Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:33
Behavioral task
behavioral1
Sample
NEAS.d6753d432e8bbf052eea8a38f2ed7080.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.d6753d432e8bbf052eea8a38f2ed7080.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.d6753d432e8bbf052eea8a38f2ed7080.exe
-
Size
3.9MB
-
MD5
d6753d432e8bbf052eea8a38f2ed7080
-
SHA1
e8aa766f71bc67d8d2705bb4dd3b56d78fe60846
-
SHA256
1a315950e8fd47b98048ad681b08fab518752153845932fcd7f37aef514f3cb3
-
SHA512
829f000c3b5b57ec4684aaa45da62a0a5bed822b2696f40f03db20753a96a973337b4341ee0e51a3105ae9c9ecf8904f4ee8d0e3121e462aa34dbcc3440e8a24
-
SSDEEP
98304:fpC8Qlt0GnJMOWPClFdx6e0EALKWVTffZiPAcRq6jHjn6AzABM:fpC8MtFWPClFt
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ooqqdi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ancjef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nkjqme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Onlipd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kkqepi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppdbfpaa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Niifnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gkdhjknm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oampjeml.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alnmjjdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bedpjdoc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpnfjjla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Micoed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bhoqeibl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Migcpneb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkiapn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gablgk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppbepp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lmnjan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogpepl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Poomegpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eqncnj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfodbqfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pflibgil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fiaogfai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lbngllob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cpmapodj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Chddpn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Olijhmgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ffaong32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iklgkmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lgjglg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Phiekaql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ppdjpcng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bkafmd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efhlhh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffaong32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdlhoefk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Moljgeco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bbljoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dcjfpfnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Igmagnkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pjehmfch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfnqklgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pakllc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eqncnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Momqblgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mfiedfmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jopaejlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bfngmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mfjcnold.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aojlaeei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eahjqicj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ooqqdi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgfqgkib.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpbdopck.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmcain32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Jopaejlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Obeikc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqhknd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajhniccb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Epokedmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Emkndc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bocjdiol.