Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 05:53
Static task
static1
Behavioral task
behavioral1
Sample
c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe
Resource
win10v2004-20240508-en
General
-
Target
c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe
-
Size
163KB
-
MD5
acc8339588cf6945181b8f13085d156d
-
SHA1
69d88f424040b2908da2c7f5a0e4bb4c05b35253
-
SHA256
c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed
-
SHA512
67b65f161051f51f7646f8e7e16a5e1ebeaba11d430bba8df3d780f4094047698d36b6af30bd70412b20725c2dc689884388849ec66d2be4abd369e9fcc728a4
-
SSDEEP
1536:PguekdY2yqlFcTz8VMuXwNTMJdpFjlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:ISYTkCibJnFjltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Joffnk32.exeMjellmbp.exeNhdlao32.exeIiehpahb.exeIpdqba32.exeNhnlkfpp.exeCbphdn32.exeCkkiccep.exeNjogjfoj.exeGphphj32.exeJpgmha32.exePjffbc32.exeEabbjc32.exeAmpkof32.exeHoiafcic.exeNknobkje.exeAlcfei32.exeEadopc32.exeFnckpmql.exeDhhfedil.exeJmpngk32.exeMkbchk32.exeAjiknpjj.exeBjbfklei.exeOhghgodi.exeMkhapk32.exePhedhmhi.exeCijpahho.exeBdolhc32.exeOjjolnaq.exeFcckif32.exeIinqbn32.exeNnaikd32.exeGdbmhf32.exeMgidml32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Joffnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mjellmbp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhdlao32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iiehpahb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipdqba32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nhnlkfpp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbphdn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ckkiccep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njogjfoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ckkiccep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gphphj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jpgmha32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjffbc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eabbjc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ampkof32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hoiafcic.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nknobkje.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Alcfei32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eadopc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fnckpmql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhhfedil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jmpngk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkbchk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ajiknpjj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjbfklei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ohghgodi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mkhapk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phedhmhi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cijpahho.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bdolhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojjolnaq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fcckif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Iinqbn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnaikd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdbmhf32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mgidml32.exe -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Ifjfnb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Imdnklfp.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3004-22-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iapjlk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ipegmg32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/320-33-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ipegmg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Iinlemia.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jpgdbg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jiphkm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jmkdlkph.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2832-73-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jfdida32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jaimbj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jbkjjblm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jmpngk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jbmfoa32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jkdnpo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jfkoeppq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jiikak32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kbapjafe.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kkihknfg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kmgdgjek.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kpepcedo.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kmjqmi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kdcijcke.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kknafn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kgdbkohf.