Analysis
-
max time kernel
160s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2023 05:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe
Resource
win7-20231023-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe
-
Size
45KB
-
MD5
d0fa6a38c0d1cefd0f7e9d4b09397340
-
SHA1
4c67a9ff2407466ad0ec35099de90252000f22e3
-
SHA256
79dcc87d4dc660758462bb500ff95ef2a9a9a42be80d3484c9582550eb66b9bd
-
SHA512
75125ce3c3b5531e8975571f45fe080eae4a19545999cb2530a300b3bf465060dfbcc7f7d05890126183d7394128c907588232153b3024f9111dea9d93333f91
-
SSDEEP
768:1ucZ44Z3VQXPW6xoJleOv43Xi8RlrpsdutaT11EO12Mv5+/1H5R:QcZRf6xoJf4irUEB2O9v5k/
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knhkkfod.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idahcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ecafgo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcdfad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgjcfgoa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Enaaiifb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkpglqgj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjmllgjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfoclflo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgknlmgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebcmjqej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jncobabm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfmpob32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbpenpdp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anaofa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjofcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggepkadc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcfqjmka.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khfdedfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfqjhmhk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpihmmdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Knabne32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkmmkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddecpgko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Foocegea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncfbdfgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpllle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oediim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebokhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjghmp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mlkldmjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnfanjqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phlhelhb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdjeklfj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Menpgmap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iknmfg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plhcglil.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdqelh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fiekhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjhfbl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfejmobh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mobbnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpkpbpko.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jqhaolli.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehndhn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecafgo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fclhidhj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnondf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmjefkap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hnphio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Igedenca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbpeghpe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcddemmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbiamd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njjmil32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mccofn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pomgcc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgeadjai.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjlmmbfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iolhdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbmhglqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bqafpc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Coohbbeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idoknmfj.exe -
