Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
c24b23e85c4834312e815036a8e9dd70bee45bdff070897f6094a1eb331c1942.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c24b23e85c4834312e815036a8e9dd70bee45bdff070897f6094a1eb331c1942.exe
Resource
win10v2004-20240611-en
General
-
Target
c24b23e85c4834312e815036a8e9dd70bee45bdff070897f6094a1eb331c1942.exe
-
Size
163KB
-
MD5
8638b9e7dc510aca92f8b48ffe11c8da
-
SHA1
5fdcee158fd68155bca04dc939f014dd184b417e
-
SHA256
c24b23e85c4834312e815036a8e9dd70bee45bdff070897f6094a1eb331c1942
-
SHA512
6df17382d27a8755f138dd41b27c58f7c9093cc541cb750c4ba3cc96492c6149ee3ceed5626312d035695d5195b8c451f47df4e08257e53996db9fa8177f4f51
-
SSDEEP
1536:PtkGKDoSdsOLKAAWGDMBEnlProNVU4qNVUrk/9QbfBr+7GwKrPAsqNVU:lknZKHWGDuEnltOrWKDBr+yJb
Malware Config
Extracted
gozi
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Dfoplpla.exeMbighjdd.exeEjoomhmi.exeKgninn32.exeLqbncb32.exeIbnligoc.exeKpbfii32.exeAglnbhal.exeMfqlfb32.exeOcaebc32.exeNahgoe32.exeMbognp32.exeOfhknodl.exeGdhmnlcj.exeAcqimo32.exeDkifae32.exeBhhiemoj.exePhhhhc32.exeAhenokjf.exeHpnoncim.exeDlkbjqgm.exeNlmdbh32.exeAdndoe32.exeFpgpgfmh.exePnonbk32.exeNibbqicm.exeCbgnemjj.exeKclgmq32.exeMgaokl32.exeManmoq32.exeCfpffeaj.exeHhgloc32.exeLalnmiia.exePhganm32.exePqcjepfo.exeQgpogili.exeBfjnjcni.exeGiinpa32.exeMcecjmkl.exeAhgjejhd.exeEbjcajjd.exeEjfeng32.exeFbbpmb32.exeMfhbga32.exeMenjdbgj.exeOjnblg32.exeDcnqpo32.exeKbceejpf.exeIjhjcchb.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfoplpla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbighjdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejoomhmi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kgninn32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lqbncb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ibnligoc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kpbfii32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aglnbhal.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfqlfb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ocaebc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nahgoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mbognp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ofhknodl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gdhmnlcj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acqimo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkifae32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bhhiemoj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Phhhhc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahenokjf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hpnoncim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dlkbjqgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nlmdbh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Adndoe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fpgpgfmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pnonbk32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nibbqicm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cbgnemjj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kclgmq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgaokl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Manmoq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cfpffeaj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hhgloc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Lalnmiia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Phganm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pqcjepfo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Qgpogili.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bfjnjcni.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Giinpa32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mcecjmkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ahgjejhd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ebjcajjd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ejfeng32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fbbpmb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mfhbga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Menjdbgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ojnblg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dcnqpo32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbceejpf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ijhjcchb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad -
Detects executables built or packed with MPress PE compressor 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Eapedd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ehimanbq.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4516-17-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eemnjbaj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ehljfnpn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ekjfcipa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Eofbch32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fdegandp.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/1748-57-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fllpbldb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fdgdgnbm.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fkalchij.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fdialn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fooeif32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fhgjblfq.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Flceckoj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Fhjfhl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gkhbdg32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ghlcnk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gcagkdba.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gfpcgpae.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gcddpdpo.