Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
236s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
d303e4493693b5a4773593126b7f60d6_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d303e4493693b5a4773593126b7f60d6_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
d303e4493693b5a4773593126b7f60d6_JC.exe
-
Size
96KB
-
MD5
d303e4493693b5a4773593126b7f60d6
-
SHA1
57acefbf6e9c132cdb2cbfbe1f34076fd6a43ab5
-
SHA256
a0a002af2f41a107d3dac56f6fbd7bf277b4326bfab9405fd6c5e0d87864c510
-
SHA512
a5c36d095cd62858a86e2f40faef044a8c2308ea6451f83a769fcbe38a77d4ec5476a4d35114453aac74aacce08480791cf2600234f572ea2cb49dc631e38356
-
SSDEEP
1536:i4EtCxyJ9mPNY0P8UwaTuzzQbw+4mNVcdZ2JVQBKoC/CKniTCvVAva61hLDnePhg:jE2XNGquzCw+4MVqZ2fQkbn1vVAva63l
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lakqoe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Diifph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgpjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ooaflp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkiifnab.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daenhgfm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqiidg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qofjmnji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afmack32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbkdhohk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffpnek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cofaad32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Opgjfb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppnpfagc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppnpfagc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdoedp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pmimpf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qnmfmoaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Akoghnnj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aghdboal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dcigfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pghklq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qafboi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Apnlee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apcfqd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aadbhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Miphjf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnleqj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgpjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eldidd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" d303e4493693b5a4773593126b7f60d6_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qfdnnlbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aanonj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmngef32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fphqehda.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cofaad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agfhmo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgbgqned.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pekhohfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apjbpemb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfflnl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cndbbolm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pboihm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qafboi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ahlnpg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aklgabbh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppelfbol.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aaeeoihj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afamgpga.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ominjg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oindpd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qfdnnlbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bagncl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckciqdol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpedph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Clheeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Diifph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Appikd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d303e4493693b5a4773593126b7f60d6_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpnobi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmbadfdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ppelfbol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pekhohfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Paqoef32.exe -
