Analysis
-
max time kernel
170s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2023 09:42
Behavioral task
behavioral1
Sample
NEAS.86a824fe3ec004a40c160cee0ec727d0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.86a824fe3ec004a40c160cee0ec727d0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.86a824fe3ec004a40c160cee0ec727d0.exe
-
Size
243KB
-
MD5
86a824fe3ec004a40c160cee0ec727d0
-
SHA1
a2d8239cf8f2b3685b1175863bc2dd070586c41f
-
SHA256
ccfd44812eb418244068be4cd3e461bb089851d8b20910c61f9b686222c17c2f
-
SHA512
af879ff94e7002a765825f96a292005120158286845cc8b6dbbd3186c660217a736aee31d795d7869205887e8358e44e32706fbbe13aaf9c08ae20eb820ddc66
-
SSDEEP
6144:AwC8r/UJxg/SrxzUNaDJvZUvxrQBZg3kFz2so48J:n7UJxlhUNaVvZhBZvz2V48J
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkdjaf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Laofhbmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oagpne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ckbnlfeb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Poaqocgl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Keinepch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqcjqcnp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmokgnol.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fchlhnlo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cclhbcho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pjffkhpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Edknjonl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gnjhbfmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ilhkcmib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Didnmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Fadoii32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egjobl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Gdbkcf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edoegi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Iocliecb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ekljic32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hddien32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhbfpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Nelmik32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pakleh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilhcmpeg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edhado32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jbpihlbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Llofnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Qdmkbmnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Igkadlcd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmcldhfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Pegqmbch.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flgfqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Edklljnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ekgqnccj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ogqaqigd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Aokkknbl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jnpjegpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jaiflm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgdklb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Jglkfmmi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oldjlm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmnhgdjo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjfdpa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imdgjlgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Bifkloeq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epcbldne.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdicdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Hepgedme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ecdkno32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dildibfd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkqpcnig.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmndkd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joekkl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfgboc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ejlmppha.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jnkajg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggmcplgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ijekidpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Coepob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Ecoahmhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" Cdicdi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckbnlfeb.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/3952-0-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cc6-6.dat family_berbew behavioral2/files/0x0006000000022cc6-8.dat family_berbew behavioral2/memory/1164-7-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0007000000022cc1-14.dat family_berbew behavioral2/files/0x0007000000022cc1-16.dat family_berbew behavioral2/memory/4696-15-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0008000000022cc5-22.dat family_berbew behavioral2/memory/2756-24-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0008000000022cc5-23.dat family_berbew behavioral2/files/0x0008000000022cca-30.dat family_berbew behavioral2/memory/1044-32-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0008000000022cca-31.dat family_berbew behavioral2/files/0x0006000000022ccc-38.dat family_berbew behavioral2/memory/3112-40-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022ccc-39.dat family_berbew behavioral2/files/0x0006000000022ccf-46.dat family_berbew behavioral2/files/0x0006000000022ccf-48.dat family_berbew behavioral2/memory/3460-47-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cd1-49.dat family_berbew behavioral2/files/0x0006000000022cd1-55.dat family_berbew behavioral2/memory/3836-56-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cd1-54.dat family_berbew behavioral2/files/0x0006000000022cd3-62.dat family_berbew behavioral2/files/0x0006000000022cd3-64.dat family_berbew behavioral2/memory/824-63-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0007000000022cd6-70.dat family_berbew behavioral2/memory/3224-71-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0007000000022cd6-72.dat family_berbew behavioral2/files/0x0006000000022cd8-79.dat