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2740-160-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gdeqhl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gcfqfc32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gdhmnlcj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gfgjgo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Gdjjckag.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hfifmnij.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hkfoeega.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hobkfd32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hbpgbo32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hcpclbfa.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Heapdjlp.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hmhhehlb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Hfqlnm32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ifjodl32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jianff32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Jcllonma.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Kibgmdcn.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Lpnlpnih.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mmlpoqpg.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Mlefklpj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Nngokoej.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Njqmepik.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Ndhmhh32.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4220-567-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4104-568-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/5092-594-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2972-595-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4812-601-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2668-602-0x0000000000400000-0x0000000000453000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pnonbk32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Pfjcgn32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Qnjnnj32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aqkgpedc.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Aminee32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bagflcje.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bmngqdpj.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Bffkij32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Beihma32.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Chmndlge.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Chokikeb.exe INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\Cagobalc.exe INDICATOR_EXE_Packed_MPress -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\Eapedd32.exe UPX C:\Windows\SysWOW64\Ehimanbq.exe UPX behavioral2/memory/4516-17-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Eemnjbaj.exe UPX C:\Windows\SysWOW64\Ehljfnpn.exe UPX C:\Windows\SysWOW64\Ekjfcipa.exe UPX C:\Windows\SysWOW64\Eofbch32.exe UPX C:\Windows\SysWOW64\Fdegandp.exe UPX behavioral2/memory/1748-57-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Fllpbldb.exe UPX C:\Windows\SysWOW64\Fdgdgnbm.exe UPX C:\Windows\SysWOW64\Fkalchij.exe UPX C:\Windows\SysWOW64\Fdialn32.exe UPX C:\Windows\SysWOW64\Fooeif32.exe UPX C:\Windows\SysWOW64\Fhgjblfq.exe UPX C:\Windows\SysWOW64\Flceckoj.exe UPX C:\Windows\SysWOW64\Fhjfhl32.exe UPX C:\Windows\SysWOW64\Gkhbdg32.exe UPX C:\Windows\SysWOW64\Ghlcnk32.exe UPX C:\Windows\SysWOW64\Gcagkdba.exe UPX C:\Windows\SysWOW64\Gfpcgpae.exe UPX C:\Windows\SysWOW64\Gcddpdpo.exe UPX behavioral2/memory/2740-160-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Gdeqhl32.exe UPX C:\Windows\SysWOW64\Gcfqfc32.exe UPX C:\Windows\SysWOW64\Gdhmnlcj.exe UPX C:\Windows\SysWOW64\Gfgjgo32.exe UPX C:\Windows\SysWOW64\Gdjjckag.exe UPX C:\Windows\SysWOW64\Hfifmnij.exe UPX C:\Windows\SysWOW64\Hkfoeega.exe UPX C:\Windows\SysWOW64\Hobkfd32.exe UPX C:\Windows\SysWOW64\Hbpgbo32.exe UPX C:\Windows\SysWOW64\Hcpclbfa.exe UPX C:\Windows\SysWOW64\Heapdjlp.exe UPX C:\Windows\SysWOW64\Hmhhehlb.exe UPX C:\Windows\SysWOW64\Hfqlnm32.exe UPX C:\Windows\SysWOW64\Ifjodl32.exe UPX C:\Windows\SysWOW64\Jianff32.exe UPX C:\Windows\SysWOW64\Jcllonma.exe UPX C:\Windows\SysWOW64\Kibgmdcn.exe UPX C:\Windows\SysWOW64\Lpnlpnih.exe UPX C:\Windows\SysWOW64\Mmlpoqpg.exe UPX C:\Windows\SysWOW64\Mlefklpj.exe UPX C:\Windows\SysWOW64\Nngokoej.exe UPX C:\Windows\SysWOW64\Njqmepik.exe UPX C:\Windows\SysWOW64\Ndhmhh32.exe UPX behavioral2/memory/4220-567-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4104-568-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/5092-594-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2972-595-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4812-601-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/2668-602-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/3264-608-0x0000000000400000-0x0000000000453000-memory.dmp UPX behavioral2/memory/4928-609-0x0000000000400000-0x0000000000453000-memory.dmp UPX C:\Windows\SysWOW64\Pnonbk32.exe UPX C:\Windows\SysWOW64\Pfjcgn32.exe UPX C:\Windows\SysWOW64\Qnjnnj32.exe UPX C:\Windows\SysWOW64\Aqkgpedc.exe UPX C:\Windows\SysWOW64\Aminee32.exe UPX C:\Windows\SysWOW64\Bagflcje.exe UPX C:\Windows\SysWOW64\Bmngqdpj.exe UPX C:\Windows\SysWOW64\Bffkij32.exe UPX C:\Windows\SysWOW64\Beihma32.exe UPX C:\Windows\SysWOW64\Chmndlge.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
