Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 16:56
Behavioral task
behavioral1
Sample
NEAS.714e16a51240092e19839bf264069656.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.714e16a51240092e19839bf264069656.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.714e16a51240092e19839bf264069656.exe
-
Size
1.2MB
-
MD5
714e16a51240092e19839bf264069656
-
SHA1
c2182044d3f9a2d21d1a50f383103369b5c591d8
-
SHA256
807ded506d7ba828b50b87132bb760ba0a6b8ed4d095fd924b5ea5eea73a1c20
-
SHA512
a446bb3780cc26afe14dce2f9f3f0fda875c7dc49a60ef9460046b319877d43de60a66ba743b795814a1f470727e019cbbb462c0d46060300b219b0196befdd3
-
SSDEEP
12288:mry8XFv/WHCXwpnsKvNA+XTvZHWuEo3oW2to:mG0FXApsKv2EvZHp3oW2to
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obfpejcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enfjdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jliimf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qppkhfec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nloikqnl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ibicgmhe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mciokcgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmiealgc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppamjcpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmbdnhme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flghognq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egcaod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcgjhega.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkefphem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lkmkfncf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbahgbfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmhhnmao.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgagll32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdmfllhn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnhadnpe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pajekb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmaojl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdhdkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndagao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jjjgbhlm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ioffhn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdfbbhdp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnaqqj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lkdgqbag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdbchp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lplpcc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocpghj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Codhgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ciknefmk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Beeokgei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmiealgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Niqnli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljlagndl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcbmegol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cemndbci.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opfedb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cemndbci.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmbjcb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djjobedk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nieggill.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofqpje32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oemephgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojhiogdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Feifgnki.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdklebje.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcfhlh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjeckojo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikifhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifglmlol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgijnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odjmdocp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfpghccm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blknpdho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Codhgg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cpcpfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deejpjgc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qajhigcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfdbknda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djgdkk32.