Analysis
-
max time kernel
127s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 17:18
Behavioral task
behavioral1
Sample
NEAS.462cc16787a2e39cc55cb4be4416a490.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.462cc16787a2e39cc55cb4be4416a490.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.462cc16787a2e39cc55cb4be4416a490.exe
-
Size
464KB
-
MD5
462cc16787a2e39cc55cb4be4416a490
-
SHA1
8f65815131dc285b4b2a8c1163d8442ce17686a0
-
SHA256
c02b4a11ecb815367cb5d32e3a4e83c3ba7332f3e8f4c829682262fa619e408c
-
SHA512
21753e76d9ec4dd6568117b69236d46ce90ca2c3c670e0dc93fe2cc6d664fe1bca80ab2df245e9a1c3b6598bc41c3dcfebb0d86921a6ebddd3e9c01c34b56f47
-
SSDEEP
6144:hEOYh2MxxJCh7aOl3BzrUmKyIxLfYeOO9UmKyIxLiajOEjXP3HBsR4/0ePGSzxru:hEaqxA7aOlxzr3cOK3TajRfXFMKNxr9E
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dlpigk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eldbbjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dalkek32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aecialmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ecdkdj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pnhacn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnehdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cpbbak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bglgdi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kanidd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pnhacn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fofdkcmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ephlnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jepbodhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kanidd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lmlpjdgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pdbbfadn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdqcenmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pcbdcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Piaiqlak.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Celgjlpn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hqkjaifk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpnbmi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdpagc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Moefdljc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmkcpdao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Japmcfcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfilkj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmmmnp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcgekjgp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obkahddl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofijnbkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eippgckc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Kfanflne.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qhghge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gccmaack.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hnjaonij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eekjep32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjfjee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cekhihig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Lacbpccn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oklifdmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hpaqqdjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qpkppbho.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eipilmgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ahgamo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.462cc16787a2e39cc55cb4be4416a490.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Inhmqlmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Mknlef32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blgddd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Afpbkicl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pdofpb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nofoki32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfpghccm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ooangh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmpgghoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ogjpld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bfnnmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cicqja32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdjlap32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Elhfbp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpmeimpn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fekclnif.