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kajfig32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kdhbec32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Liekmj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ldkojb32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lkdggmlj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Liggbi32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lcpllo32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2416-289-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3424-301-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/400-303-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1108-309-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3984-343-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3156-349-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1276-359-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1856-372-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4396-382-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2408-384-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4568-396-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3884-420-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nnaikd32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/1604-523-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/388-542-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3348-555-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1120-571-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4280-634-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qbgqio32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Acjjfggb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Blpnib32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bkidenlg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cdfbibnb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Daolnf32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eoolbinc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fcckif32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fcfhof32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fhgjblfq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fbpnkama.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Ifjfnb32.exe UPX C:\Windows\SysWOW64\Imdnklfp.exe UPX behavioral2/memory/3004-22-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Iapjlk32.exe UPX C:\Windows\SysWOW64\Ipegmg32.exe UPX behavioral2/memory/320-33-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Ipegmg32.exe UPX C:\Windows\SysWOW64\Iinlemia.exe UPX C:\Windows\SysWOW64\Jpgdbg32.exe UPX C:\Windows\SysWOW64\Jiphkm32.exe UPX C:\Windows\SysWOW64\Jmkdlkph.exe UPX behavioral2/memory/2832-73-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Jfdida32.exe UPX C:\Windows\SysWOW64\Jaimbj32.exe UPX C:\Windows\SysWOW64\Jbkjjblm.exe UPX C:\Windows\SysWOW64\Jmpngk32.exe UPX C:\Windows\SysWOW64\Jbmfoa32.exe UPX C:\Windows\SysWOW64\Jkdnpo32.exe UPX C:\Windows\SysWOW64\Jfkoeppq.exe UPX C:\Windows\SysWOW64\Jiikak32.exe UPX C:\Windows\SysWOW64\Kbapjafe.exe UPX C:\Windows\SysWOW64\Kkihknfg.exe UPX C:\Windows\SysWOW64\Kmgdgjek.exe UPX C:\Windows\SysWOW64\Kpepcedo.exe UPX C:\Windows\SysWOW64\Kmjqmi32.exe UPX C:\Windows\SysWOW64\Kdcijcke.exe UPX C:\Windows\SysWOW64\Kknafn32.exe UPX C:\Windows\SysWOW64\Kgdbkohf.exe UPX C:\Windows\SysWOW64\Kajfig32.exe UPX C:\Windows\SysWOW64\Kdhbec32.exe UPX C:\Windows\SysWOW64\Liekmj32.exe UPX C:\Windows\SysWOW64\Ldkojb32.exe UPX C:\Windows\SysWOW64\Lkdggmlj.exe UPX behavioral2/memory/4524-245-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Liggbi32.exe UPX C:\Windows\SysWOW64\Lcpllo32.exe UPX behavioral2/memory/2416-289-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3424-301-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/400-303-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1108-309-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4172-323-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3984-343-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3156-349-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1276-359-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4152-438-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Nnaikd32.exe UPX behavioral2/memory/4620-506-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1604-523-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/388-542-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3348-555-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/320-565-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/1120-571-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3996-625-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4280-634-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Qbgqio32.exe UPX C:\Windows\SysWOW64\Acjjfggb.exe UPX C:\Windows\SysWOW64\Blpnib32.exe UPX C:\Windows\SysWOW64\Bkidenlg.exe UPX C:\Windows\SysWOW64\Cdfbibnb.exe UPX C:\Windows\SysWOW64\Daolnf32.exe UPX C:\Windows\SysWOW64\Eoolbinc.exe UPX C:\Windows\SysWOW64\Fcckif32.exe UPX C:\Windows\SysWOW64\Fcfhof32.exe UPX C:\Windows\SysWOW64\Fhgjblfq.