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0007000000022d76-7.dat family_berbew behavioral2/files/0x0007000000022d76-6.dat family_berbew behavioral2/files/0x0006000000022d7c-14.dat family_berbew behavioral2/files/0x0006000000022d7c-16.dat family_berbew behavioral2/files/0x0006000000022d7e-22.dat family_berbew behavioral2/files/0x0006000000022d7e-24.dat family_berbew behavioral2/files/0x0006000000022d81-30.dat family_berbew behavioral2/files/0x0006000000022d81-32.dat family_berbew behavioral2/files/0x0006000000022d83-37.dat family_berbew behavioral2/files/0x0006000000022d83-40.dat family_berbew behavioral2/files/0x0006000000022d86-47.dat family_berbew behavioral2/files/0x0006000000022d86-46.dat family_berbew behavioral2/files/0x0006000000022d88-54.dat family_berbew behavioral2/files/0x0006000000022d88-55.dat family_berbew behavioral2/files/0x0006000000022d8a-62.dat family_berbew behavioral2/files/0x0006000000022d8a-63.dat family_berbew behavioral2/files/0x0006000000022d8d-72.dat family_berbew behavioral2/files/0x0006000000022d8d-70.dat family_berbew behavioral2/files/0x0006000000022d8f-78.dat family_berbew behavioral2/files/0x0006000000022d8f-80.dat family_berbew behavioral2/files/0x0006000000022d91-89.dat family_berbew behavioral2/files/0x0006000000022d93-96.dat family_berbew behavioral2/files/0x0006000000022d93-97.dat family_berbew behavioral2/files/0x0006000000022d95-104.dat family_berbew behavioral2/files/0x0006000000022d95-105.dat family_berbew behavioral2/files/0x0006000000022d91-87.dat family_berbew behavioral2/files/0x0006000000022d97-116.dat family_berbew behavioral2/files/0x0006000000022d99-125.dat family_berbew behavioral2/files/0x0006000000022d99-124.dat family_berbew behavioral2/files/0x0006000000022d9b-133.dat family_berbew behavioral2/files/0x0006000000022d9b-134.dat family_berbew behavioral2/files/0x0006000000022d97-115.dat family_berbew behavioral2/files/0x0006000000022d9d-142.dat family_berbew behavioral2/files/0x0006000000022d9d-143.dat family_berbew behavioral2/files/0x0006000000022d9f-151.dat family_berbew behavioral2/files/0x0006000000022d9f-154.dat family_berbew behavioral2/files/0x0006000000022da1-161.dat family_berbew behavioral2/files/0x0006000000022da1-160.dat family_berbew behavioral2/files/0x0006000000022da3-168.dat family_berbew behavioral2/files/0x0006000000022da3-170.dat family_berbew behavioral2/files/0x0006000000022da5-178.dat family_berbew behavioral2/files/0x0006000000022da5-176.dat family_berbew behavioral2/files/0x0006000000022da7-184.dat family_berbew behavioral2/files/0x0006000000022da7-186.dat family_berbew behavioral2/files/0x0006000000022da9-193.dat family_berbew behavioral2/files/0x0006000000022da9-195.dat family_berbew behavioral2/files/0x0006000000022dab-201.dat family_berbew behavioral2/files/0x0006000000022dab-203.dat family_berbew behavioral2/files/0x0006000000022dad-204.dat family_berbew behavioral2/files/0x0006000000022dad-210.dat family_berbew behavioral2/files/0x0006000000022dad-209.dat family_berbew behavioral2/files/0x0006000000022daf-218.dat family_berbew behavioral2/files/0x0006000000022daf-217.dat family_berbew behavioral2/files/0x0006000000022db1-225.dat family_berbew behavioral2/files/0x0006000000022db1-226.dat family_berbew behavioral2/files/0x0006000000022db3-233.dat family_berbew behavioral2/files/0x0006000000022db3-234.dat family_berbew behavioral2/files/0x0006000000022db5-241.dat family_berbew behavioral2/files/0x0006000000022db5-242.dat family_berbew behavioral2/files/0x0006000000022db8-251.dat family_berbew behavioral2/files/0x0006000000022dbb-261.dat family_berbew behavioral2/files/0x0006000000022dbd-270.dat family_berbew behavioral2/files/0x0006000000022dbd-268.dat family_berbew behavioral2/files/0x0006000000022dbb-260.