Executes dropped EXE 64 IoCs
pid Process 2624 Lpnobi32.exe 2508 Qfganb32.exe 1296 Fioajqmb.exe 2964 Lakqoe32.exe 2952 Lkcehkeh.exe 2684 Lmbadfdl.exe 2720 Mlikkbga.exe 2728 Mcfpmlll.exe 324 Miphjf32.exe 2096 Mlqakaqi.exe 1700 Meiedg32.exe 2028 Njpdiifd.exe 2020 Ngcebnen.exe 2332 Nnnmoh32.exe 588 Ofibcj32.exe 2012 Ooaflp32.exe 1640 Ohikeegf.exe 2196 Oindpd32.exe 548 Oohmmojn.exe 976 Oqiidg32.exe 2472 Oiqaed32.exe 1832 Pnminkof.exe 992 Pegaje32.exe 1272 Pnpfckmc.exe 2444 Pghklq32.exe 928 Paqoef32.exe 1692 Pjicnlqe.exe 1684 Ppelfbol.exe 2972 Pmimpf32.exe 2620 Qnmfmoaa.exe 2524 Qfdnnlbc.exe 3068 Qlaffbqk.exe 1904 Aanonj32.exe 2688 Aiegpg32.exe 1616 Aabhiikm.exe 2724 Ahmpfc32.exe 1756 Ajkmbo32.exe 1536 Aaeeoihj.exe 2808 Afamgpga.exe 1636 Apjbpemb.exe 1512 Bodhlane.exe 2380 Biiljjnk.exe 1116 Bkkiab32.exe 3016 Baeanl32.exe 1696 Bagncl32.exe 2248 Clheeh32.exe 2400 Cofaad32.exe 1968 Cfpinnfj.exe 1056 Fnleqj32.exe 656 Ialpfeno.exe 2264 Egnjbfqc.exe 2388 Opempcpn.exe 2764 Ofoemm32.exe 3036 Ominjg32.exe 2356 Opgjfb32.exe 1580 Pipnohdl.exe 3044 Pbhcgn32.exe 2916 Pefoci32.exe 2576 Pmngef32.exe 1652 Pfflnl32.exe 320 Pidhjg32.exe 2936 Ppnpfagc.exe 2804 Pekhohfk.exe 1620 Pkhagodb.exe -
Loads dropped DLL 64 IoCs
pid Process 2840 d303e4493693b5a4773593126b7f60d6_JC.exe 2840 d303e4493693b5a4773593126b7f60d6_JC.exe 2624 Lpnobi32.exe 2624 Lpnobi32.exe 2508 Qfganb32.exe 2508 Qfganb32.exe 1296 Fioajqmb.exe 1296 Fioajqmb.exe 2964 Lakqoe32.exe 2964 Lakqoe32.exe 2952 Lkcehkeh.exe 2952 Lkcehkeh.exe 2684 Lmbadfdl.exe 2684 Lmbadfdl.exe 2720 Mlikkbga.exe 2720 Mlikkbga.exe 2728 Mcfpmlll.exe 2728 Mcfpmlll.exe 324 Miphjf32.exe 324 Miphjf32.exe 2096 Mlqakaqi.exe 2096 Mlqakaqi.exe 1700 Meiedg32.exe 1700 Meiedg32.exe 2028 Njpdiifd.exe 2028 Njpdiifd.exe 2020 Ngcebnen.exe 2020 Ngcebnen.exe 2332 Nnnmoh32.exe 2332 Nnnmoh32.exe 588 Ofibcj32.exe 588 Ofibcj32.exe 2012 Ooaflp32.exe 2012 Ooaflp32.exe 1640 Ohikeegf.exe 1640 Ohikeegf.exe 2196 Oindpd32.exe 2196 Oindpd32.exe 548 Oohmmojn.exe 548 Oohmmojn.exe 976 Oqiidg32.exe 976 Oqiidg32.exe 2472 Oiqaed32.exe 2472 Oiqaed32.exe 1832 Pnminkof.exe 1832 Pnminkof.exe 992 Pegaje32.exe 992 Pegaje32.exe 1272 Pnpfckmc.exe 1272 Pnpfckmc.exe 2444 Pghklq32.exe 2444 Pghklq32.exe 928 Paqoef32.exe 928 Paqoef32.exe 1692 Pjicnlqe.exe 1692 Pjicnlqe.exe 1684 Ppelfbol.exe 1684 Ppelfbol.exe 2972 Pmimpf32.exe 2972 Pmimpf32.exe 2620 Qnmfmoaa.exe 2620 Qnmfmoaa.exe 2524 Qfdnnlbc.exe 2524 Qfdnnlbc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Hpnpjadd.dll Cnaempnp.exe File opened for modification C:\Windows\SysWOW64\Cndbbolm.exe Cfimnmoa.exe File created C:\Windows\SysWOW64\Qogcek32.dll Lakqoe32.exe File created C:\Windows\SysWOW64\Khdlhbmm.dll Oindpd32.exe File created C:\Windows\SysWOW64\Baeanl32.exe Bkkiab32.exe File opened for modification C:\Windows\SysWOW64\Pkhagodb.exe Pekhohfk.exe File created C:\Windows\SysWOW64\Dinnlc32.dll Pkhagodb.exe File opened for modification C:\Windows\SysWOW64\Qdeokd32.exe Qafboi32.exe File created C:\Windows\SysWOW64\Dnfoho32.exe Diifph32.exe File created C:\Windows\SysWOW64\Dbpaib32.dll Dhmjpbpl.exe File created C:\Windows\SysWOW64\Eihbgn32.dll Miphjf32.exe File created C:\Windows\SysWOW64\Lnakjani.dll Bkkiab32.exe File created C:\Windows\SysWOW64\Genifa32.dll Cofaad32.exe File created C:\Windows\SysWOW64\Aohbaq32.exe Aklgabbh.exe File opened for modification C:\Windows\SysWOW64\Aanonj32.exe Qlaffbqk.exe File created C:\Windows\SysWOW64\Paqoef32.exe Pghklq32.exe File created C:\Windows\SysWOW64\Idiphpjd.dll Ngcebnen.exe File created C:\Windows\SysWOW64\Meiedg32.exe Mlqakaqi.exe File opened for modification C:\Windows\SysWOW64\Pjicnlqe.exe Paqoef32.exe File created