Analysis
-
max time kernel
172s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 18:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.a3f60d578ad5364405f5ad4fa3446870.exe
Resource
win7-20231023-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.a3f60d578ad5364405f5ad4fa3446870.exe
Resource
win10v2004-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.a3f60d578ad5364405f5ad4fa3446870.exe
-
Size
71KB
-
MD5
a3f60d578ad5364405f5ad4fa3446870
-
SHA1
b03192eba4ff4ca26aa914ca8355d906fa839f26
-
SHA256
4bee545475451ed112119b71854808ece7004a41ef3f419a98c4914e0e65ee60
-
SHA512
bbd377c17548031f5814648882c788c2618492c08fc146cb1c8171fb01824a5f924b7e622a294726edbf0a9eb9a2caef5ee1e03912dd2d0ee7430791257058f7
-
SSDEEP
1536:/GPRpxaXVeh+5B1zpXg3NoA2JWi4X/wU5RQixK1P+ATT:/GPRPaXVVKdogJ/wiejP+A3
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebgpkj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Komhfa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Philomje.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngdmhimb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnhkklbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfghem32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qlmopqdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gjebbfni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bopgdcnc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfiffd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apfqbj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbnikn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oejbpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dmqdmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fnacqc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnibhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bbgbjo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceaobicd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebagniin.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdalfo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enmjedpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Acppniod.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aifpoj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkbkna32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipihiaqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Emihbp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpfppl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jajdai32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iqkjkokh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Knifao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Acaanp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Objphn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljnddb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcnalbce.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kenebjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohicho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Anfmna32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fclohg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ahhbfkbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Himqjpme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ekladi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bndiponj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Afddge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jidigfeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Keboni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Knkcfobb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ohicho32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Agobgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Agaomf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ifoicdcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Icgqqmib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Paelpcgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ddgpfgil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekmhnpfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jgfcfajg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fibncmpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Acmchj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lkgdfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Poodicio.