Analysis
-
max time kernel
231s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 17:27
Behavioral task
behavioral1
Sample
NEAS.c0b8fe6377f283627384bf647cf1ff50.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.c0b8fe6377f283627384bf647cf1ff50.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.c0b8fe6377f283627384bf647cf1ff50.exe
-
Size
155KB
-
MD5
c0b8fe6377f283627384bf647cf1ff50
-
SHA1
ff47fd4a18b8e2ef460dcf90f76406464c31eb71
-
SHA256
8c204315e9d194a6229522c32cb40ab72ea2428b6b83145a6bdac678cbe77e87
-
SHA512
109740bdf154cff2a3854c822e261c6e1f4a6e0aa41a2ee7dcdefdd43f048b7877342cf39eee2d69734ba31bea872a954ae7cf7c6085ebe45a46c4a0948f69b0
-
SSDEEP
3072:U9ob3dlny/XwPjqYlWas3OZWX6/d/aHVH2mraEznYfzB9BSwWO:Uib3LnwXu+YlWas3OZWX0/ALraYOzLcK
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adadedjq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnplhm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eghflc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Annfhg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gialihan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Biecoj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdcmjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpdlfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cbhhbojn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ehnpph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Adfboa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Amepoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aibfik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gapcnodg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgfnlejd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdhpoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cdlppf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkapla32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmggdm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajegmhpa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgdpea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ggnojc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bmgfoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ekohac32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgaibb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fommfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fnqdgkkg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fcpjea32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epegae32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inkimc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bcphlmeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Elaloeai.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fncamk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqcmdjjo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Epegae32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Empacnmh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fommfd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikaglgei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggnojc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fmidimen.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Clappaon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjokmk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehnpph32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkhkha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofmknifp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aofhcmig.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmidimen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Anljbgmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fdhpoe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjlkfo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpmmjeic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cibpoi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebddmq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fgaibb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anljbgmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ackoqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dcigfo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Biecoj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbmeokdm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjpama32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ijbjbdnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ikaglgei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jlknfpcg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omgckcmm.