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x000500000001e9bf-6.dat family_berbew behavioral2/files/0x000500000001e9bf-8.dat family_berbew behavioral2/files/0x0007000000022e3d-14.dat family_berbew behavioral2/files/0x0007000000022e3d-16.dat family_berbew behavioral2/files/0x0006000000022e42-24.dat family_berbew behavioral2/files/0x0006000000022e42-22.dat family_berbew behavioral2/files/0x0006000000022e44-32.dat family_berbew behavioral2/files/0x0006000000022e44-30.dat family_berbew behavioral2/files/0x0006000000022e4d-40.dat family_berbew behavioral2/files/0x0006000000022e4d-38.dat family_berbew behavioral2/files/0x0006000000022e4f-48.dat family_berbew behavioral2/files/0x0006000000022e4f-46.dat family_berbew behavioral2/files/0x0006000000022e51-56.dat family_berbew behavioral2/files/0x0006000000022e51-54.dat family_berbew behavioral2/files/0x0006000000022e54-64.dat family_berbew behavioral2/files/0x0006000000022e54-62.dat family_berbew behavioral2/files/0x0007000000022e5a-72.dat family_berbew behavioral2/files/0x0007000000022e5a-70.dat family_berbew behavioral2/files/0x0007000000022e5b-79.dat family_berbew behavioral2/files/0x0007000000022e5b-78.dat family_berbew behavioral2/files/0x0006000000022e61-94.dat family_berbew behavioral2/files/0x0006000000022e63-102.dat family_berbew behavioral2/files/0x0006000000022e63-103.dat family_berbew behavioral2/files/0x0006000000022e61-96.dat family_berbew behavioral2/files/0x0006000000022e5d-88.dat family_berbew behavioral2/files/0x0006000000022e5d-86.dat family_berbew behavioral2/files/0x0006000000022e65-112.dat family_berbew behavioral2/files/0x0006000000022e65-110.dat family_berbew behavioral2/files/0x0006000000022e6c-118.dat family_berbew behavioral2/files/0x0006000000022e6c-120.dat family_berbew behavioral2/files/0x0006000000022e70-128.dat family_berbew behavioral2/files/0x0006000000022e70-126.dat family_berbew behavioral2/files/0x000e000000022d5f-134.dat family_berbew behavioral2/files/0x000e000000022d5f-136.dat family_berbew behavioral2/files/0x0007000000022e69-137.dat family_berbew behavioral2/files/0x0007000000022e69-144.dat family_berbew behavioral2/files/0x0007000000022e69-142.dat family_berbew behavioral2/files/0x0008000000022e6b-150.dat family_berbew behavioral2/files/0x0008000000022e6b-151.dat family_berbew behavioral2/files/0x0008000000022e71-160.dat family_berbew behavioral2/files/0x0008000000022e71-158.dat family_berbew behavioral2/files/0x0006000000022e74-168.dat family_berbew behavioral2/files/0x0006000000022e74-166.dat family_berbew behavioral2/files/0x0006000000022e76-174.dat family_berbew behavioral2/files/0x0006000000022e7a-184.dat family_berbew behavioral2/files/0x0006000000022e7c-185.dat family_berbew behavioral2/files/0x0006000000022e7a-182.dat family_berbew behavioral2/files/0x0006000000022e7c-190.dat family_berbew behavioral2/files/0x0006000000022e7c-192.dat family_berbew behavioral2/files/0x0006000000022e7e-198.dat family_berbew behavioral2/files/0x0006000000022e80-206.dat family_berbew behavioral2/files/0x0006000000022e82-209.dat family_berbew behavioral2/files/0x0006000000022e82-216.dat family_berbew behavioral2/files/0x0006000000022e82-214.dat family_berbew behavioral2/files/0x0006000000022e80-208.dat family_berbew behavioral2/files/0x0006000000022e84-224.dat family_berbew behavioral2/files/0x0006000000022e84-222.dat family_berbew behavioral2/files/0x0006000000022e7e-199.dat family_berbew behavioral2/files/0x0006000000022e86-230.dat family_berbew behavioral2/files/0x0006000000022e86-232.dat family_berbew behavioral2/files/0x0006000000022e88-238.dat family_berbew behavioral2/files/0x0006000000022e88-240.dat family_berbew behavioral2/files/0x0006000000022e8a-248.dat family_berbew behavioral2/files/0x0006000000022e8a-246.dat family_berbew -
XMRig Miner payload 64 IoCs
resource yara_rule behavioral2/files/0x000500000001e9bf-6.dat xmrig behavioral2/files/0x000500000001e9bf-8.dat xmrig behavioral2/files/0x0007000000022e3d-14.dat xmrig behavioral2/files/0x0007000000022e3d-16.dat xmrig behavioral2/files/0x0006000000022e42-24.dat xmrig behavioral2/files/0x0006000000022e42-22.dat xmrig behavioral2/files/0x0006000000022e44-32.dat xmrig behavioral2/files/0x0006000000022e44-30.dat xmrig behavioral2/files/0x0006000000022e4d-40.dat xmrig behavioral2/files/0x0006000000022e4d-38.dat xmrig behavioral2/files/0x0006000000022e4f-48.dat xmrig behavioral2/files/0x0006000000022e4f-46.dat xmrig behavioral2/files/0x0006000000022e51-56.dat xmrig behavioral2/files/0x0006000000022e51-54.dat xmrig behavioral2/files/0x0006000000022e54-64.dat xmrig behavioral2/files/0x0006000000022e54-62.dat xmrig behavioral2/files/0x0007000000022e5a-72.dat xmrig behavioral2/files/0x0007000000022e5a-70.dat xmrig behavioral2/files/0x0007000000022e5b-79.dat xmrig behavioral2/files/0x0007000000022e5b-78.dat xmrig behavioral2/files/0x0006000000022e61-94.dat xmrig behavioral2/files/0x0006000000022e63-102.dat xmrig behavioral2/files/0x0006000000022e63-103.dat xmrig behavioral2/files/0x0006000000022e61-96.dat xmrig behavioral2/files/0x0006000000022e5d-88.dat xmrig behavioral2/files/0x0006000000022e5d-86.dat xmrig behavioral2/files/0x0006000000022e65-112.dat xmrig behavioral2/files/0x0006000000022e65-110.dat xmrig behavioral2/files/0x0006000000022e6c-118.dat xmrig behavioral2/files/0x0006000000022e6c-120.dat xmrig