\Kgbljkca.exe27⤵
- Executes dropped EXE
PID:3356 -
C:\Windows\SysWOW64\Ladpcb32.exeC:\Windows\system32\Ladpcb32.exe28⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\Mkoaagmh.exeC:\Windows\system32\Mkoaagmh.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3564 -
C:\Windows\SysWOW64\Mnojcb32.exeC:\Windows\system32\Mnojcb32.exe30⤵
- Executes dropped EXE
PID:4536 -
C:\Windows\SysWOW64\Nkjqme32.exeC:\Windows\system32\Nkjqme32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2336 -
C:\Windows\SysWOW64\Peonhg32.exeC:\Windows\system32\Peonhg32.exe32⤵
- Executes dropped EXE
PID:4724 -
C:\Windows\SysWOW64\Cediab32.exeC:\Windows\system32\Cediab32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5096 -
C:\Windows\SysWOW64\Dcdifdem.exeC:\Windows\system32\Dcdifdem.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4388 -
C:\Windows\SysWOW64\Eoocfegl.exeC:\Windows\system32\Eoocfegl.exe35⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\Efnennjc.exeC:\Windows\system32\Efnennjc.exe36⤵
- Executes dropped EXE
PID:3228 -
C:\Windows\SysWOW64\Foifmcoa.exeC:\Windows\system32\Foifmcoa.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4524 -
C:\Windows\SysWOW64\Gbjhelnp.exeC:\Windows\system32\Gbjhelnp.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2480 -
C:\Windows\SysWOW64\Hjeiai32.exeC:\Windows\system32\Hjeiai32.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4760 -
C:\Windows\SysWOW64\Hcnnjoam.exeC:\Windows\system32\Hcnnjoam.exe40⤵
- Executes dropped EXE
PID:3808 -
C:\Windows\SysWOW64\Iiffoc32.exeC:\Windows\system32\Iiffoc32.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:3616 -
C:\Windows\SysWOW64\Mgggaamn.exeC:\Windows\system32\Mgggaamn.exe42⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SysWOW64\Peimcaae.exeC:\Windows\system32\Peimcaae.exe43⤵
- Executes dropped EXE
PID:3888 -
C:\Windows\SysWOW64\Ajikhfpg.exeC:\Windows\system32\Ajikhfpg.exe44⤵
- Executes dropped EXE
PID:3852 -
C:\Windows\SysWOW64\Cellfm32.exeC:\Windows\system32\Cellfm32.exe45⤵
- Executes dropped EXE
PID:4036 -
C:\Windows\SysWOW64\Chbncg32.exeC:\Windows\system32\Chbncg32.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:1256 -
C:\Windows\SysWOW64\Cbgbpp32.exeC:\Windows\system32\Cbgbpp32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3672 -
C:\Windows\SysWOW64\Dogfkpih.exeC:\Windows\system32\Dogfkpih.exe48⤵
- Executes dropped EXE
PID:3812 -
C:\Windows\SysWOW64\Elkfed32.exeC:\Windows\system32\Elkfed32.exe49⤵
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\Ekcplp32.exeC:\Windows\system32\Ekcplp32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:524 -
C:\Windows\SysWOW64\Ecjhmm32.exeC:\Windows\system32\Ecjhmm32.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:4432 -
C:\Windows\SysWOW64\Ekhjgoga.exeC:\Windows\system32\Ekhjgoga.exe52⤵
- Executes dropped EXE
PID:4252 -
C:\Windows\SysWOW64\Ickcaf32.exeC:\Windows\system32\Ickcaf32.exe53⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\Jcefgeif.exeC:\Windows\system32\Jcefgeif.exe54⤵
- Executes dropped EXE
PID:4164 -
C:\Windows\SysWOW64\Jpkfmfok.exeC:\Windows\system32\Jpkfmfok.exe55⤵
- Executes dropped EXE
PID:3772 -
C:\Windows\SysWOW64\Kihdqkaf.exeC:\Windows\system32\Kihdqkaf.exe56⤵
- Executes dropped EXE
PID:4312 -