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 1172 Ahmjjoig.exe 4456 Aphnnafb.exe 3016 Adhdjpjf.exe 4564 Bkibgh32.exe 620 Bgbpaipl.exe 3456 Cammjakm.exe 4988 Cdmfllhn.exe 468 Cpdgqmnb.exe 5068 Dgeenfog.exe 2616 Dggbcf32.exe 2424 Dgjoif32.exe 3100 Egohdegl.exe 3032 Egaejeej.exe 1692 Egcaod32.exe 3544 Hnbeeiji.exe 4896 Iijfhbhl.exe 4876 Iahgad32.exe 2756 Jocnlg32.exe 1564 Kiphjo32.exe 1644 Kakmna32.exe 4196 Klekfinp.exe 2316 Kadpdp32.exe 752 Ledepn32.exe 4424 Ncmhko32.exe 4344 Ncbafoge.exe 3552 Ocgkan32.exe 3092 Ojcpdg32.exe 2552 Oqoefand.exe 2112 Ojhiogdd.exe 4008 Padnaq32.exe 2032 Qppaclio.exe 3740 Qmdblp32.exe 3296 Ajjokd32.exe 2568 Adjjeieh.exe 2168 Bapgdm32.exe 3452 Bjhkmbho.exe 1756 Bkkhbb32.exe 2164 Bdcmkgmm.exe 2504 Bpjmph32.exe 2388 Cajjjk32.exe 4780 Cpogkhnl.exe 2392 Cigkdmel.exe 4580 Ckggnp32.exe 3464 Cpcpfg32.exe 3320 Cildom32.exe 2288 Dkkaiphj.exe 4476 Dcffnbee.exe 1368 Dpjfgf32.exe 4932 Dpmcmf32.exe 3280 Djegekil.exe 3308 Djgdkk32.exe 3560 Ekgqennl.exe 452 Ejlnfjbd.exe 4316 Edaaccbj.exe 2304 Eafbmgad.exe 2400 Ejagaj32.exe 4072 Egegjn32.exe 2892 Fclhpo32.exe 1364 Fdkdibjp.exe 2836 Fboecfii.exe 3664 Fnffhgon.exe 3008 Fcbnpnme.exe 2840 Fcekfnkb.exe 2788 Fqikob32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Dgliapic.exe Dncehk32.exe File created C:\Windows\SysWOW64\Aemqdk32.exe Apqhldjp.exe File created C:\Windows\SysWOW64\Qajhigcj.exe Qiocde32.exe File opened for modification C:\Windows\SysWOW64\Bhaeli32.exe Bjnece32.exe File created C:\Windows\SysWOW64\Ckaamine.dll Mlflog32.exe File opened for modification C:\Windows\SysWOW64\Cdnelpod.exe Ciiaogon.exe File opened for modification C:\Windows\SysWOW64\Mmiealgc.exe Mdaqhf32.exe File created C:\Windows\SysWOW64\Dgaamh32.dll Oplmdnpc.exe File opened for modification C:\Windows\SysWOW64\Naejcl32.exe Nliakd32.exe File created C:\Windows\SysWOW64\Aaiqmepi.dll Albpff32.exe File created C:\Windows\SysWOW64\Pjlalacf.dll Qajhigcj.exe File created C:\Windows\SysWOW64\Qjmllgjd.exe Pbkagfba.exe File created C:\Windows\SysWOW64\Ndagao32.exe Njlcdf32.exe File created C:\Windows\SysWOW64\Pgihppgo.exe Plcdbghi.exe File created C:\Windows\SysWOW64\Pkpbai32.dll Egcaod32.exe File created C:\Windows\SysWOW64\Elngne32.dll Nnoefagj.exe File created C:\Windows\SysWOW64\Cnjambdq.dll Pmbcik32.exe File created C:\Windows\SysWOW64\Cafhap32.exe Cgndikgd.exe File created C:\Windows\SysWOW64\Hnaqqj32.exe Hhdhhchf.exe File opened for modification C:\Windows\SysWOW64\Pknqhh32.exe Paelpcgc.exe File created C:\Windows\SysWOW64\Pnkehf32.dll Deagoa32.exe File created C:\Windows\SysWOW64\Mldbeh32.dll Bjjmfn32.exe File created C:\Windows\SysWOW64\Anffcn32.dll Ihnbih32.exe File created C:\Windows\SysWOW64\Pckpja32.exe Plagmh32.exe File created C:\Windows\SysWOW64\Acajpc32.dll Dkkaiphj.exe File created C:\Windows\SysWOW64\Olikhnjp.dll Opmcod32.exe File opened for modification C:\Windows\SysWOW64\Hfklamii.exe Hgjldfqj.exe File created C:\Windows\SysWOW64\Egfolf32.dll Lijlii32.exe File created C:\Windows\SysWOW64\Lkdgqbag.exe Lalchm32.exe File created C:\Windows\SysWOW64\Jkckld32.dll Chmehhpn.exe File created C:\Windows\SysWOW64\Mjadokme.dll Cknnjcmo.exe File created C:\Windows\SysWOW64\Gkkndp32.exe Gacjkjgb.exe File opened for modification C:\Windows\SysWOW64\Okjnhpee.exe Oemephgn.exe File opened for modification C:\Windows\SysWOW64\Oeamcmmo.exe Oklifdmi.exe File opened for modification C:\Windows\SysWOW64\Ehbihj32.exe Eojeodga.exe File created C:\Windows\SysWOW64\Jjcqffkm.exe Jmopmalc.exe File created C:\Windows\SysWOW64\Mbandfpf.dll Obcled32.exe File opened for modification C:\Windows\SysWOW64\Nieggill.exe Nnpcjplf.exe File created C:\Windows\SysWOW64\Ndaboafl.exe Nndjgjhe.exe File opened for modification C:\Windows\SysWOW64\Adjjeieh.exe Ajjokd32.exe File created C:\Windows\SysWOW64\Kjdqhjpf.exe Knmpbi32.exe File created C:\Windows\SysWOW64\Kolahq32.dll Gngckfdj.exe File opened for modification C:\Windows\SysWOW64\Paelpcgc.exe Phmhgmpc.exe File created C:\Windows\SysWOW64\Jkjikd32.dll Ecmlmcmb.exe File created C:\Windows\SysWOW64\Kimgad32.exe Kngcdkjo.exe File opened for modification C:\Windows\SysWOW64\Jnklnfpq.exe Jhndepbi.exe File created C:\Windows\SysWOW64\Obombeqb.dll Nnjljd32.exe File created C:\Windows\SysWOW64\Gfkbnk32.exe Gmbmefob.exe File opened for modification C:\Windows\SysWOW64\Memalfcb.exe Mdnebc32.exe File opened for modification C:\Windows\SysWOW64\Eohhie32.exe Eeodqocd.exe File created C:\Windows\SysWOW64\Modffifb.dll Pmefiakh.exe File created C:\Windows\SysWOW64\Pbapom32.exe Pgllad32.exe File created C:\Windows\SysWOW64\Glpedl32.dll Phmhgmpc.exe File created C:\Windows\SysWOW64\Bhipiihc.exe Bkeppeii.exe File created C:\Windows\SysWOW64\Odedipge.exe Okmpqjad.exe File created C:\Windows\SysWOW64\Cieonn32.dll Podkmgop.exe File created C:\Windows\SysWOW64\Jhodeflk.dll Gccmaack.exe File opened for modification C:\Windows\SysWOW64\Gdbmalja.exe Gkjhif32.exe File created C:\Windows\SysWOW64\Olpcim32.dll Hhdhhchf.exe File created C:\Windows\SysWOW64\Ikndpm32.exe Iafogggl.exe File opened for modification C:\Windows\SysWOW64\Mjkbemll.exe Mabnlh32.exe File created C:\Windows\SysWOW64\Eilcln32.dll Eojeodga.exe File opened for modification C:\Windows\SysWOW64\Gngckfdj.exe Genobp32.exe File created C:\Windows\SysWOW64\Cdfbbhdp.exe Cknnjcmo.