Analysis
-
max time kernel
61s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2023 02:04
Behavioral task
behavioral1
Sample
NEAS.f10a5c9bc8bbb7aa2e8b11a0b1f9fb90.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.f10a5c9bc8bbb7aa2e8b11a0b1f9fb90.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.f10a5c9bc8bbb7aa2e8b11a0b1f9fb90.exe
-
Size
362KB
-
MD5
f10a5c9bc8bbb7aa2e8b11a0b1f9fb90
-
SHA1
e82fc9c66d33533d97f6e8b37e2a6ab14c88f28f
-
SHA256
a6563c4ca00bca88da3df5573d123df9d0af7948077fac086d870336eba6bf0c
-
SHA512
2b7771f9f1e45d514eafea22d240f965b22c651a5a9e1842d32b6238dc768323b63724622fb23b0701e89a64acda7549c55b6ba4fab19f6ad9b8161fe8121076
-
SSDEEP
6144:Pdj0bnMIdtGDuMEUrQVad7nG3mbDp2o+SsmiMyhtHEyr5psPc1aj8DOvlvuZxris:1j0PtmuMtrQ07nGWxWSsmiMyh95r5OPS
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Finnef32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmkofa32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckggnp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kahinkaf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epjhcnbp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lhjnfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Dpihbjmg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceeaim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Paeelgnj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klpakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Edihdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fochecog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Giokid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mmhgmmbf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkefmjcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jggapj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mfbaalbi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjjfdfbb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edfknb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Meadlo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ookoaokf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Oomelheh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Deidjf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fpnkdfko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hfpenj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pkgaglpp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iialhaad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kajfdk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Aooolbep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faopah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jlolpq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pplobcpp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdpagc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Pkholi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Glmqjj32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qmnbej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eijigg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Fkfcqb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Abfdpfaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daollh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oediim32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Eflceb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Glbjggof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doagjc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhnichde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hioflcbj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lchfib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kajfdk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbdhgaid.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acgfec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Cbdhgaid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ilhkigcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Mllccpfj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Hfhbipdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Ainnhdbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhcmbm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nconfh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Process not Found Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Midfjnge.