Analysis
-
max time kernel
139s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
b2ff192125b2fc6af2ae615e0b93633786945ce9111902fda29d8fceee2d76d7.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b2ff192125b2fc6af2ae615e0b93633786945ce9111902fda29d8fceee2d76d7.exe
Resource
win10v2004-20240508-en
General
-
Target
b2ff192125b2fc6af2ae615e0b93633786945ce9111902fda29d8fceee2d76d7.exe
-
Size
163KB
-
MD5
266494f4f2aec028356dc423006b27ab
-
SHA1
d5ae20692f73f09dba487f16f7a3f864039f2948
-
SHA256
b2ff192125b2fc6af2ae615e0b93633786945ce9111902fda29d8fceee2d76d7
-
SHA512
ba80dee9f0be060d25f6e7b6264521adb85b7c2ca5f64923ff498cc8ddfe50bb322bb8fac7aa8f7e62068ec9906bb937aa6700c47de95d3596be4b1f2aee73f4
-
SSDEEP
1536:POcPZl86g4DutO8rcdxT1Fqh5VlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:GaZlvgBOecdx18h5VltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Igcoqocb.exeKlfjijgq.exeQfbobf32.exeAobilkcl.exeIjogmdqm.exeJdedak32.exeNqmhbpba.exeKmijbcpl.exeAgglboim.exeGdppbfff.exeLaefdf32.exeBlbknaib.exeJnnpdg32.exeMiomdk32.exeHkjjlhle.exePocfpf32.exeBbdhiojo.exeDikihe32.exeNddkgonp.exeJgakbm32.exeOeaoab32.exeAcokhc32.exeBbnpqk32.exeDlncan32.exeIgedlh32.exeCjaifp32.exeFddqghpd.exeKiidgeki.exeKdqejn32.exeMdehlk32.exeGmcdffmq.exeGgkiol32.exeGfheof32.exeOqkdcn32.exeEdpnfo32.exeNeppokal.exeQfpbmfdf.exeBjicdmmd.exeGdcliikj.exeHkfoeega.exeFolaiqng.exeBldgdago.exeBjcmebie.exeHdkidohn.exeHglaej32.exeGmiclo32.exeHkbmqb32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Igcoqocb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klfjijgq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qfbobf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aobilkcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijogmdqm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdedak32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqmhbpba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kmijbcpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agglboim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gdppbfff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Laefdf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Blbknaib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jnnpdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Miomdk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkjjlhle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pocfpf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bbdhiojo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dikihe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nddkgonp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jgakbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oeaoab32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acokhc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbnpqk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dlncan32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Igedlh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjaifp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fddqghpd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kiidgeki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kdqejn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdehlk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmcdffmq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ggkiol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfheof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oqkdcn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edpnfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Neppokal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qfpbmfdf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjicdmmd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdcliikj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkfoeega.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Folaiqng.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bldgdago.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjcmebie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hdkidohn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hglaej32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gmiclo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkbmqb32.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Lnepih32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lgneampk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lilanioo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lnhmng32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/1812-33-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ljnnch32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Laefdf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lknjmkdo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mnlfigcc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mciobn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mjcgohig.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mdiklqhm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mjeddggd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mamleegg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mdkhapfj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mjhqjg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mpaifalo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mglack32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mjjmog32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mpdelajl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mcbahlip.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nacbfdao.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nceonl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nafokcol.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nddkgonp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nbhkac32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncihikcg.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4796-209-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nnolfdcn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nqmhbpba.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ncldnkae.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nqpego32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ogjmdigk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ondeac32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Obfhba32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pqnaim32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pjffbc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qeemej32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2604-599-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/5304-613-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3284-612-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2916-611-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2816-629-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cddecc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cbgbgj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cdkldb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Docmgjhp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ddpeoafg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dccbbhld.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ehedfo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gbbkaako.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gmoeoidl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hbnjmp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jmknaell.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jplfcpin.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jeklag32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kmijbcpl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kfankifm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Liddbc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Llemdo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ldanqkki.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mdehlk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mgfqmfde.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Melnob32.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Lnepih32.exe UPX C:\Windows\SysWOW64\Lgneampk.exe UPX C:\Windows\SysWOW64\Lilanioo.exe UPX C:\Windows\SysWOW64\Lnhmng32.exe UPX behavioral2/memory/1812-33-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Ljnnch32.exe UPX C:\Windows\SysWOW64\Laefdf32.exe UPX C:\Windows\SysWOW64\Lknjmkdo.exe UPX behavioral2/memory/4456-57-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Mnlfigcc.exe UPX C:\Windows\SysWOW64\Mciobn32.exe UPX behavioral2/memory/2604-72-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/872-80-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Mjcgohig.exe UPX C:\Windows\SysWOW64\Mdiklqhm.exe UPX behavioral2/memory/2916-88-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Mjeddggd.exe UPX behavioral2/memory/3284-97-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Mamleegg.exe UPX C:\Windows\SysWOW64\Mdkhapfj.exe UPX behavioral2/memory/1276-112-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Mjhqjg32.exe UPX behavioral2/memory/3216-121-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Mpaifalo.exe UPX C:\Windows\SysWOW64\Mglack32.exe UPX C:\Windows\SysWOW64\Mjjmog32.exe UPX C:\Windows\SysWOW64\Mpdelajl.exe UPX C:\Windows\SysWOW64\Mcbahlip.exe UPX C:\Windows\SysWOW64\Nacbfdao.exe UPX C:\Windows\SysWOW64\Nceonl32.exe UPX C:\Windows\SysWOW64\Nafokcol.exe UPX C:\Windows\SysWOW64\Nddkgonp.exe UPX C:\Windows\SysWOW64\Nbhkac32.exe UPX C:\Windows\SysWOW64\Ncihikcg.exe UPX behavioral2/memory/4796-209-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Nnolfdcn.exe UPX C:\Windows\SysWOW64\Nqmhbpba.exe UPX C:\Windows\SysWOW64\Ncldnkae.exe UPX C:\Windows\SysWOW64\Nqpego32.exe UPX C:\Windows\SysWOW64\Ogjmdigk.exe UPX C:\Windows\SysWOW64\Ondeac32.exe UPX behavioral2/memory/4956-274-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4156-280-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3572-286-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/916-296-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1556-298-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/612-304-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Obfhba32.exe UPX C:\Windows\SysWOW64\Pqnaim32.exe UPX C:\Windows\SysWOW64\Pjffbc32.exe UPX behavioral2/memory/1608-415-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4776-426-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5004-437-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Qeemej32.exe UPX behavioral2/memory/4564-515-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1628-552-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4456-586-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2604-599-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5304-613-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3284-612-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2916-611-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2816-629-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Cddecc32.exe UPX C:\Windows\SysWOW64\Cbgbgj32.