Analysis
-
max time kernel
160s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 19:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.e70138a1c1b8e6b35a380f95c137fdb0.exe
Resource
win7-20231020-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.e70138a1c1b8e6b35a380f95c137fdb0.exe
Resource
win10v2004-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.e70138a1c1b8e6b35a380f95c137fdb0.exe
-
Size
357KB
-
MD5
e70138a1c1b8e6b35a380f95c137fdb0
-
SHA1
6aae6e20040326ba08b67c2c6beda09d56fd15af
-
SHA256
a81927c51edb65b66eeae6cf5510efeeba15303ba497c776fc50589e7d23de97
-
SHA512
c002cfe19ebdb7c2e923f9bd06e51cc901dc7e13f8a0f05a66bdde5ebbd1e9bba7fbb14c4bf52c512fcd5e99d08a0f94750f58779079171ebb8360ca326e0db9
-
SSDEEP
3072:kKiMRrpJENxmzTp6+obibNWdzgHwW0Kq6+oyUKTMHTyFExsARWol4rxM80M6+obT:kJMFLXTc+1nT+1MzyFIQrf0F+1nT+/
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egpnidgk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpgdlm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekhjgoga.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgdhab32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlflog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kpnjknni.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnpikncl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fchlhnlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fjdajhbi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlbindfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcjioknl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hkjoao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jlhlcnge.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdkfoo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Galcjkmj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emmkci32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlqpkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ljfmgocq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lbcembci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Odbgmf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmlkpgia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Idljll32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onmfcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hqagdpcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdnpon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eggbbhkj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qqfmnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ggilbb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gggffkoe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jahnkl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qcppogqo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hflcggdm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnhdcd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lilbdcfe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ammnclcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbcembci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pphjbgfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lbngfbdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jnapqpjl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Belegj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dhejij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdfjej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdbheajp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lamjbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Imdgjlgb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Knifao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgddlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ccacjgfb