Executes dropped EXE 64 IoCs
pid Process 4360 Igqbiacj.exe 920 Kffhakjp.exe 2388 Lhmjlm32.exe 632 Lkppchfi.exe 3024 Mmhofbma.exe 2072 Nnabladg.exe 2340 Ndmgnkja.exe 3068 Oediim32.exe 2520 Pdnpeh32.exe 3796 Qkchna32.exe 4804 Bbpeghpe.exe 3300 Chkjpm32.exe 572 Flpbnh32.exe 820 Hpejlc32.exe 4844 Ijgakgej.exe 4036 Jobfdl32.exe 844 Kfaglf32.exe 2288 Kakednfj.exe 4684 Lfaqcclf.exe 3424 Mmpbkm32.exe 1956 Mfmpob32.exe 4400 Npjnbg32.exe 1696 Ndomiddc.exe 2064 Pdmikb32.exe 4416 Ababkdij.exe 5084 Ahkkhnpg.exe 1768 Bgeadjai.exe 4272 Bgjjoi32.exe 556 Cgjcfgoa.exe 3968 Eejcki32.exe 4620 Fefcgh32.exe 4424 Gbhpajlj.exe 2780 Hifaic32.exe 2032 Hiinoc32.exe 4204 Hepoddcc.exe 1516 Hklglk32.exe 4748 Iefedcmk.exe 1276 Ijigfaol.exe 2512 Jkomhhae.exe 4984 Kfejmobh.exe 4168 Lihpdj32.exe 4384 Lfqjhmhk.exe 4444 Miflehaf.exe 4376 Mcpjnp32.exe 3944 Nmkkle32.exe 5024 Njokei32.exe 4696 Nmpdgdmp.exe 548 Obafjk32.exe 1656 Pdjeklfj.exe 5000 Ppafpm32.exe 3004 Pcfhlh32.exe 3032 Qpjifl32.exe 1328 Qdhalj32.exe 2280 Apaofk32.exe 3520 Bknidbhi.exe 1932 Bjjmfn32.exe 4300 Dnfanjqp.exe 3392 Djalnkbo.exe 3664 Enaaiifb.exe 3780 Ecafgo32.exe 1700 Fanigb32.exe 4288 Gaepgacn.exe 4624 Hopfadlp.exe 3868 Iefnjm32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Menpgmap.exe Mlflog32.exe File created C:\Windows\SysWOW64\Dnondf32.exe Dkndbkop.exe File opened for modification C:\Windows\SysWOW64\Gnmblb32.exe Gaibcn32.exe File created C:\Windows\SysWOW64\Decdnfbo.exe Doilalka.exe File created C:\Windows\SysWOW64\Hcailemh.exe Hcomfeok.exe File created C:\Windows\SysWOW64\Keeiahmm.dll Pdqelh32.exe File opened for modification C:\Windows\SysWOW64\Oiagnk32.exe Omjfij32.exe File opened for modification C:\Windows\SysWOW64\Aagdgd32.exe Adqghpbp.exe File created C:\Windows\SysWOW64\Eaolen32.exe Ealopnol.exe File created C:\Windows\SysWOW64\Oediim32.exe Ndmgnkja.exe File created C:\Windows\SysWOW64\Hnbhea32.dll Ehndhn32.exe File created C:\Windows\SysWOW64\Qppambnl.exe Pmmleg32.exe File created C:\Windows\SysWOW64\Lkehlmll.dll Iefedcmk.exe File created C:\Windows\SysWOW64\Eilgkh32.dll Lekeajmm.exe File created C:\Windows\SysWOW64\Eeacgp32.dll Ciihcbhg.exe File opened for modification C:\Windows\SysWOW64\Gcddemmd.exe Gjlplg32.exe File opened for modification C:\Windows\SysWOW64\Bimkde32.exe Bgknlmgi.exe File created C:\Windows\SysWOW64\Fchebfmg.dll Afjjil32.exe File created C:\Windows\SysWOW64\Lcfial32.dll Adqghpbp.exe File created C:\Windows\SysWOW64\Neofcpmo.dll Cekhbnne.exe File created C:\Windows\SysWOW64\Bqnkkele.dll Eidqdkkn.exe File created C:\Windows\SysWOW64\Eblpqono.exe Ebcmjqej.exe File opened for modification C:\Windows\SysWOW64\Bhqmdoef.exe Bkmmkj32.exe File created C:\Windows\SysWOW64\Oakamdee.dll Fnffam32.exe File created C:\Windows\SysWOW64\Ljagfapn.dll Klbgpi32.exe File opened for modification C:\Windows\SysWOW64\Ldckkdfl.exe Khfdedfp.exe File created C:\Windows\SysWOW64\Ibkdmm32.dll Bjgifhep.exe File opened for modification C:\Windows\SysWOW64\Bhblfpng.exe Aemjjeek.exe File opened for modification C:\Windows\SysWOW64\Eokjke32.exe Dcjfpfnh.exe File opened for modification C:\Windows\SysWOW64\Mkpglqgj.exe Mahbck32.exe File created C:\Windows\SysWOW64\Eoamlk32.dll Eecpaeoo.exe File opened for modification C:\Windows\SysWOW64\Ababkdij.exe Pdmikb32.exe File created C:\Windows\SysWOW64\Pmjfjn32.dll Kiggln32.exe File opened for modification C:\Windows\SysWOW64\Mqdcga32.exe Mgkoolil.exe File opened for modification C:\Windows\SysWOW64\Ecafgo32.exe Enaaiifb.exe File created C:\Windows\SysWOW64\Eomjgpen.dll Cipebqij.exe File created C:\Windows\SysWOW64\Mknjgajl.exe Iiffoc32.exe File created C:\Windows\SysWOW64\Ijioijao.exe Icoglp32.exe File