Analysis
-
max time kernel
180s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 16:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.d90262b18b56375f5214dcb9f68cd740.exe
Resource
win7-20231020-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.d90262b18b56375f5214dcb9f68cd740.exe
Resource
win10v2004-20231023-en
6 signatures
150 seconds
General
-
Target
NEAS.d90262b18b56375f5214dcb9f68cd740.exe
-
Size
80KB
-
MD5
d90262b18b56375f5214dcb9f68cd740
-
SHA1
7a68626990eb3c535a749c406c6734ee97be107e
-
SHA256
0819a6c93f00a18484cdbdfed5012e7e8cccc747f8ee45fa7d9a38245d38aa7d
-
SHA512
2103e6a723c4fe6ad703b0f61513c0f4b4186fd9b8bd5c1707c6f055037648dcf8cda8877baa3890a6181081b8694dd4f75e2c84a3a029f818dd88a919c31b4a
-
SSDEEP
1536:wFc/Q4qKBI28GinzhB+2I4rp2LLJ9VqDlzVxyh+CbxMa:wCQE26iV8JLJ9IDlRxyhTb7
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdcaahbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lglopjkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlglpkpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oikngeoo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aqffdejj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fibncmpg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebkbmqhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npedfjfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hojndd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgfqgkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mddidm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmiidnko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnacqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bahdje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfomfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dihllkal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbdgpfni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oomnmfid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njdeklca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dibmfb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfgcjpdk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bahdje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Coadgacp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hboaql32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lalnfooo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oefpoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onnmmipj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hefneq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkkofn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mggolhaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nockfgao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aobieq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqblbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gdobgp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbkblb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fgpilc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdobgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pacojc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmipnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obbekn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epmmjnkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hefneq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qjfmda32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmeapbpa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncenga32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnkchmdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpjhlche.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lalnfooo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gffhbljh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Paelpcgc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onqbjccl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkglcfec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnkchmdl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egijfjmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oeffip32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkggfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agmmnnpj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldblon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbmoodbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jiglgl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.d90262b18b56375f5214dcb9f68cd740.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Goediekj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpdlajfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Liimgh32.exe -
Executes dropped EXE 64 IoCs
pid Process 2880 Kcbded32.exe 2476 Oikngeoo.exe 1392 Pmefiakh.exe 396 Acmomgoa.exe 2300 Bqokhi32.exe 3236 Cddjofbj.exe 3620 Eaegqc32.exe 3556 Gngckfdj.exe 3616 Glkdejcd.exe 3888 Hkggfe32.exe 2732 Jnalem32.exe 3552 Lmeapbpa.exe 4012 Opdpih32.exe 5072 Pmdpok32.exe 4256 Peaahmcd.exe 780 Agmmnnpj.exe 700 Accnco32.exe 3776 Bpgnmcdh.exe 2196 Bpaacblm.exe 2804 Cgbppknb.exe 1236 Eqmjen32.exe 3904 Hjmfmnhp.exe 2176 Jpjhlche.exe 3376 Lhdeinhb.exe 2728 Lglopjkg.exe 4060 Ldblon32.exe 3996 Mddidm32.exe 4292 Mggolhaj.exe 960 Nocphd32.exe 1348 Ndphpk32.exe 3520 Nohicdia.exe 4660 Nombnc32.exe 3436 Obbekn32.exe 1620 Apdkmn32.exe 3524 Bahdje32.exe 2200 Bbjmih32.exe 4672 Baojkdqb.exe 3992 Clgkmm32.exe 4204 Chnlbndj.exe 1664 Didnmp32.exe 2996 Ebkbmqhb.exe 1240 Gbjhelnp.exe 2776 Hboaql32.exe 4428 Ipldpo32.exe 3672 Jbkjcgaj.exe 1080 Kkmapc32.exe 4616 Lgnekcei.exe 1384 Mkpglqgj.exe 972 Ncenga32.exe 2952 Qlmhfj32.exe 1440 Aaqgop32.exe 4300 Boknic32.exe 1532 Bhdbaihi.exe 4892 Chmehhpn.exe 232 Colfpace.exe 860 Dboiaoff.exe 460 Dcaefo32.exe 2116 Ecoahmhd.exe 3120 Ffpjihee.exe 1100 Fcfhhk32.exe 2972 Fkalmn32.exe 4244 Gdqgfbop.exe 4420 Gbdgpfni.exe 4776 Ickcaf32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Agmmnnpj.exe Peaahmcd.exe File created C:\Windows\SysWOW64\Fkalmn32.exe Fcfhhk32.exe File created C:\Windows\SysWOW64\Fdqffaql.exe Fikbhiaf.exe File created C:\Windows\SysWOW64\Gdobgp32.exe Gffhbljh.exe File opened for modification C:\Windows\SysWOW64\Keabkkdg.exe Jfeoip32.exe File created C:\Windows\SysWOW64\Cmloae32.dll Phqbaj32.exe File created C:\Windows\SysWOW64\Bmbdbcgk.dll Kbmoodbb.exe File created C:\Windows\SysWOW64\Pmdpok32.exe Opdpih32.exe File opened for modification C:\Windows\SysWOW64\Lhdeinhb.exe Jpjhlche.exe File created C:\Windows\SysWOW64\Eodlkdco.dll Ldblon32.exe File opened for modification C:\Windows\SysWOW64\Baojkdqb.exe Bbjmih32.exe File created C:\Windows\SysWOW64\Chmehhpn.exe Bhdbaihi.exe File created C:\Windows\SysWOW64\Ebcmjqej.exe Emfebjgb.exe File opened for modification C:\Windows\SysWOW64\Ndphpk32.exe Nocphd32.exe File opened for modification C:\Windows\SysWOW64\Gdqgfbop.exe Fkalmn32.exe File opened for modification C:\Windows\SysWOW64\Npedfjfo.exe Niklip32.exe File created C:\Windows\SysWOW64\Emfebjgb.exe Dcnqid32.exe File created C:\Windows\SysWOW64\Ichkdj32.dll Kkmapc32.exe File created C:\Windows\SysWOW64\Dmooak32.exe Cooolhin.exe File opened for modification C:\Windows\SysWOW64\Gdobgp32.exe Gffhbljh.exe File created C:\Windows\SysWOW64\Gkknpq32.dll Qpahghbg.exe File created C:\Windows\SysWOW64\Dcaefo32.exe Dboiaoff.exe File created C:\Windows\SysWOW64\Pkjipj32.dll Qjmeaafi.exe File opened for modification C:\Windows\SysWOW64\Madjbg32.exe Mjkbemll.exe File opened for modification C:\Windows\SysWOW64\Dldlbgbb.exe Dfgcjpdk.exe File created C:\Windows\SysWOW64\Mjeaip32.dll Dcnqid32.exe File created C:\Windows\SysWOW64\Lhohahlh.dll Gefencoj.exe File created C:\Windows\SysWOW64\Pjhpccnn.exe Nmipnp32.exe