Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 16:58
Behavioral task
behavioral1
Sample
NEAS.aecf072e7766e27a1591703fcdd7d7f0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.aecf072e7766e27a1591703fcdd7d7f0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.aecf072e7766e27a1591703fcdd7d7f0.exe
-
Size
346KB
-
MD5
aecf072e7766e27a1591703fcdd7d7f0
-
SHA1
598c438cd54e91134d1dd2789192275c5dc4be44
-
SHA256
1162f7ebbe806004a321d6ae4c85152db0d8cbb37510a7405775e85bf213b753
-
SHA512
6afa738e45f2d0f1fd49e9c477649fb0ff996031978333e66b187f03bcf56392db0bffcbdeacafcc910a83ef61ba3ad58513b0b1c3e5aef013be6ded8bef78b3
-
SSDEEP
6144:lRqreT4I5hdsFj5t13LJhrmMsFj5tzOvfFOM6:/Bxhds15tFrls15tz4FT6
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dndllg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ichibm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohggah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccmcaicm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eikpkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgpebf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgpaqbcf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Anjngp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obnebp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmnmqdee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmbjmg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgpaqbcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dajlafon.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajcdbm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdbejg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebocpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mhgfdmle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cikgecag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glbakchp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Diopoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eimlpc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doageg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mddbjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Imkbglei.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcqjhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oafido32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjjinp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mnpice32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbaocfmo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fehpfm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbaocfmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kqmkjk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fneohd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdkgam32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfnnhj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gaffkmlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Filailgl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnehndbl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adohfojo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofcale32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jfgeom32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eieoenad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gklnoc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Liechpef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohggah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Padnkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpljonfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gqhdnaln.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjagmnfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Omjnao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbieoh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mjgneg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncjdeooo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmdbhdoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbldkllm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jljiimeb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oaliidon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmlemoae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjehaopm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdofjg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njkklk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbcnmogm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mocihb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmkeaoig.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/1368-0-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x000b000000022c06-6.dat family_berbew behavioral2/memory/4792-7-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x000b000000022c06-8.dat family_berbew behavioral2/files/0x0008000000022cef-14.dat family_berbew behavioral2/memory/2680-15-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0008000000022cef-16.dat family_berbew behavioral2/files/0x0008000000022cf2-22.dat family_berbew behavioral2/memory/3492-24-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0008000000022cf2-23.dat family_berbew behavioral2/memory/4224-31-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0006000000022cf5-30.dat family_berbew behavioral2/files/0x0006000000022cf5-32.dat family_berbew behavioral2/files/0x0006000000022cf7-38.dat family_berbew behavioral2/files/0x0006000000022cf7-40.dat family_berbew behavioral2/memory/896-39-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x00050000000223ae-46.dat family_berbew behavioral2/files/0x00050000000223ae-48.dat family_berbew behavioral2/memory/2768-47-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0009000000022bfe-56.dat family_berbew behavioral2/memory/2640-57-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/memory/1368-55-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0009000000022bfe-54.dat family_berbew behavioral2/files/0x0008000000022c09-63.dat family_berbew behavioral2/files/0x0008000000022c09-65.dat family_berbew behavioral2/memory/4120-64-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0006000000022d01-66.dat family_berbew behavioral2/files/0x0006000000022d01-71.dat family_berbew behavioral2/files/0x0006000000022d01-72.dat family_berbew behavioral2/memory/2820-73-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0006000000022d04-80.dat family_berbew behavioral2/files/0x0006000000022d04-79.dat family_berbew behavioral2/memory/1344-81-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/memory/4792-88-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/memory/3248-93-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0006000000022d0e-89.dat family_berbew behavioral2/files/0x0006000000022d0e-87.dat family_berbew behavioral2/files/0x0006000000022d12-96.dat family_berbew behavioral2/files/0x0006000000022d12-99.dat family_berbew behavioral2/memory/3492-106-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0006000000022d15-105.dat family_berbew behavioral2/memory/4828-98-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/memory/2600-108-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0006000000022d15-107.dat family_berbew behavioral2/memory/2680-97-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/memory/4224-113-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0006000000022d19-115.dat family_berbew behavioral2/memory/5024-118-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0006000000022d19-117.dat family_berbew behavioral2/memory/896-116-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0006000000022d1d-125.dat family_berbew behavioral2/memory/2768-126-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/memory/4112-127-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0006000000022d1d-124.dat family_berbew behavioral2/files/0x0006000000022d21-128.dat family_berbew behavioral2/files/0x0006000000022d21-134.dat family_berbew behavioral2/memory/4216-136-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/memory/2640-135-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0006000000022d21-133.dat family_berbew behavioral2/files/0x0007000000022d10-142.dat family_berbew behavioral2/files/0x0007000000022d10-144.dat family_berbew behavioral2/memory/500-145-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/memory/4120-143-0x0000000000400000-0x000000000043C000-memory.dmp family_berbew behavioral2/files/0x0007000000022d1c-153.