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/memory/2672-0-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/files/0x00030000000007a8-5.dat family_berbew behavioral1/memory/2672-6-0x00000000002B0000-0x00000000002F4000-memory.dmp family_berbew behavioral1/files/0x00030000000007a8-9.dat family_berbew behavioral1/files/0x00030000000007a8-13.dat family_berbew behavioral1/files/0x00030000000007a8-8.dat family_berbew behavioral1/files/0x00030000000007a8-14.dat family_berbew behavioral1/files/0x000a000000012268-19.dat family_berbew behavioral1/files/0x000a000000012268-22.dat family_berbew behavioral1/files/0x002c000000016c2c-28.dat family_berbew behavioral1/files/0x002c000000016c2c-39.dat family_berbew behavioral1/files/0x0007000000016d06-49.dat family_berbew behavioral1/files/0x0007000000016d06-48.dat family_berbew behavioral1/memory/2608-45-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2068-53-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2716-64-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/memory/2068-63-0x0000000000220000-0x0000000000264000-memory.dmp family_berbew behavioral1/files/0x0009000000016d36-61.dat family_berbew behavioral1/files/0x0009000000016d36-59.dat family_berbew behavioral1/files/0x0007000000016d06-54.dat family_berbew behavioral1/files/0x0007000000016d06-52.dat family_berbew behavioral1/files/0x002c000000016c2c-40.dat family_berbew behavioral1/files/0x0007000000016d06-46.dat family_berbew behavioral1/files/0x002c000000016c2c-35.dat family_berbew behavioral1/files/0x002c000000016c2c-32.dat family_berbew behavioral1/files/0x000a000000012268-27.dat family_berbew behavioral1/files/0x000a000000012268-26.dat family_berbew behavioral1/files/0x0009000000016d36-55.dat family_berbew behavioral1/files/0x000a000000012268-21.dat family_berbew behavioral1/files/0x0009000000016d36-67.dat family_berbew behavioral1/files/0x0009000000016d36-69.dat family_berbew behavioral1/memory/456-68-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/files/0x0006000000016d7e-74.dat family_berbew behavioral1/files/0x0006000000016d7e-80.dat family_berbew behavioral1/files/0x0006000000016d7e-77.dat family_berbew behavioral1/files/0x0006000000016d7e-76.dat family_berbew behavioral1/files/0x0006000000016d7e-82.dat family_berbew behavioral1/memory/1568-81-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/files/0x0006000000016d8a-87.dat family_berbew behavioral1/files/0x0006000000016d8a-90.dat family_berbew behavioral1/files/0x0006000000016d8a-93.dat family_berbew behavioral1/files/0x0006000000016d8a-89.dat family_berbew behavioral1/files/0x0006000000016d8a-95.dat family_berbew behavioral1/memory/2860-94-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/files/0x0006000000017001-100.dat family_berbew behavioral1/files/0x0006000000017001-103.dat family_berbew behavioral1/files/0x000600000001756b-109.dat family_berbew behavioral1/files/0x000600000001756b-119.dat family_berbew behavioral1/memory/1940-125-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/files/0x0005000000018697-126.dat family_berbew behavioral1/files/0x0005000000018697-129.dat family_berbew behavioral1/files/0x00050000000186d0-145.dat family_berbew behavioral1/files/0x0006000000018b15-152.dat family_berbew behavioral1/files/0x0006000000018b15-155.dat family_berbew behavioral1/files/0x0006000000018b15-156.dat family_berbew behavioral1/files/0x0006000000018b48-173.dat family_berbew behavioral1/memory/3024-178-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/files/0x0006000000018b71-179.dat family_berbew behavioral1/files/0x0006000000018b71-182.dat family_berbew behavioral1/files/0x0006000000018b91-198.dat family_berbew behavioral1/memory/2360-186-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral1/files/0x0006000000018b71-187.dat family_berbew behavioral1/files/0x0006000000018b91-188.dat family_berbew behavioral1/files/0x0006000000018bc5-204.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 2796 Jilmkffb.exe 2716 Ooaflp32.exe 2608 Ofmknifp.exe 2068 Omgckcmm.exe 456 Ofphdi32.exe 1568 Pnpfckmc.exe 2860 Qbiamm32.exe 1936 Aiegpg32.exe 1940 Anbohn32.exe 2088 Adohpe32.exe 1644 Adadedjq.exe 2440 Aofhcmig.exe 3024 Amledj32.exe 2360 Aibfik32.exe 1468 Biecoj32.exe 1816 Bbmggp32.exe 1876 Bofebqlb.exe 1812 Bdcmjg32.exe 884 Bebjdjal.exe 1096 Cdhgegfd.exe 1504 Cghpgbce.exe 2908 Cdlppf32.exe 864 Cgklma32.exe 2472 Choejien.exe 908 Dqcmdjjo.exe 840 Ejkampao.exe 1600 Egobfdpi.exe 2792 Ecfcle32.exe 1404 Fjdqbbkp.exe 2712 Okmceiii.exe 2160 Pgdcjjom.exe 2568 Pqlhbo32.exe 808 Pqodho32.exe 2808 Bgjknijp.exe 1324 Kpdlfn32.exe 1708 Bhpgkfab.exe 1996 Bojogp32.exe 320 Bfdhdj32.exe 1892 Bkapla32.exe 2064 Bnplhm32.exe 2340 Bdidegec.exe 3064 Bjfmmnck.exe 304 Bbmeokdm.exe 3020 Bcoafcjk.exe 2024 Bjhjcm32.exe 1120 Bmgfoi32.exe 1808 Bgmjla32.exe 2304 Bnfbilgo.exe 2952 Cohoqd32.exe 1408 Cfagmn32.exe 2872 Cipcii32.exe 2244 Cojlfckj.exe 1108 Cbhhbojn.exe 1604 Cibpoi32.exe 2252 Eenfnmfe.exe 2508 Emeoojfg.exe 2596 Ebaggaeo.exe 748 Ehnpph32.exe 1716 Epegae32.exe 2696 Ebddmq32.exe 548 Einljkji.exe 1936 Ekohac32.exe 1732 Eeemol32.exe 1816 Ekaegbnd.exe -
