Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 18:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.e34bd2b14af5ce620292006181ef5390.exe
Resource
win7-20231023-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.e34bd2b14af5ce620292006181ef5390.exe
Resource
win10v2004-20231023-en
6 signatures
150 seconds
General
-
Target
NEAS.e34bd2b14af5ce620292006181ef5390.exe
-
Size
112KB
-
MD5
e34bd2b14af5ce620292006181ef5390
-
SHA1
67c8152f8c4f9f8453a6d94b5be24b9464913f48
-
SHA256
2742c0015f1fe5ee33e27e0a033e89d7b7a4c15d29b0d08dfff7022542c2fcf7
-
SHA512
9c5b99570c906e35924fb32515d867afb74563b78fecdbe0eb6e192efcde553c97ca996d112fe84449f7934c4b31f57eeb28be459f6c81819f714632bd8833e5
-
SSDEEP
1536:hzaYliq7pW0beNX//gE9cjqMHFi2jXq+66DFUABABOVLefEjw6YmLg:jlf700beNCTHFi2j6+JB8M6mk
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Menpgmap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecipeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncfbdfgp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhafoh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjfngi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pdhbgn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aecnmo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgdinmod.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknnhekd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Libido32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eliecc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icdhdfcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amodnenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icoodj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iciflfcd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocopncke.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnknkbdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oilmckml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aohpek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aoeleelp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhqngm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opiidhoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkmihi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akqfef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hefneq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flgaodbm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kphkee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqojlbcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbbefafp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqafbaap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njjdae32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgeegled.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddfbaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djegoanj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggfombmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkfnnjnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofqnlplf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbcabo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icgjfgef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chepehne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chepehne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Efkfkilj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpfmem32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpggkbfq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlnjlkjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qggebl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihjjln32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aiejda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dejamdca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igcgpalj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lafmce32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iqaiga32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbpkfa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmcfma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkdagm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffggdmbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnaalghe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dknnhekd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgihanii.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jndhkmfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ghnpmqef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmedca32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlipfh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agdhln32.exe -
Executes dropped EXE 64 IoCs
pid Process 3964 Iqaiga32.exe 3888 Libido32.exe 764 Miipencp.exe 3984 Ndmpddfe.exe 1480 Pgihanii.exe 3356 Qggebl32.exe 4952 Bgjjoi32.exe 4872 Ciqmjkno.exe 4896 Daeddlco.exe 4264 Eliecc32.exe 2484 Flpkcbqm.exe 5048 Facjlhil.exe 4600 Hccomh32.exe 5112 Ihjjln32.exe 4480 Icdhdfcj.exe 4876 Jbpkfa32.exe 2056 Kcfnqccd.exe 4260 Lobhqdec.exe 2540 Lbcabo32.exe 2300 Lcbmlbig.exe 1884 Mmokpglb.exe 2220 Npighq32.exe 4528 Omkdcccb.exe 1628 Aiejda32.exe 2480 Agpqnd32.exe 1672 Bnclamqe.exe 1488 Ccbaoc32.exe 4176 Cnahbk32.exe 4828 Emikpeig.exe 2180 Fnmqegle.exe 4580 Flfjjkgi.exe 2492 Geqlhp32.exe 848 Hmcfma32.exe 2440 Hlfcqh32.exe 4036 Hlipfh32.exe 3576 Hmlicp32.exe 1808 Iamoon32.exe 2272 Inflio32.exe 1232 Jogeia32.exe 2796 Jndhkmfe.exe 4924 Lnfngj32.exe 2760 Mkdagm32.exe 1804 Obnbjdfi.exe 2256 Opiidhoj.exe 3716 Pimmil32.exe 996 Ihfpabbd.exe 4928 Oecnmi32.exe 3412 Ahdpea32.exe 3908 Ecmlmcmb.exe 2908 Ffggdmbi.exe 4212 Gfnnel32.exe 4124 Hcidoo32.exe 2768 Ipihkobl.exe 1344 Lnccmnak.exe 1416 Oqmhlego.exe 3616 Pclnon32.exe 4620 Pnaalghe.exe 4272 Qaegcb32.exe 4804 Qgopplkq.exe 3360 Acmfel32.exe 4832 Anbkbe32.exe 4696 Cdaigi32.exe 3844 Cddemi32.exe 4600 Dhidcffq.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ddpeigle.exe Dboiaoff.exe File opened for modification C:\Windows\SysWOW64\Ggfombmd.exe Gpmgph32.exe File created C:\Windows\SysWOW64\Jidoefag.dll Ilhcmpeg.exe File created C:\Windows\SysWOW64\Dglkno32.dll Dafbhkhl.exe File created C:\Windows\SysWOW64\Hibbnc32.dll Dboiaoff.exe File created C:\Windows\SysWOW64\Hcblakmh.dll Iehfno32.exe File opened for modification C:\Windows\SysWOW64\Jngjmm32.exe Hkckoe32.exe File created C:\Windows\SysWOW64\Hlipal32.exe Geohdago.exe File created C:\Windows\SysWOW64\Pofhnlcl.dll Icgjfgef.exe File created C:\Windows\SysWOW64\Gdnmaeek.dll Bmhfddeq.exe File created C:\Windows\SysWOW64\Akqfef32.exe Aecnmo32.exe File created C:\Windows\SysWOW64\Bdocin32.exe Ajjoej32.exe File created C:\Windows\SysWOW64\Gkhbnh32.dll Ciqmjkno.exe File created C:\Windows\SysWOW64\Ncapbnlk.dll Kodnfqgm.exe File created C:\Windows\SysWOW64\Aonokdce.exe Adiknkco.exe File created C:\Windows\SysWOW64\Omlqbnaj.dll Djegoanj.exe File created C:\Windows\SysWOW64\Geqlhp32.exe Flfjjkgi.exe File created C:\Windows\SysWOW64\Jlqohhja.exe Igcgpalj.exe File created C:\Windows\SysWOW64\Keifneoc.exe Kolakkii.exe File created C:\Windows\SysWOW64\Njfbkhnd.dll Lllaqn32.exe File created C:\Windows\SysWOW64\Dpfmem32.exe Dildibfd.exe File created C:\Windows\SysWOW64\Ffggdmbi.exe Ecmlmcmb.exe File created C:\Windows\SysWOW64\Galcjkmj.exe Ggfombmd.exe File created C:\Windows\SysWOW64\Glnlloji.dll Mbbaaapj.exe File created C:\Windows\SysWOW64\Jljhqhhm.dll Fppqjcli.exe File opened for modification C:\Windows\SysWOW64\Kodnfqgm.exe Kflink32.exe File opened for modification C:\Windows\SysWOW64\Adiknkco.exe Akqfef32.exe File created C:\Windows\SysWOW64\Lpccfm32.exe Lemoid32.exe File created C:\Windows\SysWOW64\Ajjoej32.exe