Analysis
-
max time kernel
143s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe
Resource
win10v2004-20240226-en
General
-
Target
7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe
-
Size
163KB
-
MD5
c3bf2ef482e36e9a45e500ce82e8f5e2
-
SHA1
678776af89a904a0e8df63a7eb8d078f5833817c
-
SHA256
7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6
-
SHA512
1c851a1c8d8f3df99e2ff16d516cead30544be95812e31db50d1a389465a04cab3b79a4bf13fd797a8792ae04bed2a2af831e70c1336c4cc889de496d63417e1
-
SSDEEP
1536:PecG6maNzAFT1UItqM0g0JaOvXgTFelProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:lmamluIH0MmgBeltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jgenhp32.exeLabhkh32.exeNdjdlffl.exeBingpmnl.exeDgmglh32.exeFckjalhj.exeGohhhmgo.exeHceqnlnf.exeGlfhll32.exeHgbebiao.exeObigjnkf.exeAmejeljk.exeBkaqmeah.exeEpieghdk.exeFikcacgl.exeLimmokib.exeOmloag32.exeQdccfh32.exeQjmkcbcb.exeAbbbnchb.exeDdagfm32.exeMhjpaf32.exeNjbcim32.exePpoqge32.exeHckcmjep.exeNofabc32.exeOomhcbjp.exeAnkdiqih.exeBloqah32.exeBanepo32.exeEbbgid32.exeHenidd32.exeKlnjbbdh.exeDngoibmo.exeDcknbh32.exeFacdeo32.exeGnfkqe32.exeAhokfj32.exeBaqbenep.exeGgpimica.exeLaplei32.exeAmbmpmln.exeKoocdnai.exeOgjimd32.exeBghabf32.exeIcbimi32.exeIlknfn32.exeIgcecmfg.exeJoepio32.exePjmodopf.exeBaildokg.exeFmmhjf32.exeHlnega32.exeFaokjpfd.exeGbkgnfbd.exeKmgpkfab.exeNfkpdn32.exeMgcgmb32.exeOfdcjm32.exeAepojo32.exeIoojhpdb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgenhp32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Labhkh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ndjdlffl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bingpmnl.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dgmglh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fckjalhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gohhhmgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hceqnlnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Glfhll32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgbebiao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Obigjnkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amejeljk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bkaqmeah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Epieghdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fikcacgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Limmokib.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Omloag32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qdccfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qjmkcbcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Abbbnchb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddagfm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mhjpaf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njbcim32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ppoqge32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hckcmjep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nofabc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oomhcbjp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ankdiqih.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bloqah32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Banepo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebbgid32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Henidd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klnjbbdh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nofabc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dngoibmo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcknbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Facdeo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnfkqe32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gohhhmgo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahokfj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baqbenep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggpimica.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laplei32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ambmpmln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Koocdnai.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogjimd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bghabf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icbimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ilknfn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igcecmfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Joepio32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjmodopf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Baildokg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmmhjf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlnega32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Faokjpfd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbkgnfbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kmgpkfab.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nfkpdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgcgmb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofdcjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aepojo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bingpmnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ioojhpdb.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Eafkfb32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ejopog32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Eaihlapi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Efeqdhnq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eidmqdmd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Elbimplh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fdianmmj.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Fekneebh.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Fififc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fppbbnbo.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Femjkdqf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fiifkc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Foeodj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fepgqdnc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fklpik32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Febcfd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fdddaqck.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fojhoica.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fdgqgqah.