Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 05:59
Behavioral task
behavioral1
Sample
NEAS.fb174a240162fd156b20f0faaa28b8b0.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.fb174a240162fd156b20f0faaa28b8b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.fb174a240162fd156b20f0faaa28b8b0.exe
-
Size
1.6MB
-
MD5
fb174a240162fd156b20f0faaa28b8b0
-
SHA1
c307ecbf712c3a7df147b9ec285b9ae145e5979f
-
SHA256
3bb1ad81141a5d9d0280293ecb3013274183c07c888c987ceec4b573e5e2ea26
-
SHA512
6012f6510fd4c9cf8684ed8a4ab26a8c994db7bea59ab99075d0d69be05a3f6710998bf45c2874f040ceb4453685b63a4e1892280b7d5ecf42ee5bdc8d2118d3
-
SSDEEP
24576:UWSwwL2vzecI50+YNpsKv2EvZHp3oWB+:hSwwL2vKcIKLXZ3+
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifcben32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkadoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdhkchlg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqgiel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajohfcpj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecikjoep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbhool32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcabej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfcoblfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffhnocfd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmjhlklg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pehjfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akjnnpcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dehnpp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihjafd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciefek32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkjejqcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgpeha32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ammnhilb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdjjgggk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aqbfaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odelpm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kohnpoib.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beippj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idjdqc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ocnabm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajaelc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oljoen32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfpghccm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Leqkeajd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Akmjdpac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flpbnh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ecjpfp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cacmpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gogjflhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kahpgcch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gloejmld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnenchoc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebbmpmnb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpjhlche.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnboma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnienqbi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amgekh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cljomc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Habeni32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjffpe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qppkhfec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apgqie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hfcinq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Incdem32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eihlahjd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojmgggdo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnmoglij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Opkfjgmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggoaje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldkhlcnb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gloejmld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldgnbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jcfejfag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qipqibmf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dilmeida.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fchlhnlo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acppddig.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/1224-0-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/1224-1-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/files/0x0008000000022d90-7.dat family_berbew behavioral2/memory/4932-8-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/files/0x0008000000022d90-9.dat family_berbew behavioral2/files/0x0006000000022d9e-15.dat family_berbew behavioral2/memory/2720-17-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/files/0x0006000000022d9e-16.dat family_berbew behavioral2/files/0x0006000000022da0-23.dat family_berbew behavioral2/memory/2804-29-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/files/0x0006000000022da2-32.dat family_berbew behavioral2/files/0x0006000000022da4-40.dat family_berbew behavioral2/files/0x0006000000022da4-39.dat