Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
184s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 17:28
Behavioral task
behavioral1
Sample
NEAS.d25a1fcc9bef2fef4b749e8c0fcf1900.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.d25a1fcc9bef2fef4b749e8c0fcf1900.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.d25a1fcc9bef2fef4b749e8c0fcf1900.exe
-
Size
197KB
-
MD5
d25a1fcc9bef2fef4b749e8c0fcf1900
-
SHA1
3c0fe8b9bece46ac0e3bdf280667e582ea8d90b3
-
SHA256
4ea81d96610dc0e2e0791c1678b946120bd950507e9346578c2d9e1baa0bdba1
-
SHA512
621be55f53490b476c04076f512c019e684109542dbece9135e001d6c5836d20a9f184a3922eb6b9ccbae3eee4545b6554cc994d83318982d8a9b45d61a0769c
-
SSDEEP
6144:MWKaQx4ug4fQkjxqvak+PH/RARMHGb3fJt4X:MWKWD4IyxqCfRARR6
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iloimopp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbbefafp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Halaeeod.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikaebnoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ielfqcch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bihhhi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdgolq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aamipe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkiage32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doeghk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcpadd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmbcik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Loqjlg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cndidlfb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qclmmq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgddlo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oediim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpeclq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hipdjfoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aclpkffa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pijcpmhc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmdmpe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Becipn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcdepd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edkddeag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipmjkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Balpph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajjoej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oooaah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjebiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ogqmee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oooaah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lncjgddf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfhhho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjabdo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahjoljqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oqcedino.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acnjbpdb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hebcjdkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lgibjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Andghd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhkjooqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqpccp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fqdbnhco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdebfago.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfamia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbbggeli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jacpma32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kongfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kffhakjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Anadho32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcjdjb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbbgicnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckghid32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eggmqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Innfgb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icljgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjgkjh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdalim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhdqfbjp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qejfkmem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qjeaog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebplhp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eogoaifl.