Analysis
-
max time kernel
275s -
max time network
319s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 18:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe
Resource
win7-20230831-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe
-
Size
79KB
-
MD5
90ad8ad87099e1b5d0d94ad5b96f32d0
-
SHA1
97b0de4d5af405004979b52555ca75d17706e45c
-
SHA256
321d241cc3e1ee20a3a353f4c1c212178d9e149eba06f22987ea4b6f0b769e34
-
SHA512
16199eda2c3226288d820d339e2a3f148bb096df30778490b5b41c487da1094f2a894557fc60802b2c97b6ca267e5624f0f42a91efeed8de4964dfe134038c72
-
SSDEEP
1536:044zwPolfpN/wo0u9hTwlhQUE+iFkSIgiItKq9v6DK:6wP+xN/95mhQUE+ixtBtKq9vV
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dngaahan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dqemmcqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffihelkm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmgjmfod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmgjmfod.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fiqggfbf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggmnoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbkgqgpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glgcec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Coadpkmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfeipc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idabbpgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbbeomon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbbodk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbkgqgpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fnppfjlo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmgfli32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Odcmagip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pieodn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Blghhahp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epfjjnkl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnqndf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eihkfaed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbpplglj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Epfjjnkl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdmhnqjf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iiddoo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eobgiien.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lnpejklj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Obgoppog.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghdkgpfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkgpnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhaqld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajladp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpcicapk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Milcphgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcddca32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cccmjkmj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbgqje32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djgoigki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cngebd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccfjpkkg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dninfgol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daojqa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbfpcl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldchff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pajjpk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cngebd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dninfgol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjpble32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cheoma32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpnniink.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gnacogeg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggihhm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaolee32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lohlcoid.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdlccoje.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpeanp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbkhelgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Elogdoon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lbieejff.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pieodn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aigcgc32.exe -