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdhbgn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkmbbajb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ddcekk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Agcbqecp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gfaikoad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Heeppd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fhbiap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmjlpnpb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gicgjk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Engjol32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqmfnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ddqbkebo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glajeiml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gcpaiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Inflio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Blhjic32.exe -
Executes dropped EXE 64 IoCs
pid Process 4368 Ddkpoelb.exe 1764 Embdofop.exe 452 Ekcemmgo.exe 1780 Ejhanj32.exe 3060 Eljknl32.exe 4800 Fchlhnlo.exe 2564 Fjdajhbi.exe 4184 Gjkgkg32.exe 3268 Glajeiml.exe 2992 Hhmdeink.exe 3612 Ilpfgg32.exe 1376 Inflio32.exe 4044 Jahnkl32.exe 4668 Jakkplbc.exe 4316 Koeajo32.exe 4140 Kdbjbfjl.exe 4628 Lilbdcfe.exe 4564 Mmcnap32.exe 788 Mflbjejb.exe 2100 Opbcdieb.exe 1668 Obcled32.exe 3584 Obgeqcnn.exe 4624 Qmnbej32.exe 1484 Aemqdk32.exe 2588 Bgdcom32.exe 1640 Cgpcklpd.exe 1724 Cfglahbj.exe 1880 Cggikk32.exe 2752 Eggbbhkj.exe 1796 Ffahnd32.exe 116 Fnmjkahi.exe 2976 Fmbflm32.exe 4348 Fcnlng32.exe 5104 Gagebknp.exe 4248 Hhjqec32.exe 1732 Hnfehm32.exe 4888 Ionlhlld.exe 3032 Ipcakd32.exe 2192 Imgbdh32.exe 4872 Jkkbnl32.exe 4056 Jddggb32.exe 3212 Jmlkpgia.exe 5068 Jkeedk32.exe 4108 Lamjbc32.exe 528 Loqjlg32.exe 2392 Lgqhki32.exe 2784 Mndcnafd.exe 3872 Nbbldp32.exe 3992 Oabiak32.exe 4200 Oecnmi32.exe 4760 Ppmleagi.exe 4756 Pneelmjo.exe 3844 Ahdpea32.exe 1488 Bpggbm32.exe 4392 Blenhmph.exe 5052 Clgkmm32.exe 4436 Ccacjgfb.exe 3172 Chnlbndj.exe 4032 Cohdoh32.exe 564 Clldhljp.exe 2832 Clnanlhn.exe 3396 Dpnfjjla.exe 4984 Eflhiolf.exe 1304 Fckhnaab.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Eaddcnad.exe Dhejij32.exe File created C:\Windows\SysWOW64\Klmane32.dll Jhgneqha.exe File opened for modification C:\Windows\SysWOW64\Bbgehd32.exe Bmjlpnpb.exe File opened for modification C:\Windows\SysWOW64\Gnmblb32.exe Gaibcn32.exe File created C:\Windows\SysWOW64\Eaceqmid.exe Ealopnol.exe File created C:\Windows\SysWOW64\Gggffkoe.exe Gnoame32.exe File opened for modification C:\Windows\SysWOW64\Oecnmi32.exe Oabiak32.exe File created C:\Windows\SysWOW64\Gbdgpfni.exe Gdlnkc32.exe File opened for modification C:\Windows\SysWOW64\Dnebfm32.exe Demnngif.exe File opened for modification C:\Windows\SysWOW64\Eehnnb32.exe Egbdekcg.exe File created C:\Windows\SysWOW64\Bbjklf32.dll Igajka32.exe File created C:\Windows\SysWOW64\Hdkfoo32.exe Gnanbe32.exe File opened for modification C:\Windows\SysWOW64\Hjabnd32.exe Hddien32.exe File created C:\Windows\SysWOW64\Oconip32.dll Dhmgob32.exe File opened for modification C:\Windows\SysWOW64\Fhgclopj.exe Fcjjdhac.exe File created C:\Windows\SysWOW64\Jgdcof32.dll Glajeiml.exe File created C:\Windows\SysWOW64\Cohdoh32.exe Chnlbndj.exe File opened for modification C:\Windows\SysWOW64\Obgeqcnn.exe Obcled32.exe File created C:\Windows\SysWOW64\Edkddeag.exe Eoollocp.exe File opened for modification C:\Windows\SysWOW64\Chmnnamb.exe Cmgjpi32.exe File created C:\Windows\SysWOW64\Egbdekcg.exe Cokpekpj.exe File opened for modification C:\Windows\SysWOW64\Klahof32.exe Kloljf32.exe File opened for modification C:\Windows\SysWOW64\Embdofop.exe Ddkpoelb.exe File created C:\Windows\SysWOW64\Jakkplbc.exe