C:\Windows\SysWOW64\Ajnfbp32.dll Afamgpga.exe File created C:\Windows\SysWOW64\Ccokomof.dll Egnjbfqc.exe File created C:\Windows\SysWOW64\Fcaica32.dll Opempcpn.exe File created C:\Windows\SysWOW64\Opgjfb32.exe Ominjg32.exe File opened for modification C:\Windows\SysWOW64\Ckciqdol.exe Cbkdhohk.exe File created C:\Windows\SysWOW64\Miphjf32.exe Mcfpmlll.exe File created C:\Windows\SysWOW64\Edhdpb32.exe Dicpbibe.exe File opened for modification C:\Windows\SysWOW64\Egnjbfqc.exe Ialpfeno.exe File opened for modification C:\Windows\SysWOW64\Pekhohfk.exe Ppnpfagc.exe File created C:\Windows\SysWOW64\Dmmiiaba.dll Daidojeh.exe File opened for modification C:\Windows\SysWOW64\Doeegl32.exe Dkiifnab.exe File created C:\Windows\SysWOW64\Oephcpkd.dll Dacach32.exe File created C:\Windows\SysWOW64\Mkjofe32.dll Aanonj32.exe File created C:\Windows\SysWOW64\Chanco32.dll Anmcdjmn.exe File created C:\Windows\SysWOW64\Aadbhl32.exe Apcfqd32.exe File created C:\Windows\SysWOW64\Cndbbolm.exe Cfimnmoa.exe File opened for modification C:\Windows\SysWOW64\Aaeeoihj.exe Ajkmbo32.exe File opened for modification C:\Windows\SysWOW64\Clheeh32.exe Bagncl32.exe File opened for modification C:\Windows\SysWOW64\Ominjg32.exe Ofoemm32.exe File created C:\Windows\SysWOW64\Cbkdhohk.exe Bfbknkbn.exe File created C:\Windows\SysWOW64\Fclckhlb.dll Dmklikob.exe File created C:\Windows\SysWOW64\Daenhgfm.exe Dgpjko32.exe File created C:\Windows\SysWOW64\Pnminkof.exe Oiqaed32.exe File created C:\Windows\SysWOW64\Daidojeh.exe Debcjiod.exe File created C:\Windows\SysWOW64\Ojinqngj.dll Baeanl32.exe File opened for modification C:\Windows\SysWOW64\Ooaflp32.exe Ofibcj32.exe File created C:\Windows\SysWOW64\Ohikeegf.exe Ooaflp32.exe File created C:\Windows\SysWOW64\Ndmjbh32.dll Ckciqdol.exe File created C:\Windows\SysWOW64\Eldidd32.exe Eielhi32.exe File opened for modification C:\Windows\SysWOW64\Njpdiifd.exe Meiedg32.exe File created C:\Windows\SysWOW64\Oqiidg32.exe Oohmmojn.exe File created C:\Windows\SysWOW64\Elajhc32.dll Paqoef32.exe File opened for modification C:\Windows\SysWOW64\Fnleqj32.exe Cfpinnfj.exe File created C:\Windows\SysWOW64\Laodhngd.dll Pmngef32.exe File created C:\Windows\SysWOW64\Akoghnnj.exe Qdeokd32.exe File created C:\Windows\SysWOW64\Aghdboal.exe Apnlee32.exe File opened for modification C:\Windows\SysWOW64\Mlqakaqi.exe Miphjf32.exe File opened for modification C:\Windows\SysWOW64\Ppelfbol.exe Pjicnlqe.exe File created C:\Windows\SysWOW64\Qlaffbqk.exe Qfdnnlbc.exe File created C:\Windows\SysWOW64\Qdbbedhp.exe Qadfiiil.exe File created C:\Windows\SysWOW64\Pcocqpoi.dll Qohfcmhf.exe File created C:\Windows\SysWOW64\Ndmgck32.dll Cfimnmoa.exe File created C:\Windows\SysWOW64\Ldbpcn32.dll Pegaje32.exe File created C:\Windows\SysWOW64\Ckldighd.dll Oiqaed32.exe File created C:\Windows\SysWOW64\Caccbb32.dll Qfdnnlbc.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nboohcij.dll" Fnleqj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aanonj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fpgain32.dll" Bagncl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldbpcn32.dll" Pegaje32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnpfckmc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pidhjg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahlnpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcoeeb32.dll" Bfbknkbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmklikob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fpedph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dacach32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njpdiifd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qlaffbqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbbpj32.dll" Pdpepejb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Doehbl32.dll" Ddoaic32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmbadfdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oohmmojn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnnhbkmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aaeeoihj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcpoaacc.dll" Aghdboal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pipnohdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Laodhngd.dll" Pmngef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Anmcdjmn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aklgabbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgbgqned.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eihbgn32.dll" Miphjf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppelfbol.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cofaad32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahlnpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cambea32.dll" Diifph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aijbmnok.dll" Dkigme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lcfblfmb.dll" Qfganb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Paqoef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkoief32.dll" Aadbhl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eielhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eielhi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlqakaqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Khdlhbmm.dll" Oindpd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ckanhf32.dll" Clheeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fcaica32.dll" Opempcpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmngef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pboihm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Albpef32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dpkkjd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gdmnphna.dll" Mcfpmlll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bkkiab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gnneqopg.dll" Fnnhbkmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Anbmoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daidojeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdoedp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgpjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qlaffbqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ahmpfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnaempnp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkaanogl.dll" Eggpln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onocfgga.dll" Eldidd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ieckbh32.dll" Ahmpfc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qohfcmhf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ialpfeno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pbhcgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbkdhohk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lakqoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Biiljjnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qafboi32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2624 2840 d303e4493693b5a4773593126b7f60d6_JC.exe 28 PID 2840 wrote to memory of 2624 2840 d303e4493693b5a4773593126b7f60d6_JC.exe 28 PID 2840 wrote to memory of 2624 2840 d303e4493693b5a4773593126b7f60d6_JC.exe 28 PID 2840 wrote to memory of 2624 2840 d303e4493693b5a4773593126b7f60d6_JC.exe 28 PID 2624 wrote to memory of 2508 2624 Lpnobi32.exe 29 PID 2624 wrote to memory of 2508 2624 Lpnobi32.exe 29 PID 2624 wrote to memory of 2508 2624 Lpnobi32.exe 29 PID 2624 wrote to memory of 2508 2624 Lpnobi32.exe 29 PID 2508 wrote to memory of 1296 2508 Qfganb32.exe 30 PID 2508 wrote to memory of 1296 2508 Qfganb32.exe 30 PID 2508 wrote to memory of 1296 2508 Qfganb32.exe 30 PID 2508 wrote to memory of 1296 2508 Qfganb32.exe 30 PID 1296 wrote to memory of 2964 1296 Fioajqmb.exe 31 PID 1296 wrote to memory of 2964 1296 Fioajqmb.exe 31 PID 1296 wrote to memory of 2964 1296 Fioajqmb.exe 31 PID 1296 wrote to memory of 2964 1296 Fioajqmb.exe 31 PID 2964 wrote to memory of 2952 2964 Lakqoe32.exe 32 PID 2964 wrote to memory of 2952 2964 Lakqoe32.exe 32 PID 2964 wrote to memory of 2952 2964 Lakqoe32.exe 32 PID 2964 wrote to memory of 2952 2964 Lakqoe32.exe 32 PID 2952 wrote to memory of 2684 2952 Lkcehkeh.exe 34 PID 2952 wrote to memory of 2684 2952 Lkcehkeh.exe 34 PID 2952 wrote to memory of 2684 2952 Lkcehkeh.exe 