Analysis
-
max time kernel
202s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
05/11/2023, 15:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe
Resource
win7-20231023-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe
Resource
win10v2004-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe
-
Size
45KB
-
MD5
8b2ef1d34bcac5c4bceeb42eb3699a07
-
SHA1
91fb8b983141638754d241dfa697287f2a3c8158
-
SHA256
a2301eb2f014fccad9634a78eede79e671c9ea517b6b969e572e92b41fac98fb
-
SHA512
9e7ec9d680030c4b35be4942602ede485d198bc4e8551ee53a3e0cba635536e8c941a88db00b0fee7484b9f3720e31659f672753002d183677697fcff639f5a0
-
SSDEEP
768:dR7SJBRj1QgJK8gY7N77DcHOIIyv1GpyqOvY2dYKLgufRveYoQogmbZno/1H5KZ:/UBRjSg48T5D4OXyNGpiY26K1ZxoHuAZ
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cojlfckj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iekdhkfi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpdhiaoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilbknd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqmmhdka.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oamcjgmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fniikj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aohbaq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Plbdfc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cojlfckj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deonff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Odnmkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lfingaaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iihhmhng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gcljdpke.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adglqd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eloimcca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mknbmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikbndqnc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fqhegf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mqkked32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eajhgg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dllnphkd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaokhdja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnogakma.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcgmgh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mqkked32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfbemi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eiocbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lcihicad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmlpjhlf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnleqj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnbhpl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egbaelej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbeeliin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lcjkbl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abfonl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lqgjkbop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Falakjag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ioeaeolo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljoidf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmflmfpe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhipcbdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hmjagh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpmcmf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jodmdboj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Llpbeaak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edidcb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edmnnakm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihhlbegd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbabpodi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cfagmn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hobjia32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbokda32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gqkqbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jpcdqpqj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdhnnl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dohnfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Onognkne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iplnpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hklhca32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lfckko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Foqadnpq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkgbioee.exe -
Executes dropped EXE 64 IoCs
pid Process 2824 Iigcobid.exe 2660 Iencdc32.exe 2460 Ibadnhmb.exe 2944 Imkeneja.exe 1384 Idemkp32.exe 2656 Ikoehj32.exe 2804 Iplnpq32.exe 1512 Jkabmi32.exe 2376 Jpnkep32.exe 1900 Jkdoci32.exe 1448 Jpcdqpqj.exe 2320 Jgmlmj32.exe 2360 Jcdmbk32.exe 2844 Jhqeka32.exe 1804 Jcfjhj32.exe 1400 Kdgfpbaf.exe 1148 Klonqpbi.exe 1548 Knpkhhhg.exe 1360 Kfgcieii.exe 2032 Knbgnhfd.exe 2100 Kfbemi32.exe 1204 Lqgjkbop.exe 108 Lgabgl32.exe 2148 Lmnkpc32.exe 2740 Lbkchj32.exe 2300 Lkcgapjl.exe 2780 Lfilnh32.exe 2512 Lkfdfo32.exe 2904 Lbplciof.exe 1136 Lpcmlnnp.exe 1000 Magfjebk.exe 2680 Mmngof32.exe 1092 Mffkgl32.exe 1712 Malpee32.exe 2416 Mhfhaoec.exe 2960 Dkfcqo32.exe 1104 Lfingaaf.exe 1944 Mdhnnl32.exe 648 Cgmndokg.exe 1060 Cjljpjjk.exe 564 Cbcbag32.exe 2392 Clkfjman.exe 2916 Cjngej32.exe 2608 Cmmcae32.exe 2948 Dcfknooi.exe 2008 Dfegjknm.exe 2572 Dbqajk32.exe 2988 Deonff32.exe 2072 Dijjgegh.exe 476 Dogbolep.exe 2784 Deajlf32.exe 3012 Dimfmeef.exe 2160 Epgoio32.exe 1940 Eahkag32.exe 2820 Eiocbd32.exe 1556 Ekppjmia.exe 2324 Eolljk32.exe 860 Eajhgg32.exe 2312 Edidcb32.exe 1968 Ekblplgo.exe 1100 Eamdlf32.exe 2996 Edkahbmo.exe 1912 Egimdmmc.exe 1184 Emceag32.exe -
Loads dropped DLL 64 IoCs
