Analysis
-
max time kernel
156s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe
Resource
win10v2004-20240226-en
General
-
Target
7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe
-
Size
163KB
-
MD5
c3bf2ef482e36e9a45e500ce82e8f5e2
-
SHA1
678776af89a904a0e8df63a7eb8d078f5833817c
-
SHA256
7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6
-
SHA512
1c851a1c8d8f3df99e2ff16d516cead30544be95812e31db50d1a389465a04cab3b79a4bf13fd797a8792ae04bed2a2af831e70c1336c4cc889de496d63417e1
-
SSDEEP
1536:PecG6maNzAFT1UItqM0g0JaOvXgTFelProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:lmamluIH0MmgBeltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Jadgnb32.exePklamb32.exePdeffgff.exeLmneemaq.exeDobnpm32.exeKfhkop32.exeIgabdekb.exePoaqocgl.exeLdfhgn32.exeLdhbnhlm.exeCdaigi32.exeHfcinq32.exeNdpcdjho.exeOpfnne32.exeAjfhhp32.exeNccqbeec.exeHhiaepfl.exeBhdbaihi.exeDegdgd32.exeJkjclk32.exeJndhkmfe.exeNjlcdf32.exeKbkaiddd.exeFljedg32.exeIohlcg32.exeFlmhclod.exePcjaio32.exeHpnoncim.exeJahgpf32.exeDbcbnlcl.exeBggnijof.exeCddjofbj.exeAcdbpq32.exeLdanloba.exeGledpe32.exeJkfakb32.exeOiihkncb.exeGgbmafnm.exePjalpida.exeAmoknh32.exeEfjbne32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jadgnb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pklamb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pdeffgff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmneemaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dobnpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfhkop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Igabdekb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Poaqocgl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldfhgn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldhbnhlm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cdaigi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hfcinq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ndpcdjho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Opfnne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajfhhp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nccqbeec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhiaepfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhdbaihi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Degdgd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkjclk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jndhkmfe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njlcdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbkaiddd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fljedg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iohlcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Flmhclod.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pcjaio32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpnoncim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jahgpf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbcbnlcl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bggnijof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cddjofbj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acdbpq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldanloba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gledpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkfakb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oiihkncb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ggbmafnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjalpida.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amoknh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Efjbne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Hpnoncim.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3600-8-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iikmbh32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3196-16-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iomoenej.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2996-24-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iplkpa32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jcdjbk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kfnfjehl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lpfgmnfp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Llodgnja.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lfjfecno.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lgibpf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mqdcnl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Monjjgkb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nfjola32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nmfcok32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Npiiffqe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oakbehfe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oaplqh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ohlqcagj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Paeelgnj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pdenmbkk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ppolhcnm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qfkqjmdg.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4236-177-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qjiipk32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/964-186-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Agdcpkll.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2876-194-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Amqhbe32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3732-201-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bkgeainn.