Analysis
-
max time kernel
251s -
max time network
281s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
16-11-2023 23:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.2f4024d83aac990e0804e38da41e8ec0.exe
Resource
win7-20231023-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.2f4024d83aac990e0804e38da41e8ec0.exe
Resource
win10v2004-20231020-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
NEAS.2f4024d83aac990e0804e38da41e8ec0.exe
-
Size
91KB
-
MD5
2f4024d83aac990e0804e38da41e8ec0
-
SHA1
660860b98dc889e27c7d71002e51ed7e91a4f278
-
SHA256
4dade1a10b88c0126c1eccd28eabdb94dd389dca7c788e1d6b7413e6d43283c9
-
SHA512
4f735505f8b53d849173f29eec82967665f79c7bcf4c3a8741669b5e00b40feaf341744009d4ef90105f3459e415bf3f8fb030183e2b6a05f80ad5e313a099d9
-
SSDEEP
1536:Cc+zuMUw0bDXSypR+Vdpb4EFbKIyhwr4Uol5KusGBNTbt7Pu:Cc+SMUw0bLSDVdpb4ubKnlUuMhCPu
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebfqbp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gkfkae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejbjidmm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Iajgdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adglqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahnjefcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckalkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cbkdhohk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eenfnmfe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ejggepfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjjachia.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Caajmilh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmicnhob.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcfiqgfp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djpqda32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doofbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehhjkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkndhbpn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adglqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffkgcdqn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lgmnko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mfoojk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fidmniqa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gjmpfp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbmnla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aaiodh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bgmjla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cpoeac32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hphafmee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdbfpafn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fpecddpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eebpil32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Glckehfp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hiqfoble.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hjpbie32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Heomdbla.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aikine32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehnknfdn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eklgjbca.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekndpa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pkjnmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbmeokdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cigijhne.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dffmgqcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kboloelf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Limjeb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dciemfcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afpnikda.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgbdhe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekmmgghe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kcbelmpb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qakkncmi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmklbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bqnidh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmnhok32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hchfff32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Limjeb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajelmiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdlakf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dchqkedl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fipenn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hjpbie32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Beccgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cipcii32.exe -
