Analysis
-
max time kernel
181s -
max time network
27s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
18/11/2023, 05:22
Behavioral task
behavioral1
Sample
NEAS.aeced95c57104fd1ea89e3c1f3913150.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.aeced95c57104fd1ea89e3c1f3913150.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.aeced95c57104fd1ea89e3c1f3913150.exe
-
Size
256KB
-
MD5
aeced95c57104fd1ea89e3c1f3913150
-
SHA1
fec8870e9d7399b8754f5662db1d9b020ffe9cfa
-
SHA256
3bddc85fcb86c2e0ed6a931ef02a6c2534a01db92b5c8d29fa51c1e7e4e48a74
-
SHA512
1a6a9fa0823336cae572a2d20719742fd7e87b351cea5b982096104b7db25a63e7956f492683ebc070fc4b566c86e539dcededc92e3f872bae9d38ce71577fc8
-
SSDEEP
6144:wJc1WAjlpmmxieQbWGRdA6sQc/Yp7TVX3J/1awbWGRdA6sQc/YRU:Lg2lpJxifbWGRdA6sQhPbWGRdA6sQxU
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ocjpkm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kflcok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcigjolm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgklcaqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcimhpma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jaolad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjjohbgl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lldkem32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mggoli32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjofljho.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qhabfibb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ogliemkk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Icmlnmgb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lobgah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnbmoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Joekimld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcflbpnn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcjamb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgfannba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njfbno32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plhdkhoq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lehfafgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ponokmah.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Behpcefk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfiajj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjgjpiob.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejiadgkl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkdoii32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhglpqeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdghpggf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jimodo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcpcjl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lobgah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Neocahbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lnlaomae.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ifndph32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajqoqm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfdmdlaj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmaghc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kpoegc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plhdkhoq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nffccejb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pfflql32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbcddlnd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfcmcckn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Naqkki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ipfkabpg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okbgkk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blplkp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kkkgnmqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gahpkd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkmddmop.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlafmcpa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcbmhb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Afgoem32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkapla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejgeogmn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpbihl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlbkmdah.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Flgiaa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kcimhpma.