File created C:\Windows\SysWOW64\Fibncmpg.exe Ekoniian.exe File opened for modification C:\Windows\SysWOW64\Lgnekcei.exe Kkmapc32.exe File created C:\Windows\SysWOW64\Nockfgao.exe Mbqkfhfh.exe File opened for modification C:\Windows\SysWOW64\Fgpilc32.exe Eainnn32.exe File created C:\Windows\SysWOW64\Pacojc32.exe Oejbpb32.exe File created C:\Windows\SysWOW64\Dbiamcho.dll Gppcfk32.exe File created C:\Windows\SysWOW64\Lgfceo32.dll Jbkjcgaj.exe File created C:\Windows\SysWOW64\Phqbaj32.exe Pgoejapi.exe File opened for modification C:\Windows\SysWOW64\Cooolhin.exe Ajdjcc32.exe File opened for modification C:\Windows\SysWOW64\Fdqffaql.exe Fikbhiaf.exe File created C:\Windows\SysWOW64\Lclpmdhd.exe Lqdakjak.exe File created C:\Windows\SysWOW64\Jjoplkfh.dll Adoamfhn.exe File created C:\Windows\SysWOW64\Lafnne32.dll Inpclnnj.exe File opened for modification C:\Windows\SysWOW64\Gacjkjgb.exe Fgpilc32.exe File created C:\Windows\SysWOW64\Ipnbhc32.dll Gifjjacn.exe File created C:\Windows\SysWOW64\Eogegdjd.dll Hpdlajfe.exe File opened for modification C:\Windows\SysWOW64\Qpahghbg.exe Qoplop32.exe File opened for modification C:\Windows\SysWOW64\Cmfcfb32.exe Cflkihbd.exe File opened for modification C:\Windows\SysWOW64\Dbndoa32.exe Dldlbgbb.exe File opened for modification C:\Windows\SysWOW64\Lclpmdhd.exe Lqdakjak.exe File created C:\Windows\SysWOW64\Qpahghbg.exe Qoplop32.exe File created C:\Windows\SysWOW64\Fcjfha32.dll Kqmkjk32.exe File created C:\Windows\SysWOW64\Lggfolgj.dll Pjhpccnn.exe File created C:\Windows\SysWOW64\Lhdeinhb.exe Jpjhlche.exe File created C:\Windows\SysWOW64\Jjjebg32.dll Nombnc32.exe File opened for modification C:\Windows\SysWOW64\Paelpcgc.exe Pacojc32.exe File created C:\Windows\SysWOW64\Coadgacp.exe Chepehne.exe File opened for modification C:\Windows\SysWOW64\Pabhpm32.exe Pjhpccnn.exe File opened for modification C:\Windows\SysWOW64\Gngckfdj.exe Eaegqc32.exe File opened for modification C:\Windows\SysWOW64\Eqmjen32.exe Cgbppknb.exe File opened for modification C:\Windows\SysWOW64\Ldeonbkd.exe Kfanen32.exe File created C:\Windows\SysWOW64\Inpclnnj.exe Hojndd32.exe File created C:\Windows\SysWOW64\Dihllkal.exe Dbndoa32.exe File opened for modification C:\Windows\SysWOW64\Jfeoip32.exe Ickcaf32.exe File created C:\Windows\SysWOW64\Lookln32.dll Mikjmhaq.exe File created C:\Windows\SysWOW64\Oleabh32.dll Onqbjccl.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4668 4220 WerFault.exe 315 5236 4220 WerFault.exe 315 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldeonbkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjbajokj.dll" Paelpcgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkcehaof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gacjkjgb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmipnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldblon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkglcfec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okedmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aafefq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmdcif32.dll" Aaqgop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffpjihee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehgjinca.dll" Gffhbljh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbnhdihe.dll" Hboaql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcnqid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmfcfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Beeock32.dll" Fqblbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbjhelnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfmpbnhf.dll" Dihllkal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Goepgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlhdoibc.dll" Gngckfdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mddidm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hboaql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbpaaa32.dll" Egijfjmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpqaejjo.dll" Knofif32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Madjbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lgnekcei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phcogice.