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Ifjfnb32.exeImdnklfp.exeIapjlk32.exeImgkql32.exeIpegmg32.exeIinlemia.exeJpgdbg32.exeJiphkm32.exeJmkdlkph.exeJfdida32.exeJaimbj32.exeJbkjjblm.exeJmpngk32.exeJbmfoa32.exeJkdnpo32.exeJfkoeppq.exeJiikak32.exeKbapjafe.exeKkihknfg.exeKmgdgjek.exeKpepcedo.exeKmjqmi32.exeKdcijcke.exeKknafn32.exeKgdbkohf.exeKajfig32.exeKdhbec32.exeLiekmj32.exeLdkojb32.exeLkdggmlj.exeLiggbi32.exeLcpllo32.exeLijdhiaa.exeLpcmec32.exeLgneampk.exeLilanioo.exeLpfijcfl.exeLcdegnep.exeLklnhlfb.exeLnjjdgee.exeLddbqa32.exeLknjmkdo.exeMnlfigcc.exeMpkbebbf.exeMgekbljc.exeMjcgohig.exeMpmokb32.exeMcklgm32.exeMkbchk32.exeMamleegg.exeMdkhapfj.exeMgidml32.exeMncmjfmk.exeMpaifalo.exeMcpebmkb.exeMkgmcjld.exeMaaepd32.exeMdpalp32.exeNkjjij32.exeNjljefql.exeNacbfdao.exeNceonl32.exeNjogjfoj.exeNnjbke32.exepid process 388 Ifjfnb32.exe 3004 Imdnklfp.exe 3348 Iapjlk32.exe 320 Imgkql32.exe 1120 Ipegmg32.exe 4196 Iinlemia.exe 3032 Jpgdbg32.exe 1068 Jiphkm32.exe 2832 Jmkdlkph.exe 1460 Jfdida32.exe 744 Jaimbj32.exe 4856 Jbkjjblm.exe 4704 Jmpngk32.exe 3996 Jbmfoa32.exe 4280 Jkdnpo32.exe 4068 Jfkoeppq.exe 1380 Jiikak32.exe 4852 Kbapjafe.exe 1164 Kkihknfg.exe 4348 Kmgdgjek.exe 2944 Kpepcedo.exe 4144 Kmjqmi32.exe 2164 Kdcijcke.exe 448 Kknafn32.exe 2332 Kgdbkohf.exe 4008 Kajfig32.exe 3888 Kdhbec32.exe 3708 Liekmj32.exe 3212 Ldkojb32.exe 4524 Lkdggmlj.exe 1792 Liggbi32.exe 3220 Lcpllo32.exe 4320 Lijdhiaa.exe 1464 Lpcmec32.exe 4168 Lgneampk.exe 3456 Lilanioo.exe 2416 Lpfijcfl.exe 1256 Lcdegnep.exe 3424 Lklnhlfb.exe 400 Lnjjdgee.exe 1108 Lddbqa32.exe 1808 Lknjmkdo.exe 4172 Mnlfigcc.exe 4024 Mpkbebbf.exe 372 Mgekbljc.exe 556 Mjcgohig.exe 3984 Mpmokb32.exe 3156 Mcklgm32.exe 1276 Mkbchk32.exe 4656 Mamleegg.exe 1876 Mdkhapfj.exe 1856 Mgidml32.exe 4396 Mncmjfmk.exe 2408 Mpaifalo.exe 2532 Mcpebmkb.exe 4568 Mkgmcjld.exe 3180 Maaepd32.exe 3404 Mdpalp32.exe 3512 Nkjjij32.exe 3884 Njljefql.exe 3468 Nacbfdao.exe 4540 Nceonl32.exe 4152 Njogjfoj.exe 4956 Nnjbke32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Gnjjfegi.exeEpcdqd32.exeGdmmbq32.exeNkjjij32.exeJplfcpin.exeMjcgohig.exeMmpdhboj.exeGfembo32.exePdpmpdbd.exePgopffec.exeCjomap32.exeGmbmkpie.exeHckjacjg.exeEgnchd32.exePgllfp32.exeIpflihfq.exeKghjhemo.exePabblb32.exeCjecpkcg.exeJdfjld32.exePghieg32.exeAjfoiqll.exeIdkkpf32.exeIpegmg32.exeOboaabga.exeIjegcm32.exeNndjndbh.exeQeemej32.exePoomegpf.exeBobcpmfc.exeDadeieea.exeMmbfpp32.exeDmglcj32.exeHaafcb32.exeLggldm32.exeQbgqio32.exeAdcmmeog.exedescription ioc process File created C:\Windows\SysWOW64\Galoohke.exe File created C:\Windows\SysWOW64\Ddmhhd32.exe File opened for modification C:\Windows\SysWOW64\Addaif32.exe File opened for modification C:\Windows\SysWOW64\Ekmhejao.exe File created C:\Windows\SysWOW64\Ladnhcdo.dll Gnjjfegi.exe File created C:\Windows\SysWOW64\Edihdb32.exe File created C:\Windows\SysWOW64\Efmmmn32.exe Epcdqd32.exe File created C:\Windows\SysWOW64\Ggkiol32.exe Gdmmbq32.exe File created C:\Windows\SysWOW64\Mbnnhndk.dll File created C:\Windows\SysWOW64\Bgagea32.dll File created C:\Windows\SysWOW64\Jekjcaef.exe File created C:\Windows\SysWOW64\Kocgbend.exe File created C:\Windows\SysWOW64\Kcbibebo.dll Nkjjij32.exe File created C:\Windows\SysWOW64\Jcgbco32.exe Jplfcpin.exe File created C:\Windows\SysWOW64\Mpmokb32.exe Mjcgohig.exe File created C:\Windows\SysWOW64\Jihaej32.dll Mmpdhboj.exe File created C:\Windows\SysWOW64\Fhgcme32.dll File created C:\Windows\SysWOW64\Dnpdegjp.exe File opened for modification C:\Windows\SysWOW64\Edbiniff.exe File opened for modification C:\Windows\SysWOW64\Njgqhicg.exe File opened for modification C:\Windows\SysWOW64\Gicinj32.exe Gfembo32.exe File opened for modification C:\Windows\SysWOW64\Pgnilpah.exe Pdpmpdbd.exe File created C:\Windows\SysWOW64\Iojkeh32.exe File created C:\Windows\SysWOW64\Cknmplfo.dll File created C:\Windows\SysWOW64\Bbaclegm.exe File created C:\Windows\SysWOW64\Klqmnp32.dll Pgopffec.exe File opened for modification C:\Windows\SysWOW64\Oloahhki.exe File created C:\Windows\SysWOW64\Cibmlmeb.exe Cjomap32.exe File created C:\Windows\SysWOW64\Gpqjglii.exe Gmbmkpie.exe File created C:\Windows\SysWOW64\Hfifmnij.exe Hckjacjg.exe File created C:\Windows\SysWOW64\Emhldnkj.exe Egnchd32.exe File created C:\Windows\SysWOW64\Akpoaj32.exe File opened for modification C:\Windows\SysWOW64\Bbdpad32.exe File created C:\Windows\SysWOW64\Pjjhbl32.exe Pgllfp32.exe File created C:\Windows\SysWOW64\Cgdojhec.dll Ipflihfq.exe File created C:\Windows\SysWOW64\Kjffdalb.exe Kghjhemo.exe File created C:\Windows\SysWOW64\Piijno32.exe Pabblb32.exe File created C:\Windows\SysWOW64\Ljalni32.dll Cjecpkcg.exe File created C:\Windows\SysWOW64\Pcleml32.dll Jdfjld32.exe File created C:\Windows\SysWOW64\Nmdgikhi.exe File created C:\Windows\SysWOW64\Pjffbc32.exe Pghieg32.exe File created C:\Windows\SysWOW64\Anbkio32.exe Ajfoiqll.exe File created C:\Windows\SysWOW64\Djiiimel.dll Idkkpf32.exe File created C:\Windows\SysWOW64\Gbdqegoi.dll File opened for modification C:\Windows\SysWOW64\Iinlemia.exe Ipegmg32.exe File created C:\Windows\SysWOW64\Fklfdo32.dll Oboaabga.exe File created C:\Windows\SysWOW64\Dcnfjkma.dll Ijegcm32.exe File created C:\Windows\SysWOW64\Nabfjpak.exe Nndjndbh.exe File created C:\Windows\SysWOW64\Gihgfk32.exe File opened for modification C:\Windows\SysWOW64\Iedjmioj.exe File created C:\Windows\SysWOW64\Hilpobpd.dll File opened for modification C:\Windows\SysWOW64\Qgciaf32.exe Qeemej32.exe File created C:\Windows\SysWOW64\Pamiaboj.exe Poomegpf.exe File created C:\Windows\SysWOW64\Jdencjac.dll Bobcpmfc.exe File created C:\Windows\SysWOW64\Dlijfneg.exe Dadeieea.exe File created C:\Windows\SysWOW64\Kqgmgehp.dll Mmbfpp32.exe File opened for modification C:\Windows\SysWOW64\Dpehof32.exe Dmglcj32.exe File created C:\Windows\SysWOW64\Gapbdjgd.dll Haafcb32.exe File created C:\Windows\SysWOW64\Lnadagbm.exe Lggldm32.exe File created C:\Windows\SysWOW64\Qeemej32.exe Qbgqio32.exe File opened for modification C:\Windows\SysWOW64\Alkdnboj.exe Adcmmeog.exe File created C:\Windows\SysWOW64\Ojimfh32.dll File opened for modification C:\Windows\SysWOW64\Ngndaccj.exe File opened for modification C:\Windows\SysWOW64\Nblolm32.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 1188 5328 -