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/1244-0-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/memory/1244-1-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/memory/3576-9-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e32-7.dat family_berbew behavioral2/files/0x0006000000022e32-8.dat family_berbew behavioral2/files/0x0006000000022e34-15.dat family_berbew behavioral2/files/0x0006000000022e34-17.dat family_berbew behavioral2/memory/4896-16-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e36-23.dat family_berbew behavioral2/files/0x0006000000022e36-25.dat family_berbew behavioral2/memory/1592-24-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e38-31.dat family_berbew behavioral2/files/0x0006000000022e38-33.dat family_berbew behavioral2/memory/2320-38-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/memory/1244-32-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e3c-40.dat family_berbew behavioral2/memory/484-41-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e3c-42.dat family_berbew behavioral2/files/0x0006000000022e3f-48.dat family_berbew behavioral2/files/0x0006000000022e3f-50.dat family_berbew behavioral2/memory/1092-49-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0007000000022e41-56.dat family_berbew behavioral2/files/0x0007000000022e41-58.dat family_berbew behavioral2/memory/2296-57-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e44-64.dat family_berbew behavioral2/memory/1460-65-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e44-66.dat family_berbew behavioral2/files/0x0006000000022e46-72.dat family_berbew behavioral2/memory/3368-73-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e46-74.dat family_berbew behavioral2/files/0x0006000000022e48-80.dat family_berbew behavioral2/memory/552-81-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e48-82.dat family_berbew behavioral2/files/0x0006000000022e4a-88.dat family_berbew behavioral2/memory/3576-89-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e4a-90.dat family_berbew behavioral2/memory/2108-95-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e4e-97.dat family_berbew behavioral2/memory/4896-98-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/memory/4376-100-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e4e-99.dat family_berbew behavioral2/memory/1592-107-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e50-108.dat family_berbew behavioral2/memory/4484-113-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e50-106.dat family_berbew behavioral2/files/0x0006000000022e54-115.dat family_berbew behavioral2/files/0x0006000000022e54-117.dat family_berbew behavioral2/memory/2320-116-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/memory/1804-122-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e58-124.dat family_berbew behavioral2/memory/484-125-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e58-126.dat family_berbew behavioral2/memory/3120-127-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e5b-128.dat family_berbew behavioral2/files/0x0006000000022e5b-133.dat family_berbew behavioral2/files/0x0006000000022e5b-135.dat family_berbew behavioral2/memory/1092-134-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/memory/2008-140-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e5d-142.dat family_berbew behavioral2/files/0x0006000000022e5d-144.dat family_berbew behavioral2/memory/2296-143-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/memory/4560-149-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/memory/1460-152-0x0000000000400000-0x0000000000444000-memory.dmp family_berbew behavioral2/files/0x0006000000022e61-153.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 3576 Mklfjm32.exe 4896 Mhpgca32.exe 1592 Mdghhb32.exe 2320 Nlqloo32.exe 484 Nfiagd32.exe 1092 Nfknmd32.exe 2296 Nconfh32.exe 1460 Ncaklhdi.exe 3368 Ookhfigk.exe 552 Ochamg32.exe 2108 Oooaah32.exe 4376 Omcbkl32.exe 4484 Pijcpmhc.exe 1804 Pbbgicnd.exe 3120 Pbddobla.exe 2008 Pmmeak32.exe 4560 Pehjfm32.exe 2324 Qejfkmem.exe 4828 Qbngeadf.exe 5100 Qpbgnecp.exe 2052 Bihhhi32.exe 964 Bcpika32.exe 1580 Bimach32.exe 2192 Bfabmmhe.exe 3320 Cdebfago.exe 5072 Cdgolq32.exe 488 Cdjlap32.exe 2504 Cmbpjfij.exe 2056 Cfjeckpj.exe 3580 Cmdmpe32.exe 3600 Cfmahknh.exe 1988 Dbcbnlcl.exe 4240 Dllffa32.exe 4900 Dmkcpdao.exe 768 Dgdgijhp.exe 2116 Ddhhbngi.exe 4668 Dlcmgqdd.exe 2064 Fncbha32.exe 4992 Fgkfqgce.exe 1508 Fdogjk32.exe 680 Ffpcbchm.exe 3664 Fdadpk32.exe 4576 Gphddlfp.exe 5000 Gfemmb32.exe 4964 Gcimfg32.exe 4800 Gckjlf32.exe 2416 Gjebiq32.exe 4024 Gcngafol.exe 4672 Gnckooob.exe 2516 Gcpcgfmi.exe 4772 Hmhhpkcj.exe 4132 Hfamia32.exe 4016 Hnhdjn32.exe 4932 Hgpibdam.exe 4408 Hcgjhega.exe 2780 Hjabdo32.exe 4420 Hfhbipdb.exe 3512 Hnokjm32.exe 4220 Iggocbke.exe 628 Ifoijonj.exe 1620 Imnjbhaa.exe 4392 Jfmekm32.exe 1624 Kceoppmo.exe 3872 Knkcmild.