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Lnepih32.exeLgneampk.exeLilanioo.exeLnhmng32.exeLjnnch32.exeLaefdf32.exeLknjmkdo.exeMnlfigcc.exeMciobn32.exeMjcgohig.exeMdiklqhm.exeMjeddggd.exeMamleegg.exeMdkhapfj.exeMjhqjg32.exeMpaifalo.exeMglack32.exeMjjmog32.exeMpdelajl.exeMcbahlip.exeNacbfdao.exeNceonl32.exeNafokcol.exeNddkgonp.exeNbhkac32.exeNcihikcg.exeNnolfdcn.exeNqmhbpba.exeNcldnkae.exeNqpego32.exeOgjmdigk.exeOndeac32.exeOqbamo32.exeOcqnij32.exeOgljjiei.exeOnfbfc32.exeObangb32.exeOdpjcm32.exeOgogoi32.exeOjmcld32.exeObdkma32.exeOqgkhnjf.exeOgaceh32.exeOjopad32.exeObfhba32.exeOdednmpm.exeOgcpjhoq.exeOjalgcnd.exeOqkdcn32.exePcjapi32.exePkaiqf32.exePqnaim32.exePclneicb.exePjffbc32.exePnbbbabh.exePeljol32.exePkfblfab.exePndohaqe.exePcagphom.exePgmcqggf.exePaegjl32.exePeqcjkfp.exePkjlge32.exePnihcq32.exepid process 220 Lnepih32.exe 1628 Lgneampk.exe 1032 Lilanioo.exe 1812 Lnhmng32.exe 1968 Ljnnch32.exe 2608 Laefdf32.exe 4456 Lknjmkdo.exe 1712 Mnlfigcc.exe 2604 Mciobn32.exe 872 Mjcgohig.exe 2916 Mdiklqhm.exe 3284 Mjeddggd.exe 2816 Mamleegg.exe 1276 Mdkhapfj.exe 3216 Mjhqjg32.exe 2984 Mpaifalo.exe 1404 Mglack32.exe 1780 Mjjmog32.exe 2056 Mpdelajl.exe 3596 Mcbahlip.exe 528 Nacbfdao.exe 3064 Nceonl32.exe 2896 Nafokcol.exe 2072 Nddkgonp.exe 4972 Nbhkac32.exe 4796 Ncihikcg.exe 3228 Nnolfdcn.exe 4040 Nqmhbpba.exe 4020 Ncldnkae.exe 3904 Nqpego32.exe 1784 Ogjmdigk.exe 2804 Ondeac32.exe 1080 Oqbamo32.exe 4344 Ocqnij32.exe 4956 Ogljjiei.exe 4156 Onfbfc32.exe 3572 Obangb32.exe 916 Odpjcm32.exe 1556 Ogogoi32.exe 612 Ojmcld32.exe 1484 Obdkma32.exe 3444 Oqgkhnjf.exe 1692 Ogaceh32.exe 5108 Ojopad32.exe 3864 Obfhba32.exe 2548 Odednmpm.exe 1976 Ogcpjhoq.exe 396 Ojalgcnd.exe 4912 Oqkdcn32.exe 372 Pcjapi32.exe 4768 Pkaiqf32.exe 2904 Pqnaim32.exe 1696 Pclneicb.exe 3928 Pjffbc32.exe 1408 Pnbbbabh.exe 2732 Peljol32.exe 1948 Pkfblfab.exe 5048 Pndohaqe.exe 1608 Pcagphom.exe 3692 Pgmcqggf.exe 4776 Paegjl32.exe 5004 Peqcjkfp.exe 2180 Pkjlge32.exe 2112 Pnihcq32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Ggilil32.exeKkhpdcab.exeMajjng32.exeCcnncgmc.exeDfoplpla.exeJqglkmlj.exeKpbmco32.exeDdadpdmn.exeHpjmnjqn.exeIgedlh32.exeMjpbam32.exeDdjejl32.exeBbiado32.exeMfcmmp32.exePekbga32.exeJbhfjljd.exeMnebeogl.exeCioilg32.exeDccbbhld.exeJefbfgig.exeDdpeoafg.exeHihbijhn.exeKpjcdn32.exeDaekdooc.exeFajnfl32.exeFmnkkg32.exePnihcq32.exeCbcilkjg.exeOadfkdgd.exeBkmmaeap.exeQceiaa32.exeAelcfilb.exeDocmgjhp.exeGepmlimi.exeHgjljpkm.exeCjhfpa32.exeCbqlfkmi.exeFddqghpd.exeHcblpdgg.exeEmeoooml.exeLpneegel.exePloknb32.exeDpckjfgg.exeMamleegg.exeOgjmdigk.exeIejcji32.exeAjbmdn32.exeFdnjgmle.exeGdeqhl32.exePjgebf32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Gmcdffmq.exe Ggilil32.exe File opened for modification C:\Windows\SysWOW64\Kbbhqn32.exe Kkhpdcab.exe File opened for modification C:\Windows\SysWOW64\Miaboe32.exe Majjng32.exe File created C:\Windows\SysWOW64\Obnbpa32.dll File created C:\Windows\SysWOW64\Bepdhaek.dll Ccnncgmc.exe File created C:\Windows\SysWOW64\Dinmhkke.exe Dfoplpla.exe File opened for modification C:\Windows\SysWOW64\Jgadgf32.exe Jqglkmlj.exe File created C:\Windows\SysWOW64\Galdglpd.dll File created C:\Windows\SysWOW64\Oghghb32.exe File created C:\Windows\SysWOW64\Bhaomhld.dll Kpbmco32.exe File opened for modification C:\Windows\SysWOW64\Dfoplpla.exe Ddadpdmn.exe File created C:\Windows\SysWOW64\Blqhpg32.dll File created C:\Windows\SysWOW64\Hbceobam.dll File opened for modification C:\Windows\SysWOW64\Blnoga32.exe File created C:\Windows\SysWOW64\Backpf32.dll Hpjmnjqn.exe File created C:\Windows\SysWOW64\Inomhbeq.exe Igedlh32.exe File opened for modification C:\Windows\SysWOW64\Majjng32.exe Mjpbam32.exe File created C:\Windows\SysWOW64\Famkjfqd.dll File opened for modification C:\Windows\SysWOW64\Dopigd32.exe Ddjejl32.exe File opened for modification C:\Windows\SysWOW64\Bkafmd32.exe Bbiado32.exe File created C:\Windows\SysWOW64\Mibijk32.exe Mfcmmp32.exe File created C:\Windows\SysWOW64\Dqklch32.dll Pekbga32.exe File opened for modification C:\Windows\SysWOW64\Jefbfgig.exe Jbhfjljd.exe File created C:\Windows\SysWOW64\Bkjlibkf.dll Mnebeogl.exe File opened for modification C:\Windows\SysWOW64\Ckmehb32.exe Cioilg32.exe File created C:\Windows\SysWOW64\Lpamfo32.dll File created C:\Windows\SysWOW64\Lomqcjie.exe File created C:\Windows\SysWOW64\Bjlfmfbi.dll File created C:\Windows\SysWOW64\Bapolp32.dll Dccbbhld.exe File created C:\Windows\SysWOW64\Jjbedgde.dll Jefbfgig.exe File opened for modification C:\Windows\SysWOW64\Dkjmlk32.exe Ddpeoafg.exe File created C:\Windows\SysWOW64\Ijlbqboa.dll Hihbijhn.exe File created C:\Windows\SysWOW64\Nkbjac32.dll Kpjcdn32.exe File opened for modification C:\Windows\SysWOW64\Dgbdlf32.exe Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Fdijbg32.exe Fajnfl32.exe File created C:\Windows\SysWOW64\Fpmggb32.exe Fmnkkg32.exe File created C:\Windows\SysWOW64\Kjhonjco.dll Pnihcq32.exe File created C:\Windows\SysWOW64\Cafigg32.exe Cbcilkjg.exe File opened for modification C:\Windows\SysWOW64\Olijhmgj.exe Oadfkdgd.exe File created C:\Windows\SysWOW64\Fgllff32.dll Bkmmaeap.exe File created C:\Windows\SysWOW64\Qmmnjfnl.exe Qceiaa32.exe File created C:\Windows\SysWOW64\Aahamf32.dll Aelcfilb.exe File created C:\Windows\SysWOW64\Eocqqdjh.dll Docmgjhp.exe File opened for modification C:\Windows\SysWOW64\Gohaeo32.exe Gepmlimi.exe File created C:\Windows\SysWOW64\Koijai32.dll Hgjljpkm.exe File created C:\Windows\SysWOW64\Bdffhl32.dll Cjhfpa32.exe File created C:\Windows\SysWOW64\Ebnfbcbc.exe File created C:\Windows\SysWOW64\Cilkoi32.dll Cbqlfkmi.exe File opened for modification C:\Windows\SysWOW64\Fgbmccpg.exe Fddqghpd.exe File created C:\Windows\SysWOW64\Njmqnobn.exe File opened for modification C:\Windows\SysWOW64\Hgmgqc32.exe Hcblpdgg.exe File created C:\Windows\SysWOW64\Odalmibl.exe File created C:\Windows\SysWOW64\Dfnbgc32.exe File created C:\Windows\SysWOW64\Eemgplno.exe Emeoooml.exe File created C:\Windows\SysWOW64\Ojobciba.dll Lpneegel.exe File created C:\Windows\SysWOW64\Dfggbllc.dll Ploknb32.exe File created C:\Windows\SysWOW64\Dhjckcgi.exe Dpckjfgg.exe File created C:\Windows\SysWOW64\Njcqqgjb.dll Mamleegg.exe File opened for modification C:\Windows\SysWOW64\Ondeac32.exe Ogjmdigk.exe File created C:\Windows\SysWOW64\Hjakkfbf.dll Iejcji32.exe File created C:\Windows\SysWOW64\Qcanijap.dll Ajbmdn32.exe File created C:\Windows\SysWOW64\Glebhjlg.exe Fdnjgmle.exe File created C:\Windows\SysWOW64\Ldjicq32.dll Gdeqhl32.exe File created C:\Windows\SysWOW64\Pleaoa32.exe Pjgebf32.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 13560 14064 -
Modifies registry class 64 IoCs
Processes:
Gacjadad.exeJdodkebj.exeLpcfkm32.exePjgebf32.exeDbjkkl32.exeEolpmi32.exeHfcicmqp.exeCmlcbbcj.exeGfkbde32.exeKbaipkbi.exeLankbigo.exeGdcliikj.exeJfgdkd32.exeIkndgg32.exeEjlbhh32.exeFdepgkgj.exeOjopad32.exeLikcilhh.exeMhicpg32.exeJnmijq32.exeAqncedbp.exeDckdjomg.exePjhlml32.exeAfmhck32.exePlbmokop.exeEhedfo32.exeFomhdg32.exeGbdgfa32.exeDobfld32.exeFcmnpe32.exeJidklf32.exeOekiqccc.exeKgipcogp.exeFhqcam32.exeHkkhqd32.exeOidofh32.exeMahnhhod.exeHigjaoci.exeFbpnkama.exeGfembo32.exeBapiabak.exePfgogh32.exeMnphmkji.exeIcnpmp32.exeJnifigpa.exeFpbmfn32.exeOgcpjhoq.exePdifoehl.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Enhpaj32.dll" Gacjadad.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jdodkebj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hflheb32.dll" Lpcfkm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebnlkf32.dll" Pjgebf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibodeh32.dll" Dbjkkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bfkegm32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aipoal32.dll" Eolpmi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qegnoi32.dll" Hfcicmqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghilmi32.dll" Cmlcbbcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gfkbde32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kbaipkbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apddkmko.dll" Lankbigo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gdcliikj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jfgdkd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gigmlgok.dll" Ikndgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nlljlela.dll" Ejlbhh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pngfalmm.dll" Fdepgkgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kioghlbd.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojopad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Likcilhh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipmcpl32.dll" Mhicpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mapmipen.dll" Jnmijq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Milcqamo.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aqncedbp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dckdjomg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjhlml32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Afmhck32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Plbmokop.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehedfo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fomhdg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gbdgfa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dobfld32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fcmnpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jidklf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbnnbmfj.dll" Oekiqccc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgipcogp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ejphhm32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fhqcam32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Laffdj32.dll" Hkkhqd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oidofh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Headjohq.dll" Mahnhhod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fajbad32.dll" Higjaoci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oppceehj.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbpnkama.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gfembo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Imbajm32.dll" Bapiabak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pfgogh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mnphmkji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ilmifh32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mgdjapoo.dll" Icnpmp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jnifigpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fpbmfn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ogcpjhoq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfilim32.dll" Pdifoehl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b2ff192125b2fc6af2ae615e0b93633786945ce9111902fda29d8fceee2d76d7.exeLnepih32.exeLgneampk.exeLilanioo.exeLnhmng32.exeLjnnch32.exeLaefdf32.exeLknjmkdo.exeMnlfigcc.exeMciobn32.exeMjcgohig.exeMdiklqhm.exeMjeddggd.exeMamleegg.exeMdkhapfj.exeMjhqjg32.exeMpaifalo.exeMglack32.exeMjjmog32.exeMpdelajl.exeMcbahlip.exeNacbfdao.exedescription pid process target process PID 640 wrote to memory of 220 640 b2ff192125b2fc6af2ae615e0b93633786945ce9111902fda29d8fceee2d76d7.exe Lnepih32.exe PID 640 wrote to memory of 220 640 b2ff192125b2fc6af2ae615e0b93633786945ce9111902fda29d8fceee2d76d7.exe Lnepih32.exe PID 640 wrote to memory of 220 640 b2ff192125b2fc6af2ae615e0b93633786945ce9111902fda29d8fceee2d76d7.exe Lnepih32.exe PID 220 wrote to memory of 1628 220 Lnepih32.exe Lgneampk.exe PID 220 wrote to memory of 1628 220 Lnepih32.exe Lgneampk.exe PID 220 wrote to memory of 1628 220 Lnepih32.exe Lgneampk.exe PID 1628 wrote to memory of 1032 1628 Lgneampk.exe Lilanioo.exe PID 1628 wrote to memory of 1032 1628 Lgneampk.exe Lilanioo.exe PID 1628 wrote to memory of 1032 1628 Lgneampk.exe Lilanioo.exe PID 1032 wrote to memory of 1812 1032 Lilanioo.exe Lnhmng32.exe PID 1032 wrote to memory of 1812 1032 Lilanioo.exe Lnhmng32.exe PID 1032 wrote to memory of 1812 1032 Lilanioo.exe Lnhmng32.exe PID 1812 wrote to memory of 1968 1812 Lnhmng32.exe Ljnnch32.exe PID 1812 wrote to memory of 1968 1812 Lnhmng32.exe Ljnnch32.exe PID 1812 wrote to memory of 1968 1812 Lnhmng32.exe Ljnnch32.exe PID 1968 wrote to memory of 2608 1968 Ljnnch32.exe Laefdf32.exe PID 1968 wrote to memory of 2608 1968 Ljnnch32.exe Laefdf32.exe PID 1968 wrote to memory of 2608 1968 Ljnnch32.exe Laefdf32.exe PID 2608 wrote to memory of 4456 2608 Laefdf32.exe Lknjmkdo.exe PID 2608 wrote to memory of 4456 2608 Laefdf32.exe Lknjmkdo.exe PID 2608 wrote to memory of 4456 2608 Laefdf32.exe Lknjmkdo.exe PID 4456 wrote to memory of 1712 4456 Lknjmkdo.exe