family_berbew behavioral2/memory/5004-80-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cd8-78.dat family_berbew behavioral2/files/0x0006000000022cdb-87.dat family_berbew behavioral2/memory/3832-88-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cdb-86.dat family_berbew behavioral2/files/0x0006000000022cdf-96.dat family_berbew behavioral2/files/0x0006000000022ce8-97.dat family_berbew behavioral2/memory/1796-103-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022ce8-102.dat family_berbew behavioral2/files/0x0006000000022ce8-104.dat family_berbew behavioral2/memory/576-95-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cdf-94.dat family_berbew behavioral2/memory/4448-112-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cea-111.dat family_berbew behavioral2/files/0x0007000000022ce1-113.dat family_berbew behavioral2/files/0x0006000000022cea-110.dat family_berbew behavioral2/memory/444-120-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0007000000022ce1-119.dat family_berbew behavioral2/files/0x0007000000022ce1-118.dat family_berbew behavioral2/files/0x0007000000022ce3-126.dat family_berbew behavioral2/memory/4104-128-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cec-129.dat family_berbew behavioral2/files/0x0007000000022ce3-127.dat family_berbew behavioral2/files/0x0006000000022cec-134.dat family_berbew behavioral2/memory/1292-136-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cec-135.dat family_berbew behavioral2/memory/772-144-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cee-143.dat family_berbew behavioral2/files/0x0006000000022cee-142.dat family_berbew behavioral2/memory/3800-152-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cf0-151.dat family_berbew behavioral2/files/0x0006000000022cf0-150.dat family_berbew behavioral2/memory/1972-160-0x0000000000400000-0x0000000000445000-memory.dmp family_berbew behavioral2/files/0x0006000000022cf2-159.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 1164 Ehkcgkdj.exe 4696 Hpcmfchg.exe 2756 Iqmplbpl.exe 1044 Igieoleg.exe 3112 Igkadlcd.exe 3460 Kidmcqeg.exe 3836 Lcnkli32.exe 824 Mpnngh32.exe 3224 Nalgbi32.exe 5004 Opmcod32.exe 3832 Pacfjfej.exe 576 Aglnnkid.exe 1796 Bnoiqd32.exe 4448 Fbiooolb.exe 444 Cbdhgaid.exe 4104 Ifhibhfc.exe 1292 Ifcpgiji.exe 772 Immhdc32.exe 3800 Icgqqmib.exe 1972 Conhost.exe 5088 Haafnf32.exe 3812 Ikcmmjkb.exe 4004 Mnochl32.exe 3148 Ikejbjip.exe 3996 Jfbdpabn.exe 1544 Nkqpcnig.exe 3012 Jmepcj32.exe 2344 Kbbhka32.exe 1848 Kblkap32.exe 4792 Kifcnjpi.exe 3068 Lckglc32.exe 2924 Lmcldhfp.exe 4580 Liofdigo.exe 1348 Lbgjmnno.exe 3912 Mppdbb32.exe 2096 Mikepg32.exe 1460 Nfabok32.exe 4652 Oiphbd32.exe 1432 Gdqgfbop.exe 2008 Pilgnb32.exe 3632 Hckjjh32.exe 3456 Anccjp32.exe 1080 Bjhpqn32.exe 1744 Bqahmhpi.exe 4600 Cgbfka32.exe 2832 Ddkpoelb.exe 1888 Ddnmeejo.exe 2784 Debfpd32.exe 4672 Djoohk32.exe 2200 Dkokbn32.exe 496 Imdgjlgb.exe 500 Emgnje32.exe 2368 Fmndkd32.exe 1944 Fchlhnlo.exe 3776 Fjbddh32.exe 3568 Flaaok32.exe 4160 Fanigb32.exe 3128 Fjfnphpf.exe 3556 Galfhpmf.exe 2824 Gkdjaf32.exe 2336 Hejono32.exe 1428 Kfanen32.exe 988 Hdokok32.exe 3024 Hkiclepa.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Folkjnbc.exe Ifhibhfc.exe File opened for modification C:\Windows\SysWOW64\Coepob32.exe Chkhbh32.exe File created C:\Windows\SysWOW64\Iohede32.exe Igmqpbab.exe File created C:\Windows\SysWOW64\Ncideknq.dll Cgdefhok.exe File created C:\Windows\SysWOW64\Ekoeadll.dll Lkfeeo32.exe File created C:\Windows\SysWOW64\Mlmgjf32.dll Egbdekcg.exe File created C:\Windows\SysWOW64\Diahic32.dll Fchlhnlo.exe File created C:\Windows\SysWOW64\Ndgpii32.dll Pjalpida.exe File created C:\Windows\SysWOW64\Caijca32.exe Cgdefhok.exe File opened for modification C:\Windows\SysWOW64\Pegqmbch.exe Pjalpida.exe File opened for modification C:\Windows\SysWOW64\Pgjfdm32.exe Papnhbgi.exe File created C:\Windows\SysWOW64\Magnbnea.exe Mhjpnibf.exe File opened for modification C:\Windows\SysWOW64\Ecefjckj.exe Dldlbgbb.exe File created C:\Windows\SysWOW64\Plfidakg.dll Ljpajbmo.exe File opened for modification C:\Windows\SysWOW64\Bmbngd32.exe Bfhfjjii.exe File created C:\Windows\SysWOW64\Pgdqpp32.dll Dldpde32.exe File created C:\Windows\SysWOW64\Mbjofoen.dll Lmkbpk32.exe File created C:\Windows\SysWOW64\Neiiiecg.exe Njdeklca.exe File opened for modification C:\Windows\SysWOW64\Fnffam32.exe Fglndbmn.exe File created C:\Windows\SysWOW64\Gklcpqab.exe Gdbkcf32.exe File created C:\Windows\SysWOW64\Imbaobmp.exe Ifhibhfc.exe File opened for modification C:\Windows\SysWOW64\Donceaac.exe Cefolk32.exe File created C:\Windows\SysWOW64\Oefpfpma.dll Jigdoglm.exe File opened for modification C:\Windows\SysWOW64\Imdlgm32.exe Iocliecb.exe File created C:\Windows\SysWOW64\Mfjddb32.dll Hjimaole.exe File opened for modification C:\Windows\SysWOW64\Ljpajbmo.exe Lojmmi32.exe File opened for modification C:\Windows\SysWOW64\Elcmqfja.exe Eeiddl32.exe File created C:\Windows\SysWOW64\Cmpine32.dll Khondelh.exe File created C:\Windows\SysWOW64\Fpbojb32.dll Fneohd32.exe File created C:\Windows\SysWOW64\Gdppllld.exe Ghiogkfp.exe File created C:\Windows\SysWOW64\Gkbnbjlb.dll Hojndd32.exe File opened for modification C:\Windows\SysWOW64\Magnbnea.exe Mhjpnibf.exe File opened for modification C:\Windows\SysWOW64\Pnmojp32.exe Pnkbdqpo.exe File opened for modification C:\Windows\SysWOW64\Fdfkhh32.exe Ejagkodl.exe File created C:\Windows\SysWOW64\Jiciqh32.dll Mnochl32.exe File created C:\Windows\SysWOW64\Jiglgl32.exe Jcmdkbok.exe File opened for modification C:\Windows\SysWOW64\Nombnc32.exe Mggolhaj.exe File created C:\Windows\SysWOW64\Oibdhd32.exe Oiphbd32.exe File created C:\Windows\SysWOW64\Ipfkga32.dll Eedkniob.exe File opened for modification C:\Windows\SysWOW64\Hdgfmk32.exe Hojndd32.exe File created C:\Windows\SysWOW64\Bifkloeq.exe Bmokgnol.exe File opened for modification C:\Windows\SysWOW64\Cbofdg32.exe Apndloif.exe File created C:\Windows\SysWOW64\Pgjfdm32.exe Papnhbgi.exe File created C:\Windows\SysWOW64\Eolhlh32.exe Eahhcd32.exe File created C:\Windows\SysWOW64\Fhbolp32.dll Emenhcdf.exe File created C:\Windows\SysWOW64\Lechlj32.dll Lhnhkpgo.exe File opened for modification C:\Windows\SysWOW64\Epcbldne.exe Egknco32.exe File created C:\Windows\SysWOW64\Knjqkggm.dll Ognpoheh.exe File created C:\Windows\SysWOW64\Hkichcjh.dll Bgimepmd.exe File created C:\Windows\SysWOW64\Akfhnjnb.dll Bqahmhpi.exe File opened for modification C:\Windows\SysWOW64\Fchlhnlo.exe Fmndkd32.exe File created C:\Windows\SysWOW64\Icneeq32.dll Neiiiecg.exe File created C:\Windows\SysWOW64\Alpboida.exe Ahbjij32.exe File opened for modification C:\Windows\SysWOW64\Bapgmb32.exe Bfkbpjgf.exe File created C:\Windows\SysWOW64\Dfongpab.exe Dmfjok32.exe File created C:\Windows\SysWOW64\Gmdaen32.dll Iclcljhi.exe File created C:\Windows\SysWOW64\Aaiemjgf.dll Mggolhaj.exe File created C:\Windows\SysWOW64\Jnklnfpq.exe Jglkfmmi.exe File created C:\Windows\SysWOW64\Oldjlm32.exe Omcjne32.exe File opened for modification C:\Windows\SysWOW64\Npnjcm32.exe Lqcjqcnp.exe File opened for modification C:\Windows\SysWOW64\Ilfomm32.exe Iapjpd32.exe File created C:\Windows\SysWOW64\Mhjpnibf.exe Llofnh32.exe File created C:\Windows\SysWOW64\Kihlfpeb.dll Hnckhddo.exe File created C:\Windows\SysWOW64\Iekpfmpl.exe Ijekidpf.