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cleqfb32.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x00090000000224ad-6.dat family_berbew behavioral2/files/0x00090000000224ad-7.dat family_berbew behavioral2/files/0x0006000000022e63-14.dat family_berbew behavioral2/files/0x0006000000022e63-16.dat family_berbew behavioral2/files/0x0006000000022e6d-22.dat family_berbew behavioral2/files/0x0006000000022e6d-24.dat family_berbew behavioral2/files/0x0006000000022e70-32.dat family_berbew behavioral2/files/0x0006000000022e70-30.dat family_berbew behavioral2/files/0x0006000000022e73-40.dat family_berbew behavioral2/files/0x0006000000022e73-38.dat family_berbew behavioral2/files/0x0006000000022e77-54.dat family_berbew behavioral2/files/0x0006000000022e77-55.dat family_berbew behavioral2/files/0x0006000000022e75-46.dat family_berbew behavioral2/files/0x0006000000022e75-47.dat family_berbew behavioral2/files/0x0006000000022e79-64.dat family_berbew behavioral2/files/0x0006000000022e79-62.dat family_berbew behavioral2/files/0x0007000000022e7c-70.dat family_berbew behavioral2/files/0x0007000000022e7c-71.dat family_berbew behavioral2/files/0x0006000000022e7f-78.dat family_berbew behavioral2/files/0x0006000000022e7f-79.dat family_berbew behavioral2/files/0x0006000000022e81-87.dat family_berbew behavioral2/files/0x0006000000022e81-86.dat family_berbew behavioral2/files/0x0006000000022e83-95.dat family_berbew behavioral2/files/0x0006000000022e86-102.dat family_berbew behavioral2/files/0x0006000000022e88-110.dat family_berbew behavioral2/files/0x0006000000022e8a-118.dat family_berbew behavioral2/files/0x0006000000022e8a-119.dat family_berbew behavioral2/files/0x0006000000022e8c-127.dat family_berbew behavioral2/files/0x0006000000022e90-142.dat family_berbew behavioral2/files/0x0006000000022e90-141.dat family_berbew behavioral2/files/0x0006000000022e97-163.dat family_berbew behavioral2/files/0x0006000000022e99-170.dat family_berbew behavioral2/files/0x0006000000022e9d-176.dat family_berbew behavioral2/files/0x0006000000022e9f-184.dat family_berbew behavioral2/files/0x0006000000022ea1-191.dat family_berbew behavioral2/files/0x0006000000022ea3-197.dat family_berbew behavioral2/files/0x0006000000022ea5-205.dat family_berbew behavioral2/files/0x0006000000022ea7-212.dat family_berbew behavioral2/files/0x0006000000022ea9-219.dat family_berbew behavioral2/files/0x0006000000022ead-233.dat family_berbew behavioral2/files/0x0006000000022eaf-240.dat family_berbew behavioral2/files/0x0006000000022eaf-239.dat family_berbew behavioral2/files/0x0006000000022ead-232.dat family_berbew behavioral2/files/0x0006000000022eab-226.dat family_berbew behavioral2/files/0x0006000000022eab-225.dat family_berbew behavioral2/files/0x0006000000022ea9-218.dat family_berbew behavioral2/files/0x0006000000022ea7-211.dat family_berbew behavioral2/files/0x0006000000022ea5-204.dat family_berbew behavioral2/files/0x0006000000022ea3-198.dat family_berbew behavioral2/files/0x0006000000022ea1-190.dat family_berbew behavioral2/files/0x0006000000022e9f-183.dat family_berbew behavioral2/files/0x0006000000022e9d-177.dat family_berbew behavioral2/files/0x0006000000022e99-169.dat family_berbew behavioral2/files/0x0006000000022e97-162.dat family_berbew behavioral2/files/0x0007000000022e95-156.dat family_berbew behavioral2/files/0x0007000000022e95-155.dat family_berbew behavioral2/files/0x0006000000022e92-149.dat family_berbew behavioral2/files/0x0006000000022e92-148.dat family_berbew behavioral2/files/0x0006000000022e8e-135.dat family_berbew behavioral2/files/0x0006000000022e8e-134.dat family_berbew behavioral2/files/0x0006000000022e8c-126.dat family_berbew behavioral2/files/0x0006000000022e88-111.dat family_berbew behavioral2/files/0x0006000000022e86-103.dat family_berbew behavioral2/files/0x0006000000022e83-94.