behavioral2/files/0x0006000000022e70-128.dat xmrig behavioral2/files/0x0006000000022e70-126.dat xmrig behavioral2/files/0x000e000000022d5f-134.dat xmrig behavioral2/files/0x000e000000022d5f-136.dat xmrig behavioral2/files/0x0007000000022e69-137.dat xmrig behavioral2/files/0x0007000000022e69-144.dat xmrig behavioral2/files/0x0007000000022e69-142.dat xmrig behavioral2/files/0x0008000000022e6b-150.dat xmrig behavioral2/files/0x0008000000022e6b-151.dat xmrig behavioral2/files/0x0008000000022e71-160.dat xmrig behavioral2/files/0x0008000000022e71-158.dat xmrig behavioral2/files/0x0006000000022e74-168.dat xmrig behavioral2/files/0x0006000000022e74-166.dat xmrig behavioral2/files/0x0006000000022e76-174.dat xmrig behavioral2/files/0x0006000000022e7a-184.dat xmrig behavioral2/files/0x0006000000022e7c-185.dat xmrig behavioral2/files/0x0006000000022e7a-182.dat xmrig behavioral2/files/0x0006000000022e7c-190.dat xmrig behavioral2/files/0x0006000000022e7c-192.dat xmrig behavioral2/files/0x0006000000022e7e-198.dat xmrig behavioral2/files/0x0006000000022e80-206.dat xmrig behavioral2/files/0x0006000000022e82-209.dat xmrig behavioral2/files/0x0006000000022e82-216.dat xmrig behavioral2/files/0x0006000000022e82-214.dat xmrig behavioral2/files/0x0006000000022e80-208.dat xmrig behavioral2/files/0x0006000000022e84-224.dat xmrig behavioral2/files/0x0006000000022e84-222.dat xmrig behavioral2/files/0x0006000000022e7e-199.dat xmrig behavioral2/files/0x0006000000022e86-230.dat xmrig behavioral2/files/0x0006000000022e86-232.dat xmrig behavioral2/files/0x0006000000022e88-238.dat xmrig behavioral2/files/0x0006000000022e88-240.dat xmrig behavioral2/files/0x0006000000022e8a-248.dat xmrig behavioral2/files/0x0006000000022e8a-246.dat xmrig -
Executes dropped EXE 64 IoCs
pid Process 1656 Eonehbjg.exe 3936 Ekgbccni.exe 1476 Fojedapj.exe 920 Fhdfbfdh.exe 2860 Fkeodaai.exe 3892 Gkglja32.exe 1472 Gadqlkep.exe 1484 Hgjljpkm.exe 3372 Ifbbig32.exe 3048 Ibkpcg32.exe 668 Ifihif32.exe 1212 Igmagnkg.exe 5108 Jkkjmlan.exe 2288 Jkmgblok.exe 4908 Keonap32.exe 2284 Kbekqdjh.exe 4728 Kiaqcnpb.exe 1548 Llgcph32.exe 5052 Lfodbqfa.exe 4696 Mfcmmp32.exe 4456 Mfjcnold.exe 3112 Ngomin32.exe 4372 Ogpepl32.exe 3720 Ocffempp.exe 4972 Pjehmfch.exe 2604 Pflibgil.exe 4736 Pofjpl32.exe 4872 Qqffjo32.exe 3520 Aopmfk32.exe 4416 Ajhniccb.exe 836 Cflkpblf.exe 2528 Cimcan32.exe 4276 Dcjnoece.exe 4488 Diicml32.exe 4708 Edemkd32.exe 3024 Epokedmj.exe 4944 Fkihnmhj.exe 2912 Fmlneg32.exe 452 Gkdhjknm.exe 1332 Gpcmga32.exe 5076 Gnjjfegi.exe 464 Hjchaf32.exe 4376 Haafcb32.exe 1640 Hacbhb32.exe 3552 Ihphkl32.exe 4100 Ikqqlgem.exe 1312 Ijfnmc32.exe 1936 Jdnoplhh.exe 4160 Jgadgf32.exe 348 Jkomneim.exe 536 Jjdjoane.exe 3368 Kjhcjq32.exe 1404 Kkhpdcab.exe 3188 Kilpmh32.exe 2432 Kgamnded.exe 3708 Ljbfpo32.exe 4080 Lbkkgl32.exe 2504 Lbngllob.exe 1520 Lbpdblmo.exe 1516 Mbbagk32.exe 900 Mbenmk32.exe 3348 Mnlnbl32.exe 5064 Mhdckaeo.exe 1164 Micoed32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mhilfa32.exe Micoed32.exe File created C:\Windows\SysWOW64\Dfnbgc32.exe Ddnfmqng.exe File opened for modification C:\Windows\SysWOW64\Halhfe32.exe Hlmchoan.exe File created C:\Windows\SysWOW64\Ldkfno32.exe Lggeej32.exe File created C:\Windows\SysWOW64\Ngekmf32.exe Nkojheoe.exe File created C:\Windows\SysWOW64\Nhkikq32.exe Mhilfa32.exe File created C:\Windows\SysWOW64\Fbajbi32.exe Efjimhnh.exe File created C:\Windows\SysWOW64\Koekpi32.exe Kgkfil32.exe File created C:\Windows\SysWOW64\Baampdgc.dll Fbdehlip.exe File created C:\Windows\SysWOW64\Fiaogfai.exe Eahjqicj.exe File created C:\Windows\SysWOW64\Momqblgj.exe Mbiphhhq.exe File created C:\Windows\SysWOW64\Fojedapj.exe Ekgbccni.exe File created C:\Windows\SysWOW64\Plkcijka.dll Pakllc32.exe File created C:\Windows\SysWOW64\Imneeb32.dll Lhopgg32.exe File created C:\Windows\SysWOW64\Bbbkbbkg.exe Bbpolb32.exe File opened for modification C:\Windows\SysWOW64\Gadimkpb.exe Gablgk32.exe File opened for modification C:\Windows\SysWOW64\Ppbepp32.exe Pnbifmla.exe File opened for modification C:\Windows\SysWOW64\Eecphp32.exe Dfnbgc32.exe File created C:\Windows\SysWOW64\Npognfpo.exe Mapgfk32.exe File created C:\Windows\SysWOW64\Aglnnkid.exe Ancjef32.exe File opened for modification C:\Windows\SysWOW64\Emkndc32.exe Dpgnjo32.exe File created C:\Windows\SysWOW64\Gepgfb32.dll Feoodn32.exe File created C:\Windows\SysWOW64\Kmbfiokn.exe Kakednfj.exe File created C:\Windows\SysWOW64\Jgbccm32.exe Ikifhm32.exe File created C:\Windows\SysWOW64\Piphgq32.exe Ohpkmn32.exe File created C:\Windows\SysWOW64\Oagoeala.dll Kdgcne32.exe File created C:\Windows\SysWOW64\Nghjle32.dll Imeeohoi.exe File created C:\Windows\SysWOW64\Gbmhkn32.dll Bbljoh32.exe File created C:\Windows\SysWOW64\Dfgcakon.exe Coknoaic.exe File created C:\Windows\SysWOW64\Nieggill.exe Ngekmf32.exe File created C:\Windows\SysWOW64\Denihh32.dll Jjhonfjg.exe File created C:\Windows\SysWOW64\Halhfe32.exe Hlmchoan.exe File created C:\Windows\SysWOW64\Ohaokbfd.exe