Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 01:52
Static task
static1
Behavioral task
behavioral1
Sample
a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe
Resource
win10v2004-20240508-en
General
-
Target
a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe
-
Size
163KB
-
MD5
7319d5391ebbd3d6f711f2d38ef84061
-
SHA1
3c473afaf767eac384bd57fdc9d49d8bd8ccc75e
-
SHA256
a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189
-
SHA512
6dbc596ffc21adf13c382fdede6e769a32dd86fef4d518ea861813a8746ee3d0f23eb25a470a524c240f85a8516c548703453aa0260accfff017713238de8145
-
SSDEEP
1536:PKqgt4xfIR3G1PhujmlFzoLYyNx9V4lProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:i9t4xf+LYSx9OltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Leimip32.exePbhmnkjf.exePamiog32.exeCadhnmnm.exeFbmcbbki.exeHhckpk32.exeHkhnle32.exeJmhmpb32.exeOhfeog32.exeAplifb32.exeLpjdjmfp.exeFfnphf32.exeHhjhkq32.exeNialog32.exeChpmpg32.exeFmpkjkma.exeLndohedg.exeLphhenhc.exeLjmlbfhi.exeMkclhl32.exeIkhjki32.exeNgfflj32.exeIokfhi32.exePgeefbhm.exeFljafg32.exeGfmemc32.exeKjfjbdle.exeKkaiqk32.exeNiikceid.exeMbpnanch.exeBmmiij32.exeOklkmnbp.exeKfpgmdog.exeKiqpop32.exeHpapln32.exeLijjoe32.exeGjdhbc32.exeIkfmfi32.exeEmeopn32.exeBehnnm32.exeEbjglbml.exeGinnnooi.exeHaiccald.exeJdpndnei.exeBaakhm32.exeDpbheh32.exeAjhgmpfg.exeCcahbp32.exeEqpgol32.exeIdmhkpml.exeMihiih32.exeHapicp32.exeIcmegf32.exeLibicbma.exeMpmapm32.exeEmcbkn32.exeAjejgp32.exeDfffnn32.exeEplkpgnh.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Leimip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pbhmnkjf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pamiog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cadhnmnm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fbmcbbki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhckpk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkhnle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jmhmpb32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pbhmnkjf.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohfeog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aplifb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lpjdjmfp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ffnphf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nialog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Chpmpg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fmpkjkma.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lndohedg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lphhenhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljmlbfhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ffnphf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mkclhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikhjki32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngfflj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iokfhi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pgeefbhm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fljafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfmemc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kjfjbdle.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kkaiqk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Niikceid.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbpnanch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmmiij32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oklkmnbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kfpgmdog.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kiqpop32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpapln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Lijjoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gjdhbc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ikfmfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ikfmfi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emeopn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Behnnm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebjglbml.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ginnnooi.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Haiccald.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdpndnei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Baakhm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpbheh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajhgmpfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ccahbp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqpgol32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Idmhkpml.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mihiih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fljafg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hapicp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icmegf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Libicbma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mpmapm32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Emcbkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emcbkn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ajejgp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfffnn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eplkpgnh.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Cfinoq32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Dbpodagk.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Ddagfm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Djnpnc32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Dnlidb32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Dfgmhd32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Dgfjbgmh.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Emcbkn32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Emeopn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eeqdep32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Emhlfmgj.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Eecqjpee.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Eeempocb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fckjalhj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ennaieib.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eloemi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ffnphf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fdapak32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fbgmbg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fiaeoang.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fmlapp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ghfbqn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gkgkbipp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gdopkn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gkihhhnm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ghmiam32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hgbebiao.