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4328-209-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bkibgh32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/1656-217-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bddcenpi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bdfpkm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cammjakm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cnfkdb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cgqlcg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dhbebj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Egohdegl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fqbliicp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hecjke32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hhdcmp32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3024-369-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3080-375-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4856-381-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2908-387-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jaajhb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kakmna32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ljdkll32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mljmhflh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ofckhj32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2444-538-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2032-545-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Biiobo32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/5132-574-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/5172-586-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/5212-589-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3196-588-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2996-598-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4788-612-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Hpnoncim.exe UPX behavioral2/memory/3600-8-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Iikmbh32.exe UPX behavioral2/memory/3196-16-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Iomoenej.exe UPX behavioral2/memory/2996-24-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Iplkpa32.exe UPX C:\Windows\SysWOW64\Jcdjbk32.exe UPX C:\Windows\SysWOW64\Kfnfjehl.exe UPX C:\Windows\SysWOW64\Lpfgmnfp.exe UPX C:\Windows\SysWOW64\Llodgnja.exe UPX C:\Windows\SysWOW64\Lfjfecno.exe UPX C:\Windows\SysWOW64\Lgibpf32.exe UPX C:\Windows\SysWOW64\Mqdcnl32.exe UPX C:\Windows\SysWOW64\Monjjgkb.exe UPX C:\Windows\SysWOW64\Nfjola32.exe UPX C:\Windows\SysWOW64\Nmfcok32.exe UPX C:\Windows\SysWOW64\Npiiffqe.exe UPX C:\Windows\SysWOW64\Oakbehfe.exe UPX C:\Windows\SysWOW64\Oaplqh32.exe UPX C:\Windows\SysWOW64\Ohlqcagj.exe UPX C:\Windows\SysWOW64\Paeelgnj.exe UPX C:\Windows\SysWOW64\Pdenmbkk.exe UPX C:\Windows\SysWOW64\Ppolhcnm.exe UPX C:\Windows\SysWOW64\Qfkqjmdg.exe UPX behavioral2/memory/4236-177-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Qjiipk32.exe UPX behavioral2/memory/964-186-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Agdcpkll.exe UPX behavioral2/memory/2876-194-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Amqhbe32.exe UPX behavioral2/memory/3732-201-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Bkgeainn.exe UPX behavioral2/memory/4328-209-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Bkibgh32.exe UPX behavioral2/memory/1656-217-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Bddcenpi.exe UPX C:\Windows\SysWOW64\Bdfpkm32.exe UPX C:\Windows\SysWOW64\Cammjakm.exe UPX C:\Windows\SysWOW64\Cnfkdb32.exe UPX C:\Windows\SysWOW64\Cgqlcg32.exe UPX C:\Windows\SysWOW64\Dhbebj32.exe UPX C:\Windows\SysWOW64\Egohdegl.exe UPX C:\Windows\SysWOW64\Fqbliicp.exe UPX C:\Windows\SysWOW64\Hecjke32.exe UPX C:\Windows\SysWOW64\Hhdcmp32.exe UPX behavioral2/memory/3024-369-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3080-375-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4856-381-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2908-387-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Jaajhb32.exe UPX C:\Windows\SysWOW64\Kakmna32.exe UPX C:\Windows\SysWOW64\Ljdkll32.exe UPX C:\Windows\SysWOW64\Mljmhflh.exe UPX C:\Windows\SysWOW64\Ofckhj32.exe UPX behavioral2/memory/2444-538-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2032-545-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1064-552-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Biiobo32.exe UPX behavioral2/memory/5212-589-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3196-588-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2996-598-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5272-603-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4788-612-0x0000000000400000-0x0000000000453000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
Hpnoncim.exeIikmbh32.exeIomoenej.exeIplkpa32.exeJcdjbk32.exeKfnfjehl.exeLpfgmnfp.exeLlodgnja.exeLfjfecno.exeLgibpf32.exeMqdcnl32.exeMonjjgkb.exeNfjola32.exeNmfcok32.exeNpiiffqe.exeOakbehfe.exeOaplqh32.exeOhlqcagj.exePaeelgnj.exePdenmbkk.exePpolhcnm.exeQfkqjmdg.exeQjiipk32.exeAgdcpkll.exeAmqhbe32.exeBkgeainn.exeBkibgh32.exeBddcenpi.exeBdfpkm32.exeCammjakm.exeCnfkdb32.exeCgqlcg32.exeDgcihgaj.exeDhbebj32.exeDamfao32.exeEgohdegl.exeEkajec32.exeFqbliicp.exeFqgedh32.exeFajbjh32.exeGgfglb32.exeGnblnlhl.exeGngeik32.exeHecjke32.exeHbgkei32.exeHhdcmp32.exeHejqldci.exeHppeim32.exeIeojgc32.exeIeagmcmq.exeIefphb32.exeIamamcop.exeJblmgf32.exeJaajhb32.exeJadgnb32.exeJafdcbge.exeJbepme32.exeKakmna32.exeKhgbqkhj.exeKcmfnd32.exeKocgbend.exeLedepn32.exeLegben32.exeLjdkll32.exepid process 3600 Hpnoncim.exe 3196 Iikmbh32.exe 2996 Iomoenej.exe 1272 Iplkpa32.exe 4788 Jcdjbk32.exe 1912 Kfnfjehl.exe 3152 Lpfgmnfp.exe 2368 Llodgnja.exe 1648 Lfjfecno.exe 384 Lgibpf32.exe 1548 Mqdcnl32.exe 860 Monjjgkb.exe 1440 Nfjola32.exe 688 Nmfcok32.exe 4908 Npiiffqe.exe 3156 Oakbehfe.exe 2516 Oaplqh32.exe 2976 Ohlqcagj.exe 1664 Paeelgnj.exe 1720 Pdenmbkk.exe 4348 Ppolhcnm.exe 4236 Qfkqjmdg.exe 964 Qjiipk32.exe 2876 Agdcpkll.exe 3732 Amqhbe32.exe 4328 Bkgeainn.exe 1656 Bkibgh32.exe 4268 Bddcenpi.exe 4316 Bdfpkm32.exe 2716 Cammjakm.exe 3292 Cnfkdb32.exe 2852 