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Igfkpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jodiaqag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Egohdegl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nefdbekh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qffoejkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbfema32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhkdob32.dll" Djgkbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Piaiqlak.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkmkfncf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gfcnka32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oqgkadod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qkfmicmi.dll" Oiihkncb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hakidd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npfchkop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cemdmlga.dll" Npipnjmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jpfbco32.dll" Qipjokik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkijbooo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgjkkopi.dll" Neaokboj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Elagjihh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mfaqafjl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pphjbgfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gfkbnk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Knchio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Egcaod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oahmla32.dll" Abemep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bloikp32.dll" Cejjdlap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gcpaiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qcepem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofkhal32.dll" Adhdjpjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfqgoo32.dll" Qelcamcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dipffc32.dll" Ggafgo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkboeobh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oibocbah.dll" Pqbdclak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jnkchmdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Liaqlcep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Noaoagca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ocgkan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onimmoeg.dll" Iiokacgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oplmdnpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkjjmpnl.dll" Mpdgbkab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kmlmlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bqfokblg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dlfhhgpp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmfcfb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehqfcf32.dll" Elnoifjg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndaboafl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fnffhgon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phpbffnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmkipncc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akgjnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khkbdfpg.dll" Fchlhnlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akniofoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhcipkpg.dll" Nhokeolc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nmbhgjoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apqhldjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olhogh32.dll" Pchcdbck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcaiacdi.dll" Mnnkaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lddgghfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Anmjmojl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cemndbci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aghdco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hfjmajbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpbajp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pjeoablq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1172 4444 NEAS.714e16a51240092e19839bf264069656.exe 84 PID 4444 wrote to memory of 1172 4444 NEAS.714e16a51240092e19839bf264069656.exe 