Ofqnlplf.exe File created C:\Windows\SysWOW64\Ibgfkq32.dll Lcbmlbig.exe File created C:\Windows\SysWOW64\Paakccpj.dll Ilkocb32.exe File opened for modification C:\Windows\SysWOW64\Lcapbi32.exe Lpccfm32.exe File created C:\Windows\SysWOW64\Hbemgh32.dll Agpqnd32.exe File created C:\Windows\SysWOW64\Dojjoebf.dll Jngjmm32.exe File opened for modification C:\Windows\SysWOW64\Icoodj32.exe Hmbflc32.exe File created C:\Windows\SysWOW64\Fnipliip.exe Fmhcda32.exe File created C:\Windows\SysWOW64\Kmgcej32.dll Chepehne.exe File created C:\Windows\SysWOW64\Hlnjlkjf.exe Hedaoa32.exe File created C:\Windows\SysWOW64\Jijpnp32.dll Lgblhmag.exe File opened for modification C:\Windows\SysWOW64\Ihjjln32.exe Hccomh32.exe File created C:\Windows\SysWOW64\Iamoon32.exe Hmlicp32.exe File opened for modification C:\Windows\SysWOW64\Ddpeigle.exe Dboiaoff.exe File opened for modification C:\Windows\SysWOW64\Aonokdce.exe Adiknkco.exe File opened for modification C:\Windows\SysWOW64\Mqojlbcb.exe Lgdinmod.exe File created C:\Windows\SysWOW64\Pnaalghe.exe Pclnon32.exe File opened for modification C:\Windows\SysWOW64\Gmhogppb.exe Fooecl32.exe File opened for modification C:\Windows\SysWOW64\Eofgioah.exe Efnbqi32.exe File opened for modification C:\Windows\SysWOW64\Nmfmnjgh.exe Nfldap32.exe File opened for modification C:\Windows\SysWOW64\Ndmpddfe.exe Miipencp.exe File created C:\Windows\SysWOW64\Agpqnd32.exe Aiejda32.exe File opened for modification C:\Windows\SysWOW64\Inflio32.exe Iamoon32.exe File opened for modification C:\Windows\SysWOW64\Nbefmopd.exe Nhpbpepo.exe File created C:\Windows\SysWOW64\Ipihiaqa.exe Ilkocb32.exe File created C:\Windows\SysWOW64\Djegoanj.exe Dajbjoao.exe File opened for modification C:\Windows\SysWOW64\Libido32.exe Iqaiga32.exe File created C:\Windows\SysWOW64\Gopdnemk.dll Omkdcccb.exe File opened for modification C:\Windows\SysWOW64\Geqlhp32.exe Flfjjkgi.exe File opened for modification C:\Windows\SysWOW64\Fbbpgh32.exe Fejebdig.exe File opened for modification C:\Windows\SysWOW64\Fcbnjcbb.exe Fnffam32.exe File created C:\Windows\SysWOW64\Bgjjoi32.exe Qggebl32.exe File created C:\Windows\SysWOW64\Menpgmap.exe Lkmihi32.exe File created C:\Windows\SysWOW64\Aoeleelp.exe Qdphgmlj.exe File opened for modification C:\Windows\SysWOW64\Bdkgckal.exe Aonokdce.exe File created C:\Windows\SysWOW64\Geohdago.exe Goepgg32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2836 6204 WerFault.exe 383 6392 6204 WerFault.exe 383 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghnpmqef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhafoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gkfnnjnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipihiaqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bpncbp32.dll" Iqaiga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcnqid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpggkbfq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eliecc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghemlbmh.dll" Ffqhmf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fqpomo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iobeno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iqaiga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iffkfkai.dll" Kjjinp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjminj32.dll" Pdhbgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klldib32.dll" Ihjjln32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Menpgmap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kodnfqgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddnmnf32.dll" Iamoon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oegejc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfnojh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fadoii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cipppc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clbhqcam.dll" Fbbpgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kedcml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dcnqid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nmcphkik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjcol32.dll" Lobhqdec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dglkno32.dll" Dafbhkhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fclnkgap.dll" Fhngfcdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmpcpjcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkpjnd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdabmcdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fajnoabh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glodmbga.dll" Hkpgooim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffjignde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnbcoe32.dll" Kedcml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdaigi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ghnpmqef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkaedk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fecmjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lppbdmig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bmhfddeq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eodjdocj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndmdbf32.dll" Fadoii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehhfeg32.dll" Kfoapo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgmcpdqc.dll" Fmfnig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hmlpkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbpjgmbe.dll" Efnbqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkempa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mkdagm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikodjj32.dll" Fejebdig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnqfekhi.dll" Fnipliip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iedjfodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojmqgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajjoej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Infanp32.dll" Ihfpabbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhidcffq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chepehne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpoaed32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Icdhdfcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jogeia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Akhmng32.dll" Bcddlhgo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akniofoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Igcgpalj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 3964 5068 NEAS.e34bd2b14af5ce620292006181ef5390.exe 94 PID 5068 wrote to memory of 3964 5068 NEAS.e34bd2b14af5ce620292006181ef5390.exe 94 PID 5068 wrote to memory of 3964 5068 NEAS.e34bd2b14af5ce620292006181ef5390.exe 94 PID 3964 wrote to memory of 3888 3964 Iqaiga32.exe 95 PID 3964 wrote to memory of 3888 3964 Iqaiga32.exe 95 PID 3964 wrote to memory of 3888 3964 Iqaiga32.exe 95 PID 3888 wrote to memory of 764 3888 Libido32.exe 96 PID 3888 wrote to memory of 764 3888 Libido32.exe 96 PID 3888 wrote to memory of 764 3888 Libido32.exe 96 PID 764 wrote to memory of 3984 764 Miipencp.exe 97 PID 764 wrote to memory of 3984 764 Miipencp.exe 97 PID 764 wrote to memory of 3984 764 Miipencp.exe 97 PID 3984 wrote to memory of 1480 3984 Ndmpddfe.exe 98 PID 3984 wrote to memory of 1480 3984 Ndmpddfe.exe 98 PID 3984 wrote to memory of 1480 3984 Ndmpddfe.exe 98 PID 1480 wrote to memory of 3356 1480 Pgihanii.exe 99 PID 1480 wrote to memory of 3356 1480 Pgihanii.exe 99 PID 1480 