Analysis
-
max time kernel
168s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 14:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.e19c9bbc9aa157324c3dc14893b2af58.exe
Resource
win7-20231020-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.e19c9bbc9aa157324c3dc14893b2af58.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
NEAS.e19c9bbc9aa157324c3dc14893b2af58.exe
-
Size
182KB
-
MD5
e19c9bbc9aa157324c3dc14893b2af58
-
SHA1
dc42f27ba8340f9dfae0f881ea3de79af245721d
-
SHA256
d362c676aa67eaa64176a3895ec468205db365c3120b8cdf6bbc8ae8204d6834
-
SHA512
97fa622f4d1a2a5cb4bbbdd730894bb259118dc08baebef30edd2ccca876ce09d4d2aa7b26170b498bdac6fda94397315f3b2b0574e938aa7eec8e441f05d37f
-
SSDEEP
3072:GBKxtSSvO8x8Z9mP0j0dG6YjYDDC1CZmXG5X3ZZWlpLWX0j0dG6YjYDDC1CZ:G+S6CZ9mPs0IjwmXG5X3ZoiXs0Ijw
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecbecfqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikkppgld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iipfgm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eaaikn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnhjinpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkmebh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkgekock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgiflnoa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djegoanj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmbflc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjponk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncgiolkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipjocgdm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgmbmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hekgppma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnccmnak.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnbnaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnalfmhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhfmic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbpenpdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbbloc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajohpifg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgmbmn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Loigap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpfmem32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Licfgmpa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjccna32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjggka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcanfakf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ekngqqol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lakfodjj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lknocb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlppgddh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgiflnoa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afapjk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdgmio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fkjfkacd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eecpaeoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgkoolil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afapjk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdpnng32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eecdcckf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lngkjhmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofjgmdgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmoabn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Foocegea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llhnpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppeikjle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qidljhia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpcmagpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjmkhkff.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojqchnpj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkqahk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjlafqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbgghn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpeapilo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjnnkpqo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icfnjcec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Geenclkn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qidljhia.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idfaolpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dohkhq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imfill32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcpadd32.exe -
Executes dropped EXE 64 IoCs
pid Process 1144 Ibhdgjap.exe 2852 Lnccmnak.exe 2908 Mjednmla.exe 1020 Pbmnlf32.exe 1132 Ekngqqol.exe 4888 Ldgkdbia.exe 5096 Mmiccf32.exe 1356 Pmoabn32.exe 2300 Acgfpf32.exe 4564 Bnhjinpo.exe 228 Cmiffhkj.exe 1460 Cnicpk32.exe 4812 Dejamdca.exe 4992 Eecdcckf.exe 344 Ehfjkn32.exe 488 Fahajbek.exe 3996 Fgeibicb.exe 3976 Gehfepio.exe 4492 Ghiogkfp.exe 1792 Gdbmalja.exe 4436 Ghpehjph.exe 2240 Hgjldfqj.exe 4844 Mbedag32.exe 1656 Neppiagi.exe 2844 Aqhcid32.exe 1744 Dgcmdj32.exe 2980 Fhhpfg32.exe 3108 Fpeapilo.exe 1712 Gdhcagnp.exe 3832 Gpcmagpo.exe 3480 Gpfjfg32.exe 380 Hhbkccji.exe 1836 Hjedpkne.exe 4276 Kjkpif32.exe 4412 Lkjlciem.exe 3060 Licfgmpa.exe 2784 Lhhchi32.exe 400 Mbenfq32.exe 4876 Nlknqd32.exe 2744 Dkmebh32.exe 2600 Fmfnig32.exe 2828 Fjmkhkff.exe 1884 Ffclml32.exe 2616 Gdobgp32.exe 1176 Gikkof32.exe 4892 Hingefqa.exe 4964 Hlcjaq32.exe 528 Hginoiic.exe 4792 Hmbflc32.exe 3724 Iljpbp32.exe 1724 Ikkppgld.exe 4940 Idceim32.exe 932 Idfaolpb.exe 4556 Ikpjkf32.exe 2320 Kcikagij.exe 1092 Kjccna32.exe 4932 Knchio32.exe 4476 Kqbdej32.exe 408 Kglmbd32.exe 1904 Lcbngeqo.exe 3212 Ljmfdp32.exe 220 Lcejmeol.exe 1168 Ljobiofi.exe 896 Lddgghfo.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ofbjei32.dll Hhbkccji.exe File created C:\Windows\SysWOW64\Kjkpif32.exe Hjedpkne.exe File created C:\Windows\SysWOW64\Dohkhq32.exe Cdlpjicj.exe File opened for modification C:\Windows\SysWOW64\Nnafgd32.exe Ncgiolkk.exe File created C:\Windows\SysWOW64\Facakcce.dll Cncnhh32.exe File opened for modification C:\Windows\SysWOW64\Biiole32.exe Bmbngd32.exe File created C:\Windows\SysWOW64\Dklhmlac.exe Cncnhh32.exe File created C:\Windows\SysWOW64\Mpfooc32.dll Geenclkn.exe File opened for modification C:\Windows\SysWOW64\Pjopil32.exe Pbgghn32.exe File opened for modification C:\Windows\SysWOW64\Dmnhgdjo.exe Dfbcek32.exe File created C:\Windows\SysWOW64\Loigap32.exe Lngkjhmi.exe File opened for modification C:\Windows\SysWOW64\Dkqahk32.exe Dahmoefm.exe File opened for modification C:\Windows\SysWOW64\Foocegea.exe Eddemo32.exe File created C:\Windows\SysWOW64\Mpapgknd.exe Mjggka32.exe File created C:\Windows\SysWOW64\Bogapc32.dll Mjnnkpqo.exe File created C:\Windows\SysWOW64\Mmiccf32.exe Ldgkdbia.exe File opened for modification C:\Windows\SysWOW64\Dgcmdj32.exe Aqhcid32.exe File created C:\Windows\SysWOW64\Fpeapilo.exe Fhhpfg32.exe File created C:\Windows\SysWOW64\Ihfnho32.dll Gmdcpoid.exe File opened for modification C:\Windows\SysWOW64\Ipjocgdm.exe Iipfgm32.exe File created C:\Windows\SysWOW64\Omfoojfd.dll Ofjgmdgg.exe File created C:\Windows\SysWOW64\Nacmjf32.dll Pjhpccnn.exe File created C:\Windows\SysWOW64\Bofojign.dll Ehfjkn32.exe File created C:\Windows\SysWOW64\Nblohqjd.dll Gdbmalja.exe File created C:\Windows\SysWOW64\Pcfcjdfi.dll Jgoflpal.exe File created C:\Windows\SysWOW64\Pnnbdn32.dll Lqjqab32.exe File created C:\Windows\SysWOW64\Geenclkn.exe Felkmnci.exe File opened for modification C:\Windows\SysWOW64\Lakfodjj.exe Lpjjgl32.exe File created