Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:42
Behavioral task
behavioral1
Sample
42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exe
Resource
win10v2004-20240508-en
General
-
Target
42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exe
-
Size
94KB
-
MD5
14e9b5278e715d75b2279504e1566a70
-
SHA1
f96ccca081f1df18c95b26cbae730608063f0bbd
-
SHA256
42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29
-
SHA512
e5552308e208de0691deeae29952dc0901f8691168bf11ed80bce460af8e88144a5dbc38a5138d7834e5285079042e10f0618ee4294fbba6ec3e2dc5f12aad57
-
SSDEEP
1536:5Jy2I3F/rlqrQGT06751t5pIpXvviREAyOJnucRKK9w8kghUXgI6quldbYWhLPHI:5r+pI+Y52pXniDyOBG8kH69dbYWhjH6/
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Abpfhcje.exeBnpmipql.exeCjbmjplb.exeFhhcgj32.exeHnojdcfi.exeHkeonm32.exeNnbhek32.exeNmjblg32.exePqkmjh32.exeQcbllb32.exeEgllae32.exeAmbmpmln.exeHcifgjgc.exeKfegbj32.exeHhmepp32.exeKeanebkb.exeKjcpii32.exeOjfaijcc.exeAhlgfdeq.exeKpjfba32.exeCjndop32.exeBjlqhoba.exeCngcjo32.exeEeempocb.exeFfpmnf32.exePefijfii.exeNcoamb32.exeOojknblb.exePeiljl32.exeMcegmm32.exeNnennj32.exeLmdpejfq.exeGmgdddmq.exeLmcijcbe.exeKgkafo32.exeKngfih32.exeNbdnoo32.exeApajlhka.exeDhmcfkme.exeMgimmm32.exePfjbgnme.exeQpecfc32.exeEdkcojga.exeHheelbjj.exeLhmjkaoc.exeLdfgebbe.exeAmejeljk.exeNondgn32.exeKappfeln.exeMcodno32.exePhjelg32.exeBdbhke32.exeEjmebq32.exeIchico32.exeInngcfid.exeIblpjdpk.exeHmlnoc32.exeMihiih32.exeBloqah32.exeGpknlk32.exeLmgmjjdn.exeJkdpanhg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Abpfhcje.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnpmipql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cjbmjplb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fhhcgj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hnojdcfi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hkeonm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnbhek32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nmjblg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqkmjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qcbllb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Egllae32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ambmpmln.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hcifgjgc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kfegbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhmepp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Keanebkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kjcpii32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ojfaijcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahlgfdeq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpjfba32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjndop32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cjbmjplb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjlqhoba.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cngcjo32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eeempocb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffpmnf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pefijfii.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncoamb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oojknblb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Peiljl32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mcegmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnennj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lmdpejfq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmgdddmq.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmcijcbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgkafo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kngfih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbdnoo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Apajlhka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhmcfkme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgimmm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pfjbgnme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qpecfc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edkcojga.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hheelbjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lhmjkaoc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldfgebbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Amejeljk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nondgn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kappfeln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcodno32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phjelg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bdbhke32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejmebq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ichico32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inngcfid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iblpjdpk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmlnoc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mihiih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bloqah32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fhhcgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gpknlk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lmgmjjdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jkdpanhg.exe -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral1/memory/1740-0-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/memory/1740-6-0x00000000002D0000-0x0000000000310000-memory.dmp family_berbew \Windows\SysWOW64\Gdimmp32.exe family_berbew \Windows\SysWOW64\Giffeg32.exe family_berbew behavioral1/memory/2672-26-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew \Windows\SysWOW64\Gdljbp32.exe family_berbew behavioral1/memory/2300-44-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/memory/2688-52-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Ggjfnk32.exe family_berbew \Windows\SysWOW64\Glgofbjn.exe family_berbew behavioral1/memory/2688-62-0x00000000002E0000-0x0000000000320000-memory.dmp family_berbew behavioral1/memory/2468-66-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew \Windows\SysWOW64\Gcagcl32.exe family_berbew behavioral1/memory/2996-79-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew \Windows\SysWOW64\Gnfkqe32.exe family_berbew behavioral1/memory/2996-87-0x0000000000250000-0x0000000000290000-memory.dmp family_berbew \Windows\SysWOW64\Gohhhmgo.exe family_berbew behavioral1/memory/2096-106-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Geapeg32.exe family_berbew behavioral1/memory/1428-124-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Ghplac32.exe family_berbew behavioral1/memory/2456-132-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew \Windows\SysWOW64\Hceqnlnf.exe family_berbew behavioral1/memory/2456-144-0x0000000000280000-0x00000000002C0000-memory.dmp family_berbew behavioral1/memory/2192-146-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew \Windows\SysWOW64\Hjpike32.exe family_berbew behavioral1/memory/2192-155-0x0000000000250000-0x0000000000290000-memory.dmp family_berbew \Windows\SysWOW64\Holacm32.exe family_berbew behavioral1/memory/1032-167-0x0000000000250000-0x0000000000290000-memory.dmp family_berbew \Windows\SysWOW64\Hakmph32.exe family_berbew behavioral1/memory/1456-185-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew \Windows\SysWOW64\Hheelbjj.exe family_berbew behavioral1/memory/3048-198-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew \Windows\SysWOW64\Hoonilag.exe family_berbew behavioral1/memory/540-211-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Hfifff32.exe family_berbew behavioral1/memory/712-224-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Hhgbba32.exe family_berbew behavioral1/memory/1120-230-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Hkeonm32.exe family_berbew behavioral1/memory/816-241-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Hdncgbnl.exe family_berbew behavioral1/memory/448-256-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/memory/2292-263-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Hglocnmp.exe family_berbew C:\Windows\SysWOW64\Hqddldcp.exe family_berbew behavioral1/memory/1236-273-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Hkjhimcf.exe family_berbew behavioral1/memory/2888-288-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Inhdehbj.exe family_berbew behavioral1/memory/2340-295-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Icemmopa.exe family_berbew behavioral1/memory/2408-306-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew behavioral1/memory/2340-305-0x00000000002D0000-0x0000000000310000-memory.dmp family_berbew behavioral1/memory/2340-304-0x00000000002D0000-0x0000000000310000-memory.dmp family_berbew C:\Windows\SysWOW64\Inkakhpg.exe family_berbew behavioral1/memory/1744-317-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Iolmbpfe.exe family_berbew behavioral1/memory/1640-328-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Ichico32.exe family_berbew behavioral1/memory/2676-343-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Ijaapifk.exe family_berbew behavioral1/memory/2596-350-0x0000000000400000-0x0000000000440000-memory.dmp family_berbew C:\Windows\SysWOW64\Impnldeo.exe family_berbew -
Executes dropped EXE 64 IoCs
Processes:
Gdimmp32.exeGiffeg32.exeGdljbp32.exeGgjfnk32.exeGlgofbjn.exeGcagcl32.exeGnfkqe32.exeGohhhmgo.exeGeapeg32.exeGhplac32.exeHceqnlnf.exeHjpike32.exeHolacm32.exeHakmph32.exeHheelbjj.exeHoonilag.exeHfifff32.exeHhgbba32.exeHkeonm32.exeHdncgbnl.exeHglocnmp.exeHqddldcp.exeHkjhimcf.exeInhdehbj.exeIcemmopa.exeInkakhpg.exeIolmbpfe.exeIchico32.exeIjaapifk.exeImpnldeo.exeIbmfdkcf.exeIjdnehci.exeImbkadcl.exeIoagno32.exeIiikfehq.exeIkggbpgd.exeInfdolgh.exeJgnhga32.exeJoepio32.exeJagmpg32.exeJinead32.exeJbfijjkl.exeJedefejo.exeJjanolhg.exeJmpjkggj.exeJegble32.exeJfhocmnk.exeJjdkdl32.exeJmbgpg32.exeJpqclb32.exeJghknp32.exeJfkkimlh.exeJjfgjk32.exeJiigehkl.exeKappfeln.exeKpcpbb32.exeKbalnnam.exeKfmhol32.exeKmgpkfab.exeKpemgbqf.exeKbcicmpj.exeKinaqg32.exeKmimafop.exeKphimanc.exepid process 2076 Gdimmp32.exe 2672 Giffeg32.exe 2300 Gdljbp32.exe 2688 Ggjfnk32.exe 2468 Glgofbjn.exe 2996 Gcagcl32.exe 2824 Gnfkqe32.exe 2096 Gohhhmgo.exe 1428 Geapeg32.exe 2456 Ghplac32.exe 2192 Hceqnlnf.exe 1032 Hjpike32.exe 1292 Holacm32.exe 1456 Hakmph32.exe 3048 Hheelbjj.exe 540 Hoonilag.exe 712 Hfifff32.exe 1120 Hhgbba32.exe 816 Hkeonm32.exe 448 Hdncgbnl.exe 2292 Hglocnmp.exe 1236 Hqddldcp.exe 2888 Hkjhimcf.exe 2340 Inhdehbj.exe 2408 Icemmopa.exe 1744 Inkakhpg.exe 1640 Iolmbpfe.exe 2676 Ichico32.exe 2596 Ijaapifk.exe 2720 Impnldeo.exe 2512 Ibmfdkcf.exe 2972 Ijdnehci.exe 2276 Imbkadcl.exe 2508 Ioagno32.exe 2796 Iiikfehq.exe 1620 Ikggbpgd.exe 2812 Infdolgh.exe 2760 Jgnhga32.exe 1700 Joepio32.exe 1756 Jagmpg32.exe 2196 Jinead32.exe 2448 Jbfijjkl.exe 592 Jedefejo.exe 1356 Jjanolhg.exe 1908 Jmpjkggj.exe 1212 Jegble32.exe 2036 Jfhocmnk.exe 624 Jjdkdl32.exe 2236 Jmbgpg32.exe 2948 Jpqclb32.exe 308 Jghknp32.exe 2332 Jfkkimlh.exe 2576 Jjfgjk32.exe 2880 Jiigehkl.exe 2604 Kappfeln.exe 2640 Kpcpbb32.exe 2584 Kbalnnam.exe 2548 Kfmhol32.exe 2172 Kmgpkfab.exe 1608 Kpemgbqf.exe 1804 Kbcicmpj.exe 1920 Kinaqg32.exe 1848 Kmimafop.exe 1960 Kphimanc.exe -
Loads dropped DLL 64 IoCs
Processes:
42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exeGdimmp32.exeGiffeg32.exeGdljbp32.exeGgjfnk32.exeGlgofbjn.exeGcagcl32.exeGnfkqe32.exeGohhhmgo.exeGeapeg32.exeGhplac32.exeHceqnlnf.exeHjpike32.exeHolacm32.exeHakmph32.exeHheelbjj.exeHoonilag.exeHfifff32.exeHhgbba32.exeHkeonm32.exeHdncgbnl.exeHglocnmp.exeHqddldcp.exeHkjhimcf.exeInhdehbj.exeIcemmopa.exeInkakhpg.exeIolmbpfe.exeIchico32.exeIjaapifk.exeImpnldeo.exeIbmfdkcf.exepid process 1740 42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exe 1740 42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exe 2076 Gdimmp32.exe 2076 Gdimmp32.exe 2672 Giffeg32.exe 2672 Giffeg32.exe 2300 Gdljbp32.exe 2300 Gdljbp32.exe 2688 Ggjfnk32.exe 2688 Ggjfnk32.exe 2468 Glgofbjn.exe 2468 Glgofbjn.exe 2996 Gcagcl32.exe 2996 Gcagcl32.exe 2824 Gnfkqe32.exe 2824 Gnfkqe32.exe 2096 Gohhhmgo.exe 2096 Gohhhmgo.exe 1428 Geapeg32.exe 1428 Geapeg32.exe 2456 Ghplac32.exe 2456 Ghplac32.exe 2192 Hceqnlnf.exe 2192 Hceqnlnf.exe 1032 Hjpike32.exe 1032 Hjpike32.exe 1292 Holacm32.exe 1292 Holacm32.exe 1456 Hakmph32.exe 1456 Hakmph32.exe 3048 Hheelbjj.exe 3048 Hheelbjj.exe 540 Hoonilag.exe 540 Hoonilag.exe 712 Hfifff32.exe 712 Hfifff32.exe 1120 Hhgbba32.exe 1120 Hhgbba32.exe 816 Hkeonm32.exe 816 Hkeonm32.exe 448 Hdncgbnl.exe 448 Hdncgbnl.exe 2292 Hglocnmp.exe 2292 Hglocnmp.exe 1236 Hqddldcp.exe 1236 Hqddldcp.exe 2888 Hkjhimcf.exe 2888 Hkjhimcf.exe 2340 Inhdehbj.exe 2340 Inhdehbj.exe 2408 Icemmopa.exe 2408 Icemmopa.exe 1744 Inkakhpg.exe 1744 Inkakhpg.exe 1640 Iolmbpfe.exe 1640 Iolmbpfe.exe 2676 Ichico32.exe 2676 Ichico32.exe 2596 Ijaapifk.exe 2596 Ijaapifk.exe 2720 Impnldeo.exe 2720 Impnldeo.exe 2512 Ibmfdkcf.exe 2512 Ibmfdkcf.exe -