Oaejhh32.exe File created C:\Windows\SysWOW64\Fehplggn.exe Fiaogfai.exe File opened for modification C:\Windows\SysWOW64\Hligqnjp.exe Glinjqhb.exe File opened for modification C:\Windows\SysWOW64\Momqblgj.exe Mbiphhhq.exe File created C:\Windows\SysWOW64\Kojdkhdd.exe Koekpi32.exe File opened for modification C:\Windows\SysWOW64\Bcddlhgo.exe Bbdhbepl.exe File created C:\Windows\SysWOW64\Flkdfh32.exe Feoodn32.exe File created C:\Windows\SysWOW64\Dkclkqdm.dll Migcpneb.exe File created C:\Windows\SysWOW64\Dkcfca32.dll Moljgeco.exe File created C:\Windows\SysWOW64\Ahjgjj32.exe Alcfei32.exe File opened for modification C:\Windows\SysWOW64\Eicedn32.exe Eecphp32.exe File opened for modification C:\Windows\SysWOW64\Ngaabfio.exe Nkjqme32.exe File created C:\Windows\SysWOW64\Jgeihjcb.dll Oflfoepg.exe File created C:\Windows\SysWOW64\Mlcieblm.dll Lfcmhc32.exe File created C:\Windows\SysWOW64\Cdibqp32.dll Npognfpo.exe File created C:\Windows\SysWOW64\Emoaopnf.exe Dmjgdq32.exe File created C:\Windows\SysWOW64\Aeofoe32.exe Aaoadg32.exe File opened for modification C:\Windows\SysWOW64\Ijcecgnl.exe Iidiidgj.exe File opened for modification C:\Windows\SysWOW64\Dcjfpfnh.exe Cakjfcfe.exe File opened for modification C:\Windows\SysWOW64\Akcjkfij.exe Alnmjjdb.exe File created C:\Windows\SysWOW64\Dpbdopck.exe Dckdjomg.exe File opened for modification C:\Windows\SysWOW64\Dmfeidbe.exe Dpbdopck.exe File opened for modification C:\Windows\SysWOW64\Gokbgpeg.exe Fkmjaa32.exe File created C:\Windows\SysWOW64\Hkkofdlq.dll Aglnnkid.exe File created C:\Windows\SysWOW64\Lokceimi.dll Bnoiqd32.exe File opened for modification C:\Windows\SysWOW64\Ahjgjj32.exe Alcfei32.exe File opened for modification C:\Windows\SysWOW64\Efjimhnh.exe Efhlhh32.exe File opened for modification C:\Windows\SysWOW64\Ppdbfpaa.exe Ppbepp32.exe File created C:\Windows\SysWOW64\Afddge32.exe Iklgkmop.exe File opened for modification C:\Windows\SysWOW64\Kjhcjq32.exe Jjdjoane.exe File created C:\Windows\SysWOW64\Egjoqncg.dll Alnmjjdb.exe File opened for modification C:\Windows\SysWOW64\Ehbnigjj.exe Cpmapodj.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Qpmmfbfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pnbifmla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lgpjggdi.dll" Fkeodaai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Igmagnkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ahqdnk32.dll" Diicml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dmcain32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pljpbhin.dll" Oiehhjjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppqndn32.dll" Obeikc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajcegi32.dll" Ffjkdc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Diicml32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpaoobkd.dll" Cfnqklgh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dmcain32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Halhfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Chddpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkhnpc32.dll" Neccpd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Akcjkfij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Bkafmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhpipb32.dll" Iklgkmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fcddkggf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nieggill.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ohaokbfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cjaiac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aghdco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dlgddkpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Afddge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jjdjoane.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hhjqec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgembdei.dll" Fbiooolb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Edemkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Olgncmim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Dpnfjjla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifcfc32.dll" Bbdhbepl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Igmagnkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Emkndc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kojdkhdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdlnbbpk.dll" Gjapfjnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omnlck32.dll" Hadkib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nliaao32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Piphgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdjpll32.dll" Fdqfll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iandjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cpmapodj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eflocepa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icelfhmg.dll" Jgbccm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