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dqdkbgch.dll" Eahhcd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ogqaqigd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ganlnmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gjgipldf.dll" Bfhfjjii.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kdgkjknl.dll" Heeppd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ggmcplgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Honipd32.dll" Pfagcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kbpdggme.dll" Emgnje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfkmhe32.dll" Mbchkg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gmfpeoga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhcpedal.dll" Calfiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qdgmelna.dll" Fpckcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cbdhgaid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qhdilc32.dll" Behbkmgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dalhcnfl.dll" Alpboida.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nppfnige.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anlkidnm.dll" Jgmapcqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ljpajbmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ckbnlfeb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cbdhgaid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mogdhape.dll" Lckglc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Lmcldhfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Lmcldhfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Behbkmgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jfeoip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Pacfjfej.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ohahkojp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gdafgefe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Cdicdi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ilpfgg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 BackgroundTransferHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Hjimaole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fddqpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Cefolk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fneohd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Kjadlp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jnklnfpq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Ladpnepb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Dildibfd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jgeknfdb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ehimkd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Pdkolm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Afclpk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Dcbllh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Gfgjlh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Mikepg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Didnmp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Llofnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jeaancpc.dll" Gdbkcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idfilp32.dll" Helfbqeb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Blieeglf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Bmeagjbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Mjggka32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Ekljic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Jelogq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ggkdhb32.dll" Jjfdpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Oiphbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Fanigb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aomgmanl.dll" Dhkaif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Loeebgbi.dll" Eolhlh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Nqklfe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmilgkgn.dll" Imdlgm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" Jjfdpa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 Igkadlcd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3952 wrote to memory of 1164 3952 NEAS.86a824fe3ec004a40c160cee0ec727d0.exe 92 PID 3952 wrote to memory of 1164 3952 NEAS.86a824fe3ec004a40c160cee0ec727d0.exe 92 PID 3952 wrote to memory of 1164 3952 NEAS.86a824fe3ec004a40c160cee0ec727d0.exe 92 PID 1164 wrote to memory of 4696 1164 Ehkcgkdj.exe 94 PID 1164 wrote to memory of 4696 1164 Ehkcgkdj.exe 94 PID 1164 wrote to memory of 4696 1164 Ehkcgkdj.exe 94 PID 4696 wrote to memory of 2756 4696 Hpcmfchg.exe 95 PID 4696 wrote to memory of 2756 4696 Hpcmfchg.exe 95 PID 4696 wrote to memory of 2756 4696 Hpcmfchg.exe 95 PID 2756 wrote to memory of 1044 2756 Iqmplbpl.exe 97 PID 2756 wrote to memory of 1044 2756 Iqmplbpl.exe 97 PID 2756 wrote to memory of 1044 2756 Iqmplbpl.exe 97 PID 1044 wrote to memory of 3112 1044 Igieoleg.exe 98 PID 1044 wrote to memory of 3112 1044 Igieoleg.exe 98 PID 1044 wrote to memory of 3112 1044 Igieoleg.exe 98 PID 3112 wrote to memory of 3460 3112 Igkadlcd.exe 99 PID 3112 wrote to memory of 3460 3112 Igkadlcd.exe 99 PID 3112 wrote to memory of 3460 3112 Igkadlcd.exe 99 PID 3460 wrote to memory of 3836 3460 Kidmcqeg.exe 100 PID 3460 wrote to memory of 3836 3460 Kidmcqeg.exe 100 PID 3460 wrote to memory of 3836 3460 Kidmcqeg.exe 100 PID 3836 