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Conllp32.dll Pehjfm32.exe File opened for modification C:\Windows\SysWOW64\Hfhbipdb.exe Hjabdo32.exe File opened for modification C:\Windows\SysWOW64\Gmggpekm.exe Gikkof32.exe File opened for modification C:\Windows\SysWOW64\Hmnmqdee.exe Hgdedj32.exe File created C:\Windows\SysWOW64\Pomjhg32.dll Leoedn32.exe File created C:\Windows\SysWOW64\Fkloka32.dll Hfhbipdb.exe File created C:\Windows\SysWOW64\Peqkdjmm.dll Gcfjfqah.exe File created C:\Windows\SysWOW64\Lccigdih.dll Qjeaog32.exe File opened for modification C:\Windows\SysWOW64\Ajjoej32.exe Apekha32.exe File created C:\Windows\SysWOW64\Pbphca32.dll Qbngeadf.exe File opened for modification C:\Windows\SysWOW64\Acjjpllp.exe Qlmhfj32.exe File created C:\Windows\SysWOW64\Cfdhdn32.exe Cdfkhb32.exe File created C:\Windows\SysWOW64\Dkeoeg32.dll Ijnqld32.exe File opened for modification C:\Windows\SysWOW64\Bnmcdm32.exe Bepeph32.exe File opened for modification C:\Windows\SysWOW64\Cnffjl32.exe Chmnnamb.exe File created C:\Windows\SysWOW64\Dfqdid32.dll Gbhhbjfl.exe File created C:\Windows\SysWOW64\Khabdk32.exe Koimkegp.exe File created C:\Windows\SysWOW64\Qbngeadf.exe Qejfkmem.exe File opened for modification C:\Windows\SysWOW64\Hcgjhega.exe Hgpibdam.exe File created C:\Windows\SysWOW64\Oediim32.exe Ogcike32.exe File created C:\Windows\SysWOW64\Gnaiaagp.dll Pbpjbe32.exe File created C:\Windows\SysWOW64\Cjkcjb32.dll Majhjh32.exe File created C:\Windows\SysWOW64\Pnlcdg32.exe Gpjjpe32.exe File created C:\Windows\SysWOW64\Cmijdh32.dll Chhdbb32.exe File created C:\Windows\SysWOW64\Hipdjfoo.exe Hmicee32.exe File opened for modification C:\Windows\SysWOW64\Bbacekmj.exe Bapgmb32.exe File created C:\Windows\SysWOW64\Coepkfcl.dll Jangaboo.exe File created C:\Windows\SysWOW64\Gedfblql.exe Gcfjfqah.exe File created C:\Windows\SysWOW64\Mnjjmmkc.exe Mkkmaalo.exe File opened for modification C:\Windows\SysWOW64\Gohhik32.exe Gfpcpefb.exe File created C:\Windows\SysWOW64\Eaceqmid.exe Ecbecfqe.exe File created C:\Windows\SysWOW64\Kallod32.exe Kffhakjp.exe File created C:\Windows\SysWOW64\Aepeonfe.dll Oacdmo32.exe File opened for modification C:\Windows\SysWOW64\Qjeaog32.exe Qhddgofo.exe File created C:\Windows\SysWOW64\Eimeokpk.dll Oqcedino.exe File created C:\Windows\SysWOW64\Ifhnohkp.dll Fggdic32.exe File created C:\Windows\SysWOW64\Nemjgo32.dll Halaeeod.exe File created C:\Windows\SysWOW64\Alaaajmb.exe Acjjpllp.exe File opened for modification C:\Windows\SysWOW64\Iknmfg32.exe Icfediio.exe File opened for modification C:\Windows\SysWOW64\Bapgmb32.exe Bjdbki32.exe File created C:\Windows\SysWOW64\Bldcmain.dll Jhklcldi.exe File opened for modification C:\Windows\SysWOW64\Ijnqld32.exe Igpdph32.exe File created C:\Windows\SysWOW64\Niqgpncn.dll Fkempa32.exe File created C:\Windows\SysWOW64\Pbigeg32.dll Hkhblo32.exe File opened for modification C:\Windows\SysWOW64\Lhmapi32.exe Leoedn32.exe File created C:\Windows\SysWOW64\Pmbcik32.exe Egoomnin.exe File opened for modification C:\Windows\SysWOW64\Hpfdkiac.exe Hkkhjj32.exe File created C:\Windows\SysWOW64\Hkllgnco.exe Hebcjdkb.exe File created C:\Windows\SysWOW64\Ogcike32.exe Onjebpml.exe File created C:\Windows\SysWOW64\Ohfpng32.dll Aclpkffa.exe File created C:\Windows\SysWOW64\Ilkhnl32.dll Bnmcdm32.exe File opened for modification C:\Windows\SysWOW64\Mgingoog.exe Moniclal.exe File created C:\Windows\SysWOW64\Ibpgjg32.exe Ilfomm32.exe File created C:\Windows\SysWOW64\Amkejmgc.dll Cdjlap32.exe File created C:\Windows\SysWOW64\Ifgknd32.dll Iggocbke.exe File created C:\Windows\SysWOW64\Becipn32.exe Bhohfj32.exe File created C:\Windows\SysWOW64\Dmefafql.exe Dhhnipbe.exe File created C:\Windows\SysWOW64\Gbbkjgpl.exe Goconkah.exe File opened for modification C:\Windows\SysWOW64\Icfediio.exe Idceim32.exe File created C:\Windows\SysWOW64\Plackg32.dll Hkllgnco.exe File created C:\Windows\SysWOW64\Hgnndl32.dll Kallod32.exe File created C:\Windows\SysWOW64\Abngccbl.exe Anpnmele.exe File opened for modification C:\Windows\SysWOW64\Eehnnb32.exe Eoneah32.exe File opened for modification C:\Windows\SysWOW64\Fcpadd32.exe Fboellof.