Analysis
-
max time kernel
238s -
max time network
287s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
11-11-2023 05:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe
Resource
win7-20231023-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe
-
Size
45KB
-
MD5
d0fa6a38c0d1cefd0f7e9d4b09397340
-
SHA1
4c67a9ff2407466ad0ec35099de90252000f22e3
-
SHA256
79dcc87d4dc660758462bb500ff95ef2a9a9a42be80d3484c9582550eb66b9bd
-
SHA512
75125ce3c3b5531e8975571f45fe080eae4a19545999cb2530a300b3bf465060dfbcc7f7d05890126183d7394128c907588232153b3024f9111dea9d93333f91
-
SSDEEP
768:1ucZ44Z3VQXPW6xoJleOv43Xi8RlrpsdutaT11EO12Mv5+/1H5R:QcZRf6xoJf4irUEB2O9v5k/
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfaokckn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kqlhcpef.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpnkjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qpnkjq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dncmaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doejhjfc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckcdof32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqdfbmmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hapkke32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdpmljan.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlnlcg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdpcgl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elgmbnfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eheblj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eoeiniea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ediggoma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgelih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Elgmbnfn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdkihlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjlciihn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhpdbmgg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boiagp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlnlcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bggohi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bndckc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnjlog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gbolce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpifln32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnaqkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jeqaghpc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okjoec32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhqnnk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmpckbci.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enblpe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adgihkmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adgihkmf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhbmgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdeigc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igopilfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jhlllb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnojpdfb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhnahl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddjkhl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhmnap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fdldmokn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhmnap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Geddla32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bggjih32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niopgljl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qhnlmjie.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfmlif32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmkmao32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpifln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcjenkhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hefmqdgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnhddiqh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekofijic.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlkggn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhljgn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfhjfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oakdkn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnagecdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kedeffhn.exe -