C:\Windows\SysWOW64\Djegoanj.exe Dnnfjp32.exe File opened for modification C:\Windows\SysWOW64\Idfaolpb.exe Idceim32.exe File opened for modification C:\Windows\SysWOW64\Npbcollj.exe Nnafgd32.exe File created C:\Windows\SysWOW64\Lpjjgl32.exe Klekpodn.exe File opened for modification C:\Windows\SysWOW64\Amfokf32.exe Afmfolcf.exe File created C:\Windows\SysWOW64\Bffqenbn.dll Ajohpifg.exe File opened for modification C:\Windows\SysWOW64\Ejlmppha.exe Ecbecfqe.exe File created C:\Windows\SysWOW64\Ghiogkfp.exe Gehfepio.exe File created C:\Windows\SysWOW64\Gmkbcppg.dll Gdhcagnp.exe File created C:\Windows\SysWOW64\Lngkjhmi.exe Lgmbmn32.exe File created C:\Windows\SysWOW64\Ngbeepdp.dll Felkmnci.exe File opened for modification C:\Windows\SysWOW64\Lpjjgl32.exe Klekpodn.exe File created C:\Windows\SysWOW64\Agmeld32.dll Dgbagf32.exe File opened for modification C:\Windows\SysWOW64\Dnnfjp32.exe Dgdnmfai.exe File created C:\Windows\SysWOW64\Ekngqqol.exe Pbmnlf32.exe File created C:\Windows\SysWOW64\Ccdncaoc.dll Gpcmagpo.exe File created C:\Windows\SysWOW64\Hlcjaq32.exe Hingefqa.exe File created C:\Windows\SysWOW64\Lcejmeol.exe Ljmfdp32.exe File created C:\Windows\SysWOW64\Illfmi32.exe Iebnqofj.exe File opened for modification C:\Windows\SysWOW64\Dahmoefm.exe Dkndbkop.exe File created C:\Windows\SysWOW64\Bphpqpah.dll Afapjk32.exe File created C:\Windows\SysWOW64\Peddpjeb.dll Acgfpf32.exe File opened for modification C:\Windows\SysWOW64\Kjkpif32.exe Hjedpkne.exe File created C:\Windows\SysWOW64\Eojpjafa.dll Mjmokmji.exe File created C:\Windows\SysWOW64\Ojaldgoc.dll Jngbcj32.exe File created C:\Windows\SysWOW64\Lgmbmn32.exe Llhnpe32.exe File created C:\Windows\SysWOW64\Ofblqafh.dll Lgmbmn32.exe File created C:\Windows\SysWOW64\Lkaepbjk.dll Dkndbkop.exe File created C:\Windows\SysWOW64\Peeakakg.exe Nnbnaj32.exe File created C:\Windows\SysWOW64\Jngbcj32.exe Jcanfakf.exe File created C:\Windows\SysWOW64\Mjnnkpqo.exe Mohingqi.exe File opened for modification C:\Windows\SysWOW64\Apjdbqfa.exe Afapjk32.exe File created C:\Windows\SysWOW64\Hmodmd32.dll Dgmhmggq.exe File created C:\Windows\SysWOW64\Dejamdca.exe Cnicpk32.exe File created C:\Windows\SysWOW64\Fmfnig32.exe Dkmebh32.exe File created C:\Windows\SysWOW64\Ghhpmoif.dll Mbbloc32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2228 6980 WerFault.exe 300 1564 6980 WerFault.exe 300 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oigaicfc.dll" Hlppgddh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eecdcckf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lknocb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qemhlp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlpbij32.dll" Nobldfio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkjlciem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mnfnfl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mogccnfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Niqgpncn.dll" Fjhmknnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hingefqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Babccb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmodmd32.dll" Dgmhmggq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dekqogmd.dll" Dahmoefm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eddemo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Afmfolcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnccmnak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkgekock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cncnhh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljmfdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncgiolkk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Facakcce.dll" Cncnhh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkndbkop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mjggka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afmmejml.dll" Hgjldfqj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgcmdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmkbcppg.dll" Gdhcagnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nobldfio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkqahk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bbmjjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkjfkacd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.e19c9bbc9aa157324c3dc14893b2af58.