34 PID 2952 wrote to memory of 2684 2952 Lkcehkeh.exe 34 PID 2684 wrote to memory of 2720 2684 Lmbadfdl.exe 33 PID 2684 wrote to memory of 2720 2684 Lmbadfdl.exe 33 PID 2684 wrote to memory of 2720 2684 Lmbadfdl.exe 33 PID 2684 wrote to memory of 2720 2684 Lmbadfdl.exe 33 PID 2720 wrote to memory of 2728 2720 Mlikkbga.exe 35 PID 2720 wrote to memory of 2728 2720 Mlikkbga.exe 35 PID 2720 wrote to memory of 2728 2720 Mlikkbga.exe 35 PID 2720 wrote to memory of 2728 2720 Mlikkbga.exe 35 PID 2728 wrote to memory of 324 2728 Mcfpmlll.exe 36 PID 2728 wrote to memory of 324 2728 Mcfpmlll.exe 36 PID 2728 wrote to memory of 324 2728 Mcfpmlll.exe 36 PID 2728 wrote to memory of 324 2728 Mcfpmlll.exe 36 PID 324 wrote to memory of 2096 324 Miphjf32.exe 37 PID 324 wrote to memory of 2096 324 Miphjf32.exe 37 PID 324 wrote to memory of 2096 324 Miphjf32.exe 37 PID 324 wrote to memory of 2096 324 Miphjf32.exe 37 PID 2096 wrote to memory of 1700 2096 Mlqakaqi.exe 38 PID 2096 wrote to memory of 1700 2096 Mlqakaqi.exe 38 PID 2096 wrote to memory of 1700 2096 Mlqakaqi.exe 38 PID 2096 wrote to memory of 1700 2096 Mlqakaqi.exe 38 PID 1700 wrote to memory of 2028 1700 Meiedg32.exe 39 PID 1700 wrote to memory of 2028 1700 Meiedg32.exe 39 PID 1700 wrote to memory of 2028 1700 Meiedg32.exe 39 PID 1700 wrote to memory of 2028 1700 Meiedg32.exe 39 PID 2028 wrote to memory of 2020 2028 Njpdiifd.exe 40 PID 2028 wrote to memory of 2020 2028 Njpdiifd.exe 40 PID 2028 wrote to memory of 2020 2028 Njpdiifd.exe 40 PID 2028 wrote to memory of 2020 2028 Njpdiifd.exe 40 PID 2020 wrote to memory of 2332 2020 Ngcebnen.exe 41 PID 2020 wrote to memory of 2332 2020 Ngcebnen.exe 41 PID 2020 wrote to memory of 2332 2020 Ngcebnen.exe 41 PID 2020 wrote to memory of 2332 2020 Ngcebnen.exe 41 PID 2332 wrote to memory of 588 2332 Nnnmoh32.exe 42 PID 2332 wrote to memory of 588 2332 Nnnmoh32.exe 42 PID 2332 wrote to memory of 588 2332 Nnnmoh32.exe 42 PID 2332 wrote to memory of 588 2332 Nnnmoh32.exe 42 PID 588 wrote to memory of 2012 588 Ofibcj32.exe 43 PID 588 wrote to memory of 2012 588 Ofibcj32.exe 43 PID 588 wrote to memory of 2012 588 Ofibcj32.exe 43 PID 588 wrote to memory of 2012 588 Ofibcj32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\d303e4493693b5a4773593126b7f60d6_JC.exe"C:\Users\Admin\AppData\Local\Temp\d303e4493693b5a4773593126b7f60d6_JC.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Lpnobi32.exeC:\Windows\system32\Lpnobi32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Qfganb32.exeC:\Windows\system32\Qfganb32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Fioajqmb.exeC:\Windows\system32\Fioajqmb.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\Lakqoe32.exeC:\Windows\system32\Lakqoe32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\Lkcehkeh.exeC:\Windows\system32\Lkcehkeh.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\Lmbadfdl.exeC:\Windows\system32\Lmbadfdl.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2684
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Mlikkbga.exeC:\Windows\system32\Mlikkbga.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Mcfpmlll.exeC:\Windows\system32\Mcfpmlll.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\Miphjf32.exeC:\Windows\system32\Miphjf32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\Mlqakaqi.exeC:\Windows\system32\Mlqakaqi.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\Meiedg32.exeC:\Windows\system32\Meiedg32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\Njpdiifd.exeC:\Windows\system32\Njpdiifd.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\Ngcebnen.exeC:\Windows\system32\Ngcebnen.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\Nnnmoh32.exeC:\Windows\system32\Nnnmoh32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\Ofibcj32.exeC:\Windows\system32\Ofibcj32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\Ooaflp32.exeC:\Windows\system32\Ooaflp32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\Ohikeegf.exeC:\Windows\system32\Ohikeegf.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Windows\SysWOW64\Oindpd32.exeC:\Windows\system32\Oindpd32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2196 -