Loads dropped DLL 64 IoCs
pid Process 2672 NEAS.c0b8fe6377f283627384bf647cf1ff50.exe 2672 NEAS.c0b8fe6377f283627384bf647cf1ff50.exe 2796 Jilmkffb.exe 2796 Jilmkffb.exe 2716 Ooaflp32.exe 2716 Ooaflp32.exe 2608 Ofmknifp.exe 2608 Ofmknifp.exe 2068 Omgckcmm.exe 2068 Omgckcmm.exe 456 Ofphdi32.exe 456 Ofphdi32.exe 1568 Pnpfckmc.exe 1568 Pnpfckmc.exe 2860 Qbiamm32.exe 2860 Qbiamm32.exe 1936 Aiegpg32.exe 1936 Aiegpg32.exe 1940 Anbohn32.exe 1940 Anbohn32.exe 2088 Adohpe32.exe 2088 Adohpe32.exe 1644 Adadedjq.exe 1644 Adadedjq.exe 2440 Aofhcmig.exe 2440 Aofhcmig.exe 3024 Amledj32.exe 3024 Amledj32.exe 2360 Aibfik32.exe 2360 Aibfik32.exe 1468 Biecoj32.exe 1468 Biecoj32.exe 1816 Bbmggp32.exe 1816 Bbmggp32.exe 1876 Bofebqlb.exe 1876 Bofebqlb.exe 1812 Bdcmjg32.exe 1812 Bdcmjg32.exe 884 Bebjdjal.exe 884 Bebjdjal.exe 1096 Cdhgegfd.exe 1096 Cdhgegfd.exe 1504 Cghpgbce.exe 1504 Cghpgbce.exe 2908 Cdlppf32.exe 2908 Cdlppf32.exe 864 Cgklma32.exe 864 Cgklma32.exe 2472 Choejien.exe 2472 Choejien.exe 908 Dqcmdjjo.exe 908 Dqcmdjjo.exe 840 Ejkampao.exe 840 Ejkampao.exe 1600 Egobfdpi.exe 1600 Egobfdpi.exe 2792 Ecfcle32.exe 2792 Ecfcle32.exe 1404 Fjdqbbkp.exe 1404 Fjdqbbkp.exe 2712 Okmceiii.exe 2712 Okmceiii.exe 2160 Pgdcjjom.exe 2160 Pgdcjjom.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Qbiamm32.exe Pnpfckmc.exe File created C:\Windows\SysWOW64\Aaomchla.dll Bofebqlb.exe File created C:\Windows\SysWOW64\Cohoqd32.exe Bnfbilgo.exe File created C:\Windows\SysWOW64\Ijbjbdnf.exe Ieeajmpo.exe File created C:\Windows\SysWOW64\Dahkngdj.exe Dogbll32.exe File created C:\Windows\SysWOW64\Jdneedjc.dll Dicpbibe.exe File opened for modification C:\Windows\SysWOW64\Fnenbj32.exe Ffnfam32.exe File created C:\Windows\SysWOW64\Bhjefmni.dll Fipenn32.exe File opened for modification C:\Windows\SysWOW64\Ikaglgei.exe Ialbon32.exe File created C:\Windows\SysWOW64\Canhhhme.exe Copllmna.exe File opened for modification C:\Windows\SysWOW64\Fkbhkplc.exe Fdhpoe32.exe File created C:\Windows\SysWOW64\Gjokmk32.exe Gcdcqacf.exe File created C:\Windows\SysWOW64\Palndj32.dll Cghpgbce.exe File created C:\Windows\SysWOW64\Hmqjoljn.exe Hfgbbb32.exe File created C:\Windows\SysWOW64\Fqanif32.exe Fncamk32.exe File created C:\Windows\SysWOW64\Gcdcqacf.exe Fgnbkp32.exe File opened for modification C:\Windows\SysWOW64\Hifacjpd.exe Hfgego32.exe File opened for modification C:\Windows\SysWOW64\Bkapla32.exe Bfdhdj32.exe File created C:\Windows\SysWOW64\Cmpkfhgd.dll Bdidegec.exe File created C:\Windows\SysWOW64\Hccjac32.dll Fmbninke.exe File created C:\Windows\SysWOW64\Qfcinq32.dll Fkhkha32.exe File opened for modification C:\Windows\SysWOW64\Anbohn32.exe Aiegpg32.exe File opened for modification C:\Windows\SysWOW64\Fmggdm32.exe Fkhkha32.exe File opened for modification C:\Windows\SysWOW64\Elaloeai.exe Dicpbibe.exe File created C:\Windows\SysWOW64\Mgchjl32.dll Gbqfbl32.exe File opened for modification C:\Windows\SysWOW64\Omgckcmm.exe Ofmknifp.exe File created C:\Windows\SysWOW64\Bofebqlb.exe Bbmggp32.exe File opened for modification C:\Windows\SysWOW64\Choejien.exe Cgklma32.exe File created C:\Windows\SysWOW64\Bbmeokdm.exe Bjfmmnck.exe File opened for modification C:\Windows\SysWOW64\Fncamk32.exe Fcnmpb32.exe File opened for modification C:\Windows\SysWOW64\Gialihan.exe Gjokmk32.exe File created C:\Windows\SysWOW64\Jendlk32.dll Cibpoi32.exe File created C:\Windows\SysWOW64\Ebaggaeo.exe Emeoojfg.exe File opened for modification C:\Windows\SysWOW64\Dkiifnab.exe Delangck.exe File created C:\Windows\SysWOW64\Adohpe32.exe Anbohn32.exe File created C:\Windows\SysWOW64\Jafnpd32.dll Adohpe32.exe File created C:\Windows\SysWOW64\Bgjknijp.exe Pqodho32.exe File created C:\Windows\SysWOW64\Emmbib32.dll Fgnbkp32.exe File opened for modification C:\Windows\SysWOW64\Aibfik32.exe Amledj32.exe File created C:\Windows\SysWOW64\Opcjphoj.dll Pgdcjjom.exe File created C:\Windows\SysWOW64\Plgfigda.dll Bnplhm32.exe File opened for modification C:\Windows\SysWOW64\Bcoafcjk.exe Bbmeokdm.exe File opened for modification C:\Windows\SysWOW64\Fmidimen.exe Fcdpld32.exe File created C:\Windows\SysWOW64\Hjchpk32.dll Bbmggp32.exe File created C:\Windows\SysWOW64\Lngpidkn.dll Bebjdjal.exe File created C:\Windows\SysWOW64\Ikaglgei.exe Ialbon32.exe File created C:\Windows\SysWOW64\Cljopl32.dll Dkiifnab.exe File opened for modification C:\Windows\SysWOW64\Cghpgbce.exe Cdhgegfd.exe File opened for modification C:\Windows\SysWOW64\Dqcmdjjo.exe Choejien.exe File created C:\Windows\SysWOW64\Fommfd32.exe Fipenn32.exe File created C:\Windows\SysWOW64\Fkbjbhii.dll Fnqdgkkg.exe File created C:\Windows\SysWOW64\Opmgohee.dll Fcnmpb32.exe File created C:\Windows\SysWOW64\Mppoaiac.dll Fqanif32.exe