Executes dropped EXE 64 IoCs
pid Process 2684 Aimckl32.exe 2632 Pblkgh32.exe 856 Pkeppngm.exe 2868 Pemdic32.exe 2408 Qjacai32.exe 1696 Qakkncmi.exe 1992 Afhcgjkq.exe 892 Aamhdckg.exe 1188 Ajelmiag.exe 2852 Amdhidqk.exe 1720 Aikine32.exe 2120 Angafl32.exe 2360 Aimfcedl.exe 2948 Aedghf32.exe 1124 Bamdcf32.exe 1048 Boadlk32.exe 692 Bpbadcbj.exe 968 Baannfim.exe 292 Bdbfpafn.exe 1748 Beccgi32.exe 3028 Cgcoal32.exe 2712 Cialng32.exe 1064 Ccjpfmic.exe 2148 Cekihh32.exe 2064 Cocnanmd.exe 2756 Caajmilh.exe 3044 Cdpfiekl.exe 2332 Cadfbi32.exe 2528 Dgqokp32.exe 2532 Dafchi32.exe 572 Dgclpp32.exe 2896 Dnmdmj32.exe 1524 Dlgjie32.exe 2108 Ebccal32.exe 2268 Ehnknfdn.exe 956 Eklgjbca.exe 2732 Eddlcgjb.exe 1612 Ekndpa32.exe 2000 Ebhlmlhl.exe 1508 Ehbdif32.exe 1672 Edkbdf32.exe 3064 Fndfmljk.exe 2192 Fpecddpi.exe 2296 Ffokan32.exe 1876 Fmicnhob.exe 1152 Fpgpjdnf.exe 2976 Ffahgn32.exe 3024 Fipdci32.exe 1912 Fbjeao32.exe 2804 Fidmniqa.exe 976 Flcjjdpe.exe 2640 Gbmbgngb.exe 1596 Gigjch32.exe 2516 Gjmpfp32.exe 2576 Gmklbk32.exe 1892 Gdedoegh.exe 2880 Gibmglep.exe 3000 Gdgadeee.exe 1744 Nojljcjf.exe 1368 Qhoeqide.exe 2008 Fphgpnhm.exe 2352 Lgldmlil.exe 1172 Pidhjg32.exe 1904 Plbdfc32.exe -
Loads dropped DLL 64 IoCs
pid Process 2540 NEAS.2f4024d83aac990e0804e38da41e8ec0.exe 2540 NEAS.2f4024d83aac990e0804e38da41e8ec0.exe 2684 Aimckl32.exe 2684 Aimckl32.exe 2632 Pblkgh32.exe 2632 Pblkgh32.exe 856 Pkeppngm.exe 856 Pkeppngm.exe 2868 Pemdic32.exe 2868 Pemdic32.exe 2408 Qjacai32.exe 2408 Qjacai32.exe 1696 Qakkncmi.exe 1696 Qakkncmi.exe 1992 Afhcgjkq.exe 1992 Afhcgjkq.exe 892 Aamhdckg.exe 892 Aamhdckg.exe 1188 Ajelmiag.exe 1188 Ajelmiag.exe 2852 Amdhidqk.exe 2852 Amdhidqk.exe 1720 Aikine32.exe 1720 Aikine32.exe 2120 Angafl32.exe 2120 Angafl32.exe 2360 Aimfcedl.exe 2360 Aimfcedl.exe 2948 Aedghf32.exe 2948 Aedghf32.exe 1124 Bamdcf32.exe 1124 Bamdcf32.exe 1048 Boadlk32.exe 1048 Boadlk32.exe 692 Bpbadcbj.exe 692 Bpbadcbj.exe 968 Baannfim.exe 968 Baannfim.exe 292 Bdbfpafn.exe 292 Bdbfpafn.exe 1748 Beccgi32.exe 1748 Beccgi32.exe 3028 Cgcoal32.exe 3028 Cgcoal32.exe 2712 Cialng32.exe 2712 Cialng32.exe 1064 Ccjpfmic.exe 1064 Ccjpfmic.exe 2148 Cekihh32.exe 2148 Cekihh32.exe 2064 Cocnanmd.exe 2064 Cocnanmd.exe 2756 Caajmilh.exe 2756 Caajmilh.exe 3044 Cdpfiekl.exe 3044 Cdpfiekl.exe 2332 Cadfbi32.exe 2332 Cadfbi32.exe 2528 Dgqokp32.exe 2528 Dgqokp32.exe 2532 Dafchi32.exe 2532 Dafchi32.exe 572 Dgclpp32.exe 572 Dgclpp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Adglqd32.exe Aaiodh32.exe File opened for modification C:\Windows\SysWOW64\Dlhblc32.exe Cabnokkq.exe File created C:\Windows\SysWOW64\Fafepa32.dll Enliccgh.exe File created C:\Windows\SysWOW64\Fcmkgi32.exe Fejkklkp.exe File created C:\Windows\SysWOW64\Ohakme32.dll Kmjjec32.exe File created C:\Windows\SysWOW64\Lpdfmm32.exe Lgmnko32.exe File created C:\Windows\SysWOW64\Joaadj32.dll Nfalpkbg.exe File created C:\Windows\SysWOW64\Mfoljh32.dll NEAS.2f4024d83aac990e0804e38da41e8ec0.exe File created C:\Windows\SysWOW64\Bkfigqjn.exe Bcoafcjk.exe File opened for modification C:\Windows\SysWOW64\Geibin32.exe Goojldgf.exe File created C:\Windows\SysWOW64\Bnnlckgj.dll Gmjejafa.exe File created C:\Windows\SysWOW64\Aamhdckg.exe Afhcgjkq.exe File created C:\Windows\SysWOW64\Ccjpfmic.exe Cialng32.exe File opened for modification C:\Windows\SysWOW64\Ehnknfdn.exe Ebccal32.exe File created C:\Windows\SysWOW64\Gcpoaacc.dll Aclhap32.exe File opened for modification C:\Windows\SysWOW64\Pnbecp32.exe Mkkmcoaf.exe File created C:\Windows\SysWOW64\Kbfeigdn.dll Ekndpa32.exe File opened for modification C:\Windows\SysWOW64\Afpnikda.exe Aoeflamd.exe File opened for modification C:\Windows\SysWOW64\Cmlpjhlf.exe Cipcii32.exe File created C:\Windows\SysWOW64\Ffjodqan.dll Dnfoho32.exe File opened for modification C:\Windows\SysWOW64\Kmjjec32.exe