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gomedi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gheimogo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gkceijfb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ggjfnk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gimlefge.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hedmkgmi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hlnega32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Holacm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hefipfkg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hdijlc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hkeonm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hjkkojlc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hccphobd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Imkdqe32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iqgqacam.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iqimgc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Impnldeo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Icjfhn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iigoqe32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iclcnnji.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ifkojiim.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ifmlpigj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jgnhga32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jebiaelb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jklanp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jbfijjkl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jakfkfpc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jiigehkl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kcolba32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kjhdokbo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kljqgc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kcahhq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kebepion.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Khcnad32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kpjfba32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kbhbom32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kegnkh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kanopipl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Loapim32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lekhfgfc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lkhpnnej.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Labhkh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lgoacojo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lpgele32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lganiohl.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Eafkfb32.exe UPX \Windows\SysWOW64\Ejopog32.exe UPX \Windows\SysWOW64\Eaihlapi.exe UPX C:\Windows\SysWOW64\Efeqdhnq.exe UPX C:\Windows\SysWOW64\Eidmqdmd.exe UPX C:\Windows\SysWOW64\Elbimplh.exe UPX C:\Windows\SysWOW64\Fdianmmj.exe UPX \Windows\SysWOW64\Fekneebh.exe UPX \Windows\SysWOW64\Fififc32.exe UPX C:\Windows\SysWOW64\Fppbbnbo.exe UPX \Windows\SysWOW64\Femjkdqf.exe UPX C:\Windows\SysWOW64\Fiifkc32.exe UPX C:\Windows\SysWOW64\Foeodj32.exe UPX C:\Windows\SysWOW64\Fepgqdnc.exe UPX C:\Windows\SysWOW64\Fklpik32.exe UPX C:\Windows\SysWOW64\Febcfd32.exe UPX C:\Windows\SysWOW64\Fdddaqck.exe UPX C:\Windows\SysWOW64\Fojhoica.exe UPX C:\Windows\SysWOW64\Fdgqgqah.exe UPX C:\Windows\SysWOW64\Gomedi32.exe UPX C:\Windows\SysWOW64\Gheimogo.exe UPX C:\Windows\SysWOW64\Gkceijfb.exe UPX C:\Windows\SysWOW64\Ggjfnk32.exe UPX C:\Windows\SysWOW64\Gimlefge.exe UPX C:\Windows\SysWOW64\Hedmkgmi.exe UPX C:\Windows\SysWOW64\Hlnega32.exe UPX C:\Windows\SysWOW64\Holacm32.exe UPX C:\Windows\SysWOW64\Hefipfkg.exe UPX C:\Windows\SysWOW64\Hdijlc32.exe UPX C:\Windows\SysWOW64\Hkeonm32.exe UPX C:\Windows\SysWOW64\Hjkkojlc.exe UPX C:\Windows\SysWOW64\Hccphobd.exe UPX C:\Windows\SysWOW64\Imkdqe32.exe UPX C:\Windows\SysWOW64\Iqgqacam.exe UPX C:\Windows\SysWOW64\Iqimgc32.exe UPX C:\Windows\SysWOW64\Impnldeo.exe UPX C:\Windows\SysWOW64\Icjfhn32.exe UPX C:\Windows\SysWOW64\Iigoqe32.exe UPX C:\Windows\SysWOW64\Iclcnnji.exe UPX C:\Windows\SysWOW64\Ifkojiim.exe UPX C:\Windows\SysWOW64\Ifmlpigj.exe UPX C:\Windows\SysWOW64\Jgnhga32.exe UPX C:\Windows\SysWOW64\Jebiaelb.exe UPX C:\Windows\SysWOW64\Jklanp32.exe UPX C:\Windows\SysWOW64\Jbfijjkl.exe UPX C:\Windows\SysWOW64\Jakfkfpc.exe UPX C:\Windows\SysWOW64\Jiigehkl.exe UPX C:\Windows\SysWOW64\Kcolba32.exe UPX C:\Windows\SysWOW64\Kjhdokbo.exe UPX C:\Windows\SysWOW64\Kljqgc32.exe UPX C:\Windows\SysWOW64\Kcahhq32.exe UPX C:\Windows\SysWOW64\Kebepion.exe UPX C:\Windows\SysWOW64\Khcnad32.exe UPX C:\Windows\SysWOW64\Kpjfba32.exe UPX C:\Windows\SysWOW64\Kbhbom32.exe UPX C:\Windows\SysWOW64\Kegnkh32.exe UPX C:\Windows\SysWOW64\Kanopipl.exe UPX C:\Windows\SysWOW64\Loapim32.exe UPX C:\Windows\SysWOW64\Lekhfgfc.exe UPX C:\Windows\SysWOW64\Lkhpnnej.exe UPX C:\Windows\SysWOW64\Labhkh32.exe UPX C:\Windows\SysWOW64\Lgoacojo.exe UPX C:\Windows\SysWOW64\Lpgele32.exe UPX C:\Windows\SysWOW64\Lganiohl.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Eafkfb32.exeEhqccl32.exeEjopog32.exeEiapkdog.exeEaihlapi.exeEfeqdhnq.exeEidmqdmd.exeElbimplh.exeFdianmmj.exeFblaii32.exeFekneebh.exeFififc32.exeFppbbnbo.exeFemjkdqf.exeFiifkc32.exeFoeodj32.exeFadkpe32.exeFepgqdnc.exeFikcacgl.exeFhncmp32.exeFklpik32.exeFohkijed.exeFebcfd32.exeFdddaqck.exeFojhoica.exeFmmhjf32.exeFdgqgqah.exeGomedi32.exeGakaqd32.exeGheimogo.exeGkceijfb.exeGamnfd32.exeGcojnmdn.exeGgjfnk32.exeGlgofbjn.exeGcagcl32.exeGglcdkjd.exeGeocph32.exeGnfkqe32.exeGpegmq32.exeGohhhmgo.exeGgopijha.exeGimlefge.exeGllhaa32.exeGpgdbpob.exeHceqnlnf.exeHahqjh32.exeHedmkgmi.exeHjpike32.exeHlnega32.exeHolacm32.exeHakmph32.exeHefipfkg.exeHdijlc32.exeHlpamq32.exeHnandi32.exeHamjehqk.exeHdkfacpo.exeHgjbmoob.exeHkeonm32.exeHoakolod.exeHndkji32.exeHqbgfd32.exeHdncgbnl.exepid process 2504 Eafkfb32.exe 2648 Ehqccl32.exe 2932 Ejopog32.exe 2432 Eiapkdog.exe 2408 Eaihlapi.exe 2836 Efeqdhnq.exe 1252 Eidmqdmd.exe 2696 Elbimplh.exe 676 Fdianmmj.exe 1780 Fblaii32.exe 1628 Fekneebh.exe 1464 Fififc32.exe 1268 Fppbbnbo.exe 1876 Femjkdqf.exe 2388 Fiifkc32.exe 580 Foeodj32.exe 1416 Fadkpe32.exe 1772 Fepgqdnc.exe 108 Fikcacgl.exe 2296 Fhncmp32.exe 1228 Fklpik32.exe 1824 Fohkijed.exe 868 Febcfd32.exe 1656 Fdddaqck.exe 2036 Fojhoica.exe 3020 Fmmhjf32.exe 2536 Fdgqgqah.exe 2512 Gomedi32.exe 2324 Gakaqd32.exe 2552 Gheimogo.exe 2588 Gkceijfb.exe 2476 Gamnfd32.exe 1596 Gcojnmdn.exe 1272 Ggjfnk32.exe 2024 Glgofbjn.exe 1880 Gcagcl32.exe 2712 Gglcdkjd.exe 268 Geocph32.exe 320 Gnfkqe32.exe 624 Gpegmq32.exe 2964 Gohhhmgo.exe 1280 Ggopijha.exe 2272 Gimlefge.exe 2920 Gllhaa32.exe 608 Gpgdbpob.exe 2312 Hceqnlnf.exe 2944 Hahqjh32.exe 2820 Hedmkgmi.exe 916 Hjpike32.exe 2916 Hlnega32.exe 1288 Holacm32.exe 1556 Hakmph32.exe 2368 Hefipfkg.exe 2140 Hdijlc32.exe 1200 Hlpamq32.exe 1936 Hnandi32.exe 716 Hamjehqk.exe 1004 Hdkfacpo.exe 1688 Hgjbmoob.exe 2668 Hkeonm32.exe 2564 Hoakolod.exe 2328 Hndkji32.exe 2444 Hqbgfd32.exe 1216 Hdncgbnl.exe -