wrote to memory of 824 3836 Lcnkli32.exe 101 PID 3836 wrote to memory of 824 3836 Lcnkli32.exe 101 PID 3836 wrote to memory of 824 3836 Lcnkli32.exe 101 PID 824 wrote to memory of 3224 824 Mpnngh32.exe 102 PID 824 wrote to memory of 3224 824 Mpnngh32.exe 102 PID 824 wrote to memory of 3224 824 Mpnngh32.exe 102 PID 3224 wrote to memory of 5004 3224 Nalgbi32.exe 103 PID 3224 wrote to memory of 5004 3224 Nalgbi32.exe 103 PID 3224 wrote to memory of 5004 3224 Nalgbi32.exe 103 PID 5004 wrote to memory of 3832 5004 Opmcod32.exe 104 PID 5004 wrote to memory of 3832 5004 Opmcod32.exe 104 PID 5004 wrote to memory of 3832 5004 Opmcod32.exe 104 PID 3832 wrote to memory of 576 3832 Pacfjfej.exe 106 PID 3832 wrote to memory of 576 3832 Pacfjfej.exe 106 PID 3832 wrote to memory of 576 3832 Pacfjfej.exe 106 PID 576 wrote to memory of 1796 576 Aglnnkid.exe 105 PID 576 wrote to memory of 1796 576 Aglnnkid.exe 105 PID 576 wrote to memory of 1796 576 Aglnnkid.exe 105 PID 1796 wrote to memory of 4448 1796 Bnoiqd32.exe 236 PID 1796 wrote to memory of 4448 1796 Bnoiqd32.exe 236 PID 1796 wrote to memory of 4448 1796 Bnoiqd32.exe 236 PID 4448 wrote to memory of 444 4448 Fbiooolb.exe 108 PID 4448 wrote to memory of 444 4448 Fbiooolb.exe 108 PID 4448 wrote to memory of 444 4448 Fbiooolb.exe 108 PID 444 wrote to memory of 4104 444 Cbdhgaid.exe 245 PID 444 wrote to memory of 4104 444 Cbdhgaid.exe 245 PID 444 wrote to memory of 4104 444 Cbdhgaid.exe 245 PID 4104 wrote to memory of 1292 4104 Ifhibhfc.exe 243 PID 4104 wrote to memory of 1292 4104 Ifhibhfc.exe 243 PID 4104 wrote to memory of 1292 4104 Ifhibhfc.exe 243 PID 1292 wrote to memory of 772 1292 Ifcpgiji.exe 242 PID 1292 wrote to memory of 772 1292 Ifcpgiji.exe 242 PID 1292 wrote to memory of 772 1292 Ifcpgiji.exe 242 PID 772 wrote to memory of 3800 772 Immhdc32.exe 244 PID 772 wrote to memory of 3800 772 Immhdc32.exe 244 PID 772 wrote to memory of 3800 772 Immhdc32.exe 244 PID 3800 wrote to memory of 1972 3800 Icgqqmib.exe 248 PID 3800 wrote to memory of 1972 3800 Icgqqmib.exe 248 PID 3800 wrote to memory of 1972 3800 Icgqqmib.exe 248 PID 1972 wrote to memory of 5088 1972 Conhost.exe 117 PID 1972 wrote to memory of 5088 1972 Conhost.exe 117 PID 1972 wrote to memory of 5088 1972 Conhost.exe 117 PID 5088 wrote to memory of 3812 5088 Haafnf32.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.86a824fe3ec004a40c160cee0ec727d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.86a824fe3ec004a40c160cee0ec727d0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\Ehkcgkdj.exeC:\Windows\system32\Ehkcgkdj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\Hpcmfchg.exeC:\Windows\system32\Hpcmfchg.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\Iqmplbpl.exeC:\Windows\system32\Iqmplbpl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\Igieoleg.exeC:\Windows\system32\Igieoleg.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\Igkadlcd.exeC:\Windows\system32\Igkadlcd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\Kidmcqeg.exeC:\Windows\system32\Kidmcqeg.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\Lcnkli32.exeC:\Windows\system32\Lcnkli32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\Mpnngh32.exeC:\Windows\system32\Mpnngh32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\Nalgbi32.exeC:\Windows\system32\Nalgbi32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\Opmcod32.exeC:\Windows\system32\Opmcod32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\Pacfjfej.exeC:\Windows\system32\Pacfjfej.exe12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\Aglnnkid.exeC:\Windows\system32\Aglnnkid.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:576
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Bnoiqd32.exeC:\Windows\system32\Bnoiqd32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\Bqpbboeg.exeC:\Windows\system32\Bqpbboeg.exe2⤵PID:4448
-
C:\Windows\SysWOW64\Cbdhgaid.exeC:\Windows\system32\Cbdhgaid.exe3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\Enpknplq.exeC:\Windows\system32\Enpknplq.exe4⤵PID:4104
-
-
-
-
C:\Windows\SysWOW64\Folkjnbc.exeC:\Windows\system32\Folkjnbc.exe1⤵PID:1292
-
C:\Windows\SysWOW64\Fehplggn.exeC:\Windows\system32\Fehplggn.exe2⤵PID:772
-
C:\Windows\SysWOW64\Fifhbf32.exeC:\Windows\system32\Fifhbf32.exe3⤵PID:3800
-
C:\Windows\SysWOW64\Gbecljnl.exeC:\Windows\system32\Gbecljnl.exe4⤵PID:1972
-
C:\Windows\SysWOW64\Haafnf32.exeC:\Windows\system32\Haafnf32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088
-
-
-
-
-
C:\Windows\SysWOW64\Immhdc32.exeC:\Windows\system32\Immhdc32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\Icgqqmib.exeC:\Windows\system32\Icgqqmib.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\Ifhibhfc.exeC:\Windows\system32\Ifhibhfc.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\Imbaobmp.exeC:\Windows\system32\Imbaobmp.exe5⤵PID:1844
-
C:\Windows\SysWOW64\Idljll32.exeC:\Windows\system32\Idljll32.exe6⤵PID:3332
-
C:\Windows\SysWOW64\Jfopcgpk.exeC:\Windows\system32\Jfopcgpk.exe7⤵PID:1512
-
C:\Windows\SysWOW64\Lkpnec32.exeC:\Windows\system32\Lkpnec32.exe8⤵PID:2296
-
C:\Windows\SysWOW64\Lngmhm32.exeC:\Windows\system32\Lngmhm32.exe9⤵PID:232
-
C:\Windows\SysWOW64\Mpkbohhd.exeC:\Windows\system32\Mpkbohhd.exe10⤵PID:2452
-
C:\Windows\SysWOW64\Mgdklb32.exeC:\Windows\system32\Mgdklb32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4668 -
C:\Windows\SysWOW64\Mnochl32.exeC:\Windows\system32\Mnochl32.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4004 -
C:\Windows\SysWOW64\Mcklac32.exeC:\Windows\system32\Mcklac32.exe13⤵PID:648
-
C:\Windows\SysWOW64\Mjednmla.exeC:\Windows\system32\Mjednmla.exe14⤵PID:2016
-
C:\Windows\SysWOW64\Nddkaddm.exeC:\Windows\system32\Nddkaddm.exe15⤵PID:3248
-
C:\Windows\SysWOW64\Nqklfe32.exeC:\Windows\system32\Nqklfe32.exe16⤵
- Modifies registry class
PID:4844 -
C:\Windows\SysWOW64\Nkqpcnig.exeC:\Windows\system32\Nkqpcnig.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\Ojfmdk32.exeC:\Windows\system32\Ojfmdk32.exe18⤵PID:4884
-
C:\Windows\SysWOW64\Oqpeaeel.exeC:\Windows\system32\Oqpeaeel.exe19⤵PID:3916
-
C:\Windows\SysWOW64\Ojhijjll.exeC:\Windows\system32\Ojhijjll.exe20⤵PID:4940
-
C:\Windows\SysWOW64\Ogljcokf.exeC:\Windows\system32\Ogljcokf.exe21⤵PID:6156
-
C:\Windows\SysWOW64\Obanqgkl.exeC:\Windows\system32\Obanqgkl.exe22⤵PID:6196
-