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmiffhkj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eofgioah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Feqnfbig.dll" Cnicpk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfbcek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alfdoj32.dll" Klekpodn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Babccb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbagf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgcmdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olheak32.dll" Lhhchi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eofgioah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bacjpg32.dll" Ikpjkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Peeakakg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jggglm32.dll" Afmfolcf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkmebh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idfaolpb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcbngeqo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Maicmgoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfiodc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icknblga.dll" Gehfepio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhbkccji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nlknqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpafpn32.dll" Moacnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caidoi32.dll" Pjopil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mbenfq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdgmio32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Felkmnci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lcejmeol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lqjqab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjhpccnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adjhld32.dll" Mjokpm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jlgeig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pineca32.dll" Llhnpe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fnalfmhp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1144 2912 NEAS.e19c9bbc9aa157324c3dc14893b2af58.exe 95 PID 2912 wrote to memory of 1144 2912 NEAS.e19c9bbc9aa157324c3dc14893b2af58.exe 95 PID 2912 wrote to memory of 1144 2912 NEAS.e19c9bbc9aa157324c3dc14893b2af58.exe 95 PID 1144 wrote to memory of 2852 1144 Ibhdgjap.exe 96 PID 1144 wrote to memory of 2852 1144 Ibhdgjap.exe 96 PID 1144 wrote to memory of 2852 1144 Ibhdgjap.exe 96 PID 2852 wrote to memory of 2908 2852 Lnccmnak.exe 97 PID 2852 wrote to memory of 2908 2852 Lnccmnak.exe 97 PID 2852 wrote to memory of 2908 2852 Lnccmnak.exe 97 PID 2908 wrote to memory of 1020 2908 Mjednmla.exe 98 PID 2908 wrote to memory of 1020 2908 Mjednmla.exe 98 PID 2908 wrote to memory of 1020 2908 Mjednmla.exe 98 PID 1020 wrote to memory of 1132 1020 Pbmnlf32.exe 100 PID 1020 wrote to memory of 1132 1020 Pbmnlf32.exe 100 PID 1020 wrote to memory of 1132 1020 Pbmnlf32.exe 100 PID 1132 wrote to memory of 4888 1132 Ekngqqol.exe 101 PID 1132 wrote to memory of 4888 1132 Ekngqqol.exe 101 PID 1132 wrote to memory of 4888 1132 Ekngqqol.exe 101 PID 4888 wrote to memory of 5096 4888 Ldgkdbia.exe 102 PID 4888 wrote to memory of 5096 4888 Ldgkdbia.exe 102 PID 4888 wrote to