Kgnall32.exe File created C:\Windows\SysWOW64\Dcfeek32.dll Ipmbobhc.exe File created C:\Windows\SysWOW64\Gbgkmjcp.dll Hnkmnpef.exe File opened for modification C:\Windows\SysWOW64\Hdigakji.exe Hmoneq32.exe File created C:\Windows\SysWOW64\Lbcbih32.exe Lpdfmm32.exe File created C:\Windows\SysWOW64\Nnmpdmpb.exe Nkndhbpn.exe File created C:\Windows\SysWOW64\Dalaeicf.exe Dmpedk32.exe File opened for modification C:\Windows\SysWOW64\Fgaibb32.exe Fphqehda.exe File created C:\Windows\SysWOW64\Fkjfidef.dll Ehhjkm32.exe File created C:\Windows\SysWOW64\Lepfnclb.dll Ebehob32.exe File opened for modification C:\Windows\SysWOW64\Nkndhbpn.exe Nddlkh32.exe File created C:\Windows\SysWOW64\Apfgdobl.dll Nfdhekpd.exe File created C:\Windows\SysWOW64\Bqnidh32.exe Abfonl32.exe File opened for modification C:\Windows\SysWOW64\Eqjepofl.exe Enliccgh.exe File opened for modification C:\Windows\SysWOW64\Gieckned.exe Fqakqmpd.exe File created C:\Windows\SysWOW64\Gmjejafa.exe Gdaqal32.exe File created C:\Windows\SysWOW64\Knidpqdp.dll Nkqqmanl.exe File opened for modification C:\Windows\SysWOW64\Ahlnpg32.exe Ajindjom.exe File created C:\Windows\SysWOW64\Eoabgggf.exe Ehhjkm32.exe File created C:\Windows\SysWOW64\Eadkkbpe.dll Fcmkgi32.exe File created C:\Windows\SysWOW64\Giabcd32.dll Jkbgllfl.exe File opened for modification C:\Windows\SysWOW64\Kdabfp32.exe Kmjjec32.exe File created C:\Windows\SysWOW64\Lneibjdf.exe Kdabfp32.exe File created C:\Windows\SysWOW64\Gdgadeee.exe Gibmglep.exe File created C:\Windows\SysWOW64\Goojldgf.exe Glanpi32.exe File created C:\Windows\SysWOW64\Pllfmb32.dll Glanpi32.exe File created C:\Windows\SysWOW64\Nogcbakj.exe Nklgbb32.exe File created C:\Windows\SysWOW64\Plbdfc32.exe Pidhjg32.exe File created C:\Windows\SysWOW64\Pboihm32.exe Phiekdeo.exe File created C:\Windows\SysWOW64\Ecigepeq.dll Geibin32.exe File opened for modification C:\Windows\SysWOW64\Dgbdhe32.exe Pnbecp32.exe File opened for modification C:\Windows\SysWOW64\Dcigfo32.exe Dahkngdj.exe File created C:\Windows\SysWOW64\Fnanjfjp.dll Fphgpnhm.exe File created C:\Windows\SysWOW64\Afpnikda.exe Aoeflamd.exe File created C:\Windows\SysWOW64\Lmjpjimj.dll Fbiajano.exe File created C:\Windows\SysWOW64\Jcoegi32.dll Gnehie32.exe File created C:\Windows\SysWOW64\Fejkklkp.exe Fmcbjojn.exe File created C:\Windows\SysWOW64\Lhongdah.dll Boadlk32.exe File opened for modification C:\Windows\SysWOW64\Ahnjefcd.exe Afpnikda.exe File opened for modification C:\Windows\SysWOW64\Cmibdh32.exe Bjkfhm32.exe File opened for modification C:\Windows\SysWOW64\Eilodk32.exe Efmchp32.exe File opened for modification C:\Windows\SysWOW64\Fipenn32.exe Fgaibb32.exe File opened for modification C:\Windows\SysWOW64\Egfnceik.exe Doofbg32.exe File created C:\Windows\SysWOW64\Ehhjkm32.exe Egfnceik.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aikine32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cekihh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gjmpfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfgaibbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkndhbpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oahllk32.dll" Pkeppngm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpecddpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfagmn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dalaeicf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cigijhne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eqjepofl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fcknai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Moidlkbn.dll" Jdkleamm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehnknfdn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ciemdiph.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpbadcbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bqbbpghe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffokan32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebfqbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcigfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aikine32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgqokp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgipha32.dll" Hhpigjfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnmpdmpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehhoncce.dll" Hchfff32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hldkfm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kcnnqp32.dll" Jnqchgep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlpnhnoo.dll" Ajelmiag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejbjidmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eqjepofl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hiqfoble.