mnaghb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omhglnhm.dll" Oijqbh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kbekqdjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epmfkk32.dll" Bhoqeibl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Emkndc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Epjfehbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidjh32.dll" Gflapl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mgfqgkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mhdckaeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfjjlc32.dll" Eicedn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hligqnjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fceihh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aonhblad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oiehhjjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbkpkdlk.dll" Ecpomiok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipilln32.dll" Fjanjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Oeqagi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfmilknm.dll" Dcjfpfnh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ffclcgfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bfkkhdlk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3524 wrote to memory of 1656 3524 NEAS.d6753d432e8bbf052eea8a38f2ed7080.exe 87 PID 3524 wrote to memory of 1656 3524 NEAS.d6753d432e8bbf052eea8a38f2ed7080.exe 87 PID 3524 wrote to memory of 1656 3524 NEAS.d6753d432e8bbf052eea8a38f2ed7080.exe 87 PID 1656 wrote to memory of 3936 1656 Eonehbjg.exe 89 PID 1656 wrote to memory of 3936 1656 Eonehbjg.exe 89 PID 1656 wrote to memory of 3936 1656 Eonehbjg.exe 89 PID 3936 wrote to memory of 1476 3936 Ekgbccni.exe 90 PID 3936 wrote to memory of 1476 3936 Ekgbccni.exe 90 PID 3936 wrote to memory of 1476 3936 Ekgbccni.exe 90 PID 1476 wrote to memory of 920 1476 Fojedapj.exe 91 PID 1476 wrote to memory of 920 1476 Fojedapj.exe 91 PID 1476 wrote to memory of 920 1476 Fojedapj.exe 91 PID 920 wrote to memory of 2860 920 Fhdfbfdh.exe 92 PID 920 wrote to memory of 2860 920 Fhdfbfdh.exe 92 PID 920 wrote to memory of 2860 920 Fhdfbfdh.exe 92 PID 2860 wrote to memory of 3892 2860 Fkeodaai.exe 93 PID 2860 wrote to memory of 3892 2860 Fkeodaai.exe 93 PID 2860 wrote to memory of 3892 2860 Fkeodaai.exe 93 PID 3892 wrote to memory of 1472 3892 Gkglja32.exe 94 PID 3892 wrote to memory of 1472 3892 Gkglja32.exe 94 PID 3892 wrote to memory of 1472 3892 Gkglja32.exe 94 PID 1472 wrote to memory of 1484 1472 Gadqlkep.exe 95 PID 1472 wrote to memory of 1484 1472 Gadqlkep.exe 95 PID 1472 wrote to memory of 1484 1472 Gadqlkep.exe 95 PID 1484 wrote to memory of 3372 1484 Hgjljpkm.exe 96 PID 1484 wrote to memory of 3372 1484 Hgjljpkm.exe 96 PID 1484 wrote to memory of 3372 1484 Hgjljpkm.exe 96 PID 3372 wrote to memory of 3048 3372 Ifbbig32.exe 97 PID 3372 wrote to memory of 3048 3372 Ifbbig32.exe 97 PID 3372 wrote to memory of 3048 3372 Ifbbig32.exe 97 PID 3048 wrote to memory of 668 3048 Ibkpcg32.exe 99 PID 3048 wrote to memory of 668 3048 Ibkpcg32.exe 99 PID 3048 wrote to memory of 668 3048 Ibkpcg32.exe 99 PID 668 wrote to memory of 1212 668 Ifihif32.exe 100 PID 668 wrote to memory of 1212 668 Ifihif32.exe 100 PID 668 wrote to memory of 1212 668 Ifihif32.exe 100 PID 1212 wrote to memory of 5108 1212 Igmagnkg.exe 101 PID 1212 wrote to memory of 5108 1212 Igmagnkg.exe 101 PID 1212 wrote to memory of 5108 1212 Igmagnkg.exe 101 PID 5108 wrote to memory of 2288 5108 Jkkjmlan.exe 102 PID 5108 wrote to memory of 2288 5108 Jkkjmlan.exe 102 PID 5108 wrote to memory of 2288 5108 Jkkjmlan.exe 102 PID 2288 wrote to memory of 4908 2288 Jkmgblok.exe 104 PID 2288 wrote to memory of 4908 2288 Jkmgblok.exe 104 PID 2288 wrote to memory of 4908 2288 Jkmgblok.exe 104 PID 4908 wrote to memory of 2284 4908 Keonap32.exe 105 PID 4908 wrote to memory of 2284 4908 Keonap32.exe 105 PID 4908 wrote to memory of 2284 4908 Keonap32.exe 105 PID 2284 wrote to memory of 4728 2284 Kbekqdjh.exe 106 PID 2284 wrote to memory of 4728 2284 Kbekqdjh.exe 106 PID 2284 wrote to memory of 4728 2284 Kbekqdjh.exe 106 PID 4728 wrote to memory of 1548 4728 Kiaqcnpb.exe 107 PID 4728 wrote to memory of 1548 4728 Kiaqcnpb.exe 107 PID 4728 wrote to memory of 1548 4728 Kiaqcnpb.exe 107 PID 1548 wrote to memory of 5052 1548 Llgcph32.exe 108 PID 1548 wrote to memory of 5052 1548 Llgcph32.exe 108 PID 1548 wrote to memory of 5052 1548 Llgcph32.exe 108 PID 5052 wrote to memory of 4696 5052 Lfodbqfa.exe 109 PID 5052 wrote to memory of 4696 5052 Lfodbqfa.exe 109 PID 5052 wrote to memory of 4696 5052 Lfodbqfa.exe 109 PID 4696 wrote to memory of 4456 4696 Mfcmmp32.exe 110 PID 4696 wrote to memory of 4456 4696 Mfcmmp32.exe 110 PID 4696 wrote to memory of 4456 4696 Mfcmmp32.exe 110 PID 4456 wrote to memory of 3112 4456 Mfjcnold.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d6753d432e8bbf052eea8a38f2ed7080.