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 4952 Njgqhicg.exe 4880 Hccggl32.exe 4816 Hcjmhk32.exe 3660 Lojfin32.exe 2664 Mclhjkfa.exe 1300 Mociol32.exe 2956 Mdpagc32.exe 1884 Moefdljc.exe 1464 Mojopk32.exe 4772 Nomlek32.exe 4204 Nefdbekh.exe 4960 Nooikj32.exe 5008 Nhgmcp32.exe 320 Ncmaai32.exe 3092 Nhjjip32.exe 3180 Nconfh32.exe 4696 Nhlfoodc.exe 4756 Nofoki32.exe 3308 Nfpghccm.exe 5024 Ocdgahag.exe 3520 Ohqpjo32.exe 4128 Ocfdgg32.exe 3388 Ohcmpn32.exe 4148 Oomelheh.exe 2724 Obkahddl.exe 4724 Oheienli.exe 5080 Oooaah32.exe 2688 Ofijnbkb.exe 3228 Ohhfknjf.exe 4516 Ooangh32.exe 5100 Oflfdbip.exe 220 Pmeoqlpl.exe 4020 Pcpgmf32.exe 4752 Pdqcenmg.exe 3220 Pmhkflnj.exe 4964 Pcbdcf32.exe 4024 Pecpknke.exe 3640 Pkmhgh32.exe 3068 Pbgqdb32.exe 4848 Piaiqlak.exe 2980 Apgqie32.exe 4276 Aecialmb.exe 3852 Almanf32.exe 456 Ammnhilb.exe 1536 Abjfqpji.exe 4248 Bifkcioc.exe 3888 Bclppboi.exe 4180 Blgddd32.exe 1828 Bpemkcck.exe 3892 Beaecjab.exe 216 Bbefln32.exe 4600 Blnjecfl.exe 2148 Cdebfago.exe 4320 Cefoni32.exe 3160 Clpgkcdj.exe 2392 Cffkhl32.exe 3048 Cdjlap32.exe 1000 Cekhihig.exe 4184 Cleqfb32.exe 324 Cdlhgpag.exe 3024 Ciiaogon.exe 952 Cfmahknh.exe 4828 Cmgjee32.exe 3736 Dfonnk32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Oejcki32.dll Oafacn32.exe File opened for modification C:\Windows\SysWOW64\Pfpidk32.exe Pnhacn32.exe File created C:\Windows\SysWOW64\Kffhakjp.exe Kmncif32.exe File opened for modification C:\Windows\SysWOW64\Nkjlqd32.exe Ndpcdjho.exe File created C:\Windows\SysWOW64\Kgkhkced.dll Flcfnn32.exe File opened for modification C:\Windows\SysWOW64\Lmjcdd32.exe Lacbpccn.exe File created C:\Windows\SysWOW64\Qhghge32.exe Qfilkj32.exe File created C:\Windows\SysWOW64\Fcodfa32.exe Fpqgjf32.exe File created C:\Windows\SysWOW64\Janpnfee.exe Jfhlpnfp.exe File created C:\Windows\SysWOW64\Jfoaam32.exe Jjhalkjc.exe File opened for modification C:\Windows\SysWOW64\Pgaelcgm.exe Pfpidk32.exe File created C:\Windows\SysWOW64\Olpigmpg.dll Ainnhdbp.exe File opened for modification C:\Windows\SysWOW64\Belemd32.exe Bfghlhmd.exe File created C:\Windows\SysWOW64\Dcgpmj32.dll Cnpibh32.exe File created C:\Windows\SysWOW64\Bhalpn32.dll Mclhjkfa.exe File created C:\Windows\SysWOW64\Ladlqj32.dll Cleqfb32.exe File opened for modification C:\Windows\SysWOW64\Kfanflne.exe Jepbodhg.exe File opened for modification C:\Windows\SysWOW64\Nncoaq32.exe Namnmp32.exe File created C:\Windows\SysWOW64\Cgaqphgl.exe Cebdcmhh.exe File created C:\Windows\SysWOW64\Ddegdohc.dll Kmncif32.exe File created C:\Windows\SysWOW64\Ingkdn32.dll Dpnbmi32.exe File created C:\Windows\SysWOW64\Okcfidmn.dll Ncmaai32.exe File opened for modification C:\Windows\SysWOW64\Pcpgmf32.exe Pmeoqlpl.exe File opened for modification C:\Windows\SysWOW64\Qbkcek32.exe Pgeogb32.exe File created C:\Windows\SysWOW64\Jgblkajh.dll Anfmeldl.exe File created C:\Windows\SysWOW64\Kjopbd32.exe Kcehejic.exe File opened for modification C:\Windows\SysWOW64\Dfonnk32.exe Cmgjee32.exe File opened for modification C:\Windows\SysWOW64\Pdeffgff.exe Pbfjjlgc.exe File created C:\Windows\SysWOW64\Dpnbmi32.exe Didjqoae.exe File created C:\Windows\SysWOW64\Pdeffgff.exe Pbfjjlgc.exe File created C:\Windows\SysWOW64\Bfnnmg32.exe Bkhjpn32.exe File opened for modification C:\Windows\SysWOW64\Oediim32.exe Okneldkf.exe File created C:\Windows\SysWOW64\Njgqhicg.exe NEAS.462cc16787a2e39cc55cb4be4416a490.exe File created C:\Windows\SysWOW64\Knojng32.dll Pbgqdb32.exe File created C:\Windows\SysWOW64\Blgddd32.exe Bclppboi.exe File opened for modification C:\Windows\SysWOW64\Pjahchpb.exe Pgpobmca.exe File opened for modification C:\Windows\SysWOW64\Flfbcndo.exe Fgijkgeh.exe File opened for modification C:\Windows\SysWOW64\Dfemdcba.exe Dlpigk32.exe File created C:\Windows\SysWOW64\Pjbofkpn.dll Epehnhbj.exe File created C:\Windows\SysWOW64\Hcjmhk32.exe Hccggl32.exe File created C:\Windows\SysWOW64\Cefnemqj.dll Almanf32.exe File created C:\Windows\SysWOW64\Cnboma32.exe Cejjdlap.exe File created C:\Windows\SysWOW64\Cqgkidki.dll Nfpghccm.exe File opened for modification C:\Windows\SysWOW64\Kmmmnp32.exe Kjopbd32.exe File created C:\Windows\SysWOW64\Neiiibnn.dll Cekhihig.exe File created C:\Windows\SysWOW64\Cinndkag.dll Dhbqalle.exe File created C:\Windows\SysWOW64\Omabnq32.dll Mackfa32.exe File created C:\Windows\SysWOW64\Bjfjee32.exe Bqnemp32.exe File opened for modification C:\Windows\SysWOW64\Hjlhipbc.exe Hnehdo32.exe File created C:\Windows\SysWOW64\Ikpnha32.dll Kallod32.exe File created C:\Windows\SysWOW64\Nnomjn32.dll Epeohn32.exe File opened for modification C:\Windows\SysWOW64\Qfilkj32.exe Qoocnpag.exe File created C:\Windows\SysWOW64\Nlaakbkm.dll Pjahchpb.exe File created C:\Windows\SysWOW64\Bclppboi.exe Bifkcioc.exe File opened for modification C:\Windows\SysWOW64\Cdebfago.exe Blnjecfl.exe File opened for modification C:\Windows\SysWOW64\Eipilmgh.exe Efampahd.exe File created C:\Windows\SysWOW64\Adnbapjp.exe Aaofedkl.exe File created C:\Windows\SysWOW64\Accheolp.dll Fgncff32.exe File created C:\Windows\SysWOW64\Cecnce32.dll Pkhhbbck.exe File created C:\Windows\SysWOW64\Daaioh32.dll Eeodqocd.exe File opened for modification