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibdpefnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbnpja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Didjlnjc.dll" Iejcco32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Halaeeod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gipeopep.dll" Andghd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iloimopp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijfbcjca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jangaboo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfhbipdb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ogcike32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjnmmcel.dll" Gcekocqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dfqdid32.dll" Gbhhbjfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hnokjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glgoje32.dll" Agglld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Klfkallg.dll" Fcpadd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmdmpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flbjgn32.dll" Igdnkhoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ielfqcch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qbbggeli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocfjbk32.dll" Edmjpoli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Biklbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdnnpcjh.dll" Kdalim32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbgfad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpacoj32.dll" Pbbgicnd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qbngeadf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Egoomnin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjebiq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ginenk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcibmgip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpaeap32.dll" Eogoaifl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jangaboo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdghhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbpnedga.dll" Gcimfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjefil32.dll" Gohhik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjeele32.dll" Hgdedj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omclnn32.dll" Nfknmd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gcngafol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ndjfmf32.dll" Elccpife.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejfanc32.dll" Ehocjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ohkpno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apfemf32.dll" Kceoppmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blmamh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dodbkiho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbahle32.dll" Lhmapi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdkbgj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Icljgp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Koimkegp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Majhjh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebplhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ceanplbl.dll" Ookokeqd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bbacekmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofqnlplf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hpdifh32.dll" Cibabdno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omlqbnaj.dll" Fnalfmhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jmppbgkk.dll" Abngccbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fqdbnhco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oncfgfpd.dll" Hnmeiipp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnppim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Chmnnamb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iljhhlgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdjdie32.dll" Mgingoog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnlcdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egoomnin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jpbdfgge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1244 wrote to memory of 3576 1244 NEAS.d25a1fcc9bef2fef4b749e8c0fcf1900.exe 88 PID 1244 wrote to memory of 3576 1244 NEAS.d25a1fcc9bef2fef4b749e8c0fcf1900.exe 88 PID 1244 wrote to memory of 3576 1244 NEAS.d25a1fcc9bef2fef4b749e8c0fcf1900.exe 88 PID 3576 wrote to memory of 4896 3576 Mklfjm32.exe 89 PID 3576 wrote to memory of 4896 3576 Mklfjm32.exe 89 PID 3576 wrote to memory of 4896 3576 Mklfjm32.exe 89 PID 4896 wrote to memory of 1592 4896 Mhpgca32.exe 90 PID 4896 wrote to memory of 1592 4896 Mhpgca32.exe 90 PID 4896 wrote to memory of 1592 4896 Mhpgca32.exe 90 PID 1592 wrote to memory of 2320 1592 Mdghhb32.exe 91 PID 1592 wrote to memory of 2320 1592 Mdghhb32.exe 91 PID 1592 wrote to memory of 2320 1592 Mdghhb32.exe 91 PID 2320 