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 4792 Onjmjegg.exe 2680 Plimpg32.exe 3492 Pmiijjcf.exe 4224 Apcead32.exe 896 Bgimjmfl.exe 2768 Cckmklac.exe 2640 Enajobbf.exe 4120 Fqfmlm32.exe 2820 Hhhdpd32.exe 1344 Idfkednq.exe 3248 Lncjgddf.exe 4828 Moofmeal.exe 2600 Mglhgg32.exe 5024 Ndbefkjk.exe 4112 Biaiqb32.exe 4216 Doageg32.exe 500 Ffjdjmpf.exe 1116 Hbldkllm.exe 3312 Hbegakcb.exe 1900 Idjmfmgp.exe 4852 Iiibdc32.exe 656 Jbkjcgaj.exe 3432 Jbmfig32.exe 1436 Kabpan32.exe 4048 Kinefp32.exe 4740 Kcfiof32.exe 2192 Liekgo32.exe 3828 Mgpaqbcf.exe 4300 Mddbjg32.exe 4072 Nkgmmpab.exe 3148 Ojjfpjjj.exe 1012 Oqdnld32.exe 3972 Qepccqlm.exe 456 Acmfel32.exe 3800 Anbkbe32.exe 3524 Bngdndfn.exe 1684 Bdhfaj32.exe 5040 Bonjnc32.exe 492 Chhkmh32.exe 64 Hkhkdjkl.exe 4784 Heapmp32.exe 4464 Hpfdkiac.exe 4816 Iicboncn.exe 3896 Jeaidn32.exe 2792 Jcbibeki.exe 1644 Jidkek32.exe 3192 Kfoapo32.exe 2940 Lmkfah32.exe 1288 Ldgkdbia.exe 1108 Mljficpd.exe 3268 Mdhdkp32.exe 2636 Mnpice32.exe 912 Ngpcmj32.exe 3628 Oqdgan32.exe 3560 Pgefogop.exe 1200 Pmangnmg.exe 640 Pggbdgmm.exe 2312 Pmdkmnkd.exe 1740 Pcncjh32.exe 4904 Pqbdclak.exe 1800 Qgllpf32.exe 628 Anjngp32.exe 2980 Afeblb32.exe 3544 Anogbohj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Joekkl32.exe Jemfbgiq.exe File opened for modification C:\Windows\SysWOW64\Hcfcgd32.exe Hhaoik32.exe File created C:\Windows\SysWOW64\Opcqbk32.exe Okfhjdcp.exe File created C:\Windows\SysWOW64\Bonjnc32.exe Bdhfaj32.exe File opened for modification C:\Windows\SysWOW64\Mjodff32.exe Mgnldkgj.exe File opened for modification C:\Windows\SysWOW64\Idieob32.exe Inombh32.exe File opened for modification C:\Windows\SysWOW64\Dhqoaf32.exe Bhnidi32.exe File opened for modification C:\Windows\SysWOW64\Ngikpjml.exe Nmdgbamf.exe File opened for modification C:\Windows\SysWOW64\Hoadpgid.exe Hhglcm32.exe File created C:\Windows\SysWOW64\Dnfhafji.exe Dlhlek32.exe File created C:\Windows\SysWOW64\Bjkjdd32.dll Ndbefkjk.exe File created C:\Windows\SysWOW64\Ocopncke.exe Ohjlqklp.exe File created C:\Windows\SysWOW64\Opjbpd32.dll Kfcdkk32.exe File opened for modification C:\Windows\SysWOW64\Pdofjg32.exe Pnenmmdq.exe File opened for modification C:\Windows\SysWOW64\Bjhgdj32.exe Bdknlc32.exe File created C:\Windows\SysWOW64\Inombh32.exe Iqklhd32.exe File created C:\Windows\SysWOW64\Injgen32.dll Fkhppgic.exe File created C:\Windows\SysWOW64\Lbcoel32.dll Eoghcj32.exe File created C:\Windows\SysWOW64\Fbeaii32.exe Eimlpc32.exe File created C:\Windows\SysWOW64\Hfklma32.exe Hoadpgid.exe File created C:\Windows\SysWOW64\Gklnoc32.exe Gijbgkol.exe File created C:\Windows\SysWOW64\Fgdbgbof.exe Fagjolao.exe File opened for modification C:\Windows\SysWOW64\Gqpaifia.exe Gkciapkj.exe File created C:\Windows\SysWOW64\Kibmqond.exe Kkomgkoj.exe File created C:\Windows\SysWOW64\Dkppik32.dll Hpabho32.exe File opened for modification C:\Windows\SysWOW64\Nnpalk32.exe Ngehoqdn.exe File opened for modification C:\Windows\SysWOW64\Naecieef.exe Njkklk32.exe File opened for modification C:\Windows\SysWOW64\Goepgg32.exe Gfjkce32.exe File opened for modification C:\Windows\SysWOW64\Ioeineap.exe Iiipfnch.exe File created C:\Windows\SysWOW64\Bekfcj32.dll Acmfel32.exe File created C:\Windows\SysWOW64\Qgllpf32.exe Pqbdclak.exe File created C:\Windows\SysWOW64\Jiiiaj32.dll Phdljg32.exe File opened for modification C:\Windows\SysWOW64\Cjcofb32.exe Ccigihlo.exe File created C:\Windows\SysWOW64\Fjbmfi32.exe Fdfdmbpf.exe File created C:\Windows\SysWOW64\Moejpa32.dll Mdgnkm32.exe File created C:\Windows\SysWOW64\Agnapp32.dll Jbaocfmo.exe File created C:\Windows\SysWOW64\Mdqpdcdl.dll Ngikpjml.exe File opened for modification C:\Windows\SysWOW64\Hngebq32.exe Hhmmffbg.exe File created C:\Windows\SysWOW64\Inefnb32.dll Mfiodc32.exe File opened for modification C:\Windows\SysWOW64\Iicboncn.exe Hpfdkiac.exe File created C:\Windows\SysWOW64\Ohjlqklp.exe Ooaghe32.exe File created C:\Windows\SysWOW64\Pdjflnom.dll Naecieef.exe File opened for modification C:\Windows\SysWOW64\Hcjmapng.exe Hgcmlo32.exe File created C:\Windows\SysWOW64\Midfcd32.exe Mdgnkm32.exe File opened for modification C:\Windows\SysWOW64\Flbhbg32.exe Fehpfm32.exe File created C:\Windows\SysWOW64\Eomecjkb.dll Ppccobpi.exe File created C:\Windows\SysWOW64\Gdgiknio.dll Pcmloa32.exe File opened for modification C:\Windows\SysWOW64\Kgefae32.exe Kjafha32.exe File created C:\Windows\SysWOW64\Kjdkac32.dll Fblpoald.exe File created C:\Windows\SysWOW64\Cmkeaoig.exe Cdpqmm32.exe File created C:\Windows\SysWOW64\Omnqcfig.exe Ohahkojp.exe File created C:\Windows\SysWOW64\Mjicmp32.dll Ombcdo32.exe File created C:\Windows\SysWOW64\Jkpikilm.dll Gqhdnaln.exe File created C:\Windows\SysWOW64\Jdjhgd32.dll Odcfni32.exe File opened for modification C:\Windows\SysWOW64\Bjpjoa32.exe Bkmmkj32.exe File opened for modification C:\Windows\SysWOW64\Obnebp32.exe Modpch32.exe File opened for modification C:\Windows\SysWOW64\Kgbqen32.exe Kmmlhe32.exe File created C:\Windows\SysWOW64\Dqldli32.dll Nmpkkpfi.exe File created C:\Windows\SysWOW64\Poebenfd.dll Lpfaei32.exe File opened for modification C:\Windows\SysWOW64\Fgbmliee.exe Fafddb32.exe File created C:\Windows\SysWOW64\Iklpcimi.dll Jialbf32.exe File created C:\Windows\SysWOW64\Abkkheak.dll Mcnfhmcf.exe File created C:\Windows\SysWOW64\Agmeld32.dll Dnljdqkh.exe File created C:\Windows\SysWOW64\Mfhfmhkl.exe Mpnnpndo.