Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exe
Resource
win10v2004-20240508-en
General
-
Target
ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exe
-
Size
163KB
-
MD5
39ff46b7ffb69c44e3d56dd2a1984e3d
-
SHA1
f27c7274e095507ebc7e7fa8f5514c4e3102dbb9
-
SHA256
ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5
-
SHA512
5516bc2af3adcbc9718835b7dccb555d3eb4e72a05047cb91bba610d4cb936760bf14c4221c7b3b6fe03bd35106a937d278c19df5b9c6a00d034407b55d15328
-
SSDEEP
3072:Pz+2/349CT69/cnUEPsltOrWKDBr+yJb:Pq2/u9/cvsLOf
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Dliijipn.exeEnfenplo.exeGjdhbc32.exeNhaikn32.exeQjnmlk32.exeIhoafpmp.exeMdmmfa32.exeCnobnmpl.exeBhajdblk.exeBoplllob.exeCdoajb32.exeGoddhg32.exeHlfdkoin.exeKkaiqk32.exeAjbggjfq.exeBommnc32.exeDnlidb32.exeFbgmbg32.exeJfnnha32.exeJdbkjn32.exeNigome32.exeDcfdgiid.exeHpkjko32.exeFaigdn32.exeDjhphncm.exeKjifhc32.exeDkkpbgli.exeMlmlecec.exePogclp32.exeApimacnn.exeJocflgga.exeJmjjea32.exeJiakjb32.exeMkclhl32.exeHcnpbi32.exeJchhkjhn.exeFiaeoang.exeHkcdafqb.exeMieeibkn.exeNgfflj32.exeOkgnab32.exePikkiijf.exeCoelaaoi.exeIjgdngmf.exeMgljbm32.exeCcngld32.exeDhdcji32.exeFiihdlpc.exeJbdonb32.exeLapnnafn.exeAmnfnfgg.exeImfqjbli.exeJoplbl32.exeMijfnh32.exeFjaonpnn.exeLmikibio.exeBmpfojmp.exeCeaadk32.exeJejhecaj.exeNacgdhlp.exePamiog32.exeOkfgfl32.exePggbla32.exeBhigphio.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dliijipn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Enfenplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gjdhbc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhaikn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjnmlk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ihoafpmp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mdmmfa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnobnmpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhajdblk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Boplllob.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cdoajb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Goddhg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hlfdkoin.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkaiqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajbggjfq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bommnc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnlidb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbgmbg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfnnha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdbkjn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nigome32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcfdgiid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpkjko32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Faigdn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djhphncm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjifhc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkpbgli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mlmlecec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pogclp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apimacnn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jocflgga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmjjea32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jiakjb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkclhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hcnpbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jchhkjhn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fiaeoang.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkcdafqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mieeibkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngfflj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Okgnab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pikkiijf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Coelaaoi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijgdngmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgljbm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ccngld32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhdcji32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fiihdlpc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jbdonb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lapnnafn.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Amnfnfgg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Imfqjbli.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Joplbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mijfnh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fjaonpnn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmikibio.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bmpfojmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceaadk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jejhecaj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nacgdhlp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pamiog32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okfgfl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pggbla32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bhigphio.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Pbpjiphi.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Qjknnbed.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Qagcpljo.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Adeplhib.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aajpelhl.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Aiedjneg.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ajdadamj.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Admemg32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Aenbdoii.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Afmonbqk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ailkjmpo.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Boiccdnf.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Bingpmnl.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Bbflib32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Bommnc32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Begeknan.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bpafkknm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bnefdp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bcaomf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ckignd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ccdlbf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Coklgg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cgbdhd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Clomqk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cfgaiaci.