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghcbga32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhombc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gahpkd32.exe -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/memory/2804-0-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/files/0x00070000000120e6-5.dat family_berbew behavioral1/memory/2804-6-0x0000000000220000-0x0000000000260000-memory.dmp family_berbew behavioral1/files/0x00070000000120e6-9.dat family_berbew behavioral1/files/0x00070000000120e6-12.dat family_berbew behavioral1/files/0x00070000000120e6-8.dat family_berbew behavioral1/files/0x00070000000120e6-13.dat family_berbew behavioral1/files/0x0032000000016bf8-18.dat family_berbew behavioral1/files/0x0032000000016bf8-21.dat family_berbew behavioral1/files/0x0032000000016bf8-20.dat family_berbew behavioral1/files/0x0032000000016bf8-26.dat family_berbew behavioral1/memory/2684-31-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/files/0x0032000000016bf8-25.dat family_berbew behavioral1/files/0x0008000000016cbc-32.dat family_berbew behavioral1/files/0x0008000000016cbc-35.dat family_berbew behavioral1/files/0x0008000000016cbc-36.dat family_berbew behavioral1/files/0x0008000000016cbc-39.dat family_berbew behavioral1/files/0x0008000000016cbc-41.dat family_berbew behavioral1/memory/3048-40-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/memory/2684-33-0x0000000000220000-0x0000000000260000-memory.dmp family_berbew behavioral1/files/0x0007000000016cdd-52.dat family_berbew behavioral1/files/0x0007000000016cdd-49.dat family_berbew behavioral1/files/0x0007000000016cdd-48.dat family_berbew behavioral1/files/0x0007000000016cdd-46.dat family_berbew behavioral1/memory/948-58-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/files/0x0007000000016cdd-53.dat family_berbew behavioral1/files/0x0009000000016cf7-59.dat family_berbew behavioral1/files/0x0009000000016cf7-63.dat family_berbew behavioral1/files/0x0009000000016cf7-66.dat family_berbew behavioral1/files/0x0009000000016cf7-62.dat family_berbew behavioral1/memory/948-61-0x00000000002A0000-0x00000000002E0000-memory.dmp family_berbew behavioral1/files/0x0009000000016cf7-67.dat family_berbew behavioral1/memory/2880-74-0x0000000000220000-0x0000000000260000-memory.dmp family_berbew behavioral1/files/0x0032000000016c12-72.dat family_berbew behavioral1/files/0x0032000000016c12-76.dat family_berbew behavioral1/files/0x0032000000016c12-79.dat family_berbew behavioral1/files/0x0032000000016c12-75.dat family_berbew behavioral1/files/0x0032000000016c12-80.dat family_berbew behavioral1/files/0x0006000000016e5e-85.dat family_berbew behavioral1/memory/1744-86-0x0000000000220000-0x0000000000260000-memory.dmp family_berbew behavioral1/files/0x0006000000016e5e-91.dat family_berbew behavioral1/files/0x0006000000016e5e-92.dat family_berbew behavioral1/memory/2072-94-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/files/0x0006000000016e5e-93.dat family_berbew behavioral1/files/0x0006000000016e5e-88.dat family_berbew behavioral1/files/0x0006000000017081-99.dat family_berbew behavioral1/memory/2072-101-0x00000000002D0000-0x0000000000310000-memory.dmp family_berbew behavioral1/files/0x0006000000017081-106.dat family_berbew behavioral1/files/0x0006000000017081-103.dat family_berbew behavioral1/files/0x0006000000017081-102.dat family_berbew behavioral1/memory/2188-107-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/files/0x0006000000017081-108.dat family_berbew behavioral1/files/0x000600000001741f-113.dat family_berbew behavioral1/files/0x000600000001741f-117.dat family_berbew behavioral1/files/0x000600000001741f-122.dat family_berbew behavioral1/memory/816-121-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/files/0x000600000001741f-120.dat family_berbew behavioral1/files/0x000600000001741f-116.dat family_berbew behavioral1/files/0x000500000001866f-130.dat family_berbew behavioral1/files/0x000500000001866f-133.dat family_berbew behavioral1/files/0x000500000001866f-129.dat family_berbew behavioral1/files/0x000500000001866f-127.dat family_berbew behavioral1/memory/1612-134-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/files/0x000500000001866f-135.