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbeece32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfojmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qamaae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aebbqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eckfaj32.exe -
Executes dropped EXE 64 IoCs
pid Process 2648 Jakkplbc.exe 1744 Nmmqgo32.exe 1528 Oihkgo32.exe 400 Pehnboko.exe 1768 Qfanbpjg.exe 1792 Qefkcl32.exe 4444 Aifpoj32.exe 3336 Acaanp32.exe 5112 Dncnnd32.exe 3092 Dmmdjp32.exe 3720 Eckfaj32.exe 2492 Egnhcgeb.exe 4292 Fclohg32.exe 5028 Gpjfng32.exe 1208 Hdaajd32.exe 2828 Ifipmo32.exe 880 Kobnji32.exe 3652 Mnmmmbll.exe 4560 Nkjqme32.exe 3192 Nkojheoe.exe 4956 Ngekmf32.exe 4388 Okhmnc32.exe 4760 Oagbljcp.exe 2260 Phkmoc32.exe 2112 Qlmopqdc.exe 1400 Aefcif32.exe 2268 Appaangd.exe 2796 Bahdje32.exe 1956 Bidefbcg.exe 3904 Chebcmna.exe 4056 Icgqqmib.exe 3756 Jidbpa32.exe 1152 Lkpnec32.exe 4756 Lkgdfb32.exe 1160 Mcklac32.exe 1368 Pclnon32.exe 2452 Pjhbah32.exe 3576 Ahhbfkbf.exe 2280 Bopgdcnc.exe 1136 Chkhbh32.exe 4540 Coepob32.exe 4384 Ddklnh32.exe 888 Ekngqqol.exe 2356 Gcagdj32.exe 4020 Hfiffd32.exe 3284 Iblfgc32.exe 220 Kfoapo32.exe 3232 Ngdmhimb.exe 3948 Qmkanmel.exe 3952 Dacohegc.exe 2484 Llpmhodc.exe 3176 Miomnaip.exe 4588 Oghpib32.exe 2368 Pjbkal32.exe 3516 Poodicio.exe 464 Amjjcf32.exe 440 Bfedhihl.exe 4700 Dfcqjg32.exe 700 Dpqonl32.exe 2908 Ehlpjikd.exe 4736 Emihbp32.exe 980 Filicodb.exe 2284 Gkbkna32.exe 4372 Gdoiaf32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ekngqqol.exe Ddklnh32.exe File created C:\Windows\SysWOW64\Afcilgif.dll Dnmhim32.exe File created C:\Windows\SysWOW64\Kpoaed32.exe Kfimhkbo.exe File created C:\Windows\SysWOW64\Phkmoc32.exe Oagbljcp.exe File created C:\Windows\SysWOW64\Nojfamdo.dll Qmkanmel.exe File created C:\Windows\SysWOW64\Djgbgjdl.dll Ojbamj32.exe File created C:\Windows\SysWOW64\Obqclgoc.dll Kfimhkbo.exe File opened for modification C:\Windows\SysWOW64\Afmfolcf.exe Ajfejknb.exe File created C:\Windows\SysWOW64\Acaanp32.exe Aifpoj32.exe File created C:\Windows\SysWOW64\Bcmbia32.dll Pclnon32.exe File opened for modification C:\Windows\SysWOW64\Diamde32.exe Diopoe32.exe File created C:\Windows\SysWOW64\Faejhf32.dll Pidaleei.exe File created C:\Windows\SysWOW64\Nemjjc32.dll Gfbpahlg.exe File opened for modification C:\Windows\SysWOW64\Piphaf32.exe Objphn32.exe File opened for modification C:\Windows\SysWOW64\Jqhaolli.exe Icoodj32.exe File created C:\Windows\SysWOW64\Iimcgg32.exe Ibcjjm32.exe File created C:\Windows\SysWOW64\Gckghp32.dll Bahkcn32.exe File opened for modification C:\Windows\SysWOW64\Gghdkg32.exe Fepehm32.exe File created C:\Windows\SysWOW64\Limmplda.dll Ahbjij32.exe File created C:\Windows\SysWOW64\Mamcddhg.exe Ledeicdf.exe File opened for modification C:\Windows\SysWOW64\Hfiffd32.exe Gcagdj32.exe File opened for modification C:\Windows\SysWOW64\Iblfgc32.exe Hfiffd32.exe File created C:\Windows\SysWOW64\Lljdkn32.exe Leplndhk.exe File opened for modification C:\Windows\SysWOW64\Hlblmd32.exe Hnibhp32.exe File opened for modification C:\Windows\SysWOW64\Ifaeidae.exe Iadmamcn.exe File opened for modification C:\Windows\SysWOW64\Pfpinq32.exe Pkjeahgf.exe File created C:\Windows\SysWOW64\Pehnboko.exe Oihkgo32.exe File created