family_berbew behavioral2/files/0x0006000000022da6-48.dat family_berbew behavioral2/memory/1884-53-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/files/0x0006000000022da9-56.dat family_berbew behavioral2/files/0x0006000000022dab-62.dat family_berbew behavioral2/files/0x0006000000022db1-84.dat family_berbew behavioral2/files/0x0006000000022db5-97.dat family_berbew behavioral2/files/0x0006000000022dc1-140.dat family_berbew behavioral2/files/0x0006000000022dc5-154.dat family_berbew behavioral2/files/0x0006000000022dcb-175.dat family_berbew behavioral2/files/0x0006000000022dcd-182.dat family_berbew behavioral2/files/0x0006000000022ddb-230.dat family_berbew behavioral2/memory/2908-416-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/3212-418-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4952-420-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4152-422-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4296-424-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/3260-427-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/868-428-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4680-435-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/3244-441-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/2944-440-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/3376-439-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4572-438-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/2168-446-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/1756-447-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4148-453-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/220-454-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/1348-456-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4012-460-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4144-463-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/3772-464-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4900-466-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/3404-471-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/2100-470-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/1944-469-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/1212-468-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/1536-467-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/3764-465-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4564-462-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/316-461-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/2824-459-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/3028-458-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/3652-457-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/2568-455-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4388-452-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4752-451-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/1468-450-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4916-449-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4328-448-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/4176-445-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew behavioral2/memory/2064-444-0x0000000000400000-0x0000000000442000-memory.dmp family_berbew -
Executes dropped EXE 64 IoCs
pid Process 4932 Oqmhqapg.exe 2720 Ocnabm32.exe 2804 Pqbala32.exe 2552 Pjjfdfbb.exe 2488 Pcbkml32.exe 1884 Pmkofa32.exe 2336 Pfccogfc.exe 2908 Pbjddh32.exe 4184 Ppnenlka.exe 3212 Pmbegqjk.exe 3108 Qjffpe32.exe 4952 Qcnjijoe.exe 368 Qikbaaml.exe 4152 Acqgojmb.exe 3492 Aimogakj.exe 4296 Acccdj32.exe 3464 Amkhmoap.exe 2664 Ajohfcpj.exe 3260 Adgmoigj.exe 868 Ajaelc32.exe 4092 Apnndj32.exe 4820 Bigbmpco.exe 2180 Bdlfjh32.exe 3784 Biiobo32.exe 1612 Bbaclegm.exe 3332 Babcil32.exe 4680 Bkkhbb32.exe 3796 Bphqji32.exe 3628 Bkmeha32.exe 4572 Bpjmph32.exe 3376 Cibain32.exe 2944 Cbkfbcpb.exe 3244 Cmpjoloh.exe 2668 Cgiohbfi.exe 3560 Cancekeo.exe 2064 Cgklmacf.exe 4176 Caqpkjcl.exe 2168 Cgmhcaac.exe 1756 Cacmpj32.exe 4328 Dgpeha32.exe 4916 Daeifj32.exe 1468 Dcffnbee.exe 4752 Dnljkk32.exe 4388 Dcibca32.exe 4148 Dajbaika.exe 220 Dggkipii.exe 2568 Dpopbepi.exe 1348 Dgihop32.exe 3652 Dpalgenf.exe 3028 Egkddo32.exe 2824 Enemaimp.exe 4012 Edoencdm.exe 316 Ejlnfjbd.exe 4564 Epffbd32.exe 4144 Ekljpm32.exe 3772 Ephbhd32.exe 3764 Egbken32.exe 4900 Eahobg32.exe 1536 Ecikjoep.exe 1212 Enopghee.exe 1944 Fclhpo32.exe 2100 Fnalmh32.exe 3404 Fcneeo32.exe 3576 Fncibg32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cacmpj32.exe Cgmhcaac.exe File created C:\Windows\SysWOW64\Gcljpeah.dll Ggbmafnm.exe File created C:\Windows\SysWOW64\Ijiflg32.dll Afpbkicl.exe File created C:\Windows\SysWOW64\Acmkkk32.dll Cbihmg32.exe File opened for modification C:\Windows\SysWOW64\Ciefek32.exe Cbknhqbl.exe File created C:\Windows\SysWOW64\Alinebli.dll Lbhool32.exe File opened for modification C:\Windows\SysWOW64\Nkdlkope.exe Ndjcne32.exe File created C:\Windows\SysWOW64\Ppnlpm32.dll Plejoode.exe File opened for modification C:\Windows\SysWOW64\Lkgkqh32.exe Lncjgddf.exe File opened for modification C:\Windows\SysWOW64\Bigbmpco.exe Apnndj32.exe File created C:\Windows\SysWOW64\Acppddig.exe Aflpkpjm.exe File created C:\Windows\SysWOW64\Dqjhif32.dll Acppddig.exe File opened for modification C:\Windows\SysWOW64\Joobdfei.exe Jjbjlpga.exe