Eapedd32.exeEhimanbq.exeEemnjbaj.exeEhljfnpn.exeEkjfcipa.exeEofbch32.exeFdegandp.exeFllpbldb.exeFdgdgnbm.exeFkalchij.exeFdialn32.exeFooeif32.exeFhgjblfq.exeFlceckoj.exeFhjfhl32.exeGkhbdg32.exeGhlcnk32.exeGcagkdba.exeGfpcgpae.exeGcddpdpo.exeGdeqhl32.exeGcfqfc32.exeGdhmnlcj.exeGfgjgo32.exeGdjjckag.exeHfifmnij.exeHkfoeega.exeHobkfd32.exeHbpgbo32.exeHcpclbfa.exeHeapdjlp.exeHmhhehlb.exeHfqlnm32.exeIkpaldog.exeIcgjmapi.exeIehfdi32.exeIpnjab32.exeIfgbnlmj.exeImakkfdg.exeIfjodl32.exeIpbdmaah.exeIikhfg32.exeJfoiokfb.exeJpgmha32.exeJfaedkdp.exeJcefno32.exeJianff32.exeJbjcolha.exeJlbgha32.exeJblpek32.exeJeklag32.exeJcllonma.exeKemhff32.exeKmdqgd32.exeKdnidn32.exeKfmepi32.exeKmfmmcbo.exeKbceejpf.exeKmijbcpl.exeKbfbkj32.exeKibgmdcn.exeLiddbc32.exeLpnlpnih.exeLlemdo32.exepid process 3908 Eapedd32.exe 4516 Ehimanbq.exe 2968 Eemnjbaj.exe 664 Ehljfnpn.exe 4220 Ekjfcipa.exe 2056 Eofbch32.exe 1748 Fdegandp.exe 3420 Fllpbldb.exe 5092 Fdgdgnbm.exe 4812 Fkalchij.exe 3264 Fdialn32.exe 4504 Fooeif32.exe 1192 Fhgjblfq.exe 5028 Flceckoj.exe 2308 Fhjfhl32.exe 4600 Gkhbdg32.exe 668 Ghlcnk32.exe 4952 Gcagkdba.exe 3372 Gfpcgpae.exe 2740 Gcddpdpo.exe 3504 Gdeqhl32.exe 4236 Gcfqfc32.exe 3844 Gdhmnlcj.exe 2940 Gfgjgo32.exe 2600 Gdjjckag.exe 2544 Hfifmnij.exe 1664 Hkfoeega.exe 5072 Hobkfd32.exe 1912 Hbpgbo32.exe 2884 Hcpclbfa.exe 1172 Heapdjlp.exe 2788 Hmhhehlb.exe 3200 Hfqlnm32.exe 1684 Ikpaldog.exe 2588 Icgjmapi.exe 5012 Iehfdi32.exe 5020 Ipnjab32.exe 2984 Ifgbnlmj.exe 1804 Imakkfdg.exe 1660 Ifjodl32.exe 3612 Ipbdmaah.exe 1384 Iikhfg32.exe 4872 Jfoiokfb.exe 4912 Jpgmha32.exe 620 Jfaedkdp.exe 4720 Jcefno32.exe 3028 Jianff32.exe 2132 Jbjcolha.exe 3952 Jlbgha32.exe 2648 Jblpek32.exe 4628 Jeklag32.exe 1864 Jcllonma.exe 4296 Kemhff32.exe 4944 Kmdqgd32.exe 4248 Kdnidn32.exe 4840 Kfmepi32.exe 188 Kmfmmcbo.exe 968 Kbceejpf.exe 5016 Kmijbcpl.exe 2808 Kbfbkj32.exe 764 Kibgmdcn.exe 2236 Liddbc32.exe 1892 Lpnlpnih.exe 744 Llemdo32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Fcniglmb.exeHplicjok.exeLncjlq32.exeHofmfmhj.exeCcnncgmc.exeCobkhb32.exeLpnlpnih.exeEplgeokq.exeManmoq32.exeJiglnf32.exeLqhdbm32.exeIdgojc32.exeDanecp32.exeNplkmckj.exeBffkij32.exeNhmeapmd.exeGflhoo32.exeMbognp32.exeNeppokal.exeNobdbkhf.exeOaompd32.exeDhhnpjmh.exeBheffh32.exePmaffnce.exeCceddf32.exeCihclh32.exeGljgbllj.exeMeefofek.exeAoalgn32.exeLopmii32.exeAfbgkl32.exeNlkgmh32.exeFmcjpl32.exeJnhidk32.exeKihnmohm.exeDfhjkabi.exeAhenokjf.exeGknkpjfb.exeJpkphjeb.exeOphjiaql.exeJbfheo32.exeHibafp32.exeIllfdc32.exeEgijmegb.exeFkeodaai.exeDdcqedkk.exeHgnoki32.exeOhhnbhok.exeEhljfnpn.exeKgflcifg.exeCnicfe32.exedescription ioc process File created C:\Windows\SysWOW64\Fjhacf32.exe Fcniglmb.exe File created C:\Windows\SysWOW64\Gefchq32.dll Hplicjok.exe File opened for modification C:\Windows\SysWOW64\Modgdicm.exe Lncjlq32.exe File opened for modification C:\Windows\SysWOW64\Hdbfodfa.exe Hofmfmhj.exe File opened for modification C:\Windows\SysWOW64\Cikglnkj.exe Ccnncgmc.exe File opened for modification C:\Windows\SysWOW64\Cfldelik.exe Cobkhb32.exe File created C:\Windows\SysWOW64\Fhkkfnao.dll File opened for modification C:\Windows\SysWOW64\Llemdo32.exe Lpnlpnih.exe File created C:\Windows\SysWOW64\Ebjcajjd.exe Eplgeokq.exe File created C:\Windows\SysWOW64\Nghekkmn.exe Manmoq32.exe File created C:\Windows\SysWOW64\Jiiicf32.exe Jiglnf32.exe File created C:\Windows\SysWOW64\Lcgpni32.exe Lqhdbm32.exe File created C:\Windows\SysWOW64\Kplmliko.exe File created C:\Windows\SysWOW64\Iickkbje.exe Idgojc32.exe File created C:\Windows\SysWOW64\Nbgngp32.dll Danecp32.exe File created C:\Windows\SysWOW64\Ogfcjm32.exe Nplkmckj.exe File created C:\Windows\SysWOW64\Ejccgi32.exe File created C:\Windows\SysWOW64\Iphcjp32.dll Bffkij32.exe File created C:\Windows\SysWOW64\Fcplmmbl.dll Nhmeapmd.exe File opened for modification C:\Windows\SysWOW64\Gikdkj32.exe Gflhoo32.exe File opened for modification C:\Windows\SysWOW64\Niipjj32.exe Mbognp32.exe File created C:\Windows\SysWOW64\Hpfohk32.dll File created C:\Windows\SysWOW64\Npedmdab.exe Neppokal.exe File opened for modification C:\Windows\SysWOW64\Nemmoe32.exe Nobdbkhf.exe File created C:\Windows\SysWOW64\Oekiqccc.exe Oaompd32.exe File created C:\Windows\SysWOW64\Kamonn32.dll File created C:\Windows\SysWOW64\Jdipdgch.dll Dhhnpjmh.exe File opened for modification C:\Windows\SysWOW64\Bopocbcq.exe Bheffh32.exe File opened for modification C:\Windows\SysWOW64\Pehngkcg.exe Pmaffnce.exe File opened for modification C:\Windows\SysWOW64\Biklho32.exe File created C:\Windows\SysWOW64\Gdnjfojj.exe File created C:\Windows\SysWOW64\Mennkfdm.dll Cceddf32.exe File opened for modification C:\Windows\SysWOW64\Cobkhb32.exe Cihclh32.exe File created C:\Windows\SysWOW64\Gdaociml.exe Gljgbllj.exe File created C:\Windows\SysWOW64\Eegcnaoo.dll File opened for modification C:\Windows\SysWOW64\Pafkgphl.exe File created C:\Windows\SysWOW64\Nailkcbb.dll File created C:\Windows\SysWOW64\Bfbghcbm.dll Meefofek.exe File created C:\Windows\SysWOW64\Hqdkac32.dll Aoalgn32.exe File created C:\Windows\SysWOW64\Ngidlo32.dll Lopmii32.exe File opened for modification C:\Windows\SysWOW64\Aagkhd32.exe Afbgkl32.exe File created C:\Windows\SysWOW64\Nmlddqem.exe Nlkgmh32.exe File created C:\Windows\SysWOW64\Fbpchb32.exe Fmcjpl32.exe File created C:\Windows\SysWOW64\Jdaaaeqg.exe Jnhidk32.exe File created C:\Windows\SysWOW64\Kpbfii32.exe Kihnmohm.exe File created C:\Windows\SysWOW64\Diffglam.exe Dfhjkabi.exe File created C:\Windows\SysWOW64\Llemdo32.exe Lpnlpnih.exe File opened for modification C:\Windows\SysWOW64\Akcjkfij.exe Ahenokjf.exe File created C:\Windows\SysWOW64\Gahcmd32.exe Gknkpjfb.exe File opened for modification C:\Windows\SysWOW64\Jicdap32.exe Jpkphjeb.exe File opened for modification C:\Windows\SysWOW64\Pedbahod.exe Ophjiaql.exe File created C:\Windows\SysWOW64\Jhpqaiji.exe Jbfheo32.exe File opened for modification C:\Windows\SysWOW64\Hplicjok.exe Hibafp32.exe File created C:\Windows\SysWOW64\Dafmjm32.dll Illfdc32.exe File opened for modification C:\Windows\SysWOW64\Kibeoo32.exe File opened for modification C:\Windows\SysWOW64\Eopbnbhd.exe Egijmegb.exe File created C:\Windows\SysWOW64\Cbokknag.dll Fkeodaai.exe File created C:\Windows\SysWOW64\Djmibn32.exe Ddcqedkk.exe File opened for modification C:\Windows\SysWOW64\Hnhghcki.exe Hgnoki32.exe File created C:\Windows\SysWOW64\Hclnnc32.dll Fcniglmb.exe File created C:\Windows\SysWOW64\Omegjomb.exe Ohhnbhok.exe File created C:\Windows\SysWOW64\Ekjfcipa.exe Ehljfnpn.exe File opened for modification C:\Windows\SysWOW64\Knqepc32.exe Kgflcifg.exe File created C:\Windows\SysWOW64\Echdno32.dll Cnicfe32.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 11916 12524 -
Modifies registry class 64 IoCs
Processes:
Ghhhcomg.exeOhhnbhok.exeIikhfg32.exeAcqimo32.exeMbedga32.exeNcfmno32.exeDhmgki32.exeLlbidimc.exeFdfmlhna.exeOnkidm32.exeOmgmeigd.exeAqkgpedc.exeLbkkgl32.exeOlfghg32.exeBhhiemoj.exeBhpofl32.exeBeihma32.exeLkabjbih.exeQkjgegae.exeFngcmcfe.exeBhhdil32.exeObcceg32.exeOalipoiq.exePmiikh32.exeBfkedibe.exeCalhnpgn.exeOmdppiif.exeMidfokpm.exeLnnbqnjn.exeFlpmagqi.exeHbpgbo32.exeAaoaic32.exeOeoblb32.exeKfnkkb32.exeBmkcqn32.exeCidjbmcp.exeFagjfflb.exeGdjjckag.exeJjjghcfp.exeLjobpiql.exeHhiajmod.exeBelebq32.exeFhmpagkp.exeBepmoh32.exeOnhhamgg.exeJpmlnjco.exeFdffbake.exeJbfheo32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hepfdc32.dll" Ghhhcomg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ohhnbhok.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Iikhfg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Acqimo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mbedga32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncfmno32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhmgki32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aamebb32.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Llbidimc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gbhibfek.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fonahn32.dll" Fdfmlhna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onkidm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gadiippo.dll" Omgmeigd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Aqkgpedc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Apddkmko.dll" Lbkkgl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Olfghg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhhiemoj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bhpofl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Beihma32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lkabjbih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fdlgcl32.dll" Qkjgegae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fngcmcfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bhhdil32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iglhgnlj.dll" Obcceg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dgeofeib.dll" Oalipoiq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pmiikh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bfkedibe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hdhpgj32.dll" Calhnpgn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Omdppiif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohnefj32.dll" Midfokpm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lnnbqnjn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Flpmagqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hbpgbo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aaoaic32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Oeoblb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmekjp32.dll" Kfnkkb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Icgcab32.dll" Bmkcqn32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fbackgod.dll" Cidjbmcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fagjfflb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gdjjckag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jjjghcfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ljobpiql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Facdchai.dll" Hhiajmod.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Belebq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ojgljk32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nknbglob.dll" Fhmpagkp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bepmoh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Caecnh32.dll" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dahceqce.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Onhhamgg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jpmlnjco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fdffbake.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jbfheo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naagioah.dll" Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c24b23e85c4834312e815036a8e9dd70bee45bdff070897f6094a1eb331c1942.exeEapedd32.exeEhimanbq.exeEemnjbaj.exeEhljfnpn.exeEkjfcipa.exeEofbch32.exeFdegandp.exeFllpbldb.exeFdgdgnbm.exeFkalchij.exeFdialn32.exeFooeif32.exeFhgjblfq.exeFlceckoj.exeFhjfhl32.exeGkhbdg32.exeGhlcnk32.exeGcagkdba.exeGfpcgpae.exeGcddpdpo.exeGdeqhl32.exedescription pid process target process PID 4992 wrote to memory of 3908 4992 c24b23e85c4834312e815036a8e9dd70bee45bdff070897f6094a1eb331c1942.exe Eapedd32.exe PID 4992 wrote to memory of 3908 4992 c24b23e85c4834312e815036a8e9dd70bee45bdff070897f6094a1eb331c1942.exe Eapedd32.exe PID 4992 wrote to memory of 3908 4992 c24b23e85c4834312e815036a8e9dd70bee45bdff070897f6094a1eb331c1942.exe Eapedd32.exe PID 3908 wrote to memory of 4516 3908 Eapedd32.exe Ehimanbq.exe PID 3908 wrote to memory of 4516 3908 Eapedd32.exe Ehimanbq.exe PID 3908 wrote to memory of 4516 3908 Eapedd32.exe Ehimanbq.exe PID 4516 wrote to memory of 2968 4516 Ehimanbq.exe Eemnjbaj.exe PID 4516 wrote to memory of 2968 4516 Ehimanbq.exe Eemnjbaj.exe PID 4516 wrote to memory of 2968 4516 Ehimanbq.exe Eemnjbaj.exe PID 2968 wrote to memory of 664 2968 Eemnjbaj.exe Ehljfnpn.exe PID 2968 wrote to memory of 664 2968 Eemnjbaj.exe Ehljfnpn.exe PID 2968 wrote to memory of 664 2968 Eemnjbaj.exe Ehljfnpn.exe PID 664 wrote to memory of 4220 664 Ehljfnpn.exe Ekjfcipa.exe PID 664 wrote to memory of 4220 664 Ehljfnpn.exe Ekjfcipa.exe PID 664 wrote to memory of 4220 664 Ehljfnpn.exe Ekjfcipa.exe PID 4220 wrote to memory of 2056 4220 Ekjfcipa.exe Eofbch32.exe PID 4220 wrote to memory of 2056 4220 Ekjfcipa.exe Eofbch32.exe PID 4220 wrote to memory of 2056 4220 Ekjfcipa.exe Eofbch32.exe PID 2056 wrote to memory of 1748 2056 Eofbch32.exe Fdegandp.exe PID 2056 wrote to memory of 1748 2056 Eofbch32.exe Fdegandp.exe PID 2056 wrote to memory of 1748 2056 Eofbch32.exe Fdegandp.exe PID 1748 wrote to memory of 3420 1748 Fdegandp.exe Fllpbldb.exe PID 1748 wrote to memory of 3420 1748 Fdegandp.exe Fllpbldb.exe PID 1748 