Analysis
-
max time kernel
129s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 20:18
Behavioral task
behavioral1
Sample
NEAS.ef42a349950a77b7a3333bc217b83650.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.ef42a349950a77b7a3333bc217b83650.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ef42a349950a77b7a3333bc217b83650.exe
-
Size
398KB
-
MD5
ef42a349950a77b7a3333bc217b83650
-
SHA1
3e2dcbabcecbb696fab292c1d7930d672caee7b7
-
SHA256
927430e305698e1bb9246eb542c0ac23e34162d7bc665b1a4bb51880ee46b34c
-
SHA512
4043b320214520c3bbea3cfdc48d5e319b4ec256072b1d0b9ac5a827c98a44d23543e3cd22ee16cae4bd0861bb4c842f47b396e96e31b4d127098cbb01f5e207
-
SSDEEP
12288:XBhxL6t3XGCByvNv54B9f01ZmHByvNv5imipWf0Aq:X5L6t3XGpvr4B9f01ZmQvrimipWf0Aq
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Phqbaj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmnjan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbabblkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eeelge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjnbhkqp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmdkmdoc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgfblh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpfmem32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbpoop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Amaqde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Phpkgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cdfpdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Maefnk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anaofa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqdbnhco.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jloacl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jognokdi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmnakqcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odnngclb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Chbncg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Embkhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ieagfh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqdbbelf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qpibke32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnpcjplf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eeelge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amdbffme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fgegdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Iemdkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bngnmjql.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbcnmogm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ajhboj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpjmjn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipplmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Nmajbnha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Bejoqm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcgmiiii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Incpdodg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Milinkgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Lmnjan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmgjpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hibape32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dnkkcmdb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Paihffkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Qmhdhm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Femgia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fkihgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oejbpb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdojdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gpmofe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfgkfadq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dknnhekd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfiffd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Gnaemkjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hginoiic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eodjdocj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efnbqi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kloljf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Llmhkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fqnbgpmb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggjjfq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Onaieifh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oceepj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hbenio32.