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hiqbndpb.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/1724-346-0x00000000002D0000-0x0000000000323000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hpkjko32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hpmgqnfl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hggomh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hlcgeo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hhjhkq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hpapln32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hhmepp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Idceea32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ioijbj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Idfbkq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iokfhi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iajcde32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Igihbknb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Idmhkpml.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jmhmpb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jofiln32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jcdbbloa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jjojofgn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jkbcln32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jnqphi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Joplbl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kihqkagp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kkgmgmfd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kaceodek.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kcbakpdo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kkijmm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kngfih32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kgpjanje.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kjnfniii.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kpkofpgq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kfegbj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kiccofna.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kpmlkp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kfgdhjmk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kifpdelo.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Cfinoq32.exe UPX \Windows\SysWOW64\Dbpodagk.exe UPX \Windows\SysWOW64\Ddagfm32.exe UPX C:\Windows\SysWOW64\Djnpnc32.exe UPX \Windows\SysWOW64\Dnlidb32.exe UPX \Windows\SysWOW64\Dfgmhd32.exe UPX \Windows\SysWOW64\Dgfjbgmh.exe UPX \Windows\SysWOW64\Emcbkn32.exe UPX \Windows\SysWOW64\Emeopn32.exe UPX C:\Windows\SysWOW64\Eeqdep32.exe UPX \Windows\SysWOW64\Emhlfmgj.exe UPX \Windows\SysWOW64\Eecqjpee.exe UPX \Windows\SysWOW64\Eeempocb.exe UPX C:\Windows\SysWOW64\Fckjalhj.exe UPX C:\Windows\SysWOW64\Ennaieib.exe UPX C:\Windows\SysWOW64\Eloemi32.exe UPX C:\Windows\SysWOW64\Ffnphf32.exe UPX C:\Windows\SysWOW64\Fdapak32.exe UPX C:\Windows\SysWOW64\Fbgmbg32.exe UPX C:\Windows\SysWOW64\Fiaeoang.exe UPX C:\Windows\SysWOW64\Fmlapp32.exe UPX C:\Windows\SysWOW64\Ghfbqn32.exe UPX C:\Windows\SysWOW64\Gkgkbipp.exe UPX C:\Windows\SysWOW64\Gdopkn32.exe UPX C:\Windows\SysWOW64\Gkihhhnm.exe UPX C:\Windows\SysWOW64\Ghmiam32.exe UPX C:\Windows\SysWOW64\Hgbebiao.exe UPX C:\Windows\SysWOW64\Hiqbndpb.exe UPX behavioral1/memory/1724-346-0x00000000002D0000-0x0000000000323000-memory.dmp UPX C:\Windows\SysWOW64\Hpkjko32.exe UPX C:\Windows\SysWOW64\Hpmgqnfl.exe UPX C:\Windows\SysWOW64\Hggomh32.exe UPX C:\Windows\SysWOW64\Hlcgeo32.exe UPX C:\Windows\SysWOW64\Hhjhkq32.exe UPX C:\Windows\SysWOW64\Hpapln32.exe UPX C:\Windows\SysWOW64\Hhmepp32.exe UPX C:\Windows\SysWOW64\Idceea32.exe UPX C:\Windows\SysWOW64\Ioijbj32.exe UPX C:\Windows\SysWOW64\Idfbkq32.exe UPX C:\Windows\SysWOW64\Iokfhi32.exe UPX C:\Windows\SysWOW64\Iajcde32.exe UPX C:\Windows\SysWOW64\Igihbknb.exe UPX C:\Windows\SysWOW64\Idmhkpml.exe UPX C:\Windows\SysWOW64\Jmhmpb32.exe UPX C:\Windows\SysWOW64\Jofiln32.exe UPX C:\Windows\SysWOW64\Jcdbbloa.exe UPX C:\Windows\SysWOW64\Jjojofgn.exe UPX C:\Windows\SysWOW64\Jkbcln32.exe UPX C:\Windows\SysWOW64\Jnqphi32.exe UPX C:\Windows\SysWOW64\Joplbl32.exe UPX C:\Windows\SysWOW64\Kihqkagp.exe UPX C:\Windows\SysWOW64\Kkgmgmfd.exe UPX C:\Windows\SysWOW64\Kaceodek.exe UPX C:\Windows\SysWOW64\Kcbakpdo.exe UPX C:\Windows\SysWOW64\Kkijmm32.exe UPX C:\Windows\SysWOW64\Kngfih32.exe UPX C:\Windows\SysWOW64\Kgpjanje.exe UPX C:\Windows\SysWOW64\Kjnfniii.exe UPX C:\Windows\SysWOW64\Kpkofpgq.exe UPX C:\Windows\SysWOW64\Kfegbj32.exe UPX C:\Windows\SysWOW64\Kiccofna.exe UPX C:\Windows\SysWOW64\Kpmlkp32.exe UPX C:\Windows\SysWOW64\Kfgdhjmk.exe UPX C:\Windows\SysWOW64\Kifpdelo.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Cfinoq32.exeDbpodagk.exeDdagfm32.exeDjnpnc32.exeDnlidb32.exeDfgmhd32.exeDgfjbgmh.exeEmcbkn32.exeEmeopn32.exeEeqdep32.exeEmhlfmgj.exeEecqjpee.exeEeempocb.exeEloemi32.exeEnnaieib.exeFckjalhj.exeFfnphf32.exeFdapak32.exeFbgmbg32.exeFiaeoang.exeFmlapp32.exeGhfbqn32.exeGkgkbipp.exeGdopkn32.exeGkihhhnm.exeGhmiam32.exeHgbebiao.exeHiqbndpb.exeHpkjko32.exeHpmgqnfl.exeHggomh32.exeHlcgeo32.exeHhjhkq32.exeHpapln32.exeHhmepp32.exeIdceea32.exeIoijbj32.exeIdfbkq32.exeIokfhi32.exeIajcde32.exeIgihbknb.exeIdmhkpml.exeJmhmpb32.exeJofiln32.exeJcdbbloa.exeJjojofgn.exeJkbcln32.exeJnqphi32.exeJoplbl32.exeKihqkagp.exeKkgmgmfd.exeKaceodek.exeKcbakpdo.exeKkijmm32.exeKngfih32.exeKgpjanje.exeKjnfniii.exeKpkofpgq.exeKfegbj32.exeKiccofna.exeKpmlkp32.exeKfgdhjmk.exeKifpdelo.exeLckdanld.exepid process 2012 Cfinoq32.exe 2840 Dbpodagk.exe 2640 Ddagfm32.exe 2560 Djnpnc32.exe 2816 Dnlidb32.exe 2668 Dfgmhd32.exe 2964 Dgfjbgmh.exe 2252 Emcbkn32.exe 2948 Emeopn32.exe 716 Eeqdep32.exe 2020 Emhlfmgj.exe 2776 Eecqjpee.exe 400 Eeempocb.exe 2304 Eloemi32.exe 1924 Ennaieib.exe 1260 Fckjalhj.exe 592 Ffnphf32.exe 684 Fdapak32.exe 1072 Fbgmbg32.exe 2128 Fiaeoang.exe 1956 Fmlapp32.exe 1936 Ghfbqn32.exe 2108 Gkgkbipp.exe 3032 Gdopkn32.exe 2860 Gkihhhnm.exe 2364 Ghmiam32.exe 2516 Hgbebiao.exe 1724 Hiqbndpb.exe 2360 Hpkjko32.exe 2628 Hpmgqnfl.exe 2656 Hggomh32.exe 2720 Hlcgeo32.exe 2728 Hhjhkq32.exe 2444 Hpapln32.exe 3012 Hhmepp32.exe 2764 Idceea32.exe 2812 Ioijbj32.exe 3000 Idfbkq32.exe 892 Iokfhi32.exe 2684 Iajcde32.exe 880 Igihbknb.exe 2404 Idmhkpml.exe 2316 Jmhmpb32.exe 2528 Jofiln32.exe 2792 Jcdbbloa.exe 1508 Jjojofgn.exe 2088 Jkbcln32.exe 2140 Jnqphi32.exe 1180 Joplbl32.exe 2096 Kihqkagp.exe 972 Kkgmgmfd.exe 1100 Kaceodek.exe 912 Kcbakpdo.exe 2904 Kkijmm32.exe 1176 Kngfih32.exe 1584 Kgpjanje.exe 2144 Kjnfniii.exe 2716 Kpkofpgq.exe 2588 Kfegbj32.exe 2824 Kiccofna.exe 2428 Kpmlkp32.exe 2556 Kfgdhjmk.exe 2796 Kifpdelo.exe 2688 Lckdanld.exe -