C:\Windows\SysWOW64\Pdalfo32.exe Pmgcidqm.exe File created C:\Windows\SysWOW64\Gfdnql32.dll Iadmamcn.exe File opened for modification C:\Windows\SysWOW64\Bdndik32.exe Ahbjij32.exe File created C:\Windows\SysWOW64\Ifnfgipk.dll Oqmhjged.exe File opened for modification C:\Windows\SysWOW64\Kfgpblda.exe Komhfa32.exe File created C:\Windows\SysWOW64\Hngjqe32.dll Bkdqndqi.exe File opened for modification C:\Windows\SysWOW64\Efjgihdi.exe Eocohkcg.exe File created C:\Windows\SysWOW64\Aaimiagp.dll Jakkplbc.exe File created C:\Windows\SysWOW64\Gdoiaf32.exe Gkbkna32.exe File opened for modification C:\Windows\SysWOW64\Iimcgg32.exe Ibcjjm32.exe File opened for modification C:\Windows\SysWOW64\Ljnddb32.exe Lcclhhge.exe File created C:\Windows\SysWOW64\Jcqapjnl.dll Pehnboko.exe File created C:\Windows\SysWOW64\Inckcj32.dll Kknfmdko.exe File created C:\Windows\SysWOW64\Eelbhc32.dll Pcjioknl.exe File created C:\Windows\SysWOW64\Ekhncp32.exe Eenfff32.exe File created C:\Windows\SysWOW64\Igfecagn.dll Ehifka32.exe File opened for modification C:\Windows\SysWOW64\Ehlpjikd.exe Dpqonl32.exe File opened for modification C:\Windows\SysWOW64\Jdnnjane.exe Ijadljdg.exe File opened for modification C:\Windows\SysWOW64\Fnacqc32.exe Fbkblb32.exe File opened for modification C:\Windows\SysWOW64\Efopdh32.exe Eikpkc32.exe File opened for modification C:\Windows\SysWOW64\Bidefbcg.exe Bahdje32.exe File created C:\Windows\SysWOW64\Djaigibm.dll Ngdmhimb.exe File created C:\Windows\SysWOW64\Njjmgo32.exe Mqclmk32.exe File opened for modification C:\Windows\SysWOW64\Aabkldcl.exe Afmfolcf.exe File opened for modification C:\Windows\SysWOW64\Ajndbd32.exe Pidaleei.exe File opened for modification C:\Windows\SysWOW64\Mjidpa32.exe Modpch32.exe File created C:\Windows\SysWOW64\Mqclmk32.exe Mjidpa32.exe File created C:\Windows\SysWOW64\Ehifka32.exe Eblncj32.exe File created C:\Windows\SysWOW64\Kqknekjf.exe Kknfmdko.exe File created C:\Windows\SysWOW64\Dnlhdhpl.dll Lpgmamfo.exe File opened for modification C:\Windows\SysWOW64\Jjhaea32.exe Jmdqlm32.exe File opened for modification C:\Windows\SysWOW64\Mcklac32.exe Lkgdfb32.exe File created C:\Windows\SysWOW64\Nklimgbb.dll Gdoiaf32.exe File created C:\Windows\SysWOW64\Ceaobicd.exe Cngfeo32.exe File created C:\Windows\SysWOW64\Oihkgo32.exe Nmmqgo32.exe File created C:\Windows\SysWOW64\Hpjdea32.dll Dkahba32.exe File opened for modification C:\Windows\SysWOW64\Pidaleei.exe Pcjioknl.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nemjjc32.dll" Gfbpahlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gjebbfni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ijadljdg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Philomje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Phodlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpjdea32.dll" Dkahba32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ekmhnpfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkofedgl.dll" Qhboekaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eimlpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elfggmom.dll" Dfiiejnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fbkblb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fbkblb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mocbephk.dll" Fpfppl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gmmmoppl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gghdkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hijmjj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jpnadp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nkojheoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nbnpmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pmgcidqm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mijnhi32.dll" Acmchj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfljog32.dll" Acppniod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Efjgihdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oigaicfc.dll" Kolakkii.