C:\Windows\SysWOW64\Pjalpida.exeC:\Windows\system32\Pjalpida.exe23⤵
- Drops file in System32 directory
PID:6236 -
C:\Windows\SysWOW64\Pegqmbch.exeC:\Windows\system32\Pegqmbch.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6272 -
C:\Windows\SysWOW64\Pjdifibo.exeC:\Windows\system32\Pjdifibo.exe25⤵PID:6320
-
C:\Windows\SysWOW64\Peimcaae.exeC:\Windows\system32\Peimcaae.exe26⤵PID:6360
-
C:\Windows\SysWOW64\Pjffkhpl.exeC:\Windows\system32\Pjffkhpl.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6396 -
C:\Windows\SysWOW64\Papnhbgi.exeC:\Windows\system32\Papnhbgi.exe28⤵
- Drops file in System32 directory
PID:6444 -
C:\Windows\SysWOW64\Pgjfdm32.exeC:\Windows\system32\Pgjfdm32.exe29⤵PID:6484
-
C:\Windows\SysWOW64\Pabknbef.exeC:\Windows\system32\Pabknbef.exe30⤵PID:6532
-
C:\Windows\SysWOW64\Pkhokkel.exeC:\Windows\system32\Pkhokkel.exe31⤵PID:6604
-
C:\Windows\SysWOW64\Achmjmnb.exeC:\Windows\system32\Achmjmnb.exe32⤵PID:6644
-
C:\Windows\SysWOW64\Beqljn32.exeC:\Windows\system32\Beqljn32.exe33⤵PID:6684
-
C:\Windows\SysWOW64\Bniacddk.exeC:\Windows\system32\Bniacddk.exe34⤵PID:6736
-
C:\Windows\SysWOW64\Bhdbaihi.exeC:\Windows\system32\Bhdbaihi.exe35⤵PID:6772
-
C:\Windows\SysWOW64\Bonjnc32.exeC:\Windows\system32\Bonjnc32.exe36⤵PID:6820
-
C:\Windows\SysWOW64\Behbkmgb.exeC:\Windows\system32\Behbkmgb.exe37⤵
- Modifies registry class
PID:6876 -
C:\Windows\SysWOW64\Ckghid32.exeC:\Windows\system32\Ckghid32.exe38⤵PID:6916
-
C:\Windows\SysWOW64\Chkhbh32.exeC:\Windows\system32\Chkhbh32.exe39⤵
- Drops file in System32 directory
PID:6960 -
C:\Windows\SysWOW64\Coepob32.exeC:\Windows\system32\Coepob32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ijdnka32.exeC:\Windows\system32\Ijdnka32.exe1⤵PID:4004
-
C:\Windows\SysWOW64\Ikejbjip.exeC:\Windows\system32\Ikejbjip.exe2⤵
- Executes dropped EXE
PID:3148 -
C:\Windows\SysWOW64\Jfbdpabn.exeC:\Windows\system32\Jfbdpabn.exe3⤵
- Executes dropped EXE
PID:3996 -
C:\Windows\SysWOW64\Jlafhkfe.exeC:\Windows\system32\Jlafhkfe.exe4⤵PID:1544
-
C:\Windows\SysWOW64\Jmepcj32.exeC:\Windows\system32\Jmepcj32.exe5⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\Kbbhka32.exeC:\Windows\system32\Kbbhka32.exe6⤵
- Executes dropped EXE
PID:2344
-
-
-
-
-
-
C:\Windows\SysWOW64\Ikcmmjkb.exeC:\Windows\system32\Ikcmmjkb.exe1⤵
- Executes dropped EXE
PID:3812
-
C:\Windows\SysWOW64\Lckglc32.exeC:\Windows\system32\Lckglc32.exe1⤵
- Executes dropped EXE
- Modifies registry class
PID:3068 -
C:\Windows\SysWOW64\Lmcldhfp.exeC:\Windows\system32\Lmcldhfp.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2924 -
C:\Windows\SysWOW64\Liofdigo.exeC:\Windows\system32\Liofdigo.exe3⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\SysWOW64\Lbgjmnno.exeC:\Windows\system32\Lbgjmnno.exe4⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\SysWOW64\Mppdbb32.exeC:\Windows\system32\Mppdbb32.exe5⤵
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\Mikepg32.exeC:\Windows\system32\Mikepg32.exe6⤵
- Executes dropped EXE
- Modifies registry class
PID:2096 -
C:\Windows\SysWOW64\Nfabok32.exeC:\Windows\system32\Nfabok32.exe7⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\SysWOW64\Oiphbd32.exeC:\Windows\system32\Oiphbd32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4652 -
C:\Windows\SysWOW64\Oibdhd32.exeC:\Windows\system32\Oibdhd32.exe9⤵PID:1432
-
C:\Windows\SysWOW64\Pilgnb32.exeC:\Windows\system32\Pilgnb32.exe10⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\Ppepkmhi.exeC:\Windows\system32\Ppepkmhi.exe11⤵PID:3632
-
C:\Windows\SysWOW64\Anccjp32.exeC:\Windows\system32\Anccjp32.exe12⤵
- Executes dropped EXE
PID:3456 -
C:\Windows\SysWOW64\Bjhpqn32.exeC:\Windows\system32\Bjhpqn32.exe13⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\Bqahmhpi.exeC:\Windows\system32\Bqahmhpi.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1744 -
C:\Windows\SysWOW64\Cgbfka32.exeC:\Windows\system32\Cgbfka32.exe15⤵
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\Ddkpoelb.exeC:\Windows\system32\Ddkpoelb.exe16⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\SysWOW64\Ddnmeejo.exeC:\Windows\system32\Ddnmeejo.exe17⤵
- Executes dropped EXE
PID:1888 -
C:\Windows\SysWOW64\Debfpd32.exeC:\Windows\system32\Debfpd32.exe18⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\Djoohk32.exeC:\Windows\system32\Djoohk32.exe19⤵
- Executes dropped EXE
PID:4672 -
C:\Windows\SysWOW64\Dkokbn32.exeC:\Windows\system32\Dkokbn32.exe20⤵
- Executes dropped EXE
PID:2200 -
C:\Windows\SysWOW64\Ekahhn32.exeC:\Windows\system32\Ekahhn32.exe21⤵PID:496
-
C:\Windows\SysWOW64\Emgnje32.exeC:\Windows\system32\Emgnje32.exe22⤵
- Executes dropped EXE
- Modifies registry class
PID:500 -
C:\Windows\SysWOW64\Fmndkd32.exeC:\Windows\system32\Fmndkd32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2368
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kifcnjpi.exeC:\Windows\system32\Kifcnjpi.exe1⤵
- Executes dropped EXE
PID:4792
-
C:\Windows\SysWOW64\Kblkap32.exeC:\Windows\system32\Kblkap32.exe1⤵
- Executes dropped EXE
PID:1848
-
C:\Windows\SysWOW64\Fchlhnlo.exeC:\Windows\system32\Fchlhnlo.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\Fjbddh32.exeC:\Windows\system32\Fjbddh32.exe2⤵
- Executes dropped EXE
PID:3776 -
C:\Windows\SysWOW64\Flaaok32.exeC:\Windows\system32\Flaaok32.exe3⤵
- Executes dropped EXE
PID:3568 -
C:\Windows\SysWOW64\Fanigb32.exeC:\Windows\system32\Fanigb32.exe4⤵
- Executes dropped EXE
- Modifies registry class
PID:4160 -
C:\Windows\SysWOW64\Fjfnphpf.exeC:\Windows\system32\Fjfnphpf.exe5⤵
- Executes dropped EXE
PID:3128 -
C:\Windows\SysWOW64\Galfhpmf.exeC:\Windows\system32\Galfhpmf.exe6⤵
- Executes dropped EXE
PID:3556 -
C:\Windows\SysWOW64\Gkdjaf32.exeC:\Windows\system32\Gkdjaf32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2824
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Hejono32.exeC:\Windows\system32\Hejono32.exe1⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\Hobcgdjm.exeC:\Windows\system32\Hobcgdjm.exe2⤵PID:1428
-
C:\Windows\SysWOW64\Hdokok32.exeC:\Windows\system32\Hdokok32.exe3⤵
- Executes dropped EXE
PID:988 -
C:\Windows\SysWOW64\Hkiclepa.exeC:\Windows\system32\Hkiclepa.exe4⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\Hlipfh32.exeC:\Windows\system32\Hlipfh32.exe5⤵PID:692
-
C:\Windows\SysWOW64\Haeino32.exeC:\Windows\system32\Haeino32.exe6⤵PID:2796
-
