Analysis
-
max time kernel
193s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 20:37
Behavioral task
behavioral1
Sample
NEAS.134658d29109c4454511425ea50cc660.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.134658d29109c4454511425ea50cc660.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.134658d29109c4454511425ea50cc660.exe
-
Size
378KB
-
MD5
134658d29109c4454511425ea50cc660
-
SHA1
ba2a5c9a133f0649344eb689a558b021c4d13fe4
-
SHA256
419180e5e4a929a3dc2bd058b04d712c9aad6afb880b56afc3aae82ee6cf7122
-
SHA512
d8e8c8be85e7873d1b5c36df61bbbede154ac3a521a977c84bfce95de72015cb2158e9e609c2f74bcc0e145c659c341c5b3758ffb1c2bd9ba9afcbd64522afaf
-
SSDEEP
6144:Z/+H//PbEyeYr75lHzpaF2e6UK+42GTQMJSZO5f7M0rx7/hP66qve6UK+42GTQM1:o//P4yeYr75lTefkY660fIaDZkY660fR
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blonbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cefolk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igoeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Igabdekb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ifdohl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jkhnab32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aakelfhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hohjgpmo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Commjgga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hocqkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Njpjap32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ahinbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Djeegf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bhibgo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceoillaj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eaklcj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Igoeoe32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jigdoglm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcmpgpkp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hkehdd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gmafjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dcbckk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dpemjifi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Omhicj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fifomlap.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Blonbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dlbcoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Femndhgh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aaofedkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hgliie32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fflobgng.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmafjp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gfjkce32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Goepgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hiomppkc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baojkdqb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bonjnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Eocegn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Femndhgh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omhicj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ofqnlplf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Homcbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cobciblp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbihdhhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Inmggo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oqfbihll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Omopdion.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbgjgd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iejlih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jfdaogfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Dlgddkpc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbbfnlpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Goccbhae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hpiemj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Oilekqhg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.134658d29109c4454511425ea50cc660.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emphhhoh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iapbodql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Elncjc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cfdhdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdlphjaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cjbhbf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Apdkmn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oilmckml.