Executes dropped EXE 64 IoCs
pid Process 2784 Glgcec32.exe 2432 Ipqmgbbf.exe 2496 Ihhehoci.exe 2696 Iapjad32.exe 1912 Iikneggd.exe 1732 Idabbpgj.exe 1792 Jbfpcl32.exe 2580 Lbbodk32.exe 792 Lhlgaedj.exe 1512 Ldchff32.exe 268 Lohlcoid.exe 1452 Lhaqld32.exe 388 Lbieejff.exe 2320 Lnpejklj.exe 1524 Mqqolfik.exe 2000 Milcphgf.exe 952 Mbdhinmf.exe 2976 Mcddca32.exe 2436 Ofgfio32.exe 1744 Olcoaf32.exe 984 Oigokj32.exe 1508 Okkhhb32.exe 1476 Odcmagip.exe 864 Pagmjlhj.exe 936 Pgdfbb32.exe 3040 Pajjpk32.exe 2744 Pieodn32.exe 1564 Ajladp32.exe 1184 Fcfmacce.exe 2864 Ahamdk32.exe 1096 Aibjlcli.exe 1648 Abjnei32.exe 1652 Aidfacjf.exe 1712 Abmkjiqg.exe 2492 Aigcgc32.exe 292 Aocloj32.exe 2272 Afkcqg32.exe 112 Alglin32.exe 1444 Bdlccoje.exe 2016 Bkflpi32.exe 1896 Blghhahp.exe 1052 Bdopiohb.exe 2032 Cgmmejgf.exe 1616 Cngebd32.exe 1004 Cpeanp32.exe 824 Cccmjkmj.exe 1908 Cjnege32.exe 2464 Chqfbbka.exe 1756 Cphncpld.exe 1500 Ccfjpkkg.exe 1972 Cfdflfjk.exe 684 Cjpble32.exe 2600 Ckaodmhb.exe 1960 Cbkgqgpo.exe 2200 Cheoma32.exe 2532 Cgjlonld.exe 2828 Coadpkmf.exe 1140 Dbpplglj.exe 1056 Ddnmhb32.exe 2000 Dkhedlbj.exe 2800 Dngaahan.exe 2588 Dqemmcqb.exe 2904 Dgoejm32.exe 2036 Dninfgol.exe -
Loads dropped DLL 64 IoCs
pid Process 2804 NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe 2804 NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe 2784 Glgcec32.exe 2784 Glgcec32.exe 2432 Ipqmgbbf.exe 2432 Ipqmgbbf.exe 2496 Ihhehoci.exe 2496 Ihhehoci.exe 2696 Iapjad32.exe 2696 Iapjad32.exe 1912 Iikneggd.exe 1912 Iikneggd.exe 1732 Idabbpgj.exe 1732 Idabbpgj.exe 1792 Jbfpcl32.exe 1792 Jbfpcl32.exe 2580 Lbbodk32.exe 2580 Lbbodk32.exe 792 Lhlgaedj.exe 792 Lhlgaedj.exe 1512 Ldchff32.exe 1512 Ldchff32.exe 268 Lohlcoid.exe 268 Lohlcoid.exe 1452 Lhaqld32.exe 1452 Lhaqld32.exe 388 Lbieejff.exe 388 Lbieejff.exe 2320 Lnpejklj.exe 2320 Lnpejklj.exe 1524 Mqqolfik.exe 1524 Mqqolfik.exe 2000 Milcphgf.exe 2000 Milcphgf.exe 952 Mbdhinmf.exe 952 Mbdhinmf.exe 2976 Mcddca32.exe 2976 Mcddca32.exe 2436 Ofgfio32.exe 2436 Ofgfio32.exe 1744 Olcoaf32.exe 1744 Olcoaf32.exe 984 Oigokj32.exe 984 Oigokj32.exe 1508 Okkhhb32.exe 1508 Okkhhb32.exe 1476 Odcmagip.exe 1476 Odcmagip.exe 864 Pagmjlhj.exe 864 Pagmjlhj.exe 936 Pgdfbb32.exe 936 Pgdfbb32.exe 3040 Pajjpk32.exe 3040 Pajjpk32.exe 2744 Pieodn32.exe 2744 Pieodn32.exe 1564 Ajladp32.exe 1564 Ajladp32.exe 1184 Fcfmacce.exe 1184 Fcfmacce.exe 2864 Ahamdk32.exe 2864 Ahamdk32.exe 1096 Aibjlcli.exe 1096 Aibjlcli.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Fnppfjlo.exe Ffihelkm.exe File created C:\Windows\SysWOW64\Iiddoo32.exe Hlcimd32.exe File created C:\Windows\SysWOW64\Efqpmj32.dll Cicelo32.exe File created C:\Windows\SysWOW64\Chinqc32.dll Ckmhmkjg.exe File opened for modification C:\Windows\SysWOW64\Ldchff32.exe Lhlgaedj.exe File created C:\Windows\SysWOW64\Hbglgj32.dll Ofgfio32.exe File opened for modification C:\Windows\SysWOW64\Cheoma32.exe Cbkgqgpo.exe File created C:\Windows\SysWOW64\Jaglqfnl.dll Cheoma32.exe File created C:\Windows\SysWOW64\Gbpkin32.dll Elkanl32.exe File created C:\Windows\SysWOW64\Paahkd32.dll Ebqpogld.exe File created C:\Windows\SysWOW64\Bdopiohb.exe Blghhahp.exe File opened for modification C:\Windows\SysWOW64\Elmjoo32.exe Eagfaf32.exe File created C:\Windows\SysWOW64\Qkdnehoo.dll Gkfmjndo.exe File opened for modification C:\Windows\SysWOW64\Dkhedlbj.exe Ddnmhb32.exe File created C:\Windows\SysWOW64\Dqhchg32.dll Ehklbn32.exe File created C:\Windows\SysWOW64\Ebbfmj32.dll Fbfojl32.exe File opened for modification C:\Windows\SysWOW64\Odcmagip.exe Okkhhb32.exe File created C:\Windows\SysWOW64\Mpghiiee.dll Cjnege32.exe File created C:\Windows\SysWOW64\Nekjkl32.dll Dqemmcqb.exe File created C:\Windows\SysWOW64\Olcoaf32.exe Ofgfio32.exe File opened for