Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe
Resource
win10v2004-20240426-en
General
-
Target
c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe
-
Size
163KB
-
MD5
e04d8d4b317d6f979c60170854799d76
-
SHA1
fe0e3ecf0dbdca71ca45447d2236f95f8570fc1c
-
SHA256
c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8
-
SHA512
55872cbb74dd8206eb48722f5bb04ae02e4c3b6e1176477bbe251afd3a9816af7e67001d5769cff59a0612ee8325c5786cd38b4c0d9025516d34587e6fd108bf
-
SSDEEP
1536:PPB1OIJrr8Bmkq7wb/U6u5wmlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:B1OCrbyMKmltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Dnilobkm.exeDkmmhf32.exeDjbiicon.exeBkdmcdoe.exeDbbkja32.exeEpieghdk.exeDbehoa32.exeKbhbom32.exeLdnhad32.exeIoijbj32.exeLdqegd32.exeOfpfnqjp.exeBebkpn32.exeDgfjbgmh.exeGieojq32.exeOgjimd32.exeOkalbc32.exeCkignd32.exeEgamfkdh.exeBhahlj32.exePjpkjond.exeBalijo32.exeBghabf32.exeDngoibmo.exeDcknbh32.exePmlkpjpj.exeDbpodagk.exeEbpkce32.exeLabhkh32.exeBbdocc32.exeFmjejphb.exeNbfjdn32.exeCnippoha.exeDfijnd32.exeNlblkhei.exePndniaop.exeQagcpljo.exeEmcbkn32.exeKedaeh32.exeMepnpj32.exeFeeiob32.exeLdenbcge.exeDdokpmfo.exeNmjblg32.exeBaildokg.exeHckcmjep.exeNpnhlg32.exeAjbdna32.exeDqhhknjp.exeGaemjbcg.exeQbbfopeg.exeBpcbqk32.exeEloemi32.exeHknach32.exeQjmkcbcb.exeDhjgal32.exeDoobajme.exeEkholjqg.exeDqhhknjp.exeEbbgid32.exeMochnppo.exeComimg32.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dnilobkm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkmmhf32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djbiicon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bkdmcdoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbbkja32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Epieghdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dbehoa32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbhbom32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldnhad32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ioijbj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ldqegd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ofpfnqjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bebkpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dgfjbgmh.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gieojq32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ogjimd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bebkpn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dnilobkm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Okalbc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckignd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Egamfkdh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhahlj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pjpkjond.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Balijo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bghabf32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dngoibmo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcknbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pmlkpjpj.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dbpodagk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebpkce32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Labhkh32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bbdocc32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fmjejphb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbfjdn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnippoha.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfijnd32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nlblkhei.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pndniaop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qagcpljo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Emcbkn32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kedaeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mepnpj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Feeiob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ldenbcge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddokpmfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nmjblg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Baildokg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hckcmjep.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npnhlg32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajbdna32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqhhknjp.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gaemjbcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qbbfopeg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bpcbqk32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eloemi32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hknach32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qjmkcbcb.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhjgal32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doobajme.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ekholjqg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dqhhknjp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ebbgid32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mochnppo.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Comimg32.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Kmimafop.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Kbfeimng.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Khcnad32.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Kbhbom32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kibjkgca.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kbkodl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Keikqhhe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lkfciogm.exe INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\Lfmdnp32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lganiohl.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ldenbcge.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mcjkcplm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Moalhq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mekdekin.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mhjpaf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Menakj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mkmfhacp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mnkbdlbd.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mkobnqan.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nnnojlpa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nghphaeo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nocemcbj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nfmmin32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nqcagfim.