File opened for modification C:\Windows\SysWOW64\Ckclfp32.exe Cdicje32.exe File created C:\Windows\SysWOW64\Gnblfkcj.dll Obeikc32.exe File opened for modification C:\Windows\SysWOW64\Kgeiokao.exe Kahpgcch.exe File created C:\Windows\SysWOW64\Fdpnda32.exe Fkgillpj.exe File opened for modification C:\Windows\SysWOW64\Oiehhjjp.exe Oajccgmd.exe File created C:\Windows\SysWOW64\Pjnbdofa.dll Djipbbne.exe File created C:\Windows\SysWOW64\Qdfefkll.exe Qipqibmf.exe File created C:\Windows\SysWOW64\Khcjhnoh.dll Pbahgbfc.exe File opened for modification C:\Windows\SysWOW64\Qelcamcj.exe Qppkhfec.exe File opened for modification C:\Windows\SysWOW64\Ophjdehd.exe Ohmepbki.exe File opened for modification C:\Windows\SysWOW64\Mbnjcg32.exe Mmaakpfd.exe File created C:\Windows\SysWOW64\Oihlnd32.dll Ddqbbo32.exe File created C:\Windows\SysWOW64\Hnokjm32.exe Hcifmdeo.exe File created C:\Windows\SysWOW64\Obncao32.dll Jglaepim.exe File opened for modification C:\Windows\SysWOW64\Eahobg32.exe Egbken32.exe File created C:\Windows\SysWOW64\Hlogfd32.exe Hgbonm32.exe File opened for modification C:\Windows\SysWOW64\Omhpcm32.exe Obcled32.exe File opened for modification C:\Windows\SysWOW64\Gnkflo32.exe Gceaofmc.exe File created C:\Windows\SysWOW64\Ldkfno32.exe Lonnfg32.exe File opened for modification C:\Windows\SysWOW64\Nfpghccm.exe Nkjckkcg.exe File created C:\Windows\SysWOW64\Mkofokch.dll Obeikc32.exe File created C:\Windows\SysWOW64\Jlgjfqgj.dll Ehkcgkdj.exe File created C:\Windows\SysWOW64\Ijlkfg32.exe Icbbimih.exe File created C:\Windows\SysWOW64\Pnenchoc.exe Pgkegn32.exe File created C:\Windows\SysWOW64\Iokkmq32.dll Qkpmcddi.exe File created C:\Windows\SysWOW64\Fpbpmhjb.exe Fnacfp32.exe File created C:\Windows\SysWOW64\Ljkgblln.dll Edoencdm.exe File opened for modification C:\Windows\SysWOW64\Fnalmh32.exe Fclhpo32.exe File created C:\Windows\SysWOW64\Cbpijjbj.dll Nfpghccm.exe File opened for modification C:\Windows\SysWOW64\Cpipkl32.exe Nkjqme32.exe File created C:\Windows\SysWOW64\Oigdefgf.dll Pahpee32.exe File created C:\Windows\SysWOW64\Boepfh32.dll Qhddgofo.exe File created C:\Windows\SysWOW64\Fnjmea32.exe Fceihh32.exe File created C:\Windows\SysWOW64\Oegjjp32.dll Accnco32.exe File created C:\Windows\SysWOW64\Lipmoo32.exe Lccdghmc.exe File opened for modification C:\Windows\SysWOW64\Aqdbfa32.exe Akgjnj32.exe File opened for modification C:\Windows\SysWOW64\Dnghhqdk.exe Dijppjfd.exe File created C:\Windows\SysWOW64\Eanqpdgi.exe Ecjpfp32.exe File opened for modification C:\Windows\SysWOW64\Obnbjdfi.exe Nmajbnha.exe File created C:\Windows\SysWOW64\Hlkbkddd.dll Pbjddh32.exe File opened for modification C:\Windows\SysWOW64\Decdeama.exe Dpglmjoj.exe File opened for modification C:\Windows\SysWOW64\Hladlc32.exe Hgdlcm32.exe File opened for modification C:\Windows\SysWOW64\Angleokb.exe Agndidce.exe File opened for modification C:\Windows\SysWOW64\Flfjjkgi.exe Fmejlcoj.exe File created C:\Windows\SysWOW64\Nmhglopl.exe Mbbcofpf.exe File created C:\Windows\SysWOW64\Bkjbah32.dll Kejloi32.exe File opened for modification C:\Windows\SysWOW64\Mjafoapj.exe Ldgnbg32.exe File created C:\Windows\SysWOW64\Dfdofh32.dll Phneqf32.exe File opened for modification C:\Windows\SysWOW64\Djipbbne.exe Celgjlpn.exe File created C:\Windows\SysWOW64\Hfncib32.dll Acmomgoa.exe File opened for modification C:\Windows\SysWOW64\Dcegkamd.exe Djmbbk32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 8972 7952 WerFault.exe 769 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gmjcgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aecpnk32.dll" Enfcjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kobnji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akjgdjoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aioebj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aaeekb32.dll" Hmhhpkcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmjdaoni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omclnn32.dll" Nfknmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kpanmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdlncn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdlhgpag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Odelpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkaljpmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abodhpic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdjjgggk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lohggm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hgbonm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cimhefgb.dll" Qfgfpp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifjoop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpinac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kajefoog.dll" Pjjfdfbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfijgnnj.dll" Cfcoblfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbljohcp.dll" Habeni32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihhmgaqb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dcffnbee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Albpff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfodmdni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mbbcofpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbbcofpf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okcccdkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkghqo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jodamh32.dll" Egbken32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbecljnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbecljnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdfpfdap.dll" Kbigajfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnenchoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dnghhqdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gceaofmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lkgkqh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oljoen32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Odljjo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Epeohn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlgjfqgj.dll" Ehkcgkdj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nipokfil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djjemlhf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Enemaimp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Opefdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhaaon32.dll" Angleokb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fmkohkha.dll" Ecjpfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cdkdne32.dll" Qppkhfec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgniimhp.dll" Pnknim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cgpjebcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Locnlmoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fppchile.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Akmjdpac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfffnphj.dll" Joobdfei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnmoglij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldkfno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Caqpkjcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldgnbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Emfgpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcmnkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hlhaee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfbmge32.dll" Lpjelibg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 4932 1224 NEAS.fb174a240162fd156b20f0faaa28b8b0.exe 84 PID 1224 wrote to memory of 4932 1224 NEAS.fb174a240162fd156b20f0faaa28b8b0.exe 84 PID 1224 wrote to memory of 4932 1224 NEAS.fb174a240162fd156b20f0faaa28b8b0.exe 84 PID 4932 wrote to memory of 2720 4932 Oqmhqapg.exe 85 PID 4932 wrote to memory of 2720 4932 Oqmhqapg.exe 85 PID 4932 wrote to memory of 2720 4932 Oqmhqapg.exe 85 PID 2720 wrote to memory of 2804 2720 Ocnabm32.exe 86 PID 2720 wrote to memory of 2804 2720 Ocnabm32.exe 86 PID 2720 wrote to memory of 2804 2720 Ocnabm32.exe 86 PID 2804 wrote to memory of 2552 2804 Pqbala32.exe 87 PID 2804 wrote to memory of 2552 2804 Pqbala32.exe 87 PID 2804 wrote to memory of 2552 2804 Pqbala32.exe 87 PID 2552 wrote to memory of 2488 2552 Pjjfdfbb.exe 208 PID 2552 wrote to memory of 2488 2552 Pjjfdfbb.exe 208 PID 2552 wrote to memory of 2488 2552 Pjjfdfbb.exe 208 PID 2488 wrote to memory of 1884 2488 Pcbkml32.exe 207 PID 2488 wrote to memory of 1884 2488 Pcbkml32.exe 207 PID 2488 wrote to memory of 1884 2488 Pcbkml32.exe 207 PID 1884 wrote to memory of 2336 1884 Pmkofa32.exe 206 PID 1884 wrote to memory of 2336 1884 Pmkofa32.exe 206 PID 1884 wrote to memory of 2336 1884 Pmkofa32.exe 206 PID 2336 wrote to memory of 2908 2336 Pfccogfc.exe 205 PID 2336 wrote to memory of 2908 2336 Pfccogfc.exe 205 PID 2336 wrote to memory of 2908 2336 Pfccogfc.exe 205 PID 2908 wrote to memory of 4184 2908 Pbjddh32.exe 203 PID 2908 wrote to memory of 4184 2908 Pbjddh32.exe 203 PID 2908 wrote to memory of 4184 2908 Pbjddh32.exe 203 PID 4184 wrote to memory of 3212 4184 Ppnenlka.exe 88 PID 4184 wrote to memory of 3212 4184 Ppnenlka.exe 88 PID 4184 wrote to memory of 3212 4184 Ppnenlka.exe 88 PID 3212 wrote to memory of 3108 3212 Pmbegqjk.exe 89 PID 3212 wrote to memory of 3108 3212 Pmbegqjk.exe 89 PID 3212 wrote to memory of 3108 3212 Pmbegqjk.exe 89 PID 3108 wrote to memory of 4952 3108 Qjffpe32.exe 90 PID 3108 wrote to memory of 4952 3108 Qjffpe32.exe 90 PID 3108 wrote to memory of 4952 3108 Qjffpe32.exe 90 PID 4952 wrote to memory of 368 4952 Qcnjijoe.exe 201 PID 4952 wrote to memory of 368 4952 Qcnjijoe.exe 201 PID 4952 wrote to memory of 368 4952 Qcnjijoe.exe 201 PID 368 wrote to memory of 4152 368 Qikbaaml.exe 199 PID 368 wrote to memory of 4152 368 Qikbaaml.exe 199 PID 368 wrote to memory of 4152 368 Qikbaaml.exe 199 PID 4152 wrote to memory of 3492 4152 Acqgojmb.exe 196 PID 4152 wrote to memory of 3492 4152 Acqgojmb.exe 196 PID 4152 wrote to memory of 3492 4152 Acqgojmb.exe 196 PID 3492 wrote to memory of 4296 3492 Aimogakj.exe 91 PID 3492 wrote to memory of 4296 3492 Aimogakj.exe 91 PID 3492 wrote to memory of 4296 3492 Aimogakj.exe 91 PID 4296 wrote to memory of 3464 4296 Acccdj32.exe 92 PID 4296 wrote to memory of 3464 4296 Acccdj32.exe 92 PID 4296 wrote to memory of 3464 4296 Acccdj32.exe 92 PID 3464 wrote to memory of 2664 3464 Amkhmoap.exe 93 PID 3464 wrote to memory of 2664 3464 Amkhmoap.exe 93 PID 3464 wrote to memory of 2664 3464 Amkhmoap.exe 93 PID 2664 wrote to memory of 3260 2664 Ajohfcpj.exe 193 PID 2664 wrote to memory of 3260 2664 Ajohfcpj.exe 193 PID 2664 wrote to memory of 3260 2664 Ajohfcpj.exe 193 PID 3260 wrote to memory of 868 3260 Adgmoigj.exe 94 PID 3260 wrote to memory of 868 3260 Adgmoigj.exe 94 PID 3260 wrote to memory of 868 3260 Adgmoigj.exe 94 PID 868 wrote to memory of 4092 868 Ajaelc32.exe 192 PID 868 wrote to memory of 4092 868 Ajaelc32.exe 192 PID 868 wrote to memory of 4092 868 Ajaelc32.exe 192 PID 4092 wrote to memory of 4820 4092 Apnndj32.exe 188