wrote to memory of 484 2320 Nlqloo32.exe 92 PID 2320 wrote to memory of 484 2320 Nlqloo32.exe 92 PID 2320 wrote to memory of 484 2320 Nlqloo32.exe 92 PID 484 wrote to memory of 1092 484 Nfiagd32.exe 93 PID 484 wrote to memory of 1092 484 Nfiagd32.exe 93 PID 484 wrote to memory of 1092 484 Nfiagd32.exe 93 PID 1092 wrote to memory of 2296 1092 Nfknmd32.exe 94 PID 1092 wrote to memory of 2296 1092 Nfknmd32.exe 94 PID 1092 wrote to memory of 2296 1092 Nfknmd32.exe 94 PID 2296 wrote to memory of 1460 2296 Nconfh32.exe 95 PID 2296 wrote to memory of 1460 2296 Nconfh32.exe 95 PID 2296 wrote to memory of 1460 2296 Nconfh32.exe 95 PID 1460 wrote to memory of 3368 1460 Ncaklhdi.exe 96 PID 1460 wrote to memory of 3368 1460 Ncaklhdi.exe 96 PID 1460 wrote to memory of 3368 1460 Ncaklhdi.exe 96 PID 3368 wrote to memory of 552 3368 Ookhfigk.exe 98 PID 3368 wrote to memory of 552 3368 Ookhfigk.exe 98 PID 3368 wrote to memory of 552 3368 Ookhfigk.exe 98 PID 552 wrote to memory of 2108 552 Ochamg32.exe 99 PID 552 wrote to memory of 2108 552 Ochamg32.exe 99 PID 552 wrote to memory of 2108 552 Ochamg32.exe 99 PID 2108 wrote to memory of 4376 2108 Oooaah32.exe 100 PID 2108 wrote to memory of 4376 2108 Oooaah32.exe 100 PID 2108 wrote to memory of 4376 2108 Oooaah32.exe 100 PID 4376 wrote to memory of 4484 4376 Omcbkl32.exe 101 PID 4376 wrote to memory of 4484 4376 Omcbkl32.exe 101 PID 4376 wrote to memory of 4484 4376 Omcbkl32.exe 101 PID 4484 wrote to memory of 1804 4484 Pijcpmhc.exe 102 PID 4484 wrote to memory of 1804 4484 Pijcpmhc.exe 102 PID 4484 wrote to memory of 1804 4484 Pijcpmhc.exe 102 PID 1804 wrote to memory of 3120 1804 Pbbgicnd.exe 103 PID 1804 wrote to memory of 3120 1804 Pbbgicnd.exe 103 PID 1804 wrote to memory of 3120 1804 Pbbgicnd.exe 103 PID 3120 wrote to memory of 2008 3120 Pbddobla.exe 104 PID 3120 wrote to memory of 2008 3120 Pbddobla.exe 104 PID 3120 wrote to memory of 2008 3120 Pbddobla.exe 104 PID 2008 wrote to memory of 4560 2008 Pmmeak32.exe 105 PID 2008 wrote to memory of 4560 2008 Pmmeak32.exe 105 PID 2008 wrote to memory of 4560 2008 Pmmeak32.exe 105 PID 4560 wrote to memory of 2324 4560 Pehjfm32.exe 106 PID 4560 wrote to memory of 2324 4560 Pehjfm32.exe 106 PID 4560 wrote to memory of 2324 4560 Pehjfm32.exe 106 PID 2324 wrote to memory of 4828 2324 Qejfkmem.exe 107 PID 2324 wrote to memory of 4828 2324 Qejfkmem.exe 107 PID 2324 wrote to memory of 4828 2324 Qejfkmem.exe 107 PID 4828 wrote to memory of 5100 4828 Qbngeadf.exe 108 PID 4828 wrote to memory of 5100 4828 Qbngeadf.exe 108 PID 4828 wrote to memory of 5100 4828 Qbngeadf.exe 108 PID 5100 wrote to memory of 2052 5100 Qpbgnecp.exe 109 PID 5100 wrote to memory of 2052 5100 Qpbgnecp.exe 109 PID 5100 wrote to memory of 2052 5100 Qpbgnecp.exe 109 PID 2052 wrote to memory of 964 2052 Bihhhi32.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d25a1fcc9bef2fef4b749e8c0fcf1900.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d25a1fcc9bef2fef4b749e8c0fcf1900.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\Mklfjm32.exeC:\Windows\system32\Mklfjm32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\Mhpgca32.exeC:\Windows\system32\Mhpgca32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\Mdghhb32.exeC:\Windows\system32\Mdghhb32.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\Nlqloo32.exeC:\Windows\system32\Nlqloo32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Nfiagd32.exeC:\Windows\system32\Nfiagd32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\Nfknmd32.exeC:\Windows\system32\Nfknmd32.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\Nconfh32.exeC:\Windows\system32\Nconfh32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\Ncaklhdi.exeC:\Windows\system32\Ncaklhdi.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\Ookhfigk.exeC:\Windows\system32\Ookhfigk.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\Ochamg32.exeC:\Windows\system32\Ochamg32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\Oooaah32.exeC:\Windows\system32\Oooaah32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\Omcbkl32.exeC:\Windows\system32\Omcbkl32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\Pijcpmhc.exeC:\Windows\system32\Pijcpmhc.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\Pbbgicnd.exeC:\Windows\system32\Pbbgicnd.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Pbddobla.exeC:\Windows\system32\Pbddobla.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\Pmmeak32.exeC:\Windows\system32\Pmmeak32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\Pehjfm32.exeC:\Windows\system32\Pehjfm32.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\Qejfkmem.exeC:\Windows\system32\Qejfkmem.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\Qbngeadf.exeC:\Windows\system32\Qbngeadf.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\Qpbgnecp.exeC:\Windows\system32\Qpbgnecp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\Bihhhi32.exeC:\Windows\system32\Bihhhi32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\Bcpika32.exeC:\Windows\system32\Bcpika32.exe23⤵