File created C:\Windows\SysWOW64\Djbibm32.dll Bgjknijp.exe File created C:\Windows\SysWOW64\Gkkdldhe.exe Gapcnodg.exe File opened for modification C:\Windows\SysWOW64\Iedocq32.exe Ciigjh32.exe File created C:\Windows\SysWOW64\Ackoqn32.exe Annfhg32.exe File created C:\Windows\SysWOW64\Nljikmpj.dll NEAS.c0b8fe6377f283627384bf647cf1ff50.exe File created C:\Windows\SysWOW64\Kpdlfn32.exe Bgjknijp.exe File created C:\Windows\SysWOW64\Bjfmmnck.exe Bdidegec.exe File created C:\Windows\SysWOW64\Ipliafnn.dll Ehnpph32.exe File created C:\Windows\SysWOW64\Gangjnaj.dll Eeemol32.exe File created C:\Windows\SysWOW64\Higkdm32.exe Hgfnlejd.exe File created C:\Windows\SysWOW64\Mkjofe32.dll Qbiamm32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgchjl32.dll" Gbqfbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdfqfh32.dll" Ecfcle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gangjnaj.dll" Eeemol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppkcbhhj.dll" Ffnfam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aonmce32.dll" Hpkpdekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndolpa32.dll" Okmceiii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hccjac32.dll" Fmbninke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cohoqd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fommfd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ajnpao32.dll" Ajegmhpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Elaloeai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Noagionb.dll" Ofmknifp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adeido32.dll" Aiegpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pqlhbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bcoafcjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cdhgegfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fmbninke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mppoaiac.dll" Fqanif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ogecnm32.dll" Jdeigc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Anbohn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbjgcbja.dll" Eenfnmfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbppdi32.dll" Gapcnodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gkkdldhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Emeoojfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Conofmpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Clappaon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pgdcjjom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djbibm32.dll" Bgjknijp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jakmfc32.dll" Emeoojfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ialbon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dacach32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dcigfo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hfgego32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" NEAS.c0b8fe6377f283627384bf647cf1ff50.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cdhgegfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bnplhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gaqbgein.dll" Becaie32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Adadedjq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oppemb32.dll" Bfdhdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbdeimnj.dll" Hfgbbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gejmjb32.dll" Hgpkpc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eghflc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lknblocf.dll" Bcphlmeo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hjqdankl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cojlfckj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iikonh32.dll" Hqjijk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jdeigc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ackoqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkhcjnob.dll" Kpdlfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpipkb32.dll" Gckfmc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dpepfl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ajgdbgnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkjofe32.dll" Qbiamm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bgjknijp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Kpdlfn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ackoqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aqopjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebjpqc32.dll" Einljkji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Aibfik32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gjokmk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gialihan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID NEAS.c0b8fe6377f283627384bf647cf1ff50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cippnn32.dll" Dogbll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dicpbibe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2796 2672 NEAS.c0b8fe6377f283627384bf647cf1ff50.exe 28 PID 2672 wrote to memory of 2796 2672 NEAS.c0b8fe6377f283627384bf647cf1ff50.exe 28 PID 2672 wrote to memory of 2796 2672 NEAS.c0b8fe6377f283627384bf647cf1ff50.exe 28 PID 2672 wrote to memory of 2796 2672 NEAS.c0b8fe6377f283627384bf647cf1ff50.exe 28 PID 2796 wrote to memory of 2716 2796 Jilmkffb.exe 32 PID 2796 wrote to memory of 2716 2796 Jilmkffb.exe 32 PID 2796 wrote to memory of 2716 2796 Jilmkffb.exe 32 PID 2796 wrote to memory of 2716 2796 Jilmkffb.exe 32 PID 2716 wrote to memory of 2608 2716 Ooaflp32.exe 29 PID 2716 wrote to memory of 2608 2716 Ooaflp32.exe 29 PID 2716 wrote to memory of 2608 2716 Ooaflp32.exe 29 PID 2716 wrote to memory of 2608 2716 Ooaflp32.exe 29 PID 2608 wrote to memory of 2068 2608 Ofmknifp.exe 31 PID 2608 wrote to memory of 2068 2608 Ofmknifp.exe 31 PID 2608 wrote to memory of 2068 2608 Ofmknifp.exe 31 PID 2608 wrote to memory of 2068 2608 Ofmknifp.exe 31 PID 2068 wrote to memory of 456 2068 Omgckcmm.exe 30 PID 2068 wrote to memory of 456 2068 Omgckcmm.exe 30 PID 2068 wrote to memory of 456 2068 Omgckcmm.exe 30 PID 2068 wrote to memory of 456 2068 Omgckcmm.exe 30 PID 456 wrote to memory of 1568 456 Ofphdi32.exe 33 PID 456 wrote to memory of 1568 456 Ofphdi32.exe 33 PID 456 wrote to memory of 1568 456 Ofphdi32.exe 33 PID 456 wrote to memory of 1568 456 Ofphdi32.exe 33 PID 1568 wrote to memory of 2860 1568 Pnpfckmc.exe 34 PID 1568 wrote to memory of 2860 1568 Pnpfckmc.exe 34 PID 1568 wrote to memory of 2860 1568 Pnpfckmc.exe 34 PID 1568 wrote to memory of 2860 1568 Pnpfckmc.exe 34 PID 2860 wrote to memory of 1936 2860 Qbiamm32.exe 35 PID 2860 wrote to memory of 1936 2860 Qbiamm32.exe 35 PID 2860 wrote to memory of 1936 2860 Qbiamm32.exe 35 PID 2860 wrote to memory of 1936 2860 Qbiamm32.exe 35 PID 1936 wrote to memory of 1940 1936 Aiegpg32.exe 45 PID 1936 wrote to memory of 1940 1936 Aiegpg32.exe 45 PID 1936 wrote to memory of 1940 1936 Aiegpg32.exe 45 PID 1936 wrote to memory of 1940 1936 Aiegpg32.exe 45 PID 1940 wrote to memory of 2088 1940 Anbohn32.exe 36 PID 1940 wrote to memory of 2088 1940 Anbohn32.exe 36 PID 1940 wrote to memory of 2088 1940 Anbohn32.exe 36 PID 1940 wrote to memory of 2088 1940 Anbohn32.exe 36 PID 2088 wrote to memory of 1644 2088 Adohpe32.exe 44 PID 2088 wrote to memory of 1644 2088 Adohpe32.exe 44 PID 2088 wrote to memory of 1644 2088 Adohpe32.exe 44 PID 2088 wrote to memory of 1644 2088 Adohpe32.exe 44 PID 1644 wrote to memory of 2440 1644 Adadedjq.exe 37 PID 1644 wrote to memory of 2440 1644 Adadedjq.exe 37 PID 1644 wrote to memory of 2440 1644 Adadedjq.exe 37 PID 1644 wrote to memory of 2440 1644 Adadedjq.exe 37 PID 2440 wrote to memory of 3024 2440 Aofhcmig.exe 38 PID 2440 wrote to memory of 3024 2440 Aofhcmig.exe 38 PID 2440 wrote to memory of 3024 2440 Aofhcmig.exe 38 PID 2440 wrote to memory of 3024 2440 Aofhcmig.exe 38 PID 3024 wrote to memory of 2360 3024 Amledj32.exe 39 PID 3024 wrote to memory of 2360 3024 Amledj32.exe 39 PID 3024 wrote to memory of 2360 3024 Amledj32.exe 39 PID 3024 wrote to memory of 2360 3024 Amledj32.exe 39 PID 2360 wrote to memory of 1468 2360 Aibfik32.exe 40 PID 2360 wrote to memory of 1468 2360 Aibfik32.exe 40 PID 2360 wrote to memory of 1468 2360 Aibfik32.exe 40 PID 2360 wrote to memory of 1468 2360 Aibfik32.exe 40 PID 1468 wrote to memory of 1816 1468 Biecoj32.exe 43 PID 1468 wrote to memory of 1816 1468 Biecoj32.exe 43 PID 1468 wrote to memory of 1816 1468 Biecoj32.exe 43 PID 1468 wrote to memory of 1816 1468 Biecoj32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c0b8fe6377f283627384bf647cf1ff50.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c0b8fe6377f283627384bf647cf1ff50.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Jilmkffb.exeC:\Windows\system32\Jilmkffb.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\Ooaflp32.exeC:\Windows\system32\Ooaflp32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716
-
-
-
C:\Windows\SysWOW64\Ofmknifp.exeC:\Windows\system32\Ofmknifp.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\Omgckcmm.exeC:\Windows\system32\Omgckcmm.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2068
-
-
C:\Windows\SysWOW64\Ofphdi32.exeC:\Windows\system32\Ofphdi32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\Pnpfckmc.exeC:\Windows\system32\Pnpfckmc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\Qbiamm32.exeC:\Windows\system32\Qbiamm32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\Aiegpg32.exeC:\Windows\system32\Aiegpg32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\Anbohn32.exeC:\Windows\system32\Anbohn32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1940