wrote to memory of 3420 1748 Fdegandp.exe Fllpbldb.exe PID 3420 wrote to memory of 5092 3420 Fllpbldb.exe Fdgdgnbm.exe PID 3420 wrote to memory of 5092 3420 Fllpbldb.exe Fdgdgnbm.exe PID 3420 wrote to memory of 5092 3420 Fllpbldb.exe Fdgdgnbm.exe PID 5092 wrote to memory of 4812 5092 Fdgdgnbm.exe Fkalchij.exe PID 5092 wrote to memory of 4812 5092 Fdgdgnbm.exe Fkalchij.exe PID 5092 wrote to memory of 4812 5092 Fdgdgnbm.exe Fkalchij.exe PID 4812 wrote to memory of 3264 4812 Fkalchij.exe Fdialn32.exe PID 4812 wrote to memory of 3264 4812 Fkalchij.exe Fdialn32.exe PID 4812 wrote to memory of 3264 4812 Fkalchij.exe Fdialn32.exe PID 3264 wrote to memory of 4504 3264 Fdialn32.exe Fooeif32.exe PID 3264 wrote to memory of 4504 3264 Fdialn32.exe Fooeif32.exe PID 3264 wrote to memory of 4504 3264 Fdialn32.exe Fooeif32.exe PID 4504 wrote to memory of 1192 4504 Fooeif32.exe Fhgjblfq.exe PID 4504 wrote to memory of 1192 4504 Fooeif32.exe Fhgjblfq.exe PID 4504 wrote to memory of 1192 4504 Fooeif32.exe Fhgjblfq.exe PID 1192 wrote to memory of 5028 1192 Fhgjblfq.exe Flceckoj.exe PID 1192 wrote to memory of 5028 1192 Fhgjblfq.exe Flceckoj.exe PID 1192 wrote to memory of 5028 1192 Fhgjblfq.exe Flceckoj.exe PID 5028 wrote to memory of 2308 5028 Flceckoj.exe Fhjfhl32.exe PID 5028 wrote to memory of 2308 5028 Flceckoj.exe Fhjfhl32.exe PID 5028 wrote to memory of 2308 5028 Flceckoj.exe Fhjfhl32.exe PID 2308 wrote to memory of 4600 2308 Fhjfhl32.exe Gkhbdg32.exe PID 2308 wrote to memory of 4600 2308 Fhjfhl32.exe Gkhbdg32.exe PID 2308 wrote to memory of 4600 2308 Fhjfhl32.exe Gkhbdg32.exe PID 4600 wrote to memory of 668 4600 Gkhbdg32.exe Ghlcnk32.exe PID 4600 wrote to memory of 668 4600 Gkhbdg32.exe Ghlcnk32.exe PID 4600 wrote to memory of 668 4600 Gkhbdg32.exe Ghlcnk32.exe PID 668 wrote to memory of 4952 668 Ghlcnk32.exe Gcagkdba.exe PID 668 wrote to memory of 4952 668 Ghlcnk32.exe Gcagkdba.exe PID 668 wrote to memory of 4952 668 Ghlcnk32.exe Gcagkdba.exe PID 4952 wrote to memory of 3372 4952 Gcagkdba.exe Gfpcgpae.exe PID 4952 wrote to memory of 3372 4952 Gcagkdba.exe Gfpcgpae.exe PID 4952 wrote to memory of 3372 4952 Gcagkdba.exe Gfpcgpae.exe PID 3372 wrote to memory of 2740 3372 Gfpcgpae.exe Gcddpdpo.exe PID 3372 wrote to memory of 2740 3372 Gfpcgpae.exe Gcddpdpo.exe PID 3372 wrote to memory of 2740 3372 Gfpcgpae.exe Gcddpdpo.exe PID 2740 wrote to memory of 3504 2740 Gcddpdpo.exe Gdeqhl32.exe PID 2740 wrote to memory of 3504 2740 Gcddpdpo.exe Gdeqhl32.exe PID 2740 wrote to memory of 3504 2740 Gcddpdpo.exe Gdeqhl32.exe PID 3504 wrote to memory of 4236 3504 Gdeqhl32.exe Gcfqfc32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c24b23e85c4834312e815036a8e9dd70bee45bdff070897f6094a1eb331c1942.exe"C:\Users\Admin\AppData\Local\Temp\c24b23e85c4834312e815036a8e9dd70bee45bdff070897f6094a1eb331c1942.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\Eapedd32.exeC:\Windows\system32\Eapedd32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\Ehimanbq.exeC:\Windows\system32\Ehimanbq.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\Eemnjbaj.exeC:\Windows\system32\Eemnjbaj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\Ehljfnpn.exeC:\Windows\system32\Ehljfnpn.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\Ekjfcipa.exeC:\Windows\system32\Ekjfcipa.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\Eofbch32.exeC:\Windows\system32\Eofbch32.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\Fdegandp.exeC:\Windows\system32\Fdegandp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\Fllpbldb.exeC:\Windows\system32\Fllpbldb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\Fdgdgnbm.exeC:\Windows\system32\Fdgdgnbm.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\Fkalchij.exeC:\Windows\system32\Fkalchij.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\Fdialn32.exeC:\Windows\system32\Fdialn32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\Fooeif32.exeC:\Windows\system32\Fooeif32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\Fhgjblfq.exeC:\Windows\system32\Fhgjblfq.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\Flceckoj.exeC:\Windows\system32\Flceckoj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\Fhjfhl32.exeC:\Windows\system32\Fhjfhl32.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\Gkhbdg32.exeC:\Windows\system32\Gkhbdg32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\Ghlcnk32.exeC:\Windows\system32\Ghlcnk32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\Gcagkdba.exeC:\Windows\system32\Gcagkdba.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\Gfpcgpae.exeC:\Windows\system32\Gfpcgpae.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\Gcddpdpo.exeC:\Windows\system32\Gcddpdpo.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\Gdeqhl32.exeC:\Windows\system32\Gdeqhl32.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\Gcfqfc32.exeC:\Windows\system32\Gcfqfc32.exe23⤵
- Executes dropped EXE
PID:4236 -
C:\Windows\SysWOW64\Gdhmnlcj.exeC:\Windows\system32\Gdhmnlcj.exe24⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\Gfgjgo32.exeC:\Windows\system32\Gfgjgo32.exe25⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\SysWOW64\Gdjjckag.exeC:\Windows\system32\Gdjjckag.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:2600 -
C:\Windows\SysWOW64\Hfifmnij.exeC:\Windows\system32\Hfifmnij.exe27⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\Hkfoeega.exeC:\Windows\system32\Hkfoeega.exe28⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\Hobkfd32.exeC:\Windows\system32\Hobkfd32.exe29⤵
- Executes dropped EXE
PID:5072 -
C:\Windows\SysWOW64\Hbpgbo32.exeC:\Windows\system32\Hbpgbo32.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\Hflcbngh.exeC:\Windows\system32\Hflcbngh.exe31⤵PID:3360
-
C:\Windows\SysWOW64\Hcpclbfa.exeC:\Windows\system32\Hcpclbfa.exe32⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\SysWOW64\Heapdjlp.exeC:\Windows\system32\Heapdjlp.exe33⤵
- Executes dropped EXE
PID:1172 -
C:\Windows\SysWOW64\Hmhhehlb.exeC:\Windows\system32\Hmhhehlb.exe34⤵