memory of 5096 4888 Ldgkdbia.exe 102 PID 5096 wrote to memory of 1356 5096 Mmiccf32.exe 103 PID 5096 wrote to memory of 1356 5096 Mmiccf32.exe 103 PID 5096 wrote to memory of 1356 5096 Mmiccf32.exe 103 PID 1356 wrote to memory of 2300 1356 Pmoabn32.exe 104 PID 1356 wrote to memory of 2300 1356 Pmoabn32.exe 104 PID 1356 wrote to memory of 2300 1356 Pmoabn32.exe 104 PID 2300 wrote to memory of 4564 2300 Acgfpf32.exe 105 PID 2300 wrote to memory of 4564 2300 Acgfpf32.exe 105 PID 2300 wrote to memory of 4564 2300 Acgfpf32.exe 105 PID 4564 wrote to memory of 228 4564 Bnhjinpo.exe 106 PID 4564 wrote to memory of 228 4564 Bnhjinpo.exe 106 PID 4564 wrote to memory of 228 4564 Bnhjinpo.exe 106 PID 228 wrote to memory of 1460 228 Cmiffhkj.exe 107 PID 228 wrote to memory of 1460 228 Cmiffhkj.exe 107 PID 228 wrote to memory of 1460 228 Cmiffhkj.exe 107 PID 1460 wrote to memory of 4812 1460 Cnicpk32.exe 108 PID 1460 wrote to memory of 4812 1460 Cnicpk32.exe 108 PID 1460 wrote to memory of 4812 1460 Cnicpk32.exe 108 PID 4812 wrote to memory of 4992 4812 Dejamdca.exe 109 PID 4812 wrote to memory of 4992 4812 Dejamdca.exe 109 PID 4812 wrote to memory of 4992 4812 Dejamdca.exe 109 PID 4992 wrote to memory of 344 4992 Eecdcckf.exe 110 PID 4992 wrote to memory of 344 4992 Eecdcckf.exe 110 PID 4992 wrote to memory of 344 4992 Eecdcckf.exe 110 PID 344 wrote to memory of 488 344 Ehfjkn32.exe 111 PID 344 wrote to memory of 488 344 Ehfjkn32.exe 111 PID 344 wrote to memory of 488 344 Ehfjkn32.exe 111 PID 488 wrote to memory of 3996 488 Fahajbek.exe 112 PID 488 wrote to memory of 3996 488 Fahajbek.exe 112 PID 488 wrote to memory of 3996 488 Fahajbek.exe 112 PID 3996 wrote to memory of 3976 3996 Fgeibicb.exe 113 PID 3996 wrote to memory of 3976 3996 Fgeibicb.exe 113 PID 3996 wrote to memory of 3976 3996 Fgeibicb.exe 113 PID 3976 wrote to memory of 4492 3976 Gehfepio.exe 114 PID 3976 wrote to memory of 4492 3976 Gehfepio.exe 114 PID 3976 wrote to memory of 4492 3976 Gehfepio.exe 114 PID 4492 wrote to memory of 1792 4492 Ghiogkfp.exe 115 PID 4492 wrote to memory of 1792 4492 Ghiogkfp.exe 115 PID 4492 wrote to memory of 1792 4492 Ghiogkfp.exe 115 PID 1792 wrote to memory of 4436 1792 Gdbmalja.exe 116 PID 1792 wrote to memory of 4436 1792 Gdbmalja.exe 116 PID 1792 wrote to memory of 4436 1792 Gdbmalja.exe 116 PID 4436 wrote to memory of 2240 4436 Ghpehjph.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e19c9bbc9aa157324c3dc14893b2af58.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e19c9bbc9aa157324c3dc14893b2af58.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\Ibhdgjap.exeC:\Windows\system32\Ibhdgjap.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\Lnccmnak.exeC:\Windows\system32\Lnccmnak.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\Mjednmla.exeC:\Windows\system32\Mjednmla.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\Pbmnlf32.exeC:\Windows\system32\Pbmnlf32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\Ekngqqol.exeC:\Windows\system32\Ekngqqol.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\Ldgkdbia.exeC:\Windows\system32\Ldgkdbia.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\Mmiccf32.exeC:\Windows\system32\Mmiccf32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\Pmoabn32.exeC:\Windows\system32\Pmoabn32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\Acgfpf32.exeC:\Windows\system32\Acgfpf32.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Bnhjinpo.exeC:\Windows\system32\Bnhjinpo.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\Cmiffhkj.exeC:\Windows\system32\Cmiffhkj.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\Cnicpk32.exeC:\Windows\system32\Cnicpk32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\Dejamdca.exeC:\Windows\system32\Dejamdca.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\Eecdcckf.exeC:\Windows\system32\Eecdcckf.