Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 17:25
Behavioral task
behavioral1
Sample
NEAS.5e3eefd9c3d3c56b5f931d1eb4034730_JC.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.5e3eefd9c3d3c56b5f931d1eb4034730_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.5e3eefd9c3d3c56b5f931d1eb4034730_JC.exe
-
Size
345KB
-
MD5
5e3eefd9c3d3c56b5f931d1eb4034730
-
SHA1
0e10decd6e1daa17811c085e46682db8303e9561
-
SHA256
0e6e2bdc1f6cdd052fe15fa8a4afecd515b0dca8f49912ad05a08fee289a845d
-
SHA512
6d284c8195d6b10740c6004a41642caacc67b04c898ffb27597977354908b0c866665bfc09245f93b95590afe7354e788015b32ae3b93f002ee1869fa7bdfc46
-
SSDEEP
6144:IzXejMaB4muz14QaYgTt+scaHACw6Ykw/a8dWBtp27DpomqcPMwNFN6aeK9kc:ILe1uznghoaHACwBkka8eGp7dPRr6aea
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdophj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdophj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gchflq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifckkhfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmkpipaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Khkbcopl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lamjbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngodlgka.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdffiinp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqpeaeel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifihdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ifckkhfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oaejhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Liekgo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcojoj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghqeihbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kaajfe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngnnbq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Achmjmnb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anbkbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckidoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldoafodd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mopeofjl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fempbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kaajfe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghgljg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omgabj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kdmjmqjf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmlmlo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jglaepim.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmebpbod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Loqjlg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldohogfe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nglala32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncihbaie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhmjlm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofqpje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnmkpm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npfkqpjk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkpijfgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gledpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onqdhh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihcclb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjffkhpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fchdnkpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hoibmmpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iokocmnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Moacbe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cihjpd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laeoec32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fgffka32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kobnji32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Koekpi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kabpan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fchdnkpi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgkimn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmhnea32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iophnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fohobmke.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnmkpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohdlpa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lbdgmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ihcclb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iophnl32.