C:\Windows\SysWOW64\Hoiihcde.exeC:\Windows\system32\Hoiihcde.exe7⤵PID:3956
-
C:\Windows\SysWOW64\Hdfapjbl.exeC:\Windows\system32\Hdfapjbl.exe8⤵PID:652
-
C:\Windows\SysWOW64\Iolfmcbb.exeC:\Windows\system32\Iolfmcbb.exe9⤵PID:1960
-
C:\Windows\SysWOW64\Ilpfgg32.exeC:\Windows\system32\Ilpfgg32.exe10⤵
- Modifies registry class
PID:5132 -
C:\Windows\SysWOW64\Ihfglhfp.exeC:\Windows\system32\Ihfglhfp.exe11⤵PID:5172
-
C:\Windows\SysWOW64\Jkeloa32.exeC:\Windows\system32\Jkeloa32.exe12⤵PID:5216
-
C:\Windows\SysWOW64\Kleiid32.exeC:\Windows\system32\Kleiid32.exe13⤵PID:5256
-
C:\Windows\SysWOW64\Khnfce32.exeC:\Windows\system32\Khnfce32.exe14⤵PID:5296
-
C:\Windows\SysWOW64\Kohnpoib.exeC:\Windows\system32\Kohnpoib.exe15⤵PID:5364
-
C:\Windows\SysWOW64\Khbpndnp.exeC:\Windows\system32\Khbpndnp.exe16⤵PID:5404
-
C:\Windows\SysWOW64\Lfimmhkg.exeC:\Windows\system32\Lfimmhkg.exe17⤵PID:5440
-
C:\Windows\SysWOW64\Lkfeeo32.exeC:\Windows\system32\Lkfeeo32.exe18⤵
- Drops file in System32 directory
PID:5480 -
C:\Windows\SysWOW64\Lbpmbipk.exeC:\Windows\system32\Lbpmbipk.exe19⤵PID:5528
-
C:\Windows\SysWOW64\Mmodfqhf.exeC:\Windows\system32\Mmodfqhf.exe20⤵PID:5568
-
C:\Windows\SysWOW64\Mnpami32.exeC:\Windows\system32\Mnpami32.exe21⤵PID:5608
-
C:\Windows\SysWOW64\Mejijcea.exeC:\Windows\system32\Mejijcea.exe22⤵PID:5648
-
C:\Windows\SysWOW64\Mkdagm32.exeC:\Windows\system32\Mkdagm32.exe23⤵PID:5696
-
C:\Windows\SysWOW64\Nbgljf32.exeC:\Windows\system32\Nbgljf32.exe24⤵PID:5732
-
C:\Windows\SysWOW64\Niadfpcn.exeC:\Windows\system32\Niadfpcn.exe25⤵PID:5780
-
C:\Windows\SysWOW64\Npkmcj32.exeC:\Windows\system32\Npkmcj32.exe26⤵PID:5840
-
C:\Windows\SysWOW64\Nppfnige.exeC:\Windows\system32\Nppfnige.exe27⤵
- Modifies registry class
PID:5948 -
C:\Windows\SysWOW64\Ongpeejj.exeC:\Windows\system32\Ongpeejj.exe28⤵PID:5992
-
C:\Windows\SysWOW64\Oimdbnip.exeC:\Windows\system32\Oimdbnip.exe29⤵PID:6040
-
C:\Windows\SysWOW64\Opgloh32.exeC:\Windows\system32\Opgloh32.exe30⤵PID:6120
-
C:\Windows\SysWOW64\Pehnboko.exeC:\Windows\system32\Pehnboko.exe31⤵PID:5140
-
C:\Windows\SysWOW64\Agmmnnpj.exeC:\Windows\system32\Agmmnnpj.exe32⤵PID:5208
-
C:\Windows\SysWOW64\Clhbhc32.exeC:\Windows\system32\Clhbhc32.exe33⤵PID:5292
-
C:\Windows\SysWOW64\Cgmfel32.exeC:\Windows\system32\Cgmfel32.exe34⤵PID:5372
-
C:\Windows\SysWOW64\Cngnbfid.exeC:\Windows\system32\Cngnbfid.exe35⤵PID:5436
-
C:\Windows\SysWOW64\Cohkinob.exeC:\Windows\system32\Cohkinob.exe36⤵PID:5512
-
C:\Windows\SysWOW64\Cfbcfh32.exeC:\Windows\system32\Cfbcfh32.exe37⤵PID:5588
-
C:\Windows\SysWOW64\Cllkcbnl.exeC:\Windows\system32\Cllkcbnl.exe38⤵PID:5632
-
C:\Windows\SysWOW64\Cgbppknb.exeC:\Windows\system32\Cgbppknb.exe39⤵PID:5720
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Cnlhme32.exeC:\Windows\system32\Cnlhme32.exe1⤵PID:5796
-
C:\Windows\SysWOW64\Comddn32.exeC:\Windows\system32\Comddn32.exe2⤵PID:5876
-
C:\Windows\SysWOW64\Dcmjpl32.exeC:\Windows\system32\Dcmjpl32.exe3⤵PID:5944
-
C:\Windows\SysWOW64\Dmmdjp32.exeC:\Windows\system32\Dmmdjp32.exe4⤵PID:6020
-
C:\Windows\SysWOW64\Enajobbf.exeC:\Windows\system32\Enajobbf.exe5⤵PID:6092
-
C:\Windows\SysWOW64\Ecnbgian.exeC:\Windows\system32\Ecnbgian.exe6⤵PID:4592
-
C:\Windows\SysWOW64\Fnacfp32.exeC:\Windows\system32\Fnacfp32.exe7⤵PID:5912
-
C:\Windows\SysWOW64\Gjmmfq32.exeC:\Windows\system32\Gjmmfq32.exe8⤵PID:5224
-
C:\Windows\SysWOW64\Hdodeedi.exeC:\Windows\system32\Hdodeedi.exe9⤵PID:5324
-
C:\Windows\SysWOW64\Hjimaole.exeC:\Windows\system32\Hjimaole.exe10⤵
- Drops file in System32 directory
- Modifies registry class
PID:5492 -
C:\Windows\SysWOW64\Habeni32.exeC:\Windows\system32\Habeni32.exe11⤵PID:5600
-
C:\Windows\SysWOW64\Igmjhnej.exeC:\Windows\system32\Igmjhnej.exe12⤵PID:5716
-
C:\Windows\SysWOW64\Jmlkpgia.exeC:\Windows\system32\Jmlkpgia.exe13⤵PID:5856
-
C:\Windows\SysWOW64\Kobnji32.exeC:\Windows\system32\Kobnji32.exe14⤵PID:6068
-
C:\Windows\SysWOW64\Laofhbmp.exeC:\Windows\system32\Laofhbmp.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5164
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Lglopjkg.exeC:\Windows\system32\Lglopjkg.exe1⤵PID:1440
-
C:\Windows\SysWOW64\Lhkkjl32.exeC:\Windows\system32\Lhkkjl32.exe2⤵PID:5564
-
C:\Windows\SysWOW64\Lqfpoope.exeC:\Windows\system32\Lqfpoope.exe3⤵PID:5708
-
C:\Windows\SysWOW64\Lkldlgok.exeC:\Windows\system32\Lkldlgok.exe4⤵PID:1164
-
C:\Windows\SysWOW64\Mddidm32.exeC:\Windows\system32\Mddidm32.exe5⤵PID:5848
-
C:\Windows\SysWOW64\Mbhina32.exeC:\Windows\system32\Mbhina32.exe6⤵PID:616
-
C:\Windows\SysWOW64\Mdgejmdi.exeC:\Windows\system32\Mdgejmdi.exe7⤵PID:3976
-
C:\Windows\SysWOW64\Mkangg32.exeC:\Windows\system32\Mkangg32.exe8⤵PID:5460
-
C:\Windows\SysWOW64\Mbkfcabb.exeC:\Windows\system32\Mbkfcabb.exe9⤵PID:5560
-
C:\Windows\SysWOW64\Mggolhaj.exeC:\Windows\system32\Mggolhaj.exe10⤵
- Drops file in System32 directory
PID:5936 -
C:\Windows\SysWOW64\Nombnc32.exeC:\Windows\system32\Nombnc32.exe11⤵PID:5316
-
C:\Windows\SysWOW64\Pngbam32.exeC:\Windows\system32\Pngbam32.exe12⤵PID:2672
-
C:\Windows\SysWOW64\Apndloif.exeC:\Windows\system32\Apndloif.exe13⤵
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\Cbofdg32.exeC:\Windows\system32\Cbofdg32.exe14⤵PID:4284
-
C:\Windows\SysWOW64\Didnmp32.exeC:\Windows\system32\Didnmp32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2196 -
C:\Windows\SysWOW64\Doageg32.exeC:\Windows\system32\Doageg32.exe16⤵PID:5688
-
C:\Windows\SysWOW64\Dpemjifi.exeC:\Windows\system32\Dpemjifi.exe17⤵PID:4116
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Dfbebpdq.exeC:\Windows\system32\Dfbebpdq.exe1⤵PID:3040
-
C:\Windows\SysWOW64\Dllmoj32.exeC:\Windows\system32\Dllmoj32.exe2⤵PID:676
-
C:\Windows\SysWOW64\Ecfeldcj.exeC:\Windows\system32\Ecfeldcj.exe3⤵PID:1276
-
C:\Windows\SysWOW64\Ebkbmqhb.exeC:\Windows\system32\Ebkbmqhb.exe4⤵PID:4460
-
C:\Windows\SysWOW64\Ehekjk32.exeC:\Windows\system32\Ehekjk32.exe5⤵PID:4892
-
C:\Windows\SysWOW64\Ffpadn32.exeC:\Windows\system32\Ffpadn32.exe6⤵PID:1660
-
C:\Windows\SysWOW64\Fmjjqhpn.exeC:\Windows\system32\Fmjjqhpn.exe7⤵PID:4720
-
C:\Windows\SysWOW64\Fmmffhnk.exeC:\Windows\system32\Fmmffhnk.exe8⤵PID:1332
-
C:\Windows\SysWOW64\Fbiooolb.exeC:\Windows\system32\Fbiooolb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\Ficgkico.exeC:\Windows\system32\Ficgkico.exe10⤵PID:5900
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Foplnb32.exeC:\Windows\system32\Foplnb32.exe1⤵PID:3208
