Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
252s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21/10/2023, 21:16 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.30e2d17e59876979540a84a3765ea510.exe
Resource
win7-20231020-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.30e2d17e59876979540a84a3765ea510.exe
Resource
win10v2004-20231020-en
6 signatures
150 seconds
General
-
Target
NEAS.30e2d17e59876979540a84a3765ea510.exe
-
Size
60KB
-
MD5
30e2d17e59876979540a84a3765ea510
-
SHA1
0b72df1deb056ec9679aea1e477e9319d92d2967
-
SHA256
ce8c7ba6b7ef1b7a8061851e55a88f115b8a3be75d001f040d178a594ea2c3ed
-
SHA512
d131b79b6963a87e11afac8efe45d5a380e264a64d7320d82ac5437434ca50b1743ecfbc4ffd532b9aaa78ba45d2d29dfbc93a2d61d644f6d77e08aab45cbf7f
-
SSDEEP
1536:D4P9/OfCeyFjYJJVK72dqjTF8PzuB86l1r:09RrujKadqjTFIuB86l1r
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpdide32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbcnloam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hakapfnq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Liaenblm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdbloobc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Noiiaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfgpnm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgnjof32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgjfjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Afikmi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mddidnqa.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajcpgi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfjjbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnoamj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mengda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdfmddff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emmnch32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gcnleahm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlpemo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Najadala.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmekdanq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oeeicc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Noiiaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pgnmjokn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cgdippej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hahbam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgffpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgebfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bopbeopi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhnede32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqqboo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npakkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oeipje32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmdonf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njbemg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Coghfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggldlpoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bnncgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmojcceo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pidgnc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oamcjgmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mdbloobc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neaehelb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iiimnjmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ciojhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inciaamj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmgbdp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ljkcmd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Foqgqppk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gafelnkb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mpaolj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjgpak32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad NEAS.30e2d17e59876979540a84a3765ea510.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jjgbbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohfgeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldjajnlm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfijcdek.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhamklea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmeknakn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pifcdbhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jklbed32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hakapfnq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edgfpbcl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gpblof32.exe -