Loads dropped DLL 64 IoCs
Processes:
7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exeEafkfb32.exeEhqccl32.exeEjopog32.exeEiapkdog.exeEaihlapi.exeEfeqdhnq.exeEidmqdmd.exeElbimplh.exeFdianmmj.exeFblaii32.exeFekneebh.exeFififc32.exeFppbbnbo.exeFemjkdqf.exeFiifkc32.exeFoeodj32.exeFadkpe32.exeFepgqdnc.exeFikcacgl.exeFhncmp32.exeFklpik32.exeFohkijed.exeFebcfd32.exeFdddaqck.exeFojhoica.exeFmmhjf32.exeFdgqgqah.exeGomedi32.exeGakaqd32.exeGheimogo.exeGkceijfb.exepid process 1756 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe 1756 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe 2504 Eafkfb32.exe 2504 Eafkfb32.exe 2648 Ehqccl32.exe 2648 Ehqccl32.exe 2932 Ejopog32.exe 2932 Ejopog32.exe 2432 Eiapkdog.exe 2432 Eiapkdog.exe 2408 Eaihlapi.exe 2408 Eaihlapi.exe 2836 Efeqdhnq.exe 2836 Efeqdhnq.exe 1252 Eidmqdmd.exe 1252 Eidmqdmd.exe 2696 Elbimplh.exe 2696 Elbimplh.exe 676 Fdianmmj.exe 676 Fdianmmj.exe 1780 Fblaii32.exe 1780 Fblaii32.exe 1628 Fekneebh.exe 1628 Fekneebh.exe 1464 Fififc32.exe 1464 Fififc32.exe 1268 Fppbbnbo.exe 1268 Fppbbnbo.exe 1876 Femjkdqf.exe 1876 Femjkdqf.exe 2388 Fiifkc32.exe 2388 Fiifkc32.exe 580 Foeodj32.exe 580 Foeodj32.exe 1416 Fadkpe32.exe 1416 Fadkpe32.exe 1772 Fepgqdnc.exe 1772 Fepgqdnc.exe 108 Fikcacgl.exe 108 Fikcacgl.exe 2296 Fhncmp32.exe 2296 Fhncmp32.exe 1228 Fklpik32.exe 1228 Fklpik32.exe 1824 Fohkijed.exe 1824 Fohkijed.exe 868 Febcfd32.exe 868 Febcfd32.exe 1656 Fdddaqck.exe 1656 Fdddaqck.exe 2036 Fojhoica.exe 2036 Fojhoica.exe 3020 Fmmhjf32.exe 3020 Fmmhjf32.exe 2536 Fdgqgqah.exe 2536 Fdgqgqah.exe 2512 Gomedi32.exe 2512 Gomedi32.exe 2324 Gakaqd32.exe 2324 Gakaqd32.exe 2552 Gheimogo.exe 2552 Gheimogo.exe 2588 Gkceijfb.exe 2588 Gkceijfb.exe -
Drops file in System32 directory 64 IoCs
Processes:
Cgmkmecg.exeCjbmjplb.exeGamnfd32.exeMigpeiag.exeDnlidb32.exeMlcple32.exeNhnfkigh.exeOomhcbjp.exeFcmgfkeg.exeKbalnnam.exeOqcnfjli.exeAdhlaggp.exeHhjhkq32.exeHdkfacpo.exeNjbcim32.exeOhqbqhde.exeFnbkddem.exeGejcjbah.exeGakaqd32.exeJiigehkl.exeNgfcca32.exeAjphib32.exeEafkfb32.exeJebiaelb.exeMekdekin.exeNqqdag32.exeOenifh32.exeFpfdalii.exeIqgqacam.exeKjhdokbo.exePfdpip32.exeBanepo32.exeEnkece32.exeDgaqgh32.exeHmlnoc32.exeLgoacojo.exeLipjejgp.exeOfdcjm32.exePcfcmd32.exeBagpopmj.exeDodonf32.exeHndkji32.exeKljqgc32.exeKanopipl.exeOnmkio32.exeBokphdld.exeDgodbh32.exeFfkcbgek.exe7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exeImeggc32.exeKmgpkfab.exeQnigda32.exeCpjiajeb.exeDgfjbgmh.exeGdopkn32.exeFififc32.exeJinead32.exeAdeplhib.exeAjbdna32.exeBingpmnl.exeJakfkfpc.exeFdoclk32.exeHpkjko32.exeMnieom32.exedescription ioc process File created C:\Windows\SysWOW64\Aiabof32.dll Cgmkmecg.exe File created C:\Windows\SysWOW64\Chemfl32.exe Cjbmjplb.exe File opened for modification C:\Windows\SysWOW64\Gcojnmdn.exe Gamnfd32.exe File created C:\Windows\SysWOW64\Mhjpaf32.exe Migpeiag.exe File created C:\Windows\SysWOW64\Naeqjnho.dll Dnlidb32.exe File created C:\Windows\SysWOW64\Hkfeblka.dll Mlcple32.exe File created C:\Windows\SysWOW64\Hnbjle32.dll Nhnfkigh.exe File created C:\Windows\SysWOW64\Onphoo32.exe Oomhcbjp.exe File created C:\Windows\SysWOW64\Egadpgfp.dll Fcmgfkeg.exe File created C:\Windows\SysWOW64\Kfmhol32.exe Kbalnnam.exe File created C:\Windows\SysWOW64\Nbdppp32.dll Oqcnfjli.exe File opened for modification C:\Windows\SysWOW64\Mjccnjpk.dll Adhlaggp.exe File created C:\Windows\SysWOW64\Oiogaqdb.dll Hhjhkq32.exe File created C:\Windows\SysWOW64\Hgjbmoob.exe Hdkfacpo.exe File created C:\Windows\SysWOW64\Nnnojlpa.exe Njbcim32.exe File opened for modification C:\Windows\SysWOW64\Omloag32.exe Ohqbqhde.exe File created C:\Windows\SysWOW64\Ongbcmlc.dll Fnbkddem.exe File created C:\Windows\SysWOW64\Lkoabpeg.dll Gejcjbah.exe File created C:\Windows\SysWOW64\Obffdhni.dll Gakaqd32.exe File created C:\Windows\SysWOW64\Jmdcfg32.exe Jiigehkl.exe File created C:\Windows\SysWOW64\Fonfbi32.dll Ngfcca32.exe File opened for modification C:\Windows\SysWOW64\Ankdiqih.exe Ajphib32.exe File opened for modification C:\Windows\SysWOW64\Ehqccl32.exe Eafkfb32.exe File created C:\Windows\SysWOW64\Jinead32.exe Jebiaelb.exe File opened for modification C:\Windows\SysWOW64\Migpeiag.exe Mekdekin.exe File opened for modification C:\Windows\SysWOW64\Nocemcbj.exe Nqqdag32.exe File created C:\Windows\SysWOW64\Ocajbekl.exe Oenifh32.exe File opened for modification C:\Windows\SysWOW64\Fdapak32.exe Fpfdalii.exe File created C:\Windows\SysWOW64\Qhfjko32.dll Iqgqacam.exe File opened for modification C:\Windows\SysWOW64\Kikdkh32.exe Kjhdokbo.exe File created C:\Windows\SysWOW64\Kfammbdf.dll Pfdpip32.exe File created C:\Windows\SysWOW64\Bdlblj32.exe Banepo32.exe File created C:\Windows\SysWOW64\Ebgacddo.exe Enkece32.exe File opened for modification C:\Windows\SysWOW64\Djpmccqq.exe Dgaqgh32.exe File created C:\Windows\SysWOW64\Hahjpbad.exe Hmlnoc32.exe File created C:\Windows\SysWOW64\Blipbfpp.dll Lgoacojo.exe File created C:\Windows\SysWOW64\Amclfbco.dll Lipjejgp.exe File opened for modification C:\Windows\SysWOW64\Odgcfijj.exe Ofdcjm32.exe File created C:\Windows\SysWOW64\Pbiciana.exe Pcfcmd32.exe File created C:\Windows\SysWOW64\Icplghmh.dll Bagpopmj.exe File opened for modification C:\Windows\SysWOW64\Dngoibmo.exe Dodonf32.exe File created C:\Windows\SysWOW64\Dkhmpocj.dll Hndkji32.exe File opened for modification C:\Windows\SysWOW64\Kpemgbqf.exe Kljqgc32.exe File created C:\Windows\SysWOW64\Ajlgdf32.dll Kanopipl.exe File created C:\Windows\SysWOW64\Obigjnkf.exe Onmkio32.exe File created C:\Windows\SysWOW64\Bbflib32.exe Bokphdld.exe File created C:\Windows\SysWOW64\Dkkpbgli.exe Dgodbh32.exe File opened for modification C:\Windows\SysWOW64\Fjgoce32.exe Ffkcbgek.exe File created C:\Windows\SysWOW64\Eafkfb32.exe 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe File opened for modification C:\Windows\SysWOW64\Ioccco32.exe Imeggc32.exe File created C:\Windows\SysWOW64\Kljqgc32.exe Kmgpkfab.exe File opened for modification C:\Windows\SysWOW64\Qmlgonbe.exe Qnigda32.exe File created C:\Windows\SysWOW64\Hkfmal32.dll Cpjiajeb.exe File created C:\Windows\SysWOW64\Cgcmfjnn.dll Dgfjbgmh.exe File created C:\Windows\SysWOW64\Ghkllmoi.exe Gdopkn32.exe File opened for modification C:\Windows\SysWOW64\Fppbbnbo.exe Fififc32.exe File created C:\Windows\SysWOW64\Jgqemakf.exe Jinead32.exe File opened for modification C:\Windows\SysWOW64\Ahakmf32.exe Adeplhib.exe File created C:\Windows\SysWOW64\Kfqpfb32.dll Ajbdna32.exe File created C:\Windows\SysWOW64\Bgpkceld.dll Bingpmnl.exe File created C:\Windows\SysWOW64\Lcdlii32.dll Jakfkfpc.exe File created C:\Windows\SysWOW64\Fhkpmjln.exe Fdoclk32.exe File created C:\Windows\SysWOW64\Phofkg32.dll Hpkjko32.exe File created C:\Windows\SysWOW64\Madapkmp.exe Mnieom32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 8160 8136 WerFault.exe Iagfoe32.exe -