-
-
-
-
-
C:\Windows\SysWOW64\Adohpe32.exeC:\Windows\system32\Adohpe32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Adadedjq.exeC:\Windows\system32\Adadedjq.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1644
-
-
C:\Windows\SysWOW64\Aofhcmig.exeC:\Windows\system32\Aofhcmig.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\Amledj32.exeC:\Windows\system32\Amledj32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Aibfik32.exeC:\Windows\system32\Aibfik32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\Biecoj32.exeC:\Windows\system32\Biecoj32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\Bbmggp32.exeC:\Windows\system32\Bbmggp32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1816
-
-
-
-
-
C:\Windows\SysWOW64\Bofebqlb.exeC:\Windows\system32\Bofebqlb.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1876 -
C:\Windows\SysWOW64\Bdcmjg32.exeC:\Windows\system32\Bdcmjg32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1812 -
C:\Windows\SysWOW64\Bebjdjal.exeC:\Windows\system32\Bebjdjal.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:884 -
C:\Windows\SysWOW64\Cdhgegfd.exeC:\Windows\system32\Cdhgegfd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1096 -
C:\Windows\SysWOW64\Cghpgbce.exeC:\Windows\system32\Cghpgbce.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1504 -
C:\Windows\SysWOW64\Cdlppf32.exeC:\Windows\system32\Cdlppf32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2908 -
C:\Windows\SysWOW64\Cgklma32.exeC:\Windows\system32\Cgklma32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:864 -
C:\Windows\SysWOW64\Choejien.exeC:\Windows\system32\Choejien.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2472 -
C:\Windows\SysWOW64\Dqcmdjjo.exeC:\Windows\system32\Dqcmdjjo.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:908 -
C:\Windows\SysWOW64\Ejkampao.exeC:\Windows\system32\Ejkampao.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:840 -
C:\Windows\SysWOW64\Egobfdpi.exeC:\Windows\system32\Egobfdpi.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Windows\SysWOW64\Ecfcle32.exeC:\Windows\system32\Ecfcle32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2792 -
C:\Windows\SysWOW64\Fjdqbbkp.exeC:\Windows\system32\Fjdqbbkp.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1404 -
C:\Windows\SysWOW64\Okmceiii.exeC:\Windows\system32\Okmceiii.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Pgdcjjom.exeC:\Windows\system32\Pgdcjjom.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2160 -
C:\Windows\SysWOW64\Pqlhbo32.exeC:\Windows\system32\Pqlhbo32.exe16⤵
- Executes dropped EXE
- Modifies registry class
PID:2568 -
C:\Windows\SysWOW64\Pqodho32.exeC:\Windows\system32\Pqodho32.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:808 -
C:\Windows\SysWOW64\Bgjknijp.exeC:\Windows\system32\Bgjknijp.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2808 -
C:\Windows\SysWOW64\Kpdlfn32.exeC:\Windows\system32\Kpdlfn32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1324 -
C:\Windows\SysWOW64\Bhpgkfab.exeC:\Windows\system32\Bhpgkfab.exe20⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SysWOW64\Bojogp32.exeC:\Windows\system32\Bojogp32.exe21⤵
- Executes dropped EXE
PID:1996 -
C:\Windows\SysWOW64\Bfdhdj32.exeC:\Windows\system32\Bfdhdj32.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:320 -
C:\Windows\SysWOW64\Bkapla32.exeC:\Windows\system32\Bkapla32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\Bnplhm32.exeC:\Windows\system32\Bnplhm32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2064 -
C:\Windows\SysWOW64\Bdidegec.exeC:\Windows\system32\Bdidegec.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2340 -
C:\Windows\SysWOW64\Bjfmmnck.exeC:\Windows\system32\Bjfmmnck.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3064 -
C:\Windows\SysWOW64\Bbmeokdm.exeC:\Windows\system32\Bbmeokdm.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:304 -
C:\Windows\SysWOW64\Bcoafcjk.exeC:\Windows\system32\Bcoafcjk.exe28⤵
- Executes dropped EXE
- Modifies registry class
PID:3020 -
C:\Windows\SysWOW64\Bjhjcm32.exeC:\Windows\system32\Bjhjcm32.exe29⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\Bmgfoi32.exeC:\Windows\system32\Bmgfoi32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1120 -
C:\Windows\SysWOW64\Bgmjla32.exeC:\Windows\system32\Bgmjla32.exe31⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\Bnfbilgo.exeC:\Windows\system32\Bnfbilgo.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2304 -
C:\Windows\SysWOW64\Cohoqd32.exeC:\Windows\system32\Cohoqd32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2952 -