Executes dropped EXE 64 IoCs
pid Process 2588 Dfgpnm32.exe 2568 Ihopjl32.exe 1944 Jggiah32.exe 268 Jqonjmbn.exe 1012 Jjgbbc32.exe 2808 Jodkkj32.exe 2260 Jmhkdnfp.exe 1100 Jofhqiec.exe 1932 Kmjhjndm.exe 2456 Kfcmcckn.exe 1712 Kbjmhd32.exe 2428 Kgffpk32.exe 2412 Knqnmeff.exe 1656 Kldofi32.exe 2388 Kmeknakn.exe 2024 Ljjkgfig.exe 2492 Lpfdpmho.exe 1368 Liohhbno.exe 884 Lcdmekne.exe 2932 Liaenblm.exe 1736 Lfeegfkf.exe 1336 Moecghdl.exe 3056 Mdbloobc.exe 1052 Mlidplcf.exe 2288 Mmjqhd32.exe 1536 Mddidnqa.exe 2584 Mojmbg32.exe 1592 Mpkjjofe.exe 2560 Mgebfi32.exe 2608 Mmojcceo.exe 2972 Mdibpn32.exe 1088 Nijdcdgn.exe 528 Npdlpnnj.exe 1568 Neaehelb.exe 2864 Noiiaj32.exe 1872 Najbbepc.exe 340 Oggkklnk.exe 1748 Onacgf32.exe 2460 Ohfgeo32.exe 2236 Okecak32.exe 1556 Oqaliabh.exe 2368 Olhmnb32.exe 2916 Ofaaghom.exe 2056 Polbemck.exe 2292 Pidgnc32.exe 1184 Pcikllja.exe 1612 Pifcdbhi.exe 272 Pkeppngm.exe 2284 Pobhfl32.exe 1256 Pbaebh32.exe 3004 Pqdend32.exe 2108 Pgnmjokn.exe 1652 Ajcpgi32.exe 552 Amfeodoh.exe 2600 Afojgiei.exe 972 Ijokcl32.exe 1684 Eklbid32.exe 2800 Oamcjgmi.exe 2624 Oeipje32.exe 748 Bgemal32.exe 1648 Bhfjid32.exe 2776 Blaficqe.exe 2944 Bopbeopi.exe 2568 Bfjjbi32.exe -
Loads dropped DLL 64 IoCs
pid Process 2796 NEAS.30e2d17e59876979540a84a3765ea510.exe 2796 NEAS.30e2d17e59876979540a84a3765ea510.exe 2588 Dfgpnm32.exe 2588 Dfgpnm32.exe 2568 Ihopjl32.exe 2568 Ihopjl32.exe 1944 Jggiah32.exe 1944 Jggiah32.exe 268 Jqonjmbn.exe 268 Jqonjmbn.exe 1012 Jjgbbc32.exe 1012 Jjgbbc32.exe 2808 Jodkkj32.exe 2808 Jodkkj32.exe 2260 Jmhkdnfp.exe 2260 Jmhkdnfp.exe 1100 Jofhqiec.exe 1100 Jofhqiec.exe 1932 Kmjhjndm.exe 1932 Kmjhjndm.exe 2456 Kfcmcckn.exe 2456 Kfcmcckn.exe 1712 Kbjmhd32.exe 1712 Kbjmhd32.exe 2428 Kgffpk32.exe 2428 Kgffpk32.exe 2412 Knqnmeff.exe 2412 Knqnmeff.exe 1656 Kldofi32.exe 1656 Kldofi32.exe 2388 Kmeknakn.exe 2388 Kmeknakn.exe 2024 Ljjkgfig.exe 2024 Ljjkgfig.exe 2492 Lpfdpmho.exe 2492 Lpfdpmho.exe 1368 Liohhbno.exe 1368 Liohhbno.exe 884 Lcdmekne.exe 884 Lcdmekne.exe 2932 Liaenblm.exe 2932 Liaenblm.exe 1736 Lfeegfkf.exe 1736 Lfeegfkf.exe 1336 Moecghdl.exe 1336 Moecghdl.exe 3056 Mdbloobc.exe 3056 Mdbloobc.exe 1052 Mlidplcf.exe 1052 Mlidplcf.exe 2288 Mmjqhd32.exe 2288 Mmjqhd32.exe 1536 Mddidnqa.exe 1536 Mddidnqa.exe 2584 Mojmbg32.exe 2584 Mojmbg32.exe 1592 Mpkjjofe.exe 1592 Mpkjjofe.exe 2560 Mgebfi32.exe 2560 Mgebfi32.exe 2608 Mmojcceo.exe 2608 Mmojcceo.exe 2972 Mdibpn32.exe 2972 Mdibpn32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\Foqgqppk.exe Elbkddpg.exe File created C:\Windows\SysWOW64\Ohfahnad.dll Fldgjd32.exe File created C:\Windows\SysWOW64\Hahbam32.exe Gknjecab.exe File created C:\Windows\SysWOW64\Achlgh32.dll Lkamai32.exe File created C:\Windows\SysWOW64\Laeiebho.dll Nigbncgj.exe File opened for modification C:\Windows\SysWOW64\Lcdmekne.exe Liohhbno.exe File created C:\Windows\SysWOW64\Mdbloobc.exe Moecghdl.exe File opened for modification C:\Windows\SysWOW64\Pifcdbhi.exe Pcikllja.exe File opened for modification C:\Windows\SysWOW64\Nofhlj32.exe Nmekdanq.exe File created C:\Windows\SysWOW64\Efhldg32.dll Bckkoa32.exe File opened for modification C:\Windows\SysWOW64\Bejhid32.exe Bnppmjkf.exe File created C:\Windows\SysWOW64\Hkcfikea.exe Hlpemo32.exe File created C:\Windows\SysWOW64\Ldjajnlm.exe Lnpimd32.exe File opened for modification C:\Windows\SysWOW64\Lmgbdp32.exe Ljifgeha.exe File created C:\Windows\SysWOW64\Bjbeapph.dll Lmgbdp32.exe File created C:\Windows\SysWOW64\Jofjcfle.dll Ljjkgfig.exe File created C:\Windows\SysWOW64\Ddjjlj32.dll Mojmbg32.exe File created C:\Windows\SysWOW64\Jbcnloam.exe Jjlfkaqk.exe File opened for modification C:\Windows\SysWOW64\Mmqejooj.exe Mfgmme32.exe File created C:\Windows\SysWOW64\Ecbpef32.dll Mmqejooj.exe File created C:\Windows\SysWOW64\Jdnkjn32.dll Jmhkdnfp.exe