- Executes dropped EXE
PID:2788 -
C:\Windows\SysWOW64\Hfqlnm32.exeC:\Windows\system32\Hfqlnm32.exe35⤵
- Executes dropped EXE
PID:3200 -
C:\Windows\SysWOW64\Ikpaldog.exeC:\Windows\system32\Ikpaldog.exe36⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\SysWOW64\Icgjmapi.exeC:\Windows\system32\Icgjmapi.exe37⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Iehfdi32.exeC:\Windows\system32\Iehfdi32.exe38⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\Ipnjab32.exeC:\Windows\system32\Ipnjab32.exe39⤵
- Executes dropped EXE
PID:5020 -
C:\Windows\SysWOW64\Ifgbnlmj.exeC:\Windows\system32\Ifgbnlmj.exe40⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\Imakkfdg.exeC:\Windows\system32\Imakkfdg.exe41⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\Ifjodl32.exeC:\Windows\system32\Ifjodl32.exe42⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\Ipbdmaah.exeC:\Windows\system32\Ipbdmaah.exe43⤵
- Executes dropped EXE
PID:3612 -
C:\Windows\SysWOW64\Iikhfg32.exeC:\Windows\system32\Iikhfg32.exe44⤵
- Executes dropped EXE
- Modifies registry class
PID:1384 -
C:\Windows\SysWOW64\Jfoiokfb.exeC:\Windows\system32\Jfoiokfb.exe45⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\Jpgmha32.exeC:\Windows\system32\Jpgmha32.exe46⤵
- Executes dropped EXE
PID:4912 -
C:\Windows\SysWOW64\Jfaedkdp.exeC:\Windows\system32\Jfaedkdp.exe47⤵
- Executes dropped EXE
PID:620 -
C:\Windows\SysWOW64\Jcefno32.exeC:\Windows\system32\Jcefno32.exe48⤵
- Executes dropped EXE
PID:4720 -
C:\Windows\SysWOW64\Jianff32.exeC:\Windows\system32\Jianff32.exe49⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\Jbjcolha.exeC:\Windows\system32\Jbjcolha.exe50⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\Jlbgha32.exeC:\Windows\system32\Jlbgha32.exe51⤵
- Executes dropped EXE
PID:3952 -
C:\Windows\SysWOW64\Jblpek32.exeC:\Windows\system32\Jblpek32.exe52⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\Jeklag32.exeC:\Windows\system32\Jeklag32.exe53⤵
- Executes dropped EXE
PID:4628 -
C:\Windows\SysWOW64\Jcllonma.exeC:\Windows\system32\Jcllonma.exe54⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\Kemhff32.exeC:\Windows\system32\Kemhff32.exe55⤵
- Executes dropped EXE
PID:4296 -
C:\Windows\SysWOW64\Kmdqgd32.exeC:\Windows\system32\Kmdqgd32.exe56⤵
- Executes dropped EXE
PID:4944 -
C:\Windows\SysWOW64\Kdnidn32.exeC:\Windows\system32\Kdnidn32.exe57⤵
- Executes dropped EXE
PID:4248 -
C:\Windows\SysWOW64\Kfmepi32.exeC:\Windows\system32\Kfmepi32.exe58⤵
- Executes dropped EXE
PID:4840 -
C:\Windows\SysWOW64\Kmfmmcbo.exeC:\Windows\system32\Kmfmmcbo.exe59⤵
- Executes dropped EXE
PID:188 -
C:\Windows\SysWOW64\Kbceejpf.exeC:\Windows\system32\Kbceejpf.exe60⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:968 -
C:\Windows\SysWOW64\Kmijbcpl.exeC:\Windows\system32\Kmijbcpl.exe61⤵
- Executes dropped EXE
PID:5016 -
C:\Windows\SysWOW64\Kbfbkj32.exeC:\Windows\system32\Kbfbkj32.exe62⤵
- Executes dropped EXE
PID:2808 -
C:\Windows\SysWOW64\Kibgmdcn.exeC:\Windows\system32\Kibgmdcn.exe63⤵
- Executes dropped EXE
PID:764 -
C:\Windows\SysWOW64\Liddbc32.exeC:\Windows\system32\Liddbc32.exe64⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\Lpnlpnih.exeC:\Windows\system32\Lpnlpnih.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1892 -
C:\Windows\SysWOW64\Llemdo32.exeC:\Windows\system32\Llemdo32.exe66⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\Lmdina32.exeC:\Windows\system32\Lmdina32.exe67⤵PID:60
-
C:\Windows\SysWOW64\Ldoaklml.exeC:\Windows\system32\Ldoaklml.exe68⤵PID:4532
-
C:\Windows\SysWOW64\Lmgfda32.exeC:\Windows\system32\Lmgfda32.exe69⤵PID:4900
-
C:\Windows\SysWOW64\Lpebpm32.exeC:\Windows\system32\Lpebpm32.exe70⤵PID:3036
-
C:\Windows\SysWOW64\Lgokmgjm.exeC:\Windows\system32\Lgokmgjm.exe71⤵PID:3116
-
C:\Windows\SysWOW64\Lllcen32.exeC:\Windows\system32\Lllcen32.exe72⤵PID:4536
-
C:\Windows\SysWOW64\Mmlpoqpg.exeC:\Windows\system32\Mmlpoqpg.exe73⤵PID:4984
-
C:\Windows\SysWOW64\Mchhggno.exeC:\Windows\system32\Mchhggno.exe74⤵PID:4216
-
C:\Windows\SysWOW64\Mmnldp32.exeC:\Windows\system32\Mmnldp32.exe75⤵PID:4596
-
C:\Windows\SysWOW64\Mdhdajea.exeC:\Windows\system32\Mdhdajea.exe76⤵PID:912
-
C:\Windows\SysWOW64\Mmpijp32.exeC:\Windows\system32\Mmpijp32.exe77⤵PID:2424
-
C:\Windows\SysWOW64\Mlefklpj.exeC:\Windows\system32\Mlefklpj.exe78⤵PID:540
-
C:\Windows\SysWOW64\Menjdbgj.exeC:\Windows\system32\Menjdbgj.exe79⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2676 -
C:\Windows\SysWOW64\Mlhbal32.exeC:\Windows\system32\Mlhbal32.exe80⤵PID:2108
-
C:\Windows\SysWOW64\Nngokoej.exeC:\Windows\system32\Nngokoej.exe81⤵PID:636
-
C:\Windows\SysWOW64\Ncdgcf32.exeC:\Windows\system32\Ncdgcf32.exe82⤵PID:4400
-
C:\Windows\SysWOW64\Nebdoa32.exeC:\Windows\system32\Nebdoa32.exe83⤵PID:4292
-
C:\Windows\SysWOW64\Njqmepik.exeC:\Windows\system32\Njqmepik.exe84⤵PID:3752
-
C:\Windows\SysWOW64\Npjebj32.exeC:\Windows\system32\Npjebj32.exe85⤵PID:2656
-
C:\Windows\SysWOW64\Ndhmhh32.exeC:\Windows\system32\Ndhmhh32.exe86⤵PID:4104
-
C:\Windows\SysWOW64\Odkjng32.exeC:\Windows\system32\Odkjng32.exe87⤵PID:4456
-
C:\Windows\SysWOW64\Olfobjbg.exeC:\Windows\system32\Olfobjbg.exe88⤵PID:1600
-
C:\Windows\SysWOW64\Ocbddc32.exeC:\Windows\system32\Ocbddc32.exe89⤵PID:1556
-
C:\Windows\SysWOW64\Onhhamgg.exeC:\Windows\system32\Onhhamgg.exe90⤵
- Modifies registry class
PID:2972 -
C:\Windows\SysWOW64\Ofcmfodb.exeC:\Windows\system32\Ofcmfodb.exe91⤵PID:2668
-
C:\Windows\SysWOW64\Ocgmpccl.exeC:\Windows\system32\Ocgmpccl.exe92⤵PID:4928
-
C:\Windows\SysWOW64\Pnlaml32.exeC:\Windows\system32\Pnlaml32.exe93⤵PID:2904
-
C:\Windows\SysWOW64\Pnonbk32.exeC:\Windows\system32\Pnonbk32.exe94⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:2268 -
C:\Windows\SysWOW64\Pdifoehl.exeC:\Windows\system32\Pdifoehl.exe95⤵PID:4372
-
C:\Windows\SysWOW64\Pfjcgn32.exeC:\Windows\system32\Pfjcgn32.exe96⤵PID:920
-
C:\Windows\SysWOW64\Pcncpbmd.exeC:\Windows\system32\Pcncpbmd.exe97⤵PID:936
-
C:\Windows\SysWOW64\Pflplnlg.exeC:\Windows\system32\Pflplnlg.exe98⤵PID:4960
-