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Chemfl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cdlnkmha.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ddokpmfo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dgmglh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dngoibmo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dgodbh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dkkpbgli.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dcfdgiid.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ddeaalpg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dnlidb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Doobajme.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Dgfjbgmh.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ecmkghcl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ejgcdb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Epdkli32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Emhlfmgj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ekklaj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Epieghdk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eloemi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eeempocb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ennaieib.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ebinic32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fckjalhj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fjdbnf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fejgko32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fhhcgj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ffkcbgek.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fnbkddem.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fpdhklkl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fjilieka.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fpfdalii.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fdapak32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ffpmnf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Flmefm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fddmgjpo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fbgmbg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fiaeoang.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fmlapp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gonnhhln.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Pbpjiphi.exe UPX \Windows\SysWOW64\Qjknnbed.exe UPX \Windows\SysWOW64\Qagcpljo.exe UPX \Windows\SysWOW64\Adeplhib.exe UPX C:\Windows\SysWOW64\Aajpelhl.exe UPX \Windows\SysWOW64\Aiedjneg.exe UPX \Windows\SysWOW64\Ajdadamj.exe UPX \Windows\SysWOW64\Admemg32.exe UPX \Windows\SysWOW64\Aenbdoii.exe UPX \Windows\SysWOW64\Afmonbqk.exe UPX C:\Windows\SysWOW64\Ailkjmpo.exe UPX \Windows\SysWOW64\Boiccdnf.exe UPX \Windows\SysWOW64\Bingpmnl.exe UPX \Windows\SysWOW64\Bbflib32.exe UPX \Windows\SysWOW64\Bommnc32.exe UPX \Windows\SysWOW64\Begeknan.exe UPX C:\Windows\SysWOW64\Bpafkknm.exe UPX C:\Windows\SysWOW64\Bnefdp32.exe UPX C:\Windows\SysWOW64\Bcaomf32.exe UPX C:\Windows\SysWOW64\Ckignd32.exe UPX C:\Windows\SysWOW64\Ccdlbf32.exe UPX C:\Windows\SysWOW64\Coklgg32.exe UPX C:\Windows\SysWOW64\Cgbdhd32.exe UPX C:\Windows\SysWOW64\Clomqk32.exe UPX C:\Windows\SysWOW64\Cfgaiaci.exe UPX C:\Windows\SysWOW64\Chemfl32.exe UPX C:\Windows\SysWOW64\Cdlnkmha.exe UPX C:\Windows\SysWOW64\Ddokpmfo.exe UPX C:\Windows\SysWOW64\Dgmglh32.exe UPX C:\Windows\SysWOW64\Dngoibmo.exe UPX C:\Windows\SysWOW64\Dgodbh32.exe UPX C:\Windows\SysWOW64\Dkkpbgli.exe UPX C:\Windows\SysWOW64\Dcfdgiid.exe UPX C:\Windows\SysWOW64\Ddeaalpg.exe UPX C:\Windows\SysWOW64\Dnlidb32.exe UPX C:\Windows\SysWOW64\Doobajme.exe UPX C:\Windows\SysWOW64\Dgfjbgmh.exe UPX C:\Windows\SysWOW64\Ecmkghcl.exe UPX C:\Windows\SysWOW64\Ejgcdb32.exe UPX C:\Windows\SysWOW64\Epdkli32.exe UPX C:\Windows\SysWOW64\Emhlfmgj.exe UPX behavioral1/memory/2428-481-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Ekklaj32.exe UPX C:\Windows\SysWOW64\Epieghdk.exe UPX C:\Windows\SysWOW64\Eloemi32.exe UPX C:\Windows\SysWOW64\Eeempocb.exe UPX C:\Windows\SysWOW64\Ennaieib.exe UPX C:\Windows\SysWOW64\Ebinic32.exe UPX C:\Windows\SysWOW64\Fckjalhj.exe UPX C:\Windows\SysWOW64\Fjdbnf32.exe UPX C:\Windows\SysWOW64\Fejgko32.exe UPX C:\Windows\SysWOW64\Fhhcgj32.exe UPX C:\Windows\SysWOW64\Ffkcbgek.exe UPX C:\Windows\SysWOW64\Fnbkddem.exe UPX C:\Windows\SysWOW64\Fpdhklkl.exe UPX C:\Windows\SysWOW64\Fjilieka.exe UPX C:\Windows\SysWOW64\Fpfdalii.exe UPX C:\Windows\SysWOW64\Fdapak32.exe UPX C:\Windows\SysWOW64\Ffpmnf32.exe UPX C:\Windows\SysWOW64\Flmefm32.exe UPX C:\Windows\SysWOW64\Fddmgjpo.exe UPX C:\Windows\SysWOW64\Fbgmbg32.exe UPX C:\Windows\SysWOW64\Fiaeoang.exe UPX C:\Windows\SysWOW64\Fmlapp32.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Pbpjiphi.exeQjknnbed.exeQagcpljo.exeAdeplhib.exeAajpelhl.exeAiedjneg.exeAjdadamj.exeAdmemg32.exeAenbdoii.exeAfmonbqk.exeAilkjmpo.exeBoiccdnf.exeBingpmnl.exeBbflib32.exeBommnc32.exeBegeknan.exeBpafkknm.exeBnefdp32.exeBcaomf32.exeCkignd32.exeCcdlbf32.exeCoklgg32.exeCgbdhd32.exeClomqk32.exeCfgaiaci.exeChemfl32.exeCdlnkmha.exeDdokpmfo.exeDgmglh32.exeDngoibmo.exeDgodbh32.exeDkkpbgli.exeDcfdgiid.exeDnlidb32.exeDdeaalpg.exeDoobajme.exeDgfjbgmh.exeEcmkghcl.exeEjgcdb32.exeEpdkli32.exeEmhlfmgj.exeEkklaj32.exeEpieghdk.exeEeempocb.exeEloemi32.exeEnnaieib.exeEbinic32.exeFckjalhj.exeFjdbnf32.exeFejgko32.exeFhhcgj32.exeFfkcbgek.exeFnbkddem.exeFpdhklkl.exeFjilieka.exeFpfdalii.exeFdapak32.exeFfpmnf32.exeFlmefm32.exeFddmgjpo.exeFbgmbg32.exeFiaeoang.exeFmlapp32.exeGonnhhln.exepid process 2584 Pbpjiphi.exe 1648 Qjknnbed.exe 2772 Qagcpljo.exe 2760 Adeplhib.exe 3016 Aajpelhl.exe 2516 Aiedjneg.exe 2364 Ajdadamj.exe 2700 Admemg32.exe 2868 Aenbdoii.exe 1788 Afmonbqk.exe 1652 Ailkjmpo.exe 1640 Boiccdnf.exe 1668 Bingpmnl.exe 1916 Bbflib32.exe 536 Bommnc32.exe 1656 Begeknan.exe 1824 Bpafkknm.exe 1156 Bnefdp32.exe 1324 Bcaomf32.exe 660 Ckignd32.exe 2252 Ccdlbf32.exe 1660 Coklgg32.exe 1556 Cgbdhd32.exe 2976 Clomqk32.exe 872 Cfgaiaci.exe 2152 Chemfl32.exe 1620 Cdlnkmha.exe 2900 Ddokpmfo.exe 2840 Dgmglh32.exe 2812 Dngoibmo.exe 2524 Dgodbh32.exe 2616 Dkkpbgli.exe 3032 Dcfdgiid.exe 1960 Dnlidb32.exe 2716 Ddeaalpg.exe 2892 Doobajme.exe 1808 Dgfjbgmh.exe 1708 Ecmkghcl.exe 1528 Ejgcdb32.exe 2428 Epdkli32.exe 2692 Emhlfmgj.exe 1108 Ekklaj32.exe 2164 Epieghdk.exe 876 Eeempocb.exe 2324 Eloemi32.exe 2360 Ennaieib.exe 2956 Ebinic32.exe 2480 Fckjalhj.exe 2144 Fjdbnf32.exe 3040 Fejgko32.exe 1388 Fhhcgj32.exe 1992 Ffkcbgek.exe 1720 Fnbkddem.exe 2612 Fpdhklkl.exe 2788 Fjilieka.exe 2308 Fpfdalii.exe 2880 Fdapak32.exe 2504 Ffpmnf32.exe 2992 Flmefm32.exe 2720 Fddmgjpo.exe 1308 Fbgmbg32.exe 792 Fiaeoang.exe 2220 Fmlapp32.exe 1436 Gonnhhln.exe -