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hfipcf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cchnjh32.dll" Pidhjg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Glckehfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fbiajano.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bgmjla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Debcjiod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoafcm32.dll" Ggohlf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Heomdbla.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkndhbpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpecddpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fphgpnhm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bdlakf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Glflmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gmjejafa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hiqfoble.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aebljh32.dll" Ffokan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elpimpqf.dll" Gibmglep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfafnphf.dll" Nojljcjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhdmil32.dll" Gieckned.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgbdhe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dlompl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkefbmfl.dll" Ihoefn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dkeabg32.dll" Aamhdckg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccdchhae.dll" Bcoafcjk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihmiqnke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Joaadj32.dll" Nfalpkbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdocoipp.dll" Hdeekjmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ejggepfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfddcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cabnokkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkdmogal.dll" Beccgi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cialng32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdpfiekl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2684 2540 NEAS.2f4024d83aac990e0804e38da41e8ec0.exe 27 PID 2540 wrote to memory of 2684 2540 NEAS.2f4024d83aac990e0804e38da41e8ec0.exe 27 PID 2540 wrote to memory of 2684 2540 NEAS.2f4024d83aac990e0804e38da41e8ec0.exe 27 PID 2540 wrote to memory of 2684 2540 NEAS.2f4024d83aac990e0804e38da41e8ec0.exe 27 PID 2684 wrote to memory of 2632 2684 Aimckl32.exe 28 PID 2684 wrote to memory of 2632 2684 Aimckl32.exe 28 PID 2684 wrote to memory of 2632 2684 Aimckl32.exe 28 PID 2684 wrote to memory of 2632 2684 Aimckl32.exe 28 PID 2632 wrote to memory of 856 2632 Pblkgh32.exe 29 PID 2632 wrote to memory of 856 2632 Pblkgh32.exe 29 PID 2632 wrote to memory of 856 2632 Pblkgh32.exe 29 PID 2632 wrote to memory of 856 2632 Pblkgh32.exe 29 PID 856 wrote to memory of 2868 856 Pkeppngm.exe 30 PID 856 wrote to memory of 2868 856 Pkeppngm.exe 30 PID 856 wrote to memory of 2868 856 Pkeppngm.exe 30 PID 856 wrote to memory of 2868 856 Pkeppngm.exe 30 PID 2868 wrote to memory of 2408 2868 Pemdic32.exe 31 PID 2868 wrote to memory of 2408 2868 Pemdic32.exe 31 PID 2868 wrote to memory of 2408 2868 Pemdic32.exe 31 PID 2868 wrote to memory of 2408 2868 Pemdic32.exe 31 PID 2408 wrote to memory of 1696 2408 Qjacai32.exe 32 PID 2408 wrote to memory of 1696 2408 Qjacai32.exe 32 PID 2408 wrote to memory of 1696 2408 Qjacai32.exe 32 PID 2408 wrote to memory of 1696 2408 Qjacai32.exe 32 PID 1696 wrote to memory of 1992 1696 Qakkncmi.exe 33 PID 1696 wrote to memory of 1992 1696 Qakkncmi.exe 33 PID 1696 wrote to memory of 1992 1696 Qakkncmi.exe 33 PID 1696 wrote to memory of 1992 1696 Qakkncmi.exe 33 PID 