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/4048-0-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/4048-1-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x00090000000222f4-8.dat family_berbew behavioral2/files/0x00090000000222f4-7.dat family_berbew behavioral2/memory/4120-16-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e19-17.dat family_berbew behavioral2/memory/1268-25-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e1b-24.dat family_berbew behavioral2/files/0x0006000000022e1d-32.dat family_berbew behavioral2/files/0x0006000000022e1d-31.dat family_berbew behavioral2/memory/1628-36-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e1b-23.dat family_berbew behavioral2/files/0x0006000000022e19-15.dat family_berbew behavioral2/memory/5032-9-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e1f-39.dat family_berbew behavioral2/files/0x0006000000022e1f-40.dat family_berbew behavioral2/memory/3324-41-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e21-47.dat family_berbew behavioral2/memory/2404-49-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e23-55.dat family_berbew behavioral2/files/0x0006000000022e23-56.dat family_berbew behavioral2/files/0x0006000000022e21-48.dat family_berbew behavioral2/memory/4524-61-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e25-63.dat family_berbew behavioral2/memory/2720-65-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e29-80.dat family_berbew behavioral2/files/0x0006000000022e2b-88.dat family_berbew behavioral2/memory/5032-86-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e2b-87.dat family_berbew behavioral2/memory/936-94-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/3892-100-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/4120-101-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/2232-102-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e2d-96.dat family_berbew behavioral2/files/0x0006000000022e2d-95.dat family_berbew behavioral2/memory/1780-77-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e27-72.dat family_berbew behavioral2/files/0x0006000000022e29-79.dat family_berbew behavioral2/files/0x0006000000022e25-64.dat family_berbew behavioral2/files/0x0006000000022e27-71.dat family_berbew behavioral2/memory/1532-106-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e2f-107.dat family_berbew behavioral2/files/0x0006000000022e2f-105.dat family_berbew behavioral2/files/0x0006000000022e32-113.dat family_berbew behavioral2/files/0x0006000000022e32-115.dat family_berbew behavioral2/files/0x0006000000022e34-123.dat family_berbew behavioral2/files/0x0006000000022e36-131.dat family_berbew behavioral2/memory/1184-136-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/4556-144-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e3b-146.dat family_berbew behavioral2/files/0x0006000000022e3b-148.dat family_berbew behavioral2/memory/2828-149-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/2780-163-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/2404-162-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/3404-158-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0007000000022e3d-156.dat family_berbew behavioral2/files/0x0006000000022e3f-166.dat family_berbew behavioral2/memory/2720-167-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/memory/2916-168-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e3f-165.dat family_berbew behavioral2/files/0x0007000000022e3d-155.dat family_berbew behavioral2/memory/3324-147-0x0000000000400000-0x000000000043D000-memory.dmp family_berbew behavioral2/files/0x0006000000022e38-139.dat family_berbew behavioral2/files/0x0006000000022e38-138.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 5032 Edionhpn.exe 4120 Jglaepim.exe 1268 Jnfjbj32.exe 1628 Jepbodhg.exe 3324 Kagbdenk.exe 2404 Kjbdbjbi.exe 4524 Kfidgk32.exe 2720 Kmbmdeoj.exe 1780 Knbinhfl.exe 936 Ldoafodd.exe 3892 Lndfchdj.exe 2232 Lhmjlm32.exe 1532 Laeoec32.exe 1680 Loniiflo.exe 1184 Mhfmbl32.exe 4556 Mopeofjl.exe 2828 Mhhjhlqm.exe 3404 Mmebpbod.exe 2780 Meoggpmd.exe 2916 Mgpcohcb.exe 2184 Nkpijfgf.exe 3812 Nefmgogl.exe 212 Epiaig32.exe 2108 Fgffka32.exe 4052 Foakpc32.exe 1980 Fempbm32.exe 2508 Fgmllpng.exe 3720 Ghqeihbb.exe 4168 Gchflq32.exe 4244 Ghgljg32.exe 4292 Gledpe32.exe 2960 Hgkimn32.exe 1964 Hhobjf32.exe 4436 Hfbbdj32.exe 1460 Hokgmpkl.exe 1616 Hhckeeam.exe 2368 Hfgloiqf.exe 2944 Ifihdi32.exe 2380 Ihjafd32.exe 1596 Ioffhn32.exe 2524 Ifckkhfi.exe 4672 Jfehpg32.exe 2384 Jjcqffkm.exe 3280 Jcnbekok.exe 1004 Kimgba32.exe 4668 Kmkpipaf.exe 4664 Kmmmnp32.exe 4888 Kgcqlh32.exe 968 Kakednfj.exe 3864 Kfhnme32.exe 3196 Kmbfiokn.exe 2208 Nmnnlk32.exe 688 Nkghqo32.exe 1968 Naqqmieo.exe 3048 Omgabj32.exe 1636 Ogpfko32.exe 4344 Oaejhh32.exe 3684 Ohobebig.exe 4868 Oahgnh32.exe 416 Onngci32.exe 4764 Ohdlpa32.exe 5084 Onqdhh32.exe 3156 Pnlcdg32.exe 5060 Glinjqhb.