-
C:\Windows\SysWOW64\Ffjdjmpf.exeC:\Windows\system32\Ffjdjmpf.exe2⤵PID:216
-
C:\Windows\SysWOW64\Gimjag32.exeC:\Windows\system32\Gimjag32.exe3⤵PID:4784
-
C:\Windows\SysWOW64\Hmfbcd32.exeC:\Windows\system32\Hmfbcd32.exe4⤵PID:5556
-
C:\Windows\SysWOW64\Ifcpgiji.exeC:\Windows\system32\Ifcpgiji.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292
-
-
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972
-
C:\Windows\SysWOW64\Chmehhpn.exeC:\Windows\system32\Chmehhpn.exe1⤵PID:7032
-
C:\Windows\SysWOW64\Cbcieqpd.exeC:\Windows\system32\Cbcieqpd.exe2⤵PID:7080
-
-
C:\Windows\SysWOW64\Cddemi32.exeC:\Windows\system32\Cddemi32.exe1⤵PID:7124
-
C:\Windows\SysWOW64\Coijja32.exeC:\Windows\system32\Coijja32.exe2⤵PID:7164
-
C:\Windows\SysWOW64\Cecbgl32.exeC:\Windows\system32\Cecbgl32.exe3⤵PID:6204
-
C:\Windows\SysWOW64\Ckpjob32.exeC:\Windows\system32\Ckpjob32.exe4⤵PID:6284
-
C:\Windows\SysWOW64\Cefolk32.exeC:\Windows\system32\Cefolk32.exe5⤵
- Drops file in System32 directory
- Modifies registry class
PID:6332 -
C:\Windows\SysWOW64\Donceaac.exeC:\Windows\system32\Donceaac.exe6⤵PID:6388
-
C:\Windows\SysWOW64\Ddklnh32.exeC:\Windows\system32\Ddklnh32.exe7⤵PID:6464
-
C:\Windows\SysWOW64\Dkedjbgg.exeC:\Windows\system32\Dkedjbgg.exe8⤵PID:6516
-
C:\Windows\SysWOW64\Dejhgkgm.exeC:\Windows\system32\Dejhgkgm.exe9⤵PID:6560
-
C:\Windows\SysWOW64\Dldpde32.exeC:\Windows\system32\Dldpde32.exe10⤵
- Drops file in System32 directory
PID:6632 -
C:\Windows\SysWOW64\Dboiaoff.exeC:\Windows\system32\Dboiaoff.exe11⤵PID:6732
-
C:\Windows\SysWOW64\Dhkaif32.exeC:\Windows\system32\Dhkaif32.exe12⤵
- Modifies registry class
PID:6768
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Dcaefo32.exeC:\Windows\system32\Dcaefo32.exe1⤵PID:6816
-
C:\Windows\SysWOW64\Dhnnoe32.exeC:\Windows\system32\Dhnnoe32.exe2⤵PID:6904
-
C:\Windows\SysWOW64\Dogfkpih.exeC:\Windows\system32\Dogfkpih.exe3⤵PID:2468
-
C:\Windows\SysWOW64\Eddodfhp.exeC:\Windows\system32\Eddodfhp.exe4⤵PID:7020
-
C:\Windows\SysWOW64\Ekngqqol.exeC:\Windows\system32\Ekngqqol.exe5⤵PID:7088
-
C:\Windows\SysWOW64\Eedkniob.exeC:\Windows\system32\Eedkniob.exe6⤵
- Drops file in System32 directory
PID:7148 -
C:\Windows\SysWOW64\Elncjc32.exeC:\Windows\system32\Elncjc32.exe7⤵PID:6188
-
C:\Windows\SysWOW64\Echkgnnl.exeC:\Windows\system32\Echkgnnl.exe8⤵PID:6328
-
C:\Windows\SysWOW64\Elpppcdl.exeC:\Windows\system32\Elpppcdl.exe9⤵PID:1084
-
C:\Windows\SysWOW64\Eamhhjbd.exeC:\Windows\system32\Eamhhjbd.exe10⤵PID:6540
-
C:\Windows\SysWOW64\Ecmebm32.exeC:\Windows\system32\Ecmebm32.exe11⤵PID:4356
-
C:\Windows\SysWOW64\Ehimkd32.exeC:\Windows\system32\Ehimkd32.exe12⤵
- Modifies registry class
PID:3124 -
C:\Windows\SysWOW64\Ecoahmhd.exeC:\Windows\system32\Ecoahmhd.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6764 -
C:\Windows\SysWOW64\Flgfqb32.exeC:\Windows\system32\Flgfqb32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6852 -
C:\Windows\SysWOW64\Fadoii32.exeC:\Windows\system32\Fadoii32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4296 -
C:\Windows\SysWOW64\Fljcfa32.exeC:\Windows\system32\Fljcfa32.exe16⤵PID:4200
-
C:\Windows\SysWOW64\Fafkoiji.exeC:\Windows\system32\Fafkoiji.exe17⤵PID:7116
-
C:\Windows\SysWOW64\Fllplajo.exeC:\Windows\system32\Fllplajo.exe18⤵PID:6176
-
C:\Windows\SysWOW64\Fbihdhhf.exeC:\Windows\system32\Fbihdhhf.exe19⤵PID:6352
-
C:\Windows\SysWOW64\Fkalmn32.exeC:\Windows\system32\Fkalmn32.exe20⤵PID:6440
-
C:\Windows\SysWOW64\Gdqgfbop.exeC:\Windows\system32\Gdqgfbop.exe21⤵
- Executes dropped EXE
PID:1432 -
C:\Windows\SysWOW64\Gkjocm32.exeC:\Windows\system32\Gkjocm32.exe22⤵PID:4692
-
C:\Windows\SysWOW64\Gbdgpfni.exeC:\Windows\system32\Gbdgpfni.exe23⤵PID:6812
-
C:\Windows\SysWOW64\Hiefmp32.exeC:\Windows\system32\Hiefmp32.exe24⤵PID:6912
-
C:\Windows\SysWOW64\Hckjjh32.exeC:\Windows\system32\Hckjjh32.exe25⤵
- Executes dropped EXE
PID:3632 -
C:\Windows\SysWOW64\Helfbqeb.exeC:\Windows\system32\Helfbqeb.exe26⤵
- Modifies registry class
PID:4072 -
C:\Windows\SysWOW64\Ippgqg32.exeC:\Windows\system32\Ippgqg32.exe27⤵PID:6380
-
C:\Windows\SysWOW64\Imdgjlgb.exeC:\Windows\system32\Imdgjlgb.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:496 -
C:\Windows\SysWOW64\Jeolonem.exeC:\Windows\system32\Jeolonem.exe29⤵PID:6496
-
C:\Windows\SysWOW64\Jefbomoe.exeC:\Windows\system32\Jefbomoe.exe30⤵PID:2168
-
C:\Windows\SysWOW64\Jfeoip32.exeC:\Windows\system32\Jfeoip32.exe31⤵
- Modifies registry class
PID:6956 -
C:\Windows\SysWOW64\Kpeibdfp.exeC:\Windows\system32\Kpeibdfp.exe32⤵PID:7104
-
C:\Windows\SysWOW64\Kimnlj32.exeC:\Windows\system32\Kimnlj32.exe33⤵PID:7140
-
C:\Windows\SysWOW64\Kfanen32.exeC:\Windows\system32\Kfanen32.exe34⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\SysWOW64\Llngmeja.exeC:\Windows\system32\Llngmeja.exe35⤵PID:4300
-
C:\Windows\SysWOW64\Lfckjnjh.exeC:\Windows\system32\Lfckjnjh.exe36⤵PID:5232
-
C:\Windows\SysWOW64\Ognpoheh.exeC:\Windows\system32\Ognpoheh.exe37⤵
- Drops file in System32 directory
PID:4700 -
C:\Windows\SysWOW64\Bnkgomnl.exeC:\Windows\system32\Bnkgomnl.exe38⤵PID:956
-
C:\Windows\SysWOW64\Cclhbcho.exeC:\Windows\system32\Cclhbcho.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5216 -
C:\Windows\SysWOW64\Dkdmpl32.exeC:\Windows\system32\Dkdmpl32.exe40⤵PID:3956
-
C:\Windows\SysWOW64\Ddmaia32.exeC:\Windows\system32\Ddmaia32.exe41⤵PID:5296
-
C:\Windows\SysWOW64\Daqbbe32.exeC:\Windows\system32\Daqbbe32.exe42⤵PID:5456
-
C:\Windows\SysWOW64\Dfmjjl32.exeC:\Windows\system32\Dfmjjl32.exe43⤵PID:4552
-
C:\Windows\SysWOW64\Dacohegc.exeC:\Windows\system32\Dacohegc.exe44⤵PID:3640
-
C:\Windows\SysWOW64\Dkkcqj32.exeC:\Windows\system32\Dkkcqj32.exe45⤵PID:6628
-
C:\Windows\SysWOW64\Eaekmdep.exeC:\Windows\system32\Eaekmdep.exe46⤵PID:5804
-
C:\Windows\SysWOW64\Egbdekcg.exeC:\Windows\system32\Egbdekcg.exe47⤵
- Drops file in System32 directory
PID:4352 -
C:\Windows\SysWOW64\Eahhcd32.exeC:\Windows\system32\Eahhcd32.exe48⤵
- Drops file in System32 directory
- Modifies registry class
PID:5840 -
C:\Windows\SysWOW64\Eolhlh32.exeC:\Windows\system32\Eolhlh32.exe49⤵
- Modifies registry class
PID:6040 -
C:\Windows\SysWOW64\Edhado32.exeC:\Windows\system32\Edhado32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5136 -
C:\Windows\SysWOW64\Ekbiaigk.exeC:\Windows\system32\Ekbiaigk.exe51⤵PID:3336
-
C:\Windows\SysWOW64\Edknjonl.exeC:\Windows\system32\Edknjonl.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5180 -