Jahnkl32.exe File created C:\Windows\SysWOW64\Oibbjoij.exe Opjnai32.exe File created C:\Windows\SysWOW64\Ealkcm32.exe Ejabgcdp.exe File opened for modification C:\Windows\SysWOW64\Engjol32.exe Dieilepc.exe File opened for modification C:\Windows\SysWOW64\Ioeineap.exe Gemkobia.exe File opened for modification C:\Windows\SysWOW64\Lfbpnjjd.exe Lljked32.exe File created C:\Windows\SysWOW64\Hndgcl32.dll Dcjhhq32.exe File created C:\Windows\SysWOW64\Dfmilknm.dll Clnanlhn.exe File created C:\Windows\SysWOW64\Pgkmhn32.dll Jgdhab32.exe File created C:\Windows\SysWOW64\Bndiponj.exe Belegj32.exe File created C:\Windows\SysWOW64\Iomfdmah.dll Lamjbc32.exe File created C:\Windows\SysWOW64\Eimpgo32.dll Mndcnafd.exe File opened for modification C:\Windows\SysWOW64\Hkpgooim.exe Hpkcafjg.exe File opened for modification C:\Windows\SysWOW64\Pidaleei.exe Pcjioknl.exe File created C:\Windows\SysWOW64\Hflcggdm.exe Hdkfoo32.exe File created C:\Windows\SysWOW64\Ddkpoelb.exe NEAS.e70138a1c1b8e6b35a380f95c137fdb0.exe File created C:\Windows\SysWOW64\Ipcakd32.exe Ionlhlld.exe File created C:\Windows\SysWOW64\Onmfcb32.exe Nfohafad.exe File created C:\Windows\SysWOW64\Chkokq32.exe Cglbanmo.exe File created C:\Windows\SysWOW64\Empbjk32.dll Chnlbndj.exe File created C:\Windows\SysWOW64\Fmbjhjdf.dll Hakhcd32.exe File created C:\Windows\SysWOW64\Hlppgddh.exe Hnkonpeo.exe File created C:\Windows\SysWOW64\Gdlnkc32.exe Fckacknf.exe File created C:\Windows\SysWOW64\Gdckdn32.dll Mmhggbgd.exe File created C:\Windows\SysWOW64\Nkddhdgk.dll Mdjapphl.exe File created C:\Windows\SysWOW64\Aqdikemk.dll Egbdekcg.exe File created C:\Windows\SysWOW64\Jlhlcnge.exe Injmlbkh.exe File created C:\Windows\SysWOW64\Ncdqoekn.dll Nhokeolc.exe File created C:\Windows\SysWOW64\Eilomd32.exe Engjol32.exe File opened for modification C:\Windows\SysWOW64\Hddien32.exe Hfcihf32.exe File created C:\Windows\SysWOW64\Obcled32.exe Opbcdieb.exe File created C:\Windows\SysWOW64\Hnfehm32.exe Hhjqec32.exe File created C:\Windows\SysWOW64\Gmolbbcj.dll Dmnhgdjo.exe File created C:\Windows\SysWOW64\Oflcmn32.dll Lfpkapgb.exe File created C:\Windows\SysWOW64\Ohegbggk.dll Lgqhki32.exe File created C:\Windows\SysWOW64\Ocmhbj32.dll Gbdgpfni.exe File opened for modification C:\Windows\SysWOW64\Hfcihf32.exe Hdbmpnhf.exe File created C:\Windows\SysWOW64\Eikpkc32.exe Diamde32.exe File created C:\Windows\SysWOW64\Fmggpd32.dll Mhmmchpd.exe File created C:\Windows\SysWOW64\Mikgkhce.dll Oofoeo32.exe File created C:\Windows\SysWOW64\Lnendhol.exe Klahof32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jgmapcqe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eaddcnad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ocdnedkp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ogbidk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dpihlobd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ddkpoelb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ffahnd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hbknqeha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lefdld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohfkehcl.dll" Alnfiifd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lfbpnjjd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hbldinjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clmaai32.dll" Moniclal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jakkplbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gagebknp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpkkmj32.dll" Ccacjgfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gemkobia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gaibcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cdjbel