84 PID 4444 wrote to memory of 1172 4444 NEAS.714e16a51240092e19839bf264069656.exe 84 PID 1172 wrote to memory of 4456 1172 Ahmjjoig.exe 85 PID 1172 wrote to memory of 4456 1172 Ahmjjoig.exe 85 PID 1172 wrote to memory of 4456 1172 Ahmjjoig.exe 85 PID 4456 wrote to memory of 3016 4456 Aphnnafb.exe 86 PID 4456 wrote to memory of 3016 4456 Aphnnafb.exe 86 PID 4456 wrote to memory of 3016 4456 Aphnnafb.exe 86 PID 3016 wrote to memory of 4564 3016 Adhdjpjf.exe 87 PID 3016 wrote to memory of 4564 3016 Adhdjpjf.exe 87 PID 3016 wrote to memory of 4564 3016 Adhdjpjf.exe 87 PID 4564 wrote to memory of 620 4564 Bkibgh32.exe 88 PID 4564 wrote to memory of 620 4564 Bkibgh32.exe 88 PID 4564 wrote to memory of 620 4564 Bkibgh32.exe 88 PID 620 wrote to memory of 3456 620 Bgbpaipl.exe 89 PID 620 wrote to memory of 3456 620 Bgbpaipl.exe 89 PID 620 wrote to memory of 3456 620 Bgbpaipl.exe 89 PID 3456 wrote to memory of 4988 3456 Cammjakm.exe 90 PID 3456 wrote to memory of 4988 3456 Cammjakm.exe 90 PID 3456 wrote to memory of 4988 3456 Cammjakm.exe 90 PID 4988 wrote to memory of 468 4988 Cdmfllhn.exe 91 PID 4988 wrote to memory of 468 4988 Cdmfllhn.exe 91 PID 4988 wrote to memory of 468 4988 Cdmfllhn.exe 91 PID 468 wrote to memory of 5068 468 Cpdgqmnb.exe 92 PID 468 wrote to memory of 5068 468 Cpdgqmnb.exe 92 PID 468 wrote to memory of 5068 468 Cpdgqmnb.exe 92 PID 5068 wrote to memory of 2616 5068 Dgeenfog.exe 93 PID 5068 wrote to memory of 2616 5068 Dgeenfog.exe 93 PID 5068 wrote to memory of 2616 5068 Dgeenfog.exe 93 PID 2616 wrote to memory of 2424 2616 Dggbcf32.exe 95 PID 2616 wrote to memory of 2424 2616 Dggbcf32.exe 95 PID 2616 wrote to memory of 2424 2616 Dggbcf32.exe 95 PID 2424 wrote to memory of 3100 2424 Dgjoif32.exe 96 PID 2424 wrote to memory of 3100 2424 Dgjoif32.exe 96 PID 2424 wrote to memory of 3100 2424 Dgjoif32.exe 96 PID 3100 wrote to memory of 3032 3100 Egohdegl.exe 97 PID 3100 wrote to memory of 3032 3100 Egohdegl.exe 97 PID 3100 wrote to memory of 3032 3100 Egohdegl.exe 97 PID 3032 wrote to memory of 1692 3032 Egaejeej.exe 98 PID 3032 wrote to memory of 1692 3032 Egaejeej.exe 98 PID 3032 wrote to memory of 1692 3032 Egaejeej.exe 98 PID 1692 wrote to memory of 3544 1692 Egcaod32.exe 99 PID 1692 wrote to memory of 3544 1692 Egcaod32.exe 99 PID 1692 wrote to memory of 3544 1692 Egcaod32.exe 99 PID 3544 wrote to memory of 4896 3544 Hnbeeiji.exe 100 PID 3544 wrote to memory of 4896 3544 Hnbeeiji.exe 100 PID 3544 wrote to memory of 4896 3544 Hnbeeiji.exe 100 PID 4896 wrote to memory of 4876 4896 Iijfhbhl.exe 101 PID 4896 wrote to memory of 4876 4896 Iijfhbhl.exe 101 PID 4896 wrote to memory of 4876 4896 Iijfhbhl.exe 101 PID 4876 wrote to memory of 2756 4876 Iahgad32.exe 102 PID 4876 wrote to memory of 2756 4876 Iahgad32.exe 102 PID 4876 wrote to memory of 2756 4876 Iahgad32.exe 102 PID 2756 wrote to memory of 1564 2756 Jocnlg32.exe 104 PID 2756 wrote to memory of 1564 2756 Jocnlg32.exe 104 PID 2756 wrote to memory of 1564 2756 Jocnlg32.exe 104 PID 1564 wrote to memory of 1644 1564 Kiphjo32.exe 105 PID 1564 wrote to memory of 1644 1564 Kiphjo32.exe 105 PID 1564 wrote to memory of 1644 1564 Kiphjo32.exe 105 PID 1644 wrote to memory of 4196 1644 Kakmna32.exe 106 PID 1644 wrote to memory of 4196 1644 Kakmna32.exe 106 PID 1644 wrote to memory of 4196 1644 Kakmna32.exe 106 PID 4196 wrote to memory of 2316 4196 Klekfinp.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.714e16a51240092e19839bf264069656.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.714e16a51240092e19839bf264069656.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\Ahmjjoig.exeC:\Windows\system32\Ahmjjoig.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\Aphnnafb.exeC:\Windows\system32\Aphnnafb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\Adhdjpjf.exeC:\Windows\system32\Adhdjpjf.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\Bkibgh32.exeC:\Windows\system32\Bkibgh32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\Bgbpaipl.exeC:\Windows\system32\Bgbpaipl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\Cammjakm.exeC:\Windows\system32\Cammjakm.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\Cdmfllhn.exeC:\Windows\system32\Cdmfllhn.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\Cpdgqmnb.exeC:\Windows\system32\Cpdgqmnb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\Dgeenfog.exeC:\Windows\system32\Dgeenfog.