Loads dropped DLL 64 IoCs
Processes:
a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exeCfinoq32.exeDbpodagk.exeDdagfm32.exeDjnpnc32.exeDnlidb32.exeDfgmhd32.exeDgfjbgmh.exeEmcbkn32.exeEmeopn32.exeEeqdep32.exeEmhlfmgj.exeEecqjpee.exeEeempocb.exeEloemi32.exeEnnaieib.exeFckjalhj.exeFfnphf32.exeFdapak32.exeFbgmbg32.exeFiaeoang.exeFmlapp32.exeGhfbqn32.exeGkgkbipp.exeGdopkn32.exeGkihhhnm.exeGhmiam32.exeHgbebiao.exeHiqbndpb.exeHpkjko32.exeHpmgqnfl.exeHggomh32.exepid process 3028 a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe 3028 a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe 2012 Cfinoq32.exe 2012 Cfinoq32.exe 2840 Dbpodagk.exe 2840 Dbpodagk.exe 2640 Ddagfm32.exe 2640 Ddagfm32.exe 2560 Djnpnc32.exe 2560 Djnpnc32.exe 2816 Dnlidb32.exe 2816 Dnlidb32.exe 2668 Dfgmhd32.exe 2668 Dfgmhd32.exe 2964 Dgfjbgmh.exe 2964 Dgfjbgmh.exe 2252 Emcbkn32.exe 2252 Emcbkn32.exe 2948 Emeopn32.exe 2948 Emeopn32.exe 716 Eeqdep32.exe 716 Eeqdep32.exe 2020 Emhlfmgj.exe 2020 Emhlfmgj.exe 2776 Eecqjpee.exe 2776 Eecqjpee.exe 400 Eeempocb.exe 400 Eeempocb.exe 2304 Eloemi32.exe 2304 Eloemi32.exe 1924 Ennaieib.exe 1924 Ennaieib.exe 1260 Fckjalhj.exe 1260 Fckjalhj.exe 592 Ffnphf32.exe 592 Ffnphf32.exe 684 Fdapak32.exe 684 Fdapak32.exe 1072 Fbgmbg32.exe 1072 Fbgmbg32.exe 2128 Fiaeoang.exe 2128 Fiaeoang.exe 1956 Fmlapp32.exe 1956 Fmlapp32.exe 1936 Ghfbqn32.exe 1936 Ghfbqn32.exe 2108 Gkgkbipp.exe 2108 Gkgkbipp.exe 3032 Gdopkn32.exe 3032 Gdopkn32.exe 2860 Gkihhhnm.exe 2860 Gkihhhnm.exe 2364 Ghmiam32.exe 2364 Ghmiam32.exe 2516 Hgbebiao.exe 2516 Hgbebiao.exe 1724 Hiqbndpb.exe 1724 Hiqbndpb.exe 2360 Hpkjko32.exe 2360 Hpkjko32.exe 2628 Hpmgqnfl.exe 2628 Hpmgqnfl.exe 2656 Hggomh32.exe 2656 Hggomh32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Kifpdelo.exeDhpiojfb.exeGdjpeifj.exeMelfncqb.exeGhmiam32.exeKfegbj32.exeAjhgmpfg.exeEibbcm32.exeHhckpk32.exeIipgcaob.exeJnpinc32.exeMlfojn32.exeNkiogn32.exePdaoog32.exeNhaikn32.exeLfbpag32.exeBdbhke32.exeEqdajkkb.exeKjifhc32.exeKmjojo32.exeHgbebiao.exeMlkopcge.exeIkhjki32.exeDojald32.exeHaiccald.exeKmefooki.exeMooaljkh.exeLlfifq32.exePjhknm32.exePggbla32.exeGhcoqh32.exeGfmemc32.exeNialog32.exePklhlael.exePamiog32.exeDolnad32.exeKkijmm32.exeCeaadk32.exeNdjfeo32.exeFfnphf32.exeIokfhi32.exeHhjapjmi.exeBdgafdfp.exeGfobbc32.exeDbpodagk.exeFljafg32.exeMhhfdo32.exeHeglio32.exeLanaiahq.exeMpmapm32.exeOklkmnbp.exePbfpik32.exeBfadgq32.exeCcahbp32.exeCpnojioo.exeGikaio32.exeLahkigca.exeAlnqqd32.exeFmlapp32.exeHpapln32.exeGbomfe32.exeEeqdep32.exedescription ioc process File created C:\Windows\SysWOW64\Ocljjp32.dll Kifpdelo.exe File created C:\Windows\SysWOW64\Dlkepi32.exe Dhpiojfb.exe File opened for modification C:\Windows\SysWOW64\Gjdhbc32.exe Gdjpeifj.exe File opened for modification C:\Windows\SysWOW64\Migbnb32.exe Melfncqb.exe File created C:\Windows\SysWOW64\Jjcpjl32.dll Ghmiam32.exe File opened for modification C:\Windows\SysWOW64\Kiccofna.exe Kfegbj32.exe File opened for modification C:\Windows\SysWOW64\Aaaoij32.exe Ajhgmpfg.exe File created C:\Windows\SysWOW64\Ahoanjcc.dll Eibbcm32.exe File created C:\Windows\SysWOW64\Hkaglf32.exe Hhckpk32.exe File created C:\Windows\SysWOW64\Ipjoplgo.exe Iipgcaob.exe File created C:\Windows\SysWOW64\Joaeeklp.exe Jnpinc32.exe File created C:\Windows\SysWOW64\Fpahiebe.dll Mlfojn32.exe File created C:\Windows\SysWOW64\Nnhkcj32.exe Nkiogn32.exe File created C:\Windows\SysWOW64\Bifjqh32.dll Pdaoog32.exe File created C:\Windows\SysWOW64\Nibebfpl.exe Nhaikn32.exe File opened for modification C:\Windows\SysWOW64\Ljmlbfhi.exe Lfbpag32.exe File created C:\Windows\SysWOW64\Ilcbjpbn.dll Bdbhke32.exe File created C:\Windows\SysWOW64\Ffpncj32.dll Eqdajkkb.exe File opened for modification C:\Windows\SysWOW64\Kmgbdo32.exe Kjifhc32.exe File created C:\Windows\SysWOW64\Knklagmb.exe Kmjojo32.exe File opened for modification C:\Windows\SysWOW64\Hiqbndpb.exe Hgbebiao.exe File created C:\Windows\SysWOW64\Dmlphhec.dll Mlkopcge.exe File created C:\Windows\SysWOW64\Jocflgga.exe Ikhjki32.exe File created C:\Windows\SysWOW64\Jdjfho32.dll Dojald32.exe File created C:\Windows\SysWOW64\Hhckpk32.exe Haiccald.exe File created C:\Windows\SysWOW64\Ibcidp32.dll Kmefooki.exe File opened for modification C:\Windows\SysWOW64\Mhhfdo32.exe Mooaljkh.exe File opened for modification C:\Windows\SysWOW64\Loeebl32.exe Llfifq32.exe File created C:\Windows\SysWOW64\Jdmqokqf.dll Pjhknm32.exe File created C:\Windows\SysWOW64\Ppbfpd32.exe Pggbla32.exe File opened for modification C:\Windows\SysWOW64\Gmpgio32.exe Ghcoqh32.exe File created C:\Windows\SysWOW64\Gikaio32.exe Gfmemc32.exe File created C:\Windows\SysWOW64\Mdkjlm32.dll Nialog32.exe File opened for modification C:\Windows\SysWOW64\Pbfpik32.exe Pklhlael.exe File created C:\Windows\SysWOW64\Obmhdd32.dll Pamiog32.exe File created C:\Windows\SysWOW64\Dfffnn32.exe Dolnad32.exe File created C:\Windows\SysWOW64\Kngfih32.exe Kkijmm32.exe File created C:\Windows\SysWOW64\Jjhhpp32.dll Ceaadk32.exe File created C:\Windows\SysWOW64\Dfdjhndl.exe Dojald32.exe File created C:\Windows\SysWOW64\Ngibaj32.exe Ndjfeo32.exe File created C:\Windows\SysWOW64\Fdapak32.exe Ffnphf32.exe File created C:\Windows\SysWOW64\Ehllae32.dll Iokfhi32.exe File created C:\Windows\SysWOW64\Hkhnle32.exe Hhjapjmi.exe File opened for modification C:\Windows\SysWOW64\Behnnm32.exe Bdgafdfp.exe File created C:\Windows\SysWOW64\Bkfeekif.dll Gfobbc32.exe File opened for modification C:\Windows\SysWOW64\Ginnnooi.exe Gfobbc32.exe File opened for modification C:\Windows\SysWOW64\Ddagfm32.exe Dbpodagk.exe File created C:\Windows\SysWOW64\Gallbqdi.dll Fljafg32.exe File opened for modification C:\Windows\SysWOW64\Mponel32.exe Mhhfdo32.exe File created C:\Windows\SysWOW64\Biddmpnf.dll Heglio32.exe File created C:\Windows\SysWOW64\Jkfalhjp.dll Lanaiahq.exe File opened for modification C:\Windows\SysWOW64\Mooaljkh.exe Mpmapm32.exe File created C:\Windows\SysWOW64\Oddpfc32.exe Oklkmnbp.exe File opened for modification C:\Windows\SysWOW64\Pjadmnic.exe Pbfpik32.exe File opened for modification C:\Windows\SysWOW64\Bafidiio.exe Bfadgq32.exe File created C:\Windows\SysWOW64\Gojbjm32.dll Ccahbp32.exe File created C:\Windows\SysWOW64\Mnghjbjl.dll Cpnojioo.exe File created C:\Windows\SysWOW64\Gpejeihi.exe Gikaio32.exe File opened for modification C:\Windows\SysWOW64\Lajhofao.exe Lahkigca.exe File opened for modification C:\Windows\SysWOW64\Anlmmp32.exe Alnqqd32.exe File opened for modification C:\Windows\SysWOW64\Ghfbqn32.exe Fmlapp32.exe File created C:\Windows\SysWOW64\Bdhaablp.dll Hpapln32.exe File opened for modification C:\Windows\SysWOW64\Gjfdhbld.exe Gbomfe32.exe File created C:\Windows\SysWOW64\Emhlfmgj.exe Eeqdep32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4112 3336 WerFault.exe Nlhgoqhh.exe -