File opened for modification C:\Windows\SysWOW64\Fkjdkqcl.exe Fihhch32.exe File created C:\Windows\SysWOW64\Pbdkoe32.dll Gifgml32.exe File created C:\Windows\SysWOW64\Nbmjai32.exe Nponen32.exe File created C:\Windows\SysWOW64\Aqhiicnf.exe Abeinf32.exe File opened for modification C:\Windows\SysWOW64\Japkljlo.exe Cbgnaljp.exe File created C:\Windows\SysWOW64\Oaocoklg.dll Jgnjof32.exe File created C:\Windows\SysWOW64\Njemgjlc.dll Jbcnloam.exe File created C:\Windows\SysWOW64\Glmopeji.dll Mbbgmeim.exe File opened for modification C:\Windows\SysWOW64\Cfnaglfn.exe Cpdija32.exe File created C:\Windows\SysWOW64\Hnibonjd.dll Jjgbbc32.exe File created C:\Windows\SysWOW64\Polbemck.exe Ofaaghom.exe File created C:\Windows\SysWOW64\Obdqbh32.exe Oljhen32.exe File created C:\Windows\SysWOW64\Hdinla32.exe Hakapfnq.exe File created C:\Windows\SysWOW64\Nklgbb32.exe Japkljlo.exe File opened for modification C:\Windows\SysWOW64\Pkeppngm.exe Pifcdbhi.exe File opened for modification C:\Windows\SysWOW64\Cdhjjddc.exe Cqmnie32.exe File created C:\Windows\SysWOW64\Jcekdg32.exe Jbcnloam.exe File created C:\Windows\SysWOW64\Ijokcl32.exe Afojgiei.exe File opened for modification C:\Windows\SysWOW64\Cikocggb.exe Cgicko32.exe File created C:\Windows\SysWOW64\Lfefhlbg.dll Pgmlljgm.exe File opened for modification C:\Windows\SysWOW64\Hdfoni32.exe Hahbam32.exe File created C:\Windows\SysWOW64\Pfbgpdqp.dll Mfgmme32.exe File opened for modification C:\Windows\SysWOW64\Mpaolj32.exe Mgjfjm32.exe File opened for modification C:\Windows\SysWOW64\Cpfepamo.exe Cilmcgeb.exe File created C:\Windows\SysWOW64\Okabeg32.dll Lfeegfkf.exe File created C:\Windows\SysWOW64\Ekfapncd.dll Cnoamj32.exe File created C:\Windows\SysWOW64\Cnanbijd.exe Cfjfal32.exe File created C:\Windows\SysWOW64\Eigckn32.dll Lgmgai32.exe File created C:\Windows\SysWOW64\Ppeqdp32.exe Pilhhffp.exe File created C:\Windows\SysWOW64\Okoilk32.dll Ajnami32.exe File opened for modification C:\Windows\SysWOW64\Foqgqppk.exe Elbkddpg.exe File created C:\Windows\SysWOW64\Gpppifii.exe Gifgml32.exe File created C:\Windows\SysWOW64\Hlpemo32.exe Hdinla32.exe File opened for modification C:\Windows\SysWOW64\Ofaaghom.exe Olhmnb32.exe File created C:\Windows\SysWOW64\Mfgmme32.exe Ljkcmd32.exe File created C:\Windows\SysWOW64\Nmlhncfk.exe Mljlfk32.exe File created C:\Windows\SysWOW64\Ibqofb32.dll Oljhen32.exe File created C:\Windows\SysWOW64\Negeelle.dll Japkljlo.exe File opened for modification C:\Windows\SysWOW64\Ljjkgfig.exe Kmeknakn.exe File created C:\Windows\SysWOW64\Najbbepc.exe Noiiaj32.exe File created C:\Windows\SysWOW64\Oqaliabh.exe Okecak32.exe File created C:\Windows\SysWOW64\Ppmceh32.dll Lnpimd32.exe File created C:\Windows\SysWOW64\Bjbgfkeo.exe Biajoc32.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgeogdgj.dll" Cgppep32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mnadjb32.dll" Cbedbi32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fkjdkqcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbqllnco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bjbeapph.dll" Lmgbdp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Anbigl32.dll" Nmlhncfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nplapn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdlomqkj.dll" Mddidnqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agfijeim.dll" Agoepm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acffenmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nenccdmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lqqboo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Najadala.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lafgagdb.dll" Noiiaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Alikdf32.dll" Eddijbeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ehgjigei.dll" Jjlfkaqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Holedjom.