wrote to memory of 3356 1480 Pgihanii.exe 99 PID 3356 wrote to memory of 4952 3356 Qggebl32.exe 100 PID 3356 wrote to memory of 4952 3356 Qggebl32.exe 100 PID 3356 wrote to memory of 4952 3356 Qggebl32.exe 100 PID 4952 wrote to memory of 4872 4952 Bgjjoi32.exe 101 PID 4952 wrote to memory of 4872 4952 Bgjjoi32.exe 101 PID 4952 wrote to memory of 4872 4952 Bgjjoi32.exe 101 PID 4872 wrote to memory of 4896 4872 Ciqmjkno.exe 102 PID 4872 wrote to memory of 4896 4872 Ciqmjkno.exe 102 PID 4872 wrote to memory of 4896 4872 Ciqmjkno.exe 102 PID 4896 wrote to memory of 4264 4896 Daeddlco.exe 103 PID 4896 wrote to memory of 4264 4896 Daeddlco.exe 103 PID 4896 wrote to memory of 4264 4896 Daeddlco.exe 103 PID 4264 wrote to memory of 2484 4264 Eliecc32.exe 104 PID 4264 wrote to memory of 2484 4264 Eliecc32.exe 104 PID 4264 wrote to memory of 2484 4264 Eliecc32.exe 104 PID 2484 wrote to memory of 5048 2484 Flpkcbqm.exe 105 PID 2484 wrote to memory of 5048 2484 Flpkcbqm.exe 105 PID 2484 wrote to memory of 5048 2484 Flpkcbqm.exe 105 PID 5048 wrote to memory of 4600 5048 Facjlhil.exe 106 PID 5048 wrote to memory of 4600 5048 Facjlhil.exe 106 PID 5048 wrote to memory of 4600 5048 Facjlhil.exe 106 PID 4600 wrote to memory of 5112 4600 Hccomh32.exe 107 PID 4600 wrote to memory of 5112 4600 Hccomh32.exe 107 PID 4600 wrote to memory of 5112 4600 Hccomh32.exe 107 PID 5112 wrote to memory of 4480 5112 Ihjjln32.exe 108 PID 5112 wrote to memory of 4480 5112 Ihjjln32.exe 108 PID 5112 wrote to memory of 4480 5112 Ihjjln32.exe 108 PID 4480 wrote to memory of 4876 4480 Icdhdfcj.exe 109 PID 4480 wrote to memory of 4876 4480 Icdhdfcj.exe 109 PID 4480 wrote to memory of 4876 4480 Icdhdfcj.exe 109 PID 4876 wrote to memory of 2056 4876 Jbpkfa32.exe 110 PID 4876 wrote to memory of 2056 4876 Jbpkfa32.exe 110 PID 4876 wrote to memory of 2056 4876 Jbpkfa32.exe 110 PID 2056 wrote to memory of 4260 2056 Kcfnqccd.exe 111 PID 2056 wrote to memory of 4260 2056 Kcfnqccd.exe 111 PID 2056 wrote to memory of 4260 2056 Kcfnqccd.exe 111 PID 4260 wrote to memory of 2540 4260 Lobhqdec.exe 112 PID 4260 wrote to memory of 2540 4260 Lobhqdec.exe 112 PID 4260 wrote to memory of 2540 4260 Lobhqdec.exe 112 PID 2540 wrote to memory of 2300 2540 Lbcabo32.exe 113 PID 2540 wrote to memory of 2300 2540 Lbcabo32.exe 113 PID 2540 wrote to memory of 2300 2540 Lbcabo32.exe 113 PID 2300 wrote to memory of 1884 2300 Lcbmlbig.exe 115 PID 2300 wrote to memory of 1884 2300 Lcbmlbig.exe 115 PID 2300 wrote to memory of 1884 2300 Lcbmlbig.exe 115 PID 1884 wrote to memory of 2220 1884 Mmokpglb.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e34bd2b14af5ce620292006181ef5390.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e34bd2b14af5ce620292006181ef5390.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\Iqaiga32.exeC:\Windows\system32\Iqaiga32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\Libido32.exeC:\Windows\system32\Libido32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\Miipencp.exeC:\Windows\system32\Miipencp.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\Ndmpddfe.exeC:\Windows\system32\Ndmpddfe.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\Pgihanii.exeC:\Windows\system32\Pgihanii.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\Qggebl32.exeC:\Windows\system32\Qggebl32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\Bgjjoi32.exeC:\Windows\system32\Bgjjoi32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\Ciqmjkno.exeC:\Windows\system32\Ciqmjkno.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\Daeddlco.exeC:\Windows\system32\Daeddlco.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\Eliecc32.exeC:\Windows\system32\Eliecc32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\Flpkcbqm.exeC:\Windows\system32\Flpkcbqm.