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 2628 Nffccejb.exe 2684 Nigldq32.exe 3048 Ogliemkk.exe 948 Ofdclinq.exe 2880 Ocjpkm32.exe 1744 Ppcmfn32.exe 2072 Pdecoa32.exe 2188 Pfflql32.exe 816 Qanmcdlm.exe 1612 Qpcjeaad.exe 2872 Allgoa32.exe 1572 Ahchdb32.exe 1648 Aoaill32.exe 2400 Bhjneadb.exe 456 Pglojj32.exe 436 Goocenaa.exe 2140 Ioefdpne.exe 692 Ejgeogmn.exe 968 Ejiadgkl.exe 1960 Edofbpja.exe 700 Emjjfb32.exe 3028 Fnbmoi32.exe 1888 Fpbihl32.exe 1412 Feobac32.exe 1064 Gjljij32.exe 2592 Gahpkd32.exe 2764 Gmoppefc.exe 2540 Ghddnnfi.exe 2568 Gmamfddp.exe 2348 Gbnenk32.exe 572 Gihnkejd.exe 2720 Hpfoboml.exe 1196 Hhadgakg.exe 2276 Hdhdlbpk.exe 956 Hkbmil32.exe 2196 Hhfmbq32.exe 1668 Hginnmml.exe 2424 Ipabfcdm.exe 1640 Ikgfdlcb.exe 2900 Ipdolbbj.exe 2360 Ikicikap.exe 964 Ipfkabpg.exe 1808 Ijopjhfh.exe 2292 Icgdcm32.exe 1972 Ionehnbm.exe 996 Ialadj32.exe 2060 Jhfjadim.exe 2032 Jdmjfe32.exe 1608 Jldbgb32.exe 1540 Jbakpi32.exe 1480 Joekimld.exe 1836 Jqfhqe32.exe 1596 Jgppmpjp.exe 2560 Jqhdfe32.exe 2132 Jknicnpf.exe 800 Kcimhpma.exe 2384 Kqokgd32.exe 112 Kflcok32.exe 1996 Kmfklepl.exe 768 Kbcddlnd.exe 1364 Kmhhae32.exe 1660 Kfaljjdj.exe 2068 Lnlaomae.exe 1304 Llpaha32.exe -
Loads dropped DLL 64 IoCs
pid Process 2804 NEAS.aeced95c57104fd1ea89e3c1f3913150.exe 2804 NEAS.aeced95c57104fd1ea89e3c1f3913150.exe 2628 Nffccejb.exe 2628 Nffccejb.exe 2684 Nigldq32.exe 2684 Nigldq32.exe 3048 Ogliemkk.exe 3048 Ogliemkk.exe 948 Ofdclinq.exe 948 Ofdclinq.exe 2880 Ocjpkm32.exe 2880 Ocjpkm32.exe 1744 Ppcmfn32.exe 1744 Ppcmfn32.exe 2072 Pdecoa32.exe 2072 Pdecoa32.exe 2188 Pfflql32.exe 2188 Pfflql32.exe 816 Qanmcdlm.exe 816 Qanmcdlm.exe 1612 Qpcjeaad.exe 1612 Qpcjeaad.exe 2872 Allgoa32.exe 2872 Allgoa32.exe 1572 Ahchdb32.exe 1572 Ahchdb32.exe 1648 Aoaill32.exe 1648 Aoaill32.exe 2400 Bhjneadb.exe 2400 Bhjneadb.exe 456 Pglojj32.exe 456 Pglojj32.exe 436 Goocenaa.exe 436 Goocenaa.exe 2140 Ioefdpne.exe 2140 Ioefdpne.exe 692 Ejgeogmn.exe 692 Ejgeogmn.exe 968 Ejiadgkl.exe 968 Ejiadgkl.exe 1960 Edofbpja.exe 1960 Edofbpja.exe 700 Emjjfb32.exe 700 Emjjfb32.exe 3028 Fnbmoi32.exe 3028 Fnbmoi32.exe 1888 Fpbihl32.exe 1888 Fpbihl32.exe 1412 Feobac32.exe 1412 Feobac32.exe 1064 Gjljij32.exe 1064 Gjljij32.exe 2592 Gahpkd32.exe 2592 Gahpkd32.exe 2764 Gmoppefc.exe 2764 Gmoppefc.exe 2540 Ghddnnfi.exe 2540 Ghddnnfi.exe 2568 Gmamfddp.exe 2568 Gmamfddp.exe 2348 Gbnenk32.exe 2348 Gbnenk32.exe 572 Gihnkejd.exe 572 Gihnkejd.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Gpfpmonn.exe Gcapckod.exe File opened for modification C:\Windows\SysWOW64\Kmeknakn.exe Kejfio32.exe File created C:\Windows\SysWOW64\Mggoli32.exe Mgebfi32.exe File opened for modification C:\Windows\SysWOW64\Qnlobhne.exe Qgbfen32.exe File opened for modification C:\Windows\SysWOW64\Nijdcdgn.exe Nglhghgj.exe File created C:\Windows\SysWOW64\Emjggf32.dll Oabdol32.exe File opened for modification C:\Windows\SysWOW64\Llbnpm32.exe Ljlhme32.exe File created C:\Windows\SysWOW64\Pnhmjpmg.dll Edofbpja.exe File created C:\Windows\SysWOW64\Ffffpb32.dll Hpfoboml.exe File opened for modification C:\Windows\SysWOW64\Ojlmgg32.exe Ognakk32.exe File created C:\Windows\SysWOW64\Kjgjpiob.exe Kcmbco32.exe File created C:\Windows\SysWOW64\Ajqoqm32.exe Aipbidbj.exe File opened for modification C:\Windows\SysWOW64\Ocjpkm32.exe Ofdclinq.exe File created C:\Windows\SysWOW64\Aoaill32.exe Ahchdb32.exe File opened for modification C:\Windows\SysWOW64\Jldbgb32.exe Jdmjfe32.exe File opened for modification C:\Windows\SysWOW64\Laackgka.exe Lekcffem.exe File opened for modification C:\Windows\SysWOW64\Bhjneadb.exe Aoaill32.exe File created C:\Windows\SysWOW64\Kmblcp32.dll Kfgedkko.exe File created C:\Windows\SysWOW64\Hqndhj32.dll Pgdfbb32.exe File opened for modification C:\Windows\SysWOW64\Mcmnbbja.exe Lqnbffkn.exe File created C:\Windows\SysWOW64\Qanlji32.dll Miqmkh32.exe File created C:\Windows\SysWOW64\Angmdoho.exe Agmehd32.exe File created C:\Windows\SysWOW64\Lekcffem.exe Lnqkjl32.exe File created C:\Windows\SysWOW64\Lgdcmc32.dll Fdjfmolo.exe File opened for modification C:\Windows\SysWOW64\Jaolad32.exe Jjbgok32.exe File created C:\Windows\SysWOW64\Dhmkfhnl.dll Nelkme32.exe File created C:\Windows\SysWOW64\Feobac32.exe Fpbihl32.exe File created C:\Windows\SysWOW64\Jqfhqe32.exe Joekimld.exe File opened for modification C:\Windows\SysWOW64\Oqaliabh.exe Okecak32.exe File opened for modification C:\Windows\SysWOW64\Pdecoa32.exe Ppcmfn32.exe File opened for modification C:\Windows\SysWOW64\Gmamfddp.exe Ghddnnfi.exe File created C:\Windows\SysWOW64\Jchobqnc.exe Iaheqe32.exe File created C:\Windows\SysWOW64\Egooijaa.dll Kkbbqjgb.exe File opened for modification C:\Windows\SysWOW64\Jcaahofh.exe Jilmkffb.exe File created