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0007000000022cf0-6.dat family_berbew behavioral2/files/0x0007000000022cf0-8.dat family_berbew behavioral2/files/0x0008000000022cf3-14.dat family_berbew behavioral2/files/0x0008000000022cf3-15.dat family_berbew behavioral2/files/0x0006000000022cfb-22.dat family_berbew behavioral2/files/0x0006000000022cfb-24.dat family_berbew behavioral2/files/0x0006000000022cfd-32.dat family_berbew behavioral2/files/0x0006000000022cfd-30.dat family_berbew behavioral2/files/0x0006000000022cff-38.dat family_berbew behavioral2/files/0x0006000000022cff-40.dat family_berbew behavioral2/files/0x0006000000022d01-41.dat family_berbew behavioral2/files/0x0006000000022d01-46.dat family_berbew behavioral2/files/0x0006000000022d01-48.dat family_berbew behavioral2/files/0x0006000000022d03-54.dat family_berbew behavioral2/files/0x0006000000022d03-56.dat family_berbew behavioral2/files/0x0006000000022d05-57.dat family_berbew behavioral2/files/0x0006000000022d05-62.dat family_berbew behavioral2/files/0x0006000000022d05-64.dat family_berbew behavioral2/files/0x0006000000022d07-70.dat family_berbew behavioral2/files/0x0006000000022d07-72.dat family_berbew behavioral2/files/0x0006000000022d09-78.dat family_berbew behavioral2/files/0x0006000000022d09-80.dat family_berbew behavioral2/files/0x0006000000022d0b-86.dat family_berbew behavioral2/files/0x0006000000022d0b-88.dat family_berbew behavioral2/files/0x0006000000022d0f-94.dat family_berbew behavioral2/files/0x0006000000022d0f-96.dat family_berbew behavioral2/files/0x0006000000022d12-97.dat family_berbew behavioral2/files/0x0006000000022d12-102.dat family_berbew behavioral2/files/0x0006000000022d12-104.dat family_berbew behavioral2/files/0x0007000000022cf7-110.dat family_berbew behavioral2/files/0x0007000000022cf7-111.dat family_berbew behavioral2/files/0x0008000000022cf9-113.dat family_berbew behavioral2/files/0x0008000000022cf9-118.dat family_berbew behavioral2/files/0x0008000000022cf9-120.dat family_berbew behavioral2/files/0x0009000000022d0e-126.dat family_berbew behavioral2/files/0x0009000000022d0e-128.dat family_berbew behavioral2/files/0x0006000000022d13-129.dat family_berbew behavioral2/files/0x0006000000022d13-134.dat family_berbew behavioral2/files/0x0006000000022d13-136.dat family_berbew behavioral2/files/0x0006000000022d15-142.dat family_berbew behavioral2/files/0x0006000000022d15-144.dat family_berbew behavioral2/files/0x0006000000022d17-150.dat family_berbew behavioral2/files/0x0006000000022d17-151.dat family_berbew behavioral2/files/0x0006000000022d19-158.dat family_berbew behavioral2/files/0x0006000000022d19-159.dat family_berbew behavioral2/files/0x0006000000022d1b-166.dat family_berbew behavioral2/files/0x0006000000022d1b-168.dat family_berbew behavioral2/files/0x0006000000022d1d-169.dat family_berbew behavioral2/files/0x0006000000022d1d-174.dat family_berbew behavioral2/files/0x0006000000022d1d-175.dat family_berbew behavioral2/files/0x0006000000022d1f-182.dat family_berbew behavioral2/files/0x0006000000022d1f-184.dat family_berbew behavioral2/files/0x0006000000022d21-190.dat family_berbew behavioral2/files/0x0006000000022d21-191.dat family_berbew behavioral2/files/0x0006000000022d23-193.dat family_berbew behavioral2/files/0x0006000000022d23-199.dat family_berbew behavioral2/files/0x0006000000022d25-206.dat family_berbew behavioral2/files/0x0006000000022d23-198.dat family_berbew behavioral2/files/0x0006000000022d25-207.dat family_berbew behavioral2/files/0x0006000000022d27-216.dat family_berbew behavioral2/files/0x0006000000022d27-214.dat family_berbew behavioral2/files/0x0006000000022d29-222.dat family_berbew behavioral2/files/0x0006000000022d29-223.dat family_berbew behavioral2/files/0x0006000000022d2b-230.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 372 Dqbadf32.exe 3900 Gjkgkg32.exe 4008 Hdmojkjg.exe 232 Hlipfh32.exe 4104 Incpdodg.exe 4440 Iemdkl32.exe 4372 Jklihbol.exe 4376 Jehcfj32.exe 4404 Kdeghfhj.exe 2140 Lkchpoka.exe 4712 Meepoc32.exe 3432 Nnlqig32.exe 2180 Nmajbnha.exe 4288 Pbjbfclk.exe 1136 Ppblkffp.exe 2468 Qpibke32.exe 2812 Apqhldjp.exe 3472 Amibqhed.exe 492 Ccdgjm32.exe 2904 Dgkbfjeg.exe 4236 Eflocepa.exe 4196 Epgpajdp.exe 4280 Gfmhjb32.exe 4684 Gnfmapqo.exe 2208 Gceaofmc.exe 3632 Hmdlhk32.exe 2788 Hfmqapcl.exe 5020 Hhmmkcko.exe 5072 Hoibmmpi.exe 3084 Iplkje32.exe 3692 Imeeohoi.exe 4188 Jognokdi.exe 4852 Jmlkpgia.exe 1340 Jkeedk32.exe 8 Kpanmb32.exe 992 Kkqepi32.exe 3088 Lamjbc32.exe 2980 Lglopjkg.exe 2204 Mddidm32.exe 2612 Moofmeal.exe 824 Mbpoop32.exe 4492 Nnimia32.exe 2820 Nnpcjplf.exe 4032 Oghgbe32.exe 4100 Ogajid32.exe 4276 Onkbenbi.exe 3120 Ppmleagi.exe 2364 Pejdmh32.exe 1724 Pihmcflg.exe 1620 Qlkbka32.exe 4016 Qajhigcj.exe 2764 Ahdpea32.exe 4716 Abjdbj32.exe 2320 Albikp32.exe 2344 Aejmdegn.exe 2840 Aldeap32.exe 3208 Bimoecio.exe 2832 Bojhnjgf.exe 4528 Bpnncl32.exe 4572 Blenhmph.exe 4556 Caagpdop.exe 1472 Cadcfd32.exe 2024 Clihcm32.exe 1088 Cibagpgg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Aogije32.exe Aeodapcl.exe File created C:\Windows\SysWOW64\Hljhbd32.dll