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ocopncke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oampdkbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pklkmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjbgla32.dll" Goepgg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nimbol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ciaiem32.dll" Moofmeal.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmnbpm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbiomqjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phdljg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eomecjkb.dll" Ppccobpi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dibmfb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnhadnpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fmfgoa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adcjhf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljmlmh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Anogbohj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpkllo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qjokgnhb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jicnfp32.dll" Hhnkiegd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngpcmj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ighlmb32.dll" Gckckf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dopjoi32.dll" Nlphfglj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjfckh32.dll" Lankloml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jgpmffeh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Omgalo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iheajdal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iqeaik32.dll" Pmbjmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afeblb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Idbonc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aoofej32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ekhncp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbbkjd32.dll" Kllodfpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kfejfdhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oajcnkdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Geohdago.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gaffkmlg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cimamn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nlfeeelm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Obphmnpb.dll" Peaokh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kddnpj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icabjacn.dll" Ngehoqdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Glndff32.dll" Hfodnd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jlqohhja.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pkhofold.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhglcm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Acelbk32.dll" Lckgehel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Clfofd32.dll" Ffjdjmpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idhdieal.dll" Ofaeffpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kefiheqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gkciapkj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mdgnkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npmmhcpj.dll" Ajcdbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pacfcl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dplebmbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgqfmcge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igcgpalj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbbeafbe.dll" Gqikigoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mcbjlflk.dll" Mlgibf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cnhdgh32.dll" Gegcaa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phfhog32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dcjnikhc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mcnfhmcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nflbhm32.dll" Gebanm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fkhafjhn.dll" Geenclkn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1368 wrote to memory of 4792 1368 NEAS.aecf072e7766e27a1591703fcdd7d7f0.exe 92 PID 1368 wrote to