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Facjlhil.exeC:\Windows\system32\Facjlhil.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\Hccomh32.exeC:\Windows\system32\Hccomh32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\Ihjjln32.exeC:\Windows\system32\Ihjjln32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\Icdhdfcj.exeC:\Windows\system32\Icdhdfcj.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\Jbpkfa32.exeC:\Windows\system32\Jbpkfa32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\Kcfnqccd.exeC:\Windows\system32\Kcfnqccd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Lobhqdec.exeC:\Windows\system32\Lobhqdec.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\Lbcabo32.exeC:\Windows\system32\Lbcabo32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Lcbmlbig.exeC:\Windows\system32\Lcbmlbig.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Mmokpglb.exeC:\Windows\system32\Mmokpglb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\Npighq32.exeC:\Windows\system32\Npighq32.exe23⤵
- Executes dropped EXE
PID:2220 -
C:\Windows\SysWOW64\Omkdcccb.exeC:\Windows\system32\Omkdcccb.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4528 -
C:\Windows\SysWOW64\Aiejda32.exeC:\Windows\system32\Aiejda32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1628 -
C:\Windows\SysWOW64\Agpqnd32.exeC:\Windows\system32\Agpqnd32.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2480 -
C:\Windows\SysWOW64\Bnclamqe.exeC:\Windows\system32\Bnclamqe.exe27⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\Ccbaoc32.exeC:\Windows\system32\Ccbaoc32.exe28⤵
- Executes dropped EXE
PID:1488 -
C:\Windows\SysWOW64\Cnahbk32.exeC:\Windows\system32\Cnahbk32.exe29⤵
- Executes dropped EXE
PID:4176 -
C:\Windows\SysWOW64\Emikpeig.exeC:\Windows\system32\Emikpeig.exe30⤵
- Executes dropped EXE
PID:4828 -
C:\Windows\SysWOW64\Fnmqegle.exeC:\Windows\system32\Fnmqegle.exe31⤵
- Executes dropped EXE
PID:2180 -
C:\Windows\SysWOW64\Flfjjkgi.exeC:\Windows\system32\Flfjjkgi.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4580 -
C:\Windows\SysWOW64\Geqlhp32.exeC:\Windows\system32\Geqlhp32.exe33⤵
- Executes dropped EXE
PID:2492 -
C:\Windows\SysWOW64\Hmcfma32.exeC:\Windows\system32\Hmcfma32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\Hlfcqh32.exeC:\Windows\system32\Hlfcqh32.exe35⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\Hlipfh32.exeC:\Windows\system32\Hlipfh32.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4036 -
C:\Windows\SysWOW64\Hmlicp32.exeC:\Windows\system32\Hmlicp32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3576 -
C:\Windows\SysWOW64\Iamoon32.exeC:\Windows\system32\Iamoon32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1808 -
C:\Windows\SysWOW64\Inflio32.exeC:\Windows\system32\Inflio32.exe39⤵
- Executes dropped EXE
PID:2272 -
C:\Windows\SysWOW64\Jogeia32.exeC:\Windows\system32\Jogeia32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:1232 -
C:\Windows\SysWOW64\Jndhkmfe.exeC:\Windows\system32\Jndhkmfe.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\Lnfngj32.exeC:\Windows\system32\Lnfngj32.exe42⤵
- Executes dropped EXE
PID:4924 -
C:\Windows\SysWOW64\Mkdagm32.exeC:\Windows\system32\Mkdagm32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2760 -
C:\Windows\SysWOW64\Niadfpcn.exeC:\Windows\system32\Niadfpcn.exe44⤵PID:4612
-
C:\Windows\SysWOW64\Obnbjdfi.exeC:\Windows\system32\Obnbjdfi.exe45⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\Opiidhoj.exeC:\Windows\system32\Opiidhoj.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2256 -
C:\Windows\SysWOW64\Pimmil32.exeC:\Windows\system32\Pimmil32.exe47⤵
- Executes dropped EXE
PID:3716 -
C:\Windows\SysWOW64\Ihfpabbd.exeC:\Windows\system32\Ihfpabbd.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:996 -