Bddjijia.exe File created C:\Windows\SysWOW64\Lgdinmod.exe Lnldeg32.exe File created C:\Windows\SysWOW64\Acdpkj32.dll Egbkodei.exe File created C:\Windows\SysWOW64\Pghiomqi.exe Pgemimck.exe File created C:\Windows\SysWOW64\Acnlqe32.exe Ajfhhp32.exe File created C:\Windows\SysWOW64\Mgoboake.exe Madjbg32.exe File created C:\Windows\SysWOW64\Qgalelin.exe Qbddmejf.exe File created C:\Windows\SysWOW64\Bhaeli32.exe Bbemdb32.exe File created C:\Windows\SysWOW64\Qfneamlf.exe Qqamieno.exe File created C:\Windows\SysWOW64\Nbgigian.dll Fkihgb32.exe File opened for modification C:\Windows\SysWOW64\Ogndki32.exe Nadlnoaj.exe File created C:\Windows\SysWOW64\Icmgjj32.dll Ejgddq32.exe File opened for modification C:\Windows\SysWOW64\Abjdbj32.exe Ahdpea32.exe File opened for modification C:\Windows\SysWOW64\Hfiffd32.exe Fohobmke.exe File created C:\Windows\SysWOW64\Pjfhbkgc.dll Qmhdhm32.exe File created C:\Windows\SysWOW64\Ooejhn32.exe Ohkbldfa.exe File created C:\Windows\SysWOW64\Lmbhqj32.exe Lcjchd32.exe File opened for modification C:\Windows\SysWOW64\Bmeagjbo.exe Bdmmnd32.exe File opened for modification C:\Windows\SysWOW64\Bphgoe32.exe Bogkgmho.exe File created C:\Windows\SysWOW64\Aekeqi32.dll Mdaedgdb.exe File created C:\Windows\SysWOW64\Koaaaaip.exe Kckqlpck.exe File created C:\Windows\SysWOW64\Jjbfio32.dll Hpdegdci.exe File created C:\Windows\SysWOW64\Icacbohp.exe Ibpgjg32.exe File opened for modification C:\Windows\SysWOW64\Kqbdej32.exe Kgipmdmn.exe File opened for modification C:\Windows\SysWOW64\Hbenio32.exe Hlkfle32.exe File opened for modification C:\Windows\SysWOW64\Mbpoop32.exe Moofmeal.exe File created C:\Windows\SysWOW64\Cfjehfda.dll Ebdcejpk.exe File opened for modification C:\Windows\SysWOW64\Jemfbgiq.exe Jppnjpji.exe File opened for modification C:\Windows\SysWOW64\Ajikhfpg.exe Aelcooap.exe File opened for modification C:\Windows\SysWOW64\Hpofbobf.exe Hkbmjhdo.exe File opened for modification C:\Windows\SysWOW64\Nmajbnha.exe Nnlqig32.exe File opened for modification C:\Windows\SysWOW64\Lqdakjak.exe Kjjinp32.exe File created C:\Windows\SysWOW64\Mcikmdne.dll Babmjj32.exe File created C:\Windows\SysWOW64\Amaqde32.exe Aichng32.exe File created C:\Windows\SysWOW64\Elllpd32.dll Oeclockl.exe File opened for modification C:\Windows\SysWOW64\Qkgcog32.exe Qejkfp32.exe File created C:\Windows\SysWOW64\Nmofmk32.exe Nbibpb32.exe File created C:\Windows\SysWOW64\Ppgefpeb.dll Ceckleii.exe File created C:\Windows\SysWOW64\Edkail32.dll Bgbpkoej.exe File opened for modification C:\Windows\SysWOW64\Lknocb32.exe Lgqfmcge.exe File opened for modification C:\Windows\SysWOW64\Dbkpokhf.exe Diclff32.exe File opened for modification C:\Windows\SysWOW64\Ffqhmf32.exe Fmhcda32.exe File opened for modification C:\Windows\SysWOW64\Holfhfij.exe Hedaoa32.exe File created C:\Windows\SysWOW64\Fchebfmg.dll Acnjbpdb.exe File created C:\Windows\SysWOW64\Hplimpdi.exe Hibape32.exe File created C:\Windows\SysWOW64\Onmfcb32.exe Oplfekdp.exe File created C:\Windows\SysWOW64\Abonimmp.exe Qamaae32.exe File created C:\Windows\SysWOW64\Bhobfffa.dll Cfakon32.exe File created C:\Windows\SysWOW64\Lpcmoi32.exe Lanpml32.exe File created C:\Windows\SysWOW64\Elojej32.exe Dpemjifi.exe File created C:\Windows\SysWOW64\Jmlkpgia.exe Jognokdi.exe File created C:\Windows\SysWOW64\Pcccol32.exe Plijbblh.exe File opened for modification C:\Windows\SysWOW64\Aaflag32.exe Aklddmep.exe File opened for modification C:\Windows\SysWOW64\Iebnqofj.exe Iikmlnae.exe File created C:\Windows\SysWOW64\Eflocepa.exe Dgkbfjeg.exe File opened for modification C:\Windows\SysWOW64\Mgidgakk.exe Mallojmd.exe File opened for modification C:\Windows\SysWOW64\Elbmebbj.exe Edgkif32.exe File created C:\Windows\SysWOW64\Dmcnkmhc.dll Lnpopcni.exe File created C:\Windows\SysWOW64\Emfqafob.dll Emoanbll.exe File created C:\Windows\SysWOW64\Hiaabf32.dll Kpanmb32.exe File created C:\Windows\SysWOW64\Clbhqcam.dll Fbbpgh32.exe File opened for modification C:\Windows\SysWOW64\Ehlakjig.exe Ebkbmqhb.exe File opened for modification C:\Windows\SysWOW64\Cdhmjc32.exe Cdfpdc32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ledeicdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aibilf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dkidme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffdidbph.dll" Kqbdej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pfoahd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ncmhee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Blojoe32.dll" Cgaiqian.