Executes dropped EXE 64 IoCs
pid Process 2524 Efaiobkc.exe 2316 Eheblj32.exe 2760 Elbkbh32.exe 2828 Eapcjo32.exe 2236 Efllcf32.exe 1216 Fdpmljan.exe 1228 Gifhkpgk.exe 2820 Gbolce32.exe 1104 Ghlell32.exe 2008 Gdbeqmag.exe 2348 Boiagp32.exe 636 Qpnkjq32.exe 1196 Hfhjfp32.exe 2992 Niopgljl.exe 2184 Nlnlcg32.exe 2212 Nolhoc32.exe 1728 Oakdkn32.exe 888 Odiagj32.exe 1988 Odnjbibf.exe 2716 Oijbkpqm.exe 2136 Odpghiqc.exe 1984 Okjoec32.exe 2692 Pdpcgl32.exe 2068 Pgnpcg32.exe 2504 Poegde32.exe 1576 Qhnlmjie.exe 2536 Qgqlig32.exe 760 Qkoeoe32.exe 592 Qnmaka32.exe 2032 Adgihkmf.exe 1392 Anonqq32.exe 2548 Bnojpdfb.exe 2736 Bggohi32.exe 1376 Bnagecdp.exe 584 Bekobn32.exe 1620 Bfmlif32.exe 2104 Bndckc32.exe 1944 Bcqlcj32.exe 1132 Bimdka32.exe 644 Bccihj32.exe 440 Cmkmao32.exe 2764 Cceenilo.exe 1748 Cefbfa32.exe 1996 Coofoghn.exe 1656 Dhnahl32.exe 2928 Dohiefpc.exe 908 Dpifln32.exe 1604 Dhqnnk32.exe 2776 Dmmffbek.exe 1720 Ddgnbl32.exe 1916 Dgfkoh32.exe 2636 Dmpckbci.exe 936 Ddjkhl32.exe 2628 Dghgdg32.exe 2556 Dmbpaa32.exe 2492 Doclijgd.exe 2472 Elgmbnfn.exe 808 Eoeiniea.exe 2396 Ecaeoh32.exe 2552 Eikmkbeg.exe 956 Eljihn32.exe 1528 Eccadhkh.exe 2752 Ehpjmoio.exe 1476 Ekofijic.exe -
Loads dropped DLL 64 IoCs
pid Process 2540 NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe 2540 NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe 2524 Efaiobkc.exe 2524 Efaiobkc.exe 2316 Eheblj32.exe 2316 Eheblj32.exe 2760 Elbkbh32.exe 2760 Elbkbh32.exe 2828 Eapcjo32.exe 2828 Eapcjo32.exe 2236 Efllcf32.exe 2236 Efllcf32.exe 1216 Fdpmljan.exe 1216 Fdpmljan.exe 1228 Gifhkpgk.exe 1228 Gifhkpgk.exe 2820 Gbolce32.exe 2820 Gbolce32.exe 1104 Ghlell32.exe 1104 Ghlell32.exe 2008 Gdbeqmag.exe 2008 Gdbeqmag.exe 2348 Boiagp32.exe 2348 Boiagp32.exe 636 Qpnkjq32.exe 636 Qpnkjq32.exe 1196 Hfhjfp32.exe 1196 Hfhjfp32.exe 2992 Niopgljl.exe 2992 Niopgljl.exe 2184 Nlnlcg32.exe 2184 Nlnlcg32.exe 2212 Nolhoc32.exe 2212 Nolhoc32.exe 1728 Oakdkn32.exe 1728 Oakdkn32.exe 888 Odiagj32.exe 888 Odiagj32.exe 1988 Odnjbibf.exe 1988 Odnjbibf.exe 2716 Oijbkpqm.exe 2716 Oijbkpqm.exe 2136 Odpghiqc.exe 2136 Odpghiqc.exe 1984 Okjoec32.exe 1984 Okjoec32.exe 2692 Pdpcgl32.exe 2692 Pdpcgl32.exe 2068 Pgnpcg32.exe 2068 Pgnpcg32.exe 2504 Poegde32.exe 2504 Poegde32.exe 1576 Qhnlmjie.exe 1576 Qhnlmjie.exe 2536 Qgqlig32.exe 2536 Qgqlig32.exe 760 Qkoeoe32.exe 760 Qkoeoe32.exe 592 Qnmaka32.exe 592 Qnmaka32.exe 2032 Adgihkmf.exe 2032 Adgihkmf.exe 1392 Anonqq32.exe 1392 Anonqq32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cjchec32.exe Cgelih32.exe File created C:\Windows\SysWOW64\Ccllnibb.exe Cpmpbncn.exe File created C:\Windows\SysWOW64\Cnaqkb32.exe Ckcdof32.exe File created C:\Windows\SysWOW64\Aekepcfb.dll Ciolapkc.exe File created C:\Windows\SysWOW64\Cadincif.dll Gdbeqmag.exe File opened for modification C:\Windows\SysWOW64\Pgnpcg32.exe Pdpcgl32.exe File opened for modification C:\Windows\SysWOW64\Bbgdkb32.exe Jeqaghpc.exe File created C:\Windows\SysWOW64\Cfnefp32.dll NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe File opened for modification C:\Windows\SysWOW64\Odnjbibf.exe Odiagj32.exe File opened for modification C:\Windows\SysWOW64\Bndckc32.exe Bfmlif32.exe File created C:\Windows\SysWOW64\Gqjncg32.dll Dmpckbci.exe File opened for modification C:\Windows\SysWOW64\Fcfjik32.exe Fjmfpe32.exe File created C:\Windows\SysWOW64\Iblalaqn.dll Ffhajfga.exe File created C:\Windows\SysWOW64\Femnkb32.exe Fbobog32.exe File created C:\Windows\SysWOW64\Geddla32.exe Fnjlog32.exe File created C:\Windows\SysWOW64\Fdpmljan.exe Efllcf32.exe File created C:\Windows\SysWOW64\Gdbeqmag.exe Ghlell32.exe File