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0008000000022dbf-6.dat family_berbew behavioral2/files/0x0008000000022dbf-8.dat family_berbew behavioral2/files/0x0006000000022de7-14.dat family_berbew behavioral2/files/0x0006000000022de7-15.dat family_berbew behavioral2/files/0x0006000000022de9-22.dat family_berbew behavioral2/files/0x0006000000022de9-24.dat family_berbew behavioral2/files/0x0007000000022de0-31.dat family_berbew behavioral2/files/0x0007000000022de0-30.dat family_berbew behavioral2/files/0x0007000000022de2-38.dat family_berbew behavioral2/files/0x0007000000022de2-39.dat family_berbew behavioral2/files/0x0007000000022de4-46.dat family_berbew behavioral2/files/0x0007000000022de4-47.dat family_berbew behavioral2/files/0x0006000000022dec-54.dat family_berbew behavioral2/files/0x0006000000022dec-56.dat family_berbew behavioral2/files/0x0006000000022def-62.dat family_berbew behavioral2/files/0x0006000000022def-64.dat family_berbew behavioral2/files/0x0006000000022df1-70.dat family_berbew behavioral2/files/0x0006000000022df1-72.dat family_berbew behavioral2/files/0x0006000000022df5-78.dat family_berbew behavioral2/files/0x0006000000022df5-79.dat family_berbew behavioral2/files/0x0006000000022df7-86.dat family_berbew behavioral2/files/0x0006000000022df7-88.dat family_berbew behavioral2/files/0x0006000000022dfa-94.dat family_berbew behavioral2/files/0x0006000000022dfa-96.dat family_berbew behavioral2/files/0x0006000000022e04-102.dat family_berbew behavioral2/files/0x0006000000022e04-103.dat family_berbew behavioral2/files/0x0006000000022e06-110.dat family_berbew behavioral2/files/0x0006000000022e06-112.dat family_berbew behavioral2/files/0x0006000000022e08-118.dat family_berbew behavioral2/files/0x0006000000022e08-119.dat family_berbew behavioral2/files/0x0007000000022dfe-126.dat family_berbew behavioral2/files/0x0007000000022dfe-128.dat family_berbew behavioral2/files/0x0007000000022dfc-134.dat family_berbew behavioral2/files/0x0007000000022dfc-135.dat family_berbew behavioral2/files/0x0006000000022e0b-143.dat family_berbew behavioral2/files/0x0006000000022e0b-142.dat family_berbew behavioral2/files/0x0006000000022e0d-150.dat family_berbew behavioral2/files/0x0006000000022e0d-152.dat family_berbew behavioral2/files/0x0006000000022e10-158.dat family_berbew behavioral2/files/0x0006000000022e10-160.dat family_berbew behavioral2/files/0x0006000000022e12-166.dat family_berbew behavioral2/files/0x0006000000022e12-168.dat family_berbew behavioral2/files/0x0006000000022e14-169.dat family_berbew behavioral2/files/0x0006000000022e14-174.dat family_berbew behavioral2/files/0x0006000000022e14-176.dat family_berbew behavioral2/files/0x0006000000022e16-182.dat family_berbew behavioral2/files/0x0006000000022e16-183.dat family_berbew behavioral2/files/0x0006000000022e18-191.dat family_berbew behavioral2/files/0x0006000000022e18-190.dat family_berbew behavioral2/files/0x0006000000022e1f-198.dat family_berbew behavioral2/files/0x0006000000022e1f-199.dat family_berbew behavioral2/files/0x0006000000022e21-206.dat family_berbew behavioral2/files/0x0006000000022e23-214.dat family_berbew behavioral2/files/0x0006000000022e23-215.dat family_berbew behavioral2/files/0x0006000000022e21-207.dat family_berbew behavioral2/files/0x0006000000022e29-231.dat family_berbew behavioral2/files/0x0006000000022e29-230.dat family_berbew behavioral2/files/0x0007000000022e26-223.dat family_berbew behavioral2/files/0x0007000000022e26-222.dat family_berbew behavioral2/files/0x0007000000022e1a-238.dat family_berbew behavioral2/files/0x0007000000022e1c-247.dat family_berbew behavioral2/files/0x0008000000022e1e-255.dat family_berbew behavioral2/files/0x0008000000022e1e-254.dat family_berbew behavioral2/files/0x0007000000022e1c-246.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 692 Fgffka32.exe 3900 Foakpc32.exe 1456 Fifomlap.exe 4564 Fpcdof32.exe 488 Fikihlmj.exe 5020 Ginenk32.exe 3452 Gojnfb32.exe 3400 Gcmpgpkp.exe 3296 Hjieii32.exe 2392 Hgmebnpd.exe 3256 Hohjgpmo.exe 2572 Homcbo32.exe 2148 Pknghk32.exe 1724 Qgehml32.exe 2996 Qnopjfgi.exe 1912 Qggebl32.exe 3116 Aaofedkl.exe 4836 Ahinbo32.exe 4696 Ehofhdli.exe 2732 Iapbodql.exe 1408 Qkmqne32.exe 3572 Cmmbmiag.exe 4444 Incpdodg.exe 4848 Meobeb32.exe 4152 Cjbhbf32.exe 5104 Cckmklac.exe 5012 Djeegf32.exe 744 Dqomdppm.exe 4944 Dncnnd32.exe 1656 Dgkbfjeg.exe 1260 Dnekcd32.exe 2332 Dcbckk32.exe 4832 Dnhgidka.exe 5056 Apdkmn32.exe 1176 Bedpjdoc.exe 4792 Bpnncl32.exe 4768 Baojkdqb.exe 1380 Bhibgo32.exe 4856 Bppjhl32.exe 2412 Cemcqcgi.exe 60 Clgkmm32.exe 848 Coegih32.exe 1348 Clldhljp.exe 4780 Cojqdhid.exe 1316 Cipebqij.exe 2728 Commjgga.exe 4344 Cibagpgg.exe 2252 Coojpg32.exe 4392 Denlgq32.exe 4452 Dlgddkpc.exe 380 Dpemjifi.exe 388 Djnaco32.exe 5028 Nqaipgal.exe 2656 Blonbh32.exe 4396 Bonjnc32.exe 3304 Behbkmgb.exe 3760 Blakhgoo.exe 3620 Baocpnmf.exe 980 Cobciblp.exe 4860 Chkhbh32.exe 2092 Ceoillaj.exe 3916 Cogmdb32.exe 4260 Cknnjcmo.exe 2788 Cecbgl32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Blonbh32.exe Nqaipgal.exe File created C:\Windows\SysWOW64\Kmjjlh32.dll Igoeoe32.exe File created C:\Windows\SysWOW64\Aqfoefco.exe Ajcdbm32.exe File