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Anfmna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcmbia32.dll" Pclnon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dacohegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lafgibaq.dll" Fnacqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Apfqbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jeilgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ohicho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jakkplbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jqhaolli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jajdai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjffgl32.dll" Dbkpokhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajhagb32.dll" Pfojmn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Agaomf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdbiml32.dll" Okhmnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bghajgpd.dll" Ddklnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pcjioknl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnkhlpmj.dll" Ojcpmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epmiel32.dll" Ohkpno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olkkbe32.dll" Pafkpfni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hoaephii.dll" Glmhnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kkcamq32.dll" Hfqmbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbcoel32.dll" Efopdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfhideka.dll" Enmjedpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfhjfkcb.dll" Hngebq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hnibhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bichli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djaigibm.dll" Ngdmhimb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ehlpjikd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lddbej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enjjef32.dll" Eblncj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhpipb32.dll" Ajndbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eigmjjhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Agobgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epqjji32.dll" Qamaae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iodocf32.dll" Oejbpb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bahkcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cgfblh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dfcqjg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ehifka32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ngekmf32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4940 wrote to memory of 2648 4940 NEAS.a3f60d578ad5364405f5ad4fa3446870.exe 94 PID 4940 wrote to memory of 2648 4940 NEAS.a3f60d578ad5364405f5ad4fa3446870.exe 94 PID 4940 wrote to memory of 2648 4940 NEAS.a3f60d578ad5364405f5ad4fa3446870.exe 94 PID 2648 wrote to memory of 1744 2648 Jakkplbc.exe 95 PID 2648 wrote to memory of 1744 2648 Jakkplbc.exe 95 PID 2648 wrote to memory of 1744 2648 Jakkplbc.exe 95 PID 1744 wrote to memory of 1528 1744 Nmmqgo32.exe 96 PID 1744 wrote to memory of 1528 1744 Nmmqgo32.exe 96 PID 1744 wrote to memory of 1528 1744 Nmmqgo32.exe 96 PID 1528 wrote to memory of 400 1528 Oihkgo32.exe 97 PID 1528 wrote to memory of 400 1528 Oihkgo32.exe 97 PID 1528 wrote to memory of 400 1528 Oihkgo32.exe 97 PID 400 wrote to memory of 1768 400 Pehnboko.exe 98 PID 400 wrote to memory of 1768 400 Pehnboko.exe 98 PID 400 wrote to memory of 1768 400 Pehnboko.exe 98 PID 1768 wrote to memory of 1792 1768 Qfanbpjg.exe 99 PID 1768 wrote to memory