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\Ehfjkn32.exeC:\Windows\system32\Ehfjkn32.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\Fahajbek.exeC:\Windows\system32\Fahajbek.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\Fgeibicb.exeC:\Windows\system32\Fgeibicb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\Gehfepio.exeC:\Windows\system32\Gehfepio.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\Ghiogkfp.exeC:\Windows\system32\Ghiogkfp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\Gdbmalja.exeC:\Windows\system32\Gdbmalja.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\Ghpehjph.exeC:\Windows\system32\Ghpehjph.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\Hgjldfqj.exeC:\Windows\system32\Hgjldfqj.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:2240 -
C:\Windows\SysWOW64\Mbedag32.exeC:\Windows\system32\Mbedag32.exe24⤵
- Executes dropped EXE
PID:4844 -
C:\Windows\SysWOW64\Neppiagi.exeC:\Windows\system32\Neppiagi.exe25⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Aqhcid32.exeC:\Windows\system32\Aqhcid32.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2844 -
C:\Windows\SysWOW64\Dgcmdj32.exeC:\Windows\system32\Dgcmdj32.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1744 -
C:\Windows\SysWOW64\Fhhpfg32.exeC:\Windows\system32\Fhhpfg32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2980 -
C:\Windows\SysWOW64\Fpeapilo.exeC:\Windows\system32\Fpeapilo.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3108 -
C:\Windows\SysWOW64\Gdhcagnp.exeC:\Windows\system32\Gdhcagnp.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1712 -
C:\Windows\SysWOW64\Gpcmagpo.exeC:\Windows\system32\Gpcmagpo.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3832 -
C:\Windows\SysWOW64\Gpfjfg32.exeC:\Windows\system32\Gpfjfg32.exe32⤵
- Executes dropped EXE
PID:3480 -
C:\Windows\SysWOW64\Hhbkccji.exeC:\Windows\system32\Hhbkccji.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:380 -
C:\Windows\SysWOW64\Hjedpkne.exeC:\Windows\system32\Hjedpkne.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1836 -
C:\Windows\SysWOW64\Kjkpif32.exeC:\Windows\system32\Kjkpif32.exe35⤵
- Executes dropped EXE
PID:4276 -
C:\Windows\SysWOW64\Lkjlciem.exeC:\Windows\system32\Lkjlciem.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:4412 -
C:\Windows\SysWOW64\Licfgmpa.exeC:\Windows\system32\Licfgmpa.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3060 -
C:\Windows\SysWOW64\Lhhchi32.exeC:\Windows\system32\Lhhchi32.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:2784 -
C:\Windows\SysWOW64\Mbenfq32.exeC:\Windows\system32\Mbenfq32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:400 -
C:\Windows\SysWOW64\Nlknqd32.exeC:\Windows\system32\Nlknqd32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:4876 -
C:\Windows\SysWOW64\Dkmebh32.exeC:\Windows\system32\Dkmebh32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2744 -
C:\Windows\SysWOW64\Fmfnig32.exeC:\Windows\system32\Fmfnig32.exe42⤵
- Executes dropped EXE
PID:2600 -
C:\Windows\SysWOW64\Fjmkhkff.exeC:\Windows\system32\Fjmkhkff.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Ffclml32.exeC:\Windows\system32\Ffclml32.exe44⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\Gdobgp32.exeC:\Windows\system32\Gdobgp32.exe45⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\Gikkof32.exeC:\Windows\system32\Gikkof32.exe46⤵
- Executes dropped EXE
PID:1176 -
C:\Windows\SysWOW64\Hingefqa.exeC:\Windows\system32\Hingefqa.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4892 -
C:\Windows\SysWOW64\Hlcjaq32.exeC:\Windows\system32\Hlcjaq32.exe48⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\Hginoiic.exeC:\Windows\system32\Hginoiic.exe49⤵
- Executes dropped EXE
PID:528 -