Drops file in System32 directory 64 IoCs
Processes:
Cciemedf.exeFjgoce32.exeMlmlecec.exeAadloj32.exeDknekeef.exeHolacm32.exeHkeonm32.exeInhdehbj.exeAbpfhcje.exeDgjclbdi.exeEjkima32.exeKpemgbqf.exeLfjqnjkh.exeMcbjgn32.exeMgqcmlgl.exeNgnbgplj.exeEgafleqm.exeNjdpomfe.exeOmgaek32.exeApcfahio.exeIdfbkq32.exeEnhacojl.exeCfgaiaci.exeJqdipqbp.exeBiamilfj.exeEnfenplo.exeEmhlfmgj.exeHpocfncj.exeKjjmbj32.exeEbjglbml.exeHfifff32.exeKfmhol32.exeKmmcjehm.exeKjcpii32.exeQpecfc32.exeMpolmdkg.exeBanepo32.exeCnobnmpl.exeNlphkb32.exeDolnad32.exeLplogdmj.exeCngcjo32.exeGkgkbipp.exeHlfdkoin.exeLpbefoai.exeImpnldeo.exeOghlgdgk.exeJnqphi32.exeObafnlpn.exeEfcfga32.exeAfkbib32.exeBhfagipa.exeDhmcfkme.exeFfpmnf32.exeOqmmpd32.exeMgfgdn32.exeBldcpf32.exeEbinic32.exeIlknfn32.exeKgpjanje.exeIolmbpfe.exeKbalnnam.exeNgkmnacm.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Cfgaiaci.exe Cciemedf.exe File opened for modification C:\Windows\SysWOW64\Fmekoalh.exe Fjgoce32.exe File created C:\Windows\SysWOW64\Jbkpmm32.dll Mlmlecec.exe File opened for modification C:\Windows\SysWOW64\Bdbhke32.exe Aadloj32.exe File opened for modification C:\Windows\SysWOW64\Dojald32.exe Dknekeef.exe File opened for modification C:\Windows\SysWOW64\Hakmph32.exe Holacm32.exe File created C:\Windows\SysWOW64\Acccpj32.dll Hkeonm32.exe File created C:\Windows\SysWOW64\Icemmopa.exe Inhdehbj.exe File created C:\Windows\SysWOW64\Afkbib32.exe Abpfhcje.exe File created C:\Windows\SysWOW64\Nolhan32.exe Mlmlecec.exe File created C:\Windows\SysWOW64\Fogilika.dll Dgjclbdi.exe File created C:\Windows\SysWOW64\Lchkpi32.dll Ejkima32.exe File opened for modification C:\Windows\SysWOW64\Kbcicmpj.exe Kpemgbqf.exe File opened for modification C:\Windows\SysWOW64\Lihmjejl.exe Lfjqnjkh.exe File created C:\Windows\SysWOW64\Meagci32.exe Mcbjgn32.exe File created C:\Windows\SysWOW64\Hpjbaocl.dll Mgqcmlgl.exe File opened for modification C:\Windows\SysWOW64\Nnhkcj32.exe Ngnbgplj.exe File opened for modification C:\Windows\SysWOW64\Efcfga32.exe Egafleqm.exe File opened for modification C:\Windows\SysWOW64\Nlblkhei.exe Njdpomfe.exe File created C:\Windows\SysWOW64\Nbdppp32.dll Omgaek32.exe File created C:\Windows\SysWOW64\Jbfpbmji.dll Apcfahio.exe File created C:\Windows\SysWOW64\Igdogl32.exe Idfbkq32.exe File created C:\Windows\SysWOW64\Jaqddb32.dll Enhacojl.exe File created C:\Windows\SysWOW64\Cjbmjplb.exe Cfgaiaci.exe File created C:\Windows\SysWOW64\Ndpaod32.dll Jqdipqbp.exe File created C:\Windows\SysWOW64\Blpjegfm.exe Biamilfj.exe File created C:\Windows\SysWOW64\Qffmipmp.dll Enfenplo.exe File created C:\Windows\SysWOW64\Eiomkn32.exe Emhlfmgj.exe File created C:\Windows\SysWOW64\Khejeajg.dll Hpocfncj.exe File created C:\Windows\SysWOW64\Kneicieh.exe Kjjmbj32.exe File created C:\Windows\SysWOW64\Hoogfn32.dll Ebjglbml.exe File created C:\Windows\SysWOW64\Jmkijiih.dll Hfifff32.exe File created C:\Windows\SysWOW64\Aehfnp32.dll Kfmhol32.exe File created C:\Windows\SysWOW64\Kahojc32.exe Kmmcjehm.exe File created C:\Windows\SysWOW64\Kmaled32.exe Kjcpii32.exe File opened for modification C:\Windows\SysWOW64\Qbcpbo32.exe Qpecfc32.exe File created C:\Windows\SysWOW64\Mcmhiojk.exe Mpolmdkg.exe File created C:\Windows\SysWOW64\Deokcq32.dll Banepo32.exe File opened for modification C:\Windows\SysWOW64\Caknol32.exe Cnobnmpl.exe File opened for modification C:\Windows\SysWOW64\Nondgn32.exe Nlphkb32.exe File opened for modification C:\Windows\SysWOW64\Dbkknojp.exe Dolnad32.exe File created C:\Windows\SysWOW64\Eemeeh32.dll Lplogdmj.exe File created C:\Windows\SysWOW64\Cljcelan.exe Cngcjo32.exe File created C:\Windows\SysWOW64\Pabfdklg.dll Gkgkbipp.exe File created C:\Windows\SysWOW64\Liqebf32.dll Hlfdkoin.exe File created C:\Windows\SysWOW64\Idhqkpcf.dll Lpbefoai.exe File created C:\Windows\SysWOW64\Ibmfdkcf.exe Impnldeo.exe File created C:\Windows\SysWOW64\Ojficpfn.exe Oghlgdgk.exe File opened for modification C:\Windows\SysWOW64\Jfghif32.exe Jnqphi32.exe File created C:\Windows\SysWOW64\Kmccegik.dll Obafnlpn.exe File created C:\Windows\SysWOW64\Eibbcm32.exe Efcfga32.exe File created C:\Windows\SysWOW64\Bpjiammk.dll Afkbib32.exe File created C:\Windows\SysWOW64\Iegecigk.dll Bhfagipa.exe File opened for modification C:\Windows\SysWOW64\Dkkpbgli.exe Dhmcfkme.exe File created C:\Windows\SysWOW64\Ghqknigk.dll Ffpmnf32.exe File created C:\Windows\SysWOW64\Oopnlacm.exe Oqmmpd32.exe File created C:\Windows\SysWOW64\Meigpkka.exe Mgfgdn32.exe File created C:\Windows\SysWOW64\Eddpkh32.dll Bldcpf32.exe File created C:\Windows\SysWOW64\Gcmjhbal.dll Ebinic32.exe File opened for modification C:\Windows\SysWOW64\Iknnbklc.exe Ilknfn32.exe File created C:\Windows\SysWOW64\Iqfmng32.dll Kgpjanje.exe File created C:\Windows\SysWOW64\Necggg32.dll Iolmbpfe.exe File created C:\Windows\SysWOW64\Kfmhol32.exe Kbalnnam.exe File opened for modification C:\Windows\SysWOW64\Njiijlbp.exe Ngkmnacm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6152 5176 WerFault.exe Fkckeh32.exe -
Modifies registry class 64 IoCs
Processes:
Impnldeo.exeLkkmdn32.exeNkaocp32.exeFhhcgj32.exeNpfgpe32.exePclfkc32.exeAidnohbk.exeCeodnl32.exeAljgfioc.exeBloqah32.exeCfinoq32.exeEmhlfmgj.exeIggkllpe.exeJkdpanhg.exeOjcecjee.exePnjdhmdo.exeEqpgol32.exeAigaon32.exeBdhhqk32.exeCcfhhffh.exeDqhhknjp.exeJbfijjkl.exeComimg32.exeNjdpomfe.exeOjficpfn.exeDbpodagk.exeLimfed32.exeLajhofao.exeIjaapifk.exeNccjhafn.exeHhjhkq32.exeQmfgjh32.exePfbccp32.exeDnneja32.exeNialog32.exeCoklgg32.exeLahkigca.exeMlkopcge.exeEojnkg32.exeLdqegd32.exeIcbimi32.exeNdbcpd32.exeEgoife32.exeGhhofmql.exeIdfbkq32.exeNcoamb32.exePchpbded.exeImfqjbli.exeAaaoij32.exeAjbdna32.exeCllpkl32.exePciifc32.exePjcabmga.exeDdeaalpg.exeGelppaof.exeIfcbodli.exeLeajdfnm.exeHheelbjj.exeJfkkimlh.exeLipjejgp.exeNfkpdn32.exeAjphib32.exeAnkdiqih.exeCngcjo32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Impnldeo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qjhpbe32.dll" Lkkmdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkaocp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fhhcgj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npfgpe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pclfkc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjifqd32.dll" Aidnohbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Flojhn32.dll" Ceodnl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gfhemi32.dll" Aljgfioc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bloqah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfinoq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Emhlfmgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iggkllpe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jjpdcc32.dll" Jkdpanhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ojcecjee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pnjdhmdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gogcek32.dll" Eqpgol32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Andkhh32.dll" Aigaon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idphiplp.dll" Bdhhqk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccfhhffh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dqhhknjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jbfijjkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nejeco32.dll" Comimg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aljkjq32.dll" Njdpomfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbcoccqf.dll" Ojficpfn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dbpodagk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hbfcml32.dll" Limfed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lajhofao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ijaapifk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nccjhafn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Idnhde32.dll" Qmfgjh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pfbccp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnneja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nialog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkbcpgjj.dll" Coklgg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lahkigca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mlkopcge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Eojnkg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ldqegd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Icbimi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Omkepc32.dll" Ndbcpd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Egoife32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ghhofmql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Idfbkq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncoamb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pchpbded.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bmoado32.dll" Imfqjbli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Onjnkb32.dll" Aaaoij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajbdna32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kddjlc32.dll" Cllpkl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pciifc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjcabmga.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddeaalpg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iebpge32.dll" Gelppaof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ifcbodli.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Goedqe32.dll" Leajdfnm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hheelbjj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jfkkimlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lipjejgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nfkpdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajphib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ankdiqih.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cngcjo32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exeGdimmp32.exeGiffeg32.exeGdljbp32.exeGgjfnk32.exeGlgofbjn.exeGcagcl32.exeGnfkqe32.exeGohhhmgo.exeGeapeg32.exeGhplac32.exeHceqnlnf.exeHjpike32.exeHolacm32.exeHakmph32.exeHheelbjj.exedescription pid process target process PID 1740 wrote to memory of 2076 1740 42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exe Gdimmp32.exe PID 1740 wrote to memory of 2076 1740 42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exe Gdimmp32.exe PID 1740 wrote to memory of 2076 1740 42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exe Gdimmp32.exe PID 1740 wrote to memory of 2076 1740 42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exe Gdimmp32.exe PID 2076 wrote to memory of 2672 2076 Gdimmp32.exe Giffeg32.exe PID 2076 wrote to memory of 2672 2076 Gdimmp32.exe Giffeg32.exe PID 2076 wrote to memory of 2672 2076 Gdimmp32.exe Giffeg32.exe PID 2076 wrote to memory of 2672 2076 Gdimmp32.exe Giffeg32.exe PID 2672 wrote to memory of 2300 2672 Giffeg32.exe Gdljbp32.exe PID 2672 wrote to memory of 2300 2672 Giffeg32.exe Gdljbp32.exe PID 2672 wrote to memory of 2300 2672 Giffeg32.exe Gdljbp32.exe PID 2672 wrote to memory of 2300 2672 Giffeg32.exe Gdljbp32.exe PID 2300 wrote to memory of 2688 2300 Gdljbp32.exe Ggjfnk32.exe PID 2300 wrote to memory of 2688 2300 Gdljbp32.exe Ggjfnk32.exe PID 2300 wrote to memory of 2688 2300 Gdljbp32.exe Ggjfnk32.exe PID 2300 wrote to memory of 2688 2300 Gdljbp32.exe Ggjfnk32.exe PID 2688 wrote to memory of 2468 2688 Ggjfnk32.exe Glgofbjn.exe PID 2688 wrote to memory of 2468 2688 Ggjfnk32.exe Glgofbjn.exe PID 2688 wrote to memory of 2468 2688 Ggjfnk32.exe Glgofbjn.exe PID 2688 wrote to memory of 2468 2688 Ggjfnk32.exe Glgofbjn.exe PID 2468 wrote to memory of 2996 2468 Glgofbjn.exe Gcagcl32.exe PID 2468 wrote to memory of 2996 2468 Glgofbjn.exe Gcagcl32.exe PID 2468 wrote to memory of 2996 2468 Glgofbjn.exe Gcagcl32.exe PID 2468 wrote to memory of 2996 2468 Glgofbjn.exe Gcagcl32.exe PID 2996 wrote to memory of 2824 2996 Gcagcl32.exe Gnfkqe32.exe PID 2996 wrote to memory of 2824 2996 Gcagcl32.exe Gnfkqe32.exe PID 2996 wrote to memory of 2824 2996 Gcagcl32.exe Gnfkqe32.exe PID 2996 