modification C:\Windows\SysWOW64\Ljfcgofh.exe Iiddoo32.exe File created C:\Windows\SysWOW64\Idabbpgj.exe Iikneggd.exe File opened for modification C:\Windows\SysWOW64\Cfdflfjk.exe Ccfjpkkg.exe File created C:\Windows\SysWOW64\Kocghahh.dll Eihkfaed.exe File opened for modification C:\Windows\SysWOW64\Elidhm32.exe Eijhla32.exe File created C:\Windows\SysWOW64\Hjkgob32.dll Mbdhinmf.exe File created C:\Windows\SysWOW64\Knjkngmn.dll Afkcqg32.exe File created C:\Windows\SysWOW64\Dkhedlbj.exe Ddnmhb32.exe File created C:\Windows\SysWOW64\Kgimdj32.dll Cphncpld.exe File created C:\Windows\SysWOW64\Galllipa.exe Gpjodq32.exe File opened for modification C:\Windows\SysWOW64\Fiqggfbf.exe Fbfojl32.exe File created C:\Windows\SysWOW64\Gdanhchm.exe Gmgfli32.exe File opened for modification C:\Windows\SysWOW64\Iiddoo32.exe Hlcimd32.exe File opened for modification C:\Windows\SysWOW64\Lhaqld32.exe Lohlcoid.exe File opened for modification C:\Windows\SysWOW64\Oigokj32.exe Olcoaf32.exe File opened for modification C:\Windows\SysWOW64\Fjgakkac.exe Fdmhnqjf.exe File created C:\Windows\SysWOW64\Jgeabpog.dll Faqihe32.exe File created C:\Windows\SysWOW64\Ipqmgbbf.exe Glgcec32.exe File created C:\Windows\SysWOW64\Ahamdk32.exe Fcfmacce.exe File created C:\Windows\SysWOW64\Dppjoe32.dll Glapia32.exe File created C:\Windows\SysWOW64\Iphdha32.dll Lhaqld32.exe File created C:\Windows\SysWOW64\Afkcqg32.exe Aocloj32.exe File opened for modification C:\Windows\SysWOW64\Gaqefh32.exe Gkfmjndo.exe File opened for modification C:\Windows\SysWOW64\Cgjlonld.exe Cheoma32.exe File opened for modification C:\Windows\SysWOW64\Fbbeomon.exe Fpcicapk.exe File opened for modification C:\Windows\SysWOW64\Gaolee32.exe Goqpij32.exe File created C:\Windows\SysWOW64\Hgfnbp32.dll Oigokj32.exe File created C:\Windows\SysWOW64\Adoafo32.dll Ahamdk32.exe File opened for modification C:\Windows\SysWOW64\Aocloj32.exe Aigcgc32.exe File opened for modification C:\Windows\SysWOW64\Gkfmjndo.exe Gdlemd32.exe File opened for modification C:\Windows\SysWOW64\Gdanhchm.exe Gmgfli32.exe File created C:\Windows\SysWOW64\Elkanl32.exe Eeaiabie.exe File opened for modification C:\Windows\SysWOW64\Idabbpgj.exe Iikneggd.exe File created C:\Windows\SysWOW64\Fjgakkac.exe Fdmhnqjf.exe File created C:\Windows\SysWOW64\Fbfojl32.exe Fmgjmfod.exe File opened for modification C:\Windows\SysWOW64\Djgoigki.exe Difbbo32.exe File opened for modification C:\Windows\SysWOW64\Elkanl32.exe Eeaiabie.exe File created C:\Windows\SysWOW64\Gkgpnk32.exe Ghidbp32.exe File created C:\Windows\SysWOW64\Ebbipj32.exe Elhacpef.exe File opened for modification C:\Windows\SysWOW64\Fdmhnqjf.exe Fanlbekb.exe File opened for modification C:\Windows\SysWOW64\Cbgqje32.exe Ckmhmkjg.exe File created C:\Windows\SysWOW64\Dnqndf32.exe Dpnniink.exe File opened for modification C:\Windows\SysWOW64\Aigcgc32.exe Abmkjiqg.exe File created C:\Windows\SysWOW64\Cheoma32.exe Cbkgqgpo.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2852 3012 WerFault.exe 167 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mcddca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ooopdfdc.dll" Daojqa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdjimk32.dll" Eacpkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pqikgqei.dll" Elidhm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idabbpgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ocfjnb32.dll" Milcphgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijpmdg32.dll" Dgoejm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Elidhm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eeaiabie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iploja32.dll" Idabbpgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Joopob32.dll" Ldchff32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddcfca32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Epfjjnkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdmlne32.dll" Aigcgc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Elhacpef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cicelo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