C:\Windows\SysWOW64\Hmbflc32.exeC:\Windows\system32\Hmbflc32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4792 -
C:\Windows\SysWOW64\Iljpbp32.exeC:\Windows\system32\Iljpbp32.exe51⤵
- Executes dropped EXE
PID:3724 -
C:\Windows\SysWOW64\Ikkppgld.exeC:\Windows\system32\Ikkppgld.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\Idceim32.exeC:\Windows\system32\Idceim32.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4940 -
C:\Windows\SysWOW64\Idfaolpb.exeC:\Windows\system32\Idfaolpb.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:932 -
C:\Windows\SysWOW64\Ikpjkf32.exeC:\Windows\system32\Ikpjkf32.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:4556 -
C:\Windows\SysWOW64\Kcikagij.exeC:\Windows\system32\Kcikagij.exe56⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Kjccna32.exeC:\Windows\system32\Kjccna32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Knchio32.exeC:\Windows\system32\Knchio32.exe58⤵
- Executes dropped EXE
PID:4932 -
C:\Windows\SysWOW64\Kqbdej32.exeC:\Windows\system32\Kqbdej32.exe59⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\SysWOW64\Kglmbd32.exeC:\Windows\system32\Kglmbd32.exe60⤵
- Executes dropped EXE
PID:408 -
C:\Windows\SysWOW64\Lcbngeqo.exeC:\Windows\system32\Lcbngeqo.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:1904 -
C:\Windows\SysWOW64\Ljmfdp32.exeC:\Windows\system32\Ljmfdp32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3212 -
C:\Windows\SysWOW64\Lcejmeol.exeC:\Windows\system32\Lcejmeol.exe63⤵
- Executes dropped EXE
- Modifies registry class
PID:220 -
C:\Windows\SysWOW64\Ljobiofi.exeC:\Windows\system32\Ljobiofi.exe64⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\SysWOW64\Lddgghfo.exeC:\Windows\system32\Lddgghfo.exe65⤵
- Executes dropped EXE
PID:896 -
C:\Windows\SysWOW64\Lknocb32.exeC:\Windows\system32\Lknocb32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2736 -
C:\Windows\SysWOW64\Lmpkkjcj.exeC:\Windows\system32\Lmpkkjcj.exe67⤵PID:3692
-
C:\Windows\SysWOW64\Mcqjhc32.exeC:\Windows\system32\Mcqjhc32.exe68⤵PID:2440
-
C:\Windows\SysWOW64\Mnfnfl32.exeC:\Windows\system32\Mnfnfl32.exe69⤵
- Modifies registry class
PID:1740 -
C:\Windows\SysWOW64\Mjmokmji.exeC:\Windows\system32\Mjmokmji.exe70⤵
- Drops file in System32 directory
PID:4760 -
C:\Windows\SysWOW64\Mjokpm32.exeC:\Windows\system32\Mjokpm32.exe71⤵
- Modifies registry class
PID:3892 -
C:\Windows\SysWOW64\Maicmgoc.exeC:\Windows\system32\Maicmgoc.exe72⤵
- Modifies registry class
PID:768 -
C:\Windows\SysWOW64\Nnbnaj32.exeC:\Windows\system32\Nnbnaj32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3272 -
C:\Windows\SysWOW64\Peeakakg.exeC:\Windows\system32\Peeakakg.exe74⤵
- Modifies registry class
PID:2012 -
C:\Windows\SysWOW64\Qemhlp32.exeC:\Windows\system32\Qemhlp32.exe75⤵
- Modifies registry class
PID:4972 -
C:\Windows\SysWOW64\Blgiphni.exeC:\Windows\system32\Blgiphni.exe76⤵PID:3344
-
C:\Windows\SysWOW64\Boeelcmm.exeC:\Windows\system32\Boeelcmm.exe77⤵PID:1920
-
C:\Windows\SysWOW64\Cdlpjicj.exeC:\Windows\system32\Cdlpjicj.exe78⤵
- Drops file in System32 directory
PID:4904 -
C:\Windows\SysWOW64\Dohkhq32.exeC:\Windows\system32\Dohkhq32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4364 -
C:\Windows\SysWOW64\Dfbcek32.exeC:\Windows\system32\Dfbcek32.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:4408 -
C:\Windows\SysWOW64\Dmnhgdjo.exeC:\Windows\system32\Dmnhgdjo.exe81⤵PID:644
-
C:\Windows\SysWOW64\Eofgioah.exeC:\Windows\system32\Eofgioah.exe82⤵
- Modifies registry class
PID:1472 -
C:\Windows\SysWOW64\Eecpaeoo.exeC:\Windows\system32\Eecpaeoo.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1132 -
C:\Windows\SysWOW64\Eohcon32.exeC:\Windows\system32\Eohcon32.exe84⤵PID:1640
-
C:\Windows\SysWOW64\Ekaaio32.exeC:\Windows\system32\Ekaaio32.exe85⤵PID:1228
-
C:\Windows\SysWOW64\Gmdcpoid.exeC:\Windows\system32\Gmdcpoid.exe86⤵
- Drops file in System32 directory