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nbdnoo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nccjhafn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nbfjdn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Omloag32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Okalbc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oqndkj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oqqapjnk.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ondajnme.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Oenifh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ofpfnqjp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pminkk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pmlkpjpj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pjpkjond.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Plahag32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pbkpna32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ppoqge32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pbmmcq32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Phjelg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Plfamfpm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pndniaop.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pijbfj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qlhnbf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qagcpljo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ahakmf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ankdiqih.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Amndem32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aplpai32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ajbdna32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aalmklfi.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Apomfh32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Alenki32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Abpfhcje.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Apcfahio.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Abbbnchb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bebkpn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bhahlj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bokphdld.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bdhhqk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bkaqmeah.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Begeknan.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\Kmimafop.exe UPX \Windows\SysWOW64\Kbfeimng.exe UPX C:\Windows\SysWOW64\Khcnad32.exe UPX \Windows\SysWOW64\Kbhbom32.exe UPX C:\Windows\SysWOW64\Kibjkgca.exe UPX C:\Windows\SysWOW64\Kbkodl32.exe UPX C:\Windows\SysWOW64\Keikqhhe.exe UPX C:\Windows\SysWOW64\Lkfciogm.exe UPX \Windows\SysWOW64\Lfmdnp32.exe UPX C:\Windows\SysWOW64\Lganiohl.exe UPX C:\Windows\SysWOW64\Ldenbcge.exe UPX C:\Windows\SysWOW64\Mcjkcplm.exe UPX C:\Windows\SysWOW64\Moalhq32.exe UPX C:\Windows\SysWOW64\Mekdekin.exe UPX C:\Windows\SysWOW64\Mhjpaf32.exe UPX C:\Windows\SysWOW64\Menakj32.exe UPX C:\Windows\SysWOW64\Mkmfhacp.exe UPX C:\Windows\SysWOW64\Mnkbdlbd.exe UPX C:\Windows\SysWOW64\Mkobnqan.exe UPX C:\Windows\SysWOW64\Nnnojlpa.exe UPX C:\Windows\SysWOW64\Nghphaeo.exe UPX C:\Windows\SysWOW64\Nocemcbj.exe UPX C:\Windows\SysWOW64\Nfmmin32.exe UPX C:\Windows\SysWOW64\Nqcagfim.exe UPX C:\Windows\SysWOW64\Nbdnoo32.exe UPX C:\Windows\SysWOW64\Nccjhafn.exe UPX C:\Windows\SysWOW64\Nbfjdn32.exe UPX C:\Windows\SysWOW64\Omloag32.exe UPX C:\Windows\SysWOW64\Okalbc32.exe UPX C:\Windows\SysWOW64\Oqndkj32.exe UPX C:\Windows\SysWOW64\Oqqapjnk.exe UPX C:\Windows\SysWOW64\Ondajnme.exe UPX C:\Windows\SysWOW64\Oenifh32.exe UPX C:\Windows\SysWOW64\Ofpfnqjp.exe UPX C:\Windows\SysWOW64\Pminkk32.exe UPX C:\Windows\SysWOW64\Pmlkpjpj.exe UPX C:\Windows\SysWOW64\Pjpkjond.exe UPX C:\Windows\SysWOW64\Plahag32.exe UPX C:\Windows\SysWOW64\Pbkpna32.exe UPX C:\Windows\SysWOW64\Ppoqge32.exe UPX C:\Windows\SysWOW64\Pbmmcq32.exe UPX C:\Windows\SysWOW64\Phjelg32.exe UPX C:\Windows\SysWOW64\Plfamfpm.exe UPX C:\Windows\SysWOW64\Pndniaop.exe UPX C:\Windows\SysWOW64\Pijbfj32.exe UPX C:\Windows\SysWOW64\Qlhnbf32.exe UPX C:\Windows\SysWOW64\Qagcpljo.exe UPX C:\Windows\SysWOW64\Ahakmf32.exe UPX C:\Windows\SysWOW64\Ankdiqih.exe UPX C:\Windows\SysWOW64\Amndem32.exe UPX C:\Windows\SysWOW64\Aplpai32.exe UPX C:\Windows\SysWOW64\Ajbdna32.exe UPX C:\Windows\SysWOW64\Aalmklfi.exe UPX C:\Windows\SysWOW64\Apomfh32.exe UPX C:\Windows\SysWOW64\Alenki32.exe UPX C:\Windows\SysWOW64\Abpfhcje.exe UPX C:\Windows\SysWOW64\Apcfahio.exe UPX C:\Windows\SysWOW64\Abbbnchb.exe UPX C:\Windows\SysWOW64\Bebkpn32.exe UPX C:\Windows\SysWOW64\Bhahlj32.exe UPX C:\Windows\SysWOW64\Bokphdld.exe UPX C:\Windows\SysWOW64\Bdhhqk32.exe UPX C:\Windows\SysWOW64\Bkaqmeah.exe UPX C:\Windows\SysWOW64\Begeknan.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Kmimafop.exeKbfeimng.exeKfaajlfp.exeKedaeh32.exeKhcnad32.exeKpjfba32.exeKbhbom32.exeKibjkgca.exeKjcgco32.exeKbkodl32.exeKeikqhhe.exeLhggmchi.exeLkfciogm.exeLaplei32.exeLdnhad32.exeLfmdnp32.exeLodlom32.exeLabhkh32.exeLdqegd32.exeLgoacojo.exeLimmokib.exeLpgele32.exeLbfahp32.exeLganiohl.exeLipjejgp.exeLmkfei32.exeLdenbcge.exeLchnnp32.exeLefkjkmc.exeLibgjj32.exeLlqcfe32.exeLplogdmj.exeMcjkcplm.exeMeigpkka.exeMhgclfje.exeMoalhq32.exeMaphdl32.exeMekdekin.exeMhjpaf32.exeMkhmma32.exeMochnppo.exeMenakj32.exeMdqafgnf.exeMlgigdoh.exeMadapkmp.exeMepnpj32.exeMgajhbkg.exeMkmfhacp.exeMnkbdlbd.exeMhqfbebj.exeMkobnqan.exeNnnojlpa.exeNplkfgoe.exeNcjgbcoi.exeNgfcca32.exeNjdpomfe.exeNlblkhei.exeNpnhlg32.exeNcmdhb32.exeNghphaeo.exeNnbhek32.exeNocemcbj.exeNcoamb32.exeNfmmin32.exepid process 1748 Kmimafop.exe 2524 Kbfeimng.exe 2632 Kfaajlfp.exe 3056 Kedaeh32.exe 2460 Khcnad32.exe 2432 Kpjfba32.exe 2944 Kbhbom32.exe 1564 Kibjkgca.exe 2920 Kjcgco32.exe 2720 Kbkodl32.exe 1920 Keikqhhe.exe 1432 Lhggmchi.exe 2780 Lkfciogm.exe 632 Laplei32.exe 2088 Ldnhad32.exe 2664 Lfmdnp32.exe 776 Lodlom32.exe 816 Labhkh32.exe 1512 Ldqegd32.exe 1016 Lgoacojo.exe 1304 Limmokib.exe 1976 Lpgele32.exe 1816 Lbfahp32.exe 928 Lganiohl.exe 2336 Lipjejgp.exe 2188 Lmkfei32.exe 2072 Ldenbcge.exe 2652 Lchnnp32.exe 2792 Lefkjkmc.exe 2600 Libgjj32.exe 1728 Llqcfe32.exe 2584 Lplogdmj.exe 1620 Mcjkcplm.exe 2492 Meigpkka.exe 2508 Mhgclfje.exe 2028 Moalhq32.exe 1676 Maphdl32.exe 1396 Mekdekin.exe 1644 Mhjpaf32.exe 1760 Mkhmma32.exe 1744 Mochnppo.exe 2064 Menakj32.exe 2452 Mdqafgnf.exe 2140 Mlgigdoh.exe 996 Madapkmp.exe 2612 Mepnpj32.exe 2628 Mgajhbkg.exe 2692 Mkmfhacp.exe 1256 Mnkbdlbd.exe 2448 Mhqfbebj.exe 1640 Mkobnqan.exe 3012 Nnnojlpa.exe 1844 Nplkfgoe.exe 2056 Ncjgbcoi.exe 2504 Ngfcca32.exe 1252 Njdpomfe.exe 3028 Nlblkhei.exe 1092 Npnhlg32.exe 1148 Ncmdhb32.exe 916 Nghphaeo.exe 3040 Nnbhek32.exe 2196 Nocemcbj.exe 2544 Ncoamb32.exe 2684 Nfmmin32.exe -