gnacogeg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggihhm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnpejklj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oigokj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kqbdpb32.dll" Pieodn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmnkgddc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okhbph32.dll" Okkhhb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oinldeif.dll" Pajjpk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gbkhelgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdjdpb32.dll" Cfeipc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ijndni32.dll" Ajladp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hgddbh32.dll" Dninfgol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iiddoo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpnniink.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nadbgo32.dll" Odcmagip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Alglin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iikneggd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pajjpk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Elkanl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Abjnei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Goknbb32.dll" Ljfcgofh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eogqdh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Glgcec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opdncfjn.dll" Ffihelkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chinqc32.dll" Ckmhmkjg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Genpkk32.dll" Cpeanp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cphncpld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebgbkihn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Glgcec32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcebjedc.dll" Cccmjkmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fanlbekb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eacpkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbaohl32.dll" Fcfmacce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdb32.dll" Alglin32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Elogdoon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbgqje32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djgoigki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ofgfio32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbfpcl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blghhahp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbjjopna.dll" Cgmmejgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nljgqoao.dll" Eeeogdga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dppjoe32.dll" Glapia32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cicelo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dknbnelh.dll" Iapjad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lhlgaedj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mqqolfik.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2784 2804 NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe 27 PID 2804 wrote to memory of 2784 2804 NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe 27 PID 2804 wrote to memory of 2784 2804 NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe 27 PID 2804 wrote to memory of 2784 2804 NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe 27 PID 2784 wrote to memory of 2432 2784 Glgcec32.exe 28 PID 2784 wrote to memory of 2432 2784 Glgcec32.exe 28 PID 2784 wrote to memory of 2432 2784 Glgcec32.exe 28 PID 2784 wrote to memory of 2432 2784 Glgcec32.exe 28 PID 2432 wrote to memory of 2496 2432 Ipqmgbbf.exe 29 PID 2432 wrote to memory of 2496 2432 Ipqmgbbf.exe 29 PID 2432 wrote to memory of 2496 2432 Ipqmgbbf.exe 29 PID 2432 wrote to memory of 2496 2432 Ipqmgbbf.exe 29 PID 2496 wrote to memory of 2696 2496 Ihhehoci.exe 30 PID 2496 wrote to memory of 2696 2496 Ihhehoci.exe 30 PID 2496 wrote to memory of 2696 2496 Ihhehoci.exe 30 PID 2496 wrote to memory of 2696 2496 