Loads dropped DLL 64 IoCs
Processes:
ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exePbpjiphi.exeQjknnbed.exeQagcpljo.exeAdeplhib.exeAajpelhl.exeAiedjneg.exeAjdadamj.exeAdmemg32.exeAenbdoii.exeAfmonbqk.exeAilkjmpo.exeBoiccdnf.exeBingpmnl.exeBbflib32.exeBommnc32.exeBegeknan.exeBpafkknm.exeBnefdp32.exeBcaomf32.exeCkignd32.exeCcdlbf32.exeCoklgg32.exeCgbdhd32.exeClomqk32.exeCfgaiaci.exeChemfl32.exeCdlnkmha.exeDdokpmfo.exeDgmglh32.exeDngoibmo.exeDgodbh32.exepid process 1284 ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exe 1284 ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exe 2584 Pbpjiphi.exe 2584 Pbpjiphi.exe 1648 Qjknnbed.exe 1648 Qjknnbed.exe 2772 Qagcpljo.exe 2772 Qagcpljo.exe 2760 Adeplhib.exe 2760 Adeplhib.exe 3016 Aajpelhl.exe 3016 Aajpelhl.exe 2516 Aiedjneg.exe 2516 Aiedjneg.exe 2364 Ajdadamj.exe 2364 Ajdadamj.exe 2700 Admemg32.exe 2700 Admemg32.exe 2868 Aenbdoii.exe 2868 Aenbdoii.exe 1788 Afmonbqk.exe 1788 Afmonbqk.exe 1652 Ailkjmpo.exe 1652 Ailkjmpo.exe 1640 Boiccdnf.exe 1640 Boiccdnf.exe 1668 Bingpmnl.exe 1668 Bingpmnl.exe 1916 Bbflib32.exe 1916 Bbflib32.exe 536 Bommnc32.exe 536 Bommnc32.exe 1656 Begeknan.exe 1656 Begeknan.exe 1824 Bpafkknm.exe 1824 Bpafkknm.exe 1156 Bnefdp32.exe 1156 Bnefdp32.exe 1324 Bcaomf32.exe 1324 Bcaomf32.exe 660 Ckignd32.exe 660 Ckignd32.exe 2252 Ccdlbf32.exe 2252 Ccdlbf32.exe 1660 Coklgg32.exe 1660 Coklgg32.exe 1556 Cgbdhd32.exe 1556 Cgbdhd32.exe 2976 Clomqk32.exe 2976 Clomqk32.exe 872 Cfgaiaci.exe 872 Cfgaiaci.exe 2152 Chemfl32.exe 2152 Chemfl32.exe 1620 Cdlnkmha.exe 1620 Cdlnkmha.exe 2900 Ddokpmfo.exe 2900 Ddokpmfo.exe 2840 Dgmglh32.exe 2840 Dgmglh32.exe 2812 Dngoibmo.exe 2812 Dngoibmo.exe 2524 Dgodbh32.exe 2524 Dgodbh32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Iedkbc32.exeAckkppma.exeFjdbnf32.exeFdapak32.exeOnecbg32.exeQeohnd32.exeIcmegf32.exePoapfn32.exeBhfcpb32.exeLbfdaigg.exeNkpegi32.exeBajomhbl.exeGfefiemq.exeHpkjko32.exeJejhecaj.exeMaoajf32.exeIlcmjl32.exeLbcnhjnj.exeAfnagk32.exeMgalqkbk.exePfbelipa.exeFmlapp32.exeHgbebiao.exeFmbhok32.exeLcojjmea.exeGjdhbc32.exeIapebchh.exeCgbdhd32.exeEkklaj32.exeGgpimica.exeKcfkfo32.exeFpngfgle.exePgbhabjp.exeFekpnn32.exeHlakpp32.exeHkfagfop.exeEjgcdb32.exeLhpfqama.exePcnbablo.exeEfcfga32.exeHkcdafqb.exeKmgbdo32.exeAiedjneg.exeJiakjb32.exeJgidao32.exeAnccmo32.exeDglpbbbg.exeLphhenhc.exeAcmhepko.exeBmclhi32.exeQjknnbed.exeIjgdngmf.exeNajdnj32.exePqhpdhcc.exeHpgfki32.exeCfgaiaci.exeJcgogk32.exeHdqbekcm.exeNljddpfe.exeIeqeidnl.exeFjmaaddo.exeHbfbgd32.exeLjibgg32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ilncom32.exe Iedkbc32.exe File created C:\Windows\SysWOW64\Mbkbki32.dll Ackkppma.exe File created C:\Windows\SysWOW64\Qdcbfq32.dll Fjdbnf32.exe File opened for modification C:\Windows\SysWOW64\Ffpmnf32.exe Fdapak32.exe File opened for modification C:\Windows\SysWOW64\Oqcpob32.exe Onecbg32.exe File created C:\Windows\SysWOW64\Doojhgfa.dll Qeohnd32.exe File created C:\Windows\SysWOW64\Iapebchh.exe Icmegf32.exe File opened for modification C:\Windows\SysWOW64\Qflhbhgg.exe Poapfn32.exe File created C:\Windows\SysWOW64\Boplllob.exe Bhfcpb32.exe File opened for modification C:\Windows\SysWOW64\Ljmlbfhi.exe Lbfdaigg.exe File created C:\Windows\SysWOW64\Nmnace32.exe Nkpegi32.exe File created C:\Windows\SysWOW64\Deokbacp.dll Bajomhbl.exe File created C:\Windows\SysWOW64\Kleiio32.dll Gfefiemq.exe File created C:\Windows\SysWOW64\Hdfflm32.exe Hpkjko32.exe File created C:\Windows\SysWOW64\Mfnekf32.dll Jejhecaj.exe File created C:\Windows\SysWOW64\Gdchio32.dll Maoajf32.exe File created C:\Windows\SysWOW64\Jnbfqn32.dll Ilcmjl32.exe File opened for modification C:\Windows\SysWOW64\Limfed32.exe Lbcnhjnj.exe File created C:\Windows\SysWOW64\Bilmcf32.exe Afnagk32.exe File created C:\Windows\SysWOW64\Mkmhaj32.exe Mgalqkbk.exe File opened for modification C:\Windows\SysWOW64\Pnimnfpc.exe Pfbelipa.exe File opened for modification C:\Windows\SysWOW64\Fejgko32.exe Fjdbnf32.exe File created C:\Windows\SysWOW64\Gonnhhln.exe Fmlapp32.exe File created C:\Windows\SysWOW64\Codpklfq.dll Hgbebiao.exe File created C:\Windows\SysWOW64\Fncdgcqm.exe Fmbhok32.exe File created C:\Windows\SysWOW64\Ljibgg32.exe Lcojjmea.exe File opened for modification C:\Windows\SysWOW64\Gifhnpea.exe Gjdhbc32.exe File created C:\Windows\SysWOW64\Idnaoohk.exe Iapebchh.exe File opened for modification C:\Windows\SysWOW64\Clomqk32.exe Cgbdhd32.exe File created C:\Windows\SysWOW64\Lpdhmlbj.dll Ekklaj32.exe File created C:\Windows\SysWOW64\Kcaipkch.dll Ggpimica.exe File created C:\Windows\SysWOW64\Flmpfjke.dll Kcfkfo32.exe File opened for modification C:\Windows\SysWOW64\Fcjcfe32.exe Fpngfgle.exe File opened for modification C:\Windows\SysWOW64\Pnlqnl32.exe Pgbhabjp.exe File created C:\Windows\SysWOW64\Cfgcja32.dll Fekpnn32.exe File opened for modification C:\Windows\SysWOW64\Hejoiedd.exe Hlakpp32.exe File opened for modification C:\Windows\SysWOW64\Hpbiommg.exe Hkfagfop.exe File created C:\Windows\SysWOW64\Epdkli32.exe Ejgcdb32.exe File created C:\Windows\SysWOW64\Aefbii32.dll Lhpfqama.exe File created C:\Windows\SysWOW64\Djihnh32.dll Pcnbablo.exe File created C:\Windows\SysWOW64\Jhgnia32.dll Efcfga32.exe File created C:\Windows\SysWOW64\Hmbpmapf.exe Hkcdafqb.exe File created C:\Windows\SysWOW64\Kcakaipc.exe Kmgbdo32.exe File created C:\Windows\SysWOW64\Iklefg32.dll Aiedjneg.exe File created C:\Windows\SysWOW64\Chgdod32.dll Jiakjb32.exe File created C:\Windows\SysWOW64\Joplbl32.exe Jgidao32.exe File created C:\Windows\SysWOW64\Oglegn32.dll Anccmo32.exe File created C:\Windows\SysWOW64\Djklnnaj.exe Dglpbbbg.exe File created C:\Windows\SysWOW64\Kacgbnfl.dll Lphhenhc.exe File opened for modification C:\Windows\SysWOW64\Abphal32.exe Acmhepko.exe File created C:\Windows\SysWOW64\Nmmfff32.dll Bmclhi32.exe File created C:\Windows\SysWOW64\Pdamlbjc.dll Qjknnbed.exe File opened for modification C:\Windows\SysWOW64\Imfqjbli.exe Ijgdngmf.exe File created C:\Windows\SysWOW64\Mdqmicng.dll Najdnj32.exe File created C:\Windows\SysWOW64\Bkddcl32.dll Pqhpdhcc.exe File created C:\Windows\SysWOW64\Jmamaoln.dll Hpgfki32.exe File opened for modification C:\Windows\SysWOW64\Chemfl32.exe Cfgaiaci.exe File opened for modification C:\Windows\SysWOW64\Jfekcg32.exe Jcgogk32.exe File created C:\Windows\SysWOW64\Iodahd32.dll Hdqbekcm.exe File created C:\Windows\SysWOW64\Hanedg32.dll Nljddpfe.exe File created C:\Windows\SysWOW64\Amammd32.dll Ieqeidnl.exe File created C:\Windows\SysWOW64\Fagjnn32.exe Fjmaaddo.exe File opened for modification C:\Windows\SysWOW64\Hedocp32.exe Hbfbgd32.exe File created C:\Windows\SysWOW64\Opdnhdpo.dll Ljibgg32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 7112 7088 WerFault.exe Cacacg32.exe -