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkhnna32.dll" Cmgjpi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aklddmep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eqdnqilg.dll" Mgphjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aagkaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icfjgekh.dll" Gaibcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iboogh32.dll" Gqdbbelf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lnmajl32.dll" Bbemdb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mcdeof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cblmllnj.dll" Pgemimck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekejap32.dll" Nblcgpho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Felbhdgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lhlgim32.dll" Kflink32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nfohafad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iefbhj32.dll" Enkmpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fkhppgic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pghiomqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kjjinp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pilapm32.dll" Fkfcjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbbpfpgf.dll" Hhagaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgedmq32.dll" Qjalok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Anbkbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncjglifc.dll" Fbhplnca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ohkkanbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hfdfanoa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lhkghofb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cadcfd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Peeakakg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Gnjollpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Genmbb32.dll" Qpibke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hmdlhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lgqfmcge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bbmjjk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Dpjfqljl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hpjlgp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Eqgmgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lmnjan32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pcgmiiii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgilfl32.dll" Jekqgnno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hcqjkafb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hlipfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Clihcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdpcap32.dll" Daeioo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID NEAS.ef42a349950a77b7a3333bc217b83650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fqclce32.dll" Pokjnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bpfkiepp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kgbepdpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nacdac32.dll" Daqbbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Gbiomqjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bbacekmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlfkdnlg.dll" Hmdlhk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cdolbijg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lohqgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aeodkfcm.dll" Afocdkac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Miplni32.dll" Nahgik32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jblmpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ocdqcikl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 528 wrote to memory of 372 528 NEAS.ef42a349950a77b7a3333bc217b83650.exe 91 PID 528 wrote to memory of 372 528 NEAS.ef42a349950a77b7a3333bc217b83650.exe 91 PID 528 wrote to memory of 372 528 NEAS.ef42a349950a77b7a3333bc217b83650.exe 91 PID 372 wrote to memory of 3900 372 Dqbadf32.exe 92 PID 372 wrote to memory of 3900 372 Dqbadf32.exe 92 PID 372 wrote to memory of 3900 372 Dqbadf32.exe 92 PID 3900 wrote to memory of 4008 3900 Gjkgkg32.exe 93 PID 3900 wrote to memory of 4008 3900 Gjkgkg32.exe 93 PID 3900 wrote to memory of 4008 3900 Gjkgkg32.exe 93 PID 4008 wrote to memory of 232 4008 Hdmojkjg.exe 95 PID 4008 wrote to memory of 232 4008 Hdmojkjg.exe 95 PID 4008 wrote to memory of 232 4008 Hdmojkjg.exe 95 PID 232 wrote to memory of 4104 232 Hlipfh32.exe 96 PID 232 wrote to memory of 4104 232 Hlipfh32.exe 96 PID 232 wrote to memory of 4104 232 Hlipfh32.exe 96 PID 4104 wrote to memory of 4440 4104 Incpdodg.exe 97 PID 4104 wrote to memory of 4440 4104 Incpdodg.exe 97 PID 4104 wrote to memory of 4440 4104 Incpdodg.exe 97 PID 4440 wrote to memory of 4372 4440 Iemdkl32.exe 98 PID 4440 wrote to memory of 4372 4440 Iemdkl32.exe 98 PID 4440 wrote to memory of 4372 4440 Iemdkl32.exe 98 PID 4372 wrote to memory of 4376 4372 Jklihbol.exe 99 PID 4372 wrote to memory of 4376 4372 Jklihbol.exe 99 PID 4372 wrote to memory of 4376 4372 Jklihbol.exe 99 PID 4376 wrote to memory of 4404 4376 Jehcfj32.exe 100 PID 4376 wrote to