C:\Windows\SysWOW64\Aeommfnf.exe Apbeeppo.exe File created C:\Windows\SysWOW64\Loddin32.dll Mmebkg32.exe File opened for modification C:\Windows\SysWOW64\Mgkghp32.exe Mocogc32.exe File opened for modification C:\Windows\SysWOW64\Njfbno32.exe Nejjfh32.exe File created C:\Windows\SysWOW64\Dfikeg32.dll Ahfkah32.exe File created C:\Windows\SysWOW64\Lefhfe32.dll Ndkoemji.exe File created C:\Windows\SysWOW64\Lqnbffkn.exe Lcjamb32.exe File created C:\Windows\SysWOW64\Lnlaomae.exe Kfaljjdj.exe File created C:\Windows\SysWOW64\Hdjchlqo.dll Lmhhcaik.exe File created C:\Windows\SysWOW64\Akilij32.dll Plhdkhoq.exe File opened for modification C:\Windows\SysWOW64\Hobcok32.exe Hdloab32.exe File opened for modification C:\Windows\SysWOW64\Nmccnc32.exe Nelkme32.exe File created C:\Windows\SysWOW64\Njfbno32.exe Nejjfh32.exe File opened for modification C:\Windows\SysWOW64\Ohoiaf32.exe Olhhmele.exe File created C:\Windows\SysWOW64\Najbbepc.exe Nlmjjo32.exe File created C:\Windows\SysWOW64\Gmfccjei.dll Aipbidbj.exe File created C:\Windows\SysWOW64\Hcpodaao.dll Blplkp32.exe File opened for modification C:\Windows\SysWOW64\Kjgjpiob.exe Kcmbco32.exe File created C:\Windows\SysWOW64\Kppppfck.dll Lnqkjl32.exe File created C:\Windows\SysWOW64\Gcapckod.exe Gpagbp32.exe File created C:\Windows\SysWOW64\Ehahglmg.dll Jchobqnc.exe File opened for modification C:\Windows\SysWOW64\Kpecad32.exe Jngfei32.exe File opened for modification C:\Windows\SysWOW64\Gahpkd32.exe Gjljij32.exe File opened for modification C:\Windows\SysWOW64\Phoeomjc.exe Imkndofe.exe File created C:\Windows\SysWOW64\Penlon32.exe Pgklcaqi.exe File created C:\Windows\SysWOW64\Laccdp32.exe Lmhhcaik.exe File created C:\Windows\SysWOW64\Gijlagpq.dll Qahnid32.exe File opened for modification C:\Windows\SysWOW64\Angmdoho.exe Agmehd32.exe File opened for modification C:\Windows\SysWOW64\Ahchdb32.exe Allgoa32.exe File created C:\Windows\SysWOW64\Ipabfcdm.exe Hginnmml.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Joekimld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Amalcd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghddnnfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bklhpc32.dll" Miciqgqn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Angmdoho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ikicikap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgppmpjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahchdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djieql32.dll" Ahhhgh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} NEAS.aeced95c57104fd1ea89e3c1f3913150.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Malopkam.dll" Ahchdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ijopjhfh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Goiljm32.dll" Mggoli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qgbfen32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iabjgoga.dll" Apbeeppo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bibinmff.dll" Mpflmbnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekpiomqg.dll" Aoaill32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Miegjbih.dll" Ljlhme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhjjle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Monjcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pagmlp32.dll" Mlbkmdah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjkgob32.dll" Mmjlfgml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ohfgeo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpincd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inacejpi.dll" Nlafmcpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbnenk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nibgjedl.dll" Jldbgb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmaghc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Najbbepc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Okgpfjbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dakbajhh.dll" Kfiajj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcmbco32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpbihl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qhabfibb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bblocaik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pglojj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ponokmah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mddidnqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ncopaf32.dll" Ncogge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pdjcaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jgppmpjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.aeced95c57104fd1ea89e3c1f3913150.