opened for modification C:\Windows\SysWOW64\Homcbo32.exe Hohjgpmo.exe File created C:\Windows\SysWOW64\Eocegn32.exe Ednajepe.exe File created C:\Windows\SysWOW64\Ifehfoed.dll Ijqmacpl.exe File created C:\Windows\SysWOW64\Iapbodql.exe Ehofhdli.exe File created C:\Windows\SysWOW64\Foaoho32.dll Bppjhl32.exe File opened for modification C:\Windows\SysWOW64\Dpemjifi.exe Dlgddkpc.exe File opened for modification C:\Windows\SysWOW64\Fcanmlea.exe Flgfqb32.exe File created C:\Windows\SysWOW64\Dflebj32.dll Iejlih32.exe File created C:\Windows\SysWOW64\Jkhnab32.exe Jenedhaa.exe File opened for modification C:\Windows\SysWOW64\Aaofedkl.exe Qggebl32.exe File created C:\Windows\SysWOW64\Qhkdob32.dll Dpemjifi.exe File created C:\Windows\SysWOW64\Bbbqbo32.dll Baocpnmf.exe File opened for modification C:\Windows\SysWOW64\Jenedhaa.exe Jndmgn32.exe File opened for modification C:\Windows\SysWOW64\Njpjap32.exe Dafpjf32.exe File opened for modification C:\Windows\SysWOW64\Qgehml32.exe Pknghk32.exe File opened for modification C:\Windows\SysWOW64\Fdgdpdgj.exe Fbihdhhf.exe File created C:\Windows\SysWOW64\Hkehdd32.exe Hdlphjaf.exe File opened for modification C:\Windows\SysWOW64\Ijqmacpl.exe Emphhhoh.exe File created C:\Windows\SysWOW64\Mjjnen32.dll Goccbhae.exe File opened for modification C:\Windows\SysWOW64\Blakhgoo.exe Behbkmgb.exe File created C:\Windows\SysWOW64\Qkpdbm32.dll Eamhhjbd.exe File created C:\Windows\SysWOW64\Fcgone32.dll Geohdago.exe File opened for modification C:\Windows\SysWOW64\Ajcdbm32.exe Oilekqhg.exe File opened for modification C:\Windows\SysWOW64\Cipebqij.exe Cojqdhid.exe File created C:\Windows\SysWOW64\Mmmhfaab.dll Obgoaq32.exe File opened for modification C:\Windows\SysWOW64\Baojkdqb.exe Bpnncl32.exe File created C:\Windows\SysWOW64\Ndbkoj32.dll Djnaco32.exe File created C:\Windows\SysWOW64\Hdlphjaf.exe Cfdhdn32.exe File created C:\Windows\SysWOW64\Pknghk32.exe Homcbo32.exe File created C:\Windows\SysWOW64\Ekcplp32.exe Eaklcj32.exe File created C:\Windows\SysWOW64\Hgliie32.exe Hdnlmj32.exe File created C:\Windows\SysWOW64\Omnknefi.dll Gmafjp32.exe File created C:\Windows\SysWOW64\Binlmd32.dll Fkopgn32.exe File opened for modification C:\Windows\SysWOW64\Bedpjdoc.exe Apdkmn32.exe File created C:\Windows\SysWOW64\Dampal32.exe Cefolk32.exe File opened for modification C:\Windows\SysWOW64\Dampal32.exe Cefolk32.exe File created C:\Windows\SysWOW64\Pjqgggni.dll Dgkbfjeg.exe File created C:\Windows\SysWOW64\Ehqapd32.dll Bhibgo32.exe File created C:\Windows\SysWOW64\Ednajepe.exe Ehgqed32.exe File created C:\Windows\SysWOW64\Ejmkpkcb.dll Fflobgng.exe File created C:\Windows\SysWOW64\Fgffka32.exe NEAS.134658d29109c4454511425ea50cc660.exe File created C:\Windows\SysWOW64\Apdkmn32.exe Dnhgidka.exe File created C:\Windows\SysWOW64\Bppjhl32.exe Bhibgo32.exe File created C:\Windows\SysWOW64\Blaolkoj.dll Eaklcj32.exe File created C:\Windows\SysWOW64\Fdbked32.exe Fcanmlea.exe File created C:\Windows\SysWOW64\Ioopfa32.exe Iejlih32.exe File created C:\Windows\SysWOW64\Kkjqkhld.dll Jkhnab32.exe File created C:\Windows\SysWOW64\Lnleolbk.dll Aakelfhg.exe File opened for modification C:\Windows\SysWOW64\Meobeb32.exe Incpdodg.exe File created C:\Windows\SysWOW64\Jdebcp32.dll Hpiemj32.exe File opened for modification C:\Windows\SysWOW64\Djeegf32.exe Cckmklac.exe File created C:\Windows\SysWOW64\Dafpjf32.exe Hmmffnai.exe File opened for modification C:\Windows\SysWOW64\Gcmpgpkp.exe Gojnfb32.exe File created C:\Windows\SysWOW64\Lneccc32.dll Hmhmko32.exe File created C:\Windows\SysWOW64\Ipllghgi.dll Ednajepe.exe File opened for modification C:\Windows\SysWOW64\Colfpace.exe Cecbgl32.exe File opened for modification C:\Windows\SysWOW64\Bmfqhmid.exe Hchqlqpj.exe File created C:\Windows\SysWOW64\Jfdaogfh.exe Fecfkn32.exe File created C:\Windows\SysWOW64\Mnlcpp32.dll Denlgq32.exe File created C:\Windows\SysWOW64\Incpdodg.exe Cmmbmiag.exe File created C:\Windows\SysWOW64\Oepnld32.dll Ginenk32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hgmebnpd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Hiomppkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Omopdion.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Colfpace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fdgdpdgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Inmggo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nkcjajig.dll" Iapbodql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cipebqij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cipebqij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cobciblp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cogmdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ibkpmm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ijqmacpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Goepgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ojcpmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jpffgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oqfbihll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dldpde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lmkmilfb.dll" Ibnlbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejdhokji.dll" Emphhhoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjdhck32.dll" Oqfbihll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfhbpf32.dll" Hbppaopp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amfdao32.dll" Ncpejd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eoimghli.dll" Igabdekb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhleincd.dll" Oilekqhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hjieii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hmalih32.dll" Cknnjcmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Adpfmmcl.dll" Cefolk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ekcplp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fdegkdim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qggebl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bonjnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Igoeoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obhmpl32.dll" Gejoib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lfjjlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hchqlqpj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cojqdhid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cibagpgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmdknbko.dll" Coojpg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jigdoglm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmnpoa32.dll" Glgckl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Bedpjdoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Elncjc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ofqnlplf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Obgoaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nqlpcq32.dll" Ookokeqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Qkmqne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bhibgo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Djnaco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Qkmqne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Plaebilk.dll" Dbllkohi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Fbihdhhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fecfkn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cknnjcmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Blploo32.dll" Dldpde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bigfndlc.dll" Eocegn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Occdba32.dll" Lfjjlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oepnld32.dll" Ginenk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Denlgq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dqdgbl32.dll" Blakhgoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Baocpnmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Obikgppg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Blakhgoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Igabdekb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 840 wrote to memory of 692 840 NEAS.134658d29109c4454511425ea50cc660.exe 89 PID 840 wrote to memory of 692 840 NEAS.134658d29109c4454511425ea50cc660.exe 89 PID 840 wrote to memory of 692 840 NEAS.134658d29109c4454511425ea50cc660.exe 89 PID 692 wrote to memory of 3900 692 Fgffka32.exe 90 PID 692 wrote to memory of 3900 692 Fgffka32.exe 90 PID 692 wrote to memory of 3900 692 Fgffka32.exe 90 PID 3900 wrote to memory of 1456 3900 Foakpc32.exe 91 PID 3900 wrote to memory of 1456 3900 Foakpc32.exe 91 PID 3900 wrote to memory of 1456 3900 Foakpc32.exe 91 PID 1456 wrote to memory of 4564 1456 Fifomlap.exe 92 PID 1456 wrote to memory of 4564 1456 Fifomlap.exe 92 PID 1456 wrote to memory of 4564 1456 Fifomlap.exe 92 PID 4564 wrote to memory of 488 4564 Fpcdof32.exe 93 PID 4564 wrote to memory of 488 4564 Fpcdof32.exe 93 PID 4564 wrote to memory of 488 4564 Fpcdof32.exe 93 PID 488 wrote to memory of 5020 488 Fikihlmj.exe 95 PID 488 wrote to memory of 5020 488 Fikihlmj.exe 95 PID 488 wrote to memory of 5020 488 Fikihlmj.exe 95 PID 5020 wrote to memory of 3452 5020 Ginenk32.exe 96 PID 5020 wrote to memory of 3452 5020 Ginenk32.exe 96 PID 5020 wrote to memory of 3452 5020 Ginenk32.exe 96 PID 3452 wrote to memory of 3400 3452 Gojnfb32.exe 97 PID 3452 wrote to memory of 3400 3452 Gojnfb32.exe 97 PID 3452 wrote to memory of 3400 3452 Gojnfb32.exe 97 PID 3400 wrote to memory of 3296 3400 Gcmpgpkp.exe 98 PID 3400 wrote to memory of 3296 3400 Gcmpgpkp.exe 98 PID 3400 wrote to memory of 3296 3400 Gcmpgpkp.exe 98 PID 3296 wrote to memory of 2392 3296 Hjieii32.exe 99 PID 3296 wrote to memory of 2392 3296 Hjieii32.exe 99 PID 3296 wrote to memory of 2392 3296 Hjieii32.exe 99 PID 2392 