- Executes dropped EXE
PID:964 -
C:\Windows\SysWOW64\Bimach32.exeC:\Windows\system32\Bimach32.exe24⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\Bfabmmhe.exeC:\Windows\system32\Bfabmmhe.exe25⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\SysWOW64\Cdebfago.exeC:\Windows\system32\Cdebfago.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3320 -
C:\Windows\SysWOW64\Cdgolq32.exeC:\Windows\system32\Cdgolq32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5072 -
C:\Windows\SysWOW64\Cdjlap32.exeC:\Windows\system32\Cdjlap32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:488 -
C:\Windows\SysWOW64\Cmbpjfij.exeC:\Windows\system32\Cmbpjfij.exe29⤵
- Executes dropped EXE
PID:2504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Cfjeckpj.exeC:\Windows\system32\Cfjeckpj.exe1⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\Cmdmpe32.exeC:\Windows\system32\Cmdmpe32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3580 -
C:\Windows\SysWOW64\Cfmahknh.exeC:\Windows\system32\Cfmahknh.exe3⤵
- Executes dropped EXE
PID:3600 -
C:\Windows\SysWOW64\Dbcbnlcl.exeC:\Windows\system32\Dbcbnlcl.exe4⤵
- Executes dropped EXE
PID:1988
-
-
-
-
C:\Windows\SysWOW64\Dllffa32.exeC:\Windows\system32\Dllffa32.exe1⤵
- Executes dropped EXE
PID:4240 -
C:\Windows\SysWOW64\Dmkcpdao.exeC:\Windows\system32\Dmkcpdao.exe2⤵
- Executes dropped EXE
PID:4900 -
C:\Windows\SysWOW64\Dgdgijhp.exeC:\Windows\system32\Dgdgijhp.exe3⤵
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\Ddhhbngi.exeC:\Windows\system32\Ddhhbngi.exe4⤵
- Executes dropped EXE
PID:2116 -
C:\Windows\SysWOW64\Dlcmgqdd.exeC:\Windows\system32\Dlcmgqdd.exe5⤵
- Executes dropped EXE
PID:4668 -
C:\Windows\SysWOW64\Fncbha32.exeC:\Windows\system32\Fncbha32.exe6⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\Fgkfqgce.exeC:\Windows\system32\Fgkfqgce.exe7⤵
- Executes dropped EXE
PID:4992 -
C:\Windows\SysWOW64\Fdogjk32.exeC:\Windows\system32\Fdogjk32.exe8⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\Ffpcbchm.exeC:\Windows\system32\Ffpcbchm.exe9⤵
- Executes dropped EXE
PID:680 -
C:\Windows\SysWOW64\Fdadpk32.exeC:\Windows\system32\Fdadpk32.exe10⤵
- Executes dropped EXE
PID:3664 -
C:\Windows\SysWOW64\Gphddlfp.exeC:\Windows\system32\Gphddlfp.exe11⤵
- Executes dropped EXE
PID:4576 -
C:\Windows\SysWOW64\Gfemmb32.exeC:\Windows\system32\Gfemmb32.exe12⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\Gcimfg32.exeC:\Windows\system32\Gcimfg32.exe13⤵
- Executes dropped EXE
- Modifies registry class
PID:4964 -
C:\Windows\SysWOW64\Gckjlf32.exeC:\Windows\system32\Gckjlf32.exe14⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\Gjebiq32.exeC:\Windows\system32\Gjebiq32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2416 -
C:\Windows\SysWOW64\Gcngafol.exeC:\Windows\system32\Gcngafol.exe16⤵
- Executes dropped EXE
- Modifies registry class
PID:4024 -
C:\Windows\SysWOW64\Gnckooob.exeC:\Windows\system32\Gnckooob.exe17⤵
- Executes dropped EXE
PID:4672 -
C:\Windows\SysWOW64\Gcpcgfmi.exeC:\Windows\system32\Gcpcgfmi.exe18⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\Hmhhpkcj.exeC:\Windows\system32\Hmhhpkcj.exe19⤵
- Executes dropped EXE
PID:4772 -
C:\Windows\SysWOW64\Hfamia32.exeC:\Windows\system32\Hfamia32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4132 -
C:\Windows\SysWOW64\Hnhdjn32.exeC:\Windows\system32\Hnhdjn32.exe21⤵
- Executes dropped EXE
PID:4016 -
C:\Windows\SysWOW64\Hgpibdam.exeC:\Windows\system32\Hgpibdam.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4932 -
C:\Windows\SysWOW64\Hcgjhega.exeC:\Windows\system32\Hcgjhega.exe23⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\Hjabdo32.exeC:\Windows\system32\Hjabdo32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\Hfhbipdb.exeC:\Windows\system32\Hfhbipdb.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4420 -
C:\Windows\SysWOW64\Hnokjm32.exeC:\Windows\system32\Hnokjm32.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:3512 -
C:\Windows\SysWOW64\Iggocbke.exeC:\Windows\system32\Iggocbke.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4220 -
C:\Windows\SysWOW64\Ifoijonj.exeC:\Windows\system32\Ifoijonj.exe28⤵
- Executes dropped EXE
PID:628 -