Modifies registry class 64 IoCs
Processes:
Cgcmlcja.exeIhjnom32.exeKfbcbd32.exeLcfqkl32.exeGpcmpijk.exeLfdmggnm.exeMlcbenjb.exeQeohnd32.exeAiedjneg.exeMeijhc32.exeNgibaj32.exeBoplllob.exeHkkalk32.exeBdgafdfp.exeFjmaaddo.exeCmgechbh.exeBommnc32.exeLlfifq32.exePnlqnl32.exeEeempocb.exeMdmmfa32.exeNolhan32.exeLphhenhc.exeNpccpo32.exeAilkjmpo.exeBcaomf32.exeEfcfga32.exeGpncej32.exeJdpndnei.exeKaldcb32.exeGebbnpfp.exeIgchlf32.exePmccjbaf.exeCcngld32.exeEbmgcohn.exeGfjhgdck.exeHpbiommg.exeOkdkal32.exeQqeicede.exeHedocp32.exeLclnemgd.exePgbhabjp.exeCjfccn32.exeFbamma32.exeOnecbg32.exeMgljbm32.exeJmplcp32.exeDpbheh32.exeNgfflj32.exeDcfdgiid.exeMpdnkb32.exeLlcefjgf.exeQflhbhgg.exeBphbeplm.exeJcgogk32.exeBpafkknm.exeHdfflm32.exeOeeecekc.exeBnefdp32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cgcmlcja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ihjnom32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfbcbd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fhhmapcq.dll" Lcfqkl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gpcmpijk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfdmggnm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlcbenjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Doojhgfa.dll" Qeohnd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iklefg32.dll" Aiedjneg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Meijhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oqaedifk.dll" Ngibaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Boplllob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecmkgokh.dll" Hkkalk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mclgfa32.dll" Bdgafdfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fjmaaddo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdlpjk32.dll" Cmgechbh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gncffdfn.dll" Bommnc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Llfifq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Objbcm32.dll" Pnlqnl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eeempocb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Loolpo32.dll" Mdmmfa32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nolhan32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lphhenhc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lcfqkl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ceamohhb.dll" Npccpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ailkjmpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bcaomf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Efcfga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gpncej32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dpcfqoam.dll" Jdpndnei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kaldcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Opiehf32.dll" Cgcmlcja.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bkfeekif.dll" Gebbnpfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Igchlf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbbjgn32.dll" Pmccjbaf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccngld32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gogcek32.dll" Ebmgcohn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gfjhgdck.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpbiommg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Okdkal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjojco32.dll" Qqeicede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mfbnag32.dll" Hedocp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iimckbco.dll" Lclnemgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pgbhabjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cjfccn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aoladf32.dll" Fbamma32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jbbpnl32.dll" Onecbg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pbmnie32.dll" Mgljbm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lklohbmo.dll" Cjfccn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmplcp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpbheh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngfflj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hecjkifm.dll" Dcfdgiid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ebmgcohn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpdnkb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llcefjgf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Eioojl32.dll" Qflhbhgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bphbeplm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jcgogk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bpafkknm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pffgja32.dll" Hdfflm32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oeeecekc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebmgcohn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bnefdp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exePbpjiphi.exeQjknnbed.exeQagcpljo.exeAdeplhib.exeAajpelhl.exeAiedjneg.exeAjdadamj.exeAdmemg32.exeAenbdoii.exeAfmonbqk.exeAilkjmpo.exeBoiccdnf.exeBingpmnl.exeBbflib32.exeBommnc32.exedescription pid process target process PID 1284 wrote to memory of 2584 1284 ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exe Pbpjiphi.exe PID 1284 wrote to memory of 2584 1284 ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exe Pbpjiphi.exe PID 1284 wrote to memory of 2584 1284 ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exe Pbpjiphi.exe PID 1284 wrote to memory of 2584 1284 ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exe Pbpjiphi.exe PID 2584 wrote to memory of 1648 2584 Pbpjiphi.exe Qjknnbed.exe PID 2584 wrote to memory of 1648 2584 Pbpjiphi.exe Qjknnbed.exe PID 2584 wrote to memory of 1648 2584 Pbpjiphi.exe Qjknnbed.exe PID 2584 wrote to memory of 1648 2584 Pbpjiphi.exe Qjknnbed.exe PID 1648 wrote to memory of 2772 1648 Qjknnbed.exe Qagcpljo.exe PID 1648 wrote to memory of 2772 1648 Qjknnbed.exe Qagcpljo.exe PID 1648 