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fb174a240162fd156b20f0faaa28b8b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fb174a240162fd156b20f0faaa28b8b0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\Oqmhqapg.exeC:\Windows\system32\Oqmhqapg.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\Ocnabm32.exeC:\Windows\system32\Ocnabm32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Pqbala32.exeC:\Windows\system32\Pqbala32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Pjjfdfbb.exeC:\Windows\system32\Pjjfdfbb.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\Pcbkml32.exeC:\Windows\system32\Pcbkml32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488
-
-
-
-
-
-
C:\Windows\SysWOW64\Pmbegqjk.exeC:\Windows\system32\Pmbegqjk.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\Qjffpe32.exeC:\Windows\system32\Qjffpe32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\Qcnjijoe.exeC:\Windows\system32\Qcnjijoe.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\Qikbaaml.exeC:\Windows\system32\Qikbaaml.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:368
-
-
-
-
C:\Windows\SysWOW64\Acccdj32.exeC:\Windows\system32\Acccdj32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\Amkhmoap.exeC:\Windows\system32\Amkhmoap.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\Ajohfcpj.exeC:\Windows\system32\Ajohfcpj.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Adgmoigj.exeC:\Windows\system32\Adgmoigj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260
-
-
-
-
C:\Windows\SysWOW64\Ajaelc32.exeC:\Windows\system32\Ajaelc32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\Apnndj32.exeC:\Windows\system32\Apnndj32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4092
-
-
C:\Windows\SysWOW64\Biiobo32.exeC:\Windows\system32\Biiobo32.exe1⤵
- Executes dropped EXE
PID:3784 -
C:\Windows\SysWOW64\Bbaclegm.exeC:\Windows\system32\Bbaclegm.exe2⤵
- Executes dropped EXE
PID:1612
-
-
C:\Windows\SysWOW64\Bkmeha32.exeC:\Windows\system32\Bkmeha32.exe1⤵
- Executes dropped EXE
PID:3628 -
C:\Windows\SysWOW64\Bpjmph32.exeC:\Windows\system32\Bpjmph32.exe2⤵
- Executes dropped EXE
PID:4572
-
-
C:\Windows\SysWOW64\Cbkfbcpb.exeC:\Windows\system32\Cbkfbcpb.exe1⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\Cmpjoloh.exeC:\Windows\system32\Cmpjoloh.exe2⤵
- Executes dropped EXE
PID:3244
-
-
C:\Windows\SysWOW64\Cgklmacf.exeC:\Windows\system32\Cgklmacf.exe1⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\Caqpkjcl.exeC:\Windows\system32\Caqpkjcl.exe2⤵
- Executes dropped EXE
- Modifies registry class
PID:4176
-
-
C:\Windows\SysWOW64\Cgmhcaac.exeC:\Windows\system32\Cgmhcaac.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\Cacmpj32.exeC:\Windows\system32\Cacmpj32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1756
-
-
C:\Windows\SysWOW64\Dgpeha32.exeC:\Windows\system32\Dgpeha32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4328 -
C:\Windows\SysWOW64\Daeifj32.exeC:\Windows\system32\Daeifj32.exe2⤵
- Executes dropped EXE
PID:4916
-
-
C:\Windows\SysWOW64\Dcffnbee.exeC:\Windows\system32\Dcffnbee.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:1468 -
C:\Windows\SysWOW64\Dnljkk32.exeC:\Windows\system32\Dnljkk32.exe2⤵
- Executes dropped EXE
PID:4752
-
-
C:\Windows\SysWOW64\Dajbaika.exeC:\Windows\system32\Dajbaika.exe1⤵
- Executes dropped EXE
PID:4148 -
C:\Windows\SysWOW64\Dggkipii.exeC:\Windows\system32\Dggkipii.exe2⤵
- Executes dropped EXE
PID:220
-
-
C:\Windows\SysWOW64\Dpopbepi.exeC:\Windows\system32\Dpopbepi.exe1⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Dgihop32.exeC:\Windows\system32\Dgihop32.exe2⤵
- Executes dropped EXE
PID:1348
-
-
C:\Windows\SysWOW64\Enemaimp.exeC:\Windows\system32\Enemaimp.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:2824 -
C:\Windows\SysWOW64\Edoencdm.exeC:\Windows\system32\Edoencdm.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4012
-
-
C:\Windows\SysWOW64\Epffbd32.exeC:\Windows\system32\Epffbd32.exe1⤵
- Executes dropped EXE
PID:4564 -
C:\Windows\SysWOW64\Ekljpm32.exeC:\Windows\system32\Ekljpm32.exe2⤵
- Executes dropped EXE
PID:4144
-
-
C:\Windows\SysWOW64\Ephbhd32.exeC:\Windows\system32\Ephbhd32.exe1⤵
- Executes dropped EXE
PID:3772 -
C:\Windows\SysWOW64\Egbken32.exeC:\Windows\system32\Egbken32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3764
-
-
C:\Windows\SysWOW64\Ecikjoep.exeC:\Windows\system32\Ecikjoep.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\Enopghee.exeC:\Windows\system32\Enopghee.exe2⤵
- Executes dropped EXE
PID:1212
-
-
C:\Windows\SysWOW64\Fclhpo32.exeC:\Windows\system32\Fclhpo32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\Fnalmh32.exeC:\Windows\system32\Fnalmh32.exe2⤵
- Executes dropped EXE
PID:2100
-
-
C:\Windows\SysWOW64\Fcneeo32.exeC:\Windows\system32\Fcneeo32.exe1⤵