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahmhnhoo.dll" Pfijhhpp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dlpgiebo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hdlphjaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Emmkci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emfdhbnh.dll" Ognpilmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bbkleojh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bbkleojh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bndiponj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fojehjmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nebmnqdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dhejij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgmegc32.dll" Galcjkmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hpkcafjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhqhpj32.dll" Mmcnlc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Heqnokaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lgddlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qekkij32.dll" Cicqcgee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jmlkpgia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jpgdlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hphglf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jegobkeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbhncmbi.dll" Manaegon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gllacl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cgpcklpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmmibk32.dll" Iaiddajo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Meaghmgc.dll" Gdbkcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pdhbgn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dpihlobd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omneeicm.dll" Fchlhnlo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jijhom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nlihek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pflmhnbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oofoeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afpbenhi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mebkbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjpaec32.dll" Kjhlipla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hpdegdci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hbdgnilo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ognpilmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jjhaea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Eimlpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fgcjoglo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gbdgpfni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nockfgao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ondicl32.dll" Pfagcm32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3384 wrote to memory of 4368 3384 NEAS.e70138a1c1b8e6b35a380f95c137fdb0.exe 94 PID 3384 wrote to memory of 4368 3384 NEAS.e70138a1c1b8e6b35a380f95c137fdb0.exe 94 PID 3384 wrote to memory of 4368 3384 NEAS.e70138a1c1b8e6b35a380f95c137fdb0.exe 94 PID 4368 wrote to memory of 1764 4368 Ddkpoelb.exe 95 PID 4368 wrote to memory of 1764 4368 Ddkpoelb.exe 95 PID 4368 wrote to memory of 1764 4368 Ddkpoelb.exe 95 PID 1764 wrote to memory of 452 1764 Embdofop.exe 96 PID 1764 wrote to memory of 452 1764 Embdofop.exe 96 PID 1764 wrote to memory of 452 1764 Embdofop.exe 96 PID 452 wrote to memory of 1780 452 Ekcemmgo.exe 97 PID 452 wrote to memory of 1780 452 Ekcemmgo.exe 97 PID 452 wrote to memory of 1780 452 Ekcemmgo.exe 97 PID 1780 wrote to memory of 3060 1780 Ejhanj32.exe 98 PID 1780 wrote to memory of 3060 1780 Ejhanj32.exe 98 PID 1780 wrote