Ihhehoci.exe 30 PID 2696 wrote to memory of 1912 2696 Iapjad32.exe 32 PID 2696 wrote to memory of 1912 2696 Iapjad32.exe 32 PID 2696 wrote to memory of 1912 2696 Iapjad32.exe 32 PID 2696 wrote to memory of 1912 2696 Iapjad32.exe 32 PID 1912 wrote to memory of 1732 1912 Iikneggd.exe 31 PID 1912 wrote to memory of 1732 1912 Iikneggd.exe 31 PID 1912 wrote to memory of 1732 1912 Iikneggd.exe 31 PID 1912 wrote to memory of 1732 1912 Iikneggd.exe 31 PID 1732 wrote to memory of 1792 1732 Idabbpgj.exe 33 PID 1732 wrote to memory of 1792 1732 Idabbpgj.exe 33 PID 1732 wrote to memory of 1792 1732 Idabbpgj.exe 33 PID 1732 wrote to memory of 1792 1732 Idabbpgj.exe 33 PID 1792 wrote to memory of 2580 1792 Jbfpcl32.exe 34 PID 1792 wrote to memory of 2580 1792 Jbfpcl32.exe 34 PID 1792 wrote to memory of 2580 1792 Jbfpcl32.exe 34 PID 1792 wrote to memory of 2580 1792 Jbfpcl32.exe 34 PID 2580 wrote to memory of 792 2580 Lbbodk32.exe 35 PID 2580 wrote to memory of 792 2580 Lbbodk32.exe 35 PID 2580 wrote to memory of 792 2580 Lbbodk32.exe 35 PID 2580 wrote to memory of 792 2580 Lbbodk32.exe 35 PID 792 wrote to memory of 1512 792 Lhlgaedj.exe 36 PID 792 wrote to memory of 1512 792 Lhlgaedj.exe 36 PID 792 wrote to memory of 1512 792 Lhlgaedj.exe 36 PID 792 wrote to memory of 1512 792 Lhlgaedj.exe 36 PID 1512 wrote to memory of 268 1512 Ldchff32.exe 37 PID 1512 wrote to memory of 268 1512 Ldchff32.exe 37 PID 1512 wrote to memory of 268 1512 Ldchff32.exe 37 PID 1512 wrote to memory of 268 1512 Ldchff32.exe 37 PID 268 wrote to memory of 1452 268 Lohlcoid.exe 38 PID 268 wrote to memory of 1452 268 Lohlcoid.exe 38 PID 268 wrote to memory of 1452 268 Lohlcoid.exe 38 PID 268 wrote to memory of 1452 268 Lohlcoid.exe 38 PID 1452 wrote to memory of 388 1452 Lhaqld32.exe 39 PID 1452 wrote to memory of 388 1452 Lhaqld32.exe 39 PID 1452 wrote to memory of 388 1452 Lhaqld32.exe 39 PID 1452 wrote to memory of 388 1452 Lhaqld32.exe 39 PID 388 wrote to memory of 2320 388 Lbieejff.exe 40 PID 388 wrote to memory of 2320 388 Lbieejff.exe 40 PID 388 wrote to memory of 2320 388 Lbieejff.exe 40 PID 388 wrote to memory of 2320 388 Lbieejff.exe 40 PID 2320 wrote to memory of 1524 2320 Lnpejklj.exe 41 PID 2320 wrote to memory of 1524 2320 Lnpejklj.exe 41 PID 2320 wrote to memory of 1524 2320 Lnpejklj.exe 41 PID 2320 wrote to memory of 1524 2320 Lnpejklj.exe 41 PID 1524 wrote to memory of 2000 1524 Mqqolfik.exe 42 PID 1524 wrote to memory of 2000 1524 Mqqolfik.exe 42 PID 1524 wrote to memory of 2000 1524 Mqqolfik.exe 42 PID 1524 wrote to memory of 2000 1524 Mqqolfik.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.90ad8ad87099e1b5d0d94ad5b96f32d0.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Glgcec32.exeC:\Windows\system32\Glgcec32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Ipqmgbbf.exeC:\Windows\system32\Ipqmgbbf.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\Ihhehoci.exeC:\Windows\system32\Ihhehoci.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\Iapjad32.exeC:\Windows\system32\Iapjad32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Iikneggd.exeC:\Windows\system32\Iikneggd.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1912
-
-
-
-
-
-
C:\Windows\SysWOW64\Idabbpgj.exeC:\Windows\system32\Idabbpgj.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\Jbfpcl32.exeC:\Windows\system32\Jbfpcl32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\Lbbodk32.exeC:\Windows\system32\Lbbodk32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\Lhlgaedj.exeC:\Windows\system32\Lhlgaedj.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\Ldchff32.exeC:\Windows\system32\Ldchff32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\Lohlcoid.exeC:\Windows\system32\Lohlcoid.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\Lhaqld32.exeC:\Windows\system32\Lhaqld32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\Lbieejff.exeC:\Windows\system32\Lbieejff.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\Lnpejklj.exeC:\Windows\system32\Lnpejklj.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Mqqolfik.exeC:\Windows\system32\Mqqolfik.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\Milcphgf.exeC:\Windows\system32\Milcphgf.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2000 -