C:\Windows\SysWOW64\Oohmmojn.exeC:\Windows\system32\Oohmmojn.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:548 -
C:\Windows\SysWOW64\Oqiidg32.exeC:\Windows\system32\Oqiidg32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:976 -
C:\Windows\SysWOW64\Oiqaed32.exeC:\Windows\system32\Oiqaed32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2472 -
C:\Windows\SysWOW64\Pnminkof.exeC:\Windows\system32\Pnminkof.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1832 -
C:\Windows\SysWOW64\Pegaje32.exeC:\Windows\system32\Pegaje32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:992 -
C:\Windows\SysWOW64\Pnpfckmc.exeC:\Windows\system32\Pnpfckmc.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1272 -
C:\Windows\SysWOW64\Pghklq32.exeC:\Windows\system32\Pghklq32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\Paqoef32.exeC:\Windows\system32\Paqoef32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:928 -
C:\Windows\SysWOW64\Pjicnlqe.exeC:\Windows\system32\Pjicnlqe.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1692 -
C:\Windows\SysWOW64\Ppelfbol.exeC:\Windows\system32\Ppelfbol.exe22⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\Pmimpf32.exeC:\Windows\system32\Pmimpf32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2972 -
C:\Windows\SysWOW64\Qnmfmoaa.exeC:\Windows\system32\Qnmfmoaa.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2620 -
C:\Windows\SysWOW64\Qfdnnlbc.exeC:\Windows\system32\Qfdnnlbc.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2524 -
C:\Windows\SysWOW64\Qlaffbqk.exeC:\Windows\system32\Qlaffbqk.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3068 -
C:\Windows\SysWOW64\Aanonj32.exeC:\Windows\system32\Aanonj32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1904 -
C:\Windows\SysWOW64\Aiegpg32.exeC:\Windows\system32\Aiegpg32.exe28⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\Aabhiikm.exeC:\Windows\system32\Aabhiikm.exe29⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\Ahmpfc32.exeC:\Windows\system32\Ahmpfc32.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:2724 -
C:\Windows\SysWOW64\Ajkmbo32.exeC:\Windows\system32\Ajkmbo32.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1756 -
C:\Windows\SysWOW64\Aaeeoihj.exeC:\Windows\system32\Aaeeoihj.exe32⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1536 -
C:\Windows\SysWOW64\Afamgpga.exeC:\Windows\system32\Afamgpga.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\Apjbpemb.exeC:\Windows\system32\Apjbpemb.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\Bodhlane.exeC:\Windows\system32\Bodhlane.exe35⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\SysWOW64\Biiljjnk.exeC:\Windows\system32\Biiljjnk.exe36⤵
- Executes dropped EXE
- Modifies registry class
PID:2380 -
C:\Windows\SysWOW64\Bkkiab32.exeC:\Windows\system32\Bkkiab32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1116 -
C:\Windows\SysWOW64\Baeanl32.exeC:\Windows\system32\Baeanl32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3016 -
C:\Windows\SysWOW64\Bagncl32.exeC:\Windows\system32\Bagncl32.exe39⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1696 -
C:\Windows\SysWOW64\Clheeh32.exeC:\Windows\system32\Clheeh32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2248 -
C:\Windows\SysWOW64\Cofaad32.exeC:\Windows\system32\Cofaad32.exe41⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2400 -
C:\Windows\SysWOW64\Cfpinnfj.exeC:\Windows\system32\Cfpinnfj.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1968 -
C:\Windows\SysWOW64\Fnleqj32.exeC:\Windows\system32\Fnleqj32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\Ialpfeno.exeC:\Windows\system32\Ialpfeno.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:656 -
C:\Windows\SysWOW64\Egnjbfqc.exeC:\Windows\system32\Egnjbfqc.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\Opempcpn.exeC:\Windows\system32\Opempcpn.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\Ofoemm32.exeC:\Windows\system32\Ofoemm32.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2764 -