created C:\Windows\SysWOW64\Ohkphdbm.dll Eepkdklm.exe File created C:\Windows\SysWOW64\Eoepohml.exe Ehlhbn32.exe File created C:\Windows\SysWOW64\Pacgmh32.dll Gdbkcf32.exe File opened for modification C:\Windows\SysWOW64\Feimkjdb.exe Eepkdklm.exe File created C:\Windows\SysWOW64\Ihmaepdd.dll Gcddemmd.exe File opened for modification C:\Windows\SysWOW64\Acilkp32.exe Qhlamhkj.exe File opened for modification C:\Windows\SysWOW64\Nldhpeop.exe Nhfpjghi.exe File created C:\Windows\SysWOW64\Njdnmp32.dll Nelfnd32.exe File opened for modification C:\Windows\SysWOW64\Plpjhk32.exe Pknqhh32.exe File created C:\Windows\SysWOW64\Fcikcekm.exe Ejagkodl.exe File opened for modification C:\Windows\SysWOW64\Oediim32.exe Ndmgnkja.exe File created C:\Windows\SysWOW64\Hnclfaec.dll Hepoddcc.exe File opened for modification C:\Windows\SysWOW64\Oiihkncb.exe Mlkldmjf.exe File opened for modification C:\Windows\SysWOW64\Cjecjahd.exe Cooolhin.exe File opened for modification C:\Windows\SysWOW64\Omjfij32.exe Oqcedino.exe File created C:\Windows\SysWOW64\Hkibcg32.dll Gegkilik.exe File created C:\Windows\SysWOW64\Hicpqh32.exe Hpkkhc32.exe File created C:\Windows\SysWOW64\Oedeli32.dll Lfaqcclf.exe File created C:\Windows\SysWOW64\Fgekcecd.dll Bknidbhi.exe File created C:\Windows\SysWOW64\Mlflog32.exe Lnbkeclf.exe File created C:\Windows\SysWOW64\Bfbjhh32.dll Idahcm32.exe File created C:\Windows\SysWOW64\Qgmbbfja.dll Fihnhc32.exe File created C:\Windows\SysWOW64\Cpofdndi.exe Bbofpk32.exe File created C:\Windows\SysWOW64\Fpchjkdg.dll Bbofpk32.exe File created C:\Windows\SysWOW64\Hcdfad32.exe Hcailemh.exe File opened for modification C:\Windows\SysWOW64\Kfaglf32.exe Jobfdl32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ancqfljf.dll" Ahmqnkbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihmaepdd.dll" Gcddemmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ikcccg32.dll" Mdmnacna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lchqeqnn.dll" Hcailemh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhmjlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kphfekmd.dll" Nhdimplm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhdilc32.dll" Blkdgheg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hdmohnhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eoepohml.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Egjobl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pimfji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgfdjnll.dll" Qppambnl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehifka32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cgjcfgoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pibfhink.dll" Nmpdgdmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onbbpg32.dll" Ijnqld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pknqhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hicpqh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aokjiokk.dll" Gjapamfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fgijdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpiinc32.dll" Ndomiddc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jkgpleaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lndjajdq.dll" Loigap32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mnhdae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hbenio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icoglp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Khmhilbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apddmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdmikb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Neoink32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijnqld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Foocegea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnbhea32.dll" Ehndhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Doilalka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enpmknbb.dll" Ggmlefcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdidde32.dll" Gaepgacn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