Mnlfigcc.exe PID 4456 wrote to memory of 1712 4456 Lknjmkdo.exe Mnlfigcc.exe PID 4456 wrote to memory of 1712 4456 Lknjmkdo.exe Mnlfigcc.exe PID 1712 wrote to memory of 2604 1712 Mnlfigcc.exe Mciobn32.exe PID 1712 wrote to memory of 2604 1712 Mnlfigcc.exe Mciobn32.exe PID 1712 wrote to memory of 2604 1712 Mnlfigcc.exe Mciobn32.exe PID 2604 wrote to memory of 872 2604 Mciobn32.exe Mjcgohig.exe PID 2604 wrote to memory of 872 2604 Mciobn32.exe Mjcgohig.exe PID 2604 wrote to memory of 872 2604 Mciobn32.exe Mjcgohig.exe PID 872 wrote to memory of 2916 872 Mjcgohig.exe Mdiklqhm.exe PID 872 wrote to memory of 2916 872 Mjcgohig.exe Mdiklqhm.exe PID 872 wrote to memory of 2916 872 Mjcgohig.exe Mdiklqhm.exe PID 2916 wrote to memory of 3284 2916 Mdiklqhm.exe Mjeddggd.exe PID 2916 wrote to memory of 3284 2916 Mdiklqhm.exe Mjeddggd.exe PID 2916 wrote to memory of 3284 2916 Mdiklqhm.exe Mjeddggd.exe PID 3284 wrote to memory of 2816 3284 Mjeddggd.exe Mamleegg.exe PID 3284 wrote to memory of 2816 3284 Mjeddggd.exe Mamleegg.exe PID 3284 wrote to memory of 2816 3284 Mjeddggd.exe Mamleegg.exe PID 2816 wrote to memory of 1276 2816 Mamleegg.exe Mdkhapfj.exe PID 2816 wrote to memory of 1276 2816 Mamleegg.exe Mdkhapfj.exe PID 2816 wrote to memory of 1276 2816 Mamleegg.exe Mdkhapfj.exe PID 1276 wrote to memory of 3216 1276 Mdkhapfj.exe Mjhqjg32.exe PID 1276 wrote to memory of 3216 1276 Mdkhapfj.exe Mjhqjg32.exe PID 1276 wrote to memory of 3216 1276 Mdkhapfj.exe Mjhqjg32.exe PID 3216 wrote to memory of 2984 3216 Mjhqjg32.exe Mpaifalo.exe PID 3216 wrote to memory of 2984 3216 Mjhqjg32.exe Mpaifalo.exe PID 3216 wrote to memory of 2984 3216 Mjhqjg32.exe Mpaifalo.exe PID 2984 wrote to memory of 1404 2984 Mpaifalo.exe Mglack32.exe PID 2984 wrote to memory of 1404 2984 Mpaifalo.exe Mglack32.exe PID 2984 wrote to memory of 1404 2984 Mpaifalo.exe Mglack32.exe PID 1404 wrote to memory of 1780 1404 Mglack32.exe Mjjmog32.exe PID 1404 wrote to memory of 1780 1404 Mglack32.exe Mjjmog32.exe PID 1404 wrote to memory of 1780 1404 Mglack32.exe Mjjmog32.exe PID 1780 wrote to memory of 2056 1780 Mjjmog32.exe Mpdelajl.exe PID 1780 wrote to memory of 2056 1780 Mjjmog32.exe Mpdelajl.exe PID 1780 wrote to memory of 2056 1780 Mjjmog32.exe Mpdelajl.exe PID 2056 wrote to memory of 3596 2056 Mpdelajl.exe Mcbahlip.exe PID 2056 wrote to memory of 3596 2056 Mpdelajl.exe Mcbahlip.exe PID 2056 wrote to memory of 3596 2056 Mpdelajl.exe Mcbahlip.exe PID 3596 wrote to memory of 528 3596 Mcbahlip.exe Nacbfdao.exe PID 3596 wrote to memory of 528 3596 Mcbahlip.exe Nacbfdao.exe PID 3596 wrote to memory of 528 3596 Mcbahlip.exe Nacbfdao.exe PID 528 wrote to memory of 3064 528 Nacbfdao.exe Nceonl32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2ff192125b2fc6af2ae615e0b93633786945ce9111902fda29d8fceee2d76d7.exe"C:\Users\Admin\AppData\Local\Temp\b2ff192125b2fc6af2ae615e0b93633786945ce9111902fda29d8fceee2d76d7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\Lnepih32.exeC:\Windows\system32\Lnepih32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\Lgneampk.exeC:\Windows\system32\Lgneampk.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Lilanioo.exeC:\Windows\system32\Lilanioo.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\Lnhmng32.exeC:\Windows\system32\Lnhmng32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\Ljnnch32.exeC:\Windows\system32\Ljnnch32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\Laefdf32.exeC:\Windows\system32\Laefdf32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\Mnlfigcc.exeC:\Windows\system32\Mnlfigcc.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\Mciobn32.exeC:\Windows\system32\Mciobn32.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\Mjcgohig.exeC:\Windows\system32\Mjcgohig.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\Mdiklqhm.exeC:\Windows\system32\Mdiklqhm.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\Mjeddggd.exeC:\Windows\system32\Mjeddggd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\Mamleegg.exeC:\Windows\system32\Mamleegg.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Mdkhapfj.exeC:\Windows\system32\Mdkhapfj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\Mjhqjg32.exeC:\Windows\system32\Mjhqjg32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\Mpaifalo.exeC:\Windows\system32\Mpaifalo.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\Mglack32.exeC:\Windows\system32\Mglack32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\Mjjmog32.exeC:\Windows\system32\Mjjmog32.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\Mpdelajl.exeC:\Windows\system32\Mpdelajl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Mcbahlip.exeC:\Windows\system32\Mcbahlip.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\Nacbfdao.exeC:\Windows\system32\Nacbfdao.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe23⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\Nafokcol.exeC:\Windows\system32\Nafokcol.exe24⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe25⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe26⤵
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe27⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe28⤵
- Executes dropped EXE
PID:3228 -
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4040 -
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe30⤵
- Executes dropped EXE
PID:4020 -
C:\Windows\SysWOW64\Nqpego32.exeC:\Windows\system32\Nqpego32.exe31⤵
- Executes dropped EXE
PID:3904 -
C:\Windows\SysWOW64\Ogjmdigk.exeC:\Windows\system32\Ogjmdigk.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1784 -
C:\Windows\SysWOW64\Ondeac32.exeC:\Windows\system32\Ondeac32.exe33⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\Oqbamo32.exeC:\Windows\system32\Oqbamo32.exe34⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\Ocqnij32.exeC:\Windows\system32\Ocqnij32.exe35⤵
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\Ogljjiei.exeC:\Windows\system32\Ogljjiei.exe36⤵