C:\Windows\SysWOW64\Fpqgjf32.exe Fhiphi32.exe File created C:\Windows\SysWOW64\Ajjjjghg.exe Aglnnkid.exe File created C:\Windows\SysWOW64\Pcbdcf32.exe Pmhkflnj.exe File created C:\Windows\SysWOW64\Necqbo32.exe Mknlef32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 8476 8424 WerFault.exe 380 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lojfin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Oeopnmoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jmpgghoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggcogflc.dll" Onhhmpoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lddqbbco.dll" Adnbapjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Icciccmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cbihmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Gipbck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qdihfq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjigocdh.dll" Mdpagc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nooikj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fpfholhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lpipoahh.dll" Ecidpiad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qbaqaamj.dll" Mobbdf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jmpgghoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mgngih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qlqidj32.dll" Afdkfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plpjjm32.dll" Dfemdcba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Japmcfcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elngne32.dll" Nolekd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idcdeb32.dll" Blgddd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bggdhock.dll" Eennefib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmnfcojj.dll" Fpmeimpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afdkfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ifcdpf32.dll" Pdbbfadn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pgpobmca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oheienli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cffkhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Akfdcq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mhfmbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cfgace32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Anmmkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhejfl32.dll" Moefdljc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bplmeg32.dll" Cgagjo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eldbbjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pgpobmca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hnjaonij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kmeiie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mojopk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfdnkk32.dll" Cdlhgpag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cmgjee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dmkcpdao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Nnabladg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ofijnbkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fekclnif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cgaqphgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pkmhgh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ddcogo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ecidpiad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpgcpo32.dll" Iaifbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbmqcp32.dll" Lacbpccn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjegpf32.dll" Pfdbpjmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inkqjp32.dll" Oomelheh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pcbdcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcoeiajc.dll" Pcbdcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Eipilmgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ceiemclg.dll" Fhiphi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pdbbfadn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ohqpjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lelajb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dfemdcba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bdgehobe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cdlhgpag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jfoaam32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 4952 2744 NEAS.462cc16787a2e39cc55cb4be4416a490.exe 88 