wrote to memory of 2824 2996 Gcagcl32.exe Gnfkqe32.exe PID 2824 wrote to memory of 2096 2824 Gnfkqe32.exe Gohhhmgo.exe PID 2824 wrote to memory of 2096 2824 Gnfkqe32.exe Gohhhmgo.exe PID 2824 wrote to memory of 2096 2824 Gnfkqe32.exe Gohhhmgo.exe PID 2824 wrote to memory of 2096 2824 Gnfkqe32.exe Gohhhmgo.exe PID 2096 wrote to memory of 1428 2096 Gohhhmgo.exe Geapeg32.exe PID 2096 wrote to memory of 1428 2096 Gohhhmgo.exe Geapeg32.exe PID 2096 wrote to memory of 1428 2096 Gohhhmgo.exe Geapeg32.exe PID 2096 wrote to memory of 1428 2096 Gohhhmgo.exe Geapeg32.exe PID 1428 wrote to memory of 2456 1428 Geapeg32.exe Ghplac32.exe PID 1428 wrote to memory of 2456 1428 Geapeg32.exe Ghplac32.exe PID 1428 wrote to memory of 2456 1428 Geapeg32.exe Ghplac32.exe PID 1428 wrote to memory of 2456 1428 Geapeg32.exe Ghplac32.exe PID 2456 wrote to memory of 2192 2456 Ghplac32.exe Hceqnlnf.exe PID 2456 wrote to memory of 2192 2456 Ghplac32.exe Hceqnlnf.exe PID 2456 wrote to memory of 2192 2456 Ghplac32.exe Hceqnlnf.exe PID 2456 wrote to memory of 2192 2456 Ghplac32.exe Hceqnlnf.exe PID 2192 wrote to memory of 1032 2192 Hceqnlnf.exe Hjpike32.exe PID 2192 wrote to memory of 1032 2192 Hceqnlnf.exe Hjpike32.exe PID 2192 wrote to memory of 1032 2192 Hceqnlnf.exe Hjpike32.exe PID 2192 wrote to memory of 1032 2192 Hceqnlnf.exe Hjpike32.exe PID 1032 wrote to memory of 1292 1032 Hjpike32.exe Holacm32.exe PID 1032 wrote to memory of 1292 1032 Hjpike32.exe Holacm32.exe PID 1032 wrote to memory of 1292 1032 Hjpike32.exe Holacm32.exe PID 1032 wrote to memory of 1292 1032 Hjpike32.exe Holacm32.exe PID 1292 wrote to memory of 1456 1292 Holacm32.exe Hakmph32.exe PID 1292 wrote to memory of 1456 1292 Holacm32.exe Hakmph32.exe PID 1292 wrote to memory of 1456 1292 Holacm32.exe Hakmph32.exe PID 1292 wrote to memory of 1456 1292 Holacm32.exe Hakmph32.exe PID 1456 wrote to memory of 3048 1456 Hakmph32.exe Hheelbjj.exe PID 1456 wrote to memory of 3048 1456 Hakmph32.exe Hheelbjj.exe PID 1456 wrote to memory of 3048 1456 Hakmph32.exe Hheelbjj.exe PID 1456 wrote to memory of 3048 1456 Hakmph32.exe Hheelbjj.exe PID 3048 wrote to memory of 540 3048 Hheelbjj.exe Hoonilag.exe PID 3048 wrote to memory of 540 3048 Hheelbjj.exe Hoonilag.exe PID 3048 wrote to memory of 540 3048 Hheelbjj.exe Hoonilag.exe PID 3048 wrote to memory of 540 3048 Hheelbjj.exe Hoonilag.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exe"C:\Users\Admin\AppData\Local\Temp\42f3bea2935e31eddc3e09663040a12d0dc70abd45b40cc28c49f9c33a578c29.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\Gdimmp32.exeC:\Windows\system32\Gdimmp32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\Giffeg32.exeC:\Windows\system32\Giffeg32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\Gdljbp32.exeC:\Windows\system32\Gdljbp32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Ggjfnk32.exeC:\Windows\system32\Ggjfnk32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\Glgofbjn.exeC:\Windows\system32\Glgofbjn.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\Gcagcl32.exeC:\Windows\system32\Gcagcl32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\Gnfkqe32.exeC:\Windows\system32\Gnfkqe32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\Gohhhmgo.exeC:\Windows\system32\Gohhhmgo.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\Geapeg32.exeC:\Windows\system32\Geapeg32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\Ghplac32.exeC:\Windows\system32\Ghplac32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\Hceqnlnf.exeC:\Windows\system32\Hceqnlnf.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\Hjpike32.exeC:\Windows\system32\Hjpike32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\Holacm32.exeC:\Windows\system32\Holacm32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\Hakmph32.exeC:\Windows\system32\Hakmph32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\Hheelbjj.exeC:\Windows\system32\Hheelbjj.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\Hoonilag.exeC:\Windows\system32\Hoonilag.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:540 -
C:\Windows\SysWOW64\Hfifff32.exeC:\Windows\system32\Hfifff32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:712 -
C:\Windows\SysWOW64\Hhgbba32.exeC:\Windows\system32\Hhgbba32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1120 -
C:\Windows\SysWOW64\Hkeonm32.exeC:\Windows\system32\Hkeonm32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:816 -
C:\Windows\SysWOW64\Hdncgbnl.exeC:\Windows\system32\Hdncgbnl.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:448 -
C:\Windows\SysWOW64\Hglocnmp.exeC:\Windows\system32\Hglocnmp.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2292 -
C:\Windows\SysWOW64\Hqddldcp.exeC:\Windows\system32\Hqddldcp.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1236 -
C:\Windows\SysWOW64\Hkjhimcf.exeC:\Windows\system32\Hkjhimcf.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Windows\SysWOW64\Inhdehbj.exeC:\Windows\system32\Inhdehbj.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2340 -
C:\Windows\SysWOW64\Icemmopa.exeC:\Windows\system32\Icemmopa.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2408 -
C:\Windows\SysWOW64\Inkakhpg.exeC:\Windows\system32\Inkakhpg.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1744 -
C:\Windows\SysWOW64\Iolmbpfe.exeC:\Windows\system32\Iolmbpfe.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\Ichico32.exeC:\Windows\system32\Ichico32.exe29⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:2676 -
C:\Windows\SysWOW64\Ijaapifk.exeC:\Windows\system32\Ijaapifk.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2596 -
C:\Windows\SysWOW64\Impnldeo.exeC:\Windows\system32\Impnldeo.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2720 -
C:\Windows\SysWOW64\Ibmfdkcf.exeC:\Windows\system32\Ibmfdkcf.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512 -
C:\Windows\SysWOW64\Ijdnehci.exeC:\Windows\system32\Ijdnehci.exe33⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\Imbkadcl.exeC:\Windows\system32\Imbkadcl.exe34⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\Ioagno32.exeC:\Windows\system32\Ioagno32.exe35⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\Iiikfehq.exeC:\Windows\system32\Iiikfehq.exe36⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\Ikggbpgd.exeC:\Windows\system32\Ikggbpgd.exe37⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Infdolgh.exeC:\Windows\system32\Infdolgh.exe38⤵