Loads dropped DLL 64 IoCs
Processes:
c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exeKmimafop.exeKbfeimng.exeKfaajlfp.exeKedaeh32.exeKhcnad32.exeKpjfba32.exeKbhbom32.exeKibjkgca.exeKjcgco32.exeKbkodl32.exeKeikqhhe.exeLhggmchi.exeLkfciogm.exeLaplei32.exeLdnhad32.exeLfmdnp32.exeLodlom32.exeLabhkh32.exeLdqegd32.exeLgoacojo.exeLimmokib.exeLpgele32.exeLbfahp32.exeLganiohl.exeLipjejgp.exeLmkfei32.exeLdenbcge.exeLchnnp32.exeLefkjkmc.exeLibgjj32.exeLlqcfe32.exepid process 2192 c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe 2192 c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe 1748 Kmimafop.exe 1748 Kmimafop.exe 2524 Kbfeimng.exe 2524 Kbfeimng.exe 2632 Kfaajlfp.exe 2632 Kfaajlfp.exe 3056 Kedaeh32.exe 3056 Kedaeh32.exe 2460 Khcnad32.exe 2460 Khcnad32.exe 2432 Kpjfba32.exe 2432 Kpjfba32.exe 2944 Kbhbom32.exe 2944 Kbhbom32.exe 1564 Kibjkgca.exe 1564 Kibjkgca.exe 2920 Kjcgco32.exe 2920 Kjcgco32.exe 2720 Kbkodl32.exe 2720 Kbkodl32.exe 1920 Keikqhhe.exe 1920 Keikqhhe.exe 1432 Lhggmchi.exe 1432 Lhggmchi.exe 2780 Lkfciogm.exe 2780 Lkfciogm.exe 632 Laplei32.exe 632 Laplei32.exe 2088 Ldnhad32.exe 2088 Ldnhad32.exe 2664 Lfmdnp32.exe 2664 Lfmdnp32.exe 776 Lodlom32.exe 776 Lodlom32.exe 816 Labhkh32.exe 816 Labhkh32.exe 1512 Ldqegd32.exe 1512 Ldqegd32.exe 1016 Lgoacojo.exe 1016 Lgoacojo.exe 1304 Limmokib.exe 1304 Limmokib.exe 1976 Lpgele32.exe 1976 Lpgele32.exe 1816 Lbfahp32.exe 1816 Lbfahp32.exe 928 Lganiohl.exe 928 Lganiohl.exe 2336 Lipjejgp.exe 2336 Lipjejgp.exe 2188 Lmkfei32.exe 2188 Lmkfei32.exe 2072 Ldenbcge.exe 2072 Ldenbcge.exe 2652 Lchnnp32.exe 2652 Lchnnp32.exe 2792 Lefkjkmc.exe 2792 Lefkjkmc.exe 2600 Libgjj32.exe 2600 Libgjj32.exe 1728 Llqcfe32.exe 1728 Llqcfe32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Nplkfgoe.exeAalmklfi.exeIeqeidnl.exeKpjfba32.exeLhggmchi.exeGkkemh32.exeMaphdl32.exeMepnpj32.exeNgfcca32.exeQhooggdn.exeCbkeib32.exeEloemi32.exeLfmdnp32.exeNjiijlbp.exeQaefjm32.exeCphlljge.exeDkhcmgnl.exeDnilobkm.exeEbgacddo.exeEmeopn32.exeFilldb32.exeHpocfncj.exePfflopdh.exeAajpelhl.exeEkklaj32.exeGpknlk32.exeGieojq32.exeGpmjak32.exeGelppaof.exeHiqbndpb.exeNlblkhei.exeDbpodagk.exeDdeaalpg.exeDfijnd32.exeFfbicfoc.exeGogangdc.exeHlcgeo32.exeBoiccdnf.exeComimg32.exeCopfbfjj.exeGangic32.exeLkfciogm.exeLodlom32.exePgobhcac.exeCdlnkmha.exeDgodbh32.exeKhcnad32.exeDqelenlc.exeFfnphf32.exeGgpimica.exeHahjpbad.exeLdenbcge.exeMeigpkka.exeBnpmipql.exeDhmcfkme.exeEiaiqn32.exeLefkjkmc.exeLibgjj32.exeOgjimd32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ncjgbcoi.exe Nplkfgoe.exe File opened for modification C:\Windows\SysWOW64\Apomfh32.exe Aalmklfi.exe File opened for modification C:\Windows\SysWOW64\Ihoafpmp.exe Ieqeidnl.exe File opened for modification C:\Windows\SysWOW64\Kbhbom32.exe Kpjfba32.exe File created C:\Windows\SysWOW64\Dafebj32.dll Lhggmchi.exe File opened for modification C:\Windows\SysWOW64\Gogangdc.exe Gkkemh32.exe File created C:\Windows\SysWOW64\Mekdekin.exe Maphdl32.exe File opened for modification C:\Windows\SysWOW64\Mgajhbkg.exe Mepnpj32.exe File opened for modification C:\Windows\SysWOW64\Njdpomfe.exe Ngfcca32.exe File created C:\Windows\SysWOW64\Ifclcknc.dll Qhooggdn.exe File created C:\Windows\SysWOW64\Cfgaiaci.exe Cbkeib32.exe File created C:\Windows\SysWOW64\Acpmei32.dll Eloemi32.exe File opened for modification C:\Windows\SysWOW64\Lodlom32.exe Lfmdnp32.exe File opened for modification C:\Windows\SysWOW64\Nqcagfim.exe Njiijlbp.exe File opened for modification C:\Windows\SysWOW64\Qeqbkkej.exe Qaefjm32.exe File created C:\Windows\SysWOW64\Clomqk32.exe Cphlljge.exe File opened for modification C:\Windows\SysWOW64\Ljpghahi.dll Dkhcmgnl.exe File opened for modification C:\Windows\SysWOW64\Dbehoa32.exe Dnilobkm.exe File created C:\Windows\SysWOW64\Eajaoq32.exe Ebgacddo.exe File created C:\Windows\SysWOW64\Kcfdakpf.dll Emeopn32.exe File created C:\Windows\SysWOW64\Jeccgbbh.dll Filldb32.exe File opened for modification C:\Windows\SysWOW64\Hobcak32.exe Hpocfncj.exe File created C:\Windows\SysWOW64\Mhhaff32.dll Pfflopdh.exe File created C:\Windows\SysWOW64\Aplpai32.exe Aajpelhl.exe File created C:\Windows\SysWOW64\Chcphm32.dll Ekklaj32.exe File created C:\Windows\SysWOW64\Gonnhhln.exe Gpknlk32.exe File created C:\Windows\SysWOW64\Ghhofmql.exe Gieojq32.exe File opened for modification C:\Windows\SysWOW64\Gbkgnfbd.exe Gpmjak32.exe File created C:\Windows\SysWOW64\Ghkllmoi.exe Gelppaof.exe File created C:\Windows\SysWOW64\Njmekj32.dll Hiqbndpb.exe File opened for modification C:\Windows\SysWOW64\Npnhlg32.exe Nlblkhei.exe File opened for modification C:\Windows\SysWOW64\Dflkdp32.exe Dbpodagk.exe File created C:\Windows\SysWOW64\Lkcmiimi.dll Dnilobkm.exe File created C:\Windows\SysWOW64\Dhflmk32.dll Ddeaalpg.exe File opened for modification C:\Windows\SysWOW64\Djefobmk.exe Dfijnd32.exe File created C:\Windows\SysWOW64\Feeiob32.exe Ffbicfoc.exe File created C:\Windows\SysWOW64\Gmjaic32.exe Gogangdc.exe File created C:\Windows\SysWOW64\Hciofb32.dll Hlcgeo32.exe File created C:\Windows\SysWOW64\Qeqbkkej.exe Qaefjm32.exe File created C:\Windows\SysWOW64\Dobkmdfq.dll Boiccdnf.exe File opened for modification C:\Windows\SysWOW64\Cciemedf.exe Comimg32.exe File created C:\Windows\SysWOW64\Bioggp32.dll Copfbfjj.exe File opened for modification C:\Windows\SysWOW64\Dgdmmgpj.exe Ddeaalpg.exe File created C:\Windows\SysWOW64\Ldahol32.dll Gangic32.exe File created C:\Windows\SysWOW64\Laplei32.exe Lkfciogm.exe File created C:\Windows\SysWOW64\Ieepoa32.dll Lodlom32.exe File created C:\Windows\SysWOW64\Nofmgl32.dll Pgobhcac.exe File created C:\Windows\SysWOW64\Bbdocc32.exe Boiccdnf.exe File created C:\Windows\SysWOW64\Keledb32.dll Cdlnkmha.exe File created C:\Windows\SysWOW64\Mghjoa32.dll Dgodbh32.exe File created C:\Windows\SysWOW64\Gejcjbah.exe Gangic32.exe File created C:\Windows\SysWOW64\Kpjfba32.exe Khcnad32.exe File created C:\Windows\SysWOW64\Ddagfm32.exe Dqelenlc.exe File opened for modification C:\Windows\SysWOW64\Filldb32.exe Ffnphf32.exe File created C:\Windows\SysWOW64\Kcaipkch.dll Ggpimica.exe File created C:\Windows\SysWOW64\Codpklfq.dll Hahjpbad.exe File created C:\Windows\SysWOW64\Lchnnp32.exe Ldenbcge.exe File created C:\Windows\SysWOW64\Mhgclfje.exe Meigpkka.exe File created C:\Windows\SysWOW64\Qdoneabg.dll Bnpmipql.exe File opened for modification C:\Windows\SysWOW64\Dgodbh32.exe Dhmcfkme.exe File opened for modification C:\Windows\SysWOW64\Eloemi32.exe Eiaiqn32.exe File created C:\Windows\SysWOW64\Libgjj32.exe Lefkjkmc.exe File opened for modification C:\Windows\SysWOW64\Llqcfe32.exe Libgjj32.exe File opened for modification C:\Windows\SysWOW64\Ojieip32.exe Ogjimd32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 4536 4836 WerFault.exe -