of 1792 1768 Qfanbpjg.exe 99 PID 1768 wrote to memory of 1792 1768 Qfanbpjg.exe 99 PID 1792 wrote to memory of 4444 1792 Qefkcl32.exe 100 PID 1792 wrote to memory of 4444 1792 Qefkcl32.exe 100 PID 1792 wrote to memory of 4444 1792 Qefkcl32.exe 100 PID 4444 wrote to memory of 3336 4444 Aifpoj32.exe 101 PID 4444 wrote to memory of 3336 4444 Aifpoj32.exe 101 PID 4444 wrote to memory of 3336 4444 Aifpoj32.exe 101 PID 3336 wrote to memory of 5112 3336 Acaanp32.exe 103 PID 3336 wrote to memory of 5112 3336 Acaanp32.exe 103 PID 3336 wrote to memory of 5112 3336 Acaanp32.exe 103 PID 5112 wrote to memory of 3092 5112 Dncnnd32.exe 104 PID 5112 wrote to memory of 3092 5112 Dncnnd32.exe 104 PID 5112 wrote to memory of 3092 5112 Dncnnd32.exe 104 PID 3092 wrote to memory of 3720 3092 Dmmdjp32.exe 105 PID 3092 wrote to memory of 3720 3092 Dmmdjp32.exe 105 PID 3092 wrote to memory of 3720 3092 Dmmdjp32.exe 105 PID 3720 wrote to memory of 2492 3720 Eckfaj32.exe 106 PID 3720 wrote to memory of 2492 3720 Eckfaj32.exe 106 PID 3720 wrote to memory of 2492 3720 Eckfaj32.exe 106 PID 2492 wrote to memory of 4292 2492 Egnhcgeb.exe 107 PID 2492 wrote to memory of 4292 2492 Egnhcgeb.exe 107 PID 2492 wrote to memory of 4292 2492 Egnhcgeb.exe 107 PID 4292 wrote to memory of 5028 4292 Fclohg32.exe 108 PID 4292 wrote to memory of 5028 4292 Fclohg32.exe 108 PID 4292 wrote to memory of 5028 4292 Fclohg32.exe 108 PID 5028 wrote to memory of 1208 5028 Gpjfng32.exe 109 PID 5028 wrote to memory of 1208 5028 Gpjfng32.exe 109 PID 5028 wrote to memory of 1208 5028 Gpjfng32.exe 109 PID 1208 wrote to memory of 2828 1208 Hdaajd32.exe 110 PID 1208 wrote to memory of 2828 1208 Hdaajd32.exe 110 PID 1208 wrote to memory of 2828 1208 Hdaajd32.exe 110 PID 2828 wrote to memory of 880 2828 Ifipmo32.exe 111 PID 2828 wrote to memory of 880 2828 Ifipmo32.exe 111 PID 2828 wrote to memory of 880 2828 Ifipmo32.exe 111 PID 880 wrote to memory of 3652 880 Kobnji32.exe 112 PID 880 wrote to memory of 3652 880 Kobnji32.exe 112 PID 880 wrote to memory of 3652 880 Kobnji32.exe 112 PID 3652 wrote to memory of 4560 3652 Mnmmmbll.exe 113 PID 3652 wrote to memory of 4560 3652 Mnmmmbll.exe 113 PID 3652 wrote to memory of 4560 3652 Mnmmmbll.exe 113 PID 4560 wrote to memory of 3192 4560 Nkjqme32.exe 114 PID 4560 wrote to memory of 3192 4560 Nkjqme32.exe 114 PID 4560 wrote to memory of 3192 4560 Nkjqme32.exe 114 PID 3192 wrote to memory of 4956 3192 Nkojheoe.exe 115 PID 3192 wrote to memory of 4956 3192 Nkojheoe.exe 115 PID 3192 wrote to memory of 4956 3192 Nkojheoe.exe 115 PID 4956 wrote to memory of 4388 4956 Ngekmf32.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a3f60d578ad5364405f5ad4fa3446870.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a3f60d578ad5364405f5ad4fa3446870.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\Jakkplbc.exeC:\Windows\system32\Jakkplbc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\Nmmqgo32.exeC:\Windows\system32\Nmmqgo32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\Oihkgo32.exeC:\Windows\system32\Oihkgo32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\Pehnboko.exeC:\Windows\system32\Pehnboko.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\Qfanbpjg.exeC:\Windows\system32\Qfanbpjg.