memory of 4792 1368 NEAS.aecf072e7766e27a1591703fcdd7d7f0.exe 92 PID 1368 wrote to memory of 4792 1368 NEAS.aecf072e7766e27a1591703fcdd7d7f0.exe 92 PID 4792 wrote to memory of 2680 4792 Onjmjegg.exe 93 PID 4792 wrote to memory of 2680 4792 Onjmjegg.exe 93 PID 4792 wrote to memory of 2680 4792 Onjmjegg.exe 93 PID 2680 wrote to memory of 3492 2680 Plimpg32.exe 94 PID 2680 wrote to memory of 3492 2680 Plimpg32.exe 94 PID 2680 wrote to memory of 3492 2680 Plimpg32.exe 94 PID 3492 wrote to memory of 4224 3492 Pmiijjcf.exe 95 PID 3492 wrote to memory of 4224 3492 Pmiijjcf.exe 95 PID 3492 wrote to memory of 4224 3492 Pmiijjcf.exe 95 PID 4224 wrote to memory of 896 4224 Apcead32.exe 96 PID 4224 wrote to memory of 896 4224 Apcead32.exe 96 PID 4224 wrote to memory of 896 4224 Apcead32.exe 96 PID 896 wrote to memory of 2768 896 Bgimjmfl.exe 97 PID 896 wrote to memory of 2768 896 Bgimjmfl.exe 97 PID 896 wrote to memory of 2768 896 Bgimjmfl.exe 97 PID 2768 wrote to memory of 2640 2768 Cckmklac.exe 98 PID 2768 wrote to memory of 2640 2768 Cckmklac.exe 98 PID 2768 wrote to memory of 2640 2768 Cckmklac.exe 98 PID 2640 wrote to memory of 4120 2640 Enajobbf.exe 100 PID 2640 wrote to memory of 4120 2640 Enajobbf.exe 100 PID 2640 wrote to memory of 4120 2640 Enajobbf.exe 100 PID 4120 wrote to memory of 2820 4120 Fqfmlm32.exe 101 PID 4120 wrote to memory of 2820 4120 Fqfmlm32.exe 101 PID 4120 wrote to memory of 2820 4120 Fqfmlm32.exe 101 PID 2820 wrote to memory of 1344 2820 Hhhdpd32.exe 103 PID 2820 wrote to memory of 1344 2820 Hhhdpd32.exe 103 PID 2820 wrote to memory of 1344 2820 Hhhdpd32.exe 103 PID 1344 wrote to memory of 3248 1344 Idfkednq.exe 104 PID 1344 wrote to memory of 3248 1344 Idfkednq.exe 104 PID 1344 wrote to memory of 3248 1344 Idfkednq.exe 104 PID 3248 wrote to memory of 4828 3248 Lncjgddf.exe 106 PID 3248 wrote to memory of 4828 3248 Lncjgddf.exe 106 PID 3248 wrote to memory of 4828 3248 Lncjgddf.exe 106 PID 4828 wrote to memory of 2600 4828 Moofmeal.exe 105 PID 4828 wrote to memory of 2600 4828 Moofmeal.exe 105 PID 4828 wrote to memory of 2600 4828 Moofmeal.exe 105 PID 2600 wrote to memory of 5024 2600 Mglhgg32.exe 107 PID 2600 wrote to memory of 5024 2600 Mglhgg32.exe 107 PID 2600 wrote to memory of 5024 2600 Mglhgg32.exe 107 PID 5024 wrote to memory of 4112 5024 Ndbefkjk.exe 108 PID 5024 wrote to memory of 4112 5024 Ndbefkjk.exe 108 PID 5024 wrote to memory of 4112 5024 Ndbefkjk.exe 108 PID 4112 wrote to memory of 4216 4112 Biaiqb32.exe 109 PID 4112 wrote to memory of 4216 4112 Biaiqb32.exe 109 PID 4112 wrote to memory of 4216 4112 Biaiqb32.exe 109 PID 4216 wrote to memory of 500 4216 Doageg32.exe 110 PID 4216 wrote to memory of 500 4216 Doageg32.exe 110 PID 4216 wrote to memory of 500 4216 Doageg32.exe 110 PID 500 wrote to memory of 1116 500 Ffjdjmpf.exe 111 PID 500 wrote to memory of 1116 500 Ffjdjmpf.exe 111 PID 500 wrote to memory of 1116 500 Ffjdjmpf.exe 111 PID 1116 wrote to memory of 3312 1116 Hbldkllm.exe 113 PID 1116 wrote to memory of 3312 1116 Hbldkllm.exe 113 PID 1116 wrote to memory of 3312 1116 Hbldkllm.exe 113 PID 3312 wrote to memory of 1900 3312 Hbegakcb.exe 112 PID 3312 wrote to memory of 1900 3312 Hbegakcb.exe 112 PID 3312 wrote to memory of 1900 3312 Hbegakcb.exe 112 PID 1900 wrote to memory of 4852 1900 Idjmfmgp.exe 115 PID 1900 wrote to memory of 4852 1900 Idjmfmgp.exe 115 PID 1900 wrote to memory of 4852 1900 Idjmfmgp.exe 115 PID 4852 wrote to memory of 656 4852 Iiibdc32.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.aecf072e7766e27a1591703fcdd7d7f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.aecf072e7766e27a1591703fcdd7d7f0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\Onjmjegg.exeC:\Windows\system32\Onjmjegg.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\Plimpg32.exeC:\Windows\system32\Plimpg32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\Pmiijjcf.exeC:\Windows\system32\Pmiijjcf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\Apcead32.exeC:\Windows\system32\Apcead32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\Bgimjmfl.exeC:\Windows\system32\Bgimjmfl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\Cckmklac.exeC:\Windows\system32\Cckmklac.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\Enajobbf.exeC:\Windows\system32\Enajobbf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\Fqfmlm32.exeC:\Windows\system32\Fqfmlm32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\Hhhdpd32.exeC:\Windows\system32\Hhhdpd32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\Idfkednq.exeC:\Windows\system32\Idfkednq.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\Lncjgddf.exeC:\Windows\system32\Lncjgddf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\Moofmeal.exeC:\Windows\system32\Moofmeal.exe13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4828