C:\Windows\SysWOW64\Emcbcd32.exeC:\Windows\system32\Emcbcd32.exe53⤵PID:5448
-
C:\Windows\SysWOW64\Ehifpm32.exeC:\Windows\system32\Ehifpm32.exe54⤵PID:5680
-
C:\Windows\SysWOW64\Fneohd32.exeC:\Windows\system32\Fneohd32.exe55⤵
- Drops file in System32 directory
- Modifies registry class
PID:5360 -
C:\Windows\SysWOW64\Fgncaj32.exeC:\Windows\system32\Fgncaj32.exe56⤵PID:5792
-
C:\Windows\SysWOW64\Foghhg32.exeC:\Windows\system32\Foghhg32.exe57⤵PID:5568
-
C:\Windows\SysWOW64\Fddqpn32.exeC:\Windows\system32\Fddqpn32.exe58⤵
- Modifies registry class
PID:5732 -
C:\Windows\SysWOW64\Fahajbek.exeC:\Windows\system32\Fahajbek.exe59⤵PID:3804
-
C:\Windows\SysWOW64\Fkqebg32.exeC:\Windows\system32\Fkqebg32.exe60⤵PID:5992
-
C:\Windows\SysWOW64\Goqkne32.exeC:\Windows\system32\Goqkne32.exe61⤵PID:5328
-
C:\Windows\SysWOW64\Ghiogkfp.exeC:\Windows\system32\Ghiogkfp.exe62⤵
- Drops file in System32 directory
PID:5396 -
C:\Windows\SysWOW64\Gdppllld.exeC:\Windows\system32\Gdppllld.exe63⤵PID:5372
-
C:\Windows\SysWOW64\Hojndd32.exeC:\Windows\system32\Hojndd32.exe64⤵
- Drops file in System32 directory
PID:5728 -
C:\Windows\SysWOW64\Hdgfmk32.exeC:\Windows\system32\Hdgfmk32.exe65⤵PID:5300
-
C:\Windows\SysWOW64\Hocqkc32.exeC:\Windows\system32\Hocqkc32.exe66⤵PID:3848
-
C:\Windows\SysWOW64\Idgocigi.exeC:\Windows\system32\Idgocigi.exe67⤵PID:5544
-
C:\Windows\SysWOW64\Iejlih32.exeC:\Windows\system32\Iejlih32.exe68⤵PID:6724
-
C:\Windows\SysWOW64\Inbpbnlg.exeC:\Windows\system32\Inbpbnlg.exe69⤵PID:2080
-
C:\Windows\SysWOW64\Jigdoglm.exeC:\Windows\system32\Jigdoglm.exe70⤵
- Drops file in System32 directory
PID:6864 -
C:\Windows\SysWOW64\Jbpihlbn.exeC:\Windows\system32\Jbpihlbn.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5940 -
C:\Windows\SysWOW64\Jgmapcqe.exeC:\Windows\system32\Jgmapcqe.exe72⤵
- Modifies registry class
PID:6092 -
C:\Windows\SysWOW64\Jbbfnlpk.exeC:\Windows\system32\Jbbfnlpk.exe73⤵PID:5268
-
C:\Windows\SysWOW64\Jgdhab32.exeC:\Windows\system32\Jgdhab32.exe74⤵PID:5172
-
C:\Windows\SysWOW64\Klkcmo32.exeC:\Windows\system32\Klkcmo32.exe75⤵PID:2316
-
C:\Windows\SysWOW64\Lhbdbpnm.exeC:\Windows\system32\Lhbdbpnm.exe76⤵PID:6872
-
C:\Windows\SysWOW64\Lfjjqg32.exeC:\Windows\system32\Lfjjqg32.exe77⤵PID:6016
-
C:\Windows\SysWOW64\Meogbcel.exeC:\Windows\system32\Meogbcel.exe78⤵PID:1108
-
C:\Windows\SysWOW64\Mbchkg32.exeC:\Windows\system32\Mbchkg32.exe79⤵
- Modifies registry class
PID:5392 -
C:\Windows\SysWOW64\Nlihek32.exeC:\Windows\system32\Nlihek32.exe80⤵PID:5600
-
C:\Windows\SysWOW64\Nhbfpl32.exeC:\Windows\system32\Nhbfpl32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5184 -
C:\Windows\SysWOW64\Olcklj32.exeC:\Windows\system32\Olcklj32.exe82⤵PID:408
-
C:\Windows\SysWOW64\Oghpib32.exeC:\Windows\system32\Oghpib32.exe83⤵PID:5504
-
C:\Windows\SysWOW64\Oocdme32.exeC:\Windows\system32\Oocdme32.exe84⤵PID:6868
-
C:\Windows\SysWOW64\Ohlifj32.exeC:\Windows\system32\Ohlifj32.exe85⤵PID:5880
-
C:\Windows\SysWOW64\Poaqocgl.exeC:\Windows\system32\Poaqocgl.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3712 -
C:\Windows\SysWOW64\Aqjpod32.exeC:\Windows\system32\Aqjpod32.exe87⤵PID:5924
-
C:\Windows\SysWOW64\Agdhln32.exeC:\Windows\system32\Agdhln32.exe88⤵PID:5412
-
C:\Windows\SysWOW64\Amaqde32.exeC:\Windows\system32\Amaqde32.exe89⤵PID:5876
-
C:\Windows\SysWOW64\Aqoijcbo.exeC:\Windows\system32\Aqoijcbo.exe90⤵PID:5820
-
C:\Windows\SysWOW64\Dfcqjg32.exeC:\Windows\system32\Dfcqjg32.exe91⤵PID:3760
-
C:\Windows\SysWOW64\Ejofacfb.exeC:\Windows\system32\Ejofacfb.exe92⤵PID:5560
-
C:\Windows\SysWOW64\Effffd32.exeC:\Windows\system32\Effffd32.exe93⤵PID:4708
-
C:\Windows\SysWOW64\Fkihgb32.exeC:\Windows\system32\Fkihgb32.exe94⤵PID:6000
-
C:\Windows\SysWOW64\Ghkebd32.exeC:\Windows\system32\Ghkebd32.exe95⤵PID:2376
-
C:\Windows\SysWOW64\Gilajmfp.exeC:\Windows\system32\Gilajmfp.exe96⤵PID:5936
-
C:\Windows\SysWOW64\Gdafgefe.exeC:\Windows\system32\Gdafgefe.exe97⤵
- Modifies registry class
PID:3976 -
C:\Windows\SysWOW64\Igpkjo32.exeC:\Windows\system32\Igpkjo32.exe98⤵PID:5168
-
C:\Windows\SysWOW64\Jjhjli32.exeC:\Windows\system32\Jjhjli32.exe99⤵PID:2672
-
C:\Windows\SysWOW64\Jglkfmmi.exeC:\Windows\system32\Jglkfmmi.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:5084 -
C:\Windows\SysWOW64\Jnklnfpq.exeC:\Windows\system32\Jnklnfpq.exe101⤵
- Modifies registry class
PID:4252 -
C:\Windows\SysWOW64\Keinepch.exeC:\Windows\system32\Keinepch.exe102⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5684 -
C:\Windows\SysWOW64\Lbgaecjg.exeC:\Windows\system32\Lbgaecjg.exe103⤵PID:1600
-
C:\Windows\SysWOW64\Llofnh32.exeC:\Windows\system32\Llofnh32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:4308 -
C:\Windows\SysWOW64\Mhjpnibf.exeC:\Windows\system32\Mhjpnibf.exe105⤵
- Drops file in System32 directory
PID:5868 -
C:\Windows\SysWOW64\Magnbnea.exeC:\Windows\system32\Magnbnea.exe106⤵PID:4460
-
C:\Windows\SysWOW64\Mhafoh32.exeC:\Windows\system32\Mhafoh32.exe107⤵PID:4720
-
C:\Windows\SysWOW64\Majjgmco.exeC:\Windows\system32\Majjgmco.exe108⤵PID:736
-
C:\Windows\SysWOW64\Nelmik32.exeC:\Windows\system32\Nelmik32.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4312 -
C:\Windows\SysWOW64\Nbcjhobg.exeC:\Windows\system32\Nbcjhobg.exe110⤵PID:5524
-
C:\Windows\SysWOW64\Okedmp32.exeC:\Windows\system32\Okedmp32.exe111⤵PID:2312
-
C:\Windows\SysWOW64\Pakleh32.exeC:\Windows\system32\Pakleh32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5536 -
C:\Windows\SysWOW64\Dldlbgbb.exeC:\Windows\system32\Dldlbgbb.exe113⤵
- Drops file in System32 directory
PID:2736 -
C:\Windows\SysWOW64\Ecefjckj.exeC:\Windows\system32\Ecefjckj.exe114⤵PID:4664
-
C:\Windows\SysWOW64\Eplgod32.exeC:\Windows\system32\Eplgod32.exe115⤵PID:424
-
C:\Windows\SysWOW64\Efhlan32.exeC:\Windows\system32\Efhlan32.exe116⤵PID:4376
-
C:\Windows\SysWOW64\Fclmkb32.exeC:\Windows\system32\Fclmkb32.exe117⤵PID:3040
-
C:\Windows\SysWOW64\Flinddpj.exeC:\Windows\system32\Flinddpj.exe118⤵PID:2052
-
C:\Windows\SysWOW64\Fjjnblhi.exeC:\Windows\system32\Fjjnblhi.exe119⤵PID:4468
-
C:\Windows\SysWOW64\Fbecgned.exeC:\Windows\system32\Fbecgned.exe120⤵PID:3668
-
C:\Windows\SysWOW64\Flngpc32.exeC:\Windows\system32\Flngpc32.exe121⤵PID:1332
-
C:\Windows\SysWOW64\Gjohnkdd.exeC:\Windows\system32\Gjohnkdd.exe122⤵PID:4448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-