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpfpmonn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hjpnjheg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epkgbb32.dll" Moecghdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Okgpfjbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjpnjheg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mepongob.dll" Jjbgok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdjchlqo.dll" Lmhhcaik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npdlpnnj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qnlobhne.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Meolcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mojmbg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jldbgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfimppip.dll" Gcifdj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olhmnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Plhdkhoq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Becaniab.dll" Hhadgakg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njfbno32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcjlog32.dll" Aomghchl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kmhhae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckfcco32.dll" Kiojqfdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljecnh32.dll" Lhjjle32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bdghpggf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2628 2804 NEAS.aeced95c57104fd1ea89e3c1f3913150.exe 29 PID 2804 wrote to memory of 2628 2804 NEAS.aeced95c57104fd1ea89e3c1f3913150.exe 29 PID 2804 wrote to memory of 2628 2804 NEAS.aeced95c57104fd1ea89e3c1f3913150.exe 29 PID 2804 wrote to memory of 2628 2804 NEAS.aeced95c57104fd1ea89e3c1f3913150.exe 29 PID 2628 wrote to memory of 2684 2628 Nffccejb.exe 30 PID 2628 wrote to memory of 2684 2628 Nffccejb.exe 30 PID 2628 wrote to memory of 2684 2628 Nffccejb.exe 30 PID 2628 wrote to memory of 2684 2628 Nffccejb.exe 30 PID 2684 wrote to memory of 3048 2684 Nigldq32.exe 31 PID 2684 wrote to memory of 3048 2684 Nigldq32.exe 31 PID 2684 wrote to memory of 3048 2684 Nigldq32.exe 31 PID 2684 wrote to memory of 3048 2684 Nigldq32.exe 31 PID 3048 wrote to memory of 948 3048 Ogliemkk.exe 32 PID 3048 wrote to memory of 948 3048 Ogliemkk.exe 32 PID 3048 wrote to memory of 948 3048 Ogliemkk.exe 32 PID 3048 wrote to memory of 948 3048 Ogliemkk.exe 32 PID 948 wrote to memory of 2880 948 Ofdclinq.exe 33 PID 948 wrote to memory of 2880 948 Ofdclinq.exe 33 PID 948 wrote to memory of 2880 948 Ofdclinq.exe 33 PID 948 wrote to memory of 2880 948 Ofdclinq.exe 33 PID 2880 wrote to memory of 1744 2880 Ocjpkm32.exe 34 PID 2880 wrote to memory of 1744 2880 Ocjpkm32.exe 34 PID 2880 wrote to memory of 1744 2880 Ocjpkm32.exe 34 PID 2880 wrote to memory of 1744 2880 Ocjpkm32.exe 34 PID 1744 wrote to memory of 2072 1744 Ppcmfn32.exe 35 PID 1744 wrote to memory of 2072 1744 Ppcmfn32.exe 35 PID 1744 wrote to memory of 2072 1744 Ppcmfn32.exe 35 PID 1744 wrote to memory of 2072 1744 Ppcmfn32.exe 35 PID 2072 wrote to memory of 2188 2072 Pdecoa32.exe 36 PID 2072 wrote to memory of 2188 2072 Pdecoa32.exe 36 PID 2072 wrote to memory of 2188 2072 Pdecoa32.exe 36 PID 2072 wrote to memory of 2188 2072 Pdecoa32.exe 36 PID 2188 wrote to memory of 816 2188 Pfflql32.exe 37 PID 2188 wrote to memory of 816 2188 Pfflql32.exe 37 PID 2188 wrote to memory of 816 2188 Pfflql32.exe 37 PID 2188 wrote to memory of 816 2188 Pfflql32.exe 37 PID 816 wrote to memory of 1612 816 Qanmcdlm.exe 38 PID 816 wrote to memory of 1612 816 Qanmcdlm.exe 38 PID 816 wrote to memory of 1612 816 Qanmcdlm.exe 38 PID 816 wrote to memory of 1612 816 Qanmcdlm.exe 38 PID 1612 wrote to memory of 2872 1612 Qpcjeaad.exe 39 PID 1612 wrote to memory of 2872 1612 Qpcjeaad.exe 39 PID 1612 wrote to memory of 2872 1612 Qpcjeaad.exe 39 PID 1612 wrote to memory of 2872 1612 Qpcjeaad.exe 39 PID 2872 wrote to memory of 1572 2872 Allgoa32.exe 40 PID 2872 wrote to memory of 1572 2872 Allgoa32.exe 40 PID 2872 wrote to memory of 1572 2872 Allgoa32.exe 40 PID 2872 wrote to memory of 1572 2872 Allgoa32.exe 40 PID 1572 wrote to memory of 1648 1572 Ahchdb32.exe 41 PID 1572 wrote to memory