C:\Windows\SysWOW64\Kfmejopp.exeC:\Windows\system32\Kfmejopp.exe57⤵
- Executes dropped EXE
PID:4996 -
C:\Windows\SysWOW64\Libggiik.exeC:\Windows\system32\Libggiik.exe58⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Lbjlpo32.exeC:\Windows\system32\Lbjlpo32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4632 -
C:\Windows\SysWOW64\Mdckpqod.exeC:\Windows\system32\Mdckpqod.exe60⤵
- Executes dropped EXE
PID:4176 -
C:\Windows\SysWOW64\Nphhfp32.exeC:\Windows\system32\Nphhfp32.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:560 -
C:\Windows\SysWOW64\Nfeqnf32.exeC:\Windows\system32\Nfeqnf32.exe62⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\Odmgmmhf.exeC:\Windows\system32\Odmgmmhf.exe63⤵
- Executes dropped EXE
PID:4748 -
C:\Windows\SysWOW64\Ocbdni32.exeC:\Windows\system32\Ocbdni32.exe64⤵
- Executes dropped EXE
PID:2224 -
C:\Windows\SysWOW64\Pfeiedhm.exeC:\Windows\system32\Pfeiedhm.exe65⤵
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Windows\SysWOW64\Pnakaa32.exeC:\Windows\system32\Pnakaa32.exe66⤵PID:1504
-
C:\Windows\SysWOW64\Aclpkffa.exeC:\Windows\system32\Aclpkffa.exe67⤵
- Drops file in System32 directory
PID:764 -
C:\Windows\SysWOW64\Badipiae.exeC:\Windows\system32\Badipiae.exe68⤵PID:3272
-
C:\Windows\SysWOW64\Bjokno32.exeC:\Windows\system32\Bjokno32.exe69⤵PID:2944
-
C:\Windows\SysWOW64\Cjfaon32.exeC:\Windows\system32\Cjfaon32.exe70⤵PID:1932
-
C:\Windows\SysWOW64\Cfdhdn32.exeC:\Windows\system32\Cfdhdn32.exe71⤵PID:4184
-
C:\Windows\SysWOW64\Dkgjekai.exeC:\Windows\system32\Dkgjekai.exe72⤵PID:1488
-
C:\Windows\SysWOW64\Daqbbe32.exeC:\Windows\system32\Daqbbe32.exe73⤵
- Drops file in System32 directory
- Modifies registry class
PID:3116 -
C:\Windows\SysWOW64\Eajehd32.exeC:\Windows\system32\Eajehd32.exe74⤵PID:2924
-
C:\Windows\SysWOW64\Eopbghnb.exeC:\Windows\system32\Eopbghnb.exe75⤵PID:2256
-
C:\Windows\SysWOW64\Egkgljkm.exeC:\Windows\system32\Egkgljkm.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2796 -
C:\Windows\SysWOW64\Fdpgen32.exeC:\Windows\system32\Fdpgen32.exe77⤵
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\Gkcbhgii.exeC:\Windows\system32\Gkcbhgii.exe78⤵PID:2088
-
C:\Windows\SysWOW64\Ghnibj32.exeC:\Windows\system32\Ghnibj32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3696 -
C:\Windows\SysWOW64\Gnkajapa.exeC:\Windows\system32\Gnkajapa.exe80⤵PID:2372
-
C:\Windows\SysWOW64\Hbhjqp32.exeC:\Windows\system32\Hbhjqp32.exe81⤵PID:4008
-
C:\Windows\SysWOW64\Holjjd32.exeC:\Windows\system32\Holjjd32.exe82⤵
- Modifies registry class
PID:2540 -
C:\Windows\SysWOW64\Hkehdd32.exeC:\Windows\system32\Hkehdd32.exe83⤵
- Modifies registry class
PID:4576 -
C:\Windows\SysWOW64\Hbppaopp.exeC:\Windows\system32\Hbppaopp.exe84⤵PID:5012
-
C:\Windows\SysWOW64\Ihlechfj.exeC:\Windows\system32\Ihlechfj.exe85⤵
- Drops file in System32 directory
- Modifies registry class
PID:4872 -
C:\Windows\SysWOW64\Ibdiln32.exeC:\Windows\system32\Ibdiln32.exe86⤵PID:1044
-
C:\Windows\SysWOW64\Ifglmlol.exeC:\Windows\system32\Ifglmlol.exe87⤵PID:4276
-
C:\Windows\SysWOW64\Jgmapcqe.exeC:\Windows\system32\Jgmapcqe.exe88⤵PID:2896
-
C:\Windows\SysWOW64\Jeqbjgoo.exeC:\Windows\system32\Jeqbjgoo.exe89⤵PID:2444
-
C:\Windows\SysWOW64\Jpffgp32.exeC:\Windows\system32\Jpffgp32.exe90⤵PID:396
-