mnmmmbll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkmmkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbeaib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kalccp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phlhelhb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Igedenca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbiamd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilndon32.dll" Lofklp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nepmnppf.dll" Ehlhbn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mgibil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eflham32.dll" Pimfji32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cpofdndi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Keonke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Deehck32.dll" Gkbkna32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iildfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nlfnkoia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eejcki32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dcjfpfnh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pknqhh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oqmhjged.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jnkqlk32.dll" Bgeadjai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bihibb32.dll" Cfmijkhj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkahmp32.dll" Iefnjm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jefgak32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Efnennjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kccbdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mldlmdcd.dll" Lbgaecjg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3516 wrote to memory of 4360 3516 NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe 90 PID 3516 wrote to memory of 4360 3516 NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe 90 PID 3516 wrote to memory of 4360 3516 NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe 90 PID 4360 wrote to memory of 920 4360 Igqbiacj.exe 91 PID 4360 wrote to memory of 920 4360 Igqbiacj.exe 91 PID 4360 wrote to memory of 920 4360 Igqbiacj.exe 91 PID 920 wrote to memory of 2388 920 Kffhakjp.exe 92 PID 920 wrote to memory of 2388 920 Kffhakjp.exe 92 PID 920 wrote to memory of 2388 920 Kffhakjp.exe 92 PID 2388 wrote to memory of 632 2388 Lhmjlm32.exe 93 PID 2388 wrote to memory of 632 2388 Lhmjlm32.exe 93 PID 2388 wrote to memory of 632 2388 Lhmjlm32.exe 93 PID 632 wrote to memory of 3024 632 Lkppchfi.exe 94 PID 632 wrote to memory of 3024 632 Lkppchfi.exe 94 PID 632 wrote to memory of 3024 632 Lkppchfi.exe 94 PID 3024 wrote to memory of 2072 3024 Mmhofbma.exe 95 PID 3024 wrote to memory of 2072 3024 Mmhofbma.exe 95 PID 3024 wrote to memory of 2072 3024 Mmhofbma.exe 95 PID 2072 wrote to memory of 2340 2072 Nnabladg.exe 96 PID 2072 wrote to memory of 2340 2072 Nnabladg.exe 96 PID 2072 wrote to memory of 2340 2072 Nnabladg.exe 96 PID 2340 wrote to memory of 3068 2340 Ndmgnkja.exe 97 PID 2340 wrote to memory of 3068 2340 Ndmgnkja.exe 97 PID 2340 wrote to memory of 3068 2340 Ndmgnkja.exe 97 PID 3068 wrote to memory of 2520 3068 Oediim32.exe 98 PID 3068 wrote to memory of 2520 3068 Oediim32.exe 98 PID 3068 wrote to memory of 2520 3068 Oediim32.exe 98 PID 2520 wrote to memory of 3796 2520 Pdnpeh32.exe 99 PID 2520 wrote to memory of 3796 2520 Pdnpeh32.exe 99 PID 2520 wrote to memory of 3796 2520 Pdnpeh32.exe 99 PID 3796 wrote to memory of 4804 3796 Qkchna32.exe 100 PID 3796 wrote to memory of 4804 3796 Qkchna32.exe 100 PID 3796 wrote to memory of 4804 3796 Qkchna32.exe 100 PID 4804 wrote to memory of 3300 4804 Bbpeghpe.exe 101 PID 4804 wrote to memory of 3300 4804 Bbpeghpe.exe 101 PID 4804 wrote to memory of 3300 4804 Bbpeghpe.exe 101 PID 3300 wrote to memory of 572 3300 Chkjpm32.exe 103 PID 3300 wrote to memory of 572 3300 Chkjpm32.exe 103 PID 3300 wrote to memory of 572 3300 Chkjpm32.exe 103 PID 572 wrote to memory of 820 572 Flpbnh32.exe 104 PID 572 wrote to memory of 