Cgqlcg32.exe 1340 Dgcihgaj.exe 3920 Dhbebj32.exe 4596 Damfao32.exe 4392 Egohdegl.exe 3776 Ekajec32.exe 4708 Fqbliicp.exe 4736 Fqgedh32.exe 4028 Fajbjh32.exe 5076 Ggfglb32.exe 1020 Gnblnlhl.exe 4772 Gngeik32.exe 1244 Hecjke32.exe 652 Hbgkei32.exe 5072 Hhdcmp32.exe 1764 Hejqldci.exe 2752 Hppeim32.exe 2084 Ieojgc32.exe 3024 Ieagmcmq.exe 3080 Iefphb32.exe 4856 Iamamcop.exe 2908 Jblmgf32.exe 2932 Jaajhb32.exe 1356 Jadgnb32.exe 840 Jafdcbge.exe 752 Jbepme32.exe 4768 Kakmna32.exe 4208 Khgbqkhj.exe 1352 Kcmfnd32.exe 2564 Kocgbend.exe 4888 Ledepn32.exe 2016 Legben32.exe 2660 Ljdkll32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Dgkbfjeg.exeFehplggn.exeLiekgo32.exeDjfckenm.exeCkoifgmb.exeQebpipij.exeKgkfil32.exeIdljll32.exeJdbheajp.exeBkibgh32.exeBjmpfdhb.exeFkehdnee.exeOjefjd32.exeHheoci32.exeNedjdp32.exeDlcmgqdd.exeHbegakcb.exeMphoob32.exeOpjponbf.exeGpkliaol.exeAhdpea32.exeGplged32.exeKafcadej.exeCfogohpa.exeFqgedh32.exeEkdolcbm.exeBaepolni.exeCinpdl32.exeFhbpqb32.exeFbdnne32.exeLpbojlfd.exeDhbebj32.exeNmajbnha.exePeimcaae.exeNbdkhe32.exePmangnmg.exeNjlcdf32.exeQcbmegol.exeBjhpqn32.exeIeknpb32.exeIdonlbff.exeGbmaog32.exeJaqcnl32.exeJcaeea32.exeAgaoca32.exeJkplilgk.exeMhpgca32.exeBibpkiie.exeEjgdim32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Dqdgop32.exe Dgkbfjeg.exe File created C:\Windows\SysWOW64\Pqagcpkg.dll Fehplggn.exe File created C:\Windows\SysWOW64\Gffnkjcl.dll Liekgo32.exe File opened for modification C:\Windows\SysWOW64\Dfmcpf32.exe Djfckenm.exe File opened for modification C:\Windows\SysWOW64\Njpjap32.exe File opened for modification C:\Windows\SysWOW64\Cegnol32.exe Ckoifgmb.exe File opened for modification C:\Windows\SysWOW64\Aeemop32.exe Qebpipij.exe File created C:\Windows\SysWOW64\Hkichcjh.dll File opened for modification C:\Windows\SysWOW64\Kpdjbapj.exe Kgkfil32.exe File opened for modification C:\Windows\SysWOW64\Imdndbkn.exe Idljll32.exe File created C:\Windows\SysWOW64\Limdkpgg.dll Jdbheajp.exe File created C:\Windows\SysWOW64\Ndikch32.dll Bkibgh32.exe File created C:\Windows\SysWOW64\Cgnqqq32.dll Bjmpfdhb.exe File created C:\Windows\SysWOW64\Fjhifg32.dll Fkehdnee.exe File created C:\Windows\SysWOW64\Ogifci32.exe Ojefjd32.exe File opened for modification C:\Windows\SysWOW64\Hkehdd32.exe Hheoci32.exe File opened for modification C:\Windows\SysWOW64\Ochjmd32.exe Nedjdp32.exe File created C:\Windows\SysWOW64\Dcmedk32.exe Dlcmgqdd.exe File opened for modification C:\Windows\SysWOW64\Imklncch.exe Hbegakcb.exe File created C:\Windows\SysWOW64\Medggidb.exe Mphoob32.exe File created C:\Windows\SysWOW64\Bkoiqjdj.exe File opened for modification C:\Windows\SysWOW64\Olqqdo32.exe Opjponbf.exe File created C:\Windows\SysWOW64\Hakhcd32.exe Gpkliaol.exe File created C:\Windows\SysWOW64\Eknodnil.dll File created C:\Windows\SysWOW64\Ocligb32.dll Ahdpea32.exe File opened for modification C:\Windows\SysWOW64\Ggfobofl.exe Gplged32.exe File created C:\Windows\SysWOW64\Kknhjj32.exe Kafcadej.exe File created C:\Windows\SysWOW64\Cmklaaek.exe Cfogohpa.exe File created C:\Windows\SysWOW64\Hlhbih32.dll Fqgedh32.exe File opened for modification C:\Windows\SysWOW64\Fdlcehhn.exe Ekdolcbm.exe File created C:\Windows\SysWOW64\Bbhildae.exe Baepolni.exe File created C:\Windows\SysWOW64\Cqiehnml.exe Cinpdl32.exe File created C:\Windows\SysWOW64\Fffqjfom.exe Fhbpqb32.exe File opened for modification C:\Windows\SysWOW64\Liikiccg.exe File opened for modification C:\Windows\SysWOW64\Fnjocf32.exe Fbdnne32.exe File opened for modification C:\Windows\SysWOW64\Mflgff32.exe Lpbojlfd.exe File created C:\Windows\SysWOW64\Ccegnk32.dll File created C:\Windows\SysWOW64\Eecpaeoo.exe File created C:\Windows\SysWOW64\Anfmbd32.dll Dhbebj32.exe File opened for modification C:\Windows\SysWOW64\Ofjokc32.exe Nmajbnha.exe File created C:\Windows\SysWOW64\Papnhbgi.exe Peimcaae.exe File opened for modification C:\Windows\SysWOW64\Ildibc32.exe File created C:\Windows\SysWOW64\Bllolf32.dll Nbdkhe32.exe File created C:\Windows\SysWOW64\Pnakaa32.exe Pmangnmg.exe File opened for modification C:\Windows\SysWOW64\Alfpijll.exe File created C:\Windows\SysWOW64\Nlljglpc.exe File created C:\Windows\SysWOW64\Ncdgmkio.exe Njlcdf32.exe File opened for modification C:\Windows\SysWOW64\Qqfmnk32.exe Qcbmegol.exe File created C:\Windows\SysWOW64\Mnkgakpp.exe File created C:\Windows\SysWOW64\Igomeb32.exe File created C:\Windows\SysWOW64\Cnidhk32.dll Bjhpqn32.exe File created C:\Windows\SysWOW64\Cnppaiii.dll Ieknpb32.exe File created C:\Windows\SysWOW64\Iodaikfl.exe Idonlbff.exe File opened for modification C:\Windows\SysWOW64\Goabhl32.exe Gbmaog32.exe File created C:\Windows\SysWOW64\Jhkljfok.exe Jaqcnl32.exe File created C:\Windows\SysWOW64\Lkihaj32.dll Jcaeea32.exe File created C:\Windows\SysWOW64\Afboah32.exe Agaoca32.exe File created C:\Windows\SysWOW64\Ainpoqfj.dll Jkplilgk.exe File opened for modification C:\Windows\SysWOW64\Cnfahn32.exe File opened for modification C:\Windows\SysWOW64\Gnmblb32.exe File opened for modification C:\Windows\SysWOW64\Medglemj.exe Mhpgca32.exe File opened for modification C:\Windows\SysWOW64\Boohcpgm.exe Bibpkiie.exe File created C:\Windows\SysWOW64\Cpmcffca.dll Dgkbfjeg.exe File opened for modification C:\Windows\SysWOW64\Eodlad32.exe Ejgdim32.exe -
Modifies registry class 64 IoCs
Processes:
Cdoegcfl.exeAgikne32.exeAbqjci32.exeMfkkqmiq.exeNdfanlpi.exeFgmllpng.exePdmikb32.exeIfihdi32.exeGdheol32.exeCanlfh32.exeNkcmjlio.exeDbdano32.exeKknhjj32.exeMdgejmdi.exeJbbfnlpk.exeDjaipe32.exeOhlqcagj.exeDobffj32.exeFkgbli32.exeMplapkoj.exeKaaaak32.exeOilmhhfd.exeDnghhqdk.exeHjcllilo.exeMdjapphl.exe7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exeJcdjbk32.exeMafofggd.exeDlcmgqdd.exeLoodqn32.exeKpdjbapj.exeHhdcmp32.exeHnfafpfd.exeOnngci32.exeHhbdko32.exeOnjmjegg.exeEodlad32.exeDgqqnjea.exeAgdcpkll.exeDpjompqc.exeFolacfcd.exePoaqocgl.exeCfogohpa.exeJmpgghoo.exeNgifef32.exeAfboah32.exeCediab32.exeLpcedbjp.exeNiklip32.exeClbdpc32.exeJhjcbljf.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cdoegcfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Epbbim32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Agikne32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebiogg32.dll" Abqjci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mfkkqmiq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ndfanlpi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fgmllpng.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pdmikb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifihdi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gdheol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Canlfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mokjbgbf.dll" Nkcmjlio.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbdano32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kknhjj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mdgejmdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbbfnlpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbbiak32.dll" Djaipe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cedckdaj.dll" Ohlqcagj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dobffj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fkgbli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mplapkoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kaaaak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caioglje.dll" Oilmhhfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dbnebbgl.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnghhqdk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hjcllilo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kmnnnj32.dll" Mdjapphl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnnebn32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jcdjbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mafofggd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nbjhlcmm.dll" Dlcmgqdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Loodqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qnoeacho.dll" Kpdjbapj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhdcmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jelplp32.dll" Hnfafpfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icfhqeeg.dll" Onngci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhbdko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jehffpod.dll" Onjmjegg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eodlad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dgqqnjea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Agdcpkll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dpjompqc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Folacfcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Poaqocgl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hklqokmi.dll" Cfogohpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmpgghoo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cjmkoamp.dll" Ngifef32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afboah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdbnmj32.dll" Cediab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lpcedbjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Niklip32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Clbdpc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jhjcbljf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exeHpnoncim.exeIikmbh32.exeIomoenej.exeIplkpa32.exeJcdjbk32.exeKfnfjehl.exeLpfgmnfp.exeLlodgnja.exeLfjfecno.exeLgibpf32.exeMqdcnl32.exeMonjjgkb.exeNfjola32.exeNmfcok32.exeNpiiffqe.exeOakbehfe.exeOaplqh32.exeOhlqcagj.exePaeelgnj.exePdenmbkk.exePpolhcnm.exedescription pid process target process PID 5100 wrote to memory of 3600 5100 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe Hpnoncim.exe PID 5100 wrote to memory of 3600 5100 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe Hpnoncim.exe PID 5100 wrote to memory of 3600 5100 7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe Hpnoncim.exe PID 3600 wrote to memory of 3196 3600 Hpnoncim.exe Iikmbh32.exe PID 3600 wrote to memory of 3196 3600 Hpnoncim.exe Iikmbh32.exe PID 3600 wrote to memory of 3196 3600 Hpnoncim.exe Iikmbh32.exe PID 3196 wrote to memory of 2996 3196 Iikmbh32.exe Iomoenej.exe PID 3196 wrote to memory of 2996 3196 Iikmbh32.exe Iomoenej.exe PID 3196 wrote to memory of 2996 3196 Iikmbh32.exe Iomoenej.exe PID 2996 wrote to memory of 1272 2996 Iomoenej.exe Iplkpa32.exe PID 2996 wrote to memory of 1272 2996 Iomoenej.exe Iplkpa32.exe PID 2996 wrote to memory of 1272 2996 Iomoenej.exe Iplkpa32.exe PID 1272 wrote to memory of 4788 1272 Iplkpa32.exe Jcdjbk32.exe PID 1272 wrote to memory of 4788 1272 Iplkpa32.exe Jcdjbk32.exe PID 1272 wrote to memory of 4788 1272 Iplkpa32.exe Jcdjbk32.exe PID 4788 wrote to memory of 1912 4788 Jcdjbk32.exe Kfnfjehl.exe PID 4788 wrote to memory of 1912 4788 Jcdjbk32.exe Kfnfjehl.exe PID 4788 wrote to memory of 1912 4788 Jcdjbk32.exe Kfnfjehl.exe PID 1912 wrote to memory of 3152 1912 Kfnfjehl.exe Lpfgmnfp.exe PID 1912 wrote to memory of 3152 1912 Kfnfjehl.exe Lpfgmnfp.exe PID 1912 wrote to memory of 3152 1912 Kfnfjehl.exe Lpfgmnfp.exe PID 3152 wrote to memory of 2368 3152 Lpfgmnfp.exe Llodgnja.exe PID 3152 wrote to memory of 2368 3152 Lpfgmnfp.exe Llodgnja.exe PID 3152 wrote to memory of 2368 3152 Lpfgmnfp.exe Llodgnja.exe PID 2368 wrote to memory of 1648 2368 Llodgnja.exe Lfjfecno.exe PID 2368 wrote to memory of 1648 2368 Llodgnja.exe Lfjfecno.exe PID 2368 wrote to memory of 1648 2368 Llodgnja.exe Lfjfecno.exe PID 1648 wrote to memory of 384 1648 Lfjfecno.exe Lgibpf32.exe PID 1648 wrote to memory of 384 1648 Lfjfecno.exe Lgibpf32.exe PID 1648 wrote to memory of 384 1648 Lfjfecno.exe Lgibpf32.exe PID 384 wrote to memory of 1548 384 Lgibpf32.exe Mqdcnl32.exe PID 384 wrote to memory of 1548 384 Lgibpf32.exe Mqdcnl32.exe