1992 wrote to memory of 892 1992 Afhcgjkq.exe 34 PID 1992 wrote to memory of 892 1992 Afhcgjkq.exe 34 PID 1992 wrote to memory of 892 1992 Afhcgjkq.exe 34 PID 1992 wrote to memory of 892 1992 Afhcgjkq.exe 34 PID 892 wrote to memory of 1188 892 Aamhdckg.exe 35 PID 892 wrote to memory of 1188 892 Aamhdckg.exe 35 PID 892 wrote to memory of 1188 892 Aamhdckg.exe 35 PID 892 wrote to memory of 1188 892 Aamhdckg.exe 35 PID 1188 wrote to memory of 2852 1188 Ajelmiag.exe 36 PID 1188 wrote to memory of 2852 1188 Ajelmiag.exe 36 PID 1188 wrote to memory of 2852 1188 Ajelmiag.exe 36 PID 1188 wrote to memory of 2852 1188 Ajelmiag.exe 36 PID 2852 wrote to memory of 1720 2852 Amdhidqk.exe 37 PID 2852 wrote to memory of 1720 2852 Amdhidqk.exe 37 PID 2852 wrote to memory of 1720 2852 Amdhidqk.exe 37 PID 2852 wrote to memory of 1720 2852 Amdhidqk.exe 37 PID 1720 wrote to memory of 2120 1720 Aikine32.exe 38 PID 1720 wrote to memory of 2120 1720 Aikine32.exe 38 PID 1720 wrote to memory of 2120 1720 Aikine32.exe 38 PID 1720 wrote to memory of 2120 1720 Aikine32.exe 38 PID 2120 wrote to memory of 2360 2120 Angafl32.exe 39 PID 2120 wrote to memory of 2360 2120 Angafl32.exe 39 PID 2120 wrote to memory of 2360 2120 Angafl32.exe 39 PID 2120 wrote to memory of 2360 2120 Angafl32.exe 39 PID 2360 wrote to memory of 2948 2360 Aimfcedl.exe 40 PID 2360 wrote to memory of 2948 2360 Aimfcedl.exe 40 PID 2360 wrote to memory of 2948 2360 Aimfcedl.exe 40 PID 2360 wrote to memory of 2948 2360 Aimfcedl.exe 40 PID 2948 wrote to memory of 1124 2948 Aedghf32.exe 41 PID 2948 wrote to memory of 1124 2948 Aedghf32.exe 41 PID 2948 wrote to memory of 1124 2948 Aedghf32.exe 41 PID 2948 wrote to memory of 1124 2948 Aedghf32.exe 41 PID 1124 wrote to memory of 1048 1124 Bamdcf32.exe 42 PID 1124 wrote to memory of 1048 1124 Bamdcf32.exe 42 PID 1124 wrote to memory of 1048 1124 Bamdcf32.exe 42 PID 1124 wrote to memory of 1048 1124 Bamdcf32.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2f4024d83aac990e0804e38da41e8ec0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2f4024d83aac990e0804e38da41e8ec0.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\Aimckl32.exeC:\Windows\system32\Aimckl32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\Pblkgh32.exeC:\Windows\system32\Pblkgh32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\Pkeppngm.exeC:\Windows\system32\Pkeppngm.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\Pemdic32.exeC:\Windows\system32\Pemdic32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\Qjacai32.exeC:\Windows\system32\Qjacai32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\Qakkncmi.exeC:\Windows\system32\Qakkncmi.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\Afhcgjkq.exeC:\Windows\system32\Afhcgjkq.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\Aamhdckg.exeC:\Windows\system32\Aamhdckg.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\Ajelmiag.exeC:\Windows\system32\Ajelmiag.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\Amdhidqk.exeC:\Windows\system32\Amdhidqk.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\Aikine32.exeC:\Windows\system32\Aikine32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\Angafl32.exeC:\Windows\system32\Angafl32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\Aimfcedl.exeC:\Windows\system32\Aimfcedl.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\Aedghf32.exeC:\Windows\system32\Aedghf32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\Bamdcf32.exeC:\Windows\system32\Bamdcf32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\Boadlk32.exeC:\Windows\system32\Boadlk32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1048 -
C:\Windows\SysWOW64\Bpbadcbj.exeC:\Windows\system32\Bpbadcbj.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:692 -
C:\Windows\SysWOW64\Baannfim.exeC:\Windows\system32\Baannfim.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:968 -
C:\Windows\SysWOW64\Bdbfpafn.exeC:\Windows\system32\Bdbfpafn.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:292 -
C:\Windows\SysWOW64\Beccgi32.exeC:\Windows\system32\Beccgi32.exe21⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1748 -
C:\Windows\SysWOW64\Cgcoal32.exeC:\Windows\system32\Cgcoal32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3028 -