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Lpljgpbj.dll Kfidgk32.exe File created C:\Windows\SysWOW64\Ihcclb32.exe Iokocmnf.exe File created C:\Windows\SysWOW64\Mkmcfe32.dll Ffnkggld.exe File opened for modification C:\Windows\SysWOW64\Lbdgmh32.exe Lmhnea32.exe File created C:\Windows\SysWOW64\Epkakham.dll Ofqpje32.exe File created C:\Windows\SysWOW64\Kgcqlh32.exe Kmmmnp32.exe File opened for modification C:\Windows\SysWOW64\Ihhmgaqb.exe Iophnl32.exe File created C:\Windows\SysWOW64\Kobnji32.exe Kdmjmqjf.exe File opened for modification C:\Windows\SysWOW64\Mkbcbp32.exe Mkpglqgj.exe File opened for modification C:\Windows\SysWOW64\Alaaajmb.exe Anmagenh.exe File opened for modification C:\Windows\SysWOW64\Anbkbe32.exe Acmfel32.exe File created C:\Windows\SysWOW64\Fgffka32.exe Epiaig32.exe File created C:\Windows\SysWOW64\Delcme32.dll Hfgloiqf.exe File created C:\Windows\SysWOW64\Lfkich32.exe Khpcid32.exe File created C:\Windows\SysWOW64\Gfdhho32.dll Gohhik32.exe File created C:\Windows\SysWOW64\Loniiflo.exe Laeoec32.exe File created C:\Windows\SysWOW64\Anmagenh.exe Achmjmnb.exe File created C:\Windows\SysWOW64\Nbbldp32.exe Moacbe32.exe File created C:\Windows\SysWOW64\Jkpqce32.dll Nglala32.exe File created C:\Windows\SysWOW64\Hhckeeam.exe Hokgmpkl.exe File created C:\Windows\SysWOW64\Mkapje32.dll Kfndlphp.exe File created C:\Windows\SysWOW64\Alaaajmb.exe Anmagenh.exe File created C:\Windows\SysWOW64\Jncapf32.exe Jpoagb32.exe File created C:\Windows\SysWOW64\Lcpcqh32.dll Lamjbc32.exe File created C:\Windows\SysWOW64\Bqpnodjg.dll Aelcooap.exe File created C:\Windows\SysWOW64\Nmnnlk32.exe Kmbfiokn.exe File created C:\Windows\SysWOW64\Lbkggg32.dll Glinjqhb.exe File opened for modification C:\Windows\SysWOW64\Qbbggeli.exe Pengna32.exe File created C:\Windows\SysWOW64\Hlkmfkli.exe Gmfpeoga.exe File created C:\Windows\SysWOW64\Bldcodde.dll Nefmgogl.exe File opened for modification C:\Windows\SysWOW64\Dqbadf32.exe Pmpmnb32.exe File created C:\Windows\SysWOW64\Oogbel32.dll Jpoagb32.exe File created C:\Windows\SysWOW64\Mkpglqgj.exe Mpkbohhd.exe File created C:\Windows\SysWOW64\Aelcooap.exe Anbkbe32.exe File opened for modification C:\Windows\SysWOW64\Edionhpn.exe NEAS.5e3eefd9c3d3c56b5f931d1eb4034730_JC.exe File opened for modification C:\Windows\SysWOW64\Jfehpg32.exe Ifckkhfi.exe File created C:\Windows\SysWOW64\Abnemc32.dll Mknjgajl.exe File opened for modification C:\Windows\SysWOW64\Anmagenh.exe Achmjmnb.exe File opened for modification C:\Windows\SysWOW64\Ajikhfpg.exe Aelcooap.exe File opened for modification C:\Windows\SysWOW64\Aeaagoaj.exe Mmdefi32.exe File created C:\Windows\SysWOW64\Jegdoipe.dll Oahgnh32.exe File opened for modification C:\Windows\SysWOW64\Loqjlg32.exe Lhgbomfo.exe File created C:\Windows\SysWOW64\Fjaecj32.dll Npfkqpjk.exe File created C:\Windows\SysWOW64\Jdhcdlco.dll Pmpmnb32.exe File created C:\Windows\SysWOW64\Odbgbb32.exe Ojmcej32.exe File created C:\Windows\SysWOW64\Jhoncm32.dll Laofhbmp.exe File created C:\Windows\SysWOW64\Laofhbmp.exe Loqjlg32.exe File created C:\Windows\SysWOW64\Gnecip32.dll Ehddpdlc.exe File opened for modification C:\Windows\SysWOW64\Gdjilphb.exe Cihjpd32.exe File created C:\Windows\SysWOW64\Knipeblj.dll Kagbdenk.exe File opened for modification C:\Windows\SysWOW64\Hhckeeam.exe Hokgmpkl.exe File opened for modification C:\Windows\SysWOW64\Ghqeihbb.exe Fgmllpng.exe File created C:\Windows\SysWOW64\Hgkimn32.exe Gledpe32.exe File opened for modification C:\Windows\SysWOW64\Hfgloiqf.exe Hhckeeam.exe File created C:\Windows\SysWOW64\Ifihdi32.exe Hfgloiqf.exe File created C:\Windows\SysWOW64\Jjcqffkm.exe Jfehpg32.exe File created C:\Windows\SysWOW64\Ohobebig.exe Oaejhh32.exe File opened for modification C:\Windows\SysWOW64\Ldoafodd.exe Knbinhfl.exe File created C:\Windows\SysWOW64\Mmebpbod.exe Mhhjhlqm.exe File opened for modification C:\Windows\SysWOW64\Mphfjhjf.exe Mcdepd32.exe File created C:\Windows\SysWOW64\Dkjmea32.exe Dbjofp32.exe File opened for modification C:\Windows\SysWOW64\Ldpoinjq.exe Laacmbkm.exe File created C:\Windows\SysWOW64\Lkihaj32.dll Jnfjbj32.exe File created C:\Windows\SysWOW64\Qkkcinhf.dll Iokocmnf.