wrote to memory of 2772 1648 Qjknnbed.exe Qagcpljo.exe PID 1648 wrote to memory of 2772 1648 Qjknnbed.exe Qagcpljo.exe PID 2772 wrote to memory of 2760 2772 Qagcpljo.exe Adeplhib.exe PID 2772 wrote to memory of 2760 2772 Qagcpljo.exe Adeplhib.exe PID 2772 wrote to memory of 2760 2772 Qagcpljo.exe Adeplhib.exe PID 2772 wrote to memory of 2760 2772 Qagcpljo.exe Adeplhib.exe PID 2760 wrote to memory of 3016 2760 Adeplhib.exe Aajpelhl.exe PID 2760 wrote to memory of 3016 2760 Adeplhib.exe Aajpelhl.exe PID 2760 wrote to memory of 3016 2760 Adeplhib.exe Aajpelhl.exe PID 2760 wrote to memory of 3016 2760 Adeplhib.exe Aajpelhl.exe PID 3016 wrote to memory of 2516 3016 Aajpelhl.exe Aiedjneg.exe PID 3016 wrote to memory of 2516 3016 Aajpelhl.exe Aiedjneg.exe PID 3016 wrote to memory of 2516 3016 Aajpelhl.exe Aiedjneg.exe PID 3016 wrote to memory of 2516 3016 Aajpelhl.exe Aiedjneg.exe PID 2516 wrote to memory of 2364 2516 Aiedjneg.exe Ajdadamj.exe PID 2516 wrote to memory of 2364 2516 Aiedjneg.exe Ajdadamj.exe PID 2516 wrote to memory of 2364 2516 Aiedjneg.exe Ajdadamj.exe PID 2516 wrote to memory of 2364 2516 Aiedjneg.exe Ajdadamj.exe PID 2364 wrote to memory of 2700 2364 Ajdadamj.exe Admemg32.exe PID 2364 wrote to memory of 2700 2364 Ajdadamj.exe Admemg32.exe PID 2364 wrote to memory of 2700 2364 Ajdadamj.exe Admemg32.exe PID 2364 wrote to memory of 2700 2364 Ajdadamj.exe Admemg32.exe PID 2700 wrote to memory of 2868 2700 Admemg32.exe Aenbdoii.exe PID 2700 wrote to memory of 2868 2700 Admemg32.exe Aenbdoii.exe PID 2700 wrote to memory of 2868 2700 Admemg32.exe Aenbdoii.exe PID 2700 wrote to memory of 2868 2700 Admemg32.exe Aenbdoii.exe PID 2868 wrote to memory of 1788 2868 Aenbdoii.exe Afmonbqk.exe PID 2868 wrote to memory of 1788 2868 Aenbdoii.exe Afmonbqk.exe PID 2868 wrote to memory of 1788 2868 Aenbdoii.exe Afmonbqk.exe PID 2868 wrote to memory of 1788 2868 Aenbdoii.exe Afmonbqk.exe PID 1788 wrote to memory of 1652 1788 Afmonbqk.exe Ailkjmpo.exe PID 1788 wrote to memory of 1652 1788 Afmonbqk.exe Ailkjmpo.exe PID 1788 wrote to memory of 1652 1788 Afmonbqk.exe Ailkjmpo.exe PID 1788 wrote to memory of 1652 1788 Afmonbqk.exe Ailkjmpo.exe PID 1652 wrote to memory of 1640 1652 Ailkjmpo.exe Boiccdnf.exe PID 1652 wrote to memory of 1640 1652 Ailkjmpo.exe Boiccdnf.exe PID 1652 wrote to memory of 1640 1652 Ailkjmpo.exe Boiccdnf.exe PID 1652 wrote to memory of 1640 1652 Ailkjmpo.exe Boiccdnf.exe PID 1640 wrote to memory of 1668 1640 Boiccdnf.exe Bingpmnl.exe PID 1640 wrote to memory of 1668 1640 Boiccdnf.exe Bingpmnl.exe PID 1640 wrote to memory of 1668 1640 Boiccdnf.exe Bingpmnl.exe PID 1640 wrote to memory of 1668 1640 Boiccdnf.exe Bingpmnl.exe PID 1668 wrote to memory of 1916 1668 Bingpmnl.exe Bbflib32.exe PID 1668 wrote to memory of 1916 1668 Bingpmnl.exe Bbflib32.exe PID 1668 wrote to memory of 1916 1668 Bingpmnl.exe Bbflib32.exe PID 1668 wrote to memory of 1916 1668 Bingpmnl.exe Bbflib32.exe PID 1916 wrote to memory of 536 1916 Bbflib32.exe Bommnc32.exe PID 1916 wrote to memory of 536 1916 Bbflib32.exe Bommnc32.exe PID 1916 wrote to memory of 536 1916 Bbflib32.exe Bommnc32.exe PID 1916 wrote to memory of 536 1916 Bbflib32.exe Bommnc32.exe PID 536 wrote to memory of 1656 536 Bommnc32.exe Begeknan.exe PID 536 wrote to memory of 1656 536 Bommnc32.exe Begeknan.exe PID 536 wrote to memory of 1656 536 Bommnc32.exe Begeknan.exe PID 536 wrote to memory of 1656 536 Bommnc32.exe Begeknan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exe"C:\Users\Admin\AppData\Local\Temp\ae3b640649579d4549db5b81aeb5a174d2f2dee8d3198492ed9a224e195cbec5.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\Pbpjiphi.exeC:\Windows\system32\Pbpjiphi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\Qjknnbed.exeC:\Windows\system32\Qjknnbed.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\Qagcpljo.exeC:\Windows\system32\Qagcpljo.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\Adeplhib.exeC:\Windows\system32\Adeplhib.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Aajpelhl.exeC:\Windows\system32\Aajpelhl.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\Aiedjneg.exeC:\Windows\system32\Aiedjneg.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\Ajdadamj.exeC:\Windows\system32\Ajdadamj.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\Admemg32.exeC:\Windows\system32\Admemg32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\Aenbdoii.exeC:\Windows\system32\Aenbdoii.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\Afmonbqk.exeC:\Windows\system32\Afmonbqk.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\Ailkjmpo.exeC:\Windows\system32\Ailkjmpo.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\Boiccdnf.exeC:\Windows\system32\Boiccdnf.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Bingpmnl.exeC:\Windows\system32\Bingpmnl.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\Bbflib32.exeC:\Windows\system32\Bbflib32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\Bommnc32.exeC:\Windows\system32\Bommnc32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\Begeknan.exeC:\Windows\system32\Begeknan.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Windows\SysWOW64\Bpafkknm.exeC:\Windows\system32\Bpafkknm.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1824 -
C:\Windows\SysWOW64\Bnefdp32.exeC:\Windows\system32\Bnefdp32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1156 -
C:\Windows\SysWOW64\Bcaomf32.exeC:\Windows\system32\Bcaomf32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1324 -
C:\Windows\SysWOW64\Ckignd32.exeC:\Windows\system32\Ckignd32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:660 -
C:\Windows\SysWOW64\Ccdlbf32.exeC:\Windows\system32\Ccdlbf32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2252 -
C:\Windows\SysWOW64\Coklgg32.exeC:\Windows\system32\Coklgg32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1660 -
C:\Windows\SysWOW64\Cgbdhd32.exeC:\Windows\system32\Cgbdhd32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1556 -
C:\Windows\SysWOW64\Clomqk32.exeC:\Windows\system32\Clomqk32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2976 -
C:\Windows\SysWOW64\Cfgaiaci.exeC:\Windows\system32\Cfgaiaci.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:872 -
C:\Windows\SysWOW64\Chemfl32.exeC:\Windows\system32\Chemfl32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2152 -
C:\Windows\SysWOW64\Cdlnkmha.exeC:\Windows\system32\Cdlnkmha.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Windows\SysWOW64\Ddokpmfo.exeC:\Windows\system32\Ddokpmfo.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2900 -