of 1648 1572 Ahchdb32.exe 41 PID 1572 wrote to memory of 1648 1572 Ahchdb32.exe 41 PID 1572 wrote to memory of 1648 1572 Ahchdb32.exe 41 PID 1648 wrote to memory of 2400 1648 Aoaill32.exe 42 PID 1648 wrote to memory of 2400 1648 Aoaill32.exe 42 PID 1648 wrote to memory of 2400 1648 Aoaill32.exe 42 PID 1648 wrote to memory of 2400 1648 Aoaill32.exe 42 PID 2400 wrote to memory of 456 2400 Bhjneadb.exe 43 PID 2400 wrote to memory of 456 2400 Bhjneadb.exe 43 PID 2400 wrote to memory of 456 2400 Bhjneadb.exe 43 PID 2400 wrote to memory of 456 2400 Bhjneadb.exe 43 PID 456 wrote to memory of 436 456 Pglojj32.exe 44 PID 456 wrote to memory of 436 456 Pglojj32.exe 44 PID 456 wrote to memory of 436 456 Pglojj32.exe 44 PID 456 wrote to memory of 436 456 Pglojj32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.aeced95c57104fd1ea89e3c1f3913150.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.aeced95c57104fd1ea89e3c1f3913150.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Nffccejb.exeC:\Windows\system32\Nffccejb.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\Nigldq32.exeC:\Windows\system32\Nigldq32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Ogliemkk.exeC:\Windows\system32\Ogliemkk.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Ofdclinq.exeC:\Windows\system32\Ofdclinq.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\Ocjpkm32.exeC:\Windows\system32\Ocjpkm32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\Ppcmfn32.exeC:\Windows\system32\Ppcmfn32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\Pdecoa32.exeC:\Windows\system32\Pdecoa32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\Pfflql32.exeC:\Windows\system32\Pfflql32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Qanmcdlm.exeC:\Windows\system32\Qanmcdlm.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\Qpcjeaad.exeC:\Windows\system32\Qpcjeaad.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\Allgoa32.exeC:\Windows\system32\Allgoa32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\Ahchdb32.exeC:\Windows\system32\Ahchdb32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\Aoaill32.exeC:\Windows\system32\Aoaill32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\Bhjneadb.exeC:\Windows\system32\Bhjneadb.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\Pglojj32.exeC:\Windows\system32\Pglojj32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\Goocenaa.exeC:\Windows\system32\Goocenaa.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:436 -
C:\Windows\SysWOW64\Ioefdpne.exeC:\Windows\system32\Ioefdpne.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2140 -
C:\Windows\SysWOW64\Ejgeogmn.exeC:\Windows\system32\Ejgeogmn.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:692 -
C:\Windows\SysWOW64\Ejiadgkl.exeC:\Windows\system32\Ejiadgkl.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:968 -
C:\Windows\SysWOW64\Edofbpja.exeC:\Windows\system32\Edofbpja.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1960 -
C:\Windows\SysWOW64\Emjjfb32.exeC:\Windows\system32\Emjjfb32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:700 -
C:\Windows\SysWOW64\Fnbmoi32.exeC:\Windows\system32\Fnbmoi32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:3028 -
C:\Windows\SysWOW64\Fpbihl32.exeC:\Windows\system32\Fpbihl32.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\Feobac32.exeC:\Windows\system32\Feobac32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1412 -
C:\Windows\SysWOW64\Gjljij32.exeC:\Windows\system32\Gjljij32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1064 -
C:\Windows\SysWOW64\Gahpkd32.exeC:\Windows\system32\Gahpkd32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2592 -
C:\Windows\SysWOW64\Gmoppefc.exeC:\Windows\system32\Gmoppefc.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2764 -
C:\Windows\SysWOW64\Ghddnnfi.exeC:\Windows\system32\Ghddnnfi.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2540 -
C:\Windows\SysWOW64\Gmamfddp.exeC:\Windows\system32\Gmamfddp.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2568 -
C:\Windows\SysWOW64\Gbnenk32.exeC:\Windows\system32\Gbnenk32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2348 -
C:\Windows\SysWOW64\Gihnkejd.exeC:\Windows\system32\Gihnkejd.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:572 -
C:\Windows\SysWOW64\Hpfoboml.exeC:\Windows\system32\Hpfoboml.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2720 -