PID 384 wrote to memory of 1548 384 Lgibpf32.exe Mqdcnl32.exe PID 1548 wrote to memory of 860 1548 Mqdcnl32.exe Monjjgkb.exe PID 1548 wrote to memory of 860 1548 Mqdcnl32.exe Monjjgkb.exe PID 1548 wrote to memory of 860 1548 Mqdcnl32.exe Monjjgkb.exe PID 860 wrote to memory of 1440 860 Monjjgkb.exe Nfjola32.exe PID 860 wrote to memory of 1440 860 Monjjgkb.exe Nfjola32.exe PID 860 wrote to memory of 1440 860 Monjjgkb.exe Nfjola32.exe PID 1440 wrote to memory of 688 1440 Nfjola32.exe Nmfcok32.exe PID 1440 wrote to memory of 688 1440 Nfjola32.exe Nmfcok32.exe PID 1440 wrote to memory of 688 1440 Nfjola32.exe Nmfcok32.exe PID 688 wrote to memory of 4908 688 Nmfcok32.exe Npiiffqe.exe PID 688 wrote to memory of 4908 688 Nmfcok32.exe Npiiffqe.exe PID 688 wrote to memory of 4908 688 Nmfcok32.exe Npiiffqe.exe PID 4908 wrote to memory of 3156 4908 Npiiffqe.exe Oakbehfe.exe PID 4908 wrote to memory of 3156 4908 Npiiffqe.exe Oakbehfe.exe PID 4908 wrote to memory of 3156 4908 Npiiffqe.exe Oakbehfe.exe PID 3156 wrote to memory of 2516 3156 Oakbehfe.exe Oaplqh32.exe PID 3156 wrote to memory of 2516 3156 Oakbehfe.exe Oaplqh32.exe PID 3156 wrote to memory of 2516 3156 Oakbehfe.exe Oaplqh32.exe PID 2516 wrote to memory of 2976 2516 Oaplqh32.exe Ohlqcagj.exe PID 2516 wrote to memory of 2976 2516 Oaplqh32.exe Ohlqcagj.exe PID 2516 wrote to memory of 2976 2516 Oaplqh32.exe Ohlqcagj.exe PID 2976 wrote to memory of 1664 2976 Ohlqcagj.exe Paeelgnj.exe PID 2976 wrote to memory of 1664 2976 Ohlqcagj.exe Paeelgnj.exe PID 2976 wrote to memory of 1664 2976 Ohlqcagj.exe Paeelgnj.exe PID 1664 wrote to memory of 1720 1664 Paeelgnj.exe Pdenmbkk.exe PID 1664 wrote to memory of 1720 1664 Paeelgnj.exe Pdenmbkk.exe PID 1664 wrote to memory of 1720 1664 Paeelgnj.exe Pdenmbkk.exe PID 1720 wrote to memory of 4348 1720 Pdenmbkk.exe Ppolhcnm.exe PID 1720 wrote to memory of 4348 1720 Pdenmbkk.exe Ppolhcnm.exe PID 1720 wrote to memory of 4348 1720 Pdenmbkk.exe Ppolhcnm.exe PID 4348 wrote to memory of 4236 4348 Ppolhcnm.exe Qfkqjmdg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe"C:\Users\Admin\AppData\Local\Temp\7d238dc7319fc3ca01ce77323181fc9af43aaa5869137d5ae7eb372a5c7c66c6.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\Hpnoncim.exeC:\Windows\system32\Hpnoncim.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\Iikmbh32.exeC:\Windows\system32\Iikmbh32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\Iomoenej.exeC:\Windows\system32\Iomoenej.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Iplkpa32.exeC:\Windows\system32\Iplkpa32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\Jcdjbk32.exeC:\Windows\system32\Jcdjbk32.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\Kfnfjehl.exeC:\Windows\system32\Kfnfjehl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\Lpfgmnfp.exeC:\Windows\system32\Lpfgmnfp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\Llodgnja.exeC:\Windows\system32\Llodgnja.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\Lfjfecno.exeC:\Windows\system32\Lfjfecno.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\Lgibpf32.exeC:\Windows\system32\Lgibpf32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\Mqdcnl32.exeC:\Windows\system32\Mqdcnl32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\Monjjgkb.exeC:\Windows\system32\Monjjgkb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\Nfjola32.exeC:\Windows\system32\Nfjola32.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\Nmfcok32.exeC:\Windows\system32\Nmfcok32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\Npiiffqe.exeC:\Windows\system32\Npiiffqe.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\Oakbehfe.exeC:\Windows\system32\Oakbehfe.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\Oaplqh32.exeC:\Windows\system32\Oaplqh32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\Ohlqcagj.exeC:\Windows\system32\Ohlqcagj.exe19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\Paeelgnj.exeC:\Windows\system32\Paeelgnj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Pdenmbkk.exeC:\Windows\system32\Pdenmbkk.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\Ppolhcnm.exeC:\Windows\system32\Ppolhcnm.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\Qfkqjmdg.exeC:\Windows\system32\Qfkqjmdg.exe23⤵
- Executes dropped EXE
PID:4236 -
C:\Windows\SysWOW64\Qjiipk32.exeC:\Windows\system32\Qjiipk32.exe24⤵
- Executes dropped EXE
PID:964 -
C:\Windows\SysWOW64\Agdcpkll.exeC:\Windows\system32\Agdcpkll.exe25⤵
- Executes dropped EXE
- Modifies registry class
PID:2876 -
C:\Windows\SysWOW64\Amqhbe32.exeC:\Windows\system32\Amqhbe32.exe26⤵
- Executes dropped EXE
PID:3732 -
C:\Windows\SysWOW64\Bkgeainn.exeC:\Windows\system32\Bkgeainn.exe27⤵
- Executes dropped EXE
PID:4328 -
C:\Windows\SysWOW64\Bkibgh32.exeC:\Windows\system32\Bkibgh32.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\Bddcenpi.exeC:\Windows\system32\Bddcenpi.exe29⤵
- Executes dropped EXE
PID:4268 -
C:\Windows\SysWOW64\Bdfpkm32.exeC:\Windows\system32\Bdfpkm32.exe30⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\Cammjakm.exeC:\Windows\system32\Cammjakm.exe31⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Cnfkdb32.exeC:\Windows\system32\Cnfkdb32.exe32⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\SysWOW64\Cgqlcg32.exeC:\Windows\system32\Cgqlcg32.exe33⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\Dgcihgaj.exeC:\Windows\system32\Dgcihgaj.exe34⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\Dhbebj32.exeC:\Windows\system32\Dhbebj32.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3920 -
C:\Windows\SysWOW64\Damfao32.exeC:\Windows\system32\Damfao32.exe36⤵
- Executes dropped EXE
PID:4596 -
C:\Windows\SysWOW64\Egohdegl.exeC:\Windows\system32\Egohdegl.exe37⤵
- Executes dropped EXE
PID:4392 -
C:\Windows\SysWOW64\Ekajec32.exeC:\Windows\system32\Ekajec32.exe38⤵
- Executes dropped EXE
PID:3776 -
C:\Windows\SysWOW64\Fqbliicp.exeC:\Windows\system32\Fqbliicp.exe39⤵