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/files/0x0006000000022cd8-6.dat family_berbew behavioral2/files/0x0006000000022cd8-8.dat family_berbew behavioral2/files/0x0006000000022cdd-14.dat family_berbew behavioral2/files/0x0006000000022cdd-15.dat family_berbew behavioral2/files/0x0006000000022cdf-17.dat family_berbew behavioral2/files/0x0006000000022cdf-22.dat family_berbew behavioral2/files/0x0006000000022cdf-24.dat family_berbew behavioral2/files/0x0006000000022ce1-30.dat family_berbew behavioral2/files/0x0006000000022ce1-32.dat family_berbew behavioral2/files/0x0006000000022ce6-38.dat family_berbew behavioral2/files/0x0006000000022ce6-40.dat family_berbew behavioral2/files/0x0006000000022ce8-46.dat family_berbew behavioral2/files/0x0006000000022ce8-48.dat family_berbew behavioral2/files/0x0006000000022ceb-54.dat family_berbew behavioral2/files/0x0006000000022ceb-55.dat family_berbew behavioral2/files/0x0006000000022ced-62.dat family_berbew behavioral2/files/0x0006000000022ced-63.dat family_berbew behavioral2/files/0x0006000000022cef-72.dat family_berbew behavioral2/files/0x0006000000022cef-70.dat family_berbew behavioral2/files/0x0006000000022cf5-79.dat family_berbew behavioral2/files/0x0006000000022cf8-86.dat family_berbew behavioral2/files/0x0006000000022cf5-78.dat family_berbew behavioral2/files/0x0006000000022cf8-87.dat family_berbew behavioral2/files/0x0006000000022cfa-95.dat family_berbew behavioral2/files/0x0006000000022cfa-94.dat family_berbew behavioral2/files/0x0006000000022d00-110.dat family_berbew behavioral2/files/0x0006000000022cfe-104.dat family_berbew behavioral2/files/0x0006000000022d00-111.dat family_berbew behavioral2/files/0x0007000000022cf1-118.dat family_berbew behavioral2/files/0x0007000000022cf3-127.dat family_berbew behavioral2/files/0x0007000000022cf3-126.dat family_berbew behavioral2/files/0x0008000000022cf7-135.dat family_berbew behavioral2/files/0x0008000000022cf7-134.dat family_berbew behavioral2/files/0x0007000000022cf1-119.dat family_berbew behavioral2/files/0x0006000000022cfe-102.dat family_berbew behavioral2/files/0x0006000000022d04-151.dat family_berbew behavioral2/files/0x0006000000022d06-159.dat family_berbew behavioral2/files/0x0006000000022d08-166.dat family_berbew behavioral2/files/0x0006000000022d06-158.dat family_berbew behavioral2/files/0x0006000000022d08-167.dat family_berbew behavioral2/files/0x0006000000022d04-150.dat family_berbew behavioral2/files/0x0006000000022d0a-175.dat family_berbew behavioral2/files/0x0006000000022d0a-174.dat family_berbew behavioral2/files/0x0006000000022d0d-182.dat family_berbew behavioral2/files/0x0008000000022d02-143.dat family_berbew behavioral2/files/0x0006000000022d0d-184.dat family_berbew behavioral2/files/0x0008000000022d02-142.dat family_berbew behavioral2/files/0x0006000000022d0f-190.dat family_berbew behavioral2/files/0x0006000000022d0f-192.dat family_berbew behavioral2/files/0x0006000000022d11-198.dat family_berbew behavioral2/files/0x0006000000022d11-200.dat family_berbew behavioral2/files/0x000a000000022bf3-206.dat family_berbew behavioral2/files/0x000a000000022bf3-207.dat family_berbew behavioral2/files/0x0006000000022d14-215.dat family_berbew behavioral2/files/0x0006000000022d14-214.dat family_berbew behavioral2/files/0x0006000000022d16-222.dat family_berbew behavioral2/files/0x0006000000022d16-223.dat family_berbew behavioral2/files/0x0006000000022d1c-231.dat family_berbew behavioral2/files/0x0006000000022d1c-230.dat family_berbew behavioral2/files/0x0006000000022d1e-238.dat family_berbew behavioral2/files/0x0006000000022d1e-239.dat family_berbew behavioral2/files/0x0008000000022d18-247.dat family_berbew behavioral2/files/0x0007000000022d20-254.dat family_berbew behavioral2/files/0x0008000000022d18-246.