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Mglhgg32.exeC:\Windows\system32\Mglhgg32.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Ndbefkjk.exeC:\Windows\system32\Ndbefkjk.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\Biaiqb32.exeC:\Windows\system32\Biaiqb32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\Doageg32.exeC:\Windows\system32\Doageg32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\Ffjdjmpf.exeC:\Windows\system32\Ffjdjmpf.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\SysWOW64\Hbldkllm.exeC:\Windows\system32\Hbldkllm.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\Hbegakcb.exeC:\Windows\system32\Hbegakcb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Idjmfmgp.exeC:\Windows\system32\Idjmfmgp.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\Iiibdc32.exeC:\Windows\system32\Iiibdc32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852
-
-
C:\Windows\SysWOW64\Jbkjcgaj.exeC:\Windows\system32\Jbkjcgaj.exe1⤵
- Executes dropped EXE
PID:656 -
C:\Windows\SysWOW64\Jbmfig32.exeC:\Windows\system32\Jbmfig32.exe2⤵
- Executes dropped EXE
PID:3432 -
C:\Windows\SysWOW64\Kabpan32.exeC:\Windows\system32\Kabpan32.exe3⤵
- Executes dropped EXE
PID:1436 -
C:\Windows\SysWOW64\Kinefp32.exeC:\Windows\system32\Kinefp32.exe4⤵
- Executes dropped EXE
PID:4048 -
C:\Windows\SysWOW64\Kcfiof32.exeC:\Windows\system32\Kcfiof32.exe5⤵
- Executes dropped EXE
PID:4740 -
C:\Windows\SysWOW64\Liekgo32.exeC:\Windows\system32\Liekgo32.exe6⤵
- Executes dropped EXE
PID:2192
-
-
-
-
-
-
C:\Windows\SysWOW64\Mgpaqbcf.exeC:\Windows\system32\Mgpaqbcf.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3828 -
C:\Windows\SysWOW64\Mddbjg32.exeC:\Windows\system32\Mddbjg32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4300 -
C:\Windows\SysWOW64\Nkgmmpab.exeC:\Windows\system32\Nkgmmpab.exe3⤵
- Executes dropped EXE
PID:4072 -
C:\Windows\SysWOW64\Ojjfpjjj.exeC:\Windows\system32\Ojjfpjjj.exe4⤵
- Executes dropped EXE
PID:3148 -
C:\Windows\SysWOW64\Oqdnld32.exeC:\Windows\system32\Oqdnld32.exe5⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\Qepccqlm.exeC:\Windows\system32\Qepccqlm.exe6⤵
- Executes dropped EXE
PID:3972
-
-
-
-
-
-
C:\Windows\SysWOW64\Acmfel32.exeC:\Windows\system32\Acmfel32.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:456 -
C:\Windows\SysWOW64\Anbkbe32.exeC:\Windows\system32\Anbkbe32.exe2⤵
- Executes dropped EXE
PID:3800 -
C:\Windows\SysWOW64\Bngdndfn.exeC:\Windows\system32\Bngdndfn.exe3⤵
- Executes dropped EXE
PID:3524 -
C:\Windows\SysWOW64\Bdhfaj32.exeC:\Windows\system32\Bdhfaj32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1684 -
C:\Windows\SysWOW64\Bonjnc32.exeC:\Windows\system32\Bonjnc32.exe5⤵
- Executes dropped EXE
PID:5040 -
C:\Windows\SysWOW64\Chhkmh32.exeC:\Windows\system32\Chhkmh32.exe6⤵
- Executes dropped EXE
PID:492 -
C:\Windows\SysWOW64\Hkhkdjkl.exeC:\Windows\system32\Hkhkdjkl.exe7⤵
- Executes dropped EXE
PID:64 -
C:\Windows\SysWOW64\Heapmp32.exeC:\Windows\system32\Heapmp32.exe8⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\Hpfdkiac.exeC:\Windows\system32\Hpfdkiac.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4464 -
C:\Windows\SysWOW64\Iicboncn.exeC:\Windows\system32\Iicboncn.exe10⤵
- Executes dropped EXE
PID:4816 -
C:\Windows\SysWOW64\Jeaidn32.exeC:\Windows\system32\Jeaidn32.exe11⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\SysWOW64\Jcbibeki.exeC:\Windows\system32\Jcbibeki.exe12⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\Jidkek32.exeC:\Windows\system32\Jidkek32.exe13⤵
- Executes dropped EXE
PID:1644 -
C:\Windows\SysWOW64\Kfoapo32.exeC:\Windows\system32\Kfoapo32.exe14⤵
- Executes dropped EXE
PID:3192 -
C:\Windows\SysWOW64\Lmkfah32.exeC:\Windows\system32\Lmkfah32.exe15⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\SysWOW64\Ldgkdbia.exeC:\Windows\system32\Ldgkdbia.exe16⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\Mljficpd.exeC:\Windows\system32\Mljficpd.exe17⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\SysWOW64\Mdhdkp32.exeC:\Windows\system32\Mdhdkp32.exe18⤵
- Executes dropped EXE
PID:3268 -
C:\Windows\SysWOW64\Mnpice32.exeC:\Windows\system32\Mnpice32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\Ngpcmj32.exeC:\Windows\system32\Ngpcmj32.exe20⤵