Modifies registry class 64 IoCs
Processes:
Jcbihpel.exeEgdqae32.exeOdkjng32.exeKijchhbo.exeMaaepd32.exePcccfh32.exeIpnjab32.exeAmpkof32.exeEbommi32.exeMgekbljc.exeDkkcge32.exeCcpdoqgd.exeIgdnabjh.exeCbphdn32.exeGljgbllj.exeCdainc32.exeIfjodl32.exeQmmnjfnl.exeGkglja32.exeOohnonij.exeAhgjejhd.exePnpemb32.exeQqhcpo32.exeIgmagnkg.exeFhemmlhc.exeFielph32.exeCkcgkldl.exeDadeieea.exeEmhldnkj.exeBcahmb32.exeAjfhnjhq.exeJbgoof32.exeIgchfiof.exeJjopcb32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jcbihpel.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Egdqae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bgnpek32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Djoeni32.dll" Odkjng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cclnpmna.dll" Kijchhbo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Maaepd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pcccfh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjqkei32.dll" Ipnjab32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gmigpf32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ampkof32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebommi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dejncidp.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nmlpen32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgekbljc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nhjnjq32.dll" Ccpdoqgd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Igdnabjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ibclmgdb.dll" Cbphdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gljgbllj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cdainc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ifjodl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjfgfh32.dll" Qmmnjfnl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Oalfdbfa.dll" Gkglja32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oohnonij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ahgjejhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pnpemb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Qqhcpo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cbphdn32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbqdpi32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hjdipffl.dll" Igmagnkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gikgni32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paadbk32.dll" Fhemmlhc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fielph32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ckcgkldl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipenkiei.dll" Dadeieea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pnaopd32.dll" Emhldnkj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bcahmb32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ajfhnjhq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbgoof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Igchfiof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ghmpmgdc.dll" Jjopcb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddpapmqq.dll" -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exeIfjfnb32.exeImdnklfp.exeIapjlk32.exeImgkql32.exeIpegmg32.exeIinlemia.exeJpgdbg32.exeJiphkm32.exeJmkdlkph.exeJfdida32.exeJaimbj32.exeJbkjjblm.exeJmpngk32.exeJbmfoa32.exeJkdnpo32.exeJfkoeppq.exeJiikak32.exeKbapjafe.exeKkihknfg.exeKmgdgjek.exeKpepcedo.exedescription pid process target process PID 2360 wrote to memory of 388 2360 c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe Ifjfnb32.exe PID 2360 wrote to memory of 388 2360 c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe Ifjfnb32.exe PID 2360 wrote to memory of 388 2360 c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe Ifjfnb32.exe PID 388 wrote to memory of 3004 388 Ifjfnb32.exe Imdnklfp.exe PID 388 wrote to memory of 3004 388 Ifjfnb32.exe Imdnklfp.exe PID 388 wrote to memory of 3004 388 Ifjfnb32.exe Imdnklfp.exe PID 3004 wrote to memory of 3348 3004 Imdnklfp.exe Iapjlk32.exe PID 3004 wrote to memory of 3348 3004 Imdnklfp.exe Iapjlk32.exe PID 3004 wrote to memory of 3348 3004 Imdnklfp.exe Iapjlk32.exe PID 3348 wrote to memory of 320 3348 Iapjlk32.exe Imgkql32.exe PID 3348 wrote to memory of 320 3348 Iapjlk32.exe Imgkql32.exe PID 3348 wrote to memory of 320 3348 Iapjlk32.exe Imgkql32.exe PID 320 wrote to memory of 1120 320 Imgkql32.exe Ipegmg32.exe PID 320 wrote to memory of 1120 320 Imgkql32.exe Ipegmg32.exe PID 320 wrote to memory of 1120 320 Imgkql32.exe Ipegmg32.exe PID 1120 wrote to memory of 4196 1120 Ipegmg32.exe Iinlemia.exe PID 1120 wrote to memory of 4196 1120 Ipegmg32.exe Iinlemia.exe PID 1120 wrote to memory of 4196 1120 Ipegmg32.exe Iinlemia.exe PID 4196 wrote to memory of 3032 4196 Iinlemia.exe Jpgdbg32.exe PID 4196 wrote to memory of 3032 4196 Iinlemia.exe Jpgdbg32.exe PID 4196 wrote to memory of 3032 4196 Iinlemia.exe Jpgdbg32.exe PID 3032 wrote to memory of 1068 3032 Jpgdbg32.exe Jiphkm32.exe PID 3032 wrote to memory of 1068 3032 Jpgdbg32.exe Jiphkm32.exe PID 3032 wrote to memory of 1068 3032 Jpgdbg32.exe Jiphkm32.exe PID 1068 wrote to memory of 2832 1068 Jiphkm32.exe Jmkdlkph.exe PID 1068 wrote to memory of 2832 1068 Jiphkm32.exe Jmkdlkph.exe PID 1068 wrote to memory of 2832 1068 Jiphkm32.exe Jmkdlkph.exe PID 2832 wrote to memory of 1460 2832 Jmkdlkph.exe Jfdida32.exe PID 2832 wrote to memory of 1460 2832 Jmkdlkph.exe Jfdida32.exe PID 2832 