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 4020 Efpomccg.exe 4072 Fpdcag32.exe 3228 Fmhdkknd.exe 2540 Flmqlg32.exe 4468 Fnnjmbpm.exe 4612 Glbjggof.exe 452 Gncchb32.exe 1888 Gpbpbecj.exe 1640 Glkmmefl.exe 4768 Hedafk32.exe 4748 Holfoqcm.exe 1712 Hbjoeojc.exe 3224 Hpnoncim.exe 1428 Hmbphg32.exe 2484 Hemdlj32.exe 2096 Hoeieolb.exe 2368 Ipeeobbe.exe 1452 Iinjhh32.exe 2100 Iipfmggc.exe 3912 Igdgglfl.exe 3028 Iidphgcn.exe 5080 Jiglnf32.exe 4428 Jcoaglhk.exe 4404 Jcanll32.exe 4604 Jebfng32.exe 4560 Jlolpq32.exe 1828 Kpmdfonj.exe 3792 Kjeiodek.exe 404 Kpanan32.exe 4980 Kofkbk32.exe 3628 Loighj32.exe 384 Lokdnjkg.exe 2524 Lgdidgjg.exe 5048 Lmaamn32.exe 2224 Lcnfohmi.exe 1772 Modgdicm.exe 4268 Mmhgmmbf.exe 1656 Mnhdgpii.exe 3204 Mjodla32.exe 4176 Mcgiefen.exe 3208 Mcifkf32.exe 5092 Mjcngpjh.exe 3440 Nclbpf32.exe 4624 Nqpcjj32.exe 1448 Njhgbp32.exe 2228 Nglhld32.exe 4832 Ncchae32.exe 888 Nmkmjjaa.exe 4764 Ojomcopk.exe 5052 Ogcnmc32.exe 4608 Ompfej32.exe 3500 Ofhknodl.exe 3124 Oclkgccf.exe 3588 Onapdl32.exe 832 Ogjdmbil.exe 1308 Ondljl32.exe 4840 Pfoann32.exe 1908 Paeelgnj.exe 1984 Pjmjdm32.exe 3048 Pfdjinjo.exe 1220 Pplobcpp.exe 4132 Pffgom32.exe 4384 Ppolhcnm.exe 4992 Panhbfep.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Iidphgcn.exe Igdgglfl.exe File created C:\Windows\SysWOW64\Ekajec32.exe Eqlfhjig.exe File created C:\Windows\SysWOW64\Hdbmfhbi.exe Hdppaidl.exe File created C:\Windows\SysWOW64\Aapkgh32.dll Jcaeea32.exe File opened for modification C:\Windows\SysWOW64\Fbjjkble.exe Fibfbm32.exe File created C:\Windows\SysWOW64\Iialhaad.exe Iolhkh32.exe File created C:\Windows\SysWOW64\Jihngboe.exe Jggapj32.exe File opened for modification C:\Windows\SysWOW64\Mmebpbod.exe Pmiijjcf.exe File created C:\Windows\SysWOW64\Dlkiaece.exe Process not Found File created C:\Windows\SysWOW64\Hbdmdpjg.dll Jcanll32.exe File created C:\Windows\SysWOW64\Jeocna32.exe Jpbjfjci.exe File created C:\Windows\SysWOW64\Egcpgp32.dll Mbibfm32.exe File created C:\Windows\SysWOW64\Ijfkpnji.exe Hclccd32.exe File created C:\Windows\SysWOW64\Ogefqeaj.exe Oediim32.exe File created C:\Windows\SysWOW64\Lahjag32.dll Jcihjl32.exe File created C:\Windows\SysWOW64\Odaiodbp.exe Oileakbj.exe File created C:\Windows\SysWOW64\Hbenoi32.exe Gaebef32.exe File created C:\Windows\SysWOW64\Bblnengb.dll Hbknebqi.exe File created C:\Windows\SysWOW64\Icldmjph.dll Feella32.exe File created C:\Windows\SysWOW64\Ibdgjl32.dll Aljefena.exe File opened for modification C:\Windows\SysWOW64\Ljkghi32.exe Blqlgdhi.exe File created C:\Windows\SysWOW64\Hoefgj32.exe Hiinoc32.exe File created C:\Windows\SysWOW64\Dkdeofjc.dll Iebfmfdg.exe File created C:\Windows\SysWOW64\Bflaeggi.dll Dfemdcba.exe File created C:\Windows\SysWOW64\Hkaqgjme.exe Process not Found File created C:\Windows\SysWOW64\Ieccbbkn.exe Iojkeh32.exe File opened for modification C:\Windows\SysWOW64\Dfakcj32.exe Fjbddh32.exe File opened for modification C:\Windows\SysWOW64\Abbiej32.exe Gadimkpb.exe File opened for modification C:\Windows\SysWOW64\Eipilmgh.exe Eimlgnij.exe File created C:\Windows\SysWOW64\Ifleji32.exe Process not Found File opened for modification C:\Windows\SysWOW64\Jmamba32.exe Jcihjl32.exe File created C:\Windows\SysWOW64\Gkqhpmkg.exe Giokid32.exe File created C:\Windows\SysWOW64\Clmmco32.dll Ieojgc32.exe File created C:\Windows\SysWOW64\Ddekmo32.exe Dmkcpdao.exe File created C:\Windows\SysWOW64\Lapncl32.dll Bhennm32.exe File created C:\Windows\SysWOW64\Mpagaf32.dll Pcegclgp.exe File created C:\Windows\SysWOW64\Bfghlhmd.exe Bomppneg.exe File opened for modification C:\Windows\SysWOW64\Jiglnf32.exe Iidphgcn.exe File created C:\Windows\SysWOW64\Edeeci32.exe Eklajcmc.exe File opened for modification C:\Windows\SysWOW64\Jpbjfjci.exe Jemfhacc.exe File opened for modification C:\Windows\SysWOW64\Gqbneq32.exe Gkefmjcj.exe File created C:\Windows\SysWOW64\Ohpcjnil.dll Odjmdocp.exe File created C:\Windows\SysWOW64\Abdagi32.dll Aidomjaf.exe File opened for modification C:\Windows\SysWOW64\Pndhhnda.exe Ofhcdlgg.exe File created C:\Windows\SysWOW64\Caccgepo.dll Dngobghg.exe File opened for modification C:\Windows\SysWOW64\Ghjhofjg.exe Process not Found File opened for modification C:\Windows\SysWOW64\Mhmmieil.exe Process not Found File created C:\Windows\SysWOW64\Dnkbcp32.exe Dagajlal.exe File created C:\Windows\SysWOW64\Pfoann32.exe Ondljl32.exe File created C:\Windows\SysWOW64\Oondonie.dll Eklajcmc.exe File created C:\Windows\SysWOW64\Finnef32.exe Fgoakc32.exe File created C:\Windows\SysWOW64\Fmbdpnaj.dll Gghdaa32.exe File opened for modification C:\Windows\SysWOW64\Kedlip32.exe Jpgdai32.exe File