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d6753d432e8bbf052eea8a38f2ed7080.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\Eonehbjg.exeC:\Windows\system32\Eonehbjg.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\Ekgbccni.exeC:\Windows\system32\Ekgbccni.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\Fojedapj.exeC:\Windows\system32\Fojedapj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\Fhdfbfdh.exeC:\Windows\system32\Fhdfbfdh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\Fkeodaai.exeC:\Windows\system32\Fkeodaai.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\Gkglja32.exeC:\Windows\system32\Gkglja32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\Gadqlkep.exeC:\Windows\system32\Gadqlkep.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\Hgjljpkm.exeC:\Windows\system32\Hgjljpkm.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\Ifbbig32.exeC:\Windows\system32\Ifbbig32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\Ibkpcg32.exeC:\Windows\system32\Ibkpcg32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Ifihif32.exeC:\Windows\system32\Ifihif32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\Igmagnkg.exeC:\Windows\system32\Igmagnkg.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\Jkkjmlan.exeC:\Windows\system32\Jkkjmlan.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\Jkmgblok.exeC:\Windows\system32\Jkmgblok.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\Keonap32.exeC:\Windows\system32\Keonap32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\Kbekqdjh.exeC:\Windows\system32\Kbekqdjh.exe17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\Kiaqcnpb.exeC:\Windows\system32\Kiaqcnpb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\Llgcph32.exeC:\Windows\system32\Llgcph32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\Lfodbqfa.exeC:\Windows\system32\Lfodbqfa.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\Mfcmmp32.exeC:\Windows\system32\Mfcmmp32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\Mfjcnold.exeC:\Windows\system32\Mfjcnold.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\Ngomin32.exeC:\Windows\system32\Ngomin32.exe23⤵
- Executes dropped EXE
PID:3112 -
C:\Windows\SysWOW64\Npjnhc32.exeC:\Windows\system32\Npjnhc32.exe24⤵PID:1984
-
C:\Windows\SysWOW64\Ogpepl32.exeC:\Windows\system32\Ogpepl32.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4372 -
C:\Windows\SysWOW64\Ocffempp.exeC:\Windows\system32\Ocffempp.exe26⤵
- Executes dropped EXE
PID:3720 -
C:\Windows\SysWOW64\Pjehmfch.exeC:\Windows\system32\Pjehmfch.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\Pflibgil.exeC:\Windows\system32\Pflibgil.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Pofjpl32.exeC:\Windows\system32\Pofjpl32.exe1⤵
- Executes dropped EXE
PID:4736 -
C:\Windows\SysWOW64\Qqffjo32.exeC:\Windows\system32\Qqffjo32.exe2⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\Aopmfk32.exeC:\Windows\system32\Aopmfk32.exe3⤵
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\Ajhniccb.exeC:\Windows\system32\Ajhniccb.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4416 -
C:\Windows\SysWOW64\Cflkpblf.exeC:\Windows\system32\Cflkpblf.exe5⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\Cimcan32.exeC:\Windows\system32\Cimcan32.exe6⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\SysWOW64\Dcjnoece.exeC:\Windows\system32\Dcjnoece.exe7⤵
- Executes dropped EXE
PID:4276 -
C:\Windows\SysWOW64\Diicml32.exeC:\Windows\system32\Diicml32.exe8⤵
- Executes dropped EXE
- Modifies registry class
PID:4488 -
C:\Windows\SysWOW64\Edemkd32.exeC:\Windows\system32\Edemkd32.exe9⤵
- Executes dropped EXE
- Modifies registry class
PID:4708 -
C:\Windows\SysWOW64\Epokedmj.exeC:\Windows\system32\Epokedmj.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\Fkihnmhj.exeC:\Windows\system32\Fkihnmhj.exe11⤵
- Executes dropped EXE
PID:4944 -
C:\Windows\SysWOW64\Fmlneg32.exeC:\Windows\system32\Fmlneg32.exe12⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\Gkdhjknm.exeC:\Windows\system32\Gkdhjknm.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\Gpcmga32.exeC:\Windows\system32\Gpcmga32.exe14⤵
- Executes dropped EXE
PID:1332 -
C:\Windows\SysWOW64\Gnjjfegi.exeC:\Windows\system32\Gnjjfegi.exe15⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\SysWOW64\Hjchaf32.exeC:\Windows\system32\Hjchaf32.exe16⤵
- Executes dropped EXE
PID:464 -
C:\Windows\SysWOW64\Haafcb32.exeC:\Windows\system32\Haafcb32.exe17⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\Hacbhb32.exeC:\Windows\system32\Hacbhb32.exe18⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Ihphkl32.exeC:\Windows\system32\Ihphkl32.exe19⤵
- Executes dropped EXE
PID:3552 -
C:\Windows\SysWOW64\Ikqqlgem.exeC:\Windows\system32\Ikqqlgem.exe20⤵
- Executes dropped EXE
PID:4100 -
C:\Windows\SysWOW64\Ijfnmc32.exeC:\Windows\system32\Ijfnmc32.exe21⤵
- Executes dropped EXE
PID:1312 -