to memory of 3060 1780 Ejhanj32.exe 98 PID 3060 wrote to memory of 4800 3060 Eljknl32.exe 99 PID 3060 wrote to memory of 4800 3060 Eljknl32.exe 99 PID 3060 wrote to memory of 4800 3060 Eljknl32.exe 99 PID 4800 wrote to memory of 2564 4800 Fchlhnlo.exe 100 PID 4800 wrote to memory of 2564 4800 Fchlhnlo.exe 100 PID 4800 wrote to memory of 2564 4800 Fchlhnlo.exe 100 PID 2564 wrote to memory of 4184 2564 Fjdajhbi.exe 101 PID 2564 wrote to memory of 4184 2564 Fjdajhbi.exe 101 PID 2564 wrote to memory of 4184 2564 Fjdajhbi.exe 101 PID 4184 wrote to memory of 3268 4184 Gjkgkg32.exe 102 PID 4184 wrote to memory of 3268 4184 Gjkgkg32.exe 102 PID 4184 wrote to memory of 3268 4184 Gjkgkg32.exe 102 PID 3268 wrote to memory of 2992 3268 Glajeiml.exe 103 PID 3268 wrote to memory of 2992 3268 Glajeiml.exe 103 PID 3268 wrote to memory of 2992 3268 Glajeiml.exe 103 PID 2992 wrote to memory of 3612 2992 Hhmdeink.exe 104 PID 2992 wrote to memory of 3612 2992 Hhmdeink.exe 104 PID 2992 wrote to memory of 3612 2992 Hhmdeink.exe 104 PID 3612 wrote to memory of 1376 3612 Ilpfgg32.exe 105 PID 3612 wrote to memory of 1376 3612 Ilpfgg32.exe 105 PID 3612 wrote to memory of 1376 3612 Ilpfgg32.exe 105 PID 1376 wrote to memory of 4044 1376 Inflio32.exe 106 PID 1376 wrote to memory of 4044 1376 Inflio32.exe 106 PID 1376 wrote to memory of 4044 1376 Inflio32.exe 106 PID 4044 wrote to memory of 4668 4044 Jahnkl32.exe 107 PID 4044 wrote to memory of 4668 4044 Jahnkl32.exe 107 PID 4044 wrote to memory of 4668 4044 Jahnkl32.exe 107 PID 4668 wrote to memory of 4316 4668 Jakkplbc.exe 108 PID 4668 wrote to memory of 4316 4668 Jakkplbc.exe 108 PID 4668 wrote to memory of 4316 4668 Jakkplbc.exe 108 PID 4316 wrote to memory of 4140 4316 Koeajo32.exe 109 PID 4316 wrote to memory of 4140 4316 Koeajo32.exe 109 PID 4316 wrote to memory of 4140 4316 Koeajo32.exe 109 PID 4140 wrote to memory of 4628 4140 Kdbjbfjl.exe 110 PID 4140 wrote to memory of 4628 4140 Kdbjbfjl.exe 110 PID 4140 wrote to memory of 4628 4140 Kdbjbfjl.exe 110 PID 4628 wrote to memory of 4564 4628 Lilbdcfe.exe 111 PID 4628 wrote to memory of 4564 4628 Lilbdcfe.exe 111 PID 4628 wrote to memory of 4564 4628 Lilbdcfe.exe 111 PID 4564 wrote to memory of 788 4564 Mmcnap32.exe 113 PID 4564 wrote to memory of 788 4564 Mmcnap32.exe 113 PID 4564 wrote to memory of 788 4564 Mmcnap32.exe 113 PID 788 wrote to memory of 2100 788 Mflbjejb.exe 114 PID 788 wrote to memory of 2100 788 Mflbjejb.exe 114 PID 788 wrote to memory of 2100 788 Mflbjejb.exe 114 PID 2100 wrote to memory of 1668 2100 Opbcdieb.exe 115 PID 2100 wrote to memory of 1668 2100 Opbcdieb.exe 115 PID 2100 wrote to memory of 1668 2100 Opbcdieb.exe 115 PID 1668 wrote to memory of 3584 1668 Obcled32.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e70138a1c1b8e6b35a380f95c137fdb0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e70138a1c1b8e6b35a380f95c137fdb0.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\Ddkpoelb.exeC:\Windows\system32\Ddkpoelb.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\Embdofop.exeC:\Windows\system32\Embdofop.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\Ekcemmgo.exeC:\Windows\system32\Ekcemmgo.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\Ejhanj32.exeC:\Windows\system32\Ejhanj32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\Eljknl32.exeC:\Windows\system32\Eljknl32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\Fchlhnlo.exeC:\Windows\system32\Fchlhnlo.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\Fjdajhbi.exeC:\Windows\system32\Fjdajhbi.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\Gjkgkg32.exeC:\Windows\system32\Gjkgkg32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\Glajeiml.exeC:\Windows\system32\Glajeiml.