C:\Windows\SysWOW64\Ominjg32.exeC:\Windows\system32\Ominjg32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\Opgjfb32.exeC:\Windows\system32\Opgjfb32.exe49⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2356 -
C:\Windows\SysWOW64\Pipnohdl.exeC:\Windows\system32\Pipnohdl.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:1580 -
C:\Windows\SysWOW64\Pbhcgn32.exeC:\Windows\system32\Pbhcgn32.exe51⤵
- Executes dropped EXE
- Modifies registry class
PID:3044 -
C:\Windows\SysWOW64\Pefoci32.exeC:\Windows\system32\Pefoci32.exe52⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\Pmngef32.exeC:\Windows\system32\Pmngef32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2576 -
C:\Windows\SysWOW64\Pfflnl32.exeC:\Windows\system32\Pfflnl32.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\Pidhjg32.exeC:\Windows\system32\Pidhjg32.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:320 -
C:\Windows\SysWOW64\Ppnpfagc.exeC:\Windows\system32\Ppnpfagc.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2936 -
C:\Windows\SysWOW64\Pekhohfk.exeC:\Windows\system32\Pekhohfk.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2804 -
C:\Windows\SysWOW64\Pkhagodb.exeC:\Windows\system32\Pkhagodb.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1620 -
C:\Windows\SysWOW64\Pboihm32.exeC:\Windows\system32\Pboihm32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1248 -
C:\Windows\SysWOW64\Pdpepejb.exeC:\Windows\system32\Pdpepejb.exe60⤵
- Modifies registry class
PID:2692 -
C:\Windows\SysWOW64\Qofjmnji.exeC:\Windows\system32\Qofjmnji.exe61⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1436 -
C:\Windows\SysWOW64\Qadfiiil.exeC:\Windows\system32\Qadfiiil.exe62⤵
- Drops file in System32 directory
PID:1392 -
C:\Windows\SysWOW64\Qdbbedhp.exeC:\Windows\system32\Qdbbedhp.exe63⤵PID:1160
-
C:\Windows\SysWOW64\Qohfcmhf.exeC:\Windows\system32\Qohfcmhf.exe64⤵
- Drops file in System32 directory
- Modifies registry class
PID:2292 -
C:\Windows\SysWOW64\Qafboi32.exeC:\Windows\system32\Qafboi32.exe65⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:800 -
C:\Windows\SysWOW64\Qdeokd32.exeC:\Windows\system32\Qdeokd32.exe66⤵
- Drops file in System32 directory
PID:2092 -
C:\Windows\SysWOW64\Akoghnnj.exeC:\Windows\system32\Akoghnnj.exe67⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1772 -
C:\Windows\SysWOW64\Anmcdjmn.exeC:\Windows\system32\Anmcdjmn.exe68⤵
- Drops file in System32 directory
- Modifies registry class
PID:1068 -
C:\Windows\SysWOW64\Aplppela.exeC:\Windows\system32\Aplppela.exe69⤵PID:1380
-
C:\Windows\SysWOW64\Agfhmo32.exeC:\Windows\system32\Agfhmo32.exe70⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:988 -
C:\Windows\SysWOW64\Albpef32.exeC:\Windows\system32\Albpef32.exe71⤵
- Modifies registry class
PID:1556 -
C:\Windows\SysWOW64\Apnlee32.exeC:\Windows\system32\Apnlee32.exe72⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2028 -
C:\Windows\SysWOW64\Aghdboal.exeC:\Windows\system32\Aghdboal.exe73⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2012 -
C:\Windows\SysWOW64\Anbmoi32.exeC:\Windows\system32\Anbmoi32.exe74⤵
- Modifies registry class
PID:2588 -
C:\Windows\SysWOW64\Appikd32.exeC:\Windows\system32\Appikd32.exe75⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1576 -
C:\Windows\SysWOW64\Afmack32.exeC:\Windows\system32\Afmack32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1904 -
C:\Windows\SysWOW64\Ahlnpg32.exeC:\Windows\system32\Ahlnpg32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Apcfqd32.exeC:\Windows\system32\Apcfqd32.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1696 -
C:\Windows\SysWOW64\Aadbhl32.exeC:\Windows\system32\Aadbhl32.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:700 -
C:\Windows\SysWOW64\Ajkjij32.exeC:\Windows\system32\Ajkjij32.exe80⤵PID:2184
-
C:\Windows\SysWOW64\Aklgabbh.exeC:\Windows\system32\Aklgabbh.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:340 -
C:\Windows\SysWOW64\Aohbaq32.exeC:\Windows\system32\Aohbaq32.exe82⤵PID:1956
-
C:\Windows\SysWOW64\Bfbknkbn.exeC:\Windows\system32\Bfbknkbn.exe83⤵
- Drops file in System32 directory
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\Cbkdhohk.exeC:\Windows\system32\Cbkdhohk.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Ckciqdol.exeC:\Windows\system32\Ckciqdol.exe85⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2520 -