PID 2744 wrote to memory of 4952 2744 NEAS.462cc16787a2e39cc55cb4be4416a490.exe 88 PID 2744 wrote to memory of 4952 2744 NEAS.462cc16787a2e39cc55cb4be4416a490.exe 88 PID 4952 wrote to memory of 4880 4952 Njgqhicg.exe 90 PID 4952 wrote to memory of 4880 4952 Njgqhicg.exe 90 PID 4952 wrote to memory of 4880 4952 Njgqhicg.exe 90 PID 4880 wrote to memory of 4816 4880 Hccggl32.exe 91 PID 4880 wrote to memory of 4816 4880 Hccggl32.exe 91 PID 4880 wrote to memory of 4816 4880 Hccggl32.exe 91 PID 4816 wrote to memory of 3660 4816 Hcjmhk32.exe 92 PID 4816 wrote to memory of 3660 4816 Hcjmhk32.exe 92 PID 4816 wrote to memory of 3660 4816 Hcjmhk32.exe 92 PID 3660 wrote to memory of 2664 3660 Lojfin32.exe 94 PID 3660 wrote to memory of 2664 3660 Lojfin32.exe 94 PID 3660 wrote to memory of 2664 3660 Lojfin32.exe 94 PID 2664 wrote to memory of 1300 2664 Mclhjkfa.exe 95 PID 2664 wrote to memory of 1300 2664 Mclhjkfa.exe 95 PID 2664 wrote to memory of 1300 2664 Mclhjkfa.exe 95 PID 1300 wrote to memory of 2956 1300 Mociol32.exe 96 PID 1300 wrote to memory of 2956 1300 Mociol32.exe 96 PID 1300 wrote to memory of 2956 1300 Mociol32.exe 96 PID 2956 wrote to memory of 1884 2956 Mdpagc32.exe 97 PID 2956 wrote to memory of 1884 2956 Mdpagc32.exe 97 PID 2956 wrote to memory of 1884 2956 Mdpagc32.exe 97 PID 1884 wrote to memory of 1464 1884 Moefdljc.exe 98 PID 1884 wrote to memory of 1464 1884 Moefdljc.exe 98 PID 1884 wrote to memory of 1464 1884 Moefdljc.exe 98 PID 1464 wrote to memory of 4772 1464 Mojopk32.exe 99 PID 1464 wrote to memory of 4772 1464 Mojopk32.exe 99 PID 1464 wrote to memory of 4772 1464 Mojopk32.exe 99 PID 4772 wrote to memory of 4204 4772 Nomlek32.exe 129 PID 4772 wrote to memory of 4204 4772 Nomlek32.exe 129 PID 4772 wrote to memory of 4204 4772 Nomlek32.exe 129 PID 4204 wrote to memory of 4960 4204 Nefdbekh.exe 100 PID 4204 wrote to memory of 4960 4204 Nefdbekh.exe 100 PID 4204 wrote to memory of 4960 4204 Nefdbekh.exe 100 PID 4960 wrote to memory of 5008 4960 Nooikj32.exe 128 PID 4960 wrote to memory of 5008 4960 Nooikj32.exe 128 PID 4960 wrote to memory of 5008 4960 Nooikj32.exe 128 PID 5008 wrote to memory of 320 5008 Nhgmcp32.exe 101 PID 5008 wrote to memory of 320 5008 Nhgmcp32.exe 101 PID 5008 wrote to memory of 320 5008 Nhgmcp32.exe 101 PID 320 wrote to memory of 3092 320 Ncmaai32.exe 127 PID 320 wrote to memory of 3092 320 Ncmaai32.exe 127 PID 320 wrote to memory of 3092 320 Ncmaai32.exe 127 PID 3092 wrote to memory of 3180 3092 Nhjjip32.exe 126 PID 3092 wrote to memory of 3180 3092 Nhjjip32.exe 126 PID 3092 wrote to memory of 3180 3092 Nhjjip32.exe 126 PID 3180 wrote to memory of 4696 3180 Nconfh32.exe 125 PID 3180 wrote to memory of 4696 3180 Nconfh32.exe 125 PID 3180 wrote to memory of 4696 3180 Nconfh32.exe 125 PID 4696 wrote to memory of 4756 4696 Nhlfoodc.exe 102 PID 4696 wrote to memory of 4756 4696 Nhlfoodc.exe 102 PID 4696 wrote to memory of 4756 4696 Nhlfoodc.exe 102 PID 4756 wrote to memory of 3308 4756 Nofoki32.exe 124 PID 4756 wrote to memory of 3308 4756 Nofoki32.exe 124 PID 4756 wrote to memory of 3308 4756 Nofoki32.exe 124 PID 3308 wrote to memory of 5024 3308 Nfpghccm.exe 123 PID 3308 wrote to memory of 5024 3308 Nfpghccm.exe 123 PID 3308 wrote to memory of 5024 3308 Nfpghccm.exe 123 PID 5024 wrote to memory of 3520 5024 Ocdgahag.exe 104 PID 5024 wrote to memory of 3520 5024 Ocdgahag.exe 104 PID 5024 wrote to memory of 3520 5024 Ocdgahag.exe 104 PID 3520 wrote to memory of 4128 3520 Ohqpjo32.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.462cc16787a2e39cc55cb4be4416a490.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.462cc16787a2e39cc55cb4be4416a490.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\Njgqhicg.exeC:\Windows\system32\Njgqhicg.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\Hccggl32.exeC:\Windows\system32\Hccggl32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\Hcjmhk32.exeC:\Windows\system32\Hcjmhk32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\Lojfin32.exeC:\Windows\system32\Lojfin32.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\Mclhjkfa.exeC:\Windows\system32\Mclhjkfa.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Mociol32.exeC:\Windows\system32\Mociol32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\Mdpagc32.exeC:\Windows\system32\Mdpagc32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\Moefdljc.exeC:\Windows\system32\Moefdljc.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\Mojopk32.exeC:\Windows\system32\Mojopk32.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\Nomlek32.exeC:\Windows\system32\Nomlek32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\Nefdbekh.exeC:\Windows\system32\Nefdbekh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Nooikj32.exeC:\Windows\system32\Nooikj32.exe1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Nhgmcp32.exeC:\Windows\system32\Nhgmcp32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008