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\Hhmdeink.exeC:\Windows\system32\Hhmdeink.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\Ilpfgg32.exeC:\Windows\system32\Ilpfgg32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\Inflio32.exeC:\Windows\system32\Inflio32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\Jahnkl32.exeC:\Windows\system32\Jahnkl32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\Jakkplbc.exeC:\Windows\system32\Jakkplbc.exe15⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\Koeajo32.exeC:\Windows\system32\Koeajo32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\Kdbjbfjl.exeC:\Windows\system32\Kdbjbfjl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\Lilbdcfe.exeC:\Windows\system32\Lilbdcfe.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\Mmcnap32.exeC:\Windows\system32\Mmcnap32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\Mflbjejb.exeC:\Windows\system32\Mflbjejb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\Opbcdieb.exeC:\Windows\system32\Opbcdieb.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\Obcled32.exeC:\Windows\system32\Obcled32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\Obgeqcnn.exeC:\Windows\system32\Obgeqcnn.exe23⤵
- Executes dropped EXE
PID:3584 -
C:\Windows\SysWOW64\Qmnbej32.exeC:\Windows\system32\Qmnbej32.exe24⤵
- Executes dropped EXE
PID:4624 -
C:\Windows\SysWOW64\Aemqdk32.exeC:\Windows\system32\Aemqdk32.exe25⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\Bgdcom32.exeC:\Windows\system32\Bgdcom32.exe26⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Cgpcklpd.exeC:\Windows\system32\Cgpcklpd.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1640 -
C:\Windows\SysWOW64\Cfglahbj.exeC:\Windows\system32\Cfglahbj.exe28⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\Cggikk32.exeC:\Windows\system32\Cggikk32.exe29⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\Eggbbhkj.exeC:\Windows\system32\Eggbbhkj.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2752 -
C:\Windows\SysWOW64\Ffahnd32.exeC:\Windows\system32\Ffahnd32.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:1796 -
C:\Windows\SysWOW64\Fnmjkahi.exeC:\Windows\system32\Fnmjkahi.exe32⤵
- Executes dropped EXE
PID:116 -
C:\Windows\SysWOW64\Fmbflm32.exeC:\Windows\system32\Fmbflm32.exe33⤵
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\Fcnlng32.exeC:\Windows\system32\Fcnlng32.exe34⤵
- Executes dropped EXE
PID:4348 -
C:\Windows\SysWOW64\Gagebknp.exeC:\Windows\system32\Gagebknp.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:5104 -
C:\Windows\SysWOW64\Hhjqec32.exeC:\Windows\system32\Hhjqec32.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4248 -
C:\Windows\SysWOW64\Hnfehm32.exeC:\Windows\system32\Hnfehm32.exe37⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\Ionlhlld.exeC:\Windows\system32\Ionlhlld.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4888 -
C:\Windows\SysWOW64\Ipcakd32.exeC:\Windows\system32\Ipcakd32.exe39⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\SysWOW64\Imgbdh32.exeC:\Windows\system32\Imgbdh32.exe40⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\Jkkbnl32.exeC:\Windows\system32\Jkkbnl32.exe41⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\Jddggb32.exeC:\Windows\system32\Jddggb32.exe42⤵
- Executes dropped EXE
PID:4056 -
C:\Windows\SysWOW64\Jmlkpgia.exeC:\Windows\system32\Jmlkpgia.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3212 -
C:\Windows\SysWOW64\Jkeedk32.exeC:\Windows\system32\Jkeedk32.exe44⤵
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\Lamjbc32.exeC:\Windows\system32\Lamjbc32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4108 -