C:\Windows\SysWOW64\Cnaempnp.exeC:\Windows\system32\Cnaempnp.exe86⤵
- Drops file in System32 directory
- Modifies registry class
PID:2984 -
C:\Windows\SysWOW64\Cfimnmoa.exeC:\Windows\system32\Cfimnmoa.exe87⤵
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\Cndbbolm.exeC:\Windows\system32\Cndbbolm.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2108 -
C:\Windows\SysWOW64\Cenjoi32.exeC:\Windows\system32\Cenjoi32.exe89⤵PID:1660
-
C:\Windows\SysWOW64\Diifph32.exeC:\Windows\system32\Diifph32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2880 -
C:\Windows\SysWOW64\Dnfoho32.exeC:\Windows\system32\Dnfoho32.exe91⤵PID:560
-
C:\Windows\SysWOW64\Dgocadqk.exeC:\Windows\system32\Dgocadqk.exe92⤵PID:624
-
C:\Windows\SysWOW64\Dmklikob.exeC:\Windows\system32\Dmklikob.exe93⤵
- Drops file in System32 directory
- Modifies registry class
PID:2164 -
C:\Windows\SysWOW64\Debcjiod.exeC:\Windows\system32\Debcjiod.exe94⤵
- Drops file in System32 directory
PID:2072 -
C:\Windows\SysWOW64\Daidojeh.exeC:\Windows\system32\Daidojeh.exe95⤵
- Drops file in System32 directory
- Modifies registry class
PID:1796 -
C:\Windows\SysWOW64\Fpedph32.exeC:\Windows\system32\Fpedph32.exe96⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2060 -
C:\Windows\SysWOW64\Fphqehda.exeC:\Windows\system32\Fphqehda.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1640 -
C:\Windows\SysWOW64\Fdoedp32.exeC:\Windows\system32\Fdoedp32.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1092 -
C:\Windows\SysWOW64\Fpffianh.exeC:\Windows\system32\Fpffianh.exe99⤵PID:924
-
C:\Windows\SysWOW64\Ffpnek32.exeC:\Windows\system32\Ffpnek32.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2724 -
C:\Windows\SysWOW64\Dkigme32.exeC:\Windows\system32\Dkigme32.exe101⤵
- Modifies registry class
PID:1312 -
C:\Windows\SysWOW64\Lifdec32.exeC:\Windows\system32\Lifdec32.exe102⤵PID:1472
-
C:\Windows\SysWOW64\Ddoaic32.exeC:\Windows\system32\Ddoaic32.exe103⤵
- Modifies registry class
PID:2152 -
C:\Windows\SysWOW64\Dkiifnab.exeC:\Windows\system32\Dkiifnab.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1964 -
C:\Windows\SysWOW64\Doeegl32.exeC:\Windows\system32\Doeegl32.exe105⤵PID:936
-
C:\Windows\SysWOW64\Dacach32.exeC:\Windows\system32\Dacach32.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:1264 -
C:\Windows\SysWOW64\Dhmjpbpl.exeC:\Windows\system32\Dhmjpbpl.exe107⤵
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\Dgpjko32.exeC:\Windows\system32\Dgpjko32.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2004 -
C:\Windows\SysWOW64\Daenhgfm.exeC:\Windows\system32\Daenhgfm.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2672 -
C:\Windows\SysWOW64\Dddjdcfq.exeC:\Windows\system32\Dddjdcfq.exe110⤵PID:2112
-
C:\Windows\SysWOW64\Dgbgqned.exeC:\Windows\system32\Dgbgqned.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2924 -
C:\Windows\SysWOW64\Dpkkjd32.exeC:\Windows\system32\Dpkkjd32.exe112⤵
- Modifies registry class
PID:2912 -
C:\Windows\SysWOW64\Dcigfo32.exeC:\Windows\system32\Dcigfo32.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2732 -
C:\Windows\SysWOW64\Dgdcfnca.exeC:\Windows\system32\Dgdcfnca.exe114⤵PID:2744
-
C:\Windows\SysWOW64\Dicpbibe.exeC:\Windows\system32\Dicpbibe.exe115⤵
- Drops file in System32 directory
PID:1744 -
C:\Windows\SysWOW64\Edhdpb32.exeC:\Windows\system32\Edhdpb32.exe116⤵PID:868
-
C:\Windows\SysWOW64\Eggpln32.exeC:\Windows\system32\Eggpln32.exe117⤵
- Modifies registry class
PID:2324 -
C:\Windows\SysWOW64\Eielhi32.exeC:\Windows\system32\Eielhi32.exe118⤵
- Drops file in System32 directory
- Modifies registry class
PID:1484 -
C:\Windows\SysWOW64\Eldidd32.exeC:\Windows\system32\Eldidd32.exe119⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2284 -
C:\Windows\SysWOW64\Fnnhbkmj.exeC:\Windows\system32\Fnnhbkmj.exe120⤵
- Modifies registry class
PID:748 -
C:\Windows\SysWOW64\Fajdbj32.exeC:\Windows\system32\Fajdbj32.exe121⤵PID:1784
-
C:\Windows\SysWOW64\Fgglka32.exeC:\Windows\system32\Fgglka32.exe122⤵PID:980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-