-
-
C:\Windows\SysWOW64\Ncmaai32.exeC:\Windows\system32\Ncmaai32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\Nhjjip32.exeC:\Windows\system32\Nhjjip32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092
-
-
C:\Windows\SysWOW64\Nofoki32.exeC:\Windows\system32\Nofoki32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\Nfpghccm.exeC:\Windows\system32\Nfpghccm.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3308
-
-
C:\Windows\SysWOW64\Ohqpjo32.exeC:\Windows\system32\Ohqpjo32.exe1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\Ocfdgg32.exeC:\Windows\system32\Ocfdgg32.exe2⤵
- Executes dropped EXE
PID:4128 -
C:\Windows\SysWOW64\Ohcmpn32.exeC:\Windows\system32\Ohcmpn32.exe3⤵
- Executes dropped EXE
PID:3388
-
-
-
C:\Windows\SysWOW64\Oflfdbip.exeC:\Windows\system32\Oflfdbip.exe1⤵
- Executes dropped EXE
PID:5100 -
C:\Windows\SysWOW64\Pmeoqlpl.exeC:\Windows\system32\Pmeoqlpl.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:220
-
-
C:\Windows\SysWOW64\Pmhkflnj.exeC:\Windows\system32\Pmhkflnj.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3220 -
C:\Windows\SysWOW64\Pcbdcf32.exeC:\Windows\system32\Pcbdcf32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4964 -
C:\Windows\SysWOW64\Pecpknke.exeC:\Windows\system32\Pecpknke.exe3⤵
- Executes dropped EXE
PID:4024 -
C:\Windows\SysWOW64\Pkmhgh32.exeC:\Windows\system32\Pkmhgh32.exe4⤵
- Executes dropped EXE
- Modifies registry class
PID:3640 -
C:\Windows\SysWOW64\Pbgqdb32.exeC:\Windows\system32\Pbgqdb32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3068 -
C:\Windows\SysWOW64\Piaiqlak.exeC:\Windows\system32\Piaiqlak.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4848 -
C:\Windows\SysWOW64\Apgqie32.exeC:\Windows\system32\Apgqie32.exe7⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\Aecialmb.exeC:\Windows\system32\Aecialmb.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4276 -
C:\Windows\SysWOW64\Almanf32.exeC:\Windows\system32\Almanf32.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3852 -
C:\Windows\SysWOW64\Ammnhilb.exeC:\Windows\system32\Ammnhilb.exe10⤵
- Executes dropped EXE
PID:456 -
C:\Windows\SysWOW64\Abjfqpji.exeC:\Windows\system32\Abjfqpji.exe11⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\Bifkcioc.exeC:\Windows\system32\Bifkcioc.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4248 -
C:\Windows\SysWOW64\Bclppboi.exeC:\Windows\system32\Bclppboi.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3888 -
C:\Windows\SysWOW64\Blgddd32.exeC:\Windows\system32\Blgddd32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4180 -
C:\Windows\SysWOW64\Bbalaoda.exeC:\Windows\system32\Bbalaoda.exe15⤵PID:1640
-
C:\Windows\SysWOW64\Bpemkcck.exeC:\Windows\system32\Bpemkcck.exe16⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\Beaecjab.exeC:\Windows\system32\Beaecjab.exe17⤵
- Executes dropped EXE
PID:3892 -
C:\Windows\SysWOW64\Bbefln32.exeC:\Windows\system32\Bbefln32.exe18⤵
- Executes dropped EXE
PID:216 -
C:\Windows\SysWOW64\Blnjecfl.exeC:\Windows\system32\Blnjecfl.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4600 -
C:\Windows\SysWOW64\Cdebfago.exeC:\Windows\system32\Cdebfago.exe20⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\Cefoni32.exeC:\Windows\system32\Cefoni32.exe21⤵
- Executes dropped EXE
PID:4320 -
C:\Windows\SysWOW64\Clpgkcdj.exeC:\Windows\system32\Clpgkcdj.exe22⤵
- Executes dropped EXE
PID:3160 -
C:\Windows\SysWOW64\Cffkhl32.exeC:\Windows\system32\Cffkhl32.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:2392 -
C:\Windows\SysWOW64\Cdjlap32.exeC:\Windows\system32\Cdjlap32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\Cekhihig.exeC:\Windows\system32\Cekhihig.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1000 -
C:\Windows\SysWOW64\Cleqfb32.exeC:\Windows\system32\Cleqfb32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4184 -
C:\Windows\SysWOW64\Cdlhgpag.exeC:\Windows\system32\Cdlhgpag.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:324 -
C:\Windows\SysWOW64\Ciiaogon.exeC:\Windows\system32\Ciiaogon.exe28⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\Cfmahknh.exeC:\Windows\system32\Cfmahknh.exe29⤵