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hoibmmpi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iokocmnf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Locgagli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mphfjhjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alpmpn32.dll" Laacmbkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdgdpdgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfidgk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgkkij32.dll" Nkpijfgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcnkmn32.dll" Lfkich32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmegkp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajphagha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mjjfae32.dll" Cihjpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkmcfe32.dll" Ffnkggld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehddpdlc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kjbdbjbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gledpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhjojdql.dll" Ifihdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmmmnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmpmnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbbldp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njjmil32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Edionhpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kakednfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ogpfko32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ldhbnhlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mpkbohhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njcpok32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okcmingd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gllofkhq.dll" Fhpckb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkghqo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfndlphp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcdepd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nglala32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hbbdad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocgjkboq.dll" Mmdefi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnfngj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ioffhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ofnnhj32.dll" Iophnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fohobmke.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mhfmbl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kabpan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Okcmingd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fgipfacf.dll" Gcojoj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifckkhfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bppnjc32.dll" Lfnfhg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhgbomfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ojmcej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Edionhpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ffqgddjj.dll" Kdophj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npjpooea.dll" Kabpan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aceomp32.dll" Kfhnme32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ialhdh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Locgagli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aeaagoaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Naqqmieo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnfjbj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjbdbjbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jjcqffkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qgfnpbgo.dll" Fckacknf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mopeofjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbpnegbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Onngci32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lamjbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kabpan32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4048 wrote to memory of 5032 4048 NEAS.5e3eefd9c3d3c56b5f931d1eb4034730_JC.exe 91 PID 4048 wrote to memory of 5032 4048 NEAS.5e3eefd9c3d3c56b5f931d1eb4034730_JC.exe 91 PID 4048 wrote to memory of 5032 4048 NEAS.5e3eefd9c3d3c56b5f931d1eb4034730_JC.exe 91 PID 5032 wrote to memory of 4120 5032 Edionhpn.exe 92 PID 5032 wrote to memory of 4120 5032 Edionhpn.exe 92 PID 5032 wrote to memory of 4120 5032 Edionhpn.exe 92 PID 4120 wrote to memory of 1268 4120 Jglaepim.exe 93 