C:\Windows\SysWOW64\Dgmglh32.exeC:\Windows\system32\Dgmglh32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Windows\SysWOW64\Dngoibmo.exeC:\Windows\system32\Dngoibmo.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2812 -
C:\Windows\SysWOW64\Dgodbh32.exeC:\Windows\system32\Dgodbh32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524 -
C:\Windows\SysWOW64\Dkkpbgli.exeC:\Windows\system32\Dkkpbgli.exe33⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\Dcfdgiid.exeC:\Windows\system32\Dcfdgiid.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:3032 -
C:\Windows\SysWOW64\Dnlidb32.exeC:\Windows\system32\Dnlidb32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Ddeaalpg.exeC:\Windows\system32\Ddeaalpg.exe36⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Doobajme.exeC:\Windows\system32\Doobajme.exe37⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\SysWOW64\Dgfjbgmh.exeC:\Windows\system32\Dgfjbgmh.exe38⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\Ecmkghcl.exeC:\Windows\system32\Ecmkghcl.exe39⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SysWOW64\Ejgcdb32.exeC:\Windows\system32\Ejgcdb32.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1528 -
C:\Windows\SysWOW64\Epdkli32.exeC:\Windows\system32\Epdkli32.exe41⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\Emhlfmgj.exeC:\Windows\system32\Emhlfmgj.exe42⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\Ekklaj32.exeC:\Windows\system32\Ekklaj32.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1108 -
C:\Windows\SysWOW64\Epieghdk.exeC:\Windows\system32\Epieghdk.exe44⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\Eeempocb.exeC:\Windows\system32\Eeempocb.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:876 -
C:\Windows\SysWOW64\Eloemi32.exeC:\Windows\system32\Eloemi32.exe46⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\SysWOW64\Ennaieib.exeC:\Windows\system32\Ennaieib.exe47⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\Ebinic32.exeC:\Windows\system32\Ebinic32.exe48⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\Fckjalhj.exeC:\Windows\system32\Fckjalhj.exe49⤵
- Executes dropped EXE
PID:2480 -
C:\Windows\SysWOW64\Fjdbnf32.exeC:\Windows\system32\Fjdbnf32.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2144 -
C:\Windows\SysWOW64\Fejgko32.exeC:\Windows\system32\Fejgko32.exe51⤵
- Executes dropped EXE
PID:3040 -
C:\Windows\SysWOW64\Fhhcgj32.exeC:\Windows\system32\Fhhcgj32.exe52⤵
- Executes dropped EXE
PID:1388 -
C:\Windows\SysWOW64\Ffkcbgek.exeC:\Windows\system32\Ffkcbgek.exe53⤵
- Executes dropped EXE
PID:1992 -
C:\Windows\SysWOW64\Fnbkddem.exeC:\Windows\system32\Fnbkddem.exe54⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\Fpdhklkl.exeC:\Windows\system32\Fpdhklkl.exe55⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\Fjilieka.exeC:\Windows\system32\Fjilieka.exe56⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Fpfdalii.exeC:\Windows\system32\Fpfdalii.exe57⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\Fdapak32.exeC:\Windows\system32\Fdapak32.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2880 -
C:\Windows\SysWOW64\Ffpmnf32.exeC:\Windows\system32\Ffpmnf32.exe59⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\SysWOW64\Flmefm32.exeC:\Windows\system32\Flmefm32.exe60⤵
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\Fddmgjpo.exeC:\Windows\system32\Fddmgjpo.exe61⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\Fbgmbg32.exeC:\Windows\system32\Fbgmbg32.exe62⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1308 -
C:\Windows\SysWOW64\Fiaeoang.exeC:\Windows\system32\Fiaeoang.exe63⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:792 -
C:\Windows\SysWOW64\Fmlapp32.exeC:\Windows\system32\Fmlapp32.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2220 -
C:\Windows\SysWOW64\Gonnhhln.exeC:\Windows\system32\Gonnhhln.exe65⤵
- Executes dropped EXE
PID:1436 -
C:\Windows\SysWOW64\Gfefiemq.exeC:\Windows\system32\Gfefiemq.exe66⤵
- Drops file in System32 directory
PID:2888 -
C:\Windows\SysWOW64\Gicbeald.exeC:\Windows\system32\Gicbeald.exe67⤵PID:1984
-
C:\Windows\SysWOW64\Gbkgnfbd.exeC:\Windows\system32\Gbkgnfbd.exe68⤵PID:1820
-
C:\Windows\SysWOW64\Gejcjbah.exeC:\Windows\system32\Gejcjbah.exe69⤵PID:1168
-
C:\Windows\SysWOW64\Gldkfl32.exeC:\Windows\system32\Gldkfl32.exe70⤵PID:1776
-
C:\Windows\SysWOW64\Gkgkbipp.exeC:\Windows\system32\Gkgkbipp.exe71⤵PID:1828
-
C:\Windows\SysWOW64\Gelppaof.exeC:\Windows\system32\Gelppaof.exe72⤵PID:2908
-
C:\Windows\SysWOW64\Ghkllmoi.exeC:\Windows\system32\Ghkllmoi.exe73⤵PID:2292
-
C:\Windows\SysWOW64\Goddhg32.exeC:\Windows\system32\Goddhg32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1744 -
C:\Windows\SysWOW64\Geolea32.exeC:\Windows\system32\Geolea32.exe75⤵PID:2416
-
C:\Windows\SysWOW64\Ggpimica.exeC:\Windows\system32\Ggpimica.exe76⤵
- Drops file in System32 directory
PID:2756 -
C:\Windows\SysWOW64\Gkkemh32.exeC:\Windows\system32\Gkkemh32.exe77⤵PID:2676
-
C:\Windows\SysWOW64\Gaemjbcg.exeC:\Windows\system32\Gaemjbcg.exe78⤵PID:3008
-
C:\Windows\SysWOW64\Gddifnbk.exeC:\Windows\system32\Gddifnbk.exe79⤵PID:2856
-
C:\Windows\SysWOW64\Hgbebiao.exeC:\Windows\system32\Hgbebiao.exe80⤵
- Drops file in System32 directory
PID:316 -
C:\Windows\SysWOW64\Hpkjko32.exeC:\Windows\system32\Hpkjko32.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\Hdfflm32.exeC:\Windows\system32\Hdfflm32.exe82⤵
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Hkpnhgge.exeC:\Windows\system32\Hkpnhgge.exe83⤵PID:2320
-
C:\Windows\SysWOW64\Hicodd32.exeC:\Windows\system32\Hicodd32.exe84⤵PID:284
-
C:\Windows\SysWOW64\Hlakpp32.exeC:\Windows\system32\Hlakpp32.exe85⤵
- Drops file in System32 directory
PID:648 -
C:\Windows\SysWOW64\Hejoiedd.exeC:\Windows\system32\Hejoiedd.exe86⤵PID:1780
-
C:\Windows\SysWOW64\Hpocfncj.exeC:\Windows\system32\Hpocfncj.exe87⤵PID:1148
-
C:\Windows\SysWOW64\Hcnpbi32.exeC:\Windows\system32\Hcnpbi32.exe88⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2008 -
C:\Windows\SysWOW64\Hellne32.exeC:\Windows\system32\Hellne32.exe89⤵PID:2340
-
C:\Windows\SysWOW64\Hhjhkq32.exeC:\Windows\system32\Hhjhkq32.exe90⤵PID:308
-
C:\Windows\SysWOW64\Hlfdkoin.exeC:\Windows\system32\Hlfdkoin.exe91⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2916 -
C:\Windows\SysWOW64\Hodpgjha.exeC:\Windows\system32\Hodpgjha.exe92⤵PID:2424
-
C:\Windows\SysWOW64\Henidd32.exeC:\Windows\system32\Henidd32.exe93⤵PID:2640
-
C:\Windows\SysWOW64\Hhmepp32.exeC:\Windows\system32\Hhmepp32.exe94⤵PID:2724
-