created C:\Windows\SysWOW64\Jdpmga32.dll Enblpe32.exe File opened for modification C:\Windows\SysWOW64\Dhmnap32.exe Djjnfbei.exe File opened for modification C:\Windows\SysWOW64\Hhicho32.exe Hapkke32.exe File created C:\Windows\SysWOW64\Epggabhd.dll Elbkbh32.exe File created C:\Windows\SysWOW64\Dlkggn32.exe Dfaokckn.exe File opened for modification C:\Windows\SysWOW64\Efllcf32.exe Eapcjo32.exe File opened for modification C:\Windows\SysWOW64\Ckcdof32.exe Ccllnibb.exe File created C:\Windows\SysWOW64\Dmmffbek.exe Dhqnnk32.exe File created C:\Windows\SysWOW64\Bggohi32.exe Bnojpdfb.exe File opened for modification C:\Windows\SysWOW64\Iqoamf32.exe Aepqac32.exe File created C:\Windows\SysWOW64\Jnhddiqh.exe Jhlllb32.exe File created C:\Windows\SysWOW64\Bbiangbo.dll Doclijgd.exe File opened for modification C:\Windows\SysWOW64\Doclijgd.exe Dmbpaa32.exe File opened for modification C:\Windows\SysWOW64\Daagfabf.exe Ciolapkc.exe File created C:\Windows\SysWOW64\Pgnpcg32.exe Pdpcgl32.exe File created C:\Windows\SysWOW64\Dhnahl32.exe Coofoghn.exe File opened for modification C:\Windows\SysWOW64\Jhlllb32.exe Jdpplcjh.exe File created C:\Windows\SysWOW64\Fpqfcl32.exe Fmbigp32.exe File opened for modification C:\Windows\SysWOW64\Jnkajiof.exe Jjoejj32.exe File opened for modification C:\Windows\SysWOW64\Dnegpeap.exe Dgkock32.exe File created C:\Windows\SysWOW64\Okjoec32.exe Odpghiqc.exe File created C:\Windows\SysWOW64\Ehemnf32.dll Elgmbnfn.exe File created C:\Windows\SysWOW64\Nkcpdekf.dll Eoeiniea.exe File created C:\Windows\SysWOW64\Eenchbje.dll Hkccpb32.exe File created C:\Windows\SysWOW64\Idfein32.dll Dlkggn32.exe File opened for modification C:\Windows\SysWOW64\Hfhjfp32.exe Qpnkjq32.exe File opened for modification C:\Windows\SysWOW64\Edgkap32.exe Eedjfchi.exe File opened for modification C:\Windows\SysWOW64\Fccncknc.exe Fqbeapqb.exe File opened for modification C:\Windows\SysWOW64\Ffbjpfmg.exe Fccncknc.exe File created C:\Windows\SysWOW64\Hgnpkboh.dll Cjchec32.exe File created C:\Windows\SysWOW64\Jhlllb32.exe Jdpplcjh.exe File created C:\Windows\SysWOW64\Qpnkjq32.exe Boiagp32.exe File created C:\Windows\SysWOW64\Odnjbibf.exe Odiagj32.exe File opened for modification C:\Windows\SysWOW64\Cmkmao32.exe Bccihj32.exe File opened for modification C:\Windows\SysWOW64\Nolhoc32.exe Nlnlcg32.exe File created C:\Windows\SysWOW64\Bcfngjfe.dll Cgelih32.exe File created C:\Windows\SysWOW64\Ebhgaocg.dll Doejhjfc.exe File created C:\Windows\SysWOW64\Imicqd32.dll Hhgfbpdk.exe File created C:\Windows\SysWOW64\Bbnpde32.dll Hhicho32.exe File created C:\Windows\SysWOW64\Lboeha32.dll Ehpjmoio.exe File created C:\Windows\SysWOW64\Egegnk32.exe Edgkap32.exe File opened for modification C:\Windows\SysWOW64\Anonqq32.exe Adgihkmf.exe File created C:\Windows\SysWOW64\Bnagecdp.exe Bggohi32.exe File opened for modification C:\Windows\SysWOW64\Gifhkpgk.exe Fdpmljan.exe File created C:\Windows\SysWOW64\Odiagj32.exe Oakdkn32.exe File created C:\Windows\SysWOW64\Elgmbnfn.exe Doclijgd.exe File created C:\Windows\SysWOW64\Jmpnkecn.exe Jgcecn32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcfjik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkijjioo.dll" Cdkihlid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imgekb32.dll" Bcqlcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ieomjonc.dll" Djjnfbei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfgefecg.dll" Dgkock32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbolce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhbeqckl.dll" Dhnahl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Afciphpd.dll" Eedjfchi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecaeoh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dncmaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmbcdg32.dll" Femnkb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhljgn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hhbmgp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkhodk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