- Executes dropped EXE
PID:4708 -
C:\Windows\SysWOW64\Fqgedh32.exeC:\Windows\system32\Fqgedh32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4736 -
C:\Windows\SysWOW64\Fajbjh32.exeC:\Windows\system32\Fajbjh32.exe41⤵
- Executes dropped EXE
PID:4028 -
C:\Windows\SysWOW64\Ggfglb32.exeC:\Windows\system32\Ggfglb32.exe42⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\SysWOW64\Gnblnlhl.exeC:\Windows\system32\Gnblnlhl.exe43⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\Gngeik32.exeC:\Windows\system32\Gngeik32.exe44⤵
- Executes dropped EXE
PID:4772 -
C:\Windows\SysWOW64\Hecjke32.exeC:\Windows\system32\Hecjke32.exe45⤵
- Executes dropped EXE
PID:1244 -
C:\Windows\SysWOW64\Hbgkei32.exeC:\Windows\system32\Hbgkei32.exe46⤵
- Executes dropped EXE
PID:652 -
C:\Windows\SysWOW64\Hhdcmp32.exeC:\Windows\system32\Hhdcmp32.exe47⤵
- Executes dropped EXE
- Modifies registry class
PID:5072 -
C:\Windows\SysWOW64\Hejqldci.exeC:\Windows\system32\Hejqldci.exe48⤵
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\Hppeim32.exeC:\Windows\system32\Hppeim32.exe49⤵
- Executes dropped EXE
PID:2752 -
C:\Windows\SysWOW64\Ieojgc32.exeC:\Windows\system32\Ieojgc32.exe50⤵
- Executes dropped EXE
PID:2084 -
C:\Windows\SysWOW64\Ieagmcmq.exeC:\Windows\system32\Ieagmcmq.exe51⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\Iefphb32.exeC:\Windows\system32\Iefphb32.exe52⤵
- Executes dropped EXE
PID:3080 -
C:\Windows\SysWOW64\Iamamcop.exeC:\Windows\system32\Iamamcop.exe53⤵
- Executes dropped EXE
PID:4856 -
C:\Windows\SysWOW64\Jblmgf32.exeC:\Windows\system32\Jblmgf32.exe54⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\Jaajhb32.exeC:\Windows\system32\Jaajhb32.exe55⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\Jadgnb32.exeC:\Windows\system32\Jadgnb32.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1356 -
C:\Windows\SysWOW64\Jafdcbge.exeC:\Windows\system32\Jafdcbge.exe57⤵
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\Jbepme32.exeC:\Windows\system32\Jbepme32.exe58⤵
- Executes dropped EXE
PID:752 -
C:\Windows\SysWOW64\Kakmna32.exeC:\Windows\system32\Kakmna32.exe59⤵
- Executes dropped EXE
PID:4768 -
C:\Windows\SysWOW64\Khgbqkhj.exeC:\Windows\system32\Khgbqkhj.exe60⤵
- Executes dropped EXE
PID:4208 -
C:\Windows\SysWOW64\Kcmfnd32.exeC:\Windows\system32\Kcmfnd32.exe61⤵
- Executes dropped EXE
PID:1352 -
C:\Windows\SysWOW64\Kocgbend.exeC:\Windows\system32\Kocgbend.exe62⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\SysWOW64\Ledepn32.exeC:\Windows\system32\Ledepn32.exe63⤵
- Executes dropped EXE
PID:4888 -
C:\Windows\SysWOW64\Legben32.exeC:\Windows\system32\Legben32.exe64⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\Ljdkll32.exeC:\Windows\system32\Ljdkll32.exe65⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\Mfkkqmiq.exeC:\Windows\system32\Mfkkqmiq.exe66⤵
- Modifies registry class
PID:4864 -
C:\Windows\SysWOW64\Mljmhflh.exeC:\Windows\system32\Mljmhflh.exe67⤵PID:4412
-
C:\Windows\SysWOW64\Mbgeqmjp.exeC:\Windows\system32\Mbgeqmjp.exe68⤵PID:2740
-
C:\Windows\SysWOW64\Mhckcgpj.exeC:\Windows\system32\Mhckcgpj.exe69⤵PID:2880
-
C:\Windows\SysWOW64\Momcpa32.exeC:\Windows\system32\Momcpa32.exe70⤵PID:380
-
C:\Windows\SysWOW64\Nqcejcha.exeC:\Windows\system32\Nqcejcha.exe71⤵PID:3124
-
C:\Windows\SysWOW64\Ofckhj32.exeC:\Windows\system32\Ofckhj32.exe72⤵PID:5016
-
C:\Windows\SysWOW64\Oiccje32.exeC:\Windows\system32\Oiccje32.exe73⤵PID:4836
-
C:\Windows\SysWOW64\Ojcpdg32.exeC:\Windows\system32\Ojcpdg32.exe74⤵PID:3540
-
C:\Windows\SysWOW64\Pplhhm32.exeC:\Windows\system32\Pplhhm32.exe75⤵PID:956
-
C:\Windows\SysWOW64\Pciqnk32.exeC:\Windows\system32\Pciqnk32.exe76⤵PID:2444
-
C:\Windows\SysWOW64\Qbonoghb.exeC:\Windows\system32\Qbonoghb.exe77⤵PID:2032
-
C:\Windows\SysWOW64\Aabkbono.exeC:\Windows\system32\Aabkbono.exe78⤵PID:1064
-
C:\Windows\SysWOW64\Abfdpfaj.exeC:\Windows\system32\Abfdpfaj.exe79⤵PID:716
-
C:\Windows\SysWOW64\Biiobo32.exeC:\Windows\system32\Biiobo32.exe80⤵PID:1684
-
C:\Windows\SysWOW64\Bjhkmbho.exeC:\Windows\system32\Bjhkmbho.exe81⤵PID:5132
-
C:\Windows\SysWOW64\Bfolacnc.exeC:\Windows\system32\Bfolacnc.exe82⤵PID:5172
-
C:\Windows\SysWOW64\Baepolni.exeC:\Windows\system32\Baepolni.exe83⤵
- Drops file in System32 directory
PID:5212 -
C:\Windows\SysWOW64\Bbhildae.exeC:\Windows\system32\Bbhildae.exe84⤵PID:5272
-
C:\Windows\SysWOW64\Ddklbd32.exeC:\Windows\system32\Ddklbd32.exe85⤵PID:5320
-
C:\Windows\SysWOW64\Egkddo32.exeC:\Windows\system32\Egkddo32.exe86⤵PID:5372
-
C:\Windows\SysWOW64\Eaaiahei.exeC:\Windows\system32\Eaaiahei.exe87⤵PID:5420
-
C:\Windows\SysWOW64\Enhifi32.exeC:\Windows\system32\Enhifi32.exe88⤵PID:5464
-
C:\Windows\SysWOW64\Eafbmgad.exeC:\Windows\system32\Eafbmgad.exe89⤵PID:5504
-
C:\Windows\SysWOW64\Ejagaj32.exeC:\Windows\system32\Ejagaj32.exe90⤵PID:5548
-
C:\Windows\SysWOW64\Eqkondfl.exeC:\Windows\system32\Eqkondfl.exe91⤵PID:5604
-
C:\Windows\SysWOW64\Ekqckmfb.exeC:\Windows\system32\Ekqckmfb.exe92⤵PID:5680
-
C:\Windows\SysWOW64\Eajlhg32.exeC:\Windows\system32\Eajlhg32.exe93⤵PID:5728
-
C:\Windows\SysWOW64\Fkcpql32.exeC:\Windows\system32\Fkcpql32.exe94⤵PID:5780
-
C:\Windows\SysWOW64\Fbdnne32.exeC:\Windows\system32\Fbdnne32.exe95⤵
- Drops file in System32 directory
PID:5824 -
C:\Windows\SysWOW64\Fnjocf32.exeC:\Windows\system32\Fnjocf32.exe96⤵PID:5872
-
C:\Windows\SysWOW64\Gjaphgpl.exeC:\Windows\system32\Gjaphgpl.exe97⤵PID:5912
-
C:\Windows\SysWOW64\Gdgdeppb.exeC:\Windows\system32\Gdgdeppb.exe98⤵PID:5972
-
C:\Windows\SysWOW64\Gjficg32.exeC:\Windows\system32\Gjficg32.exe99⤵PID:6016
-
C:\Windows\SysWOW64\Gqpapacd.exeC:\Windows\system32\Gqpapacd.exe100⤵PID:6056
-
C:\Windows\SysWOW64\Gkefmjcj.exeC:\Windows\system32\Gkefmjcj.exe101⤵PID:6100
-
C:\Windows\SysWOW64\Gdnjfojj.exeC:\Windows\system32\Gdnjfojj.exe102⤵PID:5152
-
C:\Windows\SysWOW64\Hbknebqi.exeC:\Windows\system32\Hbknebqi.exe103⤵PID:5360
-
C:\Windows\SysWOW64\Indkpcdk.exeC:\Windows\system32\Indkpcdk.exe104⤵PID:5472