pid Process 2720 NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe 2720 NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe 2824 Iigcobid.exe 2824 Iigcobid.exe 2660 Iencdc32.exe 2660 Iencdc32.exe 2460 Ibadnhmb.exe 2460 Ibadnhmb.exe 2944 Imkeneja.exe 2944 Imkeneja.exe 1384 Idemkp32.exe 1384 Idemkp32.exe 2656 Ikoehj32.exe 2656 Ikoehj32.exe 2804 Iplnpq32.exe 2804 Iplnpq32.exe 1512 Jkabmi32.exe 1512 Jkabmi32.exe 2376 Jpnkep32.exe 2376 Jpnkep32.exe 1900 Jkdoci32.exe 1900 Jkdoci32.exe 1448 Jpcdqpqj.exe 1448 Jpcdqpqj.exe 2320 Jgmlmj32.exe 2320 Jgmlmj32.exe 2360 Jcdmbk32.exe 2360 Jcdmbk32.exe 2844 Jhqeka32.exe 2844 Jhqeka32.exe 1804 Jcfjhj32.exe 1804 Jcfjhj32.exe 1400 Kdgfpbaf.exe 1400 Kdgfpbaf.exe 1148 Klonqpbi.exe 1148 Klonqpbi.exe 1548 Knpkhhhg.exe 1548 Knpkhhhg.exe 1360 Kfgcieii.exe 1360 Kfgcieii.exe 2032 Knbgnhfd.exe 2032 Knbgnhfd.exe 2100 Kfbemi32.exe 2100 Kfbemi32.exe 1204 Lqgjkbop.exe 1204 Lqgjkbop.exe 108 Lgabgl32.exe 108 Lgabgl32.exe 2148 Lmnkpc32.exe 2148 Lmnkpc32.exe 2740 Lbkchj32.exe 2740 Lbkchj32.exe 2300 Lkcgapjl.exe 2300 Lkcgapjl.exe 2780 Lfilnh32.exe 2780 Lfilnh32.exe 2512 Lkfdfo32.exe 2512 Lkfdfo32.exe 2904 Lbplciof.exe 2904 Lbplciof.exe 1136 Lpcmlnnp.exe 1136 Lpcmlnnp.exe 1000 Magfjebk.exe 1000 Magfjebk.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Glbnin32.dll Kbefen32.exe File created C:\Windows\SysWOW64\Leoejm32.dll Bcanlcgi.exe File created C:\Windows\SysWOW64\Aaomchla.dll Lafgdfbm.exe File created C:\Windows\SysWOW64\Phqbcjkp.dll Egbaelej.exe File created C:\Windows\SysWOW64\Hjfbaj32.exe Hggeeo32.exe File opened for modification C:\Windows\SysWOW64\Kkcfbkfj.exe Khdjfpfg.exe File created C:\Windows\SysWOW64\Bcebml32.dll Lncodf32.exe File created C:\Windows\SysWOW64\Qofjmnji.exe Plgmabke.exe File opened for modification C:\Windows\SysWOW64\Lkfdfo32.exe Lfilnh32.exe File created C:\Windows\SysWOW64\Gqidme32.exe Gklkdn32.exe File created C:\Windows\SysWOW64\Moedbl32.exe Mhklfbcj.exe File created C:\Windows\SysWOW64\Hqdhpblo.dll Mdbmkc32.exe File created C:\Windows\SysWOW64\Dpkmgi32.dll Niilofhh.exe File opened for modification C:\Windows\SysWOW64\Jpnkep32.exe Jkabmi32.exe File opened for modification C:\Windows\SysWOW64\Jafilj32.exe Johlpoij.exe File created C:\Windows\SysWOW64\Johdlh32.dll Jlfahgpf.exe File opened for modification C:\Windows\SysWOW64\Kolcdahb.exe Klmghfio.exe File created C:\Windows\SysWOW64\Ajclqp32.dll Lpbkpa32.exe File created C:\Windows\SysWOW64\Ilblbnaf.dll Njhhiiok.exe File created C:\Windows\SysWOW64\Ekoemjgn.dll Fejjah32.exe File opened for modification C:\Windows\SysWOW64\Ikbndqnc.exe Ieiegf32.exe File created C:\Windows\SysWOW64\Komkdc32.dll Dokjlcjh.exe File created C:\Windows\SysWOW64\Eggajb32.exe Dfhial32.exe File created C:\Windows\SysWOW64\Mimjpp32.dll Hhfcnb32.exe File opened for modification C:\Windows\SysWOW64\Hmjagh32.exe Hacabgig.exe File opened for modification C:\Windows\SysWOW64\Jjapfamf.exe Jgccjenb.exe File created C:\Windows\SysWOW64\Jafilj32.exe Johlpoij.exe File opened for modification C:\Windows\SysWOW64\Ccmcfc32.exe Cpogjh32.exe File created C:\Windows\SysWOW64\Hdapggln.exe Hbccklmj.exe File opened for modification C:\Windows\SysWOW64\Mddjpbgl.exe Mbfndggh.exe File created C:\Windows\SysWOW64\Nebijfkj.exe Nbcmnklf.exe File created C:\Windows\SysWOW64\Fikcdmdd.dll Adglqd32.exe File created C:\Windows\SysWOW64\Kfgcieii.exe Knpkhhhg.exe File opened for modification C:\Windows\SysWOW64\Kfgcieii.exe Knpkhhhg.exe File opened for modification C:\Windows\SysWOW64\Cojlfckj.exe Cmlpjhlf.exe File opened for modification C:\Windows\SysWOW64\Iglmjf32.exe Iiimnjmp.exe File created C:\Windows\SysWOW64\Cebplg32.dll Gaajfi32.exe File opened for modification C:\Windows\SysWOW64\Dfhial32.exe Dcjleq32.exe File created C:\Windows\SysWOW64\Ibfkoeao.dll Ddgljced.exe File created C:\Windows\SysWOW64\Ffhoopnc.dll Iiablido.exe File created C:\Windows\SysWOW64\Meonlkcm.exe Mbabpodi.exe File opened for modification C:\Windows\SysWOW64\Jmbhhl32.exe Jjcllq32.exe File opened for modification C:\Windows\SysWOW64\Edidcb32.exe Eajhgg32.exe File opened for modification C:\Windows\SysWOW64\Gqmmhdka.exe Gmbagf32.exe File created C:\Windows\SysWOW64\Nmnjfc32.dll Lceond32.exe File created C:\Windows\SysWOW64\Ldngqqjh.exe Lpbkpa32.exe File opened for modification C:\Windows\SysWOW64\Jgeppe32.exe Jakhckdb.exe File opened for modification C:\Windows\SysWOW64\Hgeenb32.exe Hibebeqb.exe File created C:\Windows\SysWOW64\Fgbmdphe.exe Fqhegf32.exe File opened for modification C:\Windows\SysWOW64\Mbabpodi.exe Mppiod32.exe File created C:\Windows\SysWOW64\Ddmaak32.exe Pkboiamh.exe File created C:\Windows\SysWOW64\Nlieqa32.exe Njhhiiok.exe File opened for modification C:\Windows\SysWOW64\Onmkhlph.exe Olnnlpqd.exe File opened for modification C:\Windows\SysWOW64\Dfegjknm.exe Dcfknooi.exe File created C:\Windows\SysWOW64\Edkahbmo.exe Eamdlf32.exe File created C:\Windows\SysWOW64\Khpkhg32.dll Jkegigal.exe File created C:\Windows\SysWOW64\Lnflif32.exe Lkgpmj32.exe File created C:\Windows\SysWOW64\Dghmnfjd.dll Onmkhlph.exe File created C:\Windows\SysWOW64\Ebnlba32.exe Emadjj32.exe File created C:\Windows\SysWOW64\Klmghfio.exe Kdfogiil.exe File opened for modification C:\Windows\SysWOW64\Hogddpld.exe Hklhca32.exe File created C:\Windows\SysWOW64\Djoplidm.dll Gjgpqjqa.exe File opened for modification C:\Windows\SysWOW64\Pkboiamh.exe Mllcodig.exe File created C:\Windows\SysWOW64\Lmpbgl32.dll Dglmmf32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3244 2624 WerFault.exe 469 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Okjhdj32.dll" Jahflj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Liaggk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Geflbg32.dll" Ajindjom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lqgjkbop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alfjlh32.dll" Ficilgai.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iaaqkkme.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Koifob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjeemh32.dll" Meonlkcm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Imdjlida.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Coknmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpdjkk32.dll" Cqokoeig.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fohecb32.dll" Kdgfpbaf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nclcgoia.