- Executes dropped EXE
PID:3404 -
C:\Windows\SysWOW64\Fncibg32.exeC:\Windows\system32\Fncibg32.exe2⤵
- Executes dropped EXE
PID:3576 -
C:\Windows\SysWOW64\Fdmaoahm.exeC:\Windows\system32\Fdmaoahm.exe3⤵PID:4524
-
-
-
C:\Windows\SysWOW64\Fkgillpj.exeC:\Windows\system32\Fkgillpj.exe1⤵
- Drops file in System32 directory
PID:1036 -
C:\Windows\SysWOW64\Fdpnda32.exeC:\Windows\system32\Fdpnda32.exe2⤵PID:1464
-
C:\Windows\SysWOW64\Fjmfmh32.exeC:\Windows\system32\Fjmfmh32.exe3⤵PID:4632
-
-
-
C:\Windows\SysWOW64\Fdbkja32.exeC:\Windows\system32\Fdbkja32.exe1⤵PID:4812
-
C:\Windows\SysWOW64\Kejloi32.exeC:\Windows\system32\Kejloi32.exe2⤵
- Drops file in System32 directory
PID:1932 -
C:\Windows\SysWOW64\Kocphojh.exeC:\Windows\system32\Kocphojh.exe3⤵PID:3392
-
C:\Windows\SysWOW64\Khkdad32.exeC:\Windows\system32\Khkdad32.exe4⤵PID:3972
-
C:\Windows\SysWOW64\Lbqinm32.exeC:\Windows\system32\Lbqinm32.exe5⤵PID:3556
-
C:\Windows\SysWOW64\Ldbefe32.exeC:\Windows\system32\Ldbefe32.exe6⤵PID:2476
-
C:\Windows\SysWOW64\Laffpi32.exeC:\Windows\system32\Laffpi32.exe7⤵PID:1972
-
C:\Windows\SysWOW64\Lhpnlclc.exeC:\Windows\system32\Lhpnlclc.exe8⤵PID:740
-
C:\Windows\SysWOW64\Lbebilli.exeC:\Windows\system32\Lbebilli.exe9⤵PID:452
-
C:\Windows\SysWOW64\Lhbkac32.exeC:\Windows\system32\Lhbkac32.exe10⤵PID:4272
-
C:\Windows\SysWOW64\Lbhool32.exeC:\Windows\system32\Lbhool32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:684 -
C:\Windows\SysWOW64\Lhdggb32.exeC:\Windows\system32\Lhdggb32.exe12⤵PID:4556
-
C:\Windows\SysWOW64\Loopdmpk.exeC:\Windows\system32\Loopdmpk.exe13⤵PID:4140
-
C:\Windows\SysWOW64\Ldkhlcnb.exeC:\Windows\system32\Ldkhlcnb.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2708 -
C:\Windows\SysWOW64\Mkepineo.exeC:\Windows\system32\Mkepineo.exe15⤵PID:1504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Eahobg32.exeC:\Windows\system32\Eahobg32.exe1⤵
- Executes dropped EXE
PID:4900
-
C:\Windows\SysWOW64\Ejlnfjbd.exeC:\Windows\system32\Ejlnfjbd.exe1⤵
- Executes dropped EXE
PID:316
-
C:\Windows\SysWOW64\Egkddo32.exeC:\Windows\system32\Egkddo32.exe1⤵
- Executes dropped EXE
PID:3028
-
C:\Windows\SysWOW64\Dpalgenf.exeC:\Windows\system32\Dpalgenf.exe1⤵
- Executes dropped EXE
PID:3652
-
C:\Windows\SysWOW64\Maoifh32.exeC:\Windows\system32\Maoifh32.exe1⤵PID:4396
-
C:\Windows\SysWOW64\Mociol32.exeC:\Windows\system32\Mociol32.exe2⤵PID:688
-
C:\Windows\SysWOW64\Memalfcb.exeC:\Windows\system32\Memalfcb.exe3⤵PID:4876
-
C:\Windows\SysWOW64\Mcabej32.exeC:\Windows\system32\Mcabej32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4064 -
C:\Windows\SysWOW64\Nhbciqln.exeC:\Windows\system32\Nhbciqln.exe5⤵PID:1384
-
C:\Windows\SysWOW64\Nomlek32.exeC:\Windows\system32\Nomlek32.exe6⤵PID:3352
-
C:\Windows\SysWOW64\Ndidna32.exeC:\Windows\system32\Ndidna32.exe7⤵PID:4260
-
C:\Windows\SysWOW64\Namegfql.exeC:\Windows\system32\Namegfql.exe8⤵PID:4728
-
C:\Windows\SysWOW64\Nlcidopb.exeC:\Windows\system32\Nlcidopb.exe9⤵PID:932
-
C:\Windows\SysWOW64\Nfknmd32.exeC:\Windows\system32\Nfknmd32.exe10⤵
- Modifies registry class
PID:1112 -
C:\Windows\SysWOW64\Nconfh32.exeC:\Windows\system32\Nconfh32.exe11⤵PID:216
-
C:\Windows\SysWOW64\Ndpjnq32.exeC:\Windows\system32\Ndpjnq32.exe12⤵PID:1576
-
C:\Windows\SysWOW64\Nkjckkcg.exeC:\Windows\system32\Nkjckkcg.exe13⤵
- Drops file in System32 directory
PID:3080 -
C:\Windows\SysWOW64\Nfpghccm.exeC:\Windows\system32\Nfpghccm.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3380 -
C:\Windows\SysWOW64\Oljoen32.exeC:\Windows\system32\Oljoen32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4700 -
C:\Windows\SysWOW64\Ofbdncaj.exeC:\Windows\system32\Ofbdncaj.exe16⤵PID:2148
-
C:\Windows\SysWOW64\Ollljmhg.exeC:\Windows\system32\Ollljmhg.exe17⤵PID:5164
-
C:\Windows\SysWOW64\Obidcdfo.exeC:\Windows\system32\Obidcdfo.exe18⤵PID:5204
-
C:\Windows\SysWOW64\Ohcmpn32.exeC:\Windows\system32\Ohcmpn32.exe19⤵PID:5272
-
C:\Windows\SysWOW64\Odjmdocp.exeC:\Windows\system32\Odjmdocp.exe20⤵PID:5324
-
C:\Windows\SysWOW64\Ocknbglo.exeC:\Windows\system32\Ocknbglo.exe21⤵PID:5368
-
C:\Windows\SysWOW64\Odljjo32.exeC:\Windows\system32\Odljjo32.exe22⤵
- Modifies registry class
PID:5412 -
C:\Windows\SysWOW64\Ooangh32.exeC:\Windows\system32\Ooangh32.exe23⤵PID:5460
-
C:\Windows\SysWOW64\Pmjhlklg.exeC:\Windows\system32\Pmjhlklg.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5500 -
C:\Windows\SysWOW64\Pcdqhecd.exeC:\Windows\system32\Pcdqhecd.exe25⤵PID:5544
-
C:\Windows\SysWOW64\Piaiqlak.exeC:\Windows\system32\Piaiqlak.exe26⤵PID:5584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Dcibca32.exeC:\Windows\system32\Dcibca32.exe1⤵
- Executes dropped EXE
PID:4388
-
C:\Windows\SysWOW64\Cancekeo.exeC:\Windows\system32\Cancekeo.exe1⤵
- Executes dropped EXE
PID:3560
-
C:\Windows\SysWOW64\Cgiohbfi.exeC:\Windows\system32\Cgiohbfi.exe1⤵
- Executes dropped EXE
PID:2668
-
C:\Windows\SysWOW64\Cibain32.exeC:\Windows\system32\Cibain32.exe1⤵
- Executes dropped EXE
PID:3376
-
C:\Windows\SysWOW64\Bphqji32.exeC:\Windows\system32\Bphqji32.exe1⤵
- Executes dropped EXE
PID:3796
-
C:\Windows\SysWOW64\Bkkhbb32.exeC:\Windows\system32\Bkkhbb32.exe1⤵
- Executes dropped EXE
PID:4680
-
C:\Windows\SysWOW64\Babcil32.exeC:\Windows\system32\Babcil32.exe1⤵
- Executes dropped EXE
PID:3332
-
C:\Windows\SysWOW64\Pokanf32.exeC:\Windows\system32\Pokanf32.exe1⤵PID:5632