Modifies registry class 64 IoCs
Processes:
Dgmglh32.exeEpieghdk.exeGmjaic32.exeHogmmjfo.exeKedaeh32.exeLibgjj32.exeDbpodagk.exeFhkpmjln.exeLplogdmj.exeCfbhnaho.exeEjgcdb32.exeMhjpaf32.exePmqdkj32.exeBhhnli32.exeGpmjak32.exeLbfahp32.exeLmkfei32.exeLefkjkmc.exeIoijbj32.exeHpapln32.exeHacmcfge.exeLabhkh32.exeFmcoja32.exeNbfjdn32.exeObkdonic.exeBjijdadm.exeKpjfba32.exeNcoamb32.exeNjiijlbp.exeKfaajlfp.exeMlgigdoh.exeCkffgg32.exeDdokpmfo.exeFeeiob32.exeHpocfncj.exeHgilchkf.exeHhjhkq32.exePaggai32.exePchpbded.exeApomfh32.exec2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exeClaifkkf.exeFhhcgj32.exeLfmdnp32.exeAjphib32.exeCgmkmecg.exeFmlapp32.exeHkpnhgge.exeNofabc32.exeQhooggdn.exeApajlhka.exeDbbkja32.exeDgodbh32.exeDkkpbgli.exeLgoacojo.exePjmodopf.exeQaefjm32.exeDjbiicon.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljpghahi.dll" Dgmglh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Epieghdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gcaciakh.dll" Gmjaic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ecmkgokh.dll" Hogmmjfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Olcehoom.dll" Kedaeh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Libgjj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dbpodagk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kegiig32.dll" Fhkpmjln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lplogdmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cfbhnaho.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ejgcdb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hlbpenqj.dll" Lplogdmj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mhjpaf32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmqdkj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhhnli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Gpmjak32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qahgkbeb.dll" Lbfahp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lmkfei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lefkjkmc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ioijbj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Liqebf32.dll" Hpapln32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hacmcfge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hogmmjfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Labhkh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmcoja32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbfjdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Obkdonic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bjijdadm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kpjfba32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncoamb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njiijlbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lggiipie.dll" Kfaajlfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kqdoodim.dll" Mlgigdoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ckffgg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hfbenjka.dll" Ddokpmfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cmbmkg32.dll" Feeiob32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hpocfncj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hgilchkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hhjhkq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ljpojo32.dll" Paggai32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Pchpbded.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Apomfh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Feeiob32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlcdphdj.dll" Claifkkf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fhhcgj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lfmdnp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ajphib32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aiabof32.dll" Cgmkmecg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fmlapp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hkkmeglp.dll" Hkpnhgge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkpnhgge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nofabc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qhooggdn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Qdcbfq32.dll" Fmcoja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpikfj32.dll" Ajphib32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Apajlhka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fglhobmg.dll" Dbbkja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mghjoa32.dll" Dgodbh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkkpbgli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lgoacojo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjmodopf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qaefjm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebagmn32.dll" Djbiicon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exeKmimafop.exeKbfeimng.exeKfaajlfp.exeKedaeh32.exeKhcnad32.exeKpjfba32.exeKbhbom32.exeKibjkgca.exeKjcgco32.exeKbkodl32.exeKeikqhhe.exeLhggmchi.exeLkfciogm.exeLaplei32.exeLdnhad32.exedescription pid process target process PID 2192 wrote to memory of 1748 2192 c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe Kmimafop.exe PID 2192 wrote to memory of 1748 2192 c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe Kmimafop.exe PID 2192 wrote to memory of 1748 2192 c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe Kmimafop.exe PID 2192 wrote to memory of 1748 2192 c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe Kmimafop.exe PID 1748 wrote to memory of 2524 1748 Kmimafop.exe Kbfeimng.exe PID 1748 wrote to memory of 2524 1748 Kmimafop.exe Kbfeimng.exe PID 1748 wrote to memory of 2524 1748 Kmimafop.exe Kbfeimng.exe PID 1748 wrote to memory of 2524 1748 Kmimafop.exe Kbfeimng.exe PID 2524 wrote to memory of 2632 2524 Kbfeimng.exe Kfaajlfp.exe PID 2524 wrote to memory of 2632 2524 Kbfeimng.exe Kfaajlfp.exe PID 2524 wrote to memory of 2632 2524 Kbfeimng.exe Kfaajlfp.exe PID 2524 wrote to memory of 2632 2524 Kbfeimng.exe Kfaajlfp.exe PID 2632 wrote to memory of 3056 2632 Kfaajlfp.exe Kedaeh32.exe PID 2632 wrote to memory of 