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\Jgnhga32.exeC:\Windows\system32\Jgnhga32.exe39⤵
- Executes dropped EXE
PID:2760 -
C:\Windows\SysWOW64\Joepio32.exeC:\Windows\system32\Joepio32.exe40⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\Jagmpg32.exeC:\Windows\system32\Jagmpg32.exe41⤵
- Executes dropped EXE
PID:1756 -
C:\Windows\SysWOW64\Jinead32.exeC:\Windows\system32\Jinead32.exe42⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\Jbfijjkl.exeC:\Windows\system32\Jbfijjkl.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:2448 -
C:\Windows\SysWOW64\Jedefejo.exeC:\Windows\system32\Jedefejo.exe44⤵
- Executes dropped EXE
PID:592 -
C:\Windows\SysWOW64\Jjanolhg.exeC:\Windows\system32\Jjanolhg.exe45⤵
- Executes dropped EXE
PID:1356 -
C:\Windows\SysWOW64\Jmpjkggj.exeC:\Windows\system32\Jmpjkggj.exe46⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\Jegble32.exeC:\Windows\system32\Jegble32.exe47⤵
- Executes dropped EXE
PID:1212 -
C:\Windows\SysWOW64\Jfhocmnk.exeC:\Windows\system32\Jfhocmnk.exe48⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\Jjdkdl32.exeC:\Windows\system32\Jjdkdl32.exe49⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\Jmbgpg32.exeC:\Windows\system32\Jmbgpg32.exe50⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\Jpqclb32.exeC:\Windows\system32\Jpqclb32.exe51⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\Jghknp32.exeC:\Windows\system32\Jghknp32.exe52⤵
- Executes dropped EXE
PID:308 -
C:\Windows\SysWOW64\Jfkkimlh.exeC:\Windows\system32\Jfkkimlh.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:2332 -
C:\Windows\SysWOW64\Jjfgjk32.exeC:\Windows\system32\Jjfgjk32.exe54⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\Jiigehkl.exeC:\Windows\system32\Jiigehkl.exe55⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\Kappfeln.exeC:\Windows\system32\Kappfeln.exe56⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\Kpcpbb32.exeC:\Windows\system32\Kpcpbb32.exe57⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\Kbalnnam.exeC:\Windows\system32\Kbalnnam.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\Kfmhol32.exeC:\Windows\system32\Kfmhol32.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2548 -
C:\Windows\SysWOW64\Kmgpkfab.exeC:\Windows\system32\Kmgpkfab.exe60⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\Kpemgbqf.exeC:\Windows\system32\Kpemgbqf.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1608 -
C:\Windows\SysWOW64\Kbcicmpj.exeC:\Windows\system32\Kbcicmpj.exe62⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\Kinaqg32.exeC:\Windows\system32\Kinaqg32.exe63⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\Kmimafop.exeC:\Windows\system32\Kmimafop.exe64⤵
- Executes dropped EXE
PID:1848 -
C:\Windows\SysWOW64\Kphimanc.exeC:\Windows\system32\Kphimanc.exe65⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\Kbfeimng.exeC:\Windows\system32\Kbfeimng.exe66⤵PID:2424
-
C:\Windows\SysWOW64\Kedaeh32.exeC:\Windows\system32\Kedaeh32.exe67⤵PID:604
-
C:\Windows\SysWOW64\Kpjfba32.exeC:\Windows\system32\Kpjfba32.exe68⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1684 -
C:\Windows\SysWOW64\Kbhbom32.exeC:\Windows\system32\Kbhbom32.exe69⤵PID:1224
-
C:\Windows\SysWOW64\Kakbjibo.exeC:\Windows\system32\Kakbjibo.exe70⤵PID:2924
-
C:\Windows\SysWOW64\Kibjkgca.exeC:\Windows\system32\Kibjkgca.exe71⤵PID:1724
-
C:\Windows\SysWOW64\Khekgc32.exeC:\Windows\system32\Khekgc32.exe72⤵PID:776
-
C:\Windows\SysWOW64\Koocdnai.exeC:\Windows\system32\Koocdnai.exe73⤵PID:2696
-
C:\Windows\SysWOW64\Kbkodl32.exeC:\Windows\system32\Kbkodl32.exe74⤵PID:2700
-
C:\Windows\SysWOW64\Kanopipl.exeC:\Windows\system32\Kanopipl.exe75⤵PID:1764
-
C:\Windows\SysWOW64\Kdlkld32.exeC:\Windows\system32\Kdlkld32.exe76⤵PID:2528
-
C:\Windows\SysWOW64\Lkfciogm.exeC:\Windows\system32\Lkfciogm.exe77⤵PID:2952
-
C:\Windows\SysWOW64\Lmdpejfq.exeC:\Windows\system32\Lmdpejfq.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1712 -
C:\Windows\SysWOW64\Ldnhad32.exeC:\Windows\system32\Ldnhad32.exe79⤵PID:2140
-
C:\Windows\SysWOW64\Lkhpnnej.exeC:\Windows\system32\Lkhpnnej.exe80⤵PID:2016
-
C:\Windows\SysWOW64\Lmgmjjdn.exeC:\Windows\system32\Lmgmjjdn.exe81⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2780 -
C:\Windows\SysWOW64\Lpeifeca.exeC:\Windows\system32\Lpeifeca.exe82⤵PID:2828
-
C:\Windows\SysWOW64\Ldqegd32.exeC:\Windows\system32\Ldqegd32.exe83⤵
- Modifies registry class
PID:1200 -
C:\Windows\SysWOW64\Lkkmdn32.exeC:\Windows\system32\Lkkmdn32.exe84⤵
- Modifies registry class
PID:1152 -
C:\Windows\SysWOW64\Lmiipi32.exeC:\Windows\system32\Lmiipi32.exe85⤵PID:1008
-
C:\Windows\SysWOW64\Lpgele32.exeC:\Windows\system32\Lpgele32.exe86⤵PID:1012
-
C:\Windows\SysWOW64\Lbfahp32.exeC:\Windows\system32\Lbfahp32.exe87⤵PID:1628
-
C:\Windows\SysWOW64\Lipjejgp.exeC:\Windows\system32\Lipjejgp.exe88⤵
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Lmkfei32.exeC:\Windows\system32\Lmkfei32.exe89⤵PID:2504
-
C:\Windows\SysWOW64\Ldenbcge.exeC:\Windows\system32\Ldenbcge.exe90⤵PID:2644
-
C:\Windows\SysWOW64\Lefkjkmc.exeC:\Windows\system32\Lefkjkmc.exe91⤵PID:2532
-
C:\Windows\SysWOW64\Libgjj32.exeC:\Windows\system32\Libgjj32.exe92⤵PID:2856
-
C:\Windows\SysWOW64\Llqcfe32.exeC:\Windows\system32\Llqcfe32.exe93⤵PID:1660
-
C:\Windows\SysWOW64\Lplogdmj.exeC:\Windows\system32\Lplogdmj.exe94⤵
- Drops file in System32 directory
PID:2000 -
C:\Windows\SysWOW64\Mgfgdn32.exeC:\Windows\system32\Mgfgdn32.exe95⤵
- Drops file in System32 directory
PID:1588 -
C:\Windows\SysWOW64\Meigpkka.exeC:\Windows\system32\Meigpkka.exe96⤵PID:2020
-
C:\Windows\SysWOW64\Mpolmdkg.exeC:\Windows\system32\Mpolmdkg.exe97⤵
- Drops file in System32 directory
PID:2308 -
C:\Windows\SysWOW64\Mcmhiojk.exeC:\Windows\system32\Mcmhiojk.exe98⤵PID:1512
-
C:\Windows\SysWOW64\Migpeiag.exeC:\Windows\system32\Migpeiag.exe99⤵PID:1348
-
C:\Windows\SysWOW64\Mkhmma32.exeC:\Windows\system32\Mkhmma32.exe100⤵PID:2180
-
C:\Windows\SysWOW64\Mcodno32.exeC:\Windows\system32\Mcodno32.exe101⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2040 -
C:\Windows\SysWOW64\Mabejlob.exeC:\Windows\system32\Mabejlob.exe102⤵PID:1284