C:\Windows\SysWOW64\Oecnmi32.exeC:\Windows\system32\Oecnmi32.exe49⤵
- Executes dropped EXE
PID:4928 -
C:\Windows\SysWOW64\Ahdpea32.exeC:\Windows\system32\Ahdpea32.exe50⤵
- Executes dropped EXE
PID:3412 -
C:\Windows\SysWOW64\Ecmlmcmb.exeC:\Windows\system32\Ecmlmcmb.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3908 -
C:\Windows\SysWOW64\Ffggdmbi.exeC:\Windows\system32\Ffggdmbi.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\Gfnnel32.exeC:\Windows\system32\Gfnnel32.exe53⤵
- Executes dropped EXE
PID:4212 -
C:\Windows\SysWOW64\Hcidoo32.exeC:\Windows\system32\Hcidoo32.exe54⤵
- Executes dropped EXE
PID:4124 -
C:\Windows\SysWOW64\Ipihkobl.exeC:\Windows\system32\Ipihkobl.exe55⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\Lnccmnak.exeC:\Windows\system32\Lnccmnak.exe56⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\Oqmhlego.exeC:\Windows\system32\Oqmhlego.exe57⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\Pclnon32.exeC:\Windows\system32\Pclnon32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3616 -
C:\Windows\SysWOW64\Pnaalghe.exeC:\Windows\system32\Pnaalghe.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\Qaegcb32.exeC:\Windows\system32\Qaegcb32.exe60⤵
- Executes dropped EXE
PID:4272 -
C:\Windows\SysWOW64\Qgopplkq.exeC:\Windows\system32\Qgopplkq.exe61⤵
- Executes dropped EXE
PID:4804 -
C:\Windows\SysWOW64\Acmfel32.exeC:\Windows\system32\Acmfel32.exe62⤵
- Executes dropped EXE
PID:3360 -
C:\Windows\SysWOW64\Anbkbe32.exeC:\Windows\system32\Anbkbe32.exe63⤵
- Executes dropped EXE
PID:4832 -
C:\Windows\SysWOW64\Cdaigi32.exeC:\Windows\system32\Cdaigi32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:4696 -
C:\Windows\SysWOW64\Cddemi32.exeC:\Windows\system32\Cddemi32.exe65⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\Dhidcffq.exeC:\Windows\system32\Dhidcffq.exe66⤵
- Executes dropped EXE
- Modifies registry class
PID:4600 -
C:\Windows\SysWOW64\Dboiaoff.exeC:\Windows\system32\Dboiaoff.exe67⤵
- Drops file in System32 directory
PID:2028 -
C:\Windows\SysWOW64\Ddpeigle.exeC:\Windows\system32\Ddpeigle.exe68⤵PID:4016
-
C:\Windows\SysWOW64\Dafbhkhl.exeC:\Windows\system32\Dafbhkhl.exe69⤵
- Drops file in System32 directory
- Modifies registry class
PID:3272 -
C:\Windows\SysWOW64\Fadoii32.exeC:\Windows\system32\Fadoii32.exe70⤵
- Modifies registry class
PID:2540 -
C:\Windows\SysWOW64\Fhngfcdi.exeC:\Windows\system32\Fhngfcdi.exe71⤵
- Modifies registry class
PID:4204 -
C:\Windows\SysWOW64\Fooecl32.exeC:\Windows\system32\Fooecl32.exe72⤵
- Drops file in System32 directory
PID:436 -
C:\Windows\SysWOW64\Gmhogppb.exeC:\Windows\system32\Gmhogppb.exe73⤵PID:4688
-
C:\Windows\SysWOW64\Ghnpmqef.exeC:\Windows\system32\Ghnpmqef.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4704 -
C:\Windows\SysWOW64\Hdgmga32.exeC:\Windows\system32\Hdgmga32.exe75⤵PID:4488
-
C:\Windows\SysWOW64\Hkaedk32.exeC:\Windows\system32\Hkaedk32.exe76⤵
- Modifies registry class
PID:636 -
C:\Windows\SysWOW64\Hbknqeha.exeC:\Windows\system32\Hbknqeha.exe77⤵PID:1500
-
C:\Windows\SysWOW64\Hodgei32.exeC:\Windows\system32\Hodgei32.exe78⤵PID:3748
-
C:\Windows\SysWOW64\Icgjfgef.exeC:\Windows\system32\Icgjfgef.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4576 -
C:\Windows\SysWOW64\Iehfno32.exeC:\Windows\system32\Iehfno32.exe80⤵
- Drops file in System32 directory
PID:1736 -
C:\Windows\SysWOW64\Iciflfcd.exeC:\Windows\system32\Iciflfcd.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1512 -
C:\Windows\SysWOW64\Jecejm32.exeC:\Windows\system32\Jecejm32.exe82⤵PID:3888
-
C:\Windows\SysWOW64\Kblpnall.exeC:\Windows\system32\Kblpnall.exe83⤵PID:2696
-
C:\Windows\SysWOW64\Kfoapo32.exeC:\Windows\system32\Kfoapo32.exe84⤵
- Modifies registry class
PID:848 -
C:\Windows\SysWOW64\Lbjlpo32.exeC:\Windows\system32\Lbjlpo32.exe85⤵PID:792
-