C:\Windows\SysWOW64\Cialng32.exeC:\Windows\system32\Cialng32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Ccjpfmic.exeC:\Windows\system32\Ccjpfmic.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1064 -
C:\Windows\SysWOW64\Cekihh32.exeC:\Windows\system32\Cekihh32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2148 -
C:\Windows\SysWOW64\Cocnanmd.exeC:\Windows\system32\Cocnanmd.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Caajmilh.exeC:\Windows\system32\Caajmilh.exe1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2756 -
C:\Windows\SysWOW64\Cdpfiekl.exeC:\Windows\system32\Cdpfiekl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3044 -
C:\Windows\SysWOW64\Cadfbi32.exeC:\Windows\system32\Cadfbi32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2332 -
C:\Windows\SysWOW64\Dgqokp32.exeC:\Windows\system32\Dgqokp32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2528 -
C:\Windows\SysWOW64\Dafchi32.exeC:\Windows\system32\Dafchi32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Windows\SysWOW64\Dgclpp32.exeC:\Windows\system32\Dgclpp32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:572 -
C:\Windows\SysWOW64\Dnmdmj32.exeC:\Windows\system32\Dnmdmj32.exe7⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\Dlgjie32.exeC:\Windows\system32\Dlgjie32.exe8⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\SysWOW64\Ebccal32.exeC:\Windows\system32\Ebccal32.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2108 -
C:\Windows\SysWOW64\Ehnknfdn.exeC:\Windows\system32\Ehnknfdn.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2268 -
C:\Windows\SysWOW64\Eklgjbca.exeC:\Windows\system32\Eklgjbca.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:956 -
C:\Windows\SysWOW64\Eddlcgjb.exeC:\Windows\system32\Eddlcgjb.exe12⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\Ekndpa32.exeC:\Windows\system32\Ekndpa32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1612 -
C:\Windows\SysWOW64\Ebhlmlhl.exeC:\Windows\system32\Ebhlmlhl.exe14⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\Ehbdif32.exeC:\Windows\system32\Ehbdif32.exe15⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\Edkbdf32.exeC:\Windows\system32\Edkbdf32.exe16⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\Fndfmljk.exeC:\Windows\system32\Fndfmljk.exe17⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\Fpecddpi.exeC:\Windows\system32\Fpecddpi.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2192 -
C:\Windows\SysWOW64\Ffokan32.exeC:\Windows\system32\Ffokan32.exe19⤵
- Executes dropped EXE
- Modifies registry class
PID:2296 -
C:\Windows\SysWOW64\Fmicnhob.exeC:\Windows\system32\Fmicnhob.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1876 -
C:\Windows\SysWOW64\Fpgpjdnf.exeC:\Windows\system32\Fpgpjdnf.exe21⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\SysWOW64\Ffahgn32.exeC:\Windows\system32\Ffahgn32.exe22⤵
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\Fipdci32.exeC:\Windows\system32\Fipdci32.exe23⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\Fbjeao32.exeC:\Windows\system32\Fbjeao32.exe24⤵
- Executes dropped EXE
PID:1912 -
C:\Windows\SysWOW64\Fidmniqa.exeC:\Windows\system32\Fidmniqa.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\Flcjjdpe.exeC:\Windows\system32\Flcjjdpe.exe26⤵
- Executes dropped EXE
PID:976 -
C:\Windows\SysWOW64\Gbmbgngb.exeC:\Windows\system32\Gbmbgngb.exe27⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\Gigjch32.exeC:\Windows\system32\Gigjch32.exe28⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\Gjmpfp32.exeC:\Windows\system32\Gjmpfp32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\Gmklbk32.exeC:\Windows\system32\Gmklbk32.exe30⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\Gdedoegh.exeC:\Windows\system32\Gdedoegh.exe31⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\Gibmglep.exeC:\Windows\system32\Gibmglep.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2880 -
C:\Windows\SysWOW64\Gdgadeee.exeC:\Windows\system32\Gdgadeee.exe33⤵
- Executes dropped EXE
PID:3000 -
C:\Windows\SysWOW64\Nojljcjf.exeC:\Windows\system32\Nojljcjf.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:1744 -