C:\Windows\SysWOW64\Loqjlg32.exeC:\Windows\system32\Loqjlg32.exe46⤵
- Executes dropped EXE
PID:528 -
C:\Windows\SysWOW64\Lgqhki32.exeC:\Windows\system32\Lgqhki32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2392 -
C:\Windows\SysWOW64\Mndcnafd.exeC:\Windows\system32\Mndcnafd.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2784 -
C:\Windows\SysWOW64\Nbbldp32.exeC:\Windows\system32\Nbbldp32.exe49⤵
- Executes dropped EXE
PID:3872 -
C:\Windows\SysWOW64\Oabiak32.exeC:\Windows\system32\Oabiak32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3992 -
C:\Windows\SysWOW64\Oecnmi32.exeC:\Windows\system32\Oecnmi32.exe51⤵
- Executes dropped EXE
PID:4200 -
C:\Windows\SysWOW64\Ppmleagi.exeC:\Windows\system32\Ppmleagi.exe52⤵
- Executes dropped EXE
PID:4760 -
C:\Windows\SysWOW64\Pneelmjo.exeC:\Windows\system32\Pneelmjo.exe53⤵
- Executes dropped EXE
PID:4756 -
C:\Windows\SysWOW64\Ahdpea32.exeC:\Windows\system32\Ahdpea32.exe54⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\Bpggbm32.exeC:\Windows\system32\Bpggbm32.exe55⤵
- Executes dropped EXE
PID:1488 -
C:\Windows\SysWOW64\Blenhmph.exeC:\Windows\system32\Blenhmph.exe56⤵
- Executes dropped EXE
PID:4392 -
C:\Windows\SysWOW64\Clgkmm32.exeC:\Windows\system32\Clgkmm32.exe57⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\Ccacjgfb.exeC:\Windows\system32\Ccacjgfb.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4436 -
C:\Windows\SysWOW64\Chnlbndj.exeC:\Windows\system32\Chnlbndj.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3172 -
C:\Windows\SysWOW64\Cohdoh32.exeC:\Windows\system32\Cohdoh32.exe60⤵
- Executes dropped EXE
PID:4032 -
C:\Windows\SysWOW64\Clldhljp.exeC:\Windows\system32\Clldhljp.exe61⤵
- Executes dropped EXE
PID:564 -
C:\Windows\SysWOW64\Clnanlhn.exeC:\Windows\system32\Clnanlhn.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\Dpnfjjla.exeC:\Windows\system32\Dpnfjjla.exe63⤵
- Executes dropped EXE
PID:3396 -
C:\Windows\SysWOW64\Eflhiolf.exeC:\Windows\system32\Eflhiolf.exe64⤵
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\Fckhnaab.exeC:\Windows\system32\Fckhnaab.exe65⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\Gcpaiq32.exeC:\Windows\system32\Gcpaiq32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:908 -
C:\Windows\SysWOW64\Gcggjp32.exeC:\Windows\system32\Gcggjp32.exe67⤵PID:2124
-
C:\Windows\SysWOW64\Hakhcd32.exeC:\Windows\system32\Hakhcd32.exe68⤵
- Drops file in System32 directory
PID:3780 -
C:\Windows\SysWOW64\Hcnnjoam.exeC:\Windows\system32\Hcnnjoam.exe69⤵PID:4112
-
C:\Windows\SysWOW64\Iaiddajo.exeC:\Windows\system32\Iaiddajo.exe70⤵
- Modifies registry class
PID:4824 -
C:\Windows\SysWOW64\Imbaobmp.exeC:\Windows\system32\Imbaobmp.exe71⤵PID:1368
-
C:\Windows\SysWOW64\Idljll32.exeC:\Windows\system32\Idljll32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4464 -
C:\Windows\SysWOW64\Jpgdlm32.exeC:\Windows\system32\Jpgdlm32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4104 -
C:\Windows\SysWOW64\Mnjjmmkc.exeC:\Windows\system32\Mnjjmmkc.exe74⤵PID:2232
-
C:\Windows\SysWOW64\Nqklfe32.exeC:\Windows\system32\Nqklfe32.exe75⤵PID:1548
-
C:\Windows\SysWOW64\Pbkagfba.exeC:\Windows\system32\Pbkagfba.exe76⤵PID:216
-
C:\Windows\SysWOW64\Qbddmejf.exeC:\Windows\system32\Qbddmejf.exe77⤵PID:4836
-
C:\Windows\SysWOW64\Cacmkn32.exeC:\Windows\system32\Cacmkn32.exe78⤵PID:3284
-
C:\Windows\SysWOW64\Cefolk32.exeC:\Windows\system32\Cefolk32.exe79⤵PID:4372
-
C:\Windows\SysWOW64\Dlpgiebo.exeC:\Windows\system32\Dlpgiebo.exe80⤵
- Modifies registry class
PID:5088 -
C:\Windows\SysWOW64\Dampal32.exeC:\Windows\system32\Dampal32.exe81⤵PID:3768
-
C:\Windows\SysWOW64\Dememj32.exeC:\Windows\system32\Dememj32.exe82⤵PID:5132
-
C:\Windows\SysWOW64\Deoabj32.exeC:\Windows\system32\Deoabj32.exe83⤵PID:5172
-