qhnlmjie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkgdgc32.dll" Heijfdeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmpnkecn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eedjfchi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fondlo32.dll" Bocadg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cgelih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cpmpbncn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdfqgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bggjih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dncmaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Coofoghn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dohiefpc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhqnnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jffjbfpf.dll" Ddjkhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdldmokn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpmckh32.dll" Jgcecn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nolhoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgcflmnb.dll" Geddla32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnagecdp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmpckbci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aqileo32.dll" Fpqfcl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fqbeapqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fnjlog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnjlog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Phknqi32.dll" Jhlllb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bocadg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epggabhd.dll" Elbkbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmpckbci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nopdke32.dll" Cmkmao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eenchbje.dll" Hkccpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbobog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fllpcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igopilfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Odnjbibf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdgpdo32.dll" Odpghiqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bggohi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aepqac32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhpdbmgg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgebincc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ciolapkc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdpmljan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Egegnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nimflk32.dll" Fqbeapqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fccncknc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjdoeibg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ciolapkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Midgogjn.dll" Bnojpdfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bggohi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ehpjmoio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbobog32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2524 2540 NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe 27 PID 2540 wrote to memory of 2524 2540 NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe 27 PID 2540 wrote to memory of 2524 2540 NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe 27 PID 2540 wrote to memory of 2524 2540 NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe 27 PID 2524 wrote to memory of 2316 2524 Efaiobkc.exe 28 PID 2524 wrote to memory of 2316 2524 Efaiobkc.exe 28 PID 2524 wrote to memory of 2316 2524 Efaiobkc.exe 28 PID 2524 wrote to memory of 2316 2524 Efaiobkc.exe 28 PID 2316 wrote to memory of 2760 2316 Eheblj32.exe 29 PID 2316 wrote to memory of 2760 2316 Eheblj32.exe 29 PID 2316 wrote to memory of 2760 2316 Eheblj32.exe 29 PID 2316 wrote to memory of 2760 2316 Eheblj32.exe 29 PID 2760 wrote to memory of 2828 2760 