C:\Windows\SysWOW64\Hhadgakg.exeC:\Windows\system32\Hhadgakg.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:1196 -
C:\Windows\SysWOW64\Hdhdlbpk.exeC:\Windows\system32\Hdhdlbpk.exe35⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\Hkbmil32.exeC:\Windows\system32\Hkbmil32.exe36⤵
- Executes dropped EXE
PID:956 -
C:\Windows\SysWOW64\Hhfmbq32.exeC:\Windows\system32\Hhfmbq32.exe37⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\Hginnmml.exeC:\Windows\system32\Hginnmml.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\Ipabfcdm.exeC:\Windows\system32\Ipabfcdm.exe39⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\Ikgfdlcb.exeC:\Windows\system32\Ikgfdlcb.exe40⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Ipdolbbj.exeC:\Windows\system32\Ipdolbbj.exe41⤵
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\Ikicikap.exeC:\Windows\system32\Ikicikap.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:2360 -
C:\Windows\SysWOW64\Ipfkabpg.exeC:\Windows\system32\Ipfkabpg.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:964 -
C:\Windows\SysWOW64\Ijopjhfh.exeC:\Windows\system32\Ijopjhfh.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:1808 -
C:\Windows\SysWOW64\Icgdcm32.exeC:\Windows\system32\Icgdcm32.exe45⤵
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\Ionehnbm.exeC:\Windows\system32\Ionehnbm.exe46⤵
- Executes dropped EXE
PID:1972 -
C:\Windows\SysWOW64\Ialadj32.exeC:\Windows\system32\Ialadj32.exe47⤵
- Executes dropped EXE
PID:996 -
C:\Windows\SysWOW64\Jhfjadim.exeC:\Windows\system32\Jhfjadim.exe48⤵
- Executes dropped EXE
PID:2060 -
C:\Windows\SysWOW64\Jdmjfe32.exeC:\Windows\system32\Jdmjfe32.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2032 -
C:\Windows\SysWOW64\Jldbgb32.exeC:\Windows\system32\Jldbgb32.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\Jbakpi32.exeC:\Windows\system32\Jbakpi32.exe51⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\Joekimld.exeC:\Windows\system32\Joekimld.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1480 -
C:\Windows\SysWOW64\Jqfhqe32.exeC:\Windows\system32\Jqfhqe32.exe53⤵
- Executes dropped EXE
PID:1836 -
C:\Windows\SysWOW64\Jgppmpjp.exeC:\Windows\system32\Jgppmpjp.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\Jqhdfe32.exeC:\Windows\system32\Jqhdfe32.exe55⤵
- Executes dropped EXE
PID:2560 -
C:\Windows\SysWOW64\Jknicnpf.exeC:\Windows\system32\Jknicnpf.exe56⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\Kcimhpma.exeC:\Windows\system32\Kcimhpma.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:800 -
C:\Windows\SysWOW64\Kqokgd32.exeC:\Windows\system32\Kqokgd32.exe58⤵
- Executes dropped EXE
PID:2384 -
C:\Windows\SysWOW64\Kflcok32.exeC:\Windows\system32\Kflcok32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:112 -
C:\Windows\SysWOW64\Kmfklepl.exeC:\Windows\system32\Kmfklepl.exe60⤵
- Executes dropped EXE
PID:1996 -
C:\Windows\SysWOW64\Kbcddlnd.exeC:\Windows\system32\Kbcddlnd.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\Kmhhae32.exeC:\Windows\system32\Kmhhae32.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:1364 -
C:\Windows\SysWOW64\Kfaljjdj.exeC:\Windows\system32\Kfaljjdj.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1660 -
C:\Windows\SysWOW64\Lnlaomae.exeC:\Windows\system32\Lnlaomae.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\Llpaha32.exeC:\Windows\system32\Llpaha32.exe65⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\Lehfafgp.exeC:\Windows\system32\Lehfafgp.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2156 -
C:\Windows\SysWOW64\Lnqkjl32.exeC:\Windows\system32\Lnqkjl32.exe67⤵
- Drops file in System32 directory
PID:1172 -
C:\Windows\SysWOW64\Lekcffem.exeC:\Windows\system32\Lekcffem.exe68⤵
- Drops file in System32 directory
PID:852 -
C:\Windows\SysWOW64\Laackgka.exeC:\Windows\system32\Laackgka.exe69⤵PID:2144
-
C:\Windows\SysWOW64\Ljjhdm32.exeC:\Windows\system32\Ljjhdm32.exe70⤵PID:1932
-
C:\Windows\SysWOW64\Mmmnkglp.exeC:\Windows\system32\Mmmnkglp.exe71⤵PID:2240
-
C:\Windows\SysWOW64\Monjcp32.exeC:\Windows\system32\Monjcp32.exe72⤵
- Modifies registry class
PID:1312 -
C:\Windows\SysWOW64\Mehbpjjk.exeC:\Windows\system32\Mehbpjjk.exe73⤵PID:584
-
C:\Windows\SysWOW64\Mlbkmdah.exeC:\Windows\system32\Mlbkmdah.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1628 -
C:\Windows\SysWOW64\Mifkfhpa.exeC:\Windows\system32\Mifkfhpa.exe75⤵PID:2368
-
C:\Windows\SysWOW64\Imkndofe.exeC:\Windows\system32\Imkndofe.exe76⤵
- Drops file in System32 directory
PID:676 -