wrote to memory of 1460 2832 Jmkdlkph.exe Jfdida32.exe PID 1460 wrote to memory of 744 1460 Jfdida32.exe Jaimbj32.exe PID 1460 wrote to memory of 744 1460 Jfdida32.exe Jaimbj32.exe PID 1460 wrote to memory of 744 1460 Jfdida32.exe Jaimbj32.exe PID 744 wrote to memory of 4856 744 Jaimbj32.exe Jbkjjblm.exe PID 744 wrote to memory of 4856 744 Jaimbj32.exe Jbkjjblm.exe PID 744 wrote to memory of 4856 744 Jaimbj32.exe Jbkjjblm.exe PID 4856 wrote to memory of 4704 4856 Jbkjjblm.exe Jmpngk32.exe PID 4856 wrote to memory of 4704 4856 Jbkjjblm.exe Jmpngk32.exe PID 4856 wrote to memory of 4704 4856 Jbkjjblm.exe Jmpngk32.exe PID 4704 wrote to memory of 3996 4704 Jmpngk32.exe Jbmfoa32.exe PID 4704 wrote to memory of 3996 4704 Jmpngk32.exe Jbmfoa32.exe PID 4704 wrote to memory of 3996 4704 Jmpngk32.exe Jbmfoa32.exe PID 3996 wrote to memory of 4280 3996 Jbmfoa32.exe Jkdnpo32.exe PID 3996 wrote to memory of 4280 3996 Jbmfoa32.exe Jkdnpo32.exe PID 3996 wrote to memory of 4280 3996 Jbmfoa32.exe Jkdnpo32.exe PID 4280 wrote to memory of 4068 4280 Jkdnpo32.exe Jfkoeppq.exe PID 4280 wrote to memory of 4068 4280 Jkdnpo32.exe Jfkoeppq.exe PID 4280 wrote to memory of 4068 4280 Jkdnpo32.exe Jfkoeppq.exe PID 4068 wrote to memory of 1380 4068 Jfkoeppq.exe Jiikak32.exe PID 4068 wrote to memory of 1380 4068 Jfkoeppq.exe Jiikak32.exe PID 4068 wrote to memory of 1380 4068 Jfkoeppq.exe Jiikak32.exe PID 1380 wrote to memory of 4852 1380 Jiikak32.exe Kbapjafe.exe PID 1380 wrote to memory of 4852 1380 Jiikak32.exe Kbapjafe.exe PID 1380 wrote to memory of 4852 1380 Jiikak32.exe Kbapjafe.exe PID 4852 wrote to memory of 1164 4852 Kbapjafe.exe Kkihknfg.exe PID 4852 wrote to memory of 1164 4852 Kbapjafe.exe Kkihknfg.exe PID 4852 wrote to memory of 1164 4852 Kbapjafe.exe Kkihknfg.exe PID 1164 wrote to memory of 4348 1164 Kkihknfg.exe Kmgdgjek.exe PID 1164 wrote to memory of 4348 1164 Kkihknfg.exe Kmgdgjek.exe PID 1164 wrote to memory of 4348 1164 Kkihknfg.exe Kmgdgjek.exe PID 4348 wrote to memory of 2944 4348 Kmgdgjek.exe Kpepcedo.exe PID 4348 wrote to memory of 2944 4348 Kmgdgjek.exe Kpepcedo.exe PID 4348 wrote to memory of 2944 4348 Kmgdgjek.exe Kpepcedo.exe PID 2944 wrote to memory of 4144 2944 Kpepcedo.exe Kmjqmi32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe"C:\Users\Admin\AppData\Local\Temp\c4e4283efbca39f4e807667811cf9017887d6254be8a41148cd0ab7517b5a8ed.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ifjfnb32.exeC:\Windows\system32\Ifjfnb32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Imdnklfp.exeC:\Windows\system32\Imdnklfp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Iapjlk32.exeC:\Windows\system32\Iapjlk32.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Imgkql32.exeC:\Windows\system32\Imgkql32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Ipegmg32.exeC:\Windows\system32\Ipegmg32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Iinlemia.exeC:\Windows\system32\Iinlemia.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jpgdbg32.exeC:\Windows\system32\Jpgdbg32.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jiphkm32.exeC:\Windows\system32\Jiphkm32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jmkdlkph.exeC:\Windows\system32\Jmkdlkph.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jfdida32.exeC:\Windows\system32\Jfdida32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jaimbj32.exeC:\Windows\system32\Jaimbj32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jbkjjblm.exeC:\Windows\system32\Jbkjjblm.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jmpngk32.exeC:\Windows\system32\Jmpngk32.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jbmfoa32.exeC:\Windows\system32\Jbmfoa32.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jkdnpo32.exeC:\Windows\system32\Jkdnpo32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jfkoeppq.exeC:\Windows\system32\Jfkoeppq.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Jiikak32.exeC:\Windows\system32\Jiikak32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kbapjafe.exeC:\Windows\system32\Kbapjafe.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kkihknfg.exeC:\Windows\system32\Kkihknfg.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kmgdgjek.exeC:\Windows\system32\Kmgdgjek.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kpepcedo.exeC:\Windows\system32\Kpepcedo.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Kmjqmi32.exeC:\Windows\system32\Kmjqmi32.exe23⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kdcijcke.exeC:\Windows\system32\Kdcijcke.exe24⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kknafn32.exeC:\Windows\system32\Kknafn32.exe25⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kgdbkohf.exeC:\Windows\system32\Kgdbkohf.exe26⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kajfig32.exeC:\Windows\system32\Kajfig32.exe27⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Kdhbec32.exeC:\Windows\system32\Kdhbec32.exe28⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Liekmj32.exeC:\Windows\system32\Liekmj32.exe29⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ldkojb32.exeC:\Windows\system32\Ldkojb32.exe30⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lkdggmlj.exeC:\Windows\system32\Lkdggmlj.exe31⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Liggbi32.exeC:\Windows\system32\Liggbi32.exe32⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lcpllo32.exeC:\Windows\system32\Lcpllo32.exe33