created C:\Windows\SysWOW64\Dmkcpdao.exe Dfakcj32.exe File created C:\Windows\SysWOW64\Jeqgecof.dll Hjdcfp32.exe File created C:\Windows\SysWOW64\Hmpfjpko.dll Ipjoee32.exe File opened for modification C:\Windows\SysWOW64\Bpaikm32.exe Belemd32.exe File opened for modification C:\Windows\SysWOW64\Qifbll32.exe Pkabbgol.exe File opened for modification C:\Windows\SysWOW64\Cblebgfh.exe Cnnllhpa.exe File created C:\Windows\SysWOW64\Gmjlak32.dll Process not Found File created C:\Windows\SysWOW64\Lpghfi32.exe Ljjpnb32.exe File created C:\Windows\SysWOW64\Deqqek32.exe Process not Found File created C:\Windows\SysWOW64\Hcedmkmp.exe Hnhkdd32.exe File created C:\Windows\SysWOW64\Bakpfm32.dll Oomelheh.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hpnoncim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Fgencf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ioicnn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Lpbokjho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oipgkfab.dll" Mhjhmhhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ofckhj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lhnhajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Bqdlmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kekbjo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lhenai32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nfknmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Clijablo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Emamkgpg.dll" Eqncnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ablmdkdf.dll" Kedlip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Jepbodhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hikkdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Klpakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Mfpell32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhamin32.dll" Lpghfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkbdql32.dll" Oooaah32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kmlgcf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Kjbdbjbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbfjfc32.dll" Oojalb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Hjdcfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Iojkeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Nfknmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Pfeijqqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Acgfec32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Nglcjfie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jcihjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Pfepdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqgpcnpb.dll" Fnjocf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oomelheh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oeekbhif.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Ocnabm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flcmpceo.dll" Mllccpfj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lhgkgijg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aljefena.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ljncnhhk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aooolbep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chcbafng.dll" Cgejkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Aonhghjl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Jhifomdj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipiddlhk.dll" Nlnpio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Fgkfqgce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Npdhdlin.dll" Eqgmmk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cbqfhb32.dll" Lindkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Cinpdl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdbdgngl.dll" Eaenkj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjhifg32.dll" Faopah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Hjabdo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Oojalb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kahinkaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlpnapfn.dll" Glnnofhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Ocnabm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Mmebpbod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmeadk32.dll" Glmqjj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Lcealh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Aeopfl32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4020 