Elbkbh32.exe 30 PID 2760 wrote to memory of 2828 2760 Elbkbh32.exe 30 PID 2760 wrote to memory of 2828 2760 Elbkbh32.exe 30 PID 2760 wrote to memory of 2828 2760 Elbkbh32.exe 30 PID 2828 wrote to memory of 2236 2828 Eapcjo32.exe 31 PID 2828 wrote to memory of 2236 2828 Eapcjo32.exe 31 PID 2828 wrote to memory of 2236 2828 Eapcjo32.exe 31 PID 2828 wrote to memory of 2236 2828 Eapcjo32.exe 31 PID 2236 wrote to memory of 1216 2236 Efllcf32.exe 32 PID 2236 wrote to memory of 1216 2236 Efllcf32.exe 32 PID 2236 wrote to memory of 1216 2236 Efllcf32.exe 32 PID 2236 wrote to memory of 1216 2236 Efllcf32.exe 32 PID 1216 wrote to memory of 1228 1216 Fdpmljan.exe 33 PID 1216 wrote to memory of 1228 1216 Fdpmljan.exe 33 PID 1216 wrote to memory of 1228 1216 Fdpmljan.exe 33 PID 1216 wrote to memory of 1228 1216 Fdpmljan.exe 33 PID 1228 wrote to memory of 2820 1228 Gifhkpgk.exe 34 PID 1228 wrote to memory of 2820 1228 Gifhkpgk.exe 34 PID 1228 wrote to memory of 2820 1228 Gifhkpgk.exe 34 PID 1228 wrote to memory of 2820 1228 Gifhkpgk.exe 34 PID 2820 wrote to memory of 1104 2820 Gbolce32.exe 35 PID 2820 wrote to memory of 1104 2820 Gbolce32.exe 35 PID 2820 wrote to memory of 1104 2820 Gbolce32.exe 35 PID 2820 wrote to memory of 1104 2820 Gbolce32.exe 35 PID 1104 wrote to memory of 2008 1104 Ghlell32.exe 36 PID 1104 wrote to memory of 2008 1104 Ghlell32.exe 36 PID 1104 wrote to memory of 2008 1104 Ghlell32.exe 36 PID 1104 wrote to memory of 2008 1104 Ghlell32.exe 36 PID 2008 wrote to memory of 2348 2008 Gdbeqmag.exe 37 PID 2008 wrote to memory of 2348 2008 Gdbeqmag.exe 37 PID 2008 wrote to memory of 2348 2008 Gdbeqmag.exe 37 PID 2008 wrote to memory of 2348 2008 Gdbeqmag.exe 37 PID 2348 wrote to memory of 636 2348 Boiagp32.exe 38 PID 2348 wrote to memory of 636 2348 Boiagp32.exe 38 PID 2348 wrote to memory of 636 2348 Boiagp32.exe 38 PID 2348 wrote to memory of 636 2348 Boiagp32.exe 38 PID 636 wrote to memory of 1196 636 Qpnkjq32.exe 39 PID 636 wrote to memory of 1196 636 Qpnkjq32.exe 39 PID 636 wrote to memory of 1196 636 Qpnkjq32.exe 39 PID 636 wrote to memory of 1196 636 Qpnkjq32.exe 39 PID 1196 wrote to memory of 2992 1196 Hfhjfp32.exe 40 PID 1196 wrote to memory of 2992 1196 Hfhjfp32.exe 40 PID 1196 wrote to memory of 2992 1196 Hfhjfp32.exe 40 PID 1196 wrote to memory of 2992 1196 Hfhjfp32.exe 40 PID 2992 wrote to memory of 2184 2992 Niopgljl.exe 41 PID 2992 wrote to memory of 2184 2992 Niopgljl.exe 41 PID 2992 wrote to memory of 2184 2992 Niopgljl.exe 41 PID 2992 wrote to memory of 2184 2992 Niopgljl.exe 41 PID 2184 wrote to memory of 2212 2184 Nlnlcg32.exe 42 PID 2184 wrote to memory of 2212 2184 Nlnlcg32.exe 42 PID 2184 wrote to memory of 2212 2184 Nlnlcg32.exe 42 PID 2184 wrote to memory of 2212 2184 Nlnlcg32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Efaiobkc.exeC:\Windows\system32\Efaiobkc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\Eheblj32.exeC:\Windows\system32\Eheblj32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\Elbkbh32.exeC:\Windows\system32\Elbkbh32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Eapcjo32.exeC:\Windows\system32\Eapcjo32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\Efllcf32.exeC:\Windows\system32\Efllcf32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\Fdpmljan.exeC:\Windows\system32\Fdpmljan.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\Gifhkpgk.exeC:\Windows\system32\Gifhkpgk.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\Gbolce32.exeC:\Windows\system32\Gbolce32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Ghlell32.exeC:\Windows\system32\Ghlell32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\Gdbeqmag.exeC:\Windows\system32\Gdbeqmag.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\Boiagp32.exeC:\Windows\system32\Boiagp32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\Qpnkjq32.exeC:\Windows\system32\Qpnkjq32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\Hfhjfp32.exeC:\Windows\system32\Hfhjfp32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\Niopgljl.exeC:\Windows\system32\Niopgljl.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\Nlnlcg32.exeC:\Windows\system32\Nlnlcg32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\Nolhoc32.exeC:\Windows\system32\Nolhoc32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2212 -