Modifies registry class 64 IoCs
Processes:
Njkfpl32.exeAmbmpmln.exeCfgaiaci.exeEqonkmdh.exeJcjbgaog.exeNhnfkigh.exeFacdeo32.exeGgjfnk32.exeNnnojlpa.exePpjglfon.exeQagcpljo.exeNgfcca32.exePiehkkcl.exeBloqah32.exeFnbkddem.exeHmlnoc32.exeHpapln32.exeHglocnmp.exeIcjfhn32.exeJinead32.exeKjhdokbo.exeMgfgdn32.exeOomhcbjp.exeIknnbklc.exeHoakolod.exeLhggmchi.exeMnieom32.exeOcajbekl.exeBpfcgg32.exeDnlidb32.exeGbnccfpb.exeJcgfbb32.exeOkalbc32.exeLpjbad32.exeDoobajme.exeEecqjpee.exeFlmefm32.exeGkceijfb.exeHdkfacpo.exeOhqbqhde.exeAoffmd32.exeHkeonm32.exeNghphaeo.exePlcdgfbo.exePenfelgm.exeQnfjna32.exeAplpai32.exeJfkkimlh.exeMoalhq32.exeNleiqhcg.exeNccjhafn.exeCciemedf.exeGhkllmoi.exeIcbimi32.exeIbocjk32.exeNocemcbj.exeAbbbnchb.exeBebkpn32.exeIqimgc32.exePgobhcac.exeQecoqk32.exeDcknbh32.exeInfdolgh.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njkfpl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gkddnkjk.dll" Ambmpmln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfgaiaci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eqonkmdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmjikf32.dll" Jcjbgaog.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nhnfkigh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Facdeo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ggjfnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jagbha32.dll" Nnnojlpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ppjglfon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mmlblm32.dll" Qagcpljo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngfcca32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Piehkkcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opanhd32.dll" Bloqah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fnbkddem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Njmekj32.dll" Hmlnoc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpapln32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hglocnmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icjfhn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jinead32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlnqnenm.dll" Kjhdokbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgfgdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oomhcbjp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iknnbklc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hoakolod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lhggmchi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kqdoodim.dll" Mnieom32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ocajbekl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfhemi32.dll" Bpfcgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naeqjnho.dll" Dnlidb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbnccfpb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcgfbb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbjlmdgj.dll" Okalbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qjhccbfb.dll" Lpjbad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pafagk32.dll" Doobajme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lanfmb32.dll" Eecqjpee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Flmefm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gkceijfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hdkfacpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhdclk32.dll" Ohqbqhde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aoffmd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkeonm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ildamhjd.dll" Nghphaeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Plcdgfbo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Penfelgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qnfjna32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aplpai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfkkimlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Moalhq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nleiqhcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nccjhafn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cciemedf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghkllmoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icbimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ibocjk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nocemcbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Abbbnchb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmddhkao.dll" Bebkpn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iqimgc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgobhcac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cinika32.dll" Qecoqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dcknbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jajfmcbo.dll" Infdolgh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfkkimlh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exeEafkfb32.exeEhqccl32.exeEjopog32.exeEiapkdog.exeEaihlapi.exeEfeqdhnq.exeEidmqdmd.exeElbimplh.exeFdianmmj.exeFblaii32.exeFekneebh.exeFififc32.exeFppbbnbo.exeFemjkdqf.exeFiifkc32.exedescription pid process target process PID 1756 wrote to memory of 2504 1756 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe Eafkfb32.exe PID 1756 wrote to memory of 2504 1756 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe Eafkfb32.exe PID 1756 wrote to memory of 2504 1756 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe Eafkfb32.exe PID 1756 wrote to memory of 2504 1756 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe Eafkfb32.exe PID 2504 wrote to memory of 2648 2504 Eafkfb32.exe Ehqccl32.exe PID 2504 wrote to memory of 2648 2504 