3924 NEAS.f10a5c9bc8bbb7aa2e8b11a0b1f9fb90.exe 90 PID 3924 wrote to memory of 4020 3924 NEAS.f10a5c9bc8bbb7aa2e8b11a0b1f9fb90.exe 90 PID 3924 wrote to memory of 4020 3924 NEAS.f10a5c9bc8bbb7aa2e8b11a0b1f9fb90.exe 90 PID 4020 wrote to memory of 4072 4020 Efpomccg.exe 92 PID 4020 wrote to memory of 4072 4020 Efpomccg.exe 92 PID 4020 wrote to memory of 4072 4020 Efpomccg.exe 92 PID 4072 wrote to memory of 3228 4072 Fpdcag32.exe 93 PID 4072 wrote to memory of 3228 4072 Fpdcag32.exe 93 PID 4072 wrote to memory of 3228 4072 Fpdcag32.exe 93 PID 3228 wrote to memory of 2540 3228 Fmhdkknd.exe 95 PID 3228 wrote to memory of 2540 3228 Fmhdkknd.exe 95 PID 3228 wrote to memory of 2540 3228 Fmhdkknd.exe 95 PID 2540 wrote to memory of 4468 2540 Flmqlg32.exe 96 PID 2540 wrote to memory of 4468 2540 Flmqlg32.exe 96 PID 2540 wrote to memory of 4468 2540 Flmqlg32.exe 96 PID 4468 wrote to memory of 4612 4468 Fnnjmbpm.exe 97 PID 4468 wrote to memory of 4612 4468 Fnnjmbpm.exe 97 PID 4468 wrote to memory of 4612 4468 Fnnjmbpm.exe 97 PID 4612 wrote to memory of 452 4612 Glbjggof.exe 98 PID 4612 wrote to memory of 452 4612 Glbjggof.exe 98 PID 4612 wrote to memory of 452 4612 Glbjggof.exe 98 PID 452 wrote to memory of 1888 452 Gncchb32.exe 99 PID 452 wrote to memory of 1888 452 Gncchb32.exe 99 PID 452 wrote to memory of 1888 452 Gncchb32.exe 99 PID 1888 wrote to memory of 1640 1888 Gpbpbecj.exe 100 PID 1888 wrote to memory of 1640 1888 Gpbpbecj.exe 100 PID 1888 wrote to memory of 1640 1888 Gpbpbecj.exe 100 PID 1640 wrote to memory of 4768 1640 Glkmmefl.exe 101 PID 1640 wrote to memory of 4768 1640 Glkmmefl.exe 101 PID 1640 wrote to memory of 4768 1640 Glkmmefl.exe 101 PID 4768 wrote to memory of 4748 4768 Hedafk32.exe 103 PID 4768 wrote to memory of 4748 4768 Hedafk32.exe 103 PID 4768 wrote to memory of 4748 4768 Hedafk32.exe 103 PID 4748 wrote to memory of 1712 4748 Holfoqcm.exe 104 PID 4748 wrote to memory of 1712 4748 Holfoqcm.exe 104 PID 4748 wrote to memory of 1712 4748 Holfoqcm.exe 104 PID 1712 wrote to memory of 3224 1712 Hbjoeojc.exe 105 PID 1712 wrote to memory of 3224 1712 Hbjoeojc.exe 105 PID 1712 wrote to memory of 3224 1712 Hbjoeojc.exe 105 PID 3224 wrote to memory of 1428 3224 Hpnoncim.exe 106 PID 3224 wrote to memory of 1428 3224 Hpnoncim.exe 106 PID 3224 wrote to memory of 1428 3224 Hpnoncim.exe 106 PID 1428 wrote to memory of 2484 1428 Hmbphg32.exe 107 PID 1428 wrote to memory of 2484 1428 Hmbphg32.exe 107 PID 1428 wrote to memory of 2484 1428 Hmbphg32.exe 107 PID 2484 wrote to memory of 2096 2484 Hemdlj32.exe 109 PID 2484 wrote to memory of 2096 2484 Hemdlj32.exe 109 PID 2484 wrote to memory of 2096 2484 Hemdlj32.exe 109 PID 2096 wrote to memory of 2368 2096 Hoeieolb.exe 108 PID 2096 wrote to memory of 2368 2096 Hoeieolb.exe 108 PID 2096 wrote to memory of 2368 2096 Hoeieolb.exe 108 PID 2368 wrote to memory of 1452 2368 Ipeeobbe.exe 110 PID 2368 wrote to memory of 1452 2368 Ipeeobbe.exe 110 PID 2368 wrote to memory of 1452 2368 Ipeeobbe.exe 110 PID 1452 wrote to memory of 2100 1452 Iinjhh32.exe 111 PID 1452 wrote to memory of 2100 1452 Iinjhh32.exe 111 PID 1452 wrote to memory of 2100 1452 Iinjhh32.exe 111 PID 2100 wrote to memory of 3912 2100 Iipfmggc.exe 112 PID 2100 wrote to memory of 3912 2100 Iipfmggc.exe 112 PID 2100 wrote to memory of 3912 2100 Iipfmggc.exe 112 PID 3912 wrote to memory of 3028 3912 Igdgglfl.exe 113 PID 3912 wrote to memory of 3028 3912 Igdgglfl.exe 113 PID 3912 wrote to memory of 3028 3912 Igdgglfl.exe 113 PID 3028 wrote to memory of 5080 3028 Iidphgcn.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f10a5c9bc8bbb7aa2e8b11a0b1f9fb90.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f10a5c9bc8bbb7aa2e8b11a0b1f9fb90.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\Efpomccg.exeC:\Windows\system32\Efpomccg.