C:\Windows\SysWOW64\Oakdkn32.exeC:\Windows\system32\Oakdkn32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1728 -
C:\Windows\SysWOW64\Odiagj32.exeC:\Windows\system32\Odiagj32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:888 -
C:\Windows\SysWOW64\Odnjbibf.exeC:\Windows\system32\Odnjbibf.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1988 -
C:\Windows\SysWOW64\Oijbkpqm.exeC:\Windows\system32\Oijbkpqm.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716 -
C:\Windows\SysWOW64\Odpghiqc.exeC:\Windows\system32\Odpghiqc.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2136 -
C:\Windows\SysWOW64\Okjoec32.exeC:\Windows\system32\Okjoec32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1984 -
C:\Windows\SysWOW64\Pdpcgl32.exeC:\Windows\system32\Pdpcgl32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2692 -
C:\Windows\SysWOW64\Pgnpcg32.exeC:\Windows\system32\Pgnpcg32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2068 -
C:\Windows\SysWOW64\Poegde32.exeC:\Windows\system32\Poegde32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2504 -
C:\Windows\SysWOW64\Qhnlmjie.exeC:\Windows\system32\Qhnlmjie.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1576 -
C:\Windows\SysWOW64\Qgqlig32.exeC:\Windows\system32\Qgqlig32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2536 -
C:\Windows\SysWOW64\Qkoeoe32.exeC:\Windows\system32\Qkoeoe32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:760 -
C:\Windows\SysWOW64\Qnmaka32.exeC:\Windows\system32\Qnmaka32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:592 -
C:\Windows\SysWOW64\Adgihkmf.exeC:\Windows\system32\Adgihkmf.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2032 -
C:\Windows\SysWOW64\Anonqq32.exeC:\Windows\system32\Anonqq32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1392 -
C:\Windows\SysWOW64\Bnojpdfb.exeC:\Windows\system32\Bnojpdfb.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2548 -
C:\Windows\SysWOW64\Bggohi32.exeC:\Windows\system32\Bggohi32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2736 -
C:\Windows\SysWOW64\Bnagecdp.exeC:\Windows\system32\Bnagecdp.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1376 -
C:\Windows\SysWOW64\Bekobn32.exeC:\Windows\system32\Bekobn32.exe36⤵
- Executes dropped EXE
PID:584 -
C:\Windows\SysWOW64\Bfmlif32.exeC:\Windows\system32\Bfmlif32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1620 -
C:\Windows\SysWOW64\Bndckc32.exeC:\Windows\system32\Bndckc32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\Bcqlcj32.exeC:\Windows\system32\Bcqlcj32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:1944 -
C:\Windows\SysWOW64\Bimdka32.exeC:\Windows\system32\Bimdka32.exe40⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\Bccihj32.exeC:\Windows\system32\Bccihj32.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:644 -
C:\Windows\SysWOW64\Cmkmao32.exeC:\Windows\system32\Cmkmao32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:440 -
C:\Windows\SysWOW64\Cceenilo.exeC:\Windows\system32\Cceenilo.exe43⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\Cefbfa32.exeC:\Windows\system32\Cefbfa32.exe44⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\SysWOW64\Coofoghn.exeC:\Windows\system32\Coofoghn.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1996 -
C:\Windows\SysWOW64\Dhnahl32.exeC:\Windows\system32\Dhnahl32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1656 -
C:\Windows\SysWOW64\Dohiefpc.exeC:\Windows\system32\Dohiefpc.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:2928 -
C:\Windows\SysWOW64\Dpifln32.exeC:\Windows\system32\Dpifln32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:908 -
C:\Windows\SysWOW64\Dhqnnk32.exeC:\Windows\system32\Dhqnnk32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1604 -