-
C:\Windows\SysWOW64\Mhlmgf32.exeC:\Windows\system32\Mhlmgf32.exe103⤵PID:3000
-
C:\Windows\SysWOW64\Mlgigdoh.exeC:\Windows\system32\Mlgigdoh.exe104⤵PID:2580
-
C:\Windows\SysWOW64\Mofecpnl.exeC:\Windows\system32\Mofecpnl.exe105⤵PID:2496
-
C:\Windows\SysWOW64\Mnieom32.exeC:\Windows\system32\Mnieom32.exe106⤵PID:1676
-
C:\Windows\SysWOW64\Mepnpj32.exeC:\Windows\system32\Mepnpj32.exe107⤵PID:2372
-
C:\Windows\SysWOW64\Mhnjle32.exeC:\Windows\system32\Mhnjle32.exe108⤵PID:1460
-
C:\Windows\SysWOW64\Mkmfhacp.exeC:\Windows\system32\Mkmfhacp.exe109⤵PID:2832
-
C:\Windows\SysWOW64\Mnkbdlbd.exeC:\Windows\system32\Mnkbdlbd.exe110⤵PID:900
-
C:\Windows\SysWOW64\Mhqfbebj.exeC:\Windows\system32\Mhqfbebj.exe111⤵PID:1888
-
C:\Windows\SysWOW64\Mkobnqan.exeC:\Windows\system32\Mkobnqan.exe112⤵PID:888
-
C:\Windows\SysWOW64\Nnnojlpa.exeC:\Windows\system32\Nnnojlpa.exe113⤵PID:1792
-
C:\Windows\SysWOW64\Naikkk32.exeC:\Windows\system32\Naikkk32.exe114⤵PID:628
-
C:\Windows\SysWOW64\Ncjgbcoi.exeC:\Windows\system32\Ncjgbcoi.exe115⤵PID:2660
-
C:\Windows\SysWOW64\Nkaocp32.exeC:\Windows\system32\Nkaocp32.exe116⤵
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\Njdpomfe.exeC:\Windows\system32\Njdpomfe.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:2592 -
C:\Windows\SysWOW64\Nlblkhei.exeC:\Windows\system32\Nlblkhei.exe118⤵PID:2652
-
C:\Windows\SysWOW64\Nghphaeo.exeC:\Windows\system32\Nghphaeo.exe119⤵PID:2568
-
C:\Windows\SysWOW64\Nfkpdn32.exeC:\Windows\system32\Nfkpdn32.exe120⤵
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\Nnbhek32.exeC:\Windows\system32\Nnbhek32.exe121⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2908 -
C:\Windows\SysWOW64\Nleiqhcg.exeC:\Windows\system32\Nleiqhcg.exe122⤵PID:576
-
C:\Windows\SysWOW64\Ncoamb32.exeC:\Windows\system32\Ncoamb32.exe123⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1196 -
C:\Windows\SysWOW64\Ngkmnacm.exeC:\Windows\system32\Ngkmnacm.exe124⤵
- Drops file in System32 directory
PID:1280 -
C:\Windows\SysWOW64\Njiijlbp.exeC:\Windows\system32\Njiijlbp.exe125⤵PID:2384
-
C:\Windows\SysWOW64\Nlgefh32.exeC:\Windows\system32\Nlgefh32.exe126⤵PID:2480
-
C:\Windows\SysWOW64\Nbdnoo32.exeC:\Windows\system32\Nbdnoo32.exe127⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2536 -
C:\Windows\SysWOW64\Nhnfkigh.exeC:\Windows\system32\Nhnfkigh.exe128⤵PID:1664
-
C:\Windows\SysWOW64\Nmjblg32.exeC:\Windows\system32\Nmjblg32.exe129⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1528 -
C:\Windows\SysWOW64\Nccjhafn.exeC:\Windows\system32\Nccjhafn.exe130⤵
- Modifies registry class
PID:3028 -
C:\Windows\SysWOW64\Odegpj32.exeC:\Windows\system32\Odegpj32.exe131⤵PID:1316
-
C:\Windows\SysWOW64\Ohqbqhde.exeC:\Windows\system32\Ohqbqhde.exe132⤵PID:1408
-
C:\Windows\SysWOW64\Omloag32.exeC:\Windows\system32\Omloag32.exe133⤵PID:860
-
C:\Windows\SysWOW64\Oojknblb.exeC:\Windows\system32\Oojknblb.exe134⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2208 -
C:\Windows\SysWOW64\Ofdcjm32.exeC:\Windows\system32\Ofdcjm32.exe135⤵PID:2544
-
C:\Windows\SysWOW64\Obkdonic.exeC:\Windows\system32\Obkdonic.exe136⤵PID:320
-
C:\Windows\SysWOW64\Oghlgdgk.exeC:\Windows\system32\Oghlgdgk.exe137⤵
- Drops file in System32 directory
PID:1912 -
C:\Windows\SysWOW64\Ojficpfn.exeC:\Windows\system32\Ojficpfn.exe138⤵
- Modifies registry class
PID:2524 -
C:\Windows\SysWOW64\Onbddoog.exeC:\Windows\system32\Onbddoog.exe139⤵PID:1560
-
C:\Windows\SysWOW64\Oqqapjnk.exeC:\Windows\system32\Oqqapjnk.exe140⤵PID:1772
-
C:\Windows\SysWOW64\Ogjimd32.exeC:\Windows\system32\Ogjimd32.exe141⤵PID:584
-
C:\Windows\SysWOW64\Ojieip32.exeC:\Windows\system32\Ojieip32.exe142⤵PID:760
-
C:\Windows\SysWOW64\Omgaek32.exeC:\Windows\system32\Omgaek32.exe143⤵
- Drops file in System32 directory
PID:1536 -
C:\Windows\SysWOW64\Oenifh32.exeC:\Windows\system32\Oenifh32.exe144⤵PID:2440
-
C:\Windows\SysWOW64\Ocajbekl.exeC:\Windows\system32\Ocajbekl.exe145⤵PID:2612
-
C:\Windows\SysWOW64\Ofpfnqjp.exeC:\Windows\system32\Ofpfnqjp.exe146⤵PID:2956
-
C:\Windows\SysWOW64\Ongnonkb.exeC:\Windows\system32\Ongnonkb.exe147⤵PID:2132
-
C:\Windows\SysWOW64\Pminkk32.exeC:\Windows\system32\Pminkk32.exe148⤵PID:828
-
C:\Windows\SysWOW64\Paejki32.exeC:\Windows\system32\Paejki32.exe149⤵PID:1384
-
C:\Windows\SysWOW64\Pgobhcac.exeC:\Windows\system32\Pgobhcac.exe150⤵PID:3060
-
C:\Windows\SysWOW64\Pfbccp32.exeC:\Windows\system32\Pfbccp32.exe151⤵
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\Pjmodopf.exeC:\Windows\system32\Pjmodopf.exe152⤵PID:1364
-
C:\Windows\SysWOW64\Pmlkpjpj.exeC:\Windows\system32\Pmlkpjpj.exe153⤵PID:848
-
C:\Windows\SysWOW64\Ppjglfon.exeC:\Windows\system32\Ppjglfon.exe154⤵PID:2936
-
C:\Windows\SysWOW64\Pbiciana.exeC:\Windows\system32\Pbiciana.exe155⤵PID:1104
-
C:\Windows\SysWOW64\Pfdpip32.exeC:\Windows\system32\Pfdpip32.exe156⤵PID:2320
-
C:\Windows\SysWOW64\Piblek32.exeC:\Windows\system32\Piblek32.exe157⤵PID:2152
-
C:\Windows\SysWOW64\Plahag32.exeC:\Windows\system32\Plahag32.exe158⤵PID:1796
-
C:\Windows\SysWOW64\Pchpbded.exeC:\Windows\system32\Pchpbded.exe159⤵
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\Pfflopdh.exeC:\Windows\system32\Pfflopdh.exe160⤵PID:764
-
C:\Windows\SysWOW64\Peiljl32.exeC:\Windows\system32\Peiljl32.exe161⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:500 -
C:\Windows\SysWOW64\Pbmmcq32.exeC:\Windows\system32\Pbmmcq32.exe162⤵PID:1840
-
C:\Windows\SysWOW64\Pfiidobe.exeC:\Windows\system32\Pfiidobe.exe163⤵PID:2764
-
C:\Windows\SysWOW64\Pigeqkai.exeC:\Windows\system32\Pigeqkai.exe164⤵PID:2360
-
C:\Windows\SysWOW64\Phjelg32.exeC:\Windows\system32\Phjelg32.exe165⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1556 -
C:\Windows\SysWOW64\Ppamme32.exeC:\Windows\system32\Ppamme32.exe166⤵PID:1272
-
C:\Windows\SysWOW64\Pndniaop.exeC:\Windows\system32\Pndniaop.exe167⤵PID:2136
-
C:\Windows\SysWOW64\Penfelgm.exeC:\Windows\system32\Penfelgm.exe168⤵PID:1244
-
C:\Windows\SysWOW64\Pijbfj32.exeC:\Windows\system32\Pijbfj32.exe169⤵PID:1732
-
C:\Windows\SysWOW64\Qlhnbf32.exeC:\Windows\system32\Qlhnbf32.exe170⤵PID:2636
-
C:\Windows\SysWOW64\Qjknnbed.exeC:\Windows\system32\Qjknnbed.exe171⤵PID:1612
-
C:\Windows\SysWOW64\Qbbfopeg.exeC:\Windows\system32\Qbbfopeg.exe172⤵PID:1860
-
C:\Windows\SysWOW64\Qaefjm32.exeC:\Windows\system32\Qaefjm32.exe173⤵PID:1248