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aifdcgcp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljbfiegb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fikbhiaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eodlkdco.dll" Ldblon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ickcaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Coldbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Filailgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Filailgl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gngckfdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Glkdejcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bpgnmcdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgfqgkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofqbhn32.dll" Kjkpif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hhddnhoa.dll" Gmojep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opmmoa32.dll" Mkpglqgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dboiaoff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Goediekj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oefpoi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dldlbgbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnacqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pgiggcgj.dll" Kcbded32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnejfn32.dll" Agmmnnpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkjmodoi.dll" Bbjmih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Liimgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Knofif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcjfha32.dll" Kqmkjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ecoahmhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbdgpfni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Liimgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phqbaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bohfmn32.dll" Madjbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekgeli32.dll" Pabhpm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjofcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpjfikkn.dll" Coldbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bqokhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkggfe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Chmehhpn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 2880 3880 NEAS.d90262b18b56375f5214dcb9f68cd740.exe 98 PID 3880 wrote to memory of 2880 3880 NEAS.d90262b18b56375f5214dcb9f68cd740.exe 98 PID 3880 wrote to memory of 2880 3880 NEAS.d90262b18b56375f5214dcb9f68cd740.exe 98 PID 2880 wrote to memory of 2476 2880 Kcbded32.exe 99 PID 2880 wrote to memory of 2476 2880 Kcbded32.exe 99 PID 2880 wrote to memory of 2476 2880 Kcbded32.exe 99 PID 2476 wrote to memory of 1392 2476 Oikngeoo.exe 100 PID 2476 wrote to memory of 1392 2476 Oikngeoo.exe 100 PID 2476 wrote to memory of 1392 2476 Oikngeoo.exe 100 PID 1392 wrote to memory of 396 1392 Pmefiakh.exe 101 PID 1392 wrote to memory of 396 1392 Pmefiakh.exe 101 PID 1392 wrote to memory of 396 1392 Pmefiakh.exe 101 PID 396 wrote to memory of 2300 396 Acmomgoa.exe 102 PID 396 wrote to memory of 2300 396 Acmomgoa.exe 102 PID 396 wrote to memory of 2300 396 Acmomgoa.exe 102 PID 2300 wrote to memory of 3236 2300 Bqokhi32.exe 103 PID 2300 wrote to memory of 3236 2300 Bqokhi32.exe 103 PID 2300 wrote to memory of 3236 2300 Bqokhi32.exe 103 PID 3236 wrote to memory of 3620 