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lijdhiaa.exeC:\Windows\system32\Lijdhiaa.exe34⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lpcmec32.exeC:\Windows\system32\Lpcmec32.exe35⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lgneampk.exeC:\Windows\system32\Lgneampk.exe36⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lilanioo.exeC:\Windows\system32\Lilanioo.exe37⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lpfijcfl.exeC:\Windows\system32\Lpfijcfl.exe38⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lcdegnep.exeC:\Windows\system32\Lcdegnep.exe39⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lklnhlfb.exeC:\Windows\system32\Lklnhlfb.exe40⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lnjjdgee.exeC:\Windows\system32\Lnjjdgee.exe41⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lddbqa32.exeC:\Windows\system32\Lddbqa32.exe42⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Lknjmkdo.exeC:\Windows\system32\Lknjmkdo.exe43⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mnlfigcc.exeC:\Windows\system32\Mnlfigcc.exe44⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mpkbebbf.exeC:\Windows\system32\Mpkbebbf.exe45⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mgekbljc.exeC:\Windows\system32\Mgekbljc.exe46⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mjcgohig.exeC:\Windows\system32\Mjcgohig.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Mpmokb32.exeC:\Windows\system32\Mpmokb32.exe48⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mcklgm32.exeC:\Windows\system32\Mcklgm32.exe49⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mkbchk32.exeC:\Windows\system32\Mkbchk32.exe50⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mamleegg.exeC:\Windows\system32\Mamleegg.exe51⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mdkhapfj.exeC:\Windows\system32\Mdkhapfj.exe52⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mgidml32.exeC:\Windows\system32\Mgidml32.exe53⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mncmjfmk.exeC:\Windows\system32\Mncmjfmk.exe54⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mpaifalo.exeC:\Windows\system32\Mpaifalo.exe55⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mcpebmkb.exeC:\Windows\system32\Mcpebmkb.exe56⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Mkgmcjld.exeC:\Windows\system32\Mkgmcjld.exe57⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Maaepd32.exeC:\Windows\system32\Maaepd32.exe58⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\Mdpalp32.exeC:\Windows\system32\Mdpalp32.exe59⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nkjjij32.exeC:\Windows\system32\Nkjjij32.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Njljefql.exeC:\Windows\system32\Njljefql.exe61⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nacbfdao.exeC:\Windows\system32\Nacbfdao.exe62⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nceonl32.exeC:\Windows\system32\Nceonl32.exe63⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Njogjfoj.exeC:\Windows\system32\Njogjfoj.exe64⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
-
C:\Windows\SysWOW64\Nnjbke32.exeC:\Windows\system32\Nnjbke32.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Ncgkcl32.exeC:\Windows\system32\Ncgkcl32.exe66⤵
-
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe67⤵
-
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe68⤵
-
C:\Windows\SysWOW64\Ndghmo32.exeC:\Windows\system32\Ndghmo32.exe69⤵
-
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe70⤵
-
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe71⤵
-
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe72⤵
-
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe73⤵
-
C:\Windows\SysWOW64\Nnaikd32.exeC:\Windows\system32\Nnaikd32.exe74⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Nqpego32.exeC:\Windows\system32\Nqpego32.exe75⤵
-
C:\Windows\SysWOW64\Ncnadk32.exeC:\Windows\system32\Ncnadk32.exe76⤵
-
C:\Windows\SysWOW64\Ojhiqefo.exeC:\Windows\system32\Ojhiqefo.exe77⤵
-
C:\Windows\SysWOW64\Oboaabga.exeC:\Windows\system32\Oboaabga.exe78⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Oqbamo32.exeC:\Windows\system32\Oqbamo32.exe79⤵
-
C:\Windows\SysWOW64\Okhfjh32.exeC:\Windows\system32\Okhfjh32.exe80⤵
-
C:\Windows\SysWOW64\Onfbfc32.exeC:\Windows\system32\Onfbfc32.exe81⤵
-
C:\Windows\SysWOW64\Odpjcm32.exeC:\Windows\system32\Odpjcm32.exe82⤵
-
C:\Windows\SysWOW64\Ogogoi32.exeC:\Windows\system32\Ogogoi32.exe83⤵
-
C:\Windows\SysWOW64\Ojmcld32.exeC:\Windows\system32\Ojmcld32.exe84⤵
-
C:\Windows\SysWOW64\Ogaceh32.exeC:\Windows\system32\Ogaceh32.exe85⤵
-
C:\Windows\SysWOW64\Ojopad32.exeC:\Windows\system32\Ojopad32.exe86⤵
-
C:\Windows\SysWOW64\Obfhba32.exeC:\Windows\system32\Obfhba32.exe87⤵
-
C:\Windows\SysWOW64\Ocgdji32.exeC:\Windows\system32\Ocgdji32.exe88⤵
-
C:\Windows\SysWOW64\Ojalgcnd.exeC:\Windows\system32\Ojalgcnd.exe89⤵
-
C:\Windows\SysWOW64\Pgemphmn.exeC:\Windows\system32\Pgemphmn.exe90⤵
-
C:\Windows\SysWOW64\Pnpemb32.exeC:\Windows\system32\Pnpemb32.exe91⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pqnaim32.exeC:\Windows\system32\Pqnaim32.exe92⤵
-
C:\Windows\SysWOW64\Pghieg32.exeC:\Windows\system32\Pghieg32.exe93⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pjffbc32.exeC:\Windows\system32\Pjffbc32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Pgjfkg32.exeC:\Windows\system32\Pgjfkg32.exe95⤵
-
C:\Windows\SysWOW64\Pjhbgb32.exeC:\Windows\system32\Pjhbgb32.exe96⤵