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\Qefkcl32.exeC:\Windows\system32\Qefkcl32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\Aifpoj32.exeC:\Windows\system32\Aifpoj32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\Acaanp32.exeC:\Windows\system32\Acaanp32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\Dncnnd32.exeC:\Windows\system32\Dncnnd32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\Dmmdjp32.exeC:\Windows\system32\Dmmdjp32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\Eckfaj32.exeC:\Windows\system32\Eckfaj32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\Egnhcgeb.exeC:\Windows\system32\Egnhcgeb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\Fclohg32.exeC:\Windows\system32\Fclohg32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\Gpjfng32.exeC:\Windows\system32\Gpjfng32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\Hdaajd32.exeC:\Windows\system32\Hdaajd32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\Ifipmo32.exeC:\Windows\system32\Ifipmo32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Kobnji32.exeC:\Windows\system32\Kobnji32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\Mnmmmbll.exeC:\Windows\system32\Mnmmmbll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\Nkjqme32.exeC:\Windows\system32\Nkjqme32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Nkojheoe.exeC:\Windows\system32\Nkojheoe.exe21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\Ngekmf32.exeC:\Windows\system32\Ngekmf32.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\Okhmnc32.exeC:\Windows\system32\Okhmnc32.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:4388 -
C:\Windows\SysWOW64\Oagbljcp.exeC:\Windows\system32\Oagbljcp.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4760 -
C:\Windows\SysWOW64\Phkmoc32.exeC:\Windows\system32\Phkmoc32.exe25⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\Qlmopqdc.exeC:\Windows\system32\Qlmopqdc.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2112 -
C:\Windows\SysWOW64\Aefcif32.exeC:\Windows\system32\Aefcif32.exe27⤵
- Executes dropped EXE
PID:1400 -
C:\Windows\SysWOW64\Appaangd.exeC:\Windows\system32\Appaangd.exe28⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\Bahdje32.exeC:\Windows\system32\Bahdje32.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\Bidefbcg.exeC:\Windows\system32\Bidefbcg.exe30⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\Chebcmna.exeC:\Windows\system32\Chebcmna.exe31⤵
- Executes dropped EXE
PID:3904 -
C:\Windows\SysWOW64\Icgqqmib.exeC:\Windows\system32\Icgqqmib.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4056 -
C:\Windows\SysWOW64\Jidbpa32.exeC:\Windows\system32\Jidbpa32.exe33⤵
- Executes dropped EXE
PID:3756 -
C:\Windows\SysWOW64\Lkpnec32.exeC:\Windows\system32\Lkpnec32.exe34⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\Lkgdfb32.exeC:\Windows\system32\Lkgdfb32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4756 -
C:\Windows\SysWOW64\Mcklac32.exeC:\Windows\system32\Mcklac32.exe36⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\Pclnon32.exeC:\Windows\system32\Pclnon32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1368 -
C:\Windows\SysWOW64\Pjhbah32.exeC:\Windows\system32\Pjhbah32.exe38⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\Ahhbfkbf.exeC:\Windows\system32\Ahhbfkbf.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3576 -
C:\Windows\SysWOW64\Bopgdcnc.exeC:\Windows\system32\Bopgdcnc.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\Chkhbh32.exeC:\Windows\system32\Chkhbh32.exe41⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\Coepob32.exeC:\Windows\system32\Coepob32.exe42⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\SysWOW64\Ddklnh32.exeC:\Windows\system32\Ddklnh32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4384 -
C:\Windows\SysWOW64\Ekngqqol.exeC:\Windows\system32\Ekngqqol.exe44⤵
- Executes dropped EXE
PID:888 -
C:\Windows\SysWOW64\Gcagdj32.exeC:\Windows\system32\Gcagdj32.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\Hfiffd32.exeC:\Windows\system32\Hfiffd32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4020 -
C:\Windows\SysWOW64\Iblfgc32.exeC:\Windows\system32\Iblfgc32.exe47⤵
- Executes dropped EXE
PID:3284 -
C:\Windows\SysWOW64\Kfoapo32.exeC:\Windows\system32\Kfoapo32.exe48⤵
- Executes dropped EXE
PID:220 -