3236 Cddjofbj.exe 104 PID 3236 wrote to memory of 3620 3236 Cddjofbj.exe 104 PID 3236 wrote to memory of 3620 3236 Cddjofbj.exe 104 PID 3620 wrote to memory of 3556 3620 Eaegqc32.exe 105 PID 3620 wrote to memory of 3556 3620 Eaegqc32.exe 105 PID 3620 wrote to memory of 3556 3620 Eaegqc32.exe 105 PID 3556 wrote to memory of 3616 3556 Gngckfdj.exe 106 PID 3556 wrote to memory of 3616 3556 Gngckfdj.exe 106 PID 3556 wrote to memory of 3616 3556 Gngckfdj.exe 106 PID 3616 wrote to memory of 3888 3616 Glkdejcd.exe 107 PID 3616 wrote to memory of 3888 3616 Glkdejcd.exe 107 PID 3616 wrote to memory of 3888 3616 Glkdejcd.exe 107 PID 3888 wrote to memory of 2732 3888 Hkggfe32.exe 108 PID 3888 wrote to memory of 2732 3888 Hkggfe32.exe 108 PID 3888 wrote to memory of 2732 3888 Hkggfe32.exe 108 PID 2732 wrote to memory of 3552 2732 Jnalem32.exe 110 PID 2732 wrote to memory of 3552 2732 Jnalem32.exe 110 PID 2732 wrote to memory of 3552 2732 Jnalem32.exe 110 PID 3552 wrote to memory of 4012 3552 Lmeapbpa.exe 111 PID 3552 wrote to memory of 4012 3552 Lmeapbpa.exe 111 PID 3552 wrote to memory of 4012 3552 Lmeapbpa.exe 111 PID 4012 wrote to memory of 5072 4012 Opdpih32.exe 112 PID 4012 wrote to memory of 5072 4012 Opdpih32.exe 112 PID 4012 wrote to memory of 5072 4012 Opdpih32.exe 112 PID 5072 wrote to memory of 4256 5072 Pmdpok32.exe 113 PID 5072 wrote to memory of 4256 5072 Pmdpok32.exe 113 PID 5072 wrote to memory of 4256 5072 Pmdpok32.exe 113 PID 4256 wrote to memory of 780 4256 Peaahmcd.exe 114 PID 4256 wrote to memory of 780 4256 Peaahmcd.exe 114 PID 4256 wrote to memory of 780 4256 Peaahmcd.exe 114 PID 780 wrote to memory of 700 780 Agmmnnpj.exe 115 PID 780 wrote to memory of 700 780 Agmmnnpj.exe 115 PID 780 wrote to memory of 700 780 Agmmnnpj.exe 115 PID 700 wrote to memory of 3776 700 Accnco32.exe 116 PID 700 wrote to memory of 3776 700 Accnco32.exe 116 PID 700 wrote to memory of 3776 700 Accnco32.exe 116 PID 3776 wrote to memory of 2196 3776 Bpgnmcdh.exe 117 PID 3776 wrote to memory of 2196 3776 Bpgnmcdh.exe 117 PID 3776 wrote to memory of 2196 3776 Bpgnmcdh.exe 117 PID 2196 wrote to memory of 2804 2196 Bpaacblm.exe 118 PID 2196 wrote to memory of 2804 2196 Bpaacblm.exe 118 PID 2196 wrote to memory of 2804 2196 Bpaacblm.exe 118 PID 2804 wrote to memory of 1236 2804 Cgbppknb.exe 119 PID 2804 wrote to memory of 1236 2804 Cgbppknb.exe 119 PID 2804 wrote to memory of 1236 2804 Cgbppknb.exe 119 PID 1236 wrote to memory of 3904 1236 Eqmjen32.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d90262b18b56375f5214dcb9f68cd740.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d90262b18b56375f5214dcb9f68cd740.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\Kcbded32.exeC:\Windows\system32\Kcbded32.exe2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\Oikngeoo.exeC:\Windows\system32\Oikngeoo.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\Pmefiakh.exeC:\Windows\system32\Pmefiakh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\Acmomgoa.exeC:\Windows\system32\Acmomgoa.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\Bqokhi32.exeC:\Windows\system32\Bqokhi32.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Cddjofbj.exeC:\Windows\system32\Cddjofbj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\Eaegqc32.exeC:\Windows\system32\Eaegqc32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\Gngckfdj.exeC:\Windows\system32\Gngckfdj.exe9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\Glkdejcd.exeC:\Windows\system32\Glkdejcd.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\Hkggfe32.exeC:\Windows\system32\Hkggfe32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\Jnalem32.exeC:\Windows\system32\Jnalem32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\Lmeapbpa.exeC:\Windows\system32\Lmeapbpa.