Eafkfb32.exe Ehqccl32.exe PID 2504 wrote to memory of 2648 2504 Eafkfb32.exe Ehqccl32.exe PID 2504 wrote to memory of 2648 2504 Eafkfb32.exe Ehqccl32.exe PID 2648 wrote to memory of 2932 2648 Ehqccl32.exe Ejopog32.exe PID 2648 wrote to memory of 2932 2648 Ehqccl32.exe Ejopog32.exe PID 2648 wrote to memory of 2932 2648 Ehqccl32.exe Ejopog32.exe PID 2648 wrote to memory of 2932 2648 Ehqccl32.exe Ejopog32.exe PID 2932 wrote to memory of 2432 2932 Ejopog32.exe Eiapkdog.exe PID 2932 wrote to memory of 2432 2932 Ejopog32.exe Eiapkdog.exe PID 2932 wrote to memory of 2432 2932 Ejopog32.exe Eiapkdog.exe PID 2932 wrote to memory of 2432 2932 Ejopog32.exe Eiapkdog.exe PID 2432 wrote to memory of 2408 2432 Eiapkdog.exe Eaihlapi.exe PID 2432 wrote to memory of 2408 2432 Eiapkdog.exe Eaihlapi.exe PID 2432 wrote to memory of 2408 2432 Eiapkdog.exe Eaihlapi.exe PID 2432 wrote to memory of 2408 2432 Eiapkdog.exe Eaihlapi.exe PID 2408 wrote to memory of 2836 2408 Eaihlapi.exe Efeqdhnq.exe PID 2408 wrote to memory of 2836 2408 Eaihlapi.exe Efeqdhnq.exe PID 2408 wrote to memory of 2836 2408 Eaihlapi.exe Efeqdhnq.exe PID 2408 wrote to memory of 2836 2408 Eaihlapi.exe Efeqdhnq.exe PID 2836 wrote to memory of 1252 2836 Efeqdhnq.exe Eidmqdmd.exe PID 2836 wrote to memory of 1252 2836 Efeqdhnq.exe Eidmqdmd.exe PID 2836 wrote to memory of 1252 2836 Efeqdhnq.exe Eidmqdmd.exe PID 2836 wrote to memory of 1252 2836 Efeqdhnq.exe Eidmqdmd.exe PID 1252 wrote to memory of 2696 1252 Eidmqdmd.exe Elbimplh.exe PID 1252 wrote to memory of 2696 1252 Eidmqdmd.exe Elbimplh.exe PID 1252 wrote to memory of 2696 1252 Eidmqdmd.exe Elbimplh.exe PID 1252 wrote to memory of 2696 1252 Eidmqdmd.exe Elbimplh.exe PID 2696 wrote to memory of 676 2696 Elbimplh.exe Fdianmmj.exe PID 2696 wrote to memory of 676 2696 Elbimplh.exe Fdianmmj.exe PID 2696 wrote to memory of 676 2696 Elbimplh.exe Fdianmmj.exe PID 2696 wrote to memory of 676 2696 Elbimplh.exe Fdianmmj.exe PID 676 wrote to memory of 1780 676 Fdianmmj.exe Fblaii32.exe PID 676 wrote to memory of 1780 676 Fdianmmj.exe Fblaii32.exe PID 676 wrote to memory of 1780 676 Fdianmmj.exe Fblaii32.exe PID 676 wrote to memory of 1780 676 Fdianmmj.exe Fblaii32.exe PID 1780 wrote to memory of 1628 1780 Fblaii32.exe Fekneebh.exe PID 1780 wrote to memory of 1628 1780 Fblaii32.exe Fekneebh.exe PID 1780 wrote to memory of 1628 1780 Fblaii32.exe Fekneebh.exe PID 1780 wrote to memory of 1628 1780 Fblaii32.exe Fekneebh.exe PID 1628 wrote to memory of 1464 1628 Fekneebh.exe Fififc32.exe PID 1628 wrote to memory of 1464 1628 Fekneebh.exe Fififc32.exe PID 1628 wrote to memory of 1464 1628 Fekneebh.exe Fififc32.exe PID 1628 wrote to memory of 1464 1628 Fekneebh.exe Fififc32.exe PID 1464 wrote to memory of 1268 1464 Fififc32.exe Fppbbnbo.exe PID 1464 wrote to memory of 1268 1464 Fififc32.exe Fppbbnbo.exe PID 1464 wrote to memory of 1268 1464 Fififc32.exe Fppbbnbo.exe PID 1464 wrote to memory of 1268 1464 Fififc32.exe Fppbbnbo.exe PID 1268 wrote to memory of 1876 1268 Fppbbnbo.exe Femjkdqf.exe PID 1268 wrote to memory of 1876 1268 Fppbbnbo.exe Femjkdqf.exe PID 1268 wrote to memory of 1876 1268 Fppbbnbo.exe Femjkdqf.exe PID 1268 wrote to memory of 1876 1268 Fppbbnbo.exe Femjkdqf.exe PID 1876 wrote to memory of 2388 1876 Femjkdqf.exe Fiifkc32.exe PID 1876 wrote to memory of 2388 1876 Femjkdqf.exe Fiifkc32.exe PID 1876 wrote to memory of 2388 1876 Femjkdqf.exe Fiifkc32.exe PID 1876 wrote to memory of 2388 1876 Femjkdqf.exe Fiifkc32.exe PID 2388 wrote to memory of 580 2388 Fiifkc32.exe Foeodj32.exe PID 2388 wrote to memory of 580 2388 Fiifkc32.exe Foeodj32.exe PID 2388 wrote to memory of 580 2388 Fiifkc32.exe Foeodj32.exe PID 2388 wrote to memory of 580 2388 Fiifkc32.exe Foeodj32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe"C:\Users\Admin\AppData\Local\Temp\7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\Eafkfb32.exeC:\Windows\system32\Eafkfb32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\Ehqccl32.exeC:\Windows\system32\Ehqccl32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\Ejopog32.exeC:\Windows\system32\Ejopog32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\Eiapkdog.exeC:\Windows\system32\Eiapkdog.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\Eaihlapi.exeC:\Windows\system32\Eaihlapi.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\Efeqdhnq.exeC:\Windows\system32\Efeqdhnq.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\Eidmqdmd.exeC:\Windows\system32\Eidmqdmd.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\Elbimplh.exeC:\Windows\system32\Elbimplh.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\Fdianmmj.exeC:\Windows\system32\Fdianmmj.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\Fblaii32.exeC:\Windows\system32\Fblaii32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\Fekneebh.exeC:\Windows\system32\Fekneebh.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Fififc32.exeC:\Windows\system32\Fififc32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\Fppbbnbo.exeC:\Windows\system32\Fppbbnbo.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Femjkdqf.exeC:\Windows\system32\Femjkdqf.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\Fiifkc32.exeC:\Windows\system32\Fiifkc32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\Foeodj32.exeC:\Windows\system32\Foeodj32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:580 -
C:\Windows\SysWOW64\Fadkpe32.exeC:\Windows\system32\Fadkpe32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1416 -
C:\Windows\SysWOW64\Fepgqdnc.exeC:\Windows\system32\Fepgqdnc.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772 -
C:\Windows\SysWOW64\Fikcacgl.exeC:\Windows\system32\Fikcacgl.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:108 -
C:\Windows\SysWOW64\Fhncmp32.exeC:\Windows\system32\Fhncmp32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296 -
C:\Windows\SysWOW64\Fklpik32.exeC:\Windows\system32\Fklpik32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1228 -
C:\Windows\SysWOW64\Fohkijed.exeC:\Windows\system32\Fohkijed.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824 -
C:\Windows\SysWOW64\Febcfd32.exeC:\Windows\system32\Febcfd32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:868 -
C:\Windows\SysWOW64\Fdddaqck.exeC:\Windows\system32\Fdddaqck.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Windows\SysWOW64\Fojhoica.exeC:\Windows\system32\Fojhoica.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2036 -