-
C:\Windows\SysWOW64\Pabkdmpi.exeC:\Windows\system32\Pabkdmpi.exe97⤵
-
C:\Windows\SysWOW64\Pnfkma32.exeC:\Windows\system32\Pnfkma32.exe98⤵
-
C:\Windows\SysWOW64\Pbbgnpgl.exeC:\Windows\system32\Pbbgnpgl.exe99⤵
-
C:\Windows\SysWOW64\Peqcjkfp.exeC:\Windows\system32\Peqcjkfp.exe100⤵
-
C:\Windows\SysWOW64\Pcccfh32.exeC:\Windows\system32\Pcccfh32.exe101⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Pgopffec.exeC:\Windows\system32\Pgopffec.exe102⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Pjmlbbdg.exeC:\Windows\system32\Pjmlbbdg.exe103⤵
-
C:\Windows\SysWOW64\Pbddcoei.exeC:\Windows\system32\Pbddcoei.exe104⤵
-
C:\Windows\SysWOW64\Qecppkdm.exeC:\Windows\system32\Qecppkdm.exe105⤵
-
C:\Windows\SysWOW64\Qgallfcq.exeC:\Windows\system32\Qgallfcq.exe106⤵
-
C:\Windows\SysWOW64\Qkmhlekj.exeC:\Windows\system32\Qkmhlekj.exe107⤵
-
C:\Windows\SysWOW64\Qbgqio32.exeC:\Windows\system32\Qbgqio32.exe108⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qeemej32.exeC:\Windows\system32\Qeemej32.exe109⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Qgciaf32.exeC:\Windows\system32\Qgciaf32.exe110⤵
-
C:\Windows\SysWOW64\Qloebdig.exeC:\Windows\system32\Qloebdig.exe111⤵
-
C:\Windows\SysWOW64\Qnnanphk.exeC:\Windows\system32\Qnnanphk.exe112⤵
-
C:\Windows\SysWOW64\Qbimoo32.exeC:\Windows\system32\Qbimoo32.exe113⤵
-
C:\Windows\SysWOW64\Aegikj32.exeC:\Windows\system32\Aegikj32.exe114⤵
-
C:\Windows\SysWOW64\Acjjfggb.exeC:\Windows\system32\Acjjfggb.exe115⤵
-
C:\Windows\SysWOW64\Anpncp32.exeC:\Windows\system32\Anpncp32.exe116⤵
-
C:\Windows\SysWOW64\Aanjpk32.exeC:\Windows\system32\Aanjpk32.exe117⤵
-
C:\Windows\SysWOW64\Aejfpjne.exeC:\Windows\system32\Aejfpjne.exe118⤵
-
C:\Windows\SysWOW64\Ahhblemi.exeC:\Windows\system32\Ahhblemi.exe119⤵
-
C:\Windows\SysWOW64\Ajfoiqll.exeC:\Windows\system32\Ajfoiqll.exe120⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Anbkio32.exeC:\Windows\system32\Anbkio32.exe121⤵
-
C:\Windows\SysWOW64\Aelcfilb.exeC:\Windows\system32\Aelcfilb.exe122⤵
-
C:\Windows\SysWOW64\Ahkobekf.exeC:\Windows\system32\Ahkobekf.exe123⤵
-
C:\Windows\SysWOW64\Ajiknpjj.exeC:\Windows\system32\Ajiknpjj.exe124⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Abpcon32.exeC:\Windows\system32\Abpcon32.exe125⤵
-
C:\Windows\SysWOW64\Aeopki32.exeC:\Windows\system32\Aeopki32.exe126⤵
-
C:\Windows\SysWOW64\Adapgfqj.exeC:\Windows\system32\Adapgfqj.exe127⤵
-
C:\Windows\SysWOW64\Alhhhcal.exeC:\Windows\system32\Alhhhcal.exe128⤵
-
C:\Windows\SysWOW64\Ajkhdp32.exeC:\Windows\system32\Ajkhdp32.exe129⤵
-
C:\Windows\SysWOW64\Abbpem32.exeC:\Windows\system32\Abbpem32.exe130⤵
-
C:\Windows\SysWOW64\Aealah32.exeC:\Windows\system32\Aealah32.exe131⤵
-
C:\Windows\SysWOW64\Adcmmeog.exeC:\Windows\system32\Adcmmeog.exe132⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Alkdnboj.exeC:\Windows\system32\Alkdnboj.exe133⤵
-
C:\Windows\SysWOW64\Aniajnnn.exeC:\Windows\system32\Aniajnnn.exe134⤵
-
C:\Windows\SysWOW64\Bahmfj32.exeC:\Windows\system32\Bahmfj32.exe135⤵
-
C:\Windows\SysWOW64\Bdfibe32.exeC:\Windows\system32\Bdfibe32.exe136⤵
-
C:\Windows\SysWOW64\Blmacb32.exeC:\Windows\system32\Blmacb32.exe137⤵
-
C:\Windows\SysWOW64\Bjpaooda.exeC:\Windows\system32\Bjpaooda.exe138⤵
-
C:\Windows\SysWOW64\Bbgipldd.exeC:\Windows\system32\Bbgipldd.exe139⤵
-
C:\Windows\SysWOW64\Beeflhdh.exeC:\Windows\system32\Beeflhdh.exe140⤵
-
C:\Windows\SysWOW64\Bdhfhe32.exeC:\Windows\system32\Bdhfhe32.exe141⤵
-
C:\Windows\SysWOW64\Blpnib32.exeC:\Windows\system32\Blpnib32.exe142⤵
-
C:\Windows\SysWOW64\Bnnjen32.exeC:\Windows\system32\Bnnjen32.exe143⤵
-
C:\Windows\SysWOW64\Balfaiil.exeC:\Windows\system32\Balfaiil.exe144⤵
-
C:\Windows\SysWOW64\Behbag32.exeC:\Windows\system32\Behbag32.exe145⤵
-
C:\Windows\SysWOW64\Bhfonc32.exeC:\Windows\system32\Bhfonc32.exe146⤵
-
C:\Windows\SysWOW64\Blbknaib.exeC:\Windows\system32\Blbknaib.exe147⤵
-
C:\Windows\SysWOW64\Bjdkjo32.exeC:\Windows\system32\Bjdkjo32.exe148⤵
-
C:\Windows\SysWOW64\Bblckl32.exeC:\Windows\system32\Bblckl32.exe149⤵
-
C:\Windows\SysWOW64\Bejogg32.exeC:\Windows\system32\Bejogg32.exe150⤵
-
C:\Windows\SysWOW64\Bhikcb32.exeC:\Windows\system32\Bhikcb32.exe151⤵
-
C:\Windows\SysWOW64\Bjghpn32.exeC:\Windows\system32\Bjghpn32.exe152⤵
-
C:\Windows\SysWOW64\Bobcpmfc.exeC:\Windows\system32\Bobcpmfc.exe153⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Bbnpqk32.exeC:\Windows\system32\Bbnpqk32.exe154⤵
-
C:\Windows\SysWOW64\Bdolhc32.exeC:\Windows\system32\Bdolhc32.exe155⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Bkidenlg.exeC:\Windows\system32\Bkidenlg.exe156⤵
-
C:\Windows\SysWOW64\Cbqlfkmi.exeC:\Windows\system32\Cbqlfkmi.exe157⤵
-
C:\Windows\SysWOW64\Cdainc32.exeC:\Windows\system32\Cdainc32.exe158⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cliaoq32.exeC:\Windows\system32\Cliaoq32.exe159⤵
-
C:\Windows\SysWOW64\Cogmkl32.exeC:\Windows\system32\Cogmkl32.exe160⤵
-
C:\Windows\SysWOW64\Ceaehfjj.exeC:\Windows\system32\Ceaehfjj.exe161⤵
-
C:\Windows\SysWOW64\Chpada32.exeC:\Windows\system32\Chpada32.exe162⤵
-
C:\Windows\SysWOW64\Cbefaj32.exeC:\Windows\system32\Cbefaj32.exe163⤵
-
C:\Windows\SysWOW64\Cdfbibnb.exeC:\Windows\system32\Cdfbibnb.exe164⤵
-
C:\Windows\SysWOW64\Ckpjfm32.exeC:\Windows\system32\Ckpjfm32.exe165⤵
-
C:\Windows\SysWOW64\Cbgbgj32.exeC:\Windows\system32\Cbgbgj32.exe166⤵
-
C:\Windows\SysWOW64\Cefoce32.exeC:\Windows\system32\Cefoce32.exe167⤵
-
C:\Windows\SysWOW64\Clpgpp32.exeC:\Windows\system32\Clpgpp32.exe168⤵
-