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\Dggbcf32.exeC:\Windows\system32\Dggbcf32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\Dgjoif32.exeC:\Windows\system32\Dgjoif32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\Egohdegl.exeC:\Windows\system32\Egohdegl.exe13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\Egaejeej.exeC:\Windows\system32\Egaejeej.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\Egcaod32.exeC:\Windows\system32\Egcaod32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\Hnbeeiji.exeC:\Windows\system32\Hnbeeiji.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\Iijfhbhl.exeC:\Windows\system32\Iijfhbhl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\Iahgad32.exeC:\Windows\system32\Iahgad32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\Jocnlg32.exeC:\Windows\system32\Jocnlg32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\Kiphjo32.exeC:\Windows\system32\Kiphjo32.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\Kakmna32.exeC:\Windows\system32\Kakmna32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\Klekfinp.exeC:\Windows\system32\Klekfinp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\Kadpdp32.exeC:\Windows\system32\Kadpdp32.exe23⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\Ledepn32.exeC:\Windows\system32\Ledepn32.exe24⤵
- Executes dropped EXE
PID:752 -
C:\Windows\SysWOW64\Ncmhko32.exeC:\Windows\system32\Ncmhko32.exe25⤵
- Executes dropped EXE
PID:4424 -
C:\Windows\SysWOW64\Ncbafoge.exeC:\Windows\system32\Ncbafoge.exe26⤵
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\Ocgkan32.exeC:\Windows\system32\Ocgkan32.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:3552 -
C:\Windows\SysWOW64\Ojcpdg32.exeC:\Windows\system32\Ojcpdg32.exe28⤵
- Executes dropped EXE
PID:3092 -
C:\Windows\SysWOW64\Oqoefand.exeC:\Windows\system32\Oqoefand.exe29⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\Ojhiogdd.exeC:\Windows\system32\Ojhiogdd.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2112 -
C:\Windows\SysWOW64\Padnaq32.exeC:\Windows\system32\Padnaq32.exe31⤵
- Executes dropped EXE
PID:4008 -
C:\Windows\SysWOW64\Qppaclio.exeC:\Windows\system32\Qppaclio.exe32⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\SysWOW64\Qmdblp32.exeC:\Windows\system32\Qmdblp32.exe33⤵
- Executes dropped EXE
PID:3740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ajjokd32.exeC:\Windows\system32\Ajjokd32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3296 -
C:\Windows\SysWOW64\Adjjeieh.exeC:\Windows\system32\Adjjeieh.exe2⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Bapgdm32.exeC:\Windows\system32\Bapgdm32.exe3⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\Bjhkmbho.exeC:\Windows\system32\Bjhkmbho.exe4⤵
- Executes dropped EXE
PID:3452 -
C:\Windows\SysWOW64\Bkkhbb32.exeC:\Windows\system32\Bkkhbb32.exe5⤵
- Executes dropped EXE
PID:1756 -
C:\Windows\SysWOW64\Bdcmkgmm.exeC:\Windows\system32\Bdcmkgmm.exe6⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\Bpjmph32.exeC:\Windows\system32\Bpjmph32.exe7⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\Cajjjk32.exeC:\Windows\system32\Cajjjk32.exe8⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\Cpogkhnl.exeC:\Windows\system32\Cpogkhnl.exe9⤵
- Executes dropped EXE
PID:4780 -
C:\Windows\SysWOW64\Cigkdmel.exeC:\Windows\system32\Cigkdmel.exe10⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\Ckggnp32.exeC:\Windows\system32\Ckggnp32.exe11⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\SysWOW64\Cpcpfg32.exeC:\Windows\system32\Cpcpfg32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3464 -
C:\Windows\SysWOW64\Cildom32.exeC:\Windows\system32\Cildom32.exe13⤵
- Executes dropped EXE
PID:3320 -
C:\Windows\SysWOW64\Dkkaiphj.exeC:\Windows\system32\Dkkaiphj.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2288 -
C:\Windows\SysWOW64\Dcffnbee.exeC:\Windows\system32\Dcffnbee.exe15⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\SysWOW64\Dpjfgf32.exeC:\Windows\system32\Dpjfgf32.exe16⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\SysWOW64\Dpmcmf32.exeC:\Windows\system32\Dpmcmf32.exe17⤵
- Executes dropped EXE
PID:4932 -
C:\Windows\SysWOW64\Djegekil.exeC:\Windows\system32\Djegekil.exe18⤵
- Executes dropped EXE
PID:3280 -
C:\Windows\SysWOW64\Djgdkk32.exeC:\Windows\system32\Djgdkk32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3308 -
C:\Windows\SysWOW64\Ekgqennl.exeC:\Windows\system32\Ekgqennl.exe20⤵
- Executes dropped EXE
PID:3560 -