C:\Windows\SysWOW64\Ngdmhimb.exeC:\Windows\system32\Ngdmhimb.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3232 -
C:\Windows\SysWOW64\Qmkanmel.exeC:\Windows\system32\Qmkanmel.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3948 -
C:\Windows\SysWOW64\Dacohegc.exeC:\Windows\system32\Dacohegc.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:3952 -
C:\Windows\SysWOW64\Llpmhodc.exeC:\Windows\system32\Llpmhodc.exe52⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\Miomnaip.exeC:\Windows\system32\Miomnaip.exe53⤵
- Executes dropped EXE
PID:3176 -
C:\Windows\SysWOW64\Oghpib32.exeC:\Windows\system32\Oghpib32.exe54⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\Pjbkal32.exeC:\Windows\system32\Pjbkal32.exe55⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\Poodicio.exeC:\Windows\system32\Poodicio.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3516 -
C:\Windows\SysWOW64\Amjjcf32.exeC:\Windows\system32\Amjjcf32.exe57⤵
- Executes dropped EXE
PID:464 -
C:\Windows\SysWOW64\Bfedhihl.exeC:\Windows\system32\Bfedhihl.exe58⤵
- Executes dropped EXE
PID:440 -
C:\Windows\SysWOW64\Dfcqjg32.exeC:\Windows\system32\Dfcqjg32.exe59⤵
- Executes dropped EXE
- Modifies registry class
PID:4700 -
C:\Windows\SysWOW64\Dpqonl32.exeC:\Windows\system32\Dpqonl32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:700 -
C:\Windows\SysWOW64\Ehlpjikd.exeC:\Windows\system32\Ehlpjikd.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:2908 -
C:\Windows\SysWOW64\Emihbp32.exeC:\Windows\system32\Emihbp32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4736 -
C:\Windows\SysWOW64\Filicodb.exeC:\Windows\system32\Filicodb.exe63⤵
- Executes dropped EXE
PID:980 -
C:\Windows\SysWOW64\Gkbkna32.exeC:\Windows\system32\Gkbkna32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2284 -
C:\Windows\SysWOW64\Gdoiaf32.exeC:\Windows\system32\Gdoiaf32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4372 -
C:\Windows\SysWOW64\Ijadljdg.exeC:\Windows\system32\Ijadljdg.exe66⤵
- Drops file in System32 directory
- Modifies registry class
PID:1468 -
C:\Windows\SysWOW64\Jdnnjane.exeC:\Windows\system32\Jdnnjane.exe67⤵PID:3648
-
C:\Windows\SysWOW64\Nbnpmp32.exeC:\Windows\system32\Nbnpmp32.exe68⤵
- Modifies registry class
PID:3868 -
C:\Windows\SysWOW64\Nbcjhobg.exeC:\Windows\system32\Nbcjhobg.exe69⤵PID:1592
-
C:\Windows\SysWOW64\Oefpoi32.exeC:\Windows\system32\Oefpoi32.exe70⤵PID:4848
-
C:\Windows\SysWOW64\Objphn32.exeC:\Windows\system32\Objphn32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3020 -
C:\Windows\SysWOW64\Piphaf32.exeC:\Windows\system32\Piphaf32.exe72⤵PID:4776
-
C:\Windows\SysWOW64\Polpim32.exeC:\Windows\system32\Polpim32.exe73⤵PID:1116
-
C:\Windows\SysWOW64\Pcjioknl.exeC:\Windows\system32\Pcjioknl.exe74⤵
- Drops file in System32 directory
- Modifies registry class
PID:2872 -
C:\Windows\SysWOW64\Pidaleei.exeC:\Windows\system32\Pidaleei.exe75⤵
- Drops file in System32 directory
PID:1476 -
C:\Windows\SysWOW64\Ajndbd32.exeC:\Windows\system32\Ajndbd32.exe76⤵
- Modifies registry class
PID:3972 -
C:\Windows\SysWOW64\Afddge32.exeC:\Windows\system32\Afddge32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:760 -
C:\Windows\SysWOW64\Icoodj32.exeC:\Windows\system32\Icoodj32.exe78⤵
- Drops file in System32 directory
PID:1888 -
C:\Windows\SysWOW64\Jqhaolli.exeC:\Windows\system32\Jqhaolli.exe79⤵
- Modifies registry class
PID:1956 -
C:\Windows\SysWOW64\Kknfmdko.exeC:\Windows\system32\Kknfmdko.exe80⤵
- Drops file in System32 directory
PID:3904 -
C:\Windows\SysWOW64\Kqknekjf.exeC:\Windows\system32\Kqknekjf.exe81⤵PID:2696
-
C:\Windows\SysWOW64\Kqphpk32.exeC:\Windows\system32\Kqphpk32.exe82⤵PID:1200
-
C:\Windows\SysWOW64\Kgipmdmn.exeC:\Windows\system32\Kgipmdmn.exe83⤵PID:4956
-
C:\Windows\SysWOW64\Ljmfdp32.exeC:\Windows\system32\Ljmfdp32.exe84⤵PID:4304
-