wrote to memory of 3256 2392 Hgmebnpd.exe 100 PID 2392 wrote to memory of 3256 2392 Hgmebnpd.exe 100 PID 2392 wrote to memory of 3256 2392 Hgmebnpd.exe 100 PID 3256 wrote to memory of 2572 3256 Hohjgpmo.exe 101 PID 3256 wrote to memory of 2572 3256 Hohjgpmo.exe 101 PID 3256 wrote to memory of 2572 3256 Hohjgpmo.exe 101 PID 2572 wrote to memory of 2148 2572 Homcbo32.exe 103 PID 2572 wrote to memory of 2148 2572 Homcbo32.exe 103 PID 2572 wrote to memory of 2148 2572 Homcbo32.exe 103 PID 2148 wrote to memory of 1724 2148 Pknghk32.exe 104 PID 2148 wrote to memory of 1724 2148 Pknghk32.exe 104 PID 2148 wrote to memory of 1724 2148 Pknghk32.exe 104 PID 1724 wrote to memory of 2996 1724 Qgehml32.exe 105 PID 1724 wrote to memory of 2996 1724 Qgehml32.exe 105 PID 1724 wrote to memory of 2996 1724 Qgehml32.exe 105 PID 2996 wrote to memory of 1912 2996 Qnopjfgi.exe 106 PID 2996 wrote to memory of 1912 2996 Qnopjfgi.exe 106 PID 2996 wrote to memory of 1912 2996 Qnopjfgi.exe 106 PID 1912 wrote to memory of 3116 1912 Qggebl32.exe 107 PID 1912 wrote to memory of 3116 1912 Qggebl32.exe 107 PID 1912 wrote to memory of 3116 1912 Qggebl32.exe 107 PID 3116 wrote to memory of 4836 3116 Aaofedkl.exe 108 PID 3116 wrote to memory of 4836 3116 Aaofedkl.exe 108 PID 3116 wrote to memory of 4836 3116 Aaofedkl.exe 108 PID 4836 wrote to memory of 4696 4836 Ahinbo32.exe 109 PID 4836 wrote to memory of 4696 4836 Ahinbo32.exe 109 PID 4836 wrote to memory of 4696 4836 Ahinbo32.exe 109 PID 4696 wrote to memory of 2732 4696 Ehofhdli.exe 110 PID 4696 wrote to memory of 2732 4696 Ehofhdli.exe 110 PID 4696 wrote to memory of 2732 4696 Ehofhdli.exe 110 PID 2732 wrote to memory of 1408 2732 Iapbodql.exe 111 PID 2732 wrote to memory of 1408 2732 Iapbodql.exe 111 PID 2732 wrote to memory of 1408 2732 Iapbodql.exe 111 PID 1408 wrote to memory of 3572 1408 Qkmqne32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.134658d29109c4454511425ea50cc660.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.134658d29109c4454511425ea50cc660.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\Fgffka32.exeC:\Windows\system32\Fgffka32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\Foakpc32.exeC:\Windows\system32\Foakpc32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\Fifomlap.exeC:\Windows\system32\Fifomlap.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\Fpcdof32.exeC:\Windows\system32\Fpcdof32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\Fikihlmj.exeC:\Windows\system32\Fikihlmj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\Ginenk32.exeC:\Windows\system32\Ginenk32.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\Gojnfb32.exeC:\Windows\system32\Gojnfb32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\Gcmpgpkp.exeC:\Windows\system32\Gcmpgpkp.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\Hjieii32.exeC:\Windows\system32\Hjieii32.exe10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\Hgmebnpd.exeC:\Windows\system32\Hgmebnpd.exe11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\Hohjgpmo.exeC:\Windows\system32\Hohjgpmo.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\Homcbo32.exeC:\Windows\system32\Homcbo32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\Pknghk32.exeC:\Windows\system32\Pknghk32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\Qgehml32.exeC:\Windows\system32\Qgehml32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\Qnopjfgi.exeC:\Windows\system32\Qnopjfgi.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Qggebl32.exeC:\Windows\system32\Qggebl32.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\Aaofedkl.exeC:\Windows\system32\Aaofedkl.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\Ahinbo32.exeC:\Windows\system32\Ahinbo32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\Ehofhdli.exeC:\Windows\system32\Ehofhdli.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\Iapbodql.exeC:\Windows\system32\Iapbodql.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\Qkmqne32.exeC:\Windows\system32\Qkmqne32.exe22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\Cmmbmiag.exeC:\Windows\system32\Cmmbmiag.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3572 -
C:\Windows\SysWOW64\Incpdodg.exeC:\Windows\system32\Incpdodg.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4444 -
C:\Windows\SysWOW64\Meobeb32.exeC:\Windows\system32\Meobeb32.exe25⤵
- Executes dropped EXE
PID:4848 -
C:\Windows\SysWOW64\Cjbhbf32.exeC:\Windows\system32\Cjbhbf32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4152 -
C:\Windows\SysWOW64\Cckmklac.exeC:\Windows\system32\Cckmklac.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5104 -
C:\Windows\SysWOW64\Djeegf32.exeC:\Windows\system32\Djeegf32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:5012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Dqomdppm.exeC:\Windows\system32\Dqomdppm.exe1⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\Dncnnd32.exeC:\Windows\system32\Dncnnd32.exe2⤵