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\Fpdcag32.exeC:\Windows\system32\Fpdcag32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\Fmhdkknd.exeC:\Windows\system32\Fmhdkknd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\Flmqlg32.exeC:\Windows\system32\Flmqlg32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Fnnjmbpm.exeC:\Windows\system32\Fnnjmbpm.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\Glbjggof.exeC:\Windows\system32\Glbjggof.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\Gncchb32.exeC:\Windows\system32\Gncchb32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\Gpbpbecj.exeC:\Windows\system32\Gpbpbecj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\Glkmmefl.exeC:\Windows\system32\Glkmmefl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Hedafk32.exeC:\Windows\system32\Hedafk32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\Holfoqcm.exeC:\Windows\system32\Holfoqcm.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\Hbjoeojc.exeC:\Windows\system32\Hbjoeojc.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\Hpnoncim.exeC:\Windows\system32\Hpnoncim.exe14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\Hmbphg32.exeC:\Windows\system32\Hmbphg32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\Hemdlj32.exeC:\Windows\system32\Hemdlj32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\Hoeieolb.exeC:\Windows\system32\Hoeieolb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ipeeobbe.exeC:\Windows\system32\Ipeeobbe.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\Iinjhh32.exeC:\Windows\system32\Iinjhh32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\Iipfmggc.exeC:\Windows\system32\Iipfmggc.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\Igdgglfl.exeC:\Windows\system32\Igdgglfl.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\Iidphgcn.exeC:\Windows\system32\Iidphgcn.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\Jiglnf32.exeC:\Windows\system32\Jiglnf32.exe6⤵
- Executes dropped EXE
PID:5080 -
C:\Windows\SysWOW64\Jcoaglhk.exeC:\Windows\system32\Jcoaglhk.exe7⤵
- Executes dropped EXE
PID:4428 -
C:\Windows\SysWOW64\Jcanll32.exeC:\Windows\system32\Jcanll32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4404 -
C:\Windows\SysWOW64\Jebfng32.exeC:\Windows\system32\Jebfng32.exe9⤵
- Executes dropped EXE
PID:4604 -
C:\Windows\SysWOW64\Jlolpq32.exeC:\Windows\system32\Jlolpq32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4560 -
C:\Windows\SysWOW64\Kpmdfonj.exeC:\Windows\system32\Kpmdfonj.exe11⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\Kjeiodek.exeC:\Windows\system32\Kjeiodek.exe12⤵
- Executes dropped EXE
PID:3792 -
C:\Windows\SysWOW64\Kpanan32.exeC:\Windows\system32\Kpanan32.exe13⤵
- Executes dropped EXE
PID:404 -
C:\Windows\SysWOW64\Kofkbk32.exeC:\Windows\system32\Kofkbk32.exe14⤵
- Executes dropped EXE
PID:4980 -
C:\Windows\SysWOW64\Loighj32.exeC:\Windows\system32\Loighj32.exe15⤵
- Executes dropped EXE
PID:3628 -
C:\Windows\SysWOW64\Lokdnjkg.exeC:\Windows\system32\Lokdnjkg.exe16⤵
- Executes dropped EXE
PID:384 -
C:\Windows\SysWOW64\Lgdidgjg.exeC:\Windows\system32\Lgdidgjg.exe17⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\Lmaamn32.exeC:\Windows\system32\Lmaamn32.exe18⤵
- Executes dropped EXE
PID:5048 -
C:\Windows\SysWOW64\Lcnfohmi.exeC:\Windows\system32\Lcnfohmi.exe19⤵
- Executes dropped EXE
PID:2224 -
C:\Windows\SysWOW64\Modgdicm.exeC:\Windows\system32\Modgdicm.exe20⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\Mmhgmmbf.exeC:\Windows\system32\Mmhgmmbf.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4268 -
C:\Windows\SysWOW64\Mnhdgpii.exeC:\Windows\system32\Mnhdgpii.exe22⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\Mjodla32.exeC:\Windows\system32\Mjodla32.exe23⤵
- Executes dropped EXE
PID:3204 -
C:\Windows\SysWOW64\Mcgiefen.exeC:\Windows\system32\Mcgiefen.exe24⤵
- Executes dropped EXE
PID:4176 -
C:\Windows\SysWOW64\Mcifkf32.exeC:\Windows\system32\Mcifkf32.exe25⤵
- Executes dropped EXE
PID:3208 -
C:\Windows\SysWOW64\Mjcngpjh.exeC:\Windows\system32\Mjcngpjh.exe26⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\Nclbpf32.exeC:\Windows\system32\Nclbpf32.exe27⤵
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\Nqpcjj32.exeC:\Windows\system32\Nqpcjj32.exe28⤵
- Executes dropped EXE
PID:4624 -
C:\Windows\SysWOW64\Njhgbp32.exeC:\Windows\system32\Njhgbp32.exe29⤵
- Executes dropped EXE