memory of 4404 4376 Jehcfj32.exe 100 PID 4376 wrote to memory of 4404 4376 Jehcfj32.exe 100 PID 4404 wrote to memory of 2140 4404 Kdeghfhj.exe 101 PID 4404 wrote to memory of 2140 4404 Kdeghfhj.exe 101 PID 4404 wrote to memory of 2140 4404 Kdeghfhj.exe 101 PID 2140 wrote to memory of 4712 2140 Lkchpoka.exe 102 PID 2140 wrote to memory of 4712 2140 Lkchpoka.exe 102 PID 2140 wrote to memory of 4712 2140 Lkchpoka.exe 102 PID 4712 wrote to memory of 3432 4712 Meepoc32.exe 103 PID 4712 wrote to memory of 3432 4712 Meepoc32.exe 103 PID 4712 wrote to memory of 3432 4712 Meepoc32.exe 103 PID 3432 wrote to memory of 2180 3432 Nnlqig32.exe 104 PID 3432 wrote to memory of 2180 3432 Nnlqig32.exe 104 PID 3432 wrote to memory of 2180 3432 Nnlqig32.exe 104 PID 2180 wrote to memory of 4288 2180 Nmajbnha.exe 105 PID 2180 wrote to memory of 4288 2180 Nmajbnha.exe 105 PID 2180 wrote to memory of 4288 2180 Nmajbnha.exe 105 PID 4288 wrote to memory of 1136 4288 Pbjbfclk.exe 106 PID 4288 wrote to memory of 1136 4288 Pbjbfclk.exe 106 PID 4288 wrote to memory of 1136 4288 Pbjbfclk.exe 106 PID 1136 wrote to memory of 2468 1136 Ppblkffp.exe 107 PID 1136 wrote to memory of 2468 1136 Ppblkffp.exe 107 PID 1136 wrote to memory of 2468 1136 Ppblkffp.exe 107 PID 2468 wrote to memory of 2812 2468 Qpibke32.exe 108 PID 2468 wrote to memory of 2812 2468 Qpibke32.exe 108 PID 2468 wrote to memory of 2812 2468 Qpibke32.exe 108 PID 2812 wrote to memory of 3472 2812 Apqhldjp.exe 109 PID 2812 wrote to memory of 3472 2812 Apqhldjp.exe 109 PID 2812 wrote to memory of 3472 2812 Apqhldjp.exe 109 PID 3472 wrote to memory of 492 3472 Amibqhed.exe 110 PID 3472 wrote to memory of 492 3472 Amibqhed.exe 110 PID 3472 wrote to memory of 492 3472 Amibqhed.exe 110 PID 492 wrote to memory of 2904 492 Ccdgjm32.exe 111 PID 492 wrote to memory of 2904 492 Ccdgjm32.exe 111 PID 492 wrote to memory of 2904 492 Ccdgjm32.exe 111 PID 2904 wrote to memory of 4236 2904 Dgkbfjeg.exe 112 PID 2904 wrote to memory of 4236 2904 Dgkbfjeg.exe 112 PID 2904 wrote to memory of 4236 2904 Dgkbfjeg.exe 112 PID 4236 wrote to memory of 4196 4236 Eflocepa.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ef42a349950a77b7a3333bc217b83650.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ef42a349950a77b7a3333bc217b83650.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\Dqbadf32.exeC:\Windows\system32\Dqbadf32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\Gjkgkg32.exeC:\Windows\system32\Gjkgkg32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\Hdmojkjg.exeC:\Windows\system32\Hdmojkjg.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\Hlipfh32.exeC:\Windows\system32\Hlipfh32.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\Incpdodg.exeC:\Windows\system32\Incpdodg.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\Iemdkl32.exeC:\Windows\system32\Iemdkl32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\Jklihbol.exeC:\Windows\system32\Jklihbol.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\Jehcfj32.exeC:\Windows\system32\Jehcfj32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\Kdeghfhj.exeC:\Windows\system32\Kdeghfhj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\Lkchpoka.exeC:\Windows\system32\Lkchpoka.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\Meepoc32.exeC:\Windows\system32\Meepoc32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\Nnlqig32.exeC:\Windows\system32\Nnlqig32.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\Nmajbnha.exeC:\Windows\system32\Nmajbnha.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\Pbjbfclk.exeC:\Windows\system32\Pbjbfclk.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\Ppblkffp.exeC:\Windows\system32\Ppblkffp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\Qpibke32.exeC:\Windows\system32\Qpibke32.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\Apqhldjp.exeC:\Windows\system32\Apqhldjp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\Amibqhed.exeC:\Windows\system32\Amibqhed.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\Ccdgjm32.exeC:\Windows\system32\Ccdgjm32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Windows\SysWOW64\Dgkbfjeg.exeC:\Windows\system32\Dgkbfjeg.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\Eflocepa.exeC:\Windows\system32\Eflocepa.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\Epgpajdp.exeC:\Windows\system32\Epgpajdp.exe23⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\SysWOW64\Gfmhjb32.exeC:\Windows\system32\Gfmhjb32.exe24⤵
- Executes dropped EXE
PID:4280 -
C:\Windows\SysWOW64\Gnfmapqo.exeC:\Windows\system32\Gnfmapqo.exe25⤵
- Executes dropped EXE
PID:4684 -
C:\Windows\SysWOW64\Gceaofmc.exeC:\Windows\system32\Gceaofmc.exe26⤵
- Executes dropped EXE
PID:2208
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Hmdlhk32.exeC:\Windows\system32\Hmdlhk32.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:3632 -