- Executes dropped EXE
PID:4944 -
C:\Windows\SysWOW64\Dgkbfjeg.exeC:\Windows\system32\Dgkbfjeg.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1656
-
-
-
C:\Windows\SysWOW64\Dnekcd32.exeC:\Windows\system32\Dnekcd32.exe1⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\SysWOW64\Dcbckk32.exeC:\Windows\system32\Dcbckk32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\Dnhgidka.exeC:\Windows\system32\Dnhgidka.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4832 -
C:\Windows\SysWOW64\Apdkmn32.exeC:\Windows\system32\Apdkmn32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:5056
-
-
-
-
C:\Windows\SysWOW64\Bedpjdoc.exeC:\Windows\system32\Bedpjdoc.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:1176 -
C:\Windows\SysWOW64\Bpnncl32.exeC:\Windows\system32\Bpnncl32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4792
-
-
C:\Windows\SysWOW64\Baojkdqb.exeC:\Windows\system32\Baojkdqb.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4768 -
C:\Windows\SysWOW64\Bhibgo32.exeC:\Windows\system32\Bhibgo32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1380 -
C:\Windows\SysWOW64\Bppjhl32.exeC:\Windows\system32\Bppjhl32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4856 -
C:\Windows\SysWOW64\Cemcqcgi.exeC:\Windows\system32\Cemcqcgi.exe4⤵
- Executes dropped EXE
PID:2412
-
-
-
-
C:\Windows\SysWOW64\Clgkmm32.exeC:\Windows\system32\Clgkmm32.exe1⤵
- Executes dropped EXE
PID:60 -
C:\Windows\SysWOW64\Coegih32.exeC:\Windows\system32\Coegih32.exe2⤵
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\Clldhljp.exeC:\Windows\system32\Clldhljp.exe3⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\SysWOW64\Cojqdhid.exeC:\Windows\system32\Cojqdhid.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4780 -
C:\Windows\SysWOW64\Cipebqij.exeC:\Windows\system32\Cipebqij.exe5⤵
- Executes dropped EXE
- Modifies registry class
PID:1316 -
C:\Windows\SysWOW64\Commjgga.exeC:\Windows\system32\Commjgga.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\Cibagpgg.exeC:\Windows\system32\Cibagpgg.exe7⤵
- Executes dropped EXE
- Modifies registry class
PID:4344 -
C:\Windows\SysWOW64\Coojpg32.exeC:\Windows\system32\Coojpg32.exe8⤵
- Executes dropped EXE
- Modifies registry class
PID:2252 -
C:\Windows\SysWOW64\Denlgq32.exeC:\Windows\system32\Denlgq32.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4392 -
C:\Windows\SysWOW64\Dlgddkpc.exeC:\Windows\system32\Dlgddkpc.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:4452 -
C:\Windows\SysWOW64\Dpemjifi.exeC:\Windows\system32\Dpemjifi.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:380 -
C:\Windows\SysWOW64\Djnaco32.exeC:\Windows\system32\Djnaco32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:388 -
C:\Windows\SysWOW64\Nqaipgal.exeC:\Windows\system32\Nqaipgal.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5028 -
C:\Windows\SysWOW64\Blonbh32.exeC:\Windows\system32\Blonbh32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2656 -
C:\Windows\SysWOW64\Bonjnc32.exeC:\Windows\system32\Bonjnc32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:4396 -
C:\Windows\SysWOW64\Behbkmgb.exeC:\Windows\system32\Behbkmgb.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3304 -
C:\Windows\SysWOW64\Blakhgoo.exeC:\Windows\system32\Blakhgoo.exe17⤵
- Executes dropped EXE
- Modifies registry class
PID:3760 -
C:\Windows\SysWOW64\Baocpnmf.exeC:\Windows\system32\Baocpnmf.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3620 -
C:\Windows\SysWOW64\Cobciblp.exeC:\Windows\system32\Cobciblp.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\Chkhbh32.exeC:\Windows\system32\Chkhbh32.exe20⤵
- Executes dropped EXE
PID:4860 -
C:\Windows\SysWOW64\Ceoillaj.exeC:\Windows\system32\Ceoillaj.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2092 -
C:\Windows\SysWOW64\Cogmdb32.exeC:\Windows\system32\Cogmdb32.exe22⤵
- Executes dropped EXE
- Modifies registry class
PID:3916 -
C:\Windows\SysWOW64\Cknnjcmo.exeC:\Windows\system32\Cknnjcmo.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:4260 -
C:\Windows\SysWOW64\Cecbgl32.exeC:\Windows\system32\Cecbgl32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2788 -
C:\Windows\SysWOW64\Colfpace.exeC:\Windows\system32\Colfpace.exe25⤵
- Modifies registry class
PID:4600 -
C:\Windows\SysWOW64\Cefolk32.exeC:\Windows\system32\Cefolk32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:816 -
C:\Windows\SysWOW64\Dampal32.exeC:\Windows\system32\Dampal32.exe27⤵PID:4180
-
C:\Windows\SysWOW64\Dlbcoe32.exeC:\Windows\system32\Dlbcoe32.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1188 -
C:\Windows\SysWOW64\Dbllkohi.exeC:\Windows\system32\Dbllkohi.exe29⤵
- Modifies registry class
PID:2404 -
C:\Windows\SysWOW64\Dldpde32.exeC:\Windows\system32\Dldpde32.exe30⤵
- Modifies registry class
PID:2148 -
C:\Windows\SysWOW64\Dememj32.exeC:\Windows\system32\Dememj32.exe31⤵PID:4404