PID:1448 -
C:\Windows\SysWOW64\Nglhld32.exeC:\Windows\system32\Nglhld32.exe30⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SysWOW64\Ncchae32.exeC:\Windows\system32\Ncchae32.exe31⤵
- Executes dropped EXE
PID:4832 -
C:\Windows\SysWOW64\Nmkmjjaa.exeC:\Windows\system32\Nmkmjjaa.exe32⤵
- Executes dropped EXE
PID:888 -
C:\Windows\SysWOW64\Ojomcopk.exeC:\Windows\system32\Ojomcopk.exe33⤵
- Executes dropped EXE
PID:4764 -
C:\Windows\SysWOW64\Ogcnmc32.exeC:\Windows\system32\Ogcnmc32.exe34⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\Ompfej32.exeC:\Windows\system32\Ompfej32.exe35⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\SysWOW64\Ofhknodl.exeC:\Windows\system32\Ofhknodl.exe36⤵
- Executes dropped EXE
PID:3500 -
C:\Windows\SysWOW64\Oclkgccf.exeC:\Windows\system32\Oclkgccf.exe37⤵
- Executes dropped EXE
PID:3124 -
C:\Windows\SysWOW64\Onapdl32.exeC:\Windows\system32\Onapdl32.exe38⤵
- Executes dropped EXE
PID:3588 -
C:\Windows\SysWOW64\Ogjdmbil.exeC:\Windows\system32\Ogjdmbil.exe39⤵
- Executes dropped EXE
PID:832 -
C:\Windows\SysWOW64\Ondljl32.exeC:\Windows\system32\Ondljl32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1308 -
C:\Windows\SysWOW64\Pfoann32.exeC:\Windows\system32\Pfoann32.exe41⤵
- Executes dropped EXE
PID:4840 -
C:\Windows\SysWOW64\Paeelgnj.exeC:\Windows\system32\Paeelgnj.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\Pjmjdm32.exeC:\Windows\system32\Pjmjdm32.exe43⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\SysWOW64\Pfdjinjo.exeC:\Windows\system32\Pfdjinjo.exe44⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\Pplobcpp.exeC:\Windows\system32\Pplobcpp.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1220 -
C:\Windows\SysWOW64\Pffgom32.exeC:\Windows\system32\Pffgom32.exe46⤵
- Executes dropped EXE
PID:4132 -
C:\Windows\SysWOW64\Ppolhcnm.exeC:\Windows\system32\Ppolhcnm.exe47⤵
- Executes dropped EXE
PID:4384 -
C:\Windows\SysWOW64\Panhbfep.exeC:\Windows\system32\Panhbfep.exe48⤵
- Executes dropped EXE
PID:4992 -
C:\Windows\SysWOW64\Qobhkjdi.exeC:\Windows\system32\Qobhkjdi.exe49⤵PID:3964
-
C:\Windows\SysWOW64\Aogbfi32.exeC:\Windows\system32\Aogbfi32.exe50⤵PID:324
-
C:\Windows\SysWOW64\Aoioli32.exeC:\Windows\system32\Aoioli32.exe51⤵PID:4872
-
C:\Windows\SysWOW64\Ahaceo32.exeC:\Windows\system32\Ahaceo32.exe52⤵PID:5056
-
C:\Windows\SysWOW64\Adhdjpjf.exeC:\Windows\system32\Adhdjpjf.exe53⤵PID:4544
-
C:\Windows\SysWOW64\Aonhghjl.exeC:\Windows\system32\Aonhghjl.exe54⤵
- Modifies registry class
PID:724 -
C:\Windows\SysWOW64\Akdilipp.exeC:\Windows\system32\Akdilipp.exe55⤵PID:4252
-
C:\Windows\SysWOW64\Apaadpng.exeC:\Windows\system32\Apaadpng.exe56⤵PID:1112
-
C:\Windows\SysWOW64\Baannc32.exeC:\Windows\system32\Baannc32.exe57⤵PID:4532
-
C:\Windows\SysWOW64\Bhkfkmmg.exeC:\Windows\system32\Bhkfkmmg.exe58⤵PID:1028
-
C:\Windows\SysWOW64\Bacjdbch.exeC:\Windows\system32\Bacjdbch.exe59⤵PID:4936
-
C:\Windows\SysWOW64\Bhmbqm32.exeC:\Windows\system32\Bhmbqm32.exe60⤵PID:4420
-
C:\Windows\SysWOW64\Baegibae.exeC:\Windows\system32\Baegibae.exe61⤵PID:5144
-
C:\Windows\SysWOW64\Boihcf32.exeC:\Windows\system32\Boihcf32.exe62⤵PID:5184
-
C:\Windows\SysWOW64\Bgelgi32.exeC:\Windows\system32\Bgelgi32.exe63⤵PID:5224
-
C:\Windows\SysWOW64\Cdimqm32.exeC:\Windows\system32\Cdimqm32.exe64⤵PID:5268
-
C:\Windows\SysWOW64\Conanfli.exeC:\Windows\system32\Conanfli.exe65⤵PID:5308
-
C:\Windows\SysWOW64\Chfegk32.exeC:\Windows\system32\Chfegk32.exe66⤵PID:5348
-
C:\Windows\SysWOW64\Caojpaij.exeC:\Windows\system32\Caojpaij.exe67⤵PID:5404
-
C:\Windows\SysWOW64\Cnfkdb32.exeC:\Windows\system32\Cnfkdb32.exe68⤵PID:5448
-
C:\Windows\SysWOW64\Cgnomg32.exeC:\Windows\system32\Cgnomg32.exe69⤵PID:5492
-
C:\Windows\SysWOW64\Cacckp32.exeC:\Windows\system32\Cacckp32.exe70⤵PID:5544
-
C:\Windows\SysWOW64\Cgqlcg32.exeC:\Windows\system32\Cgqlcg32.exe71⤵PID:5592
-
C:\Windows\SysWOW64\Dpiplm32.exeC:\Windows\system32\Dpiplm32.exe72⤵PID:5640
-
C:\Windows\SysWOW64\Dojqjdbl.exeC:\Windows\system32\Dojqjdbl.exe73⤵PID:5680
-
C:\Windows\SysWOW64\Dhbebj32.exeC:\Windows\system32\Dhbebj32.exe74⤵PID:5740
-
C:\Windows\SysWOW64\Dakikoom.exeC:\Windows\system32\Dakikoom.exe75⤵PID:5792
-
C:\Windows\SysWOW64\Dnajppda.exeC:\Windows\system32\Dnajppda.exe76⤵PID:5836
-