C:\Windows\SysWOW64\Ejlnfjbd.exeC:\Windows\system32\Ejlnfjbd.exe21⤵
- Executes dropped EXE
PID:452 -
C:\Windows\SysWOW64\Edaaccbj.exeC:\Windows\system32\Edaaccbj.exe22⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\Eafbmgad.exeC:\Windows\system32\Eafbmgad.exe23⤵
- Executes dropped EXE
PID:2304 -
C:\Windows\SysWOW64\Ejagaj32.exeC:\Windows\system32\Ejagaj32.exe24⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\Egegjn32.exeC:\Windows\system32\Egegjn32.exe25⤵
- Executes dropped EXE
PID:4072 -
C:\Windows\SysWOW64\Fclhpo32.exeC:\Windows\system32\Fclhpo32.exe26⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\SysWOW64\Fdkdibjp.exeC:\Windows\system32\Fdkdibjp.exe27⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\Fboecfii.exeC:\Windows\system32\Fboecfii.exe28⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\Fnffhgon.exeC:\Windows\system32\Fnffhgon.exe29⤵
- Executes dropped EXE
- Modifies registry class
PID:3664 -
C:\Windows\SysWOW64\Fcbnpnme.exeC:\Windows\system32\Fcbnpnme.exe30⤵
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\Fcekfnkb.exeC:\Windows\system32\Fcekfnkb.exe31⤵
- Executes dropped EXE
PID:2840 -
C:\Windows\SysWOW64\Fqikob32.exeC:\Windows\system32\Fqikob32.exe32⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Gkoplk32.exeC:\Windows\system32\Gkoplk32.exe33⤵PID:924
-
C:\Windows\SysWOW64\Gdgdeppb.exeC:\Windows\system32\Gdgdeppb.exe34⤵PID:3248
-
C:\Windows\SysWOW64\Gdiakp32.exeC:\Windows\system32\Gdiakp32.exe35⤵PID:1620
-
C:\Windows\SysWOW64\Gjficg32.exeC:\Windows\system32\Gjficg32.exe36⤵PID:4736
-
C:\Windows\SysWOW64\Gcnnllcg.exeC:\Windows\system32\Gcnnllcg.exe37⤵PID:3964
-
C:\Windows\SysWOW64\Gcqjal32.exeC:\Windows\system32\Gcqjal32.exe38⤵PID:2888
-
C:\Windows\SysWOW64\Gbbkocid.exeC:\Windows\system32\Gbbkocid.exe39⤵PID:4284
-
C:\Windows\SysWOW64\Hnhkdd32.exeC:\Windows\system32\Hnhkdd32.exe40⤵PID:3584
-
C:\Windows\SysWOW64\Hgapmj32.exeC:\Windows\system32\Hgapmj32.exe41⤵PID:2116
-
C:\Windows\SysWOW64\Haidfpki.exeC:\Windows\system32\Haidfpki.exe42⤵PID:4256
-
C:\Windows\SysWOW64\Hnmeodjc.exeC:\Windows\system32\Hnmeodjc.exe43⤵PID:2308
-
C:\Windows\SysWOW64\Hbknebqi.exeC:\Windows\system32\Hbknebqi.exe44⤵PID:4248
-
C:\Windows\SysWOW64\Mdnebc32.exeC:\Windows\system32\Mdnebc32.exe45⤵
- Drops file in System32 directory
PID:5192 -
C:\Windows\SysWOW64\Memalfcb.exeC:\Windows\system32\Memalfcb.exe46⤵PID:5236
-
C:\Windows\SysWOW64\Mdbnmbhj.exeC:\Windows\system32\Mdbnmbhj.exe47⤵PID:5280
-
C:\Windows\SysWOW64\Mccokj32.exeC:\Windows\system32\Mccokj32.exe48⤵PID:5324
-
C:\Windows\SysWOW64\Mkocol32.exeC:\Windows\system32\Mkocol32.exe49⤵PID:5368
-
C:\Windows\SysWOW64\Medglemj.exeC:\Windows\system32\Medglemj.exe50⤵PID:5412
-
C:\Windows\SysWOW64\Nkapelka.exeC:\Windows\system32\Nkapelka.exe51⤵PID:5456
-
C:\Windows\SysWOW64\Nefdbekh.exeC:\Windows\system32\Nefdbekh.exe52⤵
- Modifies registry class
PID:5500 -
C:\Windows\SysWOW64\Nkcmjlio.exeC:\Windows\system32\Nkcmjlio.exe53⤵PID:5540
-
C:\Windows\SysWOW64\Nhgmcp32.exeC:\Windows\system32\Nhgmcp32.exe54⤵PID:5580
-
C:\Windows\SysWOW64\Nkhfek32.exeC:\Windows\system32\Nkhfek32.exe55⤵PID:5648
-
C:\Windows\SysWOW64\Nbbnbemf.exeC:\Windows\system32\Nbbnbemf.exe56⤵PID:5696
-
C:\Windows\SysWOW64\Nkjckkcg.exeC:\Windows\system32\Nkjckkcg.exe57⤵PID:5764
-
C:\Windows\SysWOW64\Nfpghccm.exeC:\Windows\system32\Nfpghccm.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5804 -
C:\Windows\SysWOW64\Okmpqjad.exeC:\Windows\system32\Okmpqjad.exe59⤵
- Drops file in System32 directory
PID:5844 -
C:\Windows\SysWOW64\Odedipge.exeC:\Windows\system32\Odedipge.exe60⤵PID:5900
-
C:\Windows\SysWOW64\Ocfdgg32.exeC:\Windows\system32\Ocfdgg32.exe61⤵PID:5948
-
C:\Windows\SysWOW64\Odgqopeb.exeC:\Windows\system32\Odgqopeb.exe62⤵PID:5988
-
C:\Windows\SysWOW64\Odjmdocp.exeC:\Windows\system32\Odjmdocp.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6024 -
C:\Windows\SysWOW64\Ocknbglo.exeC:\Windows\system32\Ocknbglo.exe64⤵PID:6088
-
C:\Windows\SysWOW64\Ohhfknjf.exeC:\Windows\system32\Ohhfknjf.exe65⤵PID:6128
-
C:\Windows\SysWOW64\Ooangh32.exeC:\Windows\system32\Ooangh32.exe66⤵PID:5148
-
C:\Windows\SysWOW64\Pdngpo32.exeC:\Windows\system32\Pdngpo32.exe67⤵PID:5252
-
C:\Windows\SysWOW64\Podkmgop.exeC:\Windows\system32\Podkmgop.exe68⤵
- Drops file in System32 directory
PID:5308 -
C:\Windows\SysWOW64\Pcbdcf32.exeC:\Windows\system32\Pcbdcf32.exe69⤵PID:5376
-
C:\Windows\SysWOW64\Pmjhlklg.exeC:\Windows\system32\Pmjhlklg.exe70⤵PID:5424
-