C:\Windows\SysWOW64\Dmmffbek.exeC:\Windows\system32\Dmmffbek.exe50⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\Ddgnbl32.exeC:\Windows\system32\Ddgnbl32.exe51⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\Dgfkoh32.exeC:\Windows\system32\Dgfkoh32.exe52⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\SysWOW64\Dmpckbci.exeC:\Windows\system32\Dmpckbci.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2636 -
C:\Windows\SysWOW64\Ddjkhl32.exeC:\Windows\system32\Ddjkhl32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:936 -
C:\Windows\SysWOW64\Dghgdg32.exeC:\Windows\system32\Dghgdg32.exe55⤵
- Executes dropped EXE
PID:2628 -
C:\Windows\SysWOW64\Dmbpaa32.exeC:\Windows\system32\Dmbpaa32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2556 -
C:\Windows\SysWOW64\Doclijgd.exeC:\Windows\system32\Doclijgd.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Elgmbnfn.exeC:\Windows\system32\Elgmbnfn.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2472 -
C:\Windows\SysWOW64\Eoeiniea.exeC:\Windows\system32\Eoeiniea.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:808 -
C:\Windows\SysWOW64\Ecaeoh32.exeC:\Windows\system32\Ecaeoh32.exe60⤵
- Executes dropped EXE
- Modifies registry class
PID:2396 -
C:\Windows\SysWOW64\Eikmkbeg.exeC:\Windows\system32\Eikmkbeg.exe61⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\Eljihn32.exeC:\Windows\system32\Eljihn32.exe62⤵
- Executes dropped EXE
PID:956 -
C:\Windows\SysWOW64\Eccadhkh.exeC:\Windows\system32\Eccadhkh.exe63⤵
- Executes dropped EXE
PID:1528 -
C:\Windows\SysWOW64\Ehpjmoio.exeC:\Windows\system32\Ehpjmoio.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Ekofijic.exeC:\Windows\system32\Ekofijic.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\Eedjfchi.exeC:\Windows\system32\Eedjfchi.exe66⤵
- Drops file in System32 directory
- Modifies registry class
PID:2680 -
C:\Windows\SysWOW64\Edgkap32.exeC:\Windows\system32\Edgkap32.exe67⤵
- Drops file in System32 directory
PID:2232 -
C:\Windows\SysWOW64\Egegnk32.exeC:\Windows\system32\Egegnk32.exe68⤵
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Enpoje32.exeC:\Windows\system32\Enpoje32.exe69⤵PID:832
-
C:\Windows\SysWOW64\Ediggoma.exeC:\Windows\system32\Ediggoma.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:548 -
C:\Windows\SysWOW64\Ekcpdi32.exeC:\Windows\system32\Ekcpdi32.exe71⤵PID:2760
-
C:\Windows\SysWOW64\Enblpe32.exeC:\Windows\system32\Enblpe32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2812 -
C:\Windows\SysWOW64\Fdldmokn.exeC:\Windows\system32\Fdldmokn.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\Fqbeapqb.exeC:\Windows\system32\Fqbeapqb.exe74⤵
- Drops file in System32 directory
- Modifies registry class
PID:2096 -
C:\Windows\SysWOW64\Fccncknc.exeC:\Windows\system32\Fccncknc.exe75⤵
- Drops file in System32 directory
- Modifies registry class
PID:2024 -
C:\Windows\SysWOW64\Ffbjpfmg.exeC:\Windows\system32\Ffbjpfmg.exe76⤵PID:1716
-
C:\Windows\SysWOW64\Fjmfpe32.exeC:\Windows\system32\Fjmfpe32.exe77⤵
- Drops file in System32 directory
PID:1920 -
C:\Windows\SysWOW64\Fcfjik32.exeC:\Windows\system32\Fcfjik32.exe78⤵
- Modifies registry class
PID:1204 -
C:\Windows\SysWOW64\Hkccpb32.exeC:\Windows\system32\Hkccpb32.exe79⤵
- Drops file in System32 directory
- Modifies registry class
PID:1500 -
C:\Windows\SysWOW64\Aepqac32.exeC:\Windows\system32\Aepqac32.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:2352 -
C:\Windows\SysWOW64\Iqoamf32.exeC:\Windows\system32\Iqoamf32.exe81⤵PID:2916
-
C:\Windows\SysWOW64\Bocadg32.exeC:\Windows\system32\Bocadg32.exe82⤵
- Modifies registry class
PID:1584 -
C:\Windows\SysWOW64\Cknkdggi.exeC:\Windows\system32\Cknkdggi.exe83⤵PID:2956
-
C:\Windows\SysWOW64\Cahcqa32.exeC:\Windows\system32\Cahcqa32.exe84⤵PID:800
-
C:\Windows\SysWOW64\Cgelih32.exeC:\Windows\system32\Cgelih32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:532 -
C:\Windows\SysWOW64\Cjchec32.exeC:\Windows\system32\Cjchec32.exe86⤵