PID 4120 wrote to memory of 1268 4120 Jglaepim.exe 93 PID 4120 wrote to memory of 1268 4120 Jglaepim.exe 93 PID 1268 wrote to memory of 1628 1268 Jnfjbj32.exe 94 PID 1268 wrote to memory of 1628 1268 Jnfjbj32.exe 94 PID 1268 wrote to memory of 1628 1268 Jnfjbj32.exe 94 PID 1628 wrote to memory of 3324 1628 Jepbodhg.exe 96 PID 1628 wrote to memory of 3324 1628 Jepbodhg.exe 96 PID 1628 wrote to memory of 3324 1628 Jepbodhg.exe 96 PID 3324 wrote to memory of 2404 3324 Kagbdenk.exe 97 PID 3324 wrote to memory of 2404 3324 Kagbdenk.exe 97 PID 3324 wrote to memory of 2404 3324 Kagbdenk.exe 97 PID 2404 wrote to memory of 4524 2404 Kjbdbjbi.exe 98 PID 2404 wrote to memory of 4524 2404 Kjbdbjbi.exe 98 PID 2404 wrote to memory of 4524 2404 Kjbdbjbi.exe 98 PID 4524 wrote to memory of 2720 4524 Kfidgk32.exe 99 PID 4524 wrote to memory of 2720 4524 Kfidgk32.exe 99 PID 4524 wrote to memory of 2720 4524 Kfidgk32.exe 99 PID 2720 wrote to memory of 1780 2720 Kmbmdeoj.exe 100 PID 2720 wrote to memory of 1780 2720 Kmbmdeoj.exe 100 PID 2720 wrote to memory of 1780 2720 Kmbmdeoj.exe 100 PID 1780 wrote to memory of 936 1780 Knbinhfl.exe 103 PID 1780 wrote to memory of 936 1780 Knbinhfl.exe 103 PID 1780 wrote to memory of 936 1780 Knbinhfl.exe 103 PID 936 wrote to memory of 3892 936 Ldoafodd.exe 102 PID 936 wrote to memory of 3892 936 Ldoafodd.exe 102 PID 936 wrote to memory of 3892 936 Ldoafodd.exe 102 PID 3892 wrote to memory of 2232 3892 Lndfchdj.exe 101 PID 3892 wrote to memory of 2232 3892 Lndfchdj.exe 101 PID 3892 wrote to memory of 2232 3892 Lndfchdj.exe 101 PID 2232 wrote to memory of 1532 2232 Lhmjlm32.exe 104 PID 2232 wrote to memory of 1532 2232 Lhmjlm32.exe 104 PID 2232 wrote to memory of 1532 2232 Lhmjlm32.exe 104 PID 1532 wrote to memory of 1680 1532 Laeoec32.exe 105 PID 1532 wrote to memory of 1680 1532 Laeoec32.exe 105 PID 1532 wrote to memory of 1680 1532 Laeoec32.exe 105 PID 1680 wrote to memory of 1184 1680 Loniiflo.exe 112 PID 1680 wrote to memory of 1184 1680 Loniiflo.exe 112 PID 1680 wrote to memory of 1184 1680 Loniiflo.exe 112 PID 1184 wrote to memory of 4556 1184 Mhfmbl32.exe 106 PID 1184 wrote to memory of 4556 1184 Mhfmbl32.exe 106 PID 1184 wrote to memory of 4556 1184 Mhfmbl32.exe 106 PID 4556 wrote to memory of 2828 4556 Mopeofjl.exe 111 PID 4556 wrote to memory of 2828 4556 Mopeofjl.exe 111 PID 4556 wrote to memory of 2828 4556 Mopeofjl.exe 111 PID 2828 wrote to memory of 3404 2828 Mhhjhlqm.exe 110 PID 2828 wrote to memory of 3404 2828 Mhhjhlqm.exe 110 PID 2828 wrote to memory of 3404 2828 Mhhjhlqm.exe 110 PID 3404 wrote to memory of 2780 3404 Mmebpbod.exe 107 PID 3404 wrote to memory of 2780 3404 Mmebpbod.exe 107 PID 3404 wrote to memory of 2780 3404 Mmebpbod.exe 107 PID 2780 wrote to memory of 2916 2780 Meoggpmd.exe 108 PID 2780 wrote to memory of 2916 2780 Meoggpmd.exe 108 PID 2780 wrote to memory of 2916 2780 Meoggpmd.exe 108 PID 2916 wrote to memory of 2184 2916 Mgpcohcb.exe 109 PID 2916 wrote to memory of 2184 2916 Mgpcohcb.exe 109 PID 2916 wrote to memory of 2184 2916 Mgpcohcb.exe 109 PID 2184 wrote to memory of 3812 2184 Nkpijfgf.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5e3eefd9c3d3c56b5f931d1eb4034730_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5e3eefd9c3d3c56b5f931d1eb4034730_JC.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\Edionhpn.exeC:\Windows\system32\Edionhpn.exe2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\Jglaepim.exeC:\Windows\system32\Jglaepim.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\Jnfjbj32.exeC:\Windows\system32\Jnfjbj32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Jepbodhg.exeC:\Windows\system32\Jepbodhg.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Kagbdenk.exeC:\Windows\system32\Kagbdenk.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\Kjbdbjbi.exeC:\Windows\system32\Kjbdbjbi.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\Kfidgk32.exeC:\Windows\system32\Kfidgk32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\Kmbmdeoj.exeC:\Windows\system32\Kmbmdeoj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Knbinhfl.exeC:\Windows\system32\Knbinhfl.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\Ldoafodd.exeC:\Windows\system32\Ldoafodd.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Lhmjlm32.exeC:\Windows\system32\Lhmjlm32.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\Laeoec32.exeC:\Windows\system32\Laeoec32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\Loniiflo.exeC:\Windows\system32\Loniiflo.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\Mhfmbl32.exeC:\Windows\system32\Mhfmbl32.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1184