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kcahjqfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Effnfo32.dll" Mqkked32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Plbdfc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Magfjebk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fiopah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mknbmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmbhhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eijffhjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dohnfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oekdni32.dll" Fgdjipfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lncodf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fapjpi32.dll" NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjhjon32.dll" Lpcmlnnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fgdjipfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ggicdo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nfjpcjhe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Edidcb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecfcle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnlpcl32.dll" Fqjbme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qmehii32.dll" Jnogakma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ciqpij32.dll" Lffjih32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibaago32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eaangfjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfnmhnhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnpgmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lphqle32.dll" Ggicdo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Koifob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lbkchj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cgdflb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Loqlon32.dll" Ihhlbegd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cfcjopoa.dll" Lgqmhk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olqkapoa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfahiebp.dll" Egimdmmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eomfiobe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdhnnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fialggcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kekkkm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bkmegaaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djoplidm.dll" Gjgpqjqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Papmnj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kfbemi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccpgdcke.dll" Mdhnnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmnjfc32.dll" Lceond32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bojogp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kkomepon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dcffmb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbnfgk32.dll" Klinmg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccckabef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dblangpk.dll" Jpnkep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lkhcil32.dll" Egdnjlcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbeeliin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2824 2720 NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe 29 PID 2720 wrote to memory of 2824 2720 NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe 29 PID 2720 wrote to memory of 2824 2720 NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe 29 PID 2720 wrote to memory of 2824 2720 NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe 29 PID 2824 wrote to memory of 2660 2824 Iigcobid.exe 30 PID 2824 wrote to memory of 2660 2824 Iigcobid.exe 30 PID 2824 wrote to memory of 2660 2824 Iigcobid.exe 30 PID 2824 wrote to memory of 2660 2824 Iigcobid.exe 30 PID 2660 wrote to memory of 2460 2660 Iencdc32.exe 31 PID 2660 wrote to memory of 2460 2660 Iencdc32.exe 31 PID 2660 wrote to memory of 2460 2660 Iencdc32.exe 31 PID 2660 wrote to memory of 2460 2660 Iencdc32.exe 31 PID 2460 wrote to memory of 2944 2460 Ibadnhmb.exe 32 PID 2460 wrote to memory of 2944 2460 Ibadnhmb.exe 32 PID 2460 wrote to memory of 2944 2460 Ibadnhmb.exe 32 PID 2460 wrote to memory of 2944 2460 Ibadnhmb.exe 32 PID 2944 wrote to memory of 1384 2944 Imkeneja.exe 33 PID 2944 wrote to memory of 1384 2944 Imkeneja.exe 33 PID 2944 wrote to memory of 1384 2944 Imkeneja.exe 33 PID 2944 wrote to memory of 1384 2944 Imkeneja.exe 33 PID 1384 wrote to memory of 2656 1384 Idemkp32.exe 34 PID 1384 wrote to memory of 2656 1384 Idemkp32.exe 34 PID 1384 wrote to memory of 2656 1384 Idemkp32.exe 34 PID 1384 wrote to memory of 2656 1384 Idemkp32.exe 34 PID 2656 wrote to memory of 2804 2656 Ikoehj32.exe 35 PID 2656 wrote to memory of 2804 2656 Ikoehj32.exe 35 PID 2656 wrote to memory of 2804 2656 Ikoehj32.exe 35 PID 2656 wrote to memory of 2804 2656 Ikoehj32.exe 35 PID 2804 wrote to memory of 1512 2804 Iplnpq32.exe 36 PID 2804 wrote to memory of 1512 2804 Iplnpq32.exe 36 PID 2804 wrote to memory of 1512 2804 Iplnpq32.exe 36 PID 2804 wrote to memory of 1512 2804 Iplnpq32.exe 36 PID 1512 wrote to memory of 2376 1512 Jkabmi32.exe 37 PID 1512 wrote to memory of 2376 1512 Jkabmi32.exe 37 PID 1512 wrote to memory of 2376 1512 Jkabmi32.exe 37 PID 1512 wrote to memory of 2376 1512 Jkabmi32.exe 37 PID 2376 wrote to memory of 1900 2376 Jpnkep32.exe 38 PID 2376 wrote to memory of 1900 2376 Jpnkep32.exe 38 PID 2376 wrote to memory of 1900 2376 Jpnkep32.exe 38 PID 2376 wrote to memory of 1900 2376 Jpnkep32.exe 38 PID 1900 wrote to memory of 1448 1900 Jkdoci32.exe 39 PID 1900 wrote to memory of 1448 1900 Jkdoci32.exe 39 PID 1900 wrote to memory of 1448 1900 Jkdoci32.exe 39 PID 1900 wrote to memory of 1448 1900 Jkdoci32.exe 39 PID 1448 wrote to memory of 2320 1448 Jpcdqpqj.exe 40 PID 1448 wrote to memory of 2320 1448 Jpcdqpqj.exe 40 PID 1448 wrote to memory of 2320 1448 Jpcdqpqj.exe 40 PID 1448 wrote