C:\Windows\SysWOW64\Jecoog32.exeC:\Windows\system32\Jecoog32.exe91⤵PID:4228
-
C:\Windows\SysWOW64\Jphcmp32.exeC:\Windows\system32\Jphcmp32.exe92⤵
- Modifies registry class
PID:3716 -
C:\Windows\SysWOW64\Jfbkijdo.exeC:\Windows\system32\Jfbkijdo.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4172 -
C:\Windows\SysWOW64\Jbilnkjc.exeC:\Windows\system32\Jbilnkjc.exe94⤵PID:2004
-
C:\Windows\SysWOW64\Kppimogj.exeC:\Windows\system32\Kppimogj.exe95⤵PID:4644
-
C:\Windows\SysWOW64\Kfiajinf.exeC:\Windows\system32\Kfiajinf.exe96⤵PID:2360
-
C:\Windows\SysWOW64\Liocgc32.exeC:\Windows\system32\Liocgc32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4404 -
C:\Windows\SysWOW64\Lnlloj32.exeC:\Windows\system32\Lnlloj32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1508 -
C:\Windows\SysWOW64\Lhdqhp32.exeC:\Windows\system32\Lhdqhp32.exe99⤵PID:4364
-
C:\Windows\SysWOW64\Lbjeei32.exeC:\Windows\system32\Lbjeei32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4352 -
C:\Windows\SysWOW64\Lldfcn32.exeC:\Windows\system32\Lldfcn32.exe101⤵PID:3456
-
C:\Windows\SysWOW64\Lbnnphhk.exeC:\Windows\system32\Lbnnphhk.exe102⤵PID:744
-
C:\Windows\SysWOW64\Mhppcn32.exeC:\Windows\system32\Mhppcn32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3348 -
C:\Windows\SysWOW64\Mefmbbod.exeC:\Windows\system32\Mefmbbod.exe104⤵PID:1456
-
C:\Windows\SysWOW64\Mlpeol32.exeC:\Windows\system32\Mlpeol32.exe105⤵
- Drops file in System32 directory
PID:5172 -
C:\Windows\SysWOW64\Nifcnpch.exeC:\Windows\system32\Nifcnpch.exe106⤵PID:5216
-
C:\Windows\SysWOW64\Nockfgao.exeC:\Windows\system32\Nockfgao.exe107⤵
- Drops file in System32 directory
PID:5268 -
C:\Windows\SysWOW64\Nojagf32.exeC:\Windows\system32\Nojagf32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5480 -
C:\Windows\SysWOW64\Gdmmlf32.exeC:\Windows\system32\Gdmmlf32.exe109⤵
- Drops file in System32 directory
PID:5540 -
C:\Windows\SysWOW64\Ghmbhd32.exeC:\Windows\system32\Ghmbhd32.exe110⤵PID:5584
-
C:\Windows\SysWOW64\Gnjjpk32.exeC:\Windows\system32\Gnjjpk32.exe111⤵
- Modifies registry class
PID:5628 -
C:\Windows\SysWOW64\Hjqkel32.exeC:\Windows\system32\Hjqkel32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5672 -
C:\Windows\SysWOW64\Hpkcafjg.exeC:\Windows\system32\Hpkcafjg.exe113⤵
- Drops file in System32 directory
PID:5712 -
C:\Windows\SysWOW64\Hkpgooim.exeC:\Windows\system32\Hkpgooim.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5756 -
C:\Windows\SysWOW64\Hajpli32.exeC:\Windows\system32\Hajpli32.exe115⤵
- Modifies registry class
PID:5860 -
C:\Windows\SysWOW64\Iqmincia.exeC:\Windows\system32\Iqmincia.exe116⤵
- Modifies registry class
PID:5944 -
C:\Windows\SysWOW64\Jipqkopf.exeC:\Windows\system32\Jipqkopf.exe117⤵PID:5980
-
C:\Windows\SysWOW64\Kqkeoama.exeC:\Windows\system32\Kqkeoama.exe118⤵
- Modifies registry class
PID:6032 -
C:\Windows\SysWOW64\Kilpgnfi.exeC:\Windows\system32\Kilpgnfi.exe119⤵
- Drops file in System32 directory
PID:6076 -
C:\Windows\SysWOW64\Lnihod32.exeC:\Windows\system32\Lnihod32.exe120⤵PID:6124
-
C:\Windows\SysWOW64\Llofnh32.exeC:\Windows\system32\Llofnh32.exe121⤵PID:5124
-
C:\Windows\SysWOW64\Lbinkb32.exeC:\Windows\system32\Lbinkb32.exe122⤵
- Drops file in System32 directory
PID:5136
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-