-
-
-
-
C:\Windows\SysWOW64\Lndfchdj.exeC:\Windows\system32\Lndfchdj.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892
-
C:\Windows\SysWOW64\Mopeofjl.exeC:\Windows\system32\Mopeofjl.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\Mhhjhlqm.exeC:\Windows\system32\Mhhjhlqm.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2828
-
-
C:\Windows\SysWOW64\Meoggpmd.exeC:\Windows\system32\Meoggpmd.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Mgpcohcb.exeC:\Windows\system32\Mgpcohcb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\Nkpijfgf.exeC:\Windows\system32\Nkpijfgf.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\Nefmgogl.exeC:\Windows\system32\Nefmgogl.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3812 -
C:\Windows\SysWOW64\Epiaig32.exeC:\Windows\system32\Epiaig32.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:212 -
C:\Windows\SysWOW64\Fgffka32.exeC:\Windows\system32\Fgffka32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\Foakpc32.exeC:\Windows\system32\Foakpc32.exe7⤵
- Executes dropped EXE
PID:4052 -
C:\Windows\SysWOW64\Fempbm32.exeC:\Windows\system32\Fempbm32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\Fgmllpng.exeC:\Windows\system32\Fgmllpng.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2508 -
C:\Windows\SysWOW64\Ghqeihbb.exeC:\Windows\system32\Ghqeihbb.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3720 -
C:\Windows\SysWOW64\Gchflq32.exeC:\Windows\system32\Gchflq32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4168 -
C:\Windows\SysWOW64\Ghgljg32.exeC:\Windows\system32\Ghgljg32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4244 -
C:\Windows\SysWOW64\Gledpe32.exeC:\Windows\system32\Gledpe32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4292 -
C:\Windows\SysWOW64\Hgkimn32.exeC:\Windows\system32\Hgkimn32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\Hhobjf32.exeC:\Windows\system32\Hhobjf32.exe15⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\Hfbbdj32.exeC:\Windows\system32\Hfbbdj32.exe16⤵
- Executes dropped EXE
PID:4436 -
C:\Windows\SysWOW64\Hokgmpkl.exeC:\Windows\system32\Hokgmpkl.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1460 -
C:\Windows\SysWOW64\Hhckeeam.exeC:\Windows\system32\Hhckeeam.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1616 -
C:\Windows\SysWOW64\Hfgloiqf.exeC:\Windows\system32\Hfgloiqf.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2368 -
C:\Windows\SysWOW64\Ifihdi32.exeC:\Windows\system32\Ifihdi32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2944 -
C:\Windows\SysWOW64\Ihjafd32.exeC:\Windows\system32\Ihjafd32.exe21⤵
- Executes dropped EXE
PID:2380 -
C:\Windows\SysWOW64\Ioffhn32.exeC:\Windows\system32\Ioffhn32.exe22⤵
- Executes dropped EXE
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Ifckkhfi.exeC:\Windows\system32\Ifckkhfi.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\Jfehpg32.exeC:\Windows\system32\Jfehpg32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4672 -
C:\Windows\SysWOW64\Jjcqffkm.exeC:\Windows\system32\Jjcqffkm.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:2384 -
C:\Windows\SysWOW64\Jcnbekok.exeC:\Windows\system32\Jcnbekok.exe26⤵
- Executes dropped EXE
PID:3280 -
C:\Windows\SysWOW64\Jjhjae32.exeC:\Windows\system32\Jjhjae32.exe27⤵PID:4024
-
C:\Windows\SysWOW64\Kimgba32.exeC:\Windows\system32\Kimgba32.exe28⤵
- Executes dropped EXE
PID:1004 -
C:\Windows\SysWOW64\Kmkpipaf.exeC:\Windows\system32\Kmkpipaf.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4668 -
C:\Windows\SysWOW64\Kmmmnp32.exeC:\Windows\system32\Kmmmnp32.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4664 -
C:\Windows\SysWOW64\Kgcqlh32.exeC:\Windows\system32\Kgcqlh32.exe31⤵
- Executes dropped EXE
PID:4888 -
C:\Windows\SysWOW64\Kakednfj.exeC:\Windows\system32\Kakednfj.exe32⤵
- Executes dropped EXE
- Modifies registry class
PID:968 -
C:\Windows\SysWOW64\Kfhnme32.exeC:\Windows\system32\Kfhnme32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:3864 -
C:\Windows\SysWOW64\Kmbfiokn.exeC:\Windows\system32\Kmbfiokn.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3196 -
C:\Windows\SysWOW64\Nmnnlk32.exeC:\Windows\system32\Nmnnlk32.exe35⤵
- Executes dropped EXE
PID:2208 -
C:\Windows\SysWOW64\Nkghqo32.exeC:\Windows\system32\Nkghqo32.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:688 -
C:\Windows\SysWOW64\Naqqmieo.exeC:\Windows\system32\Naqqmieo.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:1968 -