to memory of 2320 1448 Jpcdqpqj.exe 40 PID 2320 wrote to memory of 2360 2320 Jgmlmj32.exe 41 PID 2320 wrote to memory of 2360 2320 Jgmlmj32.exe 41 PID 2320 wrote to memory of 2360 2320 Jgmlmj32.exe 41 PID 2320 wrote to memory of 2360 2320 Jgmlmj32.exe 41 PID 2360 wrote to memory of 2844 2360 Jcdmbk32.exe 42 PID 2360 wrote to memory of 2844 2360 Jcdmbk32.exe 42 PID 2360 wrote to memory of 2844 2360 Jcdmbk32.exe 42 PID 2360 wrote to memory of 2844 2360 Jcdmbk32.exe 42 PID 2844 wrote to memory of 1804 2844 Jhqeka32.exe 47 PID 2844 wrote to memory of 1804 2844 Jhqeka32.exe 47 PID 2844 wrote to memory of 1804 2844 Jhqeka32.exe 47 PID 2844 wrote to memory of 1804 2844 Jhqeka32.exe 47 PID 1804 wrote to memory of 1400 1804 Jcfjhj32.exe 46 PID 1804 wrote to memory of 1400 1804 Jcfjhj32.exe 46 PID 1804 wrote to memory of 1400 1804 Jcfjhj32.exe 46 PID 1804 wrote to memory of 1400 1804 Jcfjhj32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8b2ef1d34bcac5c4bceeb42eb3699a07_JC.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Iigcobid.exeC:\Windows\system32\Iigcobid.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\Iencdc32.exeC:\Windows\system32\Iencdc32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\Ibadnhmb.exeC:\Windows\system32\Ibadnhmb.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\Imkeneja.exeC:\Windows\system32\Imkeneja.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Idemkp32.exeC:\Windows\system32\Idemkp32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\Ikoehj32.exeC:\Windows\system32\Ikoehj32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\Iplnpq32.exeC:\Windows\system32\Iplnpq32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Jkabmi32.exeC:\Windows\system32\Jkabmi32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\Jpnkep32.exeC:\Windows\system32\Jpnkep32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\Jkdoci32.exeC:\Windows\system32\Jkdoci32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\Jpcdqpqj.exeC:\Windows\system32\Jpcdqpqj.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\Jgmlmj32.exeC:\Windows\system32\Jgmlmj32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\Jcdmbk32.exeC:\Windows\system32\Jcdmbk32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\Jhqeka32.exeC:\Windows\system32\Jhqeka32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\Jcfjhj32.exeC:\Windows\system32\Jcfjhj32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1804
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Knpkhhhg.exeC:\Windows\system32\Knpkhhhg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1548 -
C:\Windows\SysWOW64\Kfgcieii.exeC:\Windows\system32\Kfgcieii.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360 -
C:\Windows\SysWOW64\Knbgnhfd.exeC:\Windows\system32\Knbgnhfd.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Windows\SysWOW64\Kfbemi32.exeC:\Windows\system32\Kfbemi32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2100 -
C:\Windows\SysWOW64\Lqgjkbop.exeC:\Windows\system32\Lqgjkbop.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1204 -
C:\Windows\SysWOW64\Lgabgl32.exeC:\Windows\system32\Lgabgl32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:108 -
C:\Windows\SysWOW64\Lmnkpc32.exeC:\Windows\system32\Lmnkpc32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2148 -
C:\Windows\SysWOW64\Lbkchj32.exeC:\Windows\system32\Lbkchj32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2740 -
C:\Windows\SysWOW64\Lkcgapjl.exeC:\Windows\system32\Lkcgapjl.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2300 -
C:\Windows\SysWOW64\Lfilnh32.exeC:\Windows\system32\Lfilnh32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\Lkfdfo32.exeC:\Windows\system32\Lkfdfo32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512 -
C:\Windows\SysWOW64\Lbplciof.exeC:\Windows\system32\Lbplciof.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904 -
C:\Windows\SysWOW64\Lpcmlnnp.exeC:\Windows\system32\Lpcmlnnp.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1136 -
C:\Windows\SysWOW64\Magfjebk.exeC:\Windows\system32\Magfjebk.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1000 -
C:\Windows\SysWOW64\Mmngof32.exeC:\Windows\system32\Mmngof32.exe15⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\Mffkgl32.exeC:\Windows\system32\Mffkgl32.exe16⤵
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Malpee32.exeC:\Windows\system32\Malpee32.exe17⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\Mhfhaoec.exeC:\Windows\system32\Mhfhaoec.exe18⤵
- Executes dropped EXE
PID:2416 -
C:\Windows\SysWOW64\Dkfcqo32.exeC:\Windows\system32\Dkfcqo32.exe19⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\SysWOW64\Lfingaaf.exeC:\Windows\system32\Lfingaaf.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1104 -
C:\Windows\SysWOW64\Mdhnnl32.exeC:\Windows\system32\Mdhnnl32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1944 -
C:\Windows\SysWOW64\Cgmndokg.exeC:\Windows\system32\Cgmndokg.exe22⤵
- Executes dropped EXE
PID:648 -
C:\Windows\SysWOW64\Cjljpjjk.exeC:\Windows\system32\Cjljpjjk.exe23⤵
- Executes dropped EXE
PID:1060 -
C:\Windows\SysWOW64\Cbcbag32.exeC:\Windows\system32\Cbcbag32.exe24⤵
- Executes dropped EXE
PID:564 -
C:\Windows\SysWOW64\Clkfjman.exeC:\Windows\system32\Clkfjman.exe25⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\Cjngej32.exeC:\Windows\system32\Cjngej32.exe26⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\Cmmcae32.exeC:\Windows\system32\Cmmcae32.exe27⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\Dcfknooi.exeC:\Windows\system32\Dcfknooi.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2948 -
C:\Windows\SysWOW64\Dfegjknm.exeC:\Windows\system32\Dfegjknm.exe29⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\Dbqajk32.exeC:\Windows\system32\Dbqajk32.exe30⤵
- Executes dropped EXE
PID:2572 -
C:\Windows\SysWOW64\Deonff32.exeC:\Windows\system32\Deonff32.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2988 -
C:\Windows\SysWOW64\Dijjgegh.exeC:\Windows\system32\Dijjgegh.exe32⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\Dogbolep.exeC:\Windows\system32\Dogbolep.exe33⤵