-
C:\Windows\SysWOW64\Elncjc32.exeC:\Windows\system32\Elncjc32.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4412 -
C:\Windows\SysWOW64\Eaklcj32.exeC:\Windows\system32\Eaklcj32.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1132 -
C:\Windows\SysWOW64\Ekcplp32.exeC:\Windows\system32\Ekcplp32.exe34⤵
- Modifies registry class
PID:3464 -
C:\Windows\SysWOW64\Eamhhjbd.exeC:\Windows\system32\Eamhhjbd.exe35⤵
- Drops file in System32 directory
PID:2956 -
C:\Windows\SysWOW64\Ehgqed32.exeC:\Windows\system32\Ehgqed32.exe36⤵
- Drops file in System32 directory
PID:3612 -
C:\Windows\SysWOW64\Ednajepe.exeC:\Windows\system32\Ednajepe.exe37⤵
- Drops file in System32 directory
PID:4128 -
C:\Windows\SysWOW64\Eocegn32.exeC:\Windows\system32\Eocegn32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4988 -
C:\Windows\SysWOW64\Femndhgh.exeC:\Windows\system32\Femndhgh.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3308 -
C:\Windows\SysWOW64\Flgfqb32.exeC:\Windows\system32\Flgfqb32.exe40⤵
- Drops file in System32 directory
PID:3828 -
C:\Windows\SysWOW64\Fcanmlea.exeC:\Windows\system32\Fcanmlea.exe41⤵
- Drops file in System32 directory
PID:880 -
C:\Windows\SysWOW64\Fdbked32.exeC:\Windows\system32\Fdbked32.exe42⤵PID:2320
-
C:\Windows\SysWOW64\Fklcbocl.exeC:\Windows\system32\Fklcbocl.exe43⤵PID:1908
-
C:\Windows\SysWOW64\Fdegkdim.exeC:\Windows\system32\Fdegkdim.exe44⤵
- Modifies registry class
PID:896 -
C:\Windows\SysWOW64\Fkopgn32.exeC:\Windows\system32\Fkopgn32.exe45⤵
- Drops file in System32 directory
PID:3532 -
C:\Windows\SysWOW64\Fbihdhhf.exeC:\Windows\system32\Fbihdhhf.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3768 -
C:\Windows\SysWOW64\Fdgdpdgj.exeC:\Windows\system32\Fdgdpdgj.exe47⤵
- Modifies registry class
PID:5240 -
C:\Windows\SysWOW64\Cfdhdn32.exeC:\Windows\system32\Cfdhdn32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5340 -
C:\Windows\SysWOW64\Hdlphjaf.exeC:\Windows\system32\Hdlphjaf.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5384 -
C:\Windows\SysWOW64\Hkehdd32.exeC:\Windows\system32\Hkehdd32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5432 -
C:\Windows\SysWOW64\Hbppaopp.exeC:\Windows\system32\Hbppaopp.exe51⤵
- Modifies registry class
PID:5480 -
C:\Windows\SysWOW64\Hdnlmj32.exeC:\Windows\system32\Hdnlmj32.exe52⤵
- Drops file in System32 directory
PID:5540 -
C:\Windows\SysWOW64\Hgliie32.exeC:\Windows\system32\Hgliie32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5580 -
C:\Windows\SysWOW64\Hocqkc32.exeC:\Windows\system32\Hocqkc32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5620 -
C:\Windows\SysWOW64\Hdpicj32.exeC:\Windows\system32\Hdpicj32.exe55⤵PID:5664
-
C:\Windows\SysWOW64\Igoeoe32.exeC:\Windows\system32\Igoeoe32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5704 -
C:\Windows\SysWOW64\Ifpemmdd.exeC:\Windows\system32\Ifpemmdd.exe57⤵PID:5744
-
C:\Windows\SysWOW64\Igabdekb.exeC:\Windows\system32\Igabdekb.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5784 -
C:\Windows\SysWOW64\Inmggo32.exeC:\Windows\system32\Inmggo32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5824 -
C:\Windows\SysWOW64\Ifdohl32.exeC:\Windows\system32\Ifdohl32.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5868 -
C:\Windows\SysWOW64\Ikagpcof.exeC:\Windows\system32\Ikagpcof.exe61⤵PID:5908
-
C:\Windows\SysWOW64\Ibkpmm32.exeC:\Windows\system32\Ibkpmm32.exe62⤵
- Modifies registry class
PID:5956 -
C:\Windows\SysWOW64\Iejlih32.exeC:\Windows\system32\Iejlih32.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5996 -
C:\Windows\SysWOW64\Ioopfa32.exeC:\Windows\system32\Ioopfa32.exe64⤵PID:6036
-
C:\Windows\SysWOW64\Ibnlbm32.exeC:\Windows\system32\Ibnlbm32.exe65⤵
- Modifies registry class
PID:6080 -
C:\Windows\SysWOW64\Jigdoglm.exeC:\Windows\system32\Jigdoglm.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:6136 -
C:\Windows\SysWOW64\Jndmgn32.exeC:\Windows\system32\Jndmgn32.exe67⤵
- Drops file in System32 directory
PID:5168 -
C:\Windows\SysWOW64\Jenedhaa.exeC:\Windows\system32\Jenedhaa.exe68⤵
- Drops file in System32 directory
PID:1600 -
C:\Windows\SysWOW64\Jkhnab32.exeC:\Windows\system32\Jkhnab32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4444 -
C:\Windows\SysWOW64\Jbbfnlpk.exeC:\Windows\system32\Jbbfnlpk.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3656 -
C:\Windows\SysWOW64\Jpffgp32.exeC:\Windows\system32\Jpffgp32.exe71⤵
- Modifies registry class
PID:4488 -
C:\Windows\SysWOW64\Jiokpfee.exeC:\Windows\system32\Jiokpfee.exe72⤵PID:2832
-
C:\Windows\SysWOW64\Jphcmp32.exeC:\Windows\system32\Jphcmp32.exe73⤵PID:5420
-
C:\Windows\SysWOW64\Aomipkic.exeC:\Windows\system32\Aomipkic.exe74⤵PID:5472
-
C:\Windows\SysWOW64\Aakelfhg.exeC:\Windows\system32\Aakelfhg.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5660 -
C:\Windows\SysWOW64\Emphhhoh.exeC:\Windows\system32\Emphhhoh.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5836 -