C:\Windows\SysWOW64\Mbdhinmf.exeC:\Windows\system32\Mbdhinmf.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:952 -
C:\Windows\SysWOW64\Mcddca32.exeC:\Windows\system32\Mcddca32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2976 -
C:\Windows\SysWOW64\Ofgfio32.exeC:\Windows\system32\Ofgfio32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2436 -
C:\Windows\SysWOW64\Olcoaf32.exeC:\Windows\system32\Olcoaf32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1744 -
C:\Windows\SysWOW64\Oigokj32.exeC:\Windows\system32\Oigokj32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:984 -
C:\Windows\SysWOW64\Okkhhb32.exeC:\Windows\system32\Okkhhb32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1508 -
C:\Windows\SysWOW64\Odcmagip.exeC:\Windows\system32\Odcmagip.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1476 -
C:\Windows\SysWOW64\Pagmjlhj.exeC:\Windows\system32\Pagmjlhj.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:864 -
C:\Windows\SysWOW64\Pgdfbb32.exeC:\Windows\system32\Pgdfbb32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:936 -
C:\Windows\SysWOW64\Pajjpk32.exeC:\Windows\system32\Pajjpk32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Pieodn32.exeC:\Windows\system32\Pieodn32.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2744 -
C:\Windows\SysWOW64\Ajladp32.exeC:\Windows\system32\Ajladp32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1564 -
C:\Windows\SysWOW64\Fcfmacce.exeC:\Windows\system32\Fcfmacce.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1184 -
C:\Windows\SysWOW64\Ahamdk32.exeC:\Windows\system32\Ahamdk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\Aibjlcli.exeC:\Windows\system32\Aibjlcli.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1096 -
C:\Windows\SysWOW64\Abjnei32.exeC:\Windows\system32\Abjnei32.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1648 -
C:\Windows\SysWOW64\Aidfacjf.exeC:\Windows\system32\Aidfacjf.exe28⤵
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\Abmkjiqg.exeC:\Windows\system32\Abmkjiqg.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1712 -
C:\Windows\SysWOW64\Aigcgc32.exeC:\Windows\system32\Aigcgc32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\Aocloj32.exeC:\Windows\system32\Aocloj32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:292 -
C:\Windows\SysWOW64\Afkcqg32.exeC:\Windows\system32\Afkcqg32.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2272 -
C:\Windows\SysWOW64\Alglin32.exeC:\Windows\system32\Alglin32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:112 -
C:\Windows\SysWOW64\Bdlccoje.exeC:\Windows\system32\Bdlccoje.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1444 -
C:\Windows\SysWOW64\Bkflpi32.exeC:\Windows\system32\Bkflpi32.exe35⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\Blghhahp.exeC:\Windows\system32\Blghhahp.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1896 -
C:\Windows\SysWOW64\Bdopiohb.exeC:\Windows\system32\Bdopiohb.exe37⤵
- Executes dropped EXE
PID:1052 -
C:\Windows\SysWOW64\Cgmmejgf.exeC:\Windows\system32\Cgmmejgf.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\Cngebd32.exeC:\Windows\system32\Cngebd32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Cpeanp32.exeC:\Windows\system32\Cpeanp32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Cccmjkmj.exeC:\Windows\system32\Cccmjkmj.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:824 -
C:\Windows\SysWOW64\Cjnege32.exeC:\Windows\system32\Cjnege32.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1908 -
C:\Windows\SysWOW64\Chqfbbka.exeC:\Windows\system32\Chqfbbka.exe43⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\Cphncpld.exeC:\Windows\system32\Cphncpld.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\Ccfjpkkg.exeC:\Windows\system32\Ccfjpkkg.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\Cfdflfjk.exeC:\Windows\system32\Cfdflfjk.exe46⤵
- Executes dropped EXE
PID:1972 -