820 572 Flpbnh32.exe 104 PID 572 wrote to memory of 820 572 Flpbnh32.exe 104 PID 820 wrote to memory of 4844 820 Hpejlc32.exe 105 PID 820 wrote to memory of 4844 820 Hpejlc32.exe 105 PID 820 wrote to memory of 4844 820 Hpejlc32.exe 105 PID 4844 wrote to memory of 4036 4844 Ijgakgej.exe 106 PID 4844 wrote to memory of 4036 4844 Ijgakgej.exe 106 PID 4844 wrote to memory of 4036 4844 Ijgakgej.exe 106 PID 4036 wrote to memory of 844 4036 Jobfdl32.exe 107 PID 4036 wrote to memory of 844 4036 Jobfdl32.exe 107 PID 4036 wrote to memory of 844 4036 Jobfdl32.exe 107 PID 844 wrote to memory of 2288 844 Kfaglf32.exe 108 PID 844 wrote to memory of 2288 844 Kfaglf32.exe 108 PID 844 wrote to memory of 2288 844 Kfaglf32.exe 108 PID 2288 wrote to memory of 4684 2288 Kakednfj.exe 109 PID 2288 wrote to memory of 4684 2288 Kakednfj.exe 109 PID 2288 wrote to memory of 4684 2288 Kakednfj.exe 109 PID 4684 wrote to memory of 3424 4684 Lfaqcclf.exe 110 PID 4684 wrote to memory of 3424 4684 Lfaqcclf.exe 110 PID 4684 wrote to memory of 3424 4684 Lfaqcclf.exe 110 PID 3424 wrote to memory of 1956 3424 Mmpbkm32.exe 112 PID 3424 wrote to memory of 1956 3424 Mmpbkm32.exe 112 PID 3424 wrote to memory of 1956 3424 Mmpbkm32.exe 112 PID 1956 wrote to memory of 4400 1956 Mfmpob32.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d0fa6a38c0d1cefd0f7e9d4b09397340.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\Igqbiacj.exeC:\Windows\system32\Igqbiacj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\Kffhakjp.exeC:\Windows\system32\Kffhakjp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\Lhmjlm32.exeC:\Windows\system32\Lhmjlm32.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\Lkppchfi.exeC:\Windows\system32\Lkppchfi.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\Mmhofbma.exeC:\Windows\system32\Mmhofbma.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Nnabladg.exeC:\Windows\system32\Nnabladg.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\Ndmgnkja.exeC:\Windows\system32\Ndmgnkja.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\Oediim32.exeC:\Windows\system32\Oediim32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\Pdnpeh32.exeC:\Windows\system32\Pdnpeh32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\Qkchna32.exeC:\Windows\system32\Qkchna32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\Bbpeghpe.exeC:\Windows\system32\Bbpeghpe.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\Chkjpm32.exeC:\Windows\system32\Chkjpm32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\Flpbnh32.exeC:\Windows\system32\Flpbnh32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\Hpejlc32.exeC:\Windows\system32\Hpejlc32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\Ijgakgej.exeC:\Windows\system32\Ijgakgej.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\Jobfdl32.exeC:\Windows\system32\Jobfdl32.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\Kfaglf32.exeC:\Windows\system32\Kfaglf32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\Kakednfj.exeC:\Windows\system32\Kakednfj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\Lfaqcclf.exeC:\Windows\system32\Lfaqcclf.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\Mmpbkm32.exeC:\Windows\system32\Mmpbkm32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\Mfmpob32.exeC:\Windows\system32\Mfmpob32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\Npjnbg32.exeC:\Windows\system32\Npjnbg32.exe23⤵
- Executes dropped EXE
PID:4400 -
C:\Windows\SysWOW64\Ndomiddc.exeC:\Windows\system32\Ndomiddc.exe24⤵
- Executes dropped EXE
- Modifies registry class
PID:1696 -
C:\Windows\SysWOW64\Pdmikb32.exeC:\Windows\system32\Pdmikb32.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2064
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ababkdij.exeC:\Windows\system32\Ababkdij.exe1⤵
- Executes dropped EXE
PID:4416 -
C:\Windows\SysWOW64\Ahkkhnpg.exeC:\Windows\system32\Ahkkhnpg.exe2⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\Bgeadjai.exeC:\Windows\system32\Bgeadjai.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1768 -