C:\Windows\SysWOW64\Hfmqapcl.exeC:\Windows\system32\Hfmqapcl.exe2⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Hhmmkcko.exeC:\Windows\system32\Hhmmkcko.exe3⤵
- Executes dropped EXE
PID:5020
-
-
-
C:\Windows\SysWOW64\Hoibmmpi.exeC:\Windows\system32\Hoibmmpi.exe1⤵
- Executes dropped EXE
PID:5072 -
C:\Windows\SysWOW64\Iplkje32.exeC:\Windows\system32\Iplkje32.exe2⤵
- Executes dropped EXE
PID:3084 -
C:\Windows\SysWOW64\Imeeohoi.exeC:\Windows\system32\Imeeohoi.exe3⤵
- Executes dropped EXE
PID:3692
-
-
-
C:\Windows\SysWOW64\Jognokdi.exeC:\Windows\system32\Jognokdi.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4188 -
C:\Windows\SysWOW64\Jmlkpgia.exeC:\Windows\system32\Jmlkpgia.exe2⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\Jkeedk32.exeC:\Windows\system32\Jkeedk32.exe3⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\Kpanmb32.exeC:\Windows\system32\Kpanmb32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:8 -
C:\Windows\SysWOW64\Kkqepi32.exeC:\Windows\system32\Kkqepi32.exe5⤵
- Executes dropped EXE
PID:992 -
C:\Windows\SysWOW64\Lamjbc32.exeC:\Windows\system32\Lamjbc32.exe6⤵
- Executes dropped EXE
PID:3088 -
C:\Windows\SysWOW64\Lglopjkg.exeC:\Windows\system32\Lglopjkg.exe7⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\SysWOW64\Mddidm32.exeC:\Windows\system32\Mddidm32.exe8⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\Moofmeal.exeC:\Windows\system32\Moofmeal.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2612 -
C:\Windows\SysWOW64\Mbpoop32.exeC:\Windows\system32\Mbpoop32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:824 -
C:\Windows\SysWOW64\Nnimia32.exeC:\Windows\system32\Nnimia32.exe11⤵
- Executes dropped EXE
PID:4492 -
C:\Windows\SysWOW64\Nnpcjplf.exeC:\Windows\system32\Nnpcjplf.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2820 -
C:\Windows\SysWOW64\Oghgbe32.exeC:\Windows\system32\Oghgbe32.exe13⤵
- Executes dropped EXE
PID:4032 -
C:\Windows\SysWOW64\Ogajid32.exeC:\Windows\system32\Ogajid32.exe14⤵
- Executes dropped EXE
PID:4100 -
C:\Windows\SysWOW64\Onkbenbi.exeC:\Windows\system32\Onkbenbi.exe15⤵
- Executes dropped EXE
PID:4276 -
C:\Windows\SysWOW64\Ppmleagi.exeC:\Windows\system32\Ppmleagi.exe16⤵
- Executes dropped EXE
PID:3120 -
C:\Windows\SysWOW64\Pejdmh32.exeC:\Windows\system32\Pejdmh32.exe17⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\Pihmcflg.exeC:\Windows\system32\Pihmcflg.exe18⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\Qlkbka32.exeC:\Windows\system32\Qlkbka32.exe19⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Qajhigcj.exeC:\Windows\system32\Qajhigcj.exe20⤵
- Executes dropped EXE
PID:4016 -
C:\Windows\SysWOW64\Ahdpea32.exeC:\Windows\system32\Ahdpea32.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2764 -
C:\Windows\SysWOW64\Abjdbj32.exeC:\Windows\system32\Abjdbj32.exe22⤵
- Executes dropped EXE
PID:4716 -
C:\Windows\SysWOW64\Albikp32.exeC:\Windows\system32\Albikp32.exe23⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\SysWOW64\Aejmdegn.exeC:\Windows\system32\Aejmdegn.exe24⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\SysWOW64\Aldeap32.exeC:\Windows\system32\Aldeap32.exe25⤵
- Executes dropped EXE
PID:2840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Bimoecio.exeC:\Windows\system32\Bimoecio.exe1⤵
- Executes dropped EXE
PID:3208 -
C:\Windows\SysWOW64\Bojhnjgf.exeC:\Windows\system32\Bojhnjgf.exe2⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\SysWOW64\Bpnncl32.exeC:\Windows\system32\Bpnncl32.exe3⤵
- Executes dropped EXE
PID:4528 -
C:\Windows\SysWOW64\Blenhmph.exeC:\Windows\system32\Blenhmph.exe4⤵
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\Caagpdop.exeC:\Windows\system32\Caagpdop.exe5⤵
- Executes dropped EXE
PID:4556 -
C:\Windows\SysWOW64\Cadcfd32.exeC:\Windows\system32\Cadcfd32.exe6⤵
- Executes dropped EXE
- Modifies registry class
PID:1472 -
C:\Windows\SysWOW64\Clihcm32.exeC:\Windows\system32\Clihcm32.exe7⤵
- Executes dropped EXE
- Modifies registry class
PID:2024 -
C:\Windows\SysWOW64\Cibagpgg.exeC:\Windows\system32\Cibagpgg.exe8⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\SysWOW64\Dpemjifi.exeC:\Windows\system32\Dpemjifi.exe9⤵
- Drops file in System32 directory
PID:4060 -
C:\Windows\SysWOW64\Elojej32.exeC:\Windows\system32\Elojej32.exe10⤵PID:4536
-
C:\Windows\SysWOW64\Ebkbmqhb.exeC:\Windows\system32\Ebkbmqhb.exe11⤵
- Drops file in System32 directory
PID:4228 -
C:\Windows\SysWOW64\Ehlakjig.exeC:\Windows\system32\Ehlakjig.exe12⤵PID:2308
-
C:\Windows\SysWOW64\Fqhbgf32.exeC:\Windows\system32\Fqhbgf32.exe13⤵PID:1544
-
C:\Windows\SysWOW64\Ficgkico.exeC:\Windows\system32\Ficgkico.exe14⤵PID:2368
-
C:\Windows\SysWOW64\Fcikhace.exeC:\Windows\system32\Fcikhace.exe15⤵PID:3064
-
C:\Windows\SysWOW64\Fckhnaab.exeC:\Windows\system32\Fckhnaab.exe16⤵PID:464