- Executes dropped EXE
PID:952 -
C:\Windows\SysWOW64\Cmgjee32.exeC:\Windows\system32\Cmgjee32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4828 -
C:\Windows\SysWOW64\Dfonnk32.exeC:\Windows\system32\Dfonnk32.exe31⤵
- Executes dropped EXE
PID:3736 -
C:\Windows\SysWOW64\Ddcogo32.exeC:\Windows\system32\Ddcogo32.exe32⤵
- Modifies registry class
PID:2456 -
C:\Windows\SysWOW64\Dfakcj32.exeC:\Windows\system32\Dfakcj32.exe33⤵PID:1148
-
C:\Windows\SysWOW64\Dmkcpdao.exeC:\Windows\system32\Dmkcpdao.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2668 -
C:\Windows\SysWOW64\Didqkeeq.exeC:\Windows\system32\Didqkeeq.exe35⤵PID:4288
-
C:\Windows\SysWOW64\Ddjehneg.exeC:\Windows\system32\Ddjehneg.exe36⤵PID:1088
-
C:\Windows\SysWOW64\Dekapfke.exeC:\Windows\system32\Dekapfke.exe37⤵PID:3552
-
C:\Windows\SysWOW64\Ecoaijio.exeC:\Windows\system32\Ecoaijio.exe38⤵PID:2028
-
C:\Windows\SysWOW64\Eennefib.exeC:\Windows\system32\Eennefib.exe39⤵
- Modifies registry class
PID:5052 -
C:\Windows\SysWOW64\Elhfbp32.exeC:\Windows\system32\Elhfbp32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4316 -
C:\Windows\SysWOW64\Egmjpi32.exeC:\Windows\system32\Egmjpi32.exe41⤵PID:2520
-
C:\Windows\SysWOW64\Eilfldoi.exeC:\Windows\system32\Eilfldoi.exe42⤵PID:3580
-
C:\Windows\SysWOW64\Epeohn32.exeC:\Windows\system32\Epeohn32.exe43⤵
- Drops file in System32 directory
PID:4596 -
C:\Windows\SysWOW64\Ecdkdj32.exeC:\Windows\system32\Ecdkdj32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4680 -
C:\Windows\SysWOW64\Emioab32.exeC:\Windows\system32\Emioab32.exe45⤵PID:5140
-
C:\Windows\SysWOW64\Ephlnn32.exeC:\Windows\system32\Ephlnn32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5180 -
C:\Windows\SysWOW64\Eippgckc.exeC:\Windows\system32\Eippgckc.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5220 -
C:\Windows\SysWOW64\Ecidpiad.exeC:\Windows\system32\Ecidpiad.exe48⤵
- Modifies registry class
PID:5260 -
C:\Windows\SysWOW64\Eegqldqg.exeC:\Windows\system32\Eegqldqg.exe49⤵PID:5300
-
C:\Windows\SysWOW64\Fpmeimpn.exeC:\Windows\system32\Fpmeimpn.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5344 -
C:\Windows\SysWOW64\Fjeibc32.exeC:\Windows\system32\Fjeibc32.exe51⤵PID:5384
-
C:\Windows\SysWOW64\Flcfnn32.exeC:\Windows\system32\Flcfnn32.exe52⤵
- Drops file in System32 directory
PID:5424 -
C:\Windows\SysWOW64\Fgijkgeh.exeC:\Windows\system32\Fgijkgeh.exe53⤵
- Drops file in System32 directory
PID:5464 -
C:\Windows\SysWOW64\Flfbcndo.exeC:\Windows\system32\Flfbcndo.exe54⤵PID:5504
-
C:\Windows\SysWOW64\Fgncff32.exeC:\Windows\system32\Fgncff32.exe55⤵
- Drops file in System32 directory
PID:5544 -
C:\Windows\SysWOW64\Fnglcqio.exeC:\Windows\system32\Fnglcqio.exe56⤵PID:5584
-
C:\Windows\SysWOW64\Fpfholhc.exeC:\Windows\system32\Fpfholhc.exe57⤵
- Modifies registry class
PID:5624 -
C:\Windows\SysWOW64\Ffcpgcfj.exeC:\Windows\system32\Ffcpgcfj.exe58⤵PID:5664
-
C:\Windows\SysWOW64\Gphddlfp.exeC:\Windows\system32\Gphddlfp.exe59⤵PID:5704
-
C:\Windows\SysWOW64\Gfemmb32.exeC:\Windows\system32\Gfemmb32.exe60⤵PID:5744
-
C:\Windows\SysWOW64\Gcimfg32.exeC:\Windows\system32\Gcimfg32.exe61⤵PID:5788
-
C:\Windows\SysWOW64\Glabolja.exeC:\Windows\system32\Glabolja.exe62⤵PID:5828
-
C:\Windows\SysWOW64\Gfjfhbpb.exeC:\Windows\system32\Gfjfhbpb.exe63⤵PID:5868
-
C:\Windows\SysWOW64\Ggicbe32.exeC:\Windows\system32\Ggicbe32.exe64⤵PID:5908
-
C:\Windows\SysWOW64\Gcpcgfmi.exeC:\Windows\system32\Gcpcgfmi.exe65⤵PID:5948
-
C:\Windows\SysWOW64\Hnehdo32.exeC:\Windows\system32\Hnehdo32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5988 -
C:\Windows\SysWOW64\Hjlhipbc.exeC:\Windows\system32\Hjlhipbc.exe67⤵PID:6028
-
C:\Windows\SysWOW64\Hcembe32.exeC:\Windows\system32\Hcembe32.exe68⤵PID:6072
-
C:\Windows\SysWOW64\Hnjaonij.exeC:\Windows\system32\Hnjaonij.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6116 -
C:\Windows\SysWOW64\Hqkjaifk.exeC:\Windows\system32\Hqkjaifk.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5128 -
C:\Windows\SysWOW64\Iggocbke.exeC:\Windows\system32\Iggocbke.exe71⤵PID:5200
-
C:\Windows\SysWOW64\Igjlibib.exeC:\Windows\system32\Igjlibib.exe72⤵PID:5280
-
C:\Windows\SysWOW64\Icciccmd.exeC:\Windows\system32\Icciccmd.exe73⤵
- Modifies registry class
PID:5352 -
C:\Windows\SysWOW64\Inhmqlmj.exeC:\Windows\system32\Inhmqlmj.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5412 -
C:\Windows\SysWOW64\Icefib32.exeC:\Windows\system32\Icefib32.exe75⤵PID:5500
-
C:\Windows\SysWOW64\Iaifbg32.exeC:\Windows\system32\Iaifbg32.exe76⤵