C:\Windows\SysWOW64\Omgabj32.exeC:\Windows\system32\Omgabj32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\Ogpfko32.exeC:\Windows\system32\Ogpfko32.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\Oaejhh32.exeC:\Windows\system32\Oaejhh32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4344 -
C:\Windows\SysWOW64\Ohobebig.exeC:\Windows\system32\Ohobebig.exe41⤵
- Executes dropped EXE
PID:3684 -
C:\Windows\SysWOW64\Oahgnh32.exeC:\Windows\system32\Oahgnh32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4868 -
C:\Windows\SysWOW64\Onngci32.exeC:\Windows\system32\Onngci32.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:416 -
C:\Windows\SysWOW64\Ohdlpa32.exeC:\Windows\system32\Ohdlpa32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4764 -
C:\Windows\SysWOW64\Onqdhh32.exeC:\Windows\system32\Onqdhh32.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\Pnlcdg32.exeC:\Windows\system32\Pnlcdg32.exe46⤵
- Executes dropped EXE
PID:3156 -
C:\Windows\SysWOW64\Glinjqhb.exeC:\Windows\system32\Glinjqhb.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5060 -
C:\Windows\SysWOW64\Kfndlphp.exeC:\Windows\system32\Kfndlphp.exe48⤵
- Drops file in System32 directory
- Modifies registry class
PID:4836 -
C:\Windows\SysWOW64\Pmpmnb32.exeC:\Windows\system32\Pmpmnb32.exe49⤵
- Drops file in System32 directory
- Modifies registry class
PID:2236 -
C:\Windows\SysWOW64\Dqbadf32.exeC:\Windows\system32\Dqbadf32.exe50⤵PID:5020
-
C:\Windows\SysWOW64\Kfbfmi32.exeC:\Windows\system32\Kfbfmi32.exe51⤵PID:4920
-
C:\Windows\SysWOW64\Khpcid32.exeC:\Windows\system32\Khpcid32.exe52⤵
- Drops file in System32 directory
PID:2736 -
C:\Windows\SysWOW64\Lfkich32.exeC:\Windows\system32\Lfkich32.exe53⤵
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\Lnfngj32.exeC:\Windows\system32\Lnfngj32.exe54⤵
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Lfnfhg32.exeC:\Windows\system32\Lfnfhg32.exe55⤵
- Modifies registry class
PID:3304 -
C:\Windows\SysWOW64\Lmhnea32.exeC:\Windows\system32\Lmhnea32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1200 -
C:\Windows\SysWOW64\Lbdgmh32.exeC:\Windows\system32\Lbdgmh32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:464 -
C:\Windows\SysWOW64\Ldccid32.exeC:\Windows\system32\Ldccid32.exe58⤵PID:2164
-
C:\Windows\SysWOW64\Miqlpbap.exeC:\Windows\system32\Miqlpbap.exe59⤵PID:1444
-
C:\Windows\SysWOW64\Hoibmmpi.exeC:\Windows\system32\Hoibmmpi.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4636 -
C:\Windows\SysWOW64\Iokocmnf.exeC:\Windows\system32\Iokocmnf.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5024 -
C:\Windows\SysWOW64\Ihcclb32.exeC:\Windows\system32\Ihcclb32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5092 -
C:\Windows\SysWOW64\Ialhdh32.exeC:\Windows\system32\Ialhdh32.exe63⤵
- Modifies registry class
PID:3192 -
C:\Windows\SysWOW64\Iophnl32.exeC:\Windows\system32\Iophnl32.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1780 -
C:\Windows\SysWOW64\Ihhmgaqb.exeC:\Windows\system32\Ihhmgaqb.exe65⤵PID:5104
-
C:\Windows\SysWOW64\Jpoagb32.exeC:\Windows\system32\Jpoagb32.exe66⤵
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\Jncapf32.exeC:\Windows\system32\Jncapf32.exe67⤵PID:2232
-
C:\Windows\SysWOW64\Kdmjmqjf.exeC:\Windows\system32\Kdmjmqjf.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1184 -
C:\Windows\SysWOW64\Kobnji32.exeC:\Windows\system32\Kobnji32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1188 -
C:\Windows\SysWOW64\Kaajfe32.exeC:\Windows\system32\Kaajfe32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3896 -
C:\Windows\SysWOW64\Khkbcopl.exeC:\Windows\system32\Khkbcopl.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3260 -
C:\Windows\SysWOW64\Koekpi32.exeC:\Windows\system32\Koekpi32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2244 -
C:\Windows\SysWOW64\Lkcaeige.exeC:\Windows\system32\Lkcaeige.exe73⤵PID:3716
-
C:\Windows\SysWOW64\Lamjbc32.exeC:\Windows\system32\Lamjbc32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3108 -
C:\Windows\SysWOW64\Lhgbomfo.exeC:\Windows\system32\Lhgbomfo.exe75⤵
- Drops file in System32 directory
- Modifies registry class
PID:4040 -
C:\Windows\SysWOW64\Loqjlg32.exeC:\Windows\system32\Loqjlg32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\Laofhbmp.exeC:\Windows\system32\Laofhbmp.exe77⤵
- Drops file in System32 directory
PID:1888 -
C:\Windows\SysWOW64\Ldnbdnlc.exeC:\Windows\system32\Ldnbdnlc.exe78⤵PID:4760
-
C:\Windows\SysWOW64\Lkgkqh32.exeC:\Windows\system32\Lkgkqh32.exe79⤵PID:4488