-
C:\Windows\SysWOW64\Gmfilfep.exeC:\Windows\system32\Gmfilfep.exe17⤵PID:820
-
C:\Windows\SysWOW64\Gqdbbelf.exeC:\Windows\system32\Gqdbbelf.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2964 -
C:\Windows\SysWOW64\Hcpjpn32.exeC:\Windows\system32\Hcpjpn32.exe19⤵PID:4024
-
C:\Windows\SysWOW64\Iffmmihf.exeC:\Windows\system32\Iffmmihf.exe20⤵PID:3536
-
C:\Windows\SysWOW64\Ifhibhfc.exeC:\Windows\system32\Ifhibhfc.exe21⤵PID:4120
-
C:\Windows\SysWOW64\Jpegfm32.exeC:\Windows\system32\Jpegfm32.exe22⤵PID:4740
-
C:\Windows\SysWOW64\Jmnakqcc.exeC:\Windows\system32\Jmnakqcc.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1524 -
C:\Windows\SysWOW64\Kdophj32.exeC:\Windows\system32\Kdophj32.exe24⤵PID:3248
-
C:\Windows\SysWOW64\Kmgdaokh.exeC:\Windows\system32\Kmgdaokh.exe25⤵PID:3656
-
C:\Windows\SysWOW64\Kgphje32.exeC:\Windows\system32\Kgphje32.exe26⤵PID:2608
-
C:\Windows\SysWOW64\Kgbepdpf.exeC:\Windows\system32\Kgbepdpf.exe27⤵
- Modifies registry class
PID:2448 -
C:\Windows\SysWOW64\Lmnjan32.exeC:\Windows\system32\Lmnjan32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2248 -
C:\Windows\SysWOW64\Lckbje32.exeC:\Windows\system32\Lckbje32.exe29⤵PID:3360
-
C:\Windows\SysWOW64\Lalchm32.exeC:\Windows\system32\Lalchm32.exe30⤵PID:2088
-
C:\Windows\SysWOW64\Lanpml32.exeC:\Windows\system32\Lanpml32.exe31⤵
- Drops file in System32 directory
PID:4268 -
C:\Windows\SysWOW64\Lpcmoi32.exeC:\Windows\system32\Lpcmoi32.exe32⤵PID:1240
-
C:\Windows\SysWOW64\Mdaedgdb.exeC:\Windows\system32\Mdaedgdb.exe33⤵
- Drops file in System32 directory
PID:2252 -
C:\Windows\SysWOW64\Maefnk32.exeC:\Windows\system32\Maefnk32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2924 -
C:\Windows\SysWOW64\Mcklac32.exeC:\Windows\system32\Mcklac32.exe35⤵PID:4332
-
C:\Windows\SysWOW64\Mallojmd.exeC:\Windows\system32\Mallojmd.exe36⤵
- Drops file in System32 directory
PID:2288 -
C:\Windows\SysWOW64\Mgidgakk.exeC:\Windows\system32\Mgidgakk.exe37⤵PID:4300
-
C:\Windows\SysWOW64\Nglala32.exeC:\Windows\system32\Nglala32.exe38⤵PID:1848
-
C:\Windows\SysWOW64\Ncbaabom.exeC:\Windows\system32\Ncbaabom.exe39⤵PID:4872
-
C:\Windows\SysWOW64\Nqfbkf32.exeC:\Windows\system32\Nqfbkf32.exe40⤵PID:408
-
C:\Windows\SysWOW64\Nqioqf32.exeC:\Windows\system32\Nqioqf32.exe41⤵PID:5092
-
C:\Windows\SysWOW64\Nqklfe32.exeC:\Windows\system32\Nqklfe32.exe42⤵PID:1012
-
C:\Windows\SysWOW64\Nkqpcnig.exeC:\Windows\system32\Nkqpcnig.exe43⤵PID:1368
-
C:\Windows\SysWOW64\Ocldhqgb.exeC:\Windows\system32\Ocldhqgb.exe44⤵PID:5016
-
C:\Windows\SysWOW64\Onaieifh.exeC:\Windows\system32\Onaieifh.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5140 -
C:\Windows\SysWOW64\Okeinn32.exeC:\Windows\system32\Okeinn32.exe46⤵PID:5184
-
C:\Windows\SysWOW64\Odnngclb.exeC:\Windows\system32\Odnngclb.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5228 -
C:\Windows\SysWOW64\Oqdnld32.exeC:\Windows\system32\Oqdnld32.exe48⤵PID:5272
-
C:\Windows\SysWOW64\Pgemimck.exeC:\Windows\system32\Pgemimck.exe49⤵
- Drops file in System32 directory
- Modifies registry class
PID:5316 -
C:\Windows\SysWOW64\Pghiomqi.exeC:\Windows\system32\Pghiomqi.exe50⤵
- Modifies registry class
PID:5356 -
C:\Windows\SysWOW64\Papnhbgi.exeC:\Windows\system32\Papnhbgi.exe51⤵PID:5404
-
C:\Windows\SysWOW64\Qbddmejf.exeC:\Windows\system32\Qbddmejf.exe52⤵
- Drops file in System32 directory
PID:5440 -
C:\Windows\SysWOW64\Qgalelin.exeC:\Windows\system32\Qgalelin.exe53⤵PID:5492
-
C:\Windows\SysWOW64\Acjjpllp.exeC:\Windows\system32\Acjjpllp.exe54⤵PID:5536
-
C:\Windows\SysWOW64\Anpnmele.exeC:\Windows\system32\Anpnmele.exe55⤵PID:5580
-
C:\Windows\SysWOW64\Acmfel32.exeC:\Windows\system32\Acmfel32.exe56⤵PID:5620
-
C:\Windows\SysWOW64\Anbkbe32.exeC:\Windows\system32\Anbkbe32.exe57⤵
- Modifies registry class
PID:5664 -
C:\Windows\SysWOW64\Aelcooap.exeC:\Windows\system32\Aelcooap.exe58⤵
- Drops file in System32 directory
PID:5708 -
C:\Windows\SysWOW64\Ajikhfpg.exeC:\Windows\system32\Ajikhfpg.exe59⤵PID:5756
-
C:\Windows\SysWOW64\Aenpeoom.exeC:\Windows\system32\Aenpeoom.exe60⤵PID:5792
-
C:\Windows\SysWOW64\Bbbpnc32.exeC:\Windows\system32\Bbbpnc32.exe61⤵PID:5840
-
C:\Windows\SysWOW64\Bdcmfkde.exeC:\Windows\system32\Bdcmfkde.exe62⤵PID:5880
-
C:\Windows\SysWOW64\Bbemdb32.exeC:\Windows\system32\Bbemdb32.exe63⤵
- Drops file in System32 directory
- Modifies registry class
PID:5924 -
C:\Windows\SysWOW64\Bhaeli32.exeC:\Windows\system32\Bhaeli32.exe64⤵PID:5968
-
C:\Windows\SysWOW64\Bbgiibja.exeC:\Windows\system32\Bbgiibja.exe65⤵PID:6012
-
C:\Windows\SysWOW64\Bjbnndgl.exeC:\Windows\system32\Bjbnndgl.exe66⤵PID:6060
-
C:\Windows\SysWOW64\Bdkbgj32.exeC:\Windows\system32\Bdkbgj32.exe67⤵PID:6104
-
C:\Windows\SysWOW64\Bejoqm32.exeC:\Windows\system32\Bejoqm32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5128 -
C:\Windows\SysWOW64\Cbnpja32.exeC:\Windows\system32\Cbnpja32.exe69⤵PID:5192