- Modifies registry class
PID:5564 -
C:\Windows\SysWOW64\Jjakkmpk.exeC:\Windows\system32\Jjakkmpk.exe77⤵PID:5652
-
C:\Windows\SysWOW64\Jmpgghoo.exeC:\Windows\system32\Jmpgghoo.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3620 -
C:\Windows\SysWOW64\Jfhlpnfp.exeC:\Windows\system32\Jfhlpnfp.exe79⤵
- Drops file in System32 directory
PID:5752 -
C:\Windows\SysWOW64\Janpnfee.exeC:\Windows\system32\Janpnfee.exe80⤵PID:5820
-
C:\Windows\SysWOW64\Jclljaei.exeC:\Windows\system32\Jclljaei.exe81⤵PID:5900
-
C:\Windows\SysWOW64\Jfkhfmdm.exeC:\Windows\system32\Jfkhfmdm.exe82⤵PID:5980
-
C:\Windows\SysWOW64\Japmcfcc.exeC:\Windows\system32\Japmcfcc.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6040 -
C:\Windows\SysWOW64\Jjhalkjc.exeC:\Windows\system32\Jjhalkjc.exe84⤵
- Drops file in System32 directory
PID:1296 -
C:\Windows\SysWOW64\Jfoaam32.exeC:\Windows\system32\Jfoaam32.exe85⤵
- Modifies registry class
PID:4144 -
C:\Windows\SysWOW64\Jmijnfgd.exeC:\Windows\system32\Jmijnfgd.exe86⤵PID:6112
-
C:\Windows\SysWOW64\Jepbodhg.exeC:\Windows\system32\Jepbodhg.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5168 -
C:\Windows\SysWOW64\Kfanflne.exeC:\Windows\system32\Kfanflne.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5252 -
C:\Windows\SysWOW64\Kmlgcf32.exeC:\Windows\system32\Kmlgcf32.exe89⤵PID:5380
-
C:\Windows\SysWOW64\Kmncif32.exeC:\Windows\system32\Kmncif32.exe90⤵
- Drops file in System32 directory
PID:5492 -
C:\Windows\SysWOW64\Kffhakjp.exeC:\Windows\system32\Kffhakjp.exe91⤵PID:5568
-
C:\Windows\SysWOW64\Kallod32.exeC:\Windows\system32\Kallod32.exe92⤵
- Drops file in System32 directory
PID:3560 -
C:\Windows\SysWOW64\Kjdqhjpf.exeC:\Windows\system32\Kjdqhjpf.exe93⤵PID:5764
-
C:\Windows\SysWOW64\Kanidd32.exeC:\Windows\system32\Kanidd32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5856 -
C:\Windows\SysWOW64\Kfkamk32.exeC:\Windows\system32\Kfkamk32.exe95⤵PID:5972
-
C:\Windows\SysWOW64\Kmeiie32.exeC:\Windows\system32\Kmeiie32.exe96⤵
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\Lelajb32.exeC:\Windows\system32\Lelajb32.exe97⤵
- Modifies registry class
PID:6080 -
C:\Windows\SysWOW64\Lacbpccn.exeC:\Windows\system32\Lacbpccn.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5172 -
C:\Windows\SysWOW64\Lmjcdd32.exeC:\Windows\system32\Lmjcdd32.exe99⤵PID:5312
-
C:\Windows\SysWOW64\Ljncnhhk.exeC:\Windows\system32\Ljncnhhk.exe100⤵PID:5580
-
C:\Windows\SysWOW64\Lmlpjdgo.exeC:\Windows\system32\Lmlpjdgo.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3928 -
C:\Windows\SysWOW64\Lhadgmge.exeC:\Windows\system32\Lhadgmge.exe102⤵PID:5860
-
C:\Windows\SysWOW64\Lokldg32.exeC:\Windows\system32\Lokldg32.exe103⤵PID:2228
-
C:\Windows\SysWOW64\Lajhpbme.exeC:\Windows\system32\Lajhpbme.exe104⤵PID:6084
-
C:\Windows\SysWOW64\Lfgahikm.exeC:\Windows\system32\Lfgahikm.exe105⤵PID:5284
-
C:\Windows\SysWOW64\Mhfmbl32.exeC:\Windows\system32\Mhfmbl32.exe106⤵
- Modifies registry class
PID:5476 -
C:\Windows\SysWOW64\Mdmngm32.exeC:\Windows\system32\Mdmngm32.exe107⤵PID:5728
-
C:\Windows\SysWOW64\Mobbdf32.exeC:\Windows\system32\Mobbdf32.exe108⤵
- Modifies registry class
PID:6036 -
C:\Windows\SysWOW64\Mgngih32.exeC:\Windows\system32\Mgngih32.exe109⤵
- Modifies registry class
PID:5268 -
C:\Windows\SysWOW64\Mackfa32.exeC:\Windows\system32\Mackfa32.exe110⤵
- Drops file in System32 directory
PID:5560 -
C:\Windows\SysWOW64\Mhmcck32.exeC:\Windows\system32\Mhmcck32.exe111⤵PID:5960
-
C:\Windows\SysWOW64\Moglpedd.exeC:\Windows\system32\Moglpedd.exe112⤵PID:5324
-
C:\Windows\SysWOW64\Mdddhlbl.exeC:\Windows\system32\Mdddhlbl.exe113⤵PID:5956
-
C:\Windows\SysWOW64\Mknlef32.exeC:\Windows\system32\Mknlef32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5928 -
C:\Windows\SysWOW64\Necqbo32.exeC:\Windows\system32\Necqbo32.exe115⤵PID:5688
-
C:\Windows\SysWOW64\Nolekd32.exeC:\Windows\system32\Nolekd32.exe116⤵
- Modifies registry class
PID:6156 -
C:\Windows\SysWOW64\Nnabladg.exeC:\Windows\system32\Nnabladg.exe117⤵
- Modifies registry class
PID:6200 -
C:\Windows\SysWOW64\Namnmp32.exeC:\Windows\system32\Namnmp32.exe118⤵
- Drops file in System32 directory
PID:6244 -
C:\Windows\SysWOW64\Nncoaq32.exeC:\Windows\system32\Nncoaq32.exe119⤵PID:6288
-
C:\Windows\SysWOW64\Nglcjfie.exeC:\Windows\system32\Nglcjfie.exe120⤵PID:6332
-
C:\Windows\SysWOW64\Ndpcdjho.exeC:\Windows\system32\Ndpcdjho.exe121⤵
- Drops file in System32 directory
PID:6372 -
C:\Windows\SysWOW64\Nkjlqd32.exeC:\Windows\system32\Nkjlqd32.exe122⤵PID:6408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-