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\Opdpih32.exeC:\Windows\system32\Opdpih32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\Pmdpok32.exeC:\Windows\system32\Pmdpok32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\Peaahmcd.exeC:\Windows\system32\Peaahmcd.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\Agmmnnpj.exeC:\Windows\system32\Agmmnnpj.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\Accnco32.exeC:\Windows\system32\Accnco32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\Bpgnmcdh.exeC:\Windows\system32\Bpgnmcdh.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\Bpaacblm.exeC:\Windows\system32\Bpaacblm.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\Cgbppknb.exeC:\Windows\system32\Cgbppknb.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Eqmjen32.exeC:\Windows\system32\Eqmjen32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\Hjmfmnhp.exeC:\Windows\system32\Hjmfmnhp.exe23⤵
- Executes dropped EXE
PID:3904 -
C:\Windows\SysWOW64\Jpjhlche.exeC:\Windows\system32\Jpjhlche.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\Lhdeinhb.exeC:\Windows\system32\Lhdeinhb.exe25⤵
- Executes dropped EXE
PID:3376 -
C:\Windows\SysWOW64\Lglopjkg.exeC:\Windows\system32\Lglopjkg.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\Ldblon32.exeC:\Windows\system32\Ldblon32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4060 -
C:\Windows\SysWOW64\Mddidm32.exeC:\Windows\system32\Mddidm32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3996 -
C:\Windows\SysWOW64\Mggolhaj.exeC:\Windows\system32\Mggolhaj.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4292 -
C:\Windows\SysWOW64\Nocphd32.exeC:\Windows\system32\Nocphd32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:960 -
C:\Windows\SysWOW64\Ndphpk32.exeC:\Windows\system32\Ndphpk32.exe31⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\SysWOW64\Nohicdia.exeC:\Windows\system32\Nohicdia.exe32⤵
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\Nombnc32.exeC:\Windows\system32\Nombnc32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4660 -
C:\Windows\SysWOW64\Obbekn32.exeC:\Windows\system32\Obbekn32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3436 -
C:\Windows\SysWOW64\Apdkmn32.exeC:\Windows\system32\Apdkmn32.exe35⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Bahdje32.exeC:\Windows\system32\Bahdje32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3524 -
C:\Windows\SysWOW64\Bbjmih32.exeC:\Windows\system32\Bbjmih32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2200 -
C:\Windows\SysWOW64\Baojkdqb.exeC:\Windows\system32\Baojkdqb.exe38⤵
- Executes dropped EXE
PID:4672 -
C:\Windows\SysWOW64\Clgkmm32.exeC:\Windows\system32\Clgkmm32.exe39⤵
- Executes dropped EXE
PID:3992 -
C:\Windows\SysWOW64\Chnlbndj.exeC:\Windows\system32\Chnlbndj.exe40⤵
- Executes dropped EXE
PID:4204 -
C:\Windows\SysWOW64\Didnmp32.exeC:\Windows\system32\Didnmp32.exe41⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\Ebkbmqhb.exeC:\Windows\system32\Ebkbmqhb.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2996 -
C:\Windows\SysWOW64\Gbjhelnp.exeC:\Windows\system32\Gbjhelnp.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:1240 -
C:\Windows\SysWOW64\Hboaql32.exeC:\Windows\system32\Hboaql32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2776 -
C:\Windows\SysWOW64\Ipldpo32.exeC:\Windows\system32\Ipldpo32.exe45⤵
- Executes dropped EXE
PID:4428 -
C:\Windows\SysWOW64\Jbkjcgaj.exeC:\Windows\system32\Jbkjcgaj.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3672 -
C:\Windows\SysWOW64\Kkmapc32.exeC:\Windows\system32\Kkmapc32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1080 -
C:\Windows\SysWOW64\Lgnekcei.exeC:\Windows\system32\Lgnekcei.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:4616 -
C:\Windows\SysWOW64\Mkpglqgj.exeC:\Windows\system32\Mkpglqgj.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:1384 -