C:\Windows\SysWOW64\Jdnoplhh.exeC:\Windows\system32\Jdnoplhh.exe22⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\Jgadgf32.exeC:\Windows\system32\Jgadgf32.exe23⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\Jkomneim.exeC:\Windows\system32\Jkomneim.exe24⤵
- Executes dropped EXE
PID:348 -
C:\Windows\SysWOW64\Jjdjoane.exeC:\Windows\system32\Jjdjoane.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:536 -
C:\Windows\SysWOW64\Kjhcjq32.exeC:\Windows\system32\Kjhcjq32.exe26⤵
- Executes dropped EXE
PID:3368 -
C:\Windows\SysWOW64\Kkhpdcab.exeC:\Windows\system32\Kkhpdcab.exe27⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\SysWOW64\Kilpmh32.exeC:\Windows\system32\Kilpmh32.exe28⤵
- Executes dropped EXE
PID:3188 -
C:\Windows\SysWOW64\Kgamnded.exeC:\Windows\system32\Kgamnded.exe29⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\Ljbfpo32.exeC:\Windows\system32\Ljbfpo32.exe30⤵
- Executes dropped EXE
PID:3708 -
C:\Windows\SysWOW64\Lbkkgl32.exeC:\Windows\system32\Lbkkgl32.exe31⤵
- Executes dropped EXE
PID:4080 -
C:\Windows\SysWOW64\Lbngllob.exeC:\Windows\system32\Lbngllob.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\Lbpdblmo.exeC:\Windows\system32\Lbpdblmo.exe33⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\Mbbagk32.exeC:\Windows\system32\Mbbagk32.exe34⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\Mbenmk32.exeC:\Windows\system32\Mbenmk32.exe35⤵
- Executes dropped EXE
PID:900 -
C:\Windows\SysWOW64\Mnlnbl32.exeC:\Windows\system32\Mnlnbl32.exe36⤵
- Executes dropped EXE
PID:3348 -
C:\Windows\SysWOW64\Mhdckaeo.exeC:\Windows\system32\Mhdckaeo.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:5064 -
C:\Windows\SysWOW64\Micoed32.exeC:\Windows\system32\Micoed32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1164 -
C:\Windows\SysWOW64\Mhilfa32.exeC:\Windows\system32\Mhilfa32.exe39⤵
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\Nhkikq32.exeC:\Windows\system32\Nhkikq32.exe40⤵PID:916
-
C:\Windows\SysWOW64\Nliaao32.exeC:\Windows\system32\Nliaao32.exe41⤵
- Modifies registry class
PID:3836 -
C:\Windows\SysWOW64\Nhpbfpka.exeC:\Windows\system32\Nhpbfpka.exe42⤵PID:4192
-
C:\Windows\SysWOW64\Neccpd32.exeC:\Windows\system32\Neccpd32.exe43⤵
- Modifies registry class
PID:3456 -
C:\Windows\SysWOW64\Nefped32.exeC:\Windows\system32\Nefped32.exe44⤵PID:2828
-
C:\Windows\SysWOW64\Oampjeml.exeC:\Windows\system32\Oampjeml.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3356 -
C:\Windows\SysWOW64\Ooqqdi32.exeC:\Windows\system32\Ooqqdi32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1804 -
C:\Windows\SysWOW64\Okgaijaj.exeC:\Windows\system32\Okgaijaj.exe47⤵PID:4452
-
C:\Windows\SysWOW64\Olgncmim.exeC:\Windows\system32\Olgncmim.exe48⤵
- Modifies registry class
PID:3504 -
C:\Windows\SysWOW64\Olijhmgj.exeC:\Windows\system32\Olijhmgj.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2476 -
C:\Windows\SysWOW64\Ohpkmn32.exeC:\Windows\system32\Ohpkmn32.exe50⤵
- Drops file in System32 directory
PID:4876 -
C:\Windows\SysWOW64\Piphgq32.exeC:\Windows\system32\Piphgq32.exe51⤵
- Modifies registry class
PID:1768 -
C:\Windows\SysWOW64\Pakllc32.exeC:\Windows\system32\Pakllc32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4716 -
C:\Windows\SysWOW64\Poomegpf.exeC:\Windows\system32\Poomegpf.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3548 -
C:\Windows\SysWOW64\Pcmeke32.exeC:\Windows\system32\Pcmeke32.exe54⤵PID:4860
-
C:\Windows\SysWOW64\Aojlaeei.exeC:\Windows\system32\Aojlaeei.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:884 -
C:\Windows\SysWOW64\Alnmjjdb.exeC:\Windows\system32\Alnmjjdb.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4656 -
C:\Windows\SysWOW64\Akcjkfij.exeC:\Windows\system32\Akcjkfij.exe57⤵
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Alcfei32.exeC:\Windows\system32\Alcfei32.exe58⤵
- Drops file in System32 directory
PID:1080 -
C:\Windows\SysWOW64\Ahjgjj32.exeC:\Windows\system32\Ahjgjj32.exe59⤵PID:2144
-
C:\Windows\SysWOW64\Bkkple32.exeC:\Windows\system32\Bkkple32.exe60⤵PID:1068
-
C:\Windows\SysWOW64\Bhoqeibl.exeC:\Windows\system32\Bhoqeibl.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4068 -
C:\Windows\SysWOW64\Bkoigdom.exeC:\Windows\system32\Bkoigdom.exe62⤵PID:3316
-
C:\Windows\SysWOW64\Bkafmd32.exeC:\Windows\system32\Bkafmd32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2928 -
C:\Windows\SysWOW64\Ckfphc32.exeC:\Windows\system32\Ckfphc32.exe64⤵PID:1292
-
C:\Windows\SysWOW64\Cjgpfk32.exeC:\Windows\system32\Cjgpfk32.exe65⤵PID:2152
-
C:\Windows\SysWOW64\Cfnqklgh.exeC:\Windows\system32\Cfnqklgh.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3928 -
C:\Windows\SysWOW64\Cbeapmll.exeC:\Windows\system32\Cbeapmll.exe67⤵PID:3136
-
C:\Windows\SysWOW64\Cbgnemjj.exeC:\Windows\system32\Cbgnemjj.exe68⤵PID:5128
-
C:\Windows\SysWOW64\Coknoaic.exeC:\Windows\system32\Coknoaic.exe69⤵
- Drops file in System32 directory
PID:5172 -
C:\Windows\SysWOW64\Dfgcakon.exeC:\Windows\system32\Dfgcakon.exe70⤵PID:5216
-