C:\Windows\SysWOW64\Bgjjoi32.exeC:\Windows\system32\Bgjjoi32.exe4⤵
- Executes dropped EXE
PID:4272 -
C:\Windows\SysWOW64\Cgjcfgoa.exeC:\Windows\system32\Cgjcfgoa.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:556 -
C:\Windows\SysWOW64\Eejcki32.exeC:\Windows\system32\Eejcki32.exe6⤵
- Executes dropped EXE
- Modifies registry class
PID:3968 -
C:\Windows\SysWOW64\Fefcgh32.exeC:\Windows\system32\Fefcgh32.exe7⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\Gbhpajlj.exeC:\Windows\system32\Gbhpajlj.exe8⤵
- Executes dropped EXE
PID:4424
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Hifaic32.exeC:\Windows\system32\Hifaic32.exe1⤵
- Executes dropped EXE
PID:2780 -
C:\Windows\SysWOW64\Hiinoc32.exeC:\Windows\system32\Hiinoc32.exe2⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\Hepoddcc.exeC:\Windows\system32\Hepoddcc.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4204 -
C:\Windows\SysWOW64\Hklglk32.exeC:\Windows\system32\Hklglk32.exe4⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\Iefedcmk.exeC:\Windows\system32\Iefedcmk.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4748 -
C:\Windows\SysWOW64\Ijigfaol.exeC:\Windows\system32\Ijigfaol.exe6⤵
- Executes dropped EXE
PID:1276 -
C:\Windows\SysWOW64\Jkomhhae.exeC:\Windows\system32\Jkomhhae.exe7⤵
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\Kfejmobh.exeC:\Windows\system32\Kfejmobh.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\Lihpdj32.exeC:\Windows\system32\Lihpdj32.exe9⤵
- Executes dropped EXE
PID:4168 -
C:\Windows\SysWOW64\Lfqjhmhk.exeC:\Windows\system32\Lfqjhmhk.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Miflehaf.exeC:\Windows\system32\Miflehaf.exe11⤵
- Executes dropped EXE
PID:4444 -
C:\Windows\SysWOW64\Mcpjnp32.exeC:\Windows\system32\Mcpjnp32.exe12⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\Nmkkle32.exeC:\Windows\system32\Nmkkle32.exe13⤵
- Executes dropped EXE
PID:3944 -
C:\Windows\SysWOW64\Njokei32.exeC:\Windows\system32\Njokei32.exe14⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\Nmpdgdmp.exeC:\Windows\system32\Nmpdgdmp.exe15⤵
- Executes dropped EXE
- Modifies registry class
PID:4696 -
C:\Windows\SysWOW64\Obafjk32.exeC:\Windows\system32\Obafjk32.exe16⤵
- Executes dropped EXE
PID:548 -
C:\Windows\SysWOW64\Pdjeklfj.exeC:\Windows\system32\Pdjeklfj.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Ppafpm32.exeC:\Windows\system32\Ppafpm32.exe18⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\Pcfhlh32.exeC:\Windows\system32\Pcfhlh32.exe19⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\Qpjifl32.exeC:\Windows\system32\Qpjifl32.exe20⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\SysWOW64\Qdhalj32.exeC:\Windows\system32\Qdhalj32.exe21⤵
- Executes dropped EXE
PID:1328 -
C:\Windows\SysWOW64\Apaofk32.exeC:\Windows\system32\Apaofk32.exe22⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\Bknidbhi.exeC:\Windows\system32\Bknidbhi.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3520 -
C:\Windows\SysWOW64\Bjjmfn32.exeC:\Windows\system32\Bjjmfn32.exe24⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\Dnfanjqp.exeC:\Windows\system32\Dnfanjqp.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\Djalnkbo.exeC:\Windows\system32\Djalnkbo.exe26⤵
- Executes dropped EXE
PID:3392 -
C:\Windows\SysWOW64\Enaaiifb.exeC:\Windows\system32\Enaaiifb.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3664 -
C:\Windows\SysWOW64\Ecafgo32.exeC:\Windows\system32\Ecafgo32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3780 -
C:\Windows\SysWOW64\Fanigb32.exeC:\Windows\system32\Fanigb32.exe29⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\Gaepgacn.exeC:\Windows\system32\Gaepgacn.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:4288 -
C:\Windows\SysWOW64\Hopfadlp.exeC:\Windows\system32\Hopfadlp.exe31⤵
- Executes dropped EXE
PID:4624 -
C:\Windows\SysWOW64\Iefnjm32.exeC:\Windows\system32\Iefnjm32.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:3868 -
C:\Windows\SysWOW64\Idbalhho.exeC:\Windows\system32\Idbalhho.exe33⤵PID:1048