Modifies registry class 64 IoCs
Processes:
Ipgbjl32.exeHpapln32.exeJkoplhip.exeKfpgmdog.exeHggomh32.exeAplifb32.exeBmpfojmp.exeJqilooij.exeKiqpop32.exeAjejgp32.exeEhgppi32.exea9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exeLckdanld.exeDgjclbdi.exeDglpbbbg.exeFekpnn32.exeJbdonb32.exeKngfih32.exeBafidiio.exeGjdhbc32.exeGfmemc32.exeIokfhi32.exeEjobhppq.exeJmplcp32.exeJoplbl32.exeOhfeog32.exeCklmgb32.exeDookgcij.exeDfgmhd32.exeJofiln32.exeKaceodek.exeCghggc32.exeFfklhqao.exeClilkfnb.exeJnpinc32.exeKkijmm32.exeMkclhl32.exeDpeekh32.exeHapicp32.exeLndohedg.exeFckjalhj.exeFncdgcqm.exeJjpcbe32.exeNlcnda32.exeGkgkbipp.exeLahkigca.exeEcejkf32.exeLeimip32.exeKkgmgmfd.exeKcbakpdo.exeEjkima32.exeHkhnle32.exeAamfnkai.exeFfnphf32.exeNceclqan.exeOqkqkdne.exePggbla32.exeLanaiahq.exeNgibaj32.exeMlkopcge.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dddaaf32.dll" Ipgbjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpapln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cpdcnhnl.dll" Jkoplhip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kfpgmdog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hggomh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aplifb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Keefji32.dll" Bmpfojmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nqdgapkm.dll" Jqilooij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kiqpop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ccnnibig.dll" Ajejgp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehgppi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ipgbjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lckdanld.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dgjclbdi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dglpbbbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fekpnn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbdonb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cddfocpb.dll" Kngfih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Igmdobgi.dll" Bafidiio.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gjdhbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gfmemc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iokfhi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jhgnia32.dll" Ejobhppq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jmplcp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Joplbl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ohfeog32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gellaqbd.dll" Cklmgb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dookgcij.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mkaggelk.dll" Dfgmhd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ldflna32.dll" Jofiln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kaceodek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cghggc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ffklhqao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kaceodek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Clilkfnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghbaee32.dll" Jnpinc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkijmm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mkclhl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dpeekh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hapicp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jnpinc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aepjgc32.dll" Lndohedg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fckjalhj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fncdgcqm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjpcbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjbgng32.dll" Nlcnda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Blnhfb32.dll" Gkgkbipp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bqdgkecq.dll" Lahkigca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ecejkf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Leimip32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kkgmgmfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kcbakpdo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejkima32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hkhnle32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pfioffab.dll" Aamfnkai.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nopodm32.dll" Ffnphf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nceclqan.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oqkqkdne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pggbla32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lanaiahq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngibaj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mlkopcge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exeCfinoq32.exeDbpodagk.exeDdagfm32.exeDjnpnc32.exeDnlidb32.exeDfgmhd32.exeDgfjbgmh.exeEmcbkn32.exeEmeopn32.exeEeqdep32.exeEmhlfmgj.exeEecqjpee.exeEeempocb.exeEloemi32.exeEnnaieib.exedescription pid process target process PID 3028 wrote to memory of 2012 3028 a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe Cfinoq32.exe PID 3028 wrote to memory of 2012 3028 a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe Cfinoq32.exe PID 3028 wrote to memory of 2012 3028 a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe Cfinoq32.exe PID 3028 wrote to memory of 2012 3028 a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe Cfinoq32.exe PID 2012 wrote to memory of 2840 2012 Cfinoq32.exe Dbpodagk.exe PID 2012 wrote to memory of 2840 2012 Cfinoq32.exe Dbpodagk.exe PID 2012 wrote to memory of 2840 2012 Cfinoq32.exe Dbpodagk.exe PID 2012 wrote to memory of 2840 2012 Cfinoq32.exe Dbpodagk.exe PID 2840 wrote to memory of 2640 2840 Dbpodagk.exe Ddagfm32.exe PID 2840 wrote to memory of 2640 2840 Dbpodagk.exe Ddagfm32.exe PID 2840 wrote to memory of 2640 2840 Dbpodagk.exe Ddagfm32.exe PID 2840 wrote to memory of 2640 2840 Dbpodagk.exe Ddagfm32.exe PID 2640 wrote to memory of 2560 2640 Ddagfm32.exe Djnpnc32.exe PID 2640 wrote to memory of 2560 2640 Ddagfm32.exe Djnpnc32.exe PID 2640 wrote to memory of 2560 2640 Ddagfm32.exe Djnpnc32.exe PID 2640 wrote to memory of 2560 2640 Ddagfm32.exe Djnpnc32.exe PID 2560 wrote to memory of 2816 2560 Djnpnc32.exe Dnlidb32.exe PID 2560 wrote to memory of 2816 2560 Djnpnc32.exe Dnlidb32.exe PID 2560 wrote to memory of 2816 2560 Djnpnc32.exe Dnlidb32.exe PID 2560 wrote to memory of 2816 2560 Djnpnc32.exe Dnlidb32.exe PID 2816 wrote to memory of 2668 2816 Dnlidb32.exe Dfgmhd32.exe PID 2816 wrote to memory of 2668 2816 Dnlidb32.exe Dfgmhd32.exe PID 2816 wrote to memory of 2668 2816 Dnlidb32.exe Dfgmhd32.exe PID 2816 wrote to memory of 2668 2816 Dnlidb32.exe Dfgmhd32.exe PID 2668 wrote to memory of 2964 2668 Dfgmhd32.exe Dgfjbgmh.exe PID 2668 wrote to memory of 2964 2668 Dfgmhd32.exe Dgfjbgmh.exe PID 2668 wrote to memory of 2964 2668 Dfgmhd32.exe Dgfjbgmh.exe PID 2668 wrote to memory of 2964 2668 Dfgmhd32.exe Dgfjbgmh.exe PID 2964 wrote to memory of 2252 2964 Dgfjbgmh.exe Emcbkn32.exe PID 2964 wrote to memory of 2252 2964 Dgfjbgmh.exe Emcbkn32.exe PID 2964 wrote to memory of 2252 2964 Dgfjbgmh.exe Emcbkn32.exe PID 2964 wrote to memory of 2252 2964 Dgfjbgmh.exe Emcbkn32.exe PID 2252 wrote to memory of 2948 2252 Emcbkn32.exe Emeopn32.exe PID 2252 wrote to memory of 2948 2252 Emcbkn32.exe Emeopn32.exe PID 2252 wrote to memory of 2948 2252 Emcbkn32.exe Emeopn32.exe PID 2252 wrote to memory of 2948 2252 Emcbkn32.exe Emeopn32.exe PID 2948 wrote to memory of 716 2948 Emeopn32.exe Eeqdep32.exe PID 2948 wrote to memory of 716 2948 Emeopn32.exe Eeqdep32.exe PID 2948 wrote to memory of 716 2948 Emeopn32.exe Eeqdep32.exe PID 2948 wrote to memory of 716 2948 Emeopn32.exe Eeqdep32.exe PID 716 wrote to memory of 2020 716 Eeqdep32.exe Emhlfmgj.exe PID 716 wrote to memory of 2020 716 Eeqdep32.exe Emhlfmgj.exe PID 716 wrote to memory of 2020 716 Eeqdep32.exe Emhlfmgj.exe PID 716 wrote to memory of 2020 716 Eeqdep32.exe Emhlfmgj.exe PID 2020 wrote to memory of 2776 2020 Emhlfmgj.exe Eecqjpee.exe PID 2020 wrote to memory of 2776 2020 Emhlfmgj.exe Eecqjpee.exe PID 2020 wrote to memory of 2776 2020 Emhlfmgj.exe Eecqjpee.exe PID 2020 wrote to memory of 2776 2020 Emhlfmgj.exe Eecqjpee.exe PID 2776 wrote to memory of 400 2776 Eecqjpee.exe Eeempocb.exe PID 2776 wrote to memory of 400 2776 Eecqjpee.exe Eeempocb.exe PID 2776 wrote to memory of 400 2776 Eecqjpee.exe Eeempocb.exe PID 2776 wrote to memory of 400 2776 Eecqjpee.exe Eeempocb.exe PID 400 wrote to memory of 2304 400 Eeempocb.exe Eloemi32.exe PID 400 wrote to memory of 2304 400 Eeempocb.exe Eloemi32.exe PID 400 wrote to memory of 2304 400 Eeempocb.exe Eloemi32.exe PID 400 wrote to memory of 2304 400 Eeempocb.exe Eloemi32.exe PID 2304 wrote to memory of 1924 2304 Eloemi32.exe Ennaieib.exe PID 2304 wrote to memory of 1924 2304 Eloemi32.exe Ennaieib.exe PID 2304 wrote to memory of 1924 2304 Eloemi32.exe Ennaieib.exe PID 2304 wrote to memory of 1924 2304 Eloemi32.exe Ennaieib.exe PID 1924 wrote to memory of 1260 1924 Ennaieib.exe Fckjalhj.exe PID 1924 wrote to memory of 1260 1924 Ennaieib.exe Fckjalhj.exe PID 1924 wrote to memory of 1260 1924 Ennaieib.exe Fckjalhj.exe PID 1924 wrote to memory of 1260 1924 Ennaieib.exe Fckjalhj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe"C:\Users\Admin\AppData\Local\Temp\a9a562b7eb3f0b92ff2033c3d2ff67256df9cf94b80b197d084c376fd602d189.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\Cfinoq32.exeC:\Windows\system32\Cfinoq32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\Dbpodagk.exeC:\Windows\system32\Dbpodagk.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\Ddagfm32.exeC:\Windows\system32\Ddagfm32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\Djnpnc32.exeC:\Windows\system32\Djnpnc32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\Dnlidb32.exeC:\Windows\system32\Dnlidb32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\Dfgmhd32.exeC:\Windows\system32\Dfgmhd32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\Dgfjbgmh.exeC:\Windows\system32\Dgfjbgmh.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\Emcbkn32.exeC:\Windows\system32\Emcbkn32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\Emeopn32.exeC:\Windows\system32\Emeopn32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\Eeqdep32.exeC:\Windows\system32\Eeqdep32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\Emhlfmgj.exeC:\Windows\system32\Emhlfmgj.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\Eecqjpee.exeC:\Windows\system32\Eecqjpee.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\Eeempocb.exeC:\Windows\system32\Eeempocb.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\Eloemi32.exeC:\Windows\system32\Eloemi32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\Ennaieib.exeC:\Windows\system32\Ennaieib.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\Fckjalhj.exeC:\Windows\system32\Fckjalhj.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1260 -
C:\Windows\SysWOW64\Ffnphf32.exeC:\Windows\system32\Ffnphf32.exe18⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:592 -
C:\Windows\SysWOW64\Fdapak32.exeC:\Windows\system32\Fdapak32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:684 -
C:\Windows\SysWOW64\Fbgmbg32.exeC:\Windows\system32\Fbgmbg32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1072 -
C:\Windows\SysWOW64\Fiaeoang.exeC:\Windows\system32\Fiaeoang.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2128 -
C:\Windows\SysWOW64\Fmlapp32.exeC:\Windows\system32\Fmlapp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1956 -
C:\Windows\SysWOW64\Ghfbqn32.exeC:\Windows\system32\Ghfbqn32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1936 -
C:\Windows\SysWOW64\Gkgkbipp.exeC:\Windows\system32\Gkgkbipp.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2108 -
C:\Windows\SysWOW64\Gdopkn32.exeC:\Windows\system32\Gdopkn32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032 -
C:\Windows\SysWOW64\Gkihhhnm.exeC:\Windows\system32\Gkihhhnm.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Windows\SysWOW64\Ghmiam32.exeC:\Windows\system32\Ghmiam32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2364 -
C:\Windows\SysWOW64\Hgbebiao.exeC:\Windows\system32\Hgbebiao.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2516 -
C:\Windows\SysWOW64\Hiqbndpb.exeC:\Windows\system32\Hiqbndpb.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724 -
C:\Windows\SysWOW64\Hpkjko32.exeC:\Windows\system32\Hpkjko32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2360 -
C:\Windows\SysWOW64\Hpmgqnfl.exeC:\Windows\system32\Hpmgqnfl.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2628 -
C:\Windows\SysWOW64\Hggomh32.exeC:\Windows\system32\Hggomh32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2656 -
C:\Windows\SysWOW64\Hlcgeo32.exeC:\Windows\system32\Hlcgeo32.exe33⤵
- Executes dropped EXE
PID:2720 -
C:\Windows\SysWOW64\Hhjhkq32.exeC:\Windows\system32\Hhjhkq32.exe34⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\Hpapln32.exeC:\Windows\system32\Hpapln32.exe35⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2444 -
C:\Windows\SysWOW64\Hhmepp32.exeC:\Windows\system32\Hhmepp32.exe36⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\Idceea32.exeC:\Windows\system32\Idceea32.exe37⤵