C:\Windows\SysWOW64\Hkkalk32.exeC:\Windows\system32\Hkkalk32.exe95⤵
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\Icbimi32.exeC:\Windows\system32\Icbimi32.exe96⤵PID:1800
-
C:\Windows\SysWOW64\Ieqeidnl.exeC:\Windows\system32\Ieqeidnl.exe97⤵
- Drops file in System32 directory
PID:1248 -
C:\Windows\SysWOW64\Ihoafpmp.exeC:\Windows\system32\Ihoafpmp.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2560 -
C:\Windows\SysWOW64\Ilknfn32.exeC:\Windows\system32\Ilknfn32.exe99⤵PID:576
-
C:\Windows\SysWOW64\Inljnfkg.exeC:\Windows\system32\Inljnfkg.exe100⤵PID:808
-
C:\Windows\SysWOW64\Ifcbodli.exeC:\Windows\system32\Ifcbodli.exe101⤵PID:828
-
C:\Windows\SysWOW64\Ihankokm.exeC:\Windows\system32\Ihankokm.exe102⤵PID:1680
-
C:\Windows\SysWOW64\Ikpjgkjq.exeC:\Windows\system32\Ikpjgkjq.exe103⤵PID:2952
-
C:\Windows\SysWOW64\Iajcde32.exeC:\Windows\system32\Iajcde32.exe104⤵PID:1564
-
C:\Windows\SysWOW64\Idhopq32.exeC:\Windows\system32\Idhopq32.exe105⤵PID:1624
-
C:\Windows\SysWOW64\Ikbgmj32.exeC:\Windows\system32\Ikbgmj32.exe106⤵PID:3068
-
C:\Windows\SysWOW64\Iqopea32.exeC:\Windows\system32\Iqopea32.exe107⤵PID:2768
-
C:\Windows\SysWOW64\Icmlam32.exeC:\Windows\system32\Icmlam32.exe108⤵PID:2508
-
C:\Windows\SysWOW64\Ijgdngmf.exeC:\Windows\system32\Ijgdngmf.exe109⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2624 -
C:\Windows\SysWOW64\Imfqjbli.exeC:\Windows\system32\Imfqjbli.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1532 -
C:\Windows\SysWOW64\Idmhkpml.exeC:\Windows\system32\Idmhkpml.exe111⤵PID:2852
-
C:\Windows\SysWOW64\Icpigm32.exeC:\Windows\system32\Icpigm32.exe112⤵PID:2180
-
C:\Windows\SysWOW64\Jnemdecl.exeC:\Windows\system32\Jnemdecl.exe113⤵PID:288
-
C:\Windows\SysWOW64\Jqdipqbp.exeC:\Windows\system32\Jqdipqbp.exe114⤵PID:3004
-
C:\Windows\SysWOW64\Jfqahgpg.exeC:\Windows\system32\Jfqahgpg.exe115⤵PID:1268
-
C:\Windows\SysWOW64\Jmjjea32.exeC:\Windows\system32\Jmjjea32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1700 -
C:\Windows\SysWOW64\Jbgbni32.exeC:\Windows\system32\Jbgbni32.exe117⤵PID:592
-
C:\Windows\SysWOW64\Jiakjb32.exeC:\Windows\system32\Jiakjb32.exe118⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2468 -
C:\Windows\SysWOW64\Jcgogk32.exeC:\Windows\system32\Jcgogk32.exe119⤵
- Drops file in System32 directory
- Modifies registry class
PID:1544 -
C:\Windows\SysWOW64\Jfekcg32.exeC:\Windows\system32\Jfekcg32.exe120⤵PID:1292
-
C:\Windows\SysWOW64\Jicgpb32.exeC:\Windows\system32\Jicgpb32.exe121⤵PID:2036
-
C:\Windows\SysWOW64\Jmocpado.exeC:\Windows\system32\Jmocpado.exe122⤵PID:2948
-
C:\Windows\SysWOW64\Jnqphi32.exeC:\Windows\system32\Jnqphi32.exe123⤵PID:1516
-
C:\Windows\SysWOW64\Jbllihbf.exeC:\Windows\system32\Jbllihbf.exe124⤵PID:1592
-
C:\Windows\SysWOW64\Jejhecaj.exeC:\Windows\system32\Jejhecaj.exe125⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2536 -
C:\Windows\SysWOW64\Jgidao32.exeC:\Windows\system32\Jgidao32.exe126⤵
- Drops file in System32 directory
PID:292 -
C:\Windows\SysWOW64\Joplbl32.exeC:\Windows\system32\Joplbl32.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2552 -
C:\Windows\SysWOW64\Jbnhng32.exeC:\Windows\system32\Jbnhng32.exe128⤵PID:2796
-
C:\Windows\SysWOW64\Kaaijdgn.exeC:\Windows\system32\Kaaijdgn.exe129⤵PID:2844
-
C:\Windows\SysWOW64\Kihqkagp.exeC:\Windows\system32\Kihqkagp.exe130⤵PID:1636
-
C:\Windows\SysWOW64\Kjjmbj32.exeC:\Windows\system32\Kjjmbj32.exe131⤵PID:264
-
C:\Windows\SysWOW64\Kaceodek.exeC:\Windows\system32\Kaceodek.exe132⤵PID:484
-
C:\Windows\SysWOW64\Kcbakpdo.exeC:\Windows\system32\Kcbakpdo.exe133⤵PID:2472
-
C:\Windows\SysWOW64\Kkijmm32.exeC:\Windows\system32\Kkijmm32.exe134⤵PID:1160
-
C:\Windows\SysWOW64\Kngfih32.exeC:\Windows\system32\Kngfih32.exe135⤵PID:1048
-
C:\Windows\SysWOW64\Kafbec32.exeC:\Windows\system32\Kafbec32.exe136⤵PID:2980
-
C:\Windows\SysWOW64\Kcdnao32.exeC:\Windows\system32\Kcdnao32.exe137⤵PID:608
-
C:\Windows\SysWOW64\Kfbkmk32.exeC:\Windows\system32\Kfbkmk32.exe138⤵PID:2860
-
C:\Windows\SysWOW64\Knjbnh32.exeC:\Windows\system32\Knjbnh32.exe139⤵PID:2672
-
C:\Windows\SysWOW64\Kmmcjehm.exeC:\Windows\system32\Kmmcjehm.exe140⤵PID:1672
-
C:\Windows\SysWOW64\Kcfkfo32.exeC:\Windows\system32\Kcfkfo32.exe141⤵
- Drops file in System32 directory
PID:2792 -
C:\Windows\SysWOW64\Kgbggnhc.exeC:\Windows\system32\Kgbggnhc.exe142⤵PID:2884
-
C:\Windows\SysWOW64\Kiccofna.exeC:\Windows\system32\Kiccofna.exe143⤵PID:1456
-
C:\Windows\SysWOW64\Kmopod32.exeC:\Windows\system32\Kmopod32.exe144⤵PID:1920
-
C:\Windows\SysWOW64\Kcihlong.exeC:\Windows\system32\Kcihlong.exe145⤵PID:1716
-
C:\Windows\SysWOW64\Kfgdhjmk.exeC:\Windows\system32\Kfgdhjmk.exe146⤵PID:764
-
C:\Windows\SysWOW64\Kmaled32.exeC:\Windows\system32\Kmaled32.exe147⤵PID:2904
-
C:\Windows\SysWOW64\Lldlqakb.exeC:\Windows\system32\Lldlqakb.exe148⤵PID:2924
-
C:\Windows\SysWOW64\Lbnemk32.exeC:\Windows\system32\Lbnemk32.exe149⤵PID:2628
-
C:\Windows\SysWOW64\Lfjqnjkh.exeC:\Windows\system32\Lfjqnjkh.exe150⤵PID:2528
-
C:\Windows\SysWOW64\Lihmjejl.exeC:\Windows\system32\Lihmjejl.exe151⤵PID:2532
-
C:\Windows\SysWOW64\Llfifq32.exeC:\Windows\system32\Llfifq32.exe152⤵
- Modifies registry class
PID:2824 -
C:\Windows\SysWOW64\Loeebl32.exeC:\Windows\system32\Loeebl32.exe153⤵PID:2376
-
C:\Windows\SysWOW64\Lflmci32.exeC:\Windows\system32\Lflmci32.exe154⤵PID:2112
-
C:\Windows\SysWOW64\Lijjoe32.exeC:\Windows\system32\Lijjoe32.exe155⤵PID:548
-
C:\Windows\SysWOW64\Lliflp32.exeC:\Windows\system32\Lliflp32.exe156⤵PID:1404
-
C:\Windows\SysWOW64\Logbhl32.exeC:\Windows\system32\Logbhl32.exe157⤵PID:1740
-
C:\Windows\SysWOW64\Lbcnhjnj.exeC:\Windows\system32\Lbcnhjnj.exe158⤵
- Drops file in System32 directory
PID:2652 -
C:\Windows\SysWOW64\Limfed32.exeC:\Windows\system32\Limfed32.exe159⤵PID:2088
-
C:\Windows\SysWOW64\Lhpfqama.exeC:\Windows\system32\Lhpfqama.exe160⤵
- Drops file in System32 directory
PID:2696 -
C:\Windows\SysWOW64\Lojomkdn.exeC:\Windows\system32\Lojomkdn.exe161⤵PID:1632
-
C:\Windows\SysWOW64\Lbeknj32.exeC:\Windows\system32\Lbeknj32.exe162⤵PID:2096
-
C:\Windows\SysWOW64\Lecgje32.exeC:\Windows\system32\Lecgje32.exe163⤵PID:692
-
C:\Windows\SysWOW64\Ldfgebbe.exeC:\Windows\system32\Ldfgebbe.exe164⤵PID:568
-
C:\Windows\SysWOW64\Lkppbl32.exeC:\Windows\system32\Lkppbl32.exe165⤵PID:1724
-
C:\Windows\SysWOW64\Lollckbk.exeC:\Windows\system32\Lollckbk.exe166⤵PID:2496
-
C:\Windows\SysWOW64\Lefdpe32.exeC:\Windows\system32\Lefdpe32.exe167⤵PID:2196
-
C:\Windows\SysWOW64\Ldidkbpb.exeC:\Windows\system32\Ldidkbpb.exe168⤵PID:2064
-
C:\Windows\SysWOW64\Mkclhl32.exeC:\Windows\system32\Mkclhl32.exe169⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2988 -