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcmaek32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oillib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lihcmpal.dll" Jofhqiec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cddqod32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hiilhi32.dll" Emkanhnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ibmhlpge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hepopi32.dll" Mlcfel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bopbeopi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nijdcdgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfgmme32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njpiggde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njpiggde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gpknep32.dll" Mmjqhd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Neaehelb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eadpig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmkbmgkn.dll" Ikgijelc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cifbnali.dll" Lqqboo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oillib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lfefhlbg.dll" Pgmlljgm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pilhhffp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ihopjl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmjfielh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdfmddff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnanbijd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Edgfpbcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gikahkng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkcifh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ljifgeha.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 NEAS.30e2d17e59876979540a84a3765ea510.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cbedbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njemgjlc.dll" Jbcnloam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mccdem32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npakkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Blaficqe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mdfljc32.dll" Dqagddge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hnocgnoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Chfjlj32.dll" Iiimnjmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ppmceh32.dll" Lnpimd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kfhhecgi.dll" Ldjajnlm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Blbcqn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cpfepamo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhfjid32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfjfal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Piajea32.dll" Gknjecab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jgqfefpe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lmgbdp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmqejooj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2588 2796 NEAS.30e2d17e59876979540a84a3765ea510.exe 27 PID 2796 wrote to memory of 2588 2796 NEAS.30e2d17e59876979540a84a3765ea510.exe 27 PID 2796 wrote to memory of 2588 2796 NEAS.30e2d17e59876979540a84a3765ea510.exe 27 PID 2796 wrote to memory of 2588 2796 NEAS.30e2d17e59876979540a84a3765ea510.exe 27 PID 2588 wrote to memory of 2568 2588 Dfgpnm32.exe 28 PID 2588 wrote to memory of 2568 2588 Dfgpnm32.exe 28 PID 2588 wrote to memory of 2568 2588 Dfgpnm32.exe 28 PID 2588 wrote to memory of 2568 2588 Dfgpnm32.exe 28 PID 2568 wrote to memory of 1944 2568 Ihopjl32.exe 29 PID 2568 wrote to memory of 1944 2568 Ihopjl32.exe 29 PID 2568 wrote to memory of 1944 2568 Ihopjl32.exe 29 PID 2568 wrote to memory of 1944 2568 Ihopjl32.exe 29 PID 1944 wrote to memory of 268 1944 Jggiah32.exe 30 PID 1944 wrote to memory of 268 1944 Jggiah32.exe 30 PID 1944 wrote to memory of 268 1944 Jggiah32.exe 30 PID 1944 wrote to memory of 268 1944 Jggiah32.exe 30 PID 268 wrote to memory of 1012 268 Jqonjmbn.exe 31 PID 268 wrote to memory of 1012 268 Jqonjmbn.exe 31 PID 268 wrote to memory of 1012 268 Jqonjmbn.exe 31 PID 268 wrote to memory of 1012 268 Jqonjmbn.exe 31 PID 1012 wrote to memory of 2808 1012 Jjgbbc32.exe 32 PID 1012 wrote to memory of 2808 1012 Jjgbbc32.exe 32 PID 1012 wrote to memory of 2808 1012 Jjgbbc32.exe 32 PID 1012 wrote to memory of 2808 1012 Jjgbbc32.exe 32 PID 2808 wrote to memory of 2260 2808 Jodkkj32.exe 33 PID 2808 wrote to memory of 2260 2808 Jodkkj32.exe 33 PID 2808 wrote to memory of 