-
C:\Windows\SysWOW64\Cdolbijg.exeC:\Windows\system32\Cdolbijg.exe70⤵
- Modifies registry class
PID:5264 -
C:\Windows\SysWOW64\Cahffmel.exeC:\Windows\system32\Cahffmel.exe71⤵PID:5324
-
C:\Windows\SysWOW64\Chbncg32.exeC:\Windows\system32\Chbncg32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5460 -
C:\Windows\SysWOW64\Ekngqqol.exeC:\Windows\system32\Ekngqqol.exe73⤵PID:5528
-
C:\Windows\SysWOW64\Edgkif32.exeC:\Windows\system32\Edgkif32.exe74⤵
- Drops file in System32 directory
PID:5628 -
C:\Windows\SysWOW64\Elbmebbj.exeC:\Windows\system32\Elbmebbj.exe75⤵PID:5720
-
C:\Windows\SysWOW64\Fohobmke.exeC:\Windows\system32\Fohobmke.exe76⤵
- Drops file in System32 directory
PID:5916 -
C:\Windows\SysWOW64\Hfiffd32.exeC:\Windows\system32\Hfiffd32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5956 -
C:\Windows\SysWOW64\Ickcaf32.exeC:\Windows\system32\Ickcaf32.exe78⤵PID:6044
-
C:\Windows\SysWOW64\Kbebdpca.exeC:\Windows\system32\Kbebdpca.exe79⤵PID:6128
-
C:\Windows\SysWOW64\Llngmeja.exeC:\Windows\system32\Llngmeja.exe80⤵PID:5168
-
C:\Windows\SysWOW64\Lbhojo32.exeC:\Windows\system32\Lbhojo32.exe81⤵PID:5304
-
C:\Windows\SysWOW64\Lbabpn32.exeC:\Windows\system32\Lbabpn32.exe82⤵PID:5504
-
C:\Windows\SysWOW64\Mdckpqod.exeC:\Windows\system32\Mdckpqod.exe83⤵PID:5644
-
C:\Windows\SysWOW64\Ocdqcikl.exeC:\Windows\system32\Ocdqcikl.exe84⤵
- Modifies registry class
PID:4568 -
C:\Windows\SysWOW64\Pcgmiiii.exeC:\Windows\system32\Pcgmiiii.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2920 -
C:\Windows\SysWOW64\Pgefogop.exeC:\Windows\system32\Pgefogop.exe86⤵PID:3492
-
C:\Windows\SysWOW64\Pqmjhm32.exeC:\Windows\system32\Pqmjhm32.exe87⤵PID:1168
-
C:\Windows\SysWOW64\Pjeoablq.exeC:\Windows\system32\Pjeoablq.exe88⤵PID:4440
-
C:\Windows\SysWOW64\Pqbdclak.exeC:\Windows\system32\Pqbdclak.exe89⤵PID:6120
-
C:\Windows\SysWOW64\Qmhdhm32.exeC:\Windows\system32\Qmhdhm32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5148 -
C:\Windows\SysWOW64\Qgnief32.exeC:\Windows\system32\Qgnief32.exe91⤵PID:5236
-
C:\Windows\SysWOW64\Ajfhhp32.exeC:\Windows\system32\Ajfhhp32.exe92⤵
- Drops file in System32 directory
PID:5384 -
C:\Windows\SysWOW64\Acnlqe32.exeC:\Windows\system32\Acnlqe32.exe93⤵PID:2640
-
C:\Windows\SysWOW64\Ajhdmplk.exeC:\Windows\system32\Ajhdmplk.exe94⤵PID:5696
-
C:\Windows\SysWOW64\Babmjj32.exeC:\Windows\system32\Babmjj32.exe95⤵
- Drops file in System32 directory
PID:5900 -
C:\Windows\SysWOW64\Bglefdke.exeC:\Windows\system32\Bglefdke.exe96⤵PID:652
-
C:\Windows\SysWOW64\Bccfleqi.exeC:\Windows\system32\Bccfleqi.exe97⤵PID:4224
-
C:\Windows\SysWOW64\Chhdbb32.exeC:\Windows\system32\Chhdbb32.exe98⤵PID:5284
-
C:\Windows\SysWOW64\Celelf32.exeC:\Windows\system32\Celelf32.exe99⤵PID:2456
-
C:\Windows\SysWOW64\Cmgjpi32.exeC:\Windows\system32\Cmgjpi32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5740 -
C:\Windows\SysWOW64\Cfonin32.exeC:\Windows\system32\Cfonin32.exe101⤵PID:6072
-
C:\Windows\SysWOW64\Cfakon32.exeC:\Windows\system32\Cfakon32.exe102⤵
- Drops file in System32 directory
PID:4408 -
C:\Windows\SysWOW64\Ceckleii.exeC:\Windows\system32\Ceckleii.exe103⤵
- Drops file in System32 directory
PID:4248 -
C:\Windows\SysWOW64\Cokpekpj.exeC:\Windows\system32\Cokpekpj.exe104⤵PID:384
-
C:\Windows\SysWOW64\Dhcdnq32.exeC:\Windows\system32\Dhcdnq32.exe105⤵PID:4044
-
C:\Windows\SysWOW64\Ddjecalo.exeC:\Windows\system32\Ddjecalo.exe106⤵PID:5036
-
C:\Windows\SysWOW64\Dopiqj32.exeC:\Windows\system32\Dopiqj32.exe107⤵PID:5344
-
C:\Windows\SysWOW64\Dfknem32.exeC:\Windows\system32\Dfknem32.exe108⤵PID:2468
-
C:\Windows\SysWOW64\Daqbbe32.exeC:\Windows\system32\Daqbbe32.exe109⤵
- Modifies registry class
PID:1148 -
C:\Windows\SysWOW64\Dkifkkpf.exeC:\Windows\system32\Dkifkkpf.exe110⤵PID:3080
-
C:\Windows\SysWOW64\Dkkcqj32.exeC:\Windows\system32\Dkkcqj32.exe111⤵PID:1128
-
C:\Windows\SysWOW64\Eecdcckf.exeC:\Windows\system32\Eecdcckf.exe112⤵PID:5560
-
C:\Windows\SysWOW64\Emniheha.exeC:\Windows\system32\Emniheha.exe113⤵PID:4920
-
C:\Windows\SysWOW64\Ehdmenhh.exeC:\Windows\system32\Ehdmenhh.exe114⤵PID:6172
-
C:\Windows\SysWOW64\Eoneah32.exeC:\Windows\system32\Eoneah32.exe115⤵PID:6216
-
C:\Windows\SysWOW64\Ehfjkn32.exeC:\Windows\system32\Ehfjkn32.exe116⤵PID:6260
-
C:\Windows\SysWOW64\Egkgljkm.exeC:\Windows\system32\Egkgljkm.exe117⤵PID:6304
-
C:\Windows\SysWOW64\Femgia32.exeC:\Windows\system32\Femgia32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6348 -
C:\Windows\SysWOW64\Fojenfeg.exeC:\Windows\system32\Fojenfeg.exe119⤵PID:6424
-
C:\Windows\SysWOW64\Gnckjbfj.exeC:\Windows\system32\Gnckjbfj.exe120⤵PID:6464
-
C:\Windows\SysWOW64\Hfdfanoa.exeC:\Windows\system32\Hfdfanoa.exe121⤵
- Modifies registry class
PID:6504 -
C:\Windows\SysWOW64\Hfmigmgf.exeC:\Windows\system32\Hfmigmgf.exe122⤵PID:6572
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-