- Executes dropped EXE
PID:476 -
C:\Windows\SysWOW64\Deajlf32.exeC:\Windows\system32\Deajlf32.exe34⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\Dimfmeef.exeC:\Windows\system32\Dimfmeef.exe35⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\Epgoio32.exeC:\Windows\system32\Epgoio32.exe36⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\Eahkag32.exeC:\Windows\system32\Eahkag32.exe37⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\SysWOW64\Eiocbd32.exeC:\Windows\system32\Eiocbd32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2820 -
C:\Windows\SysWOW64\Ekppjmia.exeC:\Windows\system32\Ekppjmia.exe39⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\Eolljk32.exeC:\Windows\system32\Eolljk32.exe40⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\Eajhgg32.exeC:\Windows\system32\Eajhgg32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:860 -
C:\Windows\SysWOW64\Edidcb32.exeC:\Windows\system32\Edidcb32.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2312 -
C:\Windows\SysWOW64\Ekblplgo.exeC:\Windows\system32\Ekblplgo.exe43⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\SysWOW64\Eamdlf32.exeC:\Windows\system32\Eamdlf32.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1100 -
C:\Windows\SysWOW64\Edkahbmo.exeC:\Windows\system32\Edkahbmo.exe45⤵
- Executes dropped EXE
PID:2996 -
C:\Windows\SysWOW64\Egimdmmc.exeC:\Windows\system32\Egimdmmc.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\Emceag32.exeC:\Windows\system32\Emceag32.exe47⤵
- Executes dropped EXE
PID:1184
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Klonqpbi.exeC:\Windows\system32\Klonqpbi.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1148
-
C:\Windows\SysWOW64\Kdgfpbaf.exeC:\Windows\system32\Kdgfpbaf.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1400
-
C:\Windows\SysWOW64\Eaoaafli.exeC:\Windows\system32\Eaoaafli.exe1⤵PID:1096
-
C:\Windows\SysWOW64\Edmnnakm.exeC:\Windows\system32\Edmnnakm.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1732 -
C:\Windows\SysWOW64\Egljjmkp.exeC:\Windows\system32\Egljjmkp.exe3⤵PID:760
-
C:\Windows\SysWOW64\Eijffhjd.exeC:\Windows\system32\Eijffhjd.exe4⤵
- Modifies registry class
PID:1868 -
C:\Windows\SysWOW64\Eaangfjf.exeC:\Windows\system32\Eaangfjf.exe5⤵
- Modifies registry class
PID:1740 -
C:\Windows\SysWOW64\Fcbjon32.exeC:\Windows\system32\Fcbjon32.exe6⤵PID:1580
-
C:\Windows\SysWOW64\Feccqime.exeC:\Windows\system32\Feccqime.exe7⤵PID:2404
-
C:\Windows\SysWOW64\Fiopah32.exeC:\Windows\system32\Fiopah32.exe8⤵
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Fmjkbfnh.exeC:\Windows\system32\Fmjkbfnh.exe9⤵PID:1692
-
C:\Windows\SysWOW64\Folhio32.exeC:\Windows\system32\Folhio32.exe10⤵PID:1960
-
C:\Windows\SysWOW64\Fialggcl.exeC:\Windows\system32\Fialggcl.exe11⤵
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\Flphccbp.exeC:\Windows\system32\Flphccbp.exe12⤵PID:2444
-
C:\Windows\SysWOW64\Fondonbc.exeC:\Windows\system32\Fondonbc.exe13⤵PID:592
-
C:\Windows\SysWOW64\Falakjag.exeC:\Windows\system32\Falakjag.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2776 -
C:\Windows\SysWOW64\Ficilgai.exeC:\Windows\system32\Ficilgai.exe15⤵
- Modifies registry class
PID:2104 -
C:\Windows\SysWOW64\Flbehbqm.exeC:\Windows\system32\Flbehbqm.exe16⤵PID:1516
-
C:\Windows\SysWOW64\Foqadnpq.exeC:\Windows\system32\Foqadnpq.exe17⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2812 -
C:\Windows\SysWOW64\Faonqiod.exeC:\Windows\system32\Faonqiod.exe18⤵PID:2204
-
C:\Windows\SysWOW64\Fejjah32.exeC:\Windows\system32\Fejjah32.exe19⤵
- Drops file in System32 directory
PID:1980 -
C:\Windows\SysWOW64\Fhifmcfa.exeC:\Windows\system32\Fhifmcfa.exe20⤵PID:1488
-
C:\Windows\SysWOW64\Gkgbioee.exeC:\Windows\system32\Gkgbioee.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1764 -
C:\Windows\SysWOW64\Gnenfjdh.exeC:\Windows\system32\Gnenfjdh.exe22⤵PID:2304
-
C:\Windows\SysWOW64\Gaajfi32.exeC:\Windows\system32\Gaajfi32.exe23⤵
- Drops file in System32 directory
PID:3008 -
C:\Windows\SysWOW64\Ghmohcbl.exeC:\Windows\system32\Ghmohcbl.exe24⤵PID:2328
-
C:\Windows\SysWOW64\Gklkdn32.exeC:\Windows\system32\Gklkdn32.exe25⤵
- Drops file in System32 directory
PID:1328 -
C:\Windows\SysWOW64\Gqidme32.exeC:\Windows\system32\Gqidme32.exe26⤵PID:2388
-
C:\Windows\SysWOW64\Gcgpiq32.exeC:\Windows\system32\Gcgpiq32.exe27⤵PID:972
-
C:\Windows\SysWOW64\Gknhjn32.exeC:\Windows\system32\Gknhjn32.exe28⤵PID:2856
-
C:\Windows\SysWOW64\Glpdbfek.exeC:\Windows\system32\Glpdbfek.exe29⤵PID:2396
-
C:\Windows\SysWOW64\Gqkqbe32.exeC:\Windows\system32\Gqkqbe32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2924 -
C:\Windows\SysWOW64\Ggeiooea.exeC:\Windows\system32\Ggeiooea.exe31⤵PID:1704
-
C:\Windows\SysWOW64\Gjcekj32.exeC:\Windows\system32\Gjcekj32.exe32⤵PID:2748
-
C:\Windows\SysWOW64\Gmbagf32.exeC:\Windows\system32\Gmbagf32.exe33⤵
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\Gqmmhdka.exeC:\Windows\system32\Gqmmhdka.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2472 -
C:\Windows\SysWOW64\Gcljdpke.exeC:\Windows\system32\Gcljdpke.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2908 -
C:\Windows\SysWOW64\Hggeeo32.exeC:\Windows\system32\Hggeeo32.exe36⤵
- Drops file in System32 directory
PID:2560 -
C:\Windows\SysWOW64\Hjfbaj32.exeC:\Windows\system32\Hjfbaj32.exe37⤵PID:804
-
C:\Windows\SysWOW64\Hobjia32.exeC:\Windows\system32\Hobjia32.exe38⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1932 -
C:\Windows\SysWOW64\Hfmbfkhf.exeC:\Windows\system32\Hfmbfkhf.exe39⤵PID:2756
-
C:\Windows\SysWOW64\Hikobfgj.exeC:\Windows\system32\Hikobfgj.exe40⤵PID:1736
-
C:\Windows\SysWOW64\Hkiknb32.exeC:\Windows\system32\Hkiknb32.exe41⤵PID:2684
-
C:\Windows\SysWOW64\Hbccklmj.exeC:\Windows\system32\Hbccklmj.exe42⤵
- Drops file in System32 directory
PID:2296 -
C:\Windows\SysWOW64\Hdapggln.exeC:\Windows\system32\Hdapggln.exe43⤵PID:2644
-
C:\Windows\SysWOW64\Hklhca32.exeC:\Windows\system32\Hklhca32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1976 -