- Executes dropped EXE
PID:4956 -
C:\Windows\SysWOW64\Onfbfc32.exeC:\Windows\system32\Onfbfc32.exe37⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\Obangb32.exeC:\Windows\system32\Obangb32.exe38⤵
- Executes dropped EXE
PID:3572 -
C:\Windows\SysWOW64\Odpjcm32.exeC:\Windows\system32\Odpjcm32.exe39⤵
- Executes dropped EXE
PID:916 -
C:\Windows\SysWOW64\Ogogoi32.exeC:\Windows\system32\Ogogoi32.exe40⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\Ojmcld32.exeC:\Windows\system32\Ojmcld32.exe41⤵
- Executes dropped EXE
PID:612 -
C:\Windows\SysWOW64\Obdkma32.exeC:\Windows\system32\Obdkma32.exe42⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\Oqgkhnjf.exeC:\Windows\system32\Oqgkhnjf.exe43⤵
- Executes dropped EXE
PID:3444 -
C:\Windows\SysWOW64\Ogaceh32.exeC:\Windows\system32\Ogaceh32.exe44⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\Ojopad32.exeC:\Windows\system32\Ojopad32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:5108 -
C:\Windows\SysWOW64\Obfhba32.exeC:\Windows\system32\Obfhba32.exe46⤵
- Executes dropped EXE
PID:3864 -
C:\Windows\SysWOW64\Odednmpm.exeC:\Windows\system32\Odednmpm.exe47⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\Ogcpjhoq.exeC:\Windows\system32\Ogcpjhoq.exe48⤵
- Executes dropped EXE
- Modifies registry class
PID:1976 -
C:\Windows\SysWOW64\Ojalgcnd.exeC:\Windows\system32\Ojalgcnd.exe49⤵
- Executes dropped EXE
PID:396 -
C:\Windows\SysWOW64\Oqkdcn32.exeC:\Windows\system32\Oqkdcn32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:4912 -
C:\Windows\SysWOW64\Pcjapi32.exeC:\Windows\system32\Pcjapi32.exe51⤵
- Executes dropped EXE
PID:372 -
C:\Windows\SysWOW64\Pkaiqf32.exeC:\Windows\system32\Pkaiqf32.exe52⤵
- Executes dropped EXE
PID:4768 -
C:\Windows\SysWOW64\Pqnaim32.exeC:\Windows\system32\Pqnaim32.exe53⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\SysWOW64\Pclneicb.exeC:\Windows\system32\Pclneicb.exe54⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\Pjffbc32.exeC:\Windows\system32\Pjffbc32.exe55⤵
- Executes dropped EXE
PID:3928 -
C:\Windows\SysWOW64\Pnbbbabh.exeC:\Windows\system32\Pnbbbabh.exe56⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\Peljol32.exeC:\Windows\system32\Peljol32.exe57⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\Pkfblfab.exeC:\Windows\system32\Pkfblfab.exe58⤵
- Executes dropped EXE
PID:1948 -
C:\Windows\SysWOW64\Pndohaqe.exeC:\Windows\system32\Pndohaqe.exe59⤵
- Executes dropped EXE
PID:5048 -
C:\Windows\SysWOW64\Pcagphom.exeC:\Windows\system32\Pcagphom.exe60⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\Pgmcqggf.exeC:\Windows\system32\Pgmcqggf.exe61⤵
- Executes dropped EXE
PID:3692 -
C:\Windows\SysWOW64\Paegjl32.exeC:\Windows\system32\Paegjl32.exe62⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\SysWOW64\Peqcjkfp.exeC:\Windows\system32\Peqcjkfp.exe63⤵
- Executes dropped EXE
PID:5004 -
C:\Windows\SysWOW64\Pkjlge32.exeC:\Windows\system32\Pkjlge32.exe64⤵
- Executes dropped EXE
PID:2180 -
C:\Windows\SysWOW64\Pnihcq32.exeC:\Windows\system32\Pnihcq32.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2112 -
C:\Windows\SysWOW64\Pagdol32.exeC:\Windows\system32\Pagdol32.exe66⤵PID:4748
-
C:\Windows\SysWOW64\Qecppkdm.exeC:\Windows\system32\Qecppkdm.exe67⤵PID:3464
-
C:\Windows\SysWOW64\Qgallfcq.exeC:\Windows\system32\Qgallfcq.exe68⤵PID:4724
-
C:\Windows\SysWOW64\Qjpiha32.exeC:\Windows\system32\Qjpiha32.exe69⤵PID:4508
-
C:\Windows\SysWOW64\Qeemej32.exeC:\Windows\system32\Qeemej32.exe70⤵PID:2928
-
C:\Windows\SysWOW64\Qjbena32.exeC:\Windows\system32\Qjbena32.exe71⤵PID:1040
-
C:\Windows\SysWOW64\Qalnjkgo.exeC:\Windows\system32\Qalnjkgo.exe72⤵PID:4080
-
C:\Windows\SysWOW64\Acjjfggb.exeC:\Windows\system32\Acjjfggb.exe73⤵PID:2348
-
C:\Windows\SysWOW64\Ajdbcano.exeC:\Windows\system32\Ajdbcano.exe74⤵PID:2536
-
C:\Windows\SysWOW64\Aanjpk32.exeC:\Windows\system32\Aanjpk32.exe75⤵PID:944
-
C:\Windows\SysWOW64\Aejfpjne.exeC:\Windows\system32\Aejfpjne.exe76⤵PID:4680
-
C:\Windows\SysWOW64\Aldomc32.exeC:\Windows\system32\Aldomc32.exe77⤵PID:4564
-
C:\Windows\SysWOW64\Anbkio32.exeC:\Windows\system32\Anbkio32.exe78⤵PID:3536
-
C:\Windows\SysWOW64\Abngjnmo.exeC:\Windows\system32\Abngjnmo.exe79⤵PID:656
-
C:\Windows\SysWOW64\Aelcfilb.exeC:\Windows\system32\Aelcfilb.exe80⤵
- Drops file in System32 directory
PID:3780 -
C:\Windows\SysWOW64\Ahkobekf.exeC:\Windows\system32\Ahkobekf.exe81⤵PID:4036
-
C:\Windows\SysWOW64\Andgoobc.exeC:\Windows\system32\Andgoobc.exe82⤵PID:4120
-
C:\Windows\SysWOW64\Aacckjaf.exeC:\Windows\system32\Aacckjaf.exe83⤵PID:3468
-
C:\Windows\SysWOW64\Adapgfqj.exeC:\Windows\system32\Adapgfqj.exe84⤵PID:3336
-
C:\Windows\SysWOW64\Alhhhcal.exeC:\Windows\system32\Alhhhcal.exe85⤵PID:1792
-
C:\Windows\SysWOW64\Abbpem32.exeC:\Windows\system32\Abbpem32.exe86⤵PID:1652
-
C:\Windows\SysWOW64\Aaepqjpd.exeC:\Windows\system32\Aaepqjpd.exe87⤵PID:4952
-
C:\Windows\SysWOW64\Adcmmeog.exeC:\Windows\system32\Adcmmeog.exe88⤵PID:5132
-
C:\Windows\SysWOW64\Aniajnnn.exeC:\Windows\system32\Aniajnnn.exe89⤵PID:5180
-
C:\Windows\SysWOW64\Bahmfj32.exeC:\Windows\system32\Bahmfj32.exe90⤵PID:5224
-
C:\Windows\SysWOW64\Bdfibe32.exeC:\Windows\system32\Bdfibe32.exe91⤵PID:5264
-
C:\Windows\SysWOW64\Bhaebcen.exeC:\Windows\system32\Bhaebcen.exe92⤵PID:5304
-
C:\Windows\SysWOW64\Bajjli32.exeC:\Windows\system32\Bajjli32.exe93⤵PID:5352
-
C:\Windows\SysWOW64\Beeflhdh.exeC:\Windows\system32\Beeflhdh.exe94⤵PID:5384
-
C:\Windows\SysWOW64\Bdhfhe32.exeC:\Windows\system32\Bdhfhe32.exe95⤵PID:5424
-
C:\Windows\SysWOW64\Bjbndobo.exeC:\Windows\system32\Bjbndobo.exe96⤵PID:5472
-
C:\Windows\SysWOW64\Bnnjen32.exeC:\Windows\system32\Bnnjen32.exe97⤵PID:5516
-
C:\Windows\SysWOW64\Balfaiil.exeC:\Windows\system32\Balfaiil.exe98⤵PID:5560
-
C:\Windows\SysWOW64\Behbag32.exeC:\Windows\system32\Behbag32.exe99⤵PID:5612
-
C:\Windows\SysWOW64\Bdkcmdhp.exeC:\Windows\system32\Bdkcmdhp.exe100⤵PID:5648
-
C:\Windows\SysWOW64\Blbknaib.exeC:\Windows\system32\Blbknaib.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5704 -