C:\Windows\SysWOW64\Ckcgkldl.exeC:\Windows\system32\Ckcgkldl.exe169⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Cbjoljdo.exeC:\Windows\system32\Cbjoljdo.exe170⤵
-
C:\Windows\SysWOW64\Camphf32.exeC:\Windows\system32\Camphf32.exe171⤵
-
C:\Windows\SysWOW64\Cdkldb32.exeC:\Windows\system32\Cdkldb32.exe172⤵
-
C:\Windows\SysWOW64\Chghdqbf.exeC:\Windows\system32\Chghdqbf.exe173⤵
-
C:\Windows\SysWOW64\Ckedalaj.exeC:\Windows\system32\Ckedalaj.exe174⤵
-
C:\Windows\SysWOW64\Daolnf32.exeC:\Windows\system32\Daolnf32.exe175⤵
-
C:\Windows\SysWOW64\Dldpkoil.exeC:\Windows\system32\Dldpkoil.exe176⤵
-
C:\Windows\SysWOW64\Dboigi32.exeC:\Windows\system32\Dboigi32.exe177⤵
-
C:\Windows\SysWOW64\Dhkapp32.exeC:\Windows\system32\Dhkapp32.exe178⤵
-
C:\Windows\SysWOW64\Dbaemi32.exeC:\Windows\system32\Dbaemi32.exe179⤵
-
C:\Windows\SysWOW64\Dadeieea.exeC:\Windows\system32\Dadeieea.exe180⤵
- Drops file in System32 directory
- Modifies registry class
-
C:\Windows\SysWOW64\Dlijfneg.exeC:\Windows\system32\Dlijfneg.exe181⤵
-
C:\Windows\SysWOW64\Dafbne32.exeC:\Windows\system32\Dafbne32.exe182⤵
-
C:\Windows\SysWOW64\Dddojq32.exeC:\Windows\system32\Dddojq32.exe183⤵
-
C:\Windows\SysWOW64\Dojcgi32.exeC:\Windows\system32\Dojcgi32.exe184⤵
-
C:\Windows\SysWOW64\Dahode32.exeC:\Windows\system32\Dahode32.exe185⤵
-
C:\Windows\SysWOW64\Eolpmi32.exeC:\Windows\system32\Eolpmi32.exe186⤵
-
C:\Windows\SysWOW64\Eefhjc32.exeC:\Windows\system32\Eefhjc32.exe187⤵
-
C:\Windows\SysWOW64\Ehedfo32.exeC:\Windows\system32\Ehedfo32.exe188⤵
-
C:\Windows\SysWOW64\Elppfmoo.exeC:\Windows\system32\Elppfmoo.exe189⤵
-
C:\Windows\SysWOW64\Eoolbinc.exeC:\Windows\system32\Eoolbinc.exe190⤵
-
C:\Windows\SysWOW64\Eeidoc32.exeC:\Windows\system32\Eeidoc32.exe191⤵
-
C:\Windows\SysWOW64\Ehgqln32.exeC:\Windows\system32\Ehgqln32.exe192⤵
-
C:\Windows\SysWOW64\Ekemhj32.exeC:\Windows\system32\Ekemhj32.exe193⤵
-
C:\Windows\SysWOW64\Eapedd32.exeC:\Windows\system32\Eapedd32.exe194⤵
-
C:\Windows\SysWOW64\Ednaqo32.exeC:\Windows\system32\Ednaqo32.exe195⤵
-
C:\Windows\SysWOW64\Eleiam32.exeC:\Windows\system32\Eleiam32.exe196⤵
-
C:\Windows\SysWOW64\Eocenh32.exeC:\Windows\system32\Eocenh32.exe197⤵
-
C:\Windows\SysWOW64\Eabbjc32.exeC:\Windows\system32\Eabbjc32.exe198⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Edpnfo32.exeC:\Windows\system32\Edpnfo32.exe199⤵
-
C:\Windows\SysWOW64\Elgfgl32.exeC:\Windows\system32\Elgfgl32.exe200⤵
-
C:\Windows\SysWOW64\Eadopc32.exeC:\Windows\system32\Eadopc32.exe201⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Edbklofb.exeC:\Windows\system32\Edbklofb.exe202⤵
-
C:\Windows\SysWOW64\Fkmchi32.exeC:\Windows\system32\Fkmchi32.exe203⤵
-
C:\Windows\SysWOW64\Fcckif32.exeC:\Windows\system32\Fcckif32.exe204⤵
- Adds autorun key to be loaded by Explorer.exe on startup
-
C:\Windows\SysWOW64\Febgea32.exeC:\Windows\system32\Febgea32.exe205⤵
-
C:\Windows\SysWOW64\Fhqcam32.exeC:\Windows\system32\Fhqcam32.exe206⤵
-
C:\Windows\SysWOW64\Fkopnh32.exeC:\Windows\system32\Fkopnh32.exe207⤵
-
C:\Windows\SysWOW64\Fcfhof32.exeC:\Windows\system32\Fcfhof32.exe208⤵
-
C:\Windows\SysWOW64\Fdgdgnbm.exeC:\Windows\system32\Fdgdgnbm.exe209⤵
-
C:\Windows\SysWOW64\Fkalchij.exeC:\Windows\system32\Fkalchij.exe210⤵
-
C:\Windows\SysWOW64\Fchddejl.exeC:\Windows\system32\Fchddejl.exe211⤵
-
C:\Windows\SysWOW64\Ffgqqaip.exeC:\Windows\system32\Ffgqqaip.exe212⤵
-
C:\Windows\SysWOW64\Fhemmlhc.exeC:\Windows\system32\Fhemmlhc.exe213⤵
- Modifies registry class
-
C:\Windows\SysWOW64\Fkciihgg.exeC:\Windows\system32\Fkciihgg.exe214⤵
-
C:\Windows\SysWOW64\Fbnafb32.exeC:\Windows\system32\Fbnafb32.exe215⤵
-
C:\Windows\SysWOW64\Fhgjblfq.exeC:\Windows\system32\Fhgjblfq.exe216⤵
-
C:\Windows\SysWOW64\Fkffog32.exeC:\Windows\system32\Fkffog32.exe217⤵
-
C:\Windows\SysWOW64\Fcmnpe32.exeC:\Windows\system32\Fcmnpe32.exe218⤵
-
C:\Windows\SysWOW64\Fbpnkama.exeC:\Windows\system32\Fbpnkama.exe219⤵
-
C:\Windows\SysWOW64\Fdnjgmle.exeC:\Windows\system32\Fdnjgmle.exe220⤵
-
C:\Windows\SysWOW64\Glebhjlg.exeC:\Windows\system32\Glebhjlg.exe221⤵
-
C:\Windows\SysWOW64\Gododflk.exeC:\Windows\system32\Gododflk.exe222⤵
-
C:\Windows\SysWOW64\Gbbkaako.exeC:\Windows\system32\Gbbkaako.exe223⤵
-
C:\Windows\SysWOW64\Gdqgmmjb.exeC:\Windows\system32\Gdqgmmjb.exe224⤵
-
C:\Windows\SysWOW64\Ghlcnk32.exeC:\Windows\system32\Ghlcnk32.exe225⤵
-
C:\Windows\SysWOW64\Gkkojgao.exeC:\Windows\system32\Gkkojgao.exe226⤵
-
C:\Windows\SysWOW64\Gcagkdba.exeC:\Windows\system32\Gcagkdba.exe227⤵
-
C:\Windows\SysWOW64\Gfpcgpae.exeC:\Windows\system32\Gfpcgpae.exe228⤵
-
C:\Windows\SysWOW64\Gdcdbl32.exeC:\Windows\system32\Gdcdbl32.exe229⤵
-
C:\Windows\SysWOW64\Gmjlcj32.exeC:\Windows\system32\Gmjlcj32.exe230⤵
-
C:\Windows\SysWOW64\Gohhpe32.exeC:\Windows\system32\Gohhpe32.exe231⤵
-
C:\Windows\SysWOW64\Gbgdlq32.exeC:\Windows\system32\Gbgdlq32.exe232⤵
-
C:\Windows\SysWOW64\Gdeqhl32.exeC:\Windows\system32\Gdeqhl32.exe233⤵
-
C:\Windows\SysWOW64\Gmlhii32.exeC:\Windows\system32\Gmlhii32.exe234⤵
-
C:\Windows\SysWOW64\Gcfqfc32.exeC:\Windows\system32\Gcfqfc32.exe235⤵
-
C:\Windows\SysWOW64\Gfembo32.exeC:\Windows\system32\Gfembo32.exe236⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\Gicinj32.exeC:\Windows\system32\Gicinj32.exe237⤵
-
C:\Windows\SysWOW64\Gmoeoidl.exeC:\Windows\system32\Gmoeoidl.exe238⤵
-
C:\Windows\SysWOW64\Gcimkc32.exeC:\Windows\system32\Gcimkc32.exe239⤵
-
C:\Windows\SysWOW64\Gfgjgo32.exeC:\Windows\system32\Gfgjgo32.exe240⤵
-
C:\Windows\SysWOW64\Hiefcj32.exeC:\Windows\system32\Hiefcj32.exe241⤵