C:\Windows\SysWOW64\Imnjbhaa.exeC:\Windows\system32\Imnjbhaa.exe29⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Jfmekm32.exeC:\Windows\system32\Jfmekm32.exe30⤵
- Executes dropped EXE
PID:4392 -
C:\Windows\SysWOW64\Kceoppmo.exeC:\Windows\system32\Kceoppmo.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:1624 -
C:\Windows\SysWOW64\Knkcmild.exeC:\Windows\system32\Knkcmild.exe32⤵
- Executes dropped EXE
PID:3872 -
C:\Windows\SysWOW64\Kffhakjp.exeC:\Windows\system32\Kffhakjp.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4628 -
C:\Windows\SysWOW64\Kallod32.exeC:\Windows\system32\Kallod32.exe34⤵
- Drops file in System32 directory
PID:5112 -
C:\Windows\SysWOW64\Khfdlnab.exeC:\Windows\system32\Khfdlnab.exe35⤵PID:4000
-
C:\Windows\SysWOW64\Onhhmpoo.exeC:\Windows\system32\Onhhmpoo.exe36⤵PID:3476
-
C:\Windows\SysWOW64\Oacdmo32.exeC:\Windows\system32\Oacdmo32.exe37⤵
- Drops file in System32 directory
PID:2508 -
C:\Windows\SysWOW64\Ogqmee32.exeC:\Windows\system32\Ogqmee32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3740 -
C:\Windows\SysWOW64\Onjebpml.exeC:\Windows\system32\Onjebpml.exe39⤵
- Drops file in System32 directory
PID:4632 -
C:\Windows\SysWOW64\Ogcike32.exeC:\Windows\system32\Ogcike32.exe40⤵
- Drops file in System32 directory
- Modifies registry class
PID:516 -
C:\Windows\SysWOW64\Oediim32.exeC:\Windows\system32\Oediim32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1248 -
C:\Windows\SysWOW64\Ginenk32.exeC:\Windows\system32\Ginenk32.exe42⤵
- Modifies registry class
PID:2344 -
C:\Windows\SysWOW64\Gcfjfqah.exeC:\Windows\system32\Gcfjfqah.exe43⤵
- Drops file in System32 directory
PID:3888 -
C:\Windows\SysWOW64\Gedfblql.exeC:\Windows\system32\Gedfblql.exe44⤵PID:2424
-
C:\Windows\SysWOW64\Gpjjpe32.exeC:\Windows\system32\Gpjjpe32.exe45⤵
- Drops file in System32 directory
PID:2812 -
C:\Windows\SysWOW64\Pnlcdg32.exeC:\Windows\system32\Pnlcdg32.exe46⤵
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Qgehml32.exeC:\Windows\system32\Qgehml32.exe47⤵PID:2804
-
C:\Windows\SysWOW64\Qnopjfgi.exeC:\Windows\system32\Qnopjfgi.exe48⤵PID:1960
-
C:\Windows\SysWOW64\Qpmmfbfl.exeC:\Windows\system32\Qpmmfbfl.exe49⤵PID:1500
-
C:\Windows\SysWOW64\Qhddgofo.exeC:\Windows\system32\Qhddgofo.exe50⤵
- Drops file in System32 directory
PID:1912 -
C:\Windows\SysWOW64\Qjeaog32.exeC:\Windows\system32\Qjeaog32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1956 -
C:\Windows\SysWOW64\Aamipe32.exeC:\Windows\system32\Aamipe32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4636 -
C:\Windows\SysWOW64\Ahgamo32.exeC:\Windows\system32\Ahgamo32.exe53⤵PID:4568
-
C:\Windows\SysWOW64\Akgjnj32.exeC:\Windows\system32\Akgjnj32.exe54⤵PID:3728
-
C:\Windows\SysWOW64\Elhnhm32.exeC:\Windows\system32\Elhnhm32.exe55⤵PID:976
-
C:\Windows\SysWOW64\Egoomnin.exeC:\Windows\system32\Egoomnin.exe56⤵
- Drops file in System32 directory
- Modifies registry class
PID:3480 -
C:\Windows\SysWOW64\Pmbcik32.exeC:\Windows\system32\Pmbcik32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3884 -
C:\Windows\SysWOW64\Copajm32.exeC:\Windows\system32\Copajm32.exe58⤵PID:5032
-
C:\Windows\SysWOW64\Lgibjj32.exeC:\Windows\system32\Lgibjj32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4544 -
C:\Windows\SysWOW64\Loqjlg32.exeC:\Windows\system32\Loqjlg32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3404 -
C:\Windows\SysWOW64\Lncjgddf.exeC:\Windows\system32\Lncjgddf.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1384 -
C:\Windows\SysWOW64\Eckogc32.exeC:\Windows\system32\Eckogc32.exe62⤵PID:1244
-
C:\Windows\SysWOW64\Ejegdngb.exeC:\Windows\system32\Ejegdngb.exe63⤵PID:2608
-
C:\Windows\SysWOW64\Elccpife.exeC:\Windows\system32\Elccpife.exe64⤵
- Modifies registry class
PID:4304 -
C:\Windows\SysWOW64\Eoapldei.exeC:\Windows\system32\Eoapldei.exe65⤵PID:2092
-
C:\Windows\SysWOW64\Ebplhp32.exeC:\Windows\system32\Ebplhp32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4036 -
C:\Windows\SysWOW64\Lngmhm32.exeC:\Windows\system32\Lngmhm32.exe67⤵PID:4108
-
C:\Windows\SysWOW64\Mcdepd32.exeC:\Windows\system32\Mcdepd32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4664 -
C:\Windows\SysWOW64\Mkkmaalo.exeC:\Windows\system32\Mkkmaalo.exe69⤵
- Drops file in System32 directory
PID:4796 -
C:\Windows\SysWOW64\Mnjjmmkc.exeC:\Windows\system32\Mnjjmmkc.exe70⤵PID:4196
-
C:\Windows\SysWOW64\Maohdj32.exeC:\Windows\system32\Maohdj32.exe71⤵PID:2064
-
C:\Windows\SysWOW64\Ogqcon32.exeC:\Windows\system32\Ogqcon32.exe72⤵PID:100
-
C:\Windows\SysWOW64\Peddhb32.exeC:\Windows\system32\Peddhb32.exe73⤵PID:1888
-
C:\Windows\SysWOW64\Panabc32.exeC:\Windows\system32\Panabc32.exe74⤵PID:4964
-