C:\Windows\SysWOW64\Dkljka32.exeC:\Windows\system32\Dkljka32.exe84⤵PID:5216
-
C:\Windows\SysWOW64\Elncjc32.exeC:\Windows\system32\Elncjc32.exe85⤵PID:5260
-
C:\Windows\SysWOW64\Echkgnnl.exeC:\Windows\system32\Echkgnnl.exe86⤵PID:5296
-
C:\Windows\SysWOW64\Edihof32.exeC:\Windows\system32\Edihof32.exe87⤵PID:5348
-
C:\Windows\SysWOW64\Eoollocp.exeC:\Windows\system32\Eoollocp.exe88⤵
- Drops file in System32 directory
PID:5392 -
C:\Windows\SysWOW64\Edkddeag.exeC:\Windows\system32\Edkddeag.exe89⤵PID:5432
-
C:\Windows\SysWOW64\Eoaianan.exeC:\Windows\system32\Eoaianan.exe90⤵PID:5472
-
C:\Windows\SysWOW64\Ekhjgoga.exeC:\Windows\system32\Ekhjgoga.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5520 -
C:\Windows\SysWOW64\Eaabci32.exeC:\Windows\system32\Eaabci32.exe92⤵PID:5584
-
C:\Windows\SysWOW64\Fojlhmic.exeC:\Windows\system32\Fojlhmic.exe93⤵PID:5648
-
C:\Windows\SysWOW64\Fckacknf.exeC:\Windows\system32\Fckacknf.exe94⤵
- Drops file in System32 directory
PID:5688 -
C:\Windows\SysWOW64\Gdlnkc32.exeC:\Windows\system32\Gdlnkc32.exe95⤵
- Drops file in System32 directory
PID:5748 -
C:\Windows\SysWOW64\Gbdgpfni.exeC:\Windows\system32\Gbdgpfni.exe96⤵
- Drops file in System32 directory
- Modifies registry class
PID:5804 -
C:\Windows\SysWOW64\Hbknqeha.exeC:\Windows\system32\Hbknqeha.exe97⤵
- Modifies registry class
PID:5844 -
C:\Windows\SysWOW64\Hiefmp32.exeC:\Windows\system32\Hiefmp32.exe98⤵PID:5900
-
C:\Windows\SysWOW64\Hcpcehko.exeC:\Windows\system32\Hcpcehko.exe99⤵PID:5956
-
C:\Windows\SysWOW64\Ifplgc32.exeC:\Windows\system32\Ifplgc32.exe100⤵PID:6004
-
C:\Windows\SysWOW64\Ickcaf32.exeC:\Windows\system32\Ickcaf32.exe101⤵PID:6048
-
C:\Windows\SysWOW64\Imdgjlgb.exeC:\Windows\system32\Imdgjlgb.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6108 -
C:\Windows\SysWOW64\Jijhom32.exeC:\Windows\system32\Jijhom32.exe103⤵
- Modifies registry class
PID:5144 -
C:\Windows\SysWOW64\Jmpgfjmd.exeC:\Windows\system32\Jmpgfjmd.exe104⤵PID:5240
-
C:\Windows\SysWOW64\Kblpnall.exeC:\Windows\system32\Kblpnall.exe105⤵PID:5284
-
C:\Windows\SysWOW64\Kifhkkci.exeC:\Windows\system32\Kifhkkci.exe106⤵PID:5344
-
C:\Windows\SysWOW64\Kboldq32.exeC:\Windows\system32\Kboldq32.exe107⤵PID:2072
-
C:\Windows\SysWOW64\Kipkaj32.exeC:\Windows\system32\Kipkaj32.exe108⤵PID:1708
-
C:\Windows\SysWOW64\Mebkbi32.exeC:\Windows\system32\Mebkbi32.exe109⤵
- Modifies registry class
PID:5640 -
C:\Windows\SysWOW64\Mdjapphl.exeC:\Windows\system32\Mdjapphl.exe110⤵
- Drops file in System32 directory
PID:3252 -
C:\Windows\SysWOW64\Pggbdgmm.exeC:\Windows\system32\Pggbdgmm.exe111⤵PID:5784
-
C:\Windows\SysWOW64\Qcppogqo.exeC:\Windows\system32\Qcppogqo.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5888 -
C:\Windows\SysWOW64\Qqfmnk32.exeC:\Windows\system32\Qqfmnk32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5908 -
C:\Windows\SysWOW64\Ammnclcj.exeC:\Windows\system32\Ammnclcj.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:892 -
C:\Windows\SysWOW64\Agcbqecp.exeC:\Windows\system32\Agcbqecp.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6056 -
C:\Windows\SysWOW64\Babmjj32.exeC:\Windows\system32\Babmjj32.exe116⤵PID:496
-
C:\Windows\SysWOW64\Bfabhppm.exeC:\Windows\system32\Bfabhppm.exe117⤵PID:5152
-
C:\Windows\SysWOW64\Cnbmolhd.exeC:\Windows\system32\Cnbmolhd.exe118⤵PID:3612
-
C:\Windows\SysWOW64\Cmgjpi32.exeC:\Windows\system32\Cmgjpi32.exe119⤵
- Drops file in System32 directory
PID:5340 -
C:\Windows\SysWOW64\Chmnnamb.exeC:\Windows\system32\Chmnnamb.exe120⤵PID:1644
-
C:\Windows\SysWOW64\Ceqngekl.exeC:\Windows\system32\Ceqngekl.exe121⤵PID:5512
-
C:\Windows\SysWOW64\Cokpekpj.exeC:\Windows\system32\Cokpekpj.exe122⤵
- Drops file in System32 directory
PID:3520
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-