-
C:\Windows\SysWOW64\Qdccfh32.exeC:\Windows\system32\Qdccfh32.exe174⤵PID:2476
-
C:\Windows\SysWOW64\Qhooggdn.exeC:\Windows\system32\Qhooggdn.exe175⤵PID:608
-
C:\Windows\SysWOW64\Qjmkcbcb.exeC:\Windows\system32\Qjmkcbcb.exe176⤵PID:2120
-
C:\Windows\SysWOW64\Qnigda32.exeC:\Windows\system32\Qnigda32.exe177⤵PID:2704
-
C:\Windows\SysWOW64\Qagcpljo.exeC:\Windows\system32\Qagcpljo.exe178⤵PID:2344
-
C:\Windows\SysWOW64\Ahakmf32.exeC:\Windows\system32\Ahakmf32.exe179⤵PID:2268
-
C:\Windows\SysWOW64\Ajphib32.exeC:\Windows\system32\Ajphib32.exe180⤵
- Modifies registry class
PID:836 -
C:\Windows\SysWOW64\Ankdiqih.exeC:\Windows\system32\Ankdiqih.exe181⤵
- Modifies registry class
PID:1424 -
C:\Windows\SysWOW64\Aajpelhl.exeC:\Windows\system32\Aajpelhl.exe182⤵PID:2820
-
C:\Windows\SysWOW64\Aplpai32.exeC:\Windows\system32\Aplpai32.exe183⤵PID:2364
-
C:\Windows\SysWOW64\Ahchbf32.exeC:\Windows\system32\Ahchbf32.exe184⤵PID:2224
-
C:\Windows\SysWOW64\Ajbdna32.exeC:\Windows\system32\Ajbdna32.exe185⤵
- Modifies registry class
PID:1520 -
C:\Windows\SysWOW64\Ampqjm32.exeC:\Windows\system32\Ampqjm32.exe186⤵PID:1172
-
C:\Windows\SysWOW64\Apomfh32.exeC:\Windows\system32\Apomfh32.exe187⤵PID:2560
-
C:\Windows\SysWOW64\Adjigg32.exeC:\Windows\system32\Adjigg32.exe188⤵PID:1036
-
C:\Windows\SysWOW64\Afiecb32.exeC:\Windows\system32\Afiecb32.exe189⤵PID:1604
-
C:\Windows\SysWOW64\Aigaon32.exeC:\Windows\system32\Aigaon32.exe190⤵
- Modifies registry class
PID:2188 -
C:\Windows\SysWOW64\Ambmpmln.exeC:\Windows\system32\Ambmpmln.exe191⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3080 -
C:\Windows\SysWOW64\Apajlhka.exeC:\Windows\system32\Apajlhka.exe192⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3120 -
C:\Windows\SysWOW64\Abpfhcje.exeC:\Windows\system32\Abpfhcje.exe193⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3160 -
C:\Windows\SysWOW64\Afkbib32.exeC:\Windows\system32\Afkbib32.exe194⤵
- Drops file in System32 directory
PID:3200 -
C:\Windows\SysWOW64\Aenbdoii.exeC:\Windows\system32\Aenbdoii.exe195⤵PID:3240
-
C:\Windows\SysWOW64\Amejeljk.exeC:\Windows\system32\Amejeljk.exe196⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3280 -
C:\Windows\SysWOW64\Apcfahio.exeC:\Windows\system32\Apcfahio.exe197⤵
- Drops file in System32 directory
PID:3320 -
C:\Windows\SysWOW64\Abbbnchb.exeC:\Windows\system32\Abbbnchb.exe198⤵PID:3360
-
C:\Windows\SysWOW64\Afmonbqk.exeC:\Windows\system32\Afmonbqk.exe199⤵PID:3400
-
C:\Windows\SysWOW64\Ahokfj32.exeC:\Windows\system32\Ahokfj32.exe200⤵PID:3440
-
C:\Windows\SysWOW64\Aljgfioc.exeC:\Windows\system32\Aljgfioc.exe201⤵
- Modifies registry class
PID:3480 -
C:\Windows\SysWOW64\Boiccdnf.exeC:\Windows\system32\Boiccdnf.exe202⤵PID:3520
-
C:\Windows\SysWOW64\Bagpopmj.exeC:\Windows\system32\Bagpopmj.exe203⤵PID:3560
-
C:\Windows\SysWOW64\Bingpmnl.exeC:\Windows\system32\Bingpmnl.exe204⤵PID:3600
-
C:\Windows\SysWOW64\Bhahlj32.exeC:\Windows\system32\Bhahlj32.exe205⤵PID:3640
-
C:\Windows\SysWOW64\Bkodhe32.exeC:\Windows\system32\Bkodhe32.exe206⤵PID:3680
-
C:\Windows\SysWOW64\Bbflib32.exeC:\Windows\system32\Bbflib32.exe207⤵PID:3720
-
C:\Windows\SysWOW64\Baildokg.exeC:\Windows\system32\Baildokg.exe208⤵PID:3760
-
C:\Windows\SysWOW64\Bdhhqk32.exeC:\Windows\system32\Bdhhqk32.exe209⤵
- Modifies registry class
PID:3804 -
C:\Windows\SysWOW64\Bloqah32.exeC:\Windows\system32\Bloqah32.exe210⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3844 -
C:\Windows\SysWOW64\Bommnc32.exeC:\Windows\system32\Bommnc32.exe211⤵PID:3884
-
C:\Windows\SysWOW64\Bnpmipql.exeC:\Windows\system32\Bnpmipql.exe212⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3924 -
C:\Windows\SysWOW64\Balijo32.exeC:\Windows\system32\Balijo32.exe213⤵PID:3964
-
C:\Windows\SysWOW64\Begeknan.exeC:\Windows\system32\Begeknan.exe214⤵PID:4004
-
C:\Windows\SysWOW64\Bhfagipa.exeC:\Windows\system32\Bhfagipa.exe215⤵
- Drops file in System32 directory
PID:4044 -
C:\Windows\SysWOW64\Bghabf32.exeC:\Windows\system32\Bghabf32.exe216⤵PID:4084
-
C:\Windows\SysWOW64\Bkdmcdoe.exeC:\Windows\system32\Bkdmcdoe.exe217⤵PID:3100
-
C:\Windows\SysWOW64\Bnbjopoi.exeC:\Windows\system32\Bnbjopoi.exe218⤵PID:3148
-
C:\Windows\SysWOW64\Banepo32.exeC:\Windows\system32\Banepo32.exe219⤵
- Drops file in System32 directory
PID:3196 -
C:\Windows\SysWOW64\Bdlblj32.exeC:\Windows\system32\Bdlblj32.exe220⤵PID:3256
-
C:\Windows\SysWOW64\Bgknheej.exeC:\Windows\system32\Bgknheej.exe221⤵PID:3252
-
C:\Windows\SysWOW64\Bkfjhd32.exeC:\Windows\system32\Bkfjhd32.exe222⤵PID:3344
-
C:\Windows\SysWOW64\Bjijdadm.exeC:\Windows\system32\Bjijdadm.exe223⤵PID:3392
-
C:\Windows\SysWOW64\Baqbenep.exeC:\Windows\system32\Baqbenep.exe224⤵PID:3412
-
C:\Windows\SysWOW64\Bpcbqk32.exeC:\Windows\system32\Bpcbqk32.exe225⤵PID:3500
-
C:\Windows\SysWOW64\Bcaomf32.exeC:\Windows\system32\Bcaomf32.exe226⤵PID:3544
-
C:\Windows\SysWOW64\Ckignd32.exeC:\Windows\system32\Ckignd32.exe227⤵PID:3592
-
C:\Windows\SysWOW64\Cngcjo32.exeC:\Windows\system32\Cngcjo32.exe228⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3648 -
C:\Windows\SysWOW64\Cljcelan.exeC:\Windows\system32\Cljcelan.exe229⤵PID:3692
-
C:\Windows\SysWOW64\Cdakgibq.exeC:\Windows\system32\Cdakgibq.exe230⤵PID:3744
-
C:\Windows\SysWOW64\Cgpgce32.exeC:\Windows\system32\Cgpgce32.exe231⤵PID:3796
-
C:\Windows\SysWOW64\Cjndop32.exeC:\Windows\system32\Cjndop32.exe232⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3816 -
C:\Windows\SysWOW64\Cnippoha.exeC:\Windows\system32\Cnippoha.exe233⤵PID:3900
-
C:\Windows\SysWOW64\Cllpkl32.exeC:\Windows\system32\Cllpkl32.exe234⤵
- Modifies registry class
PID:3948 -
C:\Windows\SysWOW64\Coklgg32.exeC:\Windows\system32\Coklgg32.exe235⤵
- Modifies registry class
PID:4000 -
C:\Windows\SysWOW64\Ccfhhffh.exeC:\Windows\system32\Ccfhhffh.exe236⤵
- Modifies registry class
PID:4052 -
C:\Windows\SysWOW64\Cgbdhd32.exeC:\Windows\system32\Cgbdhd32.exe237⤵PID:3076
-
C:\Windows\SysWOW64\Cjpqdp32.exeC:\Windows\system32\Cjpqdp32.exe238⤵PID:3132
-
C:\Windows\SysWOW64\Chcqpmep.exeC:\Windows\system32\Chcqpmep.exe239⤵PID:3188
-
C:\Windows\SysWOW64\Comimg32.exeC:\Windows\system32\Comimg32.exe240⤵
- Modifies registry class
PID:3220 -
C:\Windows\SysWOW64\Cciemedf.exeC:\Windows\system32\Cciemedf.exe241⤵
- Drops file in System32 directory
PID:3328 -