C:\Windows\SysWOW64\Fmmhjf32.exeC:\Windows\system32\Fmmhjf32.exe27⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:3020 -
C:\Windows\SysWOW64\Fdgqgqah.exeC:\Windows\system32\Fdgqgqah.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2536 -
C:\Windows\SysWOW64\Gomedi32.exeC:\Windows\system32\Gomedi32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512 -
C:\Windows\SysWOW64\Gakaqd32.exeC:\Windows\system32\Gakaqd32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2324 -
C:\Windows\SysWOW64\Gheimogo.exeC:\Windows\system32\Gheimogo.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Windows\SysWOW64\Gkceijfb.exeC:\Windows\system32\Gkceijfb.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2588 -
C:\Windows\SysWOW64\Gamnfd32.exeC:\Windows\system32\Gamnfd32.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2476 -
C:\Windows\SysWOW64\Gcojnmdn.exeC:\Windows\system32\Gcojnmdn.exe34⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\Ggjfnk32.exeC:\Windows\system32\Ggjfnk32.exe35⤵
- Executes dropped EXE
- Modifies registry class
PID:1272 -
C:\Windows\SysWOW64\Glgofbjn.exeC:\Windows\system32\Glgofbjn.exe36⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\Gcagcl32.exeC:\Windows\system32\Gcagcl32.exe37⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\Gglcdkjd.exeC:\Windows\system32\Gglcdkjd.exe38⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\Geocph32.exeC:\Windows\system32\Geocph32.exe39⤵
- Executes dropped EXE
PID:268 -
C:\Windows\SysWOW64\Gnfkqe32.exeC:\Windows\system32\Gnfkqe32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:320 -
C:\Windows\SysWOW64\Gpegmq32.exeC:\Windows\system32\Gpegmq32.exe41⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\Gohhhmgo.exeC:\Windows\system32\Gohhhmgo.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\Ggopijha.exeC:\Windows\system32\Ggopijha.exe43⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\Gimlefge.exeC:\Windows\system32\Gimlefge.exe44⤵
- Executes dropped EXE
PID:2272 -
C:\Windows\SysWOW64\Gllhaa32.exeC:\Windows\system32\Gllhaa32.exe45⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\Gpgdbpob.exeC:\Windows\system32\Gpgdbpob.exe46⤵
- Executes dropped EXE
PID:608 -
C:\Windows\SysWOW64\Hceqnlnf.exeC:\Windows\system32\Hceqnlnf.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\Hahqjh32.exeC:\Windows\system32\Hahqjh32.exe48⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\Hedmkgmi.exeC:\Windows\system32\Hedmkgmi.exe49⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\SysWOW64\Hjpike32.exeC:\Windows\system32\Hjpike32.exe50⤵
- Executes dropped EXE
PID:916 -
C:\Windows\SysWOW64\Hlnega32.exeC:\Windows\system32\Hlnega32.exe51⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\Holacm32.exeC:\Windows\system32\Holacm32.exe52⤵
- Executes dropped EXE
PID:1288 -
C:\Windows\SysWOW64\Hakmph32.exeC:\Windows\system32\Hakmph32.exe53⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\Hefipfkg.exeC:\Windows\system32\Hefipfkg.exe54⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\Hdijlc32.exeC:\Windows\system32\Hdijlc32.exe55⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\Hlpamq32.exeC:\Windows\system32\Hlpamq32.exe56⤵
- Executes dropped EXE
PID:1200 -
C:\Windows\SysWOW64\Hnandi32.exeC:\Windows\system32\Hnandi32.exe57⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\Hamjehqk.exeC:\Windows\system32\Hamjehqk.exe58⤵
- Executes dropped EXE
PID:716 -
C:\Windows\SysWOW64\Hdkfacpo.exeC:\Windows\system32\Hdkfacpo.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Hgjbmoob.exeC:\Windows\system32\Hgjbmoob.exe60⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\Hkeonm32.exeC:\Windows\system32\Hkeonm32.exe61⤵
- Executes dropped EXE
- Modifies registry class
PID:2668 -
C:\Windows\SysWOW64\Hoakolod.exeC:\Windows\system32\Hoakolod.exe62⤵
- Executes dropped EXE
- Modifies registry class
PID:2564 -
C:\Windows\SysWOW64\Hndkji32.exeC:\Windows\system32\Hndkji32.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2328 -
C:\Windows\SysWOW64\Hqbgfd32.exeC:\Windows\system32\Hqbgfd32.exe64⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\Hdncgbnl.exeC:\Windows\system32\Hdncgbnl.exe65⤵
- Executes dropped EXE
PID:1216 -
C:\Windows\SysWOW64\Hhioga32.exeC:\Windows\system32\Hhioga32.exe66⤵PID:1984
-
C:\Windows\SysWOW64\Hglocnmp.exeC:\Windows\system32\Hglocnmp.exe67⤵
- Modifies registry class
PID:800 -
C:\Windows\SysWOW64\Hkhkcm32.exeC:\Windows\system32\Hkhkcm32.exe68⤵PID:2976
-
C:\Windows\SysWOW64\Hjkkojlc.exeC:\Windows\system32\Hjkkojlc.exe69⤵PID:2456
-
C:\Windows\SysWOW64\Hnfgphdl.exeC:\Windows\system32\Hnfgphdl.exe70⤵PID:1588
-
C:\Windows\SysWOW64\Hbbcpg32.exeC:\Windows\system32\Hbbcpg32.exe71⤵PID:1524
-
C:\Windows\SysWOW64\Hqddldcp.exeC:\Windows\system32\Hqddldcp.exe72⤵PID:2092
-
C:\Windows\SysWOW64\Hccphobd.exeC:\Windows\system32\Hccphobd.exe73⤵PID:2168
-
C:\Windows\SysWOW64\Hkjhimcf.exeC:\Windows\system32\Hkjhimcf.exe74⤵PID:1448
-
C:\Windows\SysWOW64\Imkdqe32.exeC:\Windows\system32\Imkdqe32.exe75⤵PID:2980
-
C:\Windows\SysWOW64\Iqgqacam.exeC:\Windows\system32\Iqgqacam.exe76⤵
- Drops file in System32 directory
PID:2280 -
C:\Windows\SysWOW64\Icemmopa.exeC:\Windows\system32\Icemmopa.exe77⤵PID:2724
-
C:\Windows\SysWOW64\Igainn32.exeC:\Windows\system32\Igainn32.exe78⤵PID:1312
-
C:\Windows\SysWOW64\Ifdiijpe.exeC:\Windows\system32\Ifdiijpe.exe79⤵PID:2472
-
C:\Windows\SysWOW64\Ijoeji32.exeC:\Windows\system32\Ijoeji32.exe80⤵PID:2692
-
C:\Windows\SysWOW64\Imnafd32.exeC:\Windows\system32\Imnafd32.exe81⤵PID:564
-
C:\Windows\SysWOW64\Iqimgc32.exeC:\Windows\system32\Iqimgc32.exe82⤵
- Modifies registry class
PID:2624 -
C:\Windows\SysWOW64\Ichico32.exeC:\Windows\system32\Ichico32.exe83⤵PID:1684
-
C:\Windows\SysWOW64\Igcecmfg.exeC:\Windows\system32\Igcecmfg.exe84⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2392 -
C:\Windows\SysWOW64\Iffeoj32.exeC:\Windows\system32\Iffeoj32.exe85⤵PID:2884
-
C:\Windows\SysWOW64\Ijaapifk.exeC:\Windows\system32\Ijaapifk.exe86⤵PID:2268
-
C:\Windows\SysWOW64\Iidbke32.exeC:\Windows\system32\Iidbke32.exe87⤵PID:1784
-
C:\Windows\SysWOW64\Impnldeo.exeC:\Windows\system32\Impnldeo.exe88⤵PID:2360
-
C:\Windows\SysWOW64\Ioojhpdb.exeC:\Windows\system32\Ioojhpdb.exe89⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1608 -
C:\Windows\SysWOW64\Icjfhn32.exeC:\Windows\system32\Icjfhn32.exe90⤵
- Modifies registry class
PID:2636 -
C:\Windows\SysWOW64\Ifhbdj32.exeC:\Windows\system32\Ifhbdj32.exe91⤵PID:2604
-
C:\Windows\SysWOW64\Iigoqe32.exeC:\Windows\system32\Iigoqe32.exe92⤵PID:2116
-