C:\Windows\SysWOW64\Hogddpld.exeC:\Windows\system32\Hogddpld.exe45⤵PID:2132
-
C:\Windows\SysWOW64\Hfalaj32.exeC:\Windows\system32\Hfalaj32.exe46⤵PID:1052
-
C:\Windows\SysWOW64\Hiphmf32.exeC:\Windows\system32\Hiphmf32.exe47⤵PID:368
-
C:\Windows\SysWOW64\Hkndiabh.exeC:\Windows\system32\Hkndiabh.exe48⤵PID:1956
-
C:\Windows\SysWOW64\Hnlqemal.exeC:\Windows\system32\Hnlqemal.exe49⤵PID:2084
-
C:\Windows\SysWOW64\Hibebeqb.exeC:\Windows\system32\Hibebeqb.exe50⤵
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\Hgeenb32.exeC:\Windows\system32\Hgeenb32.exe51⤵PID:1596
-
C:\Windows\SysWOW64\Ibjikk32.exeC:\Windows\system32\Ibjikk32.exe52⤵PID:2516
-
C:\Windows\SysWOW64\Ieiegf32.exeC:\Windows\system32\Ieiegf32.exe53⤵
- Drops file in System32 directory
PID:2712 -
C:\Windows\SysWOW64\Ikbndqnc.exeC:\Windows\system32\Ikbndqnc.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:528 -
C:\Windows\SysWOW64\Imdjlida.exeC:\Windows\system32\Imdjlida.exe55⤵
- Modifies registry class
PID:800 -
C:\Windows\SysWOW64\Iekbmfdc.exeC:\Windows\system32\Iekbmfdc.exe56⤵PID:2936
-
C:\Windows\SysWOW64\Ifloeo32.exeC:\Windows\system32\Ifloeo32.exe57⤵PID:2368
-
C:\Windows\SysWOW64\Jbooen32.exeC:\Windows\system32\Jbooen32.exe58⤵PID:2668
-
C:\Windows\SysWOW64\Jlgcncli.exeC:\Windows\system32\Jlgcncli.exe59⤵PID:1352
-
C:\Windows\SysWOW64\Jadlgjjq.exeC:\Windows\system32\Jadlgjjq.exe60⤵PID:3000
-
C:\Windows\SysWOW64\Johlpoij.exeC:\Windows\system32\Johlpoij.exe61⤵
- Drops file in System32 directory
PID:1744 -
C:\Windows\SysWOW64\Jafilj32.exeC:\Windows\system32\Jafilj32.exe62⤵PID:1408
-
C:\Windows\SysWOW64\Khpaidpk.exeC:\Windows\system32\Khpaidpk.exe63⤵PID:1984
-
C:\Windows\SysWOW64\Kkomepon.exeC:\Windows\system32\Kkomepon.exe64⤵
- Modifies registry class
PID:1072 -
C:\Windows\SysWOW64\Kekkkm32.exeC:\Windows\system32\Kekkkm32.exe65⤵
- Modifies registry class
PID:1728 -
C:\Windows\SysWOW64\Kifgllbc.exeC:\Windows\system32\Kifgllbc.exe66⤵PID:2492
-
C:\Windows\SysWOW64\Kbokda32.exeC:\Windows\system32\Kbokda32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1016 -
C:\Windows\SysWOW64\Kcahjqfa.exeC:\Windows\system32\Kcahjqfa.exe68⤵
- Modifies registry class
PID:1012 -
C:\Windows\SysWOW64\Dcgmgh32.exeC:\Windows\system32\Dcgmgh32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1864 -
C:\Windows\SysWOW64\Lafgdfbm.exeC:\Windows\system32\Lafgdfbm.exe70⤵
- Drops file in System32 directory
PID:1344 -
C:\Windows\SysWOW64\Bdcmjg32.exeC:\Windows\system32\Bdcmjg32.exe71⤵PID:2836
-
C:\Windows\SysWOW64\Bhoikfbb.exeC:\Windows\system32\Bhoikfbb.exe72⤵PID:1512
-
C:\Windows\SysWOW64\Bkmegaaf.exeC:\Windows\system32\Bkmegaaf.exe73⤵
- Modifies registry class
PID:1552 -
C:\Windows\SysWOW64\Boiagp32.exeC:\Windows\system32\Boiagp32.exe74⤵PID:1808
-
C:\Windows\SysWOW64\Bagncl32.exeC:\Windows\system32\Bagncl32.exe75⤵PID:328
-
C:\Windows\SysWOW64\Cgdflb32.exeC:\Windows\system32\Cgdflb32.exe76⤵
- Modifies registry class
PID:2448 -
C:\Windows\SysWOW64\Coknmp32.exeC:\Windows\system32\Coknmp32.exe77⤵
- Modifies registry class
PID:3040 -
C:\Windows\SysWOW64\Cnnohmog.exeC:\Windows\system32\Cnnohmog.exe78⤵PID:2744
-
C:\Windows\SysWOW64\Cplkehnk.exeC:\Windows\system32\Cplkehnk.exe79⤵PID:2580
-
C:\Windows\SysWOW64\Chccfe32.exeC:\Windows\system32\Chccfe32.exe80⤵PID:1400
-
C:\Windows\SysWOW64\Ckboba32.exeC:\Windows\system32\Ckboba32.exe81⤵PID:1196
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Cnpknl32.exeC:\Windows\system32\Cnpknl32.exe1⤵PID:704
-
C:\Windows\SysWOW64\Cpogjh32.exeC:\Windows\system32\Cpogjh32.exe2⤵
- Drops file in System32 directory
PID:2552 -
C:\Windows\SysWOW64\Ccmcfc32.exeC:\Windows\system32\Ccmcfc32.exe3⤵PID:2780
-
C:\Windows\SysWOW64\Cgklma32.exeC:\Windows\system32\Cgklma32.exe4⤵PID:2364
-
C:\Windows\SysWOW64\Cfnmhnhm.exeC:\Windows\system32\Cfnmhnhm.exe5⤵
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\Cnedilio.exeC:\Windows\system32\Cnedilio.exe6⤵PID:1712
-
C:\Windows\SysWOW64\Cofaad32.exeC:\Windows\system32\Cofaad32.exe7⤵PID:1380
-
C:\Windows\SysWOW64\Cfpinnfj.exeC:\Windows\system32\Cfpinnfj.exe8⤵PID:2260
-
C:\Windows\SysWOW64\Cjlenm32.exeC:\Windows\system32\Cjlenm32.exe9⤵PID:2664
-
C:\Windows\SysWOW64\Dpenkgfq.exeC:\Windows\system32\Dpenkgfq.exe10⤵PID:2352
-
C:\Windows\SysWOW64\Dohnfc32.exeC:\Windows\system32\Dohnfc32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2992 -
C:\Windows\SysWOW64\Dfbfcn32.exeC:\Windows\system32\Dfbfcn32.exe12⤵PID:1816
-
C:\Windows\SysWOW64\Dllnphkd.exeC:\Windows\system32\Dllnphkd.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1900 -
C:\Windows\SysWOW64\Dokjlcjh.exeC:\Windows\system32\Dokjlcjh.exe14⤵
- Drops file in System32 directory
PID:2468 -
C:\Windows\SysWOW64\Dcffmb32.exeC:\Windows\system32\Dcffmb32.exe15⤵
- Modifies registry class
PID:2360 -
C:\Windows\SysWOW64\Dfecim32.exeC:\Windows\system32\Dfecim32.exe16⤵PID:672
-
C:\Windows\SysWOW64\Dhcoei32.exeC:\Windows\system32\Dhcoei32.exe17⤵PID:1148
-
C:\Windows\SysWOW64\Dnpgmp32.exeC:\Windows\system32\Dnpgmp32.exe18⤵
- Modifies registry class
PID:2640
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Ddjpjj32.exeC:\Windows\system32\Ddjpjj32.exe1⤵PID:2692
-
C:\Windows\SysWOW64\Dopdgb32.exeC:\Windows\system32\Dopdgb32.exe2⤵PID:2696
-
C:\Windows\SysWOW64\Emlkoknp.exeC:\Windows\system32\Emlkoknp.exe3⤵PID:1384
-
C:\Windows\SysWOW64\Epkgkfmd.exeC:\Windows\system32\Epkgkfmd.exe4⤵PID:2216
-
C:\Windows\SysWOW64\Ecfcle32.exeC:\Windows\system32\Ecfcle32.exe5⤵
- Modifies registry class
PID:2292 -
C:\Windows\SysWOW64\Eickdlcd.exeC:\Windows\system32\Eickdlcd.exe6⤵PID:1896
-
-
-
-
-
-
C:\Windows\SysWOW64\Efglmpbn.exeC:\Windows\system32\Efglmpbn.exe1⤵PID:1492
-
C:\Windows\SysWOW64\Emadjj32.exeC:\Windows\system32\Emadjj32.exe2⤵
- Drops file in System32 directory
PID:2828 -
C:\Windows\SysWOW64\Ebnlba32.exeC:\Windows\system32\Ebnlba32.exe3⤵PID:2320
-
C:\Windows\SysWOW64\Fbpihafp.exeC:\Windows\system32\Fbpihafp.exe4⤵PID:1320
-
-
-
-
C:\Windows\SysWOW64\Faefim32.exeC:\Windows\system32\Faefim32.exe1⤵PID:108
-
C:\Windows\SysWOW64\Kcmfeldm.exeC:\Windows\system32\Kcmfeldm.exe2⤵PID:1104
-
C:\Windows\SysWOW64\Dlpdifda.exeC:\Windows\system32\Dlpdifda.exe3⤵PID:1000