C:\Windows\SysWOW64\Doagjc32.exeC:\Windows\system32\Doagjc32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5876 -
C:\Windows\SysWOW64\Dhikci32.exeC:\Windows\system32\Dhikci32.exe78⤵PID:5920
-
C:\Windows\SysWOW64\Ebaplnie.exeC:\Windows\system32\Ebaplnie.exe79⤵PID:5980
-
C:\Windows\SysWOW64\Ekjded32.exeC:\Windows\system32\Ekjded32.exe80⤵PID:6028
-
C:\Windows\SysWOW64\Eqgmmk32.exeC:\Windows\system32\Eqgmmk32.exe81⤵
- Modifies registry class
PID:6088 -
C:\Windows\SysWOW64\Eklajcmc.exeC:\Windows\system32\Eklajcmc.exe82⤵
- Drops file in System32 directory
PID:6140 -
C:\Windows\SysWOW64\Edeeci32.exeC:\Windows\system32\Edeeci32.exe83⤵PID:5164
-
C:\Windows\SysWOW64\Eojiqb32.exeC:\Windows\system32\Eojiqb32.exe84⤵PID:5256
-
C:\Windows\SysWOW64\Eqlfhjig.exeC:\Windows\system32\Eqlfhjig.exe85⤵
- Drops file in System32 directory
PID:5332 -
C:\Windows\SysWOW64\Ekajec32.exeC:\Windows\system32\Ekajec32.exe86⤵PID:5428
-
C:\Windows\SysWOW64\Eqncnj32.exeC:\Windows\system32\Eqncnj32.exe87⤵
- Modifies registry class
PID:5488 -
C:\Windows\SysWOW64\Eghkjdoa.exeC:\Windows\system32\Eghkjdoa.exe88⤵PID:5588
-
C:\Windows\SysWOW64\Fbmohmoh.exeC:\Windows\system32\Fbmohmoh.exe89⤵PID:5692
-
C:\Windows\SysWOW64\Fkfcqb32.exeC:\Windows\system32\Fkfcqb32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5808 -
C:\Windows\SysWOW64\Fijdjfdb.exeC:\Windows\system32\Fijdjfdb.exe91⤵PID:5888
-
C:\Windows\SysWOW64\Fbbicl32.exeC:\Windows\system32\Fbbicl32.exe92⤵PID:5976
-
C:\Windows\SysWOW64\Fgoakc32.exeC:\Windows\system32\Fgoakc32.exe93⤵
- Drops file in System32 directory
PID:6064 -
C:\Windows\SysWOW64\Finnef32.exeC:\Windows\system32\Finnef32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6128 -
C:\Windows\SysWOW64\Feenjgfq.exeC:\Windows\system32\Feenjgfq.exe95⤵PID:5232
-
C:\Windows\SysWOW64\Gnnccl32.exeC:\Windows\system32\Gnnccl32.exe96⤵PID:5380
-
C:\Windows\SysWOW64\Gicgpelg.exeC:\Windows\system32\Gicgpelg.exe97⤵PID:5484
-
C:\Windows\SysWOW64\Gbkkik32.exeC:\Windows\system32\Gbkkik32.exe98⤵PID:5624
-
C:\Windows\SysWOW64\Gghdaa32.exeC:\Windows\system32\Gghdaa32.exe99⤵
- Drops file in System32 directory
PID:5800 -
C:\Windows\SysWOW64\Gpolbo32.exeC:\Windows\system32\Gpolbo32.exe100⤵PID:5900
-
C:\Windows\SysWOW64\Gaqhjggp.exeC:\Windows\system32\Gaqhjggp.exe101⤵PID:6076
-
C:\Windows\SysWOW64\Gndick32.exeC:\Windows\system32\Gndick32.exe102⤵PID:5216
-
C:\Windows\SysWOW64\Glhimp32.exeC:\Windows\system32\Glhimp32.exe103⤵PID:5528
-
C:\Windows\SysWOW64\Gaebef32.exeC:\Windows\system32\Gaebef32.exe104⤵
- Drops file in System32 directory
PID:5784 -
C:\Windows\SysWOW64\Hbenoi32.exeC:\Windows\system32\Hbenoi32.exe105⤵PID:6020
-
C:\Windows\SysWOW64\Hioflcbj.exeC:\Windows\system32\Hioflcbj.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5300 -
C:\Windows\SysWOW64\Hbgkei32.exeC:\Windows\system32\Hbgkei32.exe107⤵PID:5716
-
C:\Windows\SysWOW64\Hnnljj32.exeC:\Windows\system32\Hnnljj32.exe108⤵PID:6120
-
C:\Windows\SysWOW64\Hicpgc32.exeC:\Windows\system32\Hicpgc32.exe109⤵PID:5632
-
C:\Windows\SysWOW64\Hnphoj32.exeC:\Windows\system32\Hnphoj32.exe110⤵PID:6132
-
C:\Windows\SysWOW64\Hejqldci.exeC:\Windows\system32\Hejqldci.exe111⤵PID:5852
-
C:\Windows\SysWOW64\Hldiinke.exeC:\Windows\system32\Hldiinke.exe112⤵PID:6156
-
C:\Windows\SysWOW64\Haaaaeim.exeC:\Windows\system32\Haaaaeim.exe113⤵PID:6204
-
C:\Windows\SysWOW64\Ipbaol32.exeC:\Windows\system32\Ipbaol32.exe114⤵PID:6244
-
C:\Windows\SysWOW64\Ieojgc32.exeC:\Windows\system32\Ieojgc32.exe115⤵
- Drops file in System32 directory
PID:6284 -
C:\Windows\SysWOW64\Ipdndloi.exeC:\Windows\system32\Ipdndloi.exe116⤵PID:6332
-
C:\Windows\SysWOW64\Ieagmcmq.exeC:\Windows\system32\Ieagmcmq.exe117⤵PID:6376
-
C:\Windows\SysWOW64\Iojkeh32.exeC:\Windows\system32\Iojkeh32.exe118⤵
- Drops file in System32 directory
- Modifies registry class
PID:6424 -
C:\Windows\SysWOW64\Ieccbbkn.exeC:\Windows\system32\Ieccbbkn.exe119⤵PID:6468
-
C:\Windows\SysWOW64\Iolhkh32.exeC:\Windows\system32\Iolhkh32.exe120⤵
- Drops file in System32 directory
PID:6512 -
C:\Windows\SysWOW64\Iialhaad.exeC:\Windows\system32\Iialhaad.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6556 -
C:\Windows\SysWOW64\Iondqhpl.exeC:\Windows\system32\Iondqhpl.exe122⤵PID:6596
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-