C:\Windows\SysWOW64\Monhhk32.exeC:\Windows\system32\Monhhk32.exe170⤵PID:888
-
C:\Windows\SysWOW64\Mamddf32.exeC:\Windows\system32\Mamddf32.exe171⤵PID:2780
-
C:\Windows\SysWOW64\Mdkqqa32.exeC:\Windows\system32\Mdkqqa32.exe172⤵PID:1760
-
C:\Windows\SysWOW64\Mgimmm32.exeC:\Windows\system32\Mgimmm32.exe173⤵PID:1980
-
C:\Windows\SysWOW64\Mihiih32.exeC:\Windows\system32\Mihiih32.exe174⤵PID:752
-
C:\Windows\SysWOW64\Maoajf32.exeC:\Windows\system32\Maoajf32.exe175⤵
- Drops file in System32 directory
PID:2684 -
C:\Windows\SysWOW64\Mdmmfa32.exeC:\Windows\system32\Mdmmfa32.exe176⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2580 -
C:\Windows\SysWOW64\Mgljbm32.exeC:\Windows\system32\Mgljbm32.exe177⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2832 -
C:\Windows\SysWOW64\Mijfnh32.exeC:\Windows\system32\Mijfnh32.exe178⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1096 -
C:\Windows\SysWOW64\Mlibjc32.exeC:\Windows\system32\Mlibjc32.exe179⤵PID:2836
-
C:\Windows\SysWOW64\Mpdnkb32.exeC:\Windows\system32\Mpdnkb32.exe180⤵
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\Mcbjgn32.exeC:\Windows\system32\Mcbjgn32.exe181⤵PID:332
-
C:\Windows\SysWOW64\Meagci32.exeC:\Windows\system32\Meagci32.exe182⤵PID:2568
-
C:\Windows\SysWOW64\Mmhodf32.exeC:\Windows\system32\Mmhodf32.exe183⤵PID:2936
-
C:\Windows\SysWOW64\Mpfkqb32.exeC:\Windows\system32\Mpfkqb32.exe184⤵PID:2336
-
C:\Windows\SysWOW64\Moiklogi.exeC:\Windows\system32\Moiklogi.exe185⤵PID:496
-
C:\Windows\SysWOW64\Meccii32.exeC:\Windows\system32\Meccii32.exe186⤵PID:1968
-
C:\Windows\SysWOW64\Mhbped32.exeC:\Windows\system32\Mhbped32.exe187⤵PID:928
-
C:\Windows\SysWOW64\Mlmlecec.exeC:\Windows\system32\Mlmlecec.exe188⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2764 -
C:\Windows\SysWOW64\Nolhan32.exeC:\Windows\system32\Nolhan32.exe189⤵
- Modifies registry class
PID:2784 -
C:\Windows\SysWOW64\Najdnj32.exeC:\Windows\system32\Najdnj32.exe190⤵
- Drops file in System32 directory
PID:2304 -
C:\Windows\SysWOW64\Nialog32.exeC:\Windows\system32\Nialog32.exe191⤵PID:1052
-
C:\Windows\SysWOW64\Nhdlkdkg.exeC:\Windows\system32\Nhdlkdkg.exe192⤵PID:1236
-
C:\Windows\SysWOW64\Nondgn32.exeC:\Windows\system32\Nondgn32.exe193⤵PID:3100
-
C:\Windows\SysWOW64\Namqci32.exeC:\Windows\system32\Namqci32.exe194⤵PID:3140
-
C:\Windows\SysWOW64\Nhfipcid.exeC:\Windows\system32\Nhfipcid.exe195⤵PID:3180
-
C:\Windows\SysWOW64\Nkeelohh.exeC:\Windows\system32\Nkeelohh.exe196⤵PID:3220
-
C:\Windows\SysWOW64\Nncahjgl.exeC:\Windows\system32\Nncahjgl.exe197⤵PID:3260
-
C:\Windows\SysWOW64\Naoniipe.exeC:\Windows\system32\Naoniipe.exe198⤵PID:3300
-
C:\Windows\SysWOW64\Ndmjedoi.exeC:\Windows\system32\Ndmjedoi.exe199⤵PID:3340
-
C:\Windows\SysWOW64\Nocnbmoo.exeC:\Windows\system32\Nocnbmoo.exe200⤵PID:3380
-
C:\Windows\SysWOW64\Naajoinb.exeC:\Windows\system32\Naajoinb.exe201⤵PID:3420
-
C:\Windows\SysWOW64\Npdjje32.exeC:\Windows\system32\Npdjje32.exe202⤵PID:3460
-
C:\Windows\SysWOW64\Ngnbgplj.exeC:\Windows\system32\Ngnbgplj.exe203⤵PID:3500
-
C:\Windows\SysWOW64\Nkiogn32.exeC:\Windows\system32\Nkiogn32.exe204⤵PID:3540
-
C:\Windows\SysWOW64\Nacgdhlp.exeC:\Windows\system32\Nacgdhlp.exe205⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3580 -
C:\Windows\SysWOW64\Ndbcpd32.exeC:\Windows\system32\Ndbcpd32.exe206⤵PID:3620
-
C:\Windows\SysWOW64\Ngpolo32.exeC:\Windows\system32\Ngpolo32.exe207⤵PID:3660
-
C:\Windows\SysWOW64\Oklkmnbp.exeC:\Windows\system32\Oklkmnbp.exe208⤵PID:3700
-
C:\Windows\SysWOW64\Olmhdf32.exeC:\Windows\system32\Olmhdf32.exe209⤵PID:3740
-
C:\Windows\SysWOW64\Oqideepg.exeC:\Windows\system32\Oqideepg.exe210⤵PID:3780
-
C:\Windows\SysWOW64\Ocgpappk.exeC:\Windows\system32\Ocgpappk.exe211⤵PID:3820
-
C:\Windows\SysWOW64\Ogblbo32.exeC:\Windows\system32\Ogblbo32.exe212⤵PID:3860
-
C:\Windows\SysWOW64\Olpdjf32.exeC:\Windows\system32\Olpdjf32.exe213⤵PID:3900
-
C:\Windows\SysWOW64\Oonafa32.exeC:\Windows\system32\Oonafa32.exe214⤵PID:3940
-
C:\Windows\SysWOW64\Ogeigofa.exeC:\Windows\system32\Ogeigofa.exe215⤵PID:3980
-
C:\Windows\SysWOW64\Ojcecjee.exeC:\Windows\system32\Ojcecjee.exe216⤵PID:4020
-
C:\Windows\SysWOW64\Oqmmpd32.exeC:\Windows\system32\Oqmmpd32.exe217⤵PID:4060
-
C:\Windows\SysWOW64\Oopnlacm.exeC:\Windows\system32\Oopnlacm.exe218⤵PID:836
-
C:\Windows\SysWOW64\Ofjfhk32.exeC:\Windows\system32\Ofjfhk32.exe219⤵PID:3124
-
C:\Windows\SysWOW64\Ohibdf32.exeC:\Windows\system32\Ohibdf32.exe220⤵PID:3172
-
C:\Windows\SysWOW64\Okgnab32.exeC:\Windows\system32\Okgnab32.exe221⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3204 -
C:\Windows\SysWOW64\Ocnfbo32.exeC:\Windows\system32\Ocnfbo32.exe222⤵PID:3272
-
C:\Windows\SysWOW64\Odobjg32.exeC:\Windows\system32\Odobjg32.exe223⤵PID:3312
-
C:\Windows\SysWOW64\Omfkke32.exeC:\Windows\system32\Omfkke32.exe224⤵PID:3368
-
C:\Windows\SysWOW64\Ooeggp32.exeC:\Windows\system32\Ooeggp32.exe225⤵PID:3416
-
C:\Windows\SysWOW64\Obcccl32.exeC:\Windows\system32\Obcccl32.exe226⤵PID:3476
-
C:\Windows\SysWOW64\Pdaoog32.exeC:\Windows\system32\Pdaoog32.exe227⤵PID:3524
-
C:\Windows\SysWOW64\Pgplkb32.exeC:\Windows\system32\Pgplkb32.exe228⤵PID:3568
-
C:\Windows\SysWOW64\Pogclp32.exeC:\Windows\system32\Pogclp32.exe229⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3628 -
C:\Windows\SysWOW64\Pqhpdhcc.exeC:\Windows\system32\Pqhpdhcc.exe230⤵
- Drops file in System32 directory
PID:3676 -
C:\Windows\SysWOW64\Piphee32.exeC:\Windows\system32\Piphee32.exe231⤵PID:3724
-
C:\Windows\SysWOW64\Pgbhabjp.exeC:\Windows\system32\Pgbhabjp.exe232⤵
- Drops file in System32 directory
- Modifies registry class
PID:3768 -
C:\Windows\SysWOW64\Pnlqnl32.exeC:\Windows\system32\Pnlqnl32.exe233⤵
- Modifies registry class
PID:3828 -
C:\Windows\SysWOW64\Pqkmjh32.exeC:\Windows\system32\Pqkmjh32.exe234⤵PID:3880
-
C:\Windows\SysWOW64\Pgeefbhm.exeC:\Windows\system32\Pgeefbhm.exe235⤵PID:3936
-
C:\Windows\SysWOW64\Pjcabmga.exeC:\Windows\system32\Pjcabmga.exe236⤵PID:3968
-
C:\Windows\SysWOW64\Pamiog32.exeC:\Windows\system32\Pamiog32.exe237⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4028 -
C:\Windows\SysWOW64\Pggbla32.exeC:\Windows\system32\Pggbla32.exe238⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:4076 -
C:\Windows\SysWOW64\Pmdjdh32.exeC:\Windows\system32\Pmdjdh32.exe239⤵PID:3116
-
C:\Windows\SysWOW64\Pcnbablo.exeC:\Windows\system32\Pcnbablo.exe240⤵
- Drops file in System32 directory
PID:3168 -
C:\Windows\SysWOW64\Pikkiijf.exeC:\Windows\system32\Pikkiijf.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3208 -
C:\Windows\SysWOW64\Qabcjgkh.exeC:\Windows\system32\Qabcjgkh.exe242⤵PID:3288