-
C:\Windows\SysWOW64\Jefgak32.exeC:\Windows\system32\Jefgak32.exe34⤵
- Modifies registry class
PID:4060 -
C:\Windows\SysWOW64\Jaodkk32.exeC:\Windows\system32\Jaodkk32.exe35⤵PID:940
-
C:\Windows\SysWOW64\Klnkoc32.exeC:\Windows\system32\Klnkoc32.exe36⤵PID:3476
-
C:\Windows\SysWOW64\Pldcdhpi.exeC:\Windows\system32\Pldcdhpi.exe37⤵PID:1344
-
C:\Windows\SysWOW64\Bjgifhep.exeC:\Windows\system32\Bjgifhep.exe38⤵
- Drops file in System32 directory
PID:4000 -
C:\Windows\SysWOW64\Cfeplh32.exeC:\Windows\system32\Cfeplh32.exe39⤵PID:1172
-
C:\Windows\SysWOW64\Djeegf32.exeC:\Windows\system32\Djeegf32.exe40⤵PID:3996
-
C:\Windows\SysWOW64\Dmmdjp32.exeC:\Windows\system32\Dmmdjp32.exe41⤵PID:4956
-
C:\Windows\SysWOW64\Dgbhgi32.exeC:\Windows\system32\Dgbhgi32.exe42⤵PID:5040
-
C:\Windows\SysWOW64\Eglkmh32.exeC:\Windows\system32\Eglkmh32.exe43⤵PID:2696
-
C:\Windows\SysWOW64\Jgpfmncg.exeC:\Windows\system32\Jgpfmncg.exe44⤵PID:4596
-
C:\Windows\SysWOW64\Jmjojh32.exeC:\Windows\system32\Jmjojh32.exe45⤵PID:780
-
C:\Windows\SysWOW64\Knhkkfod.exeC:\Windows\system32\Knhkkfod.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3404 -
C:\Windows\SysWOW64\Mnmmmbll.exeC:\Windows\system32\Mnmmmbll.exe47⤵
- Modifies registry class
PID:1264 -
C:\Windows\SysWOW64\Qecgcfmf.exeC:\Windows\system32\Qecgcfmf.exe48⤵PID:4700
-
C:\Windows\SysWOW64\Aemjjeek.exeC:\Windows\system32\Aemjjeek.exe49⤵
- Drops file in System32 directory
PID:3040 -
C:\Windows\SysWOW64\Bhblfpng.exeC:\Windows\system32\Bhblfpng.exe50⤵PID:4804
-
C:\Windows\SysWOW64\Cipebqij.exeC:\Windows\system32\Cipebqij.exe51⤵
- Drops file in System32 directory
PID:2508 -
C:\Windows\SysWOW64\Cefega32.exeC:\Windows\system32\Cefega32.exe52⤵PID:4324
-
C:\Windows\SysWOW64\Dcjfpfnh.exeC:\Windows\system32\Dcjfpfnh.exe53⤵
- Drops file in System32 directory
- Modifies registry class
PID:1816 -
C:\Windows\SysWOW64\Eokjke32.exeC:\Windows\system32\Eokjke32.exe54⤵PID:4248
-
C:\Windows\SysWOW64\Ehcndkaa.exeC:\Windows\system32\Ehcndkaa.exe55⤵PID:4764
-
C:\Windows\SysWOW64\Ehekjk32.exeC:\Windows\system32\Ehekjk32.exe56⤵PID:1360
-
C:\Windows\SysWOW64\Eckogc32.exeC:\Windows\system32\Eckogc32.exe57⤵PID:2816
-
C:\Windows\SysWOW64\Eqalfgll.exeC:\Windows\system32\Eqalfgll.exe58⤵PID:952
-
C:\Windows\SysWOW64\Efnennjc.exeC:\Windows\system32\Efnennjc.exe59⤵
- Modifies registry class
PID:2568 -
C:\Windows\SysWOW64\Fmapag32.exeC:\Windows\system32\Fmapag32.exe60⤵PID:1728
-
C:\Windows\SysWOW64\Gqohge32.exeC:\Windows\system32\Gqohge32.exe61⤵PID:3532
-
C:\Windows\SysWOW64\Iiffoc32.exeC:\Windows\system32\Iiffoc32.exe62⤵
- Drops file in System32 directory
PID:8 -
C:\Windows\SysWOW64\Mknjgajl.exeC:\Windows\system32\Mknjgajl.exe63⤵PID:3968
-
C:\Windows\SysWOW64\Mahbck32.exeC:\Windows\system32\Mahbck32.exe64⤵
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\Mkpglqgj.exeC:\Windows\system32\Mkpglqgj.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4212 -
C:\Windows\SysWOW64\Njjmil32.exeC:\Windows\system32\Njjmil32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1416 -
C:\Windows\SysWOW64\Nnolojhk.exeC:\Windows\system32\Nnolojhk.exe67⤵PID:3424
-
C:\Windows\SysWOW64\Ocldhqgb.exeC:\Windows\system32\Ocldhqgb.exe68⤵PID:5084
-
C:\Windows\SysWOW64\Ocqncp32.exeC:\Windows\system32\Ocqncp32.exe69⤵PID:3656
-
C:\Windows\SysWOW64\Okloomoj.exeC:\Windows\system32\Okloomoj.exe70⤵PID:2780
-
C:\Windows\SysWOW64\Pbmnlf32.exeC:\Windows\system32\Pbmnlf32.exe71⤵PID:2464
-
C:\Windows\SysWOW64\Qjmllgjd.exeC:\Windows\system32\Qjmllgjd.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3064 -
C:\Windows\SysWOW64\Abngccbl.exeC:\Windows\system32\Abngccbl.exe73⤵PID:2512
-
C:\Windows\SysWOW64\Blkdgheg.exeC:\Windows\system32\Blkdgheg.exe74⤵
- Modifies registry class
PID:1440 -
C:\Windows\SysWOW64\Ckghid32.exeC:\Windows\system32\Ckghid32.exe75⤵PID:640
-
C:\Windows\SysWOW64\Caapfnkd.exeC:\Windows\system32\Caapfnkd.exe76⤵PID:3240
-
C:\Windows\SysWOW64\Gfbpfedp.exeC:\Windows\system32\Gfbpfedp.exe77⤵PID:1328
-
C:\Windows\SysWOW64\Homadjin.exeC:\Windows\system32\Homadjin.exe78⤵PID:628
-