C:\Windows\SysWOW64\Ncenga32.exeC:\Windows\system32\Ncenga32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:972 -
C:\Windows\SysWOW64\Qlmhfj32.exeC:\Windows\system32\Qlmhfj32.exe51⤵
- Executes dropped EXE
PID:2952 -
C:\Windows\SysWOW64\Aaqgop32.exeC:\Windows\system32\Aaqgop32.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:1440 -
C:\Windows\SysWOW64\Boknic32.exeC:\Windows\system32\Boknic32.exe53⤵
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\Bhdbaihi.exeC:\Windows\system32\Bhdbaihi.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\Chmehhpn.exeC:\Windows\system32\Chmehhpn.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:4892 -
C:\Windows\SysWOW64\Colfpace.exeC:\Windows\system32\Colfpace.exe56⤵
- Executes dropped EXE
PID:232 -
C:\Windows\SysWOW64\Dboiaoff.exeC:\Windows\system32\Dboiaoff.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:860 -
C:\Windows\SysWOW64\Dcaefo32.exeC:\Windows\system32\Dcaefo32.exe58⤵
- Executes dropped EXE
PID:460 -
C:\Windows\SysWOW64\Ecoahmhd.exeC:\Windows\system32\Ecoahmhd.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\Ffpjihee.exeC:\Windows\system32\Ffpjihee.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:3120 -
C:\Windows\SysWOW64\Fcfhhk32.exeC:\Windows\system32\Fcfhhk32.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1100 -
C:\Windows\SysWOW64\Fkalmn32.exeC:\Windows\system32\Fkalmn32.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\Gdqgfbop.exeC:\Windows\system32\Gdqgfbop.exe63⤵
- Executes dropped EXE
PID:4244 -
C:\Windows\SysWOW64\Gbdgpfni.exeC:\Windows\system32\Gbdgpfni.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4420 -
C:\Windows\SysWOW64\Ickcaf32.exeC:\Windows\system32\Ickcaf32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4776 -
C:\Windows\SysWOW64\Jfeoip32.exeC:\Windows\system32\Jfeoip32.exe66⤵
- Drops file in System32 directory
PID:4260 -
C:\Windows\SysWOW64\Keabkkdg.exeC:\Windows\system32\Keabkkdg.exe67⤵PID:3248
-
C:\Windows\SysWOW64\Kfanen32.exeC:\Windows\system32\Kfanen32.exe68⤵
- Drops file in System32 directory
PID:3064 -
C:\Windows\SysWOW64\Ldeonbkd.exeC:\Windows\system32\Ldeonbkd.exe69⤵
- Modifies registry class
PID:4968 -
C:\Windows\SysWOW64\Liimgh32.exeC:\Windows\system32\Liimgh32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:760 -
C:\Windows\SysWOW64\Mikjmhaq.exeC:\Windows\system32\Mikjmhaq.exe71⤵
- Drops file in System32 directory
PID:1028 -
C:\Windows\SysWOW64\Mgfqgkib.exeC:\Windows\system32\Mgfqgkib.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2908 -
C:\Windows\SysWOW64\Onqbjccl.exeC:\Windows\system32\Onqbjccl.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1932 -
C:\Windows\SysWOW64\Ocdqcikl.exeC:\Windows\system32\Ocdqcikl.exe74⤵PID:2228
-
C:\Windows\SysWOW64\Qjmeaafi.exeC:\Windows\system32\Qjmeaafi.exe75⤵
- Drops file in System32 directory
PID:4400 -
C:\Windows\SysWOW64\Bmngjj32.exeC:\Windows\system32\Bmngjj32.exe76⤵PID:3888
-
C:\Windows\SysWOW64\Cabfagee.exeC:\Windows\system32\Cabfagee.exe77⤵PID:688
-
C:\Windows\SysWOW64\Dodbkiho.exeC:\Windows\system32\Dodbkiho.exe78⤵PID:1836
-
C:\Windows\SysWOW64\Egijfjmp.exeC:\Windows\system32\Egijfjmp.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1776 -
C:\Windows\SysWOW64\Gkglcfec.exeC:\Windows\system32\Gkglcfec.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4668 -
C:\Windows\SysWOW64\Ghklmk32.exeC:\Windows\system32\Ghklmk32.exe81⤵PID:2632
-
C:\Windows\SysWOW64\Goediekj.exeC:\Windows\system32\Goediekj.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4912 -
C:\Windows\SysWOW64\Gfomfo32.exeC:\Windows\system32\Gfomfo32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4700 -
C:\Windows\SysWOW64\Hojndd32.exeC:\Windows\system32\Hojndd32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1412 -