- Executes dropped EXE
- Modifies registry class
PID:912 -
C:\Windows\SysWOW64\Oqdgan32.exeC:\Windows\system32\Oqdgan32.exe21⤵
- Executes dropped EXE
PID:3628 -
C:\Windows\SysWOW64\Pgefogop.exeC:\Windows\system32\Pgefogop.exe22⤵
- Executes dropped EXE
PID:3560 -
C:\Windows\SysWOW64\Pmangnmg.exeC:\Windows\system32\Pmangnmg.exe23⤵
- Executes dropped EXE
PID:1200 -
C:\Windows\SysWOW64\Pggbdgmm.exeC:\Windows\system32\Pggbdgmm.exe24⤵
- Executes dropped EXE
PID:640 -
C:\Windows\SysWOW64\Pmdkmnkd.exeC:\Windows\system32\Pmdkmnkd.exe25⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\Pcncjh32.exeC:\Windows\system32\Pcncjh32.exe26⤵
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\Pqbdclak.exeC:\Windows\system32\Pqbdclak.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4904 -
C:\Windows\SysWOW64\Qgllpf32.exeC:\Windows\system32\Qgllpf32.exe28⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\Anjngp32.exeC:\Windows\system32\Anjngp32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:628 -
C:\Windows\SysWOW64\Afeblb32.exeC:\Windows\system32\Afeblb32.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:2980 -
C:\Windows\SysWOW64\Anogbohj.exeC:\Windows\system32\Anogbohj.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:3544 -
C:\Windows\SysWOW64\Anadho32.exeC:\Windows\system32\Anadho32.exe32⤵PID:1420
-
C:\Windows\SysWOW64\Cdoegcfl.exeC:\Windows\system32\Cdoegcfl.exe33⤵PID:3944
-
C:\Windows\SysWOW64\Cndidlfb.exeC:\Windows\system32\Cndidlfb.exe34⤵PID:4372
-
C:\Windows\SysWOW64\Dajlafon.exeC:\Windows\system32\Dajlafon.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4652 -
C:\Windows\SysWOW64\Dmcilgco.exeC:\Windows\system32\Dmcilgco.exe36⤵PID:1448
-
C:\Windows\SysWOW64\Delnbdao.exeC:\Windows\system32\Delnbdao.exe37⤵PID:792
-
C:\Windows\SysWOW64\Dfmjjl32.exeC:\Windows\system32\Dfmjjl32.exe38⤵PID:4232
-
C:\Windows\SysWOW64\Dmgbgf32.exeC:\Windows\system32\Dmgbgf32.exe39⤵PID:1732
-
C:\Windows\SysWOW64\Ehifpm32.exeC:\Windows\system32\Ehifpm32.exe40⤵PID:3680
-
C:\Windows\SysWOW64\Fneohd32.exeC:\Windows\system32\Fneohd32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5012 -
C:\Windows\SysWOW64\Fgppgi32.exeC:\Windows\system32\Fgppgi32.exe42⤵PID:4376
-
C:\Windows\SysWOW64\Fafddb32.exeC:\Windows\system32\Fafddb32.exe43⤵
- Drops file in System32 directory
PID:744 -
C:\Windows\SysWOW64\Fgbmliee.exeC:\Windows\system32\Fgbmliee.exe44⤵PID:3860
-
C:\Windows\SysWOW64\Fnmeic32.exeC:\Windows\system32\Fnmeic32.exe45⤵PID:4336
-
C:\Windows\SysWOW64\Fecmjq32.exeC:\Windows\system32\Fecmjq32.exe46⤵PID:4404
-
C:\Windows\SysWOW64\Fgeibicb.exeC:\Windows\system32\Fgeibicb.exe47⤵PID:1284
-
C:\Windows\SysWOW64\Fajnoabh.exeC:\Windows\system32\Fajnoabh.exe48⤵PID:4864
-
C:\Windows\SysWOW64\Fhdfll32.exeC:\Windows\system32\Fhdfll32.exe49⤵PID:384
-
C:\Windows\SysWOW64\Gonnhf32.exeC:\Windows\system32\Gonnhf32.exe50⤵PID:4424
-
C:\Windows\SysWOW64\Gdkgam32.exeC:\Windows\system32\Gdkgam32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5236 -
C:\Windows\SysWOW64\Kehhjfif.exeC:\Windows\system32\Kehhjfif.exe52⤵PID:5328
-
C:\Windows\SysWOW64\Lpilcnoo.exeC:\Windows\system32\Lpilcnoo.exe53⤵PID:5404
-
C:\Windows\SysWOW64\Mikcbb32.exeC:\Windows\system32\Mikcbb32.exe54⤵PID:5448
-
C:\Windows\SysWOW64\Mfaqafjl.exeC:\Windows\system32\Mfaqafjl.exe55⤵PID:5492
-
C:\Windows\SysWOW64\Mhbmin32.exeC:\Windows\system32\Mhbmin32.exe56⤵PID:5532
-
C:\Windows\SysWOW64\Mfcmge32.exeC:\Windows\system32\Mfcmge32.exe57⤵PID:5576
-
C:\Windows\SysWOW64\Mlpeol32.exeC:\Windows\system32\Mlpeol32.exe58⤵PID:5616
-
C:\Windows\SysWOW64\Mfejme32.exeC:\Windows\system32\Mfejme32.exe59⤵PID:5660
-
C:\Windows\SysWOW64\Mhgfdmle.exeC:\Windows\system32\Mhgfdmle.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5704 -
C:\Windows\SysWOW64\Noaoagca.exeC:\Windows\system32\Noaoagca.exe61⤵PID:5752
-
C:\Windows\SysWOW64\Nekgna32.exeC:\Windows\system32\Nekgna32.exe62⤵PID:5788
-
C:\Windows\SysWOW64\Nppkkj32.exeC:\Windows\system32\Nppkkj32.exe63⤵PID:5832
-
C:\Windows\SysWOW64\Nemcca32.exeC:\Windows\system32\Nemcca32.exe64⤵PID:5880
-
C:\Windows\SysWOW64\Nbadmege.exeC:\Windows\system32\Nbadmege.exe65⤵PID:5920
-
C:\Windows\SysWOW64\Niklip32.exeC:\Windows\system32\Niklip32.exe66⤵PID:5960
-
C:\Windows\SysWOW64\Npedfjfo.exeC:\Windows\system32\Npedfjfo.exe67⤵PID:6004
-
C:\Windows\SysWOW64\Ngombd32.exeC:\Windows\system32\Ngombd32.exe68⤵PID:6040
-
C:\Windows\SysWOW64\Nllekk32.exeC:\Windows\system32\Nllekk32.exe69⤵PID:6092
-