C:\Windows\SysWOW64\Pmfhig32.exeC:\Windows\system32\Pmfhig32.exe99⤵PID:2864
-
C:\Windows\SysWOW64\Pjjhbl32.exeC:\Windows\system32\Pjjhbl32.exe100⤵PID:1856
-
C:\Windows\SysWOW64\Pdpmpdbd.exeC:\Windows\system32\Pdpmpdbd.exe101⤵PID:5136
-
C:\Windows\SysWOW64\Pjmehkqk.exeC:\Windows\system32\Pjmehkqk.exe102⤵PID:5184
-
C:\Windows\SysWOW64\Qqfmde32.exeC:\Windows\system32\Qqfmde32.exe103⤵PID:5220
-
C:\Windows\SysWOW64\Qnjnnj32.exeC:\Windows\system32\Qnjnnj32.exe104⤵PID:5268
-
C:\Windows\SysWOW64\Qgcbgo32.exeC:\Windows\system32\Qgcbgo32.exe105⤵PID:5312
-
C:\Windows\SysWOW64\Ajanck32.exeC:\Windows\system32\Ajanck32.exe106⤵PID:5356
-
C:\Windows\SysWOW64\Aqkgpedc.exeC:\Windows\system32\Aqkgpedc.exe107⤵
- Modifies registry class
PID:5400 -
C:\Windows\SysWOW64\Ageolo32.exeC:\Windows\system32\Ageolo32.exe108⤵PID:5444
-
C:\Windows\SysWOW64\Ambgef32.exeC:\Windows\system32\Ambgef32.exe109⤵PID:5488
-
C:\Windows\SysWOW64\Aqncedbp.exeC:\Windows\system32\Aqncedbp.exe110⤵PID:5536
-
C:\Windows\SysWOW64\Aclpap32.exeC:\Windows\system32\Aclpap32.exe111⤵PID:5580
-
C:\Windows\SysWOW64\Afjlnk32.exeC:\Windows\system32\Afjlnk32.exe112⤵PID:5624
-
C:\Windows\SysWOW64\Aqppkd32.exeC:\Windows\system32\Aqppkd32.exe113⤵PID:5660
-
C:\Windows\SysWOW64\Agjhgngj.exeC:\Windows\system32\Agjhgngj.exe114⤵PID:5704
-
C:\Windows\SysWOW64\Aeniabfd.exeC:\Windows\system32\Aeniabfd.exe115⤵PID:5748
-
C:\Windows\SysWOW64\Acqimo32.exeC:\Windows\system32\Acqimo32.exe116⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies registry class
PID:5788 -
C:\Windows\SysWOW64\Aminee32.exeC:\Windows\system32\Aminee32.exe117⤵PID:5832
-
C:\Windows\SysWOW64\Accfbokl.exeC:\Windows\system32\Accfbokl.exe118⤵PID:5876
-
C:\Windows\SysWOW64\Bfabnjjp.exeC:\Windows\system32\Bfabnjjp.exe119⤵PID:5916
-
C:\Windows\SysWOW64\Bmkjkd32.exeC:\Windows\system32\Bmkjkd32.exe120⤵PID:5956
-
C:\Windows\SysWOW64\Bagflcje.exeC:\Windows\system32\Bagflcje.exe121⤵PID:6000
-
C:\Windows\SysWOW64\Bcebhoii.exeC:\Windows\system32\Bcebhoii.exe122⤵PID:6040
-
C:\Windows\SysWOW64\Bmngqdpj.exeC:\Windows\system32\Bmngqdpj.exe123⤵PID:6084
-
C:\Windows\SysWOW64\Bchomn32.exeC:\Windows\system32\Bchomn32.exe124⤵PID:6128
-
C:\Windows\SysWOW64\Bffkij32.exeC:\Windows\system32\Bffkij32.exe125⤵
- Drops file in System32 directory
PID:5156 -
C:\Windows\SysWOW64\Balpgb32.exeC:\Windows\system32\Balpgb32.exe126⤵PID:5208
-
C:\Windows\SysWOW64\Bcjlcn32.exeC:\Windows\system32\Bcjlcn32.exe127⤵PID:5292
-
C:\Windows\SysWOW64\Bjddphlq.exeC:\Windows\system32\Bjddphlq.exe128⤵PID:5352
-
C:\Windows\SysWOW64\Beihma32.exeC:\Windows\system32\Beihma32.exe129⤵
- Modifies registry class
PID:3756 -
C:\Windows\SysWOW64\Bhhdil32.exeC:\Windows\system32\Bhhdil32.exe130⤵
- Modifies registry class
PID:5480 -
C:\Windows\SysWOW64\Bfkedibe.exeC:\Windows\system32\Bfkedibe.exe131⤵
- Modifies registry class
PID:5548 -
C:\Windows\SysWOW64\Bnbmefbg.exeC:\Windows\system32\Bnbmefbg.exe132⤵PID:5616
-
C:\Windows\SysWOW64\Belebq32.exeC:\Windows\system32\Belebq32.exe133⤵
- Modifies registry class
PID:5692 -
C:\Windows\SysWOW64\Bcoenmao.exeC:\Windows\system32\Bcoenmao.exe134⤵PID:5764
-
C:\Windows\SysWOW64\Cjinkg32.exeC:\Windows\system32\Cjinkg32.exe135⤵PID:5828
-
C:\Windows\SysWOW64\Chmndlge.exeC:\Windows\system32\Chmndlge.exe136⤵PID:5904
-
C:\Windows\SysWOW64\Cnffqf32.exeC:\Windows\system32\Cnffqf32.exe137⤵PID:5968
-
C:\Windows\SysWOW64\Caebma32.exeC:\Windows\system32\Caebma32.exe138⤵PID:6036
-
C:\Windows\SysWOW64\Chokikeb.exeC:\Windows\system32\Chokikeb.exe139⤵PID:6104
-
C:\Windows\SysWOW64\Cnicfe32.exeC:\Windows\system32\Cnicfe32.exe140⤵
- Drops file in System32 directory
PID:5124 -
C:\Windows\SysWOW64\Cagobalc.exeC:\Windows\system32\Cagobalc.exe141⤵PID:5264
-
C:\Windows\SysWOW64\Cfdhkhjj.exeC:\Windows\system32\Cfdhkhjj.exe142⤵PID:5388
-
C:\Windows\SysWOW64\Cajlhqjp.exeC:\Windows\system32\Cajlhqjp.exe143⤵PID:5452
-
C:\Windows\SysWOW64\Ceehho32.exeC:\Windows\system32\Ceehho32.exe144⤵PID:5600
-
C:\Windows\SysWOW64\Cffdpghg.exeC:\Windows\system32\Cffdpghg.exe145⤵PID:5700
-
C:\Windows\SysWOW64\Cnnlaehj.exeC:\Windows\system32\Cnnlaehj.exe146⤵PID:5820
-
C:\Windows\SysWOW64\Calhnpgn.exeC:\Windows\system32\Calhnpgn.exe147⤵
- Modifies registry class
PID:5936 -
C:\Windows\SysWOW64\Djdmffnn.exeC:\Windows\system32\Djdmffnn.exe148⤵PID:6032
-
C:\Windows\SysWOW64\Danecp32.exeC:\Windows\system32\Danecp32.exe149⤵
- Drops file in System32 directory
PID:5128 -
C:\Windows\SysWOW64\Dhhnpjmh.exeC:\Windows\system32\Dhhnpjmh.exe150⤵
- Drops file in System32 directory
PID:5340 -
C:\Windows\SysWOW64\Daqbip32.exeC:\Windows\system32\Daqbip32.exe151⤵PID:5464
-
C:\Windows\SysWOW64\Delnin32.exeC:\Windows\system32\Delnin32.exe152⤵PID:5688
-
C:\Windows\SysWOW64\Dkifae32.exeC:\Windows\system32\Dkifae32.exe153⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5844 -
C:\Windows\SysWOW64\Daconoae.exeC:\Windows\system32\Daconoae.exe154⤵PID:6020
-
C:\Windows\SysWOW64\Dhmgki32.exeC:\Windows\system32\Dhmgki32.exe155⤵
- Modifies registry class
PID:5380 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe156⤵PID:5476
-
C:\Windows\SysWOW64\Deagdn32.exeC:\Windows\system32\Deagdn32.exe157⤵PID:5732
-
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe158⤵PID:6028
-
C:\Windows\SysWOW64\Doilmc32.exeC:\Windows\system32\Doilmc32.exe159⤵PID:5332
-
C:\Windows\SysWOW64\Eecdjmfi.exeC:\Windows\system32\Eecdjmfi.exe160⤵PID:5780
-
C:\Windows\SysWOW64\Egdqae32.exeC:\Windows\system32\Egdqae32.exe161⤵PID:5216
-
C:\Windows\SysWOW64\Eolhbc32.exeC:\Windows\system32\Eolhbc32.exe162⤵PID:5724
-
C:\Windows\SysWOW64\Eajeon32.exeC:\Windows\system32\Eajeon32.exe163⤵PID:5668
-
C:\Windows\SysWOW64\Edhakj32.exeC:\Windows\system32\Edhakj32.exe164⤵PID:5164
-
C:\Windows\SysWOW64\Eggmge32.exeC:\Windows\system32\Eggmge32.exe165⤵PID:6164
-
C:\Windows\SysWOW64\Eehnem32.exeC:\Windows\system32\Eehnem32.exe166⤵PID:6204
-
C:\Windows\SysWOW64\Egijmegb.exeC:\Windows\system32\Egijmegb.exe167⤵
- Drops file in System32 directory
PID:6244 -
C:\Windows\SysWOW64\Eopbnbhd.exeC:\Windows\system32\Eopbnbhd.exe168⤵PID:6284
-
C:\Windows\SysWOW64\Edmjfifl.exeC:\Windows\system32\Edmjfifl.exe169⤵PID:6328