C:\Windows\SysWOW64\Cfagmn32.exeC:\Windows\system32\Cfagmn32.exe34⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\Cipcii32.exeC:\Windows\system32\Cipcii32.exe35⤵
- Executes dropped EXE
PID:2872 -
C:\Windows\SysWOW64\Cojlfckj.exeC:\Windows\system32\Cojlfckj.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:2244 -
C:\Windows\SysWOW64\Cbhhbojn.exeC:\Windows\system32\Cbhhbojn.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1108 -
C:\Windows\SysWOW64\Cibpoi32.exeC:\Windows\system32\Cibpoi32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\Eenfnmfe.exeC:\Windows\system32\Eenfnmfe.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:2252 -
C:\Windows\SysWOW64\Emeoojfg.exeC:\Windows\system32\Emeoojfg.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2508 -
C:\Windows\SysWOW64\Ebaggaeo.exeC:\Windows\system32\Ebaggaeo.exe41⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\SysWOW64\Ehnpph32.exeC:\Windows\system32\Ehnpph32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:748 -
C:\Windows\SysWOW64\Epegae32.exeC:\Windows\system32\Epegae32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\Ebddmq32.exeC:\Windows\system32\Ebddmq32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2696 -
C:\Windows\SysWOW64\Einljkji.exeC:\Windows\system32\Einljkji.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:548 -
C:\Windows\SysWOW64\Ekohac32.exeC:\Windows\system32\Ekohac32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\Eeemol32.exeC:\Windows\system32\Eeemol32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1732 -
C:\Windows\SysWOW64\Ekaegbnd.exeC:\Windows\system32\Ekaegbnd.exe48⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\Empacnmh.exeC:\Windows\system32\Empacnmh.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2908 -
C:\Windows\SysWOW64\Eghflc32.exeC:\Windows\system32\Eghflc32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1284 -
C:\Windows\SysWOW64\Fmbninke.exeC:\Windows\system32\Fmbninke.exe51⤵
- Drops file in System32 directory
- Modifies registry class
PID:2004 -
C:\Windows\SysWOW64\Fkhkha32.exeC:\Windows\system32\Fkhkha32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1084 -
C:\Windows\SysWOW64\Fmggdm32.exeC:\Windows\system32\Fmggdm32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1912 -
C:\Windows\SysWOW64\Fcdpld32.exeC:\Windows\system32\Fcdpld32.exe54⤵
- Drops file in System32 directory
PID:2052 -
C:\Windows\SysWOW64\Fmidimen.exeC:\Windows\system32\Fmidimen.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2436 -
C:\Windows\SysWOW64\Fgaibb32.exeC:\Windows\system32\Fgaibb32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1800 -
C:\Windows\SysWOW64\Fipenn32.exeC:\Windows\system32\Fipenn32.exe57⤵
- Drops file in System32 directory
PID:1372 -
C:\Windows\SysWOW64\Fommfd32.exeC:\Windows\system32\Fommfd32.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2328 -
C:\Windows\SysWOW64\Gibadm32.exeC:\Windows\system32\Gibadm32.exe59⤵PID:1900
-
C:\Windows\SysWOW64\Gckfmc32.exeC:\Windows\system32\Gckfmc32.exe60⤵
- Modifies registry class
PID:272 -
C:\Windows\SysWOW64\Gkfkae32.exeC:\Windows\system32\Gkfkae32.exe61⤵PID:1640
-
C:\Windows\SysWOW64\Gapcnodg.exeC:\Windows\system32\Gapcnodg.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1148 -
C:\Windows\SysWOW64\Gkkdldhe.exeC:\Windows\system32\Gkkdldhe.exe63⤵
- Modifies registry class
PID:872 -
C:\Windows\SysWOW64\Gniqhpgi.exeC:\Windows\system32\Gniqhpgi.exe64⤵PID:2104
-
C:\Windows\SysWOW64\Ggaeae32.exeC:\Windows\system32\Ggaeae32.exe65⤵PID:3032
-
C:\Windows\SysWOW64\Gjpama32.exeC:\Windows\system32\Gjpama32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2356 -
C:\Windows\SysWOW64\Hqjijk32.exeC:\Windows\system32\Hqjijk32.exe67⤵
- Modifies registry class
PID:3060 -
C:\Windows\SysWOW64\Hfgbbb32.exeC:\Windows\system32\Hfgbbb32.exe68⤵
- Drops file in System32 directory
- Modifies registry class
PID:2772 -
C:\Windows\SysWOW64\Hmqjoljn.exeC:\Windows\system32\Hmqjoljn.exe69⤵PID:1088
-
C:\Windows\SysWOW64\Hgfnlejd.exeC:\Windows\system32\Hgfnlejd.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\Higkdm32.exeC:\Windows\system32\Higkdm32.exe71⤵PID:2608
-
C:\Windows\SysWOW64\Igaapiqe.exeC:\Windows\system32\Igaapiqe.exe72⤵PID:1940
-
C:\Windows\SysWOW64\Inkimc32.exeC:\Windows\system32\Inkimc32.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1560 -
C:\Windows\SysWOW64\Ieeajmpo.exeC:\Windows\system32\Ieeajmpo.exe74⤵
- Drops file in System32 directory
PID:848 -
C:\Windows\SysWOW64\Ijbjbdnf.exeC:\Windows\system32\Ijbjbdnf.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1460 -
C:\Windows\SysWOW64\Ialbon32.exeC:\Windows\system32\Ialbon32.exe76⤵
- Drops file in System32 directory
- Modifies registry class
PID:2960 -
C:\Windows\SysWOW64\Ikaglgei.exeC:\Windows\system32\Ikaglgei.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:788 -
C:\Windows\SysWOW64\Jdeigc32.exeC:\Windows\system32\Jdeigc32.exe78⤵