PID:3836 -
C:\Windows\SysWOW64\Hbchnfei.exeC:\Windows\system32\Hbchnfei.exe87⤵PID:4564
-
C:\Windows\SysWOW64\Himqjpme.exeC:\Windows\system32\Himqjpme.exe88⤵PID:4416
-
C:\Windows\SysWOW64\Hekgppma.exeC:\Windows\system32\Hekgppma.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3996 -
C:\Windows\SysWOW64\Ipplmh32.exeC:\Windows\system32\Ipplmh32.exe90⤵PID:1460
-
C:\Windows\SysWOW64\Igmqpbab.exeC:\Windows\system32\Igmqpbab.exe91⤵PID:2696
-
C:\Windows\SysWOW64\Imfill32.exeC:\Windows\system32\Imfill32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1448 -
C:\Windows\SysWOW64\Iebnqofj.exeC:\Windows\system32\Iebnqofj.exe93⤵
- Drops file in System32 directory
PID:648 -
C:\Windows\SysWOW64\Illfmi32.exeC:\Windows\system32\Illfmi32.exe94⤵PID:4808
-
C:\Windows\SysWOW64\Icfnjcec.exeC:\Windows\system32\Icfnjcec.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4764 -
C:\Windows\SysWOW64\Iipfgm32.exeC:\Windows\system32\Iipfgm32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4492 -
C:\Windows\SysWOW64\Ipjocgdm.exeC:\Windows\system32\Ipjocgdm.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4872 -
C:\Windows\SysWOW64\Jenmlmll.exeC:\Windows\system32\Jenmlmll.exe98⤵PID:2772
-
C:\Windows\SysWOW64\Jlgeig32.exeC:\Windows\system32\Jlgeig32.exe99⤵
- Modifies registry class
PID:4796 -
C:\Windows\SysWOW64\Jcanfakf.exeC:\Windows\system32\Jcanfakf.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3228 -
C:\Windows\SysWOW64\Jngbcj32.exeC:\Windows\system32\Jngbcj32.exe101⤵
- Drops file in System32 directory
PID:5128 -
C:\Windows\SysWOW64\Jgoflpal.exeC:\Windows\system32\Jgoflpal.exe102⤵
- Drops file in System32 directory
PID:5168 -
C:\Windows\SysWOW64\Kokkqbog.exeC:\Windows\system32\Kokkqbog.exe103⤵PID:5204
-
C:\Windows\SysWOW64\Kjponk32.exeC:\Windows\system32\Kjponk32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5248 -
C:\Windows\SysWOW64\Kpjgjefj.exeC:\Windows\system32\Kpjgjefj.exe105⤵PID:5288
-
C:\Windows\SysWOW64\Klceeejl.exeC:\Windows\system32\Klceeejl.exe106⤵PID:5332
-
C:\Windows\SysWOW64\Llhnpe32.exeC:\Windows\system32\Llhnpe32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5376 -
C:\Windows\SysWOW64\Lgmbmn32.exeC:\Windows\system32\Lgmbmn32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5412 -
C:\Windows\SysWOW64\Lngkjhmi.exeC:\Windows\system32\Lngkjhmi.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5456 -
C:\Windows\SysWOW64\Loigap32.exeC:\Windows\system32\Loigap32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5496 -
C:\Windows\SysWOW64\Lqjqab32.exeC:\Windows\system32\Lqjqab32.exe111⤵
- Drops file in System32 directory
- Modifies registry class
PID:5544 -
C:\Windows\SysWOW64\Mgkoolil.exeC:\Windows\system32\Mgkoolil.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5588 -
C:\Windows\SysWOW64\Mogccnfg.exeC:\Windows\system32\Mogccnfg.exe113⤵
- Modifies registry class
PID:5636 -
C:\Windows\SysWOW64\Ncgiolkk.exeC:\Windows\system32\Ncgiolkk.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5684 -
C:\Windows\SysWOW64\Nnafgd32.exeC:\Windows\system32\Nnafgd32.exe115⤵
- Drops file in System32 directory
PID:5728 -
C:\Windows\SysWOW64\Npbcollj.exeC:\Windows\system32\Npbcollj.exe116⤵PID:5772
-
C:\Windows\SysWOW64\Oaifin32.exeC:\Windows\system32\Oaifin32.exe117⤵PID:5820
-
C:\Windows\SysWOW64\Ofjgmdgg.exeC:\Windows\system32\Ofjgmdgg.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5864 -
C:\Windows\SysWOW64\Ppclej32.exeC:\Windows\system32\Ppclej32.exe119⤵PID:5908
-
C:\Windows\SysWOW64\Pjhpccnn.exeC:\Windows\system32\Pjhpccnn.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:5952 -
C:\Windows\SysWOW64\Ppeikjle.exeC:\Windows\system32\Ppeikjle.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5996 -
C:\Windows\SysWOW64\Pmnbpm32.exeC:\Windows\system32\Pmnbpm32.exe122⤵PID:6044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-