3056 2632 Kfaajlfp.exe Kedaeh32.exe PID 2632 wrote to memory of 3056 2632 Kfaajlfp.exe Kedaeh32.exe PID 2632 wrote to memory of 3056 2632 Kfaajlfp.exe Kedaeh32.exe PID 3056 wrote to memory of 2460 3056 Kedaeh32.exe Khcnad32.exe PID 3056 wrote to memory of 2460 3056 Kedaeh32.exe Khcnad32.exe PID 3056 wrote to memory of 2460 3056 Kedaeh32.exe Khcnad32.exe PID 3056 wrote to memory of 2460 3056 Kedaeh32.exe Khcnad32.exe PID 2460 wrote to memory of 2432 2460 Khcnad32.exe Kpjfba32.exe PID 2460 wrote to memory of 2432 2460 Khcnad32.exe Kpjfba32.exe PID 2460 wrote to memory of 2432 2460 Khcnad32.exe Kpjfba32.exe PID 2460 wrote to memory of 2432 2460 Khcnad32.exe Kpjfba32.exe PID 2432 wrote to memory of 2944 2432 Kpjfba32.exe Kbhbom32.exe PID 2432 wrote to memory of 2944 2432 Kpjfba32.exe Kbhbom32.exe PID 2432 wrote to memory of 2944 2432 Kpjfba32.exe Kbhbom32.exe PID 2432 wrote to memory of 2944 2432 Kpjfba32.exe Kbhbom32.exe PID 2944 wrote to memory of 1564 2944 Kbhbom32.exe Kibjkgca.exe PID 2944 wrote to memory of 1564 2944 Kbhbom32.exe Kibjkgca.exe PID 2944 wrote to memory of 1564 2944 Kbhbom32.exe Kibjkgca.exe PID 2944 wrote to memory of 1564 2944 Kbhbom32.exe Kibjkgca.exe PID 1564 wrote to memory of 2920 1564 Kibjkgca.exe Kjcgco32.exe PID 1564 wrote to memory of 2920 1564 Kibjkgca.exe Kjcgco32.exe PID 1564 wrote to memory of 2920 1564 Kibjkgca.exe Kjcgco32.exe PID 1564 wrote to memory of 2920 1564 Kibjkgca.exe Kjcgco32.exe PID 2920 wrote to memory of 2720 2920 Kjcgco32.exe Kbkodl32.exe PID 2920 wrote to memory of 2720 2920 Kjcgco32.exe Kbkodl32.exe PID 2920 wrote to memory of 2720 2920 Kjcgco32.exe Kbkodl32.exe PID 2920 wrote to memory of 2720 2920 Kjcgco32.exe Kbkodl32.exe PID 2720 wrote to memory of 1920 2720 Kbkodl32.exe Keikqhhe.exe PID 2720 wrote to memory of 1920 2720 Kbkodl32.exe Keikqhhe.exe PID 2720 wrote to memory of 1920 2720 Kbkodl32.exe Keikqhhe.exe PID 2720 wrote to memory of 1920 2720 Kbkodl32.exe Keikqhhe.exe PID 1920 wrote to memory of 1432 1920 Keikqhhe.exe Lhggmchi.exe PID 1920 wrote to memory of 1432 1920 Keikqhhe.exe Lhggmchi.exe PID 1920 wrote to memory of 1432 1920 Keikqhhe.exe Lhggmchi.exe PID 1920 wrote to memory of 1432 1920 Keikqhhe.exe Lhggmchi.exe PID 1432 wrote to memory of 2780 1432 Lhggmchi.exe Lkfciogm.exe PID 1432 wrote to memory of 2780 1432 Lhggmchi.exe Lkfciogm.exe PID 1432 wrote to memory of 2780 1432 Lhggmchi.exe Lkfciogm.exe PID 1432 wrote to memory of 2780 1432 Lhggmchi.exe Lkfciogm.exe PID 2780 wrote to memory of 632 2780 Lkfciogm.exe Laplei32.exe PID 2780 wrote to memory of 632 2780 Lkfciogm.exe Laplei32.exe PID 2780 wrote to memory of 632 2780 Lkfciogm.exe Laplei32.exe PID 2780 wrote to memory of 632 2780 Lkfciogm.exe Laplei32.exe PID 632 wrote to memory of 2088 632 Laplei32.exe Ldnhad32.exe PID 632 wrote to memory of 2088 632 Laplei32.exe Ldnhad32.exe PID 632 wrote to memory of 2088 632 Laplei32.exe Ldnhad32.exe PID 632 wrote to memory of 2088 632 Laplei32.exe Ldnhad32.exe PID 2088 wrote to memory of 2664 2088 Ldnhad32.exe Lfmdnp32.exe PID 2088 wrote to memory of 2664 2088 Ldnhad32.exe Lfmdnp32.exe PID 2088 wrote to memory of 2664 2088 Ldnhad32.exe Lfmdnp32.exe PID 2088 wrote to memory of 2664 2088 Ldnhad32.exe Lfmdnp32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe"C:\Users\Admin\AppData\Local\Temp\c2a40adec16657aa9663ab3fc3dc9f6e4862c17c9561e993da10646c996129f8.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\Kmimafop.exeC:\Windows\system32\Kmimafop.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\Kbfeimng.exeC:\Windows\system32\Kbfeimng.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\Kfaajlfp.exeC:\Windows\system32\Kfaajlfp.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\Kedaeh32.exeC:\Windows\system32\Kedaeh32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\Khcnad32.exeC:\Windows\system32\Khcnad32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\Kpjfba32.exeC:\Windows\system32\Kpjfba32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\Kbhbom32.exeC:\Windows\system32\Kbhbom32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\Kibjkgca.exeC:\Windows\system32\Kibjkgca.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\Kjcgco32.exeC:\Windows\system32\Kjcgco32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\Kbkodl32.exeC:\Windows\system32\Kbkodl32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Keikqhhe.exeC:\Windows\system32\Keikqhhe.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\Lhggmchi.exeC:\Windows\system32\Lhggmchi.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\Lkfciogm.exeC:\Windows\system32\Lkfciogm.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\Laplei32.exeC:\Windows\system32\Laplei32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\Ldnhad32.exeC:\Windows\system32\Ldnhad32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\Lfmdnp32.exeC:\Windows\system32\Lfmdnp32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2664 -
C:\Windows\SysWOW64\Lodlom32.exeC:\Windows\system32\Lodlom32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:776 -
C:\Windows\SysWOW64\Labhkh32.exeC:\Windows\system32\Labhkh32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:816 -
C:\Windows\SysWOW64\Ldqegd32.exeC:\Windows\system32\Ldqegd32.exe20⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
PID:1512 -
C:\Windows\SysWOW64\Lgoacojo.exeC:\Windows\system32\Lgoacojo.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1016 -
C:\Windows\SysWOW64\Limmokib.exeC:\Windows\system32\Limmokib.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1304 -
C:\Windows\SysWOW64\Lpgele32.exeC:\Windows\system32\Lpgele32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976 -
C:\Windows\SysWOW64\Lbfahp32.exeC:\Windows\system32\Lbfahp32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1816 -
C:\Windows\SysWOW64\Lganiohl.exeC:\Windows\system32\Lganiohl.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Windows\SysWOW64\Lipjejgp.exeC:\Windows\system32\Lipjejgp.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2336 -
C:\Windows\SysWOW64\Lmkfei32.exeC:\Windows\system32\Lmkfei32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2188 -
C:\Windows\SysWOW64\Ldenbcge.exeC:\Windows\system32\Ldenbcge.exe28⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2072 -
C:\Windows\SysWOW64\Lchnnp32.exeC:\Windows\system32\Lchnnp32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2652 -
C:\Windows\SysWOW64\Lefkjkmc.exeC:\Windows\system32\Lefkjkmc.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2792 -
C:\Windows\SysWOW64\Libgjj32.exeC:\Windows\system32\Libgjj32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:2600 -