-
C:\Windows\SysWOW64\Inidkb32.exeC:\Windows\system32\Inidkb32.exe105⤵PID:5544
-
C:\Windows\SysWOW64\Ihaidhgf.exeC:\Windows\system32\Ihaidhgf.exe106⤵PID:5688
-
C:\Windows\SysWOW64\Idhiii32.exeC:\Windows\system32\Idhiii32.exe107⤵PID:5752
-
C:\Windows\SysWOW64\Jehfcl32.exeC:\Windows\system32\Jehfcl32.exe108⤵PID:5820
-
C:\Windows\SysWOW64\Jnpjlajn.exeC:\Windows\system32\Jnpjlajn.exe109⤵PID:5908
-
C:\Windows\SysWOW64\Jjgkab32.exeC:\Windows\system32\Jjgkab32.exe110⤵PID:6004
-
C:\Windows\SysWOW64\Jaqcnl32.exeC:\Windows\system32\Jaqcnl32.exe111⤵
- Drops file in System32 directory
PID:6044 -
C:\Windows\SysWOW64\Jhkljfok.exeC:\Windows\system32\Jhkljfok.exe112⤵PID:6132
-
C:\Windows\SysWOW64\Jnedgq32.exeC:\Windows\system32\Jnedgq32.exe113⤵PID:5232
-
C:\Windows\SysWOW64\Kkpnga32.exeC:\Windows\system32\Kkpnga32.exe114⤵PID:5500
-
C:\Windows\SysWOW64\Kajfdk32.exeC:\Windows\system32\Kajfdk32.exe115⤵PID:5652
-
C:\Windows\SysWOW64\Klpjad32.exeC:\Windows\system32\Klpjad32.exe116⤵PID:5840
-
C:\Windows\SysWOW64\Kehojiej.exeC:\Windows\system32\Kehojiej.exe117⤵PID:5984
-
C:\Windows\SysWOW64\Kkegbpca.exeC:\Windows\system32\Kkegbpca.exe118⤵PID:6128
-
C:\Windows\SysWOW64\Logicn32.exeC:\Windows\system32\Logicn32.exe119⤵PID:5444
-
C:\Windows\SysWOW64\Leabphmp.exeC:\Windows\system32\Leabphmp.exe120⤵PID:5792
-
C:\Windows\SysWOW64\Lkqgno32.exeC:\Windows\system32\Lkqgno32.exe121⤵PID:6008
-
C:\Windows\SysWOW64\Lajokiaa.exeC:\Windows\system32\Lajokiaa.exe122⤵PID:632
-
C:\Windows\SysWOW64\Lamlphoo.exeC:\Windows\system32\Lamlphoo.exe123⤵PID:5708
-
C:\Windows\SysWOW64\Mkepineo.exeC:\Windows\system32\Mkepineo.exe124⤵PID:6080
-
C:\Windows\SysWOW64\Mafofggd.exeC:\Windows\system32\Mafofggd.exe125⤵
- Modifies registry class
PID:5812 -
C:\Windows\SysWOW64\Mhpgca32.exeC:\Windows\system32\Mhpgca32.exe126⤵
- Drops file in System32 directory
PID:5384 -
C:\Windows\SysWOW64\Medglemj.exeC:\Windows\system32\Medglemj.exe127⤵PID:6116
-
C:\Windows\SysWOW64\Nomlek32.exeC:\Windows\system32\Nomlek32.exe128⤵PID:6152
-
C:\Windows\SysWOW64\Nkcmjlio.exeC:\Windows\system32\Nkcmjlio.exe129⤵
- Modifies registry class
PID:6196 -
C:\Windows\SysWOW64\Nfiagd32.exeC:\Windows\system32\Nfiagd32.exe130⤵PID:6252
-
C:\Windows\SysWOW64\Ndnnianm.exeC:\Windows\system32\Ndnnianm.exe131⤵PID:6312
-
C:\Windows\SysWOW64\Nconfh32.exeC:\Windows\system32\Nconfh32.exe132⤵PID:6360
-
C:\Windows\SysWOW64\Nbdkhe32.exeC:\Windows\system32\Nbdkhe32.exe133⤵
- Drops file in System32 directory
PID:6404 -
C:\Windows\SysWOW64\Ofbdncaj.exeC:\Windows\system32\Ofbdncaj.exe134⤵PID:6452
-
C:\Windows\SysWOW64\Okolfj32.exeC:\Windows\system32\Okolfj32.exe135⤵PID:6496
-
C:\Windows\SysWOW64\Okailj32.exeC:\Windows\system32\Okailj32.exe136⤵PID:6540
-
C:\Windows\SysWOW64\Omaeem32.exeC:\Windows\system32\Omaeem32.exe137⤵PID:6584
-
C:\Windows\SysWOW64\Odljjo32.exeC:\Windows\system32\Odljjo32.exe138⤵PID:6628
-
C:\Windows\SysWOW64\Ocmjhfjl.exeC:\Windows\system32\Ocmjhfjl.exe139⤵PID:6676
-
C:\Windows\SysWOW64\Pijcpmhc.exeC:\Windows\system32\Pijcpmhc.exe140⤵PID:6728
-
C:\Windows\SysWOW64\Pfncia32.exeC:\Windows\system32\Pfncia32.exe141⤵PID:6776
-
C:\Windows\SysWOW64\Pecpknke.exeC:\Windows\system32\Pecpknke.exe142⤵PID:6824
-
C:\Windows\SysWOW64\Amoknh32.exeC:\Windows\system32\Amoknh32.exe143⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6896 -
C:\Windows\SysWOW64\Bmkjig32.exeC:\Windows\system32\Bmkjig32.exe144⤵PID:6964
-
C:\Windows\SysWOW64\Clbdpc32.exeC:\Windows\system32\Clbdpc32.exe145⤵
- Modifies registry class
PID:7024 -
C:\Windows\SysWOW64\Cpqlfa32.exeC:\Windows\system32\Cpqlfa32.exe146⤵PID:7056
-
C:\Windows\SysWOW64\Cfjeckpj.exeC:\Windows\system32\Cfjeckpj.exe147⤵PID:7108
-
C:\Windows\SysWOW64\Cpcila32.exeC:\Windows\system32\Cpcila32.exe148⤵PID:6148
-
C:\Windows\SysWOW64\Cepadh32.exeC:\Windows\system32\Cepadh32.exe149⤵PID:932
-
C:\Windows\SysWOW64\Dbcbnlcl.exeC:\Windows\system32\Dbcbnlcl.exe150⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6352 -
C:\Windows\SysWOW64\Dinjjf32.exeC:\Windows\system32\Dinjjf32.exe151⤵PID:6388
-
C:\Windows\SysWOW64\Ddcogo32.exeC:\Windows\system32\Ddcogo32.exe152⤵PID:6448
-
C:\Windows\SysWOW64\Dedkogqm.exeC:\Windows\system32\Dedkogqm.exe153⤵PID:6536
-
C:\Windows\SysWOW64\Dpjompqc.exeC:\Windows\system32\Dpjompqc.exe154⤵
- Modifies registry class
PID:6616 -
C:\Windows\SysWOW64\Defheg32.exeC:\Windows\system32\Defheg32.exe155⤵PID:6720
-
C:\Windows\SysWOW64\Deidjf32.exeC:\Windows\system32\Deidjf32.exe156⤵PID:6792
-
C:\Windows\SysWOW64\Dlcmgqdd.exeC:\Windows\system32\Dlcmgqdd.exe157⤵
- Drops file in System32 directory
- Modifies registry class
PID:6840 -
C:\Windows\SysWOW64\Dcmedk32.exeC:\Windows\system32\Dcmedk32.exe158⤵PID:6920
-
C:\Windows\SysWOW64\Egknji32.exeC:\Windows\system32\Egknji32.exe159⤵PID:6980
-
C:\Windows\SysWOW64\Epcbbohh.exeC:\Windows\system32\Epcbbohh.exe160⤵PID:7040
-
C:\Windows\SysWOW64\Eljchpnl.exeC:\Windows\system32\Eljchpnl.exe161⤵PID:7156
-
C:\Windows\SysWOW64\Eincadmf.exeC:\Windows\system32\Eincadmf.exe162⤵PID:5196
-
C:\Windows\SysWOW64\Ephlnn32.exeC:\Windows\system32\Ephlnn32.exe163⤵PID:5252
-
C:\Windows\SysWOW64\Epjhcnbp.exeC:\Windows\system32\Epjhcnbp.exe164⤵PID:6372
-
C:\Windows\SysWOW64\Eegqldqg.exeC:\Windows\system32\Eegqldqg.exe165⤵PID:6508
-
C:\Windows\SysWOW64\Fpmeimpn.exeC:\Windows\system32\Fpmeimpn.exe166⤵PID:6620
-
C:\Windows\SysWOW64\Flcfnn32.exeC:\Windows\system32\Flcfnn32.exe167⤵PID:6808
-
C:\Windows\SysWOW64\Fnglcqio.exeC:\Windows\system32\Fnglcqio.exe168⤵PID:4976
-
C:\Windows\SysWOW64\Ffcpgcfj.exeC:\Windows\system32\Ffcpgcfj.exe169⤵PID:6960
-
C:\Windows\SysWOW64\Glmhdm32.exeC:\Windows\system32\Glmhdm32.exe170⤵PID:7092
-
C:\Windows\SysWOW64\Ggbmafnm.exeC:\Windows\system32\Ggbmafnm.exe171⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6168 -
C:\Windows\SysWOW64\Gfjfhbpb.exeC:\Windows\system32\Gfjfhbpb.exe172⤵PID:6348
-
C:\Windows\SysWOW64\Gqokekph.exeC:\Windows\system32\Gqokekph.exe173⤵PID:6480
-