C:\Windows\SysWOW64\Inpclnnj.exeC:\Windows\system32\Inpclnnj.exe85⤵
- Drops file in System32 directory
PID:2488 -
C:\Windows\SysWOW64\Jkhnab32.exeC:\Windows\system32\Jkhnab32.exe86⤵PID:4580
-
C:\Windows\SysWOW64\Jilnjf32.exeC:\Windows\system32\Jilnjf32.exe87⤵PID:3876
-
C:\Windows\SysWOW64\Jnifbmfo.exeC:\Windows\system32\Jnifbmfo.exe88⤵PID:4256
-
C:\Windows\SysWOW64\Jnkchmdl.exeC:\Windows\system32\Jnkchmdl.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3544 -
C:\Windows\SysWOW64\Lhbdbpnm.exeC:\Windows\system32\Lhbdbpnm.exe90⤵PID:4188
-
C:\Windows\SysWOW64\Mbqkfhfh.exeC:\Windows\system32\Mbqkfhfh.exe91⤵
- Drops file in System32 directory
PID:1156 -
C:\Windows\SysWOW64\Nockfgao.exeC:\Windows\system32\Nockfgao.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3860 -
C:\Windows\SysWOW64\Nlglpkpi.exeC:\Windows\system32\Nlglpkpi.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2028 -
C:\Windows\SysWOW64\Niklip32.exeC:\Windows\system32\Niklip32.exe94⤵
- Drops file in System32 directory
PID:936 -
C:\Windows\SysWOW64\Npedfjfo.exeC:\Windows\system32\Npedfjfo.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1284 -
C:\Windows\SysWOW64\Nhbfpl32.exeC:\Windows\system32\Nhbfpl32.exe96⤵PID:1236
-
C:\Windows\SysWOW64\Oomnmfid.exeC:\Windows\system32\Oomnmfid.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3904 -
C:\Windows\SysWOW64\Oeffip32.exeC:\Windows\system32\Oeffip32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2292 -
C:\Windows\SysWOW64\Oookbega.exeC:\Windows\system32\Oookbega.exe99⤵PID:1380
-
C:\Windows\SysWOW64\Ohgokknb.exeC:\Windows\system32\Ohgokknb.exe100⤵PID:3320
-
C:\Windows\SysWOW64\Ooaghe32.exeC:\Windows\system32\Ooaghe32.exe101⤵PID:2924
-
C:\Windows\SysWOW64\Ohjlqklp.exeC:\Windows\system32\Ohjlqklp.exe102⤵PID:2304
-
C:\Windows\SysWOW64\Ocopncke.exeC:\Windows\system32\Ocopncke.exe103⤵PID:3348
-
C:\Windows\SysWOW64\Ohnelj32.exeC:\Windows\system32\Ohnelj32.exe104⤵PID:3684
-
C:\Windows\SysWOW64\Pgoejapi.exeC:\Windows\system32\Pgoejapi.exe105⤵
- Drops file in System32 directory
PID:1948 -
C:\Windows\SysWOW64\Phqbaj32.exeC:\Windows\system32\Phqbaj32.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:5124 -
C:\Windows\SysWOW64\Phcogice.exeC:\Windows\system32\Phcogice.exe107⤵
- Modifies registry class
PID:5168 -
C:\Windows\SysWOW64\Aqffdejj.exeC:\Windows\system32\Aqffdejj.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5232 -
C:\Windows\SysWOW64\Aifdcgcp.exeC:\Windows\system32\Aifdcgcp.exe109⤵
- Modifies registry class
PID:5272 -
C:\Windows\SysWOW64\Aobieq32.exeC:\Windows\system32\Aobieq32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5336 -
C:\Windows\SysWOW64\Bidqddgp.exeC:\Windows\system32\Bidqddgp.exe111⤵PID:5380
-
C:\Windows\SysWOW64\Cflkihbd.exeC:\Windows\system32\Cflkihbd.exe112⤵
- Drops file in System32 directory
PID:5416 -
C:\Windows\SysWOW64\Cmfcfb32.exeC:\Windows\system32\Cmfcfb32.exe113⤵
- Modifies registry class
PID:5472 -
C:\Windows\SysWOW64\Dibmfb32.exeC:\Windows\system32\Dibmfb32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5508 -
C:\Windows\SysWOW64\Didjkbim.exeC:\Windows\system32\Didjkbim.exe115⤵PID:5560
-
C:\Windows\SysWOW64\Efdjqeni.exeC:\Windows\system32\Efdjqeni.exe116⤵PID:5600
-
C:\Windows\SysWOW64\Eainnn32.exeC:\Windows\system32\Eainnn32.exe117⤵
- Drops file in System32 directory
PID:5644 -
C:\Windows\SysWOW64\Fgpilc32.exeC:\Windows\system32\Fgpilc32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5796 -
C:\Windows\SysWOW64\Gacjkjgb.exeC:\Windows\system32\Gacjkjgb.exe119⤵
- Modifies registry class
PID:5920 -
C:\Windows\SysWOW64\Hkeajn32.exeC:\Windows\system32\Hkeajn32.exe120⤵PID:5972
-
C:\Windows\SysWOW64\Knofif32.exeC:\Windows\system32\Knofif32.exe121⤵
- Modifies registry class
PID:6008 -
C:\Windows\SysWOW64\Kghjakbl.exeC:\Windows\system32\Kghjakbl.exe122⤵PID:6052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-