C:\Windows\SysWOW64\Imbkadcl.exeC:\Windows\system32\Imbkadcl.exe93⤵PID:1300
-
C:\Windows\SysWOW64\Ikekmq32.exeC:\Windows\system32\Ikekmq32.exe94⤵PID:2928
-
C:\Windows\SysWOW64\Iclcnnji.exeC:\Windows\system32\Iclcnnji.exe95⤵PID:2848
-
C:\Windows\SysWOW64\Ibocjk32.exeC:\Windows\system32\Ibocjk32.exe96⤵
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\Ifkojiim.exeC:\Windows\system32\Ifkojiim.exe97⤵PID:1584
-
C:\Windows\SysWOW64\Ienoff32.exeC:\Windows\system32\Ienoff32.exe98⤵PID:2308
-
C:\Windows\SysWOW64\Iiikfehq.exeC:\Windows\system32\Iiikfehq.exe99⤵PID:2628
-
C:\Windows\SysWOW64\Imeggc32.exeC:\Windows\system32\Imeggc32.exe100⤵
- Drops file in System32 directory
PID:804 -
C:\Windows\SysWOW64\Ioccco32.exeC:\Windows\system32\Ioccco32.exe101⤵PID:2012
-
C:\Windows\SysWOW64\Infdolgh.exeC:\Windows\system32\Infdolgh.exe102⤵
- Modifies registry class
PID:2316 -
C:\Windows\SysWOW64\Ibapoj32.exeC:\Windows\system32\Ibapoj32.exe103⤵PID:2484
-
C:\Windows\SysWOW64\Ibapoj32.exeC:\Windows\system32\Ibapoj32.exe104⤵PID:2500
-
C:\Windows\SysWOW64\Ifmlpigj.exeC:\Windows\system32\Ifmlpigj.exe105⤵PID:1048
-
C:\Windows\SysWOW64\Jilhldfn.exeC:\Windows\system32\Jilhldfn.exe106⤵PID:2136
-
C:\Windows\SysWOW64\Jilhldfn.exeC:\Windows\system32\Jilhldfn.exe107⤵PID:2016
-
C:\Windows\SysWOW64\Jgnhga32.exeC:\Windows\system32\Jgnhga32.exe108⤵PID:380
-
C:\Windows\SysWOW64\Jkjdhpea.exeC:\Windows\system32\Jkjdhpea.exe109⤵PID:1212
-
C:\Windows\SysWOW64\Joepio32.exeC:\Windows\system32\Joepio32.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1828 -
C:\Windows\SysWOW64\Jnhqdkde.exeC:\Windows\system32\Jnhqdkde.exe111⤵PID:1044
-
C:\Windows\SysWOW64\Jbdlejmn.exeC:\Windows\system32\Jbdlejmn.exe112⤵PID:2144
-
C:\Windows\SysWOW64\Jagmpg32.exeC:\Windows\system32\Jagmpg32.exe113⤵PID:2212
-
C:\Windows\SysWOW64\Jebiaelb.exeC:\Windows\system32\Jebiaelb.exe114⤵
- Drops file in System32 directory
PID:984 -
C:\Windows\SysWOW64\Jinead32.exeC:\Windows\system32\Jinead32.exe115⤵
- Drops file in System32 directory
- Modifies registry class
PID:2132 -
C:\Windows\SysWOW64\Jgqemakf.exeC:\Windows\system32\Jgqemakf.exe116⤵PID:2156
-
C:\Windows\SysWOW64\Jklanp32.exeC:\Windows\system32\Jklanp32.exe117⤵PID:2700
-
C:\Windows\SysWOW64\Jjoailji.exeC:\Windows\system32\Jjoailji.exe118⤵PID:384
-
C:\Windows\SysWOW64\Jnkmjk32.exeC:\Windows\system32\Jnkmjk32.exe119⤵PID:2172
-
C:\Windows\SysWOW64\Jbfijjkl.exeC:\Windows\system32\Jbfijjkl.exe120⤵PID:2688
-
C:\Windows\SysWOW64\Jaiiff32.exeC:\Windows\system32\Jaiiff32.exe121⤵PID:832
-
C:\Windows\SysWOW64\Jedefejo.exeC:\Windows\system32\Jedefejo.exe122⤵PID:3000
-
C:\Windows\SysWOW64\Jcgfbb32.exeC:\Windows\system32\Jcgfbb32.exe123⤵
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\Jgcabqic.exeC:\Windows\system32\Jgcabqic.exe124⤵PID:2184
-
C:\Windows\SysWOW64\Jkonco32.exeC:\Windows\system32\Jkonco32.exe125⤵PID:2620
-
C:\Windows\SysWOW64\Jjanolhg.exeC:\Windows\system32\Jjanolhg.exe126⤵PID:1192
-
C:\Windows\SysWOW64\Jnmjok32.exeC:\Windows\system32\Jnmjok32.exe127⤵PID:2124
-
C:\Windows\SysWOW64\Jmpjkggj.exeC:\Windows\system32\Jmpjkggj.exe128⤵PID:2904
-
C:\Windows\SysWOW64\Jakfkfpc.exeC:\Windows\system32\Jakfkfpc.exe129⤵
- Drops file in System32 directory
PID:1612 -
C:\Windows\SysWOW64\Jegble32.exeC:\Windows\system32\Jegble32.exe130⤵PID:2560
-
C:\Windows\SysWOW64\Jcjbgaog.exeC:\Windows\system32\Jcjbgaog.exe131⤵
- Modifies registry class
PID:1580 -
C:\Windows\SysWOW64\Jgenhp32.exeC:\Windows\system32\Jgenhp32.exe132⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2120 -
C:\Windows\SysWOW64\Jfhocmnk.exeC:\Windows\system32\Jfhocmnk.exe133⤵PID:2528
-
C:\Windows\SysWOW64\Jjdkdl32.exeC:\Windows\system32\Jjdkdl32.exe134⤵PID:2104
-
C:\Windows\SysWOW64\Jnofejom.exeC:\Windows\system32\Jnofejom.exe135⤵PID:2852
-
C:\Windows\SysWOW64\Jancafna.exeC:\Windows\system32\Jancafna.exe136⤵PID:2768
-
C:\Windows\SysWOW64\Jpqclb32.exeC:\Windows\system32\Jpqclb32.exe137⤵PID:2992
-
C:\Windows\SysWOW64\Jclomamd.exeC:\Windows\system32\Jclomamd.exe138⤵PID:2372
-
C:\Windows\SysWOW64\Jghknp32.exeC:\Windows\system32\Jghknp32.exe139⤵PID:2680
-
C:\Windows\SysWOW64\Jfkkimlh.exeC:\Windows\system32\Jfkkimlh.exe140⤵PID:1732
-
C:\Windows\SysWOW64\Jfkkimlh.exeC:\Windows\system32\Jfkkimlh.exe141⤵
- Modifies registry class
PID:2660 -
C:\Windows\SysWOW64\Jjfgjk32.exeC:\Windows\system32\Jjfgjk32.exe142⤵PID:2084
-
C:\Windows\SysWOW64\Jiigehkl.exeC:\Windows\system32\Jiigehkl.exe143⤵
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\Jmdcfg32.exeC:\Windows\system32\Jmdcfg32.exe144⤵PID:1160
-
C:\Windows\SysWOW64\Kpcpbb32.exeC:\Windows\system32\Kpcpbb32.exe145⤵PID:2480
-
C:\Windows\SysWOW64\Kcolba32.exeC:\Windows\system32\Kcolba32.exe146⤵PID:2924
-
C:\Windows\SysWOW64\Kbalnnam.exeC:\Windows\system32\Kbalnnam.exe147⤵PID:1576
-
C:\Windows\SysWOW64\Kbalnnam.exeC:\Windows\system32\Kbalnnam.exe148⤵
- Drops file in System32 directory
PID:1644 -
C:\Windows\SysWOW64\Kfmhol32.exeC:\Windows\system32\Kfmhol32.exe149⤵PID:2672
-
C:\Windows\SysWOW64\Kjhdokbo.exeC:\Windows\system32\Kjhdokbo.exe150⤵
- Drops file in System32 directory
- Modifies registry class
PID:1140 -
C:\Windows\SysWOW64\Kikdkh32.exeC:\Windows\system32\Kikdkh32.exe151⤵PID:1604
-
C:\Windows\SysWOW64\Kikdkh32.exeC:\Windows\system32\Kikdkh32.exe152⤵PID:1748
-
C:\Windows\SysWOW64\Kmgpkfab.exeC:\Windows\system32\Kmgpkfab.exe153⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\Kljqgc32.exeC:\Windows\system32\Kljqgc32.exe154⤵
- Drops file in System32 directory
PID:2260 -
C:\Windows\SysWOW64\Kpemgbqf.exeC:\Windows\system32\Kpemgbqf.exe155⤵PID:2488
-
C:\Windows\SysWOW64\Kcahhq32.exeC:\Windows\system32\Kcahhq32.exe156⤵PID:1988
-
C:\Windows\SysWOW64\Kfoedl32.exeC:\Windows\system32\Kfoedl32.exe157⤵PID:2540
-
C:\Windows\SysWOW64\Kfoedl32.exeC:\Windows\system32\Kfoedl32.exe158⤵PID:1084
-
C:\Windows\SysWOW64\Kebepion.exeC:\Windows\system32\Kebepion.exe159⤵PID:2056
-
C:\Windows\SysWOW64\Kinaqg32.exeC:\Windows\system32\Kinaqg32.exe160⤵PID:1768
-
C:\Windows\SysWOW64\Kmimafop.exeC:\Windows\system32\Kmimafop.exe161⤵PID:2424
-
C:\Windows\SysWOW64\Kllmmc32.exeC:\Windows\system32\Kllmmc32.exe162⤵PID:1208
-
C:\Windows\SysWOW64\Kphimanc.exeC:\Windows\system32\Kphimanc.exe163⤵PID:404
-
C:\Windows\SysWOW64\Knjiin32.exeC:\Windows\system32\Knjiin32.exe164⤵PID:1244
-
C:\Windows\SysWOW64\Knjiin32.exeC:\Windows\system32\Knjiin32.exe165⤵PID:700
-
C:\Windows\SysWOW64\Kbfeimng.exeC:\Windows\system32\Kbfeimng.exe166⤵PID:1028
-
C:\Windows\SysWOW64\Kfaajlfp.exeC:\Windows\system32\Kfaajlfp.exe167⤵PID:2760
-