-
C:\Windows\SysWOW64\Locgagli.exeC:\Windows\system32\Locgagli.exe80⤵
- Modifies registry class
PID:4808 -
C:\Windows\SysWOW64\Laacmbkm.exeC:\Windows\system32\Laacmbkm.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:1972 -
C:\Windows\SysWOW64\Ldpoinjq.exeC:\Windows\system32\Ldpoinjq.exe82⤵PID:2540
-
C:\Windows\SysWOW64\Lkjhfh32.exeC:\Windows\system32\Lkjhfh32.exe83⤵PID:876
-
C:\Windows\SysWOW64\Moacbe32.exeC:\Windows\system32\Moacbe32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4308 -
C:\Windows\SysWOW64\Nbbldp32.exeC:\Windows\system32\Nbbldp32.exe85⤵
- Modifies registry class
PID:1464 -
C:\Windows\SysWOW64\Ngodlgka.exeC:\Windows\system32\Ngodlgka.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4048 -
C:\Windows\SysWOW64\Nnimia32.exeC:\Windows\system32\Nnimia32.exe87⤵PID:4368
-
C:\Windows\SysWOW64\Jpojml32.exeC:\Windows\system32\Jpojml32.exe88⤵PID:4580
-
C:\Windows\SysWOW64\Kmegkp32.exeC:\Windows\system32\Kmegkp32.exe89⤵
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\Kdophj32.exeC:\Windows\system32\Kdophj32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:492 -
C:\Windows\SysWOW64\Kabpan32.exeC:\Windows\system32\Kabpan32.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3612 -
C:\Windows\SysWOW64\Kmlmlo32.exeC:\Windows\system32\Kmlmlo32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4400 -
C:\Windows\SysWOW64\Kdffiinp.exeC:\Windows\system32\Kdffiinp.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4316 -
C:\Windows\SysWOW64\Ldhbnhlm.exeC:\Windows\system32\Ldhbnhlm.exe94⤵
- Modifies registry class
PID:8 -
C:\Windows\SysWOW64\Liekgo32.exeC:\Windows\system32\Liekgo32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4816 -
C:\Windows\SysWOW64\Lnepbm32.exeC:\Windows\system32\Lnepbm32.exe96⤵PID:4784
-
C:\Windows\SysWOW64\Ldohogfe.exeC:\Windows\system32\Ldohogfe.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4852 -
C:\Windows\SysWOW64\Mcdepd32.exeC:\Windows\system32\Mcdepd32.exe98⤵
- Drops file in System32 directory
- Modifies registry class
PID:5096 -
C:\Windows\SysWOW64\Mphfjhjf.exeC:\Windows\system32\Mphfjhjf.exe99⤵
- Modifies registry class
PID:752 -
C:\Windows\SysWOW64\Mknjgajl.exeC:\Windows\system32\Mknjgajl.exe100⤵
- Drops file in System32 directory
PID:1848 -
C:\Windows\SysWOW64\Mpkbohhd.exeC:\Windows\system32\Mpkbohhd.exe101⤵
- Drops file in System32 directory
- Modifies registry class
PID:3248 -
C:\Windows\SysWOW64\Mkpglqgj.exeC:\Windows\system32\Mkpglqgj.exe102⤵
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\Mkbcbp32.exeC:\Windows\system32\Mkbcbp32.exe103⤵PID:3256
-
C:\Windows\SysWOW64\Mdkhkflh.exeC:\Windows\system32\Mdkhkflh.exe104⤵PID:3048
-
C:\Windows\SysWOW64\Nglala32.exeC:\Windows\system32\Nglala32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3372 -
C:\Windows\SysWOW64\Njjmil32.exeC:\Windows\system32\Njjmil32.exe106⤵
- Modifies registry class
PID:4584 -
C:\Windows\SysWOW64\Ngnnbq32.exeC:\Windows\system32\Ngnnbq32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1400 -
C:\Windows\SysWOW64\Ncihbaie.exeC:\Windows\system32\Ncihbaie.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:688 -
C:\Windows\SysWOW64\Njcpok32.exeC:\Windows\system32\Njcpok32.exe109⤵
- Modifies registry class
PID:920 -
C:\Windows\SysWOW64\Okcmingd.exeC:\Windows\system32\Okcmingd.exe110⤵
- Modifies registry class
PID:3300 -
C:\Windows\SysWOW64\Oqpeaeel.exeC:\Windows\system32\Oqpeaeel.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4764 -
C:\Windows\SysWOW64\Ojhijjll.exeC:\Windows\system32\Ojhijjll.exe112⤵PID:768
-
C:\Windows\SysWOW64\Oqbagd32.exeC:\Windows\system32\Oqbagd32.exe113⤵PID:4016
-
C:\Windows\SysWOW64\Occkhp32.exeC:\Windows\system32\Occkhp32.exe114⤵PID:5132
-
C:\Windows\SysWOW64\Ojmcej32.exeC:\Windows\system32\Ojmcej32.exe115⤵
- Drops file in System32 directory
- Modifies registry class
PID:5176 -
C:\Windows\SysWOW64\Odbgbb32.exeC:\Windows\system32\Odbgbb32.exe116⤵PID:5220
-
C:\Windows\SysWOW64\Pcjaio32.exeC:\Windows\system32\Pcjaio32.exe117⤵PID:5264
-
C:\Windows\SysWOW64\Peimcaae.exeC:\Windows\system32\Peimcaae.exe118⤵PID:5300
-
C:\Windows\SysWOW64\Pjffkhpl.exeC:\Windows\system32\Pjffkhpl.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5356 -
C:\Windows\SysWOW64\Pgjfdm32.exeC:\Windows\system32\Pgjfdm32.exe120⤵PID:5408
-
C:\Windows\SysWOW64\Pengna32.exeC:\Windows\system32\Pengna32.exe121⤵
- Drops file in System32 directory
PID:5452 -
C:\Windows\SysWOW64\Qbbggeli.exeC:\Windows\system32\Qbbggeli.exe122⤵PID:5496
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-