-
C:\Windows\SysWOW64\Pehjfm32.exeC:\Windows\system32\Pehjfm32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5692 -
C:\Windows\SysWOW64\Pomncfge.exeC:\Windows\system32\Pomncfge.exe3⤵PID:5736
-
C:\Windows\SysWOW64\Qfgfpp32.exeC:\Windows\system32\Qfgfpp32.exe4⤵
- Modifies registry class
PID:5788 -
C:\Windows\SysWOW64\Qppkhfec.exeC:\Windows\system32\Qppkhfec.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5844 -
C:\Windows\SysWOW64\Qelcamcj.exeC:\Windows\system32\Qelcamcj.exe6⤵PID:5884
-
C:\Windows\SysWOW64\Aflpkpjm.exeC:\Windows\system32\Aflpkpjm.exe7⤵
- Drops file in System32 directory
PID:5940 -
C:\Windows\SysWOW64\Acppddig.exeC:\Windows\system32\Acppddig.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5984 -
C:\Windows\SysWOW64\Aimhmkgn.exeC:\Windows\system32\Aimhmkgn.exe9⤵PID:6036
-
C:\Windows\SysWOW64\Apgqie32.exeC:\Windows\system32\Apgqie32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6084 -
C:\Windows\SysWOW64\Aioebj32.exeC:\Windows\system32\Aioebj32.exe11⤵
- Modifies registry class
PID:6136 -
C:\Windows\SysWOW64\Ammnhilb.exeC:\Windows\system32\Ammnhilb.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5172 -
C:\Windows\SysWOW64\Afeban32.exeC:\Windows\system32\Afeban32.exe13⤵PID:5280
-
C:\Windows\SysWOW64\Albkieqj.exeC:\Windows\system32\Albkieqj.exe14⤵PID:4748
-
C:\Windows\SysWOW64\Bfhofnpp.exeC:\Windows\system32\Bfhofnpp.exe15⤵PID:3372
-
C:\Windows\SysWOW64\Bmagch32.exeC:\Windows\system32\Bmagch32.exe16⤵PID:5444
-
C:\Windows\SysWOW64\Bfjllnnm.exeC:\Windows\system32\Bfjllnnm.exe17⤵PID:5532
-
C:\Windows\SysWOW64\Blgddd32.exeC:\Windows\system32\Blgddd32.exe18⤵PID:5600
-
C:\Windows\SysWOW64\Bbalaoda.exeC:\Windows\system32\Bbalaoda.exe19⤵PID:5700
-
C:\Windows\SysWOW64\Bpemkcck.exeC:\Windows\system32\Bpemkcck.exe20⤵PID:5784
-
C:\Windows\SysWOW64\Bfoegm32.exeC:\Windows\system32\Bfoegm32.exe21⤵PID:5860
-
C:\Windows\SysWOW64\Blknpdho.exeC:\Windows\system32\Blknpdho.exe22⤵PID:5928
-
C:\Windows\SysWOW64\Bipnihgi.exeC:\Windows\system32\Bipnihgi.exe23⤵PID:6068
-
C:\Windows\SysWOW64\Cfcoblfb.exeC:\Windows\system32\Cfcoblfb.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6124 -
C:\Windows\SysWOW64\Cplckbmc.exeC:\Windows\system32\Cplckbmc.exe25⤵PID:5232
-
C:\Windows\SysWOW64\Cidgdg32.exeC:\Windows\system32\Cidgdg32.exe26⤵PID:5404
-
C:\Windows\SysWOW64\Cfhhml32.exeC:\Windows\system32\Cfhhml32.exe27⤵PID:5508
-
C:\Windows\SysWOW64\Cdlhgpag.exeC:\Windows\system32\Cdlhgpag.exe28⤵
- Modifies registry class
PID:5680 -
C:\Windows\SysWOW64\Cmdmpe32.exeC:\Windows\system32\Cmdmpe32.exe29⤵PID:5876
-
C:\Windows\SysWOW64\Cfmahknh.exeC:\Windows\system32\Cfmahknh.exe30⤵PID:5936
-
C:\Windows\SysWOW64\Ddqbbo32.exeC:\Windows\system32\Ddqbbo32.exe31⤵
- Drops file in System32 directory
PID:4928 -
C:\Windows\SysWOW64\Dpgbgpbe.exeC:\Windows\system32\Dpgbgpbe.exe32⤵PID:5348
-
C:\Windows\SysWOW64\Dpjompqc.exeC:\Windows\system32\Dpjompqc.exe33⤵PID:5576
-
C:\Windows\SysWOW64\Dgdgijhp.exeC:\Windows\system32\Dgdgijhp.exe34⤵PID:5820
-
C:\Windows\SysWOW64\Dmplkd32.exeC:\Windows\system32\Dmplkd32.exe35⤵PID:6128
-
C:\Windows\SysWOW64\Eleimp32.exeC:\Windows\system32\Eleimp32.exe36⤵PID:1828
-
C:\Windows\SysWOW64\Eennefib.exeC:\Windows\system32\Eennefib.exe37⤵PID:5808
-
C:\Windows\SysWOW64\Edoncm32.exeC:\Windows\system32\Edoncm32.exe38⤵PID:6120
-
C:\Windows\SysWOW64\Eepkkefp.exeC:\Windows\system32\Eepkkefp.exe39⤵PID:5624
-
C:\Windows\SysWOW64\Epeohn32.exeC:\Windows\system32\Epeohn32.exe40⤵
- Modifies registry class
PID:5256 -
C:\Windows\SysWOW64\Egpgehnb.exeC:\Windows\system32\Egpgehnb.exe41⤵PID:3348
-
C:\Windows\SysWOW64\Ellpmolj.exeC:\Windows\system32\Ellpmolj.exe42⤵PID:6172
-
C:\Windows\SysWOW64\Egbdjhlp.exeC:\Windows\system32\Egbdjhlp.exe43⤵PID:6220
-
C:\Windows\SysWOW64\Edfddl32.exeC:\Windows\system32\Edfddl32.exe44⤵PID:6260
-
C:\Windows\SysWOW64\Eegqldqg.exeC:\Windows\system32\Eegqldqg.exe45⤵PID:6312
-
C:\Windows\SysWOW64\Fckaeioa.exeC:\Windows\system32\Fckaeioa.exe46⤵PID:6360
-
C:\Windows\SysWOW64\Fcmnkh32.exeC:\Windows\system32\Fcmnkh32.exe47⤵
- Modifies registry class
PID:6428 -
C:\Windows\SysWOW64\Fncbha32.exeC:\Windows\system32\Fncbha32.exe48⤵PID:6476
-
C:\Windows\SysWOW64\Fjjcmbci.exeC:\Windows\system32\Fjjcmbci.exe49⤵PID:6520
-
C:\Windows\SysWOW64\Fcbgfhii.exeC:\Windows\system32\Fcbgfhii.exe50⤵PID:6564
-
C:\Windows\SysWOW64\Fnglcqio.exeC:\Windows\system32\Fnglcqio.exe51⤵PID:6604
-
C:\Windows\SysWOW64\Fcddkggf.exeC:\Windows\system32\Fcddkggf.exe52⤵PID:6652
-
C:\Windows\SysWOW64\Glmhdm32.exeC:\Windows\system32\Glmhdm32.exe53⤵PID:6692
-
C:\Windows\SysWOW64\Ggbmafnm.exeC:\Windows\system32\Ggbmafnm.exe54⤵
- Drops file in System32 directory
PID:6736 -
C:\Windows\SysWOW64\Gloejmld.exeC:\Windows\system32\Gloejmld.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6784 -
C:\Windows\SysWOW64\Gfgjbb32.exeC:\Windows\system32\Gfgjbb32.exe56⤵PID:6828
-
C:\Windows\SysWOW64\Gckjlf32.exeC:\Windows\system32\Gckjlf32.exe57⤵PID:6872
-
C:\Windows\SysWOW64\Gmdoel32.exeC:\Windows\system32\Gmdoel32.exe58⤵PID:6912
-
C:\Windows\SysWOW64\Ggicbe32.exeC:\Windows\system32\Ggicbe32.exe59⤵PID:6952
-
C:\Windows\SysWOW64\Gmfkjl32.exeC:\Windows\system32\Gmfkjl32.exe60⤵PID:7008
-
C:\Windows\SysWOW64\Gglpgd32.exeC:\Windows\system32\Gglpgd32.exe61⤵PID:7052
-
C:\Windows\SysWOW64\Hmhhpkcj.exeC:\Windows\system32\Hmhhpkcj.exe62⤵