- Drops file in System32 directory
PID:900 -
C:\Windows\SysWOW64\Cpmpbncn.exeC:\Windows\system32\Cpmpbncn.exe87⤵
- Drops file in System32 directory
- Modifies registry class
PID:2340 -
C:\Windows\SysWOW64\Ccllnibb.exeC:\Windows\system32\Ccllnibb.exe88⤵
- Drops file in System32 directory
PID:2184 -
C:\Windows\SysWOW64\Ckcdof32.exeC:\Windows\system32\Ckcdof32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1208 -
C:\Windows\SysWOW64\Cnaqkb32.exeC:\Windows\system32\Cnaqkb32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1928 -
C:\Windows\SysWOW64\Cdkihlid.exeC:\Windows\system32\Cdkihlid.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2784 -
C:\Windows\SysWOW64\Dgjedghh.exeC:\Windows\system32\Dgjedghh.exe92⤵PID:1472
-
C:\Windows\SysWOW64\Djhapcgl.exeC:\Windows\system32\Djhapcgl.exe93⤵PID:576
-
C:\Windows\SysWOW64\Dncmaa32.exeC:\Windows\system32\Dncmaa32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1624 -
C:\Windows\SysWOW64\Doejhjfc.exeC:\Windows\system32\Doejhjfc.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2888 -
C:\Windows\SysWOW64\Djjnfbei.exeC:\Windows\system32\Djjnfbei.exe96⤵
- Drops file in System32 directory
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\Dhmnap32.exeC:\Windows\system32\Dhmnap32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2896 -
C:\Windows\SysWOW64\Dqdfbmmf.exeC:\Windows\system32\Dqdfbmmf.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1240 -
C:\Windows\SysWOW64\Dogfnj32.exeC:\Windows\system32\Dogfnj32.exe99⤵PID:2084
-
C:\Windows\SysWOW64\Dfaokckn.exeC:\Windows\system32\Dfaokckn.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:644 -
C:\Windows\SysWOW64\Dlkggn32.exeC:\Windows\system32\Dlkggn32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1560 -
C:\Windows\SysWOW64\Fmpmaqaq.exeC:\Windows\system32\Fmpmaqaq.exe102⤵PID:1072
-
C:\Windows\SysWOW64\Fcjenkhm.exeC:\Windows\system32\Fcjenkhm.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1720 -
C:\Windows\SysWOW64\Ffhajfga.exeC:\Windows\system32\Ffhajfga.exe104⤵
- Drops file in System32 directory
PID:936 -
C:\Windows\SysWOW64\Fmbigp32.exeC:\Windows\system32\Fmbigp32.exe105⤵
- Drops file in System32 directory
PID:1484 -
C:\Windows\SysWOW64\Fpqfcl32.exeC:\Windows\system32\Fpqfcl32.exe106⤵
- Modifies registry class
PID:1120 -
C:\Windows\SysWOW64\Fbobog32.exeC:\Windows\system32\Fbobog32.exe107⤵
- Drops file in System32 directory
- Modifies registry class
PID:2628 -
C:\Windows\SysWOW64\Femnkb32.exeC:\Windows\system32\Femnkb32.exe108⤵
- Modifies registry class
PID:2952 -
C:\Windows\SysWOW64\Fhljgn32.exeC:\Windows\system32\Fhljgn32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2552 -
C:\Windows\SysWOW64\Flgfhmdf.exeC:\Windows\system32\Flgfhmdf.exe110⤵PID:2224
-
C:\Windows\SysWOW64\Fbaoegkb.exeC:\Windows\system32\Fbaoegkb.exe111⤵PID:1476
-
C:\Windows\SysWOW64\Fjlciihn.exeC:\Windows\system32\Fjlciihn.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1076 -
C:\Windows\SysWOW64\Fbckjfip.exeC:\Windows\system32\Fbckjfip.exe113⤵PID:2428
-
C:\Windows\SysWOW64\Fhpdbmgg.exeC:\Windows\system32\Fhpdbmgg.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2240 -
C:\Windows\SysWOW64\Fllpcl32.exeC:\Windows\system32\Fllpcl32.exe115⤵
- Modifies registry class
PID:2912 -
C:\Windows\SysWOW64\Fnjlog32.exeC:\Windows\system32\Fnjlog32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1716 -
C:\Windows\SysWOW64\Geddla32.exeC:\Windows\system32\Geddla32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1740 -
C:\Windows\SysWOW64\Hhbmgp32.exeC:\Windows\system32\Hhbmgp32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1992 -
C:\Windows\SysWOW64\Holedjom.exeC:\Windows\system32\Holedjom.exe119⤵PID:2932
-
C:\Windows\SysWOW64\Hbhadi32.exeC:\Windows\system32\Hbhadi32.exe120⤵PID:2632
-
C:\Windows\SysWOW64\Hefmqdgj.exeC:\Windows\system32\Hefmqdgj.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1908 -
C:\Windows\SysWOW64\Hoobij32.exeC:\Windows\system32\Hoobij32.exe122⤵PID:2612
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-