C:\Windows\SysWOW64\Llqcfe32.exeC:\Windows\system32\Llqcfe32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1728 -
C:\Windows\SysWOW64\Lplogdmj.exeC:\Windows\system32\Lplogdmj.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2584 -
C:\Windows\SysWOW64\Mcjkcplm.exeC:\Windows\system32\Mcjkcplm.exe34⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\Meigpkka.exeC:\Windows\system32\Meigpkka.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Mhgclfje.exeC:\Windows\system32\Mhgclfje.exe36⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\Moalhq32.exeC:\Windows\system32\Moalhq32.exe37⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\Maphdl32.exeC:\Windows\system32\Maphdl32.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1676 -
C:\Windows\SysWOW64\Mekdekin.exeC:\Windows\system32\Mekdekin.exe39⤵
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\Mhjpaf32.exeC:\Windows\system32\Mhjpaf32.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:1644 -
C:\Windows\SysWOW64\Mkhmma32.exeC:\Windows\system32\Mkhmma32.exe41⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\Mochnppo.exeC:\Windows\system32\Mochnppo.exe42⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1744 -
C:\Windows\SysWOW64\Menakj32.exeC:\Windows\system32\Menakj32.exe43⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\Mdqafgnf.exeC:\Windows\system32\Mdqafgnf.exe44⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\Mlgigdoh.exeC:\Windows\system32\Mlgigdoh.exe45⤵
- Executes dropped EXE
- Modifies registry class
PID:2140 -
C:\Windows\SysWOW64\Madapkmp.exeC:\Windows\system32\Madapkmp.exe46⤵
- Executes dropped EXE
PID:996 -
C:\Windows\SysWOW64\Mepnpj32.exeC:\Windows\system32\Mepnpj32.exe47⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:2612 -
C:\Windows\SysWOW64\Mgajhbkg.exeC:\Windows\system32\Mgajhbkg.exe48⤵
- Executes dropped EXE
PID:2628 -
C:\Windows\SysWOW64\Mkmfhacp.exeC:\Windows\system32\Mkmfhacp.exe49⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\Mnkbdlbd.exeC:\Windows\system32\Mnkbdlbd.exe50⤵
- Executes dropped EXE
PID:1256 -
C:\Windows\SysWOW64\Mhqfbebj.exeC:\Windows\system32\Mhqfbebj.exe51⤵
- Executes dropped EXE
PID:2448 -
C:\Windows\SysWOW64\Mkobnqan.exeC:\Windows\system32\Mkobnqan.exe52⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\SysWOW64\Nnnojlpa.exeC:\Windows\system32\Nnnojlpa.exe53⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\Nplkfgoe.exeC:\Windows\system32\Nplkfgoe.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1844 -
C:\Windows\SysWOW64\Ncjgbcoi.exeC:\Windows\system32\Ncjgbcoi.exe55⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\Ngfcca32.exeC:\Windows\system32\Ngfcca32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\Njdpomfe.exeC:\Windows\system32\Njdpomfe.exe57⤵
- Executes dropped EXE
PID:1252 -
C:\Windows\SysWOW64\Nlblkhei.exeC:\Windows\system32\Nlblkhei.exe58⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3028 -
C:\Windows\SysWOW64\Npnhlg32.exeC:\Windows\system32\Npnhlg32.exe59⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1092 -
C:\Windows\SysWOW64\Ncmdhb32.exeC:\Windows\system32\Ncmdhb32.exe60⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\Nghphaeo.exeC:\Windows\system32\Nghphaeo.exe61⤵
- Executes dropped EXE
PID:916 -
C:\Windows\SysWOW64\Nnbhek32.exeC:\Windows\system32\Nnbhek32.exe62⤵
- Executes dropped EXE
PID:3040 -
C:\Windows\SysWOW64\Nocemcbj.exeC:\Windows\system32\Nocemcbj.exe63⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\Ncoamb32.exeC:\Windows\system32\Ncoamb32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:2544 -
C:\Windows\SysWOW64\Nfmmin32.exeC:\Windows\system32\Nfmmin32.exe65⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\Njiijlbp.exeC:\Windows\system32\Njiijlbp.exe66⤵
- Drops file in System32 directory
- Modifies registry class
PID:2904 -
C:\Windows\SysWOW64\Nqcagfim.exeC:\Windows\system32\Nqcagfim.exe67⤵PID:2940
-
C:\Windows\SysWOW64\Nofabc32.exeC:\Windows\system32\Nofabc32.exe68⤵
- Modifies registry class
PID:968 -
C:\Windows\SysWOW64\Nbdnoo32.exeC:\Windows\system32\Nbdnoo32.exe69⤵PID:2788
-
C:\Windows\SysWOW64\Njkfpl32.exeC:\Windows\system32\Njkfpl32.exe70⤵PID:2284
-
C:\Windows\SysWOW64\Nmjblg32.exeC:\Windows\system32\Nmjblg32.exe71⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2532 -
C:\Windows\SysWOW64\Nohnhc32.exeC:\Windows\system32\Nohnhc32.exe72⤵PID:2368
-
C:\Windows\SysWOW64\Nccjhafn.exeC:\Windows\system32\Nccjhafn.exe73⤵PID:1312
-
C:\Windows\SysWOW64\Nbfjdn32.exeC:\Windows\system32\Nbfjdn32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:1812 -
C:\Windows\SysWOW64\Odegpj32.exeC:\Windows\system32\Odegpj32.exe75⤵PID:2100
-
C:\Windows\SysWOW64\Omloag32.exeC:\Windows\system32\Omloag32.exe76⤵PID:600
-
C:\Windows\SysWOW64\Okoomd32.exeC:\Windows\system32\Okoomd32.exe77⤵PID:820
-
C:\Windows\SysWOW64\Oojknblb.exeC:\Windows\system32\Oojknblb.exe78⤵PID:2808
-
C:\Windows\SysWOW64\Obigjnkf.exeC:\Windows\system32\Obigjnkf.exe79⤵PID:2688
-
C:\Windows\SysWOW64\Ofdcjm32.exeC:\Windows\system32\Ofdcjm32.exe80⤵PID:588
-
C:\Windows\SysWOW64\Oicpfh32.exeC:\Windows\system32\Oicpfh32.exe81⤵PID:2528
-
C:\Windows\SysWOW64\Ogfpbeim.exeC:\Windows\system32\Ogfpbeim.exe82⤵PID:2152
-
C:\Windows\SysWOW64\Okalbc32.exeC:\Windows\system32\Okalbc32.exe83⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2616 -
C:\Windows\SysWOW64\Oomhcbjp.exeC:\Windows\system32\Oomhcbjp.exe84⤵PID:2608
-
C:\Windows\SysWOW64\Obkdonic.exeC:\Windows\system32\Obkdonic.exe85⤵
- Modifies registry class
PID:2212 -
C:\Windows\SysWOW64\Oqndkj32.exeC:\Windows\system32\Oqndkj32.exe86⤵PID:1856
-
C:\Windows\SysWOW64\Oiellh32.exeC:\Windows\system32\Oiellh32.exe87⤵PID:1736
-
C:\Windows\SysWOW64\Okchhc32.exeC:\Windows\system32\Okchhc32.exe88⤵PID:2700
-
C:\Windows\SysWOW64\Onbddoog.exeC:\Windows\system32\Onbddoog.exe89⤵PID:2036
-
C:\Windows\SysWOW64\Oqqapjnk.exeC:\Windows\system32\Oqqapjnk.exe90⤵PID:1664
-
C:\Windows\SysWOW64\Oelmai32.exeC:\Windows\system32\Oelmai32.exe91⤵PID:2496
-
C:\Windows\SysWOW64\Ogjimd32.exeC:\Windows\system32\Ogjimd32.exe92⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\Ojieip32.exeC:\Windows\system32\Ojieip32.exe93⤵PID:2624
-
C:\Windows\SysWOW64\Ondajnme.exeC:\Windows\system32\Ondajnme.exe94⤵PID:1792
-
C:\Windows\SysWOW64\Omgaek32.exeC:\Windows\system32\Omgaek32.exe95⤵PID:2776
-
C:\Windows\SysWOW64\Oenifh32.exeC:\Windows\system32\Oenifh32.exe96⤵PID:2736
-
C:\Windows\SysWOW64\Ogmfbd32.exeC:\Windows\system32\Ogmfbd32.exe97⤵PID:1724
-
C:\Windows\SysWOW64\Ofpfnqjp.exeC:\Windows\system32\Ofpfnqjp.exe98⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:620 -