- Modifies registry class
PID:2456 -
C:\Windows\SysWOW64\Dpepfl32.exeC:\Windows\system32\Dpepfl32.exe79⤵
- Modifies registry class
PID:2256 -
C:\Windows\SysWOW64\Jlknfpcg.exeC:\Windows\system32\Jlknfpcg.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1508 -
C:\Windows\SysWOW64\Ciigjh32.exeC:\Windows\system32\Ciigjh32.exe81⤵
- Drops file in System32 directory
PID:2148 -
C:\Windows\SysWOW64\Iedocq32.exeC:\Windows\system32\Iedocq32.exe82⤵PID:968
-
C:\Windows\SysWOW64\Anljbgmp.exeC:\Windows\system32\Anljbgmp.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2492 -
C:\Windows\SysWOW64\Adfboa32.exeC:\Windows\system32\Adfboa32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1704 -
C:\Windows\SysWOW64\Annfhg32.exeC:\Windows\system32\Annfhg32.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2216 -
C:\Windows\SysWOW64\Ackoqn32.exeC:\Windows\system32\Ackoqn32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1976 -
C:\Windows\SysWOW64\Ajegmhpa.exeC:\Windows\system32\Ajegmhpa.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3056 -
C:\Windows\SysWOW64\Aqopjb32.exeC:\Windows\system32\Aqopjb32.exe88⤵
- Modifies registry class
PID:2312 -
C:\Windows\SysWOW64\Abplajnl.exeC:\Windows\system32\Abplajnl.exe89⤵PID:1564
-
C:\Windows\SysWOW64\Ajgdbgnn.exeC:\Windows\system32\Ajgdbgnn.exe90⤵
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Amepoc32.exeC:\Windows\system32\Amepoc32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1092 -
C:\Windows\SysWOW64\Akhqjpdm.exeC:\Windows\system32\Akhqjpdm.exe92⤵PID:2564
-
C:\Windows\SysWOW64\Bcphlmeo.exeC:\Windows\system32\Bcphlmeo.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2972 -
C:\Windows\SysWOW64\Biladdcf.exeC:\Windows\system32\Biladdcf.exe94⤵PID:2496
-
C:\Windows\SysWOW64\Bofiqn32.exeC:\Windows\system32\Bofiqn32.exe95⤵PID:472
-
C:\Windows\SysWOW64\Becaie32.exeC:\Windows\system32\Becaie32.exe96⤵
- Modifies registry class
PID:1568 -
C:\Windows\SysWOW64\Bganep32.exeC:\Windows\system32\Bganep32.exe97⤵PID:2088
-
C:\Windows\SysWOW64\Conofmpd.exeC:\Windows\system32\Conofmpd.exe98⤵
- Modifies registry class
PID:1468 -
C:\Windows\SysWOW64\Cehgcg32.exeC:\Windows\system32\Cehgcg32.exe99⤵PID:2932
-
C:\Windows\SysWOW64\Clappaon.exeC:\Windows\system32\Clappaon.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:964 -
C:\Windows\SysWOW64\Copllmna.exeC:\Windows\system32\Copllmna.exe101⤵
- Drops file in System32 directory
PID:2836 -
C:\Windows\SysWOW64\Canhhhme.exeC:\Windows\system32\Canhhhme.exe102⤵PID:2764
-
C:\Windows\SysWOW64\Dhhpdb32.exeC:\Windows\system32\Dhhpdb32.exe103⤵PID:980
-
C:\Windows\SysWOW64\Daqemh32.exeC:\Windows\system32\Daqemh32.exe104⤵PID:2808
-
C:\Windows\SysWOW64\Delangck.exeC:\Windows\system32\Delangck.exe105⤵
- Drops file in System32 directory
PID:1524 -
C:\Windows\SysWOW64\Dkiifnab.exeC:\Windows\system32\Dkiifnab.exe106⤵
- Drops file in System32 directory
PID:2132 -
C:\Windows\SysWOW64\Dacach32.exeC:\Windows\system32\Dacach32.exe107⤵
- Modifies registry class
PID:2240 -
C:\Windows\SysWOW64\Dhmjpbpl.exeC:\Windows\system32\Dhmjpbpl.exe108⤵PID:2676
-
C:\Windows\SysWOW64\Dogbll32.exeC:\Windows\system32\Dogbll32.exe109⤵
- Drops file in System32 directory
- Modifies registry class
PID:2604 -
C:\Windows\SysWOW64\Dahkngdj.exeC:\Windows\system32\Dahkngdj.exe110⤵PID:340
-
C:\Windows\SysWOW64\Dcigfo32.exeC:\Windows\system32\Dcigfo32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2144 -
C:\Windows\SysWOW64\Dicpbibe.exeC:\Windows\system32\Dicpbibe.exe112⤵
- Drops file in System32 directory
- Modifies registry class
PID:2436 -
C:\Windows\SysWOW64\Elaloeai.exeC:\Windows\system32\Elaloeai.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:272 -
C:\Windows\SysWOW64\Fgdpea32.exeC:\Windows\system32\Fgdpea32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1144 -
C:\Windows\SysWOW64\Fdhpoe32.exeC:\Windows\system32\Fdhpoe32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1100 -
C:\Windows\SysWOW64\Fkbhkplc.exeC:\Windows\system32\Fkbhkplc.exe116⤵PID:2536
-
C:\Windows\SysWOW64\Fnqdgkkg.exeC:\Windows\system32\Fnqdgkkg.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2484 -
C:\Windows\SysWOW64\Fcnmpb32.exeC:\Windows\system32\Fcnmpb32.exe118⤵
- Drops file in System32 directory
PID:1168 -
C:\Windows\SysWOW64\Fncamk32.exeC:\Windows\system32\Fncamk32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\Fqanif32.exeC:\Windows\system32\Fqanif32.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:1272 -
C:\Windows\SysWOW64\Fcpjea32.exeC:\Windows\system32\Fcpjea32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2408 -
C:\Windows\SysWOW64\Ffnfam32.exeC:\Windows\system32\Ffnfam32.exe122⤵
- Drops file in System32 directory
- Modifies registry class
PID:1908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-