2260 2808 Jodkkj32.exe 33 PID 2808 wrote to memory of 2260 2808 Jodkkj32.exe 33 PID 2260 wrote to memory of 1100 2260 Jmhkdnfp.exe 34 PID 2260 wrote to memory of 1100 2260 Jmhkdnfp.exe 34 PID 2260 wrote to memory of 1100 2260 Jmhkdnfp.exe 34 PID 2260 wrote to memory of 1100 2260 Jmhkdnfp.exe 34 PID 1100 wrote to memory of 1932 1100 Jofhqiec.exe 35 PID 1100 wrote to memory of 1932 1100 Jofhqiec.exe 35 PID 1100 wrote to memory of 1932 1100 Jofhqiec.exe 35 PID 1100 wrote to memory of 1932 1100 Jofhqiec.exe 35 PID 1932 wrote to memory of 2456 1932 Kmjhjndm.exe 36 PID 1932 wrote to memory of 2456 1932 Kmjhjndm.exe 36 PID 1932 wrote to memory of 2456 1932 Kmjhjndm.exe 36 PID 1932 wrote to memory of 2456 1932 Kmjhjndm.exe 36 PID 2456 wrote to memory of 1712 2456 Kfcmcckn.exe 37 PID 2456 wrote to memory of 1712 2456 Kfcmcckn.exe 37 PID 2456 wrote to memory of 1712 2456 Kfcmcckn.exe 37 PID 2456 wrote to memory of 1712 2456 Kfcmcckn.exe 37 PID 1712 wrote to memory of 2428 1712 Kbjmhd32.exe 39 PID 1712 wrote to memory of 2428 1712 Kbjmhd32.exe 39 PID 1712 wrote to memory of 2428 1712 Kbjmhd32.exe 39 PID 1712 wrote to memory of 2428 1712 Kbjmhd32.exe 39 PID 2428 wrote to memory of 2412 2428 Kgffpk32.exe 38 PID 2428 wrote to memory of 2412 2428 Kgffpk32.exe 38 PID 2428 wrote to memory of 2412 2428 Kgffpk32.exe 38 PID 2428 wrote to memory of 2412 2428 Kgffpk32.exe 38 PID 2412 wrote to memory of 1656 2412 Knqnmeff.exe 40 PID 2412 wrote to memory of 1656 2412 Knqnmeff.exe 40 PID 2412 wrote to memory of 1656 2412 Knqnmeff.exe 40 PID 2412 wrote to memory of 1656 2412 Knqnmeff.exe 40 PID 1656 wrote to memory of 2388 1656 Kldofi32.exe 41 PID 1656 wrote to memory of 2388 1656 Kldofi32.exe 41 PID 1656 wrote to memory of 2388 1656 Kldofi32.exe 41 PID 1656 wrote to memory of 2388 1656 Kldofi32.exe 41 PID 2388 wrote to memory of 2024 2388 Kmeknakn.exe 43 PID 2388 wrote to memory of 2024 2388 Kmeknakn.exe 43 PID 2388 wrote to memory of 2024 2388 Kmeknakn.exe 43 PID 2388 wrote to memory of 2024 2388 Kmeknakn.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.30e2d17e59876979540a84a3765ea510.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.30e2d17e59876979540a84a3765ea510.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\Dfgpnm32.exeC:\Windows\system32\Dfgpnm32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\Ihopjl32.exeC:\Windows\system32\Ihopjl32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\Jggiah32.exeC:\Windows\system32\Jggiah32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\Jqonjmbn.exeC:\Windows\system32\Jqonjmbn.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\Jjgbbc32.exeC:\Windows\system32\Jjgbbc32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\Jodkkj32.exeC:\Windows\system32\Jodkkj32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\Jmhkdnfp.exeC:\Windows\system32\Jmhkdnfp.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\Jofhqiec.exeC:\Windows\system32\Jofhqiec.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\Kmjhjndm.exeC:\Windows\system32\Kmjhjndm.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\Kfcmcckn.exeC:\Windows\system32\Kfcmcckn.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\Kbjmhd32.exeC:\Windows\system32\Kbjmhd32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\Kgffpk32.exeC:\Windows\system32\Kgffpk32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2428
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Knqnmeff.exeC:\Windows\system32\Knqnmeff.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\Kldofi32.exeC:\Windows\system32\Kldofi32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\Kmeknakn.exeC:\Windows\system32\Kmeknakn.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\Ljjkgfig.exeC:\Windows\system32\Ljjkgfig.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2024
-
-
-
-
C:\Windows\SysWOW64\Lpfdpmho.exeC:\Windows\system32\Lpfdpmho.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2492 -
C:\Windows\SysWOW64\Liohhbno.exeC:\Windows\system32\Liohhbno.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1368 -
C:\Windows\SysWOW64\Lcdmekne.exeC:\Windows\system32\Lcdmekne.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:884 -