C:\Windows\SysWOW64\Mnhkklbb.exeC:\Windows\system32\Mnhkklbb.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:112 -
C:\Windows\SysWOW64\Onicbi32.exeC:\Windows\system32\Onicbi32.exe86⤵PID:3692
-
C:\Windows\SysWOW64\Ojbamj32.exeC:\Windows\system32\Ojbamj32.exe87⤵
- Drops file in System32 directory
PID:4928 -
C:\Windows\SysWOW64\Oaliidon.exeC:\Windows\system32\Oaliidon.exe88⤵PID:3468
-
C:\Windows\SysWOW64\Oopjchnh.exeC:\Windows\system32\Oopjchnh.exe89⤵PID:3876
-
C:\Windows\SysWOW64\Oejbpb32.exeC:\Windows\system32\Oejbpb32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\Ojgjhicl.exeC:\Windows\system32\Ojgjhicl.exe91⤵PID:1524
-
C:\Windows\SysWOW64\Ohkkanbe.exeC:\Windows\system32\Ohkkanbe.exe92⤵PID:408
-
C:\Windows\SysWOW64\Pmgcidqm.exeC:\Windows\system32\Pmgcidqm.exe93⤵
- Drops file in System32 directory
- Modifies registry class
PID:4404 -
C:\Windows\SysWOW64\Pdalfo32.exeC:\Windows\system32\Pdalfo32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1896 -
C:\Windows\SysWOW64\Pkkdci32.exeC:\Windows\system32\Pkkdci32.exe95⤵PID:1212
-
C:\Windows\SysWOW64\Paelpcgc.exeC:\Windows\system32\Paelpcgc.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2968 -
C:\Windows\SysWOW64\Phodlm32.exeC:\Windows\system32\Phodlm32.exe97⤵
- Modifies registry class
PID:4980 -
C:\Windows\SysWOW64\Poimigfm.exeC:\Windows\system32\Poimigfm.exe98⤵PID:3372
-
C:\Windows\SysWOW64\Plmmbkdf.exeC:\Windows\system32\Plmmbkdf.exe99⤵PID:4976
-
C:\Windows\SysWOW64\Qmepkb32.exeC:\Windows\system32\Qmepkb32.exe100⤵PID:3444
-
C:\Windows\SysWOW64\Ahmqnkbp.exeC:\Windows\system32\Ahmqnkbp.exe101⤵PID:1364
-
C:\Windows\SysWOW64\Ahbjij32.exeC:\Windows\system32\Ahbjij32.exe102⤵
- Drops file in System32 directory
PID:4428 -
C:\Windows\SysWOW64\Bdndik32.exeC:\Windows\system32\Bdndik32.exe103⤵PID:3544
-
C:\Windows\SysWOW64\Beajnm32.exeC:\Windows\system32\Beajnm32.exe104⤵PID:4344
-
C:\Windows\SysWOW64\Bahkcn32.exeC:\Windows\system32\Bahkcn32.exe105⤵
- Drops file in System32 directory
- Modifies registry class
PID:4144 -
C:\Windows\SysWOW64\Chepehne.exeC:\Windows\system32\Chepehne.exe106⤵PID:3628
-
C:\Windows\SysWOW64\Cdlpjicj.exeC:\Windows\system32\Cdlpjicj.exe107⤵PID:4368
-
C:\Windows\SysWOW64\Dbfgdllk.exeC:\Windows\system32\Dbfgdllk.exe108⤵PID:1156
-
C:\Windows\SysWOW64\Dhqoaf32.exeC:\Windows\system32\Dhqoaf32.exe109⤵PID:4772
-
C:\Windows\SysWOW64\Dnmhim32.exeC:\Windows\system32\Dnmhim32.exe110⤵
- Drops file in System32 directory
PID:4520 -
C:\Windows\SysWOW64\Ddgpfgil.exeC:\Windows\system32\Ddgpfgil.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:880 -
C:\Windows\SysWOW64\Dkahba32.exeC:\Windows\system32\Dkahba32.exe112⤵
- Drops file in System32 directory
- Modifies registry class
PID:2072 -
C:\Windows\SysWOW64\Dbkpokhf.exeC:\Windows\system32\Dbkpokhf.exe113⤵
- Modifies registry class
PID:4720 -
C:\Windows\SysWOW64\Dmqdmd32.exeC:\Windows\system32\Dmqdmd32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2180 -
C:\Windows\SysWOW64\Dfiiejnl.exeC:\Windows\system32\Dfiiejnl.exe115⤵
- Modifies registry class
PID:3588 -
C:\Windows\SysWOW64\Eenfff32.exeC:\Windows\system32\Eenfff32.exe116⤵
- Drops file in System32 directory
PID:1528 -
C:\Windows\SysWOW64\Ekhncp32.exeC:\Windows\system32\Ekhncp32.exe117⤵PID:3816
-
C:\Windows\SysWOW64\Efnbqi32.exeC:\Windows\system32\Efnbqi32.exe118⤵PID:3024
-
C:\Windows\SysWOW64\Ekkkip32.exeC:\Windows\system32\Ekkkip32.exe119⤵PID:4352
-
C:\Windows\SysWOW64\Ekmhnpfl.exeC:\Windows\system32\Ekmhnpfl.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4000 -
C:\Windows\SysWOW64\Ebgpkj32.exeC:\Windows\system32\Ebgpkj32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1280 -
C:\Windows\SysWOW64\Fpfppl32.exeC:\Windows\system32\Fpfppl32.exe122⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3728
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-