C:\Windows\SysWOW64\Phoeomjc.exeC:\Windows\system32\Phoeomjc.exe77⤵PID:1924
-
C:\Windows\SysWOW64\Ibhieo32.exeC:\Windows\system32\Ibhieo32.exe78⤵PID:772
-
C:\Windows\SysWOW64\Faimkd32.exeC:\Windows\system32\Faimkd32.exe79⤵PID:2172
-
C:\Windows\SysWOW64\Fgffck32.exeC:\Windows\system32\Fgffck32.exe80⤵PID:1360
-
C:\Windows\SysWOW64\Fdjfmolo.exeC:\Windows\system32\Fdjfmolo.exe81⤵
- Drops file in System32 directory
PID:1092 -
C:\Windows\SysWOW64\Fkdoii32.exeC:\Windows\system32\Fkdoii32.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1248 -
C:\Windows\SysWOW64\Gpagbp32.exeC:\Windows\system32\Gpagbp32.exe83⤵
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\Gcapckod.exeC:\Windows\system32\Gcapckod.exe84⤵
- Drops file in System32 directory
PID:848 -
C:\Windows\SysWOW64\Gpfpmonn.exeC:\Windows\system32\Gpfpmonn.exe85⤵
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\Gllabp32.exeC:\Windows\system32\Gllabp32.exe86⤵PID:1652
-
C:\Windows\SysWOW64\Gcfioj32.exeC:\Windows\system32\Gcfioj32.exe87⤵PID:2236
-
C:\Windows\SysWOW64\Ghcbga32.exeC:\Windows\system32\Ghcbga32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2136 -
C:\Windows\SysWOW64\Gcifdj32.exeC:\Windows\system32\Gcifdj32.exe89⤵
- Modifies registry class
PID:1940 -
C:\Windows\SysWOW64\Gdjblboj.exeC:\Windows\system32\Gdjblboj.exe90⤵PID:844
-
C:\Windows\SysWOW64\Hdloab32.exeC:\Windows\system32\Hdloab32.exe91⤵
- Drops file in System32 directory
PID:2996 -
C:\Windows\SysWOW64\Hobcok32.exeC:\Windows\system32\Hobcok32.exe92⤵PID:1624
-
C:\Windows\SysWOW64\Hcfenn32.exeC:\Windows\system32\Hcfenn32.exe93⤵PID:2760
-
C:\Windows\SysWOW64\Hjpnjheg.exeC:\Windows\system32\Hjpnjheg.exe94⤵
- Modifies registry class
PID:1108 -
C:\Windows\SysWOW64\Homfboco.exeC:\Windows\system32\Homfboco.exe95⤵PID:2212
-
C:\Windows\SysWOW64\Iiekkdjo.exeC:\Windows\system32\Iiekkdjo.exe96⤵PID:3064
-
C:\Windows\SysWOW64\Ikfdmogp.exeC:\Windows\system32\Ikfdmogp.exe97⤵PID:3052
-
C:\Windows\SysWOW64\Icmlnmgb.exeC:\Windows\system32\Icmlnmgb.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2536 -
C:\Windows\SysWOW64\Imepgbnc.exeC:\Windows\system32\Imepgbnc.exe99⤵PID:2004
-
C:\Windows\SysWOW64\Ifndph32.exeC:\Windows\system32\Ifndph32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1212 -
C:\Windows\SysWOW64\Igoagpja.exeC:\Windows\system32\Igoagpja.exe101⤵PID:2764
-
C:\Windows\SysWOW64\Iaheqe32.exeC:\Windows\system32\Iaheqe32.exe102⤵
- Drops file in System32 directory
PID:2276 -
C:\Windows\SysWOW64\Jchobqnc.exeC:\Windows\system32\Jchobqnc.exe103⤵
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\Jjbgok32.exeC:\Windows\system32\Jjbgok32.exe104⤵
- Drops file in System32 directory
- Modifies registry class
PID:996 -
C:\Windows\SysWOW64\Jaolad32.exeC:\Windows\system32\Jaolad32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2992 -
C:\Windows\SysWOW64\Jijqeg32.exeC:\Windows\system32\Jijqeg32.exe106⤵PID:1088
-
C:\Windows\SysWOW64\Jfnaok32.exeC:\Windows\system32\Jfnaok32.exe107⤵PID:2952
-
C:\Windows\SysWOW64\Jilmkffb.exeC:\Windows\system32\Jilmkffb.exe108⤵
- Drops file in System32 directory
PID:2396 -
C:\Windows\SysWOW64\Jcaahofh.exeC:\Windows\system32\Jcaahofh.exe109⤵PID:2632
-
C:\Windows\SysWOW64\Kiojqfdp.exeC:\Windows\system32\Kiojqfdp.exe110⤵
- Modifies registry class
PID:580 -
C:\Windows\SysWOW64\Jjjohbgl.exeC:\Windows\system32\Jjjohbgl.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3000 -
C:\Windows\SysWOW64\Jimodo32.exeC:\Windows\system32\Jimodo32.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2580 -
C:\Windows\SysWOW64\Kcbcah32.exeC:\Windows\system32\Kcbcah32.exe113⤵PID:2724
-
C:\Windows\SysWOW64\Kecpipck.exeC:\Windows\system32\Kecpipck.exe114⤵PID:2708
-
C:\Windows\SysWOW64\Kkmhej32.exeC:\Windows\system32\Kkmhej32.exe115⤵PID:1368
-
C:\Windows\SysWOW64\Kfcmcckn.exeC:\Windows\system32\Kfcmcckn.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2000 -
C:\Windows\SysWOW64\Kkpekjie.exeC:\Windows\system32\Kkpekjie.exe117⤵PID:2028
-
C:\Windows\SysWOW64\Kbjmhd32.exeC:\Windows\system32\Kbjmhd32.exe118⤵PID:1724
-
C:\Windows\SysWOW64\Kkbbqjgb.exeC:\Windows\system32\Kkbbqjgb.exe119⤵
- Drops file in System32 directory
PID:2296 -
C:\Windows\SysWOW64\Knqnmeff.exeC:\Windows\system32\Knqnmeff.exe120⤵PID:2324
-
C:\Windows\SysWOW64\Kejfio32.exeC:\Windows\system32\Kejfio32.exe121⤵
- Drops file in System32 directory
PID:2388 -
C:\Windows\SysWOW64\Kmeknakn.exeC:\Windows\system32\Kmeknakn.exe122⤵PID:1468
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-