C:\Windows\SysWOW64\Liaenblm.exeC:\Windows\system32\Liaenblm.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2932 -
C:\Windows\SysWOW64\Lfeegfkf.exeC:\Windows\system32\Lfeegfkf.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1736 -
C:\Windows\SysWOW64\Moecghdl.exeC:\Windows\system32\Moecghdl.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1336 -
C:\Windows\SysWOW64\Mdbloobc.exeC:\Windows\system32\Mdbloobc.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:3056 -
C:\Windows\SysWOW64\Mlidplcf.exeC:\Windows\system32\Mlidplcf.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1052 -
C:\Windows\SysWOW64\Mmjqhd32.exeC:\Windows\system32\Mmjqhd32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\Mddidnqa.exeC:\Windows\system32\Mddidnqa.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1536 -
C:\Windows\SysWOW64\Mojmbg32.exeC:\Windows\system32\Mojmbg32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\Mpkjjofe.exeC:\Windows\system32\Mpkjjofe.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1592 -
C:\Windows\SysWOW64\Mgebfi32.exeC:\Windows\system32\Mgebfi32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2560 -
C:\Windows\SysWOW64\Mmojcceo.exeC:\Windows\system32\Mmojcceo.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2608 -
C:\Windows\SysWOW64\Mdibpn32.exeC:\Windows\system32\Mdibpn32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2972 -
C:\Windows\SysWOW64\Nijdcdgn.exeC:\Windows\system32\Nijdcdgn.exe16⤵
- Executes dropped EXE
- Modifies registry class
PID:1088 -
C:\Windows\SysWOW64\Npdlpnnj.exeC:\Windows\system32\Npdlpnnj.exe17⤵
- Executes dropped EXE
PID:528 -
C:\Windows\SysWOW64\Neaehelb.exeC:\Windows\system32\Neaehelb.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:1568 -
C:\Windows\SysWOW64\Noiiaj32.exeC:\Windows\system32\Noiiaj32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2864 -
C:\Windows\SysWOW64\Najbbepc.exeC:\Windows\system32\Najbbepc.exe20⤵
- Executes dropped EXE
PID:1872 -
C:\Windows\SysWOW64\Oggkklnk.exeC:\Windows\system32\Oggkklnk.exe21⤵
- Executes dropped EXE
PID:340 -
C:\Windows\SysWOW64\Onacgf32.exeC:\Windows\system32\Onacgf32.exe22⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\SysWOW64\Ohfgeo32.exeC:\Windows\system32\Ohfgeo32.exe23⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\Okecak32.exeC:\Windows\system32\Okecak32.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2236 -
C:\Windows\SysWOW64\Oqaliabh.exeC:\Windows\system32\Oqaliabh.exe25⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\Olhmnb32.exeC:\Windows\system32\Olhmnb32.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2368 -
C:\Windows\SysWOW64\Ofaaghom.exeC:\Windows\system32\Ofaaghom.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\Polbemck.exeC:\Windows\system32\Polbemck.exe28⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\Pidgnc32.exeC:\Windows\system32\Pidgnc32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2292 -
C:\Windows\SysWOW64\Pcikllja.exeC:\Windows\system32\Pcikllja.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1184 -
C:\Windows\SysWOW64\Pifcdbhi.exeC:\Windows\system32\Pifcdbhi.exe31⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1612 -
C:\Windows\SysWOW64\Pkeppngm.exeC:\Windows\system32\Pkeppngm.exe32⤵
- Executes dropped EXE
PID:272 -
C:\Windows\SysWOW64\Pobhfl32.exeC:\Windows\system32\Pobhfl32.exe33⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\Pbaebh32.exeC:\Windows\system32\Pbaebh32.exe34⤵
- Executes dropped EXE
PID:1256 -
C:\Windows\SysWOW64\Pqdend32.exeC:\Windows\system32\Pqdend32.exe35⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\Pgnmjokn.exeC:\Windows\system32\Pgnmjokn.exe36⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\Ajcpgi32.exeC:\Windows\system32\Ajcpgi32.exe37⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1652 -
C:\Windows\SysWOW64\Amfeodoh.exeC:\Windows\system32\Amfeodoh.exe38⤵
- Executes dropped EXE
PID:552 -
C:\Windows\SysWOW64\Afojgiei.exeC:\Windows\system32\Afojgiei.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2600 -
C:\Windows\SysWOW64\Ijokcl32.exeC:\Windows\system32\Ijokcl32.exe40⤵
- Executes dropped EXE
PID:972 -