- Executes dropped EXE
PID:2764 -
C:\Windows\SysWOW64\Ioijbj32.exeC:\Windows\system32\Ioijbj32.exe38⤵
- Executes dropped EXE
PID:2812 -
C:\Windows\SysWOW64\Idfbkq32.exeC:\Windows\system32\Idfbkq32.exe39⤵
- Executes dropped EXE
PID:3000 -
C:\Windows\SysWOW64\Iokfhi32.exeC:\Windows\system32\Iokfhi32.exe40⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:892 -
C:\Windows\SysWOW64\Iajcde32.exeC:\Windows\system32\Iajcde32.exe41⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\Igihbknb.exeC:\Windows\system32\Igihbknb.exe42⤵
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\Idmhkpml.exeC:\Windows\system32\Idmhkpml.exe43⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2404 -
C:\Windows\SysWOW64\Jmhmpb32.exeC:\Windows\system32\Jmhmpb32.exe44⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\Jofiln32.exeC:\Windows\system32\Jofiln32.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:2528 -
C:\Windows\SysWOW64\Jcdbbloa.exeC:\Windows\system32\Jcdbbloa.exe46⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\Jjojofgn.exeC:\Windows\system32\Jjojofgn.exe47⤵
- Executes dropped EXE
PID:1508 -
C:\Windows\SysWOW64\Jkbcln32.exeC:\Windows\system32\Jkbcln32.exe48⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\Jnqphi32.exeC:\Windows\system32\Jnqphi32.exe49⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\Joplbl32.exeC:\Windows\system32\Joplbl32.exe50⤵
- Executes dropped EXE
- Modifies registry class
PID:1180 -
C:\Windows\SysWOW64\Kihqkagp.exeC:\Windows\system32\Kihqkagp.exe51⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\SysWOW64\Kkgmgmfd.exeC:\Windows\system32\Kkgmgmfd.exe52⤵
- Executes dropped EXE
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\Kaceodek.exeC:\Windows\system32\Kaceodek.exe53⤵
- Executes dropped EXE
- Modifies registry class
PID:1100 -
C:\Windows\SysWOW64\Kcbakpdo.exeC:\Windows\system32\Kcbakpdo.exe54⤵
- Executes dropped EXE
- Modifies registry class
PID:912 -
C:\Windows\SysWOW64\Kkijmm32.exeC:\Windows\system32\Kkijmm32.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2904 -
C:\Windows\SysWOW64\Kngfih32.exeC:\Windows\system32\Kngfih32.exe56⤵
- Executes dropped EXE
- Modifies registry class
PID:1176 -
C:\Windows\SysWOW64\Kgpjanje.exeC:\Windows\system32\Kgpjanje.exe57⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\Kjnfniii.exeC:\Windows\system32\Kjnfniii.exe58⤵
- Executes dropped EXE
PID:2144 -
C:\Windows\SysWOW64\Kpkofpgq.exeC:\Windows\system32\Kpkofpgq.exe59⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\Kfegbj32.exeC:\Windows\system32\Kfegbj32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\Kiccofna.exeC:\Windows\system32\Kiccofna.exe61⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\SysWOW64\Kpmlkp32.exeC:\Windows\system32\Kpmlkp32.exe62⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\SysWOW64\Kfgdhjmk.exeC:\Windows\system32\Kfgdhjmk.exe63⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\SysWOW64\Kifpdelo.exeC:\Windows\system32\Kifpdelo.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\Lckdanld.exeC:\Windows\system32\Lckdanld.exe65⤵
- Executes dropped EXE
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\Lfjqnjkh.exeC:\Windows\system32\Lfjqnjkh.exe66⤵PID:1796
-
C:\Windows\SysWOW64\Llfifq32.exeC:\Windows\system32\Llfifq32.exe67⤵
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\Loeebl32.exeC:\Windows\system32\Loeebl32.exe68⤵PID:540
-
C:\Windows\SysWOW64\Lijjoe32.exeC:\Windows\system32\Lijjoe32.exe69⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1640 -
C:\Windows\SysWOW64\Lhmjkaoc.exeC:\Windows\system32\Lhmjkaoc.exe70⤵PID:2876
-
C:\Windows\SysWOW64\Lbcnhjnj.exeC:\Windows\system32\Lbcnhjnj.exe71⤵PID:1648
-
C:\Windows\SysWOW64\Lafndg32.exeC:\Windows\system32\Lafndg32.exe72⤵PID:1080
-
C:\Windows\SysWOW64\Lkncmmle.exeC:\Windows\system32\Lkncmmle.exe73⤵PID:2044
-
C:\Windows\SysWOW64\Lahkigca.exeC:\Windows\system32\Lahkigca.exe74⤵
- Drops file in System32 directory
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\Lajhofao.exeC:\Windows\system32\Lajhofao.exe75⤵PID:2384
-
C:\Windows\SysWOW64\Ldidkbpb.exeC:\Windows\system32\Ldidkbpb.exe76⤵PID:2288
-
C:\Windows\SysWOW64\Mkclhl32.exeC:\Windows\system32\Mkclhl32.exe77⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1264 -
C:\Windows\SysWOW64\Mmahdggc.exeC:\Windows\system32\Mmahdggc.exe78⤵PID:1616
-
C:\Windows\SysWOW64\Mdkqqa32.exeC:\Windows\system32\Mdkqqa32.exe79⤵PID:2184
-
C:\Windows\SysWOW64\Mihiih32.exeC:\Windows\system32\Mihiih32.exe80⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3060 -
C:\Windows\SysWOW64\Mpbaebdd.exeC:\Windows\system32\Mpbaebdd.exe81⤵PID:2596
-
C:\Windows\SysWOW64\Mbpnanch.exeC:\Windows\system32\Mbpnanch.exe82⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1224 -
C:\Windows\SysWOW64\Mijfnh32.exeC:\Windows\system32\Mijfnh32.exe83⤵PID:2508
-
C:\Windows\SysWOW64\Mpdnkb32.exeC:\Windows\system32\Mpdnkb32.exe84⤵PID:2608
-
C:\Windows\SysWOW64\Mgnfhlin.exeC:\Windows\system32\Mgnfhlin.exe85⤵PID:2680
-
C:\Windows\SysWOW64\Mlkopcge.exeC:\Windows\system32\Mlkopcge.exe86⤵
- Drops file in System32 directory
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\Mgqcmlgl.exeC:\Windows\system32\Mgqcmlgl.exe87⤵PID:1708
-
C:\Windows\SysWOW64\Miooigfo.exeC:\Windows\system32\Miooigfo.exe88⤵PID:2884
-
C:\Windows\SysWOW64\Ncgdbmmp.exeC:\Windows\system32\Ncgdbmmp.exe89⤵PID:1076
-
C:\Windows\SysWOW64\Nialog32.exeC:\Windows\system32\Nialog32.exe90⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1788 -
C:\Windows\SysWOW64\Ncjqhmkm.exeC:\Windows\system32\Ncjqhmkm.exe91⤵PID:2388
-
C:\Windows\SysWOW64\Nehmdhja.exeC:\Windows\system32\Nehmdhja.exe92⤵PID:2808
-
C:\Windows\SysWOW64\Nkeelohh.exeC:\Windows\system32\Nkeelohh.exe93⤵PID:3016
-
C:\Windows\SysWOW64\Naoniipe.exeC:\Windows\system32\Naoniipe.exe94⤵PID:1772
-
C:\Windows\SysWOW64\Nocnbmoo.exeC:\Windows\system32\Nocnbmoo.exe95⤵PID:2908
-
C:\Windows\SysWOW64\Npdjje32.exeC:\Windows\system32\Npdjje32.exe96⤵PID:2204
-
C:\Windows\SysWOW64\Nkiogn32.exeC:\Windows\system32\Nkiogn32.exe97⤵
- Drops file in System32 directory
PID:2572 -
C:\Windows\SysWOW64\Nnhkcj32.exeC:\Windows\system32\Nnhkcj32.exe98⤵PID:1812
-
C:\Windows\SysWOW64\Nceclqan.exeC:\Windows\system32\Nceclqan.exe99⤵
- Modifies registry class
PID:2492 -
C:\Windows\SysWOW64\Oklkmnbp.exeC:\Windows\system32\Oklkmnbp.exe100⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2996 -
C:\Windows\SysWOW64\Oddpfc32.exeC:\Windows\system32\Oddpfc32.exe101⤵PID:2780
-
C:\Windows\SysWOW64\Ogblbo32.exeC:\Windows\system32\Ogblbo32.exe102⤵PID:1620
-
C:\Windows\SysWOW64\Olpdjf32.exeC:\Windows\system32\Olpdjf32.exe103⤵PID:1968
-
C:\Windows\SysWOW64\Oqkqkdne.exeC:\Windows\system32\Oqkqkdne.exe104⤵
- Modifies registry class
PID:1780 -