C:\Windows\SysWOW64\Kedaeh32.exeC:\Windows\system32\Kedaeh32.exe168⤵PID:2608
-
C:\Windows\SysWOW64\Kipnfged.exeC:\Windows\system32\Kipnfged.exe169⤵PID:2448
-
C:\Windows\SysWOW64\Khcnad32.exeC:\Windows\system32\Khcnad32.exe170⤵PID:3096
-
C:\Windows\SysWOW64\Klnjbbdh.exeC:\Windows\system32\Klnjbbdh.exe171⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3136 -
C:\Windows\SysWOW64\Kpjfba32.exeC:\Windows\system32\Kpjfba32.exe172⤵PID:3176
-
C:\Windows\SysWOW64\Komfnnck.exeC:\Windows\system32\Komfnnck.exe173⤵PID:3216
-
C:\Windows\SysWOW64\Kbhbom32.exeC:\Windows\system32\Kbhbom32.exe174⤵PID:3256
-
C:\Windows\SysWOW64\Kakbjibo.exeC:\Windows\system32\Kakbjibo.exe175⤵PID:3296
-
C:\Windows\SysWOW64\Kegnkh32.exeC:\Windows\system32\Kegnkh32.exe176⤵PID:3336
-
C:\Windows\SysWOW64\Kibjkgca.exeC:\Windows\system32\Kibjkgca.exe177⤵PID:3376
-
C:\Windows\SysWOW64\Klqfhbbe.exeC:\Windows\system32\Klqfhbbe.exe178⤵PID:3416
-
C:\Windows\SysWOW64\Kjcgco32.exeC:\Windows\system32\Kjcgco32.exe179⤵PID:3456
-
C:\Windows\SysWOW64\Koocdnai.exeC:\Windows\system32\Koocdnai.exe180⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3496 -
C:\Windows\SysWOW64\Kbkodl32.exeC:\Windows\system32\Kbkodl32.exe181⤵PID:3536
-
C:\Windows\SysWOW64\Kanopipl.exeC:\Windows\system32\Kanopipl.exe182⤵
- Drops file in System32 directory
PID:3576 -
C:\Windows\SysWOW64\Keikqhhe.exeC:\Windows\system32\Keikqhhe.exe183⤵PID:3616
-
C:\Windows\SysWOW64\Kdlkld32.exeC:\Windows\system32\Kdlkld32.exe184⤵PID:3656
-
C:\Windows\SysWOW64\Lhggmchi.exeC:\Windows\system32\Lhggmchi.exe185⤵PID:3696
-
C:\Windows\SysWOW64\Lhggmchi.exeC:\Windows\system32\Lhggmchi.exe186⤵
- Modifies registry class
PID:3724 -
C:\Windows\SysWOW64\Lkfciogm.exeC:\Windows\system32\Lkfciogm.exe187⤵PID:3748
-
C:\Windows\SysWOW64\Loapim32.exeC:\Windows\system32\Loapim32.exe188⤵PID:3788
-
C:\Windows\SysWOW64\Lmdpejfq.exeC:\Windows\system32\Lmdpejfq.exe189⤵PID:3828
-
C:\Windows\SysWOW64\Laplei32.exeC:\Windows\system32\Laplei32.exe190⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3868 -
C:\Windows\SysWOW64\Lekhfgfc.exeC:\Windows\system32\Lekhfgfc.exe191⤵PID:3908
-
C:\Windows\SysWOW64\Ldnhad32.exeC:\Windows\system32\Ldnhad32.exe192⤵PID:3948
-
C:\Windows\SysWOW64\Ldnhad32.exeC:\Windows\system32\Ldnhad32.exe193⤵PID:3976
-
C:\Windows\SysWOW64\Lhjdbcef.exeC:\Windows\system32\Lhjdbcef.exe194⤵PID:4000
-
C:\Windows\SysWOW64\Lfmdnp32.exeC:\Windows\system32\Lfmdnp32.exe195⤵PID:4040
-
C:\Windows\SysWOW64\Lkhpnnej.exeC:\Windows\system32\Lkhpnnej.exe196⤵PID:4080
-
C:\Windows\SysWOW64\Lodlom32.exeC:\Windows\system32\Lodlom32.exe197⤵PID:3092
-
C:\Windows\SysWOW64\Lmgmjjdn.exeC:\Windows\system32\Lmgmjjdn.exe198⤵PID:3144
-
C:\Windows\SysWOW64\Labhkh32.exeC:\Windows\system32\Labhkh32.exe199⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1432 -
C:\Windows\SysWOW64\Lpeifeca.exeC:\Windows\system32\Lpeifeca.exe200⤵PID:3236
-
C:\Windows\SysWOW64\Ldqegd32.exeC:\Windows\system32\Ldqegd32.exe201⤵PID:3288
-
C:\Windows\SysWOW64\Lgoacojo.exeC:\Windows\system32\Lgoacojo.exe202⤵PID:3344
-
C:\Windows\SysWOW64\Lgoacojo.exeC:\Windows\system32\Lgoacojo.exe203⤵
- Drops file in System32 directory
PID:3368 -
C:\Windows\SysWOW64\Lkkmdn32.exeC:\Windows\system32\Lkkmdn32.exe204⤵PID:3404
-
C:\Windows\SysWOW64\Limmokib.exeC:\Windows\system32\Limmokib.exe205⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3464 -
C:\Windows\SysWOW64\Lmiipi32.exeC:\Windows\system32\Lmiipi32.exe206⤵PID:2832
-
C:\Windows\SysWOW64\Ladeqhjd.exeC:\Windows\system32\Ladeqhjd.exe207⤵PID:3560
-
C:\Windows\SysWOW64\Ladeqhjd.exeC:\Windows\system32\Ladeqhjd.exe208⤵PID:3592
-
C:\Windows\SysWOW64\Lpgele32.exeC:\Windows\system32\Lpgele32.exe209⤵PID:3628
-
C:\Windows\SysWOW64\Ldcamcih.exeC:\Windows\system32\Ldcamcih.exe210⤵PID:3668
-
C:\Windows\SysWOW64\Lbfahp32.exeC:\Windows\system32\Lbfahp32.exe211⤵PID:3736
-
C:\Windows\SysWOW64\Lganiohl.exeC:\Windows\system32\Lganiohl.exe212⤵PID:3796
-
C:\Windows\SysWOW64\Lkmjin32.exeC:\Windows\system32\Lkmjin32.exe213⤵PID:3848
-
C:\Windows\SysWOW64\Lipjejgp.exeC:\Windows\system32\Lipjejgp.exe214⤵
- Drops file in System32 directory
PID:3904 -
C:\Windows\SysWOW64\Lmkfei32.exeC:\Windows\system32\Lmkfei32.exe215⤵PID:3960
-
C:\Windows\SysWOW64\Llnfaffc.exeC:\Windows\system32\Llnfaffc.exe216⤵PID:3988
-
C:\Windows\SysWOW64\Lpjbad32.exeC:\Windows\system32\Lpjbad32.exe217⤵
- Modifies registry class
PID:4036 -
C:\Windows\SysWOW64\Ldenbcge.exeC:\Windows\system32\Ldenbcge.exe218⤵PID:3084
-
C:\Windows\SysWOW64\Lchnnp32.exeC:\Windows\system32\Lchnnp32.exe219⤵PID:1704
-
C:\Windows\SysWOW64\Lgdjnofi.exeC:\Windows\system32\Lgdjnofi.exe220⤵PID:3188
-
C:\Windows\SysWOW64\Lefkjkmc.exeC:\Windows\system32\Lefkjkmc.exe221⤵PID:3248
-
C:\Windows\SysWOW64\Lefkjkmc.exeC:\Windows\system32\Lefkjkmc.exe222⤵PID:3308
-
C:\Windows\SysWOW64\Libgjj32.exeC:\Windows\system32\Libgjj32.exe223⤵PID:488
-
C:\Windows\SysWOW64\Lmnbkinf.exeC:\Windows\system32\Lmnbkinf.exe224⤵PID:3424
-
C:\Windows\SysWOW64\Llqcfe32.exeC:\Windows\system32\Llqcfe32.exe225⤵PID:3472
-
C:\Windows\SysWOW64\Lplogdmj.exeC:\Windows\system32\Lplogdmj.exe226⤵PID:3532
-
C:\Windows\SysWOW64\Loooca32.exeC:\Windows\system32\Loooca32.exe227⤵PID:3608
-
C:\Windows\SysWOW64\Mcjkcplm.exeC:\Windows\system32\Mcjkcplm.exe228⤵PID:3672
-
C:\Windows\SysWOW64\Mgfgdn32.exeC:\Windows\system32\Mgfgdn32.exe229⤵
- Modifies registry class
PID:3756 -
C:\Windows\SysWOW64\Meigpkka.exeC:\Windows\system32\Meigpkka.exe230⤵PID:3824
-
C:\Windows\SysWOW64\Midcpj32.exeC:\Windows\system32\Midcpj32.exe231⤵PID:3896
-
C:\Windows\SysWOW64\Mhgclfje.exeC:\Windows\system32\Mhgclfje.exe232⤵PID:3116
-
C:\Windows\SysWOW64\Mlcple32.exeC:\Windows\system32\Mlcple32.exe233⤵
- Drops file in System32 directory
PID:3596 -
C:\Windows\SysWOW64\Mpolmdkg.exeC:\Windows\system32\Mpolmdkg.exe234⤵PID:1924
-
C:\Windows\SysWOW64\Moalhq32.exeC:\Windows\system32\Moalhq32.exe235⤵
- Modifies registry class
PID:3156 -
C:\Windows\SysWOW64\Mcmhiojk.exeC:\Windows\system32\Mcmhiojk.exe236⤵PID:3224
-
C:\Windows\SysWOW64\Maphdl32.exeC:\Windows\system32\Maphdl32.exe237⤵PID:1376
-
C:\Windows\SysWOW64\Maphdl32.exeC:\Windows\system32\Maphdl32.exe238⤵PID:3364
-
C:\Windows\SysWOW64\Mekdekin.exeC:\Windows\system32\Mekdekin.exe239⤵
- Drops file in System32 directory
PID:3440 -
C:\Windows\SysWOW64\Migpeiag.exeC:\Windows\system32\Migpeiag.exe240⤵
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\Mhjpaf32.exeC:\Windows\system32\Mhjpaf32.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3572 -
C:\Windows\SysWOW64\Mlelaeqk.exeC:\Windows\system32\Mlelaeqk.exe242⤵PID:3664