C:\Windows\SysWOW64\Eklbid32.exeC:\Windows\system32\Eklbid32.exe41⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\Oamcjgmi.exeC:\Windows\system32\Oamcjgmi.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\Oeipje32.exeC:\Windows\system32\Oeipje32.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2624 -
C:\Windows\SysWOW64\Bgemal32.exeC:\Windows\system32\Bgemal32.exe44⤵
- Executes dropped EXE
PID:748 -
C:\Windows\SysWOW64\Bhfjid32.exeC:\Windows\system32\Bhfjid32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:1648 -
C:\Windows\SysWOW64\Blaficqe.exeC:\Windows\system32\Blaficqe.exe46⤵
- Executes dropped EXE
- Modifies registry class
PID:2776 -
C:\Windows\SysWOW64\Bopbeopi.exeC:\Windows\system32\Bopbeopi.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:2944 -
C:\Windows\SysWOW64\Bfjjbi32.exeC:\Windows\system32\Bfjjbi32.exe48⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2568 -
C:\Windows\SysWOW64\Cgppep32.exeC:\Windows\system32\Cgppep32.exe49⤵
- Modifies registry class
PID:1012 -
C:\Windows\SysWOW64\Coghfn32.exeC:\Windows\system32\Coghfn32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1100 -
C:\Windows\SysWOW64\Cbedbi32.exeC:\Windows\system32\Cbedbi32.exe51⤵
- Modifies registry class
PID:1632 -
C:\Windows\SysWOW64\Cddqod32.exeC:\Windows\system32\Cddqod32.exe52⤵
- Modifies registry class
PID:1064 -
C:\Windows\SysWOW64\Cknikooe.exeC:\Windows\system32\Cknikooe.exe53⤵PID:1644
-
C:\Windows\SysWOW64\Cnlegj32.exeC:\Windows\system32\Cnlegj32.exe54⤵PID:2052
-
C:\Windows\SysWOW64\Cdfmddff.exeC:\Windows\system32\Cdfmddff.exe55⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1508 -
C:\Windows\SysWOW64\Cgdippej.exeC:\Windows\system32\Cgdippej.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1500 -
C:\Windows\SysWOW64\Cnoamj32.exeC:\Windows\system32\Cnoamj32.exe57⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3048 -
C:\Windows\SysWOW64\Cqmnie32.exeC:\Windows\system32\Cqmnie32.exe58⤵
- Drops file in System32 directory
PID:2480 -
C:\Windows\SysWOW64\Cdhjjddc.exeC:\Windows\system32\Cdhjjddc.exe59⤵PID:396
-
C:\Windows\SysWOW64\Cfjfal32.exeC:\Windows\system32\Cfjfal32.exe60⤵
- Drops file in System32 directory
- Modifies registry class
PID:1052 -
C:\Windows\SysWOW64\Cnanbijd.exeC:\Windows\system32\Cnanbijd.exe61⤵
- Modifies registry class
PID:1900 -
C:\Windows\SysWOW64\Cmdonf32.exeC:\Windows\system32\Cmdonf32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2820 -
C:\Windows\SysWOW64\Ccngkphk.exeC:\Windows\system32\Ccngkphk.exe63⤵PID:2136
-
C:\Windows\SysWOW64\Cgicko32.exeC:\Windows\system32\Cgicko32.exe64⤵
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\Cikocggb.exeC:\Windows\system32\Cikocggb.exe65⤵PID:1088
-
C:\Windows\SysWOW64\Dqagddge.exeC:\Windows\system32\Dqagddge.exe66⤵
- Modifies registry class
PID:528 -
C:\Windows\SysWOW64\Dcpcppfh.exeC:\Windows\system32\Dcpcppfh.exe67⤵PID:1952
-
C:\Windows\SysWOW64\Dfoplkel.exeC:\Windows\system32\Dfoplkel.exe68⤵PID:2460
-
C:\Windows\SysWOW64\Eempcfbi.exeC:\Windows\system32\Eempcfbi.exe69⤵PID:1556
-
C:\Windows\SysWOW64\Ejjhlmqa.exeC:\Windows\system32\Ejjhlmqa.exe70⤵PID:2212
-
C:\Windows\SysWOW64\Eadpig32.exeC:\Windows\system32\Eadpig32.exe71⤵
- Modifies registry class
PID:1184 -
C:\Windows\SysWOW64\Ehnieaoj.exeC:\Windows\system32\Ehnieaoj.exe72⤵PID:1612
-
C:\Windows\SysWOW64\Emkanhnb.exeC:\Windows\system32\Emkanhnb.exe73⤵
- Modifies registry class
PID:1880 -
C:\Windows\SysWOW64\Eddijbeo.exeC:\Windows\system32\Eddijbeo.exe74⤵
- Modifies registry class
PID:2108 -
C:\Windows\SysWOW64\Efcefndb.exeC:\Windows\system32\Efcefndb.exe75⤵PID:908
-
C:\Windows\SysWOW64\Emmnch32.exeC:\Windows\system32\Emmnch32.exe76⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2680 -
C:\Windows\SysWOW64\Edgfpbcl.exeC:\Windows\system32\Edgfpbcl.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2684 -
C:\Windows\SysWOW64\Eidohiac.exeC:\Windows\system32\Eidohiac.exe78⤵PID:2564
-
C:\Windows\SysWOW64\Elbkddpg.exeC:\Windows\system32\Elbkddpg.exe79⤵
- Drops file in System32 directory
PID:2816 -
C:\Windows\SysWOW64\Foqgqppk.exeC:\Windows\system32\Foqgqppk.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2612 -
C:\Windows\SysWOW64\Fejomjgg.exeC:\Windows\system32\Fejomjgg.exe81⤵PID:524
-
C:\Windows\SysWOW64\Fldgjd32.exeC:\Windows\system32\Fldgjd32.exe82⤵
- Drops file in System32 directory
PID:672 -