C:\Windows\SysWOW64\Ogeigofa.exeC:\Windows\system32\Ogeigofa.exe105⤵PID:1472
-
C:\Windows\SysWOW64\Ohfeog32.exeC:\Windows\system32\Ohfeog32.exe106⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:360 -
C:\Windows\SysWOW64\Oclilp32.exeC:\Windows\system32\Oclilp32.exe107⤵PID:1240
-
C:\Windows\SysWOW64\Okgnab32.exeC:\Windows\system32\Okgnab32.exe108⤵PID:1932
-
C:\Windows\SysWOW64\Obafnlpn.exeC:\Windows\system32\Obafnlpn.exe109⤵PID:1624
-
C:\Windows\SysWOW64\Obcccl32.exeC:\Windows\system32\Obcccl32.exe110⤵PID:284
-
C:\Windows\SysWOW64\Pdaoog32.exeC:\Windows\system32\Pdaoog32.exe111⤵
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\Pklhlael.exeC:\Windows\system32\Pklhlael.exe112⤵
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\Pbfpik32.exeC:\Windows\system32\Pbfpik32.exe113⤵
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\Pjadmnic.exeC:\Windows\system32\Pjadmnic.exe114⤵PID:2004
-
C:\Windows\SysWOW64\Pbhmnkjf.exeC:\Windows\system32\Pbhmnkjf.exe115⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2700 -
C:\Windows\SysWOW64\Pgeefbhm.exeC:\Windows\system32\Pgeefbhm.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2868 -
C:\Windows\SysWOW64\Pamiog32.exeC:\Windows\system32\Pamiog32.exe117⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\Pggbla32.exeC:\Windows\system32\Pggbla32.exe118⤵
- Drops file in System32 directory
- Modifies registry class
PID:1720 -
C:\Windows\SysWOW64\Ppbfpd32.exeC:\Windows\system32\Ppbfpd32.exe119⤵PID:2940
-
C:\Windows\SysWOW64\Pjhknm32.exeC:\Windows\system32\Pjhknm32.exe120⤵
- Drops file in System32 directory
PID:2936 -
C:\Windows\SysWOW64\Qmfgjh32.exeC:\Windows\system32\Qmfgjh32.exe121⤵PID:1820
-
C:\Windows\SysWOW64\Qfokbnip.exeC:\Windows\system32\Qfokbnip.exe122⤵PID:1096
-
C:\Windows\SysWOW64\Qimhoi32.exeC:\Windows\system32\Qimhoi32.exe123⤵PID:2412
-
C:\Windows\SysWOW64\Qcbllb32.exeC:\Windows\system32\Qcbllb32.exe124⤵PID:580
-
C:\Windows\SysWOW64\Qfahhm32.exeC:\Windows\system32\Qfahhm32.exe125⤵PID:636
-
C:\Windows\SysWOW64\Aipddi32.exeC:\Windows\system32\Aipddi32.exe126⤵PID:3052
-
C:\Windows\SysWOW64\Alnqqd32.exeC:\Windows\system32\Alnqqd32.exe127⤵
- Drops file in System32 directory
PID:2392 -
C:\Windows\SysWOW64\Anlmmp32.exeC:\Windows\system32\Anlmmp32.exe128⤵PID:1824
-
C:\Windows\SysWOW64\Afcenm32.exeC:\Windows\system32\Afcenm32.exe129⤵PID:2068
-
C:\Windows\SysWOW64\Aplifb32.exeC:\Windows\system32\Aplifb32.exe130⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1612 -
C:\Windows\SysWOW64\Aamfnkai.exeC:\Windows\system32\Aamfnkai.exe131⤵
- Modifies registry class
PID:1764 -
C:\Windows\SysWOW64\Ajejgp32.exeC:\Windows\system32\Ajejgp32.exe132⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2736 -
C:\Windows\SysWOW64\Abmbhn32.exeC:\Windows\system32\Abmbhn32.exe133⤵PID:2436
-
C:\Windows\SysWOW64\Ahikqd32.exeC:\Windows\system32\Ahikqd32.exe134⤵PID:380
-
C:\Windows\SysWOW64\Ajhgmpfg.exeC:\Windows\system32\Ajhgmpfg.exe135⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2924 -
C:\Windows\SysWOW64\Aaaoij32.exeC:\Windows\system32\Aaaoij32.exe136⤵PID:2828
-
C:\Windows\SysWOW64\Adpkee32.exeC:\Windows\system32\Adpkee32.exe137⤵PID:2324
-
C:\Windows\SysWOW64\Ajjcbpdd.exeC:\Windows\system32\Ajjcbpdd.exe138⤵PID:2872
-
C:\Windows\SysWOW64\Aadloj32.exeC:\Windows\system32\Aadloj32.exe139⤵PID:1632
-
C:\Windows\SysWOW64\Bdbhke32.exeC:\Windows\system32\Bdbhke32.exe140⤵
- Drops file in System32 directory
PID:1236 -
C:\Windows\SysWOW64\Bfadgq32.exeC:\Windows\system32\Bfadgq32.exe141⤵
- Drops file in System32 directory
PID:1392 -
C:\Windows\SysWOW64\Bafidiio.exeC:\Windows\system32\Bafidiio.exe142⤵
- Modifies registry class
PID:3020 -
C:\Windows\SysWOW64\Bbhela32.exeC:\Windows\system32\Bbhela32.exe143⤵PID:808
-
C:\Windows\SysWOW64\Bmmiij32.exeC:\Windows\system32\Bmmiij32.exe144⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3064 -
C:\Windows\SysWOW64\Bdgafdfp.exeC:\Windows\system32\Bdgafdfp.exe145⤵
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\Behnnm32.exeC:\Windows\system32\Behnnm32.exe146⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2624 -
C:\Windows\SysWOW64\Bmpfojmp.exeC:\Windows\system32\Bmpfojmp.exe147⤵
- Modifies registry class
PID:1588 -
C:\Windows\SysWOW64\Bpnbkeld.exeC:\Windows\system32\Bpnbkeld.exe148⤵PID:1480
-
C:\Windows\SysWOW64\Bghjhp32.exeC:\Windows\system32\Bghjhp32.exe149⤵PID:2988
-
C:\Windows\SysWOW64\Bifgdk32.exeC:\Windows\system32\Bifgdk32.exe150⤵PID:2064
-
C:\Windows\SysWOW64\Bppoqeja.exeC:\Windows\system32\Bppoqeja.exe151⤵PID:1628
-
C:\Windows\SysWOW64\Baakhm32.exeC:\Windows\system32\Baakhm32.exe152⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:276 -
C:\Windows\SysWOW64\Blgpef32.exeC:\Windows\system32\Blgpef32.exe153⤵PID:1012
-
C:\Windows\SysWOW64\Ccahbp32.exeC:\Windows\system32\Ccahbp32.exe154⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\Cadhnmnm.exeC:\Windows\system32\Cadhnmnm.exe155⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2256 -
C:\Windows\SysWOW64\Clilkfnb.exeC:\Windows\system32\Clilkfnb.exe156⤵
- Modifies registry class
PID:2272 -
C:\Windows\SysWOW64\Cklmgb32.exeC:\Windows\system32\Cklmgb32.exe157⤵
- Modifies registry class
PID:2296 -
C:\Windows\SysWOW64\Ceaadk32.exeC:\Windows\system32\Ceaadk32.exe158⤵
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\Chpmpg32.exeC:\Windows\system32\Chpmpg32.exe159⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1748 -
C:\Windows\SysWOW64\Cnmehnan.exeC:\Windows\system32\Cnmehnan.exe160⤵PID:2284
-
C:\Windows\SysWOW64\Chbjffad.exeC:\Windows\system32\Chbjffad.exe161⤵PID:1504
-
C:\Windows\SysWOW64\Cnobnmpl.exeC:\Windows\system32\Cnobnmpl.exe162⤵PID:1868
-
C:\Windows\SysWOW64\Cpnojioo.exeC:\Windows\system32\Cpnojioo.exe163⤵
- Drops file in System32 directory
PID:1272 -
C:\Windows\SysWOW64\Cghggc32.exeC:\Windows\system32\Cghggc32.exe164⤵
- Modifies registry class
PID:1380 -
C:\Windows\SysWOW64\Cnaocmmi.exeC:\Windows\system32\Cnaocmmi.exe165⤵PID:2732
-
C:\Windows\SysWOW64\Cdlgpgef.exeC:\Windows\system32\Cdlgpgef.exe166⤵PID:2932
-
C:\Windows\SysWOW64\Dgjclbdi.exeC:\Windows\system32\Dgjclbdi.exe167⤵
- Modifies registry class
PID:1144 -
C:\Windows\SysWOW64\Dndlim32.exeC:\Windows\system32\Dndlim32.exe168⤵PID:608
-
C:\Windows\SysWOW64\Dpbheh32.exeC:\Windows\system32\Dpbheh32.exe169⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1384 -
C:\Windows\SysWOW64\Dglpbbbg.exeC:\Windows\system32\Dglpbbbg.exe170⤵
- Modifies registry class
PID:1036 -
C:\Windows\SysWOW64\Djklnnaj.exeC:\Windows\system32\Djklnnaj.exe171⤵PID:2008
-
C:\Windows\SysWOW64\Dpeekh32.exeC:\Windows\system32\Dpeekh32.exe172⤵
- Modifies registry class
PID:2644 -
C:\Windows\SysWOW64\Dbfabp32.exeC:\Windows\system32\Dbfabp32.exe173⤵PID:2532
-
C:\Windows\SysWOW64\Dhpiojfb.exeC:\Windows\system32\Dhpiojfb.exe174⤵