C:\Windows\SysWOW64\Dckdjomg.exeC:\Windows\system32\Dckdjomg.exe71⤵
- Drops file in System32 directory
PID:5260 -
C:\Windows\SysWOW64\Dpbdopck.exeC:\Windows\system32\Dpbdopck.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5304 -
C:\Windows\SysWOW64\Dmfeidbe.exeC:\Windows\system32\Dmfeidbe.exe73⤵PID:5348
-
C:\Windows\SysWOW64\Dpgnjo32.exeC:\Windows\system32\Dpgnjo32.exe74⤵
- Drops file in System32 directory
PID:5392 -
C:\Windows\SysWOW64\Emkndc32.exeC:\Windows\system32\Emkndc32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5436 -
C:\Windows\SysWOW64\Eplgeokq.exeC:\Windows\system32\Eplgeokq.exe76⤵PID:5480
-
C:\Windows\SysWOW64\Emphocjj.exeC:\Windows\system32\Emphocjj.exe77⤵PID:5520
-
C:\Windows\SysWOW64\Efhlhh32.exeC:\Windows\system32\Efhlhh32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5568 -
C:\Windows\SysWOW64\Efjimhnh.exeC:\Windows\system32\Efjimhnh.exe79⤵
- Drops file in System32 directory
PID:5612 -
C:\Windows\SysWOW64\Fbajbi32.exeC:\Windows\system32\Fbajbi32.exe80⤵PID:5656
-
C:\Windows\SysWOW64\Fdqfll32.exeC:\Windows\system32\Fdqfll32.exe81⤵
- Modifies registry class
PID:5700 -
C:\Windows\SysWOW64\Ffaong32.exeC:\Windows\system32\Ffaong32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5744 -
C:\Windows\SysWOW64\Ffclcgfn.exeC:\Windows\system32\Ffclcgfn.exe83⤵
- Modifies registry class
PID:5788 -
C:\Windows\SysWOW64\Fbjmhh32.exeC:\Windows\system32\Fbjmhh32.exe84⤵PID:5832
-
C:\Windows\SysWOW64\Gpnmbl32.exeC:\Windows\system32\Gpnmbl32.exe85⤵PID:5952
-
C:\Windows\SysWOW64\Chqogq32.exeC:\Windows\system32\Chqogq32.exe86⤵PID:6012
-
C:\Windows\SysWOW64\Dbkqfe32.exeC:\Windows\system32\Dbkqfe32.exe87⤵PID:6092
-
C:\Windows\SysWOW64\Dkceokii.exeC:\Windows\system32\Dkceokii.exe88⤵PID:5140
-
C:\Windows\SysWOW64\Dmcain32.exeC:\Windows\system32\Dmcain32.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5228 -
C:\Windows\SysWOW64\Ddnfmqng.exeC:\Windows\system32\Ddnfmqng.exe90⤵
- Drops file in System32 directory
PID:5292 -
C:\Windows\SysWOW64\Dfnbgc32.exeC:\Windows\system32\Dfnbgc32.exe91⤵
- Drops file in System32 directory
PID:5372 -
C:\Windows\SysWOW64\Eecphp32.exeC:\Windows\system32\Eecphp32.exe92⤵
- Drops file in System32 directory
PID:5448 -
C:\Windows\SysWOW64\Eicedn32.exeC:\Windows\system32\Eicedn32.exe93⤵
- Modifies registry class
PID:5504 -
C:\Windows\SysWOW64\Feoodn32.exeC:\Windows\system32\Feoodn32.exe94⤵
- Drops file in System32 directory
PID:5600 -
C:\Windows\SysWOW64\Flkdfh32.exeC:\Windows\system32\Flkdfh32.exe95⤵PID:5680
-
C:\Windows\SysWOW64\Fiodpl32.exeC:\Windows\system32\Fiodpl32.exe96⤵PID:5756
-
C:\Windows\SysWOW64\Fefedmil.exeC:\Windows\system32\Fefedmil.exe97⤵PID:5820
-
C:\Windows\SysWOW64\Gehbjm32.exeC:\Windows\system32\Gehbjm32.exe98⤵PID:5872
-
C:\Windows\SysWOW64\Gejopl32.exeC:\Windows\system32\Gejopl32.exe99⤵PID:5892
-
C:\Windows\SysWOW64\Gihgfk32.exeC:\Windows\system32\Gihgfk32.exe100⤵PID:864
-
C:\Windows\SysWOW64\Cpmapodj.exeC:\Windows\system32\Cpmapodj.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2728 -
C:\Windows\SysWOW64\Ehbnigjj.exeC:\Windows\system32\Ehbnigjj.exe102⤵PID:5296
-
C:\Windows\SysWOW64\Eqncnj32.exeC:\Windows\system32\Eqncnj32.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5380 -
C:\Windows\SysWOW64\Fooclapd.exeC:\Windows\system32\Fooclapd.exe104⤵PID:5508
-
C:\Windows\SysWOW64\Fgjhpcmo.exeC:\Windows\system32\Fgjhpcmo.exe105⤵PID:4720
-
C:\Windows\SysWOW64\Fqbliicp.exeC:\Windows\system32\Fqbliicp.exe106⤵PID:5644
-
C:\Windows\SysWOW64\Fqeioiam.exeC:\Windows\system32\Fqeioiam.exe107⤵PID:5800
-
C:\Windows\SysWOW64\Fbdehlip.exeC:\Windows\system32\Fbdehlip.exe108⤵
- Drops file in System32 directory
PID:5860 -
C:\Windows\SysWOW64\Fkmjaa32.exeC:\Windows\system32\Fkmjaa32.exe109⤵
- Drops file in System32 directory
PID:1908 -
C:\Windows\SysWOW64\Gokbgpeg.exeC:\Windows\system32\Gokbgpeg.exe110⤵PID:1308
-
C:\Windows\SysWOW64\Gicgpelg.exeC:\Windows\system32\Gicgpelg.exe111⤵PID:2180
-
C:\Windows\SysWOW64\Gaqhjggp.exeC:\Windows\system32\Gaqhjggp.exe112⤵PID:3540
-
C:\Windows\SysWOW64\Gijmad32.exeC:\Windows\system32\Gijmad32.exe113⤵PID:5192
-
C:\Windows\SysWOW64\Geanfelc.exeC:\Windows\system32\Geanfelc.exe114⤵PID:4432
-
C:\Windows\SysWOW64\Hnibokbd.exeC:\Windows\system32\Hnibokbd.exe115⤵PID:4908
-
C:\Windows\SysWOW64\Hlmchoan.exeC:\Windows\system32\Hlmchoan.exe116⤵
- Drops file in System32 directory
PID:2288 -
C:\Windows\SysWOW64\Halhfe32.exeC:\Windows\system32\Halhfe32.exe117⤵
- Modifies registry class
PID:4228 -
C:\Windows\SysWOW64\Hifmmb32.exeC:\Windows\system32\Hifmmb32.exe118⤵PID:5964
-
C:\Windows\SysWOW64\Fcddkggf.exeC:\Windows\system32\Fcddkggf.exe119⤵
- Modifies registry class
PID:1524 -
C:\Windows\SysWOW64\Oggbfdog.exeC:\Windows\system32\Oggbfdog.exe120⤵PID:3048
-
C:\Windows\SysWOW64\Chddpn32.exeC:\Windows\system32\Chddpn32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5052 -
C:\Windows\SysWOW64\Jikjmbmb.exeC:\Windows\system32\Jikjmbmb.exe122⤵PID:5076
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-