C:\Windows\SysWOW64\Fihhch32.exeC:\Windows\system32\Fihhch32.exe83⤵
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\Fkjdkqcl.exeC:\Windows\system32\Fkjdkqcl.exe84⤵
- Modifies registry class
PID:2588 -
C:\Windows\SysWOW64\Fbqllnco.exeC:\Windows\system32\Fbqllnco.exe85⤵
- Modifies registry class
PID:268 -
C:\Windows\SysWOW64\Fhnede32.exeC:\Windows\system32\Fhnede32.exe86⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1940 -
C:\Windows\SysWOW64\Gpncdfkl.exeC:\Windows\system32\Gpncdfkl.exe87⤵PID:1884
-
C:\Windows\SysWOW64\Gclopbjo.exeC:\Windows\system32\Gclopbjo.exe88⤵PID:1772
-
C:\Windows\SysWOW64\Gggkqq32.exeC:\Windows\system32\Gggkqq32.exe89⤵PID:2644
-
C:\Windows\SysWOW64\Gifgml32.exeC:\Windows\system32\Gifgml32.exe90⤵
- Drops file in System32 directory
PID:2448 -
C:\Windows\SysWOW64\Gpppifii.exeC:\Windows\system32\Gpppifii.exe91⤵PID:2440
-
C:\Windows\SysWOW64\Gcnleahm.exeC:\Windows\system32\Gcnleahm.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3044 -
C:\Windows\SysWOW64\Ggjhfpqf.exeC:\Windows\system32\Ggjhfpqf.exe93⤵PID:3052
-
C:\Windows\SysWOW64\Gpblof32.exeC:\Windows\system32\Gpblof32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2920 -
C:\Windows\SysWOW64\Ggldlpoc.exeC:\Windows\system32\Ggldlpoc.exe95⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2556 -
C:\Windows\SysWOW64\Gikahkng.exeC:\Windows\system32\Gikahkng.exe96⤵
- Modifies registry class
PID:1280 -
C:\Windows\SysWOW64\Gpdide32.exeC:\Windows\system32\Gpdide32.exe97⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:680 -
C:\Windows\SysWOW64\Gafelnkb.exeC:\Windows\system32\Gafelnkb.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1608 -
C:\Windows\SysWOW64\Ghpnihbo.exeC:\Windows\system32\Ghpnihbo.exe99⤵PID:652
-
C:\Windows\SysWOW64\Gknjecab.exeC:\Windows\system32\Gknjecab.exe100⤵
- Drops file in System32 directory
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\Hahbam32.exeC:\Windows\system32\Hahbam32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2928 -
C:\Windows\SysWOW64\Hdfoni32.exeC:\Windows\system32\Hdfoni32.exe102⤵PID:2236
-
C:\Windows\SysWOW64\Hlnfof32.exeC:\Windows\system32\Hlnfof32.exe103⤵PID:2256
-
C:\Windows\SysWOW64\Hnocgnoc.exeC:\Windows\system32\Hnocgnoc.exe104⤵
- Modifies registry class
PID:2900 -
C:\Windows\SysWOW64\Ionlpdha.exeC:\Windows\system32\Ionlpdha.exe105⤵PID:2364
-
C:\Windows\SysWOW64\Ibmhlpge.exeC:\Windows\system32\Ibmhlpge.exe106⤵
- Modifies registry class
PID:2420 -
C:\Windows\SysWOW64\Inciaamj.exeC:\Windows\system32\Inciaamj.exe107⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:760 -
C:\Windows\SysWOW64\Iiimnjmp.exeC:\Windows\system32\Iiimnjmp.exe108⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1564 -
C:\Windows\SysWOW64\Ikgijelc.exeC:\Windows\system32\Ikgijelc.exe109⤵
- Modifies registry class
PID:2592 -
C:\Windows\SysWOW64\Infefqkg.exeC:\Windows\system32\Infefqkg.exe110⤵PID:2968
-
C:\Windows\SysWOW64\Jgnjof32.exeC:\Windows\system32\Jgnjof32.exe111⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1716 -
C:\Windows\SysWOW64\Jjlfkaqk.exeC:\Windows\system32\Jjlfkaqk.exe112⤵
- Drops file in System32 directory
- Modifies registry class
PID:2648 -
C:\Windows\SysWOW64\Jbcnloam.exeC:\Windows\system32\Jbcnloam.exe113⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:1284 -
C:\Windows\SysWOW64\Jcekdg32.exeC:\Windows\system32\Jcekdg32.exe114⤵PID:112
-
C:\Windows\SysWOW64\Jgqfefpe.exeC:\Windows\system32\Jgqfefpe.exe115⤵
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\Jklbed32.exeC:\Windows\system32\Jklbed32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1128 -
C:\Windows\SysWOW64\Holedjom.exeC:\Windows\system32\Holedjom.exe117⤵
- Modifies registry class
PID:1624 -
C:\Windows\SysWOW64\Hakapfnq.exeC:\Windows\system32\Hakapfnq.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:568 -
C:\Windows\SysWOW64\Hdinla32.exeC:\Windows\system32\Hdinla32.exe119⤵
- Drops file in System32 directory
PID:1524 -
C:\Windows\SysWOW64\Hlpemo32.exeC:\Windows\system32\Hlpemo32.exe120⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2408 -
C:\Windows\SysWOW64\Hkcfikea.exeC:\Windows\system32\Hkcfikea.exe121⤵PID:2160
-
C:\Windows\SysWOW64\Kjlnig32.exeC:\Windows\system32\Kjlnig32.exe122⤵PID:2068
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-