-
C:\Windows\SysWOW64\Ddgljced.exeC:\Windows\system32\Ddgljced.exe4⤵
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\Dcjleq32.exeC:\Windows\system32\Dcjleq32.exe5⤵
- Drops file in System32 directory
PID:2880 -
C:\Windows\SysWOW64\Dfhial32.exeC:\Windows\system32\Dfhial32.exe6⤵
- Drops file in System32 directory
PID:2052 -
C:\Windows\SysWOW64\Eggajb32.exeC:\Windows\system32\Eggajb32.exe7⤵PID:2868
-
C:\Windows\SysWOW64\Pqaanoah.exeC:\Windows\system32\Pqaanoah.exe8⤵PID:1612
-
C:\Windows\SysWOW64\Ckbakiee.exeC:\Windows\system32\Ckbakiee.exe9⤵PID:2244
-
C:\Windows\SysWOW64\Cmqmgedi.exeC:\Windows\system32\Cmqmgedi.exe10⤵PID:2016
-
C:\Windows\SysWOW64\Engpfgql.exeC:\Windows\system32\Engpfgql.exe11⤵PID:1748
-
C:\Windows\SysWOW64\Ecfednma.exeC:\Windows\system32\Ecfednma.exe12⤵PID:2576
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Egbaelej.exeC:\Windows\system32\Egbaelej.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2204 -
C:\Windows\SysWOW64\Ejqmahdn.exeC:\Windows\system32\Ejqmahdn.exe2⤵PID:2196
-
C:\Windows\SysWOW64\Eloimcca.exeC:\Windows\system32\Eloimcca.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3008 -
C:\Windows\SysWOW64\Eomfiobe.exeC:\Windows\system32\Eomfiobe.exe4⤵
- Modifies registry class
PID:2912 -
C:\Windows\SysWOW64\Egdnjlcg.exeC:\Windows\system32\Egdnjlcg.exe5⤵
- Modifies registry class
PID:2456 -
C:\Windows\SysWOW64\Eqmbca32.exeC:\Windows\system32\Eqmbca32.exe6⤵PID:2728
-
C:\Windows\SysWOW64\Ebnokjpf.exeC:\Windows\system32\Ebnokjpf.exe7⤵PID:2856
-
C:\Windows\SysWOW64\Fmcchb32.exeC:\Windows\system32\Fmcchb32.exe8⤵PID:2764
-
C:\Windows\SysWOW64\Fbqkqj32.exeC:\Windows\system32\Fbqkqj32.exe9⤵PID:2120
-
C:\Windows\SysWOW64\Fmfpnb32.exeC:\Windows\system32\Fmfpnb32.exe10⤵PID:1976
-
C:\Windows\SysWOW64\Fodljn32.exeC:\Windows\system32\Fodljn32.exe11⤵PID:2496
-
C:\Windows\SysWOW64\Ffndghdj.exeC:\Windows\system32\Ffndghdj.exe12⤵PID:2160
-
C:\Windows\SysWOW64\Fgpqnpjh.exeC:\Windows\system32\Fgpqnpjh.exe13⤵PID:528
-
C:\Windows\SysWOW64\Fniikj32.exeC:\Windows\system32\Fniikj32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2116 -
C:\Windows\SysWOW64\Fbeeliin.exeC:\Windows\system32\Fbeeliin.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1932 -
C:\Windows\SysWOW64\Fqhegf32.exeC:\Windows\system32\Fqhegf32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Fgbmdphe.exeC:\Windows\system32\Fgbmdphe.exe17⤵PID:1928
-
C:\Windows\SysWOW64\Fjpipkgi.exeC:\Windows\system32\Fjpipkgi.exe18⤵PID:1964
-
C:\Windows\SysWOW64\Fnleqj32.exeC:\Windows\system32\Fnleqj32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1984 -
C:\Windows\SysWOW64\Fqjbme32.exeC:\Windows\system32\Fqjbme32.exe20⤵
- Modifies registry class
PID:2636 -
C:\Windows\SysWOW64\Fgdjipfc.exeC:\Windows\system32\Fgdjipfc.exe21⤵
- Modifies registry class
PID:1460 -
C:\Windows\SysWOW64\Fkpfjnnl.exeC:\Windows\system32\Fkpfjnnl.exe22⤵PID:1100
-
C:\Windows\SysWOW64\Fnnbfjmp.exeC:\Windows\system32\Fnnbfjmp.exe23⤵PID:2408
-
C:\Windows\SysWOW64\Fqmobelc.exeC:\Windows\system32\Fqmobelc.exe24⤵PID:908
-
C:\Windows\SysWOW64\Gaokhdja.exeC:\Windows\system32\Gaokhdja.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1988 -
C:\Windows\SysWOW64\Gpbkca32.exeC:\Windows\system32\Gpbkca32.exe26⤵PID:1468
-
C:\Windows\SysWOW64\Ggicdo32.exeC:\Windows\system32\Ggicdo32.exe27⤵
- Modifies registry class
PID:1316 -
C:\Windows\SysWOW64\Gjgpqjqa.exeC:\Windows\system32\Gjgpqjqa.exe28⤵
- Drops file in System32 directory
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\Gmflmfpe.exeC:\Windows\system32\Gmflmfpe.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1180 -
C:\Windows\SysWOW64\Gpdhiaoi.exeC:\Windows\system32\Gpdhiaoi.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1888 -
C:\Windows\SysWOW64\Gcpdip32.exeC:\Windows\system32\Gcpdip32.exe31⤵PID:1732
-
C:\Windows\SysWOW64\Gjjlfjoo.exeC:\Windows\system32\Gjjlfjoo.exe32⤵PID:2144
-
C:\Windows\SysWOW64\Gmhibenb.exeC:\Windows\system32\Gmhibenb.exe33⤵PID:2572
-
C:\Windows\SysWOW64\Gcbaop32.exeC:\Windows\system32\Gcbaop32.exe34⤵PID:2632
-
C:\Windows\SysWOW64\Gioigf32.exeC:\Windows\system32\Gioigf32.exe35⤵PID:2776
-
C:\Windows\SysWOW64\Glmecbbj.exeC:\Windows\system32\Glmecbbj.exe36⤵PID:956
-
C:\Windows\SysWOW64\Gnlbpman.exeC:\Windows\system32\Gnlbpman.exe37⤵PID:2812
-
C:\Windows\SysWOW64\Gfcjqkbp.exeC:\Windows\system32\Gfcjqkbp.exe38⤵PID:1328
-
C:\Windows\SysWOW64\Gefjlg32.exeC:\Windows\system32\Gefjlg32.exe39⤵PID:2784
-
C:\Windows\SysWOW64\Hhfcnb32.exeC:\Windows\system32\Hhfcnb32.exe40⤵
- Drops file in System32 directory
PID:1672 -
C:\Windows\SysWOW64\Hjeojnep.exeC:\Windows\system32\Hjeojnep.exe41⤵PID:1596
-
C:\Windows\SysWOW64\Hnpkkm32.exeC:\Windows\system32\Hnpkkm32.exe42⤵PID:1940
-
C:\Windows\SysWOW64\Haoggh32.exeC:\Windows\system32\Haoggh32.exe43⤵PID:948
-
C:\Windows\SysWOW64\Hhipcbdi.exeC:\Windows\system32\Hhipcbdi.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1576 -
C:\Windows\SysWOW64\Hldldq32.exeC:\Windows\system32\Hldldq32.exe45⤵PID:2332
-
C:\Windows\SysWOW64\Hnbhpl32.exeC:\Windows\system32\Hnbhpl32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2324 -
C:\Windows\SysWOW64\Haadlh32.exeC:\Windows\system32\Haadlh32.exe47⤵PID:648
-
C:\Windows\SysWOW64\Hhklibbf.exeC:\Windows\system32\Hhklibbf.exe48⤵PID:1144
-
C:\Windows\SysWOW64\Hfnmdo32.exeC:\Windows\system32\Hfnmdo32.exe49⤵PID:2460
-
C:\Windows\SysWOW64\Hnedfljc.exeC:\Windows\system32\Hnedfljc.exe50⤵PID:2796
-
C:\Windows\SysWOW64\Hacabgig.exeC:\Windows\system32\Hacabgig.exe51⤵
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\Hmjagh32.exeC:\Windows\system32\Hmjagh32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1520 -
C:\Windows\SysWOW64\Hpincd32.exeC:\Windows\system32\Hpincd32.exe53⤵PID:2096
-
C:\Windows\SysWOW64\Hfbfpnel.exeC:\Windows\system32\Hfbfpnel.exe54⤵PID:568
-
C:\Windows\SysWOW64\Iiablido.exeC:\Windows\system32\Iiablido.exe55⤵
- Drops file in System32 directory
PID:1784 -
C:\Windows\SysWOW64\Ilpohecc.exeC:\Windows\system32\Ilpohecc.exe56⤵PID:1088
-
C:\Windows\SysWOW64\Ipkkhckl.exeC:\Windows\system32\Ipkkhckl.exe57⤵PID:2384
-