C:\Windows\SysWOW64\Opjnai32.exeC:\Windows\system32\Opjnai32.exe70⤵PID:6136
-
C:\Windows\SysWOW64\Oidopn32.exeC:\Windows\system32\Oidopn32.exe71⤵PID:4508
-
C:\Windows\SysWOW64\Ooaghe32.exeC:\Windows\system32\Ooaghe32.exe72⤵
- Drops file in System32 directory
PID:412 -
C:\Windows\SysWOW64\Ohjlqklp.exeC:\Windows\system32\Ohjlqklp.exe73⤵
- Drops file in System32 directory
PID:5276 -
C:\Windows\SysWOW64\Ocopncke.exeC:\Windows\system32\Ocopncke.exe74⤵
- Modifies registry class
PID:1936 -
C:\Windows\SysWOW64\Oofacdaj.exeC:\Windows\system32\Oofacdaj.exe75⤵PID:5432
-
C:\Windows\SysWOW64\Pohnhdog.exeC:\Windows\system32\Pohnhdog.exe76⤵PID:5520
-
C:\Windows\SysWOW64\Phqbaj32.exeC:\Windows\system32\Phqbaj32.exe77⤵PID:5568
-
C:\Windows\SysWOW64\Pfdbknda.exeC:\Windows\system32\Pfdbknda.exe78⤵PID:5624
-
C:\Windows\SysWOW64\Pomgcc32.exeC:\Windows\system32\Pomgcc32.exe79⤵PID:5688
-
C:\Windows\SysWOW64\Pckpja32.exeC:\Windows\system32\Pckpja32.exe80⤵PID:5764
-
C:\Windows\SysWOW64\Phhhbi32.exeC:\Windows\system32\Phhhbi32.exe81⤵PID:5816
-
C:\Windows\SysWOW64\Pcmloa32.exeC:\Windows\system32\Pcmloa32.exe82⤵
- Drops file in System32 directory
PID:5876 -
C:\Windows\SysWOW64\Qhjegh32.exeC:\Windows\system32\Qhjegh32.exe83⤵PID:5936
-
C:\Windows\SysWOW64\Qcpieamc.exeC:\Windows\system32\Qcpieamc.exe84⤵PID:5980
-
C:\Windows\SysWOW64\Qlhnng32.exeC:\Windows\system32\Qlhnng32.exe85⤵PID:6032
-
C:\Windows\SysWOW64\Qgmbkp32.exeC:\Windows\system32\Qgmbkp32.exe86⤵PID:6104
-
C:\Windows\SysWOW64\Aoifoa32.exeC:\Windows\system32\Aoifoa32.exe87⤵PID:560
-
C:\Windows\SysWOW64\Afghgkdl.exeC:\Windows\system32\Afghgkdl.exe88⤵PID:4120
-
C:\Windows\SysWOW64\Aqmldddb.exeC:\Windows\system32\Aqmldddb.exe89⤵PID:5396
-
C:\Windows\SysWOW64\Acnefoac.exeC:\Windows\system32\Acnefoac.exe90⤵PID:5480
-
C:\Windows\SysWOW64\Bqafpc32.exeC:\Windows\system32\Bqafpc32.exe91⤵PID:5572
-
C:\Windows\SysWOW64\Bfnnhj32.exeC:\Windows\system32\Bfnnhj32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5648 -
C:\Windows\SysWOW64\Bqdbec32.exeC:\Windows\system32\Bqdbec32.exe93⤵PID:1524
-
C:\Windows\SysWOW64\Bjodch32.exeC:\Windows\system32\Bjodch32.exe94⤵PID:5804
-
C:\Windows\SysWOW64\Bpkllo32.exeC:\Windows\system32\Bpkllo32.exe95⤵
- Modifies registry class
PID:5916 -
C:\Windows\SysWOW64\Bidqddgp.exeC:\Windows\system32\Bidqddgp.exe96⤵PID:5996
-
C:\Windows\SysWOW64\Bciebm32.exeC:\Windows\system32\Bciebm32.exe97⤵PID:4016
-
C:\Windows\SysWOW64\Cjcmognb.exeC:\Windows\system32\Cjcmognb.exe98⤵PID:432
-
C:\Windows\SysWOW64\Cameka32.exeC:\Windows\system32\Cameka32.exe99⤵PID:5388
-
C:\Windows\SysWOW64\Cfjnch32.exeC:\Windows\system32\Cfjnch32.exe100⤵PID:5560
-
C:\Windows\SysWOW64\Cmdfpbkc.exeC:\Windows\system32\Cmdfpbkc.exe101⤵PID:5700
-
C:\Windows\SysWOW64\Ccnnmmbp.exeC:\Windows\system32\Ccnnmmbp.exe102⤵PID:5868
-
C:\Windows\SysWOW64\Cikgecag.exeC:\Windows\system32\Cikgecag.exe103⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5988 -
C:\Windows\SysWOW64\Cglgck32.exeC:\Windows\system32\Cglgck32.exe104⤵PID:2284
-
C:\Windows\SysWOW64\Cmipkb32.exeC:\Windows\system32\Cmipkb32.exe105⤵PID:2600
-
C:\Windows\SysWOW64\Ccbhhl32.exeC:\Windows\system32\Ccbhhl32.exe106⤵PID:5612
-
C:\Windows\SysWOW64\Cmklaaek.exeC:\Windows\system32\Cmklaaek.exe107⤵PID:5812
-
C:\Windows\SysWOW64\Dgqqnjea.exeC:\Windows\system32\Dgqqnjea.exe108⤵PID:5972
-
C:\Windows\SysWOW64\Dibmfb32.exeC:\Windows\system32\Dibmfb32.exe109⤵
- Modifies registry class
PID:4076 -
C:\Windows\SysWOW64\Dplebmbl.exeC:\Windows\system32\Dplebmbl.exe110⤵
- Modifies registry class
PID:548 -
C:\Windows\SysWOW64\Didjkbim.exeC:\Windows\system32\Didjkbim.exe111⤵PID:5904
-
C:\Windows\SysWOW64\Dcjnikhc.exeC:\Windows\system32\Dcjnikhc.exe112⤵
- Modifies registry class
PID:5640 -
C:\Windows\SysWOW64\Diffabgj.exeC:\Windows\system32\Diffabgj.exe113⤵PID:6084
-
C:\Windows\SysWOW64\Dhgfoioi.exeC:\Windows\system32\Dhgfoioi.exe114⤵PID:5780
-
C:\Windows\SysWOW64\Dabhmo32.exeC:\Windows\system32\Dabhmo32.exe115⤵PID:3200
-
C:\Windows\SysWOW64\Edcqojqh.exeC:\Windows\system32\Edcqojqh.exe116⤵PID:5944
-
C:\Windows\SysWOW64\Edemdine.exeC:\Windows\system32\Edemdine.exe117⤵PID:6156
-
C:\Windows\SysWOW64\Eidbbp32.exeC:\Windows\system32\Eidbbp32.exe118⤵PID:6200
-
C:\Windows\SysWOW64\Ehecpgbi.exeC:\Windows\system32\Ehecpgbi.exe119⤵PID:6240
-
C:\Windows\SysWOW64\Eangimij.exeC:\Windows\system32\Eangimij.exe120⤵PID:6284
-
C:\Windows\SysWOW64\Fkihgb32.exeC:\Windows\system32\Fkihgb32.exe121⤵PID:6328
-
C:\Windows\SysWOW64\Fdamph32.exeC:\Windows\system32\Fdamph32.exe122⤵PID:6368
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-