C:\Windows\SysWOW64\Bmpcpjcd.exeC:\Windows\system32\Bmpcpjcd.exe86⤵
- Modifies registry class
PID:5032 -
C:\Windows\SysWOW64\Cdabmcdi.exeC:\Windows\system32\Cdabmcdi.exe87⤵
- Modifies registry class
PID:740 -
C:\Windows\SysWOW64\Dejamdca.exeC:\Windows\system32\Dejamdca.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3300 -
C:\Windows\SysWOW64\Fecmjq32.exeC:\Windows\system32\Fecmjq32.exe89⤵
- Modifies registry class
PID:1232 -
C:\Windows\SysWOW64\Fajnoabh.exeC:\Windows\system32\Fajnoabh.exe90⤵
- Modifies registry class
PID:2944 -
C:\Windows\SysWOW64\Gkcbhgii.exeC:\Windows\system32\Gkcbhgii.exe91⤵PID:5112
-
C:\Windows\SysWOW64\Hkckoe32.exeC:\Windows\system32\Hkckoe32.exe92⤵
- Drops file in System32 directory
PID:972 -
C:\Windows\SysWOW64\Jngjmm32.exeC:\Windows\system32\Jngjmm32.exe93⤵
- Drops file in System32 directory
PID:4004 -
C:\Windows\SysWOW64\Lppbdmig.exeC:\Windows\system32\Lppbdmig.exe94⤵
- Modifies registry class
PID:1816 -
C:\Windows\SysWOW64\Nllekk32.exeC:\Windows\system32\Nllekk32.exe95⤵PID:4384
-
C:\Windows\SysWOW64\Ngaihcli.exeC:\Windows\system32\Ngaihcli.exe96⤵PID:4300
-
C:\Windows\SysWOW64\Ocopncke.exeC:\Windows\system32\Ocopncke.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4872 -
C:\Windows\SysWOW64\Ajlngk32.exeC:\Windows\system32\Ajlngk32.exe98⤵PID:1932
-
C:\Windows\SysWOW64\Amodnenk.exeC:\Windows\system32\Amodnenk.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3280 -
C:\Windows\SysWOW64\Agdhln32.exeC:\Windows\system32\Agdhln32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1124 -
C:\Windows\SysWOW64\Bmhfddeq.exeC:\Windows\system32\Bmhfddeq.exe101⤵
- Drops file in System32 directory
- Modifies registry class
PID:2320 -
C:\Windows\SysWOW64\Bjaqih32.exeC:\Windows\system32\Bjaqih32.exe102⤵PID:920
-
C:\Windows\SysWOW64\Cipppc32.exeC:\Windows\system32\Cipppc32.exe103⤵
- Modifies registry class
PID:3224 -
C:\Windows\SysWOW64\Ffmmgceo.exeC:\Windows\system32\Ffmmgceo.exe104⤵PID:1384
-
C:\Windows\SysWOW64\Gpmgph32.exeC:\Windows\system32\Gpmgph32.exe105⤵
- Drops file in System32 directory
PID:5096 -
C:\Windows\SysWOW64\Ggfombmd.exeC:\Windows\system32\Ggfombmd.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4556 -
C:\Windows\SysWOW64\Galcjkmj.exeC:\Windows\system32\Galcjkmj.exe107⤵PID:3484
-
C:\Windows\SysWOW64\Hkpgooim.exeC:\Windows\system32\Hkpgooim.exe108⤵
- Modifies registry class
PID:4132 -
C:\Windows\SysWOW64\Hdmecdlh.exeC:\Windows\system32\Hdmecdlh.exe109⤵PID:1804
-
C:\Windows\SysWOW64\Jjfngi32.exeC:\Windows\system32\Jjfngi32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4764 -
C:\Windows\SysWOW64\Jipqkopf.exeC:\Windows\system32\Jipqkopf.exe111⤵PID:812
-
C:\Windows\SysWOW64\Kkomgkoj.exeC:\Windows\system32\Kkomgkoj.exe112⤵PID:4748
-
C:\Windows\SysWOW64\Kkechjib.exeC:\Windows\system32\Kkechjib.exe113⤵PID:3672
-
C:\Windows\SysWOW64\Lkmihi32.exeC:\Windows\system32\Lkmihi32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4928 -
C:\Windows\SysWOW64\Menpgmap.exeC:\Windows\system32\Menpgmap.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3196 -
C:\Windows\SysWOW64\Mlhidg32.exeC:\Windows\system32\Mlhidg32.exe116⤵PID:4760
-
C:\Windows\SysWOW64\Mbbaaapj.exeC:\Windows\system32\Mbbaaapj.exe117⤵
- Drops file in System32 directory
PID:2836 -
C:\Windows\SysWOW64\Mhoiih32.exeC:\Windows\system32\Mhoiih32.exe118⤵PID:2760
-
C:\Windows\SysWOW64\Mhafoh32.exeC:\Windows\system32\Mhafoh32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3932 -
C:\Windows\SysWOW64\Mnknkbdk.exeC:\Windows\system32\Mnknkbdk.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2896 -
C:\Windows\SysWOW64\Meefhl32.exeC:\Windows\system32\Meefhl32.exe121⤵PID:1088
-
C:\Windows\SysWOW64\Nhpbpepo.exeC:\Windows\system32\Nhpbpepo.exe122⤵
- Drops file in System32 directory
PID:3096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-