C:\Windows\SysWOW64\Qhoeqide.exeC:\Windows\system32\Qhoeqide.exe35⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\SysWOW64\Fphgpnhm.exeC:\Windows\system32\Fphgpnhm.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2008 -
C:\Windows\SysWOW64\Lgldmlil.exeC:\Windows\system32\Lgldmlil.exe37⤵
- Executes dropped EXE
PID:2352 -
C:\Windows\SysWOW64\Pidhjg32.exeC:\Windows\system32\Pidhjg32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1172 -
C:\Windows\SysWOW64\Plbdfc32.exeC:\Windows\system32\Plbdfc32.exe39⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\SysWOW64\Ppnpfagc.exeC:\Windows\system32\Ppnpfagc.exe40⤵PID:1932
-
C:\Windows\SysWOW64\Pbmlbmfg.exeC:\Windows\system32\Pbmlbmfg.exe41⤵PID:2032
-
C:\Windows\SysWOW64\Pifdog32.exeC:\Windows\system32\Pifdog32.exe42⤵PID:2988
-
C:\Windows\SysWOW64\Phiekdeo.exeC:\Windows\system32\Phiekdeo.exe43⤵
- Drops file in System32 directory
PID:1412 -
C:\Windows\SysWOW64\Pboihm32.exeC:\Windows\system32\Pboihm32.exe44⤵PID:2520
-
C:\Windows\SysWOW64\Phlaqc32.exeC:\Windows\system32\Phlaqc32.exe45⤵PID:1908
-
C:\Windows\SysWOW64\Pkjnmo32.exeC:\Windows\system32\Pkjnmo32.exe46⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2076 -
C:\Windows\SysWOW64\Qofjmnji.exeC:\Windows\system32\Qofjmnji.exe47⤵PID:2652
-
C:\Windows\SysWOW64\Qdbbedhp.exeC:\Windows\system32\Qdbbedhp.exe48⤵PID:3052
-
C:\Windows\SysWOW64\Qgckgp32.exeC:\Windows\system32\Qgckgp32.exe49⤵PID:2860
-
C:\Windows\SysWOW64\Anmcdjmn.exeC:\Windows\system32\Anmcdjmn.exe50⤵PID:2404
-
C:\Windows\SysWOW64\Aaiodh32.exeC:\Windows\system32\Aaiodh32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:596 -
C:\Windows\SysWOW64\Adglqd32.exeC:\Windows\system32\Adglqd32.exe52⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2792 -
C:\Windows\SysWOW64\Agfhmo32.exeC:\Windows\system32\Agfhmo32.exe53⤵PID:2908
-
C:\Windows\SysWOW64\Ajddik32.exeC:\Windows\system32\Ajddik32.exe54⤵PID:2884
-
C:\Windows\SysWOW64\Albpef32.exeC:\Windows\system32\Albpef32.exe55⤵PID:2736
-
C:\Windows\SysWOW64\Aclhap32.exeC:\Windows\system32\Aclhap32.exe56⤵
- Drops file in System32 directory
PID:1088 -
C:\Windows\SysWOW64\Anbmoi32.exeC:\Windows\system32\Anbmoi32.exe57⤵PID:768
-
C:\Windows\SysWOW64\Appikd32.exeC:\Windows\system32\Appikd32.exe58⤵PID:1720
-
C:\Windows\SysWOW64\Acoegp32.exeC:\Windows\system32\Acoegp32.exe59⤵PID:852
-
C:\Windows\SysWOW64\Ajindjom.exeC:\Windows\system32\Ajindjom.exe60⤵
- Drops file in System32 directory
PID:1328 -
C:\Windows\SysWOW64\Ahlnpg32.exeC:\Windows\system32\Ahlnpg32.exe61⤵PID:3028
-
C:\Windows\SysWOW64\Aoeflamd.exeC:\Windows\system32\Aoeflamd.exe62⤵
- Drops file in System32 directory
PID:2064 -
C:\Windows\SysWOW64\Afpnikda.exeC:\Windows\system32\Afpnikda.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2332 -
C:\Windows\SysWOW64\Ahnjefcd.exeC:\Windows\system32\Ahnjefcd.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:572 -
C:\Windows\SysWOW64\Alifee32.exeC:\Windows\system32\Alifee32.exe65⤵PID:2108
-
C:\Windows\SysWOW64\Abfonl32.exeC:\Windows\system32\Abfonl32.exe66⤵
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\Bqnidh32.exeC:\Windows\system32\Bqnidh32.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:544 -
C:\Windows\SysWOW64\Bghaabdg.exeC:\Windows\system32\Bghaabdg.exe68⤵PID:960
-
C:\Windows\SysWOW64\Bbmeokdm.exeC:\Windows\system32\Bbmeokdm.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1876 -
C:\Windows\SysWOW64\Bdlakf32.exeC:\Windows\system32\Bdlakf32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\Bcoafcjk.exeC:\Windows\system32\Bcoafcjk.exe71⤵
- Drops file in System32 directory
- Modifies registry class
PID:1356 -
C:\Windows\SysWOW64\Bkfigqjn.exeC:\Windows\system32\Bkfigqjn.exe72⤵PID:1924
-
C:\Windows\SysWOW64\Bqbbpghe.exeC:\Windows\system32\Bqbbpghe.exe73⤵
- Modifies registry class
PID:2100 -
C:\Windows\SysWOW64\Bgmjla32.exeC:\Windows\system32\Bgmjla32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:964 -
C:\Windows\SysWOW64\Bjkfhm32.exeC:\Windows\system32\Bjkfhm32.exe75⤵
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\Cmibdh32.exeC:\Windows\system32\Cmibdh32.exe76⤵PID:1168
-
C:\Windows\SysWOW64\Ccckabef.exeC:\Windows\system32\Ccckabef.exe77⤵PID:2304
-
C:\Windows\SysWOW64\Cfagmn32.exeC:\Windows\system32\Cfagmn32.exe78⤵
- Modifies registry class
PID:996 -