C:\Windows\SysWOW64\Ijqmacpl.exeC:\Windows\system32\Ijqmacpl.exe77⤵
- Drops file in System32 directory
- Modifies registry class
PID:6116 -
C:\Windows\SysWOW64\Ebdcejpk.exeC:\Windows\system32\Ebdcejpk.exe78⤵PID:5184
-
C:\Windows\SysWOW64\Fflobgng.exeC:\Windows\system32\Fflobgng.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5296 -
C:\Windows\SysWOW64\Gnqflhcg.exeC:\Windows\system32\Gnqflhcg.exe80⤵PID:1352
-
C:\Windows\SysWOW64\Gejoib32.exeC:\Windows\system32\Gejoib32.exe81⤵
- Modifies registry class
PID:3336 -
C:\Windows\SysWOW64\Gmafjp32.exeC:\Windows\system32\Gmafjp32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2180 -
C:\Windows\SysWOW64\Goccbhae.exeC:\Windows\system32\Goccbhae.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:4176 -
C:\Windows\SysWOW64\Gfjkce32.exeC:\Windows\system32\Gfjkce32.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2648 -
C:\Windows\SysWOW64\Gihgoq32.exeC:\Windows\system32\Gihgoq32.exe85⤵PID:3216
-
C:\Windows\SysWOW64\Glgckl32.exeC:\Windows\system32\Glgckl32.exe86⤵
- Modifies registry class
PID:2412 -
C:\Windows\SysWOW64\Goepgg32.exeC:\Windows\system32\Goepgg32.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:848 -
C:\Windows\SysWOW64\Geohdago.exeC:\Windows\system32\Geohdago.exe88⤵
- Drops file in System32 directory
PID:1316 -
C:\Windows\SysWOW64\Gikdep32.exeC:\Windows\system32\Gikdep32.exe89⤵PID:3436
-
C:\Windows\SysWOW64\Hbchnfei.exeC:\Windows\system32\Hbchnfei.exe90⤵PID:3628
-
C:\Windows\SysWOW64\Hmhmko32.exeC:\Windows\system32\Hmhmko32.exe91⤵
- Drops file in System32 directory
PID:5488 -
C:\Windows\SysWOW64\Hpgigj32.exeC:\Windows\system32\Hpgigj32.exe92⤵PID:3936
-
C:\Windows\SysWOW64\Hfaaddlo.exeC:\Windows\system32\Hfaaddlo.exe93⤵PID:388
-
C:\Windows\SysWOW64\Hiomppkc.exeC:\Windows\system32\Hiomppkc.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3984 -
C:\Windows\SysWOW64\Hpiemj32.exeC:\Windows\system32\Hpiemj32.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2904 -
C:\Windows\SysWOW64\Hfcnicjl.exeC:\Windows\system32\Hfcnicjl.exe96⤵PID:4288
-
C:\Windows\SysWOW64\Hmmffnai.exeC:\Windows\system32\Hmmffnai.exe97⤵
- Drops file in System32 directory
PID:5092 -
C:\Windows\SysWOW64\Dafpjf32.exeC:\Windows\system32\Dafpjf32.exe98⤵
- Drops file in System32 directory
PID:2888 -
C:\Windows\SysWOW64\Njpjap32.exeC:\Windows\system32\Njpjap32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5728 -
C:\Windows\SysWOW64\Njgqaohd.exeC:\Windows\system32\Njgqaohd.exe100⤵PID:1664
-
C:\Windows\SysWOW64\Nmfmnjgh.exeC:\Windows\system32\Nmfmnjgh.exe101⤵PID:3924
-
C:\Windows\SysWOW64\Ncpejd32.exeC:\Windows\system32\Ncpejd32.exe102⤵
- Modifies registry class
PID:5772 -
C:\Windows\SysWOW64\Oilmckml.exeC:\Windows\system32\Oilmckml.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5780 -
C:\Windows\SysWOW64\Omhicj32.exeC:\Windows\system32\Omhicj32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:456 -
C:\Windows\SysWOW64\Ofqnlplf.exeC:\Windows\system32\Ofqnlplf.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5816 -
C:\Windows\SysWOW64\Oqfbihll.exeC:\Windows\system32\Oqfbihll.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4196 -
C:\Windows\SysWOW64\Obgoaq32.exeC:\Windows\system32\Obgoaq32.exe107⤵
- Drops file in System32 directory
- Modifies registry class
PID:3272 -
C:\Windows\SysWOW64\Ojnfbnbl.exeC:\Windows\system32\Ojnfbnbl.exe108⤵PID:5068
-
C:\Windows\SysWOW64\Ookokeqd.exeC:\Windows\system32\Ookokeqd.exe109⤵
- Modifies registry class
PID:4844 -
C:\Windows\SysWOW64\Obikgppg.exeC:\Windows\system32\Obikgppg.exe110⤵
- Modifies registry class
PID:4516 -
C:\Windows\SysWOW64\Oicccj32.exeC:\Windows\system32\Oicccj32.exe111⤵PID:3052
-
C:\Windows\SysWOW64\Omopdion.exeC:\Windows\system32\Omopdion.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2548 -
C:\Windows\SysWOW64\Oblhlpne.exeC:\Windows\system32\Oblhlpne.exe113⤵PID:3452
-
C:\Windows\SysWOW64\Ojcpmm32.exeC:\Windows\system32\Ojcpmm32.exe114⤵
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Pjjfnlho.exeC:\Windows\system32\Pjjfnlho.exe115⤵PID:3360
-
C:\Windows\SysWOW64\Hchqlqpj.exeC:\Windows\system32\Hchqlqpj.exe116⤵
- Drops file in System32 directory
- Modifies registry class
PID:564 -
C:\Windows\SysWOW64\Bmfqhmid.exeC:\Windows\system32\Bmfqhmid.exe117⤵PID:5512
-
C:\Windows\SysWOW64\Lfjjlj32.exeC:\Windows\system32\Lfjjlj32.exe118⤵
- Modifies registry class
PID:936 -
C:\Windows\SysWOW64\Oilekqhg.exeC:\Windows\system32\Oilekqhg.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5596 -
C:\Windows\SysWOW64\Ajcdbm32.exeC:\Windows\system32\Ajcdbm32.exe120⤵
- Drops file in System32 directory
PID:5276 -
C:\Windows\SysWOW64\Aqfoefco.exeC:\Windows\system32\Aqfoefco.exe121⤵PID:5412
-
C:\Windows\SysWOW64\Fecfkn32.exeC:\Windows\system32\Fecfkn32.exe122⤵
- Drops file in System32 directory
- Modifies registry class
PID:5884
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-