C:\Windows\SysWOW64\Ongnonkb.exeC:\Windows\system32\Ongnonkb.exe99⤵PID:860
-
C:\Windows\SysWOW64\Pminkk32.exeC:\Windows\system32\Pminkk32.exe100⤵PID:452
-
C:\Windows\SysWOW64\Pphjgfqq.exeC:\Windows\system32\Pphjgfqq.exe101⤵PID:2680
-
C:\Windows\SysWOW64\Pgobhcac.exeC:\Windows\system32\Pgobhcac.exe102⤵
- Drops file in System32 directory
PID:2108 -
C:\Windows\SysWOW64\Pfbccp32.exeC:\Windows\system32\Pfbccp32.exe103⤵PID:2020
-
C:\Windows\SysWOW64\Pjmodopf.exeC:\Windows\system32\Pjmodopf.exe104⤵
- Modifies registry class
PID:2576 -
C:\Windows\SysWOW64\Pmlkpjpj.exeC:\Windows\system32\Pmlkpjpj.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:944 -
C:\Windows\SysWOW64\Paggai32.exeC:\Windows\system32\Paggai32.exe106⤵
- Modifies registry class
PID:2824 -
C:\Windows\SysWOW64\Ppjglfon.exeC:\Windows\system32\Ppjglfon.exe107⤵PID:1912
-
C:\Windows\SysWOW64\Pbiciana.exeC:\Windows\system32\Pbiciana.exe108⤵PID:2596
-
C:\Windows\SysWOW64\Pfdpip32.exeC:\Windows\system32\Pfdpip32.exe109⤵PID:1672
-
C:\Windows\SysWOW64\Pjpkjond.exeC:\Windows\system32\Pjpkjond.exe110⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2352 -
C:\Windows\SysWOW64\Pmnhfjmg.exeC:\Windows\system32\Pmnhfjmg.exe111⤵PID:2740
-
C:\Windows\SysWOW64\Plahag32.exeC:\Windows\system32\Plahag32.exe112⤵PID:2404
-
C:\Windows\SysWOW64\Ppmdbe32.exeC:\Windows\system32\Ppmdbe32.exe113⤵PID:1284
-
C:\Windows\SysWOW64\Pchpbded.exeC:\Windows\system32\Pchpbded.exe114⤵
- Modifies registry class
PID:2364 -
C:\Windows\SysWOW64\Pbkpna32.exeC:\Windows\system32\Pbkpna32.exe115⤵PID:1000
-
C:\Windows\SysWOW64\Pfflopdh.exeC:\Windows\system32\Pfflopdh.exe116⤵
- Drops file in System32 directory
PID:3052 -
C:\Windows\SysWOW64\Pmqdkj32.exeC:\Windows\system32\Pmqdkj32.exe117⤵
- Modifies registry class
PID:1004 -
C:\Windows\SysWOW64\Plcdgfbo.exeC:\Windows\system32\Plcdgfbo.exe118⤵PID:2264
-
C:\Windows\SysWOW64\Ppoqge32.exeC:\Windows\system32\Ppoqge32.exe119⤵PID:2768
-
C:\Windows\SysWOW64\Pbmmcq32.exeC:\Windows\system32\Pbmmcq32.exe120⤵PID:1688
-
C:\Windows\SysWOW64\Pfiidobe.exeC:\Windows\system32\Pfiidobe.exe121⤵PID:2800
-
C:\Windows\SysWOW64\Phjelg32.exeC:\Windows\system32\Phjelg32.exe122⤵PID:2828
-
C:\Windows\SysWOW64\Plfamfpm.exeC:\Windows\system32\Plfamfpm.exe123⤵PID:1448
-
C:\Windows\SysWOW64\Ppamme32.exeC:\Windows\system32\Ppamme32.exe124⤵PID:2960
-
C:\Windows\SysWOW64\Pndniaop.exeC:\Windows\system32\Pndniaop.exe125⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2080 -
C:\Windows\SysWOW64\Pbpjiphi.exeC:\Windows\system32\Pbpjiphi.exe126⤵PID:2748
-
C:\Windows\SysWOW64\Penfelgm.exeC:\Windows\system32\Penfelgm.exe127⤵PID:1916
-
C:\Windows\SysWOW64\Pijbfj32.exeC:\Windows\system32\Pijbfj32.exe128⤵PID:1624
-
C:\Windows\SysWOW64\Qhmbagfa.exeC:\Windows\system32\Qhmbagfa.exe129⤵PID:1952
-
C:\Windows\SysWOW64\Qlhnbf32.exeC:\Windows\system32\Qlhnbf32.exe130⤵PID:2708
-
C:\Windows\SysWOW64\Qnfjna32.exeC:\Windows\system32\Qnfjna32.exe131⤵PID:2948
-
C:\Windows\SysWOW64\Qbbfopeg.exeC:\Windows\system32\Qbbfopeg.exe132⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1852 -
C:\Windows\SysWOW64\Qbbfopeg.exeC:\Windows\system32\Qbbfopeg.exe133⤵PID:2416
-
C:\Windows\SysWOW64\Qaefjm32.exeC:\Windows\system32\Qaefjm32.exe134⤵
- Drops file in System32 directory
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Qeqbkkej.exeC:\Windows\system32\Qeqbkkej.exe135⤵PID:1528
-
C:\Windows\SysWOW64\Qdccfh32.exeC:\Windows\system32\Qdccfh32.exe136⤵PID:1340
-
C:\Windows\SysWOW64\Qhooggdn.exeC:\Windows\system32\Qhooggdn.exe137⤵
- Drops file in System32 directory
- Modifies registry class
PID:1984 -
C:\Windows\SysWOW64\Qjmkcbcb.exeC:\Windows\system32\Qjmkcbcb.exe138⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2744 -
C:\Windows\SysWOW64\Qnigda32.exeC:\Windows\system32\Qnigda32.exe139⤵PID:2868
-
C:\Windows\SysWOW64\Qmlgonbe.exeC:\Windows\system32\Qmlgonbe.exe140⤵PID:1288
-
C:\Windows\SysWOW64\Qagcpljo.exeC:\Windows\system32\Qagcpljo.exe141⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2816 -
C:\Windows\SysWOW64\Adeplhib.exeC:\Windows\system32\Adeplhib.exe142⤵PID:2468
-
C:\Windows\SysWOW64\Adeplhib.exeC:\Windows\system32\Adeplhib.exe143⤵PID:1520
-
C:\Windows\SysWOW64\Ahakmf32.exeC:\Windows\system32\Ahakmf32.exe144⤵PID:472
-
C:\Windows\SysWOW64\Ajphib32.exeC:\Windows\system32\Ajphib32.exe145⤵
- Modifies registry class
PID:2248 -
C:\Windows\SysWOW64\Ajphib32.exeC:\Windows\system32\Ajphib32.exe146⤵PID:1632
-
C:\Windows\SysWOW64\Ankdiqih.exeC:\Windows\system32\Ankdiqih.exe147⤵PID:2472
-
C:\Windows\SysWOW64\Amndem32.exeC:\Windows\system32\Amndem32.exe148⤵PID:3020
-
C:\Windows\SysWOW64\Aajpelhl.exeC:\Windows\system32\Aajpelhl.exe149⤵
- Drops file in System32 directory
PID:240 -
C:\Windows\SysWOW64\Aplpai32.exeC:\Windows\system32\Aplpai32.exe150⤵PID:1400
-
C:\Windows\SysWOW64\Adhlaggp.exeC:\Windows\system32\Adhlaggp.exe151⤵PID:2588
-
C:\Windows\SysWOW64\Ahchbf32.exeC:\Windows\system32\Ahchbf32.exe152⤵PID:2260
-
C:\Windows\SysWOW64\Ajbdna32.exeC:\Windows\system32\Ajbdna32.exe153⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2836 -
C:\Windows\SysWOW64\Aiedjneg.exeC:\Windows\system32\Aiedjneg.exe154⤵PID:2668
-
C:\Windows\SysWOW64\Ampqjm32.exeC:\Windows\system32\Ampqjm32.exe155⤵PID:1192
-
C:\Windows\SysWOW64\Aalmklfi.exeC:\Windows\system32\Aalmklfi.exe156⤵
- Drops file in System32 directory
PID:1144 -
C:\Windows\SysWOW64\Apomfh32.exeC:\Windows\system32\Apomfh32.exe157⤵
- Modifies registry class
PID:676 -
C:\Windows\SysWOW64\Abmibdlh.exeC:\Windows\system32\Abmibdlh.exe158⤵PID:2276
-
C:\Windows\SysWOW64\Afiecb32.exeC:\Windows\system32\Afiecb32.exe159⤵PID:2476
-
C:\Windows\SysWOW64\Ajdadamj.exeC:\Windows\system32\Ajdadamj.exe160⤵PID:1544
-
C:\Windows\SysWOW64\Ambmpmln.exeC:\Windows\system32\Ambmpmln.exe161⤵PID:752
-
C:\Windows\SysWOW64\Alenki32.exeC:\Windows\system32\Alenki32.exe162⤵PID:1800
-
C:\Windows\SysWOW64\Apajlhka.exeC:\Windows\system32\Apajlhka.exe163⤵
- Modifies registry class
PID:2752 -
C:\Windows\SysWOW64\Admemg32.exeC:\Windows\system32\Admemg32.exe164⤵PID:956
-
C:\Windows\SysWOW64\Abpfhcje.exeC:\Windows\system32\Abpfhcje.exe165⤵PID:1636
-
C:\Windows\SysWOW64\Afkbib32.exeC:\Windows\system32\Afkbib32.exe166⤵PID:908
-
C:\Windows\SysWOW64\Aenbdoii.exeC:\Windows\system32\Aenbdoii.exe167⤵PID:2572
-
C:\Windows\SysWOW64\Aiinen32.exeC:\Windows\system32\Aiinen32.exe168⤵PID:2844
-
C:\Windows\SysWOW64\Amejeljk.exeC:\Windows\system32\Amejeljk.exe169⤵PID:2784
-
C:\Windows\SysWOW64\Apcfahio.exeC:\Windows\system32\Apcfahio.exe170⤵PID:2716
-
C:\Windows\SysWOW64\Aoffmd32.exeC:\Windows\system32\Aoffmd32.exe171⤵PID:1032
-