- Modifies registry class
PID:7096 -
C:\Windows\SysWOW64\Hnhdjn32.exeC:\Windows\system32\Hnhdjn32.exe63⤵PID:7136
-
C:\Windows\SysWOW64\Hfcinq32.exeC:\Windows\system32\Hfcinq32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6152 -
C:\Windows\SysWOW64\Hddilh32.exeC:\Windows\system32\Hddilh32.exe65⤵PID:6244
-
C:\Windows\SysWOW64\Hcifmdeo.exeC:\Windows\system32\Hcifmdeo.exe66⤵
- Drops file in System32 directory
PID:6300 -
C:\Windows\SysWOW64\Hnokjm32.exeC:\Windows\system32\Hnokjm32.exe67⤵PID:6436
-
C:\Windows\SysWOW64\Ifjoop32.exeC:\Windows\system32\Ifjoop32.exe68⤵
- Modifies registry class
PID:6488 -
C:\Windows\SysWOW64\Icnphd32.exeC:\Windows\system32\Icnphd32.exe69⤵PID:6572
-
C:\Windows\SysWOW64\Incdem32.exeC:\Windows\system32\Incdem32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6620 -
C:\Windows\SysWOW64\Icqmncof.exeC:\Windows\system32\Icqmncof.exe71⤵PID:6680
-
C:\Windows\SysWOW64\Icciccmd.exeC:\Windows\system32\Icciccmd.exe72⤵PID:6764
-
C:\Windows\SysWOW64\Imknli32.exeC:\Windows\system32\Imknli32.exe73⤵PID:6816
-
C:\Windows\SysWOW64\Ifcben32.exeC:\Windows\system32\Ifcben32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6896 -
C:\Windows\SysWOW64\Iedbcebd.exeC:\Windows\system32\Iedbcebd.exe75⤵PID:6968
-
C:\Windows\SysWOW64\Jjakkmpk.exeC:\Windows\system32\Jjakkmpk.exe76⤵PID:7036
-
C:\Windows\SysWOW64\Jjdgal32.exeC:\Windows\system32\Jjdgal32.exe77⤵PID:7108
-
C:\Windows\SysWOW64\Jeilne32.exeC:\Windows\system32\Jeilne32.exe78⤵PID:7164
-
C:\Windows\SysWOW64\Jfkhfmdm.exeC:\Windows\system32\Jfkhfmdm.exe79⤵PID:6200
-
C:\Windows\SysWOW64\Jmdqbg32.exeC:\Windows\system32\Jmdqbg32.exe80⤵PID:6344
-
C:\Windows\SysWOW64\Jmgmhgig.exeC:\Windows\system32\Jmgmhgig.exe81⤵PID:6512
-
C:\Windows\SysWOW64\Jglaepim.exeC:\Windows\system32\Jglaepim.exe82⤵
- Drops file in System32 directory
PID:6588 -
C:\Windows\SysWOW64\Jaefne32.exeC:\Windows\system32\Jaefne32.exe83⤵PID:6720
-
C:\Windows\SysWOW64\Kfanflne.exeC:\Windows\system32\Kfanflne.exe84⤵PID:6804
-
C:\Windows\SysWOW64\Kceoppmo.exeC:\Windows\system32\Kceoppmo.exe85⤵PID:6940
-
C:\Windows\SysWOW64\Knkcmild.exeC:\Windows\system32\Knkcmild.exe86⤵PID:7124
-
C:\Windows\SysWOW64\Kdhlepkl.exeC:\Windows\system32\Kdhlepkl.exe87⤵PID:6304
-
C:\Windows\SysWOW64\Kmppneal.exeC:\Windows\system32\Kmppneal.exe88⤵PID:6336
-
C:\Windows\SysWOW64\Kfidgk32.exeC:\Windows\system32\Kfidgk32.exe89⤵PID:6684
-
C:\Windows\SysWOW64\Khhaanop.exeC:\Windows\system32\Khhaanop.exe90⤵PID:6860
-
C:\Windows\SysWOW64\Kaqejcep.exeC:\Windows\system32\Kaqejcep.exe91⤵PID:7104
-
C:\Windows\SysWOW64\Ljijci32.exeC:\Windows\system32\Ljijci32.exe92⤵PID:7020
-
C:\Windows\SysWOW64\Logbigbg.exeC:\Windows\system32\Logbigbg.exe93⤵PID:6672
-
C:\Windows\SysWOW64\Leqkeajd.exeC:\Windows\system32\Leqkeajd.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7084 -
C:\Windows\SysWOW64\Loiong32.exeC:\Windows\system32\Loiong32.exe95⤵PID:6508
-
C:\Windows\SysWOW64\Lkppchfi.exeC:\Windows\system32\Lkppchfi.exe96⤵PID:6632
-
C:\Windows\SysWOW64\Nhkpdi32.exeC:\Windows\system32\Nhkpdi32.exe97⤵PID:7180
-
C:\Windows\SysWOW64\Oeopnmoa.exeC:\Windows\system32\Oeopnmoa.exe98⤵PID:7228
-
C:\Windows\SysWOW64\Onjebpml.exeC:\Windows\system32\Onjebpml.exe99⤵PID:7268
-
C:\Windows\SysWOW64\Oojalb32.exeC:\Windows\system32\Oojalb32.exe100⤵PID:7308
-
C:\Windows\SysWOW64\Ohbfeh32.exeC:\Windows\system32\Ohbfeh32.exe101⤵PID:7352
-
C:\Windows\SysWOW64\Oakjnnap.exeC:\Windows\system32\Oakjnnap.exe102⤵PID:7392
-
C:\Windows\SysWOW64\Oggbfdog.exeC:\Windows\system32\Oggbfdog.exe103⤵PID:7448
-
C:\Windows\SysWOW64\Pocdba32.exeC:\Windows\system32\Pocdba32.exe104⤵PID:7488
-
C:\Windows\SysWOW64\Pgoigcip.exeC:\Windows\system32\Pgoigcip.exe105⤵PID:7528
-
C:\Windows\SysWOW64\Pnhacn32.exeC:\Windows\system32\Pnhacn32.exe106⤵PID:7568
-
C:\Windows\SysWOW64\Phneqf32.exeC:\Windows\system32\Phneqf32.exe107⤵
- Drops file in System32 directory
PID:7612 -
C:\Windows\SysWOW64\Pnknim32.exeC:\Windows\system32\Pnknim32.exe108⤵
- Modifies registry class
PID:7660 -
C:\Windows\SysWOW64\Pkonbamc.exeC:\Windows\system32\Pkonbamc.exe109⤵PID:7704
-
C:\Windows\SysWOW64\Pfdbpjmi.exeC:\Windows\system32\Pfdbpjmi.exe110⤵PID:7752
-
C:\Windows\SysWOW64\Qkakhakq.exeC:\Windows\system32\Qkakhakq.exe111⤵PID:7812
-
C:\Windows\SysWOW64\Qbkcek32.exeC:\Windows\system32\Qbkcek32.exe112⤵PID:7860
-
C:\Windows\SysWOW64\Qghlmbae.exeC:\Windows\system32\Qghlmbae.exe113⤵PID:7912
-
C:\Windows\SysWOW64\Qnbdjl32.exeC:\Windows\system32\Qnbdjl32.exe114⤵PID:7960
-
C:\Windows\SysWOW64\Qhghge32.exeC:\Windows\system32\Qhghge32.exe115⤵PID:8008
-
C:\Windows\SysWOW64\Abpmpkoh.exeC:\Windows\system32\Abpmpkoh.exe116⤵PID:8048
-
C:\Windows\SysWOW64\Aijeme32.exeC:\Windows\system32\Aijeme32.exe117⤵PID:8096
-
C:\Windows\SysWOW64\Abbiej32.exeC:\Windows\system32\Abbiej32.exe118⤵PID:8144
-
C:\Windows\SysWOW64\Akjnnpcf.exeC:\Windows\system32\Akjnnpcf.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:8184 -
C:\Windows\SysWOW64\Afpbkicl.exeC:\Windows\system32\Afpbkicl.exe120⤵
- Drops file in System32 directory
PID:7240 -
C:\Windows\SysWOW64\Akmjdpac.exeC:\Windows\system32\Akmjdpac.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:7320 -
C:\Windows\SysWOW64\Aiqkmd32.exeC:\Windows\system32\Aiqkmd32.exe122⤵PID:7372
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-