- Drops file in System32 directory
PID:320 -
C:\Windows\SysWOW64\Dlkepi32.exeC:\Windows\system32\Dlkepi32.exe175⤵PID:2472
-
C:\Windows\SysWOW64\Dojald32.exeC:\Windows\system32\Dojald32.exe176⤵
- Drops file in System32 directory
PID:1712 -
C:\Windows\SysWOW64\Dfdjhndl.exeC:\Windows\system32\Dfdjhndl.exe177⤵PID:2504
-
C:\Windows\SysWOW64\Dlnbeh32.exeC:\Windows\system32\Dlnbeh32.exe178⤵PID:2928
-
C:\Windows\SysWOW64\Dolnad32.exeC:\Windows\system32\Dolnad32.exe179⤵
- Drops file in System32 directory
PID:2268 -
C:\Windows\SysWOW64\Dfffnn32.exeC:\Windows\system32\Dfffnn32.exe180⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:976 -
C:\Windows\SysWOW64\Ddigjkid.exeC:\Windows\system32\Ddigjkid.exe181⤵PID:3036
-
C:\Windows\SysWOW64\Dookgcij.exeC:\Windows\system32\Dookgcij.exe182⤵
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\Ebmgcohn.exeC:\Windows\system32\Ebmgcohn.exe183⤵PID:1876
-
C:\Windows\SysWOW64\Eqpgol32.exeC:\Windows\system32\Eqpgol32.exe184⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1064 -
C:\Windows\SysWOW64\Ehgppi32.exeC:\Windows\system32\Ehgppi32.exe185⤵
- Modifies registry class
PID:2856 -
C:\Windows\SysWOW64\Ebodiofk.exeC:\Windows\system32\Ebodiofk.exe186⤵PID:1376
-
C:\Windows\SysWOW64\Ednpej32.exeC:\Windows\system32\Ednpej32.exe187⤵PID:2576
-
C:\Windows\SysWOW64\Ecqqpgli.exeC:\Windows\system32\Ecqqpgli.exe188⤵PID:1776
-
C:\Windows\SysWOW64\Ejkima32.exeC:\Windows\system32\Ejkima32.exe189⤵
- Modifies registry class
PID:1928 -
C:\Windows\SysWOW64\Eqdajkkb.exeC:\Windows\system32\Eqdajkkb.exe190⤵
- Drops file in System32 directory
PID:784 -
C:\Windows\SysWOW64\Egoife32.exeC:\Windows\system32\Egoife32.exe191⤵PID:2132
-
C:\Windows\SysWOW64\Emkaol32.exeC:\Windows\system32\Emkaol32.exe192⤵PID:2496
-
C:\Windows\SysWOW64\Ecejkf32.exeC:\Windows\system32\Ecejkf32.exe193⤵
- Modifies registry class
PID:448 -
C:\Windows\SysWOW64\Ejobhppq.exeC:\Windows\system32\Ejobhppq.exe194⤵
- Modifies registry class
PID:2036 -
C:\Windows\SysWOW64\Eibbcm32.exeC:\Windows\system32\Eibbcm32.exe195⤵
- Drops file in System32 directory
PID:1060 -
C:\Windows\SysWOW64\Eplkpgnh.exeC:\Windows\system32\Eplkpgnh.exe196⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3100 -
C:\Windows\SysWOW64\Ebjglbml.exeC:\Windows\system32\Ebjglbml.exe197⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3140 -
C:\Windows\SysWOW64\Fmpkjkma.exeC:\Windows\system32\Fmpkjkma.exe198⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3180 -
C:\Windows\SysWOW64\Fbmcbbki.exeC:\Windows\system32\Fbmcbbki.exe199⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3220 -
C:\Windows\SysWOW64\Fekpnn32.exeC:\Windows\system32\Fekpnn32.exe200⤵
- Modifies registry class
PID:3260 -
C:\Windows\SysWOW64\Fmbhok32.exeC:\Windows\system32\Fmbhok32.exe201⤵PID:3300
-
C:\Windows\SysWOW64\Fncdgcqm.exeC:\Windows\system32\Fncdgcqm.exe202⤵
- Modifies registry class
PID:3340 -
C:\Windows\SysWOW64\Ffklhqao.exeC:\Windows\system32\Ffklhqao.exe203⤵
- Modifies registry class
PID:3380 -
C:\Windows\SysWOW64\Fiihdlpc.exeC:\Windows\system32\Fiihdlpc.exe204⤵PID:3420
-
C:\Windows\SysWOW64\Flgeqgog.exeC:\Windows\system32\Flgeqgog.exe205⤵PID:3460
-
C:\Windows\SysWOW64\Fbamma32.exeC:\Windows\system32\Fbamma32.exe206⤵PID:3500
-
C:\Windows\SysWOW64\Fadminnn.exeC:\Windows\system32\Fadminnn.exe207⤵PID:3540
-
C:\Windows\SysWOW64\Fljafg32.exeC:\Windows\system32\Fljafg32.exe208⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3612 -
C:\Windows\SysWOW64\Fbdjbaea.exeC:\Windows\system32\Fbdjbaea.exe209⤵PID:3700
-
C:\Windows\SysWOW64\Febfomdd.exeC:\Windows\system32\Febfomdd.exe210⤵PID:3740
-
C:\Windows\SysWOW64\Fhqbkhch.exeC:\Windows\system32\Fhqbkhch.exe211⤵PID:3780
-
C:\Windows\SysWOW64\Gedbdlbb.exeC:\Windows\system32\Gedbdlbb.exe212⤵PID:3824
-
C:\Windows\SysWOW64\Ghcoqh32.exeC:\Windows\system32\Ghcoqh32.exe213⤵
- Drops file in System32 directory
PID:3864 -
C:\Windows\SysWOW64\Gmpgio32.exeC:\Windows\system32\Gmpgio32.exe214⤵PID:3904
-
C:\Windows\SysWOW64\Gdjpeifj.exeC:\Windows\system32\Gdjpeifj.exe215⤵
- Drops file in System32 directory
PID:3944 -
C:\Windows\SysWOW64\Gjdhbc32.exeC:\Windows\system32\Gjdhbc32.exe216⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3984 -
C:\Windows\SysWOW64\Gmbdnn32.exeC:\Windows\system32\Gmbdnn32.exe217⤵PID:4024
-
C:\Windows\SysWOW64\Gbomfe32.exeC:\Windows\system32\Gbomfe32.exe218⤵
- Drops file in System32 directory
PID:4064 -
C:\Windows\SysWOW64\Gjfdhbld.exeC:\Windows\system32\Gjfdhbld.exe219⤵PID:2356
-
C:\Windows\SysWOW64\Gmdadnkh.exeC:\Windows\system32\Gmdadnkh.exe220⤵PID:3108
-
C:\Windows\SysWOW64\Gdniqh32.exeC:\Windows\system32\Gdniqh32.exe221⤵PID:3120
-
C:\Windows\SysWOW64\Gfmemc32.exeC:\Windows\system32\Gfmemc32.exe222⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3212 -
C:\Windows\SysWOW64\Gikaio32.exeC:\Windows\system32\Gikaio32.exe223⤵
- Drops file in System32 directory
PID:3252 -
C:\Windows\SysWOW64\Gpejeihi.exeC:\Windows\system32\Gpejeihi.exe224⤵PID:3316
-
C:\Windows\SysWOW64\Gfobbc32.exeC:\Windows\system32\Gfobbc32.exe225⤵
- Drops file in System32 directory
PID:3360 -
C:\Windows\SysWOW64\Ginnnooi.exeC:\Windows\system32\Ginnnooi.exe226⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3408 -
C:\Windows\SysWOW64\Ghqnjk32.exeC:\Windows\system32\Ghqnjk32.exe227⤵PID:3452
-
C:\Windows\SysWOW64\Hojgfemq.exeC:\Windows\system32\Hojgfemq.exe228⤵PID:3508
-
C:\Windows\SysWOW64\Haiccald.exeC:\Windows\system32\Haiccald.exe229⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3560 -
C:\Windows\SysWOW64\Hhckpk32.exeC:\Windows\system32\Hhckpk32.exe230⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3600 -
C:\Windows\SysWOW64\Hkaglf32.exeC:\Windows\system32\Hkaglf32.exe231⤵PID:3648
-
C:\Windows\SysWOW64\Hbhomd32.exeC:\Windows\system32\Hbhomd32.exe232⤵PID:1212
-
C:\Windows\SysWOW64\Heglio32.exeC:\Windows\system32\Heglio32.exe233⤵
- Drops file in System32 directory
PID:3724 -
C:\Windows\SysWOW64\Hhehek32.exeC:\Windows\system32\Hhehek32.exe234⤵PID:3772
-
C:\Windows\SysWOW64\Hkcdafqb.exeC:\Windows\system32\Hkcdafqb.exe235⤵PID:3820
-
C:\Windows\SysWOW64\Heihnoph.exeC:\Windows\system32\Heihnoph.exe236⤵PID:3884
-
C:\Windows\SysWOW64\Hhgdkjol.exeC:\Windows\system32\Hhgdkjol.exe237⤵PID:3928
-
C:\Windows\SysWOW64\Hkfagfop.exeC:\Windows\system32\Hkfagfop.exe238⤵PID:3980
-
C:\Windows\SysWOW64\Hapicp32.exeC:\Windows\system32\Hapicp32.exe239⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:4032 -
C:\Windows\SysWOW64\Hhjapjmi.exeC:\Windows\system32\Hhjapjmi.exe240⤵
- Drops file in System32 directory
PID:4084 -
C:\Windows\SysWOW64\Hkhnle32.exeC:\Windows\system32\Hkhnle32.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:2320 -
C:\Windows\SysWOW64\Hpefdl32.exeC:\Windows\system32\Hpefdl32.exe242⤵PID:3156