C:\Windows\SysWOW64\Piaiqlak.exeC:\Windows\system32\Piaiqlak.exe71⤵
- Modifies registry class
PID:5512 -
C:\Windows\SysWOW64\Pcfmneaa.exeC:\Windows\system32\Pcfmneaa.exe72⤵PID:5632
-
C:\Windows\SysWOW64\Piceflpi.exeC:\Windows\system32\Piceflpi.exe73⤵PID:5680
-
C:\Windows\SysWOW64\Qppkhfec.exeC:\Windows\system32\Qppkhfec.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5780 -
C:\Windows\SysWOW64\Qelcamcj.exeC:\Windows\system32\Qelcamcj.exe75⤵
- Modifies registry class
PID:5840 -
C:\Windows\SysWOW64\Abpcja32.exeC:\Windows\system32\Abpcja32.exe76⤵PID:5916
-
C:\Windows\SysWOW64\Afnlpohj.exeC:\Windows\system32\Afnlpohj.exe77⤵PID:5972
-
C:\Windows\SysWOW64\Abemep32.exeC:\Windows\system32\Abemep32.exe78⤵
- Modifies registry class
PID:6076 -
C:\Windows\SysWOW64\Amkabind.exeC:\Windows\system32\Amkabind.exe79⤵PID:6136
-
C:\Windows\SysWOW64\Aeffgkkp.exeC:\Windows\system32\Aeffgkkp.exe80⤵PID:5228
-
C:\Windows\SysWOW64\Afeban32.exeC:\Windows\system32\Afeban32.exe81⤵PID:5332
-
C:\Windows\SysWOW64\Blknpdho.exeC:\Windows\system32\Blknpdho.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5448 -
C:\Windows\SysWOW64\Bbefln32.exeC:\Windows\system32\Bbefln32.exe83⤵PID:5572
-
C:\Windows\SysWOW64\Blnjecfl.exeC:\Windows\system32\Blnjecfl.exe84⤵PID:5732
-
C:\Windows\SysWOW64\Cefoni32.exeC:\Windows\system32\Cefoni32.exe85⤵PID:5820
-
C:\Windows\SysWOW64\Cdlhgpag.exeC:\Windows\system32\Cdlhgpag.exe86⤵PID:5928
-
C:\Windows\SysWOW64\Ciiaogon.exeC:\Windows\system32\Ciiaogon.exe87⤵
- Drops file in System32 directory
PID:6012 -
C:\Windows\SysWOW64\Cdnelpod.exeC:\Windows\system32\Cdnelpod.exe88⤵PID:5132
-
C:\Windows\SysWOW64\Ciknefmk.exeC:\Windows\system32\Ciknefmk.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5304 -
C:\Windows\SysWOW64\Ddqbbo32.exeC:\Windows\system32\Ddqbbo32.exe90⤵PID:5552
-
C:\Windows\SysWOW64\Dedkogqm.exeC:\Windows\system32\Dedkogqm.exe91⤵PID:5836
-
C:\Windows\SysWOW64\Fckaeioa.exeC:\Windows\system32\Fckaeioa.exe92⤵PID:5912
-
C:\Windows\SysWOW64\Fdogjk32.exeC:\Windows\system32\Fdogjk32.exe93⤵PID:6120
-
C:\Windows\SysWOW64\Ffcpgcfj.exeC:\Windows\system32\Ffcpgcfj.exe94⤵PID:5492
-
C:\Windows\SysWOW64\Gqagkjne.exeC:\Windows\system32\Gqagkjne.exe95⤵PID:4272
-
C:\Windows\SysWOW64\Hcgjhega.exeC:\Windows\system32\Hcgjhega.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3776 -
C:\Windows\SysWOW64\Ifaepolg.exeC:\Windows\system32\Ifaepolg.exe97⤵PID:5884
-
C:\Windows\SysWOW64\Jeilne32.exeC:\Windows\system32\Jeilne32.exe98⤵PID:6048
-
C:\Windows\SysWOW64\Knifging.exeC:\Windows\system32\Knifging.exe99⤵PID:5288
-
C:\Windows\SysWOW64\Kceoppmo.exeC:\Windows\system32\Kceoppmo.exe100⤵PID:5796
-
C:\Windows\SysWOW64\Kjpgmj32.exeC:\Windows\system32\Kjpgmj32.exe101⤵PID:3500
-
C:\Windows\SysWOW64\Knmpbi32.exeC:\Windows\system32\Knmpbi32.exe102⤵
- Drops file in System32 directory
PID:4592 -
C:\Windows\SysWOW64\Kjdqhjpf.exeC:\Windows\system32\Kjdqhjpf.exe103⤵PID:768
-
C:\Windows\SysWOW64\Kdmeqo32.exeC:\Windows\system32\Kdmeqo32.exe104⤵PID:5444
-
C:\Windows\SysWOW64\Knbinhfl.exeC:\Windows\system32\Knbinhfl.exe105⤵PID:1636
-
C:\Windows\SysWOW64\Lfpkhjae.exeC:\Windows\system32\Lfpkhjae.exe106⤵PID:640
-
C:\Windows\SysWOW64\Lfbgmj32.exeC:\Windows\system32\Lfbgmj32.exe107⤵PID:5200
-
C:\Windows\SysWOW64\Lmlpjdgo.exeC:\Windows\system32\Lmlpjdgo.exe108⤵PID:3060
-
C:\Windows\SysWOW64\Lhadgmge.exeC:\Windows\system32\Lhadgmge.exe109⤵PID:2476
-
C:\Windows\SysWOW64\Lmnlpcel.exeC:\Windows\system32\Lmnlpcel.exe110⤵PID:5980
-
C:\Windows\SysWOW64\Lhdqml32.exeC:\Windows\system32\Lhdqml32.exe111⤵PID:3812
-
C:\Windows\SysWOW64\Mginniij.exeC:\Windows\system32\Mginniij.exe112⤵PID:6184
-
C:\Windows\SysWOW64\Mejnlpai.exeC:\Windows\system32\Mejnlpai.exe113⤵PID:6232
-
C:\Windows\SysWOW64\Mmebpbod.exeC:\Windows\system32\Mmebpbod.exe114⤵PID:6276
-
C:\Windows\SysWOW64\Mgngih32.exeC:\Windows\system32\Mgngih32.exe115⤵PID:6324
-
C:\Windows\SysWOW64\Mdagbl32.exeC:\Windows\system32\Mdagbl32.exe116⤵PID:6368
-
C:\Windows\SysWOW64\Moglpedd.exeC:\Windows\system32\Moglpedd.exe117⤵PID:6412
-
C:\Windows\SysWOW64\Mgbpdgap.exeC:\Windows\system32\Mgbpdgap.exe118⤵PID:6464
-
C:\Windows\SysWOW64\Nhbmnj32.exeC:\Windows\system32\Nhbmnj32.exe119⤵PID:6504
-
C:\Windows\SysWOW64\Nnoefagj.exeC:\Windows\system32\Nnoefagj.exe120⤵
- Drops file in System32 directory
PID:6548 -
C:\Windows\SysWOW64\Nnabladg.exeC:\Windows\system32\Nnabladg.exe121⤵PID:6584
-
C:\Windows\SysWOW64\Nkebee32.exeC:\Windows\system32\Nkebee32.exe122⤵PID:6628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-