C:\Windows\SysWOW64\Cjpble32.exeC:\Windows\system32\Cjpble32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:684 -
C:\Windows\SysWOW64\Ckaodmhb.exeC:\Windows\system32\Ckaodmhb.exe48⤵
- Executes dropped EXE
PID:2600 -
C:\Windows\SysWOW64\Cbkgqgpo.exeC:\Windows\system32\Cbkgqgpo.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1960 -
C:\Windows\SysWOW64\Cheoma32.exeC:\Windows\system32\Cheoma32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\Cgjlonld.exeC:\Windows\system32\Cgjlonld.exe51⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\Coadpkmf.exeC:\Windows\system32\Coadpkmf.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\Dbpplglj.exeC:\Windows\system32\Dbpplglj.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1140 -
C:\Windows\SysWOW64\Ddnmhb32.exeC:\Windows\system32\Ddnmhb32.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1056 -
C:\Windows\SysWOW64\Dkhedlbj.exeC:\Windows\system32\Dkhedlbj.exe55⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\Dngaahan.exeC:\Windows\system32\Dngaahan.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Dqemmcqb.exeC:\Windows\system32\Dqemmcqb.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\Dgoejm32.exeC:\Windows\system32\Dgoejm32.exe58⤵
- Executes dropped EXE
- Modifies registry class
PID:2904 -
C:\Windows\SysWOW64\Dninfgol.exeC:\Windows\system32\Dninfgol.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2036 -
C:\Windows\SysWOW64\Ddcfca32.exeC:\Windows\system32\Ddcfca32.exe60⤵
- Modifies registry class
PID:2476 -
C:\Windows\SysWOW64\Dfdbkj32.exeC:\Windows\system32\Dfdbkj32.exe61⤵PID:2988
-
C:\Windows\SysWOW64\Dmnkgddc.exeC:\Windows\system32\Dmnkgddc.exe62⤵
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\Elhacpef.exeC:\Windows\system32\Elhacpef.exe63⤵
- Drops file in System32 directory
- Modifies registry class
PID:2316 -
C:\Windows\SysWOW64\Ebbipj32.exeC:\Windows\system32\Ebbipj32.exe64⤵PID:2056
-
C:\Windows\SysWOW64\Eilamd32.exeC:\Windows\system32\Eilamd32.exe65⤵PID:1188
-
C:\Windows\SysWOW64\Epfjjnkl.exeC:\Windows\system32\Epfjjnkl.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\Eagfaf32.exeC:\Windows\system32\Eagfaf32.exe67⤵
- Drops file in System32 directory
PID:2992 -
C:\Windows\SysWOW64\Elmjoo32.exeC:\Windows\system32\Elmjoo32.exe68⤵PID:928
-
C:\Windows\SysWOW64\Ebgbkihn.exeC:\Windows\system32\Ebgbkihn.exe69⤵
- Modifies registry class
PID:320 -
C:\Windows\SysWOW64\Eeeogdga.exeC:\Windows\system32\Eeeogdga.exe70⤵
- Modifies registry class
PID:2456 -
C:\Windows\SysWOW64\Elogdoon.exeC:\Windows\system32\Elogdoon.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3048 -
C:\Windows\SysWOW64\Ealpmeme.exeC:\Windows\system32\Ealpmeme.exe72⤵PID:1572
-
C:\Windows\SysWOW64\Ffihelkm.exeC:\Windows\system32\Ffihelkm.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Fnppfjlo.exeC:\Windows\system32\Fnppfjlo.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2180 -
C:\Windows\SysWOW64\Fanlbekb.exeC:\Windows\system32\Fanlbekb.exe75⤵
- Drops file in System32 directory
- Modifies registry class
PID:2220 -
C:\Windows\SysWOW64\Fdmhnqjf.exeC:\Windows\system32\Fdmhnqjf.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2656 -
C:\Windows\SysWOW64\Fjgakkac.exeC:\Windows\system32\Fjgakkac.exe77⤵PID:1604
-
C:\Windows\SysWOW64\Faqihe32.exeC:\Windows\system32\Faqihe32.exe78⤵
- Drops file in System32 directory
PID:2984 -
C:\Windows\SysWOW64\Fpcicapk.exeC:\Windows\system32\Fpcicapk.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2572 -
C:\Windows\SysWOW64\Fbbeomon.exeC:\Windows\system32\Fbbeomon.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3016 -
C:\Windows\SysWOW64\Fmgjmfod.exeC:\Windows\system32\Fmgjmfod.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2064 -
C:\Windows\SysWOW64\Fbfojl32.exeC:\Windows\system32\Fbfojl32.exe82⤵
- Drops file in System32 directory
PID:2576 -
C:\Windows\SysWOW64\Fiqggfbf.exeC:\Windows\system32\Fiqggfbf.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1744 -
C:\Windows\SysWOW64\Gpjodq32.exeC:\Windows\system32\Gpjodq32.exe84⤵
- Drops file in System32 directory
PID:2300 -