C:\Windows\SysWOW64\Abbbnchb.exeC:\Windows\system32\Abbbnchb.exe172⤵PID:2604
-
C:\Windows\SysWOW64\Aepojo32.exeC:\Windows\system32\Aepojo32.exe173⤵PID:1500
-
C:\Windows\SysWOW64\Aepojo32.exeC:\Windows\system32\Aepojo32.exe174⤵PID:2728
-
C:\Windows\SysWOW64\Ailkjmpo.exeC:\Windows\system32\Ailkjmpo.exe175⤵PID:2900
-
C:\Windows\SysWOW64\Ahokfj32.exeC:\Windows\system32\Ahokfj32.exe176⤵PID:2400
-
C:\Windows\SysWOW64\Bpfcgg32.exeC:\Windows\system32\Bpfcgg32.exe177⤵PID:2536
-
C:\Windows\SysWOW64\Boiccdnf.exeC:\Windows\system32\Boiccdnf.exe178⤵
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\Bbdocc32.exeC:\Windows\system32\Bbdocc32.exe179⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1740 -
C:\Windows\SysWOW64\Bagpopmj.exeC:\Windows\system32\Bagpopmj.exe180⤵PID:3100
-
C:\Windows\SysWOW64\Bebkpn32.exeC:\Windows\system32\Bebkpn32.exe181⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3140 -
C:\Windows\SysWOW64\Bhahlj32.exeC:\Windows\system32\Bhahlj32.exe182⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3180 -
C:\Windows\SysWOW64\Bkodhe32.exeC:\Windows\system32\Bkodhe32.exe183⤵PID:3220
-
C:\Windows\SysWOW64\Bokphdld.exeC:\Windows\system32\Bokphdld.exe184⤵PID:3260
-
C:\Windows\SysWOW64\Baildokg.exeC:\Windows\system32\Baildokg.exe185⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3300 -
C:\Windows\SysWOW64\Beehencq.exeC:\Windows\system32\Beehencq.exe186⤵PID:3340
-
C:\Windows\SysWOW64\Bdhhqk32.exeC:\Windows\system32\Bdhhqk32.exe187⤵PID:3380
-
C:\Windows\SysWOW64\Bhcdaibd.exeC:\Windows\system32\Bhcdaibd.exe188⤵PID:3420
-
C:\Windows\SysWOW64\Bkaqmeah.exeC:\Windows\system32\Bkaqmeah.exe189⤵PID:3460
-
C:\Windows\SysWOW64\Bommnc32.exeC:\Windows\system32\Bommnc32.exe190⤵PID:3500
-
C:\Windows\SysWOW64\Bnpmipql.exeC:\Windows\system32\Bnpmipql.exe191⤵
- Drops file in System32 directory
PID:3540 -
C:\Windows\SysWOW64\Balijo32.exeC:\Windows\system32\Balijo32.exe192⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3580 -
C:\Windows\SysWOW64\Begeknan.exeC:\Windows\system32\Begeknan.exe193⤵PID:3620
-
C:\Windows\SysWOW64\Bdjefj32.exeC:\Windows\system32\Bdjefj32.exe194⤵PID:3660
-
C:\Windows\SysWOW64\Bhfagipa.exeC:\Windows\system32\Bhfagipa.exe195⤵PID:3700
-
C:\Windows\SysWOW64\Bghabf32.exeC:\Windows\system32\Bghabf32.exe196⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3740 -
C:\Windows\SysWOW64\Bkdmcdoe.exeC:\Windows\system32\Bkdmcdoe.exe197⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3780 -
C:\Windows\SysWOW64\Bopicc32.exeC:\Windows\system32\Bopicc32.exe198⤵PID:3820
-
C:\Windows\SysWOW64\Bnbjopoi.exeC:\Windows\system32\Bnbjopoi.exe199⤵PID:3860
-
C:\Windows\SysWOW64\Banepo32.exeC:\Windows\system32\Banepo32.exe200⤵PID:3900
-
C:\Windows\SysWOW64\Bpafkknm.exeC:\Windows\system32\Bpafkknm.exe201⤵PID:3940
-
C:\Windows\SysWOW64\Bhhnli32.exeC:\Windows\system32\Bhhnli32.exe202⤵
- Modifies registry class
PID:3980 -
C:\Windows\SysWOW64\Bgknheej.exeC:\Windows\system32\Bgknheej.exe203⤵PID:4020
-
C:\Windows\SysWOW64\Bjijdadm.exeC:\Windows\system32\Bjijdadm.exe204⤵
- Modifies registry class
PID:4060 -
C:\Windows\SysWOW64\Bpcbqk32.exeC:\Windows\system32\Bpcbqk32.exe205⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:1552 -
C:\Windows\SysWOW64\Cgmkmecg.exeC:\Windows\system32\Cgmkmecg.exe206⤵PID:3132
-
C:\Windows\SysWOW64\Cgmkmecg.exeC:\Windows\system32\Cgmkmecg.exe207⤵
- Modifies registry class
PID:3172 -
C:\Windows\SysWOW64\Ckignd32.exeC:\Windows\system32\Ckignd32.exe208⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3188 -
C:\Windows\SysWOW64\Cljcelan.exeC:\Windows\system32\Cljcelan.exe209⤵PID:3248
-
C:\Windows\SysWOW64\Cpeofk32.exeC:\Windows\system32\Cpeofk32.exe210⤵PID:3296
-
C:\Windows\SysWOW64\Cdakgibq.exeC:\Windows\system32\Cdakgibq.exe211⤵PID:3352
-
C:\Windows\SysWOW64\Cgpgce32.exeC:\Windows\system32\Cgpgce32.exe212⤵PID:3400
-
C:\Windows\SysWOW64\Cfbhnaho.exeC:\Windows\system32\Cfbhnaho.exe213⤵
- Modifies registry class
PID:3448 -
C:\Windows\SysWOW64\Cnippoha.exeC:\Windows\system32\Cnippoha.exe214⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3508 -
C:\Windows\SysWOW64\Cllpkl32.exeC:\Windows\system32\Cllpkl32.exe215⤵PID:3548
-
C:\Windows\SysWOW64\Cphlljge.exeC:\Windows\system32\Cphlljge.exe216⤵
- Drops file in System32 directory
PID:3616 -
C:\Windows\SysWOW64\Clomqk32.exeC:\Windows\system32\Clomqk32.exe217⤵PID:3648
-
C:\Windows\SysWOW64\Cpjiajeb.exeC:\Windows\system32\Cpjiajeb.exe218⤵PID:3696
-
C:\Windows\SysWOW64\Comimg32.exeC:\Windows\system32\Comimg32.exe219⤵PID:3680
-
C:\Windows\SysWOW64\Comimg32.exeC:\Windows\system32\Comimg32.exe220⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
PID:3788 -
C:\Windows\SysWOW64\Cciemedf.exeC:\Windows\system32\Cciemedf.exe221⤵PID:3808
-
C:\Windows\SysWOW64\Cbkeib32.exeC:\Windows\system32\Cbkeib32.exe222⤵
- Drops file in System32 directory
PID:3856 -
C:\Windows\SysWOW64\Cfgaiaci.exeC:\Windows\system32\Cfgaiaci.exe223⤵PID:3928
-
C:\Windows\SysWOW64\Chemfl32.exeC:\Windows\system32\Chemfl32.exe224⤵PID:3976
-
C:\Windows\SysWOW64\Claifkkf.exeC:\Windows\system32\Claifkkf.exe225⤵
- Modifies registry class
PID:3956 -
C:\Windows\SysWOW64\Ckdjbh32.exeC:\Windows\system32\Ckdjbh32.exe226⤵PID:4072
-
C:\Windows\SysWOW64\Copfbfjj.exeC:\Windows\system32\Copfbfjj.exe227⤵
- Drops file in System32 directory
PID:3112 -
C:\Windows\SysWOW64\Cckace32.exeC:\Windows\system32\Cckace32.exe228⤵PID:3168
-
C:\Windows\SysWOW64\Cbnbobin.exeC:\Windows\system32\Cbnbobin.exe229⤵PID:2312
-
C:\Windows\SysWOW64\Cfinoq32.exeC:\Windows\system32\Cfinoq32.exe230⤵PID:3240
-
C:\Windows\SysWOW64\Cdlnkmha.exeC:\Windows\system32\Cdlnkmha.exe231⤵
- Drops file in System32 directory
PID:3316 -
C:\Windows\SysWOW64\Chhjkl32.exeC:\Windows\system32\Chhjkl32.exe232⤵PID:2316
-
C:\Windows\SysWOW64\Clcflkic.exeC:\Windows\system32\Clcflkic.exe233⤵PID:3432
-
C:\Windows\SysWOW64\Ckffgg32.exeC:\Windows\system32\Ckffgg32.exe234⤵
- Modifies registry class
PID:3492 -
C:\Windows\SysWOW64\Cobbhfhg.exeC:\Windows\system32\Cobbhfhg.exe235⤵PID:3532
-
C:\Windows\SysWOW64\Cndbcc32.exeC:\Windows\system32\Cndbcc32.exe236⤵PID:3628
-
C:\Windows\SysWOW64\Dbpodagk.exeC:\Windows\system32\Dbpodagk.exe237⤵PID:3692
-
C:\Windows\SysWOW64\Dbpodagk.exeC:\Windows\system32\Dbpodagk.exe238⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:3736 -
C:\Windows\SysWOW64\Dflkdp32.exeC:\Windows\system32\Dflkdp32.exe239⤵PID:3796
-
C:\Windows\SysWOW64\Ddokpmfo.exeC:\Windows\system32\Ddokpmfo.exe240⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:3852 -
C:\Windows\SysWOW64\Dhjgal32.exeC:\Windows\system32\Dhjgal32.exe241⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3932 -