C:\Windows\SysWOW64\Bjdkjo32.exeC:\Windows\system32\Bjdkjo32.exe102⤵PID:5748
-
C:\Windows\SysWOW64\Bdmpcdfm.exeC:\Windows\system32\Bdmpcdfm.exe103⤵PID:5812
-
C:\Windows\SysWOW64\Bldgdago.exeC:\Windows\system32\Bldgdago.exe104⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5864 -
C:\Windows\SysWOW64\Bobcpmfc.exeC:\Windows\system32\Bobcpmfc.exe105⤵PID:5920
-
C:\Windows\SysWOW64\Bbnpqk32.exeC:\Windows\system32\Bbnpqk32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5956 -
C:\Windows\SysWOW64\Baaplhef.exeC:\Windows\system32\Baaplhef.exe107⤵PID:6008
-
C:\Windows\SysWOW64\Bhkhibmc.exeC:\Windows\system32\Bhkhibmc.exe108⤵PID:6084
-
C:\Windows\SysWOW64\Bkidenlg.exeC:\Windows\system32\Bkidenlg.exe109⤵PID:3180
-
C:\Windows\SysWOW64\Boepel32.exeC:\Windows\system32\Boepel32.exe110⤵PID:2988
-
C:\Windows\SysWOW64\Cbqlfkmi.exeC:\Windows\system32\Cbqlfkmi.exe111⤵
- Drops file in System32 directory
PID:5260 -
C:\Windows\SysWOW64\Ceoibflm.exeC:\Windows\system32\Ceoibflm.exe112⤵PID:5316
-
C:\Windows\SysWOW64\Chmeobkq.exeC:\Windows\system32\Chmeobkq.exe113⤵PID:5368
-
C:\Windows\SysWOW64\Cliaoq32.exeC:\Windows\system32\Cliaoq32.exe114⤵PID:5432
-
C:\Windows\SysWOW64\Cogmkl32.exeC:\Windows\system32\Cogmkl32.exe115⤵PID:5524
-
C:\Windows\SysWOW64\Cbcilkjg.exeC:\Windows\system32\Cbcilkjg.exe116⤵
- Drops file in System32 directory
PID:5588 -
C:\Windows\SysWOW64\Cafigg32.exeC:\Windows\system32\Cafigg32.exe117⤵PID:5688
-
C:\Windows\SysWOW64\Cddecc32.exeC:\Windows\system32\Cddecc32.exe118⤵PID:5788
-
C:\Windows\SysWOW64\Cknnpm32.exeC:\Windows\system32\Cknnpm32.exe119⤵PID:5912
-
C:\Windows\SysWOW64\Cojjqlpk.exeC:\Windows\system32\Cojjqlpk.exe120⤵PID:5980
-
C:\Windows\SysWOW64\Cbefaj32.exeC:\Windows\system32\Cbefaj32.exe121⤵PID:6072
-
C:\Windows\SysWOW64\Cahfmgoo.exeC:\Windows\system32\Cahfmgoo.exe122⤵PID:4184
-
C:\Windows\SysWOW64\Cdfbibnb.exeC:\Windows\system32\Cdfbibnb.exe123⤵PID:5272
-
C:\Windows\SysWOW64\Chbnia32.exeC:\Windows\system32\Chbnia32.exe124⤵PID:5392
-
C:\Windows\SysWOW64\Colffknh.exeC:\Windows\system32\Colffknh.exe125⤵PID:5492
-
C:\Windows\SysWOW64\Cbgbgj32.exeC:\Windows\system32\Cbgbgj32.exe126⤵PID:5644
-
C:\Windows\SysWOW64\Cdiooblp.exeC:\Windows\system32\Cdiooblp.exe127⤵PID:5820
-
C:\Windows\SysWOW64\Conclk32.exeC:\Windows\system32\Conclk32.exe128⤵PID:5968
-
C:\Windows\SysWOW64\Camphf32.exeC:\Windows\system32\Camphf32.exe129⤵PID:5188
-
C:\Windows\SysWOW64\Cdkldb32.exeC:\Windows\system32\Cdkldb32.exe130⤵PID:5336
-
C:\Windows\SysWOW64\Doqpak32.exeC:\Windows\system32\Doqpak32.exe131⤵PID:5576
-
C:\Windows\SysWOW64\Daolnf32.exeC:\Windows\system32\Daolnf32.exe132⤵PID:5852
-
C:\Windows\SysWOW64\Ddmhja32.exeC:\Windows\system32\Ddmhja32.exe133⤵PID:5116
-
C:\Windows\SysWOW64\Docmgjhp.exeC:\Windows\system32\Docmgjhp.exe134⤵
- Drops file in System32 directory
PID:5444 -
C:\Windows\SysWOW64\Ddpeoafg.exeC:\Windows\system32\Ddpeoafg.exe135⤵
- Drops file in System32 directory
PID:5756 -
C:\Windows\SysWOW64\Dkjmlk32.exeC:\Windows\system32\Dkjmlk32.exe136⤵PID:5252
-
C:\Windows\SysWOW64\Deoaid32.exeC:\Windows\system32\Deoaid32.exe137⤵PID:5928
-
C:\Windows\SysWOW64\Dlijfneg.exeC:\Windows\system32\Dlijfneg.exe138⤵PID:5636
-
C:\Windows\SysWOW64\Dccbbhld.exeC:\Windows\system32\Dccbbhld.exe139⤵
- Drops file in System32 directory
PID:5176 -
C:\Windows\SysWOW64\Dhpjkojk.exeC:\Windows\system32\Dhpjkojk.exe140⤵PID:6160
-
C:\Windows\SysWOW64\Dllfkn32.exeC:\Windows\system32\Dllfkn32.exe141⤵PID:6204
-
C:\Windows\SysWOW64\Dkoggkjo.exeC:\Windows\system32\Dkoggkjo.exe142⤵PID:6240
-
C:\Windows\SysWOW64\Dceohhja.exeC:\Windows\system32\Dceohhja.exe143⤵PID:6280
-
C:\Windows\SysWOW64\Dahode32.exeC:\Windows\system32\Dahode32.exe144⤵PID:6320
-
C:\Windows\SysWOW64\Ddgkpp32.exeC:\Windows\system32\Ddgkpp32.exe145⤵PID:6364
-
C:\Windows\SysWOW64\Dlncan32.exeC:\Windows\system32\Dlncan32.exe146⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6416 -
C:\Windows\SysWOW64\Eolpmi32.exeC:\Windows\system32\Eolpmi32.exe147⤵
- Modifies registry class
PID:6460 -
C:\Windows\SysWOW64\Echknh32.exeC:\Windows\system32\Echknh32.exe148⤵PID:6492
-
C:\Windows\SysWOW64\Eefhjc32.exeC:\Windows\system32\Eefhjc32.exe149⤵PID:6544
-
C:\Windows\SysWOW64\Ehedfo32.exeC:\Windows\system32\Ehedfo32.exe150⤵
- Modifies registry class
PID:6592 -
C:\Windows\SysWOW64\Ekcpbj32.exeC:\Windows\system32\Ekcpbj32.exe151⤵PID:6632
-
C:\Windows\SysWOW64\Eoolbinc.exeC:\Windows\system32\Eoolbinc.exe152⤵PID:6672
-
C:\Windows\SysWOW64\Ecjhcg32.exeC:\Windows\system32\Ecjhcg32.exe153⤵PID:6712
-
C:\Windows\SysWOW64\Eeidoc32.exeC:\Windows\system32\Eeidoc32.exe154⤵PID:6756
-
C:\Windows\SysWOW64\Edkdkplj.exeC:\Windows\system32\Edkdkplj.exe155⤵PID:6800
-
C:\Windows\SysWOW64\Ekemhj32.exeC:\Windows\system32\Ekemhj32.exe156⤵PID:6840
-
C:\Windows\SysWOW64\Eoaihhlp.exeC:\Windows\system32\Eoaihhlp.exe157⤵PID:6880
-
C:\Windows\SysWOW64\Eapedd32.exeC:\Windows\system32\Eapedd32.exe158⤵PID:6920
-
C:\Windows\SysWOW64\Eekaebcm.exeC:\Windows\system32\Eekaebcm.exe159⤵PID:6956
-
C:\Windows\SysWOW64\Eleiam32.exeC:\Windows\system32\Eleiam32.exe160⤵PID:7004
-
C:\Windows\SysWOW64\Ekhjmiad.exeC:\Windows\system32\Ekhjmiad.exe161⤵PID:7036
-
C:\Windows\SysWOW64\Ecoangbg.exeC:\Windows\system32\Ecoangbg.exe162⤵PID:7104
-
C:\Windows\SysWOW64\Eemnjbaj.exeC:\Windows\system32\Eemnjbaj.exe163⤵PID:7164
-
C:\Windows\SysWOW64\Edpnfo32.exeC:\Windows\system32\Edpnfo32.exe164⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6196 -
C:\Windows\SysWOW64\Elgfgl32.exeC:\Windows\system32\Elgfgl32.exe165⤵PID:6272
-
C:\Windows\SysWOW64\Ekjfcipa.exeC:\Windows\system32\Ekjfcipa.exe166⤵PID:6360
-
C:\Windows\SysWOW64\Ecandfpd.exeC:\Windows\system32\Ecandfpd.exe167⤵PID:6424
-
C:\Windows\SysWOW64\Eepjpb32.exeC:\Windows\system32\Eepjpb32.exe168⤵PID:6476
-
C:\Windows\SysWOW64\Ehnglm32.exeC:\Windows\system32\Ehnglm32.exe169⤵PID:6536
-
C:\Windows\SysWOW64\Fohoigfh.exeC:\Windows\system32\Fohoigfh.exe170⤵PID:6620
-
C:\Windows\SysWOW64\Febgea32.exeC:\Windows\system32\Febgea32.exe171⤵PID:6668
-