C:\Windows\SysWOW64\Gjhonp32.exeC:\Windows\system32\Gjhonp32.exe174⤵PID:6784
-
C:\Windows\SysWOW64\Hcbpme32.exeC:\Windows\system32\Hcbpme32.exe175⤵PID:6932
-
C:\Windows\SysWOW64\Hqfqfj32.exeC:\Windows\system32\Hqfqfj32.exe176⤵PID:7144
-
C:\Windows\SysWOW64\Hfcinq32.exeC:\Windows\system32\Hfcinq32.exe177⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6292 -
C:\Windows\SysWOW64\Idkpmgjo.exeC:\Windows\system32\Idkpmgjo.exe178⤵PID:6692
-
C:\Windows\SysWOW64\Imfdaigj.exeC:\Windows\system32\Imfdaigj.exe179⤵PID:7100
-
C:\Windows\SysWOW64\Ifoijonj.exeC:\Windows\system32\Ifoijonj.exe180⤵PID:6380
-
C:\Windows\SysWOW64\Icciccmd.exeC:\Windows\system32\Icciccmd.exe181⤵PID:7004
-
C:\Windows\SysWOW64\Iedbcebd.exeC:\Windows\system32\Iedbcebd.exe182⤵PID:3464
-
C:\Windows\SysWOW64\Jffokn32.exeC:\Windows\system32\Jffokn32.exe183⤵PID:6704
-
C:\Windows\SysWOW64\Jmpgghoo.exeC:\Windows\system32\Jmpgghoo.exe184⤵
- Modifies registry class
PID:5096 -
C:\Windows\SysWOW64\Jcjodbgl.exeC:\Windows\system32\Jcjodbgl.exe185⤵PID:2732
-
C:\Windows\SysWOW64\Jnocakfb.exeC:\Windows\system32\Jnocakfb.exe186⤵PID:5100
-
C:\Windows\SysWOW64\Jclljaei.exeC:\Windows\system32\Jclljaei.exe187⤵PID:6564
-
C:\Windows\SysWOW64\Jjfdfl32.exeC:\Windows\system32\Jjfdfl32.exe188⤵PID:7208
-
C:\Windows\SysWOW64\Japmcfcc.exeC:\Windows\system32\Japmcfcc.exe189⤵PID:7252
-
C:\Windows\SysWOW64\Jndmlj32.exeC:\Windows\system32\Jndmlj32.exe190⤵PID:7292
-
C:\Windows\SysWOW64\Jcaeea32.exeC:\Windows\system32\Jcaeea32.exe191⤵
- Drops file in System32 directory
PID:7336 -
C:\Windows\SysWOW64\Jepbodhg.exeC:\Windows\system32\Jepbodhg.exe192⤵PID:7376
-
C:\Windows\SysWOW64\Kfanflne.exeC:\Windows\system32\Kfanflne.exe193⤵PID:7416
-
C:\Windows\SysWOW64\Kagbdenk.exeC:\Windows\system32\Kagbdenk.exe194⤵PID:7460
-
C:\Windows\SysWOW64\Kfdklllb.exeC:\Windows\system32\Kfdklllb.exe195⤵PID:7508
-
C:\Windows\SysWOW64\Kjdqhjpf.exeC:\Windows\system32\Kjdqhjpf.exe196⤵PID:7552
-
C:\Windows\SysWOW64\Kjfmminc.exeC:\Windows\system32\Kjfmminc.exe197⤵PID:7600
-
C:\Windows\SysWOW64\Lelajb32.exeC:\Windows\system32\Lelajb32.exe198⤵PID:7640
-
C:\Windows\SysWOW64\Lfmnbjcg.exeC:\Windows\system32\Lfmnbjcg.exe199⤵PID:7676
-
C:\Windows\SysWOW64\Lmgfod32.exeC:\Windows\system32\Lmgfod32.exe200⤵PID:7720
-
C:\Windows\SysWOW64\Ldanloba.exeC:\Windows\system32\Ldanloba.exe201⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7764 -
C:\Windows\SysWOW64\Logbigbg.exeC:\Windows\system32\Logbigbg.exe202⤵PID:7816
-
C:\Windows\SysWOW64\Leqkeajd.exeC:\Windows\system32\Leqkeajd.exe203⤵PID:7852
-
C:\Windows\SysWOW64\Lmlpjdgo.exeC:\Windows\system32\Lmlpjdgo.exe204⤵PID:7892
-
C:\Windows\SysWOW64\Ldfhgn32.exeC:\Windows\system32\Ldfhgn32.exe205⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7964 -
C:\Windows\SysWOW64\Mgkjch32.exeC:\Windows\system32\Mgkjch32.exe206⤵PID:8028
-
C:\Windows\SysWOW64\Mmebpbod.exeC:\Windows\system32\Mmebpbod.exe207⤵PID:8072
-
C:\Windows\SysWOW64\Mdokmm32.exeC:\Windows\system32\Mdokmm32.exe208⤵PID:8128
-
C:\Windows\SysWOW64\Mkicjgnn.exeC:\Windows\system32\Mkicjgnn.exe209⤵PID:8172
-
C:\Windows\SysWOW64\Mdagbl32.exeC:\Windows\system32\Mdagbl32.exe210⤵PID:7184
-
C:\Windows\SysWOW64\Meadlo32.exeC:\Windows\system32\Meadlo32.exe211⤵PID:7260
-
C:\Windows\SysWOW64\Ndfanlpi.exeC:\Windows\system32\Ndfanlpi.exe212⤵
- Modifies registry class
PID:7352 -
C:\Windows\SysWOW64\Ndinck32.exeC:\Windows\system32\Ndinck32.exe213⤵PID:7424
-
C:\Windows\SysWOW64\Nonbqd32.exeC:\Windows\system32\Nonbqd32.exe214⤵PID:5968
-
C:\Windows\SysWOW64\Ngifef32.exeC:\Windows\system32\Ngifef32.exe215⤵
- Modifies registry class
PID:4300 -
C:\Windows\SysWOW64\Nglcjfie.exeC:\Windows\system32\Nglcjfie.exe216⤵PID:7544
-
C:\Windows\SysWOW64\Nockkcjg.exeC:\Windows\system32\Nockkcjg.exe217⤵PID:7624
-
C:\Windows\SysWOW64\Ndpcdjho.exeC:\Windows\system32\Ndpcdjho.exe218⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7668 -
C:\Windows\SysWOW64\Oklifdmi.exeC:\Windows\system32\Oklifdmi.exe219⤵PID:7752
-
C:\Windows\SysWOW64\Oakjnnap.exeC:\Windows\system32\Oakjnnap.exe220⤵PID:7836
-
C:\Windows\SysWOW64\Ohdbkh32.exeC:\Windows\system32\Ohdbkh32.exe221⤵PID:7904
-
C:\Windows\SysWOW64\Oookgbpj.exeC:\Windows\system32\Oookgbpj.exe222⤵PID:7948
-
C:\Windows\SysWOW64\Pkhhbbck.exeC:\Windows\system32\Pkhhbbck.exe223⤵PID:8000
-
C:\Windows\SysWOW64\Pfpidk32.exeC:\Windows\system32\Pfpidk32.exe224⤵PID:8084
-
C:\Windows\SysWOW64\Pklamb32.exeC:\Windows\system32\Pklamb32.exe225⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:8160 -
C:\Windows\SysWOW64\Pdeffgff.exeC:\Windows\system32\Pdeffgff.exe226⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7220 -
C:\Windows\SysWOW64\Qdllffpo.exeC:\Windows\system32\Qdllffpo.exe227⤵PID:7404
-
C:\Windows\SysWOW64\Andqol32.exeC:\Windows\system32\Andqol32.exe228⤵PID:5560
-
C:\Windows\SysWOW64\Adnilfnl.exeC:\Windows\system32\Adnilfnl.exe229⤵PID:7504
-
C:\Windows\SysWOW64\Akhaipei.exeC:\Windows\system32\Akhaipei.exe230⤵PID:7580
-
C:\Windows\SysWOW64\Agaoca32.exeC:\Windows\system32\Agaoca32.exe231⤵
- Drops file in System32 directory
PID:2152 -
C:\Windows\SysWOW64\Afboah32.exeC:\Windows\system32\Afboah32.exe232⤵
- Modifies registry class
PID:1272 -
C:\Windows\SysWOW64\Akogio32.exeC:\Windows\system32\Akogio32.exe233⤵PID:7840
-
C:\Windows\SysWOW64\Afdkfh32.exeC:\Windows\system32\Afdkfh32.exe234⤵PID:7932
-
C:\Windows\SysWOW64\Biedhclh.exeC:\Windows\system32\Biedhclh.exe235⤵PID:4988
-
C:\Windows\SysWOW64\Bnbmqjjo.exeC:\Windows\system32\Bnbmqjjo.exe236⤵PID:8012
-
C:\Windows\SysWOW64\Bngfli32.exeC:\Windows\system32\Bngfli32.exe237⤵PID:8136
-
C:\Windows\SysWOW64\Cbihmg32.exeC:\Windows\system32\Cbihmg32.exe238⤵PID:2976
-
C:\Windows\SysWOW64\Chfaenfb.exeC:\Windows\system32\Chfaenfb.exe239⤵PID:6320
-
C:\Windows\SysWOW64\Cblebgfh.exeC:\Windows\system32\Cblebgfh.exe240⤵PID:7448
-
C:\Windows\SysWOW64\Deagoa32.exeC:\Windows\system32\Deagoa32.exe241⤵PID:4004
-
C:\Windows\SysWOW64\Dojlhg32.exeC:\Windows\system32\Dojlhg32.exe242⤵PID:4348