C:\Windows\SysWOW64\Cipcii32.exeC:\Windows\system32\Cipcii32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1948 -
C:\Windows\SysWOW64\Cmlpjhlf.exeC:\Windows\system32\Cmlpjhlf.exe80⤵PID:1628
-
C:\Windows\SysWOW64\Cfddcn32.exeC:\Windows\system32\Cfddcn32.exe81⤵
- Modifies registry class
PID:2164 -
C:\Windows\SysWOW64\Cjppclkp.exeC:\Windows\system32\Cjppclkp.exe82⤵PID:936
-
C:\Windows\SysWOW64\Ckalkd32.exeC:\Windows\system32\Ckalkd32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2788 -
C:\Windows\SysWOW64\Cbkdhohk.exeC:\Windows\system32\Cbkdhohk.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1564 -
C:\Windows\SysWOW64\Ciemdiph.exeC:\Windows\system32\Ciemdiph.exe85⤵
- Modifies registry class
PID:2468 -
C:\Windows\SysWOW64\Cpoeac32.exeC:\Windows\system32\Cpoeac32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2492 -
C:\Windows\SysWOW64\Cfimnmoa.exeC:\Windows\system32\Cfimnmoa.exe87⤵PID:676
-
C:\Windows\SysWOW64\Cigijhne.exeC:\Windows\system32\Cigijhne.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2412 -
C:\Windows\SysWOW64\Cgjjfe32.exeC:\Windows\system32\Cgjjfe32.exe89⤵PID:2608
-
C:\Windows\SysWOW64\Cndbbolm.exeC:\Windows\system32\Cndbbolm.exe90⤵PID:1100
-
C:\Windows\SysWOW64\Cabnokkq.exeC:\Windows\system32\Cabnokkq.exe91⤵
- Drops file in System32 directory
- Modifies registry class
PID:2036 -
C:\Windows\SysWOW64\Dlhblc32.exeC:\Windows\system32\Dlhblc32.exe92⤵PID:2280
-
C:\Windows\SysWOW64\Dnfoho32.exeC:\Windows\system32\Dnfoho32.exe93⤵
- Drops file in System32 directory
PID:1048 -
C:\Windows\SysWOW64\Dadkdj32.exeC:\Windows\system32\Dadkdj32.exe94⤵PID:2916
-
C:\Windows\SysWOW64\Dccgpf32.exeC:\Windows\system32\Dccgpf32.exe95⤵PID:2148
-
C:\Windows\SysWOW64\Dnikno32.exeC:\Windows\system32\Dnikno32.exe96⤵PID:3044
-
C:\Windows\SysWOW64\Debcjiod.exeC:\Windows\system32\Debcjiod.exe97⤵
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\Dfdpbaeb.exeC:\Windows\system32\Dfdpbaeb.exe98⤵PID:2836
-
C:\Windows\SysWOW64\Dmnhok32.exeC:\Windows\system32\Dmnhok32.exe99⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2840 -
C:\Windows\SysWOW64\Dchqkedl.exeC:\Windows\system32\Dchqkedl.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2192 -
C:\Windows\SysWOW64\Dffmgqcp.exeC:\Windows\system32\Dffmgqcp.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2096 -
C:\Windows\SysWOW64\Dmpedk32.exeC:\Windows\system32\Dmpedk32.exe102⤵
- Drops file in System32 directory
PID:2152 -
C:\Windows\SysWOW64\Dalaeicf.exeC:\Windows\system32\Dalaeicf.exe103⤵
- Modifies registry class
PID:2496 -
C:\Windows\SysWOW64\Dbmnla32.exeC:\Windows\system32\Dbmnla32.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2024 -
C:\Windows\SysWOW64\Djdenoif.exeC:\Windows\system32\Djdenoif.exe105⤵PID:2416
-
C:\Windows\SysWOW64\Dlebeg32.exeC:\Windows\system32\Dlebeg32.exe106⤵PID:1284
-
C:\Windows\SysWOW64\Edljfd32.exeC:\Windows\system32\Edljfd32.exe107⤵PID:1812
-
C:\Windows\SysWOW64\Eenfnmfe.exeC:\Windows\system32\Eenfnmfe.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2240 -
C:\Windows\SysWOW64\Epckkeek.exeC:\Windows\system32\Epckkeek.exe109⤵PID:556
-
C:\Windows\SysWOW64\Efmchp32.exeC:\Windows\system32\Efmchp32.exe110⤵
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\Eilodk32.exeC:\Windows\system32\Eilodk32.exe111⤵PID:2212
-
C:\Windows\SysWOW64\Epegae32.exeC:\Windows\system32\Epegae32.exe112⤵PID:2992
-
C:\Windows\SysWOW64\Ebddmq32.exeC:\Windows\system32\Ebddmq32.exe113⤵PID:2512
-
C:\Windows\SysWOW64\Eebpil32.exeC:\Windows\system32\Eebpil32.exe114⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3004 -
C:\Windows\SysWOW64\Ellhffim.exeC:\Windows\system32\Ellhffim.exe115⤵PID:472
-
C:\Windows\SysWOW64\Ebfqbp32.exeC:\Windows\system32\Ebfqbp32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1016 -
C:\Windows\SysWOW64\Fhhbffkk.exeC:\Windows\system32\Fhhbffkk.exe117⤵PID:2820
-
C:\Windows\SysWOW64\Fkfobbjo.exeC:\Windows\system32\Fkfobbjo.exe118⤵PID:3068
-
C:\Windows\SysWOW64\Fmggdm32.exeC:\Windows\system32\Fmggdm32.exe119⤵PID:1188
-
C:\Windows\SysWOW64\Fdapqgom.exeC:\Windows\system32\Fdapqgom.exe120⤵PID:764
-
C:\Windows\SysWOW64\Feblho32.exeC:\Windows\system32\Feblho32.exe121⤵PID:2716
-
C:\Windows\SysWOW64\Fmidimen.exeC:\Windows\system32\Fmidimen.exe122⤵PID:2748
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-