C:\Windows\SysWOW64\Fhqcam32.exeC:\Windows\system32\Fhqcam32.exe172⤵
- Modifies registry class
PID:6736 -
C:\Windows\SysWOW64\Fkopnh32.exeC:\Windows\system32\Fkopnh32.exe173⤵PID:6808
-
C:\Windows\SysWOW64\Fojlngce.exeC:\Windows\system32\Fojlngce.exe174⤵PID:6868
-
C:\Windows\SysWOW64\Faihkbci.exeC:\Windows\system32\Faihkbci.exe175⤵PID:6944
-
C:\Windows\SysWOW64\Fdgdgnbm.exeC:\Windows\system32\Fdgdgnbm.exe176⤵PID:7000
-
C:\Windows\SysWOW64\Flnlhk32.exeC:\Windows\system32\Flnlhk32.exe177⤵PID:7092
-
C:\Windows\SysWOW64\Fomhdg32.exeC:\Windows\system32\Fomhdg32.exe178⤵
- Modifies registry class
PID:6148 -
C:\Windows\SysWOW64\Fchddejl.exeC:\Windows\system32\Fchddejl.exe179⤵PID:6268
-
C:\Windows\SysWOW64\Ffgqqaip.exeC:\Windows\system32\Ffgqqaip.exe180⤵PID:6432
-
C:\Windows\SysWOW64\Fdialn32.exeC:\Windows\system32\Fdialn32.exe181⤵PID:6540
-
C:\Windows\SysWOW64\Flqimk32.exeC:\Windows\system32\Flqimk32.exe182⤵PID:6656
-
C:\Windows\SysWOW64\Fooeif32.exeC:\Windows\system32\Fooeif32.exe183⤵PID:6828
-
C:\Windows\SysWOW64\Fbnafb32.exeC:\Windows\system32\Fbnafb32.exe184⤵PID:6876
-
C:\Windows\SysWOW64\Fdlnbm32.exeC:\Windows\system32\Fdlnbm32.exe185⤵PID:6996
-
C:\Windows\SysWOW64\Flceckoj.exeC:\Windows\system32\Flceckoj.exe186⤵PID:7144
-
C:\Windows\SysWOW64\Fkffog32.exeC:\Windows\system32\Fkffog32.exe187⤵PID:6376
-
C:\Windows\SysWOW64\Fcmnpe32.exeC:\Windows\system32\Fcmnpe32.exe188⤵
- Modifies registry class
PID:6600 -
C:\Windows\SysWOW64\Fbpnkama.exeC:\Windows\system32\Fbpnkama.exe189⤵
- Modifies registry class
PID:6708 -
C:\Windows\SysWOW64\Fdnjgmle.exeC:\Windows\system32\Fdnjgmle.exe190⤵
- Drops file in System32 directory
PID:6900 -
C:\Windows\SysWOW64\Glebhjlg.exeC:\Windows\system32\Glebhjlg.exe191⤵PID:7084
-
C:\Windows\SysWOW64\Gododflk.exeC:\Windows\system32\Gododflk.exe192⤵PID:6408
-
C:\Windows\SysWOW64\Gbbkaako.exeC:\Windows\system32\Gbbkaako.exe193⤵PID:6720
-
C:\Windows\SysWOW64\Gdqgmmjb.exeC:\Windows\system32\Gdqgmmjb.exe194⤵PID:7064
-
C:\Windows\SysWOW64\Ghlcnk32.exeC:\Windows\system32\Ghlcnk32.exe195⤵PID:6724
-
C:\Windows\SysWOW64\Gkkojgao.exeC:\Windows\system32\Gkkojgao.exe196⤵PID:6356
-
C:\Windows\SysWOW64\Gofkje32.exeC:\Windows\system32\Gofkje32.exe197⤵PID:6968
-
C:\Windows\SysWOW64\Gbdgfa32.exeC:\Windows\system32\Gbdgfa32.exe198⤵
- Modifies registry class
PID:5608 -
C:\Windows\SysWOW64\Gdcdbl32.exeC:\Windows\system32\Gdcdbl32.exe199⤵PID:7044
-
C:\Windows\SysWOW64\Ghopckpi.exeC:\Windows\system32\Ghopckpi.exe200⤵PID:5300
-
C:\Windows\SysWOW64\Gohhpe32.exeC:\Windows\system32\Gohhpe32.exe201⤵PID:7176
-
C:\Windows\SysWOW64\Gcddpdpo.exeC:\Windows\system32\Gcddpdpo.exe202⤵PID:7220
-
C:\Windows\SysWOW64\Gbgdlq32.exeC:\Windows\system32\Gbgdlq32.exe203⤵PID:7268
-
C:\Windows\SysWOW64\Gdeqhl32.exeC:\Windows\system32\Gdeqhl32.exe204⤵
- Drops file in System32 directory
PID:7308 -
C:\Windows\SysWOW64\Ghaliknf.exeC:\Windows\system32\Ghaliknf.exe205⤵PID:7360
-
C:\Windows\SysWOW64\Gkoiefmj.exeC:\Windows\system32\Gkoiefmj.exe206⤵PID:7400
-
C:\Windows\SysWOW64\Gcfqfc32.exeC:\Windows\system32\Gcfqfc32.exe207⤵PID:7468
-
C:\Windows\SysWOW64\Gfembo32.exeC:\Windows\system32\Gfembo32.exe208⤵
- Modifies registry class
PID:7508 -
C:\Windows\SysWOW64\Gicinj32.exeC:\Windows\system32\Gicinj32.exe209⤵PID:7552
-
C:\Windows\SysWOW64\Gmoeoidl.exeC:\Windows\system32\Gmoeoidl.exe210⤵PID:7588
-
C:\Windows\SysWOW64\Gcimkc32.exeC:\Windows\system32\Gcimkc32.exe211⤵PID:7624
-
C:\Windows\SysWOW64\Gblngpbd.exeC:\Windows\system32\Gblngpbd.exe212⤵PID:7660
-
C:\Windows\SysWOW64\Gdjjckag.exeC:\Windows\system32\Gdjjckag.exe213⤵PID:7696
-
C:\Windows\SysWOW64\Hmabdibj.exeC:\Windows\system32\Hmabdibj.exe214⤵PID:7732
-
C:\Windows\SysWOW64\Hkdbpe32.exeC:\Windows\system32\Hkdbpe32.exe215⤵PID:7768
-
C:\Windows\SysWOW64\Hopnqdan.exeC:\Windows\system32\Hopnqdan.exe216⤵PID:7804
-
C:\Windows\SysWOW64\Hbnjmp32.exeC:\Windows\system32\Hbnjmp32.exe217⤵PID:7844
-
C:\Windows\SysWOW64\Helfik32.exeC:\Windows\system32\Helfik32.exe218⤵PID:7884
-
C:\Windows\SysWOW64\Hihbijhn.exeC:\Windows\system32\Hihbijhn.exe219⤵
- Drops file in System32 directory
PID:7920 -
C:\Windows\SysWOW64\Hkfoeega.exeC:\Windows\system32\Hkfoeega.exe220⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:7964 -
C:\Windows\SysWOW64\Hcmgfbhd.exeC:\Windows\system32\Hcmgfbhd.exe221⤵PID:7996
-
C:\Windows\SysWOW64\Hflcbngh.exeC:\Windows\system32\Hflcbngh.exe222⤵PID:8040
-
C:\Windows\SysWOW64\Heocnk32.exeC:\Windows\system32\Heocnk32.exe223⤵PID:8072
-
C:\Windows\SysWOW64\Hijooifk.exeC:\Windows\system32\Hijooifk.exe224⤵PID:8116
-
C:\Windows\SysWOW64\Hkikkeeo.exeC:\Windows\system32\Hkikkeeo.exe225⤵PID:8156
-
C:\Windows\SysWOW64\Hcpclbfa.exeC:\Windows\system32\Hcpclbfa.exe226⤵PID:3744
-
C:\Windows\SysWOW64\Hbbdholl.exeC:\Windows\system32\Hbbdholl.exe227⤵PID:7260
-
C:\Windows\SysWOW64\Heapdjlp.exeC:\Windows\system32\Heapdjlp.exe228⤵PID:7292
-
C:\Windows\SysWOW64\Himldi32.exeC:\Windows\system32\Himldi32.exe229⤵PID:7412
-
C:\Windows\SysWOW64\Hkkhqd32.exeC:\Windows\system32\Hkkhqd32.exe230⤵
- Modifies registry class
PID:7492 -
C:\Windows\SysWOW64\Hofdacke.exeC:\Windows\system32\Hofdacke.exe231⤵PID:7544
-
C:\Windows\SysWOW64\Hcbpab32.exeC:\Windows\system32\Hcbpab32.exe232⤵PID:7572
-
C:\Windows\SysWOW64\Hfqlnm32.exeC:\Windows\system32\Hfqlnm32.exe233⤵PID:7632
-
C:\Windows\SysWOW64\Hecmijim.exeC:\Windows\system32\Hecmijim.exe234⤵PID:7688
-
C:\Windows\SysWOW64\Hkmefd32.exeC:\Windows\system32\Hkmefd32.exe235⤵PID:7760
-
C:\Windows\SysWOW64\Hoiafcic.exeC:\Windows\system32\Hoiafcic.exe236⤵PID:7832
-
C:\Windows\SysWOW64\Hcdmga32.exeC:\Windows\system32\Hcdmga32.exe237⤵PID:7916
-
C:\Windows\SysWOW64\Hfcicmqp.exeC:\Windows\system32\Hfcicmqp.exe238⤵
- Modifies registry class
PID:7952 -
C:\Windows\SysWOW64\Iiaephpc.exeC:\Windows\system32\Iiaephpc.exe239⤵PID:8032
-
C:\Windows\SysWOW64\Ikpaldog.exeC:\Windows\system32\Ikpaldog.exe240⤵PID:8104
-
C:\Windows\SysWOW64\Icgjmapi.exeC:\Windows\system32\Icgjmapi.exe241⤵PID:8180
-
C:\Windows\SysWOW64\Ifefimom.exeC:\Windows\system32\Ifefimom.exe242⤵PID:7216