-
C:\Windows\SysWOW64\Eobocb32.exeC:\Windows\system32\Eobocb32.exe170⤵PID:6368
-
C:\Windows\SysWOW64\Eaakpm32.exeC:\Windows\system32\Eaakpm32.exe171⤵PID:6416
-
C:\Windows\SysWOW64\Edpgli32.exeC:\Windows\system32\Edpgli32.exe172⤵PID:6460
-
C:\Windows\SysWOW64\Egnchd32.exeC:\Windows\system32\Egnchd32.exe173⤵PID:6508
-
C:\Windows\SysWOW64\Eoekia32.exeC:\Windows\system32\Eoekia32.exe174⤵PID:6548
-
C:\Windows\SysWOW64\Fhmpagkp.exeC:\Windows\system32\Fhmpagkp.exe175⤵
- Modifies registry class
PID:6592 -
C:\Windows\SysWOW64\Foghnabl.exeC:\Windows\system32\Foghnabl.exe176⤵PID:6632
-
C:\Windows\SysWOW64\Feapkk32.exeC:\Windows\system32\Feapkk32.exe177⤵PID:6676
-
C:\Windows\SysWOW64\Fhpmgg32.exeC:\Windows\system32\Fhpmgg32.exe178⤵PID:6708
-
C:\Windows\SysWOW64\Fknicb32.exeC:\Windows\system32\Fknicb32.exe179⤵PID:6748
-
C:\Windows\SysWOW64\Fahaplon.exeC:\Windows\system32\Fahaplon.exe180⤵PID:6788
-
C:\Windows\SysWOW64\Fdfmlhna.exeC:\Windows\system32\Fdfmlhna.exe181⤵
- Modifies registry class
PID:6832 -
C:\Windows\SysWOW64\Fnobem32.exeC:\Windows\system32\Fnobem32.exe182⤵PID:6872
-
C:\Windows\SysWOW64\Fefjfked.exeC:\Windows\system32\Fefjfked.exe183⤵PID:6916
-
C:\Windows\SysWOW64\Fkcboack.exeC:\Windows\system32\Fkcboack.exe184⤵PID:6964
-
C:\Windows\SysWOW64\Fnaokmco.exeC:\Windows\system32\Fnaokmco.exe185⤵PID:7012
-
C:\Windows\SysWOW64\Fdkggg32.exeC:\Windows\system32\Fdkggg32.exe186⤵PID:7052
-
C:\Windows\SysWOW64\Fkeodaai.exeC:\Windows\system32\Fkeodaai.exe187⤵
- Drops file in System32 directory
PID:7096 -
C:\Windows\SysWOW64\Gaogak32.exeC:\Windows\system32\Gaogak32.exe188⤵PID:7136
-
C:\Windows\SysWOW64\Ghipne32.exeC:\Windows\system32\Ghipne32.exe189⤵PID:2784
-
C:\Windows\SysWOW64\Gochjpho.exeC:\Windows\system32\Gochjpho.exe190⤵PID:6216
-
C:\Windows\SysWOW64\Gdppbfff.exeC:\Windows\system32\Gdppbfff.exe191⤵PID:6292
-
C:\Windows\SysWOW64\Ggnlobej.exeC:\Windows\system32\Ggnlobej.exe192⤵PID:6356
-
C:\Windows\SysWOW64\Goedpofl.exeC:\Windows\system32\Goedpofl.exe193⤵PID:6408
-
C:\Windows\SysWOW64\Gdbmhf32.exeC:\Windows\system32\Gdbmhf32.exe194⤵PID:6472
-
C:\Windows\SysWOW64\Ggqida32.exeC:\Windows\system32\Ggqida32.exe195⤵PID:6540
-
C:\Windows\SysWOW64\Gnkaalkd.exeC:\Windows\system32\Gnkaalkd.exe196⤵PID:6600
-
C:\Windows\SysWOW64\Gddinf32.exeC:\Windows\system32\Gddinf32.exe197⤵PID:5472
-
C:\Windows\SysWOW64\Ghpendjj.exeC:\Windows\system32\Ghpendjj.exe198⤵PID:6720
-
C:\Windows\SysWOW64\Gojnko32.exeC:\Windows\system32\Gojnko32.exe199⤵PID:6796
-
C:\Windows\SysWOW64\Gfdfgiid.exeC:\Windows\system32\Gfdfgiid.exe200⤵PID:2744
-
C:\Windows\SysWOW64\Ghbbcd32.exeC:\Windows\system32\Ghbbcd32.exe201⤵PID:6904
-
C:\Windows\SysWOW64\Goljqnpd.exeC:\Windows\system32\Goljqnpd.exe202⤵PID:6984
-
C:\Windows\SysWOW64\Hakgmjoh.exeC:\Windows\system32\Hakgmjoh.exe203⤵PID:7036
-
C:\Windows\SysWOW64\Hghoeqmp.exeC:\Windows\system32\Hghoeqmp.exe204⤵PID:7092
-
C:\Windows\SysWOW64\Hnagak32.exeC:\Windows\system32\Hnagak32.exe205⤵PID:5656
-
C:\Windows\SysWOW64\Hhgloc32.exeC:\Windows\system32\Hhgloc32.exe206⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6236 -
C:\Windows\SysWOW64\Hkehkocf.exeC:\Windows\system32\Hkehkocf.exe207⤵PID:6352
-
C:\Windows\SysWOW64\Hbpphi32.exeC:\Windows\system32\Hbpphi32.exe208⤵PID:6452
-
C:\Windows\SysWOW64\Hhihdcbp.exeC:\Windows\system32\Hhihdcbp.exe209⤵PID:6572
-
C:\Windows\SysWOW64\Hocqam32.exeC:\Windows\system32\Hocqam32.exe210⤵PID:6672
-
C:\Windows\SysWOW64\Hfningai.exeC:\Windows\system32\Hfningai.exe211⤵PID:6744
-
C:\Windows\SysWOW64\Hgoeep32.exeC:\Windows\system32\Hgoeep32.exe212⤵PID:6860
-
C:\Windows\SysWOW64\Hofmfmhj.exeC:\Windows\system32\Hofmfmhj.exe213⤵
- Drops file in System32 directory
PID:6952 -
C:\Windows\SysWOW64\Hdbfodfa.exeC:\Windows\system32\Hdbfodfa.exe214⤵PID:7060
-
C:\Windows\SysWOW64\Hkmnln32.exeC:\Windows\system32\Hkmnln32.exe215⤵PID:7144
-
C:\Windows\SysWOW64\Iohjlmeg.exeC:\Windows\system32\Iohjlmeg.exe216⤵PID:6212
-
C:\Windows\SysWOW64\Ifbbig32.exeC:\Windows\system32\Ifbbig32.exe217⤵PID:6360
-
C:\Windows\SysWOW64\Igcoqocb.exeC:\Windows\system32\Igcoqocb.exe218⤵PID:4996
-
C:\Windows\SysWOW64\Iokgal32.exeC:\Windows\system32\Iokgal32.exe219⤵PID:6668
-
C:\Windows\SysWOW64\Ibicnh32.exeC:\Windows\system32\Ibicnh32.exe220⤵PID:6824
-
C:\Windows\SysWOW64\Idgojc32.exeC:\Windows\system32\Idgojc32.exe221⤵
- Drops file in System32 directory
PID:6996 -
C:\Windows\SysWOW64\Iickkbje.exeC:\Windows\system32\Iickkbje.exe222⤵PID:7124
-
C:\Windows\SysWOW64\Ibkpcg32.exeC:\Windows\system32\Ibkpcg32.exe223⤵PID:264
-
C:\Windows\SysWOW64\Idjlpc32.exeC:\Windows\system32\Idjlpc32.exe224⤵PID:6264
-
C:\Windows\SysWOW64\Ioopml32.exeC:\Windows\system32\Ioopml32.exe225⤵PID:6500
-
C:\Windows\SysWOW64\Ibnligoc.exeC:\Windows\system32\Ibnligoc.exe226⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6800 -
C:\Windows\SysWOW64\Iigdfa32.exeC:\Windows\system32\Iigdfa32.exe227⤵PID:4896
-
C:\Windows\SysWOW64\Indmnh32.exeC:\Windows\system32\Indmnh32.exe228⤵PID:2748
-
C:\Windows\SysWOW64\Ienekbld.exeC:\Windows\system32\Ienekbld.exe229⤵PID:6624
-
C:\Windows\SysWOW64\Igmagnkg.exeC:\Windows\system32\Igmagnkg.exe230⤵PID:7000
-
C:\Windows\SysWOW64\Jodjhkkj.exeC:\Windows\system32\Jodjhkkj.exe231⤵PID:6468
-
C:\Windows\SysWOW64\Jfnbdecg.exeC:\Windows\system32\Jfnbdecg.exe232⤵PID:6200
-
C:\Windows\SysWOW64\Jkkjmlan.exeC:\Windows\system32\Jkkjmlan.exe233⤵PID:3084
-
C:\Windows\SysWOW64\Joffnk32.exeC:\Windows\system32\Joffnk32.exe234⤵PID:7180
-
C:\Windows\SysWOW64\Jbdbjf32.exeC:\Windows\system32\Jbdbjf32.exe235⤵PID:7216
-
C:\Windows\SysWOW64\Jgakbm32.exeC:\Windows\system32\Jgakbm32.exe236⤵PID:7256
-
C:\Windows\SysWOW64\Jnkcogno.exeC:\Windows\system32\Jnkcogno.exe237⤵PID:7296
-
C:\Windows\SysWOW64\Jeekkafl.exeC:\Windows\system32\Jeekkafl.exe238⤵PID:7336
-
C:\Windows\SysWOW64\Jgdhgmep.exeC:\Windows\system32\Jgdhgmep.exe239⤵PID:7368
-
C:\Windows\SysWOW64\Jpkphjeb.exeC:\Windows\system32\Jpkphjeb.exe240⤵
- Drops file in System32 directory
PID:7404 -
C:\Windows\SysWOW64\Jicdap32.exeC:\Windows\system32\Jicdap32.exe241⤵PID:7456
-