C:\Windows\SysWOW64\Galllipa.exeC:\Windows\system32\Galllipa.exe85⤵PID:2868
-
C:\Windows\SysWOW64\Glapia32.exeC:\Windows\system32\Glapia32.exe86⤵
- Drops file in System32 directory
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Gbkhelgc.exeC:\Windows\system32\Gbkhelgc.exe87⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1920 -
C:\Windows\SysWOW64\Ganiah32.exeC:\Windows\system32\Ganiah32.exe88⤵PID:1316
-
C:\Windows\SysWOW64\Gdlemd32.exeC:\Windows\system32\Gdlemd32.exe89⤵
- Drops file in System32 directory
PID:1964 -
C:\Windows\SysWOW64\Gkfmjndo.exeC:\Windows\system32\Gkfmjndo.exe90⤵
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\Gaqefh32.exeC:\Windows\system32\Gaqefh32.exe91⤵PID:592
-
C:\Windows\SysWOW64\Gdoacc32.exeC:\Windows\system32\Gdoacc32.exe92⤵PID:576
-
C:\Windows\SysWOW64\Ggmnoo32.exeC:\Windows\system32\Ggmnoo32.exe93⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1772 -
C:\Windows\SysWOW64\Gmgfli32.exeC:\Windows\system32\Gmgfli32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1800 -
C:\Windows\SysWOW64\Gdanhchm.exeC:\Windows\system32\Gdanhchm.exe95⤵PID:2968
-
C:\Windows\SysWOW64\Hlcimd32.exeC:\Windows\system32\Hlcimd32.exe96⤵
- Drops file in System32 directory
PID:2736 -
C:\Windows\SysWOW64\Iiddoo32.exeC:\Windows\system32\Iiddoo32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2728 -
C:\Windows\SysWOW64\Ljfcgofh.exeC:\Windows\system32\Ljfcgofh.exe98⤵
- Modifies registry class
PID:2920 -
C:\Windows\SysWOW64\Obgoppog.exeC:\Windows\system32\Obgoppog.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2268 -
C:\Windows\SysWOW64\Ckmhmkjg.exeC:\Windows\system32\Ckmhmkjg.exe100⤵
- Drops file in System32 directory
- Modifies registry class
PID:1592 -
C:\Windows\SysWOW64\Cbgqje32.exeC:\Windows\system32\Cbgqje32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3056 -
C:\Windows\SysWOW64\Ciaigoiq.exeC:\Windows\system32\Ciaigoiq.exe102⤵PID:2120
-
C:\Windows\SysWOW64\Cnnaof32.exeC:\Windows\system32\Cnnaof32.exe103⤵PID:2244
-
C:\Windows\SysWOW64\Cfeipc32.exeC:\Windows\system32\Cfeipc32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2428 -
C:\Windows\SysWOW64\Cicelo32.exeC:\Windows\system32\Cicelo32.exe105⤵
- Drops file in System32 directory
- Modifies registry class
PID:2080 -
C:\Windows\SysWOW64\Dpnniink.exeC:\Windows\system32\Dpnniink.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2840 -
C:\Windows\SysWOW64\Dnqndf32.exeC:\Windows\system32\Dnqndf32.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1320 -
C:\Windows\SysWOW64\Daojqa32.exeC:\Windows\system32\Daojqa32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1924 -
C:\Windows\SysWOW64\Difbbo32.exeC:\Windows\system32\Difbbo32.exe109⤵
- Drops file in System32 directory
PID:2756 -
C:\Windows\SysWOW64\Djgoigki.exeC:\Windows\system32\Djgoigki.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2336 -
C:\Windows\SysWOW64\Dbngkd32.exeC:\Windows\system32\Dbngkd32.exe111⤵PID:548
-
C:\Windows\SysWOW64\Eobgiien.exeC:\Windows\system32\Eobgiien.exe112⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2072 -
C:\Windows\SysWOW64\Efjojffp.exeC:\Windows\system32\Efjojffp.exe113⤵PID:1916
-
C:\Windows\SysWOW64\Eihkfaed.exeC:\Windows\system32\Eihkfaed.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\Ehklbn32.exeC:\Windows\system32\Ehklbn32.exe115⤵
- Drops file in System32 directory
PID:1540 -
C:\Windows\SysWOW64\Epbccl32.exeC:\Windows\system32\Epbccl32.exe116⤵PID:2008
-
C:\Windows\SysWOW64\Ebqpogld.exeC:\Windows\system32\Ebqpogld.exe117⤵
- Drops file in System32 directory
PID:808 -
C:\Windows\SysWOW64\Eacpkd32.exeC:\Windows\system32\Eacpkd32.exe118⤵
- Modifies registry class
PID:1952 -
C:\Windows\SysWOW64\Eijhla32.exeC:\Windows\system32\Eijhla32.exe119⤵
- Drops file in System32 directory
PID:2696 -
C:\Windows\SysWOW64\Elidhm32.exeC:\Windows\system32\Elidhm32.exe120⤵
- Modifies registry class
PID:2588 -
C:\Windows\SysWOW64\Eogqdh32.exeC:\Windows\system32\Eogqdh32.exe121⤵
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\Ebcmegjb.exeC:\Windows\system32\Ebcmegjb.exe122⤵PID:1976
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-