C:\Windows\SysWOW64\Pclnon32.exeC:\Windows\system32\Pclnon32.exe75⤵PID:3352
-
C:\Windows\SysWOW64\Pjffkhpl.exeC:\Windows\system32\Pjffkhpl.exe76⤵PID:5020
-
C:\Windows\SysWOW64\Pbpjbe32.exeC:\Windows\system32\Pbpjbe32.exe77⤵
- Drops file in System32 directory
PID:3472 -
C:\Windows\SysWOW64\Pglcjl32.exeC:\Windows\system32\Pglcjl32.exe78⤵PID:544
-
C:\Windows\SysWOW64\Qbbggeli.exeC:\Windows\system32\Qbbggeli.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1264 -
C:\Windows\SysWOW64\Qnihlf32.exeC:\Windows\system32\Qnihlf32.exe80⤵PID:4884
-
C:\Windows\SysWOW64\Qlmhfj32.exeC:\Windows\system32\Qlmhfj32.exe81⤵
- Drops file in System32 directory
PID:4216 -
C:\Windows\SysWOW64\Acjjpllp.exeC:\Windows\system32\Acjjpllp.exe82⤵
- Drops file in System32 directory
PID:4000 -
C:\Windows\SysWOW64\Alaaajmb.exeC:\Windows\system32\Alaaajmb.exe83⤵PID:4580
-
C:\Windows\SysWOW64\Anpnmele.exeC:\Windows\system32\Anpnmele.exe84⤵
- Drops file in System32 directory
PID:376 -
C:\Windows\SysWOW64\Abngccbl.exeC:\Windows\system32\Abngccbl.exe85⤵
- Modifies registry class
PID:400 -
C:\Windows\SysWOW64\Ahjoljqc.exeC:\Windows\system32\Ahjoljqc.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3816 -
C:\Windows\SysWOW64\Andghd32.exeC:\Windows\system32\Andghd32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3024 -
C:\Windows\SysWOW64\Bngdndfn.exeC:\Windows\system32\Bngdndfn.exe88⤵PID:1988
-
C:\Windows\SysWOW64\Bhohfj32.exeC:\Windows\system32\Bhohfj32.exe89⤵
- Drops file in System32 directory
PID:3252 -
C:\Windows\SysWOW64\Becipn32.exeC:\Windows\system32\Becipn32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1136 -
C:\Windows\SysWOW64\Blmamh32.exeC:\Windows\system32\Blmamh32.exe91⤵
- Modifies registry class
PID:2544 -
C:\Windows\SysWOW64\Bajjeo32.exeC:\Windows\system32\Bajjeo32.exe92⤵PID:4876
-
C:\Windows\SysWOW64\Bdkbgj32.exeC:\Windows\system32\Bdkbgj32.exe93⤵
- Modifies registry class
PID:1592 -
C:\Windows\SysWOW64\Ckghid32.exeC:\Windows\system32\Ckghid32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4900 -
C:\Windows\SysWOW64\Cbnpja32.exeC:\Windows\system32\Cbnpja32.exe95⤵
- Modifies registry class
PID:4740 -
C:\Windows\SysWOW64\Ckladcoa.exeC:\Windows\system32\Ckladcoa.exe96⤵PID:1368
-
C:\Windows\SysWOW64\Elkfed32.exeC:\Windows\system32\Elkfed32.exe97⤵PID:4232
-
C:\Windows\SysWOW64\Eceoanpo.exeC:\Windows\system32\Eceoanpo.exe98⤵PID:728
-
C:\Windows\SysWOW64\Edkddeag.exeC:\Windows\system32\Edkddeag.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2928 -
C:\Windows\SysWOW64\Fkalmn32.exeC:\Windows\system32\Fkalmn32.exe100⤵PID:2540
-
C:\Windows\SysWOW64\Fbkdjh32.exeC:\Windows\system32\Fbkdjh32.exe101⤵PID:4296
-
C:\Windows\SysWOW64\Fkcibnmd.exeC:\Windows\system32\Fkcibnmd.exe102⤵PID:1728
-
C:\Windows\SysWOW64\Gbmaog32.exeC:\Windows\system32\Gbmaog32.exe103⤵PID:4024
-
C:\Windows\SysWOW64\Gkffhmka.exeC:\Windows\system32\Gkffhmka.exe104⤵PID:4700
-
C:\Windows\SysWOW64\Gdnjabab.exeC:\Windows\system32\Gdnjabab.exe105⤵PID:1304
-
C:\Windows\SysWOW64\Goconkah.exeC:\Windows\system32\Goconkah.exe106⤵
- Drops file in System32 directory
PID:972 -
C:\Windows\SysWOW64\Gbbkjgpl.exeC:\Windows\system32\Gbbkjgpl.exe107⤵PID:3944
-
C:\Windows\SysWOW64\Gfpcpefb.exeC:\Windows\system32\Gfpcpefb.exe108⤵
- Drops file in System32 directory
PID:3868 -
C:\Windows\SysWOW64\Gohhik32.exeC:\Windows\system32\Gohhik32.exe109⤵
- Modifies registry class
PID:720 -
C:\Windows\SysWOW64\Hmoehojj.exeC:\Windows\system32\Hmoehojj.exe110⤵PID:2816
-
C:\Windows\SysWOW64\Hkkhjj32.exeC:\Windows\system32\Hkkhjj32.exe111⤵
- Drops file in System32 directory
PID:4336 -
C:\Windows\SysWOW64\Hpfdkiac.exeC:\Windows\system32\Hpfdkiac.exe112⤵PID:4368
-
C:\Windows\SysWOW64\Ipiaphop.exeC:\Windows\system32\Ipiaphop.exe113⤵PID:1344
-
C:\Windows\SysWOW64\Ibijbc32.exeC:\Windows\system32\Ibijbc32.exe114⤵PID:1324
-
C:\Windows\SysWOW64\Ipmjkh32.exeC:\Windows\system32\Ipmjkh32.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:856 -
C:\Windows\SysWOW64\Iejcco32.exeC:\Windows\system32\Iejcco32.exe116⤵
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Ibncmchl.exeC:\Windows\system32\Ibncmchl.exe117⤵PID:1492
-
C:\Windows\SysWOW64\Ifjoma32.exeC:\Windows\system32\Ifjoma32.exe118⤵PID:324
-
C:\Windows\SysWOW64\Jpbdfgge.exeC:\Windows\system32\Jpbdfgge.exe119⤵
- Modifies registry class
PID:1340 -
C:\Windows\SysWOW64\Aclpkffa.exeC:\Windows\system32\Aclpkffa.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1232 -
C:\Windows\SysWOW64\Agglld32.exeC:\Windows\system32\Agglld32.exe121⤵
- Modifies registry class
PID:4992 -
C:\Windows\SysWOW64\Ajfhhp32.exeC:\Windows\system32\Ajfhhp32.exe122⤵PID:2288
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-