C:\Windows\SysWOW64\Ifecen32.exeC:\Windows\system32\Ifecen32.exe58⤵PID:1516
-
C:\Windows\SysWOW64\Ilbknd32.exeC:\Windows\system32\Ilbknd32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1488 -
C:\Windows\SysWOW64\Iblcjohm.exeC:\Windows\system32\Iblcjohm.exe60⤵PID:1600
-
C:\Windows\SysWOW64\Ihhlbegd.exeC:\Windows\system32\Ihhlbegd.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\Ippdcc32.exeC:\Windows\system32\Ippdcc32.exe62⤵PID:1084
-
C:\Windows\SysWOW64\Iaaqkkme.exeC:\Windows\system32\Iaaqkkme.exe63⤵
- Modifies registry class
PID:1700 -
C:\Windows\SysWOW64\Iihhmhng.exeC:\Windows\system32\Iihhmhng.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2624 -
C:\Windows\SysWOW64\Ikiedq32.exeC:\Windows\system32\Ikiedq32.exe65⤵PID:3068
-
C:\Windows\SysWOW64\Ioeaeolo.exeC:\Windows\system32\Ioeaeolo.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:884 -
C:\Windows\SysWOW64\Idaimfjf.exeC:\Windows\system32\Idaimfjf.exe67⤵PID:2644
-
C:\Windows\SysWOW64\Ihmene32.exeC:\Windows\system32\Ihmene32.exe68⤵PID:2012
-
C:\Windows\SysWOW64\Jaejfj32.exeC:\Windows\system32\Jaejfj32.exe69⤵PID:2512
-
C:\Windows\SysWOW64\Jddfbf32.exeC:\Windows\system32\Jddfbf32.exe70⤵PID:2848
-
C:\Windows\SysWOW64\Jhpbcdqm.exeC:\Windows\system32\Jhpbcdqm.exe71⤵PID:2648
-
C:\Windows\SysWOW64\Jknnoppp.exeC:\Windows\system32\Jknnoppp.exe72⤵PID:2660
-
C:\Windows\SysWOW64\Jahflj32.exeC:\Windows\system32\Jahflj32.exe73⤵
- Modifies registry class
PID:2528 -
C:\Windows\SysWOW64\Jdfche32.exeC:\Windows\system32\Jdfche32.exe74⤵PID:1096
-
C:\Windows\SysWOW64\Jgeoda32.exeC:\Windows\system32\Jgeoda32.exe75⤵PID:1968
-
C:\Windows\SysWOW64\Jjckpl32.exeC:\Windows\system32\Jjckpl32.exe76⤵PID:2940
-
C:\Windows\SysWOW64\Jnogakma.exeC:\Windows\system32\Jnogakma.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3060 -
C:\Windows\SysWOW64\Jpmcmf32.exeC:\Windows\system32\Jpmcmf32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2104 -
C:\Windows\SysWOW64\Jkbhjo32.exeC:\Windows\system32\Jkbhjo32.exe79⤵PID:2520
-
C:\Windows\SysWOW64\Jlddbgai.exeC:\Windows\system32\Jlddbgai.exe80⤵PID:2164
-
C:\Windows\SysWOW64\Jdklcebk.exeC:\Windows\system32\Jdklcebk.exe81⤵PID:2684
-
C:\Windows\SysWOW64\Jflikm32.exeC:\Windows\system32\Jflikm32.exe82⤵PID:804
-
C:\Windows\SysWOW64\Jncqlj32.exeC:\Windows\system32\Jncqlj32.exe83⤵PID:1192
-
C:\Windows\SysWOW64\Jlfahgpf.exeC:\Windows\system32\Jlfahgpf.exe84⤵
- Drops file in System32 directory
PID:936 -
C:\Windows\SysWOW64\Jodmdboj.exeC:\Windows\system32\Jodmdboj.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1728 -
C:\Windows\SysWOW64\Jgleep32.exeC:\Windows\system32\Jgleep32.exe86⤵PID:924
-
C:\Windows\SysWOW64\Jjjaak32.exeC:\Windows\system32\Jjjaak32.exe87⤵PID:2340
-
C:\Windows\SysWOW64\Klinmg32.exeC:\Windows\system32\Klinmg32.exe88⤵
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\Kbefen32.exeC:\Windows\system32\Kbefen32.exe89⤵
- Drops file in System32 directory
PID:2976 -
C:\Windows\SysWOW64\Kfabfldd.exeC:\Windows\system32\Kfabfldd.exe90⤵PID:1472
-
C:\Windows\SysWOW64\Khonbhch.exeC:\Windows\system32\Khonbhch.exe91⤵PID:1688
-
C:\Windows\SysWOW64\Koifob32.exeC:\Windows\system32\Koifob32.exe92⤵
- Modifies registry class
PID:1580 -
C:\Windows\SysWOW64\Kcebpqcn.exeC:\Windows\system32\Kcebpqcn.exe93⤵PID:632
-
C:\Windows\SysWOW64\Kdfogiil.exeC:\Windows\system32\Kdfogiil.exe94⤵
- Drops file in System32 directory
PID:2388 -
C:\Windows\SysWOW64\Klmghfio.exeC:\Windows\system32\Klmghfio.exe95⤵
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\Kolcdahb.exeC:\Windows\system32\Kolcdahb.exe96⤵PID:1456
-
C:\Windows\SysWOW64\Kbjpqmhf.exeC:\Windows\system32\Kbjpqmhf.exe97⤵PID:1628
-
C:\Windows\SysWOW64\Khdhmg32.exeC:\Windows\system32\Khdhmg32.exe98⤵PID:2136
-
C:\Windows\SysWOW64\Lqfbbh32.exeC:\Windows\system32\Lqfbbh32.exe99⤵PID:2980
-
C:\Windows\SysWOW64\Lceond32.exeC:\Windows\system32\Lceond32.exe100⤵
- Drops file in System32 directory
- Modifies registry class
PID:2760 -
C:\Windows\SysWOW64\Lfckko32.exeC:\Windows\system32\Lfckko32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1676 -
C:\Windows\SysWOW64\Liaggk32.exeC:\Windows\system32\Liaggk32.exe102⤵
- Modifies registry class
PID:2956 -
C:\Windows\SysWOW64\Lqiohh32.exeC:\Windows\system32\Lqiohh32.exe103⤵PID:2480
-
C:\Windows\SysWOW64\Lokpcekn.exeC:\Windows\system32\Lokpcekn.exe104⤵PID:2540
-
C:\Windows\SysWOW64\Lbjlppja.exeC:\Windows\system32\Lbjlppja.exe105⤵PID:1444
-
C:\Windows\SysWOW64\Ljadqn32.exeC:\Windows\system32\Ljadqn32.exe106⤵PID:2732
-
C:\Windows\SysWOW64\Lmppmi32.exeC:\Windows\system32\Lmppmi32.exe107⤵PID:1820
-
C:\Windows\SysWOW64\Lcihicad.exeC:\Windows\system32\Lcihicad.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:868 -
C:\Windows\SysWOW64\Mppiod32.exeC:\Windows\system32\Mppiod32.exe109⤵
- Drops file in System32 directory
PID:1744 -
C:\Windows\SysWOW64\Mbabpodi.exeC:\Windows\system32\Mbabpodi.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\Meonlkcm.exeC:\Windows\system32\Meonlkcm.exe111⤵
- Modifies registry class
PID:1184 -
C:\Windows\SysWOW64\Mlifie32.exeC:\Windows\system32\Mlifie32.exe112⤵PID:2220
-
C:\Windows\SysWOW64\Mafoal32.exeC:\Windows\system32\Mafoal32.exe113⤵PID:2840
-
C:\Windows\SysWOW64\Meakbjaj.exeC:\Windows\system32\Meakbjaj.exe114⤵PID:2240
-
C:\Windows\SysWOW64\Mllcodig.exeC:\Windows\system32\Mllcodig.exe115⤵
- Drops file in System32 directory
PID:1344 -
C:\Windows\SysWOW64\Pkboiamh.exeC:\Windows\system32\Pkboiamh.exe116⤵
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\Ddmaak32.exeC:\Windows\system32\Ddmaak32.exe117⤵PID:2724
-
C:\Windows\SysWOW64\Dglmmf32.exeC:\Windows\system32\Dglmmf32.exe118⤵
- Drops file in System32 directory
PID:1400 -
C:\Windows\SysWOW64\Jkegigal.exeC:\Windows\system32\Jkegigal.exe119⤵
- Drops file in System32 directory
PID:1352 -
C:\Windows\SysWOW64\Kajbie32.exeC:\Windows\system32\Kajbie32.exe120⤵PID:1448
-
C:\Windows\SysWOW64\Kdinea32.exeC:\Windows\system32\Kdinea32.exe121⤵PID:2968
-
C:\Windows\SysWOW64\Khdjfpfg.exeC:\Windows\system32\Khdjfpfg.exe122⤵
- Drops file in System32 directory
PID:764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-