C:\Windows\SysWOW64\Hmhhnmao.exeC:\Windows\system32\Hmhhnmao.exe79⤵PID:3048
-
C:\Windows\SysWOW64\Imdgjlgb.exeC:\Windows\system32\Imdgjlgb.exe80⤵PID:1616
-
C:\Windows\SysWOW64\Jlnnfghd.exeC:\Windows\system32\Jlnnfghd.exe81⤵PID:2288
-
C:\Windows\SysWOW64\Lfckjnjh.exeC:\Windows\system32\Lfckjnjh.exe82⤵PID:2864
-
C:\Windows\SysWOW64\Lekeajmm.exeC:\Windows\system32\Lekeajmm.exe83⤵
- Drops file in System32 directory
PID:4152 -
C:\Windows\SysWOW64\Mccofn32.exeC:\Windows\system32\Mccofn32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3780 -
C:\Windows\SysWOW64\Meknhh32.exeC:\Windows\system32\Meknhh32.exe85⤵PID:3252
-
C:\Windows\SysWOW64\Bfcompnj.exeC:\Windows\system32\Bfcompnj.exe86⤵PID:1228
-
C:\Windows\SysWOW64\Cmgjpi32.exeC:\Windows\system32\Cmgjpi32.exe87⤵PID:4260
-
C:\Windows\SysWOW64\Jpkpbpko.exeC:\Windows\system32\Jpkpbpko.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2076 -
C:\Windows\SysWOW64\Kicdke32.exeC:\Windows\system32\Kicdke32.exe89⤵PID:2420
-
C:\Windows\SysWOW64\Keonke32.exeC:\Windows\system32\Keonke32.exe90⤵
- Modifies registry class
PID:5072 -
C:\Windows\SysWOW64\Lbjeei32.exeC:\Windows\system32\Lbjeei32.exe91⤵PID:468
-
C:\Windows\SysWOW64\Loeoei32.exeC:\Windows\system32\Loeoei32.exe92⤵PID:2216
-
C:\Windows\SysWOW64\Mhncnodp.exeC:\Windows\system32\Mhncnodp.exe93⤵PID:2800
-
C:\Windows\SysWOW64\Mfoclflo.exeC:\Windows\system32\Mfoclflo.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3312 -
C:\Windows\SysWOW64\Mlkldmjf.exeC:\Windows\system32\Mlkldmjf.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1784 -
C:\Windows\SysWOW64\Oiihkncb.exeC:\Windows\system32\Oiihkncb.exe96⤵PID:3676
-
C:\Windows\SysWOW64\Pomgcc32.exeC:\Windows\system32\Pomgcc32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3840 -
C:\Windows\SysWOW64\Qhlamhkj.exeC:\Windows\system32\Qhlamhkj.exe98⤵
- Drops file in System32 directory
PID:4360 -
C:\Windows\SysWOW64\Acilkp32.exeC:\Windows\system32\Acilkp32.exe99⤵PID:512
-
C:\Windows\SysWOW64\Bjgncihp.exeC:\Windows\system32\Bjgncihp.exe100⤵PID:1048
-
C:\Windows\SysWOW64\Bqafpc32.exeC:\Windows\system32\Bqafpc32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1944 -
C:\Windows\SysWOW64\Bgknlmgi.exeC:\Windows\system32\Bgknlmgi.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:380 -
C:\Windows\SysWOW64\Bimkde32.exeC:\Windows\system32\Bimkde32.exe103⤵PID:2008
-
C:\Windows\SysWOW64\Bfqkmj32.exeC:\Windows\system32\Bfqkmj32.exe104⤵PID:2520
-
C:\Windows\SysWOW64\Bgpggm32.exeC:\Windows\system32\Bgpggm32.exe105⤵PID:4412
-
C:\Windows\SysWOW64\Cfjnch32.exeC:\Windows\system32\Cfjnch32.exe106⤵PID:1628
-
C:\Windows\SysWOW64\Cfaddg32.exeC:\Windows\system32\Cfaddg32.exe107⤵PID:4956
-
C:\Windows\SysWOW64\Cpihmmdo.exeC:\Windows\system32\Cpihmmdo.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1704 -
C:\Windows\SysWOW64\Dpqonl32.exeC:\Windows\system32\Dpqonl32.exe109⤵PID:2696
-
C:\Windows\SysWOW64\Fhmiqfma.exeC:\Windows\system32\Fhmiqfma.exe110⤵PID:4208
-
C:\Windows\SysWOW64\Fkmbbajb.exeC:\Windows\system32\Fkmbbajb.exe111⤵PID:544
-
C:\Windows\SysWOW64\Gkbkna32.exeC:\Windows\system32\Gkbkna32.exe112⤵
- Modifies registry class
PID:4600 -
C:\Windows\SysWOW64\Gdoiaf32.exeC:\Windows\system32\Gdoiaf32.exe113⤵PID:2252
-
C:\Windows\SysWOW64\Haoighmd.exeC:\Windows\system32\Haoighmd.exe114⤵PID:3552
-
C:\Windows\SysWOW64\Ijlkqj32.exeC:\Windows\system32\Ijlkqj32.exe115⤵PID:2064
-
C:\Windows\SysWOW64\Igedenca.exeC:\Windows\system32\Igedenca.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:388 -
C:\Windows\SysWOW64\Idieob32.exeC:\Windows\system32\Idieob32.exe117⤵PID:2684
-
C:\Windows\SysWOW64\Jqpfccgo.exeC:\Windows\system32\Jqpfccgo.exe118⤵PID:2828
-
C:\Windows\SysWOW64\Jdnnjane.exeC:\Windows\system32\Jdnnjane.exe119⤵PID:3556
-
C:\Windows\SysWOW64\Knabne32.exeC:\Windows\system32\Knabne32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4300 -
C:\Windows\SysWOW64\Kiggln32.exeC:\Windows\system32\Kiggln32.exe121⤵
- Drops file in System32 directory
PID:2568 -
C:\Windows\SysWOW64\Lebalokn.exeC:\Windows\system32\Lebalokn.exe122⤵PID:4480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-